| /xnu-11215.81.4/bsd/kern/ |
| H A D | sysv_ipc.c | 138 if ((!kauth_cred_ismember_gid(cred, perm->gid, &is_member) && is_member) && in ipcperm() 139 ((perm->gid == perm->cgid) || in ipcperm() 150 if ((!kauth_cred_ismember_gid(cred, perm->gid, &is_member) && is_member) || in ipcperm() 151 ((perm->gid != perm->cgid) && in ipcperm()
|
| H A D | kern_prot.c | 959 want_gid = uap->gid; in setgid() 960 AUDIT_ARG(gid, want_gid); in setgid() 1176 kern_settid(proc_t p, uid_t uid, gid_t gid) in kern_settid() argument 1183 if ((error = mac_proc_check_settid(p, uid, gid)) != 0) { in kern_settid() 1215 return kauth_cred_model_setuidgid(model, uid, gid); in kern_settid() 1234 AUDIT_ARG(gid, uap->gid); in sys_settid() 1236 return kern_settid(p, uap->uid, uap->gid); in sys_settid() 1254 gid_t gid; in sys_settid_with_pid() local 1283 gid = kauth_cred_getgid(cred); in sys_settid_with_pid() 1292 gid = KAUTH_GID_NONE; in sys_settid_with_pid() [all …]
|
| H A D | kern_credential.c | 201 static struct kauth_identity *kauth_identity_alloc(uid_t uid, gid_t gid, guid_t *guidp, time_t guid… 211 static int kauth_identity_find_gid(gid_t gid, struct kauth_identity *kir, char *getname); 1069 kauth_identity_alloc(uid_t uid, gid_t gid, guid_t *guidp, time_t guid_expiry, in kauth_identity_alloc() argument 1077 if (gid != KAUTH_GID_NONE) { in kauth_identity_alloc() 1078 kip->ki_gid = gid; in kauth_identity_alloc() 1599 kauth_identity_find_gid(uid_t gid, struct kauth_identity *kir, char *getname) in kauth_identity_find_gid() argument 1605 if ((kip->ki_valid & KI_VALID_GID) && (gid == kip->ki_gid)) { in kauth_identity_find_gid() 1988 id_t gid = htonl(*(id_t *)src); in kauth_cred_cache_lookup() local 1993 memcpy(&uu[COMPAT_PREFIX_LEN], &gid, sizeof(gid)); in kauth_cred_cache_lookup() 2010 id_t gid; in kauth_cred_cache_lookup() local [all …]
|
| H A D | sysv_shm.c | 675 shmseg->u.shm_perm.gid = inbuf.shm_perm.gid; in shmctl() 843 shmseg->u.shm_perm.cgid = shmseg->u.shm_perm.gid = kauth_cred_getgid(cred); in shmget_allocate_segment()
|
| H A D | sysv_msg.c | 536 msqptr->u.msg_perm.gid = msqbuf.msg_perm.gid; /* change the owner */ in msgctl() 667 msqptr->u.msg_perm.gid = kauth_cred_getgid(cred); in msgget()
|
| H A D | sysv_sem.c | 673 semakptr->u.sem_perm.gid = sbuf.sem_perm.gid; in semctl() 934 semakptr->u.sem_perm.gid = kauth_cred_getgid(cred); in semget()
|
| /xnu-11215.81.4/tools/tests/personas/ |
| H A D | persona_test_run_src.sh | 199 local gid=${4:--1} 233 if [ $gid -ge 0 ]; then 234 if [ $gid -ne ${l[1]} ]; then 235 bail "Child[$cpid] GID:${l[1]} != specified GID:$gid" $line 254 local gid=${3:--1} 263 if [ $gid -ge 0 ]; then 264 spawn_args+=" -g $gid" 265 file+=".g$gid" 284 validate_child_info "${TMPDIR}/$file" "$pna_id" "$uid" "$gid" "$groups" $line
|
| /xnu-11215.81.4/bsd/miscfs/devfs/ |
| H A D | devfs.h | 92 void * devfs_make_node_clone(dev_t dev, int chrblk, uid_t uid, gid_t gid, 111 void * devfs_make_node(dev_t dev, int chrblk, uid_t uid, gid_t gid,
|
| H A D | devfs_tree.c | 1492 gid_t gid, int perms, int (*clone)(dev_t dev, int action), in devfs_make_node_clone() argument 1511 new_dev = devfs_make_node_internal(dev, type, uid, gid, perms, clone, fmt, ap); in devfs_make_node_clone() 1535 gid_t gid, int perms, const char *fmt, ...) in devfs_make_node() argument 1548 new_dev = devfs_make_node_internal(dev, type, uid, gid, perms, NULL, fmt, ap); in devfs_make_node() 1558 gid_t gid, int perms, int (*clone)(dev_t dev, int action), const char *fmt, va_list ap) in devfs_make_node_internal() argument 1631 new_dev->de_dnp->dn_gid = gid; in devfs_make_node_internal()
|
| /xnu-11215.81.4/bsd/sys/ |
| H A D | ipc.h | 109 gid_t gid; /* [XSI] Owner's group ID */ member 131 __uint16_t gid; /* Owner's group ID */ member
|
| H A D | kauth.h | 466 extern int groupmember(gid_t gid, kauth_cred_t cred); 534 extern bool kauth_cred_model_setuidgid(kauth_cred_t model, uid_t uid, gid_t gid);
|
| /xnu-11215.81.4/osfmk/bank/ |
| H A D | bank_types.h | 59 uint32_t gid; member
|
| H A D | bank_internal.h | 100 #define bt_gid bt_proc_persona.gid
|
| /xnu-11215.81.4/bsd/security/audit/ |
| H A D | audit.h | 197 void audit_arg_gid(struct kaudit_record *ar, gid_t gid); 214 void audit_arg_owner(struct kaudit_record *ar, uid_t uid, gid_t gid); 247 gid_t gid, mode_t mode);
|
| H A D | audit_arg.c | 158 audit_arg_gid(struct kaudit_record *ar, gid_t gid) in audit_arg_gid() argument 160 ar->k_ar.ar_arg_gid = gid; in audit_arg_gid() 269 audit_arg_owner(struct kaudit_record *ar, uid_t uid, gid_t gid) in audit_arg_owner() argument 272 ar->k_ar.ar_arg_gid = gid; in audit_arg_owner() 554 audit_arg_posix_ipc_perm(struct kaudit_record *ar, uid_t uid, gid_t gid, in audit_arg_posix_ipc_perm() argument 558 ar->k_ar.ar_arg_pipc_perm.pipc_gid = gid; in audit_arg_posix_ipc_perm()
|
| /xnu-11215.81.4/security/ |
| H A D | mac_process.c | 834 mac_proc_check_setgid(proc_t curp, kauth_cred_t cred, gid_t gid) in mac_proc_check_setgid() argument 848 MAC_CHECK(proc_check_setgid, cred, gid); in mac_proc_check_setgid() 894 mac_proc_check_settid(proc_t curp, uid_t uid, gid_t gid) in mac_proc_check_settid() argument 909 kauth_cred_get(), uid, gid); in mac_proc_check_settid()
|
| H A D | mac_framework.h | 336 int mac_proc_check_setgid(proc_t curp, kauth_cred_t cred, gid_t gid) __result_use_check; 339 int mac_proc_check_settid(proc_t curp, uid_t uid, gid_t gid) __result_use_check; 514 uid_t uid, gid_t gid) __result_use_check; 580 void mac_vnode_notify_setowner(vfs_context_t ctx, struct vnode *vp, uid_t uid, gid_t gid);
|
| /xnu-11215.81.4/osfmk/UserNotification/ |
| H A D | KUNCUserNotifications.c | 209 KUNCExecute(char executionPath[1024], int uid, int gid) in KUNCExecute() argument 216 kr = UNDExecute_rpc(UNDServer, executionPath, uid, gid); in KUNCExecute()
|
| H A D | UNDRequest.defs | 48 in gid: int);
|
| /xnu-11215.81.4/tests/ |
| H A D | corpse_backtrace.c | 62 int gid = *(int *)(kcdata_iter_payload(btdata)); in exc_handler_backtrace() local 63 T_LOG("Found TASK_BTINFO_GID: %d", gid); in exc_handler_backtrace()
|
| /xnu-11215.81.4/bsd/miscfs/nullfs/ |
| H A D | nullfs.h | 100 gid_t gid; member
|
| /xnu-11215.81.4/tools/lldbmacros/ |
| H A D | bank.py | 37 …bank_task.bt_proc_persona.persona_id, bank_task.bt_proc_persona.uid, bank_task.bt_proc_persona.gid)
|
| /xnu-11215.81.4/bsd/netinet6/ |
| H A D | in6_pcb.c | 1374 uid_t *uid, gid_t *gid, struct ifnet *ifp, bool relaxed) in in6_pcblookup_hash_exists() argument 1382 *gid = GID_MAX; in in6_pcblookup_hash_exists() 1419 *gid = kauth_cred_getgid( in in6_pcblookup_hash_exists() 1455 *gid = kauth_cred_getgid( in in6_pcblookup_hash_exists() 1470 *gid = kauth_cred_getgid( in in6_pcblookup_hash_exists()
|
| /xnu-11215.81.4/osfmk/arm64/ |
| H A D | platform_tests.c | 2073 for (uint8_t gid = 0; gid < 0x8; gid++) { in _cpsrctx_do_test() local 2074 const uint8_t gm = gid & 1; in _cpsrctx_do_test() 2075 const uint8_t is = gid >> 1; in _cpsrctx_do_test()
|
| /xnu-11215.81.4/bsd/net/pktsched/ |
| H A D | pktsched.c | 168 pktsched_getqstats(struct ifclassq *ifq, u_int32_t gid, u_int32_t qid, in pktsched_getqstats() argument 177 error = fq_if_getqstats_ifclassq(ifq, (uint8_t)gid, qid, ifqs); in pktsched_getqstats()
|