1.\"-
2.\" Copyright (c) 2001 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright
9.\"    notice, this list of conditions and the following disclaimer.
10.\" 2. Redistributions in binary form must reproduce the above copyright
11.\"    notice, this list of conditions and the following disclaimer in the
12.\"    documentation and/or other materials provided with the distribution.
13.\"
14.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
26.\" $FreeBSD$
27.\"
28.Dd August 22, 2001
29.Dt VACCESS_ACL_POSIX1E 9
30.Os
31.Sh NAME
32.Nm vaccess_acl_posix1e
33.Nd generate a POSIX.1e ACL access control decision using vnode parameters
34.Sh SYNOPSIS
35.In sys/param.h
36.In sys/vnode.h
37.In sys/acl.h
38.Ft int
39.Fo vaccess_acl_posix1e
40.Fa "enum vtype type"
41.Fa "uid_t file_uid"
42.Fa "gid_t file_gid"
43.Fa "struct acl *acl"
44.Fa "accmode_t accmode"
45.Fa "struct ucred *cred"
46.Fa "int *privused"
47.Fc
48.Sh DESCRIPTION
49This call implements the logic for the
50.Ux
51discretionary file security model
52with POSIX.1e ACL extensions.
53It accepts the vnodes type
54.Fa type ,
55owning UID
56.Fa file_uid ,
57owning GID
58.Fa file_gid ,
59access ACL for the file
60.Fa acl ,
61desired access mode
62.Fa accmode ,
63requesting credential
64.Fa cred ,
65and an optional call-by-reference
66.Vt int
67pointer returning whether or not
68privilege was required for successful evaluation of the call; the
69.Fa privused
70pointer may be set to
71.Dv NULL
72by the caller in order not to be informed of
73privilege information, or it may point to an integer that will be set to
741 if privilege is used, and 0 otherwise.
75.Pp
76This call is intended to support implementations of
77.Xr VOP_ACCESS 9 ,
78which will use their own access methods to retrieve the vnode properties,
79and then invoke
80.Fn vaccess_acl_posix1e
81in order to perform the actual check.
82Implementations of
83.Xr VOP_ACCESS 9
84may choose to implement additional security mechanisms whose results will
85be composed with the return value.
86.Pp
87The algorithm used by
88.Fn vaccess_acl_posix1e
89is based on the POSIX.1e ACL evaluation algorithm.
90The algorithm selects a
91.Em matching
92entry from the access ACL, which may
93then be composed with an available ACL mask entry, providing
94.Ux
95security compatibility.
96.Pp
97Once appropriate protections are selected for the current credential,
98the requested access mode, in combination with the vnode type, will be
99compared with the discretionary rights available for the credential.
100If the rights granted by discretionary protections are insufficient,
101then super-user privilege, if available for the credential, will also be
102considered.
103.Sh RETURN VALUES
104.Fn vaccess_acl_posix1e
105will return 0 on success, or a non-zero error value on failure.
106.Sh ERRORS
107.Bl -tag -width Er
108.It Bq Er EACCES
109Permission denied.
110An attempt was made to access a file in a way forbidden by its file access
111permissions.
112.It Bq Er EPERM
113Operation not permitted.
114An attempt was made to perform an operation limited to processes with
115appropriate privileges or to the owner of a file or other resource.
116.El
117.Sh SEE ALSO
118.Xr vaccess 9 ,
119.Xr vnode 9 ,
120.Xr VOP_ACCESS 9
121.Sh AUTHORS
122This manual page and the current implementation of
123.Fn vaccess_acl_posix1e
124were written by
125.An Robert Watson .
126.Sh BUGS
127This manual page should include a full description of the POSIX.1e ACL
128evaluation algorithm, or cross reference another page that does.
129