xref: /netbsd-src/sys/compat/linux/common/linux_uid16.c (revision 267197ec1eebfcb9810ea27a89625b6ddf68e3e7)
1 /*	$NetBSD: linux_uid16.c,v 1.1 2008/01/15 22:38:35 njoly Exp $	*/
2 
3 /*-
4  * Copyright (c) 1995, 1998 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Frank van der Linden and Eric Haszlakiewicz.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. All advertising materials mentioning features or use of this software
19  *    must display the following acknowledgement:
20  *	This product includes software developed by the NetBSD
21  *	Foundation, Inc. and its contributors.
22  * 4. Neither the name of The NetBSD Foundation nor the names of its
23  *    contributors may be used to endorse or promote products derived
24  *    from this software without specific prior written permission.
25  *
26  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36  * POSSIBILITY OF SUCH DAMAGE.
37  */
38 
39 #include <sys/cdefs.h>
40 __KERNEL_RCSID(0, "$NetBSD: linux_uid16.c,v 1.1 2008/01/15 22:38:35 njoly Exp $");
41 
42 #include <sys/param.h>
43 #include <sys/proc.h>
44 #include <sys/kauth.h>
45 #include <sys/syscallargs.h>
46 
47 #include <compat/linux/common/linux_types.h>
48 #include <compat/linux/common/linux_signal.h>
49 #include <compat/linux/linux_syscallargs.h>
50 
51 #define LINUXTOBSD_UID(u) \
52 	(((u) == (linux_uid16_t)-1) ? -1 : (u))
53 #define LINUXTOBSD_GID(g) \
54 	(((g) == (linux_gid16_t)-1) ? -1 : (g))
55 
56 #define BSDTOLINUX_UID(u) \
57 	(((u) & ~0xffff) ? (linux_uid16_t)65534 : (linux_uid16_t)(u))
58 #define BSDTOLINUX_GID(g) \
59 	(((g) & ~0xffff) ? (linux_gid16_t)65534 : (linux_gid16_t)(g))
60 
61 #ifndef COMPAT_LINUX32
62 int
63 linux_sys_chown16(struct lwp *l, const struct linux_sys_chown16_args *uap, register_t *retval)
64 {
65 	/* {
66 		syscallarg(const char *) path;
67 		syscallarg(linux_uid16_t) uid;
68 		syscallarg(linux_gid16_t) gid;
69 	} */
70 	struct sys___posix_chown_args bca;
71 
72 	SCARG(&bca, path) = SCARG(uap, path);
73 	SCARG(&bca, uid) = LINUXTOBSD_UID(SCARG(uap, uid));
74 	SCARG(&bca, gid) = LINUXTOBSD_GID(SCARG(uap, gid));
75 
76 	return sys___posix_chown(l, &bca, retval);
77 }
78 
79 int
80 linux_sys_fchown16(struct lwp *l, const struct linux_sys_fchown16_args *uap, register_t *retval)
81 {
82 	/* {
83 		syscallarg(int) fd;
84 		syscallarg(linux_uid16_t) uid;
85 		syscallarg(linux_gid16_t) gid;
86 	} */
87 	struct sys___posix_fchown_args bfa;
88 
89 	SCARG(&bfa, fd) = SCARG(uap, fd);
90 	SCARG(&bfa, uid) = LINUXTOBSD_UID(SCARG(uap, uid));
91 	SCARG(&bfa, gid) = LINUXTOBSD_GID(SCARG(uap, gid));
92 
93 	return sys___posix_fchown(l, &bfa, retval);
94 }
95 
96 int
97 linux_sys_lchown16(struct lwp *l, const struct linux_sys_lchown16_args *uap, register_t *retval)
98 {
99 	/* {
100 		syscallarg(char *) path;
101 		syscallarg(linux_uid16_t) uid;
102 		syscallarg(linux_gid16_t) gid;
103 	} */
104 	struct sys___posix_lchown_args bla;
105 
106 	SCARG(&bla, path) = SCARG(uap, path);
107 	SCARG(&bla, uid) = LINUXTOBSD_UID(SCARG(uap, uid));
108 	SCARG(&bla, gid) = LINUXTOBSD_GID(SCARG(uap, gid));
109 
110 	return sys___posix_lchown(l, &bla, retval);
111 }
112 
113 int
114 linux_sys_setreuid16(struct lwp *l, const struct linux_sys_setreuid16_args *uap, register_t *retval)
115 {
116 	/* {
117 		syscallarg(linux_uid16_t) ruid;
118 		syscallarg(linux_uid16_t) euid;
119 	} */
120 	struct sys_setreuid_args bsa;
121 
122 	SCARG(&bsa, ruid) = LINUXTOBSD_UID(SCARG(uap, ruid));
123 	SCARG(&bsa, euid) = LINUXTOBSD_UID(SCARG(uap, euid));
124 
125 	return sys_setreuid(l, &bsa, retval);
126 }
127 
128 int
129 linux_sys_setregid16(struct lwp *l, const struct linux_sys_setregid16_args *uap, register_t *retval)
130 {
131 	/* {
132 		syscallarg(linux_gid16_t) rgid;
133 		syscallarg(linux_gid16_t) egid;
134 	} */
135 	struct sys_setregid_args bsa;
136 
137 	SCARG(&bsa, rgid) = LINUXTOBSD_GID(SCARG(uap, rgid));
138 	SCARG(&bsa, egid) = LINUXTOBSD_GID(SCARG(uap, egid));
139 
140 	return sys_setregid(l, &bsa, retval);
141 }
142 
143 int
144 linux_sys_setresuid16(struct lwp *l, const struct linux_sys_setresuid16_args *uap, register_t *retval)
145 {
146 	/* {
147 		syscallarg(linux_uid16_t) ruid;
148 		syscallarg(linux_uid16_t) euid;
149 		syscallarg(linux_uid16_t) suid;
150 	} */
151 	struct linux_sys_setresuid_args lsa;
152 
153 	SCARG(&lsa, ruid) = LINUXTOBSD_UID(SCARG(uap, ruid));
154 	SCARG(&lsa, euid) = LINUXTOBSD_UID(SCARG(uap, euid));
155 	SCARG(&lsa, suid) = LINUXTOBSD_UID(SCARG(uap, suid));
156 
157 	return linux_sys_setresuid(l, &lsa, retval);
158 }
159 
160 int
161 linux_sys_setresgid16(struct lwp *l, const struct linux_sys_setresgid16_args *uap, register_t *retval)
162 {
163 	/* {
164 		syscallarg(linux_gid16_t) rgid;
165 		syscallarg(linux_gid16_t) egid;
166 		syscallarg(linux_gid16_t) sgid;
167 	} */
168 	struct linux_sys_setresgid_args lsa;
169 
170 	SCARG(&lsa, rgid) = LINUXTOBSD_GID(SCARG(uap, rgid));
171 	SCARG(&lsa, egid) = LINUXTOBSD_GID(SCARG(uap, egid));
172 	SCARG(&lsa, sgid) = LINUXTOBSD_GID(SCARG(uap, sgid));
173 
174 	return linux_sys_setresgid(l, &lsa, retval);
175 }
176 
177 int
178 linux_sys_getresuid16(struct lwp *l, const struct linux_sys_getresuid16_args *uap, register_t *retval)
179 {
180 	/* {
181 		syscallarg(linux_uid16_t) ruid;
182 		syscallarg(linux_uid16_t) euid;
183 		syscallarg(linux_uid16_t) suid;
184 	} */
185 	kauth_cred_t pc = l->l_cred;
186 	int error;
187 	uid_t buid;
188 	linux_uid16_t luid;
189 
190 	buid = kauth_cred_getuid(pc);
191 	luid = BSDTOLINUX_UID(buid);
192 	if ((error = copyout(&luid, SCARG(uap, ruid), sizeof(luid))) != 0)
193 		return error;
194 
195 	buid = kauth_cred_geteuid(pc);
196 	luid = BSDTOLINUX_UID(buid);
197 	if ((error = copyout(&luid, SCARG(uap, euid), sizeof(luid))) != 0)
198 		return error;
199 
200 	buid = kauth_cred_getsvuid(pc);
201 	luid = BSDTOLINUX_UID(buid);
202 	return (copyout(&luid, SCARG(uap, suid), sizeof(luid)));
203 }
204 
205 int
206 linux_sys_getresgid16(struct lwp *l, const struct linux_sys_getresgid16_args *uap, register_t *retval)
207 {
208 	/* {
209 		syscallarg(linux_gid16_t) rgid;
210 		syscallarg(linux_gid16_t) egid;
211 		syscallarg(linux_gid16_t) sgid;
212 	} */
213 	kauth_cred_t pc = l->l_cred;
214 	int error;
215 	gid_t bgid;
216 	linux_gid16_t lgid;
217 
218 	bgid = kauth_cred_getgid(pc);
219 	lgid = BSDTOLINUX_GID(bgid);
220 	if ((error = copyout(&lgid, SCARG(uap, rgid), sizeof(lgid))) != 0)
221 		return error;
222 
223 	bgid = kauth_cred_getegid(pc);
224 	lgid = BSDTOLINUX_GID(bgid);
225 	if ((error = copyout(&lgid, SCARG(uap, egid), sizeof(lgid))) != 0)
226 		return error;
227 
228 	bgid = kauth_cred_getsvgid(pc);
229 	lgid = BSDTOLINUX_GID(bgid);
230 	return (copyout(&lgid, SCARG(uap, sgid), sizeof(lgid)));
231 }
232 #endif /* !COMPAT_LINUX32 */
233 
234 int
235 linux_sys_getgroups16(struct lwp *l, const struct linux_sys_getgroups16_args *uap, register_t *retval)
236 {
237 	/* {
238 		syscallarg(int) gidsetsize;
239 		syscallarg(linux_gid16_t *) gidset;
240 	} */
241 	linux_gid16_t lset[16];
242 	linux_gid16_t *gidset;
243 	unsigned int ngrps;
244 	int i, n, j;
245 	int error;
246 
247 	ngrps = kauth_cred_ngroups(l->l_cred);
248 	*retval = ngrps;
249 	if (SCARG(uap, gidsetsize) == 0)
250 		return 0;
251 	if (SCARG(uap, gidsetsize) < ngrps)
252 		return EINVAL;
253 
254 	gidset = SCARG(uap, gidset);
255 	for (i = 0; i < (n = ngrps); i += n, gidset += n) {
256 		n -= i;
257 		if (n > __arraycount(lset))
258 			n = __arraycount(lset);
259 		for (j = 0; j < n; j++)
260 			lset[j] = kauth_cred_group(l->l_cred, i + j);
261 		error = copyout(lset, gidset, n * sizeof(lset[0]));
262 		if (error != 0)
263 			return error;
264 	}
265 
266 	return 0;
267 }
268 
269 /*
270  * It is very unlikly that any problem using 16bit groups is written
271  * to allow for more than 16 of them, so don't bother trying to
272  * support that.
273  */
274 #define COMPAT_NGROUPS16 16
275 
276 int
277 linux_sys_setgroups16(struct lwp *l, const struct linux_sys_setgroups16_args *uap, register_t *retval)
278 {
279 	/* {
280 		syscallarg(int) gidsetsize;
281 		syscallarg(linux_gid16_t *) gidset;
282 	} */
283 	linux_gid16_t lset[COMPAT_NGROUPS16];
284 	kauth_cred_t ncred;
285 	int error;
286 	gid_t grbuf[COMPAT_NGROUPS16];
287 	unsigned int i, ngroups = SCARG(uap, gidsetsize);
288 
289 	if (ngroups > COMPAT_NGROUPS16)
290 		return EINVAL;
291 	error = copyin(SCARG(uap, gidset), lset, ngroups);
292 	if (error != 0)
293 		return error;
294 
295 	for (i = 0; i < ngroups; i++)
296 		grbuf[i] = lset[i];
297 
298 	ncred = kauth_cred_alloc();
299 	error = kauth_cred_setgroups(ncred, grbuf, SCARG(uap, gidsetsize),
300 	    -1, UIO_SYSSPACE);
301 	if (error != 0) {
302 		kauth_cred_free(ncred);
303 		return error;
304 	}
305 
306 	return kauth_proc_setgroups(l, ncred);
307 }
308