Home
last modified time | relevance | path

Searched refs:mounts (Results 1 – 25 of 80) sorted by relevance

1234

/linux/Documentation/filesystems/
H A Dsharedsubtree.rst33 Shared subtree provides four different flavors of mounts; struct vfsmount to be
56 and the contents of both the mounts remain identical.
85 All slave mounts have a master mount which is a shared.
183 B) A process wants its mounts invisible to any other process, but
184 still be able to see the other system mounts.
198 Hence forth any mounts within the /myprivatetree done by the
199 process will not show up in any other namespace. However mounts
209 The above semantics allows a way to share mounts across
260 (1) Shared mounts
272 /mnt or /tmp reflect in all the other mounts of its peer
[all …]
H A Dautofs-mount-control.rst11 restarting autofs when there are busy mounts).
19 certain types of autofs triggered mounts can end up covering an autofs
23 Currently autofs uses "umount -l" (lazy umount) to clear active mounts
31 mounts. Immediately one thinks of just adding the ability to remount
33 because autofs direct mounts and the implementation of "on demand mount
61 mounts are triggered for each sub-directory key by the inode lookup
65 The way that direct mounts are handled is by making an autofs mount on
97 cases (in 2.4) where the available number of mounts are exhausted or
104 offsets are implemented using the same mechanism as the direct mounts
119 offset mounts in place we need to be able to obtain a file handle
[all …]
H A Dautofs.rst32 and mounts filesystems. This will often be the "automount" program,
125 about this dentry and normal checks for mounts and automounts
132 - A return value of `-EISDIR` tells the VFS to ignore any mounts
204 The VFS has a mechanism for automatically expiring unused mounts,
207 mounts that were created by `d_automount()` returning a filesystem to be
213 The VFS also supports "expiry" of mounts using the MNT_EXPIRE flag to
248 there can be an accumulation of mounts that aren't actually being
251 preventing this apparent inability to expire mounts that aren't
261 There is an option with indirect mounts to consider each of the leaves
267 setting of an expire timeout for individual mounts. But there are
[all …]
H A Dpropagate_umount.txt3 Umount propagation starts with a set of mounts we are already going to
6 mounts and with parent that would receive events from the parent of that
10 It is convenient to define several properties of sets of mounts:
12 1) A set S of mounts is non-shifting if for any mount X belonging
16 2) A set S is non-revealing if all locked mounts that belong to S have
21 The set of mounts taken out by umount(2) must be non-shifting and
23 any remaining mounts and the second is what prevents the exposure
29 Resulting set may not be closed; there might still be mounts outside
51 We are given a closed set U and we want to find all mounts that have
110 subtree mounted strictly inside m and containing mounts that do not
[all …]
H A Ddevpts.rst9 and their indices in all other mounts.
11 All mounts of the devpts filesystem now create a ``/dev/pts/ptmx`` node
/linux/init/
H A DMakefile8 obj-y := main.o version.o mounts.o
19 mounts-y := do_mounts.o
20 mounts-$(CONFIG_BLK_DEV_RAM) += do_mounts_rd.o
21 mounts-$(CONFIG_BLK_DEV_INITRD) += do_mounts_initrd.o
/linux/tools/hv/
H A Dhv_vss_daemon.c116 FILE *mounts; in vss_operate() local
135 mounts = setmntent("/proc/mounts", "r"); in vss_operate()
136 if (mounts == NULL) in vss_operate()
139 while ((ent = getmntent(mounts))) { in vss_operate()
167 endmntent(mounts); in vss_operate()
186 endmntent(mounts); in vss_operate()
/linux/tools/bootconfig/scripts/
H A Dftrace2bconf.sh26 TRACEFS=`grep -m 1 -w tracefs /proc/mounts | cut -f 2 -d " "`
28 if ! grep -wq debugfs /proc/mounts; then
32 TRACEFS=`grep -m 1 -w debugfs /proc/mounts | cut -f 2 -d " "`/tracing
H A Dbconf2ftrace.sh52 TRACEFS=`grep -m 1 -w tracefs /proc/mounts | cut -f 2 -d " "`
54 if ! grep -wq debugfs /proc/mounts; then
58 TRACEFS=`grep -m 1 -w debugfs /proc/mounts | cut -f 2 -d " "`/tracing
/linux/Documentation/networking/
H A Dsysfs-tagging.rst31 kobj_nstype first mounts sysfs, a new superblock is created. It
32 will be differentiated from other sysfs mounts by having its
34 through bind mounting and mounts propagation, a task can easily view
35 the contents of other namespaces' sysfs mounts. Therefore, when a
/linux/scripts/selinux/
H A Dinstall_policy.sh76 mounts=`cat /proc/$$/mounts | \
79 $SF -F file_contexts $mounts
/linux/tools/testing/selftests/resctrl/
H A Dresctrlfs.c20 FILE *mounts; in find_resctrl_mount() local
23 mounts = fopen("/proc/mounts", "r"); in find_resctrl_mount()
24 if (!mounts) { in find_resctrl_mount()
28 while (!feof(mounts)) { in find_resctrl_mount()
29 if (!fgets(line, 256, mounts)) in find_resctrl_mount()
43 fclose(mounts); in find_resctrl_mount()
50 fclose(mounts); in find_resctrl_mount()
/linux/tools/testing/selftests/pstore/
H A Dpstore_post_reboot_tests23 mount_info=`grep pstore /proc/mounts`
30 mount_point=`grep pstore /proc/mounts | cut -d' ' -f2 | head -n1`
/linux/tools/lib/api/fs/
H A Dfs.c93 const char * const * const mounts; member
110 .mounts = lower_name##__known_mountpoints, \
193 ptr = fs->mounts; in fs__check_mounts()
267 return getenv(upper_name) ?: *fs->mounts; in mount_overload()
/linux/fs/
H A Dmount.h14 struct rb_root mounts; /* Protected by namespace_sem */ member
195 return RB_EMPTY_ROOT(&ns->mounts); in mnt_ns_empty()
206 rb_erase(&mnt->mnt_node, &ns->mounts); in move_from_ns()
/linux/tools/testing/selftests/kexec/
H A Dkexec_common_lib.sh9 SECURITYFS=$(grep "securityfs" /proc/mounts | awk '{print $2}')
48 if ! grep -q "^\S\+ $efivarfs efivarfs" /proc/mounts; then
/linux/samples/vfs/
H A DMakefile2 userprogs-always-y += test-fsmount test-statx mountinfo test-list-all-mounts
H A D.gitignore3 /test-list-all-mounts
/linux/tools/testing/selftests/powerpc/mm/
H A Dstress_code_patching.sh6 DEBUFS_DIR=`cat /proc/mounts | grep debugfs | awk '{print $2}'`
/linux/Documentation/filesystems/fuse/
H A Dfuse.rst21 user. NOTE: this is not the same as mounts allowed with the "user"
45 non-privileged mounts. This opens up new possibilities for the use of
104 option is only valid for 'fuseblk' type mounts.
218 How do non-privileged mounts work?
224 The implication of providing non-privileged mounts is that the mount
249 for non-privileged mounts.
305 mounts, it can relax the last limitation in several ways:
321 set, super user's processes have unrestricted access to mounts
/linux/tools/testing/selftests/gpio/
H A Dgpio-mockup-sysfs.sh6 SYSFS=`grep -w sysfs /proc/mounts | cut -f2 -d' '`
/linux/tools/testing/selftests/bpf/
H A Dima_setup.sh21 local securityfs_dir=$(grep "securityfs" /proc/mounts | awk '{print $2}')
H A Dtest_bpftool_metadata.sh11 BPF_FS=$(awk '$3 == "bpf" {print $2; exit}' /proc/mounts)
/linux/Documentation/filesystems/smb/
H A Dsmbdirect.rst99 Or, verify `rdma` mount option for the share in `/proc/mounts`:
103 cat /proc/mounts | grep cifs
/linux/tools/testing/selftests/ftrace/
H A Dftracetest161 TRACING_DIR=`grep tracefs /proc/mounts | cut -f2 -d' ' | head -1`
163 DEBUGFS_DIR=`grep debugfs /proc/mounts | cut -f2 -d' ' | head -1`

1234