Searched refs:uid (Results 451 - 475 of 685) sorted by relevance

<<11121314151617181920>>

/freebsd-12-stable/contrib/llvm-project/lldb/include/lldb/Symbol/
H A DSymtab.h51 Symbol *FindSymbolByID(lldb::user_id_t uid) const;
/freebsd-12-stable/contrib/llvm-project/lldb/include/lldb/Target/
H A DTarget.h1171 StopHook(lldb::TargetSP target_sp, lldb::user_id_t uid);
1192 bool RemoveStopHookByID(lldb::user_id_t uid);
1196 StopHookSP GetStopHookByID(lldb::user_id_t uid);
1198 bool SetStopHookActiveStateByID(lldb::user_id_t uid, bool active_state);
/freebsd-12-stable/contrib/llvm-project/lldb/source/Plugins/Platform/gdb-server/
H A DPlatformRemoteGDBServer.cpp342 PlatformRemoteGDBServer::DoGetUserName(UserIDResolver::id_t uid) { argument
344 if (m_gdb_client.GetUserName(uid, name))
661 uint32_t uid, uint32_t gid) {
662 return Platform::PutFile(source, destination, uid, gid);
659 PutFile(const FileSpec &source, const FileSpec &destination, uint32_t uid, uint32_t gid) argument
/freebsd-12-stable/contrib/llvm-project/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_platform_limits_openbsd.h93 u32 uid; member in struct:__sanitizer::__sanitizer_ipc_perm
H A Dsanitizer_platform_limits_solaris.h61 unsigned int uid; // uid_t member in struct:__sanitizer::__sanitizer_ipc_perm
/freebsd-12-stable/crypto/heimdal/appl/rsh/
H A Drsh.c849 uid_t uid; local
854 uid = getuid ();
855 if (setuid (uid) || (uid != 0 && setuid(0) == 0))
/freebsd-12-stable/contrib/ntp/ntpd/
H A Dntpd.c840 uid_t uid; local
929 uid = getuid();
930 if (uid && !HAVE_OPT( SAVECONFIGQUIT )
938 "must be run as root, not uid %ld", (long)uid);
1277 * following interface changes, we must either run as uid 0 or
1287 * is associated with running with uid 0 - should be refined on
1288 * ports that allow binding to NTP_PORT with uid != 0
1301 * We may be running under non-root uid now, but we still hold full root privileges!
/freebsd-12-stable/contrib/openbsm/libauditd/
H A Dauditd_lib.c1005 * audited. We allow the uid, tid, and mask fields to be implicitly
1026 * audited. We allow the uid, tid, and mask fields to be implicitly
1053 uid_t uid; local
1075 uid = getuid(); pid = getpid();
1076 if ((tok = au_to_subject32_ex(uid, geteuid(), getegid(), uid, getgid(),
/freebsd-12-stable/contrib/opie/
H A Dopielogin.c467 "ruserok failed, host=%s, uid=%d, remote username=%s, local username=%s",
661 int uid; local
1079 uid = getuid();
1081 if (uid != 0 && uid != thisuser.pw_uid)
/freebsd-12-stable/contrib/sendmail/contrib/
H A Dbuildvirtuser121 chown($st->uid, $st->gid, $new) || warn "Could not chmod($st->uid, $st->gid, $new): $!\n";
/freebsd-12-stable/contrib/sendmail/mail.local/
H A Dmail.local.c210 uid_t uid; local
401 ** uid matches, otherwise, use the name from the password file
402 ** corresponding to the uid.
405 uid = getuid();
408 pw->pw_uid != uid))
409 from = (pw = getpwuid(uid)) != NULL ? pw->pw_name : "???";
/freebsd-12-stable/contrib/gcc/
H A Dresource.c46 int uid; /* INSN_UID of target. */ member in struct:target_info
929 if (tinfo->uid == INSN_UID (target))
960 tinfo->uid = INSN_UID (target);
1287 if (tinfo->uid == INSN_UID (insn))
/freebsd-12-stable/contrib/elftoolchain/ar/
H A Dwrite.c143 obj->uid = 0;
148 obj->uid = sb.st_uid;
340 obj->uid = archive_entry_uid(entry);
792 archive_entry_set_uid(entry, obj->uid);
/freebsd-12-stable/contrib/elftoolchain/elfcopy/
H A Delfcopy.h167 uid_t uid; /* user id */ member in struct:ar_obj
/freebsd-12-stable/sys/cddl/dev/dtrace/
H A Ddtrace_ioctl.c655 uid_t uid = 0; local
683 dtrace_cred2priv(td->td_ucred, &priv, &uid, &zoneid);
691 priv, uid, zoneid)) != 0)
703 dtrace_match_priv(probe, priv, uid, zoneid))
/freebsd-12-stable/sys/dev/drm/
H A Ddrm_sysctl.c305 "\na dev pid uid magic ioctls\n");
312 priv->uid,
/freebsd-12-stable/sys/fs/tmpfs/
H A Dtmpfs.h414 uid_t uid, gid_t gid, mode_t mode, struct tmpfs_node *,
/freebsd-12-stable/sys/fs/udf/
H A Decma167-udf.h334 uint32_t uid; member in struct:file_entry
/freebsd-12-stable/sys/security/mac_bsdextended/
H A Dugidfw_vnode.c262 struct label *vplabel, uid_t uid, gid_t gid)
261 ugidfw_vnode_check_setowner(struct ucred *cred, struct vnode *vp, struct label *vplabel, uid_t uid, gid_t gid) argument
/freebsd-12-stable/tests/sys/fs/fusefs/
H A Daccess.cc288 out.body.attr.attr.uid = 0;
H A Dmockfs.hh95 uint32_t uid; member in struct:fuse_attr_7_8
/freebsd-12-stable/lib/libpfctl/
H A Dlibpfctl.h106 struct pf_rule_uid uid; member in struct:pfctl_rule
/freebsd-12-stable/crypto/openssh/openbsd-compat/
H A Dport-aix.c303 sys_auth_get_lastlogin_msg(const char *user, uid_t uid) argument
/freebsd-12-stable/sbin/fsdb/
H A Dfsdb.c1072 unsigned long uid; local
1079 uid = strtoul(argv[1], &cp, 0);
1083 uid = pwd->pw_uid;
1085 warnx("bad uid `%s'", argv[1]);
1090 DIP_SET(curinode, di_uid, uid);
/freebsd-12-stable/tools/tools/syscall_timing/
H A Dsyscall_timing.c662 uid_t uid; local
665 uid = getuid();
666 if (setuid(uid) < 0)
670 if (setuid(uid) < 0)

Completed in 203 milliseconds

<<11121314151617181920>>