Home
last modified time | relevance | path

Searched refs:block_device (Results 1 – 24 of 24) sorted by relevance

/system/core/adb/
Dset_verity_enable_state_service.cpp46 static int set_verity_enabled_state(int fd, const char *block_device, in set_verity_enabled_state() argument
49 if (!make_block_device_writable(block_device)) { in set_verity_enabled_state()
51 block_device, strerror(errno)); in set_verity_enabled_state()
55 fec::io fh(block_device, O_RDWR); in set_verity_enabled_state()
58 WriteFdFmt(fd, "Could not open block device %s (%s).\n", block_device, strerror(errno)); in set_verity_enabled_state()
83 block_device, strerror(errno)); in set_verity_enabled_state()
/system/extras/verity/
Dbuild_verity_metadata.py59 def build_verity_table(block_device, data_blocks, root_hash, salt): argument
61 table %= ( block_device,
62 block_device,
72 block_device, signer_path, signing_key, signer_args=None): argument
74 verity_table = build_verity_table(block_device, data_blocks, root_hash, salt)
108 args.root_hash, args.salt, args.block_device,
/system/sepolicy/
Duncrypt.te34 allow uncrypt block_device:blk_file w_file_perms;
35 auditallow uncrypt block_device:blk_file w_file_perms;
37 allow uncrypt block_device:dir r_dir_perms;
Dupdate_verifier.te9 allow update_verifier block_device:dir search;
Dblkid.te6 allow blkid block_device:dir search;
Dsgdisk.te6 allow sgdisk block_device:dir search;
Dblkid_untrusted.te5 allow blkid_untrusted block_device:dir search;
Dfsck_untrusted.te12 allow fsck_untrusted block_device:dir search;
Dotapreopt_chroot.te11 allow otapreopt_chroot block_device:dir search;
Dinstall_recovery.te19 allow install_recovery block_device:dir search;
Dtoolbox.te20 allow toolbox block_device:dir search;
Dfsck.te19 allow fsck block_device:dir search;
Dupdate_engine_common.te5 allow update_engine_common block_device:dir search;
Ddevice.te8 type block_device, dev_type;
Drecovery.te68 allow recovery block_device:dir r_dir_perms;
Ddumpstate.te98 allow dumpstate { storage_file block_device }:dir { search getattr };
Dvold.te38 allow vold block_device:dir create_dir_perms;
Ddomain.te255 # Don't allow raw read/write/open access to block_device
257 neverallow { domain -kernel -init -recovery -uncrypt } block_device:blk_file { open read write };
Dfile_contexts58 /dev/block(/.*)? u:object_r:block_device:s0
Dsystem_server.te468 allow system_server block_device:dir search;
/system/vold/
Dsecdiscard.cpp106 auto block_device = block_device_for_path(path); in secdiscard_path() local
107 if (block_device.empty()) { in secdiscard_path()
110 AutoCloseFD fs_fd(block_device, O_RDWR | O_LARGEFILE); in secdiscard_path()
112 PLOG(ERROR) << "Failed to open device " << block_device; in secdiscard_path()
/system/extras/ext4_utils/
Dext4_sb.h46 bool block_device; /* target fd is a block device? */ member
Dext4_utils.c195 if (info.block_device) in write_ext4_image()
370 ext4_queue_sb(group_start_block, info.block_device ? in ext4_fill_in_sb()
396 ext4_queue_sb(aux_info.first_data_block, info.block_device ? in ext4_fill_in_sb()
Dmake_ext4fs.c697 info.block_device = is_block_device_fd(fd); in make_ext4fs_internal()
699 if (info.block_device && (sparse || gzip || crc)) { in make_ext4fs_internal()