1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21/*
22 * Copyright 2014 Garrett D'Amore <garrett@damore.org>
23 *
24 * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
25 */
26
27#ifndef	_SYS_PRIV_H
28#define	_SYS_PRIV_H
29
30#include <sys/types.h>
31#include <sys/cred.h>
32#include <sys/priv_names.h>
33
34#ifdef	__cplusplus
35extern "C" {
36#endif
37
38typedef uint32_t priv_chunk_t;
39typedef struct priv_set priv_set_t;
40
41#ifdef _KERNEL
42
43/*
44 * Kernel type definitions.
45 */
46typedef int priv_ptype_t;
47typedef int priv_t;
48
49#else /* _KERNEL */
50
51/*
52 * Userland type definitions.
53 */
54
55typedef const char *priv_ptype_t;
56typedef const char *priv_t;
57
58#endif /* _KERNEL */
59
60/*
61 * priv_op_t indicates a privilege operation type
62 */
63typedef enum priv_op {
64	PRIV_ON,
65	PRIV_OFF,
66	PRIV_SET
67} priv_op_t;
68
69/*
70 * Privilege system call subcodes.
71 */
72
73#define	PRIVSYS_SETPPRIV	0
74#define	PRIVSYS_GETPPRIV	1
75#define	PRIVSYS_GETIMPLINFO	2
76#define	PRIVSYS_SETPFLAGS	3
77#define	PRIVSYS_GETPFLAGS	4
78#define	PRIVSYS_ISSETUGID	5
79#define	PRIVSYS_KLPD_REG	6
80#define	PRIVSYS_KLPD_UNREG	7
81#define	PRIVSYS_PFEXEC_REG	8
82#define	PRIVSYS_PFEXEC_UNREG	9
83
84
85/*
86 * Maximum length of a user defined privilege name.
87 */
88#define	PRIVNAME_MAX		32
89
90/*
91 * Privilege interface functions for those parts of the kernel that
92 * know nothing of the privilege internals.
93 *
94 * A privilege implementation can have a varying number of sets; sets
95 * consist of a number of priv_chunk_t's and the size is expressed as such.
96 * The privileges can be represented as
97 *
98 *		priv_chunk_t privs[info.priv_nsets][info.priv_setsize]
99 *		... priv_infosize of extra information ...
100 *
101 * Extra data contained in the privilege information consists of chunks
102 * of data with specified size and type all headed by a priv_info_t header
103 * which defines both the type of information as well as the size of the
104 * information.  ((char*)&info)+info->priv_info_size should be rounded up
105 * to point to the next piece of information.
106 */
107
108typedef struct priv_impl_info {
109	uint32_t	priv_headersize;	/* sizeof (priv_impl_info) */
110	uint32_t	priv_flags;		/* additional flags */
111	uint32_t	priv_nsets;		/* number of priv sets */
112	uint32_t	priv_setsize;		/* size in priv_chunk_t */
113	uint32_t	priv_max;		/* highest actual valid priv */
114	uint32_t	priv_infosize;		/* Per proc. additional info */
115	uint32_t	priv_globalinfosize;	/* Per system info */
116} priv_impl_info_t;
117
118#define	PRIV_IMPL_INFO_SIZE(p) \
119			((p)->priv_headersize + (p)->priv_globalinfosize)
120
121#define	PRIV_PRPRIV_INFO_OFFSET(p) \
122		(sizeof (*(p)) + \
123		((p)->pr_nsets * (p)->pr_setsize - 1) * sizeof (priv_chunk_t))
124
125#define	PRIV_PRPRIV_SIZE(p) \
126		(PRIV_PRPRIV_INFO_OFFSET(p) + (p)->pr_infosize)
127
128/*
129 * Per credential flags.
130 */
131#define	PRIV_DEBUG			0x0001		/* User debugging */
132#define	PRIV_AWARE			0x0002		/* Is privilege aware */
133#define	PRIV_AWARE_INHERIT		0x0004		/* Inherit awareness */
134#define	__PROC_PROTECT			0x0008		/* Private */
135#define	NET_MAC_AWARE			0x0010		/* Is MAC aware */
136#define	NET_MAC_AWARE_INHERIT		0x0020		/* Inherit MAC aware */
137#define	PRIV_AWARE_RESET		0x0040		/* Reset on setuid() */
138#define	PRIV_XPOLICY			0x0080		/* Extended policy */
139#define	PRIV_PFEXEC			0x0100		/* As if pfexec'ed */
140
141/* user-settable flags: */
142#define	PRIV_USER	(PRIV_DEBUG | NET_MAC_AWARE | NET_MAC_AWARE_INHERIT |\
143			    PRIV_XPOLICY | PRIV_AWARE_RESET | PRIV_PFEXEC)
144
145/*
146 * Header of the privilege info data structure; multiple structures can
147 * follow the privilege sets and priv_impl_info structures.
148 */
149typedef struct priv_info {
150	uint32_t	priv_info_type;
151	uint32_t	priv_info_size;
152} priv_info_t;
153
154typedef struct priv_info_uint {
155	priv_info_t	info;
156	uint_t		val;
157} priv_info_uint_t;
158
159/*
160 * Global privilege set information item; the actual size of the array is
161 * {priv_setsize}.
162 */
163typedef struct priv_info_set {
164	priv_info_t	info;
165	priv_chunk_t	set[1];
166} priv_info_set_t;
167
168/*
169 * names[1] is a place holder which can contain multiple NUL terminated,
170 * non-empty strings.
171 */
172
173typedef struct priv_info_names {
174	priv_info_t	info;
175	int		cnt;		/* number of strings */
176	char		names[1];	/* "string1\0string2\0 ..stringN\0" */
177} priv_info_names_t;
178
179/*
180 * Privilege information types.
181 */
182#define	PRIV_INFO_SETNAMES		0x0001
183#define	PRIV_INFO_PRIVNAMES		0x0002
184#define	PRIV_INFO_BASICPRIVS		0x0003
185#define	PRIV_INFO_FLAGS			0x0004
186
187/*
188 * Special "privileges" used to indicate special conditions in privilege
189 * debugging/tracing code.
190 */
191#define	PRIV_ALL			(-1)	/* All privileges required */
192#define	PRIV_MULTIPLE			(-2)	/* More than one */
193#define	PRIV_NONE			(-3)	/* No value */
194#define	PRIV_ALLZONE			(-4)	/* All privileges in zone */
195#define	PRIV_GLOBAL			(-5)	/* Must be in global zone */
196
197#ifdef _KERNEL
198
199#define	PRIV_ALLOC			0x1
200
201extern int priv_debug;
202extern int priv_basic_test;
203
204struct proc;
205struct prpriv;
206struct cred;
207
208extern int priv_prgetprivsize(struct prpriv *);
209extern void cred2prpriv(const struct cred *, struct prpriv *);
210extern int priv_pr_spriv(struct proc *, struct prpriv *, const struct cred *);
211
212extern priv_impl_info_t *priv_hold_implinfo(void);
213extern void priv_release_implinfo(void);
214extern size_t priv_get_implinfo_size(void);
215extern const priv_set_t *priv_getset(const struct cred *, int);
216extern void priv_getinfo(const struct cred *, void *);
217extern int priv_getbyname(const char *, uint_t);
218extern int priv_getsetbyname(const char *, int);
219extern const char *priv_getbynum(int);
220extern const char *priv_getsetbynum(int);
221
222extern void priv_emptyset(priv_set_t *);
223extern void priv_fillset(priv_set_t *);
224extern void priv_addset(priv_set_t *, int);
225extern void priv_delset(priv_set_t *, int);
226extern boolean_t priv_ismember(const priv_set_t *, int);
227extern boolean_t priv_isemptyset(const priv_set_t *);
228extern boolean_t priv_isfullset(const priv_set_t *);
229extern boolean_t priv_isequalset(const priv_set_t *, const priv_set_t *);
230extern boolean_t priv_issubset(const priv_set_t *, const priv_set_t *);
231extern int priv_proc_cred_perm(const struct cred *, struct proc *,
232	struct cred **, int);
233extern void priv_intersect(const priv_set_t *, priv_set_t *);
234extern void priv_union(const priv_set_t *, priv_set_t *);
235extern void priv_inverse(priv_set_t *);
236
237extern void priv_set_PA(cred_t *);
238extern void priv_adjust_PA(cred_t *);
239extern void priv_reset_PA(cred_t *, boolean_t);
240extern boolean_t priv_can_clear_PA(const cred_t *);
241
242extern int setpflags(uint_t, uint_t, cred_t *);
243extern uint_t getpflags(uint_t, const cred_t *);
244
245#endif /* _KERNEL */
246
247#ifdef	__cplusplus
248}
249#endif
250
251#endif	/* _SYS_PRIV_H */
252