/linux-4.1.27/Documentation/ |
D | highuid.txt | 13 maximum UID/GID. They are limited by the maximum file size on the 15 corresponding to the UID in question. 22 (currently, the old 16-bit UID and GID are still written to disk, and 23 part of the former pad space is used to store separate 32-bit UID and 26 - Need to validate that OS emulation calls the 16-bit UID 28 uses the 32-bit UID system calls properly otherwise. 34 (need to support whatever new 32-bit UID system calls are added to 51 Filesystems with simple fixups to prevent 16-bit UID wraparound: 69 - make sure that the UID mapping feature of AX25 networking works properly
|
D | Changes | 91 32-bit UID support is now in place. Have fun!
|
D | kmemcheck.txt | 430 194 * We won't get problems with the target's UID changing under us
|
/linux-4.1.27/fs/quota/ |
D | quotaio_v1.h | 31 #define v1_dqoff(UID) ((loff_t)((UID) * sizeof (struct v1_disk_dqblk))) argument
|
/linux-4.1.27/tools/perf/ |
D | perf-with-kcore.sh | 87 $SUDO chown $UID "$KCORE_DIR" 88 $SUDO chown $UID "$KCORE_DIR/kcore" 89 $SUDO chown $UID "$KCORE_DIR/kallsyms" 90 $SUDO chown $UID "$KCORE_DIR/modules"
|
/linux-4.1.27/security/keys/ |
D | Kconfig | 18 to five standard keyrings: UID-specific, GID-specific, session, 24 bool "Enable register of persistent per-UID keyrings" 27 This option provides a register of persistent per-UID keyrings, 29 in the sense that they stay around after all processes of that UID
|
/linux-4.1.27/Documentation/security/ |
D | credentials.txt | 58 UID marked on the inode. 65 defined by the UID and the GID marked on the inode. 79 For instance an open file may send SIGIO to a task using the UID and EUID 92 from the real UID and GID that normally form the objective context of the 153 The UID and GID are carried by most, if not all, Linux objects, even if in 163 EUID/EGID/GROUPS will be used as the subjective context, and real UID/GID 191 execve(), especially when a binary is executed that will execute as UID 0. 255 (*) UNIX UID, GID, mode; 346 uid_t current_uid(void) Current's real UID 348 uid_t current_euid(void) Current's effective UID [all …]
|
D | keys-request-key.txt | 106 UID, GID, groups and security info of process A as if it was process A, 127 of them, and (b) it requires the same UID/GID/Groups all the way through.
|
D | keys.txt | 165 execve, even when the latter executes a set-UID or set-GID binary. A 170 The ownership of the thread keyring changes when the real UID and GID of 177 When a process changes its real UID, if it used to have no session key, it 178 will be subscribed to the default session key for the new UID. 181 it will be subscribed to the default for its current UID. 246 This permits a key's UID, GID and permissions mask to be changed. 306 SERIAL FLAGS USAGE EXPY PERM UID GID TYPE DESCRIPTION: SUMMARY 339 <UID>: User ID to which this applies 385 KEY_SPEC_USER_KEYRING -4 UID-specific keyring 386 KEY_SPEC_USER_SESSION_KEYRING -5 UID-session keyring [all …]
|
D | IMA-templates.txt | 12 the inode UID/GID or the LSM labels either of the inode and of the process
|
/linux-4.1.27/Documentation/hwmon/ |
D | mc13783-adc | 45 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.30V / No / 69 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.4V / No /
|
/linux-4.1.27/usr/ |
D | Kconfig | 30 contains a directory. Setting this user ID (UID) to something 31 other than "0" will cause all files owned by that UID to be
|
/linux-4.1.27/Documentation/filesystems/ |
D | quota.txt | 42 - UID/GID (depends on quota type) of user / group whose limit 45 - UID of a user who caused the event
|
D | hpfs.txt | 74 attributes with keys "UID", "GID" or "MODE" and 2-byte values are created. Only 79 extended attribute UID=0. And when you umount the fs and mount it again with 85 that if somebody (I don't know who?) has set "UID", "GID", "MODE" or "DEV"
|
/linux-4.1.27/Documentation/filesystems/nfs/ |
D | idmapper.txt | 39 uid: Find the UID for the given user 41 user: Find the user name for the given UID
|
D | rpc-cache.txt | 17 - mapping from UID to list of GIDs, to work around NFS's limitation 19 - mappings between local UID/GID and remote UID/GID for sites that
|
/linux-4.1.27/tools/testing/selftests/efivarfs/ |
D | efivarfs.sh | 10 if [ $UID != 0 ]; then
|
/linux-4.1.27/tools/testing/selftests/memory-hotplug/ |
D | mem-on-off-test.sh | 9 if [ $UID != 0 ]; then
|
/linux-4.1.27/tools/testing/selftests/cpu-hotplug/ |
D | cpu-on-off-test.sh | 9 if [ $UID != 0 ]; then
|
/linux-4.1.27/tools/testing/fault-injection/ |
D | failcmd.sh | 66 if [ $UID != 0 ]; then
|
/linux-4.1.27/drivers/isdn/hardware/eicon/ |
D | pc.h | 288 #define UID 0x2d /* User id information element */ macro
|
D | divacapi.h | 791 #define UID 0x2d /* User Id for Mgmt */ macro
|
D | message.c | 1351 add_p(plci, UID, "\x06\x43\x61\x70\x69\x32\x30"); in connect_req() 1778 add_p(rc_plci, UID, "\x06\x43\x61\x70\x69\x32\x30"); in info_req() 1915 add_p(rplci, UID, "\x06\x43\x61\x70\x69\x32\x30"); in facility_req() 1956 add_p(rplci, UID, "\x06\x43\x61\x70\x69\x32\x30"); in facility_req() 2076 add_p(rplci, UID, "\x06\x43\x61\x70\x69\x32\x30"); in facility_req() 2322 add_p(rplci, UID, "\x06\x43\x61\x70\x69\x32\x30"); in facility_req() 2425 add_p(rplci, UID, "\x06\x43\x61\x70\x69\x32\x30"); in facility_req() 2482 add_p(rplci, UID, "\x06\x43\x61\x70\x69\x32\x30"); in facility_req() 2514 add_p(rplci, UID, ss_parms[10].info); /* Time */ in facility_req() 2534 add_p(rplci, UID, "\x06\x43\x61\x70\x69\x32\x30"); in facility_req() [all …]
|
/linux-4.1.27/Documentation/filesystems/cifs/ |
D | TODO | 52 m) Create UID mapping facility so server UIDs can be mapped on a per
|
D | README | 679 to return accurate UID/GID information as well
|
/linux-4.1.27/Documentation/networking/ |
D | phy.txt | 238 UID (stored in registers 2 and 3), then comparing it to each 314 registered for it, matching based on UID (contained in the PHY device's phy_id 317 wildcards for the bus ID and UID, respectively.
|
D | netlink_mmap.txt | 149 - nm_pid, nm_uid and nm_gid contain the netlink pid, UID and GID of the sending
|
/linux-4.1.27/Documentation/sysctl/ |
D | fs.txt | 154 with writes enabled, any UID or GID that would exceed 65535 is translated 157 These sysctls allow you to change the value of the fixed UID and GID.
|
D | kernel.txt | 525 i386, m68k, sh, and sparc32), a fixed UID and GID will be returned to 526 applications that use the old 16-bit UID/GID system calls, if the 527 actual UID or GID would exceed 65535. 529 These sysctls allow you to change the value of the fixed UID and GID.
|
/linux-4.1.27/Documentation/cpu-freq/ |
D | governors.txt | 104 program running with UID "root", to set the CPU to a specific frequency
|
/linux-4.1.27/Documentation/filesystems/caching/ |
D | cachefiles.txt | 420 parameters with that object is created (UID, GID, security label) would be
|
/linux-4.1.27/drivers/char/ipmi/ |
D | ipmi_ssif.c | 1843 u8 UID[4]; member
|
D | ipmi_si_intf.c | 2137 u8 UID[4]; member
|
/linux-4.1.27/init/ |
D | Kconfig | 1355 bool "Enable 16-bit UID system calls" if EXPERT 1359 This enables the legacy 16-bit UID syscall wrappers. 1368 If you say N here, all processes will run with UID 0, GID 0, and all
|