Module Name:    src
Committed By:   christos
Date:           Tue Sep 21 15:07:43 UTC 2021

Modified Files:
        src/sys/netinet6: ip6_output.c

Log Message:
don't opencode kauth_cred_get()


To generate a diff of this commit:
cvs rdiff -u -r1.228 -r1.229 src/sys/netinet6/ip6_output.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/netinet6/ip6_output.c
diff -u src/sys/netinet6/ip6_output.c:1.228 src/sys/netinet6/ip6_output.c:1.229
--- src/sys/netinet6/ip6_output.c:1.228	Tue Aug 17 18:00:32 2021
+++ src/sys/netinet6/ip6_output.c	Tue Sep 21 11:07:43 2021
@@ -1,4 +1,4 @@
-/*	$NetBSD: ip6_output.c,v 1.228 2021/08/17 22:00:32 andvar Exp $	*/
+/*	$NetBSD: ip6_output.c,v 1.229 2021/09/21 15:07:43 christos Exp $	*/
 /*	$KAME: ip6_output.c,v 1.172 2001/03/25 09:55:56 itojun Exp $	*/
 
 /*
@@ -62,7 +62,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ip6_output.c,v 1.228 2021/08/17 22:00:32 andvar Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ip6_output.c,v 1.229 2021/09/21 15:07:43 christos Exp $");
 
 #ifdef _KERNEL_OPT
 #include "opt_inet.h"
@@ -1361,7 +1361,8 @@ ip6_ctloutput(int op, struct socket *so,
 		case IPV6_RECVHOPOPTS:
 		case IPV6_RECVDSTOPTS:
 		case IPV6_RECVRTHDRDSTOPTS:
-			error = kauth_authorize_network(kauth_cred_get(),
+			error = kauth_authorize_network(
+			    kauth_cred_get(),
 			    KAUTH_NETWORK_IPV6, KAUTH_REQ_NETWORK_IPV6_HOPBYHOP,
 			    NULL, NULL, NULL);
 			if (error)
@@ -1612,8 +1613,8 @@ else 					\
 				 * Check super-user privilege.
 				 * See comments for IPV6_RECVHOPOPTS.
 				 */
-				error =
-				    kauth_authorize_network(kauth_cred_get(),
+				error = kauth_authorize_network(
+				    kauth_cred_get(),
 				    KAUTH_NETWORK_IPV6,
 				    KAUTH_REQ_NETWORK_IPV6_HOPBYHOP, NULL,
 				    NULL, NULL);
@@ -1622,8 +1623,8 @@ else 					\
 				OPTSET2292(IN6P_HOPOPTS);
 				break;
 			case IPV6_2292DSTOPTS:
-				error =
-				    kauth_authorize_network(kauth_cred_get(),
+				error = kauth_authorize_network(
+				    kauth_cred_get(),
 				    KAUTH_NETWORK_IPV6,
 				    KAUTH_REQ_NETWORK_IPV6_HOPBYHOP, NULL,
 				    NULL, NULL);
@@ -2358,7 +2359,8 @@ ip6_get_membership(const struct sockopt 
 		 * all multicast addresses. Only super user is allowed
 		 * to do this.
 		 */
-		if (kauth_authorize_network(curlwp->l_cred, KAUTH_NETWORK_IPV6,
+		if (kauth_authorize_network(kauth_cred_get(),
+		    KAUTH_NETWORK_IPV6,
 		    KAUTH_REQ_NETWORK_IPV6_JOIN_MULTICAST, NULL, NULL, NULL))
 			return EACCES;
 	} else if (IN6_IS_ADDR_V4MAPPED(ia)) {
@@ -2973,7 +2975,8 @@ ip6_setpktopt(int optname, u_char *buf, 
 	case IPV6_2292NEXTHOP:
 #endif
 	case IPV6_NEXTHOP:
-		error = kauth_authorize_network(cred, KAUTH_NETWORK_IPV6,
+		error = kauth_authorize_network(cred,
+		    KAUTH_NETWORK_IPV6,
 		    KAUTH_REQ_NETWORK_IPV6_HOPBYHOP, NULL, NULL, NULL);
 		if (error)
 			return (error);
@@ -3031,7 +3034,8 @@ ip6_setpktopt(int optname, u_char *buf, 
 		 * options, since per-option restriction has too much
 		 * overhead.
 		 */
-		error = kauth_authorize_network(cred, KAUTH_NETWORK_IPV6,
+		error = kauth_authorize_network(cred,
+		    KAUTH_NETWORK_IPV6,
 		    KAUTH_REQ_NETWORK_IPV6_HOPBYHOP, NULL, NULL, NULL);
 		if (error)
 			return (error);
@@ -3069,7 +3073,8 @@ ip6_setpktopt(int optname, u_char *buf, 
 		int destlen;
 
 		/* XXX: see the comment for IPV6_HOPOPTS */
-		error = kauth_authorize_network(cred, KAUTH_NETWORK_IPV6,
+		error = kauth_authorize_network(cred,
+		    KAUTH_NETWORK_IPV6,
 		    KAUTH_REQ_NETWORK_IPV6_HOPBYHOP, NULL, NULL, NULL);
 		if (error)
 			return (error);

Reply via email to