| /xnu-11417.140.69/bsd/kern/ |
| H A D | kern_prot.c | 728 (error = suser(parent, &p->p_acflag))) { in setuid() 736 if (suser(parent, &p->p_acflag) == 0) { in setuid() 806 (error = suser(parent, &p->p_acflag))) { in seteuid() 891 (error = suser(parent, &p->p_acflag))) { /* allow root user any */ in setreuid() 976 (error = suser(parent, &p->p_acflag))) { in setgid() 984 if (suser(parent, &p->p_acflag) == 0) { in setgid() 1040 (error = suser(parent, &p->p_acflag))) { in setegid() 1130 (error = suser(parent, &p->p_acflag))) { /* allow root user any */ in setregid() 1525 suser(kauth_cred_t cred, u_short *acflag) in suser() function
|
| H A D | sysv_ipc.c | 111 if (!suser(cred, (u_short *)NULL)) { in ipcperm()
|
| H A D | stackshot.c | 428 if (suser(kauth_cred_get(), &self->p_acflag) != 0 && 531 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in stack_snapshot_with_config() 599 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in microstackshot()
|
| H A D | kern_xxx.c | 114 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in reboot()
|
| H A D | kern_acct.c | 162 if ((error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in acct()
|
| H A D | mach_process.c | 555 (my_err = suser(creds, &cur_procp->p_acflag)) != 0) { in cantrace()
|
| H A D | tty.c | 1183 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in ttioctl_locked() 1432 if (suser(kauth_cred_get(), NULL) && (flag & FREAD) == 0) { in ttioctl_locked() 1436 if (suser(kauth_cred_get(), NULL) && !isctty(p, tp)) { in ttioctl_locked() 1603 error = suser(kauth_cred_get(), &p->p_acflag); in ttioctl_locked()
|
| H A D | kern_time.c | 187 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in settimeofday()
|
| H A D | kern_resource.c | 634 if (suser(ucred, NULL) && kauth_cred_getruid(ucred) && in donice() 646 if (n < chgp->p_nice && suser(ucred, &curp->p_acflag)) { in donice() 1233 error = suser(kauth_cred_get(), &p->p_acflag); in dosetrlimit()
|
| H A D | posix_shm.c | 727 if (!suser(cred, NULL)) { in pshm_access()
|
| H A D | posix_sem.c | 658 if (!suser(cred, NULL)) { in psem_access()
|
| H A D | proc_info.c | 2495 boolean_t isroot = (suser(kauth_cred_get(), (u_short *)0) == 0); in proc_pidinfo() 3216 if (suser(kauth_cred_get(), (u_short *)0) == 0) { in proc_kernmsgbuf() 3281 if (suser(kauth_cred_get(), (u_short *)0) != 0) { in proc_setcontrol()
|
| H A D | sysv_msg.c | 513 eval = suser(cred, &p->p_acflag); in msgctl()
|
| H A D | kern_proc.c | 1639 error = suser(proc_ucred_smr(p), &p->p_acflag); in proc_suser() 4550 if (((self->p_lflag & P_LVMRSRCOWNER) == 0) && (error = suser(kauth_cred_get(), 0))) { in proc_resetpcontrol()
|
| /xnu-11417.140.69/bsd/vm/ |
| H A D | dp_backing_file.c | 131 if ((error = suser(kauth_cred_get(), 0))) { in macx_backing_store_compaction()
|
| /xnu-11417.140.69/bsd/sys/ |
| H A D | ucred.h | 220 int suser(kauth_cred_t cred, u_short *acflag);
|
| /xnu-11417.140.69/bsd/security/audit/ |
| H A D | audit_syscalls.c | 173 error = suser(kauth_cred_get(), &p->p_acflag); in audit() 457 error = suser(kauth_cred_get(), &p->p_acflag); in auditon() 1038 error = suser(scred, &p->p_acflag); in setauid() 1065 if (suser(scred, &p->p_acflag)) { in getaudit_addr_internal() 1126 error = suser(current_cached_proc_cred(p), &p->p_acflag); in setaudit_addr() 1178 error = suser(kauth_cred_get(), &p->p_acflag); in auditctl()
|
| H A D | audit.c | 679 suser(cred, &proc->p_acflag) != 0) { in audit_syscall_enter() 793 suser(cred, &proc->p_acflag) != 0) { in audit_subcall_enter()
|
| H A D | audit_session.c | 1678 error = suser(scred, &p->p_acflag); in audit_sdev_get_aia()
|
| /xnu-11417.140.69/bsd/vfs/ |
| H A D | vfs_syscalls.c | 1187 (error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in mount_common() 1200 if ((!kernelmount) && suser(vfs_context_ucred(ctx), NULL)) { in mount_common() 1221 if ((!kernelmount) && suser(vfs_context_ucred(ctx), NULL)) { in mount_common() 1464 if (suser(vfs_context_ucred(ctx), NULL) != 0) { in mount_common() 1533 if (suser(vfs_context_ucred(ctx), NULL) && in mount_common() 2822 (error = suser(kauth_cred_get(), &p->p_acflag))) { in safedounmount() 4437 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in chroot() 4508 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in pivot_root() 5370 if ((error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in mknodat_internal() 10848 (error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in revoke() [all …]
|
| H A D | kpi_vfs.c | 1298 return suser(ctx->vc_ucred, NULL); in vfs_context_suser()
|
| /xnu-11417.140.69/bsd/netinet6/ |
| H A D | ip6_output.c | 3893 error = suser(kauth_cred_get(), 0); in ip6_setpktopt() 3950 error = suser(kauth_cred_get(), 0); in ip6_setpktopt() 3989 error = suser(kauth_cred_get(), 0); in ip6_setpktopt()
|
| /xnu-11417.140.69/bsd/nfs/ |
| H A D | nfs_syscalls.c | 443 error = suser(vfs_context_ucred(ctx), 0); in fhopen()
|
| H A D | nfs_subs.c | 2420 ((nxo->nxo_flags & NX_MAPROOT) && !suser(nd->nd_cr, NULL))) { in nfsrv_credcheck()
|
| H A D | nfs_serv.c | 2195 error = suser(nd->nd_cr, NULL); in nfsrv_create() 2492 if (vtyp != VFIFO && (error = suser(nd->nd_cr, (u_short *)0))) { in nfsrv_mknod()
|