Lines Matching defs:object
963 * @dir: containing directory object
1029 * @old_dentry: the existing object
1031 * @new_dentry: the new object
1061 * @dir: containing directory object
1065 * and the object, error code otherwise
1095 * @dir: containing directory object
1130 * @old_dentry: the old object
1132 * @new_dentry: the new object
1204 * @dentry: the object
1248 * @dentry: the object
1314 * @dentry: object
1353 * @dentry: the object
1373 * @dentry: the object
1431 * @inode: the object
1498 * @inode: the object
1542 * @file: the object
1562 * @file: the object
1598 * @file: the object
1621 * @file: the object
1714 * to that rule's object label.
1779 * @file: object in question
1792 * @fown: the object the signal come from
1797 * Returns 0 if a subject with the object's smack could
1836 * @file: the object
1889 * @file: the object
2002 * @cred: the object creds
2053 * @p: the task object
2075 * @p: the task object
2087 * @p: the object task
2089 * Returns 0 if current can read the object task, error code otherwise
2098 * @p: the object task
2100 * Returns 0 if current can read the object task, error code otherwise
2109 * @p: the object task
2123 * @p: the task object
2135 * @p: the task object
2147 * @p: the task object
2158 * @p: the task object
2169 * @p: the task object
2180 * @p: the task object
2191 * @p: the task object
2315 * @sip: the object end
2365 * @sip: the object end
2519 * @object: object Smack label
2526 struct smack_known *object,
2544 rc = smk_access(subject, object, MAY_WRITE, &ad);
2545 rc = smk_bu_note("IPv6 check", subject, object, MAY_WRITE, rc);
2653 struct smack_known *object;
2657 object = ssp->smk_in;
2660 object = smack_ipv6host_label(address);
2666 if (skp != NULL && object != NULL)
2667 return smk_ipv6_check(skp, object, address, act);
2670 if (object == NULL)
2671 object = smack_net_ambient;
2677 return smk_ipv6_check(skp, object, address, act);
2690 object = spp->smk_in;
2697 return smk_ipv6_check(skp, object, address, act);
2702 * @inode: the object
2918 * @msg: the object
2932 * @isp: the object
2945 * @isp: the object
2959 * @isp : the object
2981 * @isp: the object
2996 * @isp: the object
3031 * @isp: the object
3048 * @isp : the object
3070 * @isp: the object
3085 * @isp: the object
3126 * @isp: the object
3165 * @isp: the object
3180 * @isp: the object
3214 * @isp: the object
3231 * @isp: the object
3247 * @ipp: the object permissions
3271 * @ipp: the object permissions
3285 * @inode: the object
3503 * @p: the object task
3601 * an object with the smack of other, otherwise an error code
3652 * an object with the smack of other, otherwise an error code
4258 * @key: object
4277 * @key: the object
4288 * @key_ref: gets to the object
4292 * Return 0 if the task has read and write to the object,
4392 * Return 0 if the @watch->cred has permission to read from the key object and
4466 * object to be audited from remaining kernel objects and also
4531 * smack_audit_rule_match - Audit given object ?
4532 * @secid: security id for identifying the object to test
4538 * whether to audit or not to audit a given object.