- User Since
- Jun 3 2017, 8:47 AM (210 w, 5 d)
Tue, Jun 15
Mon, Jun 14
Sun, Jun 13
Mon, May 31
Sat, May 29
Could you test https://reviews.freebsd.org/D30542 ?
It should fix
Cannot gain exklusive access to the input device
Occurs when using legacy drivers for FreeBSD
Fri, May 28
Thu, May 27
Sun, May 23
Wed, May 19
Tue, May 18
While here use bitwise operations for UMS_EVDEV_OPENED flag.
May 4 2021
Apr 30 2021
Apr 28 2021
Apr 24 2021
Apr 22 2021
Apr 15 2021
Apr 14 2021
Apr 12 2021
Apr 11 2021
Apr 8 2021
Could you please give me the min example?
Move FKQALLOWED to the final f_flag value.
Check access on open and allow kevent vnode filter for O_PATH files if VOP_ACCESS(VREAD) passed.
Apr 7 2021
It depends on orthogonality of O_PATH
If we consider O_PATH flag to be orthogonal to other access mode flags like O_RDONLY, O_WRONLY and O_RDWR, we should pass VWRITE to VOP_ACCESS if O_WRONLY or O_RDWR is specified in open() flag list.
If O_PATH is just a next access mode in the list and it can not be combined with other aforementioned O_* flags, then only VREAD should be passed to VOP_ACCESS unconditionally.
You mean, with O_PATH we should check the snapshot of current access rights when fd is passed to kqueue for vnode filter?
Apr 6 2021
Apr 5 2021
I am able to open 600 root:wheel files as ordinary user with O_PATH flag added. Is it intended behavior?
If yes, we should deny kevent() for such a fds as it is a security hole.