/haiku/src/system/kernel/device_manager/ |
H A D | devfs.cpp | 96 uid_t uid; member in struct:__anon34::devfs_vnode 275 vnode->uid = geteuid(); 1833 stat->st_uid = vnode->uid; 1889 vnode->uid = stat->st_uid;
|
/haiku/src/bin/bfs_tools/lib/ |
H A D | Inode.cpp | 538 node->SetOwner(fInode->uid);
|
/haiku/src/add-ons/kernel/file_systems/bfs/ |
H A D | kernel_interface.cpp | 882 uid_t uid = geteuid(); local 884 bool isOwnerOrRoot = uid == 0 || uid == (uid_t)node.UserID(); 926 if (uid != 0) 928 node.uid = HOST_ENDIAN_TO_BFS_INT32(stat->st_uid);
|
/haiku/src/system/kernel/ |
H A D | team.cpp | 2703 info->uid = team->effective_uid; 2807 uid_t uid = geteuid(); local 2808 if (uid != 0 && uid != team->effective_uid) 4523 || info.AddInt32("uid", teamClone.real_uid) != B_OK
|
/haiku/src/kits/tracker/infowindow/ |
H A D | FilePermissionsView.cpp | 286 // ownership, i.e. disable text controls if uid:s doesn't match: 292 if (teamInfo.uid != 0 && nodeOwner != teamInfo.uid) {
|
/haiku/src/add-ons/kernel/file_systems/userlandfs/server/fuse/ |
H A D | FUSEFileSystem.cpp | 204 fuseContext->uid = request->user;
|
H A D | fuse_fs.cpp | 215 fuse_fs_chown(struct fuse_fs* fs, const char* path, uid_t uid, gid_t gid) argument 219 return fs->ops.chown(path, uid, gid);
|
/haiku/src/add-ons/mail_daemon/inbound_protocols/imap/ |
H A D | IMAPProtocol.cpp | 175 IMAPProtocol::UpdateMessageFlags(IMAPFolder& folder, uint32 uid, uint32 flags) argument 184 return worker->EnqueueUpdateFlags(folder, uid, flags); 244 uint32 uid; 245 status_t status = folder->GetMessageUID(ref, uid); 254 return worker->EnqueueFetchBody(*folder, uid, replyTo);
|
/haiku/src/add-ons/kernel/file_systems/nfs/ |
H A D | nfs_add_on.h | 33 uid_t uid; member in struct:mount_nfs_params
|
H A D | nfs_add_on.c | 279 XDROutPacketAddInt32(&rpc_call, ns->params.uid); 1137 // sprintf(buf, "nfs:%s:%s,uid=%u,gid=%u,hostname=%s", 1197 p = strstr(str, "uid="); 1198 dprintf("nfs:uid!\n"); 1202 params->uid = v; 1211 dprintf("nfs: ip:%08x server:'%s' export:'%s' hostname:'%s' uid=%d gid=%d \n", 1213 params->hostname, params->uid, params->gid);
|
/haiku/src/build/libroot/ |
H A D | fs.cpp | 1343 uid_t uid = (flag & AT_EACCESS) != 0 ? geteuid() : getuid(); local 1347 if (uid == 0) { 1354 } else if (st.st_uid == uid) {
|
/haiku/src/add-ons/kernel/drivers/wmi/ |
H A D | WMIAsus.cpp | 75 const char* uid = wmi->get_uid(wmi_cookie); local 76 if (uid != NULL && strcmp(uid, ACPI_ASUS_UID_ASUSWMI) == 0) 78 TRACE("WMIAsus using _UID %s\n", uid);
|
/haiku/headers/posix/ |
H A D | unistd.h | 454 extern int setuid(uid_t uid); 456 extern int seteuid(uid_t uid);
|
/haiku/src/add-ons/kernel/file_systems/ramfs/ |
H A D | Node.cpp | 160 // get the permissions for this uid/gid 162 uid_t uid = geteuid(); local 164 if (uid == 0) { 170 } else if (uid == fUID)
|
/haiku/headers/private/userlandfs/fuse/ |
H A D | fuse.h | 599 * The uid, gid and pid fields are not filled in case of a writepage 607 uid_t uid; member in struct:fuse_context 863 int fuse_fs_chown(struct fuse_fs *fs, const char *path, uid_t uid, gid_t gid);
|
H A D | fuse_lowlevel.h | 112 * Note that the reported client uid, gid and pid may be zero in some 115 * there is no valid uid/pid/gid that could be reported. 119 uid_t uid; member in struct:fuse_ctx
|
/haiku/src/add-ons/kernel/file_systems/ext2/ |
H A D | ext2.h | 440 uint16 uid; member in struct:ext2_inode 586 return B_LENDIAN_TO_HOST_INT16(uid) 651 uid = B_HOST_TO_LENDIAN_INT16(newUID & 0xFFFF);
|
/haiku/src/add-ons/kernel/drivers/network/wlan/idualwifi7260/dev/pci/ |
H A D | if_iwmreg.h | 5829 * @uid: scan id, &enum iwl_umac_scan_uid_offsets 5858 uint32_t uid; member in struct:iwm_scan_req_umac 5941 * @uid: scan id, &enum iwm_umac_scan_uid_offsets 5945 uint32_t uid; member in struct:iwm_umac_scan_abort 5951 * @uid: scan id, &enum iwm_umac_scan_uid_offsets 5960 uint32_t uid; member in struct:iwm_umac_scan_complete 6015 * @uid: scan id, &enum iwm_umac_scan_uid_offsets 6026 uint32_t uid; member in struct:iwm_umac_scan_iter_complete_notif
|
/haiku/src/system/kernel/posix/ |
H A D | realtime_sem.cpp | 112 uid_t uid = geteuid(); 113 if (uid == 0 || (uid == fUID && (fPermissions & S_IWUSR) != 0))
|
/haiku/src/servers/registrar/ |
H A D | AuthenticationManager.cpp | 128 User(const char* name, const char* password, uid_t uid, gid_t gid, argument 131 fUID(uid), 189 if (message.FindInt32("uid", &intValue) == B_OK) 273 if ((error = message.AddInt32("uid", fUID)) != B_OK 502 User* UserByID(uid_t uid) const 504 map<uid_t, User*>::const_iterator it = fUsersByID.find(uid); 904 int32 uid; local 908 if (message.FindInt32("uid", &uid) == B_OK) { 909 user = fUserDB->UserByID(uid); 1008 int32 uid; local 1080 int32 uid; local 1254 uid_t uid; local [all...] |
/haiku/src/tests/system/kernel/file_corruption/fs/ |
H A D | checksumfs.cpp | 391 // get the permissions for this uid/gid 393 uid_t uid = geteuid(); local 395 if (uid == 0) { 401 } else if (uid == node->UID()) { 1445 uid_t uid = geteuid(); 1446 bool isOwnerOrRoot = uid == 0 || uid == node->UID(); 1465 if (uid != 0)
|
/haiku/src/add-ons/kernel/file_systems/ntfs/ |
H A D | lowntfs.c | 83 scx->uid = 0; 308 stbuf->st_uid = ctx->uid; 680 security.uid, gid, 684 security.uid, gid, 743 security.uid, gid, 749 security.uid, gid,
|
H A D | ntfs.h | 52 uid_t uid; member in struct:vnode
|
/haiku/src/add-ons/kernel/file_systems/ntfs/libntfs/ |
H A D | security.c | 1141 static BOOL staticgroupmember(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid) argument 1149 if (uid) { 1151 while (user && ((uid_t)user->xid != uid)) 1174 static BOOL groupmember(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid) argument 1200 ismember = staticgroupmember(scx, uid, gid); 1240 static BOOL groupmember(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid) argument 1268 static BOOL groupmember(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid) argument 1284 ismember = staticgroupmember(scx, uid, gid); 1398 * - from uid, gid and perm to securid (CACHED_SECURID) 1399 * - from a securid to uid, gi 1587 enter_cache(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, struct POSIX_SECURITY *pxdesc) argument 1942 access_check_posix(struct SECURITY_CONTEXT *scx, struct POSIX_SECURITY *pxdesc, mode_t request, uid_t uid, gid_t gid) argument 2090 uid_t uid; local 2192 uid_t uid; local 2324 uid_t uid; local 2578 uid_t uid; local 2661 ntfs_alloc_securid(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid, ntfs_inode *dir_ni, mode_t mode, BOOL isdir) argument 2743 ntfs_set_inherited_posix(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, ntfs_inode *dir_ni, mode_t mode) argument 2806 ntfs_alloc_securid(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid, mode_t mode, BOOL isdir) argument 2884 ntfs_set_owner_mode(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, mode_t mode, struct POSIX_SECURITY *pxdesc) argument 3027 uid_t uid; local 3098 uid_t uid; local 3274 uid_t uid; local 3642 ntfs_set_owner(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid) argument 3766 ntfs_set_ownmod(struct SECURITY_CONTEXT *scx, ntfs_inode *ni, uid_t uid, gid_t gid, const mode_t mode) argument 4183 ntfs_do_default_mapping(struct SECURITY_CONTEXT *scx, uid_t uid, gid_t gid, const SID *usid) argument 5240 ntfs_get_usid(struct SECURITY_API *scapi, uid_t uid, char *buf) argument 5293 int uid; local [all...] |
H A D | acls.c | 339 * and <= 0x7fffffff, so that 30 bits from a uid and 30 more bits 356 * Compute the uid or gid associated to a SID 366 u32 xid; /* uid or gid */ 417 uid_t uid, SID *defusid) 425 if (!uid) 429 while (p && p->xid && ((uid_t)p->xid != uid)) 441 uauth = le32_to_cpu(leauth) + 2*(uid & 0x3fffffff); 443 if (uid & 0xc0000000) { 445 uauth = le32_to_cpu(leauth) + ((uid >> 30) & 3); 506 uid_t uid; local 416 ntfs_find_usid(const struct MAPPING* usermapping, uid_t uid, SID *defusid) argument 3699 uid_t uid; local 4376 int uid; local [all...] |