/linux-master/tools/perf/ |
H A D | builtin-ftrace.c | 1127 .target = { .uid = UINT_MAX, },
|
/linux-master/fs/proc/ |
H A D | array.c | 189 seq_put_decimal_ull(m, "\nUid:\t", from_kuid_munged(user_ns, cred->uid));
|
/linux-master/tools/testing/selftests/tc-testing/ |
H A D | tdc.py | 990 os.chown(fname, uid=int(os.getenv('SUDO_UID')),
|
/linux-master/fs/smb/client/ |
H A D | cifs_debug.c | 244 seq_puts(m, "# <tree id> <ses id> <persistent fid> <flags> <count> <pid> <uid>"); 266 from_kuid(&init_user_ns, cfile->uid),
|
H A D | file.c | 691 cfile->uid = current_fsuid(); 1077 .uid = INVALID_UID, /* no change */ 2431 if (fsuid_only && !uid_eq(open_file->uid, current_fsuid())) 2491 if (fsuid_only && !uid_eq(open_file->uid, current_fsuid()))
|
/linux-master/fs/9p/ |
H A D | vfs_inode.c | 214 wstat->uid = NULL;
|
/linux-master/net/ipv4/ |
H A D | route.c | 3233 kuid_t uid; local 3248 uid = make_kuid(current_user_ns(), nla_get_u32(tb[RTA_UID])); 3250 uid = (iif ? INVALID_UID : current_uid()); 3274 fl4.flowi4_uid = uid;
|
/linux-master/include/net/ |
H A D | ip.h | 278 kuid_t uid; member in struct:ip_reply_arg
|
/linux-master/drivers/cxl/core/ |
H A D | memdev.c | 33 static char *cxl_memdev_devnode(const struct device *dev, umode_t *mode, kuid_t *uid, argument
|
/linux-master/kernel/cgroup/ |
H A D | cgroup-v1.c | 515 !uid_eq(cred->euid, tcred->uid) &&
|
/linux-master/include/linux/ |
H A D | hugetlb.h | 509 kuid_t uid; member in struct:hugetlbfs_sb_info
|
H A D | device.h | 93 kuid_t *uid, kgid_t *gid);
|
/linux-master/arch/s390/pci/ |
H A D | pci.c | 523 "PCI Bus %04x:%02x", zdev->uid, ZPCI_BUS_NR);
|
/linux-master/arch/alpha/kernel/ |
H A D | osf_sys.c | 285 tmp.st_uid = from_kuid_munged(current_user_ns(), lstat->uid);
|
/linux-master/mm/ |
H A D | oom_kill.c | 422 * State information includes task's pid, uid, tgid, vm size, rss, 428 pr_info("[ pid ] uid tgid total_vm rss rss_anon rss_file rss_shmem pgtables_bytes swapents oom_score_adj name\n"); 450 pr_cont(",task=%s,pid=%d,uid=%d\n", victim->comm, victim->pid, 778 trace_mark_victim(tsk, cred->uid.val);
|
/linux-master/fs/f2fs/ |
H A D | super.c | 686 kuid_t uid; local 859 uid = make_kuid(current_user_ns(), arg); 860 if (!uid_valid(uid)) { 861 f2fs_err(sbi, "Invalid uid value %d", arg); 864 F2FS_OPTION(sbi).s_resuid = uid;
|
/linux-master/drivers/hwtracing/intel_th/ |
H A D | core.c | 189 kuid_t *uid, kgid_t *gid) 188 intel_th_output_devnode(const struct device *dev, umode_t *mode, kuid_t *uid, kgid_t *gid) argument
|
/linux-master/drivers/usb/gadget/function/ |
H A D | f_fs.c | 1866 inode->i_uid = perms->uid; 1963 fsparam_u32 ("uid", Opt_uid), 1994 data->perms.uid = make_kuid(current_user_ns(), result.uint_32); 1995 if (!uid_valid(data->perms.uid)) 2076 ctx->perms.uid = GLOBAL_ROOT_UID;
|
/linux-master/fs/cramfs/ |
H A D | inode.c | 126 i_uid_write(inode, cramfs_inode->uid);
|
/linux-master/fs/ |
H A D | coredump.c | 284 /* uid */ 288 cred->uid)); 563 * We cannot trust fsuid as being the "true" uid of the process
|
/linux-master/fs/btrfs/ |
H A D | send.c | 914 u64 uid; member in struct:btrfs_inode_info 954 info->uid = btrfs_inode_uid(path->nodes[0], ii); 2693 static int send_chown(struct send_ctx *sctx, u64 ino, u64 gen, u64 uid, u64 gid) argument 2699 btrfs_debug(fs_info, "send_chown %llu uid=%llu, gid=%llu", 2700 ino, uid, gid); 2714 TLV_PUT_U64(sctx, BTRFS_SEND_A_UID, uid); 6679 left_uid = info.uid; 6697 right_uid = info.uid;
|
/linux-master/fs/nfsd/ |
H A D | nfs4xdr.c | 661 u32 stamp, gidcount, uid, gid; local 670 if (xdr_stream_decode_u32(argp->xdr, &uid) < 0) 684 kuid_t kuid = make_kuid(userns, uid); 687 cbs->uid = kuid; 691 dprintk("RPC_AUTH_UNIX with invalid uid or gid, ignoring!\n"); 3225 return nfsd4_encode_user(xdr, args->rqstp, args->stat.uid);
|
/linux-master/drivers/net/wireless/ath/ath12k/ |
H A D | dp_mon.c | 2360 u32 uid) 2364 struct hal_rx_user_status *user_stats = &ppdu_info->userstats[uid]; 2358 ath12k_dp_mon_rx_update_user_stats(struct ath12k *ar, struct hal_rx_mon_ppdu_info *ppdu_info, u32 uid) argument
|
/linux-master/security/ |
H A D | security.c | 1961 * @uid: file owner 1968 int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid) argument 1972 return call_int_hook(path_chown, path, uid, gid); 3258 * the set*uid system calls invoked this hook. If @new is the set of
|
/linux-master/sound/soc/ |
H A D | soc-topology.c | 153 int uid; member in struct:soc_tplg_map 216 if (tplg_type == dapm_map[i].uid)
|