• Home
  • Raw
  • Download

Lines Matching full:tsec

213 	struct task_security_struct *tsec;  in cred_init_security()  local
215 tsec = selinux_cred(unrcu_pointer(current->real_cred)); in cred_init_security()
216 tsec->osid = tsec->sid = SECINITSID_KERNEL; in cred_init_security()
224 const struct task_security_struct *tsec; in cred_sid() local
226 tsec = selinux_cred(cred); in cred_sid()
227 return tsec->sid; in cred_sid()
427 const struct task_security_struct *tsec = selinux_cred(cred); in may_context_mount_sb_relabel() local
430 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_sb_relabel()
435 rc = avc_has_perm(tsec->sid, sid, SECCLASS_FILESYSTEM, in may_context_mount_sb_relabel()
444 const struct task_security_struct *tsec = selinux_cred(cred); in may_context_mount_inode_relabel() local
446 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_inode_relabel()
1770 selinux_determine_inode_label(const struct task_security_struct *tsec, in selinux_determine_inode_label() argument
1782 tsec->create_sid) { in selinux_determine_inode_label()
1783 *_new_isid = tsec->create_sid; in selinux_determine_inode_label()
1786 return security_transition_sid(tsec->sid, in selinux_determine_inode_label()
1799 const struct task_security_struct *tsec = selinux_cred(current_cred()); in may_create() local
1809 sid = tsec->sid; in may_create()
1820 rc = selinux_determine_inode_label(tsec, dir, &dentry->d_name, tclass, in may_create()
2505 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_bprm_committed_creds() local
2509 osid = tsec->osid; in selinux_bprm_committed_creds()
2510 sid = tsec->sid; in selinux_bprm_committed_creds()
2887 struct task_security_struct *tsec; in selinux_dentry_create_files_as() local
2896 tsec = selinux_cred(new); in selinux_dentry_create_files_as()
2897 tsec->create_sid = newsid; in selinux_dentry_create_files_as()
2905 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_inode_init_security() local
2914 newsid = tsec->create_sid; in selinux_inode_init_security()
2916 rc = selinux_determine_inode_label(tsec, dir, qstr, in selinux_inode_init_security()
2951 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_inode_init_security_anon() local
2980 tsec->sid, tsec->sid, in selinux_inode_init_security_anon()
2995 return avc_has_perm(tsec->sid, in selinux_inode_init_security_anon()
3502 struct task_security_struct *tsec; in selinux_inode_copy_up() local
3511 tsec = selinux_cred(new_creds); in selinux_inode_copy_up()
3514 tsec->create_sid = sid; in selinux_inode_copy_up()
3539 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_kernfs_init_security() local
3567 if (tsec->create_sid) { in selinux_kernfs_init_security()
3568 newsid = tsec->create_sid; in selinux_kernfs_init_security()
3576 rc = security_transition_sid(tsec->sid, in selinux_kernfs_init_security()
4001 struct task_security_struct *tsec = selinux_cred(new); in selinux_cred_prepare() local
4003 *tsec = *old_tsec; in selinux_cred_prepare()
4013 struct task_security_struct *tsec = selinux_cred(new); in selinux_cred_transfer() local
4015 *tsec = *old_tsec; in selinux_cred_transfer()
4029 struct task_security_struct *tsec = selinux_cred(new); in selinux_kernel_act_as() local
4038 tsec->sid = secid; in selinux_kernel_act_as()
4039 tsec->create_sid = 0; in selinux_kernel_act_as()
4040 tsec->keycreate_sid = 0; in selinux_kernel_act_as()
4041 tsec->sockcreate_sid = 0; in selinux_kernel_act_as()
4053 struct task_security_struct *tsec = selinux_cred(new); in selinux_kernel_create_files_as() local
4063 tsec->create_sid = isec->sid; in selinux_kernel_create_files_as()
4567 static int socket_sockcreate_sid(const struct task_security_struct *tsec, in socket_sockcreate_sid() argument
4570 if (tsec->sockcreate_sid > SECSID_NULL) { in socket_sockcreate_sid()
4571 *socksid = tsec->sockcreate_sid; in socket_sockcreate_sid()
4575 return security_transition_sid(tsec->sid, tsec->sid, in socket_sockcreate_sid()
4597 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_socket_create() local
4606 rc = socket_sockcreate_sid(tsec, secclass, &newsid); in selinux_socket_create()
4610 return avc_has_perm(tsec->sid, newsid, secclass, SOCKET__CREATE, NULL); in selinux_socket_create()
4616 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_socket_post_create() local
4624 err = socket_sockcreate_sid(tsec, sclass, &sid); in selinux_socket_post_create()
5545 const struct task_security_struct *tsec; in selinux_secmark_relabel_packet() local
5548 tsec = selinux_cred(current_cred()); in selinux_secmark_relabel_packet()
5549 tsid = tsec->sid; in selinux_secmark_relabel_packet()
6377 struct task_security_struct *tsec; in selinux_setprocattr() local
6453 tsec = selinux_cred(new); in selinux_setprocattr()
6455 tsec->exec_sid = sid; in selinux_setprocattr()
6457 tsec->create_sid = sid; in selinux_setprocattr()
6465 tsec->keycreate_sid = sid; in selinux_setprocattr()
6467 tsec->sockcreate_sid = sid; in selinux_setprocattr()
6475 error = security_bounded_transition(tsec->sid, sid); in selinux_setprocattr()
6481 error = avc_has_perm(tsec->sid, sid, SECCLASS_PROCESS, in selinux_setprocattr()
6496 tsec->sid = sid; in selinux_setprocattr()
6577 const struct task_security_struct *tsec; in selinux_key_alloc() local
6584 tsec = selinux_cred(cred); in selinux_key_alloc()
6585 if (tsec->keycreate_sid) in selinux_key_alloc()
6586 ksec->sid = tsec->keycreate_sid; in selinux_key_alloc()
6588 ksec->sid = tsec->sid; in selinux_key_alloc()