Module Name:    src
Committed By:   njoly
Date:           Fri Jan 27 21:46:42 UTC 2012

Modified Files:
        src/sys/fs/sysvbfs: sysvbfs_vnops.c

Log Message:
Check credentials when setting uid, gid or mode attributes.


To generate a diff of this commit:
cvs rdiff -u -r1.39 -r1.40 src/sys/fs/sysvbfs/sysvbfs_vnops.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/fs/sysvbfs/sysvbfs_vnops.c
diff -u src/sys/fs/sysvbfs/sysvbfs_vnops.c:1.39 src/sys/fs/sysvbfs/sysvbfs_vnops.c:1.40
--- src/sys/fs/sysvbfs/sysvbfs_vnops.c:1.39	Mon Dec 12 19:11:21 2011
+++ src/sys/fs/sysvbfs/sysvbfs_vnops.c	Fri Jan 27 21:46:42 2012
@@ -1,4 +1,4 @@
-/*	$NetBSD: sysvbfs_vnops.c,v 1.39 2011/12/12 19:11:21 njoly Exp $	*/
+/*	$NetBSD: sysvbfs_vnops.c,v 1.40 2012/01/27 21:46:42 njoly Exp $	*/
 
 /*-
  * Copyright (c) 2004 The NetBSD Foundation, Inc.
@@ -30,7 +30,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: sysvbfs_vnops.c,v 1.39 2011/12/12 19:11:21 njoly Exp $");
+__KERNEL_RCSID(0, "$NetBSD: sysvbfs_vnops.c,v 1.40 2012/01/27 21:46:42 njoly Exp $");
 
 #include <sys/param.h>
 #include <sys/kernel.h>
@@ -331,6 +331,8 @@ sysvbfs_setattr(void *arg)
 	struct bfs_inode *inode = bnode->inode;
 	struct bfs_fileattr *attr = &inode->attr;
 	struct bfs *bfs = bnode->bmp->bfs;
+	kauth_cred_t cred = ap->a_cred;
+	int error;
 
 	DPRINTF("%s:\n", __func__);
 	if (vp->v_mount->mnt_flag & MNT_RDONLY)
@@ -342,12 +344,30 @@ sysvbfs_setattr(void *arg)
 	    ((int)vap->va_bytes != VNOVAL) || (vap->va_gen != VNOVAL))
 		return EINVAL;
 
-	if (vap->va_uid != (uid_t)VNOVAL)
-		attr->uid = vap->va_uid;
-	if (vap->va_gid != (uid_t)VNOVAL)
-		attr->gid = vap->va_gid;
-	if (vap->va_mode != (mode_t)VNOVAL)
-		attr->mode = vap->va_mode;
+	if (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (uid_t)VNOVAL) {
+		uid_t uid =
+		    (vap->va_uid != (uid_t)VNOVAL) ? vap->va_uid : attr->uid;
+		gid_t gid =
+		    (vap->va_gid != (gid_t)VNOVAL) ? vap->va_gid : attr->gid;
+		error = kauth_authorize_vnode(cred,
+		    KAUTH_VNODE_CHANGE_OWNERSHIP, vp, NULL,
+		    genfs_can_chown(vp, cred, attr->uid, attr->gid, uid, gid));
+		if (error)
+			return error;
+		attr->uid = uid;
+		attr->gid = gid;
+	}
+
+	if (vap->va_mode != (mode_t)VNOVAL) {
+		mode_t mode = vap->va_mode;
+		error = kauth_authorize_vnode(cred, KAUTH_VNODE_WRITE_SECURITY,
+		    vp, NULL, genfs_can_chmod(vp, cred, attr->uid, attr->gid,
+		    mode));
+		if (error)
+			return error;
+		attr->mode = mode;
+	}
+
 	if (vap->va_atime.tv_sec != VNOVAL)
 		attr->atime = vap->va_atime.tv_sec;
 	if (vap->va_mtime.tv_sec != VNOVAL)

Reply via email to