/security/tomoyo/ |
D | mount.c | 61 &acl->dev_name)); in tomoyo_check_mount_acl() 78 const char *dev_name, in tomoyo_mount_acl() argument 136 if (!dev_name || kern_path(dev_name, LOOKUP_FOLLOW, &path)) { in tomoyo_mount_acl() 148 if (!dev_name) in tomoyo_mount_acl() 149 dev_name = "<NULL>"; in tomoyo_mount_acl() 150 requested_dev_name = tomoyo_encode(dev_name); in tomoyo_mount_acl() 191 int tomoyo_mount_permission(const char *dev_name, const struct path *path, in tomoyo_mount_permission() argument 237 error = tomoyo_mount_acl(&r, dev_name, path, type, flags); in tomoyo_mount_permission()
|
D | tomoyo.c | 397 static int tomoyo_sb_mount(const char *dev_name, const struct path *path, in tomoyo_sb_mount() argument 400 return tomoyo_mount_permission(dev_name, path, type, flags, data); in tomoyo_sb_mount()
|
D | file.c | 968 return tomoyo_same_name_union(&p1->dev_name, &p2->dev_name) && in tomoyo_same_mount_acl() 988 if (!tomoyo_parse_name_union(param, &e.dev_name) || in tomoyo_update_mount_acl() 996 tomoyo_put_name_union(&e.dev_name); in tomoyo_update_mount_acl()
|
D | common.h | 750 struct tomoyo_name_union dev_name; member 984 int tomoyo_mount_permission(const char *dev_name, const struct path *path,
|
D | gc.c | 200 tomoyo_put_name_union(&entry->dev_name); in tomoyo_del_acl()
|
D | common.c | 1561 tomoyo_print_name_union(head, &ptr->dev_name); in tomoyo_print_entry()
|
/security/apparmor/ |
D | mount.c | 421 const char *dev_name, unsigned long flags) in aa_bind_mount() argument 431 if (!dev_name || !*dev_name) in aa_bind_mount() 436 error = kern_path(dev_name, LOOKUP_FOLLOW|LOOKUP_AUTOMOUNT, &old_path); in aa_bind_mount() 501 int aa_new_mount(struct aa_label *label, const char *dev_name, in aa_new_mount() argument 526 if (!dev_name || !*dev_name) in aa_new_mount() 529 error = kern_path(dev_name, LOOKUP_FOLLOW, &tmp_path); in aa_new_mount() 543 match_mnt_path_str(profile, path, buffer, dev_name, in aa_new_mount()
|
D | lsm.c | 516 static int apparmor_sb_mount(const char *dev_name, const struct path *path, in apparmor_sb_mount() argument 533 error = aa_bind_mount(label, path, dev_name, flags); in apparmor_sb_mount() 538 error = aa_move_mount(label, path, dev_name); in apparmor_sb_mount() 540 error = aa_new_mount(label, dev_name, path, type, in apparmor_sb_mount()
|
/security/apparmor/include/ |
D | mount.h | 41 int aa_new_mount(struct aa_label *label, const char *dev_name,
|
/security/selinux/ss/ |
D | policydb.h | 192 char *dev_name; member
|
D | services.c | 2405 const char *dev_name, u8 port_num, u32 *out_sid) in security_ib_endport_sid() argument 2420 !strncmp(c->u.ibendport.dev_name, in security_ib_endport_sid() 2421 dev_name, in security_ib_endport_sid()
|
D | policydb.c | 2228 rc = str_read(&c->u.ibendport.dev_name, GFP_KERNEL, fp, len); in ocontext_read() 3195 len = strlen(c->u.ibendport.dev_name); in ocontext_write() 3201 rc = put_entry(c->u.ibendport.dev_name, 1, len, fp); in ocontext_write()
|
/security/selinux/include/ |
D | security.h | 296 const char *dev_name, u8 port_num, u32 *out_sid);
|
/security/ |
D | lsm_audit.c | 425 a->u.ibendport->dev_name, in dump_common_audit_data()
|
D | security.c | 857 int security_sb_mount(const char *dev_name, const struct path *path, in security_sb_mount() argument 860 return call_int_hook(sb_mount, 0, dev_name, path, type, flags, data); in security_sb_mount() 2207 int security_ib_endport_manage_subnet(void *sec, const char *dev_name, u8 port_num) in security_ib_endport_manage_subnet() argument 2209 return call_int_hook(ib_endport_manage_subnet, 0, sec, dev_name, port_num); in security_ib_endport_manage_subnet()
|
/security/selinux/ |
D | hooks.c | 2758 static int selinux_mount(const char *dev_name, in selinux_mount() argument 6611 static int selinux_ib_endport_manage_subnet(void *ib_sec, const char *dev_name, in selinux_ib_endport_manage_subnet() argument 6620 err = security_ib_endport_sid(&selinux_state, dev_name, port_num, in selinux_ib_endport_manage_subnet() 6627 strncpy(ibendport.dev_name, dev_name, sizeof(ibendport.dev_name)); in selinux_ib_endport_manage_subnet()
|