mirror of
git://sourceware.org/git/glibc.git
synced 2024-12-21 04:31:04 +08:00
149 lines
4.0 KiB
C
149 lines
4.0 KiB
C
/* Copyright (C) 1991-2014 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library; if not, see
|
|
<http://www.gnu.org/licenses/>. */
|
|
|
|
#include <unistd.h>
|
|
#include <hurd.h>
|
|
#include <hurd/port.h>
|
|
#include <hurd/id.h>
|
|
#include <hurd/lookup.h>
|
|
#include <fcntl.h>
|
|
|
|
/* Test for access to FILE by our real user and group IDs. */
|
|
int
|
|
__access (file, type)
|
|
const char *file;
|
|
int type;
|
|
{
|
|
error_t err;
|
|
file_t rcrdir, rcwdir, io;
|
|
int flags, allowed;
|
|
|
|
error_t reauthenticate (int which, file_t *result)
|
|
{
|
|
/* Get a port to our root directory, authenticated with the real IDs. */
|
|
error_t err;
|
|
mach_port_t ref;
|
|
ref = __mach_reply_port ();
|
|
err = HURD_PORT_USE
|
|
(&_hurd_ports[which],
|
|
({
|
|
err = __io_reauthenticate (port, ref, MACH_MSG_TYPE_MAKE_SEND);
|
|
if (!err)
|
|
err = __auth_user_authenticate (_hurd_id.rid_auth,
|
|
ref, MACH_MSG_TYPE_MAKE_SEND,
|
|
result);
|
|
err;
|
|
}));
|
|
__mach_port_destroy (__mach_task_self (), ref);
|
|
return err;
|
|
}
|
|
|
|
error_t init_port (int which, error_t (*operate) (mach_port_t))
|
|
{
|
|
switch (which)
|
|
{
|
|
case INIT_PORT_AUTH:
|
|
return (*operate) (_hurd_id.rid_auth);
|
|
case INIT_PORT_CRDIR:
|
|
return (reauthenticate (INIT_PORT_CRDIR, &rcrdir) ?:
|
|
(*operate) (rcrdir));
|
|
case INIT_PORT_CWDIR:
|
|
return (reauthenticate (INIT_PORT_CWDIR, &rcwdir) ?:
|
|
(*operate) (rcwdir));
|
|
default:
|
|
return _hurd_ports_use (which, operate);
|
|
}
|
|
}
|
|
|
|
rcrdir = rcwdir = MACH_PORT_NULL;
|
|
|
|
HURD_CRITICAL_BEGIN;
|
|
|
|
__mutex_lock (&_hurd_id.lock);
|
|
/* Get _hurd_id up to date. */
|
|
if (err = _hurd_check_ids ())
|
|
goto lose;
|
|
|
|
if (_hurd_id.rid_auth == MACH_PORT_NULL)
|
|
{
|
|
/* Set up _hurd_id.rid_auth. This is a special auth server port
|
|
which uses the real uid and gid (the first aux uid and gid) as
|
|
the only effective uid and gid. */
|
|
|
|
if (_hurd_id.aux.nuids < 1 || _hurd_id.aux.ngids < 1)
|
|
{
|
|
/* We do not have a real UID and GID. Lose, lose, lose! */
|
|
err = EGRATUITOUS;
|
|
goto lose;
|
|
}
|
|
|
|
/* Create a new auth port using our real UID and GID (the first
|
|
auxiliary UID and GID) as the only effective IDs. */
|
|
if (err = __USEPORT (AUTH,
|
|
__auth_makeauth (port,
|
|
NULL, MACH_MSG_TYPE_COPY_SEND, 0,
|
|
_hurd_id.aux.uids, 1,
|
|
_hurd_id.aux.uids,
|
|
_hurd_id.aux.nuids,
|
|
_hurd_id.aux.gids, 1,
|
|
_hurd_id.aux.gids,
|
|
_hurd_id.aux.ngids,
|
|
&_hurd_id.rid_auth)))
|
|
goto lose;
|
|
}
|
|
|
|
if (!err)
|
|
/* Look up the file name using the modified init ports. */
|
|
err = __hurd_file_name_lookup (&init_port, &__getdport, 0,
|
|
file, 0, 0, &io);
|
|
|
|
/* We are done with _hurd_id.rid_auth now. */
|
|
lose:
|
|
__mutex_unlock (&_hurd_id.lock);
|
|
|
|
HURD_CRITICAL_END;
|
|
|
|
if (rcrdir != MACH_PORT_NULL)
|
|
__mach_port_deallocate (__mach_task_self (), rcrdir);
|
|
if (rcwdir != MACH_PORT_NULL)
|
|
__mach_port_deallocate (__mach_task_self (), rcwdir);
|
|
if (err)
|
|
return __hurd_fail (err);
|
|
|
|
/* Find out what types of access we are allowed to this file. */
|
|
err = __file_check_access (io, &allowed);
|
|
__mach_port_deallocate (__mach_task_self (), io);
|
|
if (err)
|
|
return __hurd_fail (err);
|
|
|
|
flags = 0;
|
|
if (type & R_OK)
|
|
flags |= O_READ;
|
|
if (type & W_OK)
|
|
flags |= O_WRITE;
|
|
if (type & X_OK)
|
|
flags |= O_EXEC;
|
|
|
|
if (flags & ~allowed)
|
|
/* We are not allowed all the requested types of access. */
|
|
return __hurd_fail (EACCES);
|
|
|
|
return 0;
|
|
}
|
|
|
|
weak_alias (__access, access)
|