diff options
author | Emilio Pozuelo Monfort <pochu27@gmail.com> | 2010-05-26 01:27:40 +0200 |
---|---|---|
committer | Samuel Thibault <samuel.thibault@ens-lyon.org> | 2018-01-08 22:46:06 +0100 |
commit | 4152b0ca04f4703a6c6f33e59ba0e7bd95837069 (patch) | |
tree | e10f7b717da381cacf8a5d98087d664f271f3bba /doc | |
parent | 67fa50fb8f0a6894e5ed6534936afb8044e66613 (diff) | |
download | hurd-4152b0ca04f4703a6c6f33e59ba0e7bd95837069.tar.gz hurd-4152b0ca04f4703a6c6f33e59ba0e7bd95837069.tar.bz2 hurd-4152b0ca04f4703a6c6f33e59ba0e7bd95837069.zip |
Add a file_exec_file_name RPC
* hurd/fs.defs (file_exec): Deprecate in favor of...
(file_exec_paths): ...this new RPC.
* TODO: Update.
* doc/hurd.texi: Update RPC name.
* hurd/hurd_types.h: Update RPC name.
* libdiskfs/boot-start.c: Update RPC name.
* configure.ac: Check for presence of RPC stubs file_exec_paths exec_exec_paths.
* exec/hashexec.c (check_hashbang): When file_exec_paths is available, use it
instead of file_exec.
* startup/startup.c (run, run_for_real, start_child): Likewise.
* utils/login.c (main): Likewise.
* libfshelp/start-translator-long.c (fshelp_start_translator_long): Likewise.
* libdiskfs/file-exec.c (diskfs_S_file_exec): Move code to
new function diskfs_S_file_exec_paths and call it.
(diskfs_S_file_exec_paths): New function, use exec_exec_paths when available
instead of exec_exec
* libnetfs/file-exec.c (netfs_S_file_exec, netfs_S_file_exec_paths): Likewise.
* trans/fakeroot.c (netfs_S_file_exec, netfs_S_file_exec_paths): Likewise.
* libtrivfs/file-exec.c (trivfs_S_file_exec_paths): New function.
Diffstat (limited to 'doc')
-rw-r--r-- | doc/hurd.texi | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/doc/hurd.texi b/doc/hurd.texi index a9216d1d..e77894a3 100644 --- a/doc/hurd.texi +++ b/doc/hurd.texi @@ -2736,10 +2736,10 @@ write the file. @node Program Execution @subsection Program Execution -@findex file_exec +@findex file_exec_paths Execution of programs on the Hurd is done through fileservers with the -@code{file_exec} RPC. The fileserver is expected to verify that the -user is allowed to execute the file, make whatever modifications to the +@code{file_exec_paths} RPC. The fileserver is expected to verify that +the user is allowed to execute the file, make whatever modifications to the ports are necessary for setuid execution, and then invoke the standard execserver found on @file{/servers/exec}. @@ -2751,13 +2751,13 @@ The file must be opened for execution; if it is not, @code{EBADF} should be returned. In addition, at least one of the execute bits must be on. A failure of this check should result in @code{EACCES}---not @code{ENOEXEC}. It is not proper for the fileserver ever to respond to -the @code{file_exec} RPC with @code{ENOEXEC}. +the @code{file_exec_paths} RPC with @code{ENOEXEC}. If either the setuid or setgid bits are set, the server needs to construct a new authentication handle with the additional new ID's. -Then all the ports passed to @code{file_exec} need to be reauthenticated -with the new handle. If the fileserver is unable to make the new -authentication handle (for example, because it is not running as root) +Then all the ports passed to @code{file_exec_paths} need to be +reauthenticated with the new handle. If the fileserver is unable to make the +new authentication handle (for example, because it is not running as root) it is not acceptable to return an error; in such a case the server should simply silently fail to implement the setuid/setgid semantics. @@ -2772,7 +2772,7 @@ will not share any file pointers with the port the user passed in, opened with @code{O_READ}. Finally, all the information (mutated appropriately for setuid/setgid) should be sent to the execserver with @code{exec_exec_paths}. Whatever error code @code{exec_exec_paths} -returns should be returned to the caller of @code{file_exec}. +returns should be returned to the caller of @code{file_exec_paths}. @node File Locking @subsection File Locking |