1994-09-13 15:47:38 +01:00
|
|
|
/* $NetBSD: sysv_ipc.c,v 1.7 1994/06/29 06:33:11 cgd Exp $ */
|
2005-01-06 23:35:40 +00:00
|
|
|
/*-
|
1994-09-13 15:47:38 +01:00
|
|
|
* Copyright (c) 1994 Herb Peyerl <hpeyerl@novatel.ca>
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by Herb Peyerl.
|
|
|
|
* 4. The name of Herb Peyerl may not be used to endorse or promote products
|
|
|
|
* derived from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2003-06-11 01:56:59 +01:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
1996-01-05 16:38:03 +00:00
|
|
|
#include "opt_sysvipc.h"
|
|
|
|
|
1994-09-13 15:47:38 +01:00
|
|
|
#include <sys/param.h>
|
2000-10-29 16:06:56 +00:00
|
|
|
#include <sys/systm.h>
|
2000-12-01 08:57:47 +00:00
|
|
|
#include <sys/sem.h>
|
|
|
|
#include <sys/shm.h>
|
1996-01-08 04:30:48 +00:00
|
|
|
#include <sys/ipc.h>
|
1999-04-27 13:21:16 +01:00
|
|
|
#include <sys/proc.h>
|
1997-11-18 12:52:10 +00:00
|
|
|
#include <sys/ucred.h>
|
1996-01-08 04:30:48 +00:00
|
|
|
|
2000-12-01 08:57:47 +00:00
|
|
|
void (*shmfork_hook)(struct proc *, struct proc *) = NULL;
|
2003-01-13 23:04:32 +00:00
|
|
|
void (*shmexit_hook)(struct vmspace *) = NULL;
|
2000-12-01 08:57:47 +00:00
|
|
|
|
|
|
|
/* called from kern_fork.c */
|
|
|
|
void
|
|
|
|
shmfork(p1, p2)
|
|
|
|
struct proc *p1, *p2;
|
|
|
|
{
|
|
|
|
|
|
|
|
if (shmfork_hook != NULL)
|
|
|
|
shmfork_hook(p1, p2);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* called from kern_exit.c */
|
|
|
|
void
|
2003-01-13 23:04:32 +00:00
|
|
|
shmexit(struct vmspace *vm)
|
2000-12-01 08:57:47 +00:00
|
|
|
{
|
|
|
|
|
|
|
|
if (shmexit_hook != NULL)
|
2003-01-13 23:04:32 +00:00
|
|
|
shmexit_hook(vm);
|
2000-12-01 08:57:47 +00:00
|
|
|
return;
|
|
|
|
}
|
1994-09-13 15:47:38 +01:00
|
|
|
|
|
|
|
/*
|
2004-10-22 13:12:40 +01:00
|
|
|
* Check for IPC permission.
|
|
|
|
*
|
|
|
|
* Note: The MAC Framework does not require any modifications to the
|
|
|
|
* ipcperm() function, as access control checks are performed throughout the
|
|
|
|
* implementation of each primitive. Those entry point calls complement the
|
|
|
|
* ipcperm() discertionary checks.
|
1994-09-13 15:47:38 +01:00
|
|
|
*/
|
|
|
|
int
|
2001-09-12 09:38:13 +01:00
|
|
|
ipcperm(td, perm, mode)
|
|
|
|
struct thread *td;
|
1994-09-13 15:47:38 +01:00
|
|
|
struct ipc_perm *perm;
|
|
|
|
int mode;
|
|
|
|
{
|
2002-02-27 18:32:23 +00:00
|
|
|
struct ucred *cred = td->td_ucred;
|
2003-06-01 00:31:51 +01:00
|
|
|
int error;
|
1994-09-13 15:47:38 +01:00
|
|
|
|
|
|
|
if (cred->cr_uid != perm->cuid && cred->cr_uid != perm->uid) {
|
2003-06-01 00:31:51 +01:00
|
|
|
/*
|
|
|
|
* For a non-create/owner, we require privilege to
|
|
|
|
* modify the object protections. Note: some other
|
|
|
|
* implementations permit IPC_M to be delegated to
|
|
|
|
* unprivileged non-creator/owner uids/gids.
|
|
|
|
*/
|
|
|
|
if (mode & IPC_M) {
|
|
|
|
error = suser(td);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Try to match against creator/owner group; if not, fall
|
|
|
|
* back on other.
|
|
|
|
*/
|
1994-09-13 15:47:38 +01:00
|
|
|
mode >>= 3;
|
|
|
|
if (!groupmember(perm->gid, cred) &&
|
|
|
|
!groupmember(perm->cgid, cred))
|
|
|
|
mode >>= 3;
|
2003-06-01 00:31:51 +01:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Always permit the creator/owner to update the object
|
|
|
|
* protections regardless of whether the object mode
|
|
|
|
* permits it.
|
|
|
|
*/
|
|
|
|
if (mode & IPC_M)
|
|
|
|
return (0);
|
1994-09-13 15:47:38 +01:00
|
|
|
}
|
|
|
|
|
2003-06-01 00:17:30 +01:00
|
|
|
if ((mode & perm->mode) != mode) {
|
|
|
|
if (suser(td) != 0)
|
|
|
|
return (EACCES);
|
|
|
|
}
|
|
|
|
return (0);
|
1994-09-13 15:47:38 +01:00
|
|
|
}
|