/bootable/recovery/mtdutils/ |
Android.mk | 6 mounts.c
|
mounts.c | 25 #include "mounts.h" 58 #define PROC_MOUNTS_FILENAME "/proc/mounts"
|
/external/linux-tools-perf/src/tools/perf/util/ |
sysfs.c | 44 /* give up and parse /proc/mounts */ 45 fp = fopen("/proc/mounts", "r");
|
cgroup.c | 18 fp = fopen("/proc/mounts", "r"); 23 * in order to handle split hierarchy, we need to scan /proc/mounts
|
/external/skia/platform_tools/ios/bin/ |
ios_mount | 10 # Mounts the iOS device locally. See the value of IOS_MOUNT_POINT in
|
/external/vboot_reference/tests/ |
test_using_qemu.sh | 20 # Set up mounts 35 # Clean up mounts
|
/system/core/libcutils/ |
android_reboot.c | 31 /* Check to see if /proc/mounts contains any writeable filesystems 41 if ((fp = setmntent("/proc/mounts", "r")) == NULL) { 42 /* If we can't read /proc/mounts, just give up. */ 63 * returns. The best way to determine if it is done is to read /proc/mounts 82 /* Now poll /proc/mounts till it's done */
|
/external/toybox/toys/lsb/ |
umount.c | 7 * Note: -n (/etc/mtab) is obsolete, /proc/mounts replaced it. Neither chroot 21 -a Unmount all mounts in /proc/mounts instead of command line list 25 -n Don't use /proc/mounts 27 -t Restrict "all" to mounts of TYPE (or use "noTYPE" to skip) 109 char **optargs, *pm = "/proc/mounts"; 119 // Load /proc/mounts and get a reversed list (newest first)
|
mount.c | 7 * no mtab (/proc/mounts does it) so -n is NOP. 19 mounts. 32 This mount autodetects loopback mounts (a file on a directory) and 33 bind mounts (file on file, directory on directory), so you don't need 211 // Trying to autodetect loop mounts like bind mounts above (file on dir) 213 // you _do_ accept loop mounts with -t how do you tell "-t cifs" isn't 294 if (((toys.optflags & FLAG_a) && !access("/proc/mounts", R_OK)) || remount) { 300 // This covers -a, -o remount, one argument, all user mounts 354 remount ? "/proc/mounts" : "fstab") [all...] |
/system/extras/tests/net_test/ |
README | 32 boots, mounts the root filesystem read-only, runs the specified test from init, and then drops to a shell. 38 The VM mounts the host filesystem at /host, so the test can be modified and 66 net_test mounts the root filesystem read-only, and runs the test from init, but 76 Since the test mounts the filesystem read-only, tests cannot modify
|
/external/linux-tools-perf/src/tools/lib/lk/ |
debugfs.c | 42 /* give up and parse /proc/mounts */ 43 fp = fopen("/proc/mounts", "r");
|
/frameworks/base/core/java/android/content/res/ |
ObbScanner.java | 49 * XXX This will fail to find the real canonical path if bind mounts are 50 * used, but we don't use any bind mounts right now.
|
/external/toybox/toys/other/ |
mountpoint.c | 47 // TODO: Ignore the fact a file can be a mountpoint for --bind mounts. 55 // inode are the same, it's probably "/". This misses --bind mounts from
|
/bionic/tests/ |
mntent_test.cpp | 22 FILE* fp = setmntent("/proc/mounts", "r");
|
/external/selinux/policycoreutils/sandbox/ |
seunshare.8 | 12 within the specified context, using the alternate home directory and /tmp directory. The seunshare command unshares from the default namespace, then mounts the specified homedir and tmpdir over the default homedir and /tmp. Finally it tells the kernel to execute the application under the specified SELinux context.
|
/external/selinux/policycoreutils/setfiles/ |
restore.h | 42 int fts_flags; /* Flags to fts, e.g. follow links, follow mounts */
|
/external/sepolicy/ |
attributes | 14 # All types used for context= mounts.
|
/system/core/toolbox/ |
mount.c | 244 f = fopen("/proc/mounts", "r"); 246 fprintf(stdout, "could not open /proc/mounts\n"); 271 f = fopen("/proc/mounts", "r"); 273 fprintf(stdout, "could not open /proc/mounts\n"); 311 // mount with no arguments is equivalent to "cat /proc/mounts"
|
df.c | 53 FILE *f = fopen("/proc/mounts", "r");
|
/external/fio/ |
cgroup.c | 29 f = setmntent("/proc/mounts", "r"); 31 td_verror(td, errno, "setmntent /proc/mounts");
|
/external/wpa_supplicant_8/src/utils/ |
wpa_debug.c | 126 int mounts, trace_fd; local 131 mounts = open("/proc/mounts", O_RDONLY); 132 if (mounts < 0) { 133 printf("no /proc/mounts\n"); 137 buflen = read(mounts, buf, sizeof(buf) - 1); 138 close(mounts); 140 printf("failed to read /proc/mounts\n");
|
/system/core/adb/ |
remount_service.cpp | 37 // Returns the device used to mount a directory in /proc/mounts. 39 std::unique_ptr<FILE, int(*)(FILE*)> fp(setmntent("/proc/mounts", "r"), endmntent);
|
/system/vold/ |
VolumeBase.h | 40 * Mounted volumes can be asked to manage bind mounts to present themselves 44 * volumes and removes any bind mounts before finally unmounting itself.
|
/bionic/libc/include/ |
paths.h | 41 #define _PATH_MOUNTED "/proc/mounts"
|
/docs/source.android.com/src/devices/storage/ |
index.jd | 90 and then uses bind mounts to offer the correct user-specific primary external 93 <p>At boot, the system mounts a single emulated external storage FUSE daemon 95 the Zygote forks, it bind mounts the appropriate user-specific subdirectory
|