2 Unix SMB/Netbios implementation.
4 SMB NT Security Descriptor / Unix permission conversion.
5 Copyright (C) Jeremy Allison 1994-2000
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
24 /****************************************************************************
25 Data structures representing the internal ACE format.
26 ****************************************************************************/
28 enum ace_owner {UID_ACE, GID_ACE, WORLD_ACE};
29 enum ace_attribute {ALLOW_ACE, DENY_ACE}; /* Used for incoming NT ACLS. */
31 typedef union posix_id {
37 typedef struct canon_ace {
38 struct canon_ace *next, *prev;
40 mode_t perms; /* Only use S_I(R|W|X)USR mode bits here. */
42 enum ace_owner owner_type;
43 enum ace_attribute attr;
47 #define ALL_ACE_PERMS (S_IRUSR|S_IWUSR|S_IXUSR)
49 /****************************************************************************
50 Functions to manipulate the internal ACE format.
51 ****************************************************************************/
53 /****************************************************************************
54 Count a linked list of canonical ACE entries.
55 ****************************************************************************/
57 static size_t count_canon_ace_list( canon_ace *list_head )
62 for (ace = list_head; ace; ace = ace->next)
68 /****************************************************************************
69 Free a linked list of canonical ACE entries.
70 ****************************************************************************/
72 static void free_canon_ace_list( canon_ace *list_head )
75 canon_ace *old_head = list_head;
76 DLIST_REMOVE(list_head, list_head);
81 /****************************************************************************
82 Function to duplicate a canon_ace entry.
83 ****************************************************************************/
85 static canon_ace *dup_canon_ace( canon_ace *src_ace)
87 canon_ace *dst_ace = (canon_ace *)malloc(sizeof(canon_ace));
93 dst_ace->prev = dst_ace->next = NULL;
97 /****************************************************************************
98 Print out a canon ace.
99 ****************************************************************************/
101 static void print_canon_ace(canon_ace *pace, int num)
105 dbgtext( "canon_ace index %d. Type = %s ", num, pace->attr == ALLOW_ACE ? "allow" : "deny" );
106 dbgtext( "SID = %s ", sid_to_string( str, &pace->sid));
107 if (pace->owner_type == UID_ACE) {
108 struct passwd *pass = sys_getpwuid(pace->unix_ug.uid);
109 dbgtext( "uid %u (%s) ", (unsigned int)pace->unix_ug.uid, pass ? pass->pw_name : "UNKNOWN");
110 } else if (pace->owner_type == GID_ACE) {
111 struct group *grp = getgrgid(pace->unix_ug.gid);
112 dbgtext( "gid %u (%s) ", (unsigned int)pace->unix_ug.gid, grp ? grp->gr_name : "UNKNOWN");
115 switch (pace->type) {
117 dbgtext( "SMB_ACL_USER ");
119 case SMB_ACL_USER_OBJ:
120 dbgtext( "SMB_ACL_USER_OBJ ");
123 dbgtext( "SMB_ACL_GROUP ");
125 case SMB_ACL_GROUP_OBJ:
126 dbgtext( "SMB_ACL_GROUP_OBJ ");
129 dbgtext( "SMB_ACL_OTHER ");
133 dbgtext( "%c", pace->perms & S_IRUSR ? 'r' : '-');
134 dbgtext( "%c", pace->perms & S_IWUSR ? 'w' : '-');
135 dbgtext( "%c\n", pace->perms & S_IXUSR ? 'x' : '-');
138 /****************************************************************************
139 Print out a canon ace list.
140 ****************************************************************************/
142 static void print_canon_ace_list(const char *name, canon_ace *ace_list)
146 if( DEBUGLVL( 10 )) {
147 dbgtext( "print_canon_ace_list: %s\n", name );
148 for (;ace_list; ace_list = ace_list->next, count++)
149 print_canon_ace(ace_list, count );
153 /****************************************************************************
154 Map POSIX ACL perms to canon_ace permissions (a mode_t containing only S_(R|W|X)USR bits).
155 ****************************************************************************/
157 static mode_t convert_permset_to_mode_t(SMB_ACL_PERMSET_T permset)
161 ret |= (sys_acl_get_perm(permset, SMB_ACL_READ) ? S_IRUSR : 0);
162 ret |= (sys_acl_get_perm(permset, SMB_ACL_WRITE) ? S_IWUSR : 0);
163 ret |= (sys_acl_get_perm(permset, SMB_ACL_EXECUTE) ? S_IXUSR : 0);
168 /****************************************************************************
169 Map generic UNIX permissions to canon_ace permissions (a mode_t containing only S_(R|W|X)USR bits).
170 ****************************************************************************/
172 static mode_t unix_perms_to_acl_perms(mode_t mode, int r_mask, int w_mask, int x_mask)
186 /****************************************************************************
187 Map canon_ace permissions (a mode_t containing only S_(R|W|X)USR bits) to
188 an SMB_ACL_PERMSET_T.
189 ****************************************************************************/
191 static int map_acl_perms_to_permset(mode_t mode, SMB_ACL_PERMSET_T *p_permset)
193 if (sys_acl_clear_perms(*p_permset) == -1)
195 if (mode & S_IRUSR) {
196 if (sys_acl_add_perm(*p_permset, SMB_ACL_READ) == -1)
199 if (mode & S_IWUSR) {
200 if (sys_acl_add_perm(*p_permset, SMB_ACL_WRITE) == -1)
203 if (mode & S_IXUSR) {
204 if (sys_acl_add_perm(*p_permset, SMB_ACL_EXECUTE) == -1)
209 /****************************************************************************
210 Function to create owner and group SIDs from a SMB_STRUCT_STAT.
211 ****************************************************************************/
213 static void create_file_sids(SMB_STRUCT_STAT *psbuf, DOM_SID *powner_sid, DOM_SID *pgroup_sid)
215 uid_to_sid( powner_sid, psbuf->st_uid );
216 gid_to_sid( pgroup_sid, psbuf->st_gid );
219 /****************************************************************************
220 Merge aces with a common sid - if both are allow or deny, OR the permissions together and
221 delete the second one. If the first is deny, mask the permissions off and delete the allow
222 if the permissions become zero, delete the deny if the permissions are non zero.
223 ****************************************************************************/
225 static void merge_aces( canon_ace **pp_list_head )
227 canon_ace *list_head = *pp_list_head;
228 canon_ace *curr_ace_outer;
229 canon_ace *curr_ace_outer_next;
232 * First, merge allow entries with identical SIDs, and deny entries
233 * with identical SIDs.
236 for (curr_ace_outer = list_head; curr_ace_outer; curr_ace_outer = curr_ace_outer_next) {
238 canon_ace *curr_ace_next;
240 curr_ace_outer_next = curr_ace_outer->next; /* Save the link in case we delete. */
242 for (curr_ace = curr_ace_outer->next; curr_ace; curr_ace = curr_ace_next) {
244 curr_ace_next = curr_ace->next; /* Save the link in case of delete. */
246 if (sid_equal(&curr_ace->sid, &curr_ace_outer->sid) &&
247 (curr_ace->attr == curr_ace_outer->attr)) {
249 if( DEBUGLVL( 10 )) {
250 dbgtext("merge_aces: Merging ACE's\n");
251 print_canon_ace( curr_ace_outer, 0);
252 print_canon_ace( curr_ace, 0);
255 /* Merge two allow or two deny ACE's. */
257 curr_ace_outer->perms |= curr_ace->perms;
258 DLIST_REMOVE(list_head, curr_ace);
260 curr_ace_outer_next = curr_ace_outer->next; /* We may have deleted the link. */
266 * Now go through and mask off allow permissions with deny permissions.
267 * We can delete either the allow or deny here as we know that each SID
268 * appears only once in the list.
271 for (curr_ace_outer = list_head; curr_ace_outer; curr_ace_outer = curr_ace_outer_next) {
273 canon_ace *curr_ace_next;
275 curr_ace_outer_next = curr_ace_outer->next; /* Save the link in case we delete. */
277 for (curr_ace = curr_ace_outer->next; curr_ace; curr_ace = curr_ace_next) {
279 curr_ace_next = curr_ace->next; /* Save the link in case of delete. */
282 * Subtract ACE's with different entries. Due to the ordering constraints
283 * we've put on the ACL, we know the deny must be the first one.
286 if (sid_equal(&curr_ace->sid, &curr_ace_outer->sid) &&
287 (curr_ace_outer->attr == DENY_ACE) && (curr_ace->attr == ALLOW_ACE)) {
289 if( DEBUGLVL( 10 )) {
290 dbgtext("merge_aces: Masking ACE's\n");
291 print_canon_ace( curr_ace_outer, 0);
292 print_canon_ace( curr_ace, 0);
295 curr_ace->perms &= ~curr_ace_outer->perms;
297 if (curr_ace->perms == 0) {
300 * The deny overrides the allow. Remove the allow.
303 DLIST_REMOVE(list_head, curr_ace);
305 curr_ace_outer_next = curr_ace_outer->next; /* We may have deleted the link. */
310 * Even after removing permissions, there
311 * are still allow permissions - delete the deny.
312 * It is safe to delete the deny here,
313 * as we are guarenteed by the deny first
314 * ordering that all the deny entries for
315 * this SID have already been merged into one
316 * before we can get to an allow ace.
319 DLIST_REMOVE(list_head, curr_ace_outer);
320 free(curr_ace_outer);
324 } /* end for curr_ace */
325 } /* end for curr_ace_outer */
327 /* We may have modified the list. */
329 *pp_list_head = list_head;
332 /****************************************************************************
333 Map canon_ace perms to permission bits NT.
334 The attr element is not used here - we only process deny entries on set,
335 not get. Deny entries are implicit on get with ace->perms = 0.
336 ****************************************************************************/
338 static SEC_ACCESS map_canon_ace_perms(int *pacl_type, DOM_SID *powner_sid, canon_ace *ace)
343 *pacl_type = SEC_ACE_TYPE_ACCESS_ALLOWED;
345 if ((ace->perms & ALL_ACE_PERMS) == ALL_ACE_PERMS) {
346 nt_mask = UNIX_ACCESS_RWX;
347 } else if ((ace->perms & ALL_ACE_PERMS) == (mode_t)0) {
348 nt_mask = UNIX_ACCESS_NONE;
350 nt_mask |= ((ace->perms & S_IRUSR) ? UNIX_ACCESS_R : 0 );
351 nt_mask |= ((ace->perms & S_IWUSR) ? UNIX_ACCESS_W : 0 );
352 nt_mask |= ((ace->perms & S_IXUSR) ? UNIX_ACCESS_X : 0 );
355 DEBUG(10,("map_canon_ace_perms: Mapped (UNIX) %x to (NT) %x\n",
356 (unsigned int)ace->perms, (unsigned int)nt_mask ));
358 init_sec_access(&sa,nt_mask);
362 /****************************************************************************
363 Map NT perms to a UNIX mode_t.
364 ****************************************************************************/
366 #define FILE_SPECIFIC_READ_BITS (FILE_READ_DATA|FILE_READ_EA|FILE_READ_ATTRIBUTES)
367 #define FILE_SPECIFIC_WRITE_BITS (FILE_WRITE_DATA|FILE_APPEND_DATA|FILE_WRITE_EA|FILE_WRITE_ATTRIBUTES)
368 #define FILE_SPECIFIC_EXECUTE_BITS (FILE_EXECUTE)
370 static mode_t map_nt_perms( SEC_ACCESS sec_access, int type)
376 if(sec_access.mask & GENERIC_ALL_ACCESS)
377 mode = S_IRUSR|S_IWUSR|S_IXUSR;
379 mode |= (sec_access.mask & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IRUSR : 0;
380 mode |= (sec_access.mask & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWUSR : 0;
381 mode |= (sec_access.mask & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXUSR : 0;
385 if(sec_access.mask & GENERIC_ALL_ACCESS)
386 mode = S_IRGRP|S_IWGRP|S_IXGRP;
388 mode |= (sec_access.mask & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IRGRP : 0;
389 mode |= (sec_access.mask & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWGRP : 0;
390 mode |= (sec_access.mask & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXGRP : 0;
394 if(sec_access.mask & GENERIC_ALL_ACCESS)
395 mode = S_IROTH|S_IWOTH|S_IXOTH;
397 mode |= (sec_access.mask & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IROTH : 0;
398 mode |= (sec_access.mask & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWOTH : 0;
399 mode |= (sec_access.mask & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXOTH : 0;
407 /****************************************************************************
408 Unpack a SEC_DESC into a UNIX owner and group.
409 ****************************************************************************/
411 static BOOL unpack_nt_owners(SMB_STRUCT_STAT *psbuf, uid_t *puser, gid_t *pgrp, uint32 security_info_sent, SEC_DESC *psd)
415 enum SID_NAME_USE sid_type;
420 if(security_info_sent == 0) {
421 DEBUG(0,("unpack_nt_owners: no security info sent !\n"));
426 * Validate the owner and group SID's.
429 memset(&owner_sid, '\0', sizeof(owner_sid));
430 memset(&grp_sid, '\0', sizeof(grp_sid));
432 DEBUG(5,("unpack_nt_owners: validating owner_sids.\n"));
435 * Don't immediately fail if the owner sid cannot be validated.
436 * This may be a group chown only set.
439 if (security_info_sent & OWNER_SECURITY_INFORMATION) {
440 sid_copy(&owner_sid, psd->owner_sid);
441 if (!sid_to_uid( &owner_sid, puser, &sid_type))
442 DEBUG(3,("unpack_nt_owners: unable to validate owner sid.\n"));
446 * Don't immediately fail if the group sid cannot be validated.
447 * This may be an owner chown only set.
450 if (security_info_sent & GROUP_SECURITY_INFORMATION) {
451 sid_copy(&grp_sid, psd->grp_sid);
452 if (!sid_to_gid( &grp_sid, pgrp, &sid_type))
453 DEBUG(3,("unpack_nt_owners: unable to validate group sid.\n"));
456 DEBUG(5,("unpack_nt_owners: owner_sids validated.\n"));
461 /****************************************************************************
462 Ensure the enforced permissions for this share apply.
463 ****************************************************************************/
465 static mode_t apply_default_perms(files_struct *fsp, mode_t perms, mode_t type)
467 int snum = SNUM(fsp->conn);
468 mode_t and_bits = (mode_t)0;
469 mode_t or_bits = (mode_t)0;
471 if (!lp_restrict_acl_with_mask(snum))
474 /* Get the initial bits to apply. */
476 if (fsp->is_directory) {
477 and_bits = lp_dir_mask(snum);
478 or_bits = lp_force_dir_mode(snum);
480 and_bits = lp_create_mask(snum);
481 or_bits = lp_force_create_mode(snum);
484 /* Now bounce them into the S_USR space. */
487 and_bits = unix_perms_to_acl_perms(and_bits, S_IRUSR, S_IWUSR, S_IXUSR);
488 or_bits = unix_perms_to_acl_perms(or_bits, S_IRUSR, S_IWUSR, S_IXUSR);
491 and_bits = unix_perms_to_acl_perms(and_bits, S_IRGRP, S_IWGRP, S_IXGRP);
492 or_bits = unix_perms_to_acl_perms(or_bits, S_IRGRP, S_IWGRP, S_IXGRP);
495 and_bits = unix_perms_to_acl_perms(and_bits, S_IROTH, S_IWOTH, S_IXOTH);
496 or_bits = unix_perms_to_acl_perms(or_bits, S_IROTH, S_IWOTH, S_IXOTH);
500 return ((perms & and_bits)|or_bits);
503 /****************************************************************************
504 A well formed POSIX file or default ACL has at least 3 entries, a
505 SMB_ACL_USER_OBJ, SMB_ACL_GROUP_OBJ, SMB_ACL_OTHER_OBJ.
506 In addition, the owner must always have at least read access.
507 When using this call on get_acl, the pst struct is valid and contains
508 the mode of the file. When using this call on set_acl, the pst struct has
509 been modified to have a mode containing the default for this file or directory
511 ****************************************************************************/
513 static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
515 DOM_SID *pfile_owner_sid,
516 DOM_SID *pfile_grp_sid,
517 SMB_STRUCT_STAT *pst,
520 extern DOM_SID global_sid_World;
522 BOOL got_user = False;
523 BOOL got_grp = False;
524 BOOL got_other = False;
526 for (pace = *pp_ace; pace; pace = pace->next) {
527 if (pace->type == SMB_ACL_USER_OBJ) {
530 if (pace->perms == (mode_t)0) {
531 /* Ensure owner has read access. */
532 pace->perms = S_IRUSR;
533 if (fsp->is_directory)
534 pace->perms |= (S_IWUSR|S_IXUSR);
538 * Ensure create mask/force create mode is respected on set.
541 pace->perms = apply_default_perms(fsp, pace->perms, S_IRUSR);
545 } else if (pace->type == SMB_ACL_GROUP_OBJ) {
548 * Ensure create mask/force create mode is respected on set.
552 pace->perms = apply_default_perms(fsp, pace->perms, S_IRGRP);
554 } else if (pace->type == SMB_ACL_OTHER) {
557 * Ensure create mask/force create mode is respected on set.
561 pace->perms = apply_default_perms(fsp, pace->perms, S_IROTH);
567 if ((pace = (canon_ace *)malloc(sizeof(canon_ace))) == NULL) {
568 DEBUG(0,("ensure_canon_entry_valid: malloc fail.\n"));
573 pace->type = SMB_ACL_USER_OBJ;
574 pace->owner_type = UID_ACE;
575 pace->unix_ug.uid = pst->st_uid;
576 pace->sid = *pfile_owner_sid;
577 pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRUSR, S_IWUSR, S_IXUSR);
578 pace->attr = ALLOW_ACE;
580 DLIST_ADD(*pp_ace, pace);
584 if ((pace = (canon_ace *)malloc(sizeof(canon_ace))) == NULL) {
585 DEBUG(0,("ensure_canon_entry_valid: malloc fail.\n"));
590 pace->type = SMB_ACL_GROUP_OBJ;
591 pace->owner_type = GID_ACE;
592 pace->unix_ug.uid = pst->st_gid;
593 pace->sid = *pfile_grp_sid;
594 pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRGRP, S_IWGRP, S_IXGRP);
595 pace->attr = ALLOW_ACE;
597 DLIST_ADD(*pp_ace, pace);
601 if ((pace = (canon_ace *)malloc(sizeof(canon_ace))) == NULL) {
602 DEBUG(0,("ensure_canon_entry_valid: malloc fail.\n"));
607 pace->type = SMB_ACL_OTHER;
608 pace->owner_type = WORLD_ACE;
609 pace->unix_ug.world = -1;
610 pace->sid = global_sid_World;
611 pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IROTH, S_IWOTH, S_IXOTH);
612 pace->attr = ALLOW_ACE;
614 DLIST_ADD(*pp_ace, pace);
620 /****************************************************************************
621 Unpack a SEC_DESC into two canonical ace lists.
622 ****************************************************************************/
624 static BOOL create_canon_ace_lists(files_struct *fsp,
625 DOM_SID *pfile_owner_sid,
626 DOM_SID *pfile_grp_sid,
627 canon_ace **ppfile_ace, canon_ace **ppdir_ace,
630 extern DOM_SID global_sid_World;
631 extern struct generic_mapping file_generic_mapping;
632 BOOL all_aces_are_inherit_only = (fsp->is_directory ? True : False);
633 canon_ace *file_ace = NULL;
634 canon_ace *dir_ace = NULL;
635 canon_ace *tmp_ace = NULL;
636 canon_ace *current_ace = NULL;
637 BOOL got_dir_allow = False;
638 BOOL got_file_allow = False;
644 for(i = 0; i < dacl->num_aces; i++) {
645 enum SID_NAME_USE sid_type;
646 SEC_ACE *psa = &dacl->ace[i];
648 if((psa->type != SEC_ACE_TYPE_ACCESS_ALLOWED) && (psa->type != SEC_ACE_TYPE_ACCESS_DENIED)) {
649 free_canon_ace_list(file_ace);
650 free_canon_ace_list(dir_ace);
651 DEBUG(3,("create_canon_ace_lists: unable to set anything but an ALLOW or DENY ACE.\n"));
656 * The security mask may be UNIX_ACCESS_NONE which should map into
657 * no permissions (we overload the WRITE_OWNER bit for this) or it
658 * should be one of the ALL/EXECUTE/READ/WRITE bits. Arrange for this
659 * to be so. Any other bits override the UNIX_ACCESS_NONE bit.
663 * Convert GENERIC bits to specific bits.
666 se_map_generic(&psa->info.mask, &file_generic_mapping);
668 psa->info.mask &= (UNIX_ACCESS_NONE|FILE_ALL_ACCESS);
670 if(psa->info.mask != UNIX_ACCESS_NONE)
671 psa->info.mask &= ~UNIX_ACCESS_NONE;
674 * Create a cannon_ace entry representing this NT DACL ACE.
677 if ((current_ace = (canon_ace *)malloc(sizeof(canon_ace))) == NULL) {
678 free_canon_ace_list(file_ace);
679 free_canon_ace_list(dir_ace);
680 DEBUG(0,("create_canon_ace_lists: malloc fail.\n"));
684 ZERO_STRUCTP(current_ace);
686 sid_copy(¤t_ace->sid, &psa->sid);
689 * Try and work out if the SID is a user or group
690 * as we need to flag these differently for POSIX.
693 if( sid_equal(¤t_ace->sid, &global_sid_World)) {
694 current_ace->owner_type = WORLD_ACE;
695 current_ace->unix_ug.world = -1;
696 } else if (sid_to_uid( ¤t_ace->sid, ¤t_ace->unix_ug.uid, &sid_type)) {
697 current_ace->owner_type = UID_ACE;
698 } else if (sid_to_gid( ¤t_ace->sid, ¤t_ace->unix_ug.gid, &sid_type)) {
699 current_ace->owner_type = GID_ACE;
703 free_canon_ace_list(file_ace);
704 free_canon_ace_list(dir_ace);
706 DEBUG(0,("create_canon_ace_lists: unable to map SID %s to uid or gid.\n",
707 sid_to_string(str, ¤t_ace->sid) ));
712 * Map the given NT permissions into a UNIX mode_t containing only
713 * S_I(R|W|X)USR bits.
716 current_ace->perms |= map_nt_perms( psa->info, S_IRUSR);
717 current_ace->attr = (psa->type == SEC_ACE_TYPE_ACCESS_ALLOWED) ? ALLOW_ACE : DENY_ACE;
720 * Now note what kind of a POSIX ACL this should map to.
723 if(sid_equal(¤t_ace->sid, pfile_owner_sid)) {
725 current_ace->type = SMB_ACL_USER_OBJ;
727 } else if( sid_equal(¤t_ace->sid, pfile_grp_sid)) {
729 current_ace->type = SMB_ACL_GROUP_OBJ;
731 } else if( sid_equal(¤t_ace->sid, &global_sid_World)) {
733 current_ace->type = SMB_ACL_OTHER;
737 * Could be a SMB_ACL_USER or SMB_ACL_GROUP. Check by
738 * looking at owner_type.
741 current_ace->type = (current_ace->owner_type == UID_ACE) ? SMB_ACL_USER : SMB_ACL_GROUP;
745 * Now add the created ace to either the file list, the directory
746 * list, or both. We *MUST* preserve the order here (hence we use
747 * DLIST_ADD_END) as NT ACLs are order dependent.
750 if (fsp->is_directory) {
753 * We can only add to the default POSIX ACE list if the ACE is
754 * designed to be inherited by both files and directories.
757 if ((psa->flags & (SEC_ACE_FLAG_OBJECT_INHERIT|SEC_ACE_FLAG_CONTAINER_INHERIT)) ==
758 (SEC_ACE_FLAG_OBJECT_INHERIT|SEC_ACE_FLAG_CONTAINER_INHERIT)) {
760 DLIST_ADD_END(dir_ace, current_ace, tmp_ace);
763 * Note if this was an allow ace. We can't process
764 * any further deny ace's after this.
767 if (current_ace->attr == ALLOW_ACE)
768 got_dir_allow = True;
770 if ((current_ace->attr == DENY_ACE) && got_dir_allow) {
771 DEBUG(0,("create_canon_ace_lists: malformed ACL in inheritable ACL ! \
772 Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
773 free_canon_ace_list(file_ace);
774 free_canon_ace_list(dir_ace);
779 if( DEBUGLVL( 10 )) {
780 dbgtext("create_canon_ace_lists: adding dir ACL:\n");
781 print_canon_ace( current_ace, 0);
785 * If this is not an inherit only ACE we need to add a duplicate
789 if (!(psa->flags & SEC_ACE_FLAG_INHERIT_ONLY)) {
790 canon_ace *dup_ace = dup_canon_ace(current_ace);
793 DEBUG(0,("create_canon_ace_lists: malloc fail !\n"));
794 free_canon_ace_list(file_ace);
795 free_canon_ace_list(dir_ace);
799 current_ace = dup_ace;
807 * Only add to the file ACL if not inherit only.
810 if (!(psa->flags & SEC_ACE_FLAG_INHERIT_ONLY)) {
811 DLIST_ADD_END(file_ace, current_ace, tmp_ace);
814 * Note if this was an allow ace. We can't process
815 * any further deny ace's after this.
818 if (current_ace->attr == ALLOW_ACE)
819 got_file_allow = True;
821 if ((current_ace->attr == DENY_ACE) && got_file_allow) {
822 DEBUG(0,("create_canon_ace_lists: malformed ACL in file ACL ! \
823 Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
824 free_canon_ace_list(file_ace);
825 free_canon_ace_list(dir_ace);
830 if( DEBUGLVL( 10 )) {
831 dbgtext("create_canon_ace_lists: adding file ACL:\n");
832 print_canon_ace( current_ace, 0);
834 all_aces_are_inherit_only = False;
839 * Free if ACE was not added.
846 if (fsp->is_directory && all_aces_are_inherit_only) {
848 * Windows 2000 is doing one of these weird 'inherit acl'
849 * traverses to conserve NTFS ACL resources. Just pretend
850 * there was no DACL sent. JRA.
853 DEBUG(10,("create_canon_ace_lists: Win2k inherit acl traverse. Ignoring DACL.\n"));
854 free_canon_ace_list(file_ace);
855 free_canon_ace_list(dir_ace);
860 *ppfile_ace = file_ace;
861 *ppdir_ace = dir_ace;
866 /****************************************************************************
867 Check if a given uid/SID is in a group gid/SID. This is probably very
868 expensive and will need optimisation. A *lot* of optimisation :-). JRA.
869 ****************************************************************************/
871 static BOOL uid_entry_in_group( canon_ace *uid_ace, canon_ace *group_ace )
873 extern DOM_SID global_sid_World;
874 struct passwd *pass = NULL;
875 struct group *gptr = NULL;
877 /* "Everyone" always matches every uid. */
879 if (sid_equal(&group_ace->sid, &global_sid_World))
882 if (!(pass = sys_getpwuid(uid_ace->unix_ug.uid)))
885 if (!(gptr = getgrgid(group_ace->unix_ug.gid)))
889 * Due to the winbind interfaces we need to do this via names,
893 return user_in_group_list(pass->pw_name, gptr->gr_name );
896 /****************************************************************************
897 ASCII art time again... JRA :-).
899 We have 3 cases to process when moving from an NT ACL to a POSIX ACL. Firstly,
900 we insist the ACL is in canonical form (ie. all DENY entries preceede ALLOW
901 entries). Secondly, the merge code has ensured that all duplicate SID entries for
902 allow or deny have been merged, so the same SID can only appear once in the deny
903 list or once in the allow list.
905 We then process as follows :
907 ---------------------------------------------------------------------------
908 First pass - look for a Everyone DENY entry.
910 If it is deny all (rwx) trunate the list at this point.
911 Else, walk the list from this point and use the deny permissions of this
912 entry as a mask on all following allow entries. Finally, delete
913 the Everyone DENY entry (we have applied it to everything possible).
915 In addition, in this pass we remove any DENY entries that have
916 no permissions (ie. they are a DENY nothing).
917 ---------------------------------------------------------------------------
918 Second pass - only deal with deny user entries.
920 DENY user1 (perms XXX)
923 for all following allow group entries where user1 is in group
924 new_perms |= group_perms;
926 user1 entry perms = new_perms & ~ XXX;
928 Convert the deny entry to an allow entry with the new perms and
929 push to the end of the list. Note if the user was in no groups
930 this maps to a specific allow nothing entry for this user.
932 The common case from the NT ACL choser (userX deny all) is
933 optimised so we don't do the group lookup - we just map to
934 an allow nothing entry.
936 What we're doing here is inferring the allow permissions the
937 person setting the ACE on user1 wanted by looking at the allow
938 permissions on the groups the user is currently in. This will
939 be a snapshot, depending on group membership but is the best
940 we can do and has the advantage of failing closed rather than
942 ---------------------------------------------------------------------------
943 Third pass - only deal with deny group entries.
945 DENY group1 (perms XXX)
947 for all following allow user entries where user is in group1
948 user entry perms = user entry perms & ~ XXX;
950 If there is a group Everyone allow entry with permissions YYY,
951 convert the group1 entry to an allow entry and modify its
954 new_perms = YYY & ~ XXX
956 and push to the end of the list.
958 If there is no group Everyone allow entry then convert the
959 group1 entry to a allow nothing entry and push to the end of the list.
961 Note that the common case from the NT ACL choser (groupX deny all)
962 cannot be optimised here as we need to modify user entries who are
963 in the group to change them to a deny all also.
965 What we're doing here is modifying the allow permissions of
966 user entries (which are more specific in POSIX ACLs) to mask
967 out the explicit deny set on the group they are in. This will
968 be a snapshot depending on current group membership but is the
969 best we can do and has the advantage of failing closed rather
971 ---------------------------------------------------------------------------
973 Note we *MUST* do the deny user pass first as this will convert deny user
974 entries into allow user entries which can then be processed by the deny
977 The above algorithm took a *lot* of thinking about - hence this
978 explaination :-). JRA.
979 ****************************************************************************/
981 /****************************************************************************
982 Process a canon_ace list entries. This is very complex code. We need
983 to go through and remove the "deny" permissions from any allow entry that matches
984 the id of this entry. We have already refused any NT ACL that wasn't in correct
985 order (DENY followed by ALLOW). If any allow entry ends up with zero permissions,
986 we just remove it (to fail safe). We have already removed any duplicate ace
987 entries. Treat an "Everyone" DENY_ACE as a special case - use it to mask all
989 ****************************************************************************/
991 static void process_deny_list( canon_ace **pp_ace_list )
993 extern DOM_SID global_sid_World;
994 canon_ace *ace_list = *pp_ace_list;
995 canon_ace *curr_ace = NULL;
996 canon_ace *curr_ace_next = NULL;
998 /* Pass 1 above - look for an Everyone, deny entry. */
1000 for (curr_ace = ace_list; curr_ace; curr_ace = curr_ace_next) {
1001 canon_ace *allow_ace_p;
1003 curr_ace_next = curr_ace->next; /* So we can't lose the link. */
1005 if (curr_ace->attr != DENY_ACE)
1008 if (curr_ace->perms == (mode_t)0) {
1010 /* Deny nothing entry - delete. */
1012 DLIST_REMOVE(ace_list, curr_ace);
1016 if (!sid_equal(&curr_ace->sid, &global_sid_World))
1019 /* JRATEST - assert. */
1020 SMB_ASSERT(curr_ace->owner_type == WORLD_ACE);
1022 if (curr_ace->perms == ALL_ACE_PERMS) {
1025 * Optimisation. This is a DENY_ALL to Everyone. Truncate the
1026 * list at this point including this entry.
1029 canon_ace *prev_entry = curr_ace->prev;
1031 free_canon_ace_list( curr_ace );
1033 prev_entry->next = NULL;
1035 /* We deleted the entire list. */
1041 for (allow_ace_p = curr_ace->next; allow_ace_p; allow_ace_p = allow_ace_p->next) {
1044 * Only mask off allow entries.
1047 if (allow_ace_p->attr != ALLOW_ACE)
1050 allow_ace_p->perms &= ~curr_ace->perms;
1054 * Now it's been applied, remove it.
1057 DLIST_REMOVE(ace_list, curr_ace);
1060 /* Pass 2 above - deal with deny user entries. */
1062 for (curr_ace = ace_list; curr_ace; curr_ace = curr_ace_next) {
1063 mode_t new_perms = (mode_t)0;
1064 canon_ace *allow_ace_p;
1067 curr_ace_next = curr_ace->next; /* So we can't lose the link. */
1069 if (curr_ace->attr != DENY_ACE)
1072 if (curr_ace->owner_type != UID_ACE)
1075 if (curr_ace->perms == ALL_ACE_PERMS) {
1078 * Optimisation - this is a deny everything to this user.
1079 * Convert to an allow nothing and push to the end of the list.
1082 curr_ace->attr = ALLOW_ACE;
1083 curr_ace->perms = (mode_t)0;
1084 DLIST_DEMOTE(ace_list, curr_ace, tmp_ace);
1088 for (allow_ace_p = curr_ace->next; allow_ace_p; allow_ace_p = allow_ace_p->next) {
1090 if (allow_ace_p->attr != ALLOW_ACE)
1093 /* We process GID_ACE and WORLD_ACE entries only. */
1095 if (allow_ace_p->owner_type == UID_ACE)
1098 if (uid_entry_in_group( curr_ace, allow_ace_p))
1099 new_perms |= allow_ace_p->perms;
1103 * Convert to a allow entry, modify the perms and push to the end
1107 curr_ace->attr = ALLOW_ACE;
1108 curr_ace->perms = (new_perms & ~curr_ace->perms);
1109 DLIST_DEMOTE(ace_list, curr_ace, tmp_ace);
1112 /* Pass 3 above - deal with deny group entries. */
1114 for (curr_ace = ace_list; curr_ace; curr_ace = curr_ace_next) {
1116 canon_ace *allow_ace_p;
1117 canon_ace *allow_everyone_p = NULL;
1119 curr_ace_next = curr_ace->next; /* So we can't lose the link. */
1121 if (curr_ace->attr != DENY_ACE)
1124 if (curr_ace->owner_type != GID_ACE)
1127 for (allow_ace_p = curr_ace->next; allow_ace_p; allow_ace_p = allow_ace_p->next) {
1129 if (allow_ace_p->attr != ALLOW_ACE)
1132 /* Store a pointer to the Everyone allow, if it exists. */
1133 if (allow_ace_p->owner_type == WORLD_ACE)
1134 allow_everyone_p = allow_ace_p;
1136 /* We process UID_ACE entries only. */
1138 if (allow_ace_p->owner_type != UID_ACE)
1141 /* Mask off the deny group perms. */
1143 if (uid_entry_in_group( allow_ace_p, curr_ace))
1144 allow_ace_p->perms &= ~curr_ace->perms;
1148 * Convert the deny to an allow with the correct perms and
1149 * push to the end of the list.
1152 curr_ace->attr = ALLOW_ACE;
1153 if (allow_everyone_p)
1154 curr_ace->perms = allow_everyone_p->perms & ~curr_ace->perms;
1156 curr_ace->perms = (mode_t)0;
1157 DLIST_DEMOTE(ace_list, curr_ace, tmp_ace);
1161 *pp_ace_list = ace_list;
1164 /****************************************************************************
1165 Create a default mode that will be used if a security descriptor entry has
1166 no user/group/world entries.
1167 ****************************************************************************/
1169 static mode_t create_default_mode(files_struct *fsp, BOOL interitable_mode)
1171 int snum = SNUM(fsp->conn);
1172 mode_t and_bits = (mode_t)0;
1173 mode_t or_bits = (mode_t)0;
1174 mode_t mode = interitable_mode ? unix_mode( fsp->conn, FILE_ATTRIBUTE_ARCHIVE, fsp->fsp_name) : S_IRUSR;
1176 if (fsp->is_directory)
1177 mode |= (S_IWUSR|S_IXUSR);
1179 if (!lp_restrict_acl_with_mask(snum))
1183 * Now AND with the create mode/directory mode bits then OR with the
1184 * force create mode/force directory mode bits.
1187 if (fsp->is_directory) {
1188 and_bits = lp_dir_mask(snum);
1189 or_bits = lp_force_dir_mode(snum);
1191 and_bits = lp_create_mask(snum);
1192 or_bits = lp_force_create_mode(snum);
1195 return ((mode & and_bits)|or_bits);
1198 /****************************************************************************
1199 Unpack a SEC_DESC into two canonical ace lists. We don't depend on this
1201 ****************************************************************************/
1203 static BOOL unpack_canon_ace(files_struct *fsp,
1204 SMB_STRUCT_STAT *pst,
1205 DOM_SID *pfile_owner_sid,
1206 DOM_SID *pfile_grp_sid,
1207 canon_ace **ppfile_ace, canon_ace **ppdir_ace,
1208 uint32 security_info_sent, SEC_DESC *psd)
1210 canon_ace *file_ace = NULL;
1211 canon_ace *dir_ace = NULL;
1216 if(security_info_sent == 0) {
1217 DEBUG(0,("unpack_canon_ace: no security info sent !\n"));
1222 * If no DACL then this is a chown only security descriptor.
1225 if(!(security_info_sent & DACL_SECURITY_INFORMATION) || !psd->dacl)
1229 * Now go through the DACL and create the canon_ace lists.
1232 if (!create_canon_ace_lists( fsp, pfile_owner_sid, pfile_grp_sid,
1233 &file_ace, &dir_ace, psd->dacl))
1236 if ((file_ace == NULL) && (dir_ace == NULL)) {
1237 /* W2K traverse DACL set - ignore. */
1242 * Go through the canon_ace list and merge entries
1243 * belonging to identical users of identical allow or deny type.
1244 * We can do this as all deny entries come first, followed by
1245 * all allow entries (we have mandated this before accepting this acl).
1248 print_canon_ace_list( "file ace - before merge", file_ace);
1249 merge_aces( &file_ace );
1251 print_canon_ace_list( "dir ace - before merge", dir_ace);
1252 merge_aces( &dir_ace );
1255 * NT ACLs are order dependent. Go through the acl lists and
1256 * process DENY entries by masking the allow entries.
1259 print_canon_ace_list( "file ace - before deny", file_ace);
1260 process_deny_list( &file_ace);
1262 print_canon_ace_list( "dir ace - before deny", dir_ace);
1263 process_deny_list( &dir_ace);
1266 * A well formed POSIX file or default ACL has at least 3 entries, a
1267 * SMB_ACL_USER_OBJ, SMB_ACL_GROUP_OBJ, SMB_ACL_OTHER_OBJ
1268 * and optionally a mask entry. Ensure this is the case.
1271 print_canon_ace_list( "file ace - before valid", file_ace);
1274 * A default 3 element mode entry for a file should be r-- --- ---.
1275 * A default 3 element mode entry for a directory should be rwx --- ---.
1278 pst->st_mode = create_default_mode(fsp, False);
1280 if (!ensure_canon_entry_valid(&file_ace, fsp, pfile_owner_sid, pfile_grp_sid, pst, True)) {
1281 free_canon_ace_list(file_ace);
1282 free_canon_ace_list(dir_ace);
1286 print_canon_ace_list( "dir ace - before valid", dir_ace);
1289 * A default inheritable 3 element mode entry for a directory should be the
1290 * mode Samba will use to create a file within. Ensure user rwx bits are set if
1294 pst->st_mode = create_default_mode(fsp, True);
1296 if (!ensure_canon_entry_valid(&dir_ace, fsp, pfile_owner_sid, pfile_grp_sid, pst, True)) {
1297 free_canon_ace_list(file_ace);
1298 free_canon_ace_list(dir_ace);
1302 print_canon_ace_list( "file ace - return", file_ace);
1303 print_canon_ace_list( "dir ace - return", dir_ace);
1305 *ppfile_ace = file_ace;
1306 *ppdir_ace = dir_ace;
1311 /******************************************************************************
1312 When returning permissions, try and fit NT display
1313 semantics if possible. Note the the canon_entries here must have been malloced.
1314 The list format should be - first entry = owner, followed by group and other user
1315 entries, last entry = other.
1317 Note that this doesn't exactly match the NT semantics for an ACL. As POSIX entries
1318 are not ordered, and match on the most specific entry rather than walking a list,
1319 then a simple POSIX permission of rw-r--r-- should really map to 6 entries,
1321 Entry 0: owner : deny all except read and write.
1322 Entry 1: group : deny all except read.
1323 Entry 2: Everyone : deny all except read.
1324 Entry 3: owner : allow read and write.
1325 Entry 4: group : allow read.
1326 Entry 5: Everyone : allow read.
1328 But NT cannot display this in their ACL editor !
1329 ********************************************************************************/
1331 static void arrange_posix_perms( char *filename, canon_ace **pp_list_head)
1333 canon_ace *list_head = *pp_list_head;
1334 canon_ace *owner_ace = NULL;
1335 canon_ace *other_ace = NULL;
1336 canon_ace *ace = NULL;
1338 for (ace = list_head; ace; ace = ace->next) {
1339 if (ace->type == SMB_ACL_USER_OBJ)
1341 else if (ace->type == SMB_ACL_OTHER) {
1342 /* Last ace - this is "other" */
1347 if (!owner_ace || !other_ace) {
1348 DEBUG(0,("arrange_posix_perms: Invalid POSIX permissions for file %s, missing owner or other.\n",
1354 * The POSIX algorithm applies to owner first, and other last,
1355 * so ensure they are arranged in this order.
1359 DLIST_PROMOTE(list_head, owner_ace);
1363 DLIST_DEMOTE(list_head, other_ace, ace);
1366 /* We have probably changed the head of the list. */
1368 *pp_list_head = list_head;
1371 /****************************************************************************
1372 Create a linked list of canonical ACE entries.
1373 ****************************************************************************/
1375 static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_STRUCT_STAT *psbuf,
1376 DOM_SID *powner, DOM_SID *pgroup)
1378 extern DOM_SID global_sid_World;
1379 mode_t acl_mask = (S_IRUSR|S_IWUSR|S_IXUSR);
1380 canon_ace *list_head = NULL;
1381 canon_ace *ace = NULL;
1382 canon_ace *next_ace = NULL;
1383 int entry_id = SMB_ACL_FIRST_ENTRY;
1384 SMB_ACL_ENTRY_T entry;
1387 while ( posix_acl && (sys_acl_get_entry(posix_acl, entry_id, &entry) == 1)) {
1388 SMB_ACL_TAG_T tagtype;
1389 SMB_ACL_PERMSET_T permset;
1392 enum ace_owner owner_type;
1395 if (entry_id == SMB_ACL_FIRST_ENTRY)
1396 entry_id = SMB_ACL_NEXT_ENTRY;
1398 /* Is this a MASK entry ? */
1399 if (sys_acl_get_tag_type(entry, &tagtype) == -1)
1402 if (sys_acl_get_permset(entry, &permset) == -1)
1405 /* Decide which SID to use based on the ACL type. */
1407 case SMB_ACL_USER_OBJ:
1408 /* Get the SID from the owner. */
1409 uid_to_sid( &sid, psbuf->st_uid );
1410 unix_ug.uid = psbuf->st_uid;
1411 owner_type = UID_ACE;
1415 uid_t *puid = (uid_t *)sys_acl_get_qualifier(entry);
1417 DEBUG(0,("canonicalise_acl: Failed to get uid.\n"));
1420 uid_to_sid( &sid, *puid);
1421 unix_ug.uid = *puid;
1422 owner_type = UID_ACE;
1423 sys_acl_free_qualifier((void *)puid);
1426 case SMB_ACL_GROUP_OBJ:
1427 /* Get the SID from the owning group. */
1428 gid_to_sid( &sid, psbuf->st_gid );
1429 unix_ug.gid = psbuf->st_gid;
1430 owner_type = GID_ACE;
1434 gid_t *pgid = (gid_t *)sys_acl_get_qualifier(entry);
1436 DEBUG(0,("canonicalise_acl: Failed to get gid.\n"));
1439 gid_to_sid( &sid, *pgid);
1440 unix_ug.gid = *pgid;
1441 owner_type = GID_ACE;
1442 sys_acl_free_qualifier((void *)pgid);
1446 acl_mask = convert_permset_to_mode_t(permset);
1447 continue; /* Don't count the mask as an entry. */
1449 /* Use the Everyone SID */
1450 sid = global_sid_World;
1452 owner_type = WORLD_ACE;
1455 DEBUG(0,("canonicalise_acl: Unknown tagtype %u\n", (unsigned int)tagtype));
1460 * Add this entry to the list.
1463 if ((ace = (canon_ace *)malloc(sizeof(canon_ace))) == NULL)
1467 ace->type = tagtype;
1468 ace->perms = convert_permset_to_mode_t(permset);
1469 ace->attr = ALLOW_ACE;
1471 ace->unix_ug = unix_ug;
1472 ace->owner_type = owner_type;
1474 DLIST_ADD(list_head, ace);
1478 * This next call will ensure we have at least a user/group/world set.
1481 if (!ensure_canon_entry_valid(&list_head, fsp, powner, pgroup, psbuf, False))
1484 arrange_posix_perms(fsp->fsp_name,&list_head );
1487 * Now go through the list, masking the permissions with the
1488 * acl_mask. Ensure all DENY Entries are at the start of the list.
1491 DEBUG(10,("canonicalise_acl: ace entries before arrange :\n"));
1493 for ( ace_count = 0, ace = list_head; ace; ace = next_ace, ace_count++) {
1494 next_ace = ace->next;
1496 /* Masks are only applied to entries other than USER_OBJ and OTHER. */
1497 if (ace->type != SMB_ACL_OTHER && ace->type != SMB_ACL_USER_OBJ)
1498 ace->perms &= acl_mask;
1500 if (ace->perms == 0) {
1501 DLIST_PROMOTE(list_head, ace);
1504 if( DEBUGLVL( 10 ) ) {
1505 print_canon_ace(ace, ace_count);
1509 print_canon_ace_list( "canonicalise_acl: ace entries after arrange", list_head );
1515 free_canon_ace_list(list_head);
1519 /****************************************************************************
1520 Attempt to apply an ACL to a file or directory.
1521 ****************************************************************************/
1523 static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL default_ace, BOOL *pacl_set_support)
1526 SMB_ACL_T the_acl = sys_acl_init((int)count_canon_ace_list(the_ace) + 1);
1529 SMB_ACL_ENTRY_T mask_entry;
1530 SMB_ACL_PERMSET_T mask_permset;
1531 SMB_ACL_TYPE_T the_acl_type = (default_ace ? SMB_ACL_TYPE_DEFAULT : SMB_ACL_TYPE_ACCESS);
1533 if (the_acl == NULL) {
1535 if (errno != ENOSYS) {
1537 * Only print this error message if we have some kind of ACL
1538 * support that's not working. Otherwise we would always get this.
1540 DEBUG(0,("set_canon_ace_list: Unable to init %s ACL. (%s)\n",
1541 default_ace ? "default" : "file", strerror(errno) ));
1543 *pacl_set_support = False;
1547 for (i = 0, p_ace = the_ace; p_ace; p_ace = p_ace->next, i++ ) {
1548 SMB_ACL_ENTRY_T the_entry;
1549 SMB_ACL_PERMSET_T the_permset;
1552 * Get the entry for this ACE.
1555 if (sys_acl_create_entry( &the_acl, &the_entry) == -1) {
1556 DEBUG(0,("set_canon_ace_list: Failed to create entry %d. (%s)\n",
1557 i, strerror(errno) ));
1562 * Ok - we now know the ACL calls should be working, don't
1563 * allow fallback to chmod.
1566 *pacl_set_support = True;
1569 * Initialise the entry from the canon_ace.
1573 * First tell the entry what type of ACE this is.
1576 if (sys_acl_set_tag_type(the_entry, p_ace->type) == -1) {
1577 DEBUG(0,("set_canon_ace_list: Failed to set tag type on entry %d. (%s)\n",
1578 i, strerror(errno) ));
1583 * Only set the qualifier (user or group id) if the entry is a user
1587 if ((p_ace->type == SMB_ACL_USER) || (p_ace->type == SMB_ACL_GROUP)) {
1588 if (sys_acl_set_qualifier(the_entry,(void *)&p_ace->unix_ug.uid) == -1) {
1589 DEBUG(0,("set_canon_ace_list: Failed to set qualifier on entry %d. (%s)\n",
1590 i, strerror(errno) ));
1596 * Convert the mode_t perms in the canon_ace to a POSIX permset.
1599 if (sys_acl_get_permset(the_entry, &the_permset) == -1) {
1600 DEBUG(0,("set_canon_ace_list: Failed to get permset on entry %d. (%s)\n",
1601 i, strerror(errno) ));
1605 if (map_acl_perms_to_permset(p_ace->perms, &the_permset) == -1) {
1606 DEBUG(0,("set_canon_ace_list: Failed to create permset for mode (%u) on entry %d. (%s)\n",
1607 (unsigned int)p_ace->perms, i, strerror(errno) ));
1612 * ..and apply them to the entry.
1615 if (sys_acl_set_permset(the_entry, the_permset) == -1) {
1616 DEBUG(0,("set_canon_ace_list: Failed to add permset on entry %d. (%s)\n",
1617 i, strerror(errno) ));
1622 print_canon_ace( p_ace, i);
1626 * Add in a mask of rwx.
1629 if (sys_acl_create_entry( &the_acl, &mask_entry) == -1) {
1630 DEBUG(0,("set_canon_ace_list: Failed to create mask entry. (%s)\n", strerror(errno) ));
1634 if (sys_acl_set_tag_type(mask_entry, SMB_ACL_MASK) == -1) {
1635 DEBUG(0,("set_canon_ace_list: Failed to set tag type on mask entry. (%s)\n",strerror(errno) ));
1639 if (sys_acl_get_permset(mask_entry, &mask_permset) == -1) {
1640 DEBUG(0,("set_canon_ace_list: Failed to get mask permset. (%s)\n", strerror(errno) ));
1644 if (map_acl_perms_to_permset(S_IRUSR|S_IWUSR|S_IXUSR, &mask_permset) == -1) {
1645 DEBUG(0,("set_canon_ace_list: Failed to create mask permset. (%s)\n", strerror(errno) ));
1649 if (sys_acl_set_permset(mask_entry, mask_permset) == -1) {
1650 DEBUG(0,("set_canon_ace_list: Failed to add mask permset. (%s)\n", strerror(errno) ));
1655 * Check if the ACL is valid.
1658 if (sys_acl_valid(the_acl) == -1) {
1659 DEBUG(0,("set_canon_ace_list: ACL type (%s) is invalid for set (%s).\n",
1660 the_acl_type == SMB_ACL_TYPE_DEFAULT ? "directory default" : "file",
1666 * Finally apply it to the file or directory.
1669 if(default_ace || fsp->is_directory || fsp->fd == -1) {
1670 if (sys_acl_set_file(dos_to_unix(fsp->fsp_name,False), the_acl_type, the_acl) == -1) {
1671 DEBUG(0,("set_canon_ace_list: sys_acl_set_file type %s failed for file %s (%s).\n",
1672 the_acl_type == SMB_ACL_TYPE_DEFAULT ? "directory default" : "file",
1673 fsp->fsp_name, strerror(errno) ));
1677 if (sys_acl_set_fd(fsp->fd, the_acl) == -1) {
1678 DEBUG(0,("set_canon_ace_list: sys_acl_set_file failed for file %s (%s).\n",
1679 fsp->fsp_name, strerror(errno) ));
1688 if (the_acl != NULL)
1689 sys_acl_free_acl(the_acl);
1694 /****************************************************************************
1695 Convert a canon_ace to a generic 3 element permission - if possible.
1696 ****************************************************************************/
1698 #define MAP_PERM(p,mask,result) (((p) & (mask)) ? (result) : 0 )
1700 static BOOL convert_canon_ace_to_posix_perms( files_struct *fsp, canon_ace *file_ace_list, mode_t *posix_perms)
1702 size_t ace_count = count_canon_ace_list(file_ace_list);
1704 canon_ace *owner_ace = NULL;
1705 canon_ace *group_ace = NULL;
1706 canon_ace *other_ace = NULL;
1708 if (ace_count != 3) {
1709 DEBUG(3,("convert_canon_ace_to_posix_perms: Too many ACE entries for file %s to convert to \
1710 posix perms.\n", fsp->fsp_name ));
1714 for (ace_p = file_ace_list; ace_p; ace_p = ace_p->next) {
1715 if (ace_p->owner_type == UID_ACE)
1717 else if (ace_p->owner_type == GID_ACE)
1719 else if (ace_p->owner_type == WORLD_ACE)
1723 if (!owner_ace || !group_ace || !other_ace) {
1724 DEBUG(3,("convert_canon_ace_to_posix_perms: Can't get standard entries for file %s.\n",
1729 *posix_perms = (mode_t)0;
1731 *posix_perms |= owner_ace->perms;
1732 *posix_perms |= MAP_PERM(group_ace->perms, S_IRUSR, S_IRGRP);
1733 *posix_perms |= MAP_PERM(group_ace->perms, S_IWUSR, S_IWGRP);
1734 *posix_perms |= MAP_PERM(group_ace->perms, S_IXUSR, S_IXGRP);
1735 *posix_perms |= MAP_PERM(other_ace->perms, S_IRUSR, S_IROTH);
1736 *posix_perms |= MAP_PERM(other_ace->perms, S_IWUSR, S_IWOTH);
1737 *posix_perms |= MAP_PERM(other_ace->perms, S_IXUSR, S_IXOTH);
1739 /* The owner must have at least read access. */
1741 if (*posix_perms == (mode_t)0)
1742 *posix_perms = S_IRUSR;
1744 DEBUG(10,("convert_canon_ace_to_posix_perms: converted u=%o,g=%o,w=%o to perm=0%o for file %s.\n",
1745 (int)owner_ace->perms, (int)group_ace->perms, (int)other_ace->perms, (int)*posix_perms,
1751 static int nt_ace_comp( SEC_ACE *a1, SEC_ACE *a2)
1753 if (a1->type == a2->type)
1756 if (a1->type == SEC_ACE_TYPE_ACCESS_DENIED && a2->type == SEC_ACE_TYPE_ACCESS_ALLOWED)
1761 /****************************************************************************
1762 Reply to query a security descriptor from an fsp. If it succeeds it allocates
1763 the space for the return elements and returns the size needed to return the
1764 security descriptor. This should be the only external function needed for
1765 the UNIX style get ACL.
1766 ****************************************************************************/
1768 size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
1770 SMB_STRUCT_STAT sbuf;
1771 SEC_ACE *nt_ace_list = NULL;
1775 SEC_ACL *psa = NULL;
1776 size_t num_acls = 0;
1777 size_t num_dir_acls = 0;
1778 size_t num_aces = 0;
1779 SMB_ACL_T posix_acl = NULL;
1780 SMB_ACL_T dir_acl = NULL;
1781 canon_ace *file_ace = NULL;
1782 canon_ace *dir_ace = NULL;
1786 DEBUG(10,("get_nt_acl: called for file %s\n", fsp->fsp_name ));
1788 if(fsp->is_directory || fsp->fd == -1) {
1790 /* Get the stat struct for the owner info. */
1791 if(vfs_stat(fsp->conn,fsp->fsp_name, &sbuf) != 0) {
1795 * Get the ACL from the path.
1798 posix_acl = sys_acl_get_file( dos_to_unix(fsp->fsp_name, False), SMB_ACL_TYPE_ACCESS);
1801 * If it's a directory get the default POSIX ACL.
1804 if(fsp->is_directory)
1805 dir_acl = sys_acl_get_file( dos_to_unix(fsp->fsp_name, False), SMB_ACL_TYPE_DEFAULT);
1809 /* Get the stat struct for the owner info. */
1810 if(vfs_fstat(fsp,fsp->fd,&sbuf) != 0) {
1814 * Get the ACL from the fd.
1816 posix_acl = sys_acl_get_fd(fsp->fd);
1819 DEBUG(5,("get_nt_acl : file ACL %s, directory ACL %s\n",
1820 posix_acl ? "present" : "absent",
1821 dir_acl ? "present" : "absent" ));
1824 * Get the owner, group and world SIDs.
1827 create_file_sids(&sbuf, &owner_sid, &group_sid);
1829 /* Create the canon_ace lists. */
1830 file_ace = canonicalise_acl( fsp, posix_acl, &sbuf, &owner_sid, &group_sid);
1831 num_acls = count_canon_ace_list(file_ace);
1833 /* We must have *some* ACLS. */
1835 if (num_acls == 0) {
1836 DEBUG(0,("get_nt_acl : No ACLs on file (%s) !\n", fsp->fsp_name ));
1840 if (fsp->is_directory) {
1842 * If we have to fake a default ACL then this is the mode to use.
1844 sbuf.st_mode = unix_mode( fsp->conn, FILE_ATTRIBUTE_ARCHIVE, fsp->fsp_name);
1846 dir_ace = canonicalise_acl(fsp, dir_acl, &sbuf, &owner_sid, &group_sid);
1847 num_dir_acls = count_canon_ace_list(dir_ace);
1850 /* Allocate the ace list. */
1851 if ((nt_ace_list = (SEC_ACE *)malloc((num_acls + num_dir_acls)* sizeof(SEC_ACE))) == NULL) {
1852 DEBUG(0,("get_nt_acl: Unable to malloc space for nt_ace_list.\n"));
1856 memset(nt_ace_list, '\0', (num_acls + num_dir_acls) * sizeof(SEC_ACE) );
1859 * Create the NT ACE list from the canonical ace lists.
1869 for (i = 0; i < num_acls; i++, ace = ace->next) {
1870 SEC_ACCESS acc = map_canon_ace_perms(&nt_acl_type, &owner_sid, ace );
1871 init_sec_ace(&nt_ace_list[num_aces++], &ace->sid, nt_acl_type, acc, 0);
1876 for (i = 0; i < num_dir_acls; i++, ace = ace->next) {
1877 SEC_ACCESS acc = map_canon_ace_perms(&nt_acl_type, &owner_sid, ace );
1878 init_sec_ace(&nt_ace_list[num_aces++], &ace->sid, nt_acl_type, acc,
1879 SEC_ACE_FLAG_OBJECT_INHERIT|SEC_ACE_FLAG_CONTAINER_INHERIT|SEC_ACE_FLAG_INHERIT_ONLY);
1883 * Sort to force deny entries to the front.
1886 if (num_acls + num_dir_acls)
1887 qsort( nt_ace_list, num_acls + num_dir_acls, sizeof(nt_ace_list[0]), QSORT_CAST nt_ace_comp);
1891 if((psa = make_sec_acl( main_loop_talloc_get(), ACL_REVISION, num_aces, nt_ace_list)) == NULL) {
1892 DEBUG(0,("get_nt_acl: Unable to malloc space for acl.\n"));
1897 *ppdesc = make_standard_sec_desc( main_loop_talloc_get(), &owner_sid, &group_sid, psa, &sd_size);
1900 DEBUG(0,("get_nt_acl: Unable to malloc space for security descriptor.\n"));
1907 sys_acl_free_acl(posix_acl);
1909 sys_acl_free_acl(dir_acl);
1910 free_canon_ace_list(file_ace);
1911 free_canon_ace_list(dir_ace);
1918 /****************************************************************************
1919 Reply to set a security descriptor on an fsp. security_info_sent is the
1920 description of the following NT ACL.
1921 This should be the only external function needed for the UNIX style set ACL.
1922 ****************************************************************************/
1924 BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
1926 connection_struct *conn = fsp->conn;
1927 uid_t user = (uid_t)-1;
1928 gid_t grp = (gid_t)-1;
1929 SMB_STRUCT_STAT sbuf;
1930 DOM_SID file_owner_sid;
1931 DOM_SID file_grp_sid;
1932 canon_ace *file_ace_list = NULL;
1933 canon_ace *dir_ace_list = NULL;
1934 BOOL acl_perms = False;
1936 DEBUG(10,("set_nt_acl: called for file %s\n", fsp->fsp_name ));
1939 * Get the current state of the file.
1942 if(fsp->is_directory || fsp->fd == -1) {
1943 if(vfs_stat(fsp->conn,fsp->fsp_name, &sbuf) != 0)
1946 if(vfs_fstat(fsp,fsp->fd,&sbuf) != 0)
1951 * Unpack the user/group/world id's.
1954 if (!unpack_nt_owners( &sbuf, &user, &grp, security_info_sent, psd))
1958 * Do we need to chown ?
1961 if((user != (uid_t)-1 || grp != (uid_t)-1) && (sbuf.st_uid != user || sbuf.st_gid != grp)) {
1963 DEBUG(3,("set_nt_acl: chown %s. uid = %u, gid = %u.\n",
1964 fsp->fsp_name, (unsigned int)user, (unsigned int)grp ));
1966 if(vfs_chown( fsp->conn, fsp->fsp_name, user, grp) == -1) {
1967 DEBUG(3,("set_nt_acl: chown %s, %u, %u failed. Error = %s.\n",
1968 fsp->fsp_name, (unsigned int)user, (unsigned int)grp, strerror(errno) ));
1973 * Recheck the current state of the file, which may have changed.
1974 * (suid/sgid bits, for instance)
1977 if(fsp->is_directory) {
1978 if(vfs_stat(fsp->conn, fsp->fsp_name, &sbuf) != 0) {
1986 ret = vfs_stat(fsp->conn, fsp->fsp_name, &sbuf);
1988 ret = vfs_fstat(fsp,fsp->fd,&sbuf);
1995 create_file_sids(&sbuf, &file_owner_sid, &file_grp_sid);
1997 acl_perms = unpack_canon_ace( fsp, &sbuf, &file_owner_sid, &file_grp_sid,
1998 &file_ace_list, &dir_ace_list, security_info_sent, psd);
2000 if ((file_ace_list == NULL) && (dir_ace_list == NULL)) {
2001 /* W2K traverse DACL set - ignore. */
2006 DEBUG(3,("set_nt_acl: cannot set permissions\n"));
2007 free_canon_ace_list(file_ace_list);
2008 free_canon_ace_list(dir_ace_list);
2013 * Only change security if we got a DACL.
2016 if((security_info_sent & DACL_SECURITY_INFORMATION) && (psd->dacl != NULL)) {
2018 BOOL acl_set_support = False;
2022 * Try using the POSIX ACL set first. Fall back to chmod if
2023 * we have no ACL support on this filesystem.
2026 if (acl_perms && file_ace_list) {
2027 ret = set_canon_ace_list(fsp, file_ace_list, False, &acl_set_support);
2028 if (acl_set_support && ret == False) {
2029 DEBUG(3,("set_nt_acl: failed to set file acl on file %s (%s).\n", fsp->fsp_name, strerror(errno) ));
2030 free_canon_ace_list(file_ace_list);
2031 free_canon_ace_list(dir_ace_list);
2036 if (acl_perms && acl_set_support && fsp->is_directory && dir_ace_list) {
2037 if (!set_canon_ace_list(fsp, dir_ace_list, True, &acl_set_support)) {
2038 DEBUG(3,("set_nt_acl: failed to set default acl on directory %s (%s).\n", fsp->fsp_name, strerror(errno) ));
2039 free_canon_ace_list(file_ace_list);
2040 free_canon_ace_list(dir_ace_list);
2046 * If we cannot set using POSIX ACLs we fall back to checking if we need to chmod.
2049 if(!acl_set_support && acl_perms) {
2052 if (!convert_canon_ace_to_posix_perms( fsp, file_ace_list, &posix_perms)) {
2053 free_canon_ace_list(file_ace_list);
2054 free_canon_ace_list(dir_ace_list);
2055 DEBUG(3,("set_nt_acl: failed to convert file acl to posix permissions for file %s.\n",
2060 if (sbuf.st_mode != posix_perms) {
2062 DEBUG(3,("set_nt_acl: chmod %s. perms = 0%o.\n",
2063 fsp->fsp_name, (unsigned int)posix_perms ));
2065 if(conn->vfs_ops.chmod(conn,dos_to_unix(fsp->fsp_name, False), posix_perms) == -1) {
2066 DEBUG(3,("set_nt_acl: chmod %s, 0%o failed. Error = %s.\n",
2067 fsp->fsp_name, (unsigned int)posix_perms, strerror(errno) ));
2068 free_canon_ace_list(file_ace_list);
2069 free_canon_ace_list(dir_ace_list);
2076 free_canon_ace_list(file_ace_list);
2077 free_canon_ace_list(dir_ace_list);
2082 /****************************************************************************
2083 Do a chmod by setting the ACL USER_OBJ, GROUP_OBJ and OTHER bits in an ACL
2084 and set the mask to rwx. Needed to preserve complex ACLs set by NT.
2085 ****************************************************************************/
2087 static int chmod_acl_internals( SMB_ACL_T posix_acl, mode_t mode)
2089 int entry_id = SMB_ACL_FIRST_ENTRY;
2090 SMB_ACL_ENTRY_T entry;
2091 int num_entries = 0;
2093 while ( sys_acl_get_entry(posix_acl, entry_id, &entry) == 1) {
2094 SMB_ACL_TAG_T tagtype;
2095 SMB_ACL_PERMSET_T permset;
2099 if (entry_id == SMB_ACL_FIRST_ENTRY)
2100 entry_id = SMB_ACL_NEXT_ENTRY;
2102 if (sys_acl_get_tag_type(entry, &tagtype) == -1)
2105 if (sys_acl_get_permset(entry, &permset) == -1)
2111 case SMB_ACL_USER_OBJ:
2112 perms = unix_perms_to_acl_perms(mode, S_IRUSR, S_IWUSR, S_IXUSR);
2114 case SMB_ACL_GROUP_OBJ:
2115 perms = unix_perms_to_acl_perms(mode, S_IRGRP, S_IWGRP, S_IXGRP);
2118 perms = S_IRUSR|S_IWUSR|S_IXUSR;
2121 perms = unix_perms_to_acl_perms(mode, S_IROTH, S_IWOTH, S_IXOTH);
2127 if (map_acl_perms_to_permset(perms, &permset) == -1)
2130 if (sys_acl_set_permset(entry, permset) == -1)
2135 * If this is a simple 3 element ACL then it's a standard
2136 * UNIX permission set. Just use chmod...
2139 if (num_entries == 3)
2145 /****************************************************************************
2146 Do a chmod by setting the ACL USER_OBJ, GROUP_OBJ and OTHER bits in an ACL
2147 and set the mask to rwx. Needed to preserve complex ACLs set by NT.
2148 Note that name is in UNIX character set.
2149 ****************************************************************************/
2151 int chmod_acl(char *name, mode_t mode)
2153 SMB_ACL_T posix_acl = NULL;
2156 if ((posix_acl = sys_acl_get_file(name, SMB_ACL_TYPE_ACCESS)) == NULL)
2159 if ((ret = chmod_acl_internals(posix_acl, mode)) == -1)
2162 ret = sys_acl_set_file(name, SMB_ACL_TYPE_ACCESS, posix_acl);
2166 sys_acl_free_acl(posix_acl);
2170 /****************************************************************************
2171 Do an fchmod by setting the ACL USER_OBJ, GROUP_OBJ and OTHER bits in an ACL
2172 and set the mask to rwx. Needed to preserve complex ACLs set by NT.
2173 ****************************************************************************/
2175 int fchmod_acl(int fd, mode_t mode)
2177 SMB_ACL_T posix_acl = NULL;
2180 if ((posix_acl = sys_acl_get_fd(fd)) == NULL)
2183 if ((ret = chmod_acl_internals(posix_acl, mode)) == -1)
2186 ret = sys_acl_set_fd(fd, posix_acl);
2190 sys_acl_free_acl(posix_acl);