123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784 |
- /*
- * Unix SMB/CIFS implementation.
- * Based on the Samba ACL support code.
- * Copyright (C) Jeremy Allison 2000.
- * Copyright (C) 2007-2008 Wayne Davison
- *
- * The permission functions have been changed to get/set all bits via
- * one call. Some functions that rsync doesn't need were also removed.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * with this program; if not, visit the http://fsf.org website.
- */
- #include "rsync.h"
- #include "sysacls.h"
- #ifdef SUPPORT_ACLS
- #ifdef DEBUG
- #undef DEBUG
- #endif
- #define DEBUG(x,y)
- void SAFE_FREE(void *mem)
- {
- if (mem)
- free(mem);
- }
- /*
- This file wraps all differing system ACL interfaces into a consistent
- one based on the POSIX interface. It also returns the correct errors
- for older UNIX systems that don't support ACLs.
- The interfaces that each ACL implementation must support are as follows :
- int sys_acl_get_entry( SMB_ACL_T theacl, int entry_id, SMB_ACL_ENTRY_T *entry_p)
- int sys_acl_get_tag_type( SMB_ACL_ENTRY_T entry_d, SMB_ACL_TAG_T *tag_type_p)
- int sys_acl_get_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T *tag_type_p, uint32 *bits_p, id_t *u_g_id_p)
- SMB_ACL_T sys_acl_get_file( const char *path_p, SMB_ACL_TYPE_T type)
- SMB_ACL_T sys_acl_get_fd(int fd)
- SMB_ACL_T sys_acl_init( int count)
- int sys_acl_create_entry( SMB_ACL_T *pacl, SMB_ACL_ENTRY_T *pentry)
- int sys_acl_set_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T tag_type, uint32 bits, id_t u_g_id)
- int sys_acl_set_access_bits(SMB_ACL_ENTRY_T entry, uint32 bits)
- int sys_acl_valid( SMB_ACL_T theacl )
- int sys_acl_set_file( const char *name, SMB_ACL_TYPE_T acltype, SMB_ACL_T theacl)
- int sys_acl_set_fd( int fd, SMB_ACL_T theacl)
- int sys_acl_delete_def_file(const char *path)
- int sys_acl_free_acl(SMB_ACL_T posix_acl)
- */
- #if defined(HAVE_POSIX_ACLS) /*--------------------------------------------*/
- /* Identity mapping - easy. */
- int sys_acl_get_entry( SMB_ACL_T the_acl, int entry_id, SMB_ACL_ENTRY_T *entry_p)
- {
- return acl_get_entry( the_acl, entry_id, entry_p);
- }
- int sys_acl_get_tag_type( SMB_ACL_ENTRY_T entry_d, SMB_ACL_TAG_T *tag_type_p)
- {
- return acl_get_tag_type( entry_d, tag_type_p);
- }
- SMB_ACL_T sys_acl_get_file( const char *path_p, SMB_ACL_TYPE_T type)
- {
- return acl_get_file( path_p, type);
- }
- #if 0
- SMB_ACL_T sys_acl_get_fd(int fd)
- {
- return acl_get_fd(fd);
- }
- #endif
- #if defined(HAVE_ACL_GET_PERM_NP)
- #define acl_get_perm(p, b) acl_get_perm_np(p, b)
- #endif
- int sys_acl_get_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T *tag_type_p, uint32 *bits_p, id_t *u_g_id_p)
- {
- acl_permset_t permset;
- if (acl_get_tag_type(entry, tag_type_p) != 0
- || acl_get_permset(entry, &permset) != 0)
- return -1;
- *bits_p = (acl_get_perm(permset, ACL_READ) ? 4 : 0)
- | (acl_get_perm(permset, ACL_WRITE) ? 2 : 0)
- | (acl_get_perm(permset, ACL_EXECUTE) ? 1 : 0);
- if (*tag_type_p == SMB_ACL_USER || *tag_type_p == SMB_ACL_GROUP) {
- void *qual;
- if ((qual = acl_get_qualifier(entry)) == NULL)
- return -1;
- *u_g_id_p = *(id_t*)qual;
- acl_free(qual);
- }
- return 0;
- }
- SMB_ACL_T sys_acl_init( int count)
- {
- return acl_init(count);
- }
- int sys_acl_create_entry( SMB_ACL_T *pacl, SMB_ACL_ENTRY_T *pentry)
- {
- return acl_create_entry(pacl, pentry);
- }
- int sys_acl_set_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T tag_type, uint32 bits, id_t u_g_id)
- {
- if (acl_set_tag_type(entry, tag_type) != 0)
- return -1;
- if (tag_type == SMB_ACL_USER || tag_type == SMB_ACL_GROUP) {
- if (acl_set_qualifier(entry, (void*)&u_g_id) != 0)
- return -1;
- }
- return sys_acl_set_access_bits(entry, bits);
- }
- int sys_acl_set_access_bits(SMB_ACL_ENTRY_T entry, uint32 bits)
- {
- acl_permset_t permset;
- int rc;
- if ((rc = acl_get_permset(entry, &permset)) != 0)
- return rc;
- acl_clear_perms(permset);
- if (bits & 4)
- acl_add_perm(permset, ACL_READ);
- if (bits & 2)
- acl_add_perm(permset, ACL_WRITE);
- if (bits & 1)
- acl_add_perm(permset, ACL_EXECUTE);
- return acl_set_permset(entry, permset);
- }
- int sys_acl_valid( SMB_ACL_T theacl )
- {
- return acl_valid(theacl);
- }
- int sys_acl_set_file(const char *name, SMB_ACL_TYPE_T acltype, SMB_ACL_T theacl)
- {
- return acl_set_file(name, acltype, theacl);
- }
- #if 0
- int sys_acl_set_fd( int fd, SMB_ACL_T theacl)
- {
- return acl_set_fd(fd, theacl);
- }
- #endif
- int sys_acl_delete_def_file(const char *name)
- {
- return acl_delete_def_file(name);
- }
- int sys_acl_free_acl(SMB_ACL_T the_acl)
- {
- return acl_free(the_acl);
- }
- #elif defined(HAVE_TRU64_ACLS) /*--------------------------------------------*/
- /*
- * The interface to DEC/Compaq Tru64 UNIX ACLs
- * is based on Draft 13 of the POSIX spec which is
- * slightly different from the Draft 16 interface.
- *
- * Also, some of the permset manipulation functions
- * such as acl_clear_perm() and acl_add_perm() appear
- * to be broken on Tru64 so we have to manipulate
- * the permission bits in the permset directly.
- */
- int sys_acl_get_entry( SMB_ACL_T the_acl, int entry_id, SMB_ACL_ENTRY_T *entry_p)
- {
- SMB_ACL_ENTRY_T entry;
- if (entry_id == SMB_ACL_FIRST_ENTRY && acl_first_entry(the_acl) != 0) {
- return -1;
- }
- errno = 0;
- if ((entry = acl_get_entry(the_acl)) != NULL) {
- *entry_p = entry;
- return 1;
- }
- return errno ? -1 : 0;
- }
- int sys_acl_get_tag_type( SMB_ACL_ENTRY_T entry_d, SMB_ACL_TAG_T *tag_type_p)
- {
- return acl_get_tag_type( entry_d, tag_type_p);
- }
- SMB_ACL_T sys_acl_get_file( const char *path_p, SMB_ACL_TYPE_T type)
- {
- return acl_get_file((char *)path_p, type);
- }
- #if 0
- SMB_ACL_T sys_acl_get_fd(int fd)
- {
- return acl_get_fd(fd, ACL_TYPE_ACCESS);
- }
- #endif
- int sys_acl_get_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T *tag_type_p, uint32 *bits_p, id_t *u_g_id_p)
- {
- acl_permset_t permset;
- if (acl_get_tag_type(entry, tag_type_p) != 0
- || acl_get_permset(entry, &permset) != 0)
- return -1;
- *bits_p = *permset & 7; /* Tru64 doesn't have acl_get_perm() */
- if (*tag_type_p == SMB_ACL_USER || *tag_type_p == SMB_ACL_GROUP) {
- void *qual;
- if ((qual = acl_get_qualifier(entry)) == NULL)
- return -1;
- *u_g_id_p = *(id_t*)qual;
- acl_free_qualifier(qual, *tag_type_p);
- }
- return 0;
- }
- SMB_ACL_T sys_acl_init( int count)
- {
- return acl_init(count);
- }
- int sys_acl_create_entry( SMB_ACL_T *pacl, SMB_ACL_ENTRY_T *pentry)
- {
- SMB_ACL_ENTRY_T entry;
- if ((entry = acl_create_entry(pacl)) == NULL) {
- return -1;
- }
- *pentry = entry;
- return 0;
- }
- int sys_acl_set_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T tag_type, uint32 bits, id_t u_g_id)
- {
- if (acl_set_tag_type(entry, tag_type) != 0)
- return -1;
- if (tag_type == SMB_ACL_USER || tag_type == SMB_ACL_GROUP) {
- if (acl_set_qualifier(entry, (void*)&u_g_id) != 0)
- return -1;
- }
- return sys_acl_set_access_bits(entry, bits);
- }
- int sys_acl_set_access_bits(SMB_ACL_ENTRY_T entry, uint32 bits)
- {
- acl_permset_t permset;
- int rc;
- if ((rc = acl_get_permset(entry, &permset)) != 0)
- return rc;
- *permset = bits & 7;
- return acl_set_permset(entry, permset);
- }
- int sys_acl_valid( SMB_ACL_T theacl )
- {
- acl_entry_t entry;
- return acl_valid(theacl, &entry);
- }
- int sys_acl_set_file( const char *name, SMB_ACL_TYPE_T acltype, SMB_ACL_T theacl)
- {
- return acl_set_file((char *)name, acltype, theacl);
- }
- #if 0
- int sys_acl_set_fd( int fd, SMB_ACL_T theacl)
- {
- return acl_set_fd(fd, ACL_TYPE_ACCESS, theacl);
- }
- #endif
- int sys_acl_delete_def_file(const char *name)
- {
- return acl_delete_def_file((char *)name);
- }
- int sys_acl_free_acl(SMB_ACL_T the_acl)
- {
- return acl_free(the_acl);
- }
- #elif defined(HAVE_UNIXWARE_ACLS) || defined(HAVE_SOLARIS_ACLS) /*-----------*/
- /*
- * Donated by Michael Davidson <md@sco.COM> for UnixWare / OpenUNIX.
- * Modified by Toomas Soome <tsoome@ut.ee> for Solaris.
- */
- /*
- * Note that while this code implements sufficient functionality
- * to support the sys_acl_* interfaces it does not provide all
- * of the semantics of the POSIX ACL interfaces.
- *
- * In particular, an ACL entry descriptor (SMB_ACL_ENTRY_T) returned
- * from a call to sys_acl_get_entry() should not be assumed to be
- * valid after calling any of the following functions, which may
- * reorder the entries in the ACL.
- *
- * sys_acl_valid()
- * sys_acl_set_file()
- * sys_acl_set_fd()
- */
- /*
- * The only difference between Solaris and UnixWare / OpenUNIX is
- * that the #defines for the ACL operations have different names
- */
- #if defined(HAVE_UNIXWARE_ACLS)
- #define SETACL ACL_SET
- #define GETACL ACL_GET
- #define GETACLCNT ACL_CNT
- #endif
- int sys_acl_get_entry(SMB_ACL_T acl_d, int entry_id, SMB_ACL_ENTRY_T *entry_p)
- {
- if (entry_id != SMB_ACL_FIRST_ENTRY && entry_id != SMB_ACL_NEXT_ENTRY) {
- errno = EINVAL;
- return -1;
- }
- if (entry_p == NULL) {
- errno = EINVAL;
- return -1;
- }
- if (entry_id == SMB_ACL_FIRST_ENTRY) {
- acl_d->next = 0;
- }
- if (acl_d->next < 0) {
- errno = EINVAL;
- return -1;
- }
- if (acl_d->next >= acl_d->count) {
- return 0;
- }
- *entry_p = &acl_d->acl[acl_d->next++];
- return 1;
- }
- int sys_acl_get_tag_type(SMB_ACL_ENTRY_T entry_d, SMB_ACL_TAG_T *type_p)
- {
- *type_p = entry_d->a_type;
- return 0;
- }
- /*
- * There is no way of knowing what size the ACL returned by
- * GETACL will be unless you first call GETACLCNT which means
- * making an additional system call.
- *
- * In the hope of avoiding the cost of the additional system
- * call in most cases, we initially allocate enough space for
- * an ACL with INITIAL_ACL_SIZE entries. If this turns out to
- * be too small then we use GETACLCNT to find out the actual
- * size, reallocate the ACL buffer, and then call GETACL again.
- */
- #define INITIAL_ACL_SIZE 16
- SMB_ACL_T sys_acl_get_file(const char *path_p, SMB_ACL_TYPE_T type)
- {
- SMB_ACL_T acl_d;
- int count; /* # of ACL entries allocated */
- int naccess; /* # of access ACL entries */
- int ndefault; /* # of default ACL entries */
- if (type != SMB_ACL_TYPE_ACCESS && type != SMB_ACL_TYPE_DEFAULT) {
- errno = EINVAL;
- return NULL;
- }
- count = INITIAL_ACL_SIZE;
- if ((acl_d = sys_acl_init(count)) == NULL) {
- return NULL;
- }
- /*
- * If there isn't enough space for the ACL entries we use
- * GETACLCNT to determine the actual number of ACL entries
- * reallocate and try again. This is in a loop because it
- * is possible that someone else could modify the ACL and
- * increase the number of entries between the call to
- * GETACLCNT and the call to GETACL.
- */
- while ((count = acl(path_p, GETACL, count, &acl_d->acl[0])) < 0
- && errno == ENOSPC) {
- sys_acl_free_acl(acl_d);
- if ((count = acl(path_p, GETACLCNT, 0, NULL)) < 0) {
- return NULL;
- }
- if ((acl_d = sys_acl_init(count)) == NULL) {
- return NULL;
- }
- }
- if (count < 0) {
- sys_acl_free_acl(acl_d);
- return NULL;
- }
- /*
- * calculate the number of access and default ACL entries
- *
- * Note: we assume that the acl() system call returned a
- * well formed ACL which is sorted so that all of the
- * access ACL entries preceed any default ACL entries
- */
- for (naccess = 0; naccess < count; naccess++) {
- if (acl_d->acl[naccess].a_type & ACL_DEFAULT)
- break;
- }
- ndefault = count - naccess;
-
- /*
- * if the caller wants the default ACL we have to copy
- * the entries down to the start of the acl[] buffer
- * and mask out the ACL_DEFAULT flag from the type field
- */
- if (type == SMB_ACL_TYPE_DEFAULT) {
- int i, j;
- for (i = 0, j = naccess; i < ndefault; i++, j++) {
- acl_d->acl[i] = acl_d->acl[j];
- acl_d->acl[i].a_type &= ~ACL_DEFAULT;
- }
- acl_d->count = ndefault;
- } else {
- acl_d->count = naccess;
- }
- return acl_d;
- }
- #if 0
- SMB_ACL_T sys_acl_get_fd(int fd)
- {
- SMB_ACL_T acl_d;
- int count; /* # of ACL entries allocated */
- int naccess; /* # of access ACL entries */
- count = INITIAL_ACL_SIZE;
- if ((acl_d = sys_acl_init(count)) == NULL) {
- return NULL;
- }
- while ((count = facl(fd, GETACL, count, &acl_d->acl[0])) < 0
- && errno == ENOSPC) {
- sys_acl_free_acl(acl_d);
- if ((count = facl(fd, GETACLCNT, 0, NULL)) < 0) {
- return NULL;
- }
- if ((acl_d = sys_acl_init(count)) == NULL) {
- return NULL;
- }
- }
- if (count < 0) {
- sys_acl_free_acl(acl_d);
- return NULL;
- }
- /*
- * calculate the number of access ACL entries
- */
- for (naccess = 0; naccess < count; naccess++) {
- if (acl_d->acl[naccess].a_type & ACL_DEFAULT)
- break;
- }
-
- acl_d->count = naccess;
- return acl_d;
- }
- #endif
- int sys_acl_get_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T *tag_type_p, uint32 *bits_p, id_t *u_g_id_p)
- {
- *tag_type_p = entry->a_type;
- *bits_p = entry->a_perm;
- if (*tag_type_p == SMB_ACL_USER || *tag_type_p == SMB_ACL_GROUP)
- *u_g_id_p = entry->a_id;
-
- return 0;
- }
- SMB_ACL_T sys_acl_init(int count)
- {
- SMB_ACL_T a;
- if (count < 0) {
- errno = EINVAL;
- return NULL;
- }
- /*
- * note that since the definition of the structure pointed
- * to by the SMB_ACL_T includes the first element of the
- * acl[] array, this actually allocates an ACL with room
- * for (count+1) entries
- */
- if ((a = (SMB_ACL_T)SMB_MALLOC(sizeof a[0] + count * sizeof (struct acl))) == NULL) {
- errno = ENOMEM;
- return NULL;
- }
- a->size = count + 1;
- a->count = 0;
- a->next = -1;
- return a;
- }
- int sys_acl_create_entry(SMB_ACL_T *acl_p, SMB_ACL_ENTRY_T *entry_p)
- {
- SMB_ACL_T acl_d;
- SMB_ACL_ENTRY_T entry_d;
- if (acl_p == NULL || entry_p == NULL || (acl_d = *acl_p) == NULL) {
- errno = EINVAL;
- return -1;
- }
- if (acl_d->count >= acl_d->size) {
- errno = ENOSPC;
- return -1;
- }
- entry_d = &acl_d->acl[acl_d->count++];
- entry_d->a_type = 0;
- entry_d->a_id = -1;
- entry_d->a_perm = 0;
- *entry_p = entry_d;
- return 0;
- }
- int sys_acl_set_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T tag_type, uint32 bits, id_t u_g_id)
- {
- entry->a_type = tag_type;
- if (tag_type == SMB_ACL_USER || tag_type == SMB_ACL_GROUP)
- entry->a_id = u_g_id;
- entry->a_perm = bits;
- return 0;
- }
- int sys_acl_set_access_bits(SMB_ACL_ENTRY_T entry_d, uint32 bits)
- {
- entry_d->a_perm = bits;
- return 0;
- }
- /*
- * sort the ACL and check it for validity
- *
- * if it's a minimal ACL with only 4 entries then we
- * need to recalculate the mask permissions to make
- * sure that they are the same as the GROUP_OBJ
- * permissions as required by the UnixWare acl() system call.
- *
- * (note: since POSIX allows minimal ACLs which only contain
- * 3 entries - ie there is no mask entry - we should, in theory,
- * check for this and add a mask entry if necessary - however
- * we "know" that the caller of this interface always specifies
- * a mask so, in practice "this never happens" (tm) - if it *does*
- * happen aclsort() will fail and return an error and someone will
- * have to fix it ...)
- */
- static int acl_sort(SMB_ACL_T acl_d)
- {
- int fixmask = (acl_d->count <= 4);
- if (aclsort(acl_d->count, fixmask, acl_d->acl) != 0) {
- errno = EINVAL;
- return -1;
- }
- return 0;
- }
-
- int sys_acl_valid(SMB_ACL_T acl_d)
- {
- return acl_sort(acl_d);
- }
- int sys_acl_set_file(const char *name, SMB_ACL_TYPE_T type, SMB_ACL_T acl_d)
- {
- struct stat s;
- struct acl *acl_p;
- int acl_count;
- struct acl *acl_buf = NULL;
- int ret;
- if (type != SMB_ACL_TYPE_ACCESS && type != SMB_ACL_TYPE_DEFAULT) {
- errno = EINVAL;
- return -1;
- }
- if (acl_sort(acl_d) != 0) {
- return -1;
- }
- acl_p = &acl_d->acl[0];
- acl_count = acl_d->count;
- /*
- * if it's a directory there is extra work to do
- * since the acl() system call will replace both
- * the access ACLs and the default ACLs (if any)
- */
- if (stat(name, &s) != 0) {
- return -1;
- }
- if (S_ISDIR(s.st_mode)) {
- SMB_ACL_T acc_acl;
- SMB_ACL_T def_acl;
- SMB_ACL_T tmp_acl;
- int i;
- if (type == SMB_ACL_TYPE_ACCESS) {
- acc_acl = acl_d;
- def_acl = tmp_acl = sys_acl_get_file(name, SMB_ACL_TYPE_DEFAULT);
- } else {
- def_acl = acl_d;
- acc_acl = tmp_acl = sys_acl_get_file(name, SMB_ACL_TYPE_ACCESS);
- }
- if (tmp_acl == NULL) {
- return -1;
- }
- /*
- * allocate a temporary buffer for the complete ACL
- */
- acl_count = acc_acl->count + def_acl->count;
- acl_p = acl_buf = SMB_MALLOC_ARRAY(struct acl, acl_count);
- if (acl_buf == NULL) {
- sys_acl_free_acl(tmp_acl);
- errno = ENOMEM;
- return -1;
- }
- /*
- * copy the access control and default entries into the buffer
- */
- memcpy(&acl_buf[0], &acc_acl->acl[0],
- acc_acl->count * sizeof(acl_buf[0]));
- memcpy(&acl_buf[acc_acl->count], &def_acl->acl[0],
- def_acl->count * sizeof(acl_buf[0]));
- /*
- * set the ACL_DEFAULT flag on the default entries
- */
- for (i = acc_acl->count; i < acl_count; i++) {
- acl_buf[i].a_type |= ACL_DEFAULT;
- }
- sys_acl_free_acl(tmp_acl);
- } else if (type != SMB_ACL_TYPE_ACCESS) {
- errno = EINVAL;
- return -1;
- }
- ret = acl(name, SETACL, acl_count, acl_p);
- SAFE_FREE(acl_buf);
- return ret;
- }
- #if 0
- int sys_acl_set_fd(int fd, SMB_ACL_T acl_d)
- {
- if (acl_sort(acl_d) != 0) {
- return -1;
- }
- return facl(fd, SETACL, acl_d->count, &acl_d->acl[0]);
- }
- #endif
- int sys_acl_delete_def_file(const char *path)
- {
- SMB_ACL_T acl_d;
- int ret;
- /*
- * fetching the access ACL and rewriting it has
- * the effect of deleting the default ACL
- */
- if ((acl_d = sys_acl_get_file(path, SMB_ACL_TYPE_ACCESS)) == NULL) {
- return -1;
- }
- ret = acl(path, SETACL, acl_d->count, acl_d->acl);
- sys_acl_free_acl(acl_d);
-
- return ret;
- }
- int sys_acl_free_acl(SMB_ACL_T acl_d)
- {
- SAFE_FREE(acl_d);
- return 0;
- }
- #elif defined(HAVE_HPUX_ACLS) /*---------------------------------------------*/
- #include <dl.h>
- /*
- * Based on the Solaris/SCO code - with modifications.
- */
- /*
- * Note that while this code implements sufficient functionality
- * to support the sys_acl_* interfaces it does not provide all
- * of the semantics of the POSIX ACL interfaces.
- *
- * In particular, an ACL entry descriptor (SMB_ACL_ENTRY_T) returned
- * from a call to sys_acl_get_entry() should not be assumed to be
- * valid after calling any of the following functions, which may
- * reorder the entries in the ACL.
- *
- * sys_acl_valid()
- * sys_acl_set_file()
- * sys_acl_set_fd()
- */
- /* This checks if the POSIX ACL system call is defined */
- /* which basically corresponds to whether JFS 3.3 or */
- /* higher is installed. If acl() was called when it */
- /* isn't defined, it causes the process to core dump */
- /* so it is important to check this and avoid acl() */
- /* calls if it isn't there. */
- static BOOL hpux_acl_call_presence(void)
- {
- shl_t handle = NULL;
- void *value;
- int ret_val=0;
- static BOOL already_checked=0;
- if(already_checked)
- return True;
- ret_val = shl_findsym(&handle, "acl", TYPE_PROCEDURE, &value);
- if(ret_val != 0) {
- DEBUG(5, ("hpux_acl_call_presence: shl_findsym() returned %d, errno = %d, error %s\n",
- ret_val, errno, strerror(errno)));
- DEBUG(5,("hpux_acl_call_presence: acl() system call is not present. Check if you have JFS 3.3 and above?\n"));
- return False;
- }
- DEBUG(10,("hpux_acl_call_presence: acl() system call is present. We have JFS 3.3 or above \n"));
- already_checked = True;
- return True;
- }
- int sys_acl_get_entry(SMB_ACL_T acl_d, int entry_id, SMB_ACL_ENTRY_T *entry_p)
- {
- if (entry_id != SMB_ACL_FIRST_ENTRY && entry_id != SMB_ACL_NEXT_ENTRY) {
- errno = EINVAL;
- return -1;
- }
- if (entry_p == NULL) {
- errno = EINVAL;
- return -1;
- }
- if (entry_id == SMB_ACL_FIRST_ENTRY) {
- acl_d->next = 0;
- }
- if (acl_d->next < 0) {
- errno = EINVAL;
- return -1;
- }
- if (acl_d->next >= acl_d->count) {
- return 0;
- }
- *entry_p = &acl_d->acl[acl_d->next++];
- return 1;
- }
- int sys_acl_get_tag_type(SMB_ACL_ENTRY_T entry_d, SMB_ACL_TAG_T *type_p)
- {
- *type_p = entry_d->a_type;
- return 0;
- }
- /*
- * There is no way of knowing what size the ACL returned by
- * ACL_GET will be unless you first call ACL_CNT which means
- * making an additional system call.
- *
- * In the hope of avoiding the cost of the additional system
- * call in most cases, we initially allocate enough space for
- * an ACL with INITIAL_ACL_SIZE entries. If this turns out to
- * be too small then we use ACL_CNT to find out the actual
- * size, reallocate the ACL buffer, and then call ACL_GET again.
- */
- #define INITIAL_ACL_SIZE 16
- SMB_ACL_T sys_acl_get_file(const char *path_p, SMB_ACL_TYPE_T type)
- {
- SMB_ACL_T acl_d;
- int count; /* # of ACL entries allocated */
- int naccess; /* # of access ACL entries */
- int ndefault; /* # of default ACL entries */
- if(hpux_acl_call_presence() == False) {
- /* Looks like we don't have the acl() system call on HPUX.
- * May be the system doesn't have the latest version of JFS.
- */
- return NULL;
- }
- if (type != SMB_ACL_TYPE_ACCESS && type != SMB_ACL_TYPE_DEFAULT) {
- errno = EINVAL;
- return NULL;
- }
- count = INITIAL_ACL_SIZE;
- if ((acl_d = sys_acl_init(count)) == NULL) {
- return NULL;
- }
- /*
- * If there isn't enough space for the ACL entries we use
- * ACL_CNT to determine the actual number of ACL entries
- * reallocate and try again. This is in a loop because it
- * is possible that someone else could modify the ACL and
- * increase the number of entries between the call to
- * ACL_CNT and the call to ACL_GET.
- */
- while ((count = acl(path_p, ACL_GET, count, &acl_d->acl[0])) < 0 && errno == ENOSPC) {
- sys_acl_free_acl(acl_d);
- if ((count = acl(path_p, ACL_CNT, 0, NULL)) < 0) {
- return NULL;
- }
- if ((acl_d = sys_acl_init(count)) == NULL) {
- return NULL;
- }
- }
- if (count < 0) {
- sys_acl_free_acl(acl_d);
- return NULL;
- }
- /*
- * calculate the number of access and default ACL entries
- *
- * Note: we assume that the acl() system call returned a
- * well formed ACL which is sorted so that all of the
- * access ACL entries preceed any default ACL entries
- */
- for (naccess = 0; naccess < count; naccess++) {
- if (acl_d->acl[naccess].a_type & ACL_DEFAULT)
- break;
- }
- ndefault = count - naccess;
-
- /*
- * if the caller wants the default ACL we have to copy
- * the entries down to the start of the acl[] buffer
- * and mask out the ACL_DEFAULT flag from the type field
- */
- if (type == SMB_ACL_TYPE_DEFAULT) {
- int i, j;
- for (i = 0, j = naccess; i < ndefault; i++, j++) {
- acl_d->acl[i] = acl_d->acl[j];
- acl_d->acl[i].a_type &= ~ACL_DEFAULT;
- }
- acl_d->count = ndefault;
- } else {
- acl_d->count = naccess;
- }
- return acl_d;
- }
- #if 0
- SMB_ACL_T sys_acl_get_fd(int fd)
- {
- /*
- * HPUX doesn't have the facl call. Fake it using the path.... JRA.
- */
- files_struct *fsp = file_find_fd(fd);
- if (fsp == NULL) {
- errno = EBADF;
- return NULL;
- }
- /*
- * We know we're in the same conn context. So we
- * can use the relative path.
- */
- return sys_acl_get_file(fsp->fsp_name, SMB_ACL_TYPE_ACCESS);
- }
- #endif
- int sys_acl_get_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T *tag_type_p, uint32 *bits_p, id_t *u_g_id_p)
- {
- *tag_type_p = entry->a_type;
- *bits_p = entry->a_perm;
- if (*tag_type_p == SMB_ACL_USER || *tag_type_p == SMB_ACL_GROUP)
- *u_g_id_p = entry->a_id;
- return 0;
- }
- SMB_ACL_T sys_acl_init(int count)
- {
- SMB_ACL_T a;
- if (count < 0) {
- errno = EINVAL;
- return NULL;
- }
- /*
- * note that since the definition of the structure pointed
- * to by the SMB_ACL_T includes the first element of the
- * acl[] array, this actually allocates an ACL with room
- * for (count+1) entries
- */
- if ((a = (SMB_ACL_T)SMB_MALLOC(sizeof a[0] + count * sizeof(struct acl))) == NULL) {
- errno = ENOMEM;
- return NULL;
- }
- a->size = count + 1;
- a->count = 0;
- a->next = -1;
- return a;
- }
- int sys_acl_create_entry(SMB_ACL_T *acl_p, SMB_ACL_ENTRY_T *entry_p)
- {
- SMB_ACL_T acl_d;
- SMB_ACL_ENTRY_T entry_d;
- if (acl_p == NULL || entry_p == NULL || (acl_d = *acl_p) == NULL) {
- errno = EINVAL;
- return -1;
- }
- if (acl_d->count >= acl_d->size) {
- errno = ENOSPC;
- return -1;
- }
- entry_d = &acl_d->acl[acl_d->count++];
- entry_d->a_type = 0;
- entry_d->a_id = -1;
- entry_d->a_perm = 0;
- *entry_p = entry_d;
- return 0;
- }
- int sys_acl_set_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T tag_type, uint32 bits, id_t u_g_id)
- {
- entry->a_type = tag_type;
- if (tag_type == SMB_ACL_USER || tag_type == SMB_ACL_GROUP)
- entry->a_id = u_g_id;
- entry->a_perm = bits;
- return 0;
- }
- int sys_acl_set_access_bits(SMB_ACL_ENTRY_T entry_d, uint32 bits)
- {
- entry_d->a_perm = bits;
- return 0;
- }
- /* Structure to capture the count for each type of ACE. */
- struct hpux_acl_types {
- int n_user;
- int n_def_user;
- int n_user_obj;
- int n_def_user_obj;
- int n_group;
- int n_def_group;
- int n_group_obj;
- int n_def_group_obj;
- int n_other;
- int n_other_obj;
- int n_def_other_obj;
- int n_class_obj;
- int n_def_class_obj;
- int n_illegal_obj;
- };
- /* count_obj:
- * Counts the different number of objects in a given array of ACL
- * structures.
- * Inputs:
- *
- * acl_count - Count of ACLs in the array of ACL strucutres.
- * aclp - Array of ACL structures.
- * acl_type_count - Pointer to acl_types structure. Should already be
- * allocated.
- * Output:
- *
- * acl_type_count - This structure is filled up with counts of various
- * acl types.
- */
- static void hpux_count_obj(int acl_count, struct acl *aclp, struct hpux_acl_types *acl_type_count)
- {
- int i;
- memset(acl_type_count, 0, sizeof(struct hpux_acl_types));
- for(i=0;i<acl_count;i++) {
- switch(aclp[i].a_type) {
- case USER:
- acl_type_count->n_user++;
- break;
- case USER_OBJ:
- acl_type_count->n_user_obj++;
- break;
- case DEF_USER_OBJ:
- acl_type_count->n_def_user_obj++;
- break;
- case GROUP:
- acl_type_count->n_group++;
- break;
- case GROUP_OBJ:
- acl_type_count->n_group_obj++;
- break;
- case DEF_GROUP_OBJ:
- acl_type_count->n_def_group_obj++;
- break;
- case OTHER_OBJ:
- acl_type_count->n_other_obj++;
- break;
- case DEF_OTHER_OBJ:
- acl_type_count->n_def_other_obj++;
- break;
- case CLASS_OBJ:
- acl_type_count->n_class_obj++;
- break;
- case DEF_CLASS_OBJ:
- acl_type_count->n_def_class_obj++;
- break;
- case DEF_USER:
- acl_type_count->n_def_user++;
- break;
- case DEF_GROUP:
- acl_type_count->n_def_group++;
- break;
- default:
- acl_type_count->n_illegal_obj++;
- break;
- }
- }
- }
- /* swap_acl_entries: Swaps two ACL entries.
- *
- * Inputs: aclp0, aclp1 - ACL entries to be swapped.
- */
- static void hpux_swap_acl_entries(struct acl *aclp0, struct acl *aclp1)
- {
- struct acl temp_acl;
- temp_acl.a_type = aclp0->a_type;
- temp_acl.a_id = aclp0->a_id;
- temp_acl.a_perm = aclp0->a_perm;
- aclp0->a_type = aclp1->a_type;
- aclp0->a_id = aclp1->a_id;
- aclp0->a_perm = aclp1->a_perm;
- aclp1->a_type = temp_acl.a_type;
- aclp1->a_id = temp_acl.a_id;
- aclp1->a_perm = temp_acl.a_perm;
- }
- /* prohibited_duplicate_type
- * Identifies if given ACL type can have duplicate entries or
- * not.
- *
- * Inputs: acl_type - ACL Type.
- *
- * Outputs:
- *
- * Return..
- *
- * True - If the ACL type matches any of the prohibited types.
- * False - If the ACL type doesn't match any of the prohibited types.
- */
- static BOOL hpux_prohibited_duplicate_type(int acl_type)
- {
- switch(acl_type) {
- case USER:
- case GROUP:
- case DEF_USER:
- case DEF_GROUP:
- return True;
- default:
- return False;
- }
- }
- /* get_needed_class_perm
- * Returns the permissions of a ACL structure only if the ACL
- * type matches one of the pre-determined types for computing
- * CLASS_OBJ permissions.
- *
- * Inputs: aclp - Pointer to ACL structure.
- */
- static int hpux_get_needed_class_perm(struct acl *aclp)
- {
- switch(aclp->a_type) {
- case USER:
- case GROUP_OBJ:
- case GROUP:
- case DEF_USER_OBJ:
- case DEF_USER:
- case DEF_GROUP_OBJ:
- case DEF_GROUP:
- case DEF_CLASS_OBJ:
- case DEF_OTHER_OBJ:
- return aclp->a_perm;
- default:
- return 0;
- }
- }
- /* acl_sort for HPUX.
- * Sorts the array of ACL structures as per the description in
- * aclsort man page. Refer to aclsort man page for more details
- *
- * Inputs:
- *
- * acl_count - Count of ACLs in the array of ACL structures.
- * calclass - If this is not zero, then we compute the CLASS_OBJ
- * permissions.
- * aclp - Array of ACL structures.
- *
- * Outputs:
- *
- * aclp - Sorted array of ACL structures.
- *
- * Outputs:
- *
- * Returns 0 for success -1 for failure. Prints a message to the Samba
- * debug log in case of failure.
- */
- static int hpux_acl_sort(int acl_count, int calclass, struct acl *aclp)
- {
- #if !defined(HAVE_HPUX_ACLSORT)
- /*
- * The aclsort() system call is availabe on the latest HPUX General
- * Patch Bundles. So for HPUX, we developed our version of acl_sort
- * function. Because, we don't want to update to a new
- * HPUX GR bundle just for aclsort() call.
- */
- struct hpux_acl_types acl_obj_count;
- int n_class_obj_perm = 0;
- int i, j;
-
- if(!acl_count) {
- DEBUG(10,("Zero acl count passed. Returning Success\n"));
- return 0;
- }
- if(aclp == NULL) {
- DEBUG(0,("Null ACL pointer in hpux_acl_sort. Returning Failure. \n"));
- return -1;
- }
- /* Count different types of ACLs in the ACLs array */
- hpux_count_obj(acl_count, aclp, &acl_obj_count);
- /* There should be only one entry each of type USER_OBJ, GROUP_OBJ,
- * CLASS_OBJ and OTHER_OBJ
- */
- if( (acl_obj_count.n_user_obj != 1) ||
- (acl_obj_count.n_group_obj != 1) ||
- (acl_obj_count.n_class_obj != 1) ||
- (acl_obj_count.n_other_obj != 1)
- ) {
- DEBUG(0,("hpux_acl_sort: More than one entry or no entries for \
- USER OBJ or GROUP_OBJ or OTHER_OBJ or CLASS_OBJ\n"));
- return -1;
- }
- /* If any of the default objects are present, there should be only
- * one of them each.
- */
- if( (acl_obj_count.n_def_user_obj > 1) || (acl_obj_count.n_def_group_obj > 1) ||
- (acl_obj_count.n_def_other_obj > 1) || (acl_obj_count.n_def_class_obj > 1) ) {
- DEBUG(0,("hpux_acl_sort: More than one entry for DEF_CLASS_OBJ \
- or DEF_USER_OBJ or DEF_GROUP_OBJ or DEF_OTHER_OBJ\n"));
- return -1;
- }
- /* We now have proper number of OBJ and DEF_OBJ entries. Now sort the acl
- * structures.
- *
- * Sorting crieteria - First sort by ACL type. If there are multiple entries of
- * same ACL type, sort by ACL id.
- *
- * I am using the trival kind of sorting method here because, performance isn't
- * really effected by the ACLs feature. More over there aren't going to be more
- * than 17 entries on HPUX.
- */
- for(i=0; i<acl_count;i++) {
- for (j=i+1; j<acl_count; j++) {
- if( aclp[i].a_type > aclp[j].a_type ) {
- /* ACL entries out of order, swap them */
- hpux_swap_acl_entries((aclp+i), (aclp+j));
- } else if ( aclp[i].a_type == aclp[j].a_type ) {
- /* ACL entries of same type, sort by id */
- if(aclp[i].a_id > aclp[j].a_id) {
- hpux_swap_acl_entries((aclp+i), (aclp+j));
- } else if (aclp[i].a_id == aclp[j].a_id) {
- /* We have a duplicate entry. */
- if(hpux_prohibited_duplicate_type(aclp[i].a_type)) {
- DEBUG(0, ("hpux_acl_sort: Duplicate entry: Type(hex): %x Id: %d\n",
- aclp[i].a_type, aclp[i].a_id));
- return -1;
- }
- }
- }
- }
- }
- /* set the class obj permissions to the computed one. */
- if(calclass) {
- int n_class_obj_index = -1;
- for(i=0;i<acl_count;i++) {
- n_class_obj_perm |= hpux_get_needed_class_perm((aclp+i));
- if(aclp[i].a_type == CLASS_OBJ)
- n_class_obj_index = i;
- }
- aclp[n_class_obj_index].a_perm = n_class_obj_perm;
- }
- return 0;
- #else
- return aclsort(acl_count, calclass, aclp);
- #endif
- }
- /*
- * sort the ACL and check it for validity
- *
- * if it's a minimal ACL with only 4 entries then we
- * need to recalculate the mask permissions to make
- * sure that they are the same as the GROUP_OBJ
- * permissions as required by the UnixWare acl() system call.
- *
- * (note: since POSIX allows minimal ACLs which only contain
- * 3 entries - ie there is no mask entry - we should, in theory,
- * check for this and add a mask entry if necessary - however
- * we "know" that the caller of this interface always specifies
- * a mask so, in practice "this never happens" (tm) - if it *does*
- * happen aclsort() will fail and return an error and someone will
- * have to fix it ...)
- */
- static int acl_sort(SMB_ACL_T acl_d)
- {
- int fixmask = (acl_d->count <= 4);
- if (hpux_acl_sort(acl_d->count, fixmask, acl_d->acl) != 0) {
- errno = EINVAL;
- return -1;
- }
- return 0;
- }
-
- int sys_acl_valid(SMB_ACL_T acl_d)
- {
- return acl_sort(acl_d);
- }
- int sys_acl_set_file(const char *name, SMB_ACL_TYPE_T type, SMB_ACL_T acl_d)
- {
- struct stat s;
- struct acl *acl_p;
- int acl_count;
- struct acl *acl_buf = NULL;
- int ret;
- if(hpux_acl_call_presence() == False) {
- /* Looks like we don't have the acl() system call on HPUX.
- * May be the system doesn't have the latest version of JFS.
- */
- errno=ENOSYS;
- return -1;
- }
- if (type != SMB_ACL_TYPE_ACCESS && type != SMB_ACL_TYPE_DEFAULT) {
- errno = EINVAL;
- return -1;
- }
- if (acl_sort(acl_d) != 0) {
- return -1;
- }
- acl_p = &acl_d->acl[0];
- acl_count = acl_d->count;
- /*
- * if it's a directory there is extra work to do
- * since the acl() system call will replace both
- * the access ACLs and the default ACLs (if any)
- */
- if (stat(name, &s) != 0) {
- return -1;
- }
- if (S_ISDIR(s.st_mode)) {
- SMB_ACL_T acc_acl;
- SMB_ACL_T def_acl;
- SMB_ACL_T tmp_acl;
- int i;
- if (type == SMB_ACL_TYPE_ACCESS) {
- acc_acl = acl_d;
- def_acl = tmp_acl = sys_acl_get_file(name, SMB_ACL_TYPE_DEFAULT);
- } else {
- def_acl = acl_d;
- acc_acl = tmp_acl = sys_acl_get_file(name, SMB_ACL_TYPE_ACCESS);
- }
- if (tmp_acl == NULL) {
- return -1;
- }
- /*
- * allocate a temporary buffer for the complete ACL
- */
- acl_count = acc_acl->count + def_acl->count;
- acl_p = acl_buf = SMB_MALLOC_ARRAY(struct acl, acl_count);
- if (acl_buf == NULL) {
- sys_acl_free_acl(tmp_acl);
- errno = ENOMEM;
- return -1;
- }
- /*
- * copy the access control and default entries into the buffer
- */
- memcpy(&acl_buf[0], &acc_acl->acl[0],
- acc_acl->count * sizeof(acl_buf[0]));
- memcpy(&acl_buf[acc_acl->count], &def_acl->acl[0],
- def_acl->count * sizeof(acl_buf[0]));
- /*
- * set the ACL_DEFAULT flag on the default entries
- */
- for (i = acc_acl->count; i < acl_count; i++) {
- acl_buf[i].a_type |= ACL_DEFAULT;
- }
- sys_acl_free_acl(tmp_acl);
- } else if (type != SMB_ACL_TYPE_ACCESS) {
- errno = EINVAL;
- return -1;
- }
- ret = acl(name, ACL_SET, acl_count, acl_p);
- if (acl_buf) {
- free(acl_buf);
- }
- return ret;
- }
- #if 0
- int sys_acl_set_fd(int fd, SMB_ACL_T acl_d)
- {
- /*
- * HPUX doesn't have the facl call. Fake it using the path.... JRA.
- */
- files_struct *fsp = file_find_fd(fd);
- if (fsp == NULL) {
- errno = EBADF;
- return NULL;
- }
- if (acl_sort(acl_d) != 0) {
- return -1;
- }
- /*
- * We know we're in the same conn context. So we
- * can use the relative path.
- */
- return sys_acl_set_file(fsp->fsp_name, SMB_ACL_TYPE_ACCESS, acl_d);
- }
- #endif
- int sys_acl_delete_def_file(const char *path)
- {
- SMB_ACL_T acl_d;
- int ret;
- /*
- * fetching the access ACL and rewriting it has
- * the effect of deleting the default ACL
- */
- if ((acl_d = sys_acl_get_file(path, SMB_ACL_TYPE_ACCESS)) == NULL) {
- return -1;
- }
- ret = acl(path, ACL_SET, acl_d->count, acl_d->acl);
- sys_acl_free_acl(acl_d);
-
- return ret;
- }
- int sys_acl_free_acl(SMB_ACL_T acl_d)
- {
- free(acl_d);
- return 0;
- }
- #elif defined(HAVE_IRIX_ACLS) /*---------------------------------------------*/
- int sys_acl_get_entry(SMB_ACL_T acl_d, int entry_id, SMB_ACL_ENTRY_T *entry_p)
- {
- if (entry_id != SMB_ACL_FIRST_ENTRY && entry_id != SMB_ACL_NEXT_ENTRY) {
- errno = EINVAL;
- return -1;
- }
- if (entry_p == NULL) {
- errno = EINVAL;
- return -1;
- }
- if (entry_id == SMB_ACL_FIRST_ENTRY) {
- acl_d->next = 0;
- }
- if (acl_d->next < 0) {
- errno = EINVAL;
- return -1;
- }
- if (acl_d->next >= acl_d->aclp->acl_cnt) {
- return 0;
- }
- *entry_p = &acl_d->aclp->acl_entry[acl_d->next++];
- return 1;
- }
- int sys_acl_get_tag_type(SMB_ACL_ENTRY_T entry_d, SMB_ACL_TAG_T *type_p)
- {
- *type_p = entry_d->ae_tag;
- return 0;
- }
- SMB_ACL_T sys_acl_get_file(const char *path_p, SMB_ACL_TYPE_T type)
- {
- SMB_ACL_T a;
- if ((a = SMB_MALLOC_P(struct SMB_ACL_T)) == NULL) {
- errno = ENOMEM;
- return NULL;
- }
- if ((a->aclp = acl_get_file(path_p, type)) == NULL) {
- SAFE_FREE(a);
- return NULL;
- }
- a->next = -1;
- a->freeaclp = True;
- return a;
- }
- #if 0
- SMB_ACL_T sys_acl_get_fd(int fd)
- {
- SMB_ACL_T a;
- if ((a = SMB_MALLOC_P(struct SMB_ACL_T)) == NULL) {
- errno = ENOMEM;
- return NULL;
- }
- if ((a->aclp = acl_get_fd(fd)) == NULL) {
- SAFE_FREE(a);
- return NULL;
- }
- a->next = -1;
- a->freeaclp = True;
- return a;
- }
- #endif
- int sys_acl_get_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T *tag_type_p, uint32 *bits_p, id_t *u_g_id_p)
- {
- *tag_type_p = entry->ae_tag;
- *bits_p = entry->ae_perm;
- if (*tag_type_p == SMB_ACL_USER || *tag_type_p == SMB_ACL_GROUP)
- *u_g_id_p = entry->ae_id;
- return 0;
- }
- SMB_ACL_T sys_acl_init(int count)
- {
- SMB_ACL_T a;
- if (count < 0) {
- errno = EINVAL;
- return NULL;
- }
- if ((a = (SMB_ACL_T)SMB_MALLOC(sizeof a[0] + sizeof (struct acl))) == NULL) {
- errno = ENOMEM;
- return NULL;
- }
- a->next = -1;
- a->freeaclp = False;
- a->aclp = (struct acl *)((char *)a + sizeof a[0]);
- a->aclp->acl_cnt = 0;
- return a;
- }
- int sys_acl_create_entry(SMB_ACL_T *acl_p, SMB_ACL_ENTRY_T *entry_p)
- {
- SMB_ACL_T acl_d;
- SMB_ACL_ENTRY_T entry_d;
- if (acl_p == NULL || entry_p == NULL || (acl_d = *acl_p) == NULL) {
- errno = EINVAL;
- return -1;
- }
- if (acl_d->aclp->acl_cnt >= ACL_MAX_ENTRIES) {
- errno = ENOSPC;
- return -1;
- }
- entry_d = &acl_d->aclp->acl_entry[acl_d->aclp->acl_cnt++];
- entry_d->ae_tag = 0;
- entry_d->ae_id = 0;
- entry_d->ae_perm = 0;
- *entry_p = entry_d;
- return 0;
- }
- int sys_acl_set_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T tag_type, uint32 bits, id_t u_g_id)
- {
- entry->ae_tag = tag_type;
- if (tag_type == SMB_ACL_USER || tag_type == SMB_ACL_GROUP)
- entry->ae_id = u_g_id;
- entry->ae_perm = bits;
- return 0;
- }
- int sys_acl_set_access_bits(SMB_ACL_ENTRY_T entry_d, uint32 bits)
- {
- entry_d->ae_perm = bits;
- return 0;
- }
- int sys_acl_valid(SMB_ACL_T acl_d)
- {
- return acl_valid(acl_d->aclp);
- }
- int sys_acl_set_file(const char *name, SMB_ACL_TYPE_T type, SMB_ACL_T acl_d)
- {
- return acl_set_file(name, type, acl_d->aclp);
- }
- #if 0
- int sys_acl_set_fd(int fd, SMB_ACL_T acl_d)
- {
- return acl_set_fd(fd, acl_d->aclp);
- }
- #endif
- int sys_acl_delete_def_file(const char *name)
- {
- return acl_delete_def_file(name);
- }
- int sys_acl_free_acl(SMB_ACL_T acl_d)
- {
- if (acl_d->freeaclp) {
- acl_free(acl_d->aclp);
- }
- acl_free(acl_d);
- return 0;
- }
- #elif defined(HAVE_AIX_ACLS) /*----------------------------------------------*/
- /* Donated by Medha Date, mdate@austin.ibm.com, for IBM */
- int sys_acl_get_entry( SMB_ACL_T theacl, int entry_id, SMB_ACL_ENTRY_T *entry_p)
- {
- struct acl_entry_link *link;
- struct new_acl_entry *entry;
- int keep_going;
- if (entry_id == SMB_ACL_FIRST_ENTRY)
- theacl->count = 0;
- else if (entry_id != SMB_ACL_NEXT_ENTRY) {
- errno = EINVAL;
- return -1;
- }
- DEBUG(10,("This is the count: %d\n",theacl->count));
- /* Check if count was previously set to -1. *
- * If it was, that means we reached the end *
- * of the acl last time. */
- if(theacl->count == -1)
- return(0);
- link = theacl;
- /* To get to the next acl, traverse linked list until index *
- * of acl matches the count we are keeping. This count is *
- * incremented each time we return an acl entry. */
- for(keep_going = 0; keep_going < theacl->count; keep_going++)
- link = link->nextp;
- entry = *entry_p = link->entryp;
- DEBUG(10,("*entry_p is %d\n",entry_p));
- DEBUG(10,("*entry_p->ace_access is %d\n",entry->ace_access));
- /* Increment count */
- theacl->count++;
- if(link->nextp == NULL)
- theacl->count = -1;
- return(1);
- }
- int sys_acl_get_tag_type( SMB_ACL_ENTRY_T entry_d, SMB_ACL_TAG_T *tag_type_p)
- {
- /* Initialize tag type */
- *tag_type_p = -1;
- DEBUG(10,("the tagtype is %d\n",entry_d->ace_id->id_type));
- /* Depending on what type of entry we have, *
- * return tag type. */
- switch(entry_d->ace_id->id_type) {
- case ACEID_USER:
- *tag_type_p = SMB_ACL_USER;
- break;
- case ACEID_GROUP:
- *tag_type_p = SMB_ACL_GROUP;
- break;
- case SMB_ACL_USER_OBJ:
- case SMB_ACL_GROUP_OBJ:
- case SMB_ACL_OTHER:
- *tag_type_p = entry_d->ace_id->id_type;
- break;
- default:
- return(-1);
- }
- return(0);
- }
- SMB_ACL_T sys_acl_get_file( const char *path_p, SMB_ACL_TYPE_T type)
- {
- struct acl *file_acl = (struct acl *)NULL;
- struct acl_entry *acl_entry;
- struct new_acl_entry *new_acl_entry;
- struct ace_id *idp;
- struct acl_entry_link *acl_entry_link;
- struct acl_entry_link *acl_entry_link_head;
- int i;
- int rc = 0;
- /* AIX has no DEFAULT */
- if ( type == SMB_ACL_TYPE_DEFAULT ) {
- errno = ENOTSUP;
- return NULL;
- }
- /* Get the acl using statacl */
-
- DEBUG(10,("Entering sys_acl_get_file\n"));
- DEBUG(10,("path_p is %s\n",path_p));
- file_acl = (struct acl *)SMB_MALLOC(BUFSIZ);
-
- if(file_acl == NULL) {
- errno=ENOMEM;
- DEBUG(0,("Error in AIX sys_acl_get_file: %d\n",errno));
- return(NULL);
- }
- memset(file_acl,0,BUFSIZ);
- rc = statacl((char *)path_p,0,file_acl,BUFSIZ);
- if(rc == -1) {
- DEBUG(0,("statacl returned %d with errno %d\n",rc,errno));
- SAFE_FREE(file_acl);
- return(NULL);
- }
- DEBUG(10,("Got facl and returned it\n"));
- /* Point to the first acl entry in the acl */
- acl_entry = file_acl->acl_ext;
- /* Begin setting up the head of the linked list *
- * that will be used for the storing the acl *
- * in a way that is useful for the posix_acls.c *
- * code. */
- acl_entry_link_head = acl_entry_link = sys_acl_init(0);
- if(acl_entry_link_head == NULL)
- return(NULL);
- acl_entry_link->entryp = SMB_MALLOC_P(struct new_acl_entry);
- if(acl_entry_link->entryp == NULL) {
- SAFE_FREE(file_acl);
- errno = ENOMEM;
- DEBUG(0,("Error in AIX sys_acl_get_file is %d\n",errno));
- return(NULL);
- }
- DEBUG(10,("acl_entry is %d\n",acl_entry));
- DEBUG(10,("acl_last(file_acl) id %d\n",acl_last(file_acl)));
- /* Check if the extended acl bit is on. *
- * If it isn't, do not show the *
- * contents of the acl since AIX intends *
- * the extended info to remain unused */
- if(file_acl->acl_mode & S_IXACL){
- /* while we are not pointing to the very end */
- while(acl_entry < acl_last(file_acl)) {
- /* before we malloc anything, make sure this is */
- /* a valid acl entry and one that we want to map */
- idp = id_nxt(acl_entry->ace_id);
- if((acl_entry->ace_type == ACC_SPECIFY ||
- (acl_entry->ace_type == ACC_PERMIT)) && (idp != id_last(acl_entry))) {
- acl_entry = acl_nxt(acl_entry);
- continue;
- }
- idp = acl_entry->ace_id;
- /* Check if this is the first entry in the linked list. *
- * The first entry needs to keep prevp pointing to NULL *
- * and already has entryp allocated. */
- if(acl_entry_link_head->count != 0) {
- acl_entry_link->nextp = SMB_MALLOC_P(struct acl_entry_link);
- if(acl_entry_link->nextp == NULL) {
- SAFE_FREE(file_acl);
- errno = ENOMEM;
- DEBUG(0,("Error in AIX sys_acl_get_file is %d\n",errno));
- return(NULL);
- }
- acl_entry_link->nextp->prevp = acl_entry_link;
- acl_entry_link = acl_entry_link->nextp;
- acl_entry_link->entryp = SMB_MALLOC_P(struct new_acl_entry);
- if(acl_entry_link->entryp == NULL) {
- SAFE_FREE(file_acl);
- errno = ENOMEM;
- DEBUG(0,("Error in AIX sys_acl_get_file is %d\n",errno));
- return(NULL);
- }
- acl_entry_link->nextp = NULL;
- }
- acl_entry_link->entryp->ace_len = acl_entry->ace_len;
- /* Don't really need this since all types are going *
- * to be specified but, it's better than leaving it 0 */
- acl_entry_link->entryp->ace_type = acl_entry->ace_type;
-
- acl_entry_link->entryp->ace_access = acl_entry->ace_access;
-
- memcpy(acl_entry_link->entryp->ace_id,idp,sizeof(struct ace_id));
- /* The access in the acl entries must be left shifted by *
- * three bites, because they will ultimately be compared *
- * to S_IRUSR, S_IWUSR, and S_IXUSR. */
- switch(acl_entry->ace_type){
- case ACC_PERMIT:
- case ACC_SPECIFY:
- acl_entry_link->entryp->ace_access = acl_entry->ace_access;
- acl_entry_link->entryp->ace_access <<= 6;
- acl_entry_link_head->count++;
- break;
- case ACC_DENY:
- /* Since there is no way to return a DENY acl entry *
- * change to PERMIT and then shift. */
- DEBUG(10,("acl_entry->ace_access is %d\n",acl_entry->ace_access));
- acl_entry_link->entryp->ace_access = ~acl_entry->ace_access & 7;
- DEBUG(10,("acl_entry_link->entryp->ace_access is %d\n",acl_entry_link->entryp->ace_access));
- acl_entry_link->entryp->ace_access <<= 6;
- acl_entry_link_head->count++;
- break;
- default:
- return(0);
- }
- DEBUG(10,("acl_entry = %d\n",acl_entry));
- DEBUG(10,("The ace_type is %d\n",acl_entry->ace_type));
-
- acl_entry = acl_nxt(acl_entry);
- }
- } /* end of if enabled */
- /* Since owner, group, other acl entries are not *
- * part of the acl entries in an acl, they must *
- * be dummied up to become part of the list. */
- for( i = 1; i < 4; i++) {
- DEBUG(10,("i is %d\n",i));
- if(acl_entry_link_head->count != 0) {
- acl_entry_link->nextp = SMB_MALLOC_P(struct acl_entry_link);
- if(acl_entry_link->nextp == NULL) {
- SAFE_FREE(file_acl);
- errno = ENOMEM;
- DEBUG(0,("Error in AIX sys_acl_get_file is %d\n",errno));
- return(NULL);
- }
- acl_entry_link->nextp->prevp = acl_entry_link;
- acl_entry_link = acl_entry_link->nextp;
- acl_entry_link->entryp = SMB_MALLOC_P(struct new_acl_entry);
- if(acl_entry_link->entryp == NULL) {
- SAFE_FREE(file_acl);
- errno = ENOMEM;
- DEBUG(0,("Error in AIX sys_acl_get_file is %d\n",errno));
- return(NULL);
- }
- }
- acl_entry_link->nextp = NULL;
- new_acl_entry = acl_entry_link->entryp;
- idp = new_acl_entry->ace_id;
- new_acl_entry->ace_len = sizeof(struct acl_entry);
- new_acl_entry->ace_type = ACC_PERMIT;
- idp->id_len = sizeof(struct ace_id);
- DEBUG(10,("idp->id_len = %d\n",idp->id_len));
- memset(idp->id_data,0,sizeof(uid_t));
- switch(i) {
- case 2:
- new_acl_entry->ace_access = file_acl->g_access << 6;
- idp->id_type = SMB_ACL_GROUP_OBJ;
- break;
- case 3:
- new_acl_entry->ace_access = file_acl->o_access << 6;
- idp->id_type = SMB_ACL_OTHER;
- break;
-
- case 1:
- new_acl_entry->ace_access = file_acl->u_access << 6;
- idp->id_type = SMB_ACL_USER_OBJ;
- break;
-
- default:
- return(NULL);
- }
- acl_entry_link_head->count++;
- DEBUG(10,("new_acl_entry->ace_access = %d\n",new_acl_entry->ace_access));
- }
- acl_entry_link_head->count = 0;
- SAFE_FREE(file_acl);
- return(acl_entry_link_head);
- }
- #if 0
- SMB_ACL_T sys_acl_get_fd(int fd)
- {
- struct acl *file_acl = (struct acl *)NULL;
- struct acl_entry *acl_entry;
- struct new_acl_entry *new_acl_entry;
- struct ace_id *idp;
- struct acl_entry_link *acl_entry_link;
- struct acl_entry_link *acl_entry_link_head;
- int i;
- int rc = 0;
- /* Get the acl using fstatacl */
-
- DEBUG(10,("Entering sys_acl_get_fd\n"));
- DEBUG(10,("fd is %d\n",fd));
- file_acl = (struct acl *)SMB_MALLOC(BUFSIZ);
- if(file_acl == NULL) {
- errno=ENOMEM;
- DEBUG(0,("Error in sys_acl_get_fd is %d\n",errno));
- return(NULL);
- }
- memset(file_acl,0,BUFSIZ);
- rc = fstatacl(fd,0,file_acl,BUFSIZ);
- if(rc == -1) {
- DEBUG(0,("The fstatacl call returned %d with errno %d\n",rc,errno));
- SAFE_FREE(file_acl);
- return(NULL);
- }
- DEBUG(10,("Got facl and returned it\n"));
- /* Point to the first acl entry in the acl */
- acl_entry = file_acl->acl_ext;
- /* Begin setting up the head of the linked list *
- * that will be used for the storing the acl *
- * in a way that is useful for the posix_acls.c *
- * code. */
- acl_entry_link_head = acl_entry_link = sys_acl_init(0);
- if(acl_entry_link_head == NULL){
- SAFE_FREE(file_acl);
- return(NULL);
- }
- acl_entry_link->entryp = SMB_MALLOC_P(struct new_acl_entry);
- if(acl_entry_link->entryp == NULL) {
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_get_fd is %d\n",errno));
- SAFE_FREE(file_acl);
- return(NULL);
- }
- DEBUG(10,("acl_entry is %d\n",acl_entry));
- DEBUG(10,("acl_last(file_acl) id %d\n",acl_last(file_acl)));
-
- /* Check if the extended acl bit is on. *
- * If it isn't, do not show the *
- * contents of the acl since AIX intends *
- * the extended info to remain unused */
-
- if(file_acl->acl_mode & S_IXACL){
- /* while we are not pointing to the very end */
- while(acl_entry < acl_last(file_acl)) {
- /* before we malloc anything, make sure this is */
- /* a valid acl entry and one that we want to map */
- idp = id_nxt(acl_entry->ace_id);
- if((acl_entry->ace_type == ACC_SPECIFY ||
- (acl_entry->ace_type == ACC_PERMIT)) && (idp != id_last(acl_entry))) {
- acl_entry = acl_nxt(acl_entry);
- continue;
- }
- idp = acl_entry->ace_id;
-
- /* Check if this is the first entry in the linked list. *
- * The first entry needs to keep prevp pointing to NULL *
- * and already has entryp allocated. */
- if(acl_entry_link_head->count != 0) {
- acl_entry_link->nextp = SMB_MALLOC_P(struct acl_entry_link);
- if(acl_entry_link->nextp == NULL) {
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_get_fd is %d\n",errno));
- SAFE_FREE(file_acl);
- return(NULL);
- }
- acl_entry_link->nextp->prevp = acl_entry_link;
- acl_entry_link = acl_entry_link->nextp;
- acl_entry_link->entryp = SMB_MALLOC_P(struct new_acl_entry);
- if(acl_entry_link->entryp == NULL) {
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_get_fd is %d\n",errno));
- SAFE_FREE(file_acl);
- return(NULL);
- }
- acl_entry_link->nextp = NULL;
- }
- acl_entry_link->entryp->ace_len = acl_entry->ace_len;
- /* Don't really need this since all types are going *
- * to be specified but, it's better than leaving it 0 */
- acl_entry_link->entryp->ace_type = acl_entry->ace_type;
- acl_entry_link->entryp->ace_access = acl_entry->ace_access;
- memcpy(acl_entry_link->entryp->ace_id, idp, sizeof(struct ace_id));
- /* The access in the acl entries must be left shifted by *
- * three bites, because they will ultimately be compared *
- * to S_IRUSR, S_IWUSR, and S_IXUSR. */
- switch(acl_entry->ace_type){
- case ACC_PERMIT:
- case ACC_SPECIFY:
- acl_entry_link->entryp->ace_access = acl_entry->ace_access;
- acl_entry_link->entryp->ace_access <<= 6;
- acl_entry_link_head->count++;
- break;
- case ACC_DENY:
- /* Since there is no way to return a DENY acl entry *
- * change to PERMIT and then shift. */
- DEBUG(10,("acl_entry->ace_access is %d\n",acl_entry->ace_access));
- acl_entry_link->entryp->ace_access = ~acl_entry->ace_access & 7;
- DEBUG(10,("acl_entry_link->entryp->ace_access is %d\n",acl_entry_link->entryp->ace_access));
- acl_entry_link->entryp->ace_access <<= 6;
- acl_entry_link_head->count++;
- break;
- default:
- return(0);
- }
- DEBUG(10,("acl_entry = %d\n",acl_entry));
- DEBUG(10,("The ace_type is %d\n",acl_entry->ace_type));
-
- acl_entry = acl_nxt(acl_entry);
- }
- } /* end of if enabled */
- /* Since owner, group, other acl entries are not *
- * part of the acl entries in an acl, they must *
- * be dummied up to become part of the list. */
- for( i = 1; i < 4; i++) {
- DEBUG(10,("i is %d\n",i));
- if(acl_entry_link_head->count != 0){
- acl_entry_link->nextp = SMB_MALLOC_P(struct acl_entry_link);
- if(acl_entry_link->nextp == NULL) {
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_get_fd is %d\n",errno));
- SAFE_FREE(file_acl);
- return(NULL);
- }
- acl_entry_link->nextp->prevp = acl_entry_link;
- acl_entry_link = acl_entry_link->nextp;
- acl_entry_link->entryp = SMB_MALLOC_P(struct new_acl_entry);
- if(acl_entry_link->entryp == NULL) {
- SAFE_FREE(file_acl);
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_get_fd is %d\n",errno));
- return(NULL);
- }
- }
- acl_entry_link->nextp = NULL;
-
- new_acl_entry = acl_entry_link->entryp;
- idp = new_acl_entry->ace_id;
-
- new_acl_entry->ace_len = sizeof(struct acl_entry);
- new_acl_entry->ace_type = ACC_PERMIT;
- idp->id_len = sizeof(struct ace_id);
- DEBUG(10,("idp->id_len = %d\n",idp->id_len));
- memset(idp->id_data,0,sizeof(uid_t));
-
- switch(i) {
- case 2:
- new_acl_entry->ace_access = file_acl->g_access << 6;
- idp->id_type = SMB_ACL_GROUP_OBJ;
- break;
-
- case 3:
- new_acl_entry->ace_access = file_acl->o_access << 6;
- idp->id_type = SMB_ACL_OTHER;
- break;
-
- case 1:
- new_acl_entry->ace_access = file_acl->u_access << 6;
- idp->id_type = SMB_ACL_USER_OBJ;
- break;
-
- default:
- return(NULL);
- }
-
- acl_entry_link_head->count++;
- DEBUG(10,("new_acl_entry->ace_access = %d\n",new_acl_entry->ace_access));
- }
- acl_entry_link_head->count = 0;
- SAFE_FREE(file_acl);
-
- return(acl_entry_link_head);
- }
- #endif
- int sys_acl_get_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T *tag_type_p, uint32 *bits_p, id_t *u_g_id_p)
- {
- uint *permset;
- if (sys_acl_get_tag_type(entry, tag_type_p) != 0)
- return -1;
- if (*tag_type_p == SMB_ACL_USER || *tag_type_p == SMB_ACL_GROUP)
- memcpy(u_g_id_p, entry->ace_id->id_data, sizeof (id_t));
- permset = &entry->ace_access;
- DEBUG(10,("*permset is %d\n",*permset));
- *bits_p = (*permset & S_IRUSR ? 4 : 0)
- | (*permset & S_IWUSR ? 2 : 0)
- | (*permset & S_IXUSR ? 1 : 0);
- return 0;
- }
- SMB_ACL_T sys_acl_init( int count)
- {
- struct acl_entry_link *theacl = NULL;
-
- if (count < 0) {
- errno = EINVAL;
- return NULL;
- }
- DEBUG(10,("Entering sys_acl_init\n"));
- theacl = SMB_MALLOC_P(struct acl_entry_link);
- if(theacl == NULL) {
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_init is %d\n",errno));
- return(NULL);
- }
- theacl->count = 0;
- theacl->nextp = NULL;
- theacl->prevp = NULL;
- theacl->entryp = NULL;
- DEBUG(10,("Exiting sys_acl_init\n"));
- return(theacl);
- }
- int sys_acl_create_entry( SMB_ACL_T *pacl, SMB_ACL_ENTRY_T *pentry)
- {
- struct acl_entry_link *theacl;
- struct acl_entry_link *acl_entryp;
- struct acl_entry_link *temp_entry;
- int counting;
- DEBUG(10,("Entering the sys_acl_create_entry\n"));
- theacl = acl_entryp = *pacl;
- /* Get to the end of the acl before adding entry */
- for(counting=0; counting < theacl->count; counting++){
- DEBUG(10,("The acl_entryp is %d\n",acl_entryp));
- temp_entry = acl_entryp;
- acl_entryp = acl_entryp->nextp;
- }
- if(theacl->count != 0){
- temp_entry->nextp = acl_entryp = SMB_MALLOC_P(struct acl_entry_link);
- if(acl_entryp == NULL) {
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_create_entry is %d\n",errno));
- return(-1);
- }
- DEBUG(10,("The acl_entryp is %d\n",acl_entryp));
- acl_entryp->prevp = temp_entry;
- DEBUG(10,("The acl_entryp->prevp is %d\n",acl_entryp->prevp));
- }
- *pentry = acl_entryp->entryp = SMB_MALLOC_P(struct new_acl_entry);
- if(*pentry == NULL) {
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_create_entry is %d\n",errno));
- return(-1);
- }
- memset(*pentry,0,sizeof(struct new_acl_entry));
- acl_entryp->entryp->ace_len = sizeof(struct acl_entry);
- acl_entryp->entryp->ace_type = ACC_PERMIT;
- acl_entryp->entryp->ace_id->id_len = sizeof(struct ace_id);
- acl_entryp->nextp = NULL;
- theacl->count++;
- DEBUG(10,("Exiting sys_acl_create_entry\n"));
- return(0);
- }
- int sys_acl_set_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T tag_type, uint32 bits, id_t u_g_id)
- {
- entry->ace_id->id_type = tag_type;
- DEBUG(10,("The tag type is %d\n",entry->ace_id->id_type));
- if (tag_type == SMB_ACL_USER || tag_type == SMB_ACL_GROUP)
- memcpy(entry->ace_id->id_data, &u_g_id, sizeof (id_t));
- entry->ace_access = bits;
- DEBUG(10,("entry->ace_access = %d\n",entry->ace_access));
- return 0;
- }
- int sys_acl_set_access_bits(SMB_ACL_ENTRY_T entry, uint32 bits)
- {
- DEBUG(10,("Starting AIX sys_acl_set_permset\n"));
- entry->ace_access = bits;
- DEBUG(10,("entry->ace_access = %d\n",entry->ace_access));
- DEBUG(10,("Ending AIX sys_acl_set_permset\n"));
- return(0);
- }
- int sys_acl_valid( SMB_ACL_T theacl )
- {
- int user_obj = 0;
- int group_obj = 0;
- int other_obj = 0;
- struct acl_entry_link *acl_entry;
- for(acl_entry=theacl; acl_entry != NULL; acl_entry = acl_entry->nextp) {
- user_obj += (acl_entry->entryp->ace_id->id_type == SMB_ACL_USER_OBJ);
- group_obj += (acl_entry->entryp->ace_id->id_type == SMB_ACL_GROUP_OBJ);
- other_obj += (acl_entry->entryp->ace_id->id_type == SMB_ACL_OTHER);
- }
- DEBUG(10,("user_obj=%d, group_obj=%d, other_obj=%d\n",user_obj,group_obj,other_obj));
-
- if(user_obj != 1 || group_obj != 1 || other_obj != 1)
- return(-1);
- return(0);
- }
- int sys_acl_set_file( const char *name, SMB_ACL_TYPE_T acltype, SMB_ACL_T theacl)
- {
- struct acl_entry_link *acl_entry_link = NULL;
- struct acl *file_acl = NULL;
- struct acl *file_acl_temp = NULL;
- struct acl_entry *acl_entry = NULL;
- struct ace_id *ace_id = NULL;
- uint id_type;
- uint user_id;
- uint acl_length;
- uint rc;
- DEBUG(10,("Entering sys_acl_set_file\n"));
- DEBUG(10,("File name is %s\n",name));
-
- /* AIX has no default ACL */
- if(acltype == SMB_ACL_TYPE_DEFAULT)
- return(0);
- acl_length = BUFSIZ;
- file_acl = (struct acl *)SMB_MALLOC(BUFSIZ);
- if(file_acl == NULL) {
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_set_file is %d\n",errno));
- return(-1);
- }
- memset(file_acl,0,BUFSIZ);
- file_acl->acl_len = ACL_SIZ;
- file_acl->acl_mode = S_IXACL;
- for(acl_entry_link=theacl; acl_entry_link != NULL; acl_entry_link = acl_entry_link->nextp) {
- acl_entry_link->entryp->ace_access >>= 6;
- id_type = acl_entry_link->entryp->ace_id->id_type;
- switch(id_type) {
- case SMB_ACL_USER_OBJ:
- file_acl->u_access = acl_entry_link->entryp->ace_access;
- continue;
- case SMB_ACL_GROUP_OBJ:
- file_acl->g_access = acl_entry_link->entryp->ace_access;
- continue;
- case SMB_ACL_OTHER:
- file_acl->o_access = acl_entry_link->entryp->ace_access;
- continue;
- case SMB_ACL_MASK:
- continue;
- }
- if((file_acl->acl_len + sizeof(struct acl_entry)) > acl_length) {
- acl_length += sizeof(struct acl_entry);
- file_acl_temp = (struct acl *)SMB_MALLOC(acl_length);
- if(file_acl_temp == NULL) {
- SAFE_FREE(file_acl);
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_set_file is %d\n",errno));
- return(-1);
- }
- memcpy(file_acl_temp,file_acl,file_acl->acl_len);
- SAFE_FREE(file_acl);
- file_acl = file_acl_temp;
- }
- acl_entry = (struct acl_entry *)((char *)file_acl + file_acl->acl_len);
- file_acl->acl_len += sizeof(struct acl_entry);
- acl_entry->ace_len = acl_entry_link->entryp->ace_len;
- acl_entry->ace_access = acl_entry_link->entryp->ace_access;
-
- /* In order to use this, we'll need to wait until we can get denies */
- /* if(!acl_entry->ace_access && acl_entry->ace_type == ACC_PERMIT)
- acl_entry->ace_type = ACC_SPECIFY; */
- acl_entry->ace_type = ACC_SPECIFY;
-
- ace_id = acl_entry->ace_id;
-
- ace_id->id_type = acl_entry_link->entryp->ace_id->id_type;
- DEBUG(10,("The id type is %d\n",ace_id->id_type));
- ace_id->id_len = acl_entry_link->entryp->ace_id->id_len;
- memcpy(&user_id, acl_entry_link->entryp->ace_id->id_data, sizeof(uid_t));
- memcpy(acl_entry->ace_id->id_data, &user_id, sizeof(uid_t));
- }
- rc = chacl((char*)name,file_acl,file_acl->acl_len);
- DEBUG(10,("errno is %d\n",errno));
- DEBUG(10,("return code is %d\n",rc));
- SAFE_FREE(file_acl);
- DEBUG(10,("Exiting the sys_acl_set_file\n"));
- return(rc);
- }
- #if 0
- int sys_acl_set_fd( int fd, SMB_ACL_T theacl)
- {
- struct acl_entry_link *acl_entry_link = NULL;
- struct acl *file_acl = NULL;
- struct acl *file_acl_temp = NULL;
- struct acl_entry *acl_entry = NULL;
- struct ace_id *ace_id = NULL;
- uint id_type;
- uint user_id;
- uint acl_length;
- uint rc;
-
- DEBUG(10,("Entering sys_acl_set_fd\n"));
- acl_length = BUFSIZ;
- file_acl = (struct acl *)SMB_MALLOC(BUFSIZ);
- if(file_acl == NULL) {
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_set_fd is %d\n",errno));
- return(-1);
- }
- memset(file_acl,0,BUFSIZ);
-
- file_acl->acl_len = ACL_SIZ;
- file_acl->acl_mode = S_IXACL;
- for(acl_entry_link=theacl; acl_entry_link != NULL; acl_entry_link = acl_entry_link->nextp) {
- acl_entry_link->entryp->ace_access >>= 6;
- id_type = acl_entry_link->entryp->ace_id->id_type;
- DEBUG(10,("The id_type is %d\n",id_type));
- switch(id_type) {
- case SMB_ACL_USER_OBJ:
- file_acl->u_access = acl_entry_link->entryp->ace_access;
- continue;
- case SMB_ACL_GROUP_OBJ:
- file_acl->g_access = acl_entry_link->entryp->ace_access;
- continue;
- case SMB_ACL_OTHER:
- file_acl->o_access = acl_entry_link->entryp->ace_access;
- continue;
- case SMB_ACL_MASK:
- continue;
- }
- if((file_acl->acl_len + sizeof(struct acl_entry)) > acl_length) {
- acl_length += sizeof(struct acl_entry);
- file_acl_temp = (struct acl *)SMB_MALLOC(acl_length);
- if(file_acl_temp == NULL) {
- SAFE_FREE(file_acl);
- errno = ENOMEM;
- DEBUG(0,("Error in sys_acl_set_fd is %d\n",errno));
- return(-1);
- }
- memcpy(file_acl_temp,file_acl,file_acl->acl_len);
- SAFE_FREE(file_acl);
- file_acl = file_acl_temp;
- }
- acl_entry = (struct acl_entry *)((char *)file_acl + file_acl->acl_len);
- file_acl->acl_len += sizeof(struct acl_entry);
- acl_entry->ace_len = acl_entry_link->entryp->ace_len;
- acl_entry->ace_access = acl_entry_link->entryp->ace_access;
-
- /* In order to use this, we'll need to wait until we can get denies */
- /* if(!acl_entry->ace_access && acl_entry->ace_type == ACC_PERMIT)
- acl_entry->ace_type = ACC_SPECIFY; */
-
- acl_entry->ace_type = ACC_SPECIFY;
-
- ace_id = acl_entry->ace_id;
-
- ace_id->id_type = acl_entry_link->entryp->ace_id->id_type;
- DEBUG(10,("The id type is %d\n",ace_id->id_type));
- ace_id->id_len = acl_entry_link->entryp->ace_id->id_len;
- memcpy(&user_id, acl_entry_link->entryp->ace_id->id_data, sizeof(uid_t));
- memcpy(ace_id->id_data, &user_id, sizeof(uid_t));
- }
-
- rc = fchacl(fd,file_acl,file_acl->acl_len);
- DEBUG(10,("errno is %d\n",errno));
- DEBUG(10,("return code is %d\n",rc));
- SAFE_FREE(file_acl);
- DEBUG(10,("Exiting sys_acl_set_fd\n"));
- return(rc);
- }
- #endif
- int sys_acl_delete_def_file(UNUSED(const char *name))
- {
- /* AIX has no default ACL */
- return 0;
- }
- int sys_acl_free_acl(SMB_ACL_T posix_acl)
- {
- struct acl_entry_link *acl_entry_link;
- for(acl_entry_link = posix_acl->nextp; acl_entry_link->nextp != NULL; acl_entry_link = acl_entry_link->nextp) {
- SAFE_FREE(acl_entry_link->prevp->entryp);
- SAFE_FREE(acl_entry_link->prevp);
- }
- SAFE_FREE(acl_entry_link->prevp->entryp);
- SAFE_FREE(acl_entry_link->prevp);
- SAFE_FREE(acl_entry_link->entryp);
- SAFE_FREE(acl_entry_link);
-
- return(0);
- }
- #elif defined(HAVE_OSX_ACLS) /*----------------------------------------------*/
- #define OSX_BROKEN_GETENTRY /* returns 0 instead of 1 */
- #include <membership.h>
- int sys_acl_get_entry(SMB_ACL_T the_acl, int entry_id, SMB_ACL_ENTRY_T *entry_p)
- {
- int ret = acl_get_entry(the_acl, entry_id, entry_p);
- #ifdef OSX_BROKEN_GETENTRY
- if (ret == 0)
- ret = 1;
- else if (ret == -1 && errno == 22)
- ret = 0;
- #endif
- return ret;
- }
- SMB_ACL_T sys_acl_get_file(const char *path_p, SMB_ACL_TYPE_T type)
- {
- if (type == ACL_TYPE_DEFAULT) {
- errno = ENOTSUP;
- return NULL;
- }
- errno = 0;
- return acl_get_file(path_p, type);
- }
- #if 0
- SMB_ACL_T sys_acl_get_fd(int fd)
- {
- return acl_get_fd(fd);
- }
- #endif
- int sys_acl_get_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T *tag_type_p, uint32 *bits_p, id_t *u_g_id_p)
- {
- uuid_t *uup;
- acl_tag_t tag;
- acl_flagset_t flagset;
- acl_permset_t permset;
- uint32 bits, fb, bb, pb;
- int id_type = -1;
- int rc;
- if (acl_get_tag_type(entry, &tag) != 0
- || acl_get_flagset_np(entry, &flagset) != 0
- || acl_get_permset(entry, &permset) != 0
- || (uup = acl_get_qualifier(entry)) == NULL)
- return -1;
- rc = mbr_uuid_to_id(*uup, u_g_id_p, &id_type);
- acl_free(uup);
- if (rc != 0)
- return rc;
- if (id_type == ID_TYPE_UID)
- *tag_type_p = SMB_ACL_USER;
- else
- *tag_type_p = SMB_ACL_GROUP;
- bits = tag == ACL_EXTENDED_ALLOW ? 1 : 0;
- for (fb = (1u<<4), bb = (1u<<1); bb < (1u<<12); fb *= 2, bb *= 2) {
- if (acl_get_flag_np(flagset, fb) == 1)
- bits |= bb;
- }
- for (pb = (1u<<1), bb = (1u<<12); bb < (1u<<25); pb *= 2, bb *= 2) {
- if (acl_get_perm_np(permset, pb) == 1)
- bits |= bb;
- }
- *bits_p = bits;
- return 0;
- }
- SMB_ACL_T sys_acl_init(int count)
- {
- return acl_init(count);
- }
- int sys_acl_create_entry(SMB_ACL_T *pacl, SMB_ACL_ENTRY_T *pentry)
- {
- return acl_create_entry(pacl, pentry);
- }
- int sys_acl_set_info(SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T tag_type, uint32 bits, id_t u_g_id)
- {
- acl_flagset_t flagset;
- acl_permset_t permset;
- uint32 fb, bb, pb;
- int is_user = tag_type == SMB_ACL_USER;
- uuid_t uu;
- int rc;
- tag_type = bits & 1 ? ACL_EXTENDED_ALLOW : ACL_EXTENDED_DENY;
- if (acl_get_flagset_np(entry, &flagset) != 0
- || acl_get_permset(entry, &permset) != 0)
- return -1;
- acl_clear_flags_np(flagset);
- acl_clear_perms(permset);
- for (fb = (1u<<4), bb = (1u<<1); bb < (1u<<12); fb *= 2, bb *= 2) {
- if (bits & bb)
- acl_add_flag_np(flagset, fb);
- }
- for (pb = (1u<<1), bb = (1u<<12); bb < (1u<<25); pb *= 2, bb *= 2) {
- if (bits & bb)
- acl_add_perm(permset, pb);
- }
- if (is_user)
- rc = mbr_uid_to_uuid(u_g_id, uu);
- else
- rc = mbr_gid_to_uuid(u_g_id, uu);
- if (rc != 0)
- return rc;
- if (acl_set_tag_type(entry, tag_type) != 0
- || acl_set_qualifier(entry, &uu) != 0
- || acl_set_permset(entry, permset) != 0
- || acl_set_flagset_np(entry, flagset) != 0)
- return -1;
- return 0;
- }
- #if 0
- int sys_acl_set_access_bits(SMB_ACL_ENTRY_T entry, uint32 bits)
- {
- return -1; /* Not needed for OS X. */
- }
- #endif
- int sys_acl_valid(SMB_ACL_T theacl)
- {
- return acl_valid(theacl);
- }
- int sys_acl_set_file(const char *name, SMB_ACL_TYPE_T acltype, SMB_ACL_T theacl)
- {
- return acl_set_file(name, acltype, theacl);
- }
- #if 0
- int sys_acl_set_fd(int fd, SMB_ACL_T theacl)
- {
- return acl_set_fd(fd, theacl);
- }
- #endif
- int sys_acl_delete_def_file(const char *name)
- {
- return acl_delete_def_file(name);
- }
- int sys_acl_free_acl(SMB_ACL_T the_acl)
- {
- return acl_free(the_acl);
- }
- #else /* No ACLs. */
- #error No ACL functions defined for this platform!
- #endif
- /************************************************************************
- Deliberately outside the ACL defines. Return 1 if this is a "no acls"
- errno, 0 if not.
- ************************************************************************/
- int no_acl_syscall_error(int err)
- {
- #ifdef HAVE_OSX_ACLS
- if (err == ENOENT)
- return 1; /* Weird problem with directory ACLs. */
- #endif
- #if defined(ENOSYS)
- if (err == ENOSYS) {
- return 1;
- }
- #endif
- #if defined(ENOTSUP)
- if (err == ENOTSUP) {
- return 1;
- }
- #endif
- return 0;
- }
- #endif /* SUPPORT_ACLS */
|