Lines Matching refs:from

282  * smk_fetch - Fetch the smack label from a file.
319 * @inode: inode to extract the info from
555 * SMK_SB_INITIALIZED will be zero from kzalloc.
741 char *from = options, *to = options;
745 char *next = strchr(from, ',');
750 len = next - from;
752 len = strlen(from);
754 token = match_opt_prefix(from, len, &arg);
756 arg = kmemdup_nul(arg, from + len - arg, GFP_KERNEL);
767 from--;
770 if (to != from)
771 memmove(to, from, len);
775 if (!from[len])
777 from += len + 1;
787 * @kern_flags: mount option from kernel space or user space
818 * Unprivileged mounts get root and default from the caller.
981 * smack_inode_init_security - copy out the smack from an inode
1259 * @path: path to extract the info from
1466 * @idmap: idmap of the mnt this request came from
1490 * @idmap: idmap of the mnt this request came from
1512 * @idmap: idmap of the mnt this request came from
1619 * @inode: inode to extract the info from
1897 * @fown: the object the signal come from
2090 * Fill in a set of blank credentials from another set of credentials.
2352 * @p: task to copy from
2469 * the list is sorted from longest to shortest mask
2530 * the list is sorted from longest to shortest mask
2582 * smack_netlbl_delete - Remove the secattr from a socket
2585 * Remove the outbound smack value from a socket
3489 * obtained from d_alloc_pseudo()?
3546 * Device labels should come from the filesystem,
3561 * Get the value from the xattr.
4002 * smack_from_skb - Smack data from the secmark in an skb
4023 * smack_from_netlbl - Smack data from the IP options in an skb
4194 * Sets the netlabel socket state on sk from parent
4529 * Return 0 if the @watch->cred has permission to read from the key object and
4603 * object to be audited from remaining kernel objects and also
4615 * @field: audit rule fields given from user-space (audit.h)
4648 * This is used to filter Smack rules from remaining Audit ones.
4670 * @field: audit rule flags given from user-space
4803 * Get label from overlay inode and set it in create_sid