/security/tomoyo/ |
D | tomoyo.c | 269 static int tomoyo_path_link(struct dentry *old_dentry, const struct path *new_dir, in tomoyo_path_link() argument 272 struct path path1 = { .mnt = new_dir->mnt, .dentry = old_dentry }; in tomoyo_path_link() 288 struct dentry *old_dentry, in tomoyo_path_rename() argument 292 struct path path1 = { .mnt = old_parent->mnt, .dentry = old_dentry }; in tomoyo_path_rename()
|
/security/ |
D | security.c | 553 int security_path_link(struct dentry *old_dentry, const struct path *new_dir, in security_path_link() argument 556 if (unlikely(IS_PRIVATE(d_backing_inode(old_dentry)))) in security_path_link() 558 return call_int_hook(path_link, 0, old_dentry, new_dir, new_dentry); in security_path_link() 561 int security_path_rename(const struct path *old_dir, struct dentry *old_dentry, in security_path_rename() argument 565 if (unlikely(IS_PRIVATE(d_backing_inode(old_dentry)) || in security_path_rename() 571 old_dir, old_dentry); in security_path_rename() 576 return call_int_hook(path_rename, 0, old_dir, old_dentry, new_dir, in security_path_rename() 617 int security_inode_link(struct dentry *old_dentry, struct inode *dir, in security_inode_link() argument 620 if (unlikely(IS_PRIVATE(d_backing_inode(old_dentry)))) in security_inode_link() 622 return call_int_hook(inode_link, 0, old_dentry, dir, new_dentry); in security_inode_link() [all …]
|
/security/apparmor/ |
D | lsm.c | 325 static int apparmor_path_link(struct dentry *old_dentry, const struct path *new_dir, in apparmor_path_link() argument 331 if (!path_mediated_fs(old_dentry)) in apparmor_path_link() 336 error = aa_path_link(label, old_dentry, new_dir, new_dentry); in apparmor_path_link() 342 static int apparmor_path_rename(const struct path *old_dir, struct dentry *old_dentry, in apparmor_path_rename() argument 348 if (!path_mediated_fs(old_dentry)) in apparmor_path_rename() 354 .dentry = old_dentry }; in apparmor_path_rename() 357 struct path_cond cond = { d_backing_inode(old_dentry)->i_uid, in apparmor_path_rename() 358 d_backing_inode(old_dentry)->i_mode in apparmor_path_rename()
|
D | file.c | 472 int aa_path_link(struct aa_label *label, struct dentry *old_dentry, in aa_path_link() argument 476 struct path target = { .mnt = new_dir->mnt, .dentry = old_dentry }; in aa_path_link() 478 d_backing_inode(old_dentry)->i_uid, in aa_path_link() 479 d_backing_inode(old_dentry)->i_mode in aa_path_link()
|
/security/apparmor/include/ |
D | file.h | 197 int aa_path_link(struct aa_label *label, struct dentry *old_dentry,
|
/security/smack/ |
D | smack_lsm.c | 1077 static int smack_inode_link(struct dentry *old_dentry, struct inode *dir, in smack_inode_link() argument 1085 smk_ad_setfield_u_fs_path_dentry(&ad, old_dentry); in smack_inode_link() 1087 isp = smk_of_inode(d_backing_inode(old_dentry)); in smack_inode_link() 1089 rc = smk_bu_inode(d_backing_inode(old_dentry), MAY_WRITE, rc); in smack_inode_link() 1182 struct dentry *old_dentry, in smack_inode_rename() argument 1191 smk_ad_setfield_u_fs_path_dentry(&ad, old_dentry); in smack_inode_rename() 1193 isp = smk_of_inode(d_backing_inode(old_dentry)); in smack_inode_rename() 1195 rc = smk_bu_inode(d_backing_inode(old_dentry), MAY_READWRITE, rc); in smack_inode_rename()
|
/security/selinux/ |
D | hooks.c | 2007 struct dentry *old_dentry, in may_rename() argument 2019 old_isec = backing_inode_security(old_dentry); in may_rename() 2020 old_is_dir = d_is_dir(old_dentry); in may_rename() 2025 ad.u.dentry = old_dentry; in may_rename() 3009 static int selinux_inode_link(struct dentry *old_dentry, struct inode *dir, struct dentry *new_dent… in selinux_inode_link() argument 3011 return may_link(dir, old_dentry, MAY_LINK); in selinux_inode_link() 3039 static int selinux_inode_rename(struct inode *old_inode, struct dentry *old_dentry, in selinux_inode_rename() argument 3042 return may_rename(old_inode, old_dentry, new_inode, new_dentry); in selinux_inode_rename()
|