Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\smack\smack_lsm.c Create Date:2022-07-28 19:21:57
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:smack_task_kill - Smack check on signal delivery*@p: the task object*@info: unused*@sig: unused*@cred: identifies the cred to use in lieu of current's* Return 0 if write access is permitted

Proto:static int smack_task_kill(struct task_struct *p, struct kernel_siginfo *info, int sig, const struct cred *cred)

Type:int

Parameter:

TypeParameterName
struct task_struct *p
struct kernel_siginfo *info
intsig
const struct cred *cred
2186  tkp = smk_of_task_struct(p)
2189  If Not sig Then Return 0
2192  some inline functions to set up audit data* they do nothing if CONFIG_AUDIT is not set
2193  smk_ad_setfield_u_tsk( & ad, p)
2198  If (cred == NULL) Then
2199  rc = smk_curacc - determine if current has a specific access to an object*@obj_known: a pointer to the object's Smack label entry*@mode: the access requested, in "MAY" format*@a : common audit data* This function checks the current subject label/object label
2200  rc = smk_bu_task(p, Signal delivery requires write , rc)
2201  Return rc
2208  skp = Present a pointer to the smack label entry in an task blob.
2209  rc = smk_access(skp, tkp, Signal delivery requires write , & ad)
2210  rc = smk_bu_note("USB signal", skp, tkp, Signal delivery requires write , rc)
2211  Return rc