/openbmc/linux/include/linux/ |
H A D | security.h | 303 void security_free_mnt_opts(void **mnt_opts); 304 int security_sb_eat_lsm_opts(char *options, void **mnt_opts); 305 int security_sb_mnt_opts_compat(struct super_block *sb, void *mnt_opts); 306 int security_sb_remount(struct super_block *sb, void *mnt_opts); 315 void *mnt_opts, 506 static inline void security_free_mnt_opts(void **mnt_opts) in security_free_mnt_opts() argument 664 void **mnt_opts) in security_sb_eat_lsm_opts() argument 670 void *mnt_opts) in security_sb_remount() argument 676 void *mnt_opts) in security_sb_mnt_opts_compat() argument 717 void *mnt_opts, in security_sb_set_mnt_opts() argument
|
H A D | lsm_hook_defs.h | 65 LSM_HOOK(void, LSM_RET_VOID, sb_free_mnt_opts, void *mnt_opts) 66 LSM_HOOK(int, 0, sb_eat_lsm_opts, char *orig, void **mnt_opts) 67 LSM_HOOK(int, 0, sb_mnt_opts_compat, struct super_block *sb, void *mnt_opts) 68 LSM_HOOK(int, 0, sb_remount, struct super_block *sb, void *mnt_opts) 77 LSM_HOOK(int, 0, sb_set_mnt_opts, struct super_block *sb, void *mnt_opts,
|
/openbmc/linux/security/ |
H A D | security.c | 1256 void security_free_mnt_opts(void **mnt_opts) in security_free_mnt_opts() argument 1258 if (!*mnt_opts) in security_free_mnt_opts() 1260 call_void_hook(sb_free_mnt_opts, *mnt_opts); in security_free_mnt_opts() 1261 *mnt_opts = NULL; in security_free_mnt_opts() 1274 int security_sb_eat_lsm_opts(char *options, void **mnt_opts) in security_sb_eat_lsm_opts() argument 1276 return call_int_hook(sb_eat_lsm_opts, 0, options, mnt_opts); in security_sb_eat_lsm_opts() 1291 void *mnt_opts) in security_sb_mnt_opts_compat() argument 1293 return call_int_hook(sb_mnt_opts_compat, 0, sb, mnt_opts); in security_sb_mnt_opts_compat() 1308 void *mnt_opts) in security_sb_remount() argument 1310 return call_int_hook(sb_remount, 0, sb, mnt_opts); in security_sb_remount() [all …]
|
/openbmc/linux/fs/ |
H A D | proc_namespace.c | 66 static const struct proc_fs_opts mnt_opts[] = { in show_mnt_opts() local 78 for (fs_infop = mnt_opts; fs_infop->flag; fs_infop++) { in show_mnt_opts()
|
/openbmc/linux/security/smack/ |
H A D | smack_lsm.c | 569 static void smack_free_mnt_opts(void *mnt_opts) in smack_free_mnt_opts() argument 571 kfree(mnt_opts); in smack_free_mnt_opts() 574 static int smack_add_opt(int token, const char *s, void **mnt_opts) in smack_add_opt() argument 576 struct smack_mnt_opts *opts = *mnt_opts; in smack_add_opt() 583 *mnt_opts = opts; in smack_add_opt() 739 static int smack_sb_eat_lsm_opts(char *options, void **mnt_opts) in smack_sb_eat_lsm_opts() argument 757 rc = smack_add_opt(token, arg, mnt_opts); in smack_sb_eat_lsm_opts() 760 if (*mnt_opts) in smack_sb_eat_lsm_opts() 761 smack_free_mnt_opts(*mnt_opts); in smack_sb_eat_lsm_opts() 762 *mnt_opts = NULL; in smack_sb_eat_lsm_opts() [all …]
|
/openbmc/linux/security/selinux/ |
H A D | hooks.c | 372 static void selinux_free_mnt_opts(void *mnt_opts) in selinux_free_mnt_opts() argument 374 kfree(mnt_opts); in selinux_free_mnt_opts() 622 void *mnt_opts, in selinux_set_mnt_opts() argument 629 struct selinux_mnt_opts *opts = mnt_opts; in selinux_set_mnt_opts() 990 static int selinux_add_opt(int token, const char *s, void **mnt_opts) in selinux_add_opt() argument 992 struct selinux_mnt_opts *opts = *mnt_opts; in selinux_add_opt() 1011 *mnt_opts = opts; in selinux_add_opt() 2574 static int selinux_sb_eat_lsm_opts(char *options, void **mnt_opts) in selinux_sb_eat_lsm_opts() argument 2604 rc = selinux_add_opt(token, arg, mnt_opts); in selinux_sb_eat_lsm_opts() 2628 if (*mnt_opts) { in selinux_sb_eat_lsm_opts() [all …]
|
/openbmc/linux/security/landlock/ |
H A D | fs.c | 1085 static int hook_sb_remount(struct super_block *const sb, void *const mnt_opts) in hook_sb_remount() argument
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/rdist/rdist-6.1.5/ |
H A D | rdist-6.1.5-cleanup.patch | 1851 if (mntent->mnt_opts && hasmntopt(mntent, MNTOPT_RO))
|