blob: ef5da7538cd5177f78c31542121ad36f2d24115e [file] [log] [blame]
Mike Marshall1182fca2015-07-17 10:38:15 -04001/*
2 * (C) 2001 Clemson University and The University of Chicago
3 *
4 * See COPYING in top-level directory.
5 */
6
7/*
8 * Linux VFS extended attribute operations.
9 */
10
11#include "protocol.h"
Mike Marshall575e9462015-12-04 12:56:14 -050012#include "orangefs-kernel.h"
13#include "orangefs-bufmap.h"
Mike Marshall1182fca2015-07-17 10:38:15 -040014#include <linux/posix_acl_xattr.h>
15#include <linux/xattr.h>
16
17
Yi Liu8bb8aef2015-11-24 15:12:14 -050018#define SYSTEM_ORANGEFS_KEY "system.pvfs2."
19#define SYSTEM_ORANGEFS_KEY_LEN 13
Mike Marshall1182fca2015-07-17 10:38:15 -040020
21/*
22 * this function returns
23 * 0 if the key corresponding to name is not meant to be printed as part
24 * of a listxattr.
25 * 1 if the key corresponding to name is meant to be returned as part of
26 * a listxattr.
Yi Liu8bb8aef2015-11-24 15:12:14 -050027 * The ones that start SYSTEM_ORANGEFS_KEY are the ones to avoid printing.
Mike Marshall1182fca2015-07-17 10:38:15 -040028 */
29static int is_reserved_key(const char *key, size_t size)
30{
31
Yi Liu8bb8aef2015-11-24 15:12:14 -050032 if (size < SYSTEM_ORANGEFS_KEY_LEN)
Mike Marshall1182fca2015-07-17 10:38:15 -040033 return 1;
34
Yi Liu8bb8aef2015-11-24 15:12:14 -050035 return strncmp(key, SYSTEM_ORANGEFS_KEY, SYSTEM_ORANGEFS_KEY_LEN) ? 1 : 0;
Mike Marshall1182fca2015-07-17 10:38:15 -040036}
37
38static inline int convert_to_internal_xattr_flags(int setxattr_flags)
39{
40 int internal_flag = 0;
41
42 if (setxattr_flags & XATTR_REPLACE) {
43 /* Attribute must exist! */
Yi Liu8bb8aef2015-11-24 15:12:14 -050044 internal_flag = ORANGEFS_XATTR_REPLACE;
Mike Marshall1182fca2015-07-17 10:38:15 -040045 } else if (setxattr_flags & XATTR_CREATE) {
46 /* Attribute must not exist */
Yi Liu8bb8aef2015-11-24 15:12:14 -050047 internal_flag = ORANGEFS_XATTR_CREATE;
Mike Marshall1182fca2015-07-17 10:38:15 -040048 }
49 return internal_flag;
50}
51
52
53/*
54 * Tries to get a specified key's attributes of a given
55 * file into a user-specified buffer. Note that the getxattr
56 * interface allows for the users to probe the size of an
57 * extended attribute by passing in a value of 0 to size.
58 * Thus our return value is always the size of the attribute
59 * unless the key does not exist for the file and/or if
60 * there were errors in fetching the attribute value.
61 */
Yi Liu8bb8aef2015-11-24 15:12:14 -050062ssize_t orangefs_inode_getxattr(struct inode *inode, const char *prefix,
Mike Marshall1182fca2015-07-17 10:38:15 -040063 const char *name, void *buffer, size_t size)
64{
Yi Liu8bb8aef2015-11-24 15:12:14 -050065 struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
66 struct orangefs_kernel_op_s *new_op = NULL;
Mike Marshall1182fca2015-07-17 10:38:15 -040067 ssize_t ret = -ENOMEM;
68 ssize_t length = 0;
69 int fsuid;
70 int fsgid;
71
72 gossip_debug(GOSSIP_XATTR_DEBUG,
73 "%s: prefix %s name %s, buffer_size %zd\n",
74 __func__, prefix, name, size);
75
76 if (name == NULL || (size > 0 && buffer == NULL)) {
Yi Liu8bb8aef2015-11-24 15:12:14 -050077 gossip_err("orangefs_inode_getxattr: bogus NULL pointers\n");
Mike Marshall1182fca2015-07-17 10:38:15 -040078 return -EINVAL;
79 }
Yi Liu8bb8aef2015-11-24 15:12:14 -050080 if ((strlen(name) + strlen(prefix)) >= ORANGEFS_MAX_XATTR_NAMELEN) {
Mike Marshalleeaa3d42015-07-29 13:36:37 -040081 gossip_err("Invalid key length (%d)\n",
Mike Marshall1182fca2015-07-17 10:38:15 -040082 (int)(strlen(name) + strlen(prefix)));
83 return -EINVAL;
84 }
85
86 fsuid = from_kuid(current_user_ns(), current_fsuid());
87 fsgid = from_kgid(current_user_ns(), current_fsgid());
88
89 gossip_debug(GOSSIP_XATTR_DEBUG,
90 "getxattr on inode %pU, name %s "
91 "(uid %o, gid %o)\n",
92 get_khandle_from_ino(inode),
93 name,
94 fsuid,
95 fsgid);
96
Yi Liu8bb8aef2015-11-24 15:12:14 -050097 down_read(&orangefs_inode->xattr_sem);
Mike Marshall1182fca2015-07-17 10:38:15 -040098
Yi Liu8bb8aef2015-11-24 15:12:14 -050099 new_op = op_alloc(ORANGEFS_VFS_OP_GETXATTR);
Mike Marshall1182fca2015-07-17 10:38:15 -0400100 if (!new_op)
101 goto out_unlock;
102
Yi Liu8bb8aef2015-11-24 15:12:14 -0500103 new_op->upcall.req.getxattr.refn = orangefs_inode->refn;
Mike Marshall1182fca2015-07-17 10:38:15 -0400104 ret = snprintf((char *)new_op->upcall.req.getxattr.key,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500105 ORANGEFS_MAX_XATTR_NAMELEN, "%s%s", prefix, name);
Mike Marshall1182fca2015-07-17 10:38:15 -0400106
107 /*
108 * NOTE: Although keys are meant to be NULL terminated textual
109 * strings, I am going to explicitly pass the length just in case
110 * we change this later on...
111 */
112 new_op->upcall.req.getxattr.key_sz = ret + 1;
113
Yi Liu8bb8aef2015-11-24 15:12:14 -0500114 ret = service_operation(new_op, "orangefs_inode_getxattr",
Mike Marshall1182fca2015-07-17 10:38:15 -0400115 get_interruptible_flag(inode));
116 if (ret != 0) {
117 if (ret == -ENOENT) {
118 ret = -ENODATA;
119 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500120 "orangefs_inode_getxattr: inode %pU key %s"
Mike Marshall1182fca2015-07-17 10:38:15 -0400121 " does not exist!\n",
122 get_khandle_from_ino(inode),
123 (char *)new_op->upcall.req.getxattr.key);
124 }
125 goto out_release_op;
126 }
127
128 /*
129 * Length returned includes null terminator.
130 */
131 length = new_op->downcall.resp.getxattr.val_sz;
132
133 /*
134 * Just return the length of the queried attribute.
135 */
136 if (size == 0) {
137 ret = length;
138 goto out_release_op;
139 }
140
141 /*
142 * Check to see if key length is > provided buffer size.
143 */
144 if (length > size) {
145 ret = -ERANGE;
146 goto out_release_op;
147 }
148
149 memset(buffer, 0, size);
150 memcpy(buffer, new_op->downcall.resp.getxattr.val, length);
151 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500152 "orangefs_inode_getxattr: inode %pU "
Mike Marshall1182fca2015-07-17 10:38:15 -0400153 "key %s key_sz %d, val_len %d\n",
154 get_khandle_from_ino(inode),
155 (char *)new_op->
156 upcall.req.getxattr.key,
157 (int)new_op->
158 upcall.req.getxattr.key_sz,
159 (int)ret);
160
161 ret = length;
162
163out_release_op:
164 op_release(new_op);
165out_unlock:
Yi Liu8bb8aef2015-11-24 15:12:14 -0500166 up_read(&orangefs_inode->xattr_sem);
Mike Marshall1182fca2015-07-17 10:38:15 -0400167 return ret;
168}
169
Yi Liu8bb8aef2015-11-24 15:12:14 -0500170static int orangefs_inode_removexattr(struct inode *inode,
Mike Marshall1182fca2015-07-17 10:38:15 -0400171 const char *prefix,
172 const char *name,
173 int flags)
174{
Yi Liu8bb8aef2015-11-24 15:12:14 -0500175 struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
176 struct orangefs_kernel_op_s *new_op = NULL;
Mike Marshall1182fca2015-07-17 10:38:15 -0400177 int ret = -ENOMEM;
178
Yi Liu8bb8aef2015-11-24 15:12:14 -0500179 down_write(&orangefs_inode->xattr_sem);
180 new_op = op_alloc(ORANGEFS_VFS_OP_REMOVEXATTR);
Mike Marshall1182fca2015-07-17 10:38:15 -0400181 if (!new_op)
182 goto out_unlock;
183
Yi Liu8bb8aef2015-11-24 15:12:14 -0500184 new_op->upcall.req.removexattr.refn = orangefs_inode->refn;
Mike Marshall1182fca2015-07-17 10:38:15 -0400185 /*
186 * NOTE: Although keys are meant to be NULL terminated
187 * textual strings, I am going to explicitly pass the
188 * length just in case we change this later on...
189 */
190 ret = snprintf((char *)new_op->upcall.req.removexattr.key,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500191 ORANGEFS_MAX_XATTR_NAMELEN,
Mike Marshall1182fca2015-07-17 10:38:15 -0400192 "%s%s",
193 (prefix ? prefix : ""),
194 name);
195 new_op->upcall.req.removexattr.key_sz = ret + 1;
196
197 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500198 "orangefs_inode_removexattr: key %s, key_sz %d\n",
Mike Marshall1182fca2015-07-17 10:38:15 -0400199 (char *)new_op->upcall.req.removexattr.key,
200 (int)new_op->upcall.req.removexattr.key_sz);
201
202 ret = service_operation(new_op,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500203 "orangefs_inode_removexattr",
Mike Marshall1182fca2015-07-17 10:38:15 -0400204 get_interruptible_flag(inode));
205 if (ret == -ENOENT) {
206 /*
207 * Request to replace a non-existent attribute is an error.
208 */
209 if (flags & XATTR_REPLACE)
210 ret = -ENODATA;
211 else
212 ret = 0;
213 }
214
215 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500216 "orangefs_inode_removexattr: returning %d\n", ret);
Mike Marshall1182fca2015-07-17 10:38:15 -0400217
218 op_release(new_op);
219out_unlock:
Yi Liu8bb8aef2015-11-24 15:12:14 -0500220 up_write(&orangefs_inode->xattr_sem);
Mike Marshall1182fca2015-07-17 10:38:15 -0400221 return ret;
222}
223
224/*
225 * Tries to set an attribute for a given key on a file.
226 *
227 * Returns a -ve number on error and 0 on success. Key is text, but value
228 * can be binary!
229 */
Yi Liu8bb8aef2015-11-24 15:12:14 -0500230int orangefs_inode_setxattr(struct inode *inode, const char *prefix,
Mike Marshall1182fca2015-07-17 10:38:15 -0400231 const char *name, const void *value, size_t size, int flags)
232{
Yi Liu8bb8aef2015-11-24 15:12:14 -0500233 struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
234 struct orangefs_kernel_op_s *new_op;
Mike Marshall1182fca2015-07-17 10:38:15 -0400235 int internal_flag = 0;
236 int ret = -ENOMEM;
237
238 gossip_debug(GOSSIP_XATTR_DEBUG,
239 "%s: prefix %s, name %s, buffer_size %zd\n",
240 __func__, prefix, name, size);
241
242 if (size < 0 ||
Yi Liu8bb8aef2015-11-24 15:12:14 -0500243 size >= ORANGEFS_MAX_XATTR_VALUELEN ||
Mike Marshall1182fca2015-07-17 10:38:15 -0400244 flags < 0) {
Yi Liu8bb8aef2015-11-24 15:12:14 -0500245 gossip_err("orangefs_inode_setxattr: bogus values of size(%d), flags(%d)\n",
Mike Marshall1182fca2015-07-17 10:38:15 -0400246 (int)size,
247 flags);
248 return -EINVAL;
249 }
250
251 if (name == NULL ||
252 (size > 0 && value == NULL)) {
Yi Liu8bb8aef2015-11-24 15:12:14 -0500253 gossip_err("orangefs_inode_setxattr: bogus NULL pointers!\n");
Mike Marshall1182fca2015-07-17 10:38:15 -0400254 return -EINVAL;
255 }
256
257 internal_flag = convert_to_internal_xattr_flags(flags);
258
259 if (prefix) {
Yi Liu8bb8aef2015-11-24 15:12:14 -0500260 if (strlen(name) + strlen(prefix) >= ORANGEFS_MAX_XATTR_NAMELEN) {
Mike Marshall1182fca2015-07-17 10:38:15 -0400261 gossip_err
Yi Liu8bb8aef2015-11-24 15:12:14 -0500262 ("orangefs_inode_setxattr: bogus key size (%d)\n",
Mike Marshall1182fca2015-07-17 10:38:15 -0400263 (int)(strlen(name) + strlen(prefix)));
264 return -EINVAL;
265 }
266 } else {
Yi Liu8bb8aef2015-11-24 15:12:14 -0500267 if (strlen(name) >= ORANGEFS_MAX_XATTR_NAMELEN) {
Mike Marshall1182fca2015-07-17 10:38:15 -0400268 gossip_err
Yi Liu8bb8aef2015-11-24 15:12:14 -0500269 ("orangefs_inode_setxattr: bogus key size (%d)\n",
Mike Marshall1182fca2015-07-17 10:38:15 -0400270 (int)(strlen(name)));
271 return -EINVAL;
272 }
273 }
274
275 /* This is equivalent to a removexattr */
276 if (size == 0 && value == NULL) {
277 gossip_debug(GOSSIP_XATTR_DEBUG,
278 "removing xattr (%s%s)\n",
279 prefix,
280 name);
Yi Liu8bb8aef2015-11-24 15:12:14 -0500281 return orangefs_inode_removexattr(inode, prefix, name, flags);
Mike Marshall1182fca2015-07-17 10:38:15 -0400282 }
283
284 gossip_debug(GOSSIP_XATTR_DEBUG,
285 "setxattr on inode %pU, name %s\n",
286 get_khandle_from_ino(inode),
287 name);
288
Yi Liu8bb8aef2015-11-24 15:12:14 -0500289 down_write(&orangefs_inode->xattr_sem);
290 new_op = op_alloc(ORANGEFS_VFS_OP_SETXATTR);
Mike Marshall1182fca2015-07-17 10:38:15 -0400291 if (!new_op)
292 goto out_unlock;
293
294
Yi Liu8bb8aef2015-11-24 15:12:14 -0500295 new_op->upcall.req.setxattr.refn = orangefs_inode->refn;
Mike Marshall1182fca2015-07-17 10:38:15 -0400296 new_op->upcall.req.setxattr.flags = internal_flag;
297 /*
298 * NOTE: Although keys are meant to be NULL terminated textual
299 * strings, I am going to explicitly pass the length just in
300 * case we change this later on...
301 */
302 ret = snprintf((char *)new_op->upcall.req.setxattr.keyval.key,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500303 ORANGEFS_MAX_XATTR_NAMELEN,
Mike Marshall1182fca2015-07-17 10:38:15 -0400304 "%s%s",
305 prefix, name);
306 new_op->upcall.req.setxattr.keyval.key_sz = ret + 1;
307 memcpy(new_op->upcall.req.setxattr.keyval.val, value, size);
308 new_op->upcall.req.setxattr.keyval.val_sz = size;
309
310 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500311 "orangefs_inode_setxattr: key %s, key_sz %d "
Mike Marshall1182fca2015-07-17 10:38:15 -0400312 " value size %zd\n",
313 (char *)new_op->upcall.req.setxattr.keyval.key,
314 (int)new_op->upcall.req.setxattr.keyval.key_sz,
315 size);
316
317 ret = service_operation(new_op,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500318 "orangefs_inode_setxattr",
Mike Marshall1182fca2015-07-17 10:38:15 -0400319 get_interruptible_flag(inode));
320
321 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500322 "orangefs_inode_setxattr: returning %d\n",
Mike Marshall1182fca2015-07-17 10:38:15 -0400323 ret);
324
325 /* when request is serviced properly, free req op struct */
326 op_release(new_op);
327out_unlock:
Yi Liu8bb8aef2015-11-24 15:12:14 -0500328 up_write(&orangefs_inode->xattr_sem);
Mike Marshall1182fca2015-07-17 10:38:15 -0400329 return ret;
330}
331
332/*
333 * Tries to get a specified object's keys into a user-specified buffer of a
334 * given size. Note that like the previous instances of xattr routines, this
335 * also allows you to pass in a NULL pointer and 0 size to probe the size for
336 * subsequent memory allocations. Thus our return value is always the size of
337 * all the keys unless there were errors in fetching the keys!
338 */
Yi Liu8bb8aef2015-11-24 15:12:14 -0500339ssize_t orangefs_listxattr(struct dentry *dentry, char *buffer, size_t size)
Mike Marshall1182fca2015-07-17 10:38:15 -0400340{
341 struct inode *inode = dentry->d_inode;
Yi Liu8bb8aef2015-11-24 15:12:14 -0500342 struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
343 struct orangefs_kernel_op_s *new_op;
344 __u64 token = ORANGEFS_ITERATE_START;
Mike Marshall1182fca2015-07-17 10:38:15 -0400345 ssize_t ret = -ENOMEM;
346 ssize_t total = 0;
Mike Marshall1182fca2015-07-17 10:38:15 -0400347 int count_keys = 0;
348 int key_size;
349 int i = 0;
Mike Marshall62441fa2015-12-17 16:11:40 -0500350 int returned_count = 0;
Mike Marshall1182fca2015-07-17 10:38:15 -0400351
352 if (size > 0 && buffer == NULL) {
353 gossip_err("%s: bogus NULL pointers\n", __func__);
354 return -EINVAL;
355 }
356 if (size < 0) {
357 gossip_err("Invalid size (%d)\n", (int)size);
358 return -EINVAL;
359 }
360
Yi Liu8bb8aef2015-11-24 15:12:14 -0500361 down_read(&orangefs_inode->xattr_sem);
362 new_op = op_alloc(ORANGEFS_VFS_OP_LISTXATTR);
Mike Marshall1182fca2015-07-17 10:38:15 -0400363 if (!new_op)
364 goto out_unlock;
365
366 if (buffer && size > 0)
367 memset(buffer, 0, size);
368
369try_again:
370 key_size = 0;
Yi Liu8bb8aef2015-11-24 15:12:14 -0500371 new_op->upcall.req.listxattr.refn = orangefs_inode->refn;
Mike Marshall1182fca2015-07-17 10:38:15 -0400372 new_op->upcall.req.listxattr.token = token;
373 new_op->upcall.req.listxattr.requested_count =
Yi Liu8bb8aef2015-11-24 15:12:14 -0500374 (size == 0) ? 0 : ORANGEFS_MAX_XATTR_LISTLEN;
Mike Marshall1182fca2015-07-17 10:38:15 -0400375 ret = service_operation(new_op, __func__,
376 get_interruptible_flag(inode));
377 if (ret != 0)
378 goto done;
379
380 if (size == 0) {
381 /*
382 * This is a bit of a big upper limit, but I did not want to
383 * spend too much time getting this correct, since users end
384 * up allocating memory rather than us...
385 */
386 total = new_op->downcall.resp.listxattr.returned_count *
Yi Liu8bb8aef2015-11-24 15:12:14 -0500387 ORANGEFS_MAX_XATTR_NAMELEN;
Mike Marshall1182fca2015-07-17 10:38:15 -0400388 goto done;
389 }
390
Mike Marshall62441fa2015-12-17 16:11:40 -0500391 returned_count = new_op->downcall.resp.listxattr.returned_count;
392 if (returned_count < 0 ||
393 returned_count >= ORANGEFS_MAX_XATTR_LISTLEN) {
394 gossip_err("%s: impossible value for returned_count:%d:\n",
395 __func__,
396 returned_count);
Martin Brandenburg02a5cc52016-03-16 14:01:43 -0400397 ret = -EIO;
Mike Marshall62441fa2015-12-17 16:11:40 -0500398 goto done;
399 }
400
Mike Marshall1182fca2015-07-17 10:38:15 -0400401 /*
402 * Check to see how much can be fit in the buffer. Fit only whole keys.
403 */
Mike Marshall62441fa2015-12-17 16:11:40 -0500404 for (i = 0; i < returned_count; i++) {
Martin Brandenburg02a5cc52016-03-16 14:01:43 -0400405 if (new_op->downcall.resp.listxattr.lengths[i] < 0 ||
406 new_op->downcall.resp.listxattr.lengths[i] >
407 ORANGEFS_MAX_XATTR_NAMELEN) {
408 gossip_err("%s: impossible value for lengths[%d]\n",
409 __func__,
410 new_op->downcall.resp.listxattr.lengths[i]);
411 ret = -EIO;
412 goto done;
413 }
Mike Marshall1182fca2015-07-17 10:38:15 -0400414 if (total + new_op->downcall.resp.listxattr.lengths[i] > size)
415 goto done;
416
417 /*
418 * Since many dumb programs try to setxattr() on our reserved
419 * xattrs this is a feeble attempt at defeating those by not
420 * listing them in the output of listxattr.. sigh
421 */
422 if (is_reserved_key(new_op->downcall.resp.listxattr.key +
423 key_size,
424 new_op->downcall.resp.
425 listxattr.lengths[i])) {
426 gossip_debug(GOSSIP_XATTR_DEBUG, "Copying key %d -> %s\n",
427 i, new_op->downcall.resp.listxattr.key +
428 key_size);
429 memcpy(buffer + total,
430 new_op->downcall.resp.listxattr.key + key_size,
431 new_op->downcall.resp.listxattr.lengths[i]);
432 total += new_op->downcall.resp.listxattr.lengths[i];
433 count_keys++;
434 } else {
435 gossip_debug(GOSSIP_XATTR_DEBUG, "[RESERVED] key %d -> %s\n",
436 i, new_op->downcall.resp.listxattr.key +
437 key_size);
438 }
439 key_size += new_op->downcall.resp.listxattr.lengths[i];
440 }
441
442 /*
443 * Since the buffer was large enough, we might have to continue
444 * fetching more keys!
445 */
446 token = new_op->downcall.resp.listxattr.token;
Yi Liu8bb8aef2015-11-24 15:12:14 -0500447 if (token != ORANGEFS_ITERATE_END)
Mike Marshall1182fca2015-07-17 10:38:15 -0400448 goto try_again;
449
450done:
451 gossip_debug(GOSSIP_XATTR_DEBUG, "%s: returning %d"
452 " [size of buffer %ld] (filled in %d keys)\n",
453 __func__,
454 ret ? (int)ret : (int)total,
455 (long)size,
456 count_keys);
457 op_release(new_op);
458 if (ret == 0)
459 ret = total;
460out_unlock:
Yi Liu8bb8aef2015-11-24 15:12:14 -0500461 up_read(&orangefs_inode->xattr_sem);
Mike Marshall1182fca2015-07-17 10:38:15 -0400462 return ret;
463}
464
Yi Liu8bb8aef2015-11-24 15:12:14 -0500465static int orangefs_xattr_set_default(const struct xattr_handler *handler,
466 struct dentry *dentry,
467 const char *name,
468 const void *buffer,
469 size_t size,
470 int flags)
Mike Marshall1182fca2015-07-17 10:38:15 -0400471{
Yi Liu8bb8aef2015-11-24 15:12:14 -0500472 return orangefs_inode_setxattr(dentry->d_inode,
473 ORANGEFS_XATTR_NAME_DEFAULT_PREFIX,
Mike Marshall1182fca2015-07-17 10:38:15 -0400474 name,
475 buffer,
476 size,
477 flags);
478}
479
Yi Liu8bb8aef2015-11-24 15:12:14 -0500480static int orangefs_xattr_get_default(const struct xattr_handler *handler,
481 struct dentry *dentry,
482 const char *name,
483 void *buffer,
484 size_t size)
Mike Marshall1182fca2015-07-17 10:38:15 -0400485{
Yi Liu8bb8aef2015-11-24 15:12:14 -0500486 return orangefs_inode_getxattr(dentry->d_inode,
487 ORANGEFS_XATTR_NAME_DEFAULT_PREFIX,
Mike Marshall1182fca2015-07-17 10:38:15 -0400488 name,
489 buffer,
490 size);
491
492}
493
Yi Liu8bb8aef2015-11-24 15:12:14 -0500494static int orangefs_xattr_set_trusted(const struct xattr_handler *handler,
495 struct dentry *dentry,
496 const char *name,
497 const void *buffer,
498 size_t size,
499 int flags)
Mike Marshall1182fca2015-07-17 10:38:15 -0400500{
Yi Liu8bb8aef2015-11-24 15:12:14 -0500501 return orangefs_inode_setxattr(dentry->d_inode,
502 ORANGEFS_XATTR_NAME_TRUSTED_PREFIX,
Mike Marshall1182fca2015-07-17 10:38:15 -0400503 name,
504 buffer,
505 size,
506 flags);
507}
508
Yi Liu8bb8aef2015-11-24 15:12:14 -0500509static int orangefs_xattr_get_trusted(const struct xattr_handler *handler,
510 struct dentry *dentry,
511 const char *name,
512 void *buffer,
513 size_t size)
Mike Marshall1182fca2015-07-17 10:38:15 -0400514{
Yi Liu8bb8aef2015-11-24 15:12:14 -0500515 return orangefs_inode_getxattr(dentry->d_inode,
516 ORANGEFS_XATTR_NAME_TRUSTED_PREFIX,
Mike Marshall1182fca2015-07-17 10:38:15 -0400517 name,
518 buffer,
519 size);
520}
521
Yi Liu8bb8aef2015-11-24 15:12:14 -0500522static struct xattr_handler orangefs_xattr_trusted_handler = {
523 .prefix = ORANGEFS_XATTR_NAME_TRUSTED_PREFIX,
524 .get = orangefs_xattr_get_trusted,
525 .set = orangefs_xattr_set_trusted,
Mike Marshall1182fca2015-07-17 10:38:15 -0400526};
527
Yi Liu8bb8aef2015-11-24 15:12:14 -0500528static struct xattr_handler orangefs_xattr_default_handler = {
Mike Marshall1182fca2015-07-17 10:38:15 -0400529 /*
530 * NOTE: this is set to be the empty string.
531 * so that all un-prefixed xattrs keys get caught
532 * here!
533 */
Yi Liu8bb8aef2015-11-24 15:12:14 -0500534 .prefix = ORANGEFS_XATTR_NAME_DEFAULT_PREFIX,
535 .get = orangefs_xattr_get_default,
536 .set = orangefs_xattr_set_default,
Mike Marshall1182fca2015-07-17 10:38:15 -0400537};
538
Yi Liu8bb8aef2015-11-24 15:12:14 -0500539const struct xattr_handler *orangefs_xattr_handlers[] = {
Mike Marshall1182fca2015-07-17 10:38:15 -0400540 &posix_acl_access_xattr_handler,
541 &posix_acl_default_xattr_handler,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500542 &orangefs_xattr_trusted_handler,
543 &orangefs_xattr_default_handler,
Mike Marshall1182fca2015-07-17 10:38:15 -0400544 NULL
545};