| /security/landlock/ |
| A D | fs.c | 1130 static int current_check_refer_path(struct dentry *const old_dentry, in current_check_refer_path() argument 1148 if (unlikely(d_is_negative(old_dentry))) in current_check_refer_path() 1159 get_mode_access(d_backing_inode(old_dentry)->i_mode); in current_check_refer_path() 1161 access_request_parent1 |= maybe_remove(old_dentry); in current_check_refer_path() 1166 if (old_dentry->d_parent == new_dir->dentry) { in current_check_refer_path() 1198 old_parent = (old_dentry == mnt_dir.dentry) ? old_dentry : in current_check_refer_path() 1199 old_dentry->d_parent; in current_check_refer_path() 1220 &layer_masks_parent1, &request1, old_dentry, in current_check_refer_path() 1510 static int hook_path_link(struct dentry *const old_dentry, in hook_path_link() argument 1519 struct dentry *const old_dentry, in hook_path_rename() argument [all …]
|
| /security/tomoyo/ |
| A D | tomoyo.c | 264 static int tomoyo_path_link(struct dentry *old_dentry, const struct path *new_dir, in tomoyo_path_link() argument 267 struct path path1 = { .mnt = new_dir->mnt, .dentry = old_dentry }; in tomoyo_path_link() 285 struct dentry *old_dentry, in tomoyo_path_rename() argument 290 struct path path1 = { .mnt = old_parent->mnt, .dentry = old_dentry }; in tomoyo_path_rename()
|
| /security/ |
| A D | security.c | 2000 if (unlikely(IS_PRIVATE(d_backing_inode(old_dentry)))) in security_path_link() 2002 return call_int_hook(path_link, old_dentry, new_dir, new_dentry); in security_path_link() 2021 if (unlikely(IS_PRIVATE(d_backing_inode(old_dentry)) || in security_path_rename() 2026 return call_int_hook(path_rename, old_dir, old_dentry, new_dir, in security_path_rename() 2141 int security_inode_link(struct dentry *old_dentry, struct inode *dir, in security_inode_link() argument 2144 if (unlikely(IS_PRIVATE(d_backing_inode(old_dentry)))) in security_inode_link() 2146 return call_int_hook(inode_link, old_dentry, dir, new_dentry); in security_inode_link() 2252 int security_inode_rename(struct inode *old_dir, struct dentry *old_dentry, in security_inode_rename() argument 2256 if (unlikely(IS_PRIVATE(d_backing_inode(old_dentry)) || in security_inode_rename() 2263 old_dir, old_dentry); in security_inode_rename() [all …]
|
| /security/apparmor/include/ |
| A D | file.h | 96 struct dentry *old_dentry, const struct path *new_dir,
|
| /security/apparmor/ |
| A D | lsm.c | 363 static int apparmor_path_link(struct dentry *old_dentry, const struct path *new_dir, in apparmor_path_link() argument 369 if (!path_mediated_fs(old_dentry)) in apparmor_path_link() 374 error = aa_path_link(current_cred(), label, old_dentry, new_dir, in apparmor_path_link() 381 static int apparmor_path_rename(const struct path *old_dir, struct dentry *old_dentry, in apparmor_path_rename() argument 388 if (!path_mediated_fs(old_dentry)) in apparmor_path_rename() 398 .dentry = old_dentry }; in apparmor_path_rename() 402 .mode = d_backing_inode(old_dentry)->i_mode in apparmor_path_rename() 404 vfsuid = i_uid_into_vfsuid(idmap, d_backing_inode(old_dentry)); in apparmor_path_rename() 411 vfsuid = i_uid_into_vfsuid(idmap, d_backing_inode(old_dentry)); in apparmor_path_rename()
|
| A D | file.c | 426 struct aa_label *label, struct dentry *old_dentry, in aa_path_link() argument 430 struct path target = { .mnt = new_dir->mnt, .dentry = old_dentry }; in aa_path_link() 431 struct inode *inode = d_backing_inode(old_dentry); in aa_path_link()
|
| /security/smack/ |
| A D | smack_lsm.c | 1055 static int smack_inode_link(struct dentry *old_dentry, struct inode *dir, in smack_inode_link() argument 1063 smk_ad_setfield_u_fs_path_dentry(&ad, old_dentry); in smack_inode_link() 1065 isp = smk_of_inode(d_backing_inode(old_dentry)); in smack_inode_link() 1067 rc = smk_bu_inode(d_backing_inode(old_dentry), MAY_WRITE, rc); in smack_inode_link() 1160 struct dentry *old_dentry, in smack_inode_rename() argument 1169 smk_ad_setfield_u_fs_path_dentry(&ad, old_dentry); in smack_inode_rename() 1171 isp = smk_of_inode(d_backing_inode(old_dentry)); in smack_inode_rename() 1173 rc = smk_bu_inode(d_backing_inode(old_dentry), MAY_READWRITE, rc); in smack_inode_rename()
|
| /security/selinux/ |
| A D | hooks.c | 1900 struct dentry *old_dentry, in may_rename() argument 1912 old_isec = backing_inode_security(old_dentry); in may_rename() 1913 old_is_dir = d_is_dir(old_dentry); in may_rename() 1918 ad.u.dentry = old_dentry; in may_rename() 3029 static int selinux_inode_link(struct dentry *old_dentry, struct inode *dir, struct dentry *new_dent… in selinux_inode_link() argument 3031 return may_link(dir, old_dentry, MAY_LINK); in selinux_inode_link() 3059 static int selinux_inode_rename(struct inode *old_inode, struct dentry *old_dentry, in selinux_inode_rename() argument 3062 return may_rename(old_inode, old_dentry, new_inode, new_dentry); in selinux_inode_rename()
|