| /xnu-12377.81.4/bsd/kern/ |
| H A D | kern_prot.c | 732 (error = suser(parent, &p->p_acflag))) { in setuid() 740 if (suser(parent, &p->p_acflag) == 0) { in setuid() 811 (error = suser(parent, &p->p_acflag))) { in seteuid() 896 (error = suser(parent, &p->p_acflag))) { /* allow root user any */ in setreuid() 981 (error = suser(parent, &p->p_acflag))) { in setgid() 989 if (suser(parent, &p->p_acflag) == 0) { in setgid() 1045 (error = suser(parent, &p->p_acflag))) { in setegid() 1135 (error = suser(parent, &p->p_acflag))) { /* allow root user any */ in setregid() 1530 suser(kauth_cred_t cred, u_short *acflag) in suser() function
|
| H A D | sysv_ipc.c | 111 if (!suser(cred, (u_short *)NULL)) { in ipcperm()
|
| H A D | stackshot.c | 428 if (suser(kauth_cred_get(), &self->p_acflag) != 0 && 531 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in stack_snapshot_with_config() 599 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in microstackshot()
|
| H A D | kern_xxx.c | 114 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in reboot()
|
| H A D | kern_acct.c | 162 if ((error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in acct()
|
| H A D | mach_process.c | 558 (my_err = suser(creds, &cur_procp->p_acflag)) != 0) { in cantrace()
|
| H A D | tty.c | 1183 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in ttioctl_locked() 1432 if (suser(kauth_cred_get(), NULL) && (flag & FREAD) == 0) { in ttioctl_locked() 1436 if (suser(kauth_cred_get(), NULL) && !isctty(p, tp)) { in ttioctl_locked() 1603 error = suser(kauth_cred_get(), &p->p_acflag); in ttioctl_locked()
|
| H A D | kern_time.c | 188 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in settimeofday()
|
| H A D | kern_resource.c | 702 if (suser(ucred, NULL) && kauth_cred_getruid(ucred) && in donice() 714 if (n < chgp->p_nice && suser(ucred, &curp->p_acflag)) { in donice() 1459 error = suser(kauth_cred_get(), &p->p_acflag); in dosetrlimit()
|
| H A D | posix_shm.c | 727 if (!suser(cred, NULL)) { in pshm_access()
|
| H A D | posix_sem.c | 817 if (!suser(cred, NULL)) { in psem_access()
|
| H A D | proc_info.c | 2519 boolean_t isroot = (suser(kauth_cred_get(), (u_short *)0) == 0); in proc_pidinfo() 3240 if (suser(kauth_cred_get(), (u_short *)0) == 0) { in proc_kernmsgbuf() 3305 if (suser(kauth_cred_get(), (u_short *)0) != 0) { in proc_setcontrol()
|
| H A D | sysv_msg.c | 513 eval = suser(cred, &p->p_acflag); in msgctl()
|
| H A D | kern_proc.c | 1920 error = suser(proc_ucred_smr(p), &p->p_acflag); in proc_suser() 4895 if (((self->p_lflag & P_LVMRSRCOWNER) == 0) && (error = suser(kauth_cred_get(), 0))) { in proc_resetpcontrol()
|
| /xnu-12377.81.4/bsd/vm/ |
| H A D | dp_backing_file.c | 131 if ((error = suser(kauth_cred_get(), 0))) { in macx_backing_store_compaction()
|
| /xnu-12377.81.4/bsd/sys/ |
| H A D | ucred.h | 220 int suser(kauth_cred_t cred, u_short *acflag);
|
| /xnu-12377.81.4/bsd/security/audit/ |
| H A D | audit_syscalls.c | 173 error = suser(kauth_cred_get(), &p->p_acflag); in audit() 457 error = suser(kauth_cred_get(), &p->p_acflag); in auditon() 1038 error = suser(scred, &p->p_acflag); in setauid() 1065 if (suser(scred, &p->p_acflag)) { in getaudit_addr_internal() 1126 error = suser(current_cached_proc_cred(p), &p->p_acflag); in setaudit_addr() 1178 error = suser(kauth_cred_get(), &p->p_acflag); in auditctl()
|
| H A D | audit.c | 679 suser(cred, &proc->p_acflag) != 0) { in audit_syscall_enter() 793 suser(cred, &proc->p_acflag) != 0) { in audit_subcall_enter()
|
| H A D | audit_session.c | 1678 error = suser(scred, &p->p_acflag); in audit_sdev_get_aia()
|
| /xnu-12377.81.4/bsd/vfs/ |
| H A D | vfs_syscalls.c | 1261 (error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in mount_common() 1274 if ((!kernelmount) && suser(vfs_context_ucred(ctx), NULL)) { in mount_common() 1295 if ((!kernelmount) && suser(vfs_context_ucred(ctx), NULL)) { in mount_common() 1538 if (suser(vfs_context_ucred(ctx), NULL) != 0) { in mount_common() 1607 if (suser(vfs_context_ucred(ctx), NULL) && in mount_common() 2943 (error = suser(kauth_cred_get(), &p->p_acflag))) { in safedounmount() 4630 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in chroot() 4718 if ((error = suser(kauth_cred_get(), &p->p_acflag))) { in pivot_root() 5618 if ((error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in mknodat_internal() 11222 (error = suser(vfs_context_ucred(ctx), &p->p_acflag))) { in revoke() [all …]
|
| /xnu-12377.81.4/bsd/netinet6/ |
| H A D | ip6_output.c | 3905 error = suser(kauth_cred_get(), 0); in ip6_setpktopt() 3962 error = suser(kauth_cred_get(), 0); in ip6_setpktopt() 4001 error = suser(kauth_cred_get(), 0); in ip6_setpktopt()
|
| H A D | ipsec.c | 1466 if (so->so_cred != 0 && !suser(so->so_cred->pc_ucred, NULL)) in ipsec_init_policy()
|
| /xnu-12377.81.4/bsd/nfs/ |
| H A D | nfs_syscalls.c | 443 error = suser(vfs_context_ucred(ctx), 0); in fhopen()
|
| H A D | nfs_subs.c | 2420 ((nxo->nxo_flags & NX_MAPROOT) && !suser(nd->nd_cr, NULL))) { in nfsrv_credcheck()
|
| H A D | nfs_serv.c | 2195 error = suser(nd->nd_cr, NULL); in nfsrv_create() 2492 if (vtyp != VFIFO && (error = suser(nd->nd_cr, (u_short *)0))) { in nfsrv_mknod()
|