ea6027a8e1
fo_read() and fo_write(): explicitly use the cred argument to fo_poll() as "active_cred" using the passed file descriptor's f_cred reference to provide access to the file credential. Add an active_cred argument to fo_stat() so that implementers have access to the active credential as well as the file credential. Generally modify callers of fo_stat() to pass in td->td_ucred rather than fp->f_cred, which was redundantly provided via the fp argument. This set of modifications also permits threads to perform these operations on behalf of another thread without modifying their credential. Trickle this change down into fo_stat/poll() implementations: - badfo_poll(), badfo_stat(): modify/add arguments. - kqueue_poll(), kqueue_stat(): modify arguments. - pipe_poll(), pipe_stat(): modify/add arguments, pass active_cred to MAC checks rather than td->td_ucred. - soo_poll(), soo_stat(): modify/add arguments, pass fp->f_cred rather than cred to pru_sopoll() to maintain current semantics. - sopoll(): moidfy arguments. - vn_poll(), vn_statfile(): modify/add arguments, pass new arguments to vn_stat(). Pass active_cred to MAC and fp->f_cred to VOP_POLL() to maintian current semantics. - vn_close(): rename cred to file_cred to reflect reality while I'm here. - vn_stat(): Add active_cred and file_cred arguments to vn_stat() and consumers so that this distinction is maintained at the VFS as well as 'struct file' layer. Pass active_cred instead of td->td_ucred to MAC and to VOP_GETATTR() to maintain current semantics. - fifofs: modify the creation of a "filetemp" so that the file credential is properly initialized and can be used in the socket code if desired. Pass ap->a_td->td_ucred as the active credential to soo_poll(). If we teach the vnop interface about the distinction between file and active credentials, we would use the active credential here. Note that current inconsistent passing of active_cred vs. file_cred to VOP's is maintained. It's not clear why GETATTR would be authorized using active_cred while POLL would be authorized using file_cred at the file system level. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs |
||
---|---|---|
.. | ||
exec_ecoff.h | ||
imgact_osf1.c | ||
Makefile | ||
osf1_ioctl.c | ||
osf1_misc.c | ||
osf1_mount.c | ||
osf1_proto.h | ||
osf1_signal.c | ||
osf1_signal.h | ||
osf1_syscall.h | ||
osf1_sysent.c | ||
osf1_sysvec.c | ||
osf1_util.h | ||
osf1.h | ||
README.mach-traps | ||
syscalls.conf | ||
syscalls.master |
$NetBSD: README.mach-traps,v 1.2 1999/03/23 09:19:25 itohy Exp $ $FreeBSD$ Some Alpha AXP OSF/1 binaries directly use the facilities provided by the Mach kernel that is the basis for OSF/1. These include (but are surely not limited to) 'dd', 'ps', and 'w'. Invariably, the symptom that these binaries display is that they crash with an "unimplemented system call" trap (SIGSYS signal) for a syscall that has a negative number. In general, binaries that use the Mach syscalls appear to invoke task_self() as their first syscall. The name, number, and number of arguments for each Mach syscall is given below; this information was gleaned by looking through the OSF/1 libmach.a's object files with dbx, then double-checked against the contents of OSF/1's <mach/syscall_sw.h>. These calls would be very difficult to implement properly in the OSF/1 emulation code; by its very nature, NetBSD is not Mach, and we don't and can't provide the underlying facilities that it does. -- cgd trap name number nargs notes ---- ---- ------ ----- ----- task_self -10 0 thread_reply -11 0 task_notify -12 0 thread_self -13 0 msg_send_old -14 3 msg_receive_old -15 3 msg_rpc_old -16 5 msg_send_trap -20 4 msg_receive_trap -21 5 msg_rpc_trap -22 6 lw_wire -30 3 lw_unwire -31 1 nxm_task_init -33 2 nxm_sched_thread -34 1 nxm_idle -35 1 nxm_wakeup_idle -36 1 nxm_set_pthid -37 2 nxm_thread_kill -38 2 nxm_thread_block -39 1 nxm_thread_wakeup -40 1 inode_swap_preference -40 3 old call? init_process -41 0 map_fd -43 5 nxm_resched -44 2 htg_unix_syscall -52 3 host_self -55 1 host_priv_self -56 1 swtch_pri -59 1 swtch -60 0 thread_switch -61 3 semop_fast -62 4 mach_sctimes_0 -70 0 only if MACH_SCTIMES defined mach_sctimes_1 -71 1 only if MACH_SCTIMES defined mach_sctimes_2 -72 2 only if MACH_SCTIMES defined mach_sctimes_3 -73 3 only if MACH_SCTIMES defined mach_sctimes_4 -74 4 only if MACH_SCTIMES defined mach_sctimes_5 -75 5 only if MACH_SCTIMES defined mach_sctimes_6 -76 6 only if MACH_SCTIMES defined mach_sctimes_7 -77 0 only if MACH_SCTIMES defined mach_sctimes_8 -78 6 only if MACH_SCTIMES defined mach_sctimes_9 -79 1 only if MACH_SCTIMES defined mach_sctimes_10 -80 2 only if MACH_SCTIMES defined mach_sctimes_11 -81 2 only if MACH_SCTIMES defined mach_sctimes_port_alloc_dealloc -82 1 only if MACH_SCTIMES defined