Searched refs:mnt (Results 1 – 25 of 90) sorted by relevance
1234
/system/apex/apexer/ |
D | runtests.sh | 99 mkdir ${output_dir}/mnt 101 sudo mount -o ro /dev/loop10 ${output_dir}/mnt 109 sudo diff ${manifest_file} ${output_dir}/mnt/apex_manifest.pb 111 sudo diff ${input_dir}/file1 ${output_dir}/mnt/file1 112 sudo diff ${input_dir}/file2 ${output_dir}/mnt/file2 113 sudo diff ${input_dir}/sub/file3 ${output_dir}/mnt/sub/file3 114 [ `sudo readlink ${output_dir}/mnt/sym1` = "file1" ] 117 [ `sudo stat -c '%u,%g,%A' ${output_dir}/mnt/file1` = "1001,1001,-rw-r--r--" ] 118 [ `sudo stat -c '%u,%g,%A' ${output_dir}/mnt/file2` = "1001,1001,-rw-r--r--" ] 119 [ `sudo stat -c '%u,%g,%A' ${output_dir}/mnt/sub` = "1002,1002,drw-r--r--" ] [all …]
|
/system/vold/ |
D | FileDeviceUtils.cpp | 51 struct mntent* mnt; // getmntent returns a thread local, so it's safe. in BlockDeviceForPath() local 52 while ((mnt = getmntent(mnts.get())) != nullptr) { in BlockDeviceForPath() 53 auto l = strlen(mnt->mnt_dir); in BlockDeviceForPath() 55 path.compare(0, l, mnt->mnt_dir) == 0) { in BlockDeviceForPath() 56 result = mnt->mnt_fsname; in BlockDeviceForPath()
|
/system/sepolicy/private/ |
D | file_contexts_overlayfs | 7 /mnt/scratch/overlay/(system|product)/upper u:object_r:system_file:s0 8 /mnt/scratch/overlay/(vendor|odm)/upper u:object_r:vendor_file:s0 9 /mnt/scratch/overlay/oem/upper u:object_r:vendor_file:s0
|
D | mediaprovider_app.te | 8 # Access to /mnt/pass_through. 46 # Access external sdcards through /mnt/media_rw
|
D | file_contexts | 29 /mnt u:object_r:tmpfs:s0 648 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 649 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 650 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 651 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 652 # /mnt/expand/..../app/[randomStringA]/[packageName]-[randomStringB]/base.apk layout 653 /mnt/expand/[^/]+/app/[^/]+/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 654 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 655 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 656 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 [all …]
|
D | mediaprovider.te | 22 # Access external sdcards through /mnt/media_rw
|
D | untrusted_app_27.te | 37 # Read /mnt/sdcard symlink.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | file_contexts_overlayfs | 7 /mnt/scratch/overlay/(system|product)/upper u:object_r:system_file:s0 8 /mnt/scratch/overlay/(vendor|odm)/upper u:object_r:vendor_file:s0 9 /mnt/scratch/overlay/oem/upper u:object_r:vendor_file:s0
|
D | file_contexts | 29 /mnt u:object_r:tmpfs:s0 632 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 633 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 634 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 635 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 636 # /mnt/expand/..../app/[randomStringA]/[packageName]-[randomStringB]/base.apk layout 637 /mnt/expand/[^/]+/app/[^/]+/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 638 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 639 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 640 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 [all …]
|
D | mediaprovider_app.te | 8 # Access to /mnt/pass_through.
|
D | mediaprovider.te | 22 # Access external sdcards through /mnt/media_rw
|
D | untrusted_app_27.te | 37 # Read /mnt/sdcard symlink.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | file_contexts_overlayfs | 7 /mnt/scratch/overlay/(system|product)/upper u:object_r:system_file:s0 8 /mnt/scratch/overlay/(vendor|odm)/upper u:object_r:vendor_file:s0 9 /mnt/scratch/overlay/oem/upper u:object_r:vendor_file:s0
|
D | file_contexts | 28 /mnt u:object_r:tmpfs:s0 554 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 555 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 556 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 557 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 558 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 559 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 560 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 561 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0 562 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0 [all …]
|
/system/extras/tests/ext4/ |
D | android_emmc_perf_tests.sh | 100 adb shell umount /mnt/sdcard >/dev/null 2>&1 101 adb shell umount /mnt/shell/sdcard0 >/dev/null 2>&1 102 adb shell umount /mnt/shell/emulated >/dev/null 2>&1
|
/system/core/rootdir/ |
D | init.rc | 174 restorecon_recursive /mnt 193 mkdir /mnt/secure 0700 root root 194 mkdir /mnt/secure/asec 0700 root root 195 mkdir /mnt/asec 0755 root system 196 mkdir /mnt/obb 0755 root system 197 mkdir /mnt/media_rw 0750 root external_storage 198 mkdir /mnt/user 0755 root root 199 mkdir /mnt/user/0 0755 root root 200 mkdir /mnt/user/0/self 0755 root root 201 mkdir /mnt/user/0/emulated 0755 root root [all …]
|
D | init.environ.rc.in | 12 export ASEC_MOUNTPOINT /mnt/asec
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | file_contexts | 28 /mnt u:object_r:tmpfs:s0 407 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 408 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 409 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 410 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 411 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 412 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 413 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 414 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0 415 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0 [all …]
|
D | untrusted_v2_app.te | 20 # Traverse into /mnt/media_rw for bypassing FUSE daemon
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | file_contexts | 28 /mnt u:object_r:tmpfs:s0 464 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 465 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 466 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 467 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 468 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 469 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 470 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 471 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0 472 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0 [all …]
|
D | mediaprovider.te | 22 # Access external sdcards through /mnt/media_rw
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | file_contexts | 28 /mnt u:object_r:tmpfs:s0 400 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 401 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 402 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 403 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 404 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 405 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 406 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 407 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0 408 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0 [all …]
|
D | untrusted_v2_app.te | 20 # Traverse into /mnt/media_rw for bypassing FUSE daemon
|
/system/update_engine/update_manager/ |
D | update_manager.conf.example | 7 # /mnt/stateful_partition/etc/update_manager.conf
|
/system/core/init/ |
D | Android.mk | 81 $(TARGET_RAMDISK_OUT)/mnt \
|
1234