/linux-6.12.1/ipc/ |
D | shm.c | 700 int shmflg = params->flg; in newseg() local 724 shp->shm_perm.mode = (shmflg & S_IRWXUGO); in newseg() 735 if (shmflg & SHM_HUGETLB) { in newseg() 739 hs = hstate_sizelog((shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 747 if (shmflg & SHM_NORESERVE) in newseg() 750 HUGETLB_SHMFS_INODE, (shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 756 if ((shmflg & SHM_NORESERVE) && in newseg() 823 long ksys_shmget(key_t key, size_t size, int shmflg) in ksys_shmget() argument 836 shm_params.flg = shmflg; in ksys_shmget() 842 SYSCALL_DEFINE3(shmget, key_t, key, size_t, size, int, shmflg) in SYSCALL_DEFINE3() argument [all …]
|
/linux-6.12.1/include/linux/ |
D | shm.h | 17 long do_shmat(int shmid, char __user *shmaddr, int shmflg, unsigned long *addr, 27 int shmflg, unsigned long *addr, in do_shmat() argument
|
D | security.h | 498 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg); 500 int security_shm_shmat(struct kern_ipc_perm *shp, char __user *shmaddr, int shmflg); 1390 int shmflg) in security_shm_associate() argument 1401 char __user *shmaddr, int shmflg) in security_shm_shmat() argument
|
D | lsm_hook_defs.h | 274 LSM_HOOK(int, 0, shm_associate, struct kern_ipc_perm *perm, int shmflg) 277 int shmflg)
|
D | compat.h | 750 asmlinkage long compat_sys_shmat(int shmid, compat_uptr_t shmaddr, int shmflg);
|
D | syscalls.h | 747 asmlinkage long sys_shmat(int shmid, char __user *shmaddr, int shmflg); 1292 long ksys_shmget(key_t key, size_t size, int shmflg);
|
/linux-6.12.1/arch/xtensa/kernel/ |
D | syscall.c | 39 asmlinkage long xtensa_shmat(int shmid, char __user *shmaddr, int shmflg) in xtensa_shmat() argument 44 err = do_shmat(shmid, shmaddr, shmflg, &ret, SHMLBA); in xtensa_shmat()
|
/linux-6.12.1/security/ |
D | security.c | 3931 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg) in security_shm_associate() argument 3933 return call_int_hook(shm_associate, shp, shmflg); in security_shm_associate() 3964 char __user *shmaddr, int shmflg) in security_shm_shmat() argument 3966 return call_int_hook(shm_shmat, shp, shmaddr, shmflg); in security_shm_shmat()
|
/linux-6.12.1/security/smack/ |
D | smack_lsm.c | 3152 static int smack_shm_associate(struct kern_ipc_perm *isp, int shmflg) in smack_shm_associate() argument 3156 may = smack_flags_to_may(shmflg); in smack_shm_associate() 3204 int shmflg) in smack_shm_shmat() argument 3208 may = smack_flags_to_may(shmflg); in smack_shm_shmat()
|
/linux-6.12.1/security/selinux/ |
D | hooks.c | 6156 static int selinux_shm_associate(struct kern_ipc_perm *shp, int shmflg) in selinux_shm_associate() argument 6205 char __user *shmaddr, int shmflg) in selinux_shm_shmat() argument 6209 if (shmflg & SHM_RDONLY) in selinux_shm_shmat()
|