smk_task          110 security/smack/smack.h 	struct smack_known	*smk_task;	/* label of the task */
smk_task          118 security/smack/smack.h 	struct smack_known	*smk_task;	/* label for access control */
smk_task          392 security/smack/smack.h 	return tsp->smk_task;
smk_task          635 security/smack/smack_access.c 	struct smack_known *skp = tsp->smk_task;
smk_task          151 security/smack/smack_lsm.c 		tsp->smk_task->smk_known, oskp->smk_known,
smk_task          163 security/smack/smack_lsm.c 	struct smack_known *smk_task = smk_of_task_struct(otp);
smk_task          173 security/smack/smack_lsm.c 		tsp->smk_task->smk_known, smk_task->smk_known, acc,
smk_task          203 security/smack/smack_lsm.c 		tsp->smk_task->smk_known, isp->smk_inode->smk_known, acc,
smk_task          215 security/smack/smack_lsm.c 	struct smack_known *sskp = tsp->smk_task;
smk_task          245 security/smack/smack_lsm.c 	struct smack_known *sskp = tsp->smk_task;
smk_task          331 security/smack/smack_lsm.c 	tsp->smk_task = task;
smk_task          915 security/smack/smack_lsm.c 	if (isp->smk_task == NULL || isp->smk_task == bsp->smk_task)
smk_task          920 security/smack/smack_lsm.c 	    isp->smk_task != sbsp->smk_root)
smk_task          931 security/smack/smack_lsm.c 						   isp->smk_task,
smk_task          942 security/smack/smack_lsm.c 	bsp->smk_task = isp->smk_task;
smk_task          946 security/smack/smack_lsm.c 	if (bsp->smk_task != bsp->smk_forked)
smk_task         1336 security/smack/smack_lsm.c 			isp->smk_task = skp;
smk_task         1415 security/smack/smack_lsm.c 		isp->smk_task = NULL;
smk_task         1847 security/smack/smack_lsm.c 		rc = smk_access(tsp->smk_task, ssp->smk_out, MAY_WRITE, &ad);
smk_task         1851 security/smack/smack_lsm.c 		rc = smk_access(ssp->smk_in, tsp->smk_task, MAY_WRITE, &ad);
smk_task         1950 security/smack/smack_lsm.c 	init_task_smack(new_tsp, old_tsp->smk_task, old_tsp->smk_task);
smk_task         1973 security/smack/smack_lsm.c 	new_tsp->smk_task = old_tsp->smk_task;
smk_task         1974 security/smack/smack_lsm.c 	new_tsp->smk_forked = old_tsp->smk_task;
smk_task         2009 security/smack/smack_lsm.c 	new_tsp->smk_task = smack_from_secid(secid);
smk_task         2028 security/smack/smack_lsm.c 	tsp->smk_task = tsp->smk_forked;
smk_task         3446 security/smack/smack_lsm.c 		isp->smk_task = skp;
smk_task         3553 security/smack/smack_lsm.c 	tsp->smk_task = skp;
smk_task         4520 security/smack/smack_lsm.c 	tsp->smk_task = skp;
smk_task         4550 security/smack/smack_lsm.c 	ntsp->smk_task = otsp->smk_task;
smk_task         4559 security/smack/smack_lsm.c 		may = smk_access_entry(otsp->smk_task->smk_known,
smk_task         4561 security/smack/smack_lsm.c 				       &otsp->smk_task->smk_rules);
smk_task         4570 security/smack/smack_lsm.c 			ntsp->smk_task = isp->smk_inode;