Lines Matching refs:target
66 audit_log_format(ab, " target=");
69 } else if (aad(sa)->fs.target) {
70 audit_log_format(ab, " target=");
71 audit_log_untrustedstring(ab, aad(sa)->fs.target);
82 * @target: name of target (MAYBE NULL)
83 * @tlabel: target label (MAY BE NULL)
92 const char *target, struct aa_label *tlabel,
101 aad(&sa)->fs.target = target;
339 * @target: target permission set
341 * test target x permissions are equal OR a subset of link x permissions
343 * a subset of permissions that the target has.
347 static inline bool xindex_is_subset(u32 link, u32 target)
349 if (((link & ~AA_X_UNSAFE) != (target & ~AA_X_UNSAFE)) ||
350 ((link & AA_X_UNSAFE) && !(target & AA_X_UNSAFE)))
358 const struct path *target, char *buffer2,
374 error = path_name(OP_LINK, &profile->label, target, profile->path_flags,
387 /* test to see if target can be paired with link */
399 info = "target restricted";
409 * a subset of the allowed permissions on target.
425 info = "link not subset of target";
440 * @old_dentry: the target dentry (NOT NULL)
444 * Handle the permission test for a link & target pair. Permission
446 * first, and if allowed, the target is tested. The target test
448 * making the target permission dependent on the link permission match.
451 * on link are a subset of the permission granted to target.
459 struct path target = { .mnt = new_dir->mnt, .dentry = old_dentry };
476 profile_path_link(profile, &link, buffer, &target,