Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:include\linux\uidgid.h Create Date:2022-07-28 05:38:15
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:uid_valid

Proto:static inline bool uid_valid(kuid_t uid)

Type:bool

Parameter:

TypeParameterName
kuid_tuid
113  Return __kuid_val(uid) != (uid_t) - 1
Caller
NameDescribe
uevent_net_broadcast_tagged
set_create_files_asset_create_files_as - Set the LSM file create context in a set of credentials*@new: The credentials to alter*@inode: The inode to take the context from* Change the LSM file creation context in a set of credentials to be the same* as the object context of
audit_set_loginuid_perm
audit_set_loginuidaudit_set_loginuid - set current task's loginuid*@loginuid: loginuid value* Returns 0.* Called (set) from fs/proc/base.c::proc_loginuid_write().
audit_signal_infoaudit_signal_info - record signal info for shutting down audit subsystem*@sig: signal value*@t: task being signaled* If the audit subsystem is being terminated, record the task (pid)* and uid that is doing that.
audit_data_to_entryTranslate struct audit_rule_data to kernel's rule representation.
ipc_update_permpc_update_perm - update the permissions of an ipc object*@in: the permission given as input.*@out: the permission of the ipc to set.
SYSCALL_DEFINE3
keyctl_chown_keyChange the ownership of a key* The key must grant the caller Setattr permission for this to work, though* the key need not be fully instantiated yet. For the UID to be changed, or* for the GID to be changed to a group the caller is not a member of, the
keyctl_get_persistentGet the persistent keyring for a specific UID and link it to the nominated* keyring.
rootid_owns_currentns
cap_convert_nscapUser requested a write of security.capability. If needed, update the* xattr to change from v2 to v3, or to fixup the v3 rootid.* If all is ok, we return the new size, on error return < 0.
tomoyo_path_chownmoyo_path_chown - Target for security_path_chown().*@path: Pointer to "struct path".*@uid: Owner ID.*@gid: Group ID.* Returns 0 on success, negative value otherwise.
parse_policy_lineIn the case the input buffer contains one or more invalid UIDs, the kuid_t* variables pointed to by @parent and @child will get updated but this* function will return an error.* Contents of @buf may be modified.
ima_parse_rule
chown_common
may_follow_linkmay_follow_link - Check symlink following for unsafe situations*@nd: nameidata pathwalk data* In the case of the sysctl_protected_symlinks sysctl being enabled,* CAP_DAC_OVERRIDE needs to be specifically ignored if the symlink is
may_linkatmay_linkat - Check permissions for creating a hardlink*@link: the source to hardlink from* Block hardlink when all of:* - sysctl_protected_hardlinks enabled* - fsuid does not match inode* - hardlink source is unsafe (see safe_hardlink_source() above)* -
may_deleteCheck whether we can remove a link victim from directory dir, check* whether the type of victim is right.* 1. We can't do it if dir is read-only (done in permission())* 2. We should have write and exec permissions on dir* 3
notify_changey_change - modify attributes of a filesytem object*@dentry: object affected*@attr: new attributes*@delegated_inode: returns inode, if the inode is delegated* The caller must hold the i_mutex on the affected object
posix_acl_from_xattrConvert from extended attribute to in-memory representation.
xdr_nfsace_decode
qid_validqid_valid - Report if a valid value is stored in a kqid.*@qid: The kernel internal quota identifier to test.
parse_mount_optionsparse_mount_options():* Set @opts to mount options specified in @data. If an option is not* specified in @data, set it to its default value.* Note: @data may be NULL (in which case all options are set to default).