Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:fs\exec.c Create Date:2022-07-28 20:04:02
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:determine how safe it is to execute the proposed program* - the caller must hold ->cred_guard_mutex to protect against* PTRACE_ATTACH or seccomp thread-sync

Proto:static void check_unsafe_exec(struct linux_binprm *bprm)

Type:void

Parameter:

TypeParameterName
struct linux_binprm *bprm
1483  p = current process
1486  If ptrace Then unsafe |= LSM_UNSAFE_PTRACE
1493  If task_no_new_privs(current process) Then unsafe |= LSM_UNSAFE_NO_NEW_PRIVS
1496  t = p
1497  n_fs = 1
1498  spin_lock( & lock)
1499  _read_lock() - mark the beginning of an RCU read-side critical section* When synchronize_rcu() is invoked on one CPU while other CPUs* are within RCU read-side critical sections, then the* synchronize_rcu() is guaranteed to block until after all the other
1501  If fs == fs Then n_fs++
1504  _read_unlock() - marks the end of an RCU read-side critical section.* In most situations, rcu_read_unlock() is immune from deadlock.* However, in kernels built with CONFIG_RCU_BOOST, rcu_read_unlock()
1506  If users > n_fs Then unsafe |= prm->unsafe reasons
1508  Else in_exec = 1
1510  spin_unlock( & lock)
Caller
NameDescribe
__do_execve_filesys_execve() executes a new program.