/linux-6.1.9/ipc/ |
D | shm.c | 708 int shmflg = params->flg; in newseg() local 732 shp->shm_perm.mode = (shmflg & S_IRWXUGO); in newseg() 743 if (shmflg & SHM_HUGETLB) { in newseg() 747 hs = hstate_sizelog((shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 755 if (shmflg & SHM_NORESERVE) in newseg() 758 HUGETLB_SHMFS_INODE, (shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 764 if ((shmflg & SHM_NORESERVE) && in newseg() 831 long ksys_shmget(key_t key, size_t size, int shmflg) in ksys_shmget() argument 844 shm_params.flg = shmflg; in ksys_shmget() 850 SYSCALL_DEFINE3(shmget, key_t, key, size_t, size, int, shmflg) in SYSCALL_DEFINE3() argument [all …]
|
/linux-6.1.9/include/linux/ |
D | shm.h | 17 long do_shmat(int shmid, char __user *shmaddr, int shmflg, unsigned long *addr, 28 int shmflg, unsigned long *addr, in do_shmat() argument
|
D | security.h | 457 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg); 459 int security_shm_shmat(struct kern_ipc_perm *shp, char __user *shmaddr, int shmflg); 1266 int shmflg) in security_shm_associate() argument 1277 char __user *shmaddr, int shmflg) in security_shm_shmat() argument
|
D | lsm_hook_defs.h | 244 LSM_HOOK(int, 0, shm_associate, struct kern_ipc_perm *perm, int shmflg) 247 int shmflg)
|
D | compat.h | 808 asmlinkage long compat_sys_shmat(int shmid, compat_uptr_t shmaddr, int shmflg);
|
D | syscalls.h | 834 asmlinkage long sys_shmat(int shmid, char __user *shmaddr, int shmflg); 1374 long ksys_shmget(key_t key, size_t size, int shmflg);
|
/linux-6.1.9/arch/xtensa/kernel/ |
D | syscall.c | 39 asmlinkage long xtensa_shmat(int shmid, char __user *shmaddr, int shmflg) in xtensa_shmat() argument 44 err = do_shmat(shmid, shmaddr, shmflg, &ret, SHMLBA); in xtensa_shmat()
|
/linux-6.1.9/security/ |
D | security.c | 2009 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg) in security_shm_associate() argument 2011 return call_int_hook(shm_associate, 0, shp, shmflg); in security_shm_associate() 2019 int security_shm_shmat(struct kern_ipc_perm *shp, char __user *shmaddr, int shmflg) in security_shm_shmat() argument 2021 return call_int_hook(shm_shmat, 0, shp, shmaddr, shmflg); in security_shm_shmat()
|
/linux-6.1.9/security/smack/ |
D | smack_lsm.c | 2969 static int smack_shm_associate(struct kern_ipc_perm *isp, int shmflg) in smack_shm_associate() argument 2973 may = smack_flags_to_may(shmflg); in smack_shm_associate() 3021 int shmflg) in smack_shm_shmat() argument 3025 may = smack_flags_to_may(shmflg); in smack_shm_shmat()
|
/linux-6.1.9/security/selinux/ |
D | hooks.c | 6147 static int selinux_shm_associate(struct kern_ipc_perm *shp, int shmflg) in selinux_shm_associate() argument 6200 char __user *shmaddr, int shmflg) in selinux_shm_shmat() argument 6204 if (shmflg & SHM_RDONLY) in selinux_shm_shmat()
|