Lines Matching defs:xsecurity

3168  *		uap->xsecurity		ACL to set, if creating
3191 if ((uap->xsecurity != USER_ADDR_NULL) &&
3192 ((ciferror = kauth_copyinfilesec(uap->xsecurity, &xsecdst)) != 0))
3456 * uap->xsecurity ACL to set, if creating
3476 if (uap->xsecurity != USER_ADDR_NULL) {
3477 if ((ciferror = kauth_copyinfilesec(uap->xsecurity, &xsecdst)) != 0)
4672 stat2(vfs_context_t ctx, struct nameidata *ndp, user_addr_t ub, user_addr_t xsecurity, user_addr_t xsecurity_size, int isstat64)
4715 error = vn_stat(ndp->ni_vp, statptr, (xsecurity != USER_ADDR_NULL ? &fsec : NULL), isstat64, ctx);
4772 if (xsecurity != USER_ADDR_NULL) {
4792 error = copyout(fsec, xsecurity, KAUTH_FILESEC_COPYSIZE(fsec));
4808 stat1(user_addr_t path, user_addr_t ub, user_addr_t xsecurity, user_addr_t xsecurity_size, int isstat64)
4815 return(stat2(ctx, &nd, ub, xsecurity, xsecurity_size, isstat64));
4827 * uap->xsecurity ACL to get (extended security)
4837 return (stat1(uap->path, uap->ub, uap->xsecurity, uap->xsecurity_size, 0));
4865 * uap->xsecurity ACL to get (extended security)
4875 return (stat1(uap->path, uap->ub, uap->xsecurity, uap->xsecurity_size, 1));
4881 lstat1(user_addr_t path, user_addr_t ub, user_addr_t xsecurity, user_addr_t xsecurity_size, int isstat64)
4889 return(stat2(ctx, &nd, ub, xsecurity, xsecurity_size, isstat64));
4901 * uap->xsecurity ACL to get (extended security)
4911 return (lstat1(uap->path, uap->ub, uap->xsecurity, uap->xsecurity_size, 0));
4936 * uap->xsecurity ACL to get (extended security)
4946 return (lstat1(uap->path, uap->ub, uap->xsecurity, uap->xsecurity_size, 1));
5207 * uap->xsecurity ACL to set (or delete)
5235 switch(uap->xsecurity) {
5244 if ((error = kauth_copyinfilesec(uap->xsecurity, &xsecdst)) != 0)
5309 * uap->xsecurity ACL to set (or delete)
5334 switch(uap->xsecurity) {
5341 if ((error = kauth_copyinfilesec(uap->xsecurity, &xsecdst)) != 0)
5349 switch(uap->xsecurity) {
6583 * uap->xsecurity ACL to set
6599 if ((uap->xsecurity != USER_ADDR_NULL) &&
6600 ((ciferror = kauth_copyinfilesec(uap->xsecurity, &xsecdst)) != 0))
7051 * XXX implement xsecurity
7053 #define UMASK_NOXSECURITY (void *)1 /* leave existing xsecurity alone */
7076 * uap->xsecurity ACL to set
7089 if (uap->xsecurity != USER_ADDR_NULL) {
7090 if ((ciferror = kauth_copyinfilesec(uap->xsecurity, &xsecdst)) != 0)