blob: 6788b0ca85eb72dd715130b23aeb1bb08657643e [file] [log] [blame]
b.liue9582032025-04-17 19:18:16 +08001// SPDX-License-Identifier: GPL-2.0
2/*
3 * Copyright (c) 2008, Christoph Hellwig
4 * All Rights Reserved.
5 */
6#include "xfs.h"
7#include "xfs_shared.h"
8#include "xfs_format.h"
9#include "xfs_log_format.h"
10#include "xfs_trans_resv.h"
11#include "xfs_mount.h"
12#include "xfs_inode.h"
13#include "xfs_attr.h"
14#include "xfs_trace.h"
15#include "xfs_error.h"
16#include <linux/posix_acl_xattr.h>
17
18
19/*
20 * Locking scheme:
21 * - all ACL updates are protected by inode->i_mutex, which is taken before
22 * calling into this file.
23 */
24
25STATIC struct posix_acl *
26xfs_acl_from_disk(
27 struct xfs_mount *mp,
28 const struct xfs_acl *aclp,
29 int len,
30 int max_entries)
31{
32 struct posix_acl_entry *acl_e;
33 struct posix_acl *acl;
34 const struct xfs_acl_entry *ace;
35 unsigned int count, i;
36
37 if (len < sizeof(*aclp)) {
38 XFS_CORRUPTION_ERROR(__func__, XFS_ERRLEVEL_LOW, mp, aclp,
39 len);
40 return ERR_PTR(-EFSCORRUPTED);
41 }
42
43 count = be32_to_cpu(aclp->acl_cnt);
44 if (count > max_entries || XFS_ACL_SIZE(count) != len) {
45 XFS_CORRUPTION_ERROR(__func__, XFS_ERRLEVEL_LOW, mp, aclp,
46 len);
47 return ERR_PTR(-EFSCORRUPTED);
48 }
49
50 acl = posix_acl_alloc(count, GFP_KERNEL);
51 if (!acl)
52 return ERR_PTR(-ENOMEM);
53
54 for (i = 0; i < count; i++) {
55 acl_e = &acl->a_entries[i];
56 ace = &aclp->acl_entry[i];
57
58 /*
59 * The tag is 32 bits on disk and 16 bits in core.
60 *
61 * Because every access to it goes through the core
62 * format first this is not a problem.
63 */
64 acl_e->e_tag = be32_to_cpu(ace->ae_tag);
65 acl_e->e_perm = be16_to_cpu(ace->ae_perm);
66
67 switch (acl_e->e_tag) {
68 case ACL_USER:
69 acl_e->e_uid = make_kuid(&init_user_ns,
70 be32_to_cpu(ace->ae_id));
71 break;
72 case ACL_GROUP:
73 acl_e->e_gid = make_kgid(&init_user_ns,
74 be32_to_cpu(ace->ae_id));
75 break;
76 case ACL_USER_OBJ:
77 case ACL_GROUP_OBJ:
78 case ACL_MASK:
79 case ACL_OTHER:
80 break;
81 default:
82 goto fail;
83 }
84 }
85 return acl;
86
87fail:
88 posix_acl_release(acl);
89 return ERR_PTR(-EINVAL);
90}
91
92STATIC void
93xfs_acl_to_disk(struct xfs_acl *aclp, const struct posix_acl *acl)
94{
95 const struct posix_acl_entry *acl_e;
96 struct xfs_acl_entry *ace;
97 int i;
98
99 aclp->acl_cnt = cpu_to_be32(acl->a_count);
100 for (i = 0; i < acl->a_count; i++) {
101 ace = &aclp->acl_entry[i];
102 acl_e = &acl->a_entries[i];
103
104 ace->ae_tag = cpu_to_be32(acl_e->e_tag);
105 switch (acl_e->e_tag) {
106 case ACL_USER:
107 ace->ae_id = cpu_to_be32(
108 from_kuid(&init_user_ns, acl_e->e_uid));
109 break;
110 case ACL_GROUP:
111 ace->ae_id = cpu_to_be32(
112 from_kgid(&init_user_ns, acl_e->e_gid));
113 break;
114 default:
115 ace->ae_id = cpu_to_be32(ACL_UNDEFINED_ID);
116 break;
117 }
118
119 ace->ae_perm = cpu_to_be16(acl_e->e_perm);
120 }
121}
122
123struct posix_acl *
124xfs_get_acl(struct inode *inode, int type)
125{
126 struct xfs_inode *ip = XFS_I(inode);
127 struct posix_acl *acl = NULL;
128 struct xfs_acl *xfs_acl = NULL;
129 unsigned char *ea_name;
130 int error;
131 int len;
132
133 trace_xfs_get_acl(ip);
134
135 switch (type) {
136 case ACL_TYPE_ACCESS:
137 ea_name = SGI_ACL_FILE;
138 break;
139 case ACL_TYPE_DEFAULT:
140 ea_name = SGI_ACL_DEFAULT;
141 break;
142 default:
143 BUG();
144 }
145
146 /*
147 * If we have a cached ACLs value just return it, not need to
148 * go out to the disk.
149 */
150 len = XFS_ACL_MAX_SIZE(ip->i_mount);
151 error = xfs_attr_get(ip, ea_name, (unsigned char **)&xfs_acl, &len,
152 ATTR_ALLOC | ATTR_ROOT);
153 if (error) {
154 /*
155 * If the attribute doesn't exist make sure we have a negative
156 * cache entry, for any other error assume it is transient.
157 */
158 if (error != -ENOATTR)
159 acl = ERR_PTR(error);
160 } else {
161 acl = xfs_acl_from_disk(ip->i_mount, xfs_acl, len,
162 XFS_ACL_MAX_ENTRIES(ip->i_mount));
163 kmem_free(xfs_acl);
164 }
165 return acl;
166}
167
168int
169__xfs_set_acl(struct inode *inode, struct posix_acl *acl, int type)
170{
171 struct xfs_inode *ip = XFS_I(inode);
172 unsigned char *ea_name;
173 int error;
174
175 switch (type) {
176 case ACL_TYPE_ACCESS:
177 ea_name = SGI_ACL_FILE;
178 break;
179 case ACL_TYPE_DEFAULT:
180 if (!S_ISDIR(inode->i_mode))
181 return acl ? -EACCES : 0;
182 ea_name = SGI_ACL_DEFAULT;
183 break;
184 default:
185 return -EINVAL;
186 }
187
188 if (acl) {
189 struct xfs_acl *xfs_acl;
190 int len = XFS_ACL_MAX_SIZE(ip->i_mount);
191
192 xfs_acl = kmem_zalloc_large(len, 0);
193 if (!xfs_acl)
194 return -ENOMEM;
195
196 xfs_acl_to_disk(xfs_acl, acl);
197
198 /* subtract away the unused acl entries */
199 len -= sizeof(struct xfs_acl_entry) *
200 (XFS_ACL_MAX_ENTRIES(ip->i_mount) - acl->a_count);
201
202 error = xfs_attr_set(ip, ea_name, (unsigned char *)xfs_acl,
203 len, ATTR_ROOT);
204
205 kmem_free(xfs_acl);
206 } else {
207 /*
208 * A NULL ACL argument means we want to remove the ACL.
209 */
210 error = xfs_attr_remove(ip, ea_name, ATTR_ROOT);
211
212 /*
213 * If the attribute didn't exist to start with that's fine.
214 */
215 if (error == -ENOATTR)
216 error = 0;
217 }
218
219 if (!error)
220 set_cached_acl(inode, type, acl);
221 return error;
222}
223
224static int
225xfs_set_mode(struct inode *inode, umode_t mode)
226{
227 int error = 0;
228
229 if (mode != inode->i_mode) {
230 struct iattr iattr;
231
232 iattr.ia_valid = ATTR_MODE | ATTR_CTIME;
233 iattr.ia_mode = mode;
234 iattr.ia_ctime = current_time(inode);
235
236 error = xfs_setattr_nonsize(XFS_I(inode), &iattr, XFS_ATTR_NOACL);
237 }
238
239 return error;
240}
241
242int
243xfs_set_acl(struct inode *inode, struct posix_acl *acl, int type)
244{
245 umode_t mode;
246 bool set_mode = false;
247 int error = 0;
248
249 if (!acl)
250 goto set_acl;
251
252 error = -E2BIG;
253 if (acl->a_count > XFS_ACL_MAX_ENTRIES(XFS_M(inode->i_sb)))
254 return error;
255
256 if (type == ACL_TYPE_ACCESS) {
257 error = posix_acl_update_mode(inode, &mode, &acl);
258 if (error)
259 return error;
260 set_mode = true;
261 }
262
263 set_acl:
264 error = __xfs_set_acl(inode, acl, type);
265 if (error)
266 return error;
267
268 /*
269 * We set the mode after successfully updating the ACL xattr because the
270 * xattr update can fail at ENOSPC and we don't want to change the mode
271 * if the ACL update hasn't been applied.
272 */
273 if (set_mode)
274 error = xfs_set_mode(inode, mode);
275
276 return error;
277}