/openbmc/linux/Documentation/filesystems/ |
H A D | sharedsubtree.rst | 10 3) Setting mount states 36 a. shared mount 37 b. slave mount 38 c. private mount 39 d. unbindable mount 42 2a) A shared mount can be replicated to as many mountpoints and all the 47 Let's say /mnt has a mount that is shared:: 49 mount --make-shared /mnt 51 Note: mount(8) command now supports the --make-shared flag, 57 # mount --bind /mnt /tmp [all …]
|
H A D | autofs-mount-control.rst | 17 are things such as setting an autofs mount catatonic, setting the 20 mount itself which prevents us being able to use open(2) to obtain a 25 needs to walk back up the mount tree to construct a path, such as 28 from the mount tree. 33 because autofs direct mounts and the implementation of "on demand mount 34 and expire" of nested mount trees have the file system mounted directly 35 on top of the mount trigger directory dentry. 39 a direct mount in disguise) and indirect. 62 operation. So we see a mount of shark:/autofs/export1 on /test/g1, for 65 The way that direct mounts are handled is by making an autofs mount on [all …]
|
H A D | autofs.rst | 46 symbolic links and mount traps. Mount traps are directories with 51 mount traps are created with `mkdir`. The determination of whether a 52 directory should be a mount trap is based on a master map. This master 53 map is consulted by autofs to determine which directories are mount 54 points. Mount points can be *direct*/*indirect*/*offset*. 57 If neither the *direct* or *offset* mount options are given (so the 58 mount is considered to be *indirect*), then the root directory is 59 always a regular directory, otherwise it is a mount trap when it is 62 directory is a mount trap only if the filesystem is mounted *direct* 65 Directories created in the root directory are mount traps only if the [all …]
|
H A D | fuse.rst | 18 Non-privileged mount (or user mount): 31 Mount owner: 41 module (fuse.ko), a userspace library (libfuse.*) and a mount utility 55 The filesystem type given to mount(2) can be one of the following: 58 This is the usual way to mount a FUSE filesystem. The first 59 argument of the mount system call may contain an arbitrary string, 64 mount system call is interpreted as the name of the device. 66 Mount options 78 The numeric user id of the mount owner. 81 The numeric group id of the mount owner. [all …]
|
H A D | tmpfs.rst | 17 mount. tmpfs also supports THP. 21 fly using a remount ('mount -o remount ...') of the filesystem. A tmpfs 45 1) There is always a kernel internal mount which you will not see at 49 This mount does not depend on CONFIG_TMPFS. If CONFIG_TMPFS is not 59 Remember to create the directory that you intend to mount tmpfs on 62 This mount is _not_ needed for SYSV shared memory. The internal 63 mount is used for that. (In the 2.3 kernel versions it was 64 necessary to mount the predecessor of tmpfs (shm fs) to use SYSV 67 3) Some people (including me) find it very convenient to mount it 75 tmpfs has three mount options for sizing: [all …]
|
H A D | gfs2-uevents.rst | 7 During the lifetime of a GFS2 mount, a number of uevents are generated. 17 The ADD event occurs at mount time. It will always be the first 18 uevent generated by the newly created filesystem. If the mount 23 and RDONLY=[0|1] that specify the spectator status (a read-only mount 30 The ONLINE uevent is generated after a successful mount or remount. It 40 successful mount of the filesystem by the first node (FIRSTMOUNT=Done). 42 nodes in the cluster to mount the filesystem. 49 for every journal recovered, whether it is during the initial mount 58 uevent for a successful mount or remount. 71 The REMOVE uevent is generated at the end of an unsuccessful mount [all …]
|
H A D | idmappings.rst | 382 - mount's idmapping (``mnt_idmap(vfsmnt)``) 384 Let's see some examples with caller/filesystem idmapping but without mount 386 revisit/reconsider these examples, this time using mount idmappings, to see how 469 userspace id. We could only do this if we were to mount the whole filesystem 606 change in ownership is tied to the lifetime of the filesystem mount, i.e. the 608 filesystem and mount it again in another user namespace. This is usually 625 localized way. The ownership changes are restricted to a specific mount and the 626 ownership changes are tied to the lifetime of the mount. All other users and 631 completely under an idmapped mount to get the same effect. This has the 638 Filesystem types vs idmapped mount types [all …]
|
H A D | overlayfs.rst | 35 make the overlay mount more compliant with filesystem scanners and 48 The "xino" feature can be enabled with the "-o xino=on" overlay mount option. 51 the lifetime of the filesystem. The "-o xino=auto" overlay mount option 120 At mount time, the two directories given as mount options "lowerdir" and 123 mount -t overlay overlay -olowerdir=/lower,upperdir=/upper,\ 228 Mount options: 290 2) task creating the overlay mount MUST NOT gain additional privileges 316 mount -t overlay overlay -olowerdir=/lower,upperdir=/upper,... /merged 321 mount --bind /upper /merged 333 mount -t overlay overlay -olowerdir=/lower1:/lower2:/lower3 /merged [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/udev/udev-extraconf/ |
H A D | mount.sh | 5 # Attempt to mount any added block devices and umount any removed devices 12 # systemd as init uses systemd-mount to mount block devices 13 MOUNT="/usr/bin/systemd-mount" 16 if [ -x $MOUNT ] && [ -x $UMOUNT ]; 18 logger "Using systemd-mount to finish mount" 20 logger "Linux init is using systemd, so please install systemd-mount to finish mount" 24 MOUNT="/bin/mount" 30 for line in `grep -h -v ^# /etc/udev/mount.ignorelist /etc/udev/mount.ignorelist.d/*` 34 logger "udev/mount.sh" "[$DEVNAME] is marked to ignore" 53 … /run/systemd/transient/$(echo $MOUNT_BASE | cut -d '/' -f 2- | sed 's#/#-#g')-*$name.mount ]; then [all …]
|
/openbmc/linux/fs/ |
H A D | pnode.c | 9 #include <linux/mount.h> 12 #include <uapi/linux/mount.h> 16 /* return the next shared peer mount of @p */ 17 static inline struct mount *next_peer(struct mount *p) in next_peer() 19 return list_entry(p->mnt_share.next, struct mount, mnt_share); in next_peer() 22 static inline struct mount *first_slave(struct mount *p) in first_slave() 24 return list_entry(p->mnt_slave_list.next, struct mount, mnt_slave); in first_slave() 27 static inline struct mount *last_slave(struct mount *p) in last_slave() 29 return list_entry(p->mnt_slave_list.prev, struct mount, mnt_slave); in last_slave() 32 static inline struct mount *next_slave(struct mount *p) in next_slave() [all …]
|
H A D | pnode.h | 11 #include "mount.h" 33 static inline void set_mnt_shared(struct mount *mnt) in set_mnt_shared() 39 void change_mnt_propagation(struct mount *, int); 40 int propagate_mnt(struct mount *, struct mountpoint *, struct mount *, 43 int propagate_mount_busy(struct mount *, int); 44 void propagate_mount_unlock(struct mount *); 45 void mnt_release_group_id(struct mount *); 46 int get_dominating_id(struct mount *mnt, const struct path *root); 47 int mnt_get_count(struct mount *mnt); 48 void mnt_set_mountpoint(struct mount *, struct mountpoint *, [all …]
|
H A D | namespace.c | 31 #include <uapi/linux/mount.h> 39 /* Maximum number of mounts in a mount namespace */ 127 static int mnt_alloc_id(struct mount *mnt) in mnt_alloc_id() 137 static void mnt_free_id(struct mount *mnt) in mnt_free_id() 145 static int mnt_alloc_group_id(struct mount *mnt) in mnt_alloc_group_id() 158 void mnt_release_group_id(struct mount *mnt) in mnt_release_group_id() 167 static inline void mnt_add_count(struct mount *mnt, int n) in mnt_add_count() 181 int mnt_get_count(struct mount *mnt) in mnt_get_count() 197 static struct mount *alloc_vfsmnt(const char *name) in alloc_vfsmnt() 199 struct mount *mnt = kmem_cache_zalloc(mnt_cache, GFP_KERNEL); in alloc_vfsmnt() [all …]
|
H A D | mount.h | 2 #include <linux/mount.h> 10 struct mount * root; 39 struct mount { struct 41 struct mount *mnt_parent; argument 56 struct list_head mnt_instance; /* mount instance on sb->s_mounts */ argument 63 struct mount *mnt_master; /* slave is on master->mnt_slave_list */ argument 75 int mnt_id; /* mount identifier */ argument 84 static inline struct mount *real_mount(struct vfsmount *mnt) in real_mount() argument 86 return container_of(mnt, struct mount, mnt); in real_mount() 89 static inline int mnt_has_parent(struct mount *mnt) in mnt_has_parent() [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/initrdscripts/files/ |
H A D | init-live.sh | 7 MOUNT="/bin/mount" 32 mount -t proc proc /proc 33 mount -t sysfs sysfs /sys 34 mount -t devtmpfs none /dev 89 mount -n --move "/run/media/${ROOT_DISK}" ${ROOT_MOUNT}/media/realroot 91 # Move the mount points of some filesystems over to 95 # in the mount points to actual ASCII chars 98 mount -n --move "$dir" "${ROOT_MOUNT}/media/${dir##*/}" 100 mount -n --move /proc ${ROOT_MOUNT}/proc 101 mount -n --move /sys ${ROOT_MOUNT}/sys [all …]
|
/openbmc/linux/Documentation/admin-guide/cifs/ |
H A D | usage.rst | 54 If you do not have the utility mount.cifs (in the Samba 4.x source tree and on 55 the CIFS VFS web site) copy it to the same directory in which mount helpers 57 required, mount.cifs is recommended. Most distros include a ``cifs-utils`` 62 domain to the proper network user. The mount.cifs mount helper can be 78 the new default. To use old dialects (e.g. to mount Windows XP) use "vers=1.0" 79 on mount (or vers=2.0 for Windows Vista). Note that the CIFS (vers=1.0) is 83 There are additional mount options that may be helpful for SMB3 to get 91 To permit users to mount and unmount over directories they own is possible 92 with the cifs vfs. A way to enable such mounting is to mark the mount.cifs 93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to [all …]
|
/openbmc/linux/security/tomoyo/ |
H A D | mount.c | 3 * security/tomoyo/mount.c 9 #include <uapi/linux/mount.h> 12 /* String table for special mount operations. */ 24 * tomoyo_audit_mount_log - Audit mount log. 32 return tomoyo_supervisor(r, "file mount %s %s %s 0x%lX\n", in tomoyo_audit_mount_log() 33 r->param.mount.dev->name, in tomoyo_audit_mount_log() 34 r->param.mount.dir->name, in tomoyo_audit_mount_log() 35 r->param.mount.type->name, in tomoyo_audit_mount_log() 36 r->param.mount.flags); in tomoyo_audit_mount_log() 53 return tomoyo_compare_number_union(r->param.mount.flags, in tomoyo_check_mount_acl() [all …]
|
/openbmc/qemu/qga/ |
H A D | commands-bsd.c | 21 #include <sys/mount.h> 34 FsMount *mount; in build_fs_mount_list() local 54 mount = g_new0(FsMount, 1); in build_fs_mount_list() 56 mount->dirname = g_strdup(mntp->f_mntonname); in build_fs_mount_list() 57 mount->devtype = g_strdup(mntp->f_fstypename); in build_fs_mount_list() 58 mount->devmajor = major(mount->dev); in build_fs_mount_list() 59 mount->devminor = minor(mount->dev); in build_fs_mount_list() 60 mount->fsid = mntp->f_fsid; in build_fs_mount_list() 61 mount->dev = statbuf.st_dev; in build_fs_mount_list() 63 QTAILQ_INSERT_TAIL(mounts, mount, next); in build_fs_mount_list() [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/initrdscripts/initramfs-framework/ |
H A D | overlayroot | 7 # Simple initramfs module intended to mount a read-write (RW) 17 # It relies on the initramfs-module-rootfs to mount the original 21 # Mount options of the RW device can be tweaked with 'overlayrootfstype=' 25 # since it relies on it to mount the filesystem at initramfs startup 62 # Tweak the mount option and fs_passno for rootfs in fstab 67 # Tweak the "mount -o remount,rw /" command in busybox-inittab inittab 69 sed -i 's|/bin/mount -o remount,rw /|/bin/mount -o remount,ro /|' ${OLDROOT}/etc/inittab 83 …exit_gracefully "overlayrootrwdev= kernel parameter doesn't exist and its required to mount the ov… 88 # Mount RW device 89 if mount -n -t ${bootparam_overlayrootfstype:-ext4} -o ${bootparam_overlayrootfsflags:-defaults} ${… [all …]
|
/openbmc/linux/Documentation/admin-guide/nfs/ |
H A D | nfs-rdma.rst | 55 An NFS/RDMA mount point can be obtained by using the mount.nfs command in 59 mount.nfs you are using, type: 63 $ /sbin/mount.nfs -V 73 these to create an NFS/RDMA enabled mount command), the installation 84 After building the nfs-utils package, there will be a mount.nfs binary in 85 the utils/mount directory. This binary can be used to initiate NFS v2, v3, 86 or v4 mounts. To initiate a v4 mount, the binary must be called 87 mount.nfs4. The standard technique is to create a symlink called 88 mount.nfs4 to mount.nfs. 90 This mount.nfs binary should be installed at /sbin/mount.nfs as follows: [all …]
|
/openbmc/openbmc/poky/meta/classes-recipe/ |
H A D | overlayfs.bbclass | 7 # Class for generation of overlayfs mount units 18 # Set a mount point for a partition overlayfs is going to use as upper layer 26 # mount unit (data.mount in this case) for this mount point installed on the 29 # If the mount point is handled somewhere else, e.g. custom boot or preinit 31 # mount-configured to the related OVERLAYFS_QA_SKIP flag: 33 # OVERLAYFS_QA_SKIP[data] = "mount-configured" 40 # To support several mount points you can use a different variable flag. Assume we 42 # survive a reboot. Then we could have a mnt-overlay.mount unit for a tmpfs file system: 59 OVERLAYFS_MOUNT_UNIT_TEMPLATE ??= "${COREBASE}/meta/files/overlayfs-unit.mount.in" 107 bb.note("No mount points defined for %s flag, skipping" % (mountPoint)) [all …]
|
/openbmc/openbmc/meta-openembedded/meta-filesystems/dynamic-layers/meta-python/recipes-support/gpiod-sysfs-proxy/ |
H A D | gpiod-sysfs-proxy_0.1.2.bb | 12 file://run-gpio-sys.mount \ 13 file://sys-class.mount \ 25 PACKAGECONFIG[sys-class-mount] = "" 27 export MOUNTPOINT="${@bb.utils.contains('PACKAGECONFIG', 'sys-class-mount', '\/sys\/class\/gpio', '… 34 if ${@bb.utils.contains('PACKAGECONFIG', 'sys-class-mount', 'true', 'false', d)}; then 37 … install -m 0644 ${UNPACKDIR}/run-gpio-sys.mount ${D}${systemd_system_unitdir}/run-gpio-sys.mount 38 … install -m 0644 ${UNPACKDIR}/sys-class.mount ${D}${systemd_system_unitdir}/sys-class.mount 40 … ln -sf ../run-gpio-sys.mount ${D}${systemd_system_unitdir}/sysinit.target.wants/run-gpio-sys.mount 41 … ln -sf ../sys-class.mount ${D}${systemd_system_unitdir}/sysinit.target.wants/sys-class.mount
|
/openbmc/openbmc/poky/meta/recipes-core/initscripts/initscripts-1.0/ |
H A D | sysfs.sh | 12 # Short-Description: Mount kernel virtual file systems. 13 # Description: Mount initial set of virtual filesystems the kernel 18 mount -t proc proc /proc 22 mount -t sysfs sysfs /sys 26 mount -t debugfs debugfs /sys/kernel/debug 30 mount -t configfs configfs /sys/kernel/config 34 mount -t efivarfs efivarfs /sys/firmware/efi/efivars 38 mount -n -t devtmpfs devtmpfs /dev
|
/openbmc/linux/fs/autofs/ |
H A D | dev-ioctl.c | 21 * an ioctl file descriptor on an autofs mount that may be covered by 22 * another mount. This situation arises when starting automount(8) 24 * mounts (used for autofs lazy mount/umount of nested mount trees), 182 /* Find the topmost mount satisfying test() */ 224 * Open a file descriptor on the autofs mount point corresponding 257 /* Open a file descriptor on an autofs mount point */ 297 * Send "ready" status for an existing wait (either a mount or an expire 311 * Send "fail" status for an existing wait (either a mount or an expire 329 * Normally this is set at mount using an option but if we 330 * are reconnecting to a busy mount then we need to use this [all …]
|
/openbmc/qemu/python/qemu/utils/ |
H A D | qom_fuse.py | 10 usage: qom-fuse [-h] [--socket SOCKET] <mount> 12 Mount a QOM tree as a FUSE filesystem 15 <mount> Mount point 66 help = 'Mount a QOM tree as a FUSE filesystem' 73 'mount', 74 metavar='<mount>', 76 help="Mount point", 81 self.mount = args.mount 86 print(f"Mounting QOMFS to '{self.mount}'", file=sys.stderr) 87 self.fuse = FUSE(self, self.mount, foreground=True)
|
/openbmc/openbmc/poky/meta/recipes-core/busybox/busybox/ |
H A D | fail_on_no_media.patch | 10 even when no media exists. The util-linux mount command bails when no 19 util-linux/mount.c | 8 ++++++++ 22 diff --git a/util-linux/mount.c b/util-linux/mount.c 24 --- a/util-linux/mount.c 25 +++ b/util-linux/mount.c 38 // Should we retry read-only mount?
|