Re: [PATCH] cifs: Allow to set extended attribute cifs_acl (repost)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Mar 8, 2011 at 9:58 AM, Jeff Layton <jlayton@xxxxxxxxxx> wrote:
> On Tue, 8 Mar 2011 09:55:08 -0600
> Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx> wrote:
>
>> On Tue, Mar 8, 2011 at 9:43 AM, Shirish Pargaonkar
>> <shirishpargaonkar@xxxxxxxxx> wrote:
>> > On Tue, Mar 8, 2011 at 9:22 AM, Jeff Layton <jlayton@xxxxxxxxxx> wrote:
>> >> On Tue, 8 Mar 2011 09:17:48 -0600
>> >> Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx> wrote:
>> >>
>> >>> On Tue, Mar 8, 2011 at 8:32 AM, Jeff Layton <jlayton@xxxxxxxxxx> wrote:
>> >>> > On Mon,  7 Mar 2011 23:00:25 -0600
>> >>> > shirishpargaonkar@xxxxxxxxx wrote:
>> >>> >
>> >>> >> From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
>> >>> >>
>> >>> >>
>> >>> >> Allow setting cifs_acl on the server.
>> >>> >> Pass on to the server the ACL blob generated by an application.
>> >>> >> cifs is just a pass-through, server decides whether to enforce/apply
>> >>> >> the ACL blob composed by an application.
>> >>> >>
>> >>> >>
>> >>> >> Signed-off-by: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
>> >>> >
>> >>> > Seems sane enough and is probably more useful than trying to map all of
>> >>> > this to POSIX acl's and modes. I wonder though...if you do this, then
>> >>> > the permissions and possibly ownership change. Do you need to
>> >>>
>> >>> owner/group will not change, only the ACL (DACL).
>> >>>
>> >>
>> >> So I can't change group ownership on the file by modifying the DACL?
>> >>
>> >
>> > ACL is a list of ACEs and owner and group do not qualify as an ACE.
>> >
>> >> Also, while I don't particularly like the cifsacl acl-to-mode mapping
>> >> code, it still exists. If someone changes the ACL, don't you need to
>> >> account for the possibility that the mode has also changed?
>> >
>> > yes. Should invalidate the inode metadata as you stated earlier.
>> >
>> >>
>> >> --
>> >> Jeff Layton <jlayton@xxxxxxxxxx>
>> >>
>> >
>>
>> # smbcacls
>> Usage: smbcacls [-?] [-?tV] [-?tV] [-?tVNkPe] [-?|--help] [--usage]
>> [-D|--delete ACL]
>>         [-M|--modify ACL] [-a|--add ACL] [-S|--set ACLS] [-C|--chown USERNAME]
>>         [-G|--chgrp GROUPNAME] [--numeric] [-t|--test-args]
>>
>> Not sure what the tool would generate the "ACL blob" would_be/would_do!
>> Should cifs module check what the blob contains or just strictly act
>> as a pass-through
>> and let server decide?
>
> I'd leave it all up to the server and just pass it through.
>
>> Meanwhile if the command succeeds, cifs client should simply
>> invalidate inode metadata?
>
> That sounds reasonable. If you're sure it can't change ownership, then
> you could consider doing that only when cifsacl is enabled, but it's
> probably safest to just invalidate it unconditionally. I can't imagine
> that this will be a commonly used codepath anyway.

I think invalidating on setacl sucess for the case when cifsacl
enabled makes sense.



-- 
Thanks,

Steve
--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux