Blame view
fs/ext4/acl.c
6.46 KB
b24413180 License cleanup: ... |
1 |
// SPDX-License-Identifier: GPL-2.0 |
ac27a0ec1 [PATCH] ext4: ini... |
2 |
/* |
617ba13b3 [PATCH] ext4: ren... |
3 |
* linux/fs/ext4/acl.c |
ac27a0ec1 [PATCH] ext4: ini... |
4 5 6 |
* * Copyright (C) 2001-2003 Andreas Gruenbacher, <agruen@suse.de> */ |
b8cb5a545 ext4: fix quota c... |
7 |
#include <linux/quotaops.h> |
3dcf54515 ext4: move header... |
8 9 |
#include "ext4_jbd2.h" #include "ext4.h" |
ac27a0ec1 [PATCH] ext4: ini... |
10 11 12 13 14 15 16 |
#include "xattr.h" #include "acl.h" /* * Convert from filesystem to in-memory representation. */ static struct posix_acl * |
617ba13b3 [PATCH] ext4: ren... |
17 |
ext4_acl_from_disk(const void *value, size_t size) |
ac27a0ec1 [PATCH] ext4: ini... |
18 19 20 21 22 23 24 |
{ const char *end = (char *)value + size; int n, count; struct posix_acl *acl; if (!value) return NULL; |
617ba13b3 [PATCH] ext4: ren... |
25 |
if (size < sizeof(ext4_acl_header)) |
ac27a0ec1 [PATCH] ext4: ini... |
26 |
return ERR_PTR(-EINVAL); |
617ba13b3 [PATCH] ext4: ren... |
27 28 |
if (((ext4_acl_header *)value)->a_version != cpu_to_le32(EXT4_ACL_VERSION)) |
ac27a0ec1 [PATCH] ext4: ini... |
29 |
return ERR_PTR(-EINVAL); |
617ba13b3 [PATCH] ext4: ren... |
30 31 |
value = (char *)value + sizeof(ext4_acl_header); count = ext4_acl_count(size); |
ac27a0ec1 [PATCH] ext4: ini... |
32 33 34 35 |
if (count < 0) return ERR_PTR(-EINVAL); if (count == 0) return NULL; |
216553c4b ext4: fix wrong g... |
36 |
acl = posix_acl_alloc(count, GFP_NOFS); |
ac27a0ec1 [PATCH] ext4: ini... |
37 38 |
if (!acl) return ERR_PTR(-ENOMEM); |
2b2d6d019 ext4: Cleanup whi... |
39 |
for (n = 0; n < count; n++) { |
617ba13b3 [PATCH] ext4: ren... |
40 41 42 |
ext4_acl_entry *entry = (ext4_acl_entry *)value; if ((char *)value + sizeof(ext4_acl_entry_short) > end) |
ac27a0ec1 [PATCH] ext4: ini... |
43 44 45 |
goto fail; acl->a_entries[n].e_tag = le16_to_cpu(entry->e_tag); acl->a_entries[n].e_perm = le16_to_cpu(entry->e_perm); |
2b2d6d019 ext4: Cleanup whi... |
46 47 48 49 50 51 52 53 |
switch (acl->a_entries[n].e_tag) { case ACL_USER_OBJ: case ACL_GROUP_OBJ: case ACL_MASK: case ACL_OTHER: value = (char *)value + sizeof(ext4_acl_entry_short); |
2b2d6d019 ext4: Cleanup whi... |
54 55 56 |
break; case ACL_USER: |
af84df93f userns: Convert e... |
57 58 59 60 61 62 63 |
value = (char *)value + sizeof(ext4_acl_entry); if ((char *)value > end) goto fail; acl->a_entries[n].e_uid = make_kuid(&init_user_ns, le32_to_cpu(entry->e_id)); break; |
2b2d6d019 ext4: Cleanup whi... |
64 65 66 |
case ACL_GROUP: value = (char *)value + sizeof(ext4_acl_entry); if ((char *)value > end) |
ac27a0ec1 [PATCH] ext4: ini... |
67 |
goto fail; |
af84df93f userns: Convert e... |
68 69 70 |
acl->a_entries[n].e_gid = make_kgid(&init_user_ns, le32_to_cpu(entry->e_id)); |
2b2d6d019 ext4: Cleanup whi... |
71 72 73 74 |
break; default: goto fail; |
ac27a0ec1 [PATCH] ext4: ini... |
75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 |
} } if (value != end) goto fail; return acl; fail: posix_acl_release(acl); return ERR_PTR(-EINVAL); } /* * Convert from in-memory to filesystem representation. */ static void * |
617ba13b3 [PATCH] ext4: ren... |
90 |
ext4_acl_to_disk(const struct posix_acl *acl, size_t *size) |
ac27a0ec1 [PATCH] ext4: ini... |
91 |
{ |
617ba13b3 [PATCH] ext4: ren... |
92 |
ext4_acl_header *ext_acl; |
ac27a0ec1 [PATCH] ext4: ini... |
93 94 |
char *e; size_t n; |
617ba13b3 [PATCH] ext4: ren... |
95 96 |
*size = ext4_acl_size(acl->a_count); ext_acl = kmalloc(sizeof(ext4_acl_header) + acl->a_count * |
216553c4b ext4: fix wrong g... |
97 |
sizeof(ext4_acl_entry), GFP_NOFS); |
ac27a0ec1 [PATCH] ext4: ini... |
98 99 |
if (!ext_acl) return ERR_PTR(-ENOMEM); |
617ba13b3 [PATCH] ext4: ren... |
100 101 |
ext_acl->a_version = cpu_to_le32(EXT4_ACL_VERSION); e = (char *)ext_acl + sizeof(ext4_acl_header); |
2b2d6d019 ext4: Cleanup whi... |
102 |
for (n = 0; n < acl->a_count; n++) { |
af84df93f userns: Convert e... |
103 |
const struct posix_acl_entry *acl_e = &acl->a_entries[n]; |
617ba13b3 [PATCH] ext4: ren... |
104 |
ext4_acl_entry *entry = (ext4_acl_entry *)e; |
af84df93f userns: Convert e... |
105 106 107 |
entry->e_tag = cpu_to_le16(acl_e->e_tag); entry->e_perm = cpu_to_le16(acl_e->e_perm); switch (acl_e->e_tag) { |
2b2d6d019 ext4: Cleanup whi... |
108 |
case ACL_USER: |
af84df93f userns: Convert e... |
109 110 111 112 |
entry->e_id = cpu_to_le32( from_kuid(&init_user_ns, acl_e->e_uid)); e += sizeof(ext4_acl_entry); break; |
2b2d6d019 ext4: Cleanup whi... |
113 |
case ACL_GROUP: |
af84df93f userns: Convert e... |
114 115 |
entry->e_id = cpu_to_le32( from_kgid(&init_user_ns, acl_e->e_gid)); |
2b2d6d019 ext4: Cleanup whi... |
116 117 118 119 120 121 122 123 124 125 126 127 |
e += sizeof(ext4_acl_entry); break; case ACL_USER_OBJ: case ACL_GROUP_OBJ: case ACL_MASK: case ACL_OTHER: e += sizeof(ext4_acl_entry_short); break; default: goto fail; |
ac27a0ec1 [PATCH] ext4: ini... |
128 129 130 131 132 133 134 135 |
} } return (char *)ext_acl; fail: kfree(ext_acl); return ERR_PTR(-EINVAL); } |
ac27a0ec1 [PATCH] ext4: ini... |
136 137 138 139 140 |
/* * Inode operation get_posix_acl(). * * inode->i_mutex: don't care */ |
4e34e719e fs: take the ACL ... |
141 |
struct posix_acl * |
617ba13b3 [PATCH] ext4: ren... |
142 |
ext4_get_acl(struct inode *inode, int type) |
ac27a0ec1 [PATCH] ext4: ini... |
143 |
{ |
ac27a0ec1 [PATCH] ext4: ini... |
144 145 146 147 |
int name_index; char *value = NULL; struct posix_acl *acl; int retval; |
2b2d6d019 ext4: Cleanup whi... |
148 149 |
switch (type) { case ACL_TYPE_ACCESS: |
2b2d6d019 ext4: Cleanup whi... |
150 151 |
name_index = EXT4_XATTR_INDEX_POSIX_ACL_ACCESS; break; |
2b2d6d019 ext4: Cleanup whi... |
152 |
case ACL_TYPE_DEFAULT: |
2b2d6d019 ext4: Cleanup whi... |
153 154 |
name_index = EXT4_XATTR_INDEX_POSIX_ACL_DEFAULT; break; |
2b2d6d019 ext4: Cleanup whi... |
155 |
default: |
073aaa1b1 helpers for acl c... |
156 |
BUG(); |
ac27a0ec1 [PATCH] ext4: ini... |
157 |
} |
617ba13b3 [PATCH] ext4: ren... |
158 |
retval = ext4_xattr_get(inode, name_index, "", NULL, 0); |
ac27a0ec1 [PATCH] ext4: ini... |
159 |
if (retval > 0) { |
216553c4b ext4: fix wrong g... |
160 |
value = kmalloc(retval, GFP_NOFS); |
ac27a0ec1 [PATCH] ext4: ini... |
161 162 |
if (!value) return ERR_PTR(-ENOMEM); |
617ba13b3 [PATCH] ext4: ren... |
163 |
retval = ext4_xattr_get(inode, name_index, "", value, retval); |
ac27a0ec1 [PATCH] ext4: ini... |
164 165 |
} if (retval > 0) |
617ba13b3 [PATCH] ext4: ren... |
166 |
acl = ext4_acl_from_disk(value, retval); |
ac27a0ec1 [PATCH] ext4: ini... |
167 168 169 170 171 |
else if (retval == -ENODATA || retval == -ENOSYS) acl = NULL; else acl = ERR_PTR(retval); kfree(value); |
ac27a0ec1 [PATCH] ext4: ini... |
172 173 174 175 176 177 |
return acl; } /* * Set the access or default ACL of an inode. * |
617ba13b3 [PATCH] ext4: ren... |
178 |
* inode->i_mutex: down unless called from ext4_new_inode |
ac27a0ec1 [PATCH] ext4: ini... |
179 180 |
*/ static int |
64e178a71 ext2/3/4: use gen... |
181 |
__ext4_set_acl(handle_t *handle, struct inode *inode, int type, |
af65207c7 ext4: fix __ext4_... |
182 |
struct posix_acl *acl, int xattr_flags) |
ac27a0ec1 [PATCH] ext4: ini... |
183 |
{ |
ac27a0ec1 [PATCH] ext4: ini... |
184 185 186 187 |
int name_index; void *value = NULL; size_t size = 0; int error; |
2b2d6d019 ext4: Cleanup whi... |
188 189 190 |
switch (type) { case ACL_TYPE_ACCESS: name_index = EXT4_XATTR_INDEX_POSIX_ACL_ACCESS; |
2b2d6d019 ext4: Cleanup whi... |
191 |
break; |
ac27a0ec1 [PATCH] ext4: ini... |
192 |
|
2b2d6d019 ext4: Cleanup whi... |
193 194 195 196 197 |
case ACL_TYPE_DEFAULT: name_index = EXT4_XATTR_INDEX_POSIX_ACL_DEFAULT; if (!S_ISDIR(inode->i_mode)) return acl ? -EACCES : 0; break; |
ac27a0ec1 [PATCH] ext4: ini... |
198 |
|
2b2d6d019 ext4: Cleanup whi... |
199 200 |
default: return -EINVAL; |
ac27a0ec1 [PATCH] ext4: ini... |
201 202 |
} if (acl) { |
617ba13b3 [PATCH] ext4: ren... |
203 |
value = ext4_acl_to_disk(acl, &size); |
ac27a0ec1 [PATCH] ext4: ini... |
204 205 206 |
if (IS_ERR(value)) return (int)PTR_ERR(value); } |
617ba13b3 [PATCH] ext4: ren... |
207 |
error = ext4_xattr_set_handle(handle, inode, name_index, "", |
af65207c7 ext4: fix __ext4_... |
208 |
value, size, xattr_flags); |
ac27a0ec1 [PATCH] ext4: ini... |
209 210 |
kfree(value); |
397e43417 ext4: preserve i_... |
211 |
if (!error) { |
073aaa1b1 helpers for acl c... |
212 |
set_cached_acl(inode, type, acl); |
397e43417 ext4: preserve i_... |
213 |
} |
2b2d6d019 ext4: Cleanup whi... |
214 |
|
ac27a0ec1 [PATCH] ext4: ini... |
215 216 |
return error; } |
ac27a0ec1 [PATCH] ext4: ini... |
217 |
int |
64e178a71 ext2/3/4: use gen... |
218 |
ext4_set_acl(struct inode *inode, struct posix_acl *acl, int type) |
ac27a0ec1 [PATCH] ext4: ini... |
219 |
{ |
bc26ab5f6 kill boilerplate ... |
220 |
handle_t *handle; |
c1a5d5f6a ext4: improve jou... |
221 222 |
int error, credits, retries = 0; size_t acl_size = acl ? ext4_acl_size(acl->a_count) : 0; |
a3bb2d558 ext4: Don't clear... |
223 224 |
umode_t mode = inode->i_mode; int update_mode = 0; |
bc26ab5f6 kill boilerplate ... |
225 |
|
b8cb5a545 ext4: fix quota c... |
226 227 228 |
error = dquot_initialize(inode); if (error) return error; |
bc26ab5f6 kill boilerplate ... |
229 |
retry: |
af65207c7 ext4: fix __ext4_... |
230 231 |
error = ext4_xattr_set_credits(inode, acl_size, false /* is_create */, &credits); |
dec214d00 ext4: xattr inode... |
232 233 |
if (error) return error; |
c1a5d5f6a ext4: improve jou... |
234 |
handle = ext4_journal_start(inode, EXT4_HT_XATTR, credits); |
64e178a71 ext2/3/4: use gen... |
235 236 |
if (IS_ERR(handle)) return PTR_ERR(handle); |
a3bb2d558 ext4: Don't clear... |
237 238 239 240 241 242 |
if ((type == ACL_TYPE_ACCESS) && acl) { error = posix_acl_update_mode(inode, &mode, &acl); if (error) goto out_stop; update_mode = 1; } |
af65207c7 ext4: fix __ext4_... |
243 |
error = __ext4_set_acl(handle, inode, type, acl, 0 /* xattr_flags */); |
a3bb2d558 ext4: Don't clear... |
244 245 246 247 248 249 |
if (!error && update_mode) { inode->i_mode = mode; inode->i_ctime = current_time(inode); ext4_mark_inode_dirty(handle, inode); } out_stop: |
bc26ab5f6 kill boilerplate ... |
250 |
ext4_journal_stop(handle); |
64e178a71 ext2/3/4: use gen... |
251 |
if (error == -ENOSPC && ext4_should_retry_alloc(inode->i_sb, &retries)) |
bc26ab5f6 kill boilerplate ... |
252 |
goto retry; |
ac27a0ec1 [PATCH] ext4: ini... |
253 254 255 256 |
return error; } /* |
64e178a71 ext2/3/4: use gen... |
257 258 259 260 |
* Initialize the ACLs of a new inode. Called from ext4_new_inode. * * dir->i_mutex: down * inode->i_mutex: up (access to inode is still exclusive) |
ac27a0ec1 [PATCH] ext4: ini... |
261 |
*/ |
64e178a71 ext2/3/4: use gen... |
262 263 |
int ext4_init_acl(handle_t *handle, struct inode *inode, struct inode *dir) |
ac27a0ec1 [PATCH] ext4: ini... |
264 |
{ |
64e178a71 ext2/3/4: use gen... |
265 |
struct posix_acl *default_acl, *acl; |
ac27a0ec1 [PATCH] ext4: ini... |
266 |
int error; |
64e178a71 ext2/3/4: use gen... |
267 268 269 |
error = posix_acl_create(dir, &inode->i_mode, &default_acl, &acl); if (error) return error; |
ac27a0ec1 [PATCH] ext4: ini... |
270 |
|
64e178a71 ext2/3/4: use gen... |
271 272 |
if (default_acl) { error = __ext4_set_acl(handle, inode, ACL_TYPE_DEFAULT, |
af65207c7 ext4: fix __ext4_... |
273 |
default_acl, XATTR_CREATE); |
64e178a71 ext2/3/4: use gen... |
274 275 276 277 278 |
posix_acl_release(default_acl); } if (acl) { if (!error) error = __ext4_set_acl(handle, inode, ACL_TYPE_ACCESS, |
af65207c7 ext4: fix __ext4_... |
279 |
acl, XATTR_CREATE); |
64e178a71 ext2/3/4: use gen... |
280 |
posix_acl_release(acl); |
24ec19b0a ext4: fix memory ... |
281 |
} |
ac27a0ec1 [PATCH] ext4: ini... |
282 283 |
return error; } |