]> bbs.cooldavid.org Git - net-next-2.6.git/blame - fs/cifs/xattr.c
xps: Transmit Packet Steering
[net-next-2.6.git] / fs / cifs / xattr.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/xattr.c
3 *
79a58d1f 4 * Copyright (c) International Business Machines Corp., 2003, 2007
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21
22#include <linux/fs.h>
23#include <linux/posix_acl_xattr.h>
5a0e3ad6 24#include <linux/slab.h>
1da177e4
LT
25#include "cifsfs.h"
26#include "cifspdu.h"
27#include "cifsglob.h"
28#include "cifsproto.h"
29#include "cifs_debug.h"
30
31#define MAX_EA_VALUE_SIZE 65535
32#define CIFS_XATTR_DOS_ATTRIB "user.DosAttrib"
33#define CIFS_XATTR_USER_PREFIX "user."
34#define CIFS_XATTR_SYSTEM_PREFIX "system."
35#define CIFS_XATTR_OS2_PREFIX "os2."
36#define CIFS_XATTR_SECURITY_PREFIX ".security"
37#define CIFS_XATTR_TRUSTED_PREFIX "trusted."
38#define XATTR_TRUSTED_PREFIX_LEN 8
39#define XATTR_SECURITY_PREFIX_LEN 9
40/* BB need to add server (Samba e.g) support for security and trusted prefix */
50c2f753 41
1da177e4
LT
42
43
79a58d1f 44int cifs_removexattr(struct dentry *direntry, const char *ea_name)
1da177e4
LT
45{
46 int rc = -EOPNOTSUPP;
47#ifdef CONFIG_CIFS_XATTR
48 int xid;
49 struct cifs_sb_info *cifs_sb;
7ffec372 50 struct tcon_link *tlink;
1da177e4 51 struct cifsTconInfo *pTcon;
79a58d1f 52 struct super_block *sb;
7ffec372 53 char *full_path = NULL;
79a58d1f
SF
54
55 if (direntry == NULL)
1da177e4 56 return -EIO;
79a58d1f 57 if (direntry->d_inode == NULL)
1da177e4
LT
58 return -EIO;
59 sb = direntry->d_inode->i_sb;
79a58d1f 60 if (sb == NULL)
1da177e4 61 return -EIO;
79a58d1f 62
1da177e4 63 cifs_sb = CIFS_SB(sb);
7ffec372
JL
64 tlink = cifs_sb_tlink(cifs_sb);
65 if (IS_ERR(tlink))
66 return PTR_ERR(tlink);
67 pTcon = tlink_tcon(tlink);
68
69 xid = GetXid();
79a58d1f 70
1da177e4 71 full_path = build_path_from_dentry(direntry);
79a58d1f 72 if (full_path == NULL) {
0f3bc09e 73 rc = -ENOMEM;
7ffec372 74 goto remove_ea_exit;
1da177e4 75 }
79a58d1f 76 if (ea_name == NULL) {
b6b38f70 77 cFYI(1, "Null xattr names not supported");
79a58d1f
SF
78 } else if (strncmp(ea_name, CIFS_XATTR_USER_PREFIX, 5)
79 && (strncmp(ea_name, CIFS_XATTR_OS2_PREFIX, 4))) {
80 cFYI(1,
b6b38f70
JP
81 "illegal xattr request %s (only user namespace supported)",
82 ea_name);
1da177e4
LT
83 /* BB what if no namespace prefix? */
84 /* Should we just pass them to server, except for
85 system and perhaps security prefixes? */
86 } else {
79a58d1f 87 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR)
1da177e4
LT
88 goto remove_ea_exit;
89
79a58d1f
SF
90 ea_name += 5; /* skip past user. prefix */
91 rc = CIFSSMBSetEA(xid, pTcon, full_path, ea_name, NULL,
737b758c
SF
92 (__u16)0, cifs_sb->local_nls,
93 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
1da177e4
LT
94 }
95remove_ea_exit:
f99d49ad 96 kfree(full_path);
1da177e4 97 FreeXid(xid);
7ffec372 98 cifs_put_tlink(tlink);
1da177e4
LT
99#endif
100 return rc;
101}
102
79a58d1f
SF
103int cifs_setxattr(struct dentry *direntry, const char *ea_name,
104 const void *ea_value, size_t value_size, int flags)
1da177e4
LT
105{
106 int rc = -EOPNOTSUPP;
107#ifdef CONFIG_CIFS_XATTR
108 int xid;
109 struct cifs_sb_info *cifs_sb;
7ffec372 110 struct tcon_link *tlink;
1da177e4 111 struct cifsTconInfo *pTcon;
79a58d1f
SF
112 struct super_block *sb;
113 char *full_path;
1da177e4 114
79a58d1f 115 if (direntry == NULL)
1da177e4 116 return -EIO;
79a58d1f 117 if (direntry->d_inode == NULL)
1da177e4
LT
118 return -EIO;
119 sb = direntry->d_inode->i_sb;
79a58d1f 120 if (sb == NULL)
1da177e4 121 return -EIO;
1da177e4
LT
122
123 cifs_sb = CIFS_SB(sb);
7ffec372
JL
124 tlink = cifs_sb_tlink(cifs_sb);
125 if (IS_ERR(tlink))
126 return PTR_ERR(tlink);
127 pTcon = tlink_tcon(tlink);
128
129 xid = GetXid();
1da177e4 130
1da177e4 131 full_path = build_path_from_dentry(direntry);
79a58d1f 132 if (full_path == NULL) {
0f3bc09e 133 rc = -ENOMEM;
7ffec372 134 goto set_ea_exit;
1da177e4
LT
135 }
136 /* return dos attributes as pseudo xattr */
137 /* return alt name if available as pseudo attr */
138
139 /* if proc/fs/cifs/streamstoxattr is set then
79a58d1f 140 search server for EAs or streams to
1da177e4 141 returns as xattrs */
79a58d1f 142 if (value_size > MAX_EA_VALUE_SIZE) {
b6b38f70 143 cFYI(1, "size of EA value too large");
7ffec372
JL
144 rc = -EOPNOTSUPP;
145 goto set_ea_exit;
1da177e4
LT
146 }
147
79a58d1f 148 if (ea_name == NULL) {
b6b38f70 149 cFYI(1, "Null xattr names not supported");
79a58d1f
SF
150 } else if (strncmp(ea_name, CIFS_XATTR_USER_PREFIX, 5) == 0) {
151 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR)
1da177e4 152 goto set_ea_exit;
ad7a2926 153 if (strncmp(ea_name, CIFS_XATTR_DOS_ATTRIB, 14) == 0)
b6b38f70 154 cFYI(1, "attempt to set cifs inode metadata");
ad7a2926 155
1da177e4 156 ea_name += 5; /* skip past user. prefix */
79a58d1f 157 rc = CIFSSMBSetEA(xid, pTcon, full_path, ea_name, ea_value,
737b758c
SF
158 (__u16)value_size, cifs_sb->local_nls,
159 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
79a58d1f
SF
160 } else if (strncmp(ea_name, CIFS_XATTR_OS2_PREFIX, 4) == 0) {
161 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR)
1da177e4
LT
162 goto set_ea_exit;
163
164 ea_name += 4; /* skip past os2. prefix */
79a58d1f 165 rc = CIFSSMBSetEA(xid, pTcon, full_path, ea_name, ea_value,
737b758c
SF
166 (__u16)value_size, cifs_sb->local_nls,
167 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
1da177e4 168 } else {
79a58d1f
SF
169 int temp;
170 temp = strncmp(ea_name, POSIX_ACL_XATTR_ACCESS,
1da177e4
LT
171 strlen(POSIX_ACL_XATTR_ACCESS));
172 if (temp == 0) {
173#ifdef CONFIG_CIFS_POSIX
79a58d1f
SF
174 if (sb->s_flags & MS_POSIXACL)
175 rc = CIFSSMBSetPosixACL(xid, pTcon, full_path,
176 ea_value, (const int)value_size,
177 ACL_TYPE_ACCESS, cifs_sb->local_nls,
178 cifs_sb->mnt_cifs_flags &
737b758c 179 CIFS_MOUNT_MAP_SPECIAL_CHR);
b6b38f70 180 cFYI(1, "set POSIX ACL rc %d", rc);
1da177e4 181#else
b6b38f70 182 cFYI(1, "set POSIX ACL not supported");
1da177e4 183#endif
79a58d1f
SF
184 } else if (strncmp(ea_name, POSIX_ACL_XATTR_DEFAULT,
185 strlen(POSIX_ACL_XATTR_DEFAULT)) == 0) {
1da177e4 186#ifdef CONFIG_CIFS_POSIX
79a58d1f
SF
187 if (sb->s_flags & MS_POSIXACL)
188 rc = CIFSSMBSetPosixACL(xid, pTcon, full_path,
189 ea_value, (const int)value_size,
737b758c 190 ACL_TYPE_DEFAULT, cifs_sb->local_nls,
79a58d1f 191 cifs_sb->mnt_cifs_flags &
737b758c 192 CIFS_MOUNT_MAP_SPECIAL_CHR);
b6b38f70 193 cFYI(1, "set POSIX default ACL rc %d", rc);
1da177e4 194#else
b6b38f70 195 cFYI(1, "set default POSIX ACL not supported");
1da177e4
LT
196#endif
197 } else {
b6b38f70
JP
198 cFYI(1, "illegal xattr request %s (only user namespace"
199 " supported)", ea_name);
1da177e4 200 /* BB what if no namespace prefix? */
79a58d1f 201 /* Should we just pass them to server, except for
1da177e4
LT
202 system and perhaps security prefixes? */
203 }
204 }
205
206set_ea_exit:
f99d49ad 207 kfree(full_path);
1da177e4 208 FreeXid(xid);
7ffec372 209 cifs_put_tlink(tlink);
1da177e4
LT
210#endif
211 return rc;
212}
213
79a58d1f
SF
214ssize_t cifs_getxattr(struct dentry *direntry, const char *ea_name,
215 void *ea_value, size_t buf_size)
1da177e4
LT
216{
217 ssize_t rc = -EOPNOTSUPP;
218#ifdef CONFIG_CIFS_XATTR
219 int xid;
220 struct cifs_sb_info *cifs_sb;
7ffec372 221 struct tcon_link *tlink;
1da177e4 222 struct cifsTconInfo *pTcon;
79a58d1f
SF
223 struct super_block *sb;
224 char *full_path;
1da177e4 225
79a58d1f 226 if (direntry == NULL)
1da177e4 227 return -EIO;
79a58d1f 228 if (direntry->d_inode == NULL)
1da177e4
LT
229 return -EIO;
230 sb = direntry->d_inode->i_sb;
79a58d1f 231 if (sb == NULL)
1da177e4
LT
232 return -EIO;
233
1da177e4 234 cifs_sb = CIFS_SB(sb);
7ffec372
JL
235 tlink = cifs_sb_tlink(cifs_sb);
236 if (IS_ERR(tlink))
237 return PTR_ERR(tlink);
238 pTcon = tlink_tcon(tlink);
239
240 xid = GetXid();
1da177e4 241
1da177e4 242 full_path = build_path_from_dentry(direntry);
79a58d1f 243 if (full_path == NULL) {
0f3bc09e 244 rc = -ENOMEM;
7ffec372 245 goto get_ea_exit;
1da177e4
LT
246 }
247 /* return dos attributes as pseudo xattr */
248 /* return alt name if available as pseudo attr */
79a58d1f 249 if (ea_name == NULL) {
b6b38f70 250 cFYI(1, "Null xattr names not supported");
79a58d1f
SF
251 } else if (strncmp(ea_name, CIFS_XATTR_USER_PREFIX, 5) == 0) {
252 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR)
1da177e4
LT
253 goto get_ea_exit;
254
79a58d1f 255 if (strncmp(ea_name, CIFS_XATTR_DOS_ATTRIB, 14) == 0) {
b6b38f70 256 cFYI(1, "attempt to query cifs inode metadata");
1da177e4
LT
257 /* revalidate/getattr then populate from inode */
258 } /* BB add else when above is implemented */
259 ea_name += 5; /* skip past user. prefix */
31c0519f 260 rc = CIFSSMBQAllEAs(xid, pTcon, full_path, ea_name, ea_value,
737b758c
SF
261 buf_size, cifs_sb->local_nls,
262 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
79a58d1f
SF
263 } else if (strncmp(ea_name, CIFS_XATTR_OS2_PREFIX, 4) == 0) {
264 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR)
1da177e4
LT
265 goto get_ea_exit;
266
267 ea_name += 4; /* skip past os2. prefix */
31c0519f 268 rc = CIFSSMBQAllEAs(xid, pTcon, full_path, ea_name, ea_value,
737b758c
SF
269 buf_size, cifs_sb->local_nls,
270 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
79a58d1f 271 } else if (strncmp(ea_name, POSIX_ACL_XATTR_ACCESS,
0a4b92c0 272 strlen(POSIX_ACL_XATTR_ACCESS)) == 0) {
1da177e4 273#ifdef CONFIG_CIFS_POSIX
79a58d1f 274 if (sb->s_flags & MS_POSIXACL)
1da0c78b 275 rc = CIFSSMBGetPosixACL(xid, pTcon, full_path,
79a58d1f 276 ea_value, buf_size, ACL_TYPE_ACCESS,
737b758c 277 cifs_sb->local_nls,
79a58d1f 278 cifs_sb->mnt_cifs_flags &
737b758c 279 CIFS_MOUNT_MAP_SPECIAL_CHR);
d12fd121 280#ifdef CONFIG_CIFS_EXPERIMENTAL
ad7a2926 281 else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
0a4b92c0 282 __u16 fid;
4b18f2a9 283 int oplock = 0;
630f3f0c
SF
284 struct cifs_ntsd *pacl = NULL;
285 __u32 buflen = 0;
63d2583f 286 if (experimEnabled)
d12fd121
SF
287 rc = CIFSSMBOpen(xid, pTcon, full_path,
288 FILE_OPEN, GENERIC_READ, 0, &fid,
289 &oplock, NULL, cifs_sb->local_nls,
290 cifs_sb->mnt_cifs_flags &
291 CIFS_MOUNT_MAP_SPECIAL_CHR);
292 /* else rc is EOPNOTSUPP from above */
293
63d2583f 294 if (rc == 0) {
630f3f0c
SF
295 rc = CIFSSMBGetCIFSACL(xid, pTcon, fid, &pacl,
296 &buflen);
2fe87f02 297 CIFSSMBClose(xid, pTcon, fid);
0a4b92c0 298 }
d12fd121
SF
299 }
300#endif /* EXPERIMENTAL */
79a58d1f 301#else
b6b38f70 302 cFYI(1, "query POSIX ACL not supported yet");
1da177e4 303#endif /* CONFIG_CIFS_POSIX */
79a58d1f 304 } else if (strncmp(ea_name, POSIX_ACL_XATTR_DEFAULT,
0a4b92c0 305 strlen(POSIX_ACL_XATTR_DEFAULT)) == 0) {
1da177e4 306#ifdef CONFIG_CIFS_POSIX
79a58d1f 307 if (sb->s_flags & MS_POSIXACL)
1da0c78b 308 rc = CIFSSMBGetPosixACL(xid, pTcon, full_path,
79a58d1f 309 ea_value, buf_size, ACL_TYPE_DEFAULT,
737b758c 310 cifs_sb->local_nls,
79a58d1f 311 cifs_sb->mnt_cifs_flags &
737b758c 312 CIFS_MOUNT_MAP_SPECIAL_CHR);
79a58d1f 313#else
b6b38f70 314 cFYI(1, "query POSIX default ACL not supported yet");
1da177e4 315#endif
79a58d1f
SF
316 } else if (strncmp(ea_name,
317 CIFS_XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) == 0) {
b6b38f70 318 cFYI(1, "Trusted xattr namespace not supported yet");
79a58d1f
SF
319 } else if (strncmp(ea_name,
320 CIFS_XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) == 0) {
b6b38f70 321 cFYI(1, "Security xattr namespace not supported yet");
ad7a2926 322 } else
79a58d1f 323 cFYI(1,
b6b38f70
JP
324 "illegal xattr request %s (only user namespace supported)",
325 ea_name);
1da177e4 326
79a58d1f 327 /* We could add an additional check for streams ie
1da177e4 328 if proc/fs/cifs/streamstoxattr is set then
79a58d1f 329 search server for EAs or streams to
1da177e4
LT
330 returns as xattrs */
331
79a58d1f
SF
332 if (rc == -EINVAL)
333 rc = -EOPNOTSUPP;
1da177e4
LT
334
335get_ea_exit:
f99d49ad 336 kfree(full_path);
1da177e4 337 FreeXid(xid);
7ffec372 338 cifs_put_tlink(tlink);
1da177e4
LT
339#endif
340 return rc;
341}
342
79a58d1f 343ssize_t cifs_listxattr(struct dentry *direntry, char *data, size_t buf_size)
1da177e4
LT
344{
345 ssize_t rc = -EOPNOTSUPP;
346#ifdef CONFIG_CIFS_XATTR
347 int xid;
348 struct cifs_sb_info *cifs_sb;
7ffec372 349 struct tcon_link *tlink;
1da177e4 350 struct cifsTconInfo *pTcon;
79a58d1f
SF
351 struct super_block *sb;
352 char *full_path;
1da177e4 353
79a58d1f 354 if (direntry == NULL)
1da177e4 355 return -EIO;
79a58d1f 356 if (direntry->d_inode == NULL)
1da177e4
LT
357 return -EIO;
358 sb = direntry->d_inode->i_sb;
79a58d1f 359 if (sb == NULL)
1da177e4 360 return -EIO;
1da177e4
LT
361
362 cifs_sb = CIFS_SB(sb);
79a58d1f 363 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR)
ea4c07d7
SF
364 return -EOPNOTSUPP;
365
7ffec372
JL
366 tlink = cifs_sb_tlink(cifs_sb);
367 if (IS_ERR(tlink))
368 return PTR_ERR(tlink);
369 pTcon = tlink_tcon(tlink);
370
ea4c07d7
SF
371 xid = GetXid();
372
1da177e4 373 full_path = build_path_from_dentry(direntry);
79a58d1f 374 if (full_path == NULL) {
0f3bc09e 375 rc = -ENOMEM;
7ffec372 376 goto list_ea_exit;
1da177e4
LT
377 }
378 /* return dos attributes as pseudo xattr */
379 /* return alt name if available as pseudo attr */
380
381 /* if proc/fs/cifs/streamstoxattr is set then
79a58d1f 382 search server for EAs or streams to
1da177e4 383 returns as xattrs */
31c0519f
JL
384 rc = CIFSSMBQAllEAs(xid, pTcon, full_path, NULL, data,
385 buf_size, cifs_sb->local_nls,
79a58d1f 386 cifs_sb->mnt_cifs_flags &
737b758c 387 CIFS_MOUNT_MAP_SPECIAL_CHR);
1da177e4 388
7ffec372 389list_ea_exit:
f99d49ad 390 kfree(full_path);
1da177e4 391 FreeXid(xid);
7ffec372 392 cifs_put_tlink(tlink);
1da177e4
LT
393#endif
394 return rc;
395}