Function report | 
Source Code:security\commoncap.c | 
Create Date:2022-07-28 18:35:49 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:ap_capable - Determine whether a task has a particular effective capability*@cred: The credentials to use*@ns: The user namespace in which we need the capability*@cap: The capability to check for*@opts: Bitmask of options defined in include/linux/security
Proto:int cap_capable(const struct cred *cred, struct user_namespace *targ_ns, int cap, unsigned int opts)
Type:int
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| const struct cred * | cred | |
| struct user_namespace * | targ_ns | |
| int | cap | |
| unsigned int | opts | 
| 74 | cycle | 
| 76 | If ns == user_ns the caps and keyrings are relative to. Then Return If cap_raised( caps we can actually use , cap) Then 0 Else -EPERM | 
| 90 | If parent == user_ns the caps and keyrings are relative to. && uid_eq(owner, effective UID of the task ) Then Return 0 | 
| Name | Describe | 
|---|---|
| cap_inh_is_capped | Determine whether the inheritable capabilities are limited to the old* permitted set. Returns 1 if they are limited, 0 if they are not. | 
| cap_task_prctl | ap_task_prctl - Implement process control functions for this security module*@option: The process control function requested*@arg2, @arg3, @arg4, @arg5: The argument data for this function* Allow process control functions (sys_prctl()) to alter | 
| cap_vm_enough_memory | ap_vm_enough_memory - Determine whether a new virtual mapping is permitted*@mm: The VM space in which the new mapping is to be made*@pages: The size of the mapping* Determine whether the allocation of a new virtual mapping by the current | 
| cap_mmap_addr | ap_mmap_addr - check if able to map given addr*@addr: address attempting to be mapped* If the process is attempting to map memory below dac_mmap_min_addr they need* CAP_SYS_RAWIO. The other parameters to this function are unused by the | 
| has_cap_mac_admin | |
| smack_privileged_cred | smack_privileged_cred - are all privilege requirements met by cred*@cap: The requested capability*@cred: the credential to use* Is the task privileged and allowed to be privileged* by the onlycap rule. | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |