Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\selinux\include\objsec.h Create Date:2022-07-28 18:52:16
Last Modify:2020-03-18 08:17:34 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:get the subjective security ID of the current task

Proto:static inline unsigned int current_sid(void)

Type:unsigned int

Parameter:Nothing

187  tsec = selinux_cred(current_cred - Access the current task's subjective credentials* Access the subjective credentials of the current task. RCU-safe,* since nobody else can modify it.())
189  Return current SID
Caller
NameDescribe
inode_alloc_securityAllocate and free functions for each kind of security blob.
file_alloc_security
selinux_set_mnt_optsAllow filesystems with binary mount data to explicitly set mount point* labeling information.
may_linkCheck whether a task can link, unlink, or rmdir a file/directory.
may_rename
selinux_binder_set_context_mgrHook functions begin here.
selinux_binder_transaction
selinux_ptrace_access_check
selinux_ptrace_traceme
selinux_capget
selinux_syslog
audit_inode_permission
selinux_inode_setxattr
selinux_file_permission
selinux_mmap_addr
selinux_file_set_fowner
selinux_task_allocask security operations
selinux_kernel_act_asset the security data for a kernel service* - all the creation contexts are set to unlabelled
selinux_kernel_create_files_asset the file creation context in a security record to the same as the* objective context of the specified inode
selinux_kernel_module_request
selinux_kernel_module_from_file
selinux_task_setpgid
selinux_task_getpgid
selinux_task_getsid
selinux_task_setnice
selinux_task_setioprio
selinux_task_getioprio
selinux_task_setrlimit
selinux_task_setscheduler
selinux_task_getscheduler
selinux_task_movememory
selinux_task_kill
sock_has_perm
selinux_tun_dev_alloc_security
selinux_tun_dev_create
selinux_tun_dev_attach_queue
selinux_tun_dev_open
ipc_init_security
ipc_has_perm
selinux_msg_queue_alloc_securitymessage queue security operations
selinux_msg_queue_associate
selinux_msg_queue_msgctl
selinux_msg_queue_msgsnd
selinux_shm_alloc_securityShared Memory security operations
selinux_shm_associate
selinux_shm_shmctlNote, at this point, shp is locked down
selinux_sem_alloc_securitySemaphore security operations
selinux_sem_associate
selinux_sem_semctlNote, at this point, sma is locked down
selinux_getprocattr
selinux_setprocattr
sel_open_policy
sel_read_policy
sel_write_load
sel_write_context
sel_write_checkreqprot
sel_write_validatetrans
sel_write_accessRemaining nodes use transaction based IO methods like nfsd/nfsctl.c
sel_write_create
sel_write_relabel
sel_write_user
sel_write_member
sel_write_bool
sel_commit_bools_write
sel_write_avc_cache_threshold