Home
last modified time | relevance | path

Searched refs:mount (Results 1051 - 1075 of 1106) sorted by relevance

1...<<4142434445

/kernel/linux/linux-6.6/kernel/
H A Dauditsc.c42 #include <linux/mount.h>
H A Dfork.c63 #include <linux/mount.h>
2048 * namespace (also take care to create new mount namespaces in the
2049 * new pid namespace and mount procfs)
H A Dsys.c42 #include <linux/mount.h>
/kernel/linux/linux-6.6/drivers/md/
H A Dmd-bitmap.c28 #include <linux/mount.h>
/kernel/linux/linux-6.6/security/
H A Dsecurity.c27 #include <linux/mount.h>
1251 * security_free_mnt_opts() - Free memory associated with mount options
1252 * @mnt_opts: LSM processed mount options
1266 * security_sb_eat_lsm_opts() - Consume LSM mount options
1267 * @options: mount options
1268 * @mnt_opts: LSM processed mount options
1281 * security_sb_mnt_opts_compat() - Check if new mount options are allowed
1283 * @mnt_opts: new mount options
1285 * Determine if the new mount options in @mnt_opts are allowed given the
1298 * security_sb_remount() - Verify no incompatible mount change
[all...]
/kernel/linux/linux-6.6/net/sunrpc/
H A Dclnt.c27 #include <linux/mount.h>
/third_party/ntfs-3g/ntfsprogs/
H A Dntfsclone.c65 #include <sys/mount.h>
2155 perr_exit("Failed to check '%s' mount state", device);
2171 * is dirty (Windows wasn't shutdown properly). If everything is OK, then mount
2720 /* 'force' again mount for dirty volumes (e.g. after resize).
2721 FIXME: use mount flags to avoid potential side-effects in future */
/kernel/linux/linux-5.10/net/
H A Dsocket.c75 #include <linux/mount.h>
/kernel/linux/linux-5.10/security/smack/
H A Dsmack_lsm.c20 #include <linux/mount.h>
626 pr_warn("Smack: duplicate mount options\n"); in smack_add_opt()
689 * smack_fs_context_parse_param - Parse a single mount parameter
757 * smack_set_mnt_opts - set Smack specific mount options
759 * @mnt_opts: Smack mount options
760 * @kern_flags: mount option from kernel space or user space
761 * @set_kern_flags: where to store converted mount opts
765 * Allow filesystems with binary mount data to explicitly set Smack mount
3334 * so there's no opportunity to set the mount in smack_d_instantiate()
[all...]
/kernel/linux/linux-5.10/fs/f2fs/
H A Df2fs.h81 * For mount options
933 * Instead, as a mount option such as active_logs=x, you can use 2, 4, and 6
1223 SBI_CP_DISABLED, /* CP was disabled last mount */
1498 struct f2fs_mount_info mount_opt; /* mount options */
3017 * for recovered files during mount do not create extents in f2fs_may_extent_tree()
3327 int f2fs_build_free_nids(struct f2fs_sb_info *sbi, bool sync, bool mount);
/kernel/linux/linux-5.10/mm/
H A Dmmap.c33 #include <linux/mount.h>
H A Dshmem.c27 #include <linux/mount.h>
300 pr_warn("%s: inode number overflow on device %d, consider using inode64 mount option\n", in shmem_reserve_inode()
446 * disables huge pages for the mount;
448 * enables huge pages for the mount;
3575 * mount options form a comma-separated list, in shmem_parse_options()
3715 /* Rightly or wrongly, show huge mount option unmasked by shmem_huge */ in shmem_show_options()
4267 * @mnt: the tmpfs mount where the file will be created
/kernel/linux/linux-5.10/fs/proc/
H A Dbase.c79 #include <linux/mount.h>
723 * If 'hidpid' mount option is set force a ptrace check, in has_pid_permissions()
/kernel/linux/linux-6.6/fs/ceph/
H A Dfile.c9 #include <linux/mount.h>
/kernel/linux/linux-6.6/fs/proc/
H A Dbase.c79 #include <linux/mount.h>
727 * If 'hidpid' mount option is set force a ptrace check, in has_pid_permissions()
/kernel/linux/linux-6.6/net/
H A Dsocket.c77 #include <linux/mount.h>
/kernel/linux/linux-6.6/net/unix/
H A Daf_unix.c112 #include <linux/mount.h>
/kernel/linux/linux-6.6/security/smack/
H A Dsmack_lsm.c20 #include <linux/mount.h>
622 pr_warn("Smack: duplicate mount options\n"); in smack_add_opt()
716 * smack_fs_context_parse_param - Parse a single mount parameter
784 * smack_set_mnt_opts - set Smack specific mount options
786 * @mnt_opts: Smack mount options
787 * @kern_flags: mount option from kernel space or user space
788 * @set_kern_flags: where to store converted mount opts
792 * Allow filesystems with binary mount data to explicitly set Smack mount
1278 * @idmap: idmap of the mount
[all...]
/kernel/linux/linux-6.6/mm/
H A Dmmap.c32 #include <linux/mount.h>
/third_party/rust/crates/libc/src/unix/bsd/netbsdlike/netbsd/
H A Dmod.rs2599 pub fn mount( in mount() functions
/third_party/rust/crates/libc/src/unix/nto/
H A Dmod.rs2827 pub fn mount( in mount() functions
/third_party/rust/crates/libc/src/unix/linux_like/android/
H A Dmod.rs3264 pub fn mount( in mount() functions
/kernel/linux/linux-5.10/security/selinux/
H A Dhooks.c48 #include <linux/mount.h>
92 #include <uapi/linux/mount.h>
409 #define SEL_MOUNT_FAIL_MSG "SELinux: duplicate or incompatible mount options\n"
568 /* check if the old mount command had the same options */ in bad_option()
595 * Allow filesystems with binary mount data to explicitly set mount point
634 * Binary mount data FS will come through this function twice. Once in selinux_set_mnt_opts()
636 * Since the generic VFS calls will not contain any security mount data in selinux_set_mnt_opts()
637 * we need to skip the double mount verification. in selinux_set_mnt_opts()
640 * mount usin in selinux_set_mnt_opts()
[all...]
/kernel/linux/linux-6.6/security/selinux/
H A Dhooks.c47 #include <linux/mount.h>
91 #include <uapi/linux/mount.h>
421 #define SEL_MOUNT_FAIL_MSG "SELinux: duplicate or incompatible mount options\n"
603 /* check if the old mount command had the same options */ in bad_option()
619 * Allow filesystems with binary mount data to explicitly set mount point
663 * Binary mount data FS will come through this function twice. Once in selinux_set_mnt_opts()
665 * Since the generic VFS calls will not contain any security mount data in selinux_set_mnt_opts()
666 * we need to skip the double mount verification. in selinux_set_mnt_opts()
669 * mount usin in selinux_set_mnt_opts()
[all...]
/kernel/linux/linux-5.10/fs/btrfs/
H A Dioctl.c16 #include <linux/mount.h>
3002 * deleted can be outside of the current mount point. in btrfs_ioctl_snap_destroy()
3009 * current mount point, so we need to release the in btrfs_ioctl_snap_destroy()
3012 * <mount point>/subvol_name. in btrfs_ioctl_snap_destroy()
3024 * current mount point. Later on we need to release this in btrfs_ioctl_snap_destroy()
3082 * Regular user. Only allow this with a special mount in btrfs_ioctl_snap_destroy()

Completed in 117 milliseconds

1...<<4142434445