/Linux-v5.4/init/ |
D | Makefile | 8 obj-y := main.o version.o mounts.o 18 mounts-y := do_mounts.o 19 mounts-$(CONFIG_BLK_DEV_RAM) += do_mounts_rd.o 20 mounts-$(CONFIG_BLK_DEV_INITRD) += do_mounts_initrd.o 21 mounts-$(CONFIG_BLK_DEV_MD) += do_mounts_md.o
|
/Linux-v5.4/Documentation/filesystems/ |
D | sharedsubtree.txt | 30 Shared subtree provides four different flavors of mounts; struct vfsmount to be 53 and the contents of both the mounts remain identical. 79 All slave mounts have a master mount which is a shared. 169 B) A process wants its mounts invisible to any other process, but 170 still be able to see the other system mounts. 184 Hence forth any mounts within the /myprivatetree done by the 185 process will not show up in any other namespace. However mounts 195 The above semantics allows a way to share mounts across 250 (1) Shared mounts 261 /mnt or /tmp reflect in all the other mounts of its peer [all …]
|
D | sysfs-tagging.txt | 28 kobj_nstype first mounts sysfs, a new superblock is created. It 29 will be differentiated from other sysfs mounts by having its 31 through bind mounting and mounts propagation, a task can easily view 32 the contents of other namespaces' sysfs mounts. Therefore, when a
|
D | autofs-mount-control.txt | 9 restarting autofs when there are busy mounts). 17 certain types of autofs triggered mounts can end up covering an autofs 21 Currently autofs uses "umount -l" (lazy umount) to clear active mounts 29 mounts. Immediately one thinks of just adding the ability to remount 31 because autofs direct mounts and the implementation of "on demand mount 59 mounts are triggered for each sub-directory key by the inode lookup 63 The way that direct mounts are handled is by making an autofs mount on 95 cases (in 2.4) where the available number of mounts are exhausted or 102 offsets are implemented using the same mechanism as the direct mounts 117 offset mounts in place we need to be able to obtain a file handle [all …]
|
D | devpts.txt | 3 and their indicies in all other mounts. 5 All mounts of the devpts filesystem now create a /dev/pts/ptmx node
|
D | fuse.txt | 18 user. NOTE: this is not the same as mounts allowed with the "user" 45 non-privileged mounts. This opens up new possibilities for the use of 116 option is only valid for 'fuseblk' type mounts. 218 How do non-privileged mounts work? 224 The implication of providing non-privileged mounts is that the mount 251 for non-privileged mounts. 307 mounts, it can relax the last limitation with a "user_allow_other"
|
D | automount-support.txt | 3 fs/nfs/). This facility includes allowing in-kernel mounts to be 26 [root@andromeda root]# cat /proc/mounts
|
D | bfs.txt | 32 /proc/mounts. You will need to do it manually using "-d" switch of
|
/Linux-v5.4/tools/lib/api/fs/ |
D | fs.c | 90 const char * const *mounts; member 112 .mounts = sysfs__fs_known_mountpoints, 117 .mounts = procfs__known_mountpoints, 122 .mounts = debugfs__known_mountpoints, 127 .mounts = tracefs__known_mountpoints, 132 .mounts = hugetlbfs__known_mountpoints, 137 .mounts = bpf_fs__known_mountpoints, 180 ptr = fs->mounts; in fs__check_mounts() 259 return getenv(upper_name) ?: *fs->mounts; in mount_overload()
|
/Linux-v5.4/tools/hv/ |
D | hv_vss_daemon.c | 114 FILE *mounts; in vss_operate() local 133 mounts = setmntent("/proc/mounts", "r"); in vss_operate() 134 if (mounts == NULL) in vss_operate() 137 while ((ent = getmntent(mounts))) { in vss_operate() 162 endmntent(mounts); in vss_operate() 175 endmntent(mounts); in vss_operate()
|
/Linux-v5.4/scripts/selinux/ |
D | install_policy.sh | 80 mounts=`cat /proc/$$/mounts | \ 83 $SF -F file_contexts $mounts
|
/Linux-v5.4/tools/testing/selftests/pstore/ |
D | pstore_post_reboot_tests | 23 mount_info=`grep pstore /proc/mounts` 30 mount_point=`grep pstore /proc/mounts | cut -d' ' -f2 | head -n1`
|
/Linux-v5.4/tools/testing/selftests/kexec/ |
D | kexec_common_lib.sh | 9 SECURITYFS=$(grep "securityfs" /proc/mounts | awk '{print $2}') 48 if ! grep -q "^\S\+ $efivarfs efivarfs" /proc/mounts; then
|
/Linux-v5.4/fs/cifs/ |
D | Kconfig | 50 CIFS mounts can provide slightly better POSIX compatibility 51 than SMB3 mounts. SMB2/SMB3 mount options are also 81 on mounts with cifs.ko 98 mounts may be less secure than mounts using NTLM or more recent 103 used automatically. At runtime LANMAN mounts are disabled but 190 servers if their addresses change or for implicit mounts of
|
/Linux-v5.4/tools/nfsd/ |
D | inject_fault.sh | 9 DEBUGFS=`cat /proc/mounts | grep debugfs`
|
/Linux-v5.4/tools/testing/selftests/ftrace/ |
D | ftracetest | 125 TRACING_DIR=`grep tracefs /proc/mounts | cut -f2 -d' ' | head -1` 127 DEBUGFS_DIR=`grep debugfs /proc/mounts | cut -f2 -d' ' | head -1`
|
/Linux-v5.4/include/linux/ |
D | mount.h | 104 extern void mark_mounts_for_expiry(struct list_head *mounts);
|
/Linux-v5.4/Documentation/filesystems/nfs/ |
D | nfs-rdma.txt | 67 version with support for NFS/RDMA mounts, but for various reasons we 94 or v4 mounts. To initiate a v4 mount, the binary must be called 102 In this location, mount.nfs will be invoked automatically for NFS mounts 271 To verify that the mount is using RDMA, run "cat /proc/mounts" and check
|
/Linux-v5.4/tools/testing/selftests/efivarfs/ |
D | efivarfs.sh | 25 if ! grep -q "^\S\+ $efivarfs_mount efivarfs" /proc/mounts; then
|
/Linux-v5.4/fs/ |
D | namespace.c | 891 n->mounts += n->pending_mounts; in commit_tree() 1458 ns->mounts--; in umount_tree() 1958 unsigned int mounts = 0, old, pending, sum; in count_mounts() local 1962 mounts++; in count_mounts() 1964 old = ns->mounts; in count_mounts() 1970 (mounts > (max - sum))) in count_mounts() 1973 ns->pending_mounts = pending + mounts; in count_mounts() 2341 ns->mounts++; in open_detached_copy() 2880 void mark_mounts_for_expiry(struct list_head *mounts) in mark_mounts_for_expiry() argument 2885 if (list_empty(mounts)) in mark_mounts_for_expiry() [all …]
|
D | mount.h | 18 unsigned int mounts; /* # of mounts in the namespace */ member
|
/Linux-v5.4/samples/bpf/ |
D | test_cgrp2_tc.sh | 19 cat /proc/mounts | \
|
/Linux-v5.4/Documentation/admin-guide/cifs/ |
D | usage.rst | 103 Note that when the mount.cifs utility is run suid (allowing user mounts), 109 by simply specifying ``nosuid`` among the mount options. For user mounts 123 mounts, unless umount is invoked with -i (which will avoid invoking a umount 131 Also note that the customary way of allowing user mounts and unmounts is 296 passed in on mount. For mounts to servers 310 is configured setuid for user mounts) unless the ``uid=`` 417 program to be executed. This is only meaningful for mounts 432 be executed (default for mounts when executed as root, 433 nosuid is default for user mounts). 458 non CIFS Unix Extension mounts for cases in which the default [all …]
|
/Linux-v5.4/tools/testing/selftests/bpf/ |
D | test_xdp_veth.sh | 23 BPF_FS=$(awk '$3 == "bpf" {print $2; exit}' /proc/mounts)
|
/Linux-v5.4/fs/nfs/ |
D | Kconfig | 25 To configure a system which mounts its root file system via NFS 96 This option enables swapon to work on files located on NFS mounts.
|