ext2fs_xattr.c revision 1.4.18.2 1 1.4.18.2 jdolecek /* $NetBSD: ext2fs_xattr.c,v 1.4.18.2 2017/12/03 11:39:21 jdolecek Exp $ */
2 1.4.18.2 jdolecek
3 1.4.18.2 jdolecek /*-
4 1.4.18.2 jdolecek * Copyright (c) 2016 The NetBSD Foundation, Inc.
5 1.4.18.2 jdolecek * All rights reserved.
6 1.4.18.2 jdolecek *
7 1.4.18.2 jdolecek * This code is derived from software contributed to The NetBSD Foundation
8 1.4.18.2 jdolecek * by Jaromir Dolecek.
9 1.4.18.2 jdolecek *
10 1.4.18.2 jdolecek * Redistribution and use in source and binary forms, with or without
11 1.4.18.2 jdolecek * modification, are permitted provided that the following conditions
12 1.4.18.2 jdolecek * are met:
13 1.4.18.2 jdolecek * 1. Redistributions of source code must retain the above copyright
14 1.4.18.2 jdolecek * notice, this list of conditions and the following disclaimer.
15 1.4.18.2 jdolecek * 2. Redistributions in binary form must reproduce the above copyright
16 1.4.18.2 jdolecek * notice, this list of conditions and the following disclaimer in the
17 1.4.18.2 jdolecek * documentation and/or other materials provided with the distribution.
18 1.4.18.2 jdolecek *
19 1.4.18.2 jdolecek * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.4.18.2 jdolecek * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.4.18.2 jdolecek * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.4.18.2 jdolecek * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.4.18.2 jdolecek * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.4.18.2 jdolecek * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.4.18.2 jdolecek * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.4.18.2 jdolecek * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.4.18.2 jdolecek * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.4.18.2 jdolecek * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.4.18.2 jdolecek * POSSIBILITY OF SUCH DAMAGE.
30 1.4.18.2 jdolecek */
31 1.4.18.2 jdolecek
32 1.4.18.2 jdolecek #include <sys/cdefs.h>
33 1.4.18.2 jdolecek __KERNEL_RCSID(0, "$NetBSD: ext2fs_xattr.c,v 1.4.18.2 2017/12/03 11:39:21 jdolecek Exp $");
34 1.4.18.2 jdolecek
35 1.4.18.2 jdolecek #include <sys/param.h>
36 1.4.18.2 jdolecek #include <sys/systm.h>
37 1.4.18.2 jdolecek #include <sys/mount.h>
38 1.4.18.2 jdolecek #include <sys/proc.h>
39 1.4.18.2 jdolecek #include <sys/file.h>
40 1.4.18.2 jdolecek #include <sys/buf.h>
41 1.4.18.2 jdolecek #include <sys/vnode.h>
42 1.4.18.2 jdolecek #include <sys/kernel.h>
43 1.4.18.2 jdolecek #include <sys/kmem.h>
44 1.4.18.2 jdolecek #include <sys/trace.h>
45 1.4.18.2 jdolecek #include <sys/resourcevar.h>
46 1.4.18.2 jdolecek #include <sys/kauth.h>
47 1.4.18.2 jdolecek #include <sys/extattr.h>
48 1.4.18.2 jdolecek
49 1.4.18.2 jdolecek #include <ufs/ufs/inode.h>
50 1.4.18.2 jdolecek #include <ufs/ufs/ufsmount.h>
51 1.4.18.2 jdolecek #include <ufs/ufs/ufs_extern.h>
52 1.4.18.2 jdolecek
53 1.4.18.2 jdolecek #include <ufs/ext2fs/ext2fs.h>
54 1.4.18.2 jdolecek #include <ufs/ext2fs/ext2fs_extern.h>
55 1.4.18.2 jdolecek #include <ufs/ext2fs/ext2fs_xattr.h>
56 1.4.18.2 jdolecek
57 1.4.18.2 jdolecek static const char * const xattr_prefix_index[] = {
58 1.4.18.2 jdolecek "",
59 1.4.18.2 jdolecek "user.",
60 1.4.18.2 jdolecek "system.posix_acl_access",
61 1.4.18.2 jdolecek "system.posix_acl_default",
62 1.4.18.2 jdolecek "trusted.",
63 1.4.18.2 jdolecek "", /* unused */
64 1.4.18.2 jdolecek "security",
65 1.4.18.2 jdolecek "system.",
66 1.4.18.2 jdolecek "system.richacl",
67 1.4.18.2 jdolecek "c",
68 1.4.18.2 jdolecek };
69 1.4.18.2 jdolecek
70 1.4.18.2 jdolecek static int
71 1.4.18.2 jdolecek ext2fs_find_xattr(struct ext2fs_xattr_entry *e, uint8_t *start, uint8_t *end,
72 1.4.18.2 jdolecek int attrnamespace, struct uio *uio, size_t *size, uint8_t name_index,
73 1.4.18.2 jdolecek const char *name)
74 1.4.18.2 jdolecek {
75 1.4.18.2 jdolecek uint8_t *value;
76 1.4.18.2 jdolecek int error;
77 1.4.18.2 jdolecek size_t value_offs, value_len, len, old_len;
78 1.4.18.2 jdolecek
79 1.4.18.2 jdolecek /*
80 1.4.18.2 jdolecek * Individual entries follow the header. Each is aligned on 4-byte
81 1.4.18.2 jdolecek * boundary.
82 1.4.18.2 jdolecek */
83 1.4.18.2 jdolecek for(; !EXT2FS_XATTR_IS_LAST_ENTRY(e, end); e = EXT2FS_XATTR_NEXT(e)) {
84 1.4.18.2 jdolecek /*
85 1.4.18.2 jdolecek * Only EXT2FS_XATTR_PREFIX_USER is USER, anything else
86 1.4.18.2 jdolecek * is considered SYSTEM.
87 1.4.18.2 jdolecek */
88 1.4.18.2 jdolecek if ((attrnamespace == EXTATTR_NAMESPACE_USER
89 1.4.18.2 jdolecek && e->e_name_index != EXT2FS_XATTR_PREFIX_USER) ||
90 1.4.18.2 jdolecek (attrnamespace == EXTATTR_NAMESPACE_SYSTEM
91 1.4.18.2 jdolecek && e->e_name_index == EXT2FS_XATTR_PREFIX_USER)) {
92 1.4.18.2 jdolecek continue;
93 1.4.18.2 jdolecek }
94 1.4.18.2 jdolecek
95 1.4.18.2 jdolecek if (e->e_name_index != name_index ||
96 1.4.18.2 jdolecek e->e_name_len != strlen(name) ||
97 1.4.18.2 jdolecek strncmp(e->e_name, name, e->e_name_len) != 0)
98 1.4.18.2 jdolecek continue;
99 1.4.18.2 jdolecek
100 1.4.18.2 jdolecek value_offs = fs2h32(e->e_value_offs);
101 1.4.18.2 jdolecek value_len = fs2h32(e->e_value_size);
102 1.4.18.2 jdolecek value = &start[value_offs];
103 1.4.18.2 jdolecek
104 1.4.18.2 jdolecek /* make sure the value offset are sane */
105 1.4.18.2 jdolecek if (&value[value_len] > end)
106 1.4.18.2 jdolecek return EINVAL;
107 1.4.18.2 jdolecek
108 1.4.18.2 jdolecek if (uio != NULL) {
109 1.4.18.2 jdolecek /*
110 1.4.18.2 jdolecek * Figure out maximum to transfer -- use buffer size
111 1.4.18.2 jdolecek * and local data limit.
112 1.4.18.2 jdolecek */
113 1.4.18.2 jdolecek len = MIN(uio->uio_resid, value_len);
114 1.4.18.2 jdolecek old_len = uio->uio_resid;
115 1.4.18.2 jdolecek uio->uio_resid = len;
116 1.4.18.2 jdolecek
117 1.4.18.2 jdolecek uio->uio_resid = old_len - (len - uio->uio_resid);
118 1.4.18.2 jdolecek
119 1.4.18.2 jdolecek error = uiomove(value, value_len, uio);
120 1.4.18.2 jdolecek if (error)
121 1.4.18.2 jdolecek return error;
122 1.4.18.2 jdolecek }
123 1.4.18.2 jdolecek
124 1.4.18.2 jdolecek /* full data size */
125 1.4.18.2 jdolecek *size += value_len;
126 1.4.18.2 jdolecek
127 1.4.18.2 jdolecek goto found;
128 1.4.18.2 jdolecek }
129 1.4.18.2 jdolecek
130 1.4.18.2 jdolecek /* requested attribute not found */
131 1.4.18.2 jdolecek return ENODATA;
132 1.4.18.2 jdolecek
133 1.4.18.2 jdolecek found:
134 1.4.18.2 jdolecek return 0;
135 1.4.18.2 jdolecek }
136 1.4.18.2 jdolecek
137 1.4.18.2 jdolecek static int
138 1.4.18.2 jdolecek ext2fs_get_inode_xattr(struct inode *ip, int attrnamespace, struct uio *uio,
139 1.4.18.2 jdolecek size_t *size, uint8_t name_index, const char *name)
140 1.4.18.2 jdolecek {
141 1.4.18.2 jdolecek struct ext2fs_dinode *di = ip->i_din.e2fs_din;
142 1.4.18.2 jdolecek struct ext2fs_xattr_ibody_header *h;
143 1.4.18.2 jdolecek uint8_t *start, *end;
144 1.4.18.2 jdolecek
145 1.4.18.2 jdolecek start = &((uint8_t *)di)[EXT2_REV0_DINODE_SIZE + di->e2di_extra_isize];
146 1.4.18.2 jdolecek h = (struct ext2fs_xattr_ibody_header *)start;
147 1.4.18.2 jdolecek end = &((uint8_t *)di)[EXT2_DINODE_SIZE(ip->i_e2fs)];
148 1.4.18.2 jdolecek
149 1.4.18.2 jdolecek if (end <= start || fs2h32(h->h_magic) != EXT2FS_XATTR_MAGIC)
150 1.4.18.2 jdolecek return ENODATA;
151 1.4.18.2 jdolecek
152 1.4.18.2 jdolecek return ext2fs_find_xattr(EXT2FS_XATTR_IFIRST(h), start, end,
153 1.4.18.2 jdolecek attrnamespace, uio, size, name_index, name);
154 1.4.18.2 jdolecek }
155 1.4.18.2 jdolecek
156 1.4.18.2 jdolecek static int
157 1.4.18.2 jdolecek ext2fs_get_block_xattr(struct inode *ip, int attrnamespace, struct uio *uio,
158 1.4.18.2 jdolecek size_t *size, uint8_t name_index, const char *name)
159 1.4.18.2 jdolecek {
160 1.4.18.2 jdolecek struct ext2fs_dinode *di = ip->i_din.e2fs_din;
161 1.4.18.2 jdolecek uint8_t *start, *end;
162 1.4.18.2 jdolecek struct ext2fs_xattr_header *h;
163 1.4.18.2 jdolecek int error = 0;
164 1.4.18.2 jdolecek struct buf *bp = NULL;
165 1.4.18.2 jdolecek daddr_t xblk;
166 1.4.18.2 jdolecek
167 1.4.18.2 jdolecek xblk = di->e2di_facl;
168 1.4.18.2 jdolecek if (EXT2F_HAS_INCOMPAT_FEATURE(ip->i_e2fs, EXT2F_INCOMPAT_64BIT))
169 1.4.18.2 jdolecek xblk |= (((daddr_t)di->e2di_facl_high) << 32);
170 1.4.18.2 jdolecek
171 1.4.18.2 jdolecek /* don't do anything if no attr block was allocated */
172 1.4.18.2 jdolecek if (xblk == 0)
173 1.4.18.2 jdolecek return 0;
174 1.4.18.2 jdolecek
175 1.4.18.2 jdolecek error = bread(ip->i_devvp, fsbtodb(ip->i_e2fs, xblk),
176 1.4.18.2 jdolecek (int)ip->i_e2fs->e2fs_bsize, 0, &bp);
177 1.4.18.2 jdolecek if (error)
178 1.4.18.2 jdolecek goto out;
179 1.4.18.2 jdolecek
180 1.4.18.2 jdolecek start = (uint8_t *)bp->b_data;
181 1.4.18.2 jdolecek h = (struct ext2fs_xattr_header *)start;
182 1.4.18.2 jdolecek end = &((uint8_t *)bp->b_data)[bp->b_bcount];
183 1.4.18.2 jdolecek
184 1.4.18.2 jdolecek if (end <= start || fs2h32(h->h_magic) != EXT2FS_XATTR_MAGIC)
185 1.4.18.2 jdolecek goto out;
186 1.4.18.2 jdolecek
187 1.4.18.2 jdolecek error = ext2fs_find_xattr(EXT2FS_XATTR_BFIRST(h), start, end,
188 1.4.18.2 jdolecek attrnamespace, uio, size, name_index, name);
189 1.4.18.2 jdolecek
190 1.4.18.2 jdolecek out:
191 1.4.18.2 jdolecek if (bp)
192 1.4.18.2 jdolecek brelse(bp, 0);
193 1.4.18.2 jdolecek return error;
194 1.4.18.2 jdolecek }
195 1.4.18.2 jdolecek int
196 1.4.18.2 jdolecek ext2fs_getextattr(void *v)
197 1.4.18.2 jdolecek {
198 1.4.18.2 jdolecek struct vop_getextattr_args /* {
199 1.4.18.2 jdolecek const struct vnodeop_desc *a_desc;
200 1.4.18.2 jdolecek struct vnode *a_vp;
201 1.4.18.2 jdolecek int a_attrnamespace;
202 1.4.18.2 jdolecek const char *a_name;
203 1.4.18.2 jdolecek struct uio *a_uio;
204 1.4.18.2 jdolecek size_t *a_size;
205 1.4.18.2 jdolecek kauth_cred_t a_cred;
206 1.4.18.2 jdolecek } */ *ap = v;
207 1.4.18.2 jdolecek struct inode *ip = VTOI(ap->a_vp);
208 1.4.18.2 jdolecek char namebuf[EXT2FS_XATTR_NAME_LEN_MAX + 1];
209 1.4.18.2 jdolecek int error;
210 1.4.18.2 jdolecek const char *prefix, *name;
211 1.4.18.2 jdolecek uint8_t name_index;
212 1.4.18.2 jdolecek size_t name_match, valuesize = 0;
213 1.4.18.2 jdolecek
214 1.4.18.2 jdolecek if (ap->a_attrnamespace == EXTATTR_NAMESPACE_USER)
215 1.4.18.2 jdolecek prefix = xattr_prefix_index[EXT2FS_XATTR_PREFIX_USER];
216 1.4.18.2 jdolecek else
217 1.4.18.2 jdolecek prefix = xattr_prefix_index[EXT2FS_XATTR_PREFIX_SYSTEM];
218 1.4.18.2 jdolecek snprintf(namebuf, sizeof(namebuf), "%s%s", prefix, ap->a_name);
219 1.4.18.2 jdolecek
220 1.4.18.2 jdolecek error = extattr_check_cred(ap->a_vp, namebuf, ap->a_cred, VREAD);
221 1.4.18.2 jdolecek if (error)
222 1.4.18.2 jdolecek return error;
223 1.4.18.2 jdolecek
224 1.4.18.2 jdolecek /*
225 1.4.18.2 jdolecek * Allow only offsets of zero to encourage the read/replace
226 1.4.18.2 jdolecek * extended attribute semantic. Otherwise we can't guarantee
227 1.4.18.2 jdolecek * atomicity, as we don't provide locks for extended attributes.
228 1.4.18.2 jdolecek */
229 1.4.18.2 jdolecek if (ap->a_uio != NULL && ap->a_uio->uio_offset != 0)
230 1.4.18.2 jdolecek return ENXIO;
231 1.4.18.2 jdolecek
232 1.4.18.2 jdolecek /* figure out the name index */
233 1.4.18.2 jdolecek name = ap->a_name;
234 1.4.18.2 jdolecek name_index = 0;
235 1.4.18.2 jdolecek name_match = 0;
236 1.4.18.2 jdolecek for(size_t i = 0; i < __arraycount(xattr_prefix_index); i++) {
237 1.4.18.2 jdolecek prefix = xattr_prefix_index[i];
238 1.4.18.2 jdolecek size_t l = strlen(prefix);
239 1.4.18.2 jdolecek if (l > 0 && strncmp(ap->a_name, prefix, l) == 0 &&
240 1.4.18.2 jdolecek name_match < l) {
241 1.4.18.2 jdolecek name = &ap->a_name[l];
242 1.4.18.2 jdolecek name_index = i;
243 1.4.18.2 jdolecek name_match = l;
244 1.4.18.2 jdolecek continue;
245 1.4.18.2 jdolecek }
246 1.4.18.2 jdolecek }
247 1.4.18.2 jdolecek
248 1.4.18.2 jdolecek /* fetch the xattr */
249 1.4.18.2 jdolecek error = ext2fs_get_inode_xattr(ip, ap->a_attrnamespace, ap->a_uio,
250 1.4.18.2 jdolecek &valuesize, name_index, name);
251 1.4.18.2 jdolecek if (error == ENODATA) {
252 1.4.18.2 jdolecek /* not found in inode, try facl */
253 1.4.18.2 jdolecek error = ext2fs_get_block_xattr(ip, ap->a_attrnamespace,
254 1.4.18.2 jdolecek ap->a_uio, &valuesize, name_index, name);
255 1.4.18.2 jdolecek }
256 1.4.18.2 jdolecek
257 1.4.18.2 jdolecek if (ap->a_size != NULL)
258 1.4.18.2 jdolecek *ap->a_size = valuesize;
259 1.4.18.2 jdolecek
260 1.4.18.2 jdolecek return error;
261 1.4.18.2 jdolecek }
262 1.4.18.2 jdolecek
263 1.4.18.2 jdolecek int
264 1.4.18.2 jdolecek ext2fs_setextattr(void *v)
265 1.4.18.2 jdolecek {
266 1.4.18.2 jdolecek #if 0
267 1.4.18.2 jdolecek struct vop_setextattr_args /* {
268 1.4.18.2 jdolecek const struct vnodeop_desc *a_desc;
269 1.4.18.2 jdolecek struct vnode *a_vp;
270 1.4.18.2 jdolecek int a_attrnamespace;
271 1.4.18.2 jdolecek const char *a_name;
272 1.4.18.2 jdolecek struct uio *a_uio;
273 1.4.18.2 jdolecek kauth_cred_t a_cred;
274 1.4.18.2 jdolecek } */ *ap = v;
275 1.4.18.2 jdolecek
276 1.4.18.2 jdolecek /* XXX set EXT2F_COMPAT_EXTATTR in superblock after successful set */
277 1.4.18.2 jdolecek #endif
278 1.4.18.2 jdolecek
279 1.4.18.2 jdolecek /* XXX Not implemented */
280 1.4.18.2 jdolecek return EOPNOTSUPP;
281 1.4.18.2 jdolecek }
282 1.4.18.2 jdolecek
283 1.4.18.2 jdolecek static int
284 1.4.18.2 jdolecek ext2fs_list_xattr(struct ext2fs_xattr_entry *e, uint8_t *end,
285 1.4.18.2 jdolecek int attrnamespace, int flags, struct uio *uio, size_t *size)
286 1.4.18.2 jdolecek {
287 1.4.18.2 jdolecek char name[EXT2FS_XATTR_NAME_LEN_MAX + 1];
288 1.4.18.2 jdolecek uint8_t len;
289 1.4.18.2 jdolecek int error;
290 1.4.18.2 jdolecek const char *prefix;
291 1.4.18.2 jdolecek
292 1.4.18.2 jdolecek /*
293 1.4.18.2 jdolecek * Individual entries follow the header. Each is aligned on 4-byte
294 1.4.18.2 jdolecek * boundary.
295 1.4.18.2 jdolecek */
296 1.4.18.2 jdolecek for(; !EXT2FS_XATTR_IS_LAST_ENTRY(e, end); e = EXT2FS_XATTR_NEXT(e)) {
297 1.4.18.2 jdolecek /*
298 1.4.18.2 jdolecek * Only EXT2FS_XATTR_PREFIX_USER is USER, anything else
299 1.4.18.2 jdolecek * is considered SYSTEM.
300 1.4.18.2 jdolecek */
301 1.4.18.2 jdolecek if ((attrnamespace == EXTATTR_NAMESPACE_USER
302 1.4.18.2 jdolecek && e->e_name_index != EXT2FS_XATTR_PREFIX_USER) ||
303 1.4.18.2 jdolecek (attrnamespace == EXTATTR_NAMESPACE_SYSTEM
304 1.4.18.2 jdolecek && e->e_name_index == EXT2FS_XATTR_PREFIX_USER)) {
305 1.4.18.2 jdolecek continue;
306 1.4.18.2 jdolecek }
307 1.4.18.2 jdolecek
308 1.4.18.2 jdolecek if (e->e_name_index < __arraycount(xattr_prefix_index))
309 1.4.18.2 jdolecek prefix = xattr_prefix_index[e->e_name_index];
310 1.4.18.2 jdolecek else
311 1.4.18.2 jdolecek prefix = "";
312 1.4.18.2 jdolecek
313 1.4.18.2 jdolecek len = snprintf(name, sizeof(name), "%s%.*s",
314 1.4.18.2 jdolecek prefix,
315 1.4.18.2 jdolecek e->e_name_len, e->e_name);
316 1.4.18.2 jdolecek
317 1.4.18.2 jdolecek if (uio != NULL) {
318 1.4.18.2 jdolecek if (flags & EXTATTR_LIST_LENPREFIX) {
319 1.4.18.2 jdolecek /* write name length */
320 1.4.18.2 jdolecek error = uiomove(&len, sizeof(uint8_t), uio);
321 1.4.18.2 jdolecek if (error)
322 1.4.18.2 jdolecek return error;
323 1.4.18.2 jdolecek } else {
324 1.4.18.2 jdolecek /* include trailing NUL */
325 1.4.18.2 jdolecek len++;
326 1.4.18.2 jdolecek }
327 1.4.18.2 jdolecek
328 1.4.18.2 jdolecek error = uiomove(name, len, uio);
329 1.4.18.2 jdolecek if (error)
330 1.4.18.2 jdolecek return error;
331 1.4.18.2 jdolecek
332 1.4.18.2 jdolecek *size += len;
333 1.4.18.2 jdolecek }
334 1.4.18.2 jdolecek }
335 1.4.18.2 jdolecek
336 1.4.18.2 jdolecek return 0;
337 1.4.18.2 jdolecek }
338 1.4.18.2 jdolecek
339 1.4.18.2 jdolecek static int
340 1.4.18.2 jdolecek ext2fs_list_inode_xattr(struct inode *ip, int attrnamespace, int flags,
341 1.4.18.2 jdolecek struct uio *uio, size_t *size)
342 1.4.18.2 jdolecek {
343 1.4.18.2 jdolecek struct ext2fs_dinode *di = ip->i_din.e2fs_din;
344 1.4.18.2 jdolecek void *start, *end;
345 1.4.18.2 jdolecek struct ext2fs_xattr_ibody_header *h;
346 1.4.18.2 jdolecek
347 1.4.18.2 jdolecek start = &((uint8_t *)di)[EXT2_REV0_DINODE_SIZE + di->e2di_extra_isize];
348 1.4.18.2 jdolecek h = start;
349 1.4.18.2 jdolecek end = &((uint8_t *)di)[EXT2_DINODE_SIZE(ip->i_e2fs)];
350 1.4.18.2 jdolecek
351 1.4.18.2 jdolecek if (end <= start || fs2h32(h->h_magic) != EXT2FS_XATTR_MAGIC)
352 1.4.18.2 jdolecek return 0;
353 1.4.18.2 jdolecek
354 1.4.18.2 jdolecek return ext2fs_list_xattr(EXT2FS_XATTR_IFIRST(h), end, attrnamespace,
355 1.4.18.2 jdolecek flags, uio, size);
356 1.4.18.2 jdolecek }
357 1.4.18.2 jdolecek
358 1.4.18.2 jdolecek static int
359 1.4.18.2 jdolecek ext2fs_list_block_xattr(struct inode *ip, int attrnamespace, int flags,
360 1.4.18.2 jdolecek struct uio *uio, size_t *size)
361 1.4.18.2 jdolecek {
362 1.4.18.2 jdolecek struct ext2fs_dinode *di = ip->i_din.e2fs_din;
363 1.4.18.2 jdolecek void *end;
364 1.4.18.2 jdolecek struct ext2fs_xattr_header *h;
365 1.4.18.2 jdolecek int error = 0;
366 1.4.18.2 jdolecek struct buf *bp = NULL;
367 1.4.18.2 jdolecek daddr_t xblk;
368 1.4.18.2 jdolecek
369 1.4.18.2 jdolecek xblk = di->e2di_facl;
370 1.4.18.2 jdolecek if (EXT2F_HAS_INCOMPAT_FEATURE(ip->i_e2fs, EXT2F_INCOMPAT_64BIT))
371 1.4.18.2 jdolecek xblk |= (((daddr_t)di->e2di_facl_high) << 32);
372 1.4.18.2 jdolecek
373 1.4.18.2 jdolecek /* don't do anything if no attr block was allocated */
374 1.4.18.2 jdolecek if (xblk == 0)
375 1.4.18.2 jdolecek return 0;
376 1.4.18.2 jdolecek
377 1.4.18.2 jdolecek error = bread(ip->i_devvp, fsbtodb(ip->i_e2fs, xblk),
378 1.4.18.2 jdolecek (int)ip->i_e2fs->e2fs_bsize, 0, &bp);
379 1.4.18.2 jdolecek if (error)
380 1.4.18.2 jdolecek goto out;
381 1.4.18.2 jdolecek
382 1.4.18.2 jdolecek h = (struct ext2fs_xattr_header *)bp->b_data;
383 1.4.18.2 jdolecek end = &((uint8_t *)bp->b_data)[bp->b_bcount];
384 1.4.18.2 jdolecek
385 1.4.18.2 jdolecek if (end <= (void *)h || fs2h32(h->h_magic) != EXT2FS_XATTR_MAGIC)
386 1.4.18.2 jdolecek goto out;
387 1.4.18.2 jdolecek
388 1.4.18.2 jdolecek error = ext2fs_list_xattr(EXT2FS_XATTR_BFIRST(h), end, attrnamespace,
389 1.4.18.2 jdolecek flags, uio, size);
390 1.4.18.2 jdolecek
391 1.4.18.2 jdolecek out:
392 1.4.18.2 jdolecek if (bp)
393 1.4.18.2 jdolecek brelse(bp, 0);
394 1.4.18.2 jdolecek return error;
395 1.4.18.2 jdolecek }
396 1.4.18.2 jdolecek
397 1.4.18.2 jdolecek int
398 1.4.18.2 jdolecek ext2fs_listextattr(void *v)
399 1.4.18.2 jdolecek {
400 1.4.18.2 jdolecek struct vop_listextattr_args /* {
401 1.4.18.2 jdolecek const struct vnodeop_desc *a_desc;
402 1.4.18.2 jdolecek struct vnode *a_vp;
403 1.4.18.2 jdolecek int a_attrnamespace;
404 1.4.18.2 jdolecek struct uio *a_uio;
405 1.4.18.2 jdolecek size_t *a_size;
406 1.4.18.2 jdolecek int a_flag;
407 1.4.18.2 jdolecek kauth_cred_t a_cred;
408 1.4.18.2 jdolecek } */ *ap = v;
409 1.4.18.2 jdolecek struct inode *ip = VTOI(ap->a_vp);
410 1.4.18.2 jdolecek int error;
411 1.4.18.2 jdolecek const char *prefix;
412 1.4.18.2 jdolecek size_t listsize = 0;
413 1.4.18.2 jdolecek
414 1.4.18.2 jdolecek if (!EXT2F_HAS_COMPAT_FEATURE(ip->i_e2fs, EXT2F_COMPAT_EXTATTR)) {
415 1.4.18.2 jdolecek /* no EA on the filesystem */
416 1.4.18.2 jdolecek goto out;
417 1.4.18.2 jdolecek }
418 1.4.18.2 jdolecek
419 1.4.18.2 jdolecek /*
420 1.4.18.2 jdolecek * XXX: We can move this inside the loop and iterate on individual
421 1.4.18.2 jdolecek * attributes.
422 1.4.18.2 jdolecek */
423 1.4.18.2 jdolecek if (ap->a_attrnamespace == EXTATTR_NAMESPACE_USER)
424 1.4.18.2 jdolecek prefix = xattr_prefix_index[EXT2FS_XATTR_PREFIX_USER];
425 1.4.18.2 jdolecek else
426 1.4.18.2 jdolecek prefix = xattr_prefix_index[EXT2FS_XATTR_PREFIX_SYSTEM];
427 1.4.18.2 jdolecek error = extattr_check_cred(ap->a_vp, prefix, ap->a_cred, VREAD);
428 1.4.18.2 jdolecek if (error)
429 1.4.18.2 jdolecek return error;
430 1.4.18.2 jdolecek
431 1.4.18.2 jdolecek /*
432 1.4.18.2 jdolecek * Allow only offsets of zero to encourage the read/replace
433 1.4.18.2 jdolecek * extended attribute semantic. Otherwise we can't guarantee
434 1.4.18.2 jdolecek * atomicity, as we don't provide locks for extended attributes.
435 1.4.18.2 jdolecek * XXX revisit - vnode lock enough?
436 1.4.18.2 jdolecek */
437 1.4.18.2 jdolecek if (ap->a_uio != NULL && ap->a_uio->uio_offset != 0)
438 1.4.18.2 jdolecek return ENXIO;
439 1.4.18.2 jdolecek
440 1.4.18.2 jdolecek /* fetch inode xattrs */
441 1.4.18.2 jdolecek error = ext2fs_list_inode_xattr(ip, ap->a_attrnamespace, ap->a_flag,
442 1.4.18.2 jdolecek ap->a_uio, &listsize);
443 1.4.18.2 jdolecek if (error)
444 1.4.18.2 jdolecek return error;
445 1.4.18.2 jdolecek
446 1.4.18.2 jdolecek error = ext2fs_list_block_xattr(ip, ap->a_attrnamespace, ap->a_flag,
447 1.4.18.2 jdolecek ap->a_uio, &listsize);
448 1.4.18.2 jdolecek if (error)
449 1.4.18.2 jdolecek return error;
450 1.4.18.2 jdolecek
451 1.4.18.2 jdolecek out:
452 1.4.18.2 jdolecek if (ap->a_size != NULL)
453 1.4.18.2 jdolecek *ap->a_size = listsize;
454 1.4.18.2 jdolecek
455 1.4.18.2 jdolecek return 0;
456 1.4.18.2 jdolecek }
457 1.4.18.2 jdolecek
458 1.4.18.2 jdolecek int
459 1.4.18.2 jdolecek ext2fs_deleteextattr(void *v)
460 1.4.18.2 jdolecek {
461 1.4.18.2 jdolecek #if 0
462 1.4.18.2 jdolecek struct vop_deleteextattr_args /* {
463 1.4.18.2 jdolecek const struct vnodeop_desc *a_desc;
464 1.4.18.2 jdolecek struct vnode *a_vp;
465 1.4.18.2 jdolecek int a_attrnamespace;
466 1.4.18.2 jdolecek const char *a_name;
467 1.4.18.2 jdolecek kauth_cred_t a_cred;
468 1.4.18.2 jdolecek } */ *ap = v;
469 1.4.18.2 jdolecek #endif
470 1.4.18.2 jdolecek
471 1.4.18.2 jdolecek /* XXX Not implemented */
472 1.4.18.2 jdolecek return EOPNOTSUPP;
473 1.4.18.2 jdolecek }
474