Lines Matching refs:tsec

212 	struct task_security_struct *tsec;  in cred_init_security()  local
214 tsec = selinux_cred(unrcu_pointer(current->real_cred)); in cred_init_security()
215 tsec->osid = tsec->sid = SECINITSID_KERNEL; in cred_init_security()
223 const struct task_security_struct *tsec; in cred_sid() local
225 tsec = selinux_cred(cred); in cred_sid()
226 return tsec->sid; in cred_sid()
426 const struct task_security_struct *tsec = selinux_cred(cred); in may_context_mount_sb_relabel() local
429 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_sb_relabel()
434 rc = avc_has_perm(tsec->sid, sid, SECCLASS_FILESYSTEM, in may_context_mount_sb_relabel()
443 const struct task_security_struct *tsec = selinux_cred(cred); in may_context_mount_inode_relabel() local
445 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_inode_relabel()
1769 selinux_determine_inode_label(const struct task_security_struct *tsec, in selinux_determine_inode_label() argument
1781 tsec->create_sid) { in selinux_determine_inode_label()
1782 *_new_isid = tsec->create_sid; in selinux_determine_inode_label()
1785 return security_transition_sid(tsec->sid, in selinux_determine_inode_label()
1798 const struct task_security_struct *tsec = selinux_cred(current_cred()); in may_create() local
1808 sid = tsec->sid; in may_create()
1819 rc = selinux_determine_inode_label(tsec, dir, &dentry->d_name, tclass, in may_create()
2504 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_bprm_committed_creds() local
2508 osid = tsec->osid; in selinux_bprm_committed_creds()
2509 sid = tsec->sid; in selinux_bprm_committed_creds()
2886 struct task_security_struct *tsec; in selinux_dentry_create_files_as() local
2895 tsec = selinux_cred(new); in selinux_dentry_create_files_as()
2896 tsec->create_sid = newsid; in selinux_dentry_create_files_as()
2904 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_inode_init_security() local
2913 newsid = tsec->create_sid; in selinux_inode_init_security()
2915 rc = selinux_determine_inode_label(tsec, dir, qstr, in selinux_inode_init_security()
2950 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_inode_init_security_anon() local
2979 tsec->sid, tsec->sid, in selinux_inode_init_security_anon()
2994 return avc_has_perm(tsec->sid, in selinux_inode_init_security_anon()
3501 struct task_security_struct *tsec; in selinux_inode_copy_up() local
3510 tsec = selinux_cred(new_creds); in selinux_inode_copy_up()
3513 tsec->create_sid = sid; in selinux_inode_copy_up()
3538 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_kernfs_init_security() local
3566 if (tsec->create_sid) { in selinux_kernfs_init_security()
3567 newsid = tsec->create_sid; in selinux_kernfs_init_security()
3575 rc = security_transition_sid(tsec->sid, in selinux_kernfs_init_security()
4000 struct task_security_struct *tsec = selinux_cred(new); in selinux_cred_prepare() local
4002 *tsec = *old_tsec; in selinux_cred_prepare()
4012 struct task_security_struct *tsec = selinux_cred(new); in selinux_cred_transfer() local
4014 *tsec = *old_tsec; in selinux_cred_transfer()
4028 struct task_security_struct *tsec = selinux_cred(new); in selinux_kernel_act_as() local
4037 tsec->sid = secid; in selinux_kernel_act_as()
4038 tsec->create_sid = 0; in selinux_kernel_act_as()
4039 tsec->keycreate_sid = 0; in selinux_kernel_act_as()
4040 tsec->sockcreate_sid = 0; in selinux_kernel_act_as()
4052 struct task_security_struct *tsec = selinux_cred(new); in selinux_kernel_create_files_as() local
4062 tsec->create_sid = isec->sid; in selinux_kernel_create_files_as()
4566 static int socket_sockcreate_sid(const struct task_security_struct *tsec, in socket_sockcreate_sid() argument
4569 if (tsec->sockcreate_sid > SECSID_NULL) { in socket_sockcreate_sid()
4570 *socksid = tsec->sockcreate_sid; in socket_sockcreate_sid()
4574 return security_transition_sid(tsec->sid, tsec->sid, in socket_sockcreate_sid()
4596 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_socket_create() local
4605 rc = socket_sockcreate_sid(tsec, secclass, &newsid); in selinux_socket_create()
4609 return avc_has_perm(tsec->sid, newsid, secclass, SOCKET__CREATE, NULL); in selinux_socket_create()
4615 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_socket_post_create() local
4623 err = socket_sockcreate_sid(tsec, sclass, &sid); in selinux_socket_post_create()
5544 const struct task_security_struct *tsec; in selinux_secmark_relabel_packet() local
5547 tsec = selinux_cred(current_cred()); in selinux_secmark_relabel_packet()
5548 tsid = tsec->sid; in selinux_secmark_relabel_packet()
6376 struct task_security_struct *tsec; in selinux_setprocattr() local
6452 tsec = selinux_cred(new); in selinux_setprocattr()
6454 tsec->exec_sid = sid; in selinux_setprocattr()
6456 tsec->create_sid = sid; in selinux_setprocattr()
6464 tsec->keycreate_sid = sid; in selinux_setprocattr()
6466 tsec->sockcreate_sid = sid; in selinux_setprocattr()
6474 error = security_bounded_transition(tsec->sid, sid); in selinux_setprocattr()
6480 error = avc_has_perm(tsec->sid, sid, SECCLASS_PROCESS, in selinux_setprocattr()
6495 tsec->sid = sid; in selinux_setprocattr()
6575 const struct task_security_struct *tsec; in selinux_key_alloc() local
6582 tsec = selinux_cred(cred); in selinux_key_alloc()
6583 if (tsec->keycreate_sid) in selinux_key_alloc()
6584 ksec->sid = tsec->keycreate_sid; in selinux_key_alloc()
6586 ksec->sid = tsec->sid; in selinux_key_alloc()