Home
last modified time | relevance | path

Searched refs:UID (Results 1 – 25 of 44) sorted by relevance

12

/Linux-v4.19/Documentation/
Dhighuid.txt18 maximum UID/GID. They are limited by the maximum file size on the
20 corresponding to the UID in question.
27 (currently, the old 16-bit UID and GID are still written to disk, and
28 part of the former pad space is used to store separate 32-bit UID and
31 - Need to validate that OS emulation calls the 16-bit UID
33 uses the 32-bit UID system calls properly otherwise.
40 (need to support whatever new 32-bit UID system calls are added to
59 Filesystems with simple fixups to prevent 16-bit UID wraparound:
78 - make sure that the UID mapping feature of AX25 networking works properly
/Linux-v4.19/fs/quota/
Dquotaio_v1.h32 #define v1_dqoff(UID) ((loff_t)((UID) * sizeof (struct v1_disk_dqblk))) argument
/Linux-v4.19/tools/perf/
Dperf-with-kcore.sh87 $SUDO chown $UID "$KCORE_DIR"
88 $SUDO chown $UID "$KCORE_DIR/kcore"
89 $SUDO chown $UID "$KCORE_DIR/kallsyms"
90 $SUDO chown $UID "$KCORE_DIR/modules"
/Linux-v4.19/security/keys/
DKconfig18 to five standard keyrings: UID-specific, GID-specific, session,
28 bool "Enable register of persistent per-UID keyrings"
31 This option provides a register of persistent per-UID keyrings,
33 in the sense that they stay around after all processes of that UID
/Linux-v4.19/Documentation/security/
Dcredentials.rst38 UID marked on the inode.
45 defined by the UID and the GID marked on the inode.
59 For instance an open file may send SIGIO to a task using the UID and EUID
72 from the real UID and GID that normally form the objective context of the
132 The UID and GID are carried by most, if not all, Linux objects, even if in
142 EUID/EGID/GROUPS will be used as the subjective context, and real UID/GID
171 UID 0.
234 * UNIX UID, GID, mode;
319 uid_t current_uid(void) Current's real UID
321 uid_t current_euid(void) Current's effective UID
[all …]
/Linux-v4.19/tools/testing/selftests/bpf/
Dtest_lirc_mode2.sh8 if [ $UID != 0 ]; then
/Linux-v4.19/tools/testing/selftests/memfd/
Drun_hugetlbfs_test.sh29 if [ $UID != 0 ]; then
/Linux-v4.19/Documentation/hwmon/
Dmc13783-adc45 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.30V / No /
69 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.4V / No /
/Linux-v4.19/Documentation/filesystems/
Dquota.txt45 - UID/GID (depends on quota type) of user / group whose limit
48 - UID of a user who caused the event
/Linux-v4.19/tools/perf/trace/beauty/
Dstatx.c56 P_FLAG(UID); in syscall_arg__scnprintf_statx_mask()
/Linux-v4.19/tools/testing/selftests/cpufreq/
Dmain.sh42 if [ $UID != 0 ]; then
/Linux-v4.19/tools/testing/selftests/drivers/usb/usbip/
Dusbip_test.sh35 if [ $UID != 0 ]; then
/Linux-v4.19/Documentation/filesystems/nfs/
Didmapper.txt39 uid: Find the UID for the given user
41 user: Find the user name for the given UID
Drpc-cache.txt17 - mapping from UID to list of GIDs, to work around NFS's limitation
19 - mappings between local UID/GID and remote UID/GID for sites that
/Linux-v4.19/tools/testing/selftests/gpio/
Dgpio-mockup.sh39 if [ $UID != 0 ]; then
/Linux-v4.19/tools/testing/selftests/intel_pstate/
Drun.sh42 if [ $UID != 0 ] && [ $EVALUATE_ONLY == 0 ]; then
/Linux-v4.19/tools/testing/selftests/efivarfs/
Defivarfs.sh14 if [ $UID != 0 ]; then
/Linux-v4.19/tools/testing/selftests/cpu-hotplug/
Dcpu-on-off-test.sh12 if [ $UID != 0 ]; then
/Linux-v4.19/include/linux/ceph/
Dceph_features.h75 DEFINE_CEPH_FEATURE( 0, 1, UID)
/Linux-v4.19/tools/testing/selftests/memory-hotplug/
Dmem-on-off-test.sh13 if [ $UID != 0 ]; then
/Linux-v4.19/tools/testing/fault-injection/
Dfailcmd.sh67 if [ $UID != 0 ]; then
/Linux-v4.19/Documentation/security/keys/
Drequest-key.rst105 UID, GID, groups and security info of process A as if it was process A,
126 of them, and (b) it requires the same UID/GID/Groups all the way through.
Dcore.rst153 execve, even when the latter executes a set-UID or set-GID binary. A
158 The ownership of the thread keyring changes when the real UID and GID of
165 When a process changes its real UID, if it used to have no session key, it
166 will be subscribed to the default session key for the new UID.
169 it will be subscribed to the default for its current UID.
233 This permits a key's UID, GID and permissions mask to be changed.
291 SERIAL FLAGS USAGE EXPY PERM UID GID TYPE DESCRIPTION: SUMMARY
325 <UID>: User ID to which this applies
370 KEY_SPEC_USER_KEYRING -4 UID-specific keyring
371 KEY_SPEC_USER_SESSION_KEYRING -5 UID-session keyring
[all …]
/Linux-v4.19/Documentation/filesystems/ext4/ondisk/
Dinodes.rst46 - Lower 16-bits of Owner UID.
207 - S\_ISUID (Set UID)
388 - Upper 16-bits of the Owner UID.
423 - Upper 16-bits of the Owner UID.
/Linux-v4.19/drivers/isdn/hardware/eicon/
Dpc.h288 #define UID 0x2d /* User id information element */ macro

12