/xnu-2422.115.4/bsd/miscfs/devfs/ |
H A D | devfs.h | 84 * uid, gid - ownership 91 void * devfs_make_node_clone(dev_t dev, int chrblk, uid_t uid, gid_t gid, 104 * uid, gid - ownership 110 void * devfs_make_node(dev_t dev, int chrblk, uid_t uid, gid_t gid,
|
H A D | devfs_tree.c | 1452 * uid, gid - ownership 1460 devfs_make_node_clone(dev_t dev, int chrblk, uid_t uid, argument 1480 new_dev = devfs_make_node_internal(dev, type, uid, gid, perms, clone, fmt, ap); 1496 * uid, gid - ownership 1503 devfs_make_node(dev_t dev, int chrblk, uid_t uid, argument 1516 new_dev = devfs_make_node_internal(dev, type, uid, gid, perms, NULL, fmt, ap); 1524 devfs_make_node_internal(dev_t dev, devfstype_t type, uid_t uid, argument 1598 new_dev->de_dnp->dn_uid = uid;
|
/xnu-2422.115.4/bsd/kern/ |
H A D | sysv_ipc.c | 103 uid_t uid = kauth_cred_getuid(cred); /* avoid multiple calls */ local 115 if (uid == perm->cuid || uid == perm->uid) {
|
H A D | kern_prot.c | 310 * Returns: uid_t The real uid of the caller 328 * Returns: uid_t The effective uid of the caller 344 * Parameters: uap->uidp Address of uid_t to get uid 662 * Description: Is current process tainted by uid or gid changes system call 697 * Parameters: uap->uid uid to set 703 * real, effective, and saved uid to the requested value. 705 * If called from an unprivileged process, but uid is equal to the 706 * real or saved uid, then the effective uid wil 715 uid_t uid; local 1401 uid_t uid; local [all...] |
H A D | kern_credential.c | 228 static struct kauth_identity *kauth_identity_alloc(uid_t uid, gid_t gid, guid_t *guidp, time_t guid_expiry, 237 static int kauth_identity_find_uid(uid_t uid, struct kauth_identity *kir, char *getname); 832 * translate a user@domain string into a uid/gid/whatever 1117 * Parameters: uid 1129 kauth_identity_alloc(uid_t uid, gid_t gid, guid_t *guidp, time_t guid_expiry, argument 1142 if (uid != KAUTH_UID_NONE) { 1144 panic("can't allocate kauth identity with both uid and gid"); 1145 kip->ki_uid = uid; 1583 * Parameters: uid UID to find 1594 kauth_identity_find_uid(uid_t uid, struc argument 2096 kauth_cred_uid2groups(uid_t *uid, gid_t *groups, int *gcount) argument 2324 kauth_cred_uid2guid(uid_t uid, guid_t *guidp) argument 2388 kauth_cred_uid2ntsid(uid_t uid, ntsid_t *sidp) argument 4091 uid_t uid = kauth_cred_getuid(cred); local 4156 kauth_cred_setuidgid(kauth_cred_t cred, uid_t uid, gid_t gid) argument 4234 kauth_cred_setsvuidgid(kauth_cred_t cred, uid_t uid, gid_t gid) argument [all...] |
H A D | kern_fork.c | 355 uid_t uid; local 367 uid = kauth_getruid(); 369 if ((nprocs >= maxproc - 1 && uid != 0) || nprocs >= maxproc) { 377 * Increment the count of procs running with this uid. Don't allow 382 count = chgproccnt(uid, 1); 383 if (uid != 0 && 673 (void)chgproccnt(uid, -1);
|
H A D | kern_proc.c | 126 #define UIHASH(uid) (&uihashtbl[(uid) & uihash]) 216 chgproccnt(uid_t uid, int diff) argument 225 uipp = UIHASH(uid); 227 if (uip->ui_uid == uid) 256 uip->ui_uid = uid; 1518 * proc_core_name(name, uid, pid) 1519 * Expand the name described in corefilename, using name, uid, and pid. 1523 * %U user id (uid) 1529 proc_core_name(const char *name, uid_t uid, pid_ argument [all...] |
/xnu-2422.115.4/tools/tests/libMicro/apple/ |
H A D | getpwuid.c | 63 // -u uid range in the form of "min-max". For example, -u 5000-5200 198 uid_t uid = uid_min + random() % uid_range ; local 208 err = getpwuid_r( uid, pwd_ptr, pbuf, BUFSIZE, &tmp_ptr ); 214 debug("not found: UID %d", uid); 220 passwd = getpwuid( uid ); 228 debug("not found: UID %d", uid);
|
H A D | mbr_check_service_membership.c | 196 uid_t uid; local 199 mbr_uuid_to_id(ts->uuid_list[i], &uid, &id_type); 200 debug ("username (%s), uid %d, uuid %s, back to uid %d", username, info->pw_uid, buf, uid); 225 uid_t uid; local 238 mbr_uuid_to_id(ts->uuid_list[i], &uid, &id_type); 239 debug ("loop %d: uid %d is %s a member of %s", i, uid, (isMember) ? "" : "not", sacl_chosen);
|
H A D | mbr_check_membership.c | 61 // -u uid range in the form of "min-max". For example, -u 5000-5200 172 printf("error converting uid %d to UUID\n", uid_min+i); 195 uid_t uid; local 210 //mbr_uuid_to_id(u_uuid_list[index], &uid, &id_type); 211 //debug ("loop %d: uid %d is %s (gindex %d)", i, uid, (isMember)?"member":"not a member", gindex);
|
/xnu-2422.115.4/tools/tests/libMicro/ |
H A D | od_account_create.sh | 74 uid=$UID_BASE 82 echo "${PREFIX}${i}:test:${uid}:1211:${PREFIX}${i}:/Users/${PREFIX}${i}:/bin/bash" >> $TMPF 88 uid=`expr $uid + 1`
|
/xnu-2422.115.4/bsd/sys/ |
H A D | ipc.h | 109 uid_t uid; /* [XSI] Owner's user ID */ member in struct:ipc_perm 131 __uint16_t uid; /* Owner's user ID */ member in struct:__ipc_perm_old
|
H A D | fsevents.h | 84 #define FSE_ARG_UID 0x0008 // next arg is the file's uid (uid_t) 88 #define FSE_ARG_FINFO 0x000c // next arg is a packed finfo (dev, ino, mode, uid, gid) 160 uid_t uid; member in struct:fse_info
|
H A D | cprotect.h | 109 uid_t uid; member in struct:__anon435
|
/xnu-2422.115.4/osfmk/gssd/ |
H A D | gssd_mach.defs | 60 in uid : uint32_t; 84 out uid : uint32_t; 95 in uid : uint32_t; 106 in uid : uint32_t; 134 out uid : uint32_t; 164 in uid : uint32_t;
|
/xnu-2422.115.4/bsd/net/ |
H A D | if_pflog.h | 86 uid_t uid; member in struct:pfloghdr
|
H A D | if_pflog.c | 322 hdr.uid = pd->lookup.uid; 325 hdr.uid = UID_MAX;
|
/xnu-2422.115.4/osfmk/UserNotification/ |
H A D | UNDRequest.defs | 47 in uid: int;
|
H A D | KUNCUserNotifications.c | 220 kern_return_t KUNCExecute(char executionPath[1024], int uid, int gid) argument 228 kr = UNDExecute_rpc(UNDServer, executionPath, uid, gid);
|
/xnu-2422.115.4/bsd/security/audit/ |
H A D | audit.h | 194 void audit_arg_uid(struct kaudit_record *ar, uid_t uid); 209 void audit_arg_owner(struct kaudit_record *ar, uid_t uid, gid_t gid); 237 void audit_arg_posix_ipc_perm(struct kaudit_record *ar, uid_t uid,
|
H A D | audit_arg.c | 164 audit_arg_uid(struct kaudit_record *ar, uid_t uid) argument 167 ar->k_ar.ar_arg_uid = uid; 280 audit_arg_owner(struct kaudit_record *ar, uid_t uid, gid_t gid) argument 283 ar->k_ar.ar_arg_uid = uid; 565 audit_arg_posix_ipc_perm(struct kaudit_record *ar, uid_t uid, gid_t gid, argument 569 ar->k_ar.ar_arg_pipc_perm.pipc_uid = uid;
|
/xnu-2422.115.4/bsd/hfs/ |
H A D | hfs_quota.c | 114 * Set up the user quota based on file uid. 367 int hfs_isiqchg_allowed(dq, hfsmp, change, cred, type, uid) 373 uid_t uid; 385 uid == kauth_cred_getuid(cred)) { 407 (uid == kauth_cred_getuid(cred))) { 725 int hfs_quotacheck(hfsmp, change, uid, gid, cred) 728 uid_t uid; 736 id_t id = uid; 748 id = uid;
|
/xnu-2422.115.4/bsd/vfs/ |
H A D | vfs_fsevents.c | 78 uid_t uid; member in struct:kfs_event 614 // the docid is 64-bit and overlays the uid/gid fields 615 memcpy(&cur->uid, &val, sizeof(uint64_t)); 654 cur->uid = va.va_uid; 713 cur->uid = (uid_t)fse->uid; 746 kfse->uid = (ino64_t)ival; 859 kfse->uid = (uid_t)(long)kfse->str; // save this off for debugging... 1333 memcpy(&ival, &cur->uid, sizeof(uint64_t)); // the docid gets stuffed into the ino field 1388 error = fill_buff(FSE_ARG_UID, sizeof(uid_t), &cur->uid, evbuf [all...] |
/xnu-2422.115.4/bsd/netinet6/ |
H A D | in6_pcb.c | 1058 * Check if PCB exists hash list. Also returns uid and gid of socket 1063 uid_t *uid, gid_t *gid, struct ifnet *ifp) 1070 *uid = UID_MAX; 1099 *uid = kauth_cred_getuid( 1130 *uid = kauth_cred_getuid( 1145 *uid = kauth_cred_getuid( 1061 in6_pcblookup_hash_exists(struct inpcbinfo *pcbinfo, struct in6_addr *faddr, u_int fport_arg, struct in6_addr *laddr, u_int lport_arg, int wildcard, uid_t *uid, gid_t *gid, struct ifnet *ifp) argument
|
/xnu-2422.115.4/tools/tests/kqueue_tests/ |
H A D | kqueue_file_tests.c | 298 /* path, uid, gid */ 837 int uid = pwd->pw_uid; local 842 init_action(&test.t_prep_actions[1], NOSLEEP, CHOWN, 3, (void*)FILE1, (void*)uid, (void*)gid); 856 init_action(&test.t_prep_actions[1], NOSLEEP, CHOWN, 3, (void*)DIR1, (void*)uid, (void*)gid); 950 int uid = pwd->pw_uid; local 955 init_action(&test.t_prep_actions[1], NOSLEEP, CHOWN, 3, (void*)FILE1, (void*)uid, (void*)gid); 969 init_action(&test.t_prep_actions[1], NOSLEEP, CHOWN, 3, (void*)DIR1, (void*)uid, (void*)gid); 994 int uid = pwd->pw_uid; local 999 init_action(&(test.t_prep_actions[1]), NOSLEEP, CHOWN, 3, (void*)FILE1, (void*)uid, (void*)gid); 1012 init_action(&(test.t_prep_actions[1]), NOSLEEP, CHOWN, 3, (void*)DIR1, (void*) uid, (voi [all...] |