xref: /freebsd/sys/kern/vfs_extattr.c (revision fe6060f10f634930ff71b7c50291ddc610da2475)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3  *
4  * Copyright (c) 1999-2001 Robert N. M. Watson
5  * All rights reserved.
6  *
7  * This software was developed by Robert Watson for the TrustedBSD Project.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted provided that the following conditions
11  * are met:
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in the
16  *    documentation and/or other materials provided with the distribution.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
19  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
22  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28  * SUCH DAMAGE.
29  */
30 
31 #include <sys/cdefs.h>
32 __FBSDID("$FreeBSD$");
33 
34 #include <sys/param.h>
35 #include <sys/systm.h>
36 #include <sys/capsicum.h>
37 #include <sys/lock.h>
38 #include <sys/mount.h>
39 #include <sys/mutex.h>
40 #include <sys/sysproto.h>
41 #include <sys/fcntl.h>
42 #include <sys/namei.h>
43 #include <sys/filedesc.h>
44 #include <sys/limits.h>
45 #include <sys/vnode.h>
46 #include <sys/proc.h>
47 #include <sys/extattr.h>
48 
49 #include <security/audit/audit.h>
50 #include <security/mac/mac_framework.h>
51 
52 static int	kern_extattr_set_path(struct thread *td, const char *path,
53 		    int attrnamespace, const char *attrname, void *data,
54 		    size_t nbytes, int follow);
55 static int	kern_extattr_get_path(struct thread *td, const char *path,
56 		    int attrnamespace, const char *attrname, void *data,
57 		    size_t nbytes, int follow);
58 static int	kern_extattr_delete_path(struct thread *td, const char *path,
59 		    int attrnamespace, const char *attrname, int follow);
60 static int	kern_extattr_list_path(struct thread *td, const char *path,
61 		    int attrnamespace, void *data, size_t nbytes, int follow);
62 
63 /*
64  * Syscall to push extended attribute configuration information into the VFS.
65  * Accepts a path, which it converts to a mountpoint, as well as a command
66  * (int cmd), and attribute name and misc data.
67  *
68  * Currently this is used only by UFS1 extended attributes.
69  */
70 #ifndef _SYS_SYSPROTO_H_
71 struct extattrctl_args {
72 	const char *path;
73 	int cmd;
74 	const char *filename;
75 	int attrnamespace;
76 	const char *attrname;
77 };
78 #endif
79 int
80 sys_extattrctl(struct thread *td, struct extattrctl_args *uap)
81 {
82 	struct vnode *filename_vp;
83 	struct nameidata nd;
84 	struct mount *mp, *mp_writable;
85 	char attrname[EXTATTR_MAXNAMELEN + 1];
86 	int error;
87 
88 	AUDIT_ARG_CMD(uap->cmd);
89 	AUDIT_ARG_VALUE(uap->attrnamespace);
90 	/*
91 	 * uap->attrname is not always defined.  We check again later when we
92 	 * invoke the VFS call so as to pass in NULL there if needed.
93 	 */
94 	if (uap->attrname != NULL) {
95 		error = copyinstr(uap->attrname, attrname, sizeof(attrname),
96 		    NULL);
97 		if (error)
98 			return (error);
99 	}
100 	AUDIT_ARG_TEXT(attrname);
101 
102 	mp = NULL;
103 	filename_vp = NULL;
104 	if (uap->filename != NULL) {
105 		NDINIT(&nd, LOOKUP, FOLLOW | AUDITVNODE2,
106 		    UIO_USERSPACE, uap->filename, td);
107 		error = namei(&nd);
108 		if (error)
109 			return (error);
110 		filename_vp = nd.ni_vp;
111 		NDFREE(&nd, NDF_NO_VP_RELE);
112 	}
113 
114 	/* uap->path is always defined. */
115 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | AUDITVNODE1,
116 	    UIO_USERSPACE, uap->path, td);
117 	error = namei(&nd);
118 	if (error)
119 		goto out;
120 	mp = nd.ni_vp->v_mount;
121 	error = vfs_busy(mp, 0);
122 	if (error) {
123 		NDFREE(&nd, 0);
124 		mp = NULL;
125 		goto out;
126 	}
127 	VOP_UNLOCK(nd.ni_vp);
128 	error = vn_start_write(nd.ni_vp, &mp_writable, V_WAIT | PCATCH);
129 	NDFREE(&nd, NDF_NO_VP_UNLOCK);
130 	if (error)
131 		goto out;
132 	if (filename_vp != NULL) {
133 		/*
134 		 * uap->filename is not always defined.  If it is,
135 		 * grab a vnode lock, which VFS_EXTATTRCTL() will
136 		 * later release.
137 		 */
138 		error = vn_lock(filename_vp, LK_EXCLUSIVE);
139 		if (error) {
140 			vn_finished_write(mp_writable);
141 			goto out;
142 		}
143 	}
144 
145 	error = VFS_EXTATTRCTL(mp, uap->cmd, filename_vp, uap->attrnamespace,
146 	    uap->attrname != NULL ? attrname : NULL);
147 
148 	vn_finished_write(mp_writable);
149 out:
150 	if (mp != NULL)
151 		vfs_unbusy(mp);
152 
153 	/*
154 	 * VFS_EXTATTRCTL will have unlocked, but not de-ref'd, filename_vp,
155 	 * so vrele it if it is defined.
156 	 */
157 	if (filename_vp != NULL)
158 		vrele(filename_vp);
159 	return (error);
160 }
161 
162 /*-
163  * Set a named extended attribute on a file or directory
164  *
165  * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace",
166  *            kernelspace string pointer "attrname", userspace buffer
167  *            pointer "data", buffer length "nbytes", thread "td".
168  * Returns: 0 on success, an error number otherwise
169  * Locks: none
170  * References: vp must be a valid reference for the duration of the call
171  */
172 static int
173 extattr_set_vp(struct vnode *vp, int attrnamespace, const char *attrname,
174     void *data, size_t nbytes, struct thread *td)
175 {
176 	struct mount *mp;
177 	struct uio auio;
178 	struct iovec aiov;
179 	ssize_t cnt;
180 	int error;
181 
182 	if (nbytes > IOSIZE_MAX)
183 		return (EINVAL);
184 
185 	error = vn_start_write(vp, &mp, V_WAIT | PCATCH);
186 	if (error)
187 		return (error);
188 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
189 
190 	aiov.iov_base = data;
191 	aiov.iov_len = nbytes;
192 	auio.uio_iov = &aiov;
193 	auio.uio_iovcnt = 1;
194 	auio.uio_offset = 0;
195 	auio.uio_resid = nbytes;
196 	auio.uio_rw = UIO_WRITE;
197 	auio.uio_segflg = UIO_USERSPACE;
198 	auio.uio_td = td;
199 	cnt = nbytes;
200 
201 #ifdef MAC
202 	error = mac_vnode_check_setextattr(td->td_ucred, vp, attrnamespace,
203 	    attrname);
204 	if (error)
205 		goto done;
206 #endif
207 
208 	error = VOP_SETEXTATTR(vp, attrnamespace, attrname, &auio,
209 	    td->td_ucred, td);
210 	cnt -= auio.uio_resid;
211 	td->td_retval[0] = cnt;
212 
213 #ifdef MAC
214 done:
215 #endif
216 	VOP_UNLOCK(vp);
217 	vn_finished_write(mp);
218 	return (error);
219 }
220 
221 #ifndef _SYS_SYSPROTO_H_
222 struct extattr_set_fd_args {
223 	int fd;
224 	int attrnamespace;
225 	const char *attrname;
226 	void *data;
227 	size_t nbytes;
228 };
229 #endif
230 int
231 sys_extattr_set_fd(struct thread *td, struct extattr_set_fd_args *uap)
232 {
233 	struct file *fp;
234 	char attrname[EXTATTR_MAXNAMELEN + 1];
235 	cap_rights_t rights;
236 	int error;
237 
238 	AUDIT_ARG_FD(uap->fd);
239 	AUDIT_ARG_VALUE(uap->attrnamespace);
240 	error = copyinstr(uap->attrname, attrname, sizeof(attrname), NULL);
241 	if (error)
242 		return (error);
243 	AUDIT_ARG_TEXT(attrname);
244 
245 	error = getvnode_path(td, uap->fd,
246 	    cap_rights_init_one(&rights, CAP_EXTATTR_SET), &fp);
247 	if (error)
248 		return (error);
249 
250 	error = extattr_set_vp(fp->f_vnode, uap->attrnamespace,
251 	    attrname, uap->data, uap->nbytes, td);
252 	fdrop(fp, td);
253 
254 	return (error);
255 }
256 
257 #ifndef _SYS_SYSPROTO_H_
258 struct extattr_set_file_args {
259 	const char *path;
260 	int attrnamespace;
261 	const char *attrname;
262 	void *data;
263 	size_t nbytes;
264 };
265 #endif
266 int
267 sys_extattr_set_file(struct thread *td, struct extattr_set_file_args *uap)
268 {
269 
270 	return (kern_extattr_set_path(td, uap->path, uap->attrnamespace,
271 	    uap->attrname, uap->data, uap->nbytes, FOLLOW));
272 }
273 
274 #ifndef _SYS_SYSPROTO_H_
275 struct extattr_set_link_args {
276 	const char *path;
277 	int attrnamespace;
278 	const char *attrname;
279 	void *data;
280 	size_t nbytes;
281 };
282 #endif
283 int
284 sys_extattr_set_link(struct thread *td, struct extattr_set_link_args *uap)
285 {
286 
287 	return (kern_extattr_set_path(td, uap->path, uap->attrnamespace,
288 	    uap->attrname, uap->data, uap->nbytes, NOFOLLOW));
289 }
290 
291 static int
292 kern_extattr_set_path(struct thread *td, const char *path, int attrnamespace,
293     const char *uattrname, void *data, size_t nbytes, int follow)
294 {
295 	struct nameidata nd;
296 	char attrname[EXTATTR_MAXNAMELEN + 1];
297 	int error;
298 
299 	AUDIT_ARG_VALUE(attrnamespace);
300 	error = copyinstr(uattrname, attrname, sizeof(attrname), NULL);
301 	if (error)
302 		return (error);
303 	AUDIT_ARG_TEXT(attrname);
304 
305 	NDINIT(&nd, LOOKUP, follow | AUDITVNODE1, UIO_USERSPACE, path, td);
306 	error = namei(&nd);
307 	if (error)
308 		return (error);
309 	NDFREE(&nd, NDF_ONLY_PNBUF);
310 
311 	error = extattr_set_vp(nd.ni_vp, attrnamespace, attrname, data,
312 	    nbytes, td);
313 
314 	vrele(nd.ni_vp);
315 	return (error);
316 }
317 
318 /*-
319  * Get a named extended attribute on a file or directory
320  *
321  * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace",
322  *            kernelspace string pointer "attrname", userspace buffer
323  *            pointer "data", buffer length "nbytes", thread "td".
324  * Returns: 0 on success, an error number otherwise
325  * Locks: none
326  * References: vp must be a valid reference for the duration of the call
327  */
328 static int
329 extattr_get_vp(struct vnode *vp, int attrnamespace, const char *attrname,
330     void *data, size_t nbytes, struct thread *td)
331 {
332 	struct uio auio, *auiop;
333 	struct iovec aiov;
334 	ssize_t cnt;
335 	size_t size, *sizep;
336 	int error;
337 
338 	if (nbytes > IOSIZE_MAX)
339 		return (EINVAL);
340 
341 	vn_lock(vp, LK_SHARED | LK_RETRY);
342 
343 	/*
344 	 * Slightly unusual semantics: if the user provides a NULL data
345 	 * pointer, they don't want to receive the data, just the maximum
346 	 * read length.
347 	 */
348 	auiop = NULL;
349 	sizep = NULL;
350 	cnt = 0;
351 	if (data != NULL) {
352 		aiov.iov_base = data;
353 		aiov.iov_len = nbytes;
354 		auio.uio_iov = &aiov;
355 		auio.uio_iovcnt = 1;
356 		auio.uio_offset = 0;
357 		auio.uio_resid = nbytes;
358 		auio.uio_rw = UIO_READ;
359 		auio.uio_segflg = UIO_USERSPACE;
360 		auio.uio_td = td;
361 		auiop = &auio;
362 		cnt = nbytes;
363 	} else
364 		sizep = &size;
365 
366 #ifdef MAC
367 	error = mac_vnode_check_getextattr(td->td_ucred, vp, attrnamespace,
368 	    attrname);
369 	if (error)
370 		goto done;
371 #endif
372 
373 	error = VOP_GETEXTATTR(vp, attrnamespace, attrname, auiop, sizep,
374 	    td->td_ucred, td);
375 
376 	if (auiop != NULL) {
377 		cnt -= auio.uio_resid;
378 		td->td_retval[0] = cnt;
379 	} else
380 		td->td_retval[0] = size;
381 #ifdef MAC
382 done:
383 #endif
384 	VOP_UNLOCK(vp);
385 	return (error);
386 }
387 
388 #ifndef _SYS_SYSPROTO_H_
389 struct extattr_get_fd_args {
390 	int fd;
391 	int attrnamespace;
392 	const char *attrname;
393 	void *data;
394 	size_t nbytes;
395 };
396 #endif
397 int
398 sys_extattr_get_fd(struct thread *td, struct extattr_get_fd_args *uap)
399 {
400 	struct file *fp;
401 	char attrname[EXTATTR_MAXNAMELEN + 1];
402 	cap_rights_t rights;
403 	int error;
404 
405 	AUDIT_ARG_FD(uap->fd);
406 	AUDIT_ARG_VALUE(uap->attrnamespace);
407 	error = copyinstr(uap->attrname, attrname, sizeof(attrname), NULL);
408 	if (error)
409 		return (error);
410 	AUDIT_ARG_TEXT(attrname);
411 
412 	error = getvnode_path(td, uap->fd,
413 	    cap_rights_init_one(&rights, CAP_EXTATTR_GET), &fp);
414 	if (error)
415 		return (error);
416 
417 	error = extattr_get_vp(fp->f_vnode, uap->attrnamespace,
418 	    attrname, uap->data, uap->nbytes, td);
419 
420 	fdrop(fp, td);
421 	return (error);
422 }
423 
424 #ifndef _SYS_SYSPROTO_H_
425 struct extattr_get_file_args {
426 	const char *path;
427 	int attrnamespace;
428 	const char *attrname;
429 	void *data;
430 	size_t nbytes;
431 };
432 #endif
433 int
434 sys_extattr_get_file(struct thread *td, struct extattr_get_file_args *uap)
435 {
436 	return (kern_extattr_get_path(td, uap->path, uap->attrnamespace,
437 	    uap->attrname, uap->data, uap->nbytes, FOLLOW));
438 }
439 
440 #ifndef _SYS_SYSPROTO_H_
441 struct extattr_get_link_args {
442 	const char *path;
443 	int attrnamespace;
444 	const char *attrname;
445 	void *data;
446 	size_t nbytes;
447 };
448 #endif
449 int
450 sys_extattr_get_link(struct thread *td, struct extattr_get_link_args *uap)
451 {
452 	return (kern_extattr_get_path(td, uap->path, uap->attrnamespace,
453 	    uap->attrname, uap->data, uap->nbytes, NOFOLLOW));
454 }
455 
456 static int
457 kern_extattr_get_path(struct thread *td, const char *path, int attrnamespace,
458     const char *uattrname, void *data, size_t nbytes, int follow)
459 {
460 	struct nameidata nd;
461 	char attrname[EXTATTR_MAXNAMELEN + 1];
462 	int error;
463 
464 	AUDIT_ARG_VALUE(attrnamespace);
465 	error = copyinstr(uattrname, attrname, sizeof(attrname), NULL);
466 	if (error)
467 		return (error);
468 	AUDIT_ARG_TEXT(attrname);
469 
470 	NDINIT(&nd, LOOKUP, follow | AUDITVNODE1, UIO_USERSPACE, path, td);
471 	error = namei(&nd);
472 	if (error)
473 		return (error);
474 	NDFREE(&nd, NDF_ONLY_PNBUF);
475 
476 	error = extattr_get_vp(nd.ni_vp, attrnamespace, attrname, data,
477 	    nbytes, td);
478 
479 	vrele(nd.ni_vp);
480 	return (error);
481 }
482 
483 /*
484  * extattr_delete_vp(): Delete a named extended attribute on a file or
485  *                      directory
486  *
487  * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace",
488  *            kernelspace string pointer "attrname", proc "p"
489  * Returns: 0 on success, an error number otherwise
490  * Locks: none
491  * References: vp must be a valid reference for the duration of the call
492  */
493 static int
494 extattr_delete_vp(struct vnode *vp, int attrnamespace, const char *attrname,
495     struct thread *td)
496 {
497 	struct mount *mp;
498 	int error;
499 
500 	error = vn_start_write(vp, &mp, V_WAIT | PCATCH);
501 	if (error)
502 		return (error);
503 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
504 
505 #ifdef MAC
506 	error = mac_vnode_check_deleteextattr(td->td_ucred, vp, attrnamespace,
507 	    attrname);
508 	if (error)
509 		goto done;
510 #endif
511 
512 	error = VOP_DELETEEXTATTR(vp, attrnamespace, attrname, td->td_ucred,
513 	    td);
514 	if (error == EOPNOTSUPP)
515 		error = VOP_SETEXTATTR(vp, attrnamespace, attrname, NULL,
516 		    td->td_ucred, td);
517 #ifdef MAC
518 done:
519 #endif
520 	VOP_UNLOCK(vp);
521 	vn_finished_write(mp);
522 	return (error);
523 }
524 
525 #ifndef _SYS_SYSPROTO_H_
526 struct extattr_delete_fd_args {
527 	int fd;
528 	int attrnamespace;
529 	const char *attrname;
530 };
531 #endif
532 int
533 sys_extattr_delete_fd(struct thread *td, struct extattr_delete_fd_args *uap)
534 {
535 	struct file *fp;
536 	char attrname[EXTATTR_MAXNAMELEN + 1];
537 	cap_rights_t rights;
538 	int error;
539 
540 	AUDIT_ARG_FD(uap->fd);
541 	AUDIT_ARG_VALUE(uap->attrnamespace);
542 	error = copyinstr(uap->attrname, attrname, sizeof(attrname), NULL);
543 	if (error)
544 		return (error);
545 	AUDIT_ARG_TEXT(attrname);
546 
547 	error = getvnode_path(td, uap->fd,
548 	    cap_rights_init_one(&rights, CAP_EXTATTR_DELETE), &fp);
549 	if (error)
550 		return (error);
551 
552 	error = extattr_delete_vp(fp->f_vnode, uap->attrnamespace,
553 	    attrname, td);
554 	fdrop(fp, td);
555 	return (error);
556 }
557 
558 #ifndef _SYS_SYSPROTO_H_
559 struct extattr_delete_file_args {
560 	const char *path;
561 	int attrnamespace;
562 	const char *attrname;
563 };
564 #endif
565 int
566 sys_extattr_delete_file(struct thread *td, struct extattr_delete_file_args *uap)
567 {
568 
569 	return (kern_extattr_delete_path(td, uap->path, uap->attrnamespace,
570 	    uap->attrname, FOLLOW));
571 }
572 
573 #ifndef _SYS_SYSPROTO_H_
574 struct extattr_delete_link_args {
575 	const char *path;
576 	int attrnamespace;
577 	const char *attrname;
578 };
579 #endif
580 int
581 sys_extattr_delete_link(struct thread *td, struct extattr_delete_link_args *uap)
582 {
583 
584 	return (kern_extattr_delete_path(td, uap->path, uap->attrnamespace,
585 	    uap->attrname, NOFOLLOW));
586 }
587 
588 static int
589 kern_extattr_delete_path(struct thread *td, const char *path, int attrnamespace,
590     const char *uattrname, int follow)
591 {
592 	struct nameidata nd;
593 	char attrname[EXTATTR_MAXNAMELEN + 1];
594 	int error;
595 
596 	AUDIT_ARG_VALUE(attrnamespace);
597 	error = copyinstr(uattrname, attrname, sizeof(attrname), NULL);
598 	if (error)
599 		return(error);
600 	AUDIT_ARG_TEXT(attrname);
601 
602 	NDINIT(&nd, LOOKUP, follow | AUDITVNODE1, UIO_USERSPACE, path, td);
603 	error = namei(&nd);
604 	if (error)
605 		return(error);
606 	NDFREE(&nd, NDF_ONLY_PNBUF);
607 
608 	error = extattr_delete_vp(nd.ni_vp, attrnamespace, attrname, td);
609 	vrele(nd.ni_vp);
610 	return(error);
611 }
612 
613 /*-
614  * Retrieve a list of extended attributes on a file or directory.
615  *
616  * Arguments: unlocked vnode "vp", attribute namespace 'attrnamespace",
617  *            userspace buffer pointer "data", buffer length "nbytes",
618  *            thread "td".
619  * Returns: 0 on success, an error number otherwise
620  * Locks: none
621  * References: vp must be a valid reference for the duration of the call
622  */
623 static int
624 extattr_list_vp(struct vnode *vp, int attrnamespace, void *data,
625     size_t nbytes, struct thread *td)
626 {
627 	struct uio auio, *auiop;
628 	size_t size, *sizep;
629 	struct iovec aiov;
630 	ssize_t cnt;
631 	int error;
632 
633 	if (nbytes > IOSIZE_MAX)
634 		return (EINVAL);
635 
636 	auiop = NULL;
637 	sizep = NULL;
638 	cnt = 0;
639 	if (data != NULL) {
640 		aiov.iov_base = data;
641 		aiov.iov_len = nbytes;
642 		auio.uio_iov = &aiov;
643 		auio.uio_iovcnt = 1;
644 		auio.uio_offset = 0;
645 		auio.uio_resid = nbytes;
646 		auio.uio_rw = UIO_READ;
647 		auio.uio_segflg = UIO_USERSPACE;
648 		auio.uio_td = td;
649 		auiop = &auio;
650 		cnt = nbytes;
651 	} else
652 		sizep = &size;
653 
654 	vn_lock(vp, LK_SHARED | LK_RETRY);
655 
656 #ifdef MAC
657 	error = mac_vnode_check_listextattr(td->td_ucred, vp, attrnamespace);
658 	if (error) {
659 		VOP_UNLOCK(vp);
660 		return (error);
661 	}
662 #endif
663 
664 	error = VOP_LISTEXTATTR(vp, attrnamespace, auiop, sizep,
665 	    td->td_ucred, td);
666 	VOP_UNLOCK(vp);
667 
668 	if (auiop != NULL) {
669 		cnt -= auio.uio_resid;
670 		td->td_retval[0] = cnt;
671 	} else
672 		td->td_retval[0] = size;
673 	return (error);
674 }
675 
676 #ifndef _SYS_SYSPROTO_H_
677 struct extattr_list_fd_args {
678 	int fd;
679 	int attrnamespace;
680 	void *data;
681 	size_t nbytes;
682 };
683 #endif
684 int
685 sys_extattr_list_fd(struct thread *td, struct extattr_list_fd_args *uap)
686 {
687 	struct file *fp;
688 	cap_rights_t rights;
689 	int error;
690 
691 	AUDIT_ARG_FD(uap->fd);
692 	AUDIT_ARG_VALUE(uap->attrnamespace);
693 	error = getvnode_path(td, uap->fd,
694 	    cap_rights_init_one(&rights, CAP_EXTATTR_LIST), &fp);
695 	if (error)
696 		return (error);
697 
698 	error = extattr_list_vp(fp->f_vnode, uap->attrnamespace, uap->data,
699 	    uap->nbytes, td);
700 
701 	fdrop(fp, td);
702 	return (error);
703 }
704 
705 #ifndef _SYS_SYSPROTO_H_
706 struct extattr_list_file_args {
707 	const char *path;
708 	int attrnamespace;
709 	void *data;
710 	size_t nbytes;
711 }
712 #endif
713 int
714 sys_extattr_list_file(struct thread *td, struct extattr_list_file_args *uap)
715 {
716 
717 	return (kern_extattr_list_path(td, uap->path, uap->attrnamespace,
718 	    uap->data, uap->nbytes, FOLLOW));
719 }
720 
721 #ifndef _SYS_SYSPROTO_H_
722 struct extattr_list_link_args {
723 	const char *path;
724 	int attrnamespace;
725 	void *data;
726 	size_t nbytes;
727 };
728 #endif
729 int
730 sys_extattr_list_link(struct thread *td, struct extattr_list_link_args *uap)
731 {
732 
733 	return (kern_extattr_list_path(td, uap->path, uap->attrnamespace,
734 	    uap->data, uap->nbytes, NOFOLLOW));
735 }
736 
737 static int
738 kern_extattr_list_path(struct thread *td, const char *path, int attrnamespace,
739     void *data, size_t nbytes, int follow)
740 {
741 	struct nameidata nd;
742 	int error;
743 
744 	AUDIT_ARG_VALUE(attrnamespace);
745 	NDINIT(&nd, LOOKUP, follow | AUDITVNODE1, UIO_USERSPACE, path, td);
746 	error = namei(&nd);
747 	if (error)
748 		return (error);
749 	NDFREE(&nd, NDF_ONLY_PNBUF);
750 
751 	error = extattr_list_vp(nd.ni_vp, attrnamespace, data, nbytes, td);
752 
753 	vrele(nd.ni_vp);
754 	return (error);
755 }
756