Somehow request.c got garbled.
This commit is contained in:
parent
f46319037b
commit
a318cd291f
1 changed files with 0 additions and 275 deletions
|
@ -1,278 +1,3 @@
|
||||||
|
|
||||||
/* This file deals with protection in the file system. It contains the code
|
|
||||||
* for four system calls that relate to protection.
|
|
||||||
*
|
|
||||||
* The entry points into this file are
|
|
||||||
* do_chmod: perform the CHMOD and FCHMOD system calls
|
|
||||||
* do_chown: perform the CHOWN and FCHOWN system calls
|
|
||||||
* do_umask: perform the UMASK system call
|
|
||||||
* do_access: perform the ACCESS system call
|
|
||||||
*
|
|
||||||
* Changes for VFS:
|
|
||||||
* Jul 2006 (Balazs Gerofi)
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include "fs.h"
|
|
||||||
#include <unistd.h>
|
|
||||||
#include <minix/callnr.h>
|
|
||||||
#include "file.h"
|
|
||||||
#include "fproc.h"
|
|
||||||
#include "param.h"
|
|
||||||
|
|
||||||
#include <minix/vfsif.h>
|
|
||||||
#include "vnode.h"
|
|
||||||
#include "vmnt.h"
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/*===========================================================================*
|
|
||||||
* do_chmod *
|
|
||||||
*===========================================================================*/
|
|
||||||
PUBLIC int do_chmod()
|
|
||||||
{
|
|
||||||
struct filp *flp;
|
|
||||||
struct vnode *vp;
|
|
||||||
int r;
|
|
||||||
uid_t uid;
|
|
||||||
gid_t gid;
|
|
||||||
mode_t new_mode;
|
|
||||||
|
|
||||||
if (call_nr == CHMOD) {
|
|
||||||
/* Perform the chmod(name, mode) system call. */
|
|
||||||
if (fetch_name(m_in.name, m_in.name_length, M3) != OK) return(err_code);
|
|
||||||
|
|
||||||
/* Request lookup */
|
|
||||||
r = lookup_vp(0 /*flags*/, 0 /*!use_realuid*/, &vp);
|
|
||||||
if (r != OK) return r;
|
|
||||||
}
|
|
||||||
else if (call_nr == FCHMOD) {
|
|
||||||
if (!(flp = get_filp(m_in.m3_i1))) return err_code;
|
|
||||||
vp= flp->filp_vno;
|
|
||||||
dup_vnode(vp);
|
|
||||||
}
|
|
||||||
else panic(__FILE__, "do_chmod called with strange call_nr", call_nr);
|
|
||||||
|
|
||||||
uid= fp->fp_effuid;
|
|
||||||
gid= fp->fp_effgid;
|
|
||||||
|
|
||||||
/* Only the owner or the super_user may change the mode of a file.
|
|
||||||
* No one may change the mode of a file on a read-only file system.
|
|
||||||
*/
|
|
||||||
if (vp->v_uid != uid && uid != SU_UID)
|
|
||||||
r = EPERM;
|
|
||||||
else
|
|
||||||
r = read_only(vp);
|
|
||||||
|
|
||||||
/* If error, return inode. */
|
|
||||||
if (r != OK) {
|
|
||||||
put_vnode(vp);
|
|
||||||
return(r);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Now make the change. Clear setgid bit if file is not in caller's grp */
|
|
||||||
if (uid != SU_UID && vp->v_gid != gid)
|
|
||||||
m_in.mode &= ~I_SET_GID_BIT;
|
|
||||||
|
|
||||||
/* Issue request */
|
|
||||||
r = req_chmod(vp->v_fs_e, vp->v_inode_nr, m_in.mode, &new_mode);
|
|
||||||
|
|
||||||
if (r == OK)
|
|
||||||
vp->v_mode = new_mode;
|
|
||||||
put_vnode(vp);
|
|
||||||
|
|
||||||
return OK;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*===========================================================================*
|
|
||||||
* do_chown *
|
|
||||||
*===========================================================================*/
|
|
||||||
PUBLIC int do_chown()
|
|
||||||
{
|
|
||||||
int inode_nr;
|
|
||||||
int fs_e;
|
|
||||||
struct filp *flp;
|
|
||||||
struct vnode *vp;
|
|
||||||
int r;
|
|
||||||
uid_t uid;
|
|
||||||
gid_t gid;
|
|
||||||
mode_t new_mode;
|
|
||||||
|
|
||||||
if (call_nr == CHOWN) {
|
|
||||||
/* Perform the chmod(name, mode) system call. */
|
|
||||||
if (fetch_name(m_in.name1, m_in.name1_length, M1) != OK) return(err_code);
|
|
||||||
|
|
||||||
/* Request lookup */
|
|
||||||
r = lookup_vp(0 /*flags*/, 0 /*!use_realuid*/, &vp);
|
|
||||||
if (r != OK) return r;
|
|
||||||
}
|
|
||||||
else if (call_nr == FCHOWN) {
|
|
||||||
if (!(flp = get_filp(m_in.m1_i1))) return err_code;
|
|
||||||
vp= flp->filp_vno;
|
|
||||||
dup_vnode(vp);
|
|
||||||
}
|
|
||||||
else panic(__FILE__, "do_chmod called with strange call_nr", call_nr);
|
|
||||||
|
|
||||||
uid= fp->fp_effuid;
|
|
||||||
gid= fp->fp_effgid;
|
|
||||||
|
|
||||||
r= OK;
|
|
||||||
if (uid == SU_UID) {
|
|
||||||
/* The super user can do anything. */
|
|
||||||
} else {
|
|
||||||
/* Regular users can only change groups of their own files. */
|
|
||||||
if (vp->v_uid != uid)
|
|
||||||
r = EPERM; /* File does not belong to the caller */
|
|
||||||
if (vp->v_uid != m_in.owner)
|
|
||||||
r = EPERM; /* no giving away */
|
|
||||||
if (gid != m_in.group)
|
|
||||||
r = EPERM; /* only change to the current gid */
|
|
||||||
}
|
|
||||||
if (r != OK) {
|
|
||||||
put_vnode(vp);
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Issue request */
|
|
||||||
r = req_chown(vp->v_fs_e, vp->v_inode_nr, m_in.owner, m_in.group, &new_mode);
|
|
||||||
|
|
||||||
if(r == OK) {
|
|
||||||
vp->v_uid = m_in.owner;
|
|
||||||
vp->v_gid = m_in.group;
|
|
||||||
vp->v_mode = new_mode;
|
|
||||||
}
|
|
||||||
|
|
||||||
put_vnode(vp);
|
|
||||||
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/*===========================================================================*
|
|
||||||
* do_umask *
|
|
||||||
*===========================================================================*/
|
|
||||||
PUBLIC int do_umask()
|
|
||||||
{
|
|
||||||
/* Perform the umask(co_mode) system call. */
|
|
||||||
register mode_t r;
|
|
||||||
|
|
||||||
r = ~fp->fp_umask; /* set 'r' to complement of old mask */
|
|
||||||
fp->fp_umask = ~(m_in.co_mode & RWX_MODES);
|
|
||||||
return(r); /* return complement of old mask */
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/*===========================================================================*
|
|
||||||
* do_access *
|
|
||||||
*===========================================================================*/
|
|
||||||
PUBLIC int do_access()
|
|
||||||
{
|
|
||||||
/* Perform the access(name, mode) system call. */
|
|
||||||
int r;
|
|
||||||
struct vnode *vp;
|
|
||||||
|
|
||||||
/* First check to see if the mode is correct. */
|
|
||||||
if ( (m_in.mode & ~(R_OK | W_OK | X_OK)) != 0 && m_in.mode != F_OK)
|
|
||||||
return(EINVAL);
|
|
||||||
|
|
||||||
if (fetch_name(m_in.name, m_in.name_length, M3) != OK) return(err_code);
|
|
||||||
|
|
||||||
/* Request lookup */
|
|
||||||
r = lookup_vp(0 /*flags*/, TRUE /*use_realuid*/, &vp);
|
|
||||||
if (r != OK) return r;
|
|
||||||
|
|
||||||
r= forbidden(vp, m_in.mode, 1 /*use_realuid*/);
|
|
||||||
put_vnode(vp);
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/*===========================================================================*
|
|
||||||
* forbidden *
|
|
||||||
*===========================================================================*/
|
|
||||||
PUBLIC int forbidden(struct vnode *vp, mode_t access_desired, int use_realuid)
|
|
||||||
{
|
|
||||||
/* Given a pointer to an inode, 'rip', and the access desired, determine
|
|
||||||
* if the access is allowed, and if not why not. The routine looks up the
|
|
||||||
* caller's uid in the 'fproc' table. If access is allowed, OK is returned
|
|
||||||
* if it is forbidden, EACCES is returned.
|
|
||||||
*/
|
|
||||||
|
|
||||||
register struct super_block *sp;
|
|
||||||
register mode_t bits, perm_bits;
|
|
||||||
uid_t uid;
|
|
||||||
gid_t gid;
|
|
||||||
int r, shift, type;
|
|
||||||
|
|
||||||
if (vp->v_uid == (uid_t)-1 || vp->v_gid == (gid_t)-1)
|
|
||||||
{
|
|
||||||
printf("forbidden: bad uid/gid in vnode: inode %d on dev 0x%x\n",
|
|
||||||
vp->v_inode_nr, vp->v_dev);
|
|
||||||
printf("forbidden: last allocated at %s, %d\n", vp->v_file, vp->v_line);
|
|
||||||
return EACCES;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Isolate the relevant rwx bits from the mode. */
|
|
||||||
bits = vp->v_mode;
|
|
||||||
if (use_realuid)
|
|
||||||
{
|
|
||||||
uid= fp->fp_realuid;
|
|
||||||
gid= fp->fp_realgid;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
uid= fp->fp_effuid;
|
|
||||||
gid= fp->fp_effgid;
|
|
||||||
}
|
|
||||||
if (uid == SU_UID) {
|
|
||||||
/* Grant read and write permission. Grant search permission for
|
|
||||||
* directories. Grant execute permission (for non-directories) if
|
|
||||||
* and only if one of the 'X' bits is set.
|
|
||||||
*/
|
|
||||||
if ( (bits & I_TYPE) == I_DIRECTORY ||
|
|
||||||
bits & ((X_BIT << 6) | (X_BIT << 3) | X_BIT))
|
|
||||||
perm_bits = R_BIT | W_BIT | X_BIT;
|
|
||||||
else
|
|
||||||
perm_bits = R_BIT | W_BIT;
|
|
||||||
} else {
|
|
||||||
if (uid == vp->v_uid) shift = 6; /* owner */
|
|
||||||
else if (gid == vp->v_gid ) shift = 3; /* group */
|
|
||||||
else shift = 0; /* other */
|
|
||||||
perm_bits = (bits >> shift) & (R_BIT | W_BIT | X_BIT);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* If access desired is not a subset of what is allowed, it is refused. */
|
|
||||||
r = OK;
|
|
||||||
if ((perm_bits | access_desired) != perm_bits) {
|
|
||||||
r = EACCES;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Check to see if someone is trying to write on a file system that is
|
|
||||||
* mounted read-only.
|
|
||||||
*/
|
|
||||||
if (r == OK)
|
|
||||||
if (access_desired & W_BIT)
|
|
||||||
r = read_only(vp);
|
|
||||||
|
|
||||||
return(r);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/*===========================================================================*
|
|
||||||
* read_only *
|
|
||||||
*===========================================================================*/
|
|
||||||
PUBLIC int read_only(vp)
|
|
||||||
struct vnode *vp; /* ptr to inode whose file sys is to be cked */
|
|
||||||
{
|
|
||||||
/* Check to see if the file system on which the inode 'ip' resides is mounted
|
|
||||||
* read only. If so, return EROFS, else return OK.
|
|
||||||
*/
|
|
||||||
register struct vmnt *mp;
|
|
||||||
|
|
||||||
mp = vp->v_vmnt;
|
|
||||||
return(mp->m_flags ? EROFS : OK);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/* This file contains the wrapper functions for issueing a request
|
/* This file contains the wrapper functions for issueing a request
|
||||||
* and receiving response from FS processes.
|
* and receiving response from FS processes.
|
||||||
* Each function builds a request message according to the request
|
* Each function builds a request message according to the request
|
||||||
|
|
Loading…
Reference in a new issue