/Linux-v5.10/include/linux/ |
D | shm.h | 17 long do_shmat(int shmid, char __user *shmaddr, int shmflg, unsigned long *addr, 28 int shmflg, unsigned long *addr, in do_shmat() argument
|
D | security.h | 435 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg); 437 int security_shm_shmat(struct kern_ipc_perm *shp, char __user *shmaddr, int shmflg); 1204 int shmflg) in security_shm_associate() argument 1215 char __user *shmaddr, int shmflg) in security_shm_shmat() argument
|
D | lsm_hook_defs.h | 234 LSM_HOOK(int, 0, shm_associate, struct kern_ipc_perm *perm, int shmflg) 237 int shmflg)
|
D | compat.h | 714 asmlinkage long compat_sys_shmat(int shmid, compat_uptr_t shmaddr, int shmflg);
|
D | syscalls.h | 799 asmlinkage long sys_shmat(int shmid, char __user *shmaddr, int shmflg); 1339 long ksys_shmget(key_t key, size_t size, int shmflg);
|
/Linux-v5.10/ipc/ |
D | shm.c | 603 int shmflg = params->flg; in newseg() local 627 shp->shm_perm.mode = (shmflg & S_IRWXUGO); in newseg() 638 if (shmflg & SHM_HUGETLB) { in newseg() 642 hs = hstate_sizelog((shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 650 if (shmflg & SHM_NORESERVE) in newseg() 654 (shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 660 if ((shmflg & SHM_NORESERVE) && in newseg() 725 long ksys_shmget(key_t key, size_t size, int shmflg) in ksys_shmget() argument 738 shm_params.flg = shmflg; in ksys_shmget() 744 SYSCALL_DEFINE3(shmget, key_t, key, size_t, size, int, shmflg) in SYSCALL_DEFINE3() argument [all …]
|
/Linux-v5.10/arch/xtensa/kernel/ |
D | syscall.c | 43 asmlinkage long xtensa_shmat(int shmid, char __user *shmaddr, int shmflg) in xtensa_shmat() argument 48 err = do_shmat(shmid, shmaddr, shmflg, &ret, SHMLBA); in xtensa_shmat()
|
/Linux-v5.10/security/ |
D | security.c | 1919 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg) in security_shm_associate() argument 1921 return call_int_hook(shm_associate, 0, shp, shmflg); in security_shm_associate() 1929 int security_shm_shmat(struct kern_ipc_perm *shp, char __user *shmaddr, int shmflg) in security_shm_shmat() argument 1931 return call_int_hook(shm_shmat, 0, shp, shmaddr, shmflg); in security_shm_shmat()
|
/Linux-v5.10/security/smack/ |
D | smack_lsm.c | 2957 static int smack_shm_associate(struct kern_ipc_perm *isp, int shmflg) in smack_shm_associate() argument 2961 may = smack_flags_to_may(shmflg); in smack_shm_associate() 3009 int shmflg) in smack_shm_shmat() argument 3013 may = smack_flags_to_may(shmflg); in smack_shm_shmat()
|
/Linux-v5.10/security/selinux/ |
D | hooks.c | 6094 static int selinux_shm_associate(struct kern_ipc_perm *shp, int shmflg) in selinux_shm_associate() argument 6147 char __user *shmaddr, int shmflg) in selinux_shm_shmat() argument 6151 if (shmflg & SHM_RDONLY) in selinux_shm_shmat()
|