Lines Matching defs:new
474 * IMPORTANT: Double-check logic in this function when adding a new
874 struct superblock_security_struct *new = selinux_superblock(newsb);
876 char newflags = new->flags & SE_MNTMASK;
880 if ((oldflags & FSCONTEXT_MNT) && old->sid != new->sid)
882 if ((oldflags & CONTEXT_MNT) && old->mntpoint_sid != new->mntpoint_sid)
884 if ((oldflags & DEFCONTEXT_MNT) && old->def_sid != new->def_sid)
2116 static int selinux_capset(struct cred *new, const struct cred *old,
2121 return avc_has_perm(cred_sid(old), cred_sid(new), SECCLASS_PROCESS,
2204 * Check that a process has enough memory to allocate a new virtual
2258 * the old and new contexts.
2455 * Prepare a process for imminent new credential changes due to exec
2467 /* Close files for which the new task SID is not authorized. */
2473 /* Check whether the new SID can inherit resource limits from the old
2500 * Clean up the process immediately after the installation of new credentials
2515 /* Check whether the new SID can inherit signal state from the old SID.
2520 * kill done after the flush will be checked against the new SID.
2538 * wait permission to the new task SID. */
2883 struct cred *new)
2896 tsec = selinux_cred(new);
3499 static int selinux_inode_copy_up(struct dentry *src, struct cred **new)
3503 struct cred *new_creds = *new;
3515 *new = new_creds;
3968 * new inode label or new policy.
3985 * prepare a new set of credentials for modification
3987 static int selinux_cred_prepare(struct cred *new, const struct cred *old,
3991 struct task_security_struct *tsec = selinux_cred(new);
4000 static void selinux_cred_transfer(struct cred *new, const struct cred *old)
4003 struct task_security_struct *tsec = selinux_cred(new);
4017 static int selinux_kernel_act_as(struct cred *new, u32 secid)
4019 struct task_security_struct *tsec = selinux_cred(new);
4040 static int selinux_kernel_create_files_as(struct cred *new, struct inode *inode)
4043 struct task_security_struct *tsec = selinux_cred(new);
5334 * sockets and peeled off connections as they cause a new
5336 * plug this into the new socket.
5361 * into a new socket.
5429 * whenever a new IP address is added or when a new
5449 /* Called whenever a new socket is created by accept(2) or sctp_peeloff(3). */
5477 * and re-recreating a new label using the updated context
5512 new socket in sync, but we don't have the isec available yet.
6070 * Compute new sid based on current process and
6368 struct cred *new;
6433 new = prepare_creds();
6434 if (!new)
6443 tsec = selinux_cred(new);
6492 commit_creds(new);
6497 abort_creds(new);
6935 * @new: the target creds
6940 static int selinux_uring_override_creds(const struct cred *new)
6942 return avc_has_perm(current_sid(), cred_sid(new),
6949 * Check to see if the current task is allowed to create a new io_uring
6984 * IMPORTANT NOTE: When adding new hooks, please be careful to keep this order: