1
0
mirror of https://git.FreeBSD.org/src.git synced 2024-12-04 09:09:56 +00:00

s/p_cred->pc_ucred/p_ucred/g

This commit is contained in:
Poul-Henning Kamp 1999-11-21 12:38:21 +00:00
parent 93abfafb05
commit da654d9070
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=53503
17 changed files with 20 additions and 20 deletions

View File

@ -2196,7 +2196,7 @@ set_dbregs(p, dbregs)
* from within kernel mode?
*/
if (p->p_cred->pc_ucred->cr_uid != 0) {
if (p->p_ucred->cr_uid != 0) {
if (dbregs->dr7 & 0x3) {
/* dr0 is enabled */
if (dbregs->dr0 >= VM_MAXUSER_ADDRESS)

View File

@ -315,7 +315,7 @@ coda_root(vfsp, vpp)
}
}
error = venus_root(vftomi(vfsp), p->p_cred->pc_ucred, p, &VFid);
error = venus_root(vftomi(vfsp), p->p_ucred, p, &VFid);
if (!error) {
/*
@ -454,7 +454,7 @@ coda_fhtovp(vfsp, fhp, nam, vpp, exflagsp, creadanonp)
return(0);
}
error = venus_fhtovp(vftomi(vfsp), &cfid->cfid_fid, p->p_cred->pc_ucred, p, &VFid, &vtype);
error = venus_fhtovp(vftomi(vfsp), &cfid->cfid_fid, p->p_ucred, p, &VFid, &vtype);
if (error) {
CODADEBUG(CODA_VGET, myprintf(("vget error %d\n",error));)

View File

@ -1231,7 +1231,7 @@ svr4_sys_waitsys(p, uap)
* Free up credentials.
*/
if (--q->p_cred->p_refcnt == 0) {
crfree(q->p_cred->pc_ucred);
crfree(q->p_ucred);
FREE(q->p_cred, M_SUBPROC);
}

View File

@ -315,7 +315,7 @@ coda_root(vfsp, vpp)
}
}
error = venus_root(vftomi(vfsp), p->p_cred->pc_ucred, p, &VFid);
error = venus_root(vftomi(vfsp), p->p_ucred, p, &VFid);
if (!error) {
/*
@ -454,7 +454,7 @@ coda_fhtovp(vfsp, fhp, nam, vpp, exflagsp, creadanonp)
return(0);
}
error = venus_fhtovp(vftomi(vfsp), &cfid->cfid_fid, p->p_cred->pc_ucred, p, &VFid, &vtype);
error = venus_fhtovp(vftomi(vfsp), &cfid->cfid_fid, p->p_ucred, p, &VFid, &vtype);
if (error) {
CODADEBUG(CODA_VGET, myprintf(("vget error %d\n",error));)

View File

@ -97,7 +97,7 @@ struct pfsnode {
#define CHECKIO(p1, p2) \
((p1) == (p2) || \
(PRISON_CHECK(p1, p2) && \
((((p1)->p_cred->pc_ucred->cr_uid == (p2)->p_cred->p_ruid) && \
((((p1)->p_ucred->cr_uid == (p2)->p_cred->p_ruid) && \
((p1)->p_cred->p_ruid == (p2)->p_cred->p_ruid) && \
((p1)->p_cred->p_svuid == (p2)->p_cred->p_ruid) && \
((p2)->p_flag & P_SUGID) == 0) || \

View File

@ -343,7 +343,7 @@ int procfs_kmemaccess(curp)
int i;
struct ucred *cred;
cred = curp->p_cred->pc_ucred;
cred = curp->p_ucred;
if (suser(curp))
return 1;

View File

@ -2196,7 +2196,7 @@ set_dbregs(p, dbregs)
* from within kernel mode?
*/
if (p->p_cred->pc_ucred->cr_uid != 0) {
if (p->p_ucred->cr_uid != 0) {
if (dbregs->dr7 & 0x3) {
/* dr0 is enabled */
if (dbregs->dr0 >= VM_MAXUSER_ADDRESS)

View File

@ -247,7 +247,7 @@ aout_coredump(p, vp, limit)
register struct vnode *vp;
off_t limit;
{
register struct ucred *cred = p->p_cred->pc_ucred;
register struct ucred *cred = p->p_ucred;
register struct vmspace *vm = p->p_vmspace;
int error;

View File

@ -688,7 +688,7 @@ elf_coredump(p, vp, limit)
register struct vnode *vp;
off_t limit;
{
register struct ucred *cred = p->p_cred->pc_ucred;
register struct ucred *cred = p->p_ucred;
int error = 0;
struct sseg_closure seginfo;
void *hdr;

View File

@ -480,7 +480,7 @@ wait1(q, uap, compat)
* Free up credentials.
*/
if (--p->p_cred->p_refcnt == 0) {
crfree(p->p_cred->pc_ucred);
crfree(p->p_ucred);
FREE(p->p_cred, M_SUBPROC);
p->p_cred = NULL;
}

View File

@ -1580,7 +1580,7 @@ coredump(p)
register struct proc *p;
{
register struct vnode *vp;
register struct ucred *cred = p->p_cred->pc_ucred;
register struct ucred *cred = p->p_ucred;
struct nameidata nd;
struct vattr vattr;
int error, error1;

View File

@ -1250,7 +1250,7 @@ devfs_open_device(char *path, int type)
return (NULL);
#if 0
if ( VOP_OPEN(vn, FREAD, proc0.p_cred->pc_ucred, &proc0)) {
if ( VOP_OPEN(vn, FREAD, proc0.p_ucred, &proc0)) {
vput(vn);
return (NULL);
}
@ -1268,7 +1268,7 @@ void
devfs_close_device(struct vnode *vn)
{
#if 0
VOP_CLOSE(vn, 0, proc0.p_cred->pc_ucred, &proc0) ;
VOP_CLOSE(vn, 0, proc0.p_ucred, &proc0) ;
#endif
vput(vn);
}

View File

@ -97,7 +97,7 @@ struct pfsnode {
#define CHECKIO(p1, p2) \
((p1) == (p2) || \
(PRISON_CHECK(p1, p2) && \
((((p1)->p_cred->pc_ucred->cr_uid == (p2)->p_cred->p_ruid) && \
((((p1)->p_ucred->cr_uid == (p2)->p_cred->p_ruid) && \
((p1)->p_cred->p_ruid == (p2)->p_cred->p_ruid) && \
((p1)->p_cred->p_svuid == (p2)->p_cred->p_ruid) && \
((p2)->p_flag & P_SUGID) == 0) || \

View File

@ -343,7 +343,7 @@ int procfs_kmemaccess(curp)
int i;
struct ucred *cred;
cred = curp->p_cred->pc_ucred;
cred = curp->p_ucred;
if (suser(curp))
return 1;

View File

@ -2432,7 +2432,7 @@ set_dbregs(p, dbregs)
* from within kernel mode?
*/
if (p->p_cred->pc_ucred->cr_uid != 0) {
if (p->p_ucred->cr_uid != 0) {
if (dbregs->dr7 & 0x3) {
/* dr0 is enabled */
if (dbregs->dr0 >= VM_MAXUSER_ADDRESS)

View File

@ -2432,7 +2432,7 @@ set_dbregs(p, dbregs)
* from within kernel mode?
*/
if (p->p_cred->pc_ucred->cr_uid != 0) {
if (p->p_ucred->cr_uid != 0) {
if (dbregs->dr7 & 0x3) {
/* dr0 is enabled */
if (dbregs->dr0 >= VM_MAXUSER_ADDRESS)

View File

@ -1231,7 +1231,7 @@ svr4_sys_waitsys(p, uap)
* Free up credentials.
*/
if (--q->p_cred->p_refcnt == 0) {
crfree(q->p_cred->pc_ucred);
crfree(q->p_ucred);
FREE(q->p_cred, M_SUBPROC);
}