Home
last modified time | relevance | path

Searched refs:gsid (Results 1 – 25 of 42) sorted by relevance

12

/system/sepolicy/private/
Dgsid.te1 # gsid - Manager for GSI Installation
3 type gsid, domain;
5 typeattribute gsid coredomain;
7 init_daemon_domain(gsid)
9 binder_use(gsid)
10 binder_service(gsid)
11 add_service(gsid, gsi_service)
12 set_prop(gsid, gsid_prop)
15 allow gsid dm_device:chr_file rw_file_perms;
16 allow gsid dm_device:blk_file rw_file_perms;
[all …]
Dupdate_engine.te5 # Allow to talk to gsid.
7 binder_call(update_engine, gsid)
9 # Allow to start gsid service.
Dsnapshotctl.te7 # Allow to start gsid service.
10 # Allow to talk to gsid.
13 binder_call(snapshotctl, gsid)
Dshell.te117 # Allow shell to start/stop gsid via ctl.start|stop|restart gsid.
Ddumpstate.te71 binder_call(dumpstate, gsid)
/system/sepolicy/prebuilts/api/30.0/private/
Dgsid.te1 # gsid - Manager for GSI Installation
3 type gsid, domain;
5 typeattribute gsid coredomain;
7 init_daemon_domain(gsid)
9 binder_use(gsid)
10 binder_service(gsid)
11 add_service(gsid, gsi_service)
12 set_prop(gsid, gsid_prop)
15 allow gsid dm_device:chr_file rw_file_perms;
16 allow gsid dm_device:blk_file rw_file_perms;
[all …]
Dupdate_engine.te5 # Allow to talk to gsid.
7 binder_call(update_engine, gsid)
Dsnapshotctl.te7 # Allow to start gsid service.
10 # Allow to talk to gsid.
13 binder_call(snapshotctl, gsid)
Dproperty_contexts149 # Restrict access to starting/stopping gsid.
150 ctl.start$gsid u:object_r:ctl_gsid_prop:s0
151 ctl.stop$gsid u:object_r:ctl_gsid_prop:s0
152 ctl.restart$gsid u:object_r:ctl_gsid_prop:s0
222 gsid. u:object_r:gsid_prop:s0
223 ro.gsid. u:object_r:gsid_prop:s0
Ddumpstate.te60 binder_call(dumpstate, gsid)
/system/sepolicy/prebuilts/api/29.0/private/
Dgsid.te1 # gsid - Manager for GSI Installation
3 type gsid, domain;
5 typeattribute gsid coredomain;
7 init_daemon_domain(gsid)
9 binder_use(gsid)
10 binder_service(gsid)
11 add_service(gsid, gsi_service)
12 set_prop(gsid, gsid_prop)
15 allow gsid dm_device:chr_file rw_file_perms;
16 allow gsid dm_device:blk_file rw_file_perms;
[all …]
Dproperty_contexts133 # Restrict access to starting/stopping gsid.
134 ctl.start$gsid u:object_r:ctl_gsid_prop:s0
135 ctl.stop$gsid u:object_r:ctl_gsid_prop:s0
136 ctl.restart$gsid u:object_r:ctl_gsid_prop:s0
196 gsid. u:object_r:gsid_prop:s0
197 ro.gsid. u:object_r:gsid_prop:s0
/system/gsid/
Dgsi_tool.cpp50 static int Disable(sp<IGsiService> gsid, int argc, char** argv);
51 static int Enable(sp<IGsiService> gsid, int argc, char** argv);
52 static int Install(sp<IGsiService> gsid, int argc, char** argv);
53 static int Wipe(sp<IGsiService> gsid, int argc, char** argv);
54 static int WipeData(sp<IGsiService> gsid, int argc, char** argv);
55 static int Status(sp<IGsiService> gsid, int argc, char** argv);
56 static int Cancel(sp<IGsiService> gsid, int argc, char** argv);
80 explicit ProgressBar(sp<IGsiService> gsid) : gsid_(gsid) {} in ProgressBar() argument
192 static int Install(sp<IGsiService> gsid, int argc, char** argv) { in Install() argument
251 gsid->isGsiRunning(&running_gsi); in Install()
[all …]
Dgsid.rc1 service gsid /system/bin/gsid
21 exec_background - root root -- /system/bin/gsid run-startup-tasks
DAndroid.bp72 name: "gsid",
82 "gsid.rc",
/system/core/fs_mgr/libfiemap/
DREADME.md5 storage in read-write partitions. It exists primary for gsid. Generally, the
10 - Creating images that will act as block devices. For example, gsid needs to
69 an image, we create a property called `gsid.mapped_image.<name>` and set it to
/system/sepolicy/prebuilts/api/30.0/private/compat/28.0/
D28.0.ignore.cil65 gsid
/system/sepolicy/private/compat/28.0/
D28.0.ignore.cil65 gsid
/system/sepolicy/prebuilts/api/29.0/private/compat/28.0/
D28.0.ignore.cil63 gsid
/system/core/fs_mgr/
DAndroid.bp111 // gsid.
/system/sepolicy/public/
Dfastbootd.te103 # Allow using libfiemap/gsid directly (no binder in recovery).
/system/sepolicy/prebuilts/api/30.0/public/
Dupdate_engine.te66 # Allow to start gsid service.
Dshell.te84 # Allow shell to start/stop gsid via ctl.start|stop|restart gsid.
/system/sepolicy/prebuilts/api/29.0/public/
Dshell.te81 # Allow shell to start/stop gsid via ctl.start|stop|restart gsid.
Ddevice.te110 # separate device node. gsid, however, accesses the original devide node

12