diff options
author | rwatson <rwatson@FreeBSD.org> | 2002-08-17 02:36:16 +0000 |
---|---|---|
committer | rwatson <rwatson@FreeBSD.org> | 2002-08-17 02:36:16 +0000 |
commit | 3246fbf45f089a96288563f2d5071bfbde5f99df (patch) | |
tree | fe31f7ea9a8713005d8ba378b027671dbea5c058 /sys/compat/linux/linux_file.c | |
parent | 2c79764ced8717b21fed701119314cb23bbbbbf6 (diff) | |
download | FreeBSD-src-3246fbf45f089a96288563f2d5071bfbde5f99df.zip FreeBSD-src-3246fbf45f089a96288563f2d5071bfbde5f99df.tar.gz |
In continuation of early fileop credential changes, modify fo_ioctl() to
accept an 'active_cred' argument reflecting the credential of the thread
initiating the ioctl operation.
- Change fo_ioctl() to accept active_cred; change consumers of the
fo_ioctl() interface to generally pass active_cred from td->td_ucred.
- In fifofs, initialize filetmp.f_cred to ap->a_cred so that the
invocations of soo_ioctl() are provided access to the calling f_cred.
Pass ap->a_td->td_ucred as the active_cred, but note that this is
required because we don't yet distinguish file_cred and active_cred
in invoking VOP's.
- Update kqueue_ioctl() for its new argument.
- Update pipe_ioctl() for its new argument, pass active_cred rather
than td_ucred to MAC for authorization.
- Update soo_ioctl() for its new argument.
- Update vn_ioctl() for its new argument, use active_cred rather than
td->td_ucred to authorize VOP_IOCTL() and the associated VOP_GETATTR().
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
Diffstat (limited to 'sys/compat/linux/linux_file.c')
-rw-r--r-- | sys/compat/linux/linux_file.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/sys/compat/linux/linux_file.c b/sys/compat/linux/linux_file.c index 847e23e..fc634ba 100644 --- a/sys/compat/linux/linux_file.c +++ b/sys/compat/linux/linux_file.c @@ -143,7 +143,8 @@ linux_open(struct thread *td, struct linux_open_args *args) PROC_UNLOCK(p); if (!error) { if (fp->f_type == DTYPE_VNODE) - fo_ioctl(fp, TIOCSCTTY, (caddr_t) 0, td); + fo_ioctl(fp, TIOCSCTTY, (caddr_t) 0, td->td_ucred, + td); fdrop(fp, td); } } else { |