Lines Matching +defs:target +defs:dir

851  * @child: target process
885 * @target: target process
891 * @target process. The hook may also perform permission checking to determine
892 * if the current process is allowed to see the capability sets of the @target
897 int security_capget(const struct task_struct *target,
902 return call_int_hook(capget, 0, target,
908 * @new: new credentials for the target process
909 * @old: current credentials of the target process
1600 * @dir: parent directory
1624 int security_inode_init_security(struct inode *inode, struct inode *dir,
1648 ret = hp->hook.inode_init_security(inode, dir, qstr, new_xattrs,
1664 ret = evm_inode_init_security(inode, dir, qstr, new_xattrs,
1700 * @dir: parent directory
1710 int security_path_mknod(const struct path *dir, struct dentry *dentry,
1713 if (unlikely(IS_PRIVATE(d_backing_inode(dir->dentry))))
1715 return call_int_hook(path_mknod, 0, dir, dentry, mode, dev);
1721 * @dir: parent directory
1729 int security_path_mkdir(const struct path *dir, struct dentry *dentry,
1732 if (unlikely(IS_PRIVATE(d_backing_inode(dir->dentry))))
1734 return call_int_hook(path_mkdir, 0, dir, dentry, mode);
1740 * @dir: parent directory
1747 int security_path_rmdir(const struct path *dir, struct dentry *dentry)
1749 if (unlikely(IS_PRIVATE(d_backing_inode(dir->dentry))))
1751 return call_int_hook(path_rmdir, 0, dir, dentry);
1756 * @dir: parent directory
1763 int security_path_unlink(const struct path *dir, struct dentry *dentry)
1765 if (unlikely(IS_PRIVATE(d_backing_inode(dir->dentry))))
1767 return call_int_hook(path_unlink, 0, dir, dentry);
1773 * @dir: parent directory
1781 int security_path_symlink(const struct path *dir, struct dentry *dentry,
1784 if (unlikely(IS_PRIVATE(d_backing_inode(dir->dentry))))
1786 return call_int_hook(path_symlink, 0, dir, dentry, old_name);
1901 * @dir: the parent directory
1909 int security_inode_create(struct inode *dir, struct dentry *dentry,
1912 if (unlikely(IS_PRIVATE(dir)))
1914 return call_int_hook(inode_create, 0, dir, dentry, mode);
1921 * @dir: new parent directory
1928 int security_inode_link(struct dentry *old_dentry, struct inode *dir,
1933 return call_int_hook(inode_link, 0, old_dentry, dir, new_dentry);
1938 * @dir: parent directory
1945 int security_inode_unlink(struct inode *dir, struct dentry *dentry)
1949 return call_int_hook(inode_unlink, 0, dir, dentry);
1954 * @dir: parent directory
1962 int security_inode_symlink(struct inode *dir, struct dentry *dentry,
1965 if (unlikely(IS_PRIVATE(dir)))
1967 return call_int_hook(inode_symlink, 0, dir, dentry, old_name);
1972 * @dir: parent directory
1977 * associated with inode structure @dir.
1981 int security_inode_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode)
1983 if (unlikely(IS_PRIVATE(dir)))
1985 return call_int_hook(inode_mkdir, 0, dir, dentry, mode);
1991 * @dir: parent directory
1998 int security_inode_rmdir(struct inode *dir, struct dentry *dentry)
2002 return call_int_hook(inode_rmdir, 0, dir, dentry);
2007 * @dir: parent directory
2019 int security_inode_mknod(struct inode *dir, struct dentry *dentry,
2022 if (unlikely(IS_PRIVATE(dir)))
2024 return call_int_hook(inode_mknod, 0, dir, dentry, mode, dev);
2809 * @tsk: target task
2981 * @new: target credentials
3023 * @new: target credentials
3266 * @p: target task
3281 * @p: target task
3295 * @p: target task
3323 * @tcred: target task credentials
3339 * @p: target task's group leader
3357 * @p: target task
3371 * @p: target task
3397 * @p: target process
3622 * @target: target task
3627 * The @target task structure contains a pointer to the process that will be
3634 struct task_struct *target, long type, int mode)
3636 return call_int_hook(msg_queue_msgrcv, 0, msq, msg, target, type, mode);
4101 * using only the socket layer hooks, since we need to know the actual target
4128 * using only the socket layer hooks, since we need to know the actual target
4481 * @newsk: target sock
4494 * @flic: target flow
4496 * Set the target flow's secid to socket's secid.
4507 * @flic: target flow
4521 * @parent: target parent socket
4739 * @newsk: target sock
4873 * @new_ctxp: target xfrm security context
4974 * @ctx: target xfrm security context