HomeSort by relevance Sort by last modified time
    Searched full:vold (Results 1 - 25 of 124) sorted by null

1 2 3 4 5

  /external/sepolicy/
vold.te 2 type vold, domain;
5 init_daemon_domain(vold)
8 domain_auto_trans(vold, sgdisk_exec, sgdisk);
9 domain_auto_trans(vold, sdcardd_exec, sdcardd);
13 domain_trans(vold, shell_exec, blkid);
14 domain_trans(vold, shell_exec, blkid_untrusted);
15 domain_trans(vold, fsck_exec, fsck);
16 domain_trans(vold, fsck_exec, fsck_untrusted);
19 allow vold self:process setexec;
22 allow vold shell_exec:file rx_file_perms
    [all...]
blkid.te 1 # blkid called from vold
10 # Allow stdin/out back to vold
11 allow blkid vold:fd use;
12 allow blkid vold:fifo_file { read write getattr };
17 # Only allow entry from vold
18 neverallow { domain -vold } blkid:process transition;
sgdisk.te 1 # sgdisk called from vold
12 # Allow stdin/out back to vold
13 allow sgdisk vold:fd use;
14 allow sgdisk vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } sgdisk:process transition;
blkid_untrusted.te 4 # Allowed read-only access to vold block devices to extract UUID/label
8 # Allow stdin/out back to vold
9 allow blkid_untrusted vold:fd use;
10 allow blkid_untrusted vold:fifo_file { read write getattr };
33 # Only allow entry from vold via blkid binary
34 neverallow { domain -vold } blkid_untrusted:process transition;
fsck_untrusted.te 7 # Allow stdin/out back to vold
8 allow fsck_untrusted vold:fd use;
9 allow fsck_untrusted vold:fifo_file { read write getattr };
11 # Run fsck on vold block devices
33 # Only allow entry from vold via fsck binaries
34 neverallow { domain -vold } fsck_untrusted:process transition;
fsck.te 14 # Allow stdin/out back to vold
15 allow fsck vold:fd use;
16 allow fsck vold:fifo_file { read write getattr };
40 # Only allow entry from init or vold via fsck binaries
41 neverallow { domain -init -vold } fsck:process transition;
vdc.te 13 unix_socket_connect(vdc, vold, vold)
sdcardd.te 26 # Allow stdin/out back to vold
27 allow sdcardd vold:fd use;
28 allow sdcardd vold:fifo_file { read write getattr };
  /system/vold/
main.cpp 56 LOG(INFO) << "Vold 3.0 (the awakening) firing up";
59 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "")
60 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "")
61 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : "");
76 fcntl(android_get_control_socket("vold"), F_SETFD, FD_CLOEXEC);
79 mkdir("/dev/block/vold", 0755);
95 if (property_get_bool("vold.debug", false)) {
139 LOG(ERROR) << "Vold exiting";
154 case 'b': android::vold::sBlkidContext = optarg; break;
155 case 'B': android::vold::sBlkidUntrustedContext = optarg; break
    [all...]
Benchmark.h 26 namespace vold { namespace in namespace:android
31 } // namespace vold
Benchmark.cpp 37 namespace vold { namespace in namespace:android
138 if (android::vold::PrepareDir(benchPath, 01771, AID_SYSTEM, AID_MISC)) {
141 benchPath += "/vold";
142 if (android::vold::PrepareDir(benchPath, 0700, AID_ROOT, AID_ROOT)) {
146 if (android::vold::PrepareDir(benchPath, 0700, AID_ROOT, AID_ROOT)) {
152 } // namespace vold
MoveTask.h 26 namespace vold { namespace in namespace:android
45 } // namespace vold
TrimTask.h 26 namespace vold { namespace in namespace:android
51 } // namespace vold
VolumeManager.h 118 std::shared_ptr<android::vold::Disk> findDisk(const std::string& id);
119 std::shared_ptr<android::vold::VolumeBase> findVolume(const std::string& id);
121 void listVolumes(android::vold::VolumeBase::Type type, std::list<std::string>& list);
132 int setPrimary(const std::shared_ptr<android::vold::VolumeBase>& vol);
193 * ensures that path belongs to a volume managed by vold.
209 std::list<std::shared_ptr<android::vold::Disk>> mDisks;
214 std::shared_ptr<android::vold::VolumeBase> mInternalEmulated;
215 std::shared_ptr<android::vold::VolumeBase> mPrimary;
TrimTask.cpp 45 namespace vold { namespace in namespace:android
50 // Collect both fstab and vold volumes
71 fstab = fs_mgr_read_fstab(android::vold::DefaultFstabPath().c_str());
154 } // namespace vold
EmulatedVolume.h 25 namespace vold { namespace in namespace:android
62 } // namespace vold
PrivateVolume.h 25 namespace vold { namespace in namespace:android
75 } // namespace vold
PublicVolume.h 25 namespace vold { namespace in namespace:android
80 } // namespace vold
vdc.c 57 const char* sockname = "vold";
112 printf("[Connected to Vold]\n");
137 fprintf(stderr, "Lost connection to Vold - did it crash?\n");
  /docs/source.android.com/src/devices/tech/security/encryption/
index.jd 84 href="https://android.googlesource.com/platform/system/vold/+/master/cryptfs.c">cryptfs.c</a>
91 <p>Encryption is managed by <code>init</code> and <code>vold</code>. <code>init</code> calls <code>vold</code>, and vold sets properties to trigger events in init. Other parts of the system
94 encryption features in <code>vold</code>, the system uses the command line tool <code>vdc</code>?s <code>cryptfs</code> commands: <code>checkpw</code>, <code>restart</code>, <code>enablecrypto</code>, <code>changepw</code>, <code>cryptocomplete</code>, <code>verifypw</code>, <code>setfield</code>, <code>getfield</code>, <code>mountdefaultencrypted</code>, <code>getpwtype</code>, <code>getpw</code>, and <code>clearpw</code>.</p>
108 <p>To trigger these actions, the <code>vold.decrypt</code> property is set to <a href="https://android.googlesource.com/platform/system/vold/+/master/cryptfs.c">various strings</a>. To kill and restart services, the <code>init</code> commands are:</p>
151 <p><code>vold.decrypt = "trigger_encryption"</code> triggers <code>init.rc</code>, which will cause <code>vold</code> to encrypt <code>/data</code> with no password. (None is set because this should be a new device.)</p>
157 <p><code>vold</code> mounts a tmpfs <code>/data</code> (using the tmpfs options fro
    [all...]
  /system/vold/fs/
F2fs.h 25 namespace vold { namespace in namespace:android
35 } // namespace vold
Ext4.h 25 namespace vold { namespace in namespace:android
38 } // namespace vold
Vfat.h 25 namespace vold { namespace in namespace:android
37 } // namespace vold
  /docs/source.android.com/src/devices/storage/
config.jd 20 <p>External storage is managed by a combination of the <code>vold</code> init
22 external storage volumes is handled by <code>vold</code>, which performs
25 <p>For Android 4.2.2 and earlier, the device-specific <code>vold.fstab</code>
42 <p>For Android releases 4.3 and later, the various fstab files used by init, vold and
44 storage volumes that are managed by <code>vold</code>, the entries should have the
54 <li><code>mnt_flags</code>: <code>Vold</code> ignores this field and it should be set
56 <li><code>fs_mgr_flags</code>: <code>Vold</code> ignores any lines in the unified fstab
  /system/core/rootdir/
init.rc 55 # Mount staging areas for devices managed by vold
265 start vold
305 mkdir /data/misc/vold 0700 root root
367 # Set indication (checked by vold) that we have finished this action
368 #setprop vold.post_fs_data_done 1
466 on property:vold.decrypt=trigger_default_encryption
469 on property:vold.decrypt=trigger_encryption
479 on property:vold.decrypt=trigger_reset_main
482 on property:vold.decrypt=trigger_load_persist_props
487 on property:vold.decrypt=trigger_post_fs_dat
    [all...]

Completed in 6656 milliseconds

1 2 3 4 5