diff options
Diffstat (limited to 'fs/nfsd/nfs4acl.c')
-rw-r--r-- | fs/nfsd/nfs4acl.c | 711 |
1 files changed, 314 insertions, 397 deletions
diff --git a/fs/nfsd/nfs4acl.c b/fs/nfsd/nfs4acl.c index edb107e61b91..5d94555cdc83 100644 --- a/fs/nfsd/nfs4acl.c +++ b/fs/nfsd/nfs4acl.c | |||
@@ -63,6 +63,8 @@ | |||
63 | #define NFS4_INHERITANCE_FLAGS (NFS4_ACE_FILE_INHERIT_ACE \ | 63 | #define NFS4_INHERITANCE_FLAGS (NFS4_ACE_FILE_INHERIT_ACE \ |
64 | | NFS4_ACE_DIRECTORY_INHERIT_ACE | NFS4_ACE_INHERIT_ONLY_ACE) | 64 | | NFS4_ACE_DIRECTORY_INHERIT_ACE | NFS4_ACE_INHERIT_ONLY_ACE) |
65 | 65 | ||
66 | #define NFS4_SUPPORTED_FLAGS (NFS4_INHERITANCE_FLAGS | NFS4_ACE_IDENTIFIER_GROUP) | ||
67 | |||
66 | #define MASK_EQUAL(mask1, mask2) \ | 68 | #define MASK_EQUAL(mask1, mask2) \ |
67 | ( ((mask1) & NFS4_ACE_MASK_ALL) == ((mask2) & NFS4_ACE_MASK_ALL) ) | 69 | ( ((mask1) & NFS4_ACE_MASK_ALL) == ((mask2) & NFS4_ACE_MASK_ALL) ) |
68 | 70 | ||
@@ -96,24 +98,26 @@ deny_mask(u32 allow_mask, unsigned int flags) | |||
96 | /* XXX: modify functions to return NFS errors; they're only ever | 98 | /* XXX: modify functions to return NFS errors; they're only ever |
97 | * used by nfs code, after all.... */ | 99 | * used by nfs code, after all.... */ |
98 | 100 | ||
99 | static int | 101 | /* We only map from NFSv4 to POSIX ACLs when setting ACLs, when we err on the |
100 | mode_from_nfs4(u32 perm, unsigned short *mode, unsigned int flags) | 102 | * side of being more restrictive, so the mode bit mapping below is |
103 | * pessimistic. An optimistic version would be needed to handle DENY's, | ||
104 | * but we espect to coalesce all ALLOWs and DENYs before mapping to mode | ||
105 | * bits. */ | ||
106 | |||
107 | static void | ||
108 | low_mode_from_nfs4(u32 perm, unsigned short *mode, unsigned int flags) | ||
101 | { | 109 | { |
102 | u32 ignore = 0; | 110 | u32 write_mode = NFS4_WRITE_MODE; |
103 | 111 | ||
104 | if (!(flags & NFS4_ACL_DIR)) | 112 | if (flags & NFS4_ACL_DIR) |
105 | ignore |= NFS4_ACE_DELETE_CHILD; /* ignore it */ | 113 | write_mode |= NFS4_ACE_DELETE_CHILD; |
106 | perm |= ignore; | ||
107 | *mode = 0; | 114 | *mode = 0; |
108 | if ((perm & NFS4_READ_MODE) == NFS4_READ_MODE) | 115 | if ((perm & NFS4_READ_MODE) == NFS4_READ_MODE) |
109 | *mode |= ACL_READ; | 116 | *mode |= ACL_READ; |
110 | if ((perm & NFS4_WRITE_MODE) == NFS4_WRITE_MODE) | 117 | if ((perm & write_mode) == write_mode) |
111 | *mode |= ACL_WRITE; | 118 | *mode |= ACL_WRITE; |
112 | if ((perm & NFS4_EXECUTE_MODE) == NFS4_EXECUTE_MODE) | 119 | if ((perm & NFS4_EXECUTE_MODE) == NFS4_EXECUTE_MODE) |
113 | *mode |= ACL_EXECUTE; | 120 | *mode |= ACL_EXECUTE; |
114 | if (!MASK_EQUAL(perm, ignore|mask_from_posix(*mode, flags))) | ||
115 | return -EINVAL; | ||
116 | return 0; | ||
117 | } | 121 | } |
118 | 122 | ||
119 | struct ace_container { | 123 | struct ace_container { |
@@ -338,38 +342,6 @@ sort_pacl(struct posix_acl *pacl) | |||
338 | return; | 342 | return; |
339 | } | 343 | } |
340 | 344 | ||
341 | static int | ||
342 | write_pace(struct nfs4_ace *ace, struct posix_acl *pacl, | ||
343 | struct posix_acl_entry **pace, short tag, unsigned int flags) | ||
344 | { | ||
345 | struct posix_acl_entry *this = *pace; | ||
346 | |||
347 | if (*pace == pacl->a_entries + pacl->a_count) | ||
348 | return -EINVAL; /* fell off the end */ | ||
349 | (*pace)++; | ||
350 | this->e_tag = tag; | ||
351 | if (tag == ACL_USER_OBJ) | ||
352 | flags |= NFS4_ACL_OWNER; | ||
353 | if (mode_from_nfs4(ace->access_mask, &this->e_perm, flags)) | ||
354 | return -EINVAL; | ||
355 | this->e_id = (tag == ACL_USER || tag == ACL_GROUP ? | ||
356 | ace->who : ACL_UNDEFINED_ID); | ||
357 | return 0; | ||
358 | } | ||
359 | |||
360 | static struct nfs4_ace * | ||
361 | get_next_v4_ace(struct list_head **p, struct list_head *head) | ||
362 | { | ||
363 | struct nfs4_ace *ace; | ||
364 | |||
365 | *p = (*p)->next; | ||
366 | if (*p == head) | ||
367 | return NULL; | ||
368 | ace = list_entry(*p, struct nfs4_ace, l_ace); | ||
369 | |||
370 | return ace; | ||
371 | } | ||
372 | |||
373 | int | 345 | int |
374 | nfs4_acl_nfsv4_to_posix(struct nfs4_acl *acl, struct posix_acl **pacl, | 346 | nfs4_acl_nfsv4_to_posix(struct nfs4_acl *acl, struct posix_acl **pacl, |
375 | struct posix_acl **dpacl, unsigned int flags) | 347 | struct posix_acl **dpacl, unsigned int flags) |
@@ -385,42 +357,23 @@ nfs4_acl_nfsv4_to_posix(struct nfs4_acl *acl, struct posix_acl **pacl, | |||
385 | goto out; | 357 | goto out; |
386 | 358 | ||
387 | error = nfs4_acl_split(acl, dacl); | 359 | error = nfs4_acl_split(acl, dacl); |
388 | if (error < 0) | 360 | if (error) |
389 | goto out_acl; | 361 | goto out_acl; |
390 | 362 | ||
391 | if (pacl != NULL) { | 363 | *pacl = _nfsv4_to_posix_one(acl, flags); |
392 | if (acl->naces == 0) { | 364 | if (IS_ERR(*pacl)) { |
393 | error = -ENODATA; | 365 | error = PTR_ERR(*pacl); |
394 | goto try_dpacl; | 366 | *pacl = NULL; |
395 | } | 367 | goto out_acl; |
396 | |||
397 | *pacl = _nfsv4_to_posix_one(acl, flags); | ||
398 | if (IS_ERR(*pacl)) { | ||
399 | error = PTR_ERR(*pacl); | ||
400 | *pacl = NULL; | ||
401 | goto out_acl; | ||
402 | } | ||
403 | } | 368 | } |
404 | 369 | ||
405 | try_dpacl: | 370 | *dpacl = _nfsv4_to_posix_one(dacl, flags); |
406 | if (dpacl != NULL) { | 371 | if (IS_ERR(*dpacl)) { |
407 | if (dacl->naces == 0) { | 372 | error = PTR_ERR(*dpacl); |
408 | if (pacl == NULL || *pacl == NULL) | 373 | *dpacl = NULL; |
409 | error = -ENODATA; | ||
410 | goto out_acl; | ||
411 | } | ||
412 | |||
413 | error = 0; | ||
414 | *dpacl = _nfsv4_to_posix_one(dacl, flags); | ||
415 | if (IS_ERR(*dpacl)) { | ||
416 | error = PTR_ERR(*dpacl); | ||
417 | *dpacl = NULL; | ||
418 | goto out_acl; | ||
419 | } | ||
420 | } | 374 | } |
421 | |||
422 | out_acl: | 375 | out_acl: |
423 | if (error && pacl) { | 376 | if (error) { |
424 | posix_acl_release(*pacl); | 377 | posix_acl_release(*pacl); |
425 | *pacl = NULL; | 378 | *pacl = NULL; |
426 | } | 379 | } |
@@ -429,349 +382,311 @@ out: | |||
429 | return error; | 382 | return error; |
430 | } | 383 | } |
431 | 384 | ||
385 | /* | ||
386 | * While processing the NFSv4 ACE, this maintains bitmasks representing | ||
387 | * which permission bits have been allowed and which denied to a given | ||
388 | * entity: */ | ||
389 | struct posix_ace_state { | ||
390 | u32 allow; | ||
391 | u32 deny; | ||
392 | }; | ||
393 | |||
394 | struct posix_user_ace_state { | ||
395 | uid_t uid; | ||
396 | struct posix_ace_state perms; | ||
397 | }; | ||
398 | |||
399 | struct posix_ace_state_array { | ||
400 | int n; | ||
401 | struct posix_user_ace_state aces[]; | ||
402 | }; | ||
403 | |||
404 | /* | ||
405 | * While processing the NFSv4 ACE, this maintains the partial permissions | ||
406 | * calculated so far: */ | ||
407 | |||
408 | struct posix_acl_state { | ||
409 | struct posix_ace_state owner; | ||
410 | struct posix_ace_state group; | ||
411 | struct posix_ace_state other; | ||
412 | struct posix_ace_state everyone; | ||
413 | struct posix_ace_state mask; /* Deny unused in this case */ | ||
414 | struct posix_ace_state_array *users; | ||
415 | struct posix_ace_state_array *groups; | ||
416 | }; | ||
417 | |||
432 | static int | 418 | static int |
433 | same_who(struct nfs4_ace *a, struct nfs4_ace *b) | 419 | init_state(struct posix_acl_state *state, int cnt) |
434 | { | 420 | { |
435 | return a->whotype == b->whotype && | 421 | int alloc; |
436 | (a->whotype != NFS4_ACL_WHO_NAMED || a->who == b->who); | 422 | |
423 | memset(state, 0, sizeof(struct posix_acl_state)); | ||
424 | /* | ||
425 | * In the worst case, each individual acl could be for a distinct | ||
426 | * named user or group, but we don't no which, so we allocate | ||
427 | * enough space for either: | ||
428 | */ | ||
429 | alloc = sizeof(struct posix_ace_state_array) | ||
430 | + cnt*sizeof(struct posix_ace_state); | ||
431 | state->users = kzalloc(alloc, GFP_KERNEL); | ||
432 | if (!state->users) | ||
433 | return -ENOMEM; | ||
434 | state->groups = kzalloc(alloc, GFP_KERNEL); | ||
435 | if (!state->groups) { | ||
436 | kfree(state->users); | ||
437 | return -ENOMEM; | ||
438 | } | ||
439 | return 0; | ||
437 | } | 440 | } |
438 | 441 | ||
439 | static int | 442 | static void |
440 | complementary_ace_pair(struct nfs4_ace *allow, struct nfs4_ace *deny, | 443 | free_state(struct posix_acl_state *state) { |
441 | unsigned int flags) | 444 | kfree(state->users); |
442 | { | 445 | kfree(state->groups); |
443 | int ignore = 0; | ||
444 | if (!(flags & NFS4_ACL_DIR)) | ||
445 | ignore |= NFS4_ACE_DELETE_CHILD; | ||
446 | return MASK_EQUAL(ignore|deny_mask(allow->access_mask, flags), | ||
447 | ignore|deny->access_mask) && | ||
448 | allow->type == NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE && | ||
449 | deny->type == NFS4_ACE_ACCESS_DENIED_ACE_TYPE && | ||
450 | allow->flag == deny->flag && | ||
451 | same_who(allow, deny); | ||
452 | } | 446 | } |
453 | 447 | ||
454 | static inline int | 448 | static inline void add_to_mask(struct posix_acl_state *state, struct posix_ace_state *astate) |
455 | user_obj_from_v4(struct nfs4_acl *n4acl, struct list_head **p, | ||
456 | struct posix_acl *pacl, struct posix_acl_entry **pace, | ||
457 | unsigned int flags) | ||
458 | { | 449 | { |
459 | int error = -EINVAL; | 450 | state->mask.allow |= astate->allow; |
460 | struct nfs4_ace *ace, *ace2; | ||
461 | |||
462 | ace = get_next_v4_ace(p, &n4acl->ace_head); | ||
463 | if (ace == NULL) | ||
464 | goto out; | ||
465 | if (ace2type(ace) != ACL_USER_OBJ) | ||
466 | goto out; | ||
467 | error = write_pace(ace, pacl, pace, ACL_USER_OBJ, flags); | ||
468 | if (error < 0) | ||
469 | goto out; | ||
470 | error = -EINVAL; | ||
471 | ace2 = get_next_v4_ace(p, &n4acl->ace_head); | ||
472 | if (ace2 == NULL) | ||
473 | goto out; | ||
474 | if (!complementary_ace_pair(ace, ace2, flags)) | ||
475 | goto out; | ||
476 | error = 0; | ||
477 | out: | ||
478 | return error; | ||
479 | } | 451 | } |
480 | 452 | ||
481 | static inline int | 453 | /* |
482 | users_from_v4(struct nfs4_acl *n4acl, struct list_head **p, | 454 | * Certain bits (SYNCHRONIZE, DELETE, WRITE_OWNER, READ/WRITE_NAMED_ATTRS, |
483 | struct nfs4_ace **mask_ace, | 455 | * READ_ATTRIBUTES, READ_ACL) are currently unenforceable and don't translate |
484 | struct posix_acl *pacl, struct posix_acl_entry **pace, | 456 | * to traditional read/write/execute permissions. |
485 | unsigned int flags) | 457 | * |
486 | { | 458 | * It's problematic to reject acls that use certain mode bits, because it |
487 | int error = -EINVAL; | 459 | * places the burden on users to learn the rules about which bits one |
488 | struct nfs4_ace *ace, *ace2; | 460 | * particular server sets, without giving the user a lot of help--we return an |
461 | * error that could mean any number of different things. To make matters | ||
462 | * worse, the problematic bits might be introduced by some application that's | ||
463 | * automatically mapping from some other acl model. | ||
464 | * | ||
465 | * So wherever possible we accept anything, possibly erring on the side of | ||
466 | * denying more permissions than necessary. | ||
467 | * | ||
468 | * However we do reject *explicit* DENY's of a few bits representing | ||
469 | * permissions we could never deny: | ||
470 | */ | ||
489 | 471 | ||
490 | ace = get_next_v4_ace(p, &n4acl->ace_head); | 472 | static inline int check_deny(u32 mask, int isowner) |
491 | if (ace == NULL) | 473 | { |
492 | goto out; | 474 | if (mask & (NFS4_ACE_READ_ATTRIBUTES | NFS4_ACE_READ_ACL)) |
493 | while (ace2type(ace) == ACL_USER) { | 475 | return -EINVAL; |
494 | if (ace->type != NFS4_ACE_ACCESS_DENIED_ACE_TYPE) | 476 | if (!isowner) |
495 | goto out; | 477 | return 0; |
496 | if (*mask_ace && | 478 | if (mask & (NFS4_ACE_WRITE_ATTRIBUTES | NFS4_ACE_WRITE_ACL)) |
497 | !MASK_EQUAL(ace->access_mask, (*mask_ace)->access_mask)) | 479 | return -EINVAL; |
498 | goto out; | 480 | return 0; |
499 | *mask_ace = ace; | ||
500 | ace = get_next_v4_ace(p, &n4acl->ace_head); | ||
501 | if (ace == NULL) | ||
502 | goto out; | ||
503 | if (ace->type != NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) | ||
504 | goto out; | ||
505 | error = write_pace(ace, pacl, pace, ACL_USER, flags); | ||
506 | if (error < 0) | ||
507 | goto out; | ||
508 | error = -EINVAL; | ||
509 | ace2 = get_next_v4_ace(p, &n4acl->ace_head); | ||
510 | if (ace2 == NULL) | ||
511 | goto out; | ||
512 | if (!complementary_ace_pair(ace, ace2, flags)) | ||
513 | goto out; | ||
514 | if ((*mask_ace)->flag != ace2->flag || | ||
515 | !same_who(*mask_ace, ace2)) | ||
516 | goto out; | ||
517 | ace = get_next_v4_ace(p, &n4acl->ace_head); | ||
518 | if (ace == NULL) | ||
519 | goto out; | ||
520 | } | ||
521 | error = 0; | ||
522 | out: | ||
523 | return error; | ||
524 | } | 481 | } |
525 | 482 | ||
526 | static inline int | 483 | static struct posix_acl * |
527 | group_obj_and_groups_from_v4(struct nfs4_acl *n4acl, struct list_head **p, | 484 | posix_state_to_acl(struct posix_acl_state *state, unsigned int flags) |
528 | struct nfs4_ace **mask_ace, | ||
529 | struct posix_acl *pacl, struct posix_acl_entry **pace, | ||
530 | unsigned int flags) | ||
531 | { | 485 | { |
532 | int error = -EINVAL; | 486 | struct posix_acl_entry *pace; |
533 | struct nfs4_ace *ace, *ace2; | 487 | struct posix_acl *pacl; |
534 | struct ace_container *ac; | 488 | int nace; |
535 | struct list_head group_l; | 489 | int i, error = 0; |
536 | |||
537 | INIT_LIST_HEAD(&group_l); | ||
538 | ace = list_entry(*p, struct nfs4_ace, l_ace); | ||
539 | |||
540 | /* group owner (mask and allow aces) */ | ||
541 | 490 | ||
542 | if (pacl->a_count != 3) { | 491 | nace = 4 + state->users->n + state->groups->n; |
543 | /* then the group owner should be preceded by mask */ | 492 | pacl = posix_acl_alloc(nace, GFP_KERNEL); |
544 | if (ace->type != NFS4_ACE_ACCESS_DENIED_ACE_TYPE) | 493 | if (!pacl) |
545 | goto out; | 494 | return ERR_PTR(-ENOMEM); |
546 | if (*mask_ace && | ||
547 | !MASK_EQUAL(ace->access_mask, (*mask_ace)->access_mask)) | ||
548 | goto out; | ||
549 | *mask_ace = ace; | ||
550 | ace = get_next_v4_ace(p, &n4acl->ace_head); | ||
551 | if (ace == NULL) | ||
552 | goto out; | ||
553 | 495 | ||
554 | if ((*mask_ace)->flag != ace->flag || !same_who(*mask_ace, ace)) | 496 | pace = pacl->a_entries; |
555 | goto out; | 497 | pace->e_tag = ACL_USER_OBJ; |
498 | error = check_deny(state->owner.deny, 1); | ||
499 | if (error) | ||
500 | goto out_err; | ||
501 | low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); | ||
502 | pace->e_id = ACL_UNDEFINED_ID; | ||
503 | |||
504 | for (i=0; i < state->users->n; i++) { | ||
505 | pace++; | ||
506 | pace->e_tag = ACL_USER; | ||
507 | error = check_deny(state->users->aces[i].perms.deny, 0); | ||
508 | if (error) | ||
509 | goto out_err; | ||
510 | low_mode_from_nfs4(state->users->aces[i].perms.allow, | ||
511 | &pace->e_perm, flags); | ||
512 | pace->e_id = state->users->aces[i].uid; | ||
513 | add_to_mask(state, &state->users->aces[i].perms); | ||
556 | } | 514 | } |
557 | 515 | ||
558 | if (ace2type(ace) != ACL_GROUP_OBJ) | 516 | pace++; |
559 | goto out; | 517 | pace->e_tag = ACL_GROUP_OBJ; |
560 | 518 | error = check_deny(state->group.deny, 0); | |
561 | ac = kmalloc(sizeof(*ac), GFP_KERNEL); | 519 | if (error) |
562 | error = -ENOMEM; | 520 | goto out_err; |
563 | if (ac == NULL) | 521 | low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); |
564 | goto out; | 522 | pace->e_id = ACL_UNDEFINED_ID; |
565 | ac->ace = ace; | 523 | add_to_mask(state, &state->group); |
566 | list_add_tail(&ac->ace_l, &group_l); | 524 | |
567 | 525 | for (i=0; i < state->groups->n; i++) { | |
568 | error = -EINVAL; | 526 | pace++; |
569 | if (ace->type != NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) | 527 | pace->e_tag = ACL_GROUP; |
570 | goto out; | 528 | error = check_deny(state->groups->aces[i].perms.deny, 0); |
571 | 529 | if (error) | |
572 | error = write_pace(ace, pacl, pace, ACL_GROUP_OBJ, flags); | 530 | goto out_err; |
573 | if (error < 0) | 531 | low_mode_from_nfs4(state->groups->aces[i].perms.allow, |
574 | goto out; | 532 | &pace->e_perm, flags); |
575 | 533 | pace->e_id = state->groups->aces[i].uid; | |
576 | error = -EINVAL; | 534 | add_to_mask(state, &state->groups->aces[i].perms); |
577 | ace = get_next_v4_ace(p, &n4acl->ace_head); | 535 | } |
578 | if (ace == NULL) | ||
579 | goto out; | ||
580 | |||
581 | /* groups (mask and allow aces) */ | ||
582 | |||
583 | while (ace2type(ace) == ACL_GROUP) { | ||
584 | if (*mask_ace == NULL) | ||
585 | goto out; | ||
586 | |||
587 | if (ace->type != NFS4_ACE_ACCESS_DENIED_ACE_TYPE || | ||
588 | !MASK_EQUAL(ace->access_mask, (*mask_ace)->access_mask)) | ||
589 | goto out; | ||
590 | *mask_ace = ace; | ||
591 | 536 | ||
592 | ace = get_next_v4_ace(p, &n4acl->ace_head); | 537 | pace++; |
593 | if (ace == NULL) | 538 | pace->e_tag = ACL_MASK; |
594 | goto out; | 539 | low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); |
595 | ac = kmalloc(sizeof(*ac), GFP_KERNEL); | 540 | pace->e_id = ACL_UNDEFINED_ID; |
596 | error = -ENOMEM; | ||
597 | if (ac == NULL) | ||
598 | goto out; | ||
599 | error = -EINVAL; | ||
600 | if (ace->type != NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE || | ||
601 | !same_who(ace, *mask_ace)) | ||
602 | goto out; | ||
603 | 541 | ||
604 | ac->ace = ace; | 542 | pace++; |
605 | list_add_tail(&ac->ace_l, &group_l); | 543 | pace->e_tag = ACL_OTHER; |
544 | error = check_deny(state->other.deny, 0); | ||
545 | if (error) | ||
546 | goto out_err; | ||
547 | low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); | ||
548 | pace->e_id = ACL_UNDEFINED_ID; | ||
606 | 549 | ||
607 | error = write_pace(ace, pacl, pace, ACL_GROUP, flags); | 550 | return pacl; |
608 | if (error < 0) | 551 | out_err: |
609 | goto out; | 552 | posix_acl_release(pacl); |
610 | error = -EINVAL; | 553 | return ERR_PTR(error); |
611 | ace = get_next_v4_ace(p, &n4acl->ace_head); | 554 | } |
612 | if (ace == NULL) | ||
613 | goto out; | ||
614 | } | ||
615 | 555 | ||
616 | /* group owner (deny ace) */ | 556 | static inline void allow_bits(struct posix_ace_state *astate, u32 mask) |
557 | { | ||
558 | /* Allow all bits in the mask not already denied: */ | ||
559 | astate->allow |= mask & ~astate->deny; | ||
560 | } | ||
617 | 561 | ||
618 | if (ace2type(ace) != ACL_GROUP_OBJ) | 562 | static inline void deny_bits(struct posix_ace_state *astate, u32 mask) |
619 | goto out; | 563 | { |
620 | ac = list_entry(group_l.next, struct ace_container, ace_l); | 564 | /* Deny all bits in the mask not already allowed: */ |
621 | ace2 = ac->ace; | 565 | astate->deny |= mask & ~astate->allow; |
622 | if (!complementary_ace_pair(ace2, ace, flags)) | 566 | } |
623 | goto out; | ||
624 | list_del(group_l.next); | ||
625 | kfree(ac); | ||
626 | 567 | ||
627 | /* groups (deny aces) */ | 568 | static int find_uid(struct posix_acl_state *state, struct posix_ace_state_array *a, uid_t uid) |
569 | { | ||
570 | int i; | ||
628 | 571 | ||
629 | while (!list_empty(&group_l)) { | 572 | for (i = 0; i < a->n; i++) |
630 | ace = get_next_v4_ace(p, &n4acl->ace_head); | 573 | if (a->aces[i].uid == uid) |
631 | if (ace == NULL) | 574 | return i; |
632 | goto out; | 575 | /* Not found: */ |
633 | if (ace2type(ace) != ACL_GROUP) | 576 | a->n++; |
634 | goto out; | 577 | a->aces[i].uid = uid; |
635 | ac = list_entry(group_l.next, struct ace_container, ace_l); | 578 | a->aces[i].perms.allow = state->everyone.allow; |
636 | ace2 = ac->ace; | 579 | a->aces[i].perms.deny = state->everyone.deny; |
637 | if (!complementary_ace_pair(ace2, ace, flags)) | ||
638 | goto out; | ||
639 | list_del(group_l.next); | ||
640 | kfree(ac); | ||
641 | } | ||
642 | 580 | ||
643 | ace = get_next_v4_ace(p, &n4acl->ace_head); | 581 | return i; |
644 | if (ace == NULL) | ||
645 | goto out; | ||
646 | if (ace2type(ace) != ACL_OTHER) | ||
647 | goto out; | ||
648 | error = 0; | ||
649 | out: | ||
650 | while (!list_empty(&group_l)) { | ||
651 | ac = list_entry(group_l.next, struct ace_container, ace_l); | ||
652 | list_del(group_l.next); | ||
653 | kfree(ac); | ||
654 | } | ||
655 | return error; | ||
656 | } | 582 | } |
657 | 583 | ||
658 | static inline int | 584 | static void deny_bits_array(struct posix_ace_state_array *a, u32 mask) |
659 | mask_from_v4(struct nfs4_acl *n4acl, struct list_head **p, | ||
660 | struct nfs4_ace **mask_ace, | ||
661 | struct posix_acl *pacl, struct posix_acl_entry **pace, | ||
662 | unsigned int flags) | ||
663 | { | 585 | { |
664 | int error = -EINVAL; | 586 | int i; |
665 | struct nfs4_ace *ace; | ||
666 | 587 | ||
667 | ace = list_entry(*p, struct nfs4_ace, l_ace); | 588 | for (i=0; i < a->n; i++) |
668 | if (pacl->a_count != 3) { | 589 | deny_bits(&a->aces[i].perms, mask); |
669 | if (*mask_ace == NULL) | ||
670 | goto out; | ||
671 | (*mask_ace)->access_mask = deny_mask((*mask_ace)->access_mask, flags); | ||
672 | write_pace(*mask_ace, pacl, pace, ACL_MASK, flags); | ||
673 | } | ||
674 | error = 0; | ||
675 | out: | ||
676 | return error; | ||
677 | } | 590 | } |
678 | 591 | ||
679 | static inline int | 592 | static void allow_bits_array(struct posix_ace_state_array *a, u32 mask) |
680 | other_from_v4(struct nfs4_acl *n4acl, struct list_head **p, | ||
681 | struct posix_acl *pacl, struct posix_acl_entry **pace, | ||
682 | unsigned int flags) | ||
683 | { | 593 | { |
684 | int error = -EINVAL; | 594 | int i; |
685 | struct nfs4_ace *ace, *ace2; | ||
686 | 595 | ||
687 | ace = list_entry(*p, struct nfs4_ace, l_ace); | 596 | for (i=0; i < a->n; i++) |
688 | if (ace->type != NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) | 597 | allow_bits(&a->aces[i].perms, mask); |
689 | goto out; | ||
690 | error = write_pace(ace, pacl, pace, ACL_OTHER, flags); | ||
691 | if (error < 0) | ||
692 | goto out; | ||
693 | error = -EINVAL; | ||
694 | ace2 = get_next_v4_ace(p, &n4acl->ace_head); | ||
695 | if (ace2 == NULL) | ||
696 | goto out; | ||
697 | if (!complementary_ace_pair(ace, ace2, flags)) | ||
698 | goto out; | ||
699 | error = 0; | ||
700 | out: | ||
701 | return error; | ||
702 | } | 598 | } |
703 | 599 | ||
704 | static int | 600 | static void process_one_v4_ace(struct posix_acl_state *state, |
705 | calculate_posix_ace_count(struct nfs4_acl *n4acl) | 601 | struct nfs4_ace *ace) |
706 | { | 602 | { |
707 | if (n4acl->naces == 6) /* owner, owner group, and other only */ | 603 | u32 mask = ace->access_mask; |
708 | return 3; | 604 | int i; |
709 | else { /* Otherwise there must be a mask entry. */ | 605 | |
710 | /* Also, the remaining entries are for named users and | 606 | switch (ace2type(ace)) { |
711 | * groups, and come in threes (mask, allow, deny): */ | 607 | case ACL_USER_OBJ: |
712 | if (n4acl->naces < 7) | 608 | if (ace->type == NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) { |
713 | return -EINVAL; | 609 | allow_bits(&state->owner, mask); |
714 | if ((n4acl->naces - 7) % 3) | 610 | } else { |
715 | return -EINVAL; | 611 | deny_bits(&state->owner, mask); |
716 | return 4 + (n4acl->naces - 7)/3; | 612 | } |
613 | break; | ||
614 | case ACL_USER: | ||
615 | i = find_uid(state, state->users, ace->who); | ||
616 | if (ace->type == NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) { | ||
617 | allow_bits(&state->users->aces[i].perms, mask); | ||
618 | } else { | ||
619 | deny_bits(&state->users->aces[i].perms, mask); | ||
620 | mask = state->users->aces[i].perms.deny; | ||
621 | deny_bits(&state->owner, mask); | ||
622 | } | ||
623 | break; | ||
624 | case ACL_GROUP_OBJ: | ||
625 | if (ace->type == NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) { | ||
626 | allow_bits(&state->group, mask); | ||
627 | } else { | ||
628 | deny_bits(&state->group, mask); | ||
629 | mask = state->group.deny; | ||
630 | deny_bits(&state->owner, mask); | ||
631 | deny_bits(&state->everyone, mask); | ||
632 | deny_bits_array(state->users, mask); | ||
633 | deny_bits_array(state->groups, mask); | ||
634 | } | ||
635 | break; | ||
636 | case ACL_GROUP: | ||
637 | i = find_uid(state, state->groups, ace->who); | ||
638 | if (ace->type == NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) { | ||
639 | allow_bits(&state->groups->aces[i].perms, mask); | ||
640 | } else { | ||
641 | deny_bits(&state->groups->aces[i].perms, mask); | ||
642 | mask = state->groups->aces[i].perms.deny; | ||
643 | deny_bits(&state->owner, mask); | ||
644 | deny_bits(&state->group, mask); | ||
645 | deny_bits(&state->everyone, mask); | ||
646 | deny_bits_array(state->users, mask); | ||
647 | deny_bits_array(state->groups, mask); | ||
648 | } | ||
649 | break; | ||
650 | case ACL_OTHER: | ||
651 | if (ace->type == NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) { | ||
652 | allow_bits(&state->owner, mask); | ||
653 | allow_bits(&state->group, mask); | ||
654 | allow_bits(&state->other, mask); | ||
655 | allow_bits(&state->everyone, mask); | ||
656 | allow_bits_array(state->users, mask); | ||
657 | allow_bits_array(state->groups, mask); | ||
658 | } else { | ||
659 | deny_bits(&state->owner, mask); | ||
660 | deny_bits(&state->group, mask); | ||
661 | deny_bits(&state->other, mask); | ||
662 | deny_bits(&state->everyone, mask); | ||
663 | deny_bits_array(state->users, mask); | ||
664 | deny_bits_array(state->groups, mask); | ||
665 | } | ||
717 | } | 666 | } |
718 | } | 667 | } |
719 | 668 | ||
720 | |||
721 | static struct posix_acl * | 669 | static struct posix_acl * |
722 | _nfsv4_to_posix_one(struct nfs4_acl *n4acl, unsigned int flags) | 670 | _nfsv4_to_posix_one(struct nfs4_acl *n4acl, unsigned int flags) |
723 | { | 671 | { |
672 | struct posix_acl_state state; | ||
724 | struct posix_acl *pacl; | 673 | struct posix_acl *pacl; |
725 | int error = -EINVAL, nace = 0; | 674 | struct nfs4_ace *ace; |
726 | struct list_head *p; | 675 | int ret; |
727 | struct nfs4_ace *mask_ace = NULL; | ||
728 | struct posix_acl_entry *pace; | ||
729 | |||
730 | nace = calculate_posix_ace_count(n4acl); | ||
731 | if (nace < 0) | ||
732 | goto out_err; | ||
733 | |||
734 | pacl = posix_acl_alloc(nace, GFP_KERNEL); | ||
735 | error = -ENOMEM; | ||
736 | if (pacl == NULL) | ||
737 | goto out_err; | ||
738 | |||
739 | pace = &pacl->a_entries[0]; | ||
740 | p = &n4acl->ace_head; | ||
741 | |||
742 | error = user_obj_from_v4(n4acl, &p, pacl, &pace, flags); | ||
743 | if (error) | ||
744 | goto out_acl; | ||
745 | |||
746 | error = users_from_v4(n4acl, &p, &mask_ace, pacl, &pace, flags); | ||
747 | if (error) | ||
748 | goto out_acl; | ||
749 | 676 | ||
750 | error = group_obj_and_groups_from_v4(n4acl, &p, &mask_ace, pacl, &pace, | 677 | ret = init_state(&state, n4acl->naces); |
751 | flags); | 678 | if (ret) |
752 | if (error) | 679 | return ERR_PTR(ret); |
753 | goto out_acl; | ||
754 | 680 | ||
755 | error = mask_from_v4(n4acl, &p, &mask_ace, pacl, &pace, flags); | 681 | list_for_each_entry(ace, &n4acl->ace_head, l_ace) |
756 | if (error) | 682 | process_one_v4_ace(&state, ace); |
757 | goto out_acl; | ||
758 | error = other_from_v4(n4acl, &p, pacl, &pace, flags); | ||
759 | if (error) | ||
760 | goto out_acl; | ||
761 | 683 | ||
762 | error = -EINVAL; | 684 | pacl = posix_state_to_acl(&state, flags); |
763 | if (p->next != &n4acl->ace_head) | ||
764 | goto out_acl; | ||
765 | if (pace != pacl->a_entries + pacl->a_count) | ||
766 | goto out_acl; | ||
767 | 685 | ||
768 | sort_pacl(pacl); | 686 | free_state(&state); |
769 | 687 | ||
770 | return pacl; | 688 | if (!IS_ERR(pacl)) |
771 | out_acl: | 689 | sort_pacl(pacl); |
772 | posix_acl_release(pacl); | ||
773 | out_err: | ||
774 | pacl = ERR_PTR(error); | ||
775 | return pacl; | 690 | return pacl; |
776 | } | 691 | } |
777 | 692 | ||
@@ -785,22 +700,41 @@ nfs4_acl_split(struct nfs4_acl *acl, struct nfs4_acl *dacl) | |||
785 | list_for_each_safe(h, n, &acl->ace_head) { | 700 | list_for_each_safe(h, n, &acl->ace_head) { |
786 | ace = list_entry(h, struct nfs4_ace, l_ace); | 701 | ace = list_entry(h, struct nfs4_ace, l_ace); |
787 | 702 | ||
788 | if ((ace->flag & NFS4_INHERITANCE_FLAGS) | 703 | if (ace->type != NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE && |
789 | != NFS4_INHERITANCE_FLAGS) | 704 | ace->type != NFS4_ACE_ACCESS_DENIED_ACE_TYPE) |
790 | continue; | 705 | return -EINVAL; |
791 | 706 | ||
792 | error = nfs4_acl_add_ace(dacl, ace->type, ace->flag, | 707 | if (ace->flag & ~NFS4_SUPPORTED_FLAGS) |
793 | ace->access_mask, ace->whotype, ace->who); | 708 | return -EINVAL; |
794 | if (error < 0) | ||
795 | goto out; | ||
796 | 709 | ||
797 | list_del(h); | 710 | switch (ace->flag & NFS4_INHERITANCE_FLAGS) { |
798 | kfree(ace); | 711 | case 0: |
799 | acl->naces--; | 712 | /* Leave this ace in the effective acl: */ |
713 | continue; | ||
714 | case NFS4_INHERITANCE_FLAGS: | ||
715 | /* Add this ace to the default acl and remove it | ||
716 | * from the effective acl: */ | ||
717 | error = nfs4_acl_add_ace(dacl, ace->type, ace->flag, | ||
718 | ace->access_mask, ace->whotype, ace->who); | ||
719 | if (error) | ||
720 | return error; | ||
721 | list_del(h); | ||
722 | kfree(ace); | ||
723 | acl->naces--; | ||
724 | break; | ||
725 | case NFS4_INHERITANCE_FLAGS & ~NFS4_ACE_INHERIT_ONLY_ACE: | ||
726 | /* Add this ace to the default, but leave it in | ||
727 | * the effective acl as well: */ | ||
728 | error = nfs4_acl_add_ace(dacl, ace->type, ace->flag, | ||
729 | ace->access_mask, ace->whotype, ace->who); | ||
730 | if (error) | ||
731 | return error; | ||
732 | break; | ||
733 | default: | ||
734 | return -EINVAL; | ||
735 | } | ||
800 | } | 736 | } |
801 | 737 | return 0; | |
802 | out: | ||
803 | return error; | ||
804 | } | 738 | } |
805 | 739 | ||
806 | static short | 740 | static short |
@@ -930,23 +864,6 @@ nfs4_acl_write_who(int who, char *p) | |||
930 | return -1; | 864 | return -1; |
931 | } | 865 | } |
932 | 866 | ||
933 | static inline int | ||
934 | match_who(struct nfs4_ace *ace, uid_t owner, gid_t group, uid_t who) | ||
935 | { | ||
936 | switch (ace->whotype) { | ||
937 | case NFS4_ACL_WHO_NAMED: | ||
938 | return who == ace->who; | ||
939 | case NFS4_ACL_WHO_OWNER: | ||
940 | return who == owner; | ||
941 | case NFS4_ACL_WHO_GROUP: | ||
942 | return who == group; | ||
943 | case NFS4_ACL_WHO_EVERYONE: | ||
944 | return 1; | ||
945 | default: | ||
946 | return 0; | ||
947 | } | ||
948 | } | ||
949 | |||
950 | EXPORT_SYMBOL(nfs4_acl_new); | 867 | EXPORT_SYMBOL(nfs4_acl_new); |
951 | EXPORT_SYMBOL(nfs4_acl_free); | 868 | EXPORT_SYMBOL(nfs4_acl_free); |
952 | EXPORT_SYMBOL(nfs4_acl_add_ace); | 869 | EXPORT_SYMBOL(nfs4_acl_add_ace); |