Home
last modified time | relevance | path

Searched full:ueventd (Results 1 – 25 of 579) sorted by relevance

12345678910>>...24

/aosp_15_r20/system/sepolicy/private/
H A Dueventd.te1 typeattribute ueventd coredomain;
3 tmpfs_domain(ueventd)
5 # ueventd can set properties, particularly it sets ro.cold_boot_done to signal
7 set_prop(ueventd, cold_boot_done_prop)
10 allow ueventd kmsg_device:chr_file rw_file_perms;
12 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
13 allow ueventd device:file create_file_perms;
15 r_dir_file(ueventd, rootfs)
17 # ueventd needs write access to files in /sys to regenerate uevents
18 allow ueventd sysfs_type:file w_file_perms;
[all …]
H A Ddomain.te382 -ueventd
572 -ueventd
620 -ueventd
659 -ueventd # To create the /dev/hw_random file
665 -ueventd
680 -ueventd
686 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write };
841 -ueventd # Further restricted in ueventd.te
921 -ueventd # uevent is granted create for this device, but we still neverallow I/O below
925 neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
[all …]
/aosp_15_r20/system/sepolicy/prebuilts/api/202404/public/
H A Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain; type
7 allow ueventd kmsg_device:chr_file rw_file_perms;
9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
10 allow ueventd device:file create_file_perms;
12 r_dir_file(ueventd, rootfs)
14 # ueventd needs write access to files in /sys to regenerate uevents
15 allow ueventd sysfs_type:file w_file_perms;
16 r_dir_file(ueventd, sysfs_type)
17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
H A Ddomain.te376 -ueventd
415 -ueventd # To create the /dev/hw_random file
421 -ueventd
436 -ueventd
442 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write };
596 -ueventd # Further restricted in ueventd.te
675 -ueventd # uevent is granted create for this device, but we still neverallow I/O below
679 neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
752 -ueventd
903 -ueventd
[all …]
/aosp_15_r20/system/sepolicy/prebuilts/api/34.0/public/
H A Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain; type
7 allow ueventd kmsg_device:chr_file rw_file_perms;
9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
10 allow ueventd device:file create_file_perms;
12 r_dir_file(ueventd, rootfs)
14 # ueventd needs write access to files in /sys to regenerate uevents
15 allow ueventd sysfs_type:file w_file_perms;
16 r_dir_file(ueventd, sysfs_type)
17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
/aosp_15_r20/system/sepolicy/prebuilts/api/32.0/public/
H A Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain; type
7 allow ueventd kmsg_device:chr_file rw_file_perms;
9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
10 allow ueventd device:file create_file_perms;
12 r_dir_file(ueventd, rootfs)
14 # ueventd needs write access to files in /sys to regenerate uevents
15 allow ueventd sysfs_type:file w_file_perms;
16 r_dir_file(ueventd, sysfs_type)
17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
H A Ddomain.te381 -ueventd
419 -ueventd # To create the /dev/hw_random file
425 -ueventd
440 -ueventd
446 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write };
587 -ueventd # Further restricted in ueventd.te
629 -ueventd
700 -ueventd # uevent is granted create for this device, but we still neverallow I/O below
704 neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
777 -ueventd
[all …]
/aosp_15_r20/system/sepolicy/prebuilts/api/31.0/public/
H A Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain; type
7 allow ueventd kmsg_device:chr_file rw_file_perms;
9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
10 allow ueventd device:file create_file_perms;
12 r_dir_file(ueventd, rootfs)
14 # ueventd needs write access to files in /sys to regenerate uevents
15 allow ueventd sysfs_type:file w_file_perms;
16 r_dir_file(ueventd, sysfs_type)
17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
H A Ddomain.te381 -ueventd
419 -ueventd # To create the /dev/hw_random file
425 -ueventd
440 -ueventd
446 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write };
587 -ueventd # Further restricted in ueventd.te
629 -ueventd
700 -ueventd # uevent is granted create for this device, but we still neverallow I/O below
704 neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
777 -ueventd
[all …]
/aosp_15_r20/system/sepolicy/prebuilts/api/30.0/public/
H A Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain; type
7 allow ueventd kmsg_device:chr_file rw_file_perms;
9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
10 allow ueventd device:file create_file_perms;
12 r_dir_file(ueventd, rootfs)
14 # ueventd needs write access to files in /sys to regenerate uevents
15 allow ueventd sysfs_type:file w_file_perms;
16 r_dir_file(ueventd, sysfs_type)
17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
H A Ddomain.te354 -ueventd
388 # Only init, ueventd, shell and system_server should be able to access HW RNG
394 -ueventd
400 -ueventd
415 -ueventd
421 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write };
575 -ueventd # Further restricted in ueventd.te
617 -ueventd
681 -ueventd # uevent is granted create for this device, but we still neverallow I/O below
685 neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
[all …]
/aosp_15_r20/system/sepolicy/prebuilts/api/33.0/public/
H A Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain; type
7 allow ueventd kmsg_device:chr_file rw_file_perms;
9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
10 allow ueventd device:file create_file_perms;
12 r_dir_file(ueventd, rootfs)
14 # ueventd needs write access to files in /sys to regenerate uevents
15 allow ueventd sysfs_type:file w_file_perms;
16 r_dir_file(ueventd, sysfs_type)
17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
/aosp_15_r20/system/sepolicy/prebuilts/api/29.0/public/
H A Dueventd.te1 # ueventd seclabel is specified in init.rc since
3 type ueventd, domain; type
7 allow ueventd kmsg_device:chr_file rw_file_perms;
9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
10 allow ueventd device:file create_file_perms;
12 r_dir_file(ueventd, rootfs)
14 # ueventd needs write access to files in /sys to regenerate uevents
15 allow ueventd sysfs_type:file w_file_perms;
16 r_dir_file(ueventd, sysfs_type)
17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
H A Ddomain.te354 -ueventd
388 # Only init, ueventd, shell and system_server should be able to access HW RNG
394 -ueventd
400 -ueventd
415 -ueventd
421 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write };
573 -ueventd # Further restricted in ueventd.te
615 -ueventd
692 -ueventd # uevent is granted create for this device, but we still neverallow I/O below
696 neverallow ueventd vndbinder_device:chr_file { read write append ioctl };
[all …]
/aosp_15_r20/system/sepolicy/microdroid/system/private/
H A Dueventd.te1 typeattribute ueventd coredomain;
3 tmpfs_domain(ueventd)
6 allow ueventd kmsg_device:chr_file rw_file_perms;
8 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_…
9 allow ueventd device:file create_file_perms;
11 r_dir_file(ueventd, rootfs)
13 # ueventd needs write access to files in /sys to regenerate uevents
14 allow ueventd sysfs_type:file w_file_perms;
15 r_dir_file(ueventd, sysfs_type)
16 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr };
[all …]
/aosp_15_r20/system/core/init/
H A DREADME.ueventd.md1 # Ueventd chapter
3 Ueventd manages `/dev`, sets permissions for `/sys`, and handles firmware uevents. It has default
7 Ueventd has one generic customization parameter, the size of rcvbuf_size for the ueventd socket. It
18 Ueventd reads /system/etc/ueventd.rc, all other files are imported via the `import` command, which
22 This command parses an ueventd config file, extending the current configuration. If _path_ is a
28 Ueventd listens to the kernel uevent sockets and creates/deletes nodes in `/dev` based on the
69 The permissions can be modified using a ueventd.rc script and a line that beings with `/dev`. These
79 The path can be modified using a ueventd.rc script and a `subsystem` and/or `driver` section.
111 Ueventd by default takes no action for `/sys`, however it can be instructed to set permissions for
112 certain files in `/sys` when matching uevents are generated. This is done using a ueventd.rc script
[all …]
H A Dueventd.cpp17 #include "ueventd.h"
51 // At a high level, ueventd listens for uevent messages generated by the kernel through a netlink
52 // socket. When ueventd receives such a message it handles it by taking appropriate actions,
55 // Ueventd also handles loading of firmware that the kernel requests, and creates symlinks for block
58 // When ueventd starts, it regenerates uevents for all currently registered devices by traversing
61 // ueventd would not have been running when these devices were registered and therefore was unable
65 // 'init' currently waits synchronously on the cold boot process of ueventd before it continues
67 // a speed up here is to parallelize the handling of ueventd messages, which consume the bulk of the
88 // 1) ueventd regenerates uevents by doing the /sys traversal and listens to the netlink socket for
91 // 2) ueventd forks 'n' separate uevent handler subprocesses and has each of them to handle the
[all …]
/aosp_15_r20/device/google/cuttlefish/shared/sepolicy/vendor/
Dueventd.te1 allow ueventd metadata_file:dir search;
3 allow ueventd keymaster_device:chr_file { rw_file_perms create setattr };
4 allow ueventd gatekeeper_device:chr_file { rw_file_perms create setattr };
5 allow ueventd confirmationui_device:chr_file { rw_file_perms create setattr };
6 allow ueventd metrics_helper_device:chr_file { rw_file_perms create setattr };
7 allow ueventd oemlock_device:chr_file { rw_file_perms create setattr };
8 allow ueventd keymint_device:chr_file { rw_file_perms create setattr };
9 allow ueventd sensors_device:chr_file { rw_file_perms create setattr };
10 allow ueventd mcu_control_device:chr_file { rw_file_perms create setattr };
11 allow ueventd mcu_uart_device:chr_file { rw_file_perms create setattr };
/aosp_15_r20/out/soong/.intermediates/packages/modules/Virtualization/build/microdroid/microdroid_init_rc/android_arm64_armv8-2a_cortex-a55/
Dinit.rc23 start ueventd
33 # Wait for ueventd to have finished cold boot.
61 # Stop ueventd to save memory
62 stop ueventd
156 service ueventd /system/bin/ueventd
161 seclabel u:r:ueventd:s0
/aosp_15_r20/packages/modules/Virtualization/build/microdroid/
Dinit.rc23 start ueventd
33 # Wait for ueventd to have finished cold boot.
61 # Stop ueventd to save memory
62 stop ueventd
156 service ueventd /system/bin/ueventd
161 seclabel u:r:ueventd:s0
/aosp_15_r20/out/soong/.intermediates/packages/modules/Virtualization/build/microdroid/microdroid/android_common/root/system/etc/init/hw/
Dinit.rc23 start ueventd
33 # Wait for ueventd to have finished cold boot.
61 # Stop ueventd to save memory
62 stop ueventd
156 service ueventd /system/bin/ueventd
161 seclabel u:r:ueventd:s0
/aosp_15_r20/system/sepolicy/prebuilts/api/33.0/private/
H A Ddomain.te26 -ueventd
46 -ueventd
134 -ueventd
386 ueventd
440 -ueventd
486 -ueventd
530 -ueventd # reads /vendor/ueventd.rc
603 neverallow { domain -ueventd -vendor_init } sysfs_devices_cs_etm:file no_w_file_perms;
/aosp_15_r20/out/soong/.intermediates/system/sepolicy/microdroid/microdroid_plat_sepolicy.conf/android_common/
Dmicrodroid_plat_sepolicy.conf5134 #line 1 "system/sepolicy/microdroid/system/public/ueventd.te"
5135 # ueventd seclabel is specified in init.rc since
5137 type ueventd, domain;
5932 -ueventd
6449 -ueventd
6487 -ueventd # To create the /dev/hw_random file
6496 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write };
6707 # ueventd needs write access to all sysfs files.
6708 neverallow { domain -init -vendor_init -ueventd } sysfs_pgsize_migration:file { append create link …
6852 allow init ueventd:process transition;
[all …]
/aosp_15_r20/out/soong/.intermediates/system/sepolicy/microdroid/microdroid_plat_sepolicy.cil/android_common/
Dplat_sepolicy.cil643 (typeattributeset domain (adbd apexd crash_dump init kernel shell statsd su toolbox ueventd vendor_…
706 (typeattributeset coredomain (adbd apexd crash_dump init kernel shell statsd su toolbox ueventd apk…
1300 (type ueventd)
1301 (roletype object_r ueventd)
2432 (allow init ueventd (process (transition)))
2433 (allow ueventd init_exec (file (read getattr map execute open entrypoint)))
2434 (dontaudit init ueventd (process (noatsecure)))
2435 (allow init ueventd (process (siginh rlimitinh)))
3533 (typetransition ueventd tmpfs file ueventd_tmpfs)
3534 (allow ueventd ueventd_tmpfs (file (read write getattr map)))
[all …]
/aosp_15_r20/external/cpuinfo/test/dmesg/
H A Dgalaxy-j7-prime.log329 [ 2.831258] [3: init: 1] [c3] init: Starting service 'ueventd'...
331 [ 2.835687] [7: ueventd: 1477] [c7] ueventd: ueventd started!
332 [ 2.836617] [7: ueventd: 1477] [c7] ueventd: Function: selinux_compare_spd_ram, index[3]…
333 [ 2.901102] [7: ueventd: 1477] [c7] ueventd: SELinux: Loaded file_contexts contexts from…
334 [ 2.904050] [7: ueventd: 1477] [c7] ueventd: Function: selinux_compare_spd_ram, index[3]…
335 [ 2.968666] [7: ueventd: 1477] [c7] ueventd: SELinux: Loaded file_contexts contexts from…
336 [ 3.022079] [0: ueventd: 1477] [c0] s2mu005-fuelgauge 7-003b: s2mu005_get_vbat: data0 (2…
337 [ 3.022098] [0: ueventd: 1477] [c0] s2mu005-fuelgauge 7-003b: s2mu005_get_vbat: vbat (38…
338 [ 3.023639] [0: ueventd: 1477] [c0] s2mu005-fuelgauge 7-003b: s2mu005_get_current: rCUR_…
339 [ 3.023653] [0: ueventd: 1477] [c0] s2mu005-fuelgauge 7-003b: s2mu005_get_current: curre…
[all …]

12345678910>>...24