]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/9p/xattr.c
Merge branch 'overlayfs-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/mszer...
[mirror_ubuntu-artful-kernel.git] / fs / 9p / xattr.c
CommitLineData
ebf46264
AK
1/*
2 * Copyright IBM Corporation, 2010
3 * Author Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com>
4 *
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of version 2.1 of the GNU Lesser General Public License
7 * as published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it would be useful, but
10 * WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
12 *
13 */
14
15#include <linux/module.h>
16#include <linux/fs.h>
17#include <linux/sched.h>
070b3656 18#include <linux/uio.h>
ebf46264
AK
19#include <net/9p/9p.h>
20#include <net/9p/client.h>
21
22#include "fid.h"
23#include "xattr.h"
24
85ff872d
AK
25ssize_t v9fs_fid_xattr_get(struct p9_fid *fid, const char *name,
26 void *buffer, size_t buffer_size)
ebf46264
AK
27{
28 ssize_t retval;
e1200fe6 29 u64 attr_size;
85ff872d 30 struct p9_fid *attr_fid;
e1200fe6
AV
31 struct kvec kvec = {.iov_base = buffer, .iov_len = buffer_size};
32 struct iov_iter to;
33 int err;
34
35 iov_iter_kvec(&to, READ | ITER_KVEC, &kvec, 1, buffer_size);
ebf46264
AK
36
37 attr_fid = p9_client_xattrwalk(fid, name, &attr_size);
38 if (IS_ERR(attr_fid)) {
39 retval = PTR_ERR(attr_fid);
5d385153
JP
40 p9_debug(P9_DEBUG_VFS, "p9_client_attrwalk failed %zd\n",
41 retval);
e1200fe6 42 return retval;
ebf46264
AK
43 }
44 if (attr_size > buffer_size) {
e1200fe6
AV
45 if (!buffer_size) /* request to get the attr_size */
46 retval = attr_size;
ebf46264 47 else
e1200fe6
AV
48 retval = -ERANGE;
49 } else {
50 iov_iter_truncate(&to, attr_size);
51 retval = p9_client_read(attr_fid, 0, &to, &err);
52 if (err)
53 retval = err;
ebf46264 54 }
e1200fe6 55 p9_client_clunk(attr_fid);
ebf46264 56 return retval;
ebf46264
AK
57}
58
85ff872d
AK
59
60/*
61 * v9fs_xattr_get()
62 *
63 * Copy an extended attribute into the buffer
64 * provided, or compute the buffer size required.
65 * Buffer is NULL to compute the size of the buffer required.
66 *
67 * Returns a negative error number on failure, or the number of bytes
68 * used / required on success.
69 */
70ssize_t v9fs_xattr_get(struct dentry *dentry, const char *name,
71 void *buffer, size_t buffer_size)
72{
73 struct p9_fid *fid;
74
5d385153
JP
75 p9_debug(P9_DEBUG_VFS, "name = %s value_len = %zu\n",
76 name, buffer_size);
85ff872d
AK
77 fid = v9fs_fid_lookup(dentry);
78 if (IS_ERR(fid))
79 return PTR_ERR(fid);
80
81 return v9fs_fid_xattr_get(fid, name, buffer, buffer_size);
82}
83
ebf46264
AK
84/*
85 * v9fs_xattr_set()
86 *
87 * Create, replace or remove an extended attribute for this inode. Buffer
88 * is NULL to remove an existing extended attribute, and non-NULL to
89 * either replace an existing extended attribute, or create a new extended
90 * attribute. The flags XATTR_REPLACE and XATTR_CREATE
91 * specify that an extended attribute must exist and must not exist
92 * previous to the call, respectively.
93 *
94 * Returns 0, or a negative error number on failure.
95 */
96int v9fs_xattr_set(struct dentry *dentry, const char *name,
97 const void *value, size_t value_len, int flags)
38baba9e
AV
98{
99 struct p9_fid *fid = v9fs_fid_lookup(dentry);
38baba9e
AV
100 return v9fs_fid_xattr_set(fid, name, value, value_len, flags);
101}
102
103int v9fs_fid_xattr_set(struct p9_fid *fid, const char *name,
104 const void *value, size_t value_len, int flags)
ebf46264 105{
070b3656
AV
106 struct kvec kvec = {.iov_base = (void *)value, .iov_len = value_len};
107 struct iov_iter from;
108 int retval;
109
110 iov_iter_kvec(&from, WRITE | ITER_KVEC, &kvec, 1, value_len);
ebf46264 111
5d385153
JP
112 p9_debug(P9_DEBUG_VFS, "name = %s value_len = %zu flags = %d\n",
113 name, value_len, flags);
ebf46264 114
38baba9e 115 /* Clone it */
7d50a29f 116 fid = clone_fid(fid);
38baba9e
AV
117 if (IS_ERR(fid))
118 return PTR_ERR(fid);
119
ebf46264
AK
120 /*
121 * On success fid points to xattr
122 */
123 retval = p9_client_xattrcreate(fid, name, value_len, flags);
070b3656 124 if (retval < 0)
5d385153
JP
125 p9_debug(P9_DEBUG_VFS, "p9_client_xattrcreate failed %d\n",
126 retval);
070b3656
AV
127 else
128 p9_client_write(fid, 0, &from, &retval);
bdd5c28d
GB
129 p9_client_clunk(fid);
130 return retval;
ebf46264
AK
131}
132
133ssize_t v9fs_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
134{
135 return v9fs_xattr_get(dentry, NULL, buffer, buffer_size);
136}
137
e409de99 138static int v9fs_xattr_handler_get(const struct xattr_handler *handler,
b296821a
AV
139 struct dentry *dentry, struct inode *inode,
140 const char *name, void *buffer, size_t size)
e409de99
AG
141{
142 const char *full_name = xattr_full_name(handler, name);
143
e409de99
AG
144 return v9fs_xattr_get(dentry, full_name, buffer, size);
145}
146
147static int v9fs_xattr_handler_set(const struct xattr_handler *handler,
59301226
AV
148 struct dentry *dentry, struct inode *inode,
149 const char *name, const void *value,
150 size_t size, int flags)
e409de99
AG
151{
152 const char *full_name = xattr_full_name(handler, name);
153
e409de99
AG
154 return v9fs_xattr_set(dentry, full_name, value, size, flags);
155}
156
157static struct xattr_handler v9fs_xattr_user_handler = {
158 .prefix = XATTR_USER_PREFIX,
159 .get = v9fs_xattr_handler_get,
160 .set = v9fs_xattr_handler_set,
161};
162
163static struct xattr_handler v9fs_xattr_trusted_handler = {
164 .prefix = XATTR_TRUSTED_PREFIX,
165 .get = v9fs_xattr_handler_get,
166 .set = v9fs_xattr_handler_set,
167};
168
169#ifdef CONFIG_9P_FS_SECURITY
170static struct xattr_handler v9fs_xattr_security_handler = {
171 .prefix = XATTR_SECURITY_PREFIX,
172 .get = v9fs_xattr_handler_get,
173 .set = v9fs_xattr_handler_set,
174};
175#endif
176
ebf46264
AK
177const struct xattr_handler *v9fs_xattr_handlers[] = {
178 &v9fs_xattr_user_handler,
d9a73859 179 &v9fs_xattr_trusted_handler,
7a4566b0
AK
180#ifdef CONFIG_9P_FS_POSIX_ACL
181 &v9fs_xattr_acl_access_handler,
182 &v9fs_xattr_acl_default_handler,
d9a73859
JG
183#endif
184#ifdef CONFIG_9P_FS_SECURITY
185 &v9fs_xattr_security_handler,
7a4566b0 186#endif
ebf46264
AK
187 NULL
188};