Lines Matching refs:mounts
39 /* Maximum number of mounts in a mount namespace */
676 * where shadow mounts are created. For example, during mount
703 * following mounts:
753 * mounts in the current mount namespace and test to see if the dentry
757 * need to identify all mounts that may be in the current mount
972 * list of child mounts
1041 n->mounts += n->pending_mounts;
1157 * unprivileged mounts with submounts.
1381 * mounts using a given dentry in a different namespace. This function
1504 * This is called to check if a tree of mounts has any
1505 * open files, pwds, chroots or sub mounts that are
1537 * open files, pwds, chroots or sub mounts. If the
1538 * mount has sub mounts this will return busy
1539 * regardless of whether the sub mounts are busy.
1597 /* Leaving mounts connected is only valid for lazy umounts */
1605 /* Because the reference counting rules change when mounts are
1606 * unmounted and connected, umounted mounts may not be
1607 * connected to mounted mounts.
1636 /* Gather the mounts to umount */
1642 /* Hide the mounts from mnt_mounts */
1647 /* Add propogated mounts to the tmp_list */
1659 ns->mounts--;
1804 * __detach_mounts - lazily unmount all mounts on the specified dentry
1808 * detach_mounts allows lazily unmounting those mounts instead of
2207 unsigned int mounts = 0;
2210 if (ns->mounts >= max)
2212 max -= ns->mounts;
2218 mounts++;
2220 if (mounts > max)
2223 ns->pending_mounts += mounts;
2253 * A bind operation clones the source mount and mounts the clone on the
2256 * (++) the cloned mount is propagated to all the mounts in the propagation
2262 * (+++) the mount is propagated to all the mounts in the propagation tree
2283 * all the mounts in the propagation tree of the destination mount.
2286 * all the mounts belonging to the destination mount's propagation tree.
2314 * Preallocate a mountpoint in case the new mounts need to be
2315 * mounted beneath mounts on the same mountpoint.
2321 /* Is there space to add these mounts to the mount namespace? */
2669 ns->mounts++;
2953 /* We should be allowed to modify mount namespaces of both mounts */
2978 /* Setting sharing groups is only allowed on private mounts */
3040 * grabbed @namespace_sem to avoid creating pointless shadow mounts.
3065 /* Avoid creating shadow mounts during mount propagation. */
3173 * Don't move a mount tree containing unbindable mounts to a destination
3441 void mark_mounts_for_expiry(struct list_head *mounts)
3446 if (list_empty(mounts))
3458 list_for_each_entry_safe(mnt, next, mounts, mnt_expire) {
3806 new_ns->mounts++;
3850 ns->mounts++;
4031 ns->mounts = 1;
4311 /* The underlying filesystem doesn't support idmapped mounts yet. */
4374 * mounts and needs to take care to include the first mount.
4479 * unconditionally check for detached mounts.
4546 * are aware of idmapped mounts as a convenient shortcut. A user
4674 /* Don't bother walking through the mounts if this is a nop. */
4710 ns->mounts = 1;
4877 * locked child mounts that cover anything except for
4882 /* Only worry about locked mounts */
4928 * Foreign mounts (accessed via fchdir or through /proc