blob: 5893ddde0e4b6ad8680f5481ea3f61611060b307 [file] [log] [blame]
Mike Marshall1182fca2015-07-17 10:38:15 -04001/*
2 * (C) 2001 Clemson University and The University of Chicago
3 *
4 * See COPYING in top-level directory.
5 */
6
7/*
8 * Linux VFS extended attribute operations.
9 */
10
11#include "protocol.h"
Mike Marshall575e9462015-12-04 12:56:14 -050012#include "orangefs-kernel.h"
13#include "orangefs-bufmap.h"
Mike Marshall1182fca2015-07-17 10:38:15 -040014#include <linux/posix_acl_xattr.h>
15#include <linux/xattr.h>
16
17
Yi Liu8bb8aef2015-11-24 15:12:14 -050018#define SYSTEM_ORANGEFS_KEY "system.pvfs2."
19#define SYSTEM_ORANGEFS_KEY_LEN 13
Mike Marshall1182fca2015-07-17 10:38:15 -040020
21/*
22 * this function returns
23 * 0 if the key corresponding to name is not meant to be printed as part
24 * of a listxattr.
25 * 1 if the key corresponding to name is meant to be returned as part of
26 * a listxattr.
Yi Liu8bb8aef2015-11-24 15:12:14 -050027 * The ones that start SYSTEM_ORANGEFS_KEY are the ones to avoid printing.
Mike Marshall1182fca2015-07-17 10:38:15 -040028 */
29static int is_reserved_key(const char *key, size_t size)
30{
31
Yi Liu8bb8aef2015-11-24 15:12:14 -050032 if (size < SYSTEM_ORANGEFS_KEY_LEN)
Mike Marshall1182fca2015-07-17 10:38:15 -040033 return 1;
34
Yi Liu8bb8aef2015-11-24 15:12:14 -050035 return strncmp(key, SYSTEM_ORANGEFS_KEY, SYSTEM_ORANGEFS_KEY_LEN) ? 1 : 0;
Mike Marshall1182fca2015-07-17 10:38:15 -040036}
37
38static inline int convert_to_internal_xattr_flags(int setxattr_flags)
39{
40 int internal_flag = 0;
41
42 if (setxattr_flags & XATTR_REPLACE) {
43 /* Attribute must exist! */
Yi Liu8bb8aef2015-11-24 15:12:14 -050044 internal_flag = ORANGEFS_XATTR_REPLACE;
Mike Marshall1182fca2015-07-17 10:38:15 -040045 } else if (setxattr_flags & XATTR_CREATE) {
46 /* Attribute must not exist */
Yi Liu8bb8aef2015-11-24 15:12:14 -050047 internal_flag = ORANGEFS_XATTR_CREATE;
Mike Marshall1182fca2015-07-17 10:38:15 -040048 }
49 return internal_flag;
50}
51
52
53/*
54 * Tries to get a specified key's attributes of a given
55 * file into a user-specified buffer. Note that the getxattr
56 * interface allows for the users to probe the size of an
57 * extended attribute by passing in a value of 0 to size.
58 * Thus our return value is always the size of the attribute
59 * unless the key does not exist for the file and/or if
60 * there were errors in fetching the attribute value.
61 */
Yi Liu8bb8aef2015-11-24 15:12:14 -050062ssize_t orangefs_inode_getxattr(struct inode *inode, const char *prefix,
Mike Marshall1182fca2015-07-17 10:38:15 -040063 const char *name, void *buffer, size_t size)
64{
Yi Liu8bb8aef2015-11-24 15:12:14 -050065 struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
66 struct orangefs_kernel_op_s *new_op = NULL;
Mike Marshall1182fca2015-07-17 10:38:15 -040067 ssize_t ret = -ENOMEM;
68 ssize_t length = 0;
69 int fsuid;
70 int fsgid;
71
72 gossip_debug(GOSSIP_XATTR_DEBUG,
73 "%s: prefix %s name %s, buffer_size %zd\n",
74 __func__, prefix, name, size);
75
Yi Liu8bb8aef2015-11-24 15:12:14 -050076 if ((strlen(name) + strlen(prefix)) >= ORANGEFS_MAX_XATTR_NAMELEN) {
Mike Marshalleeaa3d42015-07-29 13:36:37 -040077 gossip_err("Invalid key length (%d)\n",
Mike Marshall1182fca2015-07-17 10:38:15 -040078 (int)(strlen(name) + strlen(prefix)));
79 return -EINVAL;
80 }
81
82 fsuid = from_kuid(current_user_ns(), current_fsuid());
83 fsgid = from_kgid(current_user_ns(), current_fsgid());
84
85 gossip_debug(GOSSIP_XATTR_DEBUG,
86 "getxattr on inode %pU, name %s "
87 "(uid %o, gid %o)\n",
88 get_khandle_from_ino(inode),
89 name,
90 fsuid,
91 fsgid);
92
Yi Liu8bb8aef2015-11-24 15:12:14 -050093 down_read(&orangefs_inode->xattr_sem);
Mike Marshall1182fca2015-07-17 10:38:15 -040094
Yi Liu8bb8aef2015-11-24 15:12:14 -050095 new_op = op_alloc(ORANGEFS_VFS_OP_GETXATTR);
Mike Marshall1182fca2015-07-17 10:38:15 -040096 if (!new_op)
97 goto out_unlock;
98
Yi Liu8bb8aef2015-11-24 15:12:14 -050099 new_op->upcall.req.getxattr.refn = orangefs_inode->refn;
Mike Marshall1182fca2015-07-17 10:38:15 -0400100 ret = snprintf((char *)new_op->upcall.req.getxattr.key,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500101 ORANGEFS_MAX_XATTR_NAMELEN, "%s%s", prefix, name);
Mike Marshall1182fca2015-07-17 10:38:15 -0400102
103 /*
104 * NOTE: Although keys are meant to be NULL terminated textual
105 * strings, I am going to explicitly pass the length just in case
106 * we change this later on...
107 */
108 new_op->upcall.req.getxattr.key_sz = ret + 1;
109
Yi Liu8bb8aef2015-11-24 15:12:14 -0500110 ret = service_operation(new_op, "orangefs_inode_getxattr",
Mike Marshall1182fca2015-07-17 10:38:15 -0400111 get_interruptible_flag(inode));
112 if (ret != 0) {
113 if (ret == -ENOENT) {
114 ret = -ENODATA;
115 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500116 "orangefs_inode_getxattr: inode %pU key %s"
Mike Marshall1182fca2015-07-17 10:38:15 -0400117 " does not exist!\n",
118 get_khandle_from_ino(inode),
119 (char *)new_op->upcall.req.getxattr.key);
120 }
121 goto out_release_op;
122 }
123
124 /*
125 * Length returned includes null terminator.
126 */
127 length = new_op->downcall.resp.getxattr.val_sz;
128
129 /*
130 * Just return the length of the queried attribute.
131 */
132 if (size == 0) {
133 ret = length;
134 goto out_release_op;
135 }
136
137 /*
138 * Check to see if key length is > provided buffer size.
139 */
140 if (length > size) {
141 ret = -ERANGE;
142 goto out_release_op;
143 }
144
Mike Marshall1182fca2015-07-17 10:38:15 -0400145 memcpy(buffer, new_op->downcall.resp.getxattr.val, length);
Mike Marshalla9bb3ba2016-04-06 11:19:37 -0400146 memset(buffer + length, 0, size - length);
Mike Marshall1182fca2015-07-17 10:38:15 -0400147 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500148 "orangefs_inode_getxattr: inode %pU "
Mike Marshall1182fca2015-07-17 10:38:15 -0400149 "key %s key_sz %d, val_len %d\n",
150 get_khandle_from_ino(inode),
151 (char *)new_op->
152 upcall.req.getxattr.key,
153 (int)new_op->
154 upcall.req.getxattr.key_sz,
155 (int)ret);
156
157 ret = length;
158
159out_release_op:
160 op_release(new_op);
161out_unlock:
Yi Liu8bb8aef2015-11-24 15:12:14 -0500162 up_read(&orangefs_inode->xattr_sem);
Mike Marshall1182fca2015-07-17 10:38:15 -0400163 return ret;
164}
165
Yi Liu8bb8aef2015-11-24 15:12:14 -0500166static int orangefs_inode_removexattr(struct inode *inode,
Mike Marshall1182fca2015-07-17 10:38:15 -0400167 const char *prefix,
168 const char *name,
169 int flags)
170{
Yi Liu8bb8aef2015-11-24 15:12:14 -0500171 struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
172 struct orangefs_kernel_op_s *new_op = NULL;
Mike Marshall1182fca2015-07-17 10:38:15 -0400173 int ret = -ENOMEM;
174
Yi Liu8bb8aef2015-11-24 15:12:14 -0500175 down_write(&orangefs_inode->xattr_sem);
176 new_op = op_alloc(ORANGEFS_VFS_OP_REMOVEXATTR);
Mike Marshall1182fca2015-07-17 10:38:15 -0400177 if (!new_op)
178 goto out_unlock;
179
Yi Liu8bb8aef2015-11-24 15:12:14 -0500180 new_op->upcall.req.removexattr.refn = orangefs_inode->refn;
Mike Marshall1182fca2015-07-17 10:38:15 -0400181 /*
182 * NOTE: Although keys are meant to be NULL terminated
183 * textual strings, I am going to explicitly pass the
184 * length just in case we change this later on...
185 */
186 ret = snprintf((char *)new_op->upcall.req.removexattr.key,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500187 ORANGEFS_MAX_XATTR_NAMELEN,
Mike Marshall1182fca2015-07-17 10:38:15 -0400188 "%s%s",
189 (prefix ? prefix : ""),
190 name);
191 new_op->upcall.req.removexattr.key_sz = ret + 1;
192
193 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500194 "orangefs_inode_removexattr: key %s, key_sz %d\n",
Mike Marshall1182fca2015-07-17 10:38:15 -0400195 (char *)new_op->upcall.req.removexattr.key,
196 (int)new_op->upcall.req.removexattr.key_sz);
197
198 ret = service_operation(new_op,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500199 "orangefs_inode_removexattr",
Mike Marshall1182fca2015-07-17 10:38:15 -0400200 get_interruptible_flag(inode));
201 if (ret == -ENOENT) {
202 /*
203 * Request to replace a non-existent attribute is an error.
204 */
205 if (flags & XATTR_REPLACE)
206 ret = -ENODATA;
207 else
208 ret = 0;
209 }
210
211 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500212 "orangefs_inode_removexattr: returning %d\n", ret);
Mike Marshall1182fca2015-07-17 10:38:15 -0400213
214 op_release(new_op);
215out_unlock:
Yi Liu8bb8aef2015-11-24 15:12:14 -0500216 up_write(&orangefs_inode->xattr_sem);
Mike Marshall1182fca2015-07-17 10:38:15 -0400217 return ret;
218}
219
220/*
221 * Tries to set an attribute for a given key on a file.
222 *
223 * Returns a -ve number on error and 0 on success. Key is text, but value
224 * can be binary!
225 */
Yi Liu8bb8aef2015-11-24 15:12:14 -0500226int orangefs_inode_setxattr(struct inode *inode, const char *prefix,
Mike Marshall1182fca2015-07-17 10:38:15 -0400227 const char *name, const void *value, size_t size, int flags)
228{
Yi Liu8bb8aef2015-11-24 15:12:14 -0500229 struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
230 struct orangefs_kernel_op_s *new_op;
Mike Marshall1182fca2015-07-17 10:38:15 -0400231 int internal_flag = 0;
232 int ret = -ENOMEM;
233
234 gossip_debug(GOSSIP_XATTR_DEBUG,
235 "%s: prefix %s, name %s, buffer_size %zd\n",
236 __func__, prefix, name, size);
237
Mike Marshall2d09a2c2016-04-06 10:52:38 -0400238 if (size >= ORANGEFS_MAX_XATTR_VALUELEN ||
Mike Marshall1182fca2015-07-17 10:38:15 -0400239 flags < 0) {
Yi Liu8bb8aef2015-11-24 15:12:14 -0500240 gossip_err("orangefs_inode_setxattr: bogus values of size(%d), flags(%d)\n",
Mike Marshall1182fca2015-07-17 10:38:15 -0400241 (int)size,
242 flags);
243 return -EINVAL;
244 }
245
Mike Marshall1182fca2015-07-17 10:38:15 -0400246 internal_flag = convert_to_internal_xattr_flags(flags);
247
248 if (prefix) {
Yi Liu8bb8aef2015-11-24 15:12:14 -0500249 if (strlen(name) + strlen(prefix) >= ORANGEFS_MAX_XATTR_NAMELEN) {
Mike Marshall1182fca2015-07-17 10:38:15 -0400250 gossip_err
Yi Liu8bb8aef2015-11-24 15:12:14 -0500251 ("orangefs_inode_setxattr: bogus key size (%d)\n",
Mike Marshall1182fca2015-07-17 10:38:15 -0400252 (int)(strlen(name) + strlen(prefix)));
253 return -EINVAL;
254 }
255 } else {
Yi Liu8bb8aef2015-11-24 15:12:14 -0500256 if (strlen(name) >= ORANGEFS_MAX_XATTR_NAMELEN) {
Mike Marshall1182fca2015-07-17 10:38:15 -0400257 gossip_err
Yi Liu8bb8aef2015-11-24 15:12:14 -0500258 ("orangefs_inode_setxattr: bogus key size (%d)\n",
Mike Marshall1182fca2015-07-17 10:38:15 -0400259 (int)(strlen(name)));
260 return -EINVAL;
261 }
262 }
263
264 /* This is equivalent to a removexattr */
265 if (size == 0 && value == NULL) {
266 gossip_debug(GOSSIP_XATTR_DEBUG,
267 "removing xattr (%s%s)\n",
268 prefix,
269 name);
Yi Liu8bb8aef2015-11-24 15:12:14 -0500270 return orangefs_inode_removexattr(inode, prefix, name, flags);
Mike Marshall1182fca2015-07-17 10:38:15 -0400271 }
272
273 gossip_debug(GOSSIP_XATTR_DEBUG,
274 "setxattr on inode %pU, name %s\n",
275 get_khandle_from_ino(inode),
276 name);
277
Yi Liu8bb8aef2015-11-24 15:12:14 -0500278 down_write(&orangefs_inode->xattr_sem);
279 new_op = op_alloc(ORANGEFS_VFS_OP_SETXATTR);
Mike Marshall1182fca2015-07-17 10:38:15 -0400280 if (!new_op)
281 goto out_unlock;
282
283
Yi Liu8bb8aef2015-11-24 15:12:14 -0500284 new_op->upcall.req.setxattr.refn = orangefs_inode->refn;
Mike Marshall1182fca2015-07-17 10:38:15 -0400285 new_op->upcall.req.setxattr.flags = internal_flag;
286 /*
287 * NOTE: Although keys are meant to be NULL terminated textual
288 * strings, I am going to explicitly pass the length just in
289 * case we change this later on...
290 */
291 ret = snprintf((char *)new_op->upcall.req.setxattr.keyval.key,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500292 ORANGEFS_MAX_XATTR_NAMELEN,
Mike Marshall1182fca2015-07-17 10:38:15 -0400293 "%s%s",
294 prefix, name);
295 new_op->upcall.req.setxattr.keyval.key_sz = ret + 1;
296 memcpy(new_op->upcall.req.setxattr.keyval.val, value, size);
297 new_op->upcall.req.setxattr.keyval.val_sz = size;
298
299 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500300 "orangefs_inode_setxattr: key %s, key_sz %d "
Mike Marshall1182fca2015-07-17 10:38:15 -0400301 " value size %zd\n",
302 (char *)new_op->upcall.req.setxattr.keyval.key,
303 (int)new_op->upcall.req.setxattr.keyval.key_sz,
304 size);
305
306 ret = service_operation(new_op,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500307 "orangefs_inode_setxattr",
Mike Marshall1182fca2015-07-17 10:38:15 -0400308 get_interruptible_flag(inode));
309
310 gossip_debug(GOSSIP_XATTR_DEBUG,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500311 "orangefs_inode_setxattr: returning %d\n",
Mike Marshall1182fca2015-07-17 10:38:15 -0400312 ret);
313
314 /* when request is serviced properly, free req op struct */
315 op_release(new_op);
316out_unlock:
Yi Liu8bb8aef2015-11-24 15:12:14 -0500317 up_write(&orangefs_inode->xattr_sem);
Mike Marshall1182fca2015-07-17 10:38:15 -0400318 return ret;
319}
320
321/*
322 * Tries to get a specified object's keys into a user-specified buffer of a
323 * given size. Note that like the previous instances of xattr routines, this
324 * also allows you to pass in a NULL pointer and 0 size to probe the size for
325 * subsequent memory allocations. Thus our return value is always the size of
326 * all the keys unless there were errors in fetching the keys!
327 */
Yi Liu8bb8aef2015-11-24 15:12:14 -0500328ssize_t orangefs_listxattr(struct dentry *dentry, char *buffer, size_t size)
Mike Marshall1182fca2015-07-17 10:38:15 -0400329{
330 struct inode *inode = dentry->d_inode;
Yi Liu8bb8aef2015-11-24 15:12:14 -0500331 struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
332 struct orangefs_kernel_op_s *new_op;
333 __u64 token = ORANGEFS_ITERATE_START;
Mike Marshall1182fca2015-07-17 10:38:15 -0400334 ssize_t ret = -ENOMEM;
335 ssize_t total = 0;
Mike Marshall1182fca2015-07-17 10:38:15 -0400336 int count_keys = 0;
337 int key_size;
338 int i = 0;
Mike Marshall62441fa2015-12-17 16:11:40 -0500339 int returned_count = 0;
Mike Marshall1182fca2015-07-17 10:38:15 -0400340
341 if (size > 0 && buffer == NULL) {
342 gossip_err("%s: bogus NULL pointers\n", __func__);
343 return -EINVAL;
344 }
Mike Marshall1182fca2015-07-17 10:38:15 -0400345
Yi Liu8bb8aef2015-11-24 15:12:14 -0500346 down_read(&orangefs_inode->xattr_sem);
347 new_op = op_alloc(ORANGEFS_VFS_OP_LISTXATTR);
Mike Marshall1182fca2015-07-17 10:38:15 -0400348 if (!new_op)
349 goto out_unlock;
350
351 if (buffer && size > 0)
352 memset(buffer, 0, size);
353
354try_again:
355 key_size = 0;
Yi Liu8bb8aef2015-11-24 15:12:14 -0500356 new_op->upcall.req.listxattr.refn = orangefs_inode->refn;
Mike Marshall1182fca2015-07-17 10:38:15 -0400357 new_op->upcall.req.listxattr.token = token;
358 new_op->upcall.req.listxattr.requested_count =
Yi Liu8bb8aef2015-11-24 15:12:14 -0500359 (size == 0) ? 0 : ORANGEFS_MAX_XATTR_LISTLEN;
Mike Marshall1182fca2015-07-17 10:38:15 -0400360 ret = service_operation(new_op, __func__,
361 get_interruptible_flag(inode));
362 if (ret != 0)
363 goto done;
364
365 if (size == 0) {
366 /*
367 * This is a bit of a big upper limit, but I did not want to
368 * spend too much time getting this correct, since users end
369 * up allocating memory rather than us...
370 */
371 total = new_op->downcall.resp.listxattr.returned_count *
Yi Liu8bb8aef2015-11-24 15:12:14 -0500372 ORANGEFS_MAX_XATTR_NAMELEN;
Mike Marshall1182fca2015-07-17 10:38:15 -0400373 goto done;
374 }
375
Mike Marshall62441fa2015-12-17 16:11:40 -0500376 returned_count = new_op->downcall.resp.listxattr.returned_count;
377 if (returned_count < 0 ||
378 returned_count >= ORANGEFS_MAX_XATTR_LISTLEN) {
379 gossip_err("%s: impossible value for returned_count:%d:\n",
380 __func__,
381 returned_count);
Martin Brandenburg02a5cc52016-03-16 14:01:43 -0400382 ret = -EIO;
Mike Marshall62441fa2015-12-17 16:11:40 -0500383 goto done;
384 }
385
Mike Marshall1182fca2015-07-17 10:38:15 -0400386 /*
387 * Check to see how much can be fit in the buffer. Fit only whole keys.
388 */
Mike Marshall62441fa2015-12-17 16:11:40 -0500389 for (i = 0; i < returned_count; i++) {
Martin Brandenburg02a5cc52016-03-16 14:01:43 -0400390 if (new_op->downcall.resp.listxattr.lengths[i] < 0 ||
391 new_op->downcall.resp.listxattr.lengths[i] >
392 ORANGEFS_MAX_XATTR_NAMELEN) {
393 gossip_err("%s: impossible value for lengths[%d]\n",
394 __func__,
395 new_op->downcall.resp.listxattr.lengths[i]);
396 ret = -EIO;
397 goto done;
398 }
Mike Marshall1182fca2015-07-17 10:38:15 -0400399 if (total + new_op->downcall.resp.listxattr.lengths[i] > size)
400 goto done;
401
402 /*
403 * Since many dumb programs try to setxattr() on our reserved
404 * xattrs this is a feeble attempt at defeating those by not
405 * listing them in the output of listxattr.. sigh
406 */
407 if (is_reserved_key(new_op->downcall.resp.listxattr.key +
408 key_size,
409 new_op->downcall.resp.
410 listxattr.lengths[i])) {
411 gossip_debug(GOSSIP_XATTR_DEBUG, "Copying key %d -> %s\n",
412 i, new_op->downcall.resp.listxattr.key +
413 key_size);
414 memcpy(buffer + total,
415 new_op->downcall.resp.listxattr.key + key_size,
416 new_op->downcall.resp.listxattr.lengths[i]);
417 total += new_op->downcall.resp.listxattr.lengths[i];
418 count_keys++;
419 } else {
420 gossip_debug(GOSSIP_XATTR_DEBUG, "[RESERVED] key %d -> %s\n",
421 i, new_op->downcall.resp.listxattr.key +
422 key_size);
423 }
424 key_size += new_op->downcall.resp.listxattr.lengths[i];
425 }
426
427 /*
428 * Since the buffer was large enough, we might have to continue
429 * fetching more keys!
430 */
431 token = new_op->downcall.resp.listxattr.token;
Yi Liu8bb8aef2015-11-24 15:12:14 -0500432 if (token != ORANGEFS_ITERATE_END)
Mike Marshall1182fca2015-07-17 10:38:15 -0400433 goto try_again;
434
435done:
436 gossip_debug(GOSSIP_XATTR_DEBUG, "%s: returning %d"
437 " [size of buffer %ld] (filled in %d keys)\n",
438 __func__,
439 ret ? (int)ret : (int)total,
440 (long)size,
441 count_keys);
442 op_release(new_op);
443 if (ret == 0)
444 ret = total;
445out_unlock:
Yi Liu8bb8aef2015-11-24 15:12:14 -0500446 up_read(&orangefs_inode->xattr_sem);
Mike Marshall1182fca2015-07-17 10:38:15 -0400447 return ret;
448}
449
Yi Liu8bb8aef2015-11-24 15:12:14 -0500450static int orangefs_xattr_set_default(const struct xattr_handler *handler,
Al Viro59301222016-05-27 10:19:30 -0400451 struct dentry *unused,
452 struct inode *inode,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500453 const char *name,
454 const void *buffer,
455 size_t size,
456 int flags)
Mike Marshall1182fca2015-07-17 10:38:15 -0400457{
Al Viro59301222016-05-27 10:19:30 -0400458 return orangefs_inode_setxattr(inode,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500459 ORANGEFS_XATTR_NAME_DEFAULT_PREFIX,
Mike Marshall1182fca2015-07-17 10:38:15 -0400460 name,
461 buffer,
462 size,
463 flags);
464}
465
Yi Liu8bb8aef2015-11-24 15:12:14 -0500466static int orangefs_xattr_get_default(const struct xattr_handler *handler,
Al Virob2968212016-04-10 20:48:24 -0400467 struct dentry *unused,
468 struct inode *inode,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500469 const char *name,
470 void *buffer,
471 size_t size)
Mike Marshall1182fca2015-07-17 10:38:15 -0400472{
Al Virob2968212016-04-10 20:48:24 -0400473 return orangefs_inode_getxattr(inode,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500474 ORANGEFS_XATTR_NAME_DEFAULT_PREFIX,
Mike Marshall1182fca2015-07-17 10:38:15 -0400475 name,
476 buffer,
477 size);
478
479}
480
Yi Liu8bb8aef2015-11-24 15:12:14 -0500481static int orangefs_xattr_set_trusted(const struct xattr_handler *handler,
Al Viro59301222016-05-27 10:19:30 -0400482 struct dentry *unused,
483 struct inode *inode,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500484 const char *name,
485 const void *buffer,
486 size_t size,
487 int flags)
Mike Marshall1182fca2015-07-17 10:38:15 -0400488{
Al Viro59301222016-05-27 10:19:30 -0400489 return orangefs_inode_setxattr(inode,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500490 ORANGEFS_XATTR_NAME_TRUSTED_PREFIX,
Mike Marshall1182fca2015-07-17 10:38:15 -0400491 name,
492 buffer,
493 size,
494 flags);
495}
496
Yi Liu8bb8aef2015-11-24 15:12:14 -0500497static int orangefs_xattr_get_trusted(const struct xattr_handler *handler,
Al Virob2968212016-04-10 20:48:24 -0400498 struct dentry *unused,
499 struct inode *inode,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500500 const char *name,
501 void *buffer,
502 size_t size)
Mike Marshall1182fca2015-07-17 10:38:15 -0400503{
Al Virob2968212016-04-10 20:48:24 -0400504 return orangefs_inode_getxattr(inode,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500505 ORANGEFS_XATTR_NAME_TRUSTED_PREFIX,
Mike Marshall1182fca2015-07-17 10:38:15 -0400506 name,
507 buffer,
508 size);
509}
510
Yi Liu8bb8aef2015-11-24 15:12:14 -0500511static struct xattr_handler orangefs_xattr_trusted_handler = {
512 .prefix = ORANGEFS_XATTR_NAME_TRUSTED_PREFIX,
513 .get = orangefs_xattr_get_trusted,
514 .set = orangefs_xattr_set_trusted,
Mike Marshall1182fca2015-07-17 10:38:15 -0400515};
516
Yi Liu8bb8aef2015-11-24 15:12:14 -0500517static struct xattr_handler orangefs_xattr_default_handler = {
Mike Marshall1182fca2015-07-17 10:38:15 -0400518 /*
519 * NOTE: this is set to be the empty string.
520 * so that all un-prefixed xattrs keys get caught
521 * here!
522 */
Yi Liu8bb8aef2015-11-24 15:12:14 -0500523 .prefix = ORANGEFS_XATTR_NAME_DEFAULT_PREFIX,
524 .get = orangefs_xattr_get_default,
525 .set = orangefs_xattr_set_default,
Mike Marshall1182fca2015-07-17 10:38:15 -0400526};
527
Yi Liu8bb8aef2015-11-24 15:12:14 -0500528const struct xattr_handler *orangefs_xattr_handlers[] = {
Mike Marshall1182fca2015-07-17 10:38:15 -0400529 &posix_acl_access_xattr_handler,
530 &posix_acl_default_xattr_handler,
Yi Liu8bb8aef2015-11-24 15:12:14 -0500531 &orangefs_xattr_trusted_handler,
532 &orangefs_xattr_default_handler,
Mike Marshall1182fca2015-07-17 10:38:15 -0400533 NULL
534};