1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2008 Christoph Hellwig.
4 * Portions Copyright (C) 2000-2008 Silicon Graphics, Inc.
8 #include "xfs_shared.h"
9 #include "xfs_format.h"
10 #include "xfs_log_format.h"
11 #include "xfs_da_format.h"
12 #include "xfs_inode.h"
15 #include "xfs_da_format.h"
16 #include "xfs_da_btree.h"
18 #include <linux/posix_acl_xattr.h>
22 xfs_xattr_get(const struct xattr_handler
*handler
, struct dentry
*unused
,
23 struct inode
*inode
, const char *name
, void *value
, size_t size
)
25 struct xfs_da_args args
= {
27 .attr_filter
= handler
->flags
,
29 .namelen
= strlen(name
),
35 error
= xfs_attr_get(&args
);
42 xfs_xattr_set(const struct xattr_handler
*handler
, struct dentry
*unused
,
43 struct inode
*inode
, const char *name
, const void *value
,
44 size_t size
, int flags
)
46 struct xfs_da_args args
= {
48 .attr_filter
= handler
->flags
,
51 .namelen
= strlen(name
),
52 .value
= (void *)value
,
57 error
= xfs_attr_set(&args
);
58 if (!error
&& (handler
->flags
& XFS_ATTR_ROOT
))
59 xfs_forget_acl(inode
, name
);
63 static const struct xattr_handler xfs_xattr_user_handler
= {
64 .prefix
= XATTR_USER_PREFIX
,
65 .flags
= 0, /* no flags implies user namespace */
70 static const struct xattr_handler xfs_xattr_trusted_handler
= {
71 .prefix
= XATTR_TRUSTED_PREFIX
,
72 .flags
= XFS_ATTR_ROOT
,
77 static const struct xattr_handler xfs_xattr_security_handler
= {
78 .prefix
= XATTR_SECURITY_PREFIX
,
79 .flags
= XFS_ATTR_SECURE
,
84 const struct xattr_handler
*xfs_xattr_handlers
[] = {
85 &xfs_xattr_user_handler
,
86 &xfs_xattr_trusted_handler
,
87 &xfs_xattr_security_handler
,
88 #ifdef CONFIG_XFS_POSIX_ACL
89 &posix_acl_access_xattr_handler
,
90 &posix_acl_default_xattr_handler
,
96 __xfs_xattr_put_listent(
97 struct xfs_attr_list_context
*context
,
106 if (context
->count
< 0 || context
->seen_enough
)
109 if (!context
->buffer
)
112 arraytop
= context
->count
+ prefix_len
+ namelen
+ 1;
113 if (arraytop
> context
->firstu
) {
114 context
->count
= -1; /* insufficient space */
115 context
->seen_enough
= 1;
118 offset
= context
->buffer
+ context
->count
;
119 strncpy(offset
, prefix
, prefix_len
);
120 offset
+= prefix_len
;
121 strncpy(offset
, (char *)name
, namelen
); /* real name */
126 context
->count
+= prefix_len
+ namelen
+ 1;
131 xfs_xattr_put_listent(
132 struct xfs_attr_list_context
*context
,
141 ASSERT(context
->count
>= 0);
143 if (flags
& XFS_ATTR_ROOT
) {
144 #ifdef CONFIG_XFS_POSIX_ACL
145 if (namelen
== SGI_ACL_FILE_SIZE
&&
146 strncmp(name
, SGI_ACL_FILE
,
147 SGI_ACL_FILE_SIZE
) == 0) {
148 __xfs_xattr_put_listent(
149 context
, XATTR_SYSTEM_PREFIX
,
150 XATTR_SYSTEM_PREFIX_LEN
,
151 XATTR_POSIX_ACL_ACCESS
,
152 strlen(XATTR_POSIX_ACL_ACCESS
));
153 } else if (namelen
== SGI_ACL_DEFAULT_SIZE
&&
154 strncmp(name
, SGI_ACL_DEFAULT
,
155 SGI_ACL_DEFAULT_SIZE
) == 0) {
156 __xfs_xattr_put_listent(
157 context
, XATTR_SYSTEM_PREFIX
,
158 XATTR_SYSTEM_PREFIX_LEN
,
159 XATTR_POSIX_ACL_DEFAULT
,
160 strlen(XATTR_POSIX_ACL_DEFAULT
));
165 * Only show root namespace entries if we are actually allowed to
168 if (!capable(CAP_SYS_ADMIN
))
171 prefix
= XATTR_TRUSTED_PREFIX
;
172 prefix_len
= XATTR_TRUSTED_PREFIX_LEN
;
173 } else if (flags
& XFS_ATTR_SECURE
) {
174 prefix
= XATTR_SECURITY_PREFIX
;
175 prefix_len
= XATTR_SECURITY_PREFIX_LEN
;
177 prefix
= XATTR_USER_PREFIX
;
178 prefix_len
= XATTR_USER_PREFIX_LEN
;
181 __xfs_xattr_put_listent(context
, prefix
, prefix_len
, name
,
188 struct dentry
*dentry
,
192 struct xfs_attr_list_context context
;
193 struct inode
*inode
= d_inode(dentry
);
197 * First read the regular on-disk attributes.
199 memset(&context
, 0, sizeof(context
));
200 context
.dp
= XFS_I(inode
);
202 context
.buffer
= size
? data
: NULL
;
203 context
.bufsize
= size
;
204 context
.firstu
= context
.bufsize
;
205 context
.put_listent
= xfs_xattr_put_listent
;
207 error
= xfs_attr_list(&context
);
210 if (context
.count
< 0)
213 return context
.count
;