xref: /titanic_50/usr/src/uts/common/syscall/ppriv.c (revision 982b4ad2dc6b5ed2a2c8c1670e94ecf1fe63fc56)
17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * CDDL HEADER START
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
545916cd2Sjpk  * Common Development and Distribution License (the "License").
645916cd2Sjpk  * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate  *
87c478bd9Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate  * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate  * and limitations under the License.
127c478bd9Sstevel@tonic-gate  *
137c478bd9Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate  *
197c478bd9Sstevel@tonic-gate  * CDDL HEADER END
207c478bd9Sstevel@tonic-gate  */
217c478bd9Sstevel@tonic-gate /*
22*982b4ad2SCasper H.S. Dik  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
237c478bd9Sstevel@tonic-gate  * Use is subject to license terms.
247c478bd9Sstevel@tonic-gate  */
257c478bd9Sstevel@tonic-gate 
267c478bd9Sstevel@tonic-gate #include <sys/param.h>
277c478bd9Sstevel@tonic-gate #include <sys/types.h>
287c478bd9Sstevel@tonic-gate #include <sys/sysmacros.h>
297c478bd9Sstevel@tonic-gate #include <sys/systm.h>
307c478bd9Sstevel@tonic-gate #include <sys/cred_impl.h>
317c478bd9Sstevel@tonic-gate #include <sys/errno.h>
32ddf7fe95Scasper #include <sys/klpd.h>
337c478bd9Sstevel@tonic-gate #include <sys/proc.h>
347c478bd9Sstevel@tonic-gate #include <sys/priv_impl.h>
357c478bd9Sstevel@tonic-gate #include <sys/policy.h>
367c478bd9Sstevel@tonic-gate #include <sys/ddi.h>
377c478bd9Sstevel@tonic-gate #include <sys/thread.h>
387c478bd9Sstevel@tonic-gate #include <c2/audit.h>
397c478bd9Sstevel@tonic-gate 
407c478bd9Sstevel@tonic-gate /*
417c478bd9Sstevel@tonic-gate  * System call support for manipulating privileges.
427c478bd9Sstevel@tonic-gate  *
437c478bd9Sstevel@tonic-gate  *
447c478bd9Sstevel@tonic-gate  * setppriv(2) - set process privilege set
457c478bd9Sstevel@tonic-gate  * getppriv(2) - get process privilege set
467c478bd9Sstevel@tonic-gate  * getprivimplinfo(2) - get process privilege implementation information
477c478bd9Sstevel@tonic-gate  * setpflags(2) - set process (privilege) flags
487c478bd9Sstevel@tonic-gate  * getpflags(2) - get process (privilege) flags
497c478bd9Sstevel@tonic-gate  */
507c478bd9Sstevel@tonic-gate 
517c478bd9Sstevel@tonic-gate /*
527c478bd9Sstevel@tonic-gate  * setppriv (priv_op_t, priv_ptype_t, priv_set_t)
537c478bd9Sstevel@tonic-gate  */
547c478bd9Sstevel@tonic-gate static int
557c478bd9Sstevel@tonic-gate setppriv(priv_op_t op, priv_ptype_t type, priv_set_t *in_pset)
567c478bd9Sstevel@tonic-gate {
577c478bd9Sstevel@tonic-gate 	priv_set_t	pset, *target;
587c478bd9Sstevel@tonic-gate 	cred_t		*cr, *pcr;
597c478bd9Sstevel@tonic-gate 	proc_t		*p;
60ddf7fe95Scasper 	boolean_t	donocd = B_FALSE;
617c478bd9Sstevel@tonic-gate 
627c478bd9Sstevel@tonic-gate 	if (!PRIV_VALIDSET(type) || !PRIV_VALIDOP(op))
637c478bd9Sstevel@tonic-gate 		return (set_errno(EINVAL));
647c478bd9Sstevel@tonic-gate 
657c478bd9Sstevel@tonic-gate 	if (copyin(in_pset, &pset, sizeof (priv_set_t)))
667c478bd9Sstevel@tonic-gate 		return (set_errno(EFAULT));
677c478bd9Sstevel@tonic-gate 
687c478bd9Sstevel@tonic-gate 	p = ttoproc(curthread);
697c478bd9Sstevel@tonic-gate 	cr = cralloc();
707c478bd9Sstevel@tonic-gate 	mutex_enter(&p->p_crlock);
717c478bd9Sstevel@tonic-gate 
72ddf7fe95Scasper retry:
737c478bd9Sstevel@tonic-gate 	pcr = p->p_cred;
747c478bd9Sstevel@tonic-gate 
757c478bd9Sstevel@tonic-gate 	if (audit_active)
767c478bd9Sstevel@tonic-gate 		audit_setppriv(op, type, &pset, pcr);
777c478bd9Sstevel@tonic-gate 
787c478bd9Sstevel@tonic-gate 	/*
797c478bd9Sstevel@tonic-gate 	 * Filter out unallowed request (bad op and bad type)
807c478bd9Sstevel@tonic-gate 	 */
817c478bd9Sstevel@tonic-gate 	switch (op) {
827c478bd9Sstevel@tonic-gate 	case PRIV_ON:
837c478bd9Sstevel@tonic-gate 	case PRIV_SET:
847c478bd9Sstevel@tonic-gate 		/*
857c478bd9Sstevel@tonic-gate 		 * Turning on privileges; the limit set cannot grow,
867c478bd9Sstevel@tonic-gate 		 * other sets can but only as long as they remain subsets
877c478bd9Sstevel@tonic-gate 		 * of P.  Only immediately after exec holds that P <= L.
887c478bd9Sstevel@tonic-gate 		 */
89ddf7fe95Scasper 		if (type == PRIV_LIMIT &&
90ddf7fe95Scasper 		    !priv_issubset(&pset, &CR_LPRIV(pcr))) {
9105db633cScasper 			mutex_exit(&p->p_crlock);
927c478bd9Sstevel@tonic-gate 			crfree(cr);
937c478bd9Sstevel@tonic-gate 			return (set_errno(EPERM));
947c478bd9Sstevel@tonic-gate 		}
95ddf7fe95Scasper 		if (!priv_issubset(&pset, &CR_OPPRIV(pcr)) &&
96ddf7fe95Scasper 		    !priv_issubset(&pset, priv_getset(pcr, type))) {
97ddf7fe95Scasper 			mutex_exit(&p->p_crlock);
98ddf7fe95Scasper 			/* Policy override should not grow beyond L either */
99ddf7fe95Scasper 			if (type != PRIV_INHERITABLE ||
100ddf7fe95Scasper 			    !priv_issubset(&pset, &CR_LPRIV(pcr)) ||
101ddf7fe95Scasper 			    secpolicy_require_privs(CRED(), &pset) != 0) {
102ddf7fe95Scasper 				crfree(cr);
103ddf7fe95Scasper 				return (set_errno(EPERM));
104ddf7fe95Scasper 			}
105ddf7fe95Scasper 			mutex_enter(&p->p_crlock);
106ddf7fe95Scasper 			if (pcr != p->p_cred)
107ddf7fe95Scasper 				goto retry;
108ddf7fe95Scasper 			donocd = B_TRUE;
109ddf7fe95Scasper 		}
1107c478bd9Sstevel@tonic-gate 		break;
1117c478bd9Sstevel@tonic-gate 
1127c478bd9Sstevel@tonic-gate 	case PRIV_OFF:
1137c478bd9Sstevel@tonic-gate 		/* PRIV_OFF is always allowed */
1147c478bd9Sstevel@tonic-gate 		break;
1157c478bd9Sstevel@tonic-gate 	}
1167c478bd9Sstevel@tonic-gate 
1177c478bd9Sstevel@tonic-gate 	/*
1187c478bd9Sstevel@tonic-gate 	 * OK! everything is cool.
1197c478bd9Sstevel@tonic-gate 	 * Do cred COW.
1207c478bd9Sstevel@tonic-gate 	 */
1217c478bd9Sstevel@tonic-gate 	crcopy_to(pcr, cr);
1227c478bd9Sstevel@tonic-gate 
1237c478bd9Sstevel@tonic-gate 	/*
1247c478bd9Sstevel@tonic-gate 	 * If we change the effective, permitted or limit set, we attain
1257c478bd9Sstevel@tonic-gate 	 * "privilege awareness".
1267c478bd9Sstevel@tonic-gate 	 */
1277c478bd9Sstevel@tonic-gate 	if (type != PRIV_INHERITABLE)
1287c478bd9Sstevel@tonic-gate 		priv_set_PA(cr);
1297c478bd9Sstevel@tonic-gate 
1307c478bd9Sstevel@tonic-gate 	target = &(CR_PRIVS(cr)->crprivs[type]);
1317c478bd9Sstevel@tonic-gate 
1327c478bd9Sstevel@tonic-gate 	switch (op) {
1337c478bd9Sstevel@tonic-gate 	case PRIV_ON:
1347c478bd9Sstevel@tonic-gate 		priv_union(&pset, target);
1357c478bd9Sstevel@tonic-gate 		break;
1367c478bd9Sstevel@tonic-gate 	case PRIV_OFF:
1377c478bd9Sstevel@tonic-gate 		priv_inverse(&pset);
1387c478bd9Sstevel@tonic-gate 		priv_intersect(target, &pset);
1397c478bd9Sstevel@tonic-gate 
1407c478bd9Sstevel@tonic-gate 		/*
1417c478bd9Sstevel@tonic-gate 		 * Fall-thru to set target and change other process
1427c478bd9Sstevel@tonic-gate 		 * privilege sets.
1437c478bd9Sstevel@tonic-gate 		 */
1447c478bd9Sstevel@tonic-gate 		/*FALLTHRU*/
1457c478bd9Sstevel@tonic-gate 
1467c478bd9Sstevel@tonic-gate 	case PRIV_SET:
1477c478bd9Sstevel@tonic-gate 		*target = pset;
1487c478bd9Sstevel@tonic-gate 
1497c478bd9Sstevel@tonic-gate 		/*
1507c478bd9Sstevel@tonic-gate 		 * Take privileges no longer permitted out
1517c478bd9Sstevel@tonic-gate 		 * of other effective sets as well.
1527c478bd9Sstevel@tonic-gate 		 * Limit set is enforced at exec() time.
1537c478bd9Sstevel@tonic-gate 		 */
1547c478bd9Sstevel@tonic-gate 		if (type == PRIV_PERMITTED)
1557c478bd9Sstevel@tonic-gate 			priv_intersect(&pset, &CR_EPRIV(cr));
1567c478bd9Sstevel@tonic-gate 		break;
1577c478bd9Sstevel@tonic-gate 	}
1587c478bd9Sstevel@tonic-gate 
1597c478bd9Sstevel@tonic-gate 	/*
1607c478bd9Sstevel@tonic-gate 	 * When we give up privileges not in the inheritable set,
1617c478bd9Sstevel@tonic-gate 	 * set SNOCD if not already set; first we compute the
1627c478bd9Sstevel@tonic-gate 	 * privileges removed from P using Diff = (~P') & P
1637c478bd9Sstevel@tonic-gate 	 * and then we check whether the removed privileges are
1647c478bd9Sstevel@tonic-gate 	 * a subset of I.  If we retain uid 0, all privileges
1657c478bd9Sstevel@tonic-gate 	 * are required anyway so don't set SNOCD.
1667c478bd9Sstevel@tonic-gate 	 */
1677c478bd9Sstevel@tonic-gate 	if (type == PRIV_PERMITTED && (p->p_flag & SNOCD) == 0 &&
1687c478bd9Sstevel@tonic-gate 	    cr->cr_uid != 0 && cr->cr_ruid != 0 && cr->cr_suid != 0) {
1697c478bd9Sstevel@tonic-gate 		priv_set_t diff = CR_OPPRIV(cr);
1707c478bd9Sstevel@tonic-gate 		priv_inverse(&diff);
1717c478bd9Sstevel@tonic-gate 		priv_intersect(&CR_OPPRIV(pcr), &diff);
1727c478bd9Sstevel@tonic-gate 		donocd = !priv_issubset(&diff, &CR_IPRIV(cr));
1737c478bd9Sstevel@tonic-gate 	}
1747c478bd9Sstevel@tonic-gate 
1757c478bd9Sstevel@tonic-gate 	p->p_cred = cr;
1767c478bd9Sstevel@tonic-gate 	mutex_exit(&p->p_crlock);
1777c478bd9Sstevel@tonic-gate 
1787c478bd9Sstevel@tonic-gate 	if (donocd) {
1797c478bd9Sstevel@tonic-gate 		mutex_enter(&p->p_lock);
1807c478bd9Sstevel@tonic-gate 		p->p_flag |= SNOCD;
1817c478bd9Sstevel@tonic-gate 		mutex_exit(&p->p_lock);
1827c478bd9Sstevel@tonic-gate 	}
1837c478bd9Sstevel@tonic-gate 
1847c478bd9Sstevel@tonic-gate 	crset(p, cr);		/* broadcast to process threads */
1857c478bd9Sstevel@tonic-gate 
1867c478bd9Sstevel@tonic-gate 	return (0);
1877c478bd9Sstevel@tonic-gate }
1887c478bd9Sstevel@tonic-gate 
1897c478bd9Sstevel@tonic-gate /*
1907c478bd9Sstevel@tonic-gate  * getppriv (priv_ptype_t, priv_set_t *)
1917c478bd9Sstevel@tonic-gate  */
1927c478bd9Sstevel@tonic-gate static int
1937c478bd9Sstevel@tonic-gate getppriv(priv_ptype_t type, priv_set_t *pset)
1947c478bd9Sstevel@tonic-gate {
1957c478bd9Sstevel@tonic-gate 	if (!PRIV_VALIDSET(type))
1967c478bd9Sstevel@tonic-gate 		return (set_errno(EINVAL));
1977c478bd9Sstevel@tonic-gate 
1987c478bd9Sstevel@tonic-gate 	if (copyout(priv_getset(CRED(), type), pset, sizeof (priv_set_t)) != 0)
1997c478bd9Sstevel@tonic-gate 		return (set_errno(EFAULT));
2007c478bd9Sstevel@tonic-gate 
2017c478bd9Sstevel@tonic-gate 	return (0);
2027c478bd9Sstevel@tonic-gate }
2037c478bd9Sstevel@tonic-gate 
2047c478bd9Sstevel@tonic-gate static int
2057c478bd9Sstevel@tonic-gate getprivimplinfo(void *buf, size_t bufsize)
2067c478bd9Sstevel@tonic-gate {
2077c478bd9Sstevel@tonic-gate 	int err;
2087c478bd9Sstevel@tonic-gate 
2097c478bd9Sstevel@tonic-gate 	err = copyout(priv_hold_implinfo(), buf, min(bufsize, privinfosize));
2107c478bd9Sstevel@tonic-gate 
2117c478bd9Sstevel@tonic-gate 	priv_release_implinfo();
2127c478bd9Sstevel@tonic-gate 
2137c478bd9Sstevel@tonic-gate 	if (err)
2147c478bd9Sstevel@tonic-gate 		return (set_errno(EFAULT));
2157c478bd9Sstevel@tonic-gate 
2167c478bd9Sstevel@tonic-gate 	return (0);
2177c478bd9Sstevel@tonic-gate }
2187c478bd9Sstevel@tonic-gate 
2197c478bd9Sstevel@tonic-gate /*
22045916cd2Sjpk  * Set process flags in the given target cred.  If NULL is specified, then
22145916cd2Sjpk  * CRED() is used; otherwise the cred is assumed to be modifiable (i.e. newly
22245916cd2Sjpk  * crdup'ed, or equivalent).  Some flags are set in the proc rather than cred;
22345916cd2Sjpk  * for these, curproc is always used.
2247c478bd9Sstevel@tonic-gate  *
2257c478bd9Sstevel@tonic-gate  * For now we cheat: the flags are actually bit masks so we can simplify
2267c478bd9Sstevel@tonic-gate  * some; we do make sure that the arguments are valid, though.
2277c478bd9Sstevel@tonic-gate  */
2287c478bd9Sstevel@tonic-gate 
22945916cd2Sjpk int
23045916cd2Sjpk setpflags(uint_t flag, uint_t val, cred_t *tcr)
2317c478bd9Sstevel@tonic-gate {
2327c478bd9Sstevel@tonic-gate 	cred_t *cr, *pcr;
2337c478bd9Sstevel@tonic-gate 	proc_t *p = curproc;
2347c478bd9Sstevel@tonic-gate 	uint_t newflags;
23545916cd2Sjpk 	boolean_t use_curcred = (tcr == NULL);
2367c478bd9Sstevel@tonic-gate 
2377c478bd9Sstevel@tonic-gate 	if (val > 1 || (flag != PRIV_DEBUG && flag != PRIV_AWARE &&
23845916cd2Sjpk 	    flag != NET_MAC_AWARE && flag != NET_MAC_AWARE_INHERIT &&
239*982b4ad2SCasper H.S. Dik 	    flag != __PROC_PROTECT && flag != PRIV_XPOLICY &&
240*982b4ad2SCasper H.S. Dik 	    flag != PRIV_AWARE_RESET)) {
24145916cd2Sjpk 		return (EINVAL);
2427c478bd9Sstevel@tonic-gate 	}
2437c478bd9Sstevel@tonic-gate 
2447c478bd9Sstevel@tonic-gate 	if (flag == __PROC_PROTECT) {
2457c478bd9Sstevel@tonic-gate 		mutex_enter(&p->p_lock);
2467c478bd9Sstevel@tonic-gate 		if (val == 0)
2477c478bd9Sstevel@tonic-gate 			p->p_flag &= ~SNOCD;
2487c478bd9Sstevel@tonic-gate 		else
2497c478bd9Sstevel@tonic-gate 			p->p_flag |= SNOCD;
2507c478bd9Sstevel@tonic-gate 		mutex_exit(&p->p_lock);
2517c478bd9Sstevel@tonic-gate 		return (0);
2527c478bd9Sstevel@tonic-gate 	}
2537c478bd9Sstevel@tonic-gate 
25445916cd2Sjpk 	if (use_curcred) {
2557c478bd9Sstevel@tonic-gate 		cr = cralloc();
2567c478bd9Sstevel@tonic-gate 		mutex_enter(&p->p_crlock);
2577c478bd9Sstevel@tonic-gate 		pcr = p->p_cred;
25845916cd2Sjpk 	} else {
25945916cd2Sjpk 		cr = pcr = tcr;
26045916cd2Sjpk 	}
2617c478bd9Sstevel@tonic-gate 
2627c478bd9Sstevel@tonic-gate 	newflags = CR_FLAGS(pcr);
2637c478bd9Sstevel@tonic-gate 
264*982b4ad2SCasper H.S. Dik 	if (val != 0) {
265*982b4ad2SCasper H.S. Dik 		if (flag == PRIV_AWARE)
266*982b4ad2SCasper H.S. Dik 			newflags &= ~PRIV_AWARE_RESET;
2677c478bd9Sstevel@tonic-gate 		newflags |= flag;
268*982b4ad2SCasper H.S. Dik 	} else {
2697c478bd9Sstevel@tonic-gate 		newflags &= ~flag;
270*982b4ad2SCasper H.S. Dik 	}
2717c478bd9Sstevel@tonic-gate 
2727c478bd9Sstevel@tonic-gate 	/* No change */
2737c478bd9Sstevel@tonic-gate 	if (CR_FLAGS(pcr) == newflags) {
27445916cd2Sjpk 		if (use_curcred) {
2757c478bd9Sstevel@tonic-gate 			mutex_exit(&p->p_crlock);
2767c478bd9Sstevel@tonic-gate 			crfree(cr);
27745916cd2Sjpk 		}
2787c478bd9Sstevel@tonic-gate 		return (0);
2797c478bd9Sstevel@tonic-gate 	}
2807c478bd9Sstevel@tonic-gate 
28145916cd2Sjpk 	/*
28297bedc9aSgfaden 	 * Setting either the NET_MAC_AWARE or NET_MAC_AWARE_INHERIT
28397bedc9aSgfaden 	 * flags is a restricted operation.
28497bedc9aSgfaden 	 *
28597bedc9aSgfaden 	 * When invoked via the PRIVSYS_SETPFLAGS syscall
28697bedc9aSgfaden 	 * we require that the current cred has the net_mac_aware
28797bedc9aSgfaden 	 * privilege in its effective set.
28897bedc9aSgfaden 	 *
28997bedc9aSgfaden 	 * When called from within the kernel by label-aware
29097bedc9aSgfaden 	 * services such as NFS, we don't require a privilege check.
29197bedc9aSgfaden 	 *
29245916cd2Sjpk 	 */
29345916cd2Sjpk 	if ((flag == NET_MAC_AWARE || flag == NET_MAC_AWARE_INHERIT) &&
29445916cd2Sjpk 	    (val == 1) && use_curcred) {
29597bedc9aSgfaden 		if (secpolicy_net_mac_aware(pcr) != 0) {
29645916cd2Sjpk 			mutex_exit(&p->p_crlock);
29745916cd2Sjpk 			crfree(cr);
29845916cd2Sjpk 			return (EPERM);
29945916cd2Sjpk 		}
30045916cd2Sjpk 	}
30145916cd2Sjpk 
3027c478bd9Sstevel@tonic-gate 	/* Trying to unset PA; if we can't, return an error */
3037c478bd9Sstevel@tonic-gate 	if (flag == PRIV_AWARE && val == 0 && !priv_can_clear_PA(pcr)) {
30445916cd2Sjpk 		if (use_curcred) {
3057c478bd9Sstevel@tonic-gate 			mutex_exit(&p->p_crlock);
3067c478bd9Sstevel@tonic-gate 			crfree(cr);
30745916cd2Sjpk 		}
30845916cd2Sjpk 		return (EPERM);
3097c478bd9Sstevel@tonic-gate 	}
3107c478bd9Sstevel@tonic-gate 
3117c478bd9Sstevel@tonic-gate 	/* Committed to changing the flag */
31245916cd2Sjpk 	if (use_curcred)
3137c478bd9Sstevel@tonic-gate 		crcopy_to(pcr, cr);
3147c478bd9Sstevel@tonic-gate 	if (flag == PRIV_AWARE) {
3157c478bd9Sstevel@tonic-gate 		if (val != 0)
3167c478bd9Sstevel@tonic-gate 			priv_set_PA(cr);
3177c478bd9Sstevel@tonic-gate 		else
3187c478bd9Sstevel@tonic-gate 			priv_adjust_PA(cr);
3197c478bd9Sstevel@tonic-gate 	} else {
3207c478bd9Sstevel@tonic-gate 		CR_FLAGS(cr) = newflags;
3217c478bd9Sstevel@tonic-gate 	}
3227c478bd9Sstevel@tonic-gate 
323ddf7fe95Scasper 	/*
324ddf7fe95Scasper 	 * Unsetting the flag has as side effect getting rid of
325ddf7fe95Scasper 	 * the per-credential policy.
326ddf7fe95Scasper 	 */
327ddf7fe95Scasper 	if (flag == PRIV_XPOLICY && val == 0)
328ddf7fe95Scasper 		crsetcrklpd(cr, NULL);
329ddf7fe95Scasper 
33045916cd2Sjpk 	if (use_curcred) {
3317c478bd9Sstevel@tonic-gate 		p->p_cred = cr;
3327c478bd9Sstevel@tonic-gate 		mutex_exit(&p->p_crlock);
3337c478bd9Sstevel@tonic-gate 		crset(p, cr);
33445916cd2Sjpk 	}
3357c478bd9Sstevel@tonic-gate 
3367c478bd9Sstevel@tonic-gate 	return (0);
3377c478bd9Sstevel@tonic-gate }
3387c478bd9Sstevel@tonic-gate 
3397c478bd9Sstevel@tonic-gate /*
3407c478bd9Sstevel@tonic-gate  * Getpflags.  Currently only implements single bit flags.
3417c478bd9Sstevel@tonic-gate  */
34245916cd2Sjpk uint_t
34345916cd2Sjpk getpflags(uint_t flag, const cred_t *cr)
3447c478bd9Sstevel@tonic-gate {
34545916cd2Sjpk 	if (flag != PRIV_DEBUG && flag != PRIV_AWARE &&
346ddf7fe95Scasper 	    flag != NET_MAC_AWARE && flag != NET_MAC_AWARE_INHERIT &&
347*982b4ad2SCasper H.S. Dik 	    flag != PRIV_XPOLICY && flag != PRIV_AWARE_RESET)
34845916cd2Sjpk 		return ((uint_t)-1);
3497c478bd9Sstevel@tonic-gate 
35045916cd2Sjpk 	return ((CR_FLAGS(cr) & flag) != 0);
3517c478bd9Sstevel@tonic-gate }
3527c478bd9Sstevel@tonic-gate 
3537c478bd9Sstevel@tonic-gate /*
3547c478bd9Sstevel@tonic-gate  * Privilege system call entry point
3557c478bd9Sstevel@tonic-gate  */
3567c478bd9Sstevel@tonic-gate int
357ddf7fe95Scasper privsys(int code, priv_op_t op, priv_ptype_t type, void *buf, size_t bufsize,
358ddf7fe95Scasper     int itype)
3597c478bd9Sstevel@tonic-gate {
36045916cd2Sjpk 	int retv;
361f48205beScasper 	extern int issetugid(void);
36245916cd2Sjpk 
3637c478bd9Sstevel@tonic-gate 	switch (code) {
3647c478bd9Sstevel@tonic-gate 	case PRIVSYS_SETPPRIV:
3657c478bd9Sstevel@tonic-gate 		if (bufsize < sizeof (priv_set_t))
3667c478bd9Sstevel@tonic-gate 			return (set_errno(ENOMEM));
3677c478bd9Sstevel@tonic-gate 		return (setppriv(op, type, buf));
3687c478bd9Sstevel@tonic-gate 	case PRIVSYS_GETPPRIV:
3697c478bd9Sstevel@tonic-gate 		if (bufsize < sizeof (priv_set_t))
3707c478bd9Sstevel@tonic-gate 			return (set_errno(ENOMEM));
3717c478bd9Sstevel@tonic-gate 		return (getppriv(type, buf));
3727c478bd9Sstevel@tonic-gate 	case PRIVSYS_GETIMPLINFO:
3737c478bd9Sstevel@tonic-gate 		return (getprivimplinfo(buf, bufsize));
3747c478bd9Sstevel@tonic-gate 	case PRIVSYS_SETPFLAGS:
37545916cd2Sjpk 		retv = setpflags((uint_t)op, (uint_t)type, NULL);
37645916cd2Sjpk 		return (retv != 0 ? set_errno(retv) : 0);
3777c478bd9Sstevel@tonic-gate 	case PRIVSYS_GETPFLAGS:
37845916cd2Sjpk 		retv = (int)getpflags((uint_t)op, CRED());
37945916cd2Sjpk 		return (retv == -1 ? set_errno(EINVAL) : retv);
380f48205beScasper 	case PRIVSYS_ISSETUGID:
381f48205beScasper 		return (issetugid());
382ddf7fe95Scasper 	case PRIVSYS_KLPD_REG:
383ddf7fe95Scasper 		if (bufsize < sizeof (priv_set_t))
384ddf7fe95Scasper 			return (set_errno(ENOMEM));
385ddf7fe95Scasper 		return ((int)klpd_reg((int)op, (idtype_t)itype, (id_t)type,
386ddf7fe95Scasper 		    buf));
387ddf7fe95Scasper 	case PRIVSYS_KLPD_UNREG:
388ddf7fe95Scasper 		return ((int)klpd_unreg((int)op, (idtype_t)itype, (id_t)type));
3897c478bd9Sstevel@tonic-gate 	}
3907c478bd9Sstevel@tonic-gate 	return (set_errno(EINVAL));
3917c478bd9Sstevel@tonic-gate }
3927c478bd9Sstevel@tonic-gate 
3937c478bd9Sstevel@tonic-gate #ifdef _SYSCALL32_IMPL
3947c478bd9Sstevel@tonic-gate int
395ddf7fe95Scasper privsys32(int code, priv_op_t op, priv_ptype_t type, caddr32_t buf,
396ddf7fe95Scasper     size32_t bufsize, int itype)
3977c478bd9Sstevel@tonic-gate {
398ddf7fe95Scasper 	return (privsys(code, op, type, (void *)(uintptr_t)buf,
399ddf7fe95Scasper 	    (size_t)bufsize, itype));
4007c478bd9Sstevel@tonic-gate }
4017c478bd9Sstevel@tonic-gate #endif
402