Searched defs:uid (Results 201 - 225 of 388) sorted by relevance

1234567891011>>

/illumos-gate/usr/src/cmd/syseventd/daemons/syseventconfd/
H A Dsyseventconfd.c282 uid_t uid; local
315 if (nvlist_lookup_int32(cmd->cmd_nvlist, "uid", (int *)&uid) == 0) {
322 uid = 0;
376 if (uid != (uid_t)0) {
379 i = setuid(uid);
/illumos-gate/usr/src/uts/common/idmap/
H A Didmap_cache.c321 uint32_t rid, uid_t *uid)
337 if (result->uid != UNDEF_UID && result->uid_ttl > now) {
338 *uid = result->uid;
399 *pid = result->uid;
419 uint32_t *rid, uid_t uid)
427 entry.pid = uid;
479 uint32_t rid, uid_t uid, int direction)
499 if (result->uid == UNDEF_UID)
501 result->uid
320 kidmap_cache_lookup_uidbysid(idmap_cache_t *cache, const char *sid_prefix, uint32_t rid, uid_t *uid) argument
418 kidmap_cache_lookup_sidbyuid(idmap_cache_t *cache, const char **sid_prefix, uint32_t *rid, uid_t uid) argument
478 kidmap_cache_add_sid2uid(idmap_cache_t *cache, const char *sid_prefix, uint32_t rid, uid_t uid, int direction) argument
[all...]
/illumos-gate/usr/src/uts/common/fs/nfs/
H A Dnfs4_idmap.c27 * There are well defined policies for mapping uid and gid values to and
35 * started, the policy is to _always_ work with stringified uid's
99 * a) If the otw string is a stringified uid (ie. does _not_ contain
100 * an '@' sign and is of the form "12345") then the literal uid is
298 * Convert a user utf-8 string identifier into its local uid.
301 nfs_idmap_str_uid(utf8string *u8s, uid_t *uid, bool_t isserver) argument
319 *uid = UID_NOBODY;
327 *uid = UID_NOBODY;
350 error = nfs_idmap_s2i_literal(u8s, uid, isserver);
362 if (nfs_idmap_cache_s2i_lkup(&nig->s2u_ci, u8s, &hashno, uid)) {
514 nfs_idmap_uid_str(uid_t uid, utf8string *u8s, bool_t isserver) argument
[all...]
/illumos-gate/usr/src/tools/protocmp/
H A Dprotocmp.c581 uid_t uid; local
627 uid = -1;
629 uid = 2;
630 } else if ((uid = stdfind(ep->owner, usernames)) == -1) {
636 (set_user && uid != -1 && uid != sbp->st_uid)) {
653 if (lchown(fname, uid, gid) == -1) {
/illumos-gate/usr/src/uts/common/os/
H A Dcore.c303 * If the real uid is changing, keep the per-user process
337 uid_t uid; local
362 (uid = crgetuid(credp)) != crgetruid(credp) ||
363 uid != crgetsuid(credp) ||
404 * perhaps a set-uid root process that s/he started,
489 case 'u': /* effective uid */
H A Dpid.c688 * Increment the number of processes associated with a given uid and zoneid.
691 upcount_inc(uid_t uid, zoneid_t zoneid) argument
698 hupc = &upc_hash[UPC_HASH(uid, zoneid)];
702 if ((*upc)->up_uid == uid && (*upc)->up_zoneid == zoneid) {
716 * There is no entry for this <uid,zoneid> pair.
738 new->up_uid = uid;
747 * Decrement the number of processes a given uid and zoneid has.
750 upcount_dec(uid_t uid, zoneid_t zoneid) argument
757 upc = &upc_hash[UPC_HASH(uid, zoneid)];
759 if ((*upc)->up_uid == uid
778 upcount_get(uid_t uid, zoneid_t zoneid) argument
[all...]
/illumos-gate/usr/src/uts/common/rpc/sec/
H A Dsec_clnt.c346 secdata->uid = sd32.uid;
680 * Revoke all rpc credentials (of the selected auth type) for the given uid
681 * from the auth cache. Must be root to do this if the requested uid is not
682 * the effective uid of the requestor.
696 sec_clnt_revoke(int rpcflavor, uid_t uid, cred_t *cr, void *mechanism, argument
703 if (uid != crgetuid(cr) && secpolicy_nfs(cr) != 0)
712 if (uid == da->da_uid &&
761 error = rpc_gss_revauth(uid, mech);
H A Dsvcauthdes.c413 uid_t uid; /* cached uid */ member in struct:bsdcred
471 cred->uid = i_uid;
480 if (crsetugid(cr, cred->uid, cred->gid) != 0 ||
/illumos-gate/usr/src/uts/common/ipp/flowacct/
H A Dflowacct.c202 * attempt to discern the uid and projid of the originator of a packet by
216 header->uid = crgetuid(cr);
219 header->uid = (uid_t)-1;
401 * Checks if the given item (identified by dsfield, project id and uid)
405 flowacct_item_present(flow_t *flow, uint8_t dsfield, pid_t proj_id, uint_t uid) argument
416 (item->uid != uid)) {
490 header->uid);
569 item->uid = header->uid;
[all...]
/illumos-gate/usr/src/lib/libast/amd64/include/ast/
H A Dtar.h83 #define TSUID 04000 /* set uid on exec */
105 char uid[TUIDLEN]; member in struct:header
/illumos-gate/usr/src/lib/libast/i386/include/ast/
H A Dtar.h83 #define TSUID 04000 /* set uid on exec */
105 char uid[TUIDLEN]; member in struct:header
/illumos-gate/usr/src/lib/libast/sparc/include/ast/
H A Dtar.h83 #define TSUID 04000 /* set uid on exec */
105 char uid[TUIDLEN]; member in struct:header
/illumos-gate/usr/src/lib/libast/sparcv9/include/ast/
H A Dtar.h83 #define TSUID 04000 /* set uid on exec */
105 char uid[TUIDLEN]; member in struct:header
/illumos-gate/usr/src/uts/common/fs/zfs/
H A Dzfs_replay.c58 uint64_t uid, uint64_t gid, uint64_t rdev, uint64_t nodeid)
64 vap->va_uid = (uid_t)(IS_EPHEMERAL(uid)) ? -1 : uid;
139 zfs_replay_domain_cnt(uint64_t uid, uint64_t gid) argument
145 uid_idx = FUID_INDEX(uid);
170 * Set the uid/gid in the fuid_info structure.
173 zfs_replay_fuid_ugid(zfs_fuid_info_t *fuid_infop, uint64_t uid, uint64_t gid) argument
179 if (IS_EPHEMERAL(uid))
180 fuid_infop->z_fuid_owner = uid;
190 zfs_replay_fuid_domain(void *buf, void **end, uint64_t uid, uint64_ argument
57 zfs_init_vattr(vattr_t *vap, uint64_t mask, uint64_t mode, uint64_t uid, uint64_t gid, uint64_t rdev, uint64_t nodeid) argument
217 zfs_replay_fuids(void *start, void **end, int idcnt, int domcnt, uint64_t uid, uint64_t gid) argument
[all...]
H A Dzfs_dir.c1071 uid_t uid; local
1085 if ((uid = crgetuid(cr)) == downer || uid == fowner ||
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/
H A Dsmb_logon.c176 smb_token_create_pxgrps(uid_t uid) argument
188 pwd = getpwuid(uid);
639 /* Get the SID for user's uid & gid */
/illumos-gate/usr/src/cmd/smbsrv/smbd/
H A Dsmbd_main.c101 uid_t uid; local
116 if ((uid = getuid()) != smbd.s_uid) {
121 smbd_report("user %d (forced -f)", uid);
124 smbd_report("user %d: %s", uid, strerror(EPERM));
324 smb_init_daemon_priv(int flags, uid_t uid, gid_t gid) argument
332 * with sufficient privileges and with the proper uid. We don't
350 if (uid != (uid_t)-1 && setreuid(uid, uid) != 0)
362 if ((uid
[all...]
/illumos-gate/usr/src/uts/common/syscall/
H A Dutssys.c352 uid_t uid; local
366 uid = crgetruid(prp->p_cred);
606 fu_data->fud_user[pcnt].fu_uid = uid;
/illumos-gate/usr/src/cmd/newtask/
H A Dnewtask.c102 uid_t uid; local
158 uid = getuid();
159 if ((pw = match_user(uid, projname, 1)) == NULL) {
656 match_user(uid_t uid, char *projname, int is_my_uid) argument
667 * for the uid of the calling process, the login name is a
672 (pw = getpwnam(tmp_name)) == NULL || (pw->pw_uid != uid) ||
679 * the current uid in the password file.
682 if (((pw = getpwuid(uid)) == NULL) || pw->pw_name == NULL) {
684 "for uid %d"), uid);
[all...]
/illumos-gate/usr/src/lib/passwdutil/
H A Dldap_attr.c117 #define _PWD_UID "uid"
196 uid_t uid; local
206 uid = getuid();
232 if (uid == 0) {
236 } else if (uid == pw->pw_uid) {
245 if (uid == pw->pw_uid) {
258 if (uid == 0) {
261 priviledged_uid = uid;
273 (int)uid);
1149 uid_t uid; local
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeystore.c73 uid_t uid; local
82 uid = geteuid();
83 if (getpwuid_r(uid, &pwd, pwdbuf, PWD_BUFFER_SIZE, &pw) != 0) {
/illumos-gate/usr/src/lib/libsldap/common/
H A Dns_cache_door.h136 uid_t uid; member in union:__anon3972::__anon3973
/illumos-gate/usr/src/lib/libsocket/inet/
H A Drcmd.c565 uid_t uid = (uid_t)-1; local
603 * Read .rhosts as the local user to avoid NFS mapping the root uid
607 uid = geteuid();
617 if (uid != (uid_t)-1)
618 (void) seteuid(uid);
627 if (uid != (uid_t)-1)
628 (void) seteuid(uid);
637 if (uid != (uid_t)-1)
638 (void) seteuid(uid);
646 if (uid !
[all...]
/illumos-gate/usr/src/lib/libnsl/nis/gen/
H A Dnis_subr.c136 uid_t uid; member in struct:principal_list
/illumos-gate/usr/src/lib/libnwam/common/
H A Dlibnwam_util.c867 uid_t uid = getuid(); local
868 return (uid == UID_NETADM || uid == 0);

Completed in 428 milliseconds

1234567891011>>