| /linux/init/ |
| H A D | do_mounts.c | 334 static bool __init fs_is_nodev(char *fstype) in fs_is_nodev() argument 336 struct file_system_type *fs = get_fs_type(fstype); in fs_is_nodev() 349 char *fs_names, *fstype; in mount_nodev_root() local 358 for (i = 0, fstype = fs_names; i < num_fs; in mount_nodev_root() 359 i++, fstype += strlen(fstype) + 1) { in mount_nodev_root() 360 if (!*fstype) in mount_nodev_root() 362 if (!fs_is_nodev(fstype)) in mount_nodev_root() 364 err = do_mount_root(root_device_name, fstype, root_mountflags, in mount_nodev_root()
|
| /linux/security/tomoyo/ |
| H A D | mount.c | 84 struct file_system_type *fstype = NULL; in tomoyo_mount_acl() local 125 fstype = get_fs_type(type); in tomoyo_mount_acl() 126 if (!fstype) { in tomoyo_mount_acl() 130 if (fstype->fs_flags & FS_REQUIRES_DEV) in tomoyo_mount_acl() 171 if (fstype) in tomoyo_mount_acl() 172 put_filesystem(fstype); in tomoyo_mount_acl()
|
| /linux/tools/testing/selftests/mount/ |
| H A D | unprivileged-remount-test.c | 182 bool test_unpriv_remount(const char *fstype, const char *mount_options, in test_unpriv_remount() argument 216 if (mount("testing", "/tmp", fstype, mount_flags, mount_options) != 0) { in test_unpriv_remount() 218 fstype, in test_unpriv_remount()
|
| /linux/security/apparmor/ |
| H A D | mount.c | 550 struct file_system_type *fstype; in aa_new_mount() local 552 fstype = get_fs_type(type); in aa_new_mount() 553 if (!fstype) in aa_new_mount() 555 binary = fstype->fs_flags & FS_BINARY_MOUNTDATA; in aa_new_mount() 556 requires_dev = fstype->fs_flags & FS_REQUIRES_DEV; in aa_new_mount() 557 put_filesystem(fstype); in aa_new_mount()
|
| /linux/scripts/gdb/linux/ |
| H A D | proc.py | 193 fstype = superblock['s_type']['name'].string() 200 pathname, fstype, rd, info_opts(FS_INFO, s_flags),
|
| /linux/security/selinux/include/ |
| H A D | security.h | 352 int security_genfs_sid(const char *fstype, const char *path, u16 sclass, 355 int selinux_policy_genfs_sid(struct selinux_policy *policy, const char *fstype,
|
| /linux/security/selinux/ss/ |
| H A D | policydb.c | 821 kfree(g->fstype); in policydb_destroy() 2162 rc = str_read(&newgenfs->fstype, GFP_KERNEL, fp, len); in genfs_read() 2169 if (strcmp(newgenfs->fstype, genfs->fstype) == 0) { in genfs_read() 2171 newgenfs->fstype); in genfs_read() 2174 if (strcmp(newgenfs->fstype, genfs->fstype) < 0) in genfs_read() 2221 genfs->fstype, c->u.name); in genfs_read() 2241 kfree(newgenfs->fstype); in genfs_read() 3462 len = strlen(genfs->fstype); in genfs_write() 3467 rc = put_entry(genfs->fstype, 1, len, fp); in genfs_write()
|
| H A D | services.c | 2890 const char *fstype, in __security_genfs_sid() argument 2910 cmp = strcmp(fstype, genfs->fstype); in __security_genfs_sid() 2950 int security_genfs_sid(const char *fstype, in security_genfs_sid() argument 2966 retval = __security_genfs_sid(policy, fstype, path, in security_genfs_sid() 2974 const char *fstype, in selinux_policy_genfs_sid() argument 2980 return __security_genfs_sid(policy, fstype, path, orig_sclass, sid); in selinux_policy_genfs_sid() 2995 const char *fstype = sb->s_type->name; in security_fs_use() local 3011 if (strcmp(fstype, c->u.name) == 0) in security_fs_use() 3026 rc = __security_genfs_sid(policy, fstype, "/", in security_fs_use()
|
| H A D | policydb.h | 207 char *fstype; member
|