Home
last modified time | relevance | path

Searched refs:mount (Results 1 – 25 of 436) sorted by relevance

12345678910>>...18

/linux/fs/
H A Dpnode.c17 static inline struct mount *next_peer(struct mount *p) in next_peer()
19 return list_entry(p->mnt_share.next, struct mount, mnt_share); in next_peer()
22 static inline struct mount *first_slave(struct mount *p) in first_slave()
24 return hlist_entry(p->mnt_slave_list.first, struct mount, mnt_slave); in first_slave()
27 static inline struct mount *next_slave(struct mount *p) in next_slave()
29 return hlist_entry(p->mnt_slave.next, struct mount, mnt_slave); in next_slave()
33 static struct mount *get_peer_under_root(struct mount *mnt, in get_peer_under_root()
37 struct mount *m = mnt; in get_peer_under_root()
56 int get_dominating_id(struct mount *mnt, const struct path *root) in get_dominating_id()
58 struct mount *m; in get_dominating_id()
[all …]
H A Dpnode.h33 static inline void set_mnt_shared(struct mount *mnt) in set_mnt_shared()
39 static inline bool peers(const struct mount *m1, const struct mount *m2) in peers()
44 void change_mnt_propagation(struct mount *, int);
46 int propagate_mnt(struct mount *, struct mountpoint *, struct mount *,
49 int propagate_mount_busy(struct mount *, int);
50 void propagate_mount_unlock(struct mount *);
51 void mnt_release_group_id(struct mount *);
52 int get_dominating_id(struct mount *mnt, const struct path *root);
53 int mnt_get_count(struct mount *mnt);
54 void mnt_set_mountpoint(struct mount *, struct mountpoint *,
[all …]
H A Dmount.h12 struct mount * root;
44 struct mount { struct
46 struct mount *mnt_parent; argument
62 struct mount *mnt_next_for_sb; /* the next two fields are hlist_node, */ argument
63 struct mount * __aligned(1) *mnt_pprev_for_sb;
72 struct mount *mnt_master; /* slave is on master->mnt_slave_list */ argument
92 struct mount *overmount; /* mounted on ->mnt_root */ argument
113 static inline struct mount *real_mount(struct vfsmount *mnt) in real_mount()
115 return container_of(mnt, struct mount, mnt); in real_mount()
118 static inline int mnt_has_parent(const struct mount *mnt) in mnt_has_parent()
[all …]
/linux/Documentation/filesystems/
H A Dautofs-mount-control.rst17 are things such as setting an autofs mount catatonic, setting the
20 mount itself which prevents us being able to use open(2) to obtain a
25 needs to walk back up the mount tree to construct a path, such as
28 from the mount tree.
33 because autofs direct mounts and the implementation of "on demand mount
34 and expire" of nested mount trees have the file system mounted directly
35 on top of the mount trigger directory dentry.
39 a direct mount in disguise) and indirect.
62 operation. So we see a mount of shark:/autofs/export1 on /test/g1, for
65 The way that direct mounts are handled is by making an autofs mount on
[all …]
H A Ddevpts.rst7 Each mount of the devpts filesystem is now distinct such that ptys
8 and their indices allocated in one mount are independent from ptys
21 to bind mount ``/dev/ptx/ptmx`` to ``/dev/ptmx``. If you opt for using
28 kernel.pty.reserve = 1024 - reserved for filesystems mounted from the initial mount namespace
31 Per-instance limit could be set by adding mount option ``max=<count>``.
H A Doverlayfs.rst35 make the overlay mount more compliant with filesystem scanners and
48 The "xino" feature can be enabled with the "-o xino=on" overlay mount option.
51 the lifetime of the filesystem. The "-o xino=auto" overlay mount option
120 At mount time, the two directories given as mount options "lowerdir" and
123 mount -t overlay overlay -olowerdir=/lower,upperdir=/upper,\
298 In the old mount api the credentials of the task calling mount(2) are
299 stashed. In the new mount api the credentials of the task creating the
304 mount option which will cause the credentials of the calling task to be
306 the new mount api as the old mount api combines setting options and
307 superblock creation in a single mount(2) syscall.
[all …]
H A Decryptfs.rst37 then copy the files back into the new eCryptfs mount to migrate the
45 files (i.e., /root/crypt). Then, create the mount point directory
46 (i.e., /mnt/crypt). Now it's time to mount eCryptfs::
48 mount -t ecryptfs /root/crypt /mnt/crypt
65 Then umount /mnt/crypt and mount again per the instructions given
78 mount a directory that has pre-existing files not created by eCryptfs,
H A Didmappings.rst382 - mount's idmapping (``mnt_idmap(vfsmnt)``)
384 Let's see some examples with caller/filesystem idmapping but without mount
386 revisit/reconsider these examples, this time using mount idmappings, to see how
469 userspace id. We could only do this if we were to mount the whole filesystem
606 change in ownership is tied to the lifetime of the filesystem mount, i.e. the
608 filesystem and mount it again in another user namespace. This is usually
625 localized way. The ownership changes are restricted to a specific mount and the
626 ownership changes are tied to the lifetime of the mount. All other users and
631 completely under an idmapped mount to get the same effect. This has the
638 Filesystem types vs idmapped mount types
[all …]
H A D9p.rst41 mount -t 9p 10.10.1.2 /mnt/9
45 mount -t 9p `namespace`/acme /mnt/9 -o trans=unix,uname=$USER
49 mount -t 9p -o trans=virtio <mount_tag> /mnt/9
52 mount points. Each 9P export is seen by the client as a virtio device with an
53 associated "mount_tag" property. Available mount tags can be
59 To mount a 9p FS on a USB Host accessible via the gadget at runtime::
61 mount -t 9p -o trans=usbg,aname=/path/to/fs <device> /mnt/9
63 To mount a 9p FS on a USB Host accessible via the gadget as root filesystem::
119 unix specifying a named pipe mount point
129 uname=name user name to attempt mount as on the remote server. The
[all …]
/linux/security/tomoyo/
H A Dmount.c33 r->param.mount.dev->name, in tomoyo_audit_mount_log()
34 r->param.mount.dir->name, in tomoyo_audit_mount_log()
35 r->param.mount.type->name, in tomoyo_audit_mount_log()
36 r->param.mount.flags); in tomoyo_audit_mount_log()
53 return tomoyo_compare_number_union(r->param.mount.flags, in tomoyo_check_mount_acl()
55 tomoyo_compare_name_union(r->param.mount.type, in tomoyo_check_mount_acl()
57 tomoyo_compare_name_union(r->param.mount.dir, in tomoyo_check_mount_acl()
59 (!r->param.mount.need_dev || in tomoyo_check_mount_acl()
60 tomoyo_compare_name_union(r->param.mount.dev, in tomoyo_check_mount_acl()
159 r->param.mount.need_dev = need_dev; in tomoyo_mount_acl()
[all …]
/linux/tools/testing/selftests/filesystems/mount-notify/
H A Dmount-notify_test.c56 ASSERT_EQ(mount("", "/", NULL, MS_REC|MS_PRIVATE, NULL), 0); in FIXTURE_SETUP()
64 ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0); in FIXTURE_SETUP()
243 ret = mount("", "/", NULL, MS_SHARED, NULL); in setup_mount_tree()
247 ret = mount("/", "/", NULL, MS_BIND, NULL); in setup_mount_tree()
257 ret = mount("/", "/", NULL, MS_BIND, NULL); in TEST_F()
282 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F()
322 ret = mount("", "/", NULL, MS_PRIVATE, NULL); in TEST_F()
378 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F()
381 ret = mount("", "/a", NULL, MS_SHARED, NULL); in TEST_F()
384 ret = mount("/a", "/b", NULL, MS_BIND, NULL); in TEST_F()
[all …]
H A Dmount-notify_test_ns.c73 ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0); in FIXTURE_SETUP()
270 ret = mount("", "/", NULL, MS_SHARED, NULL); in setup_mount_tree()
274 ret = mount("/", "/", NULL, MS_BIND, NULL); in setup_mount_tree()
284 ret = mount("/", "/", NULL, MS_BIND, NULL); in TEST_F()
309 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F()
349 ret = mount("", "/", NULL, MS_PRIVATE, NULL); in TEST_F()
405 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F()
408 ret = mount("", "/a", NULL, MS_SHARED, NULL); in TEST_F()
411 ret = mount("/a", "/b", NULL, MS_BIND, NULL); in TEST_F()
414 ret = mount("", "/b", NULL, MS_SLAVE, NULL); in TEST_F()
[all …]
/linux/Documentation/admin-guide/cifs/
H A Dusage.rst54 If you do not have the utility mount.cifs (in the Samba 4.x source tree and on
55 the CIFS VFS web site) copy it to the same directory in which mount helpers
57 required, mount.cifs is recommended. Most distros include a ``cifs-utils``
62 domain to the proper network user. The mount.cifs mount helper can be
78 the new default. To use old dialects (e.g. to mount Windows XP) use "vers=1.0"
79 on mount (or vers=2.0 for Windows Vista). Note that the CIFS (vers=1.0) is
83 There are additional mount options that may be helpful for SMB3 to get
91 To permit users to mount and unmount over directories they own is possible
92 with the cifs vfs. A way to enable such mounting is to mark the mount.cifs
93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to
[all …]
H A Dintroduction.rst19 Storage vendors, so this network filesystem client can mount to a
36 This filesystem has a mount utility (mount.cifs) and various user space
45 mount.cifs should be installed in the directory with the other mount helpers.
/linux/tools/testing/selftests/pid_namespace/
H A Dpid_max.c43 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_cb()
51 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_cb()
89 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_inner()
97 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_inner()
164 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_outer()
172 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_outer()
233 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_limit_inner()
241 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_limit_inner()
290 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_limit_outer()
298 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_limit_outer()
/linux/Documentation/admin-guide/nfs/
H A Dnfs-rdma.rst55 An NFS/RDMA mount point can be obtained by using the mount.nfs command in
59 mount.nfs you are using, type:
63 $ /sbin/mount.nfs -V
73 these to create an NFS/RDMA enabled mount command), the installation
84 After building the nfs-utils package, there will be a mount.nfs binary in
85 the utils/mount directory. This binary can be used to initiate NFS v2, v3,
86 or v4 mounts. To initiate a v4 mount, the binary must be called
87 mount.nfs4. The standard technique is to create a symlink called
88 mount.nfs4 to mount.nfs.
90 This mount.nfs binary should be installed at /sbin/mount.nfs as follows:
[all …]
/linux/tools/testing/selftests/move_mount_set_group/
H A Dmove_mount_set_group_test.c118 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in prepare_unpriv_mountns()
198 if (mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, in move_mount_set_group_supported()
202 if (mount(NULL, "/tmp", NULL, MS_PRIVATE, 0)) in move_mount_set_group_supported()
211 if (mount("testing", SET_GROUP_FROM, "tmpfs", MS_NOATIME | MS_NODEV, in move_mount_set_group_supported()
215 if (mount(SET_GROUP_FROM, SET_GROUP_TO, NULL, MS_BIND, NULL)) in move_mount_set_group_supported()
218 if (mount(NULL, SET_GROUP_FROM, NULL, MS_SHARED, 0)) in move_mount_set_group_supported()
246 ASSERT_EQ(mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP()
251 ASSERT_EQ(mount("testing", SET_GROUP_A, "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP()
319 ret = mount(NULL, SET_GROUP_A, NULL, MS_SHARED, 0); in get_nestedns_mount_cb()
/linux/Documentation/filesystems/fuse/
H A Dfuse.rst18 Non-privileged mount (or user mount):
41 module (fuse.ko), a userspace library (libfuse.*) and a mount utility
55 The filesystem type given to mount(2) can be one of the following:
58 This is the usual way to mount a FUSE filesystem. The first
59 argument of the mount system call may contain an arbitrary string,
64 mount system call is interpreted as the name of the device.
78 The numeric user id of the mount owner.
81 The numeric group id of the mount owner.
89 'allow_other' mount option.
111 mount -t fusectl none /sys/fs/fuse/connections
[all …]
/linux/Documentation/filesystems/smb/
H A Dcifsroot.rst15 which will tell the kernel to mount the root file system over the
18 In order to mount, the network stack will also need to be set up by
22 A CIFS root mount currently requires the use of SMB1+UNIX Extensions
31 to use can nonetheless be changed via the 'vers=' mount option. This
52 This is just a virtual device that basically tells the kernel to mount
59 Enables the kernel to mount the root file system via SMB that are
62 The default mount options are set in fs/smb/client/cifsroot.c.
71 Optional mount options. For more information, see mount.cifs(8).
H A Dsmbdirect.rst29 - Install cifs-utils, which provides the `mount.cifs` command to mount SMB
83 - On the client, mount the share with `rdma` mount option to use SMB Direct
90 mount -t cifs //server/share /mnt/point -o vers=3.1.1,rdma
92 - To verify that the mount is using SMB Direct, you can check dmesg for the
99 Or, verify `rdma` mount option for the share in `/proc/mounts`:
/linux/tools/testing/selftests/proc/
H A Dproc-pidns.c54 ASSERT_SUCCESS(mount(NULL, "/", NULL, MS_PRIVATE|MS_REC, NULL)); in FIXTURE_SETUP()
60 ASSERT_SUCCESS(mount("tmpfs", "/tmp", "tmpfs", 0, NULL)); in FIXTURE_SETUP()
78 ASSERT_SUCCESS(mount("/proc/self/ns/pid", "/tmp/dummy/pidns", NULL, MS_BIND, NULL)); in FIXTURE_SETUP()
79 ASSERT_SUCCESS(mount("proc", "/tmp/dummy/proc", "proc", 0, NULL)); in FIXTURE_SETUP()
106 ASSERT_SUCCESS(mount("proc", "/tmp/proc-host", "proc", 0, "pidns=/proc/self/ns/pid")); in TEST_F()
110 ASSERT_SUCCESS(mount("proc", "/tmp/proc-dummy", "proc", 0, "pidns=/tmp/dummy/pidns")); in TEST_F()
154 ASSERT_SUCCESS(mount("proc", "/tmp/proc", "proc", 0, "")); in TEST_F()
159 ASSERT_ERRNO_EQ(-EBUSY, mount(NULL, "/tmp/proc", NULL, MS_REMOUNT, "pidns=/tmp/dummy/pidns")); in TEST_F()
/linux/security/
H A Dinode.c27 static struct vfsmount *mount; variable
125 error = simple_pin_fs(&fs_type, &mount, &mount_count); in securityfs_create_dentry()
129 parent = mount->mnt_root; in securityfs_create_dentry()
166 simple_release_fs(&mount, &mount_count); in securityfs_create_dentry()
280 simple_release_fs(&mount, &mount_count); in remove_one()
304 simple_pin_fs(&fs_type, &mount, &mount_count); in securityfs_remove()
306 simple_release_fs(&mount, &mount_count); in securityfs_remove()
/linux/tools/testing/selftests/wireguard/qemu/
H A Dinit.c92 if (mount("none", "/dev", "devtmpfs", 0, NULL)) in mount_filesystems()
94 if (mount("none", "/proc", "proc", 0, NULL)) in mount_filesystems()
96 if (mount("none", "/sys", "sysfs", 0, NULL)) in mount_filesystems()
98 if (mount("none", "/tmp", "tmpfs", 0, NULL)) in mount_filesystems()
100 if (mount("none", "/run", "tmpfs", 0, NULL)) in mount_filesystems()
102 if (mount("none", "/sys/kernel/debug", "debugfs", 0, NULL)) in mount_filesystems()
/linux/tools/testing/selftests/namespaces/
H A Dlistns_efault_test.c122 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in TEST()
131 if (mount("tmpfs", "/tmp/test_mnt1", "tmpfs", 0, NULL) == -1) in TEST()
133 if (mount("tmpfs", "/tmp/test_mnt2", "tmpfs", 0, NULL) == -1) in TEST()
328 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in TEST()
337 if (mount("tmpfs", "/tmp/test_mnt1", "tmpfs", 0, NULL) == -1) in TEST()
339 if (mount("tmpfs", "/tmp/test_mnt2", "tmpfs", 0, NULL) == -1) in TEST()
470 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in TEST()
479 if (mount("tmpfs", "/tmp/test_mnt1", "tmpfs", 0, NULL) == -1) in TEST()
481 if (mount("tmpfs", "/tmp/test_mnt2", "tmpfs", 0, NULL) == -1) in TEST()
/linux/tools/testing/selftests/firmware/
H A Dfw_namespace.c68 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) in test_fw_in_ns()
101 if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL) == -1) in test_fw_in_ns()
105 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) in test_fw_in_ns()
124 if (mount("test", "/lib/firmware", "tmpfs", 0, NULL) == -1) in main()

12345678910>>...18