/test/xts/acts/commonlibrary/thirdparty/musl/entry/src/main/cpp/ |
H A D | mountndk1.cpp | 19 #include <sys/mount.h>
42 ret = mount(TEMP_DIR1, TEMP_DIR2, "", MS_BIND, "");
in Mount() 66 ret = mount(TEMP_DIR1, TEMP_DIR2, "", PARAM_0, "");
in Umount() 93 ret = mount(TEMP_DIR1, TEMP_DIR2, "", PARAM_0, "");
in Umount2() 113 {"mount", nullptr, Mount, nullptr, nullptr, nullptr, napi_default, nullptr},
in Init()
|
/third_party/NuttX/fs/vfs/ |
H A D | fs_link.c | 41 struct Mount *mount = NULL;
in do_link() local 95 mount = old_vnode->originMount;
in do_link() 96 if ((mount != NULL) && (mount->mountFlags & MS_RDONLY))
in do_link()
|
H A D | fs_mkdir.c | 42 struct Mount *mount = NULL; in do_mkdir() local 102 mount = parentVnode->originMount; in do_mkdir() 103 if ((mount != NULL) && (mount->mountFlags & MS_RDONLY)) in do_mkdir()
|
H A D | fs_symlink.c | 99 struct Mount *mount = NULL;
in do_symlink() local 141 mount = parent_vnode->originMount;
in do_symlink() 142 if ((mount != NULL) && (mount->mountFlags & MS_RDONLY))
in do_symlink()
|
/third_party/ltp/testcases/kernel/fs/fs_readonly/ |
H A D | test_robind.sh | 23 # FUNCTIONALITY: File system tests for normal mount, bind mount and RO mount 25 # DESCRIPTION: Performs filesystems tests for RO mount. 30 # b) mount --bind dir2 31 # c) mount -o remount,ro 39 # 09/06/2008 Veerendra Chandrappa For Container, testing of RO-Bind mount 213 mount -t $fstype $device dir1 215 tst_brkm TBROK "mount $device to dir1 failed" 220 mount [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/mount_setattr/ |
H A D | mount_setattr_test.c | 10 #include <sys/mount.h> 21 #include <linux/mount.h> 230 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in prepare_unpriv_mountns() 390 ASSERT_EQ(mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 395 ASSERT_EQ(mount("testing", "/tmp/B", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 400 ASSERT_EQ(mount("testing", "/tmp/B/BB", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 403 ASSERT_EQ(mount("testing", "/mnt", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 408 ASSERT_EQ(mount("testing", "/mnt/A", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 413 ASSERT_EQ(mount("/tmp", "/mnt/A/AA", NULL, MS_BIND | MS_REC, NULL), 0); in FIXTURE_SETUP() 417 ASSERT_EQ(mount("testin in FIXTURE_SETUP() [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/vm/ |
H A D | hugetlb_reparenting_test.sh | 20 CGROUP_ROOT=$(mount -t cgroup2 | head -1 | awk '{print $3}') 23 mount -t cgroup2 none $CGROUP_ROOT 28 CGROUP_ROOT=$(mount -t cgroup | grep ",hugetlb" | awk '{print $3}') 31 mount -t cgroup memory,hugetlb $CGROUP_ROOT 143 mount -t hugetlbfs none "$MNT"
|
/kernel/linux/linux-5.10/tools/testing/selftests/filesystems/ |
H A D | devpts_pts.c | 12 #include <sys/mount.h> 210 ret = mount("devpts", mntpoint, "devpts", MS_NOSUID | MS_NOEXEC, in verify_non_standard_devpts_mount() 213 fprintf(stderr, "Failed to mount devpts fs to \"%s\" in new " in verify_non_standard_devpts_mount() 214 "mount namespace: %s\n", mntpoint, in verify_non_standard_devpts_mount() 238 ret = mount("/dev/pts/ptmx", "/dev/ptmx", NULL, MS_BIND, NULL); in verify_ptmx_bind_mount() 240 fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " in verify_ptmx_bind_mount() 241 "\"/dev/ptmx\" mount namespace\n"); in verify_ptmx_bind_mount() 265 ret = mount("/dev/pts/ptmx", ptmx, NULL, MS_BIND, NULL); in verify_invalid_ptmx_bind_mount() 268 fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " in verify_invalid_ptmx_bind_mount() 269 "\"%s\" mount namespac in verify_invalid_ptmx_bind_mount() [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/mm/ |
H A D | hugetlb_reparenting_test.sh | 23 CGROUP_ROOT=$(mount -t cgroup2 | head -1 | awk '{print $3}') 26 mount -t cgroup2 none $CGROUP_ROOT 31 CGROUP_ROOT=$(mount -t cgroup | grep ",hugetlb" | awk '{print $3}') 34 mount -t cgroup memory,hugetlb $CGROUP_ROOT 146 mount -t hugetlbfs none "$MNT"
|
/kernel/linux/linux-6.6/tools/testing/selftests/filesystems/ |
H A D | devpts_pts.c | 12 #include <sys/mount.h> 210 ret = mount("devpts", mntpoint, "devpts", MS_NOSUID | MS_NOEXEC, in verify_non_standard_devpts_mount() 213 fprintf(stderr, "Failed to mount devpts fs to \"%s\" in new " in verify_non_standard_devpts_mount() 214 "mount namespace: %s\n", mntpoint, in verify_non_standard_devpts_mount() 238 ret = mount("/dev/pts/ptmx", "/dev/ptmx", NULL, MS_BIND, NULL); in verify_ptmx_bind_mount() 240 fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " in verify_ptmx_bind_mount() 241 "\"/dev/ptmx\" mount namespace\n"); in verify_ptmx_bind_mount() 265 ret = mount("/dev/pts/ptmx", ptmx, NULL, MS_BIND, NULL); in verify_invalid_ptmx_bind_mount() 268 fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " in verify_invalid_ptmx_bind_mount() 269 "\"%s\" mount namespac in verify_invalid_ptmx_bind_mount() [all...] |
/kernel/liteos_a/fs/vfs/ |
H A D | Makefile | 34 $(LITEOSTOPDIR)/fs/vfs/mount.c \ 82 $(LITEOSTHIRDPARTY)/NuttX/fs/mount/fs_mount.c \ 83 $(LITEOSTHIRDPARTY)/NuttX/fs/mount/fs_umount.c \ 84 $(LITEOSTHIRDPARTY)/NuttX/fs/mount/fs_sync.c \ 87 $(LITEOSTHIRDPARTY)/NuttX/fs/mount/fs_foreachmountpoint.c \
|
/kernel/linux/linux-5.10/samples/binderfs/ |
H A D | binderfs_example.c | 11 #include <sys/mount.h> 25 fprintf(stderr, "%s - Failed to unshare mount namespace\n", in main() 30 ret = mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0); in main() 32 fprintf(stderr, "%s - Failed to mount / as private\n", in main() 44 ret = mount(NULL, "/dev/binderfs", "binder", 0, 0); in main() 46 fprintf(stderr, "%s - Failed to mount binderfs\n", in main() 80 /* Cleanup happens when the mount namespace dies. */ in main()
|
/kernel/linux/linux-6.6/samples/binderfs/ |
H A D | binderfs_example.c | 11 #include <sys/mount.h> 25 fprintf(stderr, "%s - Failed to unshare mount namespace\n", in main() 30 ret = mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0); in main() 32 fprintf(stderr, "%s - Failed to mount / as private\n", in main() 44 ret = mount(NULL, "/dev/binderfs", "binder", 0, 0); in main() 46 fprintf(stderr, "%s - Failed to mount binderfs\n", in main() 80 /* Cleanup happens when the mount namespace dies. */ in main()
|
/kernel/linux/linux-6.6/tools/testing/selftests/proc/ |
H A D | proc-subset-pid.c | 17 * Test that "mount -t proc -o subset=pid" hides everything but pids, 27 #include <sys/mount.h> 48 if (mount(NULL, "/", NULL, MS_PRIVATE|MS_REC, NULL) == -1) { in make_private_proc() 51 if (mount(NULL, "/proc", "proc", 0, "subset=pid") == -1) { in make_private_proc()
|
/third_party/ltp/testcases/commands/eject/ |
H A D | eject-tests.sh | 34 # We have to use the mount point since /dev/cdrom may be link to 79 mount "$CD_DRIVE" cdrom/ > mount.out 2>&1 81 tst_res TCONF "Failed to mount $CD_DRIVE, no disk in drive?" 82 cat mount.out
|
/third_party/ltp/testcases/kernel/fs/quota_remount/ |
H A D | quota_remount_test01.sh | 8 TST_NEEDS_CMDS="dd mkfs.ext3 mount quota quotacheck quotaon sed tail" 48 ROD mount -t ext3 -o loop,usrquota,grpquota $IMAGE $MNTDIR 63 ROD mount -o remount,ro $MNTDIR 64 ROD mount -o remount,rw $MNTDIR
|
/third_party/ltp/testcases/kdump/ |
H A D | runkdump.sh | 63 mount "${EXT3_PART}" /mnt 71 mount -L "${EXT3_LABEL}" /mnt 79 mount "/dev/disk/by-uuid/${EXT3_UID}" /mnt 113 mount "${NFS_PATH}" /mnt
|
/third_party/ltp/testcases/network/nfs/nfs_stress/ |
H A D | nfs_lib.sh | 36 TST_NEEDS_CMDS="$TST_NEEDS_CMDS mount exportfs mount.nfs" 137 local mnt_cmd="mount -v -t nfs $opts $mount_dir $local_dir" 141 tst_rhost_run -c "$mnt_cmd" > mount.log 143 $mnt_cmd > mount.log 147 cat mount.log 153 if grep -iq "Protocol not supported" mount.log; then 157 tst_brk TBROK "mount command failed" 182 tst_res TINFO "$(mount.nfs -V)"
|
/kernel/linux/linux-5.10/tools/testing/selftests/mount/ |
H A D | unprivileged-remount-test.c | 8 #include <sys/mount.h> 129 die("Unrecognized mount flags\n"); in read_mnt_flags() 216 if (mount("testing", "/tmp", fstype, mount_flags, mount_options) != 0) { in test_unpriv_remount() 217 die("mount of %s with options '%s' on /tmp failed: %s\n", in test_unpriv_remount() 230 if (mount("/tmp", "/tmp", "none", in test_unpriv_remount() 237 if (mount("/tmp", "/tmp", "none", in test_unpriv_remount() 297 ret = mount(orig_path, dest_path, "bind", MS_BIND | MS_REC, NULL); in test_priv_mount_unpriv_remount() 299 die("recursive bind mount of %s onto %s failed: %s\n", in test_priv_mount_unpriv_remount() 303 ret = mount(dest_path, dest_path, "none", in test_priv_mount_unpriv_remount()
|
/kernel/linux/linux-6.6/tools/testing/selftests/mount/ |
H A D | unprivileged-remount-test.c | 8 #include <sys/mount.h> 129 die("Unrecognized mount flags\n"); in read_mnt_flags() 216 if (mount("testing", "/tmp", fstype, mount_flags, mount_options) != 0) { in test_unpriv_remount() 217 die("mount of %s with options '%s' on /tmp failed: %s\n", in test_unpriv_remount() 230 if (mount("/tmp", "/tmp", "none", in test_unpriv_remount() 237 if (mount("/tmp", "/tmp", "none", in test_unpriv_remount() 297 ret = mount(orig_path, dest_path, "bind", MS_BIND | MS_REC, NULL); in test_priv_mount_unpriv_remount() 299 die("recursive bind mount of %s onto %s failed: %s\n", in test_priv_mount_unpriv_remount() 303 ret = mount(dest_path, dest_path, "none", in test_priv_mount_unpriv_remount()
|
/kernel/liteos_a/fs/rootfs/ |
H A D | los_rootfs.c | 36 #include "sys/mount.h"
231 ret = mount(ROOT_DEV_NAME, ROOT_DIR_NAME, fsType, mountFlags, NULL);
in MountPartitions() 234 PRINT_ERR("Failed to mount %s, rootDev %s, errno %d: %s\n", ROOT_DIR_NAME, ROOT_DEV_NAME, err, strerror(err));
in MountPartitions() 247 ret = mount(PATCH_DEV_NAME, PATCH_DIR_NAME, fsType, 0, DEFAULT_MOUNT_DATA);
in MountPartitions() 255 ret = mount(PATCH_DEV_NAME, PATCH_DIR_NAME, fsType, 0, DEFAULT_MOUNT_DATA);
in MountPartitions() 261 PRINT_ERR("Failed to mount %s, errno %d: %s\n", PATCH_DIR_NAME, err, strerror(err));
in MountPartitions() 274 ret = mount(USER_DEV_NAME, STORAGE_DIR_NAME, fsType, 0, DEFAULT_MOUNT_DATA);
in MountPartitions() 277 PRINT_ERR("Failed to mount %s, errno %d: %s\n", STORAGE_DIR_NAME, err, strerror(err));
in MountPartitions() 289 ret = mount(USERDATA_DEV_NAME, USERDATA_DIR_NAME, fsType, 0, DEFAULT_MOUNT_DATA);
in MountPartitions() 297 ret = mount(USERDATA_DEV_NAM in MountPartitions() [all...] |
/third_party/selinux/libselinux/src/ |
H A D | load_policy.c | 5 #include <sys/mount.h> 221 * We only need the hardcoded definition for the initial mount 244 rc = mount("proc", "/proc", "proc", 0, 0); in selinux_init_load_policy() 277 * mount it if present for use in the calls below. in selinux_init_load_policy() 281 if (mount("sysfs", "/sys", "sysfs", 0, 0) == 0 || errno == EBUSY) { in selinux_init_load_policy() 283 if (mount(SELINUXFS, SELINUXMNT, SELINUXFS, MS_NOEXEC | MS_NOSUID, 0) == 0 || errno == EBUSY) { in selinux_init_load_policy() 287 if (mount(SELINUXFS, OLDSELINUXMNT, SELINUXFS, 0, 0) == 0 || errno == EBUSY) { in selinux_init_load_policy() 293 if (mount(SELINUXFS, OLDSELINUXMNT, SELINUXFS, 0, 0) == 0 || errno == EBUSY) { in selinux_init_load_policy()
|
/third_party/musl/src/linux/ |
H A D | mount.c | 1 #include <sys/mount.h> 4 int mount(const char *special, const char *dir, const char *fstype, unsigned long flags, const void *data) in mount() function
|
/third_party/musl/libc-test/src/functionalext/supplement/linux/ |
H A D | mount.c | 17 #include <sys/mount.h> 29 int rev = mount(special, target, "", 0, ""); in mount_0100()
|
/third_party/ltp/testcases/kernel/containers/mountns/ |
H A D | mountns04.c | 10 * Tests an unbindable mount: unbindable mount is an unbindable 11 * private mount. 14 * - Unshares mount namespace and makes it private (so mounts/umounts have no 18 * - Check if bind mount unbindable DIRA to DIRB fails as expected 22 #include <sys/mount.h> 38 if (mount(DIRA, DIRB, "none", MS_BIND, NULL) == -1) { in run() 39 tst_res(TPASS, "unbindable mount passed"); in run() 42 tst_res(TFAIL, "unbindable mount faled"); in run()
|