aboutsummaryrefslogtreecommitdiffstats
path: root/fs/cifs/cifsacl.c
diff options
context:
space:
mode:
authorChristoph Hellwig <hch@infradead.org>2009-05-27 09:37:33 -0400
committerSteve French <sfrench@us.ibm.com>2009-05-28 13:08:02 -0400
commit1bf4072da67c14d6b02cfeef02212aa5a6211df2 (patch)
tree610f12379929abda22be85fda824efc55626f60b /fs/cifs/cifsacl.c
parentc5077ec42303e07c2c685b0f6cb8eee0f2c7751c (diff)
cifs: reorganize get_cifs_acl
Thus spake Christoph: "But this whole set_cifs_acl function is a real mess anyway and needs some splitting up." With this change too, it's possible to call acl_to_uid_mode() with a NULL inode pointer. That (or something close to it) will eventually be necessary when cifs_get_inode_info is reorganized. Signed-off-by: Christoph Hellwig <hch@lst.de> Reviewed-by: Shirish Pargaonkar <shirishp@us.ibm.com> Signed-off-by: Jeff Layton <jlayton@redhat.com> Signed-off-by: Steve French <sfrench@us.ibm.com>
Diffstat (limited to 'fs/cifs/cifsacl.c')
-rw-r--r--fs/cifs/cifsacl.c100
1 files changed, 52 insertions, 48 deletions
diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c
index 57ecdc83c26f..7f8e6c46d116 100644
--- a/fs/cifs/cifsacl.c
+++ b/fs/cifs/cifsacl.c
@@ -552,67 +552,66 @@ static int build_sec_desc(struct cifs_ntsd *pntsd, struct cifs_ntsd *pnntsd,
552 return rc; 552 return rc;
553} 553}
554 554
555 555static struct cifs_ntsd *get_cifs_acl_by_fid(struct cifs_sb_info *cifs_sb,
556/* Retrieve an ACL from the server */ 556 __u16 fid, u32 *pacllen)
557static struct cifs_ntsd *get_cifs_acl(u32 *pacllen, struct inode *inode,
558 const char *path, const __u16 *pfid)
559{ 557{
560 struct cifsFileInfo *open_file = NULL;
561 bool unlock_file = false;
562 int xid;
563 int rc = -EIO;
564 __u16 fid;
565 struct super_block *sb;
566 struct cifs_sb_info *cifs_sb;
567 struct cifs_ntsd *pntsd = NULL; 558 struct cifs_ntsd *pntsd = NULL;
559 int xid, rc;
568 560
569 cFYI(1, ("get mode from ACL for %s", path)); 561 xid = GetXid();
562 rc = CIFSSMBGetCIFSACL(xid, cifs_sb->tcon, fid, &pntsd, pacllen);
563 FreeXid(xid);
570 564
571 if (inode == NULL)
572 return NULL;
573 565
574 xid = GetXid(); 566 cFYI(1, ("GetCIFSACL rc = %d ACL len %d", rc, *pacllen));
575 if (pfid == NULL) 567 return pntsd;
576 open_file = find_readable_file(CIFS_I(inode)); 568}
577 else
578 fid = *pfid;
579 569
580 sb = inode->i_sb; 570static struct cifs_ntsd *get_cifs_acl_by_path(struct cifs_sb_info *cifs_sb,
581 if (sb == NULL) { 571 const char *path, u32 *pacllen)
582 FreeXid(xid); 572{
583 return NULL; 573 struct cifs_ntsd *pntsd = NULL;
584 } 574 int oplock = 0;
585 cifs_sb = CIFS_SB(sb); 575 int xid, rc;
576 __u16 fid;
586 577
587 if (open_file) { 578 xid = GetXid();
588 unlock_file = true; 579
589 fid = open_file->netfid; 580 rc = CIFSSMBOpen(xid, cifs_sb->tcon, path, FILE_OPEN, READ_CONTROL, 0,
590 } else if (pfid == NULL) { 581 &fid, &oplock, NULL, cifs_sb->local_nls,
591 int oplock = 0; 582 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
592 /* open file */ 583 if (rc) {
593 rc = CIFSSMBOpen(xid, cifs_sb->tcon, path, FILE_OPEN, 584 cERROR(1, ("Unable to open file to get ACL"));
594 READ_CONTROL, 0, &fid, &oplock, NULL, 585 goto out;
595 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
596 CIFS_MOUNT_MAP_SPECIAL_CHR);
597 if (rc != 0) {
598 cERROR(1, ("Unable to open file to get ACL"));
599 FreeXid(xid);
600 return NULL;
601 }
602 } 586 }
603 587
604 rc = CIFSSMBGetCIFSACL(xid, cifs_sb->tcon, fid, &pntsd, pacllen); 588 rc = CIFSSMBGetCIFSACL(xid, cifs_sb->tcon, fid, &pntsd, pacllen);
605 cFYI(1, ("GetCIFSACL rc = %d ACL len %d", rc, *pacllen)); 589 cFYI(1, ("GetCIFSACL rc = %d ACL len %d", rc, *pacllen));
606 if (unlock_file == true) /* find_readable_file increments ref count */
607 atomic_dec(&open_file->wrtPending);
608 else if (pfid == NULL) /* if opened above we have to close the handle */
609 CIFSSMBClose(xid, cifs_sb->tcon, fid);
610 /* else handle was passed in by caller */
611 590
591 CIFSSMBClose(xid, cifs_sb->tcon, fid);
592 out:
612 FreeXid(xid); 593 FreeXid(xid);
613 return pntsd; 594 return pntsd;
614} 595}
615 596
597/* Retrieve an ACL from the server */
598static struct cifs_ntsd *get_cifs_acl(struct cifs_sb_info *cifs_sb,
599 struct inode *inode, const char *path,
600 u32 *pacllen)
601{
602 struct cifs_ntsd *pntsd = NULL;
603 struct cifsFileInfo *open_file = NULL;
604
605 if (inode)
606 open_file = find_readable_file(CIFS_I(inode));
607 if (!open_file)
608 return get_cifs_acl_by_path(cifs_sb, path, pacllen);
609
610 pntsd = get_cifs_acl_by_fid(cifs_sb, open_file->netfid, pacllen);
611 atomic_dec(&open_file->wrtPending);
612 return pntsd;
613}
614
616/* Set an ACL on the server */ 615/* Set an ACL on the server */
617static int set_cifs_acl(struct cifs_ntsd *pnntsd, __u32 acllen, 616static int set_cifs_acl(struct cifs_ntsd *pnntsd, __u32 acllen,
618 struct inode *inode, const char *path) 617 struct inode *inode, const char *path)
@@ -668,14 +667,19 @@ static int set_cifs_acl(struct cifs_ntsd *pnntsd, __u32 acllen,
668} 667}
669 668
670/* Translate the CIFS ACL (simlar to NTFS ACL) for a file into mode bits */ 669/* Translate the CIFS ACL (simlar to NTFS ACL) for a file into mode bits */
671void acl_to_uid_mode(struct inode *inode, const char *path, const __u16 *pfid) 670void acl_to_uid_mode(struct cifs_sb_info *cifs_sb, struct inode *inode,
671 const char *path, const __u16 *pfid)
672{ 672{
673 struct cifs_ntsd *pntsd = NULL; 673 struct cifs_ntsd *pntsd = NULL;
674 u32 acllen = 0; 674 u32 acllen = 0;
675 int rc = 0; 675 int rc = 0;
676 676
677 cFYI(DBG2, ("converting ACL to mode for %s", path)); 677 cFYI(DBG2, ("converting ACL to mode for %s", path));
678 pntsd = get_cifs_acl(&acllen, inode, path, pfid); 678
679 if (pfid)
680 pntsd = get_cifs_acl_by_fid(cifs_sb, *pfid, &acllen);
681 else
682 pntsd = get_cifs_acl(cifs_sb, inode, path, &acllen);
679 683
680 /* if we can retrieve the ACL, now parse Access Control Entries, ACEs */ 684 /* if we can retrieve the ACL, now parse Access Control Entries, ACEs */
681 if (pntsd) 685 if (pntsd)
@@ -698,7 +702,7 @@ int mode_to_acl(struct inode *inode, const char *path, __u64 nmode)
698 cFYI(DBG2, ("set ACL from mode for %s", path)); 702 cFYI(DBG2, ("set ACL from mode for %s", path));
699 703
700 /* Get the security descriptor */ 704 /* Get the security descriptor */
701 pntsd = get_cifs_acl(&secdesclen, inode, path, NULL); 705 pntsd = get_cifs_acl(CIFS_SB(inode->i_sb), inode, path, &secdesclen);
702 706
703 /* Add three ACEs for owner, group, everyone getting rid of 707 /* Add three ACEs for owner, group, everyone getting rid of
704 other ACEs as chmod disables ACEs and set the security descriptor */ 708 other ACEs as chmod disables ACEs and set the security descriptor */