函数逻辑报告

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:include\linux\uidgid.h Create Date:2022-07-27 06:40:42
Last Modify:2020-03-12 14:18:49 Copyright©Brick
首页 函数Tree
注解内核,赢得工具下载SCCTEnglish

函数名称:gid_valid

函数原型:static inline bool gid_valid(kgid_t gid)

返回类型:bool

参数:

类型参数名称
kgid_tgid
118  返回:__kgid_val(gid) != (gid_t) - 1
调用者
名称描述
uevent_net_broadcast_tagged
set_create_files_asset_create_files_as - Set the LSM file create context in a set of credentials*@new: The credentials to alter*@inode: The inode to take the context from* Change the LSM file creation context in a set of credentials to be the same* as the object context of
groups_from_userll a group_info from a user-space array - it must be allocated already
groups16_from_user
audit_data_to_entryTranslate struct audit_rule_data to kernel's rule representation.
ipc_update_permpc_update_perm - update the permissions of an ipc object*@in: the permission given as input.*@out: the permission of the ipc to set.
keyctl_chown_keyChange the ownership of a key* The key must grant the caller Setattr permission for this to work, though* the key need not be fully instantiated yet. For the UID to be changed, or* for the GID to be changed to a group the caller is not a member of, the
key_task_permissionkey_task_permission - Check a key can be used*@key_ref: The key to check.*@cred: The credentials to use.*@perm: The permissions to check for.* Check to see whether permission is granted to use a key in the desired way,
tomoyo_path_chownmoyo_path_chown - Target for security_path_chown().*@path: Pointer to "struct path".*@uid: Owner ID.*@gid: Group ID.* Returns 0 on success, negative value otherwise.
chown_common
may_linkatmay_linkat - Check permissions for creating a hardlink*@link: the source to hardlink from* Block hardlink when all of:* - sysctl_protected_hardlinks enabled* - fsuid does not match inode* - hardlink source is unsafe (see safe_hardlink_source() above)* -
may_deleteCheck whether we can remove a link victim from directory dir, check* whether the type of victim is right.* 1. We can't do it if dir is read-only (done in permission())* 2. We should have write and exec permissions on dir* 3
notify_changey_change - modify attributes of a filesytem object*@dentry: object affected*@attr: new attributes*@delegated_inode: returns inode, if the inode is delegated* The caller must hold the i_mutex on the affected object
posix_acl_from_xattrConvert from extended attribute to in-memory representation.
xdr_nfsace_decode
qid_validqid_valid - Report if a valid value is stored in a kqid.*@qid: The kernel internal quota identifier to test.
parse_mount_optionsparse_mount_options():* Set @opts to mount options specified in @data. If an option is not* specified in @data, set it to its default value.* Note: @data may be NULL (in which case all options are set to default).
kgid_has_mapping
HAS_UNMAPPED_ID