Searched refs:secpolicy_allow_setid (Results 1 – 6 of 6) sorted by relevance
/titanic_44/usr/src/uts/common/syscall/ |
H A D | uid.c | 84 secpolicy_allow_setid(cr, uid, B_TRUE) != 0) { in setuid() 95 } else if ((error = secpolicy_allow_setid(cr, uid, B_FALSE)) == 0) { in setuid() 221 (error = secpolicy_allow_setid(cr, uid, B_FALSE)) == 0) { in seteuid() 303 secpolicy_allow_setid(cr, ruid, B_FALSE) != 0) { in setreuid() 311 euid != cr->cr_suid && secpolicy_allow_setid(cr, euid, B_FALSE)) { in setreuid()
|
H A D | gid.c | 80 secpolicy_allow_setid(cr, -1, B_TRUE) != 0) { in setgid() 91 } else if ((error = secpolicy_allow_setid(cr, -1, B_FALSE)) == 0) { in setgid() 175 (error = secpolicy_allow_setid(cr, -1, B_FALSE)) == 0) { in setegid() 253 (error = secpolicy_allow_setid(cr, -1, B_FALSE)) == 0) { in setregid()
|
H A D | groups.c | 98 if ((error = secpolicy_allow_setid(cr, -1, B_FALSE)) != 0) { in setgroups()
|
/titanic_44/usr/src/uts/common/sys/ |
H A D | policy.h | 75 int secpolicy_allow_setid(const cred_t *, uid_t, boolean_t);
|
/titanic_44/usr/src/uts/common/fs/proc/ |
H A D | prcontrol.c | 2197 error = secpolicy_allow_setid(cr, prcred->pr_euid, B_FALSE); in pr_scred() 2200 error = secpolicy_allow_setid(cr, prcred->pr_ruid, B_FALSE); in pr_scred() 2204 error = secpolicy_allow_setid(cr, prcred->pr_suid, B_FALSE); in pr_scred()
|
/titanic_44/usr/src/uts/common/os/ |
H A D | policy.c | 1657 secpolicy_allow_setid(const cred_t *cr, uid_t newuid, boolean_t checkonly) in secpolicy_allow_setid() function
|