diff options
author | rwatson <rwatson@FreeBSD.org> | 2002-08-17 02:36:16 +0000 |
---|---|---|
committer | rwatson <rwatson@FreeBSD.org> | 2002-08-17 02:36:16 +0000 |
commit | 3246fbf45f089a96288563f2d5071bfbde5f99df (patch) | |
tree | fe31f7ea9a8713005d8ba378b027671dbea5c058 /sys/kern/vfs_vnops.c | |
parent | 2c79764ced8717b21fed701119314cb23bbbbbf6 (diff) | |
download | FreeBSD-src-3246fbf45f089a96288563f2d5071bfbde5f99df.zip FreeBSD-src-3246fbf45f089a96288563f2d5071bfbde5f99df.tar.gz |
In continuation of early fileop credential changes, modify fo_ioctl() to
accept an 'active_cred' argument reflecting the credential of the thread
initiating the ioctl operation.
- Change fo_ioctl() to accept active_cred; change consumers of the
fo_ioctl() interface to generally pass active_cred from td->td_ucred.
- In fifofs, initialize filetmp.f_cred to ap->a_cred so that the
invocations of soo_ioctl() are provided access to the calling f_cred.
Pass ap->a_td->td_ucred as the active_cred, but note that this is
required because we don't yet distinguish file_cred and active_cred
in invoking VOP's.
- Update kqueue_ioctl() for its new argument.
- Update pipe_ioctl() for its new argument, pass active_cred rather
than td_ucred to MAC for authorization.
- Update soo_ioctl() for its new argument.
- Update vn_ioctl() for its new argument, use active_cred rather than
td->td_ucred to authorize VOP_IOCTL() and the associated VOP_GETATTR().
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
Diffstat (limited to 'sys/kern/vfs_vnops.c')
-rw-r--r-- | sys/kern/vfs_vnops.c | 9 |
1 files changed, 5 insertions, 4 deletions
diff --git a/sys/kern/vfs_vnops.c b/sys/kern/vfs_vnops.c index af5faed..07e5fc9 100644 --- a/sys/kern/vfs_vnops.c +++ b/sys/kern/vfs_vnops.c @@ -65,7 +65,7 @@ static int vn_closefile(struct file *fp, struct thread *td); static int vn_ioctl(struct file *fp, u_long com, void *data, - struct thread *td); + struct ucred *active_cred, struct thread *td); static int vn_read(struct file *fp, struct uio *uio, struct ucred *active_cred, int flags, struct thread *td); static int vn_poll(struct file *fp, int events, struct ucred *active_cred, @@ -721,10 +721,11 @@ vn_stat(vp, sb, active_cred, file_cred, td) * File table vnode ioctl routine. */ static int -vn_ioctl(fp, com, data, td) +vn_ioctl(fp, com, data, active_cred, td) struct file *fp; u_long com; void *data; + struct ucred *active_cred; struct thread *td; { register struct vnode *vp = ((struct vnode *)fp->f_data); @@ -738,7 +739,7 @@ vn_ioctl(fp, com, data, td) case VDIR: if (com == FIONREAD) { vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); - error = VOP_GETATTR(vp, &vattr, td->td_ucred, td); + error = VOP_GETATTR(vp, &vattr, active_cred, td); VOP_UNLOCK(vp, 0, td); if (error) return (error); @@ -762,7 +763,7 @@ vn_ioctl(fp, com, data, td) *(int *)data = devsw(vp->v_rdev)->d_flags & D_TYPEMASK; return (0); } - error = VOP_IOCTL(vp, com, data, fp->f_flag, td->td_ucred, td); + error = VOP_IOCTL(vp, com, data, fp->f_flag, active_cred, td); if (error == 0 && com == TIOCSCTTY) { /* Do nothing if reassigning same control tty */ |