Here are patches to make use of two ioctl()'s privileged. I outlined the
dangers in previous mails. Comments?
Chris
Patch 1) - APPLIES TO fs/ioctl.c
20a21,22
> if (!capable(CAP_SYS_ADMIN))
> return -EPERM;
Patch 2) - APPLIES TO fs/ext2/ioctl.c
74c74
< if ((current->fsuid != inode->i_uid) && !capable(CAP_FOWNER))
--- > if (!capable(CAP_SYS_ADMIN))
- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/