Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\smack\smack.h Create Date:2022-07-28 19:19:12
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:smack_inode

Proto:static inline struct inode_smack *smack_inode(const struct inode *inode)

Type:struct inode_smack

Parameter:

TypeParameterName
const struct inode *inode
362  Return i_security + lbs_inode
Caller
NameDescribe
init_inode_smack_inode_smack - initialize an inode security blob*@inode: inode to extract the info from*@skp: a pointer to the Smack label entry to use in the blob
smack_set_mnt_optssmack_set_mnt_opts - set Smack specific mount options*@sb: the file system superblock*@mnt_opts: Smack mount options*@kern_flags: mount option from kernel space or user space*@set_kern_flags: where to store converted mount opts* Returns 0 on success, an
smack_bprm_set_credssmack_bprm_set_creds - set creds for exec*@bprm: the exec information* Returns 0 if it gets a blob, -EPERM if exec forbidden and -ENOMEM otherwise
smack_inode_init_securitysmack_inode_init_security - copy out the smack from an inode*@inode: the newly created inode*@dir: containing directory object*@qstr: unused*@name: where to put the attribute name*@value: where to put the attribute value*@len: where to put the length of
smack_inode_post_setxattrsmack_inode_post_setxattr - Apply the Smack update approved above*@dentry: object*@name: attribute name*@value: attribute value*@size: attribute size*@flags: unused* Set the pointer in the inode blob to the entry found* in the master label list.
smack_inode_removexattrsmack_inode_removexattr - Smack check on removexattr*@dentry: the object*@name: name of the attribute* Removing the Smack attribute requires CAP_MAC_ADMIN* Returns 0 if access is permitted, an error code otherwise
smack_mmap_filesmack_mmap_file :* Check permissions for a mmap operation. The @file may be NULL, e.g.* if mapping anonymous memory.*@file contains the file structure for file to map (may be NULL).*@reqprot contains the protection requested by the application.
smack_kernel_create_files_assmack_kernel_create_files_as - Set the file creation label in a set of creds*@new: points to the set of credentials to be modified*@inode: points to the inode to use as a reference* Set the file creation context in a set of credentials to the same* as the
smack_task_to_inodesmack_task_to_inode - copy task smack into the inode blob*@p: task to copy from*@inode: inode to copy to* Sets the smack pointer in the inode security blob
smack_inode_setsecuritysmack_inode_setsecurity - set smack xattrs*@inode: the object*@name: attribute name*@value: attribute value*@size: size of the attribute*@flags: unused* Sets the named attribute in the appropriate blob* Returns 0 on success, or an error code
smack_d_instantiatesmack_d_instantiate - Make sure the blob is correct on an inode*@opt_dentry: dentry where inode will be attached*@inode: the object* Set the inode's security blob if it hasn't been done already.
smack_inode_copy_up
smack_dentry_create_files_as