/linux-master/fs/ |
H A D | pnode.h | 11 #include "mount.h" 33 static inline void set_mnt_shared(struct mount *mnt) 39 void change_mnt_propagation(struct mount *, int); 40 int propagate_mnt(struct mount *, struct mountpoint *, struct mount *, 43 int propagate_mount_busy(struct mount *, int); 44 void propagate_mount_unlock(struct mount *); 45 void mnt_release_group_id(struct mount *); 46 int get_dominating_id(struct mount *mnt, const struct path *root); 47 int mnt_get_count(struct mount *mn [all...] |
H A D | pnode.c | 9 #include <linux/mount.h> 12 #include <uapi/linux/mount.h> 16 /* return the next shared peer mount of @p */ 17 static inline struct mount *next_peer(struct mount *p) 19 return list_entry(p->mnt_share.next, struct mount, mnt_share); 22 static inline struct mount *first_slave(struct mount *p) 24 return list_entry(p->mnt_slave_list.next, struct mount, mnt_slave); 27 static inline struct mount *last_slav [all...] |
H A D | mount.h | 2 #include <linux/mount.h> 10 struct mount * root; 33 struct mount { struct 35 struct mount *mnt_parent; 50 struct list_head mnt_instance; /* mount instance on sb->s_mounts */ 60 struct mount *mnt_master; /* slave is on master->mnt_slave_list */ 72 int mnt_id; /* mount identifier, reused */ 73 u64 mnt_id_unique; /* mount ID unique until reboot */ 82 static inline struct mount *real_mount(struct vfsmount *mnt) 84 return container_of(mnt, struct mount, mn [all...] |
H A D | namespace.c | 31 #include <uapi/linux/mount.h> 40 /* Maximum number of mounts in a mount namespace */ 72 /* Don't allow confusion with old 32bit mount ID */ 131 static int mnt_alloc_id(struct mount *mnt) 142 static void mnt_free_id(struct mount *mnt) 150 static int mnt_alloc_group_id(struct mount *mnt) 163 void mnt_release_group_id(struct mount *mnt) 172 static inline void mnt_add_count(struct mount *mnt, int n) 186 int mnt_get_count(struct mount *mnt) 202 static struct mount *alloc_vfsmn [all...] |
/linux-master/fs/kernfs/ |
H A D | Makefile | 6 obj-y := mount.o inode.o dir.o file.o symlink.o
|
/linux-master/fs/sysfs/ |
H A D | Makefile | 6 obj-y := file.o dir.o symlink.o mount.o group.o
|
/linux-master/fs/configfs/ |
H A D | Makefile | 8 configfs-objs := inode.o file.o dir.o symlink.o mount.o item.o
|
/linux-master/tools/perf/trace/beauty/ |
H A D | mount_flags.sh | 8 grep -E $regex ${header_dir}/mount.h | grep -E -v '(MSK|VERBOSE|MGC_VAL)\>' | \ 12 grep -E $regex ${header_dir}/mount.h | \
|
H A D | fsconfig.sh | 10 linux_mount=${linux_header_dir}/mount.h
|
H A D | fsmount.sh | 10 linux_mount=${linux_header_dir}/mount.h
|
H A D | fspick.sh | 10 linux_mount=${linux_header_dir}/mount.h
|
H A D | move_mount_flags.sh | 10 linux_mount=${linux_header_dir}/mount.h
|
H A D | mount_flags.c | 12 #include <sys/mount.h> 26 * Pre-0.97 versions of mount() didn't have a flags word. When the
|
H A D | fsmount.c | 10 #include <uapi/linux/mount.h>
|
/linux-master/tools/testing/selftests/tmpfs/ |
H A D | bug-link-o-tmpfile.c | 23 #include <sys/mount.h> 38 if (mount(NULL, "/", NULL, MS_PRIVATE|MS_REC, NULL) == -1) { 39 fprintf(stderr, "error: mount '/', errno %d\n", errno); 44 if (mount(NULL, "/tmp", "tmpfs", 0, "nr_inodes=3") == -1) { 45 fprintf(stderr, "error: mount tmpfs, errno %d\n", errno);
|
/linux-master/tools/testing/selftests/proc/ |
H A D | proc-multiple-procfs.c | 19 #include <sys/mount.h> 33 assert(!mount("proc", procdir1, "proc", 0, "hidepid=1")); 34 assert(!mount("proc", procdir2, "proc", 0, "hidepid=2"));
|
H A D | proc-subset-pid.c | 17 * Test that "mount -t proc -o subset=pid" hides everything but pids, 27 #include <sys/mount.h> 48 if (mount(NULL, "/", NULL, MS_PRIVATE|MS_REC, NULL) == -1) { 51 if (mount(NULL, "/proc", "proc", 0, "subset=pid") == -1) {
|
/linux-master/include/linux/mtd/ |
H A D | super.h | 15 #include <linux/mount.h>
|
/linux-master/security/tomoyo/ |
H A D | mount.c | 3 * security/tomoyo/mount.c 9 #include <uapi/linux/mount.h> 12 /* String table for special mount operations. */ 24 * tomoyo_audit_mount_log - Audit mount log. 32 return tomoyo_supervisor(r, "file mount %s %s %s 0x%lX\n", 33 r->param.mount.dev->name, 34 r->param.mount.dir->name, 35 r->param.mount.type->name, 36 r->param.mount.flags); 53 return tomoyo_compare_number_union(r->param.mount [all...] |
/linux-master/samples/bpf/ |
H A D | run_cookie_uid_helper_example.sh | 14 mount -t bpf bpf ${mnt_dir}
|
/linux-master/tools/testing/selftests/exec/ |
H A D | recursion-depth.c | 24 #include <sys/mount.h> 43 if (mount(NULL, "/", NULL, MS_PRIVATE | MS_REC, NULL) == -1) 44 ksft_exit_fail_msg("error: mount '/', errno %d\n", errno); 47 if (mount(NULL, "/tmp", "ramfs", 0, NULL) == -1) 48 ksft_exit_fail_msg("error: mount ramfs, errno %d\n", errno);
|
/linux-master/tools/testing/selftests/firmware/ |
H A D | fw_namespace.c | 2 /* Test triggering of loading of firmware from different mount 3 * namespaces. Expect firmware to be always loaded from the mount 14 #include <sys/mount.h> 68 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) 101 if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL) == -1) 105 if (mount("test", "/lib/firmware", "tmpfs", MS_RDONLY, NULL) == -1) 124 if (mount("test", "/lib/firmware", "tmpfs", 0, NULL) == -1) 134 /* Positive case: firmware in PID1 mount namespace */ 139 /* Negative case: firmware in child mount namespace, expected to fail */
|
/linux-master/tools/testing/selftests/move_mount_set_group/ |
H A D | move_mount_set_group_test.c | 9 #include <sys/mount.h> 118 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0)) 198 if (mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, 202 if (mount(NULL, "/tmp", NULL, MS_PRIVATE, 0)) 211 if (mount("testing", SET_GROUP_FROM, "tmpfs", MS_NOATIME | MS_NODEV, 215 if (mount(SET_GROUP_FROM, SET_GROUP_TO, NULL, MS_BIND, NULL)) 218 if (mount(NULL, SET_GROUP_FROM, NULL, MS_SHARED, 0)) 246 ASSERT_EQ(mount("testing", "/tmp", "tmpfs", MS_NOATIME | MS_NODEV, 251 ASSERT_EQ(mount("testing", SET_GROUP_A, "tmpfs", MS_NOATIME | MS_NODEV, 319 ret = mount(NUL [all...] |
/linux-master/samples/binderfs/ |
H A D | binderfs_example.c | 11 #include <sys/mount.h> 25 fprintf(stderr, "%s - Failed to unshare mount namespace\n", 30 ret = mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0); 32 fprintf(stderr, "%s - Failed to mount / as private\n", 44 ret = mount(NULL, "/dev/binderfs", "binder", 0, 0); 46 fprintf(stderr, "%s - Failed to mount binderfs\n", 80 /* Cleanup happens when the mount namespace dies. */
|
/linux-master/drivers/gpu/drm/i915/gem/ |
H A D | i915_gemfs.c | 8 #include <linux/mount.h> 22 * mount flags that better match our usecase.
|