Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:kernel\user_namespace.c Create Date:2022-07-28 11:19:07
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:m_kuid - Create a uid from a kuid user-namespace pair.*@targ: The user namespace we want a uid in.*@kuid: The kernel internal uid to start with.* Map @kuid into the user-namespace specified by @targ and* return the resulting uid.

Proto:uid_t from_kuid(struct user_namespace *targ, kuid_t kuid)

Type:uid_t

Parameter:

TypeParameterName
struct user_namespace *targ
kuid_tkuid
408  Return map_id_up( & uid_map, __kuid_val(kuid))
Caller
NameDescribe
from_kuid_mungedm_kuid_munged - Create a uid from a kuid user-namespace pair.*@targ: The user namespace we want a uid in.*@kuid: The kernel internal uid to start with.* Map @kuid into the user-namespace specified by @targ and* return the resulting uid.
uid_m_show
audit_log_common_recv_msg
audit_receive_msg
audit_log_session_info
audit_log_task_info
audit_log_set_loginuid
audit_log_pid_context
audit_log_fcaps
show_special
audit_log_nameaudit_log_name - produce AUDIT_PATH record from struct audit_names*@context: audit_context for the task*@n: audit_names structure with reportable details*@path: optional path to report instead of audit_names->name*@record_num: record number to report when
audit_log_exit
audit_log_task
____bpf_get_current_uid_gid
dump_oom_summary
__oom_kill_process
get_user_session_keyring_rcuGet the user session keyring if it exists, but don't create it if it* doesn't.
call_sbin_request_keyRequest userspace finish the construction of a key* - execute "/sbin/request-key "
key_get_persistentGet the persistent keyring for a specific UID and link it to the nominated* keyring.
rootid_owns_currentns
cap_inode_getsecuritygetsecurity: We are called for security
cap_convert_nscapUser requested a write of security.capability. If needed, update the* xattr to change from v2 to v3, or to fixup the v3 rootid.* If all is ok, we return the new size, on error return < 0.
sel_write_load
tomoyo_print_headermoyo_print_header - Get header line of audit log.*@r: Pointer to "struct tomoyo_request_info".* Returns string representation.* This function uses kmalloc(), so caller must kfree() if this function* didn't return NULL.
tomoyo_conditionmoyo_condition - Check condition part.*@r: Pointer to "struct tomoyo_request_info".*@cond: Pointer to "struct tomoyo_condition". Maybe NULL.* Returns true on success, false otherwise.* Caller holds tomoyo_read_lock().
tomoyo_path_chownmoyo_path_chown - Target for security_path_chown().*@path: Pointer to "struct path".*@uid: Owner ID.*@gid: Group ID.* Returns 0 on success, negative value otherwise.
file_audit_cble_audit_cb - call back for file specific audit fields*@ab: audit_buffer (NOT NULL)*@va: audit struct to audit values of (NOT NULL)
integrity_audit_msg
hmac_add_miscProtect against 'cutting & pasting' security.evm xattr, include inode* specific info.* (Additional directory/file metadata needs to be added for more complete* protection.)
posix_acl_to_xattrConvert from in-memory to extended attribute representation.
xdr_nfsace_encode
format_corenamermat_corename will inspect the pattern parameter, and output a* name into corename, which must have space for at least* CORENAME_MAX_SIZE bytes plus one byte for the zero terminator.
from_kqidm_kqid - Create a qid from a kqid user-namespace pair.*@targ: The user namespace we want a qid in.*@kqid: The kernel internal quota identifier to start with.* Map @kqid into the user-namespace specified by @targ and* return the resulting qid.
from_kuid_munged
i_uid_readHelper functions so that in most cases filesystems will* not need to deal directly with kuid_t and kgid_t and can* instead deal with the raw numeric values that are stored* in the filesystem.