/security/tomoyo/ |
D | tomoyo.c | 258 static int tomoyo_path_link(struct dentry *old_dentry, const struct path *new_dir, in tomoyo_path_link() argument 261 struct path path1 = { .mnt = new_dir->mnt, .dentry = old_dentry }; in tomoyo_path_link() 278 struct dentry *old_dentry, in tomoyo_path_rename() argument 282 struct path path1 = { .mnt = old_parent->mnt, .dentry = old_dentry }; in tomoyo_path_rename()
|
/security/ |
D | security.c | 1056 int security_path_link(struct dentry *old_dentry, const struct path *new_dir, in security_path_link() argument 1059 if (unlikely(IS_PRIVATE(d_backing_inode(old_dentry)))) in security_path_link() 1061 return call_int_hook(path_link, 0, old_dentry, new_dir, new_dentry); in security_path_link() 1064 int security_path_rename(const struct path *old_dir, struct dentry *old_dentry, in security_path_rename() argument 1068 if (unlikely(IS_PRIVATE(d_backing_inode(old_dentry)) || in security_path_rename() 1074 old_dir, old_dentry); in security_path_rename() 1079 return call_int_hook(path_rename, 0, old_dir, old_dentry, new_dir, in security_path_rename() 1120 int security_inode_link(struct dentry *old_dentry, struct inode *dir, in security_inode_link() argument 1123 if (unlikely(IS_PRIVATE(d_backing_inode(old_dentry)))) in security_inode_link() 1125 return call_int_hook(inode_link, 0, old_dentry, dir, new_dentry); in security_inode_link() [all …]
|
/security/apparmor/ |
D | file.c | 464 int aa_path_link(struct aa_label *label, struct dentry *old_dentry, in aa_path_link() argument 468 struct path target = { .mnt = new_dir->mnt, .dentry = old_dentry }; in aa_path_link() 470 d_backing_inode(old_dentry)->i_uid, in aa_path_link() 471 d_backing_inode(old_dentry)->i_mode in aa_path_link()
|
D | lsm.c | 326 static int apparmor_path_link(struct dentry *old_dentry, const struct path *new_dir, in apparmor_path_link() argument 332 if (!path_mediated_fs(old_dentry)) in apparmor_path_link() 337 error = aa_path_link(label, old_dentry, new_dir, new_dentry); in apparmor_path_link() 343 static int apparmor_path_rename(const struct path *old_dir, struct dentry *old_dentry, in apparmor_path_rename() argument 349 if (!path_mediated_fs(old_dentry)) in apparmor_path_rename() 355 .dentry = old_dentry }; in apparmor_path_rename() 358 struct path_cond cond = { d_backing_inode(old_dentry)->i_uid, in apparmor_path_rename() 359 d_backing_inode(old_dentry)->i_mode in apparmor_path_rename()
|
/security/apparmor/include/ |
D | file.h | 196 int aa_path_link(struct aa_label *label, struct dentry *old_dentry,
|
/security/smack/ |
D | smack_lsm.c | 1033 static int smack_inode_link(struct dentry *old_dentry, struct inode *dir, in smack_inode_link() argument 1041 smk_ad_setfield_u_fs_path_dentry(&ad, old_dentry); in smack_inode_link() 1043 isp = smk_of_inode(d_backing_inode(old_dentry)); in smack_inode_link() 1045 rc = smk_bu_inode(d_backing_inode(old_dentry), MAY_WRITE, rc); in smack_inode_link() 1138 struct dentry *old_dentry, in smack_inode_rename() argument 1147 smk_ad_setfield_u_fs_path_dentry(&ad, old_dentry); in smack_inode_rename() 1149 isp = smk_of_inode(d_backing_inode(old_dentry)); in smack_inode_rename() 1151 rc = smk_bu_inode(d_backing_inode(old_dentry), MAY_READWRITE, rc); in smack_inode_rename()
|
/security/selinux/ |
D | hooks.c | 1907 struct dentry *old_dentry, in may_rename() argument 1919 old_isec = backing_inode_security(old_dentry); in may_rename() 1920 old_is_dir = d_is_dir(old_dentry); in may_rename() 1925 ad.u.dentry = old_dentry; in may_rename() 2955 static int selinux_inode_link(struct dentry *old_dentry, struct inode *dir, struct dentry *new_dent… in selinux_inode_link() argument 2957 return may_link(dir, old_dentry, MAY_LINK); in selinux_inode_link() 2985 static int selinux_inode_rename(struct inode *old_inode, struct dentry *old_dentry, in selinux_inode_rename() argument 2988 return may_rename(old_inode, old_dentry, new_inode, new_dentry); in selinux_inode_rename()
|