OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:vold
(Results
26 - 50
of
273
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
/system/vold/
vdc.rc
4
#
vold
will set
vold
.decrypt to trigger_restart_framework (default
11
#
vold
will set
vold
.decrypt to trigger_restart_framework (default
vold.rc
1
service
vold
/system/bin/
vold
\
main.cpp
58
LOG(INFO) << "
Vold
3.0 (the awakening) firing up";
64
<< (android::
vold
::IsFilesystemSupported("ext4") ? " ext4" : "")
65
<< (android::
vold
::IsFilesystemSupported("f2fs") ? " f2fs" : "")
66
<< (android::
vold
::IsFilesystemSupported("vfat") ? " vfat" : "");
78
mkdir("/dev/block/
vold
", 0755);
94
if (android::base::GetBoolProperty("
vold
.debug", false)) {
112
if (android::
vold
::VoldNativeService::start() != android::OK) {
128
// a deadlock between
vold
and init (see b/34278978 for details)
129
android::base::SetProperty("
vold
.has_adoptable", has_adoptable ? "1" : "0");
130
android::base::SetProperty("
vold
.has_quota", has_quota ? "1" : "0")
[
all
...]
Ext4Crypt.cpp
63
using android::
vold
::kEmptyAuthentication;
64
using android::
vold
::KeyBuffer;
78
const std::string user_key_dir = std::string() + DATA_MNT_POINT + "/misc/
vold
/user_keys";
83
std::string() + DATA_MNT_POINT + "/misc/
vold
/volume_keys";
170
android::
vold
::destroyKey(other_path);
183
const android::
vold
::KeyAuthentication& auth,
189
if (android::
vold
::retrieveKey(ce_key_path, auth, ce_key)) {
200
const android::
vold
::KeyAuthentication& auth) {
205
if (!android::
vold
::installKey(ce_key, &ce_raw_ref)) return false;
234
if (!android::
vold
::randomKey(&de_key)) return false
[
all
...]
/system/sepolicy/prebuilts/api/26.0/private/
blkid_untrusted.te
5
# Allowed read-only access to
vold
block devices to extract UUID/label
9
# Allow stdin/out back to
vold
10
allow blkid_untrusted
vold
:fd use;
11
allow blkid_untrusted
vold
:fifo_file { read write getattr };
34
# Only allow entry from
vold
via blkid binary
35
neverallow { domain -
vold
} blkid_untrusted:process transition;
domain_deprecated.te
13
-
vold
45
-
vold
56
-
vold
68
-
vold
85
-
vold
145
-
vold
151
-
vold
156
-
vold
161
-
vold
178
-
vold
[
all
...]
/system/sepolicy/prebuilts/api/27.0/private/
blkid_untrusted.te
5
# Allowed read-only access to
vold
block devices to extract UUID/label
9
# Allow stdin/out back to
vold
10
allow blkid_untrusted
vold
:fd use;
11
allow blkid_untrusted
vold
:fifo_file { read write getattr };
34
# Only allow entry from
vold
via blkid binary
35
neverallow { domain -
vold
} blkid_untrusted:process transition;
/system/sepolicy/prebuilts/api/28.0/private/
blkid_untrusted.te
5
# Allowed read-only access to
vold
block devices to extract UUID/label
9
# Allow stdin/out back to
vold
10
allow blkid_untrusted
vold
:fd use;
11
allow blkid_untrusted
vold
:fifo_file { read write getattr };
34
# Only allow entry from
vold
via blkid binary
35
neverallow { domain -
vold
} blkid_untrusted:process transition;
coredomain.te
13
-
vold
vold_prepare_subdirs.te
1
domain_auto_trans(
vold
, vold_prepare_subdirs_exec, vold_prepare_subdirs)
7
allow vold_prepare_subdirs
vold
:fd use;
8
allow vold_prepare_subdirs
vold
:fifo_file { read write };
/system/sepolicy/private/
blkid_untrusted.te
5
# Allowed read-only access to
vold
block devices to extract UUID/label
9
# Allow stdin/out back to
vold
10
allow blkid_untrusted
vold
:fd use;
11
allow blkid_untrusted
vold
:fifo_file { read write getattr };
34
# Only allow entry from
vold
via blkid binary
35
neverallow { domain -
vold
} blkid_untrusted:process transition;
coredomain.te
13
-
vold
vold_prepare_subdirs.te
1
domain_auto_trans(
vold
, vold_prepare_subdirs_exec, vold_prepare_subdirs)
7
allow vold_prepare_subdirs
vold
:fd use;
8
allow vold_prepare_subdirs
vold
:fifo_file { read write };
/bootable/recovery/update_verifier/
update_verifier.rc
7
service update_verifier /system/bin/update_verifier ${
vold
.decrypt}
/system/sepolicy/prebuilts/api/28.0/public/
vdc.te
17
# vdc talks to
vold
over Binder
19
binder_call(vdc,
vold
)
fsck_untrusted.te
7
# Allow stdin/out back to
vold
8
allow fsck_untrusted
vold
:fd use;
9
allow fsck_untrusted
vold
:fifo_file { read write getattr };
11
# Run fsck on
vold
block devices
46
# Only allow entry from
vold
via fsck binaries
47
neverallow { domain -
vold
} fsck_untrusted:process transition;
fsck.te
12
# Allow stdin/out back to
vold
13
allow fsck
vold
:fd use;
14
allow fsck
vold
:fifo_file { read write getattr };
54
# Only allow entry from init or
vold
via fsck binaries
55
neverallow { domain -init -
vold
} fsck:process transition;
/system/sepolicy/public/
vdc.te
17
# vdc talks to
vold
over Binder
19
binder_call(vdc,
vold
)
fsck_untrusted.te
7
# Allow stdin/out back to
vold
8
allow fsck_untrusted
vold
:fd use;
9
allow fsck_untrusted
vold
:fifo_file { read write getattr };
11
# Run fsck on
vold
block devices
46
# Only allow entry from
vold
via fsck binaries
47
neverallow { domain -
vold
} fsck_untrusted:process transition;
fsck.te
12
# Allow stdin/out back to
vold
13
allow fsck
vold
:fd use;
14
allow fsck
vold
:fifo_file { read write getattr };
54
# Only allow entry from init or
vold
via fsck binaries
55
neverallow { domain -init -
vold
} fsck:process transition;
/system/sepolicy/prebuilts/api/26.0/public/
fsck_untrusted.te
7
# Allow stdin/out back to
vold
8
allow fsck_untrusted
vold
:fd use;
9
allow fsck_untrusted
vold
:fifo_file { read write getattr };
11
# Run fsck on
vold
block devices
46
# Only allow entry from
vold
via fsck binaries
47
neverallow { domain -
vold
} fsck_untrusted:process transition;
fsck.te
12
# Allow stdin/out back to
vold
13
allow fsck
vold
:fd use;
14
allow fsck
vold
:fifo_file { read write getattr };
52
# Only allow entry from init or
vold
via fsck binaries
53
neverallow { domain -init -
vold
} fsck:process transition;
vdc.te
11
unix_socket_connect(vdc,
vold
,
vold
)
/system/sepolicy/prebuilts/api/27.0/public/
fsck_untrusted.te
7
# Allow stdin/out back to
vold
8
allow fsck_untrusted
vold
:fd use;
9
allow fsck_untrusted
vold
:fifo_file { read write getattr };
11
# Run fsck on
vold
block devices
46
# Only allow entry from
vold
via fsck binaries
47
neverallow { domain -
vold
} fsck_untrusted:process transition;
fsck.te
12
# Allow stdin/out back to
vold
13
allow fsck
vold
:fd use;
14
allow fsck
vold
:fifo_file { read write getattr };
52
# Only allow entry from init or
vold
via fsck binaries
53
neverallow { domain -init -
vold
} fsck:process transition;
Completed in 442 milliseconds
1
2
3
4
5
6
7
8
9
10
11