Searched refs:mnt (Results 1 – 25 of 131) sorted by relevance
123456
/system/apex/apexer/ |
D | runtests.sh | 102 mkdir ${output_dir}/mnt 104 sudo mount -o ro /dev/loop10 ${output_dir}/mnt 112 sudo diff ${manifest_file} ${output_dir}/mnt/apex_manifest.pb 114 sudo diff ${input_dir}/file1 ${output_dir}/mnt/file1 115 sudo diff ${input_dir}/file2 ${output_dir}/mnt/file2 116 sudo diff ${input_dir}/sub/file3 ${output_dir}/mnt/sub/file3 117 [ `sudo readlink ${output_dir}/mnt/sym1` = "file1" ] 120 [ `sudo stat -c '%u,%g,%A' ${output_dir}/mnt/file1` = "1001,1001,-rw-r--r--" ] 121 [ `sudo stat -c '%u,%g,%A' ${output_dir}/mnt/file2` = "1001,1001,-rw-r--r--" ] 122 [ `sudo stat -c '%u,%g,%A' ${output_dir}/mnt/sub` = "1002,1002,drw-r--r--" ] [all …]
|
/system/vold/ |
D | FileDeviceUtils.cpp | 51 struct mntent* mnt; // getmntent returns a thread local, so it's safe. in BlockDeviceForPath() local 52 while ((mnt = getmntent(mnts.get())) != nullptr) { in BlockDeviceForPath() 53 auto l = strlen(mnt->mnt_dir); in BlockDeviceForPath() 55 path.compare(0, l, mnt->mnt_dir) == 0) { in BlockDeviceForPath() 56 result = mnt->mnt_fsname; in BlockDeviceForPath()
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | file_contexts_overlayfs | 7 /mnt/scratch/overlay/(system|product)/upper u:object_r:system_file:s0 8 /mnt/scratch/overlay/(vendor|odm)/upper u:object_r:vendor_file:s0 9 /mnt/scratch/overlay/oem/upper u:object_r:vendor_file:s0
|
D | mediaprovider_app.te | 8 # Access to /mnt/pass_through. 46 # Access external sdcards through /mnt/media_rw
|
D | file_contexts | 29 /mnt u:object_r:tmpfs:s0 693 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 694 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 695 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 696 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 697 # /mnt/expand/..../app/[randomStringA]/[packageName]-[randomStringB]/base.apk layout 698 /mnt/expand/[^/]+/app/[^/]+/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 699 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 700 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 701 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 [all …]
|
/system/sepolicy/private/ |
D | file_contexts_overlayfs | 7 /mnt/scratch/overlay/(system|product)/upper u:object_r:system_file:s0 8 /mnt/scratch/overlay/(vendor|odm)/upper u:object_r:vendor_file:s0 9 /mnt/scratch/overlay/oem/upper u:object_r:vendor_file:s0
|
D | mediaprovider_app.te | 8 # Access to /mnt/pass_through. 46 # Access external sdcards through /mnt/media_rw
|
D | file_contexts | 29 /mnt u:object_r:tmpfs:s0 693 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 694 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 695 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 696 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 697 # /mnt/expand/..../app/[randomStringA]/[packageName]-[randomStringB]/base.apk layout 698 /mnt/expand/[^/]+/app/[^/]+/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 699 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 700 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 701 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 [all …]
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | file_contexts_overlayfs | 7 /mnt/scratch/overlay/(system|product)/upper u:object_r:system_file:s0 8 /mnt/scratch/overlay/(vendor|odm)/upper u:object_r:vendor_file:s0 9 /mnt/scratch/overlay/oem/upper u:object_r:vendor_file:s0
|
D | file_contexts | 29 /mnt u:object_r:tmpfs:s0 633 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 634 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 635 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 636 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 637 # /mnt/expand/..../app/[randomStringA]/[packageName]-[randomStringB]/base.apk layout 638 /mnt/expand/[^/]+/app/[^/]+/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 639 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 640 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 641 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 [all …]
|
D | mediaprovider_app.te | 8 # Access to /mnt/pass_through.
|
D | mediaprovider.te | 22 # Access external sdcards through /mnt/media_rw
|
D | untrusted_app_27.te | 37 # Read /mnt/sdcard symlink.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | file_contexts_overlayfs | 7 /mnt/scratch/overlay/(system|product)/upper u:object_r:system_file:s0 8 /mnt/scratch/overlay/(vendor|odm)/upper u:object_r:vendor_file:s0 9 /mnt/scratch/overlay/oem/upper u:object_r:vendor_file:s0
|
D | file_contexts | 28 /mnt u:object_r:tmpfs:s0 554 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 555 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 556 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 557 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 558 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 559 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 560 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 561 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0 562 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0 [all …]
|
/system/extras/tests/ext4/ |
D | android_emmc_perf_tests.sh | 100 adb shell umount /mnt/sdcard >/dev/null 2>&1 101 adb shell umount /mnt/shell/sdcard0 >/dev/null 2>&1 102 adb shell umount /mnt/shell/emulated >/dev/null 2>&1
|
/system/core/rootdir/ |
D | init.environ.rc.in | 12 export ASEC_MOUNTPOINT /mnt/asec
|
D | init.rc | 224 restorecon_recursive /mnt 246 mkdir /mnt/secure 0700 root root 247 mkdir /mnt/secure/asec 0700 root root 248 mkdir /mnt/asec 0755 root system 249 mkdir /mnt/obb 0755 root system 250 mkdir /mnt/media_rw 0750 root external_storage 251 mkdir /mnt/user 0755 root root 252 mkdir /mnt/user/0 0755 root root 253 mkdir /mnt/user/0/self 0755 root root 254 mkdir /mnt/user/0/emulated 0755 root root [all …]
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | file_contexts | 28 /mnt u:object_r:tmpfs:s0 407 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 408 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 409 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 410 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 411 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 412 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 413 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 414 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0 415 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0 [all …]
|
D | untrusted_v2_app.te | 20 # Traverse into /mnt/media_rw for bypassing FUSE daemon
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | file_contexts | 28 /mnt u:object_r:tmpfs:s0 464 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 465 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 466 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 467 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 468 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 469 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 470 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 471 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0 472 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0 [all …]
|
D | mediaprovider.te | 22 # Access external sdcards through /mnt/media_rw
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | file_contexts | 28 /mnt u:object_r:tmpfs:s0 400 /mnt/expand(/.*)? u:object_r:mnt_expand_file:s0 401 /mnt/expand/[^/]+(/.*)? u:object_r:system_data_file:s0 402 /mnt/expand/[^/]+/app(/.*)? u:object_r:apk_data_file:s0 403 /mnt/expand/[^/]+/app/[^/]+/oat(/.*)? u:object_r:dalvikcache_data_file:s0 404 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp(/.*)? u:object_r:apk_tmp_file:s0 405 /mnt/expand/[^/]+/app/vmdl[^/]+\.tmp/oat(/.*)? u:object_r:dalvikcache_data_file:s0 406 /mnt/expand/[^/]+/local/tmp(/.*)? u:object_r:shell_data_file:s0 407 /mnt/expand/[^/]+/media(/.*)? u:object_r:media_rw_data_file:s0 408 /mnt/expand/[^/]+/misc/vold(/.*)? u:object_r:vold_data_file:s0 [all …]
|
D | untrusted_v2_app.te | 20 # Traverse into /mnt/media_rw for bypassing FUSE daemon
|
/system/update_engine/update_manager/ |
D | update_manager.conf.example | 7 # /mnt/stateful_partition/etc/update_manager.conf
|
123456