Lines Matching defs:mounts

40 /* Maximum number of mounts in a mount namespace */
683 * where shadow mounts are created. For example, during mount
710 * following mounts:
745 * mounts in the current mount namespace and test to see if the dentry
749 * need to identify all mounts that may be in the current mount
760 rbtree_postorder_for_each_entry_safe(mnt, n, &ns->mounts, mnt_node) {
960 * list of child mounts
1018 struct rb_node **link = &ns->mounts.rb_node;
1031 rb_insert_color(&mnt->mnt_node, &ns->mounts);
1170 * unprivileged mounts with submounts.
1394 * mounts using a given dentry in a different namespace. This function
1433 struct rb_node *node = ns->mounts.rb_node;
1501 * This is called to check if a tree of mounts has any
1502 * open files, pwds, chroots or sub mounts that are
1534 * open files, pwds, chroots or sub mounts. If the
1535 * mount has sub mounts this will return busy
1536 * regardless of whether the sub mounts are busy.
1594 /* Leaving mounts connected is only valid for lazy umounts */
1602 /* Because the reference counting rules change when mounts are
1603 * unmounted and connected, umounted mounts may not be
1604 * connected to mounted mounts.
1633 /* Gather the mounts to umount */
1642 /* Hide the mounts from mnt_mounts */
1647 /* Add propogated mounts to the tmp_list */
1806 * __detach_mounts - lazily unmount all mounts on the specified dentry
1810 * detach_mounts allows lazily unmounting those mounts instead of
2209 unsigned int mounts = 0;
2220 mounts++;
2222 if (mounts > max)
2225 ns->pending_mounts += mounts;
2255 * A bind operation clones the source mount and mounts the clone on the
2258 * (++) the cloned mount is propagated to all the mounts in the propagation
2264 * (+++) the mount is propagated to all the mounts in the propagation tree
2285 * all the mounts in the propagation tree of the destination mount.
2288 * all the mounts belonging to the destination mount's propagation tree.
2316 * Preallocate a mountpoint in case the new mounts need to be
2317 * mounted beneath mounts on the same mountpoint.
2323 /* Is there space to add these mounts to the mount namespace? */
2958 /* We should be allowed to modify mount namespaces of both mounts */
2983 /* Setting sharing groups is only allowed on private mounts */
3046 * grabbed @namespace_sem to avoid creating pointless shadow mounts.
3071 /* Avoid creating shadow mounts during mount propagation. */
3179 * Don't move a mount tree containing unbindable mounts to a destination
3447 void mark_mounts_for_expiry(struct list_head *mounts)
3452 if (list_empty(mounts))
3464 list_for_each_entry_safe(mnt, next, mounts, mnt_expire) {
3752 new_ns->mounts = RB_ROOT;
4313 /* The underlying filesystem doesn't support idmapped mounts yet. */
4376 * mounts and needs to take care to include the first mount.
4481 * unconditionally check for detached mounts.
4548 * are aware of idmapped mounts as a convenient shortcut. A user
4676 /* Don't bother walking through the mounts if this is a nop. */
4913 * mounts to show users.
5059 * mounts to show users.
5121 first = node_to_mount(rb_first(&ns->mounts));
5281 rbtree_postorder_for_each_entry_safe(mnt, n, &ns->mounts, mnt_node) {
5312 * locked child mounts that cover anything except for
5317 /* Only worry about locked mounts */
5362 * Foreign mounts (accessed via fchdir or through /proc