source: branches/samba-3.2.x/source/modules/vfs_aixacl_util.c

Last change on this file was 133, checked in by Paul Smedley, 17 years ago

Update trunk to 3.2.0pre3

File size: 8.2 KB
Line 
1/*
2 Unix SMB/Netbios implementation.
3 VFS module to get and set posix acls
4 Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2006
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
18*/
19
20#include "includes.h"
21
22SMB_ACL_T aixacl_to_smbacl(struct acl *file_acl)
23{
24 struct acl_entry *acl_entry;
25 struct ace_id *idp;
26
27 struct smb_acl_t *result = SMB_MALLOC_P(struct smb_acl_t);
28 struct smb_acl_entry *ace;
29 int i;
30
31 if (result == NULL) {
32 return NULL;
33 }
34 ZERO_STRUCTP(result);
35
36 /* Point to the first acl entry in the acl */
37 acl_entry = file_acl->acl_ext;
38
39
40
41 DEBUG(10,("acl_entry is %d\n",acl_entry));
42 DEBUG(10,("acl_last(file_acl) id %d\n",acl_last(file_acl)));
43
44 /* Check if the extended acl bit is on. *
45 * If it isn't, do not show the *
46 * contents of the acl since AIX intends *
47 * the extended info to remain unused */
48
49 if(file_acl->acl_mode & S_IXACL){
50 /* while we are not pointing to the very end */
51 while(acl_entry < acl_last(file_acl)) {
52 /* before we malloc anything, make sure this is */
53 /* a valid acl entry and one that we want to map */
54 idp = id_nxt(acl_entry->ace_id);
55 if((acl_entry->ace_type == ACC_SPECIFY ||
56 (acl_entry->ace_type == ACC_PERMIT)) && (idp != id_last(acl_entry))) {
57 acl_entry = acl_nxt(acl_entry);
58 continue;
59 }
60
61 idp = acl_entry->ace_id;
62 DEBUG(10,("idp->id_data is %d\n",idp->id_data[0]));
63
64 result = SMB_REALLOC(result, sizeof(struct smb_acl_t) +
65 (sizeof(struct smb_acl_entry) *
66 (result->count+1)));
67 if (result == NULL) {
68 DEBUG(0, ("SMB_REALLOC failed\n"));
69 errno = ENOMEM;
70 return NULL;
71 }
72
73
74 DEBUG(10,("idp->id_type is %d\n",idp->id_type));
75 ace = &result->acl[result->count];
76
77 ace->a_type = idp->id_type;
78
79 switch(ace->a_type) {
80 case ACEID_USER: {
81 ace->uid = idp->id_data[0];
82 DEBUG(10,("case ACEID_USER ace->uid is %d\n",ace->uid));
83 ace->a_type = SMB_ACL_USER;
84 break;
85 }
86
87 case ACEID_GROUP: {
88 ace->gid = idp->id_data[0];
89 DEBUG(10,("case ACEID_GROUP ace->gid is %d\n",ace->gid));
90 ace->a_type = SMB_ACL_GROUP;
91 break;
92 }
93 default:
94 break;
95 }
96 /* The access in the acl entries must be left shifted by *
97 * three bites, because they will ultimately be compared *
98 * to S_IRUSR, S_IWUSR, and S_IXUSR. */
99
100 switch(acl_entry->ace_type){
101 case ACC_PERMIT:
102 case ACC_SPECIFY:
103 ace->a_perm = acl_entry->ace_access;
104 ace->a_perm <<= 6;
105 DEBUG(10,("ace->a_perm is %d\n",ace->a_perm));
106 break;
107 case ACC_DENY:
108 /* Since there is no way to return a DENY acl entry *
109 * change to PERMIT and then shift. */
110 DEBUG(10,("acl_entry->ace_access is %d\n",acl_entry->ace_access));
111 ace->a_perm = ~acl_entry->ace_access & 7;
112 DEBUG(10,("ace->a_perm is %d\n",ace->a_perm));
113 ace->a_perm <<= 6;
114 break;
115 default:
116 DEBUG(0, ("unknown ace->type\n"));
117 SAFE_FREE(result);
118 return(0);
119 }
120
121 result->count++;
122 ace->a_perm |= (ace->a_perm & S_IRUSR) ? SMB_ACL_READ : 0;
123 ace->a_perm |= (ace->a_perm & S_IWUSR) ? SMB_ACL_WRITE : 0;
124 ace->a_perm |= (ace->a_perm & S_IXUSR) ? SMB_ACL_EXECUTE : 0;
125 DEBUG(10,("ace->a_perm is %d\n",ace->a_perm));
126
127 DEBUG(10,("acl_entry = %d\n",acl_entry));
128 DEBUG(10,("The ace_type is %d\n",acl_entry->ace_type));
129
130 acl_entry = acl_nxt(acl_entry);
131 }
132 } /* end of if enabled */
133
134 /* Since owner, group, other acl entries are not *
135 * part of the acl entries in an acl, they must *
136 * be dummied up to become part of the list. */
137
138 for( i = 1; i < 4; i++) {
139 DEBUG(10,("i is %d\n",i));
140
141 result = SMB_REALLOC(result, sizeof(struct smb_acl_t) +
142 (sizeof(struct smb_acl_entry) *
143 (result->count+1)));
144 if (result == NULL) {
145 DEBUG(0, ("SMB_REALLOC failed\n"));
146 errno = ENOMEM;
147 DEBUG(0,("Error in AIX sys_acl_get_file is %d\n",errno));
148 return NULL;
149 }
150
151 ace = &result->acl[result->count];
152
153 ace->uid = 0;
154 ace->gid = 0;
155 DEBUG(10,("ace->uid = %d\n",ace->uid));
156
157 switch(i) {
158 case 2:
159 ace->a_perm = file_acl->g_access << 6;
160 ace->a_type = SMB_ACL_GROUP_OBJ;
161 break;
162
163 case 3:
164 ace->a_perm = file_acl->o_access << 6;
165 ace->a_type = SMB_ACL_OTHER;
166 break;
167
168 case 1:
169 ace->a_perm = file_acl->u_access << 6;
170 ace->a_type = SMB_ACL_USER_OBJ;
171 break;
172
173 default:
174 return(NULL);
175
176 }
177 ace->a_perm |= ((ace->a_perm & S_IRUSR) ? SMB_ACL_READ : 0);
178 ace->a_perm |= ((ace->a_perm & S_IWUSR) ? SMB_ACL_WRITE : 0);
179 ace->a_perm |= ((ace->a_perm & S_IXUSR) ? SMB_ACL_EXECUTE : 0);
180
181 memcpy(&result->acl[result->count],ace,sizeof(struct smb_acl_entry));
182 result->count++;
183 DEBUG(10,("ace->a_perm = %d\n",ace->a_perm));
184 DEBUG(10,("ace->a_type = %d\n",ace->a_type));
185 }
186
187
188 return result;
189
190
191}
192
193static ushort aixacl_smb_to_aixperm(SMB_ACL_PERM_T a_perm)
194{
195 ushort ret = (ushort)0;
196 if (a_perm & SMB_ACL_READ)
197 ret |= R_ACC;
198 if (a_perm & SMB_ACL_WRITE)
199 ret |= W_ACC;
200 if (a_perm & SMB_ACL_EXECUTE)
201 ret |= X_ACC;
202 return ret;
203}
204
205struct acl *aixacl_smb_to_aixacl(SMB_ACL_TYPE_T acltype, SMB_ACL_T theacl)
206{
207 struct smb_acl_entry *smb_entry = NULL;
208 struct acl *file_acl = NULL;
209 struct acl *file_acl_temp = NULL;
210 struct acl_entry *acl_entry = NULL;
211 struct ace_id *ace_id = NULL;
212 unsigned int id_type;
213 unsigned int user_id;
214 unsigned int acl_length;
215 int i;
216
217 DEBUG(10,("Entering aixacl_smb_to_aixacl\n"));
218 /* AIX has no default ACL */
219 if(acltype == SMB_ACL_TYPE_DEFAULT)
220 return NULL;
221
222 acl_length = BUFSIZ;
223 file_acl = (struct acl *)SMB_MALLOC(BUFSIZ);
224 if(file_acl == NULL) {
225 errno = ENOMEM;
226 DEBUG(0,("Error in aixacl_smb_to_aixacl is %d\n",errno));
227 return NULL;
228 }
229
230 memset(file_acl,0,BUFSIZ);
231
232 file_acl->acl_len = ACL_SIZ;
233 file_acl->acl_mode = S_IXACL;
234
235 for(i=0; i<theacl->count; i++ ) {
236 smb_entry = &(theacl->acl[i]);
237 id_type = smb_entry->a_type;
238 DEBUG(10,("The id_type is %d\n",id_type));
239
240 switch(id_type) {
241 case SMB_ACL_USER_OBJ:
242 file_acl->u_access = aixacl_smb_to_aixperm(smb_entry->a_perm);
243 continue;
244 case SMB_ACL_GROUP_OBJ:
245 file_acl->g_access = aixacl_smb_to_aixperm(smb_entry->a_perm);
246 continue;
247 case SMB_ACL_OTHER:
248 file_acl->o_access = aixacl_smb_to_aixperm(smb_entry->a_perm);
249 continue;
250 case SMB_ACL_MASK:
251 continue;
252 case SMB_ACL_GROUP:
253 break; /* process this */
254 case SMB_ACL_USER:
255 break; /* process this */
256 default: /* abnormal case */
257 DEBUG(10,("The id_type is unknown !\n"));
258 continue;
259 }
260
261 if((file_acl->acl_len + sizeof(struct acl_entry)) > acl_length) {
262 acl_length += sizeof(struct acl_entry);
263 file_acl_temp = (struct acl *)SMB_MALLOC(acl_length);
264 if(file_acl_temp == NULL) {
265 SAFE_FREE(file_acl);
266 errno = ENOMEM;
267 DEBUG(0,("Error in aixacl_smb_to_aixacl is %d\n",errno));
268 return NULL;
269 }
270
271 memcpy(file_acl_temp,file_acl,file_acl->acl_len);
272 SAFE_FREE(file_acl);
273 file_acl = file_acl_temp;
274 }
275
276 acl_entry = (struct acl_entry *)((char *)file_acl + file_acl->acl_len);
277 file_acl->acl_len += sizeof(struct acl_entry);
278 acl_entry->ace_len = sizeof(struct acl_entry); /* contains 1 ace_id */
279 acl_entry->ace_access = aixacl_smb_to_aixperm(smb_entry->a_perm);
280
281 /* In order to use this, we'll need to wait until we can get denies */
282 /* if(!acl_entry->ace_access && acl_entry->ace_type == ACC_PERMIT)
283 acl_entry->ace_type = ACC_SPECIFY; */
284
285 acl_entry->ace_type = ACC_SPECIFY;
286
287 ace_id = acl_entry->ace_id;
288
289 ace_id->id_type = (smb_entry->a_type==SMB_ACL_GROUP) ? ACEID_GROUP : ACEID_USER;
290 DEBUG(10,("The id type is %d\n",ace_id->id_type));
291 ace_id->id_len = sizeof(struct ace_id); /* contains 1 id_data */
292 ace_id->id_data[0] = (smb_entry->a_type==SMB_ACL_GROUP) ? smb_entry->gid : smb_entry->uid;
293 }
294
295 return file_acl;
296}
Note: See TracBrowser for help on using the repository browser.