4 * Copyright (C) 2001-2003 Andreas Gruenbacher, <agruen@suse.de>
7 #include <linux/capability.h>
8 #include <linux/init.h>
9 #include <linux/sched.h>
10 #include <linux/slab.h>
17 * Convert from filesystem to in-memory representation.
19 static struct posix_acl
*
20 ext2_acl_from_disk(const void *value
, size_t size
)
22 const char *end
= (char *)value
+ size
;
24 struct posix_acl
*acl
;
28 if (size
< sizeof(ext2_acl_header
))
29 return ERR_PTR(-EINVAL
);
30 if (((ext2_acl_header
*)value
)->a_version
!=
31 cpu_to_le32(EXT2_ACL_VERSION
))
32 return ERR_PTR(-EINVAL
);
33 value
= (char *)value
+ sizeof(ext2_acl_header
);
34 count
= ext2_acl_count(size
);
36 return ERR_PTR(-EINVAL
);
39 acl
= posix_acl_alloc(count
, GFP_KERNEL
);
41 return ERR_PTR(-ENOMEM
);
42 for (n
=0; n
< count
; n
++) {
43 ext2_acl_entry
*entry
=
44 (ext2_acl_entry
*)value
;
45 if ((char *)value
+ sizeof(ext2_acl_entry_short
) > end
)
47 acl
->a_entries
[n
].e_tag
= le16_to_cpu(entry
->e_tag
);
48 acl
->a_entries
[n
].e_perm
= le16_to_cpu(entry
->e_perm
);
49 switch(acl
->a_entries
[n
].e_tag
) {
54 value
= (char *)value
+
55 sizeof(ext2_acl_entry_short
);
56 acl
->a_entries
[n
].e_id
= ACL_UNDEFINED_ID
;
61 value
= (char *)value
+ sizeof(ext2_acl_entry
);
62 if ((char *)value
> end
)
64 acl
->a_entries
[n
].e_id
=
65 le32_to_cpu(entry
->e_id
);
77 posix_acl_release(acl
);
78 return ERR_PTR(-EINVAL
);
82 * Convert from in-memory to filesystem representation.
85 ext2_acl_to_disk(const struct posix_acl
*acl
, size_t *size
)
87 ext2_acl_header
*ext_acl
;
91 *size
= ext2_acl_size(acl
->a_count
);
92 ext_acl
= kmalloc(sizeof(ext2_acl_header
) + acl
->a_count
*
93 sizeof(ext2_acl_entry
), GFP_KERNEL
);
95 return ERR_PTR(-ENOMEM
);
96 ext_acl
->a_version
= cpu_to_le32(EXT2_ACL_VERSION
);
97 e
= (char *)ext_acl
+ sizeof(ext2_acl_header
);
98 for (n
=0; n
< acl
->a_count
; n
++) {
99 ext2_acl_entry
*entry
= (ext2_acl_entry
*)e
;
100 entry
->e_tag
= cpu_to_le16(acl
->a_entries
[n
].e_tag
);
101 entry
->e_perm
= cpu_to_le16(acl
->a_entries
[n
].e_perm
);
102 switch(acl
->a_entries
[n
].e_tag
) {
106 cpu_to_le32(acl
->a_entries
[n
].e_id
);
107 e
+= sizeof(ext2_acl_entry
);
114 e
+= sizeof(ext2_acl_entry_short
);
121 return (char *)ext_acl
;
125 return ERR_PTR(-EINVAL
);
129 * inode->i_mutex: don't care
131 static struct posix_acl
*
132 ext2_get_acl(struct inode
*inode
, int type
)
136 struct posix_acl
*acl
;
139 if (!test_opt(inode
->i_sb
, POSIX_ACL
))
142 acl
= get_cached_acl(inode
, type
);
143 if (acl
!= ACL_NOT_CACHED
)
147 case ACL_TYPE_ACCESS
:
148 name_index
= EXT2_XATTR_INDEX_POSIX_ACL_ACCESS
;
150 case ACL_TYPE_DEFAULT
:
151 name_index
= EXT2_XATTR_INDEX_POSIX_ACL_DEFAULT
;
156 retval
= ext2_xattr_get(inode
, name_index
, "", NULL
, 0);
158 value
= kmalloc(retval
, GFP_KERNEL
);
160 return ERR_PTR(-ENOMEM
);
161 retval
= ext2_xattr_get(inode
, name_index
, "", value
, retval
);
164 acl
= ext2_acl_from_disk(value
, retval
);
165 else if (retval
== -ENODATA
|| retval
== -ENOSYS
)
168 acl
= ERR_PTR(retval
);
172 set_cached_acl(inode
, type
, acl
);
178 * inode->i_mutex: down
181 ext2_set_acl(struct inode
*inode
, int type
, struct posix_acl
*acl
)
188 if (S_ISLNK(inode
->i_mode
))
190 if (!test_opt(inode
->i_sb
, POSIX_ACL
))
194 case ACL_TYPE_ACCESS
:
195 name_index
= EXT2_XATTR_INDEX_POSIX_ACL_ACCESS
;
197 mode_t mode
= inode
->i_mode
;
198 error
= posix_acl_equiv_mode(acl
, &mode
);
202 inode
->i_mode
= mode
;
203 inode
->i_ctime
= CURRENT_TIME_SEC
;
204 mark_inode_dirty(inode
);
211 case ACL_TYPE_DEFAULT
:
212 name_index
= EXT2_XATTR_INDEX_POSIX_ACL_DEFAULT
;
213 if (!S_ISDIR(inode
->i_mode
))
214 return acl
? -EACCES
: 0;
221 value
= ext2_acl_to_disk(acl
, &size
);
223 return (int)PTR_ERR(value
);
226 error
= ext2_xattr_set(inode
, name_index
, "", value
, size
, 0);
230 set_cached_acl(inode
, type
, acl
);
235 ext2_check_acl(struct inode
*inode
, int mask
)
237 struct posix_acl
*acl
= ext2_get_acl(inode
, ACL_TYPE_ACCESS
);
242 int error
= posix_acl_permission(inode
, acl
, mask
);
243 posix_acl_release(acl
);
251 * Initialize the ACLs of a new inode. Called from ext2_new_inode.
254 * inode->i_mutex: up (access to inode is still exclusive)
257 ext2_init_acl(struct inode
*inode
, struct inode
*dir
)
259 struct posix_acl
*acl
= NULL
;
262 if (!S_ISLNK(inode
->i_mode
)) {
263 if (test_opt(dir
->i_sb
, POSIX_ACL
)) {
264 acl
= ext2_get_acl(dir
, ACL_TYPE_DEFAULT
);
269 inode
->i_mode
&= ~current_umask();
271 if (test_opt(inode
->i_sb
, POSIX_ACL
) && acl
) {
272 struct posix_acl
*clone
;
275 if (S_ISDIR(inode
->i_mode
)) {
276 error
= ext2_set_acl(inode
, ACL_TYPE_DEFAULT
, acl
);
280 clone
= posix_acl_clone(acl
, GFP_KERNEL
);
284 mode
= inode
->i_mode
;
285 error
= posix_acl_create_masq(clone
, &mode
);
287 inode
->i_mode
= mode
;
289 /* This is an extended ACL */
290 error
= ext2_set_acl(inode
,
291 ACL_TYPE_ACCESS
, clone
);
294 posix_acl_release(clone
);
297 posix_acl_release(acl
);
302 * Does chmod for an inode that may have an Access Control List. The
303 * inode->i_mode field must be updated to the desired value by the caller
304 * before calling this function.
305 * Returns 0 on success, or a negative error number.
307 * We change the ACL rather than storing some ACL entries in the file
308 * mode permission bits (which would be more efficient), because that
309 * would break once additional permissions (like ACL_APPEND, ACL_DELETE
310 * for directories) are added. There are no more bits available in the
313 * inode->i_mutex: down
316 ext2_acl_chmod(struct inode
*inode
)
318 struct posix_acl
*acl
, *clone
;
321 if (!test_opt(inode
->i_sb
, POSIX_ACL
))
323 if (S_ISLNK(inode
->i_mode
))
325 acl
= ext2_get_acl(inode
, ACL_TYPE_ACCESS
);
326 if (IS_ERR(acl
) || !acl
)
328 clone
= posix_acl_clone(acl
, GFP_KERNEL
);
329 posix_acl_release(acl
);
332 error
= posix_acl_chmod_masq(clone
, inode
->i_mode
);
334 error
= ext2_set_acl(inode
, ACL_TYPE_ACCESS
, clone
);
335 posix_acl_release(clone
);
340 * Extended attribut handlers
343 ext2_xattr_list_acl_access(struct dentry
*dentry
, char *list
, size_t list_size
,
344 const char *name
, size_t name_len
, int type
)
346 const size_t size
= sizeof(POSIX_ACL_XATTR_ACCESS
);
348 if (!test_opt(dentry
->d_sb
, POSIX_ACL
))
350 if (list
&& size
<= list_size
)
351 memcpy(list
, POSIX_ACL_XATTR_ACCESS
, size
);
356 ext2_xattr_list_acl_default(struct dentry
*dentry
, char *list
, size_t list_size
,
357 const char *name
, size_t name_len
, int type
)
359 const size_t size
= sizeof(POSIX_ACL_XATTR_DEFAULT
);
361 if (!test_opt(dentry
->d_sb
, POSIX_ACL
))
363 if (list
&& size
<= list_size
)
364 memcpy(list
, POSIX_ACL_XATTR_DEFAULT
, size
);
369 ext2_xattr_get_acl(struct dentry
*dentry
, const char *name
, void *buffer
,
370 size_t size
, int type
)
372 struct posix_acl
*acl
;
375 if (strcmp(name
, "") != 0)
377 if (!test_opt(dentry
->d_sb
, POSIX_ACL
))
380 acl
= ext2_get_acl(dentry
->d_inode
, type
);
385 error
= posix_acl_to_xattr(acl
, buffer
, size
);
386 posix_acl_release(acl
);
392 ext2_xattr_set_acl(struct dentry
*dentry
, const char *name
, const void *value
,
393 size_t size
, int flags
, int type
)
395 struct posix_acl
*acl
;
398 if (strcmp(name
, "") != 0)
400 if (!test_opt(dentry
->d_sb
, POSIX_ACL
))
402 if (!is_owner_or_cap(dentry
->d_inode
))
406 acl
= posix_acl_from_xattr(value
, size
);
410 error
= posix_acl_valid(acl
);
412 goto release_and_out
;
417 error
= ext2_set_acl(dentry
->d_inode
, type
, acl
);
420 posix_acl_release(acl
);
424 const struct xattr_handler ext2_xattr_acl_access_handler
= {
425 .prefix
= POSIX_ACL_XATTR_ACCESS
,
426 .flags
= ACL_TYPE_ACCESS
,
427 .list
= ext2_xattr_list_acl_access
,
428 .get
= ext2_xattr_get_acl
,
429 .set
= ext2_xattr_set_acl
,
432 const struct xattr_handler ext2_xattr_acl_default_handler
= {
433 .prefix
= POSIX_ACL_XATTR_DEFAULT
,
434 .flags
= ACL_TYPE_DEFAULT
,
435 .list
= ext2_xattr_list_acl_default
,
436 .get
= ext2_xattr_get_acl
,
437 .set
= ext2_xattr_set_acl
,