secmark           851 include/linux/skbuff.h 	__u32		secmark;
secmark          4238 include/linux/skbuff.h 	to->secmark = from->secmark;
secmark          4243 include/linux/skbuff.h 	skb->secmark = 0;
secmark           100 include/net/netfilter/nf_conntrack.h 	u_int32_t secmark;
secmark           963 net/core/skbuff.c 	CHECK_SKB_FIELD(secmark);
secmark          1497 net/netfilter/nf_conntrack_core.c 			ct->secmark = exp->master->secmark;
secmark           335 net/netfilter/nf_conntrack_netlink.c 	ret = security_secid_to_secctx(ct->secmark, &secctx, &len);
secmark           625 net/netfilter/nf_conntrack_netlink.c 	ret = security_secid_to_secctx(ct->secmark, NULL, &len);
secmark           773 net/netfilter/nf_conntrack_netlink.c 		if ((events & (1 << IPCT_SECMARK) || ct->secmark)
secmark          2451 net/netfilter/nf_conntrack_netlink.c 	if (ct->secmark && ctnetlink_dump_secctx(skb, ct) < 0)
secmark           179 net/netfilter/nf_conntrack_standalone.c 	ret = security_secid_to_secctx(ct->secmark, &secctx, &len);
secmark           313 net/netfilter/nfnetlink_queue.c 	if (skb->secmark)
secmark           314 net/netfilter/nfnetlink_queue.c 		security_secid_to_secctx(skb->secmark, secdata, &seclen);
secmark           104 net/netfilter/nft_ct.c 		*dest = ct->secmark;
secmark           306 net/netfilter/nft_ct.c 		if (ct->secmark != value) {
secmark           307 net/netfilter/nft_ct.c 			ct->secmark = value;
secmark           157 net/netfilter/nft_meta.c 		*dest = skb->secmark;
secmark           301 net/netfilter/nft_meta.c 		skb->secmark = value;
secmark           644 net/netfilter/nft_meta.c 	skb->secmark = priv->secid;
secmark            34 net/netfilter/xt_CONNSECMARK.c 	if (skb->secmark) {
secmark            39 net/netfilter/xt_CONNSECMARK.c 		if (ct && !ct->secmark) {
secmark            40 net/netfilter/xt_CONNSECMARK.c 			ct->secmark = skb->secmark;
secmark            52 net/netfilter/xt_CONNSECMARK.c 	if (!skb->secmark) {
secmark            57 net/netfilter/xt_CONNSECMARK.c 		if (ct && ct->secmark)
secmark            58 net/netfilter/xt_CONNSECMARK.c 			skb->secmark = ct->secmark;
secmark            31 net/netfilter/xt_SECMARK.c 	u32 secmark = 0;
secmark            36 net/netfilter/xt_SECMARK.c 		secmark = info->secid;
secmark            42 net/netfilter/xt_SECMARK.c 	skb->secmark = secmark;
secmark           155 security/apparmor/include/policy.h 	struct aa_secmark *secmark;
secmark          1030 security/apparmor/lsm.c 	if (!skb->secmark)
secmark          1034 security/apparmor/lsm.c 				      skb->secmark, sk);
secmark          1137 security/apparmor/lsm.c 	if (!skb->secmark)
secmark          1141 security/apparmor/lsm.c 				      skb->secmark, sk);
secmark          1620 security/apparmor/lsm.c 	if (!skb->secmark)
secmark          1629 security/apparmor/lsm.c 				    skb->secmark, sk))
secmark           190 security/apparmor/net.c static int apparmor_secmark_init(struct aa_secmark *secmark)
secmark           194 security/apparmor/net.c 	if (secmark->label[0] == '*') {
secmark           195 security/apparmor/net.c 		secmark->secid = AA_SECID_WILDCARD;
secmark           200 security/apparmor/net.c 				    secmark->label, strlen(secmark->label),
secmark           206 security/apparmor/net.c 	secmark->secid = label->secid;
secmark           221 security/apparmor/net.c 		if (!profile->secmark[i].secid) {
secmark           222 security/apparmor/net.c 			ret = apparmor_secmark_init(&profile->secmark[i]);
secmark           227 security/apparmor/net.c 		if (profile->secmark[i].secid == secid ||
secmark           228 security/apparmor/net.c 		    profile->secmark[i].secid == AA_SECID_WILDCARD) {
secmark           229 security/apparmor/net.c 			if (profile->secmark[i].deny)
secmark           234 security/apparmor/net.c 			if (profile->secmark[i].audit)
secmark           230 security/apparmor/policy.c 		kzfree(profile->secmark[i].label);
secmark           231 security/apparmor/policy.c 	kzfree(profile->secmark);
secmark           580 security/apparmor/policy_unpack.c 		profile->secmark = kcalloc(size, sizeof(struct aa_secmark),
secmark           582 security/apparmor/policy_unpack.c 		if (!profile->secmark)
secmark           588 security/apparmor/policy_unpack.c 			if (!unpack_u8(e, &profile->secmark[i].audit, NULL))
secmark           590 security/apparmor/policy_unpack.c 			if (!unpack_u8(e, &profile->secmark[i].deny, NULL))
secmark           592 security/apparmor/policy_unpack.c 			if (!unpack_strdup(e, &profile->secmark[i].label, NULL))
secmark           604 security/apparmor/policy_unpack.c 	if (profile->secmark) {
secmark           606 security/apparmor/policy_unpack.c 			kfree(profile->secmark[i].label);
secmark           607 security/apparmor/policy_unpack.c 		kfree(profile->secmark);
secmark           609 security/apparmor/policy_unpack.c 		profile->secmark = NULL;
secmark          4978 security/selinux/hooks.c 				   sk_sid, skb->secmark, SECCLASS_PACKET,
secmark          5054 security/selinux/hooks.c 				   sk_sid, skb->secmark, SECCLASS_PACKET,
secmark          5625 security/selinux/hooks.c 				 peer_sid, skb->secmark,
secmark          5738 security/selinux/hooks.c 				 sksec->sid, skb->secmark,
secmark          5862 security/selinux/hooks.c 				 peer_sid, skb->secmark,
secmark          3860 security/smack/smack_lsm.c 		if (skb && skb->secmark != 0) {
secmark          3861 security/smack/smack_lsm.c 			skp = smack_from_secid(skb->secmark);
secmark          3906 security/smack/smack_lsm.c 		if (skb && skb->secmark != 0)
secmark          3907 security/smack/smack_lsm.c 			skp = smack_from_secid(skb->secmark);
secmark          4012 security/smack/smack_lsm.c 		s = skb->secmark;
secmark          4031 security/smack/smack_lsm.c 		s = skb->secmark;
secmark          4109 security/smack/smack_lsm.c 	if (skb && skb->secmark != 0) {
secmark          4110 security/smack/smack_lsm.c 		skp = smack_from_secid(skb->secmark);
secmark            34 security/smack/smack_netfilter.c 		skb->secmark = skp->smk_secid;
secmark            52 security/smack/smack_netfilter.c 		skb->secmark = skp->smk_secid;