skp               305 security/smack/smack.h void smk_insert_entry(struct smack_known *skp);
skp               398 security/smack/smack.h 	struct smack_known *skp;
skp               404 security/smack/smack.h 	skp = smk_of_task(smack_cred(cred));
skp               408 security/smack/smack.h 	return skp;
skp               402 security/smack/smack_access.c void smk_insert_entry(struct smack_known *skp)
skp               407 security/smack/smack_access.c 	hash = full_name_hash(NULL, skp->smk_known, strlen(skp->smk_known));
skp               410 security/smack/smack_access.c 	hlist_add_head_rcu(&skp->smk_hashed, head);
skp               411 security/smack/smack_access.c 	list_add_rcu(&skp->list, &smack_known_list);
skp               425 security/smack/smack_access.c 	struct smack_known *skp;
skp               430 security/smack/smack_access.c 	hlist_for_each_entry_rcu(skp, head, smk_hashed)
skp               431 security/smack/smack_access.c 		if (strcmp(skp->smk_known, string) == 0)
skp               432 security/smack/smack_access.c 			return skp;
skp               524 security/smack/smack_access.c 	struct smack_known *skp;
skp               535 security/smack/smack_access.c 	skp = smk_find_entry(smack);
skp               536 security/smack/smack_access.c 	if (skp != NULL)
skp               539 security/smack/smack_access.c 	skp = kzalloc(sizeof(*skp), GFP_NOFS);
skp               540 security/smack/smack_access.c 	if (skp == NULL) {
skp               541 security/smack/smack_access.c 		skp = ERR_PTR(-ENOMEM);
skp               545 security/smack/smack_access.c 	skp->smk_known = smack;
skp               546 security/smack/smack_access.c 	skp->smk_secid = smack_next_secid++;
skp               547 security/smack/smack_access.c 	skp->smk_netlabel.domain = skp->smk_known;
skp               548 security/smack/smack_access.c 	skp->smk_netlabel.flags =
skp               556 security/smack/smack_access.c 		rc = smk_netlbl_mls(smack_cipso_direct, skp->smk_known,
skp               557 security/smack/smack_access.c 			       &skp->smk_netlabel, slen);
skp               559 security/smack/smack_access.c 		rc = smk_netlbl_mls(smack_cipso_mapped, (char *)&skp->smk_secid,
skp               560 security/smack/smack_access.c 			       &skp->smk_netlabel, sizeof(skp->smk_secid));
skp               563 security/smack/smack_access.c 		INIT_LIST_HEAD(&skp->smk_rules);
skp               564 security/smack/smack_access.c 		mutex_init(&skp->smk_rules_lock);
skp               569 security/smack/smack_access.c 		smk_insert_entry(skp);
skp               575 security/smack/smack_access.c 	kfree(skp);
skp               576 security/smack/smack_access.c 	skp = ERR_PTR(rc);
skp               582 security/smack/smack_access.c 	return skp;
skp               594 security/smack/smack_access.c 	struct smack_known *skp;
skp               597 security/smack/smack_access.c 	list_for_each_entry_rcu(skp, &smack_known_list, list) {
skp               598 security/smack/smack_access.c 		if (skp->smk_secid == secid) {
skp               600 security/smack/smack_access.c 			return skp;
skp               635 security/smack/smack_access.c 	struct smack_known *skp = tsp->smk_task;
skp               650 security/smack/smack_access.c 		if (sklep->smk_label == skp) {
skp               284 security/smack/smack_lsm.c 	struct smack_known *skp = NULL;
skp               295 security/smack/smack_lsm.c 		skp = ERR_PTR(rc);
skp               297 security/smack/smack_lsm.c 		skp = NULL;
skp               299 security/smack/smack_lsm.c 		skp = smk_import_entry(buffer, rc);
skp               303 security/smack/smack_lsm.c 	return skp;
skp               312 security/smack/smack_lsm.c static void init_inode_smack(struct inode *inode, struct smack_known *skp)
skp               316 security/smack/smack_lsm.c 	isp->smk_inode = skp;
skp               482 security/smack/smack_lsm.c 	struct smack_known *skp;
skp               484 security/smack/smack_lsm.c 	skp = smk_of_task_struct(ctp);
skp               486 security/smack/smack_lsm.c 	return smk_ptrace_rule_check(current, skp, mode, __func__);
skp               500 security/smack/smack_lsm.c 	struct smack_known *skp;
skp               502 security/smack/smack_lsm.c 	skp = smk_of_task(smack_cred(current_cred()));
skp               504 security/smack/smack_lsm.c 	rc = smk_ptrace_rule_check(ptp, skp, PTRACE_MODE_ATTACH, __func__);
skp               517 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_current();
skp               522 security/smack/smack_lsm.c 	if (smack_syslog_label != NULL && smack_syslog_label != skp)
skp               784 security/smack/smack_lsm.c 	struct smack_known *skp;
skp               807 security/smack/smack_lsm.c 		skp = smk_of_current();
skp               808 security/smack/smack_lsm.c 		sp->smk_root = skp;
skp               809 security/smack/smack_lsm.c 		sp->smk_default = skp;
skp               827 security/smack/smack_lsm.c 			skp = smk_import_entry(opts->fsdefault, 0);
skp               828 security/smack/smack_lsm.c 			if (IS_ERR(skp))
skp               829 security/smack/smack_lsm.c 				return PTR_ERR(skp);
skp               830 security/smack/smack_lsm.c 			sp->smk_default = skp;
skp               833 security/smack/smack_lsm.c 			skp = smk_import_entry(opts->fsfloor, 0);
skp               834 security/smack/smack_lsm.c 			if (IS_ERR(skp))
skp               835 security/smack/smack_lsm.c 				return PTR_ERR(skp);
skp               836 security/smack/smack_lsm.c 			sp->smk_floor = skp;
skp               839 security/smack/smack_lsm.c 			skp = smk_import_entry(opts->fshat, 0);
skp               840 security/smack/smack_lsm.c 			if (IS_ERR(skp))
skp               841 security/smack/smack_lsm.c 				return PTR_ERR(skp);
skp               842 security/smack/smack_lsm.c 			sp->smk_hat = skp;
skp               845 security/smack/smack_lsm.c 			skp = smk_import_entry(opts->fsroot, 0);
skp               846 security/smack/smack_lsm.c 			if (IS_ERR(skp))
skp               847 security/smack/smack_lsm.c 				return PTR_ERR(skp);
skp               848 security/smack/smack_lsm.c 			sp->smk_root = skp;
skp               851 security/smack/smack_lsm.c 			skp = smk_import_entry(opts->fstransmute, 0);
skp               852 security/smack/smack_lsm.c 			if (IS_ERR(skp))
skp               853 security/smack/smack_lsm.c 				return PTR_ERR(skp);
skp               854 security/smack/smack_lsm.c 			sp->smk_root = skp;
skp               964 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_current();
skp               966 security/smack/smack_lsm.c 	init_inode_smack(inode, skp);
skp               986 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_current();
skp               996 security/smack/smack_lsm.c 		may = smk_access_entry(skp->smk_known, dsp->smk_known,
skp               997 security/smack/smack_lsm.c 				       &skp->smk_rules);
skp              1257 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              1288 security/smack/smack_lsm.c 		skp = size ? smk_import_entry(value, size) : NULL;
skp              1289 security/smack/smack_lsm.c 		if (IS_ERR(skp))
skp              1290 security/smack/smack_lsm.c 			rc = PTR_ERR(skp);
skp              1291 security/smack/smack_lsm.c 		else if (skp == NULL || (check_star &&
skp              1292 security/smack/smack_lsm.c 		    (skp == &smack_known_star || skp == &smack_known_web)))
skp              1321 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              1330 security/smack/smack_lsm.c 		skp = smk_import_entry(value, size);
skp              1331 security/smack/smack_lsm.c 		if (!IS_ERR(skp))
skp              1332 security/smack/smack_lsm.c 			isp->smk_inode = skp;
skp              1334 security/smack/smack_lsm.c 		skp = smk_import_entry(value, size);
skp              1335 security/smack/smack_lsm.c 		if (!IS_ERR(skp))
skp              1336 security/smack/smack_lsm.c 			isp->smk_task = skp;
skp              1338 security/smack/smack_lsm.c 		skp = smk_import_entry(value, size);
skp              1339 security/smack/smack_lsm.c 		if (!IS_ERR(skp))
skp              1340 security/smack/smack_lsm.c 			isp->smk_mmap = skp;
skp              1501 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_inode(inode);
skp              1503 security/smack/smack_lsm.c 	*secid = skp->smk_secid;
skp              1660 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              1688 security/smack/smack_lsm.c 	skp = smk_of_current();
skp              1697 security/smack/smack_lsm.c 	list_for_each_entry_rcu(srp, &skp->smk_rules, list) {
skp              1785 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              1799 security/smack/smack_lsm.c 	skp = *blob;
skp              1800 security/smack/smack_lsm.c 	rc = smk_access(skp, tkp, MAY_DELIVER, NULL);
skp              1801 security/smack/smack_lsm.c 	rc = smk_bu_note("sigiotask", skp, tkp, MAY_DELIVER, rc);
skp              1811 security/smack/smack_lsm.c 	smack_log(skp->smk_known, tkp->smk_known, MAY_DELIVER, rc, &ad);
skp              1990 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              1993 security/smack/smack_lsm.c 	skp = smk_of_task(smack_cred(cred));
skp              1994 security/smack/smack_lsm.c 	*secid = skp->smk_secid;
skp              2044 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_task_struct(p);
skp              2049 security/smack/smack_lsm.c 	rc = smk_curacc(skp, access, &ad);
skp              2097 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_task_struct(p);
skp              2099 security/smack/smack_lsm.c 	*secid = skp->smk_secid;
skp              2184 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              2207 security/smack/smack_lsm.c 	skp = smk_of_task(smack_cred(cred));
skp              2208 security/smack/smack_lsm.c 	rc = smk_access(skp, tkp, MAY_DELIVER, &ad);
skp              2209 security/smack/smack_lsm.c 	rc = smk_bu_note("USB signal", skp, tkp, MAY_DELIVER, rc);
skp              2223 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_task_struct(p);
skp              2225 security/smack/smack_lsm.c 	isp->smk_inode = skp;
skp              2245 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_current();
skp              2259 security/smack/smack_lsm.c 		ssp->smk_in = skp;
skp              2260 security/smack/smack_lsm.c 		ssp->smk_out = skp;
skp              2407 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              2426 security/smack/smack_lsm.c 		skp = ssp->smk_out;
skp              2427 security/smack/smack_lsm.c 		rc = netlbl_sock_setattr(sk, sk->sk_family, &skp->smk_netlabel);
skp              2449 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              2468 security/smack/smack_lsm.c 		skp = ssp->smk_out;
skp              2469 security/smack/smack_lsm.c 		rc = smk_access(skp, hkp, MAY_WRITE, &ad);
skp              2470 security/smack/smack_lsm.c 		rc = smk_bu_note("IPv4 host check", skp, hkp, MAY_WRITE, rc);
skp              2617 security/smack/smack_lsm.c 	struct smack_known *skp = NULL;
skp              2622 security/smack/smack_lsm.c 		skp = smack_ipv6host_label(address);
skp              2625 security/smack/smack_lsm.c 		skp = ssp->smk_out;
skp              2632 security/smack/smack_lsm.c 	if (skp != NULL && object != NULL)
skp              2633 security/smack/smack_lsm.c 		return smk_ipv6_check(skp, object, address, act);
skp              2634 security/smack/smack_lsm.c 	if (skp == NULL)
skp              2635 security/smack/smack_lsm.c 		skp = smack_net_ambient;
skp              2643 security/smack/smack_lsm.c 		return smk_ipv6_check(skp, object, address, act);
skp              2663 security/smack/smack_lsm.c 	return smk_ipv6_check(skp, object, address, act);
skp              2681 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              2690 security/smack/smack_lsm.c 	skp = smk_import_entry(value, size);
skp              2691 security/smack/smack_lsm.c 	if (IS_ERR(skp))
skp              2692 security/smack/smack_lsm.c 		return PTR_ERR(skp);
skp              2695 security/smack/smack_lsm.c 		nsp->smk_inode = skp;
skp              2712 security/smack/smack_lsm.c 		ssp->smk_in = skp;
skp              2714 security/smack/smack_lsm.c 		ssp->smk_out = skp;
skp              3260 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              3405 security/smack/smack_lsm.c 		skp = smk_fetch(XATTR_NAME_SMACK, inode, dp);
skp              3406 security/smack/smack_lsm.c 		if (!IS_ERR_OR_NULL(skp))
skp              3407 security/smack/smack_lsm.c 			final = skp;
skp              3442 security/smack/smack_lsm.c 		skp = smk_fetch(XATTR_NAME_SMACKEXEC, inode, dp);
skp              3443 security/smack/smack_lsm.c 		if (IS_ERR(skp) || skp == &smack_known_star ||
skp              3444 security/smack/smack_lsm.c 		    skp == &smack_known_web)
skp              3445 security/smack/smack_lsm.c 			skp = NULL;
skp              3446 security/smack/smack_lsm.c 		isp->smk_task = skp;
skp              3448 security/smack/smack_lsm.c 		skp = smk_fetch(XATTR_NAME_SMACKMMAP, inode, dp);
skp              3449 security/smack/smack_lsm.c 		if (IS_ERR(skp) || skp == &smack_known_star ||
skp              3450 security/smack/smack_lsm.c 		    skp == &smack_known_web)
skp              3451 security/smack/smack_lsm.c 			skp = NULL;
skp              3452 security/smack/smack_lsm.c 		isp->smk_mmap = skp;
skp              3482 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_task_struct(p);
skp              3489 security/smack/smack_lsm.c 	cp = kstrdup(skp->smk_known, GFP_KERNEL);
skp              3513 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              3526 security/smack/smack_lsm.c 	skp = smk_import_entry(value, size);
skp              3527 security/smack/smack_lsm.c 	if (IS_ERR(skp))
skp              3528 security/smack/smack_lsm.c 		return PTR_ERR(skp);
skp              3534 security/smack/smack_lsm.c 	if (skp == &smack_known_web || skp == &smack_known_star)
skp              3540 security/smack/smack_lsm.c 			if (sklep->smk_label == skp) {
skp              3553 security/smack/smack_lsm.c 	tsp->smk_task = skp;
skp              3575 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              3587 security/smack/smack_lsm.c 		skp = ssp->smk_out;
skp              3593 security/smack/smack_lsm.c 		rc = smk_access(skp, okp, MAY_WRITE, &ad);
skp              3594 security/smack/smack_lsm.c 		rc = smk_bu_note("UDS connect", skp, okp, MAY_WRITE, rc);
skp              3597 security/smack/smack_lsm.c 			skp = ssp->smk_in;
skp              3598 security/smack/smack_lsm.c 			rc = smk_access(okp, skp, MAY_WRITE, &ad);
skp              3599 security/smack/smack_lsm.c 			rc = smk_bu_note("UDS connect", okp, skp,
skp              3711 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              3728 security/smack/smack_lsm.c 		list_for_each_entry_rcu(skp, &smack_known_list, list) {
skp              3729 security/smack/smack_lsm.c 			if (sap->attr.mls.lvl != skp->smk_netlabel.attr.mls.lvl)
skp              3735 security/smack/smack_lsm.c 				if ((skp->smk_netlabel.flags &
skp              3744 security/smack/smack_lsm.c 					skp->smk_netlabel.attr.mls.cat,
skp              3757 security/smack/smack_lsm.c 			return skp;
skp              3837 security/smack/smack_lsm.c 	struct smack_known *skp = NULL;
skp              3861 security/smack/smack_lsm.c 			skp = smack_from_secid(skb->secmark);
skp              3872 security/smack/smack_lsm.c 			skp = smack_from_secattr(&secattr, ssp);
skp              3874 security/smack/smack_lsm.c 			skp = smack_net_ambient;
skp              3893 security/smack/smack_lsm.c 		rc = smk_access(skp, ssp->smk_in, MAY_WRITE, &ad);
skp              3894 security/smack/smack_lsm.c 		rc = smk_bu_note("IPv4 delivery", skp, ssp->smk_in,
skp              3907 security/smack/smack_lsm.c 			skp = smack_from_secid(skb->secmark);
skp              3911 security/smack/smack_lsm.c 			skp = smack_ipv6host_label(&sadd);
skp              3912 security/smack/smack_lsm.c 		if (skp == NULL)
skp              3913 security/smack/smack_lsm.c 			skp = smack_net_ambient;
skp              3922 security/smack/smack_lsm.c 		rc = smk_access(skp, ssp->smk_in, MAY_WRITE, &ad);
skp              3923 security/smack/smack_lsm.c 		rc = smk_bu_note("IPv6 delivery", skp, ssp->smk_in,
skp              3989 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              4024 security/smack/smack_lsm.c 			skp = smack_from_secattr(&secattr, ssp);
skp              4025 security/smack/smack_lsm.c 			s = skp->smk_secid;
skp              4052 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_current();
skp              4059 security/smack/smack_lsm.c 	ssp->smk_in = skp;
skp              4060 security/smack/smack_lsm.c 	ssp->smk_out = skp;
skp              4077 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              4110 security/smack/smack_lsm.c 		skp = smack_from_secid(skb->secmark);
skp              4118 security/smack/smack_lsm.c 		skp = smack_from_secattr(&secattr, ssp);
skp              4120 security/smack/smack_lsm.c 		skp = &smack_known_huh;
skp              4137 security/smack/smack_lsm.c 	rc = smk_access(skp, ssp->smk_in, MAY_WRITE, &ad);
skp              4138 security/smack/smack_lsm.c 	rc = smk_bu_note("IPv4 connect", skp, ssp->smk_in, MAY_WRITE, rc);
skp              4146 security/smack/smack_lsm.c 	req->peer_secid = skp->smk_secid;
skp              4160 security/smack/smack_lsm.c 		rc = netlbl_req_setattr(req, &skp->smk_netlabel);
skp              4178 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              4181 security/smack/smack_lsm.c 		skp = smack_from_secid(req->peer_secid);
skp              4182 security/smack/smack_lsm.c 		ssp->smk_packet = skp;
skp              4209 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_task(smack_cred(cred));
skp              4211 security/smack/smack_lsm.c 	key->security = skp;
skp              4293 security/smack/smack_lsm.c 	struct smack_known *skp = key->security;
skp              4302 security/smack/smack_lsm.c 	copy = kstrdup(skp->smk_known, GFP_KERNEL);
skp              4340 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              4350 security/smack/smack_lsm.c 	skp = smk_import_entry(rulestr, 0);
skp              4351 security/smack/smack_lsm.c 	if (IS_ERR(skp))
skp              4352 security/smack/smack_lsm.c 		return PTR_ERR(skp);
skp              4354 security/smack/smack_lsm.c 	*rule = skp->smk_known;
skp              4394 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              4405 security/smack/smack_lsm.c 	skp = smack_from_secid(secid);
skp              4413 security/smack/smack_lsm.c 		return (rule == skp->smk_known);
skp              4415 security/smack/smack_lsm.c 		return (rule != skp->smk_known);
skp              4447 security/smack/smack_lsm.c 	struct smack_known *skp = smack_from_secid(secid);
skp              4450 security/smack/smack_lsm.c 		*secdata = skp->smk_known;
skp              4451 security/smack/smack_lsm.c 	*seclen = strlen(skp->smk_known);
skp              4465 security/smack/smack_lsm.c 	struct smack_known *skp = smk_find_entry(secdata);
skp              4467 security/smack/smack_lsm.c 	if (skp)
skp              4468 security/smack/smack_lsm.c 		*secid = skp->smk_secid;
skp              4492 security/smack/smack_lsm.c 	struct smack_known *skp = smk_of_inode(inode);
skp              4494 security/smack/smack_lsm.c 	*ctx = skp->smk_known;
skp              4495 security/smack/smack_lsm.c 	*ctxlen = strlen(skp->smk_known);
skp              4503 security/smack/smack_lsm.c 	struct smack_known *skp;
skp              4519 security/smack/smack_lsm.c 	skp = isp->smk_inode;
skp              4520 security/smack/smack_lsm.c 	tsp->smk_task = skp;
skp                29 security/smack/smack_netfilter.c 	struct smack_known *skp;
skp                33 security/smack/smack_netfilter.c 		skp = ssp->smk_out;
skp                34 security/smack/smack_netfilter.c 		skb->secmark = skp->smk_secid;
skp                47 security/smack/smack_netfilter.c 	struct smack_known *skp;
skp                51 security/smack/smack_netfilter.c 		skp = ssp->smk_out;
skp                52 security/smack/smack_netfilter.c 		skb->secmark = skp->smk_secid;
skp               184 security/smack/smackfs.c 	struct smack_known *skp = smk_of_current();
skp               188 security/smack/smackfs.c 	nap->secid = skp->smk_secid;
skp               320 security/smack/smackfs.c 	struct smack_known *skp;
skp               334 security/smack/smackfs.c 		skp = smk_find_entry(cp);
skp               336 security/smack/smackfs.c 		if (skp == NULL)
skp               338 security/smack/smackfs.c 		rule->smk_subject = skp;
skp               343 security/smack/smackfs.c 		skp = smk_find_entry(cp);
skp               345 security/smack/smackfs.c 		if (skp == NULL)
skp               347 security/smack/smackfs.c 		rule->smk_object = skp;
skp               621 security/smack/smackfs.c 	struct smack_known *skp =
skp               624 security/smack/smackfs.c 	list_for_each_entry_rcu(srp, &skp->smk_rules, list)
skp               770 security/smack/smackfs.c 	struct smack_known *skp =
skp               772 security/smack/smackfs.c 	struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat;
skp               784 security/smack/smackfs.c 	if (strlen(skp->smk_known) >= SMK_LABELLEN)
skp               787 security/smack/smackfs.c 	seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl);
skp               834 security/smack/smackfs.c 	struct smack_known *skp;
skp               870 security/smack/smackfs.c 	skp = smk_import_entry(rule, 0);
skp               871 security/smack/smackfs.c 	if (IS_ERR(skp)) {
skp               872 security/smack/smackfs.c 		rc = PTR_ERR(skp);
skp               879 security/smack/smackfs.c 		rule += strlen(skp->smk_known) + 1;
skp               917 security/smack/smackfs.c 		netlbl_catmap_free(skp->smk_netlabel.attr.mls.cat);
skp               918 security/smack/smackfs.c 		skp->smk_netlabel.attr.mls.cat = ncats.attr.mls.cat;
skp               919 security/smack/smackfs.c 		skp->smk_netlabel.attr.mls.lvl = ncats.attr.mls.lvl;
skp               964 security/smack/smackfs.c 	struct smack_known *skp =
skp               966 security/smack/smackfs.c 	struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat;
skp               970 security/smack/smackfs.c 	seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl);
skp              1047 security/smack/smackfs.c 	struct smk_net4addr *skp =
skp              1051 security/smack/smackfs.c 	if (skp->smk_label != NULL)
skp              1052 security/smack/smackfs.c 		kp = skp->smk_label->smk_known;
skp              1053 security/smack/smackfs.c 	seq_printf(s, "%pI4/%d %s\n", &skp->smk_host.s_addr,
skp              1054 security/smack/smackfs.c 			skp->smk_masks, kp);
skp              1138 security/smack/smackfs.c 	struct smack_known *skp = NULL;
skp              1196 security/smack/smackfs.c 		skp = smk_import_entry(smack, 0);
skp              1197 security/smack/smackfs.c 		if (IS_ERR(skp)) {
skp              1198 security/smack/smackfs.c 			rc = PTR_ERR(skp);
skp              1243 security/smack/smackfs.c 			snp->smk_label = skp;
skp              1258 security/smack/smackfs.c 		snp->smk_label = skp;
skp              1266 security/smack/smackfs.c 	if (rc == 0 && skp != NULL)
skp              1313 security/smack/smackfs.c 	struct smk_net6addr *skp =
skp              1316 security/smack/smackfs.c 	if (skp->smk_label != NULL)
skp              1317 security/smack/smackfs.c 		seq_printf(s, "%pI6/%d %s\n", &skp->smk_host, skp->smk_masks,
skp              1318 security/smack/smackfs.c 				skp->smk_label->smk_known);
skp              1401 security/smack/smackfs.c 	struct smack_known *skp = NULL;
skp              1465 security/smack/smackfs.c 		skp = smk_import_entry(smack, 0);
skp              1466 security/smack/smackfs.c 		if (IS_ERR(skp)) {
skp              1467 security/smack/smackfs.c 			rc = PTR_ERR(skp);
skp              1521 security/smack/smackfs.c 			snp->smk_label = skp;
skp              1525 security/smack/smackfs.c 		snp->smk_label = skp;
skp              1652 security/smack/smackfs.c 	struct smack_known *skp;
skp              1677 security/smack/smackfs.c 		list_for_each_entry_rcu(skp, &smack_known_list, list)
skp              1678 security/smack/smackfs.c 			if (skp->smk_netlabel.attr.mls.lvl ==
skp              1680 security/smack/smackfs.c 				skp->smk_netlabel.attr.mls.lvl = i;
skp              1730 security/smack/smackfs.c 	struct smack_known *skp;
skp              1755 security/smack/smackfs.c 		list_for_each_entry_rcu(skp, &smack_known_list, list)
skp              1756 security/smack/smackfs.c 			if (skp->smk_netlabel.attr.mls.lvl ==
skp              1758 security/smack/smackfs.c 				skp->smk_netlabel.attr.mls.lvl = i;
skp              1821 security/smack/smackfs.c 	struct smack_known *skp;
skp              1833 security/smack/smackfs.c 	skp = smk_import_entry(data, count);
skp              1834 security/smack/smackfs.c 	if (IS_ERR(skp)) {
skp              1835 security/smack/smackfs.c 		rc = PTR_ERR(skp);
skp              1842 security/smack/smackfs.c 	smack_net_ambient = skp;
skp              1944 security/smack/smackfs.c 	struct smack_known *skp;
skp              1951 security/smack/smackfs.c 		skp = smk_import_entry(tok, 0);
skp              1952 security/smack/smackfs.c 		if (IS_ERR(skp))
skp              1953 security/smack/smackfs.c 			return PTR_ERR(skp);
skp              1959 security/smack/smackfs.c 		sklep->smk_label = skp;
skp              2081 security/smack/smackfs.c 	struct smack_known *skp;
skp              2100 security/smack/smackfs.c 	skp = smk_import_entry(data, count);
skp              2101 security/smack/smackfs.c 	if (PTR_ERR(skp) == -EINVAL)
skp              2102 security/smack/smackfs.c 		skp = NULL;
skp              2103 security/smack/smackfs.c 	else if (IS_ERR(skp)) {
skp              2104 security/smack/smackfs.c 		rc = PTR_ERR(skp);
skp              2108 security/smack/smackfs.c 	smack_unconfined = skp;
skp              2338 security/smack/smackfs.c 	struct smack_known *skp =
skp              2341 security/smack/smackfs.c 	list_for_each_entry_rcu(srp, &skp->smk_rules, list)
skp              2500 security/smack/smackfs.c 	struct smack_known *skp;
skp              2525 security/smack/smackfs.c 	skp = smk_find_entry(cp);
skp              2526 security/smack/smackfs.c 	if (skp == NULL)
skp              2529 security/smack/smackfs.c 	rule_list = &skp->smk_rules;
skp              2530 security/smack/smackfs.c 	rule_lock = &skp->smk_rules_lock;
skp              2602 security/smack/smackfs.c 	struct smack_known *skp;
skp              2610 security/smack/smackfs.c 		skp = &smack_known_star;
skp              2612 security/smack/smackfs.c 		skp = smack_syslog_label;
skp              2614 security/smack/smackfs.c 	asize = strlen(skp->smk_known) + 1;
skp              2617 security/smack/smackfs.c 		rc = simple_read_from_buffer(buf, cn, ppos, skp->smk_known,
skp              2636 security/smack/smackfs.c 	struct smack_known *skp;
skp              2646 security/smack/smackfs.c 	skp = smk_import_entry(data, count);
skp              2647 security/smack/smackfs.c 	if (IS_ERR(skp))
skp              2648 security/smack/smackfs.c 		rc = PTR_ERR(skp);
skp              2650 security/smack/smackfs.c 		smack_syslog_label = skp;
skp              2940 security/smack/smackfs.c static int __init smk_preset_netlabel(struct smack_known *skp)
skp              2942 security/smack/smackfs.c 	skp->smk_netlabel.domain = skp->smk_known;
skp              2943 security/smack/smackfs.c 	skp->smk_netlabel.flags =
skp              2945 security/smack/smackfs.c 	return smk_netlbl_mls(smack_cipso_direct, skp->smk_known,
skp              2946 security/smack/smackfs.c 				&skp->smk_netlabel, strlen(skp->smk_known));