函数逻辑报告

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\smack\smack_access.c Create Date:2022-07-27 20:55:11
Last Modify:2020-03-12 14:18:49 Copyright©Brick
首页 函数Tree
注解内核,赢得工具下载SCCTEnglish

函数名称:smack_from_secid - find the Smack label associated with a secid*@secid: an integer that might be associated with a Smack label* Returns a pointer to the appropriate Smack label entry if there is one,* otherwise a pointer to the invalid Smack label.

函数原型:struct smack_known *smack_from_secid(const unsigned int secid)

返回类型:struct smack_known

参数:

类型参数名称
const unsigned intsecid
596  _read_lock() - mark the beginning of an RCU read-side critical section* When synchronize_rcu() is invoked on one CPU while other CPUs* are within RCU read-side critical sections, then the* synchronize_rcu() is guaranteed to block until after all the other
598  如果smk_secid恒等于secid
599  _read_unlock() - marks the end of an RCU read-side critical section.* In most situations, rcu_read_unlock() is immune from deadlock.* However, in kernels built with CONFIG_RCU_BOOST, rcu_read_unlock()
600  返回:skp
608  _read_unlock() - marks the end of an RCU read-side critical section.* In most situations, rcu_read_unlock() is immune from deadlock.* However, in kernels built with CONFIG_RCU_BOOST, rcu_read_unlock()
609  返回:smack_known_huh
调用者
名称描述
smack_from_secattrsmack_from_secattr - Convert a netlabel attr.mls.lvl/attr.mls.cat pair to smack*@sap: netlabel secattr*@ssp: socket security information* Returns a pointer to a Smack label entry found on the label list.
smack_socket_sock_rcv_skbsmack_socket_sock_rcv_skb - Smack packet delivery access check*@sk: socket*@skb: packet* Returns 0 if the packet should be delivered, an error code otherwise
smack_inet_conn_requestsmack_inet_conn_request - Smack access check on connect*@sk: socket involved*@skb: packet*@req: unused* Returns 0 if a task with the packet label could write to* the socket, otherwise an error code
smack_inet_csk_clonesmack_inet_csk_clone - Copy the connection information to the new socket*@sk: the new socket*@req: the connection's request_sock* Transfer the connection's peer label to the newly created socket.
smack_audit_rule_matchsmack_audit_rule_match - Audit given object ?*@secid: security id for identifying the object to test*@field: audit rule flags given from user-space*@op: required testing operator*@vrule: smack internal rule presentation* The core Audit hook
smack_secid_to_secctxsmack_secid_to_secctx - return the smack label for a secid*@secid: incoming integer*@secdata: destination*@seclen: how long it is* Exists for networking code.