012c643d3e
object before falling back on privilege. Make vaccess() accept an additional optional argument, privused, to determine whether privilege was required for vaccess() to return 0. Add commented out capability checks for reference. Rename some variables to make it more clear which modes/uids/etc are associated with the object, and which with the access mode. o Update file system use of vaccess() to pass NULL as the optional privused argument. Once additional patches are applied, suser() will no longer set ASU, so privused will permit passing of privilege information up the stack to the caller. Reviewed by: bde, green, phk, -security, others Obtained from: TrustedBSD Project |
||
---|---|---|
.. | ||
deadfs | ||
fdesc | ||
fifofs | ||
kernfs | ||
nullfs | ||
portal | ||
procfs | ||
specfs | ||
umapfs | ||
union |