1 // SPDX-License-Identifier: GPL-2.0
3 * (C) 2001 Clemson University and The University of Chicago
5 * See COPYING in top-level directory.
9 #include "orangefs-kernel.h"
10 #include "orangefs-bufmap.h"
11 #include <linux/posix_acl_xattr.h>
13 struct posix_acl
*orangefs_get_acl(struct inode
*inode
, int type
)
15 struct posix_acl
*acl
;
17 char *key
= NULL
, *value
= NULL
;
21 key
= XATTR_NAME_POSIX_ACL_ACCESS
;
23 case ACL_TYPE_DEFAULT
:
24 key
= XATTR_NAME_POSIX_ACL_DEFAULT
;
27 gossip_err("orangefs_get_acl: bogus value of type %d\n", type
);
28 return ERR_PTR(-EINVAL
);
31 * Rather than incurring a network call just to determine the exact
32 * length of the attribute, I just allocate a max length to save on
33 * the network call. Conceivably, we could pass NULL to
34 * orangefs_inode_getxattr() to probe the length of the value, but
35 * I don't do that for now.
37 value
= kmalloc(ORANGEFS_MAX_XATTR_VALUELEN
, GFP_KERNEL
);
39 return ERR_PTR(-ENOMEM
);
41 gossip_debug(GOSSIP_ACL_DEBUG
,
42 "inode %pU, key %s, type %d\n",
43 get_khandle_from_ino(inode
),
46 ret
= orangefs_inode_getxattr(inode
, key
, value
,
47 ORANGEFS_MAX_XATTR_VALUELEN
);
48 /* if the key exists, convert it to an in-memory rep */
50 acl
= posix_acl_from_xattr(&init_user_ns
, value
, ret
);
51 } else if (ret
== -ENODATA
|| ret
== -ENOSYS
) {
54 gossip_err("inode %pU retrieving acl's failed with error %d\n",
55 get_khandle_from_ino(inode
),
59 /* kfree(NULL) is safe, so don't worry if value ever got used */
64 static int __orangefs_set_acl(struct inode
*inode
, struct posix_acl
*acl
,
70 const char *name
= NULL
;
74 name
= XATTR_NAME_POSIX_ACL_ACCESS
;
76 case ACL_TYPE_DEFAULT
:
77 name
= XATTR_NAME_POSIX_ACL_DEFAULT
;
80 gossip_err("%s: invalid type %d!\n", __func__
, type
);
84 gossip_debug(GOSSIP_ACL_DEBUG
,
85 "%s: inode %pU, key %s type %d\n",
86 __func__
, get_khandle_from_ino(inode
),
91 size
= posix_acl_xattr_size(acl
->a_count
);
92 value
= kmalloc(size
, GFP_KERNEL
);
96 error
= posix_acl_to_xattr(&init_user_ns
, acl
, value
, size
);
101 gossip_debug(GOSSIP_ACL_DEBUG
,
102 "%s: name %s, value %p, size %zd, acl %p\n",
103 __func__
, name
, value
, size
, acl
);
105 * Go ahead and set the extended attribute now. NOTE: Suppose acl
106 * was NULL, then value will be NULL and size will be 0 and that
107 * will xlate to a removexattr. However, we don't want removexattr
108 * complain if attributes does not exist.
110 error
= orangefs_inode_setxattr(inode
, name
, value
, size
, 0);
115 set_cached_acl(inode
, type
, acl
);
119 int orangefs_set_acl(struct inode
*inode
, struct posix_acl
*acl
, int type
)
125 if (type
== ACL_TYPE_ACCESS
&& acl
) {
127 * posix_acl_update_mode checks to see if the permissions
128 * described by the ACL can be encoded into the
129 * object's mode. If so, it sets "acl" to NULL
130 * and "mode" to the new desired value. It is up to
131 * us to propagate the new mode back to the server...
133 error
= posix_acl_update_mode(inode
, &iattr
.ia_mode
, &acl
);
135 gossip_err("%s: posix_acl_update_mode err: %d\n",
142 rc
= __orangefs_set_acl(inode
, acl
, type
);
144 iattr
.ia_valid
= ATTR_MODE
;
145 rc
= orangefs_inode_setattr(inode
, &iattr
);
155 int orangefs_init_acl(struct inode
*inode
, struct inode
*dir
)
157 struct posix_acl
*default_acl
, *acl
;
158 umode_t mode
= inode
->i_mode
;
162 error
= posix_acl_create(dir
, &mode
, &default_acl
, &acl
);
167 error
= __orangefs_set_acl(inode
, default_acl
,
169 posix_acl_release(default_acl
);
174 error
= __orangefs_set_acl(inode
, acl
, ACL_TYPE_ACCESS
);
175 posix_acl_release(acl
);
178 /* If mode of the inode was changed, then do a forcible ->setattr */
179 if (mode
!= inode
->i_mode
) {
180 memset(&iattr
, 0, sizeof iattr
);
181 inode
->i_mode
= mode
;
182 iattr
.ia_mode
= mode
;
183 iattr
.ia_valid
|= ATTR_MODE
;
184 orangefs_inode_setattr(inode
, &iattr
);