/external/ltp/testcases/kernel/containers/mountns/ |
D | mountns03.c | 22 * 2. Unshares mount namespace and makes it private (so mounts/umounts 24 * 3. Bind mounts directory "A" to itself 31 * X: bind mounts "B" to "A" 35 * Y: bind mounts "B" to "A" 61 /* makes mount DIRA a slave of DIRA (all slave mounts have in child_func() 70 /* checks that shared mounts propagates to slave mount */ in child_func() 76 /* bind mounts DIRB to DIRA making contents of DIRB visible in child_func() 96 /* makes sure parent mounts/umounts have no effect on a real system */ in test() 99 /* bind mounts DIRA to itself */ in test() 111 /* bind mounts DIRB to DIRA making contents of DIRB visible in test()
|
D | mountns02.c | 21 * 2. Unshares mount namespace and makes it private (so mounts/umounts 23 * 3. Bind mounts directory "A" to "A" 29 * X: bind mounts "B" to "A" 33 * Y: bind mounts "B" to "A" 63 /* bind mounts DIRB to DIRA making contents of DIRB visible in child_func() 83 /* makes sure parent mounts/umounts have no effect on a real system */ in test() 86 /* bind mounts DIRA to itself */ in test() 95 /* bind mounts DIRB to DIRA making contents of DIRB visible in test()
|
D | mountns01.c | 21 * 2. Unshares mount namespace and makes it private (so mounts/umounts 23 * 3. Bind mounts directory "A" to "A" 29 * X: bind mounts "B" to "A" 33 * Y: bind mounts "B" to "A" 63 /* bind mounts DIRB to DIRA making contents of DIRB visible in child_func() 83 /* makes sure parent mounts/umounts have no effect on a real system */ in test() 86 /* bind mounts DIRA to itself */ in test() 95 /* bind mounts DIRB to DIRA making contents of DIRB visible in test()
|
D | mountns04.c | 21 * 2. Unshares mount namespace and makes it private (so mounts/umounts 23 * 3. Bind mounts directory "A" to "A" 50 /* makes sure mounts/umounts have no effect on a real system */ in test() 53 /* bind mounts DIRA to itself */ in test()
|
/external/ltp/testscripts/ |
D | test_fs_bind.sh | 171 # mounts we are concerned with in a well-defined order (helps diff) 182 # Grep /proc/mounts which is often more up-to-date than mounts 184 grep -F "${sandbox}" /proc/mounts | sort -b 198 tst_brkm TBROK true "$1: failed to record proc mounts" 219 # If the mounts are the same then just return 226 tst_resm TWARN "${tname}: did not properly clean up its proc mounts" 232 # Undo leftover mounts 238 # new mounts around and will never remove mounts outside the test 248 # tst_brkm TBROK true "${tname}: failed to restore mounts" 251 # mounts we are concerned with in a well-defined order (helps diff) [all …]
|
/external/toybox/toys/lsb/ |
D | umount.c | 7 * Note: -n (/etc/mtab) is obsolete, /proc/mounts replaced it. Neither chroot 21 -a Unmount all mounts in /proc/mounts instead of command line list 25 -n Don't use /proc/mounts 27 -t Restrict "all" to mounts of TYPE (or use "noTYPE" to skip) 109 char **optargs, *pm = "/proc/mounts"; in umount_main() 119 // Load /proc/mounts and get a reversed list (newest first) in umount_main()
|
D | mount.c | 8 * no mtab (/proc/mounts does it) so -n is NOP. 21 mounts. 34 Autodetects loopback mounts (a file on a directory) and bind mounts (file 257 // Trying to autodetect loop mounts like bind mounts above (file on dir) in mount_filesystem() 259 // you _do_ accept loop mounts with -t how do you tell "-t cifs" isn't in mount_filesystem() 326 if ((FLAG(a) && !access("/proc/mounts", R_OK)) || remount) { in mount_main() 332 // This covers -a, -o remount, one argument, all user mounts in mount_main() 386 remount ? "/proc/mounts" : "fstab"); in mount_main() 388 // show mounts from /proc/mounts in mount_main()
|
/external/perfetto/src/traced/probes/filesystem/ |
D | fs_mount_unittest.cc | 40 std::multimap<BlockDeviceID, std::string> mounts = ParseMounts(); in TEST() local 43 EXPECT_THAT(mounts, Contains(Pair(buf.st_dev, "/proc"))); in TEST() 57 std::multimap<BlockDeviceID, std::string> mounts = in TEST() local 62 EXPECT_THAT(mounts, Contains(Pair(dev_stat.st_dev, "/dev"))); in TEST() 63 EXPECT_THAT(mounts, Contains(Pair(root_stat.st_dev, "/"))); in TEST()
|
/external/ltp/testcases/kernel/fs/fs_bind/ |
D | README | 23 Note that bind mounts are not recursive. To get a recursive bind mount 26 Another limitation of simple bind mounts is they cannot propagate future binds: 42 to mnt2. Shared subtrees allow propagation whereas bind mounts do not. 76 testing functionality of different types of mounts, different combinations, 90 Basic tests of bind and move mounts are part of the test_fs_bind.sh test 98 common setup, creating, and comparing mounts. 134 stderr was non-empty. mounts.*, files.*, and dirs.* files will be left for
|
/external/autotest/site_utils/lxc/ |
D | lxc_config_unittest.py | 42 Checks that mounts are correctly created in the container. 64 self.assertEqual(len(config), len(container.mounts)) 93 self.assertEqual(len(config), len(container.mounts)) 107 self.mounts = [] 128 self.mounts.append(self.MountConfig(src, dst, ro)) 142 return mount in self.mounts
|
/external/selinux/libselinux/man/man3/ |
D | selinux_restorecon_xattr.3 | 53 .B /proc/mounts 54 to obtain a list of non-seclabel mounts to be excluded from the search. 137 .B /proc/mounts 138 to obtain a list of non-seclabel mounts to be excluded from searches unless the
|
D | selinux_restorecon.3 | 148 .B /proc/mounts 149 to obtain a list of non-seclabel mounts to be excluded from relabeling checks. 180 .B /proc/mounts 181 to obtain a list of non-seclabel mounts to be excluded from relabeling checks
|
/external/autotest/client/site_tests/power_IdleSuspend/ |
D | power_IdleSuspend.py | 33 mounts = () variable in power_IdleSuspend 37 self.mounts = [] 53 self.mounts.append(mount_path) 59 self.mounts.append('/sys/power/state') 109 for mount in self.mounts:
|
/external/bcc/tools/ |
D | mountsnoop.py | 335 def print_event(mounts, umounts, cpu, data, size): argument 340 mounts[event.pid] = { 348 mounts[event.pid]['source'] = event.union.str 350 mounts[event.pid]['target'] = event.union.str 352 mounts[event.pid]['type'] = event.union.str 355 mounts[event.pid]['data'] = event.union.str 369 syscall = mounts.pop(event.pid) 400 mounts = {} 413 functools.partial(print_event, mounts, umounts))
|
D | inject_example.txt | 8 As a simple example, let's say you wanted to fail all mounts. As of 4.17 we can 42 only btrfs mounts: 113 fail our mounts half the time: 140 Fails btrfs mounts only
|
/external/libwebsockets/plugins/deaddrop/ |
D | README.md | 15 ## Required mounts 17 To use deaddrop meaningfully, all the mounts and the ws protocol must be 42 As a plugin, you can configure the mounts and pvos per-vhost easily in JSON. 46 The mountpoints would look something like this (added to vhost/mounts)
|
/external/libwebsockets/lib/roles/http/server/ |
D | lejp-conf.c | 72 "vhosts[].mounts[]", 83 "vhosts[].mounts[].mountpoint", 84 "vhosts[].mounts[].origin", 85 "vhosts[].mounts[].protocol", 86 "vhosts[].mounts[].default", 87 "vhosts[].mounts[].auth-mask", 88 "vhosts[].mounts[].cgi-timeout", 89 "vhosts[].mounts[].cgi-env[].*", 90 "vhosts[].mounts[].cache-max-age", 91 "vhosts[].mounts[].cache-reuse", [all …]
|
/external/ltp/testcases/kernel/fs/binfmt_misc/ |
D | binfmt_misc_lib.sh | 33 mntpoint=$(awk '/ binfmt_misc / { print $2 }' /proc/mounts) 50 # cat /proc/mounts | grep binfmt_misc 53 mntpoint=$(awk '/ binfmt_misc / { print $2 }' /proc/mounts)
|
/external/libwebsockets/plugins/ |
D | server-status.js | 197 if (jso.i.contexts[ci].vhosts[n].mounts) { 201 for (m = 0; m < jso.i.contexts[ci].vhosts[n].mounts.length; m++) { 203 s = s + "<span class=\"m1\">" + san(jso.i.contexts[ci].vhosts[n].mounts[m].mountpoint) + 205 san(jso.i.contexts[ci].vhosts[n].mounts[m].origin) + 207 if (parseInt(san(jso.i.contexts[ci].vhosts[n].mounts[m].cache_max_age), 10)) 209 san(jso.i.contexts[ci].vhosts[n].mounts[m].cache_max_age) + 211 san(jso.i.contexts[ci].vhosts[n].mounts[m].cache_reuse) + 213 san(jso.i.contexts[ci].vhosts[n].mounts[m].cache_revalidate) + 215 san(jso.i.contexts[ci].vhosts[n].mounts[m].cache_intermediaries);
|
/external/python/cpython2/Modules/_ctypes/libffi/src/ |
D | closures.c | 143 f = fopen ("/proc/mounts", "r"); in selinux_enabled_check() 310 listed in the mounts file. Subsequent calls with the same mounts 312 as the mounts file closes the file. */ 314 open_temp_exec_file_mnt (const char *mounts) in open_temp_exec_file_mnt() argument 319 if (mounts != last_mounts) in open_temp_exec_file_mnt() 324 last_mounts = mounts; in open_temp_exec_file_mnt() 326 if (mounts) in open_temp_exec_file_mnt() 327 last_mntent = setmntent (mounts, "r"); in open_temp_exec_file_mnt() 372 { open_temp_exec_file_mnt, "/proc/mounts", 1 },
|
/external/minijail/ |
D | libminijail.h | 204 * Enters @dir, binding all bind mounts specified with minijail_bind() into 205 * place. Requires @dir to contain all necessary directories for bind mounts 228 * As be rules of bind mounts, /tmp must exist in chroot. 234 * As be rules of bind mounts, /tmp must exist in chroot. Size is in bytes. 247 * mounts @src at @dst with @flags and @data. 255 * This may be called multiple times; all mounts will be applied in the order 266 * minijail_mount: when entering minijail @j, mounts @src at @dst with @flags 273 * This may be called multiple times; all mounts will be applied in the order 280 * minijail_bind: bind-mounts @src into @j as @dest, optionally writeable
|
/external/ltp/testcases/commands/eject/ |
D | eject-tests.sh | 26 if grep -q "$CD_DRIVE" /proc/mounts; then 36 # /dev/sr0 and because of that /dev/cdrom is not listed in /proc/mounts 100 if grep -q "$CD_DRIVE" /proc/mounts; then
|
/external/autotest/client/site_tests/platform_CryptohomeMigrateKey/ |
D | control | 18 keys. It first mounts and unmounts a vault using an old key, then migrates from 19 an old key to a new key, and finally mounts and unmounts using the new key.
|
/external/autotest/client/cros/ |
D | cryptohome.py | 319 """Mount the given user's vault. Mounts should be created by calling this 417 cryptohomed_path = '/proc/$(pgrep cryptohomed)/mounts' 421 mounter_path = '/proc/$(%s)/mounts' % mounter_pid 424 # Only check for these mounts if the mounter executable is running. 427 logging.debug('Active %s mounts:\n' % mounter_exe + 441 logging.debug('Active cryptohome mounts:\n%s', 455 """Get information about the active mounts for a given user. 457 Returns the active mounts at the user's user and system mount points. If no 473 The mount filesystem for the user's user and system mounts point must 749 """Mounts a cryptohome.
|
/external/autotest/client/site_tests/policy_DownloadDirectory/ |
D | policy_DownloadDirectory.py | 106 exception=error.TestFail('mounts not ready ever'), 109 desc='Polling for mounts to be ready.') 128 for mount in utils.mounts():
|