2005-04-17 02:20:36 +04:00
/*
File : fs / xattr . c
Extended attribute handling .
Copyright ( C ) 2001 by Andreas Gruenbacher < a . gruenbacher @ computer . org >
Copyright ( C ) 2001 SGI - Silicon Graphics , Inc < linux - xfs @ oss . sgi . com >
Copyright ( c ) 2004 Red Hat , Inc . , James Morris < jmorris @ redhat . com >
*/
# include <linux/fs.h>
# include <linux/slab.h>
# include <linux/file.h>
# include <linux/xattr.h>
2008-02-16 01:37:38 +03:00
# include <linux/mount.h>
2005-04-17 02:20:36 +04:00
# include <linux/namei.h>
# include <linux/security.h>
# include <linux/syscalls.h>
# include <linux/module.h>
[PATCH] inotify
inotify is intended to correct the deficiencies of dnotify, particularly
its inability to scale and its terrible user interface:
* dnotify requires the opening of one fd per each directory
that you intend to watch. This quickly results in too many
open files and pins removable media, preventing unmount.
* dnotify is directory-based. You only learn about changes to
directories. Sure, a change to a file in a directory affects
the directory, but you are then forced to keep a cache of
stat structures.
* dnotify's interface to user-space is awful. Signals?
inotify provides a more usable, simple, powerful solution to file change
notification:
* inotify's interface is a system call that returns a fd, not SIGIO.
You get a single fd, which is select()-able.
* inotify has an event that says "the filesystem that the item
you were watching is on was unmounted."
* inotify can watch directories or files.
Inotify is currently used by Beagle (a desktop search infrastructure),
Gamin (a FAM replacement), and other projects.
See Documentation/filesystems/inotify.txt.
Signed-off-by: Robert Love <rml@novell.com>
Cc: John McCutchan <ttb@tentacle.dhs.org>
Cc: Christoph Hellwig <hch@lst.de>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-07-13 01:06:03 +04:00
# include <linux/fsnotify.h>
2005-11-03 19:00:25 +03:00
# include <linux/audit.h>
2005-04-17 02:20:36 +04:00
# include <asm/uaccess.h>
2006-01-10 07:51:55 +03:00
2006-01-10 07:51:56 +03:00
/*
* Check permissions for extended attribute access . This is a bit complicated
* because different namespaces have very different rules .
*/
static int
xattr_permission ( struct inode * inode , const char * name , int mask )
{
/*
* We can never set or remove an extended attribute on a read - only
* filesystem or on an immutable / append - only inode .
*/
if ( mask & MAY_WRITE ) {
if ( IS_IMMUTABLE ( inode ) | | IS_APPEND ( inode ) )
return - EPERM ;
}
/*
* No restriction for security . * and system . * from the VFS . Decision
* on these is left to the underlying filesystem / security module .
*/
if ( ! strncmp ( name , XATTR_SECURITY_PREFIX , XATTR_SECURITY_PREFIX_LEN ) | |
! strncmp ( name , XATTR_SYSTEM_PREFIX , XATTR_SYSTEM_PREFIX_LEN ) )
return 0 ;
/*
2006-11-03 09:07:29 +03:00
* The trusted . * namespace can only be accessed by a privileged user .
2006-01-10 07:51:56 +03:00
*/
if ( ! strncmp ( name , XATTR_TRUSTED_PREFIX , XATTR_TRUSTED_PREFIX_LEN ) )
return ( capable ( CAP_SYS_ADMIN ) ? 0 : - EPERM ) ;
2006-11-03 09:07:29 +03:00
/* In user.* namespace, only regular files and directories can have
* extended attributes . For sticky directories , only the owner and
* privileged user can write attributes .
*/
2006-01-10 07:51:56 +03:00
if ( ! strncmp ( name , XATTR_USER_PREFIX , XATTR_USER_PREFIX_LEN ) ) {
2006-11-03 09:07:29 +03:00
if ( ! S_ISREG ( inode - > i_mode ) & & ! S_ISDIR ( inode - > i_mode ) )
return - EPERM ;
if ( S_ISDIR ( inode - > i_mode ) & & ( inode - > i_mode & S_ISVTX ) & &
2007-07-17 13:30:08 +04:00
( mask & MAY_WRITE ) & & ! is_owner_or_cap ( inode ) )
2006-01-10 07:51:56 +03:00
return - EPERM ;
}
2008-07-22 08:07:17 +04:00
return inode_permission ( inode , mask ) ;
2006-01-10 07:51:56 +03:00
}
2006-01-10 07:51:55 +03:00
int
2008-04-29 11:59:41 +04:00
vfs_setxattr ( struct dentry * dentry , const char * name , const void * value ,
2006-01-10 07:51:55 +03:00
size_t size , int flags )
{
struct inode * inode = dentry - > d_inode ;
int error ;
2006-01-10 07:51:56 +03:00
error = xattr_permission ( inode , name , MAY_WRITE ) ;
if ( error )
return error ;
2006-01-10 07:51:55 +03:00
mutex_lock ( & inode - > i_mutex ) ;
error = security_inode_setxattr ( dentry , name , value , size , flags ) ;
if ( error )
goto out ;
error = - EOPNOTSUPP ;
if ( inode - > i_op - > setxattr ) {
error = inode - > i_op - > setxattr ( dentry , name , value , size , flags ) ;
if ( ! error ) {
fsnotify_xattr ( dentry ) ;
security_inode_post_setxattr ( dentry , name , value ,
size , flags ) ;
}
} else if ( ! strncmp ( name , XATTR_SECURITY_PREFIX ,
2006-01-10 07:51:56 +03:00
XATTR_SECURITY_PREFIX_LEN ) ) {
const char * suffix = name + XATTR_SECURITY_PREFIX_LEN ;
2006-01-10 07:51:55 +03:00
error = security_inode_setsecurity ( inode , suffix , value ,
size , flags ) ;
if ( ! error )
fsnotify_xattr ( dentry ) ;
}
out :
mutex_unlock ( & inode - > i_mutex ) ;
return error ;
}
EXPORT_SYMBOL_GPL ( vfs_setxattr ) ;
2008-02-05 09:29:39 +03:00
ssize_t
xattr_getsecurity ( struct inode * inode , const char * name , void * value ,
size_t size )
{
void * buffer = NULL ;
ssize_t len ;
if ( ! value | | ! size ) {
len = security_inode_getsecurity ( inode , name , & buffer , false ) ;
goto out_noalloc ;
}
len = security_inode_getsecurity ( inode , name , & buffer , true ) ;
if ( len < 0 )
return len ;
if ( size < len ) {
len = - ERANGE ;
goto out ;
}
memcpy ( value , buffer , len ) ;
out :
security_release_secctx ( buffer , len ) ;
out_noalloc :
return len ;
}
EXPORT_SYMBOL_GPL ( xattr_getsecurity ) ;
2006-01-10 07:51:55 +03:00
ssize_t
2008-04-29 11:59:41 +04:00
vfs_getxattr ( struct dentry * dentry , const char * name , void * value , size_t size )
2006-01-10 07:51:55 +03:00
{
struct inode * inode = dentry - > d_inode ;
int error ;
2006-01-10 07:51:56 +03:00
error = xattr_permission ( inode , name , MAY_READ ) ;
if ( error )
return error ;
2006-01-10 07:51:55 +03:00
error = security_inode_getxattr ( dentry , name ) ;
if ( error )
return error ;
if ( ! strncmp ( name , XATTR_SECURITY_PREFIX ,
2006-01-10 07:51:56 +03:00
XATTR_SECURITY_PREFIX_LEN ) ) {
const char * suffix = name + XATTR_SECURITY_PREFIX_LEN ;
2008-02-05 09:29:39 +03:00
int ret = xattr_getsecurity ( inode , suffix , value , size ) ;
2006-01-10 07:51:55 +03:00
/*
* Only overwrite the return value if a security module
* is actually active .
*/
2008-02-05 09:29:40 +03:00
if ( ret = = - EOPNOTSUPP )
goto nolsm ;
return ret ;
2006-01-10 07:51:55 +03:00
}
2008-02-05 09:29:40 +03:00
nolsm :
if ( inode - > i_op - > getxattr )
error = inode - > i_op - > getxattr ( dentry , name , value , size ) ;
else
error = - EOPNOTSUPP ;
2006-01-10 07:51:55 +03:00
return error ;
}
EXPORT_SYMBOL_GPL ( vfs_getxattr ) ;
2006-10-10 00:10:48 +04:00
ssize_t
vfs_listxattr ( struct dentry * d , char * list , size_t size )
{
ssize_t error ;
error = security_inode_listxattr ( d ) ;
if ( error )
return error ;
error = - EOPNOTSUPP ;
2008-12-04 18:06:33 +03:00
if ( d - > d_inode - > i_op - > listxattr ) {
2006-10-10 00:10:48 +04:00
error = d - > d_inode - > i_op - > listxattr ( d , list , size ) ;
} else {
error = security_inode_listsecurity ( d - > d_inode , list , size ) ;
if ( size & & error > size )
error = - ERANGE ;
}
return error ;
}
EXPORT_SYMBOL_GPL ( vfs_listxattr ) ;
2006-01-10 07:51:55 +03:00
int
2008-04-29 11:59:41 +04:00
vfs_removexattr ( struct dentry * dentry , const char * name )
2006-01-10 07:51:55 +03:00
{
struct inode * inode = dentry - > d_inode ;
int error ;
if ( ! inode - > i_op - > removexattr )
return - EOPNOTSUPP ;
2006-01-10 07:51:56 +03:00
error = xattr_permission ( inode , name , MAY_WRITE ) ;
if ( error )
return error ;
2006-01-10 07:51:55 +03:00
error = security_inode_removexattr ( dentry , name ) ;
if ( error )
return error ;
mutex_lock ( & inode - > i_mutex ) ;
error = inode - > i_op - > removexattr ( dentry , name ) ;
mutex_unlock ( & inode - > i_mutex ) ;
if ( ! error )
fsnotify_xattr ( dentry ) ;
return error ;
}
EXPORT_SYMBOL_GPL ( vfs_removexattr ) ;
2005-04-17 02:20:36 +04:00
/*
* Extended attribute SET operations
*/
static long
2008-04-29 11:59:41 +04:00
setxattr ( struct dentry * d , const char __user * name , const void __user * value ,
2005-04-17 02:20:36 +04:00
size_t size , int flags )
{
int error ;
void * kvalue = NULL ;
char kname [ XATTR_NAME_MAX + 1 ] ;
if ( flags & ~ ( XATTR_CREATE | XATTR_REPLACE ) )
return - EINVAL ;
error = strncpy_from_user ( kname , name , sizeof ( kname ) ) ;
if ( error = = 0 | | error = = sizeof ( kname ) )
error = - ERANGE ;
if ( error < 0 )
return error ;
if ( size ) {
if ( size > XATTR_SIZE_MAX )
return - E2BIG ;
kvalue = kmalloc ( size , GFP_KERNEL ) ;
if ( ! kvalue )
return - ENOMEM ;
if ( copy_from_user ( kvalue , value , size ) ) {
kfree ( kvalue ) ;
return - EFAULT ;
}
}
2006-01-10 07:51:55 +03:00
error = vfs_setxattr ( d , kname , kvalue , size , flags ) ;
2005-11-07 12:01:34 +03:00
kfree ( kvalue ) ;
2005-04-17 02:20:36 +04:00
return error ;
}
2009-01-14 16:14:14 +03:00
SYSCALL_DEFINE5 ( setxattr , const char __user * , pathname ,
const char __user * , name , const void __user * , value ,
size_t , size , int , flags )
2005-04-17 02:20:36 +04:00
{
2008-07-22 17:59:21 +04:00
struct path path ;
2005-04-17 02:20:36 +04:00
int error ;
2008-07-22 17:59:21 +04:00
error = user_path ( pathname , & path ) ;
2005-04-17 02:20:36 +04:00
if ( error )
return error ;
2008-07-22 17:59:21 +04:00
error = mnt_want_write ( path . mnt ) ;
2008-02-16 01:37:38 +03:00
if ( ! error ) {
2008-07-22 17:59:21 +04:00
error = setxattr ( path . dentry , name , value , size , flags ) ;
mnt_drop_write ( path . mnt ) ;
2008-02-16 01:37:38 +03:00
}
2008-07-22 17:59:21 +04:00
path_put ( & path ) ;
2005-04-17 02:20:36 +04:00
return error ;
}
2009-01-14 16:14:14 +03:00
SYSCALL_DEFINE5 ( lsetxattr , const char __user * , pathname ,
const char __user * , name , const void __user * , value ,
size_t , size , int , flags )
2005-04-17 02:20:36 +04:00
{
2008-07-22 17:59:21 +04:00
struct path path ;
2005-04-17 02:20:36 +04:00
int error ;
2008-07-22 17:59:21 +04:00
error = user_lpath ( pathname , & path ) ;
2005-04-17 02:20:36 +04:00
if ( error )
return error ;
2008-07-22 17:59:21 +04:00
error = mnt_want_write ( path . mnt ) ;
2008-02-16 01:37:38 +03:00
if ( ! error ) {
2008-07-22 17:59:21 +04:00
error = setxattr ( path . dentry , name , value , size , flags ) ;
mnt_drop_write ( path . mnt ) ;
2008-02-16 01:37:38 +03:00
}
2008-07-22 17:59:21 +04:00
path_put ( & path ) ;
2005-04-17 02:20:36 +04:00
return error ;
}
2009-01-14 16:14:14 +03:00
SYSCALL_DEFINE5 ( fsetxattr , int , fd , const char __user * , name ,
const void __user * , value , size_t , size , int , flags )
2005-04-17 02:20:36 +04:00
{
struct file * f ;
2005-11-03 19:00:25 +03:00
struct dentry * dentry ;
2005-04-17 02:20:36 +04:00
int error = - EBADF ;
f = fget ( fd ) ;
if ( ! f )
return error ;
2006-12-08 13:36:35 +03:00
dentry = f - > f_path . dentry ;
2007-06-07 20:19:32 +04:00
audit_inode ( NULL , dentry ) ;
2008-02-16 01:37:38 +03:00
error = mnt_want_write ( f - > f_path . mnt ) ;
if ( ! error ) {
error = setxattr ( dentry , name , value , size , flags ) ;
mnt_drop_write ( f - > f_path . mnt ) ;
}
2005-04-17 02:20:36 +04:00
fput ( f ) ;
return error ;
}
/*
* Extended attribute GET operations
*/
static ssize_t
2008-04-29 11:59:41 +04:00
getxattr ( struct dentry * d , const char __user * name , void __user * value ,
size_t size )
2005-04-17 02:20:36 +04:00
{
ssize_t error ;
void * kvalue = NULL ;
char kname [ XATTR_NAME_MAX + 1 ] ;
error = strncpy_from_user ( kname , name , sizeof ( kname ) ) ;
if ( error = = 0 | | error = = sizeof ( kname ) )
error = - ERANGE ;
if ( error < 0 )
return error ;
if ( size ) {
if ( size > XATTR_SIZE_MAX )
size = XATTR_SIZE_MAX ;
2005-10-31 01:59:22 +03:00
kvalue = kzalloc ( size , GFP_KERNEL ) ;
2005-04-17 02:20:36 +04:00
if ( ! kvalue )
return - ENOMEM ;
}
2006-01-10 07:51:55 +03:00
error = vfs_getxattr ( d , kname , kvalue , size ) ;
2005-09-04 02:55:18 +04:00
if ( error > 0 ) {
if ( size & & copy_to_user ( value , kvalue , error ) )
error = - EFAULT ;
} else if ( error = = - ERANGE & & size > = XATTR_SIZE_MAX ) {
/* The file system tried to returned a value bigger
than XATTR_SIZE_MAX bytes . Not possible . */
error = - E2BIG ;
2005-04-17 02:20:36 +04:00
}
2005-11-07 12:01:34 +03:00
kfree ( kvalue ) ;
2005-04-17 02:20:36 +04:00
return error ;
}
2009-01-14 16:14:14 +03:00
SYSCALL_DEFINE4 ( getxattr , const char __user * , pathname ,
const char __user * , name , void __user * , value , size_t , size )
2005-04-17 02:20:36 +04:00
{
2008-07-22 17:59:21 +04:00
struct path path ;
2005-04-17 02:20:36 +04:00
ssize_t error ;
2008-07-22 17:59:21 +04:00
error = user_path ( pathname , & path ) ;
2005-04-17 02:20:36 +04:00
if ( error )
return error ;
2008-07-22 17:59:21 +04:00
error = getxattr ( path . dentry , name , value , size ) ;
path_put ( & path ) ;
2005-04-17 02:20:36 +04:00
return error ;
}
2009-01-14 16:14:14 +03:00
SYSCALL_DEFINE4 ( lgetxattr , const char __user * , pathname ,
const char __user * , name , void __user * , value , size_t , size )
2005-04-17 02:20:36 +04:00
{
2008-07-22 17:59:21 +04:00
struct path path ;
2005-04-17 02:20:36 +04:00
ssize_t error ;
2008-07-22 17:59:21 +04:00
error = user_lpath ( pathname , & path ) ;
2005-04-17 02:20:36 +04:00
if ( error )
return error ;
2008-07-22 17:59:21 +04:00
error = getxattr ( path . dentry , name , value , size ) ;
path_put ( & path ) ;
2005-04-17 02:20:36 +04:00
return error ;
}
2009-01-14 16:14:14 +03:00
SYSCALL_DEFINE4 ( fgetxattr , int , fd , const char __user * , name ,
void __user * , value , size_t , size )
2005-04-17 02:20:36 +04:00
{
struct file * f ;
ssize_t error = - EBADF ;
f = fget ( fd ) ;
if ( ! f )
return error ;
2007-06-07 20:19:32 +04:00
audit_inode ( NULL , f - > f_path . dentry ) ;
2006-12-08 13:36:35 +03:00
error = getxattr ( f - > f_path . dentry , name , value , size ) ;
2005-04-17 02:20:36 +04:00
fput ( f ) ;
return error ;
}
/*
* Extended attribute LIST operations
*/
static ssize_t
listxattr ( struct dentry * d , char __user * list , size_t size )
{
ssize_t error ;
char * klist = NULL ;
if ( size ) {
if ( size > XATTR_LIST_MAX )
size = XATTR_LIST_MAX ;
klist = kmalloc ( size , GFP_KERNEL ) ;
if ( ! klist )
return - ENOMEM ;
}
2006-10-10 00:10:48 +04:00
error = vfs_listxattr ( d , klist , size ) ;
2005-09-04 02:55:18 +04:00
if ( error > 0 ) {
if ( size & & copy_to_user ( list , klist , error ) )
error = - EFAULT ;
} else if ( error = = - ERANGE & & size > = XATTR_LIST_MAX ) {
/* The file system tried to returned a list bigger
than XATTR_LIST_MAX bytes . Not possible . */
error = - E2BIG ;
2005-04-17 02:20:36 +04:00
}
2005-11-07 12:01:34 +03:00
kfree ( klist ) ;
2005-04-17 02:20:36 +04:00
return error ;
}
2009-01-14 16:14:14 +03:00
SYSCALL_DEFINE3 ( listxattr , const char __user * , pathname , char __user * , list ,
size_t , size )
2005-04-17 02:20:36 +04:00
{
2008-07-22 17:59:21 +04:00
struct path path ;
2005-04-17 02:20:36 +04:00
ssize_t error ;
2008-07-22 17:59:21 +04:00
error = user_path ( pathname , & path ) ;
2005-04-17 02:20:36 +04:00
if ( error )
return error ;
2008-07-22 17:59:21 +04:00
error = listxattr ( path . dentry , list , size ) ;
path_put ( & path ) ;
2005-04-17 02:20:36 +04:00
return error ;
}
2009-01-14 16:14:14 +03:00
SYSCALL_DEFINE3 ( llistxattr , const char __user * , pathname , char __user * , list ,
size_t , size )
2005-04-17 02:20:36 +04:00
{
2008-07-22 17:59:21 +04:00
struct path path ;
2005-04-17 02:20:36 +04:00
ssize_t error ;
2008-07-22 17:59:21 +04:00
error = user_lpath ( pathname , & path ) ;
2005-04-17 02:20:36 +04:00
if ( error )
return error ;
2008-07-22 17:59:21 +04:00
error = listxattr ( path . dentry , list , size ) ;
path_put ( & path ) ;
2005-04-17 02:20:36 +04:00
return error ;
}
2009-01-14 16:14:14 +03:00
SYSCALL_DEFINE3 ( flistxattr , int , fd , char __user * , list , size_t , size )
2005-04-17 02:20:36 +04:00
{
struct file * f ;
ssize_t error = - EBADF ;
f = fget ( fd ) ;
if ( ! f )
return error ;
2007-06-07 20:19:32 +04:00
audit_inode ( NULL , f - > f_path . dentry ) ;
2006-12-08 13:36:35 +03:00
error = listxattr ( f - > f_path . dentry , list , size ) ;
2005-04-17 02:20:36 +04:00
fput ( f ) ;
return error ;
}
/*
* Extended attribute REMOVE operations
*/
static long
2008-04-29 11:59:41 +04:00
removexattr ( struct dentry * d , const char __user * name )
2005-04-17 02:20:36 +04:00
{
int error ;
char kname [ XATTR_NAME_MAX + 1 ] ;
error = strncpy_from_user ( kname , name , sizeof ( kname ) ) ;
if ( error = = 0 | | error = = sizeof ( kname ) )
error = - ERANGE ;
if ( error < 0 )
return error ;
2006-01-10 07:51:55 +03:00
return vfs_removexattr ( d , kname ) ;
2005-04-17 02:20:36 +04:00
}
2009-01-14 16:14:14 +03:00
SYSCALL_DEFINE2 ( removexattr , const char __user * , pathname ,
const char __user * , name )
2005-04-17 02:20:36 +04:00
{
2008-07-22 17:59:21 +04:00
struct path path ;
2005-04-17 02:20:36 +04:00
int error ;
2008-07-22 17:59:21 +04:00
error = user_path ( pathname , & path ) ;
2005-04-17 02:20:36 +04:00
if ( error )
return error ;
2008-07-22 17:59:21 +04:00
error = mnt_want_write ( path . mnt ) ;
2008-02-16 01:37:38 +03:00
if ( ! error ) {
2008-07-22 17:59:21 +04:00
error = removexattr ( path . dentry , name ) ;
mnt_drop_write ( path . mnt ) ;
2008-02-16 01:37:38 +03:00
}
2008-07-22 17:59:21 +04:00
path_put ( & path ) ;
2005-04-17 02:20:36 +04:00
return error ;
}
asmlinkage long
2008-07-22 17:59:21 +04:00
sys_lremovexattr ( const char __user * pathname , const char __user * name )
2005-04-17 02:20:36 +04:00
{
2008-07-22 17:59:21 +04:00
struct path path ;
2005-04-17 02:20:36 +04:00
int error ;
2008-07-22 17:59:21 +04:00
error = user_lpath ( pathname , & path ) ;
2005-04-17 02:20:36 +04:00
if ( error )
return error ;
2008-07-22 17:59:21 +04:00
error = mnt_want_write ( path . mnt ) ;
2008-02-16 01:37:38 +03:00
if ( ! error ) {
2008-07-22 17:59:21 +04:00
error = removexattr ( path . dentry , name ) ;
mnt_drop_write ( path . mnt ) ;
2008-02-16 01:37:38 +03:00
}
2008-07-22 17:59:21 +04:00
path_put ( & path ) ;
2005-04-17 02:20:36 +04:00
return error ;
}
asmlinkage long
2008-04-29 11:59:41 +04:00
sys_fremovexattr ( int fd , const char __user * name )
2005-04-17 02:20:36 +04:00
{
struct file * f ;
2005-11-03 19:00:25 +03:00
struct dentry * dentry ;
2005-04-17 02:20:36 +04:00
int error = - EBADF ;
f = fget ( fd ) ;
if ( ! f )
return error ;
2006-12-08 13:36:35 +03:00
dentry = f - > f_path . dentry ;
2007-06-07 20:19:32 +04:00
audit_inode ( NULL , dentry ) ;
2008-02-16 01:37:38 +03:00
error = mnt_want_write ( f - > f_path . mnt ) ;
if ( ! error ) {
error = removexattr ( dentry , name ) ;
mnt_drop_write ( f - > f_path . mnt ) ;
}
2005-04-17 02:20:36 +04:00
fput ( f ) ;
return error ;
}
static const char *
strcmp_prefix ( const char * a , const char * a_prefix )
{
while ( * a_prefix & & * a = = * a_prefix ) {
a + + ;
a_prefix + + ;
}
return * a_prefix ? NULL : a ;
}
/*
* In order to implement different sets of xattr operations for each xattr
* prefix with the generic xattr API , a filesystem should create a
* null - terminated array of struct xattr_handler ( one for each prefix ) and
* hang a pointer to it off of the s_xattr field of the superblock .
*
* The generic_fooxattr ( ) functions will use this list to dispatch xattr
* operations to the correct xattr_handler .
*/
# define for_each_xattr_handler(handlers, handler) \
for ( ( handler ) = * ( handlers ) + + ; \
( handler ) ! = NULL ; \
( handler ) = * ( handlers ) + + )
/*
* Find the xattr_handler with the matching prefix .
*/
static struct xattr_handler *
xattr_resolve_name ( struct xattr_handler * * handlers , const char * * name )
{
struct xattr_handler * handler ;
if ( ! * name )
return NULL ;
for_each_xattr_handler ( handlers , handler ) {
const char * n = strcmp_prefix ( * name , handler - > prefix ) ;
if ( n ) {
* name = n ;
break ;
}
}
return handler ;
}
/*
* Find the handler for the prefix and dispatch its get ( ) operation .
*/
ssize_t
generic_getxattr ( struct dentry * dentry , const char * name , void * buffer , size_t size )
{
struct xattr_handler * handler ;
struct inode * inode = dentry - > d_inode ;
handler = xattr_resolve_name ( inode - > i_sb - > s_xattr , & name ) ;
if ( ! handler )
return - EOPNOTSUPP ;
return handler - > get ( inode , name , buffer , size ) ;
}
/*
* Combine the results of the list ( ) operation from every xattr_handler in the
* list .
*/
ssize_t
generic_listxattr ( struct dentry * dentry , char * buffer , size_t buffer_size )
{
struct inode * inode = dentry - > d_inode ;
struct xattr_handler * handler , * * handlers = inode - > i_sb - > s_xattr ;
unsigned int size = 0 ;
if ( ! buffer ) {
for_each_xattr_handler ( handlers , handler )
size + = handler - > list ( inode , NULL , 0 , NULL , 0 ) ;
} else {
char * buf = buffer ;
for_each_xattr_handler ( handlers , handler ) {
size = handler - > list ( inode , buf , buffer_size , NULL , 0 ) ;
if ( size > buffer_size )
return - ERANGE ;
buf + = size ;
buffer_size - = size ;
}
size = buf - buffer ;
}
return size ;
}
/*
* Find the handler for the prefix and dispatch its set ( ) operation .
*/
int
generic_setxattr ( struct dentry * dentry , const char * name , const void * value , size_t size , int flags )
{
struct xattr_handler * handler ;
struct inode * inode = dentry - > d_inode ;
if ( size = = 0 )
value = " " ; /* empty EA, do not remove */
handler = xattr_resolve_name ( inode - > i_sb - > s_xattr , & name ) ;
if ( ! handler )
return - EOPNOTSUPP ;
return handler - > set ( inode , name , value , size , flags ) ;
}
/*
* Find the handler for the prefix and dispatch its set ( ) operation to remove
* any associated extended attribute .
*/
int
generic_removexattr ( struct dentry * dentry , const char * name )
{
struct xattr_handler * handler ;
struct inode * inode = dentry - > d_inode ;
handler = xattr_resolve_name ( inode - > i_sb - > s_xattr , & name ) ;
if ( ! handler )
return - EOPNOTSUPP ;
return handler - > set ( inode , name , NULL , 0 , XATTR_REPLACE ) ;
}
EXPORT_SYMBOL ( generic_getxattr ) ;
EXPORT_SYMBOL ( generic_listxattr ) ;
EXPORT_SYMBOL ( generic_setxattr ) ;
EXPORT_SYMBOL ( generic_removexattr ) ;