HomeSort by relevance Sort by last modified time
    Searched full:vold (Results 51 - 75 of 124) sorted by null

1 23 4 5

  /device/generic/qemu/
qemu_base.mk 69 vold \
  /system/vold/
Android.mk 85 LOCAL_MODULE:= vold
CommandListener.cpp 54 FrameworkListener("vold", true) {
218 if (mountFlags & android::vold::VolumeBase::MountFlags::kPrimary) {
252 (new android::vold::MoveTask(fromVol, toVol))->start();
283 /* Guarantied to be initialized by vold's main() before the CommandListener is active */
612 flags = android::vold::TrimTask::Flags::kBenchmarkAfter;
614 flags = android::vold::TrimTask::Flags::kDeepTrim;
616 flags = android::vold::TrimTask::Flags::kDeepTrim
617 | android::vold::TrimTask::Flags::kBenchmarkAfter;
620 (new android::vold::TrimTask(flags))->start();
NetlinkManager.cpp 29 #define LOG_TAG "Vold"
cryptfs.c 411 * we have to use a daemon or similar to store the password. Since vold
    [all...]
MoveTask.cpp 35 namespace vold { namespace in namespace:android
223 } // namespace vold
VolumeBase.cpp 36 namespace vold { namespace in namespace:android
255 } // namespace vold
Disk.cpp 44 namespace vold { namespace in namespace:android
86 mDevPath = StringPrintf("/dev/block/vold/%s", mId.c_str());
502 } // namespace vold
Utils.cpp 48 namespace vold { namespace in namespace:android
56 static const char* kKeyPath = "/data/misc/vold";
548 } // namespace vold
  /device/moto/shamu/cryptfs_hw/
cryptfs_hw.c 45 // and would return an error ERR_MAX_PASSWORD_ATTEMPTS to VOLD. VOLD would
  /docs/source.android.com/src/devices/storage/
config-example.jd 31 it. <code>vold</code> will then manage the <code>fuse_sdcard0</code> service
102 access it. <code>vold</code> will then manage the <code>fuse_sdcard1</code>
  /external/sepolicy/
init.te 180 # Init creates vold's directory on boot, and walks through
269 unix_socket_connect(init, vold, vold)
property_contexts 51 vold. u:object_r:vold_prop:s0
zygote.te 60 # Allowed to create user-specific storage source if started before vold
file_contexts 45 /dev/block/vold/.+ u:object_r:vold_device:s0
103 /dev/socket/vold u:object_r:vold_socket:s0
146 /system/bin/vold u:object_r:vold_exec:s0
256 /data/misc/vold(/.*)? u:object_r:vold_data_file:s0
277 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0
system_server.te 118 unix_socket_connect(system_server, vold, vold)
254 # Read pkg.apk file before it has been relabeled by vold.
file.te 93 # Mount locations managed by vold
  /system/vold/bench/
benchgen.py 165 namespace vold {
272 if (android::vold::ReadRandomBytes(chunk, buf) != OK) {
321 } // namespace vold
  /bootable/recovery/
Android.mk 59 system/vold \
  /hardware/libhardware/include/hardware/
keymaster_common.h 88 * This is currently used by "vold" to know whether the whole disk
  /frameworks/base/services/usb/java/com/android/server/usb/
UsbDebuggingManager.java 264 SystemProperties.get("vold.decrypt"))) {
265 Slog.d(TAG, "Deferring adb confirmation until after vold decrypt");
  /cts/tools/device-setup/TestDeviceSetup/src/android/tests/getinfo/
RootProcessScanner.java 40 "vold",
  /system/core/adb/
set_verity_enable_state_service.cpp 186 /* Loop through entries looking for ones that vold manages */
  /system/core/fs_mgr/
fs_mgr.c 285 ret = __system_property_get("ro.vold.forceencryption", value);
514 /* Don't mount entries that are managed by vold */
617 * properties that vold will query later for decrypting
867 /* Don't deal with vold managed enryptable partitions here */
  /frameworks/base/services/core/java/com/android/server/
MountService.java 141 * Service responsible for various storage media. Connects to {@code vold} to
203 * Internal vold response code constants
278 * <em>Never</em> hold the lock while performing downcalls into vold, since
601 // so it is safe to directly call into vold.
687 Slog.w(TAG, "Failed to send user details to vold", e);
760 UserHandle.getAppId(provider.applicationInfo.uid), "vold reset");
792 // Tell vold about all existing and started users
802 Slog.w(TAG, "Failed to reset vold", e);
    [all...]

Completed in 409 milliseconds

1 23 4 5