| /xnu-12377.1.9/bsd/kern/ |
| H A D | kern_prot.c | 728 (error = suser(parent, &p->p_acflag))) { in setuid() 736 if (suser(parent, &p->p_acflag) == 0) { in setuid() 806 (error = suser(parent, &p->p_acflag))) { in seteuid() 891 (error = suser(parent, &p->p_acflag))) { /* allow root user any */ in setreuid() 976 (error = suser(parent, &p->p_acflag))) { in setgid() 984 if (suser(parent, &p->p_acflag) == 0) { in setgid() 1040 (error = suser(parent, &p->p_acflag))) { in setegid() 1130 (error = suser(parent, &p->p_acflag))) { /* allow root user any */ in setregid() 1525 suser(kauth_cred_t cred, u_short *acflag) in suser() function
|
| H A D | sysv_ipc.c | 111 if (!suser(cred, (u_short *)NULL)) { in ipcperm()
|
| H A D | stackshot.c | 428 if (suser(kauth_cred_get(), &self->p_acflag) != 0 && 531 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in stack_snapshot_with_config() 599 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in microstackshot()
|
| H A D | kern_xxx.c | 114 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in reboot()
|
| H A D | kern_acct.c | 162 if ((error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in acct()
|
| H A D | mach_process.c | 555 (my_err = suser(creds, &cur_procp->p_acflag)) != 0) { in cantrace()
|
| H A D | tty.c | 1183 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in ttioctl_locked() 1432 if (suser(kauth_cred_get(), NULL) && (flag & FREAD) == 0) { in ttioctl_locked() 1436 if (suser(kauth_cred_get(), NULL) && !isctty(p, tp)) { in ttioctl_locked() 1603 error = suser(kauth_cred_get(), &p->p_acflag); in ttioctl_locked()
|
| H A D | kern_time.c | 188 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in settimeofday()
|
| H A D | kern_resource.c | 702 if (suser(ucred, NULL) && kauth_cred_getruid(ucred) && in donice() 714 if (n < chgp->p_nice && suser(ucred, &curp->p_acflag)) { in donice() 1459 error = suser(kauth_cred_get(), &p->p_acflag); in dosetrlimit()
|
| H A D | posix_shm.c | 727 if (!suser(cred, NULL)) { in pshm_access()
|
| H A D | posix_sem.c | 817 if (!suser(cred, NULL)) { in psem_access()
|
| H A D | proc_info.c | 2495 boolean_t isroot = (suser(kauth_cred_get(), (u_short *)0) == 0); in proc_pidinfo() 3216 if (suser(kauth_cred_get(), (u_short *)0) == 0) { in proc_kernmsgbuf() 3281 if (suser(kauth_cred_get(), (u_short *)0) != 0) { in proc_setcontrol()
|
| H A D | sysv_msg.c | 513 eval = suser(cred, &p->p_acflag); in msgctl()
|
| H A D | kern_proc.c | 1839 error = suser(proc_ucred_smr(p), &p->p_acflag); in proc_suser() 4779 if (((self->p_lflag & P_LVMRSRCOWNER) == 0) && (error = suser(kauth_cred_get(), 0))) { in proc_resetpcontrol()
|
| /xnu-12377.1.9/bsd/vm/ |
| H A D | dp_backing_file.c | 131 if ((error = suser(kauth_cred_get(), 0))) { in macx_backing_store_compaction()
|
| /xnu-12377.1.9/bsd/sys/ |
| H A D | ucred.h | 220 int suser(kauth_cred_t cred, u_short *acflag);
|
| /xnu-12377.1.9/bsd/security/audit/ |
| H A D | audit_syscalls.c | 173 error = suser(kauth_cred_get(), &p->p_acflag); in audit() 457 error = suser(kauth_cred_get(), &p->p_acflag); in auditon() 1038 error = suser(scred, &p->p_acflag); in setauid() 1065 if (suser(scred, &p->p_acflag)) { in getaudit_addr_internal() 1126 error = suser(current_cached_proc_cred(p), &p->p_acflag); in setaudit_addr() 1178 error = suser(kauth_cred_get(), &p->p_acflag); in auditctl()
|
| H A D | audit.c | 679 suser(cred, &proc->p_acflag) != 0) { in audit_syscall_enter() 793 suser(cred, &proc->p_acflag) != 0) { in audit_subcall_enter()
|
| H A D | audit_session.c | 1678 error = suser(scred, &p->p_acflag); in audit_sdev_get_aia()
|
| /xnu-12377.1.9/bsd/vfs/ |
| H A D | vfs_syscalls.c | 1241 (error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in mount_common() 1254 if ((!kernelmount) && suser(vfs_context_ucred(ctx), NULL)) { in mount_common() 1275 if ((!kernelmount) && suser(vfs_context_ucred(ctx), NULL)) { in mount_common() 1518 if (suser(vfs_context_ucred(ctx), NULL) != 0) { in mount_common() 1587 if (suser(vfs_context_ucred(ctx), NULL) && in mount_common() 2923 (error = suser(kauth_cred_get(), &p->p_acflag))) { in safedounmount() 4609 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in chroot() 4680 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in pivot_root() 5580 if ((error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in mknodat_internal() 11159 (error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in revoke() [all …]
|
| H A D | kpi_vfs.c | 1299 return suser(ctx->vc_ucred, NULL); in vfs_context_suser()
|
| /xnu-12377.1.9/bsd/netinet6/ |
| H A D | ip6_output.c | 3905 error = suser(kauth_cred_get(), 0); in ip6_setpktopt() 3962 error = suser(kauth_cred_get(), 0); in ip6_setpktopt() 4001 error = suser(kauth_cred_get(), 0); in ip6_setpktopt()
|
| /xnu-12377.1.9/bsd/nfs/ |
| H A D | nfs_syscalls.c | 443 error = suser(vfs_context_ucred(ctx), 0); in fhopen()
|
| H A D | nfs_subs.c | 2420 ((nxo->nxo_flags & NX_MAPROOT) && !suser(nd->nd_cr, NULL))) { in nfsrv_credcheck()
|
| H A D | nfs_serv.c | 2195 error = suser(nd->nd_cr, NULL); in nfsrv_create() 2492 if (vtyp != VFIFO && (error = suser(nd->nd_cr, (u_short *)0))) { in nfsrv_mknod()
|