Home
last modified time | relevance | path

Searched refs:mnt (Results 1 – 25 of 90) sorted by relevance

1234

/system/apex/apexer/
Druntests.sh99 mkdir ${output_dir}/mnt
101 sudo mount -o ro /dev/loop10 ${output_dir}/mnt
109 sudo diff ${manifest_file} ${output_dir}/mnt/apex_manifest.pb
111 sudo diff ${input_dir}/file1 ${output_dir}/mnt/file1
112 sudo diff ${input_dir}/file2 ${output_dir}/mnt/file2
113 sudo diff ${input_dir}/sub/file3 ${output_dir}/mnt/sub/file3
114 [ `sudo readlink ${output_dir}/mnt/sym1` = "file1" ]
117 [ `sudo stat -c '%u,%g,%A' ${output_dir}/mnt/file1` = "1001,1001,-rw-r--r--" ]
118 [ `sudo stat -c '%u,%g,%A' ${output_dir}/mnt/file2` = "1001,1001,-rw-r--r--" ]
119 [ `sudo stat -c '%u,%g,%A' ${output_dir}/mnt/sub` = "1002,1002,drw-r--r--" ]
[all …]
/system/vold/
DFileDeviceUtils.cpp51 struct mntent* mnt; // getmntent returns a thread local, so it's safe. in BlockDeviceForPath() local
52 while ((mnt = getmntent(mnts.get())) != nullptr) { in BlockDeviceForPath()
53 auto l = strlen(mnt->mnt_dir); in BlockDeviceForPath()
55 path.compare(0, l, mnt->mnt_dir) == 0) { in BlockDeviceForPath()
56 result = mnt->mnt_fsname; in BlockDeviceForPath()
/system/sepolicy/private/
Dfile_contexts_overlayfs7 /mnt/scratch/overlay/(system|product)/upper u:object_r:system_file:s0
8 /mnt/scratch/overlay/(vendor|odm)/upper u:object_r:vendor_file:s0
9 /mnt/scratch/overlay/oem/upper u:object_r:vendor_file:s0
Dmediaprovider_app.te8 # Access to /mnt/pass_through.
46 # Access external sdcards through /mnt/media_rw
Dfile_contexts29 /mnt u:object_r:tmpfs:s0
648 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0
649 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0
650 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0
651 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0
652 # /mnt/expand/..../app/[randomStringA]/[packageName]-[randomStringB]/base.apk layout
653 /mnt/expand/[^/]+/app/[^/]+/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0
654 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0
655 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0
656 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0
[all …]
Dmediaprovider.te22 # Access external sdcards through /mnt/media_rw
Duntrusted_app_27.te37 # Read /mnt/sdcard symlink.
/system/sepolicy/prebuilts/api/30.0/private/
Dfile_contexts_overlayfs7 /mnt/scratch/overlay/(system|product)/upper u:object_r:system_file:s0
8 /mnt/scratch/overlay/(vendor|odm)/upper u:object_r:vendor_file:s0
9 /mnt/scratch/overlay/oem/upper u:object_r:vendor_file:s0
Dfile_contexts29 /mnt u:object_r:tmpfs:s0
632 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0
633 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0
634 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0
635 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0
636 # /mnt/expand/..../app/[randomStringA]/[packageName]-[randomStringB]/base.apk layout
637 /mnt/expand/[^/]+/app/[^/]+/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0
638 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0
639 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0
640 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0
[all …]
Dmediaprovider_app.te8 # Access to /mnt/pass_through.
Dmediaprovider.te22 # Access external sdcards through /mnt/media_rw
Duntrusted_app_27.te37 # Read /mnt/sdcard symlink.
/system/sepolicy/prebuilts/api/29.0/private/
Dfile_contexts_overlayfs7 /mnt/scratch/overlay/(system|product)/upper u:object_r:system_file:s0
8 /mnt/scratch/overlay/(vendor|odm)/upper u:object_r:vendor_file:s0
9 /mnt/scratch/overlay/oem/upper u:object_r:vendor_file:s0
Dfile_contexts28 /mnt u:object_r:tmpfs:s0
554 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0
555 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0
556 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0
557 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0
558 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0
559 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0
560 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0
561 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0
562 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0
[all …]
/system/extras/tests/ext4/
Dandroid_emmc_perf_tests.sh100 adb shell umount /mnt/sdcard >/dev/null 2>&1
101 adb shell umount /mnt/shell/sdcard0 >/dev/null 2>&1
102 adb shell umount /mnt/shell/emulated >/dev/null 2>&1
/system/core/rootdir/
Dinit.rc174 restorecon_recursive /mnt
193 mkdir /mnt/secure 0700 root root
194 mkdir /mnt/secure/asec 0700 root root
195 mkdir /mnt/asec 0755 root system
196 mkdir /mnt/obb 0755 root system
197 mkdir /mnt/media_rw 0750 root external_storage
198 mkdir /mnt/user 0755 root root
199 mkdir /mnt/user/0 0755 root root
200 mkdir /mnt/user/0/self 0755 root root
201 mkdir /mnt/user/0/emulated 0755 root root
[all …]
Dinit.environ.rc.in12 export ASEC_MOUNTPOINT /mnt/asec
/system/sepolicy/prebuilts/api/27.0/private/
Dfile_contexts28 /mnt u:object_r:tmpfs:s0
407 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0
408 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0
409 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0
410 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0
411 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0
412 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0
413 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0
414 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0
415 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0
[all …]
Duntrusted_v2_app.te20 # Traverse into /mnt/media_rw for bypassing FUSE daemon
/system/sepolicy/prebuilts/api/28.0/private/
Dfile_contexts28 /mnt u:object_r:tmpfs:s0
464 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0
465 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0
466 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0
467 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0
468 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0
469 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0
470 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0
471 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0
472 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0
[all …]
Dmediaprovider.te22 # Access external sdcards through /mnt/media_rw
/system/sepolicy/prebuilts/api/26.0/private/
Dfile_contexts28 /mnt u:object_r:tmpfs:s0
400 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0
401 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0
402 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0
403 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0
404 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0
405 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0
406 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0
407 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0
408 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0
[all …]
Duntrusted_v2_app.te20 # Traverse into /mnt/media_rw for bypassing FUSE daemon
/system/update_engine/update_manager/
Dupdate_manager.conf.example7 # /mnt/stateful_partition/etc/update_manager.conf
/system/core/init/
DAndroid.mk81 $(TARGET_RAMDISK_OUT)/mnt \

1234