/external/autotest/client/site_tests/platform_CryptohomeMigrateKey/ |
control | 19 keys. It first mounts and unmounts a vault using an old key, then migrates from 20 an old key to a new key, and finally mounts and unmounts using the new key.
|
/bootable/recovery/mtdutils/ |
Android.mk | 6 mounts.c
|
/external/skia/platform_tools/ios/bin/ |
ios_mount | 10 # Mounts the iOS device locally. See the value of IOS_MOUNT_POINT in
|
/external/autotest/client/site_tests/platform_CryptohomeNonDirs/ |
control | 7 PURPOSE = "Tests Cryptohome's protection against non-directory mounts."
|
/external/vboot_reference/tests/ |
test_using_qemu.sh | 20 # Set up mounts 35 # Clean up mounts
|
/system/core/libcutils/ |
android_reboot.c | 68 /* Find all read+write block devices in /proc/mounts and add them to 76 if ((fp = setmntent("/proc/mounts", "r")) == NULL) { 77 KLOG_WARNING(TAG, "Failed to open /proc/mounts.\n"); 128 * returns. The best way to determine if it is done is to read /proc/mounts 164 /* Now poll /proc/mounts till it's done */ 167 if ((fp = setmntent("/proc/mounts", "r")) == NULL) { 168 /* If we can't read /proc/mounts, just give up. */ 169 KLOG_WARNING(TAG, "Failed to open /proc/mounts.\n");
|
/external/autotest/client/site_tests/power_IdleSuspend/ |
power_IdleSuspend.py | 33 mounts = () variable in class:power_IdleSuspend 37 self.mounts = [] 52 self.mounts.append(mount_path) 58 self.mounts.append('/sys/power/state') 105 for mount in self.mounts:
|
/external/toybox/toys/lsb/ |
umount.c | 7 * Note: -n (/etc/mtab) is obsolete, /proc/mounts replaced it. Neither chroot 21 -a Unmount all mounts in /proc/mounts instead of command line list 25 -n Don't use /proc/mounts 27 -t Restrict "all" to mounts of TYPE (or use "noTYPE" to skip) 109 char **optargs, *pm = "/proc/mounts"; 119 // Load /proc/mounts and get a reversed list (newest first)
|
mount.c | 7 * no mtab (/proc/mounts does it) so -n is NOP. 19 mounts. 32 This mount autodetects loopback mounts (a file on a directory) and 33 bind mounts (file on file, directory on directory), so you don't need 217 // Trying to autodetect loop mounts like bind mounts above (file on dir) 219 // you _do_ accept loop mounts with -t how do you tell "-t cifs" isn't 300 if (((toys.optflags & FLAG_a) && !access("/proc/mounts", R_OK)) || remount) { 306 // This covers -a, -o remount, one argument, all user mounts 360 remount ? "/proc/mounts" : "fstab") [all...] |
/external/autotest/client/site_tests/platform_CryptohomeFio/ |
control | 11 session, but mounts a special user dir for the test.
|
control.dirty_setting | 11 session, but mounts a special user dir for the test.
|
control.stress | 11 session, but mounts a special user dir for the test.
|
/external/autotest/client/site_tests/platform_RootPartitionsNotMounted/ |
platform_RootPartitionsNotMounted.py | 35 """Gets a set of mounted devices from a given mounts file. 38 parses a given mounts file (e.g. /proc/<pid>/mounts) and extracts the 115 mounts_file = '/proc/%s/mounts' % process
|
/system/extras/tests/net_test/ |
README | 32 boots, mounts the root filesystem read-only, runs the specified test from init, and then drops to a shell. 38 The VM mounts the host filesystem at /host, so the test can be modified and 66 net_test mounts the root filesystem read-only, and runs the test from init, but 76 Since the test mounts the filesystem read-only, tests cannot modify
|
/frameworks/base/core/java/android/content/res/ |
ObbScanner.java | 49 * XXX This will fail to find the real canonical path if bind mounts are 50 * used, but we don't use any bind mounts right now.
|
/external/toybox/toys/other/ |
mountpoint.c | 47 // TODO: Ignore the fact a file can be a mountpoint for --bind mounts. 55 // inode are the same, it's probably "/". This misses --bind mounts from
|
/bionic/tests/ |
mntent_test.cpp | 22 FILE* fp = setmntent("/proc/mounts", "r");
|
/external/autotest/client/site_tests/hardware_UsbMount/ |
control | 19 Mounts/umounts several times a filesystem, creating a file and checking it"s
|
/external/autotest/client/site_tests/platform_CryptohomeMultiple/ |
platform_CryptohomeMultiple.py | 16 the infrastructure for multiple mounts is present and active.
|
/external/autotest/client/site_tests/security_mprotect/ |
security_mprotect.py | 13 Verify mprotect of PROT_EXEC works on noexec mounts.
|
/external/autotest/server/site_tests/platform_CryptohomeSyncStressServer/ |
control | 16 cryptohome mounts successfully. Best used on an account with many things to
|
/external/autotest/server/site_tests/power_SuspendShutdown/ |
power_SuspendShutdown.py | 147 return any((mount['mounted'] for mount in status['mounts'])) 202 """Clean up the mounts and restore the settings.""" 210 # clean up mounts 211 logging.info('cleaning up bind mounts')
|
/external/selinux/policycoreutils/sandbox/ |
seunshare.8 | 12 within the specified context, using the alternate home directory and /tmp directory. The seunshare command unshares from the default namespace, then mounts the specified homedir and tmpdir over the default homedir and /tmp. Finally it tells the kernel to execute the application under the specified SELinux context.
|
/external/selinux/policycoreutils/setfiles/ |
restore.h | 42 int fts_flags; /* Flags to fts, e.g. follow links, follow mounts */
|
/external/minijail/ |
libminijail.h | 94 * Enters @dir, binding all bind mounts specified with minijail_bind() into 95 * place. Requires @dir to contain all necessary directories for bind mounts 118 * As be rules of bind mounts, /tmp must exist in chroot. 123 * minijail_mount: when entering minijail @j, mounts @src at @dst with @flags 137 * minijail_bind: bind-mounts @src into @j as @dest, optionally writeable
|