Searched refs:hardlink (Results 1 – 5 of 5) sorted by relevance
/linux-4.4.14/fs/overlayfs/ |
D | dir.c | 74 struct dentry *hardlink, bool debug) in ovl_create_real() argument 81 if (hardlink) { in ovl_create_real() 82 err = ovl_do_link(hardlink, dir, newdentry, debug); in ovl_create_real() 163 struct dentry *hardlink) in ovl_create_upper() argument 176 err = ovl_create_real(udir, newdentry, stat, link, hardlink, false); in ovl_create_upper() 318 struct dentry *hardlink) in ovl_create_over_whiteout() argument 346 err = ovl_create_real(wdir, newdentry, stat, link, hardlink, true); in ovl_create_over_whiteout() 386 const char *link, struct dentry *hardlink) in ovl_create_or_link() argument 405 err = ovl_create_upper(dentry, inode, &stat, link, hardlink); in ovl_create_or_link() 426 hardlink); in ovl_create_or_link()
|
D | overlayfs.h | 191 struct dentry *hardlink, bool debug);
|
/linux-4.4.14/Documentation/sysctl/ |
D | fs.txt | 187 A long-standing class of security issues is the hardlink-based 190 is to cross privilege boundaries when following a given hardlink (i.e. a 191 root process follows a hardlink created by another user). Additionally, 196 When set to "0", hardlink creation behavior is unrestricted.
|
/linux-4.4.14/Documentation/filesystems/pohmelfs/ |
D | network_protocol.txt | 117 @start - 1 for symlink, 0 for hardlink.
|
/linux-4.4.14/Documentation/filesystems/cifs/ |
D | CHANGES | 582 test7 (hardlink count not immediately refreshed in case in which 1031 Unix extensions (symlink, readlink, hardlink, chmod and some chgrp and chown) implemented
|