summaryrefslogtreecommitdiff
path: root/usr/src/lib/libsec/common/aclutils.c
diff options
context:
space:
mode:
authorahrens <none@none>2005-10-31 11:33:35 -0800
committerahrens <none@none>2005-10-31 11:33:35 -0800
commitfa9e4066f08beec538e775443c5be79dd423fcab (patch)
tree576d99665e57bb7cb70584431adb08c14d47e3ce /usr/src/lib/libsec/common/aclutils.c
parentf1b64740276f67fc6914c1d855f2af601efe99ac (diff)
downloadillumos-joyent-fa9e4066f08beec538e775443c5be79dd423fcab.tar.gz
PSARC 2002/240 ZFS
6338653 Integrate ZFS PSARC 2004/652 - DKIOCFLUSH 5096886 Write caching disks need mechanism to flush cache to physical media
Diffstat (limited to 'usr/src/lib/libsec/common/aclutils.c')
-rw-r--r--usr/src/lib/libsec/common/aclutils.c1436
1 files changed, 1436 insertions, 0 deletions
diff --git a/usr/src/lib/libsec/common/aclutils.c b/usr/src/lib/libsec/common/aclutils.c
new file mode 100644
index 0000000000..f3c8856054
--- /dev/null
+++ b/usr/src/lib/libsec/common/aclutils.c
@@ -0,0 +1,1436 @@
+/*
+ * CDDL HEADER START
+ *
+ * The contents of this file are subject to the terms of the
+ * Common Development and Distribution License, Version 1.0 only
+ * (the "License"). You may not use this file except in compliance
+ * with the License.
+ *
+ * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
+ * or http://www.opensolaris.org/os/licensing.
+ * See the License for the specific language governing permissions
+ * and limitations under the License.
+ *
+ * When distributing Covered Code, include this CDDL HEADER in each
+ * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
+ * If applicable, add the following below this CDDL HEADER, with the
+ * fields enclosed by brackets "[]" replaced with your own identifying
+ * information: Portions Copyright [yyyy] [name of copyright owner]
+ *
+ * CDDL HEADER END
+ */
+/*
+ * Copyright 2005 Sun Microsystems, Inc. All rights reserved.
+ * Use is subject to license terms.
+ */
+
+#pragma ident "%Z%%M% %I% %E% SMI"
+
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+#include <limits.h>
+#include <grp.h>
+#include <pwd.h>
+#include <sys/types.h>
+#include <sys/acl.h>
+#include <errno.h>
+#include <sys/stat.h>
+#include <locale.h>
+#include <aclutils.h>
+#include <acl_common.h>
+
+#define ACL_PATH 0
+#define ACL_FD 1
+
+#define ACE_POSIX_SUPPORTED_BITS (ACE_READ_DATA | \
+ ACE_WRITE_DATA | ACE_APPEND_DATA | ACE_EXECUTE | \
+ ACE_READ_ATTRIBUTES | ACE_READ_ACL | ACE_WRITE_ACL)
+
+
+#define ACL_SYNCHRONIZE_SET_ALLOW 0x0000002
+#define ACL_SYNCHRONIZE_SET_DENY 0x0000001
+
+#define ACL_WRITE_OWNER_SET_ALLOW 0x0000020
+#define ACL_WRITE_OWNER_SET_DENY 0x0000010
+
+#define ACL_WRITE_ATTRS_OWNER_SET_ALLOW 0x0002000
+#define ACL_WRITE_ATTRS_OWNER_SET_DENY 0x0001000
+
+#define ACL_WRITE_ATTRS_WRITER_SET_DENY 0x0010000
+
+#define ACL_DELETE_SET_ALLOW 0x0000200
+#define ACL_DELETE_SET_DENY 0x0000100
+
+#define ACL_READ_NAMED_READER_SET_ALLOW 0x2000000
+
+#define ACL_WRITE_NAMED_WRITER_SET_ALLOW 0x0200000
+#define ACL_WRITE_NAMED_WRITER_SET_DENY 0x0100000
+
+#define ACL_WRITE_ATTRS_OWNER_SET_ALLOW 0x0002000
+#define ACL_WRITE_ATTRS_WRITER_SET_ALLOW 0x0020000
+
+#define ACL_WRITE_OWNER_ERR_DENY 0x0000040
+#define ACL_READ_NAMED_READER_SET_DENY 0x1000000
+#define ACL_WRITE_NAMED_WRITER_SET_ALLO W0x0200000
+typedef union {
+ const char *file;
+ int fd;
+} acl_inp;
+
+acl_t *
+acl_alloc(enum acl_type type)
+{
+ acl_t *aclp;
+
+ aclp = malloc(sizeof (acl_t));
+
+ if (aclp == NULL)
+ return (NULL);
+
+ aclp->acl_aclp = NULL;
+ aclp->acl_cnt = 0;
+
+ switch (type) {
+ case ACE_T:
+ aclp->acl_type = ACE_T;
+ aclp->acl_entry_size = sizeof (ace_t);
+ break;
+ case ACLENT_T:
+ aclp->acl_type = ACLENT_T;
+ aclp->acl_entry_size = sizeof (aclent_t);
+ break;
+ default:
+ acl_free(aclp);
+ aclp = NULL;
+ }
+ return (aclp);
+}
+
+/*
+ * Free acl_t structure
+ */
+void
+acl_free(acl_t *aclp)
+{
+ if (aclp == NULL)
+ return;
+
+ if (aclp->acl_aclp)
+ free(aclp->acl_aclp);
+ free(aclp);
+}
+
+/*
+ * Determine whether a file has a trivial ACL
+ * returns: 0 = trivial
+ * 1 = nontrivial
+ * <0 some other system failure, such as ENOENT or EPERM
+ */
+int
+acl_trivial(const char *filename)
+{
+ int acl_flavor;
+ int aclcnt;
+ int cntcmd;
+ int val = 0;
+ ace_t *acep;
+
+ acl_flavor = pathconf(filename, _PC_ACL_ENABLED);
+ if (acl_flavor == -1)
+ return (-1);
+
+ if (acl_flavor == _ACL_ACE_ENABLED)
+ cntcmd = ACE_GETACLCNT;
+ else
+ cntcmd = GETACLCNT;
+
+ aclcnt = acl(filename, cntcmd, 0, NULL);
+ if (aclcnt > 0) {
+ if (acl_flavor == _ACL_ACE_ENABLED) {
+ if (aclcnt != 6)
+ val = 1;
+ else {
+ acep = malloc(sizeof (ace_t) * aclcnt);
+ if (acep == NULL)
+ return (-1);
+ if (acl(filename, ACE_GETACL,
+ aclcnt, acep) < 0) {
+ free(acep);
+ return (-1);
+ }
+
+ val = ace_trivial(acep, aclcnt);
+ free(acep);
+ }
+ } else if (aclcnt > MIN_ACL_ENTRIES)
+ val = 1;
+ }
+ return (val);
+}
+
+static uint32_t
+access_mask_set(int haswriteperm, int hasreadperm, int isowner, int isallow)
+{
+ uint32_t access_mask = 0;
+ int acl_produce;
+ int synchronize_set = 0, write_owner_set = 0;
+ int delete_set = 0, write_attrs_set = 0;
+ int read_named_set = 0, write_named_set = 0;
+
+ acl_produce = (ACL_SYNCHRONIZE_SET_ALLOW |
+ ACL_WRITE_ATTRS_OWNER_SET_ALLOW |
+ ACL_WRITE_ATTRS_WRITER_SET_DENY);
+
+ if (isallow) {
+ synchronize_set = ACL_SYNCHRONIZE_SET_ALLOW;
+ write_owner_set = ACL_WRITE_OWNER_SET_ALLOW;
+ delete_set = ACL_DELETE_SET_ALLOW;
+ if (hasreadperm)
+ read_named_set = ACL_READ_NAMED_READER_SET_ALLOW;
+ if (haswriteperm)
+ write_named_set = ACL_WRITE_NAMED_WRITER_SET_ALLOW;
+ if (isowner)
+ write_attrs_set = ACL_WRITE_ATTRS_OWNER_SET_ALLOW;
+ else if (haswriteperm)
+ write_attrs_set = ACL_WRITE_ATTRS_WRITER_SET_ALLOW;
+ } else {
+
+ synchronize_set = ACL_SYNCHRONIZE_SET_DENY;
+ write_owner_set = ACL_WRITE_OWNER_SET_DENY;
+ delete_set = ACL_DELETE_SET_DENY;
+ if (hasreadperm)
+ read_named_set = ACL_READ_NAMED_READER_SET_DENY;
+ if (haswriteperm)
+ write_named_set = ACL_WRITE_NAMED_WRITER_SET_DENY;
+ if (isowner)
+ write_attrs_set = ACL_WRITE_ATTRS_OWNER_SET_DENY;
+ else if (haswriteperm)
+ write_attrs_set = ACL_WRITE_ATTRS_WRITER_SET_DENY;
+ else
+ /*
+ * If the entity is not the owner and does not
+ * have write permissions ACE_WRITE_ATTRIBUTES will
+ * always go in the DENY ACE.
+ */
+ access_mask |= ACE_WRITE_ATTRIBUTES;
+ }
+
+ if (acl_produce & synchronize_set)
+ access_mask |= ACE_SYNCHRONIZE;
+ if (acl_produce & write_owner_set)
+ access_mask |= ACE_WRITE_OWNER;
+ if (acl_produce & delete_set)
+ access_mask |= ACE_DELETE;
+ if (acl_produce & write_attrs_set)
+ access_mask |= ACE_WRITE_ATTRIBUTES;
+ if (acl_produce & read_named_set)
+ access_mask |= ACE_READ_NAMED_ATTRS;
+ if (acl_produce & write_named_set)
+ access_mask |= ACE_WRITE_NAMED_ATTRS;
+
+ return (access_mask);
+}
+
+/*
+ * Given an mode_t, convert it into an access_mask as used
+ * by nfsace, assuming aclent_t -> nfsace semantics.
+ */
+static uint32_t
+mode_to_ace_access(mode_t mode, int isdir, int isowner, int isallow)
+{
+ uint32_t access = 0;
+ int haswriteperm = 0;
+ int hasreadperm = 0;
+
+ if (isallow) {
+ haswriteperm = (mode & 02);
+ hasreadperm = (mode & 04);
+ } else {
+ haswriteperm = !(mode & 02);
+ hasreadperm = !(mode & 04);
+ }
+
+ /*
+ * The following call takes care of correctly setting the following
+ * mask bits in the access_mask:
+ * ACE_SYNCHRONIZE, ACE_WRITE_OWNER, ACE_DELETE,
+ * ACE_WRITE_ATTRIBUTES, ACE_WRITE_NAMED_ATTRS, ACE_READ_NAMED_ATTRS
+ */
+ access = access_mask_set(haswriteperm, hasreadperm, isowner, isallow);
+
+ if (isallow) {
+ access |= ACE_READ_ACL | ACE_READ_ATTRIBUTES;
+ if (isowner)
+ access |= ACE_WRITE_ACL;
+ } else {
+ if (! isowner)
+ access |= ACE_WRITE_ACL;
+ }
+
+ /* read */
+ if (mode & 04) {
+ access |= ACE_READ_DATA;
+ }
+ /* write */
+ if (mode & 02) {
+ access |= ACE_WRITE_DATA |
+ ACE_APPEND_DATA;
+ if (isdir)
+ access |= ACE_DELETE_CHILD;
+ }
+ /* exec */
+ if (mode & 01) {
+ access |= ACE_EXECUTE;
+ }
+
+ return (access);
+}
+
+/*
+ * Given an nfsace (presumably an ALLOW entry), make a
+ * corresponding DENY entry at the address given.
+ */
+static void
+ace_make_deny(ace_t *allow, ace_t *deny, int isdir, int isowner)
+{
+ (void) memcpy(deny, allow, sizeof (ace_t));
+
+ deny->a_who = allow->a_who;
+
+ deny->a_type = ACE_ACCESS_DENIED_ACE_TYPE;
+ deny->a_access_mask ^= ACE_POSIX_SUPPORTED_BITS;
+ if (isdir)
+ deny->a_access_mask ^= ACE_DELETE_CHILD;
+
+ deny->a_access_mask &= ~(ACE_SYNCHRONIZE | ACE_WRITE_OWNER |
+ ACE_DELETE | ACE_WRITE_ATTRIBUTES | ACE_READ_NAMED_ATTRS |
+ ACE_WRITE_NAMED_ATTRS);
+ deny->a_access_mask |= access_mask_set((allow->a_access_mask &
+ ACE_WRITE_DATA), (allow->a_access_mask & ACE_READ_DATA), isowner,
+ B_FALSE);
+}
+/*
+ * Make an initial pass over an array of aclent_t's. Gather
+ * information such as an ACL_MASK (if any), number of users,
+ * number of groups, and whether the array needs to be sorted.
+ */
+static int
+ln_aent_preprocess(aclent_t *aclent, int n,
+ int *hasmask, mode_t *mask,
+ int *numuser, int *numgroup, int *needsort)
+{
+ int error = 0;
+ int i;
+ int curtype = 0;
+
+ *hasmask = 0;
+ *mask = 07;
+ *needsort = 0;
+ *numuser = 0;
+ *numgroup = 0;
+
+ for (i = 0; i < n; i++) {
+ if (aclent[i].a_type < curtype)
+ *needsort = 1;
+ else if (aclent[i].a_type > curtype)
+ curtype = aclent[i].a_type;
+ if (aclent[i].a_type & USER)
+ (*numuser)++;
+ if (aclent[i].a_type & (GROUP | GROUP_OBJ))
+ (*numgroup)++;
+ if (aclent[i].a_type & CLASS_OBJ) {
+ if (*hasmask) {
+ error = EINVAL;
+ goto out;
+ } else {
+ *hasmask = 1;
+ *mask = aclent[i].a_perm;
+ }
+ }
+ }
+
+ if ((! *hasmask) && (*numuser + *numgroup > 1)) {
+ error = EINVAL;
+ goto out;
+ }
+
+out:
+ return (error);
+}
+
+/*
+ * Convert an array of aclent_t into an array of nfsace entries,
+ * following POSIX draft -> nfsv4 conversion semantics as outlined in
+ * the IETF draft.
+ */
+static int
+ln_aent_to_ace(aclent_t *aclent, int n, ace_t **acepp, int *rescount, int isdir)
+{
+ int error = 0;
+ mode_t mask;
+ int numuser, numgroup, needsort;
+ int resultsize = 0;
+ int i, groupi = 0, skip;
+ ace_t *acep, *result = NULL;
+ int hasmask;
+
+ error = ln_aent_preprocess(aclent, n, &hasmask, &mask,
+ &numuser, &numgroup, &needsort);
+ if (error != 0)
+ goto out;
+
+ /* allow + deny for each aclent */
+ resultsize = n * 2;
+ if (hasmask) {
+ /*
+ * stick extra deny on the group_obj and on each
+ * user|group for the mask (the group_obj was added
+ * into the count for numgroup)
+ */
+ resultsize += numuser + numgroup;
+ /* ... and don't count the mask itself */
+ resultsize -= 2;
+ }
+
+ /* sort the source if necessary */
+ if (needsort)
+ ksort((caddr_t)aclent, n, sizeof (aclent_t), cmp2acls);
+
+ result = acep = calloc(1, resultsize * sizeof (ace_t));
+ if (result == NULL)
+ goto out;
+
+ for (i = 0; i < n; i++) {
+ /*
+ * don't process CLASS_OBJ (mask); mask was grabbed in
+ * ln_aent_preprocess()
+ */
+ if (aclent[i].a_type & CLASS_OBJ)
+ continue;
+
+ /* If we need an ACL_MASK emulator, prepend it now */
+ if ((hasmask) &&
+ (aclent[i].a_type & (USER | GROUP | GROUP_OBJ))) {
+ acep->a_type = ACE_ACCESS_DENIED_ACE_TYPE;
+ acep->a_flags = 0;
+ if (aclent[i].a_type & GROUP_OBJ) {
+ acep->a_who = -1;
+ acep->a_flags |=
+ (ACE_IDENTIFIER_GROUP|ACE_GROUP);
+ } else if (aclent[i].a_type & USER) {
+ acep->a_who = aclent[i].a_id;
+ } else {
+ acep->a_who = aclent[i].a_id;
+ acep->a_flags |= ACE_IDENTIFIER_GROUP;
+ }
+ if (aclent[i].a_type & ACL_DEFAULT) {
+ acep->a_flags |= ACE_INHERIT_ONLY_ACE |
+ ACE_FILE_INHERIT_ACE |
+ ACE_DIRECTORY_INHERIT_ACE;
+ }
+ /*
+ * Set the access mask for the prepended deny
+ * ace. To do this, we invert the mask (found
+ * in ln_aent_preprocess()) then convert it to an
+ * DENY ace access_mask.
+ */
+ acep->a_access_mask = mode_to_ace_access((mask ^ 07),
+ isdir, 0, 0);
+ acep += 1;
+ }
+
+ /* handle a_perm -> access_mask */
+ acep->a_access_mask = mode_to_ace_access(aclent[i].a_perm,
+ isdir, aclent[i].a_type & USER_OBJ, 1);
+
+ /* emulate a default aclent */
+ if (aclent[i].a_type & ACL_DEFAULT) {
+ acep->a_flags |= ACE_INHERIT_ONLY_ACE |
+ ACE_FILE_INHERIT_ACE |
+ ACE_DIRECTORY_INHERIT_ACE;
+ }
+
+ /*
+ * handle a_perm and a_id
+ *
+ * this must be done last, since it involves the
+ * corresponding deny aces, which are handled
+ * differently for each different a_type.
+ */
+ if (aclent[i].a_type & USER_OBJ) {
+ acep->a_who = -1;
+ acep->a_flags |= ACE_OWNER;
+ ace_make_deny(acep, acep + 1, isdir, B_TRUE);
+ acep += 2;
+ } else if (aclent[i].a_type & USER) {
+ acep->a_who = aclent[i].a_id;
+ ace_make_deny(acep, acep + 1, isdir, B_FALSE);
+ acep += 2;
+ } else if (aclent[i].a_type & (GROUP_OBJ | GROUP)) {
+ if (aclent[i].a_type & GROUP_OBJ) {
+ acep->a_who = -1;
+ acep->a_flags |= ACE_GROUP;
+ } else {
+ acep->a_who = aclent[i].a_id;
+ }
+ acep->a_flags |= ACE_IDENTIFIER_GROUP;
+ /*
+ * Set the corresponding deny for the group ace.
+ *
+ * The deny aces go after all of the groups, unlike
+ * everything else, where they immediately follow
+ * the allow ace.
+ *
+ * We calculate "skip", the number of slots to
+ * skip ahead for the deny ace, here.
+ *
+ * The pattern is:
+ * MD1 A1 MD2 A2 MD3 A3 D1 D2 D3
+ * thus, skip is
+ * (2 * numgroup) - 1 - groupi
+ * (2 * numgroup) to account for MD + A
+ * - 1 to account for the fact that we're on the
+ * access (A), not the mask (MD)
+ * - groupi to account for the fact that we have
+ * passed up groupi number of MD's.
+ */
+ skip = (2 * numgroup) - 1 - groupi;
+ ace_make_deny(acep, acep + skip, isdir, B_FALSE);
+ /*
+ * If we just did the last group, skip acep past
+ * all of the denies; else, just move ahead one.
+ */
+ if (++groupi >= numgroup)
+ acep += numgroup + 1;
+ else
+ acep += 1;
+ } else if (aclent[i].a_type & OTHER_OBJ) {
+ acep->a_who = -1;
+ acep->a_flags |= ACE_EVERYONE;
+ ace_make_deny(acep, acep + 1, isdir, B_FALSE);
+ acep += 2;
+ } else {
+ error = EINVAL;
+ goto out;
+ }
+ }
+
+ *acepp = result;
+ *rescount = resultsize;
+
+out:
+ if (error != 0) {
+ if ((result != NULL) && (resultsize > 0)) {
+ free(result);
+ }
+ }
+
+ return (error);
+}
+
+static int
+convert_aent_to_ace(aclent_t *aclentp, int aclcnt, int isdir,
+ ace_t **retacep, int *retacecnt)
+{
+ ace_t *acep;
+ ace_t *dfacep;
+ ace_t *newacep;
+ int acecnt = 0;
+ int dfacecnt = 0;
+ int dfaclstart = 0;
+ int dfaclcnt = 0;
+ aclent_t *aclp;
+ int i;
+ int error;
+
+ ksort((caddr_t)aclentp, aclcnt, sizeof (aclent_t), cmp2acls);
+
+ for (i = 0, aclp = aclentp; i < aclcnt; aclp++, i++) {
+ if (aclp->a_type & ACL_DEFAULT)
+ break;
+ }
+
+ if (i < aclcnt) {
+ dfaclstart = aclcnt - i;
+ dfaclcnt = i;
+ }
+
+ if (dfaclcnt && isdir == 0) {
+ return (-1);
+ }
+
+ error = ln_aent_to_ace(aclentp, i, &acep, &acecnt, isdir);
+ if (error)
+ return (-1);
+
+ if (dfaclcnt) {
+ error = ln_aent_to_ace(&aclentp[dfaclstart], dfaclcnt,
+ &dfacep, &dfacecnt, isdir);
+ if (error) {
+ if (acep) {
+ free(acep);
+ }
+ return (-1);
+ }
+ }
+
+ newacep = malloc(sizeof (ace_t) * (acecnt + dfacecnt));
+ if (newacep == NULL)
+ return (-1);
+
+ (void) memcpy(newacep, acep, sizeof (ace_t) * acecnt);
+ if (dfaclcnt) {
+ (void) memcpy(newacep + acecnt, dfacep,
+ sizeof (ace_t) * dfacecnt);
+ }
+ free(acep);
+ if (dfaclcnt)
+ free(dfacep);
+
+ *retacecnt = acecnt + dfacecnt;
+ *retacep = newacep;
+ return (0);
+}
+
+
+static int
+cacl_get(acl_inp inp, int get_flag, int type, acl_t **aclp)
+{
+ const char *fname;
+ int fd;
+ int ace_acl = 0;
+ int error;
+ int getcmd, cntcmd;
+ acl_t *acl_info;
+ int save_errno;
+ int stat_error;
+ struct stat64 statbuf;
+
+ *aclp = NULL;
+ if (type == ACL_PATH) {
+ fname = inp.file;
+ ace_acl = pathconf(fname, _PC_ACL_ENABLED);
+ } else {
+ fd = inp.fd;
+ ace_acl = fpathconf(fd, _PC_ACL_ENABLED);
+ }
+
+ if (ace_acl == -1)
+ return (-1);
+
+ /*
+ * if acl's aren't supported then
+ * send it through the old GETACL interface
+ */
+ if (ace_acl == 0) {
+ ace_acl = _ACL_ACLENT_ENABLED;
+ }
+
+ if (ace_acl & _ACL_ACE_ENABLED) {
+ cntcmd = ACE_GETACLCNT;
+ getcmd = ACE_GETACL;
+ acl_info = acl_alloc(ACE_T);
+ } else {
+ cntcmd = GETACLCNT;
+ getcmd = GETACL;
+ acl_info = acl_alloc(ACLENT_T);
+ }
+
+ if (acl_info == NULL)
+ return (-1);
+
+ if (type == ACL_PATH) {
+ acl_info->acl_cnt = acl(fname, cntcmd, 0, NULL);
+ } else {
+ acl_info->acl_cnt = facl(fd, cntcmd, 0, NULL);
+ }
+
+ save_errno = errno;
+ if (acl_info->acl_cnt < 0) {
+ acl_free(acl_info);
+ errno = save_errno;
+ return (-1);
+ }
+
+ if (acl_info->acl_cnt == 0) {
+ acl_free(acl_info);
+ errno = save_errno;
+ return (0);
+ }
+
+ acl_info->acl_aclp =
+ malloc(acl_info->acl_cnt * acl_info->acl_entry_size);
+ save_errno = errno;
+
+ if (acl_info->acl_aclp == NULL) {
+ acl_free(acl_info);
+ errno = save_errno;
+ return (-1);
+ }
+
+ if (type == ACL_PATH) {
+ stat_error = stat64(fname, &statbuf);
+ error = acl(fname, getcmd, acl_info->acl_cnt,
+ acl_info->acl_aclp);
+ } else {
+ stat_error = fstat64(fd, &statbuf);
+ error = facl(fd, getcmd, acl_info->acl_cnt,
+ acl_info->acl_aclp);
+ }
+
+ save_errno = errno;
+ if (error == -1) {
+ acl_free(acl_info);
+ errno = save_errno;
+ return (-1);
+ }
+
+
+ if (stat_error == 0) {
+ acl_info->acl_flags =
+ (S_ISDIR(statbuf.st_mode) ? ACL_IS_DIR : 0);
+ } else
+ acl_info->acl_flags = 0;
+
+ switch (acl_info->acl_type) {
+ case ACLENT_T:
+ if (acl_info->acl_cnt <= MIN_ACL_ENTRIES)
+ acl_info->acl_flags |= ACL_IS_TRIVIAL;
+ break;
+ case ACE_T:
+ if (ace_trivial(acl_info->acl_aclp, acl_info->acl_cnt) == 0)
+ acl_info->acl_flags |= ACL_IS_TRIVIAL;
+ break;
+ default:
+ errno = EINVAL;
+ acl_free(acl_info);
+ return (-1);
+ }
+
+ if ((acl_info->acl_flags & ACL_IS_TRIVIAL) &&
+ (get_flag & ACL_NO_TRIVIAL)) {
+ acl_free(acl_info);
+ errno = 0;
+ return (0);
+ }
+
+ *aclp = acl_info;
+ return (0);
+}
+
+/*
+ * return -1 on failure, otherwise the number of acl
+ * entries is returned
+ */
+int
+acl_get(const char *path, int get_flag, acl_t **aclp)
+{
+ acl_inp acl_inp;
+ acl_inp.file = path;
+
+ return (cacl_get(acl_inp, get_flag, ACL_PATH, aclp));
+}
+
+int
+facl_get(int fd, int get_flag, acl_t **aclp)
+{
+
+ acl_inp acl_inp;
+ acl_inp.fd = fd;
+
+ return (cacl_get(acl_inp, get_flag, ACL_FD, aclp));
+}
+
+/*
+ * Set an ACL, translates acl to ace_t when appropriate.
+ */
+static int
+cacl_set(acl_inp *acl_inp, acl_t *aclp, int type)
+{
+ int error = 0;
+ int acl_flavor_target;
+ ace_t *acep = NULL;
+ int acecnt;
+ struct stat64 statbuf;
+ int stat_error;
+ int isdir;
+
+
+ if (type == ACL_PATH) {
+ stat_error = stat64(acl_inp->file, &statbuf);
+ if (stat_error)
+ return (-1);
+ acl_flavor_target = pathconf(acl_inp->file, _PC_ACL_ENABLED);
+ } else {
+ stat_error = fstat64(acl_inp->fd, &statbuf);
+ if (stat_error)
+ return (-1);
+ acl_flavor_target = fpathconf(acl_inp->fd, _PC_ACL_ENABLED);
+ }
+
+ isdir = S_ISDIR(statbuf.st_mode);
+
+ if (acl_flavor_target == -1)
+ return (-1);
+
+ /*
+ * Translate aclent_t ACL's to ACE ACL's.
+ */
+ if (acl_flavor_target == _ACL_ACE_ENABLED &&
+ aclp->acl_type == ACLENT_T) {
+ error = convert_aent_to_ace(aclp->acl_aclp,
+ aclp->acl_cnt, isdir, &acep, &acecnt);
+ if (error) {
+ errno = ENOTSUP;
+ return (-1);
+ }
+ /*
+ * replace old acl with newly translated acl
+ */
+ free(aclp->acl_aclp);
+ aclp->acl_aclp = acep;
+ aclp->acl_cnt = acecnt;
+ aclp->acl_type = ACE_T;
+ }
+
+ if (type == ACL_PATH) {
+ error = acl(acl_inp->file,
+ (aclp->acl_type == ACE_T) ? ACE_SETACL : SETACL,
+ aclp->acl_cnt, aclp->acl_aclp);
+ } else {
+ error = facl(acl_inp->fd,
+ (aclp->acl_type == ACE_T) ? ACE_SETACL : SETACL,
+ aclp->acl_cnt, aclp->acl_aclp);
+ }
+
+ return (error);
+}
+
+int
+acl_set(const char *path, acl_t *aclp)
+{
+ acl_inp acl_inp;
+
+ acl_inp.file = path;
+
+ return (cacl_set(&acl_inp, aclp, ACL_PATH));
+}
+
+int
+facl_set(int fd, acl_t *aclp)
+{
+ acl_inp acl_inp;
+
+ acl_inp.fd = fd;
+
+ return (cacl_set(&acl_inp, aclp, ACL_FD));
+}
+
+int
+acl_cnt(acl_t *aclp)
+{
+ return (aclp->acl_cnt);
+}
+
+int
+acl_type(acl_t *aclp)
+{
+ return (aclp->acl_type);
+}
+
+acl_t *
+acl_dup(acl_t *aclp)
+{
+ acl_t *newaclp;
+
+ newaclp = acl_alloc(aclp->acl_type);
+ if (newaclp == NULL)
+ return (NULL);
+
+ newaclp->acl_aclp = malloc(aclp->acl_entry_size * aclp->acl_cnt);
+ if (newaclp->acl_aclp == NULL) {
+ acl_free(newaclp);
+ return (NULL);
+ }
+
+ (void) memcpy(newaclp->acl_aclp,
+ aclp->acl_aclp, aclp->acl_entry_size * aclp->acl_cnt);
+ newaclp->acl_cnt = aclp->acl_cnt;
+
+ return (newaclp);
+}
+
+int
+acl_flags(acl_t *aclp)
+{
+ return (aclp->acl_flags);
+}
+
+void *
+acl_data(acl_t *aclp)
+{
+ return (aclp->acl_aclp);
+}
+
+/*
+ * Remove an ACL from a file and create a trivial ACL based
+ * off of the mode argument. After acl has been set owner/group
+ * are updated to match owner,group arguments
+ */
+int
+acl_strip(const char *file, uid_t owner, gid_t group, mode_t mode)
+{
+ int error = 0;
+ aclent_t min_acl[MIN_ACL_ENTRIES];
+ ace_t min_ace_acl[6]; /* owner, group, everyone + complement denies */
+ int acl_flavor;
+ int aclcnt;
+
+ acl_flavor = pathconf(file, _PC_ACL_ENABLED);
+
+ if (acl_flavor == -1)
+ return (-1);
+ /*
+ * force it through aclent flavor when file system doesn't
+ * understand question
+ */
+ if (acl_flavor == 0)
+ acl_flavor = _ACL_ACLENT_ENABLED;
+
+ if (acl_flavor & _ACL_ACLENT_ENABLED) {
+ min_acl[0].a_type = USER_OBJ;
+ min_acl[0].a_id = owner;
+ min_acl[0].a_perm = ((mode & 0700) >> 6);
+ min_acl[1].a_type = GROUP_OBJ;
+ min_acl[1].a_id = group;
+ min_acl[1].a_perm = ((mode & 0070) >> 3);
+ min_acl[2].a_type = CLASS_OBJ;
+ min_acl[2].a_id = (uid_t)-1;
+ min_acl[2].a_perm = ((mode & 0070) >> 3);
+ min_acl[3].a_type = OTHER_OBJ;
+ min_acl[3].a_id = (uid_t)-1;
+ min_acl[3].a_perm = (mode & 0007);
+ aclcnt = 4;
+ error = acl(file, SETACL, aclcnt, min_acl);
+ } else if (acl_flavor & _ACL_ACE_ENABLED) {
+ (void) memcpy(min_ace_acl, trivial_acl, sizeof (ace_t) * 6);
+
+ /*
+ * Make aces match request mode
+ */
+ adjust_ace_pair(&min_ace_acl[0], (mode & 0700) >> 6);
+ adjust_ace_pair(&min_ace_acl[2], (mode & 0070) >> 3);
+ adjust_ace_pair(&min_ace_acl[4], mode & 0007);
+
+ error = acl(file, ACE_SETACL, 6, min_ace_acl);
+ } else {
+ errno = EINVAL;
+ error = 1;
+ }
+
+ if (error == 0)
+ error = chown(file, owner, group);
+ return (error);
+}
+
+static int
+ace_match(void *entry1, void *entry2)
+{
+ ace_t *p1 = (ace_t *)entry1;
+ ace_t *p2 = (ace_t *)entry2;
+ ace_t ace1, ace2;
+
+ ace1 = *p1;
+ ace2 = *p2;
+
+ /*
+ * Need to fixup who field for abstrations for
+ * accurate comparison, since field is undefined.
+ */
+ if (ace1.a_flags & (ACE_OWNER|ACE_GROUP|ACE_EVERYONE))
+ ace1.a_who = -1;
+ if (ace2.a_flags & (ACE_OWNER|ACE_GROUP|ACE_EVERYONE))
+ ace2.a_who = -1;
+ return (memcmp(&ace1, &ace2, sizeof (ace_t)));
+}
+
+static int
+aclent_match(void *entry1, void *entry2)
+{
+ aclent_t *aclent1 = (aclent_t *)entry1;
+ aclent_t *aclent2 = (aclent_t *)entry2;
+
+ return (memcmp(aclent1, aclent2, sizeof (aclent_t)));
+}
+
+/*
+ * Find acl entries in acl that correspond to removeacl. Search
+ * is started from slot. The flag argument indicates whether to
+ * remove all matches or just the first match.
+ */
+int
+acl_removeentries(acl_t *acl, acl_t *removeacl, int start_slot, int flag)
+{
+ int i, j;
+ int match;
+ int (*acl_match)(void *acl1, void *acl2);
+ void *acl_entry, *remove_entry;
+ void *start;
+ int found = 0;
+
+ if (flag != ACL_REMOVE_ALL && flag != ACL_REMOVE_FIRST)
+ flag = ACL_REMOVE_FIRST;
+
+ if (acl == NULL || removeacl == NULL)
+ return (EACL_NO_ACL_ENTRY);
+
+ if (acl->acl_type != removeacl->acl_type)
+ return (EACL_DIFF_TYPE);
+
+ if (acl->acl_type == ACLENT_T)
+ acl_match = aclent_match;
+ else
+ acl_match = ace_match;
+
+ for (i = 0, remove_entry = removeacl->acl_aclp;
+ i != removeacl->acl_cnt; i++) {
+
+ j = 0;
+ acl_entry = (char *)acl->acl_aclp +
+ (acl->acl_entry_size * start_slot);
+ for (;;) {
+ match = acl_match(acl_entry, remove_entry);
+ if (match == 0) {
+ found++;
+ start = (char *)acl_entry +
+ acl->acl_entry_size;
+ (void) memmove(acl_entry, start,
+ acl->acl_entry_size *
+ acl->acl_cnt-- - (j + 1));
+
+ if (flag == ACL_REMOVE_FIRST)
+ break;
+ /*
+ * List has changed, restart search from
+ * beginning.
+ */
+ acl_entry = acl->acl_aclp;
+ j = 0;
+ continue;
+ }
+ acl_entry = ((char *)acl_entry + acl->acl_entry_size);
+ if (++j >= acl->acl_cnt) {
+ break;
+ }
+ }
+ }
+
+ return ((found == 0) ? EACL_NO_ACL_ENTRY : 0);
+}
+
+/*
+ * Replace entires entries in acl1 with the corresponding entries
+ * in newentries. The where argument specifies where to begin
+ * the replacement. If the where argument is 1 greater than the
+ * number of acl entries in acl1 then they are appended. If the
+ * where argument is 2+ greater than the number of acl entries then
+ * EACL_INVALID_SLOT is returned.
+ */
+int
+acl_modifyentries(acl_t *acl1, acl_t *newentries, int where)
+{
+
+ int slot;
+ int slots_needed;
+ int slots_left;
+ int newsize;
+
+ if (acl1 == NULL || newentries == NULL)
+ return (EACL_NO_ACL_ENTRY);
+
+ if (where < 0 || where >= acl1->acl_cnt)
+ return (EACL_INVALID_SLOT);
+
+ if (acl1->acl_type != newentries->acl_type)
+ return (EACL_DIFF_TYPE);
+
+ slot = where;
+
+ slots_left = acl1->acl_cnt - slot + 1;
+ if (slots_left < newentries->acl_cnt) {
+ slots_needed = newentries->acl_cnt - slots_left;
+ newsize = (acl1->acl_entry_size * acl1->acl_cnt) +
+ (acl1->acl_entry_size * slots_needed);
+ acl1->acl_aclp = realloc(acl1->acl_aclp, newsize);
+ if (acl1->acl_aclp == NULL)
+ return (-1);
+ }
+ (void) memcpy((char *)acl1->acl_aclp + (acl1->acl_entry_size * slot),
+ newentries->acl_aclp,
+ newentries->acl_entry_size * newentries->acl_cnt);
+
+ /*
+ * Did ACL grow?
+ */
+
+ if ((slot + newentries->acl_cnt) > acl1->acl_cnt) {
+ acl1->acl_cnt = slot + newentries->acl_cnt;
+ }
+
+ return (0);
+}
+
+/*
+ * Add acl2 entries into acl1. The where argument specifies where
+ * to add the entries.
+ */
+int
+acl_addentries(acl_t *acl1, acl_t *acl2, int where)
+{
+
+ int newsize;
+ int len;
+ void *start;
+ void *to;
+
+ if (acl1 == NULL || acl2 == NULL)
+ return (EACL_NO_ACL_ENTRY);
+
+ if (acl1->acl_type != acl2->acl_type)
+ return (EACL_DIFF_TYPE);
+
+ /*
+ * allow where to specify 1 past last slot for an append operation
+ * but anything greater is an error.
+ */
+ if (where < 0 || where > acl1->acl_cnt)
+ return (EACL_INVALID_SLOT);
+
+ newsize = (acl2->acl_entry_size * acl2->acl_cnt) +
+ (acl1->acl_entry_size * acl1->acl_cnt);
+ acl1->acl_aclp = realloc(acl1->acl_aclp, newsize);
+ if (acl1->acl_aclp == NULL)
+ return (-1);
+
+ /*
+ * first push down entries where new ones will be inserted
+ */
+
+ to = (void *)((char *)acl1->acl_aclp +
+ ((where + acl2->acl_cnt) * acl1->acl_entry_size));
+
+ start = (void *)((char *)acl1->acl_aclp +
+ where * acl1->acl_entry_size);
+
+ if (where < acl1->acl_cnt) {
+ len = (acl1->acl_cnt - where) * acl1->acl_entry_size;
+ (void) memmove(to, start, len);
+ }
+
+ /*
+ * now stick in new entries.
+ */
+
+ (void) memmove(start, acl2->acl_aclp,
+ acl2->acl_cnt * acl2->acl_entry_size);
+
+ acl1->acl_cnt += acl2->acl_cnt;
+ return (0);
+}
+
+static void
+aclent_perms(int perm, char *txt_perms)
+{
+ if (perm & S_IROTH)
+ txt_perms[0] = 'r';
+ else
+ txt_perms[0] = '-';
+ if (perm & S_IWOTH)
+ txt_perms[1] = 'w';
+ else
+ txt_perms[1] = '-';
+ if (perm & S_IXOTH)
+ txt_perms[2] = 'x';
+ else
+ txt_perms[2] = '-';
+ txt_perms[3] = '\0';
+}
+
+static char *
+pruname(uid_t uid)
+{
+ struct passwd *passwdp;
+ static char uidp[10]; /* big enough */
+
+ passwdp = getpwuid(uid);
+ if (passwdp == (struct passwd *)NULL) {
+ /* could not get passwd information: display uid instead */
+ (void) sprintf(uidp, "%ld", (long)uid);
+ return (uidp);
+ } else
+ return (passwdp->pw_name);
+}
+
+static char *
+prgname(gid_t gid)
+{
+ struct group *groupp;
+ static char gidp[10]; /* big enough */
+
+ groupp = getgrgid(gid);
+ if (groupp == (struct group *)NULL) {
+ /* could not get group information: display gid instead */
+ (void) sprintf(gidp, "%ld", (long)gid);
+ return (gidp);
+ } else
+ return (groupp->gr_name);
+}
+static void
+aclent_printacl(acl_t *aclp)
+{
+ aclent_t *tp;
+ int aclcnt;
+ int mask;
+ int slot = 0;
+ char perm[4];
+
+ /* display ACL: assume it is sorted. */
+ aclcnt = aclp->acl_cnt;
+ for (tp = aclp->acl_aclp; aclcnt--; tp++) {
+ if (tp->a_type == CLASS_OBJ)
+ mask = tp->a_perm;
+ }
+ aclcnt = aclp->acl_cnt;
+ for (tp = aclp->acl_aclp; aclcnt--; tp++) {
+ (void) printf(" %d:", slot++);
+ switch (tp->a_type) {
+ case USER:
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("user:%s:%s\t\t",
+ pruname(tp->a_id), perm);
+ aclent_perms((tp->a_perm & mask), perm);
+ (void) printf("#effective:%s\n", perm);
+ break;
+ case USER_OBJ:
+ /* no need to display uid */
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("user::%s\n", perm);
+ break;
+ case GROUP:
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("group:%s:%s\t\t",
+ prgname(tp->a_id), perm);
+ aclent_perms(tp->a_perm & mask, perm);
+ (void) printf("#effective:%s\n", perm);
+ break;
+ case GROUP_OBJ:
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("group::%s\t\t", perm);
+ aclent_perms(tp->a_perm & mask, perm);
+ (void) printf("#effective:%s\n", perm);
+ break;
+ case CLASS_OBJ:
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("mask:%s\n", perm);
+ break;
+ case OTHER_OBJ:
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("other:%s\n", perm);
+ break;
+ case DEF_USER:
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("default:user:%s:%s\n",
+ pruname(tp->a_id), perm);
+ break;
+ case DEF_USER_OBJ:
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("default:user::%s\n", perm);
+ break;
+ case DEF_GROUP:
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("default:group:%s:%s\n",
+ prgname(tp->a_id), perm);
+ break;
+ case DEF_GROUP_OBJ:
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("default:group::%s\n", perm);
+ break;
+ case DEF_CLASS_OBJ:
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("default:mask:%s\n", perm);
+ break;
+ case DEF_OTHER_OBJ:
+ aclent_perms(tp->a_perm, perm);
+ (void) printf("default:other:%s\n", perm);
+ break;
+ default:
+ (void) fprintf(stderr,
+ gettext("unrecognized entry\n"));
+ break;
+ }
+ }
+}
+
+static void
+split_line(char *str, int cols)
+{
+ char *ptr;
+ int len;
+ int i;
+ int last_split;
+ char pad[11];
+ int pad_len;
+
+ len = strlen(str);
+ ptr = str;
+ (void) strcpy(pad, "");
+ pad_len = 0;
+
+ ptr = str;
+ last_split = 0;
+ for (i = 0; i != len; i++) {
+ if ((i + pad_len + 4) >= cols) {
+ (void) printf("%s%.*s\n", pad, last_split, ptr);
+ ptr = &ptr[last_split];
+ len = strlen(ptr);
+ i = 0;
+ pad_len = 4;
+ (void) strcpy(pad, " ");
+ } else {
+ if (ptr[i] == '/' || ptr[i] == ':') {
+ last_split = i;
+ }
+ }
+ }
+ if (i == len) {
+ (void) printf("%s%s\n", pad, ptr);
+ }
+}
+
+static void
+ace_printacl(acl_t *aclp, int cols)
+{
+ int slot = 0;
+ char *token;
+ char *acltext;
+
+ acltext = acl_totext(aclp);
+
+ if (acltext == NULL)
+ return;
+
+ token = strtok(acltext, ",");
+ if (token == NULL) {
+ free(acltext);
+ return;
+ }
+
+ do {
+ (void) printf(" %d:", slot++);
+ split_line(token, cols - 5);
+ } while (token = strtok(NULL, ","));
+ free(acltext);
+}
+
+/*
+ * pretty print an ACL.
+ * For aclent_t ACL's the format is
+ * similar to the old format used by getfacl,
+ * with the addition of adding a "slot" number
+ * before each entry.
+ *
+ * for ace_t ACL's the cols variable will break up
+ * the long lines into multiple lines and will also
+ * print a "slot" number.
+ */
+void
+acl_printacl(acl_t *aclp, int cols)
+{
+
+ switch (aclp->acl_type) {
+ case ACLENT_T:
+ aclent_printacl(aclp);
+ break;
+ case ACE_T:
+ ace_printacl(aclp, cols);
+ break;
+ }
+}
+
+
+/*
+ * return text for an ACL error.
+ */
+char *
+acl_strerror(int errnum)
+{
+ switch (errnum) {
+ case EACL_GRP_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "There is more than one user group owner entry"));
+ case EACL_USER_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "There is more than one user owner entry"));
+ case EACL_OTHER_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "There is more than one other entry"));
+ case EACL_CLASS_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "There is more than one mask entry"));
+ case EACL_DUPLICATE_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "Duplicate user or group entries"));
+ case EACL_MISS_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "Missing user/group owner, other, mask entry"));
+ case EACL_MEM_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "Memory error"));
+ case EACL_ENTRY_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "Unrecognized entry type"));
+ case EACL_INHERIT_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "Invalid inheritance flags"));
+ case EACL_FLAGS_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "Unrecognized entry flags"));
+ case EACL_PERM_MASK_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "Invalid ACL permissions"));
+ case EACL_COUNT_ERROR:
+ return (dgettext(TEXT_DOMAIN,
+ "Invalid ACL count"));
+ case EACL_INVALID_SLOT:
+ return (dgettext(TEXT_DOMAIN,
+ "Invalid ACL entry number specified"));
+ case EACL_NO_ACL_ENTRY:
+ return (dgettext(TEXT_DOMAIN,
+ "ACL entry doesn't exist"));
+ case EACL_DIFF_TYPE:
+ return (dgettext(TEXT_DOMAIN,
+ "ACL type's are different"));
+ case EACL_INVALID_USER_GROUP:
+ return (dgettext(TEXT_DOMAIN, "Invalid user or group"));
+ case EACL_INVALID_STR:
+ return (dgettext(TEXT_DOMAIN, "ACL string is invalid"));
+ case EACL_FIELD_NOT_BLANK:
+ return (dgettext(TEXT_DOMAIN, "Field expected to be blank"));
+ case EACL_INVALID_ACCESS_TYPE:
+ return (dgettext(TEXT_DOMAIN, "Invalid access type"));
+ case EACL_UNKNOWN_DATA:
+ return (dgettext(TEXT_DOMAIN, "Unrecognized entry"));
+ case EACL_MISSING_FIELDS:
+ return (dgettext(TEXT_DOMAIN,
+ "ACL specification missing required fields"));
+ case EACL_INHERIT_NOTDIR:
+ return (dgettext(TEXT_DOMAIN,
+ "Inheritance flags are only allowed on directories"));
+ case -1:
+ return (strerror(errno));
+ default:
+ errno = EINVAL;
+ return (dgettext(TEXT_DOMAIN, "Unknown error"));
+ }
+}