Searched refs:GID (Results 1 – 25 of 27) sorted by relevance
12
| /Linux-v5.4/security/safesetid/ |
| D | Kconfig | 9 restrict UID/GID transitions from a given UID/GID to only those
|
| /Linux-v5.4/Documentation/admin-guide/ |
| D | highuid.rst | 18 maximum UID/GID. They are limited by the maximum file size on the 27 (currently, the old 16-bit UID and GID are still written to disk, and 29 GID)
|
| D | perf-security.rst | 62 effective GID, and supplementary group list).
|
| /Linux-v5.4/Documentation/admin-guide/LSM/ |
| D | SafeSetID.rst | 5 UID/GID transitions from a given UID/GID to only those approved by a 57 to do process spawning and UID/GID transitions). Unfortunately, there are a 70 programs in the tree could change to any desired UID/GID in the context of their
|
| /Linux-v5.4/Documentation/ABI/stable/ |
| D | sysfs-driver-ib_srp | 17 destination GID. 115 Description: InfiniBand destination GID used for communication with the SRP 150 Description: InfiniBand destination GID specified in the parameters 179 Description: InfiniBand GID of the source port used for communication with
|
| D | sysfs-class-infiniband | 222 Description: The net-device's name associated with the GID resides 229 Description: The RoCE type of the associated GID resides at index <gid-index>. 372 entry in the port's P_Key or GID table respectively. For 387 <m>/gid_idx/0: (RO) Display the GID mapping m = 1..2
|
| /Linux-v5.4/tools/perf/trace/beauty/ |
| D | statx.c | 60 P_FLAG(GID); in syscall_arg__scnprintf_statx_mask()
|
| /Linux-v5.4/Documentation/filesystems/nfs/ |
| D | idmapper.txt | 40 gid: Find the GID for the given group 42 group: Find the group name for the given GID
|
| D | rpc-cache.txt | 19 - mappings between local UID/GID and remote UID/GID for sites that
|
| /Linux-v5.4/Documentation/security/ |
| D | credentials.rst | 45 defined by the UID and the GID marked on the inode. 72 from the real UID and GID that normally form the objective context of the 132 The UID and GID are carried by most, if not all, Linux objects, even if in 142 EUID/EGID/GROUPS will be used as the subjective context, and real UID/GID 234 * UNIX UID, GID, mode; 320 gid_t current_gid(void) Current's real GID 322 gid_t current_egid(void) Current's effective GID 324 gid_t current_fsgid(void) Current's file access GID
|
| D | IMA-templates.rst | 15 the inode UID/GID or the LSM labels either of the inode and of the process
|
| /Linux-v5.4/drivers/net/ethernet/renesas/ |
| D | ravb_ptp.c | 205 ravb_write(ndev, GID_PTCD, GID); in ravb_ptp_extts() 270 ravb_write(ndev, GID_PTMD0, GID); in ravb_ptp_perout()
|
| D | ravb.h | 173 GID = 0x03D0, /* R-Car Gen3 only */ enumerator
|
| /Linux-v5.4/Documentation/filesystems/ext4/ |
| D | inodes.rst | 79 - Lower 16-bits of GID. 206 - S\_ISGID (Set GID) 395 - Upper 16-bits of the GID. 430 - Upper 16-bits of the GID.
|
| /Linux-v5.4/Documentation/filesystems/ |
| D | quota.txt | 45 - UID/GID (depends on quota type) of user / group whose limit
|
| D | hpfs.txt | 74 attributes with keys "UID", "GID" or "MODE" and 2-byte values are created. Only 85 that if somebody (I don't know who?) has set "UID", "GID", "MODE" or "DEV"
|
| /Linux-v5.4/drivers/infiniband/ |
| D | Kconfig | 80 This allows the user to config the default GID type that the CM
|
| /Linux-v5.4/Documentation/security/keys/ |
| D | request-key.rst | 108 UID, GID, groups and security info of process A as if it was process A, 129 of them, and (b) it requires the same UID/GID/Groups all the way through.
|
| D | core.rst | 153 execve, even when the latter executes a set-UID or set-GID binary. A 158 The ownership of the thread keyring changes when the real UID and GID of 233 This permits a key's UID, GID and permissions mask to be changed. 291 SERIAL FLAGS USAGE EXPY PERM UID GID TYPE DESCRIPTION: SUMMARY 372 KEY_SPEC_GROUP_KEYRING -6 GID-specific keyring 767 requester's keyrings using the requester's security label, UID, GID and 1746 This program should set it UID and GID to those specified before attempting to
|
| /Linux-v5.4/security/keys/ |
| D | Kconfig | 19 to five standard keyrings: UID-specific, GID-specific, session,
|
| /Linux-v5.4/Documentation/admin-guide/sysctl/ |
| D | fs.rst | 173 with writes enabled, any UID or GID that would exceed 65535 is translated 176 These sysctls allow you to change the value of the fixed UID and GID.
|
| D | kernel.rst | 583 i386, m68k, sh, and sparc32), a fixed UID and GID will be returned to 584 applications that use the old 16-bit UID/GID system calls, if the 585 actual UID or GID would exceed 65535. 587 These sysctls allow you to change the value of the fixed UID and GID.
|
| /Linux-v5.4/usr/ |
| D | Kconfig | 50 If INITRAMFS_SOURCE points to a directory, files owned by this GID
|
| /Linux-v5.4/Documentation/networking/ |
| D | rds.txt | 35 locate the remote node's GID (by ARPing for the given IP).
|
| /Linux-v5.4/Documentation/filesystems/caching/ |
| D | cachefiles.txt | 420 parameters with that object is created (UID, GID, security label) would be
|
12