HomeSort by relevance Sort by last modified time
    Searched full:mounts (Results 1 - 25 of 220) sorted by null

1 2 3 4 5 6 7 8 9

  /external/autotest/client/site_tests/platform_CryptohomeMigrateKey/
control 19 keys. It first mounts and unmounts a vault using an old key, then migrates from
20 an old key to a new key, and finally mounts and unmounts using the new key.
  /bootable/recovery/mtdutils/
Android.mk 6 mounts.c
  /external/skia/platform_tools/ios/bin/
ios_mount 10 # Mounts the iOS device locally. See the value of IOS_MOUNT_POINT in
  /external/autotest/client/site_tests/platform_CryptohomeNonDirs/
control 7 PURPOSE = "Tests Cryptohome's protection against non-directory mounts."
  /external/vboot_reference/tests/
test_using_qemu.sh 20 # Set up mounts
35 # Clean up mounts
  /system/core/libcutils/
android_reboot.c 68 /* Find all read+write block devices in /proc/mounts and add them to
76 if ((fp = setmntent("/proc/mounts", "r")) == NULL) {
77 KLOG_WARNING(TAG, "Failed to open /proc/mounts.\n");
128 * returns. The best way to determine if it is done is to read /proc/mounts
164 /* Now poll /proc/mounts till it's done */
167 if ((fp = setmntent("/proc/mounts", "r")) == NULL) {
168 /* If we can't read /proc/mounts, just give up. */
169 KLOG_WARNING(TAG, "Failed to open /proc/mounts.\n");
  /external/autotest/client/site_tests/power_IdleSuspend/
power_IdleSuspend.py 33 mounts = () variable in class:power_IdleSuspend
37 self.mounts = []
52 self.mounts.append(mount_path)
58 self.mounts.append('/sys/power/state')
105 for mount in self.mounts:
  /external/toybox/toys/lsb/
umount.c 7 * Note: -n (/etc/mtab) is obsolete, /proc/mounts replaced it. Neither chroot
21 -a Unmount all mounts in /proc/mounts instead of command line list
25 -n Don't use /proc/mounts
27 -t Restrict "all" to mounts of TYPE (or use "noTYPE" to skip)
109 char **optargs, *pm = "/proc/mounts";
119 // Load /proc/mounts and get a reversed list (newest first)
mount.c 7 * no mtab (/proc/mounts does it) so -n is NOP.
19 mounts.
32 This mount autodetects loopback mounts (a file on a directory) and
33 bind mounts (file on file, directory on directory), so you don't need
217 // Trying to autodetect loop mounts like bind mounts above (file on dir)
219 // you _do_ accept loop mounts with -t how do you tell "-t cifs" isn't
300 if (((toys.optflags & FLAG_a) && !access("/proc/mounts", R_OK)) || remount) {
306 // This covers -a, -o remount, one argument, all user mounts
360 remount ? "/proc/mounts" : "fstab")
    [all...]
  /external/autotest/client/site_tests/platform_CryptohomeFio/
control 11 session, but mounts a special user dir for the test.
control.dirty_setting 11 session, but mounts a special user dir for the test.
control.stress 11 session, but mounts a special user dir for the test.
  /external/autotest/client/site_tests/platform_RootPartitionsNotMounted/
platform_RootPartitionsNotMounted.py 35 """Gets a set of mounted devices from a given mounts file.
38 parses a given mounts file (e.g. /proc/<pid>/mounts) and extracts the
115 mounts_file = '/proc/%s/mounts' % process
  /system/extras/tests/net_test/
README 32 boots, mounts the root filesystem read-only, runs the specified test from init, and then drops to a shell.
38 The VM mounts the host filesystem at /host, so the test can be modified and
66 net_test mounts the root filesystem read-only, and runs the test from init, but
76 Since the test mounts the filesystem read-only, tests cannot modify
  /frameworks/base/core/java/android/content/res/
ObbScanner.java 49 * XXX This will fail to find the real canonical path if bind mounts are
50 * used, but we don't use any bind mounts right now.
  /external/toybox/toys/other/
mountpoint.c 47 // TODO: Ignore the fact a file can be a mountpoint for --bind mounts.
55 // inode are the same, it's probably "/". This misses --bind mounts from
  /bionic/tests/
mntent_test.cpp 22 FILE* fp = setmntent("/proc/mounts", "r");
  /external/autotest/client/site_tests/hardware_UsbMount/
control 19 Mounts/umounts several times a filesystem, creating a file and checking it"s
  /external/autotest/client/site_tests/platform_CryptohomeMultiple/
platform_CryptohomeMultiple.py 16 the infrastructure for multiple mounts is present and active.
  /external/autotest/client/site_tests/security_mprotect/
security_mprotect.py 13 Verify mprotect of PROT_EXEC works on noexec mounts.
  /external/autotest/server/site_tests/platform_CryptohomeSyncStressServer/
control 16 cryptohome mounts successfully. Best used on an account with many things to
  /external/autotest/server/site_tests/power_SuspendShutdown/
power_SuspendShutdown.py 147 return any((mount['mounted'] for mount in status['mounts']))
202 """Clean up the mounts and restore the settings."""
210 # clean up mounts
211 logging.info('cleaning up bind mounts')
  /external/selinux/policycoreutils/sandbox/
seunshare.8 12 within the specified context, using the alternate home directory and /tmp directory. The seunshare command unshares from the default namespace, then mounts the specified homedir and tmpdir over the default homedir and /tmp. Finally it tells the kernel to execute the application under the specified SELinux context.
  /external/selinux/policycoreutils/setfiles/
restore.h 42 int fts_flags; /* Flags to fts, e.g. follow links, follow mounts */
  /external/minijail/
libminijail.h 94 * Enters @dir, binding all bind mounts specified with minijail_bind() into
95 * place. Requires @dir to contain all necessary directories for bind mounts
118 * As be rules of bind mounts, /tmp must exist in chroot.
123 * minijail_mount: when entering minijail @j, mounts @src at @dst with @flags
137 * minijail_bind: bind-mounts @src into @j as @dest, optionally writeable

Completed in 2162 milliseconds

1 2 3 4 5 6 7 8 9