Home
last modified time | relevance | path

Searched refs:mnt (Results 1 – 16 of 16) sorted by relevance

/security/tomoyo/
Dtomoyo.c148 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_unlink()
165 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_mkdir()
181 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_rmdir()
198 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_symlink()
216 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_mknod()
255 struct path path1 = { .mnt = new_dir->mnt, .dentry = old_dentry }; in tomoyo_path_link()
256 struct path path2 = { .mnt = new_dir->mnt, .dentry = new_dentry }; in tomoyo_path_link()
276 struct path path1 = { .mnt = old_parent->mnt, .dentry = old_dentry }; in tomoyo_path_rename()
277 struct path path2 = { .mnt = new_parent->mnt, .dentry = new_dentry }; in tomoyo_path_rename()
405 static int tomoyo_sb_umount(struct vfsmount *mnt, int flags) in tomoyo_sb_umount() argument
[all …]
Dfile.c713 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_path_number_perm()
761 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_check_open_permission()
807 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_path_perm()
864 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_mkdev_perm()
911 .path1 = { .mnt = path1->mnt, .dentry = path1->dentry }, in tomoyo_path2_perm()
912 .path2 = { .mnt = path2->mnt, .dentry = path2->dentry } in tomoyo_path2_perm()
Drealpath.c269 if (!path->mnt || in tomoyo_realpath_from_path()
/security/apparmor/
Dmount.c90 if (aad(sa)->mnt.type) { in audit_cb()
92 audit_log_untrustedstring(ab, aad(sa)->mnt.type); in audit_cb()
94 if (aad(sa)->mnt.src_name) { in audit_cb()
96 audit_log_untrustedstring(ab, aad(sa)->mnt.src_name); in audit_cb()
98 if (aad(sa)->mnt.trans) { in audit_cb()
100 audit_log_untrustedstring(ab, aad(sa)->mnt.trans); in audit_cb()
102 if (aad(sa)->mnt.flags) { in audit_cb()
104 audit_mnt_flags(ab, aad(sa)->mnt.flags); in audit_cb()
107 if (aad(sa)->mnt.data) { in audit_cb()
109 audit_log_untrustedstring(ab, aad(sa)->mnt.data); in audit_cb()
[all …]
Dpath.c55 our_mnt(path->mnt))) { in disconnect()
97 if (path->mnt->mnt_flags & MNT_INTERNAL) { in d_namespace_path()
126 if (!our_mnt(path->mnt)) in d_namespace_path()
146 } else if (!our_mnt(path->mnt)) in d_namespace_path()
Dfile.c458 struct path link = { .mnt = new_dir->mnt, .dentry = new_dentry }; in aa_path_link()
459 struct path target = { .mnt = new_dir->mnt, .dentry = old_dentry }; in aa_path_link()
631 if (file->f_path.mnt && path_mediated_fs(file->f_path.dentry)) in aa_file_perm()
Dlsm.c251 struct path path = { .mnt = dir->mnt, .dentry = dentry }; in common_perm_dir_dentry()
364 struct path old_path = { .mnt = old_dir->mnt, in apparmor_path_rename()
366 struct path new_path = { .mnt = new_dir->mnt, in apparmor_path_rename()
561 static int apparmor_sb_umount(struct vfsmount *mnt, int flags) in apparmor_sb_umount() argument
568 error = aa_umount(label, mnt, flags); in apparmor_sb_umount()
Dapparmorfs.c2529 aa_null.mnt = mntget(mount); in aa_mk_null_file()
2555 path.mnt = mntget(aafs_mnt); in policy_get_link()
/security/apparmor/include/
Dmount.h45 int aa_umount(struct aa_label *label, struct vfsmount *mnt, int flags);
Daudit.h152 } mnt; member
/security/loadpin/
Dloadpin.c144 load_root = file->f_path.mnt->mnt_sb; in loadpin_check()
/security/keys/
Dbig_key.c187 path->mnt = NULL; in big_key_destroy()
/security/
Dcommoncap.c684 if (!mnt_may_suid(file->f_path.mnt)) in get_file_caps()
692 if (!current_in_userns(file->f_path.mnt->mnt_sb->s_user_ns)) in get_file_caps()
Dsecurity.c900 int security_sb_umount(struct vfsmount *mnt, int flags) in security_sb_umount() argument
902 return call_int_hook(sb_umount, 0, mnt, flags); in security_sb_umount()
/security/selinux/
Dselinuxfs.c2230 selinux_null.mnt = selinuxfs_mount = kern_mount(&sel_fs_type); in init_sel_fs()
2236 selinux_null.dentry = d_hash_and_lookup(selinux_null.mnt->mnt_root, in init_sel_fs()
Dhooks.c2254 int nosuid = !mnt_may_suid(bprm->file->f_path.mnt); in check_nnp_nosuid()
2760 static int selinux_umount(struct vfsmount *mnt, int flags) in selinux_umount() argument
2764 return superblock_has_perm(cred, mnt->mnt_sb, in selinux_umount()