Searched refs:UID (Results  1 – 25 of 48) sorted by relevance
12
| /Linux-v5.4/Documentation/admin-guide/ | 
| D | highuid.rst | 18   maximum UID/GID. They are limited by the maximum file size on the20   corresponding to the UID in question.
 27   (currently, the old 16-bit UID and GID are still written to disk, and
 28   part of the former pad space is used to store separate 32-bit UID and
 31 - Need to validate that OS emulation calls the 16-bit UID
 33   uses the 32-bit UID system calls properly otherwise.
 40 	  (need to support whatever new 32-bit UID system calls are added to
 59   Filesystems with simple fixups to prevent 16-bit UID wraparound:
 78 - make sure that the UID mapping feature of AX25 networking works properly
 
 | 
| /Linux-v5.4/security/safesetid/ | 
| D | Kconfig | 9           restrict UID/GID transitions from a given UID/GID to only those13           UID mappings.
 
 | 
| /Linux-v5.4/fs/quota/ | 
| D | quotaio_v1.h | 32 #define v1_dqoff(UID)      ((loff_t)((UID) * sizeof (struct v1_disk_dqblk)))  argument
 | 
| /Linux-v5.4/Documentation/admin-guide/LSM/ | 
| D | SafeSetID.rst | 5 UID/GID transitions from a given UID/GID to only those approved by a8 allowing a user to set up user namespace UID mappings.
 57 to do process spawning and UID/GID transitions). Unfortunately, there are a
 70 programs in the tree could change to any desired UID/GID in the context of their
 103 mounted. The format for adding a policy is '<UID>:<UID>', using literal
 105 sufficient. Again, configuring a policy for a UID will prevent that UID from
 107 namespace UID mappings.
 
 | 
| /Linux-v5.4/tools/perf/ | 
| D | perf-with-kcore.sh | 80 	$SUDO chown $UID "$KCORE_DIR"81 	$SUDO chown $UID "$KCORE_DIR/kcore"
 82 	$SUDO chown $UID "$KCORE_DIR/kallsyms"
 83 	$SUDO chown $UID "$KCORE_DIR/modules"
 
 | 
| /Linux-v5.4/security/keys/ | 
| D | Kconfig | 19 	  to five standard keyrings: UID-specific, GID-specific, session,47 	bool "Enable register of persistent per-UID keyrings"
 50 	  This option provides a register of persistent per-UID keyrings,
 52 	  in the sense that they stay around after all processes of that UID
 
 | 
| /Linux-v5.4/tools/testing/selftests/ir/ | 
| D | ir_loopback.sh | 7 if [ $UID != 0 ]; then
 | 
| /Linux-v5.4/Documentation/security/ | 
| D | credentials.rst | 38      UID marked on the inode.45      defined by the UID and the GID marked on the inode.
 59      For instance an open file may send SIGIO to a task using the UID and EUID
 72      from the real UID and GID that normally form the objective context of the
 132      The UID and GID are carried by most, if not all, Linux objects, even if in
 142      EUID/EGID/GROUPS will be used as the subjective context, and real UID/GID
 171      UID 0.
 234  * UNIX UID, GID, mode;
 319 	uid_t current_uid(void)		Current's real UID
 321 	uid_t current_euid(void)	Current's effective UID
 [all …]
 
 | 
| /Linux-v5.4/tools/testing/selftests/bpf/ | 
| D | test_lirc_mode2.sh | 8 if [ $UID != 0 ]; then
 | 
| D | test_flow_dissector.sh | 12 if [ $UID != 0 ]; then
 | 
| /Linux-v5.4/tools/testing/selftests/memfd/ | 
| D | run_hugetlbfs_test.sh | 29 	if [ $UID != 0 ]; then
 | 
| /Linux-v5.4/Documentation/hwmon/ | 
| D | mc13783-adc.rst | 56 7	General Purpose ADIN7 / UID / Die Temperature	0 - 2.30V /	No /83 7	General Purpose ADIN7 / UID / Die Temperature	0 - 2.4V /	No /
 
 | 
| /Linux-v5.4/Documentation/filesystems/ | 
| D | quota.txt | 45 	  - UID/GID (depends on quota type) of user / group whose limit48 	  - UID of a user who caused the event
 
 | 
| /Linux-v5.4/tools/perf/trace/beauty/ | 
| D | statx.c | 59 	P_FLAG(UID);  in syscall_arg__scnprintf_statx_mask()
 | 
| /Linux-v5.4/tools/testing/selftests/cpufreq/ | 
| D | main.sh | 42 	if [ $UID != 0 ]; then
 | 
| /Linux-v5.4/tools/testing/selftests/drivers/usb/usbip/ | 
| D | usbip_test.sh | 35 if [ $UID != 0 ]; then
 | 
| /Linux-v5.4/Documentation/filesystems/nfs/ | 
| D | idmapper.txt | 39 	  uid:  Find the UID for the given user41 	 user:  Find the user  name for the given UID
 
 | 
| D | rpc-cache.txt | 17   - mapping from UID to list of GIDs, to work around NFS's limitation19   - mappings between local UID/GID and remote UID/GID for sites that
 
 | 
| /Linux-v5.4/tools/testing/selftests/gpio/ | 
| D | gpio-mockup.sh | 39 	if [ $UID != 0 ]; then
 | 
| /Linux-v5.4/tools/testing/selftests/intel_pstate/ | 
| D | run.sh | 42 if [ $UID != 0 ] && [ $EVALUATE_ONLY == 0 ]; then
 | 
| /Linux-v5.4/tools/testing/selftests/efivarfs/ | 
| D | efivarfs.sh | 20 	if [ $UID != 0 ]; then
 | 
| /Linux-v5.4/include/linux/ceph/ | 
| D | ceph_features.h | 75 DEFINE_CEPH_FEATURE( 0, 1, UID)
 | 
| /Linux-v5.4/tools/testing/fault-injection/ | 
| D | failcmd.sh | 67 if [ $UID != 0 ]; then
 | 
| /Linux-v5.4/tools/testing/selftests/memory-hotplug/ | 
| D | mem-on-off-test.sh | 13 	if [ $UID != 0 ]; then
 | 
| /Linux-v5.4/tools/testing/selftests/cpu-hotplug/ | 
| D | cpu-on-off-test.sh | 12 	if [ $UID != 0 ]; then
 | 
        12