| /linux/fs/ |
| H A D | pnode.c | 9 #include <linux/mount.h> 12 #include <uapi/linux/mount.h> 16 /* return the next shared peer mount of @p */ 17 static inline struct mount *next_peer(struct mount *p) in next_peer() 19 return list_entry(p->mnt_share.next, struct mount, mnt_share); in next_peer() 22 static inline struct mount *first_slave(struct mount *p) in first_slave() 24 return hlist_entry(p->mnt_slave_list.first, struct mount, mnt_slave); in first_slave() 27 static inline struct mount *next_slave(struct mount *p) in next_slave() 29 return hlist_entry(p->mnt_slave.next, struct mount, mnt_slave); in next_slave() 33 static struct mount *get_peer_under_root(struct mount *mnt, in get_peer_under_root() [all …]
|
| H A D | pnode.h | 11 #include "mount.h" 33 static inline void set_mnt_shared(struct mount *mnt) in set_mnt_shared() 39 static inline bool peers(const struct mount *m1, const struct mount *m2) in peers() 44 void change_mnt_propagation(struct mount *, int); 46 int propagate_mnt(struct mount *, struct mountpoint *, struct mount *, 49 int propagate_mount_busy(struct mount *, int); 50 void propagate_mount_unlock(struct mount *); 51 void mnt_release_group_id(struct mount *); 52 int get_dominating_id(struct mount *mnt, const struct path *root); 53 int mnt_get_count(struct mount *mnt); [all …]
|
| H A D | mount.h | 2 #include <linux/mount.h> 12 struct mount * root; 15 struct rb_node *mnt_last_node; /* last (rightmost) mount in the rbtree */ 16 struct rb_node *mnt_first_node; /* first (leftmost) mount in the rbtree */ 21 u64 seq_origin; /* Sequence number of origin mount namespace */ 44 struct mount { struct 46 struct mount *mnt_parent; argument 62 struct mount *mnt_next_for_sb; /* the next two fields are hlist_node, */ argument 63 struct mount * __aligned(1) *mnt_pprev_for_sb; 72 struct mount *mnt_master; /* slave is on master->mnt_slave_list */ argument [all …]
|
| /linux/Documentation/filesystems/ |
| H A D | autofs-mount-control.rst | 17 are things such as setting an autofs mount catatonic, setting the 20 mount itself which prevents us being able to use open(2) to obtain a 25 needs to walk back up the mount tree to construct a path, such as 28 from the mount tree. 33 because autofs direct mounts and the implementation of "on demand mount 34 and expire" of nested mount trees have the file system mounted directly 35 on top of the mount trigger directory dentry. 39 a direct mount in disguise) and indirect. 62 operation. So we see a mount of shark:/autofs/export1 on /test/g1, for 65 The way that direct mounts are handled is by making an autofs mount on [all …]
|
| H A D | overlayfs.rst | 35 make the overlay mount more compliant with filesystem scanners and 48 The "xino" feature can be enabled with the "-o xino=on" overlay mount option. 51 the lifetime of the filesystem. The "-o xino=auto" overlay mount option 120 At mount time, the two directories given as mount options "lowerdir" and 123 mount -t overlay overlay -olowerdir=/lower,upperdir=/upper,\ 237 Mount options: 298 In the old mount api the credentials of the task calling mount(2) are 299 stashed. In the new mount api the credentials of the task creating the 304 mount option which will cause the credentials of the calling task to be 306 the new mount api as the old mount api combines setting options and [all …]
|
| H A D | idmappings.rst | 382 - mount's idmapping (``mnt_idmap(vfsmnt)``) 384 Let's see some examples with caller/filesystem idmapping but without mount 386 revisit/reconsider these examples, this time using mount idmappings, to see how 469 userspace id. We could only do this if we were to mount the whole filesystem 606 change in ownership is tied to the lifetime of the filesystem mount, i.e. the 608 filesystem and mount it again in another user namespace. This is usually 625 localized way. The ownership changes are restricted to a specific mount and the 626 ownership changes are tied to the lifetime of the mount. All other users and 631 completely under an idmapped mount to get the same effect. This has the 638 Filesystem types vs idmapped mount types [all …]
|
| /linux/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 54 If you do not have the utility mount.cifs (in the Samba 4.x source tree and on 55 the CIFS VFS web site) copy it to the same directory in which mount helpers 57 required, mount.cifs is recommended. Most distros include a ``cifs-utils`` 62 domain to the proper network user. The mount.cifs mount helper can be 78 the new default. To use old dialects (e.g. to mount Windows XP) use "vers=1.0" 79 on mount (or vers=2.0 for Windows Vista). Note that the CIFS (vers=1.0) is 83 There are additional mount options that may be helpful for SMB3 to get 91 To permit users to mount and unmount over directories they own is possible 92 with the cifs vfs. A way to enable such mounting is to mark the mount.cifs 93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to [all …]
|
| /linux/security/tomoyo/ |
| H A D | mount.c | 3 * security/tomoyo/mount.c 9 #include <uapi/linux/mount.h> 12 /* String table for special mount operations. */ 24 * tomoyo_audit_mount_log - Audit mount log. 32 return tomoyo_supervisor(r, "file mount %s %s %s 0x%lX\n", in tomoyo_audit_mount_log() 33 r->param.mount.dev->name, in tomoyo_audit_mount_log() 34 r->param.mount.dir->name, in tomoyo_audit_mount_log() 35 r->param.mount.type->name, in tomoyo_audit_mount_log() 36 r->param.mount.flags); in tomoyo_audit_mount_log() 53 return tomoyo_compare_number_union(r->param.mount.flags, in tomoyo_check_mount_acl() [all …]
|
| /linux/Documentation/filesystems/fuse/ |
| H A D | fuse.rst | 18 Non-privileged mount (or user mount): 31 Mount owner: 41 module (fuse.ko), a userspace library (libfuse.*) and a mount utility 55 The filesystem type given to mount(2) can be one of the following: 58 This is the usual way to mount a FUSE filesystem. The first 59 argument of the mount system call may contain an arbitrary string, 64 mount system call is interpreted as the name of the device. 66 Mount options 78 The numeric user id of the mount owner. 81 The numeric group id of the mount owner. [all …]
|
| /linux/Documentation/admin-guide/nfs/ |
| H A D | nfs-rdma.rst | 55 An NFS/RDMA mount point can be obtained by using the mount.nfs command in 59 mount.nfs you are using, type: 63 $ /sbin/mount.nfs -V 73 these to create an NFS/RDMA enabled mount command), the installation 84 After building the nfs-utils package, there will be a mount.nfs binary in 85 the utils/mount directory. This binary can be used to initiate NFS v2, v3, 86 or v4 mounts. To initiate a v4 mount, the binary must be called 87 mount.nfs4. The standard technique is to create a symlink called 88 mount.nfs4 to mount.nfs. 90 This mount.nfs binary should be installed at /sbin/mount.nfs as follows: [all …]
|
| /linux/tools/testing/selftests/mount_setattr/ |
| H A D | mount_setattr_test.c | 10 #include <sys/mount.h> 21 #include <linux/mount.h> 220 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in prepare_unpriv_mountns() 380 ASSERT_EQ(mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 385 ASSERT_EQ(mount("testing", "/tmp/B", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 394 ASSERT_EQ(mount("testing", "/tmp/B/BB", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 397 ASSERT_EQ(mount("testing", "/mnt", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 402 ASSERT_EQ(mount("testing", "/mnt/A", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 407 ASSERT_EQ(mount("/tmp", "/mnt/A/AA", NULL, MS_BIND | MS_REC, NULL), 0); in FIXTURE_SETUP() 411 ASSERT_EQ(mount("testing", "/mnt/B", "ramfs", in FIXTURE_SETUP() [all …]
|
| /linux/fs/autofs/ |
| H A D | dev-ioctl.c | 21 * an ioctl file descriptor on an autofs mount that may be covered by 22 * another mount. This situation arises when starting automount(8) 24 * mounts (used for autofs lazy mount/umount of nested mount trees), 187 /* Find the topmost mount satisfying test() */ 229 * Open a file descriptor on the autofs mount point corresponding 244 /* Open a file descriptor on an autofs mount point */ 284 * Send "ready" status for an existing wait (either a mount or an expire 298 * Send "fail" status for an existing wait (either a mount or an expire 316 * Normally this is set at mount using an option but if we 317 * are reconnecting to a busy mount then we need to use this [all …]
|
| H A D | root.c | 91 * mount point. The daemon must have failed to mount this in autofs_dir_open() 94 * mount request. Otherwise we're doing a readdir on the in autofs_dir_open() 254 pr_debug("waiting for mount name=%pd\n", path->dentry); in autofs_mount_wait() 256 pr_debug("mount wait done status=%d\n", status); in autofs_mount_wait() 294 /* If this is an indirect mount the dentry could have gone away in autofs_mountpoint_changed() 299 * happen is an autofs indirect mount that has the "browse" in autofs_mountpoint_changed() 302 * directory and create a symlink as the mount leaving the in autofs_mountpoint_changed() 305 * Another not so obvious case is when a mount in an autofs in autofs_mountpoint_changed() 306 * indirect mount that uses the "nobrowse" option is being in autofs_mountpoint_changed() 307 * expired at the same time as a path walk. If the mount has in autofs_mountpoint_changed() [all …]
|
| /linux/tools/testing/selftests/pid_namespace/ |
| H A D | pid_max.c | 13 #include <sys/mount.h> 43 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_cb() 45 fprintf(stderr, "%m - Failed to make rootfs private mount\n"); in pid_max_cb() 51 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_cb() 53 fprintf(stderr, "%m - Failed to mount proc\n"); in pid_max_cb() 89 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_inner() 91 fprintf(stderr, "%m - Failed to make rootfs private mount\n"); in pid_max_nested_inner() 97 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_inner() 99 fprintf(stderr, "%m - Failed to mount proc\n"); in pid_max_nested_inner() 164 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_outer() [all …]
|
| /linux/tools/include/uapi/linux/ |
| H A D | mount.h | 7 * These are the fs-independent mount-flags: up to 32 flags are supported 9 * Usage of these is restricted within the kernel to core mount(2) code and 13 #define MS_RDONLY 1 /* Mount read-only */ 56 * Old magic mount flag and mask 77 #define MOVE_MOUNT_BENEATH 0x00000200 /* Mount beneath top mount */ 114 * Mount attributes. 116 #define MOUNT_ATTR_RDONLY 0x00000001 /* Mount read-only */ 125 #define MOUNT_ATTR_IDMAP 0x00100000 /* Idmap mount to @userns_fd in struct mount_attr. */ 143 * Structure for getting mount/superbloc [all...] |
| /linux/include/uapi/linux/ |
| H A D | mount.h | 7 * These are the fs-independent mount-flags: up to 32 flags are supported 9 * Usage of these is restricted within the kernel to core mount(2) code and 13 #define MS_RDONLY 1 /* Mount read-only */ 56 * Old magic mount flag and mask 77 #define MOVE_MOUNT_BENEATH 0x00000200 /* Mount beneath top mount */ 114 * Mount attributes. 116 #define MOUNT_ATTR_RDONLY 0x00000001 /* Mount read-only */ 125 #define MOUNT_ATTR_IDMAP 0x00100000 /* Idmap mount to @userns_fd in struct mount_attr. */ 143 * Structure for getting mount/superblock/filesystem info with statmount(2). 164 __u64 mnt_id; /* Unique ID of mount */ [all …]
|
| /linux/tools/perf/trace/beauty/include/uapi/linux/ |
| H A D | mount.h | 7 * These are the fs-independent mount-flags: up to 32 flags are supported 9 * Usage of these is restricted within the kernel to core mount(2) code and 13 #define MS_RDONLY 1 /* Mount read-only */ 56 * Old magic mount flag and mask 77 #define MOVE_MOUNT_BENEATH 0x00000200 /* Mount beneath top mount */ 114 * Mount attributes. 116 #define MOUNT_ATTR_RDONLY 0x00000001 /* Mount read-only */ 125 #define MOUNT_ATTR_IDMAP 0x00100000 /* Idmap mount to @userns_fd in struct mount_attr. */ 143 * Structure for getting mount/superblock/filesystem info with statmount(2). 164 __u64 mnt_id; /* Unique ID of mount */ [all …]
|
| /linux/tools/testing/selftests/filesystems/mount-notify/ |
| H A D | mount-notify_test.c | 17 #include <sys/mount.h> 26 static const char root_mntpoint_templ[] = "/tmp/mount-notify_test_root.XXXXXX"; 56 ASSERT_EQ(mount("", "/", NULL, MS_REC|MS_PRIVATE, NULL), 0); in FIXTURE_SETUP() 64 ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0); in FIXTURE_SETUP() 243 ret = mount("", "/", NULL, MS_SHARED, NULL); in setup_mount_tree() 247 ret = mount("/", "/", NULL, MS_BIND, NULL); in setup_mount_tree() 257 ret = mount("/", "/", NULL, MS_BIND, NULL); in TEST_F() 282 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() 322 ret = mount("", "/", NULL, MS_PRIVATE, NULL); in TEST_F() 378 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() [all …]
|
| H A D | mount-notify_test_ns.c | 17 #include <sys/mount.h> 26 static const char root_mntpoint_templ[] = "/tmp/mount-notify_test_root.XXXXXX"; 73 ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0); in FIXTURE_SETUP() 270 ret = mount("", "/", NULL, MS_SHARED, NULL); in setup_mount_tree() 274 ret = mount("/", "/", NULL, MS_BIND, NULL); in setup_mount_tree() 284 ret = mount("/", "/", NULL, MS_BIND, NULL); in TEST_F() 309 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() 349 ret = mount("", "/", NULL, MS_PRIVATE, NULL); in TEST_F() 405 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() 408 ret = mount("", "/a", NULL, MS_SHARED, NULL); in TEST_F() [all …]
|
| /linux/Documentation/filesystems/smb/ |
| H A D | cifsroot.rst | 15 which will tell the kernel to mount the root file system over the 18 In order to mount, the network stack will also need to be set up by 22 A CIFS root mount currently requires the use of SMB1+UNIX Extensions 31 to use can nonetheless be changed via the 'vers=' mount option. This 52 This is just a virtual device that basically tells the kernel to mount 59 Enables the kernel to mount the root file system via SMB that are 62 The default mount options are set in fs/smb/client/cifsroot.c. 71 Optional mount options. For more information, see mount.cifs(8).
|
| /linux/tools/testing/selftests/filesystems/ |
| H A D | devpts_pts.c | 12 #include <sys/mount.h> 210 ret = mount("devpts", mntpoint, "devpts", MS_NOSUID | MS_NOEXEC, in verify_non_standard_devpts_mount() 213 fprintf(stderr, "Failed to mount devpts fs to \"%s\" in new " in verify_non_standard_devpts_mount() 214 "mount namespace: %s\n", mntpoint, in verify_non_standard_devpts_mount() 238 ret = mount("/dev/pts/ptmx", "/dev/ptmx", NULL, MS_BIND, NULL); in verify_ptmx_bind_mount() 240 fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " in verify_ptmx_bind_mount() 241 "\"/dev/ptmx\" mount namespace\n"); in verify_ptmx_bind_mount() 265 ret = mount("/dev/pts/ptmx", ptmx, NULL, MS_BIND, NULL); in verify_invalid_ptmx_bind_mount() 268 fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " in verify_invalid_ptmx_bind_mount() 269 "\"%s\" mount namespace\n", ptmx); in verify_invalid_ptmx_bind_mount() [all …]
|
| /linux/tools/testing/selftests/firmware/ |
| H A D | fw_namespace.c | 2 /* Test triggering of loading of firmware from different mount 3 * namespaces. Expect firmware to be always loaded from the mount 14 #include <sys/mount.h> 68 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) in test_fw_in_ns() 101 if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL) == -1) in test_fw_in_ns() 105 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) in test_fw_in_ns() 122 /* Mount tmpfs to /lib/firmware so we don't have to assume in main() 124 if (mount("test", "/lib/firmware", "tmpfs", 0, NULL) == -1) in main() 134 /* Positive case: firmware in PID1 mount namespace */ in main() 139 /* Negative case: firmware in child mount namespace, expected to fail */ in main()
|
| /linux/fs/xfs/ |
| H A D | xfs_rtalloc.h | 20 * Initialize realtime fields in the mount structure. 24 struct xfs_mount *mp); /* file system mount structure */ 30 * Get the bitmap and summary inodes into the mount structure 31 * at mount time. 35 struct xfs_mount *mp); /* file system mount structure */ 42 struct xfs_mount *mp, /* file system mount structure */ 55 xfs_mount_t *mp) /* file system mount structure */ in xfs_rtmount_init()
|
| /linux/fs/jfs/ |
| H A D | jfs_mount.c | 11 * file system mount is interpreted as the mount of aggregate, 12 * if not already mounted, and mount of the single/only fileset in 16 * (aka mount inode) initialized with aggregate superblock; 27 * each inode points to the mount inode (to facilitate access to 66 * -EBUSY - mount table full 67 * -ENOTDIR- cvrdvp not directory on a device mount 81 * (initialize mount inode from the superblock) in jfs_mount() 161 * mount (the only/single) fileset in jfs_mount() 210 jfs_err("Mount JFS Failure: %d", rc); in jfs_mount() 218 * FUNCTION: Completes read-write mount, or remounts read-only volume [all …]
|
| /linux/tools/testing/selftests/namespaces/ |
| H A D | listns_efault_test.c | 14 #include <sys/mount.h> 32 * This test also creates mount namespaces that get destroyed during 109 * Create several child processes, each in its own mount namespace. in TEST() 122 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in TEST() 131 if (mount("tmpfs", "/tmp/test_mnt1", "tmpfs", 0, NULL) == -1) in TEST() 133 if (mount("tmpfs", "/tmp/test_mnt2", "tmpfs", 0, NULL) == -1) in TEST() 159 * Signal children to exit. This will destroy their mount namespaces in TEST() 166 /* Wait for all mount namespace children to exit and cleanup */ in TEST() 245 * (after several successful writes), combined with mount namespace 315 * Create more children with mount namespaces to increase the in TEST() [all …]
|