Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\smack\smack_lsm.c Create Date:2022-07-28 19:21:32
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:smack_file_send_sigiotask - Smack on sigio*@tsk: The target task*@fown: the object the signal come from*@signum: unused* Allow a privileged task to get signals even if it shouldn't* Returns 0 if a subject with the object's smack could

Proto:static int smack_file_send_sigiotask(struct task_struct *tsk, struct fown_struct *fown, int signum)

Type:int

Parameter:

TypeParameterName
struct task_struct *tsk
struct fown_struct *fown
intsignum
1787  tkp = Present a pointer to the smack label entry in an task blob.
1796  file = container_of - cast a member of a structure out to the containing structure*@ptr: the pointer to the member.*@type: the type of the container struct this is embedded in.*@member: the name of the member within the struct.(fown, structfile, f_owner)
1799  blob = smack_file(file)
1800  skp = blob
1801  rc = smk_access(skp, tkp, Signal delivery requires write , NULL)
1802  rc = smk_bu_note("sigiotask", skp, tkp, Signal delivery requires write , rc)
1804  _read_lock() - mark the beginning of an RCU read-side critical section* When synchronize_rcu() is invoked on one CPU while other CPUs* are within RCU read-side critical sections, then the* synchronize_rcu() is guaranteed to block until after all the other
1805  tcred = __task_cred - Access a task's objective credentials*@task: The task to query* Access the objective credentials of a task. The caller must hold the RCU* readlock.* The result of this function should not be passed directly to get_cred();(tsk)
1806  If rc != 0 && smack_privileged_cred - are all privilege requirements met by cred*@cap: The requested capability*@cred: the credential to use* Is the task privileged and allowed to be privileged* by the onlycap rule. Then rc = 0
1808  _read_unlock() - marks the end of an RCU read-side critical section.* In most situations, rcu_read_unlock() is immune from deadlock.* However, in kernels built with CONFIG_RCU_BOOST, rcu_read_unlock()
1810  some inline functions to set up audit data* they do nothing if CONFIG_AUDIT is not set
1811  smk_ad_setfield_u_tsk( & ad, tsk)
1812  smack_log(smk_known, smk_known, Signal delivery requires write , rc, & ad)
1813  Return rc