/illumos-gate/usr/src/cmd/sgs/rtld/i386/ |
H A D | _setup.c | 72 uid_t uid = (uid_t)-1, euid = (uid_t)-1; local 132 uid = (uid_t)auxv->a_un.a_val; 238 _execname, _argv, uid, euid, gid, egid, NULL, auxflags,
|
/illumos-gate/usr/src/cmd/sgs/rtld/sparc/ |
H A D | _setup.c | 75 uid_t uid = (uid_t)-1, euid = (uid_t)-1; local 143 uid = (uid_t)auxv->a_un.a_val; 242 _execname, _argv, uid, euid, gid, egid,
|
/illumos-gate/usr/src/cmd/sgs/rtld/sparcv9/ |
H A D | _setup.c | 72 uid_t uid = (uid_t)-1, euid = (uid_t)-1; local 132 uid = (uid_t)auxv->a_un.a_val; 230 _execname, _argv, uid, euid, gid, egid, NULL, auxflags,
|
/illumos-gate/usr/src/cmd/ttymon/ |
H A D | tmexpress.c | 451 revokedevaccess(char *dev, uid_t uid, gid_t gid, mode_t mode) argument 454 if (chown(dev, uid, gid) == -1) 460 (void) acl_strip(dev, uid, gid, mode);
|
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | zfs_sa.c | 204 uint64_t uid, gid, mode, rdev, xattr, parent; local 243 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_UID(zfsvfs), NULL, &uid, 8); 262 SA_ADD_BULK_ATTR(sa_attrs, count, SA_ZPL_UID(zfsvfs), NULL, &uid, 8);
|
/illumos-gate/usr/src/uts/common/idmap/ |
H A D | kidmap_priv.h | 47 uid_t uid; member in struct:sid2pid 111 uint32_t rid, uid_t *uid); 123 uint32_t *rid, uid_t uid); 132 uint32_t rid, uid_t uid, int direction);
|
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/ |
H A D | smb_pass.c | 106 * uid/zoneid/username/domainname. 118 * The nodes are added sorted on the uid/zoneid/domainname/username 120 * Compare uid's. The owner who stored the node gets access. 125 if (pa->uid < pb->uid) 127 if (pa->uid > pb->uid) 149 * Initialization of the code that deals with uid and passwords. 209 uid_t uid; local 212 uid 282 uid_t uid; local 336 uid_t uid; local 370 uid_t uid; local [all...] |
/illumos-gate/usr/src/uts/common/fs/smbclnt/smbfs/ |
H A D | smbfs_acl.c | 320 uid_t uid; local 362 error = smbfs_acl_sd2zfs(sd, &vsa, &uid, &gid); 367 SMBVDEBUG("uid=%u, gid=%u", uid, gid); 375 np->n_uid = uid; 492 smbfs_acl_store(vnode_t *vp, vsecattr_t *vsa, uid_t uid, gid_t gid, argument 509 error = smbfs_acl_zfs2sd(vsa, uid, gid, selector, &sd); 543 uid_t uid = (uid_t)-1; local 550 uid = vap->va_uid; 561 error = smbfs_acl_store(vp, NULL, uid, gi [all...] |
/illumos-gate/usr/src/uts/common/fs/ufs/ |
H A D | quota.c | 159 uid_t uid, 175 dhp = &dqhead[DQHASH(uid, ufsvfsp)]; 190 if (dqp->dq_uid != uid || dqp->dq_ufsvfsp != ufsvfsp) 198 if (dqp->dq_uid != uid || dqp->dq_ufsvfsp != ufsvfsp) { 246 dqp->dq_uid = uid; 253 * Check the uid in case it's too large to fit into the 2Gbyte 261 if (uid <= MAXUID && dqoff(uid) >= 0 && dqoff(uid) < qip->i_size) { 266 sizeof (struct dqblk), dqoff(uid), UIO_SYSSPAC 158 getdiskquota( uid_t uid, struct ufsvfs *ufsvfsp, int force, struct dquot **dqpp) argument [all...] |
H A D | quota_ufs.c | 134 "!quota_ufs: over hard disk limit (pid %d, uid %d, inum %d, fs %s)\n"; 136 "!quota_ufs: Warning: over disk limit (pid %d, uid %d, inum %d, fs %s)\n"; 138 "!quota_ufs: over disk and time limit (pid %d, uid %d, inum %d, fs %s)\n"; 140 "!quota_ufs: Warning: quota overflow (pid %d, uid %d, inum %d, fs %s)\n"; 304 * Skip checks for uid 0 owned files. 306 * to be 0; but there are no quotas for uid 0 so 419 chkiq(struct ufsvfs *ufsvfsp, int change, struct inode *ip, uid_t uid, argument 426 "!quota_ufs: over file hard limit (pid %d, uid %d, fs %s)\n"; 428 "!quota_ufs: Warning: too many files (pid %d, uid %d, fs %s)\n"; 430 "!quota_ufs: over file and time limit (pid %d, uid [all...] |
/illumos-gate/usr/src/ucbcmd/chown/ |
H A D | chown.c | 43 * chown [-fR] uid[.gid] file ... 58 uid_t uid; variable 125 uid = pwd->pw_uid; 128 uid = (uid_t)strtol(argv[0], NULL, 10); 144 status += chownr(argv[c], uid, gid); 147 if (lchown(argv[c], uid, gid)) { 167 chownr(char *dir, uid_t uid, gid_t gid) argument 180 if (chown(dir, uid, gid) < 0 && Perror(dir)) 201 ecode = chownr(dp->d_name, uid, gid); 206 if (lchown(dp->d_name, uid, gi [all...] |
/illumos-gate/usr/src/stand/lib/fs/nfs/ |
H A D | auth_unix.c | 82 authunix_create(char *machname, uid_t uid, gid_t gid, int len, gid_t *aup_gids) argument 119 aup.aup_uid = uid;
|
/illumos-gate/usr/src/uts/common/nfs/ |
H A D | nfsid_map.h | 71 uid_t uid; member in union:mapid_arg::__anon6821 116 * Out of range uid/gid 132 uid_t uid; member in union:mapid_res::__anon6822
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | procset.c | 783 uid_t uid; local 816 uid = crgetuid(pp->p_cred); 818 return (uid);
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | hotkey_drv.h | 52 char uid[ID_LEN]; /* ACPI UniqueId */ member in struct:acpi_drv_dev
|
/illumos-gate/usr/src/uts/common/sys/ib/clients/of/sol_ucma/ |
H A D | sol_rdma_user_cm.h | 79 uint64_t uid; member in struct:__anon7942 86 uint64_t uid; member in struct:__anon7943
|
/illumos-gate/usr/src/cmd/lp/cmd/lpsched/ |
H A D | lpfsck.c | 229 uid_t uid; local 301 uid = va_arg(ap, uid_t); 303 (void) chownmod(path, uid, gid, mode);
|
/illumos-gate/usr/src/cmd/smbsrv/smbd/ |
H A D | smbd_logon.c | 93 uid_t uid; local 115 uid = ADT_NO_ATTRIB; 123 uid = token->tkn_user.i_id; 160 if (adt_set_user(ah, uid, gid, uid, gid, NULL, ADT_NEW)) { 186 entry->sa_uid = uid;
|
/illumos-gate/usr/src/cmd/oamuser/user/ |
H A D | homedir.c | 67 create_home(char *homedir, char *skeldir, uid_t uid, gid_t gid, int flags) argument 70 /* uid of new user */ 163 if (chown(homedir, uid, gid) != 0) { 192 homedir, uid, gid);
|
/illumos-gate/usr/src/boot/sys/boot/userboot/userboot/ |
H A D | host.c | 98 int uid; local 102 CALLBACK(stat, f->f_fsdata, &mode, &uid, &gid, &size); 104 sb->st_uid = uid;
|
/illumos-gate/usr/src/lib/nsswitch/ldap/common/ |
H A D | getspent.c | 31 #define _S_UID "uid" 41 #define _F_GETSPNAM "(&(objectClass=shadowAccount)(uid=%s))" 42 #define _F_GETSPNAM_SSD "(&(%%s)(uid=%s))" 78 char **uid, **passwd, **last, **smin, **smax; local 90 uid = __ns_ldap_getAttr(result->entry, _S_UID); 91 if (uid == NULL || uid[0] == NULL || (strlen(uid[0]) < 1)) { 95 len += strlen(uid[0]); 215 uid[ [all...] |
/illumos-gate/usr/src/lib/pam_modules/dhkeys/ |
H A D | dhkeys.c | 102 uid_t uid, /* in */ 127 algtype, uid, gid) >= 0) { 171 * 1. if we are root (uid == 0), we do nothing and return 202 uid_t uid; local 206 struct passwd pw; /* Needed to obtain uid */ 236 uid = pw.pw_uid; 242 if (uid == 0) { 247 err = user2netname(netname, uid, NULL); 280 mp->algtype, short_passp, uid, gid, 304 AUTH_DES_ALGTYPE, short_passp, uid, gi 96 get_and_set_seckey( pam_handle_t *pamh, const char *netname, keylen_t keylen, algtype_t algtype, const char *pw, uid_t uid, gid_t gid, int *get_seckey_cnt, int *good_pw_cnt, int *set_seckey_cnt, int flags, int debug) argument 361 uid_t uid; member in struct:argres 405 uid_t uid; local [all...] |
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | nis_attr.c | 131 uid_t uid; local 152 uid = getuid(); 154 *privileged = (uid == (uid_t)0); 157 if (uid == 0 || uid == buf->pwd->pw_uid) { 344 * succeed if the caller's uid is 0 because only root user
|
H A D | switch_utils.c | 349 p = next; /* uid */ 359 /* uid field should be nonempty */ 364 * for the uid being negative, or being greater 366 * these conditions, the uid was translated to 60001. 645 getpwuid_from(uid_t uid, pwu_repository_t *rep, int reptype) argument 654 arg.key.uid = uid;
|
/illumos-gate/usr/src/lib/print/libpapi-lpd/common/ |
H A D | lpd-job.c | 162 uid_t uid = getuid(); local 183 if ((pw = getpwuid(uid)) != NULL) 185 if (uid == 0)
|