| /xnu-10002.41.9/tools/tests/personas/ |
| H A D | persona_test_run_src.sh | 198 local uid=${3:--1} 228 if [ $uid -ge 0 ]; then 229 if [ $uid -ne ${l[0]} ]; then 230 bail "Child[$cpid] UID:${l[0]} != specified UID:$uid" $line 253 local uid=$2 261 local file="child.${pna_id}.u$uid" 262 local spawn_args="-I $pna_id -u $uid" 280 if [ $uid -lt 0 ]; then 281 uid=$_UID 284 validate_child_info "${TMPDIR}/$file" "$pna_id" "$uid" "$gid" "$groups" $line [all …]
|
| H A D | persona_mgr.c | 88 persona_op_lookup(struct kpersona_info *ki, pid_t pid, uid_t uid) in persona_op_lookup() argument 92 info("Looking up persona (login:%s, pid:%d, uid:%d)", ki->persona_name, pid, uid); in persona_op_lookup() 110 np = kpersona_find(name, uid, personas, &npersonas); in persona_op_lookup() 192 uid_t uid = (uid_t)-1; in main() local 272 uid = (uid_t)ret; in main() 309 if (uid == (uid_t)-1 && persona_op != PERSONA_OP_LOOKUP) { in main() 310 uid = kinfo.persona_id; in main() 338 ret = persona_op_lookup(&kinfo, pid, uid); in main()
|
| /xnu-10002.41.9/bsd/kern/ |
| H A D | sysv_ipc.c | 103 uid_t uid = kauth_cred_getuid(cred); /* avoid multiple calls */ in ipcperm() local 116 if (uid == perm->cuid || uid == perm->uid) { in ipcperm()
|
| H A D | kern_persona.c | 93 persona_alloc(uid_t id, const char *login, persona_type_t type, char *path, uid_t uid, int *error) in persona_alloc() argument 134 persona->pna_uid = uid; in persona_alloc() 437 persona_find(const char *login, uid_t uid, in persona_find() argument 440 return persona_find_all(login, uid, PERSONA_INVALID, persona, plen); in persona_find() 444 persona_find_all(const char *login, uid_t uid, persona_type_t persona_type, in persona_find_all() argument 454 if (uid != PERSONA_ID_NONE) { in persona_find_all() 468 match, login, uid); in persona_find_all() 477 if (uid != PERSONA_ID_NONE && uid == tmp->pna_id) { in persona_find_all() 849 uid_t uid = KAUTH_UID_NONE; in persona_get_uid() local 857 uid = persona->pna_uid; in persona_get_uid() [all …]
|
| H A D | kern_prot.c | 708 want_uid = uap->uid; in setuid() 709 AUDIT_ARG(uid, want_uid); in setuid() 1167 kern_settid(proc_t p, uid_t uid, gid_t gid) in kern_settid() argument 1174 if ((error = mac_proc_check_settid(p, uid, gid)) != 0) { in kern_settid() 1183 if (uid == KAUTH_UID_NONE) { in kern_settid() 1209 return kauth_cred_model_setuidgid(model, uid, gid); in kern_settid() 1228 AUDIT_ARG(uid, uap->uid); in sys_settid() 1231 return kern_settid(p, uap->uid, uap->gid); in sys_settid() 1248 uid_t uid; in sys_settid_with_pid() local 1280 uid = posix_cred_get(target_cred)->cr_uid; in sys_settid_with_pid() [all …]
|
| H A D | kern_xxx.c | 101 extern int pshm_cache_purge_uid(uid_t uid); 263 usrctl_logout(uid_t uid) in usrctl_logout() argument 265 int shm_error = pshm_cache_purge_uid(uid); in usrctl_logout()
|
| H A D | kern_credential.c | 202 static struct kauth_identity *kauth_identity_alloc(uid_t uid, gid_t gid, guid_t *guidp, time_t guid… 211 static int kauth_identity_find_uid(uid_t uid, struct kauth_identity *kir, char *getname); 1070 kauth_identity_alloc(uid_t uid, gid_t gid, guid_t *guidp, time_t guid_expiry, in kauth_identity_alloc() argument 1082 if (uid != KAUTH_UID_NONE) { in kauth_identity_alloc() 1086 kip->ki_uid = uid; in kauth_identity_alloc() 1562 kauth_identity_find_uid(uid_t uid, struct kauth_identity *kir, char *getname) in kauth_identity_find_uid() argument 1568 if ((kip->ki_valid & KI_VALID_UID) && (uid == kip->ki_uid)) { in kauth_identity_find_uid() 1978 id_t uid = htonl(*(id_t *)src); in kauth_cred_cache_lookup() local 1983 memcpy(&uu[COMPAT_PREFIX_LEN], &uid, sizeof(uid)); in kauth_cred_cache_lookup() 2004 id_t uid; in kauth_cred_cache_lookup() local [all …]
|
| H A D | kern_fork.c | 230 uid_t uid; in fork1() local 243 uid = kauth_getruid(); in fork1() 245 if ((nprocs >= maxproc - 1 && uid != 0) || nprocs >= maxproc) { in fork1() 266 count = chgproccnt(uid, 1); in fork1() 268 if (uid != 0 && in fork1() 277 …c("The per-user process limit has been hit; parent pid=%d, uid=%d", proc_getpid(parent_proc), uid); in fork1() 394 (void)chgproccnt(uid, -1); in fork1()
|
| /xnu-10002.41.9/osfmk/gssd/ |
| H A D | gssd_mach.defs | 61 in uid : uint32_t; 85 out uid : uint32_t; 96 in uid : uint32_t; 107 in uid : uint32_t; 135 out uid : uint32_t; 147 in uid : uint32_t; 188 in uid : uint32_t;
|
| /xnu-10002.41.9/bsd/miscfs/devfs/ |
| H A D | devfs.h | 92 void * devfs_make_node_clone(dev_t dev, int chrblk, uid_t uid, gid_t gid, 111 void * devfs_make_node(dev_t dev, int chrblk, uid_t uid, gid_t gid,
|
| H A D | devfs_tree.c | 1491 devfs_make_node_clone(dev_t dev, int chrblk, uid_t uid, in devfs_make_node_clone() argument 1511 new_dev = devfs_make_node_internal(dev, type, uid, gid, perms, clone, fmt, ap); in devfs_make_node_clone() 1534 devfs_make_node(dev_t dev, int chrblk, uid_t uid, in devfs_make_node() argument 1548 new_dev = devfs_make_node_internal(dev, type, uid, gid, perms, NULL, fmt, ap); in devfs_make_node() 1557 devfs_make_node_internal(dev_t dev, devfstype_t type, uid_t uid, in devfs_make_node_internal() argument 1632 new_dev->de_dnp->dn_uid = uid; in devfs_make_node_internal()
|
| /xnu-10002.41.9/bsd/sys/ |
| H A D | persona.h | 236 int kpersona_find(const char *name, uid_t uid, uid_t *id, size_t *idlen); 402 int persona_find(const char *login, uid_t uid, 455 persona_type_t type, char *path, uid_t uid, int *error); 488 int persona_find_all(const char *login, uid_t uid, persona_type_t persona_type,
|
| H A D | ipc.h | 108 uid_t uid; /* [XSI] Owner's user ID */ member 130 __uint16_t uid; /* Owner's user ID */ member
|
| H A D | fsevents.h | 159 uid_t uid; member
|
| /xnu-10002.41.9/libsyscall/wrappers/ |
| H A D | persona.c | 85 kpersona_find(const char *name, uid_t uid, uid_t *id, size_t *idlen) in kpersona_find() argument 90 kinfo.persona_id = uid; in kpersona_find()
|
| /xnu-10002.41.9/osfmk/bank/ |
| H A D | bank_types.h | 55 uint32_t uid; member
|
| /xnu-10002.41.9/bsd/net/ |
| H A D | if_pflog.c | 415 hdr.uid = pd->lookup.uid; in pflog_packet() 418 hdr.uid = UID_MAX; in pflog_packet()
|
| H A D | if_pflog.h | 89 uid_t uid; member
|
| /xnu-10002.41.9/bsd/security/audit/ |
| H A D | audit.h | 198 void audit_arg_uid(struct kaudit_record *ar, uid_t uid); 214 void audit_arg_owner(struct kaudit_record *ar, uid_t uid, gid_t gid); 246 void audit_arg_posix_ipc_perm(struct kaudit_record *ar, uid_t uid,
|
| H A D | audit_arg.c | 165 audit_arg_uid(struct kaudit_record *ar, uid_t uid) in audit_arg_uid() argument 167 ar->k_ar.ar_arg_uid = uid; in audit_arg_uid() 269 audit_arg_owner(struct kaudit_record *ar, uid_t uid, gid_t gid) in audit_arg_owner() argument 271 ar->k_ar.ar_arg_uid = uid; in audit_arg_owner() 554 audit_arg_posix_ipc_perm(struct kaudit_record *ar, uid_t uid, gid_t gid, in audit_arg_posix_ipc_perm() argument 557 ar->k_ar.ar_arg_pipc_perm.pipc_uid = uid; in audit_arg_posix_ipc_perm()
|
| /xnu-10002.41.9/osfmk/UserNotification/ |
| H A D | KUNCUserNotifications.c | 209 KUNCExecute(char executionPath[1024], int uid, int gid) in KUNCExecute() argument 216 kr = UNDExecute_rpc(UNDServer, executionPath, uid, gid); in KUNCExecute()
|
| /xnu-10002.41.9/security/ |
| H A D | mac_process.c | 787 mac_proc_check_setuid(proc_t curp, kauth_cred_t cred, uid_t uid) in mac_proc_check_setuid() argument 801 MAC_CHECK(proc_check_setuid, cred, uid); in mac_proc_check_setuid() 907 mac_proc_check_settid(proc_t curp, uid_t uid, gid_t gid) in mac_proc_check_settid() argument 924 MAC_CHECK(proc_check_settid, pcred, tcred, uid, gid); in mac_proc_check_settid()
|
| /xnu-10002.41.9/osfmk/corpses/ |
| H A D | task_corpse.h | 134 kern_return_t find_corpse_task_by_uniqueid_grp(uint64_t uid, task_t *target, task_grp_t grp);
|
| /xnu-10002.41.9/bsd/miscfs/nullfs/ |
| H A D | nullfs.h | 99 uid_t uid; member
|
| /xnu-10002.41.9/bsd/nfs/ |
| H A D | nfs.h | 580 uid_t uid; member 661 uid_t uid; member 672 #define NFS_USER_STAT_HASH(userhashtbl, uid) \ argument 673 &((userhashtbl)[(uid) & (NFS_USER_STAT_HASH_SIZE - 1)])
|