1 #include <linux/capability.h>
3 #include <linux/posix_acl.h>
5 #include <linux/errno.h>
6 #include <linux/pagemap.h>
7 #include <linux/xattr.h>
8 #include <linux/slab.h>
9 #include <linux/posix_acl_xattr.h>
12 #include <linux/uaccess.h>
14 static int __reiserfs_set_acl(struct reiserfs_transaction_handle
*th
,
15 struct inode
*inode
, int type
,
16 struct posix_acl
*acl
);
20 reiserfs_set_acl(struct inode
*inode
, struct posix_acl
*acl
, int type
)
23 struct reiserfs_transaction_handle th
;
24 size_t jcreate_blocks
;
25 int size
= acl
? posix_acl_xattr_size(acl
->a_count
) : 0;
29 * Pessimism: We can't assume that anything from the xattr root up
33 jcreate_blocks
= reiserfs_xattr_jcreate_nblocks(inode
) +
34 reiserfs_xattr_nblocks(inode
, size
) * 2;
36 reiserfs_write_lock(inode
->i_sb
);
37 error
= journal_begin(&th
, inode
->i_sb
, jcreate_blocks
);
38 reiserfs_write_unlock(inode
->i_sb
);
40 if (type
== ACL_TYPE_ACCESS
&& acl
) {
41 error
= posix_acl_update_mode(inode
, &inode
->i_mode
,
46 error
= __reiserfs_set_acl(&th
, inode
, type
, acl
);
48 reiserfs_write_lock(inode
->i_sb
);
49 error2
= journal_end(&th
);
50 reiserfs_write_unlock(inode
->i_sb
);
59 * Convert from filesystem to in-memory representation.
61 static struct posix_acl
*reiserfs_posix_acl_from_disk(const void *value
, size_t size
)
63 const char *end
= (char *)value
+ size
;
65 struct posix_acl
*acl
;
69 if (size
< sizeof(reiserfs_acl_header
))
70 return ERR_PTR(-EINVAL
);
71 if (((reiserfs_acl_header
*) value
)->a_version
!=
72 cpu_to_le32(REISERFS_ACL_VERSION
))
73 return ERR_PTR(-EINVAL
);
74 value
= (char *)value
+ sizeof(reiserfs_acl_header
);
75 count
= reiserfs_acl_count(size
);
77 return ERR_PTR(-EINVAL
);
80 acl
= posix_acl_alloc(count
, GFP_NOFS
);
82 return ERR_PTR(-ENOMEM
);
83 for (n
= 0; n
< count
; n
++) {
84 reiserfs_acl_entry
*entry
= (reiserfs_acl_entry
*) value
;
85 if ((char *)value
+ sizeof(reiserfs_acl_entry_short
) > end
)
87 acl
->a_entries
[n
].e_tag
= le16_to_cpu(entry
->e_tag
);
88 acl
->a_entries
[n
].e_perm
= le16_to_cpu(entry
->e_perm
);
89 switch (acl
->a_entries
[n
].e_tag
) {
94 value
= (char *)value
+
95 sizeof(reiserfs_acl_entry_short
);
99 value
= (char *)value
+ sizeof(reiserfs_acl_entry
);
100 if ((char *)value
> end
)
102 acl
->a_entries
[n
].e_uid
=
103 make_kuid(&init_user_ns
,
104 le32_to_cpu(entry
->e_id
));
107 value
= (char *)value
+ sizeof(reiserfs_acl_entry
);
108 if ((char *)value
> end
)
110 acl
->a_entries
[n
].e_gid
=
111 make_kgid(&init_user_ns
,
112 le32_to_cpu(entry
->e_id
));
124 posix_acl_release(acl
);
125 return ERR_PTR(-EINVAL
);
129 * Convert from in-memory to filesystem representation.
131 static void *reiserfs_posix_acl_to_disk(const struct posix_acl
*acl
, size_t * size
)
133 reiserfs_acl_header
*ext_acl
;
137 *size
= reiserfs_acl_size(acl
->a_count
);
138 ext_acl
= kmalloc(sizeof(reiserfs_acl_header
) +
140 sizeof(reiserfs_acl_entry
),
143 return ERR_PTR(-ENOMEM
);
144 ext_acl
->a_version
= cpu_to_le32(REISERFS_ACL_VERSION
);
145 e
= (char *)ext_acl
+ sizeof(reiserfs_acl_header
);
146 for (n
= 0; n
< acl
->a_count
; n
++) {
147 const struct posix_acl_entry
*acl_e
= &acl
->a_entries
[n
];
148 reiserfs_acl_entry
*entry
= (reiserfs_acl_entry
*) e
;
149 entry
->e_tag
= cpu_to_le16(acl
->a_entries
[n
].e_tag
);
150 entry
->e_perm
= cpu_to_le16(acl
->a_entries
[n
].e_perm
);
151 switch (acl
->a_entries
[n
].e_tag
) {
153 entry
->e_id
= cpu_to_le32(
154 from_kuid(&init_user_ns
, acl_e
->e_uid
));
155 e
+= sizeof(reiserfs_acl_entry
);
158 entry
->e_id
= cpu_to_le32(
159 from_kgid(&init_user_ns
, acl_e
->e_gid
));
160 e
+= sizeof(reiserfs_acl_entry
);
167 e
+= sizeof(reiserfs_acl_entry_short
);
174 return (char *)ext_acl
;
178 return ERR_PTR(-EINVAL
);
182 * Inode operation get_posix_acl().
184 * inode->i_mutex: down
185 * BKL held [before 2.5.x]
187 struct posix_acl
*reiserfs_get_acl(struct inode
*inode
, int type
)
190 struct posix_acl
*acl
;
195 case ACL_TYPE_ACCESS
:
196 name
= XATTR_NAME_POSIX_ACL_ACCESS
;
198 case ACL_TYPE_DEFAULT
:
199 name
= XATTR_NAME_POSIX_ACL_DEFAULT
;
205 size
= reiserfs_xattr_get(inode
, name
, NULL
, 0);
207 if (size
== -ENODATA
|| size
== -ENOSYS
)
209 return ERR_PTR(size
);
212 value
= kmalloc(size
, GFP_NOFS
);
214 return ERR_PTR(-ENOMEM
);
216 retval
= reiserfs_xattr_get(inode
, name
, value
, size
);
217 if (retval
== -ENODATA
|| retval
== -ENOSYS
) {
219 * This shouldn't actually happen as it should have
220 * been caught above.. but just in case
223 } else if (retval
< 0) {
224 acl
= ERR_PTR(retval
);
226 acl
= reiserfs_posix_acl_from_disk(value
, retval
);
234 * Inode operation set_posix_acl().
236 * inode->i_mutex: down
237 * BKL held [before 2.5.x]
240 __reiserfs_set_acl(struct reiserfs_transaction_handle
*th
, struct inode
*inode
,
241 int type
, struct posix_acl
*acl
)
249 case ACL_TYPE_ACCESS
:
250 name
= XATTR_NAME_POSIX_ACL_ACCESS
;
252 case ACL_TYPE_DEFAULT
:
253 name
= XATTR_NAME_POSIX_ACL_DEFAULT
;
254 if (!S_ISDIR(inode
->i_mode
))
255 return acl
? -EACCES
: 0;
262 value
= reiserfs_posix_acl_to_disk(acl
, &size
);
264 return (int)PTR_ERR(value
);
267 error
= reiserfs_xattr_set_handle(th
, inode
, name
, value
, size
, 0);
270 * Ensure that the inode gets dirtied if we're only using
271 * the mode bits and an old ACL didn't exist. We don't need
272 * to check if the inode is hashed here since we won't get
273 * called by reiserfs_inherit_default_acl().
275 if (error
== -ENODATA
) {
277 if (type
== ACL_TYPE_ACCESS
) {
278 inode
->i_ctime
= current_time(inode
);
279 mark_inode_dirty(inode
);
286 set_cached_acl(inode
, type
, acl
);
292 * dir->i_mutex: locked,
293 * inode is new and not released into the wild yet
296 reiserfs_inherit_default_acl(struct reiserfs_transaction_handle
*th
,
297 struct inode
*dir
, struct dentry
*dentry
,
300 struct posix_acl
*default_acl
, *acl
;
303 /* ACLs only get applied to files and directories */
304 if (S_ISLNK(inode
->i_mode
))
308 * ACLs can only be used on "new" objects, so if it's an old object
309 * there is nothing to inherit from
311 if (get_inode_sd_version(dir
) == STAT_DATA_V1
)
315 * Don't apply ACLs to objects in the .reiserfs_priv tree.. This
316 * would be useless since permissions are ignored, and a pain because
317 * it introduces locking cycles
319 if (IS_PRIVATE(dir
)) {
320 inode
->i_flags
|= S_PRIVATE
;
324 err
= posix_acl_create(dir
, &inode
->i_mode
, &default_acl
, &acl
);
329 err
= __reiserfs_set_acl(th
, inode
, ACL_TYPE_DEFAULT
,
331 posix_acl_release(default_acl
);
335 err
= __reiserfs_set_acl(th
, inode
, ACL_TYPE_ACCESS
,
337 posix_acl_release(acl
);
343 /* no ACL, apply umask */
344 inode
->i_mode
&= ~current_umask();
348 /* This is used to cache the default acl before a new object is created.
349 * The biggest reason for this is to get an idea of how many blocks will
350 * actually be required for the create operation if we must inherit an ACL.
351 * An ACL write can add up to 3 object creations and an additional file write
352 * so we'd prefer not to reserve that many blocks in the journal if we can.
353 * It also has the advantage of not loading the ACL with a transaction open,
354 * this may seem silly, but if the owner of the directory is doing the
355 * creation, the ACL may not be loaded since the permissions wouldn't require
357 * We return the number of blocks required for the transaction.
359 int reiserfs_cache_default_acl(struct inode
*inode
)
361 struct posix_acl
*acl
;
364 if (IS_PRIVATE(inode
))
367 acl
= get_acl(inode
, ACL_TYPE_DEFAULT
);
369 if (acl
&& !IS_ERR(acl
)) {
370 int size
= reiserfs_acl_size(acl
->a_count
);
372 /* Other xattrs can be created during inode creation. We don't
373 * want to claim too many blocks, so we check to see if we
374 * we need to create the tree to the xattrs, and then we
375 * just want two files. */
376 nblocks
= reiserfs_xattr_jcreate_nblocks(inode
);
377 nblocks
+= JOURNAL_BLOCKS_PER_OBJECT(inode
->i_sb
);
379 REISERFS_I(inode
)->i_flags
|= i_has_xattr_dir
;
381 /* We need to account for writes + bitmaps for two files */
382 nblocks
+= reiserfs_xattr_nblocks(inode
, size
) * 4;
383 posix_acl_release(acl
);
390 * Called under i_mutex
392 int reiserfs_acl_chmod(struct inode
*inode
)
394 if (IS_PRIVATE(inode
))
396 if (get_inode_sd_version(inode
) == STAT_DATA_V1
||
397 !reiserfs_posixacl(inode
->i_sb
))
400 return posix_acl_chmod(inode
, inode
->i_mode
);