2 Unix SMB/Netbios implementation.
3 VFS module to get and set posix acls
4 Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2006
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "system/filesys.h"
22 #include "smbd/smbd.h"
23 #include "vfs_aixacl_util.h"
25 SMB_ACL_T
aixacl_to_smbacl(struct acl
*file_acl
, TALLOC_CTX
*mem_ctx
)
27 struct acl_entry
*acl_entry
;
30 struct smb_acl_t
*result
= sys_acl_init(mem_ctx
);
31 struct smb_acl_entry
*ace
;
38 /* Point to the first acl entry in the acl */
39 acl_entry
= file_acl
->acl_ext
;
43 DEBUG(10,("acl_entry is %p\n",(void *)acl_entry
));
44 DEBUG(10,("acl_last(file_acl) id %p\n",(void *)acl_last(file_acl
)));
46 /* Check if the extended acl bit is on. *
47 * If it isn't, do not show the *
48 * contents of the acl since AIX intends *
49 * the extended info to remain unused */
51 if(file_acl
->acl_mode
& S_IXACL
){
52 /* while we are not pointing to the very end */
53 while(acl_entry
< acl_last(file_acl
)) {
54 /* before we malloc anything, make sure this is */
55 /* a valid acl entry and one that we want to map */
56 idp
= id_nxt(acl_entry
->ace_id
);
57 if((acl_entry
->ace_type
== ACC_SPECIFY
||
58 (acl_entry
->ace_type
== ACC_PERMIT
)) && (idp
!= id_last(acl_entry
))) {
59 acl_entry
= acl_nxt(acl_entry
);
63 idp
= acl_entry
->ace_id
;
64 DEBUG(10,("idp->id_data is %d\n",idp
->id_data
[0]));
66 result
->acl
= talloc_realloc(result
, result
->acl
, struct smb_acl_entry
, result
->count
+1);
68 DEBUG(0, ("talloc_realloc failed\n"));
74 DEBUG(10,("idp->id_type is %d\n",idp
->id_type
));
75 ace
= &result
->acl
[result
->count
];
77 ace
->a_type
= idp
->id_type
;
81 ace
->info
.user
.uid
= idp
->id_data
[0];
82 DEBUG(10,("case ACEID_USER ace->info.user.uid is %d\n",ace
->info
.user
.uid
));
83 ace
->a_type
= SMB_ACL_USER
;
88 ace
->info
.group
.gid
= idp
->id_data
[0];
89 DEBUG(10,("case ACEID_GROUP ace->info.group.gid is %d\n",ace
->info
.group
.gid
));
90 ace
->a_type
= SMB_ACL_GROUP
;
96 /* The access in the acl entries must be left shifted by *
97 * three bites, because they will ultimately be compared *
98 * to S_IRUSR, S_IWUSR, and S_IXUSR. */
100 switch(acl_entry
->ace_type
){
103 ace
->a_perm
= acl_entry
->ace_access
;
105 DEBUG(10,("ace->a_perm is %d\n",ace
->a_perm
));
108 /* Since there is no way to return a DENY acl entry *
109 * change to PERMIT and then shift. */
110 DEBUG(10,("acl_entry->ace_access is %d\n",acl_entry
->ace_access
));
111 ace
->a_perm
= ~acl_entry
->ace_access
& 7;
112 DEBUG(10,("ace->a_perm is %d\n",ace
->a_perm
));
116 DEBUG(0, ("unknown ace->type\n"));
122 ace
->a_perm
|= (ace
->a_perm
& S_IRUSR
) ? SMB_ACL_READ
: 0;
123 ace
->a_perm
|= (ace
->a_perm
& S_IWUSR
) ? SMB_ACL_WRITE
: 0;
124 ace
->a_perm
|= (ace
->a_perm
& S_IXUSR
) ? SMB_ACL_EXECUTE
: 0;
125 DEBUG(10,("ace->a_perm is %d\n",ace
->a_perm
));
127 DEBUG(10,("acl_entry = %p\n",(void *)acl_entry
));
128 DEBUG(10,("The ace_type is %d\n",acl_entry
->ace_type
));
130 acl_entry
= acl_nxt(acl_entry
);
132 } /* end of if enabled */
134 /* Since owner, group, other acl entries are not *
135 * part of the acl entries in an acl, they must *
136 * be dummied up to become part of the list. */
138 for( i
= 1; i
< 4; i
++) {
139 DEBUG(10,("i is %d\n",i
));
141 result
->acl
= talloc_realloc(result
, result
->acl
, struct smb_acl_entry
, result
->count
+1);
142 if (result
->acl
== NULL
) {
144 DEBUG(0, ("talloc_realloc failed\n"));
146 DEBUG(0,("Error in AIX sys_acl_get_file is %d\n",errno
));
150 ace
= &result
->acl
[result
->count
];
152 ace
->info
.user
.uid
= 0;
153 ace
->info
.group
.gid
= 0;
154 DEBUG(10,("ace->info.user.uid = %d\n",ace
->info
.user
.uid
));
158 ace
->a_perm
= file_acl
->g_access
<< 6;
159 ace
->a_type
= SMB_ACL_GROUP_OBJ
;
163 ace
->a_perm
= file_acl
->o_access
<< 6;
164 ace
->a_type
= SMB_ACL_OTHER
;
168 ace
->a_perm
= file_acl
->u_access
<< 6;
169 ace
->a_type
= SMB_ACL_USER_OBJ
;
176 ace
->a_perm
|= ((ace
->a_perm
& S_IRUSR
) ? SMB_ACL_READ
: 0);
177 ace
->a_perm
|= ((ace
->a_perm
& S_IWUSR
) ? SMB_ACL_WRITE
: 0);
178 ace
->a_perm
|= ((ace
->a_perm
& S_IXUSR
) ? SMB_ACL_EXECUTE
: 0);
180 memcpy(&result
->acl
[result
->count
],ace
,sizeof(struct smb_acl_entry
));
182 DEBUG(10,("ace->a_perm = %d\n",ace
->a_perm
));
183 DEBUG(10,("ace->a_type = %d\n",ace
->a_type
));
192 static ushort
aixacl_smb_to_aixperm(SMB_ACL_PERM_T a_perm
)
194 ushort ret
= (ushort
)0;
195 if (a_perm
& SMB_ACL_READ
)
197 if (a_perm
& SMB_ACL_WRITE
)
199 if (a_perm
& SMB_ACL_EXECUTE
)
204 struct acl
*aixacl_smb_to_aixacl(SMB_ACL_TYPE_T acltype
, SMB_ACL_T theacl
)
206 struct smb_acl_entry
*smb_entry
= NULL
;
207 struct acl
*file_acl
= NULL
;
208 struct acl
*file_acl_temp
= NULL
;
209 struct acl_entry
*acl_entry
= NULL
;
210 struct ace_id
*ace_id
= NULL
;
211 unsigned int id_type
;
212 unsigned int acl_length
;
215 DEBUG(10,("Entering aixacl_smb_to_aixacl\n"));
216 /* AIX has no default ACL */
217 if(acltype
== SMB_ACL_TYPE_DEFAULT
)
221 file_acl
= (struct acl
*)SMB_MALLOC(BUFSIZ
);
222 if(file_acl
== NULL
) {
224 DEBUG(0,("Error in aixacl_smb_to_aixacl is %d\n",errno
));
228 memset(file_acl
,0,BUFSIZ
);
230 file_acl
->acl_len
= ACL_SIZ
;
231 file_acl
->acl_mode
= S_IXACL
;
233 for(i
=0; i
<theacl
->count
; i
++ ) {
234 smb_entry
= &(theacl
->acl
[i
]);
235 id_type
= smb_entry
->a_type
;
236 DEBUG(10,("The id_type is %d\n",id_type
));
239 case SMB_ACL_USER_OBJ
:
240 file_acl
->u_access
= aixacl_smb_to_aixperm(smb_entry
->a_perm
);
242 case SMB_ACL_GROUP_OBJ
:
243 file_acl
->g_access
= aixacl_smb_to_aixperm(smb_entry
->a_perm
);
246 file_acl
->o_access
= aixacl_smb_to_aixperm(smb_entry
->a_perm
);
251 break; /* process this */
253 break; /* process this */
254 default: /* abnormal case */
255 DEBUG(10,("The id_type is unknown !\n"));
259 if((file_acl
->acl_len
+ sizeof(struct acl_entry
)) > acl_length
) {
260 acl_length
+= sizeof(struct acl_entry
);
261 file_acl_temp
= (struct acl
*)SMB_MALLOC(acl_length
);
262 if(file_acl_temp
== NULL
) {
265 DEBUG(0,("Error in aixacl_smb_to_aixacl is %d\n",errno
));
269 memcpy(file_acl_temp
,file_acl
,file_acl
->acl_len
);
271 file_acl
= file_acl_temp
;
274 acl_entry
= (struct acl_entry
*)((char *)file_acl
+ file_acl
->acl_len
);
275 file_acl
->acl_len
+= sizeof(struct acl_entry
);
276 acl_entry
->ace_len
= sizeof(struct acl_entry
); /* contains 1 ace_id */
277 acl_entry
->ace_access
= aixacl_smb_to_aixperm(smb_entry
->a_perm
);
279 /* In order to use this, we'll need to wait until we can get denies */
280 /* if(!acl_entry->ace_access && acl_entry->ace_type == ACC_PERMIT)
281 acl_entry->ace_type = ACC_SPECIFY; */
283 acl_entry
->ace_type
= ACC_SPECIFY
;
285 ace_id
= acl_entry
->ace_id
;
287 ace_id
->id_type
= (smb_entry
->a_type
==SMB_ACL_GROUP
) ? ACEID_GROUP
: ACEID_USER
;
288 DEBUG(10,("The id type is %d\n",ace_id
->id_type
));
289 ace_id
->id_len
= sizeof(struct ace_id
); /* contains 1 id_data */
290 ace_id
->id_data
[0] = (smb_entry
->a_type
==SMB_ACL_GROUP
) ? smb_entry
->info
.group
.gid
: smb_entry
->info
.user
.uid
;