Lines Matching refs:path
1553 * @path: mount point
1567 int security_sb_mount(const char *dev_name, const struct path *path,
1570 return call_int_hook(sb_mount, dev_name, path, type, flags, data);
1596 int security_sb_pivotroot(const struct path *old_path,
1597 const struct path *new_path)
1661 int security_move_mount(const struct path *from_path,
1662 const struct path *to_path)
1669 * @path: file path
1671 * @obj_type: file path type
1674 * an object at @path, whose type is defined by @obj_type.
1678 int security_path_notify(const struct path *path, u64 mask,
1681 return call_int_hook(path_notify, path, mask, obj_type);
1723 * security_inode_free(), @inode may still be referenced in a VFS path walk
1742 * @name: name of the last path component
1766 * @name: name of the last path component
1894 int security_path_mknod(const struct path *dir, struct dentry *dentry,
1927 int security_path_mkdir(const struct path *dir, struct dentry *dentry,
1945 int security_path_rmdir(const struct path *dir, struct dentry *dentry)
1961 int security_path_unlink(const struct path *dir, struct dentry *dentry)
1979 int security_path_symlink(const struct path *dir, struct dentry *dentry,
1997 int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
2017 int security_path_rename(const struct path *old_dir, struct dentry *old_dentry,
2018 const struct path *new_dir, struct dentry *new_dentry,
2033 * @path: file
2035 * Check permission before truncating the file indicated by path. Note that
2041 int security_path_truncate(const struct path *path)
2043 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
2045 return call_int_hook(path_truncate, path);
2050 * @path: file
2053 * Check for permission to change a mode of the file @path. The new mode is
2059 int security_path_chmod(const struct path *path, umode_t mode)
2061 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
2063 return call_int_hook(path_chmod, path, mode);
2068 * @path: file
2076 int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
2078 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
2080 return call_int_hook(path_chown, path, uid, gid);
2085 * @path: directory
2091 int security_path_chroot(const struct path *path)
2093 return call_int_hook(path_chroot, path);
2367 * @path: file
2373 int security_inode_getattr(const struct path *path)
2375 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
2377 return call_int_hook(inode_getattr, path);
3169 * truncation permission may also be checked based on the path, using the
5743 * @path: path pointing to BPF FS mount point from which BPF token is created
5751 const struct path *path)
5753 return call_int_hook(bpf_token_create, token, attr, path);