xref: /freebsd/sys/contrib/openzfs/config/kernel-acl.m4 (revision 59c8e88e72633afbc47a4ace0d2170d00d51f7dc)
1dnl #
2dnl # Check if posix_acl_release can be used from a ZFS_META_LICENSED
3dnl # module.  The is_owner_or_cap macro was replaced by
4dnl # inode_owner_or_capable
5dnl #
6AC_DEFUN([ZFS_AC_KERNEL_SRC_POSIX_ACL_RELEASE], [
7	ZFS_LINUX_TEST_SRC([posix_acl_release], [
8		#include <linux/cred.h>
9		#include <linux/fs.h>
10		#include <linux/posix_acl.h>
11	], [
12		struct posix_acl *tmp = posix_acl_alloc(1, 0);
13		posix_acl_release(tmp);
14	], [], [ZFS_META_LICENSE])
15])
16
17AC_DEFUN([ZFS_AC_KERNEL_POSIX_ACL_RELEASE], [
18	AC_MSG_CHECKING([whether posix_acl_release() is available])
19	ZFS_LINUX_TEST_RESULT([posix_acl_release], [
20		AC_MSG_RESULT(yes)
21		AC_DEFINE(HAVE_POSIX_ACL_RELEASE, 1,
22		    [posix_acl_release() is available])
23
24		AC_MSG_CHECKING([whether posix_acl_release() is GPL-only])
25		ZFS_LINUX_TEST_RESULT([posix_acl_release_license], [
26			AC_MSG_RESULT(no)
27		],[
28			AC_MSG_RESULT(yes)
29			AC_DEFINE(HAVE_POSIX_ACL_RELEASE_GPL_ONLY, 1,
30			    [posix_acl_release() is GPL-only])
31		])
32	],[
33		AC_MSG_RESULT(no)
34	])
35])
36
37dnl #
38dnl # 3.14 API change,
39dnl # set_cached_acl() and forget_cached_acl() changed from inline to
40dnl # EXPORT_SYMBOL. In the former case, they may not be usable because of
41dnl # posix_acl_release. In the latter case, we can always use them.
42dnl #
43AC_DEFUN([ZFS_AC_KERNEL_SRC_SET_CACHED_ACL_USABLE], [
44	ZFS_LINUX_TEST_SRC([set_cached_acl], [
45		#include <linux/cred.h>
46		#include <linux/fs.h>
47		#include <linux/posix_acl.h>
48	], [
49		struct inode *ip = NULL;
50		struct posix_acl *acl = posix_acl_alloc(1, 0);
51		set_cached_acl(ip, ACL_TYPE_ACCESS, acl);
52		forget_cached_acl(ip, ACL_TYPE_ACCESS);
53	], [], [ZFS_META_LICENSE])
54])
55
56AC_DEFUN([ZFS_AC_KERNEL_SET_CACHED_ACL_USABLE], [
57	AC_MSG_CHECKING([whether set_cached_acl() is usable])
58	ZFS_LINUX_TEST_RESULT([set_cached_acl_license], [
59		AC_MSG_RESULT(yes)
60		AC_DEFINE(HAVE_SET_CACHED_ACL_USABLE, 1,
61		    [set_cached_acl() is usable])
62	],[
63		AC_MSG_RESULT(no)
64	])
65])
66
67dnl #
68dnl # 3.1 API change,
69dnl # posix_acl_chmod() was added as the preferred interface.
70dnl #
71dnl # 3.14 API change,
72dnl # posix_acl_chmod() was changed to __posix_acl_chmod()
73dnl #
74AC_DEFUN([ZFS_AC_KERNEL_SRC_POSIX_ACL_CHMOD], [
75	ZFS_LINUX_TEST_SRC([posix_acl_chmod], [
76		#include <linux/fs.h>
77		#include <linux/posix_acl.h>
78	],[
79		posix_acl_chmod(NULL, 0, 0)
80	])
81
82	ZFS_LINUX_TEST_SRC([__posix_acl_chmod], [
83		#include <linux/fs.h>
84		#include <linux/posix_acl.h>
85	],[
86		__posix_acl_chmod(NULL, 0, 0)
87	])
88])
89
90AC_DEFUN([ZFS_AC_KERNEL_POSIX_ACL_CHMOD], [
91	AC_MSG_CHECKING([whether __posix_acl_chmod exists])
92	ZFS_LINUX_TEST_RESULT([__posix_acl_chmod], [
93		AC_MSG_RESULT(yes)
94		AC_DEFINE(HAVE___POSIX_ACL_CHMOD, 1,
95		    [__posix_acl_chmod() exists])
96	],[
97		AC_MSG_RESULT(no)
98
99		AC_MSG_CHECKING([whether posix_acl_chmod exists])
100		ZFS_LINUX_TEST_RESULT([posix_acl_chmod], [
101			AC_MSG_RESULT(yes)
102			AC_DEFINE(HAVE_POSIX_ACL_CHMOD, 1,
103			    [posix_acl_chmod() exists])
104		],[
105			ZFS_LINUX_TEST_ERROR([posix_acl_chmod()])
106		])
107	])
108])
109
110dnl #
111dnl # 3.1 API change,
112dnl # posix_acl_equiv_mode now wants an umode_t instead of a mode_t
113dnl #
114AC_DEFUN([ZFS_AC_KERNEL_SRC_POSIX_ACL_EQUIV_MODE_WANTS_UMODE_T], [
115	ZFS_LINUX_TEST_SRC([posix_acl_equiv_mode], [
116		#include <linux/fs.h>
117		#include <linux/posix_acl.h>
118	],[
119		umode_t tmp;
120		posix_acl_equiv_mode(NULL, &tmp);
121	])
122])
123
124AC_DEFUN([ZFS_AC_KERNEL_POSIX_ACL_EQUIV_MODE_WANTS_UMODE_T], [
125	AC_MSG_CHECKING([whether posix_acl_equiv_mode() wants umode_t])
126	ZFS_LINUX_TEST_RESULT([posix_acl_equiv_mode], [
127		AC_MSG_RESULT(yes)
128	],[
129		ZFS_LINUX_TEST_ERROR([posix_acl_equiv_mode()])
130	])
131])
132
133dnl #
134dnl # 4.8 API change,
135dnl # The function posix_acl_valid now must be passed a namespace.
136dnl #
137AC_DEFUN([ZFS_AC_KERNEL_SRC_POSIX_ACL_VALID_WITH_NS], [
138	ZFS_LINUX_TEST_SRC([posix_acl_valid_with_ns], [
139		#include <linux/fs.h>
140		#include <linux/posix_acl.h>
141	],[
142		struct user_namespace *user_ns = NULL;
143		const struct posix_acl *acl = NULL;
144		int error;
145
146		error = posix_acl_valid(user_ns, acl);
147	])
148])
149
150AC_DEFUN([ZFS_AC_KERNEL_POSIX_ACL_VALID_WITH_NS], [
151	AC_MSG_CHECKING([whether posix_acl_valid() wants user namespace])
152	ZFS_LINUX_TEST_RESULT([posix_acl_valid_with_ns], [
153		AC_MSG_RESULT(yes)
154		AC_DEFINE(HAVE_POSIX_ACL_VALID_WITH_NS, 1,
155		    [posix_acl_valid() wants user namespace])
156	],[
157		AC_MSG_RESULT(no)
158	])
159])
160
161dnl #
162dnl # 3.1 API change,
163dnl # Check if inode_operations contains the function get_acl
164dnl #
165dnl # 5.15 API change,
166dnl # Added the bool rcu argument to get_acl for rcu path walk.
167dnl #
168dnl # 6.2 API change,
169dnl # get_acl() was renamed to get_inode_acl()
170dnl #
171AC_DEFUN([ZFS_AC_KERNEL_SRC_INODE_OPERATIONS_GET_ACL], [
172	ZFS_LINUX_TEST_SRC([inode_operations_get_acl], [
173		#include <linux/fs.h>
174
175		static struct posix_acl *get_acl_fn(struct inode *inode, int type)
176		    { return NULL; }
177
178		static const struct inode_operations
179		    iops __attribute__ ((unused)) = {
180			.get_acl = get_acl_fn,
181		};
182	],[])
183
184	ZFS_LINUX_TEST_SRC([inode_operations_get_acl_rcu], [
185		#include <linux/fs.h>
186
187		static struct posix_acl *get_acl_fn(struct inode *inode, int type,
188		    bool rcu) { return NULL; }
189
190		static const struct inode_operations
191		    iops __attribute__ ((unused)) = {
192			.get_acl = get_acl_fn,
193		};
194	],[])
195
196	ZFS_LINUX_TEST_SRC([inode_operations_get_inode_acl], [
197		#include <linux/fs.h>
198
199		static struct posix_acl *get_inode_acl_fn(struct inode *inode, int type,
200		    bool rcu) { return NULL; }
201
202		static const struct inode_operations
203		    iops __attribute__ ((unused)) = {
204			.get_inode_acl = get_inode_acl_fn,
205		};
206	],[])
207])
208
209AC_DEFUN([ZFS_AC_KERNEL_INODE_OPERATIONS_GET_ACL], [
210	AC_MSG_CHECKING([whether iops->get_acl() exists])
211	ZFS_LINUX_TEST_RESULT([inode_operations_get_acl], [
212		AC_MSG_RESULT(yes)
213		AC_DEFINE(HAVE_GET_ACL, 1, [iops->get_acl() exists])
214	],[
215		ZFS_LINUX_TEST_RESULT([inode_operations_get_acl_rcu], [
216			AC_MSG_RESULT(yes)
217			AC_DEFINE(HAVE_GET_ACL_RCU, 1, [iops->get_acl() takes rcu])
218		],[
219			ZFS_LINUX_TEST_RESULT([inode_operations_get_inode_acl], [
220				AC_MSG_RESULT(yes)
221				AC_DEFINE(HAVE_GET_INODE_ACL, 1, [has iops->get_inode_acl()])
222			],[
223				ZFS_LINUX_TEST_ERROR([iops->get_acl() or iops->get_inode_acl()])
224			])
225		])
226	])
227])
228
229dnl #
230dnl # 3.14 API change,
231dnl # Check if inode_operations contains the function set_acl
232dnl #
233dnl # 5.12 API change,
234dnl # set_acl() added a user_namespace* parameter first
235dnl #
236dnl # 6.2 API change,
237dnl # set_acl() second paramter changed to a struct dentry *
238dnl #
239dnl # 6.3 API change,
240dnl # set_acl() first parameter changed to struct mnt_idmap *
241dnl #
242AC_DEFUN([ZFS_AC_KERNEL_SRC_INODE_OPERATIONS_SET_ACL], [
243	ZFS_LINUX_TEST_SRC([inode_operations_set_acl_mnt_idmap_dentry], [
244		#include <linux/fs.h>
245
246		static int set_acl_fn(struct mnt_idmap *idmap,
247		    struct dentry *dent, struct posix_acl *acl,
248		    int type) { return 0; }
249
250		static const struct inode_operations
251		    iops __attribute__ ((unused)) = {
252			.set_acl = set_acl_fn,
253		};
254	],[])
255	ZFS_LINUX_TEST_SRC([inode_operations_set_acl_userns_dentry], [
256		#include <linux/fs.h>
257
258		static int set_acl_fn(struct user_namespace *userns,
259		    struct dentry *dent, struct posix_acl *acl,
260		    int type) { return 0; }
261
262		static const struct inode_operations
263		    iops __attribute__ ((unused)) = {
264			.set_acl = set_acl_fn,
265		};
266	],[])
267	ZFS_LINUX_TEST_SRC([inode_operations_set_acl_userns], [
268		#include <linux/fs.h>
269
270		static int set_acl_fn(struct user_namespace *userns,
271		    struct inode *inode, struct posix_acl *acl,
272		    int type) { return 0; }
273
274		static const struct inode_operations
275		    iops __attribute__ ((unused)) = {
276			.set_acl = set_acl_fn,
277		};
278	],[])
279	ZFS_LINUX_TEST_SRC([inode_operations_set_acl], [
280		#include <linux/fs.h>
281
282		static int set_acl_fn(struct inode *inode, struct posix_acl *acl,
283		    int type) { return 0; }
284
285		static const struct inode_operations
286		    iops __attribute__ ((unused)) = {
287			.set_acl = set_acl_fn,
288		};
289	],[])
290])
291
292AC_DEFUN([ZFS_AC_KERNEL_INODE_OPERATIONS_SET_ACL], [
293	AC_MSG_CHECKING([whether iops->set_acl() exists])
294	ZFS_LINUX_TEST_RESULT([inode_operations_set_acl_userns], [
295		AC_MSG_RESULT(yes)
296		AC_DEFINE(HAVE_SET_ACL, 1, [iops->set_acl() exists])
297		AC_DEFINE(HAVE_SET_ACL_USERNS, 1, [iops->set_acl() takes 4 args])
298	],[
299		ZFS_LINUX_TEST_RESULT([inode_operations_set_acl_mnt_idmap_dentry], [
300			AC_MSG_RESULT(yes)
301			AC_DEFINE(HAVE_SET_ACL, 1, [iops->set_acl() exists])
302			AC_DEFINE(HAVE_SET_ACL_IDMAP_DENTRY, 1,
303			    [iops->set_acl() takes 4 args, arg1 is struct mnt_idmap *])
304		],[
305			ZFS_LINUX_TEST_RESULT([inode_operations_set_acl_userns_dentry], [
306				AC_MSG_RESULT(yes)
307				AC_DEFINE(HAVE_SET_ACL, 1, [iops->set_acl() exists])
308				AC_DEFINE(HAVE_SET_ACL_USERNS_DENTRY_ARG2, 1,
309				    [iops->set_acl() takes 4 args, arg2 is struct dentry *])
310			],[
311				ZFS_LINUX_TEST_RESULT([inode_operations_set_acl], [
312					AC_MSG_RESULT(yes)
313					AC_DEFINE(HAVE_SET_ACL, 1, [iops->set_acl() exists, takes 3 args])
314				],[
315					ZFS_LINUX_REQUIRE_API([i_op->set_acl()], [3.14])
316				])
317			])
318		])
319	])
320])
321
322dnl #
323dnl # 4.7 API change,
324dnl # The kernel get_acl will now check cache before calling i_op->get_acl and
325dnl # do set_cached_acl after that, so i_op->get_acl don't need to do that
326dnl # anymore.
327dnl #
328AC_DEFUN([ZFS_AC_KERNEL_SRC_GET_ACL_HANDLE_CACHE], [
329	ZFS_LINUX_TEST_SRC([get_acl_handle_cache], [
330		#include <linux/fs.h>
331	],[
332		void *sentinel __attribute__ ((unused)) =
333		    uncached_acl_sentinel(NULL);
334	])
335])
336
337AC_DEFUN([ZFS_AC_KERNEL_GET_ACL_HANDLE_CACHE], [
338	AC_MSG_CHECKING([whether uncached_acl_sentinel() exists])
339	ZFS_LINUX_TEST_RESULT([get_acl_handle_cache], [
340		AC_MSG_RESULT(yes)
341		AC_DEFINE(HAVE_KERNEL_GET_ACL_HANDLE_CACHE, 1,
342		    [uncached_acl_sentinel() exists])
343	],[
344		AC_MSG_RESULT(no)
345	])
346])
347
348dnl #
349dnl # 4.16 kernel: check if struct posix_acl acl.a_refcount is a refcount_t.
350dnl # It's an atomic_t on older kernels.
351dnl #
352AC_DEFUN([ZFS_AC_KERNEL_SRC_ACL_HAS_REFCOUNT], [
353	ZFS_LINUX_TEST_SRC([acl_refcount], [
354		#include <linux/backing-dev.h>
355		#include <linux/refcount.h>
356		#include <linux/posix_acl.h>
357	],[
358		struct posix_acl acl;
359		refcount_t *r __attribute__ ((unused)) = &acl.a_refcount;
360	])
361])
362
363AC_DEFUN([ZFS_AC_KERNEL_ACL_HAS_REFCOUNT], [
364	AC_MSG_CHECKING([whether posix_acl has refcount_t])
365	ZFS_LINUX_TEST_RESULT([acl_refcount], [
366		AC_MSG_RESULT(yes)
367		AC_DEFINE(HAVE_ACL_REFCOUNT, 1, [posix_acl has refcount_t])
368	],[
369		AC_MSG_RESULT(no)
370	])
371])
372
373AC_DEFUN([ZFS_AC_KERNEL_SRC_ACL], [
374	ZFS_AC_KERNEL_SRC_POSIX_ACL_RELEASE
375	ZFS_AC_KERNEL_SRC_SET_CACHED_ACL_USABLE
376	ZFS_AC_KERNEL_SRC_POSIX_ACL_CHMOD
377	ZFS_AC_KERNEL_SRC_POSIX_ACL_EQUIV_MODE_WANTS_UMODE_T
378	ZFS_AC_KERNEL_SRC_POSIX_ACL_VALID_WITH_NS
379	ZFS_AC_KERNEL_SRC_INODE_OPERATIONS_GET_ACL
380	ZFS_AC_KERNEL_SRC_INODE_OPERATIONS_SET_ACL
381	ZFS_AC_KERNEL_SRC_GET_ACL_HANDLE_CACHE
382	ZFS_AC_KERNEL_SRC_ACL_HAS_REFCOUNT
383])
384
385AC_DEFUN([ZFS_AC_KERNEL_ACL], [
386	ZFS_AC_KERNEL_POSIX_ACL_RELEASE
387	ZFS_AC_KERNEL_SET_CACHED_ACL_USABLE
388	ZFS_AC_KERNEL_POSIX_ACL_CHMOD
389	ZFS_AC_KERNEL_POSIX_ACL_EQUIV_MODE_WANTS_UMODE_T
390	ZFS_AC_KERNEL_POSIX_ACL_VALID_WITH_NS
391	ZFS_AC_KERNEL_INODE_OPERATIONS_GET_ACL
392	ZFS_AC_KERNEL_INODE_OPERATIONS_SET_ACL
393	ZFS_AC_KERNEL_GET_ACL_HANDLE_CACHE
394	ZFS_AC_KERNEL_ACL_HAS_REFCOUNT
395])
396