Home
last modified time | relevance | path

Searched full:vold (Results 1 – 25 of 567) sorted by relevance

12345678910>>...23

/system/sepolicy/prebuilts/api/30.0/public/
Dvold.te2 type vold, domain; type
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
34 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Dvold.te2 type vold, domain; type
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
34 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/202504/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
8 domain_auto_trans(vold, fuseblkd_untrusted_exec, fuseblkd_untrusted);
11 domain_auto_trans(vold, e2fs_exec, e2fs);
16 domain_trans(vold, blkid_exec, blkid);
17 domain_trans(vold, blkid_exec, blkid_untrusted);
18 domain_trans(vold, fsck_exec, fsck);
19 domain_trans(vold, fsck_exec, fsck_untrusted);
[all …]
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
8 domain_auto_trans(vold, fuseblkd_untrusted_exec, fuseblkd_untrusted);
11 domain_auto_trans(vold, e2fs_exec, e2fs);
16 domain_trans(vold, blkid_exec, blkid);
17 domain_trans(vold, blkid_exec, blkid_untrusted);
18 domain_trans(vold, fsck_exec, fsck);
19 domain_trans(vold, fsck_exec, fsck_untrusted);
[all …]
/system/sepolicy/prebuilts/api/33.0/public/
Dvold.te2 type vold, domain; type
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
35 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/202404/public/
Dvold.te2 type vold, domain; type
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
35 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/34.0/public/
Dvold.te2 type vold, domain; type
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
35 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/32.0/public/
Dvold.te2 type vold, domain; type
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
35 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/31.0/public/
Dvold.te2 type vold, domain; type
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
10 r_dir_file(vold, { sysfs_type -sysfs_batteryinfo })
12 allow vold {
22 r_dir_file(vold, rootfs)
23 r_dir_file(vold, metadata_file)
24 allow vold {
35 allow vold file_contexts_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/202404/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
8 domain_auto_trans(vold, fuseblkd_untrusted_exec, fuseblkd_untrusted);
11 domain_auto_trans(vold, e2fs_exec, e2fs);
16 domain_trans(vold, blkid_exec, blkid);
17 domain_trans(vold, blkid_exec, blkid_untrusted);
18 domain_trans(vold, fsck_exec, fsck);
19 domain_trans(vold, fsck_exec, fsck_untrusted);
[all …]
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/32.0/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, blkid_exec, blkid);
12 domain_trans(vold, blkid_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
[all …]
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/31.0/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, blkid_exec, blkid);
12 domain_trans(vold, blkid_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
[all …]
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/34.0/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
8 domain_auto_trans(vold, fuseblkd_untrusted_exec, fuseblkd_untrusted);
12 domain_trans(vold, blkid_exec, blkid);
13 domain_trans(vold, blkid_exec, blkid_untrusted);
14 domain_trans(vold, fsck_exec, fsck);
15 domain_trans(vold, fsck_exec, fsck_untrusted);
19 type_transition vold storage_file:dir storage_stub_file;
[all …]
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/33.0/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, blkid_exec, blkid);
12 domain_trans(vold, blkid_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, blkid_exec, blkid);
12 domain_trans(vold, blkid_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
Dblkid.te1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
/system/sepolicy/prebuilts/api/30.0/private/
Dvold.te1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, blkid_exec, blkid);
12 domain_trans(vold, blkid_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
/system/vold/
Dvdc.cpp50 auto name = android::String16("vold"); in getServiceAggressive()
54 LOG(VERBOSE) << "Waited " << (i * 10) << "ms for vold"; in getServiceAggressive()
69 static void bindkeys(std::vector<std::string>& args, const android::sp<android::os::IVold>& vold) { in bindkeys() argument
79 android::status_t status = android::vold::HexToStr(seed_value, raw_bytes); in bindkeys()
86 checkStatus(args, vold->setStorageBindingSeed(seed)); in bindkeys()
90 const android::sp<android::os::IVold>& vold) { in mountFstab() argument
99 vold->mountFstab(args[2], args[3], isZoned == android::base::ParseBoolResult::kTrue, in mountFstab()
104 const android::sp<android::os::IVold>& vold) { in encryptFstab() argument
129 checkStatus(args, vold->encryptFstab(args[2], args[3], in encryptFstab()
156 LOG(ERROR) << "Failed to obtain vold Binder"; in main()
[all …]
Dmain.cpp71 LOG(INFO) << "Vold 3.0 (the awakening) firing up"; in main()
76 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "") in main()
77 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "") in main()
78 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : ""); in main()
92 mkdir("/dev/block/vold", 0755); in main()
108 if (android::base::GetBoolProperty("vold.debug", false)) { in main()
125 if (android::vold::VoldNativeService::start() != android::OK) { in main()
133 if (android::vold::VendorVoldNativeService::try_start() != android::OK) { in main()
148 // a deadlock between vold and init (see b/34278978 for details) in main()
149 android::base::SetProperty("vold.has_adoptable", configs.has_adoptable ? "1" : "0"); in main()
[all …]
DVendorVoldNativeService.h20 #include <android/system/vold/BnVold.h>
21 #include <android/system/vold/CheckpointingState.h>
22 #include <android/system/vold/IVoldCheckpointListener.h>
24 namespace android::vold {
26 class VendorVoldNativeService : public android::system::vold::BnVold {
32 const sp<android::system::vold::IVoldCheckpointListener>& listener,
33 android::system::vold::CheckpointingState* _aidl_return) final;
36 } // namespace android::vold

12345678910>>...23