Searched hist:170850 (Results 1 - 3 of 3) sorted by relevance
/freebsd-10.1-release/sys/kern/ | ||
H A D | kern_priv.c | diff 170850 Sat Jun 16 21:41:43 MDT 2007 rwatson Rather than passing SUSER_RUID into priv_check_cred() to specify when a privilege is checked against the real uid rather than the effective uid, instead decide which uid to use in priv_check_cred() based on the privilege passed in. We use the real uid for PRIV_MAXFILES, PRIV_MAXPROC, and PRIV_PROC_LIMIT. Remove the definition of SUSER_RUID; there are now no flags defined for priv_check_cred(). Obtained from: TrustedBSD Project |
H A D | kern_fork.c | diff 170850 Sat Jun 16 21:41:43 MDT 2007 rwatson Rather than passing SUSER_RUID into priv_check_cred() to specify when a privilege is checked against the real uid rather than the effective uid, instead decide which uid to use in priv_check_cred() based on the privilege passed in. We use the real uid for PRIV_MAXFILES, PRIV_MAXPROC, and PRIV_PROC_LIMIT. Remove the definition of SUSER_RUID; there are now no flags defined for priv_check_cred(). Obtained from: TrustedBSD Project |
/freebsd-10.1-release/sys/sys/ | ||
H A D | priv.h | diff 170850 Sat Jun 16 21:41:43 MDT 2007 rwatson Rather than passing SUSER_RUID into priv_check_cred() to specify when a privilege is checked against the real uid rather than the effective uid, instead decide which uid to use in priv_check_cred() based on the privilege passed in. We use the real uid for PRIV_MAXFILES, PRIV_MAXPROC, and PRIV_PROC_LIMIT. Remove the definition of SUSER_RUID; there are now no flags defined for priv_check_cred(). Obtained from: TrustedBSD Project |
Completed in 187 milliseconds