Lines Matching refs:result

2999 	 * and if those advertised constraints result in a smaller
5736 int error, result;
5746 result = kauth_authorize_action(vnode_scope, vfs_context_ucred(ctx), action,
5748 if (result == EPERM) /* traditional behaviour */
5749 result = EACCES;
5751 if ((result != 0) && (error != 0))
5753 return(result);
5797 int result;
5800 result = 0;
5806 result = (vap->va_uid == kauth_cred_getuid(cred)) ? 1 : 0;
5810 return(result);
5833 int result;
5836 result = 0;
5845 error = kauth_cred_ismember_gid(cred, vap->va_gid, &result);
5849 * will result in an ENOENT error. We translate this into
5857 * XXX all currently known cases, however, this wil result
5877 *ismember = result;
5884 int result;
5887 result = (vcp->flags & _VAC_IS_OWNER) ? 1 : 0;
5889 result = vauth_node_owner(vcp->vap, vcp->ctx->vc_ucred);
5891 /* cache our result */
5893 if (result) {
5899 return(result);
5937 /* cache our result */
5953 int result;
5956 result = (vcp->flags & _VAC_IS_DIR_OWNER) ? 1 : 0;
5958 result = vauth_node_owner(vcp->dvap, vcp->ctx->vc_ucred);
5960 /* cache our result */
5962 if (result) {
5968 return(result);
6005 /* cache our result */
6136 /* Not owner, not in group, use world result */
6605 * we will attempt to formulate a result ourselves based on VNOP_GETATTR data.
6670 int result = KAUTH_RESULT_DENY;
6737 result = KAUTH_RESULT_ALLOW;
6741 result = vnode_authorize_callback_int(cred, idata, action, arg0, arg1, arg2, arg3);
6743 if (result == KAUTH_RESULT_ALLOW && cvp != NULLVP) {
6753 return result;
6768 int result;
6850 result = EROFS;
6858 result = EACCES;
6866 * an appropriate result, at which point we can return immediately.
6868 if ((vp->v_mount->mnt_kern_flag & MNTK_AUTH_OPAQUE) && vnode_authorize_opaque(vp, &result, action, ctx))
6880 if ((result = vnode_getattr(vp, &va, ctx)) != 0) {
6881 KAUTH_DEBUG("%p ERROR - failed to get vnode attributes - %d", vp, result);
6890 if ((result = vnode_getattr(dvp, &dva, ctx)) != 0) {
6891 KAUTH_DEBUG("%p ERROR - failed to get directory vnode attributes - %d", vp, result);
6927 if ((result = vnode_getattr(vp, &va, ctx)) != 0)
6937 if ((result = vnode_authorize_checkimmutable(vp, &va, rights, noimmutable)) != 0)
6941 ((result = vnode_authorize_checkimmutable(dvp, &dva, KAUTH_VNODE_DELETE_CHILD, 0)) != 0))
6960 ((result = vnode_authorize_delete(vcp, parent_authorized_for_delete_child)) != 0))
6965 (result = vnode_authorize_simple(vcp, rights, rights & KAUTH_VNODE_DELETE, &found_deny)) != 0)
6977 result = EPERM;
6990 if (result) {
6993 *errorp = result;
7018 * 'result' value.
8132 * Resolver result functions
8148 vfs_resolver_status(resolver_result_t result)
8151 return (result & 0x0000000F);
8155 vfs_resolver_sequence(resolver_result_t result)
8158 return (uint32_t)(result >> 32);
8162 vfs_resolver_auxiliary(resolver_result_t result)
8165 return (int)(((uint32_t)(result & 0xFFFFFFF0)) >> 4);
8173 vnode_trigger_update(vnode_t vp, resolver_result_t result)
8183 stat = vfs_resolver_status(result);
8184 seq = vfs_resolver_sequence(result);
8241 int result;
8266 result = vnode_resolver_attach(vp, rp, external);
8267 if (result != 0) {
8275 return (result);
8279 return result;
8346 resolver_result_t result;
8375 result = rp->vr_rearm_func(vp, 0, rp->vr_data, ctx);
8376 status = vfs_resolver_status(result);
8377 seq = vfs_resolver_sequence(result);
8394 resolver_result_t result;
8429 result = rp->vr_resolve_func(vp, &ndp->ni_cnd, op, 0, rp->vr_data, ctx);
8430 status = vfs_resolver_status(result);
8431 seq = vfs_resolver_sequence(result);
8442 return (status == RESOLVER_ERROR ? vfs_resolver_auxiliary(result) : 0);
8449 resolver_result_t result;
8479 result = rp->vr_unresolve_func(vp, flags, rp->vr_data, ctx);
8480 status = vfs_resolver_status(result);
8481 seq = vfs_resolver_sequence(result);
8493 return (status == RESOLVER_ERROR ? vfs_resolver_auxiliary(result) : 0);