]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/btrfs/acl.c
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6
[mirror_ubuntu-artful-kernel.git] / fs / btrfs / acl.c
CommitLineData
5103e947
JB
1/*
2 * Copyright (C) 2007 Red Hat. All rights reserved.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public
6 * License v2 as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
11 * General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public
14 * License along with this program; if not, write to the
15 * Free Software Foundation, Inc., 59 Temple Place - Suite 330,
16 * Boston, MA 021110-1307, USA.
17 */
18
19#include <linux/fs.h>
20#include <linux/string.h>
21#include <linux/xattr.h>
22#include <linux/posix_acl_xattr.h>
33268eaf 23#include <linux/posix_acl.h>
c1e32da6 24#include <linux/sched.h>
5a0e3ad6 25#include <linux/slab.h>
33268eaf 26
5103e947 27#include "ctree.h"
33268eaf 28#include "btrfs_inode.h"
5103e947 29#include "xattr.h"
33268eaf 30
0eda294d 31#ifdef CONFIG_BTRFS_FS_POSIX_ACL
eab922ec 32
33268eaf
JB
33static struct posix_acl *btrfs_get_acl(struct inode *inode, int type)
34{
95819c05
CH
35 int size;
36 const char *name;
33268eaf 37 char *value = NULL;
073aaa1b
AV
38 struct posix_acl *acl;
39
d0f69686
MX
40 if (!IS_POSIXACL(inode))
41 return NULL;
42
073aaa1b
AV
43 acl = get_cached_acl(inode, type);
44 if (acl != ACL_NOT_CACHED)
45 return acl;
33268eaf
JB
46
47 switch (type) {
48 case ACL_TYPE_ACCESS:
95819c05 49 name = POSIX_ACL_XATTR_ACCESS;
33268eaf
JB
50 break;
51 case ACL_TYPE_DEFAULT:
95819c05 52 name = POSIX_ACL_XATTR_DEFAULT;
33268eaf
JB
53 break;
54 default:
073aaa1b 55 BUG();
33268eaf
JB
56 }
57
95819c05 58 size = __btrfs_getxattr(inode, name, "", 0);
33268eaf
JB
59 if (size > 0) {
60 value = kzalloc(size, GFP_NOFS);
61 if (!value)
62 return ERR_PTR(-ENOMEM);
95819c05 63 size = __btrfs_getxattr(inode, name, value, size);
33268eaf
JB
64 if (size > 0) {
65 acl = posix_acl_from_xattr(value, size);
42838bb2
JJ
66 if (IS_ERR(acl)) {
67 kfree(value);
834e7475 68 return acl;
42838bb2 69 }
073aaa1b 70 set_cached_acl(inode, type, acl);
33268eaf
JB
71 }
72 kfree(value);
7b1a14bb
CM
73 } else if (size == -ENOENT || size == -ENODATA || size == 0) {
74 /* FIXME, who returns -ENOENT? I think nobody */
33268eaf 75 acl = NULL;
073aaa1b 76 set_cached_acl(inode, type, acl);
7b1a14bb
CM
77 } else {
78 acl = ERR_PTR(-EIO);
33268eaf
JB
79 }
80
81 return acl;
82}
83
431547b3
CH
84static int btrfs_xattr_acl_get(struct dentry *dentry, const char *name,
85 void *value, size_t size, int type)
33268eaf
JB
86{
87 struct posix_acl *acl;
88 int ret = 0;
89
d0f69686
MX
90 if (!IS_POSIXACL(dentry->d_inode))
91 return -EOPNOTSUPP;
92
431547b3 93 acl = btrfs_get_acl(dentry->d_inode, type);
33268eaf
JB
94
95 if (IS_ERR(acl))
96 return PTR_ERR(acl);
97 if (acl == NULL)
98 return -ENODATA;
99 ret = posix_acl_to_xattr(acl, value, size);
100 posix_acl_release(acl);
101
102 return ret;
103}
104
105/*
106 * Needs to be called with fs_mutex held
107 */
f34f57a3
YZ
108static int btrfs_set_acl(struct btrfs_trans_handle *trans,
109 struct inode *inode, struct posix_acl *acl, int type)
33268eaf 110{
95819c05
CH
111 int ret, size = 0;
112 const char *name;
33268eaf
JB
113 char *value = NULL;
114 mode_t mode;
115
116 if (acl) {
117 ret = posix_acl_valid(acl);
118 if (ret < 0)
119 return ret;
120 ret = 0;
121 }
122
123 switch (type) {
124 case ACL_TYPE_ACCESS:
125 mode = inode->i_mode;
95819c05 126 name = POSIX_ACL_XATTR_ACCESS;
a9cc71a6
CM
127 if (acl) {
128 ret = posix_acl_equiv_mode(acl, &mode);
129 if (ret < 0)
130 return ret;
131 inode->i_mode = mode;
132 }
133 ret = 0;
33268eaf
JB
134 break;
135 case ACL_TYPE_DEFAULT:
136 if (!S_ISDIR(inode->i_mode))
137 return acl ? -EINVAL : 0;
95819c05 138 name = POSIX_ACL_XATTR_DEFAULT;
33268eaf
JB
139 break;
140 default:
141 return -EINVAL;
142 }
143
144 if (acl) {
145 size = posix_acl_xattr_size(acl->a_count);
146 value = kmalloc(size, GFP_NOFS);
147 if (!value) {
148 ret = -ENOMEM;
149 goto out;
150 }
151
152 ret = posix_acl_to_xattr(acl, value, size);
153 if (ret < 0)
154 goto out;
155 }
156
f34f57a3 157 ret = __btrfs_setxattr(trans, inode, name, value, size, 0);
33268eaf 158out:
d397712b 159 kfree(value);
33268eaf
JB
160
161 if (!ret)
073aaa1b 162 set_cached_acl(inode, type, acl);
33268eaf
JB
163
164 return ret;
165}
fb4bc1e0 166
431547b3
CH
167static int btrfs_xattr_acl_set(struct dentry *dentry, const char *name,
168 const void *value, size_t size, int flags, int type)
744f52f9 169{
f34f57a3 170 int ret;
33268eaf 171 struct posix_acl *acl = NULL;
5103e947 172
2e149670 173 if (!inode_owner_or_capable(dentry->d_inode))
2f26afba
SW
174 return -EPERM;
175
731e3d1b
SW
176 if (!IS_POSIXACL(dentry->d_inode))
177 return -EOPNOTSUPP;
178
744f52f9
Y
179 if (value) {
180 acl = posix_acl_from_xattr(value, size);
181 if (acl == NULL) {
182 value = NULL;
183 size = 0;
184 } else if (IS_ERR(acl)) {
33268eaf 185 return PTR_ERR(acl);
744f52f9 186 }
744f52f9 187 }
1caf9342 188
ebfee3d7 189 ret = btrfs_set_acl(NULL, dentry->d_inode, acl, type);
33268eaf
JB
190
191 posix_acl_release(acl);
192
193 return ret;
744f52f9 194}
33268eaf 195
b74c79e9 196int btrfs_check_acl(struct inode *inode, int mask, unsigned int flags)
33268eaf 197{
33268eaf
JB
198 int error = -EAGAIN;
199
258a5aa8
NP
200 if (flags & IPERM_FLAG_RCU) {
201 if (!negative_cached_acl(inode, ACL_TYPE_ACCESS))
202 error = -ECHILD;
33268eaf 203
258a5aa8
NP
204 } else {
205 struct posix_acl *acl;
206 acl = btrfs_get_acl(inode, ACL_TYPE_ACCESS);
207 if (IS_ERR(acl))
208 return PTR_ERR(acl);
209 if (acl) {
210 error = posix_acl_permission(inode, acl, mask);
211 posix_acl_release(acl);
212 }
33268eaf
JB
213 }
214
215 return error;
216}
217
218/*
219 * btrfs_init_acl is already generally called under fs_mutex, so the locking
220 * stuff has been fixed to work with that. If the locking stuff changes, we
221 * need to re-evaluate the acl locking stuff.
222 */
f34f57a3
YZ
223int btrfs_init_acl(struct btrfs_trans_handle *trans,
224 struct inode *inode, struct inode *dir)
33268eaf
JB
225{
226 struct posix_acl *acl = NULL;
227 int ret = 0;
228
229 /* this happens with subvols */
230 if (!dir)
231 return 0;
232
233 if (!S_ISLNK(inode->i_mode)) {
234 if (IS_POSIXACL(dir)) {
235 acl = btrfs_get_acl(dir, ACL_TYPE_DEFAULT);
236 if (IS_ERR(acl))
237 return PTR_ERR(acl);
238 }
239
240 if (!acl)
ce3b0f8d 241 inode->i_mode &= ~current_umask();
33268eaf
JB
242 }
243
244 if (IS_POSIXACL(dir) && acl) {
245 struct posix_acl *clone;
246 mode_t mode;
247
248 if (S_ISDIR(inode->i_mode)) {
f34f57a3
YZ
249 ret = btrfs_set_acl(trans, inode, acl,
250 ACL_TYPE_DEFAULT);
33268eaf
JB
251 if (ret)
252 goto failed;
253 }
254 clone = posix_acl_clone(acl, GFP_NOFS);
255 ret = -ENOMEM;
256 if (!clone)
257 goto failed;
258
259 mode = inode->i_mode;
260 ret = posix_acl_create_masq(clone, &mode);
261 if (ret >= 0) {
262 inode->i_mode = mode;
263 if (ret > 0) {
264 /* we need an acl */
f34f57a3 265 ret = btrfs_set_acl(trans, inode, clone,
33268eaf
JB
266 ACL_TYPE_ACCESS);
267 }
268 }
f858153c 269 posix_acl_release(clone);
33268eaf
JB
270 }
271failed:
272 posix_acl_release(acl);
273
274 return ret;
275}
276
277int btrfs_acl_chmod(struct inode *inode)
278{
279 struct posix_acl *acl, *clone;
280 int ret = 0;
281
282 if (S_ISLNK(inode->i_mode))
283 return -EOPNOTSUPP;
284
285 if (!IS_POSIXACL(inode))
286 return 0;
287
288 acl = btrfs_get_acl(inode, ACL_TYPE_ACCESS);
289 if (IS_ERR(acl) || !acl)
290 return PTR_ERR(acl);
291
292 clone = posix_acl_clone(acl, GFP_KERNEL);
293 posix_acl_release(acl);
294 if (!clone)
295 return -ENOMEM;
296
297 ret = posix_acl_chmod_masq(clone, inode->i_mode);
298 if (!ret)
f34f57a3 299 ret = btrfs_set_acl(NULL, inode, clone, ACL_TYPE_ACCESS);
33268eaf
JB
300
301 posix_acl_release(clone);
302
303 return ret;
5103e947 304}
33268eaf 305
f01cbd3f 306const struct xattr_handler btrfs_xattr_acl_default_handler = {
5103e947 307 .prefix = POSIX_ACL_XATTR_DEFAULT,
431547b3
CH
308 .flags = ACL_TYPE_DEFAULT,
309 .get = btrfs_xattr_acl_get,
310 .set = btrfs_xattr_acl_set,
5103e947
JB
311};
312
f01cbd3f 313const struct xattr_handler btrfs_xattr_acl_access_handler = {
5103e947 314 .prefix = POSIX_ACL_XATTR_ACCESS,
431547b3
CH
315 .flags = ACL_TYPE_ACCESS,
316 .get = btrfs_xattr_acl_get,
317 .set = btrfs_xattr_acl_set,
5103e947 318};
eab922ec 319
0eda294d 320#else /* CONFIG_BTRFS_FS_POSIX_ACL */
eab922ec
JB
321
322int btrfs_acl_chmod(struct inode *inode)
323{
324 return 0;
325}
326
f34f57a3
YZ
327int btrfs_init_acl(struct btrfs_trans_handle *trans,
328 struct inode *inode, struct inode *dir)
eab922ec
JB
329{
330 return 0;
331}
332
0eda294d 333#endif /* CONFIG_BTRFS_FS_POSIX_ACL */