Lines Matching defs:new

466 	 * IMPORTANT: Double-check logic in this function when adding a new
842 struct superblock_security_struct *new = newsb->s_security;
844 char newflags = new->flags & SE_MNTMASK;
848 if ((oldflags & FSCONTEXT_MNT) && old->sid != new->sid)
850 if ((oldflags & CONTEXT_MNT) && old->mntpoint_sid != new->mntpoint_sid)
852 if ((oldflags & DEFCONTEXT_MNT) && old->def_sid != new->def_sid)
2121 static int selinux_capset(struct cred *new, const struct cred *old,
2127 cred_sid(old), cred_sid(new), SECCLASS_PROCESS,
2213 * Check that a process has enough memory to allocate a new virtual
2267 * the old and new contexts.
2471 * Prepare a process for imminent new credential changes due to exec
2483 /* Close files for which the new task SID is not authorized. */
2489 /* Check whether the new SID can inherit resource limits from the old
2517 * Clean up the process immediately after the installation of new credentials
2532 /* Check whether the new SID can inherit signal state from the old SID.
2537 * kill done after the flush will be checked against the new SID.
2556 * wait permission to the new task SID. */
2875 struct cred *new)
2888 tsec = selinux_cred(new);
3435 static int selinux_inode_copy_up(struct dentry *src, struct cred **new)
3439 struct cred *new_creds = *new;
3451 *new = new_creds;
3919 * new inode label or new policy.
3937 * prepare a new set of credentials for modification
3939 static int selinux_cred_prepare(struct cred *new, const struct cred *old,
3943 struct task_security_struct *tsec = selinux_cred(new);
3952 static void selinux_cred_transfer(struct cred *new, const struct cred *old)
3955 struct task_security_struct *tsec = selinux_cred(new);
3969 static int selinux_kernel_act_as(struct cred *new, u32 secid)
3971 struct task_security_struct *tsec = selinux_cred(new);
3993 static int selinux_kernel_create_files_as(struct cred *new, struct inode *inode)
3996 struct task_security_struct *tsec = selinux_cred(new);
5298 * sockets and peeled off connections as they cause a new
5300 * plug this into the new socket.
5374 * whenever a new IP address is added or when a new
5394 /* Called whenever a new socket is created by accept(2) or sctp_peeloff(3). */
5442 new socket in sync, but we don't have the isec available yet.
6073 * Compute new sid based on current process and
6389 struct cred *new;
6458 new = prepare_creds();
6459 if (!new)
6468 tsec = selinux_cred(new);
6521 commit_creds(new);
6526 abort_creds(new);
6997 * IMPORTANT NOTE: When adding new hooks, please be careful to keep this order: