summaryrefslogtreecommitdiffstats
path: root/sys/ufs
diff options
context:
space:
mode:
authorrwatson <rwatson@FreeBSD.org>2001-03-26 17:53:19 +0000
committerrwatson <rwatson@FreeBSD.org>2001-03-26 17:53:19 +0000
commit737ae0941ee3b699db5425d9d12de02839d30509 (patch)
tree4b09a88e22b66a7fdf9ea8345961f355662242dd /sys/ufs
parent50542906d3b63d0e8942e45ac5f5c2b28779facb (diff)
downloadFreeBSD-src-737ae0941ee3b699db5425d9d12de02839d30509.zip
FreeBSD-src-737ae0941ee3b699db5425d9d12de02839d30509.tar.gz
Introduce support for POSIX.1e ACLs on UFS-based file systems. This
implementation is still experimental, and while fairly broadly tested, is not yet intended for production use. Support for POSIX.1e ACLs on UFS will not be MFC'd to RELENG_4. This implementation works by providing implementations of VOP_[GS]ETACL() for FFS, as well as modifying the appropriate access control and file creation routines. In this implementation, ACLs are backed into extended attributes; the base ACL (owner, group, other) permissions remain in the inode for performance and compatibility reasons, so only the extended and default ACLs are placed in extended attributes. The logic for ACL evaluation is provided by the fs-independent kern/kern_acl.c. o Introduce UFS_ACL, a compile-time configuration option that enables support for ACLs on FFS (and potentially other UFS-based file systems). o Introduce ufs_getacl(), ufs_setacl(), ufs_aclcheck(), which respectively get, set, and check the ACLs on the passed vnode. o Introduce ufs_sync_acl_from_inode(), ufs_sync_inode_from_acl() to maintain access control information between inode permissions and extended attribute data. o Modify ufs_access() to load a file access ACL and invoke vaccess_acl_posix1e() if ACLs are available on the file system o Modify ufs_mkdir() and ufs_makeinode() to associate ACLs with newly created directories and files, inheriting from the parent directory's default ACL. o Enable these new vnode operations and conditionally compiled code paths if UFS_ACL is defined. A few notes: o This implementation is fairly widely tested, but still should be considered experimental. o Currently, ACLs are not exported via NFS, instead, the summarizing file mode/etc from the inode is. This results in conservative protection behavior, similar to the behavior of ACL-nonaware programs acting locally. o It is possible that underlying binary data formats associated with this implementation may change. Consumers of the implementation should expect to find their local configuration obsoleted in the next few months, resulting in possible loss of ACL data during an upgrade. o The extended attributes interface and implementation is still undergoing modification to address portable interface concerns, as well as performance. o Many applications do not yet correctly handle ACLs. In general, due to the POSIX.1e ACL model, behavior of ACL-unaware applications will be conservative with respects to file protection; some caution is recommended. o Instructions for configuring and maintaining ACLs on UFS will be committed in the near future; in the mean time it is possible to reference the README included in the last UFS ACL distribution placed in the TrustedBSD web site: http://www.TrustedBSD.org/downloads/ Substantial debugging, hardware, travel, or connectivity support for this project was provided by: BSDi, Safeport Network Services, and NAI Labs. Significant coding contributions were made by Chris Faulhaber. Additional support was provided by Brian Feldman, Thomas Moestl, and Ilmar Habibulin. Reviewed by: jedgar, keichii, mckusick, trustedbsd-discuss, freebsd-fs Obtained from: TrustedBSD Project
Diffstat (limited to 'sys/ufs')
-rw-r--r--sys/ufs/ufs/acl.h47
-rw-r--r--sys/ufs/ufs/ufs_acl.c559
-rw-r--r--sys/ufs/ufs/ufs_vnops.c218
3 files changed, 819 insertions, 5 deletions
diff --git a/sys/ufs/ufs/acl.h b/sys/ufs/ufs/acl.h
new file mode 100644
index 0000000..f9f1e37
--- /dev/null
+++ b/sys/ufs/ufs/acl.h
@@ -0,0 +1,47 @@
+/*-
+ * Copyright (c) 1999, 2000, 2001 Robert N. M. Watson
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ *
+ * $FreeBSD$
+ */
+/*
+ * TrustedBSD Project - ACL support for the UFS file system.
+ */
+
+#ifndef _UFS_UFS_ACL_H_
+#define _UFS_UFS_ACL_H_
+
+#ifdef _KERNEL
+
+void ufs_sync_acl_from_inode(struct inode *ip, struct acl *acl);
+void ufs_sync_inode_from_acl(struct acl *acl, struct inode *ip,
+ mode_t preserve_mask);
+
+int ufs_getacl __P((struct vop_getacl_args *));
+int ufs_setacl __P((struct vop_setacl_args *));
+int ufs_aclcheck __P((struct vop_aclcheck_args *));
+
+#endif /* !_KERNEL */
+
+#endif /* !_UFS_UFS_ACL_H */
diff --git a/sys/ufs/ufs/ufs_acl.c b/sys/ufs/ufs/ufs_acl.c
new file mode 100644
index 0000000..753dbde
--- /dev/null
+++ b/sys/ufs/ufs/ufs_acl.c
@@ -0,0 +1,559 @@
+/*-
+ * Copyright (c) 1999, 2000, 2001 Robert N. M. Watson
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ *
+ * $FreeBSD$
+ */
+/*
+ * Developed by the TrustedBSD Project.
+ * Support for POSIX.1e access control lists: UFS-specific support functions.
+ */
+
+#include "opt_ufs.h"
+#include "opt_quota.h"
+
+#include <sys/param.h>
+#include <sys/systm.h>
+#include <sys/stat.h>
+#include <sys/mount.h>
+#include <sys/vnode.h>
+#include <sys/types.h>
+#include <sys/acl.h>
+#include <sys/event.h>
+#include <sys/extattr.h>
+
+#include <ufs/ufs/quota.h>
+#include <ufs/ufs/inode.h>
+#include <ufs/ufs/acl.h>
+#include <ufs/ufs/extattr.h>
+#include <ufs/ufs/dir.h>
+#include <ufs/ufs/ufsmount.h>
+#include <ufs/ufs/ufs_extern.h>
+
+#define VN_KNOTE(vp, b) \
+ KNOTE(&vp->v_pollinfo.vpi_selinfo.si_note, (b))
+
+#ifdef UFS_ACL
+
+/*
+ * Synchronize an ACL and an inode by copying over appropriate inode fields
+ * to the passed ACL. Assumes an ACL that would satisfy acl_posix1e_check(),
+ * and may panic if not.
+ */
+void
+ufs_sync_acl_from_inode(struct inode *ip, struct acl *acl)
+{
+ struct acl_entry *acl_mask, *acl_group_obj;
+ int i;
+
+ /*
+ * Update ACL_USER_OBJ, ACL_OTHER, but simply identify ACL_MASK
+ * and ACL_GROUP_OBJ for use after we know whether ACL_MASK is
+ * present.
+ */
+ acl_mask = NULL;
+ acl_group_obj = NULL;
+ for (i = 0; i < acl->acl_cnt; i++) {
+ switch (acl->acl_entry[i].ae_tag) {
+ case ACL_USER_OBJ:
+ acl->acl_entry[i].ae_perm = acl_posix1e_mode_to_perm(
+ ACL_USER_OBJ, ip->i_mode);
+ acl->acl_entry[i].ae_id = ip->i_uid;
+ break;
+
+ case ACL_GROUP_OBJ:
+ acl_group_obj = &acl->acl_entry[i];
+ acl->acl_entry[i].ae_id = ip->i_gid;
+ break;
+
+ case ACL_OTHER:
+ acl->acl_entry[i].ae_perm = acl_posix1e_mode_to_perm(
+ ACL_OTHER, ip->i_mode);
+ acl->acl_entry[i].ae_id = 0;
+ break;
+
+ case ACL_MASK:
+ acl_mask = &acl->acl_entry[i];
+ acl->acl_entry[i].ae_id = 0;
+ break;
+
+ case ACL_USER:
+ case ACL_GROUP:
+ break;
+
+ default:
+ panic("ufs_sync_acl_from_inode(): bad ae_tag");
+ }
+ }
+
+ if (acl_group_obj == NULL)
+ panic("ufs_sync_acl_from_inode(): no ACL_GROUP_OBJ");
+
+ if (acl_mask == NULL) {
+ /*
+ * There is no ACL_MASK, so update ACL_GROUP_OBJ.
+ */
+ acl_group_obj->ae_perm = acl_posix1e_mode_to_perm(
+ ACL_GROUP_OBJ, ip->i_mode);
+ } else {
+ /*
+ * Update the ACL_MASK entry instead of ACL_GROUP_OBJ.
+ */
+ acl_mask->ae_perm = acl_posix1e_mode_to_perm(ACL_GROUP_OBJ,
+ ip->i_mode);
+ }
+}
+
+/*
+ * Synchronize an inode and an ACL by copying over appropriate ACL fields to
+ * the passed inode. Assumes an ACL that would satisfy acl_posix1e_check(),
+ * and may panic if not. This code will preserve existing use of the
+ * sticky, setugid, and non-permission bits in the mode field. It may
+ * be that the caller wishes to have previously authorized these changes,
+ * and may also want to clear the setugid bits in some situations.
+ */
+void
+ufs_sync_inode_from_acl(struct acl *acl, struct inode *ip,
+ mode_t preserve_mask)
+{
+ struct acl_entry *acl_mask, *acl_user_obj, *acl_group_obj;
+ struct acl_entry *acl_other;
+ mode_t preserve_mode;
+ int i;
+
+ /*
+ * Preserve old mode so we can restore appropriate bits of it.
+ */
+ preserve_mode = (ip->i_mode & preserve_mask);
+
+ /*
+ * Identify the ACL_MASK and all other entries appearing in the
+ * inode mode.
+ */
+ acl_user_obj = NULL;
+ acl_group_obj = NULL;
+ acl_other = NULL;
+ acl_mask = NULL;
+ for (i = 0; i < acl->acl_cnt; i++) {
+ switch (acl->acl_entry[i].ae_tag) {
+ case ACL_USER_OBJ:
+ acl_user_obj = &acl->acl_entry[i];
+ ip->i_uid = acl->acl_entry[i].ae_id;
+ break;
+
+ case ACL_GROUP_OBJ:
+ acl_group_obj = &acl->acl_entry[i];
+ ip->i_gid = acl->acl_entry[i].ae_id;
+ break;
+
+ case ACL_OTHER:
+ acl_other = &acl->acl_entry[i];
+ break;
+
+ case ACL_MASK:
+ acl_mask = &acl->acl_entry[i];
+ break;
+
+ case ACL_USER:
+ case ACL_GROUP:
+ break;
+
+ default:
+ panic("ufs_sync_inode_from_acl(): bad ae_tag");
+ }
+ }
+
+ if (acl_user_obj == NULL || acl_group_obj == NULL || acl_other == NULL)
+ panic("ufs_sync_inode_from_acl(): missing ae_tags");
+
+ if (acl_mask == NULL) {
+ /*
+ * There is no ACL_MASK, so use the ACL_GROUP_OBJ entry.
+ */
+ ip->i_mode &= ~ALLPERMS;
+ ip->i_mode |= acl_posix1e_perms_to_mode(acl_user_obj,
+ acl_group_obj, acl_other);
+ } else {
+ /*
+ * Use the ACL_MASK entry.
+ */
+ ip->i_mode &= ~ALLPERMS;
+ ip->i_mode |= acl_posix1e_perms_to_mode(acl_user_obj,
+ acl_mask, acl_other);
+ }
+ ip->i_mode |= preserve_mode;
+}
+
+/*
+ * Retrieve the ACL on a file.
+ *
+ * As part of the ACL is stored in the inode, and the rest in an EA,
+ * assemble both into a final ACL product. Right now this is not done
+ * very efficiently.
+ */
+int
+ufs_getacl(ap)
+ struct vop_getacl_args /* {
+ struct vnode *vp;
+ struct acl_type_t type;
+ struct acl *aclp;
+ struct ucred *cred;
+ struct proc *p;
+ } */ *ap;
+{
+ struct inode *ip = VTOI(ap->a_vp);
+ int error, len;
+
+
+ /*
+ * Attempt to retrieve the ACL based on the ACL type.
+ */
+ bzero(ap->a_aclp, sizeof(*ap->a_aclp));
+ switch(ap->a_type) {
+ case ACL_TYPE_ACCESS:
+ /*
+ * ACL_TYPE_ACCESS ACLs may or may not be stored in the
+ * EA, as they are in fact a combination of the inode
+ * ownership/permissions and the EA contents. If the
+ * EA is present, merge the two in a temporary ACL
+ * storage, otherwise just return the inode contents.
+ */
+ len = sizeof(*ap->a_aclp);
+ error = vn_extattr_get(ap->a_vp, IO_NODELOCKED,
+ POSIX1E_ACL_ACCESS_EXTATTR_NAMESPACE,
+ POSIX1E_ACL_ACCESS_EXTATTR_NAME, &len, (char *) ap->a_aclp,
+ ap->a_p);
+ switch (error) {
+ /* XXX: Will be ENOATTR. */
+ /* XXX: If ufs_getacl() should work on file systems without
+ * the EA configured, add case EOPNOTSUPP here. */
+ case ENOENT:
+ /*
+ * Legitimately no ACL set on object, purely
+ * emulate it through the inode. These fields will
+ * be updated when the ACL is synchronized with
+ * the inode later.
+ */
+ ap->a_aclp->acl_cnt = 3;
+ ap->a_aclp->acl_entry[0].ae_tag = ACL_USER_OBJ;
+ ap->a_aclp->acl_entry[0].ae_id = 0;
+ ap->a_aclp->acl_entry[0].ae_perm = 0;
+ ap->a_aclp->acl_entry[1].ae_tag = ACL_GROUP_OBJ;
+ ap->a_aclp->acl_entry[1].ae_id = 0;
+ ap->a_aclp->acl_entry[1].ae_perm = 0;
+ ap->a_aclp->acl_entry[2].ae_tag = ACL_OTHER;
+ ap->a_aclp->acl_entry[2].ae_id = 0;
+ ap->a_aclp->acl_entry[2].ae_perm = 0;
+ ufs_sync_acl_from_inode(ip, ap->a_aclp);
+ error = 0;
+ break;
+
+ case 0:
+ if (len != sizeof(*ap->a_aclp)) {
+ /*
+ * A short (or long) read, meaning that for
+ * some reason the ACL is corrupted. Return
+ * EPERM since the object DAC protections
+ * are unsafe.
+ */
+ printf("ufs_getacl(): Loaded invalid ACL ("
+ "%d bytes)\n", len);
+ return (EPERM);
+ }
+ ufs_sync_acl_from_inode(ip, ap->a_aclp);
+ break;
+
+ default:
+ }
+ break;
+
+ case ACL_TYPE_DEFAULT:
+ if (ap->a_vp->v_type != VDIR) {
+ error = EINVAL;
+ break;
+ }
+ bzero(ap->a_aclp, sizeof(*ap->a_aclp));
+ error = vn_extattr_get(ap->a_vp, IO_NODELOCKED,
+ POSIX1E_ACL_DEFAULT_EXTATTR_NAMESPACE,
+ POSIX1E_ACL_DEFAULT_EXTATTR_NAME, &len,
+ (char *) ap->a_aclp, ap->a_p);
+ /*
+ * Unlike ACL_TYPE_ACCESS, there is no relationship between
+ * the inode contents and the ACL, and it is therefore
+ * possible for the request for the ACL to fail since the
+ * ACL is undefined. In this situation, return success
+ * and an empty ACL, as required by POSIX.1e.
+ */
+ switch (error) {
+ /* XXX: Will be ENOATTR. */
+ /* XXX: If ufs_getacl() should work on file systems without
+ * the EA configured, add case EOPNOTSUPP here. */
+ case ENOENT:
+ bzero(ap->a_aclp, sizeof(*ap->a_aclp));
+ ap->a_aclp->acl_cnt = 0;
+ error = 0;
+ break;
+
+ case 0:
+ break;
+
+ default:
+ }
+ break;
+
+ default:
+ error = EINVAL;
+ }
+
+ return (error);
+}
+
+/*
+ * Set the ACL on a file.
+ *
+ * As part of the ACL is stored in the inode, and the rest in an EA,
+ * this is necessarily non-atomic, and has complex authorization.
+ * As ufs_setacl() includes elements of ufs_chown() and ufs_chmod(),
+ * a fair number of different access checks may be required to go ahead
+ * with the operation at all.
+ */
+int
+ufs_setacl(ap)
+ struct vop_setacl_args /* {
+ struct vnode *vp;
+ acl_type_t type;
+ struct acl *aclp;
+ struct ucred *cred;
+ struct proc *p;
+ } */ *ap;
+{
+ struct inode *ip = VTOI(ap->a_vp);
+ struct acl_entry *acl_user_obj, *acl_group_obj, *acl_other;
+ mode_t old_mode, preserve_mask;
+ uid_t old_uid, new_uid = 0;
+ gid_t old_gid, new_gid = 0;
+ int error, i;
+
+ /*
+ * If this is a set operation rather than a delete operation,
+ * invoke VOP_ACLCHECK() on the passed ACL to determine if it is
+ * valid for the target. This will include a check on ap->a_type.
+ */
+ if (ap->a_aclp != NULL) {
+ /*
+ * Set operation.
+ */
+ error = VOP_ACLCHECK(ap->a_vp, ap->a_type, ap->a_aclp,
+ ap->a_cred, ap->a_p);
+ if (error != 0)
+ return (error);
+ } else {
+ /*
+ * Delete operation.
+ * POSIX.1e allows only deletion of the default ACL on a
+ * directory (ACL_TYPE_DEFAULT).
+ */
+ if (ap->a_type != ACL_TYPE_DEFAULT)
+ return (EINVAL);
+ if (ap->a_vp->v_type != VDIR)
+ return (ENOTDIR);
+ }
+
+ if (ap->a_vp->v_mount->mnt_flag & MNT_RDONLY)
+ return (EROFS);
+
+ /*
+ * Authorize the ACL operation.
+ */
+ if (ip->i_flags & (IMMUTABLE | APPEND))
+ return (EPERM);
+
+ /*
+ * Must hold VADMIN (be file owner) or have appropriate privilege.
+ */
+ if ((error = VOP_ACCESS(ap->a_vp, VADMIN, ap->a_cred, ap->a_p)))
+ return (error);
+
+ /*
+ * ACL_TYPE_ACCESS may involve the changing of ownership, sticky
+ * bit, setugid bits on the file or directory. As such, it requires
+ * special handling to identify these changes, and to authorize
+ * them.
+ * ACL_TYPE_DEFAULT does not require this, and ap->a_aclp should
+ * not be dereferenced without a NULL check, as it may be a delete
+ * operation.
+ */
+ switch(ap->a_type) {
+ case ACL_TYPE_ACCESS:
+ /*
+ * Identify ACL_USER_OBJ, ACL_GROUP_OBJ, and determine if
+ * they have changed. If so, authorize in the style of
+ * ufs_chown(). While we're at it, identify ACL_OTHER.
+ */
+ acl_user_obj = acl_group_obj = acl_other = NULL;
+ for (i = 0; i < ap->a_aclp->acl_cnt; i++)
+ switch(ap->a_aclp->acl_entry[i].ae_tag) {
+ case ACL_USER_OBJ:
+ acl_user_obj = &ap->a_aclp->acl_entry[i];
+ new_uid = acl_user_obj->ae_id;
+ break;
+ case ACL_GROUP_OBJ:
+ acl_group_obj = &ap->a_aclp->acl_entry[i];
+ new_gid = acl_group_obj->ae_id;
+ break;
+ case ACL_OTHER:
+ acl_other = &ap->a_aclp->acl_entry[i];
+ break;
+ default:
+ }
+ old_uid = ip->i_uid;
+ old_gid = ip->i_gid;
+
+ /*
+ * Authorize changes to base object ownership in the style
+ * of ufs_chown().
+ */
+ if (new_uid != old_uid && (error = suser_xxx(ap->a_cred,
+ ap->a_p, PRISON_ROOT)))
+ return (error);
+ if (new_gid != old_gid && !groupmember(new_gid, ap->a_cred) &&
+ (error = suser_xxx(ap->a_cred, ap->a_p, PRISON_ROOT)))
+ return (error);
+
+ case ACL_TYPE_DEFAULT:
+ /*
+ * ACL_TYPE_DEFAULT can literally be written straight into
+ * the EA unhindered, as it has gone through sanity checking
+ * already.
+ */
+ break;
+
+ default:
+ panic("ufs_setacl(): unknown acl type\n");
+ }
+
+ switch(ap->a_type) {
+ case ACL_TYPE_ACCESS:
+ error = vn_extattr_set(ap->a_vp, IO_NODELOCKED,
+ POSIX1E_ACL_ACCESS_EXTATTR_NAMESPACE,
+ POSIX1E_ACL_ACCESS_EXTATTR_NAME, sizeof(*ap->a_aclp),
+ (char *) ap->a_aclp, ap->a_p);
+ break;
+
+ case ACL_TYPE_DEFAULT:
+ if (ap->a_aclp == NULL) {
+ error = vn_extattr_rm(ap->a_vp, IO_NODELOCKED,
+ POSIX1E_ACL_DEFAULT_EXTATTR_NAMESPACE,
+ POSIX1E_ACL_DEFAULT_EXTATTR_NAME, ap->a_p);
+ /*
+ * Attempting to delete a non-present default ACL
+ * will return success for portability purposes.
+ * (TRIX)
+ */
+ /* XXX: the ENOENT here will eventually be ENOATTR. */
+ if (error == EINVAL)
+ error = 0;
+ } else
+ error = vn_extattr_set(ap->a_vp, IO_NODELOCKED,
+ POSIX1E_ACL_DEFAULT_EXTATTR_NAMESPACE,
+ POSIX1E_ACL_DEFAULT_EXTATTR_NAME,
+ sizeof(*ap->a_aclp), (char *) ap->a_aclp, ap->a_p);
+ break;
+
+ default:
+ error = EINVAL;
+ }
+ /*
+ * Map lack of attribute definition in UFS_EXTATTR into lack of
+ * support for ACLs on the file system.
+ */
+ /* XXX: ENOENT here will eventually be ENOATTR. */
+ if (error == ENOENT)
+ return (EOPNOTSUPP);
+ if (error != 0)
+ return (error);
+
+ if (ap->a_type == ACL_TYPE_ACCESS) {
+ /*
+ * Now that the EA is successfully updated, update the
+ * inode and mark it as changed.
+ */
+ old_uid = ip->i_uid;
+ old_gid = ip->i_gid;
+ old_mode = ip->i_mode;
+ preserve_mask = ISVTX | ISGID | ISUID;
+ ufs_sync_inode_from_acl(ap->a_aclp, ip, preserve_mask);
+
+ /*
+ * Clear the ISGID and ISUID bits if the ownership has
+ * changed, or appropriate privilege is not available.
+ * XXX: This should probably be a check for broadening
+ * availability of the bits, but it's not clear from the
+ * spec.
+ */
+ if (suser_xxx(ap->a_cred, NULL, PRISON_ROOT) &&
+ (ip->i_gid != old_gid || ip->i_uid != old_uid))
+ ip->i_mode &= ~(ISUID | ISGID);
+ ip->i_flag |= IN_CHANGE;
+ }
+
+ VN_KNOTE(ap->a_vp, NOTE_ATTRIB);
+ return (0);
+}
+
+/*
+ * Check the validity of an ACL for a file.
+ */
+int
+ufs_aclcheck(ap)
+ struct vop_aclcheck_args /* {
+ struct vnode *vp;
+ acl_type_t type;
+ struct acl *aclp;
+ struct ucred *cred;
+ struct proc *p;
+ } */ *ap;
+{
+
+ /*
+ * Verify we understand this type of ACL, and that it applies
+ * to this kind of object.
+ * Rely on the acl_posix1e_check() routine to verify the contents.
+ */
+ switch(ap->a_type) {
+ case ACL_TYPE_ACCESS:
+ break;
+
+ case ACL_TYPE_DEFAULT:
+ if (ap->a_vp->v_type != VDIR)
+ return (EINVAL);
+ break;
+
+ default:
+ return (EINVAL);
+ }
+ return (acl_posix1e_check(ap->a_aclp));
+}
+
+#endif /* !UFS_ACL */
diff --git a/sys/ufs/ufs/ufs_vnops.c b/sys/ufs/ufs/ufs_vnops.c
index 44fe3c8..9db19e2 100644
--- a/sys/ufs/ufs/ufs_vnops.c
+++ b/sys/ufs/ufs/ufs_vnops.c
@@ -41,6 +41,7 @@
#include "opt_quota.h"
#include "opt_suiddir.h"
+#include "opt_ufs.h"
#include <sys/param.h>
#include <sys/systm.h>
@@ -52,12 +53,13 @@
#include <sys/buf.h>
#include <sys/mount.h>
#include <sys/unistd.h>
-#include <sys/vnode.h>
#include <sys/malloc.h>
+#include <sys/vnode.h>
#include <sys/dirent.h>
#include <sys/lockf.h>
#include <sys/event.h>
#include <sys/conf.h>
+#include <sys/acl.h>
#include <machine/mutex.h>
@@ -68,6 +70,7 @@
#include <miscfs/fifofs/fifo.h>
+#include <ufs/ufs/acl.h>
#include <ufs/ufs/extattr.h>
#include <ufs/ufs/quota.h>
#include <ufs/ufs/inode.h>
@@ -308,8 +311,10 @@ ufs_access(ap)
struct vnode *vp = ap->a_vp;
struct inode *ip = VTOI(vp);
mode_t mode = ap->a_mode;
-#ifdef QUOTA
int error;
+#ifdef UFS_ACL
+ struct acl *acl;
+ int len;
#endif
/*
@@ -338,8 +343,35 @@ ufs_access(ap)
if ((mode & VWRITE) && (ip->i_flags & (IMMUTABLE | SF_SNAPSHOT)))
return (EPERM);
- return (vaccess(vp->v_type, ip->i_mode, ip->i_uid, ip->i_gid,
- ap->a_mode, ap->a_cred, NULL));
+#ifdef UFS_ACL
+ MALLOC(acl, struct acl *, sizeof(*acl), M_ACL, M_WAITOK);
+ len = sizeof(*acl);
+ error = VOP_GETACL(vp, ACL_TYPE_ACCESS, acl, ap->a_cred, ap->a_p);
+ switch (error) {
+ case EOPNOTSUPP:
+ error = vaccess(vp->v_type, ip->i_mode, ip->i_uid, ip->i_gid,
+ ap->a_mode, ap->a_cred, NULL);
+ break;
+ case 0:
+ error = vaccess_acl_posix1e(vp->v_type, acl, ap->a_mode,
+ ap->a_cred, NULL);
+ break;
+ default:
+ printf("ufs_access(): Error retrieving ACL on object (%d).\n",
+ error);
+ /*
+ * XXX: Fall back until debugged. Should eventually
+ * possibly log an error, and return EPERM for safety.
+ */
+ error = vaccess(vp->v_type, ip->i_mode, ip->i_uid, ip->i_gid,
+ ap->a_mode, ap->a_cred, NULL);
+ }
+ FREE(acl, M_ACL);
+#else
+ error = vaccess(vp->v_type, ip->i_mode, ip->i_uid, ip->i_gid,
+ ap->a_mode, ap->a_cred, NULL);
+#endif
+ return (error);
}
/* ARGSUSED */
@@ -1279,6 +1311,9 @@ ufs_mkdir(ap)
struct buf *bp;
struct dirtemplate dirtemplate, *dtp;
struct direct newdir;
+#ifdef UFS_ACL
+ struct acl *acl, *dacl;
+#endif
int error, dmode;
long blkoff;
@@ -1360,7 +1395,54 @@ ufs_mkdir(ap)
#endif
#endif /* !SUIDDIR */
ip->i_flag |= IN_ACCESS | IN_CHANGE | IN_UPDATE;
+#ifdef UFS_ACL
+ MALLOC(acl, struct acl *, sizeof(*acl), M_ACL, M_WAITOK);
+ MALLOC(dacl, struct acl *, sizeof(*acl), M_ACL, M_WAITOK);
+
+ /*
+ * Retrieve default ACL from parent, if any.
+ */
+ error = VOP_GETACL(dvp, ACL_TYPE_DEFAULT, acl, cnp->cn_cred,
+ cnp->cn_proc);
+ switch (error) {
+ case 0:
+ /*
+ * Retrieved a default ACL, so merge mode and ACL if
+ * necessary.
+ */
+ if (acl->acl_cnt != 0) {
+ /*
+ * Two possible ways for default ACL to not be
+ * present. First, the EA can be undefined,
+ * or second, the default ACL can be blank.
+ * If it's blank, fall through to the it's
+ * not defined case.
+ */
+ ip->i_mode = dmode;
+ *dacl = *acl;
+ ufs_sync_acl_from_inode(ip, acl);
+ break;
+ }
+ /* FALLTHROUGH */
+
+ case EOPNOTSUPP:
+ /*
+ * Just use the mode as-is.
+ */
+ ip->i_mode = dmode;
+ FREE(acl, M_ACL);
+ FREE(dacl, M_ACL);
+ dacl = acl = NULL;
+ break;
+
+ default:
+ UFS_VFREE(tvp, ip->i_number, dmode);
+ vput(tvp);
+ return (error);
+ }
+#else /* !UFS_ACL */
ip->i_mode = dmode;
+#endif /* !UFS_ACL */
tvp->v_type = VDIR; /* Rest init'd in getnewvnode(). */
ip->i_effnlink = 2;
ip->i_nlink = 2;
@@ -1382,6 +1464,41 @@ ufs_mkdir(ap)
error = UFS_UPDATE(tvp, !(DOINGSOFTDEP(dvp) | DOINGASYNC(dvp)));
if (error)
goto bad;
+#ifdef UFS_ACL
+ if (acl != NULL) {
+ /*
+ * XXX: If we abort now, will Soft Updates notify the extattr
+ * code that the EAs for the file need to be released?
+ */
+ error = VOP_SETACL(tvp, ACL_TYPE_ACCESS, acl, cnp->cn_cred,
+ cnp->cn_proc);
+ if (error == 0)
+ error = VOP_SETACL(tvp, ACL_TYPE_DEFAULT, dacl,
+ cnp->cn_cred, cnp->cn_proc);
+ switch (error) {
+ case 0:
+ break;
+
+ case EOPNOTSUPP:
+ /*
+ * XXX: This should not happen, as EOPNOTSUPP above
+ * was supposed to free acl.
+ */
+ printf("ufs_mkdir: VOP_GETACL() but no VOP_SETACL()\n");
+ /*
+ panic("ufs_mkdir: VOP_GETACL() but no VOP_SETACL()");
+ */
+ break;
+
+ default:
+ FREE(acl, M_ACL);
+ FREE(dacl, M_ACL);
+ goto bad;
+ }
+ FREE(acl, M_ACL);
+ FREE(dacl, M_ACL);
+ }
+#endif /* !UFS_ACL */
/*
* Initialize directory with "." and ".." from static template.
@@ -2049,6 +2166,7 @@ ufs_vinit(mntp, specops, fifoops, vpp)
/*
* Allocate a new inode.
+ * Vnode dvp must be locked.
*/
int
ufs_makeinode(mode, dvp, vpp, cnp)
@@ -2060,6 +2178,9 @@ ufs_makeinode(mode, dvp, vpp, cnp)
register struct inode *ip, *pdir;
struct direct newdir;
struct vnode *tvp;
+#ifdef UFS_ACL
+ struct acl *acl;
+#endif
int error;
pdir = VTOI(dvp);
@@ -2132,7 +2253,49 @@ ufs_makeinode(mode, dvp, vpp, cnp)
#endif
#endif /* !SUIDDIR */
ip->i_flag |= IN_ACCESS | IN_CHANGE | IN_UPDATE;
+#ifdef UFS_ACL
+ MALLOC(acl, struct acl *, sizeof(*acl), M_ACL, M_WAITOK);
+ /*
+ * Retrieve default ACL for parent, if any.
+ */
+ error = VOP_GETACL(dvp, ACL_TYPE_DEFAULT, acl, cnp->cn_cred,
+ cnp->cn_proc);
+ switch (error) {
+ case 0:
+ /*
+ * Retrieved a default ACL, so merge mode and ACL if
+ * necessary.
+ */
+ if (acl->acl_cnt != 0) {
+ /*
+ * Two possible ways for default ACL to not be
+ * present. First, the EA can be undefined,
+ * or second, the default ACL can be blank.
+ * If it's blank, fall through to the it's
+ * not defined case.
+ */
+ ip->i_mode = mode;
+ ufs_sync_acl_from_inode(ip, acl);
+ break;
+ }
+
+ case EOPNOTSUPP:
+ /*
+ * Just use the mode as-is.
+ */
+ ip->i_mode = mode;
+ FREE(acl, M_ACL);
+ acl = NULL;
+ break;
+
+ default:
+ UFS_VFREE(tvp, ip->i_number, mode);
+ vput(tvp);
+ return (error);
+ }
+#else /* !UFS_ACL */
ip->i_mode = mode;
+#endif /* !UFS_ACL */
tvp->v_type = IFTOVT(mode); /* Rest init'd in getnewvnode(). */
ip->i_effnlink = 1;
ip->i_nlink = 1;
@@ -2151,6 +2314,36 @@ ufs_makeinode(mode, dvp, vpp, cnp)
error = UFS_UPDATE(tvp, !(DOINGSOFTDEP(tvp) | DOINGASYNC(tvp)));
if (error)
goto bad;
+#ifdef UFS_ACL
+ if (acl != NULL) {
+ /*
+ * XXX: If we abort now, will Soft Updates notify the extattr
+ * code that the EAs for the file need to be released?
+ */
+ error = VOP_SETACL(tvp, ACL_TYPE_ACCESS, acl, cnp->cn_cred,
+ cnp->cn_proc);
+ switch (error) {
+ case 0:
+ break;
+
+ case EOPNOTSUPP:
+ /*
+ * XXX: This should not happen, as EOPNOTSUPP above was
+ * supposed to free acl.
+ */
+ printf("ufs_makeinode: VOP_GETACL() but no "
+ "VOP_SETACL()\n");
+ /* panic("ufs_makeinode: VOP_GETACL() but no "
+ "VOP_SETACL()"); */
+ break;
+
+ default:
+ FREE(acl, M_ACL);
+ goto bad;
+ }
+ FREE(acl, M_ACL);
+ }
+#endif /* !UFS_ACL */
ufs_makedirentry(ip, cnp, &newdir);
error = ufs_direnter(dvp, tvp, &newdir, cnp, NULL);
if (error)
@@ -2299,6 +2492,11 @@ static struct vnodeopv_entry_desc ufs_vnodeop_entries[] = {
{ &vop_symlink_desc, (vop_t *) ufs_symlink },
{ &vop_unlock_desc, (vop_t *) vop_stdunlock },
{ &vop_whiteout_desc, (vop_t *) ufs_whiteout },
+#ifdef UFS_ACL
+ { &vop_getacl_desc, (vop_t *) ufs_getacl },
+ { &vop_setacl_desc, (vop_t *) ufs_setacl },
+ { &vop_aclcheck_desc, (vop_t *) ufs_aclcheck },
+#endif
{ NULL, NULL }
};
static struct vnodeopv_desc ufs_vnodeop_opv_desc =
@@ -2320,7 +2518,12 @@ static struct vnodeopv_entry_desc ufs_specop_entries[] = {
{ &vop_setattr_desc, (vop_t *) ufs_setattr },
{ &vop_unlock_desc, (vop_t *) vop_stdunlock },
{ &vop_write_desc, (vop_t *) ufsspec_write },
- { NULL, NULL }
+#ifdef UFS_ACL
+ { &vop_getacl_desc, (vop_t *) ufs_getacl },
+ { &vop_setacl_desc, (vop_t *) ufs_setacl },
+ { &vop_aclcheck_desc, (vop_t *) ufs_aclcheck },
+#endif
+ {NULL, NULL}
};
static struct vnodeopv_desc ufs_specop_opv_desc =
{ &ufs_specop_p, ufs_specop_entries };
@@ -2341,6 +2544,11 @@ static struct vnodeopv_entry_desc ufs_fifoop_entries[] = {
{ &vop_setattr_desc, (vop_t *) ufs_setattr },
{ &vop_unlock_desc, (vop_t *) vop_stdunlock },
{ &vop_write_desc, (vop_t *) ufsfifo_write },
+#ifdef UFS_ACL
+ { &vop_getacl_desc, (vop_t *) ufs_getacl },
+ { &vop_setacl_desc, (vop_t *) ufs_setacl },
+ { &vop_aclcheck_desc, (vop_t *) ufs_aclcheck },
+#endif
{ NULL, NULL }
};
static struct vnodeopv_desc ufs_fifoop_opv_desc =
OpenPOWER on IntegriCloud