| /system/sepolicy/prebuilts/api/30.0/public/ |
| D | vold.te | 2 type vold, domain; type 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 34 allow vold file_contexts_file:file r_file_perms; [all …]
|
| /system/sepolicy/prebuilts/api/29.0/public/ |
| D | vold.te | 2 type vold, domain; type 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 34 allow vold file_contexts_file:file r_file_perms; [all …]
|
| /system/sepolicy/prebuilts/api/202504/private/ |
| D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 8 domain_auto_trans(vold, fuseblkd_untrusted_exec, fuseblkd_untrusted); 11 domain_auto_trans(vold, e2fs_exec, e2fs); 16 domain_trans(vold, blkid_exec, blkid); 17 domain_trans(vold, blkid_exec, blkid_untrusted); 18 domain_trans(vold, fsck_exec, fsck); 19 domain_trans(vold, fsck_exec, fsck_untrusted); [all …]
|
| D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
| /system/sepolicy/private/ |
| D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 8 domain_auto_trans(vold, fuseblkd_untrusted_exec, fuseblkd_untrusted); 11 domain_auto_trans(vold, e2fs_exec, e2fs); 16 domain_trans(vold, blkid_exec, blkid); 17 domain_trans(vold, blkid_exec, blkid_untrusted); 18 domain_trans(vold, fsck_exec, fsck); 19 domain_trans(vold, fsck_exec, fsck_untrusted); [all …]
|
| /system/sepolicy/prebuilts/api/33.0/public/ |
| D | vold.te | 2 type vold, domain; type 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
| /system/sepolicy/prebuilts/api/202404/public/ |
| D | vold.te | 2 type vold, domain; type 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
| /system/sepolicy/prebuilts/api/34.0/public/ |
| D | vold.te | 2 type vold, domain; type 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
| /system/sepolicy/prebuilts/api/32.0/public/ |
| D | vold.te | 2 type vold, domain; type 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
| /system/sepolicy/prebuilts/api/31.0/public/ |
| D | vold.te | 2 type vold, domain; type 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo }) 12 allow vold { 22 r_dir_file(vold, rootfs) 23 r_dir_file(vold, metadata_file) 24 allow vold { 35 allow vold file_contexts_file:file r_file_perms; [all …]
|
| /system/sepolicy/prebuilts/api/202404/private/ |
| D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 8 domain_auto_trans(vold, fuseblkd_untrusted_exec, fuseblkd_untrusted); 11 domain_auto_trans(vold, e2fs_exec, e2fs); 16 domain_trans(vold, blkid_exec, blkid); 17 domain_trans(vold, blkid_exec, blkid_untrusted); 18 domain_trans(vold, fsck_exec, fsck); 19 domain_trans(vold, fsck_exec, fsck_untrusted); [all …]
|
| D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
| /system/sepolicy/prebuilts/api/32.0/private/ |
| D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file; [all …]
|
| D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
| /system/sepolicy/prebuilts/api/31.0/private/ |
| D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file; [all …]
|
| D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
| /system/sepolicy/prebuilts/api/34.0/private/ |
| D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 8 domain_auto_trans(vold, fuseblkd_untrusted_exec, fuseblkd_untrusted); 12 domain_trans(vold, blkid_exec, blkid); 13 domain_trans(vold, blkid_exec, blkid_untrusted); 14 domain_trans(vold, fsck_exec, fsck); 15 domain_trans(vold, fsck_exec, fsck_untrusted); 19 type_transition vold storage_file:dir storage_stub_file; [all …]
|
| D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
| /system/sepolicy/prebuilts/api/33.0/private/ |
| D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file; [all …]
|
| /system/sepolicy/prebuilts/api/29.0/private/ |
| D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
| D | blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
| /system/sepolicy/prebuilts/api/30.0/private/ |
| D | vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, blkid_exec, blkid); 12 domain_trans(vold, blkid_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
|
| /system/vold/ |
| D | vdc.cpp | 50 auto name = android::String16("vold"); in getServiceAggressive() 54 LOG(VERBOSE) << "Waited " << (i * 10) << "ms for vold"; in getServiceAggressive() 69 static void bindkeys(std::vector<std::string>& args, const android::sp<android::os::IVold>& vold) { in bindkeys() argument 79 android::status_t status = android::vold::HexToStr(seed_value, raw_bytes); in bindkeys() 86 checkStatus(args, vold->setStorageBindingSeed(seed)); in bindkeys() 90 const android::sp<android::os::IVold>& vold) { in mountFstab() argument 99 vold->mountFstab(args[2], args[3], isZoned == android::base::ParseBoolResult::kTrue, in mountFstab() 104 const android::sp<android::os::IVold>& vold) { in encryptFstab() argument 129 checkStatus(args, vold->encryptFstab(args[2], args[3], in encryptFstab() 156 LOG(ERROR) << "Failed to obtain vold Binder"; in main() [all …]
|
| D | main.cpp | 71 LOG(INFO) << "Vold 3.0 (the awakening) firing up"; in main() 76 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "") in main() 77 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "") in main() 78 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : ""); in main() 92 mkdir("/dev/block/vold", 0755); in main() 108 if (android::base::GetBoolProperty("vold.debug", false)) { in main() 125 if (android::vold::VoldNativeService::start() != android::OK) { in main() 133 if (android::vold::VendorVoldNativeService::try_start() != android::OK) { in main() 148 // a deadlock between vold and init (see b/34278978 for details) in main() 149 android::base::SetProperty("vold.has_adoptable", configs.has_adoptable ? "1" : "0"); in main() [all …]
|
| D | VendorVoldNativeService.h | 20 #include <android/system/vold/BnVold.h> 21 #include <android/system/vold/CheckpointingState.h> 22 #include <android/system/vold/IVoldCheckpointListener.h> 24 namespace android::vold { 26 class VendorVoldNativeService : public android::system::vold::BnVold { 32 const sp<android::system::vold::IVoldCheckpointListener>& listener, 33 android::system::vold::CheckpointingState* _aidl_return) final; 36 } // namespace android::vold
|