/freebsd-12-stable/sys/dev/iwm/ |
H A D | if_iwmreg.h | 5505 * @uid: scan id, &enum iwm_umac_scan_uid_offsets 5534 uint32_t uid; member in struct:iwm_scan_req_umac 5573 * @uid: scan id, &enum iwm_umac_scan_uid_offsets 5577 uint32_t uid; member in struct:iwm_umac_scan_abort 5583 * @uid: scan id, &enum iwm_umac_scan_uid_offsets 5592 uint32_t uid; member in struct:iwm_umac_scan_complete 5647 * @uid: scan id, &enum iwm_umac_scan_uid_offsets 5658 uint32_t uid; member in struct:iwm_umac_scan_iter_complete_notif
|
/freebsd-12-stable/sys/arm64/linux/ |
H A D | linux_systrace_args.c | 362 iarg[2] = p->uid; /* l_uid_t */ 372 iarg[1] = p->uid; /* int */ 1106 uarg[0] = p->uid; /* uid_t */ 1149 iarg[0] = p->uid; /* l_uid_t */
|
/freebsd-12-stable/usr.sbin/cron/lib/ |
H A D | entry.c | 355 Debug(DPARS, ("load_entry()...uid %d, gid %d\n",pw->pw_uid,pw->pw_gid)) 368 e->uid = pw->pw_uid;
|
/freebsd-12-stable/usr.sbin/usbconfig/ |
H A D | usbconfig.c | 50 uid_t uid; member in struct:options
|
/freebsd-12-stable/contrib/llvm-project/lldb/source/Plugins/Process/gdb-remote/ |
H A D | ProcessGDBRemote.cpp | 1223 Status ProcessGDBRemote::StopTrace(lldb::user_id_t uid, lldb::tid_t thread_id) { 1224 return m_gdb_comm.SendStopTracePacket(uid, thread_id); 1227 Status ProcessGDBRemote::GetData(lldb::user_id_t uid, lldb::tid_t thread_id, 1230 return m_gdb_comm.SendGetDataPacket(uid, thread_id, buffer, offset); 1233 Status ProcessGDBRemote::GetMetaData(lldb::user_id_t uid, lldb::tid_t thread_id, 1236 return m_gdb_comm.SendGetMetaDataPacket(uid, thread_id, buffer, offset); 1239 Status ProcessGDBRemote::GetTraceConfig(lldb::user_id_t uid, 1241 return m_gdb_comm.SendGetTraceConfigPacket(uid, options);
|
/freebsd-12-stable/contrib/llvm-project/compiler-rt/lib/dfsan/ |
H A D | dfsan_custom.cpp | 658 int __dfsw_getpwuid_r(id_t uid, struct passwd *pwd, argument 665 int ret = getpwuid_r(uid, pwd, buf, buflen, result);
|
/freebsd-12-stable/contrib/llvm-project/llvm/utils/TableGen/ |
H A D | CodeGenDAGPatterns.h | 1113 unsigned uid, unsigned setmode = 0) 1116 AddedComplexity(complexity), ID(uid), ForceMode(setmode) {}
|
/freebsd-12-stable/crypto/heimdal/lib/krb5/ |
H A D | acache.c | 172 _heim_krb5_ipc_client_set_target_uid(uid_t uid) argument 176 (*set_target_uid)(uid);
|
/freebsd-12-stable/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/ |
H A D | zfs_vnops.c | 1166 * user 0 is not an ephemeral uid. 1787 uid_t uid; local 1802 uid = ksid_getid(ksid); 1804 uid = crgetuid(cr); 1808 IS_EPHEMERAL(uid) || IS_EPHEMERAL(gid))) 2081 uid_t uid; local 2095 uid = ksid_getid(ksid); 2097 uid = crgetuid(cr); 2100 IS_EPHEMERAL(uid) || IS_EPHEMERAL(gid))) 2922 * Make sure that if we have ephemeral uid/gi [all...] |
/freebsd-12-stable/sys/fs/nfsclient/ |
H A D | nfs_clport.c | 1049 * Copy NFS uid, gids from the cred structure. 1129 * The uid and gid arguments are only used for NFSERR_BADOWNER and that 1134 nfscl_maperr(struct thread *td, int error, uid_t uid, gid_t gid) argument 1147 "No name and/or group mapping for uid,gid:(%d,%d)\n", 1148 uid, gid);
|
/freebsd-12-stable/sys/contrib/ipfilter/netinet/ |
H A D | ip_sync.c | 1267 ipf_sync_ioctl(softc, data, cmd, mode, uid, ctx) 1271 int mode, uid;
|
/freebsd-12-stable/usr.bin/top/ |
H A D | machine.c | 849 if (sel->uid[0] != -1 && !find_uid(pp->ki_ruid, sel->uid))
|
/freebsd-12-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | io.c | 2454 apr_uid_t uid; 2459 apr_err = apr_uid_current(&uid, &gid, pool); 2465 if (apr_uid_compare(uid, file_info->user) == APR_SUCCESS) 2488 apr_uid_t uid; 2493 apr_err = apr_uid_current(&uid, &gid, pool); 2499 if (apr_uid_compare(uid, file_info->user) == APR_SUCCESS) 2449 apr_uid_t uid; local 2483 apr_uid_t uid; local
|
/freebsd-12-stable/contrib/libarchive/libarchive/ |
H A D | archive_read_support_format_zip.c | 85 int64_t uid; member in struct:zip_entry 649 zip_entry->uid = 829 fprintf(stderr, "uid %d gid %d\n", 834 zip_entry->uid = archive_le16dec(p + offset); 847 /* get a uid size. */ 850 zip_entry->uid = 854 zip_entry->uid = 1227 archive_entry_set_uid(entry, zip_entry->uid);
|
H A D | archive_read_support_format_iso9660.c | 284 uid_t uid; member in struct:file_info 1278 archive_entry_set_uid(entry, file->uid); 2177 * 8 bytes for uid, 2189 file->uid
|
/freebsd-12-stable/sys/compat/freebsd32/ |
H A D | freebsd32_systrace_args.c | 119 iarg[1] = p->uid; /* int */ 157 uarg[0] = p->uid; /* uid_t */ 686 iarg[1] = p->uid; /* int */ 810 iarg[2] = p->uid; /* int */ 1258 iarg[1] = p->uid; /* int */ 2601 uarg[2] = p->uid; /* uid_t */
|
/freebsd-12-stable/sys/kern/ |
H A D | systrace_args.c | 116 iarg[1] = p->uid; /* int */ 154 uarg[0] = p->uid; /* uid_t */ 683 iarg[1] = p->uid; /* int */ 807 iarg[2] = p->uid; /* int */ 1294 iarg[1] = p->uid; /* int */ 2667 uarg[2] = p->uid; /* uid_t */
|
/freebsd-12-stable/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_common_interceptors.inc | 1911 INTERCEPTOR(__sanitizer_passwd *, getpwuid, u32 uid) { 1913 COMMON_INTERCEPTOR_ENTER(ctx, getpwuid, uid); 1914 __sanitizer_passwd *res = REAL(getpwuid)(uid); 1957 INTERCEPTOR(int, getpwuid_r, u32 uid, __sanitizer_passwd *pwd, char *buf, 1960 COMMON_INTERCEPTOR_ENTER(ctx, getpwuid_r, uid, pwd, buf, buflen, result); 1964 int res = REAL(getpwuid_r)(uid, pwd, buf, buflen, result); 6872 INTERCEPTOR(const char *, user_from_uid, u32 uid, int nouser) { 6875 COMMON_INTERCEPTOR_ENTER(ctx, user_from_uid, uid, nouser); 6876 user = REAL(user_from_uid)(uid, nouser); 6887 INTERCEPTOR(int, uid_from_user, const char *name, u32 *uid) { [all...] |
/freebsd-12-stable/contrib/sendmail/src/ |
H A D | queue.c | 477 syserr("!queueup: cannot create queue temp file %s, uid=%ld", 522 syserr("!queueup: cannot commit data file %s, uid=%ld", 564 syserr("!queueup: cannot create data temp file %s, uid=%ld", 599 syserr("!queueup: cannot save data temp file %s, uid=%ld", 911 syserr("cannot rename(%s, %s), uid=%ld", 998 ** The last control address and uid are saved. 1008 uid_t uid; local 1023 /* find the active uid */ 1028 uid = 0; 1034 uid [all...] |
/freebsd-12-stable/contrib/gcc/ |
H A D | tree-ssa-loop-ivopts.c | 4546 unsigned uid = use->id, cid; local 4549 cp = ivs->cand_for_use[uid]; 4555 ivs->cand_for_use[uid] = NULL; 4601 unsigned uid = use->id, cid; local 4603 if (ivs->cand_for_use[uid] == cp) 4606 if (ivs->cand_for_use[uid]) 4614 ivs->cand_for_use[uid] = cp;
|
/freebsd-12-stable/contrib/amd/libamu/ |
H A D | xdr_func.c | 1167 if (!xdr_am_uid3(xdrs, &objp->uid)) 1630 if (!xdr_am_uid3(xdrs, &objp->am_set_uid3_u.uid)) 1723 if (!xdr_am_set_uid3(xdrs, &objp->uid))
|
/freebsd-12-stable/sys/fs/unionfs/ |
H A D | union_vnops.c | 627 uid_t uid; /* upper side vnode's uid */ local 633 uid = va->va_uid; 638 if (cred->cr_uid == uid) { 776 UNIONFS_INTERNAL_DEBUG("unionfs_getattr: leave mode=%o, uid=%d, gid=%d (%d)\n", 798 UNIONFS_INTERNAL_DEBUG("unionfs_getattr: leave mode=%o, uid=%d, gid=%d (%d)\n",
|
/freebsd-12-stable/sys/security/mac_biba/ |
H A D | mac_biba.c | 1631 struct label *kslabel, uid_t uid, gid_t gid) 1781 struct label *shmlabel, uid_t uid, gid_t gid) 3411 struct label *vplabel, uid_t uid, gid_t gid) 1630 biba_posixsem_check_setowner(struct ucred *cred, struct ksem *ks, struct label *kslabel, uid_t uid, gid_t gid) argument 1780 biba_posixshm_check_setowner(struct ucred *cred, struct shmfd *shmfd, struct label *shmlabel, uid_t uid, gid_t gid) argument 3410 biba_vnode_check_setowner(struct ucred *cred, struct vnode *vp, struct label *vplabel, uid_t uid, gid_t gid) argument
|
/freebsd-12-stable/sys/security/mac_mls/ |
H A D | mac_mls.c | 1545 struct label *shmlabel, uid_t uid, gid_t gid) 1677 struct label *shmlabel, uid_t uid, gid_t gid) 3043 struct label *vplabel, uid_t uid, gid_t gid) 1544 mls_posixsem_check_setowner(struct ucred *cred, struct ksem *ks, struct label *shmlabel, uid_t uid, gid_t gid) argument 1676 mls_posixshm_check_setowner(struct ucred *cred, struct shmfd *shmfd, struct label *shmlabel, uid_t uid, gid_t gid) argument 3042 mls_vnode_check_setowner(struct ucred *cred, struct vnode *vp, struct label *vplabel, uid_t uid, gid_t gid) argument
|
/freebsd-12-stable/crypto/openssh/ |
H A D | session.c | 200 /* Temporarily drop privileged uid for mkdir/bind. */ 222 /* Restore the privileged uid. */ 946 read_etc_default_login(char ***env, u_int *envsize, uid_t uid) argument 963 if (uid == 0) 1350 safely_chroot(const char *path, uid_t uid) argument 1400 /* Set login name, uid, gid, and groups. */ 1472 /* Permanently switch to the desired uid. */ 1576 * Login(1) does this as well, and it needs uid 0 for the "-h"
|