Home
last modified time | relevance | path

Searched full:vold (Results 1 – 25 of 328) sorted by relevance

12345678910>>...14

/system/sepolicy/prebuilts/api/28.0/public/
Dvold.te2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
11 r_dir_file(vold, proc_net)
12 r_dir_file(vold, sysfs_type)
14 allow vold sysfs:file w_file_perms; # writing to /sys/*/uevent during coldboot.
15 allow vold sysfs_dm:file w_file_perms;
16 allow vold sysfs_usb:file w_file_perms;
17 allow vold sysfs_zram_uevent:file w_file_perms;
[all …]
Dsgdisk.te1 # sgdisk called from vold
12 # Allow stdin/out back to vold
13 allow sgdisk vold:fd use;
14 allow sgdisk vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } sgdisk:process transition;
/system/sepolicy/prebuilts/api/30.0/public/
Dvold.te2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
34 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/27.0/public/
Dvold.te2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
11 r_dir_file(vold, proc)
12 r_dir_file(vold, proc_net)
13 r_dir_file(vold, sysfs_type)
15 allow vold sysfs:file w_file_perms;
16 allow vold sysfs_usb:file w_file_perms;
17 allow vold sysfs_zram_uevent:file w_file_perms;
[all …]
Dsgdisk.te1 # sgdisk called from vold
12 # Allow stdin/out back to vold
13 allow sgdisk vold:fd use;
14 allow sgdisk vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } sgdisk:process transition;
/system/sepolicy/prebuilts/api/29.0/public/
Dvold.te2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
34 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/26.0/public/
Dvold.te2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
11 r_dir_file(vold, proc)
12 r_dir_file(vold, proc_net)
13 r_dir_file(vold, sysfs_type)
15 allow vold sysfs:file w_file_perms;
16 allow vold sysfs_usb:file w_file_perms;
17 allow vold sysfs_zram_uevent:file w_file_perms;
[all …]
Dsgdisk.te1 # sgdisk called from vold
12 # Allow stdin/out back to vold
13 allow sgdisk vold:fd use;
14 allow sgdisk vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } sgdisk:process transition;
/system/sepolicy/public/
Dvold.te2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
34 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, blkid_exec, blkid);
12 domain_trans(vold, blkid_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
[all …]
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/26.0/private/
Dvold.te1 typeattribute vold coredomain;
2 typeattribute vold domain_deprecated;
4 init_daemon_domain(vold)
7 domain_auto_trans(vold, sgdisk_exec, sgdisk);
8 domain_auto_trans(vold, sdcardd_exec, sdcardd);
12 domain_trans(vold, shell_exec, blkid);
13 domain_trans(vold, shell_exec, blkid_untrusted);
14 domain_trans(vold, fsck_exec, fsck);
15 domain_trans(vold, fsck_exec, fsck_untrusted);
19 type_transition vold storage_file:dir storage_stub_file;
[all …]
Ddomain_deprecated.te13 -vold
45 -vold
56 -vold
68 -vold
85 -vold
145 -vold
151 -vold
156 -vold
161 -vold
178 -vold
[all …]
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/27.0/private/
Dvold.te1 typeattribute vold coredomain;
2 typeattribute vold domain_deprecated;
4 init_daemon_domain(vold)
7 domain_auto_trans(vold, sgdisk_exec, sgdisk);
8 domain_auto_trans(vold, sdcardd_exec, sdcardd);
12 domain_trans(vold, shell_exec, blkid);
13 domain_trans(vold, shell_exec, blkid_untrusted);
14 domain_trans(vold, fsck_exec, fsck);
15 domain_trans(vold, fsck_exec, fsck_untrusted);
19 type_transition vold storage_file:dir storage_stub_file;
[all …]
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/29.0/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, blkid_exec, blkid);
12 domain_trans(vold, blkid_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/30.0/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, blkid_exec, blkid);
12 domain_trans(vold, blkid_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/28.0/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, shell_exec, blkid);
12 domain_trans(vold, shell_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/vold/
Dmain.cpp65 LOG(INFO) << "Vold 3.0 (the awakening) firing up"; in main()
70 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "") in main()
71 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "") in main()
72 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : ""); in main()
84 mkdir("/dev/block/vold", 0755); in main()
100 if (android::base::GetBoolProperty("vold.debug", false)) { in main()
117 if (android::vold::VoldNativeService::start() != android::OK) { in main()
133 // a deadlock between vold and init (see b/34278978 for details) in main()
134 android::base::SetProperty("vold.has_adoptable", configs.has_adoptable ? "1" : "0"); in main()
135 android::base::SetProperty("vold.has_quota", configs.has_quota ? "1" : "0"); in main()
[all …]
Dvdc.cpp47 auto name = android::String16("vold"); in getServiceAggressive()
51 LOG(VERBOSE) << "Waited " << (i * 10) << "ms for vold"; in getServiceAggressive()
87 LOG(ERROR) << "Failed to obtain vold Binder"; in main()
90 auto vold = android::interface_cast<android::os::IVold>(binder); in main() local
93 checkStatus(args, vold->fbeEnable()); in main()
95 checkStatus(args, vold->initUser0()); in main()
99 checkStatus(args, vold->fdeEnable(passwordType, "", encryptionFlags)); in main()
101 checkStatus(args, vold->mountDefaultEncrypted()); in main()
103 checkStatus(args, vold->shutdown()); in main()
105 checkStatus(args, vold->reset()); in main()
[all …]
DFsCrypt.cpp68 using android::vold::BuildDataPath;
69 using android::vold::kEmptyAuthentication;
70 using android::vold::KeyBuffer;
71 using android::vold::KeyGeneration;
72 using android::vold::retrieveKey;
73 using android::vold::retrieveOrGenerateKey;
74 using android::vold::writeStringToFile;
84 const std::string user_key_dir = std::string() + DATA_MNT_POINT + "/misc/vold/user_keys";
89 std::string() + DATA_MNT_POINT + "/misc/vold/volume_keys";
176 android::vold::destroyKey(other_path); in fixate_user_ce_key()
[all …]

12345678910>>...14