Searched refs:uid (Results 1 - 25 of 63) sorted by relevance

123

/xnu-2422.115.4/bsd/miscfs/devfs/
H A Ddevfs.h84 * uid, gid - ownership
91 void * devfs_make_node_clone(dev_t dev, int chrblk, uid_t uid, gid_t gid,
104 * uid, gid - ownership
110 void * devfs_make_node(dev_t dev, int chrblk, uid_t uid, gid_t gid,
H A Ddevfs_tree.c1452 * uid, gid - ownership
1460 devfs_make_node_clone(dev_t dev, int chrblk, uid_t uid, argument
1480 new_dev = devfs_make_node_internal(dev, type, uid, gid, perms, clone, fmt, ap);
1496 * uid, gid - ownership
1503 devfs_make_node(dev_t dev, int chrblk, uid_t uid, argument
1516 new_dev = devfs_make_node_internal(dev, type, uid, gid, perms, NULL, fmt, ap);
1524 devfs_make_node_internal(dev_t dev, devfstype_t type, uid_t uid, argument
1598 new_dev->de_dnp->dn_uid = uid;
/xnu-2422.115.4/bsd/kern/
H A Dsysv_ipc.c103 uid_t uid = kauth_cred_getuid(cred); /* avoid multiple calls */ local
115 if (uid == perm->cuid || uid == perm->uid) {
H A Dkern_prot.c310 * Returns: uid_t The real uid of the caller
328 * Returns: uid_t The effective uid of the caller
344 * Parameters: uap->uidp Address of uid_t to get uid
662 * Description: Is current process tainted by uid or gid changes system call
697 * Parameters: uap->uid uid to set
703 * real, effective, and saved uid to the requested value.
705 * If called from an unprivileged process, but uid is equal to the
706 * real or saved uid, then the effective uid wil
715 uid_t uid; local
1401 uid_t uid; local
[all...]
H A Dkern_credential.c228 static struct kauth_identity *kauth_identity_alloc(uid_t uid, gid_t gid, guid_t *guidp, time_t guid_expiry,
237 static int kauth_identity_find_uid(uid_t uid, struct kauth_identity *kir, char *getname);
832 * translate a user@domain string into a uid/gid/whatever
1117 * Parameters: uid
1129 kauth_identity_alloc(uid_t uid, gid_t gid, guid_t *guidp, time_t guid_expiry, argument
1142 if (uid != KAUTH_UID_NONE) {
1144 panic("can't allocate kauth identity with both uid and gid");
1145 kip->ki_uid = uid;
1583 * Parameters: uid UID to find
1594 kauth_identity_find_uid(uid_t uid, struc argument
2096 kauth_cred_uid2groups(uid_t *uid, gid_t *groups, int *gcount) argument
2324 kauth_cred_uid2guid(uid_t uid, guid_t *guidp) argument
2388 kauth_cred_uid2ntsid(uid_t uid, ntsid_t *sidp) argument
4091 uid_t uid = kauth_cred_getuid(cred); local
4156 kauth_cred_setuidgid(kauth_cred_t cred, uid_t uid, gid_t gid) argument
4234 kauth_cred_setsvuidgid(kauth_cred_t cred, uid_t uid, gid_t gid) argument
[all...]
H A Dkern_fork.c355 uid_t uid; local
367 uid = kauth_getruid();
369 if ((nprocs >= maxproc - 1 && uid != 0) || nprocs >= maxproc) {
377 * Increment the count of procs running with this uid. Don't allow
382 count = chgproccnt(uid, 1);
383 if (uid != 0 &&
673 (void)chgproccnt(uid, -1);
H A Dkern_proc.c126 #define UIHASH(uid) (&uihashtbl[(uid) & uihash])
216 chgproccnt(uid_t uid, int diff) argument
225 uipp = UIHASH(uid);
227 if (uip->ui_uid == uid)
256 uip->ui_uid = uid;
1518 * proc_core_name(name, uid, pid)
1519 * Expand the name described in corefilename, using name, uid, and pid.
1523 * %U user id (uid)
1529 proc_core_name(const char *name, uid_t uid, pid_ argument
[all...]
/xnu-2422.115.4/tools/tests/libMicro/apple/
H A Dgetpwuid.c63 // -u uid range in the form of "min-max". For example, -u 5000-5200
198 uid_t uid = uid_min + random() % uid_range ; local
208 err = getpwuid_r( uid, pwd_ptr, pbuf, BUFSIZE, &tmp_ptr );
214 debug("not found: UID %d", uid);
220 passwd = getpwuid( uid );
228 debug("not found: UID %d", uid);
H A Dmbr_check_service_membership.c196 uid_t uid; local
199 mbr_uuid_to_id(ts->uuid_list[i], &uid, &id_type);
200 debug ("username (%s), uid %d, uuid %s, back to uid %d", username, info->pw_uid, buf, uid);
225 uid_t uid; local
238 mbr_uuid_to_id(ts->uuid_list[i], &uid, &id_type);
239 debug ("loop %d: uid %d is %s a member of %s", i, uid, (isMember) ? "" : "not", sacl_chosen);
H A Dmbr_check_membership.c61 // -u uid range in the form of "min-max". For example, -u 5000-5200
172 printf("error converting uid %d to UUID\n", uid_min+i);
195 uid_t uid; local
210 //mbr_uuid_to_id(u_uuid_list[index], &uid, &id_type);
211 //debug ("loop %d: uid %d is %s (gindex %d)", i, uid, (isMember)?"member":"not a member", gindex);
/xnu-2422.115.4/tools/tests/libMicro/
H A Dod_account_create.sh74 uid=$UID_BASE
82 echo "${PREFIX}${i}:test:${uid}:1211:${PREFIX}${i}:/Users/${PREFIX}${i}:/bin/bash" >> $TMPF
88 uid=`expr $uid + 1`
/xnu-2422.115.4/bsd/sys/
H A Dipc.h109 uid_t uid; /* [XSI] Owner's user ID */ member in struct:ipc_perm
131 __uint16_t uid; /* Owner's user ID */ member in struct:__ipc_perm_old
H A Dfsevents.h84 #define FSE_ARG_UID 0x0008 // next arg is the file's uid (uid_t)
88 #define FSE_ARG_FINFO 0x000c // next arg is a packed finfo (dev, ino, mode, uid, gid)
160 uid_t uid; member in struct:fse_info
H A Dcprotect.h109 uid_t uid; member in struct:__anon435
/xnu-2422.115.4/osfmk/gssd/
H A Dgssd_mach.defs60 in uid : uint32_t;
84 out uid : uint32_t;
95 in uid : uint32_t;
106 in uid : uint32_t;
134 out uid : uint32_t;
164 in uid : uint32_t;
/xnu-2422.115.4/bsd/net/
H A Dif_pflog.h86 uid_t uid; member in struct:pfloghdr
H A Dif_pflog.c322 hdr.uid = pd->lookup.uid;
325 hdr.uid = UID_MAX;
/xnu-2422.115.4/osfmk/UserNotification/
H A DUNDRequest.defs47 in uid: int;
H A DKUNCUserNotifications.c220 kern_return_t KUNCExecute(char executionPath[1024], int uid, int gid) argument
228 kr = UNDExecute_rpc(UNDServer, executionPath, uid, gid);
/xnu-2422.115.4/bsd/security/audit/
H A Daudit.h194 void audit_arg_uid(struct kaudit_record *ar, uid_t uid);
209 void audit_arg_owner(struct kaudit_record *ar, uid_t uid, gid_t gid);
237 void audit_arg_posix_ipc_perm(struct kaudit_record *ar, uid_t uid,
H A Daudit_arg.c164 audit_arg_uid(struct kaudit_record *ar, uid_t uid) argument
167 ar->k_ar.ar_arg_uid = uid;
280 audit_arg_owner(struct kaudit_record *ar, uid_t uid, gid_t gid) argument
283 ar->k_ar.ar_arg_uid = uid;
565 audit_arg_posix_ipc_perm(struct kaudit_record *ar, uid_t uid, gid_t gid, argument
569 ar->k_ar.ar_arg_pipc_perm.pipc_uid = uid;
/xnu-2422.115.4/bsd/hfs/
H A Dhfs_quota.c114 * Set up the user quota based on file uid.
367 int hfs_isiqchg_allowed(dq, hfsmp, change, cred, type, uid)
373 uid_t uid;
385 uid == kauth_cred_getuid(cred)) {
407 (uid == kauth_cred_getuid(cred))) {
725 int hfs_quotacheck(hfsmp, change, uid, gid, cred)
728 uid_t uid;
736 id_t id = uid;
748 id = uid;
/xnu-2422.115.4/bsd/vfs/
H A Dvfs_fsevents.c78 uid_t uid; member in struct:kfs_event
614 // the docid is 64-bit and overlays the uid/gid fields
615 memcpy(&cur->uid, &val, sizeof(uint64_t));
654 cur->uid = va.va_uid;
713 cur->uid = (uid_t)fse->uid;
746 kfse->uid = (ino64_t)ival;
859 kfse->uid = (uid_t)(long)kfse->str; // save this off for debugging...
1333 memcpy(&ival, &cur->uid, sizeof(uint64_t)); // the docid gets stuffed into the ino field
1388 error = fill_buff(FSE_ARG_UID, sizeof(uid_t), &cur->uid, evbuf
[all...]
/xnu-2422.115.4/bsd/netinet6/
H A Din6_pcb.c1058 * Check if PCB exists hash list. Also returns uid and gid of socket
1063 uid_t *uid, gid_t *gid, struct ifnet *ifp)
1070 *uid = UID_MAX;
1099 *uid = kauth_cred_getuid(
1130 *uid = kauth_cred_getuid(
1145 *uid = kauth_cred_getuid(
1061 in6_pcblookup_hash_exists(struct inpcbinfo *pcbinfo, struct in6_addr *faddr, u_int fport_arg, struct in6_addr *laddr, u_int lport_arg, int wildcard, uid_t *uid, gid_t *gid, struct ifnet *ifp) argument
/xnu-2422.115.4/tools/tests/kqueue_tests/
H A Dkqueue_file_tests.c298 /* path, uid, gid */
837 int uid = pwd->pw_uid; local
842 init_action(&test.t_prep_actions[1], NOSLEEP, CHOWN, 3, (void*)FILE1, (void*)uid, (void*)gid);
856 init_action(&test.t_prep_actions[1], NOSLEEP, CHOWN, 3, (void*)DIR1, (void*)uid, (void*)gid);
950 int uid = pwd->pw_uid; local
955 init_action(&test.t_prep_actions[1], NOSLEEP, CHOWN, 3, (void*)FILE1, (void*)uid, (void*)gid);
969 init_action(&test.t_prep_actions[1], NOSLEEP, CHOWN, 3, (void*)DIR1, (void*)uid, (void*)gid);
994 int uid = pwd->pw_uid; local
999 init_action(&(test.t_prep_actions[1]), NOSLEEP, CHOWN, 3, (void*)FILE1, (void*)uid, (void*)gid);
1012 init_action(&(test.t_prep_actions[1]), NOSLEEP, CHOWN, 3, (void*)DIR1, (void*) uid, (voi
[all...]

Completed in 268 milliseconds

123