函数逻辑报告

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\smack\smack_lsm.c Create Date:2022-07-27 20:50:33
Last Modify:2020-03-12 14:18:49 Copyright©Brick
首页 函数Tree
注解内核,赢得工具下载SCCTEnglish

函数名称:smack_file_send_sigiotask - Smack on sigio*@tsk: The target task*@fown: the object the signal come from*@signum: unused* Allow a privileged task to get signals even if it shouldn't* Returns 0 if a subject with the object's smack could

函数原型:static int smack_file_send_sigiotask(struct task_struct *tsk, struct fown_struct *fown, int signum)

返回类型:int

参数:

类型参数名称
struct task_struct *tsk
struct fown_struct *fown
intsignum
1787  tkp等于Present a pointer to the smack label entry in an task blob.
1796  file等于container_of - cast a member of a structure out to the containing structure*@ptr: the pointer to the member.*@type: the type of the container struct this is embedded in.*@member: the name of the member within the struct.(fown, structfile, f_owner)
1799  blob等于smack_file(file)
1800  skp等于blob
1801  rc等于smk_access(skp, tkp, Signal delivery requires write , NULL)
1802  rc等于smk_bu_note("sigiotask", skp, tkp, Signal delivery requires write , rc)
1804  _read_lock() - mark the beginning of an RCU read-side critical section* When synchronize_rcu() is invoked on one CPU while other CPUs* are within RCU read-side critical sections, then the* synchronize_rcu() is guaranteed to block until after all the other
1805  tcred等于__task_cred - Access a task's objective credentials*@task: The task to query* Access the objective credentials of a task. The caller must hold the RCU* readlock.* The result of this function should not be passed directly to get_cred();(tsk)
1806  如果rc不等于0且smack_privileged_cred - are all privilege requirements met by cred*@cap: The requested capability*@cred: the credential to use* Is the task privileged and allowed to be privileged* by the onlycap rule.rc等于0
1808  _read_unlock() - marks the end of an RCU read-side critical section.* In most situations, rcu_read_unlock() is immune from deadlock.* However, in kernels built with CONFIG_RCU_BOOST, rcu_read_unlock()
1810  some inline functions to set up audit data* they do nothing if CONFIG_AUDIT is not set
1811  smk_ad_setfield_u_tsk( & ad, tsk)
1812  smack_log(smk_known, smk_known, Signal delivery requires write , rc, & ad)
1813  返回:rc