return -errno;
if (uid_is_valid(uid) && uid != getuid()) {
-#if HAVE_ACL
- r = fd_add_uid_acl_permission(fd, uid, /* read = */ true, /* write = */ false, /* execute = */ false);
-#else
- r = -EOPNOTSUPP;
-#endif
+ r = fd_add_uid_acl_permission(fd, uid, ACL_READ);
if (r < 0) {
if (!ERRNO_IS_NOT_SUPPORTED(r) && !ERRNO_IS_PRIVILEGE(r))
return r;
* accessible */
if (uid_is_valid(uid) && uid != getuid()) {
-#if HAVE_ACL
- r = fd_add_uid_acl_permission(dfd, uid, /* read = */ true, /* write = */ false, /* execute = */ true);
-#else
- r = -EOPNOTSUPP;
-#endif
+ r = fd_add_uid_acl_permission(dfd, uid, ACL_READ | ACL_EXECUTE);
if (r < 0) {
if (!ERRNO_IS_NOT_SUPPORTED(r) && !ERRNO_IS_PRIVILEGE(r))
return r;
return 0;
/* Make sure normal users can read (but not write or delete) their own coredumps */
- r = fd_add_uid_acl_permission(fd, uid, /* read = */ true, /* write = */ false, /* execute = */ false);
+ r = fd_add_uid_acl_permission(fd, uid, ACL_READ);
if (r < 0)
- return log_error_errno(r, "Failed to adjust ACL of coredump: %m");
+ return log_error_errno(r, "Failed to adjust ACL of the coredump: %m");
#endif
return 0;
}
static void server_add_acls(JournalFile *f, uid_t uid) {
-#if HAVE_ACL
- int r;
-#endif
assert(f);
#if HAVE_ACL
+ int r;
+
if (uid_for_system_journal(uid))
return;
- r = fd_add_uid_acl_permission(f->fd, uid, /* read = */ true, /* write = */ false, /* execute = */ false);
+ r = fd_add_uid_acl_permission(f->fd, uid, ACL_READ);
if (r < 0)
log_warning_errno(r, "Failed to set ACL on %s, ignoring: %m", f->path);
#endif
return 0;
}
+/* POSIX says that ACL_{READ,WRITE,EXECUTE} don't have to be bitmasks. But that is a natural thing to do and
+ * all extant implementations do it. Let's make sure that we fail verbosely in the (imho unlikely) scenario
+ * that we get a new implementation that does not satisfy this. */
+assert_cc(!(ACL_READ & ACL_WRITE));
+assert_cc(!(ACL_WRITE & ACL_EXECUTE));
+assert_cc(!(ACL_EXECUTE & ACL_READ));
+assert_cc((unsigned) ACL_READ == ACL_READ);
+assert_cc((unsigned) ACL_WRITE == ACL_WRITE);
+assert_cc((unsigned) ACL_EXECUTE == ACL_EXECUTE);
+
int fd_add_uid_acl_permission(
int fd,
uid_t uid,
- bool rd,
- bool wr,
- bool ex) {
+ unsigned mask) {
_cleanup_(acl_freep) acl_t acl = NULL;
acl_permset_t permset;
if (acl_get_permset(entry, &permset) < 0)
return -errno;
- if (rd && acl_add_perm(permset, ACL_READ) < 0)
+ if ((mask & ACL_READ) && acl_add_perm(permset, ACL_READ) < 0)
return -errno;
- if (wr && acl_add_perm(permset, ACL_WRITE) < 0)
+ if ((mask & ACL_WRITE) && acl_add_perm(permset, ACL_WRITE) < 0)
return -errno;
- if (ex && acl_add_perm(permset, ACL_EXECUTE) < 0)
+ if ((mask & ACL_EXECUTE) && acl_add_perm(permset, ACL_EXECUTE) < 0)
return -errno;
r = calc_acl_mask_if_needed(&acl);
/* SPDX-License-Identifier: LGPL-2.1+ */
#pragma once
-#if HAVE_ACL
+#include <errno.h>
+#include <unistd.h>
+#if HAVE_ACL
#include <acl/libacl.h>
#include <stdbool.h>
#include <sys/acl.h>
int acl_search_groups(const char* path, char ***ret_groups);
int parse_acl(const char *text, acl_t *acl_access, acl_t *acl_default, bool want_mask);
int acls_for_file(const char *path, acl_type_t type, acl_t new, acl_t *acl);
-int fd_add_uid_acl_permission(int fd, uid_t uid, bool rd, bool wr, bool ex);
+int fd_add_uid_acl_permission(int fd, uid_t uid, unsigned mask);
/* acl_free takes multiple argument types.
* Multiple cleanup functions are necessary. */
#define acl_free_gid_tp acl_free
DEFINE_TRIVIAL_CLEANUP_FUNC(gid_t*, acl_free_gid_tp);
+#else
+#define ACL_READ 0x04
+#define ACL_WRITE 0x02
+#define ACL_EXECUTE 0x01
+
+static inline int fd_add_uid_acl_permission(int fd, uid_t uid, unsigned mask) {
+ return -EOPNOTSUPP;
+}
#endif
} else
uid = getuid();
- r = fd_add_uid_acl_permission(fd, uid, true, false, false);
- log_info_errno(r, "fd_add_uid_acl_permission(%i, "UID_FMT", true, false, false): %m", fd, uid);
+ r = fd_add_uid_acl_permission(fd, uid, ACL_READ);
+ log_info_errno(r, "fd_add_uid_acl_permission(%i, "UID_FMT", ACL_READ): %m", fd, uid);
assert_se(r >= 0);
cmd = strjoina("ls -l ", fn);
/* set the acls again */
- r = fd_add_uid_acl_permission(fd, uid, true, false, false);
+ r = fd_add_uid_acl_permission(fd, uid, ACL_READ);
assert_se(r >= 0);
cmd = strjoina("ls -l ", fn);