Lines Matching refs:tsec

179 	struct task_security_struct *tsec;  in cred_init_security()  local
181 tsec = kzalloc(sizeof(struct task_security_struct), GFP_KERNEL); in cred_init_security()
182 if (!tsec) in cred_init_security()
185 tsec->osid = tsec->sid = SECINITSID_KERNEL; in cred_init_security()
186 cred->security = tsec; in cred_init_security()
194 const struct task_security_struct *tsec; in cred_sid() local
196 tsec = cred->security; in cred_sid()
197 return tsec->sid; in cred_sid()
218 const struct task_security_struct *tsec = current_security(); in current_sid() local
220 return tsec->sid; in current_sid()
382 const struct task_security_struct *tsec = cred->security; in may_context_mount_sb_relabel() local
385 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_sb_relabel()
390 rc = avc_has_perm(tsec->sid, sid, SECCLASS_FILESYSTEM, in may_context_mount_sb_relabel()
399 const struct task_security_struct *tsec = cred->security; in may_context_mount_inode_relabel() local
401 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_inode_relabel()
1722 const struct task_security_struct *tsec = current_security(); in selinux_determine_inode_label() local
1728 tsec->create_sid) { in selinux_determine_inode_label()
1729 *_new_isid = tsec->create_sid; in selinux_determine_inode_label()
1731 return security_transition_sid(tsec->sid, dsec->sid, tclass, in selinux_determine_inode_label()
1743 const struct task_security_struct *tsec = current_security(); in may_create() local
1753 sid = tsec->sid; in may_create()
2320 const struct task_security_struct *tsec = current_security(); in selinux_bprm_secureexec() local
2324 sid = tsec->sid; in selinux_bprm_secureexec()
2325 osid = tsec->osid; in selinux_bprm_secureexec()
2443 const struct task_security_struct *tsec = current_security(); in selinux_bprm_committed_creds() local
2448 osid = tsec->osid; in selinux_bprm_committed_creds()
2449 sid = tsec->sid; in selinux_bprm_committed_creds()
2755 const struct task_security_struct *tsec = current_security(); in selinux_inode_init_security() local
2765 sid = tsec->sid; in selinux_inode_init_security()
2766 newsid = tsec->create_sid; in selinux_inode_init_security()
3542 struct task_security_struct *tsec; in selinux_cred_alloc_blank() local
3544 tsec = kzalloc(sizeof(struct task_security_struct), gfp); in selinux_cred_alloc_blank()
3545 if (!tsec) in selinux_cred_alloc_blank()
3548 cred->security = tsec; in selinux_cred_alloc_blank()
3557 struct task_security_struct *tsec = cred->security; in selinux_cred_free() local
3565 kfree(tsec); in selinux_cred_free()
3575 struct task_security_struct *tsec; in selinux_cred_prepare() local
3579 tsec = kmemdup(old_tsec, sizeof(struct task_security_struct), gfp); in selinux_cred_prepare()
3580 if (!tsec) in selinux_cred_prepare()
3583 new->security = tsec; in selinux_cred_prepare()
3593 struct task_security_struct *tsec = new->security; in selinux_cred_transfer() local
3595 *tsec = *old_tsec; in selinux_cred_transfer()
3604 struct task_security_struct *tsec = new->security; in selinux_kernel_act_as() local
3613 tsec->sid = secid; in selinux_kernel_act_as()
3614 tsec->create_sid = 0; in selinux_kernel_act_as()
3615 tsec->keycreate_sid = 0; in selinux_kernel_act_as()
3616 tsec->sockcreate_sid = 0; in selinux_kernel_act_as()
3628 struct task_security_struct *tsec = new->security; in selinux_kernel_create_files_as() local
3638 tsec->create_sid = isec->sid; in selinux_kernel_create_files_as()
4016 static int socket_sockcreate_sid(const struct task_security_struct *tsec, in socket_sockcreate_sid() argument
4019 if (tsec->sockcreate_sid > SECSID_NULL) { in socket_sockcreate_sid()
4020 *socksid = tsec->sockcreate_sid; in socket_sockcreate_sid()
4024 return security_transition_sid(tsec->sid, tsec->sid, secclass, NULL, in socket_sockcreate_sid()
4048 const struct task_security_struct *tsec = current_security(); in selinux_socket_create() local
4057 rc = socket_sockcreate_sid(tsec, secclass, &newsid); in selinux_socket_create()
4061 return avc_has_perm(tsec->sid, newsid, secclass, SOCKET__CREATE, NULL); in selinux_socket_create()
4067 const struct task_security_struct *tsec = current_security(); in selinux_socket_post_create() local
4077 err = socket_sockcreate_sid(tsec, isec->sclass, &(isec->sid)); in selinux_socket_post_create()
5609 struct task_security_struct *tsec; in selinux_setprocattr() local
5684 tsec = new->security; in selinux_setprocattr()
5686 tsec->exec_sid = sid; in selinux_setprocattr()
5688 tsec->create_sid = sid; in selinux_setprocattr()
5693 tsec->keycreate_sid = sid; in selinux_setprocattr()
5695 tsec->sockcreate_sid = sid; in selinux_setprocattr()
5704 error = security_bounded_transition(tsec->sid, sid); in selinux_setprocattr()
5710 error = avc_has_perm(tsec->sid, sid, SECCLASS_PROCESS, in selinux_setprocattr()
5731 tsec->sid = sid; in selinux_setprocattr()
5796 const struct task_security_struct *tsec; in selinux_key_alloc() local
5803 tsec = cred->security; in selinux_key_alloc()
5804 if (tsec->keycreate_sid) in selinux_key_alloc()
5805 ksec->sid = tsec->keycreate_sid; in selinux_key_alloc()
5807 ksec->sid = tsec->sid; in selinux_key_alloc()