Function report |
Source Code:security\security.c |
Create Date:2022-07-28 18:40:03 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:security_task_getsecid
Proto:void security_task_getsecid(struct task_struct *p, unsigned int *secid)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
struct task_struct * | p | |
unsigned int * | secid |
1654 | secid = 0 |
1655 | Hook list operation macros.* call_void_hook:* This is a hook that does not return a value.* call_int_hook:* This is a hook that returns a value.(task_getsecid, p, secid) |
Name | Describe |
---|---|
audit_signal_info | audit_signal_info - record signal info for shutting down audit subsystem*@sig: signal value*@t: task being signaled* If the audit subsystem is being terminated, record the task (pid)* and uid that is doing that. |
audit_filter | |
audit_filter_rules | Compare a task_struct with an audit_rule. Return 1 on match, 0* otherwise.* If task_creation is true, this is an explicit indication that we are* filtering a task rule at task creation time. This and tsk == current are |
__audit_ptrace | |
audit_signal_info_syscall | audit_signal_info_syscall - record signal info for syscalls*@t: task being signaled* If the audit subsystem is being terminated, record the task (pid)* and uid that is doing that. |
ima_file_mmap | ma_file_mmap - based on policy, collect/store measurement.*@file: pointer to the file to be measured (May be NULL)*@prot: contains the protection that will be applied by the kernel.* Measure files being mmapped executable based on the ima_must_measure() |
ima_bprm_check | ma_bprm_check - based on policy, collect/store measurement.*@bprm: contains the linux_binprm structure* The OS protects against an executable file, already open for write,* from being executed in deny_write_access() and an executable file, |
ima_file_check | ma_path_check - based on policy, collect/store measurement.*@file: pointer to the file to be measured*@mask: contains MAY_READ, MAY_WRITE, MAY_EXEC or MAY_APPEND* Measure files based on the ima_must_measure() policy decision.* On success return 0 |
ima_post_read_file | ma_post_read_file - in memory collect/appraise/audit measurement*@file: pointer to the file to be measured/appraised/audit*@buf: pointer to in memory file contents*@size: size of in memory file contents*@read_id: caller identifier |
process_buffer_measurement | process_buffer_measurement - Measure the buffer to ima log |
ima_must_appraise | ma_must_appraise - set appraise flag* Return 1 to appraise or hash |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |