| /linux/fs/ |
| H A D | pnode.c | 17 static inline struct mount *next_peer(struct mount *p) in next_peer() 19 return list_entry(p->mnt_share.next, struct mount, mnt_share); in next_peer() 22 static inline struct mount *first_slave(struct mount *p) in first_slave() 24 return hlist_entry(p->mnt_slave_list.first, struct mount, mnt_slave); in first_slave() 27 static inline struct mount *next_slave(struct mount *p) in next_slave() 29 return hlist_entry(p->mnt_slave.next, struct mount, mnt_slave); in next_slave() 33 static struct mount *get_peer_under_root(struct mount *mnt, in get_peer_under_root() 37 struct mount *m = mnt; in get_peer_under_root() 56 int get_dominating_id(struct mount *mnt, const struct path *root) in get_dominating_id() 58 struct mount *m; in get_dominating_id() [all …]
|
| H A D | pnode.h | 33 static inline void set_mnt_shared(struct mount *mnt) in set_mnt_shared() 39 static inline bool peers(const struct mount *m1, const struct mount *m2) in peers() 44 void change_mnt_propagation(struct mount *, int); 46 int propagate_mnt(struct mount *, struct mountpoint *, struct mount *, 49 int propagate_mount_busy(struct mount *, int); 50 void propagate_mount_unlock(struct mount *); 51 void mnt_release_group_id(struct mount *); 52 int get_dominating_id(struct mount *mnt, const struct path *root); 53 int mnt_get_count(struct mount *mnt); 54 void mnt_set_mountpoint(struct mount *, struct mountpoint *, [all …]
|
| H A D | mount.h | 12 struct mount * root; 44 struct mount { struct 46 struct mount *mnt_parent; argument 62 struct mount *mnt_next_for_sb; /* the next two fields are hlist_node, */ argument 63 struct mount * __aligned(1) *mnt_pprev_for_sb; 72 struct mount *mnt_master; /* slave is on master->mnt_slave_list */ argument 92 struct mount *overmount; /* mounted on ->mnt_root */ argument 113 static inline struct mount *real_mount(struct vfsmount *mnt) in real_mount() 115 return container_of(mnt, struct mount, mnt); in real_mount() 118 static inline int mnt_has_parent(const struct mount *mnt) in mnt_has_parent() [all …]
|
| /linux/Documentation/filesystems/ |
| H A D | autofs-mount-control.rst | 17 are things such as setting an autofs mount catatonic, setting the 20 mount itself which prevents us being able to use open(2) to obtain a 25 needs to walk back up the mount tree to construct a path, such as 28 from the mount tree. 33 because autofs direct mounts and the implementation of "on demand mount 34 and expire" of nested mount trees have the file system mounted directly 35 on top of the mount trigger directory dentry. 39 a direct mount in disguise) and indirect. 62 operation. So we see a mount of shark:/autofs/export1 on /test/g1, for 65 The way that direct mounts are handled is by making an autofs mount on [all …]
|
| H A D | devpts.rst | 7 Each mount of the devpts filesystem is now distinct such that ptys 8 and their indices allocated in one mount are independent from ptys 21 to bind mount ``/dev/ptx/ptmx`` to ``/dev/ptmx``. If you opt for using 28 kernel.pty.reserve = 1024 - reserved for filesystems mounted from the initial mount namespace 31 Per-instance limit could be set by adding mount option ``max=<count>``.
|
| H A D | overlayfs.rst | 35 make the overlay mount more compliant with filesystem scanners and 48 The "xino" feature can be enabled with the "-o xino=on" overlay mount option. 51 the lifetime of the filesystem. The "-o xino=auto" overlay mount option 120 At mount time, the two directories given as mount options "lowerdir" and 123 mount -t overlay overlay -olowerdir=/lower,upperdir=/upper,\ 298 In the old mount api the credentials of the task calling mount(2) are 299 stashed. In the new mount api the credentials of the task creating the 304 mount option which will cause the credentials of the calling task to be 306 the new mount api as the old mount api combines setting options and 307 superblock creation in a single mount(2) syscall. [all …]
|
| H A D | ecryptfs.rst | 37 then copy the files back into the new eCryptfs mount to migrate the 45 files (i.e., /root/crypt). Then, create the mount point directory 46 (i.e., /mnt/crypt). Now it's time to mount eCryptfs:: 48 mount -t ecryptfs /root/crypt /mnt/crypt 65 Then umount /mnt/crypt and mount again per the instructions given 78 mount a directory that has pre-existing files not created by eCryptfs,
|
| H A D | idmappings.rst | 382 - mount's idmapping (``mnt_idmap(vfsmnt)``) 384 Let's see some examples with caller/filesystem idmapping but without mount 386 revisit/reconsider these examples, this time using mount idmappings, to see how 469 userspace id. We could only do this if we were to mount the whole filesystem 606 change in ownership is tied to the lifetime of the filesystem mount, i.e. the 608 filesystem and mount it again in another user namespace. This is usually 625 localized way. The ownership changes are restricted to a specific mount and the 626 ownership changes are tied to the lifetime of the mount. All other users and 631 completely under an idmapped mount to get the same effect. This has the 638 Filesystem types vs idmapped mount types [all …]
|
| H A D | 9p.rst | 41 mount -t 9p 10.10.1.2 /mnt/9 45 mount -t 9p `namespace`/acme /mnt/9 -o trans=unix,uname=$USER 49 mount -t 9p -o trans=virtio <mount_tag> /mnt/9 52 mount points. Each 9P export is seen by the client as a virtio device with an 53 associated "mount_tag" property. Available mount tags can be 59 To mount a 9p FS on a USB Host accessible via the gadget at runtime:: 61 mount -t 9p -o trans=usbg,aname=/path/to/fs <device> /mnt/9 63 To mount a 9p FS on a USB Host accessible via the gadget as root filesystem:: 119 unix specifying a named pipe mount point 129 uname=name user name to attempt mount as on the remote server. The [all …]
|
| /linux/security/tomoyo/ |
| H A D | mount.c | 33 r->param.mount.dev->name, in tomoyo_audit_mount_log() 34 r->param.mount.dir->name, in tomoyo_audit_mount_log() 35 r->param.mount.type->name, in tomoyo_audit_mount_log() 36 r->param.mount.flags); in tomoyo_audit_mount_log() 53 return tomoyo_compare_number_union(r->param.mount.flags, in tomoyo_check_mount_acl() 55 tomoyo_compare_name_union(r->param.mount.type, in tomoyo_check_mount_acl() 57 tomoyo_compare_name_union(r->param.mount.dir, in tomoyo_check_mount_acl() 59 (!r->param.mount.need_dev || in tomoyo_check_mount_acl() 60 tomoyo_compare_name_union(r->param.mount.dev, in tomoyo_check_mount_acl() 159 r->param.mount.need_dev = need_dev; in tomoyo_mount_acl() [all …]
|
| /linux/tools/testing/selftests/filesystems/mount-notify/ |
| H A D | mount-notify_test.c | 56 ASSERT_EQ(mount("", "/", NULL, MS_REC|MS_PRIVATE, NULL), 0); in FIXTURE_SETUP() 64 ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0); in FIXTURE_SETUP() 243 ret = mount("", "/", NULL, MS_SHARED, NULL); in setup_mount_tree() 247 ret = mount("/", "/", NULL, MS_BIND, NULL); in setup_mount_tree() 257 ret = mount("/", "/", NULL, MS_BIND, NULL); in TEST_F() 282 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() 322 ret = mount("", "/", NULL, MS_PRIVATE, NULL); in TEST_F() 378 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() 381 ret = mount("", "/a", NULL, MS_SHARED, NULL); in TEST_F() 384 ret = mount("/a", "/b", NULL, MS_BIND, NULL); in TEST_F() [all …]
|
| H A D | mount-notify_test_ns.c | 73 ASSERT_EQ(mount("tmpfs", self->root_mntpoint, "tmpfs", 0, NULL), 0); in FIXTURE_SETUP() 270 ret = mount("", "/", NULL, MS_SHARED, NULL); in setup_mount_tree() 274 ret = mount("/", "/", NULL, MS_BIND, NULL); in setup_mount_tree() 284 ret = mount("/", "/", NULL, MS_BIND, NULL); in TEST_F() 309 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() 349 ret = mount("", "/", NULL, MS_PRIVATE, NULL); in TEST_F() 405 ret = mount("/", "/a", NULL, MS_BIND, NULL); in TEST_F() 408 ret = mount("", "/a", NULL, MS_SHARED, NULL); in TEST_F() 411 ret = mount("/a", "/b", NULL, MS_BIND, NULL); in TEST_F() 414 ret = mount("", "/b", NULL, MS_SLAVE, NULL); in TEST_F() [all …]
|
| /linux/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 54 If you do not have the utility mount.cifs (in the Samba 4.x source tree and on 55 the CIFS VFS web site) copy it to the same directory in which mount helpers 57 required, mount.cifs is recommended. Most distros include a ``cifs-utils`` 62 domain to the proper network user. The mount.cifs mount helper can be 78 the new default. To use old dialects (e.g. to mount Windows XP) use "vers=1.0" 79 on mount (or vers=2.0 for Windows Vista). Note that the CIFS (vers=1.0) is 83 There are additional mount options that may be helpful for SMB3 to get 91 To permit users to mount and unmount over directories they own is possible 92 with the cifs vfs. A way to enable such mounting is to mark the mount.cifs 93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to [all …]
|
| H A D | introduction.rst | 19 Storage vendors, so this network filesystem client can mount to a 36 This filesystem has a mount utility (mount.cifs) and various user space 45 mount.cifs should be installed in the directory with the other mount helpers.
|
| /linux/tools/testing/selftests/pid_namespace/ |
| H A D | pid_max.c | 43 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_cb() 51 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_cb() 89 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_inner() 97 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_inner() 164 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_outer() 172 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_outer() 233 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_limit_inner() 241 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_limit_inner() 290 ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); in pid_max_nested_limit_outer() 298 ret = mount("proc", "/proc", "proc", 0, NULL); in pid_max_nested_limit_outer()
|
| /linux/Documentation/admin-guide/nfs/ |
| H A D | nfs-rdma.rst | 55 An NFS/RDMA mount point can be obtained by using the mount.nfs command in 59 mount.nfs you are using, type: 63 $ /sbin/mount.nfs -V 73 these to create an NFS/RDMA enabled mount command), the installation 84 After building the nfs-utils package, there will be a mount.nfs binary in 85 the utils/mount directory. This binary can be used to initiate NFS v2, v3, 86 or v4 mounts. To initiate a v4 mount, the binary must be called 87 mount.nfs4. The standard technique is to create a symlink called 88 mount.nfs4 to mount.nfs. 90 This mount.nfs binary should be installed at /sbin/mount.nfs as follows: [all …]
|
| /linux/tools/testing/selftests/move_mount_set_group/ |
| H A D | move_mount_set_group_test.c | 118 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in prepare_unpriv_mountns() 198 if (mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, in move_mount_set_group_supported() 202 if (mount(NULL, "/tmp", NULL, MS_PRIVATE, 0)) in move_mount_set_group_supported() 211 if (mount("testing", SET_GROUP_FROM, "tmpfs", MS_NOATIME | MS_NODEV, in move_mount_set_group_supported() 215 if (mount(SET_GROUP_FROM, SET_GROUP_TO, NULL, MS_BIND, NULL)) in move_mount_set_group_supported() 218 if (mount(NULL, SET_GROUP_FROM, NULL, MS_SHARED, 0)) in move_mount_set_group_supported() 246 ASSERT_EQ(mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 251 ASSERT_EQ(mount("testing", SET_GROUP_A, "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 319 ret = mount(NULL, SET_GROUP_A, NULL, MS_SHARED, 0); in get_nestedns_mount_cb()
|
| /linux/Documentation/filesystems/fuse/ |
| H A D | fuse.rst | 18 Non-privileged mount (or user mount): 41 module (fuse.ko), a userspace library (libfuse.*) and a mount utility 55 The filesystem type given to mount(2) can be one of the following: 58 This is the usual way to mount a FUSE filesystem. The first 59 argument of the mount system call may contain an arbitrary string, 64 mount system call is interpreted as the name of the device. 78 The numeric user id of the mount owner. 81 The numeric group id of the mount owner. 89 'allow_other' mount option. 111 mount -t fusectl none /sys/fs/fuse/connections [all …]
|
| /linux/Documentation/filesystems/smb/ |
| H A D | cifsroot.rst | 15 which will tell the kernel to mount the root file system over the 18 In order to mount, the network stack will also need to be set up by 22 A CIFS root mount currently requires the use of SMB1+UNIX Extensions 31 to use can nonetheless be changed via the 'vers=' mount option. This 52 This is just a virtual device that basically tells the kernel to mount 59 Enables the kernel to mount the root file system via SMB that are 62 The default mount options are set in fs/smb/client/cifsroot.c. 71 Optional mount options. For more information, see mount.cifs(8).
|
| H A D | smbdirect.rst | 29 - Install cifs-utils, which provides the `mount.cifs` command to mount SMB 83 - On the client, mount the share with `rdma` mount option to use SMB Direct 90 mount -t cifs //server/share /mnt/point -o vers=3.1.1,rdma 92 - To verify that the mount is using SMB Direct, you can check dmesg for the 99 Or, verify `rdma` mount option for the share in `/proc/mounts`:
|
| /linux/tools/testing/selftests/proc/ |
| H A D | proc-pidns.c | 54 ASSERT_SUCCESS(mount(NULL, "/", NULL, MS_PRIVATE|MS_REC, NULL)); in FIXTURE_SETUP() 60 ASSERT_SUCCESS(mount("tmpfs", "/tmp", "tmpfs", 0, NULL)); in FIXTURE_SETUP() 78 ASSERT_SUCCESS(mount("/proc/self/ns/pid", "/tmp/dummy/pidns", NULL, MS_BIND, NULL)); in FIXTURE_SETUP() 79 ASSERT_SUCCESS(mount("proc", "/tmp/dummy/proc", "proc", 0, NULL)); in FIXTURE_SETUP() 106 ASSERT_SUCCESS(mount("proc", "/tmp/proc-host", "proc", 0, "pidns=/proc/self/ns/pid")); in TEST_F() 110 ASSERT_SUCCESS(mount("proc", "/tmp/proc-dummy", "proc", 0, "pidns=/tmp/dummy/pidns")); in TEST_F() 154 ASSERT_SUCCESS(mount("proc", "/tmp/proc", "proc", 0, "")); in TEST_F() 159 ASSERT_ERRNO_EQ(-EBUSY, mount(NULL, "/tmp/proc", NULL, MS_REMOUNT, "pidns=/tmp/dummy/pidns")); in TEST_F()
|
| /linux/security/ |
| H A D | inode.c | 27 static struct vfsmount *mount; variable 125 error = simple_pin_fs(&fs_type, &mount, &mount_count); in securityfs_create_dentry() 129 parent = mount->mnt_root; in securityfs_create_dentry() 166 simple_release_fs(&mount, &mount_count); in securityfs_create_dentry() 280 simple_release_fs(&mount, &mount_count); in remove_one() 304 simple_pin_fs(&fs_type, &mount, &mount_count); in securityfs_remove() 306 simple_release_fs(&mount, &mount_count); in securityfs_remove()
|
| /linux/tools/testing/selftests/wireguard/qemu/ |
| H A D | init.c | 92 if (mount("none", "/dev", "devtmpfs", 0, NULL)) in mount_filesystems() 94 if (mount("none", "/proc", "proc", 0, NULL)) in mount_filesystems() 96 if (mount("none", "/sys", "sysfs", 0, NULL)) in mount_filesystems() 98 if (mount("none", "/tmp", "tmpfs", 0, NULL)) in mount_filesystems() 100 if (mount("none", "/run", "tmpfs", 0, NULL)) in mount_filesystems() 102 if (mount("none", "/sys/kernel/debug", "debugfs", 0, NULL)) in mount_filesystems()
|
| /linux/tools/testing/selftests/namespaces/ |
| H A D | listns_efault_test.c | 122 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in TEST() 131 if (mount("tmpfs", "/tmp/test_mnt1", "tmpfs", 0, NULL) == -1) in TEST() 133 if (mount("tmpfs", "/tmp/test_mnt2", "tmpfs", 0, NULL) == -1) in TEST() 328 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in TEST() 337 if (mount("tmpfs", "/tmp/test_mnt1", "tmpfs", 0, NULL) == -1) in TEST() 339 if (mount("tmpfs", "/tmp/test_mnt2", "tmpfs", 0, NULL) == -1) in TEST() 470 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in TEST() 479 if (mount("tmpfs", "/tmp/test_mnt1", "tmpfs", 0, NULL) == -1) in TEST() 481 if (mount("tmpfs", "/tmp/test_mnt2", "tmpfs", 0, NULL) == -1) in TEST()
|
| /linux/tools/testing/selftests/firmware/ |
| H A D | fw_namespace.c | 68 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) in test_fw_in_ns() 101 if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL) == -1) in test_fw_in_ns() 105 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) in test_fw_in_ns() 124 if (mount("test", "/lib/firmware", "tmpfs", 0, NULL) == -1) in main()
|