Home
last modified time | relevance | path

Searched full:ueventd (Results 1 – 25 of 107) sorted by relevance

12345

/system/sepolicy/prebuilts/api/30.0/public/
Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain;
7 allow ueventd kmsg_device:chr_file rw_file_perms;
9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
10 allow ueventd device:file create_file_perms;
12 r_dir_file(ueventd, rootfs)
14 # ueventd needs write access to files in /sys to regenerate uevents
15 allow ueventd sysfs_type:file w_file_perms;
16 r_dir_file(ueventd, sysfs_type)
17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
Ddomain.te354 -ueventd
388 # Only init, ueventd, shell and system_server should be able to access HW RNG
394 -ueventd
400 -ueventd
415 -ueventd
421 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write };
575 -ueventd # Further restricted in ueventd.te
617 -ueventd
681 -ueventd # uevent is granted create for this device, but we still neverallow I/O below
685 neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain;
7 allow ueventd kmsg_device:chr_file rw_file_perms;
9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
10 allow ueventd device:file create_file_perms;
12 r_dir_file(ueventd, rootfs)
14 # ueventd needs write access to files in /sys to regenerate uevents
15 allow ueventd sysfs_type:file w_file_perms;
16 r_dir_file(ueventd, sysfs_type)
17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
/system/sepolicy/public/
Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain;
7 allow ueventd kmsg_device:chr_file rw_file_perms;
9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
10 allow ueventd device:file create_file_perms;
12 r_dir_file(ueventd, rootfs)
14 # ueventd needs write access to files in /sys to regenerate uevents
15 allow ueventd sysfs_type:file w_file_perms;
16 r_dir_file(ueventd, sysfs_type)
17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
Ddomain.te367 -ueventd
401 # Only init, ueventd, shell and system_server should be able to access HW RNG
407 -ueventd
413 -ueventd
428 -ueventd
434 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write };
582 -ueventd # Further restricted in ueventd.te
624 -ueventd
688 -ueventd # uevent is granted create for this device, but we still neverallow I/O below
692 neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
[all …]
/system/sepolicy/prebuilts/api/26.0/public/
Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain;
6 allow ueventd kmsg_device:chr_file rw_file_perms;
8 allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner };
9 allow ueventd device:file create_file_perms;
11 r_dir_file(ueventd, sysfs_type)
12 r_dir_file(ueventd, rootfs)
13 allow ueventd sysfs:file w_file_perms;
14 allow ueventd sysfs_usb:file w_file_perms;
15 allow ueventd sysfs_hwrandom:file w_file_perms;
[all …]
/system/sepolicy/prebuilts/api/28.0/public/
Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain;
6 allow ueventd kmsg_device:chr_file rw_file_perms;
8 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
9 allow ueventd device:file create_file_perms;
11 r_dir_file(ueventd, rootfs)
13 # ueventd needs write access to files in /sys to regenerate uevents
14 allow ueventd sysfs_type:file w_file_perms;
15 r_dir_file(ueventd, sysfs_type)
16 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
/system/sepolicy/prebuilts/api/27.0/public/
Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain;
6 allow ueventd kmsg_device:chr_file rw_file_perms;
8 allow ueventd self:capability { chown mknod net_admin setgid fsetid sys_rawio dac_override fowner };
9 allow ueventd device:file create_file_perms;
11 r_dir_file(ueventd, rootfs)
13 # ueventd needs write access to files in /sys to regenerate uevents
14 allow ueventd sysfs_type:file w_file_perms;
15 r_dir_file(ueventd, sysfs_type)
16 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
/system/core/init/
DREADME.ueventd.md1 # Ueventd chapter
3 Ueventd manages `/dev`, sets permissions for `/sys`, and handles firmware uevents. It has default
7 Ueventd has one generic customization parameter, the size of rcvbuf_size for the ueventd socket. It
18 Ueventd listens to the kernel uevent sockets and creates/deletes nodes in `/dev` based on the
32 The permissions can be modified using a ueventd.rc script and a line that beings with `/dev`. These
42 The path can be modified using a ueventd.rc script and a `subsystem` section. There are three to set
69 Ueventd by default takes no action for `/sys`, however it can be instructed to set permissions for
70 certain files in `/sys` when matching uevents are generated. This is done using a ueventd.rc script
85 Ueventd by default serves firmware requests by searching through a list of firmware directories
89 The list of firmware directories is customized by a `firmware_directories` line in a ueventd.rc
[all …]
Dueventd.cpp17 #include "ueventd.h"
50 // At a high level, ueventd listens for uevent messages generated by the kernel through a netlink
51 // socket. When ueventd receives such a message it handles it by taking appropriate actions,
54 // Ueventd also handles loading of firmware that the kernel requests, and creates symlinks for block
57 // When ueventd starts, it regenerates uevents for all currently registered devices by traversing
60 // ueventd would not have been running when these devices were registered and therefore was unable
64 // 'init' currently waits synchronously on the cold boot process of ueventd before it continues
66 // a speed up here is to parallelize the handling of ueventd messages, which consume the bulk of the
87 // 1) ueventd regenerates uevents by doing the /sys traversal and listens to the netlink socket for
90 // 2) ueventd forks 'n' separate uevent handler subprocesses and has each of them to handle the
[all …]
/system/sepolicy/private/
Dueventd.te1 typeattribute ueventd coredomain;
3 tmpfs_domain(ueventd)
5 # ueventd can set properties, particularly it sets ro.cold_boot_done to signal
7 set_prop(ueventd, cold_boot_done_prop)
Dcrash_dump.te16 -ueventd
42 ueventd
Dcoredomain.te31 -ueventd
130 -ueventd
139 -ueventd
/system/sepolicy/prebuilts/api/26.0/private/
Ddomain_deprecated.te43 -ueventd
54 -ueventd
66 -ueventd
217 -ueventd
230 -ueventd
243 -ueventd
296 -ueventd
308 -ueventd
Dueventd.te1 typeattribute ueventd coredomain;
2 typeattribute ueventd domain_deprecated;
4 tmpfs_domain(ueventd)
/system/sepolicy/prebuilts/api/27.0/private/
Dueventd.te1 typeattribute ueventd coredomain;
2 typeattribute ueventd domain_deprecated;
4 tmpfs_domain(ueventd)
/system/sepolicy/prebuilts/api/28.0/private/
Dueventd.te1 typeattribute ueventd coredomain;
3 tmpfs_domain(ueventd)
Ddomain.te42 -ueventd
51 -ueventd
/system/sepolicy/prebuilts/api/30.0/private/
Dueventd.te1 typeattribute ueventd coredomain;
3 tmpfs_domain(ueventd)
Dcrash_dump.te16 -ueventd
42 ueventd
Dcoredomain.te12 -ueventd
111 -ueventd
120 -ueventd
/system/sepolicy/prebuilts/api/29.0/private/
Dueventd.te1 typeattribute ueventd coredomain;
3 tmpfs_domain(ueventd)
Dcrash_dump.te16 -ueventd
42 ueventd
Dcoredomain.te12 -ueventd
103 -ueventd
112 -ueventd
/system/core/rootdir/
DAndroid.bp23 name: "ueventd.rc",
24 src: "ueventd.rc",

12345