/external/sepolicy/ |
vold.te | 2 type vold, domain; 5 init_daemon_domain(vold) 8 domain_auto_trans(vold, sgdisk_exec, sgdisk); 9 domain_auto_trans(vold, sdcardd_exec, sdcardd); 13 domain_trans(vold, shell_exec, blkid); 14 domain_trans(vold, shell_exec, blkid_untrusted); 15 domain_trans(vold, fsck_exec, fsck); 16 domain_trans(vold, fsck_exec, fsck_untrusted); 19 allow vold self:process setexec; 22 allow vold shell_exec:file rx_file_perms [all...] |
blkid.te | 1 # blkid called from vold 10 # Allow stdin/out back to vold 11 allow blkid vold:fd use; 12 allow blkid vold:fifo_file { read write getattr }; 17 # Only allow entry from vold 18 neverallow { domain -vold } blkid:process transition;
|
sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
blkid_untrusted.te | 4 # Allowed read-only access to vold block devices to extract UUID/label 8 # Allow stdin/out back to vold 9 allow blkid_untrusted vold:fd use; 10 allow blkid_untrusted vold:fifo_file { read write getattr }; 33 # Only allow entry from vold via blkid binary 34 neverallow { domain -vold } blkid_untrusted:process transition;
|
fsck_untrusted.te | 7 # Allow stdin/out back to vold 8 allow fsck_untrusted vold:fd use; 9 allow fsck_untrusted vold:fifo_file { read write getattr }; 11 # Run fsck on vold block devices 33 # Only allow entry from vold via fsck binaries 34 neverallow { domain -vold } fsck_untrusted:process transition;
|
fsck.te | 14 # Allow stdin/out back to vold 15 allow fsck vold:fd use; 16 allow fsck vold:fifo_file { read write getattr }; 40 # Only allow entry from init or vold via fsck binaries 41 neverallow { domain -init -vold } fsck:process transition;
|
vdc.te | 13 unix_socket_connect(vdc, vold, vold)
|
sdcardd.te | 26 # Allow stdin/out back to vold 27 allow sdcardd vold:fd use; 28 allow sdcardd vold:fifo_file { read write getattr };
|
/system/vold/ |
main.cpp | 56 LOG(INFO) << "Vold 3.0 (the awakening) firing up"; 59 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "") 60 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "") 61 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : ""); 76 fcntl(android_get_control_socket("vold"), F_SETFD, FD_CLOEXEC); 79 mkdir("/dev/block/vold", 0755); 95 if (property_get_bool("vold.debug", false)) { 139 LOG(ERROR) << "Vold exiting"; 154 case 'b': android::vold::sBlkidContext = optarg; break; 155 case 'B': android::vold::sBlkidUntrustedContext = optarg; break [all...] |
Benchmark.h | 26 namespace vold { namespace in namespace:android 31 } // namespace vold
|
Benchmark.cpp | 37 namespace vold { namespace in namespace:android 138 if (android::vold::PrepareDir(benchPath, 01771, AID_SYSTEM, AID_MISC)) { 141 benchPath += "/vold"; 142 if (android::vold::PrepareDir(benchPath, 0700, AID_ROOT, AID_ROOT)) { 146 if (android::vold::PrepareDir(benchPath, 0700, AID_ROOT, AID_ROOT)) { 152 } // namespace vold
|
MoveTask.h | 26 namespace vold { namespace in namespace:android 45 } // namespace vold
|
TrimTask.h | 26 namespace vold { namespace in namespace:android 51 } // namespace vold
|
VolumeManager.h | 118 std::shared_ptr<android::vold::Disk> findDisk(const std::string& id); 119 std::shared_ptr<android::vold::VolumeBase> findVolume(const std::string& id); 121 void listVolumes(android::vold::VolumeBase::Type type, std::list<std::string>& list); 132 int setPrimary(const std::shared_ptr<android::vold::VolumeBase>& vol); 193 * ensures that path belongs to a volume managed by vold. 209 std::list<std::shared_ptr<android::vold::Disk>> mDisks; 214 std::shared_ptr<android::vold::VolumeBase> mInternalEmulated; 215 std::shared_ptr<android::vold::VolumeBase> mPrimary;
|
TrimTask.cpp | 45 namespace vold { namespace in namespace:android 50 // Collect both fstab and vold volumes 71 fstab = fs_mgr_read_fstab(android::vold::DefaultFstabPath().c_str()); 154 } // namespace vold
|
EmulatedVolume.h | 25 namespace vold { namespace in namespace:android 62 } // namespace vold
|
PrivateVolume.h | 25 namespace vold { namespace in namespace:android 75 } // namespace vold
|
PublicVolume.h | 25 namespace vold { namespace in namespace:android 80 } // namespace vold
|
vdc.c | 57 const char* sockname = "vold"; 112 printf("[Connected to Vold]\n"); 137 fprintf(stderr, "Lost connection to Vold - did it crash?\n");
|
/docs/source.android.com/src/devices/tech/security/encryption/ |
index.jd | 84 href="https://android.googlesource.com/platform/system/vold/+/master/cryptfs.c">cryptfs.c</a> 91 <p>Encryption is managed by <code>init</code> and <code>vold</code>. <code>init</code> calls <code>vold</code>, and vold sets properties to trigger events in init. Other parts of the system 94 encryption features in <code>vold</code>, the system uses the command line tool <code>vdc</code>?s <code>cryptfs</code> commands: <code>checkpw</code>, <code>restart</code>, <code>enablecrypto</code>, <code>changepw</code>, <code>cryptocomplete</code>, <code>verifypw</code>, <code>setfield</code>, <code>getfield</code>, <code>mountdefaultencrypted</code>, <code>getpwtype</code>, <code>getpw</code>, and <code>clearpw</code>.</p> 108 <p>To trigger these actions, the <code>vold.decrypt</code> property is set to <a href="https://android.googlesource.com/platform/system/vold/+/master/cryptfs.c">various strings</a>. To kill and restart services, the <code>init</code> commands are:</p> 151 <p><code>vold.decrypt = "trigger_encryption"</code> triggers <code>init.rc</code>, which will cause <code>vold</code> to encrypt <code>/data</code> with no password. (None is set because this should be a new device.)</p> 157 <p><code>vold</code> mounts a tmpfs <code>/data</code> (using the tmpfs options fro [all...] |
/system/vold/fs/ |
F2fs.h | 25 namespace vold { namespace in namespace:android 35 } // namespace vold
|
Ext4.h | 25 namespace vold { namespace in namespace:android 38 } // namespace vold
|
Vfat.h | 25 namespace vold { namespace in namespace:android 37 } // namespace vold
|
/docs/source.android.com/src/devices/storage/ |
config.jd | 20 <p>External storage is managed by a combination of the <code>vold</code> init 22 external storage volumes is handled by <code>vold</code>, which performs 25 <p>For Android 4.2.2 and earlier, the device-specific <code>vold.fstab</code> 42 <p>For Android releases 4.3 and later, the various fstab files used by init, vold and 44 storage volumes that are managed by <code>vold</code>, the entries should have the 54 <li><code>mnt_flags</code>: <code>Vold</code> ignores this field and it should be set 56 <li><code>fs_mgr_flags</code>: <code>Vold</code> ignores any lines in the unified fstab
|
/system/core/rootdir/ |
init.rc | 55 # Mount staging areas for devices managed by vold 265 start vold 305 mkdir /data/misc/vold 0700 root root 367 # Set indication (checked by vold) that we have finished this action 368 #setprop vold.post_fs_data_done 1 466 on property:vold.decrypt=trigger_default_encryption 469 on property:vold.decrypt=trigger_encryption 479 on property:vold.decrypt=trigger_reset_main 482 on property:vold.decrypt=trigger_load_persist_props 487 on property:vold.decrypt=trigger_post_fs_dat [all...] |