/system/core/init/ |
D | first_stage_init.cpp | 120 CHECKCALL(mount("tmpfs", "/dev", "tmpfs", MS_NOSUID, "mode=0755")); in FirstStageMain() 123 CHECKCALL(mount("devpts", "/dev/pts", "devpts", 0, NULL)); in FirstStageMain() 125 CHECKCALL(mount("proc", "/proc", "proc", 0, "hidepid=2,gid=" MAKE_STR(AID_READPROC))); in FirstStageMain() 131 CHECKCALL(mount("sysfs", "/sys", "sysfs", 0, NULL)); in FirstStageMain() 132 CHECKCALL(mount("selinuxfs", "/sys/fs/selinux", "selinuxfs", 0, NULL)); in FirstStageMain() 152 CHECKCALL(mount("tmpfs", "/mnt", "tmpfs", MS_NOEXEC | MS_NOSUID | MS_NODEV, in FirstStageMain() 162 CHECKCALL(mount("tmpfs", "/apex", "tmpfs", MS_NOEXEC | MS_NOSUID | MS_NODEV, in FirstStageMain() 166 CHECKCALL(mount("tmpfs", "/debug_ramdisk", "tmpfs", MS_NOEXEC | MS_NOSUID | MS_NODEV, in FirstStageMain() 199 if (mount("/first_stage_ramdisk", "/first_stage_ramdisk", nullptr, MS_BIND, nullptr) != 0) { in FirstStageMain()
|
D | switch_root.cpp | 80 if (mount(mount_path.c_str(), new_mount_path.c_str(), nullptr, MS_MOVE, nullptr) != 0) { in SwitchRoot() 89 if (mount(new_root.c_str(), "/", nullptr, MS_MOVE, nullptr) != 0) { in SwitchRoot()
|
D | mount_namespace.cpp | 41 if (mount(nullptr, mount_point.c_str(), nullptr, mountflags, nullptr) == -1) { in MakeShared() 53 if (mount(nullptr, mount_point.c_str(), nullptr, mountflags, nullptr) == -1) { in MakePrivate()
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor. 12 allow otapreopt_chroot labeledfs:filesystem mount;
|
D | vold.te | 40 allow vold sdcard_type:filesystem { mount remount unmount }; # TODO: deprecated in M 59 # Allow to create and mount expanded storage 64 allow vold tmpfs:filesystem { mount unmount }; 98 # Unmount and mount the fs. 99 allow vold labeledfs:filesystem { mount unmount }; 105 # Create and mount on /data/tmp_mnt and management of expansion mounts 170 allow vold app_fusefs:filesystem { mount unmount };
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor. 12 allow otapreopt_chroot labeledfs:filesystem mount;
|
D | vold.te | 43 allow vold sdcard_type:filesystem { mount remount unmount }; # TODO: deprecated in M 62 # Allow to create and mount expanded storage 67 allow vold tmpfs:filesystem { mount unmount }; 101 # Unmount and mount the fs. 102 allow vold labeledfs:filesystem { mount unmount }; 108 # Create and mount on /data/tmp_mnt and management of expansion mounts 173 allow vold app_fusefs:filesystem { mount unmount };
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor. 12 allow otapreopt_chroot labeledfs:filesystem mount;
|
/system/sepolicy/private/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor and mount/unmount ext4 images from 13 allow otapreopt_chroot labeledfs:filesystem { mount unmount }; 58 # Allow otapreopt_chroot to mount a tmpfs filesystem in /postinstall/apex. 59 allow otapreopt_chroot tmpfs:filesystem mount; 66 # Allow otapreopt_chroot to mount APEX packages in /postinstall/apex.
|
D | apexd.te | 34 # sys_admin is required to access the device-mapper and mount 37 # allow apexd to create a mount point in /apex 39 # allow apexd to mount in /apex 40 allow apexd apex_mnt_dir:filesystem { mount unmount }; 53 # Unmount and mount filesystems 54 allow apexd labeledfs:filesystem { mount unmount }; 85 # Allow self-execute for the fork mount helper.
|
D | vold.te | 16 # Newly created storage dirs are always treated as mount stubs to prevent us 17 # from accidentally writing when the mount point isn't present.
|
D | art_apex_preinstall.te | 13 # We mount /data/ota/dalvik-cache over /data/dalvik-cache in our 14 # mount namespace.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor and mount/unmount ext4 images from 13 allow otapreopt_chroot labeledfs:filesystem { mount unmount }; 58 # Allow otapreopt_chroot to mount a tmpfs filesystem in /postinstall/apex. 59 allow otapreopt_chroot tmpfs:filesystem mount; 66 # Allow otapreopt_chroot to mount APEX packages in /postinstall/apex.
|
D | apexd.te | 34 # sys_admin is required to access the device-mapper and mount 37 # allow apexd to create a mount point in /apex 39 # allow apexd to mount in /apex 40 allow apexd apex_mnt_dir:filesystem { mount unmount }; 53 # Unmount and mount filesystems 54 allow apexd labeledfs:filesystem { mount unmount }; 85 # Allow self-execute for the fork mount helper.
|
D | vold.te | 16 # Newly created storage dirs are always treated as mount stubs to prevent us 17 # from accidentally writing when the mount point isn't present.
|
D | art_apex_preinstall.te | 13 # We mount /data/ota/dalvik-cache over /data/dalvik-cache in our 14 # mount namespace.
|
/system/libvintf/ |
D | VintfObjectRecovery.cpp | 49 status_t mount(const std::string& path) { in mount() function in android::vintf::details::RecoveryPartitionMounter 51 return mount(android::fs_mgr::GetSystemRoot(), kSystemImageRootDir); in mount() 53 return mount(path, kMountImageRootDir + path); in mount() 59 status_t mount(const std::string& path, const std::string& mountPoint) { in mount() function in android::vintf::details::RecoveryPartitionMounter 109 status_t err = mMounter->mount(partition); in getFileSystem()
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | vold.te | 17 # Newly created storage dirs are always treated as mount stubs to prevent us 18 # from accidentally writing when the mount point isn't present.
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | vold.te | 16 # Newly created storage dirs are always treated as mount stubs to prevent us 17 # from accidentally writing when the mount point isn't present.
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | vold.te | 17 # Newly created storage dirs are always treated as mount stubs to prevent us 18 # from accidentally writing when the mount point isn't present.
|
/system/vold/fs/ |
D | Ext4.cpp | 88 ret = mount(c_source, c_target, "ext4", tmpmnt_flags, tmpmnt_opts); in Check() 140 rc = mount(c_source, c_target, "ext4", flags, NULL); in Mount() 145 rc = mount(c_source, c_target, "ext4", flags, NULL); in Mount()
|
D | F2fs.cpp | 59 int res = mount(c_source, c_target, "f2fs", flags, NULL); in Mount() 63 res = mount(c_source, c_target, "f2fs", flags | MS_RDONLY, NULL); in Mount()
|
D | Exfat.cpp | 63 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) { in Mount() 69 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) { in Mount()
|
/system/extras/cppreopts/ |
D | fstab.postinstall | 16 # Tries to mount system_other as a logical partition. If that fails, then 17 # mount as a physical partition.
|
/system/sepolicy/public/ |
D | vold.te | 67 allow vold sdcard_type:filesystem { mount remount unmount }; # TODO: deprecated in M 87 # Allow to create and mount expanded storage 92 allow vold tmpfs:filesystem { mount unmount }; 130 # Unmount and mount the fs. 131 allow vold labeledfs:filesystem { mount unmount remount }; 137 # Create and mount on /data/tmp_mnt and management of expansion mounts 229 allow vold app_fusefs:filesystem { mount unmount }; 242 # vold might need to search or mount /mnt/vendor/*
|