Lines Matching refs:path

1358  * @path: mount point
1372 int security_sb_mount(const char *dev_name, const struct path *path,
1375 return call_int_hook(sb_mount, 0, dev_name, path, type, flags, data);
1401 int security_sb_pivotroot(const struct path *old_path,
1402 const struct path *new_path)
1459 int security_move_mount(const struct path *from_path,
1460 const struct path *to_path)
1467 * @path: file path
1469 * @obj_type: file path type
1472 * an object at @path, whose type is defined by @obj_type.
1476 int security_path_notify(const struct path *path, u64 mask,
1479 return call_int_hook(path_notify, 0, path, mask, obj_type);
1523 * The inode may still be referenced in a path walk and
1540 * @name: name of the last path component
1577 * @name: name of the last path component
1710 int security_path_mknod(const struct path *dir, struct dentry *dentry,
1729 int security_path_mkdir(const struct path *dir, struct dentry *dentry,
1747 int security_path_rmdir(const struct path *dir, struct dentry *dentry)
1763 int security_path_unlink(const struct path *dir, struct dentry *dentry)
1781 int security_path_symlink(const struct path *dir, struct dentry *dentry,
1799 int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
1819 int security_path_rename(const struct path *old_dir, struct dentry *old_dentry,
1820 const struct path *new_dir, struct dentry *new_dentry,
1835 * @path: file
1837 * Check permission before truncating the file indicated by path. Note that
1843 int security_path_truncate(const struct path *path)
1845 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
1847 return call_int_hook(path_truncate, 0, path);
1852 * @path: file
1855 * Check for permission to change a mode of the file @path. The new mode is
1861 int security_path_chmod(const struct path *path, umode_t mode)
1863 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
1865 return call_int_hook(path_chmod, 0, path, mode);
1870 * @path: file
1878 int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
1880 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
1882 return call_int_hook(path_chown, 0, path, uid, gid);
1887 * @path: directory
1893 int security_path_chroot(const struct path *path)
1895 return call_int_hook(path_chroot, 0, path);
2143 * @path: file
2149 int security_inode_getattr(const struct path *path)
2151 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
2153 return call_int_hook(inode_getattr, 0, path);
2866 * truncation permission may also be checked based on the path, using the