| /security/tomoyo/ |
| A D | mount.c | 61 &acl->dev_name)); in tomoyo_check_mount_acl() 78 const char *dev_name, in tomoyo_mount_acl() argument 136 if (!dev_name || kern_path(dev_name, LOOKUP_FOLLOW, &path)) { in tomoyo_mount_acl() 148 if (!dev_name) in tomoyo_mount_acl() 149 dev_name = "<NULL>"; in tomoyo_mount_acl() 150 requested_dev_name = tomoyo_encode(dev_name); in tomoyo_mount_acl() 191 int tomoyo_mount_permission(const char *dev_name, const struct path *path, in tomoyo_mount_permission() argument 237 error = tomoyo_mount_acl(&r, dev_name, path, type, flags); in tomoyo_mount_permission()
|
| A D | tomoyo.c | 412 static int tomoyo_sb_mount(const char *dev_name, const struct path *path, in tomoyo_sb_mount() argument 415 return tomoyo_mount_permission(dev_name, path, type, flags, data); in tomoyo_sb_mount()
|
| A D | file.c | 968 return tomoyo_same_name_union(&p1->dev_name, &p2->dev_name) && in tomoyo_same_mount_acl() 988 if (!tomoyo_parse_name_union(param, &e.dev_name) || in tomoyo_update_mount_acl() 996 tomoyo_put_name_union(&e.dev_name); in tomoyo_update_mount_acl()
|
| A D | common.h | 750 struct tomoyo_name_union dev_name; member 983 int tomoyo_mount_permission(const char *dev_name, const struct path *path,
|
| A D | gc.c | 200 tomoyo_put_name_union(&entry->dev_name); in tomoyo_del_acl()
|
| A D | common.c | 1553 tomoyo_print_name_union(head, &ptr->dev_name); in tomoyo_print_entry()
|
| /security/apparmor/ |
| A D | mount.c | 422 const char *dev_name, unsigned long flags) in aa_bind_mount() argument 432 if (!dev_name || !*dev_name) in aa_bind_mount() 437 error = kern_path(dev_name, LOOKUP_FOLLOW|LOOKUP_AUTOMOUNT, &old_path); in aa_bind_mount() 536 const char *dev_name, const struct path *path, in aa_new_mount() argument 560 if (!dev_name || !*dev_name) in aa_new_mount() 563 error = kern_path(dev_name, LOOKUP_FOLLOW, &tmp_path); in aa_new_mount() 588 buffer, dev_name, in aa_new_mount()
|
| A D | lsm.c | 707 static int apparmor_sb_mount(const char *dev_name, const struct path *path, in apparmor_sb_mount() argument 727 dev_name, flags); in apparmor_sb_mount() 734 dev_name); in apparmor_sb_mount() 736 error = aa_new_mount(current_cred(), label, dev_name, in apparmor_sb_mount()
|
| /security/apparmor/include/ |
| A D | mount.h | 49 struct aa_label *label, const char *dev_name,
|
| /security/selinux/ss/ |
| A D | policydb.h | 193 char *dev_name; member
|
| A D | services.c | 2550 int security_ib_endport_sid(const char *dev_name, u8 port_num, u32 *out_sid) in security_ib_endport_sid() argument 2573 !strncmp(c->u.ibendport.dev_name, in security_ib_endport_sid() 2574 dev_name, in security_ib_endport_sid()
|
| A D | policydb.c | 2416 rc = str_read(&c->u.ibendport.dev_name, in ocontext_read() 3426 len = strlen(c->u.ibendport.dev_name); in ocontext_write() 3432 rc = put_entry(c->u.ibendport.dev_name, 1, len, in ocontext_write()
|
| /security/selinux/include/ |
| A D | security.h | 310 int security_ib_endport_sid(const char *dev_name, u8 port_num, u32 *out_sid);
|
| /security/ |
| A D | lsm_audit.c | 393 a->u.ibendport->dev_name, in audit_log_lsm_data()
|
| A D | security.c | 1567 int security_sb_mount(const char *dev_name, const struct path *path, in security_sb_mount() argument 1570 return call_int_hook(sb_mount, dev_name, path, type, flags, data); in security_sb_mount() 5256 const char *dev_name, u8 port_num) in security_ib_endport_manage_subnet() argument 5258 return call_int_hook(ib_endport_manage_subnet, sec, dev_name, port_num); in security_ib_endport_manage_subnet()
|
| /security/landlock/ |
| A D | fs.c | 1422 static int hook_sb_mount(const char *const dev_name, in hook_sb_mount() argument
|
| /security/selinux/ |
| A D | hooks.c | 2766 static int selinux_mount(const char *dev_name, in selinux_mount() argument 6980 static int selinux_ib_endport_manage_subnet(void *ib_sec, const char *dev_name, in selinux_ib_endport_manage_subnet() argument 6989 err = security_ib_endport_sid(dev_name, port_num, in selinux_ib_endport_manage_subnet() 6996 ibendport.dev_name = dev_name; in selinux_ib_endport_manage_subnet()
|