| /linux/Documentation/filesystems/ |
| H A D | sharedsubtree.rst | 33 Shared subtree provides four different flavors of mounts; struct vfsmount to be 56 and the contents of both the mounts remain identical. 85 All slave mounts have a master mount which is a shared. 183 B) A process wants its mounts invisible to any other process, but 184 still be able to see the other system mounts. 198 Hence forth any mounts within the /myprivatetree done by the 199 process will not show up in any other namespace. However mounts 209 The above semantics allows a way to share mounts across 260 (1) Shared mounts 272 /mnt or /tmp reflect in all the other mounts of its peer [all …]
|
| H A D | autofs-mount-control.rst | 11 restarting autofs when there are busy mounts). 19 certain types of autofs triggered mounts can end up covering an autofs 23 Currently autofs uses "umount -l" (lazy umount) to clear active mounts 31 mounts. Immediately one thinks of just adding the ability to remount 33 because autofs direct mounts and the implementation of "on demand mount 61 mounts are triggered for each sub-directory key by the inode lookup 65 The way that direct mounts are handled is by making an autofs mount on 97 cases (in 2.4) where the available number of mounts are exhausted or 104 offsets are implemented using the same mechanism as the direct mounts 119 offset mounts in place we need to be able to obtain a file handle [all …]
|
| H A D | autofs.rst | 32 and mounts filesystems. This will often be the "automount" program, 125 about this dentry and normal checks for mounts and automounts 132 - A return value of `-EISDIR` tells the VFS to ignore any mounts 204 The VFS has a mechanism for automatically expiring unused mounts, 207 mounts that were created by `d_automount()` returning a filesystem to be 213 The VFS also supports "expiry" of mounts using the MNT_EXPIRE flag to 248 there can be an accumulation of mounts that aren't actually being 251 preventing this apparent inability to expire mounts that aren't 261 There is an option with indirect mounts to consider each of the leaves 267 setting of an expire timeout for individual mounts. But there are [all …]
|
| H A D | propagate_umount.txt | 3 Umount propagation starts with a set of mounts we are already going to 6 mounts and with parent that would receive events from the parent of that 10 It is convenient to define several properties of sets of mounts: 12 1) A set S of mounts is non-shifting if for any mount X belonging 16 2) A set S is non-revealing if all locked mounts that belong to S have 21 The set of mounts taken out by umount(2) must be non-shifting and 23 any remaining mounts and the second is what prevents the exposure 29 Resulting set may not be closed; there might still be mounts outside 51 We are given a closed set U and we want to find all mounts that have 110 subtree mounted strictly inside m and containing mounts that do not [all …]
|
| H A D | devpts.rst | 9 and their indices in all other mounts. 11 All mounts of the devpts filesystem now create a ``/dev/pts/ptmx`` node
|
| /linux/init/ |
| H A D | Makefile | 8 obj-y := main.o version.o mounts.o 19 mounts-y := do_mounts.o 20 mounts-$(CONFIG_BLK_DEV_RAM) += do_mounts_rd.o 21 mounts-$(CONFIG_BLK_DEV_INITRD) += do_mounts_initrd.o
|
| /linux/tools/hv/ |
| H A D | hv_vss_daemon.c | 116 FILE *mounts; in vss_operate() local 135 mounts = setmntent("/proc/mounts", "r"); in vss_operate() 136 if (mounts == NULL) in vss_operate() 139 while ((ent = getmntent(mounts))) { in vss_operate() 167 endmntent(mounts); in vss_operate() 186 endmntent(mounts); in vss_operate()
|
| /linux/tools/bootconfig/scripts/ |
| H A D | ftrace2bconf.sh | 26 TRACEFS=`grep -m 1 -w tracefs /proc/mounts | cut -f 2 -d " "` 28 if ! grep -wq debugfs /proc/mounts; then 32 TRACEFS=`grep -m 1 -w debugfs /proc/mounts | cut -f 2 -d " "`/tracing
|
| H A D | bconf2ftrace.sh | 52 TRACEFS=`grep -m 1 -w tracefs /proc/mounts | cut -f 2 -d " "` 54 if ! grep -wq debugfs /proc/mounts; then 58 TRACEFS=`grep -m 1 -w debugfs /proc/mounts | cut -f 2 -d " "`/tracing
|
| /linux/Documentation/networking/ |
| H A D | sysfs-tagging.rst | 31 kobj_nstype first mounts sysfs, a new superblock is created. It 32 will be differentiated from other sysfs mounts by having its 34 through bind mounting and mounts propagation, a task can easily view 35 the contents of other namespaces' sysfs mounts. Therefore, when a
|
| /linux/scripts/selinux/ |
| H A D | install_policy.sh | 76 mounts=`cat /proc/$$/mounts | \ 79 $SF -F file_contexts $mounts
|
| /linux/tools/testing/selftests/resctrl/ |
| H A D | resctrlfs.c | 20 FILE *mounts; in find_resctrl_mount() local 23 mounts = fopen("/proc/mounts", "r"); in find_resctrl_mount() 24 if (!mounts) { in find_resctrl_mount() 28 while (!feof(mounts)) { in find_resctrl_mount() 29 if (!fgets(line, 256, mounts)) in find_resctrl_mount() 43 fclose(mounts); in find_resctrl_mount() 50 fclose(mounts); in find_resctrl_mount()
|
| /linux/tools/testing/selftests/pstore/ |
| H A D | pstore_post_reboot_tests | 23 mount_info=`grep pstore /proc/mounts` 30 mount_point=`grep pstore /proc/mounts | cut -d' ' -f2 | head -n1`
|
| /linux/tools/lib/api/fs/ |
| H A D | fs.c | 93 const char * const * const mounts; member 110 .mounts = lower_name##__known_mountpoints, \ 193 ptr = fs->mounts; in fs__check_mounts() 267 return getenv(upper_name) ?: *fs->mounts; in mount_overload()
|
| /linux/fs/ |
| H A D | mount.h | 14 struct rb_root mounts; /* Protected by namespace_sem */ member 195 return RB_EMPTY_ROOT(&ns->mounts); in mnt_ns_empty() 206 rb_erase(&mnt->mnt_node, &ns->mounts); in move_from_ns()
|
| /linux/tools/testing/selftests/kexec/ |
| H A D | kexec_common_lib.sh | 9 SECURITYFS=$(grep "securityfs" /proc/mounts | awk '{print $2}') 48 if ! grep -q "^\S\+ $efivarfs efivarfs" /proc/mounts; then
|
| /linux/samples/vfs/ |
| H A D | Makefile | 2 userprogs-always-y += test-fsmount test-statx mountinfo test-list-all-mounts
|
| H A D | .gitignore | 3 /test-list-all-mounts
|
| /linux/tools/testing/selftests/powerpc/mm/ |
| H A D | stress_code_patching.sh | 6 DEBUFS_DIR=`cat /proc/mounts | grep debugfs | awk '{print $2}'`
|
| /linux/Documentation/filesystems/fuse/ |
| H A D | fuse.rst | 21 user. NOTE: this is not the same as mounts allowed with the "user" 45 non-privileged mounts. This opens up new possibilities for the use of 104 option is only valid for 'fuseblk' type mounts. 218 How do non-privileged mounts work? 224 The implication of providing non-privileged mounts is that the mount 249 for non-privileged mounts. 305 mounts, it can relax the last limitation in several ways: 321 set, super user's processes have unrestricted access to mounts
|
| /linux/tools/testing/selftests/gpio/ |
| H A D | gpio-mockup-sysfs.sh | 6 SYSFS=`grep -w sysfs /proc/mounts | cut -f2 -d' '`
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | ima_setup.sh | 21 local securityfs_dir=$(grep "securityfs" /proc/mounts | awk '{print $2}')
|
| H A D | test_bpftool_metadata.sh | 11 BPF_FS=$(awk '$3 == "bpf" {print $2; exit}' /proc/mounts)
|
| /linux/Documentation/filesystems/smb/ |
| H A D | smbdirect.rst | 99 Or, verify `rdma` mount option for the share in `/proc/mounts`: 103 cat /proc/mounts | grep cifs
|
| /linux/tools/testing/selftests/ftrace/ |
| H A D | ftracetest | 161 TRACING_DIR=`grep tracefs /proc/mounts | cut -f2 -d' ' | head -1` 163 DEBUGFS_DIR=`grep debugfs /proc/mounts | cut -f2 -d' ' | head -1`
|