| Function report | 
| Source Code: include\linux\uidgid.h | Create Date:2022-07-28 05:38:15 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:gid_valid
Proto:static inline bool gid_valid(kgid_t gid)
Type:bool
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| kgid_t | gid | 
| 118 | Return __kgid_val(gid) != (gid_t) - 1 | 
| Name | Describe | 
|---|---|
| uevent_net_broadcast_tagged | |
| set_create_files_as | set_create_files_as - Set the LSM file create context in a set of credentials*@new: The credentials to alter*@inode: The inode to take the context from* Change the LSM file creation context in a set of credentials to be the same* as the object context of | 
| groups_from_user | ll a group_info from a user-space array - it must be allocated already | 
| groups16_from_user | |
| audit_data_to_entry | Translate struct audit_rule_data to kernel's rule representation. | 
| ipc_update_perm | pc_update_perm - update the permissions of an ipc object*@in: the permission given as input.*@out: the permission of the ipc to set. | 
| keyctl_chown_key | Change the ownership of a key* The key must grant the caller Setattr permission for this to work, though* the key need not be fully instantiated yet. For the UID to be changed, or* for the GID to be changed to a group the caller is not a member of, the | 
| key_task_permission | key_task_permission - Check a key can be used*@key_ref: The key to check.*@cred: The credentials to use.*@perm: The permissions to check for.* Check to see whether permission is granted to use a key in the desired way, | 
| tomoyo_path_chown | moyo_path_chown - Target for security_path_chown().*@path: Pointer to "struct path".*@uid: Owner ID.*@gid: Group ID.* Returns 0 on success, negative value otherwise. | 
| chown_common | |
| may_linkat | may_linkat - Check permissions for creating a hardlink*@link: the source to hardlink from* Block hardlink when all of:* - sysctl_protected_hardlinks enabled* - fsuid does not match inode* - hardlink source is unsafe (see safe_hardlink_source() above)* - | 
| may_delete | Check whether we can remove a link victim from directory dir, check* whether the type of victim is right.* 1. We can't do it if dir is read-only (done in permission())* 2. We should have write and exec permissions on dir* 3 | 
| notify_change | y_change - modify attributes of a filesytem object*@dentry: object affected*@attr: new attributes*@delegated_inode: returns inode, if the inode is delegated* The caller must hold the i_mutex on the affected object | 
| posix_acl_from_xattr | Convert from extended attribute to in-memory representation. | 
| xdr_nfsace_decode | |
| qid_valid | qid_valid - Report if a valid value is stored in a kqid.*@qid: The kernel internal quota identifier to test. | 
| parse_mount_options | parse_mount_options():* Set @opts to mount options specified in @data. If an option is not* specified in @data, set it to its default value.* Note: @data may be NULL (in which case all options are set to default). | 
| Source code conversion tool public plug-in interface | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |