/system/sepolicy/prebuilts/api/27.0/public/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor. 12 allow otapreopt_chroot labeledfs:filesystem mount;
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor. 12 allow otapreopt_chroot labeledfs:filesystem mount;
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor. 12 allow otapreopt_chroot labeledfs:filesystem mount;
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor and mount/unmount ext4 images from 13 allow otapreopt_chroot labeledfs:filesystem { mount unmount }; 58 # Allow otapreopt_chroot to mount a tmpfs filesystem in /postinstall/apex. 59 allow otapreopt_chroot tmpfs:filesystem mount; 66 # Allow otapreopt_chroot to mount APEX packages in /postinstall/apex.
|
D | vold.te | 16 # Newly created storage dirs are always treated as mount stubs to prevent us 17 # from accidentally writing when the mount point isn't present.
|
D | art_apex_preinstall.te | 13 # We mount /data/ota/dalvik-cache over /data/dalvik-cache in our 14 # mount namespace.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor and mount/unmount ext4 images from 13 allow otapreopt_chroot labeledfs:filesystem { mount unmount }; 58 # Allow otapreopt_chroot to mount a tmpfs filesystem in /postinstall/apex. 59 allow otapreopt_chroot tmpfs:filesystem mount; 66 # Allow otapreopt_chroot to mount APEX packages in /postinstall/apex.
|
D | apexd.te | 34 # sys_admin is required to access the device-mapper and mount 37 # allow apexd to create a mount point in /apex 39 # allow apexd to mount in /apex 40 allow apexd apex_mnt_dir:filesystem { mount unmount }; 53 # Unmount and mount filesystems 54 allow apexd labeledfs:filesystem { mount unmount }; 85 # Allow self-execute for the fork mount helper.
|
D | vold.te | 16 # Newly created storage dirs are always treated as mount stubs to prevent us 17 # from accidentally writing when the mount point isn't present.
|
D | art_apex_preinstall.te | 13 # We mount /data/ota/dalvik-cache over /data/dalvik-cache in our 14 # mount namespace.
|
/system/sepolicy/private/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor and mount/unmount ext4 images from 13 allow otapreopt_chroot labeledfs:filesystem { mount unmount }; 58 # Allow otapreopt_chroot to mount a tmpfs filesystem in /postinstall/apex. 59 allow otapreopt_chroot tmpfs:filesystem mount; 66 # Allow otapreopt_chroot to mount APEX packages in /postinstall/apex.
|
D | art_apex_preinstall.te | 13 # We mount /data/ota/dalvik-cache over /data/dalvik-cache in our 14 # mount namespace.
|
D | vold.te | 16 # Newly created storage dirs are always treated as mount stubs to prevent us 17 # from accidentally writing when the mount point isn't present.
|
/system/core/init/ |
D | first_stage_init.cpp | 192 CHECKCALL(mount("tmpfs", "/dev", "tmpfs", MS_NOSUID, "mode=0755")); in FirstStageMain() 195 CHECKCALL(mount("devpts", "/dev/pts", "devpts", 0, NULL)); in FirstStageMain() 197 CHECKCALL(mount("proc", "/proc", "proc", 0, "hidepid=2,gid=" MAKE_STR(AID_READPROC))); in FirstStageMain() 205 CHECKCALL(mount("sysfs", "/sys", "sysfs", 0, NULL)); in FirstStageMain() 206 CHECKCALL(mount("selinuxfs", "/sys/fs/selinux", "selinuxfs", 0, NULL)); in FirstStageMain() 226 CHECKCALL(mount("tmpfs", "/mnt", "tmpfs", MS_NOEXEC | MS_NOSUID | MS_NODEV, in FirstStageMain() 236 CHECKCALL(mount("tmpfs", "/debug_ramdisk", "tmpfs", MS_NOEXEC | MS_NOSUID | MS_NODEV, in FirstStageMain() 283 if (mount("/first_stage_ramdisk", "/first_stage_ramdisk", nullptr, MS_BIND, nullptr) != 0) { in FirstStageMain()
|
D | switch_root.cpp | 80 if (mount(mount_path.c_str(), new_mount_path.c_str(), nullptr, MS_MOVE, nullptr) != 0) { in SwitchRoot() 89 if (mount(new_root.c_str(), "/", nullptr, MS_MOVE, nullptr) != 0) { in SwitchRoot()
|
/system/incremental_delivery/incfs/ |
D | MountRegistry.cpp | 348 auto& mount = mountsByGroup[std::string(groupId)]; in loadFrom() local 350 if (mount.root.empty()) { in loadFrom() 351 mount.root.assign(mountPoint); in loadFrom() 352 mount.backing.assign(items.rbegin()[1]); in loadFrom() 353 fixProcPath(mount.backing); in loadFrom() 355 LOG(WARNING) << "[incfs] incfs root '" << mount.root in loadFrom() 361 mount.bindPoints.emplace_back(std::string(subdir), std::move(mountPoint)); in loadFrom() 376 for (auto& [_, mount] : mountsByGroup) { in loadFrom() 379 binds.reserve(mount.bindPoints.size()); in loadFrom() 380 for (auto& [subdir, bind] : mount.bindPoints) { in loadFrom() [all …]
|
/system/apex/apexd/ |
D | apexd_prepostinstall.cpp | 85 for (const auto& mount : mounted_apexes) { in StageFnInstall() local 86 Result<void> st = apexd_private::Unmount(mount); in StageFnInstall() 88 LOG(ERROR) << "Failed to unmount " << mount.full_path << " from " in StageFnInstall() 89 << mount.mount_point << " after " << name << ": " in StageFnInstall() 156 if (mount(nullptr, "/", nullptr, MS_PRIVATE | MS_REC, nullptr) == -1) { in RunFnInstall()
|
D | flattened_apex_test.cpp | 59 for (const auto& mount : Split(mounts, "\n")) { in TEST() local 60 const std::vector<std::string>& tokens = Split(mount, " "); in TEST()
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | vold.te | 17 # Newly created storage dirs are always treated as mount stubs to prevent us 18 # from accidentally writing when the mount point isn't present.
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | vold.te | 17 # Newly created storage dirs are always treated as mount stubs to prevent us 18 # from accidentally writing when the mount point isn't present.
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | vold.te | 16 # Newly created storage dirs are always treated as mount stubs to prevent us 17 # from accidentally writing when the mount point isn't present.
|
/system/vold/fs/ |
D | Exfat.cpp | 64 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) { in Mount() 70 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) { in Mount()
|
D | Ext4.cpp | 88 ret = mount(c_source, c_target, "ext4", tmpmnt_flags, tmpmnt_opts); in Check() 140 rc = mount(c_source, c_target, "ext4", flags, NULL); in Mount() 145 rc = mount(c_source, c_target, "ext4", flags, NULL); in Mount()
|
D | F2fs.cpp | 59 int res = mount(c_source, c_target, "f2fs", flags, NULL); in Mount() 63 res = mount(c_source, c_target, "f2fs", flags | MS_RDONLY, NULL); in Mount()
|
/system/extras/cppreopts/ |
D | fstab.postinstall | 16 # Tries to mount system_other as a logical partition. If that fails, then 17 # mount as a physical partition.
|