Merge tag 'locking-core-2023-05-05' of git://git.kernel.org/pub/scm/linux/kernel...
[linux-block.git] / fs / 9p / xattr.c
CommitLineData
024b7d6a 1// SPDX-License-Identifier: LGPL-2.1
ebf46264
AK
2/*
3 * Copyright IBM Corporation, 2010
4 * Author Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com>
ebf46264
AK
5 */
6
7#include <linux/module.h>
8#include <linux/fs.h>
9#include <linux/sched.h>
070b3656 10#include <linux/uio.h>
39a6497a 11#include <linux/posix_acl_xattr.h>
ebf46264
AK
12#include <net/9p/9p.h>
13#include <net/9p/client.h>
14
15#include "fid.h"
16#include "xattr.h"
17
85ff872d
AK
18ssize_t v9fs_fid_xattr_get(struct p9_fid *fid, const char *name,
19 void *buffer, size_t buffer_size)
ebf46264
AK
20{
21 ssize_t retval;
e1200fe6 22 u64 attr_size;
85ff872d 23 struct p9_fid *attr_fid;
e1200fe6
AV
24 struct kvec kvec = {.iov_base = buffer, .iov_len = buffer_size};
25 struct iov_iter to;
26 int err;
27
de4eda9d 28 iov_iter_kvec(&to, ITER_DEST, &kvec, 1, buffer_size);
ebf46264
AK
29
30 attr_fid = p9_client_xattrwalk(fid, name, &attr_size);
31 if (IS_ERR(attr_fid)) {
32 retval = PTR_ERR(attr_fid);
5d385153
JP
33 p9_debug(P9_DEBUG_VFS, "p9_client_attrwalk failed %zd\n",
34 retval);
e1200fe6 35 return retval;
ebf46264
AK
36 }
37 if (attr_size > buffer_size) {
707823e7 38 if (buffer_size)
e1200fe6 39 retval = -ERANGE;
707823e7
IO
40 else if (attr_size > SSIZE_MAX)
41 retval = -EOVERFLOW;
42 else /* request to get the attr_size */
43 retval = attr_size;
e1200fe6
AV
44 } else {
45 iov_iter_truncate(&to, attr_size);
46 retval = p9_client_read(attr_fid, 0, &to, &err);
47 if (err)
48 retval = err;
ebf46264 49 }
b48dbb99 50 p9_fid_put(attr_fid);
ebf46264 51 return retval;
ebf46264
AK
52}
53
85ff872d
AK
54
55/*
56 * v9fs_xattr_get()
57 *
58 * Copy an extended attribute into the buffer
59 * provided, or compute the buffer size required.
60 * Buffer is NULL to compute the size of the buffer required.
61 *
62 * Returns a negative error number on failure, or the number of bytes
63 * used / required on success.
64 */
65ssize_t v9fs_xattr_get(struct dentry *dentry, const char *name,
66 void *buffer, size_t buffer_size)
67{
68 struct p9_fid *fid;
6636b6dc 69 int ret;
85ff872d 70
5d385153
JP
71 p9_debug(P9_DEBUG_VFS, "name = %s value_len = %zu\n",
72 name, buffer_size);
85ff872d
AK
73 fid = v9fs_fid_lookup(dentry);
74 if (IS_ERR(fid))
75 return PTR_ERR(fid);
6636b6dc 76 ret = v9fs_fid_xattr_get(fid, name, buffer, buffer_size);
b48dbb99 77 p9_fid_put(fid);
85ff872d 78
6636b6dc 79 return ret;
85ff872d
AK
80}
81
ebf46264
AK
82/*
83 * v9fs_xattr_set()
84 *
85 * Create, replace or remove an extended attribute for this inode. Buffer
86 * is NULL to remove an existing extended attribute, and non-NULL to
87 * either replace an existing extended attribute, or create a new extended
88 * attribute. The flags XATTR_REPLACE and XATTR_CREATE
89 * specify that an extended attribute must exist and must not exist
90 * previous to the call, respectively.
91 *
92 * Returns 0, or a negative error number on failure.
93 */
94int v9fs_xattr_set(struct dentry *dentry, const char *name,
95 const void *value, size_t value_len, int flags)
38baba9e 96{
6636b6dc
JW
97 int ret;
98 struct p9_fid *fid;
99
100 fid = v9fs_fid_lookup(dentry);
101 if (IS_ERR(fid))
102 return PTR_ERR(fid);
103 ret = v9fs_fid_xattr_set(fid, name, value, value_len, flags);
b48dbb99 104 p9_fid_put(fid);
6636b6dc 105 return ret;
38baba9e
AV
106}
107
108int v9fs_fid_xattr_set(struct p9_fid *fid, const char *name,
109 const void *value, size_t value_len, int flags)
ebf46264 110{
070b3656
AV
111 struct kvec kvec = {.iov_base = (void *)value, .iov_len = value_len};
112 struct iov_iter from;
3111784b 113 int retval, err;
070b3656 114
de4eda9d 115 iov_iter_kvec(&from, ITER_SOURCE, &kvec, 1, value_len);
ebf46264 116
5d385153
JP
117 p9_debug(P9_DEBUG_VFS, "name = %s value_len = %zu flags = %d\n",
118 name, value_len, flags);
ebf46264 119
38baba9e 120 /* Clone it */
7d50a29f 121 fid = clone_fid(fid);
38baba9e
AV
122 if (IS_ERR(fid))
123 return PTR_ERR(fid);
124
ebf46264
AK
125 /*
126 * On success fid points to xattr
127 */
128 retval = p9_client_xattrcreate(fid, name, value_len, flags);
070b3656 129 if (retval < 0)
5d385153
JP
130 p9_debug(P9_DEBUG_VFS, "p9_client_xattrcreate failed %d\n",
131 retval);
070b3656
AV
132 else
133 p9_client_write(fid, 0, &from, &retval);
b48dbb99 134 err = p9_fid_put(fid);
3111784b 135 if (!retval && err)
136 retval = err;
bdd5c28d 137 return retval;
ebf46264
AK
138}
139
140ssize_t v9fs_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
141{
142 return v9fs_xattr_get(dentry, NULL, buffer, buffer_size);
143}
144
e409de99 145static int v9fs_xattr_handler_get(const struct xattr_handler *handler,
b296821a
AV
146 struct dentry *dentry, struct inode *inode,
147 const char *name, void *buffer, size_t size)
e409de99
AG
148{
149 const char *full_name = xattr_full_name(handler, name);
150
e409de99
AG
151 return v9fs_xattr_get(dentry, full_name, buffer, size);
152}
153
154static int v9fs_xattr_handler_set(const struct xattr_handler *handler,
39f60c1c 155 struct mnt_idmap *idmap,
59301226
AV
156 struct dentry *dentry, struct inode *inode,
157 const char *name, const void *value,
158 size_t size, int flags)
e409de99
AG
159{
160 const char *full_name = xattr_full_name(handler, name);
161
e409de99
AG
162 return v9fs_xattr_set(dentry, full_name, value, size, flags);
163}
164
165static struct xattr_handler v9fs_xattr_user_handler = {
166 .prefix = XATTR_USER_PREFIX,
167 .get = v9fs_xattr_handler_get,
168 .set = v9fs_xattr_handler_set,
169};
170
171static struct xattr_handler v9fs_xattr_trusted_handler = {
172 .prefix = XATTR_TRUSTED_PREFIX,
173 .get = v9fs_xattr_handler_get,
174 .set = v9fs_xattr_handler_set,
175};
176
177#ifdef CONFIG_9P_FS_SECURITY
178static struct xattr_handler v9fs_xattr_security_handler = {
179 .prefix = XATTR_SECURITY_PREFIX,
180 .get = v9fs_xattr_handler_get,
181 .set = v9fs_xattr_handler_set,
182};
183#endif
184
ebf46264
AK
185const struct xattr_handler *v9fs_xattr_handlers[] = {
186 &v9fs_xattr_user_handler,
d9a73859 187 &v9fs_xattr_trusted_handler,
d9a73859
JG
188#ifdef CONFIG_9P_FS_SECURITY
189 &v9fs_xattr_security_handler,
7a4566b0 190#endif
ebf46264
AK
191 NULL
192};