• Home
  • Raw
  • Download

Lines Matching full:sid

220 	tsec->osid = tsec->sid = SECINITSID_KERNEL;  in cred_init_security()
231 return tsec->sid; in cred_sid()
239 u32 sid; in task_sid() local
242 sid = cred_sid(__task_cred(task)); in task_sid()
244 return sid; in task_sid()
411 static int may_context_mount_sb_relabel(u32 sid, in may_context_mount_sb_relabel() argument
419 tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_sb_relabel()
425 tsec->sid, sid, SECCLASS_FILESYSTEM, in may_context_mount_sb_relabel()
430 static int may_context_mount_inode_relabel(u32 sid, in may_context_mount_inode_relabel() argument
437 tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_inode_relabel()
443 sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_inode_relabel()
583 static int parse_sid(struct super_block *sb, const char *s, u32 *sid) in parse_sid() argument
586 sid, GFP_KERNEL); in parse_sid()
660 if (bad_option(sbsec, FSCONTEXT_MNT, sbsec->sid, in selinux_set_mnt_opts()
678 if (bad_option(sbsec, ROOTCONTEXT_MNT, root_isec->sid, in selinux_set_mnt_opts()
763 sbsec->sid = fscontext_sid; in selinux_set_mnt_opts()
782 sbsec->sid = context_sid; in selinux_set_mnt_opts()
802 root_isec->sid = rootcontext_sid; in selinux_set_mnt_opts()
848 if ((oldflags & FSCONTEXT_MNT) && old->sid != new->sid) in selinux_cmp_sb_context()
857 if (oldroot->sid != newroot->sid) in selinux_cmp_sb_context()
909 newsbsec->sid = oldsbsec->sid; in selinux_sb_clone_mnt_opts()
926 u32 sid = oldsbsec->mntpoint_sid; in selinux_sb_clone_mnt_opts() local
929 newsbsec->sid = sid; in selinux_sb_clone_mnt_opts()
932 newisec->sid = sid; in selinux_sb_clone_mnt_opts()
934 newsbsec->mntpoint_sid = sid; in selinux_sb_clone_mnt_opts()
940 newisec->sid = oldisec->sid; in selinux_sb_clone_mnt_opts()
1038 static int show_sid(struct seq_file *m, u32 sid) in show_sid() argument
1044 rc = security_sid_to_context(&selinux_state, sid, in show_sid()
1074 rc = show_sid(m, sbsec->sid); in selinux_sb_show_options()
1097 rc = show_sid(m, isec->sid); in selinux_sb_show_options()
1296 u32 *sid) in selinux_genfs_get_sid() argument
1320 path, tclass, sid); in selinux_genfs_get_sid()
1323 *sid = SECINITSID_UNLABELED; in selinux_genfs_get_sid()
1332 u32 def_sid, u32 *sid) in inode_doinit_use_xattr() argument
1370 *sid = def_sid; in inode_doinit_use_xattr()
1374 rc = security_context_to_sid_default(&selinux_state, context, rc, sid, in inode_doinit_use_xattr()
1397 u32 task_sid, sid = 0; in inode_doinit_with_dentry() local
1426 sid = isec->sid; in inode_doinit_with_dentry()
1435 sid = sbsec->def_sid; in inode_doinit_with_dentry()
1468 &sid); in inode_doinit_with_dentry()
1474 sid = task_sid; in inode_doinit_with_dentry()
1477 /* Default to the fs SID. */ in inode_doinit_with_dentry()
1478 sid = sbsec->sid; in inode_doinit_with_dentry()
1480 /* Try to obtain a transition SID. */ in inode_doinit_with_dentry()
1481 rc = security_transition_sid(&selinux_state, task_sid, sid, in inode_doinit_with_dentry()
1482 sclass, NULL, &sid); in inode_doinit_with_dentry()
1487 sid = sbsec->mntpoint_sid; in inode_doinit_with_dentry()
1490 /* Default to the fs superblock SID. */ in inode_doinit_with_dentry()
1491 sid = sbsec->sid; in inode_doinit_with_dentry()
1523 sbsec->flags, &sid); in inode_doinit_with_dentry()
1532 sid, &sid); in inode_doinit_with_dentry()
1551 isec->sid = sid; in inode_doinit_with_dentry()
1562 isec->sid = sid; in inode_doinit_with_dentry()
1606 u32 sid = cred_sid(cred); in cred_has_capability() local
1627 sid, sid, sclass, av, 0, &avd); in cred_has_capability()
1630 sid, sid, sclass, av, &avd, rc, &ad, 0); in cred_has_capability()
1646 u32 sid; in inode_has_perm() local
1653 sid = cred_sid(cred); in inode_has_perm()
1657 sid, isec->sid, isec->sclass, perms, adp); in inode_has_perm()
1705 static int bpf_fd_pass(struct file *file, u32 sid);
1713 has the same SID as the process. If av is zero, then
1723 u32 sid = cred_sid(cred); in file_has_perm() local
1729 if (sid != fsec->sid) { in file_has_perm()
1731 sid, fsec->sid, in file_has_perm()
1773 return security_transition_sid(&selinux_state, tsec->sid, in selinux_determine_inode_label()
1774 dsec->sid, tclass, in selinux_determine_inode_label()
1789 u32 sid, newsid; in may_create() local
1796 sid = tsec->sid; in may_create()
1802 sid, dsec->sid, SECCLASS_DIR, in may_create()
1814 sid, newsid, tclass, FILE__CREATE, &ad); in may_create()
1819 newsid, sbsec->sid, in may_create()
1836 u32 sid = current_sid(); in may_link() local
1849 sid, dsec->sid, SECCLASS_DIR, av, &ad); in may_link()
1870 sid, isec->sid, isec->sclass, av, &ad); in may_link()
1881 u32 sid = current_sid(); in may_rename() local
1895 sid, old_dsec->sid, SECCLASS_DIR, in may_rename()
1900 sid, old_isec->sid, in may_rename()
1906 sid, old_isec->sid, in may_rename()
1917 sid, new_dsec->sid, SECCLASS_DIR, av, &ad); in may_rename()
1924 sid, new_isec->sid, in may_rename()
1941 u32 sid = cred_sid(cred); in superblock_has_perm() local
1945 sid, sbsec->sid, SECCLASS_FILESYSTEM, perms, ad); in superblock_has_perm()
2057 u32 sid = cred_sid(to); in selinux_binder_transfer_file() local
2067 if (sid != fsec->sid) { in selinux_binder_transfer_file()
2069 sid, fsec->sid, in selinux_binder_transfer_file()
2078 rc = bpf_fd_pass(file, sid); in selinux_binder_transfer_file()
2088 sid, isec->sid, isec->sclass, file_to_av(file), in selinux_binder_transfer_file()
2095 u32 sid = current_sid(); in selinux_ptrace_access_check() local
2100 sid, csid, SECCLASS_FILE, FILE__READ, NULL); in selinux_ptrace_access_check()
2103 sid, csid, SECCLASS_PROCESS, PROCESS__PTRACE, NULL); in selinux_ptrace_access_check()
2236 u32 sid = 0; in ptrace_parent_sid() local
2242 sid = task_sid(tracer); in ptrace_parent_sid()
2245 return sid; in ptrace_parent_sid()
2260 if (new_tsec->sid == old_tsec->sid) in check_nnp_nosuid()
2276 old_tsec->sid, new_tsec->sid, in check_nnp_nosuid()
2285 * of the permissions of the current SID. in check_nnp_nosuid()
2287 rc = security_bounded_transition(&selinux_state, old_tsec->sid, in check_nnp_nosuid()
2288 new_tsec->sid); in check_nnp_nosuid()
2318 /* Default to the current task SID. */ in selinux_bprm_creds_for_exec()
2319 new_tsec->sid = old_tsec->sid; in selinux_bprm_creds_for_exec()
2320 new_tsec->osid = old_tsec->sid; in selinux_bprm_creds_for_exec()
2328 new_tsec->sid = old_tsec->exec_sid; in selinux_bprm_creds_for_exec()
2329 /* Reset exec SID on execve. */ in selinux_bprm_creds_for_exec()
2338 rc = security_transition_sid(&selinux_state, old_tsec->sid, in selinux_bprm_creds_for_exec()
2339 isec->sid, SECCLASS_PROCESS, NULL, in selinux_bprm_creds_for_exec()
2340 &new_tsec->sid); in selinux_bprm_creds_for_exec()
2345 * Fallback to old SID on NNP or nosuid if not an allowed in selinux_bprm_creds_for_exec()
2350 new_tsec->sid = old_tsec->sid; in selinux_bprm_creds_for_exec()
2356 if (new_tsec->sid == old_tsec->sid) { in selinux_bprm_creds_for_exec()
2358 old_tsec->sid, isec->sid, in selinux_bprm_creds_for_exec()
2365 old_tsec->sid, new_tsec->sid, in selinux_bprm_creds_for_exec()
2371 new_tsec->sid, isec->sid, in selinux_bprm_creds_for_exec()
2379 old_tsec->sid, new_tsec->sid, in selinux_bprm_creds_for_exec()
2387 * changes its SID has the appropriate permit */ in selinux_bprm_creds_for_exec()
2392 ptsid, new_tsec->sid, in selinux_bprm_creds_for_exec()
2407 old_tsec->sid, new_tsec->sid, in selinux_bprm_creds_for_exec()
2480 if (new_tsec->sid == new_tsec->osid) in selinux_bprm_committing_creds()
2483 /* Close files for which the new task SID is not authorized. */ in selinux_bprm_committing_creds()
2486 /* Always clear parent death signal on SID transitions. */ in selinux_bprm_committing_creds()
2489 /* Check whether the new SID can inherit resource limits from the old in selinux_bprm_committing_creds()
2490 * SID. If not, reset all soft limits to the lower of the current in selinux_bprm_committing_creds()
2500 new_tsec->osid, new_tsec->sid, SECCLASS_PROCESS, in selinux_bprm_committing_creds()
2523 u32 osid, sid; in selinux_bprm_committed_creds() local
2527 sid = tsec->sid; in selinux_bprm_committed_creds()
2529 if (sid == osid) in selinux_bprm_committed_creds()
2532 /* Check whether the new SID can inherit signal state from the old SID. in selinux_bprm_committed_creds()
2536 * This must occur _after_ the task SID has been updated so that any in selinux_bprm_committed_creds()
2537 * kill done after the flush will be checked against the new SID. in selinux_bprm_committed_creds()
2540 osid, sid, SECCLASS_PROCESS, PROCESS__SIGINH, NULL); in selinux_bprm_committed_creds()
2556 * wait permission to the new task SID. */ in selinux_bprm_committed_creds()
2576 sbsec->sid = SECINITSID_UNLABELED; in selinux_sb_alloc_security()
2668 u32 sid; in selinux_sb_remount() local
2678 rc = parse_sid(sb, opts->fscontext, &sid); in selinux_sb_remount()
2681 if (bad_option(sbsec, FSCONTEXT_MNT, sbsec->sid, sid)) in selinux_sb_remount()
2685 rc = parse_sid(sb, opts->context, &sid); in selinux_sb_remount()
2688 if (bad_option(sbsec, CONTEXT_MNT, sbsec->mntpoint_sid, sid)) in selinux_sb_remount()
2694 rc = parse_sid(sb, opts->rootcontext, &sid); in selinux_sb_remount()
2697 if (bad_option(sbsec, ROOTCONTEXT_MNT, root_isec->sid, sid)) in selinux_sb_remount()
2701 rc = parse_sid(sb, opts->defcontext, &sid); in selinux_sb_remount()
2704 if (bad_option(sbsec, DEFCONTEXT_MNT, sbsec->def_sid, sid)) in selinux_sb_remount()
2836 u32 sid = current_sid(); in selinux_inode_alloc_security() local
2841 isec->sid = SECINITSID_UNLABELED; in selinux_inode_alloc_security()
2843 isec->task_sid = sid; in selinux_inode_alloc_security()
2918 isec->sid = newsid; in selinux_inode_init_security()
2995 u32 sid; in selinux_inode_follow_link() local
3001 sid = cred_sid(cred); in selinux_inode_follow_link()
3007 sid, isec->sid, isec->sclass, FILE__READ, &ad, in selinux_inode_follow_link()
3023 current_sid(), isec->sid, isec->sclass, perms, in audit_inode_permission()
3037 u32 sid; in selinux_inode_permission() local
3056 sid = cred_sid(cred); in selinux_inode_permission()
3062 sid, isec->sid, isec->sclass, perms, in selinux_inode_permission()
3133 u32 newsid, sid = current_sid(); in selinux_inode_setxattr() local
3161 sid, isec->sid, isec->sclass, in selinux_inode_setxattr()
3200 sid, newsid, isec->sclass, in selinux_inode_setxattr()
3205 rc = security_validate_transition(&selinux_state, isec->sid, newsid, in selinux_inode_setxattr()
3206 sid, isec->sclass); in selinux_inode_setxattr()
3212 sbsec->sid, in selinux_inode_setxattr()
3244 pr_err("SELinux: unable to map context to SID" in selinux_inode_post_setxattr()
3253 isec->sid = newsid; in selinux_inode_post_setxattr()
3370 isec->sid, &context, in selinux_inode_getsecurity()
3373 error = security_sid_to_context(&selinux_state, isec->sid, in selinux_inode_getsecurity()
3411 isec->sid = newsid; in selinux_inode_setsecurity()
3432 *secid = isec->sid; in selinux_inode_getsecid()
3437 u32 sid; in selinux_inode_copy_up() local
3449 selinux_inode_getsecid(d_inode(src), &sid); in selinux_inode_copy_up()
3450 tsec->create_sid = sid; in selinux_inode_copy_up()
3512 rc = security_transition_sid(&selinux_state, tsec->sid, in selinux_kernfs_init_security()
3551 u32 sid = current_sid(); in selinux_file_permission() local
3558 if (sid == fsec->sid && fsec->isid == isec->sid && in selinux_file_permission()
3569 u32 sid = current_sid(); in selinux_file_alloc_security() local
3571 fsec->sid = sid; in selinux_file_alloc_security()
3572 fsec->fown_sid = sid; in selinux_file_alloc_security()
3599 if (ssid != fsec->sid) { in ioctl_has_perm()
3601 ssid, fsec->sid, in ioctl_has_perm()
3614 ssid, isec->sid, isec->sclass, in ioctl_has_perm()
3699 u32 sid = cred_sid(cred); in file_map_prot_check() local
3711 sid, sid, SECCLASS_PROCESS, in file_map_prot_check()
3740 u32 sid = current_sid(); in selinux_mmap_addr() local
3742 sid, sid, SECCLASS_MEMPROTECT, in selinux_mmap_addr()
3776 u32 sid = cred_sid(cred); in selinux_file_mprotect() local
3787 sid, sid, SECCLASS_PROCESS, in selinux_file_mprotect()
3794 sid, sid, SECCLASS_PROCESS, in selinux_file_mprotect()
3872 u32 sid = task_sid(tsk); in selinux_file_send_sigiotask() local
3887 fsec->fown_sid, sid, in selinux_file_send_sigiotask()
3910 * struct as its SID. in selinux_file_open()
3912 fsec->isid = isec->sid; in selinux_file_open()
3930 u32 sid = current_sid(); in selinux_task_alloc() local
3933 sid, sid, SECCLASS_PROCESS, PROCESS__FORK, NULL); in selinux_task_alloc()
3972 u32 sid = current_sid(); in selinux_kernel_act_as() local
3976 sid, secid, in selinux_kernel_act_as()
3981 tsec->sid = secid; in selinux_kernel_act_as()
3997 u32 sid = current_sid(); in selinux_kernel_create_files_as() local
4001 sid, isec->sid, in selinux_kernel_create_files_as()
4007 tsec->create_sid = isec->sid; in selinux_kernel_create_files_as()
4028 u32 sid = current_sid(); in selinux_kernel_module_from_file() local
4034 sid, sid, SECCLASS_SYSTEM, in selinux_kernel_module_from_file()
4043 if (sid != fsec->sid) { in selinux_kernel_module_from_file()
4045 sid, fsec->sid, SECCLASS_FD, FD__USE, &ad); in selinux_kernel_module_from_file()
4052 sid, isec->sid, SECCLASS_SYSTEM, in selinux_kernel_module_from_file()
4210 u32 sid = task_sid(p); in selinux_task_to_inode() local
4214 isec->sid = sid; in selinux_task_to_inode()
4449 * @sid: the packet's peer label SID
4453 * the peer label/SID for the packet; most of the magic actually occurs in
4455 * returns zero if the value in @sid is valid (although it may be SECSID_NULL)
4456 * or -EACCES if @sid is invalid due to inconsistencies with the different
4460 static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid) in selinux_skb_peerlbl_sid() argument
4475 nlbl_type, xfrm_sid, sid); in selinux_skb_peerlbl_sid()
4488 * @sk_sid: the parent socket's SID
4489 * @skb_sid: the packet's SID
4490 * @conn_sid: the resulting connection SID
4521 return security_transition_sid(&selinux_state, tsec->sid, tsec->sid, in socket_sockcreate_sid()
4531 if (sksec->sid == SECINITSID_KERNEL) in sock_has_perm()
4539 current_sid(), sksec->sid, sksec->sclass, perms, in sock_has_perm()
4560 tsec->sid, newsid, secclass, SOCKET__CREATE, NULL); in selinux_socket_create()
4570 u32 sid = SECINITSID_KERNEL; in selinux_socket_post_create() local
4574 err = socket_sockcreate_sid(tsec, sclass, &sid); in selinux_socket_post_create()
4580 isec->sid = sid; in selinux_socket_post_create()
4586 sksec->sid = sid; in selinux_socket_post_create()
4603 sksec_a->peer_sid = sksec_b->sid; in selinux_socket_socketpair()
4604 sksec_b->peer_sid = sksec_a->sid; in selinux_socket_socketpair()
4634 u32 sid, node_perm; in selinux_socket_bind() local
4693 snum, &sid); in selinux_socket_bind()
4697 sksec->sid, sid, in selinux_socket_bind()
4727 err = sel_netnode_sid(addrp, family_sa, &sid); in selinux_socket_bind()
4737 sksec->sid, sid, in selinux_socket_bind()
4785 u32 sid, perm; in selinux_socket_connect_helper() local
4815 err = sel_netport_sid(sk->sk_protocol, snum, &sid); in selinux_socket_connect_helper()
4836 sksec->sid, sid, sksec->sclass, perm, &ad); in selinux_socket_connect_helper()
4869 u32 sid; in selinux_socket_accept() local
4878 sid = isec->sid; in selinux_socket_accept()
4883 newisec->sid = sid; in selinux_socket_accept()
4949 sksec_sock->sid, sksec_other->sid, in selinux_socket_unix_stream_connect()
4956 sksec_new->peer_sid = sksec_sock->sid; in selinux_socket_unix_stream_connect()
4957 err = security_sid_mls_copy(&selinux_state, sksec_other->sid, in selinux_socket_unix_stream_connect()
4958 sksec_sock->sid, &sksec_new->sid); in selinux_socket_unix_stream_connect()
4963 sksec_sock->peer_sid = sksec_new->sid; in selinux_socket_unix_stream_connect()
4981 ssec->sid, osec->sid, osec->sclass, SOCKET__SENDTO, in selinux_socket_unix_may_send()
5015 u32 sk_sid = sksec->sid; in selinux_sock_rcv_skb_compat()
5039 err = selinux_xfrm_sock_rcv_skb(sksec->sid, skb, &ad); in selinux_sock_rcv_skb_compat()
5049 u32 sk_sid = sksec->sid; in selinux_socket_sock_rcv_skb()
5168 peer_secid = isec->sid; in selinux_socket_getpeersec_dgram()
5188 sksec->sid = SECINITSID_UNLABELED; in selinux_sk_alloc_security()
5210 newsksec->sid = sksec->sid; in selinux_sk_clone_security()
5224 *secid = sksec->sid; in selinux_sk_getsecid()
5236 isec->sid = sksec->sid; in selinux_sock_graft()
5276 /* Here as first association on socket. As the peer SID in selinux_sctp_assoc_request()
5279 * peer SID for getpeercon(3). in selinux_sctp_assoc_request()
5302 err = selinux_conn_sid(sksec->sid, peer_sid, &conn_sid); in selinux_sctp_assoc_request()
5407 newsksec->sid = ep->secid; in selinux_sctp_sk_clone()
5425 err = selinux_conn_sid(sksec->sid, peersid, &connsid); in selinux_inet_conn_request()
5439 newsksec->sid = req->secid; in selinux_inet_csk_clone()
5441 /* NOTE: Ideally, we should also get the isec->sid for the in selinux_inet_csk_clone()
5463 static int selinux_secmark_relabel_packet(u32 sid) in selinux_secmark_relabel_packet() argument
5469 tsid = __tsec->sid; in selinux_secmark_relabel_packet()
5472 tsid, sid, SECCLASS_PACKET, PACKET__RELABELTO, in selinux_secmark_relabel_packet()
5499 tunsec->sid = current_sid(); in selinux_tun_dev_alloc_security()
5512 u32 sid = current_sid(); in selinux_tun_dev_create() local
5514 /* we aren't taking into account the "sockcreate" SID since the socket in selinux_tun_dev_create()
5522 sid, sid, SECCLASS_TUN_SOCKET, TUN_SOCKET__CREATE, in selinux_tun_dev_create()
5531 current_sid(), tunsec->sid, SECCLASS_TUN_SOCKET, in selinux_tun_dev_attach_queue()
5547 sksec->sid = tunsec->sid; in selinux_tun_dev_attach()
5556 u32 sid = current_sid(); in selinux_tun_dev_open() local
5560 sid, tunsec->sid, SECCLASS_TUN_SOCKET, in selinux_tun_dev_open()
5565 sid, sid, SECCLASS_TUN_SOCKET, in selinux_tun_dev_open()
5569 tunsec->sid = sid; in selinux_tun_dev_open()
5654 u32 sid; in selinux_ip_output() local
5683 sid = sksec->sid; in selinux_ip_output()
5685 sid = SECINITSID_KERNEL; in selinux_ip_output()
5686 if (selinux_netlbl_skbuff_setsid(skb, family, sid) != 0) in selinux_ip_output()
5732 sksec->sid, skb->secmark, in selinux_ip_postroute_compat()
5736 if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto)) in selinux_ip_postroute_compat()
5836 if (selinux_conn_sid(sksec->sid, skb_sid, &peer_sid)) in selinux_ip_postroute()
5843 peer_sid = sksec->sid; in selinux_ip_postroute()
5961 isec->sid = current_sid(); in ipc_init_security()
5969 u32 sid = current_sid(); in ipc_has_perm() local
5977 sid, isec->sid, isec->sclass, perms, &ad); in ipc_has_perm()
5985 msec->sid = SECINITSID_UNLABELED; in selinux_msg_msg_alloc_security()
5995 u32 sid = current_sid(); in selinux_msg_queue_alloc_security() local
6005 sid, isec->sid, SECCLASS_MSGQ, in selinux_msg_queue_alloc_security()
6014 u32 sid = current_sid(); in selinux_msg_queue_associate() local
6022 sid, isec->sid, SECCLASS_MSGQ, in selinux_msg_queue_associate()
6062 u32 sid = current_sid(); in selinux_msg_queue_msgsnd() local
6071 if (msec->sid == SECINITSID_UNLABELED) { in selinux_msg_queue_msgsnd()
6073 * Compute new sid based on current process and in selinux_msg_queue_msgsnd()
6076 rc = security_transition_sid(&selinux_state, sid, isec->sid, in selinux_msg_queue_msgsnd()
6077 SECCLASS_MSG, NULL, &msec->sid); in selinux_msg_queue_msgsnd()
6087 sid, isec->sid, SECCLASS_MSGQ, in selinux_msg_queue_msgsnd()
6092 sid, msec->sid, SECCLASS_MSG, in selinux_msg_queue_msgsnd()
6097 msec->sid, isec->sid, SECCLASS_MSGQ, in selinux_msg_queue_msgsnd()
6110 u32 sid = task_sid(target); in selinux_msg_queue_msgrcv() local
6120 sid, isec->sid, in selinux_msg_queue_msgrcv()
6124 sid, msec->sid, in selinux_msg_queue_msgrcv()
6134 u32 sid = current_sid(); in selinux_shm_alloc_security() local
6144 sid, isec->sid, SECCLASS_SHM, in selinux_shm_alloc_security()
6153 u32 sid = current_sid(); in selinux_shm_associate() local
6161 sid, isec->sid, SECCLASS_SHM, in selinux_shm_associate()
6219 u32 sid = current_sid(); in selinux_sem_alloc_security() local
6229 sid, isec->sid, SECCLASS_SEM, in selinux_sem_alloc_security()
6238 u32 sid = current_sid(); in selinux_sem_associate() local
6246 sid, isec->sid, SECCLASS_SEM, in selinux_sem_associate()
6327 *secid = isec->sid; in selinux_ipc_getsecid()
6340 u32 sid; in selinux_getprocattr() local
6349 current_sid(), __tsec->sid, in selinux_getprocattr()
6356 sid = __tsec->sid; in selinux_getprocattr()
6358 sid = __tsec->osid; in selinux_getprocattr()
6360 sid = __tsec->exec_sid; in selinux_getprocattr()
6362 sid = __tsec->create_sid; in selinux_getprocattr()
6364 sid = __tsec->keycreate_sid; in selinux_getprocattr()
6366 sid = __tsec->sockcreate_sid; in selinux_getprocattr()
6373 if (!sid) in selinux_getprocattr()
6376 error = security_sid_to_context(&selinux_state, sid, value, &len); in selinux_getprocattr()
6390 u32 mysid = current_sid(), sid = 0, ptsid; in selinux_setprocattr() local
6422 /* Obtain a SID for the context, if one was specified. */ in selinux_setprocattr()
6429 &sid, GFP_KERNEL); in selinux_setprocattr()
6452 value, size, &sid); in selinux_setprocattr()
6470 tsec->exec_sid = sid; in selinux_setprocattr()
6472 tsec->create_sid = sid; in selinux_setprocattr()
6474 if (sid) { in selinux_setprocattr()
6475 error = avc_has_perm(&selinux_state, mysid, sid, in selinux_setprocattr()
6480 tsec->keycreate_sid = sid; in selinux_setprocattr()
6482 tsec->sockcreate_sid = sid; in selinux_setprocattr()
6485 if (sid == 0) in selinux_setprocattr()
6492 tsec->sid, sid); in selinux_setprocattr()
6499 tsec->sid, sid, SECCLASS_PROCESS, in selinux_setprocattr()
6504 /* Check for ptracing, and update the task SID if ok. in selinux_setprocattr()
6505 Otherwise, leave SID unchanged and fail. */ in selinux_setprocattr()
6509 ptsid, sid, SECCLASS_PROCESS, in selinux_setprocattr()
6515 tsec->sid = sid; in selinux_setprocattr()
6604 ksec->sid = tsec->keycreate_sid; in selinux_key_alloc()
6606 ksec->sid = tsec->sid; in selinux_key_alloc()
6626 u32 perm, sid; in selinux_key_permission() local
6658 sid = cred_sid(cred); in selinux_key_permission()
6663 sid, ksec->sid, SECCLASS_KEY, perm, NULL); in selinux_key_permission()
6673 rc = security_sid_to_context(&selinux_state, ksec->sid, in selinux_key_getsecurity()
6685 u32 sid = current_sid(); in selinux_watch_key() local
6688 sid, ksec->sid, SECCLASS_KEY, KEY__VIEW, NULL); in selinux_watch_key()
6698 u32 sid = 0; in selinux_ib_pkey_access() local
6702 err = sel_ib_pkey_sid(subnet_prefix, pkey_val, &sid); in selinux_ib_pkey_access()
6711 sec->sid, sid, in selinux_ib_pkey_access()
6721 u32 sid = 0; in selinux_ib_endport_manage_subnet() local
6726 &sid); in selinux_ib_endport_manage_subnet()
6736 sec->sid, sid, in selinux_ib_endport_manage_subnet()
6748 sec->sid = current_sid(); in selinux_ib_alloc_security()
6764 u32 sid = current_sid(); in selinux_bpf() local
6770 sid, sid, SECCLASS_BPF, BPF__MAP_CREATE, in selinux_bpf()
6775 sid, sid, SECCLASS_BPF, BPF__PROG_LOAD, in selinux_bpf()
6805 static int bpf_fd_pass(struct file *file, u32 sid) in bpf_fd_pass() argument
6816 sid, bpfsec->sid, SECCLASS_BPF, in bpf_fd_pass()
6824 sid, bpfsec->sid, SECCLASS_BPF, in bpf_fd_pass()
6834 u32 sid = current_sid(); in selinux_bpf_map() local
6839 sid, bpfsec->sid, SECCLASS_BPF, in selinux_bpf_map()
6845 u32 sid = current_sid(); in selinux_bpf_prog() local
6850 sid, bpfsec->sid, SECCLASS_BPF, in selinux_bpf_prog()
6862 bpfsec->sid = current_sid(); in selinux_bpf_map_alloc()
6884 bpfsec->sid = current_sid(); in selinux_bpf_prog_alloc()
6902 u32 sid = current_sid(); in selinux_lockdown() local
6919 sid, sid, SECCLASS_LOCKDOWN, in selinux_lockdown()
6923 sid, sid, SECCLASS_LOCKDOWN, in selinux_lockdown()
6938 u32 requested, sid = current_sid(); in selinux_perf_event_open() local
6951 return avc_has_perm(&selinux_state, sid, sid, SECCLASS_PERF_EVENT, in selinux_perf_event_open()
6963 perfsec->sid = current_sid(); in selinux_perf_event_alloc()
6980 u32 sid = current_sid(); in selinux_perf_event_read() local
6982 return avc_has_perm(&selinux_state, sid, perfsec->sid, in selinux_perf_event_read()
6989 u32 sid = current_sid(); in selinux_perf_event_write() local
6991 return avc_has_perm(&selinux_state, sid, perfsec->sid, in selinux_perf_event_write()