blob: e62d7a958cccda36fb3c0389e03faa714ff14a4a [file] [log] [blame]
Alex Klyubinf5446eb2017-03-23 14:27:32 -07001typeattribute vold coredomain;
2
dcashmancc39f632016-07-22 13:13:11 -07003init_daemon_domain(vold)
4
5# Switch to more restrictive domains when executing common tools
6domain_auto_trans(vold, sgdisk_exec, sgdisk);
7domain_auto_trans(vold, sdcardd_exec, sdcardd);
8
9# For a handful of probing tools, we choose an even more restrictive
10# domain when working with untrusted block devices
Paul Crowleyf9f75392018-11-30 15:58:26 -080011domain_trans(vold, blkid_exec, blkid);
12domain_trans(vold, blkid_exec, blkid_untrusted);
dcashmancc39f632016-07-22 13:13:11 -070013domain_trans(vold, fsck_exec, fsck);
14domain_trans(vold, fsck_exec, fsck_untrusted);
15
16# Newly created storage dirs are always treated as mount stubs to prevent us
17# from accidentally writing when the mount point isn't present.
18type_transition vold storage_file:dir storage_stub_file;
19type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file;
Inseob Kim55e5c9b2020-03-04 17:20:35 +090020
21# Property Service
Inseob Kim3f5a7d22020-04-06 20:49:17 +090022get_prop(vold, vold_config_prop)
Martijn Coenen01234d32020-04-10 14:11:49 +020023get_prop(vold, storage_config_prop);
Songchun Fan9fdcbcd2020-04-28 13:24:54 -070024get_prop(vold, incremental_prop);
Inseob Kim3f5a7d22020-04-06 20:49:17 +090025
Inseob Kim55e5c9b2020-03-04 17:20:35 +090026set_prop(vold, vold_prop)
Inseob Kim3f5a7d22020-04-06 20:49:17 +090027set_prop(vold, vold_status_prop)
Inseob Kim55e5c9b2020-03-04 17:20:35 +090028set_prop(vold, powerctl_prop)
29set_prop(vold, ctl_fuse_prop)
30set_prop(vold, restorecon_prop)
31set_prop(vold, ota_prop)
32set_prop(vold, boottime_prop)