| Lachlan McIlroy | f9e09f0 | 2008-06-23 13:34:09 +1000 | [diff] [blame] | 1 | /* | 
|  | 2 | * Copyright (C) 2008 Christoph Hellwig. | 
|  | 3 | * Portions Copyright (C) 2000-2008 Silicon Graphics, Inc. | 
|  | 4 | * | 
|  | 5 | * This program is free software; you can redistribute it and/or | 
|  | 6 | * modify it under the terms of the GNU General Public License as | 
|  | 7 | * published by the Free Software Foundation. | 
|  | 8 | * | 
|  | 9 | * This program is distributed in the hope that it would be useful, | 
|  | 10 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | 11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
|  | 12 | * GNU General Public License for more details. | 
|  | 13 | * | 
|  | 14 | * You should have received a copy of the GNU General Public License | 
|  | 15 | * along with this program; if not, write the Free Software Foundation, | 
|  | 16 | * Inc.,  51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA | 
|  | 17 | */ | 
|  | 18 |  | 
|  | 19 | #include "xfs.h" | 
|  | 20 | #include "xfs_da_btree.h" | 
|  | 21 | #include "xfs_bmap_btree.h" | 
|  | 22 | #include "xfs_inode.h" | 
|  | 23 | #include "xfs_attr.h" | 
|  | 24 | #include "xfs_attr_leaf.h" | 
|  | 25 | #include "xfs_acl.h" | 
|  | 26 | #include "xfs_vnodeops.h" | 
|  | 27 |  | 
|  | 28 | #include <linux/posix_acl_xattr.h> | 
|  | 29 | #include <linux/xattr.h> | 
|  | 30 |  | 
|  | 31 |  | 
|  | 32 | /* | 
|  | 33 | * ACL handling.  Should eventually be moved into xfs_acl.c | 
|  | 34 | */ | 
|  | 35 |  | 
|  | 36 | static int | 
|  | 37 | xfs_decode_acl(const char *name) | 
|  | 38 | { | 
|  | 39 | if (strcmp(name, "posix_acl_access") == 0) | 
|  | 40 | return _ACL_TYPE_ACCESS; | 
|  | 41 | else if (strcmp(name, "posix_acl_default") == 0) | 
|  | 42 | return _ACL_TYPE_DEFAULT; | 
|  | 43 | return -EINVAL; | 
|  | 44 | } | 
|  | 45 |  | 
|  | 46 | /* | 
|  | 47 | * Get system extended attributes which at the moment only | 
|  | 48 | * includes Posix ACLs. | 
|  | 49 | */ | 
|  | 50 | static int | 
|  | 51 | xfs_xattr_system_get(struct inode *inode, const char *name, | 
|  | 52 | void *buffer, size_t size) | 
|  | 53 | { | 
|  | 54 | int acl; | 
|  | 55 |  | 
|  | 56 | acl = xfs_decode_acl(name); | 
|  | 57 | if (acl < 0) | 
|  | 58 | return acl; | 
|  | 59 |  | 
|  | 60 | return xfs_acl_vget(inode, buffer, size, acl); | 
|  | 61 | } | 
|  | 62 |  | 
|  | 63 | static int | 
|  | 64 | xfs_xattr_system_set(struct inode *inode, const char *name, | 
|  | 65 | const void *value, size_t size, int flags) | 
|  | 66 | { | 
| Christoph Hellwig | f13fae2 | 2008-07-21 16:16:15 +1000 | [diff] [blame] | 67 | int acl; | 
| Lachlan McIlroy | f9e09f0 | 2008-06-23 13:34:09 +1000 | [diff] [blame] | 68 |  | 
|  | 69 | acl = xfs_decode_acl(name); | 
|  | 70 | if (acl < 0) | 
|  | 71 | return acl; | 
|  | 72 | if (flags & XATTR_CREATE) | 
|  | 73 | return -EINVAL; | 
|  | 74 |  | 
|  | 75 | if (!value) | 
|  | 76 | return xfs_acl_vremove(inode, acl); | 
|  | 77 |  | 
| Christoph Hellwig | f13fae2 | 2008-07-21 16:16:15 +1000 | [diff] [blame] | 78 | return xfs_acl_vset(inode, (void *)value, size, acl); | 
| Lachlan McIlroy | f9e09f0 | 2008-06-23 13:34:09 +1000 | [diff] [blame] | 79 | } | 
|  | 80 |  | 
|  | 81 | static struct xattr_handler xfs_xattr_system_handler = { | 
|  | 82 | .prefix	= XATTR_SYSTEM_PREFIX, | 
|  | 83 | .get	= xfs_xattr_system_get, | 
|  | 84 | .set	= xfs_xattr_system_set, | 
|  | 85 | }; | 
|  | 86 |  | 
|  | 87 |  | 
|  | 88 | /* | 
|  | 89 | * Real xattr handling.  The only difference between the namespaces is | 
|  | 90 | * a flag passed to the low-level attr code. | 
|  | 91 | */ | 
|  | 92 |  | 
|  | 93 | static int | 
|  | 94 | __xfs_xattr_get(struct inode *inode, const char *name, | 
|  | 95 | void *value, size_t size, int xflags) | 
|  | 96 | { | 
|  | 97 | struct xfs_inode *ip = XFS_I(inode); | 
|  | 98 | int error, asize = size; | 
|  | 99 |  | 
|  | 100 | if (strcmp(name, "") == 0) | 
|  | 101 | return -EINVAL; | 
|  | 102 |  | 
|  | 103 | /* Convert Linux syscall to XFS internal ATTR flags */ | 
|  | 104 | if (!size) { | 
|  | 105 | xflags |= ATTR_KERNOVAL; | 
|  | 106 | value = NULL; | 
|  | 107 | } | 
|  | 108 |  | 
|  | 109 | error = -xfs_attr_get(ip, name, value, &asize, xflags); | 
|  | 110 | if (error) | 
|  | 111 | return error; | 
|  | 112 | return asize; | 
|  | 113 | } | 
|  | 114 |  | 
|  | 115 | static int | 
|  | 116 | __xfs_xattr_set(struct inode *inode, const char *name, const void *value, | 
|  | 117 | size_t size, int flags, int xflags) | 
|  | 118 | { | 
|  | 119 | struct xfs_inode *ip = XFS_I(inode); | 
|  | 120 |  | 
|  | 121 | if (strcmp(name, "") == 0) | 
|  | 122 | return -EINVAL; | 
|  | 123 |  | 
|  | 124 | /* Convert Linux syscall to XFS internal ATTR flags */ | 
|  | 125 | if (flags & XATTR_CREATE) | 
|  | 126 | xflags |= ATTR_CREATE; | 
|  | 127 | if (flags & XATTR_REPLACE) | 
|  | 128 | xflags |= ATTR_REPLACE; | 
|  | 129 |  | 
|  | 130 | if (!value) | 
|  | 131 | return -xfs_attr_remove(ip, name, xflags); | 
|  | 132 | return -xfs_attr_set(ip, name, (void *)value, size, xflags); | 
|  | 133 | } | 
|  | 134 |  | 
|  | 135 | static int | 
|  | 136 | xfs_xattr_user_get(struct inode *inode, const char *name, | 
|  | 137 | void *value, size_t size) | 
|  | 138 | { | 
|  | 139 | return __xfs_xattr_get(inode, name, value, size, 0); | 
|  | 140 | } | 
|  | 141 |  | 
|  | 142 | static int | 
|  | 143 | xfs_xattr_user_set(struct inode *inode, const char *name, | 
|  | 144 | const void *value, size_t size, int flags) | 
|  | 145 | { | 
|  | 146 | return __xfs_xattr_set(inode, name, value, size, flags, 0); | 
|  | 147 | } | 
|  | 148 |  | 
|  | 149 | static struct xattr_handler xfs_xattr_user_handler = { | 
|  | 150 | .prefix	= XATTR_USER_PREFIX, | 
|  | 151 | .get	= xfs_xattr_user_get, | 
|  | 152 | .set	= xfs_xattr_user_set, | 
|  | 153 | }; | 
|  | 154 |  | 
|  | 155 |  | 
|  | 156 | static int | 
|  | 157 | xfs_xattr_trusted_get(struct inode *inode, const char *name, | 
|  | 158 | void *value, size_t size) | 
|  | 159 | { | 
|  | 160 | return __xfs_xattr_get(inode, name, value, size, ATTR_ROOT); | 
|  | 161 | } | 
|  | 162 |  | 
|  | 163 | static int | 
|  | 164 | xfs_xattr_trusted_set(struct inode *inode, const char *name, | 
|  | 165 | const void *value, size_t size, int flags) | 
|  | 166 | { | 
|  | 167 | return __xfs_xattr_set(inode, name, value, size, flags, ATTR_ROOT); | 
|  | 168 | } | 
|  | 169 |  | 
|  | 170 | static struct xattr_handler xfs_xattr_trusted_handler = { | 
|  | 171 | .prefix	= XATTR_TRUSTED_PREFIX, | 
|  | 172 | .get	= xfs_xattr_trusted_get, | 
|  | 173 | .set	= xfs_xattr_trusted_set, | 
|  | 174 | }; | 
|  | 175 |  | 
|  | 176 |  | 
|  | 177 | static int | 
|  | 178 | xfs_xattr_secure_get(struct inode *inode, const char *name, | 
|  | 179 | void *value, size_t size) | 
|  | 180 | { | 
|  | 181 | return __xfs_xattr_get(inode, name, value, size, ATTR_SECURE); | 
|  | 182 | } | 
|  | 183 |  | 
|  | 184 | static int | 
|  | 185 | xfs_xattr_secure_set(struct inode *inode, const char *name, | 
|  | 186 | const void *value, size_t size, int flags) | 
|  | 187 | { | 
|  | 188 | return __xfs_xattr_set(inode, name, value, size, flags, ATTR_SECURE); | 
|  | 189 | } | 
|  | 190 |  | 
|  | 191 | static struct xattr_handler xfs_xattr_security_handler = { | 
|  | 192 | .prefix	= XATTR_SECURITY_PREFIX, | 
|  | 193 | .get	= xfs_xattr_secure_get, | 
|  | 194 | .set	= xfs_xattr_secure_set, | 
|  | 195 | }; | 
|  | 196 |  | 
|  | 197 |  | 
|  | 198 | struct xattr_handler *xfs_xattr_handlers[] = { | 
|  | 199 | &xfs_xattr_user_handler, | 
|  | 200 | &xfs_xattr_trusted_handler, | 
|  | 201 | &xfs_xattr_security_handler, | 
|  | 202 | &xfs_xattr_system_handler, | 
|  | 203 | NULL | 
|  | 204 | }; | 
|  | 205 |  | 
|  | 206 | static unsigned int xfs_xattr_prefix_len(int flags) | 
|  | 207 | { | 
|  | 208 | if (flags & XFS_ATTR_SECURE) | 
|  | 209 | return sizeof("security"); | 
|  | 210 | else if (flags & XFS_ATTR_ROOT) | 
|  | 211 | return sizeof("trusted"); | 
|  | 212 | else | 
|  | 213 | return sizeof("user"); | 
|  | 214 | } | 
|  | 215 |  | 
|  | 216 | static const char *xfs_xattr_prefix(int flags) | 
|  | 217 | { | 
|  | 218 | if (flags & XFS_ATTR_SECURE) | 
|  | 219 | return xfs_xattr_security_handler.prefix; | 
|  | 220 | else if (flags & XFS_ATTR_ROOT) | 
|  | 221 | return xfs_xattr_trusted_handler.prefix; | 
|  | 222 | else | 
|  | 223 | return xfs_xattr_user_handler.prefix; | 
|  | 224 | } | 
|  | 225 |  | 
|  | 226 | static int | 
|  | 227 | xfs_xattr_put_listent(struct xfs_attr_list_context *context, int flags, | 
|  | 228 | char *name, int namelen, int valuelen, char *value) | 
|  | 229 | { | 
|  | 230 | unsigned int prefix_len = xfs_xattr_prefix_len(flags); | 
|  | 231 | char *offset; | 
|  | 232 | int arraytop; | 
|  | 233 |  | 
|  | 234 | ASSERT(context->count >= 0); | 
|  | 235 |  | 
|  | 236 | /* | 
|  | 237 | * Only show root namespace entries if we are actually allowed to | 
|  | 238 | * see them. | 
|  | 239 | */ | 
|  | 240 | if ((flags & XFS_ATTR_ROOT) && !capable(CAP_SYS_ADMIN)) | 
|  | 241 | return 0; | 
|  | 242 |  | 
|  | 243 | arraytop = context->count + prefix_len + namelen + 1; | 
|  | 244 | if (arraytop > context->firstu) { | 
|  | 245 | context->count = -1;	/* insufficient space */ | 
|  | 246 | return 1; | 
|  | 247 | } | 
|  | 248 | offset = (char *)context->alist + context->count; | 
|  | 249 | strncpy(offset, xfs_xattr_prefix(flags), prefix_len); | 
|  | 250 | offset += prefix_len; | 
|  | 251 | strncpy(offset, name, namelen);			/* real name */ | 
|  | 252 | offset += namelen; | 
|  | 253 | *offset = '\0'; | 
|  | 254 | context->count += prefix_len + namelen + 1; | 
|  | 255 | return 0; | 
|  | 256 | } | 
|  | 257 |  | 
|  | 258 | static int | 
|  | 259 | xfs_xattr_put_listent_sizes(struct xfs_attr_list_context *context, int flags, | 
|  | 260 | char *name, int namelen, int valuelen, char *value) | 
|  | 261 | { | 
|  | 262 | context->count += xfs_xattr_prefix_len(flags) + namelen + 1; | 
|  | 263 | return 0; | 
|  | 264 | } | 
|  | 265 |  | 
|  | 266 | static int | 
|  | 267 | list_one_attr(const char *name, const size_t len, void *data, | 
|  | 268 | size_t size, ssize_t *result) | 
|  | 269 | { | 
|  | 270 | char *p = data + *result; | 
|  | 271 |  | 
|  | 272 | *result += len; | 
|  | 273 | if (!size) | 
|  | 274 | return 0; | 
|  | 275 | if (*result > size) | 
|  | 276 | return -ERANGE; | 
|  | 277 |  | 
|  | 278 | strcpy(p, name); | 
|  | 279 | return 0; | 
|  | 280 | } | 
|  | 281 |  | 
|  | 282 | ssize_t | 
|  | 283 | xfs_vn_listxattr(struct dentry *dentry, char *data, size_t size) | 
|  | 284 | { | 
|  | 285 | struct xfs_attr_list_context context; | 
|  | 286 | struct attrlist_cursor_kern cursor = { 0 }; | 
|  | 287 | struct inode		*inode = dentry->d_inode; | 
|  | 288 | int			error; | 
|  | 289 |  | 
|  | 290 | /* | 
|  | 291 | * First read the regular on-disk attributes. | 
|  | 292 | */ | 
|  | 293 | memset(&context, 0, sizeof(context)); | 
|  | 294 | context.dp = XFS_I(inode); | 
|  | 295 | context.cursor = &cursor; | 
|  | 296 | context.resynch = 1; | 
|  | 297 | context.alist = data; | 
|  | 298 | context.bufsize = size; | 
|  | 299 | context.firstu = context.bufsize; | 
|  | 300 |  | 
|  | 301 | if (size) | 
|  | 302 | context.put_listent = xfs_xattr_put_listent; | 
|  | 303 | else | 
|  | 304 | context.put_listent = xfs_xattr_put_listent_sizes; | 
|  | 305 |  | 
|  | 306 | xfs_attr_list_int(&context); | 
|  | 307 | if (context.count < 0) | 
|  | 308 | return -ERANGE; | 
|  | 309 |  | 
|  | 310 | /* | 
|  | 311 | * Then add the two synthetic ACL attributes. | 
|  | 312 | */ | 
|  | 313 | if (xfs_acl_vhasacl_access(inode)) { | 
|  | 314 | error = list_one_attr(POSIX_ACL_XATTR_ACCESS, | 
|  | 315 | strlen(POSIX_ACL_XATTR_ACCESS) + 1, | 
|  | 316 | data, size, &context.count); | 
|  | 317 | if (error) | 
|  | 318 | return error; | 
|  | 319 | } | 
|  | 320 |  | 
|  | 321 | if (xfs_acl_vhasacl_default(inode)) { | 
|  | 322 | error = list_one_attr(POSIX_ACL_XATTR_DEFAULT, | 
|  | 323 | strlen(POSIX_ACL_XATTR_DEFAULT) + 1, | 
|  | 324 | data, size, &context.count); | 
|  | 325 | if (error) | 
|  | 326 | return error; | 
|  | 327 | } | 
|  | 328 |  | 
|  | 329 | return context.count; | 
|  | 330 | } |