/system/sepolicy/prebuilts/api/28.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc_net) 12 r_dir_file(vold, sysfs_type) 14 allow vold sysfs:file w_file_perms; # writing to /sys/*/uevent during coldboot. 15 allow vold sysfs_dm:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms; [all …]
|
D | sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 34 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc) 12 r_dir_file(vold, proc_net) 13 r_dir_file(vold, sysfs_type) 15 allow vold sysfs:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms; [all …]
|
D | sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 34 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc) 12 r_dir_file(vold, proc_net) 13 r_dir_file(vold, sysfs_type) 15 allow vold sysfs:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms; [all …]
|
D | sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
/system/sepolicy/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 34 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file; [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 2 typeattribute vold domain_deprecated; 4 init_daemon_domain(vold) 7 domain_auto_trans(vold, sgdisk_exec, sgdisk); 8 domain_auto_trans(vold, sdcardd_exec, sdcardd); 12 domain_trans(vold, shell_exec, blkid); 13 domain_trans(vold, shell_exec, blkid_untrusted); 14 domain_trans(vold, fsck_exec, fsck); 15 domain_trans(vold, fsck_exec, fsck_untrusted); 19 type_transition vold storage_file:dir storage_stub_file; [all …]
|
D | domain_deprecated.te | 13 -vold 45 -vold 56 -vold 68 -vold 85 -vold 145 -vold 151 -vold 156 -vold 161 -vold 178 -vold [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 2 typeattribute vold domain_deprecated; 4 init_daemon_domain(vold) 7 domain_auto_trans(vold, sgdisk_exec, sgdisk); 8 domain_auto_trans(vold, sdcardd_exec, sdcardd); 12 domain_trans(vold, shell_exec, blkid); 13 domain_trans(vold, shell_exec, blkid_untrusted); 14 domain_trans(vold, fsck_exec, fsck); 15 domain_trans(vold, fsck_exec, fsck_untrusted); 19 type_transition vold storage_file:dir storage_stub_file; [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, shell_exec, blkid); 12 domain_trans(vold, shell_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/vold/ |
D | main.cpp | 65 LOG(INFO) << "Vold 3.0 (the awakening) firing up"; in main() 70 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "") in main() 71 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "") in main() 72 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : ""); in main() 84 mkdir("/dev/block/vold", 0755); in main() 100 if (android::base::GetBoolProperty("vold.debug", false)) { in main() 117 if (android::vold::VoldNativeService::start() != android::OK) { in main() 133 // a deadlock between vold and init (see b/34278978 for details) in main() 134 android::base::SetProperty("vold.has_adoptable", configs.has_adoptable ? "1" : "0"); in main() 135 android::base::SetProperty("vold.has_quota", configs.has_quota ? "1" : "0"); in main() [all …]
|
D | vdc.cpp | 47 auto name = android::String16("vold"); in getServiceAggressive() 51 LOG(VERBOSE) << "Waited " << (i * 10) << "ms for vold"; in getServiceAggressive() 87 LOG(ERROR) << "Failed to obtain vold Binder"; in main() 90 auto vold = android::interface_cast<android::os::IVold>(binder); in main() local 93 checkStatus(args, vold->fbeEnable()); in main() 95 checkStatus(args, vold->initUser0()); in main() 99 checkStatus(args, vold->fdeEnable(passwordType, "", encryptionFlags)); in main() 101 checkStatus(args, vold->mountDefaultEncrypted()); in main() 103 checkStatus(args, vold->shutdown()); in main() 105 checkStatus(args, vold->reset()); in main() [all …]
|
D | FsCrypt.cpp | 68 using android::vold::BuildDataPath; 69 using android::vold::kEmptyAuthentication; 70 using android::vold::KeyBuffer; 71 using android::vold::KeyGeneration; 72 using android::vold::retrieveKey; 73 using android::vold::retrieveOrGenerateKey; 74 using android::vold::writeStringToFile; 84 const std::string user_key_dir = std::string() + DATA_MNT_POINT + "/misc/vold/user_keys"; 89 std::string() + DATA_MNT_POINT + "/misc/vold/volume_keys"; 176 android::vold::destroyKey(other_path); in fixate_user_ce_key() [all …]
|