Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:include\linux\cred.h Create Date:2022-07-28 05:40:31
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:put_cred - Release a reference to a set of credentials*@cred: The credentials to release* Release a reference to a set of credentials, deleting them when the last ref* is released

Proto:static inline void put_cred(const struct cred *_cred)

Type:void

Parameter:

TypeParameterName
const struct cred *_cred
282  cred = _cred
284  If cred Then
285  validate_creds(cred)
286  If atomic_dec_and_test( & usage) Then __put_cred - Destroy a set of credentials*@cred: The record to release* Destroy a set of credentials on which no references remain.
Caller
NameDescribe
rdtgroup_task_write_permission
ksys_unshareshare allows a process to 'unshare' part of the process* context which was originally shared using clone. copy_** functions used by do_fork() cannot be used here directly* because they modify an inactive task_struct that is being* constructed
__ptrace_unlink__ptrace_unlink - unlink ptracee and restore its execution state*@child: ptracee to be unlinked* Remove @child from the ptrace list, move it back to the original parent,* and restore the execution state so that it conforms to the group stop* state
exit_credsClean up a task's credentials when it exits
copy_credsCopy a certificate
commit_credsmmit_creds - Install new credentials upon the current task*@new: The credentials to be assigned* Install a new set of credentials to the current task, using RCU to replace* the old set. Both the objective and the subjective credentials pointers are
abort_credsabort_creds - Discard a set of credentials and unlock the current task*@new: The credentials that were going to be applied* Discard a set of credentials that were under construction and unlock the* current task.
revert_credsvert_creds - Revert a temporary subjective credentials override*@old: The credentials to be restored* Revert a temporary set of override subjective credentials to an old set,* discarding the override set.
prepare_kernel_credprepare_kernel_cred - Prepare a set of credentials for a kernel service*@daemon: A userspace daemon to be used as a reference* Prepare a set of credentials for a kernel service
__cgroup1_procs_write
unshare_userns
keyctl_session_to_parentAttempt to install the calling process's session keyring on the process's* parent process.* The keyring must exist and must grant the caller LINK permission, and the* parent process must be single-threaded and must have the same effective
lookup_user_keyLook up a key ID given us by userspace with a given permissions mask to get* the key it refers to.* Flags can be passed to request that special keyrings be created if referred* to directly, to permit partially constructed keys to be found and to skip
key_change_session_keyringReplace a process's session keyring on behalf of one of its children when* the target process is about to resume userspace execution.
call_sbin_request_keyRequest userspace finish the construction of a key* - execute "/sbin/request-key "
free_request_key_auth
aa_change_hataa_change_hat - change hat to/from subprofile*@hats: vector of hat names to try changing into (MAYBE NULL if @count == 0)*@count: number of hat names in @hats*@token: magic value to validate the hat change*@flags: flags affecting behavior of the change
apparmor_getprocattr
do_faccessataccess() needs to use the real uid/gid, not the effective uid/gid.* We do this by temporarily clearing all FS-related capabilities and* switching the fsuid/fsgid around to the real ones.
file_free_rcu
put_fs_contextput_fs_context - Dispose of a superblock configuration context.*@fc: The context to dispose of.
io_ring_ctx_free
do_coredump