Searched refs:p_ucred (Results 1 - 14 of 14) sorted by relevance

/darwin-on-arm/xnu/bsd/kern/
H A Dbsd_init.c579 kernproc->p_ucred = kauth_cred_create(&temp_cred);
586 kauth_cred_ref(kernproc->p_ucred);
587 ut->uu_context.vc_ucred = kernproc->p_ucred;
599 mac_cred_label_associate_kernel(kernproc->p_ucred);
600 mac_task_label_update_cred (kernproc->p_ucred, (struct task *) kernproc->task);
887 context.vc_ucred = kernproc->p_ucred;
999 mac_cred_label_associate_user(p->p_ucred);
1000 mac_task_label_update_cred (p->p_ucred, (struct task *) p->task);
H A Dkern_prot.c787 * reference. If p_ucred has changed then we should
790 if (p->p_ucred != my_cred) {
797 p->p_ucred = my_new_cred;
877 * reference. If p_ucred has changed then we
880 if (p->p_ucred != my_cred) {
887 p->p_ucred = my_new_cred;
1024 * reference. If p_ucred has changed then we should
1027 if (p->p_ucred != my_cred) {
1034 p->p_ucred = my_new_cred;
1128 * reference. If p_ucred ha
[all...]
H A Dkern_fork.c452 mac_cred_label_associate_fork(child_proc->p_ucred, child_proc);
555 mac_cred_label_associate_fork(child_proc->p_ucred, child_proc);
798 /* valid to use p_ucred as child is still not running ... */
799 mac_task_label_update_cred(child_proc->p_ucred, child_task);
1052 kauth_cred_unref(&p->p_ucred);
1221 child_proc->p_ucred = kauth_cred_get_with_ref();
H A Dkern_exec.c1844 context.vc_ucred = p->p_ucred; /* XXX must NOT be kauth_cred_get() */
1909 * The use of p_ucred is safe, since we are acting on the
1914 kauth_cred_t my_cred = p->p_ucred;
1917 p->p_ucred = my_new_cred;
3234 p->p_ucred = kauth_cred_setresuid(p->p_ucred, KAUTH_UID_NONE, imgp->ip_origvattr->va_uid, imgp->ip_origvattr->va_uid, KAUTH_UID_NONE);
3239 p->p_ucred = kauth_cred_setresgid(p->p_ucred, KAUTH_GID_NONE, imgp->ip_origvattr->va_gid, imgp->ip_origvattr->va_gid);
3370 p->p_ucred = kauth_cred_setsvuidgid(p->p_ucred, kauth_cred_getui
[all...]
H A Dkern_exit.c843 * p_ucred usage is safe as it is an exiting process
846 pp->si_uid = kauth_cred_getruid(p->p_ucred);
966 * proc internal fileds and p_ucred usage safe
974 trace_parent->si_uid = kauth_cred_getruid(child->p_ucred);
1035 * p_ucred usage is safe here as it is an exited process.
1039 (void)chgproccnt(kauth_cred_getruid(child->p_ucred), -1);
1050 if (IS_VALID_CRED(child->p_ucred)) {
1051 kauth_cred_unref(&child->p_ucred);
1054 /* XXXX Note NOT SAFE TO USE p_ucred from this point onwards */
1951 * p_ucred usag
[all...]
H A Dkern_credential.c3319 if (uthread->uu_ucred != proc->p_ucred &&
3396 * after the refeence is taken to protect the p_ucred field of
4230 * reference. If p_ucred has changed then we should
4233 if (p->p_ucred != my_cred) {
4240 p->p_ucred = my_new_cred;
4308 * reference. If p_ucred has changed then we should
4311 if (p->p_ucred != my_cred) {
4318 p->p_ucred = my_new_cred;
4403 * credential being referenced is from p_ucred, the vnode lock
H A Dkern_sysctl.c1227 if (p->p_ucred == NULL)
1246 if (p->p_ucred == NULL)
1515 if (p->p_ucred) {
1575 if (p->p_ucred) {
H A Dproc_info.c254 if (p->p_ucred == NULL)
268 if (p->p_ucred == NULL)
H A Dkern_proc.c783 return(p->p_ucred);
/darwin-on-arm/xnu/bsd/sys/
H A Dproc_internal.h188 p->p_uid = kauth_cred_getuid(p->p_ucred); \
189 p->p_gid = kauth_cred_getgid(p->p_ucred); \
190 p->p_ruid = kauth_cred_getruid(p->p_ucred); \
191 p->p_rgid = kauth_cred_getrgid(p->p_ucred); \
192 p->p_svuid = kauth_cred_getsvuid(p->p_ucred); \
193 p->p_svgid = kauth_cred_getsvgid(p->p_ucred); \
240 kauth_cred_t p_ucred; /* Process owner's identity. (PL) */ member in struct:proc
/darwin-on-arm/xnu/bsd/security/audit/
H A Daudit_session.c435 kauth_cred_t cred = p->p_ucred;
1012 kauth_cred_t cred = p->p_ucred;
1030 kauth_cred_t cred = p->p_ucred;
1171 * If p_ucred has changed then we should restart this
1174 if (p->p_ucred != my_cred) {
1182 p->p_ucred = my_new_cred;
1394 kauth_cred_ref(p->p_ucred);
1395 my_cred = p->p_ucred;
1418 p->p_ucred = my_new_cred;
/darwin-on-arm/xnu/bsd/dev/dtrace/
H A Dfasttrap.c1515 crhold(p->p_ucred);
1516 cred = p->p_ucred;
/darwin-on-arm/xnu/bsd/net/
H A Dpf_ioctl.c1362 dst->cuid = kauth_cred_getuid(p->p_ucred);
/darwin-on-arm/xnu/bsd/vfs/
H A Dkpi_vfs.c1507 kerncontext.vc_ucred = kernproc->p_ucred;

Completed in 404 milliseconds