/src/etc/rc.d/ |
random_seed | 72 st_uid="$3" # should be "0" for root 75 if [ "$st_uid" != "0" ]; then 76 message "Bad owner ${st_uid}"
|
/src/sys/compat/aoutm68k/ |
aoutm68k_stat.h | 47 u_int16_t st_uid; /* user ID of the file's owner */ member in struct:aoutm68k_stat43 67 uid_t st_uid; /* user ID of the file's owner */ member in struct:aoutm68k_stat12 88 uid_t st_uid; /* user ID of the file's owner */ member in struct:aoutm68k_stat
|
aoutm68k_stat.c | 242 ast->st_uid = st->st_uid; 272 ast->st_uid = st->st_uid; 301 ast->st_uid = st->st_uid;
|
/src/tests/fs/tmpfs/ |
t_create.sh | 70 test ${st_uid} -eq $(id -u) || atf_fail "Incorrect uid" 78 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 83 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 88 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 93 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
|
t_mkdir.sh | 105 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 110 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 115 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner" 120 [ ${st_uid} -eq $(id -u ${user}) ] || atf_fail "Incorrect owner"
|
t_setattr.sh | 45 [ ${st_uid} -eq 1234 ] || atf_fail "uid was not set" 79 [ ${st_uid} -eq ${ost_uid} ] || atf_fail "uid was modified" 113 [ ${st_uid} -eq 1234 ] || atf_fail "uid was not modified"
|
/src/lib/libutil/ |
secure_path.c | 64 else if (sb.st_uid != 0)
|
/src/sys/compat/sys/ |
stat.h | 50 uint16_t st_uid; /* user ID of the file's owner */ member in struct:stat43 69 uid_t st_uid; /* user ID of the file's owner */ member in struct:stat12 103 uid_t st_uid; /* user ID of the file's owner */ member in struct:stat13 145 uid_t st_uid; /* user ID of the file's owner */ member in struct:stat30
|
/src/share/examples/refuse/dbfs/ |
dbfs.c | 76 st->st_uid = dbst.st_uid; 168 st->f_owner = dbst.st_uid;
|
/src/lib/libc/compat/sys/ |
compat___stat13.c | 80 ost->st_uid = st->st_uid;
|
compat___stat30.c | 81 ost->st_uid = st->st_uid;
|
compat_stat.c | 76 ost->st_uid = st->st_uid;
|
/src/tests/fs/umapfs/ |
t_basic.c | 58 if (sb.st_uid != uid) 60 path, uid, sb.st_uid);
|
/src/usr.sbin/mtree/ |
specspec.c | 80 printf(" uid=%d", n->st_uid); 82 pw = getpwuid(n->st_uid); 84 printf(" uid=%d", n->st_uid); 168 if (FF(n1, n2, F_UID, st_uid)) 170 if (FF(n1, n2, F_UNAME, st_uid))
|
/src/sbin/mount_umap/ |
mount_umap.c | 163 if (statbuf.st_uid != ROOTUSER) 211 if (statbuf.st_uid != ROOTUSER)
|
/src/tests/lib/libc/sys/ |
t_link.c | 201 if (sa.st_uid != sb.st_uid)
|
/src/tests/lib/libc/ttyio/ |
t_ptm.c | 95 ATF_REQUIRE_EQ_MSG(sts.st_uid, getuid(), "bad slave uid"); 160 ATF_REQUIRE_EQ_MSG(sts.st_uid, getuid(), "bad slave uid");
|
/src/distrib/utils/tls/ |
tls.c | 115 printf("%4d ", st.st_uid);
|
/src/libexec/atrun/ |
atrun.c | 227 (lbuf.st_uid != buf.st_uid) || (lbuf.st_gid != buf.st_gid) || 494 batch_uid = buf.st_uid; 500 run_file(dirent->d_name, buf.st_uid,
|
/src/sys/arch/hpcmips/stand/libsa/ |
winfs.c | 131 sb->st_uid = 0;
|
/src/sys/arch/zaurus/stand/zboot/ |
pathfs.c | 98 sb->st_uid = lsb.lst_uid;
|
/src/usr.bin/find/ |
ls.c | 74 LOGIN_NAME_MAX, user_from_uid(sb->st_uid, 0), LOGIN_NAME_MAX,
|
/src/usr.bin/write/ |
term_chk.c | 88 if (s.st_uid != uid && uid != 0) {
|
/src/tests/lib/libc/c063/ |
t_fchownat.c | 93 ATF_REQUIRE(st.st_uid == uid); 120 ATF_REQUIRE(st.st_uid == uid); 232 ATF_REQUIRE(st.st_uid == uid);
|
/src/bin/pax/ |
file_subs.c | 169 if (nodirs || chk_path(arcn->name,arcn->sb.st_uid,arcn->sb.st_gid) < 0) { 242 res = set_ids(tmp_name, arcn->sb.st_uid, arcn->sb.st_gid); 440 if (chk_path(from, to_sb->st_uid, to_sb->st_gid) == 0) 570 chk_path(nm, arcn->sb.st_uid, 589 res = set_ids(nm, arcn->sb.st_uid, arcn->sb.st_gid); 722 chk_path(char *name, uid_t st_uid, gid_t st_gid) 775 (void)set_ids(name, st_uid, st_gid);
|