/illumos-gate/usr/src/uts/common/c2/ |
H A D | audit_event.c | 773 uint32_t uid, gid; local 777 long uid; member in struct:a 781 uid = (uint32_t)uap->uid; 784 au_uwrite(au_to_arg32(2, "new file uid", uid)); 794 uint32_t uid, gid, fd; local 801 long uid; member in struct:a 806 uid = (uint32_t)uap->uid; 839 uint32_t uid, gid; local 844 long uid; member in struct:a 863 long uid; member in struct:a 883 uint32_t uid, gid; local 888 long uid; member in struct:a 1511 uid_t uid, ruid; local 2101 uid_t uid, ruid; local 2233 uint32_t uid; local 2236 long uid; member in struct:a 2608 uint32_t uid; local 2611 long uid; member in struct:a 4884 uid_t uid, ruid; local 5019 uid_t uid, ruid; local 5208 uid_t uid, ruid; local [all...] |
H A D | audit_token.c | 249 au_to_process(uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, argument 266 return (au_to_any_process(data_header, uid, gid, ruid, 271 au_to_subject(uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, argument 287 return (au_to_any_process(data_header, uid, gid, ruid, 294 uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, 307 value = (int32_t)uid; 293 au_to_any_process(char data_header, uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, au_id_t auid, au_asid_t asid, const au_tid_addr_t *atid) argument
|
/illumos-gate/usr/src/uts/common/dtrace/ |
H A D | dtrace.c | 7716 * For DTRACE_PRIV_ALL, the uid and zoneid don't matter. 7779 dtrace_match_priv(const dtrace_probe_t *prp, uint32_t priv, uid_t uid, argument 7803 uid != prp->dtpr_provider->dtpv_priv.dtpp_uid) { 7827 uint32_t priv, uid_t uid, zoneid_t zoneid) 7847 if (dtrace_match_priv(prp, priv, uid, zoneid) == 0) 7993 dtrace_match(const dtrace_probekey_t *pkp, uint32_t priv, uid_t uid, argument 8009 dtrace_match_probe(probe, pkp, priv, uid, zoneid) > 0) { 8052 dtrace_match_probe(probe, pkp, priv, uid, 8077 if (dtrace_match_probe(probe, pkp, priv, uid, zoneid) <= 0) 8826 uid_t uid; local 7826 dtrace_match_probe(const dtrace_probe_t *prp, const dtrace_probekey_t *pkp, uint32_t priv, uid_t uid, zoneid_t zoneid) argument 16072 uid_t uid; local 16574 uid_t uid; local [all...] |
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_srv_attr.c | 2039 uid_t uid; local 2056 * side GETATTR when uid to attribute string conversion cannot 2122 error = nfs_idmap_str_uid(&na->owner, &uid, TRUE); 2130 else if (sarg->vap->va_uid != uid)
|
H A D | nfs4_vnops.c | 1264 * we are root (no root net access). If the real uid 1265 * is not root, then retry with the real uid instead. 3747 * as the server may be faking mode bits or mapping uid/gid. 4227 * and setgid bits when changing the uid or gid. The 12479 uid_t uid, gid_t gid, int isdir) 12486 error = vs_ace4_to_acet(filled_vsap, vsap, uid, gid, FALSE); 12506 error = vs_ace4_to_aent(filled_vsap, vsap, uid, gid, 12478 nfs4_create_getsecattr_return(vsecattr_t *filled_vsap, vsecattr_t *vsap, uid_t uid, gid_t gid, int isdir) argument
|
H A D | nfs4_xdr.c | 764 * owner/group and if so there is no need to call into the uid/gid 765 * mapping code. While the uid/gid interfaces have their own cache 771 uid_t uid; member in struct:ug_cache 806 pug->uid = pug->gid = 0; 1214 vap->va_uid = pug->uid; 1217 uid_t uid; local 1221 error = nfs_idmap_str_uid(&ov, &uid, FALSE); 1238 vap->va_uid = uid; 1241 pug->uid = uid; 1823 uid_t uid; local [all...] |
H A D | nfs_server.c | 1610 * then it will carry root (uid 0) credentials on it, and 2006 * information. Then map root uid/gid to appropriate uid/gid. 2020 uid_t uid; local 2082 access = nfsauth_access(exi, req, cr, &uid, &gid, &ngids, &gids); 2154 } else if (crgetuid(cr) != uid || crgetgid(cr) != gid) { 2155 if (crsetugid(cr, uid, gid) != 0) 2218 * mapped to uid 0 get all privileges, so setting cr's 2281 uid_t uid; local 2325 access = nfsauth4_access(cs->exi, cs->vp, req, cr, &uid, [all...] |
H A D | nfs_auth.c | 293 cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) 297 access = nfsauth_access(exi, req, cr, uid, gid, ngids, gids); 632 uid_t uid; local 704 p->auth_clnt_cred, &uid, &gid, &ngids, &gids); 728 p->auth_srv_uid = uid; 821 cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) 1008 if (uid != NULL) 1009 *uid = tmpuid; 1052 if (uid != NULL) 1053 *uid 292 nfsauth4_access(struct exportinfo *exi, vnode_t *vp, struct svc_req *req, cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) argument 820 nfsauth_cache_get(struct exportinfo *exi, struct svc_req *req, int flavor, cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) argument 1206 nfsauth_access(struct exportinfo *exi, struct svc_req *req, cred_t *cr, uid_t *uid, gid_t *gid, uint_t *ngids, gid_t **gids) argument [all...] |
/illumos-gate/usr/src/cmd/auditreduce/ |
H A D | token.c | 528 * ace who adr_u_int32 (uid/gid) 552 * uid adr_int32 566 int32_t uid; local 569 adrm_int32(adr, &uid, 1); 576 if (m_usere == uid) 589 (obj_owner == uid)) 599 * uid adr_int32 613 int32_t uid; local 616 adrm_int32(adr, &uid, 1); 623 if (m_usere == uid) 660 int32_t uid; local 839 int32_t uid, gid, cuid, cgid, mode, seq; local 1815 uid_t uid; local 1876 int32_t uid; local 1900 int32_t uid; local [all...] |
/illumos-gate/usr/src/cmd/zdb/ |
H A D | zdb.c | 1592 * print uid or gid information. 1613 dump_uidgid(objset_t *os, uint64_t uid, uint64_t gid) argument 1617 uid_idx = FUID_INDEX(uid); 1633 print_idstr(uid, "uid"); 1644 uint64_t uid, gid, mode, fsize, parent, links; local 1676 SA_ADD_BULK_ATTR(bulk, idx, sa_attr_table[ZPL_UID], NULL, &uid, 8); 1720 dump_uidgid(os, uid, gid);
|
/illumos-gate/usr/src/lib/librestart/common/ |
H A D | librestart.c | 2043 if (mcp->pwbuf != NULL && mcp->pwd.pw_uid == mcp->uid) 2056 pwdp = getpwuid_r(mcp->uid, &mcp->pwd, mcp->pwbuf, 2089 * ERANGE the uid is too big 2090 * EINVAL the string starts with a digit, but is not a valid uid 2100 uid_t uid; local 2104 uid = strtol(str, &cp, 10); 2106 if (uid == 0 && errno != 0) { 2115 if (uid > UID_MAX) 2118 *uidp = uid; 2219 if (cip->uid [all...] |
H A D | librestart.h | 273 uid_t uid, euid; member in struct:method_context
|
/illumos-gate/usr/src/lib/libzonecfg/common/ |
H A D | libzonecfg.c | 129 #define DTD_ATTR_UID (const xmlChar *) "uid" 2929 get_detach_dev_entry(const char *name, uid_t uid, gid_t gid, mode_t mode, argument 2945 (void) snprintf(buf, sizeof (buf), "%lu", uid); 2994 * call-back will be passed the name, uid, gid, mode, acl string and the
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | cred.c | 802 crsetugid(cred_t *cr, uid_t uid, gid_t gid) argument 808 if (!VALID_UID(uid, zone) || !VALID_GID(gid, zone)) 811 cr->cr_uid = cr->cr_ruid = cr->cr_suid = uid; 1036 * root (no root net access). Check the real uid, if it isn't root 1037 * make that the uid instead and retry the call.
|
H A D | exec.c | 571 uid_t uid, gid; local 617 (privflags = execsetid(vp, &vattr, &uid, &gid, &fset, 634 cred->cr_uid = uid; 636 cred->cr_suid = uid; 704 "!uid %d: setuid execution not allowed, " 708 "!uid %d: setuid execution not allowed, " 716 cmn_err(CE_NOTE, "!zone: %s, uid: %d " 721 cmn_err(CE_NOTE, "!zone: %s, uid: %d " 737 * whether we gained any privileges or executed a set-uid executable. 754 * the file just executed was set-uid o 1032 uid_t uid, gid; local [all...] |
H A D | policy.c | 97 * checks for uid 0. The rationale behind these is that many root 905 * uid of owner of vnode 1098 * Are we allowed to retain the set-uid/set-gid bits when 1100 * "issuid" should be true when set-uid; only in that case 1380 * ovap. In certain situations set-uid/set-gid bits need to be removed; 1417 * to add the set-uid bit, if we're not the owner. 1418 * In the specific case of creating a set-uid root 1437 * chown to other uid FILE_CHOWN_SELF 1645 * privilege is not sufficient to get uid 0. 1650 * get the powers of root wrt uid 2556 secpolicy_smbfs_login(const cred_t *cr, uid_t uid) argument [all...] |
H A D | zone.c | 5875 uid_t uid; local 6263 uid = crgetruid(newcr); 6265 upcount_dec(uid, GLOBAL_ZONEID); 6266 upcount_inc(uid, zoneid);
|
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | zfs_dir.c | 1071 uid_t uid; local 1085 if ((uid = crgetuid(cr)) == downer || uid == fowner ||
|
H A D | zfs_vnops.c | 945 * user 0 is not an ephemeral uid. 1387 uid_t uid; local 1401 uid = ksid_getid(ksid); 1403 uid = crgetuid(cr); 1407 IS_EPHEMERAL(uid) || IS_EPHEMERAL(gid))) 1879 uid_t uid; local 1894 uid = ksid_getid(ksid); 1896 uid = crgetuid(cr); 1899 IS_EPHEMERAL(uid) || IS_EPHEMERAL(gid))) 2743 * Make sure that if we have ephemeral uid/gi [all...] |
H A D | dsl_deleg.c | 122 * perms for their uid. 672 boolean_t dosets, uint64_t uid, dmu_tx_t *tx) 695 ZFS_DELEG_LOCAL, &uid); 720 uint64_t uid = crgetuid(cr); local 732 copy_create_perms(sdd, pzapobj, B_FALSE, uid, tx); 733 copy_create_perms(sdd, pzapobj, B_TRUE, uid, tx); 671 copy_create_perms(dsl_dir_t *dd, uint64_t pzapobj, boolean_t dosets, uint64_t uid, dmu_tx_t *tx) argument
|
/illumos-gate/usr/src/uts/common/nfs/ |
H A D | nfs.h | 1147 uid3 uid; member in struct:fattr3 1225 uid3 uid; member in struct:set_uid3 1255 set_uid3 uid; member in struct:sattr3
|
/illumos-gate/usr/src/boot/include/isofs/cd9660/ |
H A D | cd9660_rrip.h | 48 char uid [ISODCL ( 20, 27)]; /* 733 */ member in struct:__anon11
|
/illumos-gate/usr/src/boot/sys/boot/userboot/userboot/ |
H A D | host.c | 98 int uid; local 102 CALLBACK(stat, f->f_fsdata, &mode, &uid, &gid, &size); 104 sb->st_uid = uid;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | mDNSEmbeddedAPI.h | 2084 mDNSu32 uid; member in struct:DNameListElem
|
H A D | uds_daemon.c | 153 mDNSu32 uid; member in struct:request_state 758 if (SystemUID(request->uid)) return mDNStrue; 763 if (delem->uid) 770 allow = (allow || (delem->uid == request->uid)); 1883 if (!d->uid || SystemUID(request->uid) || request->uid == d->uid) 1905 if (!p->uid || SystemUI 2429 AddAutoBrowseDomain(const mDNSu32 uid, const domainname *const name) argument 2440 RmvAutoBrowseDomain(const mDNSu32 uid, const domainname *const name) argument [all...] |