Home
last modified time | relevance | path

Searched full:mount (Results 1 – 25 of 1088) sorted by relevance

12345678910>>...44

/linux/fs/
H A Dpnode.c9 #include <linux/mount.h>
12 #include <uapi/linux/mount.h>
16 /* return the next shared peer mount of @p */
17 static inline struct mount *next_peer(struct mount *p) in next_peer()
19 return list_entry(p->mnt_share.next, struct mount, mnt_share); in next_peer()
22 static inline struct mount *first_slave(struct mount *p) in first_slave()
24 return hlist_entry(p->mnt_slave_list.first, struct mount, mnt_slave); in first_slave()
27 static inline struct mount *next_slave(struct mount *p) in next_slave()
29 return hlist_entry(p->mnt_slave.next, struct mount, mnt_slave); in next_slave()
33 static struct mount *get_peer_under_root(struct mount *mnt, in get_peer_under_root()
[all …]
H A Dpnode.h11 #include "mount.h"
33 static inline void set_mnt_shared(struct mount *mnt) in set_mnt_shared()
39 static inline bool peers(const struct mount *m1, const struct mount *m2) in peers()
44 void change_mnt_propagation(struct mount *, int);
46 int propagate_mnt(struct mount *, struct mountpoint *, struct mount *,
49 int propagate_mount_busy(struct mount *, int);
50 void propagate_mount_unlock(struct mount *);
51 void mnt_release_group_id(struct mount *);
52 int get_dominating_id(struct mount *mnt, const struct path *root);
53 int mnt_get_count(struct mount *mnt);
[all …]
H A Dmount.h2 #include <linux/mount.h>
12 struct mount * root;
15 struct rb_node *mnt_last_node; /* last (rightmost) mount in the rbtree */
16 struct rb_node *mnt_first_node; /* first (leftmost) mount in the rbtree */
21 u64 seq_origin; /* Sequence number of origin mount namespace */
44 struct mount { struct
46 struct mount *mnt_parent; argument
62 struct mount *mnt_next_for_sb; /* the next two fields are hlist_node, */ argument
63 struct mount * __aligned(1) *mnt_pprev_for_sb;
72 struct mount *mnt_master; /* slave is on master->mnt_slave_list */ argument
[all …]
/linux/Documentation/filesystems/
H A Dautofs-mount-control.rst17 are things such as setting an autofs mount catatonic, setting the
20 mount itself which prevents us being able to use open(2) to obtain a
25 needs to walk back up the mount tree to construct a path, such as
28 from the mount tree.
33 because autofs direct mounts and the implementation of "on demand mount
34 and expire" of nested mount trees have the file system mounted directly
35 on top of the mount trigger directory dentry.
39 a direct mount in disguise) and indirect.
62 operation. So we see a mount of shark:/autofs/export1 on /test/g1, for
65 The way that direct mounts are handled is by making an autofs mount on
[all …]
H A Doverlayfs.rst35 make the overlay mount more compliant with filesystem scanners and
48 The "xino" feature can be enabled with the "-o xino=on" overlay mount option.
51 the lifetime of the filesystem. The "-o xino=auto" overlay mount option
120 At mount time, the two directories given as mount options "lowerdir" and
123 mount -t overlay overlay -olowerdir=/lower,upperdir=/upper,\
237 Mount options:
298 In the old mount api the credentials of the task calling mount(2) are
299 stashed. In the new mount api the credentials of the task creating the
304 mount option which will cause the credentials of the calling task to be
306 the new mount api as the old mount api combines setting options and
[all …]
H A Didmappings.rst382 - mount's idmapping (``mnt_idmap(vfsmnt)``)
384 Let's see some examples with caller/filesystem idmapping but without mount
386 revisit/reconsider these examples, this time using mount idmappings, to see how
469 userspace id. We could only do this if we were to mount the whole filesystem
606 change in ownership is tied to the lifetime of the filesystem mount, i.e. the
608 filesystem and mount it again in another user namespace. This is usually
625 localized way. The ownership changes are restricted to a specific mount and the
626 ownership changes are tied to the lifetime of the mount. All other users and
631 completely under an idmapped mount to get the same effect. This has the
638 Filesystem types vs idmapped mount types
[all …]
/linux/Documentation/admin-guide/cifs/
H A Dusage.rst54 If you do not have the utility mount.cifs (in the Samba 4.x source tree and on
55 the CIFS VFS web site) copy it to the same directory in which mount helpers
57 required, mount.cifs is recommended. Most distros include a ``cifs-utils``
62 domain to the proper network user. The mount.cifs mount helper can be
78 the new default. To use old dialects (e.g. to mount Windows XP) use "vers=1.0"
79 on mount (or vers=2.0 for Windows Vista). Note that the CIFS (vers=1.0) is
83 There are additional mount options that may be helpful for SMB3 to get
91 To permit users to mount and unmount over directories they own is possible
92 with the cifs vfs. A way to enable such mounting is to mark the mount.cifs
93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to
[all …]
/linux/security/tomoyo/
H A Dmount.c3 * security/tomoyo/mount.c
9 #include <uapi/linux/mount.h>
12 /* String table for special mount operations. */
24 * tomoyo_audit_mount_log - Audit mount log.
32 return tomoyo_supervisor(r, "file mount %s %s %s 0x%lX\n", in tomoyo_audit_mount_log()
33 r->param.mount.dev->name, in tomoyo_audit_mount_log()
34 r->param.mount.dir->name, in tomoyo_audit_mount_log()
35 r->param.mount.type->name, in tomoyo_audit_mount_log()
36 r->param.mount.flags); in tomoyo_audit_mount_log()
53 return tomoyo_compare_number_union(r->param.mount.flags, in tomoyo_check_mount_acl()
[all …]
/linux/Documentation/filesystems/fuse/
H A Dfuse.rst18 Non-privileged mount (or user mount):
31 Mount owner:
41 module (fuse.ko), a userspace library (libfuse.*) and a mount utility
55 The filesystem type given to mount(2) can be one of the following:
58 This is the usual way to mount a FUSE filesystem. The first
59 argument of the mount system call may contain an arbitrary string,
64 mount system call is interpreted as the name of the device.
66 Mount options
78 The numeric user id of the mount owner.
81 The numeric group id of the mount owner.
[all …]
/linux/Documentation/admin-guide/nfs/
H A Dnfs-rdma.rst55 An NFS/RDMA mount point can be obtained by using the mount.nfs command in
59 mount.nfs you are using, type:
63 $ /sbin/mount.nfs -V
73 these to create an NFS/RDMA enabled mount command), the installation
84 After building the nfs-utils package, there will be a mount.nfs binary in
85 the utils/mount directory. This binary can be used to initiate NFS v2, v3,
86 or v4 mounts. To initiate a v4 mount, the binary must be called
87 mount.nfs4. The standard technique is to create a symlink called
88 mount.nfs4 to mount.nfs.
90 This mount.nfs binary should be installed at /sbin/mount.nfs as follows:
[all …]
/linux/tools/testing/selftests/mount_setattr/
H A Dmount_setattr_test.c10 #include <sys/mount.h>
21 #include <linux/mount.h>
220 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in prepare_unpriv_mountns()
380 ASSERT_EQ(mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP()
385 ASSERT_EQ(mount("testing", "/tmp/B", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP()
394 ASSERT_EQ(mount("testing", "/tmp/B/BB", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP()
397 ASSERT_EQ(mount("testing", "/mnt", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP()
402 ASSERT_EQ(mount("testing", "/mnt/A", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP()
407 ASSERT_EQ(mount("/tmp", "/mnt/A/AA", NULL, MS_BIND | MS_REC, NULL), 0); in FIXTURE_SETUP()
411 ASSERT_EQ(mount("testing", "/mnt/B", "ramfs", in FIXTURE_SETUP()
[all …]
/linux/fs/autofs/
H A Ddev-ioctl.c21 * an ioctl file descriptor on an autofs mount that may be covered by
22 * another mount. This situation arises when starting automount(8)
24 * mounts (used for autofs lazy mount/umount of nested mount trees),
187 /* Find the topmost mount satisfying test() */
229 * Open a file descriptor on the autofs mount point corresponding
244 /* Open a file descriptor on an autofs mount point */
284 * Send "ready" status for an existing wait (either a mount or an expire
298 * Send "fail" status for an existing wait (either a mount or an expire
316 * Normally this is set at mount using an option but if we
317 * are reconnecting to a busy mount then we need to use this
[all …]
H A Droot.c91 * mount point. The daemon must have failed to mount this in autofs_dir_open()
94 * mount request. Otherwise we're doing a readdir on the in autofs_dir_open()
254 pr_debug("waiting for mount name=%pd\n", path->dentry); in autofs_mount_wait()
256 pr_debug("mount wait done status=%d\n", status); in autofs_mount_wait()
294 /* If this is an indirect mount the dentry could have gone away in autofs_mountpoint_changed()
299 * happen is an autofs indirect mount that has the "browse" in autofs_mountpoint_changed()
302 * directory and create a symlink as the mount leaving the in autofs_mountpoint_changed()
305 * Another not so obvious case is when a mount in an autofs in autofs_mountpoint_changed()
306 * indirect mount that uses the "nobrowse" option is being in autofs_mountpoint_changed()
307 * expired at the same time as a path walk. If the mount has in autofs_mountpoint_changed()
[all …]
/linux/tools/testing/selftests/pid_namespace/
H A Dpid_max.c13 #include <sys/mount.h>
43 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_cb()
45 fprintf(stderr, "%m - Failed to make rootfs private mount\n"); in pid_max_cb()
51 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_cb()
53 fprintf(stderr, "%m - Failed to mount proc\n"); in pid_max_cb()
89 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_inner()
91 fprintf(stderr, "%m - Failed to make rootfs private mount\n"); in pid_max_nested_inner()
97 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_inner()
99 fprintf(stderr, "%m - Failed to mount proc\n"); in pid_max_nested_inner()
164 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_outer()
[all …]
/linux/tools/include/uapi/linux/
H A Dmount.h7 * These are the fs-independent mount-flags: up to 32 flags are supported
9 * Usage of these is restricted within the kernel to core mount(2) code and
13 #define MS_RDONLY 1 /* Mount read-only */
56 * Old magic mount flag and mask
77 #define MOVE_MOUNT_BENEATH 0x00000200 /* Mount beneath top mount */
114 * Mount attributes.
116 #define MOUNT_ATTR_RDONLY 0x00000001 /* Mount read-only */
125 #define MOUNT_ATTR_IDMAP 0x00100000 /* Idmap mount to @userns_fd in struct mount_attr. */
143 * Structure for getting mount/superbloc
[all...]
/linux/include/uapi/linux/
H A Dmount.h7 * These are the fs-independent mount-flags: up to 32 flags are supported
9 * Usage of these is restricted within the kernel to core mount(2) code and
13 #define MS_RDONLY 1 /* Mount read-only */
56 * Old magic mount flag and mask
77 #define MOVE_MOUNT_BENEATH 0x00000200 /* Mount beneath top mount */
114 * Mount attributes.
116 #define MOUNT_ATTR_RDONLY 0x00000001 /* Mount read-only */
125 #define MOUNT_ATTR_IDMAP 0x00100000 /* Idmap mount to @userns_fd in struct mount_attr. */
143 * Structure for getting mount/superblock/filesystem info with statmount(2).
164 __u64 mnt_id; /* Unique ID of mount */
[all …]
/linux/tools/perf/trace/beauty/include/uapi/linux/
H A Dmount.h7 * These are the fs-independent mount-flags: up to 32 flags are supported
9 * Usage of these is restricted within the kernel to core mount(2) code and
13 #define MS_RDONLY 1 /* Mount read-only */
56 * Old magic mount flag and mask
77 #define MOVE_MOUNT_BENEATH 0x00000200 /* Mount beneath top mount */
114 * Mount attributes.
116 #define MOUNT_ATTR_RDONLY 0x00000001 /* Mount read-only */
125 #define MOUNT_ATTR_IDMAP 0x00100000 /* Idmap mount to @userns_fd in struct mount_attr. */
143 * Structure for getting mount/superblock/filesystem info with statmount(2).
164 __u64 mnt_id; /* Unique ID of mount */
[all …]
/linux/tools/testing/selftests/filesystems/mount-notify/
H A Dmount-notify_test.c17 #include <sys/mount.h>
26 static const char root_mntpoint_templ[] = "/tmp/mount-notify_test_root.XXXXXX";
56 ASSERT_EQ(mount("", "/", NULL, MS_REC|MS_PRIVATE, NULL), 0); in FIXTURE_SETUP()
64 ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0); in FIXTURE_SETUP()
243 ret = mount("", "/", NULL, MS_SHARED, NULL); in setup_mount_tree()
247 ret = mount("/", "/", NULL, MS_BIND, NULL); in setup_mount_tree()
257 ret = mount("/", "/", NULL, MS_BIND, NULL); in TEST_F()
282 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F()
322 ret = mount("", "/", NULL, MS_PRIVATE, NULL); in TEST_F()
378 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F()
[all …]
H A Dmount-notify_test_ns.c17 #include <sys/mount.h>
26 static const char root_mntpoint_templ[] = "/tmp/mount-notify_test_root.XXXXXX";
73 ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0); in FIXTURE_SETUP()
270 ret = mount("", "/", NULL, MS_SHARED, NULL); in setup_mount_tree()
274 ret = mount("/", "/", NULL, MS_BIND, NULL); in setup_mount_tree()
284 ret = mount("/", "/", NULL, MS_BIND, NULL); in TEST_F()
309 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F()
349 ret = mount("", "/", NULL, MS_PRIVATE, NULL); in TEST_F()
405 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F()
408 ret = mount("", "/a", NULL, MS_SHARED, NULL); in TEST_F()
[all …]
/linux/Documentation/filesystems/smb/
H A Dcifsroot.rst15 which will tell the kernel to mount the root file system over the
18 In order to mount, the network stack will also need to be set up by
22 A CIFS root mount currently requires the use of SMB1+UNIX Extensions
31 to use can nonetheless be changed via the 'vers=' mount option. This
52 This is just a virtual device that basically tells the kernel to mount
59 Enables the kernel to mount the root file system via SMB that are
62 The default mount options are set in fs/smb/client/cifsroot.c.
71 Optional mount options. For more information, see mount.cifs(8).
/linux/tools/testing/selftests/filesystems/
H A Ddevpts_pts.c12 #include <sys/mount.h>
210 ret = mount("devpts", mntpoint, "devpts", MS_NOSUID | MS_NOEXEC, in verify_non_standard_devpts_mount()
213 fprintf(stderr, "Failed to mount devpts fs to \"%s\" in new " in verify_non_standard_devpts_mount()
214 "mount namespace: %s\n", mntpoint, in verify_non_standard_devpts_mount()
238 ret = mount("/dev/pts/ptmx", "/dev/ptmx", NULL, MS_BIND, NULL); in verify_ptmx_bind_mount()
240 fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " in verify_ptmx_bind_mount()
241 "\"/dev/ptmx\" mount namespace\n"); in verify_ptmx_bind_mount()
265 ret = mount("/dev/pts/ptmx", ptmx, NULL, MS_BIND, NULL); in verify_invalid_ptmx_bind_mount()
268 fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " in verify_invalid_ptmx_bind_mount()
269 "\"%s\" mount namespace\n", ptmx); in verify_invalid_ptmx_bind_mount()
[all …]
/linux/tools/testing/selftests/firmware/
H A Dfw_namespace.c2 /* Test triggering of loading of firmware from different mount
3 * namespaces. Expect firmware to be always loaded from the mount
14 #include <sys/mount.h>
68 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) in test_fw_in_ns()
101 if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL) == -1) in test_fw_in_ns()
105 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) in test_fw_in_ns()
122 /* Mount tmpfs to /lib/firmware so we don't have to assume in main()
124 if (mount("test", "/lib/firmware", "tmpfs", 0, NULL) == -1) in main()
134 /* Positive case: firmware in PID1 mount namespace */ in main()
139 /* Negative case: firmware in child mount namespace, expected to fail */ in main()
/linux/fs/xfs/
H A Dxfs_rtalloc.h20 * Initialize realtime fields in the mount structure.
24 struct xfs_mount *mp); /* file system mount structure */
30 * Get the bitmap and summary inodes into the mount structure
31 * at mount time.
35 struct xfs_mount *mp); /* file system mount structure */
42 struct xfs_mount *mp, /* file system mount structure */
55 xfs_mount_t *mp) /* file system mount structure */ in xfs_rtmount_init()
/linux/fs/jfs/
H A Djfs_mount.c11 * file system mount is interpreted as the mount of aggregate,
12 * if not already mounted, and mount of the single/only fileset in
16 * (aka mount inode) initialized with aggregate superblock;
27 * each inode points to the mount inode (to facilitate access to
66 * -EBUSY - mount table full
67 * -ENOTDIR- cvrdvp not directory on a device mount
81 * (initialize mount inode from the superblock) in jfs_mount()
161 * mount (the only/single) fileset in jfs_mount()
210 jfs_err("Mount JFS Failure: %d", rc); in jfs_mount()
218 * FUNCTION: Completes read-write mount, or remounts read-only volume
[all …]
/linux/tools/testing/selftests/namespaces/
H A Dlistns_efault_test.c14 #include <sys/mount.h>
32 * This test also creates mount namespaces that get destroyed during
109 * Create several child processes, each in its own mount namespace. in TEST()
122 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in TEST()
131 if (mount("tmpfs", "/tmp/test_mnt1", "tmpfs", 0, NULL) == -1) in TEST()
133 if (mount("tmpfs", "/tmp/test_mnt2", "tmpfs", 0, NULL) == -1) in TEST()
159 * Signal children to exit. This will destroy their mount namespaces in TEST()
166 /* Wait for all mount namespace children to exit and cleanup */ in TEST()
245 * (after several successful writes), combined with mount namespace
315 * Create more children with mount namespaces to increase the in TEST()
[all …]

12345678910>>...44