2005-04-16 16:20:36 -06:00
|
|
|
/*
|
|
|
|
File: fs/xattr.c
|
|
|
|
|
|
|
|
Extended attribute handling.
|
|
|
|
|
|
|
|
Copyright (C) 2001 by Andreas Gruenbacher <a.gruenbacher@computer.org>
|
|
|
|
Copyright (C) 2001 SGI - Silicon Graphics, Inc <linux-xfs@oss.sgi.com>
|
|
|
|
Copyright (c) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
|
|
|
|
*/
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/smp_lock.h>
|
|
|
|
#include <linux/file.h>
|
|
|
|
#include <linux/xattr.h>
|
|
|
|
#include <linux/namei.h>
|
|
|
|
#include <linux/security.h>
|
|
|
|
#include <linux/syscalls.h>
|
|
|
|
#include <linux/module.h>
|
[PATCH] inotify
inotify is intended to correct the deficiencies of dnotify, particularly
its inability to scale and its terrible user interface:
* dnotify requires the opening of one fd per each directory
that you intend to watch. This quickly results in too many
open files and pins removable media, preventing unmount.
* dnotify is directory-based. You only learn about changes to
directories. Sure, a change to a file in a directory affects
the directory, but you are then forced to keep a cache of
stat structures.
* dnotify's interface to user-space is awful. Signals?
inotify provides a more usable, simple, powerful solution to file change
notification:
* inotify's interface is a system call that returns a fd, not SIGIO.
You get a single fd, which is select()-able.
* inotify has an event that says "the filesystem that the item
you were watching is on was unmounted."
* inotify can watch directories or files.
Inotify is currently used by Beagle (a desktop search infrastructure),
Gamin (a FAM replacement), and other projects.
See Documentation/filesystems/inotify.txt.
Signed-off-by: Robert Love <rml@novell.com>
Cc: John McCutchan <ttb@tentacle.dhs.org>
Cc: Christoph Hellwig <hch@lst.de>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-07-12 15:06:03 -06:00
|
|
|
#include <linux/fsnotify.h>
|
2005-11-03 09:00:25 -07:00
|
|
|
#include <linux/audit.h>
|
2005-04-16 16:20:36 -06:00
|
|
|
#include <asm/uaccess.h>
|
|
|
|
|
2006-01-09 21:51:55 -07:00
|
|
|
|
2006-01-09 21:51:56 -07:00
|
|
|
/*
|
|
|
|
* Check permissions for extended attribute access. This is a bit complicated
|
|
|
|
* because different namespaces have very different rules.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
xattr_permission(struct inode *inode, const char *name, int mask)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* We can never set or remove an extended attribute on a read-only
|
|
|
|
* filesystem or on an immutable / append-only inode.
|
|
|
|
*/
|
|
|
|
if (mask & MAY_WRITE) {
|
|
|
|
if (IS_RDONLY(inode))
|
|
|
|
return -EROFS;
|
|
|
|
if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
|
|
|
|
return -EPERM;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* No restriction for security.* and system.* from the VFS. Decision
|
|
|
|
* on these is left to the underlying filesystem / security module.
|
|
|
|
*/
|
|
|
|
if (!strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) ||
|
|
|
|
!strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The trusted.* namespace can only accessed by a privilegued user.
|
|
|
|
*/
|
|
|
|
if (!strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN))
|
|
|
|
return (capable(CAP_SYS_ADMIN) ? 0 : -EPERM);
|
|
|
|
|
|
|
|
if (!strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) {
|
|
|
|
if (!S_ISREG(inode->i_mode) &&
|
|
|
|
(!S_ISDIR(inode->i_mode) || inode->i_mode & S_ISVTX))
|
|
|
|
return -EPERM;
|
|
|
|
}
|
|
|
|
|
|
|
|
return permission(inode, mask, NULL);
|
|
|
|
}
|
|
|
|
|
2006-01-09 21:51:55 -07:00
|
|
|
int
|
|
|
|
vfs_setxattr(struct dentry *dentry, char *name, void *value,
|
|
|
|
size_t size, int flags)
|
|
|
|
{
|
|
|
|
struct inode *inode = dentry->d_inode;
|
|
|
|
int error;
|
|
|
|
|
2006-01-09 21:51:56 -07:00
|
|
|
error = xattr_permission(inode, name, MAY_WRITE);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
|
2006-01-09 21:51:55 -07:00
|
|
|
mutex_lock(&inode->i_mutex);
|
|
|
|
error = security_inode_setxattr(dentry, name, value, size, flags);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
error = -EOPNOTSUPP;
|
|
|
|
if (inode->i_op->setxattr) {
|
|
|
|
error = inode->i_op->setxattr(dentry, name, value, size, flags);
|
|
|
|
if (!error) {
|
|
|
|
fsnotify_xattr(dentry);
|
|
|
|
security_inode_post_setxattr(dentry, name, value,
|
|
|
|
size, flags);
|
|
|
|
}
|
|
|
|
} else if (!strncmp(name, XATTR_SECURITY_PREFIX,
|
2006-01-09 21:51:56 -07:00
|
|
|
XATTR_SECURITY_PREFIX_LEN)) {
|
|
|
|
const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
|
2006-01-09 21:51:55 -07:00
|
|
|
error = security_inode_setsecurity(inode, suffix, value,
|
|
|
|
size, flags);
|
|
|
|
if (!error)
|
|
|
|
fsnotify_xattr(dentry);
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
mutex_unlock(&inode->i_mutex);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(vfs_setxattr);
|
|
|
|
|
|
|
|
ssize_t
|
|
|
|
vfs_getxattr(struct dentry *dentry, char *name, void *value, size_t size)
|
|
|
|
{
|
|
|
|
struct inode *inode = dentry->d_inode;
|
|
|
|
int error;
|
|
|
|
|
2006-01-09 21:51:56 -07:00
|
|
|
error = xattr_permission(inode, name, MAY_READ);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
|
2006-01-09 21:51:55 -07:00
|
|
|
error = security_inode_getxattr(dentry, name);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
|
|
|
|
if (inode->i_op->getxattr)
|
|
|
|
error = inode->i_op->getxattr(dentry, name, value, size);
|
|
|
|
else
|
|
|
|
error = -EOPNOTSUPP;
|
|
|
|
|
|
|
|
if (!strncmp(name, XATTR_SECURITY_PREFIX,
|
2006-01-09 21:51:56 -07:00
|
|
|
XATTR_SECURITY_PREFIX_LEN)) {
|
|
|
|
const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
|
2006-01-09 21:51:55 -07:00
|
|
|
int ret = security_inode_getsecurity(inode, suffix, value,
|
|
|
|
size, error);
|
|
|
|
/*
|
|
|
|
* Only overwrite the return value if a security module
|
|
|
|
* is actually active.
|
|
|
|
*/
|
|
|
|
if (ret != -EOPNOTSUPP)
|
|
|
|
error = ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(vfs_getxattr);
|
|
|
|
|
|
|
|
int
|
|
|
|
vfs_removexattr(struct dentry *dentry, char *name)
|
|
|
|
{
|
|
|
|
struct inode *inode = dentry->d_inode;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if (!inode->i_op->removexattr)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2006-01-09 21:51:56 -07:00
|
|
|
error = xattr_permission(inode, name, MAY_WRITE);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
|
2006-01-09 21:51:55 -07:00
|
|
|
error = security_inode_removexattr(dentry, name);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
|
|
|
|
mutex_lock(&inode->i_mutex);
|
|
|
|
error = inode->i_op->removexattr(dentry, name);
|
|
|
|
mutex_unlock(&inode->i_mutex);
|
|
|
|
|
|
|
|
if (!error)
|
|
|
|
fsnotify_xattr(dentry);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(vfs_removexattr);
|
|
|
|
|
|
|
|
|
2005-04-16 16:20:36 -06:00
|
|
|
/*
|
|
|
|
* Extended attribute SET operations
|
|
|
|
*/
|
|
|
|
static long
|
|
|
|
setxattr(struct dentry *d, char __user *name, void __user *value,
|
|
|
|
size_t size, int flags)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
void *kvalue = NULL;
|
|
|
|
char kname[XATTR_NAME_MAX + 1];
|
|
|
|
|
|
|
|
if (flags & ~(XATTR_CREATE|XATTR_REPLACE))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
error = strncpy_from_user(kname, name, sizeof(kname));
|
|
|
|
if (error == 0 || error == sizeof(kname))
|
|
|
|
error = -ERANGE;
|
|
|
|
if (error < 0)
|
|
|
|
return error;
|
|
|
|
|
|
|
|
if (size) {
|
|
|
|
if (size > XATTR_SIZE_MAX)
|
|
|
|
return -E2BIG;
|
|
|
|
kvalue = kmalloc(size, GFP_KERNEL);
|
|
|
|
if (!kvalue)
|
|
|
|
return -ENOMEM;
|
|
|
|
if (copy_from_user(kvalue, value, size)) {
|
|
|
|
kfree(kvalue);
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-01-09 21:51:55 -07:00
|
|
|
error = vfs_setxattr(d, kname, kvalue, size, flags);
|
2005-11-07 02:01:34 -07:00
|
|
|
kfree(kvalue);
|
2005-04-16 16:20:36 -06:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage long
|
|
|
|
sys_setxattr(char __user *path, char __user *name, void __user *value,
|
|
|
|
size_t size, int flags)
|
|
|
|
{
|
|
|
|
struct nameidata nd;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = user_path_walk(path, &nd);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
error = setxattr(nd.dentry, name, value, size, flags);
|
|
|
|
path_release(&nd);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage long
|
|
|
|
sys_lsetxattr(char __user *path, char __user *name, void __user *value,
|
|
|
|
size_t size, int flags)
|
|
|
|
{
|
|
|
|
struct nameidata nd;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = user_path_walk_link(path, &nd);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
error = setxattr(nd.dentry, name, value, size, flags);
|
|
|
|
path_release(&nd);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage long
|
|
|
|
sys_fsetxattr(int fd, char __user *name, void __user *value,
|
|
|
|
size_t size, int flags)
|
|
|
|
{
|
|
|
|
struct file *f;
|
2005-11-03 09:00:25 -07:00
|
|
|
struct dentry *dentry;
|
2005-04-16 16:20:36 -06:00
|
|
|
int error = -EBADF;
|
|
|
|
|
|
|
|
f = fget(fd);
|
|
|
|
if (!f)
|
|
|
|
return error;
|
2005-11-03 09:00:25 -07:00
|
|
|
dentry = f->f_dentry;
|
|
|
|
audit_inode(NULL, dentry->d_inode, 0);
|
|
|
|
error = setxattr(dentry, name, value, size, flags);
|
2005-04-16 16:20:36 -06:00
|
|
|
fput(f);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Extended attribute GET operations
|
|
|
|
*/
|
|
|
|
static ssize_t
|
|
|
|
getxattr(struct dentry *d, char __user *name, void __user *value, size_t size)
|
|
|
|
{
|
|
|
|
ssize_t error;
|
|
|
|
void *kvalue = NULL;
|
|
|
|
char kname[XATTR_NAME_MAX + 1];
|
|
|
|
|
|
|
|
error = strncpy_from_user(kname, name, sizeof(kname));
|
|
|
|
if (error == 0 || error == sizeof(kname))
|
|
|
|
error = -ERANGE;
|
|
|
|
if (error < 0)
|
|
|
|
return error;
|
|
|
|
|
|
|
|
if (size) {
|
|
|
|
if (size > XATTR_SIZE_MAX)
|
|
|
|
size = XATTR_SIZE_MAX;
|
2005-10-30 15:59:22 -07:00
|
|
|
kvalue = kzalloc(size, GFP_KERNEL);
|
2005-04-16 16:20:36 -06:00
|
|
|
if (!kvalue)
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2006-01-09 21:51:55 -07:00
|
|
|
error = vfs_getxattr(d, kname, kvalue, size);
|
2005-09-03 16:55:18 -06:00
|
|
|
if (error > 0) {
|
|
|
|
if (size && copy_to_user(value, kvalue, error))
|
|
|
|
error = -EFAULT;
|
|
|
|
} else if (error == -ERANGE && size >= XATTR_SIZE_MAX) {
|
|
|
|
/* The file system tried to returned a value bigger
|
|
|
|
than XATTR_SIZE_MAX bytes. Not possible. */
|
|
|
|
error = -E2BIG;
|
2005-04-16 16:20:36 -06:00
|
|
|
}
|
2005-11-07 02:01:34 -07:00
|
|
|
kfree(kvalue);
|
2005-04-16 16:20:36 -06:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage ssize_t
|
|
|
|
sys_getxattr(char __user *path, char __user *name, void __user *value,
|
|
|
|
size_t size)
|
|
|
|
{
|
|
|
|
struct nameidata nd;
|
|
|
|
ssize_t error;
|
|
|
|
|
|
|
|
error = user_path_walk(path, &nd);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
error = getxattr(nd.dentry, name, value, size);
|
|
|
|
path_release(&nd);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage ssize_t
|
|
|
|
sys_lgetxattr(char __user *path, char __user *name, void __user *value,
|
|
|
|
size_t size)
|
|
|
|
{
|
|
|
|
struct nameidata nd;
|
|
|
|
ssize_t error;
|
|
|
|
|
|
|
|
error = user_path_walk_link(path, &nd);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
error = getxattr(nd.dentry, name, value, size);
|
|
|
|
path_release(&nd);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage ssize_t
|
|
|
|
sys_fgetxattr(int fd, char __user *name, void __user *value, size_t size)
|
|
|
|
{
|
|
|
|
struct file *f;
|
|
|
|
ssize_t error = -EBADF;
|
|
|
|
|
|
|
|
f = fget(fd);
|
|
|
|
if (!f)
|
|
|
|
return error;
|
|
|
|
error = getxattr(f->f_dentry, name, value, size);
|
|
|
|
fput(f);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Extended attribute LIST operations
|
|
|
|
*/
|
|
|
|
static ssize_t
|
|
|
|
listxattr(struct dentry *d, char __user *list, size_t size)
|
|
|
|
{
|
|
|
|
ssize_t error;
|
|
|
|
char *klist = NULL;
|
|
|
|
|
|
|
|
if (size) {
|
|
|
|
if (size > XATTR_LIST_MAX)
|
|
|
|
size = XATTR_LIST_MAX;
|
|
|
|
klist = kmalloc(size, GFP_KERNEL);
|
|
|
|
if (!klist)
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2005-09-03 16:55:18 -06:00
|
|
|
error = security_inode_listxattr(d);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
2005-04-16 16:20:36 -06:00
|
|
|
error = -EOPNOTSUPP;
|
|
|
|
if (d->d_inode->i_op && d->d_inode->i_op->listxattr) {
|
|
|
|
error = d->d_inode->i_op->listxattr(d, klist, size);
|
2005-09-03 16:55:18 -06:00
|
|
|
} else {
|
|
|
|
error = security_inode_listsecurity(d->d_inode, klist, size);
|
[PATCH] Fix listxattr() for generic security attributes
Commit f549d6c18c0e8e6cf1bf0e7a47acc1daf7e2cec1 introduced a generic
fallback for security xattrs, but appears to include a subtle bug.
Gentoo users with kernels with selinux compiled in, and coreutils compiled
with acl support, noticed that they could not copy files on tmpfs using
'cp'.
cp (compiled with acl support) copies the file, lists the extended
attributes on the old file, copies them all to the new file, and then
exits. However the listxattr() calls were failing with this odd behaviour:
llistxattr("a.out", (nil), 0) = 17
llistxattr("a.out", 0x7fffff8c6cb0, 17) = -1 ERANGE (Numerical result out of
range)
I believe this is a simple problem in the logic used to check the buffer
sizes; if the user sends a buffer the exact size of the data, then its ok
:)
This change solves the problem.
More info can be found at http://bugs.gentoo.org/113138
Signed-off-by: Daniel Drake <dsd@gentoo.org>
Acked-by: James Morris <jmorris@namei.org>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-12-12 01:37:08 -07:00
|
|
|
if (size && error > size)
|
2005-09-03 16:55:18 -06:00
|
|
|
error = -ERANGE;
|
|
|
|
}
|
|
|
|
if (error > 0) {
|
|
|
|
if (size && copy_to_user(list, klist, error))
|
|
|
|
error = -EFAULT;
|
|
|
|
} else if (error == -ERANGE && size >= XATTR_LIST_MAX) {
|
|
|
|
/* The file system tried to returned a list bigger
|
|
|
|
than XATTR_LIST_MAX bytes. Not possible. */
|
|
|
|
error = -E2BIG;
|
2005-04-16 16:20:36 -06:00
|
|
|
}
|
|
|
|
out:
|
2005-11-07 02:01:34 -07:00
|
|
|
kfree(klist);
|
2005-04-16 16:20:36 -06:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage ssize_t
|
|
|
|
sys_listxattr(char __user *path, char __user *list, size_t size)
|
|
|
|
{
|
|
|
|
struct nameidata nd;
|
|
|
|
ssize_t error;
|
|
|
|
|
|
|
|
error = user_path_walk(path, &nd);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
error = listxattr(nd.dentry, list, size);
|
|
|
|
path_release(&nd);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage ssize_t
|
|
|
|
sys_llistxattr(char __user *path, char __user *list, size_t size)
|
|
|
|
{
|
|
|
|
struct nameidata nd;
|
|
|
|
ssize_t error;
|
|
|
|
|
|
|
|
error = user_path_walk_link(path, &nd);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
error = listxattr(nd.dentry, list, size);
|
|
|
|
path_release(&nd);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage ssize_t
|
|
|
|
sys_flistxattr(int fd, char __user *list, size_t size)
|
|
|
|
{
|
|
|
|
struct file *f;
|
|
|
|
ssize_t error = -EBADF;
|
|
|
|
|
|
|
|
f = fget(fd);
|
|
|
|
if (!f)
|
|
|
|
return error;
|
|
|
|
error = listxattr(f->f_dentry, list, size);
|
|
|
|
fput(f);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Extended attribute REMOVE operations
|
|
|
|
*/
|
|
|
|
static long
|
|
|
|
removexattr(struct dentry *d, char __user *name)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
char kname[XATTR_NAME_MAX + 1];
|
|
|
|
|
|
|
|
error = strncpy_from_user(kname, name, sizeof(kname));
|
|
|
|
if (error == 0 || error == sizeof(kname))
|
|
|
|
error = -ERANGE;
|
|
|
|
if (error < 0)
|
|
|
|
return error;
|
|
|
|
|
2006-01-09 21:51:55 -07:00
|
|
|
return vfs_removexattr(d, kname);
|
2005-04-16 16:20:36 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage long
|
|
|
|
sys_removexattr(char __user *path, char __user *name)
|
|
|
|
{
|
|
|
|
struct nameidata nd;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = user_path_walk(path, &nd);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
error = removexattr(nd.dentry, name);
|
|
|
|
path_release(&nd);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage long
|
|
|
|
sys_lremovexattr(char __user *path, char __user *name)
|
|
|
|
{
|
|
|
|
struct nameidata nd;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = user_path_walk_link(path, &nd);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
error = removexattr(nd.dentry, name);
|
|
|
|
path_release(&nd);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
asmlinkage long
|
|
|
|
sys_fremovexattr(int fd, char __user *name)
|
|
|
|
{
|
|
|
|
struct file *f;
|
2005-11-03 09:00:25 -07:00
|
|
|
struct dentry *dentry;
|
2005-04-16 16:20:36 -06:00
|
|
|
int error = -EBADF;
|
|
|
|
|
|
|
|
f = fget(fd);
|
|
|
|
if (!f)
|
|
|
|
return error;
|
2005-11-03 09:00:25 -07:00
|
|
|
dentry = f->f_dentry;
|
|
|
|
audit_inode(NULL, dentry->d_inode, 0);
|
|
|
|
error = removexattr(dentry, name);
|
2005-04-16 16:20:36 -06:00
|
|
|
fput(f);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static const char *
|
|
|
|
strcmp_prefix(const char *a, const char *a_prefix)
|
|
|
|
{
|
|
|
|
while (*a_prefix && *a == *a_prefix) {
|
|
|
|
a++;
|
|
|
|
a_prefix++;
|
|
|
|
}
|
|
|
|
return *a_prefix ? NULL : a;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* In order to implement different sets of xattr operations for each xattr
|
|
|
|
* prefix with the generic xattr API, a filesystem should create a
|
|
|
|
* null-terminated array of struct xattr_handler (one for each prefix) and
|
|
|
|
* hang a pointer to it off of the s_xattr field of the superblock.
|
|
|
|
*
|
|
|
|
* The generic_fooxattr() functions will use this list to dispatch xattr
|
|
|
|
* operations to the correct xattr_handler.
|
|
|
|
*/
|
|
|
|
#define for_each_xattr_handler(handlers, handler) \
|
|
|
|
for ((handler) = *(handlers)++; \
|
|
|
|
(handler) != NULL; \
|
|
|
|
(handler) = *(handlers)++)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find the xattr_handler with the matching prefix.
|
|
|
|
*/
|
|
|
|
static struct xattr_handler *
|
|
|
|
xattr_resolve_name(struct xattr_handler **handlers, const char **name)
|
|
|
|
{
|
|
|
|
struct xattr_handler *handler;
|
|
|
|
|
|
|
|
if (!*name)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
for_each_xattr_handler(handlers, handler) {
|
|
|
|
const char *n = strcmp_prefix(*name, handler->prefix);
|
|
|
|
if (n) {
|
|
|
|
*name = n;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return handler;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find the handler for the prefix and dispatch its get() operation.
|
|
|
|
*/
|
|
|
|
ssize_t
|
|
|
|
generic_getxattr(struct dentry *dentry, const char *name, void *buffer, size_t size)
|
|
|
|
{
|
|
|
|
struct xattr_handler *handler;
|
|
|
|
struct inode *inode = dentry->d_inode;
|
|
|
|
|
|
|
|
handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
|
|
|
|
if (!handler)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
return handler->get(inode, name, buffer, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Combine the results of the list() operation from every xattr_handler in the
|
|
|
|
* list.
|
|
|
|
*/
|
|
|
|
ssize_t
|
|
|
|
generic_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
|
|
|
|
{
|
|
|
|
struct inode *inode = dentry->d_inode;
|
|
|
|
struct xattr_handler *handler, **handlers = inode->i_sb->s_xattr;
|
|
|
|
unsigned int size = 0;
|
|
|
|
|
|
|
|
if (!buffer) {
|
|
|
|
for_each_xattr_handler(handlers, handler)
|
|
|
|
size += handler->list(inode, NULL, 0, NULL, 0);
|
|
|
|
} else {
|
|
|
|
char *buf = buffer;
|
|
|
|
|
|
|
|
for_each_xattr_handler(handlers, handler) {
|
|
|
|
size = handler->list(inode, buf, buffer_size, NULL, 0);
|
|
|
|
if (size > buffer_size)
|
|
|
|
return -ERANGE;
|
|
|
|
buf += size;
|
|
|
|
buffer_size -= size;
|
|
|
|
}
|
|
|
|
size = buf - buffer;
|
|
|
|
}
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find the handler for the prefix and dispatch its set() operation.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
generic_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags)
|
|
|
|
{
|
|
|
|
struct xattr_handler *handler;
|
|
|
|
struct inode *inode = dentry->d_inode;
|
|
|
|
|
|
|
|
if (size == 0)
|
|
|
|
value = ""; /* empty EA, do not remove */
|
|
|
|
handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
|
|
|
|
if (!handler)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
return handler->set(inode, name, value, size, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find the handler for the prefix and dispatch its set() operation to remove
|
|
|
|
* any associated extended attribute.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
generic_removexattr(struct dentry *dentry, const char *name)
|
|
|
|
{
|
|
|
|
struct xattr_handler *handler;
|
|
|
|
struct inode *inode = dentry->d_inode;
|
|
|
|
|
|
|
|
handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
|
|
|
|
if (!handler)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
return handler->set(inode, name, NULL, 0, XATTR_REPLACE);
|
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT_SYMBOL(generic_getxattr);
|
|
|
|
EXPORT_SYMBOL(generic_listxattr);
|
|
|
|
EXPORT_SYMBOL(generic_setxattr);
|
|
|
|
EXPORT_SYMBOL(generic_removexattr);
|