/system/sepolicy/prebuilts/api/27.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc) 12 r_dir_file(vold, proc_net) 13 r_dir_file(vold, sysfs_type) 15 allow vold sysfs:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc) 12 r_dir_file(vold, proc_net) 13 r_dir_file(vold, sysfs_type) 15 allow vold sysfs:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms; [all …]
|
D | sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 34 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc_net) 12 r_dir_file(vold, sysfs_type) 14 allow vold sysfs:file w_file_perms; # writing to /sys/*/uevent during coldboot. 15 allow vold sysfs_dm:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 34 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file; [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file; [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 2 typeattribute vold domain_deprecated; 4 init_daemon_domain(vold) 7 domain_auto_trans(vold, sgdisk_exec, sgdisk); 8 domain_auto_trans(vold, sdcardd_exec, sdcardd); 12 domain_trans(vold, shell_exec, blkid); 13 domain_trans(vold, shell_exec, blkid_untrusted); 14 domain_trans(vold, fsck_exec, fsck); 15 domain_trans(vold, fsck_exec, fsck_untrusted); 19 type_transition vold storage_file:dir storage_stub_file; [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 2 typeattribute vold domain_deprecated; 4 init_daemon_domain(vold) 7 domain_auto_trans(vold, sgdisk_exec, sgdisk); 8 domain_auto_trans(vold, sdcardd_exec, sdcardd); 12 domain_trans(vold, shell_exec, blkid); 13 domain_trans(vold, shell_exec, blkid_untrusted); 14 domain_trans(vold, fsck_exec, fsck); 15 domain_trans(vold, fsck_exec, fsck_untrusted); 19 type_transition vold storage_file:dir storage_stub_file; [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/vold/ |
D | vdc.cpp | 91 auto vold = android::interface_cast<android::os::IVold>(binder); in main() local 94 checkStatus(args, vold->fbeEnable()); in main() 96 checkStatus(args, vold->initUser0()); in main() 100 checkStatus(args, vold->fdeEnable(passwordType, "", encryptionFlags)); in main() 102 checkStatus(args, vold->mountDefaultEncrypted()); in main() 104 checkStatus(args, vold->abortFuse()); in main() 106 checkStatus(args, vold->shutdown()); in main() 108 checkStatus(args, vold->reset()); in main() 110 checkStatus(args, vold->mountFstab(args[2], args[3])); in main() 114 checkStatus(args, vold->encryptFstab(args[2], args[3], in main() [all …]
|
D | FsCrypt.cpp | 69 using android::vold::BuildDataPath; 70 using android::vold::IsDotOrDotDot; 71 using android::vold::IsFilesystemSupported; 72 using android::vold::kEmptyAuthentication; 73 using android::vold::KeyBuffer; 74 using android::vold::KeyGeneration; 75 using android::vold::retrieveKey; 76 using android::vold::retrieveOrGenerateKey; 77 using android::vold::SetDefaultAcl; 78 using android::vold::SetQuotaInherit; [all …]
|
D | main.cpp | 70 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "") in main() 71 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "") in main() 72 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : ""); in main() 117 if (android::vold::VoldNativeService::start() != android::OK) { in main() 165 case 'b': android::vold::sBlkidContext = optarg; break; in parse_args() 166 case 'B': android::vold::sBlkidUntrustedContext = optarg; break; in parse_args() 167 case 'f': android::vold::sFsckContext = optarg; break; in parse_args() 168 case 'F': android::vold::sFsckUntrustedContext = optarg; break; in parse_args() 173 CHECK(android::vold::sBlkidContext != nullptr); in parse_args() 174 CHECK(android::vold::sBlkidUntrustedContext != nullptr); in parse_args() [all …]
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, shell_exec, blkid); 12 domain_trans(vold, shell_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|