函数逻辑报告 |
Source Code:include\linux\dcache.h |
Create Date:2022-07-27 06:43:40 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
首页 | 函数Tree |
注解内核,赢得工具 | 下载SCCT | English |
函数名称:d_backing_inode - Get upper or lower inode we should be using*@upper: The upper layer* This is the helper that should be used to get at the inode that will be used* if this dentry were to be opened as a file. The inode may be on the upper
函数原型:static inline struct inode *d_backing_inode(const struct dentry *upper)
返回类型:struct inode
参数:
类型 | 参数 | 名称 |
---|---|---|
const struct dentry * | upper |
549 | 返回:inode |
名称 | 描述 |
---|---|
handle_path | |
__audit_inode | __audit_inode - store the inode and device from a lookup*@name: name being audited*@dentry: dentry being audited*@flags: attributes for this particular entry |
__audit_inode_child | __audit_inode_child - collect inode info for created/removed objects*@parent: inode of dentry parent*@dentry: dentry being audited*@type: AUDIT_TYPE_* value that we're looking for* For syscalls that create or remove filesystem objects, audit_inode |
audit_init_parent | Initialize a parent watch entry. |
audit_get_nd | Get path information necessary for adding watches. |
audit_add_watch | Find a matching watch entry, or add this one.* Caller must hold audit_filter_mutex. |
audit_watch_handle_event | Update watch data in audit rules based on fsnotify events. |
compare_root | |
tag_mount | |
bpf_obj_do_get | |
bpf_prog_get_type_path | |
cap_inode_need_killpriv | ap_inode_need_killpriv - Determine if inode change affects privileges*@dentry: The inode/dentry in being changed with change marked ATTR_KILL_PRIV* Determine if an inode having a change applied that's marked ATTR_KILL_PRIV* affects the security markings |
cap_convert_nscap | User requested a write of security.capability. If needed, update the* xattr to change from v2 to v3, or to fixup the v3 rootid.* If all is ok, we return the new size, on error return < 0. |
get_vfs_caps_from_disk | Extract the on-exec-apply capability sets for an executable file. |
cap_inode_removexattr | ap_inode_removexattr - Determine whether an xattr may be removed*@dentry: The inode/dentry being altered*@name: The name of the xattr to be changed* Determine whether an xattr may be removed from an inode, returning 0 if |
security_inode_link | |
security_inode_unlink | |
security_inode_rmdir | |
security_inode_rename | |
security_inode_readlink | |
security_inode_setattr | |
security_inode_getattr | |
security_inode_setxattr | |
security_inode_post_setxattr | |
security_inode_getxattr | |
security_inode_listxattr | |
security_inode_removexattr | |
backing_inode_security_novalidate | |
backing_inode_security | Get the security label of a dentry's backing inode. |
sb_finish_set_opts | |
dentry_has_perm | Same as inode_has_perm, but pass explicit audit data containingthe dentry to help the auditing code to more easily generate thepathname if needed. |
path_has_perm | Same as inode_has_perm, but pass explicit audit data containingthe path to help the auditing code to more easily generate thepathname if needed. |
selinux_binder_transfer_file | |
selinux_inode_setattr | |
selinux_inode_setxattr | |
selinux_inode_post_setxattr | |
smack_set_mnt_opts | smack_set_mnt_opts - set Smack specific mount options*@sb: the file system superblock*@mnt_opts: Smack mount options*@kern_flags: mount option from kernel space or user space*@set_kern_flags: where to store converted mount opts* Returns 0 on success, an |
smack_inode_link | smack_inode_link - Smack check on link*@old_dentry: the existing object*@dir: unused*@new_dentry: the new object* Returns 0 if access is permitted, an error code otherwise |
smack_inode_unlink | smack_inode_unlink - Smack check on inode deletion*@dir: containing directory object*@dentry: file to unlink* Returns 0 if current can write the containing directory* and the object, error code otherwise |
smack_inode_rmdir | smack_inode_rmdir - Smack check on directory deletion*@dir: containing directory object*@dentry: directory to unlink* Returns 0 if current can write the containing directory* and the directory, error code otherwise |
smack_inode_rename | smack_inode_rename - Smack check on rename*@old_inode: unused*@old_dentry: the old object*@new_inode: unused*@new_dentry: the new object* Read and write access is required on both the old and* new directories |
smack_inode_setattr | smack_inode_setattr - Smack check for setting attributes*@dentry: the object*@iattr: for the force flag* Returns 0 if access is permitted, an error code otherwise |
smack_inode_getattr | smack_inode_getattr - Smack check for getting attributes*@path: path to extract the info from* Returns 0 if access is permitted, an error code otherwise |
smack_inode_setxattr | smack_inode_setxattr - Smack check for setting xattrs*@dentry: the object*@name: name of the attribute*@value: value of the attribute*@size: size of the value*@flags: unused* This protects the Smack attribute explicitly |
smack_inode_post_setxattr | smack_inode_post_setxattr - Apply the Smack update approved above*@dentry: object*@name: attribute name*@value: attribute value*@size: attribute size*@flags: unused* Set the pointer in the inode blob to the entry found* in the master label list. |
smack_inode_getxattr | smack_inode_getxattr - Smack check on getxattr*@dentry: the object*@name: unused* Returns 0 if access is permitted, an error code otherwise |
smack_inode_removexattr | smack_inode_removexattr - Smack check on removexattr*@dentry: the object*@name: name of the attribute* Removing the Smack attribute requires CAP_MAC_ADMIN* Returns 0 if access is permitted, an error code otherwise |
dump_common_audit_data | dump_common_audit_data - helper to dump common audit data*@a : common audit data |
tomoyo_get_attributes | moyo_get_attributes - Revalidate "struct inode".*@obj: Pointer to "struct tomoyo_obj_info".* Returns nothing. |
tomoyo_get_absolute_path | moyo_get_absolute_path - Get the path of a dentry but ignores chroot'ed root.*@path: Pointer to "struct path".*@buffer: Pointer to buffer to return value in.*@buflen: Sizeof @buffer.* Returns the buffer on success, an error code otherwise. |
tomoyo_get_dentry_path | moyo_get_dentry_path - Get the path of a dentry.*@dentry: Pointer to "struct dentry".*@buffer: Pointer to buffer to return value in.*@buflen: Sizeof @buffer.* Returns the buffer on success, an error code otherwise. |
tomoyo_get_local_path | moyo_get_local_path - Get the path of a dentry.*@dentry: Pointer to "struct dentry".*@buffer: Pointer to buffer to return value in.*@buflen: Sizeof @buffer.* Returns the buffer on success, an error code otherwise. |
tomoyo_realpath_from_path | moyo_realpath_from_path - Returns realpath(3) of the given pathname but ignores chroot'ed root |
common_perm_cond | mmon_perm_cond - common permission wrapper around inode cond*@op: operation being checked*@path: location to check (NOT NULL)*@mask: requested permissions mask* Returns: %0 else error code if error or permission denied |
common_perm_rm | mmon_perm_rm - common permission wrapper for operations doing rm*@op: operation being checked*@dir: directory that the dentry is in (NOT NULL)*@dentry: dentry being rm'd (NOT NULL)*@mask: requested permission mask* Returns: %0 else error code if error or |
apparmor_path_rename | |
is_deleted | s_deleted - test if a file has been completely unlinked*@dentry: dentry of file to test for deletion (NOT NULL)* Returns: %1 if deleted else %0 |
aa_path_link | aa_path_link - Handle hard link permission check*@label: the label being enforced (NOT NULL)*@old_dentry: the target dentry (NOT NULL)*@new_dir: directory the new link will be created in (NOT NULL)*@new_dentry: the link being created (NOT NULL) |
ima_appraise_measurement | ma_appraise_measurement - appraise file measurement* Call evm_verifyxattr() to verify the integrity of 'security.ima'.* Assuming success, compare the xattr hash with the collected measurement.* Return 0 on success, error code otherwise |
ima_inode_post_setattr | ma_inode_post_setattr - reflect file metadata changes*@dentry: pointer to the affected dentry* Changes to a dentry's metadata might result in needing to appraise.* This function is called from notify_change(), which expects the caller |
ima_inode_setxattr | |
ima_inode_removexattr | |
evm_find_protected_xattrs | |
evm_verify_hmac | vm_verify_hmac - calculate and compare the HMAC with the EVM xattr* Compute the HMAC on the dentry's protected set of extended attributes* and compare it against the stored security |
evm_verifyxattr | vm_verifyxattr - verify the integrity of the requested xattr*@dentry: object of the verify xattr*@xattr_name: requested xattr*@xattr_value: requested xattr value*@xattr_value_len: requested xattr value length* Calculate the HMAC for the given dentry and |
evm_verify_current_integrity | vm_verify_current_integrity - verify the dentry's metadata integrity*@dentry: pointer to the affected dentry* Verify and return the dentry's metadata integrity. The exceptions are* before EVM is initialized or in 'fix' mode. |
evm_protect_xattr | vm_protect_xattr - protect the EVM extended attribute* Prevent security.evm from being modified or removed without the* necessary permissions or when the existing value is invalid.* The posix xattr acls are 'system' prefixed, which normally would not |
evm_inode_setattr | vm_inode_setattr - prevent updating an invalid EVM extended attribute*@dentry: pointer to the affected dentry* Permit update of file attributes when files have a valid EVM signature,* except in the case of them having an immutable portable signature. |
evm_calc_hmac_or_hash | Calculate the HMAC value across the set of protected security xattrs.* Instead of retrieving the requested xattr, for performance, calculate* the hmac using the requested xattr value. Don't alloc/free memory for |
evm_update_evmxattr | Calculate the hmac and update security.evm xattr* Expects to be called with i_mutex locked. |
do_faccessat | access() needs to use the real uid/gid, not the effective uid/gid.* We do this by temporarily clearing all FS-related capabilities and* switching the fsuid/fsgid around to the real ones. |
finish_open | sh_open - finish opening a file*@file: file pointer*@dentry: pointer to dentry*@open: open callback*@opened: state of open* This can be used to finish opening a file passed to i_op->atomic_open() |
vfs_open | vfs_open - open the file at the given path*@path: path to open*@file: newly allocated file with f_flag initialized*@cred: credentials to use |
vfs_getattr_nosec | vfs_getattr_nosec - getattr without security checks*@path: file to get attributes from*@stat: structure to return attributes in*@request_mask: STATX_xxx flags indicating what the caller wants*@query_flags: Query mode (KSTAT_QUERY_FLAGS) |
do_readlinkat | |
lookup_fast | |
walk_component | |
handle_lookup_down | |
may_delete | Check whether we can remove a link victim from directory dir, check* whether the type of victim is right.* 1. We can't do it if dir is read-only (done in permission())* 2. We should have write and exec permissions on dir* 3 |
do_last | Handle the last step of open() |
fs_lookup_param | s_lookup_param - Look up a path referred to by a parameter*@fc: The filesystem context to log errors through.*@param: The parameter.*@want_bdev: T if want a blockdev*@_path: The result of the lookup |
lookup_bdev | lookup_bdev - lookup a struct block_device by name*@pathname: special file representing the block device* Get a reference to the blockdevice at @pathname in the current* namespace if possible and return it. Return ERR_PTR(error)* otherwise. |
posix_acl_xattr_list | |
d_real_inode | d_real_inode - Return the real inode*@dentry: The dentry to query* If dentry is on a union/overlay, then return the underlying, real inode.* Otherwise return d_inode(). |
源代码转换工具 开放的插件接口 | X |
---|---|
支持:c/c++/esqlc/java Oracle/Informix/Mysql 插件可实现:逻辑报告 代码生成和批量转换代码 |