Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   1) // SPDX-License-Identifier: GPL-2.0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   3)  * Copyright (c) 2008, Christoph Hellwig
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   4)  * All Rights Reserved.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   5)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   6) #include "xfs.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   7) #include "xfs_shared.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   8) #include "xfs_format.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   9) #include "xfs_log_format.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  10) #include "xfs_trans_resv.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  11) #include "xfs_mount.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  12) #include "xfs_inode.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  13) #include "xfs_attr.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  14) #include "xfs_trace.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  15) #include "xfs_error.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  16) #include "xfs_acl.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  17) #include "xfs_da_format.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  18) #include "xfs_da_btree.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  19) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  20) #include <linux/posix_acl_xattr.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  21) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  22) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  23)  * Locking scheme:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  24)  *  - all ACL updates are protected by inode->i_mutex, which is taken before
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  25)  *    calling into this file.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  26)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  27) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  28) STATIC struct posix_acl *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  29) xfs_acl_from_disk(
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  30) 	struct xfs_mount	*mp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  31) 	const struct xfs_acl	*aclp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  32) 	int			len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  33) 	int			max_entries)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  34) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  35) 	struct posix_acl_entry *acl_e;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  36) 	struct posix_acl *acl;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  37) 	const struct xfs_acl_entry *ace;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  38) 	unsigned int count, i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  39) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  40) 	if (len < sizeof(*aclp)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  41) 		XFS_CORRUPTION_ERROR(__func__, XFS_ERRLEVEL_LOW, mp, aclp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  42) 				len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  43) 		return ERR_PTR(-EFSCORRUPTED);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  44) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  45) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  46) 	count = be32_to_cpu(aclp->acl_cnt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  47) 	if (count > max_entries || XFS_ACL_SIZE(count) != len) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  48) 		XFS_CORRUPTION_ERROR(__func__, XFS_ERRLEVEL_LOW, mp, aclp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  49) 				len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  50) 		return ERR_PTR(-EFSCORRUPTED);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  51) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  52) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  53) 	acl = posix_acl_alloc(count, GFP_KERNEL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  54) 	if (!acl)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  55) 		return ERR_PTR(-ENOMEM);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  56) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  57) 	for (i = 0; i < count; i++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  58) 		acl_e = &acl->a_entries[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  59) 		ace = &aclp->acl_entry[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  60) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  61) 		/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  62) 		 * The tag is 32 bits on disk and 16 bits in core.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  63) 		 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  64) 		 * Because every access to it goes through the core
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  65) 		 * format first this is not a problem.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  66) 		 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  67) 		acl_e->e_tag = be32_to_cpu(ace->ae_tag);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  68) 		acl_e->e_perm = be16_to_cpu(ace->ae_perm);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  69) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  70) 		switch (acl_e->e_tag) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  71) 		case ACL_USER:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  72) 			acl_e->e_uid = make_kuid(&init_user_ns,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  73) 						 be32_to_cpu(ace->ae_id));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  74) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  75) 		case ACL_GROUP:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  76) 			acl_e->e_gid = make_kgid(&init_user_ns,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  77) 						 be32_to_cpu(ace->ae_id));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  78) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  79) 		case ACL_USER_OBJ:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  80) 		case ACL_GROUP_OBJ:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  81) 		case ACL_MASK:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  82) 		case ACL_OTHER:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  83) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  84) 		default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  85) 			goto fail;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  86) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  87) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  88) 	return acl;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  89) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  90) fail:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  91) 	posix_acl_release(acl);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  92) 	return ERR_PTR(-EINVAL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  93) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  94) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  95) STATIC void
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  96) xfs_acl_to_disk(struct xfs_acl *aclp, const struct posix_acl *acl)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  97) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  98) 	const struct posix_acl_entry *acl_e;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  99) 	struct xfs_acl_entry *ace;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) 	int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) 	aclp->acl_cnt = cpu_to_be32(acl->a_count);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) 	for (i = 0; i < acl->a_count; i++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) 		ace = &aclp->acl_entry[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) 		acl_e = &acl->a_entries[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) 		ace->ae_tag = cpu_to_be32(acl_e->e_tag);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) 		switch (acl_e->e_tag) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) 		case ACL_USER:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) 			ace->ae_id = cpu_to_be32(
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) 					from_kuid(&init_user_ns, acl_e->e_uid));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) 		case ACL_GROUP:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) 			ace->ae_id = cpu_to_be32(
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) 					from_kgid(&init_user_ns, acl_e->e_gid));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) 		default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) 			ace->ae_id = cpu_to_be32(ACL_UNDEFINED_ID);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) 		ace->ae_perm = cpu_to_be16(acl_e->e_perm);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) struct posix_acl *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) xfs_get_acl(struct inode *inode, int type)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) 	struct xfs_inode	*ip = XFS_I(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) 	struct xfs_mount	*mp = ip->i_mount;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) 	struct posix_acl	*acl = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) 	struct xfs_da_args	args = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) 		.dp		= ip,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) 		.attr_filter	= XFS_ATTR_ROOT,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) 		.valuelen	= XFS_ACL_MAX_SIZE(mp),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) 	};
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137) 	int			error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139) 	trace_xfs_get_acl(ip);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) 	switch (type) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) 	case ACL_TYPE_ACCESS:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) 		args.name = SGI_ACL_FILE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145) 	case ACL_TYPE_DEFAULT:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) 		args.name = SGI_ACL_DEFAULT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) 	default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149) 		BUG();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) 	args.namelen = strlen(args.name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154) 	 * If the attribute doesn't exist make sure we have a negative cache
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) 	 * entry, for any other error assume it is transient.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) 	error = xfs_attr_get(&args);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) 	if (!error) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) 		acl = xfs_acl_from_disk(mp, args.value, args.valuelen,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160) 					XFS_ACL_MAX_ENTRIES(mp));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) 	} else if (error != -ENOATTR) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162) 		acl = ERR_PTR(error);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) 	kmem_free(args.value);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166) 	return acl;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) int
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) __xfs_set_acl(struct inode *inode, struct posix_acl *acl, int type)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) 	struct xfs_inode	*ip = XFS_I(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173) 	struct xfs_da_args	args = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) 		.dp		= ip,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) 		.attr_filter	= XFS_ATTR_ROOT,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176) 	};
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177) 	int			error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) 	switch (type) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180) 	case ACL_TYPE_ACCESS:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) 		args.name = SGI_ACL_FILE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183) 	case ACL_TYPE_DEFAULT:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) 		if (!S_ISDIR(inode->i_mode))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185) 			return acl ? -EACCES : 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186) 		args.name = SGI_ACL_DEFAULT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) 	default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) 		return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191) 	args.namelen = strlen(args.name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) 	if (acl) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194) 		args.valuelen = XFS_ACL_SIZE(acl->a_count);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) 		args.value = kvzalloc(args.valuelen, GFP_KERNEL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196) 		if (!args.value)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) 			return -ENOMEM;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198) 		xfs_acl_to_disk(args.value, acl);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 199) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 200) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 201) 	error = xfs_attr_set(&args);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 202) 	kmem_free(args.value);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 203) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 204) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 205) 	 * If the attribute didn't exist to start with that's fine.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 206) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 207) 	if (!acl && error == -ENOATTR)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 208) 		error = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 209) 	if (!error)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 210) 		set_cached_acl(inode, type, acl);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 211) 	return error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 212) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 213) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 214) static int
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 215) xfs_set_mode(struct inode *inode, umode_t mode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 216) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 217) 	int error = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 218) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 219) 	if (mode != inode->i_mode) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 220) 		struct iattr iattr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 221) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 222) 		iattr.ia_valid = ATTR_MODE | ATTR_CTIME;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 223) 		iattr.ia_mode = mode;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 224) 		iattr.ia_ctime = current_time(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 225) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 226) 		error = xfs_setattr_nonsize(XFS_I(inode), &iattr, XFS_ATTR_NOACL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 227) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 228) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 229) 	return error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 230) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 231) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 232) int
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 233) xfs_set_acl(struct inode *inode, struct posix_acl *acl, int type)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 234) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 235) 	umode_t mode;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 236) 	bool set_mode = false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 237) 	int error = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 238) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 239) 	if (!acl)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 240) 		goto set_acl;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 241) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 242) 	error = -E2BIG;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 243) 	if (acl->a_count > XFS_ACL_MAX_ENTRIES(XFS_M(inode->i_sb)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 244) 		return error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 245) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 246) 	if (type == ACL_TYPE_ACCESS) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 247) 		error = posix_acl_update_mode(inode, &mode, &acl);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 248) 		if (error)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 249) 			return error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 250) 		set_mode = true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 251) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 252) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 253)  set_acl:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 254) 	error =  __xfs_set_acl(inode, acl, type);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 255) 	if (error)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 256) 		return error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 257) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 258) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 259) 	 * We set the mode after successfully updating the ACL xattr because the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 260) 	 * xattr update can fail at ENOSPC and we don't want to change the mode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 261) 	 * if the ACL update hasn't been applied.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 262) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 263) 	if (set_mode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 264) 		error = xfs_set_mode(inode, mode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 265) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 266) 	return error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 267) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 268) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 269) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 270)  * Invalidate any cached ACLs if the user has bypassed the ACL interface.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 271)  * We don't validate the content whatsoever so it is caller responsibility to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 272)  * provide data in valid format and ensure i_mode is consistent.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 273)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 274) void
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 275) xfs_forget_acl(
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 276) 	struct inode		*inode,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 277) 	const char		*name)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 278) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 279) 	if (!strcmp(name, SGI_ACL_FILE))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 280) 		forget_cached_acl(inode, ACL_TYPE_ACCESS);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 281) 	else if (!strcmp(name, SGI_ACL_DEFAULT))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 282) 		forget_cached_acl(inode, ACL_TYPE_DEFAULT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 283) }