/third_party/pulseaudio/src/pulsecore/ |
H A D | iochannel.c | 342 u->uid = ucred->uid; in pa_iochannel_write_with_creds() 345 u->uid = getuid(); in pa_iochannel_write_with_creds() 462 ancil_data->creds.uid = u.cmcred_uid; in pa_iochannel_read_with_ancil_data() 465 ancil_data->creds.uid = u.uid; in pa_iochannel_read_with_ancil_data()
|
/third_party/toybox/toys/pending/ |
H A D | tcpsvd.c | 189 // Grab uid and gid 190 static void get_uidgid(uid_t *uid, gid_t *gid, char *ug) in get_uidgid() argument 207 *uid = pass->pw_uid; in get_uidgid() 266 uid_t uid = 0; in tcpsvd_main() local 288 get_uidgid(&uid, &gid, TT.user); in tcpsvd_main() 289 setuid(uid); in tcpsvd_main() 297 xprintf("%s: listening on %s, starting, uid %u, gid %u\n" in tcpsvd_main() 298 ,toys.which->name, server, uid, gid); in tcpsvd_main()
|
/kernel/linux/linux-5.10/fs/cifs/ |
H A D | cifsacl.c | 57 /* S-1-5-88-1 Unix uid */ 266 return true; /* well known sid found, uid returned */ in is_well_known_sid() 386 kuid_t uid; in sid_to_id() local 390 uid = make_kuid(&init_user_ns, id); in sid_to_id() 391 if (uid_valid(uid)) { in sid_to_id() 392 fuid = uid; in sid_to_id() 396 /* If unable to find uid/gid easily from SID try via upcall */ in sid_to_id() 428 kuid_t uid; in sid_to_id() local 431 uid = make_kuid(&init_user_ns, id); in sid_to_id() 432 if (uid_valid(uid)) in sid_to_id() 1002 build_sec_desc(struct cifs_ntsd *pntsd, struct cifs_ntsd *pnntsd, __u32 secdesclen, __u64 nmode, kuid_t uid, kgid_t gid, bool mode_from_sid, bool id_from_sid, int *aclflag) build_sec_desc() argument 1285 id_mode_to_cifs_acl(struct inode *inode, const char *path, __u64 nmode, kuid_t uid, kgid_t gid) id_mode_to_cifs_acl() argument [all...] |
/kernel/linux/linux-5.10/fs/orangefs/ |
H A D | inode.c | 81 kuid_t uid; member 121 wr.uid = ow->uid; in orangefs_writepages_work() 176 ow->uid = wr->uid; in orangefs_writepages_callback() 182 if (!uid_eq(ow->uid, wr->uid) || !gid_eq(ow->gid, wr->gid)) { in orangefs_writepages_callback() 388 uid_eq(wr->uid, current_fsuid()) && in orangefs_write_begin() 405 wr->uid = current_fsuid(); in orangefs_write_begin() 472 wr->uid in orangefs_invalidatepage() [all...] |
/kernel/linux/linux-6.6/fs/orangefs/ |
H A D | inode.c | 80 kuid_t uid; member 116 wr.uid = ow->uid; in orangefs_writepages_work() 170 ow->uid = wr->uid; in orangefs_writepages_callback() 176 if (!uid_eq(ow->uid, wr->uid) || !gid_eq(ow->gid, wr->gid)) { in orangefs_writepages_callback() 350 uid_eq(wr->uid, current_fsuid()) && in orangefs_write_begin() 367 wr->uid = current_fsuid(); in orangefs_write_begin() 432 wr->uid in orangefs_invalidate_folio() [all...] |
/third_party/toybox/toys/posix/ |
H A D | tar.c | 42 --numeric-owner Save/use/display uid and gid, not user/group name 73 uid_t uid; 82 char name[100], mode[8], uid[8], gid[8],size[12], mtime[12], chksum[8], member 123 ITOO(tmp.uid, 0); in write_longname() 229 ITOO(hdr.uid, st->st_uid); in add_to_tar() 507 int u = TT.hdr.uid, g = TT.hdr.gid; in extract_to_disk() 509 if (TT.owner) TT.hdr.uid = TT.ouid; in extract_to_disk() 512 if (pw && (TT.owner || !FLAG(numeric_owner))) TT.hdr.uid = pw->pw_uid; in extract_to_disk() 649 TT.hdr.uid = OTOI(tar.uid); in unpack_tar() [all...] |
/kernel/linux/linux-5.10/arch/arm64/kernel/ |
H A D | acpi_numa.c | 37 static inline int get_cpu_for_acpi_id(u32 uid) in get_cpu_for_acpi_id() argument 42 if (uid == get_acpi_id_for_cpu(cpu)) in get_cpu_for_acpi_id()
|
/kernel/linux/linux-6.6/arch/arm64/kernel/ |
H A D | acpi_numa.c | 37 static inline int get_cpu_for_acpi_id(u32 uid) in get_cpu_for_acpi_id() argument 42 if (uid == get_acpi_id_for_cpu(cpu)) in get_cpu_for_acpi_id()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/mellanox/mlx5/core/sf/ |
H A D | mlx5_ifc_vhca_event.h | 39 u8 uid[0x10]; member 68 u8 uid[0x10]; member
|
/kernel/linux/linux-6.6/fs/smb/server/mgmt/ |
H A D | user_config.c | 41 user->uid = resp->uid; in ksmbd_alloc_user()
|
/third_party/mesa3d/src/glx/apple/ |
H A D | appledri.h | 98 unsigned uid, int kind)); 104 unsigned int *uid);
|
/third_party/node/test/async-hooks/ |
H A D | test-immediate.js | 19 assert.strictEqual(typeof imd1.uid, 'number'); 38 assert.strictEqual(typeof imd2.uid, 'number');
|
/kernel/linux/linux-5.10/security/integrity/ima/ |
H A D | ima_policy.c | 76 kuid_t uid; member 93 * written in terms of .action, .func, .mask, .fsmagic, .uid, and .fowner 126 .uid = GLOBAL_ROOT_UID, .uid_op = &uid_eq, 138 .uid = GLOBAL_ROOT_UID, .uid_op = &uid_eq, 141 .uid = GLOBAL_ROOT_UID, .uid_op = &uid_eq, 465 if ((rule->flags & IMA_UID) && !rule->uid_op(cred->uid, rule->uid)) in ima_match_keyring() 528 if ((rule->flags & IMA_UID) && !rule->uid_op(cred->uid, rule->uid)) in ima_match_rules() 532 if (!rule->uid_op(cred->euid, rule->uid) in ima_match_rules() [all...] |
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | ima_policy.c | 106 kuid_t uid; member 137 * written in terms of .action, .func, .mask, .fsmagic, .uid, .gid, 171 .uid = GLOBAL_ROOT_UID, .uid_op = &uid_eq, 183 .uid = GLOBAL_ROOT_UID, .uid_op = &uid_eq, 186 .uid = GLOBAL_ROOT_UID, .uid_op = &uid_eq, 519 if ((rule->flags & IMA_UID) && !rule->uid_op(cred->uid, rule->uid)) in ima_match_rule_data() 604 if ((rule->flags & IMA_UID) && !rule->uid_op(cred->uid, rule->uid)) in ima_match_rules() 608 if (!rule->uid_op(cred->euid, rule->uid) in ima_match_rules() [all...] |
/kernel/liteos_a/kernel/base/vm/ |
H A D | shm.c | 259 seg->ds.shm_perm.uid = LOS_GetUserID(); in ShmAllocSeg() 427 INT32 uid = LOS_GetUserID(); in ShmPermCheck() local 432 if ((uid == seg->ds.shm_perm.uid) || (uid == seg->ds.shm_perm.cuid)) { in ShmPermCheck() 686 seg->ds.shm_perm.uid = shm_perm.uid; in ShmCtl() 692 if (OsProcessIDUserCheckInvalid(shm_perm.uid)) { in ShmCtl() 695 (VOID)memcpy_s(seg->ownerName, OS_PCB_NAME_LEN, OS_PCB_FROM_PID(shm_perm.uid)->processName, in ShmCtl()
|
/third_party/mksh/ |
H A D | check.pl | 1074 local($type, $perm, $uid, $gid, $matchType, 1077 # format is: type perm uid gid matchType "name" 1083 ($type, $perm, $uid, $gid, $matchType, $rest) 1095 if ($uid !~ /^\d+$/ && $uid ne '*') { 1097 "$prog:$file:$.: bad user-id for file-result: $uid\n"; 1281 local($type, $perm, $uid, $gid, $rest, $c, $len, $name); 1288 ($type, $perm, $uid, $gid, $matchType, $rest) = 1306 if ($uid ne '*' && $stbuf[4] != $uid) { [all...] |
/kernel/linux/linux-5.10/arch/x86/kernel/ |
H A D | sys_ia32.c | 134 typeof(ubuf->st_uid) uid = 0; in cp_stat64() 136 SET_UID(uid, from_kuid_munged(current_user_ns(), stat->uid)); in cp_stat64() 145 unsafe_put_user(uid, &ubuf->st_uid, Efault); in cp_stat64()
|
/kernel/linux/linux-5.10/drivers/pinctrl/intel/ |
H A D | pinctrl-geminilake.c | 180 .uid = "1", 313 .uid = "2", 352 .uid = "3", 434 .uid = "4",
|
/kernel/linux/linux-5.10/samples/bpf/ |
H A D | cookie_uid_helper_example.c | 13 * cookie: 877, uid: 0x3e8, Pakcet Count: 20, Bytes Count: 11058 14 * cookie: 132, uid: 0x0, Pakcet Count: 2, Bytes Count: 286 15 * cookie: 812, uid: 0x3e8, Pakcet Count: 3, Bytes Count: 1726 16 * cookie: 802, uid: 0x3e8, Pakcet Count: 2, Bytes Count: 104 17 * cookie: 877, uid: 0x3e8, Pakcet Count: 20, Bytes Count: 11058 18 * cookie: 831, uid: 0x3e8, Pakcet Count: 2, Bytes Count: 104 19 * cookie: 0, uid: 0x0, Pakcet Count: 6, Bytes Count: 712 20 * cookie: 880, uid: 0xfffe, Pakcet Count: 1, Bytes Count: 70 59 uint32_t uid; member 119 -32 + (__s16)offsetof(struct stats, uid)), in prog_load() [all...] |
/kernel/linux/linux-6.6/drivers/acpi/ |
H A D | processor_core.c | 57 if (device_declaration && (apic->uid == acpi_id)) { in map_x2apic_id() 75 if ((entry->length < 16) || (lsapic->uid != acpi_id)) in map_lsapic_id() 101 if (device_declaration && (gicc->uid == acpi_id)) { in map_gicc_mpidr() 127 if (device_declaration && rintc->uid == acpi_id) { in map_rintc_hartid()
|
/kernel/linux/linux-6.6/fs/nfs_common/ |
H A D | nfsacl.c | 39 kuid_t uid; member 61 *p++ = htonl(from_kuid(&init_user_ns, nfsacl_desc->uid)); in xdr_nfsace_encode() 104 .uid = inode->i_uid, in nfsacl_encode() 166 .uid = inode->i_uid, in nfs_stream_encode_acl()
|
/kernel/linux/linux-6.6/drivers/pinctrl/intel/ |
H A D | pinctrl-geminilake.c | 171 .uid = "1", 304 .uid = "2", 343 .uid = "3", 425 .uid = "4",
|
/kernel/linux/linux-6.6/arch/x86/kernel/ |
H A D | sys_ia32.c | 134 typeof(ubuf->st_uid) uid = 0; in cp_stat64() 136 SET_UID(uid, from_kuid_munged(current_user_ns(), stat->uid)); in cp_stat64() 145 unsafe_put_user(uid, &ubuf->st_uid, Efault); in cp_stat64()
|
/kernel/linux/linux-6.6/samples/bpf/ |
H A D | cookie_uid_helper_example.c | 13 * cookie: 877, uid: 0x3e8, Pakcet Count: 20, Bytes Count: 11058 14 * cookie: 132, uid: 0x0, Pakcet Count: 2, Bytes Count: 286 15 * cookie: 812, uid: 0x3e8, Pakcet Count: 3, Bytes Count: 1726 16 * cookie: 802, uid: 0x3e8, Pakcet Count: 2, Bytes Count: 104 17 * cookie: 877, uid: 0x3e8, Pakcet Count: 20, Bytes Count: 11058 18 * cookie: 831, uid: 0x3e8, Pakcet Count: 2, Bytes Count: 104 19 * cookie: 0, uid: 0x0, Pakcet Count: 6, Bytes Count: 712 20 * cookie: 880, uid: 0xfffe, Pakcet Count: 1, Bytes Count: 70 59 uint32_t uid; member 119 -32 + (__s16)offsetof(struct stats, uid)), in prog_load() [all...] |
/kernel/linux/linux-6.6/tools/crypto/ccp/ |
H A D | test_dbc.py | 37 self.uid = b"1111111111111111" 90 # 0x2 (set uid), and invalid data 99 # 0x2 as RW (set uid), and invalid data 146 """set uid""" 148 set_uid(self.d, self.uid, self.signature) 173 set_uid(self.d, self.uid, self.signature) 216 set_uid(self.d, self.uid, self.signature)
|