函数逻辑报告

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\smack\smack.h Create Date:2022-07-27 20:48:31
Last Modify:2020-03-12 14:18:49 Copyright©Brick
首页 函数Tree
注解内核,赢得工具下载SCCTEnglish

函数名称:some inline functions to set up audit data* they do nothing if CONFIG_AUDIT is not set

函数原型:static inline void smk_ad_init(struct smk_audit_info *a, const char *func, char type)

返回类型:void

参数:

类型参数名称
struct smk_audit_info *a
const char *func
chartype
454  memset( & sad, 0, sad的长度)
455  type等于type
456  smack_audit_data等于sad
457  function等于func
调用者
名称描述
smk_ptrace_rule_checksmk_ptrace_rule_check - helper for ptrace access*@tracer: tracer process*@tracee_known: label entry of the process that's about to be traced*@mode: ptrace attachment mode (PTRACE_MODE_*)*@func: name of the function that called us, used for audit* Returns
smack_sb_statfssmack_sb_statfs - Smack check on statfs*@dentry: identifies the file system in question* Returns 0 if current can read the floor of the filesystem,* and error code otherwise
smack_inode_linksmack_inode_link - Smack check on link*@old_dentry: the existing object*@dir: unused*@new_dentry: the new object* Returns 0 if access is permitted, an error code otherwise
smack_inode_unlinksmack_inode_unlink - Smack check on inode deletion*@dir: containing directory object*@dentry: file to unlink* Returns 0 if current can write the containing directory* and the object, error code otherwise
smack_inode_rmdirsmack_inode_rmdir - Smack check on directory deletion*@dir: containing directory object*@dentry: directory to unlink* Returns 0 if current can write the containing directory* and the directory, error code otherwise
smack_inode_renamesmack_inode_rename - Smack check on rename*@old_inode: unused*@old_dentry: the old object*@new_inode: unused*@new_dentry: the new object* Read and write access is required on both the old and* new directories
smack_inode_permissionsmack_inode_permission - Smack version of permission()*@inode: the inode in question*@mask: the access requested* This is the important Smack hook.* Returns 0 if access is permitted, an error code otherwise
smack_inode_setattrsmack_inode_setattr - Smack check for setting attributes*@dentry: the object*@iattr: for the force flag* Returns 0 if access is permitted, an error code otherwise
smack_inode_getattrsmack_inode_getattr - Smack check for getting attributes*@path: path to extract the info from* Returns 0 if access is permitted, an error code otherwise
smack_inode_setxattrsmack_inode_setxattr - Smack check for setting xattrs*@dentry: the object*@name: name of the attribute*@value: value of the attribute*@size: size of the value*@flags: unused* This protects the Smack attribute explicitly
smack_inode_getxattrsmack_inode_getxattr - Smack check on getxattr*@dentry: the object*@name: unused* Returns 0 if access is permitted, an error code otherwise
smack_inode_removexattrsmack_inode_removexattr - Smack check on removexattr*@dentry: the object*@name: name of the attribute* Removing the Smack attribute requires CAP_MAC_ADMIN* Returns 0 if access is permitted, an error code otherwise
smack_file_ioctlsmack_file_ioctl - Smack check on ioctls*@file: the object*@cmd: what to do*@arg: unused* Relies heavily on the correct use of the ioctl command conventions.* Returns 0 if allowed, error code otherwise
smack_file_locksmack_file_lock - Smack check on file locking*@file: the object*@cmd: unused* Returns 0 if current has lock access, error code otherwise
smack_file_fcntlsmack_file_fcntl - Smack check on fcntl*@file: the object*@cmd: what action to check*@arg: unused* Generally these operations are harmless
smack_file_send_sigiotasksmack_file_send_sigiotask - Smack on sigio*@tsk: The target task*@fown: the object the signal come from*@signum: unused* Allow a privileged task to get signals even if it shouldn't* Returns 0 if a subject with the object's smack could
smack_file_receivesmack_file_receive - Smack file receive check*@file: the object* Returns 0 if current has access, error code otherwise
smack_file_opensmack_file_open - Smack dentry open processing*@file: the object* Set the security blob in the file structure.* Allow the open only if the task has read access. There are* many read operations (e.g. fstat) that you can do with an
smk_curacc_on_tasksmk_curacc_on_task - helper to log task related access*@p: the task object*@access: the access requested*@caller: name of the calling function for audit* Return 0 if access is permitted
smack_task_killsmack_task_kill - Smack check on signal delivery*@p: the task object*@info: unused*@sig: unused*@cred: identifies the cred to use in lieu of current's* Return 0 if write access is permitted
smk_curacc_shmsmk_curacc_shm : check if current has access on shm*@isp : the object*@access : access requested* Returns 0 if current has the requested access, error code otherwise
smk_curacc_semsmk_curacc_sem : check if current has access on sem*@isp : the object*@access : access requested* Returns 0 if current has the requested access, error code otherwise
smk_curacc_msqsmk_curacc_msq : helper to check if current has access on msq*@isp : the msq*@access : access requested* return 0 if current has access, error otherwise
smack_ipc_permissionsmack_ipc_permission - Smack access for ipc_permission()*@ipp: the object permissions*@flag: access requested* Returns 0 if current has read and write access, error code otherwise
smack_key_permissionsmack_key_permission - Smack access on a key*@key_ref: gets to the object*@cred: the credentials to use*@perm: requested key permissions* Return 0 if the task has read and write to the object,* an error code otherwise
smk_ad_init_net