Lines Matching refs:tsp

123 	struct task_smack *tsp = current_security();  in smk_bu_current()  local
133 tsp->smk_task->smk_known, oskp->smk_known, in smk_bu_current()
144 struct task_smack *tsp = current_security(); in smk_bu_task() local
155 tsp->smk_task->smk_known, smk_task->smk_known, acc, in smk_bu_task()
166 struct task_smack *tsp = current_security(); in smk_bu_inode() local
185 tsp->smk_task->smk_known, isp->smk_inode->smk_known, acc, in smk_bu_inode()
196 struct task_smack *tsp = current_security(); in smk_bu_file() local
197 struct smack_known *sskp = tsp->smk_task; in smk_bu_file()
226 struct task_smack *tsp = cred->security; in smk_bu_credfile() local
227 struct smack_known *sskp = tsp->smk_task; in smk_bu_credfile()
320 struct task_smack *tsp; in new_task_smack() local
322 tsp = kzalloc(sizeof(struct task_smack), gfp); in new_task_smack()
323 if (tsp == NULL) in new_task_smack()
326 tsp->smk_task = task; in new_task_smack()
327 tsp->smk_forked = forked; in new_task_smack()
328 INIT_LIST_HEAD(&tsp->smk_rules); in new_task_smack()
329 INIT_LIST_HEAD(&tsp->smk_relabel); in new_task_smack()
330 mutex_init(&tsp->smk_rules_lock); in new_task_smack()
332 return tsp; in new_task_smack()
424 struct task_smack *tsp; in smk_ptrace_rule_check() local
434 tsp = __task_cred(tracer)->security; in smk_ptrace_rule_check()
435 tracer_known = smk_of_task(tsp); in smk_ptrace_rule_check()
459 rc = smk_tskacc(tsp, tracee_known, smk_ptrace_mode(mode), saip); in smk_ptrace_rule_check()
966 struct task_smack *tsp = current_security(); in smack_bprm_secureexec() local
968 if (tsp->smk_task != tsp->smk_forked) in smack_bprm_secureexec()
1714 struct task_smack *tsp; in smack_mmap_file() local
1730 tsp = current_security(); in smack_mmap_file()
1753 &tsp->smk_rules); in smack_mmap_file()
1781 &tsp->smk_rules); in smack_mmap_file()
1894 struct task_smack *tsp = cred->security; in smack_file_open() local
1904 rc = smk_access(tsp->smk_task, smk_of_inode(inode), MAY_READ, &ad); in smack_file_open()
1925 struct task_smack *tsp; in smack_cred_alloc_blank() local
1927 tsp = new_task_smack(NULL, NULL, gfp); in smack_cred_alloc_blank()
1928 if (tsp == NULL) in smack_cred_alloc_blank()
1931 cred->security = tsp; in smack_cred_alloc_blank()
1944 struct task_smack *tsp = cred->security; in smack_cred_free() local
1949 if (tsp == NULL) in smack_cred_free()
1953 smk_destroy_label_list(&tsp->smk_relabel); in smack_cred_free()
1955 list_for_each_safe(l, n, &tsp->smk_rules) { in smack_cred_free()
1960 kfree(tsp); in smack_cred_free()
2047 struct task_smack *tsp = new->security; in smack_kernel_create_files_as() local
2049 tsp->smk_forked = isp->smk_inode; in smack_kernel_create_files_as()
2050 tsp->smk_task = tsp->smk_forked; in smack_kernel_create_files_as()
3590 struct task_smack *tsp = current_security(); in smack_setprocattr() local
3603 if (!smack_privileged(CAP_MAC_ADMIN) && list_empty(&tsp->smk_relabel)) in smack_setprocattr()
3624 list_for_each_entry(sklep, &tsp->smk_relabel, list) in smack_setprocattr()
3637 tsp = new->security; in smack_setprocattr()
3638 tsp->smk_task = skp; in smack_setprocattr()
3642 smk_destroy_label_list(&tsp->smk_relabel); in smack_setprocattr()
4761 struct task_smack *tsp; in smack_init() local
4770 tsp = new_task_smack(&smack_known_floor, &smack_known_floor, in smack_init()
4772 if (tsp == NULL) { in smack_init()
4794 cred->security = tsp; in smack_init()