Merge tag 'vfs-5.18-merge-1' of git://git.kernel.org/pub/scm/fs/xfs/xfs-linux
[linux.git] / fs / 9p / xattr.c
CommitLineData
024b7d6a 1// SPDX-License-Identifier: LGPL-2.1
ebf46264
AK
2/*
3 * Copyright IBM Corporation, 2010
4 * Author Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com>
ebf46264
AK
5 */
6
7#include <linux/module.h>
8#include <linux/fs.h>
9#include <linux/sched.h>
070b3656 10#include <linux/uio.h>
ebf46264
AK
11#include <net/9p/9p.h>
12#include <net/9p/client.h>
13
14#include "fid.h"
15#include "xattr.h"
16
85ff872d
AK
17ssize_t v9fs_fid_xattr_get(struct p9_fid *fid, const char *name,
18 void *buffer, size_t buffer_size)
ebf46264
AK
19{
20 ssize_t retval;
e1200fe6 21 u64 attr_size;
85ff872d 22 struct p9_fid *attr_fid;
e1200fe6
AV
23 struct kvec kvec = {.iov_base = buffer, .iov_len = buffer_size};
24 struct iov_iter to;
25 int err;
26
aa563d7b 27 iov_iter_kvec(&to, READ, &kvec, 1, buffer_size);
ebf46264
AK
28
29 attr_fid = p9_client_xattrwalk(fid, name, &attr_size);
30 if (IS_ERR(attr_fid)) {
31 retval = PTR_ERR(attr_fid);
5d385153
JP
32 p9_debug(P9_DEBUG_VFS, "p9_client_attrwalk failed %zd\n",
33 retval);
e1200fe6 34 return retval;
ebf46264
AK
35 }
36 if (attr_size > buffer_size) {
e1200fe6
AV
37 if (!buffer_size) /* request to get the attr_size */
38 retval = attr_size;
ebf46264 39 else
e1200fe6
AV
40 retval = -ERANGE;
41 } else {
42 iov_iter_truncate(&to, attr_size);
43 retval = p9_client_read(attr_fid, 0, &to, &err);
44 if (err)
45 retval = err;
ebf46264 46 }
e1200fe6 47 p9_client_clunk(attr_fid);
ebf46264 48 return retval;
ebf46264
AK
49}
50
85ff872d
AK
51
52/*
53 * v9fs_xattr_get()
54 *
55 * Copy an extended attribute into the buffer
56 * provided, or compute the buffer size required.
57 * Buffer is NULL to compute the size of the buffer required.
58 *
59 * Returns a negative error number on failure, or the number of bytes
60 * used / required on success.
61 */
62ssize_t v9fs_xattr_get(struct dentry *dentry, const char *name,
63 void *buffer, size_t buffer_size)
64{
65 struct p9_fid *fid;
6636b6dc 66 int ret;
85ff872d 67
5d385153
JP
68 p9_debug(P9_DEBUG_VFS, "name = %s value_len = %zu\n",
69 name, buffer_size);
85ff872d
AK
70 fid = v9fs_fid_lookup(dentry);
71 if (IS_ERR(fid))
72 return PTR_ERR(fid);
6636b6dc
JW
73 ret = v9fs_fid_xattr_get(fid, name, buffer, buffer_size);
74 p9_client_clunk(fid);
85ff872d 75
6636b6dc 76 return ret;
85ff872d
AK
77}
78
ebf46264
AK
79/*
80 * v9fs_xattr_set()
81 *
82 * Create, replace or remove an extended attribute for this inode. Buffer
83 * is NULL to remove an existing extended attribute, and non-NULL to
84 * either replace an existing extended attribute, or create a new extended
85 * attribute. The flags XATTR_REPLACE and XATTR_CREATE
86 * specify that an extended attribute must exist and must not exist
87 * previous to the call, respectively.
88 *
89 * Returns 0, or a negative error number on failure.
90 */
91int v9fs_xattr_set(struct dentry *dentry, const char *name,
92 const void *value, size_t value_len, int flags)
38baba9e 93{
6636b6dc
JW
94 int ret;
95 struct p9_fid *fid;
96
97 fid = v9fs_fid_lookup(dentry);
98 if (IS_ERR(fid))
99 return PTR_ERR(fid);
100 ret = v9fs_fid_xattr_set(fid, name, value, value_len, flags);
101 p9_client_clunk(fid);
102 return ret;
38baba9e
AV
103}
104
105int v9fs_fid_xattr_set(struct p9_fid *fid, const char *name,
106 const void *value, size_t value_len, int flags)
ebf46264 107{
070b3656
AV
108 struct kvec kvec = {.iov_base = (void *)value, .iov_len = value_len};
109 struct iov_iter from;
3111784b 110 int retval, err;
070b3656 111
aa563d7b 112 iov_iter_kvec(&from, WRITE, &kvec, 1, value_len);
ebf46264 113
5d385153
JP
114 p9_debug(P9_DEBUG_VFS, "name = %s value_len = %zu flags = %d\n",
115 name, value_len, flags);
ebf46264 116
38baba9e 117 /* Clone it */
7d50a29f 118 fid = clone_fid(fid);
38baba9e
AV
119 if (IS_ERR(fid))
120 return PTR_ERR(fid);
121
ebf46264
AK
122 /*
123 * On success fid points to xattr
124 */
125 retval = p9_client_xattrcreate(fid, name, value_len, flags);
070b3656 126 if (retval < 0)
5d385153
JP
127 p9_debug(P9_DEBUG_VFS, "p9_client_xattrcreate failed %d\n",
128 retval);
070b3656
AV
129 else
130 p9_client_write(fid, 0, &from, &retval);
3111784b 131 err = p9_client_clunk(fid);
132 if (!retval && err)
133 retval = err;
bdd5c28d 134 return retval;
ebf46264
AK
135}
136
137ssize_t v9fs_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
138{
139 return v9fs_xattr_get(dentry, NULL, buffer, buffer_size);
140}
141
e409de99 142static int v9fs_xattr_handler_get(const struct xattr_handler *handler,
b296821a
AV
143 struct dentry *dentry, struct inode *inode,
144 const char *name, void *buffer, size_t size)
e409de99
AG
145{
146 const char *full_name = xattr_full_name(handler, name);
147
e409de99
AG
148 return v9fs_xattr_get(dentry, full_name, buffer, size);
149}
150
151static int v9fs_xattr_handler_set(const struct xattr_handler *handler,
e65ce2a5 152 struct user_namespace *mnt_userns,
59301226
AV
153 struct dentry *dentry, struct inode *inode,
154 const char *name, const void *value,
155 size_t size, int flags)
e409de99
AG
156{
157 const char *full_name = xattr_full_name(handler, name);
158
e409de99
AG
159 return v9fs_xattr_set(dentry, full_name, value, size, flags);
160}
161
162static struct xattr_handler v9fs_xattr_user_handler = {
163 .prefix = XATTR_USER_PREFIX,
164 .get = v9fs_xattr_handler_get,
165 .set = v9fs_xattr_handler_set,
166};
167
168static struct xattr_handler v9fs_xattr_trusted_handler = {
169 .prefix = XATTR_TRUSTED_PREFIX,
170 .get = v9fs_xattr_handler_get,
171 .set = v9fs_xattr_handler_set,
172};
173
174#ifdef CONFIG_9P_FS_SECURITY
175static struct xattr_handler v9fs_xattr_security_handler = {
176 .prefix = XATTR_SECURITY_PREFIX,
177 .get = v9fs_xattr_handler_get,
178 .set = v9fs_xattr_handler_set,
179};
180#endif
181
ebf46264
AK
182const struct xattr_handler *v9fs_xattr_handlers[] = {
183 &v9fs_xattr_user_handler,
d9a73859 184 &v9fs_xattr_trusted_handler,
7a4566b0
AK
185#ifdef CONFIG_9P_FS_POSIX_ACL
186 &v9fs_xattr_acl_access_handler,
187 &v9fs_xattr_acl_default_handler,
d9a73859
JG
188#endif
189#ifdef CONFIG_9P_FS_SECURITY
190 &v9fs_xattr_security_handler,
7a4566b0 191#endif
ebf46264
AK
192 NULL
193};
This page took 0.678591 seconds and 4 git commands to generate.