Lines Matching refs:tsec

217 	struct task_security_struct *tsec;
219 tsec = selinux_cred(cred);
220 tsec->osid = tsec->sid = SECINITSID_KERNEL;
228 const struct task_security_struct *tsec;
230 tsec = selinux_cred(cred);
231 return tsec->sid;
415 const struct task_security_struct *tsec = selinux_cred(cred);
419 tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM,
425 tsec->sid, sid, SECCLASS_FILESYSTEM,
434 const struct task_security_struct *tsec = selinux_cred(cred);
437 tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM,
1758 selinux_determine_inode_label(const struct task_security_struct *tsec,
1769 tsec->create_sid) {
1770 *_new_isid = tsec->create_sid;
1773 return security_transition_sid(&selinux_state, tsec->sid,
1786 const struct task_security_struct *tsec = selinux_cred(current_cred());
1796 sid = tsec->sid;
1808 rc = selinux_determine_inode_label(tsec, dir, &dentry->d_name, tclass,
2522 const struct task_security_struct *tsec = selinux_cred(current_cred());
2526 osid = tsec->osid;
2527 sid = tsec->sid;
2879 struct task_security_struct *tsec;
2888 tsec = selinux_cred(new);
2889 tsec->create_sid = newsid;
2898 const struct task_security_struct *tsec = selinux_cred(current_cred());
2906 newsid = tsec->create_sid;
2908 rc = selinux_determine_inode_label(tsec, dir, qstr,
3438 struct task_security_struct *tsec;
3447 tsec = selinux_cred(new_creds);
3450 tsec->create_sid = sid;
3475 const struct task_security_struct *tsec = selinux_cred(current_cred());
3503 if (tsec->create_sid) {
3504 newsid = tsec->create_sid;
3512 rc = security_transition_sid(&selinux_state, tsec->sid,
3943 struct task_security_struct *tsec = selinux_cred(new);
3945 *tsec = *old_tsec;
3955 struct task_security_struct *tsec = selinux_cred(new);
3957 *tsec = *old_tsec;
3971 struct task_security_struct *tsec = selinux_cred(new);
3981 tsec->sid = secid;
3982 tsec->create_sid = 0;
3983 tsec->keycreate_sid = 0;
3984 tsec->sockcreate_sid = 0;
3996 struct task_security_struct *tsec = selinux_cred(new);
4007 tsec->create_sid = isec->sid;
4513 static int socket_sockcreate_sid(const struct task_security_struct *tsec,
4516 if (tsec->sockcreate_sid > SECSID_NULL) {
4517 *socksid = tsec->sockcreate_sid;
4521 return security_transition_sid(&selinux_state, tsec->sid, tsec->sid,
4546 const struct task_security_struct *tsec = selinux_cred(current_cred());
4555 rc = socket_sockcreate_sid(tsec, secclass, &newsid);
4560 tsec->sid, newsid, secclass, SOCKET__CREATE, NULL);
4566 const struct task_security_struct *tsec = selinux_cred(current_cred());
4574 err = socket_sockcreate_sid(tsec, sclass, &sid);
6388 struct task_security_struct *tsec;
6468 tsec = selinux_cred(new);
6470 tsec->exec_sid = sid;
6472 tsec->create_sid = sid;
6480 tsec->keycreate_sid = sid;
6482 tsec->sockcreate_sid = sid;
6492 tsec->sid, sid);
6499 tsec->sid, sid, SECCLASS_PROCESS,
6515 tsec->sid = sid;
6595 const struct task_security_struct *tsec;
6602 tsec = selinux_cred(cred);
6603 if (tsec->keycreate_sid)
6604 ksec->sid = tsec->keycreate_sid;
6606 ksec->sid = tsec->sid;