HomeSort by relevance Sort by last modified time
    Searched full:vold (Results 26 - 50 of 273) sorted by null

12 3 4 5 6 7 8 91011

  /system/vold/
vdc.rc 4 # vold will set vold.decrypt to trigger_restart_framework (default
11 # vold will set vold.decrypt to trigger_restart_framework (default
vold.rc 1 service vold /system/bin/vold \
main.cpp 58 LOG(INFO) << "Vold 3.0 (the awakening) firing up";
64 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "")
65 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "")
66 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : "");
78 mkdir("/dev/block/vold", 0755);
94 if (android::base::GetBoolProperty("vold.debug", false)) {
112 if (android::vold::VoldNativeService::start() != android::OK) {
128 // a deadlock between vold and init (see b/34278978 for details)
129 android::base::SetProperty("vold.has_adoptable", has_adoptable ? "1" : "0");
130 android::base::SetProperty("vold.has_quota", has_quota ? "1" : "0")
    [all...]
Ext4Crypt.cpp 63 using android::vold::kEmptyAuthentication;
64 using android::vold::KeyBuffer;
78 const std::string user_key_dir = std::string() + DATA_MNT_POINT + "/misc/vold/user_keys";
83 std::string() + DATA_MNT_POINT + "/misc/vold/volume_keys";
170 android::vold::destroyKey(other_path);
183 const android::vold::KeyAuthentication& auth,
189 if (android::vold::retrieveKey(ce_key_path, auth, ce_key)) {
200 const android::vold::KeyAuthentication& auth) {
205 if (!android::vold::installKey(ce_key, &ce_raw_ref)) return false;
234 if (!android::vold::randomKey(&de_key)) return false
    [all...]
  /system/sepolicy/prebuilts/api/26.0/private/
blkid_untrusted.te 5 # Allowed read-only access to vold block devices to extract UUID/label
9 # Allow stdin/out back to vold
10 allow blkid_untrusted vold:fd use;
11 allow blkid_untrusted vold:fifo_file { read write getattr };
34 # Only allow entry from vold via blkid binary
35 neverallow { domain -vold } blkid_untrusted:process transition;
domain_deprecated.te 13 -vold
45 -vold
56 -vold
68 -vold
85 -vold
145 -vold
151 -vold
156 -vold
161 -vold
178 -vold
    [all...]
  /system/sepolicy/prebuilts/api/27.0/private/
blkid_untrusted.te 5 # Allowed read-only access to vold block devices to extract UUID/label
9 # Allow stdin/out back to vold
10 allow blkid_untrusted vold:fd use;
11 allow blkid_untrusted vold:fifo_file { read write getattr };
34 # Only allow entry from vold via blkid binary
35 neverallow { domain -vold } blkid_untrusted:process transition;
  /system/sepolicy/prebuilts/api/28.0/private/
blkid_untrusted.te 5 # Allowed read-only access to vold block devices to extract UUID/label
9 # Allow stdin/out back to vold
10 allow blkid_untrusted vold:fd use;
11 allow blkid_untrusted vold:fifo_file { read write getattr };
34 # Only allow entry from vold via blkid binary
35 neverallow { domain -vold } blkid_untrusted:process transition;
coredomain.te 13 -vold
vold_prepare_subdirs.te 1 domain_auto_trans(vold, vold_prepare_subdirs_exec, vold_prepare_subdirs)
7 allow vold_prepare_subdirs vold:fd use;
8 allow vold_prepare_subdirs vold:fifo_file { read write };
  /system/sepolicy/private/
blkid_untrusted.te 5 # Allowed read-only access to vold block devices to extract UUID/label
9 # Allow stdin/out back to vold
10 allow blkid_untrusted vold:fd use;
11 allow blkid_untrusted vold:fifo_file { read write getattr };
34 # Only allow entry from vold via blkid binary
35 neverallow { domain -vold } blkid_untrusted:process transition;
coredomain.te 13 -vold
vold_prepare_subdirs.te 1 domain_auto_trans(vold, vold_prepare_subdirs_exec, vold_prepare_subdirs)
7 allow vold_prepare_subdirs vold:fd use;
8 allow vold_prepare_subdirs vold:fifo_file { read write };
  /bootable/recovery/update_verifier/
update_verifier.rc 7 service update_verifier /system/bin/update_verifier ${vold.decrypt}
  /system/sepolicy/prebuilts/api/28.0/public/
vdc.te 17 # vdc talks to vold over Binder
19 binder_call(vdc, vold)
fsck_untrusted.te 7 # Allow stdin/out back to vold
8 allow fsck_untrusted vold:fd use;
9 allow fsck_untrusted vold:fifo_file { read write getattr };
11 # Run fsck on vold block devices
46 # Only allow entry from vold via fsck binaries
47 neverallow { domain -vold } fsck_untrusted:process transition;
fsck.te 12 # Allow stdin/out back to vold
13 allow fsck vold:fd use;
14 allow fsck vold:fifo_file { read write getattr };
54 # Only allow entry from init or vold via fsck binaries
55 neverallow { domain -init -vold } fsck:process transition;
  /system/sepolicy/public/
vdc.te 17 # vdc talks to vold over Binder
19 binder_call(vdc, vold)
fsck_untrusted.te 7 # Allow stdin/out back to vold
8 allow fsck_untrusted vold:fd use;
9 allow fsck_untrusted vold:fifo_file { read write getattr };
11 # Run fsck on vold block devices
46 # Only allow entry from vold via fsck binaries
47 neverallow { domain -vold } fsck_untrusted:process transition;
fsck.te 12 # Allow stdin/out back to vold
13 allow fsck vold:fd use;
14 allow fsck vold:fifo_file { read write getattr };
54 # Only allow entry from init or vold via fsck binaries
55 neverallow { domain -init -vold } fsck:process transition;
  /system/sepolicy/prebuilts/api/26.0/public/
fsck_untrusted.te 7 # Allow stdin/out back to vold
8 allow fsck_untrusted vold:fd use;
9 allow fsck_untrusted vold:fifo_file { read write getattr };
11 # Run fsck on vold block devices
46 # Only allow entry from vold via fsck binaries
47 neverallow { domain -vold } fsck_untrusted:process transition;
fsck.te 12 # Allow stdin/out back to vold
13 allow fsck vold:fd use;
14 allow fsck vold:fifo_file { read write getattr };
52 # Only allow entry from init or vold via fsck binaries
53 neverallow { domain -init -vold } fsck:process transition;
vdc.te 11 unix_socket_connect(vdc, vold, vold)
  /system/sepolicy/prebuilts/api/27.0/public/
fsck_untrusted.te 7 # Allow stdin/out back to vold
8 allow fsck_untrusted vold:fd use;
9 allow fsck_untrusted vold:fifo_file { read write getattr };
11 # Run fsck on vold block devices
46 # Only allow entry from vold via fsck binaries
47 neverallow { domain -vold } fsck_untrusted:process transition;
fsck.te 12 # Allow stdin/out back to vold
13 allow fsck vold:fd use;
14 allow fsck vold:fifo_file { read write getattr };
52 # Only allow entry from init or vold via fsck binaries
53 neverallow { domain -init -vold } fsck:process transition;

Completed in 442 milliseconds

12 3 4 5 6 7 8 91011