2 * Copyright (C) 2008 Christoph Hellwig.
3 * Portions Copyright (C) 2000-2008 Silicon Graphics, Inc.
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License as
7 * published by the Free Software Foundation.
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
20 #include "xfs_format.h"
21 #include "xfs_log_format.h"
22 #include "xfs_trans_resv.h"
23 #include "xfs_mount.h"
24 #include "xfs_da_format.h"
25 #include "xfs_inode.h"
27 #include "xfs_attr_leaf.h"
30 #include <linux/posix_acl_xattr.h>
31 #include <linux/xattr.h>
35 xfs_xattr_get(const struct xattr_handler
*handler
, struct dentry
*dentry
,
36 const char *name
, void *value
, size_t size
)
38 int xflags
= handler
->flags
;
39 struct xfs_inode
*ip
= XFS_I(d_inode(dentry
));
40 int error
, asize
= size
;
42 if (strcmp(name
, "") == 0)
45 /* Convert Linux syscall to XFS internal ATTR flags */
47 xflags
|= ATTR_KERNOVAL
;
51 error
= xfs_attr_get(ip
, (unsigned char *)name
, value
, &asize
, xflags
);
64 * Invalidate any cached ACLs if the user has bypassed the ACL
65 * interface. We don't validate the content whatsoever so it is caller
66 * responsibility to provide data in valid format and ensure i_mode is
69 if (xflags
& ATTR_ROOT
) {
70 #ifdef CONFIG_XFS_POSIX_ACL
71 if (!strcmp(name
, SGI_ACL_FILE
))
72 forget_cached_acl(inode
, ACL_TYPE_ACCESS
);
73 else if (!strcmp(name
, SGI_ACL_DEFAULT
))
74 forget_cached_acl(inode
, ACL_TYPE_DEFAULT
);
80 xfs_xattr_set(const struct xattr_handler
*handler
, struct dentry
*dentry
,
81 const char *name
, const void *value
, size_t size
, int flags
)
83 int xflags
= handler
->flags
;
84 struct xfs_inode
*ip
= XFS_I(d_inode(dentry
));
87 if (strcmp(name
, "") == 0)
90 /* Convert Linux syscall to XFS internal ATTR flags */
91 if (flags
& XATTR_CREATE
)
92 xflags
|= ATTR_CREATE
;
93 if (flags
& XATTR_REPLACE
)
94 xflags
|= ATTR_REPLACE
;
97 return xfs_attr_remove(ip
, (unsigned char *)name
, xflags
);
98 error
= xfs_attr_set(ip
, (unsigned char *)name
,
99 (void *)value
, size
, xflags
);
101 xfs_forget_acl(d_inode(dentry
), name
, xflags
);
106 static const struct xattr_handler xfs_xattr_user_handler
= {
107 .prefix
= XATTR_USER_PREFIX
,
108 .flags
= 0, /* no flags implies user namespace */
109 .get
= xfs_xattr_get
,
110 .set
= xfs_xattr_set
,
113 static const struct xattr_handler xfs_xattr_trusted_handler
= {
114 .prefix
= XATTR_TRUSTED_PREFIX
,
116 .get
= xfs_xattr_get
,
117 .set
= xfs_xattr_set
,
120 static const struct xattr_handler xfs_xattr_security_handler
= {
121 .prefix
= XATTR_SECURITY_PREFIX
,
122 .flags
= ATTR_SECURE
,
123 .get
= xfs_xattr_get
,
124 .set
= xfs_xattr_set
,
127 const struct xattr_handler
*xfs_xattr_handlers
[] = {
128 &xfs_xattr_user_handler
,
129 &xfs_xattr_trusted_handler
,
130 &xfs_xattr_security_handler
,
131 #ifdef CONFIG_XFS_POSIX_ACL
132 &posix_acl_access_xattr_handler
,
133 &posix_acl_default_xattr_handler
,
138 static unsigned int xfs_xattr_prefix_len(int flags
)
140 if (flags
& XFS_ATTR_SECURE
)
141 return sizeof("security");
142 else if (flags
& XFS_ATTR_ROOT
)
143 return sizeof("trusted");
145 return sizeof("user");
148 static const char *xfs_xattr_prefix(int flags
)
150 if (flags
& XFS_ATTR_SECURE
)
151 return xfs_xattr_security_handler
.prefix
;
152 else if (flags
& XFS_ATTR_ROOT
)
153 return xfs_xattr_trusted_handler
.prefix
;
155 return xfs_xattr_user_handler
.prefix
;
159 xfs_xattr_put_listent(
160 struct xfs_attr_list_context
*context
,
165 unsigned char *value
)
167 unsigned int prefix_len
= xfs_xattr_prefix_len(flags
);
171 ASSERT(context
->count
>= 0);
174 * Only show root namespace entries if we are actually allowed to
177 if ((flags
& XFS_ATTR_ROOT
) && !capable(CAP_SYS_ADMIN
))
180 arraytop
= context
->count
+ prefix_len
+ namelen
+ 1;
181 if (arraytop
> context
->firstu
) {
182 context
->count
= -1; /* insufficient space */
183 context
->seen_enough
= 1;
186 offset
= (char *)context
->alist
+ context
->count
;
187 strncpy(offset
, xfs_xattr_prefix(flags
), prefix_len
);
188 offset
+= prefix_len
;
189 strncpy(offset
, (char *)name
, namelen
); /* real name */
192 context
->count
+= prefix_len
+ namelen
+ 1;
197 xfs_xattr_put_listent_sizes(
198 struct xfs_attr_list_context
*context
,
203 unsigned char *value
)
205 context
->count
+= xfs_xattr_prefix_len(flags
) + namelen
+ 1;
210 list_one_attr(const char *name
, const size_t len
, void *data
,
211 size_t size
, ssize_t
*result
)
213 char *p
= data
+ *result
;
227 struct dentry
*dentry
,
231 struct xfs_attr_list_context context
;
232 struct attrlist_cursor_kern cursor
= { 0 };
233 struct inode
*inode
= d_inode(dentry
);
237 * First read the regular on-disk attributes.
239 memset(&context
, 0, sizeof(context
));
240 context
.dp
= XFS_I(inode
);
241 context
.cursor
= &cursor
;
243 context
.alist
= data
;
244 context
.bufsize
= size
;
245 context
.firstu
= context
.bufsize
;
248 context
.put_listent
= xfs_xattr_put_listent
;
250 context
.put_listent
= xfs_xattr_put_listent_sizes
;
252 error
= xfs_attr_list_int(&context
);
255 if (context
.count
< 0)
259 * Then add the two synthetic ACL attributes.
261 if (posix_acl_access_exists(inode
)) {
262 error
= list_one_attr(POSIX_ACL_XATTR_ACCESS
,
263 strlen(POSIX_ACL_XATTR_ACCESS
) + 1,
264 data
, size
, &context
.count
);
269 if (posix_acl_default_exists(inode
)) {
270 error
= list_one_attr(POSIX_ACL_XATTR_DEFAULT
,
271 strlen(POSIX_ACL_XATTR_DEFAULT
) + 1,
272 data
, size
, &context
.count
);
277 return context
.count
;