29 Jul, 2020

1 commit

  • Al Viro pointed out that I broke some acl functionality...

    * ACLs could not be fully removed
    * posix_acl_chmod would be called while the old ACL was still cached
    * new mode propagated to orangefs server before ACL.

    ... when I tried to make sure that modes that got changed as a
    result of ACL-sets would be sent back to the orangefs server.

    Not wanting to try and change the code without having some cases to
    test it with, I began to hunt for setfacl examples that were expressible
    in pure mode. Along the way I found examples like the following
    which confused me:

    user A had a file (/home/A/asdf) with mode 740
    user B was in user A's group
    user C was not in user A's group

    setfacl -m u:C:rwx /home/A/asdf

    The above setfacl caused ls -l /home/A/asdf to show a mode of 770,
    making it appear that all users in user A's group now had full access
    to /home/A/asdf, however, user B still only had read acces. Madness.

    Anywho, I finally found that the above (whacky as it is) appears to
    be "posixly on purpose" and explained in acl(5):

    If the ACL has an ACL_MASK entry, the group permissions correspond
    to the permissions of the ACL_MASK entry.

    Signed-off-by: Mike Marshall

    Mike Marshall
     

04 May, 2019

1 commit

  • OrangeFS accepts a mask indicating which attributes were changed. The
    kernel must not set any bits except those that were actually changed.
    The kernel must set the uid/gid of the request to the actual uid/gid
    responsible for the change.

    Code path for notify_change initiated setattrs is

    orangefs_setattr(dentry, iattr)
    -> __orangefs_setattr(inode, iattr)

    In kernel changes are initiated by calling __orangefs_setattr.

    Code path for writeback is

    orangefs_write_inode
    -> orangefs_inode_setattr

    attr_valid and attr_uid and attr_gid change together under i_lock.
    I_DIRTY changes separately.

    __orangefs_setattr
    lock
    if needs to be cleaned first, unlock and retry
    set attr_valid
    copy data in
    unlock
    mark_inode_dirty

    orangefs_inode_setattr
    lock
    copy attributes out
    unlock
    clear getattr_time
    # __writeback_single_inode clears dirty

    orangefs_inode_getattr
    # possible to get here with attr_valid set and not dirty
    lock
    if getattr_time ok or attr_valid set, unlock and return
    unlock
    do server operation
    # another thread may getattr or setattr, so check for that
    lock
    if getattr_time ok or attr_valid, unlock and return
    else, copy in
    update getattr_time
    unlock

    Signed-off-by: Martin Brandenburg
    Signed-off-by: Mike Marshall

    Martin Brandenburg
     

10 Oct, 2018

1 commit

  • default_acl and acl of newly created inode will be initiated
    as ACL_NOT_CACHED in vfs function inode_init_always() and later
    will be updated by calling xxx_init_acl() in specific filesystems.
    Howerver, when default_acl and acl are NULL then they keep the value
    of ACL_NOT_CACHED, this patch tries to cache NULL for acl/default_acl
    in this case.

    Signed-off-by: Chengguang Xu
    Signed-off-by: Mike Marshall

    Chengguang Xu
     

23 Feb, 2018

1 commit


14 Nov, 2017

1 commit

  • The previous code path was to mark the inode dirty, let
    orangefs_inode_dirty set a flag in our private inode, then later during
    inode release call orangefs_flush_inode which notices the flag and
    writes the atime out.

    The code path worked almost identically for mtime, ctime, and mode
    except that those flags are set explicitly and not as side effects of
    dirty.

    Now orangefs_flush_inode is removed. Marking an inode dirty does not
    imply an atime update. Any place where flags were set before is now
    an explicit call to orangefs_inode_setattr. Since OrangeFS does not
    utilize inode writeback, the attribute change should be written out
    immediately.

    Fixes generic/120.

    In namei.c, there are several places where the directory mtime and ctime
    are set, but only the mtime is sent to the server. These don't seem
    right, but I've left them as is for now.

    Signed-off-by: Martin Brandenburg
    Signed-off-by: Mike Marshall

    Martin Brandenburg
     

02 Nov, 2017

1 commit

  • Many source files in the tree are missing licensing information, which
    makes it harder for compliance tools to determine the correct license.

    By default all files without license information are under the default
    license of the kernel, which is GPL version 2.

    Update the files which contain no license information with the 'GPL-2.0'
    SPDX license identifier. The SPDX identifier is a legally binding
    shorthand, which can be used instead of the full boiler plate text.

    This patch is based on work done by Thomas Gleixner and Kate Stewart and
    Philippe Ombredanne.

    How this work was done:

    Patches were generated and checked against linux-4.14-rc6 for a subset of
    the use cases:
    - file had no licensing information it it.
    - file was a */uapi/* one with no licensing information in it,
    - file was a */uapi/* one with existing licensing information,

    Further patches will be generated in subsequent months to fix up cases
    where non-standard license headers were used, and references to license
    had to be inferred by heuristics based on keywords.

    The analysis to determine which SPDX License Identifier to be applied to
    a file was done in a spreadsheet of side by side results from of the
    output of two independent scanners (ScanCode & Windriver) producing SPDX
    tag:value files created by Philippe Ombredanne. Philippe prepared the
    base worksheet, and did an initial spot review of a few 1000 files.

    The 4.13 kernel was the starting point of the analysis with 60,537 files
    assessed. Kate Stewart did a file by file comparison of the scanner
    results in the spreadsheet to determine which SPDX license identifier(s)
    to be applied to the file. She confirmed any determination that was not
    immediately clear with lawyers working with the Linux Foundation.

    Criteria used to select files for SPDX license identifier tagging was:
    - Files considered eligible had to be source code files.
    - Make and config files were included as candidates if they contained >5
    lines of source
    - File already had some variant of a license header in it (even if
    Reviewed-by: Philippe Ombredanne
    Reviewed-by: Thomas Gleixner
    Signed-off-by: Greg Kroah-Hartman

    Greg Kroah-Hartman
     

15 Sep, 2017

3 commits

  • MIME-Version: 1.0
    Content-Type: text/plain; charset=UTF-8
    Content-Transfer-Encoding: 8bit

    The script “checkpatch.pl” pointed information out like the following.

    Comparison to NULL could be written !…

    Thus fix affected source code places.

    Signed-off-by: Markus Elfring
    Signed-off-by: Mike Marshall

    Markus Elfring
     
  • posix_acl_update_mode checks to see if the permissions
    described by the ACL can be encoded into the
    object's mode. If so, it sets "acl" to NULL
    and "mode" to the new desired value. Prior to this patch
    we failed to actually propagate the new mode back to the
    server.

    Signed-off-by: Mike Marshall

    Mike Marshall
     
  • When new directory 'DIR1' is created in a directory 'DIR0' with SGID bit
    set, DIR1 is expected to have SGID bit set (and owning group equal to
    the owning group of 'DIR0'). However when 'DIR0' also has some default
    ACLs that 'DIR1' inherits, setting these ACLs will result in SGID bit on
    'DIR1' to get cleared if user is not member of the owning group.

    Fix the problem by creating __orangefs_set_acl() function that does not
    call posix_acl_update_mode() and use it when inheriting ACLs. That
    prevents SGID bit clearing and the mode has been properly set by
    posix_acl_create() anyway.

    Fixes: 073931017b49d9458aa351605b43a7e34598caef
    CC: stable@vger.kernel.org
    CC: Mike Marshall
    CC: pvfs2-developers@beowulf-underground.org
    Signed-off-by: Jan Kara
    Signed-off-by: Mike Marshall

    Jan Kara
     

22 Sep, 2016

1 commit

  • When file permissions are modified via chmod(2) and the user is not in
    the owning group or capable of CAP_FSETID, the setgid bit is cleared in
    inode_change_ok(). Setting a POSIX ACL via setxattr(2) sets the file
    permissions as well as the new ACL, but doesn't clear the setgid bit in
    a similar way; this allows to bypass the check in chmod(2). Fix that.

    References: CVE-2016-7097
    Reviewed-by: Christoph Hellwig
    Reviewed-by: Jeff Layton
    Signed-off-by: Jan Kara
    Signed-off-by: Andreas Gruenbacher

    Jan Kara
     

06 Jul, 2016

2 commits


05 Dec, 2015

1 commit


04 Dec, 2015

1 commit

  • OrangeFS was formerly known as PVFS2 and retains the name in many places.

    I leave the device /dev/pvfs2-req since this affects userspace.

    I leave the filesystem type pvfs2 since this affects userspace. Further
    the OrangeFS sysint library reads fstab for an entry of type pvfs2
    independently of kernel mounts.

    I leave extended attribute keys user.pvfs2 and system.pvfs2 as the
    sysint library understands these.

    I leave references to userspace binaries still named pvfs2.

    I leave the filenames.

    Signed-off-by: Yi Liu
    [martin@omnibond.com: clairify above constraints and merge]
    Signed-off-by: Martin Brandenburg
    Signed-off-by: Mike Marshall

    Yi Liu
     

03 Oct, 2015

1 commit