Lines Matching defs:root

132 	safe if a reference to vnode is held (note that for the root mount
253 /*! \brief Guards io_context::root.
255 Must be held when setting or getting the io_context::root field.
257 setting the field is inc_vnode_ref_count() on io_context::root.
259 static mutex sIOContextRootLock = MUTEX_INITIALIZER("io_context::root lock");
1929 replace_vnode_if_disconnected(mount, vnodeToDisconnect, context->root,
1957 /*! \brief Gets the root node of the current IO context.
1970 struct vnode* root = context->root;
1971 if (root != NULL)
1972 inc_vnode_ref_count(root);
1976 if (root != NULL)
1977 return root;
1981 "have a root\n", team_get_current_team_id());
2031 // This path points to the root of the file system
2171 // Also prevent breaking the root of the IO context.
2173 if (vnode.Get() == ioContext->root) {
2242 // Check if we start from the root directory or the current
2244 // Cut off all leading slashes if it's the root directory
2255 vnode.SetTo(ioContext->root);
2326 // figure out if we need to start at root or at cwd
2590 // If the node is the context's root, bail out. Otherwise resolve mount
2592 if (vnode == ioContext->root)
2608 // context's root. Now we've hit the global root.
2648 // the root dir will result in an empty path: fix it
2924 // root
2955 // Make sure the IO context root is not bypassed.
2956 if (parent == ioContext->root) {
3210 B_PRINTF_POINTER_WIDTH, "address", B_PRINTF_POINTER_WIDTH, "root",
3373 kprintf(" root vnode:\t%p\n", context->root);
3629 if (context->root)
3630 put_vnode(context->root);
3988 // user is root
3989 // root has always read/write permission, but at least one of the
4493 in which case the node is created without an entry in the root FS -- it
4535 // No path. Create the node in the root FS.
4853 // insert a directory separator if this is not the file system root
4971 context->root = parentContext->root;
4972 if (context->root)
4973 inc_vnode_ref_count(context->root);
5005 context->root = sRoot;
5008 if (context->root)
5009 inc_vnode_ref_count(context->root);
7586 // the root node is supposed to be owned by the file system - it must
7591 panic("fs_mount: file system does not own its root node!\n");
7597 // set up the links between the root vnode and the vnode it covers
7617 get_current_io_context(true)->root = sRoot;
7677 panic("fs_unmount: find_mount() failed on root vnode @%p of mount\n",
7979 info->root = mount->root_vnode->id;
8941 // only root can do this
10013 // only root is allowed to chroot()
10038 // set the new root
10041 struct vnode* oldRoot = context->root;
10042 context->root = vnode.Detach();