Lines Matching defs:isec

281 	struct inode_security_struct *isec = selinux_inode(inode);
286 isec->initialized != LABEL_INITIALIZED) {
344 struct inode_security_struct *isec = selinux_inode(inode);
347 if (!isec)
360 if (!list_empty_careful(&isec->list)) {
362 list_del_init(&isec->list);
581 struct inode_security_struct *isec =
584 struct inode *inode = isec->inode;
585 list_del_init(&isec->list);
1107 struct inode_security_struct *isec = backing_inode_security(root);
1110 rc = show_sid(m, isec->sid);
1412 struct inode_security_struct *isec = selinux_inode(inode);
1418 if (isec->initialized == LABEL_INITIALIZED)
1421 spin_lock(&isec->lock);
1422 if (isec->initialized == LABEL_INITIALIZED)
1425 if (isec->sclass == SECCLASS_FILE)
1426 isec->sclass = inode_mode_to_security_class(inode->i_mode);
1434 if (list_empty(&isec->list))
1435 list_add(&isec->list, &sbsec->isec_head);
1440 sclass = isec->sclass;
1441 task_sid = isec->task_sid;
1442 sid = isec->sid;
1443 isec->initialized = LABEL_PENDING;
1444 spin_unlock(&isec->lock);
1563 spin_lock(&isec->lock);
1564 if (isec->initialized == LABEL_PENDING) {
1566 isec->initialized = LABEL_INVALID;
1569 isec->initialized = LABEL_INITIALIZED;
1570 isec->sid = sid;
1574 spin_unlock(&isec->lock);
1578 spin_lock(&isec->lock);
1579 if (isec->initialized == LABEL_PENDING) {
1580 isec->initialized = LABEL_INVALID;
1581 isec->sid = sid;
1583 spin_unlock(&isec->lock);
1662 struct inode_security_struct *isec;
1669 isec = selinux_inode(inode);
1671 return avc_has_perm(sid, isec->sid, isec->sclass, perms, adp);
1845 struct inode_security_struct *dsec, *isec;
1852 isec = backing_inode_security(dentry);
1879 rc = avc_has_perm(sid, isec->sid, isec->sclass, av, &ad);
2060 struct inode_security_struct *isec;
2085 isec = backing_inode_security(dentry);
2086 return avc_has_perm(sid, isec->sid, isec->sclass, file_to_av(file),
2297 struct inode_security_struct *isec;
2307 isec = inode_security(inode);
2343 isec->sid, SECCLASS_PROCESS, NULL,
2361 rc = avc_has_perm(old_tsec->sid, isec->sid,
2372 rc = avc_has_perm(new_tsec->sid, isec->sid,
2853 struct inode_security_struct *isec = selinux_inode(inode);
2856 spin_lock_init(&isec->lock);
2857 INIT_LIST_HEAD(&isec->list);
2858 isec->inode = inode;
2859 isec->sid = SECINITSID_UNLABELED;
2860 isec->sclass = SECCLASS_FILE;
2861 isec->task_sid = sid;
2862 isec->initialized = LABEL_INVALID;
2937 struct inode_security_struct *isec = selinux_inode(inode);
2938 isec->sclass = newsclass;
2939 isec->sid = newsid;
2940 isec->initialized = LABEL_INITIALIZED;
2966 struct inode_security_struct *isec;
2972 isec = selinux_inode(inode);
2988 isec->sclass = context_isec->sclass;
2989 isec->sid = context_isec->sid;
2991 isec->sclass = SECCLASS_ANON_INODE;
2994 isec->sclass, name, &isec->sid);
2999 isec->initialized = LABEL_INITIALIZED;
3009 isec->sid,
3010 isec->sclass,
3068 struct inode_security_struct *isec;
3074 isec = inode_security_rcu(inode, rcu);
3075 if (IS_ERR(isec))
3076 return PTR_ERR(isec);
3078 return avc_has_perm(sid, isec->sid, isec->sclass, FILE__READ, &ad);
3086 struct inode_security_struct *isec = selinux_inode(inode);
3091 return slow_avc_audit(current_sid(), isec->sid, isec->sclass, perms,
3101 struct inode_security_struct *isec;
3120 isec = inode_security_rcu(inode, no_block);
3121 if (IS_ERR(isec))
3122 return PTR_ERR(isec);
3124 rc = avc_has_perm_noaudit(sid, isec->sid, isec->sclass, perms, 0,
3189 struct inode_security_struct *isec;
3218 isec = backing_inode_security(dentry);
3219 rc = avc_has_perm(sid, isec->sid, isec->sclass,
3259 rc = avc_has_perm(sid, newsid, isec->sclass,
3264 rc = security_validate_transition(isec->sid, newsid,
3265 sid, isec->sclass);
3300 struct inode_security_struct *isec;
3327 isec = backing_inode_security(dentry);
3328 spin_lock(&isec->lock);
3329 isec->sclass = inode_mode_to_security_class(inode->i_mode);
3330 isec->sid = newsid;
3331 isec->initialized = LABEL_INITIALIZED;
3332 spin_unlock(&isec->lock);
3426 struct inode_security_struct *isec;
3445 isec = inode_security(inode);
3447 error = security_sid_to_context_force(isec->sid, &context,
3450 error = security_sid_to_context(isec->sid,
3467 struct inode_security_struct *isec = inode_security_novalidate(inode);
3487 spin_lock(&isec->lock);
3488 isec->sclass = inode_mode_to_security_class(inode->i_mode);
3489 isec->sid = newsid;
3490 isec->initialized = LABEL_INITIALIZED;
3491 spin_unlock(&isec->lock);
3509 struct inode_security_struct *isec = inode_security_novalidate(inode);
3510 *secid = isec->sid;
3629 struct inode_security_struct *isec;
3636 isec = inode_security(inode);
3637 if (sid == fsec->sid && fsec->isid == isec->sid &&
3666 struct inode_security_struct *isec;
3690 isec = inode_security(inode);
3691 rc = avc_has_extended_perms(ssid, isec->sid, isec->sclass,
3965 struct inode_security_struct *isec;
3968 isec = inode_security(file_inode(file));
3976 fsec->isid = isec->sid;
4057 struct inode_security_struct *isec = inode_security(inode);
4062 ret = avc_has_perm(sid, isec->sid,
4068 tsec->create_sid = isec->sid;
4086 struct inode_security_struct *isec;
4108 isec = inode_security(file_inode(file));
4109 return avc_has_perm(sid, isec->sid, SECCLASS_SYSTEM,
4260 struct inode_security_struct *isec = selinux_inode(inode);
4263 spin_lock(&isec->lock);
4264 isec->sclass = inode_mode_to_security_class(inode->i_mode);
4265 isec->sid = sid;
4266 isec->initialized = LABEL_INITIALIZED;
4267 spin_unlock(&isec->lock);
4637 struct inode_security_struct *isec = inode_security_novalidate(SOCK_INODE(sock));
4649 isec->sclass = sclass;
4650 isec->sid = sid;
4651 isec->initialized = LABEL_INITIALIZED;
4933 struct inode_security_struct *isec;
4942 isec = inode_security_novalidate(SOCK_INODE(sock));
4943 spin_lock(&isec->lock);
4944 sclass = isec->sclass;
4945 sid = isec->sid;
4946 spin_unlock(&isec->lock);
5216 struct inode_security_struct *isec;
5217 isec = inode_security_novalidate(SOCK_INODE(sock));
5218 peer_secid = isec->sid;
5279 struct inode_security_struct *isec =
5285 isec->sid = sksec->sid;
5286 sksec->sclass = isec->sclass;
5543 /* NOTE: Ideally, we should also get the isec->sid for the
5544 new socket in sync, but we don't have the isec available yet.
5995 static void ipc_init_security(struct ipc_security_struct *isec, u16 sclass)
5997 isec->sclass = sclass;
5998 isec->sid = current_sid();
6004 struct ipc_security_struct *isec;
6008 isec = selinux_ipc(ipc_perms);
6013 return avc_has_perm(sid, isec->sid, isec->sclass, perms, &ad);
6029 struct ipc_security_struct *isec;
6033 isec = selinux_ipc(msq);
6034 ipc_init_security(isec, SECCLASS_MSGQ);
6039 return avc_has_perm(sid, isec->sid, SECCLASS_MSGQ,
6045 struct ipc_security_struct *isec;
6049 isec = selinux_ipc(msq);
6054 return avc_has_perm(sid, isec->sid, SECCLASS_MSGQ,
6088 struct ipc_security_struct *isec;
6094 isec = selinux_ipc(msq);
6105 rc = security_transition_sid(sid, isec->sid,
6115 rc = avc_has_perm(sid, isec->sid, SECCLASS_MSGQ,
6123 rc = avc_has_perm(msec->sid, isec->sid, SECCLASS_MSGQ,
6133 struct ipc_security_struct *isec;
6139 isec = selinux_ipc(msq);
6145 rc = avc_has_perm(sid, isec->sid,
6156 struct ipc_security_struct *isec;
6160 isec = selinux_ipc(shp);
6161 ipc_init_security(isec, SECCLASS_SHM);
6166 return avc_has_perm(sid, isec->sid, SECCLASS_SHM,
6172 struct ipc_security_struct *isec;
6176 isec = selinux_ipc(shp);
6181 return avc_has_perm(sid, isec->sid, SECCLASS_SHM,
6234 struct ipc_security_struct *isec;
6238 isec = selinux_ipc(sma);
6239 ipc_init_security(isec, SECCLASS_SEM);
6244 return avc_has_perm(sid, isec->sid, SECCLASS_SEM,
6250 struct ipc_security_struct *isec;
6254 isec = selinux_ipc(sma);
6259 return avc_has_perm(sid, isec->sid, SECCLASS_SEM,
6338 struct ipc_security_struct *isec = selinux_ipc(ipcp);
6339 *secid = isec->sid;
6635 struct inode_security_struct *isec = selinux_inode(inode);
6637 spin_lock(&isec->lock);
6638 isec->initialized = LABEL_INVALID;
6639 spin_unlock(&isec->lock);
7107 struct inode_security_struct *isec = selinux_inode(inode);
7113 return avc_has_perm(current_sid(), isec->sid,