/aosp12/system/sepolicy/prebuilts/api/31.0/private/ |
H A D | snapuserd.te | 2 type snapuserd, domain; 5 typeattribute snapuserd coredomain; 7 init_daemon_domain(snapuserd) 9 allow snapuserd kmsg_device:chr_file rw_file_perms; 12 allow snapuserd block_device:dir r_dir_perms; 13 allow snapuserd dm_device:chr_file rw_file_perms; 14 allow snapuserd dm_device:blk_file rw_file_perms; 17 allow snapuserd dm_user_device:dir r_dir_perms; 18 allow snapuserd dm_user_device:chr_file rw_file_perms; 20 # Reading and writing to /dev/socket/snapuserd. [all …]
|
H A D | update_engine.te | 12 # Allow to start snapuserd for dm-user communication. 24 # Allow to communicate with the snapuserd service, for dm-user snapshots. 25 allow update_engine snapuserd:unix_stream_socket connectto;
|
H A D | fastbootd.te | 31 # Start snapuserd for merging VABC updates 34 # Needed to communicate with snapuserd to complete merges. 36 allow fastbootd snapuserd:unix_stream_socket connectto;
|
H A D | recovery.te | 34 # Start snapuserd for merging VABC updates 37 # Needed to communicate with snapuserd to complete merges. 39 allow recovery snapuserd:unix_stream_socket connectto;
|
H A D | kernel.te | 4 domain_auto_trans(kernel, snapuserd_exec, snapuserd) 12 # OTA. Once sepolicy is loaded, snapuserd must be re-launched in the correct
|
H A D | init.te | 19 domain_trans(init, rootfs, snapuserd) 72 # Allow init to communicate with snapuserd to transition Virtual A/B devices 75 allow init snapuserd:unix_stream_socket connectto;
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/ |
H A D | snapuserd.te | 2 type snapuserd, domain; 5 typeattribute snapuserd coredomain; 7 init_daemon_domain(snapuserd) 9 allow snapuserd kmsg_device:chr_file rw_file_perms; 12 allow snapuserd block_device:dir r_dir_perms; 13 allow snapuserd dm_device:chr_file rw_file_perms; 14 allow snapuserd dm_device:blk_file rw_file_perms; 17 allow snapuserd dm_user_device:dir r_dir_perms; 18 allow snapuserd dm_user_device:chr_file rw_file_perms; 20 # Reading and writing to /dev/socket/snapuserd. [all …]
|
H A D | update_engine.te | 12 # Allow to start snapuserd for dm-user communication. 24 # Allow to communicate with the snapuserd service, for dm-user snapshots. 25 allow update_engine snapuserd:unix_stream_socket connectto;
|
H A D | fastbootd.te | 31 # Start snapuserd for merging VABC updates 34 # Needed to communicate with snapuserd to complete merges. 36 allow fastbootd snapuserd:unix_stream_socket connectto;
|
H A D | recovery.te | 34 # Start snapuserd for merging VABC updates 37 # Needed to communicate with snapuserd to complete merges. 39 allow recovery snapuserd:unix_stream_socket connectto;
|
H A D | kernel.te | 4 domain_auto_trans(kernel, snapuserd_exec, snapuserd) 12 # OTA. Once sepolicy is loaded, snapuserd must be re-launched in the correct
|
H A D | init.te | 19 domain_trans(init, rootfs, snapuserd) 72 # Allow init to communicate with snapuserd to transition Virtual A/B devices 75 allow init snapuserd:unix_stream_socket connectto;
|
/aosp12/system/sepolicy/private/ |
H A D | snapuserd.te | 2 type snapuserd, domain; 5 typeattribute snapuserd coredomain; 7 init_daemon_domain(snapuserd) 9 allow snapuserd kmsg_device:chr_file rw_file_perms; 12 allow snapuserd block_device:dir r_dir_perms; 13 allow snapuserd dm_device:chr_file rw_file_perms; 14 allow snapuserd dm_device:blk_file rw_file_perms; 17 allow snapuserd dm_user_device:dir r_dir_perms; 18 allow snapuserd dm_user_device:chr_file rw_file_perms; 20 # Reading and writing to /dev/socket/snapuserd. [all …]
|
H A D | update_engine.te | 12 # Allow to start snapuserd for dm-user communication. 24 # Allow to communicate with the snapuserd service, for dm-user snapshots. 25 allow update_engine snapuserd:unix_stream_socket connectto;
|
H A D | fastbootd.te | 31 # Start snapuserd for merging VABC updates 34 # Needed to communicate with snapuserd to complete merges. 36 allow fastbootd snapuserd:unix_stream_socket connectto;
|
H A D | recovery.te | 34 # Start snapuserd for merging VABC updates 37 # Needed to communicate with snapuserd to complete merges. 39 allow recovery snapuserd:unix_stream_socket connectto;
|
H A D | kernel.te | 4 domain_auto_trans(kernel, snapuserd_exec, snapuserd) 12 # OTA. Once sepolicy is loaded, snapuserd must be re-launched in the correct
|
H A D | init.te | 19 domain_trans(init, rootfs, snapuserd) 72 # Allow init to communicate with snapuserd to transition Virtual A/B devices 75 allow init snapuserd:unix_stream_socket connectto;
|
/aosp12/system/core/fs_mgr/libsnapshot/ |
H A D | snapuserd_server.cpp | 150 if (!(*iter)->snapuserd() || (*iter)->snapuserd()->IsAttached()) { in Receivemsg() 207 if (!handler->snapuserd()->Start()) { in RunThread() 211 handler->snapuserd()->CloseFds(); in RunThread() 212 handler->snapuserd()->CheckMergeCompletionStatus(); in RunThread() 213 handler->snapuserd()->UnmapBufferRegion(); in RunThread() 236 if (handler->snapuserd()->IsAttached()) { in RunThread() 358 if (!snapuserd->InitCowDevice()) { in AddHandler() 363 if (!snapuserd->InitializeWorkers()) { in AddHandler() 368 auto handler = std::make_shared<DmUserHandler>(snapuserd); in AddHandler() 381 if (handler->snapuserd()->IsAttached()) { in StartHandler() [all …]
|
H A D | snapuserd.rc | 1 service snapuserd /system/bin/snapuserd 2 socket snapuserd stream 0660 system system 7 seclabel u:r:snapuserd:s0
|
H A D | snapuserd_server.h | 50 explicit DmUserHandler(std::shared_ptr<Snapuserd> snapuserd); 61 const std::shared_ptr<Snapuserd>& snapuserd() const { return snapuserd_; } in snapuserd() function
|
H A D | Android.bp | 422 "snapuserd.cpp", 446 name: "snapuserd", 449 "snapuserd.rc", 566 "snapuserd.cpp",
|
H A D | snapuserd_readahead.cpp | 167 std::shared_ptr<Snapuserd> snapuserd) { in ReadAheadThread() argument 171 snapuserd_ = snapuserd; in ReadAheadThread()
|
/aosp12/build/make/target/product/virtual_ab_ota/ |
H A D | compression_retrofit.mk | 26 snapuserd.ramdisk \ 27 snapuserd \ 28 snapuserd.recovery
|
H A D | compression.mk | 22 snapuserd.vendor_ramdisk \ 23 snapuserd \ 24 snapuserd.recovery
|