/system/sepolicy/prebuilts/api/29.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 34 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 34 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/33.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 8 domain_auto_trans(vold, fuseblkd_untrusted_exec, fuseblkd_untrusted); 11 domain_auto_trans(vold, e2fs_exec, e2fs); 16 domain_trans(vold, blkid_exec, blkid); 17 domain_trans(vold, blkid_exec, blkid_untrusted); 18 domain_trans(vold, fsck_exec, fsck); 19 domain_trans(vold, fsck_exec, fsck_untrusted); [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/32.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/202404/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/34.0/public/ |
D | vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 8 domain_auto_trans(vold, fuseblkd_untrusted_exec, fuseblkd_untrusted); 12 domain_trans(vold, blkid_exec, blkid); 13 domain_trans(vold, blkid_exec, blkid_untrusted); 14 domain_trans(vold, fsck_exec, fsck); 15 domain_trans(vold, fsck_exec, fsck_untrusted); 19 type_transition vold storage_file:dir storage_stub_file; [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file; [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file; [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file; [all …]
|
/system/sepolicy/prebuilts/api/202404/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 8 domain_auto_trans(vold, fuseblkd_untrusted_exec, fuseblkd_untrusted); 11 domain_auto_trans(vold, e2fs_exec, e2fs); 16 domain_trans(vold, blkid_exec, blkid); 17 domain_trans(vold, blkid_exec, blkid_untrusted); 18 domain_trans(vold, fsck_exec, fsck); 19 domain_trans(vold, fsck_exec, fsck_untrusted); [all …]
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
/system/vold/ |
D | vdc.cpp | 69 static void bindkeys(std::vector<std::string>& args, const android::sp<android::os::IVold>& vold) { in bindkeys() argument 79 android::status_t status = android::vold::HexToStr(seed_value, raw_bytes); in bindkeys() 86 checkStatus(args, vold->setStorageBindingSeed(seed)); in bindkeys() 90 const android::sp<android::os::IVold>& vold) { in mountFstab() argument 99 vold->mountFstab(args[2], args[3], isZoned == android::base::ParseBoolResult::kTrue, in mountFstab() 104 const android::sp<android::os::IVold>& vold) { in encryptFstab() argument 116 vold->encryptFstab(args[2], args[3], in encryptFstab() 145 auto vold = android::interface_cast<android::os::IVold>(binder); in main() local 148 checkStatus(args, vold->fbeEnable()); in main() 150 checkStatus(args, vold->initUser0()); in main() [all …]
|
D | FsCrypt.cpp | 65 using android::vold::BuildDataPath; 66 using android::vold::IsDotOrDotDot; 67 using android::vold::IsFilesystemSupported; 68 using android::vold::kEmptyAuthentication; 69 using android::vold::KeyBuffer; 70 using android::vold::KeyGeneration; 71 using android::vold::retrieveKey; 72 using android::vold::retrieveOrGenerateKey; 73 using android::vold::SetDefaultAcl; 74 using android::vold::SetQuotaInherit; [all …]
|
D | VolumeManager.cpp | 81 using android::vold::BindMount; 82 using android::vold::CreateDir; 83 using android::vold::DeleteDirContents; 84 using android::vold::DeleteDirContentsAndDir; 85 using android::vold::EnsureDirExists; 86 using android::vold::GetFuseMountPathForUser; 87 using android::vold::IsFilesystemSupported; 88 using android::vold::IsSdcardfsUsed; 89 using android::vold::IsVirtioBlkDevice; 90 using android::vold::PrepareAndroidDirs; [all …]
|
D | main.cpp | 75 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "") in main() 76 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "") in main() 77 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : ""); in main() 124 if (android::vold::VoldNativeService::start() != android::OK) { in main() 172 case 'b': android::vold::sBlkidContext = optarg; break; in parse_args() 173 case 'B': android::vold::sBlkidUntrustedContext = optarg; break; in parse_args() 174 case 'f': android::vold::sFsckContext = optarg; break; in parse_args() 175 case 'F': android::vold::sFsckUntrustedContext = optarg; break; in parse_args() 180 CHECK(android::vold::sBlkidContext != nullptr); in parse_args() 181 CHECK(android::vold::sBlkidUntrustedContext != nullptr); in parse_args() [all …]
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|