Lines Matching defs:object

983  * @dir: containing directory object
1059 * @old_dentry: the existing object
1061 * @new_dentry: the new object
1091 * @dir: containing directory object
1095 * and the object, error code otherwise
1125 * @dir: containing directory object
1160 * @old_dentry: the old object
1162 * @new_dentry: the new object
1234 * @dentry: the object
1279 * @dentry: the object
1347 * @dentry: object
1386 * @dentry: the object
1407 * @dentry: the object
1467 * @dentry: the object
1491 * @dentry: the object
1513 * @dentry: the object
1535 * @inode: the object
1602 * @inode: the object
1646 * @file: the object
1666 * @file: the object
1702 * @file: the object
1725 * @file: the object
1819 * to that rule's object label.
1884 * @file: object in question
1897 * @fown: the object the signal come from
1902 * Returns 0 if a subject with the object's smack could
1941 * @file: the object
1994 * @file: the object
2107 * @cred: the object creds
2158 * @p: the task object
2180 * @p: the task object
2192 * @p: the object task
2194 * Returns 0 if current can read the object task, error code otherwise
2203 * @p: the object task
2205 * Returns 0 if current can read the object task, error code otherwise
2241 * @p: the task object
2253 * @p: the task object
2265 * @p: the task object
2276 * @p: the task object
2287 * @p: the task object
2298 * @p: the task object
2309 * @p: the task object
2448 * @sip: the object end
2498 * @sip: the object end
2652 * @object: object Smack label
2659 struct smack_known *object,
2677 rc = smk_access(subject, object, MAY_WRITE, &ad);
2678 rc = smk_bu_note("IPv6 check", subject, object, MAY_WRITE, rc);
2785 struct smack_known *object;
2789 object = ssp->smk_in;
2792 object = smack_ipv6host_label(address);
2798 if (skp != NULL && object != NULL)
2799 return smk_ipv6_check(skp, object, address, act);
2802 if (object == NULL)
2803 object = smack_net_ambient;
2809 return smk_ipv6_check(skp, object, address, act);
2822 object = spp->smk_in;
2829 return smk_ipv6_check(skp, object, address, act);
2835 * @inode: the object
3061 * @msg: the object
3075 * @isp: the object
3088 * @isp: the object
3102 * @isp : the object
3124 * @isp: the object
3139 * @isp: the object
3174 * @isp: the object
3191 * @isp : the object
3213 * @isp: the object
3228 * @isp: the object
3269 * @isp: the object
3308 * @isp: the object
3323 * @isp: the object
3357 * @isp: the object
3374 * @isp: the object
3392 * @ipp: the object permissions
3416 * @ipp: the object permissions
3430 * @inode: the object
3640 * @p: the object task
3738 * an object with the smack of other, otherwise an error code
3789 * an object with the smack of other, otherwise an error code
4395 * @key: object
4414 * @key: the object
4425 * @key_ref: gets to the object
4429 * Return 0 if the task has read and write to the object,
4529 * Return 0 if the @watch->cred has permission to read from the key object and
4603 * object to be audited from remaining kernel objects and also
4668 * smack_audit_rule_match - Audit given object ?
4669 * @secid: security id for identifying the object to test
4675 * whether to audit or not to audit a given object.