/aosp_15_r20/system/sepolicy/private/ |
H A D | ueventd.te | 1 typeattribute ueventd coredomain; 3 tmpfs_domain(ueventd) 5 # ueventd can set properties, particularly it sets ro.cold_boot_done to signal 7 set_prop(ueventd, cold_boot_done_prop) 10 allow ueventd kmsg_device:chr_file rw_file_perms; 12 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 13 allow ueventd device:file create_file_perms; 15 r_dir_file(ueventd, rootfs) 17 # ueventd needs write access to files in /sys to regenerate uevents 18 allow ueventd sysfs_type:file w_file_perms; [all …]
|
H A D | domain.te | 382 -ueventd 572 -ueventd 620 -ueventd 659 -ueventd # To create the /dev/hw_random file 665 -ueventd 680 -ueventd 686 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write }; 841 -ueventd # Further restricted in ueventd.te 921 -ueventd # uevent is granted create for this device, but we still neverallow I/O below 925 neverallow ueventd vndbinder_device:chr_file { read write append ioctl }; [all …]
|
/aosp_15_r20/system/sepolicy/prebuilts/api/202404/public/ |
H A D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; type 7 allow ueventd kmsg_device:chr_file rw_file_perms; 9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 10 allow ueventd device:file create_file_perms; 12 r_dir_file(ueventd, rootfs) 14 # ueventd needs write access to files in /sys to regenerate uevents 15 allow ueventd sysfs_type:file w_file_perms; 16 r_dir_file(ueventd, sysfs_type) 17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
H A D | domain.te | 376 -ueventd 415 -ueventd # To create the /dev/hw_random file 421 -ueventd 436 -ueventd 442 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write }; 596 -ueventd # Further restricted in ueventd.te 675 -ueventd # uevent is granted create for this device, but we still neverallow I/O below 679 neverallow ueventd vndbinder_device:chr_file { read write append ioctl }; 752 -ueventd 903 -ueventd [all …]
|
/aosp_15_r20/system/sepolicy/prebuilts/api/34.0/public/ |
H A D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; type 7 allow ueventd kmsg_device:chr_file rw_file_perms; 9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 10 allow ueventd device:file create_file_perms; 12 r_dir_file(ueventd, rootfs) 14 # ueventd needs write access to files in /sys to regenerate uevents 15 allow ueventd sysfs_type:file w_file_perms; 16 r_dir_file(ueventd, sysfs_type) 17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
/aosp_15_r20/system/sepolicy/prebuilts/api/32.0/public/ |
H A D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; type 7 allow ueventd kmsg_device:chr_file rw_file_perms; 9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 10 allow ueventd device:file create_file_perms; 12 r_dir_file(ueventd, rootfs) 14 # ueventd needs write access to files in /sys to regenerate uevents 15 allow ueventd sysfs_type:file w_file_perms; 16 r_dir_file(ueventd, sysfs_type) 17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
H A D | domain.te | 381 -ueventd 419 -ueventd # To create the /dev/hw_random file 425 -ueventd 440 -ueventd 446 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write }; 587 -ueventd # Further restricted in ueventd.te 629 -ueventd 700 -ueventd # uevent is granted create for this device, but we still neverallow I/O below 704 neverallow ueventd vndbinder_device:chr_file { read write append ioctl }; 777 -ueventd [all …]
|
/aosp_15_r20/system/sepolicy/prebuilts/api/31.0/public/ |
H A D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; type 7 allow ueventd kmsg_device:chr_file rw_file_perms; 9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 10 allow ueventd device:file create_file_perms; 12 r_dir_file(ueventd, rootfs) 14 # ueventd needs write access to files in /sys to regenerate uevents 15 allow ueventd sysfs_type:file w_file_perms; 16 r_dir_file(ueventd, sysfs_type) 17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
H A D | domain.te | 381 -ueventd 419 -ueventd # To create the /dev/hw_random file 425 -ueventd 440 -ueventd 446 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write }; 587 -ueventd # Further restricted in ueventd.te 629 -ueventd 700 -ueventd # uevent is granted create for this device, but we still neverallow I/O below 704 neverallow ueventd vndbinder_device:chr_file { read write append ioctl }; 777 -ueventd [all …]
|
/aosp_15_r20/system/sepolicy/prebuilts/api/30.0/public/ |
H A D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; type 7 allow ueventd kmsg_device:chr_file rw_file_perms; 9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 10 allow ueventd device:file create_file_perms; 12 r_dir_file(ueventd, rootfs) 14 # ueventd needs write access to files in /sys to regenerate uevents 15 allow ueventd sysfs_type:file w_file_perms; 16 r_dir_file(ueventd, sysfs_type) 17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
H A D | domain.te | 354 -ueventd 388 # Only init, ueventd, shell and system_server should be able to access HW RNG 394 -ueventd 400 -ueventd 415 -ueventd 421 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write }; 575 -ueventd # Further restricted in ueventd.te 617 -ueventd 681 -ueventd # uevent is granted create for this device, but we still neverallow I/O below 685 neverallow ueventd vndbinder_device:chr_file { read write append ioctl }; [all …]
|
/aosp_15_r20/system/sepolicy/prebuilts/api/33.0/public/ |
H A D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; type 7 allow ueventd kmsg_device:chr_file rw_file_perms; 9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 10 allow ueventd device:file create_file_perms; 12 r_dir_file(ueventd, rootfs) 14 # ueventd needs write access to files in /sys to regenerate uevents 15 allow ueventd sysfs_type:file w_file_perms; 16 r_dir_file(ueventd, sysfs_type) 17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
/aosp_15_r20/system/sepolicy/prebuilts/api/29.0/public/ |
H A D | ueventd.te | 1 # ueventd seclabel is specified in init.rc since 3 type ueventd, domain; type 7 allow ueventd kmsg_device:chr_file rw_file_perms; 9 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 10 allow ueventd device:file create_file_perms; 12 r_dir_file(ueventd, rootfs) 14 # ueventd needs write access to files in /sys to regenerate uevents 15 allow ueventd sysfs_type:file w_file_perms; 16 r_dir_file(ueventd, sysfs_type) 17 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
H A D | domain.te | 354 -ueventd 388 # Only init, ueventd, shell and system_server should be able to access HW RNG 394 -ueventd 400 -ueventd 415 -ueventd 421 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write }; 573 -ueventd # Further restricted in ueventd.te 615 -ueventd 692 -ueventd # uevent is granted create for this device, but we still neverallow I/O below 696 neverallow ueventd vndbinder_device:chr_file { read write append ioctl }; [all …]
|
/aosp_15_r20/system/sepolicy/microdroid/system/private/ |
H A D | ueventd.te | 1 typeattribute ueventd coredomain; 3 tmpfs_domain(ueventd) 6 allow ueventd kmsg_device:chr_file rw_file_perms; 8 allow ueventd self:global_capability_class_set { chown mknod net_admin setgid fsetid sys_rawio dac_… 9 allow ueventd device:file create_file_perms; 11 r_dir_file(ueventd, rootfs) 13 # ueventd needs write access to files in /sys to regenerate uevents 14 allow ueventd sysfs_type:file w_file_perms; 15 r_dir_file(ueventd, sysfs_type) 16 allow ueventd sysfs_type:{ file lnk_file } { relabelfrom relabelto setattr }; [all …]
|
/aosp_15_r20/system/core/init/ |
H A D | README.ueventd.md | 1 # Ueventd chapter 3 Ueventd manages `/dev`, sets permissions for `/sys`, and handles firmware uevents. It has default 7 Ueventd has one generic customization parameter, the size of rcvbuf_size for the ueventd socket. It 18 Ueventd reads /system/etc/ueventd.rc, all other files are imported via the `import` command, which 22 This command parses an ueventd config file, extending the current configuration. If _path_ is a 28 Ueventd listens to the kernel uevent sockets and creates/deletes nodes in `/dev` based on the 69 The permissions can be modified using a ueventd.rc script and a line that beings with `/dev`. These 79 The path can be modified using a ueventd.rc script and a `subsystem` and/or `driver` section. 111 Ueventd by default takes no action for `/sys`, however it can be instructed to set permissions for 112 certain files in `/sys` when matching uevents are generated. This is done using a ueventd.rc script [all …]
|
H A D | ueventd.cpp | 17 #include "ueventd.h" 51 // At a high level, ueventd listens for uevent messages generated by the kernel through a netlink 52 // socket. When ueventd receives such a message it handles it by taking appropriate actions, 55 // Ueventd also handles loading of firmware that the kernel requests, and creates symlinks for block 58 // When ueventd starts, it regenerates uevents for all currently registered devices by traversing 61 // ueventd would not have been running when these devices were registered and therefore was unable 65 // 'init' currently waits synchronously on the cold boot process of ueventd before it continues 67 // a speed up here is to parallelize the handling of ueventd messages, which consume the bulk of the 88 // 1) ueventd regenerates uevents by doing the /sys traversal and listens to the netlink socket for 91 // 2) ueventd forks 'n' separate uevent handler subprocesses and has each of them to handle the [all …]
|
/aosp_15_r20/device/google/cuttlefish/shared/sepolicy/vendor/ |
D | ueventd.te | 1 allow ueventd metadata_file:dir search; 3 allow ueventd keymaster_device:chr_file { rw_file_perms create setattr }; 4 allow ueventd gatekeeper_device:chr_file { rw_file_perms create setattr }; 5 allow ueventd confirmationui_device:chr_file { rw_file_perms create setattr }; 6 allow ueventd metrics_helper_device:chr_file { rw_file_perms create setattr }; 7 allow ueventd oemlock_device:chr_file { rw_file_perms create setattr }; 8 allow ueventd keymint_device:chr_file { rw_file_perms create setattr }; 9 allow ueventd sensors_device:chr_file { rw_file_perms create setattr }; 10 allow ueventd mcu_control_device:chr_file { rw_file_perms create setattr }; 11 allow ueventd mcu_uart_device:chr_file { rw_file_perms create setattr };
|
/aosp_15_r20/out/soong/.intermediates/packages/modules/Virtualization/build/microdroid/microdroid_init_rc/android_arm64_armv8-2a_cortex-a55/ |
D | init.rc | 23 start ueventd 33 # Wait for ueventd to have finished cold boot. 61 # Stop ueventd to save memory 62 stop ueventd 156 service ueventd /system/bin/ueventd 161 seclabel u:r:ueventd:s0
|
/aosp_15_r20/packages/modules/Virtualization/build/microdroid/ |
D | init.rc | 23 start ueventd 33 # Wait for ueventd to have finished cold boot. 61 # Stop ueventd to save memory 62 stop ueventd 156 service ueventd /system/bin/ueventd 161 seclabel u:r:ueventd:s0
|
/aosp_15_r20/out/soong/.intermediates/packages/modules/Virtualization/build/microdroid/microdroid/android_common/root/system/etc/init/hw/ |
D | init.rc | 23 start ueventd 33 # Wait for ueventd to have finished cold boot. 61 # Stop ueventd to save memory 62 stop ueventd 156 service ueventd /system/bin/ueventd 161 seclabel u:r:ueventd:s0
|
/aosp_15_r20/system/sepolicy/prebuilts/api/33.0/private/ |
H A D | domain.te | 26 -ueventd 46 -ueventd 134 -ueventd 386 ueventd 440 -ueventd 486 -ueventd 530 -ueventd # reads /vendor/ueventd.rc 603 neverallow { domain -ueventd -vendor_init } sysfs_devices_cs_etm:file no_w_file_perms;
|
/aosp_15_r20/out/soong/.intermediates/system/sepolicy/microdroid/microdroid_plat_sepolicy.conf/android_common/ |
D | microdroid_plat_sepolicy.conf | 5134 #line 1 "system/sepolicy/microdroid/system/public/ueventd.te" 5135 # ueventd seclabel is specified in init.rc since 5137 type ueventd, domain; 5932 -ueventd 6449 -ueventd 6487 -ueventd # To create the /dev/hw_random file 6496 neverallow { domain -init -ueventd } sysfs_usermodehelper:file { append write }; 6707 # ueventd needs write access to all sysfs files. 6708 neverallow { domain -init -vendor_init -ueventd } sysfs_pgsize_migration:file { append create link … 6852 allow init ueventd:process transition; [all …]
|
/aosp_15_r20/out/soong/.intermediates/system/sepolicy/microdroid/microdroid_plat_sepolicy.cil/android_common/ |
D | plat_sepolicy.cil | 643 (typeattributeset domain (adbd apexd crash_dump init kernel shell statsd su toolbox ueventd vendor_… 706 (typeattributeset coredomain (adbd apexd crash_dump init kernel shell statsd su toolbox ueventd apk… 1300 (type ueventd) 1301 (roletype object_r ueventd) 2432 (allow init ueventd (process (transition))) 2433 (allow ueventd init_exec (file (read getattr map execute open entrypoint))) 2434 (dontaudit init ueventd (process (noatsecure))) 2435 (allow init ueventd (process (siginh rlimitinh))) 3533 (typetransition ueventd tmpfs file ueventd_tmpfs) 3534 (allow ueventd ueventd_tmpfs (file (read write getattr map))) [all …]
|
/aosp_15_r20/external/cpuinfo/test/dmesg/ |
H A D | galaxy-j7-prime.log | 329 [ 2.831258] [3: init: 1] [c3] init: Starting service 'ueventd'... 331 [ 2.835687] [7: ueventd: 1477] [c7] ueventd: ueventd started! 332 [ 2.836617] [7: ueventd: 1477] [c7] ueventd: Function: selinux_compare_spd_ram, index[3]… 333 [ 2.901102] [7: ueventd: 1477] [c7] ueventd: SELinux: Loaded file_contexts contexts from… 334 [ 2.904050] [7: ueventd: 1477] [c7] ueventd: Function: selinux_compare_spd_ram, index[3]… 335 [ 2.968666] [7: ueventd: 1477] [c7] ueventd: SELinux: Loaded file_contexts contexts from… 336 [ 3.022079] [0: ueventd: 1477] [c0] s2mu005-fuelgauge 7-003b: s2mu005_get_vbat: data0 (2… 337 [ 3.022098] [0: ueventd: 1477] [c0] s2mu005-fuelgauge 7-003b: s2mu005_get_vbat: vbat (38… 338 [ 3.023639] [0: ueventd: 1477] [c0] s2mu005-fuelgauge 7-003b: s2mu005_get_current: rCUR_… 339 [ 3.023653] [0: ueventd: 1477] [c0] s2mu005-fuelgauge 7-003b: s2mu005_get_current: curre… [all …]
|