secmark 851 include/linux/skbuff.h __u32 secmark; secmark 4238 include/linux/skbuff.h to->secmark = from->secmark; secmark 4243 include/linux/skbuff.h skb->secmark = 0; secmark 100 include/net/netfilter/nf_conntrack.h u_int32_t secmark; secmark 963 net/core/skbuff.c CHECK_SKB_FIELD(secmark); secmark 1497 net/netfilter/nf_conntrack_core.c ct->secmark = exp->master->secmark; secmark 335 net/netfilter/nf_conntrack_netlink.c ret = security_secid_to_secctx(ct->secmark, &secctx, &len); secmark 625 net/netfilter/nf_conntrack_netlink.c ret = security_secid_to_secctx(ct->secmark, NULL, &len); secmark 773 net/netfilter/nf_conntrack_netlink.c if ((events & (1 << IPCT_SECMARK) || ct->secmark) secmark 2451 net/netfilter/nf_conntrack_netlink.c if (ct->secmark && ctnetlink_dump_secctx(skb, ct) < 0) secmark 179 net/netfilter/nf_conntrack_standalone.c ret = security_secid_to_secctx(ct->secmark, &secctx, &len); secmark 313 net/netfilter/nfnetlink_queue.c if (skb->secmark) secmark 314 net/netfilter/nfnetlink_queue.c security_secid_to_secctx(skb->secmark, secdata, &seclen); secmark 104 net/netfilter/nft_ct.c *dest = ct->secmark; secmark 306 net/netfilter/nft_ct.c if (ct->secmark != value) { secmark 307 net/netfilter/nft_ct.c ct->secmark = value; secmark 157 net/netfilter/nft_meta.c *dest = skb->secmark; secmark 301 net/netfilter/nft_meta.c skb->secmark = value; secmark 644 net/netfilter/nft_meta.c skb->secmark = priv->secid; secmark 34 net/netfilter/xt_CONNSECMARK.c if (skb->secmark) { secmark 39 net/netfilter/xt_CONNSECMARK.c if (ct && !ct->secmark) { secmark 40 net/netfilter/xt_CONNSECMARK.c ct->secmark = skb->secmark; secmark 52 net/netfilter/xt_CONNSECMARK.c if (!skb->secmark) { secmark 57 net/netfilter/xt_CONNSECMARK.c if (ct && ct->secmark) secmark 58 net/netfilter/xt_CONNSECMARK.c skb->secmark = ct->secmark; secmark 31 net/netfilter/xt_SECMARK.c u32 secmark = 0; secmark 36 net/netfilter/xt_SECMARK.c secmark = info->secid; secmark 42 net/netfilter/xt_SECMARK.c skb->secmark = secmark; secmark 155 security/apparmor/include/policy.h struct aa_secmark *secmark; secmark 1030 security/apparmor/lsm.c if (!skb->secmark) secmark 1034 security/apparmor/lsm.c skb->secmark, sk); secmark 1137 security/apparmor/lsm.c if (!skb->secmark) secmark 1141 security/apparmor/lsm.c skb->secmark, sk); secmark 1620 security/apparmor/lsm.c if (!skb->secmark) secmark 1629 security/apparmor/lsm.c skb->secmark, sk)) secmark 190 security/apparmor/net.c static int apparmor_secmark_init(struct aa_secmark *secmark) secmark 194 security/apparmor/net.c if (secmark->label[0] == '*') { secmark 195 security/apparmor/net.c secmark->secid = AA_SECID_WILDCARD; secmark 200 security/apparmor/net.c secmark->label, strlen(secmark->label), secmark 206 security/apparmor/net.c secmark->secid = label->secid; secmark 221 security/apparmor/net.c if (!profile->secmark[i].secid) { secmark 222 security/apparmor/net.c ret = apparmor_secmark_init(&profile->secmark[i]); secmark 227 security/apparmor/net.c if (profile->secmark[i].secid == secid || secmark 228 security/apparmor/net.c profile->secmark[i].secid == AA_SECID_WILDCARD) { secmark 229 security/apparmor/net.c if (profile->secmark[i].deny) secmark 234 security/apparmor/net.c if (profile->secmark[i].audit) secmark 230 security/apparmor/policy.c kzfree(profile->secmark[i].label); secmark 231 security/apparmor/policy.c kzfree(profile->secmark); secmark 580 security/apparmor/policy_unpack.c profile->secmark = kcalloc(size, sizeof(struct aa_secmark), secmark 582 security/apparmor/policy_unpack.c if (!profile->secmark) secmark 588 security/apparmor/policy_unpack.c if (!unpack_u8(e, &profile->secmark[i].audit, NULL)) secmark 590 security/apparmor/policy_unpack.c if (!unpack_u8(e, &profile->secmark[i].deny, NULL)) secmark 592 security/apparmor/policy_unpack.c if (!unpack_strdup(e, &profile->secmark[i].label, NULL)) secmark 604 security/apparmor/policy_unpack.c if (profile->secmark) { secmark 606 security/apparmor/policy_unpack.c kfree(profile->secmark[i].label); secmark 607 security/apparmor/policy_unpack.c kfree(profile->secmark); secmark 609 security/apparmor/policy_unpack.c profile->secmark = NULL; secmark 4978 security/selinux/hooks.c sk_sid, skb->secmark, SECCLASS_PACKET, secmark 5054 security/selinux/hooks.c sk_sid, skb->secmark, SECCLASS_PACKET, secmark 5625 security/selinux/hooks.c peer_sid, skb->secmark, secmark 5738 security/selinux/hooks.c sksec->sid, skb->secmark, secmark 5862 security/selinux/hooks.c peer_sid, skb->secmark, secmark 3860 security/smack/smack_lsm.c if (skb && skb->secmark != 0) { secmark 3861 security/smack/smack_lsm.c skp = smack_from_secid(skb->secmark); secmark 3906 security/smack/smack_lsm.c if (skb && skb->secmark != 0) secmark 3907 security/smack/smack_lsm.c skp = smack_from_secid(skb->secmark); secmark 4012 security/smack/smack_lsm.c s = skb->secmark; secmark 4031 security/smack/smack_lsm.c s = skb->secmark; secmark 4109 security/smack/smack_lsm.c if (skb && skb->secmark != 0) { secmark 4110 security/smack/smack_lsm.c skp = smack_from_secid(skb->secmark); secmark 34 security/smack/smack_netfilter.c skb->secmark = skp->smk_secid; secmark 52 security/smack/smack_netfilter.c skb->secmark = skp->smk_secid;