Function report |
Source Code:security\smack\smack.h |
Create Date:2022-07-28 19:19:14 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Present a pointer to the smack label entry in an inode blob.
Proto:static inline struct smack_known *smk_of_inode(const struct inode *isp)
Type:struct smack_known
Parameter:
Type | Parameter | Name |
---|---|---|
const struct inode * | isp |
389 | sip = smack_inode(isp) |
390 | Return label of the fso |
Name | Describe |
---|---|
smack_inode_init_security | smack_inode_init_security - copy out the smack from an inode*@inode: the newly created inode*@dir: containing directory object*@qstr: unused*@name: where to put the attribute name*@value: where to put the attribute value*@len: where to put the length of |
smack_inode_link | smack_inode_link - Smack check on link*@old_dentry: the existing object*@dir: unused*@new_dentry: the new object* Returns 0 if access is permitted, an error code otherwise |
smack_inode_unlink | smack_inode_unlink - Smack check on inode deletion*@dir: containing directory object*@dentry: file to unlink* Returns 0 if current can write the containing directory* and the object, error code otherwise |
smack_inode_rmdir | smack_inode_rmdir - Smack check on directory deletion*@dir: containing directory object*@dentry: directory to unlink* Returns 0 if current can write the containing directory* and the directory, error code otherwise |
smack_inode_rename | smack_inode_rename - Smack check on rename*@old_inode: unused*@old_dentry: the old object*@new_inode: unused*@new_dentry: the new object* Read and write access is required on both the old and* new directories |
smack_inode_permission | smack_inode_permission - Smack version of permission()*@inode: the inode in question*@mask: the access requested* This is the important Smack hook.* Returns 0 if access is permitted, an error code otherwise |
smack_inode_setattr | smack_inode_setattr - Smack check for setting attributes*@dentry: the object*@iattr: for the force flag* Returns 0 if access is permitted, an error code otherwise |
smack_inode_getattr | smack_inode_getattr - Smack check for getting attributes*@path: path to extract the info from* Returns 0 if access is permitted, an error code otherwise |
smack_inode_setxattr | smack_inode_setxattr - Smack check for setting xattrs*@dentry: the object*@name: name of the attribute*@value: value of the attribute*@size: size of the value*@flags: unused* This protects the Smack attribute explicitly |
smack_inode_getxattr | smack_inode_getxattr - Smack check on getxattr*@dentry: the object*@name: unused* Returns 0 if access is permitted, an error code otherwise |
smack_inode_removexattr | smack_inode_removexattr - Smack check on removexattr*@dentry: the object*@name: name of the attribute* Removing the Smack attribute requires CAP_MAC_ADMIN* Returns 0 if access is permitted, an error code otherwise |
smack_inode_getsecurity | smack_inode_getsecurity - get smack xattrs*@inode: the object*@name: attribute name*@buffer: where to put the result*@alloc: duplicate memory* Returns the size of the attribute or an error code |
smack_inode_getsecid | smack_inode_getsecid - Extract inode's security id*@inode: inode to extract the info from*@secid: where result will be saved |
smack_file_ioctl | smack_file_ioctl - Smack check on ioctls*@file: the object*@cmd: what to do*@arg: unused* Relies heavily on the correct use of the ioctl command conventions.* Returns 0 if allowed, error code otherwise |
smack_file_lock | smack_file_lock - Smack check on file locking*@file: the object*@cmd: unused* Returns 0 if current has lock access, error code otherwise |
smack_file_fcntl | smack_file_fcntl - Smack check on fcntl*@file: the object*@cmd: what action to check*@arg: unused* Generally these operations are harmless |
smack_file_receive | smack_file_receive - Smack file receive check*@file: the object* Returns 0 if current has access, error code otherwise |
smack_file_open | smack_file_open - Smack dentry open processing*@file: the object* Set the security blob in the file structure.* Allow the open only if the task has read access. There are* many read operations (e.g. fstat) that you can do with an |
smack_inode_getsecctx |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |