Searched refs:gsid (Results 1 – 25 of 42) sorted by relevance
12
/system/sepolicy/private/ |
D | gsid.te | 1 # gsid - Manager for GSI Installation 3 type gsid, domain; 5 typeattribute gsid coredomain; 7 init_daemon_domain(gsid) 9 binder_use(gsid) 10 binder_service(gsid) 11 add_service(gsid, gsi_service) 12 set_prop(gsid, gsid_prop) 15 allow gsid dm_device:chr_file rw_file_perms; 16 allow gsid dm_device:blk_file rw_file_perms; [all …]
|
D | update_engine.te | 5 # Allow to talk to gsid. 7 binder_call(update_engine, gsid) 9 # Allow to start gsid service.
|
D | snapshotctl.te | 7 # Allow to start gsid service. 10 # Allow to talk to gsid. 13 binder_call(snapshotctl, gsid)
|
D | shell.te | 117 # Allow shell to start/stop gsid via ctl.start|stop|restart gsid.
|
D | dumpstate.te | 71 binder_call(dumpstate, gsid)
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | gsid.te | 1 # gsid - Manager for GSI Installation 3 type gsid, domain; 5 typeattribute gsid coredomain; 7 init_daemon_domain(gsid) 9 binder_use(gsid) 10 binder_service(gsid) 11 add_service(gsid, gsi_service) 12 set_prop(gsid, gsid_prop) 15 allow gsid dm_device:chr_file rw_file_perms; 16 allow gsid dm_device:blk_file rw_file_perms; [all …]
|
D | update_engine.te | 5 # Allow to talk to gsid. 7 binder_call(update_engine, gsid)
|
D | snapshotctl.te | 7 # Allow to start gsid service. 10 # Allow to talk to gsid. 13 binder_call(snapshotctl, gsid)
|
D | property_contexts | 149 # Restrict access to starting/stopping gsid. 150 ctl.start$gsid u:object_r:ctl_gsid_prop:s0 151 ctl.stop$gsid u:object_r:ctl_gsid_prop:s0 152 ctl.restart$gsid u:object_r:ctl_gsid_prop:s0 222 gsid. u:object_r:gsid_prop:s0 223 ro.gsid. u:object_r:gsid_prop:s0
|
D | dumpstate.te | 60 binder_call(dumpstate, gsid)
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | gsid.te | 1 # gsid - Manager for GSI Installation 3 type gsid, domain; 5 typeattribute gsid coredomain; 7 init_daemon_domain(gsid) 9 binder_use(gsid) 10 binder_service(gsid) 11 add_service(gsid, gsi_service) 12 set_prop(gsid, gsid_prop) 15 allow gsid dm_device:chr_file rw_file_perms; 16 allow gsid dm_device:blk_file rw_file_perms; [all …]
|
D | property_contexts | 133 # Restrict access to starting/stopping gsid. 134 ctl.start$gsid u:object_r:ctl_gsid_prop:s0 135 ctl.stop$gsid u:object_r:ctl_gsid_prop:s0 136 ctl.restart$gsid u:object_r:ctl_gsid_prop:s0 196 gsid. u:object_r:gsid_prop:s0 197 ro.gsid. u:object_r:gsid_prop:s0
|
/system/gsid/ |
D | gsi_tool.cpp | 50 static int Disable(sp<IGsiService> gsid, int argc, char** argv); 51 static int Enable(sp<IGsiService> gsid, int argc, char** argv); 52 static int Install(sp<IGsiService> gsid, int argc, char** argv); 53 static int Wipe(sp<IGsiService> gsid, int argc, char** argv); 54 static int WipeData(sp<IGsiService> gsid, int argc, char** argv); 55 static int Status(sp<IGsiService> gsid, int argc, char** argv); 56 static int Cancel(sp<IGsiService> gsid, int argc, char** argv); 80 explicit ProgressBar(sp<IGsiService> gsid) : gsid_(gsid) {} in ProgressBar() argument 192 static int Install(sp<IGsiService> gsid, int argc, char** argv) { in Install() argument 251 gsid->isGsiRunning(&running_gsi); in Install() [all …]
|
D | gsid.rc | 1 service gsid /system/bin/gsid 21 exec_background - root root -- /system/bin/gsid run-startup-tasks
|
D | Android.bp | 72 name: "gsid", 82 "gsid.rc",
|
/system/core/fs_mgr/libfiemap/ |
D | README.md | 5 storage in read-write partitions. It exists primary for gsid. Generally, the 10 - Creating images that will act as block devices. For example, gsid needs to 69 an image, we create a property called `gsid.mapped_image.<name>` and set it to
|
/system/sepolicy/prebuilts/api/30.0/private/compat/28.0/ |
D | 28.0.ignore.cil | 65 gsid
|
/system/sepolicy/private/compat/28.0/ |
D | 28.0.ignore.cil | 65 gsid
|
/system/sepolicy/prebuilts/api/29.0/private/compat/28.0/ |
D | 28.0.ignore.cil | 63 gsid
|
/system/core/fs_mgr/ |
D | Android.bp | 111 // gsid.
|
/system/sepolicy/public/ |
D | fastbootd.te | 103 # Allow using libfiemap/gsid directly (no binder in recovery).
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | update_engine.te | 66 # Allow to start gsid service.
|
D | shell.te | 84 # Allow shell to start/stop gsid via ctl.start|stop|restart gsid.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | shell.te | 81 # Allow shell to start/stop gsid via ctl.start|stop|restart gsid.
|
D | device.te | 110 # separate device node. gsid, however, accesses the original devide node
|
12