| /linux/fs/ |
| H A D | pnode.c | 17 static inline struct mount *next_peer(struct mount *p) in next_peer() 19 return list_entry(p->mnt_share.next, struct mount, mnt_share); in next_peer() 22 static inline struct mount *first_slave(struct mount *p) in first_slave() 24 return hlist_entry(p->mnt_slave_list.first, struct mount, mnt_slave); in first_slave() 27 static inline struct mount *next_slave(struct mount *p) in next_slave() 29 return hlist_entry(p->mnt_slave.next, struct mount, mnt_slave); in next_slave() 33 static struct mount *get_peer_under_root(struct mount *mnt, in get_peer_under_root() 37 struct mount *m = mnt; in get_peer_under_root() 56 int get_dominating_id(struct mount *mnt, const struct path *root) in get_dominating_id() 58 struct mount *m; in get_dominating_id() [all …]
|
| H A D | pnode.h | 33 static inline void set_mnt_shared(struct mount *mnt) in set_mnt_shared() 39 static inline bool peers(const struct mount *m1, const struct mount *m2) in peers() 44 void change_mnt_propagation(struct mount *, int); 46 int propagate_mnt(struct mount *, struct mountpoint *, struct mount *, 49 int propagate_mount_busy(struct mount *, int); 50 void propagate_mount_unlock(struct mount *); 51 void mnt_release_group_id(struct mount *); 52 int get_dominating_id(struct mount *mnt, const struct path *root); 53 int mnt_get_count(struct mount *mnt); 54 void mnt_set_mountpoint(struct mount *, struct mountpoint *, [all …]
|
| H A D | mount.h | 12 struct mount * root; 43 struct mount { struct 45 struct mount *mnt_parent; argument 61 struct mount *mnt_next_for_sb; /* the next two fields are hlist_node, */ argument 62 struct mount * __aligned(1) *mnt_pprev_for_sb; 71 struct mount *mnt_master; /* slave is on master->mnt_slave_list */ argument 91 struct mount *overmount; /* mounted on ->mnt_root */ argument 112 static inline struct mount *real_mount(struct vfsmount *mnt) in real_mount() 114 return container_of(mnt, struct mount, mnt); in real_mount() 117 static inline int mnt_has_parent(const struct mount *mnt) in mnt_has_parent() [all …]
|
| H A D | namespace.c | 228 static int mnt_alloc_id(struct mount *mnt) in mnt_alloc_id() 240 static void mnt_free_id(struct mount *mnt) in mnt_free_id() 248 static int mnt_alloc_group_id(struct mount *mnt) in mnt_alloc_group_id() 261 void mnt_release_group_id(struct mount *mnt) in mnt_release_group_id() 270 static inline void mnt_add_count(struct mount *mnt, int n) in mnt_add_count() 284 int mnt_get_count(struct mount *mnt) in mnt_get_count() 300 static struct mount *alloc_vfsmnt(const char *name) in alloc_vfsmnt() 302 struct mount *mnt = kmem_cache_zalloc(mnt_cache, GFP_KERNEL); in alloc_vfsmnt() 380 static inline void mnt_inc_writers(struct mount *mnt) in mnt_inc_writers() 389 static inline void mnt_dec_writers(struct mount *mnt) in mnt_dec_writers() [all …]
|
| /linux/Documentation/filesystems/ |
| H A D | sharedsubtree.rst | 10 3) Setting mount states 37 a) A **shared mount** can be replicated to as many mountpoints and all the 42 Let's say /mnt has a mount that is shared:: 44 # mount --make-shared /mnt 47 mount(8) command now supports the --make-shared flag, 53 # mount --bind /mnt /tmp 55 The above command replicates the mount at /mnt to the mountpoint /tmp 66 Now let's say we mount a device at /tmp/a:: 68 # mount /dev/sd0 /tmp/a 76 Note that the mount has propagated to the mount at /mnt as well. [all …]
|
| H A D | autofs-mount-control.rst | 17 are things such as setting an autofs mount catatonic, setting the 20 mount itself which prevents us being able to use open(2) to obtain a 25 needs to walk back up the mount tree to construct a path, such as 28 from the mount tree. 33 because autofs direct mounts and the implementation of "on demand mount 34 and expire" of nested mount trees have the file system mounted directly 35 on top of the mount trigger directory dentry. 39 a direct mount in disguise) and indirect. 62 operation. So we see a mount of shark:/autofs/export1 on /test/g1, for 65 The way that direct mounts are handled is by making an autofs mount on [all …]
|
| H A D | tmpfs.rst | 17 mount. tmpfs also supports THP. 21 fly using a remount ('mount -o remount ...') of the filesystem. A tmpfs 45 1) There is always a kernel internal mount which you will not see at 49 This mount does not depend on CONFIG_TMPFS. If CONFIG_TMPFS is not 59 Remember to create the directory that you intend to mount tmpfs on 62 This mount is _not_ needed for SYSV shared memory. The internal 63 mount is used for that. (In the 2.3 kernel versions it was 64 necessary to mount the predecessor of tmpfs (shm fs) to use SYSV 67 3) Some people (including me) find it very convenient to mount it 75 tmpfs has three mount options for sizing: [all …]
|
| H A D | gfs2-uevents.rst | 7 During the lifetime of a GFS2 mount, a number of uevents are generated. 17 The ADD event occurs at mount time. It will always be the first 18 uevent generated by the newly created filesystem. If the mount 23 and RDONLY=[0|1] that specify the spectator status (a read-only mount 30 The ONLINE uevent is generated after a successful mount or remount. It 40 successful mount of the filesystem by the first node (FIRSTMOUNT=Done). 42 nodes in the cluster to mount the filesystem. 49 for every journal recovered, whether it is during the initial mount 58 uevent for a successful mount or remount. 71 The REMOVE uevent is generated at the end of an unsuccessful mount [all …]
|
| H A D | autofs.rst | 46 symbolic links and mount traps. Mount traps are directories with 51 mount traps are created with `mkdir`. The determination of whether a 52 directory should be a mount trap is based on a master map. This master 53 map is consulted by autofs to determine which directories are mount 57 If neither the *direct* or *offset* mount options are given (so the 58 mount is considered to be *indirect*), then the root directory is 59 always a regular directory, otherwise it is a mount trap when it is 62 directory is a mount trap only if the filesystem is mounted *direct* 65 Directories created in the root directory are mount traps only if the 68 Directories further down the tree depend on the *maxproto* mount [all …]
|
| H A D | devpts.rst | 7 Each mount of the devpts filesystem is now distinct such that ptys 8 and their indices allocated in one mount are independent from ptys 21 to bind mount ``/dev/ptx/ptmx`` to ``/dev/ptmx``. If you opt for using 28 kernel.pty.reserve = 1024 - reserved for filesystems mounted from the initial mount namespace 31 Per-instance limit could be set by adding mount option ``max=<count>``.
|
| H A D | overlayfs.rst | 35 make the overlay mount more compliant with filesystem scanners and 48 The "xino" feature can be enabled with the "-o xino=on" overlay mount option. 51 the lifetime of the filesystem. The "-o xino=auto" overlay mount option 120 At mount time, the two directories given as mount options "lowerdir" and 123 mount -t overlay overlay -olowerdir=/lower,upperdir=/upper,\ 298 In the old mount api the credentials of the task calling mount(2) are 299 stashed. In the new mount api the credentials of the task creating the 304 mount option which will cause the credentials of the calling task to be 306 the new mount api as the old mount api combines setting options and 307 superblock creation in a single mount(2) syscall. [all …]
|
| /linux/security/tomoyo/ |
| H A D | mount.c | 33 r->param.mount.dev->name, in tomoyo_audit_mount_log() 34 r->param.mount.dir->name, in tomoyo_audit_mount_log() 35 r->param.mount.type->name, in tomoyo_audit_mount_log() 36 r->param.mount.flags); in tomoyo_audit_mount_log() 53 return tomoyo_compare_number_union(r->param.mount.flags, in tomoyo_check_mount_acl() 55 tomoyo_compare_name_union(r->param.mount.type, in tomoyo_check_mount_acl() 57 tomoyo_compare_name_union(r->param.mount.dir, in tomoyo_check_mount_acl() 59 (!r->param.mount.need_dev || in tomoyo_check_mount_acl() 60 tomoyo_compare_name_union(r->param.mount.dev, in tomoyo_check_mount_acl() 159 r->param.mount.need_dev = need_dev; in tomoyo_mount_acl() [all …]
|
| /linux/tools/testing/selftests/filesystems/mount-notify/ |
| H A D | mount-notify_test.c | 56 ASSERT_EQ(mount("", "/", NULL, MS_REC|MS_PRIVATE, NULL), 0); in FIXTURE_SETUP() 64 ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0); in FIXTURE_SETUP() 243 ret = mount("", "/", NULL, MS_SHARED, NULL); in setup_mount_tree() 247 ret = mount("/", "/", NULL, MS_BIND, NULL); in setup_mount_tree() 257 ret = mount("/", "/", NULL, MS_BIND, NULL); in TEST_F() 282 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() 322 ret = mount("", "/", NULL, MS_PRIVATE, NULL); in TEST_F() 378 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() 381 ret = mount("", "/a", NULL, MS_SHARED, NULL); in TEST_F() 384 ret = mount("/a", "/b", NULL, MS_BIND, NULL); in TEST_F() [all …]
|
| H A D | Makefile | 6 TEST_GEN_PROGS := mount-notify_test mount-notify_test_ns 10 $(OUTPUT)/mount-notify_test: ../utils.c 11 $(OUTPUT)/mount-notify_test_ns: ../utils.c
|
| H A D | mount-notify_test_ns.c | 73 ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0); in FIXTURE_SETUP() 270 ret = mount("", "/", NULL, MS_SHARED, NULL); in setup_mount_tree() 274 ret = mount("/", "/", NULL, MS_BIND, NULL); in setup_mount_tree() 284 ret = mount("/", "/", NULL, MS_BIND, NULL); in TEST_F() 309 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() 349 ret = mount("", "/", NULL, MS_PRIVATE, NULL); in TEST_F() 405 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() 408 ret = mount("", "/a", NULL, MS_SHARED, NULL); in TEST_F() 411 ret = mount("/a", "/b", NULL, MS_BIND, NULL); in TEST_F() 414 ret = mount("", "/b", NULL, MS_SLAVE, NULL); in TEST_F() [all …]
|
| /linux/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 54 If you do not have the utility mount.cifs (in the Samba 4.x source tree and on 55 the CIFS VFS web site) copy it to the same directory in which mount helpers 57 required, mount.cifs is recommended. Most distros include a ``cifs-utils`` 62 domain to the proper network user. The mount.cifs mount helper can be 78 the new default. To use old dialects (e.g. to mount Windows XP) use "vers=1.0" 79 on mount (or vers=2.0 for Windows Vista). Note that the CIFS (vers=1.0) is 83 There are additional mount options that may be helpful for SMB3 to get 91 To permit users to mount and unmount over directories they own is possible 92 with the cifs vfs. A way to enable such mounting is to mark the mount.cifs 93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to [all …]
|
| /linux/tools/testing/selftests/pid_namespace/ |
| H A D | pid_max.c | 43 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_cb() 51 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_cb() 89 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_inner() 97 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_inner() 164 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_outer() 172 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_outer() 233 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_limit_inner() 241 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_limit_inner() 290 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_limit_outer() 298 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_limit_outer()
|
| /linux/tools/testing/selftests/move_mount_set_group/ |
| H A D | move_mount_set_group_test.c | 118 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in prepare_unpriv_mountns() 198 if (mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, in move_mount_set_group_supported() 202 if (mount(NULL, "/tmp", NULL, MS_PRIVATE, 0)) in move_mount_set_group_supported() 211 if (mount("testing", SET_GROUP_FROM, "tmpfs", MS_NOATIME | MS_NODEV, in move_mount_set_group_supported() 215 if (mount(SET_GROUP_FROM, SET_GROUP_TO, NULL, MS_BIND, NULL)) in move_mount_set_group_supported() 218 if (mount(NULL, SET_GROUP_FROM, NULL, MS_SHARED, 0)) in move_mount_set_group_supported() 246 ASSERT_EQ(mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 251 ASSERT_EQ(mount("testing", SET_GROUP_A, "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 319 ret = mount(NULL, SET_GROUP_A, NULL, MS_SHARED, 0); in get_nestedns_mount_cb()
|
| /linux/Documentation/admin-guide/nfs/ |
| H A D | nfs-rdma.rst | 55 An NFS/RDMA mount point can be obtained by using the mount.nfs command in 59 mount.nfs you are using, type: 63 $ /sbin/mount.nfs -V 73 these to create an NFS/RDMA enabled mount command), the installation 84 After building the nfs-utils package, there will be a mount.nfs binary in 85 the utils/mount directory. This binary can be used to initiate NFS v2, v3, 86 or v4 mounts. To initiate a v4 mount, the binary must be called 87 mount.nfs4. The standard technique is to create a symlink called 88 mount.nfs4 to mount.nfs. 90 This mount.nfs binary should be installed at /sbin/mount.nfs as follows: [all …]
|
| /linux/Documentation/filesystems/smb/ |
| H A D | cifsroot.rst | 15 which will tell the kernel to mount the root file system over the 18 In order to mount, the network stack will also need to be set up by 22 A CIFS root mount currently requires the use of SMB1+UNIX Extensions 31 to use can nonetheless be changed via the 'vers=' mount option. This 52 This is just a virtual device that basically tells the kernel to mount 59 Enables the kernel to mount the root file system via SMB that are 62 The default mount options are set in fs/smb/client/cifsroot.c. 71 Optional mount options. For more information, see mount.cifs(8).
|
| H A D | smbdirect.rst | 29 - Install cifs-utils, which provides the `mount.cifs` command to mount SMB 83 - On the client, mount the share with `rdma` mount option to use SMB Direct 90 mount -t cifs //server/share /mnt/point -o vers=3.1.1,rdma 92 - To verify that the mount is using SMB Direct, you can check dmesg for the 99 Or, verify `rdma` mount option for the share in `/proc/mounts`:
|
| /linux/Documentation/filesystems/fuse/ |
| H A D | fuse.rst | 18 Non-privileged mount (or user mount): 41 module (fuse.ko), a userspace library (libfuse.*) and a mount utility 55 The filesystem type given to mount(2) can be one of the following: 58 This is the usual way to mount a FUSE filesystem. The first 59 argument of the mount system call may contain an arbitrary string, 64 mount system call is interpreted as the name of the device. 78 The numeric user id of the mount owner. 81 The numeric group id of the mount owner. 89 'allow_other' mount option. 111 mount -t fusectl none /sys/fs/fuse/connections [all …]
|
| /linux/tools/testing/selftests/proc/ |
| H A D | proc-pidns.c | 54 ASSERT_SUCCESS(mount(NULL, "/", NULL, MS_PRIVATE|MS_REC, NULL)); in FIXTURE_SETUP() 60 ASSERT_SUCCESS(mount("tmpfs", "/tmp", "tmpfs", 0, NULL)); in FIXTURE_SETUP() 78 ASSERT_SUCCESS(mount("/proc/self/ns/pid", "/tmp/dummy/pidns", NULL, MS_BIND, NULL)); in FIXTURE_SETUP() 79 ASSERT_SUCCESS(mount("proc", "/tmp/dummy/proc", "proc", 0, NULL)); in FIXTURE_SETUP() 106 ASSERT_SUCCESS(mount("proc", "/tmp/proc-host", "proc", 0, "pidns=/proc/self/ns/pid")); in TEST_F() 110 ASSERT_SUCCESS(mount("proc", "/tmp/proc-dummy", "proc", 0, "pidns=/tmp/dummy/pidns")); in TEST_F() 154 ASSERT_SUCCESS(mount("proc", "/tmp/proc", "proc", 0, "")); in TEST_F() 159 ASSERT_ERRNO_EQ(-EBUSY, mount(NULL, "/tmp/proc", NULL, MS_REMOUNT, "pidns=/tmp/dummy/pidns")); in TEST_F()
|
| /linux/security/ |
| H A D | inode.c | 25 static struct vfsmount *mount; variable 123 error = simple_pin_fs(&fs_type, &mount, &mount_count); in securityfs_create_dentry() 127 parent = mount->mnt_root; in securityfs_create_dentry() 173 simple_release_fs(&mount, &mount_count); in securityfs_create_dentry() 287 simple_release_fs(&mount, &mount_count); in remove_one() 311 simple_pin_fs(&fs_type, &mount, &mount_count); in securityfs_remove() 313 simple_release_fs(&mount, &mount_count); in securityfs_remove()
|
| /linux/tools/testing/selftests/wireguard/qemu/ |
| H A D | init.c | 92 if (mount("none", "/dev", "devtmpfs", 0, NULL)) in mount_filesystems() 94 if (mount("none", "/proc", "proc", 0, NULL)) in mount_filesystems() 96 if (mount("none", "/sys", "sysfs", 0, NULL)) in mount_filesystems() 98 if (mount("none", "/tmp", "tmpfs", 0, NULL)) in mount_filesystems() 100 if (mount("none", "/run", "tmpfs", 0, NULL)) in mount_filesystems() 102 if (mount("none", "/sys/kernel/debug", "debugfs", 0, NULL)) in mount_filesystems()
|