2 * Copyright (c) 1989, 1993, 1994
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
37 #include <sys/types.h>
43 #include <membership.h>
44 #include "chmod_acl.h"
46 extern void usage(void);
53 #define ACL_PERM_DIR (1<<0)
54 #define ACL_PERM_FILE (1<<1)
56 {ACL_READ_DATA
, "read", ACL_PERM_FILE
},
57 {ACL_LIST_DIRECTORY
, "list", ACL_PERM_DIR
},
58 {ACL_WRITE_DATA
, "write", ACL_PERM_FILE
},
59 {ACL_ADD_FILE
, "add_file", ACL_PERM_DIR
},
60 {ACL_EXECUTE
, "execute", ACL_PERM_FILE
},
61 {ACL_SEARCH
, "search", ACL_PERM_DIR
},
62 {ACL_DELETE
, "delete", ACL_PERM_FILE
| ACL_PERM_DIR
},
63 {ACL_APPEND_DATA
, "append", ACL_PERM_FILE
},
64 {ACL_ADD_SUBDIRECTORY
, "add_subdirectory", ACL_PERM_DIR
},
65 {ACL_DELETE_CHILD
, "delete_child", ACL_PERM_DIR
},
66 {ACL_READ_ATTRIBUTES
, "readattr", ACL_PERM_FILE
| ACL_PERM_DIR
},
67 {ACL_WRITE_ATTRIBUTES
, "writeattr", ACL_PERM_FILE
| ACL_PERM_DIR
},
68 {ACL_READ_EXTATTRIBUTES
, "readextattr", ACL_PERM_FILE
| ACL_PERM_DIR
},
69 {ACL_WRITE_EXTATTRIBUTES
, "writeextattr", ACL_PERM_FILE
| ACL_PERM_DIR
},
70 {ACL_READ_SECURITY
, "readsecurity", ACL_PERM_FILE
| ACL_PERM_DIR
},
71 {ACL_WRITE_SECURITY
, "writesecurity", ACL_PERM_FILE
| ACL_PERM_DIR
},
72 {ACL_CHANGE_OWNER
, "chown", ACL_PERM_FILE
| ACL_PERM_DIR
},
81 {ACL_ENTRY_INHERITED
, "inherited", ACL_PERM_FILE
| ACL_PERM_DIR
},
82 {ACL_ENTRY_FILE_INHERIT
, "file_inherit", ACL_PERM_DIR
},
83 {ACL_ENTRY_DIRECTORY_INHERIT
, "directory_inherit", ACL_PERM_DIR
},
84 {ACL_ENTRY_LIMIT_INHERIT
, "limit_inherit", ACL_PERM_FILE
| ACL_PERM_DIR
},
85 {ACL_ENTRY_ONLY_INHERIT
, "only_inherit", ACL_PERM_DIR
},
89 /* TBD - Many of these routines could potentially be considered for
90 * inclusion in a library. If that is done, either avoid use of "err"
91 * and implement a better fall-through strategy in case of errors,
92 * or use err_set_exit() and make various structures globals.
96 #define NAME_GROUP (2)
97 #define NAME_EITHER (NAME_USER | NAME_GROUP)
99 /* Perform a name to uuid mapping - calls through to memberd */
102 name_to_uuid(char *tok
, int nametype
) {
103 struct passwd
*tpass
= NULL
;
104 struct group
*tgrp
= NULL
;
105 uuid_t
*entryg
= NULL
;
107 if ((entryg
= (uuid_t
*) calloc(1,sizeof(uuid_t
))) == NULL
)
108 err(1, "Unable to allocate a uuid");
110 if (nametype
& NAME_USER
)
111 tpass
= getpwnam(tok
);
113 if (NULL
== tpass
&& (nametype
& NAME_GROUP
))
114 tgrp
= getgrnam(tok
);
117 if (0 != mbr_uid_to_uuid(tpass
->pw_uid
, *entryg
)) {
118 errx(1, "mbr_uid_to_uuid(): Unable to translate uid %d", tpass
->pw_uid
);
121 if (0 != mbr_gid_to_uuid(tgrp
->gr_gid
, *entryg
)) {
122 errx(1, "mbr_gid_to_uuid(): Unable to translate gid %d", tgrp
->gr_gid
);
125 errx(1, "Unable to translate '%s' to a UID/GID", tok
);
130 /* Convert an acl entry in string form to an acl_entry_t */
132 parse_entry(char *entrybuf
, acl_entry_t newent
) {
140 unsigned permcount
= 0;
142 char *delimiter
= " ";
143 int nametype
= NAME_EITHER
;
145 acl_get_permset(newent
, &perms
);
146 acl_get_flagset_np(newent
, &flags
);
150 if (0 == strncmp(entrybuf
, "user:", 5)) {
151 nametype
= NAME_USER
;
153 } else if (0 == strncmp(entrybuf
, "group:", 6)) {
154 nametype
= NAME_GROUP
;
158 if (strchr(pebuf
, ':')) /* User/Group names can have spaces */
160 tok
= strsep(&pebuf
, delimiter
);
162 if ((tok
== NULL
) || *tok
== '\0') {
163 errx(1, "Invalid entry format -- expected user or group name");
166 /* parse the name into a qualifier */
167 entryg
= name_to_uuid(tok
, nametype
);
169 tok
= strsep(&pebuf
, ": "); /* Stick with delimiter? */
170 if ((tok
== NULL
) || *tok
== '\0') {
171 errx(1, "Invalid entry format -- expected allow or deny");
174 /* is the verb 'allow' or 'deny'? */
175 if (!strcmp(tok
, "allow")) {
176 tag
= ACL_EXTENDED_ALLOW
;
177 } else if (!strcmp(tok
, "deny")) {
178 tag
= ACL_EXTENDED_DENY
;
180 errx(1, "Unknown tag type '%s'", tok
);
183 /* parse permissions */
184 for (; (tok
= strsep(&pebuf
, ",")) != NULL
;) {
186 /* is it a permission? */
187 for (pindex
= 0; acl_perms
[pindex
].name
!= NULL
; pindex
++) {
188 if (!strcmp(acl_perms
[pindex
].name
, tok
)) {
190 acl_add_perm(perms
, acl_perms
[pindex
].perm
);
196 for (pindex
= 0; acl_flags
[pindex
].name
!= NULL
; pindex
++) {
197 if (!strcmp(acl_flags
[pindex
].name
, tok
)) {
199 acl_add_flag_np(flags
, acl_flags
[pindex
].flag
);
204 errx(1,"Invalid permission type '%s'", tok
);
209 if (0 == permcount
) {
210 errx(1, "No permissions specified");
212 acl_set_tag_type(newent
, tag
);
213 acl_set_qualifier(newent
, entryg
);
214 acl_set_permset(newent
, perms
);
215 acl_set_flagset_np(newent
, flags
);
221 /* Convert one or more acl entries in string form to an acl_t */
223 parse_acl_entries(const char *input
) {
229 char **bufp
, *entryv
[ACL_MAX_ENTRIES
];
231 /* XXX acl_from_text(), when implemented, will presumably use the canonical
232 * text representation format, which is what chmod should be using
233 * We may need to add an entry number to the input
235 /* Translate the user supplied ACL entry */
236 /* acl_input = acl_from_text(input); */
238 inbuf
= malloc(MAX_ACL_TEXT_SIZE
);
241 err(1, "malloc() failed");
242 strncpy(inbuf
, input
, MAX_ACL_TEXT_SIZE
);
243 inbuf
[MAX_ACL_TEXT_SIZE
- 1] = '\0';
245 if ((acl_input
= acl_init(1)) == NULL
)
246 err(1, "acl_init() failed");
250 for (bufp
= entryv
; (*bufp
= strsep(&oinbuf
, "\n")) != NULL
;)
251 if (**bufp
!= '\0') {
252 if (0 != acl_create_entry(&acl_input
, &newent
))
253 err(1, "acl_create_entry() failed");
254 if (0 != parse_entry(*bufp
, newent
)) {
255 errx(1, "Failed parsing entry '%s'", *bufp
);
257 if (++bufp
>= &entryv
[ACL_MAX_ENTRIES
- 1]) {
258 errx(1, "Too many entries");
267 /* XXX No Libc support for inherited entries and generation determination yet */
269 get_inheritance_level(acl_entry_t entry
) {
270 /* XXX to be implemented */
274 /* Determine a "score" for an acl entry. The entry scores higher if it's
275 * tagged ACL_EXTENDED_DENY, and non-inherited entries are ranked higher
276 * than inherited entries.
280 score_acl_entry(acl_entry_t entry
) {
289 return (MINIMUM_TIER
);
291 if (acl_get_tag_type(entry
, &tag
) != 0) {
292 err(1, "Malformed ACL entry, no tag present");
294 if (acl_get_flagset_np(entry
, &flags
) != 0){
295 err(1, "Unable to obtain flagset");
297 if (acl_get_permset(entry
, &perms
) != 0)
298 err(1, "Malformed ACL entry, no permset present");
301 case ACL_EXTENDED_ALLOW
:
303 case ACL_EXTENDED_DENY
:
307 errx(1, "Unknown tag type %d present in ACL entry", tag
);
311 if (acl_get_flag_np(flags
, ACL_ENTRY_INHERITED
))
312 score
+= get_inheritance_level(entry
) * INHERITANCE_TIER
;
318 compare_acl_qualifiers(uuid_t
*qa
, uuid_t
*qb
) {
319 return bcmp(qa
, qb
, sizeof(uuid_t
));
322 /* Compare two ACL permsets.
324 * MATCH_SUBSET if bperms is a subset of aperms
325 * MATCH_SUPERSET if bperms is a superset of aperms
326 * MATCH_PARTIAL if the two permsets have a common subset
327 * MATCH_EXACT if the two permsets are identical
328 * MATCH_NONE if they are disjoint
332 compare_acl_permsets(acl_permset_t aperms
, acl_permset_t bperms
)
335 /* TBD Implement other match levels as needed */
336 for (i
= 0; acl_perms
[i
].name
!= NULL
; i
++) {
337 if (acl_get_perm_np(aperms
, acl_perms
[i
].perm
) !=
338 acl_get_perm_np(bperms
, acl_perms
[i
].perm
))
345 compare_acl_flagsets(acl_flagset_t aflags
, acl_flagset_t bflags
)
348 /* TBD Implement other match levels as needed */
349 for (i
= 0; acl_flags
[i
].name
!= NULL
; i
++) {
350 if (acl_get_flag_np(aflags
, acl_flags
[i
].flag
) !=
351 acl_get_flag_np(bflags
, acl_flags
[i
].flag
))
357 /* Compares two ACL entries for equality */
359 compare_acl_entries(acl_entry_t a
, acl_entry_t b
)
361 acl_tag_t atag
, btag
;
362 acl_permset_t aperms
, bperms
;
363 acl_flagset_t aflags
, bflags
;
364 int pcmp
= 0, fcmp
= 0;
366 if (0 != compare_acl_qualifiers(acl_get_qualifier(a
),
367 acl_get_qualifier(b
)))
370 if (0 != acl_get_tag_type(a
, &atag
))
371 err(1, "No tag type present in entry");
372 if (0!= acl_get_tag_type(b
, &btag
))
373 err(1, "No tag type present in entry");
378 if ((acl_get_permset(a
, &aperms
) != 0) ||
379 (acl_get_flagset_np(a
, &aflags
) != 0) ||
380 (acl_get_permset(b
, &bperms
) != 0) ||
381 (acl_get_flagset_np(b
, &bflags
) != 0))
382 err(1, "error fetching permissions");
384 pcmp
= compare_acl_permsets(aperms
, bperms
);
385 fcmp
= compare_acl_flagsets(aflags
, bflags
);
387 if ((pcmp
== MATCH_NONE
) || (fcmp
== MATCH_NONE
))
388 return(MATCH_PARTIAL
);
393 /* Verify that an ACL is in canonical order. Currently, the canonical
397 * inherited deny (parent)
398 * inherited allow (parent)
399 * inherited deny (grandparent)
400 * inherited allow (grandparent)
404 is_canonical(acl_t acl
) {
408 int score
= 0, next_score
= 0;
410 /* XXX - is a zero entry ACL in canonical form? */
411 if (0 != acl_get_entry(acl
, ACL_FIRST_ENTRY
, &entry
))
414 score
= score_acl_entry(entry
);
416 for (aindex
= 0; acl_get_entry(acl
, ACL_NEXT_ENTRY
, &entry
) == 0;
418 if (score
< (next_score
= score_acl_entry(entry
)))
426 /* Iterate through an ACL, and find the canonical position for the
430 find_canonical_position(acl_t acl
, acl_entry_t modifier
) {
436 /* Check if there's an entry with the same qualifier
437 * and tag type; if not, find the appropriate slot
441 if (0 != acl_get_entry(acl
, ACL_FIRST_ENTRY
, &entry
))
444 mscore
= score_acl_entry(modifier
);
446 while (mscore
< score_acl_entry(entry
)) {
450 if (0 != acl_get_entry(acl
, ACL_NEXT_ENTRY
, &entry
))
457 int canonicalize_acl_entries(acl_t acl
);
459 /* For a given acl_entry_t "modifier", find the first exact or
460 * partially matching entry from the specified acl_t acl
464 find_matching_entry (acl_t acl
, acl_entry_t modifier
, acl_entry_t
*rentryp
,
465 unsigned match_inherited
) {
467 acl_entry_t entry
= NULL
;
470 int cmp
, fcmp
= MATCH_NONE
;
473 acl_get_entry(acl
, entry
== NULL
? ACL_FIRST_ENTRY
:
474 ACL_NEXT_ENTRY
, &entry
) == 0;
476 cmp
= compare_acl_entries(entry
, modifier
);
477 if ((cmp
== MATCH_EXACT
) || (cmp
== MATCH_PARTIAL
)) {
478 if (match_inherited
) {
479 acl_flagset_t eflags
, mflags
;
481 if (0 != acl_get_flagset_np(modifier
, &mflags
))
482 err(1, "Unable to get flagset");
484 if (0 != acl_get_flagset_np(entry
, &eflags
))
485 err(1, "Unable to get flagset");
487 if (compare_acl_flagsets(mflags
, eflags
) == MATCH_EXACT
) {
497 if (fcmp
== MATCH_EXACT
)
503 /* Remove all perms specified in modifier from rentry*/
505 subtract_from_entry(acl_entry_t rentry
, acl_entry_t modifier
)
507 acl_permset_t rperms
, mperms
;
508 acl_flagset_t rflags
, mflags
;
511 if ((acl_get_permset(rentry
, &rperms
) != 0) ||
512 (acl_get_flagset_np(rentry
, &rflags
) != 0) ||
513 (acl_get_permset(modifier
, &mperms
) != 0) ||
514 (acl_get_flagset_np(modifier
, &mflags
) != 0))
515 err(1, "error computing ACL modification");
517 for (i
= 0; acl_perms
[i
].name
!= NULL
; i
++) {
518 if (acl_get_perm_np(mperms
, acl_perms
[i
].perm
))
519 acl_delete_perm(rperms
, acl_perms
[i
].perm
);
521 for (i
= 0; acl_flags
[i
].name
!= NULL
; i
++) {
522 if (acl_get_flag_np(mflags
, acl_flags
[i
].flag
))
523 acl_delete_flag_np(rflags
, acl_flags
[i
].flag
);
525 acl_set_permset(rentry
, rperms
);
526 acl_set_flagset_np(rentry
, rflags
);
529 /* Add the perms specified in modifier to rentry */
531 merge_entry_perms(acl_entry_t rentry
, acl_entry_t modifier
)
533 acl_permset_t rperms
, mperms
;
534 acl_flagset_t rflags
, mflags
;
537 if ((acl_get_permset(rentry
, &rperms
) != 0) ||
538 (acl_get_flagset_np(rentry
, &rflags
) != 0) ||
539 (acl_get_permset(modifier
, &mperms
) != 0) ||
540 (acl_get_flagset_np(modifier
, &mflags
) != 0))
541 err(1, "error computing ACL modification");
543 for (i
= 0; acl_perms
[i
].name
!= NULL
; i
++) {
544 if (acl_get_perm_np(mperms
, acl_perms
[i
].perm
))
545 acl_add_perm(rperms
, acl_perms
[i
].perm
);
547 for (i
= 0; acl_flags
[i
].name
!= NULL
; i
++) {
548 if (acl_get_flag_np(mflags
, acl_flags
[i
].flag
))
549 acl_add_flag_np(rflags
, acl_flags
[i
].flag
);
551 acl_set_permset(rentry
, rperms
);
552 acl_set_flagset_np(rentry
, rflags
);
557 modify_acl(acl_t
*oaclp
, acl_entry_t modifier
, unsigned int optflags
,
558 int position
, int inheritance_level
,
559 unsigned flag_new_acl
) {
562 acl_entry_t newent
= NULL
;
564 acl_entry_t rentry
= NULL
;
568 /* Add the inherited flag if requested by the user*/
569 if (modifier
&& (optflags
& ACL_INHERIT_FLAG
)) {
570 acl_flagset_t mflags
;
572 acl_get_flagset_np(modifier
, &mflags
);
573 acl_add_flag_np(mflags
, ACL_ENTRY_INHERITED
);
574 acl_set_flagset_np(modifier
, mflags
);
577 if (optflags
& ACL_SET_FLAG
) {
578 if (position
!= -1) {
579 if (0 != acl_create_entry_np(&oacl
, &newent
, position
))
580 err(1, "acl_create_entry() failed");
581 acl_copy_entry(newent
, modifier
);
584 /* If an entry exists, add the new permissions to it, else add an
585 * entry in the canonical position.
588 /* First, check for a matching entry - if one exists, merge flags */
589 dmatch
= find_matching_entry(oacl
, modifier
, &rentry
, 1);
591 if (dmatch
!= MATCH_NONE
) {
592 if (dmatch
== MATCH_EXACT
)
593 /* Nothing to be done */
596 if (dmatch
== MATCH_PARTIAL
) {
597 merge_entry_perms(rentry
, modifier
);
601 /* Insert the entry in canonical order */
602 cpos
= find_canonical_position(oacl
, modifier
);
603 if (0!= acl_create_entry_np(&oacl
, &newent
, cpos
))
604 err(1, "acl_create_entry() failed");
605 acl_copy_entry(newent
, modifier
);
609 if (optflags
& ACL_DELETE_FLAG
) {
612 errx(1, "No ACL present");
614 if (position
!= -1 ) {
615 if (0 != acl_get_entry(oacl
, position
, &rentry
))
616 err(1, "Invalid entry number");
617 acl_delete_entry(oacl
, rentry
);
620 unsigned match_found
= 0, aindex
;
622 acl_get_entry(oacl
, rentry
== NULL
?
624 ACL_NEXT_ENTRY
, &rentry
)
627 cmp
= compare_acl_entries(rentry
,
629 if ((cmp
== MATCH_EXACT
) ||
630 (cmp
== MATCH_PARTIAL
)) {
632 if (cmp
== MATCH_EXACT
)
633 acl_delete_entry(oacl
, rentry
);
635 /* In the event of a partial match, remove the specified perms from the
637 subtract_from_entry(rentry
, modifier
);
640 if (0 == match_found
) {
641 warnx("Entry not found when attempting delete");
647 if (optflags
& ACL_REWRITE_FLAG
) {
650 if (-1 == position
) {
653 if (0 == flag_new_acl
) {
654 if (0 != acl_get_entry(oacl
, position
,
656 err(1, "Invalid entry number");
658 if (0 != acl_delete_entry(oacl
, rentry
))
659 err(1, "Unable to delete entry");
661 if (0!= acl_create_entry_np(&oacl
, &newent
, position
))
662 err(1, "acl_create_entry() failed");
663 acl_copy_entry(newent
, modifier
);
671 modify_file_acl(unsigned int optflags
, const char *path
, acl_t modifier
, int position
, int inheritance_level
) {
674 unsigned aindex
= 0, flag_new_acl
= 0;
675 acl_entry_t newent
= NULL
;
676 acl_entry_t entry
= NULL
;
677 unsigned retval
= 0 ;
681 /* XXX acl_get_file() returns a zero entry ACL if an ACL was previously
682 * associated with the file, and has had its entries removed.
683 * However, POSIX 1003.1e states that a zero entry ACL should be
684 * returned if the caller asks for ACL_TYPE_DEFAULT, and no ACL is
685 * associated with the path; it
686 * does not specifically state that a request for ACL_TYPE_EXTENDED
687 * should not return a zero entry ACL, however.
690 /* Determine if we've been given a zero entry ACL, or create an ACL if
691 * none exists. There are some issues to consider here: Should we create
692 * a zero-entry ACL for a delete or check canonicity operation?
698 if (optflags
& ACL_CLEAR_FLAG
) {
699 filesec_t fsec
= filesec_init();
701 err(1, "filesec_init() failed");
702 if (filesec_set_property(fsec
, FILESEC_ACL
,
703 _FILESEC_REMOVE_ACL
) != 0)
704 err(1, "filesec_set_property() failed");
705 if (chmodx_np(path
, fsec
) != 0) {
707 warn("Failed to clear ACL on file %s", path
);
715 if (optflags
& ACL_FROM_STDIN
)
716 oacl
= acl_dup(modifier
);
718 oacl
= acl_get_file(path
, ACL_TYPE_EXTENDED
);
720 if ((oacl
== NULL
) ||
721 (acl_get_entry(oacl
,ACL_FIRST_ENTRY
, &newent
) != 0)) {
722 if ((oacl
= acl_init(1)) == NULL
)
723 err(1, "acl_init() failed");
728 if ((0 == flag_new_acl
) && (optflags
& (ACL_REMOVE_INHERIT_FLAG
|
729 ACL_REMOVE_INHERITED_ENTRIES
))) {
731 if ((facl
= acl_init(1)) == NULL
)
732 err(1, "acl_init() failed");
735 (entry
== NULL
? ACL_FIRST_ENTRY
:
736 ACL_NEXT_ENTRY
), &entry
) == 0;
738 acl_flagset_t eflags
;
739 acl_entry_t fent
= NULL
;
740 if (acl_get_flagset_np(entry
, &eflags
) != 0) {
741 err(1, "Unable to obtain flagset");
744 if (acl_get_flag_np(eflags
, ACL_ENTRY_INHERITED
)) {
745 if (optflags
& ACL_REMOVE_INHERIT_FLAG
) {
746 acl_delete_flag_np(eflags
, ACL_ENTRY_INHERITED
);
747 acl_set_flagset_np(entry
, eflags
);
748 acl_create_entry(&facl
, &fent
);
749 acl_copy_entry(fent
, entry
);
753 acl_create_entry(&facl
, &fent
);
754 acl_copy_entry(fent
, entry
);
760 } else if (optflags
& ACL_TO_STDOUT
) {
761 ssize_t len
; /* need to get printacl() from ls(1) */
762 char *text
= acl_to_text(oacl
, &len
);
765 } else if (optflags
& ACL_CHECK_CANONICITY
) {
767 warnx("No ACL currently associated with file '%s'", path
);
769 retval
= is_canonical(oacl
);
770 } else if ((optflags
& ACL_SET_FLAG
) && (position
== -1) &&
771 (!is_canonical(oacl
))) {
772 warnx("The specified file '%s' does not have an ACL in canonical order, please specify a position with +a# ", path
);
774 } else if (((optflags
& ACL_DELETE_FLAG
) && (position
!= -1))
775 || (optflags
& ACL_CHECK_CANONICITY
)) {
776 retval
= modify_acl(&oacl
, NULL
, optflags
, position
,
777 inheritance_level
, flag_new_acl
);
778 } else if ((optflags
& (ACL_REMOVE_INHERIT_FLAG
|ACL_REMOVE_INHERITED_ENTRIES
)) && flag_new_acl
) {
779 warnx("No ACL currently associated with file '%s'", path
);
782 if (!modifier
) { /* avoid bus error in acl_get_entry */
783 errx(1, "Internal error: modifier should not be NULL");
786 acl_get_entry(modifier
,
787 (entry
== NULL
? ACL_FIRST_ENTRY
:
788 ACL_NEXT_ENTRY
), &entry
) == 0;
791 retval
+= modify_acl(&oacl
, entry
, optflags
,
792 position
, inheritance_level
,
798 /* XXX Potential race here, since someone else could've modified or
799 * read the ACL on this file (with the intention of modifying it) in
800 * the interval from acl_get_file() to acl_set_file(); we can
801 * minimize one aspect of this window by comparing the original acl
802 * to a fresh one from acl_get_file() but we could consider a
803 * "changeset" mechanism, common locking strategy, or kernel
804 * supplied reservation mechanism to prevent this race.
806 if (!(optflags
& (ACL_TO_STDOUT
|ACL_CHECK_CANONICITY
)) &&
807 (0 != acl_set_file(path
, ACL_TYPE_EXTENDED
, oacl
))){
809 warn("Failed to set ACL on file '%s'", path
);