xattr.c 18.4 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13
/*
  File: fs/xattr.c

  Extended attribute handling.

  Copyright (C) 2001 by Andreas Gruenbacher <a.gruenbacher@computer.org>
  Copyright (C) 2001 SGI - Silicon Graphics, Inc <linux-xfs@oss.sgi.com>
  Copyright (c) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
 */
#include <linux/fs.h>
#include <linux/slab.h>
#include <linux/file.h>
#include <linux/xattr.h>
14
#include <linux/mount.h>
L
Linus Torvalds 已提交
15 16
#include <linux/namei.h>
#include <linux/security.h>
M
Mimi Zohar 已提交
17
#include <linux/evm.h>
L
Linus Torvalds 已提交
18
#include <linux/syscalls.h>
19
#include <linux/export.h>
R
Robert Love 已提交
20
#include <linux/fsnotify.h>
21
#include <linux/audit.h>
22
#include <linux/vmalloc.h>
23
#include <linux/posix_acl_xattr.h>
L
Linus Torvalds 已提交
24

25
#include <asm/uaccess.h>
26

27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51
/*
 * Check permissions for extended attribute access.  This is a bit complicated
 * because different namespaces have very different rules.
 */
static int
xattr_permission(struct inode *inode, const char *name, int mask)
{
	/*
	 * We can never set or remove an extended attribute on a read-only
	 * filesystem  or on an immutable / append-only inode.
	 */
	if (mask & MAY_WRITE) {
		if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
			return -EPERM;
	}

	/*
	 * No restriction for security.* and system.* from the VFS.  Decision
	 * on these is left to the underlying filesystem / security module.
	 */
	if (!strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) ||
	    !strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN))
		return 0;

	/*
52
	 * The trusted.* namespace can only be accessed by privileged users.
53
	 */
54 55 56 57 58
	if (!strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN)) {
		if (!capable(CAP_SYS_ADMIN))
			return (mask & MAY_WRITE) ? -EPERM : -ENODATA;
		return 0;
	}
59

60 61
	/*
	 * In the user.* namespace, only regular files and directories can have
62
	 * extended attributes. For sticky directories, only the owner and
63
	 * privileged users can write attributes.
64
	 */
65
	if (!strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) {
66
		if (!S_ISREG(inode->i_mode) && !S_ISDIR(inode->i_mode))
67
			return (mask & MAY_WRITE) ? -EPERM : -ENODATA;
68
		if (S_ISDIR(inode->i_mode) && (inode->i_mode & S_ISVTX) &&
69
		    (mask & MAY_WRITE) && !inode_owner_or_capable(inode))
70 71 72
			return -EPERM;
	}

73
	return inode_permission(inode, mask);
74 75
}

76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93
/**
 *  __vfs_setxattr_noperm - perform setxattr operation without performing
 *  permission checks.
 *
 *  @dentry - object to perform setxattr on
 *  @name - xattr name to set
 *  @value - value to set @name to
 *  @size - size of @value
 *  @flags - flags to pass into filesystem operations
 *
 *  returns the result of the internal setxattr or setsecurity operations.
 *
 *  This function requires the caller to lock the inode's i_mutex before it
 *  is executed. It also assumes that the caller will make the appropriate
 *  permission checks.
 */
int __vfs_setxattr_noperm(struct dentry *dentry, const char *name,
		const void *value, size_t size, int flags)
94 95
{
	struct inode *inode = dentry->d_inode;
96
	int error = -EOPNOTSUPP;
97 98
	int issec = !strncmp(name, XATTR_SECURITY_PREFIX,
				   XATTR_SECURITY_PREFIX_LEN);
99

100 101
	if (issec)
		inode->i_flags &= ~S_NOSEC;
102 103 104 105 106 107 108
	if (inode->i_op->setxattr) {
		error = inode->i_op->setxattr(dentry, name, value, size, flags);
		if (!error) {
			fsnotify_xattr(dentry);
			security_inode_post_setxattr(dentry, name, value,
						     size, flags);
		}
109
	} else if (issec) {
110
		const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
111 112 113 114 115
		error = security_inode_setsecurity(inode, suffix, value,
						   size, flags);
		if (!error)
			fsnotify_xattr(dentry);
	}
116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138

	return error;
}


int
vfs_setxattr(struct dentry *dentry, const char *name, const void *value,
		size_t size, int flags)
{
	struct inode *inode = dentry->d_inode;
	int error;

	error = xattr_permission(inode, name, MAY_WRITE);
	if (error)
		return error;

	mutex_lock(&inode->i_mutex);
	error = security_inode_setxattr(dentry, name, value, size, flags);
	if (error)
		goto out;

	error = __vfs_setxattr_noperm(dentry, name, value, size, flags);

139 140 141 142 143 144
out:
	mutex_unlock(&inode->i_mutex);
	return error;
}
EXPORT_SYMBOL_GPL(vfs_setxattr);

145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171
ssize_t
xattr_getsecurity(struct inode *inode, const char *name, void *value,
			size_t size)
{
	void *buffer = NULL;
	ssize_t len;

	if (!value || !size) {
		len = security_inode_getsecurity(inode, name, &buffer, false);
		goto out_noalloc;
	}

	len = security_inode_getsecurity(inode, name, &buffer, true);
	if (len < 0)
		return len;
	if (size < len) {
		len = -ERANGE;
		goto out;
	}
	memcpy(value, buffer, len);
out:
	security_release_secctx(buffer, len);
out_noalloc:
	return len;
}
EXPORT_SYMBOL_GPL(xattr_getsecurity);

172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229
/*
 * vfs_getxattr_alloc - allocate memory, if necessary, before calling getxattr
 *
 * Allocate memory, if not already allocated, or re-allocate correct size,
 * before retrieving the extended attribute.
 *
 * Returns the result of alloc, if failed, or the getxattr operation.
 */
ssize_t
vfs_getxattr_alloc(struct dentry *dentry, const char *name, char **xattr_value,
		   size_t xattr_size, gfp_t flags)
{
	struct inode *inode = dentry->d_inode;
	char *value = *xattr_value;
	int error;

	error = xattr_permission(inode, name, MAY_READ);
	if (error)
		return error;

	if (!inode->i_op->getxattr)
		return -EOPNOTSUPP;

	error = inode->i_op->getxattr(dentry, name, NULL, 0);
	if (error < 0)
		return error;

	if (!value || (error > xattr_size)) {
		value = krealloc(*xattr_value, error + 1, flags);
		if (!value)
			return -ENOMEM;
		memset(value, 0, error + 1);
	}

	error = inode->i_op->getxattr(dentry, name, value, error);
	*xattr_value = value;
	return error;
}

/* Compare an extended attribute value with the given value */
int vfs_xattr_cmp(struct dentry *dentry, const char *xattr_name,
		  const char *value, size_t size, gfp_t flags)
{
	char *xattr_value = NULL;
	int rc;

	rc = vfs_getxattr_alloc(dentry, xattr_name, &xattr_value, 0, flags);
	if (rc < 0)
		return rc;

	if ((rc != size) || (memcmp(xattr_value, value, rc) != 0))
		rc = -EINVAL;
	else
		rc = 0;
	kfree(xattr_value);
	return rc;
}

230
ssize_t
231
vfs_getxattr(struct dentry *dentry, const char *name, void *value, size_t size)
232 233 234 235
{
	struct inode *inode = dentry->d_inode;
	int error;

236 237 238 239
	error = xattr_permission(inode, name, MAY_READ);
	if (error)
		return error;

240 241 242 243 244
	error = security_inode_getxattr(dentry, name);
	if (error)
		return error;

	if (!strncmp(name, XATTR_SECURITY_PREFIX,
245 246
				XATTR_SECURITY_PREFIX_LEN)) {
		const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
247
		int ret = xattr_getsecurity(inode, suffix, value, size);
248 249 250 251
		/*
		 * Only overwrite the return value if a security module
		 * is actually active.
		 */
252 253 254
		if (ret == -EOPNOTSUPP)
			goto nolsm;
		return ret;
255
	}
256 257 258 259 260
nolsm:
	if (inode->i_op->getxattr)
		error = inode->i_op->getxattr(dentry, name, value, size);
	else
		error = -EOPNOTSUPP;
261 262 263 264 265

	return error;
}
EXPORT_SYMBOL_GPL(vfs_getxattr);

B
Bill Nottingham 已提交
266 267 268 269 270 271 272 273 274
ssize_t
vfs_listxattr(struct dentry *d, char *list, size_t size)
{
	ssize_t error;

	error = security_inode_listxattr(d);
	if (error)
		return error;
	error = -EOPNOTSUPP;
A
Al Viro 已提交
275
	if (d->d_inode->i_op->listxattr) {
B
Bill Nottingham 已提交
276 277 278 279 280 281 282 283 284 285
		error = d->d_inode->i_op->listxattr(d, list, size);
	} else {
		error = security_inode_listsecurity(d->d_inode, list, size);
		if (size && error > size)
			error = -ERANGE;
	}
	return error;
}
EXPORT_SYMBOL_GPL(vfs_listxattr);

286
int
287
vfs_removexattr(struct dentry *dentry, const char *name)
288 289 290 291 292 293 294
{
	struct inode *inode = dentry->d_inode;
	int error;

	if (!inode->i_op->removexattr)
		return -EOPNOTSUPP;

295 296 297 298
	error = xattr_permission(inode, name, MAY_WRITE);
	if (error)
		return error;

299 300 301 302 303 304 305 306
	error = security_inode_removexattr(dentry, name);
	if (error)
		return error;

	mutex_lock(&inode->i_mutex);
	error = inode->i_op->removexattr(dentry, name);
	mutex_unlock(&inode->i_mutex);

M
Mimi Zohar 已提交
307
	if (!error) {
308
		fsnotify_xattr(dentry);
M
Mimi Zohar 已提交
309 310
		evm_inode_post_removexattr(dentry, name);
	}
311 312 313 314 315
	return error;
}
EXPORT_SYMBOL_GPL(vfs_removexattr);


L
Linus Torvalds 已提交
316 317 318 319
/*
 * Extended attribute SET operations
 */
static long
320
setxattr(struct dentry *d, const char __user *name, const void __user *value,
L
Linus Torvalds 已提交
321 322 323 324
	 size_t size, int flags)
{
	int error;
	void *kvalue = NULL;
325
	void *vvalue = NULL;	/* If non-NULL, we used vmalloc() */
L
Linus Torvalds 已提交
326 327 328 329 330 331 332 333 334 335 336 337 338 339
	char kname[XATTR_NAME_MAX + 1];

	if (flags & ~(XATTR_CREATE|XATTR_REPLACE))
		return -EINVAL;

	error = strncpy_from_user(kname, name, sizeof(kname));
	if (error == 0 || error == sizeof(kname))
		error = -ERANGE;
	if (error < 0)
		return error;

	if (size) {
		if (size > XATTR_SIZE_MAX)
			return -E2BIG;
340 341 342 343 344 345 346 347 348 349 350
		kvalue = kmalloc(size, GFP_KERNEL | __GFP_NOWARN);
		if (!kvalue) {
			vvalue = vmalloc(size);
			if (!vvalue)
				return -ENOMEM;
			kvalue = vvalue;
		}
		if (copy_from_user(kvalue, value, size)) {
			error = -EFAULT;
			goto out;
		}
351 352 353
		if ((strcmp(kname, XATTR_NAME_POSIX_ACL_ACCESS) == 0) ||
		    (strcmp(kname, XATTR_NAME_POSIX_ACL_DEFAULT) == 0))
			posix_acl_fix_xattr_from_user(kvalue, size);
L
Linus Torvalds 已提交
354 355
	}

356
	error = vfs_setxattr(d, kname, kvalue, size, flags);
357 358 359 360 361
out:
	if (vvalue)
		vfree(vvalue);
	else
		kfree(kvalue);
L
Linus Torvalds 已提交
362 363 364
	return error;
}

365 366 367
SYSCALL_DEFINE5(setxattr, const char __user *, pathname,
		const char __user *, name, const void __user *, value,
		size_t, size, int, flags)
L
Linus Torvalds 已提交
368
{
369
	struct path path;
L
Linus Torvalds 已提交
370 371
	int error;

372
	error = user_path(pathname, &path);
L
Linus Torvalds 已提交
373 374
	if (error)
		return error;
375
	error = mnt_want_write(path.mnt);
376
	if (!error) {
377 378
		error = setxattr(path.dentry, name, value, size, flags);
		mnt_drop_write(path.mnt);
379
	}
380
	path_put(&path);
L
Linus Torvalds 已提交
381 382 383
	return error;
}

384 385 386
SYSCALL_DEFINE5(lsetxattr, const char __user *, pathname,
		const char __user *, name, const void __user *, value,
		size_t, size, int, flags)
L
Linus Torvalds 已提交
387
{
388
	struct path path;
L
Linus Torvalds 已提交
389 390
	int error;

391
	error = user_lpath(pathname, &path);
L
Linus Torvalds 已提交
392 393
	if (error)
		return error;
394
	error = mnt_want_write(path.mnt);
395
	if (!error) {
396 397
		error = setxattr(path.dentry, name, value, size, flags);
		mnt_drop_write(path.mnt);
398
	}
399
	path_put(&path);
L
Linus Torvalds 已提交
400 401 402
	return error;
}

403 404
SYSCALL_DEFINE5(fsetxattr, int, fd, const char __user *, name,
		const void __user *,value, size_t, size, int, flags)
L
Linus Torvalds 已提交
405
{
406
	int fput_needed;
L
Linus Torvalds 已提交
407
	struct file *f;
408
	struct dentry *dentry;
L
Linus Torvalds 已提交
409 410
	int error = -EBADF;

411
	f = fget_light(fd, &fput_needed);
L
Linus Torvalds 已提交
412 413
	if (!f)
		return error;
414
	dentry = f->f_path.dentry;
415
	audit_inode(NULL, dentry);
N
npiggin@suse.de 已提交
416
	error = mnt_want_write_file(f);
417 418
	if (!error) {
		error = setxattr(dentry, name, value, size, flags);
A
Al Viro 已提交
419
		mnt_drop_write_file(f);
420
	}
421
	fput_light(f, fput_needed);
L
Linus Torvalds 已提交
422 423 424 425 426 427 428
	return error;
}

/*
 * Extended attribute GET operations
 */
static ssize_t
429 430
getxattr(struct dentry *d, const char __user *name, void __user *value,
	 size_t size)
L
Linus Torvalds 已提交
431 432 433
{
	ssize_t error;
	void *kvalue = NULL;
434
	void *vvalue = NULL;
L
Linus Torvalds 已提交
435 436 437 438 439 440 441 442 443 444 445
	char kname[XATTR_NAME_MAX + 1];

	error = strncpy_from_user(kname, name, sizeof(kname));
	if (error == 0 || error == sizeof(kname))
		error = -ERANGE;
	if (error < 0)
		return error;

	if (size) {
		if (size > XATTR_SIZE_MAX)
			size = XATTR_SIZE_MAX;
446 447 448 449 450 451 452
		kvalue = kzalloc(size, GFP_KERNEL | __GFP_NOWARN);
		if (!kvalue) {
			vvalue = vmalloc(size);
			if (!vvalue)
				return -ENOMEM;
			kvalue = vvalue;
		}
L
Linus Torvalds 已提交
453 454
	}

455
	error = vfs_getxattr(d, kname, kvalue, size);
456
	if (error > 0) {
457 458 459
		if ((strcmp(kname, XATTR_NAME_POSIX_ACL_ACCESS) == 0) ||
		    (strcmp(kname, XATTR_NAME_POSIX_ACL_DEFAULT) == 0))
			posix_acl_fix_xattr_to_user(kvalue, size);
460 461 462 463 464 465
		if (size && copy_to_user(value, kvalue, error))
			error = -EFAULT;
	} else if (error == -ERANGE && size >= XATTR_SIZE_MAX) {
		/* The file system tried to returned a value bigger
		   than XATTR_SIZE_MAX bytes. Not possible. */
		error = -E2BIG;
L
Linus Torvalds 已提交
466
	}
467 468 469 470
	if (vvalue)
		vfree(vvalue);
	else
		kfree(kvalue);
L
Linus Torvalds 已提交
471 472 473
	return error;
}

474 475
SYSCALL_DEFINE4(getxattr, const char __user *, pathname,
		const char __user *, name, void __user *, value, size_t, size)
L
Linus Torvalds 已提交
476
{
477
	struct path path;
L
Linus Torvalds 已提交
478 479
	ssize_t error;

480
	error = user_path(pathname, &path);
L
Linus Torvalds 已提交
481 482
	if (error)
		return error;
483 484
	error = getxattr(path.dentry, name, value, size);
	path_put(&path);
L
Linus Torvalds 已提交
485 486 487
	return error;
}

488 489
SYSCALL_DEFINE4(lgetxattr, const char __user *, pathname,
		const char __user *, name, void __user *, value, size_t, size)
L
Linus Torvalds 已提交
490
{
491
	struct path path;
L
Linus Torvalds 已提交
492 493
	ssize_t error;

494
	error = user_lpath(pathname, &path);
L
Linus Torvalds 已提交
495 496
	if (error)
		return error;
497 498
	error = getxattr(path.dentry, name, value, size);
	path_put(&path);
L
Linus Torvalds 已提交
499 500 501
	return error;
}

502 503
SYSCALL_DEFINE4(fgetxattr, int, fd, const char __user *, name,
		void __user *, value, size_t, size)
L
Linus Torvalds 已提交
504
{
505
	int fput_needed;
L
Linus Torvalds 已提交
506 507 508
	struct file *f;
	ssize_t error = -EBADF;

509
	f = fget_light(fd, &fput_needed);
L
Linus Torvalds 已提交
510 511
	if (!f)
		return error;
512
	audit_inode(NULL, f->f_path.dentry);
513
	error = getxattr(f->f_path.dentry, name, value, size);
514
	fput_light(f, fput_needed);
L
Linus Torvalds 已提交
515 516 517 518 519 520 521 522 523 524 525
	return error;
}

/*
 * Extended attribute LIST operations
 */
static ssize_t
listxattr(struct dentry *d, char __user *list, size_t size)
{
	ssize_t error;
	char *klist = NULL;
526
	char *vlist = NULL;	/* If non-NULL, we used vmalloc() */
L
Linus Torvalds 已提交
527 528 529 530

	if (size) {
		if (size > XATTR_LIST_MAX)
			size = XATTR_LIST_MAX;
531
		klist = kmalloc(size, __GFP_NOWARN | GFP_KERNEL);
532 533 534 535 536 537
		if (!klist) {
			vlist = vmalloc(size);
			if (!vlist)
				return -ENOMEM;
			klist = vlist;
		}
L
Linus Torvalds 已提交
538 539
	}

B
Bill Nottingham 已提交
540
	error = vfs_listxattr(d, klist, size);
541 542 543 544 545 546 547
	if (error > 0) {
		if (size && copy_to_user(list, klist, error))
			error = -EFAULT;
	} else if (error == -ERANGE && size >= XATTR_LIST_MAX) {
		/* The file system tried to returned a list bigger
		   than XATTR_LIST_MAX bytes. Not possible. */
		error = -E2BIG;
L
Linus Torvalds 已提交
548
	}
549 550 551 552
	if (vlist)
		vfree(vlist);
	else
		kfree(klist);
L
Linus Torvalds 已提交
553 554 555
	return error;
}

556 557
SYSCALL_DEFINE3(listxattr, const char __user *, pathname, char __user *, list,
		size_t, size)
L
Linus Torvalds 已提交
558
{
559
	struct path path;
L
Linus Torvalds 已提交
560 561
	ssize_t error;

562
	error = user_path(pathname, &path);
L
Linus Torvalds 已提交
563 564
	if (error)
		return error;
565 566
	error = listxattr(path.dentry, list, size);
	path_put(&path);
L
Linus Torvalds 已提交
567 568 569
	return error;
}

570 571
SYSCALL_DEFINE3(llistxattr, const char __user *, pathname, char __user *, list,
		size_t, size)
L
Linus Torvalds 已提交
572
{
573
	struct path path;
L
Linus Torvalds 已提交
574 575
	ssize_t error;

576
	error = user_lpath(pathname, &path);
L
Linus Torvalds 已提交
577 578
	if (error)
		return error;
579 580
	error = listxattr(path.dentry, list, size);
	path_put(&path);
L
Linus Torvalds 已提交
581 582 583
	return error;
}

584
SYSCALL_DEFINE3(flistxattr, int, fd, char __user *, list, size_t, size)
L
Linus Torvalds 已提交
585
{
586
	int fput_needed;
L
Linus Torvalds 已提交
587 588 589
	struct file *f;
	ssize_t error = -EBADF;

590
	f = fget_light(fd, &fput_needed);
L
Linus Torvalds 已提交
591 592
	if (!f)
		return error;
593
	audit_inode(NULL, f->f_path.dentry);
594
	error = listxattr(f->f_path.dentry, list, size);
595
	fput_light(f, fput_needed);
L
Linus Torvalds 已提交
596 597 598 599 600 601 602
	return error;
}

/*
 * Extended attribute REMOVE operations
 */
static long
603
removexattr(struct dentry *d, const char __user *name)
L
Linus Torvalds 已提交
604 605 606 607 608 609 610 611 612 613
{
	int error;
	char kname[XATTR_NAME_MAX + 1];

	error = strncpy_from_user(kname, name, sizeof(kname));
	if (error == 0 || error == sizeof(kname))
		error = -ERANGE;
	if (error < 0)
		return error;

614
	return vfs_removexattr(d, kname);
L
Linus Torvalds 已提交
615 616
}

617 618
SYSCALL_DEFINE2(removexattr, const char __user *, pathname,
		const char __user *, name)
L
Linus Torvalds 已提交
619
{
620
	struct path path;
L
Linus Torvalds 已提交
621 622
	int error;

623
	error = user_path(pathname, &path);
L
Linus Torvalds 已提交
624 625
	if (error)
		return error;
626
	error = mnt_want_write(path.mnt);
627
	if (!error) {
628 629
		error = removexattr(path.dentry, name);
		mnt_drop_write(path.mnt);
630
	}
631
	path_put(&path);
L
Linus Torvalds 已提交
632 633 634
	return error;
}

635 636
SYSCALL_DEFINE2(lremovexattr, const char __user *, pathname,
		const char __user *, name)
L
Linus Torvalds 已提交
637
{
638
	struct path path;
L
Linus Torvalds 已提交
639 640
	int error;

641
	error = user_lpath(pathname, &path);
L
Linus Torvalds 已提交
642 643
	if (error)
		return error;
644
	error = mnt_want_write(path.mnt);
645
	if (!error) {
646 647
		error = removexattr(path.dentry, name);
		mnt_drop_write(path.mnt);
648
	}
649
	path_put(&path);
L
Linus Torvalds 已提交
650 651 652
	return error;
}

653
SYSCALL_DEFINE2(fremovexattr, int, fd, const char __user *, name)
L
Linus Torvalds 已提交
654
{
655
	int fput_needed;
L
Linus Torvalds 已提交
656
	struct file *f;
657
	struct dentry *dentry;
L
Linus Torvalds 已提交
658 659
	int error = -EBADF;

660
	f = fget_light(fd, &fput_needed);
L
Linus Torvalds 已提交
661 662
	if (!f)
		return error;
663
	dentry = f->f_path.dentry;
664
	audit_inode(NULL, dentry);
N
npiggin@suse.de 已提交
665
	error = mnt_want_write_file(f);
666 667
	if (!error) {
		error = removexattr(dentry, name);
A
Al Viro 已提交
668
		mnt_drop_write_file(f);
669
	}
670
	fput_light(f, fput_needed);
L
Linus Torvalds 已提交
671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701
	return error;
}


static const char *
strcmp_prefix(const char *a, const char *a_prefix)
{
	while (*a_prefix && *a == *a_prefix) {
		a++;
		a_prefix++;
	}
	return *a_prefix ? NULL : a;
}

/*
 * In order to implement different sets of xattr operations for each xattr
 * prefix with the generic xattr API, a filesystem should create a
 * null-terminated array of struct xattr_handler (one for each prefix) and
 * hang a pointer to it off of the s_xattr field of the superblock.
 *
 * The generic_fooxattr() functions will use this list to dispatch xattr
 * operations to the correct xattr_handler.
 */
#define for_each_xattr_handler(handlers, handler)		\
		for ((handler) = *(handlers)++;			\
			(handler) != NULL;			\
			(handler) = *(handlers)++)

/*
 * Find the xattr_handler with the matching prefix.
 */
702 703
static const struct xattr_handler *
xattr_resolve_name(const struct xattr_handler **handlers, const char **name)
L
Linus Torvalds 已提交
704
{
705
	const struct xattr_handler *handler;
L
Linus Torvalds 已提交
706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725

	if (!*name)
		return NULL;

	for_each_xattr_handler(handlers, handler) {
		const char *n = strcmp_prefix(*name, handler->prefix);
		if (n) {
			*name = n;
			break;
		}
	}
	return handler;
}

/*
 * Find the handler for the prefix and dispatch its get() operation.
 */
ssize_t
generic_getxattr(struct dentry *dentry, const char *name, void *buffer, size_t size)
{
726
	const struct xattr_handler *handler;
L
Linus Torvalds 已提交
727

728
	handler = xattr_resolve_name(dentry->d_sb->s_xattr, &name);
L
Linus Torvalds 已提交
729 730
	if (!handler)
		return -EOPNOTSUPP;
731
	return handler->get(dentry, name, buffer, size, handler->flags);
L
Linus Torvalds 已提交
732 733 734 735 736 737 738 739 740
}

/*
 * Combine the results of the list() operation from every xattr_handler in the
 * list.
 */
ssize_t
generic_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
{
741
	const struct xattr_handler *handler, **handlers = dentry->d_sb->s_xattr;
L
Linus Torvalds 已提交
742 743 744
	unsigned int size = 0;

	if (!buffer) {
745 746 747 748
		for_each_xattr_handler(handlers, handler) {
			size += handler->list(dentry, NULL, 0, NULL, 0,
					      handler->flags);
		}
L
Linus Torvalds 已提交
749 750 751 752
	} else {
		char *buf = buffer;

		for_each_xattr_handler(handlers, handler) {
753 754
			size = handler->list(dentry, buf, buffer_size,
					     NULL, 0, handler->flags);
L
Linus Torvalds 已提交
755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770
			if (size > buffer_size)
				return -ERANGE;
			buf += size;
			buffer_size -= size;
		}
		size = buf - buffer;
	}
	return size;
}

/*
 * Find the handler for the prefix and dispatch its set() operation.
 */
int
generic_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags)
{
771
	const struct xattr_handler *handler;
L
Linus Torvalds 已提交
772 773 774

	if (size == 0)
		value = "";  /* empty EA, do not remove */
775
	handler = xattr_resolve_name(dentry->d_sb->s_xattr, &name);
L
Linus Torvalds 已提交
776 777
	if (!handler)
		return -EOPNOTSUPP;
J
Jan Kara 已提交
778
	return handler->set(dentry, name, value, size, flags, handler->flags);
L
Linus Torvalds 已提交
779 780 781 782 783 784 785 786 787
}

/*
 * Find the handler for the prefix and dispatch its set() operation to remove
 * any associated extended attribute.
 */
int
generic_removexattr(struct dentry *dentry, const char *name)
{
788
	const struct xattr_handler *handler;
L
Linus Torvalds 已提交
789

790
	handler = xattr_resolve_name(dentry->d_sb->s_xattr, &name);
L
Linus Torvalds 已提交
791 792
	if (!handler)
		return -EOPNOTSUPP;
793 794
	return handler->set(dentry, name, NULL, 0,
			    XATTR_REPLACE, handler->flags);
L
Linus Torvalds 已提交
795 796 797 798 799 800
}

EXPORT_SYMBOL(generic_getxattr);
EXPORT_SYMBOL(generic_listxattr);
EXPORT_SYMBOL(generic_setxattr);
EXPORT_SYMBOL(generic_removexattr);