/linux-6.1.9/Documentation/filesystems/ |
D | sharedsubtree.rst | 33 Shared subtree provides four different flavors of mounts; struct vfsmount to be 60 and the contents of both the mounts remain identical. 89 All slave mounts have a master mount which is a shared. 181 B) A process wants its mounts invisible to any other process, but 182 still be able to see the other system mounts. 196 Hence forth any mounts within the /myprivatetree done by the 197 process will not show up in any other namespace. However mounts 207 The above semantics allows a way to share mounts across 263 (1) Shared mounts 275 /mnt or /tmp reflect in all the other mounts of its peer [all …]
|
D | autofs-mount-control.rst | 11 restarting autofs when there are busy mounts). 19 certain types of autofs triggered mounts can end up covering an autofs 23 Currently autofs uses "umount -l" (lazy umount) to clear active mounts 31 mounts. Immediately one thinks of just adding the ability to remount 33 because autofs direct mounts and the implementation of "on demand mount 61 mounts are triggered for each sub-directory key by the inode lookup 65 The way that direct mounts are handled is by making an autofs mount on 97 cases (in 2.4) where the available number of mounts are exhausted or 104 offsets are implemented using the same mechanism as the direct mounts 119 offset mounts in place we need to be able to obtain a file handle [all …]
|
D | autofs.rst | 32 and mounts filesystems. This will often be the "automount" program, 125 about this dentry and normal checks for mounts and automounts 132 - A return value of `-EISDIR` tells the VFS to ignore any mounts 204 The VFS has a mechanism for automatically expiring unused mounts, 207 mounts that were created by `d_automount()` returning a filesystem to be 213 The VFS also supports "expiry" of mounts using the MNT_EXPIRE flag to 248 there can be an accumulation of mounts that aren't actually being 251 preventing this apparent inability to expire mounts that aren't 261 There is an option with indirect mounts to consider each of the leaves 267 setting of an expire timeout for individual mounts. But there are [all …]
|
D | devpts.rst | 9 and their indicies in all other mounts. 11 All mounts of the devpts filesystem now create a ``/dev/pts/ptmx`` node
|
D | fuse.rst | 21 user. NOTE: this is not the same as mounts allowed with the "user" 45 non-privileged mounts. This opens up new possibilities for the use of 104 option is only valid for 'fuseblk' type mounts. 204 How do non-privileged mounts work? 210 The implication of providing non-privileged mounts is that the mount 235 for non-privileged mounts. 291 mounts, it can relax the last limitation in several ways: 307 set, super user's processes have unrestricted access to mounts
|
D | idmappings.rst | 297 userspace id mapped. This will come in handy when working with idmapped mounts. 540 Idmappings on idmapped mounts 605 But the usecases mentioned above and more can be handled by idmapped mounts. 607 different mounts. This is achieved by marking the mounts with a user namespace 612 Idmapped mounts make it possible to change ownership in a temporary and 617 Filesystems that support idmapped mounts don't have any real reason to support 623 However, it is perfectly possible to combine idmapped mounts with filesystems 718 of idmapped mounts. 811 /* Map the userspace id down into a kernel id in the mounts's idmapping. */ 847 /* Map the userspace id down into a kernel id in the mounts's idmapping. */ [all …]
|
D | automount-support.rst | 10 fs/nfs/). This facility includes allowing in-kernel mounts to be 32 [root@andromeda root]# cat /proc/mounts
|
/linux-6.1.9/init/ |
D | Makefile | 8 obj-y := main.o version.o mounts.o 18 mounts-y := do_mounts.o 19 mounts-$(CONFIG_BLK_DEV_RAM) += do_mounts_rd.o 20 mounts-$(CONFIG_BLK_DEV_INITRD) += do_mounts_initrd.o
|
/linux-6.1.9/tools/lib/api/fs/ |
D | fs.c | 90 const char * const *mounts; member 113 .mounts = sysfs__fs_known_mountpoints, 119 .mounts = procfs__known_mountpoints, 125 .mounts = debugfs__known_mountpoints, 131 .mounts = tracefs__known_mountpoints, 137 .mounts = hugetlbfs__known_mountpoints, 143 .mounts = bpf_fs__known_mountpoints, 188 ptr = fs->mounts; in fs__check_mounts() 278 return getenv(upper_name) ?: *fs->mounts; in mount_overload()
|
/linux-6.1.9/tools/hv/ |
D | hv_vss_daemon.c | 116 FILE *mounts; in vss_operate() local 135 mounts = setmntent("/proc/mounts", "r"); in vss_operate() 136 if (mounts == NULL) in vss_operate() 139 while ((ent = getmntent(mounts))) { in vss_operate() 167 endmntent(mounts); in vss_operate() 186 endmntent(mounts); in vss_operate()
|
/linux-6.1.9/tools/bootconfig/scripts/ |
D | ftrace2bconf.sh | 26 TRACEFS=`grep -m 1 -w tracefs /proc/mounts | cut -f 2 -d " "` 28 if ! grep -wq debugfs /proc/mounts; then 32 TRACEFS=`grep -m 1 -w debugfs /proc/mounts | cut -f 2 -d " "`/tracing
|
D | bconf2ftrace.sh | 52 TRACEFS=`grep -m 1 -w tracefs /proc/mounts | cut -f 2 -d " "` 54 if ! grep -wq debugfs /proc/mounts; then 58 TRACEFS=`grep -m 1 -w debugfs /proc/mounts | cut -f 2 -d " "`/tracing
|
/linux-6.1.9/scripts/selinux/ |
D | install_policy.sh | 79 mounts=`cat /proc/$$/mounts | \ 82 $SF -F file_contexts $mounts
|
/linux-6.1.9/Documentation/networking/ |
D | sysfs-tagging.rst | 31 kobj_nstype first mounts sysfs, a new superblock is created. It 32 will be differentiated from other sysfs mounts by having its 34 through bind mounting and mounts propagation, a task can easily view 35 the contents of other namespaces' sysfs mounts. Therefore, when a
|
/linux-6.1.9/tools/testing/selftests/resctrl/ |
D | resctrlfs.c | 15 FILE *mounts; in find_resctrl_mount() local 18 mounts = fopen("/proc/mounts", "r"); in find_resctrl_mount() 19 if (!mounts) { in find_resctrl_mount() 23 while (!feof(mounts)) { in find_resctrl_mount() 24 if (!fgets(line, 256, mounts)) in find_resctrl_mount() 38 fclose(mounts); in find_resctrl_mount() 45 fclose(mounts); in find_resctrl_mount()
|
/linux-6.1.9/tools/testing/selftests/pstore/ |
D | pstore_post_reboot_tests | 23 mount_info=`grep pstore /proc/mounts` 30 mount_point=`grep pstore /proc/mounts | cut -d' ' -f2 | head -n1`
|
/linux-6.1.9/tools/testing/selftests/kexec/ |
D | kexec_common_lib.sh | 9 SECURITYFS=$(grep "securityfs" /proc/mounts | awk '{print $2}') 48 if ! grep -q "^\S\+ $efivarfs efivarfs" /proc/mounts; then
|
/linux-6.1.9/tools/testing/selftests/powerpc/mm/ |
D | stress_code_patching.sh | 6 DEBUFS_DIR=`cat /proc/mounts | grep debugfs | awk '{print $2}'`
|
/linux-6.1.9/tools/testing/selftests/gpio/ |
D | gpio-mockup-sysfs.sh | 6 SYSFS=`grep -w sysfs /proc/mounts | cut -f2 -d' '`
|
/linux-6.1.9/tools/testing/selftests/bpf/ |
D | ima_setup.sh | 21 local securityfs_dir=$(grep "securityfs" /proc/mounts | awk '{print $2}')
|
D | test_bpftool_metadata.sh | 11 BPF_FS=$(awk '$3 == "bpf" {print $2; exit}' /proc/mounts)
|
/linux-6.1.9/fs/cifs/ |
D | Kconfig | 50 CIFS mounts can provide slightly better POSIX compatibility 51 than SMB3 mounts. SMB2/SMB3 mount options are also 81 on mounts with cifs.ko 161 servers if their addresses change or for implicit mounts of
|
/linux-6.1.9/tools/testing/selftests/ftrace/ |
D | ftracetest | 149 TRACING_DIR=`grep tracefs /proc/mounts | cut -f2 -d' ' | head -1` 151 DEBUGFS_DIR=`grep debugfs /proc/mounts | cut -f2 -d' ' | head -1`
|
/linux-6.1.9/tools/testing/selftests/efivarfs/ |
D | efivarfs.sh | 25 if ! grep -q "^\S\+ $efivarfs_mount efivarfs" /proc/mounts; then
|
/linux-6.1.9/include/linux/ |
D | mount.h | 106 extern void mark_mounts_for_expiry(struct list_head *mounts);
|