diff options
author | Dean Deng <deandeng@google.com> | 2020-04-24 13:45:31 -0700 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2020-04-24 13:46:58 -0700 |
commit | f13f26d17da56d585fd9857a81175bbd0be8ce60 (patch) | |
tree | 647c4f49ca5ed5f8d8f576974b9891ad1658f193 /pkg/sentry/syscalls/linux/vfs2/socket.go | |
parent | f87964e829f438175edcc0264adc7ce7b3d83842 (diff) |
Port SCM Rights to VFS2.
Fixes #1477.
PiperOrigin-RevId: 308317511
Diffstat (limited to 'pkg/sentry/syscalls/linux/vfs2/socket.go')
-rw-r--r-- | pkg/sentry/syscalls/linux/vfs2/socket.go | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/pkg/sentry/syscalls/linux/vfs2/socket.go b/pkg/sentry/syscalls/linux/vfs2/socket.go index b1ede32f0..10b668477 100644 --- a/pkg/sentry/syscalls/linux/vfs2/socket.go +++ b/pkg/sentry/syscalls/linux/vfs2/socket.go @@ -804,7 +804,7 @@ func recvSingleMsg(t *kernel.Task, s socket.SocketVFS2, msgPtr usermem.Addr, fla } if cms.Unix.Rights != nil { - controlData, mflags = control.PackRights(t, cms.Unix.Rights.(control.SCMRights), flags&linux.MSG_CMSG_CLOEXEC != 0, controlData, mflags) + controlData, mflags = control.PackRightsVFS2(t, cms.Unix.Rights.(control.SCMRightsVFS2), flags&linux.MSG_CMSG_CLOEXEC != 0, controlData, mflags) } // Copy the address to the caller. |