mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-04 09:09:56 +00:00
s/p_cred->pc_ucred/p_ucred/g
This commit is contained in:
parent
93abfafb05
commit
da654d9070
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=53503
@ -2196,7 +2196,7 @@ set_dbregs(p, dbregs)
|
||||
* from within kernel mode?
|
||||
*/
|
||||
|
||||
if (p->p_cred->pc_ucred->cr_uid != 0) {
|
||||
if (p->p_ucred->cr_uid != 0) {
|
||||
if (dbregs->dr7 & 0x3) {
|
||||
/* dr0 is enabled */
|
||||
if (dbregs->dr0 >= VM_MAXUSER_ADDRESS)
|
||||
|
@ -315,7 +315,7 @@ coda_root(vfsp, vpp)
|
||||
}
|
||||
}
|
||||
|
||||
error = venus_root(vftomi(vfsp), p->p_cred->pc_ucred, p, &VFid);
|
||||
error = venus_root(vftomi(vfsp), p->p_ucred, p, &VFid);
|
||||
|
||||
if (!error) {
|
||||
/*
|
||||
@ -454,7 +454,7 @@ coda_fhtovp(vfsp, fhp, nam, vpp, exflagsp, creadanonp)
|
||||
return(0);
|
||||
}
|
||||
|
||||
error = venus_fhtovp(vftomi(vfsp), &cfid->cfid_fid, p->p_cred->pc_ucred, p, &VFid, &vtype);
|
||||
error = venus_fhtovp(vftomi(vfsp), &cfid->cfid_fid, p->p_ucred, p, &VFid, &vtype);
|
||||
|
||||
if (error) {
|
||||
CODADEBUG(CODA_VGET, myprintf(("vget error %d\n",error));)
|
||||
|
@ -1231,7 +1231,7 @@ svr4_sys_waitsys(p, uap)
|
||||
* Free up credentials.
|
||||
*/
|
||||
if (--q->p_cred->p_refcnt == 0) {
|
||||
crfree(q->p_cred->pc_ucred);
|
||||
crfree(q->p_ucred);
|
||||
FREE(q->p_cred, M_SUBPROC);
|
||||
}
|
||||
|
||||
|
@ -315,7 +315,7 @@ coda_root(vfsp, vpp)
|
||||
}
|
||||
}
|
||||
|
||||
error = venus_root(vftomi(vfsp), p->p_cred->pc_ucred, p, &VFid);
|
||||
error = venus_root(vftomi(vfsp), p->p_ucred, p, &VFid);
|
||||
|
||||
if (!error) {
|
||||
/*
|
||||
@ -454,7 +454,7 @@ coda_fhtovp(vfsp, fhp, nam, vpp, exflagsp, creadanonp)
|
||||
return(0);
|
||||
}
|
||||
|
||||
error = venus_fhtovp(vftomi(vfsp), &cfid->cfid_fid, p->p_cred->pc_ucred, p, &VFid, &vtype);
|
||||
error = venus_fhtovp(vftomi(vfsp), &cfid->cfid_fid, p->p_ucred, p, &VFid, &vtype);
|
||||
|
||||
if (error) {
|
||||
CODADEBUG(CODA_VGET, myprintf(("vget error %d\n",error));)
|
||||
|
@ -97,7 +97,7 @@ struct pfsnode {
|
||||
#define CHECKIO(p1, p2) \
|
||||
((p1) == (p2) || \
|
||||
(PRISON_CHECK(p1, p2) && \
|
||||
((((p1)->p_cred->pc_ucred->cr_uid == (p2)->p_cred->p_ruid) && \
|
||||
((((p1)->p_ucred->cr_uid == (p2)->p_cred->p_ruid) && \
|
||||
((p1)->p_cred->p_ruid == (p2)->p_cred->p_ruid) && \
|
||||
((p1)->p_cred->p_svuid == (p2)->p_cred->p_ruid) && \
|
||||
((p2)->p_flag & P_SUGID) == 0) || \
|
||||
|
@ -343,7 +343,7 @@ int procfs_kmemaccess(curp)
|
||||
int i;
|
||||
struct ucred *cred;
|
||||
|
||||
cred = curp->p_cred->pc_ucred;
|
||||
cred = curp->p_ucred;
|
||||
if (suser(curp))
|
||||
return 1;
|
||||
|
||||
|
@ -2196,7 +2196,7 @@ set_dbregs(p, dbregs)
|
||||
* from within kernel mode?
|
||||
*/
|
||||
|
||||
if (p->p_cred->pc_ucred->cr_uid != 0) {
|
||||
if (p->p_ucred->cr_uid != 0) {
|
||||
if (dbregs->dr7 & 0x3) {
|
||||
/* dr0 is enabled */
|
||||
if (dbregs->dr0 >= VM_MAXUSER_ADDRESS)
|
||||
|
@ -247,7 +247,7 @@ aout_coredump(p, vp, limit)
|
||||
register struct vnode *vp;
|
||||
off_t limit;
|
||||
{
|
||||
register struct ucred *cred = p->p_cred->pc_ucred;
|
||||
register struct ucred *cred = p->p_ucred;
|
||||
register struct vmspace *vm = p->p_vmspace;
|
||||
int error;
|
||||
|
||||
|
@ -688,7 +688,7 @@ elf_coredump(p, vp, limit)
|
||||
register struct vnode *vp;
|
||||
off_t limit;
|
||||
{
|
||||
register struct ucred *cred = p->p_cred->pc_ucred;
|
||||
register struct ucred *cred = p->p_ucred;
|
||||
int error = 0;
|
||||
struct sseg_closure seginfo;
|
||||
void *hdr;
|
||||
|
@ -480,7 +480,7 @@ wait1(q, uap, compat)
|
||||
* Free up credentials.
|
||||
*/
|
||||
if (--p->p_cred->p_refcnt == 0) {
|
||||
crfree(p->p_cred->pc_ucred);
|
||||
crfree(p->p_ucred);
|
||||
FREE(p->p_cred, M_SUBPROC);
|
||||
p->p_cred = NULL;
|
||||
}
|
||||
|
@ -1580,7 +1580,7 @@ coredump(p)
|
||||
register struct proc *p;
|
||||
{
|
||||
register struct vnode *vp;
|
||||
register struct ucred *cred = p->p_cred->pc_ucred;
|
||||
register struct ucred *cred = p->p_ucred;
|
||||
struct nameidata nd;
|
||||
struct vattr vattr;
|
||||
int error, error1;
|
||||
|
@ -1250,7 +1250,7 @@ devfs_open_device(char *path, int type)
|
||||
return (NULL);
|
||||
|
||||
#if 0
|
||||
if ( VOP_OPEN(vn, FREAD, proc0.p_cred->pc_ucred, &proc0)) {
|
||||
if ( VOP_OPEN(vn, FREAD, proc0.p_ucred, &proc0)) {
|
||||
vput(vn);
|
||||
return (NULL);
|
||||
}
|
||||
@ -1268,7 +1268,7 @@ void
|
||||
devfs_close_device(struct vnode *vn)
|
||||
{
|
||||
#if 0
|
||||
VOP_CLOSE(vn, 0, proc0.p_cred->pc_ucred, &proc0) ;
|
||||
VOP_CLOSE(vn, 0, proc0.p_ucred, &proc0) ;
|
||||
#endif
|
||||
vput(vn);
|
||||
}
|
||||
|
@ -97,7 +97,7 @@ struct pfsnode {
|
||||
#define CHECKIO(p1, p2) \
|
||||
((p1) == (p2) || \
|
||||
(PRISON_CHECK(p1, p2) && \
|
||||
((((p1)->p_cred->pc_ucred->cr_uid == (p2)->p_cred->p_ruid) && \
|
||||
((((p1)->p_ucred->cr_uid == (p2)->p_cred->p_ruid) && \
|
||||
((p1)->p_cred->p_ruid == (p2)->p_cred->p_ruid) && \
|
||||
((p1)->p_cred->p_svuid == (p2)->p_cred->p_ruid) && \
|
||||
((p2)->p_flag & P_SUGID) == 0) || \
|
||||
|
@ -343,7 +343,7 @@ int procfs_kmemaccess(curp)
|
||||
int i;
|
||||
struct ucred *cred;
|
||||
|
||||
cred = curp->p_cred->pc_ucred;
|
||||
cred = curp->p_ucred;
|
||||
if (suser(curp))
|
||||
return 1;
|
||||
|
||||
|
@ -2432,7 +2432,7 @@ set_dbregs(p, dbregs)
|
||||
* from within kernel mode?
|
||||
*/
|
||||
|
||||
if (p->p_cred->pc_ucred->cr_uid != 0) {
|
||||
if (p->p_ucred->cr_uid != 0) {
|
||||
if (dbregs->dr7 & 0x3) {
|
||||
/* dr0 is enabled */
|
||||
if (dbregs->dr0 >= VM_MAXUSER_ADDRESS)
|
||||
|
@ -2432,7 +2432,7 @@ set_dbregs(p, dbregs)
|
||||
* from within kernel mode?
|
||||
*/
|
||||
|
||||
if (p->p_cred->pc_ucred->cr_uid != 0) {
|
||||
if (p->p_ucred->cr_uid != 0) {
|
||||
if (dbregs->dr7 & 0x3) {
|
||||
/* dr0 is enabled */
|
||||
if (dbregs->dr0 >= VM_MAXUSER_ADDRESS)
|
||||
|
@ -1231,7 +1231,7 @@ svr4_sys_waitsys(p, uap)
|
||||
* Free up credentials.
|
||||
*/
|
||||
if (--q->p_cred->p_refcnt == 0) {
|
||||
crfree(q->p_cred->pc_ucred);
|
||||
crfree(q->p_ucred);
|
||||
FREE(q->p_cred, M_SUBPROC);
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user