• Home
  • Raw
  • Download

Lines Matching refs:inode

164 	 * The inode blob gets an rcu_head in addition to
304 init_debug("inode blob size = %d\n", blob_sizes.lbs_inode);
542 * lsm_inode_alloc - allocate a composite inode blob
543 * @inode: the inode that needs a blob
545 * Allocate the inode blob for all the modules
549 int lsm_inode_alloc(struct inode *inode)
552 inode->i_security = NULL;
556 inode->i_security = kmem_cache_zalloc(lsm_inode_cache, GFP_NOFS);
557 if (inode->i_security == NULL)
913 int security_inode_alloc(struct inode *inode)
915 int rc = lsm_inode_alloc(inode);
919 rc = call_int_hook(inode_alloc_security, 0, inode);
921 security_inode_free(inode);
928 * The rcu head is at the start of the inode blob
933 void security_inode_free(struct inode *inode)
935 integrity_inode_free(inode);
936 call_void_hook(inode_free_security, inode);
938 * The inode may still be referenced in a path walk and
943 * leave the current inode->i_security pointer intact.
944 * The inode will be freed after the RCU grace period too.
946 if (inode->i_security)
947 call_rcu((struct rcu_head *)inode->i_security,
969 int security_inode_init_security(struct inode *inode, struct inode *dir,
977 if (unlikely(IS_PRIVATE(inode)))
981 return call_int_hook(inode_init_security, -EOPNOTSUPP, inode,
985 ret = call_int_hook(inode_init_security, -EOPNOTSUPP, inode, dir, qstr,
993 ret = evm_inode_init_security(inode, lsm_xattr, evm_xattr);
996 ret = initxattrs(inode, new_xattrs, fs_data);
1004 int security_old_inode_init_security(struct inode *inode, struct inode *dir,
1008 if (unlikely(IS_PRIVATE(inode)))
1010 return call_int_hook(inode_init_security, -EOPNOTSUPP, inode, dir,
1112 int security_inode_create(struct inode *dir, struct dentry *dentry, umode_t mode)
1120 int security_inode_link(struct dentry *old_dentry, struct inode *dir,
1128 int security_inode_unlink(struct inode *dir, struct dentry *dentry)
1135 int security_inode_symlink(struct inode *dir, struct dentry *dentry,
1143 int security_inode_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode)
1151 int security_inode_rmdir(struct inode *dir, struct dentry *dentry)
1158 int security_inode_mknod(struct inode *dir, struct dentry *dentry, umode_t mode, dev_t dev)
1165 int security_inode_rename(struct inode *old_dir, struct dentry *old_dentry,
1166 struct inode *new_dir, struct dentry *new_dentry,
1191 int security_inode_follow_link(struct dentry *dentry, struct inode *inode,
1194 if (unlikely(IS_PRIVATE(inode)))
1196 return call_int_hook(inode_follow_link, 0, dentry, inode, rcu);
1199 int security_inode_permission(struct inode *inode, int mask)
1201 if (unlikely(IS_PRIVATE(inode)))
1203 return call_int_hook(inode_permission, 0, inode, mask);
1304 int security_inode_getsecurity(struct inode *inode, const char *name, void **buffer, bool alloc)
1309 if (unlikely(IS_PRIVATE(inode)))
1315 rc = hp->hook.inode_getsecurity(inode, name, buffer, alloc);
1322 int security_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags)
1327 if (unlikely(IS_PRIVATE(inode)))
1333 rc = hp->hook.inode_setsecurity(inode, name, value, size,
1341 int security_inode_listsecurity(struct inode *inode, char *buffer, size_t buffer_size)
1343 if (unlikely(IS_PRIVATE(inode)))
1345 return call_int_hook(inode_listsecurity, 0, inode, buffer, buffer_size);
1349 void security_inode_getsecid(struct inode *inode, u32 *secid)
1351 call_void_hook(inode_getsecid, inode, secid);
1583 int security_kernel_create_files_as(struct cred *new, struct inode *inode)
1585 return call_int_hook(kernel_create_files_as, 0, new, inode);
1726 void security_task_to_inode(struct task_struct *p, struct inode *inode)
1728 call_void_hook(task_to_inode, p, inode);
1871 void security_d_instantiate(struct dentry *dentry, struct inode *inode)
1873 if (unlikely(inode && IS_PRIVATE(inode)))
1875 call_void_hook(d_instantiate, dentry, inode);
1936 void security_inode_invalidate_secctx(struct inode *inode)
1938 call_void_hook(inode_invalidate_secctx, inode);
1942 int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen)
1944 return call_int_hook(inode_notifysecctx, 0, inode, ctx, ctxlen);
1954 int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen)
1956 return call_int_hook(inode_getsecctx, -EOPNOTSUPP, inode, ctx, ctxlen);