Lines Matching defs:isec
280 struct inode_security_struct *isec = selinux_inode(inode);
285 isec->initialized != LABEL_INITIALIZED) {
343 struct inode_security_struct *isec = selinux_inode(inode);
346 if (!isec)
359 if (!list_empty_careful(&isec->list)) {
361 list_del_init(&isec->list);
580 struct inode_security_struct *isec =
583 struct inode *inode = isec->inode;
584 list_del_init(&isec->list);
1106 struct inode_security_struct *isec = backing_inode_security(root);
1109 rc = show_sid(m, isec->sid);
1411 struct inode_security_struct *isec = selinux_inode(inode);
1417 if (isec->initialized == LABEL_INITIALIZED)
1420 spin_lock(&isec->lock);
1421 if (isec->initialized == LABEL_INITIALIZED)
1424 if (isec->sclass == SECCLASS_FILE)
1425 isec->sclass = inode_mode_to_security_class(inode->i_mode);
1433 if (list_empty(&isec->list))
1434 list_add(&isec->list, &sbsec->isec_head);
1439 sclass = isec->sclass;
1440 task_sid = isec->task_sid;
1441 sid = isec->sid;
1442 isec->initialized = LABEL_PENDING;
1443 spin_unlock(&isec->lock);
1562 spin_lock(&isec->lock);
1563 if (isec->initialized == LABEL_PENDING) {
1565 isec->initialized = LABEL_INVALID;
1568 isec->initialized = LABEL_INITIALIZED;
1569 isec->sid = sid;
1573 spin_unlock(&isec->lock);
1577 spin_lock(&isec->lock);
1578 if (isec->initialized == LABEL_PENDING) {
1579 isec->initialized = LABEL_INVALID;
1580 isec->sid = sid;
1582 spin_unlock(&isec->lock);
1661 struct inode_security_struct *isec;
1668 isec = selinux_inode(inode);
1670 return avc_has_perm(sid, isec->sid, isec->sclass, perms, adp);
1844 struct inode_security_struct *dsec, *isec;
1851 isec = backing_inode_security(dentry);
1878 rc = avc_has_perm(sid, isec->sid, isec->sclass, av, &ad);
2059 struct inode_security_struct *isec;
2084 isec = backing_inode_security(dentry);
2085 return avc_has_perm(sid, isec->sid, isec->sclass, file_to_av(file),
2296 struct inode_security_struct *isec;
2306 isec = inode_security(inode);
2329 isec->sid, SECCLASS_PROCESS, NULL,
2347 rc = avc_has_perm(old_tsec->sid, isec->sid,
2358 rc = avc_has_perm(new_tsec->sid, isec->sid,
2839 struct inode_security_struct *isec = selinux_inode(inode);
2842 spin_lock_init(&isec->lock);
2843 INIT_LIST_HEAD(&isec->list);
2844 isec->inode = inode;
2845 isec->sid = SECINITSID_UNLABELED;
2846 isec->sclass = SECCLASS_FILE;
2847 isec->task_sid = sid;
2848 isec->initialized = LABEL_INVALID;
2924 struct inode_security_struct *isec = selinux_inode(inode);
2925 isec->sclass = inode_mode_to_security_class(inode->i_mode);
2926 isec->sid = newsid;
2927 isec->initialized = LABEL_INITIALIZED;
2953 struct inode_security_struct *isec;
2959 isec = selinux_inode(inode);
2975 isec->sclass = context_isec->sclass;
2976 isec->sid = context_isec->sid;
2978 isec->sclass = SECCLASS_ANON_INODE;
2981 isec->sclass, name, &isec->sid);
2986 isec->initialized = LABEL_INITIALIZED;
2996 isec->sid,
2997 isec->sclass,
3055 struct inode_security_struct *isec;
3061 isec = inode_security_rcu(inode, rcu);
3062 if (IS_ERR(isec))
3063 return PTR_ERR(isec);
3065 return avc_has_perm(sid, isec->sid, isec->sclass, FILE__READ, &ad);
3073 struct inode_security_struct *isec = selinux_inode(inode);
3078 return slow_avc_audit(current_sid(), isec->sid, isec->sclass, perms,
3088 struct inode_security_struct *isec;
3107 isec = inode_security_rcu(inode, no_block);
3108 if (IS_ERR(isec))
3109 return PTR_ERR(isec);
3111 rc = avc_has_perm_noaudit(sid, isec->sid, isec->sclass, perms, 0,
3175 struct inode_security_struct *isec;
3204 isec = backing_inode_security(dentry);
3205 rc = avc_has_perm(sid, isec->sid, isec->sclass,
3245 rc = avc_has_perm(sid, newsid, isec->sclass,
3250 rc = security_validate_transition(isec->sid, newsid,
3251 sid, isec->sclass);
3286 struct inode_security_struct *isec;
3313 isec = backing_inode_security(dentry);
3314 spin_lock(&isec->lock);
3315 isec->sclass = inode_mode_to_security_class(inode->i_mode);
3316 isec->sid = newsid;
3317 isec->initialized = LABEL_INITIALIZED;
3318 spin_unlock(&isec->lock);
3412 struct inode_security_struct *isec;
3431 isec = inode_security(inode);
3433 error = security_sid_to_context_force(isec->sid, &context,
3436 error = security_sid_to_context(isec->sid,
3453 struct inode_security_struct *isec = inode_security_novalidate(inode);
3473 spin_lock(&isec->lock);
3474 isec->sclass = inode_mode_to_security_class(inode->i_mode);
3475 isec->sid = newsid;
3476 isec->initialized = LABEL_INITIALIZED;
3477 spin_unlock(&isec->lock);
3495 struct inode_security_struct *isec = inode_security_novalidate(inode);
3496 *secid = isec->sid;
3614 struct inode_security_struct *isec;
3621 isec = inode_security(inode);
3622 if (sid == fsec->sid && fsec->isid == isec->sid &&
3651 struct inode_security_struct *isec;
3675 isec = inode_security(inode);
3676 rc = avc_has_extended_perms(ssid, isec->sid, isec->sclass,
3950 struct inode_security_struct *isec;
3953 isec = inode_security(file_inode(file));
3961 fsec->isid = isec->sid;
4042 struct inode_security_struct *isec = inode_security(inode);
4047 ret = avc_has_perm(sid, isec->sid,
4053 tsec->create_sid = isec->sid;
4071 struct inode_security_struct *isec;
4093 isec = inode_security(file_inode(file));
4094 return avc_has_perm(sid, isec->sid, SECCLASS_SYSTEM,
4245 struct inode_security_struct *isec = selinux_inode(inode);
4248 spin_lock(&isec->lock);
4249 isec->sclass = inode_mode_to_security_class(inode->i_mode);
4250 isec->sid = sid;
4251 isec->initialized = LABEL_INITIALIZED;
4252 spin_unlock(&isec->lock);
4607 struct inode_security_struct *isec = inode_security_novalidate(SOCK_INODE(sock));
4619 isec->sclass = sclass;
4620 isec->sid = sid;
4621 isec->initialized = LABEL_INITIALIZED;
4903 struct inode_security_struct *isec;
4912 isec = inode_security_novalidate(SOCK_INODE(sock));
4913 spin_lock(&isec->lock);
4914 sclass = isec->sclass;
4915 sid = isec->sid;
4916 spin_unlock(&isec->lock);
5172 struct inode_security_struct *isec;
5184 isec = inode_security_novalidate(SOCK_INODE(sock));
5185 peer_secid = isec->sid;
5247 struct inode_security_struct *isec =
5253 isec->sid = sksec->sid;
5254 sksec->sclass = isec->sclass;
5511 /* NOTE: Ideally, we should also get the isec->sid for the
5512 new socket in sync, but we don't have the isec available yet.
5963 static void ipc_init_security(struct ipc_security_struct *isec, u16 sclass)
5965 isec->sclass = sclass;
5966 isec->sid = current_sid();
5972 struct ipc_security_struct *isec;
5976 isec = selinux_ipc(ipc_perms);
5981 return avc_has_perm(sid, isec->sid, isec->sclass, perms, &ad);
5997 struct ipc_security_struct *isec;
6001 isec = selinux_ipc(msq);
6002 ipc_init_security(isec, SECCLASS_MSGQ);
6007 return avc_has_perm(sid, isec->sid, SECCLASS_MSGQ,
6013 struct ipc_security_struct *isec;
6017 isec = selinux_ipc(msq);
6022 return avc_has_perm(sid, isec->sid, SECCLASS_MSGQ,
6056 struct ipc_security_struct *isec;
6062 isec = selinux_ipc(msq);
6073 rc = security_transition_sid(sid, isec->sid,
6083 rc = avc_has_perm(sid, isec->sid, SECCLASS_MSGQ,
6091 rc = avc_has_perm(msec->sid, isec->sid, SECCLASS_MSGQ,
6101 struct ipc_security_struct *isec;
6107 isec = selinux_ipc(msq);
6113 rc = avc_has_perm(sid, isec->sid,
6124 struct ipc_security_struct *isec;
6128 isec = selinux_ipc(shp);
6129 ipc_init_security(isec, SECCLASS_SHM);
6134 return avc_has_perm(sid, isec->sid, SECCLASS_SHM,
6140 struct ipc_security_struct *isec;
6144 isec = selinux_ipc(shp);
6149 return avc_has_perm(sid, isec->sid, SECCLASS_SHM,
6202 struct ipc_security_struct *isec;
6206 isec = selinux_ipc(sma);
6207 ipc_init_security(isec, SECCLASS_SEM);
6212 return avc_has_perm(sid, isec->sid, SECCLASS_SEM,
6218 struct ipc_security_struct *isec;
6222 isec = selinux_ipc(sma);
6227 return avc_has_perm(sid, isec->sid, SECCLASS_SEM,
6306 struct ipc_security_struct *isec = selinux_ipc(ipcp);
6307 *secid = isec->sid;
6525 struct inode_security_struct *isec = selinux_inode(inode);
6527 spin_lock(&isec->lock);
6528 isec->initialized = LABEL_INVALID;
6529 spin_unlock(&isec->lock);
6972 struct inode_security_struct *isec = selinux_inode(inode);
6978 return avc_has_perm(current_sid(), isec->sid,