Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\keys\process_keys.c Create Date:2022-07-28 18:22:54
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:Replace a process's session keyring on behalf of one of its children when* the target process is about to resume userspace execution.

Proto:void key_change_session_keyring(struct callback_head *twork)

Type:void

Parameter:

TypeParameterName
struct callback_head *twork
914  old = current_cred - Access the current task's subjective credentials* Access the subjective credentials of the current task. RCU-safe,* since nobody else can modify it.()
915  new = container_of - cast a member of a structure out to the containing structure*@ptr: the pointer to the member.*@type: the type of the container struct this is embedded in.*@member: the name of the member within the struct.(twork, structcred, rcu)
917  If Value for the false possibility is greater at compile time(flags & Getting shut down ) Then
918  put_cred - Release a reference to a set of credentials*@cred: The credentials to release* Release a reference to a set of credentials, deleting them when the last ref* is released
919  Return
922  real UID of the task = real UID of the task
923  effective UID of the task = effective UID of the task
924  saved UID of the task = saved UID of the task
925  UID for VFS ops = UID for VFS ops
926  real GID of the task = real GID of the task
927  effective GID of the task = effective GID of the task
928  saved GID of the task = saved GID of the task
929  GID for VFS ops = GID for VFS ops
930  real user ID subscription = get_uid( real user ID subscription )
931  user_ns the caps and keyrings are relative to. = get_user_ns( user_ns the caps and keyrings are relative to. )
932  supplementary groups for euid/fsgid = get_group_info - Get a reference to a group info structure*@group_info: The group info to reference* This gets a reference to a set of supplementary groups.* If the caller is accessing a task's credentials, they must hold the RCU read* lock when reading.
934  SUID-less security management = SUID-less security management
935  caps our children can inherit = caps our children can inherit
936  caps we're permitted = caps we're permitted
937  caps we can actually use = caps we can actually use
938  Ambient capability set = Ambient capability set
939  capability bounding set = capability bounding set
941  default keyring to attach requested * keys to = default keyring to attach requested * keys to
942  keyring private to this thread = key_get( keyring private to this thread )
943  keyring private to this process = key_get( keyring private to this process )
945  security_transfer_creds(new, old)
947  mmit_creds - Install new credentials upon the current task*@new: The credentials to be assigned* Install a new set of credentials to the current task, using RCU to replace* the old set. Both the objective and the subjective credentials pointers are