Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\smack\smack_lsm.c Create Date:2022-07-28 19:22:55
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:smk_curacc_sem : check if current has access on sem*@isp : the object*@access : access requested* Returns 0 if current has the requested access, error code otherwise

Proto:static int smk_curacc_sem(struct kern_ipc_perm *isp, int access)

Type:int

Parameter:

TypeParameterName
struct kern_ipc_perm *isp
intaccess
3029  ssp = smack_of_ipc - the smack pointer for the ipc*@isp: the object* Returns a pointer to the smack value
3034  some inline functions to set up audit data* they do nothing if CONFIG_AUDIT is not set
3035  ipc_id = id
3037  rc = smk_curacc - determine if current has a specific access to an object*@obj_known: a pointer to the object's Smack label entry*@mode: the access requested, in "MAY" format*@a : common audit data* This function checks the current subject label/object label
3038  rc = smk_bu_current("sem", ssp, access, rc)
3039  Return rc
Caller
NameDescribe
smack_sem_associatesmack_sem_associate - Smack access check for sem*@isp: the object*@semflg: access requested* Returns 0 if current has the requested access, error code otherwise
smack_sem_semctlsmack_sem_shmctl - Smack access check for sem*@isp: the object*@cmd: what it wants to do* Returns 0 if current has the requested access, error code otherwise
smack_sem_semopsmack_sem_semop - Smack checks of semaphore operations*@isp: the object*@sops: unused*@nsops: unused*@alter: unused* Treated as read and write in all cases.* Returns 0 if access is allowed, error code otherwise