Lines Matching refs:tsp

113 	struct task_smack *tsp = current_security();  in smk_bu_current()  local
123 tsp->smk_task->smk_known, oskp->smk_known, in smk_bu_current()
134 struct task_smack *tsp = current_security(); in smk_bu_task() local
145 tsp->smk_task->smk_known, smk_task->smk_known, acc, in smk_bu_task()
156 struct task_smack *tsp = current_security(); in smk_bu_inode() local
175 tsp->smk_task->smk_known, isp->smk_inode->smk_known, acc, in smk_bu_inode()
186 struct task_smack *tsp = current_security(); in smk_bu_file() local
187 struct smack_known *sskp = tsp->smk_task; in smk_bu_file()
216 struct task_smack *tsp = cred->security; in smk_bu_credfile() local
217 struct smack_known *sskp = tsp->smk_task; in smk_bu_credfile()
306 struct task_smack *tsp; in new_task_smack() local
308 tsp = kzalloc(sizeof(struct task_smack), gfp); in new_task_smack()
309 if (tsp == NULL) in new_task_smack()
312 tsp->smk_task = task; in new_task_smack()
313 tsp->smk_forked = forked; in new_task_smack()
314 INIT_LIST_HEAD(&tsp->smk_rules); in new_task_smack()
315 mutex_init(&tsp->smk_rules_lock); in new_task_smack()
317 return tsp; in new_task_smack()
380 struct task_smack *tsp; in smk_ptrace_rule_check() local
390 tsp = __task_cred(tracer)->security; in smk_ptrace_rule_check()
391 tracer_known = smk_of_task(tsp); in smk_ptrace_rule_check()
415 rc = smk_tskacc(tsp, tracee_known, smk_ptrace_mode(mode), saip); in smk_ptrace_rule_check()
779 struct task_smack *tsp = current_security(); in smack_bprm_secureexec() local
782 if (!ret && (tsp->smk_task != tsp->smk_forked)) in smack_bprm_secureexec()
1526 struct task_smack *tsp; in smack_mmap_file() local
1542 tsp = current_security(); in smack_mmap_file()
1565 &tsp->smk_rules); in smack_mmap_file()
1593 &tsp->smk_rules); in smack_mmap_file()
1703 struct task_smack *tsp = cred->security; in smack_file_open() local
1713 rc = smk_access(tsp->smk_task, smk_of_inode(inode), MAY_READ, &ad); in smack_file_open()
1734 struct task_smack *tsp; in smack_cred_alloc_blank() local
1736 tsp = new_task_smack(NULL, NULL, gfp); in smack_cred_alloc_blank()
1737 if (tsp == NULL) in smack_cred_alloc_blank()
1740 cred->security = tsp; in smack_cred_alloc_blank()
1753 struct task_smack *tsp = cred->security; in smack_cred_free() local
1758 if (tsp == NULL) in smack_cred_free()
1762 list_for_each_safe(l, n, &tsp->smk_rules) { in smack_cred_free()
1767 kfree(tsp); in smack_cred_free()
1849 struct task_smack *tsp = new->security; in smack_kernel_create_files_as() local
1851 tsp->smk_forked = isp->smk_inode; in smack_kernel_create_files_as()
1852 tsp->smk_task = tsp->smk_forked; in smack_kernel_create_files_as()
3309 struct task_smack *tsp; in smack_setprocattr() local
3343 tsp = new->security; in smack_setprocattr()
3344 tsp->smk_task = skp; in smack_setprocattr()
4450 struct task_smack *tsp; in smack_init() local
4461 tsp = new_task_smack(&smack_known_floor, &smack_known_floor, in smack_init()
4463 if (tsp == NULL) { in smack_init()
4474 cred->security = tsp; in smack_init()