Searched refs:UID (Results 1 – 25 of 44) sorted by relevance
12
/Linux-v4.19/Documentation/ |
D | highuid.txt | 18 maximum UID/GID. They are limited by the maximum file size on the 20 corresponding to the UID in question. 27 (currently, the old 16-bit UID and GID are still written to disk, and 28 part of the former pad space is used to store separate 32-bit UID and 31 - Need to validate that OS emulation calls the 16-bit UID 33 uses the 32-bit UID system calls properly otherwise. 40 (need to support whatever new 32-bit UID system calls are added to 59 Filesystems with simple fixups to prevent 16-bit UID wraparound: 78 - make sure that the UID mapping feature of AX25 networking works properly
|
/Linux-v4.19/fs/quota/ |
D | quotaio_v1.h | 32 #define v1_dqoff(UID) ((loff_t)((UID) * sizeof (struct v1_disk_dqblk))) argument
|
/Linux-v4.19/tools/perf/ |
D | perf-with-kcore.sh | 87 $SUDO chown $UID "$KCORE_DIR" 88 $SUDO chown $UID "$KCORE_DIR/kcore" 89 $SUDO chown $UID "$KCORE_DIR/kallsyms" 90 $SUDO chown $UID "$KCORE_DIR/modules"
|
/Linux-v4.19/security/keys/ |
D | Kconfig | 18 to five standard keyrings: UID-specific, GID-specific, session, 28 bool "Enable register of persistent per-UID keyrings" 31 This option provides a register of persistent per-UID keyrings, 33 in the sense that they stay around after all processes of that UID
|
/Linux-v4.19/Documentation/security/ |
D | credentials.rst | 38 UID marked on the inode. 45 defined by the UID and the GID marked on the inode. 59 For instance an open file may send SIGIO to a task using the UID and EUID 72 from the real UID and GID that normally form the objective context of the 132 The UID and GID are carried by most, if not all, Linux objects, even if in 142 EUID/EGID/GROUPS will be used as the subjective context, and real UID/GID 171 UID 0. 234 * UNIX UID, GID, mode; 319 uid_t current_uid(void) Current's real UID 321 uid_t current_euid(void) Current's effective UID [all …]
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_lirc_mode2.sh | 8 if [ $UID != 0 ]; then
|
/Linux-v4.19/tools/testing/selftests/memfd/ |
D | run_hugetlbfs_test.sh | 29 if [ $UID != 0 ]; then
|
/Linux-v4.19/Documentation/hwmon/ |
D | mc13783-adc | 45 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.30V / No / 69 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.4V / No /
|
/Linux-v4.19/Documentation/filesystems/ |
D | quota.txt | 45 - UID/GID (depends on quota type) of user / group whose limit 48 - UID of a user who caused the event
|
/Linux-v4.19/tools/perf/trace/beauty/ |
D | statx.c | 56 P_FLAG(UID); in syscall_arg__scnprintf_statx_mask()
|
/Linux-v4.19/tools/testing/selftests/cpufreq/ |
D | main.sh | 42 if [ $UID != 0 ]; then
|
/Linux-v4.19/tools/testing/selftests/drivers/usb/usbip/ |
D | usbip_test.sh | 35 if [ $UID != 0 ]; then
|
/Linux-v4.19/Documentation/filesystems/nfs/ |
D | idmapper.txt | 39 uid: Find the UID for the given user 41 user: Find the user name for the given UID
|
D | rpc-cache.txt | 17 - mapping from UID to list of GIDs, to work around NFS's limitation 19 - mappings between local UID/GID and remote UID/GID for sites that
|
/Linux-v4.19/tools/testing/selftests/gpio/ |
D | gpio-mockup.sh | 39 if [ $UID != 0 ]; then
|
/Linux-v4.19/tools/testing/selftests/intel_pstate/ |
D | run.sh | 42 if [ $UID != 0 ] && [ $EVALUATE_ONLY == 0 ]; then
|
/Linux-v4.19/tools/testing/selftests/efivarfs/ |
D | efivarfs.sh | 14 if [ $UID != 0 ]; then
|
/Linux-v4.19/tools/testing/selftests/cpu-hotplug/ |
D | cpu-on-off-test.sh | 12 if [ $UID != 0 ]; then
|
/Linux-v4.19/include/linux/ceph/ |
D | ceph_features.h | 75 DEFINE_CEPH_FEATURE( 0, 1, UID)
|
/Linux-v4.19/tools/testing/selftests/memory-hotplug/ |
D | mem-on-off-test.sh | 13 if [ $UID != 0 ]; then
|
/Linux-v4.19/tools/testing/fault-injection/ |
D | failcmd.sh | 67 if [ $UID != 0 ]; then
|
/Linux-v4.19/Documentation/security/keys/ |
D | request-key.rst | 105 UID, GID, groups and security info of process A as if it was process A, 126 of them, and (b) it requires the same UID/GID/Groups all the way through.
|
D | core.rst | 153 execve, even when the latter executes a set-UID or set-GID binary. A 158 The ownership of the thread keyring changes when the real UID and GID of 165 When a process changes its real UID, if it used to have no session key, it 166 will be subscribed to the default session key for the new UID. 169 it will be subscribed to the default for its current UID. 233 This permits a key's UID, GID and permissions mask to be changed. 291 SERIAL FLAGS USAGE EXPY PERM UID GID TYPE DESCRIPTION: SUMMARY 325 <UID>: User ID to which this applies 370 KEY_SPEC_USER_KEYRING -4 UID-specific keyring 371 KEY_SPEC_USER_SESSION_KEYRING -5 UID-session keyring [all …]
|
/Linux-v4.19/Documentation/filesystems/ext4/ondisk/ |
D | inodes.rst | 46 - Lower 16-bits of Owner UID. 207 - S\_ISUID (Set UID) 388 - Upper 16-bits of the Owner UID. 423 - Upper 16-bits of the Owner UID.
|
/Linux-v4.19/drivers/isdn/hardware/eicon/ |
D | pc.h | 288 #define UID 0x2d /* User id information element */ macro
|
12