Lines Matching refs:tsec

178 	struct task_security_struct *tsec;  in cred_init_security()  local
180 tsec = kzalloc(sizeof(struct task_security_struct), GFP_KERNEL); in cred_init_security()
181 if (!tsec) in cred_init_security()
184 tsec->osid = tsec->sid = SECINITSID_KERNEL; in cred_init_security()
185 cred->security = tsec; in cred_init_security()
193 const struct task_security_struct *tsec; in cred_sid() local
195 tsec = cred->security; in cred_sid()
196 return tsec->sid; in cred_sid()
217 const struct task_security_struct *tsec = current_security(); in current_sid() local
219 return tsec->sid; in current_sid()
370 const struct task_security_struct *tsec = cred->security; in may_context_mount_sb_relabel() local
373 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_sb_relabel()
378 rc = avc_has_perm(tsec->sid, sid, SECCLASS_FILESYSTEM, in may_context_mount_sb_relabel()
387 const struct task_security_struct *tsec = cred->security; in may_context_mount_inode_relabel() local
389 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_inode_relabel()
1693 const struct task_security_struct *tsec = current_security(); in may_create() local
1703 sid = tsec->sid; in may_create()
1704 newsid = tsec->create_sid; in may_create()
2308 const struct task_security_struct *tsec = current_security(); in selinux_bprm_secureexec() local
2312 sid = tsec->sid; in selinux_bprm_secureexec()
2313 osid = tsec->osid; in selinux_bprm_secureexec()
2431 const struct task_security_struct *tsec = current_security(); in selinux_bprm_committed_creds() local
2436 osid = tsec->osid; in selinux_bprm_committed_creds()
2437 sid = tsec->sid; in selinux_bprm_committed_creds()
2728 struct task_security_struct *tsec; in selinux_dentry_init_security() local
2735 tsec = cred->security; in selinux_dentry_init_security()
2739 if (tsec->create_sid && sbsec->behavior != SECURITY_FS_USE_MNTPOINT) { in selinux_dentry_init_security()
2740 newsid = tsec->create_sid; in selinux_dentry_init_security()
2742 rc = security_transition_sid(tsec->sid, dsec->sid, in selinux_dentry_init_security()
2762 const struct task_security_struct *tsec = current_security(); in selinux_inode_init_security() local
2772 sid = tsec->sid; in selinux_inode_init_security()
2773 newsid = tsec->create_sid; in selinux_inode_init_security()
3508 struct task_security_struct *tsec; in selinux_cred_alloc_blank() local
3510 tsec = kzalloc(sizeof(struct task_security_struct), gfp); in selinux_cred_alloc_blank()
3511 if (!tsec) in selinux_cred_alloc_blank()
3514 cred->security = tsec; in selinux_cred_alloc_blank()
3523 struct task_security_struct *tsec = cred->security; in selinux_cred_free() local
3531 kfree(tsec); in selinux_cred_free()
3541 struct task_security_struct *tsec; in selinux_cred_prepare() local
3545 tsec = kmemdup(old_tsec, sizeof(struct task_security_struct), gfp); in selinux_cred_prepare()
3546 if (!tsec) in selinux_cred_prepare()
3549 new->security = tsec; in selinux_cred_prepare()
3559 struct task_security_struct *tsec = new->security; in selinux_cred_transfer() local
3561 *tsec = *old_tsec; in selinux_cred_transfer()
3570 struct task_security_struct *tsec = new->security; in selinux_kernel_act_as() local
3579 tsec->sid = secid; in selinux_kernel_act_as()
3580 tsec->create_sid = 0; in selinux_kernel_act_as()
3581 tsec->keycreate_sid = 0; in selinux_kernel_act_as()
3582 tsec->sockcreate_sid = 0; in selinux_kernel_act_as()
3594 struct task_security_struct *tsec = new->security; in selinux_kernel_create_files_as() local
3604 tsec->create_sid = isec->sid; in selinux_kernel_create_files_as()
4000 static int socket_sockcreate_sid(const struct task_security_struct *tsec, in socket_sockcreate_sid() argument
4003 if (tsec->sockcreate_sid > SECSID_NULL) { in socket_sockcreate_sid()
4004 *socksid = tsec->sockcreate_sid; in socket_sockcreate_sid()
4008 return security_transition_sid(tsec->sid, tsec->sid, secclass, NULL, in socket_sockcreate_sid()
4032 const struct task_security_struct *tsec = current_security(); in selinux_socket_create() local
4041 rc = socket_sockcreate_sid(tsec, secclass, &newsid); in selinux_socket_create()
4045 return avc_has_perm(tsec->sid, newsid, secclass, SOCKET__CREATE, NULL); in selinux_socket_create()
4051 const struct task_security_struct *tsec = current_security(); in selinux_socket_post_create() local
4061 err = socket_sockcreate_sid(tsec, isec->sclass, &(isec->sid)); in selinux_socket_post_create()
5595 struct task_security_struct *tsec; in selinux_setprocattr() local
5670 tsec = new->security; in selinux_setprocattr()
5672 tsec->exec_sid = sid; in selinux_setprocattr()
5674 tsec->create_sid = sid; in selinux_setprocattr()
5679 tsec->keycreate_sid = sid; in selinux_setprocattr()
5681 tsec->sockcreate_sid = sid; in selinux_setprocattr()
5690 error = security_bounded_transition(tsec->sid, sid); in selinux_setprocattr()
5696 error = avc_has_perm(tsec->sid, sid, SECCLASS_PROCESS, in selinux_setprocattr()
5717 tsec->sid = sid; in selinux_setprocattr()
5782 const struct task_security_struct *tsec; in selinux_key_alloc() local
5789 tsec = cred->security; in selinux_key_alloc()
5790 if (tsec->keycreate_sid) in selinux_key_alloc()
5791 ksec->sid = tsec->keycreate_sid; in selinux_key_alloc()
5793 ksec->sid = tsec->sid; in selinux_key_alloc()