/illumos-gate/usr/src/cmd/syseventd/daemons/syseventconfd/ |
H A D | syseventconfd.c | 282 uid_t uid; local 315 if (nvlist_lookup_int32(cmd->cmd_nvlist, "uid", (int *)&uid) == 0) { 322 uid = 0; 376 if (uid != (uid_t)0) { 379 i = setuid(uid);
|
/illumos-gate/usr/src/uts/common/idmap/ |
H A D | idmap_cache.c | 321 uint32_t rid, uid_t *uid) 337 if (result->uid != UNDEF_UID && result->uid_ttl > now) { 338 *uid = result->uid; 399 *pid = result->uid; 419 uint32_t *rid, uid_t uid) 427 entry.pid = uid; 479 uint32_t rid, uid_t uid, int direction) 499 if (result->uid == UNDEF_UID) 501 result->uid 320 kidmap_cache_lookup_uidbysid(idmap_cache_t *cache, const char *sid_prefix, uint32_t rid, uid_t *uid) argument 418 kidmap_cache_lookup_sidbyuid(idmap_cache_t *cache, const char **sid_prefix, uint32_t *rid, uid_t uid) argument 478 kidmap_cache_add_sid2uid(idmap_cache_t *cache, const char *sid_prefix, uint32_t rid, uid_t uid, int direction) argument [all...] |
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_idmap.c | 27 * There are well defined policies for mapping uid and gid values to and 35 * started, the policy is to _always_ work with stringified uid's 99 * a) If the otw string is a stringified uid (ie. does _not_ contain 100 * an '@' sign and is of the form "12345") then the literal uid is 298 * Convert a user utf-8 string identifier into its local uid. 301 nfs_idmap_str_uid(utf8string *u8s, uid_t *uid, bool_t isserver) argument 319 *uid = UID_NOBODY; 327 *uid = UID_NOBODY; 350 error = nfs_idmap_s2i_literal(u8s, uid, isserver); 362 if (nfs_idmap_cache_s2i_lkup(&nig->s2u_ci, u8s, &hashno, uid)) { 514 nfs_idmap_uid_str(uid_t uid, utf8string *u8s, bool_t isserver) argument [all...] |
/illumos-gate/usr/src/tools/protocmp/ |
H A D | protocmp.c | 581 uid_t uid; local 627 uid = -1; 629 uid = 2; 630 } else if ((uid = stdfind(ep->owner, usernames)) == -1) { 636 (set_user && uid != -1 && uid != sbp->st_uid)) { 653 if (lchown(fname, uid, gid) == -1) {
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | core.c | 303 * If the real uid is changing, keep the per-user process 337 uid_t uid; local 362 (uid = crgetuid(credp)) != crgetruid(credp) || 363 uid != crgetsuid(credp) || 404 * perhaps a set-uid root process that s/he started, 489 case 'u': /* effective uid */
|
H A D | pid.c | 688 * Increment the number of processes associated with a given uid and zoneid. 691 upcount_inc(uid_t uid, zoneid_t zoneid) argument 698 hupc = &upc_hash[UPC_HASH(uid, zoneid)]; 702 if ((*upc)->up_uid == uid && (*upc)->up_zoneid == zoneid) { 716 * There is no entry for this <uid,zoneid> pair. 738 new->up_uid = uid; 747 * Decrement the number of processes a given uid and zoneid has. 750 upcount_dec(uid_t uid, zoneid_t zoneid) argument 757 upc = &upc_hash[UPC_HASH(uid, zoneid)]; 759 if ((*upc)->up_uid == uid 778 upcount_get(uid_t uid, zoneid_t zoneid) argument [all...] |
/illumos-gate/usr/src/uts/common/rpc/sec/ |
H A D | sec_clnt.c | 346 secdata->uid = sd32.uid; 680 * Revoke all rpc credentials (of the selected auth type) for the given uid 681 * from the auth cache. Must be root to do this if the requested uid is not 682 * the effective uid of the requestor. 696 sec_clnt_revoke(int rpcflavor, uid_t uid, cred_t *cr, void *mechanism, argument 703 if (uid != crgetuid(cr) && secpolicy_nfs(cr) != 0) 712 if (uid == da->da_uid && 761 error = rpc_gss_revauth(uid, mech);
|
H A D | svcauthdes.c | 413 uid_t uid; /* cached uid */ member in struct:bsdcred 471 cred->uid = i_uid; 480 if (crsetugid(cr, cred->uid, cred->gid) != 0 ||
|
/illumos-gate/usr/src/uts/common/ipp/flowacct/ |
H A D | flowacct.c | 202 * attempt to discern the uid and projid of the originator of a packet by 216 header->uid = crgetuid(cr); 219 header->uid = (uid_t)-1; 401 * Checks if the given item (identified by dsfield, project id and uid) 405 flowacct_item_present(flow_t *flow, uint8_t dsfield, pid_t proj_id, uint_t uid) argument 416 (item->uid != uid)) { 490 header->uid); 569 item->uid = header->uid; [all...] |
/illumos-gate/usr/src/lib/libast/amd64/include/ast/ |
H A D | tar.h | 83 #define TSUID 04000 /* set uid on exec */ 105 char uid[TUIDLEN]; member in struct:header
|
/illumos-gate/usr/src/lib/libast/i386/include/ast/ |
H A D | tar.h | 83 #define TSUID 04000 /* set uid on exec */ 105 char uid[TUIDLEN]; member in struct:header
|
/illumos-gate/usr/src/lib/libast/sparc/include/ast/ |
H A D | tar.h | 83 #define TSUID 04000 /* set uid on exec */ 105 char uid[TUIDLEN]; member in struct:header
|
/illumos-gate/usr/src/lib/libast/sparcv9/include/ast/ |
H A D | tar.h | 83 #define TSUID 04000 /* set uid on exec */ 105 char uid[TUIDLEN]; member in struct:header
|
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | zfs_replay.c | 58 uint64_t uid, uint64_t gid, uint64_t rdev, uint64_t nodeid) 64 vap->va_uid = (uid_t)(IS_EPHEMERAL(uid)) ? -1 : uid; 139 zfs_replay_domain_cnt(uint64_t uid, uint64_t gid) argument 145 uid_idx = FUID_INDEX(uid); 170 * Set the uid/gid in the fuid_info structure. 173 zfs_replay_fuid_ugid(zfs_fuid_info_t *fuid_infop, uint64_t uid, uint64_t gid) argument 179 if (IS_EPHEMERAL(uid)) 180 fuid_infop->z_fuid_owner = uid; 190 zfs_replay_fuid_domain(void *buf, void **end, uint64_t uid, uint64_ argument 57 zfs_init_vattr(vattr_t *vap, uint64_t mask, uint64_t mode, uint64_t uid, uint64_t gid, uint64_t rdev, uint64_t nodeid) argument 217 zfs_replay_fuids(void *start, void **end, int idcnt, int domcnt, uint64_t uid, uint64_t gid) argument [all...] |
H A D | zfs_dir.c | 1071 uid_t uid; local 1085 if ((uid = crgetuid(cr)) == downer || uid == fowner ||
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | smb_logon.c | 176 smb_token_create_pxgrps(uid_t uid) argument 188 pwd = getpwuid(uid); 639 /* Get the SID for user's uid & gid */
|
/illumos-gate/usr/src/cmd/smbsrv/smbd/ |
H A D | smbd_main.c | 101 uid_t uid; local 116 if ((uid = getuid()) != smbd.s_uid) { 121 smbd_report("user %d (forced -f)", uid); 124 smbd_report("user %d: %s", uid, strerror(EPERM)); 324 smb_init_daemon_priv(int flags, uid_t uid, gid_t gid) argument 332 * with sufficient privileges and with the proper uid. We don't 350 if (uid != (uid_t)-1 && setreuid(uid, uid) != 0) 362 if ((uid [all...] |
/illumos-gate/usr/src/uts/common/syscall/ |
H A D | utssys.c | 352 uid_t uid; local 366 uid = crgetruid(prp->p_cred); 606 fu_data->fud_user[pcnt].fu_uid = uid;
|
/illumos-gate/usr/src/cmd/newtask/ |
H A D | newtask.c | 102 uid_t uid; local 158 uid = getuid(); 159 if ((pw = match_user(uid, projname, 1)) == NULL) { 656 match_user(uid_t uid, char *projname, int is_my_uid) argument 667 * for the uid of the calling process, the login name is a 672 (pw = getpwnam(tmp_name)) == NULL || (pw->pw_uid != uid) || 679 * the current uid in the password file. 682 if (((pw = getpwuid(uid)) == NULL) || pw->pw_name == NULL) { 684 "for uid %d"), uid); [all...] |
/illumos-gate/usr/src/lib/passwdutil/ |
H A D | ldap_attr.c | 117 #define _PWD_UID "uid" 196 uid_t uid; local 206 uid = getuid(); 232 if (uid == 0) { 236 } else if (uid == pw->pw_uid) { 245 if (uid == pw->pw_uid) { 258 if (uid == 0) { 261 priviledged_uid = uid; 273 (int)uid); 1149 uid_t uid; local [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeystore.c | 73 uid_t uid; local 82 uid = geteuid(); 83 if (getpwuid_r(uid, &pwd, pwdbuf, PWD_BUFFER_SIZE, &pw) != 0) {
|
/illumos-gate/usr/src/lib/libsldap/common/ |
H A D | ns_cache_door.h | 136 uid_t uid; member in union:__anon3972::__anon3973
|
/illumos-gate/usr/src/lib/libsocket/inet/ |
H A D | rcmd.c | 565 uid_t uid = (uid_t)-1; local 603 * Read .rhosts as the local user to avoid NFS mapping the root uid 607 uid = geteuid(); 617 if (uid != (uid_t)-1) 618 (void) seteuid(uid); 627 if (uid != (uid_t)-1) 628 (void) seteuid(uid); 637 if (uid != (uid_t)-1) 638 (void) seteuid(uid); 646 if (uid ! [all...] |
/illumos-gate/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_subr.c | 136 uid_t uid; member in struct:principal_list
|
/illumos-gate/usr/src/lib/libnwam/common/ |
H A D | libnwam_util.c | 867 uid_t uid = getuid(); local 868 return (uid == UID_NETADM || uid == 0);
|