License cleanup: add SPDX GPL-2.0 license identifier to files with no license
[linux-2.6-block.git] / fs / orangefs / acl.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
5db11c21
MM
2/*
3 * (C) 2001 Clemson University and The University of Chicago
4 *
5 * See COPYING in top-level directory.
6 */
7
8#include "protocol.h"
575e9461
MM
9#include "orangefs-kernel.h"
10#include "orangefs-bufmap.h"
5db11c21
MM
11#include <linux/posix_acl_xattr.h>
12#include <linux/fs_struct.h>
13
8bb8aefd 14struct posix_acl *orangefs_get_acl(struct inode *inode, int type)
5db11c21
MM
15{
16 struct posix_acl *acl;
17 int ret;
18 char *key = NULL, *value = NULL;
19
20 switch (type) {
21 case ACL_TYPE_ACCESS:
972a7344 22 key = XATTR_NAME_POSIX_ACL_ACCESS;
5db11c21
MM
23 break;
24 case ACL_TYPE_DEFAULT:
972a7344 25 key = XATTR_NAME_POSIX_ACL_DEFAULT;
5db11c21
MM
26 break;
27 default:
8bb8aefd 28 gossip_err("orangefs_get_acl: bogus value of type %d\n", type);
5db11c21
MM
29 return ERR_PTR(-EINVAL);
30 }
31 /*
32 * Rather than incurring a network call just to determine the exact
33 * length of the attribute, I just allocate a max length to save on
34 * the network call. Conceivably, we could pass NULL to
8bb8aefd 35 * orangefs_inode_getxattr() to probe the length of the value, but
5db11c21
MM
36 * I don't do that for now.
37 */
8bb8aefd 38 value = kmalloc(ORANGEFS_MAX_XATTR_VALUELEN, GFP_KERNEL);
0b08273c 39 if (!value)
5db11c21
MM
40 return ERR_PTR(-ENOMEM);
41
42 gossip_debug(GOSSIP_ACL_DEBUG,
43 "inode %pU, key %s, type %d\n",
44 get_khandle_from_ino(inode),
45 key,
46 type);
d373a712
AG
47 ret = orangefs_inode_getxattr(inode, key, value,
48 ORANGEFS_MAX_XATTR_VALUELEN);
5db11c21
MM
49 /* if the key exists, convert it to an in-memory rep */
50 if (ret > 0) {
51 acl = posix_acl_from_xattr(&init_user_ns, value, ret);
52 } else if (ret == -ENODATA || ret == -ENOSYS) {
53 acl = NULL;
54 } else {
55 gossip_err("inode %pU retrieving acl's failed with error %d\n",
56 get_khandle_from_ino(inode),
57 ret);
58 acl = ERR_PTR(ret);
59 }
60 /* kfree(NULL) is safe, so don't worry if value ever got used */
61 kfree(value);
62 return acl;
63}
64
b5accbb0
JK
65static int __orangefs_set_acl(struct inode *inode, struct posix_acl *acl,
66 int type)
5db11c21 67{
5db11c21
MM
68 int error = 0;
69 void *value = NULL;
70 size_t size = 0;
71 const char *name = NULL;
72
73 switch (type) {
74 case ACL_TYPE_ACCESS:
972a7344 75 name = XATTR_NAME_POSIX_ACL_ACCESS;
5db11c21
MM
76 break;
77 case ACL_TYPE_DEFAULT:
972a7344 78 name = XATTR_NAME_POSIX_ACL_DEFAULT;
5db11c21
MM
79 break;
80 default:
81 gossip_err("%s: invalid type %d!\n", __func__, type);
82 return -EINVAL;
83 }
84
85 gossip_debug(GOSSIP_ACL_DEBUG,
86 "%s: inode %pU, key %s type %d\n",
87 __func__, get_khandle_from_ino(inode),
88 name,
89 type);
90
91 if (acl) {
92 size = posix_acl_xattr_size(acl->a_count);
93 value = kmalloc(size, GFP_KERNEL);
94 if (!value)
95 return -ENOMEM;
96
97 error = posix_acl_to_xattr(&init_user_ns, acl, value, size);
98 if (error < 0)
99 goto out;
100 }
101
102 gossip_debug(GOSSIP_ACL_DEBUG,
103 "%s: name %s, value %p, size %zd, acl %p\n",
104 __func__, name, value, size, acl);
105 /*
106 * Go ahead and set the extended attribute now. NOTE: Suppose acl
107 * was NULL, then value will be NULL and size will be 0 and that
108 * will xlate to a removexattr. However, we don't want removexattr
109 * complain if attributes does not exist.
110 */
d373a712 111 error = orangefs_inode_setxattr(inode, name, value, size, 0);
5db11c21
MM
112
113out:
114 kfree(value);
115 if (!error)
116 set_cached_acl(inode, type, acl);
117 return error;
118}
119
b5accbb0
JK
120int orangefs_set_acl(struct inode *inode, struct posix_acl *acl, int type)
121{
122 int error;
4bef6900
MM
123 struct iattr iattr;
124 int rc;
b5accbb0
JK
125
126 if (type == ACL_TYPE_ACCESS && acl) {
4bef6900
MM
127 /*
128 * posix_acl_update_mode checks to see if the permissions
129 * described by the ACL can be encoded into the
130 * object's mode. If so, it sets "acl" to NULL
131 * and "mode" to the new desired value. It is up to
132 * us to propagate the new mode back to the server...
133 */
134 error = posix_acl_update_mode(inode, &iattr.ia_mode, &acl);
b5accbb0
JK
135 if (error) {
136 gossip_err("%s: posix_acl_update_mode err: %d\n",
137 __func__,
138 error);
139 return error;
140 }
141
4bef6900
MM
142 if (acl) {
143 rc = __orangefs_set_acl(inode, acl, type);
144 } else {
145 iattr.ia_valid = ATTR_MODE;
146 rc = orangefs_inode_setattr(inode, &iattr);
147 }
148
149 return rc;
150
151 } else {
152 return -EINVAL;
b5accbb0 153 }
b5accbb0
JK
154}
155
8bb8aefd 156int orangefs_init_acl(struct inode *inode, struct inode *dir)
5db11c21 157{
8bb8aefd 158 struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
5db11c21
MM
159 struct posix_acl *default_acl, *acl;
160 umode_t mode = inode->i_mode;
161 int error = 0;
162
8bb8aefd 163 ClearModeFlag(orangefs_inode);
5db11c21
MM
164
165 error = posix_acl_create(dir, &mode, &default_acl, &acl);
166 if (error)
167 return error;
168
169 if (default_acl) {
b5accbb0
JK
170 error = __orangefs_set_acl(inode, default_acl,
171 ACL_TYPE_DEFAULT);
5db11c21
MM
172 posix_acl_release(default_acl);
173 }
174
175 if (acl) {
176 if (!error)
b5accbb0 177 error = __orangefs_set_acl(inode, acl, ACL_TYPE_ACCESS);
5db11c21
MM
178 posix_acl_release(acl);
179 }
180
181 /* If mode of the inode was changed, then do a forcible ->setattr */
182 if (mode != inode->i_mode) {
8bb8aefd 183 SetModeFlag(orangefs_inode);
5db11c21 184 inode->i_mode = mode;
8bb8aefd 185 orangefs_flush_inode(inode);
5db11c21
MM
186 }
187
188 return error;
189}