2010-09-27 20:57:39 +02:00
|
|
|
/*
|
|
|
|
* Copyright IBM Corporation, 2010
|
|
|
|
* Author Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of version 2.1 of the GNU Lesser General Public License
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it would be useful, but
|
|
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <net/9p/9p.h>
|
|
|
|
#include <net/9p/client.h>
|
|
|
|
#include <linux/slab.h>
|
2010-09-27 20:57:40 +02:00
|
|
|
#include <linux/sched.h>
|
2010-09-27 20:57:39 +02:00
|
|
|
#include <linux/posix_acl_xattr.h>
|
|
|
|
#include "xattr.h"
|
|
|
|
#include "acl.h"
|
2010-09-27 20:57:41 +02:00
|
|
|
#include "v9fs.h"
|
2011-02-28 12:34:01 +01:00
|
|
|
#include "v9fs_vfs.h"
|
2013-01-31 18:54:47 +01:00
|
|
|
#include "fid.h"
|
2010-09-27 20:57:39 +02:00
|
|
|
|
|
|
|
static struct posix_acl *__v9fs_get_acl(struct p9_fid *fid, char *name)
|
|
|
|
{
|
|
|
|
ssize_t size;
|
|
|
|
void *value = NULL;
|
2010-11-15 04:04:51 +01:00
|
|
|
struct posix_acl *acl = NULL;
|
2010-09-27 20:57:39 +02:00
|
|
|
|
|
|
|
size = v9fs_fid_xattr_get(fid, name, NULL, 0);
|
|
|
|
if (size > 0) {
|
|
|
|
value = kzalloc(size, GFP_NOFS);
|
|
|
|
if (!value)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
size = v9fs_fid_xattr_get(fid, name, value, size);
|
|
|
|
if (size > 0) {
|
2012-09-11 05:17:44 +02:00
|
|
|
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
2010-09-27 20:57:39 +02:00
|
|
|
if (IS_ERR(acl))
|
|
|
|
goto err_out;
|
|
|
|
}
|
|
|
|
} else if (size == -ENODATA || size == 0 ||
|
|
|
|
size == -ENOSYS || size == -EOPNOTSUPP) {
|
|
|
|
acl = NULL;
|
|
|
|
} else
|
|
|
|
acl = ERR_PTR(-EIO);
|
|
|
|
|
|
|
|
err_out:
|
|
|
|
kfree(value);
|
|
|
|
return acl;
|
|
|
|
}
|
|
|
|
|
|
|
|
int v9fs_get_acl(struct inode *inode, struct p9_fid *fid)
|
|
|
|
{
|
|
|
|
int retval = 0;
|
|
|
|
struct posix_acl *pacl, *dacl;
|
2010-09-27 20:57:41 +02:00
|
|
|
struct v9fs_session_info *v9ses;
|
2010-09-27 20:57:39 +02:00
|
|
|
|
2010-09-27 20:57:41 +02:00
|
|
|
v9ses = v9fs_inode2v9ses(inode);
|
2011-01-26 00:40:54 +01:00
|
|
|
if (((v9ses->flags & V9FS_ACCESS_MASK) != V9FS_ACCESS_CLIENT) ||
|
|
|
|
((v9ses->flags & V9FS_ACL_MASK) != V9FS_POSIX_ACL)) {
|
2010-09-27 20:57:41 +02:00
|
|
|
set_cached_acl(inode, ACL_TYPE_DEFAULT, NULL);
|
|
|
|
set_cached_acl(inode, ACL_TYPE_ACCESS, NULL);
|
|
|
|
return 0;
|
|
|
|
}
|
2010-09-27 20:57:39 +02:00
|
|
|
/* get the default/access acl values and cache them */
|
2015-12-02 14:44:35 +01:00
|
|
|
dacl = __v9fs_get_acl(fid, XATTR_NAME_POSIX_ACL_DEFAULT);
|
|
|
|
pacl = __v9fs_get_acl(fid, XATTR_NAME_POSIX_ACL_ACCESS);
|
2010-09-27 20:57:39 +02:00
|
|
|
|
|
|
|
if (!IS_ERR(dacl) && !IS_ERR(pacl)) {
|
|
|
|
set_cached_acl(inode, ACL_TYPE_DEFAULT, dacl);
|
|
|
|
set_cached_acl(inode, ACL_TYPE_ACCESS, pacl);
|
|
|
|
} else
|
|
|
|
retval = -EIO;
|
|
|
|
|
2011-01-14 00:28:39 +01:00
|
|
|
if (!IS_ERR(dacl))
|
|
|
|
posix_acl_release(dacl);
|
|
|
|
|
|
|
|
if (!IS_ERR(pacl))
|
|
|
|
posix_acl_release(pacl);
|
|
|
|
|
2010-09-27 20:57:39 +02:00
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct posix_acl *v9fs_get_cached_acl(struct inode *inode, int type)
|
|
|
|
{
|
|
|
|
struct posix_acl *acl;
|
|
|
|
/*
|
|
|
|
* 9p Always cache the acl value when
|
|
|
|
* instantiating the inode (v9fs_inode_from_fid)
|
|
|
|
*/
|
|
|
|
acl = get_cached_acl(inode, type);
|
2016-03-24 14:38:37 +01:00
|
|
|
BUG_ON(is_uncached_acl(acl));
|
2010-09-27 20:57:39 +02:00
|
|
|
return acl;
|
|
|
|
}
|
|
|
|
|
2011-07-23 17:37:31 +02:00
|
|
|
struct posix_acl *v9fs_iop_get_acl(struct inode *inode, int type)
|
2010-09-27 20:57:39 +02:00
|
|
|
{
|
2010-09-27 20:57:41 +02:00
|
|
|
struct v9fs_session_info *v9ses;
|
|
|
|
|
|
|
|
v9ses = v9fs_inode2v9ses(inode);
|
2011-01-26 00:40:54 +01:00
|
|
|
if (((v9ses->flags & V9FS_ACCESS_MASK) != V9FS_ACCESS_CLIENT) ||
|
|
|
|
((v9ses->flags & V9FS_ACL_MASK) != V9FS_POSIX_ACL)) {
|
2010-09-27 20:57:41 +02:00
|
|
|
/*
|
2011-01-26 00:40:54 +01:00
|
|
|
* On access = client and acl = on mode get the acl
|
2010-09-27 20:57:41 +02:00
|
|
|
* values from the server
|
|
|
|
*/
|
2011-07-23 17:37:31 +02:00
|
|
|
return NULL;
|
2010-09-27 20:57:41 +02:00
|
|
|
}
|
2011-07-23 17:37:31 +02:00
|
|
|
return v9fs_get_cached_acl(inode, type);
|
|
|
|
|
2010-09-27 20:57:39 +02:00
|
|
|
}
|
2010-09-27 20:57:39 +02:00
|
|
|
|
2013-01-31 18:54:47 +01:00
|
|
|
static int v9fs_set_acl(struct p9_fid *fid, int type, struct posix_acl *acl)
|
2010-09-27 20:57:40 +02:00
|
|
|
{
|
|
|
|
int retval;
|
|
|
|
char *name;
|
|
|
|
size_t size;
|
|
|
|
void *buffer;
|
2011-01-14 01:33:00 +01:00
|
|
|
if (!acl)
|
|
|
|
return 0;
|
|
|
|
|
2010-09-27 20:57:40 +02:00
|
|
|
/* Set a setxattr request to server */
|
|
|
|
size = posix_acl_xattr_size(acl->a_count);
|
|
|
|
buffer = kmalloc(size, GFP_KERNEL);
|
|
|
|
if (!buffer)
|
|
|
|
return -ENOMEM;
|
2012-09-11 05:17:44 +02:00
|
|
|
retval = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
|
2010-09-27 20:57:40 +02:00
|
|
|
if (retval < 0)
|
|
|
|
goto err_free_out;
|
|
|
|
switch (type) {
|
|
|
|
case ACL_TYPE_ACCESS:
|
2015-12-02 14:44:35 +01:00
|
|
|
name = XATTR_NAME_POSIX_ACL_ACCESS;
|
2010-09-27 20:57:40 +02:00
|
|
|
break;
|
|
|
|
case ACL_TYPE_DEFAULT:
|
2015-12-02 14:44:35 +01:00
|
|
|
name = XATTR_NAME_POSIX_ACL_DEFAULT;
|
2010-09-27 20:57:40 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
BUG();
|
|
|
|
}
|
2013-01-31 18:54:47 +01:00
|
|
|
retval = v9fs_fid_xattr_set(fid, name, buffer, size, 0);
|
2010-09-27 20:57:40 +02:00
|
|
|
err_free_out:
|
|
|
|
kfree(buffer);
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2013-01-31 18:58:16 +01:00
|
|
|
int v9fs_acl_chmod(struct inode *inode, struct p9_fid *fid)
|
2010-09-27 20:57:40 +02:00
|
|
|
{
|
|
|
|
int retval = 0;
|
2011-07-23 06:18:02 +02:00
|
|
|
struct posix_acl *acl;
|
2010-09-27 20:57:40 +02:00
|
|
|
|
|
|
|
if (S_ISLNK(inode->i_mode))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
acl = v9fs_get_cached_acl(inode, ACL_TYPE_ACCESS);
|
|
|
|
if (acl) {
|
2013-12-20 14:16:41 +01:00
|
|
|
retval = __posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
|
2011-07-23 06:18:02 +02:00
|
|
|
if (retval)
|
|
|
|
return retval;
|
2013-01-31 18:46:55 +01:00
|
|
|
set_cached_acl(inode, ACL_TYPE_ACCESS, acl);
|
2013-01-31 18:54:47 +01:00
|
|
|
retval = v9fs_set_acl(fid, ACL_TYPE_ACCESS, acl);
|
2010-09-27 20:57:40 +02:00
|
|
|
posix_acl_release(acl);
|
|
|
|
}
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2013-01-31 19:45:39 +01:00
|
|
|
int v9fs_set_create_acl(struct inode *inode, struct p9_fid *fid,
|
2013-01-31 19:31:23 +01:00
|
|
|
struct posix_acl *dacl, struct posix_acl *acl)
|
2010-09-27 20:57:40 +02:00
|
|
|
{
|
2013-01-31 19:45:39 +01:00
|
|
|
set_cached_acl(inode, ACL_TYPE_DEFAULT, dacl);
|
|
|
|
set_cached_acl(inode, ACL_TYPE_ACCESS, acl);
|
|
|
|
v9fs_set_acl(fid, ACL_TYPE_DEFAULT, dacl);
|
|
|
|
v9fs_set_acl(fid, ACL_TYPE_ACCESS, acl);
|
2010-09-27 20:57:40 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-01-31 19:31:23 +01:00
|
|
|
void v9fs_put_acl(struct posix_acl *dacl,
|
|
|
|
struct posix_acl *acl)
|
|
|
|
{
|
|
|
|
posix_acl_release(dacl);
|
|
|
|
posix_acl_release(acl);
|
|
|
|
}
|
|
|
|
|
2011-07-24 00:37:50 +02:00
|
|
|
int v9fs_acl_mode(struct inode *dir, umode_t *modep,
|
2010-09-27 20:57:40 +02:00
|
|
|
struct posix_acl **dpacl, struct posix_acl **pacl)
|
|
|
|
{
|
|
|
|
int retval = 0;
|
2011-07-24 00:37:50 +02:00
|
|
|
umode_t mode = *modep;
|
2010-09-27 20:57:40 +02:00
|
|
|
struct posix_acl *acl = NULL;
|
|
|
|
|
|
|
|
if (!S_ISLNK(mode)) {
|
|
|
|
acl = v9fs_get_cached_acl(dir, ACL_TYPE_DEFAULT);
|
|
|
|
if (IS_ERR(acl))
|
|
|
|
return PTR_ERR(acl);
|
|
|
|
if (!acl)
|
|
|
|
mode &= ~current_umask();
|
|
|
|
}
|
|
|
|
if (acl) {
|
|
|
|
if (S_ISDIR(mode))
|
2011-07-23 08:28:13 +02:00
|
|
|
*dpacl = posix_acl_dup(acl);
|
2013-12-20 14:16:42 +01:00
|
|
|
retval = __posix_acl_create(&acl, GFP_NOFS, &mode);
|
2011-07-23 09:10:32 +02:00
|
|
|
if (retval < 0)
|
|
|
|
return retval;
|
2010-09-27 20:57:40 +02:00
|
|
|
if (retval > 0)
|
2011-07-23 09:10:32 +02:00
|
|
|
*pacl = acl;
|
2011-07-23 08:28:13 +02:00
|
|
|
else
|
2011-07-23 09:10:32 +02:00
|
|
|
posix_acl_release(acl);
|
2010-09-27 20:57:40 +02:00
|
|
|
}
|
|
|
|
*modep = mode;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-10-04 19:18:51 +02:00
|
|
|
static int v9fs_xattr_get_acl(const struct xattr_handler *handler,
|
2016-04-11 02:48:24 +02:00
|
|
|
struct dentry *dentry, struct inode *inode,
|
|
|
|
const char *name, void *buffer, size_t size)
|
2010-09-27 20:57:39 +02:00
|
|
|
{
|
2010-09-27 20:57:41 +02:00
|
|
|
struct v9fs_session_info *v9ses;
|
2010-09-27 20:57:39 +02:00
|
|
|
struct posix_acl *acl;
|
|
|
|
int error;
|
|
|
|
|
2011-03-08 12:09:50 +01:00
|
|
|
v9ses = v9fs_dentry2v9ses(dentry);
|
2010-09-27 20:57:41 +02:00
|
|
|
/*
|
|
|
|
* We allow set/get/list of acl when access=client is not specified
|
|
|
|
*/
|
|
|
|
if ((v9ses->flags & V9FS_ACCESS_MASK) != V9FS_ACCESS_CLIENT)
|
2015-12-02 14:44:36 +01:00
|
|
|
return v9fs_xattr_get(dentry, handler->name, buffer, size);
|
2010-09-27 20:57:41 +02:00
|
|
|
|
2016-04-11 02:48:24 +02:00
|
|
|
acl = v9fs_get_cached_acl(inode, handler->flags);
|
2010-09-27 20:57:39 +02:00
|
|
|
if (IS_ERR(acl))
|
|
|
|
return PTR_ERR(acl);
|
|
|
|
if (acl == NULL)
|
|
|
|
return -ENODATA;
|
2012-09-11 05:17:44 +02:00
|
|
|
error = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
|
2010-09-27 20:57:39 +02:00
|
|
|
posix_acl_release(acl);
|
|
|
|
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
2015-10-04 19:18:51 +02:00
|
|
|
static int v9fs_xattr_set_acl(const struct xattr_handler *handler,
|
2016-05-27 16:19:30 +02:00
|
|
|
struct dentry *dentry, struct inode *inode,
|
|
|
|
const char *name, const void *value,
|
|
|
|
size_t size, int flags)
|
2010-09-27 20:57:39 +02:00
|
|
|
{
|
2010-09-27 20:57:40 +02:00
|
|
|
int retval;
|
|
|
|
struct posix_acl *acl;
|
2010-09-27 20:57:41 +02:00
|
|
|
struct v9fs_session_info *v9ses;
|
2010-09-27 20:57:40 +02:00
|
|
|
|
2011-03-08 12:09:50 +01:00
|
|
|
v9ses = v9fs_dentry2v9ses(dentry);
|
2010-09-27 20:57:41 +02:00
|
|
|
/*
|
|
|
|
* set the attribute on the remote. Without even looking at the
|
|
|
|
* xattr value. We leave it to the server to validate
|
|
|
|
*/
|
|
|
|
if ((v9ses->flags & V9FS_ACCESS_MASK) != V9FS_ACCESS_CLIENT)
|
2015-12-02 14:44:36 +01:00
|
|
|
return v9fs_xattr_set(dentry, handler->name, value, size,
|
2015-10-04 19:18:52 +02:00
|
|
|
flags);
|
2010-09-27 20:57:41 +02:00
|
|
|
|
2010-09-27 20:57:40 +02:00
|
|
|
if (S_ISLNK(inode->i_mode))
|
|
|
|
return -EOPNOTSUPP;
|
2011-03-24 00:43:26 +01:00
|
|
|
if (!inode_owner_or_capable(inode))
|
2010-09-27 20:57:40 +02:00
|
|
|
return -EPERM;
|
|
|
|
if (value) {
|
|
|
|
/* update the cached acl value */
|
2012-09-11 05:17:44 +02:00
|
|
|
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
2010-09-27 20:57:40 +02:00
|
|
|
if (IS_ERR(acl))
|
|
|
|
return PTR_ERR(acl);
|
|
|
|
else if (acl) {
|
2016-06-27 23:04:06 +02:00
|
|
|
retval = posix_acl_valid(inode->i_sb->s_user_ns, acl);
|
2010-09-27 20:57:40 +02:00
|
|
|
if (retval)
|
|
|
|
goto err_out;
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
acl = NULL;
|
|
|
|
|
2015-10-04 19:18:51 +02:00
|
|
|
switch (handler->flags) {
|
2010-09-27 20:57:40 +02:00
|
|
|
case ACL_TYPE_ACCESS:
|
|
|
|
if (acl) {
|
2011-07-24 00:56:36 +02:00
|
|
|
umode_t mode = inode->i_mode;
|
2010-09-27 20:57:40 +02:00
|
|
|
retval = posix_acl_equiv_mode(acl, &mode);
|
|
|
|
if (retval < 0)
|
|
|
|
goto err_out;
|
|
|
|
else {
|
|
|
|
struct iattr iattr;
|
|
|
|
if (retval == 0) {
|
|
|
|
/*
|
|
|
|
* ACL can be represented
|
|
|
|
* by the mode bits. So don't
|
|
|
|
* update ACL.
|
|
|
|
*/
|
|
|
|
acl = NULL;
|
|
|
|
value = NULL;
|
|
|
|
size = 0;
|
|
|
|
}
|
|
|
|
/* Updte the mode bits */
|
|
|
|
iattr.ia_mode = ((mode & S_IALLUGO) |
|
|
|
|
(inode->i_mode & ~S_IALLUGO));
|
|
|
|
iattr.ia_valid = ATTR_MODE;
|
|
|
|
/* FIXME should we update ctime ?
|
|
|
|
* What is the following setxattr update the
|
|
|
|
* mode ?
|
|
|
|
*/
|
|
|
|
v9fs_vfs_setattr_dotl(dentry, &iattr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ACL_TYPE_DEFAULT:
|
|
|
|
if (!S_ISDIR(inode->i_mode)) {
|
2010-12-10 07:49:31 +01:00
|
|
|
retval = acl ? -EINVAL : 0;
|
2010-09-27 20:57:40 +02:00
|
|
|
goto err_out;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
BUG();
|
|
|
|
}
|
2015-12-02 14:44:36 +01:00
|
|
|
retval = v9fs_xattr_set(dentry, handler->name, value, size, flags);
|
2010-09-27 20:57:40 +02:00
|
|
|
if (!retval)
|
2015-10-04 19:18:51 +02:00
|
|
|
set_cached_acl(inode, handler->flags, acl);
|
2010-09-27 20:57:40 +02:00
|
|
|
err_out:
|
|
|
|
posix_acl_release(acl);
|
|
|
|
return retval;
|
2010-09-27 20:57:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
const struct xattr_handler v9fs_xattr_acl_access_handler = {
|
2015-12-02 14:44:36 +01:00
|
|
|
.name = XATTR_NAME_POSIX_ACL_ACCESS,
|
2010-09-27 20:57:39 +02:00
|
|
|
.flags = ACL_TYPE_ACCESS,
|
|
|
|
.get = v9fs_xattr_get_acl,
|
|
|
|
.set = v9fs_xattr_set_acl,
|
|
|
|
};
|
|
|
|
|
|
|
|
const struct xattr_handler v9fs_xattr_acl_default_handler = {
|
2015-12-02 14:44:36 +01:00
|
|
|
.name = XATTR_NAME_POSIX_ACL_DEFAULT,
|
2010-09-27 20:57:39 +02:00
|
|
|
.flags = ACL_TYPE_DEFAULT,
|
|
|
|
.get = v9fs_xattr_get_acl,
|
|
|
|
.set = v9fs_xattr_set_acl,
|
|
|
|
};
|