HomeSort by relevance Sort by last modified time
    Searched full:mounts (Results 1 - 25 of 158) sorted by null

1 2 3 4 5 6 7

  /bootable/recovery/mtdutils/
Android.mk 6 mounts.c
mounts.c 25 #include "mounts.h"
58 #define PROC_MOUNTS_FILENAME "/proc/mounts"
  /external/linux-tools-perf/src/tools/perf/util/
sysfs.c 44 /* give up and parse /proc/mounts */
45 fp = fopen("/proc/mounts", "r");
cgroup.c 18 fp = fopen("/proc/mounts", "r");
23 * in order to handle split hierarchy, we need to scan /proc/mounts
  /external/skia/platform_tools/ios/bin/
ios_mount 10 # Mounts the iOS device locally. See the value of IOS_MOUNT_POINT in
  /external/vboot_reference/tests/
test_using_qemu.sh 20 # Set up mounts
35 # Clean up mounts
  /system/core/libcutils/
android_reboot.c 31 /* Check to see if /proc/mounts contains any writeable filesystems
41 if ((fp = setmntent("/proc/mounts", "r")) == NULL) {
42 /* If we can't read /proc/mounts, just give up. */
63 * returns. The best way to determine if it is done is to read /proc/mounts
82 /* Now poll /proc/mounts till it's done */
  /external/toybox/toys/lsb/
umount.c 7 * Note: -n (/etc/mtab) is obsolete, /proc/mounts replaced it. Neither chroot
21 -a Unmount all mounts in /proc/mounts instead of command line list
25 -n Don't use /proc/mounts
27 -t Restrict "all" to mounts of TYPE (or use "noTYPE" to skip)
109 char **optargs, *pm = "/proc/mounts";
119 // Load /proc/mounts and get a reversed list (newest first)
mount.c 7 * no mtab (/proc/mounts does it) so -n is NOP.
19 mounts.
32 This mount autodetects loopback mounts (a file on a directory) and
33 bind mounts (file on file, directory on directory), so you don't need
211 // Trying to autodetect loop mounts like bind mounts above (file on dir)
213 // you _do_ accept loop mounts with -t how do you tell "-t cifs" isn't
294 if (((toys.optflags & FLAG_a) && !access("/proc/mounts", R_OK)) || remount) {
300 // This covers -a, -o remount, one argument, all user mounts
354 remount ? "/proc/mounts" : "fstab")
    [all...]
  /system/extras/tests/net_test/
README 32 boots, mounts the root filesystem read-only, runs the specified test from init, and then drops to a shell.
38 The VM mounts the host filesystem at /host, so the test can be modified and
66 net_test mounts the root filesystem read-only, and runs the test from init, but
76 Since the test mounts the filesystem read-only, tests cannot modify
  /external/linux-tools-perf/src/tools/lib/lk/
debugfs.c 42 /* give up and parse /proc/mounts */
43 fp = fopen("/proc/mounts", "r");
  /frameworks/base/core/java/android/content/res/
ObbScanner.java 49 * XXX This will fail to find the real canonical path if bind mounts are
50 * used, but we don't use any bind mounts right now.
  /external/toybox/toys/other/
mountpoint.c 47 // TODO: Ignore the fact a file can be a mountpoint for --bind mounts.
55 // inode are the same, it's probably "/". This misses --bind mounts from
  /bionic/tests/
mntent_test.cpp 22 FILE* fp = setmntent("/proc/mounts", "r");
  /external/selinux/policycoreutils/sandbox/
seunshare.8 12 within the specified context, using the alternate home directory and /tmp directory. The seunshare command unshares from the default namespace, then mounts the specified homedir and tmpdir over the default homedir and /tmp. Finally it tells the kernel to execute the application under the specified SELinux context.
  /external/selinux/policycoreutils/setfiles/
restore.h 42 int fts_flags; /* Flags to fts, e.g. follow links, follow mounts */
  /external/sepolicy/
attributes 14 # All types used for context= mounts.
  /system/core/toolbox/
mount.c 244 f = fopen("/proc/mounts", "r");
246 fprintf(stdout, "could not open /proc/mounts\n");
271 f = fopen("/proc/mounts", "r");
273 fprintf(stdout, "could not open /proc/mounts\n");
311 // mount with no arguments is equivalent to "cat /proc/mounts"
df.c 53 FILE *f = fopen("/proc/mounts", "r");
  /external/fio/
cgroup.c 29 f = setmntent("/proc/mounts", "r");
31 td_verror(td, errno, "setmntent /proc/mounts");
  /external/wpa_supplicant_8/src/utils/
wpa_debug.c 126 int mounts, trace_fd; local
131 mounts = open("/proc/mounts", O_RDONLY);
132 if (mounts < 0) {
133 printf("no /proc/mounts\n");
137 buflen = read(mounts, buf, sizeof(buf) - 1);
138 close(mounts);
140 printf("failed to read /proc/mounts\n");
  /system/core/adb/
remount_service.cpp 37 // Returns the device used to mount a directory in /proc/mounts.
39 std::unique_ptr<FILE, int(*)(FILE*)> fp(setmntent("/proc/mounts", "r"), endmntent);
  /system/vold/
VolumeBase.h 40 * Mounted volumes can be asked to manage bind mounts to present themselves
44 * volumes and removes any bind mounts before finally unmounting itself.
  /bionic/libc/include/
paths.h 41 #define _PATH_MOUNTED "/proc/mounts"
  /docs/source.android.com/src/devices/storage/
index.jd 90 and then uses bind mounts to offer the correct user-specific primary external
93 <p>At boot, the system mounts a single emulated external storage FUSE daemon
95 the Zygote forks, it bind mounts the appropriate user-specific subdirectory

Completed in 731 milliseconds

1 2 3 4 5 6 7