HomeSort by relevance Sort by last modified time
    Searched full:mounts (Results 51 - 75 of 158) sorted by null

1 23 4 5 6 7

  /external/toybox/toys/posix/
df.c 131 // For --bind mounts, show earliest mount
  /frameworks/base/docs/html/tools/help/
jobb.jd 60 <td>Specify the package name for the application that mounts the OBB file, which corresponds
  /pdk/build/
prepare_pdk_tree.py 20 # create mount_pdk.sh and umount_pdk.sh, which mounts/umounts pdk sources.
  /system/vold/
main.cpp 81 /* For when cryptfs checks and mounts an encrypted filesystem */
VolumeManager.cpp 489 FILE* fp = setmntent("/proc/mounts", "r");
491 ALOGE("Error opening /proc/mounts: %s", strerror(errno));
661 // Worst case we might have some stale mounts lurking around, so
663 FILE* fp = setmntent("/proc/mounts", "r");
665 SLOGE("Error opening /proc/mounts: %s", strerror(errno));
    [all...]
  /docs/source.android.com/src/devices/tech/security/encryption/
index.jd 157 <p><code>vold</code> mounts a tmpfs <code>/data</code> (using the tmpfs options from
181 <p><code>init</code> then mounts <code>/data</code> on a tmpfs RAMDisk using parameters it picks up from <code>ro.crypto.tmpfs_options</code>, which is set in <code>init.rc</code>.</p>
231 <p><code>vold</code> mounts a tmpfs <code>/data</code> (using the tmpfs options from <code>ro.crypto.tmpfs_options</code>) and sets the property <code>vold.encrypt_progress</code> to 0. <code>vold</code> prepares the tmpfs <code>/data</code> for booting an encrypted system and sets the property <code>vold.decrypt</code> to: <code>trigger_restart_min_framework</code> </p>
267 <p><code>vold</code> then mounts the decrypted real <code>/data </code>partition and then prepares the new partition. It sets the property <code>vold.post_fs_data_done</code> to 0 and then sets <code>vold.decrypt</code> to <code>trigger_post_fs_data</code>. This causes <code>init.rc</code> to run its <code>post-fs-data</code> commands. They will create any necessary directories or links and then set <code>vold.post_fs_data_done</code> to 1.</p>
323 <p><code>vold</code> then mounts the decrypted real <code>/data </code>partition and prepares the new partition (which may never have been prepared if
  /external/f2fs-tools/lib/
libf2fs.c 397 * try with /proc/mounts.
399 ret = is_mounted("/proc/mounts", c->device_name);
  /external/e2fsprogs/misc/
util.c 287 "checked every %d mounts or\n"
mke2fs.conf.5.in 118 180 days, or after a random number of mounts. These values may
  /external/iproute2/ip/
ipnetns.c 165 /* Setup bind mounts for config files in /etc */
  /ndk/build/awk/
gen-cygwin-deps-converter.awk 39 # well when this was not the case, or when using drive-less mounts
  /frameworks/support/v4/java/android/support/v4/content/
ContextCompat.java 127 * user mounts the external storage on a computer or removes it.
186 * user mounts the external storage on a computer or removes it.
246 * user mounts the external storage on a computer or removes it.
  /cts/hostsidetests/appsecurity/test-apps/ExternalStorageApp/src/com/android/cts/externalstorageapp/
CommonExternalStorageTest.java 173 final BufferedReader br = new BufferedReader(new FileReader("/proc/self/mounts"));
  /external/selinux/libselinux/src/
load_policy.c 308 * libselinux startup via /proc/mounts (see init_selinuxmnt).
  /frameworks/base/core/jni/
com_android_internal_os_Zygote.cpp 259 FILE* fp = setmntent("/proc/mounts", "r");
261 ALOGE("Error opening /proc/mounts: %s", strerror(errno));
  /docs/source.android.com/src/devices/tech/security/selinux/
implement.jd 106 labels may also be assigned to specific mounts such as vfat using the context=
  /external/e2fsprogs/e2fsck/
e2fsck.conf.5.in 147 filesystem checks (either based on time or number of mounts) should
  /external/linux-tools-perf/src/tools/perf/
perf.c 464 /* get debugfs mount point from /proc/mounts */
  /external/selinux/policycoreutils/
ChangeLog 203 * sandbox: do not propogate inside mounts outside
259 * setfiles: close /proc/mounts file when finished
457 * Modify setfiles to exclude mounts without seclabel option in
458 /proc/mounts on kernels >= 2.6.30 from Thomas Liu.
    [all...]
  /external/sepolicy/
domain.te 320 # Restrict context mounts to specific types marked with
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
ext2_fs.h 325 #define EXT2_DFL_MAX_MNT_COUNT 20 /* Allow 20 mounts */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/
libpthread-2.11.1.so 
libpthread.so.0 
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
ext2_fs.h 326 #define EXT2_DFL_MAX_MNT_COUNT 20 /* Allow 20 mounts */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/lib32/
libpthread-2.15.so 

Completed in 353 milliseconds

1 23 4 5 6 7