xref: /illumos-gate/usr/src/uts/common/sys/priv_impl.h (revision 2d6eb4a5)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2003 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #ifndef	_SYS_PRIV_IMPL_H
28 #define	_SYS_PRIV_IMPL_H
29 
30 #include <sys/priv_const.h>
31 #include <sys/priv.h>
32 
33 #ifdef	__cplusplus
34 extern "C" {
35 #endif
36 
37 #if defined(_KERNEL) || defined(_KMEMUSER)
38 /*
39  * priv_set_t is a structure holding a set of privileges
40  */
41 
42 struct priv_set {
43 	priv_chunk_t pbits[PRIV_SETSIZE];
44 };
45 
46 typedef struct cred_priv_s {
47 	priv_set_t	crprivs[PRIV_NSET];	/* Priv sets */
48 	uint_t		crpriv_flags;		/* Privilege flags */
49 } cred_priv_t;
50 
51 #endif
52 
53 #ifdef _KERNEL
54 
55 extern priv_set_t *priv_basic;
56 extern priv_set_t priv_unsafe;
57 extern priv_set_t priv_fullset;
58 extern void priv_init(void);
59 
60 /* The CR_PRIVS macro is defined in <sys/cred_impl.h> */
61 #define	CR_EPRIV(c)	(CR_PRIVS(c)->crprivs[PRIV_EFFECTIVE])
62 #define	CR_IPRIV(c)	(CR_PRIVS(c)->crprivs[PRIV_INHERITABLE])
63 #define	CR_PPRIV(c)	(CR_PRIVS(c)->crprivs[PRIV_PERMITTED])
64 #define	CR_LPRIV(c)	(CR_PRIVS(c)->crprivs[PRIV_LIMIT])
65 
66 #define	CR_FLAGS(c)	(CR_PRIVS(c)->crpriv_flags)
67 
68 #define	PRIV_SETBYTES	(PRIV_NSET * PRIV_SETSIZE * sizeof (priv_chunk_t))
69 
70 #define	PRIV_EISAWARE(c) ((CR_FLAGS(c) & PRIV_AWARE) || (c)->cr_uid != 0)
71 #define	PRIV_PISAWARE(c) ((CR_FLAGS(c) & PRIV_AWARE) || \
72 				((c)->cr_uid != 0 && (c)->cr_suid != 0 && \
73 				(c)->cr_ruid != 0))
74 
75 #define	CR_OEPRIV(c)	(*(PRIV_EISAWARE(c) ? &CR_EPRIV(c) : &CR_LPRIV(c)))
76 #define	CR_OPPRIV(c)	(*(PRIV_PISAWARE(c) ? &CR_PPRIV(c) : &CR_LPRIV(c)))
77 
78 #define	PRIV_VALIDSET(s)	((s) >= 0 && (s) < PRIV_NSET)
79 #define	PRIV_VALIDOP(op)	((op) >= PRIV_ON && (op) <= PRIV_SET)
80 
81 #define	PRIV_FULLSET		&priv_fullset	/* Require full set */
82 
83 /*
84  * Privilege macros bits manipulation macros; DEBUG kernels will
85  * ASSERT() that privileges are not out of range.
86  */
87 #ifndef	NBBY
88 #define	NBBY		8
89 #endif
90 
91 #define	__NBWRD		(NBBY * sizeof (priv_chunk_t))
92 
93 #define	privmask(n)	(1U << ((__NBWRD - 1) - ((n) % __NBWRD)))
94 #define	privword(n)	((n)/__NBWRD)
95 
96 /*
97  * PRIV_ASSERT(a, b) sets privilege "b" in privilege set "a".
98  * PRIV_CLEAR(a,b) clears privilege "b" in privilege set "a".
99  * PRIV_ISASSERT tests if privilege 'b' is asserted in privilege set 'a'.
100  */
101 
102 #define	__PRIV_ASSERT(a, b)	((a)->pbits[privword(b)] |= privmask(b))
103 #define	__PRIV_CLEAR(a, b)	((a)->pbits[privword(b)] &= ~privmask(b))
104 #define	__PRIV_ISASSERT(a, b)	((a)->pbits[privword(b)] & privmask(b))
105 
106 #ifdef DEBUG
107 #define	PRIV_CLEAR(a, b)	priv_delset((a), (b))
108 #define	PRIV_ASSERT(a, b)	priv_addset((a), (b))
109 #define	PRIV_ISASSERT(a, b)	priv_ismember((a), (b))
110 #else
111 #define	PRIV_CLEAR(a, b)	__PRIV_CLEAR((a), (b))
112 #define	PRIV_ASSERT(a, b)	__PRIV_ASSERT((a), (b))
113 #define	PRIV_ISASSERT(a, b)	__PRIV_ISASSERT((a), (b))
114 #endif
115 
116 #endif /* _KERNEL */
117 
118 #ifdef	__cplusplus
119 }
120 #endif
121 
122 #endif	/* _SYS_PRIV_IMPL_H */
123