Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\safesetid\lsm.c Create Date:2022-07-28 19:55:29
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:Compute a decision for a transition from @src to @dst under the active* policy.

Proto:static enum sid_policy_type setuid_policy_lookup(kuid_t src, kuid_t dst)

Type:enum sid_policy_type

Parameter:

TypeParameterName
kuid_tsrc
kuid_tdst
52  result = source ID is unaffected by policy
55  _read_lock() - mark the beginning of an RCU read-side critical section* When synchronize_rcu() is invoked on one CPU while other CPUs* are within RCU read-side critical sections, then the* synchronize_rcu() is guaranteed to block until after all the other
56  pol = fetch RCU-protected pointer for dereferencing(safesetid_setuid_rules)
57  If pol Then result = Compute a decision for a transition from @src to @dst under @policy.
59  _read_unlock() - marks the end of an RCU read-side critical section.* In most situations, rcu_read_unlock() is immune from deadlock.* However, in kernels built with CONFIG_RCU_BOOST, rcu_read_unlock()
60  Return result
Caller
NameDescribe
safesetid_security_capable
uid_permitted_for_credCheck whether a caller with old credentials @old is allowed to switch to* credentials that contain @new_uid.
safesetid_task_fix_setuidCheck whether there is either an exception for user under old cred struct to* set*uid to user under new cred struct, or the UID transition is allowed (by* Linux set*uid rules) even without CAP_SETUID.