generic_acl: no need to clone acl just to push it to set_cached_acl()
[deliverable/linux.git] / fs / gfs2 / acl.c
CommitLineData
b3b94faa
DT
1/*
2 * Copyright (C) Sistina Software, Inc. 1997-2003 All rights reserved.
3a8a9a10 3 * Copyright (C) 2004-2006 Red Hat, Inc. All rights reserved.
b3b94faa
DT
4 *
5 * This copyrighted material is made available to anyone wishing to use,
6 * modify, copy, or redistribute it subject to the terms and conditions
e9fc2aa0 7 * of the GNU General Public License version 2.
b3b94faa
DT
8 */
9
10#include <linux/sched.h>
11#include <linux/slab.h>
12#include <linux/spinlock.h>
13#include <linux/completion.h>
14#include <linux/buffer_head.h>
2646a1f6 15#include <linux/xattr.h>
b3b94faa
DT
16#include <linux/posix_acl.h>
17#include <linux/posix_acl_xattr.h>
5c676f6d 18#include <linux/gfs2_ondisk.h>
b3b94faa
DT
19
20#include "gfs2.h"
5c676f6d 21#include "incore.h"
b3b94faa 22#include "acl.h"
307cf6e6 23#include "xattr.h"
b3b94faa
DT
24#include "glock.h"
25#include "inode.h"
26#include "meta_io.h"
27#include "trans.h"
5c676f6d 28#include "util.h"
b3b94faa 29
479c427d 30static const char *gfs2_acl_name(int type)
b3b94faa 31{
479c427d
SW
32 switch (type) {
33 case ACL_TYPE_ACCESS:
34 return GFS2_POSIX_ACL_ACCESS;
35 case ACL_TYPE_DEFAULT:
36 return GFS2_POSIX_ACL_DEFAULT;
37 }
38 return NULL;
39}
b3b94faa 40
479c427d
SW
41static struct posix_acl *gfs2_acl_get(struct gfs2_inode *ip, int type)
42{
43 struct posix_acl *acl;
44 const char *name;
45 char *data;
46 int len;
40b78a32 47
3767ac21 48 if (!ip->i_eattr)
479c427d 49 return NULL;
b3b94faa 50
106381bf
SW
51 acl = get_cached_acl(&ip->i_inode, type);
52 if (acl != ACL_NOT_CACHED)
53 return acl;
54
479c427d
SW
55 name = gfs2_acl_name(type);
56 if (name == NULL)
57 return ERR_PTR(-EINVAL);
b3b94faa 58
479c427d
SW
59 len = gfs2_xattr_acl_get(ip, name, &data);
60 if (len < 0)
61 return ERR_PTR(len);
62 if (len == 0)
63 return NULL;
b3b94faa 64
479c427d
SW
65 acl = posix_acl_from_xattr(data, len);
66 kfree(data);
67 return acl;
b3b94faa
DT
68}
69
70/**
77386e1f 71 * gfs2_check_acl - Check an ACL to see if we're allowed to do something
b3b94faa
DT
72 * @inode: the file we want to do something to
73 * @mask: what we want to do
74 *
75 * Returns: errno
76 */
77
7e40145e 78int gfs2_check_acl(struct inode *inode, int mask)
b3b94faa 79{
479c427d 80 struct posix_acl *acl;
b3b94faa
DT
81 int error;
82
479c427d
SW
83 acl = gfs2_acl_get(GFS2_I(inode), ACL_TYPE_ACCESS);
84 if (IS_ERR(acl))
85 return PTR_ERR(acl);
b3b94faa
DT
86
87 if (acl) {
88 error = posix_acl_permission(inode, acl, mask);
89 posix_acl_release(acl);
90 return error;
91 }
92
93 return -EAGAIN;
94}
95
69dca424 96static int gfs2_set_mode(struct inode *inode, mode_t mode)
b3b94faa 97{
69dca424 98 int error = 0;
b3b94faa 99
69dca424
SW
100 if (mode != inode->i_mode) {
101 struct iattr iattr;
b3b94faa 102
69dca424
SW
103 iattr.ia_valid = ATTR_MODE;
104 iattr.ia_mode = mode;
b3b94faa 105
69dca424
SW
106 error = gfs2_setattr_simple(GFS2_I(inode), &iattr);
107 }
b3b94faa 108
69dca424 109 return error;
b3b94faa
DT
110}
111
479c427d 112static int gfs2_acl_set(struct inode *inode, int type, struct posix_acl *acl)
b3b94faa 113{
b3b94faa 114 int error;
479c427d
SW
115 int len;
116 char *data;
117 const char *name = gfs2_acl_name(type);
118
119 BUG_ON(name == NULL);
120 len = posix_acl_to_xattr(acl, NULL, 0);
121 if (len == 0)
122 return 0;
123 data = kmalloc(len, GFP_NOFS);
124 if (data == NULL)
125 return -ENOMEM;
126 error = posix_acl_to_xattr(acl, data, len);
127 if (error < 0)
128 goto out;
431547b3 129 error = __gfs2_xattr_set(inode, name, data, len, 0, GFS2_EATYPE_SYS);
106381bf
SW
130 if (!error)
131 set_cached_acl(inode, type, acl);
479c427d
SW
132out:
133 kfree(data);
134 return error;
135}
136
137int gfs2_acl_create(struct gfs2_inode *dip, struct inode *inode)
138{
139 struct gfs2_sbd *sdp = GFS2_SB(&dip->i_inode);
140 struct posix_acl *acl, *clone;
141 mode_t mode = inode->i_mode;
142 int error = 0;
b3b94faa
DT
143
144 if (!sdp->sd_args.ar_posix_acl)
145 return 0;
479c427d 146 if (S_ISLNK(inode->i_mode))
b3b94faa
DT
147 return 0;
148
479c427d
SW
149 acl = gfs2_acl_get(dip, ACL_TYPE_DEFAULT);
150 if (IS_ERR(acl))
151 return PTR_ERR(acl);
b3b94faa 152 if (!acl) {
ce3b0f8d 153 mode &= ~current_umask();
479c427d
SW
154 if (mode != inode->i_mode)
155 error = gfs2_set_mode(inode, mode);
b3b94faa
DT
156 return error;
157 }
158
479c427d
SW
159 if (S_ISDIR(inode->i_mode)) {
160 error = gfs2_acl_set(inode, ACL_TYPE_DEFAULT, acl);
161 if (error)
162 goto out;
163 }
164
16c5f06f 165 clone = posix_acl_clone(acl, GFP_NOFS);
b3b94faa
DT
166 error = -ENOMEM;
167 if (!clone)
168 goto out;
169 posix_acl_release(acl);
170 acl = clone;
171
b3b94faa
DT
172 error = posix_acl_create_masq(acl, &mode);
173 if (error < 0)
174 goto out;
40b78a32
SW
175 if (error == 0)
176 goto munge;
b3b94faa 177
479c427d 178 error = gfs2_acl_set(inode, ACL_TYPE_ACCESS, acl);
40b78a32
SW
179 if (error)
180 goto out;
181munge:
479c427d 182 error = gfs2_set_mode(inode, mode);
a91ea69f 183out:
b3b94faa 184 posix_acl_release(acl);
b3b94faa
DT
185 return error;
186}
187
188int gfs2_acl_chmod(struct gfs2_inode *ip, struct iattr *attr)
189{
bc26ab5f 190 struct posix_acl *acl;
b3b94faa
DT
191 char *data;
192 unsigned int len;
193 int error;
194
479c427d
SW
195 acl = gfs2_acl_get(ip, ACL_TYPE_ACCESS);
196 if (IS_ERR(acl))
197 return PTR_ERR(acl);
b3b94faa
DT
198 if (!acl)
199 return gfs2_setattr_simple(ip, attr);
200
bc26ab5f
AV
201 error = posix_acl_chmod(&acl, GFP_NOFS, attr->ia_mode);
202 if (error)
203 return error;
204
205 len = posix_acl_to_xattr(acl, NULL, 0);
206 data = kmalloc(len, GFP_NOFS);
b3b94faa 207 error = -ENOMEM;
bc26ab5f 208 if (data == NULL)
b3b94faa 209 goto out;
bc26ab5f
AV
210 posix_acl_to_xattr(acl, data, len);
211 error = gfs2_xattr_acl_chmod(ip, attr, data);
212 kfree(data);
213 set_cached_acl(&ip->i_inode, ACL_TYPE_ACCESS, acl);
b3b94faa 214
a91ea69f 215out:
b3b94faa 216 posix_acl_release(acl);
b3b94faa
DT
217 return error;
218}
219
2646a1f6
SW
220static int gfs2_acl_type(const char *name)
221{
222 if (strcmp(name, GFS2_POSIX_ACL_ACCESS) == 0)
223 return ACL_TYPE_ACCESS;
224 if (strcmp(name, GFS2_POSIX_ACL_DEFAULT) == 0)
225 return ACL_TYPE_DEFAULT;
226 return -EINVAL;
227}
228
431547b3
CH
229static int gfs2_xattr_system_get(struct dentry *dentry, const char *name,
230 void *buffer, size_t size, int xtype)
2646a1f6 231{
431547b3 232 struct inode *inode = dentry->d_inode;
f72f2d2e 233 struct gfs2_sbd *sdp = GFS2_SB(inode);
106381bf 234 struct posix_acl *acl;
2646a1f6 235 int type;
106381bf 236 int error;
2646a1f6 237
f72f2d2e
SW
238 if (!sdp->sd_args.ar_posix_acl)
239 return -EOPNOTSUPP;
240
2646a1f6
SW
241 type = gfs2_acl_type(name);
242 if (type < 0)
243 return type;
244
106381bf
SW
245 acl = gfs2_acl_get(GFS2_I(inode), type);
246 if (IS_ERR(acl))
247 return PTR_ERR(acl);
248 if (acl == NULL)
249 return -ENODATA;
2646a1f6 250
106381bf
SW
251 error = posix_acl_to_xattr(acl, buffer, size);
252 posix_acl_release(acl);
253
254 return error;
255}
2646a1f6 256
431547b3
CH
257static int gfs2_xattr_system_set(struct dentry *dentry, const char *name,
258 const void *value, size_t size, int flags,
259 int xtype)
2646a1f6 260{
431547b3 261 struct inode *inode = dentry->d_inode;
2646a1f6
SW
262 struct gfs2_sbd *sdp = GFS2_SB(inode);
263 struct posix_acl *acl = NULL;
264 int error = 0, type;
265
266 if (!sdp->sd_args.ar_posix_acl)
267 return -EOPNOTSUPP;
268
269 type = gfs2_acl_type(name);
270 if (type < 0)
271 return type;
272 if (flags & XATTR_CREATE)
273 return -EINVAL;
274 if (type == ACL_TYPE_DEFAULT && !S_ISDIR(inode->i_mode))
275 return value ? -EACCES : 0;
276 if ((current_fsuid() != inode->i_uid) && !capable(CAP_FOWNER))
277 return -EPERM;
278 if (S_ISLNK(inode->i_mode))
279 return -EOPNOTSUPP;
280
281 if (!value)
282 goto set_acl;
283
284 acl = posix_acl_from_xattr(value, size);
285 if (!acl) {
286 /*
287 * acl_set_file(3) may request that we set default ACLs with
288 * zero length -- defend (gracefully) against that here.
289 */
290 goto out;
291 }
292 if (IS_ERR(acl)) {
293 error = PTR_ERR(acl);
294 goto out;
295 }
296
297 error = posix_acl_valid(acl);
298 if (error)
299 goto out_release;
300
301 error = -EINVAL;
302 if (acl->a_count > GFS2_ACL_MAX_ENTRIES)
303 goto out_release;
304
305 if (type == ACL_TYPE_ACCESS) {
306 mode_t mode = inode->i_mode;
307 error = posix_acl_equiv_mode(acl, &mode);
308
309 if (error <= 0) {
310 posix_acl_release(acl);
311 acl = NULL;
312
313 if (error < 0)
314 return error;
315 }
316
317 error = gfs2_set_mode(inode, mode);
318 if (error)
319 goto out_release;
320 }
321
322set_acl:
431547b3 323 error = __gfs2_xattr_set(inode, name, value, size, 0, GFS2_EATYPE_SYS);
106381bf
SW
324 if (!error) {
325 if (acl)
326 set_cached_acl(inode, type, acl);
327 else
328 forget_cached_acl(inode, type);
329 }
2646a1f6
SW
330out_release:
331 posix_acl_release(acl);
332out:
333 return error;
334}
335
b7bb0a12 336const struct xattr_handler gfs2_xattr_system_handler = {
2646a1f6 337 .prefix = XATTR_SYSTEM_PREFIX,
431547b3 338 .flags = GFS2_EATYPE_SYS,
2646a1f6
SW
339 .get = gfs2_xattr_system_get,
340 .set = gfs2_xattr_system_set,
341};
342
This page took 0.43217 seconds and 5 git commands to generate.