freebsd-skq/sys/fs/cd9660
rwatson e54ea574fa o Restructure vaccess() so as to check for DAC permission to modify the
object before falling back on privilege.  Make vaccess() accept an
  additional optional argument, privused, to determine whether
  privilege was required for vaccess() to return 0.  Add commented
  out capability checks for reference.  Rename some variables to make
  it more clear which modes/uids/etc are associated with the object,
  and which with the access mode.
o Update file system use of vaccess() to pass NULL as the optional
  privused argument.  Once additional patches are applied, suser()
  will no longer set ASU, so privused will permit passing of
  privilege information up the stack to the caller.

Reviewed by:	bde, green, phk, -security, others
Obtained from:	TrustedBSD Project
2000-08-29 14:45:49 +00:00
..
cd9660_bmap.c $Id$ -> $FreeBSD$ 1999-08-28 01:08:13 +00:00
cd9660_lookup.c Separate the struct bio related stuff out of <sys/buf.h> into 2000-05-05 09:59:14 +00:00
cd9660_mount.h Add $FreeBSD$ 2000-05-01 20:32:07 +00:00
cd9660_node.c Fix memory leakage on module unload. 2000-06-29 01:19:12 +00:00
cd9660_node.h Change #ifdef KERNEL to #ifdef _KERNEL in the public headers. "KERNEL" 1999-12-29 05:07:58 +00:00
cd9660_rrip.c Separate the struct bio related stuff out of <sys/buf.h> into 2000-05-05 09:59:14 +00:00
cd9660_rrip.h $Id$ -> $FreeBSD$ 1999-08-28 01:08:13 +00:00
cd9660_util.c $Id$ -> $FreeBSD$ 1999-08-28 01:08:13 +00:00
cd9660_vfsops.c This patch corrects the first round of panics and hangs reported 2000-07-24 05:28:33 +00:00
cd9660_vnops.c o Restructure vaccess() so as to check for DAC permission to modify the 2000-08-29 14:45:49 +00:00
iso_rrip.h $Id$ -> $FreeBSD$ 1999-08-28 01:08:13 +00:00
iso.h Fix memory leakage on module unload. 2000-06-29 01:19:12 +00:00
TODO $Id$ -> $FreeBSD$ 1999-08-28 01:08:13 +00:00
TODO.hibler Add $FreeBSD$ 2000-05-01 20:32:07 +00:00