Home
last modified time | relevance | path

Searched refs:snapuserd (Results 1 – 25 of 30) sorted by relevance

12

/system/sepolicy/private/
Dsnapuserd.te1 # snapuserd - Daemon for servicing dm-user requests for Virtual A/B snapshots.
2 type snapuserd, domain;
5 typeattribute snapuserd coredomain;
7 init_daemon_domain(snapuserd)
9 allow snapuserd kmsg_device:chr_file rw_file_perms;
11 # Allow snapuserd to reach block devices in /dev/block.
12 allow snapuserd block_device:dir search;
15 allow snapuserd sysfs:dir { open read };
20 allow snapuserd sysfs_dm:dir { open read search };
21 allow snapuserd sysfs_dm:file r_file_perms;
[all …]
Dsnapshotctl.te50 # Allow to control snapuserd.
53 # Allow to read snapuserd.* properties.
56 # Allow to talk to snapuserd.
58 allow snapshotctl snapuserd:unix_stream_socket { connectto };
Dupdate_verifier.te11 # allow update_verifier to connect to snapuserd daemon
13 allow update_verifier snapuserd:unix_stream_socket connectto;
Dupdate_engine.te12 # Allow to start snapuserd for dm-user communication.
29 # Allow to communicate with the snapuserd service, for dm-user snapshots.
30 allow update_engine snapuserd:unix_stream_socket connectto;
Dfastbootd.te32 # Start snapuserd for merging VABC updates
35 # Needed to communicate with snapuserd to complete merges.
37 allow fastbootd snapuserd:unix_stream_socket connectto;
Drecovery.te34 # Start snapuserd for merging VABC updates
37 # Needed to communicate with snapuserd to complete merges.
39 allow recovery snapuserd:unix_stream_socket connectto;
Dkernel.te4 domain_auto_trans(kernel, snapuserd_exec, snapuserd)
12 # OTA. Once sepolicy is loaded, snapuserd must be re-launched in the correct
Dinit.te22 domain_trans(init, rootfs, snapuserd)
71 # Allow init to communicate with snapuserd to transition Virtual A/B devices
74 allow init snapuserd:unix_stream_socket connectto;
/system/core/fs_mgr/libsnapshot/snapuserd/
Dsnapuserd.rc1 service snapuserd /system/bin/snapuserd
2 socket snapuserd stream 0660 system system
8 seclabel u:r:snapuserd:s0
10 service snapuserd_proxy /system/bin/snapuserd -socket-handoff
11 socket snapuserd stream 0660 system system
17 seclabel u:r:snapuserd:s0
19 on property:init.svc.snapuserd=stopped
20 setprop snapuserd.ready false
DAndroid.bp150 // snapuserd is started during early boot by first-stage init. At that
153 // snapuserd, which would lead to deadlock if we had to handle page
159 name: "snapuserd",
162 "snapuserd.rc",
173 // It will also create a symblink on /system/bin/snapuserd that point to
180 "snapuserd.rc",
187 symlinks: ["snapuserd"],
/system/core/fs_mgr/libsnapshot/snapuserd/user-space-merge/
Dhandler_manager.cpp32 HandlerThread::HandlerThread(std::shared_ptr<SnapshotHandler> snapuserd) in HandlerThread() argument
33 : snapuserd_(snapuserd), misc_name_(snapuserd_->GetMiscName()) {} in HandlerThread()
57 auto snapuserd = std::make_shared<SnapshotHandler>( in AddHandler() local
60 if (!snapuserd->InitCowDevice()) { in AddHandler()
65 if (!snapuserd->InitializeWorkers()) { in AddHandler()
70 auto handler = std::make_shared<HandlerThread>(snapuserd); in AddHandler()
89 if (!(*iter)->snapuserd() || (*iter)->snapuserd()->IsAttached()) { in StartHandler()
100 if (handler->snapuserd()->IsAttached()) { in StartHandler()
105 handler->snapuserd()->AttachControlDevice(); in StartHandler()
125 (*iter)->snapuserd()->NotifyIOTerminated(); in DeleteHandler()
[all …]
Dworker.cpp23 const std::string& base_path_merge, std::shared_ptr<SnapshotHandler> snapuserd) { in Worker() argument
27 snapuserd_ = snapuserd; in Worker()
Dhandler_manager.h33 explicit HandlerThread(std::shared_ptr<SnapshotHandler> snapuserd);
36 const std::shared_ptr<SnapshotHandler>& snapuserd() const { return snapuserd_; } in snapuserd() function
Dmerge_worker.h26 const std::string& base_path_merge, std::shared_ptr<SnapshotHandler> snapuserd);
Dworker.h37 const std::string& base_path_merge, std::shared_ptr<SnapshotHandler> snapuserd);
Dsnapuserd_readahead.h38 const std::string& misc_name, std::shared_ptr<SnapshotHandler> snapuserd);
Dsnapuserd_readahead.cpp32 const std::string& misc_name, std::shared_ptr<SnapshotHandler> snapuserd) { in ReadAhead() argument
36 snapuserd_ = snapuserd; in ReadAhead()
128 AutoNotifyReadAheadFailed(std::shared_ptr<SnapshotHandler> snapuserd) : snapuserd_(snapuserd) {} in AutoNotifyReadAheadFailed() argument
Dread_worker.h30 std::shared_ptr<SnapshotHandler> snapuserd,
Dmerge_worker.cpp33 std::shared_ptr<SnapshotHandler> snapuserd) in MergeWorker() argument
34 : Worker(cow_device, misc_name, base_path_merge, snapuserd) {} in MergeWorker()
Dread_worker.cpp40 std::shared_ptr<SnapshotHandler> snapuserd, in ReadWorker() argument
42 : Worker(cow_device, misc_name, base_path_merge, snapuserd), in ReadWorker()
Dsnapuserd_server.cpp135 auto num_sectors = handler->snapuserd()->GetNumSectors(); in Receivemsg()
/system/core/init/
Dfirst_stage_init.cpp131 static constexpr const auto& snapuserd = "/system/bin/snapuserd"; in PrepareSwitchRoot() local
154 } else if (access(snapuserd, F_OK) == 0) { in PrepareSwitchRoot()
155 LOG(INFO) << "Using vendor ramdisk copy of snapuserd " << snapuserd; in PrepareSwitchRoot()
156 Copy(snapuserd, dst); in PrepareSwitchRoot()
/system/sepolicy/private/compat/30.0/
D30.0.ignore.cil125 snapuserd
/system/core/fs_mgr/libsnapshot/android/snapshot/
Dsnapshot.proto100 // True if using snapuserd, false otherwise.
227 // legacy dm-snapshot based snapuserd
/system/sepolicy/microdroid/system/private/
Dkernel.te6 # OTA. Once sepolicy is loaded, snapuserd must be re-launched in the correct

12