| /linux/fs/ | 
| H A D | pnode.c | 9 #include <linux/mount.h>12 #include <uapi/linux/mount.h>
 16 /* return the next shared peer mount of @p */
 17 static inline struct mount *next_peer(struct mount *p)  in next_peer()
 19 	return list_entry(p->mnt_share.next, struct mount, mnt_share);  in next_peer()
 22 static inline struct mount *first_slave(struct mount *p)  in first_slave()
 24 	return hlist_entry(p->mnt_slave_list.first, struct mount, mnt_slave);  in first_slave()
 27 static inline struct mount *next_slave(struct mount *p)  in next_slave()
 29 	return hlist_entry(p->mnt_slave.next, struct mount, mnt_slave);  in next_slave()
 33 static struct mount *get_peer_under_root(struct mount *mnt,  in get_peer_under_root()
 [all …]
 
 | 
| H A D | pnode.h | 11 #include "mount.h"33 static inline void set_mnt_shared(struct mount *mnt)  in set_mnt_shared()
 39 static inline bool peers(const struct mount *m1, const struct mount *m2)  in peers()
 44 void change_mnt_propagation(struct mount *, int);
 46 int propagate_mnt(struct mount *, struct mountpoint *, struct mount *,
 49 int propagate_mount_busy(struct mount *, int);
 50 void propagate_mount_unlock(struct mount *);
 51 void mnt_release_group_id(struct mount *);
 52 int get_dominating_id(struct mount *mnt, const struct path *root);
 53 int mnt_get_count(struct mount *mnt);
 [all …]
 
 | 
| H A D | mount.h | 2 #include <linux/mount.h>12 	struct mount *	root;
 15 		struct rb_node	*mnt_last_node;	 /* last (rightmost) mount in the rbtree */
 16 		struct rb_node	*mnt_first_node; /* first (leftmost) mount in the rbtree */
 21 	u64			seq_origin; /* Sequence number of origin mount namespace */
 43 struct mount {  struct
 45 	struct mount *mnt_parent;  argument
 61 	struct mount *mnt_next_for_sb;	/* the next two fields are hlist_node, */  argument
 62 	struct mount * __aligned(1) *mnt_pprev_for_sb;
 71 	struct mount *mnt_master;	/* slave is on master->mnt_slave_list */  argument
 [all …]
 
 | 
| H A D | namespace.c | 31 #include <uapi/linux/mount.h>41 /* Maximum number of mounts in a mount namespace */
 82 /* Don't allow confusion with old 32bit mount ID */
 147 	/* keep alive for {list,stat}mount() */  in mnt_ns_release()
 163 	/* remove from global mount namespace list */  in mnt_ns_tree_remove()
 171  * Lookup a mount namespace by id and take a passive reference count. Taking a
 172  * passive reference means the mount namespace can be emptied if e.g., the last
 175  * already shut down before acquiring @namespace_sem, {list,stat}mount() will
 176  * see that the mount rbtree of the namespace is empty.
 180  * possible. So if we didn't find a mount namespace and the sequence
 [all …]
 
 | 
| /linux/Documentation/filesystems/ | 
| H A D | autofs-mount-control.rst | 17 are things such as setting an autofs mount catatonic, setting the20 mount itself which prevents us being able to use open(2) to obtain a
 25 needs to walk back up the mount tree to construct a path, such as
 28 from the mount tree.
 33 because autofs direct mounts and the implementation of "on demand mount
 34 and expire" of nested mount trees have the file system mounted directly
 35 on top of the mount trigger directory dentry.
 39 a direct mount in disguise) and indirect.
 62 operation. So we see a mount of shark:/autofs/export1 on /test/g1, for
 65 The way that direct mounts are handled is by making an autofs mount on
 [all …]
 
 | 
| H A D | overlayfs.rst | 35 make the overlay mount more compliant with filesystem scanners and48 The "xino" feature can be enabled with the "-o xino=on" overlay mount option.
 51 the lifetime of the filesystem.  The "-o xino=auto" overlay mount option
 120 At mount time, the two directories given as mount options "lowerdir" and
 123   mount -t overlay overlay -olowerdir=/lower,upperdir=/upper,\
 237 Mount options:
 298 In the old mount api the credentials of the task calling mount(2) are
 299 stashed. In the new mount api the credentials of the task creating the
 304 mount option which will cause the credentials of the calling task to be
 306 the new mount api as the old mount api combines setting options and
 [all …]
 
 | 
| H A D | idmappings.rst | 382     - mount's idmapping (``mnt_idmap(vfsmnt)``)384 Let's see some examples with caller/filesystem idmapping but without mount
 386 revisit/reconsider these examples, this time using mount idmappings, to see how
 469 userspace id. We could only do this if we were to mount the whole filesystem
 606 change in ownership is tied to the lifetime of the filesystem mount, i.e. the
 608 filesystem and mount it again in another user namespace. This is usually
 625 localized way. The ownership changes are restricted to a specific mount and the
 626 ownership changes are tied to the lifetime of the mount. All other users and
 631 completely under an idmapped mount to get the same effect. This has the
 638 Filesystem types vs idmapped mount types
 [all …]
 
 | 
| H A D | gfs2-uevents.rst | 7 During the lifetime of a GFS2 mount, a number of uevents are generated.17 The ADD event occurs at mount time. It will always be the first
 18 uevent generated by the newly created filesystem. If the mount
 23 and RDONLY=[0|1] that specify the spectator status (a read-only mount
 30 The ONLINE uevent is generated after a successful mount or remount. It
 40 successful mount of the filesystem by the first node (FIRSTMOUNT=Done).
 42 nodes in the cluster to mount the filesystem.
 49 for every journal recovered, whether it is during the initial mount
 58 uevent for a successful mount or remount.
 71 The REMOVE uevent is generated at the end of an unsuccessful mount
 [all …]
 
 | 
| H A D | zonefs.rst | 71 mount, zonefs uses blkdev_report_zones() to obtain the device zone configuration72 and populates the mount point with a static file tree solely based on this
 86 sub-directory automatically created on mount.
 256 with the "errors=xxx" mount option. The table below summarizes the result of
 257 zonefs I/O error processing depending on the mount option and on the zone
 263     |    mount     |   zone    | file         file          device zone  |
 285 * The "errors=remount-ro" mount option is the default behavior of zonefs I/O
 286   error processing if no errors mount option is specified.
 287 * With the "errors=remount-ro" mount option, the change of the file access
 298   zone-offline mount options are temporary for zones in a good condition.
 [all …]
 
 | 
| /linux/Documentation/admin-guide/cifs/ | 
| H A D | usage.rst | 54 If you do not have the utility mount.cifs (in the Samba 4.x source tree and on55 the CIFS VFS web site) copy it to the same directory in which mount helpers
 57 required, mount.cifs is recommended.  Most distros include a ``cifs-utils``
 62 domain to the proper network user.  The mount.cifs mount helper can be
 78 the new default. To use old dialects (e.g. to mount Windows XP) use "vers=1.0"
 79 on mount (or vers=2.0 for Windows Vista).  Note that the CIFS (vers=1.0) is
 83 There are additional mount options that may be helpful for SMB3 to get
 91 To permit users to mount and unmount over directories they own is possible
 92 with the cifs vfs.  A way to enable such mounting is to mark the mount.cifs
 93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to
 [all …]
 
 | 
| /linux/security/tomoyo/ | 
| H A D | mount.c | 3  * security/tomoyo/mount.c9 #include <uapi/linux/mount.h>
 12 /* String table for special mount operations. */
 24  * tomoyo_audit_mount_log - Audit mount log.
 32 	return tomoyo_supervisor(r, "file mount %s %s %s 0x%lX\n",  in tomoyo_audit_mount_log()
 33 				 r->param.mount.dev->name,  in tomoyo_audit_mount_log()
 34 				 r->param.mount.dir->name,  in tomoyo_audit_mount_log()
 35 				 r->param.mount.type->name,  in tomoyo_audit_mount_log()
 36 				 r->param.mount.flags);  in tomoyo_audit_mount_log()
 53 	return tomoyo_compare_number_union(r->param.mount.flags,  in tomoyo_check_mount_acl()
 [all …]
 
 | 
| /linux/Documentation/filesystems/fuse/ | 
| H A D | fuse.rst | 18 Non-privileged mount (or user mount):31 Mount owner:
 41 module (fuse.ko), a userspace library (libfuse.*) and a mount utility
 55 The filesystem type given to mount(2) can be one of the following:
 58       This is the usual way to mount a FUSE filesystem.  The first
 59       argument of the mount system call may contain an arbitrary string,
 64       mount system call is interpreted as the name of the device.
 66 Mount options
 78   The numeric user id of the mount owner.
 81   The numeric group id of the mount owner.
 [all …]
 
 | 
| /linux/Documentation/admin-guide/nfs/ | 
| H A D | nfs-rdma.rst | 55   An NFS/RDMA mount point can be obtained by using the mount.nfs command in59   mount.nfs you are using, type:
 63     $ /sbin/mount.nfs -V
 73   these to create an NFS/RDMA enabled mount command), the installation
 84   After building the nfs-utils package, there will be a mount.nfs binary in
 85   the utils/mount directory. This binary can be used to initiate NFS v2, v3,
 86   or v4 mounts. To initiate a v4 mount, the binary must be called
 87   mount.nfs4.  The standard technique is to create a symlink called
 88   mount.nfs4 to mount.nfs.
 90   This mount.nfs binary should be installed at /sbin/mount.nfs as follows:
 [all …]
 
 | 
| /linux/tools/testing/selftests/mount_setattr/ | 
| H A D | mount_setattr_test.c | 10 #include <sys/mount.h>21 #include <linux/mount.h>
 220 	if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0))  in prepare_unpriv_mountns()
 380 	ASSERT_EQ(mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV,  in FIXTURE_SETUP()
 385 	ASSERT_EQ(mount("testing", "/tmp/B", "tmpfs", MS_NOATIME | MS_NODEV,  in FIXTURE_SETUP()
 394 	ASSERT_EQ(mount("testing", "/tmp/B/BB", "tmpfs", MS_NOATIME | MS_NODEV,  in FIXTURE_SETUP()
 397 	ASSERT_EQ(mount("testing", "/mnt", "tmpfs", MS_NOATIME | MS_NODEV,  in FIXTURE_SETUP()
 402 	ASSERT_EQ(mount("testing", "/mnt/A", "tmpfs", MS_NOATIME | MS_NODEV,  in FIXTURE_SETUP()
 407 	ASSERT_EQ(mount("/tmp", "/mnt/A/AA", NULL, MS_BIND | MS_REC, NULL), 0);  in FIXTURE_SETUP()
 411 	ASSERT_EQ(mount("testing", "/mnt/B", "ramfs",  in FIXTURE_SETUP()
 [all …]
 
 | 
| /linux/tools/testing/selftests/pid_namespace/ | 
| H A D | pid_max.c | 13 #include <sys/mount.h>43 	ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_cb()
 45 		fprintf(stderr, "%m - Failed to make rootfs private mount\n"); in pid_max_cb()
 51 	ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_cb()
 53 		fprintf(stderr, "%m - Failed to mount proc\n"); in pid_max_cb()
 89 	ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_inner()
 91 		fprintf(stderr, "%m - Failed to make rootfs private mount\n"); in pid_max_nested_inner()
 97 	ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_inner()
 99 		fprintf(stderr, "%m - Failed to mount proc\n"); in pid_max_nested_inner()
 164 	ret = mount("", "/", NUL in pid_max_nested_outer()
 [all...]
 | 
| /linux/tools/include/uapi/linux/ | 
| H A D | mount.h | 7  * These are the fs-independent mount-flags: up to 32 flags are supported9  * Usage of these is restricted within the kernel to core mount(2) code and
 13 #define MS_RDONLY	 1	/* Mount read-only */
 56  * Old magic mount flag and mask
 77 #define MOVE_MOUNT_BENEATH		0x00000200 /* Mount beneath top mount */
 114  * Mount attributes.
 116 #define MOUNT_ATTR_RDONLY	0x00000001 /* Mount read-only */
 125 #define MOUNT_ATTR_IDMAP	0x00100000 /* Idmap mount to @userns_fd in struct mount_attr. */
 143  * Structure for getting mount/superbloc
 [all...]
 | 
| /linux/tools/perf/trace/beauty/include/uapi/linux/ | 
| H A D | mount.h | 7  * These are the fs-independent mount-flags: up to 32 flags are supported9  * Usage of these is restricted within the kernel to core mount(2) code and
 13 #define MS_RDONLY	 1	/* Mount read-only */
 56  * Old magic mount flag and mask
 77 #define MOVE_MOUNT_BENEATH		0x00000200 /* Mount beneath top mount */
 114  * Mount attributes.
 116 #define MOUNT_ATTR_RDONLY	0x00000001 /* Mount read-only */
 125 #define MOUNT_ATTR_IDMAP	0x00100000 /* Idmap mount to @userns_fd in struct mount_attr. */
 143  * Structure for getting mount/superblock/filesystem info with statmount(2).
 164 	__u64 mnt_id;		/* Unique ID of mount */
 [all …]
 
 | 
| /linux/tools/testing/selftests/filesystems/mount-notify/ | 
| H A D | mount-notify_test.c | 17 #include <sys/mount.h>26 static const char root_mntpoint_templ[] = "/tmp/mount-notify_test_root.XXXXXX";
 56 	ASSERT_EQ(mount("", "/", NULL, MS_REC|MS_PRIVATE, NULL), 0);  in FIXTURE_SETUP()
 64 	ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0);  in FIXTURE_SETUP()
 243 	ret = mount("", "/", NULL, MS_SHARED, NULL);  in setup_mount_tree()
 247 		ret = mount("/", "/", NULL, MS_BIND, NULL);  in setup_mount_tree()
 257 	ret = mount("/", "/", NULL, MS_BIND, NULL);  in TEST_F()
 282 	ret = mount("/", "/a", NULL, MS_BIND, NULL);  in TEST_F()
 322 	ret = mount("", "/", NULL, MS_PRIVATE, NULL);  in TEST_F()
 378 	ret = mount("/", "/a", NULL, MS_BIND, NULL);  in TEST_F()
 [all …]
 
 | 
| H A D | mount-notify_test_ns.c | 17 #include <sys/mount.h>26 static const char root_mntpoint_templ[] = "/tmp/mount-notify_test_root.XXXXXX";
 73 	ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0);  in FIXTURE_SETUP()
 270 	ret = mount("", "/", NULL, MS_SHARED, NULL);  in setup_mount_tree()
 274 		ret = mount("/", "/", NULL, MS_BIND, NULL);  in setup_mount_tree()
 284 	ret = mount("/", "/", NULL, MS_BIND, NULL);  in TEST_F()
 309 	ret = mount("/", "/a", NULL, MS_BIND, NULL);  in TEST_F()
 349 	ret = mount("", "/", NULL, MS_PRIVATE, NULL);  in TEST_F()
 405 	ret = mount("/", "/a", NULL, MS_BIND, NULL);  in TEST_F()
 408 	ret = mount("", "/a", NULL, MS_SHARED, NULL);  in TEST_F()
 [all …]
 
 | 
| /linux/Documentation/filesystems/smb/ | 
| H A D | cifsroot.rst | 15 which will tell the kernel to mount the root file system over the18 In order to mount, the network stack will also need to be set up by
 22 A CIFS root mount currently requires the use of SMB1+UNIX Extensions
 31 to use can nonetheless be changed via the 'vers=' mount option.  This
 52 This is just a virtual device that basically tells the kernel to mount
 59 Enables the kernel to mount the root file system via SMB that are
 62 The default mount options are set in fs/smb/client/cifsroot.c.
 71 	Optional mount options. For more information, see mount.cifs(8).
 
 | 
| /linux/tools/testing/selftests/filesystems/ | 
| H A D | devpts_pts.c | 12 #include <sys/mount.h>210 	ret = mount("devpts", mntpoint, "devpts", MS_NOSUID | MS_NOEXEC,  in verify_non_standard_devpts_mount()
 213 		fprintf(stderr, "Failed to mount devpts fs to \"%s\" in new "  in verify_non_standard_devpts_mount()
 214 				"mount namespace: %s\n", mntpoint,  in verify_non_standard_devpts_mount()
 238 	ret = mount("/dev/pts/ptmx", "/dev/ptmx", NULL, MS_BIND, NULL);  in verify_ptmx_bind_mount()
 240 		fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to "  in verify_ptmx_bind_mount()
 241 				"\"/dev/ptmx\" mount namespace\n");  in verify_ptmx_bind_mount()
 265 	ret = mount("/dev/pts/ptmx", ptmx, NULL, MS_BIND, NULL);  in verify_invalid_ptmx_bind_mount()
 268 		fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to "  in verify_invalid_ptmx_bind_mount()
 269 				"\"%s\" mount namespace\n", ptmx);  in verify_invalid_ptmx_bind_mount()
 [all …]
 
 | 
| /linux/tools/testing/selftests/firmware/ | 
| H A D | fw_namespace.c | 2 /* Test triggering of loading of firmware from different mount3  * namespaces. Expect firmware to be always loaded from the mount
 14 #include <sys/mount.h>
 68 		if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1)  in test_fw_in_ns()
 101 	if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL) == -1)  in test_fw_in_ns()
 105 		if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1)  in test_fw_in_ns()
 122 	/* Mount tmpfs to /lib/firmware so we don't have to assume  in main()
 124 	if (mount("test", "/lib/firmware", "tmpfs", 0, NULL) == -1)  in main()
 134 	/* Positive case: firmware in PID1 mount namespace */  in main()
 139 	/* Negative case: firmware in child mount namespace, expected to fail */  in main()
 
 | 
| /linux/fs/xfs/ | 
| H A D | xfs_rtalloc.h | 20  * Initialize realtime fields in the mount structure.24 	struct xfs_mount	*mp);	/* file system mount structure */
 30  * Get the bitmap and summary inodes into the mount structure
 31  * at mount time.
 35 	struct xfs_mount	*mp);	/* file system mount structure */
 42 	struct xfs_mount	*mp,	/* file system mount structure */
 55 	xfs_mount_t	*mp)	/* file system mount structure */  in xfs_rtmount_init()
 
 | 
| /linux/fs/jfs/ | 
| H A D | jfs_mount.c | 11  * file system mount is interpreted as the mount of aggregate,12  * if not already mounted, and mount of the single/only fileset in
 16  * (aka mount inode) initialized with aggregate superblock;
 27  * each inode points to the mount inode (to facilitate access to
 66  *		-EBUSY	- mount table full
 67  *		-ENOTDIR- cvrdvp not directory on a device mount
 81 	 * (initialize mount inode from the superblock)  in jfs_mount()
 161 	 *	mount (the only/single) fileset  in jfs_mount()
 210 		jfs_err("Mount JFS Failure: %d", rc);  in jfs_mount()
 218  * FUNCTION:	Completes read-write mount, or remounts read-only volume
 [all …]
 
 | 
| /linux/samples/binderfs/ | 
| H A D | binderfs_example.c | 11 #include <sys/mount.h>25 		fprintf(stderr, "%s - Failed to unshare mount namespace\n",  in main()
 30 	ret = mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0);  in main()
 32 		fprintf(stderr, "%s - Failed to mount / as private\n",  in main()
 44 	ret = mount(NULL, "/dev/binderfs", "binder", 0, 0);  in main()
 46 		fprintf(stderr, "%s - Failed to mount binderfs\n",  in main()
 80 	/* Cleanup happens when the mount namespace dies. */  in main()
 
 |