1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2008 Christoph Hellwig.
4 * Portions Copyright (C) 2000-2008 Silicon Graphics, Inc.
8 #include "xfs_shared.h"
9 #include "xfs_format.h"
10 #include "xfs_log_format.h"
11 #include "xfs_da_format.h"
12 #include "xfs_inode.h"
15 #include "xfs_da_btree.h"
17 #include <linux/posix_acl_xattr.h>
21 xfs_xattr_get(const struct xattr_handler
*handler
, struct dentry
*unused
,
22 struct inode
*inode
, const char *name
, void *value
, size_t size
)
24 struct xfs_da_args args
= {
26 .attr_filter
= handler
->flags
,
28 .namelen
= strlen(name
),
34 error
= xfs_attr_get(&args
);
41 xfs_xattr_set(const struct xattr_handler
*handler
, struct dentry
*unused
,
42 struct inode
*inode
, const char *name
, const void *value
,
43 size_t size
, int flags
)
45 struct xfs_da_args args
= {
47 .attr_filter
= handler
->flags
,
50 .namelen
= strlen(name
),
51 .value
= (void *)value
,
56 error
= xfs_attr_set(&args
);
57 if (!error
&& (handler
->flags
& XFS_ATTR_ROOT
))
58 xfs_forget_acl(inode
, name
);
62 static const struct xattr_handler xfs_xattr_user_handler
= {
63 .prefix
= XATTR_USER_PREFIX
,
64 .flags
= 0, /* no flags implies user namespace */
69 static const struct xattr_handler xfs_xattr_trusted_handler
= {
70 .prefix
= XATTR_TRUSTED_PREFIX
,
71 .flags
= XFS_ATTR_ROOT
,
76 static const struct xattr_handler xfs_xattr_security_handler
= {
77 .prefix
= XATTR_SECURITY_PREFIX
,
78 .flags
= XFS_ATTR_SECURE
,
83 const struct xattr_handler
*xfs_xattr_handlers
[] = {
84 &xfs_xattr_user_handler
,
85 &xfs_xattr_trusted_handler
,
86 &xfs_xattr_security_handler
,
87 #ifdef CONFIG_XFS_POSIX_ACL
88 &posix_acl_access_xattr_handler
,
89 &posix_acl_default_xattr_handler
,
95 __xfs_xattr_put_listent(
96 struct xfs_attr_list_context
*context
,
105 if (context
->count
< 0 || context
->seen_enough
)
108 if (!context
->buffer
)
111 arraytop
= context
->count
+ prefix_len
+ namelen
+ 1;
112 if (arraytop
> context
->firstu
) {
113 context
->count
= -1; /* insufficient space */
114 context
->seen_enough
= 1;
117 offset
= context
->buffer
+ context
->count
;
118 strncpy(offset
, prefix
, prefix_len
);
119 offset
+= prefix_len
;
120 strncpy(offset
, (char *)name
, namelen
); /* real name */
125 context
->count
+= prefix_len
+ namelen
+ 1;
130 xfs_xattr_put_listent(
131 struct xfs_attr_list_context
*context
,
140 ASSERT(context
->count
>= 0);
142 if (flags
& XFS_ATTR_ROOT
) {
143 #ifdef CONFIG_XFS_POSIX_ACL
144 if (namelen
== SGI_ACL_FILE_SIZE
&&
145 strncmp(name
, SGI_ACL_FILE
,
146 SGI_ACL_FILE_SIZE
) == 0) {
147 __xfs_xattr_put_listent(
148 context
, XATTR_SYSTEM_PREFIX
,
149 XATTR_SYSTEM_PREFIX_LEN
,
150 XATTR_POSIX_ACL_ACCESS
,
151 strlen(XATTR_POSIX_ACL_ACCESS
));
152 } else if (namelen
== SGI_ACL_DEFAULT_SIZE
&&
153 strncmp(name
, SGI_ACL_DEFAULT
,
154 SGI_ACL_DEFAULT_SIZE
) == 0) {
155 __xfs_xattr_put_listent(
156 context
, XATTR_SYSTEM_PREFIX
,
157 XATTR_SYSTEM_PREFIX_LEN
,
158 XATTR_POSIX_ACL_DEFAULT
,
159 strlen(XATTR_POSIX_ACL_DEFAULT
));
164 * Only show root namespace entries if we are actually allowed to
167 if (!capable(CAP_SYS_ADMIN
))
170 prefix
= XATTR_TRUSTED_PREFIX
;
171 prefix_len
= XATTR_TRUSTED_PREFIX_LEN
;
172 } else if (flags
& XFS_ATTR_SECURE
) {
173 prefix
= XATTR_SECURITY_PREFIX
;
174 prefix_len
= XATTR_SECURITY_PREFIX_LEN
;
176 prefix
= XATTR_USER_PREFIX
;
177 prefix_len
= XATTR_USER_PREFIX_LEN
;
180 __xfs_xattr_put_listent(context
, prefix
, prefix_len
, name
,
187 struct dentry
*dentry
,
191 struct xfs_attr_list_context context
;
192 struct inode
*inode
= d_inode(dentry
);
196 * First read the regular on-disk attributes.
198 memset(&context
, 0, sizeof(context
));
199 context
.dp
= XFS_I(inode
);
201 context
.buffer
= size
? data
: NULL
;
202 context
.bufsize
= size
;
203 context
.firstu
= context
.bufsize
;
204 context
.put_listent
= xfs_xattr_put_listent
;
206 error
= xfs_attr_list(&context
);
209 if (context
.count
< 0)
212 return context
.count
;