Lines Matching defs:dentry

1162  * security_quota_on() - Check if QUOTAON is allowed for a dentry

1163 * @dentry: dentry
1165 * Check whether QUOTAON is allowed for @dentry.
1169 int security_quota_on(struct dentry *dentry)
1171 return call_int_hook(quota_on, dentry);
1341 * @reference: dentry reference for submount/remount
1538 * @dentry: superblock handle
1541 * mountpoint. @dentry is a handle on the superblock for the filesystem.
1545 int security_sb_statfs(struct dentry *dentry)
1547 return call_int_hook(sb_statfs, dentry);
1739 * security_dentry_init_security() - Perform dentry initialization
1740 * @dentry: the dentry to initialize
1746 * Compute a context for a dentry as the inode is not yet available since NFSv4
1752 int security_dentry_init_security(struct dentry *dentry, int mode,
1757 return call_int_hook(dentry_init_security, dentry, mode, name,
1763 * security_dentry_create_files_as() - Perform dentry initialization
1764 * @dentry: the dentry to initialize
1770 * Compute a context for a dentry as the inode is not yet available and set
1777 int security_dentry_create_files_as(struct dentry *dentry, int mode,
1781 return call_int_hook(dentry_create_files_as, dentry, mode,
1885 * @dentry: new file
1894 int security_path_mknod(const struct path *dir, struct dentry *dentry,
1897 if (unlikely(IS_PRIVATE(d_backing_inode(dir->dentry))))
1899 return call_int_hook(path_mknod, dir, dentry, mode, dev);
1906 * @dentry: new file
1910 void security_path_post_mknod(struct mnt_idmap *idmap, struct dentry *dentry)
1912 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
1914 call_void_hook(path_post_mknod, idmap, dentry);
1920 * @dentry: new directory
1927 int security_path_mkdir(const struct path *dir, struct dentry *dentry,
1930 if (unlikely(IS_PRIVATE(d_backing_inode(dir->dentry))))
1932 return call_int_hook(path_mkdir, dir, dentry, mode);
1939 * @dentry: directory to remove
1945 int security_path_rmdir(const struct path *dir, struct dentry *dentry)
1947 if (unlikely(IS_PRIVATE(d_backing_inode(dir->dentry))))
1949 return call_int_hook(path_rmdir, dir, dentry);
1955 * @dentry: file
1961 int security_path_unlink(const struct path *dir, struct dentry *dentry)
1963 if (unlikely(IS_PRIVATE(d_backing_inode(dir->dentry))))
1965 return call_int_hook(path_unlink, dir, dentry);
1972 * @dentry: symbolic link
1979 int security_path_symlink(const struct path *dir, struct dentry *dentry,
1982 if (unlikely(IS_PRIVATE(d_backing_inode(dir->dentry))))
1984 return call_int_hook(path_symlink, dir, dentry, old_name);
1997 int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
1998 struct dentry *new_dentry)
2017 int security_path_rename(const struct path *old_dir, struct dentry *old_dentry,
2018 const struct path *new_dir, struct dentry *new_dentry,
2043 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
2061 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
2078 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
2100 * @dentry: the file being created
2107 int security_inode_create(struct inode *dir, struct dentry *dentry,
2112 return call_int_hook(inode_create, dir, dentry, mode);
2141 int security_inode_link(struct dentry *old_dentry, struct inode *dir,
2142 struct dentry *new_dentry)
2152 * @dentry: file
2158 int security_inode_unlink(struct inode *dir, struct dentry *dentry)
2160 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2162 return call_int_hook(inode_unlink, dir, dentry);
2168 * @dentry: symbolic link
2175 int security_inode_symlink(struct inode *dir, struct dentry *dentry,
2180 return call_int_hook(inode_symlink, dir, dentry, old_name);
2186 * @dentry: new directory
2194 int security_inode_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode)
2198 return call_int_hook(inode_mkdir, dir, dentry, mode);
2205 * @dentry: directory to be removed
2211 int security_inode_rmdir(struct inode *dir, struct dentry *dentry)
2213 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2215 return call_int_hook(inode_rmdir, dir, dentry);
2221 * @dentry: new file
2232 int security_inode_mknod(struct inode *dir, struct dentry *dentry,
2237 return call_int_hook(inode_mknod, dir, dentry, mode, dev);
2252 int security_inode_rename(struct inode *old_dir, struct dentry *old_dentry,
2253 struct inode *new_dir, struct dentry *new_dentry,
2274 * @dentry: link
2280 int security_inode_readlink(struct dentry *dentry)
2282 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2284 return call_int_hook(inode_readlink, dentry);
2289 * @dentry: link dentry
2298 int security_inode_follow_link(struct dentry *dentry, struct inode *inode,
2303 return call_int_hook(inode_follow_link, dentry, inode, rcu);
2330 * @dentry: file
2341 struct dentry *dentry, struct iattr *attr)
2343 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2345 return call_int_hook(inode_setattr, idmap, dentry, attr);
2352 * @dentry: file
2357 void security_inode_post_setattr(struct mnt_idmap *idmap, struct dentry *dentry,
2360 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2362 call_void_hook(inode_post_setattr, idmap, dentry, ia_valid);
2375 if (unlikely(IS_PRIVATE(d_backing_inode(path->dentry))))
2383 * @dentry: file
2390 * attributes (xattrs) on @dentry. It is important to note that we have some
2407 struct dentry *dentry, const char *name,
2412 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2417 rc = cap_inode_setxattr(dentry, name, value, size, flags);
2422 return call_int_hook(inode_setxattr, idmap, dentry, name, value, size,
2429 * @dentry: file
2439 struct dentry *dentry, const char *acl_name,
2442 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2444 return call_int_hook(inode_set_acl, idmap, dentry, acl_name, kacl);
2449 * @dentry: file
2453 * Update inode security data after successfully setting posix acls on @dentry.
2456 void security_inode_post_set_acl(struct dentry *dentry, const char *acl_name,
2459 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2461 call_void_hook(inode_post_set_acl, dentry, acl_name, kacl);
2467 * @dentry: file
2476 struct dentry *dentry, const char *acl_name)
2478 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2480 return call_int_hook(inode_get_acl, idmap, dentry, acl_name);
2486 * @dentry: file
2495 struct dentry *dentry, const char *acl_name)
2497 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2499 return call_int_hook(inode_remove_acl, idmap, dentry, acl_name);
2505 * @dentry: file
2509 * @dentry in @idmap. The posix acls are identified by @acl_name.
2512 struct dentry *dentry, const char *acl_name)
2514 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2516 call_void_hook(inode_post_remove_acl, idmap, dentry, acl_name);
2521 * @dentry: file
2529 void security_inode_post_setxattr(struct dentry *dentry, const char *name,
2532 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2534 call_void_hook(inode_post_setxattr, dentry, name, value, size, flags);
2539 * @dentry: file
2543 * @name for @dentry.
2547 int security_inode_getxattr(struct dentry *dentry, const char *name)
2549 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2551 return call_int_hook(inode_getxattr, dentry, name);
2556 * @dentry: file
2559 * @dentry.
2563 int security_inode_listxattr(struct dentry *dentry)
2565 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2567 return call_int_hook(inode_listxattr, dentry);
2573 * @dentry: file
2577 * attributes (xattrs) on @dentry. It is important to note that we have some
2594 struct dentry *dentry, const char *name)
2598 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2603 rc = cap_inode_removexattr(idmap, dentry, name);
2608 return call_int_hook(inode_removexattr, idmap, dentry, name);
2613 * @dentry: file
2618 void security_inode_post_removexattr(struct dentry *dentry, const char *name)
2620 if (unlikely(IS_PRIVATE(d_backing_inode(dentry))))
2622 call_void_hook(inode_post_removexattr, dentry, name);
2627 * @dentry: file to set filesystem extended attributes on
2635 int security_inode_file_setattr(struct dentry *dentry, struct file_kattr *fa)
2637 return call_int_hook(inode_file_setattr, dentry, fa);
2642 * @dentry: file to retrieve filesystem extended attributes from
2650 int security_inode_file_getattr(struct dentry *dentry, struct file_kattr *fa)
2652 return call_int_hook(inode_file_getattr, dentry, fa);
2657 * @dentry: associated dentry
2666 int security_inode_need_killpriv(struct dentry *dentry)
2668 return call_int_hook(inode_need_killpriv, dentry);
2674 * @dentry: associated dentry
2676 * The @dentry's setuid bit is being removed. Remove similar security labels.
2677 * Called with the dentry->d_inode->i_mutex held.
2683 struct dentry *dentry)
2685 return call_int_hook(inode_killpriv, idmap, dentry);
2776 * @src: union dentry of copy-up file
2786 int security_inode_copy_up(struct dentry *src, struct cred **new)
2794 * @src: union dentry of copy-up file
2805 int security_inode_copy_up_xattr(struct dentry *src, const char *name)
4099 * security_d_instantiate() - Populate an inode's LSM state based on a dentry
4100 * @dentry: dentry
4103 * Fill in @inode security information for a @dentry if allowed.
4105 void security_d_instantiate(struct dentry *dentry, struct inode *inode)
4109 call_void_hook(d_instantiate, dentry, inode);
4425 * @dentry: inode
4439 int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen)
4441 return call_int_hook(inode_setsecctx, dentry, ctx, ctxlen);