8702 PCI addresses with physaddr > 0xffffffff can't be mapped in
[unleashed.git] / usr / src / uts / common / sys / priv_impl.h
blob2d8e2e8893ce3d57aae8855888aae3c91cf2dd1f
1 /*
2 * CDDL HEADER START
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License, Version 1.0 only
6 * (the "License"). You may not use this file except in compliance
7 * with the License.
9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10 * or http://www.opensolaris.org/os/licensing.
11 * See the License for the specific language governing permissions
12 * and limitations under the License.
14 * When distributing Covered Code, include this CDDL HEADER in each
15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16 * If applicable, add the following below this CDDL HEADER, with the
17 * fields enclosed by brackets "[]" replaced with your own identifying
18 * information: Portions Copyright [yyyy] [name of copyright owner]
20 * CDDL HEADER END
23 * Copyright 2003 Sun Microsystems, Inc. All rights reserved.
24 * Use is subject to license terms.
27 #ifndef _SYS_PRIV_IMPL_H
28 #define _SYS_PRIV_IMPL_H
30 #pragma ident "%Z%%M% %I% %E% SMI"
32 #include <sys/priv_const.h>
33 #include <sys/priv.h>
35 #ifdef __cplusplus
36 extern "C" {
37 #endif
39 #if defined(_KERNEL) || defined(_KMEMUSER)
41 * priv_set_t is a structure holding a set of privileges
44 struct priv_set {
45 priv_chunk_t pbits[PRIV_SETSIZE];
48 typedef struct cred_priv_s {
49 priv_set_t crprivs[PRIV_NSET]; /* Priv sets */
50 uint_t crpriv_flags; /* Privilege flags */
51 } cred_priv_t;
53 #endif
55 #ifdef _KERNEL
57 extern priv_set_t *priv_basic;
58 extern priv_set_t priv_unsafe;
59 extern priv_set_t priv_fullset;
60 extern void priv_init(void);
62 /* The CR_PRIVS macro is defined in <sys/cred_impl.h> */
63 #define CR_EPRIV(c) (CR_PRIVS(c)->crprivs[PRIV_EFFECTIVE])
64 #define CR_IPRIV(c) (CR_PRIVS(c)->crprivs[PRIV_INHERITABLE])
65 #define CR_PPRIV(c) (CR_PRIVS(c)->crprivs[PRIV_PERMITTED])
66 #define CR_LPRIV(c) (CR_PRIVS(c)->crprivs[PRIV_LIMIT])
68 #define CR_FLAGS(c) (CR_PRIVS(c)->crpriv_flags)
70 #define PRIV_SETBYTES (PRIV_NSET * PRIV_SETSIZE * sizeof (priv_chunk_t))
72 #define PRIV_EISAWARE(c) ((CR_FLAGS(c) & PRIV_AWARE) || (c)->cr_uid != 0)
73 #define PRIV_PISAWARE(c) ((CR_FLAGS(c) & PRIV_AWARE) || \
74 ((c)->cr_uid != 0 && (c)->cr_suid != 0 && \
75 (c)->cr_ruid != 0))
77 #define CR_OEPRIV(c) (*(PRIV_EISAWARE(c) ? &CR_EPRIV(c) : &CR_LPRIV(c)))
78 #define CR_OPPRIV(c) (*(PRIV_PISAWARE(c) ? &CR_PPRIV(c) : &CR_LPRIV(c)))
80 #define PRIV_VALIDSET(s) ((s) >= 0 && (s) < PRIV_NSET)
81 #define PRIV_VALIDOP(op) ((op) >= PRIV_ON && (op) <= PRIV_SET)
83 #define PRIV_FULLSET &priv_fullset /* Require full set */
86 * Privilege macros bits manipulation macros; DEBUG kernels will
87 * ASSERT() that privileges are not out of range.
89 #ifndef NBBY
90 #define NBBY 8
91 #endif
93 #define __NBWRD (NBBY * sizeof (priv_chunk_t))
95 #define privmask(n) (1U << ((__NBWRD - 1) - ((n) % __NBWRD)))
96 #define privword(n) ((n)/__NBWRD)
99 * PRIV_ASSERT(a, b) sets privilege "b" in privilege set "a".
100 * PRIV_CLEAR(a,b) clears privilege "b" in privilege set "a".
101 * PRIV_ISASSERT tests if privilege 'b' is asserted in privilege set 'a'.
104 #define __PRIV_ASSERT(a, b) ((a)->pbits[privword(b)] |= privmask(b))
105 #define __PRIV_CLEAR(a, b) ((a)->pbits[privword(b)] &= ~privmask(b))
106 #define __PRIV_ISASSERT(a, b) ((a)->pbits[privword(b)] & privmask(b))
108 #ifdef DEBUG
109 #define PRIV_CLEAR(a, b) priv_delset((a), (b))
110 #define PRIV_ASSERT(a, b) priv_addset((a), (b))
111 #define PRIV_ISASSERT(a, b) priv_ismember((a), (b))
112 #else
113 #define PRIV_CLEAR(a, b) __PRIV_CLEAR((a), (b))
114 #define PRIV_ASSERT(a, b) __PRIV_ASSERT((a), (b))
115 #define PRIV_ISASSERT(a, b) __PRIV_ISASSERT((a), (b))
116 #endif
118 #endif /* _KERNEL */
120 #ifdef __cplusplus
122 #endif
124 #endif /* _SYS_PRIV_IMPL_H */