4 small CIFS/SMB3 fixes (mostly witness protocol and reconnect related), and two that add ability to get and set auditing information in the security descriptor (SACL)
-----BEGIN PGP SIGNATURE----- iQGzBAABCgAdFiEE6fsu8pdIjtWE/DpLiiy9cAdyT1EFAl/fppEACgkQiiy9cAdy T1HVJQwAiQr9cny9q+l84pKXEJyv56VXrXRFxsfGl3Xrx0uQRxiSSF6RrKNsqoMt 5m2aBve1rhsDcte4asS7EXM2U6ePRwnmbuKhC+78s0tjfCA6qXLzwF0pJCz7uMxh jbL42gcx87B7PzO7WpRwNHYPGVBk6oZgAECNfZybvzvQI0VEHaS3IX3249btl+r7 +zithRFqD6aqvcZjaPxIjpRt9zb8tU55GG1JgPMRRiaMwW7tFbXWR9ty+kFRhT1q 0HCYXw4cIYUntPc/EeEQ+LOxzRVqBMJelhv1UvnZgKImBSRFjzTLSFsFn/Hwq2tq ncuBML5mP4uTYthXrRxXUW24qlx+5owCdgFyVALX+buQu4GeFtNDROZlsXWMbI2L oOm7sTb0wi6x7CeUJYm8vvS3g0d1QsAnxPgyOnxx1a9/p4vWWBt2kCnpoMmBf50O 9OHk34ffmL2QaK7hLl1HTwxAEz7n0FAvQ8chUQBISsmrxaS33QjxCld5RabPvm1T Csv4LNml =1sd/ -----END PGP SIGNATURE----- Merge tag '5.11-rc-smb3-part2' of git://git.samba.org/sfrench/cifs-2.6 Pull cifs fixes from Steve French: "Four small CIFS/SMB3 fixes (witness protocol and reconnect related), and two that add ability to get and set auditing information in the security descriptor (SACL), which can be helpful not just for backup scenarios ("smbinfo secdesc" etc.) but also for improving security" * tag '5.11-rc-smb3-part2' of git://git.samba.org/sfrench/cifs-2.6: Add SMB 2 support for getting and setting SACLs SMB3: Add support for getting and setting SACLs cifs: Avoid error pointer dereference cifs: Re-indent cifs_swn_reconnect() cifs: Unlock on errors in cifs_swn_reconnect() cifs: Delete a stray unlock in cifs_swn_reconnect()
This commit is contained in:
commit
5828881307
@ -285,8 +285,6 @@ static struct cifs_swn_reg *cifs_find_swn_reg(struct cifs_tcon *tcon)
|
|||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
||||||
|
|
||||||
cifs_dbg(FYI, "Existing swn registration for %s:%s found\n", swnreg->net_name,
|
cifs_dbg(FYI, "Existing swn registration for %s:%s found\n", swnreg->net_name,
|
||||||
swnreg->share_name);
|
swnreg->share_name);
|
||||||
|
|
||||||
@ -482,48 +480,51 @@ static int cifs_swn_store_swn_addr(const struct sockaddr_storage *new,
|
|||||||
|
|
||||||
static int cifs_swn_reconnect(struct cifs_tcon *tcon, struct sockaddr_storage *addr)
|
static int cifs_swn_reconnect(struct cifs_tcon *tcon, struct sockaddr_storage *addr)
|
||||||
{
|
{
|
||||||
|
int ret = 0;
|
||||||
|
|
||||||
/* Store the reconnect address */
|
/* Store the reconnect address */
|
||||||
mutex_lock(&tcon->ses->server->srv_mutex);
|
mutex_lock(&tcon->ses->server->srv_mutex);
|
||||||
if (!cifs_sockaddr_equal(&tcon->ses->server->dstaddr, addr)) {
|
if (cifs_sockaddr_equal(&tcon->ses->server->dstaddr, addr))
|
||||||
int ret;
|
goto unlock;
|
||||||
|
|
||||||
ret = cifs_swn_store_swn_addr(addr, &tcon->ses->server->dstaddr,
|
ret = cifs_swn_store_swn_addr(addr, &tcon->ses->server->dstaddr,
|
||||||
&tcon->ses->server->swn_dstaddr);
|
&tcon->ses->server->swn_dstaddr);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret);
|
cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret);
|
||||||
return ret;
|
goto unlock;
|
||||||
}
|
|
||||||
tcon->ses->server->use_swn_dstaddr = true;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Unregister to stop receiving notifications for the old IP address.
|
|
||||||
*/
|
|
||||||
ret = cifs_swn_unregister(tcon);
|
|
||||||
if (ret < 0) {
|
|
||||||
cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n",
|
|
||||||
__func__, ret);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
* And register to receive notifications for the new IP address now that we have
|
|
||||||
* stored the new address.
|
|
||||||
*/
|
|
||||||
ret = cifs_swn_register(tcon);
|
|
||||||
if (ret < 0) {
|
|
||||||
cifs_dbg(VFS, "%s: Failed to register for witness notifications: %d\n",
|
|
||||||
__func__, ret);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
spin_lock(&GlobalMid_Lock);
|
|
||||||
if (tcon->ses->server->tcpStatus != CifsExiting)
|
|
||||||
tcon->ses->server->tcpStatus = CifsNeedReconnect;
|
|
||||||
spin_unlock(&GlobalMid_Lock);
|
|
||||||
}
|
}
|
||||||
|
tcon->ses->server->use_swn_dstaddr = true;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Unregister to stop receiving notifications for the old IP address.
|
||||||
|
*/
|
||||||
|
ret = cifs_swn_unregister(tcon);
|
||||||
|
if (ret < 0) {
|
||||||
|
cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n",
|
||||||
|
__func__, ret);
|
||||||
|
goto unlock;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* And register to receive notifications for the new IP address now that we have
|
||||||
|
* stored the new address.
|
||||||
|
*/
|
||||||
|
ret = cifs_swn_register(tcon);
|
||||||
|
if (ret < 0) {
|
||||||
|
cifs_dbg(VFS, "%s: Failed to register for witness notifications: %d\n",
|
||||||
|
__func__, ret);
|
||||||
|
goto unlock;
|
||||||
|
}
|
||||||
|
|
||||||
|
spin_lock(&GlobalMid_Lock);
|
||||||
|
if (tcon->ses->server->tcpStatus != CifsExiting)
|
||||||
|
tcon->ses->server->tcpStatus = CifsNeedReconnect;
|
||||||
|
spin_unlock(&GlobalMid_Lock);
|
||||||
|
|
||||||
|
unlock:
|
||||||
mutex_unlock(&tcon->ses->server->srv_mutex);
|
mutex_unlock(&tcon->ses->server->srv_mutex);
|
||||||
|
|
||||||
return 0;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int cifs_swn_client_move(struct cifs_swn_reg *swnreg, struct sockaddr_storage *addr)
|
static int cifs_swn_client_move(struct cifs_swn_reg *swnreg, struct sockaddr_storage *addr)
|
||||||
|
@ -1195,7 +1195,8 @@ static int build_sec_desc(struct cifs_ntsd *pntsd, struct cifs_ntsd *pnntsd,
|
|||||||
}
|
}
|
||||||
|
|
||||||
struct cifs_ntsd *get_cifs_acl_by_fid(struct cifs_sb_info *cifs_sb,
|
struct cifs_ntsd *get_cifs_acl_by_fid(struct cifs_sb_info *cifs_sb,
|
||||||
const struct cifs_fid *cifsfid, u32 *pacllen)
|
const struct cifs_fid *cifsfid, u32 *pacllen,
|
||||||
|
u32 __maybe_unused unused)
|
||||||
{
|
{
|
||||||
struct cifs_ntsd *pntsd = NULL;
|
struct cifs_ntsd *pntsd = NULL;
|
||||||
unsigned int xid;
|
unsigned int xid;
|
||||||
@ -1263,7 +1264,7 @@ static struct cifs_ntsd *get_cifs_acl_by_path(struct cifs_sb_info *cifs_sb,
|
|||||||
/* Retrieve an ACL from the server */
|
/* Retrieve an ACL from the server */
|
||||||
struct cifs_ntsd *get_cifs_acl(struct cifs_sb_info *cifs_sb,
|
struct cifs_ntsd *get_cifs_acl(struct cifs_sb_info *cifs_sb,
|
||||||
struct inode *inode, const char *path,
|
struct inode *inode, const char *path,
|
||||||
u32 *pacllen)
|
u32 *pacllen, u32 info)
|
||||||
{
|
{
|
||||||
struct cifs_ntsd *pntsd = NULL;
|
struct cifs_ntsd *pntsd = NULL;
|
||||||
struct cifsFileInfo *open_file = NULL;
|
struct cifsFileInfo *open_file = NULL;
|
||||||
@ -1273,7 +1274,7 @@ struct cifs_ntsd *get_cifs_acl(struct cifs_sb_info *cifs_sb,
|
|||||||
if (!open_file)
|
if (!open_file)
|
||||||
return get_cifs_acl_by_path(cifs_sb, path, pacllen);
|
return get_cifs_acl_by_path(cifs_sb, path, pacllen);
|
||||||
|
|
||||||
pntsd = get_cifs_acl_by_fid(cifs_sb, &open_file->fid, pacllen);
|
pntsd = get_cifs_acl_by_fid(cifs_sb, &open_file->fid, pacllen, info);
|
||||||
cifsFileInfo_put(open_file);
|
cifsFileInfo_put(open_file);
|
||||||
return pntsd;
|
return pntsd;
|
||||||
}
|
}
|
||||||
@ -1338,6 +1339,7 @@ cifs_acl_to_fattr(struct cifs_sb_info *cifs_sb, struct cifs_fattr *fattr,
|
|||||||
int rc = 0;
|
int rc = 0;
|
||||||
struct tcon_link *tlink = cifs_sb_tlink(cifs_sb);
|
struct tcon_link *tlink = cifs_sb_tlink(cifs_sb);
|
||||||
struct smb_version_operations *ops;
|
struct smb_version_operations *ops;
|
||||||
|
const u32 info = 0;
|
||||||
|
|
||||||
cifs_dbg(NOISY, "converting ACL to mode for %s\n", path);
|
cifs_dbg(NOISY, "converting ACL to mode for %s\n", path);
|
||||||
|
|
||||||
@ -1347,9 +1349,9 @@ cifs_acl_to_fattr(struct cifs_sb_info *cifs_sb, struct cifs_fattr *fattr,
|
|||||||
ops = tlink_tcon(tlink)->ses->server->ops;
|
ops = tlink_tcon(tlink)->ses->server->ops;
|
||||||
|
|
||||||
if (pfid && (ops->get_acl_by_fid))
|
if (pfid && (ops->get_acl_by_fid))
|
||||||
pntsd = ops->get_acl_by_fid(cifs_sb, pfid, &acllen);
|
pntsd = ops->get_acl_by_fid(cifs_sb, pfid, &acllen, info);
|
||||||
else if (ops->get_acl)
|
else if (ops->get_acl)
|
||||||
pntsd = ops->get_acl(cifs_sb, inode, path, &acllen);
|
pntsd = ops->get_acl(cifs_sb, inode, path, &acllen, info);
|
||||||
else {
|
else {
|
||||||
cifs_put_tlink(tlink);
|
cifs_put_tlink(tlink);
|
||||||
return -EOPNOTSUPP;
|
return -EOPNOTSUPP;
|
||||||
@ -1388,6 +1390,7 @@ id_mode_to_cifs_acl(struct inode *inode, const char *path, __u64 *pnmode,
|
|||||||
struct tcon_link *tlink = cifs_sb_tlink(cifs_sb);
|
struct tcon_link *tlink = cifs_sb_tlink(cifs_sb);
|
||||||
struct smb_version_operations *ops;
|
struct smb_version_operations *ops;
|
||||||
bool mode_from_sid, id_from_sid;
|
bool mode_from_sid, id_from_sid;
|
||||||
|
const u32 info = 0;
|
||||||
|
|
||||||
if (IS_ERR(tlink))
|
if (IS_ERR(tlink))
|
||||||
return PTR_ERR(tlink);
|
return PTR_ERR(tlink);
|
||||||
@ -1403,7 +1406,7 @@ id_mode_to_cifs_acl(struct inode *inode, const char *path, __u64 *pnmode,
|
|||||||
return -EOPNOTSUPP;
|
return -EOPNOTSUPP;
|
||||||
}
|
}
|
||||||
|
|
||||||
pntsd = ops->get_acl(cifs_sb, inode, path, &secdesclen);
|
pntsd = ops->get_acl(cifs_sb, inode, path, &secdesclen, info);
|
||||||
if (IS_ERR(pntsd)) {
|
if (IS_ERR(pntsd)) {
|
||||||
rc = PTR_ERR(pntsd);
|
rc = PTR_ERR(pntsd);
|
||||||
cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc);
|
cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc);
|
||||||
|
@ -456,9 +456,9 @@ struct smb_version_operations {
|
|||||||
const char *, const void *, const __u16,
|
const char *, const void *, const __u16,
|
||||||
const struct nls_table *, struct cifs_sb_info *);
|
const struct nls_table *, struct cifs_sb_info *);
|
||||||
struct cifs_ntsd * (*get_acl)(struct cifs_sb_info *, struct inode *,
|
struct cifs_ntsd * (*get_acl)(struct cifs_sb_info *, struct inode *,
|
||||||
const char *, u32 *);
|
const char *, u32 *, u32);
|
||||||
struct cifs_ntsd * (*get_acl_by_fid)(struct cifs_sb_info *,
|
struct cifs_ntsd * (*get_acl_by_fid)(struct cifs_sb_info *,
|
||||||
const struct cifs_fid *, u32 *);
|
const struct cifs_fid *, u32 *, u32);
|
||||||
int (*set_acl)(struct cifs_ntsd *, __u32, struct inode *, const char *,
|
int (*set_acl)(struct cifs_ntsd *, __u32, struct inode *, const char *,
|
||||||
int);
|
int);
|
||||||
/* writepages retry size */
|
/* writepages retry size */
|
||||||
|
@ -240,6 +240,8 @@
|
|||||||
#define SYNCHRONIZE 0x00100000 /* The file handle can waited on to */
|
#define SYNCHRONIZE 0x00100000 /* The file handle can waited on to */
|
||||||
/* synchronize with the completion */
|
/* synchronize with the completion */
|
||||||
/* of an input/output request */
|
/* of an input/output request */
|
||||||
|
#define SYSTEM_SECURITY 0x01000000 /* The system access control list */
|
||||||
|
/* can be read and changed */
|
||||||
#define GENERIC_ALL 0x10000000
|
#define GENERIC_ALL 0x10000000
|
||||||
#define GENERIC_EXECUTE 0x20000000
|
#define GENERIC_EXECUTE 0x20000000
|
||||||
#define GENERIC_WRITE 0x40000000
|
#define GENERIC_WRITE 0x40000000
|
||||||
|
@ -218,9 +218,9 @@ extern int cifs_acl_to_fattr(struct cifs_sb_info *cifs_sb,
|
|||||||
extern int id_mode_to_cifs_acl(struct inode *inode, const char *path, __u64 *pnmode,
|
extern int id_mode_to_cifs_acl(struct inode *inode, const char *path, __u64 *pnmode,
|
||||||
kuid_t uid, kgid_t gid);
|
kuid_t uid, kgid_t gid);
|
||||||
extern struct cifs_ntsd *get_cifs_acl(struct cifs_sb_info *, struct inode *,
|
extern struct cifs_ntsd *get_cifs_acl(struct cifs_sb_info *, struct inode *,
|
||||||
const char *, u32 *);
|
const char *, u32 *, u32);
|
||||||
extern struct cifs_ntsd *get_cifs_acl_by_fid(struct cifs_sb_info *,
|
extern struct cifs_ntsd *get_cifs_acl_by_fid(struct cifs_sb_info *,
|
||||||
const struct cifs_fid *, u32 *);
|
const struct cifs_fid *, u32 *, u32);
|
||||||
extern int set_cifs_acl(struct cifs_ntsd *, __u32, struct inode *,
|
extern int set_cifs_acl(struct cifs_ntsd *, __u32, struct inode *,
|
||||||
const char *, int);
|
const char *, int);
|
||||||
extern unsigned int setup_authusers_ACE(struct cifs_ace *pace);
|
extern unsigned int setup_authusers_ACE(struct cifs_ace *pace);
|
||||||
|
@ -155,6 +155,7 @@ static void reconn_set_next_dfs_target(struct TCP_Server_Info *server,
|
|||||||
cifs_dbg(FYI,
|
cifs_dbg(FYI,
|
||||||
"%s: failed to extract hostname from target: %ld\n",
|
"%s: failed to extract hostname from target: %ld\n",
|
||||||
__func__, PTR_ERR(server->hostname));
|
__func__, PTR_ERR(server->hostname));
|
||||||
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
rc = reconn_set_ipaddr_from_hostname(server);
|
rc = reconn_set_ipaddr_from_hostname(server);
|
||||||
|
@ -3214,7 +3214,7 @@ smb2_query_reparse_tag(const unsigned int xid, struct cifs_tcon *tcon,
|
|||||||
|
|
||||||
static struct cifs_ntsd *
|
static struct cifs_ntsd *
|
||||||
get_smb2_acl_by_fid(struct cifs_sb_info *cifs_sb,
|
get_smb2_acl_by_fid(struct cifs_sb_info *cifs_sb,
|
||||||
const struct cifs_fid *cifsfid, u32 *pacllen)
|
const struct cifs_fid *cifsfid, u32 *pacllen, u32 info)
|
||||||
{
|
{
|
||||||
struct cifs_ntsd *pntsd = NULL;
|
struct cifs_ntsd *pntsd = NULL;
|
||||||
unsigned int xid;
|
unsigned int xid;
|
||||||
@ -3228,7 +3228,8 @@ get_smb2_acl_by_fid(struct cifs_sb_info *cifs_sb,
|
|||||||
cifs_dbg(FYI, "trying to get acl\n");
|
cifs_dbg(FYI, "trying to get acl\n");
|
||||||
|
|
||||||
rc = SMB2_query_acl(xid, tlink_tcon(tlink), cifsfid->persistent_fid,
|
rc = SMB2_query_acl(xid, tlink_tcon(tlink), cifsfid->persistent_fid,
|
||||||
cifsfid->volatile_fid, (void **)&pntsd, pacllen);
|
cifsfid->volatile_fid, (void **)&pntsd, pacllen,
|
||||||
|
info);
|
||||||
free_xid(xid);
|
free_xid(xid);
|
||||||
|
|
||||||
cifs_put_tlink(tlink);
|
cifs_put_tlink(tlink);
|
||||||
@ -3242,7 +3243,7 @@ get_smb2_acl_by_fid(struct cifs_sb_info *cifs_sb,
|
|||||||
|
|
||||||
static struct cifs_ntsd *
|
static struct cifs_ntsd *
|
||||||
get_smb2_acl_by_path(struct cifs_sb_info *cifs_sb,
|
get_smb2_acl_by_path(struct cifs_sb_info *cifs_sb,
|
||||||
const char *path, u32 *pacllen)
|
const char *path, u32 *pacllen, u32 info)
|
||||||
{
|
{
|
||||||
struct cifs_ntsd *pntsd = NULL;
|
struct cifs_ntsd *pntsd = NULL;
|
||||||
u8 oplock = SMB2_OPLOCK_LEVEL_NONE;
|
u8 oplock = SMB2_OPLOCK_LEVEL_NONE;
|
||||||
@ -3280,12 +3281,16 @@ get_smb2_acl_by_path(struct cifs_sb_info *cifs_sb,
|
|||||||
oparms.fid = &fid;
|
oparms.fid = &fid;
|
||||||
oparms.reconnect = false;
|
oparms.reconnect = false;
|
||||||
|
|
||||||
|
if (info & SACL_SECINFO)
|
||||||
|
oparms.desired_access |= SYSTEM_SECURITY;
|
||||||
|
|
||||||
rc = SMB2_open(xid, &oparms, utf16_path, &oplock, NULL, NULL, NULL,
|
rc = SMB2_open(xid, &oparms, utf16_path, &oplock, NULL, NULL, NULL,
|
||||||
NULL);
|
NULL);
|
||||||
kfree(utf16_path);
|
kfree(utf16_path);
|
||||||
if (!rc) {
|
if (!rc) {
|
||||||
rc = SMB2_query_acl(xid, tlink_tcon(tlink), fid.persistent_fid,
|
rc = SMB2_query_acl(xid, tlink_tcon(tlink), fid.persistent_fid,
|
||||||
fid.volatile_fid, (void **)&pntsd, pacllen);
|
fid.volatile_fid, (void **)&pntsd, pacllen,
|
||||||
|
info);
|
||||||
SMB2_close(xid, tcon, fid.persistent_fid, fid.volatile_fid);
|
SMB2_close(xid, tcon, fid.persistent_fid, fid.volatile_fid);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -3319,10 +3324,12 @@ set_smb2_acl(struct cifs_ntsd *pnntsd, __u32 acllen,
|
|||||||
tcon = tlink_tcon(tlink);
|
tcon = tlink_tcon(tlink);
|
||||||
xid = get_xid();
|
xid = get_xid();
|
||||||
|
|
||||||
if (aclflag == CIFS_ACL_OWNER || aclflag == CIFS_ACL_GROUP)
|
if (aclflag & CIFS_ACL_OWNER || aclflag & CIFS_ACL_GROUP)
|
||||||
access_flags = WRITE_OWNER;
|
access_flags |= WRITE_OWNER;
|
||||||
else
|
if (aclflag & CIFS_ACL_SACL)
|
||||||
access_flags = WRITE_DAC;
|
access_flags |= SYSTEM_SECURITY;
|
||||||
|
if (aclflag & CIFS_ACL_DACL)
|
||||||
|
access_flags |= WRITE_DAC;
|
||||||
|
|
||||||
utf16_path = cifs_convert_path_to_utf16(path, cifs_sb);
|
utf16_path = cifs_convert_path_to_utf16(path, cifs_sb);
|
||||||
if (!utf16_path) {
|
if (!utf16_path) {
|
||||||
@ -3356,18 +3363,18 @@ set_smb2_acl(struct cifs_ntsd *pnntsd, __u32 acllen,
|
|||||||
/* Retrieve an ACL from the server */
|
/* Retrieve an ACL from the server */
|
||||||
static struct cifs_ntsd *
|
static struct cifs_ntsd *
|
||||||
get_smb2_acl(struct cifs_sb_info *cifs_sb,
|
get_smb2_acl(struct cifs_sb_info *cifs_sb,
|
||||||
struct inode *inode, const char *path,
|
struct inode *inode, const char *path,
|
||||||
u32 *pacllen)
|
u32 *pacllen, u32 info)
|
||||||
{
|
{
|
||||||
struct cifs_ntsd *pntsd = NULL;
|
struct cifs_ntsd *pntsd = NULL;
|
||||||
struct cifsFileInfo *open_file = NULL;
|
struct cifsFileInfo *open_file = NULL;
|
||||||
|
|
||||||
if (inode)
|
if (inode && !(info & SACL_SECINFO))
|
||||||
open_file = find_readable_file(CIFS_I(inode), true);
|
open_file = find_readable_file(CIFS_I(inode), true);
|
||||||
if (!open_file)
|
if (!open_file || (info & SACL_SECINFO))
|
||||||
return get_smb2_acl_by_path(cifs_sb, path, pacllen);
|
return get_smb2_acl_by_path(cifs_sb, path, pacllen, info);
|
||||||
|
|
||||||
pntsd = get_smb2_acl_by_fid(cifs_sb, &open_file->fid, pacllen);
|
pntsd = get_smb2_acl_by_fid(cifs_sb, &open_file->fid, pacllen, info);
|
||||||
cifsFileInfo_put(open_file);
|
cifsFileInfo_put(open_file);
|
||||||
return pntsd;
|
return pntsd;
|
||||||
}
|
}
|
||||||
|
@ -3479,10 +3479,11 @@ SMB311_posix_query_info(const unsigned int xid, struct cifs_tcon *tcon,
|
|||||||
|
|
||||||
int
|
int
|
||||||
SMB2_query_acl(const unsigned int xid, struct cifs_tcon *tcon,
|
SMB2_query_acl(const unsigned int xid, struct cifs_tcon *tcon,
|
||||||
u64 persistent_fid, u64 volatile_fid,
|
u64 persistent_fid, u64 volatile_fid,
|
||||||
void **data, u32 *plen)
|
void **data, u32 *plen, u32 extra_info)
|
||||||
{
|
{
|
||||||
__u32 additional_info = OWNER_SECINFO | GROUP_SECINFO | DACL_SECINFO;
|
__u32 additional_info = OWNER_SECINFO | GROUP_SECINFO | DACL_SECINFO |
|
||||||
|
extra_info;
|
||||||
*plen = 0;
|
*plen = 0;
|
||||||
|
|
||||||
return query_info(xid, tcon, persistent_fid, volatile_fid,
|
return query_info(xid, tcon, persistent_fid, volatile_fid,
|
||||||
|
@ -200,8 +200,8 @@ extern int SMB2_query_info_init(struct cifs_tcon *tcon,
|
|||||||
size_t input_len, void *input);
|
size_t input_len, void *input);
|
||||||
extern void SMB2_query_info_free(struct smb_rqst *rqst);
|
extern void SMB2_query_info_free(struct smb_rqst *rqst);
|
||||||
extern int SMB2_query_acl(const unsigned int xid, struct cifs_tcon *tcon,
|
extern int SMB2_query_acl(const unsigned int xid, struct cifs_tcon *tcon,
|
||||||
u64 persistent_file_id, u64 volatile_file_id,
|
u64 persistent_file_id, u64 volatile_file_id,
|
||||||
void **data, unsigned int *plen);
|
void **data, unsigned int *plen, u32 info);
|
||||||
extern int SMB2_get_srv_num(const unsigned int xid, struct cifs_tcon *tcon,
|
extern int SMB2_get_srv_num(const unsigned int xid, struct cifs_tcon *tcon,
|
||||||
u64 persistent_fid, u64 volatile_fid,
|
u64 persistent_fid, u64 volatile_fid,
|
||||||
__le64 *uniqueid);
|
__le64 *uniqueid);
|
||||||
|
@ -34,6 +34,7 @@
|
|||||||
#define MAX_EA_VALUE_SIZE CIFSMaxBufSize
|
#define MAX_EA_VALUE_SIZE CIFSMaxBufSize
|
||||||
#define CIFS_XATTR_CIFS_ACL "system.cifs_acl" /* DACL only */
|
#define CIFS_XATTR_CIFS_ACL "system.cifs_acl" /* DACL only */
|
||||||
#define CIFS_XATTR_CIFS_NTSD "system.cifs_ntsd" /* owner plus DACL */
|
#define CIFS_XATTR_CIFS_NTSD "system.cifs_ntsd" /* owner plus DACL */
|
||||||
|
#define CIFS_XATTR_CIFS_NTSD_FULL "system.cifs_ntsd_full" /* owner/DACL/SACL */
|
||||||
#define CIFS_XATTR_ATTRIB "cifs.dosattrib" /* full name: user.cifs.dosattrib */
|
#define CIFS_XATTR_ATTRIB "cifs.dosattrib" /* full name: user.cifs.dosattrib */
|
||||||
#define CIFS_XATTR_CREATETIME "cifs.creationtime" /* user.cifs.creationtime */
|
#define CIFS_XATTR_CREATETIME "cifs.creationtime" /* user.cifs.creationtime */
|
||||||
/*
|
/*
|
||||||
@ -43,12 +44,13 @@
|
|||||||
*/
|
*/
|
||||||
#define SMB3_XATTR_CIFS_ACL "system.smb3_acl" /* DACL only */
|
#define SMB3_XATTR_CIFS_ACL "system.smb3_acl" /* DACL only */
|
||||||
#define SMB3_XATTR_CIFS_NTSD "system.smb3_ntsd" /* owner plus DACL */
|
#define SMB3_XATTR_CIFS_NTSD "system.smb3_ntsd" /* owner plus DACL */
|
||||||
|
#define SMB3_XATTR_CIFS_NTSD_FULL "system.smb3_ntsd_full" /* owner/DACL/SACL */
|
||||||
#define SMB3_XATTR_ATTRIB "smb3.dosattrib" /* full name: user.smb3.dosattrib */
|
#define SMB3_XATTR_ATTRIB "smb3.dosattrib" /* full name: user.smb3.dosattrib */
|
||||||
#define SMB3_XATTR_CREATETIME "smb3.creationtime" /* user.smb3.creationtime */
|
#define SMB3_XATTR_CREATETIME "smb3.creationtime" /* user.smb3.creationtime */
|
||||||
/* BB need to add server (Samba e.g) support for security and trusted prefix */
|
/* BB need to add server (Samba e.g) support for security and trusted prefix */
|
||||||
|
|
||||||
enum { XATTR_USER, XATTR_CIFS_ACL, XATTR_ACL_ACCESS, XATTR_ACL_DEFAULT,
|
enum { XATTR_USER, XATTR_CIFS_ACL, XATTR_ACL_ACCESS, XATTR_ACL_DEFAULT,
|
||||||
XATTR_CIFS_NTSD };
|
XATTR_CIFS_NTSD, XATTR_CIFS_NTSD_FULL };
|
||||||
|
|
||||||
static int cifs_attrib_set(unsigned int xid, struct cifs_tcon *pTcon,
|
static int cifs_attrib_set(unsigned int xid, struct cifs_tcon *pTcon,
|
||||||
struct inode *inode, char *full_path,
|
struct inode *inode, char *full_path,
|
||||||
@ -164,7 +166,8 @@ static int cifs_xattr_set(const struct xattr_handler *handler,
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
case XATTR_CIFS_ACL:
|
case XATTR_CIFS_ACL:
|
||||||
case XATTR_CIFS_NTSD: {
|
case XATTR_CIFS_NTSD:
|
||||||
|
case XATTR_CIFS_NTSD_FULL: {
|
||||||
struct cifs_ntsd *pacl;
|
struct cifs_ntsd *pacl;
|
||||||
|
|
||||||
if (!value)
|
if (!value)
|
||||||
@ -174,23 +177,27 @@ static int cifs_xattr_set(const struct xattr_handler *handler,
|
|||||||
rc = -ENOMEM;
|
rc = -ENOMEM;
|
||||||
} else {
|
} else {
|
||||||
memcpy(pacl, value, size);
|
memcpy(pacl, value, size);
|
||||||
if (value &&
|
if (pTcon->ses->server->ops->set_acl) {
|
||||||
pTcon->ses->server->ops->set_acl) {
|
int aclflags = 0;
|
||||||
rc = 0;
|
rc = 0;
|
||||||
if (handler->flags == XATTR_CIFS_NTSD) {
|
|
||||||
/* set owner and DACL */
|
switch (handler->flags) {
|
||||||
rc = pTcon->ses->server->ops->set_acl(
|
case XATTR_CIFS_NTSD_FULL:
|
||||||
pacl, size, inode,
|
aclflags = (CIFS_ACL_OWNER |
|
||||||
full_path,
|
CIFS_ACL_DACL |
|
||||||
CIFS_ACL_OWNER);
|
CIFS_ACL_SACL);
|
||||||
}
|
break;
|
||||||
if (rc == 0) {
|
case XATTR_CIFS_NTSD:
|
||||||
/* set DACL */
|
aclflags = (CIFS_ACL_OWNER |
|
||||||
rc = pTcon->ses->server->ops->set_acl(
|
CIFS_ACL_DACL);
|
||||||
pacl, size, inode,
|
break;
|
||||||
full_path,
|
case XATTR_CIFS_ACL:
|
||||||
CIFS_ACL_DACL);
|
default:
|
||||||
|
aclflags = CIFS_ACL_DACL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
rc = pTcon->ses->server->ops->set_acl(pacl,
|
||||||
|
size, inode, full_path, aclflags);
|
||||||
} else {
|
} else {
|
||||||
rc = -EOPNOTSUPP;
|
rc = -EOPNOTSUPP;
|
||||||
}
|
}
|
||||||
@ -327,16 +334,25 @@ static int cifs_xattr_get(const struct xattr_handler *handler,
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
case XATTR_CIFS_ACL:
|
case XATTR_CIFS_ACL:
|
||||||
case XATTR_CIFS_NTSD: {
|
case XATTR_CIFS_NTSD:
|
||||||
/* the whole ntsd is fetched regardless */
|
case XATTR_CIFS_NTSD_FULL: {
|
||||||
u32 acllen;
|
/*
|
||||||
|
* fetch owner, DACL, and SACL if asked for full descriptor,
|
||||||
|
* fetch owner and DACL otherwise
|
||||||
|
*/
|
||||||
|
u32 acllen, extra_info;
|
||||||
struct cifs_ntsd *pacl;
|
struct cifs_ntsd *pacl;
|
||||||
|
|
||||||
if (pTcon->ses->server->ops->get_acl == NULL)
|
if (pTcon->ses->server->ops->get_acl == NULL)
|
||||||
goto out; /* rc already EOPNOTSUPP */
|
goto out; /* rc already EOPNOTSUPP */
|
||||||
|
|
||||||
|
if (handler->flags == XATTR_CIFS_NTSD_FULL) {
|
||||||
|
extra_info = SACL_SECINFO;
|
||||||
|
} else {
|
||||||
|
extra_info = 0;
|
||||||
|
}
|
||||||
pacl = pTcon->ses->server->ops->get_acl(cifs_sb,
|
pacl = pTcon->ses->server->ops->get_acl(cifs_sb,
|
||||||
inode, full_path, &acllen);
|
inode, full_path, &acllen, extra_info);
|
||||||
if (IS_ERR(pacl)) {
|
if (IS_ERR(pacl)) {
|
||||||
rc = PTR_ERR(pacl);
|
rc = PTR_ERR(pacl);
|
||||||
cifs_dbg(VFS, "%s: error %zd getting sec desc\n",
|
cifs_dbg(VFS, "%s: error %zd getting sec desc\n",
|
||||||
@ -486,6 +502,27 @@ static const struct xattr_handler smb3_ntsd_xattr_handler = {
|
|||||||
.set = cifs_xattr_set,
|
.set = cifs_xattr_set,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
static const struct xattr_handler cifs_cifs_ntsd_full_xattr_handler = {
|
||||||
|
.name = CIFS_XATTR_CIFS_NTSD_FULL,
|
||||||
|
.flags = XATTR_CIFS_NTSD_FULL,
|
||||||
|
.get = cifs_xattr_get,
|
||||||
|
.set = cifs_xattr_set,
|
||||||
|
};
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Although this is just an alias for the above, need to move away from
|
||||||
|
* confusing users and using the 20 year old term 'cifs' when it is no
|
||||||
|
* longer secure and was replaced by SMB2/SMB3 a long time ago, and
|
||||||
|
* SMB3 and later are highly secure.
|
||||||
|
*/
|
||||||
|
static const struct xattr_handler smb3_ntsd_full_xattr_handler = {
|
||||||
|
.name = SMB3_XATTR_CIFS_NTSD_FULL,
|
||||||
|
.flags = XATTR_CIFS_NTSD_FULL,
|
||||||
|
.get = cifs_xattr_get,
|
||||||
|
.set = cifs_xattr_set,
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
static const struct xattr_handler cifs_posix_acl_access_xattr_handler = {
|
static const struct xattr_handler cifs_posix_acl_access_xattr_handler = {
|
||||||
.name = XATTR_NAME_POSIX_ACL_ACCESS,
|
.name = XATTR_NAME_POSIX_ACL_ACCESS,
|
||||||
.flags = XATTR_ACL_ACCESS,
|
.flags = XATTR_ACL_ACCESS,
|
||||||
@ -507,6 +544,8 @@ const struct xattr_handler *cifs_xattr_handlers[] = {
|
|||||||
&smb3_acl_xattr_handler, /* alias for above since avoiding "cifs" */
|
&smb3_acl_xattr_handler, /* alias for above since avoiding "cifs" */
|
||||||
&cifs_cifs_ntsd_xattr_handler,
|
&cifs_cifs_ntsd_xattr_handler,
|
||||||
&smb3_ntsd_xattr_handler, /* alias for above since avoiding "cifs" */
|
&smb3_ntsd_xattr_handler, /* alias for above since avoiding "cifs" */
|
||||||
|
&cifs_cifs_ntsd_full_xattr_handler,
|
||||||
|
&smb3_ntsd_full_xattr_handler, /* alias for above since avoiding "cifs" */
|
||||||
&cifs_posix_acl_access_xattr_handler,
|
&cifs_posix_acl_access_xattr_handler,
|
||||||
&cifs_posix_acl_default_xattr_handler,
|
&cifs_posix_acl_default_xattr_handler,
|
||||||
NULL
|
NULL
|
||||||
|
Loading…
Reference in New Issue
Block a user