1024b7d6aSDominique Martinet // SPDX-License-Identifier: LGPL-2.1 285ff872dSAneesh Kumar K.V /* 385ff872dSAneesh Kumar K.V * Copyright IBM Corporation, 2010 485ff872dSAneesh Kumar K.V * Author Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com> 585ff872dSAneesh Kumar K.V */ 685ff872dSAneesh Kumar K.V 785ff872dSAneesh Kumar K.V #include <linux/module.h> 885ff872dSAneesh Kumar K.V #include <linux/fs.h> 985ff872dSAneesh Kumar K.V #include <net/9p/9p.h> 1085ff872dSAneesh Kumar K.V #include <net/9p/client.h> 1185ff872dSAneesh Kumar K.V #include <linux/slab.h> 1222d8dcdfSAneesh Kumar K.V #include <linux/sched.h> 1385ff872dSAneesh Kumar K.V #include <linux/posix_acl_xattr.h> 1485ff872dSAneesh Kumar K.V #include "xattr.h" 1585ff872dSAneesh Kumar K.V #include "acl.h" 1676381a42SAneesh Kumar K.V #include "v9fs.h" 175ffc0cb3SAneesh Kumar K.V #include "v9fs_vfs.h" 180f235caeSAl Viro #include "fid.h" 1985ff872dSAneesh Kumar K.V 20*6cd4d4e8SChristian Brauner static struct posix_acl *v9fs_fid_get_acl(struct p9_fid *fid, const char *name) 2185ff872dSAneesh Kumar K.V { 2285ff872dSAneesh Kumar K.V ssize_t size; 2385ff872dSAneesh Kumar K.V void *value = NULL; 24009ca389SJoe Perches struct posix_acl *acl = NULL; 2585ff872dSAneesh Kumar K.V 2685ff872dSAneesh Kumar K.V size = v9fs_fid_xattr_get(fid, name, NULL, 0); 27*6cd4d4e8SChristian Brauner if (size < 0) 28*6cd4d4e8SChristian Brauner return ERR_PTR(size); 29*6cd4d4e8SChristian Brauner if (size == 0) 30*6cd4d4e8SChristian Brauner return ERR_PTR(-ENODATA); 31*6cd4d4e8SChristian Brauner 3285ff872dSAneesh Kumar K.V value = kzalloc(size, GFP_NOFS); 3385ff872dSAneesh Kumar K.V if (!value) 3485ff872dSAneesh Kumar K.V return ERR_PTR(-ENOMEM); 3585ff872dSAneesh Kumar K.V 36*6cd4d4e8SChristian Brauner size = v9fs_fid_xattr_get(fid, name, value, size); 37*6cd4d4e8SChristian Brauner if (size < 0) 38*6cd4d4e8SChristian Brauner acl = ERR_PTR(size); 39*6cd4d4e8SChristian Brauner else if (size == 0) 40*6cd4d4e8SChristian Brauner acl = ERR_PTR(-ENODATA); 41*6cd4d4e8SChristian Brauner else 42*6cd4d4e8SChristian Brauner acl = posix_acl_from_xattr(&init_user_ns, value, size); 4385ff872dSAneesh Kumar K.V kfree(value); 4485ff872dSAneesh Kumar K.V return acl; 4585ff872dSAneesh Kumar K.V } 4685ff872dSAneesh Kumar K.V 47*6cd4d4e8SChristian Brauner static struct posix_acl *v9fs_acl_get(struct dentry *dentry, const char *name) 48*6cd4d4e8SChristian Brauner { 49*6cd4d4e8SChristian Brauner struct p9_fid *fid; 50*6cd4d4e8SChristian Brauner struct posix_acl *acl = NULL; 51*6cd4d4e8SChristian Brauner 52*6cd4d4e8SChristian Brauner fid = v9fs_fid_lookup(dentry); 53*6cd4d4e8SChristian Brauner if (IS_ERR(fid)) 54*6cd4d4e8SChristian Brauner return ERR_CAST(fid); 55*6cd4d4e8SChristian Brauner 56*6cd4d4e8SChristian Brauner acl = v9fs_fid_get_acl(fid, name); 57*6cd4d4e8SChristian Brauner p9_fid_put(fid); 58*6cd4d4e8SChristian Brauner return acl; 59*6cd4d4e8SChristian Brauner } 60*6cd4d4e8SChristian Brauner 61*6cd4d4e8SChristian Brauner static struct posix_acl *__v9fs_get_acl(struct p9_fid *fid, const char *name) 62*6cd4d4e8SChristian Brauner { 63*6cd4d4e8SChristian Brauner int retval; 64*6cd4d4e8SChristian Brauner struct posix_acl *acl = NULL; 65*6cd4d4e8SChristian Brauner 66*6cd4d4e8SChristian Brauner acl = v9fs_fid_get_acl(fid, name); 67*6cd4d4e8SChristian Brauner if (!IS_ERR(acl)) 68*6cd4d4e8SChristian Brauner return acl; 69*6cd4d4e8SChristian Brauner 70*6cd4d4e8SChristian Brauner retval = PTR_ERR(acl); 71*6cd4d4e8SChristian Brauner if (retval == -ENODATA || retval == -ENOSYS || retval == -EOPNOTSUPP) 72*6cd4d4e8SChristian Brauner return NULL; 73*6cd4d4e8SChristian Brauner 74*6cd4d4e8SChristian Brauner /* map everything else to -EIO */ 75*6cd4d4e8SChristian Brauner return ERR_PTR(-EIO); 76*6cd4d4e8SChristian Brauner } 77*6cd4d4e8SChristian Brauner 7885ff872dSAneesh Kumar K.V int v9fs_get_acl(struct inode *inode, struct p9_fid *fid) 7985ff872dSAneesh Kumar K.V { 8085ff872dSAneesh Kumar K.V int retval = 0; 8185ff872dSAneesh Kumar K.V struct posix_acl *pacl, *dacl; 8276381a42SAneesh Kumar K.V struct v9fs_session_info *v9ses; 8385ff872dSAneesh Kumar K.V 8476381a42SAneesh Kumar K.V v9ses = v9fs_inode2v9ses(inode); 85e782ef71SVenkateswararao Jujjuri (JV) if (((v9ses->flags & V9FS_ACCESS_MASK) != V9FS_ACCESS_CLIENT) || 86e782ef71SVenkateswararao Jujjuri (JV) ((v9ses->flags & V9FS_ACL_MASK) != V9FS_POSIX_ACL)) { 8776381a42SAneesh Kumar K.V set_cached_acl(inode, ACL_TYPE_DEFAULT, NULL); 8876381a42SAneesh Kumar K.V set_cached_acl(inode, ACL_TYPE_ACCESS, NULL); 8976381a42SAneesh Kumar K.V return 0; 9076381a42SAneesh Kumar K.V } 9185ff872dSAneesh Kumar K.V /* get the default/access acl values and cache them */ 9297d79299SAndreas Gruenbacher dacl = __v9fs_get_acl(fid, XATTR_NAME_POSIX_ACL_DEFAULT); 9397d79299SAndreas Gruenbacher pacl = __v9fs_get_acl(fid, XATTR_NAME_POSIX_ACL_ACCESS); 9485ff872dSAneesh Kumar K.V 9585ff872dSAneesh Kumar K.V if (!IS_ERR(dacl) && !IS_ERR(pacl)) { 9685ff872dSAneesh Kumar K.V set_cached_acl(inode, ACL_TYPE_DEFAULT, dacl); 9785ff872dSAneesh Kumar K.V set_cached_acl(inode, ACL_TYPE_ACCESS, pacl); 9885ff872dSAneesh Kumar K.V } else 9985ff872dSAneesh Kumar K.V retval = -EIO; 10085ff872dSAneesh Kumar K.V 101c61fa0d6SVenkateswararao Jujjuri (JV) if (!IS_ERR(dacl)) 102c61fa0d6SVenkateswararao Jujjuri (JV) posix_acl_release(dacl); 103c61fa0d6SVenkateswararao Jujjuri (JV) 104c61fa0d6SVenkateswararao Jujjuri (JV) if (!IS_ERR(pacl)) 105c61fa0d6SVenkateswararao Jujjuri (JV) posix_acl_release(pacl); 106c61fa0d6SVenkateswararao Jujjuri (JV) 10785ff872dSAneesh Kumar K.V return retval; 10885ff872dSAneesh Kumar K.V } 10985ff872dSAneesh Kumar K.V 11085ff872dSAneesh Kumar K.V static struct posix_acl *v9fs_get_cached_acl(struct inode *inode, int type) 11185ff872dSAneesh Kumar K.V { 11285ff872dSAneesh Kumar K.V struct posix_acl *acl; 11385ff872dSAneesh Kumar K.V /* 11485ff872dSAneesh Kumar K.V * 9p Always cache the acl value when 11585ff872dSAneesh Kumar K.V * instantiating the inode (v9fs_inode_from_fid) 11685ff872dSAneesh Kumar K.V */ 11785ff872dSAneesh Kumar K.V acl = get_cached_acl(inode, type); 118b8a7a3a6SAndreas Gruenbacher BUG_ON(is_uncached_acl(acl)); 11985ff872dSAneesh Kumar K.V return acl; 12085ff872dSAneesh Kumar K.V } 12185ff872dSAneesh Kumar K.V 122*6cd4d4e8SChristian Brauner struct posix_acl *v9fs_iop_get_inode_acl(struct inode *inode, int type, bool rcu) 12385ff872dSAneesh Kumar K.V { 12476381a42SAneesh Kumar K.V struct v9fs_session_info *v9ses; 12576381a42SAneesh Kumar K.V 1260cad6246SMiklos Szeredi if (rcu) 1270cad6246SMiklos Szeredi return ERR_PTR(-ECHILD); 1280cad6246SMiklos Szeredi 12976381a42SAneesh Kumar K.V v9ses = v9fs_inode2v9ses(inode); 130e782ef71SVenkateswararao Jujjuri (JV) if (((v9ses->flags & V9FS_ACCESS_MASK) != V9FS_ACCESS_CLIENT) || 131e782ef71SVenkateswararao Jujjuri (JV) ((v9ses->flags & V9FS_ACL_MASK) != V9FS_POSIX_ACL)) { 13276381a42SAneesh Kumar K.V /* 133e782ef71SVenkateswararao Jujjuri (JV) * On access = client and acl = on mode get the acl 13476381a42SAneesh Kumar K.V * values from the server 13576381a42SAneesh Kumar K.V */ 1364e34e719SChristoph Hellwig return NULL; 13776381a42SAneesh Kumar K.V } 1384e34e719SChristoph Hellwig return v9fs_get_cached_acl(inode, type); 13985ff872dSAneesh Kumar K.V 14085ff872dSAneesh Kumar K.V } 1417a4566b0SAneesh Kumar K.V 142*6cd4d4e8SChristian Brauner struct posix_acl *v9fs_iop_get_acl(struct user_namespace *mnt_userns, 143*6cd4d4e8SChristian Brauner struct dentry *dentry, int type) 144*6cd4d4e8SChristian Brauner { 145*6cd4d4e8SChristian Brauner struct v9fs_session_info *v9ses; 146*6cd4d4e8SChristian Brauner 147*6cd4d4e8SChristian Brauner v9ses = v9fs_dentry2v9ses(dentry); 148*6cd4d4e8SChristian Brauner /* We allow set/get/list of acl when access=client is not specified. */ 149*6cd4d4e8SChristian Brauner if ((v9ses->flags & V9FS_ACCESS_MASK) != V9FS_ACCESS_CLIENT) 150*6cd4d4e8SChristian Brauner return v9fs_acl_get(dentry, posix_acl_xattr_name(type)); 151*6cd4d4e8SChristian Brauner return v9fs_get_cached_acl(d_inode(dentry), type); 152*6cd4d4e8SChristian Brauner } 153*6cd4d4e8SChristian Brauner 1540f235caeSAl Viro static int v9fs_set_acl(struct p9_fid *fid, int type, struct posix_acl *acl) 1556e8dc555SAneesh Kumar K.V { 1566e8dc555SAneesh Kumar K.V int retval; 1576e8dc555SAneesh Kumar K.V char *name; 1586e8dc555SAneesh Kumar K.V size_t size; 1596e8dc555SAneesh Kumar K.V void *buffer; 1606e195b0fSDominique Martinet 161d344b0fbSVenkateswararao Jujjuri (JV) if (!acl) 162d344b0fbSVenkateswararao Jujjuri (JV) return 0; 163d344b0fbSVenkateswararao Jujjuri (JV) 1646e8dc555SAneesh Kumar K.V /* Set a setxattr request to server */ 1656e8dc555SAneesh Kumar K.V size = posix_acl_xattr_size(acl->a_count); 1666e8dc555SAneesh Kumar K.V buffer = kmalloc(size, GFP_KERNEL); 1676e8dc555SAneesh Kumar K.V if (!buffer) 1686e8dc555SAneesh Kumar K.V return -ENOMEM; 1695f3a4a28SEric W. Biederman retval = posix_acl_to_xattr(&init_user_ns, acl, buffer, size); 1706e8dc555SAneesh Kumar K.V if (retval < 0) 1716e8dc555SAneesh Kumar K.V goto err_free_out; 1726e8dc555SAneesh Kumar K.V switch (type) { 1736e8dc555SAneesh Kumar K.V case ACL_TYPE_ACCESS: 17497d79299SAndreas Gruenbacher name = XATTR_NAME_POSIX_ACL_ACCESS; 1756e8dc555SAneesh Kumar K.V break; 1766e8dc555SAneesh Kumar K.V case ACL_TYPE_DEFAULT: 17797d79299SAndreas Gruenbacher name = XATTR_NAME_POSIX_ACL_DEFAULT; 1786e8dc555SAneesh Kumar K.V break; 1796e8dc555SAneesh Kumar K.V default: 1806e8dc555SAneesh Kumar K.V BUG(); 1816e8dc555SAneesh Kumar K.V } 1820f235caeSAl Viro retval = v9fs_fid_xattr_set(fid, name, buffer, size, 0); 1836e8dc555SAneesh Kumar K.V err_free_out: 1846e8dc555SAneesh Kumar K.V kfree(buffer); 1856e8dc555SAneesh Kumar K.V return retval; 1866e8dc555SAneesh Kumar K.V } 1876e8dc555SAneesh Kumar K.V 188be308f07SAl Viro int v9fs_acl_chmod(struct inode *inode, struct p9_fid *fid) 1896e8dc555SAneesh Kumar K.V { 1906e8dc555SAneesh Kumar K.V int retval = 0; 191bc26ab5fSAl Viro struct posix_acl *acl; 1926e8dc555SAneesh Kumar K.V 1936e8dc555SAneesh Kumar K.V if (S_ISLNK(inode->i_mode)) 1946e8dc555SAneesh Kumar K.V return -EOPNOTSUPP; 1956e8dc555SAneesh Kumar K.V acl = v9fs_get_cached_acl(inode, ACL_TYPE_ACCESS); 1966e8dc555SAneesh Kumar K.V if (acl) { 1975bf3258fSChristoph Hellwig retval = __posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode); 198bc26ab5fSAl Viro if (retval) 199bc26ab5fSAl Viro return retval; 2007f165aaaSAl Viro set_cached_acl(inode, ACL_TYPE_ACCESS, acl); 2010f235caeSAl Viro retval = v9fs_set_acl(fid, ACL_TYPE_ACCESS, acl); 2026e8dc555SAneesh Kumar K.V posix_acl_release(acl); 2036e8dc555SAneesh Kumar K.V } 2046e8dc555SAneesh Kumar K.V return retval; 2056e8dc555SAneesh Kumar K.V } 2066e8dc555SAneesh Kumar K.V 2073592ac44SAl Viro int v9fs_set_create_acl(struct inode *inode, struct p9_fid *fid, 2085fa6300aSAl Viro struct posix_acl *dacl, struct posix_acl *acl) 209ad77dbceSAneesh Kumar K.V { 2103592ac44SAl Viro set_cached_acl(inode, ACL_TYPE_DEFAULT, dacl); 2113592ac44SAl Viro set_cached_acl(inode, ACL_TYPE_ACCESS, acl); 2125fa6300aSAl Viro v9fs_set_acl(fid, ACL_TYPE_DEFAULT, dacl); 2135fa6300aSAl Viro v9fs_set_acl(fid, ACL_TYPE_ACCESS, acl); 214ad77dbceSAneesh Kumar K.V return 0; 215ad77dbceSAneesh Kumar K.V } 216ad77dbceSAneesh Kumar K.V 2175fa6300aSAl Viro void v9fs_put_acl(struct posix_acl *dacl, 2185fa6300aSAl Viro struct posix_acl *acl) 2195fa6300aSAl Viro { 2205fa6300aSAl Viro posix_acl_release(dacl); 2215fa6300aSAl Viro posix_acl_release(acl); 2225fa6300aSAl Viro } 2235fa6300aSAl Viro 224d3fb6120SAl Viro int v9fs_acl_mode(struct inode *dir, umode_t *modep, 225ad77dbceSAneesh Kumar K.V struct posix_acl **dpacl, struct posix_acl **pacl) 226ad77dbceSAneesh Kumar K.V { 227ad77dbceSAneesh Kumar K.V int retval = 0; 228d3fb6120SAl Viro umode_t mode = *modep; 229ad77dbceSAneesh Kumar K.V struct posix_acl *acl = NULL; 230ad77dbceSAneesh Kumar K.V 231ad77dbceSAneesh Kumar K.V if (!S_ISLNK(mode)) { 232ad77dbceSAneesh Kumar K.V acl = v9fs_get_cached_acl(dir, ACL_TYPE_DEFAULT); 233ad77dbceSAneesh Kumar K.V if (IS_ERR(acl)) 234ad77dbceSAneesh Kumar K.V return PTR_ERR(acl); 235ad77dbceSAneesh Kumar K.V if (!acl) 236ad77dbceSAneesh Kumar K.V mode &= ~current_umask(); 237ad77dbceSAneesh Kumar K.V } 238ad77dbceSAneesh Kumar K.V if (acl) { 239ad77dbceSAneesh Kumar K.V if (S_ISDIR(mode)) 2401ec95bf3SAl Viro *dpacl = posix_acl_dup(acl); 24137bc1539SChristoph Hellwig retval = __posix_acl_create(&acl, GFP_NOFS, &mode); 242826cae2fSAl Viro if (retval < 0) 243826cae2fSAl Viro return retval; 244ad77dbceSAneesh Kumar K.V if (retval > 0) 245826cae2fSAl Viro *pacl = acl; 2461ec95bf3SAl Viro else 247826cae2fSAl Viro posix_acl_release(acl); 248ad77dbceSAneesh Kumar K.V } 249ad77dbceSAneesh Kumar K.V *modep = mode; 250ad77dbceSAneesh Kumar K.V return 0; 251ad77dbceSAneesh Kumar K.V } 252ad77dbceSAneesh Kumar K.V 253d9a82a04SAndreas Gruenbacher static int v9fs_xattr_get_acl(const struct xattr_handler *handler, 254b296821aSAl Viro struct dentry *dentry, struct inode *inode, 255b296821aSAl Viro const char *name, void *buffer, size_t size) 2567a4566b0SAneesh Kumar K.V { 25776381a42SAneesh Kumar K.V struct v9fs_session_info *v9ses; 2587a4566b0SAneesh Kumar K.V struct posix_acl *acl; 2597a4566b0SAneesh Kumar K.V int error; 2607a4566b0SAneesh Kumar K.V 26142869c8aSAneesh Kumar K.V v9ses = v9fs_dentry2v9ses(dentry); 26276381a42SAneesh Kumar K.V /* 26376381a42SAneesh Kumar K.V * We allow set/get/list of acl when access=client is not specified 26476381a42SAneesh Kumar K.V */ 26576381a42SAneesh Kumar K.V if ((v9ses->flags & V9FS_ACCESS_MASK) != V9FS_ACCESS_CLIENT) 26698e9cb57SAndreas Gruenbacher return v9fs_xattr_get(dentry, handler->name, buffer, size); 26776381a42SAneesh Kumar K.V 268b296821aSAl Viro acl = v9fs_get_cached_acl(inode, handler->flags); 2697a4566b0SAneesh Kumar K.V if (IS_ERR(acl)) 2707a4566b0SAneesh Kumar K.V return PTR_ERR(acl); 2717a4566b0SAneesh Kumar K.V if (acl == NULL) 2727a4566b0SAneesh Kumar K.V return -ENODATA; 2735f3a4a28SEric W. Biederman error = posix_acl_to_xattr(&init_user_ns, acl, buffer, size); 2747a4566b0SAneesh Kumar K.V posix_acl_release(acl); 2757a4566b0SAneesh Kumar K.V 2767a4566b0SAneesh Kumar K.V return error; 2777a4566b0SAneesh Kumar K.V } 2787a4566b0SAneesh Kumar K.V 279d9a82a04SAndreas Gruenbacher static int v9fs_xattr_set_acl(const struct xattr_handler *handler, 280e65ce2a5SChristian Brauner struct user_namespace *mnt_userns, 28159301226SAl Viro struct dentry *dentry, struct inode *inode, 28259301226SAl Viro const char *name, const void *value, 28359301226SAl Viro size_t size, int flags) 2847a4566b0SAneesh Kumar K.V { 28522d8dcdfSAneesh Kumar K.V int retval; 28622d8dcdfSAneesh Kumar K.V struct posix_acl *acl; 28776381a42SAneesh Kumar K.V struct v9fs_session_info *v9ses; 28822d8dcdfSAneesh Kumar K.V 28942869c8aSAneesh Kumar K.V v9ses = v9fs_dentry2v9ses(dentry); 29076381a42SAneesh Kumar K.V /* 29176381a42SAneesh Kumar K.V * set the attribute on the remote. Without even looking at the 29276381a42SAneesh Kumar K.V * xattr value. We leave it to the server to validate 29376381a42SAneesh Kumar K.V */ 29476381a42SAneesh Kumar K.V if ((v9ses->flags & V9FS_ACCESS_MASK) != V9FS_ACCESS_CLIENT) 29598e9cb57SAndreas Gruenbacher return v9fs_xattr_set(dentry, handler->name, value, size, 296e409de99SAndreas Gruenbacher flags); 29776381a42SAneesh Kumar K.V 29822d8dcdfSAneesh Kumar K.V if (S_ISLNK(inode->i_mode)) 29922d8dcdfSAneesh Kumar K.V return -EOPNOTSUPP; 30021cb47beSChristian Brauner if (!inode_owner_or_capable(&init_user_ns, inode)) 30122d8dcdfSAneesh Kumar K.V return -EPERM; 30222d8dcdfSAneesh Kumar K.V if (value) { 30322d8dcdfSAneesh Kumar K.V /* update the cached acl value */ 3045f3a4a28SEric W. Biederman acl = posix_acl_from_xattr(&init_user_ns, value, size); 30522d8dcdfSAneesh Kumar K.V if (IS_ERR(acl)) 30622d8dcdfSAneesh Kumar K.V return PTR_ERR(acl); 30722d8dcdfSAneesh Kumar K.V else if (acl) { 3080d4d717fSEric W. Biederman retval = posix_acl_valid(inode->i_sb->s_user_ns, acl); 30922d8dcdfSAneesh Kumar K.V if (retval) 31022d8dcdfSAneesh Kumar K.V goto err_out; 31122d8dcdfSAneesh Kumar K.V } 31222d8dcdfSAneesh Kumar K.V } else 31322d8dcdfSAneesh Kumar K.V acl = NULL; 31422d8dcdfSAneesh Kumar K.V 315d9a82a04SAndreas Gruenbacher switch (handler->flags) { 31622d8dcdfSAneesh Kumar K.V case ACL_TYPE_ACCESS: 31722d8dcdfSAneesh Kumar K.V if (acl) { 318e02a53d9SDominique Martinet struct iattr iattr = { 0 }; 319b5c66babSCong Wang struct posix_acl *old_acl = acl; 32007393101SJan Kara 321549c7297SChristian Brauner retval = posix_acl_update_mode(&init_user_ns, inode, 322e65ce2a5SChristian Brauner &iattr.ia_mode, &acl); 32307393101SJan Kara if (retval) 32407393101SJan Kara goto err_out; 32507393101SJan Kara if (!acl) { 32622d8dcdfSAneesh Kumar K.V /* 32722d8dcdfSAneesh Kumar K.V * ACL can be represented 32822d8dcdfSAneesh Kumar K.V * by the mode bits. So don't 32922d8dcdfSAneesh Kumar K.V * update ACL. 33022d8dcdfSAneesh Kumar K.V */ 331b5c66babSCong Wang posix_acl_release(old_acl); 33222d8dcdfSAneesh Kumar K.V value = NULL; 33322d8dcdfSAneesh Kumar K.V size = 0; 33422d8dcdfSAneesh Kumar K.V } 33522d8dcdfSAneesh Kumar K.V iattr.ia_valid = ATTR_MODE; 33622d8dcdfSAneesh Kumar K.V /* FIXME should we update ctime ? 33722d8dcdfSAneesh Kumar K.V * What is the following setxattr update the 33822d8dcdfSAneesh Kumar K.V * mode ? 33922d8dcdfSAneesh Kumar K.V */ 340549c7297SChristian Brauner v9fs_vfs_setattr_dotl(&init_user_ns, dentry, &iattr); 34122d8dcdfSAneesh Kumar K.V } 34222d8dcdfSAneesh Kumar K.V break; 34322d8dcdfSAneesh Kumar K.V case ACL_TYPE_DEFAULT: 34422d8dcdfSAneesh Kumar K.V if (!S_ISDIR(inode->i_mode)) { 3456f81c115SAneesh Kumar K.V retval = acl ? -EINVAL : 0; 34622d8dcdfSAneesh Kumar K.V goto err_out; 34722d8dcdfSAneesh Kumar K.V } 34822d8dcdfSAneesh Kumar K.V break; 34922d8dcdfSAneesh Kumar K.V default: 35022d8dcdfSAneesh Kumar K.V BUG(); 35122d8dcdfSAneesh Kumar K.V } 35298e9cb57SAndreas Gruenbacher retval = v9fs_xattr_set(dentry, handler->name, value, size, flags); 35322d8dcdfSAneesh Kumar K.V if (!retval) 354d9a82a04SAndreas Gruenbacher set_cached_acl(inode, handler->flags, acl); 35522d8dcdfSAneesh Kumar K.V err_out: 35622d8dcdfSAneesh Kumar K.V posix_acl_release(acl); 35722d8dcdfSAneesh Kumar K.V return retval; 3587a4566b0SAneesh Kumar K.V } 3597a4566b0SAneesh Kumar K.V 3607a4566b0SAneesh Kumar K.V const struct xattr_handler v9fs_xattr_acl_access_handler = { 36198e9cb57SAndreas Gruenbacher .name = XATTR_NAME_POSIX_ACL_ACCESS, 3627a4566b0SAneesh Kumar K.V .flags = ACL_TYPE_ACCESS, 3637a4566b0SAneesh Kumar K.V .get = v9fs_xattr_get_acl, 3647a4566b0SAneesh Kumar K.V .set = v9fs_xattr_set_acl, 3657a4566b0SAneesh Kumar K.V }; 3667a4566b0SAneesh Kumar K.V 3677a4566b0SAneesh Kumar K.V const struct xattr_handler v9fs_xattr_acl_default_handler = { 36898e9cb57SAndreas Gruenbacher .name = XATTR_NAME_POSIX_ACL_DEFAULT, 3697a4566b0SAneesh Kumar K.V .flags = ACL_TYPE_DEFAULT, 3707a4566b0SAneesh Kumar K.V .get = v9fs_xattr_get_acl, 3717a4566b0SAneesh Kumar K.V .set = v9fs_xattr_set_acl, 3727a4566b0SAneesh Kumar K.V }; 373