summaryrefslogtreecommitdiff
path: root/sysdeps/mach/hurd/setregid.c
diff options
context:
space:
mode:
authorRoland McGrath <roland@gnu.org>1995-12-22 10:00:21 +0000
committerRoland McGrath <roland@gnu.org>1995-12-22 10:00:21 +0000
commit975320984b9f9fa6742136447ec82e7e304d83fd (patch)
tree6638c381441825ac81f4f9355eba25fd8863c7f9 /sysdeps/mach/hurd/setregid.c
parente3fa2641f4f296230aa2607f0df9d71ab3f9c7af (diff)
downloadglibc-975320984b9f9fa6742136447ec82e7e304d83fd.tar.gz
Fri Dec 22 00:57:38 1995 Roland McGrath <roland@churchy.gnu.ai.mit.edu>cvs/libc-951222
* sysdeps/mach/hurd/setuid.c: Rewrote ID frobnication to do the right thing. * sysdeps/mach/hurd/setgid.c: Likewise. * sysdeps/mach/hurd/setreuid.c: Likewise. * sysdeps/mach/hurd/setregid.c: Likewise. * sysdeps/mach/hurd/setegid.c: Likewise. * sysdeps/mach/hurd/seteuid.c: Likewise. * sysdeps/mach/hurd/fork.c: Peek __mach_task_self_ value before proc_dostop call to work around kernel paging bug. Thu Dec 21 12:19:32 1995 Miles Bader <miles@gnu.ai.mit.edu> * sysdeps/mach/hurd/setuid.c (__setuid): Actually add the new uid instead of putting it (and other uids) in the gids and leaving the old uids as is.
Diffstat (limited to 'sysdeps/mach/hurd/setregid.c')
-rw-r--r--sysdeps/mach/hurd/setregid.c48
1 files changed, 37 insertions, 11 deletions
diff --git a/sysdeps/mach/hurd/setregid.c b/sysdeps/mach/hurd/setregid.c
index 8b76f7008a..ea7e38bc74 100644
--- a/sysdeps/mach/hurd/setregid.c
+++ b/sysdeps/mach/hurd/setregid.c
@@ -39,21 +39,47 @@ __setregid (gid_t rgid, gid_t egid)
/* Make a new auth handle which has RGID as the real gid,
and EGID as the first element in the list of effective gids. */
- size_t ngen = _hurd_id.gen.ngids < 1 ? 1 : _hurd_id.gen.ngids;
- size_t naux = _hurd_id.aux.ngids < 1 ? 1 : _hurd_id.aux.ngids;
- gid_t newaux[naux], newgen[ngen];
+ gid_t *newgen, *newaux;
+ size_t ngen, naux;
- newgen[0] = egid;
- memcpy (&newgen[1], _hurd_id.gen.gids, (ngen - 1) * sizeof (gid_t));
- newaux[0] = rgid;
- memcpy (&newaux[1], _hurd_id.aux.gids, (naux - 1) * sizeof (gid_t));
+ newgen = _hurd_id.gen.gids;
+ ngen = _hurd_id.gen.ngids;
+ if (egid != -1)
+ {
+ if (_hurd_id.gen.ngids == 0)
+ {
+ /* No effective gids now. The new set will be just GID. */
+ newgen = &egid;
+ ngen = 1;
+ }
+ else
+ {
+ _hurd_id.gen.gids[0] = egid;
+ _hurd_id.valid = 0;
+ }
+ }
+
+ newaux = _hurd_id.aux.gids;
+ naux = _hurd_id.aux.ngids;
+ if (rgid != -1)
+ {
+ if (_hurd_id.aux.ngids == 0)
+ {
+ newaux = &rgid;
+ naux = 1;
+ }
+ else
+ {
+ _hurd_id.aux.gids[0] = rgid;
+ _hurd_id.valid = 0;
+ }
+ }
err = __USEPORT (AUTH, __auth_makeauth
(port, NULL, MACH_MSG_TYPE_COPY_SEND, 0,
- _hurd_id.gen.gids, _hurd_id.gen.ngids,
- _hurd_id.aux.gids, _hurd_id.aux.ngids,
- newgen, ngen,
- newaux, naux,
+ _hurd_id.gen.uids, _hurd_id.gen.nuids,
+ _hurd_id.aux.uids, _hurd_id.aux.nuids,
+ newgen, ngen, newaux, naux,
&newauth));
}
__mutex_unlock (&_hurd_id.lock);