Searched refs:p_ucred (Results 1 - 16 of 16) sorted by relevance
/xnu-2782.1.97/bsd/sys/ |
H A D | proc_internal.h | 189 p->p_uid = kauth_cred_getuid(p->p_ucred); \ 190 p->p_gid = kauth_cred_getgid(p->p_ucred); \ 191 p->p_ruid = kauth_cred_getruid(p->p_ucred); \ 192 p->p_rgid = kauth_cred_getrgid(p->p_ucred); \ 193 p->p_svuid = kauth_cred_getsvuid(p->p_ucred); \ 194 p->p_svgid = kauth_cred_getsvgid(p->p_ucred); \ 242 kauth_cred_t p_ucred; /* Process owner's identity. (PL) */ member in struct:proc
|
/xnu-2782.1.97/bsd/kern/ |
H A D | kern_prot.c | 787 * reference. If p_ucred has changed then we should 790 if (p->p_ucred != my_cred) { 797 p->p_ucred = my_new_cred; 877 * reference. If p_ucred has changed then we 880 if (p->p_ucred != my_cred) { 887 p->p_ucred = my_new_cred; 1024 * reference. If p_ucred has changed then we should 1027 if (p->p_ucred != my_cred) { 1034 p->p_ucred = my_new_cred; 1128 * reference. If p_ucred ha [all...] |
H A D | bsd_init.c | 580 kernproc->p_ucred = kauth_cred_create(&temp_cred); 587 kauth_cred_ref(kernproc->p_ucred); 588 ut->uu_context.vc_ucred = kernproc->p_ucred; 600 mac_cred_label_associate_kernel(kernproc->p_ucred); 910 context.vc_ucred = kernproc->p_ucred; 1019 mac_cred_label_associate_user(p->p_ucred);
|
H A D | kern_fork.c | 461 mac_cred_label_associate_fork(child_proc->p_ucred, child_proc); 581 mac_cred_label_associate_fork(child_proc->p_ucred, child_proc); 1084 kauth_cred_unref(&p->p_ucred); 1245 child_proc->p_ucred = kauth_cred_get_with_ref();
|
H A D | kern_exit.c | 928 * p_ucred usage is safe as it is an exiting process 931 pp->si_uid = kauth_cred_getruid(p->p_ucred); 1051 * proc internal fileds and p_ucred usage safe 1059 trace_parent->si_uid = kauth_cred_getruid(child->p_ucred); 1125 * p_ucred usage is safe here as it is an exited process. 1129 (void)chgproccnt(kauth_cred_getruid(child->p_ucred), -1); 1140 if (IS_VALID_CRED(child->p_ucred)) { 1141 kauth_cred_unref(&child->p_ucred); 1144 /* XXXX Note NOT SAFE TO USE p_ucred from this point onwards */ 2135 * p_ucred usag [all...] |
H A D | kern_exec.c | 2139 context.vc_ucred = p->p_ucred; /* XXX must NOT be kauth_cred_get() */ 2225 * The use of p_ucred is safe, since we are acting on the 2230 kauth_cred_t my_cred = p->p_ucred; 2233 p->p_ucred = my_new_cred; 3692 p->p_ucred = kauth_cred_setresuid(p->p_ucred, KAUTH_UID_NONE, imgp->ip_origvattr->va_uid, imgp->ip_origvattr->va_uid, KAUTH_UID_NONE); 3697 p->p_ucred = kauth_cred_setresgid(p->p_ucred, KAUTH_GID_NONE, imgp->ip_origvattr->va_gid, imgp->ip_origvattr->va_gid); 3858 p->p_ucred = kauth_cred_setsvuidgid(p->p_ucred, kauth_cred_getui [all...] |
H A D | kern_sysctl.c | 629 if (p->p_ucred == NULL) 648 if (p->p_ucred == NULL) 917 if (p->p_ucred) { 977 if (p->p_ucred) {
|
H A D | kern_credential.c | 3507 if (uthread->uu_ucred != proc->p_ucred && 3584 * after the refeence is taken to protect the p_ucred field of 4445 * reference. If p_ucred has changed then we should 4448 if (p->p_ucred != my_cred) { 4455 p->p_ucred = my_new_cred; 4525 * reference. If p_ucred has changed then we should 4528 if (p->p_ucred != my_cred) { 4535 p->p_ucred = my_new_cred; 4618 * credential being referenced is from p_ucred, the vnode lock
|
H A D | proc_info.c | 313 if (p->p_ucred == NULL) 327 if (p->p_ucred == NULL)
|
H A D | kern_proc.c | 874 return(p->p_ucred);
|
/xnu-2782.1.97/bsd/dev/dtrace/scripts/ |
H A D | darwin.d | 205 pr_uid = P->p_ucred->cr_posix.cr_ruid; 206 pr_euid = P->p_ucred->cr_posix.cr_uid; 207 pr_gid = P->p_ucred->cr_posix.cr_rgid; 208 pr_egid = P->p_ucred->cr_posix.cr_groups[0];
|
/xnu-2782.1.97/bsd/security/audit/ |
H A D | audit_session.c | 435 kauth_cred_t cred = p->p_ucred; 1012 kauth_cred_t cred = p->p_ucred; 1030 kauth_cred_t cred = p->p_ucred; 1171 * If p_ucred has changed then we should restart this 1174 if (p->p_ucred != my_cred) { 1182 p->p_ucred = my_new_cred; 1394 kauth_cred_ref(p->p_ucred); 1395 my_cred = p->p_ucred; 1418 p->p_ucred = my_new_cred;
|
/xnu-2782.1.97/bsd/dev/dtrace/ |
H A D | fasttrap.c | 1459 crhold(p->p_ucred); 1460 cred = p->p_ucred;
|
/xnu-2782.1.97/tools/lldbmacros/ |
H A D | process.py | 52 ucred = proc.p_ucred
|
/xnu-2782.1.97/bsd/vfs/ |
H A D | kpi_vfs.c | 1263 kerncontext.vc_ucred = kernproc->p_ucred;
|
/xnu-2782.1.97/bsd/net/ |
H A D | pf_ioctl.c | 1375 dst->cuid = kauth_cred_getuid(p->p_ucred);
|
Completed in 146 milliseconds