OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:mounts
(Results
51 - 75
of
158
) sorted by null
1
2
3
4
5
6
7
/external/toybox/toys/posix/
df.c
131
// For --bind
mounts
, show earliest mount
/frameworks/base/docs/html/tools/help/
jobb.jd
60
<td>Specify the package name for the application that
mounts
the OBB file, which corresponds
/pdk/build/
prepare_pdk_tree.py
20
# create mount_pdk.sh and umount_pdk.sh, which
mounts
/umounts pdk sources.
/system/vold/
main.cpp
81
/* For when cryptfs checks and
mounts
an encrypted filesystem */
VolumeManager.cpp
489
FILE* fp = setmntent("/proc/
mounts
", "r");
491
ALOGE("Error opening /proc/
mounts
: %s", strerror(errno));
661
// Worst case we might have some stale
mounts
lurking around, so
663
FILE* fp = setmntent("/proc/
mounts
", "r");
665
SLOGE("Error opening /proc/
mounts
: %s", strerror(errno));
[
all
...]
/docs/source.android.com/src/devices/tech/security/encryption/
index.jd
157
<p><code>vold</code>
mounts
a tmpfs <code>/data</code> (using the tmpfs options from
181
<p><code>init</code> then
mounts
<code>/data</code> on a tmpfs RAMDisk using parameters it picks up from <code>ro.crypto.tmpfs_options</code>, which is set in <code>init.rc</code>.</p>
231
<p><code>vold</code>
mounts
a tmpfs <code>/data</code> (using the tmpfs options from <code>ro.crypto.tmpfs_options</code>) and sets the property <code>vold.encrypt_progress</code> to 0. <code>vold</code> prepares the tmpfs <code>/data</code> for booting an encrypted system and sets the property <code>vold.decrypt</code> to: <code>trigger_restart_min_framework</code> </p>
267
<p><code>vold</code> then
mounts
the decrypted real <code>/data </code>partition and then prepares the new partition. It sets the property <code>vold.post_fs_data_done</code> to 0 and then sets <code>vold.decrypt</code> to <code>trigger_post_fs_data</code>. This causes <code>init.rc</code> to run its <code>post-fs-data</code> commands. They will create any necessary directories or links and then set <code>vold.post_fs_data_done</code> to 1.</p>
323
<p><code>vold</code> then
mounts
the decrypted real <code>/data </code>partition and prepares the new partition (which may never have been prepared if
/external/f2fs-tools/lib/
libf2fs.c
397
* try with /proc/
mounts
.
399
ret = is_mounted("/proc/
mounts
", c->device_name);
/external/e2fsprogs/misc/
util.c
287
"checked every %d
mounts
or\n"
mke2fs.conf.5.in
118
180 days, or after a random number of
mounts
. These values may
/external/iproute2/ip/
ipnetns.c
165
/* Setup bind
mounts
for config files in /etc */
/ndk/build/awk/
gen-cygwin-deps-converter.awk
39
# well when this was not the case, or when using drive-less
mounts
/frameworks/support/v4/java/android/support/v4/content/
ContextCompat.java
127
* user
mounts
the external storage on a computer or removes it.
186
* user
mounts
the external storage on a computer or removes it.
246
* user
mounts
the external storage on a computer or removes it.
/cts/hostsidetests/appsecurity/test-apps/ExternalStorageApp/src/com/android/cts/externalstorageapp/
CommonExternalStorageTest.java
173
final BufferedReader br = new BufferedReader(new FileReader("/proc/self/
mounts
"));
/external/selinux/libselinux/src/
load_policy.c
308
* libselinux startup via /proc/
mounts
(see init_selinuxmnt).
/frameworks/base/core/jni/
com_android_internal_os_Zygote.cpp
259
FILE* fp = setmntent("/proc/
mounts
", "r");
261
ALOGE("Error opening /proc/
mounts
: %s", strerror(errno));
/docs/source.android.com/src/devices/tech/security/selinux/
implement.jd
106
labels may also be assigned to specific
mounts
such as vfat using the context=
/external/e2fsprogs/e2fsck/
e2fsck.conf.5.in
147
filesystem checks (either based on time or number of
mounts
) should
/external/linux-tools-perf/src/tools/perf/
perf.c
464
/* get debugfs mount point from /proc/
mounts
*/
/external/selinux/policycoreutils/
ChangeLog
203
* sandbox: do not propogate inside
mounts
outside
259
* setfiles: close /proc/
mounts
file when finished
457
* Modify setfiles to exclude
mounts
without seclabel option in
458
/proc/
mounts
on kernels >= 2.6.30 from Thomas Liu.
[
all
...]
/external/sepolicy/
domain.te
320
# Restrict context
mounts
to specific types marked with
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
ext2_fs.h
325
#define EXT2_DFL_MAX_MNT_COUNT 20 /* Allow 20
mounts
*/
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/
libpthread-2.11.1.so
libpthread.so.0
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
ext2_fs.h
326
#define EXT2_DFL_MAX_MNT_COUNT 20 /* Allow 20
mounts
*/
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/lib32/
libpthread-2.15.so
Completed in 353 milliseconds
1
2
3
4
5
6
7