Function report |
Source Code:include\linux\uidgid.h |
Create Date:2022-07-28 05:38:15 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:gid_valid
Proto:static inline bool gid_valid(kgid_t gid)
Type:bool
Parameter:
Type | Parameter | Name |
---|---|---|
kgid_t | gid |
118 | Return __kgid_val(gid) != (gid_t) - 1 |
Name | Describe |
---|---|
uevent_net_broadcast_tagged | |
set_create_files_as | set_create_files_as - Set the LSM file create context in a set of credentials*@new: The credentials to alter*@inode: The inode to take the context from* Change the LSM file creation context in a set of credentials to be the same* as the object context of |
groups_from_user | ll a group_info from a user-space array - it must be allocated already |
groups16_from_user | |
audit_data_to_entry | Translate struct audit_rule_data to kernel's rule representation. |
ipc_update_perm | pc_update_perm - update the permissions of an ipc object*@in: the permission given as input.*@out: the permission of the ipc to set. |
keyctl_chown_key | Change the ownership of a key* The key must grant the caller Setattr permission for this to work, though* the key need not be fully instantiated yet. For the UID to be changed, or* for the GID to be changed to a group the caller is not a member of, the |
key_task_permission | key_task_permission - Check a key can be used*@key_ref: The key to check.*@cred: The credentials to use.*@perm: The permissions to check for.* Check to see whether permission is granted to use a key in the desired way, |
tomoyo_path_chown | moyo_path_chown - Target for security_path_chown().*@path: Pointer to "struct path".*@uid: Owner ID.*@gid: Group ID.* Returns 0 on success, negative value otherwise. |
chown_common | |
may_linkat | may_linkat - Check permissions for creating a hardlink*@link: the source to hardlink from* Block hardlink when all of:* - sysctl_protected_hardlinks enabled* - fsuid does not match inode* - hardlink source is unsafe (see safe_hardlink_source() above)* - |
may_delete | Check whether we can remove a link victim from directory dir, check* whether the type of victim is right.* 1. We can't do it if dir is read-only (done in permission())* 2. We should have write and exec permissions on dir* 3 |
notify_change | y_change - modify attributes of a filesytem object*@dentry: object affected*@attr: new attributes*@delegated_inode: returns inode, if the inode is delegated* The caller must hold the i_mutex on the affected object |
posix_acl_from_xattr | Convert from extended attribute to in-memory representation. |
xdr_nfsace_decode | |
qid_valid | qid_valid - Report if a valid value is stored in a kqid.*@qid: The kernel internal quota identifier to test. |
parse_mount_options | parse_mount_options():* Set @opts to mount options specified in @data. If an option is not* specified in @data, set it to its default value.* Note: @data may be NULL (in which case all options are set to default). |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |