1*7c478bd9Sstevel@tonic-gate /* 2*7c478bd9Sstevel@tonic-gate * CDDL HEADER START 3*7c478bd9Sstevel@tonic-gate * 4*7c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 5*7c478bd9Sstevel@tonic-gate * Common Development and Distribution License, Version 1.0 only 6*7c478bd9Sstevel@tonic-gate * (the "License"). You may not use this file except in compliance 7*7c478bd9Sstevel@tonic-gate * with the License. 8*7c478bd9Sstevel@tonic-gate * 9*7c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 10*7c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 11*7c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 12*7c478bd9Sstevel@tonic-gate * and limitations under the License. 13*7c478bd9Sstevel@tonic-gate * 14*7c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 15*7c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 16*7c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 17*7c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 18*7c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 19*7c478bd9Sstevel@tonic-gate * 20*7c478bd9Sstevel@tonic-gate * CDDL HEADER END 21*7c478bd9Sstevel@tonic-gate */ 22*7c478bd9Sstevel@tonic-gate /* 23*7c478bd9Sstevel@tonic-gate * Copyright 2004 Sun Microsystems, Inc. All rights reserved. 24*7c478bd9Sstevel@tonic-gate * Use is subject to license terms. 25*7c478bd9Sstevel@tonic-gate * 26*7c478bd9Sstevel@tonic-gate * This is a private header file. The interfaces in this header are 27*7c478bd9Sstevel@tonic-gate * subject to change or removal without notice. 28*7c478bd9Sstevel@tonic-gate * The Sun classification is "Project Private". 29*7c478bd9Sstevel@tonic-gate */ 30*7c478bd9Sstevel@tonic-gate 31*7c478bd9Sstevel@tonic-gate #ifndef _PRIV_UTILS_H 32*7c478bd9Sstevel@tonic-gate #define _PRIV_UTILS_H 33*7c478bd9Sstevel@tonic-gate 34*7c478bd9Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI" 35*7c478bd9Sstevel@tonic-gate 36*7c478bd9Sstevel@tonic-gate #include <priv.h> 37*7c478bd9Sstevel@tonic-gate 38*7c478bd9Sstevel@tonic-gate 39*7c478bd9Sstevel@tonic-gate #ifdef __cplusplus 40*7c478bd9Sstevel@tonic-gate extern "C" { 41*7c478bd9Sstevel@tonic-gate #endif 42*7c478bd9Sstevel@tonic-gate 43*7c478bd9Sstevel@tonic-gate #define PU_RESETGROUPS 0x0001 /* Remove supplemental groups */ 44*7c478bd9Sstevel@tonic-gate #define PU_LIMITPRIVS 0x0002 /* L=P */ 45*7c478bd9Sstevel@tonic-gate #define PU_INHERITPRIVS 0x0004 /* I=P */ 46*7c478bd9Sstevel@tonic-gate #define PU_CLEARLIMITSET 0x0008 /* L=0 */ 47*7c478bd9Sstevel@tonic-gate 48*7c478bd9Sstevel@tonic-gate /* 49*7c478bd9Sstevel@tonic-gate * Should be run at the start of a set-uid root program; 50*7c478bd9Sstevel@tonic-gate * if the effective uid == 0 and the real uid != 0, 51*7c478bd9Sstevel@tonic-gate * the specified privileges X are assigned as follows: 52*7c478bd9Sstevel@tonic-gate * 53*7c478bd9Sstevel@tonic-gate * P = I + X + B (B added insofar allowable from L) 54*7c478bd9Sstevel@tonic-gate * E = I 55*7c478bd9Sstevel@tonic-gate * (i.e., the requested privileges are dormant, not active) 56*7c478bd9Sstevel@tonic-gate * Then resets all uids to the invoking uid; no-op if euid == uid == 0. 57*7c478bd9Sstevel@tonic-gate * 58*7c478bd9Sstevel@tonic-gate * flags: PU_LIMITPRIVS, PU_CLEARLIMITSET, PU_CLEARINHERITABLE 59*7c478bd9Sstevel@tonic-gate * 60*7c478bd9Sstevel@tonic-gate * Caches the required privileges for use by __priv_bracket(). 61*7c478bd9Sstevel@tonic-gate * 62*7c478bd9Sstevel@tonic-gate */ 63*7c478bd9Sstevel@tonic-gate extern int __init_suid_priv(int, ...); 64*7c478bd9Sstevel@tonic-gate 65*7c478bd9Sstevel@tonic-gate /* 66*7c478bd9Sstevel@tonic-gate * After calling __init_suid_priv we can __priv_bracket(PRIV_ON) and 67*7c478bd9Sstevel@tonic-gate * __priv_bracket(PRIV_OFF) and __priv_relinquish to get rid of the 68*7c478bd9Sstevel@tonic-gate * privileges forever. 69*7c478bd9Sstevel@tonic-gate */ 70*7c478bd9Sstevel@tonic-gate extern int __priv_bracket(priv_op_t); 71*7c478bd9Sstevel@tonic-gate extern void __priv_relinquish(void); 72*7c478bd9Sstevel@tonic-gate 73*7c478bd9Sstevel@tonic-gate /* 74*7c478bd9Sstevel@tonic-gate * Runs at the start of a daemon, assuming euid=uid=0. 75*7c478bd9Sstevel@tonic-gate * 76*7c478bd9Sstevel@tonic-gate * P = E = B + X 77*7c478bd9Sstevel@tonic-gate * 78*7c478bd9Sstevel@tonic-gate * Then resets uids. 79*7c478bd9Sstevel@tonic-gate * 80*7c478bd9Sstevel@tonic-gate * Flags: all 81*7c478bd9Sstevel@tonic-gate * 82*7c478bd9Sstevel@tonic-gate */ 83*7c478bd9Sstevel@tonic-gate extern int __init_daemon_priv(int, uid_t, gid_t, ...); 84*7c478bd9Sstevel@tonic-gate 85*7c478bd9Sstevel@tonic-gate /* 86*7c478bd9Sstevel@tonic-gate * Runs after the daemon is initialized, and gives up the privileges 87*7c478bd9Sstevel@tonic-gate * passed in as argument because they are no longer needed. 88*7c478bd9Sstevel@tonic-gate * Reenables core dumps. 89*7c478bd9Sstevel@tonic-gate */ 90*7c478bd9Sstevel@tonic-gate extern void __fini_daemon_priv(const char *, ...); 91*7c478bd9Sstevel@tonic-gate 92*7c478bd9Sstevel@tonic-gate #ifdef __cplusplus 93*7c478bd9Sstevel@tonic-gate } 94*7c478bd9Sstevel@tonic-gate #endif 95*7c478bd9Sstevel@tonic-gate 96*7c478bd9Sstevel@tonic-gate #endif /* _PRIV_UTILS_H */ 97