Home
last modified time | relevance | path

Searched refs:mount (Results 1 – 25 of 145) sorted by relevance

123456

/system/core/init/
Dfirst_stage_init.cpp120 CHECKCALL(mount("tmpfs", "/dev", "tmpfs", MS_NOSUID, "mode=0755")); in FirstStageMain()
123 CHECKCALL(mount("devpts", "/dev/pts", "devpts", 0, NULL)); in FirstStageMain()
125 CHECKCALL(mount("proc", "/proc", "proc", 0, "hidepid=2,gid=" MAKE_STR(AID_READPROC))); in FirstStageMain()
131 CHECKCALL(mount("sysfs", "/sys", "sysfs", 0, NULL)); in FirstStageMain()
132 CHECKCALL(mount("selinuxfs", "/sys/fs/selinux", "selinuxfs", 0, NULL)); in FirstStageMain()
152 CHECKCALL(mount("tmpfs", "/mnt", "tmpfs", MS_NOEXEC | MS_NOSUID | MS_NODEV, in FirstStageMain()
162 CHECKCALL(mount("tmpfs", "/apex", "tmpfs", MS_NOEXEC | MS_NOSUID | MS_NODEV, in FirstStageMain()
166 CHECKCALL(mount("tmpfs", "/debug_ramdisk", "tmpfs", MS_NOEXEC | MS_NOSUID | MS_NODEV, in FirstStageMain()
199 if (mount("/first_stage_ramdisk", "/first_stage_ramdisk", nullptr, MS_BIND, nullptr) != 0) { in FirstStageMain()
Dswitch_root.cpp80 if (mount(mount_path.c_str(), new_mount_path.c_str(), nullptr, MS_MOVE, nullptr) != 0) { in SwitchRoot()
89 if (mount(new_root.c_str(), "/", nullptr, MS_MOVE, nullptr) != 0) { in SwitchRoot()
Dmount_namespace.cpp41 if (mount(nullptr, mount_point.c_str(), nullptr, mountflags, nullptr) == -1) { in MakeShared()
53 if (mount(nullptr, mount_point.c_str(), nullptr, mountflags, nullptr) == -1) { in MakePrivate()
/system/sepolicy/prebuilts/api/26.0/public/
Dotapreopt_chroot.te6 # We need to create an unshared mount namespace, and then mount /data.
10 # This is required to mount /vendor.
12 allow otapreopt_chroot labeledfs:filesystem mount;
Dvold.te40 allow vold sdcard_type:filesystem { mount remount unmount }; # TODO: deprecated in M
59 # Allow to create and mount expanded storage
64 allow vold tmpfs:filesystem { mount unmount };
98 # Unmount and mount the fs.
99 allow vold labeledfs:filesystem { mount unmount };
105 # Create and mount on /data/tmp_mnt and management of expansion mounts
170 allow vold app_fusefs:filesystem { mount unmount };
/system/sepolicy/prebuilts/api/27.0/public/
Dotapreopt_chroot.te6 # We need to create an unshared mount namespace, and then mount /data.
10 # This is required to mount /vendor.
12 allow otapreopt_chroot labeledfs:filesystem mount;
Dvold.te43 allow vold sdcard_type:filesystem { mount remount unmount }; # TODO: deprecated in M
62 # Allow to create and mount expanded storage
67 allow vold tmpfs:filesystem { mount unmount };
101 # Unmount and mount the fs.
102 allow vold labeledfs:filesystem { mount unmount };
108 # Create and mount on /data/tmp_mnt and management of expansion mounts
173 allow vold app_fusefs:filesystem { mount unmount };
/system/sepolicy/prebuilts/api/28.0/public/
Dotapreopt_chroot.te6 # We need to create an unshared mount namespace, and then mount /data.
10 # This is required to mount /vendor.
12 allow otapreopt_chroot labeledfs:filesystem mount;
/system/sepolicy/private/
Dotapreopt_chroot.te6 # We need to create an unshared mount namespace, and then mount /data.
10 # This is required to mount /vendor and mount/unmount ext4 images from
13 allow otapreopt_chroot labeledfs:filesystem { mount unmount };
58 # Allow otapreopt_chroot to mount a tmpfs filesystem in /postinstall/apex.
59 allow otapreopt_chroot tmpfs:filesystem mount;
66 # Allow otapreopt_chroot to mount APEX packages in /postinstall/apex.
Dapexd.te34 # sys_admin is required to access the device-mapper and mount
37 # allow apexd to create a mount point in /apex
39 # allow apexd to mount in /apex
40 allow apexd apex_mnt_dir:filesystem { mount unmount };
53 # Unmount and mount filesystems
54 allow apexd labeledfs:filesystem { mount unmount };
85 # Allow self-execute for the fork mount helper.
Dvold.te16 # Newly created storage dirs are always treated as mount stubs to prevent us
17 # from accidentally writing when the mount point isn't present.
Dart_apex_preinstall.te13 # We mount /data/ota/dalvik-cache over /data/dalvik-cache in our
14 # mount namespace.
/system/sepolicy/prebuilts/api/29.0/private/
Dotapreopt_chroot.te6 # We need to create an unshared mount namespace, and then mount /data.
10 # This is required to mount /vendor and mount/unmount ext4 images from
13 allow otapreopt_chroot labeledfs:filesystem { mount unmount };
58 # Allow otapreopt_chroot to mount a tmpfs filesystem in /postinstall/apex.
59 allow otapreopt_chroot tmpfs:filesystem mount;
66 # Allow otapreopt_chroot to mount APEX packages in /postinstall/apex.
Dapexd.te34 # sys_admin is required to access the device-mapper and mount
37 # allow apexd to create a mount point in /apex
39 # allow apexd to mount in /apex
40 allow apexd apex_mnt_dir:filesystem { mount unmount };
53 # Unmount and mount filesystems
54 allow apexd labeledfs:filesystem { mount unmount };
85 # Allow self-execute for the fork mount helper.
Dvold.te16 # Newly created storage dirs are always treated as mount stubs to prevent us
17 # from accidentally writing when the mount point isn't present.
Dart_apex_preinstall.te13 # We mount /data/ota/dalvik-cache over /data/dalvik-cache in our
14 # mount namespace.
/system/libvintf/
DVintfObjectRecovery.cpp49 status_t mount(const std::string& path) { in mount() function in android::vintf::details::RecoveryPartitionMounter
51 return mount(android::fs_mgr::GetSystemRoot(), kSystemImageRootDir); in mount()
53 return mount(path, kMountImageRootDir + path); in mount()
59 status_t mount(const std::string& path, const std::string& mountPoint) { in mount() function in android::vintf::details::RecoveryPartitionMounter
109 status_t err = mMounter->mount(partition); in getFileSystem()
/system/sepolicy/prebuilts/api/26.0/private/
Dvold.te17 # Newly created storage dirs are always treated as mount stubs to prevent us
18 # from accidentally writing when the mount point isn't present.
/system/sepolicy/prebuilts/api/28.0/private/
Dvold.te16 # Newly created storage dirs are always treated as mount stubs to prevent us
17 # from accidentally writing when the mount point isn't present.
/system/sepolicy/prebuilts/api/27.0/private/
Dvold.te17 # Newly created storage dirs are always treated as mount stubs to prevent us
18 # from accidentally writing when the mount point isn't present.
/system/vold/fs/
DExt4.cpp88 ret = mount(c_source, c_target, "ext4", tmpmnt_flags, tmpmnt_opts); in Check()
140 rc = mount(c_source, c_target, "ext4", flags, NULL); in Mount()
145 rc = mount(c_source, c_target, "ext4", flags, NULL); in Mount()
DF2fs.cpp59 int res = mount(c_source, c_target, "f2fs", flags, NULL); in Mount()
63 res = mount(c_source, c_target, "f2fs", flags | MS_RDONLY, NULL); in Mount()
DExfat.cpp63 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) { in Mount()
69 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) { in Mount()
/system/extras/cppreopts/
Dfstab.postinstall16 # Tries to mount system_other as a logical partition. If that fails, then
17 # mount as a physical partition.
/system/sepolicy/public/
Dvold.te67 allow vold sdcard_type:filesystem { mount remount unmount }; # TODO: deprecated in M
87 # Allow to create and mount expanded storage
92 allow vold tmpfs:filesystem { mount unmount };
130 # Unmount and mount the fs.
131 allow vold labeledfs:filesystem { mount unmount remount };
137 # Create and mount on /data/tmp_mnt and management of expansion mounts
229 allow vold app_fusefs:filesystem { mount unmount };
242 # vold might need to search or mount /mnt/vendor/*

123456