1 /* 2 * This file is part of UBIFS. 3 * 4 * Copyright (C) 2006-2008 Nokia Corporation. 5 * 6 * This program is free software; you can redistribute it and/or modify it 7 * under the terms of the GNU General Public License version 2 as published by 8 * the Free Software Foundation. 9 * 10 * This program is distributed in the hope that it will be useful, but WITHOUT 11 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 12 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for 13 * more details. 14 * 15 * You should have received a copy of the GNU General Public License along with 16 * this program; if not, write to the Free Software Foundation, Inc., 51 17 * Franklin St, Fifth Floor, Boston, MA 02110-1301 USA 18 * 19 * Authors: Artem Bityutskiy (Битюцкий Артём) 20 * Adrian Hunter 21 */ 22 23 /* 24 * This file implements UBIFS extended attributes support. 25 * 26 * Extended attributes are implemented as regular inodes with attached data, 27 * which limits extended attribute size to UBIFS block size (4KiB). Names of 28 * extended attributes are described by extended attribute entries (xentries), 29 * which are almost identical to directory entries, but have different key type. 30 * 31 * In other words, the situation with extended attributes is very similar to 32 * directories. Indeed, any inode (but of course not xattr inodes) may have a 33 * number of associated xentries, just like directory inodes have associated 34 * directory entries. Extended attribute entries store the name of the extended 35 * attribute, the host inode number, and the extended attribute inode number. 36 * Similarly, direntries store the name, the parent and the target inode 37 * numbers. Thus, most of the common UBIFS mechanisms may be re-used for 38 * extended attributes. 39 * 40 * The number of extended attributes is not limited, but there is Linux 41 * limitation on the maximum possible size of the list of all extended 42 * attributes associated with an inode (%XATTR_LIST_MAX), so UBIFS makes sure 43 * the sum of all extended attribute names of the inode does not exceed that 44 * limit. 45 * 46 * Extended attributes are synchronous, which means they are written to the 47 * flash media synchronously and there is no write-back for extended attribute 48 * inodes. The extended attribute values are not stored in compressed form on 49 * the media. 50 * 51 * Since extended attributes are represented by regular inodes, they are cached 52 * in the VFS inode cache. The xentries are cached in the LNC cache (see 53 * tnc.c). 54 * 55 * ACL support is not implemented. 56 */ 57 58 #include "ubifs.h" 59 #include <linux/fs.h> 60 #include <linux/slab.h> 61 #include <linux/xattr.h> 62 63 /* 64 * Limit the number of extended attributes per inode so that the total size 65 * (@xattr_size) is guaranteeded to fit in an 'unsigned int'. 66 */ 67 #define MAX_XATTRS_PER_INODE 65535 68 69 /* 70 * Extended attribute type constants. 71 * 72 * USER_XATTR: user extended attribute ("user.*") 73 * TRUSTED_XATTR: trusted extended attribute ("trusted.*) 74 * SECURITY_XATTR: security extended attribute ("security.*") 75 */ 76 enum { 77 USER_XATTR, 78 TRUSTED_XATTR, 79 SECURITY_XATTR, 80 }; 81 82 static const struct inode_operations empty_iops; 83 static const struct file_operations empty_fops; 84 85 /** 86 * create_xattr - create an extended attribute. 87 * @c: UBIFS file-system description object 88 * @host: host inode 89 * @nm: extended attribute name 90 * @value: extended attribute value 91 * @size: size of extended attribute value 92 * 93 * This is a helper function which creates an extended attribute of name @nm 94 * and value @value for inode @host. The host inode is also updated on flash 95 * because the ctime and extended attribute accounting data changes. This 96 * function returns zero in case of success and a negative error code in case 97 * of failure. 98 */ 99 static int create_xattr(struct ubifs_info *c, struct inode *host, 100 const struct fscrypt_name *nm, const void *value, int size) 101 { 102 int err, names_len; 103 struct inode *inode; 104 struct ubifs_inode *ui, *host_ui = ubifs_inode(host); 105 struct ubifs_budget_req req = { .new_ino = 1, .new_dent = 1, 106 .new_ino_d = ALIGN(size, 8), .dirtied_ino = 1, 107 .dirtied_ino_d = ALIGN(host_ui->data_len, 8) }; 108 109 if (host_ui->xattr_cnt >= MAX_XATTRS_PER_INODE) { 110 ubifs_err(c, "inode %lu already has too many xattrs (%d), cannot create more", 111 host->i_ino, host_ui->xattr_cnt); 112 return -ENOSPC; 113 } 114 /* 115 * Linux limits the maximum size of the extended attribute names list 116 * to %XATTR_LIST_MAX. This means we should not allow creating more 117 * extended attributes if the name list becomes larger. This limitation 118 * is artificial for UBIFS, though. 119 */ 120 names_len = host_ui->xattr_names + host_ui->xattr_cnt + fname_len(nm) + 1; 121 if (names_len > XATTR_LIST_MAX) { 122 ubifs_err(c, "cannot add one more xattr name to inode %lu, total names length would become %d, max. is %d", 123 host->i_ino, names_len, XATTR_LIST_MAX); 124 return -ENOSPC; 125 } 126 127 err = ubifs_budget_space(c, &req); 128 if (err) 129 return err; 130 131 inode = ubifs_new_inode(c, host, S_IFREG | S_IRWXUGO); 132 if (IS_ERR(inode)) { 133 err = PTR_ERR(inode); 134 goto out_budg; 135 } 136 137 /* Re-define all operations to be "nothing" */ 138 inode->i_mapping->a_ops = &empty_aops; 139 inode->i_op = &empty_iops; 140 inode->i_fop = &empty_fops; 141 142 inode->i_flags |= S_SYNC | S_NOATIME | S_NOCMTIME; 143 ui = ubifs_inode(inode); 144 ui->xattr = 1; 145 ui->flags |= UBIFS_XATTR_FL; 146 ui->data = kmemdup(value, size, GFP_NOFS); 147 if (!ui->data) { 148 err = -ENOMEM; 149 goto out_free; 150 } 151 inode->i_size = ui->ui_size = size; 152 ui->data_len = size; 153 154 mutex_lock(&host_ui->ui_mutex); 155 156 if (!host->i_nlink) { 157 err = -ENOENT; 158 goto out_noent; 159 } 160 161 host->i_ctime = current_time(host); 162 host_ui->xattr_cnt += 1; 163 host_ui->xattr_size += CALC_DENT_SIZE(fname_len(nm)); 164 host_ui->xattr_size += CALC_XATTR_BYTES(size); 165 host_ui->xattr_names += fname_len(nm); 166 167 /* 168 * We handle UBIFS_XATTR_NAME_ENCRYPTION_CONTEXT here because we 169 * have to set the UBIFS_CRYPT_FL flag on the host inode. 170 * To avoid multiple updates of the same inode in the same operation, 171 * let's do it here. 172 */ 173 if (strcmp(fname_name(nm), UBIFS_XATTR_NAME_ENCRYPTION_CONTEXT) == 0) 174 host_ui->flags |= UBIFS_CRYPT_FL; 175 176 err = ubifs_jnl_update(c, host, nm, inode, 0, 1); 177 if (err) 178 goto out_cancel; 179 ubifs_set_inode_flags(host); 180 mutex_unlock(&host_ui->ui_mutex); 181 182 ubifs_release_budget(c, &req); 183 insert_inode_hash(inode); 184 iput(inode); 185 return 0; 186 187 out_cancel: 188 host_ui->xattr_cnt -= 1; 189 host_ui->xattr_size -= CALC_DENT_SIZE(fname_len(nm)); 190 host_ui->xattr_size -= CALC_XATTR_BYTES(size); 191 host_ui->xattr_names -= fname_len(nm); 192 host_ui->flags &= ~UBIFS_CRYPT_FL; 193 out_noent: 194 mutex_unlock(&host_ui->ui_mutex); 195 out_free: 196 make_bad_inode(inode); 197 iput(inode); 198 out_budg: 199 ubifs_release_budget(c, &req); 200 return err; 201 } 202 203 /** 204 * change_xattr - change an extended attribute. 205 * @c: UBIFS file-system description object 206 * @host: host inode 207 * @inode: extended attribute inode 208 * @value: extended attribute value 209 * @size: size of extended attribute value 210 * 211 * This helper function changes the value of extended attribute @inode with new 212 * data from @value. Returns zero in case of success and a negative error code 213 * in case of failure. 214 */ 215 static int change_xattr(struct ubifs_info *c, struct inode *host, 216 struct inode *inode, const void *value, int size) 217 { 218 int err; 219 struct ubifs_inode *host_ui = ubifs_inode(host); 220 struct ubifs_inode *ui = ubifs_inode(inode); 221 void *buf = NULL; 222 int old_size; 223 struct ubifs_budget_req req = { .dirtied_ino = 2, 224 .dirtied_ino_d = ALIGN(size, 8) + ALIGN(host_ui->data_len, 8) }; 225 226 ubifs_assert(c, ui->data_len == inode->i_size); 227 err = ubifs_budget_space(c, &req); 228 if (err) 229 return err; 230 231 buf = kmemdup(value, size, GFP_NOFS); 232 if (!buf) { 233 err = -ENOMEM; 234 goto out_free; 235 } 236 mutex_lock(&ui->ui_mutex); 237 kfree(ui->data); 238 ui->data = buf; 239 inode->i_size = ui->ui_size = size; 240 old_size = ui->data_len; 241 ui->data_len = size; 242 mutex_unlock(&ui->ui_mutex); 243 244 mutex_lock(&host_ui->ui_mutex); 245 246 if (!host->i_nlink) { 247 err = -ENOENT; 248 goto out_noent; 249 } 250 251 host->i_ctime = current_time(host); 252 host_ui->xattr_size -= CALC_XATTR_BYTES(old_size); 253 host_ui->xattr_size += CALC_XATTR_BYTES(size); 254 255 /* 256 * It is important to write the host inode after the xattr inode 257 * because if the host inode gets synchronized (via 'fsync()'), then 258 * the extended attribute inode gets synchronized, because it goes 259 * before the host inode in the write-buffer. 260 */ 261 err = ubifs_jnl_change_xattr(c, inode, host); 262 if (err) 263 goto out_cancel; 264 mutex_unlock(&host_ui->ui_mutex); 265 266 ubifs_release_budget(c, &req); 267 return 0; 268 269 out_cancel: 270 host_ui->xattr_size -= CALC_XATTR_BYTES(size); 271 host_ui->xattr_size += CALC_XATTR_BYTES(old_size); 272 out_noent: 273 mutex_unlock(&host_ui->ui_mutex); 274 make_bad_inode(inode); 275 out_free: 276 ubifs_release_budget(c, &req); 277 return err; 278 } 279 280 static struct inode *iget_xattr(struct ubifs_info *c, ino_t inum) 281 { 282 struct inode *inode; 283 284 inode = ubifs_iget(c->vfs_sb, inum); 285 if (IS_ERR(inode)) { 286 ubifs_err(c, "dead extended attribute entry, error %d", 287 (int)PTR_ERR(inode)); 288 return inode; 289 } 290 if (ubifs_inode(inode)->xattr) 291 return inode; 292 ubifs_err(c, "corrupt extended attribute entry"); 293 iput(inode); 294 return ERR_PTR(-EINVAL); 295 } 296 297 int ubifs_xattr_set(struct inode *host, const char *name, const void *value, 298 size_t size, int flags, bool check_lock) 299 { 300 struct inode *inode; 301 struct ubifs_info *c = host->i_sb->s_fs_info; 302 struct fscrypt_name nm = { .disk_name = FSTR_INIT((char *)name, strlen(name))}; 303 struct ubifs_dent_node *xent; 304 union ubifs_key key; 305 int err; 306 307 if (check_lock) 308 ubifs_assert(c, inode_is_locked(host)); 309 310 if (size > UBIFS_MAX_INO_DATA) 311 return -ERANGE; 312 313 if (fname_len(&nm) > UBIFS_MAX_NLEN) 314 return -ENAMETOOLONG; 315 316 xent = kmalloc(UBIFS_MAX_XENT_NODE_SZ, GFP_NOFS); 317 if (!xent) 318 return -ENOMEM; 319 320 /* 321 * The extended attribute entries are stored in LNC, so multiple 322 * look-ups do not involve reading the flash. 323 */ 324 xent_key_init(c, &key, host->i_ino, &nm); 325 err = ubifs_tnc_lookup_nm(c, &key, xent, &nm); 326 if (err) { 327 if (err != -ENOENT) 328 goto out_free; 329 330 if (flags & XATTR_REPLACE) 331 /* We are asked not to create the xattr */ 332 err = -ENODATA; 333 else 334 err = create_xattr(c, host, &nm, value, size); 335 goto out_free; 336 } 337 338 if (flags & XATTR_CREATE) { 339 /* We are asked not to replace the xattr */ 340 err = -EEXIST; 341 goto out_free; 342 } 343 344 inode = iget_xattr(c, le64_to_cpu(xent->inum)); 345 if (IS_ERR(inode)) { 346 err = PTR_ERR(inode); 347 goto out_free; 348 } 349 350 err = change_xattr(c, host, inode, value, size); 351 iput(inode); 352 353 out_free: 354 kfree(xent); 355 return err; 356 } 357 358 ssize_t ubifs_xattr_get(struct inode *host, const char *name, void *buf, 359 size_t size) 360 { 361 struct inode *inode; 362 struct ubifs_info *c = host->i_sb->s_fs_info; 363 struct fscrypt_name nm = { .disk_name = FSTR_INIT((char *)name, strlen(name))}; 364 struct ubifs_inode *ui; 365 struct ubifs_dent_node *xent; 366 union ubifs_key key; 367 int err; 368 369 if (fname_len(&nm) > UBIFS_MAX_NLEN) 370 return -ENAMETOOLONG; 371 372 xent = kmalloc(UBIFS_MAX_XENT_NODE_SZ, GFP_NOFS); 373 if (!xent) 374 return -ENOMEM; 375 376 xent_key_init(c, &key, host->i_ino, &nm); 377 err = ubifs_tnc_lookup_nm(c, &key, xent, &nm); 378 if (err) { 379 if (err == -ENOENT) 380 err = -ENODATA; 381 goto out_unlock; 382 } 383 384 inode = iget_xattr(c, le64_to_cpu(xent->inum)); 385 if (IS_ERR(inode)) { 386 err = PTR_ERR(inode); 387 goto out_unlock; 388 } 389 390 ui = ubifs_inode(inode); 391 ubifs_assert(c, inode->i_size == ui->data_len); 392 ubifs_assert(c, ubifs_inode(host)->xattr_size > ui->data_len); 393 394 mutex_lock(&ui->ui_mutex); 395 if (buf) { 396 /* If @buf is %NULL we are supposed to return the length */ 397 if (ui->data_len > size) { 398 err = -ERANGE; 399 goto out_iput; 400 } 401 402 memcpy(buf, ui->data, ui->data_len); 403 } 404 err = ui->data_len; 405 406 out_iput: 407 mutex_unlock(&ui->ui_mutex); 408 iput(inode); 409 out_unlock: 410 kfree(xent); 411 return err; 412 } 413 414 static bool xattr_visible(const char *name) 415 { 416 /* File encryption related xattrs are for internal use only */ 417 if (strcmp(name, UBIFS_XATTR_NAME_ENCRYPTION_CONTEXT) == 0) 418 return false; 419 420 /* Show trusted namespace only for "power" users */ 421 if (strncmp(name, XATTR_TRUSTED_PREFIX, 422 XATTR_TRUSTED_PREFIX_LEN) == 0 && !capable(CAP_SYS_ADMIN)) 423 return false; 424 425 return true; 426 } 427 428 ssize_t ubifs_listxattr(struct dentry *dentry, char *buffer, size_t size) 429 { 430 union ubifs_key key; 431 struct inode *host = d_inode(dentry); 432 struct ubifs_info *c = host->i_sb->s_fs_info; 433 struct ubifs_inode *host_ui = ubifs_inode(host); 434 struct ubifs_dent_node *xent, *pxent = NULL; 435 int err, len, written = 0; 436 struct fscrypt_name nm = {0}; 437 438 dbg_gen("ino %lu ('%pd'), buffer size %zd", host->i_ino, 439 dentry, size); 440 441 len = host_ui->xattr_names + host_ui->xattr_cnt; 442 if (!buffer) 443 /* 444 * We should return the minimum buffer size which will fit a 445 * null-terminated list of all the extended attribute names. 446 */ 447 return len; 448 449 if (len > size) 450 return -ERANGE; 451 452 lowest_xent_key(c, &key, host->i_ino); 453 while (1) { 454 xent = ubifs_tnc_next_ent(c, &key, &nm); 455 if (IS_ERR(xent)) { 456 err = PTR_ERR(xent); 457 break; 458 } 459 460 fname_name(&nm) = xent->name; 461 fname_len(&nm) = le16_to_cpu(xent->nlen); 462 463 if (xattr_visible(xent->name)) { 464 memcpy(buffer + written, fname_name(&nm), fname_len(&nm) + 1); 465 written += fname_len(&nm) + 1; 466 } 467 468 kfree(pxent); 469 pxent = xent; 470 key_read(c, &xent->key, &key); 471 } 472 473 kfree(pxent); 474 if (err != -ENOENT) { 475 ubifs_err(c, "cannot find next direntry, error %d", err); 476 return err; 477 } 478 479 ubifs_assert(c, written <= size); 480 return written; 481 } 482 483 static int remove_xattr(struct ubifs_info *c, struct inode *host, 484 struct inode *inode, const struct fscrypt_name *nm) 485 { 486 int err; 487 struct ubifs_inode *host_ui = ubifs_inode(host); 488 struct ubifs_inode *ui = ubifs_inode(inode); 489 struct ubifs_budget_req req = { .dirtied_ino = 2, .mod_dent = 1, 490 .dirtied_ino_d = ALIGN(host_ui->data_len, 8) }; 491 492 ubifs_assert(c, ui->data_len == inode->i_size); 493 494 err = ubifs_budget_space(c, &req); 495 if (err) 496 return err; 497 498 mutex_lock(&host_ui->ui_mutex); 499 500 if (!host->i_nlink) { 501 err = -ENOENT; 502 goto out_noent; 503 } 504 505 host->i_ctime = current_time(host); 506 host_ui->xattr_cnt -= 1; 507 host_ui->xattr_size -= CALC_DENT_SIZE(fname_len(nm)); 508 host_ui->xattr_size -= CALC_XATTR_BYTES(ui->data_len); 509 host_ui->xattr_names -= fname_len(nm); 510 511 err = ubifs_jnl_delete_xattr(c, host, inode, nm); 512 if (err) 513 goto out_cancel; 514 mutex_unlock(&host_ui->ui_mutex); 515 516 ubifs_release_budget(c, &req); 517 return 0; 518 519 out_cancel: 520 host_ui->xattr_cnt += 1; 521 host_ui->xattr_size += CALC_DENT_SIZE(fname_len(nm)); 522 host_ui->xattr_size += CALC_XATTR_BYTES(ui->data_len); 523 host_ui->xattr_names += fname_len(nm); 524 out_noent: 525 mutex_unlock(&host_ui->ui_mutex); 526 ubifs_release_budget(c, &req); 527 make_bad_inode(inode); 528 return err; 529 } 530 531 /** 532 * ubifs_evict_xattr_inode - Evict an xattr inode. 533 * @c: UBIFS file-system description object 534 * @xattr_inum: xattr inode number 535 * 536 * When an inode that hosts xattrs is being removed we have to make sure 537 * that cached inodes of the xattrs also get removed from the inode cache 538 * otherwise we'd waste memory. This function looks up an inode from the 539 * inode cache and clears the link counter such that iput() will evict 540 * the inode. 541 */ 542 void ubifs_evict_xattr_inode(struct ubifs_info *c, ino_t xattr_inum) 543 { 544 struct inode *inode; 545 546 inode = ilookup(c->vfs_sb, xattr_inum); 547 if (inode) { 548 clear_nlink(inode); 549 iput(inode); 550 } 551 } 552 553 static int ubifs_xattr_remove(struct inode *host, const char *name) 554 { 555 struct inode *inode; 556 struct ubifs_info *c = host->i_sb->s_fs_info; 557 struct fscrypt_name nm = { .disk_name = FSTR_INIT((char *)name, strlen(name))}; 558 struct ubifs_dent_node *xent; 559 union ubifs_key key; 560 int err; 561 562 ubifs_assert(c, inode_is_locked(host)); 563 564 if (!host->i_nlink) 565 return -ENOENT; 566 567 if (fname_len(&nm) > UBIFS_MAX_NLEN) 568 return -ENAMETOOLONG; 569 570 xent = kmalloc(UBIFS_MAX_XENT_NODE_SZ, GFP_NOFS); 571 if (!xent) 572 return -ENOMEM; 573 574 xent_key_init(c, &key, host->i_ino, &nm); 575 err = ubifs_tnc_lookup_nm(c, &key, xent, &nm); 576 if (err) { 577 if (err == -ENOENT) 578 err = -ENODATA; 579 goto out_free; 580 } 581 582 inode = iget_xattr(c, le64_to_cpu(xent->inum)); 583 if (IS_ERR(inode)) { 584 err = PTR_ERR(inode); 585 goto out_free; 586 } 587 588 ubifs_assert(c, inode->i_nlink == 1); 589 clear_nlink(inode); 590 err = remove_xattr(c, host, inode, &nm); 591 if (err) 592 set_nlink(inode, 1); 593 594 /* If @i_nlink is 0, 'iput()' will delete the inode */ 595 iput(inode); 596 597 out_free: 598 kfree(xent); 599 return err; 600 } 601 602 #ifdef CONFIG_UBIFS_FS_SECURITY 603 static int init_xattrs(struct inode *inode, const struct xattr *xattr_array, 604 void *fs_info) 605 { 606 const struct xattr *xattr; 607 char *name; 608 int err = 0; 609 610 for (xattr = xattr_array; xattr->name != NULL; xattr++) { 611 name = kmalloc(XATTR_SECURITY_PREFIX_LEN + 612 strlen(xattr->name) + 1, GFP_NOFS); 613 if (!name) { 614 err = -ENOMEM; 615 break; 616 } 617 strcpy(name, XATTR_SECURITY_PREFIX); 618 strcpy(name + XATTR_SECURITY_PREFIX_LEN, xattr->name); 619 /* 620 * creating a new inode without holding the inode rwsem, 621 * no need to check whether inode is locked. 622 */ 623 err = ubifs_xattr_set(inode, name, xattr->value, 624 xattr->value_len, 0, false); 625 kfree(name); 626 if (err < 0) 627 break; 628 } 629 630 return err; 631 } 632 633 int ubifs_init_security(struct inode *dentry, struct inode *inode, 634 const struct qstr *qstr) 635 { 636 int err; 637 638 err = security_inode_init_security(inode, dentry, qstr, 639 &init_xattrs, 0); 640 if (err) { 641 struct ubifs_info *c = dentry->i_sb->s_fs_info; 642 ubifs_err(c, "cannot initialize security for inode %lu, error %d", 643 inode->i_ino, err); 644 } 645 return err; 646 } 647 #endif 648 649 static int xattr_get(const struct xattr_handler *handler, 650 struct dentry *dentry, struct inode *inode, 651 const char *name, void *buffer, size_t size) 652 { 653 dbg_gen("xattr '%s', ino %lu ('%pd'), buf size %zd", name, 654 inode->i_ino, dentry, size); 655 656 name = xattr_full_name(handler, name); 657 return ubifs_xattr_get(inode, name, buffer, size); 658 } 659 660 static int xattr_set(const struct xattr_handler *handler, 661 struct dentry *dentry, struct inode *inode, 662 const char *name, const void *value, 663 size_t size, int flags) 664 { 665 dbg_gen("xattr '%s', host ino %lu ('%pd'), size %zd", 666 name, inode->i_ino, dentry, size); 667 668 name = xattr_full_name(handler, name); 669 670 if (value) 671 return ubifs_xattr_set(inode, name, value, size, flags, true); 672 else 673 return ubifs_xattr_remove(inode, name); 674 } 675 676 static const struct xattr_handler ubifs_user_xattr_handler = { 677 .prefix = XATTR_USER_PREFIX, 678 .get = xattr_get, 679 .set = xattr_set, 680 }; 681 682 static const struct xattr_handler ubifs_trusted_xattr_handler = { 683 .prefix = XATTR_TRUSTED_PREFIX, 684 .get = xattr_get, 685 .set = xattr_set, 686 }; 687 688 #ifdef CONFIG_UBIFS_FS_SECURITY 689 static const struct xattr_handler ubifs_security_xattr_handler = { 690 .prefix = XATTR_SECURITY_PREFIX, 691 .get = xattr_get, 692 .set = xattr_set, 693 }; 694 #endif 695 696 const struct xattr_handler *ubifs_xattr_handlers[] = { 697 &ubifs_user_xattr_handler, 698 &ubifs_trusted_xattr_handler, 699 #ifdef CONFIG_UBIFS_FS_SECURITY 700 &ubifs_security_xattr_handler, 701 #endif 702 NULL 703 }; 704