/device/generic/qemu/ |
qemu_base.mk | 69 vold \
|
/system/vold/ |
Android.mk | 85 LOCAL_MODULE:= vold
|
CommandListener.cpp | 54 FrameworkListener("vold", true) { 218 if (mountFlags & android::vold::VolumeBase::MountFlags::kPrimary) { 252 (new android::vold::MoveTask(fromVol, toVol))->start(); 283 /* Guarantied to be initialized by vold's main() before the CommandListener is active */ 612 flags = android::vold::TrimTask::Flags::kBenchmarkAfter; 614 flags = android::vold::TrimTask::Flags::kDeepTrim; 616 flags = android::vold::TrimTask::Flags::kDeepTrim 617 | android::vold::TrimTask::Flags::kBenchmarkAfter; 620 (new android::vold::TrimTask(flags))->start();
|
NetlinkManager.cpp | 29 #define LOG_TAG "Vold"
|
cryptfs.c | 411 * we have to use a daemon or similar to store the password. Since vold [all...] |
MoveTask.cpp | 35 namespace vold { namespace in namespace:android 223 } // namespace vold
|
VolumeBase.cpp | 36 namespace vold { namespace in namespace:android 255 } // namespace vold
|
Disk.cpp | 44 namespace vold { namespace in namespace:android 86 mDevPath = StringPrintf("/dev/block/vold/%s", mId.c_str()); 502 } // namespace vold
|
Utils.cpp | 48 namespace vold { namespace in namespace:android 56 static const char* kKeyPath = "/data/misc/vold"; 548 } // namespace vold
|
/device/moto/shamu/cryptfs_hw/ |
cryptfs_hw.c | 45 // and would return an error ERR_MAX_PASSWORD_ATTEMPTS to VOLD. VOLD would
|
/docs/source.android.com/src/devices/storage/ |
config-example.jd | 31 it. <code>vold</code> will then manage the <code>fuse_sdcard0</code> service 102 access it. <code>vold</code> will then manage the <code>fuse_sdcard1</code>
|
/external/sepolicy/ |
init.te | 180 # Init creates vold's directory on boot, and walks through 269 unix_socket_connect(init, vold, vold)
|
property_contexts | 51 vold. u:object_r:vold_prop:s0
|
zygote.te | 60 # Allowed to create user-specific storage source if started before vold
|
file_contexts | 45 /dev/block/vold/.+ u:object_r:vold_device:s0 103 /dev/socket/vold u:object_r:vold_socket:s0 146 /system/bin/vold u:object_r:vold_exec:s0 256 /data/misc/vold(/.*)? u:object_r:vold_data_file:s0 277 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0
|
system_server.te | 118 unix_socket_connect(system_server, vold, vold) 254 # Read pkg.apk file before it has been relabeled by vold.
|
file.te | 93 # Mount locations managed by vold
|
/system/vold/bench/ |
benchgen.py | 165 namespace vold { 272 if (android::vold::ReadRandomBytes(chunk, buf) != OK) { 321 } // namespace vold
|
/bootable/recovery/ |
Android.mk | 59 system/vold \
|
/hardware/libhardware/include/hardware/ |
keymaster_common.h | 88 * This is currently used by "vold" to know whether the whole disk
|
/frameworks/base/services/usb/java/com/android/server/usb/ |
UsbDebuggingManager.java | 264 SystemProperties.get("vold.decrypt"))) { 265 Slog.d(TAG, "Deferring adb confirmation until after vold decrypt");
|
/cts/tools/device-setup/TestDeviceSetup/src/android/tests/getinfo/ |
RootProcessScanner.java | 40 "vold",
|
/system/core/adb/ |
set_verity_enable_state_service.cpp | 186 /* Loop through entries looking for ones that vold manages */
|
/system/core/fs_mgr/ |
fs_mgr.c | 285 ret = __system_property_get("ro.vold.forceencryption", value); 514 /* Don't mount entries that are managed by vold */ 617 * properties that vold will query later for decrypting 867 /* Don't deal with vold managed enryptable partitions here */
|
/frameworks/base/services/core/java/com/android/server/ |
MountService.java | 141 * Service responsible for various storage media. Connects to {@code vold} to 203 * Internal vold response code constants 278 * <em>Never</em> hold the lock while performing downcalls into vold, since 601 // so it is safe to directly call into vold. 687 Slog.w(TAG, "Failed to send user details to vold", e); 760 UserHandle.getAppId(provider.applicationInfo.uid), "vold reset"); 792 // Tell vold about all existing and started users 802 Slog.w(TAG, "Failed to reset vold", e); [all...] |