/system/sepolicy/private/ |
D | snapuserd.te | 1 # snapuserd - Daemon for servicing dm-user requests for Virtual A/B snapshots. 2 type snapuserd, domain; 5 typeattribute snapuserd coredomain; 7 init_daemon_domain(snapuserd) 9 allow snapuserd kmsg_device:chr_file rw_file_perms; 11 # Allow snapuserd to reach block devices in /dev/block. 12 allow snapuserd block_device:dir search; 15 allow snapuserd sysfs:dir { open read }; 20 allow snapuserd sysfs_dm:dir { open read search }; 21 allow snapuserd sysfs_dm:file r_file_perms; [all …]
|
D | snapshotctl.te | 50 # Allow to control snapuserd. 53 # Allow to read snapuserd.* properties. 56 # Allow to talk to snapuserd. 58 allow snapshotctl snapuserd:unix_stream_socket { connectto };
|
D | update_verifier.te | 11 # allow update_verifier to connect to snapuserd daemon 13 allow update_verifier snapuserd:unix_stream_socket connectto;
|
D | update_engine.te | 12 # Allow to start snapuserd for dm-user communication. 29 # Allow to communicate with the snapuserd service, for dm-user snapshots. 30 allow update_engine snapuserd:unix_stream_socket connectto;
|
D | fastbootd.te | 32 # Start snapuserd for merging VABC updates 35 # Needed to communicate with snapuserd to complete merges. 37 allow fastbootd snapuserd:unix_stream_socket connectto;
|
D | recovery.te | 34 # Start snapuserd for merging VABC updates 37 # Needed to communicate with snapuserd to complete merges. 39 allow recovery snapuserd:unix_stream_socket connectto;
|
D | kernel.te | 4 domain_auto_trans(kernel, snapuserd_exec, snapuserd) 12 # OTA. Once sepolicy is loaded, snapuserd must be re-launched in the correct
|
D | init.te | 22 domain_trans(init, rootfs, snapuserd) 71 # Allow init to communicate with snapuserd to transition Virtual A/B devices 74 allow init snapuserd:unix_stream_socket connectto;
|
/system/core/fs_mgr/libsnapshot/snapuserd/ |
D | snapuserd.rc | 1 service snapuserd /system/bin/snapuserd 2 socket snapuserd stream 0660 system system 8 seclabel u:r:snapuserd:s0 10 service snapuserd_proxy /system/bin/snapuserd -socket-handoff 11 socket snapuserd stream 0660 system system 17 seclabel u:r:snapuserd:s0 19 on property:init.svc.snapuserd=stopped 20 setprop snapuserd.ready false
|
D | Android.bp | 150 // snapuserd is started during early boot by first-stage init. At that 153 // snapuserd, which would lead to deadlock if we had to handle page 159 name: "snapuserd", 162 "snapuserd.rc", 173 // It will also create a symblink on /system/bin/snapuserd that point to 180 "snapuserd.rc", 187 symlinks: ["snapuserd"],
|
/system/core/fs_mgr/libsnapshot/snapuserd/user-space-merge/ |
D | handler_manager.cpp | 32 HandlerThread::HandlerThread(std::shared_ptr<SnapshotHandler> snapuserd) in HandlerThread() argument 33 : snapuserd_(snapuserd), misc_name_(snapuserd_->GetMiscName()) {} in HandlerThread() 57 auto snapuserd = std::make_shared<SnapshotHandler>( in AddHandler() local 60 if (!snapuserd->InitCowDevice()) { in AddHandler() 65 if (!snapuserd->InitializeWorkers()) { in AddHandler() 70 auto handler = std::make_shared<HandlerThread>(snapuserd); in AddHandler() 89 if (!(*iter)->snapuserd() || (*iter)->snapuserd()->IsAttached()) { in StartHandler() 100 if (handler->snapuserd()->IsAttached()) { in StartHandler() 105 handler->snapuserd()->AttachControlDevice(); in StartHandler() 125 (*iter)->snapuserd()->NotifyIOTerminated(); in DeleteHandler() [all …]
|
D | worker.cpp | 23 const std::string& base_path_merge, std::shared_ptr<SnapshotHandler> snapuserd) { in Worker() argument 27 snapuserd_ = snapuserd; in Worker()
|
D | handler_manager.h | 33 explicit HandlerThread(std::shared_ptr<SnapshotHandler> snapuserd); 36 const std::shared_ptr<SnapshotHandler>& snapuserd() const { return snapuserd_; } in snapuserd() function
|
D | merge_worker.h | 26 const std::string& base_path_merge, std::shared_ptr<SnapshotHandler> snapuserd);
|
D | worker.h | 37 const std::string& base_path_merge, std::shared_ptr<SnapshotHandler> snapuserd);
|
D | snapuserd_readahead.h | 38 const std::string& misc_name, std::shared_ptr<SnapshotHandler> snapuserd);
|
D | snapuserd_readahead.cpp | 32 const std::string& misc_name, std::shared_ptr<SnapshotHandler> snapuserd) { in ReadAhead() argument 36 snapuserd_ = snapuserd; in ReadAhead() 128 AutoNotifyReadAheadFailed(std::shared_ptr<SnapshotHandler> snapuserd) : snapuserd_(snapuserd) {} in AutoNotifyReadAheadFailed() argument
|
D | read_worker.h | 30 std::shared_ptr<SnapshotHandler> snapuserd,
|
D | merge_worker.cpp | 33 std::shared_ptr<SnapshotHandler> snapuserd) in MergeWorker() argument 34 : Worker(cow_device, misc_name, base_path_merge, snapuserd) {} in MergeWorker()
|
D | read_worker.cpp | 40 std::shared_ptr<SnapshotHandler> snapuserd, in ReadWorker() argument 42 : Worker(cow_device, misc_name, base_path_merge, snapuserd), in ReadWorker()
|
D | snapuserd_server.cpp | 135 auto num_sectors = handler->snapuserd()->GetNumSectors(); in Receivemsg()
|
/system/core/init/ |
D | first_stage_init.cpp | 131 static constexpr const auto& snapuserd = "/system/bin/snapuserd"; in PrepareSwitchRoot() local 154 } else if (access(snapuserd, F_OK) == 0) { in PrepareSwitchRoot() 155 LOG(INFO) << "Using vendor ramdisk copy of snapuserd " << snapuserd; in PrepareSwitchRoot() 156 Copy(snapuserd, dst); in PrepareSwitchRoot()
|
/system/sepolicy/private/compat/30.0/ |
D | 30.0.ignore.cil | 125 snapuserd
|
/system/core/fs_mgr/libsnapshot/android/snapshot/ |
D | snapshot.proto | 100 // True if using snapuserd, false otherwise. 227 // legacy dm-snapshot based snapuserd
|
/system/sepolicy/microdroid/system/private/ |
D | kernel.te | 6 # OTA. Once sepolicy is loaded, snapuserd must be re-launched in the correct
|