]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * fs/cifs/xattr.c | |
3 | * | |
79a58d1f | 4 | * Copyright (c) International Business Machines Corp., 2003, 2007 |
1da177e4 LT |
5 | * Author(s): Steve French (sfrench@us.ibm.com) |
6 | * | |
7 | * This library is free software; you can redistribute it and/or modify | |
8 | * it under the terms of the GNU Lesser General Public License as published | |
9 | * by the Free Software Foundation; either version 2.1 of the License, or | |
10 | * (at your option) any later version. | |
11 | * | |
12 | * This library is distributed in the hope that it will be useful, | |
13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See | |
15 | * the GNU Lesser General Public License for more details. | |
16 | * | |
17 | * You should have received a copy of the GNU Lesser General Public License | |
18 | * along with this library; if not, write to the Free Software | |
19 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
20 | */ | |
21 | ||
22 | #include <linux/fs.h> | |
23 | #include <linux/posix_acl_xattr.h> | |
5a0e3ad6 | 24 | #include <linux/slab.h> |
f995e740 | 25 | #include <linux/xattr.h> |
1da177e4 LT |
26 | #include "cifsfs.h" |
27 | #include "cifspdu.h" | |
28 | #include "cifsglob.h" | |
29 | #include "cifsproto.h" | |
30 | #include "cifs_debug.h" | |
2baa2682 SF |
31 | #include "cifs_fs_sb.h" |
32 | #include "cifs_unicode.h" | |
1da177e4 LT |
33 | |
34 | #define MAX_EA_VALUE_SIZE 65535 | |
fbeba8bb | 35 | #define CIFS_XATTR_CIFS_ACL "system.cifs_acl" |
a958fff2 | 36 | #define CIFS_XATTR_ATTRIB "cifs.dosattrib" /* full name: user.cifs.dosattrib */ |
1da177e4 | 37 | |
f995e740 | 38 | /* BB need to add server (Samba e.g) support for security and trusted prefix */ |
1da177e4 | 39 | |
a9ae008f | 40 | enum { XATTR_USER, XATTR_CIFS_ACL, XATTR_ACL_ACCESS, XATTR_ACL_DEFAULT }; |
7ffec372 | 41 | |
a9ae008f | 42 | static int cifs_xattr_set(const struct xattr_handler *handler, |
59301226 AV |
43 | struct dentry *dentry, struct inode *inode, |
44 | const char *name, const void *value, | |
45 | size_t size, int flags) | |
1da177e4 LT |
46 | { |
47 | int rc = -EOPNOTSUPP; | |
6d5786a3 | 48 | unsigned int xid; |
a9ae008f | 49 | struct super_block *sb = dentry->d_sb; |
5fdccfef | 50 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
7ffec372 | 51 | struct tcon_link *tlink; |
96daf2b0 | 52 | struct cifs_tcon *pTcon; |
79a58d1f | 53 | char *full_path; |
1da177e4 | 54 | |
7ffec372 JL |
55 | tlink = cifs_sb_tlink(cifs_sb); |
56 | if (IS_ERR(tlink)) | |
57 | return PTR_ERR(tlink); | |
58 | pTcon = tlink_tcon(tlink); | |
59 | ||
6d5786a3 | 60 | xid = get_xid(); |
1da177e4 | 61 | |
a9ae008f | 62 | full_path = build_path_from_dentry(dentry); |
79a58d1f | 63 | if (full_path == NULL) { |
0f3bc09e | 64 | rc = -ENOMEM; |
a9ae008f | 65 | goto out; |
1da177e4 LT |
66 | } |
67 | /* return dos attributes as pseudo xattr */ | |
68 | /* return alt name if available as pseudo attr */ | |
69 | ||
70 | /* if proc/fs/cifs/streamstoxattr is set then | |
79a58d1f | 71 | search server for EAs or streams to |
1da177e4 | 72 | returns as xattrs */ |
a9ae008f | 73 | if (size > MAX_EA_VALUE_SIZE) { |
f96637be | 74 | cifs_dbg(FYI, "size of EA value too large\n"); |
7ffec372 | 75 | rc = -EOPNOTSUPP; |
a9ae008f | 76 | goto out; |
1da177e4 LT |
77 | } |
78 | ||
a9ae008f AG |
79 | switch (handler->flags) { |
80 | case XATTR_USER: | |
79a58d1f | 81 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR) |
a9ae008f | 82 | goto out; |
ad7a2926 | 83 | |
666753c3 SF |
84 | if (pTcon->ses->server->ops->set_EA) |
85 | rc = pTcon->ses->server->ops->set_EA(xid, pTcon, | |
a9ae008f | 86 | full_path, name, value, (__u16)size, |
2baa2682 | 87 | cifs_sb->local_nls, cifs_remap(cifs_sb)); |
a9ae008f | 88 | break; |
1da177e4 | 89 | |
a9ae008f | 90 | case XATTR_CIFS_ACL: { |
b0f8ef20 SN |
91 | #ifdef CONFIG_CIFS_ACL |
92 | struct cifs_ntsd *pacl; | |
a9ae008f AG |
93 | |
94 | if (!value) | |
95 | goto out; | |
96 | pacl = kmalloc(size, GFP_KERNEL); | |
b73b9a4b | 97 | if (!pacl) { |
b73b9a4b SF |
98 | rc = -ENOMEM; |
99 | } else { | |
a9ae008f AG |
100 | memcpy(pacl, value, size); |
101 | if (value && | |
102 | pTcon->ses->server->ops->set_acl) | |
83e3bc23 | 103 | rc = pTcon->ses->server->ops->set_acl(pacl, |
59301226 | 104 | size, inode, |
83e3bc23 SF |
105 | full_path, CIFS_ACL_DACL); |
106 | else | |
107 | rc = -EOPNOTSUPP; | |
b73b9a4b | 108 | if (rc == 0) /* force revalidate of the inode */ |
59301226 | 109 | CIFS_I(inode)->time = 0; |
b73b9a4b | 110 | kfree(pacl); |
b0f8ef20 | 111 | } |
b73b9a4b | 112 | #endif /* CONFIG_CIFS_ACL */ |
a9ae008f AG |
113 | break; |
114 | } | |
115 | ||
116 | case XATTR_ACL_ACCESS: | |
1da177e4 | 117 | #ifdef CONFIG_CIFS_POSIX |
a9ae008f AG |
118 | if (!value) |
119 | goto out; | |
120 | if (sb->s_flags & MS_POSIXACL) | |
121 | rc = CIFSSMBSetPosixACL(xid, pTcon, full_path, | |
122 | value, (const int)size, | |
123 | ACL_TYPE_ACCESS, cifs_sb->local_nls, | |
124 | cifs_remap(cifs_sb)); | |
125 | #endif /* CONFIG_CIFS_POSIX */ | |
126 | break; | |
127 | ||
128 | case XATTR_ACL_DEFAULT: | |
1da177e4 | 129 | #ifdef CONFIG_CIFS_POSIX |
a9ae008f AG |
130 | if (!value) |
131 | goto out; | |
132 | if (sb->s_flags & MS_POSIXACL) | |
133 | rc = CIFSSMBSetPosixACL(xid, pTcon, full_path, | |
134 | value, (const int)size, | |
135 | ACL_TYPE_DEFAULT, cifs_sb->local_nls, | |
136 | cifs_remap(cifs_sb)); | |
137 | #endif /* CONFIG_CIFS_POSIX */ | |
138 | break; | |
1da177e4 LT |
139 | } |
140 | ||
a9ae008f | 141 | out: |
f99d49ad | 142 | kfree(full_path); |
6d5786a3 | 143 | free_xid(xid); |
7ffec372 | 144 | cifs_put_tlink(tlink); |
1da177e4 LT |
145 | return rc; |
146 | } | |
147 | ||
a958fff2 SF |
148 | static int cifs_attrib_get(struct dentry *dentry, |
149 | struct inode *inode, void *value, | |
150 | size_t size) | |
151 | { | |
152 | ssize_t rc; | |
153 | __u32 *pattribute; | |
154 | ||
155 | rc = cifs_revalidate_dentry_attr(dentry); | |
156 | ||
157 | if (rc) | |
158 | return rc; | |
159 | ||
160 | if ((value == NULL) || (size == 0)) | |
161 | return sizeof(__u32); | |
162 | else if (size < sizeof(__u32)) | |
163 | return -ERANGE; | |
164 | ||
165 | /* return dos attributes as pseudo xattr */ | |
166 | pattribute = (__u32 *)value; | |
167 | *pattribute = CIFS_I(inode)->cifsAttrs; | |
168 | ||
169 | return sizeof(__u32); | |
170 | } | |
171 | ||
172 | ||
a9ae008f AG |
173 | static int cifs_xattr_get(const struct xattr_handler *handler, |
174 | struct dentry *dentry, struct inode *inode, | |
175 | const char *name, void *value, size_t size) | |
1da177e4 LT |
176 | { |
177 | ssize_t rc = -EOPNOTSUPP; | |
6d5786a3 | 178 | unsigned int xid; |
a9ae008f | 179 | struct super_block *sb = dentry->d_sb; |
5fdccfef | 180 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
7ffec372 | 181 | struct tcon_link *tlink; |
96daf2b0 | 182 | struct cifs_tcon *pTcon; |
79a58d1f | 183 | char *full_path; |
1da177e4 | 184 | |
7ffec372 JL |
185 | tlink = cifs_sb_tlink(cifs_sb); |
186 | if (IS_ERR(tlink)) | |
187 | return PTR_ERR(tlink); | |
188 | pTcon = tlink_tcon(tlink); | |
189 | ||
6d5786a3 | 190 | xid = get_xid(); |
1da177e4 | 191 | |
a9ae008f | 192 | full_path = build_path_from_dentry(dentry); |
79a58d1f | 193 | if (full_path == NULL) { |
0f3bc09e | 194 | rc = -ENOMEM; |
a9ae008f | 195 | goto out; |
1da177e4 | 196 | } |
a958fff2 | 197 | |
1da177e4 | 198 | /* return alt name if available as pseudo attr */ |
a9ae008f AG |
199 | switch (handler->flags) { |
200 | case XATTR_USER: | |
a958fff2 SF |
201 | cifs_dbg(FYI, "%s:querying user xattr %s\n", __func__, name); |
202 | if (strcmp(name, CIFS_XATTR_ATTRIB) == 0) { | |
203 | rc = cifs_attrib_get(dentry, inode, value, size); | |
204 | break; | |
205 | } | |
206 | ||
79a58d1f | 207 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR) |
a9ae008f | 208 | goto out; |
1da177e4 | 209 | |
666753c3 SF |
210 | if (pTcon->ses->server->ops->query_all_EAs) |
211 | rc = pTcon->ses->server->ops->query_all_EAs(xid, pTcon, | |
a9ae008f | 212 | full_path, name, value, size, |
2baa2682 | 213 | cifs_sb->local_nls, cifs_remap(cifs_sb)); |
a9ae008f | 214 | break; |
1da177e4 | 215 | |
a9ae008f AG |
216 | case XATTR_CIFS_ACL: { |
217 | #ifdef CONFIG_CIFS_ACL | |
218 | u32 acllen; | |
219 | struct cifs_ntsd *pacl; | |
220 | ||
221 | if (pTcon->ses->server->ops->get_acl == NULL) | |
222 | goto out; /* rc already EOPNOTSUPP */ | |
223 | ||
224 | pacl = pTcon->ses->server->ops->get_acl(cifs_sb, | |
225 | inode, full_path, &acllen); | |
226 | if (IS_ERR(pacl)) { | |
227 | rc = PTR_ERR(pacl); | |
228 | cifs_dbg(VFS, "%s: error %zd getting sec desc\n", | |
229 | __func__, rc); | |
230 | } else { | |
231 | if (value) { | |
232 | if (acllen > size) | |
233 | acllen = -ERANGE; | |
234 | else | |
235 | memcpy(value, pacl, acllen); | |
236 | } | |
237 | rc = acllen; | |
238 | kfree(pacl); | |
239 | } | |
240 | #endif /* CONFIG_CIFS_ACL */ | |
241 | break; | |
242 | } | |
243 | ||
244 | case XATTR_ACL_ACCESS: | |
1da177e4 | 245 | #ifdef CONFIG_CIFS_POSIX |
79a58d1f | 246 | if (sb->s_flags & MS_POSIXACL) |
1da0c78b | 247 | rc = CIFSSMBGetPosixACL(xid, pTcon, full_path, |
a9ae008f | 248 | value, size, ACL_TYPE_ACCESS, |
737b758c | 249 | cifs_sb->local_nls, |
2baa2682 | 250 | cifs_remap(cifs_sb)); |
a9ae008f AG |
251 | #endif /* CONFIG_CIFS_POSIX */ |
252 | break; | |
253 | ||
254 | case XATTR_ACL_DEFAULT: | |
1da177e4 | 255 | #ifdef CONFIG_CIFS_POSIX |
79a58d1f | 256 | if (sb->s_flags & MS_POSIXACL) |
1da0c78b | 257 | rc = CIFSSMBGetPosixACL(xid, pTcon, full_path, |
a9ae008f | 258 | value, size, ACL_TYPE_DEFAULT, |
737b758c | 259 | cifs_sb->local_nls, |
2baa2682 | 260 | cifs_remap(cifs_sb)); |
a9ae008f AG |
261 | #endif /* CONFIG_CIFS_POSIX */ |
262 | break; | |
263 | } | |
1da177e4 | 264 | |
79a58d1f | 265 | /* We could add an additional check for streams ie |
1da177e4 | 266 | if proc/fs/cifs/streamstoxattr is set then |
79a58d1f | 267 | search server for EAs or streams to |
1da177e4 LT |
268 | returns as xattrs */ |
269 | ||
79a58d1f SF |
270 | if (rc == -EINVAL) |
271 | rc = -EOPNOTSUPP; | |
1da177e4 | 272 | |
a9ae008f | 273 | out: |
f99d49ad | 274 | kfree(full_path); |
6d5786a3 | 275 | free_xid(xid); |
7ffec372 | 276 | cifs_put_tlink(tlink); |
1da177e4 LT |
277 | return rc; |
278 | } | |
279 | ||
79a58d1f | 280 | ssize_t cifs_listxattr(struct dentry *direntry, char *data, size_t buf_size) |
1da177e4 LT |
281 | { |
282 | ssize_t rc = -EOPNOTSUPP; | |
6d5786a3 | 283 | unsigned int xid; |
5fdccfef | 284 | struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb); |
7ffec372 | 285 | struct tcon_link *tlink; |
96daf2b0 | 286 | struct cifs_tcon *pTcon; |
79a58d1f | 287 | char *full_path; |
1da177e4 | 288 | |
79a58d1f | 289 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR) |
ea4c07d7 SF |
290 | return -EOPNOTSUPP; |
291 | ||
7ffec372 JL |
292 | tlink = cifs_sb_tlink(cifs_sb); |
293 | if (IS_ERR(tlink)) | |
294 | return PTR_ERR(tlink); | |
295 | pTcon = tlink_tcon(tlink); | |
296 | ||
6d5786a3 | 297 | xid = get_xid(); |
ea4c07d7 | 298 | |
1da177e4 | 299 | full_path = build_path_from_dentry(direntry); |
79a58d1f | 300 | if (full_path == NULL) { |
0f3bc09e | 301 | rc = -ENOMEM; |
7ffec372 | 302 | goto list_ea_exit; |
1da177e4 LT |
303 | } |
304 | /* return dos attributes as pseudo xattr */ | |
305 | /* return alt name if available as pseudo attr */ | |
306 | ||
307 | /* if proc/fs/cifs/streamstoxattr is set then | |
79a58d1f | 308 | search server for EAs or streams to |
1da177e4 | 309 | returns as xattrs */ |
1da177e4 | 310 | |
666753c3 SF |
311 | if (pTcon->ses->server->ops->query_all_EAs) |
312 | rc = pTcon->ses->server->ops->query_all_EAs(xid, pTcon, | |
313 | full_path, NULL, data, buf_size, | |
2baa2682 | 314 | cifs_sb->local_nls, cifs_remap(cifs_sb)); |
7ffec372 | 315 | list_ea_exit: |
f99d49ad | 316 | kfree(full_path); |
6d5786a3 | 317 | free_xid(xid); |
7ffec372 | 318 | cifs_put_tlink(tlink); |
1da177e4 LT |
319 | return rc; |
320 | } | |
a9ae008f AG |
321 | |
322 | static const struct xattr_handler cifs_user_xattr_handler = { | |
323 | .prefix = XATTR_USER_PREFIX, | |
324 | .flags = XATTR_USER, | |
325 | .get = cifs_xattr_get, | |
326 | .set = cifs_xattr_set, | |
327 | }; | |
328 | ||
329 | /* os2.* attributes are treated like user.* attributes */ | |
330 | static const struct xattr_handler cifs_os2_xattr_handler = { | |
331 | .prefix = XATTR_OS2_PREFIX, | |
332 | .flags = XATTR_USER, | |
333 | .get = cifs_xattr_get, | |
334 | .set = cifs_xattr_set, | |
335 | }; | |
336 | ||
337 | static const struct xattr_handler cifs_cifs_acl_xattr_handler = { | |
338 | .name = CIFS_XATTR_CIFS_ACL, | |
339 | .flags = XATTR_CIFS_ACL, | |
340 | .get = cifs_xattr_get, | |
341 | .set = cifs_xattr_set, | |
342 | }; | |
343 | ||
344 | static const struct xattr_handler cifs_posix_acl_access_xattr_handler = { | |
345 | .name = XATTR_NAME_POSIX_ACL_ACCESS, | |
346 | .flags = XATTR_ACL_ACCESS, | |
347 | .get = cifs_xattr_get, | |
348 | .set = cifs_xattr_set, | |
349 | }; | |
350 | ||
351 | static const struct xattr_handler cifs_posix_acl_default_xattr_handler = { | |
352 | .name = XATTR_NAME_POSIX_ACL_DEFAULT, | |
353 | .flags = XATTR_ACL_DEFAULT, | |
354 | .get = cifs_xattr_get, | |
355 | .set = cifs_xattr_set, | |
356 | }; | |
357 | ||
358 | const struct xattr_handler *cifs_xattr_handlers[] = { | |
359 | &cifs_user_xattr_handler, | |
360 | &cifs_os2_xattr_handler, | |
361 | &cifs_cifs_acl_xattr_handler, | |
362 | &cifs_posix_acl_access_xattr_handler, | |
363 | &cifs_posix_acl_default_xattr_handler, | |
364 | NULL | |
365 | }; |