/systemd-251/test/units/ |
D | testsuite-14.sh | 9 mount -t tmpfs tmpfs "$_root" 33 mount -o remount,ro "$r" 34 mount -t tmpfs tmpfs "$r/run" 36 mount -o remount,rw "$r"
|
D | testsuite-60.sh | 17 mount -t tmpfs tmpfs "$LONGPATH" 37 mount -t tmpfs tmpfs "/tmp/meow${i}" 41 systemctl list-units -t mount tmp-meow* | grep -q tmp-meow 86 if systemctl list-units -t mount tmp-meow* | grep -q tmp-meow; then
|
D | testsuite-33.sh | 173 cat >/etc/systemd/system/tmp-hoge.mount <<EOF 192 systemctl start tmp-hoge.mount 200 systemctl clean tmp-hoge.mount && { echo 'unexpected success'; exit 1; } 208 systemctl stop tmp-hoge.mount 216 systemctl clean tmp-hoge.mount --what=configuration 224 systemctl clean tmp-hoge.mount 232 systemctl clean tmp-hoge.mount --what=logs 240 systemctl clean tmp-hoge.mount --what=all
|
D | testsuite-50.sh | 47 systemd-dissect --mount "${image}.raw" "${image_dir}/mount" 52 systemd-dissect --mount "${image}.raw" "${image_dir}/mount2" 206 systemd-dissect --root-hash "${roothash}" --mount "${image}.gpt" "${image_dir}/mount" 215 …{image}.raw" -p RootImageOptions="root:nosuid,dev home:ro,dev ro,noatime" mount | grep -F "squashf… 216 systemd-run -P -p RootImage="${image}.gpt" -p RootImageOptions="root:ro,noatime root:ro,dev" mount … 254 systemd-run -P -p MountImages="${image}.gpt:/run/img1 ${image}.raw:/run/img2:nosuid,dev" mount | gr… 255 …ges="${image}.gpt:/run/img1:root:nosuid ${image}.raw:/run/img2:home:suid" mount | grep -F "squashf… 257 systemd-run -P -p MountImages="${image}.raw:/run/img2\:3:nosuid" mount | grep -F "squashfs" | grep … 292 systemctl mount-image --mkdir testservice-50d.service "${image}.raw" /tmp/img root:nosuid 329 systemd-dissect --mount /usr/share/app0.raw "${image_dir}/app0" [all …]
|
D | testsuite-43.sh | 73 runas testuser systemd-run --wait --user --unit=test-bind-mount \ 130 mount --bind /tmp/img /tmp/img_bind 138 if unshare --mount --user --map-root-user mount -t overlay overlay /tmp/c -o lowerdir=/tmp/a:/tmp/b…
|
D | testsuite-37.sh | 8 systemd-mount -p RuntimeDirectory=hoge -p RuntimeDirectoryPreserve=yes -t tmpfs tmpfs /tmp/aaa 13 systemctl restart tmp-aaa.mount
|
/systemd-251/src/shared/ |
D | fstab-util.c | 38 bool fstab_is_extrinsic(const char *mount, const char *opts) { in fstab_is_extrinsic() argument 41 if (PATH_IN_SET(mount, in fstab_is_extrinsic() 47 if (PATH_STARTSWITH_SET(mount, in fstab_is_extrinsic() 62 int fstab_is_mount_point(const char *mount) { in fstab_is_mount_point() argument 76 if (path_equal(m->mnt_dir, mount)) in fstab_is_mount_point()
|
D | switch-root.c | 63 if (mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) < 0) in switch_root() 83 if (mount(path, chased, NULL, mount_flags, NULL) < 0) in switch_root() 107 } else if (mount(new_root, "/", NULL, MS_MOVE, NULL) < 0) in switch_root()
|
D | fstab-util.h | 9 bool fstab_is_extrinsic(const char *mount, const char *opts); 10 int fstab_is_mount_point(const char *mount);
|
/systemd-251/src/core/ |
D | mount.c | 1983 Mount *mount = MOUNT(u); in mount_process_proc_self_mountinfo() local 1985 if (!mount_is_mounted(mount)) { in mount_process_proc_self_mountinfo() 1991 if (mount->from_proc_self_mountinfo && in mount_process_proc_self_mountinfo() 1992 mount->parameters_proc_self_mountinfo.what) { in mount_process_proc_self_mountinfo() 1996 … set_put_strdup(&gone, mount->parameters_proc_self_mountinfo.what) < 0) in mount_process_proc_self_mountinfo() 2000 mount->from_proc_self_mountinfo = false; in mount_process_proc_self_mountinfo() 2001 … assert_se(update_parameters_proc_self_mountinfo(mount, NULL, NULL, NULL) >= 0); in mount_process_proc_self_mountinfo() 2003 switch (mount->state) { in mount_process_proc_self_mountinfo() 2007 mount_enter_dead(mount, MOUNT_SUCCESS); in mount_process_proc_self_mountinfo() 2016 mount_set_state(mount, MOUNT_MOUNTING); in mount_process_proc_self_mountinfo() [all …]
|
D | meson.build | 38 dbus-mount.c 39 dbus-mount.h 96 mount.c 97 mount.h
|
/systemd-251/units/ |
D | meson.build | 19 ['dev-hugepages.mount', '', 21 ['dev-mqueue.mount', '', 68 ['proc-sys-fs-binfmt_misc.mount', 'ENABLE_BINFMT'], 89 ['sys-fs-fuse-connections.mount', '', 91 ['sys-kernel-config.mount', '', 93 ['sys-kernel-debug.mount', '', 95 ['sys-kernel-tracing.mount', '', 165 ['tmp.mount', '', 170 ['var-lib-machines.mount', 'ENABLE_MACHINED',
|
D | systemd-machined.service.in | 32 SystemCallFilter=@system-service @mount 35 # Note that machined cannot be placed in a mount namespace, since it 36 # needs access to the host's mount namespace in order to implement the
|
D | systemd-volatile-root.service.in | 15 After=sysroot.mount sysroot-usr.mount systemd-repart.service
|
/systemd-251/test/ |
D | meson.build | 62 install_data('testsuite-08.units/-.mount', 67 './-.mount', 68 testsuite08_dir + '/root.mount') 70 '../-.mount', 71 testsuite08_dir + '/local-fs.target.wants/-.mount')
|
/systemd-251/docs/ |
D | CONTAINER_INTERFACE.md | 24 2. Make sure to pre-mount `/proc/`, `/sys/`, and `/sys/fs/selinux/` before 25 invoking systemd, and mount `/sys/`, `/sys/fs/selinux/` and `/proc/sys/` 26 read-only (the latter via e.g. a read-only bind mount on itself) in order 33 (It's OK to mount `/sys/` as `tmpfs` btw, and only mount a subset of its 39 3. Pre-mount `/dev/` as (container private) `tmpfs` for the container and bind 40 mount some suitable TTY to `/dev/console`. If this is a pty, make sure to 58 management can work. Therefore make sure to mount `/sys/` read-only in the 66 6. Either pre-mount all cgroup hierarchies in full into the container, or leave 68 explicitly *not* OK to just mount a sub-hierarchy into the container as that 71 directories, and that distinction matters. It is OK however, to mount the [all …]
|
D | HOME_DIRECTORY.md | 75 domain and server information needs to be known *before* the mount. Note that 112 unless a different mount point is defined in the user record. (e.g.: the 146 necessarily involves a mount point to be established. In case of the 148 this is a bind mount. In case of `cifs` this is a CIFS network mount, and in 149 case of the LUKS2 backend a regular block device mount of the file system 150 contained in the LUKS2 image. By requiring a mount for all cases (even for 155 the user record are applied when the bind mount is established.
|
D | DISCOVERABLE_PARTITIONS.md | 9 _TL;DR: Let's automatically discover, mount and enable the root partition, 22 * The OS can discover and mount the necessary file systems with a non-existent 26 file systems contained in GPT disk images automatically and mount them to the 158 …mount point is indeed `/var/tmp/`, not `/tmp/`. The latter is typically maintained in memory via `… 160 … for all partitions that carry Linux file systems. The installer needs to mount them explicitly vi… 211 mounted. Tools that automatically mount disk image with a GPT partition 222 [mount(8)](https://man7.org/linux/man-pages/man2/mount.8.html) or directly with 223 [mount(2)](https://man7.org/linux/man-pages/man2/mount.2.html), they typically 314 An *operating* *system* _should_ automatically discover and mount the first 317 automatically discover and mount the first `/usr/`, `/home/`, `/srv/`, `/var/`, [all …]
|
/systemd-251/test/test-execute/ |
D | exec-protectkernelmodules-yes-mount-propagation.service | 3 Description=Test to make sure that passing ProtectKernelModules=yes disconnect mount propagation 7 …-c 'd=$$(mktemp -d -p /tmp); trap "umount \'$$d\' && rmdir \'$$d\'" EXIT; mount -t tmpfs tmpfs "$$…
|
D | exec-inaccessiblepaths-mount-propagation.service | 3 Description=Test to make sure that InaccessiblePaths= disconnect mount propagation 7 …-c 'd=$$(mktemp -d -p /tmp); trap "umount \'$$d\' && rmdir \'$$d\'" EXIT; mount -t tmpfs tmpfs "$$…
|
D | exec-readonlypaths-mount-propagation.service | 3 Description=Test to make sure that passing ReadOnlyPaths= disconnect mount propagation 7 …-c 'd=$$(mktemp -d -p /tmp); trap "umount \'$$d\' && rmdir \'$$d\'" EXIT; mount -t tmpfs tmpfs "$$…
|
D | exec-readwritepaths-mount-propagation.service | 3 Description=Test to make sure that passing ReadWritePaths= disconnect mount propagation 7 …-c 'd=$$(mktemp -d -p /tmp); trap "umount \'$$d\' && rmdir \'$$d\'" EXIT; mount -t tmpfs tmpfs "$$…
|
D | exec-temporaryfilesystem-options.service | 3 Description=Test for TemporaryFileSystem with mount options 8 # The mount options default to "mode=0755,nodev,strictatime".
|
/systemd-251/test/test-path/ |
D | basic.target | 8 After=sysinit.target sockets.target paths.target slices.target tmp.mount 15 Wants=tmp.mount
|
/systemd-251/test/TEST-24-CRYPTSETUP/ |
D | test.sh | 21 mount /dev/mapper/varcrypt "$initdir/var" 43 mount /dev/mapper/varcrypt "$initdir/var"
|