/system/sepolicy/prebuilts/api/26.0/public/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor. 12 allow otapreopt_chroot labeledfs:filesystem mount;
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor. 12 allow otapreopt_chroot labeledfs:filesystem mount;
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor. 12 allow otapreopt_chroot labeledfs:filesystem mount;
|
/system/incremental_delivery/incfs/ |
D | MountRegistry.cpp | 334 auto& mount = mountsByGroup[std::string(groupId)]; in loadFrom() local 335 if (mount.backing.empty()) { in loadFrom() 336 mount.backing.assign(backingDir); in loadFrom() 337 } else if (mount.backing != backingDir) { in loadFrom() 338 LOG(WARNING) << "[incfs] root '" << *mount.roots.begin() in loadFrom() 340 << mount.backing << "' vs new '" << backingDir in loadFrom() 342 mount.backing.assign(backingDir); in loadFrom() 345 mount.roots.emplace(mountPoint); in loadFrom() 348 mount.bindPoints.emplace_back(std::string(subdir), std::move(mountPoint)); in loadFrom() 363 for (auto& [_, mount] : mountsByGroup) { in loadFrom() [all …]
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor and mount/unmount ext4 images from 13 allow otapreopt_chroot labeledfs:filesystem { mount unmount }; 58 # Allow otapreopt_chroot to mount a tmpfs filesystem in /postinstall/apex. 59 allow otapreopt_chroot tmpfs:filesystem mount; 66 # Allow otapreopt_chroot to mount APEX packages in /postinstall/apex.
|
D | apexd.te | 34 # sys_admin is required to access the device-mapper and mount 37 # allow apexd to create a mount point in /apex 39 # allow apexd to mount in /apex 40 allow apexd apex_mnt_dir:filesystem { mount unmount }; 53 # Unmount and mount filesystems 54 allow apexd labeledfs:filesystem { mount unmount }; 85 # Allow self-execute for the fork mount helper.
|
D | vold.te | 16 # Newly created storage dirs are always treated as mount stubs to prevent us 17 # from accidentally writing when the mount point isn't present.
|
D | art_apex_preinstall.te | 13 # We mount /data/ota/dalvik-cache over /data/dalvik-cache in our 14 # mount namespace.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 10 # This is required to mount /vendor and mount/unmount ext4 images from 13 allow otapreopt_chroot labeledfs:filesystem { mount unmount }; 58 # Allow otapreopt_chroot to mount a tmpfs filesystem in /postinstall/apex. 59 allow otapreopt_chroot tmpfs:filesystem mount; 66 # Allow otapreopt_chroot to mount APEX packages in /postinstall/apex.
|
D | vold.te | 16 # Newly created storage dirs are always treated as mount stubs to prevent us 17 # from accidentally writing when the mount point isn't present.
|
D | art_apex_preinstall.te | 13 # We mount /data/ota/dalvik-cache over /data/dalvik-cache in our 14 # mount namespace.
|
/system/apex/apexd/ |
D | apexd_test_utils.h | 244 if (mount(nullptr, "/", nullptr, MS_PRIVATE | MS_REC, nullptr) == -1) { in SetUpApexTestEnvironment() 254 for (const auto& mount : apex_mounts) { in SetUpApexTestEnvironment() local 255 if (mount.find('@') == std::string::npos) { in SetUpApexTestEnvironment() 256 if (umount2(mount.c_str(), 0) != 0) { in SetUpApexTestEnvironment() 257 return ErrnoError() << "Failed to unmount " << mount; in SetUpApexTestEnvironment() 263 for (const auto& mount : apex_mounts) { in SetUpApexTestEnvironment() local 264 if (mount.find('@') != std::string::npos) { in SetUpApexTestEnvironment() 265 if (umount2(mount.c_str(), 0) != 0) { in SetUpApexTestEnvironment() 266 return ErrnoError() << "Failed to unmount " << mount; in SetUpApexTestEnvironment() 288 if (mount("tmpfs", kApexMountForTest, "tmpfs", 0, nullptr) == -1) { in SetUpApexTestEnvironment() [all …]
|
D | flattened_apex_test.cpp | 59 for (const auto& mount : Split(mounts, "\n")) { in TEST() local 60 const std::vector<std::string>& tokens = Split(mount, " "); in TEST()
|
/system/core/init/ |
D | first_stage_init.cpp | 201 CHECKCALL(mount("tmpfs", "/dev", "tmpfs", MS_NOSUID, "mode=0755")); in FirstStageMain() 205 CHECKCALL(mount("devpts", "/dev/pts", "devpts", 0, NULL)); in FirstStageMain() 207 CHECKCALL(mount("proc", "/proc", "proc", 0, "hidepid=2,gid=" MAKE_STR(AID_READPROC))); in FirstStageMain() 219 CHECKCALL(mount("sysfs", "/sys", "sysfs", 0, NULL)); in FirstStageMain() 220 CHECKCALL(mount("selinuxfs", "/sys/fs/selinux", "selinuxfs", 0, NULL)); in FirstStageMain() 240 CHECKCALL(mount("tmpfs", "/mnt", "tmpfs", MS_NOEXEC | MS_NOSUID | MS_NODEV, in FirstStageMain() 250 CHECKCALL(mount("tmpfs", "/debug_ramdisk", "tmpfs", MS_NOEXEC | MS_NOSUID | MS_NODEV, in FirstStageMain() 255 CHECKCALL(mount("tmpfs", kSecondStageRes, "tmpfs", MS_NOEXEC | MS_NOSUID | MS_NODEV, in FirstStageMain() 347 if (mount("/first_stage_ramdisk", "/first_stage_ramdisk", nullptr, MS_BIND, nullptr) != 0) { in FirstStageMain()
|
D | switch_root.cpp | 80 if (mount(mount_path.c_str(), new_mount_path.c_str(), nullptr, MS_MOVE, nullptr) != 0) { in SwitchRoot() 89 if (mount(new_root.c_str(), "/", nullptr, MS_MOVE, nullptr) != 0) { in SwitchRoot()
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 18 # This is required to mount /vendor and mount/unmount ext4 images from 21 allow otapreopt_chroot labeledfs:filesystem { mount unmount }; 73 # Allow otapreopt_chroot to mount a tmpfs filesystem in /postinstall/apex. 74 allow otapreopt_chroot tmpfs:filesystem mount; 82 # Allow otapreopt_chroot to mount APEX packages in /postinstall/apex.
|
D | apexd.te | 65 # sys_admin is required to access the device-mapper and mount 77 # allow apexd to create a mount point in /apex 79 # allow apexd to mount in /apex 80 allow apexd apex_mnt_dir:filesystem { mount unmount }; 105 # Unmount and mount filesystems 106 allow apexd labeledfs:filesystem { mount unmount }; 136 # Allow self-execute for the fork mount helper. 205 # A note on otapreopt_chroot. It used to mount APEXes during postainstall stage of A/B OTAs, 208 neverallow { domain -apexd -init -otapreopt_chroot } apex_mnt_dir:filesystem { mount unmount };
|
/system/sepolicy/private/ |
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data. 18 # This is required to mount /vendor and mount/unmount ext4 images from 21 allow otapreopt_chroot labeledfs:filesystem { mount unmount }; 73 # Allow otapreopt_chroot to mount a tmpfs filesystem in /postinstall/apex. 74 allow otapreopt_chroot tmpfs:filesystem mount; 82 # Allow otapreopt_chroot to mount APEX packages in /postinstall/apex.
|
D | apexd.te | 65 # sys_admin is required to access the device-mapper and mount 77 # allow apexd to create a mount point in /apex 79 # allow apexd to mount in /apex 80 allow apexd apex_mnt_dir:filesystem { mount unmount }; 105 # Unmount and mount filesystems 106 allow apexd labeledfs:filesystem { mount unmount }; 136 # Allow self-execute for the fork mount helper. 205 # A note on otapreopt_chroot. It used to mount APEXes during postainstall stage of A/B OTAs, 208 neverallow { domain -apexd -init -otapreopt_chroot } apex_mnt_dir:filesystem { mount unmount };
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | vold.te | 17 # Newly created storage dirs are always treated as mount stubs to prevent us 18 # from accidentally writing when the mount point isn't present.
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | vold.te | 16 # Newly created storage dirs are always treated as mount stubs to prevent us 17 # from accidentally writing when the mount point isn't present.
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | vold.te | 17 # Newly created storage dirs are always treated as mount stubs to prevent us 18 # from accidentally writing when the mount point isn't present.
|
/system/vold/fs/ |
D | Exfat.cpp | 64 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) { in Mount() 70 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) { in Mount()
|
D | Ext4.cpp | 88 ret = mount(c_source, c_target, "ext4", tmpmnt_flags, tmpmnt_opts); in Check() 140 rc = mount(c_source, c_target, "ext4", flags, NULL); in Mount() 145 rc = mount(c_source, c_target, "ext4", flags, NULL); in Mount()
|
/system/extras/cppreopts/ |
D | fstab.postinstall | 16 # Tries to mount system_other as a logical partition. If that fails, then 17 # mount as a physical partition.
|