/illumos-gate/usr/src/cmd/genmsg/ |
H A D | genmsg.y | 61 %type <id> cast_setid, setid, cast_msgid, msgid, cast_digit, digit 124 cast_setid: '(' INT ')' setid { $$ = $4; } 125 | '(' CONST INT ')' setid { $$ = $5; } 126 | setid 129 setid: setid '+' setid { $$ = $1 + $3; } label 130 | setid '-' setid { $$ = $1 - $3; } 131 | setid '*' seti [all...] |
H A D | util.c | 81 /* Top pointer of the setid list. */ 107 add_msg(int setid, int msgid, char *msg, char *file, int line, int no_write) argument 111 if (si = lookup_setid(setid)) { 118 add_setid(setid, msgid, msg, file, line, no_write); 274 /* same setid & msgid, but different msg. */ 350 add_setid(int setid, int msgid, char *msg, char *file, int line, int no_write) argument 355 if (si->id > setid) { 367 newsi->id = setid; 425 int n, setid, msgid; local 433 n = sscanf(p, "%d %d", &setid, 496 get_msgid(char *file, int line, int setid, char *str) argument 527 set_msgid(int setid, int msgid) argument 559 int setid = 0, unsetid = -1, msgid = 0; local [all...] |
/illumos-gate/usr/src/cmd/avs/rdc/ |
H A D | sndrsubr.c | 369 char setid[64]; local 386 if (cfg_get_single_option(cfg, CFG_SEC_CONF, key, "setid", 387 setid, sizeof (setid)) < 0) { 392 gettext("%s unable to get unique setid " 400 return (atoi(setid)); 407 int setid; local 414 cfg_resource(cfg, "setid-ctag"); 417 if (cfg_get_cstring(cfg, "setid.set1.value", buf, CFG_MAX_BUF) < 0) { 418 setid [all...] |
H A D | sndrboot.c | 82 int setid; /* unique setid of this set */ member in struct:_sd_dual_pair 98 char *, char *, char *, int, char *, int setid); 140 int setid; local 238 setid = pair_list[pairs].setid; 241 diskqueue, doasync, lhost, setid) 257 lhost, setid) 263 int setid; 429 parms.rdc_set->setid 535 int setid; local 670 char setid[64]; local [all...] |
H A D | sndradm.c | 3990 char setid[64]; local 3992 parms.rdc_set->setid = get_new_cfg_setid(cfg); 3993 if (parms.rdc_set->setid <= 0) { 4003 (void) snprintf(setid, sizeof (setid), "%d", 4004 parms.rdc_set->setid); 4006 if (cfg_put_options(cfg, CFG_SEC_CONF, key, "setid", 4007 setid) < 0) { 4013 parms.rdc_set->setid = get_cfg_setid(cfg, ctag, tohost, tofile); 4014 if (parms.rdc_set->setid < [all...] |
/illumos-gate/usr/src/uts/common/exec/shbin/ |
H A D | shbin.c | 58 int setid, 162 int setid, 238 if ((setid & EXECSETID_PRIVS) != 0 || 239 (setid & (EXECSETID_UGIDS|EXECSETID_SETID)) == 155 shbinexec( struct vnode *vp, struct execa *uap, struct uarg *args, struct intpdata *idatap, int level, long *execsz, int setid, caddr_t exec_file, struct cred *cred, int brand_action) argument
|
/illumos-gate/usr/src/uts/common/brand/sn1/ |
H A D | sn1_brand.c | 223 int level, long *execsz, int setid, caddr_t exec_file, cred_t *cred, 227 setid, exec_file, cred, brand_action, &sn1_brand, SN1_BRANDNAME, 222 sn1_elfexec(vnode_t *vp, execa_t *uap, uarg_t *args, intpdata_t *idatap, int level, long *execsz, int setid, caddr_t exec_file, cred_t *cred, int brand_action) argument
|
/illumos-gate/usr/src/uts/common/exec/java/ |
H A D | java.c | 87 struct intpdata *idatap, int level, long *execsz, int setid, 137 * Note: If we ever make setid execution work, we need to ensure 141 if (setid) 86 javaexec(vnode_t *vp, struct execa *uap, struct uarg *args, struct intpdata *idatap, int level, long *execsz, int setid, caddr_t execfile, cred_t *cred, int brand_action) argument
|
/illumos-gate/usr/src/uts/common/exec/intp/ |
H A D | intp.c | 169 * For setid scripts the "script hole" is a security race condition between 171 * handle this below for the initial script, but we don't allow setid scripts 173 * for a setid script at level 0, then if we come back through for a nested 174 * interpreter we know that args->fname will be set (the first script is setid) 175 * and we can return an error. If an intermediate nested interpreter is setid 177 * handling, so it is effectively no longer setid and we don't have to worry 188 int setid, 273 if ((setid & EXECSETID_PRIVS) != 0 || 274 (setid & (EXECSETID_UGIDS|EXECSETID_SETID)) == 181 intpexec( struct vnode *vp, struct execa *uap, struct uarg *args, struct intpdata *idatap, int level, long *execsz, int setid, caddr_t exec_file, struct cred *cred, int brand_action) argument
|
/illumos-gate/usr/src/uts/common/exec/aout/ |
H A D | aout.c | 56 intpdata_t *idatap, int level, long *execsz, int setid, 132 struct intpdata *idatap, int level, long *execsz, int setid, 194 setid, exec_file, cred, brand_action)) { 131 aoutexec(vnode_t *vp, struct execa *uap, struct uarg *args, struct intpdata *idatap, int level, long *execsz, int setid, caddr_t exec_file, cred_t *cred, int brand_action) argument
|
/illumos-gate/usr/src/uts/common/avs/ns/rdc/ |
H A D | rdc_ioctl.h | 182 int setid; /* unique set id for this set */ member in struct:rdc_set 208 int32_t setid; /* unique set id for this set */ member in struct:rdc_set32
|
H A D | rdc_diskq.c | 263 * given setid, return index 266 rdc_setid2idx(int setid) { argument 271 if (rdc_u_info[index].setid == setid) 281 * given an index, return its setid 286 return (rdc_u_info[index].setid); 307 hd->dat.setid = rdc_idx2setid(aio->index); 1463 " qpos %d hpos %d len %d flag 0x%x iostatus %x setid %d", 1466 hp->dat.iostatus, hp->dat.setid); 1531 " flag %d iostatus %d setid [all...] |
H A D | rdc_diskq.h | 47 uint32_t setid; /* krdc */ member in struct:qentry
|
H A D | rdc_io.c | 2153 urdc->setid = rdc_set->setid; 4283 urdc->setid = rdc_set->setid; 6139 uap->rdc_set[0].setid = STRUCT_FGET(uparms, rdc_set->setid);
|
/illumos-gate/usr/src/cmd/sgs/tools/common/ |
H A D | sgsmsg.c | 58 * `setid' for catgets(3c) output, or a `domain' name for 122 static char *mesgid = 0, *setid = 0, *domain = 0; variable 184 * Initialize a setid value. Given a setid definition determine its numeric 220 * Establish individual strings for the mesgid, setid and domain 266 "setid %s: warning: multiple mesgids " 274 setid = _setid; 285 setid) < 0) { 300 * For catgets(3c) output generate a setid definition in the message 304 (fprintf(fddefs, "#define\t%s\t%s\n\n", mesgid, setid) < [all...] |
/illumos-gate/usr/src/cmd/lp/cmd/lpsched/ |
H A D | exec.c | 315 int setid = 1; local 782 setid = 0; 789 setid = 1; 796 setid = 1; 802 setid = 1; 812 setid = 1; 816 * setid = 1 means the job-id-requested attribute 819 if (setid)
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | brand.h | 123 long *execsz, int setid, caddr_t exec_file,
|
H A D | exec.h | 167 #define EXECSETID_SETID 0x1 /* setid exec */ 177 long *execsz, int setid, caddr_t exec_file,
|
/illumos-gate/usr/src/uts/common/brand/solaris10/ |
H A D | s10_brand.c | 392 int level, long *execsz, int setid, caddr_t exec_file, cred_t *cred, 396 setid, exec_file, cred, brand_action, &s10_brand, S10_BRANDNAME, 391 s10_elfexec(vnode_t *vp, execa_t *uap, uarg_t *args, intpdata_t *idatap, int level, long *execsz, int setid, caddr_t exec_file, cred_t *cred, int brand_action) argument
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | exec.c | 574 int setid; local 739 setid = (privflags & (PRIV_SETUGID|PRIV_INCREASE|PRIV_FORCED)); 753 * Traditionally, the setid flags told the sub processes whether 755 * some confusion as the 'setid' flag did not match the SUGID 771 if (setid & PRIV_SETUGID) 773 if (setid & PRIV_FORCED) 876 if (setid && (pp->p_proc_flag & P_PR_PTRACE) == 0) { 1443 int setid, 1436 noexec( struct vnode *vp, struct execa *uap, struct uarg *args, struct intpdata *idatap, int level, long *execsz, int setid, caddr_t exec_file, struct cred *cred) argument
|
H A D | brand.c | 603 intpdata_t *idatap, int level, long *execsz, int setid, caddr_t exec_file, 676 setid, exec_file, cred, brand_action); 681 execsz, setid, exec_file, cred, brand_action); 602 brand_solaris_elfexec(vnode_t *vp, execa_t *uap, uarg_t *args, intpdata_t *idatap, int level, long *execsz, int setid, caddr_t exec_file, cred_t *cred, int brand_action, struct brand *pbrand, char *bname, char *brandlib, char *brandlib32, char *brandlinker, char *brandlinker32) argument
|
/illumos-gate/usr/src/lib/libpp/common/ |
H A D | pp.h | 100 #define setid(c) ((pptype)[c]|=C_ID) macro
|
/illumos-gate/usr/src/uts/common/exec/elf/ |
H A D | elf.c | 283 int level, long *execsz, int setid, caddr_t exec_file, cred_t *cred, 397 idatap, level + 1, execsz, setid, exec_file, cred, 669 * We don't support $ORIGIN on setid programs to close 672 if ((setid & EXECSETID_SETID) != 0) { 838 if ((setid &= ~EXECSETID_SETID) != 0) 853 (setid &= ~EXECSETID_SETID) != 0)) 2311 int setid, caddr_t exec_file, cred_t *cred, 282 elfexec(vnode_t *vp, execa_t *uap, uarg_t *args, intpdata_t *idatap, int level, long *execsz, int setid, caddr_t exec_file, cred_t *cred, int brand_action) argument
|
/illumos-gate/usr/src/cmd/mdb/common/modules/rdc/ |
H A D | rdc.c | 279 " iostatus %x setid %d next %p\n", hdr.dat.type, hdr.dat.pos, 281 hdr.dat.setid, hdr.dat.next); 794 mdb_printf("setid: %d %8Tbits set: %d %8Tautosync: %d\n", 795 urdc->setid, urdc->bits_set, urdc->autosync);
|