| /linux/init/ |
| H A D | do_mounts.c | 327 static bool __init fs_is_nodev(char *fstype) in mount_cifs_root() 329 struct file_system_type *fs = get_fs_type(fstype); in mount_cifs_root() 342 char *fs_names, *fstype; in fs_is_nodev() 351 for (i = 0, fstype = fs_names; i < num_fs; in mount_nodev_root() 352 i++, fstype += strlen(fstype) + 1) { in mount_nodev_root() 353 if (!*fstype) in mount_nodev_root() 355 if (!fs_is_nodev(fstype)) in mount_nodev_root() 357 err = do_mount_root(root_device_name, fstype, root_mountflags, in mount_nodev_root() 334 fs_is_nodev(char * fstype) fs_is_nodev() argument 349 char *fs_names, *fstype; mount_nodev_root() local
|
| /linux/security/tomoyo/ |
| H A D | mount.c | 86 struct file_system_type *fstype = NULL; in tomoyo_mount_acl() 98 /* Get fstype. */ in tomoyo_mount_acl() 127 fstype = get_fs_type(type); in tomoyo_mount_acl() 128 if (!fstype) { in tomoyo_mount_acl() 132 if (fstype->fs_flags & FS_REQUIRES_DEV) in tomoyo_mount_acl() 173 if (fstype) in tomoyo_mount_acl() 174 put_filesystem(fstype); in tomoyo_mount_acl() 84 struct file_system_type *fstype = NULL; tomoyo_mount_acl() local
|
| /linux/tools/testing/selftests/mount/ |
| H A D | unprivileged-remount-test.c | 182 bool test_unpriv_remount(const char *fstype, const char *mount_options, in test_unpriv_remount() argument 216 if (mount("testing", "/tmp", fstype, mount_flags, mount_options) != 0) { in test_unpriv_remount() 218 fstype, in test_unpriv_remount()
|
| /linux/security/apparmor/ |
| H A D | mount.c | 550 struct file_system_type *fstype; in aa_new_mount() local 552 fstype = get_fs_type(type); in aa_new_mount() 553 if (!fstype) in aa_new_mount() 555 binary = fstype->fs_flags & FS_BINARY_MOUNTDATA; in aa_new_mount() 556 requires_dev = fstype->fs_flags & FS_REQUIRES_DEV; in aa_new_mount() 557 put_filesystem(fstype); in aa_new_mount()
|
| /linux/scripts/gdb/linux/ |
| H A D | proc.py | 193 fstype = superblock['s_type']['name'].string() 200 pathname, fstype, rd, info_opts(FS_INFO, s_flags),
|
| /linux/security/selinux/include/ |
| H A D | security.h | 358 int security_genfs_sid(const char *fstype, const char *path, u16 sclass, 361 int selinux_policy_genfs_sid(struct selinux_policy *policy, const char *fstype,
|
| /linux/security/selinux/ss/ |
| H A D | policydb.c | 820 kfree(g->fstype); in policydb_destroy() 2159 rc = str_read(&newgenfs->fstype, GFP_KERNEL, fp, len); in genfs_read() 2166 if (strcmp(newgenfs->fstype, genfs->fstype) == 0) { in genfs_read() 2168 newgenfs->fstype); in genfs_read() 2171 if (strcmp(newgenfs->fstype, genfs->fstype) < 0) in genfs_read() 2218 genfs->fstype, c->u.name); in genfs_read() 2238 kfree(newgenfs->fstype); in genfs_read() 3459 len = strlen(genfs->fstype); in genfs_write() 3464 rc = put_entry(genfs->fstype, 1, len, fp); in genfs_write()
|
| H A D | services.c | 2890 const char *fstype, in __security_genfs_sid() argument 2910 cmp = strcmp(fstype, genfs->fstype); in __security_genfs_sid() 2950 int security_genfs_sid(const char *fstype, in security_genfs_sid() argument 2966 retval = __security_genfs_sid(policy, fstype, path, in security_genfs_sid() 2974 const char *fstype, in selinux_policy_genfs_sid() argument 2980 return __security_genfs_sid(policy, fstype, path, orig_sclass, sid); in selinux_policy_genfs_sid() 2995 const char *fstype = sb->s_type->name; in security_fs_use() local 3011 if (strcmp(fstype, c->u.name) == 0) in security_fs_use() 3026 rc = __security_genfs_sid(policy, fstype, "/", in security_fs_use()
|
| H A D | policydb.h | 207 char *fstype; member
|
| /linux/fs/ |
| H A D | namespace.c | 3792 static int do_new_mount(const struct path *path, const char *fstype, in do_new_mount() argument 3801 if (!fstype) in do_new_mount() 3804 type = get_fs_type(fstype); in do_new_mount() 3809 subtype = strchr(fstype, '.'); in do_new_mount()
|