haiku/src/system/kernel/usergroup.cpp
Ingo Weinhold 24df65921b Merged signals-merge branch into trunk with the following changes:
* Reorganized the kernel locking related to threads and teams.
* We now discriminate correctly between process and thread signals. Signal
  handlers have been moved to teams. Fixes #5679.
* Implemented real-time signal support, including signal queuing, SA_SIGINFO
  support, sigqueue(), sigwaitinfo(), sigtimedwait(), waitid(), and the addition
  of the real-time signal range. Closes #1935 and #2695.
* Gave SIGBUS a separate signal number. Fixes #6704.
* Implemented <time.h> clock and timer support, and fixed/completed alarm() and
  [set]itimer(). Closes #5682.
* Implemented support for thread cancellation. Closes #5686.
* Moved send_signal() from <signal.h> to <OS.h>. Fixes #7554.
* Lots over smaller more or less related changes.


git-svn-id: file:///srv/svn/repos/haiku/haiku/trunk@42116 a95241bf-73f2-0310-859d-f6bbb57e9c96
2011-06-12 00:00:23 +00:00

407 lines
8.8 KiB
C++

/*
* Copyright 2008-2011, Ingo Weinhold, ingo_weinhold@gmx.de.
* Distributed under the terms of the MIT License.
*/
#include <usergroup.h>
#include <errno.h>
#include <limits.h>
#include <sys/stat.h>
#include <new>
#include <heap.h>
#include <kernel.h>
#include <syscalls.h>
#include <team.h>
#include <thread.h>
#include <thread_types.h>
#include <util/AutoLock.h>
#include <vfs.h>
#include <AutoDeleter.h>
// #pragma mark - Implementation Private
static bool
is_privileged(Team* team)
{
// currently only the root user is privileged
return team->effective_uid == 0;
}
static status_t
common_setregid(gid_t rgid, gid_t egid, bool setAllIfPrivileged, bool kernel)
{
Team* team = thread_get_current_thread()->team;
TeamLocker teamLocker(team);
bool privileged = kernel || is_privileged(team);
gid_t ssgid = team->saved_set_gid;
// real gid
if (rgid == (gid_t)-1) {
rgid = team->real_gid;
} else {
if (setAllIfPrivileged) {
// setgid() semantics: If privileged set both, real, effective and
// saved set-gid, otherwise set the effective gid.
if (privileged) {
InterruptsSpinLocker schedulerLocker(gSchedulerLock);
team->saved_set_gid = rgid;
team->real_gid = rgid;
team->effective_gid = rgid;
return B_OK;
}
// not privileged -- set only the effective gid
egid = rgid;
rgid = team->real_gid;
} else {
// setregid() semantics: set the real gid, if allowed to
// Note: We allow setting the real gid to the effective gid. This
// is unspecified by the specs, but is common practice.
if (!privileged && rgid != team->real_gid
&& rgid != team->effective_gid) {
return EPERM;
}
// Note: Also common practice is to set the saved set-gid when the
// real gid is set.
if (rgid != team->real_gid)
ssgid = rgid;
}
}
// effective gid
if (egid == (gid_t)-1) {
egid = team->effective_gid;
} else {
if (!privileged && egid != team->effective_gid
&& egid != team->real_gid && egid != team->saved_set_gid) {
return EPERM;
}
}
// Getting here means all checks were successful -- set the gids.
InterruptsSpinLocker schedulerLocker(gSchedulerLock);
team->real_gid = rgid;
team->effective_gid = egid;
team->saved_set_gid = ssgid;
return B_OK;
}
static status_t
common_setreuid(uid_t ruid, uid_t euid, bool setAllIfPrivileged, bool kernel)
{
Team* team = thread_get_current_thread()->team;
TeamLocker teamLocker(team);
bool privileged = kernel || is_privileged(team);
uid_t ssuid = team->saved_set_uid;
// real uid
if (ruid == (uid_t)-1) {
ruid = team->real_uid;
} else {
if (setAllIfPrivileged) {
// setuid() semantics: If privileged set both, real, effective and
// saved set-uid, otherwise set the effective uid.
if (privileged) {
InterruptsSpinLocker schedulerLocker(gSchedulerLock);
team->saved_set_uid = ruid;
team->real_uid = ruid;
team->effective_uid = ruid;
return B_OK;
}
// not privileged -- set only the effective uid
euid = ruid;
ruid = team->real_uid;
} else {
// setreuid() semantics: set the real uid, if allowed to
// Note: We allow setting the real uid to the effective uid. This
// is unspecified by the specs, but is common practice.
if (!privileged && ruid != team->real_uid
&& ruid != team->effective_uid) {
return EPERM;
}
// Note: Also common practice is to set the saved set-uid when the
// real uid is set.
if (ruid != team->real_uid)
ssuid = ruid;
}
}
// effective uid
if (euid == (uid_t)-1) {
euid = team->effective_uid;
} else {
if (!privileged && euid != team->effective_uid
&& euid != team->real_uid && euid != team->saved_set_uid) {
return EPERM;
}
}
// Getting here means all checks were successful -- set the uids.
InterruptsSpinLocker schedulerLocker(gSchedulerLock);
team->real_uid = ruid;
team->effective_uid = euid;
team->saved_set_uid = ssuid;
return B_OK;
}
ssize_t
common_getgroups(int groupCount, gid_t* groupList, bool kernel)
{
Team* team = thread_get_current_thread()->team;
TeamLocker teamLocker(team);
const gid_t* groups = team->supplementary_groups;
int actualCount = team->supplementary_group_count;
// follow the specification and return always at least one group
if (actualCount == 0) {
groups = &team->effective_gid;
actualCount = 1;
}
// if groupCount 0 is supplied, we only return the number of groups
if (groupCount == 0)
return actualCount;
// check for sufficient space
if (groupCount < actualCount)
return B_BAD_VALUE;
// copy
if (kernel) {
memcpy(groupList, groups, actualCount);
} else {
if (!IS_USER_ADDRESS(groupList)
|| user_memcpy(groupList, groups,
actualCount * sizeof(gid_t)) != B_OK) {
return B_BAD_ADDRESS;
}
}
return actualCount;
}
static status_t
common_setgroups(int groupCount, const gid_t* groupList, bool kernel)
{
if (groupCount < 0 || groupCount > NGROUPS_MAX)
return B_BAD_VALUE;
gid_t* newGroups = NULL;
if (groupCount > 0) {
newGroups = (gid_t*)malloc_referenced(sizeof(gid_t) * groupCount);
if (newGroups == NULL)
return B_NO_MEMORY;
if (kernel) {
memcpy(newGroups, groupList, sizeof(gid_t) * groupCount);
} else {
if (!IS_USER_ADDRESS(groupList)
|| user_memcpy(newGroups, groupList,
sizeof(gid_t) * groupCount) != B_OK) {
free(newGroups);
return B_BAD_ADDRESS;
}
}
}
Team* team = thread_get_current_thread()->team;
TeamLocker teamLocker(team);
gid_t* toFree = team->supplementary_groups;
team->supplementary_groups = newGroups;
team->supplementary_group_count = groupCount;
teamLocker.Unlock();
malloc_referenced_release(toFree);
return B_OK;
}
// #pragma mark - Kernel Private
/*! Copies the user and group information from \a parent to \a team.
The caller must hold the lock to both \a team and \a parent.
*/
void
inherit_parent_user_and_group(Team* team, Team* parent)
{
InterruptsSpinLocker schedulerLocker(gSchedulerLock);
team->saved_set_uid = parent->saved_set_uid;
team->real_uid = parent->real_uid;
team->effective_uid = parent->effective_uid;
team->saved_set_gid = parent->saved_set_gid;
team->real_gid = parent->real_gid;
team->effective_gid = parent->effective_gid;
schedulerLocker.Unlock();
malloc_referenced_acquire(parent->supplementary_groups);
team->supplementary_groups = parent->supplementary_groups;
team->supplementary_group_count = parent->supplementary_group_count;
}
status_t
update_set_id_user_and_group(Team* team, const char* file)
{
struct stat st;
status_t status = vfs_read_stat(-1, file, true, &st, false);
if (status != B_OK)
return status;
TeamLocker teamLocker(team);
InterruptsSpinLocker schedulerLocker(gSchedulerLock);
if ((st.st_mode & S_ISUID) != 0) {
team->saved_set_uid = st.st_uid;
team->effective_uid = st.st_uid;
}
if ((st.st_mode & S_ISGID) != 0) {
team->saved_set_gid = st.st_gid;
team->effective_gid = st.st_gid;
}
return B_OK;
}
gid_t
_kern_getgid(bool effective)
{
Team* team = thread_get_current_thread()->team;
InterruptsSpinLocker schedulerLocker(gSchedulerLock);
return effective ? team->effective_gid : team->real_gid;
}
uid_t
_kern_getuid(bool effective)
{
Team* team = thread_get_current_thread()->team;
InterruptsSpinLocker schedulerLocker(gSchedulerLock);
return effective ? team->effective_uid : team->real_uid;
}
status_t
_kern_setregid(gid_t rgid, gid_t egid, bool setAllIfPrivileged)
{
return common_setregid(rgid, egid, setAllIfPrivileged, true);
}
status_t
_kern_setreuid(uid_t ruid, uid_t euid, bool setAllIfPrivileged)
{
return common_setreuid(ruid, euid, setAllIfPrivileged, true);
}
ssize_t
_kern_getgroups(int groupCount, gid_t* groupList)
{
return common_getgroups(groupCount, groupList, true);
}
status_t
_kern_setgroups(int groupCount, const gid_t* groupList)
{
return common_setgroups(groupCount, groupList, true);
}
// #pragma mark - Syscalls
gid_t
_user_getgid(bool effective)
{
Team* team = thread_get_current_thread()->team;
TeamLocker teamLocker(team);
return effective ? team->effective_gid : team->real_gid;
}
uid_t
_user_getuid(bool effective)
{
Team* team = thread_get_current_thread()->team;
TeamLocker teamLocker(team);
return effective ? team->effective_uid : team->real_uid;
}
status_t
_user_setregid(gid_t rgid, gid_t egid, bool setAllIfPrivileged)
{
return common_setregid(rgid, egid, setAllIfPrivileged, false);
}
status_t
_user_setreuid(uid_t ruid, uid_t euid, bool setAllIfPrivileged)
{
return common_setreuid(ruid, euid, setAllIfPrivileged, false);
}
ssize_t
_user_getgroups(int groupCount, gid_t* groupList)
{
return common_getgroups(groupCount, groupList, false);
}
ssize_t
_user_setgroups(int groupCount, const gid_t* groupList)
{
// check privilege
{
Team* team = thread_get_current_thread()->team;
TeamLocker teamLocker(team);
if (!is_privileged(team))
return EPERM;
}
return common_setgroups(groupCount, groupList, false);
}