Lines Matching refs:from
270 * smk_fetch - Fetch the smack label from a file.
307 * @inode: inode to extract the info from
550 * SMK_SB_INITIALIZED will be zero from kzalloc.
714 char *from = options, *to = options;
718 char *next = strchr(from, ',');
723 len = next - from;
725 len = strlen(from);
727 token = match_opt_prefix(from, len, &arg);
729 arg = kmemdup_nul(arg, from + len - arg, GFP_KERNEL);
740 from--;
743 if (to != from)
744 memmove(to, from, len);
748 if (!from[len])
750 from += len + 1;
760 * @kern_flags: mount option from kernel space or user space
798 * Unprivileged mounts get root and default from the caller.
961 * smack_inode_init_security - copy out the smack from an inode
1229 * @path: path to extract the info from
1515 * @inode: inode to extract the info from
1792 * @fown: the object the signal come from
1985 * Fill in a set of blank credentials from another set of credentials.
2234 * @p: task to copy from
2336 * the list is sorted from longest to shortest mask
2397 * the list is sorted from longest to shortest mask
2449 * smack_netlbl_delete - Remove the secattr from a socket
2452 * Remove the outbound smack value from a socket
3344 * obtained from d_alloc_pseudo()?
3401 * Device labels should come from the filesystem,
3416 * Get the value from the xattr.
3865 * smack_from_skb - Smack data from the secmark in an skb
3886 * smack_from_netlbl - Smack data from the IP options in an skb
4057 * Sets the netlabel socket state on sk from parent
4392 * Return 0 if the @watch->cred has permission to read from the key object and
4466 * object to be audited from remaining kernel objects and also
4478 * @field: audit rule fields given from user-space (audit.h)
4511 * This is used to filter Smack rules from remaining Audit ones.
4533 * @field: audit rule flags given from user-space
4664 * Get label from overlay inode and set it in create_sid