/security/tomoyo/ |
D | tomoyo.c | 148 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_unlink() 165 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_mkdir() 181 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_rmdir() 198 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_symlink() 216 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_mknod() 255 struct path path1 = { .mnt = new_dir->mnt, .dentry = old_dentry }; in tomoyo_path_link() 256 struct path path2 = { .mnt = new_dir->mnt, .dentry = new_dentry }; in tomoyo_path_link() 276 struct path path1 = { .mnt = old_parent->mnt, .dentry = old_dentry }; in tomoyo_path_rename() 277 struct path path2 = { .mnt = new_parent->mnt, .dentry = new_dentry }; in tomoyo_path_rename() 405 static int tomoyo_sb_umount(struct vfsmount *mnt, int flags) in tomoyo_sb_umount() argument [all …]
|
D | file.c | 713 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_path_number_perm() 761 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_check_open_permission() 807 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_path_perm() 864 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_mkdev_perm() 911 .path1 = { .mnt = path1->mnt, .dentry = path1->dentry }, in tomoyo_path2_perm() 912 .path2 = { .mnt = path2->mnt, .dentry = path2->dentry } in tomoyo_path2_perm()
|
D | realpath.c | 269 if (!path->mnt || in tomoyo_realpath_from_path()
|
/security/apparmor/ |
D | mount.c | 90 if (aad(sa)->mnt.type) { in audit_cb() 92 audit_log_untrustedstring(ab, aad(sa)->mnt.type); in audit_cb() 94 if (aad(sa)->mnt.src_name) { in audit_cb() 96 audit_log_untrustedstring(ab, aad(sa)->mnt.src_name); in audit_cb() 98 if (aad(sa)->mnt.trans) { in audit_cb() 100 audit_log_untrustedstring(ab, aad(sa)->mnt.trans); in audit_cb() 102 if (aad(sa)->mnt.flags) { in audit_cb() 104 audit_mnt_flags(ab, aad(sa)->mnt.flags); in audit_cb() 107 if (aad(sa)->mnt.data) { in audit_cb() 109 audit_log_untrustedstring(ab, aad(sa)->mnt.data); in audit_cb() [all …]
|
D | path.c | 55 our_mnt(path->mnt))) { in disconnect() 97 if (path->mnt->mnt_flags & MNT_INTERNAL) { in d_namespace_path() 126 if (!our_mnt(path->mnt)) in d_namespace_path() 146 } else if (!our_mnt(path->mnt)) in d_namespace_path()
|
D | file.c | 458 struct path link = { .mnt = new_dir->mnt, .dentry = new_dentry }; in aa_path_link() 459 struct path target = { .mnt = new_dir->mnt, .dentry = old_dentry }; in aa_path_link() 631 if (file->f_path.mnt && path_mediated_fs(file->f_path.dentry)) in aa_file_perm()
|
D | lsm.c | 251 struct path path = { .mnt = dir->mnt, .dentry = dentry }; in common_perm_dir_dentry() 364 struct path old_path = { .mnt = old_dir->mnt, in apparmor_path_rename() 366 struct path new_path = { .mnt = new_dir->mnt, in apparmor_path_rename() 561 static int apparmor_sb_umount(struct vfsmount *mnt, int flags) in apparmor_sb_umount() argument 568 error = aa_umount(label, mnt, flags); in apparmor_sb_umount()
|
D | apparmorfs.c | 2529 aa_null.mnt = mntget(mount); in aa_mk_null_file() 2555 path.mnt = mntget(aafs_mnt); in policy_get_link()
|
/security/apparmor/include/ |
D | mount.h | 45 int aa_umount(struct aa_label *label, struct vfsmount *mnt, int flags);
|
D | audit.h | 152 } mnt; member
|
/security/loadpin/ |
D | loadpin.c | 144 load_root = file->f_path.mnt->mnt_sb; in loadpin_check()
|
/security/keys/ |
D | big_key.c | 187 path->mnt = NULL; in big_key_destroy()
|
/security/ |
D | commoncap.c | 684 if (!mnt_may_suid(file->f_path.mnt)) in get_file_caps() 692 if (!current_in_userns(file->f_path.mnt->mnt_sb->s_user_ns)) in get_file_caps()
|
D | security.c | 900 int security_sb_umount(struct vfsmount *mnt, int flags) in security_sb_umount() argument 902 return call_int_hook(sb_umount, 0, mnt, flags); in security_sb_umount()
|
/security/selinux/ |
D | selinuxfs.c | 2230 selinux_null.mnt = selinuxfs_mount = kern_mount(&sel_fs_type); in init_sel_fs() 2236 selinux_null.dentry = d_hash_and_lookup(selinux_null.mnt->mnt_root, in init_sel_fs()
|
D | hooks.c | 2254 int nosuid = !mnt_may_suid(bprm->file->f_path.mnt); in check_nnp_nosuid() 2760 static int selinux_umount(struct vfsmount *mnt, int flags) in selinux_umount() argument 2764 return superblock_has_perm(cred, mnt->mnt_sb, in selinux_umount()
|