secid            3111 drivers/android/binder.c 		u32 secid;
secid            3114 drivers/android/binder.c 		security_task_getsecid(proc->tsk, &secid);
secid            3115 drivers/android/binder.c 		ret = security_secid_to_secctx(secid, &secctx, &secctx_sz);
secid              45 drivers/dio/dio-sysfs.c static DEVICE_ATTR(secid, S_IRUGO, dio_show_secid, NULL);
secid             119 drivers/dio/dio.c 	u_char prid, secid, i;
secid             147 drivers/dio/dio.c                         secid = DIO_SECID(va);
secid             148 drivers/dio/dio.c                         id = DIO_ENCODE_ID(prid, secid);
secid             194 drivers/dio/dio.c                 u_char prid, secid = 0;        /* primary, secondary ID bytes */
secid             234 drivers/dio/dio.c                         secid = DIO_SECID(va);
secid             235 drivers/dio/dio.c                         dev->id = DIO_ENCODE_ID(prid, secid);
secid             243 drivers/dio/dio.c                         printk(":%02X", secid);
secid            1593 include/linux/lsm_hooks.h 	void (*inode_getsecid)(struct inode *inode, u32 *secid);
secid            1626 include/linux/lsm_hooks.h 	void (*cred_getsecid)(const struct cred *c, u32 *secid);
secid            1627 include/linux/lsm_hooks.h 	int (*kernel_act_as)(struct cred *new, u32 secid);
secid            1639 include/linux/lsm_hooks.h 	void (*task_getsecid)(struct task_struct *p, u32 *secid);
secid            1657 include/linux/lsm_hooks.h 	void (*ipc_getsecid)(struct kern_ipc_perm *ipcp, u32 *secid);
secid            1693 include/linux/lsm_hooks.h 	int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen);
secid            1694 include/linux/lsm_hooks.h 	int (*secctx_to_secid)(const char *secdata, u32 seclen, u32 *secid);
secid            1731 include/linux/lsm_hooks.h 					struct sk_buff *skb, u32 *secid);
secid            1735 include/linux/lsm_hooks.h 	void (*sk_getsecid)(struct sock *sk, u32 *secid);
secid            1742 include/linux/lsm_hooks.h 	int (*secmark_relabel_packet)(u32 secid);
secid            1781 include/linux/lsm_hooks.h 					u32 secid);
secid            1789 include/linux/lsm_hooks.h 	int (*xfrm_decode_session)(struct sk_buff *skb, u32 *secid, int ckall);
secid            1806 include/linux/lsm_hooks.h 	int (*audit_rule_match)(u32 secid, u32 field, u32 op, void *lsmrule);
secid             354 include/linux/security.h void security_inode_getsecid(struct inode *inode, u32 *secid);
secid             381 include/linux/security.h void security_cred_getsecid(const struct cred *c, u32 *secid);
secid             382 include/linux/security.h int security_kernel_act_as(struct cred *new, u32 secid);
secid             394 include/linux/security.h void security_task_getsecid(struct task_struct *p, u32 *secid);
secid             411 include/linux/security.h void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid);
secid             440 include/linux/security.h int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
secid             441 include/linux/security.h int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
secid             868 include/linux/security.h static inline void security_inode_getsecid(struct inode *inode, u32 *secid)
secid             870 include/linux/security.h 	*secid = 0;
secid             988 include/linux/security.h static inline int security_kernel_act_as(struct cred *cred, u32 secid)
secid            1044 include/linux/security.h static inline void security_task_getsecid(struct task_struct *p, u32 *secid)
secid            1046 include/linux/security.h 	*secid = 0;
secid            1117 include/linux/security.h static inline void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid)
secid            1119 include/linux/security.h 	*secid = 0;
secid            1239 include/linux/security.h static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
secid            1246 include/linux/security.h 					   u32 *secid)
secid            1300 include/linux/security.h int security_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid);
secid            1313 include/linux/security.h int security_secmark_relabel_packet(u32 secid);
secid            1438 include/linux/security.h static inline int security_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid)
secid            1484 include/linux/security.h static inline int security_secmark_relabel_packet(u32 secid)
secid            1581 include/linux/security.h 				      struct xfrm_sec_ctx *polsec, u32 secid);
secid            1588 include/linux/security.h int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid);
secid            1621 include/linux/security.h 					struct xfrm_sec_ctx *polsec, u32 secid)
secid            1646 include/linux/security.h static inline int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid)
secid            1782 include/linux/security.h int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule);
secid            1798 include/linux/security.h static inline int security_audit_rule_match(u32 secid, u32 field, u32 op,
secid              39 include/net/af_unix.h 	u32			secid;		/* Security ID		*/
secid             100 include/net/netlabel.h 	u32 secid;
secid             204 include/net/netlabel.h 		u32 secid;
secid             418 include/net/netlabel.h 				u32 secid,
secid             526 include/net/netlabel.h 					      u32 secid,
secid              64 include/net/request_sock.h 	u32				secid;
secid              36 include/net/scm.h 	u32			secid;		/* Passed security ID 	*/
secid              49 include/net/scm.h 	security_socket_getpeersec_dgram(sock, NULL, &scm->secid);
secid             100 include/net/scm.h 		err = security_secid_to_secctx(scm->secid, &secdata, &seclen);
secid            1344 include/net/sctp/structs.h 	u32 secid;
secid              19 include/uapi/linux/netfilter/xt_SECMARK.h 	__u32 secid;
secid             740 kernel/cred.c  int set_security_override(struct cred *new, u32 secid)
secid             742 kernel/cred.c  	return security_kernel_act_as(new, secid);
secid             758 kernel/cred.c  	u32 secid;
secid             761 kernel/cred.c  	ret = security_secctx_to_secid(secctx, strlen(secctx), &secid);
secid             765 kernel/cred.c  	return set_security_override(new, secid);
secid            1472 net/ipv4/cipso_ipv4.c 	*(u32 *)&buffer[2] = secattr->attr.secid;
secid            1492 net/ipv4/cipso_ipv4.c 	secattr->attr.secid = *(u32 *)&tag[2];
secid             134 net/ipv4/ip_sockglue.c 	u32 seclen, secid;
secid             137 net/ipv4/ip_sockglue.c 	err = security_socket_getpeersec_dgram(NULL, skb, &secid);
secid             141 net/ipv4/ip_sockglue.c 	err = security_secid_to_secctx(secid, &secdata, &seclen);
secid             610 net/netfilter/nft_meta.c 	u32 secid;
secid             634 net/netfilter/nft_meta.c 	priv->secid = tmp_secid;
secid             644 net/netfilter/nft_meta.c 	skb->secmark = priv->secid;
secid              36 net/netfilter/xt_SECMARK.c 		secmark = info->secid;
secid              51 net/netfilter/xt_SECMARK.c 	info->secid = 0;
secid              54 net/netfilter/xt_SECMARK.c 				       &info->secid);
secid              62 net/netfilter/xt_SECMARK.c 	if (!info->secid) {
secid              68 net/netfilter/xt_SECMARK.c 	err = security_secmark_relabel_packet(info->secid);
secid             213 net/netlabel/netlabel_kapi.c 				u32 secid,
secid             233 net/netlabel/netlabel_kapi.c 				 secid, audit_info);
secid              69 net/netlabel/netlabel_unlabeled.c 	u32 secid;
secid              77 net/netlabel/netlabel_unlabeled.c 	u32 secid;
secid             233 net/netlabel/netlabel_unlabeled.c 				   u32 secid)
secid             245 net/netlabel/netlabel_unlabeled.c 	entry->secid = secid;
secid             273 net/netlabel/netlabel_unlabeled.c 				   u32 secid)
secid             289 net/netlabel/netlabel_unlabeled.c 	entry->secid = secid;
secid             368 net/netlabel/netlabel_unlabeled.c 		      u32 secid,
secid             410 net/netlabel/netlabel_unlabeled.c 		ret_val = netlbl_unlhsh_add_addr4(iface, addr4, mask4, secid);
secid             423 net/netlabel/netlabel_unlabeled.c 		ret_val = netlbl_unlhsh_add_addr6(iface, addr6, mask6, secid);
secid             440 net/netlabel/netlabel_unlabeled.c 		if (security_secid_to_secctx(secid,
secid             497 net/netlabel/netlabel_unlabeled.c 		    security_secid_to_secctx(entry->secid,
secid             558 net/netlabel/netlabel_unlabeled.c 		    security_secid_to_secctx(entry->secid,
secid             884 net/netlabel/netlabel_unlabeled.c 	u32 secid;
secid             908 net/netlabel/netlabel_unlabeled.c 				  &secid);
secid             913 net/netlabel/netlabel_unlabeled.c 				 dev_name, addr, mask, addr_len, secid,
secid             935 net/netlabel/netlabel_unlabeled.c 	u32 secid;
secid             957 net/netlabel/netlabel_unlabeled.c 				  &secid);
secid             962 net/netlabel/netlabel_unlabeled.c 				 NULL, addr, mask, addr_len, secid,
secid            1074 net/netlabel/netlabel_unlabeled.c 	u32 secid;
secid            1114 net/netlabel/netlabel_unlabeled.c 		secid = addr4->secid;
secid            1128 net/netlabel/netlabel_unlabeled.c 		secid = addr6->secid;
secid            1131 net/netlabel/netlabel_unlabeled.c 	ret_val = security_secid_to_secctx(secid, &secctx, &secctx_len);
secid            1483 net/netlabel/netlabel_unlabeled.c 		secattr->attr.secid = netlbl_unlhsh_addr4_entry(addr4)->secid;
secid            1496 net/netlabel/netlabel_unlabeled.c 		secattr->attr.secid = netlbl_unlhsh_addr6_entry(addr6)->secid;
secid            1534 net/netlabel/netlabel_unlabeled.c 	security_task_getsecid(current, &audit_info.secid);
secid             214 net/netlabel/netlabel_unlabeled.h 		      u32 secid,
secid             101 net/netlabel/netlabel_user.c 	if (audit_info->secid != 0 &&
secid             102 net/netlabel/netlabel_user.c 	    security_secid_to_secctx(audit_info->secid,
secid              37 net/netlabel/netlabel_user.h 	security_task_getsecid(current, &audit_info->secid);
secid             141 net/unix/af_unix.c 	UNIXCB(skb).secid = scm->secid;
secid             146 net/unix/af_unix.c 	scm->secid = UNIXCB(skb).secid;
secid             151 net/unix/af_unix.c 	return (scm->secid == UNIXCB(skb).secid);
secid             132 security/apparmor/include/label.h 	u32 secid;
secid              85 security/apparmor/include/net.h 	u32 secid;
secid             110 security/apparmor/include/net.h 			   u32 secid, struct sock *sk);
secid              24 security/apparmor/include/secid.h struct aa_label *aa_secid_to_label(u32 secid);
secid              25 security/apparmor/include/secid.h int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
secid              26 security/apparmor/include/secid.h int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
secid              31 security/apparmor/include/secid.h void aa_free_secid(u32 secid);
secid              32 security/apparmor/include/secid.h void aa_secid_update(u32 secid, struct aa_label *label);
secid             334 security/apparmor/label.c 	aa_free_secid(label->secid);
secid             709 security/apparmor/lsm.c static void apparmor_task_getsecid(struct task_struct *p, u32 *secid)
secid             712 security/apparmor/lsm.c 	*secid = label->secid;
secid            1105 security/apparmor/lsm.c 					    struct sk_buff *skb, u32 *secid)
secid             195 security/apparmor/net.c 		secmark->secid = AA_SECID_WILDCARD;
secid             206 security/apparmor/net.c 	secmark->secid = label->secid;
secid             211 security/apparmor/net.c static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid,
secid             221 security/apparmor/net.c 		if (!profile->secmark[i].secid) {
secid             227 security/apparmor/net.c 		if (profile->secmark[i].secid == secid ||
secid             228 security/apparmor/net.c 		    profile->secmark[i].secid == AA_SECID_WILDCARD) {
secid             245 security/apparmor/net.c 			   u32 secid, struct sock *sk)
secid             251 security/apparmor/net.c 				    aa_secmark_perm(profile, request, secid,
secid              46 security/apparmor/secid.c void aa_secid_update(u32 secid, struct aa_label *label)
secid              51 security/apparmor/secid.c 	idr_replace(&aa_secids, label, secid);
secid              59 security/apparmor/secid.c struct aa_label *aa_secid_to_label(u32 secid)
secid              64 security/apparmor/secid.c 	label = idr_find(&aa_secids, secid);
secid              70 security/apparmor/secid.c int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
secid              73 security/apparmor/secid.c 	struct aa_label *label = aa_secid_to_label(secid);
secid              98 security/apparmor/secid.c int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
secid             106 security/apparmor/secid.c 	*secid = label->secid;
secid             136 security/apparmor/secid.c 		label->secid = AA_SECID_INVALID;
secid             141 security/apparmor/secid.c 	label->secid = ret;
secid             149 security/apparmor/secid.c void aa_free_secid(u32 secid)
secid             154 security/apparmor/secid.c 	idr_remove(&aa_secids, secid);
secid             208 security/integrity/ima/ima.h int ima_get_action(struct inode *inode, const struct cred *cred, u32 secid,
secid             232 security/integrity/ima/ima.h int ima_match_policy(struct inode *inode, const struct cred *cred, u32 secid,
secid             373 security/integrity/ima/ima.h static inline int security_filter_rule_match(u32 secid, u32 field, u32 op,
secid             184 security/integrity/ima/ima_api.c int ima_get_action(struct inode *inode, const struct cred *cred, u32 secid,
secid             192 security/integrity/ima/ima_api.c 	return ima_match_policy(inode, cred, secid, func, mask, flags, pcr,
secid              50 security/integrity/ima/ima_appraise.c 	u32 secid;
secid              55 security/integrity/ima/ima_appraise.c 	security_task_getsecid(current, &secid);
secid              56 security/integrity/ima/ima_appraise.c 	return ima_match_policy(inode, current_cred(), secid, func, mask,
secid             193 security/integrity/ima/ima_main.c 			       u32 secid, char *buf, loff_t size, int mask,
secid             217 security/integrity/ima/ima_main.c 	action = ima_get_action(inode, cred, secid, mask, func, &pcr,
secid             383 security/integrity/ima/ima_main.c 	u32 secid;
secid             386 security/integrity/ima/ima_main.c 		security_task_getsecid(current, &secid);
secid             387 security/integrity/ima/ima_main.c 		return process_measurement(file, current_cred(), secid, NULL,
secid             410 security/integrity/ima/ima_main.c 	u32 secid;
secid             412 security/integrity/ima/ima_main.c 	security_task_getsecid(current, &secid);
secid             413 security/integrity/ima/ima_main.c 	ret = process_measurement(bprm->file, current_cred(), secid, NULL, 0,
secid             418 security/integrity/ima/ima_main.c 	security_cred_getsecid(bprm->cred, &secid);
secid             419 security/integrity/ima/ima_main.c 	return process_measurement(bprm->file, bprm->cred, secid, NULL, 0,
secid             435 security/integrity/ima/ima_main.c 	u32 secid;
secid             437 security/integrity/ima/ima_main.c 	security_task_getsecid(current, &secid);
secid             438 security/integrity/ima/ima_main.c 	return process_measurement(file, current_cred(), secid, NULL, 0,
secid             547 security/integrity/ima/ima_main.c 	u32 secid;
secid             569 security/integrity/ima/ima_main.c 	security_task_getsecid(current, &secid);
secid             570 security/integrity/ima/ima_main.c 	return process_measurement(file, current_cred(), secid, buf, size,
secid             636 security/integrity/ima/ima_main.c 				       const struct cred *cred, u32 secid)
secid             654 security/integrity/ima/ima_main.c 	action = ima_get_action(NULL, cred, secid, 0, KEXEC_CMDLINE, &pcr,
secid             689 security/integrity/ima/ima_main.c 	u32 secid;
secid             692 security/integrity/ima/ima_main.c 		security_task_getsecid(current, &secid);
secid             694 security/integrity/ima/ima_main.c 					   current_cred(), secid);
secid             370 security/integrity/ima/ima_policy.c 			    const struct cred *cred, u32 secid,
secid             436 security/integrity/ima/ima_policy.c 			rc = security_filter_rule_match(secid,
secid             492 security/integrity/ima/ima_policy.c int ima_match_policy(struct inode *inode, const struct cred *cred, u32 secid,
secid             508 security/integrity/ima/ima_policy.c 		if (!ima_match_rules(entry, inode, cred, secid, func, mask))
secid            1348 security/security.c void security_inode_getsecid(struct inode *inode, u32 *secid)
secid            1350 security/security.c 	call_void_hook(inode_getsecid, inode, secid);
secid            1570 security/security.c void security_cred_getsecid(const struct cred *c, u32 *secid)
secid            1572 security/security.c 	*secid = 0;
secid            1573 security/security.c 	call_void_hook(cred_getsecid, c, secid);
secid            1577 security/security.c int security_kernel_act_as(struct cred *new, u32 secid)
secid            1579 security/security.c 	return call_int_hook(kernel_act_as, 0, new, secid);
secid            1652 security/security.c void security_task_getsecid(struct task_struct *p, u32 *secid)
secid            1654 security/security.c 	*secid = 0;
secid            1655 security/security.c 	call_void_hook(task_getsecid, p, secid);
secid            1735 security/security.c void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid)
secid            1737 security/security.c 	*secid = 0;
secid            1738 security/security.c 	call_void_hook(ipc_getsecid, ipcp, secid);
secid            1915 security/security.c int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
secid            1917 security/security.c 	return call_int_hook(secid_to_secctx, -EOPNOTSUPP, secid, secdata,
secid            1922 security/security.c int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
secid            1924 security/security.c 	*secid = 0;
secid            1925 security/security.c 	return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid);
secid            2060 security/security.c int security_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid)
secid            2063 security/security.c 			     skb, secid);
secid            2121 security/security.c int security_secmark_relabel_packet(u32 secid)
secid            2123 security/security.c 	return call_int_hook(secmark_relabel_packet, 0, secid);
secid            2260 security/security.c 				      struct xfrm_sec_ctx *polsec, u32 secid)
secid            2262 security/security.c 	return call_int_hook(xfrm_state_alloc_acquire, 0, x, polsec, secid);
secid            2305 security/security.c int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid)
secid            2307 security/security.c 	return call_int_hook(xfrm_decode_session, 0, skb, secid, 1);
secid            2365 security/security.c int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule)
secid            2367 security/security.c 	return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule);
secid            3418 security/selinux/hooks.c static void selinux_inode_getsecid(struct inode *inode, u32 *secid)
secid            3421 security/selinux/hooks.c 	*secid = isec->sid;
secid            3916 security/selinux/hooks.c static void selinux_cred_getsecid(const struct cred *c, u32 *secid)
secid            3918 security/selinux/hooks.c 	*secid = cred_sid(c);
secid            3925 security/selinux/hooks.c static int selinux_kernel_act_as(struct cred *new, u32 secid)
secid            3932 security/selinux/hooks.c 			   sid, secid,
secid            3937 security/selinux/hooks.c 		tsec->sid = secid;
secid            4063 security/selinux/hooks.c static void selinux_task_getsecid(struct task_struct *p, u32 *secid)
secid            4065 security/selinux/hooks.c 	*secid = task_sid(p);
secid            4146 security/selinux/hooks.c 	u32 secid;
secid            4154 security/selinux/hooks.c 		secid = current_sid();
secid            4156 security/selinux/hooks.c 		secid = cred_sid(cred);
secid            4158 security/selinux/hooks.c 			    secid, task_sid(p), SECCLASS_PROCESS, perm, NULL);
secid            5099 security/selinux/hooks.c static int selinux_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid)
secid            5121 security/selinux/hooks.c 	*secid = peer_secid;
secid            5165 security/selinux/hooks.c static void selinux_sk_getsecid(struct sock *sk, u32 *secid)
secid            5168 security/selinux/hooks.c 		*secid = SECINITSID_ANY_SOCKET;
secid            5172 security/selinux/hooks.c 		*secid = sksec->sid;
secid            5254 security/selinux/hooks.c 	ep->secid = conn_sid;
secid            5355 security/selinux/hooks.c 	newsksec->sid = ep->secid;
secid            5376 security/selinux/hooks.c 	req->secid = connsid;
secid            5387 security/selinux/hooks.c 	newsksec->sid = req->secid;
secid            5437 security/selinux/hooks.c 	fl->flowi_secid = req->secid;
secid            6282 security/selinux/hooks.c static void selinux_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid)
secid            6285 security/selinux/hooks.c 	*secid = isec->sid;
secid            6492 security/selinux/hooks.c static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
secid            6494 security/selinux/hooks.c 	return security_sid_to_context(&selinux_state, secid,
secid            6498 security/selinux/hooks.c static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
secid            6501 security/selinux/hooks.c 				       secid, GFP_KERNEL);
secid              23 security/selinux/include/xfrm.h 				     struct xfrm_sec_ctx *polsec, u32 secid);
secid             110 security/selinux/netlabel.c 	    (secattr->attr.secid == sid))
secid             286 security/selinux/netlabel.c 					    ep->secid, &secattr);
secid             333 security/selinux/netlabel.c 	rc = security_netlbl_sid_to_secattr(&selinux_state, req->secid,
secid            3602 security/selinux/ss/services.c 		*sid = secattr->attr.secid;
secid            3675 security/selinux/ss/services.c 	secattr->attr.secid = sid;
secid             344 security/selinux/xfrm.c 				     struct xfrm_sec_ctx *polsec, u32 secid)
secid             354 security/selinux/xfrm.c 	if (secid == 0)
secid             357 security/selinux/xfrm.c 	rc = security_sid_to_context(&selinux_state, secid, &ctx_str,
secid             370 security/selinux/xfrm.c 	ctx->ctx_sid = secid;
secid             592 security/smack/smack_access.c struct smack_known *smack_from_secid(const u32 secid)
secid             598 security/smack/smack_access.c 		if (skp->smk_secid == secid) {
secid            1499 security/smack/smack_lsm.c static void smack_inode_getsecid(struct inode *inode, u32 *secid)
secid            1503 security/smack/smack_lsm.c 	*secid = skp->smk_secid;
secid            1988 security/smack/smack_lsm.c static void smack_cred_getsecid(const struct cred *cred, u32 *secid)
secid            1994 security/smack/smack_lsm.c 	*secid = skp->smk_secid;
secid            2005 security/smack/smack_lsm.c static int smack_kernel_act_as(struct cred *new, u32 secid)
secid            2009 security/smack/smack_lsm.c 	new_tsp->smk_task = smack_from_secid(secid);
secid            2095 security/smack/smack_lsm.c static void smack_task_getsecid(struct task_struct *p, u32 *secid)
secid            2099 security/smack/smack_lsm.c 	*secid = skp->smk_secid;
secid            3240 security/smack/smack_lsm.c static void smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid)
secid            3245 security/smack/smack_lsm.c 	*secid = iskp->smk_secid;
secid            3767 security/smack/smack_lsm.c 		return smack_from_secid(sap->attr.secid);
secid            3984 security/smack/smack_lsm.c 					 struct sk_buff *skb, u32 *secid)
secid            4035 security/smack/smack_lsm.c 	*secid = s;
secid            4392 security/smack/smack_lsm.c static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule)
secid            4405 security/smack/smack_lsm.c 	skp = smack_from_secid(secid);
secid            4445 security/smack/smack_lsm.c static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
secid            4447 security/smack/smack_lsm.c 	struct smack_known *skp = smack_from_secid(secid);
secid            4463 security/smack/smack_lsm.c static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
secid            4468 security/smack/smack_lsm.c 		*secid = skp->smk_secid;
secid            4470 security/smack/smack_lsm.c 		*secid = 0;
secid             188 security/smack/smackfs.c 	nap->secid = skp->smk_secid;