summaryrefslogtreecommitdiffstats
path: root/sys/compat/linux/linux_uid16.c
diff options
context:
space:
mode:
Diffstat (limited to 'sys/compat/linux/linux_uid16.c')
-rw-r--r--sys/compat/linux/linux_uid16.c285
1 files changed, 285 insertions, 0 deletions
diff --git a/sys/compat/linux/linux_uid16.c b/sys/compat/linux/linux_uid16.c
new file mode 100644
index 0000000..c6a1c12
--- /dev/null
+++ b/sys/compat/linux/linux_uid16.c
@@ -0,0 +1,285 @@
+/*-
+ * Copyright (c) 2001 The FreeBSD Project
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ *
+ * $FreeBSD$
+ */
+
+#include "opt_compat.h"
+
+#include <sys/param.h>
+#include <sys/systm.h>
+#include <sys/proc.h>
+#include <sys/sysproto.h>
+
+#include <machine/../linux/linux.h>
+#include <machine/../linux/linux_proto.h>
+#include <compat/linux/linux_util.h>
+
+DUMMY(setfsuid16);
+DUMMY(setfsgid16);
+DUMMY(getresuid16);
+DUMMY(getresgid16);
+
+int
+linux_chown16(struct proc *p, struct linux_chown16_args *args)
+{
+ struct chown_args bsd;
+ caddr_t sg;
+
+ sg = stackgap_init();
+ CHECKALTEXIST(p, &sg, args->path);
+
+#ifdef DEBUG
+ if (ldebug(chown16))
+ printf(ARGS(chown16, "%s, %d, %d"), args->path, args->uid,
+ args->gid);
+#endif
+
+ bsd.path = args->path;
+ bsd.uid = args->uid;
+ bsd.gid = args->gid;
+ return (chown(p, &bsd));
+}
+
+int
+linux_lchown16(struct proc *p, struct linux_lchown16_args *args)
+{
+ struct lchown_args bsd;
+ caddr_t sg;
+
+ sg = stackgap_init();
+ CHECKALTEXIST(p, &sg, args->path);
+
+#ifdef DEBUG
+ if (ldebug(lchown16))
+ printf(ARGS(lchown16, "%s, %d, %d"), args->path, args->uid,
+ args->gid);
+#endif
+
+ bsd.path = args->path;
+ bsd.uid = args->uid;
+ bsd.gid = args->gid;
+ return (lchown(p, &bsd));
+}
+
+int
+linux_setgroups16(struct proc *p, struct linux_setgroups16_args *args)
+{
+ struct ucred *newcred, *oldcred;
+ l_gid16_t linux_gidset[NGROUPS];
+ gid_t *bsd_gidset;
+ int ngrp, error;
+
+#ifdef DEBUG
+ if (ldebug(setgroups16))
+ printf(ARGS(setgroups16, "%d, *"), args->gidsetsize);
+#endif
+
+ ngrp = args->gidsetsize;
+ oldcred = p->p_ucred;
+
+ /*
+ * cr_groups[0] holds egid. Setting the whole set from
+ * the supplied set will cause egid to be changed too.
+ * Keep cr_groups[0] unchanged to prevent that.
+ */
+
+ if ((error = suser_xxx(oldcred, NULL, PRISON_ROOT)) != 0)
+ return (error);
+
+ if (ngrp >= NGROUPS)
+ return (EINVAL);
+
+ newcred = crdup(oldcred);
+ if (ngrp > 0) {
+ error = copyin((caddr_t)args->gidset, linux_gidset,
+ ngrp * sizeof(l_gid16_t));
+ if (error)
+ return (error);
+
+ newcred->cr_ngroups = ngrp + 1;
+
+ bsd_gidset = newcred->cr_groups;
+ ngrp--;
+ while (ngrp >= 0) {
+ bsd_gidset[ngrp + 1] = linux_gidset[ngrp];
+ ngrp--;
+ }
+ }
+ else
+ newcred->cr_ngroups = 1;
+
+ setsugid(p);
+ p->p_ucred = newcred;
+ crfree(oldcred);
+ return (0);
+}
+
+int
+linux_getgroups16(struct proc *p, struct linux_getgroups16_args *args)
+{
+ struct ucred *cred;
+ l_gid16_t linux_gidset[NGROUPS];
+ gid_t *bsd_gidset;
+ int bsd_gidsetsz, ngrp, error;
+
+#ifdef DEBUG
+ if (ldebug(getgroups16))
+ printf(ARGS(getgroups16, "%d, *"), args->gidsetsize);
+#endif
+
+ cred = p->p_ucred;
+ bsd_gidset = cred->cr_groups;
+ bsd_gidsetsz = cred->cr_ngroups - 1;
+
+ /*
+ * cr_groups[0] holds egid. Returning the whole set
+ * here will cause a duplicate. Exclude cr_groups[0]
+ * to prevent that.
+ */
+
+ if ((ngrp = args->gidsetsize) == 0) {
+ p->p_retval[0] = bsd_gidsetsz;
+ return (0);
+ }
+
+ if (ngrp < bsd_gidsetsz)
+ return (EINVAL);
+
+ ngrp = 0;
+ while (ngrp < bsd_gidsetsz) {
+ linux_gidset[ngrp] = bsd_gidset[ngrp + 1];
+ ngrp++;
+ }
+
+ error = copyout(linux_gidset, (caddr_t)args->gidset,
+ ngrp * sizeof(l_gid16_t));
+ if (error)
+ return (error);
+
+ p->p_retval[0] = ngrp;
+ return (0);
+}
+
+/*
+ * The FreeBSD native getgid(2) and getuid(2) also modify p->p_retval[1]
+ * when COMPAT_43 or COMPAT_SUNOS is defined. This globbers registers that
+ * are assumed to be preserved. The following lightweight syscalls fixes
+ * this. See also linux_getpid(2), linux_getgid(2) and linux_getuid(2) in
+ * linux_misc.c
+ *
+ * linux_getgid16() - MP SAFE
+ * linux_getuid16() - MP SAFE
+ */
+
+int
+linux_getgid16(struct proc *p, struct linux_getgid16_args *args)
+{
+ p->p_retval[0] = p->p_ucred->cr_rgid;
+ return (0);
+}
+
+int
+linux_getuid16(struct proc *p, struct linux_getuid16_args *args)
+{
+ p->p_retval[0] = p->p_ucred->cr_ruid;
+ return (0);
+}
+
+int
+linux_getegid16(struct proc *p, struct linux_getegid16_args *args)
+{
+ struct getegid_args bsd;
+
+ return (getegid(p, &bsd));
+}
+
+int
+linux_geteuid16(struct proc *p, struct linux_geteuid16_args *args)
+{
+ struct geteuid_args bsd;
+
+ return (geteuid(p, &bsd));
+}
+
+int
+linux_setgid16(struct proc *p, struct linux_setgid16_args *args)
+{
+ struct setgid_args bsd;
+
+ bsd.gid = args->gid;
+ return (setgid(p, &bsd));
+}
+
+int
+linux_setuid16(struct proc *p, struct linux_setuid16_args *args)
+{
+ struct setuid_args bsd;
+
+ bsd.uid = args->uid;
+ return (setuid(p, &bsd));
+}
+
+int
+linux_setregid16(struct proc *p, struct linux_setregid16_args *args)
+{
+ struct setregid_args bsd;
+
+ bsd.rgid = args->rgid;
+ bsd.egid = args->egid;
+ return (setregid(p, &bsd));
+}
+
+int
+linux_setreuid16(struct proc *p, struct linux_setreuid16_args *args)
+{
+ struct setreuid_args bsd;
+
+ bsd.ruid = args->ruid;
+ bsd.euid = args->euid;
+ return (setreuid(p, &bsd));
+}
+
+int
+linux_setresgid16(struct proc *p, struct linux_setresgid16_args *args)
+{
+ struct setresgid_args bsd;
+
+ bsd.rgid = args->rgid;
+ bsd.egid = args->egid;
+ bsd.sgid = args->sgid;
+ return (setresgid(p, &bsd));
+}
+
+int
+linux_setresuid16(struct proc *p, struct linux_setresuid16_args *args)
+{
+ struct setresuid_args bsd;
+
+ bsd.ruid = args->ruid;
+ bsd.euid = args->euid;
+ bsd.suid = args->suid;
+ return (setresuid(p, &bsd));
+}
OpenPOWER on IntegriCloud