Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:include\linux\dcache.h Create Date:2022-07-28 05:42:01
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:d_backing_inode - Get upper or lower inode we should be using*@upper: The upper layer* This is the helper that should be used to get at the inode that will be used* if this dentry were to be opened as a file. The inode may be on the upper

Proto:static inline struct inode *d_backing_inode(const struct dentry *upper)

Type:struct inode

Parameter:

TypeParameterName
const struct dentry *upper
547  inode = Where the name belongs to - NULL is * negative
549  Return inode
Caller
NameDescribe
handle_path
__audit_inode__audit_inode - store the inode and device from a lookup*@name: name being audited*@dentry: dentry being audited*@flags: attributes for this particular entry
__audit_inode_child__audit_inode_child - collect inode info for created/removed objects*@parent: inode of dentry parent*@dentry: dentry being audited*@type: AUDIT_TYPE_* value that we're looking for* For syscalls that create or remove filesystem objects, audit_inode
audit_init_parentInitialize a parent watch entry.
audit_get_ndGet path information necessary for adding watches.
audit_add_watchFind a matching watch entry, or add this one.* Caller must hold audit_filter_mutex.
audit_watch_handle_eventUpdate watch data in audit rules based on fsnotify events.
compare_root
tag_mount
bpf_obj_do_get
bpf_prog_get_type_path
cap_inode_need_killprivap_inode_need_killpriv - Determine if inode change affects privileges*@dentry: The inode/dentry in being changed with change marked ATTR_KILL_PRIV* Determine if an inode having a change applied that's marked ATTR_KILL_PRIV* affects the security markings
cap_convert_nscapUser requested a write of security.capability. If needed, update the* xattr to change from v2 to v3, or to fixup the v3 rootid.* If all is ok, we return the new size, on error return < 0.
get_vfs_caps_from_diskExtract the on-exec-apply capability sets for an executable file.
cap_inode_removexattrap_inode_removexattr - Determine whether an xattr may be removed*@dentry: The inode/dentry being altered*@name: The name of the xattr to be changed* Determine whether an xattr may be removed from an inode, returning 0 if
security_inode_link
security_inode_unlink
security_inode_rmdir
security_inode_rename
security_inode_readlink
security_inode_setattr
security_inode_getattr
security_inode_setxattr
security_inode_post_setxattr
security_inode_getxattr
security_inode_listxattr
security_inode_removexattr
backing_inode_security_novalidate
backing_inode_securityGet the security label of a dentry's backing inode.
sb_finish_set_opts
dentry_has_permSame as inode_has_perm, but pass explicit audit data containingthe dentry to help the auditing code to more easily generate thepathname if needed.
path_has_permSame as inode_has_perm, but pass explicit audit data containingthe path to help the auditing code to more easily generate thepathname if needed.
selinux_binder_transfer_file
selinux_inode_setattr
selinux_inode_setxattr
selinux_inode_post_setxattr
smack_set_mnt_optssmack_set_mnt_opts - set Smack specific mount options*@sb: the file system superblock*@mnt_opts: Smack mount options*@kern_flags: mount option from kernel space or user space*@set_kern_flags: where to store converted mount opts* Returns 0 on success, an
smack_inode_linksmack_inode_link - Smack check on link*@old_dentry: the existing object*@dir: unused*@new_dentry: the new object* Returns 0 if access is permitted, an error code otherwise
smack_inode_unlinksmack_inode_unlink - Smack check on inode deletion*@dir: containing directory object*@dentry: file to unlink* Returns 0 if current can write the containing directory* and the object, error code otherwise
smack_inode_rmdirsmack_inode_rmdir - Smack check on directory deletion*@dir: containing directory object*@dentry: directory to unlink* Returns 0 if current can write the containing directory* and the directory, error code otherwise
smack_inode_renamesmack_inode_rename - Smack check on rename*@old_inode: unused*@old_dentry: the old object*@new_inode: unused*@new_dentry: the new object* Read and write access is required on both the old and* new directories
smack_inode_setattrsmack_inode_setattr - Smack check for setting attributes*@dentry: the object*@iattr: for the force flag* Returns 0 if access is permitted, an error code otherwise
smack_inode_getattrsmack_inode_getattr - Smack check for getting attributes*@path: path to extract the info from* Returns 0 if access is permitted, an error code otherwise
smack_inode_setxattrsmack_inode_setxattr - Smack check for setting xattrs*@dentry: the object*@name: name of the attribute*@value: value of the attribute*@size: size of the value*@flags: unused* This protects the Smack attribute explicitly
smack_inode_post_setxattrsmack_inode_post_setxattr - Apply the Smack update approved above*@dentry: object*@name: attribute name*@value: attribute value*@size: attribute size*@flags: unused* Set the pointer in the inode blob to the entry found* in the master label list.
smack_inode_getxattrsmack_inode_getxattr - Smack check on getxattr*@dentry: the object*@name: unused* Returns 0 if access is permitted, an error code otherwise
smack_inode_removexattrsmack_inode_removexattr - Smack check on removexattr*@dentry: the object*@name: name of the attribute* Removing the Smack attribute requires CAP_MAC_ADMIN* Returns 0 if access is permitted, an error code otherwise
dump_common_audit_datadump_common_audit_data - helper to dump common audit data*@a : common audit data
tomoyo_get_attributesmoyo_get_attributes - Revalidate "struct inode".*@obj: Pointer to "struct tomoyo_obj_info".* Returns nothing.
tomoyo_get_absolute_pathmoyo_get_absolute_path - Get the path of a dentry but ignores chroot'ed root.*@path: Pointer to "struct path".*@buffer: Pointer to buffer to return value in.*@buflen: Sizeof @buffer.* Returns the buffer on success, an error code otherwise.
tomoyo_get_dentry_pathmoyo_get_dentry_path - Get the path of a dentry.*@dentry: Pointer to "struct dentry".*@buffer: Pointer to buffer to return value in.*@buflen: Sizeof @buffer.* Returns the buffer on success, an error code otherwise.
tomoyo_get_local_pathmoyo_get_local_path - Get the path of a dentry.*@dentry: Pointer to "struct dentry".*@buffer: Pointer to buffer to return value in.*@buflen: Sizeof @buffer.* Returns the buffer on success, an error code otherwise.
tomoyo_realpath_from_pathmoyo_realpath_from_path - Returns realpath(3) of the given pathname but ignores chroot'ed root
common_perm_condmmon_perm_cond - common permission wrapper around inode cond*@op: operation being checked*@path: location to check (NOT NULL)*@mask: requested permissions mask* Returns: %0 else error code if error or permission denied
common_perm_rmmmon_perm_rm - common permission wrapper for operations doing rm*@op: operation being checked*@dir: directory that the dentry is in (NOT NULL)*@dentry: dentry being rm'd (NOT NULL)*@mask: requested permission mask* Returns: %0 else error code if error or
apparmor_path_rename
is_deleteds_deleted - test if a file has been completely unlinked*@dentry: dentry of file to test for deletion (NOT NULL)* Returns: %1 if deleted else %0
aa_path_linkaa_path_link - Handle hard link permission check*@label: the label being enforced (NOT NULL)*@old_dentry: the target dentry (NOT NULL)*@new_dir: directory the new link will be created in (NOT NULL)*@new_dentry: the link being created (NOT NULL)
ima_appraise_measurementma_appraise_measurement - appraise file measurement* Call evm_verifyxattr() to verify the integrity of 'security.ima'.* Assuming success, compare the xattr hash with the collected measurement.* Return 0 on success, error code otherwise
ima_inode_post_setattrma_inode_post_setattr - reflect file metadata changes*@dentry: pointer to the affected dentry* Changes to a dentry's metadata might result in needing to appraise.* This function is called from notify_change(), which expects the caller
ima_inode_setxattr
ima_inode_removexattr
evm_find_protected_xattrs
evm_verify_hmacvm_verify_hmac - calculate and compare the HMAC with the EVM xattr* Compute the HMAC on the dentry's protected set of extended attributes* and compare it against the stored security
evm_verifyxattrvm_verifyxattr - verify the integrity of the requested xattr*@dentry: object of the verify xattr*@xattr_name: requested xattr*@xattr_value: requested xattr value*@xattr_value_len: requested xattr value length* Calculate the HMAC for the given dentry and
evm_verify_current_integrityvm_verify_current_integrity - verify the dentry's metadata integrity*@dentry: pointer to the affected dentry* Verify and return the dentry's metadata integrity. The exceptions are* before EVM is initialized or in 'fix' mode.
evm_protect_xattrvm_protect_xattr - protect the EVM extended attribute* Prevent security.evm from being modified or removed without the* necessary permissions or when the existing value is invalid.* The posix xattr acls are 'system' prefixed, which normally would not
evm_inode_setattrvm_inode_setattr - prevent updating an invalid EVM extended attribute*@dentry: pointer to the affected dentry* Permit update of file attributes when files have a valid EVM signature,* except in the case of them having an immutable portable signature.
evm_calc_hmac_or_hashCalculate the HMAC value across the set of protected security xattrs.* Instead of retrieving the requested xattr, for performance, calculate* the hmac using the requested xattr value. Don't alloc/free memory for
evm_update_evmxattrCalculate the hmac and update security.evm xattr* Expects to be called with i_mutex locked.
do_faccessataccess() needs to use the real uid/gid, not the effective uid/gid.* We do this by temporarily clearing all FS-related capabilities and* switching the fsuid/fsgid around to the real ones.
finish_opensh_open - finish opening a file*@file: file pointer*@dentry: pointer to dentry*@open: open callback*@opened: state of open* This can be used to finish opening a file passed to i_op->atomic_open()
vfs_openvfs_open - open the file at the given path*@path: path to open*@file: newly allocated file with f_flag initialized*@cred: credentials to use
vfs_getattr_nosecvfs_getattr_nosec - getattr without security checks*@path: file to get attributes from*@stat: structure to return attributes in*@request_mask: STATX_xxx flags indicating what the caller wants*@query_flags: Query mode (KSTAT_QUERY_FLAGS)
do_readlinkat
lookup_fast
walk_component
handle_lookup_down
may_deleteCheck whether we can remove a link victim from directory dir, check* whether the type of victim is right.* 1. We can't do it if dir is read-only (done in permission())* 2. We should have write and exec permissions on dir* 3
do_lastHandle the last step of open()
fs_lookup_params_lookup_param - Look up a path referred to by a parameter*@fc: The filesystem context to log errors through.*@param: The parameter.*@want_bdev: T if want a blockdev*@_path: The result of the lookup
lookup_bdevlookup_bdev - lookup a struct block_device by name*@pathname: special file representing the block device* Get a reference to the blockdevice at @pathname in the current* namespace if possible and return it. Return ERR_PTR(error)* otherwise.
posix_acl_xattr_list