mirror of
https://github.com/torvalds/linux.git
synced 2024-11-10 14:11:52 +00:00
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs
Pull vfs updates from Al Viro: "Assorted stuff; the biggest pile here is Christoph's ACL series. Plus assorted cleanups and fixes all over the place... There will be another pile later this week" * 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs: (43 commits) __dentry_path() fixes vfs: Remove second variable named error in __dentry_path vfs: Is mounted should be testing mnt_ns for NULL or error. Fix race when checking i_size on direct i/o read hfsplus: remove can_set_xattr nfsd: use get_acl and ->set_acl fs: remove generic_acl nfs: use generic posix ACL infrastructure for v3 Posix ACLs gfs2: use generic posix ACL infrastructure jfs: use generic posix ACL infrastructure xfs: use generic posix ACL infrastructure reiserfs: use generic posix ACL infrastructure ocfs2: use generic posix ACL infrastructure jffs2: use generic posix ACL infrastructure hfsplus: use generic posix ACL infrastructure f2fs: use generic posix ACL infrastructure ext2/3/4: use generic posix ACL infrastructure btrfs: use generic posix ACL infrastructure fs: make posix_acl_create more useful fs: make posix_acl_chmod more useful ...
This commit is contained in:
commit
bf3d846b78
@ -17,7 +17,7 @@
|
||||
#ifdef CONFIG_MTD_UCLINUX
|
||||
#include <linux/mtd/map.h>
|
||||
#include <linux/ext2_fs.h>
|
||||
#include <linux/cramfs_fs.h>
|
||||
#include <uapi/linux/cramfs_fs.h>
|
||||
#include <linux/romfs_fs.h>
|
||||
#endif
|
||||
|
||||
|
@ -24,8 +24,6 @@
|
||||
#include <linux/mtd/mtdram.h>
|
||||
#include <linux/mtd/partitions.h>
|
||||
|
||||
#include <linux/cramfs_fs.h>
|
||||
|
||||
#include <asm/axisflashmap.h>
|
||||
#include <asm/mmu.h>
|
||||
|
||||
|
@ -156,7 +156,7 @@ int v9fs_acl_chmod(struct inode *inode, struct p9_fid *fid)
|
||||
return -EOPNOTSUPP;
|
||||
acl = v9fs_get_cached_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (acl) {
|
||||
retval = posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
|
||||
retval = __posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
|
||||
if (retval)
|
||||
return retval;
|
||||
set_cached_acl(inode, ACL_TYPE_ACCESS, acl);
|
||||
@ -200,7 +200,7 @@ int v9fs_acl_mode(struct inode *dir, umode_t *modep,
|
||||
if (acl) {
|
||||
if (S_ISDIR(mode))
|
||||
*dpacl = posix_acl_dup(acl);
|
||||
retval = posix_acl_create(&acl, GFP_NOFS, &mode);
|
||||
retval = __posix_acl_create(&acl, GFP_NOFS, &mode);
|
||||
if (retval < 0)
|
||||
return retval;
|
||||
if (retval > 0)
|
||||
|
@ -68,10 +68,6 @@ source "fs/quota/Kconfig"
|
||||
source "fs/autofs4/Kconfig"
|
||||
source "fs/fuse/Kconfig"
|
||||
|
||||
config GENERIC_ACL
|
||||
bool
|
||||
select FS_POSIX_ACL
|
||||
|
||||
menu "Caches"
|
||||
|
||||
source "fs/fscache/Kconfig"
|
||||
@ -119,7 +115,7 @@ config TMPFS_POSIX_ACL
|
||||
bool "Tmpfs POSIX Access Control Lists"
|
||||
depends on TMPFS
|
||||
select TMPFS_XATTR
|
||||
select GENERIC_ACL
|
||||
select FS_POSIX_ACL
|
||||
help
|
||||
POSIX Access Control Lists (ACLs) support additional access rights
|
||||
for users and groups beyond the standard owner/group/world scheme,
|
||||
|
@ -42,9 +42,8 @@ obj-$(CONFIG_BINFMT_SOM) += binfmt_som.o
|
||||
obj-$(CONFIG_BINFMT_FLAT) += binfmt_flat.o
|
||||
|
||||
obj-$(CONFIG_FS_MBCACHE) += mbcache.o
|
||||
obj-$(CONFIG_FS_POSIX_ACL) += posix_acl.o xattr_acl.o
|
||||
obj-$(CONFIG_FS_POSIX_ACL) += posix_acl.o
|
||||
obj-$(CONFIG_NFS_COMMON) += nfs_common/
|
||||
obj-$(CONFIG_GENERIC_ACL) += generic_acl.o
|
||||
obj-$(CONFIG_COREDUMP) += coredump.o
|
||||
obj-$(CONFIG_SYSCTL) += drop_caches.o
|
||||
|
||||
|
@ -49,11 +49,6 @@ affs_put_super(struct super_block *sb)
|
||||
pr_debug("AFFS: put_super()\n");
|
||||
|
||||
cancel_delayed_work_sync(&sbi->sb_work);
|
||||
kfree(sbi->s_prefix);
|
||||
affs_free_bitmap(sb);
|
||||
affs_brelse(sbi->s_root_bh);
|
||||
kfree(sbi);
|
||||
sb->s_fs_info = NULL;
|
||||
}
|
||||
|
||||
static int
|
||||
@ -316,7 +311,7 @@ static int affs_fill_super(struct super_block *sb, void *data, int silent)
|
||||
unsigned long mount_flags;
|
||||
int tmp_flags; /* fix remount prototype... */
|
||||
u8 sig[4];
|
||||
int ret = -EINVAL;
|
||||
int ret;
|
||||
|
||||
save_mount_options(sb, data);
|
||||
|
||||
@ -412,17 +407,19 @@ static int affs_fill_super(struct super_block *sb, void *data, int silent)
|
||||
if (!silent)
|
||||
printk(KERN_ERR "AFFS: No valid root block on device %s\n",
|
||||
sb->s_id);
|
||||
goto out_error;
|
||||
return -EINVAL;
|
||||
|
||||
/* N.B. after this point bh must be released */
|
||||
got_root:
|
||||
/* Keep super block in cache */
|
||||
sbi->s_root_bh = root_bh;
|
||||
root_block = sbi->s_root_block;
|
||||
|
||||
/* Find out which kind of FS we have */
|
||||
boot_bh = sb_bread(sb, 0);
|
||||
if (!boot_bh) {
|
||||
printk(KERN_ERR "AFFS: Cannot read boot block\n");
|
||||
goto out_error;
|
||||
return -EINVAL;
|
||||
}
|
||||
memcpy(sig, boot_bh->b_data, 4);
|
||||
brelse(boot_bh);
|
||||
@ -471,7 +468,7 @@ got_root:
|
||||
default:
|
||||
printk(KERN_ERR "AFFS: Unknown filesystem on device %s: %08X\n",
|
||||
sb->s_id, chksum);
|
||||
goto out_error;
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (mount_flags & SF_VERBOSE) {
|
||||
@ -488,22 +485,17 @@ got_root:
|
||||
if (sbi->s_flags & SF_OFS)
|
||||
sbi->s_data_blksize -= 24;
|
||||
|
||||
/* Keep super block in cache */
|
||||
sbi->s_root_bh = root_bh;
|
||||
/* N.B. after this point s_root_bh must be released */
|
||||
|
||||
tmp_flags = sb->s_flags;
|
||||
if (affs_init_bitmap(sb, &tmp_flags))
|
||||
goto out_error;
|
||||
ret = affs_init_bitmap(sb, &tmp_flags);
|
||||
if (ret)
|
||||
return ret;
|
||||
sb->s_flags = tmp_flags;
|
||||
|
||||
/* set up enough so that it can read an inode */
|
||||
|
||||
root_inode = affs_iget(sb, root_block);
|
||||
if (IS_ERR(root_inode)) {
|
||||
ret = PTR_ERR(root_inode);
|
||||
goto out_error;
|
||||
}
|
||||
if (IS_ERR(root_inode))
|
||||
return PTR_ERR(root_inode);
|
||||
|
||||
if (AFFS_SB(sb)->s_flags & SF_INTL)
|
||||
sb->s_d_op = &affs_intl_dentry_operations;
|
||||
@ -513,22 +505,11 @@ got_root:
|
||||
sb->s_root = d_make_root(root_inode);
|
||||
if (!sb->s_root) {
|
||||
printk(KERN_ERR "AFFS: Get root inode failed\n");
|
||||
goto out_error;
|
||||
return -ENOMEM;
|
||||
}
|
||||
|
||||
pr_debug("AFFS: s_flags=%lX\n",sb->s_flags);
|
||||
return 0;
|
||||
|
||||
/*
|
||||
* Begin the cascaded cleanup ...
|
||||
*/
|
||||
out_error:
|
||||
kfree(sbi->s_bitmap);
|
||||
affs_brelse(root_bh);
|
||||
kfree(sbi->s_prefix);
|
||||
kfree(sbi);
|
||||
sb->s_fs_info = NULL;
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int
|
||||
@ -615,11 +596,23 @@ static struct dentry *affs_mount(struct file_system_type *fs_type,
|
||||
return mount_bdev(fs_type, flags, dev_name, data, affs_fill_super);
|
||||
}
|
||||
|
||||
static void affs_kill_sb(struct super_block *sb)
|
||||
{
|
||||
struct affs_sb_info *sbi = AFFS_SB(sb);
|
||||
kill_block_super(sb);
|
||||
if (sbi) {
|
||||
affs_free_bitmap(sb);
|
||||
affs_brelse(sbi->s_root_bh);
|
||||
kfree(sbi->s_prefix);
|
||||
kfree(sbi);
|
||||
}
|
||||
}
|
||||
|
||||
static struct file_system_type affs_fs_type = {
|
||||
.owner = THIS_MODULE,
|
||||
.name = "affs",
|
||||
.mount = affs_mount,
|
||||
.kill_sb = kill_block_super,
|
||||
.kill_sb = affs_kill_sb,
|
||||
.fs_flags = FS_REQUIRES_DEV,
|
||||
};
|
||||
MODULE_ALIAS_FS("affs");
|
||||
|
@ -195,7 +195,6 @@ struct afs_cell {
|
||||
struct list_head link; /* main cell list link */
|
||||
struct key *anonymous_key; /* anonymous user key for this cell */
|
||||
struct list_head proc_link; /* /proc cell list link */
|
||||
struct proc_dir_entry *proc_dir; /* /proc dir for this cell */
|
||||
#ifdef CONFIG_AFS_FSCACHE
|
||||
struct fscache_cookie *cache; /* caching cookie */
|
||||
#endif
|
||||
|
122
fs/afs/proc.c
122
fs/afs/proc.c
@ -41,11 +41,8 @@ static const struct file_operations afs_proc_cells_fops = {
|
||||
.write = afs_proc_cells_write,
|
||||
.llseek = seq_lseek,
|
||||
.release = seq_release,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int afs_proc_rootcell_open(struct inode *inode, struct file *file);
|
||||
static int afs_proc_rootcell_release(struct inode *inode, struct file *file);
|
||||
static ssize_t afs_proc_rootcell_read(struct file *file, char __user *buf,
|
||||
size_t size, loff_t *_pos);
|
||||
static ssize_t afs_proc_rootcell_write(struct file *file,
|
||||
@ -53,17 +50,12 @@ static ssize_t afs_proc_rootcell_write(struct file *file,
|
||||
size_t size, loff_t *_pos);
|
||||
|
||||
static const struct file_operations afs_proc_rootcell_fops = {
|
||||
.open = afs_proc_rootcell_open,
|
||||
.read = afs_proc_rootcell_read,
|
||||
.write = afs_proc_rootcell_write,
|
||||
.llseek = no_llseek,
|
||||
.release = afs_proc_rootcell_release,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int afs_proc_cell_volumes_open(struct inode *inode, struct file *file);
|
||||
static int afs_proc_cell_volumes_release(struct inode *inode,
|
||||
struct file *file);
|
||||
static void *afs_proc_cell_volumes_start(struct seq_file *p, loff_t *pos);
|
||||
static void *afs_proc_cell_volumes_next(struct seq_file *p, void *v,
|
||||
loff_t *pos);
|
||||
@ -81,14 +73,11 @@ static const struct file_operations afs_proc_cell_volumes_fops = {
|
||||
.open = afs_proc_cell_volumes_open,
|
||||
.read = seq_read,
|
||||
.llseek = seq_lseek,
|
||||
.release = afs_proc_cell_volumes_release,
|
||||
.owner = THIS_MODULE,
|
||||
.release = seq_release,
|
||||
};
|
||||
|
||||
static int afs_proc_cell_vlservers_open(struct inode *inode,
|
||||
struct file *file);
|
||||
static int afs_proc_cell_vlservers_release(struct inode *inode,
|
||||
struct file *file);
|
||||
static void *afs_proc_cell_vlservers_start(struct seq_file *p, loff_t *pos);
|
||||
static void *afs_proc_cell_vlservers_next(struct seq_file *p, void *v,
|
||||
loff_t *pos);
|
||||
@ -106,13 +95,10 @@ static const struct file_operations afs_proc_cell_vlservers_fops = {
|
||||
.open = afs_proc_cell_vlservers_open,
|
||||
.read = seq_read,
|
||||
.llseek = seq_lseek,
|
||||
.release = afs_proc_cell_vlservers_release,
|
||||
.owner = THIS_MODULE,
|
||||
.release = seq_release,
|
||||
};
|
||||
|
||||
static int afs_proc_cell_servers_open(struct inode *inode, struct file *file);
|
||||
static int afs_proc_cell_servers_release(struct inode *inode,
|
||||
struct file *file);
|
||||
static void *afs_proc_cell_servers_start(struct seq_file *p, loff_t *pos);
|
||||
static void *afs_proc_cell_servers_next(struct seq_file *p, void *v,
|
||||
loff_t *pos);
|
||||
@ -130,8 +116,7 @@ static const struct file_operations afs_proc_cell_servers_fops = {
|
||||
.open = afs_proc_cell_servers_open,
|
||||
.read = seq_read,
|
||||
.llseek = seq_lseek,
|
||||
.release = afs_proc_cell_servers_release,
|
||||
.owner = THIS_MODULE,
|
||||
.release = seq_release,
|
||||
};
|
||||
|
||||
/*
|
||||
@ -139,29 +124,21 @@ static const struct file_operations afs_proc_cell_servers_fops = {
|
||||
*/
|
||||
int afs_proc_init(void)
|
||||
{
|
||||
struct proc_dir_entry *p;
|
||||
|
||||
_enter("");
|
||||
|
||||
proc_afs = proc_mkdir("fs/afs", NULL);
|
||||
if (!proc_afs)
|
||||
goto error_dir;
|
||||
|
||||
p = proc_create("cells", 0, proc_afs, &afs_proc_cells_fops);
|
||||
if (!p)
|
||||
goto error_cells;
|
||||
|
||||
p = proc_create("rootcell", 0, proc_afs, &afs_proc_rootcell_fops);
|
||||
if (!p)
|
||||
goto error_rootcell;
|
||||
if (!proc_create("cells", 0, proc_afs, &afs_proc_cells_fops) ||
|
||||
!proc_create("rootcell", 0, proc_afs, &afs_proc_rootcell_fops))
|
||||
goto error_tree;
|
||||
|
||||
_leave(" = 0");
|
||||
return 0;
|
||||
|
||||
error_rootcell:
|
||||
remove_proc_entry("cells", proc_afs);
|
||||
error_cells:
|
||||
remove_proc_entry("fs/afs", NULL);
|
||||
error_tree:
|
||||
remove_proc_subtree("fs/afs", NULL);
|
||||
error_dir:
|
||||
_leave(" = -ENOMEM");
|
||||
return -ENOMEM;
|
||||
@ -172,9 +149,7 @@ error_dir:
|
||||
*/
|
||||
void afs_proc_cleanup(void)
|
||||
{
|
||||
remove_proc_entry("rootcell", proc_afs);
|
||||
remove_proc_entry("cells", proc_afs);
|
||||
remove_proc_entry("fs/afs", NULL);
|
||||
remove_proc_subtree("fs/afs", NULL);
|
||||
}
|
||||
|
||||
/*
|
||||
@ -319,19 +294,6 @@ inval:
|
||||
goto done;
|
||||
}
|
||||
|
||||
/*
|
||||
* Stubs for /proc/fs/afs/rootcell
|
||||
*/
|
||||
static int afs_proc_rootcell_open(struct inode *inode, struct file *file)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int afs_proc_rootcell_release(struct inode *inode, struct file *file)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static ssize_t afs_proc_rootcell_read(struct file *file, char __user *buf,
|
||||
size_t size, loff_t *_pos)
|
||||
{
|
||||
@ -387,38 +349,27 @@ nomem:
|
||||
*/
|
||||
int afs_proc_cell_setup(struct afs_cell *cell)
|
||||
{
|
||||
struct proc_dir_entry *p;
|
||||
struct proc_dir_entry *dir;
|
||||
|
||||
_enter("%p{%s}", cell, cell->name);
|
||||
|
||||
cell->proc_dir = proc_mkdir(cell->name, proc_afs);
|
||||
if (!cell->proc_dir)
|
||||
dir = proc_mkdir(cell->name, proc_afs);
|
||||
if (!dir)
|
||||
goto error_dir;
|
||||
|
||||
p = proc_create_data("servers", 0, cell->proc_dir,
|
||||
&afs_proc_cell_servers_fops, cell);
|
||||
if (!p)
|
||||
goto error_servers;
|
||||
|
||||
p = proc_create_data("vlservers", 0, cell->proc_dir,
|
||||
&afs_proc_cell_vlservers_fops, cell);
|
||||
if (!p)
|
||||
goto error_vlservers;
|
||||
|
||||
p = proc_create_data("volumes", 0, cell->proc_dir,
|
||||
&afs_proc_cell_volumes_fops, cell);
|
||||
if (!p)
|
||||
goto error_volumes;
|
||||
if (!proc_create_data("servers", 0, dir,
|
||||
&afs_proc_cell_servers_fops, cell) ||
|
||||
!proc_create_data("vlservers", 0, dir,
|
||||
&afs_proc_cell_vlservers_fops, cell) ||
|
||||
!proc_create_data("volumes", 0, dir,
|
||||
&afs_proc_cell_volumes_fops, cell))
|
||||
goto error_tree;
|
||||
|
||||
_leave(" = 0");
|
||||
return 0;
|
||||
|
||||
error_volumes:
|
||||
remove_proc_entry("vlservers", cell->proc_dir);
|
||||
error_vlservers:
|
||||
remove_proc_entry("servers", cell->proc_dir);
|
||||
error_servers:
|
||||
remove_proc_entry(cell->name, proc_afs);
|
||||
error_tree:
|
||||
remove_proc_subtree(cell->name, proc_afs);
|
||||
error_dir:
|
||||
_leave(" = -ENOMEM");
|
||||
return -ENOMEM;
|
||||
@ -431,10 +382,7 @@ void afs_proc_cell_remove(struct afs_cell *cell)
|
||||
{
|
||||
_enter("");
|
||||
|
||||
remove_proc_entry("volumes", cell->proc_dir);
|
||||
remove_proc_entry("vlservers", cell->proc_dir);
|
||||
remove_proc_entry("servers", cell->proc_dir);
|
||||
remove_proc_entry(cell->name, proc_afs);
|
||||
remove_proc_subtree(cell->name, proc_afs);
|
||||
|
||||
_leave("");
|
||||
}
|
||||
@ -462,14 +410,6 @@ static int afs_proc_cell_volumes_open(struct inode *inode, struct file *file)
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* close the file and release the ref to the cell
|
||||
*/
|
||||
static int afs_proc_cell_volumes_release(struct inode *inode, struct file *file)
|
||||
{
|
||||
return seq_release(inode, file);
|
||||
}
|
||||
|
||||
/*
|
||||
* set up the iterator to start reading from the cells list and return the
|
||||
* first item
|
||||
@ -568,15 +508,6 @@ static int afs_proc_cell_vlservers_open(struct inode *inode, struct file *file)
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* close the file and release the ref to the cell
|
||||
*/
|
||||
static int afs_proc_cell_vlservers_release(struct inode *inode,
|
||||
struct file *file)
|
||||
{
|
||||
return seq_release(inode, file);
|
||||
}
|
||||
|
||||
/*
|
||||
* set up the iterator to start reading from the cells list and return the
|
||||
* first item
|
||||
@ -672,15 +603,6 @@ static int afs_proc_cell_servers_open(struct inode *inode, struct file *file)
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* close the file and release the ref to the cell
|
||||
*/
|
||||
static int afs_proc_cell_servers_release(struct inode *inode,
|
||||
struct file *file)
|
||||
{
|
||||
return seq_release(inode, file);
|
||||
}
|
||||
|
||||
/*
|
||||
* set up the iterator to start reading from the cells list and return the
|
||||
* first item
|
||||
|
@ -324,8 +324,8 @@ static struct inode *befs_iget(struct super_block *sb, unsigned long ino)
|
||||
befs_debug(sb, "---> befs_read_inode() " "inode = %lu", ino);
|
||||
|
||||
inode = iget_locked(sb, ino);
|
||||
if (IS_ERR(inode))
|
||||
return inode;
|
||||
if (!inode)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
if (!(inode->i_state & I_NEW))
|
||||
return inode;
|
||||
|
||||
|
148
fs/btrfs/acl.c
148
fs/btrfs/acl.c
@ -35,13 +35,6 @@ struct posix_acl *btrfs_get_acl(struct inode *inode, int type)
|
||||
char *value = NULL;
|
||||
struct posix_acl *acl;
|
||||
|
||||
if (!IS_POSIXACL(inode))
|
||||
return NULL;
|
||||
|
||||
acl = get_cached_acl(inode, type);
|
||||
if (acl != ACL_NOT_CACHED)
|
||||
return acl;
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
name = POSIX_ACL_XATTR_ACCESS;
|
||||
@ -76,31 +69,10 @@ struct posix_acl *btrfs_get_acl(struct inode *inode, int type)
|
||||
return acl;
|
||||
}
|
||||
|
||||
static int btrfs_xattr_acl_get(struct dentry *dentry, const char *name,
|
||||
void *value, size_t size, int type)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int ret = 0;
|
||||
|
||||
if (!IS_POSIXACL(dentry->d_inode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
acl = btrfs_get_acl(dentry->d_inode, type);
|
||||
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl == NULL)
|
||||
return -ENODATA;
|
||||
ret = posix_acl_to_xattr(&init_user_ns, acl, value, size);
|
||||
posix_acl_release(acl);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/*
|
||||
* Needs to be called with fs_mutex held
|
||||
*/
|
||||
static int btrfs_set_acl(struct btrfs_trans_handle *trans,
|
||||
static int __btrfs_set_acl(struct btrfs_trans_handle *trans,
|
||||
struct inode *inode, struct posix_acl *acl, int type)
|
||||
{
|
||||
int ret, size = 0;
|
||||
@ -158,35 +130,9 @@ out:
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int btrfs_xattr_acl_set(struct dentry *dentry, const char *name,
|
||||
const void *value, size_t size, int flags, int type)
|
||||
int btrfs_set_acl(struct inode *inode, struct posix_acl *acl, int type)
|
||||
{
|
||||
int ret;
|
||||
struct posix_acl *acl = NULL;
|
||||
|
||||
if (!inode_owner_or_capable(dentry->d_inode))
|
||||
return -EPERM;
|
||||
|
||||
if (!IS_POSIXACL(dentry->d_inode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
if (value) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
|
||||
if (acl) {
|
||||
ret = posix_acl_valid(acl);
|
||||
if (ret)
|
||||
goto out;
|
||||
}
|
||||
}
|
||||
|
||||
ret = btrfs_set_acl(NULL, dentry->d_inode, acl, type);
|
||||
out:
|
||||
posix_acl_release(acl);
|
||||
|
||||
return ret;
|
||||
return __btrfs_set_acl(NULL, inode, acl, type);
|
||||
}
|
||||
|
||||
/*
|
||||
@ -197,83 +143,31 @@ out:
|
||||
int btrfs_init_acl(struct btrfs_trans_handle *trans,
|
||||
struct inode *inode, struct inode *dir)
|
||||
{
|
||||
struct posix_acl *acl = NULL;
|
||||
struct posix_acl *default_acl, *acl;
|
||||
int ret = 0;
|
||||
|
||||
/* this happens with subvols */
|
||||
if (!dir)
|
||||
return 0;
|
||||
|
||||
if (!S_ISLNK(inode->i_mode)) {
|
||||
if (IS_POSIXACL(dir)) {
|
||||
acl = btrfs_get_acl(dir, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
}
|
||||
|
||||
if (!acl)
|
||||
inode->i_mode &= ~current_umask();
|
||||
}
|
||||
|
||||
if (IS_POSIXACL(dir) && acl) {
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
ret = btrfs_set_acl(trans, inode, acl,
|
||||
ACL_TYPE_DEFAULT);
|
||||
if (ret)
|
||||
goto failed;
|
||||
}
|
||||
ret = posix_acl_create(&acl, GFP_NOFS, &inode->i_mode);
|
||||
if (ret < 0)
|
||||
return ret;
|
||||
|
||||
if (ret > 0) {
|
||||
/* we need an acl */
|
||||
ret = btrfs_set_acl(trans, inode, acl, ACL_TYPE_ACCESS);
|
||||
} else if (ret < 0) {
|
||||
cache_no_acl(inode);
|
||||
}
|
||||
} else {
|
||||
cache_no_acl(inode);
|
||||
}
|
||||
failed:
|
||||
posix_acl_release(acl);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
int btrfs_acl_chmod(struct inode *inode)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int ret = 0;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
if (!IS_POSIXACL(inode))
|
||||
return 0;
|
||||
|
||||
acl = btrfs_get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR_OR_NULL(acl))
|
||||
return PTR_ERR(acl);
|
||||
|
||||
ret = posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
|
||||
ret = posix_acl_create(dir, &inode->i_mode, &default_acl, &acl);
|
||||
if (ret)
|
||||
return ret;
|
||||
ret = btrfs_set_acl(NULL, inode, acl, ACL_TYPE_ACCESS);
|
||||
posix_acl_release(acl);
|
||||
|
||||
if (default_acl) {
|
||||
ret = __btrfs_set_acl(trans, inode, default_acl,
|
||||
ACL_TYPE_DEFAULT);
|
||||
posix_acl_release(default_acl);
|
||||
}
|
||||
|
||||
if (acl) {
|
||||
if (!ret)
|
||||
ret = __btrfs_set_acl(trans, inode, acl,
|
||||
ACL_TYPE_ACCESS);
|
||||
posix_acl_release(acl);
|
||||
}
|
||||
|
||||
if (!default_acl && !acl)
|
||||
cache_no_acl(inode);
|
||||
return ret;
|
||||
}
|
||||
|
||||
const struct xattr_handler btrfs_xattr_acl_default_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_DEFAULT,
|
||||
.flags = ACL_TYPE_DEFAULT,
|
||||
.get = btrfs_xattr_acl_get,
|
||||
.set = btrfs_xattr_acl_set,
|
||||
};
|
||||
|
||||
const struct xattr_handler btrfs_xattr_acl_access_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_ACCESS,
|
||||
.flags = ACL_TYPE_ACCESS,
|
||||
.get = btrfs_xattr_acl_get,
|
||||
.set = btrfs_xattr_acl_set,
|
||||
};
|
||||
|
@ -3899,20 +3899,17 @@ do { \
|
||||
/* acl.c */
|
||||
#ifdef CONFIG_BTRFS_FS_POSIX_ACL
|
||||
struct posix_acl *btrfs_get_acl(struct inode *inode, int type);
|
||||
int btrfs_set_acl(struct inode *inode, struct posix_acl *acl, int type);
|
||||
int btrfs_init_acl(struct btrfs_trans_handle *trans,
|
||||
struct inode *inode, struct inode *dir);
|
||||
int btrfs_acl_chmod(struct inode *inode);
|
||||
#else
|
||||
#define btrfs_get_acl NULL
|
||||
#define btrfs_set_acl NULL
|
||||
static inline int btrfs_init_acl(struct btrfs_trans_handle *trans,
|
||||
struct inode *inode, struct inode *dir)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
static inline int btrfs_acl_chmod(struct inode *inode)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* relocation.c */
|
||||
|
@ -4468,7 +4468,7 @@ static int btrfs_setattr(struct dentry *dentry, struct iattr *attr)
|
||||
err = btrfs_dirty_inode(inode);
|
||||
|
||||
if (!err && attr->ia_valid & ATTR_MODE)
|
||||
err = btrfs_acl_chmod(inode);
|
||||
err = posix_acl_chmod(inode, inode->i_mode);
|
||||
}
|
||||
|
||||
return err;
|
||||
@ -8653,12 +8653,14 @@ static const struct inode_operations btrfs_dir_inode_operations = {
|
||||
.removexattr = btrfs_removexattr,
|
||||
.permission = btrfs_permission,
|
||||
.get_acl = btrfs_get_acl,
|
||||
.set_acl = btrfs_set_acl,
|
||||
.update_time = btrfs_update_time,
|
||||
};
|
||||
static const struct inode_operations btrfs_dir_ro_inode_operations = {
|
||||
.lookup = btrfs_lookup,
|
||||
.permission = btrfs_permission,
|
||||
.get_acl = btrfs_get_acl,
|
||||
.set_acl = btrfs_set_acl,
|
||||
.update_time = btrfs_update_time,
|
||||
};
|
||||
|
||||
@ -8728,6 +8730,7 @@ static const struct inode_operations btrfs_file_inode_operations = {
|
||||
.permission = btrfs_permission,
|
||||
.fiemap = btrfs_fiemap,
|
||||
.get_acl = btrfs_get_acl,
|
||||
.set_acl = btrfs_set_acl,
|
||||
.update_time = btrfs_update_time,
|
||||
};
|
||||
static const struct inode_operations btrfs_special_inode_operations = {
|
||||
@ -8739,6 +8742,7 @@ static const struct inode_operations btrfs_special_inode_operations = {
|
||||
.listxattr = btrfs_listxattr,
|
||||
.removexattr = btrfs_removexattr,
|
||||
.get_acl = btrfs_get_acl,
|
||||
.set_acl = btrfs_set_acl,
|
||||
.update_time = btrfs_update_time,
|
||||
};
|
||||
static const struct inode_operations btrfs_symlink_inode_operations = {
|
||||
@ -8752,7 +8756,6 @@ static const struct inode_operations btrfs_symlink_inode_operations = {
|
||||
.getxattr = btrfs_getxattr,
|
||||
.listxattr = btrfs_listxattr,
|
||||
.removexattr = btrfs_removexattr,
|
||||
.get_acl = btrfs_get_acl,
|
||||
.update_time = btrfs_update_time,
|
||||
};
|
||||
|
||||
|
@ -2686,14 +2686,11 @@ out_unlock:
|
||||
#define BTRFS_MAX_DEDUPE_LEN (16 * 1024 * 1024)
|
||||
|
||||
static long btrfs_ioctl_file_extent_same(struct file *file,
|
||||
void __user *argp)
|
||||
struct btrfs_ioctl_same_args __user *argp)
|
||||
{
|
||||
struct btrfs_ioctl_same_args tmp;
|
||||
struct btrfs_ioctl_same_args *same;
|
||||
struct btrfs_ioctl_same_extent_info *info;
|
||||
struct inode *src = file->f_dentry->d_inode;
|
||||
struct file *dst_file = NULL;
|
||||
struct inode *dst;
|
||||
struct inode *src = file_inode(file);
|
||||
u64 off;
|
||||
u64 len;
|
||||
int i;
|
||||
@ -2701,6 +2698,7 @@ static long btrfs_ioctl_file_extent_same(struct file *file,
|
||||
unsigned long size;
|
||||
u64 bs = BTRFS_I(src)->root->fs_info->sb->s_blocksize;
|
||||
bool is_admin = capable(CAP_SYS_ADMIN);
|
||||
u16 count;
|
||||
|
||||
if (!(file->f_mode & FMODE_READ))
|
||||
return -EINVAL;
|
||||
@ -2709,17 +2707,14 @@ static long btrfs_ioctl_file_extent_same(struct file *file,
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
if (copy_from_user(&tmp,
|
||||
(struct btrfs_ioctl_same_args __user *)argp,
|
||||
sizeof(tmp))) {
|
||||
if (get_user(count, &argp->dest_count)) {
|
||||
ret = -EFAULT;
|
||||
goto out;
|
||||
}
|
||||
|
||||
size = sizeof(tmp) +
|
||||
tmp.dest_count * sizeof(struct btrfs_ioctl_same_extent_info);
|
||||
size = offsetof(struct btrfs_ioctl_same_args __user, info[count]);
|
||||
|
||||
same = memdup_user((struct btrfs_ioctl_same_args __user *)argp, size);
|
||||
same = memdup_user(argp, size);
|
||||
|
||||
if (IS_ERR(same)) {
|
||||
ret = PTR_ERR(same);
|
||||
@ -2756,52 +2751,35 @@ static long btrfs_ioctl_file_extent_same(struct file *file,
|
||||
goto out;
|
||||
|
||||
/* pre-format output fields to sane values */
|
||||
for (i = 0; i < same->dest_count; i++) {
|
||||
for (i = 0; i < count; i++) {
|
||||
same->info[i].bytes_deduped = 0ULL;
|
||||
same->info[i].status = 0;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
for (i = 0; i < same->dest_count; i++) {
|
||||
info = &same->info[i];
|
||||
|
||||
dst_file = fget(info->fd);
|
||||
if (!dst_file) {
|
||||
for (i = 0, info = same->info; i < count; i++, info++) {
|
||||
struct inode *dst;
|
||||
struct fd dst_file = fdget(info->fd);
|
||||
if (!dst_file.file) {
|
||||
info->status = -EBADF;
|
||||
goto next;
|
||||
continue;
|
||||
}
|
||||
dst = file_inode(dst_file.file);
|
||||
|
||||
if (!(is_admin || (dst_file->f_mode & FMODE_WRITE))) {
|
||||
if (!(is_admin || (dst_file.file->f_mode & FMODE_WRITE))) {
|
||||
info->status = -EINVAL;
|
||||
goto next;
|
||||
}
|
||||
|
||||
info->status = -EXDEV;
|
||||
if (file->f_path.mnt != dst_file->f_path.mnt)
|
||||
goto next;
|
||||
|
||||
dst = dst_file->f_dentry->d_inode;
|
||||
if (src->i_sb != dst->i_sb)
|
||||
goto next;
|
||||
|
||||
if (S_ISDIR(dst->i_mode)) {
|
||||
} else if (file->f_path.mnt != dst_file.file->f_path.mnt) {
|
||||
info->status = -EXDEV;
|
||||
} else if (S_ISDIR(dst->i_mode)) {
|
||||
info->status = -EISDIR;
|
||||
goto next;
|
||||
}
|
||||
|
||||
if (!S_ISREG(dst->i_mode)) {
|
||||
} else if (!S_ISREG(dst->i_mode)) {
|
||||
info->status = -EACCES;
|
||||
goto next;
|
||||
} else {
|
||||
info->status = btrfs_extent_same(src, off, len, dst,
|
||||
info->logical_offset);
|
||||
if (info->status == 0)
|
||||
info->bytes_deduped += len;
|
||||
}
|
||||
|
||||
info->status = btrfs_extent_same(src, off, len, dst,
|
||||
info->logical_offset);
|
||||
if (info->status == 0)
|
||||
info->bytes_deduped += len;
|
||||
|
||||
next:
|
||||
if (dst_file)
|
||||
fput(dst_file);
|
||||
fdput(dst_file);
|
||||
}
|
||||
|
||||
ret = copy_to_user(argp, same, size);
|
||||
|
@ -22,6 +22,7 @@
|
||||
#include <linux/rwsem.h>
|
||||
#include <linux/xattr.h>
|
||||
#include <linux/security.h>
|
||||
#include <linux/posix_acl_xattr.h>
|
||||
#include "ctree.h"
|
||||
#include "btrfs_inode.h"
|
||||
#include "transaction.h"
|
||||
@ -313,8 +314,8 @@ err:
|
||||
*/
|
||||
const struct xattr_handler *btrfs_xattr_handlers[] = {
|
||||
#ifdef CONFIG_BTRFS_FS_POSIX_ACL
|
||||
&btrfs_xattr_acl_access_handler,
|
||||
&btrfs_xattr_acl_default_handler,
|
||||
&posix_acl_access_xattr_handler,
|
||||
&posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
NULL,
|
||||
};
|
||||
|
@ -21,8 +21,6 @@
|
||||
|
||||
#include <linux/xattr.h>
|
||||
|
||||
extern const struct xattr_handler btrfs_xattr_acl_access_handler;
|
||||
extern const struct xattr_handler btrfs_xattr_acl_default_handler;
|
||||
extern const struct xattr_handler *btrfs_xattr_handlers[];
|
||||
|
||||
extern ssize_t __btrfs_getxattr(struct inode *inode, const char *name,
|
||||
|
@ -17,14 +17,30 @@
|
||||
#include <linux/init.h>
|
||||
#include <linux/string.h>
|
||||
#include <linux/blkdev.h>
|
||||
#include <linux/cramfs_fs.h>
|
||||
#include <linux/slab.h>
|
||||
#include <linux/cramfs_fs_sb.h>
|
||||
#include <linux/vfs.h>
|
||||
#include <linux/mutex.h>
|
||||
|
||||
#include <uapi/linux/cramfs_fs.h>
|
||||
#include <asm/uaccess.h>
|
||||
|
||||
#include "internal.h"
|
||||
|
||||
/*
|
||||
* cramfs super-block data in memory
|
||||
*/
|
||||
struct cramfs_sb_info {
|
||||
unsigned long magic;
|
||||
unsigned long size;
|
||||
unsigned long blocks;
|
||||
unsigned long files;
|
||||
unsigned long flags;
|
||||
};
|
||||
|
||||
static inline struct cramfs_sb_info *CRAMFS_SB(struct super_block *sb)
|
||||
{
|
||||
return sb->s_fs_info;
|
||||
}
|
||||
|
||||
static const struct super_operations cramfs_ops;
|
||||
static const struct inode_operations cramfs_dir_inode_operations;
|
||||
static const struct file_operations cramfs_directory_operations;
|
||||
@ -219,10 +235,11 @@ static void *cramfs_read(struct super_block *sb, unsigned int offset, unsigned i
|
||||
return read_buffers[buffer] + offset;
|
||||
}
|
||||
|
||||
static void cramfs_put_super(struct super_block *sb)
|
||||
static void cramfs_kill_sb(struct super_block *sb)
|
||||
{
|
||||
kfree(sb->s_fs_info);
|
||||
sb->s_fs_info = NULL;
|
||||
struct cramfs_sb_info *sbi = CRAMFS_SB(sb);
|
||||
kill_block_super(sb);
|
||||
kfree(sbi);
|
||||
}
|
||||
|
||||
static int cramfs_remount(struct super_block *sb, int *flags, char *data)
|
||||
@ -261,7 +278,7 @@ static int cramfs_fill_super(struct super_block *sb, void *data, int silent)
|
||||
if (super.magic == CRAMFS_MAGIC_WEND) {
|
||||
if (!silent)
|
||||
printk(KERN_ERR "cramfs: wrong endianness\n");
|
||||
goto out;
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
/* check at 512 byte offset */
|
||||
@ -273,20 +290,20 @@ static int cramfs_fill_super(struct super_block *sb, void *data, int silent)
|
||||
printk(KERN_ERR "cramfs: wrong endianness\n");
|
||||
else if (!silent)
|
||||
printk(KERN_ERR "cramfs: wrong magic\n");
|
||||
goto out;
|
||||
return -EINVAL;
|
||||
}
|
||||
}
|
||||
|
||||
/* get feature flags first */
|
||||
if (super.flags & ~CRAMFS_SUPPORTED_FLAGS) {
|
||||
printk(KERN_ERR "cramfs: unsupported filesystem features\n");
|
||||
goto out;
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
/* Check that the root inode is in a sane state */
|
||||
if (!S_ISDIR(super.root.mode)) {
|
||||
printk(KERN_ERR "cramfs: root is not a directory\n");
|
||||
goto out;
|
||||
return -EINVAL;
|
||||
}
|
||||
/* correct strange, hard-coded permissions of mkcramfs */
|
||||
super.root.mode |= (S_IRUSR | S_IXUSR | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
|
||||
@ -310,22 +327,18 @@ static int cramfs_fill_super(struct super_block *sb, void *data, int silent)
|
||||
(root_offset != 512 + sizeof(struct cramfs_super))))
|
||||
{
|
||||
printk(KERN_ERR "cramfs: bad root offset %lu\n", root_offset);
|
||||
goto out;
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
/* Set it all up.. */
|
||||
sb->s_op = &cramfs_ops;
|
||||
root = get_cramfs_inode(sb, &super.root, 0);
|
||||
if (IS_ERR(root))
|
||||
goto out;
|
||||
return PTR_ERR(root);
|
||||
sb->s_root = d_make_root(root);
|
||||
if (!sb->s_root)
|
||||
goto out;
|
||||
return -ENOMEM;
|
||||
return 0;
|
||||
out:
|
||||
kfree(sbi);
|
||||
sb->s_fs_info = NULL;
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
static int cramfs_statfs(struct dentry *dentry, struct kstatfs *buf)
|
||||
@ -550,7 +563,6 @@ static const struct inode_operations cramfs_dir_inode_operations = {
|
||||
};
|
||||
|
||||
static const struct super_operations cramfs_ops = {
|
||||
.put_super = cramfs_put_super,
|
||||
.remount_fs = cramfs_remount,
|
||||
.statfs = cramfs_statfs,
|
||||
};
|
||||
@ -565,7 +577,7 @@ static struct file_system_type cramfs_fs_type = {
|
||||
.owner = THIS_MODULE,
|
||||
.name = "cramfs",
|
||||
.mount = cramfs_mount,
|
||||
.kill_sb = kill_block_super,
|
||||
.kill_sb = cramfs_kill_sb,
|
||||
.fs_flags = FS_REQUIRES_DEV,
|
||||
};
|
||||
MODULE_ALIAS_FS("cramfs");
|
||||
|
@ -1,10 +1,4 @@
|
||||
#ifndef __CRAMFS_H
|
||||
#define __CRAMFS_H
|
||||
|
||||
#include <uapi/linux/cramfs_fs.h>
|
||||
|
||||
/* Uncompression interfaces to the underlying zlib */
|
||||
int cramfs_uncompress_block(void *dst, int dstlen, void *src, int srclen);
|
||||
int cramfs_uncompress_init(void);
|
||||
void cramfs_uncompress_exit(void);
|
||||
#endif
|
@ -19,7 +19,7 @@
|
||||
#include <linux/errno.h>
|
||||
#include <linux/vmalloc.h>
|
||||
#include <linux/zlib.h>
|
||||
#include <linux/cramfs_fs.h>
|
||||
#include "internal.h"
|
||||
|
||||
static z_stream stream;
|
||||
static int initialized;
|
||||
|
10
fs/dcache.c
10
fs/dcache.c
@ -3116,26 +3116,28 @@ char *simple_dname(struct dentry *dentry, char *buffer, int buflen)
|
||||
/*
|
||||
* Write full pathname from the root of the filesystem into the buffer.
|
||||
*/
|
||||
static char *__dentry_path(struct dentry *dentry, char *buf, int buflen)
|
||||
static char *__dentry_path(struct dentry *d, char *buf, int buflen)
|
||||
{
|
||||
struct dentry *dentry;
|
||||
char *end, *retval;
|
||||
int len, seq = 0;
|
||||
int error = 0;
|
||||
|
||||
if (buflen < 2)
|
||||
goto Elong;
|
||||
|
||||
rcu_read_lock();
|
||||
restart:
|
||||
dentry = d;
|
||||
end = buf + buflen;
|
||||
len = buflen;
|
||||
prepend(&end, &len, "\0", 1);
|
||||
if (buflen < 1)
|
||||
goto Elong;
|
||||
/* Get '/' right */
|
||||
retval = end-1;
|
||||
*retval = '/';
|
||||
read_seqbegin_or_lock(&rename_lock, &seq);
|
||||
while (!IS_ROOT(dentry)) {
|
||||
struct dentry *parent = dentry->d_parent;
|
||||
int error;
|
||||
|
||||
prefetch(parent);
|
||||
error = prepend_name(&end, &len, &dentry->d_name);
|
||||
|
@ -659,19 +659,17 @@ out_lock:
|
||||
return rc;
|
||||
}
|
||||
|
||||
static int ecryptfs_readlink_lower(struct dentry *dentry, char **buf,
|
||||
size_t *bufsiz)
|
||||
static char *ecryptfs_readlink_lower(struct dentry *dentry, size_t *bufsiz)
|
||||
{
|
||||
struct dentry *lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
||||
char *lower_buf;
|
||||
char *buf;
|
||||
mm_segment_t old_fs;
|
||||
int rc;
|
||||
|
||||
lower_buf = kmalloc(PATH_MAX, GFP_KERNEL);
|
||||
if (!lower_buf) {
|
||||
rc = -ENOMEM;
|
||||
goto out;
|
||||
}
|
||||
if (!lower_buf)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
old_fs = get_fs();
|
||||
set_fs(get_ds());
|
||||
rc = lower_dentry->d_inode->i_op->readlink(lower_dentry,
|
||||
@ -680,21 +678,18 @@ static int ecryptfs_readlink_lower(struct dentry *dentry, char **buf,
|
||||
set_fs(old_fs);
|
||||
if (rc < 0)
|
||||
goto out;
|
||||
rc = ecryptfs_decode_and_decrypt_filename(buf, bufsiz, dentry->d_sb,
|
||||
rc = ecryptfs_decode_and_decrypt_filename(&buf, bufsiz, dentry->d_sb,
|
||||
lower_buf, rc);
|
||||
out:
|
||||
kfree(lower_buf);
|
||||
return rc;
|
||||
return rc ? ERR_PTR(rc) : buf;
|
||||
}
|
||||
|
||||
static void *ecryptfs_follow_link(struct dentry *dentry, struct nameidata *nd)
|
||||
{
|
||||
char *buf;
|
||||
size_t len = PATH_MAX;
|
||||
int rc;
|
||||
|
||||
rc = ecryptfs_readlink_lower(dentry, &buf, &len);
|
||||
if (rc)
|
||||
size_t len;
|
||||
char *buf = ecryptfs_readlink_lower(dentry, &len);
|
||||
if (IS_ERR(buf))
|
||||
goto out;
|
||||
fsstack_copy_attr_atime(dentry->d_inode,
|
||||
ecryptfs_dentry_to_lower(dentry)->d_inode);
|
||||
@ -1003,10 +998,12 @@ static int ecryptfs_getattr_link(struct vfsmount *mnt, struct dentry *dentry,
|
||||
char *target;
|
||||
size_t targetsiz;
|
||||
|
||||
rc = ecryptfs_readlink_lower(dentry, &target, &targetsiz);
|
||||
if (!rc) {
|
||||
target = ecryptfs_readlink_lower(dentry, &targetsiz);
|
||||
if (!IS_ERR(target)) {
|
||||
kfree(target);
|
||||
stat->size = targetsiz;
|
||||
} else {
|
||||
rc = PTR_ERR(target);
|
||||
}
|
||||
}
|
||||
return rc;
|
||||
|
@ -26,11 +26,18 @@ static struct dentry *efs_mount(struct file_system_type *fs_type,
|
||||
return mount_bdev(fs_type, flags, dev_name, data, efs_fill_super);
|
||||
}
|
||||
|
||||
static void efs_kill_sb(struct super_block *s)
|
||||
{
|
||||
struct efs_sb_info *sbi = SUPER_INFO(s);
|
||||
kill_block_super(s);
|
||||
kfree(sbi);
|
||||
}
|
||||
|
||||
static struct file_system_type efs_fs_type = {
|
||||
.owner = THIS_MODULE,
|
||||
.name = "efs",
|
||||
.mount = efs_mount,
|
||||
.kill_sb = kill_block_super,
|
||||
.kill_sb = efs_kill_sb,
|
||||
.fs_flags = FS_REQUIRES_DEV,
|
||||
};
|
||||
MODULE_ALIAS_FS("efs");
|
||||
@ -105,12 +112,6 @@ static void destroy_inodecache(void)
|
||||
kmem_cache_destroy(efs_inode_cachep);
|
||||
}
|
||||
|
||||
static void efs_put_super(struct super_block *s)
|
||||
{
|
||||
kfree(s->s_fs_info);
|
||||
s->s_fs_info = NULL;
|
||||
}
|
||||
|
||||
static int efs_remount(struct super_block *sb, int *flags, char *data)
|
||||
{
|
||||
*flags |= MS_RDONLY;
|
||||
@ -120,7 +121,6 @@ static int efs_remount(struct super_block *sb, int *flags, char *data)
|
||||
static const struct super_operations efs_superblock_operations = {
|
||||
.alloc_inode = efs_alloc_inode,
|
||||
.destroy_inode = efs_destroy_inode,
|
||||
.put_super = efs_put_super,
|
||||
.statfs = efs_statfs,
|
||||
.remount_fs = efs_remount,
|
||||
};
|
||||
@ -259,7 +259,6 @@ static int efs_fill_super(struct super_block *s, void *d, int silent)
|
||||
struct efs_sb_info *sb;
|
||||
struct buffer_head *bh;
|
||||
struct inode *root;
|
||||
int ret = -EINVAL;
|
||||
|
||||
sb = kzalloc(sizeof(struct efs_sb_info), GFP_KERNEL);
|
||||
if (!sb)
|
||||
@ -270,7 +269,7 @@ static int efs_fill_super(struct super_block *s, void *d, int silent)
|
||||
if (!sb_set_blocksize(s, EFS_BLOCKSIZE)) {
|
||||
printk(KERN_ERR "EFS: device does not support %d byte blocks\n",
|
||||
EFS_BLOCKSIZE);
|
||||
goto out_no_fs_ul;
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
/* read the vh (volume header) block */
|
||||
@ -278,7 +277,7 @@ static int efs_fill_super(struct super_block *s, void *d, int silent)
|
||||
|
||||
if (!bh) {
|
||||
printk(KERN_ERR "EFS: cannot read volume header\n");
|
||||
goto out_no_fs_ul;
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
/*
|
||||
@ -290,13 +289,13 @@ static int efs_fill_super(struct super_block *s, void *d, int silent)
|
||||
brelse(bh);
|
||||
|
||||
if (sb->fs_start == -1) {
|
||||
goto out_no_fs_ul;
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
bh = sb_bread(s, sb->fs_start + EFS_SUPER);
|
||||
if (!bh) {
|
||||
printk(KERN_ERR "EFS: cannot read superblock\n");
|
||||
goto out_no_fs_ul;
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (efs_validate_super(sb, (struct efs_super *) bh->b_data)) {
|
||||
@ -304,7 +303,7 @@ static int efs_fill_super(struct super_block *s, void *d, int silent)
|
||||
printk(KERN_WARNING "EFS: invalid superblock at block %u\n", sb->fs_start + EFS_SUPER);
|
||||
#endif
|
||||
brelse(bh);
|
||||
goto out_no_fs_ul;
|
||||
return -EINVAL;
|
||||
}
|
||||
brelse(bh);
|
||||
|
||||
@ -319,24 +318,16 @@ static int efs_fill_super(struct super_block *s, void *d, int silent)
|
||||
root = efs_iget(s, EFS_ROOTINODE);
|
||||
if (IS_ERR(root)) {
|
||||
printk(KERN_ERR "EFS: get root inode failed\n");
|
||||
ret = PTR_ERR(root);
|
||||
goto out_no_fs;
|
||||
return PTR_ERR(root);
|
||||
}
|
||||
|
||||
s->s_root = d_make_root(root);
|
||||
if (!(s->s_root)) {
|
||||
printk(KERN_ERR "EFS: get root dentry failed\n");
|
||||
ret = -ENOMEM;
|
||||
goto out_no_fs;
|
||||
return -ENOMEM;
|
||||
}
|
||||
|
||||
return 0;
|
||||
|
||||
out_no_fs_ul:
|
||||
out_no_fs:
|
||||
s->s_fs_info = NULL;
|
||||
kfree(sb);
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int efs_statfs(struct dentry *dentry, struct kstatfs *buf) {
|
||||
|
13
fs/eventfd.c
13
fs/eventfd.c
@ -349,15 +349,12 @@ EXPORT_SYMBOL_GPL(eventfd_fget);
|
||||
*/
|
||||
struct eventfd_ctx *eventfd_ctx_fdget(int fd)
|
||||
{
|
||||
struct file *file;
|
||||
struct eventfd_ctx *ctx;
|
||||
|
||||
file = eventfd_fget(fd);
|
||||
if (IS_ERR(file))
|
||||
return (struct eventfd_ctx *) file;
|
||||
ctx = eventfd_ctx_get(file->private_data);
|
||||
fput(file);
|
||||
|
||||
struct fd f = fdget(fd);
|
||||
if (!f.file)
|
||||
return ERR_PTR(-EBADF);
|
||||
ctx = eventfd_ctx_fileget(f.file);
|
||||
fdput(f);
|
||||
return ctx;
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(eventfd_ctx_fdget);
|
||||
|
190
fs/ext2/acl.c
190
fs/ext2/acl.c
@ -148,13 +148,6 @@ ext2_get_acl(struct inode *inode, int type)
|
||||
struct posix_acl *acl;
|
||||
int retval;
|
||||
|
||||
if (!test_opt(inode->i_sb, POSIX_ACL))
|
||||
return NULL;
|
||||
|
||||
acl = get_cached_acl(inode, type);
|
||||
if (acl != ACL_NOT_CACHED)
|
||||
return acl;
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
name_index = EXT2_XATTR_INDEX_POSIX_ACL_ACCESS;
|
||||
@ -189,19 +182,14 @@ ext2_get_acl(struct inode *inode, int type)
|
||||
/*
|
||||
* inode->i_mutex: down
|
||||
*/
|
||||
static int
|
||||
ext2_set_acl(struct inode *inode, int type, struct posix_acl *acl)
|
||||
int
|
||||
ext2_set_acl(struct inode *inode, struct posix_acl *acl, int type)
|
||||
{
|
||||
int name_index;
|
||||
void *value = NULL;
|
||||
size_t size = 0;
|
||||
int error;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
if (!test_opt(inode->i_sb, POSIX_ACL))
|
||||
return 0;
|
||||
|
||||
switch(type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
name_index = EXT2_XATTR_INDEX_POSIX_ACL_ACCESS;
|
||||
@ -250,169 +238,21 @@ ext2_set_acl(struct inode *inode, int type, struct posix_acl *acl)
|
||||
int
|
||||
ext2_init_acl(struct inode *inode, struct inode *dir)
|
||||
{
|
||||
struct posix_acl *acl = NULL;
|
||||
int error = 0;
|
||||
struct posix_acl *default_acl, *acl;
|
||||
int error;
|
||||
|
||||
if (!S_ISLNK(inode->i_mode)) {
|
||||
if (test_opt(dir->i_sb, POSIX_ACL)) {
|
||||
acl = ext2_get_acl(dir, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
}
|
||||
if (!acl)
|
||||
inode->i_mode &= ~current_umask();
|
||||
}
|
||||
if (test_opt(inode->i_sb, POSIX_ACL) && acl) {
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
error = ext2_set_acl(inode, ACL_TYPE_DEFAULT, acl);
|
||||
if (error)
|
||||
goto cleanup;
|
||||
}
|
||||
error = posix_acl_create(&acl, GFP_KERNEL, &inode->i_mode);
|
||||
if (error < 0)
|
||||
return error;
|
||||
if (error > 0) {
|
||||
/* This is an extended ACL */
|
||||
error = ext2_set_acl(inode, ACL_TYPE_ACCESS, acl);
|
||||
}
|
||||
}
|
||||
cleanup:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
/*
|
||||
* Does chmod for an inode that may have an Access Control List. The
|
||||
* inode->i_mode field must be updated to the desired value by the caller
|
||||
* before calling this function.
|
||||
* Returns 0 on success, or a negative error number.
|
||||
*
|
||||
* We change the ACL rather than storing some ACL entries in the file
|
||||
* mode permission bits (which would be more efficient), because that
|
||||
* would break once additional permissions (like ACL_APPEND, ACL_DELETE
|
||||
* for directories) are added. There are no more bits available in the
|
||||
* file mode.
|
||||
*
|
||||
* inode->i_mutex: down
|
||||
*/
|
||||
int
|
||||
ext2_acl_chmod(struct inode *inode)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int error;
|
||||
|
||||
if (!test_opt(inode->i_sb, POSIX_ACL))
|
||||
return 0;
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
acl = ext2_get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl) || !acl)
|
||||
return PTR_ERR(acl);
|
||||
error = posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
|
||||
error = posix_acl_create(dir, &inode->i_mode, &default_acl, &acl);
|
||||
if (error)
|
||||
return error;
|
||||
error = ext2_set_acl(inode, ACL_TYPE_ACCESS, acl);
|
||||
posix_acl_release(acl);
|
||||
|
||||
if (default_acl) {
|
||||
error = ext2_set_acl(inode, default_acl, ACL_TYPE_DEFAULT);
|
||||
posix_acl_release(default_acl);
|
||||
}
|
||||
if (acl) {
|
||||
if (!error)
|
||||
error = ext2_set_acl(inode, acl, ACL_TYPE_ACCESS);
|
||||
posix_acl_release(acl);
|
||||
}
|
||||
return error;
|
||||
}
|
||||
|
||||
/*
|
||||
* Extended attribut handlers
|
||||
*/
|
||||
static size_t
|
||||
ext2_xattr_list_acl_access(struct dentry *dentry, char *list, size_t list_size,
|
||||
const char *name, size_t name_len, int type)
|
||||
{
|
||||
const size_t size = sizeof(POSIX_ACL_XATTR_ACCESS);
|
||||
|
||||
if (!test_opt(dentry->d_sb, POSIX_ACL))
|
||||
return 0;
|
||||
if (list && size <= list_size)
|
||||
memcpy(list, POSIX_ACL_XATTR_ACCESS, size);
|
||||
return size;
|
||||
}
|
||||
|
||||
static size_t
|
||||
ext2_xattr_list_acl_default(struct dentry *dentry, char *list, size_t list_size,
|
||||
const char *name, size_t name_len, int type)
|
||||
{
|
||||
const size_t size = sizeof(POSIX_ACL_XATTR_DEFAULT);
|
||||
|
||||
if (!test_opt(dentry->d_sb, POSIX_ACL))
|
||||
return 0;
|
||||
if (list && size <= list_size)
|
||||
memcpy(list, POSIX_ACL_XATTR_DEFAULT, size);
|
||||
return size;
|
||||
}
|
||||
|
||||
static int
|
||||
ext2_xattr_get_acl(struct dentry *dentry, const char *name, void *buffer,
|
||||
size_t size, int type)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int error;
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
if (!test_opt(dentry->d_sb, POSIX_ACL))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
acl = ext2_get_acl(dentry->d_inode, type);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl == NULL)
|
||||
return -ENODATA;
|
||||
error = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
|
||||
posix_acl_release(acl);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static int
|
||||
ext2_xattr_set_acl(struct dentry *dentry, const char *name, const void *value,
|
||||
size_t size, int flags, int type)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int error;
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
if (!test_opt(dentry->d_sb, POSIX_ACL))
|
||||
return -EOPNOTSUPP;
|
||||
if (!inode_owner_or_capable(dentry->d_inode))
|
||||
return -EPERM;
|
||||
|
||||
if (value) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
else if (acl) {
|
||||
error = posix_acl_valid(acl);
|
||||
if (error)
|
||||
goto release_and_out;
|
||||
}
|
||||
} else
|
||||
acl = NULL;
|
||||
|
||||
error = ext2_set_acl(dentry->d_inode, type, acl);
|
||||
|
||||
release_and_out:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
const struct xattr_handler ext2_xattr_acl_access_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_ACCESS,
|
||||
.flags = ACL_TYPE_ACCESS,
|
||||
.list = ext2_xattr_list_acl_access,
|
||||
.get = ext2_xattr_get_acl,
|
||||
.set = ext2_xattr_set_acl,
|
||||
};
|
||||
|
||||
const struct xattr_handler ext2_xattr_acl_default_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_DEFAULT,
|
||||
.flags = ACL_TYPE_DEFAULT,
|
||||
.list = ext2_xattr_list_acl_default,
|
||||
.get = ext2_xattr_get_acl,
|
||||
.set = ext2_xattr_set_acl,
|
||||
};
|
||||
|
@ -55,7 +55,7 @@ static inline int ext2_acl_count(size_t size)
|
||||
|
||||
/* acl.c */
|
||||
extern struct posix_acl *ext2_get_acl(struct inode *inode, int type);
|
||||
extern int ext2_acl_chmod (struct inode *);
|
||||
extern int ext2_set_acl(struct inode *inode, struct posix_acl *acl, int type);
|
||||
extern int ext2_init_acl (struct inode *, struct inode *);
|
||||
|
||||
#else
|
||||
@ -63,12 +63,6 @@ extern int ext2_init_acl (struct inode *, struct inode *);
|
||||
#define ext2_get_acl NULL
|
||||
#define ext2_set_acl NULL
|
||||
|
||||
static inline int
|
||||
ext2_acl_chmod (struct inode *inode)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int ext2_init_acl (struct inode *inode, struct inode *dir)
|
||||
{
|
||||
return 0;
|
||||
|
@ -103,5 +103,6 @@ const struct inode_operations ext2_file_inode_operations = {
|
||||
#endif
|
||||
.setattr = ext2_setattr,
|
||||
.get_acl = ext2_get_acl,
|
||||
.set_acl = ext2_set_acl,
|
||||
.fiemap = ext2_fiemap,
|
||||
};
|
||||
|
@ -1566,7 +1566,7 @@ int ext2_setattr(struct dentry *dentry, struct iattr *iattr)
|
||||
}
|
||||
setattr_copy(inode, iattr);
|
||||
if (iattr->ia_valid & ATTR_MODE)
|
||||
error = ext2_acl_chmod(inode);
|
||||
error = posix_acl_chmod(inode, inode->i_mode);
|
||||
mark_inode_dirty(inode);
|
||||
|
||||
return error;
|
||||
|
@ -421,6 +421,7 @@ const struct inode_operations ext2_dir_inode_operations = {
|
||||
#endif
|
||||
.setattr = ext2_setattr,
|
||||
.get_acl = ext2_get_acl,
|
||||
.set_acl = ext2_set_acl,
|
||||
.tmpfile = ext2_tmpfile,
|
||||
};
|
||||
|
||||
@ -433,4 +434,5 @@ const struct inode_operations ext2_special_inode_operations = {
|
||||
#endif
|
||||
.setattr = ext2_setattr,
|
||||
.get_acl = ext2_get_acl,
|
||||
.set_acl = ext2_set_acl,
|
||||
};
|
||||
|
@ -103,8 +103,8 @@ static struct mb_cache *ext2_xattr_cache;
|
||||
static const struct xattr_handler *ext2_xattr_handler_map[] = {
|
||||
[EXT2_XATTR_INDEX_USER] = &ext2_xattr_user_handler,
|
||||
#ifdef CONFIG_EXT2_FS_POSIX_ACL
|
||||
[EXT2_XATTR_INDEX_POSIX_ACL_ACCESS] = &ext2_xattr_acl_access_handler,
|
||||
[EXT2_XATTR_INDEX_POSIX_ACL_DEFAULT] = &ext2_xattr_acl_default_handler,
|
||||
[EXT2_XATTR_INDEX_POSIX_ACL_ACCESS] = &posix_acl_access_xattr_handler,
|
||||
[EXT2_XATTR_INDEX_POSIX_ACL_DEFAULT] = &posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
[EXT2_XATTR_INDEX_TRUSTED] = &ext2_xattr_trusted_handler,
|
||||
#ifdef CONFIG_EXT2_FS_SECURITY
|
||||
@ -116,8 +116,8 @@ const struct xattr_handler *ext2_xattr_handlers[] = {
|
||||
&ext2_xattr_user_handler,
|
||||
&ext2_xattr_trusted_handler,
|
||||
#ifdef CONFIG_EXT2_FS_POSIX_ACL
|
||||
&ext2_xattr_acl_access_handler,
|
||||
&ext2_xattr_acl_default_handler,
|
||||
&posix_acl_access_xattr_handler,
|
||||
&posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
#ifdef CONFIG_EXT2_FS_SECURITY
|
||||
&ext2_xattr_security_handler,
|
||||
|
@ -57,8 +57,6 @@ struct ext2_xattr_entry {
|
||||
|
||||
extern const struct xattr_handler ext2_xattr_user_handler;
|
||||
extern const struct xattr_handler ext2_xattr_trusted_handler;
|
||||
extern const struct xattr_handler ext2_xattr_acl_access_handler;
|
||||
extern const struct xattr_handler ext2_xattr_acl_default_handler;
|
||||
extern const struct xattr_handler ext2_xattr_security_handler;
|
||||
|
||||
extern ssize_t ext2_listxattr(struct dentry *, char *, size_t);
|
||||
|
231
fs/ext3/acl.c
231
fs/ext3/acl.c
@ -145,13 +145,6 @@ ext3_get_acl(struct inode *inode, int type)
|
||||
struct posix_acl *acl;
|
||||
int retval;
|
||||
|
||||
if (!test_opt(inode->i_sb, POSIX_ACL))
|
||||
return NULL;
|
||||
|
||||
acl = get_cached_acl(inode, type);
|
||||
if (acl != ACL_NOT_CACHED)
|
||||
return acl;
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
name_index = EXT3_XATTR_INDEX_POSIX_ACL_ACCESS;
|
||||
@ -190,7 +183,7 @@ ext3_get_acl(struct inode *inode, int type)
|
||||
* inode->i_mutex: down unless called from ext3_new_inode
|
||||
*/
|
||||
static int
|
||||
ext3_set_acl(handle_t *handle, struct inode *inode, int type,
|
||||
__ext3_set_acl(handle_t *handle, struct inode *inode, int type,
|
||||
struct posix_acl *acl)
|
||||
{
|
||||
int name_index;
|
||||
@ -198,9 +191,6 @@ ext3_set_acl(handle_t *handle, struct inode *inode, int type,
|
||||
size_t size = 0;
|
||||
int error;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
switch(type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
name_index = EXT3_XATTR_INDEX_POSIX_ACL_ACCESS;
|
||||
@ -243,6 +233,23 @@ ext3_set_acl(handle_t *handle, struct inode *inode, int type,
|
||||
return error;
|
||||
}
|
||||
|
||||
int
|
||||
ext3_set_acl(struct inode *inode, struct posix_acl *acl, int type)
|
||||
{
|
||||
handle_t *handle;
|
||||
int error, retries = 0;
|
||||
|
||||
retry:
|
||||
handle = ext3_journal_start(inode, EXT3_DATA_TRANS_BLOCKS(inode->i_sb));
|
||||
if (IS_ERR(handle))
|
||||
return PTR_ERR(handle);
|
||||
error = __ext3_set_acl(handle, inode, type, acl);
|
||||
ext3_journal_stop(handle);
|
||||
if (error == -ENOSPC && ext3_should_retry_alloc(inode->i_sb, &retries))
|
||||
goto retry;
|
||||
return error;
|
||||
}
|
||||
|
||||
/*
|
||||
* Initialize the ACLs of a new inode. Called from ext3_new_inode.
|
||||
*
|
||||
@ -252,195 +259,23 @@ ext3_set_acl(handle_t *handle, struct inode *inode, int type,
|
||||
int
|
||||
ext3_init_acl(handle_t *handle, struct inode *inode, struct inode *dir)
|
||||
{
|
||||
struct posix_acl *acl = NULL;
|
||||
int error = 0;
|
||||
|
||||
if (!S_ISLNK(inode->i_mode)) {
|
||||
if (test_opt(dir->i_sb, POSIX_ACL)) {
|
||||
acl = ext3_get_acl(dir, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
}
|
||||
if (!acl)
|
||||
inode->i_mode &= ~current_umask();
|
||||
}
|
||||
if (test_opt(inode->i_sb, POSIX_ACL) && acl) {
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
error = ext3_set_acl(handle, inode,
|
||||
ACL_TYPE_DEFAULT, acl);
|
||||
if (error)
|
||||
goto cleanup;
|
||||
}
|
||||
error = posix_acl_create(&acl, GFP_NOFS, &inode->i_mode);
|
||||
if (error < 0)
|
||||
return error;
|
||||
|
||||
if (error > 0) {
|
||||
/* This is an extended ACL */
|
||||
error = ext3_set_acl(handle, inode, ACL_TYPE_ACCESS, acl);
|
||||
}
|
||||
}
|
||||
cleanup:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
/*
|
||||
* Does chmod for an inode that may have an Access Control List. The
|
||||
* inode->i_mode field must be updated to the desired value by the caller
|
||||
* before calling this function.
|
||||
* Returns 0 on success, or a negative error number.
|
||||
*
|
||||
* We change the ACL rather than storing some ACL entries in the file
|
||||
* mode permission bits (which would be more efficient), because that
|
||||
* would break once additional permissions (like ACL_APPEND, ACL_DELETE
|
||||
* for directories) are added. There are no more bits available in the
|
||||
* file mode.
|
||||
*
|
||||
* inode->i_mutex: down
|
||||
*/
|
||||
int
|
||||
ext3_acl_chmod(struct inode *inode)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
handle_t *handle;
|
||||
int retries = 0;
|
||||
int error;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
if (!test_opt(inode->i_sb, POSIX_ACL))
|
||||
return 0;
|
||||
acl = ext3_get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl) || !acl)
|
||||
return PTR_ERR(acl);
|
||||
error = posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
|
||||
if (error)
|
||||
return error;
|
||||
retry:
|
||||
handle = ext3_journal_start(inode,
|
||||
EXT3_DATA_TRANS_BLOCKS(inode->i_sb));
|
||||
if (IS_ERR(handle)) {
|
||||
error = PTR_ERR(handle);
|
||||
ext3_std_error(inode->i_sb, error);
|
||||
goto out;
|
||||
}
|
||||
error = ext3_set_acl(handle, inode, ACL_TYPE_ACCESS, acl);
|
||||
ext3_journal_stop(handle);
|
||||
if (error == -ENOSPC &&
|
||||
ext3_should_retry_alloc(inode->i_sb, &retries))
|
||||
goto retry;
|
||||
out:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
/*
|
||||
* Extended attribute handlers
|
||||
*/
|
||||
static size_t
|
||||
ext3_xattr_list_acl_access(struct dentry *dentry, char *list, size_t list_len,
|
||||
const char *name, size_t name_len, int type)
|
||||
{
|
||||
const size_t size = sizeof(POSIX_ACL_XATTR_ACCESS);
|
||||
|
||||
if (!test_opt(dentry->d_sb, POSIX_ACL))
|
||||
return 0;
|
||||
if (list && size <= list_len)
|
||||
memcpy(list, POSIX_ACL_XATTR_ACCESS, size);
|
||||
return size;
|
||||
}
|
||||
|
||||
static size_t
|
||||
ext3_xattr_list_acl_default(struct dentry *dentry, char *list, size_t list_len,
|
||||
const char *name, size_t name_len, int type)
|
||||
{
|
||||
const size_t size = sizeof(POSIX_ACL_XATTR_DEFAULT);
|
||||
|
||||
if (!test_opt(dentry->d_sb, POSIX_ACL))
|
||||
return 0;
|
||||
if (list && size <= list_len)
|
||||
memcpy(list, POSIX_ACL_XATTR_DEFAULT, size);
|
||||
return size;
|
||||
}
|
||||
|
||||
static int
|
||||
ext3_xattr_get_acl(struct dentry *dentry, const char *name, void *buffer,
|
||||
size_t size, int type)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
struct posix_acl *default_acl, *acl;
|
||||
int error;
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
if (!test_opt(dentry->d_sb, POSIX_ACL))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
acl = ext3_get_acl(dentry->d_inode, type);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl == NULL)
|
||||
return -ENODATA;
|
||||
error = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
|
||||
posix_acl_release(acl);
|
||||
error = posix_acl_create(dir, &inode->i_mode, &default_acl, &acl);
|
||||
if (error)
|
||||
return error;
|
||||
|
||||
if (default_acl) {
|
||||
error = __ext3_set_acl(handle, inode, ACL_TYPE_DEFAULT,
|
||||
default_acl);
|
||||
posix_acl_release(default_acl);
|
||||
}
|
||||
if (acl) {
|
||||
if (!error)
|
||||
error = __ext3_set_acl(handle, inode, ACL_TYPE_ACCESS,
|
||||
acl);
|
||||
posix_acl_release(acl);
|
||||
}
|
||||
return error;
|
||||
}
|
||||
|
||||
static int
|
||||
ext3_xattr_set_acl(struct dentry *dentry, const char *name, const void *value,
|
||||
size_t size, int flags, int type)
|
||||
{
|
||||
struct inode *inode = dentry->d_inode;
|
||||
handle_t *handle;
|
||||
struct posix_acl *acl;
|
||||
int error, retries = 0;
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
if (!test_opt(inode->i_sb, POSIX_ACL))
|
||||
return -EOPNOTSUPP;
|
||||
if (!inode_owner_or_capable(inode))
|
||||
return -EPERM;
|
||||
|
||||
if (value) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
else if (acl) {
|
||||
error = posix_acl_valid(acl);
|
||||
if (error)
|
||||
goto release_and_out;
|
||||
}
|
||||
} else
|
||||
acl = NULL;
|
||||
|
||||
retry:
|
||||
handle = ext3_journal_start(inode, EXT3_DATA_TRANS_BLOCKS(inode->i_sb));
|
||||
if (IS_ERR(handle))
|
||||
return PTR_ERR(handle);
|
||||
error = ext3_set_acl(handle, inode, type, acl);
|
||||
ext3_journal_stop(handle);
|
||||
if (error == -ENOSPC && ext3_should_retry_alloc(inode->i_sb, &retries))
|
||||
goto retry;
|
||||
|
||||
release_and_out:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
const struct xattr_handler ext3_xattr_acl_access_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_ACCESS,
|
||||
.flags = ACL_TYPE_ACCESS,
|
||||
.list = ext3_xattr_list_acl_access,
|
||||
.get = ext3_xattr_get_acl,
|
||||
.set = ext3_xattr_set_acl,
|
||||
};
|
||||
|
||||
const struct xattr_handler ext3_xattr_acl_default_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_DEFAULT,
|
||||
.flags = ACL_TYPE_DEFAULT,
|
||||
.list = ext3_xattr_list_acl_default,
|
||||
.get = ext3_xattr_get_acl,
|
||||
.set = ext3_xattr_set_acl,
|
||||
};
|
||||
|
@ -55,18 +55,13 @@ static inline int ext3_acl_count(size_t size)
|
||||
|
||||
/* acl.c */
|
||||
extern struct posix_acl *ext3_get_acl(struct inode *inode, int type);
|
||||
extern int ext3_acl_chmod (struct inode *);
|
||||
extern int ext3_set_acl(struct inode *inode, struct posix_acl *acl, int type);
|
||||
extern int ext3_init_acl (handle_t *, struct inode *, struct inode *);
|
||||
|
||||
#else /* CONFIG_EXT3_FS_POSIX_ACL */
|
||||
#include <linux/sched.h>
|
||||
#define ext3_get_acl NULL
|
||||
|
||||
static inline int
|
||||
ext3_acl_chmod(struct inode *inode)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
#define ext3_set_acl NULL
|
||||
|
||||
static inline int
|
||||
ext3_init_acl(handle_t *handle, struct inode *inode, struct inode *dir)
|
||||
|
@ -75,6 +75,7 @@ const struct inode_operations ext3_file_inode_operations = {
|
||||
.removexattr = generic_removexattr,
|
||||
#endif
|
||||
.get_acl = ext3_get_acl,
|
||||
.set_acl = ext3_set_acl,
|
||||
.fiemap = ext3_fiemap,
|
||||
};
|
||||
|
||||
|
@ -3365,7 +3365,7 @@ int ext3_setattr(struct dentry *dentry, struct iattr *attr)
|
||||
mark_inode_dirty(inode);
|
||||
|
||||
if (ia_valid & ATTR_MODE)
|
||||
rc = ext3_acl_chmod(inode);
|
||||
rc = posix_acl_chmod(inode, inode->i_mode);
|
||||
|
||||
err_out:
|
||||
ext3_std_error(inode->i_sb, error);
|
||||
|
@ -2569,6 +2569,7 @@ const struct inode_operations ext3_dir_inode_operations = {
|
||||
.removexattr = generic_removexattr,
|
||||
#endif
|
||||
.get_acl = ext3_get_acl,
|
||||
.set_acl = ext3_set_acl,
|
||||
};
|
||||
|
||||
const struct inode_operations ext3_special_inode_operations = {
|
||||
@ -2580,4 +2581,5 @@ const struct inode_operations ext3_special_inode_operations = {
|
||||
.removexattr = generic_removexattr,
|
||||
#endif
|
||||
.get_acl = ext3_get_acl,
|
||||
.set_acl = ext3_set_acl,
|
||||
};
|
||||
|
@ -102,8 +102,8 @@ static struct mb_cache *ext3_xattr_cache;
|
||||
static const struct xattr_handler *ext3_xattr_handler_map[] = {
|
||||
[EXT3_XATTR_INDEX_USER] = &ext3_xattr_user_handler,
|
||||
#ifdef CONFIG_EXT3_FS_POSIX_ACL
|
||||
[EXT3_XATTR_INDEX_POSIX_ACL_ACCESS] = &ext3_xattr_acl_access_handler,
|
||||
[EXT3_XATTR_INDEX_POSIX_ACL_DEFAULT] = &ext3_xattr_acl_default_handler,
|
||||
[EXT3_XATTR_INDEX_POSIX_ACL_ACCESS] = &posix_acl_access_xattr_handler,
|
||||
[EXT3_XATTR_INDEX_POSIX_ACL_DEFAULT] = &posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
[EXT3_XATTR_INDEX_TRUSTED] = &ext3_xattr_trusted_handler,
|
||||
#ifdef CONFIG_EXT3_FS_SECURITY
|
||||
@ -115,8 +115,8 @@ const struct xattr_handler *ext3_xattr_handlers[] = {
|
||||
&ext3_xattr_user_handler,
|
||||
&ext3_xattr_trusted_handler,
|
||||
#ifdef CONFIG_EXT3_FS_POSIX_ACL
|
||||
&ext3_xattr_acl_access_handler,
|
||||
&ext3_xattr_acl_default_handler,
|
||||
&posix_acl_access_xattr_handler,
|
||||
&posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
#ifdef CONFIG_EXT3_FS_SECURITY
|
||||
&ext3_xattr_security_handler,
|
||||
|
@ -60,8 +60,6 @@ struct ext3_xattr_entry {
|
||||
|
||||
extern const struct xattr_handler ext3_xattr_user_handler;
|
||||
extern const struct xattr_handler ext3_xattr_trusted_handler;
|
||||
extern const struct xattr_handler ext3_xattr_acl_access_handler;
|
||||
extern const struct xattr_handler ext3_xattr_acl_default_handler;
|
||||
extern const struct xattr_handler ext3_xattr_security_handler;
|
||||
|
||||
extern ssize_t ext3_listxattr(struct dentry *, char *, size_t);
|
||||
|
231
fs/ext4/acl.c
231
fs/ext4/acl.c
@ -152,13 +152,6 @@ ext4_get_acl(struct inode *inode, int type)
|
||||
struct posix_acl *acl;
|
||||
int retval;
|
||||
|
||||
if (!test_opt(inode->i_sb, POSIX_ACL))
|
||||
return NULL;
|
||||
|
||||
acl = get_cached_acl(inode, type);
|
||||
if (acl != ACL_NOT_CACHED)
|
||||
return acl;
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
name_index = EXT4_XATTR_INDEX_POSIX_ACL_ACCESS;
|
||||
@ -196,7 +189,7 @@ ext4_get_acl(struct inode *inode, int type)
|
||||
* inode->i_mutex: down unless called from ext4_new_inode
|
||||
*/
|
||||
static int
|
||||
ext4_set_acl(handle_t *handle, struct inode *inode, int type,
|
||||
__ext4_set_acl(handle_t *handle, struct inode *inode, int type,
|
||||
struct posix_acl *acl)
|
||||
{
|
||||
int name_index;
|
||||
@ -204,9 +197,6 @@ ext4_set_acl(handle_t *handle, struct inode *inode, int type,
|
||||
size_t size = 0;
|
||||
int error;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
name_index = EXT4_XATTR_INDEX_POSIX_ACL_ACCESS;
|
||||
@ -248,6 +238,25 @@ ext4_set_acl(handle_t *handle, struct inode *inode, int type,
|
||||
return error;
|
||||
}
|
||||
|
||||
int
|
||||
ext4_set_acl(struct inode *inode, struct posix_acl *acl, int type)
|
||||
{
|
||||
handle_t *handle;
|
||||
int error, retries = 0;
|
||||
|
||||
retry:
|
||||
handle = ext4_journal_start(inode, EXT4_HT_XATTR,
|
||||
ext4_jbd2_credits_xattr(inode));
|
||||
if (IS_ERR(handle))
|
||||
return PTR_ERR(handle);
|
||||
|
||||
error = __ext4_set_acl(handle, inode, type, acl);
|
||||
ext4_journal_stop(handle);
|
||||
if (error == -ENOSPC && ext4_should_retry_alloc(inode->i_sb, &retries))
|
||||
goto retry;
|
||||
return error;
|
||||
}
|
||||
|
||||
/*
|
||||
* Initialize the ACLs of a new inode. Called from ext4_new_inode.
|
||||
*
|
||||
@ -257,199 +266,23 @@ ext4_set_acl(handle_t *handle, struct inode *inode, int type,
|
||||
int
|
||||
ext4_init_acl(handle_t *handle, struct inode *inode, struct inode *dir)
|
||||
{
|
||||
struct posix_acl *acl = NULL;
|
||||
int error = 0;
|
||||
|
||||
if (!S_ISLNK(inode->i_mode)) {
|
||||
if (test_opt(dir->i_sb, POSIX_ACL)) {
|
||||
acl = ext4_get_acl(dir, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
}
|
||||
if (!acl)
|
||||
inode->i_mode &= ~current_umask();
|
||||
}
|
||||
if (test_opt(inode->i_sb, POSIX_ACL) && acl) {
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
error = ext4_set_acl(handle, inode,
|
||||
ACL_TYPE_DEFAULT, acl);
|
||||
if (error)
|
||||
goto cleanup;
|
||||
}
|
||||
error = posix_acl_create(&acl, GFP_NOFS, &inode->i_mode);
|
||||
if (error < 0)
|
||||
return error;
|
||||
|
||||
if (error > 0) {
|
||||
/* This is an extended ACL */
|
||||
error = ext4_set_acl(handle, inode, ACL_TYPE_ACCESS, acl);
|
||||
}
|
||||
}
|
||||
cleanup:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
/*
|
||||
* Does chmod for an inode that may have an Access Control List. The
|
||||
* inode->i_mode field must be updated to the desired value by the caller
|
||||
* before calling this function.
|
||||
* Returns 0 on success, or a negative error number.
|
||||
*
|
||||
* We change the ACL rather than storing some ACL entries in the file
|
||||
* mode permission bits (which would be more efficient), because that
|
||||
* would break once additional permissions (like ACL_APPEND, ACL_DELETE
|
||||
* for directories) are added. There are no more bits available in the
|
||||
* file mode.
|
||||
*
|
||||
* inode->i_mutex: down
|
||||
*/
|
||||
int
|
||||
ext4_acl_chmod(struct inode *inode)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
handle_t *handle;
|
||||
int retries = 0;
|
||||
struct posix_acl *default_acl, *acl;
|
||||
int error;
|
||||
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
if (!test_opt(inode->i_sb, POSIX_ACL))
|
||||
return 0;
|
||||
acl = ext4_get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl) || !acl)
|
||||
return PTR_ERR(acl);
|
||||
error = posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
|
||||
error = posix_acl_create(dir, &inode->i_mode, &default_acl, &acl);
|
||||
if (error)
|
||||
return error;
|
||||
retry:
|
||||
handle = ext4_journal_start(inode, EXT4_HT_XATTR,
|
||||
ext4_jbd2_credits_xattr(inode));
|
||||
if (IS_ERR(handle)) {
|
||||
error = PTR_ERR(handle);
|
||||
ext4_std_error(inode->i_sb, error);
|
||||
goto out;
|
||||
|
||||
if (default_acl) {
|
||||
error = __ext4_set_acl(handle, inode, ACL_TYPE_DEFAULT,
|
||||
default_acl);
|
||||
posix_acl_release(default_acl);
|
||||
}
|
||||
error = ext4_set_acl(handle, inode, ACL_TYPE_ACCESS, acl);
|
||||
ext4_journal_stop(handle);
|
||||
if (error == -ENOSPC &&
|
||||
ext4_should_retry_alloc(inode->i_sb, &retries))
|
||||
goto retry;
|
||||
out:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
/*
|
||||
* Extended attribute handlers
|
||||
*/
|
||||
static size_t
|
||||
ext4_xattr_list_acl_access(struct dentry *dentry, char *list, size_t list_len,
|
||||
const char *name, size_t name_len, int type)
|
||||
{
|
||||
const size_t size = sizeof(POSIX_ACL_XATTR_ACCESS);
|
||||
|
||||
if (!test_opt(dentry->d_sb, POSIX_ACL))
|
||||
return 0;
|
||||
if (list && size <= list_len)
|
||||
memcpy(list, POSIX_ACL_XATTR_ACCESS, size);
|
||||
return size;
|
||||
}
|
||||
|
||||
static size_t
|
||||
ext4_xattr_list_acl_default(struct dentry *dentry, char *list, size_t list_len,
|
||||
const char *name, size_t name_len, int type)
|
||||
{
|
||||
const size_t size = sizeof(POSIX_ACL_XATTR_DEFAULT);
|
||||
|
||||
if (!test_opt(dentry->d_sb, POSIX_ACL))
|
||||
return 0;
|
||||
if (list && size <= list_len)
|
||||
memcpy(list, POSIX_ACL_XATTR_DEFAULT, size);
|
||||
return size;
|
||||
}
|
||||
|
||||
static int
|
||||
ext4_xattr_get_acl(struct dentry *dentry, const char *name, void *buffer,
|
||||
size_t size, int type)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int error;
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
if (!test_opt(dentry->d_sb, POSIX_ACL))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
acl = ext4_get_acl(dentry->d_inode, type);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl == NULL)
|
||||
return -ENODATA;
|
||||
error = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
|
||||
posix_acl_release(acl);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static int
|
||||
ext4_xattr_set_acl(struct dentry *dentry, const char *name, const void *value,
|
||||
size_t size, int flags, int type)
|
||||
{
|
||||
struct inode *inode = dentry->d_inode;
|
||||
handle_t *handle;
|
||||
struct posix_acl *acl;
|
||||
int error, retries = 0;
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
if (!test_opt(inode->i_sb, POSIX_ACL))
|
||||
return -EOPNOTSUPP;
|
||||
if (!inode_owner_or_capable(inode))
|
||||
return -EPERM;
|
||||
|
||||
if (value) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
else if (acl) {
|
||||
error = posix_acl_valid(acl);
|
||||
if (error)
|
||||
goto release_and_out;
|
||||
}
|
||||
} else
|
||||
acl = NULL;
|
||||
|
||||
retry:
|
||||
handle = ext4_journal_start(inode, EXT4_HT_XATTR,
|
||||
ext4_jbd2_credits_xattr(inode));
|
||||
if (IS_ERR(handle)) {
|
||||
error = PTR_ERR(handle);
|
||||
goto release_and_out;
|
||||
if (acl) {
|
||||
if (!error)
|
||||
error = __ext4_set_acl(handle, inode, ACL_TYPE_ACCESS,
|
||||
acl);
|
||||
posix_acl_release(acl);
|
||||
}
|
||||
error = ext4_set_acl(handle, inode, type, acl);
|
||||
ext4_journal_stop(handle);
|
||||
if (error == -ENOSPC && ext4_should_retry_alloc(inode->i_sb, &retries))
|
||||
goto retry;
|
||||
|
||||
release_and_out:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
const struct xattr_handler ext4_xattr_acl_access_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_ACCESS,
|
||||
.flags = ACL_TYPE_ACCESS,
|
||||
.list = ext4_xattr_list_acl_access,
|
||||
.get = ext4_xattr_get_acl,
|
||||
.set = ext4_xattr_set_acl,
|
||||
};
|
||||
|
||||
const struct xattr_handler ext4_xattr_acl_default_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_DEFAULT,
|
||||
.flags = ACL_TYPE_DEFAULT,
|
||||
.list = ext4_xattr_list_acl_default,
|
||||
.get = ext4_xattr_get_acl,
|
||||
.set = ext4_xattr_set_acl,
|
||||
};
|
||||
|
@ -55,18 +55,13 @@ static inline int ext4_acl_count(size_t size)
|
||||
|
||||
/* acl.c */
|
||||
struct posix_acl *ext4_get_acl(struct inode *inode, int type);
|
||||
extern int ext4_acl_chmod(struct inode *);
|
||||
int ext4_set_acl(struct inode *inode, struct posix_acl *acl, int type);
|
||||
extern int ext4_init_acl(handle_t *, struct inode *, struct inode *);
|
||||
|
||||
#else /* CONFIG_EXT4_FS_POSIX_ACL */
|
||||
#include <linux/sched.h>
|
||||
#define ext4_get_acl NULL
|
||||
|
||||
static inline int
|
||||
ext4_acl_chmod(struct inode *inode)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
#define ext4_set_acl NULL
|
||||
|
||||
static inline int
|
||||
ext4_init_acl(handle_t *handle, struct inode *inode, struct inode *dir)
|
||||
|
@ -617,6 +617,7 @@ const struct inode_operations ext4_file_inode_operations = {
|
||||
.listxattr = ext4_listxattr,
|
||||
.removexattr = generic_removexattr,
|
||||
.get_acl = ext4_get_acl,
|
||||
.set_acl = ext4_set_acl,
|
||||
.fiemap = ext4_fiemap,
|
||||
};
|
||||
|
||||
|
@ -4667,7 +4667,7 @@ int ext4_setattr(struct dentry *dentry, struct iattr *attr)
|
||||
ext4_orphan_del(NULL, inode);
|
||||
|
||||
if (!rc && (ia_valid & ATTR_MODE))
|
||||
rc = ext4_acl_chmod(inode);
|
||||
rc = posix_acl_chmod(inode, inode->i_mode);
|
||||
|
||||
err_out:
|
||||
ext4_std_error(inode->i_sb, error);
|
||||
|
@ -3225,6 +3225,7 @@ const struct inode_operations ext4_dir_inode_operations = {
|
||||
.listxattr = ext4_listxattr,
|
||||
.removexattr = generic_removexattr,
|
||||
.get_acl = ext4_get_acl,
|
||||
.set_acl = ext4_set_acl,
|
||||
.fiemap = ext4_fiemap,
|
||||
};
|
||||
|
||||
@ -3235,4 +3236,5 @@ const struct inode_operations ext4_special_inode_operations = {
|
||||
.listxattr = ext4_listxattr,
|
||||
.removexattr = generic_removexattr,
|
||||
.get_acl = ext4_get_acl,
|
||||
.set_acl = ext4_set_acl,
|
||||
};
|
||||
|
@ -95,8 +95,8 @@ static struct mb_cache *ext4_xattr_cache;
|
||||
static const struct xattr_handler *ext4_xattr_handler_map[] = {
|
||||
[EXT4_XATTR_INDEX_USER] = &ext4_xattr_user_handler,
|
||||
#ifdef CONFIG_EXT4_FS_POSIX_ACL
|
||||
[EXT4_XATTR_INDEX_POSIX_ACL_ACCESS] = &ext4_xattr_acl_access_handler,
|
||||
[EXT4_XATTR_INDEX_POSIX_ACL_DEFAULT] = &ext4_xattr_acl_default_handler,
|
||||
[EXT4_XATTR_INDEX_POSIX_ACL_ACCESS] = &posix_acl_access_xattr_handler,
|
||||
[EXT4_XATTR_INDEX_POSIX_ACL_DEFAULT] = &posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
[EXT4_XATTR_INDEX_TRUSTED] = &ext4_xattr_trusted_handler,
|
||||
#ifdef CONFIG_EXT4_FS_SECURITY
|
||||
@ -108,8 +108,8 @@ const struct xattr_handler *ext4_xattr_handlers[] = {
|
||||
&ext4_xattr_user_handler,
|
||||
&ext4_xattr_trusted_handler,
|
||||
#ifdef CONFIG_EXT4_FS_POSIX_ACL
|
||||
&ext4_xattr_acl_access_handler,
|
||||
&ext4_xattr_acl_default_handler,
|
||||
&posix_acl_access_xattr_handler,
|
||||
&posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
#ifdef CONFIG_EXT4_FS_SECURITY
|
||||
&ext4_xattr_security_handler,
|
||||
|
@ -96,8 +96,6 @@ struct ext4_xattr_ibody_find {
|
||||
|
||||
extern const struct xattr_handler ext4_xattr_user_handler;
|
||||
extern const struct xattr_handler ext4_xattr_trusted_handler;
|
||||
extern const struct xattr_handler ext4_xattr_acl_access_handler;
|
||||
extern const struct xattr_handler ext4_xattr_acl_default_handler;
|
||||
extern const struct xattr_handler ext4_xattr_security_handler;
|
||||
|
||||
extern ssize_t ext4_listxattr(struct dentry *, char *, size_t);
|
||||
|
174
fs/f2fs/acl.c
174
fs/f2fs/acl.c
@ -17,9 +17,6 @@
|
||||
#include "xattr.h"
|
||||
#include "acl.h"
|
||||
|
||||
#define get_inode_mode(i) ((is_inode_flag_set(F2FS_I(i), FI_ACL_MODE)) ? \
|
||||
(F2FS_I(i)->i_acl_mode) : ((i)->i_mode))
|
||||
|
||||
static inline size_t f2fs_acl_size(int count)
|
||||
{
|
||||
if (count <= 4) {
|
||||
@ -167,19 +164,11 @@ fail:
|
||||
|
||||
struct posix_acl *f2fs_get_acl(struct inode *inode, int type)
|
||||
{
|
||||
struct f2fs_sb_info *sbi = F2FS_SB(inode->i_sb);
|
||||
int name_index = F2FS_XATTR_INDEX_POSIX_ACL_DEFAULT;
|
||||
void *value = NULL;
|
||||
struct posix_acl *acl;
|
||||
int retval;
|
||||
|
||||
if (!test_opt(sbi, POSIX_ACL))
|
||||
return NULL;
|
||||
|
||||
acl = get_cached_acl(inode, type);
|
||||
if (acl != ACL_NOT_CACHED)
|
||||
return acl;
|
||||
|
||||
if (type == ACL_TYPE_ACCESS)
|
||||
name_index = F2FS_XATTR_INDEX_POSIX_ACL_ACCESS;
|
||||
|
||||
@ -205,21 +194,15 @@ struct posix_acl *f2fs_get_acl(struct inode *inode, int type)
|
||||
return acl;
|
||||
}
|
||||
|
||||
static int f2fs_set_acl(struct inode *inode, int type,
|
||||
static int __f2fs_set_acl(struct inode *inode, int type,
|
||||
struct posix_acl *acl, struct page *ipage)
|
||||
{
|
||||
struct f2fs_sb_info *sbi = F2FS_SB(inode->i_sb);
|
||||
struct f2fs_inode_info *fi = F2FS_I(inode);
|
||||
int name_index;
|
||||
void *value = NULL;
|
||||
size_t size = 0;
|
||||
int error;
|
||||
|
||||
if (!test_opt(sbi, POSIX_ACL))
|
||||
return 0;
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
name_index = F2FS_XATTR_INDEX_POSIX_ACL_ACCESS;
|
||||
@ -261,154 +244,31 @@ static int f2fs_set_acl(struct inode *inode, int type,
|
||||
return error;
|
||||
}
|
||||
|
||||
int f2fs_init_acl(struct inode *inode, struct inode *dir, struct page *ipage)
|
||||
int f2fs_set_acl(struct inode *inode, struct posix_acl *acl, int type)
|
||||
{
|
||||
struct f2fs_sb_info *sbi = F2FS_SB(dir->i_sb);
|
||||
struct posix_acl *acl = NULL;
|
||||
int error = 0;
|
||||
|
||||
if (!S_ISLNK(inode->i_mode)) {
|
||||
if (test_opt(sbi, POSIX_ACL)) {
|
||||
acl = f2fs_get_acl(dir, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
}
|
||||
if (!acl)
|
||||
inode->i_mode &= ~current_umask();
|
||||
}
|
||||
|
||||
if (!test_opt(sbi, POSIX_ACL) || !acl)
|
||||
goto cleanup;
|
||||
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
error = f2fs_set_acl(inode, ACL_TYPE_DEFAULT, acl, ipage);
|
||||
if (error)
|
||||
goto cleanup;
|
||||
}
|
||||
error = posix_acl_create(&acl, GFP_KERNEL, &inode->i_mode);
|
||||
if (error < 0)
|
||||
return error;
|
||||
if (error > 0)
|
||||
error = f2fs_set_acl(inode, ACL_TYPE_ACCESS, acl, ipage);
|
||||
cleanup:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
return __f2fs_set_acl(inode, type, acl, NULL);
|
||||
}
|
||||
|
||||
int f2fs_acl_chmod(struct inode *inode)
|
||||
int f2fs_init_acl(struct inode *inode, struct inode *dir, struct page *ipage)
|
||||
{
|
||||
struct f2fs_sb_info *sbi = F2FS_SB(inode->i_sb);
|
||||
struct posix_acl *acl;
|
||||
int error;
|
||||
umode_t mode = get_inode_mode(inode);
|
||||
struct posix_acl *default_acl, *acl;
|
||||
int error = 0;
|
||||
|
||||
if (!test_opt(sbi, POSIX_ACL))
|
||||
return 0;
|
||||
if (S_ISLNK(mode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
acl = f2fs_get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl) || !acl)
|
||||
return PTR_ERR(acl);
|
||||
|
||||
error = posix_acl_chmod(&acl, GFP_KERNEL, mode);
|
||||
error = posix_acl_create(dir, &inode->i_mode, &default_acl, &acl);
|
||||
if (error)
|
||||
return error;
|
||||
|
||||
error = f2fs_set_acl(inode, ACL_TYPE_ACCESS, acl, NULL);
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
static size_t f2fs_xattr_list_acl(struct dentry *dentry, char *list,
|
||||
size_t list_size, const char *name, size_t name_len, int type)
|
||||
{
|
||||
struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb);
|
||||
const char *xname = POSIX_ACL_XATTR_DEFAULT;
|
||||
size_t size;
|
||||
|
||||
if (!test_opt(sbi, POSIX_ACL))
|
||||
return 0;
|
||||
|
||||
if (type == ACL_TYPE_ACCESS)
|
||||
xname = POSIX_ACL_XATTR_ACCESS;
|
||||
|
||||
size = strlen(xname) + 1;
|
||||
if (list && size <= list_size)
|
||||
memcpy(list, xname, size);
|
||||
return size;
|
||||
}
|
||||
|
||||
static int f2fs_xattr_get_acl(struct dentry *dentry, const char *name,
|
||||
void *buffer, size_t size, int type)
|
||||
{
|
||||
struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb);
|
||||
struct posix_acl *acl;
|
||||
int error;
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
if (!test_opt(sbi, POSIX_ACL))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
acl = f2fs_get_acl(dentry->d_inode, type);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (!acl)
|
||||
return -ENODATA;
|
||||
error = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
|
||||
posix_acl_release(acl);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static int f2fs_xattr_set_acl(struct dentry *dentry, const char *name,
|
||||
const void *value, size_t size, int flags, int type)
|
||||
{
|
||||
struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb);
|
||||
struct inode *inode = dentry->d_inode;
|
||||
struct posix_acl *acl = NULL;
|
||||
int error;
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
if (!test_opt(sbi, POSIX_ACL))
|
||||
return -EOPNOTSUPP;
|
||||
if (!inode_owner_or_capable(inode))
|
||||
return -EPERM;
|
||||
|
||||
if (value) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl) {
|
||||
error = posix_acl_valid(acl);
|
||||
if (error)
|
||||
goto release_and_out;
|
||||
}
|
||||
} else {
|
||||
acl = NULL;
|
||||
if (default_acl) {
|
||||
error = __f2fs_set_acl(inode, ACL_TYPE_DEFAULT, default_acl,
|
||||
ipage);
|
||||
posix_acl_release(default_acl);
|
||||
}
|
||||
if (acl) {
|
||||
if (error)
|
||||
error = __f2fs_set_acl(inode, ACL_TYPE_ACCESS, acl,
|
||||
ipage);
|
||||
posix_acl_release(acl);
|
||||
}
|
||||
|
||||
error = f2fs_set_acl(inode, type, acl, NULL);
|
||||
|
||||
release_and_out:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
const struct xattr_handler f2fs_xattr_acl_default_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_DEFAULT,
|
||||
.flags = ACL_TYPE_DEFAULT,
|
||||
.list = f2fs_xattr_list_acl,
|
||||
.get = f2fs_xattr_get_acl,
|
||||
.set = f2fs_xattr_set_acl,
|
||||
};
|
||||
|
||||
const struct xattr_handler f2fs_xattr_acl_access_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_ACCESS,
|
||||
.flags = ACL_TYPE_ACCESS,
|
||||
.list = f2fs_xattr_list_acl,
|
||||
.get = f2fs_xattr_get_acl,
|
||||
.set = f2fs_xattr_set_acl,
|
||||
};
|
||||
|
@ -37,18 +37,13 @@ struct f2fs_acl_header {
|
||||
#ifdef CONFIG_F2FS_FS_POSIX_ACL
|
||||
|
||||
extern struct posix_acl *f2fs_get_acl(struct inode *, int);
|
||||
extern int f2fs_acl_chmod(struct inode *);
|
||||
extern int f2fs_set_acl(struct inode *inode, struct posix_acl *acl, int type);
|
||||
extern int f2fs_init_acl(struct inode *, struct inode *, struct page *);
|
||||
#else
|
||||
#define f2fs_check_acl NULL
|
||||
#define f2fs_get_acl NULL
|
||||
#define f2fs_set_acl NULL
|
||||
|
||||
static inline int f2fs_acl_chmod(struct inode *inode)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int f2fs_init_acl(struct inode *inode, struct inode *dir,
|
||||
struct page *page)
|
||||
{
|
||||
|
@ -1023,6 +1023,10 @@ static inline int f2fs_readonly(struct super_block *sb)
|
||||
return sb->s_flags & MS_RDONLY;
|
||||
}
|
||||
|
||||
#define get_inode_mode(i) \
|
||||
((is_inode_flag_set(F2FS_I(i), FI_ACL_MODE)) ? \
|
||||
(F2FS_I(i)->i_acl_mode) : ((i)->i_mode))
|
||||
|
||||
/*
|
||||
* file.c
|
||||
*/
|
||||
|
@ -382,7 +382,7 @@ int f2fs_setattr(struct dentry *dentry, struct iattr *attr)
|
||||
__setattr_copy(inode, attr);
|
||||
|
||||
if (attr->ia_valid & ATTR_MODE) {
|
||||
err = f2fs_acl_chmod(inode);
|
||||
err = posix_acl_chmod(inode, get_inode_mode(inode));
|
||||
if (err || is_inode_flag_set(fi, FI_ACL_MODE)) {
|
||||
inode->i_mode = fi->i_acl_mode;
|
||||
clear_inode_flag(fi, FI_ACL_MODE);
|
||||
@ -397,6 +397,7 @@ const struct inode_operations f2fs_file_inode_operations = {
|
||||
.getattr = f2fs_getattr,
|
||||
.setattr = f2fs_setattr,
|
||||
.get_acl = f2fs_get_acl,
|
||||
.set_acl = f2fs_set_acl,
|
||||
#ifdef CONFIG_F2FS_FS_XATTR
|
||||
.setxattr = generic_setxattr,
|
||||
.getxattr = generic_getxattr,
|
||||
|
@ -501,6 +501,7 @@ const struct inode_operations f2fs_dir_inode_operations = {
|
||||
.getattr = f2fs_getattr,
|
||||
.setattr = f2fs_setattr,
|
||||
.get_acl = f2fs_get_acl,
|
||||
.set_acl = f2fs_set_acl,
|
||||
#ifdef CONFIG_F2FS_FS_XATTR
|
||||
.setxattr = generic_setxattr,
|
||||
.getxattr = generic_getxattr,
|
||||
@ -527,6 +528,7 @@ const struct inode_operations f2fs_special_inode_operations = {
|
||||
.getattr = f2fs_getattr,
|
||||
.setattr = f2fs_setattr,
|
||||
.get_acl = f2fs_get_acl,
|
||||
.set_acl = f2fs_set_acl,
|
||||
#ifdef CONFIG_F2FS_FS_XATTR
|
||||
.setxattr = generic_setxattr,
|
||||
.getxattr = generic_getxattr,
|
||||
|
@ -21,6 +21,7 @@
|
||||
#include <linux/rwsem.h>
|
||||
#include <linux/f2fs_fs.h>
|
||||
#include <linux/security.h>
|
||||
#include <linux/posix_acl_xattr.h>
|
||||
#include "f2fs.h"
|
||||
#include "xattr.h"
|
||||
|
||||
@ -216,8 +217,8 @@ const struct xattr_handler f2fs_xattr_security_handler = {
|
||||
static const struct xattr_handler *f2fs_xattr_handler_map[] = {
|
||||
[F2FS_XATTR_INDEX_USER] = &f2fs_xattr_user_handler,
|
||||
#ifdef CONFIG_F2FS_FS_POSIX_ACL
|
||||
[F2FS_XATTR_INDEX_POSIX_ACL_ACCESS] = &f2fs_xattr_acl_access_handler,
|
||||
[F2FS_XATTR_INDEX_POSIX_ACL_DEFAULT] = &f2fs_xattr_acl_default_handler,
|
||||
[F2FS_XATTR_INDEX_POSIX_ACL_ACCESS] = &posix_acl_access_xattr_handler,
|
||||
[F2FS_XATTR_INDEX_POSIX_ACL_DEFAULT] = &posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
[F2FS_XATTR_INDEX_TRUSTED] = &f2fs_xattr_trusted_handler,
|
||||
#ifdef CONFIG_F2FS_FS_SECURITY
|
||||
@ -229,8 +230,8 @@ static const struct xattr_handler *f2fs_xattr_handler_map[] = {
|
||||
const struct xattr_handler *f2fs_xattr_handlers[] = {
|
||||
&f2fs_xattr_user_handler,
|
||||
#ifdef CONFIG_F2FS_FS_POSIX_ACL
|
||||
&f2fs_xattr_acl_access_handler,
|
||||
&f2fs_xattr_acl_default_handler,
|
||||
&posix_acl_access_xattr_handler,
|
||||
&posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
&f2fs_xattr_trusted_handler,
|
||||
#ifdef CONFIG_F2FS_FS_SECURITY
|
||||
|
@ -108,8 +108,6 @@ struct f2fs_xattr_entry {
|
||||
#ifdef CONFIG_F2FS_FS_XATTR
|
||||
extern const struct xattr_handler f2fs_xattr_user_handler;
|
||||
extern const struct xattr_handler f2fs_xattr_trusted_handler;
|
||||
extern const struct xattr_handler f2fs_xattr_acl_access_handler;
|
||||
extern const struct xattr_handler f2fs_xattr_acl_default_handler;
|
||||
extern const struct xattr_handler f2fs_xattr_advise_handler;
|
||||
extern const struct xattr_handler f2fs_xattr_security_handler;
|
||||
|
||||
|
98
fs/file.c
98
fs/file.c
@ -348,21 +348,16 @@ out:
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static void close_files(struct files_struct * files)
|
||||
static struct fdtable *close_files(struct files_struct * files)
|
||||
{
|
||||
int i, j;
|
||||
struct fdtable *fdt;
|
||||
|
||||
j = 0;
|
||||
|
||||
/*
|
||||
* It is safe to dereference the fd table without RCU or
|
||||
* ->file_lock because this is the last reference to the
|
||||
* files structure. But use RCU to shut RCU-lockdep up.
|
||||
* files structure.
|
||||
*/
|
||||
rcu_read_lock();
|
||||
fdt = files_fdtable(files);
|
||||
rcu_read_unlock();
|
||||
struct fdtable *fdt = rcu_dereference_raw(files->fdt);
|
||||
int i, j = 0;
|
||||
|
||||
for (;;) {
|
||||
unsigned long set;
|
||||
i = j * BITS_PER_LONG;
|
||||
@ -381,6 +376,8 @@ static void close_files(struct files_struct * files)
|
||||
set >>= 1;
|
||||
}
|
||||
}
|
||||
|
||||
return fdt;
|
||||
}
|
||||
|
||||
struct files_struct *get_files_struct(struct task_struct *task)
|
||||
@ -398,14 +395,9 @@ struct files_struct *get_files_struct(struct task_struct *task)
|
||||
|
||||
void put_files_struct(struct files_struct *files)
|
||||
{
|
||||
struct fdtable *fdt;
|
||||
|
||||
if (atomic_dec_and_test(&files->count)) {
|
||||
close_files(files);
|
||||
/* not really needed, since nobody can see us */
|
||||
rcu_read_lock();
|
||||
fdt = files_fdtable(files);
|
||||
rcu_read_unlock();
|
||||
struct fdtable *fdt = close_files(files);
|
||||
|
||||
/* free the arrays if they are not embedded */
|
||||
if (fdt != &files->fdtab)
|
||||
__free_fdtable(fdt);
|
||||
@ -645,16 +637,16 @@ void do_close_on_exec(struct files_struct *files)
|
||||
spin_unlock(&files->file_lock);
|
||||
}
|
||||
|
||||
struct file *fget(unsigned int fd)
|
||||
static struct file *__fget(unsigned int fd, fmode_t mask)
|
||||
{
|
||||
struct file *file;
|
||||
struct files_struct *files = current->files;
|
||||
struct file *file;
|
||||
|
||||
rcu_read_lock();
|
||||
file = fcheck_files(files, fd);
|
||||
if (file) {
|
||||
/* File object ref couldn't be taken */
|
||||
if (file->f_mode & FMODE_PATH ||
|
||||
if ((file->f_mode & mask) ||
|
||||
!atomic_long_inc_not_zero(&file->f_count))
|
||||
file = NULL;
|
||||
}
|
||||
@ -663,25 +655,16 @@ struct file *fget(unsigned int fd)
|
||||
return file;
|
||||
}
|
||||
|
||||
struct file *fget(unsigned int fd)
|
||||
{
|
||||
return __fget(fd, FMODE_PATH);
|
||||
}
|
||||
EXPORT_SYMBOL(fget);
|
||||
|
||||
struct file *fget_raw(unsigned int fd)
|
||||
{
|
||||
struct file *file;
|
||||
struct files_struct *files = current->files;
|
||||
|
||||
rcu_read_lock();
|
||||
file = fcheck_files(files, fd);
|
||||
if (file) {
|
||||
/* File object ref couldn't be taken */
|
||||
if (!atomic_long_inc_not_zero(&file->f_count))
|
||||
file = NULL;
|
||||
}
|
||||
rcu_read_unlock();
|
||||
|
||||
return file;
|
||||
return __fget(fd, 0);
|
||||
}
|
||||
|
||||
EXPORT_SYMBOL(fget_raw);
|
||||
|
||||
/*
|
||||
@ -700,56 +683,33 @@ EXPORT_SYMBOL(fget_raw);
|
||||
* The fput_needed flag returned by fget_light should be passed to the
|
||||
* corresponding fput_light.
|
||||
*/
|
||||
struct file *fget_light(unsigned int fd, int *fput_needed)
|
||||
struct file *__fget_light(unsigned int fd, fmode_t mask, int *fput_needed)
|
||||
{
|
||||
struct file *file;
|
||||
struct files_struct *files = current->files;
|
||||
struct file *file;
|
||||
|
||||
*fput_needed = 0;
|
||||
if (atomic_read(&files->count) == 1) {
|
||||
file = fcheck_files(files, fd);
|
||||
if (file && (file->f_mode & FMODE_PATH))
|
||||
file = __fcheck_files(files, fd);
|
||||
if (file && (file->f_mode & mask))
|
||||
file = NULL;
|
||||
} else {
|
||||
rcu_read_lock();
|
||||
file = fcheck_files(files, fd);
|
||||
if (file) {
|
||||
if (!(file->f_mode & FMODE_PATH) &&
|
||||
atomic_long_inc_not_zero(&file->f_count))
|
||||
*fput_needed = 1;
|
||||
else
|
||||
/* Didn't get the reference, someone's freed */
|
||||
file = NULL;
|
||||
}
|
||||
rcu_read_unlock();
|
||||
file = __fget(fd, mask);
|
||||
if (file)
|
||||
*fput_needed = 1;
|
||||
}
|
||||
|
||||
return file;
|
||||
}
|
||||
struct file *fget_light(unsigned int fd, int *fput_needed)
|
||||
{
|
||||
return __fget_light(fd, FMODE_PATH, fput_needed);
|
||||
}
|
||||
EXPORT_SYMBOL(fget_light);
|
||||
|
||||
struct file *fget_raw_light(unsigned int fd, int *fput_needed)
|
||||
{
|
||||
struct file *file;
|
||||
struct files_struct *files = current->files;
|
||||
|
||||
*fput_needed = 0;
|
||||
if (atomic_read(&files->count) == 1) {
|
||||
file = fcheck_files(files, fd);
|
||||
} else {
|
||||
rcu_read_lock();
|
||||
file = fcheck_files(files, fd);
|
||||
if (file) {
|
||||
if (atomic_long_inc_not_zero(&file->f_count))
|
||||
*fput_needed = 1;
|
||||
else
|
||||
/* Didn't get the reference, someone's freed */
|
||||
file = NULL;
|
||||
}
|
||||
rcu_read_unlock();
|
||||
}
|
||||
|
||||
return file;
|
||||
return __fget_light(fd, 0, fput_needed);
|
||||
}
|
||||
|
||||
void set_close_on_exec(unsigned int fd, int flag)
|
||||
|
@ -2727,6 +2727,9 @@ fuse_direct_IO(int rw, struct kiocb *iocb, const struct iovec *iov,
|
||||
inode = file->f_mapping->host;
|
||||
i_size = i_size_read(inode);
|
||||
|
||||
if ((rw == READ) && (offset > i_size))
|
||||
return 0;
|
||||
|
||||
/* optimization for short read */
|
||||
if (async_dio && rw != WRITE && offset + count > i_size) {
|
||||
if (offset >= i_size)
|
||||
|
184
fs/generic_acl.c
184
fs/generic_acl.c
@ -1,184 +0,0 @@
|
||||
/*
|
||||
* (C) 2005 Andreas Gruenbacher <agruen@suse.de>
|
||||
*
|
||||
* This file is released under the GPL.
|
||||
*
|
||||
* Generic ACL support for in-memory filesystems.
|
||||
*/
|
||||
|
||||
#include <linux/sched.h>
|
||||
#include <linux/gfp.h>
|
||||
#include <linux/fs.h>
|
||||
#include <linux/generic_acl.h>
|
||||
#include <linux/posix_acl.h>
|
||||
#include <linux/posix_acl_xattr.h>
|
||||
|
||||
|
||||
static size_t
|
||||
generic_acl_list(struct dentry *dentry, char *list, size_t list_size,
|
||||
const char *name, size_t name_len, int type)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
const char *xname;
|
||||
size_t size;
|
||||
|
||||
acl = get_cached_acl(dentry->d_inode, type);
|
||||
if (!acl)
|
||||
return 0;
|
||||
posix_acl_release(acl);
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
xname = POSIX_ACL_XATTR_ACCESS;
|
||||
break;
|
||||
case ACL_TYPE_DEFAULT:
|
||||
xname = POSIX_ACL_XATTR_DEFAULT;
|
||||
break;
|
||||
default:
|
||||
return 0;
|
||||
}
|
||||
size = strlen(xname) + 1;
|
||||
if (list && size <= list_size)
|
||||
memcpy(list, xname, size);
|
||||
return size;
|
||||
}
|
||||
|
||||
static int
|
||||
generic_acl_get(struct dentry *dentry, const char *name, void *buffer,
|
||||
size_t size, int type)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int error;
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
|
||||
acl = get_cached_acl(dentry->d_inode, type);
|
||||
if (!acl)
|
||||
return -ENODATA;
|
||||
error = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
|
||||
posix_acl_release(acl);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static int
|
||||
generic_acl_set(struct dentry *dentry, const char *name, const void *value,
|
||||
size_t size, int flags, int type)
|
||||
{
|
||||
struct inode *inode = dentry->d_inode;
|
||||
struct posix_acl *acl = NULL;
|
||||
int error;
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
if (!inode_owner_or_capable(inode))
|
||||
return -EPERM;
|
||||
if (value) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
}
|
||||
if (acl) {
|
||||
error = posix_acl_valid(acl);
|
||||
if (error)
|
||||
goto failed;
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
error = posix_acl_equiv_mode(acl, &inode->i_mode);
|
||||
if (error < 0)
|
||||
goto failed;
|
||||
inode->i_ctime = CURRENT_TIME;
|
||||
if (error == 0) {
|
||||
posix_acl_release(acl);
|
||||
acl = NULL;
|
||||
}
|
||||
break;
|
||||
case ACL_TYPE_DEFAULT:
|
||||
if (!S_ISDIR(inode->i_mode)) {
|
||||
error = -EINVAL;
|
||||
goto failed;
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
set_cached_acl(inode, type, acl);
|
||||
error = 0;
|
||||
failed:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
/**
|
||||
* generic_acl_init - Take care of acl inheritance at @inode create time
|
||||
*
|
||||
* Files created inside a directory with a default ACL inherit the
|
||||
* directory's default ACL.
|
||||
*/
|
||||
int
|
||||
generic_acl_init(struct inode *inode, struct inode *dir)
|
||||
{
|
||||
struct posix_acl *acl = NULL;
|
||||
int error;
|
||||
|
||||
if (!S_ISLNK(inode->i_mode))
|
||||
acl = get_cached_acl(dir, ACL_TYPE_DEFAULT);
|
||||
if (acl) {
|
||||
if (S_ISDIR(inode->i_mode))
|
||||
set_cached_acl(inode, ACL_TYPE_DEFAULT, acl);
|
||||
error = posix_acl_create(&acl, GFP_KERNEL, &inode->i_mode);
|
||||
if (error < 0)
|
||||
return error;
|
||||
if (error > 0)
|
||||
set_cached_acl(inode, ACL_TYPE_ACCESS, acl);
|
||||
} else {
|
||||
inode->i_mode &= ~current_umask();
|
||||
}
|
||||
error = 0;
|
||||
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
/**
|
||||
* generic_acl_chmod - change the access acl of @inode upon chmod()
|
||||
*
|
||||
* A chmod also changes the permissions of the owner, group/mask, and
|
||||
* other ACL entries.
|
||||
*/
|
||||
int
|
||||
generic_acl_chmod(struct inode *inode)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int error = 0;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
acl = get_cached_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (acl) {
|
||||
error = posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
|
||||
if (error)
|
||||
return error;
|
||||
set_cached_acl(inode, ACL_TYPE_ACCESS, acl);
|
||||
posix_acl_release(acl);
|
||||
}
|
||||
return error;
|
||||
}
|
||||
|
||||
const struct xattr_handler generic_acl_access_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_ACCESS,
|
||||
.flags = ACL_TYPE_ACCESS,
|
||||
.list = generic_acl_list,
|
||||
.get = generic_acl_get,
|
||||
.set = generic_acl_set,
|
||||
};
|
||||
|
||||
const struct xattr_handler generic_acl_default_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_DEFAULT,
|
||||
.flags = ACL_TYPE_DEFAULT,
|
||||
.list = generic_acl_list,
|
||||
.get = generic_acl_get,
|
||||
.set = generic_acl_set,
|
||||
};
|
234
fs/gfs2/acl.c
234
fs/gfs2/acl.c
@ -49,10 +49,6 @@ struct posix_acl *gfs2_get_acl(struct inode *inode, int type)
|
||||
if (!ip->i_eattr)
|
||||
return NULL;
|
||||
|
||||
acl = get_cached_acl(&ip->i_inode, type);
|
||||
if (acl != ACL_NOT_CACHED)
|
||||
return acl;
|
||||
|
||||
name = gfs2_acl_name(type);
|
||||
if (name == NULL)
|
||||
return ERR_PTR(-EINVAL);
|
||||
@ -80,7 +76,7 @@ static int gfs2_set_mode(struct inode *inode, umode_t mode)
|
||||
return error;
|
||||
}
|
||||
|
||||
static int gfs2_acl_set(struct inode *inode, int type, struct posix_acl *acl)
|
||||
int gfs2_set_acl(struct inode *inode, struct posix_acl *acl, int type)
|
||||
{
|
||||
int error;
|
||||
int len;
|
||||
@ -88,219 +84,49 @@ static int gfs2_acl_set(struct inode *inode, int type, struct posix_acl *acl)
|
||||
const char *name = gfs2_acl_name(type);
|
||||
|
||||
BUG_ON(name == NULL);
|
||||
len = posix_acl_to_xattr(&init_user_ns, acl, NULL, 0);
|
||||
if (len == 0)
|
||||
return 0;
|
||||
data = kmalloc(len, GFP_NOFS);
|
||||
if (data == NULL)
|
||||
return -ENOMEM;
|
||||
error = posix_acl_to_xattr(&init_user_ns, acl, data, len);
|
||||
if (error < 0)
|
||||
goto out;
|
||||
error = __gfs2_xattr_set(inode, name, data, len, 0, GFS2_EATYPE_SYS);
|
||||
if (!error)
|
||||
set_cached_acl(inode, type, acl);
|
||||
out:
|
||||
kfree(data);
|
||||
return error;
|
||||
}
|
||||
|
||||
int gfs2_acl_create(struct gfs2_inode *dip, struct inode *inode)
|
||||
{
|
||||
struct gfs2_sbd *sdp = GFS2_SB(&dip->i_inode);
|
||||
struct posix_acl *acl;
|
||||
umode_t mode = inode->i_mode;
|
||||
int error = 0;
|
||||
|
||||
if (!sdp->sd_args.ar_posix_acl)
|
||||
return 0;
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return 0;
|
||||
|
||||
acl = gfs2_get_acl(&dip->i_inode, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (!acl) {
|
||||
mode &= ~current_umask();
|
||||
return gfs2_set_mode(inode, mode);
|
||||
}
|
||||
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
error = gfs2_acl_set(inode, ACL_TYPE_DEFAULT, acl);
|
||||
if (error)
|
||||
goto out;
|
||||
}
|
||||
|
||||
error = posix_acl_create(&acl, GFP_NOFS, &mode);
|
||||
if (error < 0)
|
||||
return error;
|
||||
|
||||
if (error == 0)
|
||||
goto munge;
|
||||
|
||||
error = gfs2_acl_set(inode, ACL_TYPE_ACCESS, acl);
|
||||
if (error)
|
||||
goto out;
|
||||
munge:
|
||||
error = gfs2_set_mode(inode, mode);
|
||||
out:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
int gfs2_acl_chmod(struct gfs2_inode *ip, struct iattr *attr)
|
||||
{
|
||||
struct inode *inode = &ip->i_inode;
|
||||
struct posix_acl *acl;
|
||||
char *data;
|
||||
unsigned int len;
|
||||
int error;
|
||||
|
||||
acl = gfs2_get_acl(&ip->i_inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (!acl)
|
||||
return gfs2_setattr_simple(inode, attr);
|
||||
|
||||
error = posix_acl_chmod(&acl, GFP_NOFS, attr->ia_mode);
|
||||
if (error)
|
||||
return error;
|
||||
|
||||
len = posix_acl_to_xattr(&init_user_ns, acl, NULL, 0);
|
||||
data = kmalloc(len, GFP_NOFS);
|
||||
error = -ENOMEM;
|
||||
if (data == NULL)
|
||||
goto out;
|
||||
posix_acl_to_xattr(&init_user_ns, acl, data, len);
|
||||
error = gfs2_xattr_acl_chmod(ip, attr, data);
|
||||
kfree(data);
|
||||
set_cached_acl(&ip->i_inode, ACL_TYPE_ACCESS, acl);
|
||||
|
||||
out:
|
||||
posix_acl_release(acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
static int gfs2_acl_type(const char *name)
|
||||
{
|
||||
if (strcmp(name, GFS2_POSIX_ACL_ACCESS) == 0)
|
||||
return ACL_TYPE_ACCESS;
|
||||
if (strcmp(name, GFS2_POSIX_ACL_DEFAULT) == 0)
|
||||
return ACL_TYPE_DEFAULT;
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
static int gfs2_xattr_system_get(struct dentry *dentry, const char *name,
|
||||
void *buffer, size_t size, int xtype)
|
||||
{
|
||||
struct inode *inode = dentry->d_inode;
|
||||
struct gfs2_sbd *sdp = GFS2_SB(inode);
|
||||
struct posix_acl *acl;
|
||||
int type;
|
||||
int error;
|
||||
|
||||
if (!sdp->sd_args.ar_posix_acl)
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
type = gfs2_acl_type(name);
|
||||
if (type < 0)
|
||||
return type;
|
||||
|
||||
acl = gfs2_get_acl(inode, type);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl == NULL)
|
||||
return -ENODATA;
|
||||
|
||||
error = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
|
||||
posix_acl_release(acl);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
static int gfs2_xattr_system_set(struct dentry *dentry, const char *name,
|
||||
const void *value, size_t size, int flags,
|
||||
int xtype)
|
||||
{
|
||||
struct inode *inode = dentry->d_inode;
|
||||
struct gfs2_sbd *sdp = GFS2_SB(inode);
|
||||
struct posix_acl *acl = NULL;
|
||||
int error = 0, type;
|
||||
|
||||
if (!sdp->sd_args.ar_posix_acl)
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
type = gfs2_acl_type(name);
|
||||
if (type < 0)
|
||||
return type;
|
||||
if (flags & XATTR_CREATE)
|
||||
return -EINVAL;
|
||||
if (type == ACL_TYPE_DEFAULT && !S_ISDIR(inode->i_mode))
|
||||
return value ? -EACCES : 0;
|
||||
if (!uid_eq(current_fsuid(), inode->i_uid) && !capable(CAP_FOWNER))
|
||||
return -EPERM;
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
if (!value)
|
||||
goto set_acl;
|
||||
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (!acl) {
|
||||
/*
|
||||
* acl_set_file(3) may request that we set default ACLs with
|
||||
* zero length -- defend (gracefully) against that here.
|
||||
*/
|
||||
goto out;
|
||||
}
|
||||
if (IS_ERR(acl)) {
|
||||
error = PTR_ERR(acl);
|
||||
goto out;
|
||||
}
|
||||
|
||||
error = posix_acl_valid(acl);
|
||||
if (error)
|
||||
goto out_release;
|
||||
|
||||
error = -EINVAL;
|
||||
if (acl->a_count > GFS2_ACL_MAX_ENTRIES)
|
||||
goto out_release;
|
||||
return -EINVAL;
|
||||
|
||||
if (type == ACL_TYPE_ACCESS) {
|
||||
umode_t mode = inode->i_mode;
|
||||
|
||||
error = posix_acl_equiv_mode(acl, &mode);
|
||||
if (error < 0)
|
||||
return error;
|
||||
|
||||
if (error <= 0) {
|
||||
posix_acl_release(acl);
|
||||
if (error == 0)
|
||||
acl = NULL;
|
||||
|
||||
if (error < 0)
|
||||
return error;
|
||||
}
|
||||
|
||||
error = gfs2_set_mode(inode, mode);
|
||||
if (error)
|
||||
goto out_release;
|
||||
return error;
|
||||
}
|
||||
|
||||
set_acl:
|
||||
error = __gfs2_xattr_set(inode, name, value, size, 0, GFS2_EATYPE_SYS);
|
||||
if (!error) {
|
||||
if (acl)
|
||||
set_cached_acl(inode, type, acl);
|
||||
else
|
||||
forget_cached_acl(inode, type);
|
||||
if (acl) {
|
||||
len = posix_acl_to_xattr(&init_user_ns, acl, NULL, 0);
|
||||
if (len == 0)
|
||||
return 0;
|
||||
data = kmalloc(len, GFP_NOFS);
|
||||
if (data == NULL)
|
||||
return -ENOMEM;
|
||||
error = posix_acl_to_xattr(&init_user_ns, acl, data, len);
|
||||
if (error < 0)
|
||||
goto out;
|
||||
} else {
|
||||
data = NULL;
|
||||
len = 0;
|
||||
}
|
||||
out_release:
|
||||
posix_acl_release(acl);
|
||||
|
||||
error = __gfs2_xattr_set(inode, name, data, len, 0, GFS2_EATYPE_SYS);
|
||||
if (error)
|
||||
goto out;
|
||||
|
||||
if (acl)
|
||||
set_cached_acl(inode, type, acl);
|
||||
else
|
||||
forget_cached_acl(inode, type);
|
||||
out:
|
||||
kfree(data);
|
||||
return error;
|
||||
}
|
||||
|
||||
const struct xattr_handler gfs2_xattr_system_handler = {
|
||||
.prefix = XATTR_SYSTEM_PREFIX,
|
||||
.flags = GFS2_EATYPE_SYS,
|
||||
.get = gfs2_xattr_system_get,
|
||||
.set = gfs2_xattr_system_set,
|
||||
};
|
||||
|
||||
|
@ -17,8 +17,6 @@
|
||||
#define GFS2_ACL_MAX_ENTRIES 25
|
||||
|
||||
extern struct posix_acl *gfs2_get_acl(struct inode *inode, int type);
|
||||
extern int gfs2_acl_create(struct gfs2_inode *dip, struct inode *inode);
|
||||
extern int gfs2_acl_chmod(struct gfs2_inode *ip, struct iattr *attr);
|
||||
extern const struct xattr_handler gfs2_xattr_system_handler;
|
||||
extern int gfs2_set_acl(struct inode *inode, struct posix_acl *acl, int type);
|
||||
|
||||
#endif /* __ACL_DOT_H__ */
|
||||
|
@ -571,6 +571,7 @@ static int gfs2_create_inode(struct inode *dir, struct dentry *dentry,
|
||||
unsigned int size, int excl, int *opened)
|
||||
{
|
||||
const struct qstr *name = &dentry->d_name;
|
||||
struct posix_acl *default_acl, *acl;
|
||||
struct gfs2_holder ghs[2];
|
||||
struct inode *inode = NULL;
|
||||
struct gfs2_inode *dip = GFS2_I(dir), *ip;
|
||||
@ -633,10 +634,14 @@ static int gfs2_create_inode(struct inode *dir, struct dentry *dentry,
|
||||
if (!inode)
|
||||
goto fail_gunlock;
|
||||
|
||||
error = posix_acl_create(dir, &mode, &default_acl, &acl);
|
||||
if (error)
|
||||
goto fail_free_vfs_inode;
|
||||
|
||||
ip = GFS2_I(inode);
|
||||
error = gfs2_rs_alloc(ip);
|
||||
if (error)
|
||||
goto fail_free_inode;
|
||||
goto fail_free_acls;
|
||||
|
||||
inode->i_mode = mode;
|
||||
set_nlink(inode, S_ISDIR(mode) ? 2 : 1);
|
||||
@ -704,7 +709,16 @@ static int gfs2_create_inode(struct inode *dir, struct dentry *dentry,
|
||||
gfs2_set_iop(inode);
|
||||
insert_inode_hash(inode);
|
||||
|
||||
error = gfs2_acl_create(dip, inode);
|
||||
if (default_acl) {
|
||||
error = gfs2_set_acl(inode, default_acl, ACL_TYPE_DEFAULT);
|
||||
posix_acl_release(default_acl);
|
||||
}
|
||||
if (acl) {
|
||||
if (!error)
|
||||
error = gfs2_set_acl(inode, acl, ACL_TYPE_ACCESS);
|
||||
posix_acl_release(acl);
|
||||
}
|
||||
|
||||
if (error)
|
||||
goto fail_gunlock3;
|
||||
|
||||
@ -738,6 +752,12 @@ fail_free_inode:
|
||||
if (ip->i_gl)
|
||||
gfs2_glock_put(ip->i_gl);
|
||||
gfs2_rs_delete(ip, NULL);
|
||||
fail_free_acls:
|
||||
if (default_acl)
|
||||
posix_acl_release(default_acl);
|
||||
if (acl)
|
||||
posix_acl_release(acl);
|
||||
fail_free_vfs_inode:
|
||||
free_inode_nonrcu(inode);
|
||||
inode = NULL;
|
||||
fail_gunlock:
|
||||
@ -1716,10 +1736,11 @@ static int gfs2_setattr(struct dentry *dentry, struct iattr *attr)
|
||||
error = gfs2_setattr_size(inode, attr->ia_size);
|
||||
else if (attr->ia_valid & (ATTR_UID | ATTR_GID))
|
||||
error = setattr_chown(inode, attr);
|
||||
else if ((attr->ia_valid & ATTR_MODE) && IS_POSIXACL(inode))
|
||||
error = gfs2_acl_chmod(ip, attr);
|
||||
else
|
||||
else {
|
||||
error = gfs2_setattr_simple(inode, attr);
|
||||
if (!error && attr->ia_valid & ATTR_MODE)
|
||||
error = posix_acl_chmod(inode, inode->i_mode);
|
||||
}
|
||||
|
||||
out:
|
||||
if (!error)
|
||||
@ -1879,6 +1900,7 @@ const struct inode_operations gfs2_file_iops = {
|
||||
.removexattr = gfs2_removexattr,
|
||||
.fiemap = gfs2_fiemap,
|
||||
.get_acl = gfs2_get_acl,
|
||||
.set_acl = gfs2_set_acl,
|
||||
};
|
||||
|
||||
const struct inode_operations gfs2_dir_iops = {
|
||||
@ -1900,6 +1922,7 @@ const struct inode_operations gfs2_dir_iops = {
|
||||
.removexattr = gfs2_removexattr,
|
||||
.fiemap = gfs2_fiemap,
|
||||
.get_acl = gfs2_get_acl,
|
||||
.set_acl = gfs2_set_acl,
|
||||
.atomic_open = gfs2_atomic_open,
|
||||
};
|
||||
|
||||
@ -1915,6 +1938,5 @@ const struct inode_operations gfs2_symlink_iops = {
|
||||
.listxattr = gfs2_listxattr,
|
||||
.removexattr = gfs2_removexattr,
|
||||
.fiemap = gfs2_fiemap,
|
||||
.get_acl = gfs2_get_acl,
|
||||
};
|
||||
|
||||
|
@ -13,6 +13,7 @@
|
||||
#include <linux/buffer_head.h>
|
||||
#include <linux/xattr.h>
|
||||
#include <linux/gfs2_ondisk.h>
|
||||
#include <linux/posix_acl_xattr.h>
|
||||
#include <asm/uaccess.h>
|
||||
|
||||
#include "gfs2.h"
|
||||
@ -1500,7 +1501,8 @@ static const struct xattr_handler gfs2_xattr_security_handler = {
|
||||
const struct xattr_handler *gfs2_xattr_handlers[] = {
|
||||
&gfs2_xattr_user_handler,
|
||||
&gfs2_xattr_security_handler,
|
||||
&gfs2_xattr_system_handler,
|
||||
&posix_acl_access_xattr_handler,
|
||||
&posix_acl_default_xattr_handler,
|
||||
NULL,
|
||||
};
|
||||
|
||||
|
@ -12,16 +12,13 @@
|
||||
|
||||
/* posix_acl.c */
|
||||
struct posix_acl *hfsplus_get_posix_acl(struct inode *inode, int type);
|
||||
extern int hfsplus_posix_acl_chmod(struct inode *);
|
||||
int hfsplus_set_posix_acl(struct inode *inode, struct posix_acl *acl,
|
||||
int type);
|
||||
extern int hfsplus_init_posix_acl(struct inode *, struct inode *);
|
||||
|
||||
#else /* CONFIG_HFSPLUS_FS_POSIX_ACL */
|
||||
#define hfsplus_get_posix_acl NULL
|
||||
|
||||
static inline int hfsplus_posix_acl_chmod(struct inode *inode)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
#define hfsplus_set_posix_acl NULL
|
||||
|
||||
static inline int hfsplus_init_posix_acl(struct inode *inode, struct inode *dir)
|
||||
{
|
||||
|
@ -532,6 +532,7 @@ const struct inode_operations hfsplus_dir_inode_operations = {
|
||||
.removexattr = hfsplus_removexattr,
|
||||
#ifdef CONFIG_HFSPLUS_FS_POSIX_ACL
|
||||
.get_acl = hfsplus_get_posix_acl,
|
||||
.set_acl = hfsplus_set_posix_acl,
|
||||
#endif
|
||||
};
|
||||
|
||||
|
@ -261,7 +261,7 @@ static int hfsplus_setattr(struct dentry *dentry, struct iattr *attr)
|
||||
mark_inode_dirty(inode);
|
||||
|
||||
if (attr->ia_valid & ATTR_MODE) {
|
||||
error = hfsplus_posix_acl_chmod(inode);
|
||||
error = posix_acl_chmod(inode, inode->i_mode);
|
||||
if (unlikely(error))
|
||||
return error;
|
||||
}
|
||||
@ -334,6 +334,7 @@ static const struct inode_operations hfsplus_file_inode_operations = {
|
||||
.removexattr = hfsplus_removexattr,
|
||||
#ifdef CONFIG_HFSPLUS_FS_POSIX_ACL
|
||||
.get_acl = hfsplus_get_posix_acl,
|
||||
.set_acl = hfsplus_set_posix_acl,
|
||||
#endif
|
||||
};
|
||||
|
||||
|
@ -17,9 +17,7 @@ struct posix_acl *hfsplus_get_posix_acl(struct inode *inode, int type)
|
||||
char *value = NULL;
|
||||
ssize_t size;
|
||||
|
||||
acl = get_cached_acl(inode, type);
|
||||
if (acl != ACL_NOT_CACHED)
|
||||
return acl;
|
||||
hfs_dbg(ACL_MOD, "[%s]: ino %lu\n", __func__, inode->i_ino);
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
@ -56,17 +54,15 @@ struct posix_acl *hfsplus_get_posix_acl(struct inode *inode, int type)
|
||||
return acl;
|
||||
}
|
||||
|
||||
static int hfsplus_set_posix_acl(struct inode *inode,
|
||||
int type,
|
||||
struct posix_acl *acl)
|
||||
int hfsplus_set_posix_acl(struct inode *inode, struct posix_acl *acl,
|
||||
int type)
|
||||
{
|
||||
int err;
|
||||
char *xattr_name;
|
||||
size_t size = 0;
|
||||
char *value = NULL;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
hfs_dbg(ACL_MOD, "[%s]: ino %lu\n", __func__, inode->i_ino);
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
@ -115,7 +111,7 @@ end_set_acl:
|
||||
int hfsplus_init_posix_acl(struct inode *inode, struct inode *dir)
|
||||
{
|
||||
int err = 0;
|
||||
struct posix_acl *acl = NULL;
|
||||
struct posix_acl *default_acl, *acl;
|
||||
|
||||
hfs_dbg(ACL_MOD,
|
||||
"[%s]: ino %lu, dir->ino %lu\n",
|
||||
@ -124,151 +120,21 @@ int hfsplus_init_posix_acl(struct inode *inode, struct inode *dir)
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return 0;
|
||||
|
||||
acl = hfsplus_get_posix_acl(dir, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
|
||||
if (acl) {
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
err = hfsplus_set_posix_acl(inode,
|
||||
ACL_TYPE_DEFAULT,
|
||||
acl);
|
||||
if (unlikely(err))
|
||||
goto init_acl_cleanup;
|
||||
}
|
||||
|
||||
err = posix_acl_create(&acl, GFP_NOFS, &inode->i_mode);
|
||||
if (unlikely(err < 0))
|
||||
return err;
|
||||
|
||||
if (err > 0)
|
||||
err = hfsplus_set_posix_acl(inode,
|
||||
ACL_TYPE_ACCESS,
|
||||
acl);
|
||||
} else
|
||||
inode->i_mode &= ~current_umask();
|
||||
|
||||
init_acl_cleanup:
|
||||
posix_acl_release(acl);
|
||||
return err;
|
||||
}
|
||||
|
||||
int hfsplus_posix_acl_chmod(struct inode *inode)
|
||||
{
|
||||
int err;
|
||||
struct posix_acl *acl;
|
||||
|
||||
hfs_dbg(ACL_MOD, "[%s]: ino %lu\n", __func__, inode->i_ino);
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
acl = hfsplus_get_posix_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl) || !acl)
|
||||
return PTR_ERR(acl);
|
||||
|
||||
err = posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
|
||||
if (unlikely(err))
|
||||
err = posix_acl_create(dir, &inode->i_mode, &default_acl, &acl);
|
||||
if (err)
|
||||
return err;
|
||||
|
||||
err = hfsplus_set_posix_acl(inode, ACL_TYPE_ACCESS, acl);
|
||||
posix_acl_release(acl);
|
||||
return err;
|
||||
}
|
||||
|
||||
static int hfsplus_xattr_get_posix_acl(struct dentry *dentry,
|
||||
const char *name,
|
||||
void *buffer,
|
||||
size_t size,
|
||||
int type)
|
||||
{
|
||||
int err = 0;
|
||||
struct posix_acl *acl;
|
||||
|
||||
hfs_dbg(ACL_MOD,
|
||||
"[%s]: ino %lu, buffer %p, size %zu, type %#x\n",
|
||||
__func__, dentry->d_inode->i_ino, buffer, size, type);
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
|
||||
acl = hfsplus_get_posix_acl(dentry->d_inode, type);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl == NULL)
|
||||
return -ENODATA;
|
||||
|
||||
err = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
|
||||
posix_acl_release(acl);
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
static int hfsplus_xattr_set_posix_acl(struct dentry *dentry,
|
||||
const char *name,
|
||||
const void *value,
|
||||
size_t size,
|
||||
int flags,
|
||||
int type)
|
||||
{
|
||||
int err = 0;
|
||||
struct inode *inode = dentry->d_inode;
|
||||
struct posix_acl *acl = NULL;
|
||||
|
||||
hfs_dbg(ACL_MOD,
|
||||
"[%s]: ino %lu, value %p, size %zu, flags %#x, type %#x\n",
|
||||
__func__, inode->i_ino, value, size, flags, type);
|
||||
|
||||
if (strcmp(name, "") != 0)
|
||||
return -EINVAL;
|
||||
|
||||
if (!inode_owner_or_capable(inode))
|
||||
return -EPERM;
|
||||
|
||||
if (value) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
else if (acl) {
|
||||
err = posix_acl_valid(acl);
|
||||
if (err)
|
||||
goto end_xattr_set_acl;
|
||||
}
|
||||
if (default_acl) {
|
||||
err = hfsplus_set_posix_acl(inode, default_acl,
|
||||
ACL_TYPE_DEFAULT);
|
||||
posix_acl_release(default_acl);
|
||||
}
|
||||
|
||||
err = hfsplus_set_posix_acl(inode, type, acl);
|
||||
|
||||
end_xattr_set_acl:
|
||||
posix_acl_release(acl);
|
||||
if (acl) {
|
||||
if (!err)
|
||||
err = hfsplus_set_posix_acl(inode, acl,
|
||||
ACL_TYPE_ACCESS);
|
||||
posix_acl_release(acl);
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
static size_t hfsplus_xattr_list_posix_acl(struct dentry *dentry,
|
||||
char *list,
|
||||
size_t list_size,
|
||||
const char *name,
|
||||
size_t name_len,
|
||||
int type)
|
||||
{
|
||||
/*
|
||||
* This method is not used.
|
||||
* It is used hfsplus_listxattr() instead of generic_listxattr().
|
||||
*/
|
||||
return -EOPNOTSUPP;
|
||||
}
|
||||
|
||||
const struct xattr_handler hfsplus_xattr_acl_access_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_ACCESS,
|
||||
.flags = ACL_TYPE_ACCESS,
|
||||
.list = hfsplus_xattr_list_posix_acl,
|
||||
.get = hfsplus_xattr_get_posix_acl,
|
||||
.set = hfsplus_xattr_set_posix_acl,
|
||||
};
|
||||
|
||||
const struct xattr_handler hfsplus_xattr_acl_default_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_DEFAULT,
|
||||
.flags = ACL_TYPE_DEFAULT,
|
||||
.list = hfsplus_xattr_list_posix_acl,
|
||||
.get = hfsplus_xattr_get_posix_acl,
|
||||
.set = hfsplus_xattr_set_posix_acl,
|
||||
};
|
||||
|
@ -7,6 +7,7 @@
|
||||
*/
|
||||
|
||||
#include "hfsplus_fs.h"
|
||||
#include <linux/posix_acl_xattr.h>
|
||||
#include "xattr.h"
|
||||
#include "acl.h"
|
||||
|
||||
@ -15,8 +16,8 @@ const struct xattr_handler *hfsplus_xattr_handlers[] = {
|
||||
&hfsplus_xattr_user_handler,
|
||||
&hfsplus_xattr_trusted_handler,
|
||||
#ifdef CONFIG_HFSPLUS_FS_POSIX_ACL
|
||||
&hfsplus_xattr_acl_access_handler,
|
||||
&hfsplus_xattr_acl_default_handler,
|
||||
&posix_acl_access_xattr_handler,
|
||||
&posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
&hfsplus_xattr_security_handler,
|
||||
NULL
|
||||
@ -51,82 +52,6 @@ static inline int is_known_namespace(const char *name)
|
||||
return true;
|
||||
}
|
||||
|
||||
static int can_set_system_xattr(struct inode *inode, const char *name,
|
||||
const void *value, size_t size)
|
||||
{
|
||||
#ifdef CONFIG_HFSPLUS_FS_POSIX_ACL
|
||||
struct posix_acl *acl;
|
||||
int err;
|
||||
|
||||
if (!inode_owner_or_capable(inode))
|
||||
return -EPERM;
|
||||
|
||||
/*
|
||||
* POSIX_ACL_XATTR_ACCESS is tied to i_mode
|
||||
*/
|
||||
if (strcmp(name, POSIX_ACL_XATTR_ACCESS) == 0) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl) {
|
||||
err = posix_acl_equiv_mode(acl, &inode->i_mode);
|
||||
posix_acl_release(acl);
|
||||
if (err < 0)
|
||||
return err;
|
||||
mark_inode_dirty(inode);
|
||||
}
|
||||
/*
|
||||
* We're changing the ACL. Get rid of the cached one
|
||||
*/
|
||||
forget_cached_acl(inode, ACL_TYPE_ACCESS);
|
||||
|
||||
return 0;
|
||||
} else if (strcmp(name, POSIX_ACL_XATTR_DEFAULT) == 0) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
posix_acl_release(acl);
|
||||
|
||||
/*
|
||||
* We're changing the default ACL. Get rid of the cached one
|
||||
*/
|
||||
forget_cached_acl(inode, ACL_TYPE_DEFAULT);
|
||||
|
||||
return 0;
|
||||
}
|
||||
#endif /* CONFIG_HFSPLUS_FS_POSIX_ACL */
|
||||
return -EOPNOTSUPP;
|
||||
}
|
||||
|
||||
static int can_set_xattr(struct inode *inode, const char *name,
|
||||
const void *value, size_t value_len)
|
||||
{
|
||||
if (!strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN))
|
||||
return can_set_system_xattr(inode, name, value, value_len);
|
||||
|
||||
if (!strncmp(name, XATTR_MAC_OSX_PREFIX, XATTR_MAC_OSX_PREFIX_LEN)) {
|
||||
/*
|
||||
* This makes sure that we aren't trying to set an
|
||||
* attribute in a different namespace by prefixing it
|
||||
* with "osx."
|
||||
*/
|
||||
if (is_known_namespace(name + XATTR_MAC_OSX_PREFIX_LEN))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* Don't allow setting an attribute in an unknown namespace.
|
||||
*/
|
||||
if (strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) &&
|
||||
strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) &&
|
||||
strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void hfsplus_init_header_node(struct inode *attr_file,
|
||||
u32 clump_size,
|
||||
char *buf, u16 node_size)
|
||||
@ -349,10 +274,6 @@ int __hfsplus_setxattr(struct inode *inode, const char *name,
|
||||
HFSPLUS_IS_RSRC(inode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
err = can_set_xattr(inode, name, value, size);
|
||||
if (err)
|
||||
return err;
|
||||
|
||||
if (strncmp(name, XATTR_MAC_OSX_PREFIX,
|
||||
XATTR_MAC_OSX_PREFIX_LEN) == 0)
|
||||
name += XATTR_MAC_OSX_PREFIX_LEN;
|
||||
@ -840,10 +761,6 @@ int hfsplus_removexattr(struct dentry *dentry, const char *name)
|
||||
if (!HFSPLUS_SB(inode->i_sb)->attr_tree)
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
err = can_set_xattr(inode, name, NULL, 0);
|
||||
if (err)
|
||||
return err;
|
||||
|
||||
if (strncmp(name, XATTR_MAC_OSX_PREFIX,
|
||||
XATTR_MAC_OSX_PREFIX_LEN) == 0)
|
||||
name += XATTR_MAC_OSX_PREFIX_LEN;
|
||||
@ -940,6 +857,9 @@ static int hfsplus_osx_setxattr(struct dentry *dentry, const char *name,
|
||||
if (len > HFSPLUS_ATTR_MAX_STRLEN)
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
if (is_known_namespace(name))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
strcpy(xattr_name, XATTR_MAC_OSX_PREFIX);
|
||||
strcpy(xattr_name + XATTR_MAC_OSX_PREFIX_LEN, name);
|
||||
|
||||
|
@ -14,8 +14,6 @@
|
||||
extern const struct xattr_handler hfsplus_xattr_osx_handler;
|
||||
extern const struct xattr_handler hfsplus_xattr_user_handler;
|
||||
extern const struct xattr_handler hfsplus_xattr_trusted_handler;
|
||||
extern const struct xattr_handler hfsplus_xattr_acl_access_handler;
|
||||
extern const struct xattr_handler hfsplus_xattr_acl_default_handler;
|
||||
extern const struct xattr_handler hfsplus_xattr_security_handler;
|
||||
|
||||
extern const struct xattr_handler *hfsplus_xattr_handlers[];
|
||||
|
141
fs/jffs2/acl.c
141
fs/jffs2/acl.c
@ -178,10 +178,6 @@ struct posix_acl *jffs2_get_acl(struct inode *inode, int type)
|
||||
char *value = NULL;
|
||||
int rc, xprefix;
|
||||
|
||||
acl = get_cached_acl(inode, type);
|
||||
if (acl != ACL_NOT_CACHED)
|
||||
return acl;
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
xprefix = JFFS2_XPREFIX_ACL_ACCESS;
|
||||
@ -232,13 +228,10 @@ static int __jffs2_set_acl(struct inode *inode, int xprefix, struct posix_acl *a
|
||||
return rc;
|
||||
}
|
||||
|
||||
static int jffs2_set_acl(struct inode *inode, int type, struct posix_acl *acl)
|
||||
int jffs2_set_acl(struct inode *inode, struct posix_acl *acl, int type)
|
||||
{
|
||||
int rc, xprefix;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
xprefix = JFFS2_XPREFIX_ACL_ACCESS;
|
||||
@ -277,30 +270,21 @@ static int jffs2_set_acl(struct inode *inode, int type, struct posix_acl *acl)
|
||||
|
||||
int jffs2_init_acl_pre(struct inode *dir_i, struct inode *inode, umode_t *i_mode)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
struct posix_acl *default_acl, *acl;
|
||||
int rc;
|
||||
|
||||
cache_no_acl(inode);
|
||||
|
||||
if (S_ISLNK(*i_mode))
|
||||
return 0; /* Symlink always has no-ACL */
|
||||
|
||||
acl = jffs2_get_acl(dir_i, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
|
||||
if (!acl) {
|
||||
*i_mode &= ~current_umask();
|
||||
} else {
|
||||
if (S_ISDIR(*i_mode))
|
||||
set_cached_acl(inode, ACL_TYPE_DEFAULT, acl);
|
||||
|
||||
rc = posix_acl_create(&acl, GFP_KERNEL, i_mode);
|
||||
if (rc < 0)
|
||||
return rc;
|
||||
if (rc > 0)
|
||||
set_cached_acl(inode, ACL_TYPE_ACCESS, acl);
|
||||
rc = posix_acl_create(dir_i, i_mode, &default_acl, &acl);
|
||||
if (rc)
|
||||
return rc;
|
||||
|
||||
if (default_acl) {
|
||||
set_cached_acl(inode, ACL_TYPE_DEFAULT, default_acl);
|
||||
posix_acl_release(default_acl);
|
||||
}
|
||||
if (acl) {
|
||||
set_cached_acl(inode, ACL_TYPE_ACCESS, acl);
|
||||
posix_acl_release(acl);
|
||||
}
|
||||
return 0;
|
||||
@ -324,106 +308,3 @@ int jffs2_init_acl_post(struct inode *inode)
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int jffs2_acl_chmod(struct inode *inode)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int rc;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
acl = jffs2_get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl) || !acl)
|
||||
return PTR_ERR(acl);
|
||||
rc = posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
|
||||
if (rc)
|
||||
return rc;
|
||||
rc = jffs2_set_acl(inode, ACL_TYPE_ACCESS, acl);
|
||||
posix_acl_release(acl);
|
||||
return rc;
|
||||
}
|
||||
|
||||
static size_t jffs2_acl_access_listxattr(struct dentry *dentry, char *list,
|
||||
size_t list_size, const char *name, size_t name_len, int type)
|
||||
{
|
||||
const int retlen = sizeof(POSIX_ACL_XATTR_ACCESS);
|
||||
|
||||
if (list && retlen <= list_size)
|
||||
strcpy(list, POSIX_ACL_XATTR_ACCESS);
|
||||
return retlen;
|
||||
}
|
||||
|
||||
static size_t jffs2_acl_default_listxattr(struct dentry *dentry, char *list,
|
||||
size_t list_size, const char *name, size_t name_len, int type)
|
||||
{
|
||||
const int retlen = sizeof(POSIX_ACL_XATTR_DEFAULT);
|
||||
|
||||
if (list && retlen <= list_size)
|
||||
strcpy(list, POSIX_ACL_XATTR_DEFAULT);
|
||||
return retlen;
|
||||
}
|
||||
|
||||
static int jffs2_acl_getxattr(struct dentry *dentry, const char *name,
|
||||
void *buffer, size_t size, int type)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int rc;
|
||||
|
||||
if (name[0] != '\0')
|
||||
return -EINVAL;
|
||||
|
||||
acl = jffs2_get_acl(dentry->d_inode, type);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (!acl)
|
||||
return -ENODATA;
|
||||
rc = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
|
||||
posix_acl_release(acl);
|
||||
|
||||
return rc;
|
||||
}
|
||||
|
||||
static int jffs2_acl_setxattr(struct dentry *dentry, const char *name,
|
||||
const void *value, size_t size, int flags, int type)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int rc;
|
||||
|
||||
if (name[0] != '\0')
|
||||
return -EINVAL;
|
||||
if (!inode_owner_or_capable(dentry->d_inode))
|
||||
return -EPERM;
|
||||
|
||||
if (value) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl) {
|
||||
rc = posix_acl_valid(acl);
|
||||
if (rc)
|
||||
goto out;
|
||||
}
|
||||
} else {
|
||||
acl = NULL;
|
||||
}
|
||||
rc = jffs2_set_acl(dentry->d_inode, type, acl);
|
||||
out:
|
||||
posix_acl_release(acl);
|
||||
return rc;
|
||||
}
|
||||
|
||||
const struct xattr_handler jffs2_acl_access_xattr_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_ACCESS,
|
||||
.flags = ACL_TYPE_DEFAULT,
|
||||
.list = jffs2_acl_access_listxattr,
|
||||
.get = jffs2_acl_getxattr,
|
||||
.set = jffs2_acl_setxattr,
|
||||
};
|
||||
|
||||
const struct xattr_handler jffs2_acl_default_xattr_handler = {
|
||||
.prefix = POSIX_ACL_XATTR_DEFAULT,
|
||||
.flags = ACL_TYPE_DEFAULT,
|
||||
.list = jffs2_acl_default_listxattr,
|
||||
.get = jffs2_acl_getxattr,
|
||||
.set = jffs2_acl_setxattr,
|
||||
};
|
||||
|
@ -27,17 +27,14 @@ struct jffs2_acl_header {
|
||||
#ifdef CONFIG_JFFS2_FS_POSIX_ACL
|
||||
|
||||
struct posix_acl *jffs2_get_acl(struct inode *inode, int type);
|
||||
extern int jffs2_acl_chmod(struct inode *);
|
||||
int jffs2_set_acl(struct inode *inode, struct posix_acl *acl, int type);
|
||||
extern int jffs2_init_acl_pre(struct inode *, struct inode *, umode_t *);
|
||||
extern int jffs2_init_acl_post(struct inode *);
|
||||
|
||||
extern const struct xattr_handler jffs2_acl_access_xattr_handler;
|
||||
extern const struct xattr_handler jffs2_acl_default_xattr_handler;
|
||||
|
||||
#else
|
||||
|
||||
#define jffs2_get_acl (NULL)
|
||||
#define jffs2_acl_chmod(inode) (0)
|
||||
#define jffs2_set_acl (NULL)
|
||||
#define jffs2_init_acl_pre(dir_i,inode,mode) (0)
|
||||
#define jffs2_init_acl_post(inode) (0)
|
||||
|
||||
|
@ -59,6 +59,7 @@ const struct inode_operations jffs2_dir_inode_operations =
|
||||
.mknod = jffs2_mknod,
|
||||
.rename = jffs2_rename,
|
||||
.get_acl = jffs2_get_acl,
|
||||
.set_acl = jffs2_set_acl,
|
||||
.setattr = jffs2_setattr,
|
||||
.setxattr = jffs2_setxattr,
|
||||
.getxattr = jffs2_getxattr,
|
||||
|
@ -66,6 +66,7 @@ const struct file_operations jffs2_file_operations =
|
||||
const struct inode_operations jffs2_file_inode_operations =
|
||||
{
|
||||
.get_acl = jffs2_get_acl,
|
||||
.set_acl = jffs2_set_acl,
|
||||
.setattr = jffs2_setattr,
|
||||
.setxattr = jffs2_setxattr,
|
||||
.getxattr = jffs2_getxattr,
|
||||
|
@ -190,15 +190,16 @@ int jffs2_do_setattr (struct inode *inode, struct iattr *iattr)
|
||||
|
||||
int jffs2_setattr(struct dentry *dentry, struct iattr *iattr)
|
||||
{
|
||||
struct inode *inode = dentry->d_inode;
|
||||
int rc;
|
||||
|
||||
rc = inode_change_ok(dentry->d_inode, iattr);
|
||||
rc = inode_change_ok(inode, iattr);
|
||||
if (rc)
|
||||
return rc;
|
||||
|
||||
rc = jffs2_do_setattr(dentry->d_inode, iattr);
|
||||
rc = jffs2_do_setattr(inode, iattr);
|
||||
if (!rc && (iattr->ia_valid & ATTR_MODE))
|
||||
rc = jffs2_acl_chmod(dentry->d_inode);
|
||||
rc = posix_acl_chmod(inode, inode->i_mode);
|
||||
|
||||
return rc;
|
||||
}
|
||||
|
@ -22,7 +22,6 @@ const struct inode_operations jffs2_symlink_inode_operations =
|
||||
{
|
||||
.readlink = generic_readlink,
|
||||
.follow_link = jffs2_follow_link,
|
||||
.get_acl = jffs2_get_acl,
|
||||
.setattr = jffs2_setattr,
|
||||
.setxattr = jffs2_setxattr,
|
||||
.getxattr = jffs2_getxattr,
|
||||
|
@ -22,6 +22,7 @@
|
||||
#include <linux/crc32.h>
|
||||
#include <linux/jffs2.h>
|
||||
#include <linux/xattr.h>
|
||||
#include <linux/posix_acl_xattr.h>
|
||||
#include <linux/mtd/mtd.h>
|
||||
#include "nodelist.h"
|
||||
/* -------- xdatum related functions ----------------
|
||||
@ -921,8 +922,8 @@ const struct xattr_handler *jffs2_xattr_handlers[] = {
|
||||
&jffs2_security_xattr_handler,
|
||||
#endif
|
||||
#ifdef CONFIG_JFFS2_FS_POSIX_ACL
|
||||
&jffs2_acl_access_xattr_handler,
|
||||
&jffs2_acl_default_xattr_handler,
|
||||
&posix_acl_access_xattr_handler,
|
||||
&posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
&jffs2_trusted_xattr_handler,
|
||||
NULL
|
||||
@ -942,10 +943,10 @@ static const struct xattr_handler *xprefix_to_handler(int xprefix) {
|
||||
#endif
|
||||
#ifdef CONFIG_JFFS2_FS_POSIX_ACL
|
||||
case JFFS2_XPREFIX_ACL_ACCESS:
|
||||
ret = &jffs2_acl_access_xattr_handler;
|
||||
ret = &posix_acl_access_xattr_handler;
|
||||
break;
|
||||
case JFFS2_XPREFIX_ACL_DEFAULT:
|
||||
ret = &jffs2_acl_default_xattr_handler;
|
||||
ret = &posix_acl_default_xattr_handler;
|
||||
break;
|
||||
#endif
|
||||
case JFFS2_XPREFIX_TRUSTED:
|
||||
|
105
fs/jfs/acl.c
105
fs/jfs/acl.c
@ -72,7 +72,7 @@ struct posix_acl *jfs_get_acl(struct inode *inode, int type)
|
||||
return acl;
|
||||
}
|
||||
|
||||
static int jfs_set_acl(tid_t tid, struct inode *inode, int type,
|
||||
static int __jfs_set_acl(tid_t tid, struct inode *inode, int type,
|
||||
struct posix_acl *acl)
|
||||
{
|
||||
char *ea_name;
|
||||
@ -80,21 +80,22 @@ static int jfs_set_acl(tid_t tid, struct inode *inode, int type,
|
||||
int size = 0;
|
||||
char *value = NULL;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
switch(type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
ea_name = POSIX_ACL_XATTR_ACCESS;
|
||||
break;
|
||||
case ACL_TYPE_DEFAULT:
|
||||
ea_name = POSIX_ACL_XATTR_DEFAULT;
|
||||
if (!S_ISDIR(inode->i_mode))
|
||||
return acl ? -EACCES : 0;
|
||||
break;
|
||||
default:
|
||||
return -EINVAL;
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
ea_name = POSIX_ACL_XATTR_ACCESS;
|
||||
rc = posix_acl_equiv_mode(acl, &inode->i_mode);
|
||||
if (rc < 0)
|
||||
return rc;
|
||||
if (rc == 0)
|
||||
acl = NULL;
|
||||
break;
|
||||
case ACL_TYPE_DEFAULT:
|
||||
ea_name = POSIX_ACL_XATTR_DEFAULT;
|
||||
break;
|
||||
default:
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (acl) {
|
||||
size = posix_acl_xattr_size(acl->a_count);
|
||||
value = kmalloc(size, GFP_KERNEL);
|
||||
@ -114,65 +115,43 @@ out:
|
||||
return rc;
|
||||
}
|
||||
|
||||
int jfs_set_acl(struct inode *inode, struct posix_acl *acl, int type)
|
||||
{
|
||||
int rc;
|
||||
tid_t tid;
|
||||
|
||||
tid = txBegin(inode->i_sb, 0);
|
||||
mutex_lock(&JFS_IP(inode)->commit_mutex);
|
||||
rc = __jfs_set_acl(tid, inode, type, acl);
|
||||
if (!rc)
|
||||
rc = txCommit(tid, 1, &inode, 0);
|
||||
txEnd(tid);
|
||||
mutex_unlock(&JFS_IP(inode)->commit_mutex);
|
||||
return rc;
|
||||
}
|
||||
|
||||
int jfs_init_acl(tid_t tid, struct inode *inode, struct inode *dir)
|
||||
{
|
||||
struct posix_acl *acl = NULL;
|
||||
struct posix_acl *default_acl, *acl;
|
||||
int rc = 0;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return 0;
|
||||
rc = posix_acl_create(dir, &inode->i_mode, &default_acl, &acl);
|
||||
if (rc)
|
||||
return rc;
|
||||
|
||||
acl = jfs_get_acl(dir, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (default_acl) {
|
||||
rc = __jfs_set_acl(tid, inode, ACL_TYPE_DEFAULT, default_acl);
|
||||
posix_acl_release(default_acl);
|
||||
}
|
||||
|
||||
if (acl) {
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
rc = jfs_set_acl(tid, inode, ACL_TYPE_DEFAULT, acl);
|
||||
if (rc)
|
||||
goto cleanup;
|
||||
}
|
||||
rc = posix_acl_create(&acl, GFP_KERNEL, &inode->i_mode);
|
||||
if (rc < 0)
|
||||
goto cleanup; /* posix_acl_release(NULL) is no-op */
|
||||
if (rc > 0)
|
||||
rc = jfs_set_acl(tid, inode, ACL_TYPE_ACCESS, acl);
|
||||
cleanup:
|
||||
if (!rc)
|
||||
rc = __jfs_set_acl(tid, inode, ACL_TYPE_ACCESS, acl);
|
||||
posix_acl_release(acl);
|
||||
} else
|
||||
inode->i_mode &= ~current_umask();
|
||||
}
|
||||
|
||||
JFS_IP(inode)->mode2 = (JFS_IP(inode)->mode2 & 0xffff0000) |
|
||||
inode->i_mode;
|
||||
|
||||
return rc;
|
||||
}
|
||||
|
||||
int jfs_acl_chmod(struct inode *inode)
|
||||
{
|
||||
struct posix_acl *acl;
|
||||
int rc;
|
||||
tid_t tid;
|
||||
|
||||
if (S_ISLNK(inode->i_mode))
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
acl = jfs_get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl) || !acl)
|
||||
return PTR_ERR(acl);
|
||||
|
||||
rc = posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
|
||||
if (rc)
|
||||
return rc;
|
||||
|
||||
tid = txBegin(inode->i_sb, 0);
|
||||
mutex_lock(&JFS_IP(inode)->commit_mutex);
|
||||
rc = jfs_set_acl(tid, inode, ACL_TYPE_ACCESS, acl);
|
||||
if (!rc)
|
||||
rc = txCommit(tid, 1, &inode, 0);
|
||||
txEnd(tid);
|
||||
mutex_unlock(&JFS_IP(inode)->commit_mutex);
|
||||
|
||||
posix_acl_release(acl);
|
||||
return rc;
|
||||
}
|
||||
|
@ -19,6 +19,7 @@
|
||||
|
||||
#include <linux/mm.h>
|
||||
#include <linux/fs.h>
|
||||
#include <linux/posix_acl.h>
|
||||
#include <linux/quotaops.h>
|
||||
#include "jfs_incore.h"
|
||||
#include "jfs_inode.h"
|
||||
@ -131,7 +132,7 @@ int jfs_setattr(struct dentry *dentry, struct iattr *iattr)
|
||||
mark_inode_dirty(inode);
|
||||
|
||||
if (iattr->ia_valid & ATTR_MODE)
|
||||
rc = jfs_acl_chmod(inode);
|
||||
rc = posix_acl_chmod(inode, inode->i_mode);
|
||||
return rc;
|
||||
}
|
||||
|
||||
@ -143,6 +144,7 @@ const struct inode_operations jfs_file_inode_operations = {
|
||||
.setattr = jfs_setattr,
|
||||
#ifdef CONFIG_JFS_POSIX_ACL
|
||||
.get_acl = jfs_get_acl,
|
||||
.set_acl = jfs_set_acl,
|
||||
#endif
|
||||
};
|
||||
|
||||
|
@ -21,8 +21,8 @@
|
||||
#ifdef CONFIG_JFS_POSIX_ACL
|
||||
|
||||
struct posix_acl *jfs_get_acl(struct inode *inode, int type);
|
||||
int jfs_set_acl(struct inode *inode, struct posix_acl *acl, int type);
|
||||
int jfs_init_acl(tid_t, struct inode *, struct inode *);
|
||||
int jfs_acl_chmod(struct inode *inode);
|
||||
|
||||
#else
|
||||
|
||||
@ -32,10 +32,5 @@ static inline int jfs_init_acl(tid_t tid, struct inode *inode,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int jfs_acl_chmod(struct inode *inode)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
#endif
|
||||
#endif /* _H_JFS_ACL */
|
||||
|
@ -61,6 +61,8 @@ extern ssize_t jfs_getxattr(struct dentry *, const char *, void *, size_t);
|
||||
extern ssize_t jfs_listxattr(struct dentry *, char *, size_t);
|
||||
extern int jfs_removexattr(struct dentry *, const char *);
|
||||
|
||||
extern const struct xattr_handler *jfs_xattr_handlers[];
|
||||
|
||||
#ifdef CONFIG_JFS_SECURITY
|
||||
extern int jfs_init_security(tid_t, struct inode *, struct inode *,
|
||||
const struct qstr *);
|
||||
|
@ -1524,6 +1524,7 @@ const struct inode_operations jfs_dir_inode_operations = {
|
||||
.setattr = jfs_setattr,
|
||||
#ifdef CONFIG_JFS_POSIX_ACL
|
||||
.get_acl = jfs_get_acl,
|
||||
.set_acl = jfs_set_acl,
|
||||
#endif
|
||||
};
|
||||
|
||||
|
@ -44,6 +44,7 @@
|
||||
#include "jfs_imap.h"
|
||||
#include "jfs_acl.h"
|
||||
#include "jfs_debug.h"
|
||||
#include "jfs_xattr.h"
|
||||
|
||||
MODULE_DESCRIPTION("The Journaled Filesystem (JFS)");
|
||||
MODULE_AUTHOR("Steve Best/Dave Kleikamp/Barry Arndt, IBM");
|
||||
@ -522,6 +523,7 @@ static int jfs_fill_super(struct super_block *sb, void *data, int silent)
|
||||
*/
|
||||
sb->s_op = &jfs_super_operations;
|
||||
sb->s_export_op = &jfs_export_operations;
|
||||
sb->s_xattr = jfs_xattr_handlers;
|
||||
#ifdef CONFIG_QUOTA
|
||||
sb->dq_op = &dquot_operations;
|
||||
sb->s_qcop = &dquot_quotactl_ops;
|
||||
|
108
fs/jfs/xattr.c
108
fs/jfs/xattr.c
@ -665,82 +665,13 @@ static int ea_put(tid_t tid, struct inode *inode, struct ea_buffer *ea_buf,
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* can_set_system_xattr
|
||||
*
|
||||
* This code is specific to the system.* namespace. It contains policy
|
||||
* which doesn't belong in the main xattr codepath.
|
||||
*/
|
||||
static int can_set_system_xattr(struct inode *inode, const char *name,
|
||||
const void *value, size_t value_len)
|
||||
{
|
||||
#ifdef CONFIG_JFS_POSIX_ACL
|
||||
struct posix_acl *acl;
|
||||
int rc;
|
||||
|
||||
if (!inode_owner_or_capable(inode))
|
||||
return -EPERM;
|
||||
|
||||
/*
|
||||
* POSIX_ACL_XATTR_ACCESS is tied to i_mode
|
||||
*/
|
||||
if (strcmp(name, POSIX_ACL_XATTR_ACCESS) == 0) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, value_len);
|
||||
if (IS_ERR(acl)) {
|
||||
rc = PTR_ERR(acl);
|
||||
printk(KERN_ERR "posix_acl_from_xattr returned %d\n",
|
||||
rc);
|
||||
return rc;
|
||||
}
|
||||
if (acl) {
|
||||
rc = posix_acl_equiv_mode(acl, &inode->i_mode);
|
||||
posix_acl_release(acl);
|
||||
if (rc < 0) {
|
||||
printk(KERN_ERR
|
||||
"posix_acl_equiv_mode returned %d\n",
|
||||
rc);
|
||||
return rc;
|
||||
}
|
||||
mark_inode_dirty(inode);
|
||||
}
|
||||
/*
|
||||
* We're changing the ACL. Get rid of the cached one
|
||||
*/
|
||||
forget_cached_acl(inode, ACL_TYPE_ACCESS);
|
||||
|
||||
return 0;
|
||||
} else if (strcmp(name, POSIX_ACL_XATTR_DEFAULT) == 0) {
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, value_len);
|
||||
if (IS_ERR(acl)) {
|
||||
rc = PTR_ERR(acl);
|
||||
printk(KERN_ERR "posix_acl_from_xattr returned %d\n",
|
||||
rc);
|
||||
return rc;
|
||||
}
|
||||
posix_acl_release(acl);
|
||||
|
||||
/*
|
||||
* We're changing the default ACL. Get rid of the cached one
|
||||
*/
|
||||
forget_cached_acl(inode, ACL_TYPE_DEFAULT);
|
||||
|
||||
return 0;
|
||||
}
|
||||
#endif /* CONFIG_JFS_POSIX_ACL */
|
||||
return -EOPNOTSUPP;
|
||||
}
|
||||
|
||||
/*
|
||||
* Most of the permission checking is done by xattr_permission in the vfs.
|
||||
* The local file system is responsible for handling the system.* namespace.
|
||||
* We also need to verify that this is a namespace that we recognize.
|
||||
*/
|
||||
static int can_set_xattr(struct inode *inode, const char *name,
|
||||
const void *value, size_t value_len)
|
||||
{
|
||||
if (!strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN))
|
||||
return can_set_system_xattr(inode, name, value, value_len);
|
||||
|
||||
if (!strncmp(name, XATTR_OS2_PREFIX, XATTR_OS2_PREFIX_LEN)) {
|
||||
/*
|
||||
* This makes sure that we aren't trying to set an
|
||||
@ -748,7 +679,7 @@ static int can_set_xattr(struct inode *inode, const char *name,
|
||||
* with "os2."
|
||||
*/
|
||||
if (is_known_namespace(name + XATTR_OS2_PREFIX_LEN))
|
||||
return -EOPNOTSUPP;
|
||||
return -EOPNOTSUPP;
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -913,6 +844,14 @@ int jfs_setxattr(struct dentry *dentry, const char *name, const void *value,
|
||||
if ((rc = can_set_xattr(inode, name, value, value_len)))
|
||||
return rc;
|
||||
|
||||
/*
|
||||
* If this is a request for a synthetic attribute in the system.*
|
||||
* namespace use the generic infrastructure to resolve a handler
|
||||
* for it via sb->s_xattr.
|
||||
*/
|
||||
if (!strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN))
|
||||
return generic_setxattr(dentry, name, value, value_len, flags);
|
||||
|
||||
if (value == NULL) { /* empty EA, do not remove */
|
||||
value = "";
|
||||
value_len = 0;
|
||||
@ -986,6 +925,14 @@ ssize_t jfs_getxattr(struct dentry *dentry, const char *name, void *data,
|
||||
{
|
||||
int err;
|
||||
|
||||
/*
|
||||
* If this is a request for a synthetic attribute in the system.*
|
||||
* namespace use the generic infrastructure to resolve a handler
|
||||
* for it via sb->s_xattr.
|
||||
*/
|
||||
if (!strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN))
|
||||
return generic_getxattr(dentry, name, data, buf_size);
|
||||
|
||||
if (strncmp(name, XATTR_OS2_PREFIX, XATTR_OS2_PREFIX_LEN) == 0) {
|
||||
/*
|
||||
* skip past "os2." prefix
|
||||
@ -1077,6 +1024,14 @@ int jfs_removexattr(struct dentry *dentry, const char *name)
|
||||
if ((rc = can_set_xattr(inode, name, NULL, 0)))
|
||||
return rc;
|
||||
|
||||
/*
|
||||
* If this is a request for a synthetic attribute in the system.*
|
||||
* namespace use the generic infrastructure to resolve a handler
|
||||
* for it via sb->s_xattr.
|
||||
*/
|
||||
if (!strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN))
|
||||
return generic_removexattr(dentry, name);
|
||||
|
||||
tid = txBegin(inode->i_sb, 0);
|
||||
mutex_lock(&ji->commit_mutex);
|
||||
rc = __jfs_setxattr(tid, dentry->d_inode, name, NULL, 0, XATTR_REPLACE);
|
||||
@ -1088,6 +1043,19 @@ int jfs_removexattr(struct dentry *dentry, const char *name)
|
||||
return rc;
|
||||
}
|
||||
|
||||
/*
|
||||
* List of handlers for synthetic system.* attributes. All real ondisk
|
||||
* attributes are handled directly.
|
||||
*/
|
||||
const struct xattr_handler *jfs_xattr_handlers[] = {
|
||||
#ifdef JFS_POSIX_ACL
|
||||
&posix_acl_access_xattr_handler,
|
||||
&posix_acl_default_xattr_handler,
|
||||
#endif
|
||||
NULL,
|
||||
};
|
||||
|
||||
|
||||
#ifdef CONFIG_JFS_SECURITY
|
||||
static int jfs_initxattrs(struct inode *inode, const struct xattr *xattr_array,
|
||||
void *fs_info)
|
||||
|
@ -74,7 +74,7 @@ static inline int mnt_has_parent(struct mount *mnt)
|
||||
static inline int is_mounted(struct vfsmount *mnt)
|
||||
{
|
||||
/* neither detached nor internal? */
|
||||
return !IS_ERR_OR_NULL(real_mount(mnt));
|
||||
return !IS_ERR_OR_NULL(real_mount(mnt)->mnt_ns);
|
||||
}
|
||||
|
||||
extern struct mount *__lookup_mnt(struct vfsmount *, struct dentry *);
|
||||
|
24
fs/namei.c
24
fs/namei.c
@ -235,27 +235,9 @@ static int check_acl(struct inode *inode, int mask)
|
||||
return posix_acl_permission(inode, acl, mask & ~MAY_NOT_BLOCK);
|
||||
}
|
||||
|
||||
acl = get_cached_acl(inode, ACL_TYPE_ACCESS);
|
||||
|
||||
/*
|
||||
* A filesystem can force a ACL callback by just never filling the
|
||||
* ACL cache. But normally you'd fill the cache either at inode
|
||||
* instantiation time, or on the first ->get_acl call.
|
||||
*
|
||||
* If the filesystem doesn't have a get_acl() function at all, we'll
|
||||
* just create the negative cache entry.
|
||||
*/
|
||||
if (acl == ACL_NOT_CACHED) {
|
||||
if (inode->i_op->get_acl) {
|
||||
acl = inode->i_op->get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
} else {
|
||||
set_cached_acl(inode, ACL_TYPE_ACCESS, NULL);
|
||||
return -EAGAIN;
|
||||
}
|
||||
}
|
||||
|
||||
acl = get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl) {
|
||||
int error = posix_acl_permission(inode, acl, mask);
|
||||
posix_acl_release(acl);
|
||||
|
@ -1641,10 +1641,6 @@ struct inode *nfs_alloc_inode(struct super_block *sb)
|
||||
return NULL;
|
||||
nfsi->flags = 0UL;
|
||||
nfsi->cache_validity = 0UL;
|
||||
#ifdef CONFIG_NFS_V3_ACL
|
||||
nfsi->acl_access = ERR_PTR(-EAGAIN);
|
||||
nfsi->acl_default = ERR_PTR(-EAGAIN);
|
||||
#endif
|
||||
#if IS_ENABLED(CONFIG_NFS_V4)
|
||||
nfsi->nfs4_acl = NULL;
|
||||
#endif /* CONFIG_NFS_V4 */
|
||||
|
289
fs/nfs/nfs3acl.c
289
fs/nfs/nfs3acl.c
@ -10,179 +10,7 @@
|
||||
|
||||
#define NFSDBG_FACILITY NFSDBG_PROC
|
||||
|
||||
ssize_t nfs3_listxattr(struct dentry *dentry, char *buffer, size_t size)
|
||||
{
|
||||
struct inode *inode = dentry->d_inode;
|
||||
struct posix_acl *acl;
|
||||
int pos=0, len=0;
|
||||
|
||||
# define output(s) do { \
|
||||
if (pos + sizeof(s) <= size) { \
|
||||
memcpy(buffer + pos, s, sizeof(s)); \
|
||||
pos += sizeof(s); \
|
||||
} \
|
||||
len += sizeof(s); \
|
||||
} while(0)
|
||||
|
||||
acl = nfs3_proc_getacl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl) {
|
||||
output("system.posix_acl_access");
|
||||
posix_acl_release(acl);
|
||||
}
|
||||
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
acl = nfs3_proc_getacl(inode, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
if (acl) {
|
||||
output("system.posix_acl_default");
|
||||
posix_acl_release(acl);
|
||||
}
|
||||
}
|
||||
|
||||
# undef output
|
||||
|
||||
if (!buffer || len <= size)
|
||||
return len;
|
||||
return -ERANGE;
|
||||
}
|
||||
|
||||
ssize_t nfs3_getxattr(struct dentry *dentry, const char *name,
|
||||
void *buffer, size_t size)
|
||||
{
|
||||
struct inode *inode = dentry->d_inode;
|
||||
struct posix_acl *acl;
|
||||
int type, error = 0;
|
||||
|
||||
if (strcmp(name, POSIX_ACL_XATTR_ACCESS) == 0)
|
||||
type = ACL_TYPE_ACCESS;
|
||||
else if (strcmp(name, POSIX_ACL_XATTR_DEFAULT) == 0)
|
||||
type = ACL_TYPE_DEFAULT;
|
||||
else
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
acl = nfs3_proc_getacl(inode, type);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
else if (acl) {
|
||||
if (type == ACL_TYPE_ACCESS && acl->a_count == 0)
|
||||
error = -ENODATA;
|
||||
else
|
||||
error = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
|
||||
posix_acl_release(acl);
|
||||
} else
|
||||
error = -ENODATA;
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
int nfs3_setxattr(struct dentry *dentry, const char *name,
|
||||
const void *value, size_t size, int flags)
|
||||
{
|
||||
struct inode *inode = dentry->d_inode;
|
||||
struct posix_acl *acl;
|
||||
int type, error;
|
||||
|
||||
if (strcmp(name, POSIX_ACL_XATTR_ACCESS) == 0)
|
||||
type = ACL_TYPE_ACCESS;
|
||||
else if (strcmp(name, POSIX_ACL_XATTR_DEFAULT) == 0)
|
||||
type = ACL_TYPE_DEFAULT;
|
||||
else
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
if (IS_ERR(acl))
|
||||
return PTR_ERR(acl);
|
||||
error = nfs3_proc_setacl(inode, type, acl);
|
||||
posix_acl_release(acl);
|
||||
|
||||
return error;
|
||||
}
|
||||
|
||||
int nfs3_removexattr(struct dentry *dentry, const char *name)
|
||||
{
|
||||
struct inode *inode = dentry->d_inode;
|
||||
int type;
|
||||
|
||||
if (strcmp(name, POSIX_ACL_XATTR_ACCESS) == 0)
|
||||
type = ACL_TYPE_ACCESS;
|
||||
else if (strcmp(name, POSIX_ACL_XATTR_DEFAULT) == 0)
|
||||
type = ACL_TYPE_DEFAULT;
|
||||
else
|
||||
return -EOPNOTSUPP;
|
||||
|
||||
return nfs3_proc_setacl(inode, type, NULL);
|
||||
}
|
||||
|
||||
static void __nfs3_forget_cached_acls(struct nfs_inode *nfsi)
|
||||
{
|
||||
if (!IS_ERR(nfsi->acl_access)) {
|
||||
posix_acl_release(nfsi->acl_access);
|
||||
nfsi->acl_access = ERR_PTR(-EAGAIN);
|
||||
}
|
||||
if (!IS_ERR(nfsi->acl_default)) {
|
||||
posix_acl_release(nfsi->acl_default);
|
||||
nfsi->acl_default = ERR_PTR(-EAGAIN);
|
||||
}
|
||||
}
|
||||
|
||||
void nfs3_forget_cached_acls(struct inode *inode)
|
||||
{
|
||||
dprintk("NFS: nfs3_forget_cached_acls(%s/%ld)\n", inode->i_sb->s_id,
|
||||
inode->i_ino);
|
||||
spin_lock(&inode->i_lock);
|
||||
__nfs3_forget_cached_acls(NFS_I(inode));
|
||||
spin_unlock(&inode->i_lock);
|
||||
}
|
||||
|
||||
static struct posix_acl *nfs3_get_cached_acl(struct inode *inode, int type)
|
||||
{
|
||||
struct nfs_inode *nfsi = NFS_I(inode);
|
||||
struct posix_acl *acl = ERR_PTR(-EINVAL);
|
||||
|
||||
spin_lock(&inode->i_lock);
|
||||
switch(type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
acl = nfsi->acl_access;
|
||||
break;
|
||||
|
||||
case ACL_TYPE_DEFAULT:
|
||||
acl = nfsi->acl_default;
|
||||
break;
|
||||
|
||||
default:
|
||||
goto out;
|
||||
}
|
||||
if (IS_ERR(acl))
|
||||
acl = ERR_PTR(-EAGAIN);
|
||||
else
|
||||
acl = posix_acl_dup(acl);
|
||||
out:
|
||||
spin_unlock(&inode->i_lock);
|
||||
dprintk("NFS: nfs3_get_cached_acl(%s/%ld, %d) = %p\n", inode->i_sb->s_id,
|
||||
inode->i_ino, type, acl);
|
||||
return acl;
|
||||
}
|
||||
|
||||
static void nfs3_cache_acls(struct inode *inode, struct posix_acl *acl,
|
||||
struct posix_acl *dfacl)
|
||||
{
|
||||
struct nfs_inode *nfsi = NFS_I(inode);
|
||||
|
||||
dprintk("nfs3_cache_acls(%s/%ld, %p, %p)\n", inode->i_sb->s_id,
|
||||
inode->i_ino, acl, dfacl);
|
||||
spin_lock(&inode->i_lock);
|
||||
__nfs3_forget_cached_acls(NFS_I(inode));
|
||||
if (!IS_ERR(acl))
|
||||
nfsi->acl_access = posix_acl_dup(acl);
|
||||
if (!IS_ERR(dfacl))
|
||||
nfsi->acl_default = posix_acl_dup(dfacl);
|
||||
spin_unlock(&inode->i_lock);
|
||||
}
|
||||
|
||||
struct posix_acl *nfs3_proc_getacl(struct inode *inode, int type)
|
||||
struct posix_acl *nfs3_get_acl(struct inode *inode, int type)
|
||||
{
|
||||
struct nfs_server *server = NFS_SERVER(inode);
|
||||
struct page *pages[NFSACL_MAXPAGES] = { };
|
||||
@ -198,7 +26,6 @@ struct posix_acl *nfs3_proc_getacl(struct inode *inode, int type)
|
||||
.rpc_argp = &args,
|
||||
.rpc_resp = &res,
|
||||
};
|
||||
struct posix_acl *acl;
|
||||
int status, count;
|
||||
|
||||
if (!nfs_server_capable(inode, NFS_CAP_ACLS))
|
||||
@ -207,10 +34,6 @@ struct posix_acl *nfs3_proc_getacl(struct inode *inode, int type)
|
||||
status = nfs_revalidate_inode(server, inode);
|
||||
if (status < 0)
|
||||
return ERR_PTR(status);
|
||||
acl = nfs3_get_cached_acl(inode, type);
|
||||
if (acl != ERR_PTR(-EAGAIN))
|
||||
return acl;
|
||||
acl = NULL;
|
||||
|
||||
/*
|
||||
* Only get the access acl when explicitly requested: We don't
|
||||
@ -257,40 +80,41 @@ struct posix_acl *nfs3_proc_getacl(struct inode *inode, int type)
|
||||
}
|
||||
|
||||
if (res.acl_access != NULL) {
|
||||
if (posix_acl_equiv_mode(res.acl_access, NULL) == 0) {
|
||||
if (posix_acl_equiv_mode(res.acl_access, NULL) ||
|
||||
res.acl_access->a_count == 0) {
|
||||
posix_acl_release(res.acl_access);
|
||||
res.acl_access = NULL;
|
||||
}
|
||||
}
|
||||
nfs3_cache_acls(inode,
|
||||
(res.mask & NFS_ACL) ? res.acl_access : ERR_PTR(-EINVAL),
|
||||
(res.mask & NFS_DFACL) ? res.acl_default : ERR_PTR(-EINVAL));
|
||||
|
||||
switch(type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
acl = res.acl_access;
|
||||
res.acl_access = NULL;
|
||||
break;
|
||||
if (res.mask & NFS_ACL)
|
||||
set_cached_acl(inode, ACL_TYPE_ACCESS, res.acl_access);
|
||||
else
|
||||
forget_cached_acl(inode, ACL_TYPE_ACCESS);
|
||||
|
||||
case ACL_TYPE_DEFAULT:
|
||||
acl = res.acl_default;
|
||||
res.acl_default = NULL;
|
||||
if (res.mask & NFS_DFACL)
|
||||
set_cached_acl(inode, ACL_TYPE_DEFAULT, res.acl_default);
|
||||
else
|
||||
forget_cached_acl(inode, ACL_TYPE_DEFAULT);
|
||||
|
||||
nfs_free_fattr(res.fattr);
|
||||
if (type == ACL_TYPE_ACCESS) {
|
||||
posix_acl_release(res.acl_default);
|
||||
return res.acl_access;
|
||||
} else {
|
||||
posix_acl_release(res.acl_access);
|
||||
return res.acl_default;
|
||||
}
|
||||
|
||||
getout:
|
||||
posix_acl_release(res.acl_access);
|
||||
posix_acl_release(res.acl_default);
|
||||
nfs_free_fattr(res.fattr);
|
||||
|
||||
if (status != 0) {
|
||||
posix_acl_release(acl);
|
||||
acl = ERR_PTR(status);
|
||||
}
|
||||
return acl;
|
||||
return ERR_PTR(status);
|
||||
}
|
||||
|
||||
static int nfs3_proc_setacls(struct inode *inode, struct posix_acl *acl,
|
||||
struct posix_acl *dfacl)
|
||||
int nfs3_proc_setacls(struct inode *inode, struct posix_acl *acl,
|
||||
struct posix_acl *dfacl)
|
||||
{
|
||||
struct nfs_server *server = NFS_SERVER(inode);
|
||||
struct nfs_fattr *fattr;
|
||||
@ -353,7 +177,8 @@ static int nfs3_proc_setacls(struct inode *inode, struct posix_acl *acl,
|
||||
switch (status) {
|
||||
case 0:
|
||||
status = nfs_refresh_inode(inode, fattr);
|
||||
nfs3_cache_acls(inode, acl, dfacl);
|
||||
set_cached_acl(inode, ACL_TYPE_ACCESS, acl);
|
||||
set_cached_acl(inode, ACL_TYPE_DEFAULT, dfacl);
|
||||
break;
|
||||
case -EPFNOSUPPORT:
|
||||
case -EPROTONOSUPPORT:
|
||||
@ -373,33 +198,27 @@ out:
|
||||
return status;
|
||||
}
|
||||
|
||||
int nfs3_proc_setacl(struct inode *inode, int type, struct posix_acl *acl)
|
||||
int nfs3_set_acl(struct inode *inode, struct posix_acl *acl, int type)
|
||||
{
|
||||
struct posix_acl *alloc = NULL, *dfacl = NULL;
|
||||
int status;
|
||||
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
switch(type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
alloc = dfacl = nfs3_proc_getacl(inode,
|
||||
ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(alloc))
|
||||
goto fail;
|
||||
break;
|
||||
case ACL_TYPE_ACCESS:
|
||||
alloc = dfacl = get_acl(inode, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(alloc))
|
||||
goto fail;
|
||||
break;
|
||||
|
||||
case ACL_TYPE_DEFAULT:
|
||||
dfacl = acl;
|
||||
alloc = acl = nfs3_proc_getacl(inode,
|
||||
ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(alloc))
|
||||
goto fail;
|
||||
break;
|
||||
|
||||
default:
|
||||
return -EINVAL;
|
||||
case ACL_TYPE_DEFAULT:
|
||||
dfacl = acl;
|
||||
alloc = acl = get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(alloc))
|
||||
goto fail;
|
||||
break;
|
||||
}
|
||||
} else if (type != ACL_TYPE_ACCESS)
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (acl == NULL) {
|
||||
alloc = acl = posix_acl_from_mode(inode->i_mode, GFP_KERNEL);
|
||||
@ -417,24 +236,24 @@ fail:
|
||||
int nfs3_proc_set_default_acl(struct inode *dir, struct inode *inode,
|
||||
umode_t mode)
|
||||
{
|
||||
struct posix_acl *dfacl, *acl;
|
||||
int error = 0;
|
||||
struct posix_acl *default_acl, *acl;
|
||||
int error;
|
||||
|
||||
dfacl = nfs3_proc_getacl(dir, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(dfacl)) {
|
||||
error = PTR_ERR(dfacl);
|
||||
error = posix_acl_create(dir, &mode, &default_acl, &acl);
|
||||
if (error)
|
||||
return (error == -EOPNOTSUPP) ? 0 : error;
|
||||
}
|
||||
if (!dfacl)
|
||||
return 0;
|
||||
acl = posix_acl_dup(dfacl);
|
||||
error = posix_acl_create(&acl, GFP_KERNEL, &mode);
|
||||
if (error < 0)
|
||||
goto out_release_dfacl;
|
||||
error = nfs3_proc_setacls(inode, acl, S_ISDIR(inode->i_mode) ?
|
||||
dfacl : NULL);
|
||||
posix_acl_release(acl);
|
||||
out_release_dfacl:
|
||||
posix_acl_release(dfacl);
|
||||
|
||||
error = nfs3_proc_setacls(inode, acl, default_acl);
|
||||
|
||||
if (acl)
|
||||
posix_acl_release(acl);
|
||||
if (default_acl)
|
||||
posix_acl_release(default_acl);
|
||||
return error;
|
||||
}
|
||||
|
||||
const struct xattr_handler *nfs3_xattr_handlers[] = {
|
||||
&posix_acl_access_xattr_handler,
|
||||
&posix_acl_default_xattr_handler,
|
||||
NULL,
|
||||
};
|
||||
|
@ -317,8 +317,8 @@ static int
|
||||
nfs3_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
|
||||
int flags)
|
||||
{
|
||||
struct posix_acl *default_acl, *acl;
|
||||
struct nfs3_createdata *data;
|
||||
umode_t mode = sattr->ia_mode;
|
||||
int status = -ENOMEM;
|
||||
|
||||
dprintk("NFS call create %pd\n", dentry);
|
||||
@ -340,7 +340,9 @@ nfs3_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
|
||||
data->arg.create.verifier[1] = cpu_to_be32(current->pid);
|
||||
}
|
||||
|
||||
sattr->ia_mode &= ~current_umask();
|
||||
status = posix_acl_create(dir, &sattr->ia_mode, &default_acl, &acl);
|
||||
if (status)
|
||||
goto out;
|
||||
|
||||
for (;;) {
|
||||
status = nfs3_do_create(dir, dentry, data);
|
||||
@ -366,7 +368,7 @@ nfs3_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
|
||||
}
|
||||
|
||||
if (status != 0)
|
||||
goto out;
|
||||
goto out_release_acls;
|
||||
|
||||
/* When we created the file with exclusive semantics, make
|
||||
* sure we set the attributes afterwards. */
|
||||
@ -385,9 +387,14 @@ nfs3_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
|
||||
nfs_post_op_update_inode(dentry->d_inode, data->res.fattr);
|
||||
dprintk("NFS reply setattr (post-create): %d\n", status);
|
||||
if (status != 0)
|
||||
goto out;
|
||||
goto out_release_acls;
|
||||
}
|
||||
status = nfs3_proc_set_default_acl(dir, dentry->d_inode, mode);
|
||||
|
||||
status = nfs3_proc_setacls(dentry->d_inode, acl, default_acl);
|
||||
|
||||
out_release_acls:
|
||||
posix_acl_release(acl);
|
||||
posix_acl_release(default_acl);
|
||||
out:
|
||||
nfs3_free_createdata(data);
|
||||
dprintk("NFS reply create: %d\n", status);
|
||||
@ -572,18 +579,20 @@ out:
|
||||
static int
|
||||
nfs3_proc_mkdir(struct inode *dir, struct dentry *dentry, struct iattr *sattr)
|
||||
{
|
||||
struct posix_acl *default_acl, *acl;
|
||||
struct nfs3_createdata *data;
|
||||
umode_t mode = sattr->ia_mode;
|
||||
int status = -ENOMEM;
|
||||
|
||||
dprintk("NFS call mkdir %pd\n", dentry);
|
||||
|
||||
sattr->ia_mode &= ~current_umask();
|
||||
|
||||
data = nfs3_alloc_createdata();
|
||||
if (data == NULL)
|
||||
goto out;
|
||||
|
||||
status = posix_acl_create(dir, &sattr->ia_mode, &default_acl, &acl);
|
||||
if (status)
|
||||
goto out;
|
||||
|
||||
data->msg.rpc_proc = &nfs3_procedures[NFS3PROC_MKDIR];
|
||||
data->arg.mkdir.fh = NFS_FH(dir);
|
||||
data->arg.mkdir.name = dentry->d_name.name;
|
||||
@ -592,9 +601,13 @@ nfs3_proc_mkdir(struct inode *dir, struct dentry *dentry, struct iattr *sattr)
|
||||
|
||||
status = nfs3_do_create(dir, dentry, data);
|
||||
if (status != 0)
|
||||
goto out;
|
||||
goto out_release_acls;
|
||||
|
||||
status = nfs3_proc_set_default_acl(dir, dentry->d_inode, mode);
|
||||
status = nfs3_proc_setacls(dentry->d_inode, acl, default_acl);
|
||||
|
||||
out_release_acls:
|
||||
posix_acl_release(acl);
|
||||
posix_acl_release(default_acl);
|
||||
out:
|
||||
nfs3_free_createdata(data);
|
||||
dprintk("NFS reply mkdir: %d\n", status);
|
||||
@ -691,19 +704,21 @@ static int
|
||||
nfs3_proc_mknod(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
|
||||
dev_t rdev)
|
||||
{
|
||||
struct posix_acl *default_acl, *acl;
|
||||
struct nfs3_createdata *data;
|
||||
umode_t mode = sattr->ia_mode;
|
||||
int status = -ENOMEM;
|
||||
|
||||
dprintk("NFS call mknod %pd %u:%u\n", dentry,
|
||||
MAJOR(rdev), MINOR(rdev));
|
||||
|
||||
sattr->ia_mode &= ~current_umask();
|
||||
|
||||
data = nfs3_alloc_createdata();
|
||||
if (data == NULL)
|
||||
goto out;
|
||||
|
||||
status = posix_acl_create(dir, &sattr->ia_mode, &default_acl, &acl);
|
||||
if (status)
|
||||
goto out;
|
||||
|
||||
data->msg.rpc_proc = &nfs3_procedures[NFS3PROC_MKNOD];
|
||||
data->arg.mknod.fh = NFS_FH(dir);
|
||||
data->arg.mknod.name = dentry->d_name.name;
|
||||
@ -731,8 +746,13 @@ nfs3_proc_mknod(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
|
||||
|
||||
status = nfs3_do_create(dir, dentry, data);
|
||||
if (status != 0)
|
||||
goto out;
|
||||
status = nfs3_proc_set_default_acl(dir, dentry->d_inode, mode);
|
||||
goto out_release_acls;
|
||||
|
||||
status = nfs3_proc_setacls(dentry->d_inode, acl, default_acl);
|
||||
|
||||
out_release_acls:
|
||||
posix_acl_release(acl);
|
||||
posix_acl_release(default_acl);
|
||||
out:
|
||||
nfs3_free_createdata(data);
|
||||
dprintk("NFS reply mknod: %d\n", status);
|
||||
@ -904,20 +924,28 @@ static const struct inode_operations nfs3_dir_inode_operations = {
|
||||
.permission = nfs_permission,
|
||||
.getattr = nfs_getattr,
|
||||
.setattr = nfs_setattr,
|
||||
.listxattr = nfs3_listxattr,
|
||||
.getxattr = nfs3_getxattr,
|
||||
.setxattr = nfs3_setxattr,
|
||||
.removexattr = nfs3_removexattr,
|
||||
.listxattr = generic_listxattr,
|
||||
.getxattr = generic_getxattr,
|
||||
.setxattr = generic_setxattr,
|
||||
.removexattr = generic_removexattr,
|
||||
#ifdef CONFIG_NFS_V3_ACL
|
||||
.get_acl = nfs3_get_acl,
|
||||
.set_acl = nfs3_set_acl,
|
||||
#endif
|
||||
};
|
||||
|
||||
static const struct inode_operations nfs3_file_inode_operations = {
|
||||
.permission = nfs_permission,
|
||||
.getattr = nfs_getattr,
|
||||
.setattr = nfs_setattr,
|
||||
.listxattr = nfs3_listxattr,
|
||||
.getxattr = nfs3_getxattr,
|
||||
.setxattr = nfs3_setxattr,
|
||||
.removexattr = nfs3_removexattr,
|
||||
.listxattr = generic_listxattr,
|
||||
.getxattr = generic_getxattr,
|
||||
.setxattr = generic_setxattr,
|
||||
.removexattr = generic_removexattr,
|
||||
#ifdef CONFIG_NFS_V3_ACL
|
||||
.get_acl = nfs3_get_acl,
|
||||
.set_acl = nfs3_set_acl,
|
||||
#endif
|
||||
};
|
||||
|
||||
const struct nfs_rpc_ops nfs_v3_clientops = {
|
||||
@ -965,7 +993,7 @@ const struct nfs_rpc_ops nfs_v3_clientops = {
|
||||
.commit_rpc_prepare = nfs3_proc_commit_rpc_prepare,
|
||||
.commit_done = nfs3_commit_done,
|
||||
.lock = nfs3_proc_lock,
|
||||
.clear_acl_cache = nfs3_forget_cached_acls,
|
||||
.clear_acl_cache = forget_all_cached_acls,
|
||||
.close_context = nfs_close_context,
|
||||
.have_delegation = nfs3_have_delegation,
|
||||
.return_delegation = nfs3_return_delegation,
|
||||
|
@ -12,6 +12,9 @@ static struct nfs_subversion nfs_v3 = {
|
||||
.rpc_vers = &nfs_version3,
|
||||
.rpc_ops = &nfs_v3_clientops,
|
||||
.sops = &nfs_sops,
|
||||
#ifdef CONFIG_NFS_V3_ACL
|
||||
.xattr = nfs3_xattr_handlers,
|
||||
#endif
|
||||
};
|
||||
|
||||
static int __init init_nfs_v3(void)
|
||||
|
@ -35,7 +35,9 @@
|
||||
#ifndef LINUX_NFS4_ACL_H
|
||||
#define LINUX_NFS4_ACL_H
|
||||
|
||||
#include <linux/posix_acl.h>
|
||||
struct nfs4_acl;
|
||||
struct svc_fh;
|
||||
struct svc_rqst;
|
||||
|
||||
/* Maximum ACL we'll accept from client; chosen (somewhat arbitrarily) to
|
||||
* fit in a page: */
|
||||
@ -45,13 +47,9 @@ struct nfs4_acl *nfs4_acl_new(int);
|
||||
int nfs4_acl_get_whotype(char *, u32);
|
||||
int nfs4_acl_write_who(int who, char *p);
|
||||
|
||||
#define NFS4_ACL_TYPE_DEFAULT 0x01
|
||||
#define NFS4_ACL_DIR 0x02
|
||||
#define NFS4_ACL_OWNER 0x04
|
||||
|
||||
struct nfs4_acl *nfs4_acl_posix_to_nfsv4(struct posix_acl *,
|
||||
struct posix_acl *, unsigned int flags);
|
||||
int nfs4_acl_nfsv4_to_posix(struct nfs4_acl *, struct posix_acl **,
|
||||
struct posix_acl **, unsigned int flags);
|
||||
int nfsd4_get_nfs4_acl(struct svc_rqst *rqstp, struct dentry *dentry,
|
||||
struct nfs4_acl **acl);
|
||||
__be32 nfsd4_set_nfs4_acl(struct svc_rqst *rqstp, struct svc_fh *fhp,
|
||||
struct nfs4_acl *acl);
|
||||
|
||||
#endif /* LINUX_NFS4_ACL_H */
|
||||
|
@ -30,8 +30,9 @@ nfsacld_proc_null(struct svc_rqst *rqstp, void *argp, void *resp)
|
||||
static __be32 nfsacld_proc_getacl(struct svc_rqst * rqstp,
|
||||
struct nfsd3_getaclargs *argp, struct nfsd3_getaclres *resp)
|
||||
{
|
||||
svc_fh *fh;
|
||||
struct posix_acl *acl;
|
||||
struct inode *inode;
|
||||
svc_fh *fh;
|
||||
__be32 nfserr = 0;
|
||||
|
||||
dprintk("nfsd: GETACL(2acl) %s\n", SVCFH_fmt(&argp->fh));
|
||||
@ -41,6 +42,8 @@ static __be32 nfsacld_proc_getacl(struct svc_rqst * rqstp,
|
||||
if (nfserr)
|
||||
RETURN_STATUS(nfserr);
|
||||
|
||||
inode = fh->fh_dentry->d_inode;
|
||||
|
||||
if (argp->mask & ~(NFS_ACL|NFS_ACLCNT|NFS_DFACL|NFS_DFACLCNT))
|
||||
RETURN_STATUS(nfserr_inval);
|
||||
resp->mask = argp->mask;
|
||||
@ -50,21 +53,13 @@ static __be32 nfsacld_proc_getacl(struct svc_rqst * rqstp,
|
||||
goto fail;
|
||||
|
||||
if (resp->mask & (NFS_ACL|NFS_ACLCNT)) {
|
||||
acl = nfsd_get_posix_acl(fh, ACL_TYPE_ACCESS);
|
||||
acl = get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl)) {
|
||||
int err = PTR_ERR(acl);
|
||||
|
||||
if (err == -ENODATA || err == -EOPNOTSUPP)
|
||||
acl = NULL;
|
||||
else {
|
||||
nfserr = nfserrno(err);
|
||||
goto fail;
|
||||
}
|
||||
nfserr = nfserrno(PTR_ERR(acl));
|
||||
goto fail;
|
||||
}
|
||||
if (acl == NULL) {
|
||||
/* Solaris returns the inode's minimum ACL. */
|
||||
|
||||
struct inode *inode = fh->fh_dentry->d_inode;
|
||||
acl = posix_acl_from_mode(inode->i_mode, GFP_KERNEL);
|
||||
}
|
||||
resp->acl_access = acl;
|
||||
@ -72,17 +67,10 @@ static __be32 nfsacld_proc_getacl(struct svc_rqst * rqstp,
|
||||
if (resp->mask & (NFS_DFACL|NFS_DFACLCNT)) {
|
||||
/* Check how Solaris handles requests for the Default ACL
|
||||
of a non-directory! */
|
||||
|
||||
acl = nfsd_get_posix_acl(fh, ACL_TYPE_DEFAULT);
|
||||
acl = get_acl(inode, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl)) {
|
||||
int err = PTR_ERR(acl);
|
||||
|
||||
if (err == -ENODATA || err == -EOPNOTSUPP)
|
||||
acl = NULL;
|
||||
else {
|
||||
nfserr = nfserrno(err);
|
||||
goto fail;
|
||||
}
|
||||
nfserr = nfserrno(PTR_ERR(acl));
|
||||
goto fail;
|
||||
}
|
||||
resp->acl_default = acl;
|
||||
}
|
||||
@ -103,31 +91,51 @@ static __be32 nfsacld_proc_setacl(struct svc_rqst * rqstp,
|
||||
struct nfsd3_setaclargs *argp,
|
||||
struct nfsd_attrstat *resp)
|
||||
{
|
||||
struct inode *inode;
|
||||
svc_fh *fh;
|
||||
__be32 nfserr = 0;
|
||||
int error;
|
||||
|
||||
dprintk("nfsd: SETACL(2acl) %s\n", SVCFH_fmt(&argp->fh));
|
||||
|
||||
fh = fh_copy(&resp->fh, &argp->fh);
|
||||
nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_SATTR);
|
||||
if (nfserr)
|
||||
goto out;
|
||||
|
||||
if (!nfserr) {
|
||||
nfserr = nfserrno( nfsd_set_posix_acl(
|
||||
fh, ACL_TYPE_ACCESS, argp->acl_access) );
|
||||
}
|
||||
if (!nfserr) {
|
||||
nfserr = nfserrno( nfsd_set_posix_acl(
|
||||
fh, ACL_TYPE_DEFAULT, argp->acl_default) );
|
||||
}
|
||||
if (!nfserr) {
|
||||
nfserr = fh_getattr(fh, &resp->stat);
|
||||
inode = fh->fh_dentry->d_inode;
|
||||
if (!IS_POSIXACL(inode) || !inode->i_op->set_acl) {
|
||||
error = -EOPNOTSUPP;
|
||||
goto out_errno;
|
||||
}
|
||||
|
||||
error = fh_want_write(fh);
|
||||
if (error)
|
||||
goto out_errno;
|
||||
|
||||
error = inode->i_op->set_acl(inode, argp->acl_access, ACL_TYPE_ACCESS);
|
||||
if (error)
|
||||
goto out_drop_write;
|
||||
error = inode->i_op->set_acl(inode, argp->acl_default,
|
||||
ACL_TYPE_DEFAULT);
|
||||
if (error)
|
||||
goto out_drop_write;
|
||||
|
||||
fh_drop_write(fh);
|
||||
|
||||
nfserr = fh_getattr(fh, &resp->stat);
|
||||
|
||||
out:
|
||||
/* argp->acl_{access,default} may have been allocated in
|
||||
nfssvc_decode_setaclargs. */
|
||||
posix_acl_release(argp->acl_access);
|
||||
posix_acl_release(argp->acl_default);
|
||||
return nfserr;
|
||||
out_drop_write:
|
||||
fh_drop_write(fh);
|
||||
out_errno:
|
||||
nfserr = nfserrno(error);
|
||||
goto out;
|
||||
}
|
||||
|
||||
/*
|
||||
|
@ -29,8 +29,9 @@ nfsd3_proc_null(struct svc_rqst *rqstp, void *argp, void *resp)
|
||||
static __be32 nfsd3_proc_getacl(struct svc_rqst * rqstp,
|
||||
struct nfsd3_getaclargs *argp, struct nfsd3_getaclres *resp)
|
||||
{
|
||||
svc_fh *fh;
|
||||
struct posix_acl *acl;
|
||||
struct inode *inode;
|
||||
svc_fh *fh;
|
||||
__be32 nfserr = 0;
|
||||
|
||||
fh = fh_copy(&resp->fh, &argp->fh);
|
||||
@ -38,26 +39,20 @@ static __be32 nfsd3_proc_getacl(struct svc_rqst * rqstp,
|
||||
if (nfserr)
|
||||
RETURN_STATUS(nfserr);
|
||||
|
||||
inode = fh->fh_dentry->d_inode;
|
||||
|
||||
if (argp->mask & ~(NFS_ACL|NFS_ACLCNT|NFS_DFACL|NFS_DFACLCNT))
|
||||
RETURN_STATUS(nfserr_inval);
|
||||
resp->mask = argp->mask;
|
||||
|
||||
if (resp->mask & (NFS_ACL|NFS_ACLCNT)) {
|
||||
acl = nfsd_get_posix_acl(fh, ACL_TYPE_ACCESS);
|
||||
acl = get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (IS_ERR(acl)) {
|
||||
int err = PTR_ERR(acl);
|
||||
|
||||
if (err == -ENODATA || err == -EOPNOTSUPP)
|
||||
acl = NULL;
|
||||
else {
|
||||
nfserr = nfserrno(err);
|
||||
goto fail;
|
||||
}
|
||||
nfserr = nfserrno(PTR_ERR(acl));
|
||||
goto fail;
|
||||
}
|
||||
if (acl == NULL) {
|
||||
/* Solaris returns the inode's minimum ACL. */
|
||||
|
||||
struct inode *inode = fh->fh_dentry->d_inode;
|
||||
acl = posix_acl_from_mode(inode->i_mode, GFP_KERNEL);
|
||||
}
|
||||
resp->acl_access = acl;
|
||||
@ -65,17 +60,10 @@ static __be32 nfsd3_proc_getacl(struct svc_rqst * rqstp,
|
||||
if (resp->mask & (NFS_DFACL|NFS_DFACLCNT)) {
|
||||
/* Check how Solaris handles requests for the Default ACL
|
||||
of a non-directory! */
|
||||
|
||||
acl = nfsd_get_posix_acl(fh, ACL_TYPE_DEFAULT);
|
||||
acl = get_acl(inode, ACL_TYPE_DEFAULT);
|
||||
if (IS_ERR(acl)) {
|
||||
int err = PTR_ERR(acl);
|
||||
|
||||
if (err == -ENODATA || err == -EOPNOTSUPP)
|
||||
acl = NULL;
|
||||
else {
|
||||
nfserr = nfserrno(err);
|
||||
goto fail;
|
||||
}
|
||||
nfserr = nfserrno(PTR_ERR(acl));
|
||||
goto fail;
|
||||
}
|
||||
resp->acl_default = acl;
|
||||
}
|
||||
@ -96,21 +84,37 @@ static __be32 nfsd3_proc_setacl(struct svc_rqst * rqstp,
|
||||
struct nfsd3_setaclargs *argp,
|
||||
struct nfsd3_attrstat *resp)
|
||||
{
|
||||
struct inode *inode;
|
||||
svc_fh *fh;
|
||||
__be32 nfserr = 0;
|
||||
int error;
|
||||
|
||||
fh = fh_copy(&resp->fh, &argp->fh);
|
||||
nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_SATTR);
|
||||
if (nfserr)
|
||||
goto out;
|
||||
|
||||
if (!nfserr) {
|
||||
nfserr = nfserrno( nfsd_set_posix_acl(
|
||||
fh, ACL_TYPE_ACCESS, argp->acl_access) );
|
||||
}
|
||||
if (!nfserr) {
|
||||
nfserr = nfserrno( nfsd_set_posix_acl(
|
||||
fh, ACL_TYPE_DEFAULT, argp->acl_default) );
|
||||
inode = fh->fh_dentry->d_inode;
|
||||
if (!IS_POSIXACL(inode) || !inode->i_op->set_acl) {
|
||||
error = -EOPNOTSUPP;
|
||||
goto out_errno;
|
||||
}
|
||||
|
||||
error = fh_want_write(fh);
|
||||
if (error)
|
||||
goto out_errno;
|
||||
|
||||
error = inode->i_op->set_acl(inode, argp->acl_access, ACL_TYPE_ACCESS);
|
||||
if (error)
|
||||
goto out_drop_write;
|
||||
error = inode->i_op->set_acl(inode, argp->acl_default,
|
||||
ACL_TYPE_DEFAULT);
|
||||
|
||||
out_drop_write:
|
||||
fh_drop_write(fh);
|
||||
out_errno:
|
||||
nfserr = nfserrno(error);
|
||||
out:
|
||||
/* argp->acl_{access,default} may have been allocated in
|
||||
nfs3svc_decode_setaclargs. */
|
||||
posix_acl_release(argp->acl_access);
|
||||
|
@ -37,8 +37,13 @@
|
||||
#include <linux/slab.h>
|
||||
#include <linux/nfs_fs.h>
|
||||
#include <linux/export.h>
|
||||
#include "nfsfh.h"
|
||||
#include "acl.h"
|
||||
#include "vfs.h"
|
||||
|
||||
#define NFS4_ACL_TYPE_DEFAULT 0x01
|
||||
#define NFS4_ACL_DIR 0x02
|
||||
#define NFS4_ACL_OWNER 0x04
|
||||
|
||||
/* mode bit translations: */
|
||||
#define NFS4_READ_MODE (NFS4_ACE_READ_DATA)
|
||||
@ -130,36 +135,50 @@ static short ace2type(struct nfs4_ace *);
|
||||
static void _posix_to_nfsv4_one(struct posix_acl *, struct nfs4_acl *,
|
||||
unsigned int);
|
||||
|
||||
struct nfs4_acl *
|
||||
nfs4_acl_posix_to_nfsv4(struct posix_acl *pacl, struct posix_acl *dpacl,
|
||||
unsigned int flags)
|
||||
int
|
||||
nfsd4_get_nfs4_acl(struct svc_rqst *rqstp, struct dentry *dentry,
|
||||
struct nfs4_acl **acl)
|
||||
{
|
||||
struct nfs4_acl *acl;
|
||||
struct inode *inode = dentry->d_inode;
|
||||
int error = 0;
|
||||
struct posix_acl *pacl = NULL, *dpacl = NULL;
|
||||
unsigned int flags = 0;
|
||||
int size = 0;
|
||||
|
||||
if (pacl) {
|
||||
if (posix_acl_valid(pacl) < 0)
|
||||
return ERR_PTR(-EINVAL);
|
||||
size += 2*pacl->a_count;
|
||||
}
|
||||
if (dpacl) {
|
||||
if (posix_acl_valid(dpacl) < 0)
|
||||
return ERR_PTR(-EINVAL);
|
||||
size += 2*dpacl->a_count;
|
||||
pacl = get_acl(inode, ACL_TYPE_ACCESS);
|
||||
if (!pacl) {
|
||||
pacl = posix_acl_from_mode(inode->i_mode, GFP_KERNEL);
|
||||
if (IS_ERR(pacl))
|
||||
return PTR_ERR(pacl);
|
||||
/* allocate for worst case: one (deny, allow) pair each: */
|
||||
size += 2 * pacl->a_count;
|
||||
}
|
||||
|
||||
/* Allocate for worst case: one (deny, allow) pair each: */
|
||||
acl = nfs4_acl_new(size);
|
||||
if (acl == NULL)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
flags = NFS4_ACL_DIR;
|
||||
dpacl = get_acl(inode, ACL_TYPE_DEFAULT);
|
||||
if (dpacl)
|
||||
size += 2 * dpacl->a_count;
|
||||
} else {
|
||||
dpacl = NULL;
|
||||
}
|
||||
|
||||
*acl = nfs4_acl_new(size);
|
||||
if (*acl == NULL) {
|
||||
error = -ENOMEM;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (pacl)
|
||||
_posix_to_nfsv4_one(pacl, acl, flags & ~NFS4_ACL_TYPE_DEFAULT);
|
||||
_posix_to_nfsv4_one(pacl, *acl, flags & ~NFS4_ACL_TYPE_DEFAULT);
|
||||
|
||||
if (dpacl)
|
||||
_posix_to_nfsv4_one(dpacl, acl, flags | NFS4_ACL_TYPE_DEFAULT);
|
||||
_posix_to_nfsv4_one(dpacl, *acl, flags | NFS4_ACL_TYPE_DEFAULT);
|
||||
|
||||
return acl;
|
||||
out:
|
||||
posix_acl_release(pacl);
|
||||
posix_acl_release(dpacl);
|
||||
return error;
|
||||
}
|
||||
|
||||
struct posix_acl_summary {
|
||||
@ -719,8 +738,9 @@ static void process_one_v4_ace(struct posix_acl_state *state,
|
||||
}
|
||||
}
|
||||
|
||||
int nfs4_acl_nfsv4_to_posix(struct nfs4_acl *acl, struct posix_acl **pacl,
|
||||
struct posix_acl **dpacl, unsigned int flags)
|
||||
static int nfs4_acl_nfsv4_to_posix(struct nfs4_acl *acl,
|
||||
struct posix_acl **pacl, struct posix_acl **dpacl,
|
||||
unsigned int flags)
|
||||
{
|
||||
struct posix_acl_state effective_acl_state, default_acl_state;
|
||||
struct nfs4_ace *ace;
|
||||
@ -780,6 +800,57 @@ out_estate:
|
||||
return ret;
|
||||
}
|
||||
|
||||
__be32
|
||||
nfsd4_set_nfs4_acl(struct svc_rqst *rqstp, struct svc_fh *fhp,
|
||||
struct nfs4_acl *acl)
|
||||
{
|
||||
__be32 error;
|
||||
int host_error;
|
||||
struct dentry *dentry;
|
||||
struct inode *inode;
|
||||
struct posix_acl *pacl = NULL, *dpacl = NULL;
|
||||
unsigned int flags = 0;
|
||||
|
||||
/* Get inode */
|
||||
error = fh_verify(rqstp, fhp, 0, NFSD_MAY_SATTR);
|
||||
if (error)
|
||||
return error;
|
||||
|
||||
dentry = fhp->fh_dentry;
|
||||
inode = dentry->d_inode;
|
||||
|
||||
if (!inode->i_op->set_acl || !IS_POSIXACL(inode))
|
||||
return nfserr_attrnotsupp;
|
||||
|
||||
if (S_ISDIR(inode->i_mode))
|
||||
flags = NFS4_ACL_DIR;
|
||||
|
||||
host_error = nfs4_acl_nfsv4_to_posix(acl, &pacl, &dpacl, flags);
|
||||
if (host_error == -EINVAL)
|
||||
return nfserr_attrnotsupp;
|
||||
if (host_error < 0)
|
||||
goto out_nfserr;
|
||||
|
||||
host_error = inode->i_op->set_acl(inode, pacl, ACL_TYPE_ACCESS);
|
||||
if (host_error < 0)
|
||||
goto out_release;
|
||||
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
host_error = inode->i_op->set_acl(inode, dpacl,
|
||||
ACL_TYPE_DEFAULT);
|
||||
}
|
||||
|
||||
out_release:
|
||||
posix_acl_release(pacl);
|
||||
posix_acl_release(dpacl);
|
||||
out_nfserr:
|
||||
if (host_error == -EOPNOTSUPP)
|
||||
return nfserr_attrnotsupp;
|
||||
else
|
||||
return nfserrno(host_error);
|
||||
}
|
||||
|
||||
|
||||
static short
|
||||
ace2type(struct nfs4_ace *ace)
|
||||
{
|
||||
@ -798,9 +869,6 @@ ace2type(struct nfs4_ace *ace)
|
||||
return -1;
|
||||
}
|
||||
|
||||
EXPORT_SYMBOL(nfs4_acl_posix_to_nfsv4);
|
||||
EXPORT_SYMBOL(nfs4_acl_nfsv4_to_posix);
|
||||
|
||||
struct nfs4_acl *
|
||||
nfs4_acl_new(int n)
|
||||
{
|
||||
@ -862,7 +930,3 @@ nfs4_acl_write_who(int who, char *p)
|
||||
BUG();
|
||||
return -1;
|
||||
}
|
||||
|
||||
EXPORT_SYMBOL(nfs4_acl_new);
|
||||
EXPORT_SYMBOL(nfs4_acl_get_whotype);
|
||||
EXPORT_SYMBOL(nfs4_acl_write_who);
|
||||
|
@ -41,6 +41,7 @@
|
||||
#include "vfs.h"
|
||||
#include "current_stateid.h"
|
||||
#include "netns.h"
|
||||
#include "acl.h"
|
||||
|
||||
#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
|
||||
#include <linux/security.h>
|
||||
|
241
fs/nfsd/vfs.c
241
fs/nfsd/vfs.c
@ -468,158 +468,7 @@ out:
|
||||
return err;
|
||||
}
|
||||
|
||||
#if defined(CONFIG_NFSD_V2_ACL) || \
|
||||
defined(CONFIG_NFSD_V3_ACL) || \
|
||||
defined(CONFIG_NFSD_V4)
|
||||
static ssize_t nfsd_getxattr(struct dentry *dentry, char *key, void **buf)
|
||||
{
|
||||
ssize_t buflen;
|
||||
ssize_t ret;
|
||||
|
||||
buflen = vfs_getxattr(dentry, key, NULL, 0);
|
||||
if (buflen <= 0)
|
||||
return buflen;
|
||||
|
||||
*buf = kmalloc(buflen, GFP_KERNEL);
|
||||
if (!*buf)
|
||||
return -ENOMEM;
|
||||
|
||||
ret = vfs_getxattr(dentry, key, *buf, buflen);
|
||||
if (ret < 0)
|
||||
kfree(*buf);
|
||||
return ret;
|
||||
}
|
||||
#endif
|
||||
|
||||
#if defined(CONFIG_NFSD_V4)
|
||||
static int
|
||||
set_nfsv4_acl_one(struct dentry *dentry, struct posix_acl *pacl, char *key)
|
||||
{
|
||||
int len;
|
||||
size_t buflen;
|
||||
char *buf = NULL;
|
||||
int error = 0;
|
||||
|
||||
buflen = posix_acl_xattr_size(pacl->a_count);
|
||||
buf = kmalloc(buflen, GFP_KERNEL);
|
||||
error = -ENOMEM;
|
||||
if (buf == NULL)
|
||||
goto out;
|
||||
|
||||
len = posix_acl_to_xattr(&init_user_ns, pacl, buf, buflen);
|
||||
if (len < 0) {
|
||||
error = len;
|
||||
goto out;
|
||||
}
|
||||
|
||||
error = vfs_setxattr(dentry, key, buf, len, 0);
|
||||
out:
|
||||
kfree(buf);
|
||||
return error;
|
||||
}
|
||||
|
||||
__be32
|
||||
nfsd4_set_nfs4_acl(struct svc_rqst *rqstp, struct svc_fh *fhp,
|
||||
struct nfs4_acl *acl)
|
||||
{
|
||||
__be32 error;
|
||||
int host_error;
|
||||
struct dentry *dentry;
|
||||
struct inode *inode;
|
||||
struct posix_acl *pacl = NULL, *dpacl = NULL;
|
||||
unsigned int flags = 0;
|
||||
|
||||
/* Get inode */
|
||||
error = fh_verify(rqstp, fhp, 0, NFSD_MAY_SATTR);
|
||||
if (error)
|
||||
return error;
|
||||
|
||||
dentry = fhp->fh_dentry;
|
||||
inode = dentry->d_inode;
|
||||
if (S_ISDIR(inode->i_mode))
|
||||
flags = NFS4_ACL_DIR;
|
||||
|
||||
host_error = nfs4_acl_nfsv4_to_posix(acl, &pacl, &dpacl, flags);
|
||||
if (host_error == -EINVAL) {
|
||||
return nfserr_attrnotsupp;
|
||||
} else if (host_error < 0)
|
||||
goto out_nfserr;
|
||||
|
||||
host_error = set_nfsv4_acl_one(dentry, pacl, POSIX_ACL_XATTR_ACCESS);
|
||||
if (host_error < 0)
|
||||
goto out_release;
|
||||
|
||||
if (S_ISDIR(inode->i_mode))
|
||||
host_error = set_nfsv4_acl_one(dentry, dpacl, POSIX_ACL_XATTR_DEFAULT);
|
||||
|
||||
out_release:
|
||||
posix_acl_release(pacl);
|
||||
posix_acl_release(dpacl);
|
||||
out_nfserr:
|
||||
if (host_error == -EOPNOTSUPP)
|
||||
return nfserr_attrnotsupp;
|
||||
else
|
||||
return nfserrno(host_error);
|
||||
}
|
||||
|
||||
static struct posix_acl *
|
||||
_get_posix_acl(struct dentry *dentry, char *key)
|
||||
{
|
||||
void *buf = NULL;
|
||||
struct posix_acl *pacl = NULL;
|
||||
int buflen;
|
||||
|
||||
buflen = nfsd_getxattr(dentry, key, &buf);
|
||||
if (!buflen)
|
||||
buflen = -ENODATA;
|
||||
if (buflen <= 0)
|
||||
return ERR_PTR(buflen);
|
||||
|
||||
pacl = posix_acl_from_xattr(&init_user_ns, buf, buflen);
|
||||
kfree(buf);
|
||||
return pacl;
|
||||
}
|
||||
|
||||
int
|
||||
nfsd4_get_nfs4_acl(struct svc_rqst *rqstp, struct dentry *dentry, struct nfs4_acl **acl)
|
||||
{
|
||||
struct inode *inode = dentry->d_inode;
|
||||
int error = 0;
|
||||
struct posix_acl *pacl = NULL, *dpacl = NULL;
|
||||
unsigned int flags = 0;
|
||||
|
||||
pacl = _get_posix_acl(dentry, POSIX_ACL_XATTR_ACCESS);
|
||||
if (IS_ERR(pacl) && PTR_ERR(pacl) == -ENODATA)
|
||||
pacl = posix_acl_from_mode(inode->i_mode, GFP_KERNEL);
|
||||
if (IS_ERR(pacl)) {
|
||||
error = PTR_ERR(pacl);
|
||||
pacl = NULL;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (S_ISDIR(inode->i_mode)) {
|
||||
dpacl = _get_posix_acl(dentry, POSIX_ACL_XATTR_DEFAULT);
|
||||
if (IS_ERR(dpacl) && PTR_ERR(dpacl) == -ENODATA)
|
||||
dpacl = NULL;
|
||||
else if (IS_ERR(dpacl)) {
|
||||
error = PTR_ERR(dpacl);
|
||||
dpacl = NULL;
|
||||
goto out;
|
||||
}
|
||||
flags = NFS4_ACL_DIR;
|
||||
}
|
||||
|
||||
*acl = nfs4_acl_posix_to_nfsv4(pacl, dpacl, flags);
|
||||
if (IS_ERR(*acl)) {
|
||||
error = PTR_ERR(*acl);
|
||||
*acl = NULL;
|
||||
}
|
||||
out:
|
||||
posix_acl_release(pacl);
|
||||
posix_acl_release(dpacl);
|
||||
return error;
|
||||
}
|
||||
|
||||
/*
|
||||
* NFS junction information is stored in an extended attribute.
|
||||
*/
|
||||
@ -2284,93 +2133,3 @@ out_nomem:
|
||||
nfsd_racache_shutdown();
|
||||
return -ENOMEM;
|
||||
}
|
||||
|
||||
#if defined(CONFIG_NFSD_V2_ACL) || defined(CONFIG_NFSD_V3_ACL)
|
||||
struct posix_acl *
|
||||
nfsd_get_posix_acl(struct svc_fh *fhp, int type)
|
||||
{
|
||||
struct inode *inode = fhp->fh_dentry->d_inode;
|
||||
char *name;
|
||||
void *value = NULL;
|
||||
ssize_t size;
|
||||
struct posix_acl *acl;
|
||||
|
||||
if (!IS_POSIXACL(inode))
|
||||
return ERR_PTR(-EOPNOTSUPP);
|
||||
|
||||
switch (type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
name = POSIX_ACL_XATTR_ACCESS;
|
||||
break;
|
||||
case ACL_TYPE_DEFAULT:
|
||||
name = POSIX_ACL_XATTR_DEFAULT;
|
||||
break;
|
||||
default:
|
||||
return ERR_PTR(-EOPNOTSUPP);
|
||||
}
|
||||
|
||||
size = nfsd_getxattr(fhp->fh_dentry, name, &value);
|
||||
if (size < 0)
|
||||
return ERR_PTR(size);
|
||||
|
||||
acl = posix_acl_from_xattr(&init_user_ns, value, size);
|
||||
kfree(value);
|
||||
return acl;
|
||||
}
|
||||
|
||||
int
|
||||
nfsd_set_posix_acl(struct svc_fh *fhp, int type, struct posix_acl *acl)
|
||||
{
|
||||
struct inode *inode = fhp->fh_dentry->d_inode;
|
||||
char *name;
|
||||
void *value = NULL;
|
||||
size_t size;
|
||||
int error;
|
||||
|
||||
if (!IS_POSIXACL(inode) ||
|
||||
!inode->i_op->setxattr || !inode->i_op->removexattr)
|
||||
return -EOPNOTSUPP;
|
||||
switch(type) {
|
||||
case ACL_TYPE_ACCESS:
|
||||
name = POSIX_ACL_XATTR_ACCESS;
|
||||
break;
|
||||
case ACL_TYPE_DEFAULT:
|
||||
name = POSIX_ACL_XATTR_DEFAULT;
|
||||
break;
|
||||
default:
|
||||
return -EOPNOTSUPP;
|
||||
}
|
||||
|
||||
if (acl && acl->a_count) {
|
||||
size = posix_acl_xattr_size(acl->a_count);
|
||||
value = kmalloc(size, GFP_KERNEL);
|
||||
if (!value)
|
||||
return -ENOMEM;
|
||||
error = posix_acl_to_xattr(&init_user_ns, acl, value, size);
|
||||
if (error < 0)
|
||||
goto getout;
|
||||
size = error;
|
||||
} else
|
||||
size = 0;
|
||||
|
||||
error = fh_want_write(fhp);
|
||||
if (error)
|
||||
goto getout;
|
||||
if (size)
|
||||
error = vfs_setxattr(fhp->fh_dentry, name, value, size, 0);
|
||||
else {
|
||||
if (!S_ISDIR(inode->i_mode) && type == ACL_TYPE_DEFAULT)
|
||||
error = 0;
|
||||
else {
|
||||
error = vfs_removexattr(fhp->fh_dentry, name);
|
||||
if (error == -ENODATA)
|
||||
error = 0;
|
||||
}
|
||||
}
|
||||
fh_drop_write(fhp);
|
||||
|
||||
getout:
|
||||
kfree(value);
|
||||
return error;
|
||||
}
|
||||
#endif /* defined(CONFIG_NFSD_V2_ACL) || defined(CONFIG_NFSD_V3_ACL) */
|
||||
|
@ -52,9 +52,6 @@ __be32 nfsd_setattr(struct svc_rqst *, struct svc_fh *,
|
||||
struct iattr *, int, time_t);
|
||||
int nfsd_mountpoint(struct dentry *, struct svc_export *);
|
||||
#ifdef CONFIG_NFSD_V4
|
||||
__be32 nfsd4_set_nfs4_acl(struct svc_rqst *, struct svc_fh *,
|
||||
struct nfs4_acl *);
|
||||
int nfsd4_get_nfs4_acl(struct svc_rqst *, struct dentry *, struct nfs4_acl **);
|
||||
__be32 nfsd4_set_nfs4_label(struct svc_rqst *, struct svc_fh *,
|
||||
struct xdr_netobj *);
|
||||
#endif /* CONFIG_NFSD_V4 */
|
||||
@ -101,11 +98,6 @@ __be32 nfsd_statfs(struct svc_rqst *, struct svc_fh *,
|
||||
__be32 nfsd_permission(struct svc_rqst *, struct svc_export *,
|
||||
struct dentry *, int);
|
||||
|
||||
#if defined(CONFIG_NFSD_V2_ACL) || defined(CONFIG_NFSD_V3_ACL)
|
||||
struct posix_acl *nfsd_get_posix_acl(struct svc_fh *, int);
|
||||
int nfsd_set_posix_acl(struct svc_fh *, int, struct posix_acl *);
|
||||
#endif
|
||||
|
||||
static inline int fh_want_write(struct svc_fh *fh)
|
||||
{
|
||||
int ret = mnt_want_write(fh->fh_export->ex_path.mnt);
|
||||
|
@ -583,7 +583,6 @@ static struct nls_table table = {
|
||||
.char2uni = char2uni,
|
||||
.charset2lower = charset2lower,
|
||||
.charset2upper = charset2upper,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int __init init_nls_macceltic(void)
|
||||
|
@ -513,7 +513,6 @@ static struct nls_table table = {
|
||||
.char2uni = char2uni,
|
||||
.charset2lower = charset2lower,
|
||||
.charset2upper = charset2upper,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int __init init_nls_maccenteuro(void)
|
||||
|
@ -583,7 +583,6 @@ static struct nls_table table = {
|
||||
.char2uni = char2uni,
|
||||
.charset2lower = charset2lower,
|
||||
.charset2upper = charset2upper,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int __init init_nls_maccroatian(void)
|
||||
|
@ -478,7 +478,6 @@ static struct nls_table table = {
|
||||
.char2uni = char2uni,
|
||||
.charset2lower = charset2lower,
|
||||
.charset2upper = charset2upper,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int __init init_nls_maccyrillic(void)
|
||||
|
@ -548,7 +548,6 @@ static struct nls_table table = {
|
||||
.char2uni = char2uni,
|
||||
.charset2lower = charset2lower,
|
||||
.charset2upper = charset2upper,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int __init init_nls_macgaelic(void)
|
||||
|
@ -478,7 +478,6 @@ static struct nls_table table = {
|
||||
.char2uni = char2uni,
|
||||
.charset2lower = charset2lower,
|
||||
.charset2upper = charset2upper,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int __init init_nls_macgreek(void)
|
||||
|
@ -583,7 +583,6 @@ static struct nls_table table = {
|
||||
.char2uni = char2uni,
|
||||
.charset2lower = charset2lower,
|
||||
.charset2upper = charset2upper,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int __init init_nls_maciceland(void)
|
||||
|
@ -513,7 +513,6 @@ static struct nls_table table = {
|
||||
.char2uni = char2uni,
|
||||
.charset2lower = charset2lower,
|
||||
.charset2upper = charset2upper,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int __init init_nls_macinuit(void)
|
||||
|
@ -618,7 +618,6 @@ static struct nls_table table = {
|
||||
.char2uni = char2uni,
|
||||
.charset2lower = charset2lower,
|
||||
.charset2upper = charset2upper,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int __init init_nls_macroman(void)
|
||||
|
@ -583,7 +583,6 @@ static struct nls_table table = {
|
||||
.char2uni = char2uni,
|
||||
.charset2lower = charset2lower,
|
||||
.charset2upper = charset2upper,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
static int __init init_nls_macromanian(void)
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user