skp 305 security/smack/smack.h void smk_insert_entry(struct smack_known *skp); skp 398 security/smack/smack.h struct smack_known *skp; skp 404 security/smack/smack.h skp = smk_of_task(smack_cred(cred)); skp 408 security/smack/smack.h return skp; skp 402 security/smack/smack_access.c void smk_insert_entry(struct smack_known *skp) skp 407 security/smack/smack_access.c hash = full_name_hash(NULL, skp->smk_known, strlen(skp->smk_known)); skp 410 security/smack/smack_access.c hlist_add_head_rcu(&skp->smk_hashed, head); skp 411 security/smack/smack_access.c list_add_rcu(&skp->list, &smack_known_list); skp 425 security/smack/smack_access.c struct smack_known *skp; skp 430 security/smack/smack_access.c hlist_for_each_entry_rcu(skp, head, smk_hashed) skp 431 security/smack/smack_access.c if (strcmp(skp->smk_known, string) == 0) skp 432 security/smack/smack_access.c return skp; skp 524 security/smack/smack_access.c struct smack_known *skp; skp 535 security/smack/smack_access.c skp = smk_find_entry(smack); skp 536 security/smack/smack_access.c if (skp != NULL) skp 539 security/smack/smack_access.c skp = kzalloc(sizeof(*skp), GFP_NOFS); skp 540 security/smack/smack_access.c if (skp == NULL) { skp 541 security/smack/smack_access.c skp = ERR_PTR(-ENOMEM); skp 545 security/smack/smack_access.c skp->smk_known = smack; skp 546 security/smack/smack_access.c skp->smk_secid = smack_next_secid++; skp 547 security/smack/smack_access.c skp->smk_netlabel.domain = skp->smk_known; skp 548 security/smack/smack_access.c skp->smk_netlabel.flags = skp 556 security/smack/smack_access.c rc = smk_netlbl_mls(smack_cipso_direct, skp->smk_known, skp 557 security/smack/smack_access.c &skp->smk_netlabel, slen); skp 559 security/smack/smack_access.c rc = smk_netlbl_mls(smack_cipso_mapped, (char *)&skp->smk_secid, skp 560 security/smack/smack_access.c &skp->smk_netlabel, sizeof(skp->smk_secid)); skp 563 security/smack/smack_access.c INIT_LIST_HEAD(&skp->smk_rules); skp 564 security/smack/smack_access.c mutex_init(&skp->smk_rules_lock); skp 569 security/smack/smack_access.c smk_insert_entry(skp); skp 575 security/smack/smack_access.c kfree(skp); skp 576 security/smack/smack_access.c skp = ERR_PTR(rc); skp 582 security/smack/smack_access.c return skp; skp 594 security/smack/smack_access.c struct smack_known *skp; skp 597 security/smack/smack_access.c list_for_each_entry_rcu(skp, &smack_known_list, list) { skp 598 security/smack/smack_access.c if (skp->smk_secid == secid) { skp 600 security/smack/smack_access.c return skp; skp 635 security/smack/smack_access.c struct smack_known *skp = tsp->smk_task; skp 650 security/smack/smack_access.c if (sklep->smk_label == skp) { skp 284 security/smack/smack_lsm.c struct smack_known *skp = NULL; skp 295 security/smack/smack_lsm.c skp = ERR_PTR(rc); skp 297 security/smack/smack_lsm.c skp = NULL; skp 299 security/smack/smack_lsm.c skp = smk_import_entry(buffer, rc); skp 303 security/smack/smack_lsm.c return skp; skp 312 security/smack/smack_lsm.c static void init_inode_smack(struct inode *inode, struct smack_known *skp) skp 316 security/smack/smack_lsm.c isp->smk_inode = skp; skp 482 security/smack/smack_lsm.c struct smack_known *skp; skp 484 security/smack/smack_lsm.c skp = smk_of_task_struct(ctp); skp 486 security/smack/smack_lsm.c return smk_ptrace_rule_check(current, skp, mode, __func__); skp 500 security/smack/smack_lsm.c struct smack_known *skp; skp 502 security/smack/smack_lsm.c skp = smk_of_task(smack_cred(current_cred())); skp 504 security/smack/smack_lsm.c rc = smk_ptrace_rule_check(ptp, skp, PTRACE_MODE_ATTACH, __func__); skp 517 security/smack/smack_lsm.c struct smack_known *skp = smk_of_current(); skp 522 security/smack/smack_lsm.c if (smack_syslog_label != NULL && smack_syslog_label != skp) skp 784 security/smack/smack_lsm.c struct smack_known *skp; skp 807 security/smack/smack_lsm.c skp = smk_of_current(); skp 808 security/smack/smack_lsm.c sp->smk_root = skp; skp 809 security/smack/smack_lsm.c sp->smk_default = skp; skp 827 security/smack/smack_lsm.c skp = smk_import_entry(opts->fsdefault, 0); skp 828 security/smack/smack_lsm.c if (IS_ERR(skp)) skp 829 security/smack/smack_lsm.c return PTR_ERR(skp); skp 830 security/smack/smack_lsm.c sp->smk_default = skp; skp 833 security/smack/smack_lsm.c skp = smk_import_entry(opts->fsfloor, 0); skp 834 security/smack/smack_lsm.c if (IS_ERR(skp)) skp 835 security/smack/smack_lsm.c return PTR_ERR(skp); skp 836 security/smack/smack_lsm.c sp->smk_floor = skp; skp 839 security/smack/smack_lsm.c skp = smk_import_entry(opts->fshat, 0); skp 840 security/smack/smack_lsm.c if (IS_ERR(skp)) skp 841 security/smack/smack_lsm.c return PTR_ERR(skp); skp 842 security/smack/smack_lsm.c sp->smk_hat = skp; skp 845 security/smack/smack_lsm.c skp = smk_import_entry(opts->fsroot, 0); skp 846 security/smack/smack_lsm.c if (IS_ERR(skp)) skp 847 security/smack/smack_lsm.c return PTR_ERR(skp); skp 848 security/smack/smack_lsm.c sp->smk_root = skp; skp 851 security/smack/smack_lsm.c skp = smk_import_entry(opts->fstransmute, 0); skp 852 security/smack/smack_lsm.c if (IS_ERR(skp)) skp 853 security/smack/smack_lsm.c return PTR_ERR(skp); skp 854 security/smack/smack_lsm.c sp->smk_root = skp; skp 964 security/smack/smack_lsm.c struct smack_known *skp = smk_of_current(); skp 966 security/smack/smack_lsm.c init_inode_smack(inode, skp); skp 986 security/smack/smack_lsm.c struct smack_known *skp = smk_of_current(); skp 996 security/smack/smack_lsm.c may = smk_access_entry(skp->smk_known, dsp->smk_known, skp 997 security/smack/smack_lsm.c &skp->smk_rules); skp 1257 security/smack/smack_lsm.c struct smack_known *skp; skp 1288 security/smack/smack_lsm.c skp = size ? smk_import_entry(value, size) : NULL; skp 1289 security/smack/smack_lsm.c if (IS_ERR(skp)) skp 1290 security/smack/smack_lsm.c rc = PTR_ERR(skp); skp 1291 security/smack/smack_lsm.c else if (skp == NULL || (check_star && skp 1292 security/smack/smack_lsm.c (skp == &smack_known_star || skp == &smack_known_web))) skp 1321 security/smack/smack_lsm.c struct smack_known *skp; skp 1330 security/smack/smack_lsm.c skp = smk_import_entry(value, size); skp 1331 security/smack/smack_lsm.c if (!IS_ERR(skp)) skp 1332 security/smack/smack_lsm.c isp->smk_inode = skp; skp 1334 security/smack/smack_lsm.c skp = smk_import_entry(value, size); skp 1335 security/smack/smack_lsm.c if (!IS_ERR(skp)) skp 1336 security/smack/smack_lsm.c isp->smk_task = skp; skp 1338 security/smack/smack_lsm.c skp = smk_import_entry(value, size); skp 1339 security/smack/smack_lsm.c if (!IS_ERR(skp)) skp 1340 security/smack/smack_lsm.c isp->smk_mmap = skp; skp 1501 security/smack/smack_lsm.c struct smack_known *skp = smk_of_inode(inode); skp 1503 security/smack/smack_lsm.c *secid = skp->smk_secid; skp 1660 security/smack/smack_lsm.c struct smack_known *skp; skp 1688 security/smack/smack_lsm.c skp = smk_of_current(); skp 1697 security/smack/smack_lsm.c list_for_each_entry_rcu(srp, &skp->smk_rules, list) { skp 1785 security/smack/smack_lsm.c struct smack_known *skp; skp 1799 security/smack/smack_lsm.c skp = *blob; skp 1800 security/smack/smack_lsm.c rc = smk_access(skp, tkp, MAY_DELIVER, NULL); skp 1801 security/smack/smack_lsm.c rc = smk_bu_note("sigiotask", skp, tkp, MAY_DELIVER, rc); skp 1811 security/smack/smack_lsm.c smack_log(skp->smk_known, tkp->smk_known, MAY_DELIVER, rc, &ad); skp 1990 security/smack/smack_lsm.c struct smack_known *skp; skp 1993 security/smack/smack_lsm.c skp = smk_of_task(smack_cred(cred)); skp 1994 security/smack/smack_lsm.c *secid = skp->smk_secid; skp 2044 security/smack/smack_lsm.c struct smack_known *skp = smk_of_task_struct(p); skp 2049 security/smack/smack_lsm.c rc = smk_curacc(skp, access, &ad); skp 2097 security/smack/smack_lsm.c struct smack_known *skp = smk_of_task_struct(p); skp 2099 security/smack/smack_lsm.c *secid = skp->smk_secid; skp 2184 security/smack/smack_lsm.c struct smack_known *skp; skp 2207 security/smack/smack_lsm.c skp = smk_of_task(smack_cred(cred)); skp 2208 security/smack/smack_lsm.c rc = smk_access(skp, tkp, MAY_DELIVER, &ad); skp 2209 security/smack/smack_lsm.c rc = smk_bu_note("USB signal", skp, tkp, MAY_DELIVER, rc); skp 2223 security/smack/smack_lsm.c struct smack_known *skp = smk_of_task_struct(p); skp 2225 security/smack/smack_lsm.c isp->smk_inode = skp; skp 2245 security/smack/smack_lsm.c struct smack_known *skp = smk_of_current(); skp 2259 security/smack/smack_lsm.c ssp->smk_in = skp; skp 2260 security/smack/smack_lsm.c ssp->smk_out = skp; skp 2407 security/smack/smack_lsm.c struct smack_known *skp; skp 2426 security/smack/smack_lsm.c skp = ssp->smk_out; skp 2427 security/smack/smack_lsm.c rc = netlbl_sock_setattr(sk, sk->sk_family, &skp->smk_netlabel); skp 2449 security/smack/smack_lsm.c struct smack_known *skp; skp 2468 security/smack/smack_lsm.c skp = ssp->smk_out; skp 2469 security/smack/smack_lsm.c rc = smk_access(skp, hkp, MAY_WRITE, &ad); skp 2470 security/smack/smack_lsm.c rc = smk_bu_note("IPv4 host check", skp, hkp, MAY_WRITE, rc); skp 2617 security/smack/smack_lsm.c struct smack_known *skp = NULL; skp 2622 security/smack/smack_lsm.c skp = smack_ipv6host_label(address); skp 2625 security/smack/smack_lsm.c skp = ssp->smk_out; skp 2632 security/smack/smack_lsm.c if (skp != NULL && object != NULL) skp 2633 security/smack/smack_lsm.c return smk_ipv6_check(skp, object, address, act); skp 2634 security/smack/smack_lsm.c if (skp == NULL) skp 2635 security/smack/smack_lsm.c skp = smack_net_ambient; skp 2643 security/smack/smack_lsm.c return smk_ipv6_check(skp, object, address, act); skp 2663 security/smack/smack_lsm.c return smk_ipv6_check(skp, object, address, act); skp 2681 security/smack/smack_lsm.c struct smack_known *skp; skp 2690 security/smack/smack_lsm.c skp = smk_import_entry(value, size); skp 2691 security/smack/smack_lsm.c if (IS_ERR(skp)) skp 2692 security/smack/smack_lsm.c return PTR_ERR(skp); skp 2695 security/smack/smack_lsm.c nsp->smk_inode = skp; skp 2712 security/smack/smack_lsm.c ssp->smk_in = skp; skp 2714 security/smack/smack_lsm.c ssp->smk_out = skp; skp 3260 security/smack/smack_lsm.c struct smack_known *skp; skp 3405 security/smack/smack_lsm.c skp = smk_fetch(XATTR_NAME_SMACK, inode, dp); skp 3406 security/smack/smack_lsm.c if (!IS_ERR_OR_NULL(skp)) skp 3407 security/smack/smack_lsm.c final = skp; skp 3442 security/smack/smack_lsm.c skp = smk_fetch(XATTR_NAME_SMACKEXEC, inode, dp); skp 3443 security/smack/smack_lsm.c if (IS_ERR(skp) || skp == &smack_known_star || skp 3444 security/smack/smack_lsm.c skp == &smack_known_web) skp 3445 security/smack/smack_lsm.c skp = NULL; skp 3446 security/smack/smack_lsm.c isp->smk_task = skp; skp 3448 security/smack/smack_lsm.c skp = smk_fetch(XATTR_NAME_SMACKMMAP, inode, dp); skp 3449 security/smack/smack_lsm.c if (IS_ERR(skp) || skp == &smack_known_star || skp 3450 security/smack/smack_lsm.c skp == &smack_known_web) skp 3451 security/smack/smack_lsm.c skp = NULL; skp 3452 security/smack/smack_lsm.c isp->smk_mmap = skp; skp 3482 security/smack/smack_lsm.c struct smack_known *skp = smk_of_task_struct(p); skp 3489 security/smack/smack_lsm.c cp = kstrdup(skp->smk_known, GFP_KERNEL); skp 3513 security/smack/smack_lsm.c struct smack_known *skp; skp 3526 security/smack/smack_lsm.c skp = smk_import_entry(value, size); skp 3527 security/smack/smack_lsm.c if (IS_ERR(skp)) skp 3528 security/smack/smack_lsm.c return PTR_ERR(skp); skp 3534 security/smack/smack_lsm.c if (skp == &smack_known_web || skp == &smack_known_star) skp 3540 security/smack/smack_lsm.c if (sklep->smk_label == skp) { skp 3553 security/smack/smack_lsm.c tsp->smk_task = skp; skp 3575 security/smack/smack_lsm.c struct smack_known *skp; skp 3587 security/smack/smack_lsm.c skp = ssp->smk_out; skp 3593 security/smack/smack_lsm.c rc = smk_access(skp, okp, MAY_WRITE, &ad); skp 3594 security/smack/smack_lsm.c rc = smk_bu_note("UDS connect", skp, okp, MAY_WRITE, rc); skp 3597 security/smack/smack_lsm.c skp = ssp->smk_in; skp 3598 security/smack/smack_lsm.c rc = smk_access(okp, skp, MAY_WRITE, &ad); skp 3599 security/smack/smack_lsm.c rc = smk_bu_note("UDS connect", okp, skp, skp 3711 security/smack/smack_lsm.c struct smack_known *skp; skp 3728 security/smack/smack_lsm.c list_for_each_entry_rcu(skp, &smack_known_list, list) { skp 3729 security/smack/smack_lsm.c if (sap->attr.mls.lvl != skp->smk_netlabel.attr.mls.lvl) skp 3735 security/smack/smack_lsm.c if ((skp->smk_netlabel.flags & skp 3744 security/smack/smack_lsm.c skp->smk_netlabel.attr.mls.cat, skp 3757 security/smack/smack_lsm.c return skp; skp 3837 security/smack/smack_lsm.c struct smack_known *skp = NULL; skp 3861 security/smack/smack_lsm.c skp = smack_from_secid(skb->secmark); skp 3872 security/smack/smack_lsm.c skp = smack_from_secattr(&secattr, ssp); skp 3874 security/smack/smack_lsm.c skp = smack_net_ambient; skp 3893 security/smack/smack_lsm.c rc = smk_access(skp, ssp->smk_in, MAY_WRITE, &ad); skp 3894 security/smack/smack_lsm.c rc = smk_bu_note("IPv4 delivery", skp, ssp->smk_in, skp 3907 security/smack/smack_lsm.c skp = smack_from_secid(skb->secmark); skp 3911 security/smack/smack_lsm.c skp = smack_ipv6host_label(&sadd); skp 3912 security/smack/smack_lsm.c if (skp == NULL) skp 3913 security/smack/smack_lsm.c skp = smack_net_ambient; skp 3922 security/smack/smack_lsm.c rc = smk_access(skp, ssp->smk_in, MAY_WRITE, &ad); skp 3923 security/smack/smack_lsm.c rc = smk_bu_note("IPv6 delivery", skp, ssp->smk_in, skp 3989 security/smack/smack_lsm.c struct smack_known *skp; skp 4024 security/smack/smack_lsm.c skp = smack_from_secattr(&secattr, ssp); skp 4025 security/smack/smack_lsm.c s = skp->smk_secid; skp 4052 security/smack/smack_lsm.c struct smack_known *skp = smk_of_current(); skp 4059 security/smack/smack_lsm.c ssp->smk_in = skp; skp 4060 security/smack/smack_lsm.c ssp->smk_out = skp; skp 4077 security/smack/smack_lsm.c struct smack_known *skp; skp 4110 security/smack/smack_lsm.c skp = smack_from_secid(skb->secmark); skp 4118 security/smack/smack_lsm.c skp = smack_from_secattr(&secattr, ssp); skp 4120 security/smack/smack_lsm.c skp = &smack_known_huh; skp 4137 security/smack/smack_lsm.c rc = smk_access(skp, ssp->smk_in, MAY_WRITE, &ad); skp 4138 security/smack/smack_lsm.c rc = smk_bu_note("IPv4 connect", skp, ssp->smk_in, MAY_WRITE, rc); skp 4146 security/smack/smack_lsm.c req->peer_secid = skp->smk_secid; skp 4160 security/smack/smack_lsm.c rc = netlbl_req_setattr(req, &skp->smk_netlabel); skp 4178 security/smack/smack_lsm.c struct smack_known *skp; skp 4181 security/smack/smack_lsm.c skp = smack_from_secid(req->peer_secid); skp 4182 security/smack/smack_lsm.c ssp->smk_packet = skp; skp 4209 security/smack/smack_lsm.c struct smack_known *skp = smk_of_task(smack_cred(cred)); skp 4211 security/smack/smack_lsm.c key->security = skp; skp 4293 security/smack/smack_lsm.c struct smack_known *skp = key->security; skp 4302 security/smack/smack_lsm.c copy = kstrdup(skp->smk_known, GFP_KERNEL); skp 4340 security/smack/smack_lsm.c struct smack_known *skp; skp 4350 security/smack/smack_lsm.c skp = smk_import_entry(rulestr, 0); skp 4351 security/smack/smack_lsm.c if (IS_ERR(skp)) skp 4352 security/smack/smack_lsm.c return PTR_ERR(skp); skp 4354 security/smack/smack_lsm.c *rule = skp->smk_known; skp 4394 security/smack/smack_lsm.c struct smack_known *skp; skp 4405 security/smack/smack_lsm.c skp = smack_from_secid(secid); skp 4413 security/smack/smack_lsm.c return (rule == skp->smk_known); skp 4415 security/smack/smack_lsm.c return (rule != skp->smk_known); skp 4447 security/smack/smack_lsm.c struct smack_known *skp = smack_from_secid(secid); skp 4450 security/smack/smack_lsm.c *secdata = skp->smk_known; skp 4451 security/smack/smack_lsm.c *seclen = strlen(skp->smk_known); skp 4465 security/smack/smack_lsm.c struct smack_known *skp = smk_find_entry(secdata); skp 4467 security/smack/smack_lsm.c if (skp) skp 4468 security/smack/smack_lsm.c *secid = skp->smk_secid; skp 4492 security/smack/smack_lsm.c struct smack_known *skp = smk_of_inode(inode); skp 4494 security/smack/smack_lsm.c *ctx = skp->smk_known; skp 4495 security/smack/smack_lsm.c *ctxlen = strlen(skp->smk_known); skp 4503 security/smack/smack_lsm.c struct smack_known *skp; skp 4519 security/smack/smack_lsm.c skp = isp->smk_inode; skp 4520 security/smack/smack_lsm.c tsp->smk_task = skp; skp 29 security/smack/smack_netfilter.c struct smack_known *skp; skp 33 security/smack/smack_netfilter.c skp = ssp->smk_out; skp 34 security/smack/smack_netfilter.c skb->secmark = skp->smk_secid; skp 47 security/smack/smack_netfilter.c struct smack_known *skp; skp 51 security/smack/smack_netfilter.c skp = ssp->smk_out; skp 52 security/smack/smack_netfilter.c skb->secmark = skp->smk_secid; skp 184 security/smack/smackfs.c struct smack_known *skp = smk_of_current(); skp 188 security/smack/smackfs.c nap->secid = skp->smk_secid; skp 320 security/smack/smackfs.c struct smack_known *skp; skp 334 security/smack/smackfs.c skp = smk_find_entry(cp); skp 336 security/smack/smackfs.c if (skp == NULL) skp 338 security/smack/smackfs.c rule->smk_subject = skp; skp 343 security/smack/smackfs.c skp = smk_find_entry(cp); skp 345 security/smack/smackfs.c if (skp == NULL) skp 347 security/smack/smackfs.c rule->smk_object = skp; skp 621 security/smack/smackfs.c struct smack_known *skp = skp 624 security/smack/smackfs.c list_for_each_entry_rcu(srp, &skp->smk_rules, list) skp 770 security/smack/smackfs.c struct smack_known *skp = skp 772 security/smack/smackfs.c struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; skp 784 security/smack/smackfs.c if (strlen(skp->smk_known) >= SMK_LABELLEN) skp 787 security/smack/smackfs.c seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); skp 834 security/smack/smackfs.c struct smack_known *skp; skp 870 security/smack/smackfs.c skp = smk_import_entry(rule, 0); skp 871 security/smack/smackfs.c if (IS_ERR(skp)) { skp 872 security/smack/smackfs.c rc = PTR_ERR(skp); skp 879 security/smack/smackfs.c rule += strlen(skp->smk_known) + 1; skp 917 security/smack/smackfs.c netlbl_catmap_free(skp->smk_netlabel.attr.mls.cat); skp 918 security/smack/smackfs.c skp->smk_netlabel.attr.mls.cat = ncats.attr.mls.cat; skp 919 security/smack/smackfs.c skp->smk_netlabel.attr.mls.lvl = ncats.attr.mls.lvl; skp 964 security/smack/smackfs.c struct smack_known *skp = skp 966 security/smack/smackfs.c struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; skp 970 security/smack/smackfs.c seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); skp 1047 security/smack/smackfs.c struct smk_net4addr *skp = skp 1051 security/smack/smackfs.c if (skp->smk_label != NULL) skp 1052 security/smack/smackfs.c kp = skp->smk_label->smk_known; skp 1053 security/smack/smackfs.c seq_printf(s, "%pI4/%d %s\n", &skp->smk_host.s_addr, skp 1054 security/smack/smackfs.c skp->smk_masks, kp); skp 1138 security/smack/smackfs.c struct smack_known *skp = NULL; skp 1196 security/smack/smackfs.c skp = smk_import_entry(smack, 0); skp 1197 security/smack/smackfs.c if (IS_ERR(skp)) { skp 1198 security/smack/smackfs.c rc = PTR_ERR(skp); skp 1243 security/smack/smackfs.c snp->smk_label = skp; skp 1258 security/smack/smackfs.c snp->smk_label = skp; skp 1266 security/smack/smackfs.c if (rc == 0 && skp != NULL) skp 1313 security/smack/smackfs.c struct smk_net6addr *skp = skp 1316 security/smack/smackfs.c if (skp->smk_label != NULL) skp 1317 security/smack/smackfs.c seq_printf(s, "%pI6/%d %s\n", &skp->smk_host, skp->smk_masks, skp 1318 security/smack/smackfs.c skp->smk_label->smk_known); skp 1401 security/smack/smackfs.c struct smack_known *skp = NULL; skp 1465 security/smack/smackfs.c skp = smk_import_entry(smack, 0); skp 1466 security/smack/smackfs.c if (IS_ERR(skp)) { skp 1467 security/smack/smackfs.c rc = PTR_ERR(skp); skp 1521 security/smack/smackfs.c snp->smk_label = skp; skp 1525 security/smack/smackfs.c snp->smk_label = skp; skp 1652 security/smack/smackfs.c struct smack_known *skp; skp 1677 security/smack/smackfs.c list_for_each_entry_rcu(skp, &smack_known_list, list) skp 1678 security/smack/smackfs.c if (skp->smk_netlabel.attr.mls.lvl == skp 1680 security/smack/smackfs.c skp->smk_netlabel.attr.mls.lvl = i; skp 1730 security/smack/smackfs.c struct smack_known *skp; skp 1755 security/smack/smackfs.c list_for_each_entry_rcu(skp, &smack_known_list, list) skp 1756 security/smack/smackfs.c if (skp->smk_netlabel.attr.mls.lvl == skp 1758 security/smack/smackfs.c skp->smk_netlabel.attr.mls.lvl = i; skp 1821 security/smack/smackfs.c struct smack_known *skp; skp 1833 security/smack/smackfs.c skp = smk_import_entry(data, count); skp 1834 security/smack/smackfs.c if (IS_ERR(skp)) { skp 1835 security/smack/smackfs.c rc = PTR_ERR(skp); skp 1842 security/smack/smackfs.c smack_net_ambient = skp; skp 1944 security/smack/smackfs.c struct smack_known *skp; skp 1951 security/smack/smackfs.c skp = smk_import_entry(tok, 0); skp 1952 security/smack/smackfs.c if (IS_ERR(skp)) skp 1953 security/smack/smackfs.c return PTR_ERR(skp); skp 1959 security/smack/smackfs.c sklep->smk_label = skp; skp 2081 security/smack/smackfs.c struct smack_known *skp; skp 2100 security/smack/smackfs.c skp = smk_import_entry(data, count); skp 2101 security/smack/smackfs.c if (PTR_ERR(skp) == -EINVAL) skp 2102 security/smack/smackfs.c skp = NULL; skp 2103 security/smack/smackfs.c else if (IS_ERR(skp)) { skp 2104 security/smack/smackfs.c rc = PTR_ERR(skp); skp 2108 security/smack/smackfs.c smack_unconfined = skp; skp 2338 security/smack/smackfs.c struct smack_known *skp = skp 2341 security/smack/smackfs.c list_for_each_entry_rcu(srp, &skp->smk_rules, list) skp 2500 security/smack/smackfs.c struct smack_known *skp; skp 2525 security/smack/smackfs.c skp = smk_find_entry(cp); skp 2526 security/smack/smackfs.c if (skp == NULL) skp 2529 security/smack/smackfs.c rule_list = &skp->smk_rules; skp 2530 security/smack/smackfs.c rule_lock = &skp->smk_rules_lock; skp 2602 security/smack/smackfs.c struct smack_known *skp; skp 2610 security/smack/smackfs.c skp = &smack_known_star; skp 2612 security/smack/smackfs.c skp = smack_syslog_label; skp 2614 security/smack/smackfs.c asize = strlen(skp->smk_known) + 1; skp 2617 security/smack/smackfs.c rc = simple_read_from_buffer(buf, cn, ppos, skp->smk_known, skp 2636 security/smack/smackfs.c struct smack_known *skp; skp 2646 security/smack/smackfs.c skp = smk_import_entry(data, count); skp 2647 security/smack/smackfs.c if (IS_ERR(skp)) skp 2648 security/smack/smackfs.c rc = PTR_ERR(skp); skp 2650 security/smack/smackfs.c smack_syslog_label = skp; skp 2940 security/smack/smackfs.c static int __init smk_preset_netlabel(struct smack_known *skp) skp 2942 security/smack/smackfs.c skp->smk_netlabel.domain = skp->smk_known; skp 2943 security/smack/smackfs.c skp->smk_netlabel.flags = skp 2945 security/smack/smackfs.c return smk_netlbl_mls(smack_cipso_direct, skp->smk_known, skp 2946 security/smack/smackfs.c &skp->smk_netlabel, strlen(skp->smk_known));