| /linux/tools/hv/ |
| H A D | hv_vss_daemon.c | 116 FILE *mounts; in vss_operate() local 135 mounts = setmntent("/proc/mounts", "r"); in vss_operate() 136 if (mounts == NULL) in vss_operate() 139 while ((ent = getmntent(mounts))) { in vss_operate() 167 endmntent(mounts); in vss_operate() 186 endmntent(mounts); in vss_operate()
|
| /linux/tools/bootconfig/scripts/ |
| H A D | ftrace2bconf.sh | 26 TRACEFS=`grep -m 1 -w tracefs /proc/mounts | cut -f 2 -d " "` 28 if ! grep -wq debugfs /proc/mounts; then 32 TRACEFS=`grep -m 1 -w debugfs /proc/mounts | cut -f 2 -d " "`/tracing
|
| H A D | bconf2ftrace.sh | 52 TRACEFS=`grep -m 1 -w tracefs /proc/mounts | cut -f 2 -d " "` 54 if ! grep -wq debugfs /proc/mounts; then 58 TRACEFS=`grep -m 1 -w debugfs /proc/mounts | cut -f 2 -d " "`/tracing
|
| /linux/Documentation/networking/ |
| H A D | sysfs-tagging.rst | 31 kobj_nstype first mounts sysfs, a new superblock is created. It 32 will be differentiated from other sysfs mounts by having its 34 through bind mounting and mounts propagation, a task can easily view 35 the contents of other namespaces' sysfs mounts. Therefore, when a
|
| /linux/Documentation/filesystems/ |
| H A D | autofs-mount-control.rst | 11 restarting autofs when there are busy mounts). 19 certain types of autofs triggered mounts can end up covering an autofs 23 Currently autofs uses "umount -l" (lazy umount) to clear active mounts 31 mounts. Immediately one thinks of just adding the ability to remount 33 because autofs direct mounts and the implementation of "on demand mount 61 mounts are triggered for each sub-directory key by the inode lookup 65 The way that direct mounts are handled is by making an autofs mount on 97 cases (in 2.4) where the available number of mounts are exhausted or 104 offsets are implemented using the same mechanism as the direct mounts 119 offset mounts in place we need to be able to obtain a file handle [all …]
|
| H A D | devpts.rst | 9 and their indices in all other mounts. 11 All mounts of the devpts filesystem now create a ``/dev/pts/ptmx`` node
|
| H A D | automount-support.rst | 10 fs/nfs/). This facility includes allowing in-kernel mounts to be 32 [root@andromeda root]# cat /proc/mounts
|
| H A D | idmappings.rst | 298 userspace id mapped. This will come in handy when working with idmapped mounts. 552 Idmappings on idmapped mounts 617 But the usecases mentioned above and more can be handled by idmapped mounts. 619 different mounts. This is achieved by marking the mounts with a user namespace 624 Idmapped mounts make it possible to change ownership in a temporary and 629 Filesystems that support idmapped mounts don't have any real reason to support 635 However, it is perfectly possible to combine idmapped mounts with filesystems 641 With the introduction of idmapped mounts we need to distinguish between 795 of idmapped mounts. 888 /* Map the userspace id down into a VFS id in the mounts's idmapping. */ [all …]
|
| /linux/tools/testing/selftests/pstore/ |
| H A D | pstore_post_reboot_tests | 23 mount_info=`grep pstore /proc/mounts` 30 mount_point=`grep pstore /proc/mounts | cut -d' ' -f2 | head -n1`
|
| /linux/tools/testing/selftests/kexec/ |
| H A D | kexec_common_lib.sh | 9 SECURITYFS=$(grep "securityfs" /proc/mounts | awk '{print $2}') 48 if ! grep -q "^\S\+ $efivarfs efivarfs" /proc/mounts; then
|
| /linux/samples/vfs/ |
| H A D | .gitignore | 3 /test-list-all-mounts
|
| H A D | Makefile | 2 userprogs-always-y += test-fsmount test-statx mountinfo test-list-all-mounts
|
| /linux/Documentation/filesystems/fuse/ |
| H A D | fuse.rst | 21 user. NOTE: this is not the same as mounts allowed with the "user" 45 non-privileged mounts. This opens up new possibilities for the use of 104 option is only valid for 'fuseblk' type mounts. 218 How do non-privileged mounts work? 224 The implication of providing non-privileged mounts is that the mount 249 for non-privileged mounts. 305 mounts, it can relax the last limitation in several ways: 321 set, super user's processes have unrestricted access to mounts
|
| /linux/tools/testing/selftests/powerpc/mm/ |
| H A D | stress_code_patching.sh | 6 DEBUFS_DIR=`cat /proc/mounts | grep debugfs | awk '{print $2}'`
|
| /linux/tools/testing/selftests/gpio/ |
| H A D | gpio-mockup-sysfs.sh | 6 SYSFS=`grep -w sysfs /proc/mounts | cut -f2 -d' '`
|
| H A D | gpio-mockup.sh | 51 DEBUGFS=$(grep -w debugfs /proc/mounts | cut -f2 -d' ')
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | ima_setup.sh | 21 local securityfs_dir=$(grep "securityfs" /proc/mounts | awk '{print $2}')
|
| H A D | test_bpftool_metadata.sh | |
| /linux/Documentation/filesystems/smb/ |
| H A D | smbdirect.rst | 99 Or, verify `rdma` mount option for the share in `/proc/mounts`: 103 cat /proc/mounts | grep cifs
|
| /linux/tools/testing/selftests/ftrace/ |
| H A D | ftracetest | 169 TRACING_DIR=`grep tracefs /proc/mounts | cut -f2 -d' ' | head -1` 171 DEBUGFS_DIR=`grep debugfs /proc/mounts | cut -f2 -d' ' | head -1`
|
| /linux/include/linux/ |
| H A D | mount.h | 94 extern void mark_mounts_for_expiry(struct list_head *mounts);
|
| /linux/Documentation/admin-guide/nfs/ |
| H A D | nfs-rdma.rst | 57 version with support for NFS/RDMA mounts, but for various reasons we 86 or v4 mounts. To initiate a v4 mount, the binary must be called 96 In this location, mount.nfs will be invoked automatically for NFS mounts 289 To verify that the mount is using RDMA, run "cat /proc/mounts" and check
|
| /linux/fs/overlayfs/ |
| H A D | params.c | 842 struct vfsmount **mounts; in ovl_free_fs() local 856 mounts = (struct vfsmount **) ofs->config.lowerdirs; in ovl_free_fs() 860 mounts[i] = ofs->layers[i].mnt; in ovl_free_fs() 862 kern_unmount_array(mounts, ofs->numlayer); in ovl_free_fs()
|
| /linux/fs/resctrl/ |
| H A D | Kconfig | 18 If nothing mounts or prods the 'resctrl' filesystem, resource
|
| /linux/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 102 Note that when the mount.cifs utility is run suid (allowing user mounts), 108 by simply specifying ``nosuid`` among the mount options. For user mounts 122 mounts, unless umount is invoked with -i (which will avoid invoking a umount 130 Also note that the customary way of allowing user mounts and unmounts is 297 passed in on mount. For mounts to servers 311 is configured setuid for user mounts) unless the ``uid=`` 418 program to be executed. This is only meaningful for mounts 433 be executed (default for mounts when executed as root, 434 nosuid is default for user mounts). 459 non CIFS Unix Extension mounts for cases in which the default [all …]
|