8809 libzpool should leverage work done in libfakekernel
[unleashed.git] / usr / src / uts / common / sys / acl.h
blobeec11886c4ac8d6fc1916b5b8983492215c84902
1 /*
2 * CDDL HEADER START
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
19 * CDDL HEADER END
22 * Copyright 2014 Garrett D'Amore <garrett@damore.org>
24 * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
25 * Use is subject to license terms.
27 * Copyright 2014 Nexenta Systems, Inc. All rights reserved.
28 * Copyright 2017 RackTop Systems.
31 #ifndef _SYS_ACL_H
32 #define _SYS_ACL_H
34 #include <sys/types.h>
35 #include <sys/acl_impl.h>
37 #ifdef __cplusplus
38 extern "C" {
39 #endif
41 #define MAX_ACL_ENTRIES (1024) /* max entries of each type */
42 typedef struct acl {
43 int a_type; /* the type of ACL entry */
44 uid_t a_id; /* the entry in -uid or gid */
45 o_mode_t a_perm; /* the permission field */
46 } aclent_t;
48 typedef struct ace {
49 uid_t a_who; /* uid or gid */
50 uint32_t a_access_mask; /* read,write,... */
51 uint16_t a_flags; /* see below */
52 uint16_t a_type; /* allow or deny */
53 } ace_t;
55 typedef struct acl_info acl_t;
58 * The following are Defined types for an aclent_t.
60 #define USER_OBJ (0x01) /* object owner */
61 #define USER (0x02) /* additional users */
62 #define GROUP_OBJ (0x04) /* owning group of the object */
63 #define GROUP (0x08) /* additional groups */
64 #define CLASS_OBJ (0x10) /* file group class and mask entry */
65 #define OTHER_OBJ (0x20) /* other entry for the object */
66 #define ACL_DEFAULT (0x1000) /* default flag */
67 /* default object owner */
68 #define DEF_USER_OBJ (ACL_DEFAULT | USER_OBJ)
69 /* default additional users */
70 #define DEF_USER (ACL_DEFAULT | USER)
71 /* default owning group */
72 #define DEF_GROUP_OBJ (ACL_DEFAULT | GROUP_OBJ)
73 /* default additional groups */
74 #define DEF_GROUP (ACL_DEFAULT | GROUP)
75 /* default mask entry */
76 #define DEF_CLASS_OBJ (ACL_DEFAULT | CLASS_OBJ)
77 /* default other entry */
78 #define DEF_OTHER_OBJ (ACL_DEFAULT | OTHER_OBJ)
81 * The following are defined for ace_t.
83 * Note, these are intentionally the same as the Windows
84 * "File Access Rights Constants" you can find on MSDN.
85 * (See also: "Standard Access Rights" on MSDN).
87 * The equivalent Windows names for these are just like
88 * those show below, with FILE_ in place of ACE_, except
89 * as noted below. Also note that Windows uses a special
90 * privilege: BYPASS_TRAVERSE_CHECKING, normally granted
91 * to everyone, that causes the absence of ACE_TRAVERSE
92 * to be ignored.
94 #define ACE_READ_DATA 0x00000001 /* file: read data */
95 #define ACE_LIST_DIRECTORY 0x00000001 /* dir: list files */
96 #define ACE_WRITE_DATA 0x00000002 /* file: write data */
97 #define ACE_ADD_FILE 0x00000002 /* dir: create file */
98 #define ACE_APPEND_DATA 0x00000004 /* file: append data */
99 #define ACE_ADD_SUBDIRECTORY 0x00000004 /* dir: create subdir */
100 #define ACE_READ_NAMED_ATTRS 0x00000008 /* FILE_READ_EA */
101 #define ACE_WRITE_NAMED_ATTRS 0x00000010 /* FILE_WRITE_EA */
102 #define ACE_EXECUTE 0x00000020 /* file: execute */
103 #define ACE_TRAVERSE 0x00000020 /* dir: lookup name */
104 #define ACE_DELETE_CHILD 0x00000040 /* dir: unlink child */
105 #define ACE_READ_ATTRIBUTES 0x00000080 /* (all) stat, etc. */
106 #define ACE_WRITE_ATTRIBUTES 0x00000100 /* (all) utimes, etc. */
107 #define ACE_DELETE 0x00010000 /* (all) unlink self */
108 #define ACE_READ_ACL 0x00020000 /* (all) getsecattr */
109 #define ACE_WRITE_ACL 0x00040000 /* (all) setsecattr */
110 #define ACE_WRITE_OWNER 0x00080000 /* (all) chown */
111 #define ACE_SYNCHRONIZE 0x00100000 /* (all) see MSDN */
114 * Some of the following are the same as Windows uses. (but NOT ALL!)
115 * See the "ACE_HEADER" structure description on MSDN for details.
116 * Comments show relations to the MSDN names.
118 #define ACE_FILE_INHERIT_ACE 0x0001 /* = OBJECT_INHERIT_ACE */
119 #define ACE_DIRECTORY_INHERIT_ACE 0x0002 /* = CONTAINER_INHERIT_ACE */
120 #define ACE_NO_PROPAGATE_INHERIT_ACE 0x0004 /* = NO_PROPAGATE_INHERIT_ACE */
121 #define ACE_INHERIT_ONLY_ACE 0x0008 /* = INHERIT_ONLY_ACE */
122 #define ACE_SUCCESSFUL_ACCESS_ACE_FLAG 0x0010
123 #define ACE_FAILED_ACCESS_ACE_FLAG 0x0020
124 #define ACE_IDENTIFIER_GROUP 0x0040
125 #define ACE_INHERITED_ACE 0x0080 /* INHERITED_ACE, 0x10 on NT */
126 #define ACE_OWNER 0x1000
127 #define ACE_GROUP 0x2000
128 #define ACE_EVERYONE 0x4000
130 /* These four are the same as Windows, but with an ACE_ prefix added. */
131 #define ACE_ACCESS_ALLOWED_ACE_TYPE 0x0000
132 #define ACE_ACCESS_DENIED_ACE_TYPE 0x0001
133 #define ACE_SYSTEM_AUDIT_ACE_TYPE 0x0002
134 #define ACE_SYSTEM_ALARM_ACE_TYPE 0x0003
136 #define ACL_AUTO_INHERIT 0x0001
137 #define ACL_PROTECTED 0x0002
138 #define ACL_DEFAULTED 0x0004
139 #define ACL_FLAGS_ALL (ACL_AUTO_INHERIT|ACL_PROTECTED| \
140 ACL_DEFAULTED)
143 * These are only applicable in a CIFS context.
144 * Here again, same as Windows, but with an ACE_ prefix added.
146 #define ACE_ACCESS_ALLOWED_COMPOUND_ACE_TYPE 0x04
147 #define ACE_ACCESS_ALLOWED_OBJECT_ACE_TYPE 0x05
148 #define ACE_ACCESS_DENIED_OBJECT_ACE_TYPE 0x06
149 #define ACE_SYSTEM_AUDIT_OBJECT_ACE_TYPE 0x07
150 #define ACE_SYSTEM_ALARM_OBJECT_ACE_TYPE 0x08
151 #define ACE_ACCESS_ALLOWED_CALLBACK_ACE_TYPE 0x09
152 #define ACE_ACCESS_DENIED_CALLBACK_ACE_TYPE 0x0A
153 #define ACE_ACCESS_ALLOWED_CALLBACK_OBJECT_ACE_TYPE 0x0B
154 #define ACE_ACCESS_DENIED_CALLBACK_OBJECT_ACE_TYPE 0x0C
155 #define ACE_SYSTEM_AUDIT_CALLBACK_ACE_TYPE 0x0D
156 #define ACE_SYSTEM_ALARM_CALLBACK_ACE_TYPE 0x0E
157 #define ACE_SYSTEM_AUDIT_CALLBACK_OBJECT_ACE_TYPE 0x0F
158 #define ACE_SYSTEM_ALARM_CALLBACK_OBJECT_ACE_TYPE 0x10
160 #define ACE_ALL_TYPES 0x001F
162 #if defined(_KERNEL) || defined(_FAKE_KERNEL)
164 typedef struct ace_object {
165 uid_t a_who; /* uid or gid */
166 uint32_t a_access_mask; /* read,write,... */
167 uint16_t a_flags; /* see below */
168 uint16_t a_type; /* allow or deny */
169 uint8_t a_obj_type[16]; /* obj type */
170 uint8_t a_inherit_obj_type[16]; /* inherit obj */
171 } ace_object_t;
173 #endif
175 #define ACE_ALL_PERMS (ACE_READ_DATA|ACE_LIST_DIRECTORY|ACE_WRITE_DATA| \
176 ACE_ADD_FILE|ACE_APPEND_DATA|ACE_ADD_SUBDIRECTORY|ACE_READ_NAMED_ATTRS| \
177 ACE_WRITE_NAMED_ATTRS|ACE_EXECUTE|ACE_DELETE_CHILD|ACE_READ_ATTRIBUTES| \
178 ACE_WRITE_ATTRIBUTES|ACE_DELETE|ACE_READ_ACL|ACE_WRITE_ACL| \
179 ACE_WRITE_OWNER|ACE_SYNCHRONIZE)
181 #define ACE_ALL_WRITE_PERMS (ACE_WRITE_DATA|ACE_APPEND_DATA| \
182 ACE_WRITE_ATTRIBUTES|ACE_WRITE_NAMED_ATTRS|ACE_WRITE_ACL| \
183 ACE_WRITE_OWNER|ACE_DELETE|ACE_DELETE_CHILD)
185 #define ACE_READ_PERMS (ACE_READ_DATA|ACE_READ_ACL|ACE_READ_ATTRIBUTES| \
186 ACE_READ_NAMED_ATTRS)
188 #define ACE_WRITE_PERMS (ACE_WRITE_DATA|ACE_APPEND_DATA|ACE_WRITE_ATTRIBUTES| \
189 ACE_WRITE_NAMED_ATTRS)
191 #define ACE_MODIFY_PERMS (ACE_READ_DATA|ACE_LIST_DIRECTORY|ACE_WRITE_DATA| \
192 ACE_ADD_FILE|ACE_APPEND_DATA|ACE_ADD_SUBDIRECTORY|ACE_READ_NAMED_ATTRS| \
193 ACE_WRITE_NAMED_ATTRS|ACE_EXECUTE|ACE_DELETE_CHILD|ACE_READ_ATTRIBUTES| \
194 ACE_WRITE_ATTRIBUTES|ACE_DELETE|ACE_READ_ACL|ACE_SYNCHRONIZE)
196 * The following flags are supported by both NFSv4 ACLs and ace_t.
198 #define ACE_NFSV4_SUP_FLAGS (ACE_FILE_INHERIT_ACE | \
199 ACE_DIRECTORY_INHERIT_ACE | \
200 ACE_NO_PROPAGATE_INHERIT_ACE | \
201 ACE_INHERIT_ONLY_ACE | \
202 ACE_IDENTIFIER_GROUP)
204 #define ACE_TYPE_FLAGS (ACE_OWNER|ACE_GROUP|ACE_EVERYONE| \
205 ACE_IDENTIFIER_GROUP)
206 #define ACE_INHERIT_FLAGS (ACE_FILE_INHERIT_ACE| \
207 ACE_DIRECTORY_INHERIT_ACE|ACE_NO_PROPAGATE_INHERIT_ACE|ACE_INHERIT_ONLY_ACE)
209 /* cmd args to acl(2) for aclent_t */
210 #define GETACL 1
211 #define SETACL 2
212 #define GETACLCNT 3
214 /* cmd's to manipulate ace acls. */
215 #define ACE_GETACL 4
216 #define ACE_SETACL 5
217 #define ACE_GETACLCNT 6
219 /* minimal acl entries from GETACLCNT */
220 #define MIN_ACL_ENTRIES 4
222 #if !defined(_KERNEL)
224 /* acl check errors */
225 #define GRP_ERROR 1
226 #define USER_ERROR 2
227 #define OTHER_ERROR 3
228 #define CLASS_ERROR 4
229 #define DUPLICATE_ERROR 5
230 #define MISS_ERROR 6
231 #define MEM_ERROR 7
232 #define ENTRY_ERROR 8
236 * similar to ufs_acl.h: changed to char type for user commands (tar, cpio)
237 * Attribute types
239 #define UFSD_FREE ('0') /* Free entry */
240 #define UFSD_ACL ('1') /* Access Control Lists */
241 #define UFSD_DFACL ('2') /* reserved for future use */
242 #define ACE_ACL ('3') /* ace_t style acls */
245 * flag to [f]acl_get()
246 * controls whether a trivial acl should be returned.
248 #define ACL_NO_TRIVIAL 0x2
252 * Flags to control acl_totext()
255 #define ACL_APPEND_ID 0x1 /* append uid/gid to user/group entries */
256 #define ACL_COMPACT_FMT 0x2 /* build ACL in ls -V format */
257 #define ACL_NORESOLVE 0x4 /* don't do name service lookups */
258 #define ACL_SID_FMT 0x8 /* use usersid/groupsid when appropriate */
261 * Legacy aclcheck errors for aclent_t ACLs
263 #define EACL_GRP_ERROR GRP_ERROR
264 #define EACL_USER_ERROR USER_ERROR
265 #define EACL_OTHER_ERROR OTHER_ERROR
266 #define EACL_CLASS_ERROR CLASS_ERROR
267 #define EACL_DUPLICATE_ERROR DUPLICATE_ERROR
268 #define EACL_MISS_ERROR MISS_ERROR
269 #define EACL_MEM_ERROR MEM_ERROR
270 #define EACL_ENTRY_ERROR ENTRY_ERROR
272 #define EACL_INHERIT_ERROR 9 /* invalid inherit flags */
273 #define EACL_FLAGS_ERROR 10 /* unknown flag value */
274 #define EACL_PERM_MASK_ERROR 11 /* unknown permission */
275 #define EACL_COUNT_ERROR 12 /* invalid acl count */
277 #define EACL_INVALID_SLOT 13 /* invalid acl slot */
278 #define EACL_NO_ACL_ENTRY 14 /* Entry doesn't exist */
279 #define EACL_DIFF_TYPE 15 /* acls aren't same type */
281 #define EACL_INVALID_USER_GROUP 16 /* need user/group name */
282 #define EACL_INVALID_STR 17 /* invalid acl string */
283 #define EACL_FIELD_NOT_BLANK 18 /* can't have blank field */
284 #define EACL_INVALID_ACCESS_TYPE 19 /* invalid access type */
285 #define EACL_UNKNOWN_DATA 20 /* Unrecognized data in ACL */
286 #define EACL_MISSING_FIELDS 21 /* missing fields in acl */
288 #define EACL_INHERIT_NOTDIR 22 /* Need dir for inheritance */
290 extern int aclcheck(aclent_t *, int, int *);
291 extern int acltomode(aclent_t *, int, mode_t *);
292 extern int aclfrommode(aclent_t *, int, mode_t *);
293 extern int aclsort(int, int, aclent_t *);
294 extern char *acltotext(aclent_t *, int);
295 extern aclent_t *aclfromtext(char *, int *);
296 extern void acl_free(acl_t *);
297 extern int acl_get(const char *, int, acl_t **);
298 extern int facl_get(int, int, acl_t **);
299 extern int acl_set(const char *, acl_t *acl);
300 extern int facl_set(int, acl_t *acl);
301 extern int acl_strip(const char *, uid_t, gid_t, mode_t);
302 extern int acl_trivial(const char *);
303 extern char *acl_totext(acl_t *, int);
304 extern int acl_fromtext(const char *, acl_t **);
305 extern int acl_check(acl_t *, int);
307 #else /* !defined(_KERNEL) */
309 extern void ksort(caddr_t, int, int, int (*)(void *, void *));
310 extern int cmp2acls(void *, void *);
312 #endif /* !defined(_KERNEL) */
314 extern int acl(const char *path, int cmd, int cnt, void *buf);
315 extern int facl(int fd, int cmd, int cnt, void *buf);
317 #ifdef __cplusplus
319 #endif
321 #endif /* _SYS_ACL_H */