]>
Commit | Line | Data |
---|---|---|
929be906 | 1 | // SPDX-License-Identifier: LGPL-2.1 |
1da177e4 | 2 | /* |
1da177e4 | 3 | * |
79a58d1f | 4 | * Copyright (c) International Business Machines Corp., 2003, 2007 |
1da177e4 LT |
5 | * Author(s): Steve French (sfrench@us.ibm.com) |
6 | * | |
1da177e4 LT |
7 | */ |
8 | ||
9 | #include <linux/fs.h> | |
10 | #include <linux/posix_acl_xattr.h> | |
5a0e3ad6 | 11 | #include <linux/slab.h> |
f995e740 | 12 | #include <linux/xattr.h> |
1da177e4 LT |
13 | #include "cifsfs.h" |
14 | #include "cifspdu.h" | |
15 | #include "cifsglob.h" | |
16 | #include "cifsproto.h" | |
17 | #include "cifs_debug.h" | |
2baa2682 SF |
18 | #include "cifs_fs_sb.h" |
19 | #include "cifs_unicode.h" | |
087f757b | 20 | #include "cifs_ioctl.h" |
1da177e4 | 21 | |
63d37fb4 | 22 | #define MAX_EA_VALUE_SIZE CIFSMaxBufSize |
438471b6 BP |
23 | #define CIFS_XATTR_CIFS_ACL "system.cifs_acl" /* DACL only */ |
24 | #define CIFS_XATTR_CIFS_NTSD "system.cifs_ntsd" /* owner plus DACL */ | |
3970acf7 | 25 | #define CIFS_XATTR_CIFS_NTSD_FULL "system.cifs_ntsd_full" /* owner/DACL/SACL */ |
a958fff2 | 26 | #define CIFS_XATTR_ATTRIB "cifs.dosattrib" /* full name: user.cifs.dosattrib */ |
66098044 | 27 | #define CIFS_XATTR_CREATETIME "cifs.creationtime" /* user.cifs.creationtime */ |
c4f7173a SF |
28 | /* |
29 | * Although these three are just aliases for the above, need to move away from | |
30 | * confusing users and using the 20+ year old term 'cifs' when it is no longer | |
31 | * secure, replaced by SMB2 (then even more highly secure SMB3) many years ago | |
32 | */ | |
438471b6 BP |
33 | #define SMB3_XATTR_CIFS_ACL "system.smb3_acl" /* DACL only */ |
34 | #define SMB3_XATTR_CIFS_NTSD "system.smb3_ntsd" /* owner plus DACL */ | |
3970acf7 | 35 | #define SMB3_XATTR_CIFS_NTSD_FULL "system.smb3_ntsd_full" /* owner/DACL/SACL */ |
c4f7173a SF |
36 | #define SMB3_XATTR_ATTRIB "smb3.dosattrib" /* full name: user.smb3.dosattrib */ |
37 | #define SMB3_XATTR_CREATETIME "smb3.creationtime" /* user.smb3.creationtime */ | |
f995e740 | 38 | /* BB need to add server (Samba e.g) support for security and trusted prefix */ |
1da177e4 | 39 | |
438471b6 | 40 | enum { XATTR_USER, XATTR_CIFS_ACL, XATTR_ACL_ACCESS, XATTR_ACL_DEFAULT, |
3970acf7 | 41 | XATTR_CIFS_NTSD, XATTR_CIFS_NTSD_FULL }; |
438471b6 BP |
42 | |
43 | static int cifs_attrib_set(unsigned int xid, struct cifs_tcon *pTcon, | |
f6f1f179 | 44 | struct inode *inode, const char *full_path, |
438471b6 BP |
45 | const void *value, size_t size) |
46 | { | |
47 | ssize_t rc = -EOPNOTSUPP; | |
48 | __u32 *pattrib = (__u32 *)value; | |
49 | __u32 attrib; | |
50 | FILE_BASIC_INFO info_buf; | |
51 | ||
52 | if ((value == NULL) || (size != sizeof(__u32))) | |
53 | return -ERANGE; | |
54 | ||
55 | memset(&info_buf, 0, sizeof(info_buf)); | |
56 | attrib = *pattrib; | |
57 | info_buf.Attributes = cpu_to_le32(attrib); | |
58 | if (pTcon->ses->server->ops->set_file_info) | |
59 | rc = pTcon->ses->server->ops->set_file_info(inode, full_path, | |
60 | &info_buf, xid); | |
61 | if (rc == 0) | |
62 | CIFS_I(inode)->cifsAttrs = attrib; | |
63 | ||
64 | return rc; | |
65 | } | |
66 | ||
67 | static int cifs_creation_time_set(unsigned int xid, struct cifs_tcon *pTcon, | |
f6f1f179 | 68 | struct inode *inode, const char *full_path, |
438471b6 BP |
69 | const void *value, size_t size) |
70 | { | |
71 | ssize_t rc = -EOPNOTSUPP; | |
72 | __u64 *pcreation_time = (__u64 *)value; | |
73 | __u64 creation_time; | |
74 | FILE_BASIC_INFO info_buf; | |
75 | ||
76 | if ((value == NULL) || (size != sizeof(__u64))) | |
77 | return -ERANGE; | |
78 | ||
79 | memset(&info_buf, 0, sizeof(info_buf)); | |
80 | creation_time = *pcreation_time; | |
81 | info_buf.CreationTime = cpu_to_le64(creation_time); | |
82 | if (pTcon->ses->server->ops->set_file_info) | |
83 | rc = pTcon->ses->server->ops->set_file_info(inode, full_path, | |
84 | &info_buf, xid); | |
85 | if (rc == 0) | |
86 | CIFS_I(inode)->createtime = creation_time; | |
87 | ||
88 | return rc; | |
89 | } | |
7ffec372 | 90 | |
a9ae008f | 91 | static int cifs_xattr_set(const struct xattr_handler *handler, |
e65ce2a5 | 92 | struct user_namespace *mnt_userns, |
59301226 AV |
93 | struct dentry *dentry, struct inode *inode, |
94 | const char *name, const void *value, | |
95 | size_t size, int flags) | |
1da177e4 LT |
96 | { |
97 | int rc = -EOPNOTSUPP; | |
6d5786a3 | 98 | unsigned int xid; |
a9ae008f | 99 | struct super_block *sb = dentry->d_sb; |
5fdccfef | 100 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
7ffec372 | 101 | struct tcon_link *tlink; |
96daf2b0 | 102 | struct cifs_tcon *pTcon; |
8e33cf20 | 103 | const char *full_path; |
f6a9bc33 | 104 | void *page; |
1da177e4 | 105 | |
7ffec372 JL |
106 | tlink = cifs_sb_tlink(cifs_sb); |
107 | if (IS_ERR(tlink)) | |
108 | return PTR_ERR(tlink); | |
109 | pTcon = tlink_tcon(tlink); | |
110 | ||
6d5786a3 | 111 | xid = get_xid(); |
f6a9bc33 | 112 | page = alloc_dentry_path(); |
1da177e4 | 113 | |
f6a9bc33 AV |
114 | full_path = build_path_from_dentry(dentry, page); |
115 | if (IS_ERR(full_path)) { | |
116 | rc = PTR_ERR(full_path); | |
a9ae008f | 117 | goto out; |
1da177e4 LT |
118 | } |
119 | /* return dos attributes as pseudo xattr */ | |
120 | /* return alt name if available as pseudo attr */ | |
121 | ||
122 | /* if proc/fs/cifs/streamstoxattr is set then | |
79a58d1f | 123 | search server for EAs or streams to |
1da177e4 | 124 | returns as xattrs */ |
a9ae008f | 125 | if (size > MAX_EA_VALUE_SIZE) { |
f96637be | 126 | cifs_dbg(FYI, "size of EA value too large\n"); |
7ffec372 | 127 | rc = -EOPNOTSUPP; |
a9ae008f | 128 | goto out; |
1da177e4 LT |
129 | } |
130 | ||
a9ae008f AG |
131 | switch (handler->flags) { |
132 | case XATTR_USER: | |
438471b6 BP |
133 | cifs_dbg(FYI, "%s:setting user xattr %s\n", __func__, name); |
134 | if ((strcmp(name, CIFS_XATTR_ATTRIB) == 0) || | |
135 | (strcmp(name, SMB3_XATTR_ATTRIB) == 0)) { | |
136 | rc = cifs_attrib_set(xid, pTcon, inode, full_path, | |
137 | value, size); | |
138 | if (rc == 0) /* force revalidate of the inode */ | |
139 | CIFS_I(inode)->time = 0; | |
140 | break; | |
141 | } else if ((strcmp(name, CIFS_XATTR_CREATETIME) == 0) || | |
142 | (strcmp(name, SMB3_XATTR_CREATETIME) == 0)) { | |
143 | rc = cifs_creation_time_set(xid, pTcon, inode, | |
144 | full_path, value, size); | |
145 | if (rc == 0) /* force revalidate of the inode */ | |
146 | CIFS_I(inode)->time = 0; | |
147 | break; | |
148 | } | |
149 | ||
79a58d1f | 150 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR) |
a9ae008f | 151 | goto out; |
ad7a2926 | 152 | |
666753c3 SF |
153 | if (pTcon->ses->server->ops->set_EA) |
154 | rc = pTcon->ses->server->ops->set_EA(xid, pTcon, | |
a9ae008f | 155 | full_path, name, value, (__u16)size, |
5517554e | 156 | cifs_sb->local_nls, cifs_sb); |
a9ae008f | 157 | break; |
1da177e4 | 158 | |
438471b6 | 159 | case XATTR_CIFS_ACL: |
3970acf7 BP |
160 | case XATTR_CIFS_NTSD: |
161 | case XATTR_CIFS_NTSD_FULL: { | |
b0f8ef20 | 162 | struct cifs_ntsd *pacl; |
a9ae008f AG |
163 | |
164 | if (!value) | |
165 | goto out; | |
166 | pacl = kmalloc(size, GFP_KERNEL); | |
b73b9a4b | 167 | if (!pacl) { |
b73b9a4b SF |
168 | rc = -ENOMEM; |
169 | } else { | |
a9ae008f | 170 | memcpy(pacl, value, size); |
3970acf7 BP |
171 | if (pTcon->ses->server->ops->set_acl) { |
172 | int aclflags = 0; | |
438471b6 | 173 | rc = 0; |
3970acf7 BP |
174 | |
175 | switch (handler->flags) { | |
176 | case XATTR_CIFS_NTSD_FULL: | |
177 | aclflags = (CIFS_ACL_OWNER | | |
178 | CIFS_ACL_DACL | | |
179 | CIFS_ACL_SACL); | |
180 | break; | |
181 | case XATTR_CIFS_NTSD: | |
182 | aclflags = (CIFS_ACL_OWNER | | |
183 | CIFS_ACL_DACL); | |
184 | break; | |
185 | case XATTR_CIFS_ACL: | |
186 | default: | |
187 | aclflags = CIFS_ACL_DACL; | |
438471b6 | 188 | } |
3970acf7 BP |
189 | |
190 | rc = pTcon->ses->server->ops->set_acl(pacl, | |
191 | size, inode, full_path, aclflags); | |
438471b6 | 192 | } else { |
83e3bc23 | 193 | rc = -EOPNOTSUPP; |
438471b6 | 194 | } |
b73b9a4b | 195 | if (rc == 0) /* force revalidate of the inode */ |
59301226 | 196 | CIFS_I(inode)->time = 0; |
b73b9a4b | 197 | kfree(pacl); |
b0f8ef20 | 198 | } |
a9ae008f AG |
199 | break; |
200 | } | |
201 | ||
202 | case XATTR_ACL_ACCESS: | |
1da177e4 | 203 | #ifdef CONFIG_CIFS_POSIX |
a9ae008f AG |
204 | if (!value) |
205 | goto out; | |
1751e8a6 | 206 | if (sb->s_flags & SB_POSIXACL) |
a9ae008f AG |
207 | rc = CIFSSMBSetPosixACL(xid, pTcon, full_path, |
208 | value, (const int)size, | |
209 | ACL_TYPE_ACCESS, cifs_sb->local_nls, | |
210 | cifs_remap(cifs_sb)); | |
211 | #endif /* CONFIG_CIFS_POSIX */ | |
212 | break; | |
213 | ||
214 | case XATTR_ACL_DEFAULT: | |
1da177e4 | 215 | #ifdef CONFIG_CIFS_POSIX |
a9ae008f AG |
216 | if (!value) |
217 | goto out; | |
1751e8a6 | 218 | if (sb->s_flags & SB_POSIXACL) |
a9ae008f AG |
219 | rc = CIFSSMBSetPosixACL(xid, pTcon, full_path, |
220 | value, (const int)size, | |
221 | ACL_TYPE_DEFAULT, cifs_sb->local_nls, | |
222 | cifs_remap(cifs_sb)); | |
223 | #endif /* CONFIG_CIFS_POSIX */ | |
224 | break; | |
1da177e4 LT |
225 | } |
226 | ||
a9ae008f | 227 | out: |
f6a9bc33 | 228 | free_dentry_path(page); |
6d5786a3 | 229 | free_xid(xid); |
7ffec372 | 230 | cifs_put_tlink(tlink); |
1da177e4 LT |
231 | return rc; |
232 | } | |
233 | ||
a958fff2 SF |
234 | static int cifs_attrib_get(struct dentry *dentry, |
235 | struct inode *inode, void *value, | |
236 | size_t size) | |
237 | { | |
238 | ssize_t rc; | |
239 | __u32 *pattribute; | |
240 | ||
241 | rc = cifs_revalidate_dentry_attr(dentry); | |
242 | ||
243 | if (rc) | |
244 | return rc; | |
245 | ||
246 | if ((value == NULL) || (size == 0)) | |
247 | return sizeof(__u32); | |
248 | else if (size < sizeof(__u32)) | |
249 | return -ERANGE; | |
250 | ||
251 | /* return dos attributes as pseudo xattr */ | |
252 | pattribute = (__u32 *)value; | |
253 | *pattribute = CIFS_I(inode)->cifsAttrs; | |
254 | ||
255 | return sizeof(__u32); | |
256 | } | |
257 | ||
66098044 SF |
258 | static int cifs_creation_time_get(struct dentry *dentry, struct inode *inode, |
259 | void *value, size_t size) | |
260 | { | |
261 | ssize_t rc; | |
438471b6 | 262 | __u64 *pcreatetime; |
66098044 SF |
263 | |
264 | rc = cifs_revalidate_dentry_attr(dentry); | |
265 | if (rc) | |
266 | return rc; | |
267 | ||
268 | if ((value == NULL) || (size == 0)) | |
269 | return sizeof(__u64); | |
270 | else if (size < sizeof(__u64)) | |
271 | return -ERANGE; | |
272 | ||
273 | /* return dos attributes as pseudo xattr */ | |
274 | pcreatetime = (__u64 *)value; | |
275 | *pcreatetime = CIFS_I(inode)->createtime; | |
276 | return sizeof(__u64); | |
66098044 SF |
277 | } |
278 | ||
a958fff2 | 279 | |
a9ae008f AG |
280 | static int cifs_xattr_get(const struct xattr_handler *handler, |
281 | struct dentry *dentry, struct inode *inode, | |
282 | const char *name, void *value, size_t size) | |
1da177e4 LT |
283 | { |
284 | ssize_t rc = -EOPNOTSUPP; | |
6d5786a3 | 285 | unsigned int xid; |
a9ae008f | 286 | struct super_block *sb = dentry->d_sb; |
5fdccfef | 287 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
7ffec372 | 288 | struct tcon_link *tlink; |
96daf2b0 | 289 | struct cifs_tcon *pTcon; |
8e33cf20 | 290 | const char *full_path; |
f6a9bc33 | 291 | void *page; |
1da177e4 | 292 | |
7ffec372 JL |
293 | tlink = cifs_sb_tlink(cifs_sb); |
294 | if (IS_ERR(tlink)) | |
295 | return PTR_ERR(tlink); | |
296 | pTcon = tlink_tcon(tlink); | |
297 | ||
6d5786a3 | 298 | xid = get_xid(); |
f6a9bc33 | 299 | page = alloc_dentry_path(); |
1da177e4 | 300 | |
f6a9bc33 AV |
301 | full_path = build_path_from_dentry(dentry, page); |
302 | if (IS_ERR(full_path)) { | |
303 | rc = PTR_ERR(full_path); | |
a9ae008f | 304 | goto out; |
1da177e4 | 305 | } |
a958fff2 | 306 | |
1da177e4 | 307 | /* return alt name if available as pseudo attr */ |
a9ae008f AG |
308 | switch (handler->flags) { |
309 | case XATTR_USER: | |
a958fff2 | 310 | cifs_dbg(FYI, "%s:querying user xattr %s\n", __func__, name); |
c4f7173a SF |
311 | if ((strcmp(name, CIFS_XATTR_ATTRIB) == 0) || |
312 | (strcmp(name, SMB3_XATTR_ATTRIB) == 0)) { | |
a958fff2 SF |
313 | rc = cifs_attrib_get(dentry, inode, value, size); |
314 | break; | |
c4f7173a SF |
315 | } else if ((strcmp(name, CIFS_XATTR_CREATETIME) == 0) || |
316 | (strcmp(name, SMB3_XATTR_CREATETIME) == 0)) { | |
66098044 SF |
317 | rc = cifs_creation_time_get(dentry, inode, value, size); |
318 | break; | |
a958fff2 SF |
319 | } |
320 | ||
79a58d1f | 321 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR) |
a9ae008f | 322 | goto out; |
1da177e4 | 323 | |
666753c3 SF |
324 | if (pTcon->ses->server->ops->query_all_EAs) |
325 | rc = pTcon->ses->server->ops->query_all_EAs(xid, pTcon, | |
67b4c889 | 326 | full_path, name, value, size, cifs_sb); |
a9ae008f | 327 | break; |
1da177e4 | 328 | |
438471b6 | 329 | case XATTR_CIFS_ACL: |
3970acf7 BP |
330 | case XATTR_CIFS_NTSD: |
331 | case XATTR_CIFS_NTSD_FULL: { | |
332 | /* | |
333 | * fetch owner, DACL, and SACL if asked for full descriptor, | |
334 | * fetch owner and DACL otherwise | |
335 | */ | |
9541b813 | 336 | u32 acllen, extra_info; |
a9ae008f AG |
337 | struct cifs_ntsd *pacl; |
338 | ||
339 | if (pTcon->ses->server->ops->get_acl == NULL) | |
340 | goto out; /* rc already EOPNOTSUPP */ | |
341 | ||
3970acf7 | 342 | if (handler->flags == XATTR_CIFS_NTSD_FULL) { |
9541b813 | 343 | extra_info = SACL_SECINFO; |
3970acf7 | 344 | } else { |
9541b813 | 345 | extra_info = 0; |
3970acf7 | 346 | } |
a9ae008f | 347 | pacl = pTcon->ses->server->ops->get_acl(cifs_sb, |
9541b813 | 348 | inode, full_path, &acllen, extra_info); |
a9ae008f AG |
349 | if (IS_ERR(pacl)) { |
350 | rc = PTR_ERR(pacl); | |
351 | cifs_dbg(VFS, "%s: error %zd getting sec desc\n", | |
352 | __func__, rc); | |
353 | } else { | |
354 | if (value) { | |
355 | if (acllen > size) | |
356 | acllen = -ERANGE; | |
357 | else | |
358 | memcpy(value, pacl, acllen); | |
359 | } | |
360 | rc = acllen; | |
361 | kfree(pacl); | |
362 | } | |
a9ae008f AG |
363 | break; |
364 | } | |
365 | ||
366 | case XATTR_ACL_ACCESS: | |
1da177e4 | 367 | #ifdef CONFIG_CIFS_POSIX |
1751e8a6 | 368 | if (sb->s_flags & SB_POSIXACL) |
1da0c78b | 369 | rc = CIFSSMBGetPosixACL(xid, pTcon, full_path, |
a9ae008f | 370 | value, size, ACL_TYPE_ACCESS, |
737b758c | 371 | cifs_sb->local_nls, |
2baa2682 | 372 | cifs_remap(cifs_sb)); |
a9ae008f AG |
373 | #endif /* CONFIG_CIFS_POSIX */ |
374 | break; | |
375 | ||
376 | case XATTR_ACL_DEFAULT: | |
1da177e4 | 377 | #ifdef CONFIG_CIFS_POSIX |
1751e8a6 | 378 | if (sb->s_flags & SB_POSIXACL) |
1da0c78b | 379 | rc = CIFSSMBGetPosixACL(xid, pTcon, full_path, |
a9ae008f | 380 | value, size, ACL_TYPE_DEFAULT, |
737b758c | 381 | cifs_sb->local_nls, |
2baa2682 | 382 | cifs_remap(cifs_sb)); |
a9ae008f AG |
383 | #endif /* CONFIG_CIFS_POSIX */ |
384 | break; | |
385 | } | |
1da177e4 | 386 | |
79a58d1f | 387 | /* We could add an additional check for streams ie |
1da177e4 | 388 | if proc/fs/cifs/streamstoxattr is set then |
79a58d1f | 389 | search server for EAs or streams to |
1da177e4 LT |
390 | returns as xattrs */ |
391 | ||
79a58d1f SF |
392 | if (rc == -EINVAL) |
393 | rc = -EOPNOTSUPP; | |
1da177e4 | 394 | |
a9ae008f | 395 | out: |
f6a9bc33 | 396 | free_dentry_path(page); |
6d5786a3 | 397 | free_xid(xid); |
7ffec372 | 398 | cifs_put_tlink(tlink); |
1da177e4 LT |
399 | return rc; |
400 | } | |
401 | ||
79a58d1f | 402 | ssize_t cifs_listxattr(struct dentry *direntry, char *data, size_t buf_size) |
1da177e4 LT |
403 | { |
404 | ssize_t rc = -EOPNOTSUPP; | |
6d5786a3 | 405 | unsigned int xid; |
5fdccfef | 406 | struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb); |
7ffec372 | 407 | struct tcon_link *tlink; |
96daf2b0 | 408 | struct cifs_tcon *pTcon; |
8e33cf20 | 409 | const char *full_path; |
f6a9bc33 | 410 | void *page; |
1da177e4 | 411 | |
087f757b SF |
412 | if (unlikely(cifs_forced_shutdown(cifs_sb))) |
413 | return -EIO; | |
414 | ||
79a58d1f | 415 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR) |
ea4c07d7 SF |
416 | return -EOPNOTSUPP; |
417 | ||
7ffec372 JL |
418 | tlink = cifs_sb_tlink(cifs_sb); |
419 | if (IS_ERR(tlink)) | |
420 | return PTR_ERR(tlink); | |
421 | pTcon = tlink_tcon(tlink); | |
422 | ||
6d5786a3 | 423 | xid = get_xid(); |
f6a9bc33 | 424 | page = alloc_dentry_path(); |
ea4c07d7 | 425 | |
f6a9bc33 AV |
426 | full_path = build_path_from_dentry(direntry, page); |
427 | if (IS_ERR(full_path)) { | |
428 | rc = PTR_ERR(full_path); | |
7ffec372 | 429 | goto list_ea_exit; |
1da177e4 LT |
430 | } |
431 | /* return dos attributes as pseudo xattr */ | |
432 | /* return alt name if available as pseudo attr */ | |
433 | ||
434 | /* if proc/fs/cifs/streamstoxattr is set then | |
79a58d1f | 435 | search server for EAs or streams to |
1da177e4 | 436 | returns as xattrs */ |
1da177e4 | 437 | |
666753c3 SF |
438 | if (pTcon->ses->server->ops->query_all_EAs) |
439 | rc = pTcon->ses->server->ops->query_all_EAs(xid, pTcon, | |
67b4c889 | 440 | full_path, NULL, data, buf_size, cifs_sb); |
7ffec372 | 441 | list_ea_exit: |
f6a9bc33 | 442 | free_dentry_path(page); |
6d5786a3 | 443 | free_xid(xid); |
7ffec372 | 444 | cifs_put_tlink(tlink); |
1da177e4 LT |
445 | return rc; |
446 | } | |
a9ae008f AG |
447 | |
448 | static const struct xattr_handler cifs_user_xattr_handler = { | |
449 | .prefix = XATTR_USER_PREFIX, | |
450 | .flags = XATTR_USER, | |
451 | .get = cifs_xattr_get, | |
452 | .set = cifs_xattr_set, | |
453 | }; | |
454 | ||
455 | /* os2.* attributes are treated like user.* attributes */ | |
456 | static const struct xattr_handler cifs_os2_xattr_handler = { | |
457 | .prefix = XATTR_OS2_PREFIX, | |
458 | .flags = XATTR_USER, | |
459 | .get = cifs_xattr_get, | |
460 | .set = cifs_xattr_set, | |
461 | }; | |
462 | ||
463 | static const struct xattr_handler cifs_cifs_acl_xattr_handler = { | |
464 | .name = CIFS_XATTR_CIFS_ACL, | |
465 | .flags = XATTR_CIFS_ACL, | |
466 | .get = cifs_xattr_get, | |
467 | .set = cifs_xattr_set, | |
468 | }; | |
469 | ||
c4f7173a SF |
470 | /* |
471 | * Although this is just an alias for the above, need to move away from | |
472 | * confusing users and using the 20 year old term 'cifs' when it is no | |
473 | * longer secure and was replaced by SMB2/SMB3 a long time ago, and | |
474 | * SMB3 and later are highly secure. | |
475 | */ | |
476 | static const struct xattr_handler smb3_acl_xattr_handler = { | |
477 | .name = SMB3_XATTR_CIFS_ACL, | |
478 | .flags = XATTR_CIFS_ACL, | |
479 | .get = cifs_xattr_get, | |
480 | .set = cifs_xattr_set, | |
481 | }; | |
482 | ||
438471b6 BP |
483 | static const struct xattr_handler cifs_cifs_ntsd_xattr_handler = { |
484 | .name = CIFS_XATTR_CIFS_NTSD, | |
485 | .flags = XATTR_CIFS_NTSD, | |
486 | .get = cifs_xattr_get, | |
487 | .set = cifs_xattr_set, | |
488 | }; | |
489 | ||
490 | /* | |
491 | * Although this is just an alias for the above, need to move away from | |
492 | * confusing users and using the 20 year old term 'cifs' when it is no | |
493 | * longer secure and was replaced by SMB2/SMB3 a long time ago, and | |
494 | * SMB3 and later are highly secure. | |
495 | */ | |
496 | static const struct xattr_handler smb3_ntsd_xattr_handler = { | |
497 | .name = SMB3_XATTR_CIFS_NTSD, | |
498 | .flags = XATTR_CIFS_NTSD, | |
499 | .get = cifs_xattr_get, | |
500 | .set = cifs_xattr_set, | |
501 | }; | |
502 | ||
3970acf7 BP |
503 | static const struct xattr_handler cifs_cifs_ntsd_full_xattr_handler = { |
504 | .name = CIFS_XATTR_CIFS_NTSD_FULL, | |
505 | .flags = XATTR_CIFS_NTSD_FULL, | |
506 | .get = cifs_xattr_get, | |
507 | .set = cifs_xattr_set, | |
508 | }; | |
509 | ||
510 | /* | |
511 | * Although this is just an alias for the above, need to move away from | |
512 | * confusing users and using the 20 year old term 'cifs' when it is no | |
513 | * longer secure and was replaced by SMB2/SMB3 a long time ago, and | |
514 | * SMB3 and later are highly secure. | |
515 | */ | |
516 | static const struct xattr_handler smb3_ntsd_full_xattr_handler = { | |
517 | .name = SMB3_XATTR_CIFS_NTSD_FULL, | |
518 | .flags = XATTR_CIFS_NTSD_FULL, | |
519 | .get = cifs_xattr_get, | |
520 | .set = cifs_xattr_set, | |
521 | }; | |
522 | ||
523 | ||
a9ae008f AG |
524 | static const struct xattr_handler cifs_posix_acl_access_xattr_handler = { |
525 | .name = XATTR_NAME_POSIX_ACL_ACCESS, | |
526 | .flags = XATTR_ACL_ACCESS, | |
527 | .get = cifs_xattr_get, | |
528 | .set = cifs_xattr_set, | |
529 | }; | |
530 | ||
531 | static const struct xattr_handler cifs_posix_acl_default_xattr_handler = { | |
532 | .name = XATTR_NAME_POSIX_ACL_DEFAULT, | |
533 | .flags = XATTR_ACL_DEFAULT, | |
534 | .get = cifs_xattr_get, | |
535 | .set = cifs_xattr_set, | |
536 | }; | |
537 | ||
538 | const struct xattr_handler *cifs_xattr_handlers[] = { | |
539 | &cifs_user_xattr_handler, | |
540 | &cifs_os2_xattr_handler, | |
541 | &cifs_cifs_acl_xattr_handler, | |
c4f7173a | 542 | &smb3_acl_xattr_handler, /* alias for above since avoiding "cifs" */ |
438471b6 BP |
543 | &cifs_cifs_ntsd_xattr_handler, |
544 | &smb3_ntsd_xattr_handler, /* alias for above since avoiding "cifs" */ | |
3970acf7 BP |
545 | &cifs_cifs_ntsd_full_xattr_handler, |
546 | &smb3_ntsd_full_xattr_handler, /* alias for above since avoiding "cifs" */ | |
a9ae008f AG |
547 | &cifs_posix_acl_access_xattr_handler, |
548 | &cifs_posix_acl_default_xattr_handler, | |
549 | NULL | |
550 | }; |