Function report |
Source Code:kernel\user_namespace.c |
Create Date:2022-07-28 11:19:06 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:make_kuid - Map a user-namespace uid pair into a kuid
Proto:kuid_t make_kuid(struct user_namespace *ns, uid_t uid)
Type:kuid_t
Parameter:
Type | Parameter | Name |
---|---|---|
struct user_namespace * | ns | |
uid_t | uid |
389 | Return |
Name | Describe |
---|---|
SYSCALL_DEFINE3 | |
SYSCALL_DEFINE2 | Ugh. To avoid negative return values, "getpriority()" will* not return the normal nice-value, but a negated value that* has been offset by 20 (ie it returns 40..1 instead of -20..19)* to stay compatible. |
new_idmap_permitted | |
audit_data_to_entry | Translate struct audit_rule_data to kernel's rule representation. |
SYSCALL_DEFINE2 | |
keyctl_get_persistent | Get the persistent keyring for a specific UID and link it to the nominated* keyring. |
cap_inode_getsecurity | getsecurity: We are called for security |
rootid_from_xattr | |
get_vfs_caps_from_disk | Extract the on-exec-apply capability sets for an executable file. |
cap_bprm_set_creds | ap_bprm_set_creds - Set up the proposed credentials for execve().*@bprm: The execution parameters, including the proposed creds* Set up the proposed credentials for a new execution context being* constructed by execve() |
cap_emulate_setxuid | ap_emulate_setxuid() fixes the effective / permitted capabilities of* a process after a call to setuid, setreuid, or setresuid.* 1) When set*uiding _from_ one of {r,e,s}uid == 0 _to_ all of* {r,e,s}uid != 0, the permitted and effective capabilities are |
cap_task_fix_setuid | ap_task_fix_setuid - Fix up the results of setuid() call*@new: The proposed credentials*@old: The current task's current credentials*@flags: Indications of what has changed* Fix up the results of setuid() call before the credential changes are |
policy_view_capable | policy_view_capable - check if viewing policy in at @ns is allowed* Returns: true if viewing policy is allowed* If @ns is NULL then the namespace being viewed is assumed to be the* tasks current namespace. |
parse_policy_line | In the case the input buffer contains one or more invalid UIDs, the kuid_t* variables pointed to by @parent and @child will get updated but this* function will return an error.* Contents of @buf may be modified. |
ima_parse_rule | |
chown_common | |
posix_acl_fix_xattr_userns | Fix up the uids and gids in posix acl extended attributes in place. |
posix_acl_from_xattr | Convert from extended attribute to in-memory representation. |
xdr_nfsace_decode | |
check_quotactl_permission | |
parse_mount_options | parse_mount_options():* Set @opts to mount options specified in @data. If an option is not* specified in @data, set it to its default value.* Note: @data may be NULL (in which case all options are set to default). |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |