/Linux-v5.15/include/linux/ |
D | shm.h | 17 long do_shmat(int shmid, char __user *shmaddr, int shmflg, unsigned long *addr, 28 int shmflg, unsigned long *addr, in do_shmat() argument
|
D | security.h | 451 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg); 453 int security_shm_shmat(struct kern_ipc_perm *shp, char __user *shmaddr, int shmflg); 1248 int shmflg) in security_shm_associate() argument 1259 char __user *shmaddr, int shmflg) in security_shm_shmat() argument
|
D | lsm_hook_defs.h | 244 LSM_HOOK(int, 0, shm_associate, struct kern_ipc_perm *perm, int shmflg) 247 int shmflg)
|
D | compat.h | 776 asmlinkage long compat_sys_shmat(int shmid, compat_uptr_t shmaddr, int shmflg);
|
D | syscalls.h | 833 asmlinkage long sys_shmat(int shmid, char __user *shmaddr, int shmflg); 1370 long ksys_shmget(key_t key, size_t size, int shmflg);
|
/Linux-v5.15/ipc/ |
D | shm.c | 603 int shmflg = params->flg; in newseg() local 627 shp->shm_perm.mode = (shmflg & S_IRWXUGO); in newseg() 638 if (shmflg & SHM_HUGETLB) { in newseg() 642 hs = hstate_sizelog((shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 650 if (shmflg & SHM_NORESERVE) in newseg() 654 (shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 660 if ((shmflg & SHM_NORESERVE) && in newseg() 725 long ksys_shmget(key_t key, size_t size, int shmflg) in ksys_shmget() argument 738 shm_params.flg = shmflg; in ksys_shmget() 744 SYSCALL_DEFINE3(shmget, key_t, key, size_t, size, int, shmflg) in SYSCALL_DEFINE3() argument [all …]
|
/Linux-v5.15/arch/xtensa/kernel/ |
D | syscall.c | 39 asmlinkage long xtensa_shmat(int shmid, char __user *shmaddr, int shmflg) in xtensa_shmat() argument 44 err = do_shmat(shmid, shmaddr, shmflg, &ret, SHMLBA); in xtensa_shmat()
|
/Linux-v5.15/security/ |
D | security.c | 1985 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg) in security_shm_associate() argument 1987 return call_int_hook(shm_associate, 0, shp, shmflg); in security_shm_associate() 1995 int security_shm_shmat(struct kern_ipc_perm *shp, char __user *shmaddr, int shmflg) in security_shm_shmat() argument 1997 return call_int_hook(shm_shmat, 0, shp, shmaddr, shmflg); in security_shm_shmat()
|
/Linux-v5.15/security/smack/ |
D | smack_lsm.c | 2956 static int smack_shm_associate(struct kern_ipc_perm *isp, int shmflg) in smack_shm_associate() argument 2960 may = smack_flags_to_may(shmflg); in smack_shm_associate() 3008 int shmflg) in smack_shm_shmat() argument 3012 may = smack_flags_to_may(shmflg); in smack_shm_shmat()
|
/Linux-v5.15/security/selinux/ |
D | hooks.c | 6264 static int selinux_shm_associate(struct kern_ipc_perm *shp, int shmflg) in selinux_shm_associate() argument 6317 char __user *shmaddr, int shmflg) in selinux_shm_shmat() argument 6321 if (shmflg & SHM_RDONLY) in selinux_shm_shmat()
|