Function report |
Source Code:include\linux\cred.h |
Create Date:2022-07-28 05:40:31 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:put_cred - Release a reference to a set of credentials*@cred: The credentials to release* Release a reference to a set of credentials, deleting them when the last ref* is released
Proto:static inline void put_cred(const struct cred *_cred)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
const struct cred * | _cred |
284 | If cred Then |
285 | validate_creds(cred) |
Name | Describe |
---|---|
rdtgroup_task_write_permission | |
ksys_unshare | share allows a process to 'unshare' part of the process* context which was originally shared using clone. copy_** functions used by do_fork() cannot be used here directly* because they modify an inactive task_struct that is being* constructed |
__ptrace_unlink | __ptrace_unlink - unlink ptracee and restore its execution state*@child: ptracee to be unlinked* Remove @child from the ptrace list, move it back to the original parent,* and restore the execution state so that it conforms to the group stop* state |
exit_creds | Clean up a task's credentials when it exits |
copy_creds | Copy a certificate |
commit_creds | mmit_creds - Install new credentials upon the current task*@new: The credentials to be assigned* Install a new set of credentials to the current task, using RCU to replace* the old set. Both the objective and the subjective credentials pointers are |
abort_creds | abort_creds - Discard a set of credentials and unlock the current task*@new: The credentials that were going to be applied* Discard a set of credentials that were under construction and unlock the* current task. |
revert_creds | vert_creds - Revert a temporary subjective credentials override*@old: The credentials to be restored* Revert a temporary set of override subjective credentials to an old set,* discarding the override set. |
prepare_kernel_cred | prepare_kernel_cred - Prepare a set of credentials for a kernel service*@daemon: A userspace daemon to be used as a reference* Prepare a set of credentials for a kernel service |
__cgroup1_procs_write | |
unshare_userns | |
keyctl_session_to_parent | Attempt to install the calling process's session keyring on the process's* parent process.* The keyring must exist and must grant the caller LINK permission, and the* parent process must be single-threaded and must have the same effective |
lookup_user_key | Look up a key ID given us by userspace with a given permissions mask to get* the key it refers to.* Flags can be passed to request that special keyrings be created if referred* to directly, to permit partially constructed keys to be found and to skip |
key_change_session_keyring | Replace a process's session keyring on behalf of one of its children when* the target process is about to resume userspace execution. |
call_sbin_request_key | Request userspace finish the construction of a key* - execute "/sbin/request-key |
free_request_key_auth | |
aa_change_hat | aa_change_hat - change hat to/from subprofile*@hats: vector of hat names to try changing into (MAYBE NULL if @count == 0)*@count: number of hat names in @hats*@token: magic value to validate the hat change*@flags: flags affecting behavior of the change |
apparmor_getprocattr | |
do_faccessat | access() needs to use the real uid/gid, not the effective uid/gid.* We do this by temporarily clearing all FS-related capabilities and* switching the fsuid/fsgid around to the real ones. |
file_free_rcu | |
put_fs_context | put_fs_context - Dispose of a superblock configuration context.*@fc: The context to dispose of. |
io_ring_ctx_free | |
do_coredump |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |