Home
last modified time | relevance | path

Searched refs:vold (Results 1 – 25 of 243) sorted by relevance

12345678910

/system/sepolicy/prebuilts/api/27.0/public/
Dvold.te2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
11 r_dir_file(vold, proc)
12 r_dir_file(vold, proc_net)
13 r_dir_file(vold, sysfs_type)
15 allow vold sysfs:file w_file_perms;
16 allow vold sysfs_usb:file w_file_perms;
17 allow vold sysfs_zram_uevent:file w_file_perms;
[all …]
Dsgdisk.te1 # sgdisk called from vold
12 # Allow stdin/out back to vold
13 allow sgdisk vold:fd use;
14 allow sgdisk vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } sgdisk:process transition;
/system/sepolicy/prebuilts/api/26.0/public/
Dvold.te2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
11 r_dir_file(vold, proc)
12 r_dir_file(vold, proc_net)
13 r_dir_file(vold, sysfs_type)
15 allow vold sysfs:file w_file_perms;
16 allow vold sysfs_usb:file w_file_perms;
17 allow vold sysfs_zram_uevent:file w_file_perms;
[all …]
Dsgdisk.te1 # sgdisk called from vold
12 # Allow stdin/out back to vold
13 allow sgdisk vold:fd use;
14 allow sgdisk vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } sgdisk:process transition;
/system/sepolicy/public/
Dvold.te2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
34 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Dvold.te2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
34 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/28.0/public/
Dvold.te2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
11 r_dir_file(vold, proc_net)
12 r_dir_file(vold, sysfs_type)
14 allow vold sysfs:file w_file_perms; # writing to /sys/*/uevent during coldboot.
15 allow vold sysfs_dm:file w_file_perms;
16 allow vold sysfs_usb:file w_file_perms;
17 allow vold sysfs_zram_uevent:file w_file_perms;
[all …]
Dsgdisk.te1 # sgdisk called from vold
12 # Allow stdin/out back to vold
13 allow sgdisk vold:fd use;
14 allow sgdisk vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } sgdisk:process transition;
/system/sepolicy/prebuilts/api/26.0/private/
Dvold.te1 typeattribute vold coredomain;
2 typeattribute vold domain_deprecated;
4 init_daemon_domain(vold)
7 domain_auto_trans(vold, sgdisk_exec, sgdisk);
8 domain_auto_trans(vold, sdcardd_exec, sdcardd);
12 domain_trans(vold, shell_exec, blkid);
13 domain_trans(vold, shell_exec, blkid_untrusted);
14 domain_trans(vold, fsck_exec, fsck);
15 domain_trans(vold, fsck_exec, fsck_untrusted);
19 type_transition vold storage_file:dir storage_stub_file;
[all …]
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/27.0/private/
Dvold.te1 typeattribute vold coredomain;
2 typeattribute vold domain_deprecated;
4 init_daemon_domain(vold)
7 domain_auto_trans(vold, sgdisk_exec, sgdisk);
8 domain_auto_trans(vold, sdcardd_exec, sdcardd);
12 domain_trans(vold, shell_exec, blkid);
13 domain_trans(vold, shell_exec, blkid_untrusted);
14 domain_trans(vold, fsck_exec, fsck);
15 domain_trans(vold, fsck_exec, fsck_untrusted);
19 type_transition vold storage_file:dir storage_stub_file;
[all …]
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
Dblkid_untrusted.te5 # Allowed read-only access to vold block devices to extract UUID/label
9 # Allow stdin/out back to vold
10 allow blkid_untrusted vold:fd use;
11 allow blkid_untrusted vold:fifo_file { read write getattr };
34 # Only allow entry from vold via blkid binary
35 neverallow { domain -vold } blkid_untrusted:process transition;
/system/vold/
Dvdc.cpp88 auto vold = android::interface_cast<android::os::IVold>(binder); in main() local
91 checkStatus(vold->fbeEnable()); in main()
93 checkStatus(vold->initUser0()); in main()
97 checkStatus(vold->fdeEnable(passwordType, "", encryptionFlags)); in main()
99 checkStatus(vold->mountDefaultEncrypted()); in main()
101 checkStatus(vold->shutdown()); in main()
103 checkStatus(vold->checkEncryption(args[2])); in main()
105 checkStatus(vold->mountFstab(args[2], args[3])); in main()
107 checkStatus(vold->encryptFstab(args[2], args[3])); in main()
110 checkStatus(vold->supportsCheckpoint(&supported)); in main()
[all …]
DFsCrypt.cpp64 using android::vold::kEmptyAuthentication;
65 using android::vold::KeyBuffer;
66 using android::vold::writeStringToFile;
171 android::vold::destroyKey(other_path); in fixate_user_ce_key()
182 android::vold::FsyncDirectory(directory_path); in fixate_user_ce_key()
186 const android::vold::KeyAuthentication& auth, in read_and_fixate_user_ce_key()
192 if (android::vold::retrieveKey(ce_key_path, auth, ce_key)) { in read_and_fixate_user_ce_key()
203 const android::vold::KeyAuthentication& auth) { in read_and_install_user_ce_key()
208 if (!android::vold::installKey(ce_key, &ce_raw_ref)) return false; in read_and_install_user_ce_key()
237 if (!android::vold::randomKey(&de_key)) return false; in create_and_install_user_keys()
[all …]
DVolumeManager.cpp78 using android::vold::BindMount;
79 using android::vold::CreateDir;
80 using android::vold::DeleteDirContents;
81 using android::vold::DeleteDirContentsAndDir;
82 using android::vold::Symlink;
83 using android::vold::Unlink;
84 using android::vold::UnmountTree;
85 using android::vold::VoldNativeService;
138 auto disk = new android::vold::Disk( in updateVirtualDisk()
140 android::vold::Disk::Flags::kAdoptable | android::vold::Disk::Flags::kSd); in updateVirtualDisk()
[all …]
Dmain.cpp65 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "") in main()
66 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "") in main()
67 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : ""); in main()
115 if (android::vold::VoldNativeService::start() != android::OK) { in main()
161 case 'b': android::vold::sBlkidContext = optarg; break; in parse_args()
162 case 'B': android::vold::sBlkidUntrustedContext = optarg; break; in parse_args()
163 case 'f': android::vold::sFsckContext = optarg; break; in parse_args()
164 case 'F': android::vold::sFsckUntrustedContext = optarg; break; in parse_args()
169 CHECK(android::vold::sBlkidContext != nullptr); in parse_args()
170 CHECK(android::vold::sBlkidUntrustedContext != nullptr); in parse_args()
[all …]
DVolumeManager.h82 std::shared_ptr<android::vold::Disk> findDisk(const std::string& id);
83 std::shared_ptr<android::vold::VolumeBase> findVolume(const std::string& id);
85 void listVolumes(android::vold::VolumeBase::Type type, std::list<std::string>& list) const;
96 int setPrimary(const std::shared_ptr<android::vold::VolumeBase>& vol);
140 void handleDiskAdded(const std::shared_ptr<android::vold::Disk>& disk);
150 std::list<std::shared_ptr<android::vold::Disk>> mDisks;
151 std::list<std::shared_ptr<android::vold::Disk>> mPendingDisks;
152 std::list<std::shared_ptr<android::vold::VolumeBase>> mObbVolumes;
153 std::list<std::shared_ptr<android::vold::VolumeBase>> mStubVolumes;
159 std::shared_ptr<android::vold::Disk> mVirtualDisk;
[all …]
/system/sepolicy/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, blkid_exec, blkid);
12 domain_trans(vold, blkid_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/29.0/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, blkid_exec, blkid);
12 domain_trans(vold, blkid_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/28.0/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, shell_exec, blkid);
12 domain_trans(vold, shell_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
Dblkid_untrusted.te5 # Allowed read-only access to vold block devices to extract UUID/label
9 # Allow stdin/out back to vold
10 allow blkid_untrusted vold:fd use;
11 allow blkid_untrusted vold:fifo_file { read write getattr };
34 # Only allow entry from vold via blkid binary
35 neverallow { domain -vold } blkid_untrusted:process transition;

12345678910