/linux-6.12.1/Documentation/filesystems/ |
D | sharedsubtree.rst | 10 3) Setting mount states 36 a. shared mount 37 b. slave mount 38 c. private mount 39 d. unbindable mount 42 2a) A shared mount can be replicated to as many mountpoints and all the 47 Let's say /mnt has a mount that is shared:: 49 mount --make-shared /mnt 51 Note: mount(8) command now supports the --make-shared flag, 57 # mount --bind /mnt /tmp [all …]
|
D | autofs-mount-control.rst | 17 are things such as setting an autofs mount catatonic, setting the 20 mount itself which prevents us being able to use open(2) to obtain a 25 needs to walk back up the mount tree to construct a path, such as 28 from the mount tree. 33 because autofs direct mounts and the implementation of "on demand mount 34 and expire" of nested mount trees have the file system mounted directly 35 on top of the mount trigger directory dentry. 39 a direct mount in disguise) and indirect. 62 operation. So we see a mount of shark:/autofs/export1 on /test/g1, for 65 The way that direct mounts are handled is by making an autofs mount on [all …]
|
D | autofs.rst | 46 symbolic links and mount traps. Mount traps are directories with 51 mount traps are created with `mkdir`. The determination of whether a 52 directory should be a mount trap is based on a master map. This master 53 map is consulted by autofs to determine which directories are mount 54 points. Mount points can be *direct*/*indirect*/*offset*. 57 If neither the *direct* or *offset* mount options are given (so the 58 mount is considered to be *indirect*), then the root directory is 59 always a regular directory, otherwise it is a mount trap when it is 62 directory is a mount trap only if the filesystem is mounted *direct* 65 Directories created in the root directory are mount traps only if the [all …]
|
D | fuse.rst | 18 Non-privileged mount (or user mount): 31 Mount owner: 41 module (fuse.ko), a userspace library (libfuse.*) and a mount utility 55 The filesystem type given to mount(2) can be one of the following: 58 This is the usual way to mount a FUSE filesystem. The first 59 argument of the mount system call may contain an arbitrary string, 64 mount system call is interpreted as the name of the device. 66 Mount options 78 The numeric user id of the mount owner. 81 The numeric group id of the mount owner. [all …]
|
D | tmpfs.rst | 17 mount. tmpfs also supports THP. 21 fly using a remount ('mount -o remount ...') of the filesystem. A tmpfs 45 1) There is always a kernel internal mount which you will not see at 49 This mount does not depend on CONFIG_TMPFS. If CONFIG_TMPFS is not 59 Remember to create the directory that you intend to mount tmpfs on 62 This mount is _not_ needed for SYSV shared memory. The internal 63 mount is used for that. (In the 2.3 kernel versions it was 64 necessary to mount the predecessor of tmpfs (shm fs) to use SYSV 67 3) Some people (including me) find it very convenient to mount it 75 tmpfs has three mount options for sizing: [all …]
|
D | gfs2-uevents.rst | 7 During the lifetime of a GFS2 mount, a number of uevents are generated. 17 The ADD event occurs at mount time. It will always be the first 18 uevent generated by the newly created filesystem. If the mount 23 and RDONLY=[0|1] that specify the spectator status (a read-only mount 30 The ONLINE uevent is generated after a successful mount or remount. It 40 successful mount of the filesystem by the first node (FIRSTMOUNT=Done). 42 nodes in the cluster to mount the filesystem. 49 for every journal recovered, whether it is during the initial mount 58 uevent for a successful mount or remount. 71 The REMOVE uevent is generated at the end of an unsuccessful mount [all …]
|
D | idmappings.rst | 382 - mount's idmapping (``mnt_idmap(vfsmnt)``) 384 Let's see some examples with caller/filesystem idmapping but without mount 386 revisit/reconsider these examples, this time using mount idmappings, to see how 469 userspace id. We could only do this if we were to mount the whole filesystem 606 change in ownership is tied to the lifetime of the filesystem mount, i.e. the 608 filesystem and mount it again in another user namespace. This is usually 625 localized way. The ownership changes are restricted to a specific mount and the 626 ownership changes are tied to the lifetime of the mount. All other users and 631 completely under an idmapped mount to get the same effect. This has the 638 Filesystem types vs idmapped mount types [all …]
|
D | overlayfs.rst | 35 make the overlay mount more compliant with filesystem scanners and 48 The "xino" feature can be enabled with the "-o xino=on" overlay mount option. 51 the lifetime of the filesystem. The "-o xino=auto" overlay mount option 120 At mount time, the two directories given as mount options "lowerdir" and 123 mount -t overlay overlay -olowerdir=/lower,upperdir=/upper,\ 237 Mount options: 299 2) task creating the overlay mount MUST NOT gain additional privileges 325 mount -t overlay overlay -olowerdir=/lower,upperdir=/upper,... /merged 330 mount --bind /upper /merged 342 mount -t overlay overlay -olowerdir=/lower1:/lower2:/lower3 /merged [all …]
|
/linux-6.12.1/fs/ |
D | pnode.c | 9 #include <linux/mount.h> 12 #include <uapi/linux/mount.h> 16 /* return the next shared peer mount of @p */ 17 static inline struct mount *next_peer(struct mount *p) in next_peer() 19 return list_entry(p->mnt_share.next, struct mount, mnt_share); in next_peer() 22 static inline struct mount *first_slave(struct mount *p) in first_slave() 24 return list_entry(p->mnt_slave_list.next, struct mount, mnt_slave); in first_slave() 27 static inline struct mount *last_slave(struct mount *p) in last_slave() 29 return list_entry(p->mnt_slave_list.prev, struct mount, mnt_slave); in last_slave() 32 static inline struct mount *next_slave(struct mount *p) in next_slave() [all …]
|
D | pnode.h | 11 #include "mount.h" 33 static inline void set_mnt_shared(struct mount *mnt) in set_mnt_shared() 39 void change_mnt_propagation(struct mount *, int); 40 int propagate_mnt(struct mount *, struct mountpoint *, struct mount *, 43 int propagate_mount_busy(struct mount *, int); 44 void propagate_mount_unlock(struct mount *); 45 void mnt_release_group_id(struct mount *); 46 int get_dominating_id(struct mount *mnt, const struct path *root); 47 int mnt_get_count(struct mount *mnt); 48 void mnt_set_mountpoint(struct mount *, struct mountpoint *, [all …]
|
D | namespace.c | 31 #include <uapi/linux/mount.h> 40 /* Maximum number of mounts in a mount namespace */ 72 /* Don't allow confusion with old 32bit mount ID */ 146 /* keep alive for {list,stat}mount() */ in mnt_ns_release() 156 /* remove from global mount namespace list */ in DEFINE_FREE() 166 * Returns the mount namespace which either has the specified id, or has the 192 * Lookup a mount namespace by id and take a passive reference count. Taking a 193 * passive reference means the mount namespace can be emptied if e.g., the last 196 * already shut down before acquiring @namespace_sem, {list,stat}mount() will 197 * see that the mount rbtree of the namespace is empty. [all …]
|
D | mount.h | 2 #include <linux/mount.h> 10 struct mount * root; 35 struct mount { struct 37 struct mount *mnt_parent; argument 52 struct list_head mnt_instance; /* mount instance on sb->s_mounts */ argument 62 struct mount *mnt_master; /* slave is on master->mnt_slave_list */ argument 74 int mnt_id; /* mount identifier, reused */ argument 75 u64 mnt_id_unique; /* mount ID unique until reboot */ argument 84 static inline struct mount *real_mount(struct vfsmount *mnt) in real_mount() argument 86 return container_of(mnt, struct mount, mnt); in real_mount() [all …]
|
/linux-6.12.1/Documentation/admin-guide/cifs/ |
D | usage.rst | 54 If you do not have the utility mount.cifs (in the Samba 4.x source tree and on 55 the CIFS VFS web site) copy it to the same directory in which mount helpers 57 required, mount.cifs is recommended. Most distros include a ``cifs-utils`` 62 domain to the proper network user. The mount.cifs mount helper can be 78 the new default. To use old dialects (e.g. to mount Windows XP) use "vers=1.0" 79 on mount (or vers=2.0 for Windows Vista). Note that the CIFS (vers=1.0) is 83 There are additional mount options that may be helpful for SMB3 to get 91 To permit users to mount and unmount over directories they own is possible 92 with the cifs vfs. A way to enable such mounting is to mark the mount.cifs 93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to [all …]
|
/linux-6.12.1/security/tomoyo/ |
D | mount.c | 3 * security/tomoyo/mount.c 9 #include <uapi/linux/mount.h> 12 /* String table for special mount operations. */ 24 * tomoyo_audit_mount_log - Audit mount log. 32 return tomoyo_supervisor(r, "file mount %s %s %s 0x%lX\n", in tomoyo_audit_mount_log() 33 r->param.mount.dev->name, in tomoyo_audit_mount_log() 34 r->param.mount.dir->name, in tomoyo_audit_mount_log() 35 r->param.mount.type->name, in tomoyo_audit_mount_log() 36 r->param.mount.flags); in tomoyo_audit_mount_log() 53 return tomoyo_compare_number_union(r->param.mount.flags, in tomoyo_check_mount_acl() [all …]
|
/linux-6.12.1/Documentation/admin-guide/nfs/ |
D | nfs-rdma.rst | 55 An NFS/RDMA mount point can be obtained by using the mount.nfs command in 59 mount.nfs you are using, type: 63 $ /sbin/mount.nfs -V 73 these to create an NFS/RDMA enabled mount command), the installation 84 After building the nfs-utils package, there will be a mount.nfs binary in 85 the utils/mount directory. This binary can be used to initiate NFS v2, v3, 86 or v4 mounts. To initiate a v4 mount, the binary must be called 87 mount.nfs4. The standard technique is to create a symlink called 88 mount.nfs4 to mount.nfs. 90 This mount.nfs binary should be installed at /sbin/mount.nfs as follows: [all …]
|
/linux-6.12.1/fs/autofs/ |
D | dev-ioctl.c | 21 * an ioctl file descriptor on an autofs mount that may be covered by 22 * another mount. This situation arises when starting automount(8) 24 * mounts (used for autofs lazy mount/umount of nested mount trees), 187 /* Find the topmost mount satisfying test() */ 229 * Open a file descriptor on the autofs mount point corresponding 262 /* Open a file descriptor on an autofs mount point */ 302 * Send "ready" status for an existing wait (either a mount or an expire 316 * Send "fail" status for an existing wait (either a mount or an expire 334 * Normally this is set at mount using an option but if we 335 * are reconnecting to a busy mount then we need to use this [all …]
|
D | root.c | 91 * mount point. The daemon must have failed to mount this in autofs_dir_open() 94 * mount request. Otherwise we're doing a readdir on the in autofs_dir_open() 254 pr_debug("waiting for mount name=%pd\n", path->dentry); in autofs_mount_wait() 256 pr_debug("mount wait done status=%d\n", status); in autofs_mount_wait() 294 /* If this is an indirect mount the dentry could have gone away in autofs_mountpoint_changed() 299 * happen is an autofs indirect mount that has the "browse" in autofs_mountpoint_changed() 302 * directory and create a symlink as the mount leaving the in autofs_mountpoint_changed() 305 * Another not so obvious case is when a mount in an autofs in autofs_mountpoint_changed() 306 * indirect mount that uses the "nobrowse" option is being in autofs_mountpoint_changed() 307 * expired at the same time as a path walk. If the mount has in autofs_mountpoint_changed() [all …]
|
/linux-6.12.1/tools/perf/trace/beauty/include/uapi/linux/ |
D | mount.h | 7 * These are the fs-independent mount-flags: up to 32 flags are supported 9 * Usage of these is restricted within the kernel to core mount(2) code and 13 #define MS_RDONLY 1 /* Mount read-only */ 56 * Old magic mount flag and mask 77 #define MOVE_MOUNT_BENEATH 0x00000200 /* Mount beneath top mount */ 114 * Mount attributes. 116 #define MOUNT_ATTR_RDONLY 0x00000001 /* Mount read-only */ 125 #define MOUNT_ATTR_IDMAP 0x00100000 /* Idmap mount to @userns_fd in struct mount_attr. */ 143 * Structure for getting mount/superblock/filesystem info with statmount(2). 157 __u32 mnt_opts; /* [str] Mount options of the mount */ [all …]
|
/linux-6.12.1/include/uapi/linux/ |
D | mount.h | 7 * These are the fs-independent mount-flags: up to 32 flags are supported 9 * Usage of these is restricted within the kernel to core mount(2) code and 13 #define MS_RDONLY 1 /* Mount read-only */ 56 * Old magic mount flag and mask 77 #define MOVE_MOUNT_BENEATH 0x00000200 /* Mount beneath top mount */ 114 * Mount attributes. 116 #define MOUNT_ATTR_RDONLY 0x00000001 /* Mount read-only */ 125 #define MOUNT_ATTR_IDMAP 0x00100000 /* Idmap mount to @userns_fd in struct mount_attr. */ 143 * Structure for getting mount/superblock/filesystem info with statmount(2). 157 __u32 mnt_opts; /* [str] Mount options of the mount */ [all …]
|
/linux-6.12.1/fs/xfs/ |
D | xfs_rtalloc.h | 16 * Initialize realtime fields in the mount structure. 20 struct xfs_mount *mp); /* file system mount structure */ 26 * Get the bitmap and summary inodes into the mount structure 27 * at mount time. 31 struct xfs_mount *mp); /* file system mount structure */ 38 struct xfs_mount *mp, /* file system mount structure */ 47 xfs_mount_t *mp) /* file system mount structure */ in xfs_rtmount_init()
|
/linux-6.12.1/Documentation/filesystems/smb/ |
D | cifsroot.rst | 15 which will tell the kernel to mount the root file system over the 18 In order to mount, the network stack will also need to be set up by 22 A CIFS root mount currently requires the use of SMB1+UNIX Extensions 31 to use can nonetheless be changed via the 'vers=' mount option. This 52 This is just a virtual device that basically tells the kernel to mount 59 Enables the kernel to mount the root file system via SMB that are 62 The default mount options are set in fs/smb/client/cifsroot.c. 71 Optional mount options. For more information, see mount.cifs(8).
|
/linux-6.12.1/tools/testing/selftests/filesystems/ |
D | devpts_pts.c | 12 #include <sys/mount.h> 210 ret = mount("devpts", mntpoint, "devpts", MS_NOSUID | MS_NOEXEC, in verify_non_standard_devpts_mount() 213 fprintf(stderr, "Failed to mount devpts fs to \"%s\" in new " in verify_non_standard_devpts_mount() 214 "mount namespace: %s\n", mntpoint, in verify_non_standard_devpts_mount() 238 ret = mount("/dev/pts/ptmx", "/dev/ptmx", NULL, MS_BIND, NULL); in verify_ptmx_bind_mount() 240 fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " in verify_ptmx_bind_mount() 241 "\"/dev/ptmx\" mount namespace\n"); in verify_ptmx_bind_mount() 265 ret = mount("/dev/pts/ptmx", ptmx, NULL, MS_BIND, NULL); in verify_invalid_ptmx_bind_mount() 268 fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " in verify_invalid_ptmx_bind_mount() 269 "\"%s\" mount namespace\n", ptmx); in verify_invalid_ptmx_bind_mount() [all …]
|
/linux-6.12.1/tools/testing/selftests/firmware/ |
D | fw_namespace.c | 2 /* Test triggering of loading of firmware from different mount 3 * namespaces. Expect firmware to be always loaded from the mount 14 #include <sys/mount.h> 68 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) in test_fw_in_ns() 101 if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL) == -1) in test_fw_in_ns() 105 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) in test_fw_in_ns() 122 /* Mount tmpfs to /lib/firmware so we don't have to assume in main() 124 if (mount("test", "/lib/firmware", "tmpfs", 0, NULL) == -1) in main() 134 /* Positive case: firmware in PID1 mount namespace */ in main() 139 /* Negative case: firmware in child mount namespace, expected to fail */ in main()
|
/linux-6.12.1/tools/testing/selftests/mount_setattr/ |
D | mount_setattr_test.c | 10 #include <sys/mount.h> 21 #include <linux/mount.h> 230 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) in prepare_unpriv_mountns() 390 ASSERT_EQ(mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 395 ASSERT_EQ(mount("testing", "/tmp/B", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 400 ASSERT_EQ(mount("testing", "/tmp/B/BB", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 403 ASSERT_EQ(mount("testing", "/mnt", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 408 ASSERT_EQ(mount("testing", "/mnt/A", "tmpfs", MS_NOATIME | MS_NODEV, in FIXTURE_SETUP() 413 ASSERT_EQ(mount("/tmp", "/mnt/A/AA", NULL, MS_BIND | MS_REC, NULL), 0); in FIXTURE_SETUP() 417 ASSERT_EQ(mount("testing", "/mnt/B", "ramfs", in FIXTURE_SETUP() [all …]
|
/linux-6.12.1/drivers/iio/ |
D | industrialio-acpi.c | 10 * iio_read_acpi_mount_matrix() - Read accelerometer mount matrix info from ACPI 15 * Try to read the mount-matrix by calling the specified method on the device's 21 * The method name is configurable because some dual-accel setups define 2 mount 43 dev_err(dev, "Failed to get ACPI mount matrix: %d\n", status); in iio_read_acpi_mount_matrix() 49 dev_err(dev, "Unknown ACPI mount matrix package format\n"); in iio_read_acpi_mount_matrix() 56 dev_err(dev, "Unknown ACPI mount matrix element format\n"); in iio_read_acpi_mount_matrix() 62 dev_err(dev, "Incorrect ACPI mount matrix string format\n"); in iio_read_acpi_mount_matrix() 72 dev_err(dev, "Invalid value in ACPI mount matrix: %d\n", val[j]); in iio_read_acpi_mount_matrix()
|