<dec f='src/src/sys/sys/mount.h' l='494' type='int usermount_common_policy(struct mount * , u_long )'/>
<def f='src/src/sys/kern/vfs_init.c' l='342' ll='359' type='int usermount_common_policy(struct mount * mp, u_long flags)'/>
<doc f='src/src/sys/kern/vfs_init.c' l='330'>/*
 * Common routine to check if an unprivileged mount is allowed.
 *
 * We export just this part (i.e., without the access control) so that if a
 * secmodel wants to implement finer grained user mounts it can do so without
 * copying too much code. More elaborate policies (i.e., specific users allowed
 * to also create devices and/or introduce set-id binaries, or export
 * file-systems) will require a different implementation.
 *
 * This routine is intended to be called from listener context, and as such
 * does not take credentials as an argument.
 */</doc>
<use f='src/src/sys/secmodel/extensions/secmodel_extensions.c' l='356' u='c' c='secmodel_extensions_system_cb'/>
<use f='src/src/sys/secmodel/extensions/secmodel_extensions.c' l='379' u='c' c='secmodel_extensions_system_cb'/>
