cifsacl.c 20.5 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
/*
 *   fs/cifs/cifsacl.c
 *
 *   Copyright (C) International Business Machines  Corp., 2007
 *   Author(s): Steve French (sfrench@us.ibm.com)
 *
 *   Contains the routines for mapping CIFS/NTFS ACLs
 *
 *   This library is free software; you can redistribute it and/or modify
 *   it under the terms of the GNU Lesser General Public License as published
 *   by the Free Software Foundation; either version 2.1 of the License, or
 *   (at your option) any later version.
 *
 *   This library is distributed in the hope that it will be useful,
 *   but WITHOUT ANY WARRANTY; without even the implied warranty of
 *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 *   the GNU Lesser General Public License for more details.
 *
 *   You should have received a copy of the GNU Lesser General Public License
 *   along with this library; if not, write to the Free Software
 *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
 */

24 25 26
#include <linux/fs.h>
#include "cifspdu.h"
#include "cifsglob.h"
27
#include "cifsacl.h"
28 29 30
#include "cifsproto.h"
#include "cifs_debug.h"

S
Steve French 已提交
31 32 33

#ifdef CONFIG_CIFS_EXPERIMENTAL

34
static struct cifs_wksid wksidarr[NUM_WK_SIDS] = {
S
Steve French 已提交
35 36
	{{1, 0, {0, 0, 0, 0, 0, 0}, {0, 0, 0, 0, 0} }, "null user"},
	{{1, 1, {0, 0, 0, 0, 0, 1}, {0, 0, 0, 0, 0} }, "nobody"},
37 38 39 40
	{{1, 1, {0, 0, 0, 0, 0, 5}, {cpu_to_le32(11), 0, 0, 0, 0} }, "net-users"},
	{{1, 1, {0, 0, 0, 0, 0, 5}, {cpu_to_le32(18), 0, 0, 0, 0} }, "sys"},
	{{1, 2, {0, 0, 0, 0, 0, 5}, {cpu_to_le32(32), cpu_to_le32(544), 0, 0, 0} }, "root"},
	{{1, 2, {0, 0, 0, 0, 0, 5}, {cpu_to_le32(32), cpu_to_le32(545), 0, 0, 0} }, "users"},
S
Steve French 已提交
41 42
	{{1, 2, {0, 0, 0, 0, 0, 5}, {cpu_to_le32(32), cpu_to_le32(546), 0, 0, 0} }, "guest"} }
;
S
Steve French 已提交
43 44


45
/* security id for everyone */
46 47
static const struct cifs_sid sid_everyone = {
	1, 1, {0, 0, 0, 0, 0, 1}, {0} };
48 49
/* group users */
static const struct cifs_sid sid_user =
S
Steve French 已提交
50
		{1, 2 , {0, 0, 0, 0, 0, 5}, {} };
51

S
Steve French 已提交
52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77

int match_sid(struct cifs_sid *ctsid)
{
	int i, j;
	int num_subauth, num_sat, num_saw;
	struct cifs_sid *cwsid;

	if (!ctsid)
		return (-1);

	for (i = 0; i < NUM_WK_SIDS; ++i) {
		cwsid = &(wksidarr[i].cifssid);

		/* compare the revision */
		if (ctsid->revision != cwsid->revision)
			continue;

		/* compare all of the six auth values */
		for (j = 0; j < 6; ++j) {
			if (ctsid->authority[j] != cwsid->authority[j])
				break;
		}
		if (j < 6)
			continue; /* all of the auth values did not match */

		/* compare all of the subauth values if any */
78 79
		num_sat = ctsid->num_subauth;
		num_saw = cwsid->num_subauth;
S
Steve French 已提交
80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97
		num_subauth = num_sat < num_saw ? num_sat : num_saw;
		if (num_subauth) {
			for (j = 0; j < num_subauth; ++j) {
				if (ctsid->sub_auth[j] != cwsid->sub_auth[j])
					break;
			}
			if (j < num_subauth)
				continue; /* all sub_auth values do not match */
		}

		cFYI(1, ("matching sid: %s\n", wksidarr[i].sidname));
		return (0); /* sids compare/match */
	}

	cFYI(1, ("No matching sid"));
	return (-1);
}

S
Steve French 已提交
98 99
/* if the two SIDs (roughly equivalent to a UUID for a user or group) are
   the same returns 1, if they do not match returns 0 */
S
Steve French 已提交
100
int compare_sids(const struct cifs_sid *ctsid, const struct cifs_sid *cwsid)
S
Steve French 已提交
101 102 103 104 105
{
	int i;
	int num_subauth, num_sat, num_saw;

	if ((!ctsid) || (!cwsid))
S
Steve French 已提交
106
		return (0);
S
Steve French 已提交
107 108 109

	/* compare the revision */
	if (ctsid->revision != cwsid->revision)
S
Steve French 已提交
110
		return (0);
S
Steve French 已提交
111 112 113 114

	/* compare all of the six auth values */
	for (i = 0; i < 6; ++i) {
		if (ctsid->authority[i] != cwsid->authority[i])
S
Steve French 已提交
115
			return (0);
S
Steve French 已提交
116 117 118
	}

	/* compare all of the subauth values if any */
S
Steve French 已提交
119
	num_sat = ctsid->num_subauth;
S
Steve French 已提交
120
	num_saw = cwsid->num_subauth;
S
Steve French 已提交
121 122 123 124
	num_subauth = num_sat < num_saw ? num_sat : num_saw;
	if (num_subauth) {
		for (i = 0; i < num_subauth; ++i) {
			if (ctsid->sub_auth[i] != cwsid->sub_auth[i])
S
Steve French 已提交
125
				return (0);
S
Steve French 已提交
126 127 128
		}
	}

S
Steve French 已提交
129
	return (1); /* sids compare/match */
S
Steve French 已提交
130 131
}

132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179

/* copy ntsd, owner sid, and group sid from a security descriptor to another */
static void copy_sec_desc(const struct cifs_ntsd *pntsd,
				struct cifs_ntsd *pnntsd, __u32 sidsoffset)
{
	int i;

	struct cifs_sid *owner_sid_ptr, *group_sid_ptr;
	struct cifs_sid *nowner_sid_ptr, *ngroup_sid_ptr;

	/* copy security descriptor control portion */
	pnntsd->revision = pntsd->revision;
	pnntsd->type = pntsd->type;
	pnntsd->dacloffset = cpu_to_le32(sizeof(struct cifs_ntsd));
	pnntsd->sacloffset = 0;
	pnntsd->osidoffset = cpu_to_le32(sidsoffset);
	pnntsd->gsidoffset = cpu_to_le32(sidsoffset + sizeof(struct cifs_sid));

	/* copy owner sid */
	owner_sid_ptr = (struct cifs_sid *)((char *)pntsd +
				le32_to_cpu(pntsd->osidoffset));
	nowner_sid_ptr = (struct cifs_sid *)((char *)pnntsd + sidsoffset);

	nowner_sid_ptr->revision = owner_sid_ptr->revision;
	nowner_sid_ptr->num_subauth = owner_sid_ptr->num_subauth;
	for (i = 0; i < 6; i++)
		nowner_sid_ptr->authority[i] = owner_sid_ptr->authority[i];
	for (i = 0; i < 5; i++)
		nowner_sid_ptr->sub_auth[i] = owner_sid_ptr->sub_auth[i];

	/* copy group sid */
	group_sid_ptr = (struct cifs_sid *)((char *)pntsd +
				le32_to_cpu(pntsd->gsidoffset));
	ngroup_sid_ptr = (struct cifs_sid *)((char *)pnntsd + sidsoffset +
					sizeof(struct cifs_sid));

	ngroup_sid_ptr->revision = group_sid_ptr->revision;
	ngroup_sid_ptr->num_subauth = group_sid_ptr->num_subauth;
	for (i = 0; i < 6; i++)
		ngroup_sid_ptr->authority[i] = group_sid_ptr->authority[i];
	for (i = 0; i < 5; i++)
		ngroup_sid_ptr->sub_auth[i] =
				cpu_to_le32(group_sid_ptr->sub_auth[i]);

	return;
}


S
Steve French 已提交
180 181 182 183 184
/*
   change posix mode to reflect permissions
   pmode is the existing mode (we only want to overwrite part of this
   bits to set can be: S_IRWXU, S_IRWXG or S_IRWXO ie 00700 or 00070 or 00007
*/
A
Al Viro 已提交
185
static void access_flags_to_mode(__le32 ace_flags, int type, umode_t *pmode,
186
				 umode_t *pbits_to_set)
S
Steve French 已提交
187
{
A
Al Viro 已提交
188
	__u32 flags = le32_to_cpu(ace_flags);
189
	/* the order of ACEs is important.  The canonical order is to begin with
190
	   DENY entries followed by ALLOW, otherwise an allow entry could be
191
	   encountered first, making the subsequent deny entry like "dead code"
192
	   which would be superflous since Windows stops when a match is made
193 194 195 196 197
	   for the operation you are trying to perform for your user */

	/* For deny ACEs we change the mask so that subsequent allow access
	   control entries do not turn on the bits we are denying */
	if (type == ACCESS_DENIED) {
A
Al Viro 已提交
198
		if (flags & GENERIC_ALL) {
199 200
			*pbits_to_set &= ~S_IRWXUGO;
		}
A
Al Viro 已提交
201 202
		if ((flags & GENERIC_WRITE) ||
			((flags & FILE_WRITE_RIGHTS) == FILE_WRITE_RIGHTS))
203
			*pbits_to_set &= ~S_IWUGO;
A
Al Viro 已提交
204 205
		if ((flags & GENERIC_READ) ||
			((flags & FILE_READ_RIGHTS) == FILE_READ_RIGHTS))
206
			*pbits_to_set &= ~S_IRUGO;
A
Al Viro 已提交
207 208
		if ((flags & GENERIC_EXECUTE) ||
			((flags & FILE_EXEC_RIGHTS) == FILE_EXEC_RIGHTS))
209 210 211 212 213 214 215
			*pbits_to_set &= ~S_IXUGO;
		return;
	} else if (type != ACCESS_ALLOWED) {
		cERROR(1, ("unknown access control type %d", type));
		return;
	}
	/* else ACCESS_ALLOWED type */
S
Steve French 已提交
216

A
Al Viro 已提交
217
	if (flags & GENERIC_ALL) {
218
		*pmode |= (S_IRWXUGO & (*pbits_to_set));
S
Steve French 已提交
219
#ifdef CONFIG_CIFS_DEBUG2
S
Steve French 已提交
220
		cFYI(1, ("all perms"));
S
Steve French 已提交
221
#endif
S
Steve French 已提交
222 223
		return;
	}
A
Al Viro 已提交
224 225
	if ((flags & GENERIC_WRITE) ||
			((flags & FILE_WRITE_RIGHTS) == FILE_WRITE_RIGHTS))
226
		*pmode |= (S_IWUGO & (*pbits_to_set));
A
Al Viro 已提交
227 228
	if ((flags & GENERIC_READ) ||
			((flags & FILE_READ_RIGHTS) == FILE_READ_RIGHTS))
229
		*pmode |= (S_IRUGO & (*pbits_to_set));
A
Al Viro 已提交
230 231
	if ((flags & GENERIC_EXECUTE) ||
			((flags & FILE_EXEC_RIGHTS) == FILE_EXEC_RIGHTS))
232
		*pmode |= (S_IXUGO & (*pbits_to_set));
S
Steve French 已提交
233

S
Steve French 已提交
234
#ifdef CONFIG_CIFS_DEBUG2
A
Al Viro 已提交
235
	cFYI(1, ("access flags 0x%x mode now 0x%x", flags, *pmode));
S
Steve French 已提交
236
#endif
S
Steve French 已提交
237 238 239
	return;
}

240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270
/*
   Generate access flags to reflect permissions mode is the existing mode.
   This function is called for every ACE in the DACL whose SID matches
   with either owner or group or everyone.
*/

static void mode_to_access_flags(umode_t mode, umode_t bits_to_use,
				__u32 *pace_flags)
{
	/* reset access mask */
	*pace_flags = 0x0;

	/* bits to use are either S_IRWXU or S_IRWXG or S_IRWXO */
	mode &= bits_to_use;

	/* check for R/W/X UGO since we do not know whose flags
	   is this but we have cleared all the bits sans RWX for
	   either user or group or other as per bits_to_use */
	if (mode & S_IRUGO)
		*pace_flags |= SET_FILE_READ_RIGHTS;
	if (mode & S_IWUGO)
		*pace_flags |= SET_FILE_WRITE_RIGHTS;
	if (mode & S_IXUGO)
		*pace_flags |= SET_FILE_EXEC_RIGHTS;

#ifdef CONFIG_CIFS_DEBUG2
	cFYI(1, ("mode: 0x%x, access flags now 0x%x", mode, *pace_flags));
#endif
	return;
}

271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297
static __le16 fill_ace_for_sid(struct cifs_ace *pntace,
			const struct cifs_sid *psid, __u64 nmode, umode_t bits)
{
	int i;
	__u16 size = 0;
	__u32 access_req = 0;

	pntace->type = ACCESS_ALLOWED;
	pntace->flags = 0x0;
	mode_to_access_flags(nmode, bits, &access_req);
	if (!access_req)
		access_req = SET_MINIMUM_RIGHTS;
	pntace->access_req = cpu_to_le32(access_req);

	pntace->sid.revision = psid->revision;
	pntace->sid.num_subauth = psid->num_subauth;
	for (i = 0; i < 6; i++)
		pntace->sid.authority[i] = psid->authority[i];
	for (i = 0; i < psid->num_subauth; i++)
		pntace->sid.sub_auth[i] = psid->sub_auth[i];

	size = 1 + 1 + 2 + 4 + 1 + 1 + 6 + (psid->num_subauth * 4);
	pntace->size = cpu_to_le16(size);

	return (size);
}

S
Steve French 已提交
298

299 300
#ifdef CONFIG_CIFS_DEBUG2
static void dump_ace(struct cifs_ace *pace, char *end_of_acl)
301 302 303 304
{
	int num_subauth;

	/* validate that we do not go past end of acl */
S
Steve French 已提交
305

S
Steve French 已提交
306 307 308 309 310 311
	if (le16_to_cpu(pace->size) < 16) {
		cERROR(1, ("ACE too small, %d", le16_to_cpu(pace->size)));
		return;
	}

	if (end_of_acl < (char *)pace + le16_to_cpu(pace->size)) {
312 313
		cERROR(1, ("ACL too small to parse ACE"));
		return;
S
Steve French 已提交
314
	}
315

S
Steve French 已提交
316
	num_subauth = pace->sid.num_subauth;
317
	if (num_subauth) {
318
		int i;
S
Steve French 已提交
319 320
		cFYI(1, ("ACE revision %d num_auth %d type %d flags %d size %d",
			pace->sid.revision, pace->sid.num_subauth, pace->type,
321
			pace->flags, le16_to_cpu(pace->size)));
S
Steve French 已提交
322 323
		for (i = 0; i < num_subauth; ++i) {
			cFYI(1, ("ACE sub_auth[%d]: 0x%x", i,
S
Steve French 已提交
324
				le32_to_cpu(pace->sid.sub_auth[i])));
S
Steve French 已提交
325 326 327 328 329 330 331 332
		}

		/* BB add length check to make sure that we do not have huge
			num auths and therefore go off the end */
	}

	return;
}
333
#endif
S
Steve French 已提交
334

335

S
Steve French 已提交
336
static void parse_dacl(struct cifs_acl *pdacl, char *end_of_acl,
S
Steve French 已提交
337
		       struct cifs_sid *pownersid, struct cifs_sid *pgrpsid,
S
Steve French 已提交
338
		       struct inode *inode)
339 340 341 342 343 344 345 346 347
{
	int i;
	int num_aces = 0;
	int acl_size;
	char *acl_base;
	struct cifs_ace **ppace;

	/* BB need to add parm so we can store the SID BB */

348 349 350 351 352 353 354
	if (!pdacl) {
		/* no DACL in the security descriptor, set
		   all the permissions for user/group/other */
		inode->i_mode |= S_IRWXUGO;
		return;
	}

355
	/* validate that we do not go past end of acl */
356
	if (end_of_acl < (char *)pdacl + le16_to_cpu(pdacl->size)) {
357 358 359 360 361 362
		cERROR(1, ("ACL too small to parse DACL"));
		return;
	}

#ifdef CONFIG_CIFS_DEBUG2
	cFYI(1, ("DACL revision %d size %d num aces %d",
363 364
		le16_to_cpu(pdacl->revision), le16_to_cpu(pdacl->size),
		le32_to_cpu(pdacl->num_aces)));
365 366
#endif

367 368 369 370 371
	/* reset rwx permissions for user/group/other.
	   Also, if num_aces is 0 i.e. DACL has no ACEs,
	   user/group/other have no permissions */
	inode->i_mode &= ~(S_IRWXUGO);

372 373 374
	acl_base = (char *)pdacl;
	acl_size = sizeof(struct cifs_acl);

S
Steve French 已提交
375
	num_aces = le32_to_cpu(pdacl->num_aces);
376
	if (num_aces  > 0) {
377 378 379 380
		umode_t user_mask = S_IRWXU;
		umode_t group_mask = S_IRWXG;
		umode_t other_mask = S_IRWXO;

381 382 383
		ppace = kmalloc(num_aces * sizeof(struct cifs_ace *),
				GFP_KERNEL);

S
Steve French 已提交
384 385 386
/*		cifscred->cecount = pdacl->num_aces;
		cifscred->aces = kmalloc(num_aces *
			sizeof(struct cifs_ace *), GFP_KERNEL);*/
387 388

		for (i = 0; i < num_aces; ++i) {
S
Steve French 已提交
389
			ppace[i] = (struct cifs_ace *) (acl_base + acl_size);
390 391 392
#ifdef CONFIG_CIFS_DEBUG2
			dump_ace(ppace[i], end_of_acl);
#endif
393 394
			if (compare_sids(&(ppace[i]->sid), pownersid))
				access_flags_to_mode(ppace[i]->access_req,
395 396 397
						     ppace[i]->type,
						     &(inode->i_mode),
						     &user_mask);
398 399
			if (compare_sids(&(ppace[i]->sid), pgrpsid))
				access_flags_to_mode(ppace[i]->access_req,
400 401 402
						     ppace[i]->type,
						     &(inode->i_mode),
						     &group_mask);
403 404
			if (compare_sids(&(ppace[i]->sid), &sid_everyone))
				access_flags_to_mode(ppace[i]->access_req,
405 406 407
						     ppace[i]->type,
						     &(inode->i_mode),
						     &other_mask);
408

S
Steve French 已提交
409
/*			memcpy((void *)(&(cifscred->aces[i])),
S
Steve French 已提交
410 411
				(void *)ppace[i],
				sizeof(struct cifs_ace)); */
412

S
Steve French 已提交
413 414
			acl_base = (char *)ppace[i];
			acl_size = le16_to_cpu(ppace[i]->size);
415 416 417 418 419 420 421 422
		}

		kfree(ppace);
	}

	return;
}

423

424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445
static int set_chmod_dacl(struct cifs_acl *pndacl, struct cifs_sid *pownersid,
			struct cifs_sid *pgrpsid, __u64 nmode)
{
	__le16 size = 0;
	struct cifs_acl *pnndacl;

	pnndacl = (struct cifs_acl *)((char *)pndacl + sizeof(struct cifs_acl));

	size += fill_ace_for_sid((struct cifs_ace *) ((char *)pnndacl + size),
					pownersid, nmode, S_IRWXU);
	size += fill_ace_for_sid((struct cifs_ace *)((char *)pnndacl + size),
					pgrpsid, nmode, S_IRWXG);
	size += fill_ace_for_sid((struct cifs_ace *)((char *)pnndacl + size),
					 &sid_everyone, nmode, S_IRWXO);

	pndacl->size = cpu_to_le16(size + sizeof(struct cifs_acl));
	pndacl->num_aces = 3;

	return (0);
}


446 447 448 449
static int parse_sid(struct cifs_sid *psid, char *end_of_acl)
{
	/* BB need to add parm so we can store the SID BB */

S
Steve French 已提交
450 451 452 453
	/* validate that we do not go past end of ACL - sid must be at least 8
	   bytes long (assuming no sub-auths - e.g. the null SID */
	if (end_of_acl < (char *)psid + 8) {
		cERROR(1, ("ACL too small to parse SID %p", psid));
454 455
		return -EINVAL;
	}
456

457
	if (psid->num_subauth) {
458
#ifdef CONFIG_CIFS_DEBUG2
459
		int i;
S
Steve French 已提交
460 461
		cFYI(1, ("SID revision %d num_auth %d",
			psid->revision, psid->num_subauth));
462

463
		for (i = 0; i < psid->num_subauth; i++) {
464
			cFYI(1, ("SID sub_auth[%d]: 0x%x ", i,
S
Steve French 已提交
465
				le32_to_cpu(psid->sub_auth[i])));
466 467
		}

S
Steve French 已提交
468
		/* BB add length check to make sure that we do not have huge
469
			num auths and therefore go off the end */
S
Steve French 已提交
470
		cFYI(1, ("RID 0x%x",
471
			le32_to_cpu(psid->sub_auth[psid->num_subauth-1])));
472
#endif
473 474
	}

475 476 477
	return 0;
}

478

479
/* Convert CIFS ACL to POSIX form */
S
Steve French 已提交
480 481
static int parse_sec_desc(struct cifs_ntsd *pntsd, int acl_len,
			  struct inode *inode)
482
{
483
	int rc;
484 485 486
	struct cifs_sid *owner_sid_ptr, *group_sid_ptr;
	struct cifs_acl *dacl_ptr; /* no need for SACL ptr */
	char *end_of_acl = ((char *)pntsd) + acl_len;
487
	__u32 dacloffset;
488

S
Steve French 已提交
489 490 491
	if ((inode == NULL) || (pntsd == NULL))
		return -EIO;

492
	owner_sid_ptr = (struct cifs_sid *)((char *)pntsd +
493
				le32_to_cpu(pntsd->osidoffset));
494
	group_sid_ptr = (struct cifs_sid *)((char *)pntsd +
495
				le32_to_cpu(pntsd->gsidoffset));
496
	dacloffset = le32_to_cpu(pntsd->dacloffset);
497
	dacl_ptr = (struct cifs_acl *)((char *)pntsd + dacloffset);
498 499 500
#ifdef CONFIG_CIFS_DEBUG2
	cFYI(1, ("revision %d type 0x%x ooffset 0x%x goffset 0x%x "
		 "sacloffset 0x%x dacloffset 0x%x",
501 502
		 pntsd->revision, pntsd->type, le32_to_cpu(pntsd->osidoffset),
		 le32_to_cpu(pntsd->gsidoffset),
503
		 le32_to_cpu(pntsd->sacloffset), dacloffset));
504
#endif
S
Steve French 已提交
505
/*	cifs_dump_mem("owner_sid: ", owner_sid_ptr, 64); */
506 507 508 509 510 511 512 513
	rc = parse_sid(owner_sid_ptr, end_of_acl);
	if (rc)
		return rc;

	rc = parse_sid(group_sid_ptr, end_of_acl);
	if (rc)
		return rc;

514 515
	if (dacloffset)
		parse_dacl(dacl_ptr, end_of_acl, owner_sid_ptr,
516
			   group_sid_ptr, inode);
517 518
	else
		cFYI(1, ("no ACL")); /* BB grant all or default perms? */
519

520 521 522
/*	cifscred->uid = owner_sid_ptr->rid;
	cifscred->gid = group_sid_ptr->rid;
	memcpy((void *)(&(cifscred->osid)), (void *)owner_sid_ptr,
S
Steve French 已提交
523
			sizeof(struct cifs_sid));
524
	memcpy((void *)(&(cifscred->gsid)), (void *)group_sid_ptr,
S
Steve French 已提交
525
			sizeof(struct cifs_sid)); */
526

S
Steve French 已提交
527

528 529
	return (0);
}
S
Steve French 已提交
530 531


532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571
/* Convert permission bits from mode to equivalent CIFS ACL */
static int build_sec_desc(struct cifs_ntsd *pntsd, struct cifs_ntsd *pnntsd,
				int acl_len, struct inode *inode, __u64 nmode)
{
	int rc = 0;
	__u32 dacloffset;
	__u32 ndacloffset;
	__u32 sidsoffset;
	struct cifs_sid *owner_sid_ptr, *group_sid_ptr;
	struct cifs_acl *dacl_ptr = NULL;  /* no need for SACL ptr */
	struct cifs_acl *ndacl_ptr = NULL; /* no need for SACL ptr */

	if ((inode == NULL) || (pntsd == NULL) || (pnntsd == NULL))
		return (-EIO);

	owner_sid_ptr = (struct cifs_sid *)((char *)pntsd +
				le32_to_cpu(pntsd->osidoffset));
	group_sid_ptr = (struct cifs_sid *)((char *)pntsd +
				le32_to_cpu(pntsd->gsidoffset));

	dacloffset = le32_to_cpu(pntsd->dacloffset);
	dacl_ptr = (struct cifs_acl *)((char *)pntsd + dacloffset);

	ndacloffset = sizeof(struct cifs_ntsd);
	ndacl_ptr = (struct cifs_acl *)((char *)pnntsd + ndacloffset);
	ndacl_ptr->revision = dacl_ptr->revision;
	ndacl_ptr->size = 0;
	ndacl_ptr->num_aces = 0;

	rc = set_chmod_dacl(ndacl_ptr, owner_sid_ptr, group_sid_ptr, nmode);

	sidsoffset = ndacloffset + le16_to_cpu(ndacl_ptr->size);

	/* copy security descriptor control portion and owner and group sid */
	copy_sec_desc(pntsd, pnntsd, sidsoffset);

	return (rc);
}


572 573 574
/* Retrieve an ACL from the server */
static struct cifs_ntsd *get_cifs_acl(u32 *pacllen, struct inode *inode,
				       const char *path)
S
Steve French 已提交
575 576 577 578 579 580 581 582 583 584 585 586 587
{
	struct cifsFileInfo *open_file;
	int unlock_file = FALSE;
	int xid;
	int rc = -EIO;
	__u16 fid;
	struct super_block *sb;
	struct cifs_sb_info *cifs_sb;
	struct cifs_ntsd *pntsd = NULL;

	cFYI(1, ("get mode from ACL for %s", path));

	if (inode == NULL)
588
		return NULL;
S
Steve French 已提交
589 590 591 592 593 594

	xid = GetXid();
	open_file = find_readable_file(CIFS_I(inode));
	sb = inode->i_sb;
	if (sb == NULL) {
		FreeXid(xid);
595
		return NULL;
S
Steve French 已提交
596 597 598 599 600 601 602 603 604 605
	}
	cifs_sb = CIFS_SB(sb);

	if (open_file) {
		unlock_file = TRUE;
		fid = open_file->netfid;
	} else {
		int oplock = FALSE;
		/* open file */
		rc = CIFSSMBOpen(xid, cifs_sb->tcon, path, FILE_OPEN,
606
				READ_CONTROL, 0, &fid, &oplock, NULL,
S
Steve French 已提交
607 608 609 610 611
				cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
					CIFS_MOUNT_MAP_SPECIAL_CHR);
		if (rc != 0) {
			cERROR(1, ("Unable to open file to get ACL"));
			FreeXid(xid);
612
			return NULL;
S
Steve French 已提交
613 614 615
		}
	}

616 617
	rc = CIFSSMBGetCIFSACL(xid, cifs_sb->tcon, fid, &pntsd, pacllen);
	cFYI(1, ("GetCIFSACL rc = %d ACL len %d", rc, *pacllen));
S
Steve French 已提交
618 619 620 621 622
	if (unlock_file == TRUE)
		atomic_dec(&open_file->wrtPending);
	else
		CIFSSMBClose(xid, cifs_sb->tcon, fid);

623 624 625 626
	FreeXid(xid);
	return pntsd;
}

627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684
/* Set an ACL on the server */
static int set_cifs_acl(struct cifs_ntsd *pnntsd, __u32 acllen,
				struct inode *inode, const char *path)
{
	struct cifsFileInfo *open_file;
	int unlock_file = FALSE;
	int xid;
	int rc = -EIO;
	__u16 fid;
	struct super_block *sb;
	struct cifs_sb_info *cifs_sb;

#ifdef CONFIG_CIFS_DEBUG2
	cFYI(1, ("set ACL for %s from mode 0x%x", path, inode->i_mode));
#endif

	if (!inode)
		return (rc);

	sb = inode->i_sb;
	if (sb == NULL)
		return (rc);

	cifs_sb = CIFS_SB(sb);
	xid = GetXid();

	open_file = find_readable_file(CIFS_I(inode));
	if (open_file) {
		unlock_file = TRUE;
		fid = open_file->netfid;
	} else {
		int oplock = FALSE;
		/* open file */
		rc = CIFSSMBOpen(xid, cifs_sb->tcon, path, FILE_OPEN,
				WRITE_DAC, 0, &fid, &oplock, NULL,
				cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
					CIFS_MOUNT_MAP_SPECIAL_CHR);
		if (rc != 0) {
			cERROR(1, ("Unable to open file to set ACL"));
			FreeXid(xid);
			return (rc);
		}
	}

	rc = CIFSSMBSetCIFSACL(xid, cifs_sb->tcon, fid, pnntsd, acllen);
#ifdef CONFIG_CIFS_DEBUG2
	cFYI(1, ("SetCIFSACL rc = %d", rc));
#endif
	if (unlock_file == TRUE)
		atomic_dec(&open_file->wrtPending);
	else
		CIFSSMBClose(xid, cifs_sb->tcon, fid);

	FreeXid(xid);

	return (rc);
}

685 686 687 688 689 690 691 692 693 694 695 696 697 698
/* Translate the CIFS ACL (simlar to NTFS ACL) for a file into mode bits */
void acl_to_uid_mode(struct inode *inode, const char *path)
{
	struct cifs_ntsd *pntsd = NULL;
	u32 acllen = 0;
	int rc = 0;

#ifdef CONFIG_CIFS_DEBUG2
	cFYI(1, ("converting ACL to mode for %s", path));
#endif
	pntsd = get_cifs_acl(&acllen, inode, path);

	/* if we can retrieve the ACL, now parse Access Control Entries, ACEs */
	if (pntsd)
S
Steve French 已提交
699
		rc = parse_sec_desc(pntsd, acllen, inode);
700 701 702
	if (rc)
		cFYI(1, ("parse sec desc failed rc = %d", rc));

S
Steve French 已提交
703 704 705
	kfree(pntsd);
	return;
}
706

707
/* Convert mode bits to an ACL so we can update the ACL on the server */
708
int mode_to_acl(struct inode *inode, const char *path, __u64 nmode)
709 710 711
{
	int rc = 0;
	__u32 acllen = 0;
712 713
	struct cifs_ntsd *pntsd = NULL; /* acl obtained from server */
	struct cifs_ntsd *pnntsd = NULL; /* modified acl to be sent to server */
714

715
#ifdef CONFIG_CIFS_DEBUG2
716
	cFYI(1, ("set ACL from mode for %s", path));
717
#endif
718 719

	/* Get the security descriptor */
720
	pntsd = get_cifs_acl(&acllen, inode, path);
721

722 723
	/* Add three ACEs for owner, group, everyone getting rid of
	   other ACEs as chmod disables ACEs and set the security descriptor */
724

725 726 727 728
	if (pntsd) {
		/* allocate memory for the smb header,
		   set security descriptor request security descriptor
		   parameters, and secuirty descriptor itself */
729

730 731 732 733 734 735
		pnntsd = kmalloc(acllen, GFP_KERNEL);
		if (!pnntsd) {
			cERROR(1, ("Unable to allocate security descriptor"));
			kfree(pntsd);
			return (-ENOMEM);
		}
736

737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755
		rc = build_sec_desc(pntsd, pnntsd, acllen, inode, nmode);

#ifdef CONFIG_CIFS_DEBUG2
		cFYI(1, ("build_sec_desc rc: %d", rc));
#endif

		if (!rc) {
			/* Set the security descriptor */
			rc = set_cifs_acl(pnntsd, acllen, inode, path);
#ifdef CONFIG_CIFS_DEBUG2
			cFYI(1, ("set_cifs_acl rc: %d", rc));
#endif
		}

		kfree(pnntsd);
		kfree(pntsd);
	}

	return (rc);
756
}
S
Steve French 已提交
757
#endif /* CONFIG_CIFS_EXPERIMENTAL */