Linux 5.8-rc7
[linux-block.git] / fs / orangefs / acl.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
5db11c21
MM
2/*
3 * (C) 2001 Clemson University and The University of Chicago
4 *
5 * See COPYING in top-level directory.
6 */
7
8#include "protocol.h"
575e9461
MM
9#include "orangefs-kernel.h"
10#include "orangefs-bufmap.h"
5db11c21 11#include <linux/posix_acl_xattr.h>
5db11c21 12
8bb8aefd 13struct posix_acl *orangefs_get_acl(struct inode *inode, int type)
5db11c21
MM
14{
15 struct posix_acl *acl;
16 int ret;
17 char *key = NULL, *value = NULL;
18
19 switch (type) {
20 case ACL_TYPE_ACCESS:
972a7344 21 key = XATTR_NAME_POSIX_ACL_ACCESS;
5db11c21
MM
22 break;
23 case ACL_TYPE_DEFAULT:
972a7344 24 key = XATTR_NAME_POSIX_ACL_DEFAULT;
5db11c21
MM
25 break;
26 default:
8bb8aefd 27 gossip_err("orangefs_get_acl: bogus value of type %d\n", type);
5db11c21
MM
28 return ERR_PTR(-EINVAL);
29 }
30 /*
31 * Rather than incurring a network call just to determine the exact
32 * length of the attribute, I just allocate a max length to save on
33 * the network call. Conceivably, we could pass NULL to
8bb8aefd 34 * orangefs_inode_getxattr() to probe the length of the value, but
5db11c21
MM
35 * I don't do that for now.
36 */
8bb8aefd 37 value = kmalloc(ORANGEFS_MAX_XATTR_VALUELEN, GFP_KERNEL);
0b08273c 38 if (!value)
5db11c21
MM
39 return ERR_PTR(-ENOMEM);
40
41 gossip_debug(GOSSIP_ACL_DEBUG,
42 "inode %pU, key %s, type %d\n",
43 get_khandle_from_ino(inode),
44 key,
45 type);
d373a712
AG
46 ret = orangefs_inode_getxattr(inode, key, value,
47 ORANGEFS_MAX_XATTR_VALUELEN);
5db11c21
MM
48 /* if the key exists, convert it to an in-memory rep */
49 if (ret > 0) {
50 acl = posix_acl_from_xattr(&init_user_ns, value, ret);
51 } else if (ret == -ENODATA || ret == -ENOSYS) {
52 acl = NULL;
53 } else {
54 gossip_err("inode %pU retrieving acl's failed with error %d\n",
55 get_khandle_from_ino(inode),
56 ret);
57 acl = ERR_PTR(ret);
58 }
59 /* kfree(NULL) is safe, so don't worry if value ever got used */
60 kfree(value);
61 return acl;
62}
63
b5accbb0
JK
64static int __orangefs_set_acl(struct inode *inode, struct posix_acl *acl,
65 int type)
5db11c21 66{
5db11c21
MM
67 int error = 0;
68 void *value = NULL;
69 size_t size = 0;
70 const char *name = NULL;
71
72 switch (type) {
73 case ACL_TYPE_ACCESS:
972a7344 74 name = XATTR_NAME_POSIX_ACL_ACCESS;
5db11c21
MM
75 break;
76 case ACL_TYPE_DEFAULT:
972a7344 77 name = XATTR_NAME_POSIX_ACL_DEFAULT;
5db11c21
MM
78 break;
79 default:
80 gossip_err("%s: invalid type %d!\n", __func__, type);
81 return -EINVAL;
82 }
83
84 gossip_debug(GOSSIP_ACL_DEBUG,
85 "%s: inode %pU, key %s type %d\n",
86 __func__, get_khandle_from_ino(inode),
87 name,
88 type);
89
90 if (acl) {
91 size = posix_acl_xattr_size(acl->a_count);
92 value = kmalloc(size, GFP_KERNEL);
93 if (!value)
94 return -ENOMEM;
95
96 error = posix_acl_to_xattr(&init_user_ns, acl, value, size);
97 if (error < 0)
98 goto out;
99 }
100
101 gossip_debug(GOSSIP_ACL_DEBUG,
102 "%s: name %s, value %p, size %zd, acl %p\n",
103 __func__, name, value, size, acl);
104 /*
105 * Go ahead and set the extended attribute now. NOTE: Suppose acl
106 * was NULL, then value will be NULL and size will be 0 and that
107 * will xlate to a removexattr. However, we don't want removexattr
108 * complain if attributes does not exist.
109 */
d373a712 110 error = orangefs_inode_setxattr(inode, name, value, size, 0);
5db11c21
MM
111
112out:
113 kfree(value);
114 if (!error)
115 set_cached_acl(inode, type, acl);
116 return error;
117}
118
b5accbb0
JK
119int orangefs_set_acl(struct inode *inode, struct posix_acl *acl, int type)
120{
121 int error;
4bef6900
MM
122 struct iattr iattr;
123 int rc;
b5accbb0
JK
124
125 if (type == ACL_TYPE_ACCESS && acl) {
4bef6900
MM
126 /*
127 * posix_acl_update_mode checks to see if the permissions
128 * described by the ACL can be encoded into the
129 * object's mode. If so, it sets "acl" to NULL
130 * and "mode" to the new desired value. It is up to
131 * us to propagate the new mode back to the server...
132 */
133 error = posix_acl_update_mode(inode, &iattr.ia_mode, &acl);
b5accbb0
JK
134 if (error) {
135 gossip_err("%s: posix_acl_update_mode err: %d\n",
136 __func__,
137 error);
138 return error;
139 }
140
4bef6900
MM
141 if (acl) {
142 rc = __orangefs_set_acl(inode, acl, type);
143 } else {
144 iattr.ia_valid = ATTR_MODE;
afd9fb2a 145 rc = __orangefs_setattr(inode, &iattr);
4bef6900
MM
146 }
147
148 return rc;
149
150 } else {
151 return -EINVAL;
b5accbb0 152 }
b5accbb0
JK
153}
154
8bb8aefd 155int orangefs_init_acl(struct inode *inode, struct inode *dir)
5db11c21 156{
5db11c21
MM
157 struct posix_acl *default_acl, *acl;
158 umode_t mode = inode->i_mode;
a55f2d86 159 struct iattr iattr;
5db11c21
MM
160 int error = 0;
161
5db11c21
MM
162 error = posix_acl_create(dir, &mode, &default_acl, &acl);
163 if (error)
164 return error;
165
166 if (default_acl) {
b5accbb0
JK
167 error = __orangefs_set_acl(inode, default_acl,
168 ACL_TYPE_DEFAULT);
5db11c21 169 posix_acl_release(default_acl);
052d1276
CX
170 } else {
171 inode->i_default_acl = NULL;
5db11c21
MM
172 }
173
174 if (acl) {
175 if (!error)
b5accbb0 176 error = __orangefs_set_acl(inode, acl, ACL_TYPE_ACCESS);
5db11c21 177 posix_acl_release(acl);
052d1276
CX
178 } else {
179 inode->i_acl = NULL;
5db11c21
MM
180 }
181
182 /* If mode of the inode was changed, then do a forcible ->setattr */
183 if (mode != inode->i_mode) {
a55f2d86 184 memset(&iattr, 0, sizeof iattr);
5db11c21 185 inode->i_mode = mode;
a55f2d86
MB
186 iattr.ia_mode = mode;
187 iattr.ia_valid |= ATTR_MODE;
afd9fb2a 188 __orangefs_setattr(inode, &iattr);
5db11c21
MM
189 }
190
191 return error;
192}