Searched refs:new_dentry (Results 1 – 7 of 7) sorted by relevance
/security/tomoyo/ |
D | tomoyo.c | 270 struct dentry *new_dentry) in tomoyo_path_link() argument 273 struct path path2 = { .mnt = new_dir->mnt, .dentry = new_dentry }; in tomoyo_path_link() 290 struct dentry *new_dentry) in tomoyo_path_rename() argument 293 struct path path2 = { .mnt = new_parent->mnt, .dentry = new_dentry }; in tomoyo_path_rename()
|
/security/ |
D | security.c | 554 struct dentry *new_dentry) in security_path_link() argument 558 return call_int_hook(path_link, 0, old_dentry, new_dir, new_dentry); in security_path_link() 562 const struct path *new_dir, struct dentry *new_dentry, in security_path_rename() argument 566 (d_is_positive(new_dentry) && IS_PRIVATE(d_backing_inode(new_dentry))))) in security_path_rename() 570 int err = call_int_hook(path_rename, 0, new_dir, new_dentry, in security_path_rename() 577 new_dentry); in security_path_rename() 618 struct dentry *new_dentry) in security_inode_link() argument 622 return call_int_hook(inode_link, 0, old_dentry, dir, new_dentry); in security_inode_link() 663 struct inode *new_dir, struct dentry *new_dentry, in security_inode_rename() argument 667 (d_is_positive(new_dentry) && IS_PRIVATE(d_backing_inode(new_dentry))))) in security_inode_rename() [all …]
|
/security/apparmor/ |
D | lsm.c | 326 struct dentry *new_dentry) in apparmor_path_link() argument 336 error = aa_path_link(label, old_dentry, new_dir, new_dentry); in apparmor_path_link() 343 const struct path *new_dir, struct dentry *new_dentry) in apparmor_path_rename() argument 356 .dentry = new_dentry }; in apparmor_path_rename()
|
D | file.c | 473 const struct path *new_dir, struct dentry *new_dentry) in aa_path_link() argument 475 struct path link = { .mnt = new_dir->mnt, .dentry = new_dentry }; in aa_path_link()
|
/security/apparmor/include/ |
D | file.h | 198 const struct path *new_dir, struct dentry *new_dentry);
|
/security/smack/ |
D | smack_lsm.c | 1078 struct dentry *new_dentry) in smack_inode_link() argument 1091 if (rc == 0 && d_is_positive(new_dentry)) { in smack_inode_link() 1092 isp = smk_of_inode(d_backing_inode(new_dentry)); in smack_inode_link() 1093 smk_ad_setfield_u_fs_path_dentry(&ad, new_dentry); in smack_inode_link() 1095 rc = smk_bu_inode(d_backing_inode(new_dentry), MAY_WRITE, rc); in smack_inode_link() 1184 struct dentry *new_dentry) in smack_inode_rename() argument 1197 if (rc == 0 && d_is_positive(new_dentry)) { in smack_inode_rename() 1198 isp = smk_of_inode(d_backing_inode(new_dentry)); in smack_inode_rename() 1199 smk_ad_setfield_u_fs_path_dentry(&ad, new_dentry); in smack_inode_rename() 1201 rc = smk_bu_inode(d_backing_inode(new_dentry), MAY_READWRITE, rc); in smack_inode_rename()
|
/security/selinux/ |
D | hooks.c | 2009 struct dentry *new_dentry) in may_rename() argument 2041 ad.u.dentry = new_dentry; in may_rename() 2043 if (d_is_positive(new_dentry)) in may_rename() 2048 if (d_is_positive(new_dentry)) { in may_rename() 2049 new_isec = backing_inode_security(new_dentry); in may_rename() 2050 new_is_dir = d_is_dir(new_dentry); in may_rename() 3009 …tic int selinux_inode_link(struct dentry *old_dentry, struct inode *dir, struct dentry *new_dentry) in selinux_inode_link() argument 3040 struct inode *new_inode, struct dentry *new_dentry) in selinux_inode_rename() argument 3042 return may_rename(old_inode, old_dentry, new_inode, new_dentry); in selinux_inode_rename()
|