Searched full:ueventd (Results 1 – 25 of 107) sorted by relevance
12345
/system/sepolicy/prebuilts/api/30.0/public/ |
D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; 7 allow ueventd kmsg_device:chr_file rw_file_perms; 9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 10 allow ueventd device:file create_file_perms; 12 r_dir_file(ueventd, rootfs) 14 # ueventd needs write access to files in /sys to regenerate uevents 15 allow ueventd sysfs_type:file w_file_perms; 16 r_dir_file(ueventd, sysfs_type) 17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
D | domain.te | 354 -ueventd 388 # Only init, ueventd, shell and system_server should be able to access HW RNG 394 -ueventd 400 -ueventd 415 -ueventd 421 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write }; 575 -ueventd # Further restricted in ueventd.te 617 -ueventd 681 -ueventd # uevent is granted create for this device, but we still neverallow I/O below 685 neverallow ueventd vndbinder_device:chr_file { read write append ioctl }; [all …]
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; 7 allow ueventd kmsg_device:chr_file rw_file_perms; 9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 10 allow ueventd device:file create_file_perms; 12 r_dir_file(ueventd, rootfs) 14 # ueventd needs write access to files in /sys to regenerate uevents 15 allow ueventd sysfs_type:file w_file_perms; 16 r_dir_file(ueventd, sysfs_type) 17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
/system/sepolicy/public/ |
D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; 7 allow ueventd kmsg_device:chr_file rw_file_perms; 9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 10 allow ueventd device:file create_file_perms; 12 r_dir_file(ueventd, rootfs) 14 # ueventd needs write access to files in /sys to regenerate uevents 15 allow ueventd sysfs_type:file w_file_perms; 16 r_dir_file(ueventd, sysfs_type) 17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
D | domain.te | 367 -ueventd 401 # Only init, ueventd, shell and system_server should be able to access HW RNG 407 -ueventd 413 -ueventd 428 -ueventd 434 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write }; 582 -ueventd # Further restricted in ueventd.te 624 -ueventd 688 -ueventd # uevent is granted create for this device, but we still neverallow I/O below 692 neverallow ueventd vndbinder_device:chr_file { read write append ioctl }; [all …]
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; 6 allow ueventd kmsg_device:chr_file rw_file_perms; 8 allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner }; 9 allow ueventd device:file create_file_perms; 11 r_dir_file(ueventd, sysfs_type) 12 r_dir_file(ueventd, rootfs) 13 allow ueventd sysfs:file w_file_perms; 14 allow ueventd sysfs_usb:file w_file_perms; 15 allow ueventd sysfs_hwrandom:file w_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; 6 allow ueventd kmsg_device:chr_file rw_file_perms; 8 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 9 allow ueventd device:file create_file_perms; 11 r_dir_file(ueventd, rootfs) 13 # ueventd needs write access to files in /sys to regenerate uevents 14 allow ueventd sysfs_type:file w_file_perms; 15 r_dir_file(ueventd, sysfs_type) 16 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; 6 allow ueventd kmsg_device:chr_file rw_file_perms; 8 allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner }; 9 allow ueventd device:file create_file_perms; 11 r_dir_file(ueventd, rootfs) 13 # ueventd needs write access to files in /sys to regenerate uevents 14 allow ueventd sysfs_type:file w_file_perms; 15 r_dir_file(ueventd, sysfs_type) 16 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
/system/core/init/ |
D | README.ueventd.md | 1 # Ueventd chapter 3 Ueventd manages `/dev`, sets permissions for `/sys`, and handles firmware uevents. It has default 7 Ueventd has one generic customization parameter, the size of rcvbuf_size for the ueventd socket. It 18 Ueventd listens to the kernel uevent sockets and creates/deletes nodes in `/dev` based on the 32 The permissions can be modified using a ueventd.rc script and a line that beings with `/dev`. These 42 The path can be modified using a ueventd.rc script and a `subsystem` section. There are three to set 69 Ueventd by default takes no action for `/sys`, however it can be instructed to set permissions for 70 certain files in `/sys` when matching uevents are generated. This is done using a ueventd.rc script 85 Ueventd by default serves firmware requests by searching through a list of firmware directories 89 The list of firmware directories is customized by a `firmware_directories` line in a ueventd.rc [all …]
|
D | ueventd.cpp | 17 #include "ueventd.h" 50 // At a high level, ueventd listens for uevent messages generated by the kernel through a netlink 51 // socket. When ueventd receives such a message it handles it by taking appropriate actions, 54 // Ueventd also handles loading of firmware that the kernel requests, and creates symlinks for block 57 // When ueventd starts, it regenerates uevents for all currently registered devices by traversing 60 // ueventd would not have been running when these devices were registered and therefore was unable 64 // 'init' currently waits synchronously on the cold boot process of ueventd before it continues 66 // a speed up here is to parallelize the handling of ueventd messages, which consume the bulk of the 87 // 1) ueventd regenerates uevents by doing the /sys traversal and listens to the netlink socket for 90 // 2) ueventd forks 'n' separate uevent handler subprocesses and has each of them to handle the [all …]
|
/system/sepolicy/private/ |
D | ueventd.te | 1 typeattribute ueventd coredomain; 3 tmpfs_domain(ueventd) 5 # ueventd can set properties, particularly it sets ro.cold_boot_done to signal 7 set_prop(ueventd, cold_boot_done_prop)
|
D | crash_dump.te | 16 -ueventd 42 ueventd
|
D | coredomain.te | 31 -ueventd 130 -ueventd 139 -ueventd
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | domain_deprecated.te | 43 -ueventd 54 -ueventd 66 -ueventd 217 -ueventd 230 -ueventd 243 -ueventd 296 -ueventd 308 -ueventd
|
D | ueventd.te | 1 typeattribute ueventd coredomain; 2 typeattribute ueventd domain_deprecated; 4 tmpfs_domain(ueventd)
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | ueventd.te | 1 typeattribute ueventd coredomain; 2 typeattribute ueventd domain_deprecated; 4 tmpfs_domain(ueventd)
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | ueventd.te | 1 typeattribute ueventd coredomain; 3 tmpfs_domain(ueventd)
|
D | domain.te | 42 -ueventd 51 -ueventd
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | ueventd.te | 1 typeattribute ueventd coredomain; 3 tmpfs_domain(ueventd)
|
D | crash_dump.te | 16 -ueventd 42 ueventd
|
D | coredomain.te | 12 -ueventd 111 -ueventd 120 -ueventd
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | ueventd.te | 1 typeattribute ueventd coredomain; 3 tmpfs_domain(ueventd)
|
D | crash_dump.te | 16 -ueventd 42 ueventd
|
D | coredomain.te | 12 -ueventd 103 -ueventd 112 -ueventd
|
/system/core/rootdir/ |
D | Android.bp | 23 name: "ueventd.rc", 24 src: "ueventd.rc",
|
12345