1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2008 Christoph Hellwig.
4 * Portions Copyright (C) 2000-2008 Silicon Graphics, Inc.
8 #include "xfs_shared.h"
9 #include "xfs_format.h"
10 #include "xfs_log_format.h"
11 #include "xfs_da_format.h"
12 #include "xfs_trans_resv.h"
13 #include "xfs_mount.h"
14 #include "xfs_inode.h"
17 #include "xfs_da_btree.h"
19 #include <linux/posix_acl_xattr.h>
23 xfs_xattr_get(const struct xattr_handler
*handler
, struct dentry
*unused
,
24 struct inode
*inode
, const char *name
, void *value
, size_t size
)
26 struct xfs_da_args args
= {
28 .attr_filter
= handler
->flags
,
30 .namelen
= strlen(name
),
36 error
= xfs_attr_get(&args
);
43 xfs_xattr_set(const struct xattr_handler
*handler
,
44 struct user_namespace
*mnt_userns
, struct dentry
*unused
,
45 struct inode
*inode
, const char *name
, const void *value
,
46 size_t size
, int flags
)
48 struct xfs_da_args args
= {
50 .attr_filter
= handler
->flags
,
53 .namelen
= strlen(name
),
54 .value
= (void *)value
,
59 error
= xfs_attr_set(&args
);
60 if (!error
&& (handler
->flags
& XFS_ATTR_ROOT
))
61 xfs_forget_acl(inode
, name
);
65 static const struct xattr_handler xfs_xattr_user_handler
= {
66 .prefix
= XATTR_USER_PREFIX
,
67 .flags
= 0, /* no flags implies user namespace */
72 static const struct xattr_handler xfs_xattr_trusted_handler
= {
73 .prefix
= XATTR_TRUSTED_PREFIX
,
74 .flags
= XFS_ATTR_ROOT
,
79 static const struct xattr_handler xfs_xattr_security_handler
= {
80 .prefix
= XATTR_SECURITY_PREFIX
,
81 .flags
= XFS_ATTR_SECURE
,
86 const struct xattr_handler
*xfs_xattr_handlers
[] = {
87 &xfs_xattr_user_handler
,
88 &xfs_xattr_trusted_handler
,
89 &xfs_xattr_security_handler
,
90 #ifdef CONFIG_XFS_POSIX_ACL
91 &posix_acl_access_xattr_handler
,
92 &posix_acl_default_xattr_handler
,
98 __xfs_xattr_put_listent(
99 struct xfs_attr_list_context
*context
,
108 if (context
->count
< 0 || context
->seen_enough
)
111 if (!context
->buffer
)
114 arraytop
= context
->count
+ prefix_len
+ namelen
+ 1;
115 if (arraytop
> context
->firstu
) {
116 context
->count
= -1; /* insufficient space */
117 context
->seen_enough
= 1;
120 offset
= context
->buffer
+ context
->count
;
121 strncpy(offset
, prefix
, prefix_len
);
122 offset
+= prefix_len
;
123 strncpy(offset
, (char *)name
, namelen
); /* real name */
128 context
->count
+= prefix_len
+ namelen
+ 1;
133 xfs_xattr_put_listent(
134 struct xfs_attr_list_context
*context
,
143 ASSERT(context
->count
>= 0);
145 if (flags
& XFS_ATTR_ROOT
) {
146 #ifdef CONFIG_XFS_POSIX_ACL
147 if (namelen
== SGI_ACL_FILE_SIZE
&&
148 strncmp(name
, SGI_ACL_FILE
,
149 SGI_ACL_FILE_SIZE
) == 0) {
150 __xfs_xattr_put_listent(
151 context
, XATTR_SYSTEM_PREFIX
,
152 XATTR_SYSTEM_PREFIX_LEN
,
153 XATTR_POSIX_ACL_ACCESS
,
154 strlen(XATTR_POSIX_ACL_ACCESS
));
155 } else if (namelen
== SGI_ACL_DEFAULT_SIZE
&&
156 strncmp(name
, SGI_ACL_DEFAULT
,
157 SGI_ACL_DEFAULT_SIZE
) == 0) {
158 __xfs_xattr_put_listent(
159 context
, XATTR_SYSTEM_PREFIX
,
160 XATTR_SYSTEM_PREFIX_LEN
,
161 XATTR_POSIX_ACL_DEFAULT
,
162 strlen(XATTR_POSIX_ACL_DEFAULT
));
167 * Only show root namespace entries if we are actually allowed to
170 if (!capable(CAP_SYS_ADMIN
))
173 prefix
= XATTR_TRUSTED_PREFIX
;
174 prefix_len
= XATTR_TRUSTED_PREFIX_LEN
;
175 } else if (flags
& XFS_ATTR_SECURE
) {
176 prefix
= XATTR_SECURITY_PREFIX
;
177 prefix_len
= XATTR_SECURITY_PREFIX_LEN
;
179 prefix
= XATTR_USER_PREFIX
;
180 prefix_len
= XATTR_USER_PREFIX_LEN
;
183 __xfs_xattr_put_listent(context
, prefix
, prefix_len
, name
,
190 struct dentry
*dentry
,
194 struct xfs_attr_list_context context
;
195 struct inode
*inode
= d_inode(dentry
);
199 * First read the regular on-disk attributes.
201 memset(&context
, 0, sizeof(context
));
202 context
.dp
= XFS_I(inode
);
204 context
.buffer
= size
? data
: NULL
;
205 context
.bufsize
= size
;
206 context
.firstu
= context
.bufsize
;
207 context
.put_listent
= xfs_xattr_put_listent
;
209 error
= xfs_attr_list(&context
);
212 if (context
.count
< 0)
215 return context
.count
;