Home
last modified time | relevance | path

Searched refs:snapuserd (Results 1 – 25 of 38) sorted by relevance

12

/aosp12/system/sepolicy/prebuilts/api/31.0/private/
H A Dsnapuserd.te2 type snapuserd, domain;
5 typeattribute snapuserd coredomain;
7 init_daemon_domain(snapuserd)
9 allow snapuserd kmsg_device:chr_file rw_file_perms;
12 allow snapuserd block_device:dir r_dir_perms;
13 allow snapuserd dm_device:chr_file rw_file_perms;
14 allow snapuserd dm_device:blk_file rw_file_perms;
17 allow snapuserd dm_user_device:dir r_dir_perms;
18 allow snapuserd dm_user_device:chr_file rw_file_perms;
20 # Reading and writing to /dev/socket/snapuserd.
[all …]
H A Dupdate_engine.te12 # Allow to start snapuserd for dm-user communication.
24 # Allow to communicate with the snapuserd service, for dm-user snapshots.
25 allow update_engine snapuserd:unix_stream_socket connectto;
H A Dfastbootd.te31 # Start snapuserd for merging VABC updates
34 # Needed to communicate with snapuserd to complete merges.
36 allow fastbootd snapuserd:unix_stream_socket connectto;
H A Drecovery.te34 # Start snapuserd for merging VABC updates
37 # Needed to communicate with snapuserd to complete merges.
39 allow recovery snapuserd:unix_stream_socket connectto;
H A Dkernel.te4 domain_auto_trans(kernel, snapuserd_exec, snapuserd)
12 # OTA. Once sepolicy is loaded, snapuserd must be re-launched in the correct
H A Dinit.te19 domain_trans(init, rootfs, snapuserd)
72 # Allow init to communicate with snapuserd to transition Virtual A/B devices
75 allow init snapuserd:unix_stream_socket connectto;
/aosp12/system/sepolicy/prebuilts/api/32.0/private/
H A Dsnapuserd.te2 type snapuserd, domain;
5 typeattribute snapuserd coredomain;
7 init_daemon_domain(snapuserd)
9 allow snapuserd kmsg_device:chr_file rw_file_perms;
12 allow snapuserd block_device:dir r_dir_perms;
13 allow snapuserd dm_device:chr_file rw_file_perms;
14 allow snapuserd dm_device:blk_file rw_file_perms;
17 allow snapuserd dm_user_device:dir r_dir_perms;
18 allow snapuserd dm_user_device:chr_file rw_file_perms;
20 # Reading and writing to /dev/socket/snapuserd.
[all …]
H A Dupdate_engine.te12 # Allow to start snapuserd for dm-user communication.
24 # Allow to communicate with the snapuserd service, for dm-user snapshots.
25 allow update_engine snapuserd:unix_stream_socket connectto;
H A Dfastbootd.te31 # Start snapuserd for merging VABC updates
34 # Needed to communicate with snapuserd to complete merges.
36 allow fastbootd snapuserd:unix_stream_socket connectto;
H A Drecovery.te34 # Start snapuserd for merging VABC updates
37 # Needed to communicate with snapuserd to complete merges.
39 allow recovery snapuserd:unix_stream_socket connectto;
H A Dkernel.te4 domain_auto_trans(kernel, snapuserd_exec, snapuserd)
12 # OTA. Once sepolicy is loaded, snapuserd must be re-launched in the correct
H A Dinit.te19 domain_trans(init, rootfs, snapuserd)
72 # Allow init to communicate with snapuserd to transition Virtual A/B devices
75 allow init snapuserd:unix_stream_socket connectto;
/aosp12/system/sepolicy/private/
H A Dsnapuserd.te2 type snapuserd, domain;
5 typeattribute snapuserd coredomain;
7 init_daemon_domain(snapuserd)
9 allow snapuserd kmsg_device:chr_file rw_file_perms;
12 allow snapuserd block_device:dir r_dir_perms;
13 allow snapuserd dm_device:chr_file rw_file_perms;
14 allow snapuserd dm_device:blk_file rw_file_perms;
17 allow snapuserd dm_user_device:dir r_dir_perms;
18 allow snapuserd dm_user_device:chr_file rw_file_perms;
20 # Reading and writing to /dev/socket/snapuserd.
[all …]
H A Dupdate_engine.te12 # Allow to start snapuserd for dm-user communication.
24 # Allow to communicate with the snapuserd service, for dm-user snapshots.
25 allow update_engine snapuserd:unix_stream_socket connectto;
H A Dfastbootd.te31 # Start snapuserd for merging VABC updates
34 # Needed to communicate with snapuserd to complete merges.
36 allow fastbootd snapuserd:unix_stream_socket connectto;
H A Drecovery.te34 # Start snapuserd for merging VABC updates
37 # Needed to communicate with snapuserd to complete merges.
39 allow recovery snapuserd:unix_stream_socket connectto;
H A Dkernel.te4 domain_auto_trans(kernel, snapuserd_exec, snapuserd)
12 # OTA. Once sepolicy is loaded, snapuserd must be re-launched in the correct
H A Dinit.te19 domain_trans(init, rootfs, snapuserd)
72 # Allow init to communicate with snapuserd to transition Virtual A/B devices
75 allow init snapuserd:unix_stream_socket connectto;
/aosp12/system/core/fs_mgr/libsnapshot/
H A Dsnapuserd_server.cpp150 if (!(*iter)->snapuserd() || (*iter)->snapuserd()->IsAttached()) { in Receivemsg()
207 if (!handler->snapuserd()->Start()) { in RunThread()
211 handler->snapuserd()->CloseFds(); in RunThread()
212 handler->snapuserd()->CheckMergeCompletionStatus(); in RunThread()
213 handler->snapuserd()->UnmapBufferRegion(); in RunThread()
236 if (handler->snapuserd()->IsAttached()) { in RunThread()
358 if (!snapuserd->InitCowDevice()) { in AddHandler()
363 if (!snapuserd->InitializeWorkers()) { in AddHandler()
368 auto handler = std::make_shared<DmUserHandler>(snapuserd); in AddHandler()
381 if (handler->snapuserd()->IsAttached()) { in StartHandler()
[all …]
H A Dsnapuserd.rc1 service snapuserd /system/bin/snapuserd
2 socket snapuserd stream 0660 system system
7 seclabel u:r:snapuserd:s0
H A Dsnapuserd_server.h50 explicit DmUserHandler(std::shared_ptr<Snapuserd> snapuserd);
61 const std::shared_ptr<Snapuserd>& snapuserd() const { return snapuserd_; } in snapuserd() function
H A DAndroid.bp422 "snapuserd.cpp",
446 name: "snapuserd",
449 "snapuserd.rc",
566 "snapuserd.cpp",
H A Dsnapuserd_readahead.cpp167 std::shared_ptr<Snapuserd> snapuserd) { in ReadAheadThread() argument
171 snapuserd_ = snapuserd; in ReadAheadThread()
/aosp12/build/make/target/product/virtual_ab_ota/
H A Dcompression_retrofit.mk26 snapuserd.ramdisk \
27 snapuserd \
28 snapuserd.recovery
H A Dcompression.mk22 snapuserd.vendor_ramdisk \
23 snapuserd \
24 snapuserd.recovery

12