Home
last modified time | relevance | path

Searched refs:UID (Results 1 – 25 of 26) sorted by relevance

12

/linux-2.6.39/Documentation/
Dhighuid.txt13 maximum UID/GID. They are limited by the maximum file size on the
15 corresponding to the UID in question.
22 (currently, the old 16-bit UID and GID are still written to disk, and
23 part of the former pad space is used to store separate 32-bit UID and
26 - Need to validate that OS emulation calls the 16-bit UID
28 uses the 32-bit UID system calls properly otherwise.
34 (need to support whatever new 32-bit UID system calls are added to
51 Filesystems with simple fixups to prevent 16-bit UID wraparound:
69 - make sure that the UID mapping feature of AX25 networking works properly
Dcredentials.txt58 UID marked on the inode.
65 defined by the UID and the GID marked on the inode.
79 For instance an open file may send SIGIO to a task using the UID and EUID
92 from the real UID and GID that normally form the objective context of the
153 The UID and GID are carried by most, if not all, Linux objects, even if in
163 EUID/EGID/GROUPS will be used as the subjective context, and real UID/GID
191 execve(), especially when a binary is executed that will execute as UID 0.
255 (*) UNIX UID, GID, mode;
346 uid_t current_uid(void) Current's real UID
348 uid_t current_euid(void) Current's effective UID
[all …]
Dkeys.txt153 execve, even when the latter executes a set-UID or set-GID binary. A
158 The ownership of the thread keyring changes when the real UID and GID of
165 When a process changes its real UID, if it used to have no session key, it
166 will be subscribed to the default session key for the new UID.
169 it will be subscribed to the default for its current UID.
234 This permits a key's UID, GID and permissions mask to be changed.
294 SERIAL FLAGS USAGE EXPY PERM UID GID TYPE DESCRIPTION: SUMMARY
329 <UID>: User ID to which this applies
375 KEY_SPEC_USER_KEYRING -4 UID-specific keyring
376 KEY_SPEC_USER_SESSION_KEYRING -5 UID-session keyring
[all …]
Dkeys-request-key.txt106 UID, GID, groups and security info of process A as if it was process A,
127 of them, and (b) it requires the same UID/GID/Groups all the way through.
DChanges93 32-bit UID support is now in place. Have fun!
Dkmemcheck.txt430 194 * We won't get problems with the target's UID changing under us
/linux-2.6.39/fs/quota/
Dquotaio_v1.h31 #define v1_dqoff(UID) ((loff_t)((UID) * sizeof (struct v1_disk_dqblk))) argument
/linux-2.6.39/Documentation/filesystems/nfs/
Didmapper.txt31 uid: Find the UID for the given user
33 user: Find the user name for the given UID
Drpc-cache.txt17 - mapping from UID to list of GIDs, to work around NFS's limitation
19 - mappings between local UID/GID and remote UID/GID for sites that
/linux-2.6.39/Documentation/filesystems/
Dquota.txt42 - UID/GID (depends on quota type) of user / group whose limit
45 - UID of a user who caused the event
Dhpfs.txt74 attributes with keys "UID", "GID" or "MODE" and 2-byte values are created. Only
79 extended attribute UID=0. And when you umount the fs and mount it again with
85 that if somebody (I don't know who?) has set "UID", "GID", "MODE" or "DEV"
/linux-2.6.39/Documentation/hwmon/
Dmc13783-adc41 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.30V / No /
/linux-2.6.39/usr/
DKconfig30 contains a directory. Setting this user ID (UID) to something
31 other than "0" will cause all files owned by that UID to be
/linux-2.6.39/Documentation/sysctl/
Dkernel.txt315 m68k, sh, and sparc32), a fixed UID and GID will be returned to
316 applications that use the old 16-bit UID/GID system calls, if the actual
317 UID or GID would exceed 65535.
319 These sysctls allow you to change the value of the fixed UID and GID.
Dfs.txt152 with writes enabled, any UID or GID that would exceed 65535 is translated
155 These sysctls allow you to change the value of the fixed UID and GID.
/linux-2.6.39/drivers/isdn/hardware/eicon/
Dpc.h288 #define UID 0x2d /* User id information element */ macro
Ddivacapi.h791 #define UID 0x2d /* User Id for Mgmt */ macro
Dmessage.c1353 add_p(plci,UID,"\x06\x43\x61\x70\x69\x32\x30"); in connect_req()
1780 add_p(rc_plci,UID,"\x06\x43\x61\x70\x69\x32\x30"); in info_req()
1917 add_p(rplci,UID,"\x06\x43\x61\x70\x69\x32\x30"); in facility_req()
1958 add_p(rplci,UID,"\x06\x43\x61\x70\x69\x32\x30"); in facility_req()
2078 add_p(rplci,UID,"\x06\x43\x61\x70\x69\x32\x30"); in facility_req()
2324 add_p(rplci,UID,"\x06\x43\x61\x70\x69\x32\x30"); in facility_req()
2427 add_p(rplci,UID,"\x06\x43\x61\x70\x69\x32\x30"); in facility_req()
2484 add_p(rplci,UID,"\x06\x43\x61\x70\x69\x32\x30"); in facility_req()
2516 add_p(rplci,UID,ss_parms[10].info); /* Time */ in facility_req()
2536 add_p(rplci,UID,"\x06\x43\x61\x70\x69\x32\x30"); in facility_req()
[all …]
/linux-2.6.39/Documentation/networking/
Dphy.txt236 UID (stored in registers 2 and 3), then comparing it to each
286 registered for it, matching based on UID (contained in the PHY device's phy_id
289 wildcards for the bus ID and UID, respectively.
/linux-2.6.39/fs/cifs/
DTODO66 r) Create UID mapping facility so server UIDs can be mapped on a per
/linux-2.6.39/security/
DKconfig19 to five standard keyrings: UID-specific, GID-specific, session,
/linux-2.6.39/Documentation/cpu-freq/
Dgovernors.txt104 program running with UID "root", to set the CPU to a specific frequency
/linux-2.6.39/Documentation/filesystems/caching/
Dcachefiles.txt420 parameters with that object is created (UID, GID, security label) would be
/linux-2.6.39/init/
DKconfig928 bool "Enable 16-bit UID system calls" if EXPERT
932 This enables the legacy 16-bit UID syscall wrappers.
/linux-2.6.39/drivers/char/ipmi/
Dipmi_si_intf.c2041 u8 UID[4]; member

12