Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:kernel\signal.c Create Date:2022-07-28 09:16:12
Last Modify:2020-03-17 13:28:47 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:The usb asyncio usage of siginfo is wrong

Proto:int kill_pid_usb_asyncio(int sig, int errno, sigval_t addr, struct pid *pid, const struct cred *cred)

Type:int

Parameter:

TypeParameterName
intsig
interrno
sigval_taddr
struct pid *pid
const struct cred *cred
1506  ret = -EINVAL
1508  clear_siginfo( & info)
1509  si_signo = sig
1510  si_errno = errno
1511  si_code = sent by AIO completion
1512  * ((sigval_t * ) & si_pid) = addr
1514  If Not Test if 'sig' is valid signal. Use this instead of testing _NSIG directly Then Return ret
1517  _read_lock() - mark the beginning of an RCU read-side critical section* When synchronize_rcu() is invoked on one CPU while other CPUs* are within RCU read-side critical sections, then the* synchronize_rcu() is guaranteed to block until after all the other
1518  p = pid_task(pid, PIDTYPE_PID)
1519  If Not p Then
1520  ret = -ESRCH
1521  Go to out_unlock
1523  If Not kill_as_cred_perm(cred, p) Then
1524  ret = -EPERM
1525  Go to out_unlock
1527  ret = security_task_kill(p, & info, sig, cred)
1528  If ret Then Go to out_unlock
1531  If sig Then
1532  If lock_task_sighand(p, & flags) Then
1533  ret = __send_signal(sig, & info, p, PIDTYPE_TGID, false)
1535  Else ret = -ESRCH
1538  out_unlock :
1539  _read_unlock() - marks the end of an RCU read-side critical section.* In most situations, rcu_read_unlock() is immune from deadlock.* However, in kernels built with CONFIG_RCU_BOOST, rcu_read_unlock()
1540  Return ret