Lines Matching refs:target
69 audit_log_format(ab, " target=");
72 } else if (ad->fs.target) {
73 audit_log_format(ab, " target=");
74 audit_log_untrustedstring(ab, ad->fs.target);
86 * @target: name of target (MAYBE NULL)
87 * @tlabel: target label (MAY BE NULL)
97 const char *target, struct aa_label *tlabel,
106 ad.fs.target = target;
309 * @target: target permission set
311 * test target x permissions are equal OR a subset of link x permissions
313 * a subset of permissions that the target has.
317 static inline bool xindex_is_subset(u32 link, u32 target)
319 if (((link & ~AA_X_UNSAFE) != (target & ~AA_X_UNSAFE)) ||
320 ((link & AA_X_UNSAFE) && !(target & AA_X_UNSAFE)))
329 const struct path *target, char *buffer2,
348 error = path_name(OP_LINK, subj_cred, &profile->label, target,
363 /* test to see if target can be paired with link */
375 info = "target restricted";
385 * a subset of the allowed permissions on target.
401 info = "link not subset of target";
418 * @old_dentry: the target dentry (NOT NULL)
422 * Handle the permission test for a link & target pair. Permission
424 * first, and if allowed, the target is tested. The target test
426 * making the target permission dependent on the link permission match.
429 * on link are a subset of the permission granted to target.
438 struct path target = { .mnt = new_dir->mnt, .dentry = old_dentry };
456 &target, buffer2, &cond));