Searched refs:remount (Results 1 – 25 of 37) sorted by relevance
12
/system/sepolicy/private/ |
D | remount.te | 1 type remount, domain, coredomain; 6 init_daemon_domain(remount) 9 binder_use(remount) 10 allow remount gsi_service:service_manager find; 11 binder_call(remount, gsid) 13 # Allow searching for /metadata/gsi/remount/lp_metadata. 14 allow remount { metadata_file gsi_metadata_file_type }:dir search; 16 # Allow remount to flip the overlayfs bit in the super partition. 19 r_dir_file(remount, sysfs_dt_firmware_android) 20 allow remount proc_bootconfig:file r_file_perms; [all …]
|
D | sdcardd.te | 9 allow sdcardd sdcardfs:filesystem remount;
|
D | vold.te | 169 allow vold { sdcard_type fuse }:filesystem { mount remount unmount }; # TODO: deprecated in M 255 allow vold labeledfs:filesystem { mount unmount remount }; 341 # vold needs to chroot into app namespaces to remount when runtime permissions change
|
D | access_vectors | 159 remount
|
/system/apex/libs/libapexsupport/tests/ |
D | libapexsupport-tests.sh | 14 adb remount -R 18 adb remount 31 adb remount
|
/system/core/fs_mgr/tests/ |
D | Android.bp | 58 name: "adb-remount-test", 59 src: "adb-remount-test.sh", 72 name: "adb-remount-sh", 73 src: "adb-remount-test.sh", 76 test_config: "adb-remount-sh.xml",
|
D | adb-remount-test.sh | 251 adb reboot remount-test </dev/null || true 1138 adb_su mount -o remount,rw /vendor || 1145 adb_su mount -o remount,ro /vendor || 1152 adb_su remount vendor >&2 || 1162 adb_su mount -o remount,ro /vendor || 1178 adb_su remount vendor >&2 || 1197 adb_su remount -R </dev/null >&2 1247 adb remount >&2 || 1361 test.adb.remount.system.build.prop=true 1533 D=$(adb remount 2>&1) || [all …]
|
/system/connectivity/wificond/ |
D | runtests.sh | 40 if adb remount | grep 'disable-verity'; then 46 adb remount
|
/system/core/fs_mgr/ |
D | README.overlayfs.md | 7 Users working with userdebug or eng builds expect to be able to remount the 14 This means that a remount either isn’t possible, or isn't useful because of 21 Performing a remount 24 Use the following sequence to perform the remount. 31 $ adb remount 52 $ adb remount -R 54 **Note:** _adb remount -R_ won’t reboot if the device is already in the adb remount state. 57 The decisions whether to use traditional direct file-system remount, 125 to confusion. When debugging using **adb remount** it is
|
D | fs_mgr_remount.cpp | 590 bool remount = false; in main() local 605 remount = true; in main() 646 if (!remount) { in main()
|
D | Android.bp | 194 name: "remount",
|
/system/gsid/ |
D | gsid.rc | 12 mkdir /metadata/gsi/remount 0771 root system 23 mkdir /data/gsi/remount 0700 root root
|
/system/apex/tests/testdata/ |
D | trigger_watchdog.rc | 26 # Simulate a situation when userspace reboot fails to remount userdata. Since triggers in 28 # executed init already executed `on userspace-reboot-fs-remount` trigger in rootdir/init.rc, 30 on userspace-reboot-fs-remount && property:test.apex_userspace_reboot_simulate_remount_failed=1
|
/system/vold/fs/ |
D | Vfat.h | 31 status_t Mount(const std::string& source, const std::string& target, bool ro, bool remount,
|
D | Ext4.h | 31 status_t Mount(const std::string& source, const std::string& target, bool ro, bool remount,
|
D | Vfat.cpp | 132 status_t Mount(const std::string& source, const std::string& target, bool ro, bool remount, in Mount() argument 144 flags |= (remount ? MS_REMOUNT : 0); in Mount()
|
D | Ext4.cpp | 124 status_t Mount(const std::string& source, const std::string& target, bool ro, bool remount, in Mount() argument 136 flags |= (remount ? MS_REMOUNT : 0); in Mount()
|
/system/media/audio_utils/tests/ |
D | build_and_run_biquad_filter.sh | 18 adb root && adb wait-for-device remount
|
D | build_and_run_all_unit_tests.sh | 18 adb root && adb wait-for-device remount
|
/system/core/fs_mgr/libfstab/fuzz/ |
D | fstab.dict | 15 "remount"
|
/system/core/init/test_service/ |
D | README.md | 36 adb remount
|
/system/sepolicy/private/compat/30.0/ |
D | 30.0.compat.cil | 31 (allow init debugfs_fs_type (filesystem (mount remount unmount getattr relabelfrom associate quotam…
|
/system/sepolicy/private/compat/29.0/ |
D | 29.0.compat.cil | 30 (allow init debugfs_fs_type (filesystem (mount remount unmount getattr relabelfrom associate quotam…
|
/system/sepolicy/microdroid/system/private/ |
D | kernel.te | 62 # remount filesystems read-only. /data is not mounted at this point,
|
/system/sepolicy/microdroid/reqd_mask/ |
D | access_vectors | 159 remount
|
12