import PULS_20180308
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / fs / btrfs / acl.c
CommitLineData
5103e947
JB
1/*
2 * Copyright (C) 2007 Red Hat. All rights reserved.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public
6 * License v2 as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
11 * General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public
14 * License along with this program; if not, write to the
15 * Free Software Foundation, Inc., 59 Temple Place - Suite 330,
16 * Boston, MA 021110-1307, USA.
17 */
18
19#include <linux/fs.h>
20#include <linux/string.h>
21#include <linux/xattr.h>
22#include <linux/posix_acl_xattr.h>
33268eaf 23#include <linux/posix_acl.h>
c1e32da6 24#include <linux/sched.h>
5a0e3ad6 25#include <linux/slab.h>
33268eaf 26
5103e947 27#include "ctree.h"
33268eaf 28#include "btrfs_inode.h"
5103e947 29#include "xattr.h"
33268eaf 30
4e34e719 31struct posix_acl *btrfs_get_acl(struct inode *inode, int type)
33268eaf 32{
95819c05
CH
33 int size;
34 const char *name;
33268eaf 35 char *value = NULL;
073aaa1b
AV
36 struct posix_acl *acl;
37
d0f69686
MX
38 if (!IS_POSIXACL(inode))
39 return NULL;
40
073aaa1b
AV
41 acl = get_cached_acl(inode, type);
42 if (acl != ACL_NOT_CACHED)
43 return acl;
33268eaf
JB
44
45 switch (type) {
46 case ACL_TYPE_ACCESS:
95819c05 47 name = POSIX_ACL_XATTR_ACCESS;
33268eaf
JB
48 break;
49 case ACL_TYPE_DEFAULT:
95819c05 50 name = POSIX_ACL_XATTR_DEFAULT;
33268eaf
JB
51 break;
52 default:
073aaa1b 53 BUG();
33268eaf
JB
54 }
55
95819c05 56 size = __btrfs_getxattr(inode, name, "", 0);
33268eaf
JB
57 if (size > 0) {
58 value = kzalloc(size, GFP_NOFS);
59 if (!value)
60 return ERR_PTR(-ENOMEM);
95819c05 61 size = __btrfs_getxattr(inode, name, value, size);
cfbffc39
TI
62 }
63 if (size > 0) {
5f3a4a28 64 acl = posix_acl_from_xattr(&init_user_ns, value, size);
7b1a14bb
CM
65 } else if (size == -ENOENT || size == -ENODATA || size == 0) {
66 /* FIXME, who returns -ENOENT? I think nobody */
33268eaf 67 acl = NULL;
7b1a14bb
CM
68 } else {
69 acl = ERR_PTR(-EIO);
33268eaf 70 }
cfbffc39
TI
71 kfree(value);
72
73 if (!IS_ERR(acl))
74 set_cached_acl(inode, type, acl);
33268eaf
JB
75
76 return acl;
77}
78
431547b3
CH
79static int btrfs_xattr_acl_get(struct dentry *dentry, const char *name,
80 void *value, size_t size, int type)
33268eaf
JB
81{
82 struct posix_acl *acl;
83 int ret = 0;
84
d0f69686
MX
85 if (!IS_POSIXACL(dentry->d_inode))
86 return -EOPNOTSUPP;
87
431547b3 88 acl = btrfs_get_acl(dentry->d_inode, type);
33268eaf
JB
89
90 if (IS_ERR(acl))
91 return PTR_ERR(acl);
92 if (acl == NULL)
93 return -ENODATA;
5f3a4a28 94 ret = posix_acl_to_xattr(&init_user_ns, acl, value, size);
33268eaf
JB
95 posix_acl_release(acl);
96
97 return ret;
98}
99
100/*
101 * Needs to be called with fs_mutex held
102 */
f34f57a3
YZ
103static int btrfs_set_acl(struct btrfs_trans_handle *trans,
104 struct inode *inode, struct posix_acl *acl, int type)
33268eaf 105{
95819c05
CH
106 int ret, size = 0;
107 const char *name;
33268eaf 108 char *value = NULL;
33268eaf
JB
109
110 if (acl) {
111 ret = posix_acl_valid(acl);
112 if (ret < 0)
113 return ret;
114 ret = 0;
115 }
116
117 switch (type) {
118 case ACL_TYPE_ACCESS:
95819c05 119 name = POSIX_ACL_XATTR_ACCESS;
a9cc71a6 120 if (acl) {
4b9e9796
S
121 ret = posix_acl_update_mode(inode, &inode->i_mode, &acl);
122 if (ret)
a9cc71a6 123 return ret;
a9cc71a6
CM
124 }
125 ret = 0;
33268eaf
JB
126 break;
127 case ACL_TYPE_DEFAULT:
128 if (!S_ISDIR(inode->i_mode))
129 return acl ? -EINVAL : 0;
95819c05 130 name = POSIX_ACL_XATTR_DEFAULT;
33268eaf
JB
131 break;
132 default:
133 return -EINVAL;
134 }
135
136 if (acl) {
137 size = posix_acl_xattr_size(acl->a_count);
138 value = kmalloc(size, GFP_NOFS);
139 if (!value) {
140 ret = -ENOMEM;
141 goto out;
142 }
143
5f3a4a28 144 ret = posix_acl_to_xattr(&init_user_ns, acl, value, size);
33268eaf
JB
145 if (ret < 0)
146 goto out;
147 }
148
f34f57a3 149 ret = __btrfs_setxattr(trans, inode, name, value, size, 0);
33268eaf 150out:
d397712b 151 kfree(value);
33268eaf
JB
152
153 if (!ret)
073aaa1b 154 set_cached_acl(inode, type, acl);
33268eaf
JB
155
156 return ret;
157}
fb4bc1e0 158
431547b3
CH
159static int btrfs_xattr_acl_set(struct dentry *dentry, const char *name,
160 const void *value, size_t size, int flags, int type)
744f52f9 161{
f34f57a3 162 int ret;
33268eaf 163 struct posix_acl *acl = NULL;
5103e947 164
2e149670 165 if (!inode_owner_or_capable(dentry->d_inode))
2f26afba
SW
166 return -EPERM;
167
731e3d1b
SW
168 if (!IS_POSIXACL(dentry->d_inode))
169 return -EOPNOTSUPP;
170
744f52f9 171 if (value) {
5f3a4a28 172 acl = posix_acl_from_xattr(&init_user_ns, value, size);
f5de9391
DB
173 if (IS_ERR(acl))
174 return PTR_ERR(acl);
175
329c5056
MX
176 if (acl) {
177 ret = posix_acl_valid(acl);
178 if (ret)
179 goto out;
744f52f9 180 }
744f52f9 181 }
1caf9342 182
ebfee3d7 183 ret = btrfs_set_acl(NULL, dentry->d_inode, acl, type);
329c5056 184out:
33268eaf
JB
185 posix_acl_release(acl);
186
187 return ret;
744f52f9 188}
33268eaf 189
33268eaf
JB
190/*
191 * btrfs_init_acl is already generally called under fs_mutex, so the locking
192 * stuff has been fixed to work with that. If the locking stuff changes, we
193 * need to re-evaluate the acl locking stuff.
194 */
f34f57a3
YZ
195int btrfs_init_acl(struct btrfs_trans_handle *trans,
196 struct inode *inode, struct inode *dir)
33268eaf
JB
197{
198 struct posix_acl *acl = NULL;
199 int ret = 0;
200
201 /* this happens with subvols */
202 if (!dir)
203 return 0;
204
205 if (!S_ISLNK(inode->i_mode)) {
206 if (IS_POSIXACL(dir)) {
207 acl = btrfs_get_acl(dir, ACL_TYPE_DEFAULT);
208 if (IS_ERR(acl))
209 return PTR_ERR(acl);
210 }
211
212 if (!acl)
ce3b0f8d 213 inode->i_mode &= ~current_umask();
33268eaf
JB
214 }
215
216 if (IS_POSIXACL(dir) && acl) {
33268eaf 217 if (S_ISDIR(inode->i_mode)) {
f34f57a3
YZ
218 ret = btrfs_set_acl(trans, inode, acl,
219 ACL_TYPE_DEFAULT);
33268eaf
JB
220 if (ret)
221 goto failed;
222 }
d3fb6120 223 ret = posix_acl_create(&acl, GFP_NOFS, &inode->i_mode);
826cae2f
AV
224 if (ret < 0)
225 return ret;
33268eaf 226
826cae2f
AV
227 if (ret > 0) {
228 /* we need an acl */
229 ret = btrfs_set_acl(trans, inode, acl, ACL_TYPE_ACCESS);
9436cf97 230 } else if (ret < 0) {
30f8fe3e 231 cache_no_acl(inode);
33268eaf 232 }
30f8fe3e
JB
233 } else {
234 cache_no_acl(inode);
33268eaf
JB
235 }
236failed:
237 posix_acl_release(acl);
238
239 return ret;
240}
241
242int btrfs_acl_chmod(struct inode *inode)
243{
bc26ab5f 244 struct posix_acl *acl;
33268eaf
JB
245 int ret = 0;
246
247 if (S_ISLNK(inode->i_mode))
248 return -EOPNOTSUPP;
249
250 if (!IS_POSIXACL(inode))
251 return 0;
252
253 acl = btrfs_get_acl(inode, ACL_TYPE_ACCESS);
c704005d 254 if (IS_ERR_OR_NULL(acl))
33268eaf
JB
255 return PTR_ERR(acl);
256
bc26ab5f
AV
257 ret = posix_acl_chmod(&acl, GFP_KERNEL, inode->i_mode);
258 if (ret)
259 return ret;
260 ret = btrfs_set_acl(NULL, inode, acl, ACL_TYPE_ACCESS);
33268eaf 261 posix_acl_release(acl);
33268eaf 262 return ret;
5103e947 263}
33268eaf 264
f01cbd3f 265const struct xattr_handler btrfs_xattr_acl_default_handler = {
5103e947 266 .prefix = POSIX_ACL_XATTR_DEFAULT,
431547b3
CH
267 .flags = ACL_TYPE_DEFAULT,
268 .get = btrfs_xattr_acl_get,
269 .set = btrfs_xattr_acl_set,
5103e947
JB
270};
271
f01cbd3f 272const struct xattr_handler btrfs_xattr_acl_access_handler = {
5103e947 273 .prefix = POSIX_ACL_XATTR_ACCESS,
431547b3
CH
274 .flags = ACL_TYPE_ACCESS,
275 .get = btrfs_xattr_acl_get,
276 .set = btrfs_xattr_acl_set,
5103e947 277};