1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2008 Christoph Hellwig.
4 * Portions Copyright (C) 2000-2008 Silicon Graphics, Inc.
8 #include "xfs_shared.h"
9 #include "xfs_format.h"
10 #include "xfs_log_format.h"
11 #include "xfs_da_format.h"
12 #include "xfs_trans_resv.h"
13 #include "xfs_mount.h"
14 #include "xfs_inode.h"
17 #include "xfs_da_btree.h"
19 #include <linux/posix_acl_xattr.h>
23 xfs_xattr_get(const struct xattr_handler *handler, struct dentry *unused,
24 struct inode *inode, const char *name, void *value, size_t size)
26 struct xfs_da_args args = {
28 .attr_filter = handler->flags,
30 .namelen = strlen(name),
36 error = xfs_attr_get(&args);
43 xfs_xattr_set(const struct xattr_handler *handler,
44 struct user_namespace *mnt_userns, struct dentry *unused,
45 struct inode *inode, const char *name, const void *value,
46 size_t size, int flags)
48 struct xfs_da_args args = {
50 .attr_filter = handler->flags,
53 .namelen = strlen(name),
54 .value = (void *)value,
59 error = xfs_attr_set(&args);
60 if (!error && (handler->flags & XFS_ATTR_ROOT))
61 xfs_forget_acl(inode, name);
65 static const struct xattr_handler xfs_xattr_user_handler = {
66 .prefix = XATTR_USER_PREFIX,
67 .flags = 0, /* no flags implies user namespace */
72 static const struct xattr_handler xfs_xattr_trusted_handler = {
73 .prefix = XATTR_TRUSTED_PREFIX,
74 .flags = XFS_ATTR_ROOT,
79 static const struct xattr_handler xfs_xattr_security_handler = {
80 .prefix = XATTR_SECURITY_PREFIX,
81 .flags = XFS_ATTR_SECURE,
86 const struct xattr_handler *xfs_xattr_handlers[] = {
87 &xfs_xattr_user_handler,
88 &xfs_xattr_trusted_handler,
89 &xfs_xattr_security_handler,
90 #ifdef CONFIG_XFS_POSIX_ACL
91 &posix_acl_access_xattr_handler,
92 &posix_acl_default_xattr_handler,
98 __xfs_xattr_put_listent(
99 struct xfs_attr_list_context *context,
108 if (context->count < 0 || context->seen_enough)
111 if (!context->buffer)
114 arraytop = context->count + prefix_len + namelen + 1;
115 if (arraytop > context->firstu) {
116 context->count = -1; /* insufficient space */
117 context->seen_enough = 1;
120 offset = context->buffer + context->count;
121 strncpy(offset, prefix, prefix_len);
122 offset += prefix_len;
123 strncpy(offset, (char *)name, namelen); /* real name */
128 context->count += prefix_len + namelen + 1;
133 xfs_xattr_put_listent(
134 struct xfs_attr_list_context *context,
143 ASSERT(context->count >= 0);
145 if (flags & XFS_ATTR_ROOT) {
146 #ifdef CONFIG_XFS_POSIX_ACL
147 if (namelen == SGI_ACL_FILE_SIZE &&
148 strncmp(name, SGI_ACL_FILE,
149 SGI_ACL_FILE_SIZE) == 0) {
150 __xfs_xattr_put_listent(
151 context, XATTR_SYSTEM_PREFIX,
152 XATTR_SYSTEM_PREFIX_LEN,
153 XATTR_POSIX_ACL_ACCESS,
154 strlen(XATTR_POSIX_ACL_ACCESS));
155 } else if (namelen == SGI_ACL_DEFAULT_SIZE &&
156 strncmp(name, SGI_ACL_DEFAULT,
157 SGI_ACL_DEFAULT_SIZE) == 0) {
158 __xfs_xattr_put_listent(
159 context, XATTR_SYSTEM_PREFIX,
160 XATTR_SYSTEM_PREFIX_LEN,
161 XATTR_POSIX_ACL_DEFAULT,
162 strlen(XATTR_POSIX_ACL_DEFAULT));
167 * Only show root namespace entries if we are actually allowed to
170 if (!capable(CAP_SYS_ADMIN))
173 prefix = XATTR_TRUSTED_PREFIX;
174 prefix_len = XATTR_TRUSTED_PREFIX_LEN;
175 } else if (flags & XFS_ATTR_SECURE) {
176 prefix = XATTR_SECURITY_PREFIX;
177 prefix_len = XATTR_SECURITY_PREFIX_LEN;
179 prefix = XATTR_USER_PREFIX;
180 prefix_len = XATTR_USER_PREFIX_LEN;
183 __xfs_xattr_put_listent(context, prefix, prefix_len, name,
190 struct dentry *dentry,
194 struct xfs_attr_list_context context;
195 struct inode *inode = d_inode(dentry);
199 * First read the regular on-disk attributes.
201 memset(&context, 0, sizeof(context));
202 context.dp = XFS_I(inode);
204 context.buffer = size ? data : NULL;
205 context.bufsize = size;
206 context.firstu = context.bufsize;
207 context.put_listent = xfs_xattr_put_listent;
209 error = xfs_attr_list(&context);
212 if (context.count < 0)
215 return context.count;