2016-08-29 13:46:37 +00:00
|
|
|
/*
|
|
|
|
* FUSE: Filesystem in Userspace
|
|
|
|
* Copyright (C) 2016 Canonical Ltd. <seth.forshee@canonical.com>
|
|
|
|
*
|
|
|
|
* This program can be distributed under the terms of the GNU GPL.
|
|
|
|
* See the file COPYING.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "fuse_i.h"
|
|
|
|
|
|
|
|
#include <linux/posix_acl.h>
|
|
|
|
#include <linux/posix_acl_xattr.h>
|
|
|
|
|
2023-01-20 11:55:04 +00:00
|
|
|
static struct posix_acl *__fuse_get_acl(struct fuse_conn *fc,
|
|
|
|
struct inode *inode, int type, bool rcu)
|
2016-08-29 13:46:37 +00:00
|
|
|
{
|
|
|
|
int size;
|
|
|
|
const char *name;
|
|
|
|
void *value = NULL;
|
|
|
|
struct posix_acl *acl;
|
|
|
|
|
2021-08-18 20:08:24 +00:00
|
|
|
if (rcu)
|
|
|
|
return ERR_PTR(-ECHILD);
|
|
|
|
|
2020-12-10 14:33:14 +00:00
|
|
|
if (fuse_is_bad(inode))
|
|
|
|
return ERR_PTR(-EIO);
|
|
|
|
|
2023-01-20 11:55:04 +00:00
|
|
|
if (fc->no_getxattr)
|
2016-08-29 13:46:37 +00:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (type == ACL_TYPE_ACCESS)
|
|
|
|
name = XATTR_NAME_POSIX_ACL_ACCESS;
|
|
|
|
else if (type == ACL_TYPE_DEFAULT)
|
|
|
|
name = XATTR_NAME_POSIX_ACL_DEFAULT;
|
|
|
|
else
|
|
|
|
return ERR_PTR(-EOPNOTSUPP);
|
|
|
|
|
|
|
|
value = kmalloc(PAGE_SIZE, GFP_KERNEL);
|
|
|
|
if (!value)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
size = fuse_getxattr(inode, name, value, PAGE_SIZE);
|
|
|
|
if (size > 0)
|
2018-02-21 17:18:07 +00:00
|
|
|
acl = posix_acl_from_xattr(fc->user_ns, value, size);
|
2016-08-29 13:46:37 +00:00
|
|
|
else if ((size == 0) || (size == -ENODATA) ||
|
|
|
|
(size == -EOPNOTSUPP && fc->no_getxattr))
|
|
|
|
acl = NULL;
|
|
|
|
else if (size == -ERANGE)
|
|
|
|
acl = ERR_PTR(-E2BIG);
|
|
|
|
else
|
|
|
|
acl = ERR_PTR(size);
|
|
|
|
|
|
|
|
kfree(value);
|
|
|
|
return acl;
|
|
|
|
}
|
|
|
|
|
2023-01-20 11:55:04 +00:00
|
|
|
static inline bool fuse_no_acl(const struct fuse_conn *fc,
|
|
|
|
const struct inode *inode)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Refuse interacting with POSIX ACLs for daemons that
|
|
|
|
* don't support FUSE_POSIX_ACL and are not mounted on
|
|
|
|
* the host to retain backwards compatibility.
|
|
|
|
*/
|
|
|
|
return !fc->posix_acl && (i_user_ns(inode) != &init_user_ns);
|
|
|
|
}
|
|
|
|
|
2023-02-20 19:53:11 +00:00
|
|
|
struct posix_acl *fuse_get_acl(struct mnt_idmap *idmap,
|
2023-01-20 11:55:04 +00:00
|
|
|
struct dentry *dentry, int type)
|
|
|
|
{
|
|
|
|
struct inode *inode = d_inode(dentry);
|
|
|
|
struct fuse_conn *fc = get_fuse_conn(inode);
|
|
|
|
|
|
|
|
if (fuse_no_acl(fc, inode))
|
|
|
|
return ERR_PTR(-EOPNOTSUPP);
|
|
|
|
|
2024-09-03 15:16:20 +00:00
|
|
|
return __fuse_get_acl(fc, inode, type, false);
|
2023-01-20 11:55:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct posix_acl *fuse_get_inode_acl(struct inode *inode, int type, bool rcu)
|
|
|
|
{
|
|
|
|
struct fuse_conn *fc = get_fuse_conn(inode);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* FUSE daemons before FUSE_POSIX_ACL was introduced could get and set
|
|
|
|
* POSIX ACLs without them being used for permission checking by the
|
|
|
|
* vfs. Retain that behavior for backwards compatibility as there are
|
|
|
|
* filesystems that do all permission checking for acls in the daemon
|
|
|
|
* and not in the kernel.
|
|
|
|
*/
|
|
|
|
if (!fc->posix_acl)
|
|
|
|
return NULL;
|
2024-09-03 15:16:20 +00:00
|
|
|
return __fuse_get_acl(fc, inode, type, rcu);
|
2023-01-20 11:55:04 +00:00
|
|
|
}
|
|
|
|
|
2023-01-13 11:49:20 +00:00
|
|
|
int fuse_set_acl(struct mnt_idmap *idmap, struct dentry *dentry,
|
2021-01-21 13:19:43 +00:00
|
|
|
struct posix_acl *acl, int type)
|
2016-08-29 13:46:37 +00:00
|
|
|
{
|
2022-09-23 08:29:39 +00:00
|
|
|
struct inode *inode = d_inode(dentry);
|
2016-08-29 13:46:37 +00:00
|
|
|
struct fuse_conn *fc = get_fuse_conn(inode);
|
|
|
|
const char *name;
|
|
|
|
int ret;
|
|
|
|
|
2020-12-10 14:33:14 +00:00
|
|
|
if (fuse_is_bad(inode))
|
|
|
|
return -EIO;
|
|
|
|
|
2023-01-20 11:55:04 +00:00
|
|
|
if (fc->no_setxattr || fuse_no_acl(fc, inode))
|
2016-08-29 13:46:37 +00:00
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
if (type == ACL_TYPE_ACCESS)
|
|
|
|
name = XATTR_NAME_POSIX_ACL_ACCESS;
|
|
|
|
else if (type == ACL_TYPE_DEFAULT)
|
|
|
|
name = XATTR_NAME_POSIX_ACL_DEFAULT;
|
|
|
|
else
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (acl) {
|
2021-03-25 15:18:23 +00:00
|
|
|
unsigned int extra_flags = 0;
|
2016-08-29 13:46:37 +00:00
|
|
|
/*
|
|
|
|
* Fuse userspace is responsible for updating access
|
|
|
|
* permissions in the inode, if needed. fuse_setxattr
|
|
|
|
* invalidates the inode attributes, which will force
|
|
|
|
* them to be refreshed the next time they are used,
|
|
|
|
* and it also updates i_ctime.
|
|
|
|
*/
|
|
|
|
size_t size = posix_acl_xattr_size(acl->a_count);
|
|
|
|
void *value;
|
|
|
|
|
|
|
|
if (size > PAGE_SIZE)
|
|
|
|
return -E2BIG;
|
|
|
|
|
|
|
|
value = kmalloc(size, GFP_KERNEL);
|
|
|
|
if (!value)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2018-02-21 17:18:07 +00:00
|
|
|
ret = posix_acl_to_xattr(fc->user_ns, acl, value, size);
|
2016-08-29 13:46:37 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
kfree(value);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-01-20 11:55:04 +00:00
|
|
|
/*
|
|
|
|
* Fuse daemons without FUSE_POSIX_ACL never changed the passed
|
|
|
|
* through POSIX ACLs. Such daemons don't expect setgid bits to
|
|
|
|
* be stripped.
|
|
|
|
*/
|
|
|
|
if (fc->posix_acl &&
|
2024-09-03 15:16:21 +00:00
|
|
|
!in_group_or_capable(idmap, inode,
|
|
|
|
i_gid_into_vfsgid(idmap, inode)))
|
2021-03-25 15:18:23 +00:00
|
|
|
extra_flags |= FUSE_SETXATTR_ACL_KILL_SGID;
|
|
|
|
|
|
|
|
ret = fuse_setxattr(inode, name, value, size, 0, extra_flags);
|
2016-08-29 13:46:37 +00:00
|
|
|
kfree(value);
|
|
|
|
} else {
|
|
|
|
ret = fuse_removexattr(inode, name);
|
|
|
|
}
|
2023-01-20 11:55:04 +00:00
|
|
|
|
|
|
|
if (fc->posix_acl) {
|
|
|
|
/*
|
|
|
|
* Fuse daemons without FUSE_POSIX_ACL never cached POSIX ACLs
|
|
|
|
* and didn't invalidate attributes. Retain that behavior.
|
|
|
|
*/
|
|
|
|
forget_all_cached_acls(inode);
|
|
|
|
fuse_invalidate_attr(inode);
|
|
|
|
}
|
2016-08-29 13:46:37 +00:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|