/system/sepolicy/prebuilts/api/27.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc) 12 r_dir_file(vold, proc_net) 13 r_dir_file(vold, sysfs_type) 15 allow vold sysfs:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms; [all …]
|
D | sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc) 12 r_dir_file(vold, proc_net) 13 r_dir_file(vold, sysfs_type) 15 allow vold sysfs:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms; [all …]
|
D | sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
/system/sepolicy/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 34 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 34 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc_net) 12 r_dir_file(vold, sysfs_type) 14 allow vold sysfs:file w_file_perms; # writing to /sys/*/uevent during coldboot. 15 allow vold sysfs_dm:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms; [all …]
|
D | sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 2 typeattribute vold domain_deprecated; 4 init_daemon_domain(vold) 7 domain_auto_trans(vold, sgdisk_exec, sgdisk); 8 domain_auto_trans(vold, sdcardd_exec, sdcardd); 12 domain_trans(vold, shell_exec, blkid); 13 domain_trans(vold, shell_exec, blkid_untrusted); 14 domain_trans(vold, fsck_exec, fsck); 15 domain_trans(vold, fsck_exec, fsck_untrusted); 19 type_transition vold storage_file:dir storage_stub_file; [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 2 typeattribute vold domain_deprecated; 4 init_daemon_domain(vold) 7 domain_auto_trans(vold, sgdisk_exec, sgdisk); 8 domain_auto_trans(vold, sdcardd_exec, sdcardd); 12 domain_trans(vold, shell_exec, blkid); 13 domain_trans(vold, shell_exec, blkid_untrusted); 14 domain_trans(vold, fsck_exec, fsck); 15 domain_trans(vold, fsck_exec, fsck_untrusted); 19 type_transition vold storage_file:dir storage_stub_file; [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
D | blkid_untrusted.te | 5 # Allowed read-only access to vold block devices to extract UUID/label 9 # Allow stdin/out back to vold 10 allow blkid_untrusted vold:fd use; 11 allow blkid_untrusted vold:fifo_file { read write getattr }; 34 # Only allow entry from vold via blkid binary 35 neverallow { domain -vold } blkid_untrusted:process transition;
|
/system/vold/ |
D | vdc.cpp | 88 auto vold = android::interface_cast<android::os::IVold>(binder); in main() local 91 checkStatus(vold->fbeEnable()); in main() 93 checkStatus(vold->initUser0()); in main() 97 checkStatus(vold->fdeEnable(passwordType, "", encryptionFlags)); in main() 99 checkStatus(vold->mountDefaultEncrypted()); in main() 101 checkStatus(vold->shutdown()); in main() 103 checkStatus(vold->checkEncryption(args[2])); in main() 105 checkStatus(vold->mountFstab(args[2], args[3])); in main() 107 checkStatus(vold->encryptFstab(args[2], args[3])); in main() 110 checkStatus(vold->supportsCheckpoint(&supported)); in main() [all …]
|
D | FsCrypt.cpp | 64 using android::vold::kEmptyAuthentication; 65 using android::vold::KeyBuffer; 66 using android::vold::writeStringToFile; 171 android::vold::destroyKey(other_path); in fixate_user_ce_key() 182 android::vold::FsyncDirectory(directory_path); in fixate_user_ce_key() 186 const android::vold::KeyAuthentication& auth, in read_and_fixate_user_ce_key() 192 if (android::vold::retrieveKey(ce_key_path, auth, ce_key)) { in read_and_fixate_user_ce_key() 203 const android::vold::KeyAuthentication& auth) { in read_and_install_user_ce_key() 208 if (!android::vold::installKey(ce_key, &ce_raw_ref)) return false; in read_and_install_user_ce_key() 237 if (!android::vold::randomKey(&de_key)) return false; in create_and_install_user_keys() [all …]
|
D | VolumeManager.cpp | 78 using android::vold::BindMount; 79 using android::vold::CreateDir; 80 using android::vold::DeleteDirContents; 81 using android::vold::DeleteDirContentsAndDir; 82 using android::vold::Symlink; 83 using android::vold::Unlink; 84 using android::vold::UnmountTree; 85 using android::vold::VoldNativeService; 138 auto disk = new android::vold::Disk( in updateVirtualDisk() 140 android::vold::Disk::Flags::kAdoptable | android::vold::Disk::Flags::kSd); in updateVirtualDisk() [all …]
|
D | main.cpp | 65 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "") in main() 66 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "") in main() 67 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : ""); in main() 115 if (android::vold::VoldNativeService::start() != android::OK) { in main() 161 case 'b': android::vold::sBlkidContext = optarg; break; in parse_args() 162 case 'B': android::vold::sBlkidUntrustedContext = optarg; break; in parse_args() 163 case 'f': android::vold::sFsckContext = optarg; break; in parse_args() 164 case 'F': android::vold::sFsckUntrustedContext = optarg; break; in parse_args() 169 CHECK(android::vold::sBlkidContext != nullptr); in parse_args() 170 CHECK(android::vold::sBlkidUntrustedContext != nullptr); in parse_args() [all …]
|
D | VolumeManager.h | 82 std::shared_ptr<android::vold::Disk> findDisk(const std::string& id); 83 std::shared_ptr<android::vold::VolumeBase> findVolume(const std::string& id); 85 void listVolumes(android::vold::VolumeBase::Type type, std::list<std::string>& list) const; 96 int setPrimary(const std::shared_ptr<android::vold::VolumeBase>& vol); 140 void handleDiskAdded(const std::shared_ptr<android::vold::Disk>& disk); 150 std::list<std::shared_ptr<android::vold::Disk>> mDisks; 151 std::list<std::shared_ptr<android::vold::Disk>> mPendingDisks; 152 std::list<std::shared_ptr<android::vold::VolumeBase>> mObbVolumes; 153 std::list<std::shared_ptr<android::vold::VolumeBase>> mStubVolumes; 159 std::shared_ptr<android::vold::Disk> mVirtualDisk; [all …]
|
/system/sepolicy/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, shell_exec, blkid); 12 domain_trans(vold, shell_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
D | blkid_untrusted.te | 5 # Allowed read-only access to vold block devices to extract UUID/label 9 # Allow stdin/out back to vold 10 allow blkid_untrusted vold:fd use; 11 allow blkid_untrusted vold:fifo_file { read write getattr }; 34 # Only allow entry from vold via blkid binary 35 neverallow { domain -vold } blkid_untrusted:process transition;
|