| /security/tomoyo/ |
| A D | tomoyo.c | 160 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_unlink() 177 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_mkdir() 193 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_rmdir() 210 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_symlink() 228 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_mknod() 267 struct path path1 = { .mnt = new_dir->mnt, .dentry = old_dentry }; in tomoyo_path_link() 268 struct path path2 = { .mnt = new_dir->mnt, .dentry = new_dentry }; in tomoyo_path_link() 290 struct path path1 = { .mnt = old_parent->mnt, .dentry = old_dentry }; in tomoyo_path_rename() 291 struct path path2 = { .mnt = new_parent->mnt, .dentry = new_dentry }; in tomoyo_path_rename() 426 static int tomoyo_sb_umount(struct vfsmount *mnt, int flags) in tomoyo_sb_umount() argument [all …]
|
| A D | file.c | 713 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_path_number_perm() 761 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_check_open_permission() 807 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_path_perm() 864 .path1 = { .mnt = path->mnt, .dentry = path->dentry }, in tomoyo_mkdev_perm() 911 .path1 = { .mnt = path1->mnt, .dentry = path1->dentry }, in tomoyo_path2_perm() 912 .path2 = { .mnt = path2->mnt, .dentry = path2->dentry } in tomoyo_path2_perm()
|
| /security/apparmor/ |
| A D | mount.c | 93 if (ad->mnt.type) { in audit_cb() 97 if (ad->mnt.src_name) { in audit_cb() 101 if (ad->mnt.trans) { in audit_cb() 105 if (ad->mnt.flags) { in audit_cb() 110 if (ad->mnt.data) { in audit_cb() 176 ad.mnt.type = type; in audit_mount() 177 ad.mnt.trans = trans; in audit_mount() 178 ad.mnt.flags = flags; in audit_mount() 180 ad.mnt.data = data; in audit_mount() 641 struct path path = { .mnt = mnt, .dentry = mnt->mnt_root }; in aa_umount() [all …]
|
| A D | path.c | 55 our_mnt(path->mnt))) { in disconnect() 97 if (path->mnt->mnt_flags & MNT_INTERNAL) { in d_namespace_path() 126 if (!our_mnt(path->mnt)) in d_namespace_path() 146 } else if (!our_mnt(path->mnt)) in d_namespace_path()
|
| A D | file.c | 429 struct path link = { .mnt = new_dir->mnt, .dentry = new_dentry }; in aa_path_link() 430 struct path target = { .mnt = new_dir->mnt, .dentry = old_dentry }; in aa_path_link() 432 vfsuid_t vfsuid = i_uid_into_vfsuid(mnt_idmap(target.mnt), inode); in aa_path_link()
|
| A D | lsm.c | 244 vfsuid_t vfsuid = i_uid_into_vfsuid(mnt_idmap(path->mnt), in common_perm_cond() 271 struct path path = { .mnt = dir->mnt, .dentry = dentry }; in common_perm_dir_dentry() 295 vfsuid = i_uid_into_vfsuid(mnt_idmap(dir->mnt), inode); in common_perm_rm() 395 struct mnt_idmap *idmap = mnt_idmap(old_dir->mnt); in apparmor_path_rename() 397 struct path old_path = { .mnt = old_dir->mnt, in apparmor_path_rename() 399 struct path new_path = { .mnt = new_dir->mnt, in apparmor_path_rename() 760 static int apparmor_sb_umount(struct vfsmount *mnt, int flags) in apparmor_sb_umount() argument 768 error = aa_umount(current_cred(), label, mnt, flags); in apparmor_sb_umount()
|
| A D | af_unix.c | 49 vfsuid_t vfsuid = i_uid_into_vfsuid(mnt_idmap(path->mnt), inode); in unix_fs_perm()
|
| A D | apparmorfs.c | 2589 aa_null.mnt = mntget(mount); in aa_mk_null_file() 2615 path.mnt = mntget(aafs_mnt); in policy_get_link()
|
| /security/apparmor/include/ |
| A D | mount.h | 54 struct aa_label *label, struct vfsmount *mnt, int flags);
|
| A D | audit.h | 161 } mnt; member
|
| /security/landlock/ |
| A D | fs.c | 900 if (walker_path.dentry == walker_path.mnt->mnt_root) { in is_access_to_paths_allowed() 918 if (walker_path.mnt->mnt_flags & MNT_INTERNAL) { in is_access_to_paths_allowed() 1189 mnt_dir.mnt = new_dir->mnt; in current_check_refer_path() 1190 mnt_dir.dentry = new_dir->mnt->mnt_root; in current_check_refer_path() 1457 static int hook_sb_umount(struct vfsmount *const mnt, const int flags) in hook_sb_umount() argument 1467 log_fs_change_topology_dentry(subject, handle_layer, mnt->mnt_root); in hook_sb_umount()
|
| A D | syscalls.c | 304 (fd_file(f)->f_path.mnt->mnt_flags & MNT_INTERNAL) || in get_path_from_fd()
|
| /security/ipe/ |
| A D | hooks.c | 194 ipe_sb(current->fs->root.mnt->mnt_sb)->initramfs = true; in ipe_unpack_initramfs()
|
| A D | eval.c | 26 #define FILE_SUPERBLOCK(f) ((f)->f_path.mnt->mnt_sb)
|
| /security/keys/ |
| A D | big_key.c | 184 payload->path.mnt = NULL; in big_key_destroy()
|
| /security/loadpin/ |
| A D | loadpin.c | 154 load_root = file->f_path.mnt->mnt_sb; in loadpin_check()
|
| /security/selinux/ |
| A D | selinuxfs.c | 2152 selinux_null.mnt = kern_mount(&sel_fs_type); in init_sel_fs() 2153 if (IS_ERR(selinux_null.mnt)) { in init_sel_fs() 2155 err = PTR_ERR(selinux_null.mnt); in init_sel_fs() 2156 selinux_null.mnt = NULL; in init_sel_fs() 2161 selinux_null.mnt->mnt_root); in init_sel_fs()
|
| A D | hooks.c | 2254 int nosuid = !mnt_may_suid(bprm->file->f_path.mnt); in check_nnp_nosuid() 2789 static int selinux_umount(struct vfsmount *mnt, int flags) in selinux_umount() argument 2793 return superblock_has_perm(cred, mnt->mnt_sb, in selinux_umount()
|
| /security/ |
| A D | commoncap.c | 764 if (!mnt_may_suid(file->f_path.mnt)) in get_file_caps() 772 if (!current_in_userns(file->f_path.mnt->mnt_sb->s_user_ns)) in get_file_caps()
|
| A D | security.c | 1582 int security_sb_umount(struct vfsmount *mnt, int flags) in security_sb_umount() argument 1584 return call_int_hook(sb_umount, mnt, flags); in security_sb_umount()
|