1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2008 Christoph Hellwig.
4 * Portions Copyright (C) 2000-2008 Silicon Graphics, Inc.
8 #include "xfs_format.h"
9 #include "xfs_log_format.h"
10 #include "xfs_trans_resv.h"
11 #include "xfs_mount.h"
12 #include "xfs_da_format.h"
13 #include "xfs_inode.h"
15 #include "xfs_attr_leaf.h"
18 #include <linux/posix_acl_xattr.h>
19 #include <linux/xattr.h>
23 xfs_xattr_get(const struct xattr_handler
*handler
, struct dentry
*unused
,
24 struct inode
*inode
, const char *name
, void *value
, size_t size
)
26 int xflags
= handler
->flags
;
27 struct xfs_inode
*ip
= XFS_I(inode
);
28 int error
, asize
= size
;
30 /* Convert Linux syscall to XFS internal ATTR flags */
32 xflags
|= ATTR_KERNOVAL
;
36 error
= xfs_attr_get(ip
, (unsigned char *)name
, value
, &asize
, xflags
);
49 * Invalidate any cached ACLs if the user has bypassed the ACL
50 * interface. We don't validate the content whatsoever so it is caller
51 * responsibility to provide data in valid format and ensure i_mode is
54 if (xflags
& ATTR_ROOT
) {
55 #ifdef CONFIG_XFS_POSIX_ACL
56 if (!strcmp(name
, SGI_ACL_FILE
))
57 forget_cached_acl(inode
, ACL_TYPE_ACCESS
);
58 else if (!strcmp(name
, SGI_ACL_DEFAULT
))
59 forget_cached_acl(inode
, ACL_TYPE_DEFAULT
);
65 xfs_xattr_set(const struct xattr_handler
*handler
, struct dentry
*unused
,
66 struct inode
*inode
, const char *name
, const void *value
,
67 size_t size
, int flags
)
69 int xflags
= handler
->flags
;
70 struct xfs_inode
*ip
= XFS_I(inode
);
73 /* Convert Linux syscall to XFS internal ATTR flags */
74 if (flags
& XATTR_CREATE
)
75 xflags
|= ATTR_CREATE
;
76 if (flags
& XATTR_REPLACE
)
77 xflags
|= ATTR_REPLACE
;
80 return xfs_attr_remove(ip
, (unsigned char *)name
, xflags
);
81 error
= xfs_attr_set(ip
, (unsigned char *)name
,
82 (void *)value
, size
, xflags
);
84 xfs_forget_acl(inode
, name
, xflags
);
89 static const struct xattr_handler xfs_xattr_user_handler
= {
90 .prefix
= XATTR_USER_PREFIX
,
91 .flags
= 0, /* no flags implies user namespace */
96 static const struct xattr_handler xfs_xattr_trusted_handler
= {
97 .prefix
= XATTR_TRUSTED_PREFIX
,
100 .set
= xfs_xattr_set
,
103 static const struct xattr_handler xfs_xattr_security_handler
= {
104 .prefix
= XATTR_SECURITY_PREFIX
,
105 .flags
= ATTR_SECURE
,
106 .get
= xfs_xattr_get
,
107 .set
= xfs_xattr_set
,
110 const struct xattr_handler
*xfs_xattr_handlers
[] = {
111 &xfs_xattr_user_handler
,
112 &xfs_xattr_trusted_handler
,
113 &xfs_xattr_security_handler
,
114 #ifdef CONFIG_XFS_POSIX_ACL
115 &posix_acl_access_xattr_handler
,
116 &posix_acl_default_xattr_handler
,
122 __xfs_xattr_put_listent(
123 struct xfs_attr_list_context
*context
,
135 arraytop
= context
->count
+ prefix_len
+ namelen
+ 1;
136 if (arraytop
> context
->firstu
) {
137 context
->count
= -1; /* insufficient space */
138 context
->seen_enough
= 1;
141 offset
= (char *)context
->alist
+ context
->count
;
142 strncpy(offset
, prefix
, prefix_len
);
143 offset
+= prefix_len
;
144 strncpy(offset
, (char *)name
, namelen
); /* real name */
149 context
->count
+= prefix_len
+ namelen
+ 1;
154 xfs_xattr_put_listent(
155 struct xfs_attr_list_context
*context
,
164 ASSERT(context
->count
>= 0);
166 if (flags
& XFS_ATTR_ROOT
) {
167 #ifdef CONFIG_XFS_POSIX_ACL
168 if (namelen
== SGI_ACL_FILE_SIZE
&&
169 strncmp(name
, SGI_ACL_FILE
,
170 SGI_ACL_FILE_SIZE
) == 0) {
171 __xfs_xattr_put_listent(
172 context
, XATTR_SYSTEM_PREFIX
,
173 XATTR_SYSTEM_PREFIX_LEN
,
174 XATTR_POSIX_ACL_ACCESS
,
175 strlen(XATTR_POSIX_ACL_ACCESS
));
176 } else if (namelen
== SGI_ACL_DEFAULT_SIZE
&&
177 strncmp(name
, SGI_ACL_DEFAULT
,
178 SGI_ACL_DEFAULT_SIZE
) == 0) {
179 __xfs_xattr_put_listent(
180 context
, XATTR_SYSTEM_PREFIX
,
181 XATTR_SYSTEM_PREFIX_LEN
,
182 XATTR_POSIX_ACL_DEFAULT
,
183 strlen(XATTR_POSIX_ACL_DEFAULT
));
188 * Only show root namespace entries if we are actually allowed to
191 if (!capable(CAP_SYS_ADMIN
))
194 prefix
= XATTR_TRUSTED_PREFIX
;
195 prefix_len
= XATTR_TRUSTED_PREFIX_LEN
;
196 } else if (flags
& XFS_ATTR_SECURE
) {
197 prefix
= XATTR_SECURITY_PREFIX
;
198 prefix_len
= XATTR_SECURITY_PREFIX_LEN
;
200 prefix
= XATTR_USER_PREFIX
;
201 prefix_len
= XATTR_USER_PREFIX_LEN
;
204 __xfs_xattr_put_listent(context
, prefix
, prefix_len
, name
,
211 struct dentry
*dentry
,
215 struct xfs_attr_list_context context
;
216 struct attrlist_cursor_kern cursor
= { 0 };
217 struct inode
*inode
= d_inode(dentry
);
221 * First read the regular on-disk attributes.
223 memset(&context
, 0, sizeof(context
));
224 context
.dp
= XFS_I(inode
);
225 context
.cursor
= &cursor
;
227 context
.alist
= size
? data
: NULL
;
228 context
.bufsize
= size
;
229 context
.firstu
= context
.bufsize
;
230 context
.put_listent
= xfs_xattr_put_listent
;
232 error
= xfs_attr_list_int(&context
);
235 if (context
.count
< 0)
238 return context
.count
;