diff options
author | Mateusz Guzik <mjg@FreeBSD.org> | 2015-03-15 21:43:43 +0000 |
---|---|---|
committer | Mateusz Guzik <mjg@FreeBSD.org> | 2015-03-15 21:43:43 +0000 |
commit | eb0b6ba01657f114dfb9d7420a00e9ba8317a295 (patch) | |
tree | 6e4a8715181f697ac02b2430f831f49ec029bcdd /sys/security/audit | |
parent | e2ad437112b0680f60f75e34faf69d53a9980960 (diff) | |
download | src-eb0b6ba01657f114dfb9d7420a00e9ba8317a295.tar.gz src-eb0b6ba01657f114dfb9d7420a00e9ba8317a295.zip |
audit: fix cred assignment when A_SETPMASK is used
The code used to modify curproc instead of the target process.
Discussed with: rwatson
MFC after: 3 days
Notes
Notes:
svn path=/head/; revision=280121
Diffstat (limited to 'sys/security/audit')
-rw-r--r-- | sys/security/audit/audit_syscalls.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/sys/security/audit/audit_syscalls.c b/sys/security/audit/audit_syscalls.c index acf005ef0a5d..6ef606b777ac 100644 --- a/sys/security/audit/audit_syscalls.c +++ b/sys/security/audit/audit_syscalls.c @@ -461,7 +461,7 @@ sys_auditon(struct thread *td, struct auditon_args *uap) udata.au_aupinfo.ap_mask.am_success; newcred->cr_audit.ai_mask.am_failure = udata.au_aupinfo.ap_mask.am_failure; - td->td_proc->p_ucred = newcred; + tp->p_ucred = newcred; PROC_UNLOCK(tp); crfree(oldcred); break; |