ext2fs_xattr.c revision 1.3 1 1.3 jdolecek /* $NetBSD: ext2fs_xattr.c,v 1.3 2016/08/14 11:40:31 jdolecek Exp $ */
2 1.1 jdolecek
3 1.1 jdolecek /*-
4 1.1 jdolecek * Copyright (c) 2016 The NetBSD Foundation, Inc.
5 1.1 jdolecek * All rights reserved.
6 1.1 jdolecek *
7 1.1 jdolecek * This code is derived from software contributed to The NetBSD Foundation
8 1.1 jdolecek * by Jaromir Dolecek.
9 1.1 jdolecek *
10 1.1 jdolecek * Redistribution and use in source and binary forms, with or without
11 1.1 jdolecek * modification, are permitted provided that the following conditions
12 1.1 jdolecek * are met:
13 1.1 jdolecek * 1. Redistributions of source code must retain the above copyright
14 1.1 jdolecek * notice, this list of conditions and the following disclaimer.
15 1.1 jdolecek * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 jdolecek * notice, this list of conditions and the following disclaimer in the
17 1.1 jdolecek * documentation and/or other materials provided with the distribution.
18 1.1 jdolecek *
19 1.1 jdolecek * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 jdolecek * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 jdolecek * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 jdolecek * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 jdolecek * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 jdolecek * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 jdolecek * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 jdolecek * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 jdolecek * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 jdolecek * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 jdolecek * POSSIBILITY OF SUCH DAMAGE.
30 1.1 jdolecek */
31 1.1 jdolecek
32 1.1 jdolecek #include <sys/cdefs.h>
33 1.3 jdolecek __KERNEL_RCSID(0, "$NetBSD: ext2fs_xattr.c,v 1.3 2016/08/14 11:40:31 jdolecek Exp $");
34 1.1 jdolecek
35 1.1 jdolecek #include <sys/param.h>
36 1.1 jdolecek #include <sys/systm.h>
37 1.1 jdolecek #include <sys/mount.h>
38 1.1 jdolecek #include <sys/proc.h>
39 1.1 jdolecek #include <sys/file.h>
40 1.1 jdolecek #include <sys/buf.h>
41 1.1 jdolecek #include <sys/vnode.h>
42 1.1 jdolecek #include <sys/kernel.h>
43 1.1 jdolecek #include <sys/kmem.h>
44 1.1 jdolecek #include <sys/trace.h>
45 1.1 jdolecek #include <sys/resourcevar.h>
46 1.1 jdolecek #include <sys/kauth.h>
47 1.1 jdolecek #include <sys/extattr.h>
48 1.1 jdolecek
49 1.1 jdolecek #include <ufs/ufs/inode.h>
50 1.1 jdolecek #include <ufs/ufs/ufsmount.h>
51 1.1 jdolecek #include <ufs/ufs/ufs_extern.h>
52 1.1 jdolecek
53 1.1 jdolecek #include <ufs/ext2fs/ext2fs.h>
54 1.1 jdolecek #include <ufs/ext2fs/ext2fs_extern.h>
55 1.1 jdolecek #include <ufs/ext2fs/ext2fs_xattr.h>
56 1.1 jdolecek
57 1.1 jdolecek static const char * const xattr_prefix_index[] = {
58 1.1 jdolecek "",
59 1.1 jdolecek "user.",
60 1.1 jdolecek "system.posix_acl_access",
61 1.1 jdolecek "system.posix_acl_default",
62 1.1 jdolecek "trusted.",
63 1.1 jdolecek "", /* unused */
64 1.1 jdolecek "security",
65 1.1 jdolecek "system.",
66 1.1 jdolecek "system.richacl",
67 1.1 jdolecek "c",
68 1.1 jdolecek };
69 1.1 jdolecek
70 1.1 jdolecek static int
71 1.1 jdolecek ext2fs_find_xattr(struct ext2fs_xattr_entry *e, uint8_t *start, uint8_t *end, int attrnamespace, struct uio *uio, size_t *size, uint8_t name_index, const char *name)
72 1.1 jdolecek {
73 1.1 jdolecek uint8_t *value;
74 1.1 jdolecek int error;
75 1.1 jdolecek size_t value_offs, value_len, len, old_len;
76 1.1 jdolecek
77 1.1 jdolecek /*
78 1.1 jdolecek * Individual entries follow the header. Each is aligned on 4-byte
79 1.1 jdolecek * boundary.
80 1.1 jdolecek */
81 1.1 jdolecek for(; !EXT2FS_XATTR_IS_LAST_ENTRY(e, end); e = EXT2FS_XATTR_NEXT(e)) {
82 1.1 jdolecek /*
83 1.1 jdolecek * Only EXT2FS_XATTR_PREFIX_USER is USER, anything else
84 1.1 jdolecek * is considered SYSTEM.
85 1.1 jdolecek */
86 1.1 jdolecek if ((attrnamespace == EXTATTR_NAMESPACE_USER && e->e_name_index != EXT2FS_XATTR_PREFIX_USER) ||
87 1.1 jdolecek (attrnamespace == EXTATTR_NAMESPACE_SYSTEM && e->e_name_index == EXT2FS_XATTR_PREFIX_USER)) {
88 1.1 jdolecek continue;
89 1.1 jdolecek }
90 1.1 jdolecek
91 1.1 jdolecek if (e->e_name_index != name_index ||
92 1.1 jdolecek e->e_name_len != strlen(name) ||
93 1.1 jdolecek strncmp(e->e_name, name, e->e_name_len) != 0)
94 1.1 jdolecek continue;
95 1.1 jdolecek
96 1.1 jdolecek value_offs = fs2h32(e->e_value_offs);
97 1.1 jdolecek value_len = fs2h32(e->e_value_size);
98 1.1 jdolecek value = &start[value_offs];
99 1.1 jdolecek
100 1.1 jdolecek /* make sure the value offset are sane */
101 1.1 jdolecek if (&value[value_len] > end)
102 1.2 christos return EINVAL;
103 1.1 jdolecek
104 1.1 jdolecek if (uio != NULL) {
105 1.1 jdolecek /*
106 1.1 jdolecek * Figure out maximum to transfer -- use buffer size and
107 1.1 jdolecek * local data limit.
108 1.1 jdolecek */
109 1.1 jdolecek len = MIN(uio->uio_resid, value_len);
110 1.1 jdolecek old_len = uio->uio_resid;
111 1.1 jdolecek uio->uio_resid = len;
112 1.1 jdolecek
113 1.1 jdolecek uio->uio_resid = old_len - (len - uio->uio_resid);
114 1.1 jdolecek
115 1.1 jdolecek error = uiomove(value, value_len, uio);
116 1.1 jdolecek if (error)
117 1.1 jdolecek return error;
118 1.1 jdolecek }
119 1.1 jdolecek
120 1.1 jdolecek /* full data size */
121 1.1 jdolecek *size += value_len;
122 1.1 jdolecek
123 1.1 jdolecek goto found;
124 1.1 jdolecek }
125 1.1 jdolecek
126 1.1 jdolecek /* requested attribute not found */
127 1.2 christos return ENODATA;
128 1.1 jdolecek
129 1.1 jdolecek found:
130 1.2 christos return 0;
131 1.1 jdolecek }
132 1.1 jdolecek
133 1.1 jdolecek static int
134 1.1 jdolecek ext2fs_get_inode_xattr(struct inode *ip, int attrnamespace, struct uio *uio, size_t *size, uint8_t name_index, const char *name)
135 1.1 jdolecek {
136 1.1 jdolecek struct ext2fs_dinode *di = ip->i_din.e2fs_din;
137 1.1 jdolecek struct ext2fs_xattr_ibody_header *h;
138 1.1 jdolecek uint8_t *start, *end;
139 1.1 jdolecek
140 1.1 jdolecek start = &((uint8_t *)di)[EXT2_REV0_DINODE_SIZE + di->e2di_extra_isize];
141 1.1 jdolecek h = (struct ext2fs_xattr_ibody_header *)start;
142 1.1 jdolecek end = &((uint8_t *)di)[EXT2_DINODE_SIZE(ip->i_e2fs)];
143 1.1 jdolecek
144 1.1 jdolecek if (end <= start || fs2h32(h->h_magic) != EXT2FS_XATTR_MAGIC)
145 1.2 christos return ENODATA;
146 1.1 jdolecek
147 1.1 jdolecek return ext2fs_find_xattr(EXT2FS_XATTR_IFIRST(h), start, end, attrnamespace, uio, size, name_index, name);
148 1.1 jdolecek }
149 1.1 jdolecek
150 1.1 jdolecek static int
151 1.1 jdolecek ext2fs_get_block_xattr(struct inode *ip, int attrnamespace, struct uio *uio, size_t *size, uint8_t name_index, const char *name)
152 1.1 jdolecek {
153 1.1 jdolecek struct ext2fs_dinode *di = ip->i_din.e2fs_din;
154 1.1 jdolecek uint8_t *start, *end;
155 1.1 jdolecek struct ext2fs_xattr_header *h;
156 1.1 jdolecek int error = 0;
157 1.1 jdolecek struct buf *bp = NULL;
158 1.1 jdolecek daddr_t xblk;
159 1.1 jdolecek
160 1.1 jdolecek xblk = di->e2di_facl;
161 1.3 jdolecek if (EXT2F_HAS_INCOMPAT_FEATURE(ip->i_e2fs, EXT2F_INCOMPAT_64BIT))
162 1.1 jdolecek xblk |= (((daddr_t)di->e2di_facl_high) << 32);
163 1.1 jdolecek
164 1.1 jdolecek /* don't do anything if no attr block was allocated */
165 1.1 jdolecek if (xblk == 0)
166 1.2 christos return 0;
167 1.1 jdolecek
168 1.1 jdolecek error = bread(ip->i_devvp, fsbtodb(ip->i_e2fs, xblk), (int)ip->i_e2fs->e2fs_bsize, 0, &bp);
169 1.1 jdolecek if (error)
170 1.1 jdolecek goto out;
171 1.1 jdolecek
172 1.1 jdolecek start = (uint8_t *)bp->b_data;
173 1.1 jdolecek h = (struct ext2fs_xattr_header *)start;
174 1.1 jdolecek end = &((uint8_t *)bp->b_data)[bp->b_bcount];
175 1.1 jdolecek
176 1.1 jdolecek if (end <= start || fs2h32(h->h_magic) != EXT2FS_XATTR_MAGIC)
177 1.1 jdolecek goto out;
178 1.1 jdolecek
179 1.1 jdolecek error = ext2fs_find_xattr(EXT2FS_XATTR_BFIRST(h), start, end, attrnamespace, uio, size, name_index, name);
180 1.1 jdolecek
181 1.1 jdolecek out:
182 1.1 jdolecek if (bp)
183 1.1 jdolecek brelse(bp, 0);
184 1.2 christos return error;
185 1.1 jdolecek }
186 1.1 jdolecek int
187 1.1 jdolecek ext2fs_getextattr(void *v)
188 1.1 jdolecek {
189 1.1 jdolecek struct vop_getextattr_args /* {
190 1.1 jdolecek const struct vnodeop_desc *a_desc;
191 1.1 jdolecek struct vnode *a_vp;
192 1.1 jdolecek int a_attrnamespace;
193 1.1 jdolecek const char *a_name;
194 1.1 jdolecek struct uio *a_uio;
195 1.1 jdolecek size_t *a_size;
196 1.1 jdolecek kauth_cred_t a_cred;
197 1.1 jdolecek } */ *ap = v;
198 1.1 jdolecek struct inode *ip = VTOI(ap->a_vp);
199 1.1 jdolecek char namebuf[EXT2FS_XATTR_NAME_LEN_MAX + 1];
200 1.1 jdolecek int error, i;
201 1.1 jdolecek const char *prefix, *name;
202 1.1 jdolecek uint8_t name_index;
203 1.1 jdolecek size_t name_match, valuesize = 0;
204 1.1 jdolecek
205 1.1 jdolecek if (ap->a_attrnamespace == EXTATTR_NAMESPACE_USER)
206 1.1 jdolecek prefix = xattr_prefix_index[EXT2FS_XATTR_PREFIX_USER];
207 1.1 jdolecek else
208 1.1 jdolecek prefix = xattr_prefix_index[EXT2FS_XATTR_PREFIX_SYSTEM];
209 1.1 jdolecek snprintf(namebuf, sizeof(namebuf), "%s%s", prefix, ap->a_name);
210 1.1 jdolecek
211 1.1 jdolecek error = extattr_check_cred(ap->a_vp, namebuf, ap->a_cred, VREAD);
212 1.1 jdolecek if (error)
213 1.2 christos return error;
214 1.1 jdolecek
215 1.1 jdolecek /*
216 1.1 jdolecek * Allow only offsets of zero to encourage the read/replace
217 1.1 jdolecek * extended attribute semantic. Otherwise we can't guarantee
218 1.1 jdolecek * atomicity, as we don't provide locks for extended attributes.
219 1.1 jdolecek */
220 1.1 jdolecek if (ap->a_uio != NULL && ap->a_uio->uio_offset != 0)
221 1.2 christos return ENXIO;
222 1.1 jdolecek
223 1.1 jdolecek /* figure out the name index */
224 1.1 jdolecek name = ap->a_name;
225 1.1 jdolecek name_index = 0;
226 1.1 jdolecek name_match = 0;
227 1.1 jdolecek for(i=0; i < sizeof(xattr_prefix_index)/sizeof(void *); i++) {
228 1.1 jdolecek prefix = xattr_prefix_index[i];
229 1.1 jdolecek if (strlen(prefix) > 0 &&
230 1.1 jdolecek strncmp(ap->a_name, prefix, strlen(prefix)) == 0 &&
231 1.1 jdolecek name_match < strlen(prefix)) {
232 1.1 jdolecek name = &ap->a_name[strlen(prefix)];
233 1.1 jdolecek name_index = i;
234 1.1 jdolecek name_match = strlen(prefix);
235 1.1 jdolecek continue;
236 1.1 jdolecek }
237 1.1 jdolecek }
238 1.1 jdolecek
239 1.1 jdolecek /* fetch the xattr */
240 1.1 jdolecek error = ext2fs_get_inode_xattr(ip, ap->a_attrnamespace, ap->a_uio, &valuesize, name_index, name);
241 1.1 jdolecek if (error == ENODATA) {
242 1.1 jdolecek /* not found in inode, try facl */
243 1.1 jdolecek error = ext2fs_get_block_xattr(ip, ap->a_attrnamespace, ap->a_uio, &valuesize, name_index, name);
244 1.1 jdolecek }
245 1.1 jdolecek
246 1.1 jdolecek if (ap->a_size != NULL)
247 1.1 jdolecek *ap->a_size = valuesize;
248 1.1 jdolecek
249 1.2 christos return error;
250 1.1 jdolecek }
251 1.1 jdolecek
252 1.1 jdolecek int
253 1.1 jdolecek ext2fs_setextattr(void *v)
254 1.1 jdolecek {
255 1.1 jdolecek #if 0
256 1.1 jdolecek struct vop_setextattr_args /* {
257 1.1 jdolecek const struct vnodeop_desc *a_desc;
258 1.1 jdolecek struct vnode *a_vp;
259 1.1 jdolecek int a_attrnamespace;
260 1.1 jdolecek const char *a_name;
261 1.1 jdolecek struct uio *a_uio;
262 1.1 jdolecek kauth_cred_t a_cred;
263 1.1 jdolecek } */ *ap = v;
264 1.1 jdolecek
265 1.1 jdolecek /* XXX set EXT2F_COMPAT_EXTATTR in superblock after successful set */
266 1.1 jdolecek #endif
267 1.1 jdolecek
268 1.1 jdolecek /* XXX Not implemented */
269 1.2 christos return EOPNOTSUPP;
270 1.1 jdolecek }
271 1.1 jdolecek
272 1.1 jdolecek static int
273 1.1 jdolecek ext2fs_list_xattr(struct ext2fs_xattr_entry *e, uint8_t *end, int attrnamespace, int flags, struct uio *uio, size_t *size)
274 1.1 jdolecek {
275 1.1 jdolecek char name[EXT2FS_XATTR_NAME_LEN_MAX + 1];
276 1.1 jdolecek uint8_t len;
277 1.1 jdolecek int error;
278 1.1 jdolecek const char *prefix;
279 1.1 jdolecek
280 1.1 jdolecek /*
281 1.1 jdolecek * Individual entries follow the header. Each is aligned on 4-byte
282 1.1 jdolecek * boundary.
283 1.1 jdolecek */
284 1.1 jdolecek for(; !EXT2FS_XATTR_IS_LAST_ENTRY(e, end); e = EXT2FS_XATTR_NEXT(e)) {
285 1.1 jdolecek /*
286 1.1 jdolecek * Only EXT2FS_XATTR_PREFIX_USER is USER, anything else
287 1.1 jdolecek * is considered SYSTEM.
288 1.1 jdolecek */
289 1.1 jdolecek if ((attrnamespace == EXTATTR_NAMESPACE_USER && e->e_name_index != EXT2FS_XATTR_PREFIX_USER) ||
290 1.1 jdolecek (attrnamespace == EXTATTR_NAMESPACE_SYSTEM && e->e_name_index == EXT2FS_XATTR_PREFIX_USER)) {
291 1.1 jdolecek continue;
292 1.1 jdolecek }
293 1.1 jdolecek
294 1.1 jdolecek if (e->e_name_index <= sizeof(xattr_prefix_index)/sizeof(void *))
295 1.1 jdolecek prefix = xattr_prefix_index[e->e_name_index];
296 1.1 jdolecek else
297 1.1 jdolecek prefix = "";
298 1.1 jdolecek
299 1.1 jdolecek len = snprintf(name, sizeof(name), "%s%.*s",
300 1.1 jdolecek prefix,
301 1.1 jdolecek e->e_name_len, e->e_name);
302 1.1 jdolecek
303 1.1 jdolecek if (uio != NULL) {
304 1.1 jdolecek if (flags & EXTATTR_LIST_LENPREFIX) {
305 1.1 jdolecek /* write name length */
306 1.1 jdolecek uiomove(&len, sizeof(uint8_t), uio);
307 1.1 jdolecek } else {
308 1.1 jdolecek /* include trailing NUL */
309 1.1 jdolecek len++;
310 1.1 jdolecek }
311 1.1 jdolecek
312 1.1 jdolecek error = uiomove(name, len, uio);
313 1.1 jdolecek if (error)
314 1.1 jdolecek return error;
315 1.1 jdolecek
316 1.1 jdolecek *size += len;
317 1.1 jdolecek }
318 1.1 jdolecek }
319 1.1 jdolecek
320 1.2 christos return 0;
321 1.1 jdolecek }
322 1.1 jdolecek
323 1.1 jdolecek static int
324 1.1 jdolecek ext2fs_list_inode_xattr(struct inode *ip, int attrnamespace, int flags, struct uio *uio, size_t *size)
325 1.1 jdolecek {
326 1.1 jdolecek struct ext2fs_dinode *di = ip->i_din.e2fs_din;
327 1.1 jdolecek void *start, *end;
328 1.1 jdolecek struct ext2fs_xattr_ibody_header *h;
329 1.1 jdolecek
330 1.1 jdolecek start = &((uint8_t *)di)[EXT2_REV0_DINODE_SIZE + di->e2di_extra_isize];
331 1.1 jdolecek h = start;
332 1.1 jdolecek end = &((uint8_t *)di)[EXT2_DINODE_SIZE(ip->i_e2fs)];
333 1.1 jdolecek
334 1.1 jdolecek if (end <= start || fs2h32(h->h_magic) != EXT2FS_XATTR_MAGIC)
335 1.2 christos return 0;
336 1.1 jdolecek
337 1.1 jdolecek return ext2fs_list_xattr(EXT2FS_XATTR_IFIRST(h), end, attrnamespace, flags, uio, size);
338 1.1 jdolecek }
339 1.1 jdolecek
340 1.1 jdolecek static int
341 1.1 jdolecek ext2fs_list_block_xattr(struct inode *ip, int attrnamespace, int flags, struct uio *uio, size_t *size)
342 1.1 jdolecek {
343 1.1 jdolecek struct ext2fs_dinode *di = ip->i_din.e2fs_din;
344 1.1 jdolecek void *end;
345 1.1 jdolecek struct ext2fs_xattr_header *h;
346 1.1 jdolecek int error = 0;
347 1.1 jdolecek struct buf *bp = NULL;
348 1.1 jdolecek daddr_t xblk;
349 1.1 jdolecek
350 1.1 jdolecek xblk = di->e2di_facl;
351 1.3 jdolecek if (EXT2F_HAS_INCOMPAT_FEATURE(ip->i_e2fs, EXT2F_INCOMPAT_64BIT))
352 1.1 jdolecek xblk |= (((daddr_t)di->e2di_facl_high) << 32);
353 1.1 jdolecek
354 1.1 jdolecek /* don't do anything if no attr block was allocated */
355 1.1 jdolecek if (xblk == 0)
356 1.2 christos return 0;
357 1.1 jdolecek
358 1.1 jdolecek error = bread(ip->i_devvp, fsbtodb(ip->i_e2fs, xblk), (int)ip->i_e2fs->e2fs_bsize, 0, &bp);
359 1.1 jdolecek if (error)
360 1.1 jdolecek goto out;
361 1.1 jdolecek
362 1.1 jdolecek h = (struct ext2fs_xattr_header *)bp->b_data;
363 1.1 jdolecek end = &((uint8_t *)bp->b_data)[bp->b_bcount];
364 1.1 jdolecek
365 1.1 jdolecek if (end <= (void *)h || fs2h32(h->h_magic) != EXT2FS_XATTR_MAGIC)
366 1.1 jdolecek goto out;
367 1.1 jdolecek
368 1.1 jdolecek error = ext2fs_list_xattr(EXT2FS_XATTR_BFIRST(h), end, attrnamespace, flags, uio, size);
369 1.1 jdolecek
370 1.1 jdolecek out:
371 1.1 jdolecek if (bp)
372 1.1 jdolecek brelse(bp, 0);
373 1.2 christos return error;
374 1.1 jdolecek }
375 1.1 jdolecek
376 1.1 jdolecek int
377 1.1 jdolecek ext2fs_listextattr(void *v)
378 1.1 jdolecek {
379 1.1 jdolecek struct vop_listextattr_args /* {
380 1.1 jdolecek const struct vnodeop_desc *a_desc;
381 1.1 jdolecek struct vnode *a_vp;
382 1.1 jdolecek int a_attrnamespace;
383 1.1 jdolecek struct uio *a_uio;
384 1.1 jdolecek size_t *a_size;
385 1.1 jdolecek int a_flag;
386 1.1 jdolecek kauth_cred_t a_cred;
387 1.1 jdolecek } */ *ap = v;
388 1.1 jdolecek struct inode *ip = VTOI(ap->a_vp);
389 1.1 jdolecek int error;
390 1.1 jdolecek const char *prefix;
391 1.1 jdolecek size_t listsize = 0;
392 1.1 jdolecek
393 1.3 jdolecek if (!EXT2F_HAS_COMPAT_FEATURE(ip->i_e2fs, EXT2F_COMPAT_EXTATTR)) {
394 1.1 jdolecek /* no EA on the filesystem */
395 1.1 jdolecek goto out;
396 1.1 jdolecek }
397 1.1 jdolecek
398 1.1 jdolecek /*
399 1.1 jdolecek * XXX: We can move this inside the loop and iterate on individual
400 1.1 jdolecek * attributes.
401 1.1 jdolecek */
402 1.1 jdolecek if (ap->a_attrnamespace == EXTATTR_NAMESPACE_USER)
403 1.1 jdolecek prefix = xattr_prefix_index[EXT2FS_XATTR_PREFIX_USER];
404 1.1 jdolecek else
405 1.1 jdolecek prefix = xattr_prefix_index[EXT2FS_XATTR_PREFIX_SYSTEM];
406 1.1 jdolecek error = extattr_check_cred(ap->a_vp, prefix, ap->a_cred, VREAD);
407 1.1 jdolecek if (error)
408 1.2 christos return error;
409 1.1 jdolecek
410 1.1 jdolecek /*
411 1.1 jdolecek * Allow only offsets of zero to encourage the read/replace
412 1.1 jdolecek * extended attribute semantic. Otherwise we can't guarantee
413 1.1 jdolecek * atomicity, as we don't provide locks for extended attributes.
414 1.1 jdolecek * XXX revisit - vnode lock enough?
415 1.1 jdolecek */
416 1.1 jdolecek if (ap->a_uio != NULL && ap->a_uio->uio_offset != 0)
417 1.2 christos return ENXIO;
418 1.1 jdolecek
419 1.1 jdolecek /* fetch inode xattrs */
420 1.1 jdolecek error = ext2fs_list_inode_xattr(ip, ap->a_attrnamespace, ap->a_flag, ap->a_uio, &listsize);
421 1.1 jdolecek if (error)
422 1.2 christos return error;
423 1.1 jdolecek
424 1.1 jdolecek error = ext2fs_list_block_xattr(ip, ap->a_attrnamespace, ap->a_flag, ap->a_uio, &listsize);
425 1.1 jdolecek if (error)
426 1.2 christos return error;
427 1.1 jdolecek
428 1.1 jdolecek out:
429 1.1 jdolecek if (ap->a_size != NULL)
430 1.1 jdolecek *ap->a_size = listsize;
431 1.1 jdolecek
432 1.2 christos return 0;
433 1.1 jdolecek }
434 1.1 jdolecek
435 1.1 jdolecek int
436 1.1 jdolecek ext2fs_deleteextattr(void *v)
437 1.1 jdolecek {
438 1.1 jdolecek #if 0
439 1.1 jdolecek struct vop_deleteextattr_args /* {
440 1.1 jdolecek const struct vnodeop_desc *a_desc;
441 1.1 jdolecek struct vnode *a_vp;
442 1.1 jdolecek int a_attrnamespace;
443 1.1 jdolecek const char *a_name;
444 1.1 jdolecek kauth_cred_t a_cred;
445 1.1 jdolecek } */ *ap = v;
446 1.1 jdolecek #endif
447 1.1 jdolecek
448 1.1 jdolecek /* XXX Not implemented */
449 1.2 christos return EOPNOTSUPP;
450 1.1 jdolecek }
451