diff --git a/sys/compat/linux/linux_uid16.c b/sys/compat/linux/linux_uid16.c new file mode 100644 index 000000000000..c6a1c125b28e --- /dev/null +++ b/sys/compat/linux/linux_uid16.c @@ -0,0 +1,285 @@ +/*- + * Copyright (c) 2001 The FreeBSD Project + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + * + * $FreeBSD$ + */ + +#include "opt_compat.h" + +#include +#include +#include +#include + +#include +#include +#include + +DUMMY(setfsuid16); +DUMMY(setfsgid16); +DUMMY(getresuid16); +DUMMY(getresgid16); + +int +linux_chown16(struct proc *p, struct linux_chown16_args *args) +{ + struct chown_args bsd; + caddr_t sg; + + sg = stackgap_init(); + CHECKALTEXIST(p, &sg, args->path); + +#ifdef DEBUG + if (ldebug(chown16)) + printf(ARGS(chown16, "%s, %d, %d"), args->path, args->uid, + args->gid); +#endif + + bsd.path = args->path; + bsd.uid = args->uid; + bsd.gid = args->gid; + return (chown(p, &bsd)); +} + +int +linux_lchown16(struct proc *p, struct linux_lchown16_args *args) +{ + struct lchown_args bsd; + caddr_t sg; + + sg = stackgap_init(); + CHECKALTEXIST(p, &sg, args->path); + +#ifdef DEBUG + if (ldebug(lchown16)) + printf(ARGS(lchown16, "%s, %d, %d"), args->path, args->uid, + args->gid); +#endif + + bsd.path = args->path; + bsd.uid = args->uid; + bsd.gid = args->gid; + return (lchown(p, &bsd)); +} + +int +linux_setgroups16(struct proc *p, struct linux_setgroups16_args *args) +{ + struct ucred *newcred, *oldcred; + l_gid16_t linux_gidset[NGROUPS]; + gid_t *bsd_gidset; + int ngrp, error; + +#ifdef DEBUG + if (ldebug(setgroups16)) + printf(ARGS(setgroups16, "%d, *"), args->gidsetsize); +#endif + + ngrp = args->gidsetsize; + oldcred = p->p_ucred; + + /* + * cr_groups[0] holds egid. Setting the whole set from + * the supplied set will cause egid to be changed too. + * Keep cr_groups[0] unchanged to prevent that. + */ + + if ((error = suser_xxx(oldcred, NULL, PRISON_ROOT)) != 0) + return (error); + + if (ngrp >= NGROUPS) + return (EINVAL); + + newcred = crdup(oldcred); + if (ngrp > 0) { + error = copyin((caddr_t)args->gidset, linux_gidset, + ngrp * sizeof(l_gid16_t)); + if (error) + return (error); + + newcred->cr_ngroups = ngrp + 1; + + bsd_gidset = newcred->cr_groups; + ngrp--; + while (ngrp >= 0) { + bsd_gidset[ngrp + 1] = linux_gidset[ngrp]; + ngrp--; + } + } + else + newcred->cr_ngroups = 1; + + setsugid(p); + p->p_ucred = newcred; + crfree(oldcred); + return (0); +} + +int +linux_getgroups16(struct proc *p, struct linux_getgroups16_args *args) +{ + struct ucred *cred; + l_gid16_t linux_gidset[NGROUPS]; + gid_t *bsd_gidset; + int bsd_gidsetsz, ngrp, error; + +#ifdef DEBUG + if (ldebug(getgroups16)) + printf(ARGS(getgroups16, "%d, *"), args->gidsetsize); +#endif + + cred = p->p_ucred; + bsd_gidset = cred->cr_groups; + bsd_gidsetsz = cred->cr_ngroups - 1; + + /* + * cr_groups[0] holds egid. Returning the whole set + * here will cause a duplicate. Exclude cr_groups[0] + * to prevent that. + */ + + if ((ngrp = args->gidsetsize) == 0) { + p->p_retval[0] = bsd_gidsetsz; + return (0); + } + + if (ngrp < bsd_gidsetsz) + return (EINVAL); + + ngrp = 0; + while (ngrp < bsd_gidsetsz) { + linux_gidset[ngrp] = bsd_gidset[ngrp + 1]; + ngrp++; + } + + error = copyout(linux_gidset, (caddr_t)args->gidset, + ngrp * sizeof(l_gid16_t)); + if (error) + return (error); + + p->p_retval[0] = ngrp; + return (0); +} + +/* + * The FreeBSD native getgid(2) and getuid(2) also modify p->p_retval[1] + * when COMPAT_43 or COMPAT_SUNOS is defined. This globbers registers that + * are assumed to be preserved. The following lightweight syscalls fixes + * this. See also linux_getpid(2), linux_getgid(2) and linux_getuid(2) in + * linux_misc.c + * + * linux_getgid16() - MP SAFE + * linux_getuid16() - MP SAFE + */ + +int +linux_getgid16(struct proc *p, struct linux_getgid16_args *args) +{ + p->p_retval[0] = p->p_ucred->cr_rgid; + return (0); +} + +int +linux_getuid16(struct proc *p, struct linux_getuid16_args *args) +{ + p->p_retval[0] = p->p_ucred->cr_ruid; + return (0); +} + +int +linux_getegid16(struct proc *p, struct linux_getegid16_args *args) +{ + struct getegid_args bsd; + + return (getegid(p, &bsd)); +} + +int +linux_geteuid16(struct proc *p, struct linux_geteuid16_args *args) +{ + struct geteuid_args bsd; + + return (geteuid(p, &bsd)); +} + +int +linux_setgid16(struct proc *p, struct linux_setgid16_args *args) +{ + struct setgid_args bsd; + + bsd.gid = args->gid; + return (setgid(p, &bsd)); +} + +int +linux_setuid16(struct proc *p, struct linux_setuid16_args *args) +{ + struct setuid_args bsd; + + bsd.uid = args->uid; + return (setuid(p, &bsd)); +} + +int +linux_setregid16(struct proc *p, struct linux_setregid16_args *args) +{ + struct setregid_args bsd; + + bsd.rgid = args->rgid; + bsd.egid = args->egid; + return (setregid(p, &bsd)); +} + +int +linux_setreuid16(struct proc *p, struct linux_setreuid16_args *args) +{ + struct setreuid_args bsd; + + bsd.ruid = args->ruid; + bsd.euid = args->euid; + return (setreuid(p, &bsd)); +} + +int +linux_setresgid16(struct proc *p, struct linux_setresgid16_args *args) +{ + struct setresgid_args bsd; + + bsd.rgid = args->rgid; + bsd.egid = args->egid; + bsd.sgid = args->sgid; + return (setresgid(p, &bsd)); +} + +int +linux_setresuid16(struct proc *p, struct linux_setresuid16_args *args) +{ + struct setresuid_args bsd; + + bsd.ruid = args->ruid; + bsd.euid = args->euid; + bsd.suid = args->suid; + return (setresuid(p, &bsd)); +}