Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
5db11c21 MM |
2 | /* |
3 | * (C) 2001 Clemson University and The University of Chicago | |
4 | * | |
5 | * See COPYING in top-level directory. | |
6 | */ | |
7 | ||
8 | #include "protocol.h" | |
575e9461 MM |
9 | #include "orangefs-kernel.h" |
10 | #include "orangefs-bufmap.h" | |
5db11c21 MM |
11 | #include <linux/posix_acl_xattr.h> |
12 | #include <linux/fs_struct.h> | |
13 | ||
8bb8aefd | 14 | struct posix_acl *orangefs_get_acl(struct inode *inode, int type) |
5db11c21 MM |
15 | { |
16 | struct posix_acl *acl; | |
17 | int ret; | |
18 | char *key = NULL, *value = NULL; | |
19 | ||
20 | switch (type) { | |
21 | case ACL_TYPE_ACCESS: | |
972a7344 | 22 | key = XATTR_NAME_POSIX_ACL_ACCESS; |
5db11c21 MM |
23 | break; |
24 | case ACL_TYPE_DEFAULT: | |
972a7344 | 25 | key = XATTR_NAME_POSIX_ACL_DEFAULT; |
5db11c21 MM |
26 | break; |
27 | default: | |
8bb8aefd | 28 | gossip_err("orangefs_get_acl: bogus value of type %d\n", type); |
5db11c21 MM |
29 | return ERR_PTR(-EINVAL); |
30 | } | |
31 | /* | |
32 | * Rather than incurring a network call just to determine the exact | |
33 | * length of the attribute, I just allocate a max length to save on | |
34 | * the network call. Conceivably, we could pass NULL to | |
8bb8aefd | 35 | * orangefs_inode_getxattr() to probe the length of the value, but |
5db11c21 MM |
36 | * I don't do that for now. |
37 | */ | |
8bb8aefd | 38 | value = kmalloc(ORANGEFS_MAX_XATTR_VALUELEN, GFP_KERNEL); |
0b08273c | 39 | if (!value) |
5db11c21 MM |
40 | return ERR_PTR(-ENOMEM); |
41 | ||
42 | gossip_debug(GOSSIP_ACL_DEBUG, | |
43 | "inode %pU, key %s, type %d\n", | |
44 | get_khandle_from_ino(inode), | |
45 | key, | |
46 | type); | |
d373a712 AG |
47 | ret = orangefs_inode_getxattr(inode, key, value, |
48 | ORANGEFS_MAX_XATTR_VALUELEN); | |
5db11c21 MM |
49 | /* if the key exists, convert it to an in-memory rep */ |
50 | if (ret > 0) { | |
51 | acl = posix_acl_from_xattr(&init_user_ns, value, ret); | |
52 | } else if (ret == -ENODATA || ret == -ENOSYS) { | |
53 | acl = NULL; | |
54 | } else { | |
55 | gossip_err("inode %pU retrieving acl's failed with error %d\n", | |
56 | get_khandle_from_ino(inode), | |
57 | ret); | |
58 | acl = ERR_PTR(ret); | |
59 | } | |
60 | /* kfree(NULL) is safe, so don't worry if value ever got used */ | |
61 | kfree(value); | |
62 | return acl; | |
63 | } | |
64 | ||
b5accbb0 JK |
65 | static int __orangefs_set_acl(struct inode *inode, struct posix_acl *acl, |
66 | int type) | |
5db11c21 | 67 | { |
5db11c21 MM |
68 | int error = 0; |
69 | void *value = NULL; | |
70 | size_t size = 0; | |
71 | const char *name = NULL; | |
72 | ||
73 | switch (type) { | |
74 | case ACL_TYPE_ACCESS: | |
972a7344 | 75 | name = XATTR_NAME_POSIX_ACL_ACCESS; |
5db11c21 MM |
76 | break; |
77 | case ACL_TYPE_DEFAULT: | |
972a7344 | 78 | name = XATTR_NAME_POSIX_ACL_DEFAULT; |
5db11c21 MM |
79 | break; |
80 | default: | |
81 | gossip_err("%s: invalid type %d!\n", __func__, type); | |
82 | return -EINVAL; | |
83 | } | |
84 | ||
85 | gossip_debug(GOSSIP_ACL_DEBUG, | |
86 | "%s: inode %pU, key %s type %d\n", | |
87 | __func__, get_khandle_from_ino(inode), | |
88 | name, | |
89 | type); | |
90 | ||
91 | if (acl) { | |
92 | size = posix_acl_xattr_size(acl->a_count); | |
93 | value = kmalloc(size, GFP_KERNEL); | |
94 | if (!value) | |
95 | return -ENOMEM; | |
96 | ||
97 | error = posix_acl_to_xattr(&init_user_ns, acl, value, size); | |
98 | if (error < 0) | |
99 | goto out; | |
100 | } | |
101 | ||
102 | gossip_debug(GOSSIP_ACL_DEBUG, | |
103 | "%s: name %s, value %p, size %zd, acl %p\n", | |
104 | __func__, name, value, size, acl); | |
105 | /* | |
106 | * Go ahead and set the extended attribute now. NOTE: Suppose acl | |
107 | * was NULL, then value will be NULL and size will be 0 and that | |
108 | * will xlate to a removexattr. However, we don't want removexattr | |
109 | * complain if attributes does not exist. | |
110 | */ | |
d373a712 | 111 | error = orangefs_inode_setxattr(inode, name, value, size, 0); |
5db11c21 MM |
112 | |
113 | out: | |
114 | kfree(value); | |
115 | if (!error) | |
116 | set_cached_acl(inode, type, acl); | |
117 | return error; | |
118 | } | |
119 | ||
b5accbb0 JK |
120 | int orangefs_set_acl(struct inode *inode, struct posix_acl *acl, int type) |
121 | { | |
122 | int error; | |
4bef6900 MM |
123 | struct iattr iattr; |
124 | int rc; | |
b5accbb0 JK |
125 | |
126 | if (type == ACL_TYPE_ACCESS && acl) { | |
4bef6900 MM |
127 | /* |
128 | * posix_acl_update_mode checks to see if the permissions | |
129 | * described by the ACL can be encoded into the | |
130 | * object's mode. If so, it sets "acl" to NULL | |
131 | * and "mode" to the new desired value. It is up to | |
132 | * us to propagate the new mode back to the server... | |
133 | */ | |
134 | error = posix_acl_update_mode(inode, &iattr.ia_mode, &acl); | |
b5accbb0 JK |
135 | if (error) { |
136 | gossip_err("%s: posix_acl_update_mode err: %d\n", | |
137 | __func__, | |
138 | error); | |
139 | return error; | |
140 | } | |
141 | ||
4bef6900 MM |
142 | if (acl) { |
143 | rc = __orangefs_set_acl(inode, acl, type); | |
144 | } else { | |
145 | iattr.ia_valid = ATTR_MODE; | |
146 | rc = orangefs_inode_setattr(inode, &iattr); | |
147 | } | |
148 | ||
149 | return rc; | |
150 | ||
151 | } else { | |
152 | return -EINVAL; | |
b5accbb0 | 153 | } |
b5accbb0 JK |
154 | } |
155 | ||
8bb8aefd | 156 | int orangefs_init_acl(struct inode *inode, struct inode *dir) |
5db11c21 | 157 | { |
8bb8aefd | 158 | struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode); |
5db11c21 MM |
159 | struct posix_acl *default_acl, *acl; |
160 | umode_t mode = inode->i_mode; | |
161 | int error = 0; | |
162 | ||
8bb8aefd | 163 | ClearModeFlag(orangefs_inode); |
5db11c21 MM |
164 | |
165 | error = posix_acl_create(dir, &mode, &default_acl, &acl); | |
166 | if (error) | |
167 | return error; | |
168 | ||
169 | if (default_acl) { | |
b5accbb0 JK |
170 | error = __orangefs_set_acl(inode, default_acl, |
171 | ACL_TYPE_DEFAULT); | |
5db11c21 MM |
172 | posix_acl_release(default_acl); |
173 | } | |
174 | ||
175 | if (acl) { | |
176 | if (!error) | |
b5accbb0 | 177 | error = __orangefs_set_acl(inode, acl, ACL_TYPE_ACCESS); |
5db11c21 MM |
178 | posix_acl_release(acl); |
179 | } | |
180 | ||
181 | /* If mode of the inode was changed, then do a forcible ->setattr */ | |
182 | if (mode != inode->i_mode) { | |
8bb8aefd | 183 | SetModeFlag(orangefs_inode); |
5db11c21 | 184 | inode->i_mode = mode; |
8bb8aefd | 185 | orangefs_flush_inode(inode); |
5db11c21 MM |
186 | } |
187 | ||
188 | return error; | |
189 | } |