• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/security/selinux/

Lines Matching refs:tsec

158 	struct task_security_struct *tsec;
160 tsec = kzalloc(sizeof(struct task_security_struct), GFP_KERNEL);
161 if (!tsec)
164 tsec->task = task;
165 tsec->osid = tsec->sid = tsec->ptrace_sid = SECINITSID_UNLABELED;
166 task->security = tsec;
173 struct task_security_struct *tsec = task->security;
175 kfree(tsec);
180 struct task_security_struct *tsec = current->security;
192 isec->task_sid = tsec->sid;
214 struct task_security_struct *tsec = current->security;
222 fsec->sid = tsec->sid;
223 fsec->fown_sid = tsec->sid;
336 struct task_security_struct *tsec)
340 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM,
345 rc = avc_has_perm(tsec->sid, sid, SECCLASS_FILESYSTEM,
352 struct task_security_struct *tsec)
355 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM,
372 struct task_security_struct *tsec = current->security;
504 rc = may_context_mount_sb_relabel(sid, sbsec, tsec);
526 rc = may_context_mount_sb_relabel(sid, sbsec, tsec);
531 rc = may_context_mount_inode_relabel(sid, sbsec, tsec);
551 rc = may_context_mount_inode_relabel(sid, sbsec, tsec);
571 rc = may_context_mount_inode_relabel(sid, sbsec, tsec);
1042 struct task_security_struct *tsec;
1045 tsec = tsk->security;
1051 return avc_has_perm(tsec->sid, tsec->sid,
1059 struct task_security_struct *tsec;
1061 tsec = tsk->security;
1063 return avc_has_perm(tsec->sid, SECINITSID_KERNEL,
1075 struct task_security_struct *tsec;
1082 tsec = tsk->security;
1091 return avc_has_perm(tsec->sid, isec->sid, isec->sclass, perms, adp);
1122 struct task_security_struct *tsec = tsk->security;
1134 if (tsec->sid != fsec->sid) {
1135 rc = avc_has_perm(tsec->sid, fsec->sid,
1155 struct task_security_struct *tsec;
1162 tsec = current->security;
1169 rc = avc_has_perm(tsec->sid, dsec->sid, SECCLASS_DIR,
1175 if (tsec->create_sid && sbsec->behavior != SECURITY_FS_USE_MNTPOINT) {
1176 newsid = tsec->create_sid;
1178 rc = security_transition_sid(tsec->sid, dsec->sid, tclass,
1184 rc = avc_has_perm(tsec->sid, newsid, tclass, FILE__CREATE, &ad);
1197 struct task_security_struct *tsec;
1199 tsec = ctx->security;
1201 return avc_has_perm(tsec->sid, ksid, SECCLASS_KEY, KEY__CREATE, NULL);
1214 struct task_security_struct *tsec;
1220 tsec = current->security;
1229 rc = avc_has_perm(tsec->sid, dsec->sid, SECCLASS_DIR, av, &ad);
1248 rc = avc_has_perm(tsec->sid, isec->sid, isec->sclass, av, &ad);
1257 struct task_security_struct *tsec;
1264 tsec = current->security;
1273 rc = avc_has_perm(tsec->sid, old_dsec->sid, SECCLASS_DIR,
1277 rc = avc_has_perm(tsec->sid, old_isec->sid,
1282 rc = avc_has_perm(tsec->sid, old_isec->sid,
1292 rc = avc_has_perm(tsec->sid, new_dsec->sid, SECCLASS_DIR, av, &ad);
1298 rc = avc_has_perm(tsec->sid, new_isec->sid,
1314 struct task_security_struct *tsec;
1317 tsec = tsk->security;
1319 return avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM,
1473 struct task_security_struct *tsec;
1481 tsec = current->security;
1493 error = avc_has_perm(tsec->sid, tsid,
1502 error = avc_has_perm(tsec->sid, tsid,
1590 struct task_security_struct *tsec = current->security;
1594 rc = avc_has_perm_noaudit(tsec->sid, tsec->sid,
1625 struct task_security_struct *tsec;
1642 tsec = current->security;
1646 bsec->sid = tsec->sid;
1649 tsec->create_sid = 0;
1650 tsec->keycreate_sid = 0;
1651 tsec->sockcreate_sid = 0;
1653 if (tsec->exec_sid) {
1654 newsid = tsec->exec_sid;
1656 tsec->exec_sid = 0;
1659 rc = security_transition_sid(tsec->sid, isec->sid,
1670 newsid = tsec->sid;
1672 if (tsec->sid == newsid) {
1673 rc = avc_has_perm(tsec->sid, isec->sid,
1679 rc = avc_has_perm(tsec->sid, newsid,
1708 struct task_security_struct *tsec = current->security;
1711 if (tsec->osid != tsec->sid) {
1715 atsecure = avc_has_perm(tsec->osid, tsec->sid,
1824 struct task_security_struct *tsec;
1831 tsec = current->security;
1836 tsec->osid = tsec->sid;
1838 if (tsec->sid != sid) {
1842 rc = avc_has_perm(tsec->sid, sid, SECCLASS_PROCESS,
1853 rc = avc_has_perm(tsec->ptrace_sid, sid,
1861 tsec->sid = sid;
1870 struct task_security_struct *tsec;
1876 tsec = current->security;
1883 if (tsec->osid == tsec->sid)
1895 rc = avc_has_perm(tsec->osid, tsec->sid, SECCLASS_PROCESS,
1919 rc = avc_has_perm(tsec->osid, tsec->sid, SECCLASS_PROCESS,
2121 struct task_security_struct *tsec;
2128 tsec = current->security;
2132 if (tsec->create_sid && sbsec->behavior != SECURITY_FS_USE_MNTPOINT) {
2133 newsid = tsec->create_sid;
2135 rc = security_transition_sid(tsec->sid, dsec->sid,
2294 struct task_security_struct *tsec = current->security;
2326 rc = avc_has_perm(tsec->sid, isec->sid, isec->sclass,
2335 rc = avc_has_perm(tsec->sid, newsid, isec->sclass,
2340 rc = security_validate_transition(isec->sid, newsid, tsec->sid,
2680 struct task_security_struct *tsec;
2683 tsec = current->security;
2685 fsec->fown_sid = tsec->sid;
2695 struct task_security_struct *tsec;
2701 tsec = tsk->security;
2709 return avc_has_perm(fsec->fown_sid, tsec->sid,
2873 struct task_security_struct *tsec;
2886 tsec = p->security;
2888 rc = avc_has_perm(secid, tsec->sid, SECCLASS_PROCESS, perm, NULL);
2917 struct task_security_struct *tsec;
2921 tsec = p->security;
2922 tsec->osid = tsec->sid;
2923 tsec->sid = SECINITSID_KERNEL;
2930 struct task_security_struct *tsec = p->security;
2933 isec->sid = tsec->sid;
3157 struct task_security_struct *tsec;
3161 tsec = task->security;
3169 err = avc_has_perm(tsec->sid, isec->sid, isec->sclass, perms, &ad);
3179 struct task_security_struct *tsec;
3185 tsec = current->security;
3186 newsid = tsec->sockcreate_sid ? : tsec->sid;
3187 err = avc_has_perm(tsec->sid, newsid,
3200 struct task_security_struct *tsec;
3206 tsec = current->security;
3207 newsid = tsec->sockcreate_sid ? : tsec->sid;
3245 struct task_security_struct *tsec;
3253 tsec = current->security;
4021 struct task_security_struct *tsec = task->security;
4030 isec->sid = tsec->sid;
4069 struct task_security_struct *tsec;
4073 tsec = current->security;
4079 return avc_has_perm(tsec->sid, isec->sid, isec->sclass, perms, &ad);
4095 struct task_security_struct *tsec;
4104 tsec = current->security;
4110 rc = avc_has_perm(tsec->sid, isec->sid, SECCLASS_MSGQ,
4126 struct task_security_struct *tsec;
4130 tsec = current->security;
4136 return avc_has_perm(tsec->sid, isec->sid, SECCLASS_MSGQ,
4170 struct task_security_struct *tsec;
4176 tsec = current->security;
4188 rc = security_transition_sid(tsec->sid,
4200 rc = avc_has_perm(tsec->sid, isec->sid, SECCLASS_MSGQ,
4204 rc = avc_has_perm(tsec->sid, msec->sid,
4218 struct task_security_struct *tsec;
4224 tsec = target->security;
4231 rc = avc_has_perm(tsec->sid, isec->sid,
4234 rc = avc_has_perm(tsec->sid, msec->sid,
4242 struct task_security_struct *tsec;
4251 tsec = current->security;
4257 rc = avc_has_perm(tsec->sid, isec->sid, SECCLASS_SHM,
4273 struct task_security_struct *tsec;
4277 tsec = current->security;
4283 return avc_has_perm(tsec->sid, isec->sid, SECCLASS_SHM,
4341 struct task_security_struct *tsec;
4350 tsec = current->security;
4356 rc = avc_has_perm(tsec->sid, isec->sid, SECCLASS_SEM,
4372 struct task_security_struct *tsec;
4376 tsec = current->security;
4382 return avc_has_perm(tsec->sid, isec->sid, SECCLASS_SEM,
4497 struct task_security_struct *tsec;
4508 tsec = p->security;
4511 sid = tsec->sid;
4513 sid = tsec->osid;
4515 sid = tsec->exec_sid;
4517 sid = tsec->create_sid;
4519 sid = tsec->keycreate_sid;
4521 sid = tsec->sockcreate_sid;
4537 struct task_security_struct *tsec;
4585 tsec = p->security;
4587 tsec->exec_sid = sid;
4589 tsec->create_sid = sid;
4594 tsec->keycreate_sid = sid;
4596 tsec->sockcreate_sid = sid;
4618 error = avc_has_perm(tsec->sid, sid, SECCLASS_PROCESS,
4627 error = avc_has_perm_noaudit(tsec->ptrace_sid, sid,
4631 tsec->sid = sid;
4633 avc_audit(tsec->ptrace_sid, sid, SECCLASS_PROCESS,
4638 tsec->sid = sid;
4664 struct task_security_struct *tsec = tsk->security;
4672 if (tsec->keycreate_sid)
4673 ksec->sid = tsec->keycreate_sid;
4675 ksec->sid = tsec->sid;
4694 struct task_security_struct *tsec;
4699 tsec = ctx->security;
4708 return avc_has_perm(tsec->sid, ksec->sid,
4893 struct task_security_struct *tsec;
4905 tsec = current->security;
4906 tsec->osid = tsec->sid = SECINITSID_KERNEL;