| /system/sepolicy/prebuilts/api/202504/private/ |
| D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init) 4 domain_auto_trans(kernel, snapuserd_exec, snapuserd) 6 domain_auto_trans(kernel, overlay_remounter_exec, overlay_remounter) 9 # Allow the kernel to read otapreopt_chroot's file descriptors and files under 11 allow kernel otapreopt_chroot:fd use; 12 allow kernel postinstall_file:file read; 17 # enabling enforcement, eg, in permissive mode while still in the kernel 19 allow kernel tmpfs:blk_file { getattr relabelfrom }; 20 allow kernel tmpfs:chr_file { getattr relabelfrom }; [all …]
|
| D | genfs_contexts | 49 genfscon proc /sys/kernel/bpf_ u:object_r:proc_bpf:s0 50 genfscon proc /sys/kernel/core_pattern u:object_r:usermodehelper:s0 51 genfscon proc /sys/kernel/core_pipe_limit u:object_r:usermodehelper:s0 52 genfscon proc /sys/kernel/domainname u:object_r:proc_hostname:s0 53 genfscon proc /sys/kernel/dmesg_restrict u:object_r:proc_security:s0 54 genfscon proc /sys/kernel/hostname u:object_r:proc_hostname:s0 55 genfscon proc /sys/kernel/hotplug u:object_r:usermodehelper:s0 56 genfscon proc /sys/kernel/hung_task_ u:object_r:proc_hung_task:s0 57 genfscon proc /sys/kernel/kptr_restrict u:object_r:proc_security:s0 58 genfscon proc /sys/kernel/modprobe u:object_r:usermodehelper:s0 [all …]
|
| /system/sepolicy/private/ |
| D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init) 4 domain_auto_trans(kernel, snapuserd_exec, snapuserd) 6 domain_auto_trans(kernel, overlay_remounter_exec, overlay_remounter) 9 # Allow the kernel to read otapreopt_chroot's file descriptors and files under 11 allow kernel otapreopt_chroot:fd use; 12 allow kernel postinstall_file:file read; 17 # enabling enforcement, eg, in permissive mode while still in the kernel 19 allow kernel tmpfs:blk_file { getattr relabelfrom }; 20 allow kernel tmpfs:chr_file { getattr relabelfrom }; [all …]
|
| D | genfs_contexts | 49 genfscon proc /sys/kernel/bpf_ u:object_r:proc_bpf:s0 50 genfscon proc /sys/kernel/core_pattern u:object_r:usermodehelper:s0 51 genfscon proc /sys/kernel/core_pipe_limit u:object_r:usermodehelper:s0 52 genfscon proc /sys/kernel/domainname u:object_r:proc_hostname:s0 53 genfscon proc /sys/kernel/dmesg_restrict u:object_r:proc_security:s0 54 genfscon proc /sys/kernel/hostname u:object_r:proc_hostname:s0 55 genfscon proc /sys/kernel/hotplug u:object_r:usermodehelper:s0 56 genfscon proc /sys/kernel/hung_task_ u:object_r:proc_hung_task:s0 57 genfscon proc /sys/kernel/kptr_restrict u:object_r:proc_security:s0 58 genfscon proc /sys/kernel/modprobe u:object_r:usermodehelper:s0 [all …]
|
| /system/sepolicy/prebuilts/api/34.0/private/ |
| D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init) 4 domain_auto_trans(kernel, snapuserd_exec, snapuserd) 6 # Allow the kernel to read otapreopt_chroot's file descriptors and files under 8 allow kernel otapreopt_chroot:fd use; 9 allow kernel postinstall_file:file read; 14 # enabling enforcement, eg, in permissive mode while still in the kernel 16 allow kernel tmpfs:blk_file { getattr relabelfrom }; 17 allow kernel tmpfs:chr_file { getattr relabelfrom }; 18 allow kernel tmpfs:lnk_file { getattr relabelfrom }; [all …]
|
| /system/sepolicy/prebuilts/api/33.0/private/ |
| D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init) 4 domain_auto_trans(kernel, snapuserd_exec, snapuserd) 6 # Allow the kernel to read otapreopt_chroot's file descriptors and files under 8 allow kernel otapreopt_chroot:fd use; 9 allow kernel postinstall_file:file read; 14 # enabling enforcement, eg, in permissive mode while still in the kernel 16 allow kernel tmpfs:blk_file { getattr relabelfrom }; 17 allow kernel tmpfs:chr_file { getattr relabelfrom }; 18 allow kernel tmpfs:lnk_file { getattr relabelfrom }; [all …]
|
| /system/sepolicy/prebuilts/api/202404/private/ |
| D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init) 4 domain_auto_trans(kernel, snapuserd_exec, snapuserd) 6 # Allow the kernel to read otapreopt_chroot's file descriptors and files under 8 allow kernel otapreopt_chroot:fd use; 9 allow kernel postinstall_file:file read; 14 # enabling enforcement, eg, in permissive mode while still in the kernel 16 allow kernel tmpfs:blk_file { getattr relabelfrom }; 17 allow kernel tmpfs:chr_file { getattr relabelfrom }; 18 allow kernel tmpfs:lnk_file { getattr relabelfrom }; [all …]
|
| /system/sepolicy/prebuilts/api/29.0/public/ |
| D | kernel.te | 1 # Life begins with the kernel. 2 type kernel, domain, mlstrustedsubject; type 4 allow kernel self:global_capability_class_set sys_nice; 7 r_dir_file(kernel, rootfs) 8 allow kernel proc_cmdline:file r_file_perms; 11 allow kernel selinuxfs:dir r_dir_perms; 12 allow kernel selinuxfs:file r_file_perms; 15 allow kernel file_contexts_file:file r_file_perms; 18 allow kernel rootfs:file relabelfrom; 19 allow kernel init_exec:file relabelto; [all …]
|
| /system/sepolicy/microdroid/system/private/ |
| D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init) 8 # enabling enforcement, eg, in permissive mode while still in the kernel 10 allow kernel tmpfs:blk_file { getattr relabelfrom }; 11 allow kernel tmpfs:chr_file { getattr relabelfrom }; 12 allow kernel tmpfs:lnk_file { getattr relabelfrom }; 13 allow kernel tmpfs:dir { open read relabelfrom }; 15 allow kernel block_device:blk_file relabelto; 16 allow kernel block_device:lnk_file relabelto; 17 allow kernel dm_device:chr_file relabelto; [all …]
|
| /system/sepolicy/prebuilts/api/34.0/public/ |
| D | kernel.te | 1 # Life begins with the kernel. 2 type kernel, domain, mlstrustedsubject; type 4 allow kernel self:global_capability_class_set sys_nice; 7 r_dir_file(kernel, rootfs) 10 allow kernel { 16 allow kernel selinuxfs:dir r_dir_perms; 17 allow kernel selinuxfs:file r_file_perms; 20 allow kernel file_contexts_file:file r_file_perms; 23 allow kernel rootfs:file relabelfrom; 24 allow kernel init_exec:file relabelto; [all …]
|
| /system/sepolicy/prebuilts/api/202404/public/ |
| D | kernel.te | 1 # Life begins with the kernel. 2 type kernel, domain, mlstrustedsubject; type 4 allow kernel self:global_capability_class_set sys_nice; 7 r_dir_file(kernel, rootfs) 10 allow kernel { 16 allow kernel selinuxfs:dir r_dir_perms; 17 allow kernel selinuxfs:file r_file_perms; 20 allow kernel file_contexts_file:file r_file_perms; 23 allow kernel rootfs:file relabelfrom; 24 allow kernel init_exec:file relabelto; [all …]
|
| /system/sepolicy/prebuilts/api/33.0/public/ |
| D | kernel.te | 1 # Life begins with the kernel. 2 type kernel, domain, mlstrustedsubject; type 4 allow kernel self:global_capability_class_set sys_nice; 7 r_dir_file(kernel, rootfs) 10 allow kernel { 16 allow kernel selinuxfs:dir r_dir_perms; 17 allow kernel selinuxfs:file r_file_perms; 20 allow kernel file_contexts_file:file r_file_perms; 23 allow kernel rootfs:file relabelfrom; 24 allow kernel init_exec:file relabelto; [all …]
|
| /system/sepolicy/prebuilts/api/32.0/public/ |
| D | kernel.te | 1 # Life begins with the kernel. 2 type kernel, domain, mlstrustedsubject; type 4 allow kernel self:global_capability_class_set sys_nice; 7 r_dir_file(kernel, rootfs) 10 allow kernel { 16 allow kernel selinuxfs:dir r_dir_perms; 17 allow kernel selinuxfs:file r_file_perms; 20 allow kernel file_contexts_file:file r_file_perms; 23 allow kernel rootfs:file relabelfrom; 24 allow kernel init_exec:file relabelto; [all …]
|
| /system/sepolicy/prebuilts/api/30.0/public/ |
| D | kernel.te | 1 # Life begins with the kernel. 2 type kernel, domain, mlstrustedsubject; type 4 allow kernel self:global_capability_class_set sys_nice; 7 r_dir_file(kernel, rootfs) 8 allow kernel proc_cmdline:file r_file_perms; 11 allow kernel selinuxfs:dir r_dir_perms; 12 allow kernel selinuxfs:file r_file_perms; 15 allow kernel file_contexts_file:file r_file_perms; 18 allow kernel rootfs:file relabelfrom; 19 allow kernel init_exec:file relabelto; [all …]
|
| /system/sepolicy/prebuilts/api/31.0/public/ |
| D | kernel.te | 1 # Life begins with the kernel. 2 type kernel, domain, mlstrustedsubject; type 4 allow kernel self:global_capability_class_set sys_nice; 7 r_dir_file(kernel, rootfs) 10 allow kernel { 16 allow kernel selinuxfs:dir r_dir_perms; 17 allow kernel selinuxfs:file r_file_perms; 20 allow kernel file_contexts_file:file r_file_perms; 23 allow kernel rootfs:file relabelfrom; 24 allow kernel init_exec:file relabelto; [all …]
|
| /system/sepolicy/prebuilts/api/31.0/private/ |
| D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init) 4 domain_auto_trans(kernel, snapuserd_exec, snapuserd) 6 # Allow the kernel to read otapreopt_chroot's file descriptors and files under 8 allow kernel otapreopt_chroot:fd use; 9 allow kernel postinstall_file:file read; 14 # enabling enforcement, eg, in permissive mode while still in the kernel 16 allow kernel tmpfs:blk_file { getattr relabelfrom }; 17 allow kernel tmpfs:chr_file { getattr relabelfrom }; 18 allow kernel tmpfs:lnk_file { getattr relabelfrom }; [all …]
|
| /system/sepolicy/prebuilts/api/32.0/private/ |
| D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init) 4 domain_auto_trans(kernel, snapuserd_exec, snapuserd) 6 # Allow the kernel to read otapreopt_chroot's file descriptors and files under 8 allow kernel otapreopt_chroot:fd use; 9 allow kernel postinstall_file:file read; 14 # enabling enforcement, eg, in permissive mode while still in the kernel 16 allow kernel tmpfs:blk_file { getattr relabelfrom }; 17 allow kernel tmpfs:chr_file { getattr relabelfrom }; 18 allow kernel tmpfs:lnk_file { getattr relabelfrom }; [all …]
|
| /system/extras/simpleperf/testdata/ |
| D | perf_with_jit_symbol.foldedstack_addrs | 2 …inActivity$1.run;[kernel.kallsyms][+ffffff93eb483f36];[kernel.kallsyms][+ffffff93eb481f72];[kernel… 4 …kernel.kallsyms][+ffffff93eb483f36];[kernel.kallsyms][+ffffff93eb481f72];[kernel.kallsyms][+ffffff… 5 …kernel.kallsyms][+ffffff93eb483f36];[kernel.kallsyms][+ffffff93eb481f72];[kernel.kallsyms][+ffffff… 7 …::Object>, long, int, bool, art::ThreadState);syscall;[kernel.kallsyms][+ffffff93eb484126];[kernel… 8 …adState);syscall;[kernel.kallsyms][+ffffff93eb484156];[kernel.kallsyms][+ffffff93eb64c252];[kernel… 9 …kernel.kallsyms][+ffffff93eb484156];[kernel.kallsyms][+ffffff93eb64c252];[kernel.kallsyms][+ffffff… 10 …kernel.kallsyms][+ffffff93eb484156];[kernel.kallsyms][+ffffff93eb64c252];[kernel.kallsyms][+ffffff…
|
| /system/libvintf/ |
| D | KernelInfo.cpp | 43 ss << "Kernel config errors:"; in matchKernelConfigs() 87 // Check matrix kernel level in getMatchedKernelRequirements() 89 // Use legacy behavior when kernel FCM version is not specified. Blindly add all of them in getMatchedKernelRequirements() 107 // matrix level >= kernel level in getMatchedKernelRequirements() 109 // for kernel level >= S, do not allow matrix level > kernel level; i.e. only check in getMatchedKernelRequirements() 121 ss << "No kernel entry found for kernel version " << mVersion.dropMinor() in getMatchedKernelRequirements() 122 << " at kernel FCM version " in getMatchedKernelRequirements() 124 << ". The following kernel requirements are checked:"; in getMatchedKernelRequirements() 127 << ", kernel FCM version: " << matrixKernel.getSourceMatrixLevel() in getMatchedKernelRequirements() 135 // At this point, kernelsForLevel contains kernel requirements for each level. in getMatchedKernelRequirements() [all …]
|
| /system/extras/simpleperf/scripts/test/script_testdata/ |
| D | perf_with_interpreter_frames.gecko.json | 17 "name": "Kernel", 4269 "[kernel.kallsyms][+ffffffc000086b4a] (in [kernel.kallsyms])", 4270 "[kernel.kallsyms][+ffffffc0001fb826] (in [kernel.kallsyms])", 4271 "[kernel.kallsyms][+ffffffc0001fb51a] (in [kernel.kallsyms])", 4272 "[kernel.kallsyms][+ffffffc0009898ce] (in [kernel.kallsyms])", 4273 "[kernel.kallsyms][+ffffffc000989206] (in [kernel.kallsyms])", 4274 "[kernel.kallsyms][+ffffffc0009843ba] (in [kernel.kallsyms])", 4275 "[kernel.kallsyms][+ffffffc000fe8782] (in [kernel.kallsyms])", 4276 "[kernel.kallsyms][+ffffffc000fe826a] (in [kernel.kallsyms])", 4277 "[kernel.kallsyms][+ffffffc0000d7e12] (in [kernel.kallsyms])", [all …]
|
| D | perf_with_jit_symbol.gecko.json | 17 "name": "Kernel", 1457 "[kernel.kallsyms][+ffffff93eb484156] (in [kernel.kallsyms])", 1458 "[kernel.kallsyms][+ffffff93eb64c252] (in [kernel.kallsyms])", 1459 "[kernel.kallsyms][+ffffff93eb645bee] (in [kernel.kallsyms])", 1460 "[kernel.kallsyms][+ffffff93eb647ffa] (in [kernel.kallsyms])", 1461 "[kernel.kallsyms][+ffffff93eb64ab86] (in [kernel.kallsyms])", 1462 "[kernel.kallsyms][+ffffff93ed05e93e] (in [kernel.kallsyms])", 1463 "[kernel.kallsyms][+ffffff93eb58b094] (in [kernel.kallsyms])", 1464 "[kernel.kallsyms][+ffffff93eb483f36] (in [kernel.kallsyms])", 1465 "[kernel.kallsyms][+ffffff93eb481f72] (in [kernel.kallsyms])", [all …]
|
| /system/connectivity/wificond/net/kernel-header-latest/ |
| D | README.txt | 3 This folder contains any wifi kernel header updates to the kernels running on 4 the latest devices, but not present in external/kernel-headers. 5 external/kernel-headers has the headers from the stable kernel tree which is generally 9 cp <kernel-dir>/aosp/include/uapi/linux/nl80211.h 10 <android-source-dir>/system/connectivity/wificond/net/kernel-header-latest/nl80211.h 12 Last update from kernel branch: `android14-linux-6.1-XX`
|
| /system/bpf/include/vmlinux/ |
| D | README | 5 …create the infrastructure to periodically update this to a version with the latest tracking kernel. 7 …cess internal kernel data structures. They do not need to track the target kernel perfectly, but i… 9 … problem for arm64 or x86_64 architectures, as the 64bit system userspace matches the 64bit kernel. 11 …ld time if the kernel we will be running on will be 32bit or 64bit. For this reason, we default to…
|
| /system/sepolicy/prebuilts/api/30.0/private/ |
| D | fsverity_init.te | 9 # Kernel only prints the keys that can be accessed and only kernel keyring is needed here. 12 allow fsverity_init kernel:key { view search write setattr }; 18 # When kernel requests an algorithm, the crypto API first looks for an 19 # already registered algorithm with that name. If it fails, the kernel creates 21 dontaudit fsverity_init kernel:system module_request;
|
| D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init) 5 # Allow the kernel to read otapreopt_chroot's file descriptors and files under 7 allow kernel otapreopt_chroot:fd use; 8 allow kernel postinstall_file:file read;
|