xattr.c 17.7 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13
/*
  File: fs/xattr.c

  Extended attribute handling.

  Copyright (C) 2001 by Andreas Gruenbacher <a.gruenbacher@computer.org>
  Copyright (C) 2001 SGI - Silicon Graphics, Inc <linux-xfs@oss.sgi.com>
  Copyright (c) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
 */
#include <linux/fs.h>
#include <linux/slab.h>
#include <linux/file.h>
#include <linux/xattr.h>
14
#include <linux/mount.h>
L
Linus Torvalds 已提交
15 16
#include <linux/namei.h>
#include <linux/security.h>
M
Mimi Zohar 已提交
17
#include <linux/evm.h>
L
Linus Torvalds 已提交
18
#include <linux/syscalls.h>
19
#include <linux/export.h>
R
Robert Love 已提交
20
#include <linux/fsnotify.h>
21
#include <linux/audit.h>
22
#include <linux/vmalloc.h>
L
Linus Torvalds 已提交
23

24
#include <asm/uaccess.h>
25

26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
/*
 * Check permissions for extended attribute access.  This is a bit complicated
 * because different namespaces have very different rules.
 */
static int
xattr_permission(struct inode *inode, const char *name, int mask)
{
	/*
	 * We can never set or remove an extended attribute on a read-only
	 * filesystem  or on an immutable / append-only inode.
	 */
	if (mask & MAY_WRITE) {
		if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
			return -EPERM;
	}

	/*
	 * No restriction for security.* and system.* from the VFS.  Decision
	 * on these is left to the underlying filesystem / security module.
	 */
	if (!strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) ||
	    !strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN))
		return 0;

	/*
51
	 * The trusted.* namespace can only be accessed by privileged users.
52
	 */
53 54 55 56 57
	if (!strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN)) {
		if (!capable(CAP_SYS_ADMIN))
			return (mask & MAY_WRITE) ? -EPERM : -ENODATA;
		return 0;
	}
58

59 60
	/*
	 * In the user.* namespace, only regular files and directories can have
61
	 * extended attributes. For sticky directories, only the owner and
62
	 * privileged users can write attributes.
63
	 */
64
	if (!strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) {
65
		if (!S_ISREG(inode->i_mode) && !S_ISDIR(inode->i_mode))
66
			return (mask & MAY_WRITE) ? -EPERM : -ENODATA;
67
		if (S_ISDIR(inode->i_mode) && (inode->i_mode & S_ISVTX) &&
68
		    (mask & MAY_WRITE) && !inode_owner_or_capable(inode))
69 70 71
			return -EPERM;
	}

72
	return inode_permission(inode, mask);
73 74
}

75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
/**
 *  __vfs_setxattr_noperm - perform setxattr operation without performing
 *  permission checks.
 *
 *  @dentry - object to perform setxattr on
 *  @name - xattr name to set
 *  @value - value to set @name to
 *  @size - size of @value
 *  @flags - flags to pass into filesystem operations
 *
 *  returns the result of the internal setxattr or setsecurity operations.
 *
 *  This function requires the caller to lock the inode's i_mutex before it
 *  is executed. It also assumes that the caller will make the appropriate
 *  permission checks.
 */
int __vfs_setxattr_noperm(struct dentry *dentry, const char *name,
		const void *value, size_t size, int flags)
93 94
{
	struct inode *inode = dentry->d_inode;
95
	int error = -EOPNOTSUPP;
96 97
	int issec = !strncmp(name, XATTR_SECURITY_PREFIX,
				   XATTR_SECURITY_PREFIX_LEN);
98

99 100
	if (issec)
		inode->i_flags &= ~S_NOSEC;
101 102 103 104 105 106 107
	if (inode->i_op->setxattr) {
		error = inode->i_op->setxattr(dentry, name, value, size, flags);
		if (!error) {
			fsnotify_xattr(dentry);
			security_inode_post_setxattr(dentry, name, value,
						     size, flags);
		}
108
	} else if (issec) {
109
		const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
110 111 112 113 114
		error = security_inode_setsecurity(inode, suffix, value,
						   size, flags);
		if (!error)
			fsnotify_xattr(dentry);
	}
115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137

	return error;
}


int
vfs_setxattr(struct dentry *dentry, const char *name, const void *value,
		size_t size, int flags)
{
	struct inode *inode = dentry->d_inode;
	int error;

	error = xattr_permission(inode, name, MAY_WRITE);
	if (error)
		return error;

	mutex_lock(&inode->i_mutex);
	error = security_inode_setxattr(dentry, name, value, size, flags);
	if (error)
		goto out;

	error = __vfs_setxattr_noperm(dentry, name, value, size, flags);

138 139 140 141 142 143
out:
	mutex_unlock(&inode->i_mutex);
	return error;
}
EXPORT_SYMBOL_GPL(vfs_setxattr);

144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170
ssize_t
xattr_getsecurity(struct inode *inode, const char *name, void *value,
			size_t size)
{
	void *buffer = NULL;
	ssize_t len;

	if (!value || !size) {
		len = security_inode_getsecurity(inode, name, &buffer, false);
		goto out_noalloc;
	}

	len = security_inode_getsecurity(inode, name, &buffer, true);
	if (len < 0)
		return len;
	if (size < len) {
		len = -ERANGE;
		goto out;
	}
	memcpy(value, buffer, len);
out:
	security_release_secctx(buffer, len);
out_noalloc:
	return len;
}
EXPORT_SYMBOL_GPL(xattr_getsecurity);

171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228
/*
 * vfs_getxattr_alloc - allocate memory, if necessary, before calling getxattr
 *
 * Allocate memory, if not already allocated, or re-allocate correct size,
 * before retrieving the extended attribute.
 *
 * Returns the result of alloc, if failed, or the getxattr operation.
 */
ssize_t
vfs_getxattr_alloc(struct dentry *dentry, const char *name, char **xattr_value,
		   size_t xattr_size, gfp_t flags)
{
	struct inode *inode = dentry->d_inode;
	char *value = *xattr_value;
	int error;

	error = xattr_permission(inode, name, MAY_READ);
	if (error)
		return error;

	if (!inode->i_op->getxattr)
		return -EOPNOTSUPP;

	error = inode->i_op->getxattr(dentry, name, NULL, 0);
	if (error < 0)
		return error;

	if (!value || (error > xattr_size)) {
		value = krealloc(*xattr_value, error + 1, flags);
		if (!value)
			return -ENOMEM;
		memset(value, 0, error + 1);
	}

	error = inode->i_op->getxattr(dentry, name, value, error);
	*xattr_value = value;
	return error;
}

/* Compare an extended attribute value with the given value */
int vfs_xattr_cmp(struct dentry *dentry, const char *xattr_name,
		  const char *value, size_t size, gfp_t flags)
{
	char *xattr_value = NULL;
	int rc;

	rc = vfs_getxattr_alloc(dentry, xattr_name, &xattr_value, 0, flags);
	if (rc < 0)
		return rc;

	if ((rc != size) || (memcmp(xattr_value, value, rc) != 0))
		rc = -EINVAL;
	else
		rc = 0;
	kfree(xattr_value);
	return rc;
}

229
ssize_t
230
vfs_getxattr(struct dentry *dentry, const char *name, void *value, size_t size)
231 232 233 234
{
	struct inode *inode = dentry->d_inode;
	int error;

235 236 237 238
	error = xattr_permission(inode, name, MAY_READ);
	if (error)
		return error;

239 240 241 242 243
	error = security_inode_getxattr(dentry, name);
	if (error)
		return error;

	if (!strncmp(name, XATTR_SECURITY_PREFIX,
244 245
				XATTR_SECURITY_PREFIX_LEN)) {
		const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
246
		int ret = xattr_getsecurity(inode, suffix, value, size);
247 248 249 250
		/*
		 * Only overwrite the return value if a security module
		 * is actually active.
		 */
251 252 253
		if (ret == -EOPNOTSUPP)
			goto nolsm;
		return ret;
254
	}
255 256 257 258 259
nolsm:
	if (inode->i_op->getxattr)
		error = inode->i_op->getxattr(dentry, name, value, size);
	else
		error = -EOPNOTSUPP;
260 261 262 263 264

	return error;
}
EXPORT_SYMBOL_GPL(vfs_getxattr);

B
Bill Nottingham 已提交
265 266 267 268 269 270 271 272 273
ssize_t
vfs_listxattr(struct dentry *d, char *list, size_t size)
{
	ssize_t error;

	error = security_inode_listxattr(d);
	if (error)
		return error;
	error = -EOPNOTSUPP;
A
Al Viro 已提交
274
	if (d->d_inode->i_op->listxattr) {
B
Bill Nottingham 已提交
275 276 277 278 279 280 281 282 283 284
		error = d->d_inode->i_op->listxattr(d, list, size);
	} else {
		error = security_inode_listsecurity(d->d_inode, list, size);
		if (size && error > size)
			error = -ERANGE;
	}
	return error;
}
EXPORT_SYMBOL_GPL(vfs_listxattr);

285
int
286
vfs_removexattr(struct dentry *dentry, const char *name)
287 288 289 290 291 292 293
{
	struct inode *inode = dentry->d_inode;
	int error;

	if (!inode->i_op->removexattr)
		return -EOPNOTSUPP;

294 295 296 297
	error = xattr_permission(inode, name, MAY_WRITE);
	if (error)
		return error;

298 299 300 301 302 303 304 305
	error = security_inode_removexattr(dentry, name);
	if (error)
		return error;

	mutex_lock(&inode->i_mutex);
	error = inode->i_op->removexattr(dentry, name);
	mutex_unlock(&inode->i_mutex);

M
Mimi Zohar 已提交
306
	if (!error) {
307
		fsnotify_xattr(dentry);
M
Mimi Zohar 已提交
308 309
		evm_inode_post_removexattr(dentry, name);
	}
310 311 312 313 314
	return error;
}
EXPORT_SYMBOL_GPL(vfs_removexattr);


L
Linus Torvalds 已提交
315 316 317 318
/*
 * Extended attribute SET operations
 */
static long
319
setxattr(struct dentry *d, const char __user *name, const void __user *value,
L
Linus Torvalds 已提交
320 321 322 323
	 size_t size, int flags)
{
	int error;
	void *kvalue = NULL;
324
	void *vvalue = NULL;	/* If non-NULL, we used vmalloc() */
L
Linus Torvalds 已提交
325 326 327 328 329 330 331 332 333 334 335 336 337 338
	char kname[XATTR_NAME_MAX + 1];

	if (flags & ~(XATTR_CREATE|XATTR_REPLACE))
		return -EINVAL;

	error = strncpy_from_user(kname, name, sizeof(kname));
	if (error == 0 || error == sizeof(kname))
		error = -ERANGE;
	if (error < 0)
		return error;

	if (size) {
		if (size > XATTR_SIZE_MAX)
			return -E2BIG;
339 340 341 342 343 344 345 346 347 348 349
		kvalue = kmalloc(size, GFP_KERNEL | __GFP_NOWARN);
		if (!kvalue) {
			vvalue = vmalloc(size);
			if (!vvalue)
				return -ENOMEM;
			kvalue = vvalue;
		}
		if (copy_from_user(kvalue, value, size)) {
			error = -EFAULT;
			goto out;
		}
L
Linus Torvalds 已提交
350 351
	}

352
	error = vfs_setxattr(d, kname, kvalue, size, flags);
353 354 355 356 357
out:
	if (vvalue)
		vfree(vvalue);
	else
		kfree(kvalue);
L
Linus Torvalds 已提交
358 359 360
	return error;
}

361 362 363
SYSCALL_DEFINE5(setxattr, const char __user *, pathname,
		const char __user *, name, const void __user *, value,
		size_t, size, int, flags)
L
Linus Torvalds 已提交
364
{
365
	struct path path;
L
Linus Torvalds 已提交
366 367
	int error;

368
	error = user_path(pathname, &path);
L
Linus Torvalds 已提交
369 370
	if (error)
		return error;
371
	error = mnt_want_write(path.mnt);
372
	if (!error) {
373 374
		error = setxattr(path.dentry, name, value, size, flags);
		mnt_drop_write(path.mnt);
375
	}
376
	path_put(&path);
L
Linus Torvalds 已提交
377 378 379
	return error;
}

380 381 382
SYSCALL_DEFINE5(lsetxattr, const char __user *, pathname,
		const char __user *, name, const void __user *, value,
		size_t, size, int, flags)
L
Linus Torvalds 已提交
383
{
384
	struct path path;
L
Linus Torvalds 已提交
385 386
	int error;

387
	error = user_lpath(pathname, &path);
L
Linus Torvalds 已提交
388 389
	if (error)
		return error;
390
	error = mnt_want_write(path.mnt);
391
	if (!error) {
392 393
		error = setxattr(path.dentry, name, value, size, flags);
		mnt_drop_write(path.mnt);
394
	}
395
	path_put(&path);
L
Linus Torvalds 已提交
396 397 398
	return error;
}

399 400
SYSCALL_DEFINE5(fsetxattr, int, fd, const char __user *, name,
		const void __user *,value, size_t, size, int, flags)
L
Linus Torvalds 已提交
401 402
{
	struct file *f;
403
	struct dentry *dentry;
L
Linus Torvalds 已提交
404 405 406 407 408
	int error = -EBADF;

	f = fget(fd);
	if (!f)
		return error;
409
	dentry = f->f_path.dentry;
410
	audit_inode(NULL, dentry);
N
npiggin@suse.de 已提交
411
	error = mnt_want_write_file(f);
412 413
	if (!error) {
		error = setxattr(dentry, name, value, size, flags);
A
Al Viro 已提交
414
		mnt_drop_write_file(f);
415
	}
L
Linus Torvalds 已提交
416 417 418 419 420 421 422 423
	fput(f);
	return error;
}

/*
 * Extended attribute GET operations
 */
static ssize_t
424 425
getxattr(struct dentry *d, const char __user *name, void __user *value,
	 size_t size)
L
Linus Torvalds 已提交
426 427 428 429 430 431 432 433 434 435 436 437 438 439
{
	ssize_t error;
	void *kvalue = NULL;
	char kname[XATTR_NAME_MAX + 1];

	error = strncpy_from_user(kname, name, sizeof(kname));
	if (error == 0 || error == sizeof(kname))
		error = -ERANGE;
	if (error < 0)
		return error;

	if (size) {
		if (size > XATTR_SIZE_MAX)
			size = XATTR_SIZE_MAX;
440
		kvalue = kzalloc(size, GFP_KERNEL);
L
Linus Torvalds 已提交
441 442 443 444
		if (!kvalue)
			return -ENOMEM;
	}

445
	error = vfs_getxattr(d, kname, kvalue, size);
446 447 448 449 450 451 452
	if (error > 0) {
		if (size && copy_to_user(value, kvalue, error))
			error = -EFAULT;
	} else if (error == -ERANGE && size >= XATTR_SIZE_MAX) {
		/* The file system tried to returned a value bigger
		   than XATTR_SIZE_MAX bytes. Not possible. */
		error = -E2BIG;
L
Linus Torvalds 已提交
453
	}
J
Jesper Juhl 已提交
454
	kfree(kvalue);
L
Linus Torvalds 已提交
455 456 457
	return error;
}

458 459
SYSCALL_DEFINE4(getxattr, const char __user *, pathname,
		const char __user *, name, void __user *, value, size_t, size)
L
Linus Torvalds 已提交
460
{
461
	struct path path;
L
Linus Torvalds 已提交
462 463
	ssize_t error;

464
	error = user_path(pathname, &path);
L
Linus Torvalds 已提交
465 466
	if (error)
		return error;
467 468
	error = getxattr(path.dentry, name, value, size);
	path_put(&path);
L
Linus Torvalds 已提交
469 470 471
	return error;
}

472 473
SYSCALL_DEFINE4(lgetxattr, const char __user *, pathname,
		const char __user *, name, void __user *, value, size_t, size)
L
Linus Torvalds 已提交
474
{
475
	struct path path;
L
Linus Torvalds 已提交
476 477
	ssize_t error;

478
	error = user_lpath(pathname, &path);
L
Linus Torvalds 已提交
479 480
	if (error)
		return error;
481 482
	error = getxattr(path.dentry, name, value, size);
	path_put(&path);
L
Linus Torvalds 已提交
483 484 485
	return error;
}

486 487
SYSCALL_DEFINE4(fgetxattr, int, fd, const char __user *, name,
		void __user *, value, size_t, size)
L
Linus Torvalds 已提交
488 489 490 491 492 493 494
{
	struct file *f;
	ssize_t error = -EBADF;

	f = fget(fd);
	if (!f)
		return error;
495
	audit_inode(NULL, f->f_path.dentry);
496
	error = getxattr(f->f_path.dentry, name, value, size);
L
Linus Torvalds 已提交
497 498 499 500 501 502 503 504 505 506 507 508
	fput(f);
	return error;
}

/*
 * Extended attribute LIST operations
 */
static ssize_t
listxattr(struct dentry *d, char __user *list, size_t size)
{
	ssize_t error;
	char *klist = NULL;
509
	char *vlist = NULL;	/* If non-NULL, we used vmalloc() */
L
Linus Torvalds 已提交
510 511 512 513

	if (size) {
		if (size > XATTR_LIST_MAX)
			size = XATTR_LIST_MAX;
514
		klist = kmalloc(size, __GFP_NOWARN | GFP_KERNEL);
515 516 517 518 519 520
		if (!klist) {
			vlist = vmalloc(size);
			if (!vlist)
				return -ENOMEM;
			klist = vlist;
		}
L
Linus Torvalds 已提交
521 522
	}

B
Bill Nottingham 已提交
523
	error = vfs_listxattr(d, klist, size);
524 525 526 527 528 529 530
	if (error > 0) {
		if (size && copy_to_user(list, klist, error))
			error = -EFAULT;
	} else if (error == -ERANGE && size >= XATTR_LIST_MAX) {
		/* The file system tried to returned a list bigger
		   than XATTR_LIST_MAX bytes. Not possible. */
		error = -E2BIG;
L
Linus Torvalds 已提交
531
	}
532 533 534 535
	if (vlist)
		vfree(vlist);
	else
		kfree(klist);
L
Linus Torvalds 已提交
536 537 538
	return error;
}

539 540
SYSCALL_DEFINE3(listxattr, const char __user *, pathname, char __user *, list,
		size_t, size)
L
Linus Torvalds 已提交
541
{
542
	struct path path;
L
Linus Torvalds 已提交
543 544
	ssize_t error;

545
	error = user_path(pathname, &path);
L
Linus Torvalds 已提交
546 547
	if (error)
		return error;
548 549
	error = listxattr(path.dentry, list, size);
	path_put(&path);
L
Linus Torvalds 已提交
550 551 552
	return error;
}

553 554
SYSCALL_DEFINE3(llistxattr, const char __user *, pathname, char __user *, list,
		size_t, size)
L
Linus Torvalds 已提交
555
{
556
	struct path path;
L
Linus Torvalds 已提交
557 558
	ssize_t error;

559
	error = user_lpath(pathname, &path);
L
Linus Torvalds 已提交
560 561
	if (error)
		return error;
562 563
	error = listxattr(path.dentry, list, size);
	path_put(&path);
L
Linus Torvalds 已提交
564 565 566
	return error;
}

567
SYSCALL_DEFINE3(flistxattr, int, fd, char __user *, list, size_t, size)
L
Linus Torvalds 已提交
568 569 570 571 572 573 574
{
	struct file *f;
	ssize_t error = -EBADF;

	f = fget(fd);
	if (!f)
		return error;
575
	audit_inode(NULL, f->f_path.dentry);
576
	error = listxattr(f->f_path.dentry, list, size);
L
Linus Torvalds 已提交
577 578 579 580 581 582 583 584
	fput(f);
	return error;
}

/*
 * Extended attribute REMOVE operations
 */
static long
585
removexattr(struct dentry *d, const char __user *name)
L
Linus Torvalds 已提交
586 587 588 589 590 591 592 593 594 595
{
	int error;
	char kname[XATTR_NAME_MAX + 1];

	error = strncpy_from_user(kname, name, sizeof(kname));
	if (error == 0 || error == sizeof(kname))
		error = -ERANGE;
	if (error < 0)
		return error;

596
	return vfs_removexattr(d, kname);
L
Linus Torvalds 已提交
597 598
}

599 600
SYSCALL_DEFINE2(removexattr, const char __user *, pathname,
		const char __user *, name)
L
Linus Torvalds 已提交
601
{
602
	struct path path;
L
Linus Torvalds 已提交
603 604
	int error;

605
	error = user_path(pathname, &path);
L
Linus Torvalds 已提交
606 607
	if (error)
		return error;
608
	error = mnt_want_write(path.mnt);
609
	if (!error) {
610 611
		error = removexattr(path.dentry, name);
		mnt_drop_write(path.mnt);
612
	}
613
	path_put(&path);
L
Linus Torvalds 已提交
614 615 616
	return error;
}

617 618
SYSCALL_DEFINE2(lremovexattr, const char __user *, pathname,
		const char __user *, name)
L
Linus Torvalds 已提交
619
{
620
	struct path path;
L
Linus Torvalds 已提交
621 622
	int error;

623
	error = user_lpath(pathname, &path);
L
Linus Torvalds 已提交
624 625
	if (error)
		return error;
626
	error = mnt_want_write(path.mnt);
627
	if (!error) {
628 629
		error = removexattr(path.dentry, name);
		mnt_drop_write(path.mnt);
630
	}
631
	path_put(&path);
L
Linus Torvalds 已提交
632 633 634
	return error;
}

635
SYSCALL_DEFINE2(fremovexattr, int, fd, const char __user *, name)
L
Linus Torvalds 已提交
636 637
{
	struct file *f;
638
	struct dentry *dentry;
L
Linus Torvalds 已提交
639 640 641 642 643
	int error = -EBADF;

	f = fget(fd);
	if (!f)
		return error;
644
	dentry = f->f_path.dentry;
645
	audit_inode(NULL, dentry);
N
npiggin@suse.de 已提交
646
	error = mnt_want_write_file(f);
647 648
	if (!error) {
		error = removexattr(dentry, name);
A
Al Viro 已提交
649
		mnt_drop_write_file(f);
650
	}
L
Linus Torvalds 已提交
651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682
	fput(f);
	return error;
}


static const char *
strcmp_prefix(const char *a, const char *a_prefix)
{
	while (*a_prefix && *a == *a_prefix) {
		a++;
		a_prefix++;
	}
	return *a_prefix ? NULL : a;
}

/*
 * In order to implement different sets of xattr operations for each xattr
 * prefix with the generic xattr API, a filesystem should create a
 * null-terminated array of struct xattr_handler (one for each prefix) and
 * hang a pointer to it off of the s_xattr field of the superblock.
 *
 * The generic_fooxattr() functions will use this list to dispatch xattr
 * operations to the correct xattr_handler.
 */
#define for_each_xattr_handler(handlers, handler)		\
		for ((handler) = *(handlers)++;			\
			(handler) != NULL;			\
			(handler) = *(handlers)++)

/*
 * Find the xattr_handler with the matching prefix.
 */
683 684
static const struct xattr_handler *
xattr_resolve_name(const struct xattr_handler **handlers, const char **name)
L
Linus Torvalds 已提交
685
{
686
	const struct xattr_handler *handler;
L
Linus Torvalds 已提交
687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706

	if (!*name)
		return NULL;

	for_each_xattr_handler(handlers, handler) {
		const char *n = strcmp_prefix(*name, handler->prefix);
		if (n) {
			*name = n;
			break;
		}
	}
	return handler;
}

/*
 * Find the handler for the prefix and dispatch its get() operation.
 */
ssize_t
generic_getxattr(struct dentry *dentry, const char *name, void *buffer, size_t size)
{
707
	const struct xattr_handler *handler;
L
Linus Torvalds 已提交
708

709
	handler = xattr_resolve_name(dentry->d_sb->s_xattr, &name);
L
Linus Torvalds 已提交
710 711
	if (!handler)
		return -EOPNOTSUPP;
712
	return handler->get(dentry, name, buffer, size, handler->flags);
L
Linus Torvalds 已提交
713 714 715 716 717 718 719 720 721
}

/*
 * Combine the results of the list() operation from every xattr_handler in the
 * list.
 */
ssize_t
generic_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
{
722
	const struct xattr_handler *handler, **handlers = dentry->d_sb->s_xattr;
L
Linus Torvalds 已提交
723 724 725
	unsigned int size = 0;

	if (!buffer) {
726 727 728 729
		for_each_xattr_handler(handlers, handler) {
			size += handler->list(dentry, NULL, 0, NULL, 0,
					      handler->flags);
		}
L
Linus Torvalds 已提交
730 731 732 733
	} else {
		char *buf = buffer;

		for_each_xattr_handler(handlers, handler) {
734 735
			size = handler->list(dentry, buf, buffer_size,
					     NULL, 0, handler->flags);
L
Linus Torvalds 已提交
736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751
			if (size > buffer_size)
				return -ERANGE;
			buf += size;
			buffer_size -= size;
		}
		size = buf - buffer;
	}
	return size;
}

/*
 * Find the handler for the prefix and dispatch its set() operation.
 */
int
generic_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags)
{
752
	const struct xattr_handler *handler;
L
Linus Torvalds 已提交
753 754 755

	if (size == 0)
		value = "";  /* empty EA, do not remove */
756
	handler = xattr_resolve_name(dentry->d_sb->s_xattr, &name);
L
Linus Torvalds 已提交
757 758
	if (!handler)
		return -EOPNOTSUPP;
J
Jan Kara 已提交
759
	return handler->set(dentry, name, value, size, flags, handler->flags);
L
Linus Torvalds 已提交
760 761 762 763 764 765 766 767 768
}

/*
 * Find the handler for the prefix and dispatch its set() operation to remove
 * any associated extended attribute.
 */
int
generic_removexattr(struct dentry *dentry, const char *name)
{
769
	const struct xattr_handler *handler;
L
Linus Torvalds 已提交
770

771
	handler = xattr_resolve_name(dentry->d_sb->s_xattr, &name);
L
Linus Torvalds 已提交
772 773
	if (!handler)
		return -EOPNOTSUPP;
774 775
	return handler->set(dentry, name, NULL, 0,
			    XATTR_REPLACE, handler->flags);
L
Linus Torvalds 已提交
776 777 778 779 780 781
}

EXPORT_SYMBOL(generic_getxattr);
EXPORT_SYMBOL(generic_listxattr);
EXPORT_SYMBOL(generic_setxattr);
EXPORT_SYMBOL(generic_removexattr);