X-Git-Url: http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=elogind.git;a=blobdiff_plain;f=man%2Fsd_bus_creds_get_pid.xml;h=cc8603cacce32adfa23524148894411f9fe96f4d;hp=a35efef0ca84ecc28eca6c39ffd6554409325141;hb=5c20a8bca1dd16d64b2dd959a2552f6452448932;hpb=dc968941bfc9be464e1df15afa05693dec3ec192 diff --git a/man/sd_bus_creds_get_pid.xml b/man/sd_bus_creds_get_pid.xml index a35efef0c..cc8603cac 100644 --- a/man/sd_bus_creds_get_pid.xml +++ b/man/sd_bus_creds_get_pid.xml @@ -21,7 +21,7 @@ You should have received a copy of the GNU Lesser General Public License along with systemd; If not, see . --> - + sd_bus_creds_get_pid @@ -67,6 +67,7 @@ along with systemd; If not, see . sd_bus_creds_get_audit_login_uid sd_bus_creds_get_unique_name sd_bus_creds_get_well_known_names + sd_bus_creds_get_connection_name Retrieve fields from a credentials object @@ -77,148 +78,154 @@ along with systemd; If not, see . int sd_bus_creds_get_pid - sd_bus_creds* c + sd_bus_creds *c pid_t *pid int sd_bus_creds_get_pid_starttime - sd_bus_creds* c + sd_bus_creds *c uint64_t *usec int sd_bus_creds_get_tid - sd_bus_creds* c + sd_bus_creds *c pid_t *tid int sd_bus_creds_get_pid - sd_bus_creds* c + sd_bus_creds *c uid_t *uid int sd_bus_creds_get_gid - sd_bus_creds* c + sd_bus_creds *c gid_t *gid int sd_bus_creds_get_comm - sd_bus_creds* c + sd_bus_creds *c const char **comm int sd_bus_creds_get_tid_comm - sd_bus_creds* c + sd_bus_creds *c const char **comm int sd_bus_creds_get_exe - sd_bus_creds* c + sd_bus_creds *c const char **exe int sd_bus_creds_get_cmdline - sd_bus_creds* c + sd_bus_creds *c char ***cmdline int sd_bus_creds_get_cgroup - sd_bus_creds* c + sd_bus_creds *c const char **cgroup int sd_bus_creds_get_unit - sd_bus_creds* c + sd_bus_creds *c const char **unit int sd_bus_creds_get_user_unit - sd_bus_creds* c + sd_bus_creds *c const char **unit int sd_bus_creds_get_slice - sd_bus_creds* c + sd_bus_creds *c const char **slice int sd_bus_creds_get_session - sd_bus_creds* c + sd_bus_creds *c const char **slice int sd_bus_creds_get_owner_uid - sd_bus_creds* c + sd_bus_creds *c uid_t *uid int sd_bus_creds_has_effective_cap - sd_bus_creds* c + sd_bus_creds *c int capability int sd_bus_creds_has_permitted_cap - sd_bus_creds* c + sd_bus_creds *c int capability int sd_bus_creds_has_inheritable_cap - sd_bus_creds* c + sd_bus_creds *c int capability int sd_bus_creds_has_bounding_cap - sd_bus_creds* c + sd_bus_creds *c int capability int sd_bus_creds_get_selinux_context - sd_bus_creds* c + sd_bus_creds *c const char **context int sd_bus_creds_get_audit_session_id - sd_bus_creds* c + sd_bus_creds *c uint32_t *sessionid int sd_bus_creds_get_audit_login_uid - sd_bus_creds* c + sd_bus_creds *c uid_t *loginuid int sd_bus_creds_get_unique_name - sd_bus_creds* c + sd_bus_creds *c const char **name int sd_bus_creds_get_well_known_names - sd_bus_creds* c + sd_bus_creds *c char ***name + + int sd_bus_creds_get_connection_name + sd_bus_creds *c + const char **name + + @@ -235,72 +242,72 @@ along with systemd; If not, see . of a connection. - sd_bus_creds_get_pid will retrieve the + sd_bus_creds_get_pid() will retrieve the PID (process identifier). - sd_bus_creds_get_pid_starttime will + sd_bus_creds_get_pid_starttime() will retrieve the time since the start of the epoch in microseconds since the process was started. - sd_bus_creds_get_tid will retrieve the + sd_bus_creds_get_tid() will retrieve the TID (thread identifier). - sd_bus_creds_get_uid will retrieve the + sd_bus_creds_get_uid() will retrieve the numeric UID (user identifier). - sd_bus_creds_get_gid will retrieve the + sd_bus_creds_get_gid() will retrieve the numeric GID (group identifier). - sd_bus_creds_get_comm will retrieve the + sd_bus_creds_get_comm() will retrieve the comm field (truncated name of the executable, as stored in /proc/pid/comm). - sd_bus_creds_get_tid_comm will retrieve + sd_bus_creds_get_tid_comm() will retrieve the comm field of the thread (as stored in /proc/pid/task/tid/comm). - sd_bus_creds_get_exe will retrieve the + sd_bus_creds_get_exe() will retrieve the path to the program (as stored in the /proc/pid/exe link, but with (deleted) suffix removed). - sd_bus_creds_get_cmdline will retrieve + sd_bus_creds_get_cmdline() will retrieve an array of command-line arguments (as stored in /proc/pid/cmdline). - sd_bus_creds_get_cgroup will retrieve + sd_bus_creds_get_cgroup() will retrieve the cgroup path. See cgroups.txt. - sd_bus_creds_get_unit will retrieve the + sd_bus_creds_get_unit() will retrieve the systemd unit name (in the system instance of systemd) that the process is part of. See systemd.unit5. - sd_bus_creds_get_user_unit will + sd_bus_creds_get_user_unit() will retrieve the systemd unit name (in the user instance of systemd) that the process is part of. See systemd.unit5. - sd_bus_creds_get_slice will retrieve + sd_bus_creds_get_slice() will retrieve the systemd slice (a unit in the system instance of systemd) that the process is part of. See systemd.slice5. - sd_bus_creds_get_session will retrieve + sd_bus_creds_get_session() will retrieve the logind session that the process is part of. See systemd-logind.service8. - sd_bus_creds_get_owner_uid will retrieve + sd_bus_creds_get_owner_uid() will retrieve the numeric UID (user identifier) of the user who owns the slice that the process is part of. See systemd.slice5 @@ -308,50 +315,57 @@ along with systemd; If not, see . systemd-user-sessions.service8 -->. - sd_bus_creds_has_effective_cap will + sd_bus_creds_has_effective_cap() will check whether the capability specified by capability was set in the effective capabilities mask. A positive return value means that is was set, zero means that it was not set, and a negative return value signifies an error. See - capabilities7 + capabilities7 and Capabilities= and CapabilityBoundingSet= settings in systemd.exec5. - sd_bus_creds_has_permitted_cap is - similar to sd_bus_creds_has_effective_cap, + sd_bus_creds_has_permitted_cap() is + similar to sd_bus_creds_has_effective_cap(), but will check the permitted capabilities mask. - sd_bus_creds_has_inheritable_cap is - similar to sd_bus_creds_has_effective_cap, + sd_bus_creds_has_inheritable_cap() is + similar to sd_bus_creds_has_effective_cap(), but will check the inheritable capabilities mask. - sd_bus_creds_has_bounding_cap is - similar to sd_bus_creds_has_effective_cap, + sd_bus_creds_has_bounding_cap() is + similar to sd_bus_creds_has_effective_cap(), but will check the bounding capabilities mask. - sd_bus_creds_get_selinux_context will + sd_bus_creds_get_selinux_context() will retrieve the SELinux security context (label) of the process. - sd_bus_creds_get_audit_session_id will + sd_bus_creds_get_audit_session_id() will retrieve the audit session identifier of the process. - sd_bus_creds_get_audit_login_uid will + sd_bus_creds_get_audit_login_uid() will retrieve the audit user login identifier (the identifier of the user who is "responsible" for the session). - sd_bus_creds_get_unique_name will + sd_bus_creds_get_unique_name() will retrieve the D-Bus unique name. See The D-Bus specification. - sd_bus_creds_get_well_known_names will + sd_bus_creds_get_well_known_names() will retrieve the set of D-Bus well-known names. See The D-Bus specification. + sd_bus_creds_get_connection_name() will + retrieve a descriptive name of the bus connection of the + peer. This name is useful to discern multiple bus connections by + the same peer, and may be altered by the peer with the + sd_bus_set_name()3 + call. + All functions that take a const char** parameter will store the answer there as an address of a NUL-terminated string. It will be valid as long as @@ -381,7 +395,7 @@ along with systemd; If not, see . - -ENODATA + -ENODATA Given field is not available in c. @@ -389,36 +403,36 @@ along with systemd; If not, see . - -ENOENT + -ENOENT Given field is not specified for the sender. - This will be returned by sd_bus_get_unit, - sd_bus_get_user_unit, - sd_bus_get_slice, - sd_bus_get_session, and - sd_bus_get_owner_uid if the sender is not + This will be returned by sd_bus_get_unit(), + sd_bus_get_user_unit(), + sd_bus_get_slice(), + sd_bus_get_session(), and + sd_bus_get_owner_uid() if the sender is not part of a systemd system unit, systemd user unit, systemd slice, logind session, or a systemd user session. - -ENXIO + -ENXIO - An error occured in parsing cgroup paths. + An error occurred in parsing cgroup paths. libsystemd might be out of sync with the running systemd version. - -EINVAL + -EINVAL Specified pointer parameter is NULL. - -ENOMEM + -ENOMEM Memory allocation failed. @@ -431,7 +445,7 @@ along with systemd; If not, see . sd_bus_open_user() and other functions described here are available as a shared library, which can be compiled and linked to with the - libsystemd pkg-config1 + libsystemd pkg-config1 file. @@ -441,11 +455,11 @@ along with systemd; If not, see . systemd1, sd-bus3, - credentials7, fork2, execve2, - free3, - proc5, + credentials7, + free3, + proc5, systemd.journald-fields7