diff options
author | bdrewery <bdrewery@FreeBSD.org> | 2016-06-27 20:38:38 +0000 |
---|---|---|
committer | bdrewery <bdrewery@FreeBSD.org> | 2016-06-27 20:38:38 +0000 |
commit | 79503b63f07526d4feb0aefabd04b7e048143ffb (patch) | |
tree | 0472ed59c11a57766582245335bdc78414168ab3 /sys | |
parent | 72a174f20a2a60cf397c37a636a3e3230b6a114c (diff) | |
download | FreeBSD-src-79503b63f07526d4feb0aefabd04b7e048143ffb.zip FreeBSD-src-79503b63f07526d4feb0aefabd04b7e048143ffb.tar.gz |
MFC r280121:
audit: fix cred assignment when A_SETPMASK is used
Diffstat (limited to 'sys')
-rw-r--r-- | sys/security/audit/audit_syscalls.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/sys/security/audit/audit_syscalls.c b/sys/security/audit/audit_syscalls.c index acf005e..6ef606b 100644 --- a/sys/security/audit/audit_syscalls.c +++ b/sys/security/audit/audit_syscalls.c @@ -461,7 +461,7 @@ sys_auditon(struct thread *td, struct auditon_args *uap) udata.au_aupinfo.ap_mask.am_success; newcred->cr_audit.ai_mask.am_failure = udata.au_aupinfo.ap_mask.am_failure; - td->td_proc->p_ucred = newcred; + tp->p_ucred = newcred; PROC_UNLOCK(tp); crfree(oldcred); break; |