Searched refs:owner (Results 1 – 19 of 19) sorted by relevance
/systemd-251/test/test-execute/ ! |
D | exec-runtimedirectory-owner-nfsnobody.service | 3 Description=Test for RuntimeDirectory owner (must not be the default group of the user if Group is … 6 ExecStart=/bin/sh -x -c 'group=$$(stat -c %%G %t/test-exec_runtimedirectory-owner); test "$$group" … 10 RuntimeDirectory=test-exec_runtimedirectory-owner
|
D | exec-runtimedirectory-owner-nobody.service | 3 Description=Test for RuntimeDirectory owner (must not be the default group of the user if Group is … 6 ExecStart=/bin/sh -x -c 'group=$$(stat -c %%G %t/test-exec_runtimedirectory-owner); test "$$group" … 10 RuntimeDirectory=test-exec_runtimedirectory-owner
|
D | exec-runtimedirectory-owner-nogroup.service | 3 Description=Test for RuntimeDirectory owner (must not be the default group of the user if Group is … 6 ExecStart=/bin/sh -x -c 'group=$$(stat -c %%G %t/test-exec_runtimedirectory-owner); test "$$group" … 10 RuntimeDirectory=test-exec_runtimedirectory-owner
|
D | exec-runtimedirectory-owner.service | 3 Description=Test for RuntimeDirectory owner (must not be the default group of the user if Group is … 6 ExecStart=/bin/sh -x -c 'group=$$(stat -c %%G %t/test-exec_runtimedirectory-owner-daemon); test "$$… 10 RuntimeDirectory=test-exec_runtimedirectory-owner-daemon
|
/systemd-251/hwdb.d/ ! |
D | 70-analyzers.hwdb | 5 # be accessible to the seat owner.
|
D | 70-pda.hwdb | 4 # the seat owner.
|
D | 70-av-production.hwdb | 3 # Database for AV production controllers that should be accessible to the seat owner.
|
D | 80-ieee1394-unit-function.hwdb | 28 # of the unit. The variables are used to decide group owner of special file for character device
|
/systemd-251/LICENSES/ ! |
D | CC0-1.0.txt | 18 and subsequent owner(s) (each and all, an "owner") of an original work of 35 is an owner of Copyright and Related Rights in the Work, voluntarily
|
D | BSD-2-Clause.txt | 1 Copyright (c) <year> <owner> All rights reserved.
|
/systemd-251/src/libsystemd/sd-bus/ ! |
D | bus-dump.c | 331 uid_t owner, audit_loginuid; in bus_creds_dump() local 380 r = sd_bus_creds_get_owner_uid(c, &owner); in bus_creds_dump() 382 fprintf(f, "%sOwnerUID=%s"UID_FMT"%s", prefix, color, owner, suffix); in bus_creds_dump()
|
/systemd-251/src/udev/ ! |
D | udev-rules.c | 2001 char owner[UDEV_NAME_SIZE]; in udev_rule_apply_token_to_event() local 2002 const char *ow = owner; in udev_rule_apply_token_to_event() 2010 … (void) udev_event_apply_format(event, token->value, owner, sizeof(owner), false, &truncated); in udev_rule_apply_token_to_event() 2013 "refusing to apply the OWNER key.", owner, token->value); in udev_rule_apply_token_to_event() 2019 log_unknown_owner(dev, rules, r, "user", owner); in udev_rule_apply_token_to_event() 2021 log_rule_debug(dev, rules, "OWNER %s(%u)", owner, event->uid); in udev_rule_apply_token_to_event()
|
/systemd-251/test/units/ ! |
D | testsuite-72.sh | 90 tar --numeric-owner -C "/var/tmp/72-source/dir-$1/" -czf "/var/tmp/72-source/dir-$1.tar.gz" .
|
/systemd-251/src/basic/linux/ ! |
D | btrfs_tree.h | 445 __le64 owner; member
|
/systemd-251/shell-completion/zsh/ ! |
D | _busctl | 26 "status:Show bus service, process or bus owner credentials"
|
/systemd-251/docs/ ! |
D | HOME_DIRECTORY.md | 168 If the UID assigned to a user does not match the owner of the home directory in
|
/systemd-251/src/core/ ! |
D | service.c | 934 Unit *owner; in service_is_suitable_main_pid() local 952 owner = manager_get_unit_by_pid(UNIT(s)->manager, pid); in service_is_suitable_main_pid() 953 if (owner == UNIT(s)) { in service_is_suitable_main_pid()
|
/systemd-251/catalog/ ! |
D | systemd.catalog.in | 486 operating systems is to be the owner of files that otherwise cannot be mapped
|
/systemd-251/ ! |
D | NEWS | 373 keypads, etc.) that should accessible to the seat owner user by 3295 of the "nobody" user is to own all files whose owner cannot be mapped 6337 * The systemd-mount command gained support for a new --owner= parameter 10859 settings to set the owner user and group of AF_UNIX sockets 11979 may be used to change the owner/group/access mode of a file
|