2 * Copyright (c) 2000-2015 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
30 * hfs_attrlist.c - HFS attribute list processing
32 * Copyright (c) 1998-2002, Apple Inc. All Rights Reserved.
35 #include <sys/param.h>
36 #include <sys/systm.h>
37 #include <sys/kernel.h>
38 #include <sys/malloc.h>
41 #include <sys/unistd.h>
43 #include <sys/kauth.h>
44 #include <sys/fsctl.h>
46 #include <kern/locks.h>
49 #include "hfs_cnode.h"
50 #include "hfs_mount.h"
52 #include "hfs_attrlist.h"
53 #include "hfs_btreeio.h"
54 #include "hfs_cprotect.h"
56 /* Packing routines: */
58 static void packnameattr(struct attrblock
*abp
, struct vnode
*vp
,
59 const u_int8_t
*name
, int namelen
);
61 static void packcommonattr(struct attrblock
*abp
, struct hfsmount
*hfsmp
,
62 struct vnode
*vp
, struct cat_desc
* cdp
,
63 struct cat_attr
* cap
, struct vfs_context
*ctx
);
65 static void packfileattr(struct attrblock
*abp
, struct hfsmount
*hfsmp
,
66 struct cat_attr
*cattrp
, struct cat_fork
*datafork
,
67 struct cat_fork
*rsrcfork
, struct vnode
*vp
);
69 static void packdirattr(struct attrblock
*abp
, struct hfsmount
*hfsmp
,
70 struct vnode
*vp
, struct cat_desc
* descp
,
71 struct cat_attr
* cattrp
);
73 static u_int32_t
hfs_real_user_access(vnode_t vp
, vfs_context_t ctx
);
75 static void get_vattr_data_for_attrs(struct attrlist
*, struct vnode_attr
*,
76 struct hfsmount
*, struct vnode
*, struct cat_desc
*, struct cat_attr
*,
77 struct cat_fork
*, struct cat_fork
*, vfs_context_t
);
79 static void vattr_data_for_common_attrs(struct attrlist
*, struct vnode_attr
*,
80 struct hfsmount
*, struct vnode
*, struct cat_desc
*, struct cat_attr
*,
83 static void vattr_data_for_dir_attrs(struct attrlist
*, struct vnode_attr
*,
84 struct hfsmount
*, struct vnode
*, struct cat_desc
*, struct cat_attr
*);
86 static void vattr_data_for_file_attrs(struct attrlist
*, struct vnode_attr
*,
87 struct hfsmount
*, struct cat_attr
*, struct cat_fork
*, struct cat_fork
*,
90 static int hfs_readdirattr_internal(struct vnode
*, struct attrlist
*,
91 struct vnode_attr
*, uio_t
, uint64_t, int, uint32_t *, int *, int *,
95 * readdirattr operation will return attributes for the items in the
96 * directory specified.
98 * It does not do . and .. entries. The problem is if you are at the root of the
99 * hfs directory and go to .. you could be crossing a mountpoint into a
100 * different (ufs) file system. The attributes that apply for it may not
101 * apply for the file system you are doing the readdirattr on. To make life
102 * simpler, this call will only return entries in its directory, hfs like.
105 hfs_vnop_readdirattr(ap
)
106 struct vnop_readdirattr_args
/* {
108 struct attrlist *a_alist;
114 u_long *a_actualcount;
115 vfs_context_t a_context;
119 struct attrlist
*alist
= ap
->a_alist
;
121 /* Check for invalid options and buffer space. */
122 if (((ap
->a_options
& ~(FSOPT_NOINMEMUPDATE
| FSOPT_NOFOLLOW
)) != 0) ||
123 (ap
->a_maxcount
<= 0)) {
127 * Reject requests for unsupported attributes.
129 if ((alist
->bitmapcount
!= ATTR_BIT_MAP_COUNT
) ||
130 (alist
->commonattr
& ~HFS_ATTR_CMN_VALID
) ||
131 (alist
->volattr
!= 0) ||
132 (alist
->dirattr
& ~HFS_ATTR_DIR_VALID
) ||
133 (alist
->fileattr
& ~HFS_ATTR_FILE_VALID
) ||
134 (alist
->forkattr
!= 0)) {
138 error
= hfs_readdirattr_internal(ap
->a_vp
, alist
, NULL
, ap
->a_uio
,
139 (uint64_t)ap
->a_options
, ap
->a_maxcount
, ap
->a_newstate
,
140 ap
->a_eofflag
, (int *)ap
->a_actualcount
, ap
->a_context
);
147 * getattrlistbulk, like readdirattr, will return attributes for the items in
148 * the directory specified.
150 * It does not do . and .. entries. The problem is if you are at the root of the
151 * hfs directory and go to .. you could be crossing a mountpoint into a
152 * different (ufs) file system. The attributes that apply for it may not
153 * apply for the file system you are doing the readdirattr on. To make life
154 * simpler, this call will only return entries in its directory, hfs like.
157 hfs_vnop_getattrlistbulk(ap
)
158 struct vnop_getattrlistbulk_args
/* {
159 struct vnodeop_desc *a_desc;
161 struct attrlist *a_alist;
162 struct vnode_attr *a_vap;
167 int32_t *a_actualcount;
168 vfs_context_t a_context;
173 error
= hfs_readdirattr_internal(ap
->a_vp
, ap
->a_alist
, ap
->a_vap
,
174 ap
->a_uio
, (uint64_t)ap
->a_options
, 0, NULL
, ap
->a_eofflag
,
175 (int *)ap
->a_actualcount
, ap
->a_context
);
181 * Common function for both hfs_vnop_readdirattr and hfs_vnop_getattrlistbulk.
182 * This either fills in a vnode_attr structure or fills in an attrbute buffer
183 * Currently the difference in behaviour required for the two vnops is keyed
184 * on whether the passed in vnode_attr pointer is null or not. If the pointer
185 * is null we fill in buffer passed and if it is not null we fill in the fields
186 * of the vnode_attr structure.
189 hfs_readdirattr_internal(struct vnode
*dvp
, struct attrlist
*alist
,
190 struct vnode_attr
*vap
, uio_t uio
, uint64_t options
, int maxcount
,
191 uint32_t *newstate
, int *eofflag
, int *actualcount
, vfs_context_t ctx
)
194 struct hfsmount
* hfsmp
;
195 u_int32_t fixedblocksize
;
196 u_int32_t maxattrblocksize
= 0;
197 u_int32_t currattrbufsize
;
198 void *attrbufptr
= NULL
;
199 void *attrptr
= NULL
;
201 caddr_t namebuf
= NULL
;
202 struct attrblock attrblk
;
206 struct cat_desc
*lastdescp
= NULL
;
207 struct cat_entrylist
*ce_list
= NULL
;
208 directoryhint_t
*dirhint
= NULL
;
212 u_int32_t dirchg
= 0;
218 if ((uio_resid(uio
) <= 0) || (uio_iovcnt(uio
) > 1))
221 if (VTOC(dvp
)->c_bsdflags
& UF_COMPRESSED
) {
222 int compressed
= hfs_file_is_compressed(VTOC(dvp
), 0); /* 0 == take the cnode lock */
225 error
= check_for_dataless_file(dvp
, NAMESPACE_HANDLER_READ_OP
);
233 * Take an exclusive directory lock since we manipulate the directory hints
235 if ((error
= hfs_lock(VTOC(dvp
), HFS_EXCLUSIVE_LOCK
, HFS_LOCK_DEFAULT
))) {
241 dirchg
= dcp
->c_dirchangecnt
;
243 /* Extract directory index and tag (sequence number) from uio_offset */
244 index
= uio_offset(uio
) & HFS_INDEX_MASK
;
245 tag
= uio_offset(uio
) & ~HFS_INDEX_MASK
;
248 * We can't just use the valence as an optimization to avoid
249 * going to the catalog. It might be wrong (== 0), and that would
250 * cause us to avoid iterating the directory when it might actually have
251 * contents. Instead, use the catalog to tell us when we've hit EOF
255 /* Get a buffer to hold packed attributes. */
256 fixedblocksize
= (sizeof(u_int32_t
) + hfs_attrblksize(alist
)); /* 4 bytes for length */
259 maxattrblocksize
= fixedblocksize
;
260 if (alist
->commonattr
& ATTR_CMN_NAME
)
261 maxattrblocksize
+= kHFSPlusMaxFileNameBytes
+ 1;
263 attrbufptr
= hfs_malloc(maxattrblocksize
);
264 attrptr
= attrbufptr
;
265 varptr
= (char *)attrbufptr
+ fixedblocksize
; /* Point to variable-length storage */
267 if ((alist
->commonattr
& ATTR_CMN_NAME
) && !vap
->va_name
) {
268 namebuf
= hfs_malloc(MAXPATHLEN
);
273 vap
->va_name
= namebuf
;
276 /* Get a detached directory hint (cnode must be locked exclusive) */
277 dirhint
= hfs_getdirhint(dcp
, ((index
- 1) & HFS_INDEX_MASK
) | tag
, TRUE
);
279 /* Hide tag from catalog layer. */
280 dirhint
->dh_index
&= HFS_INDEX_MASK
;
281 if (dirhint
->dh_index
== HFS_INDEX_MASK
) {
282 dirhint
->dh_index
= -1;
286 * Obtain a list of catalog entries and pack their attributes until
287 * the output buffer is full or maxcount entries have been packed.
291 * Constrain our list size.
293 maxentries
= uio_resid(uio
) / (fixedblocksize
+ HFS_AVERAGE_NAME_SIZE
);
294 /* There is maxcount for the bulk vnop */
296 maxentries
= min(maxentries
, maxcount
);
297 maxentries
= min(maxentries
, MAXCATENTRIES
);
298 if (maxentries
< 1) {
303 /* Initialize a catalog entry list. */
304 ce_list
= hfs_mallocz(CE_LIST_SIZE(maxentries
));
305 ce_list
->maxentries
= maxentries
;
308 * Populate the ce_list from the catalog file.
310 lockflags
= hfs_systemfile_lock(hfsmp
, SFL_CATALOG
, HFS_SHARED_LOCK
);
312 error
= cat_getentriesattr(hfsmp
, dirhint
, ce_list
, &reachedeof
);
313 /* Don't forget to release the descriptors later! */
315 hfs_systemfile_unlock(hfsmp
, lockflags
);
317 if ((error
== ENOENT
) || (reachedeof
!= 0)) {
325 dcp
->c_touch_acctime
= TRUE
;
328 * Check for a FS corruption in the valence. We're holding the cnode lock
329 * exclusive since we need to serialize the directory hints, so if we found
330 * that the valence reported 0, but we actually found some items here, then
331 * silently minimally self-heal and bump the valence to 1.
333 if ((dcp
->c_entries
== 0) && (ce_list
->realentries
> 0)) {
335 dcp
->c_flag
|= C_MODIFIED
;
336 printf("%s : repairing valence to non-zero!\n", __FUNCTION__
);
337 /* force an update on dcp while we're still holding the lock. */
342 * Drop the directory lock so we don't deadlock when we:
343 * - acquire a child cnode lock
344 * - make calls to vnode_authorize()
345 * - make calls to kauth_cred_ismember_gid()
350 /* Process the catalog entries. */
351 for (i
= 0; i
< (int)ce_list
->realentries
; ++i
) {
352 struct cnode
*cp
= NULL
;
353 struct vnode
*vp
= NULL
;
354 struct cat_desc
* cdescp
;
355 struct cat_attr
* cattrp
;
356 struct cat_fork c_datafork
;
357 struct cat_fork c_rsrcfork
;
359 bzero(&c_datafork
, sizeof(c_datafork
));
360 bzero(&c_rsrcfork
, sizeof(c_rsrcfork
));
361 cdescp
= &ce_list
->entry
[i
].ce_desc
;
362 cattrp
= &ce_list
->entry
[i
].ce_attr
;
363 c_datafork
.cf_size
= ce_list
->entry
[i
].ce_datasize
;
364 c_datafork
.cf_blocks
= ce_list
->entry
[i
].ce_datablks
;
365 c_rsrcfork
.cf_size
= ce_list
->entry
[i
].ce_rsrcsize
;
366 c_rsrcfork
.cf_blocks
= ce_list
->entry
[i
].ce_rsrcblks
;
368 if (((alist
->commonattr
& ATTR_CMN_USERACCESS
) &&
369 (cattrp
->ca_recflags
& kHFSHasSecurityMask
))
372 ((alist
->commonattr
& ATTR_CMN_DATA_PROTECT_FLAGS
) && (vap
))
376 * Obtain vnode for our vnode_authorize() calls.
378 if (hfs_vget(hfsmp
, cattrp
->ca_fileid
, &vp
, 0, 0) != 0) {
381 } else if (vap
|| !(options
& FSOPT_NOINMEMUPDATE
)) {
382 /* Get in-memory cnode data (if any). */
383 vp
= hfs_chash_getvnode(hfsmp
, cattrp
->ca_fileid
, 0, 0, 0);
387 /* Only use cnode's decriptor for non-hardlinks */
388 if (!(cp
->c_flag
& C_HARDLINK
))
389 cdescp
= &cp
->c_desc
;
390 cattrp
= &cp
->c_attr
;
391 if (cp
->c_datafork
) {
392 c_datafork
.cf_size
= cp
->c_datafork
->ff_size
;
393 c_datafork
.cf_blocks
= cp
->c_datafork
->ff_blocks
;
395 if (cp
->c_rsrcfork
) {
396 c_rsrcfork
.cf_size
= cp
->c_rsrcfork
->ff_size
;
397 c_rsrcfork
.cf_blocks
= cp
->c_rsrcfork
->ff_blocks
;
399 /* All done with cnode. */
405 *((u_int32_t
*)attrptr
) = 0;
406 attrptr
= ((u_int32_t
*)attrptr
) + 1;
407 attrblk
.ab_attrlist
= alist
;
408 attrblk
.ab_attrbufpp
= &attrptr
;
409 attrblk
.ab_varbufpp
= &varptr
;
410 attrblk
.ab_flags
= 0;
411 attrblk
.ab_blocksize
= maxattrblocksize
;
412 attrblk
.ab_context
= ctx
;
414 /* Pack catalog entries into attribute buffer. */
415 hfs_packattrblk(&attrblk
, hfsmp
, vp
, cdescp
, cattrp
, &c_datafork
, &c_rsrcfork
, ctx
);
416 currattrbufsize
= ((char *)varptr
- (char *)attrbufptr
);
418 /* All done with vnode. */
424 /* Make sure there's enough buffer space remaining. */
425 // LP64todo - fix this!
426 if (uio_resid(uio
) < 0 ||
427 currattrbufsize
> (u_int32_t
)uio_resid(uio
)) {
430 *((u_int32_t
*)attrbufptr
) = currattrbufsize
;
431 error
= uiomove((caddr_t
)attrbufptr
, currattrbufsize
, uio
);
432 if (error
!= E_NONE
) {
435 attrptr
= attrbufptr
;
436 /* Point to variable-length storage */
437 varptr
= (char *)attrbufptr
+ fixedblocksize
;
438 /* Save the last valid catalog entry */
439 lastdescp
= &ce_list
->entry
[i
].ce_desc
;
443 /* Termination checks */
444 if ((--maxcount
<= 0) ||
445 // LP64todo - fix this!
446 uio_resid(uio
) < 0 ||
447 ((u_int32_t
)uio_resid(uio
) < (fixedblocksize
+ HFS_AVERAGE_NAME_SIZE
))){
452 size_t orig_resid
= (size_t)uio_resid(uio
);
455 get_vattr_data_for_attrs(alist
, vap
, hfsmp
, vp
, cdescp
,
456 cattrp
, &c_datafork
, &c_rsrcfork
, ctx
);
459 if ((alist
->commonattr
& ATTR_CMN_DATA_PROTECT_FLAGS
) &&
461 cp_key_class_t
class;
463 if (!cp_vnode_getclass(vp
, &class)) {
464 VATTR_RETURN(vap
, va_dataprotect_class
,
469 error
= vfs_attr_pack(vp
, uio
, alist
, options
, vap
,
472 /* All done with vnode. */
478 resid
= uio_resid(uio
);
480 /* Was this entry succesful ? */
481 if (error
|| resid
== orig_resid
)
484 /* Save the last valid catalog entry */
485 lastdescp
= &ce_list
->entry
[i
].ce_desc
;
489 /* Do we have the bare minimum for the next entry ? */
490 if (resid
< sizeof(uint32_t))
493 } /* for each catalog entry */
496 * If we couldn't fit all the entries requested in the user's buffer,
499 if (*eofflag
&& (*actualcount
< (int)ce_list
->realentries
))
502 /* If we skipped catalog entries for reserved files that should
503 * not be listed in namespace, update the index accordingly.
505 if (ce_list
->skipentries
) {
506 index
+= ce_list
->skipentries
;
507 ce_list
->skipentries
= 0;
511 * If there are more entries then save the last name.
512 * Key this behavior based on whether or not we observed EOFFLAG.
514 * Do not use the valence as a way to determine if we hit EOF, since
515 * it can be wrong. Use the catalog's output only.
517 if ((*(eofflag
) == 0) && (lastdescp
!= NULL
)) {
519 /* Remember last entry */
520 if ((dirhint
->dh_desc
.cd_flags
& CD_HASBUF
) &&
521 (dirhint
->dh_desc
.cd_nameptr
!= NULL
)) {
522 dirhint
->dh_desc
.cd_flags
&= ~CD_HASBUF
;
523 vfs_removename((const char *)dirhint
->dh_desc
.cd_nameptr
);
525 if (lastdescp
->cd_nameptr
!= NULL
) {
526 dirhint
->dh_desc
.cd_namelen
= lastdescp
->cd_namelen
;
527 dirhint
->dh_desc
.cd_nameptr
= (const u_int8_t
*)
528 vfs_addname((const char *)lastdescp
->cd_nameptr
, lastdescp
->cd_namelen
, 0, 0);
529 dirhint
->dh_desc
.cd_flags
|= CD_HASBUF
;
531 dirhint
->dh_desc
.cd_namelen
= 0;
532 dirhint
->dh_desc
.cd_nameptr
= NULL
;
534 dirhint
->dh_index
= index
- 1;
535 dirhint
->dh_desc
.cd_cnid
= lastdescp
->cd_cnid
;
536 dirhint
->dh_desc
.cd_hint
= lastdescp
->cd_hint
;
537 dirhint
->dh_desc
.cd_encoding
= lastdescp
->cd_encoding
;
540 /* All done with the catalog descriptors. */
541 for (i
= 0; i
< (int)ce_list
->realentries
; ++i
)
542 cat_releasedesc(&ce_list
->entry
[i
].ce_desc
);
543 ce_list
->realentries
= 0;
545 (void) hfs_lock(VTOC(dvp
), HFS_EXCLUSIVE_LOCK
, HFS_LOCK_ALLOW_NOEXISTS
);
549 /* Pack directory index and tag into uio_offset. */
550 while (tag
== 0) tag
= (++dcp
->c_dirhinttag
) << HFS_INDEX_BITS
;
551 uio_setoffset(uio
, index
| tag
);
552 dirhint
->dh_index
|= tag
;
559 * Drop directory hint on error or if there are no more entries,
560 * only if EOF was seen.
563 if ((error
!= 0) || *(eofflag
))
564 hfs_reldirhint(dcp
, dirhint
);
566 hfs_insertdirhint(dcp
, dirhint
);
569 hfs_free(namebuf
, MAXPATHLEN
);
573 hfs_free(attrbufptr
, maxattrblocksize
);
575 hfs_free(ce_list
, CE_LIST_SIZE(maxentries
));
577 if (vap
&& *actualcount
&& error
)
585 /*==================== Attribute list support routines ====================*/
588 * Pack cnode attributes into an attribute block.
591 hfs_packattrblk(struct attrblock
*abp
,
592 struct hfsmount
*hfsmp
,
594 struct cat_desc
*descp
,
595 struct cat_attr
*attrp
,
596 struct cat_fork
*datafork
,
597 struct cat_fork
*rsrcfork
,
598 struct vfs_context
*ctx
)
600 struct attrlist
*attrlistp
= abp
->ab_attrlist
;
602 if (attrlistp
->commonattr
)
603 packcommonattr(abp
, hfsmp
, vp
, descp
, attrp
, ctx
);
605 if (attrlistp
->dirattr
&& S_ISDIR(attrp
->ca_mode
))
606 packdirattr(abp
, hfsmp
, vp
, descp
,attrp
);
608 if (attrlistp
->fileattr
&& !S_ISDIR(attrp
->ca_mode
))
609 packfileattr(abp
, hfsmp
, attrp
, datafork
, rsrcfork
, vp
);
613 mountpointname(struct mount
*mp
)
615 struct vfsstatfs
*vsfs
= vfs_statfs(mp
);
617 size_t namelength
= strlen(vsfs
->f_mntonname
);
625 * Look backwards through the name string, looking for
626 * the first slash encountered (which must precede the
627 * last part of the pathname).
629 for (c
= vsfs
->f_mntonname
+ namelength
- 1;
630 namelength
> 0; --c
, --namelength
) {
633 } else if (foundchars
) {
638 return vsfs
->f_mntonname
;
644 struct attrblock
*abp
,
646 const u_int8_t
*name
,
650 struct attrreference
* attr_refptr
;
653 u_int32_t attrlength
;
656 /* A cnode's name may be incorrect for the root of a mounted
657 * filesystem (it can be mounted on a different directory name
658 * than the name of the volume, such as "blah-1"). So for the
659 * root directory, it's best to return the last element of the
660 location where the volume's mounted:
662 if ((vp
!= NULL
) && vnode_isvroot(vp
) &&
663 (mpname
= mountpointname(vnode_mount(vp
)))) {
664 mpnamelen
= strlen(mpname
);
666 /* Trim off any trailing slashes: */
667 while ((mpnamelen
> 0) && (mpname
[mpnamelen
-1] == '/'))
670 /* If there's anything left, use it instead of the volume's name */
672 name
= (u_int8_t
*)mpname
;
681 varbufptr
= *abp
->ab_varbufpp
;
682 attr_refptr
= (struct attrreference
*)(*abp
->ab_attrbufpp
);
684 attrlength
= namelen
+ 1;
685 attr_refptr
->attr_dataoffset
= (char *)varbufptr
- (char *)attr_refptr
;
686 attr_refptr
->attr_length
= attrlength
;
687 (void) strncpy((char *)varbufptr
, (const char *) name
, attrlength
);
689 * Advance beyond the space just allocated and
690 * round up to the next 4-byte boundary:
692 varbufptr
= ((char *)varbufptr
) + attrlength
+ ((4 - (attrlength
& 3)) & 3);
695 *abp
->ab_attrbufpp
= attr_refptr
;
696 *abp
->ab_varbufpp
= varbufptr
;
701 struct attrblock
*abp
,
702 struct hfsmount
*hfsmp
,
704 struct cat_desc
* cdp
,
705 struct cat_attr
* cap
,
706 struct vfs_context
* ctx
)
708 attrgroup_t attr
= abp
->ab_attrlist
->commonattr
;
709 struct mount
*mp
= HFSTOVFS(hfsmp
);
710 void *attrbufptr
= *abp
->ab_attrbufpp
;
711 void *varbufptr
= *abp
->ab_varbufpp
;
712 boolean_t is_64_bit
= proc_is64bit(vfs_context_proc(ctx
));
716 if (attr
& (ATTR_CMN_OWNERID
| ATTR_CMN_GRPID
)) {
717 cuid
= kauth_cred_getuid(vfs_context_ucred(ctx
));
721 if (ATTR_CMN_NAME
& attr
) {
722 packnameattr(abp
, vp
, cdp
->cd_nameptr
, cdp
->cd_namelen
);
723 attrbufptr
= *abp
->ab_attrbufpp
;
724 varbufptr
= *abp
->ab_varbufpp
;
726 if (ATTR_CMN_DEVID
& attr
) {
727 *((dev_t
*)attrbufptr
) = hfsmp
->hfs_raw_dev
;
728 attrbufptr
= ((dev_t
*)attrbufptr
) + 1;
730 if (ATTR_CMN_FSID
& attr
) {
733 fsid
.val
[0] = hfsmp
->hfs_raw_dev
;
734 fsid
.val
[1] = vfs_typenum(mp
);
735 *((fsid_t
*)attrbufptr
) = fsid
;
736 attrbufptr
= ((fsid_t
*)attrbufptr
) + 1;
738 if (ATTR_CMN_OBJTYPE
& attr
) {
739 *((fsobj_type_t
*)attrbufptr
) = IFTOVT(cap
->ca_mode
);
740 attrbufptr
= ((fsobj_type_t
*)attrbufptr
) + 1;
742 if (ATTR_CMN_OBJTAG
& attr
) {
743 *((fsobj_tag_t
*)attrbufptr
) = VT_HFS
;
744 attrbufptr
= ((fsobj_tag_t
*)attrbufptr
) + 1;
747 * Exporting file IDs from HFS Plus:
749 * For "normal" files the c_fileid is the same value as the
750 * c_cnid. But for hard link files, they are different - the
751 * c_cnid belongs to the active directory entry (ie the link)
752 * and the c_fileid is for the actual inode (ie the data file).
754 * The stat call (getattr) will always return the c_fileid
755 * and Carbon APIs, which are hardlink-ignorant, will always
756 * receive the c_cnid (from getattrlist).
758 if (ATTR_CMN_OBJID
& attr
) {
759 ((fsobj_id_t
*)attrbufptr
)->fid_objno
= cdp
->cd_cnid
;
760 ((fsobj_id_t
*)attrbufptr
)->fid_generation
= 0;
761 attrbufptr
= ((fsobj_id_t
*)attrbufptr
) + 1;
763 if (ATTR_CMN_OBJPERMANENTID
& attr
) {
764 ((fsobj_id_t
*)attrbufptr
)->fid_objno
= cdp
->cd_cnid
;
765 ((fsobj_id_t
*)attrbufptr
)->fid_generation
= 0;
766 attrbufptr
= ((fsobj_id_t
*)attrbufptr
) + 1;
768 if (ATTR_CMN_PAROBJID
& attr
) {
769 ((fsobj_id_t
*)attrbufptr
)->fid_objno
= cdp
->cd_parentcnid
;
770 ((fsobj_id_t
*)attrbufptr
)->fid_generation
= 0;
771 attrbufptr
= ((fsobj_id_t
*)attrbufptr
) + 1;
773 if (ATTR_CMN_SCRIPT
& attr
) {
774 *((text_encoding_t
*)attrbufptr
) = cdp
->cd_encoding
;
775 attrbufptr
= ((text_encoding_t
*)attrbufptr
) + 1;
777 if (ATTR_CMN_CRTIME
& attr
) {
779 ((struct user64_timespec
*)attrbufptr
)->tv_sec
= cap
->ca_itime
;
780 ((struct user64_timespec
*)attrbufptr
)->tv_nsec
= 0;
781 attrbufptr
= ((struct user64_timespec
*)attrbufptr
) + 1;
784 ((struct user32_timespec
*)attrbufptr
)->tv_sec
= cap
->ca_itime
;
785 ((struct user32_timespec
*)attrbufptr
)->tv_nsec
= 0;
786 attrbufptr
= ((struct user32_timespec
*)attrbufptr
) + 1;
789 if (ATTR_CMN_MODTIME
& attr
) {
791 ((struct user64_timespec
*)attrbufptr
)->tv_sec
= cap
->ca_mtime
;
792 ((struct user64_timespec
*)attrbufptr
)->tv_nsec
= 0;
793 attrbufptr
= ((struct user64_timespec
*)attrbufptr
) + 1;
796 ((struct user32_timespec
*)attrbufptr
)->tv_sec
= cap
->ca_mtime
;
797 ((struct user32_timespec
*)attrbufptr
)->tv_nsec
= 0;
798 attrbufptr
= ((struct user32_timespec
*)attrbufptr
) + 1;
801 if (ATTR_CMN_CHGTIME
& attr
) {
803 ((struct user64_timespec
*)attrbufptr
)->tv_sec
= cap
->ca_ctime
;
804 ((struct user64_timespec
*)attrbufptr
)->tv_nsec
= 0;
805 attrbufptr
= ((struct user64_timespec
*)attrbufptr
) + 1;
808 ((struct user32_timespec
*)attrbufptr
)->tv_sec
= cap
->ca_ctime
;
809 ((struct user32_timespec
*)attrbufptr
)->tv_nsec
= 0;
810 attrbufptr
= ((struct user32_timespec
*)attrbufptr
) + 1;
813 if (ATTR_CMN_ACCTIME
& attr
) {
815 ((struct user64_timespec
*)attrbufptr
)->tv_sec
= cap
->ca_atime
;
816 ((struct user64_timespec
*)attrbufptr
)->tv_nsec
= 0;
817 attrbufptr
= ((struct user64_timespec
*)attrbufptr
) + 1;
820 ((struct user32_timespec
*)attrbufptr
)->tv_sec
= cap
->ca_atime
;
821 ((struct user32_timespec
*)attrbufptr
)->tv_nsec
= 0;
822 attrbufptr
= ((struct user32_timespec
*)attrbufptr
) + 1;
825 if (ATTR_CMN_BKUPTIME
& attr
) {
827 ((struct user64_timespec
*)attrbufptr
)->tv_sec
= cap
->ca_btime
;
828 ((struct user64_timespec
*)attrbufptr
)->tv_nsec
= 0;
829 attrbufptr
= ((struct user64_timespec
*)attrbufptr
) + 1;
832 ((struct user32_timespec
*)attrbufptr
)->tv_sec
= cap
->ca_btime
;
833 ((struct user32_timespec
*)attrbufptr
)->tv_nsec
= 0;
834 attrbufptr
= ((struct user32_timespec
*)attrbufptr
) + 1;
837 if (ATTR_CMN_FNDRINFO
& attr
) {
838 u_int8_t
*finfo
= NULL
;
839 bcopy(&cap
->ca_finderinfo
, attrbufptr
, sizeof(u_int8_t
) * 32);
840 finfo
= (u_int8_t
*)attrbufptr
;
842 /* Don't expose a symlink's private type/creator. */
843 if (S_ISLNK(cap
->ca_mode
)) {
844 struct FndrFileInfo
*fip
;
846 fip
= (struct FndrFileInfo
*)attrbufptr
;
851 /* advance 16 bytes into the attrbuf */
854 /* also don't expose the date_added or write_gen_counter fields */
855 if (S_ISREG(cap
->ca_mode
) || S_ISLNK(cap
->ca_mode
)) {
856 struct FndrExtendedFileInfo
*extinfo
= (struct FndrExtendedFileInfo
*)finfo
;
857 extinfo
->document_id
= 0;
858 extinfo
->date_added
= 0;
859 extinfo
->write_gen_counter
= 0;
861 else if (S_ISDIR(cap
->ca_mode
)) {
862 struct FndrExtendedDirInfo
*extinfo
= (struct FndrExtendedDirInfo
*)finfo
;
863 extinfo
->document_id
= 0;
864 extinfo
->date_added
= 0;
865 extinfo
->write_gen_counter
= 0;
868 attrbufptr
= (char *)attrbufptr
+ sizeof(u_int8_t
) * 32;
870 if (ATTR_CMN_OWNERID
& attr
) {
871 uid_t nuid
= cap
->ca_uid
;
874 if (((unsigned int)vfs_flags(HFSTOVFS(hfsmp
))) & MNT_UNKNOWNPERMISSIONS
)
876 else if (nuid
== UNKNOWNUID
)
880 *((uid_t
*)attrbufptr
) = nuid
;
881 attrbufptr
= ((uid_t
*)attrbufptr
) + 1;
883 if (ATTR_CMN_GRPID
& attr
) {
884 gid_t ngid
= cap
->ca_gid
;
887 gid_t cgid
= kauth_cred_getgid(vfs_context_ucred(ctx
));
888 if (((unsigned int)vfs_flags(HFSTOVFS(hfsmp
))) & MNT_UNKNOWNPERMISSIONS
)
890 else if (ngid
== UNKNOWNUID
)
894 *((gid_t
*)attrbufptr
) = ngid
;
895 attrbufptr
= ((gid_t
*)attrbufptr
) + 1;
897 if (ATTR_CMN_ACCESSMASK
& attr
) {
899 * [2856576] Since we are dynamically changing the owner, also
900 * effectively turn off the set-user-id and set-group-id bits,
901 * just like chmod(2) would when changing ownership. This prevents
902 * a security hole where set-user-id programs run as whoever is
903 * logged on (or root if nobody is logged in yet!)
905 *((u_int32_t
*)attrbufptr
) = (cap
->ca_uid
== UNKNOWNUID
) ?
906 cap
->ca_mode
& ~(S_ISUID
| S_ISGID
) : cap
->ca_mode
;
907 attrbufptr
= ((u_int32_t
*)attrbufptr
) + 1;
909 if (ATTR_CMN_FLAGS
& attr
) {
910 *((u_int32_t
*)attrbufptr
) = cap
->ca_flags
;
911 attrbufptr
= ((u_int32_t
*)attrbufptr
) + 1;
913 if (ATTR_CMN_USERACCESS
& attr
) {
914 u_int32_t user_access
;
916 /* Take the long path when we have an ACL */
917 if ((vp
!= NULLVP
) && (cap
->ca_recflags
& kHFSHasSecurityMask
)) {
918 user_access
= hfs_real_user_access(vp
, abp
->ab_context
);
920 user_access
= DerivePermissionSummary(cap
->ca_uid
, cap
->ca_gid
,
921 cap
->ca_mode
, mp
, vfs_context_ucred(ctx
), 0);
923 /* Also consider READ-ONLY file system. */
924 if (vfs_flags(mp
) & MNT_RDONLY
) {
925 user_access
&= ~W_OK
;
927 /* Locked objects are not writable either */
928 if ((cap
->ca_flags
& UF_IMMUTABLE
) && (vfs_context_suser(abp
->ab_context
) != 0))
929 user_access
&= ~W_OK
;
930 if ((cap
->ca_flags
& SF_IMMUTABLE
) && (vfs_context_suser(abp
->ab_context
) == 0))
931 user_access
&= ~W_OK
;
933 *((u_int32_t
*)attrbufptr
) = user_access
;
934 attrbufptr
= ((u_int32_t
*)attrbufptr
) + 1;
936 if (ATTR_CMN_FILEID
& attr
) {
937 *((u_int64_t
*)attrbufptr
) = cap
->ca_fileid
;
938 attrbufptr
= ((u_int64_t
*)attrbufptr
) + 1;
940 if (ATTR_CMN_PARENTID
& attr
) {
941 *((u_int64_t
*)attrbufptr
) = cdp
->cd_parentcnid
;
942 attrbufptr
= ((u_int64_t
*)attrbufptr
) + 1;
945 *abp
->ab_attrbufpp
= attrbufptr
;
946 *abp
->ab_varbufpp
= varbufptr
;
951 struct attrblock
*abp
,
952 struct hfsmount
*hfsmp
,
954 struct cat_desc
* descp
,
955 struct cat_attr
* cattrp
)
957 attrgroup_t attr
= abp
->ab_attrlist
->dirattr
;
958 void *attrbufptr
= *abp
->ab_attrbufpp
;
962 * The DIR_LINKCOUNT is the count of real directory hard links.
963 * (i.e. its not the sum of the implied "." and ".." references
964 * typically used in stat's st_nlink field)
966 if (ATTR_DIR_LINKCOUNT
& attr
) {
967 *((u_int32_t
*)attrbufptr
) = cattrp
->ca_linkcount
;
968 attrbufptr
= ((u_int32_t
*)attrbufptr
) + 1;
970 if (ATTR_DIR_ENTRYCOUNT
& attr
) {
971 entries
= cattrp
->ca_entries
;
973 if (descp
->cd_parentcnid
== kHFSRootParentID
) {
974 if (hfsmp
->hfs_private_desc
[FILE_HARDLINKS
].cd_cnid
!= 0)
975 --entries
; /* hide private dir */
976 if (hfsmp
->hfs_private_desc
[DIR_HARDLINKS
].cd_cnid
!= 0)
977 --entries
; /* hide private dir */
979 ((hfsmp
->vcbAtrb
& kHFSVolumeJournaledMask
) &&
980 (hfsmp
->hfs_flags
& HFS_READ_ONLY
)))
981 entries
-= 2; /* hide the journal files */
984 *((u_int32_t
*)attrbufptr
) = entries
;
985 attrbufptr
= ((u_int32_t
*)attrbufptr
) + 1;
987 if (ATTR_DIR_MOUNTSTATUS
& attr
) {
988 if (vp
!= NULL
&& vnode_mountedhere(vp
) != NULL
)
989 *((u_int32_t
*)attrbufptr
) = DIR_MNTSTATUS_MNTPOINT
;
991 *((u_int32_t
*)attrbufptr
) = 0;
992 attrbufptr
= ((u_int32_t
*)attrbufptr
) + 1;
994 *abp
->ab_attrbufpp
= attrbufptr
;
999 struct attrblock
*abp
,
1000 struct hfsmount
*hfsmp
,
1001 struct cat_attr
*cattrp
,
1002 struct cat_fork
*datafork
,
1003 struct cat_fork
*rsrcfork
,
1006 #if !HFS_COMPRESSION
1009 attrgroup_t attr
= abp
->ab_attrlist
->fileattr
;
1010 void *attrbufptr
= *abp
->ab_attrbufpp
;
1011 void *varbufptr
= *abp
->ab_varbufpp
;
1012 u_int32_t allocblksize
;
1014 allocblksize
= HFSTOVCB(hfsmp
)->blockSize
;
1016 off_t datasize
= datafork
->cf_size
;
1017 off_t totalsize
= datasize
+ rsrcfork
->cf_size
;
1019 int handle_compressed
;
1020 handle_compressed
= (cattrp
->ca_flags
& UF_COMPRESSED
);// && hfs_file_is_compressed(VTOC(vp), 1);
1022 if (handle_compressed
) {
1023 if (attr
& (ATTR_FILE_DATALENGTH
|ATTR_FILE_TOTALSIZE
)) {
1024 if ( 0 == hfs_uncompressed_size_of_compressed_file(hfsmp
, vp
, cattrp
->ca_fileid
, &datasize
, 1) ) { /* 1 == don't take the cnode lock */
1025 /* total size of a compressed file is just the data size */
1026 totalsize
= datasize
;
1032 if (ATTR_FILE_LINKCOUNT
& attr
) {
1033 *((u_int32_t
*)attrbufptr
) = cattrp
->ca_linkcount
;
1034 attrbufptr
= ((u_int32_t
*)attrbufptr
) + 1;
1036 if (ATTR_FILE_TOTALSIZE
& attr
) {
1037 *((off_t
*)attrbufptr
) = totalsize
;
1038 attrbufptr
= ((off_t
*)attrbufptr
) + 1;
1040 if (ATTR_FILE_ALLOCSIZE
& attr
) {
1041 *((off_t
*)attrbufptr
) =
1042 (off_t
)cattrp
->ca_blocks
* (off_t
)allocblksize
;
1043 attrbufptr
= ((off_t
*)attrbufptr
) + 1;
1045 if (ATTR_FILE_IOBLOCKSIZE
& attr
) {
1046 *((u_int32_t
*)attrbufptr
) = hfsmp
->hfs_logBlockSize
;
1047 attrbufptr
= ((u_int32_t
*)attrbufptr
) + 1;
1049 if (ATTR_FILE_CLUMPSIZE
& attr
) {
1050 *((u_int32_t
*)attrbufptr
) = hfsmp
->vcbClpSiz
;
1051 attrbufptr
= ((u_int32_t
*)attrbufptr
) + 1;
1053 if (ATTR_FILE_DEVTYPE
& attr
) {
1054 if (S_ISBLK(cattrp
->ca_mode
) || S_ISCHR(cattrp
->ca_mode
))
1055 *((u_int32_t
*)attrbufptr
) = (u_int32_t
)cattrp
->ca_rdev
;
1057 *((u_int32_t
*)attrbufptr
) = 0;
1058 attrbufptr
= ((u_int32_t
*)attrbufptr
) + 1;
1061 if (ATTR_FILE_DATALENGTH
& attr
) {
1062 *((off_t
*)attrbufptr
) = datasize
;
1063 attrbufptr
= ((off_t
*)attrbufptr
) + 1;
1067 /* fake the data fork size on a decmpfs compressed file to reflect the
1068 * uncompressed size. This ensures proper reading and copying of these files.
1069 * NOTE: we may need to get the vnode here because the vnode parameter
1070 * passed by hfs_vnop_readdirattr() may be null.
1073 if ( handle_compressed
) {
1074 if (attr
& ATTR_FILE_DATAALLOCSIZE
) {
1075 *((off_t
*)attrbufptr
) = (off_t
)rsrcfork
->cf_blocks
* (off_t
)allocblksize
;
1076 attrbufptr
= ((off_t
*)attrbufptr
) + 1;
1078 if (attr
& ATTR_FILE_RSRCLENGTH
) {
1079 *((off_t
*)attrbufptr
) = 0;
1080 attrbufptr
= ((off_t
*)attrbufptr
) + 1;
1082 if (attr
& ATTR_FILE_RSRCALLOCSIZE
) {
1083 *((off_t
*)attrbufptr
) = 0;
1084 attrbufptr
= ((off_t
*)attrbufptr
) + 1;
1090 if (ATTR_FILE_DATAALLOCSIZE
& attr
) {
1091 *((off_t
*)attrbufptr
) = (off_t
)datafork
->cf_blocks
* (off_t
)allocblksize
;
1092 attrbufptr
= ((off_t
*)attrbufptr
) + 1;
1094 if (ATTR_FILE_RSRCLENGTH
& attr
) {
1095 *((off_t
*)attrbufptr
) = rsrcfork
->cf_size
;
1096 attrbufptr
= ((off_t
*)attrbufptr
) + 1;
1098 if (ATTR_FILE_RSRCALLOCSIZE
& attr
) {
1099 *((off_t
*)attrbufptr
) = (off_t
)rsrcfork
->cf_blocks
* (off_t
)allocblksize
;
1100 attrbufptr
= ((off_t
*)attrbufptr
) + 1;
1103 *abp
->ab_attrbufpp
= attrbufptr
;
1104 *abp
->ab_varbufpp
= varbufptr
;
1108 * Calculate the total size of an attribute block.
1111 hfs_attrblksize(struct attrlist
*attrlist
)
1115 int sizeof_timespec
;
1116 boolean_t is_64_bit
= proc_is64bit(current_proc());
1119 sizeof_timespec
= sizeof(struct user64_timespec
);
1121 sizeof_timespec
= sizeof(struct user32_timespec
);
1123 hfs_assert((attrlist
->commonattr
& ~ATTR_CMN_VALIDMASK
) == 0);
1125 hfs_assert((attrlist
->volattr
& ~ATTR_VOL_VALIDMASK
) == 0);
1127 hfs_assert((attrlist
->dirattr
& ~ATTR_DIR_VALIDMASK
) == 0);
1129 hfs_assert((attrlist
->fileattr
& ~ATTR_FILE_VALIDMASK
) == 0);
1131 // disable this for build machines
1132 // it's not useful and will break every time we add new _CMNEXT_ bits
1133 // hfs_assert((attrlist->forkattr & ~ATTR_FORK_VALIDMASK) == 0);
1137 if ((a
= attrlist
->commonattr
) != 0) {
1138 if (a
& ATTR_CMN_NAME
) size
+= sizeof(struct attrreference
);
1139 if (a
& ATTR_CMN_DEVID
) size
+= sizeof(dev_t
);
1140 if (a
& ATTR_CMN_FSID
) size
+= sizeof(fsid_t
);
1141 if (a
& ATTR_CMN_OBJTYPE
) size
+= sizeof(fsobj_type_t
);
1142 if (a
& ATTR_CMN_OBJTAG
) size
+= sizeof(fsobj_tag_t
);
1143 if (a
& ATTR_CMN_OBJID
) size
+= sizeof(fsobj_id_t
);
1144 if (a
& ATTR_CMN_OBJPERMANENTID
) size
+= sizeof(fsobj_id_t
);
1145 if (a
& ATTR_CMN_PAROBJID
) size
+= sizeof(fsobj_id_t
);
1146 if (a
& ATTR_CMN_SCRIPT
) size
+= sizeof(text_encoding_t
);
1147 if (a
& ATTR_CMN_CRTIME
) size
+= sizeof_timespec
;
1148 if (a
& ATTR_CMN_MODTIME
) size
+= sizeof_timespec
;
1149 if (a
& ATTR_CMN_CHGTIME
) size
+= sizeof_timespec
;
1150 if (a
& ATTR_CMN_ACCTIME
) size
+= sizeof_timespec
;
1151 if (a
& ATTR_CMN_BKUPTIME
) size
+= sizeof_timespec
;
1152 if (a
& ATTR_CMN_FNDRINFO
) size
+= 32 * sizeof(u_int8_t
);
1153 if (a
& ATTR_CMN_OWNERID
) size
+= sizeof(uid_t
);
1154 if (a
& ATTR_CMN_GRPID
) size
+= sizeof(gid_t
);
1155 if (a
& ATTR_CMN_ACCESSMASK
) size
+= sizeof(u_int32_t
);
1156 if (a
& ATTR_CMN_FLAGS
) size
+= sizeof(u_int32_t
);
1157 if (a
& ATTR_CMN_USERACCESS
) size
+= sizeof(u_int32_t
);
1158 if (a
& ATTR_CMN_FILEID
) size
+= sizeof(u_int64_t
);
1159 if (a
& ATTR_CMN_PARENTID
) size
+= sizeof(u_int64_t
);
1161 if ((a
= attrlist
->dirattr
) != 0) {
1162 if (a
& ATTR_DIR_LINKCOUNT
) size
+= sizeof(u_int32_t
);
1163 if (a
& ATTR_DIR_ENTRYCOUNT
) size
+= sizeof(u_int32_t
);
1164 if (a
& ATTR_DIR_MOUNTSTATUS
) size
+= sizeof(u_int32_t
);
1166 if ((a
= attrlist
->fileattr
) != 0) {
1167 if (a
& ATTR_FILE_LINKCOUNT
) size
+= sizeof(u_int32_t
);
1168 if (a
& ATTR_FILE_TOTALSIZE
) size
+= sizeof(off_t
);
1169 if (a
& ATTR_FILE_ALLOCSIZE
) size
+= sizeof(off_t
);
1170 if (a
& ATTR_FILE_IOBLOCKSIZE
) size
+= sizeof(u_int32_t
);
1171 if (a
& ATTR_FILE_CLUMPSIZE
) size
+= sizeof(u_int32_t
);
1172 if (a
& ATTR_FILE_DEVTYPE
) size
+= sizeof(u_int32_t
);
1173 if (a
& ATTR_FILE_DATALENGTH
) size
+= sizeof(off_t
);
1174 if (a
& ATTR_FILE_DATAALLOCSIZE
) size
+= sizeof(off_t
);
1175 if (a
& ATTR_FILE_RSRCLENGTH
) size
+= sizeof(off_t
);
1176 if (a
& ATTR_FILE_RSRCALLOCSIZE
) size
+= sizeof(off_t
);
1182 #define KAUTH_DIR_WRITE_RIGHTS (KAUTH_VNODE_ACCESS | KAUTH_VNODE_ADD_FILE | \
1183 KAUTH_VNODE_ADD_SUBDIRECTORY | \
1184 KAUTH_VNODE_DELETE_CHILD)
1186 #define KAUTH_DIR_READ_RIGHTS (KAUTH_VNODE_ACCESS | KAUTH_VNODE_LIST_DIRECTORY)
1188 #define KAUTH_DIR_EXECUTE_RIGHTS (KAUTH_VNODE_ACCESS | KAUTH_VNODE_SEARCH)
1190 #define KAUTH_FILE_WRITE_RIGHTS (KAUTH_VNODE_ACCESS | KAUTH_VNODE_WRITE_DATA)
1192 #define KAUTH_FILE_READRIGHTS (KAUTH_VNODE_ACCESS | KAUTH_VNODE_READ_DATA)
1194 #define KAUTH_FILE_EXECUTE_RIGHTS (KAUTH_VNODE_ACCESS | KAUTH_VNODE_EXECUTE)
1198 * Compute the same [expensive] user_access value as getattrlist does
1201 hfs_real_user_access(vnode_t vp
, vfs_context_t ctx
)
1203 u_int32_t user_access
= 0;
1205 if (vnode_isdir(vp
)) {
1206 if (vnode_authorize(vp
, NULLVP
, KAUTH_DIR_WRITE_RIGHTS
, ctx
) == 0)
1207 user_access
|= W_OK
;
1208 if (vnode_authorize(vp
, NULLVP
, KAUTH_DIR_READ_RIGHTS
, ctx
) == 0)
1209 user_access
|= R_OK
;
1210 if (vnode_authorize(vp
, NULLVP
, KAUTH_DIR_EXECUTE_RIGHTS
, ctx
) == 0)
1211 user_access
|= X_OK
;
1213 if (vnode_authorize(vp
, NULLVP
, KAUTH_FILE_WRITE_RIGHTS
, ctx
) == 0)
1214 user_access
|= W_OK
;
1215 if (vnode_authorize(vp
, NULLVP
, KAUTH_FILE_READRIGHTS
, ctx
) == 0)
1216 user_access
|= R_OK
;
1217 if (vnode_authorize(vp
, NULLVP
, KAUTH_FILE_EXECUTE_RIGHTS
, ctx
) == 0)
1218 user_access
|= X_OK
;
1220 return (user_access
);
1225 DerivePermissionSummary(uid_t obj_uid
, gid_t obj_gid
, mode_t obj_mode
,
1226 struct mount
*mp
, kauth_cred_t cred
, __unused
struct proc
*p
)
1228 u_int32_t permissions
;
1230 if (obj_uid
== UNKNOWNUID
)
1231 obj_uid
= kauth_cred_getuid(cred
);
1233 /* User id 0 (root) always gets access. */
1234 if (!suser(cred
, NULL
)) {
1235 permissions
= R_OK
| W_OK
| X_OK
;
1239 /* Otherwise, check the owner. */
1240 if (hfs_owner_rights(VFSTOHFS(mp
), obj_uid
, cred
, NULL
, false) == 0) {
1241 permissions
= ((u_int32_t
)obj_mode
& S_IRWXU
) >> 6;
1245 /* Otherwise, check the groups. */
1246 if (! (((unsigned int)vfs_flags(mp
)) & MNT_UNKNOWNPERMISSIONS
)) {
1249 if (kauth_cred_ismember_gid(cred
, obj_gid
, &is_member
) == 0 && is_member
) {
1250 permissions
= ((u_int32_t
)obj_mode
& S_IRWXG
) >> 3;
1255 /* Otherwise, settle for 'others' access. */
1256 permissions
= (u_int32_t
)obj_mode
& S_IRWXO
;
1259 return (permissions
);
1264 * ===========================================================================
1265 * Support functions for filling up a vnode_attr structure based on attributes
1267 * ===========================================================================
1270 get_vattr_data_for_attrs(struct attrlist
*alp
, struct vnode_attr
*vap
,
1271 struct hfsmount
*hfsmp
, struct vnode
*vp
, struct cat_desc
*descp
,
1272 struct cat_attr
*atrp
, struct cat_fork
*datafork
, struct cat_fork
*rsrcfork
,
1275 if (alp
->commonattr
)
1276 vattr_data_for_common_attrs(alp
, vap
, hfsmp
, vp
, descp
, atrp
,
1279 if (alp
->dirattr
&& S_ISDIR(atrp
->ca_mode
))
1280 vattr_data_for_dir_attrs(alp
, vap
, hfsmp
, vp
, descp
, atrp
);
1282 if (alp
->fileattr
&& !S_ISDIR(atrp
->ca_mode
)) {
1283 vattr_data_for_file_attrs(alp
, vap
, hfsmp
, atrp
, datafork
,
1289 copy_name_attr(struct vnode_attr
*vap
, struct vnode
*vp
, const u_int8_t
*name
,
1294 u_int32_t attrlength
;
1297 /* A cnode's name may be incorrect for the root of a mounted
1298 * filesystem (it can be mounted on a different directory name
1299 * than the name of the volume, such as "blah-1"). So for the
1300 * root directory, it's best to return the last element of the
1301 location where the volume's mounted:
1303 if ((vp
!= NULL
) && vnode_isvroot(vp
) &&
1304 (mpname
= mountpointname(vnode_mount(vp
)))) {
1305 mpnamelen
= strlen(mpname
);
1307 /* Trim off any trailing slashes: */
1308 while ((mpnamelen
> 0) && (mpname
[mpnamelen
-1] == '/'))
1311 /* If there's anything left, use it instead of the volume's name */
1312 if (mpnamelen
> 0) {
1313 name
= (u_int8_t
*)mpname
;
1314 namelen
= mpnamelen
;
1323 attrlength
= namelen
+ 1;
1324 (void) strncpy((char *)vap
->va_name
, (const char *) name
, attrlength
);
1326 * round upto 8 and zero out the rounded up bytes.
1328 attrlength
= min(kHFSPlusMaxFileNameBytes
, ((attrlength
+ 7) & ~0x07));
1329 bzero(vap
->va_name
+ attrlength
, kHFSPlusMaxFileNameBytes
- attrlength
);
1333 vattr_data_for_common_attrs( struct attrlist
*alp
, struct vnode_attr
*vap
,
1334 struct hfsmount
*hfsmp
, struct vnode
*vp
, struct cat_desc
*cdp
,
1335 struct cat_attr
*cap
, vfs_context_t ctx
)
1337 attrgroup_t attr
= alp
->commonattr
;
1338 struct mount
*mp
= HFSTOVFS(hfsmp
);
1342 if (attr
& (ATTR_CMN_OWNERID
| ATTR_CMN_GRPID
)) {
1343 cuid
= kauth_cred_getuid(vfs_context_ucred(ctx
));
1347 if (ATTR_CMN_NAME
& attr
) {
1349 copy_name_attr(vap
, vp
, cdp
->cd_nameptr
,
1351 VATTR_SET_SUPPORTED(vap
, va_name
);
1353 VATTR_CLEAR_SUPPORTED(vap
, va_name
);
1357 if (ATTR_CMN_DEVID
& attr
) {
1358 vap
->va_devid
= hfsmp
->hfs_raw_dev
;
1359 VATTR_SET_SUPPORTED(vap
, va_devid
);
1362 if (ATTR_CMN_FSID
& attr
) {
1363 vap
->va_fsid64
.val
[0] = hfsmp
->hfs_raw_dev
;
1364 vap
->va_fsid64
.val
[1] = vfs_typenum(mp
);
1365 VATTR_SET_SUPPORTED(vap
, va_fsid64
);
1368 * We always provide the objtype even if not asked because VFS helper
1369 * functions depend on knowing the object's type.
1371 vap
->va_objtype
= IFTOVT(cap
->ca_mode
);
1372 VATTR_SET_SUPPORTED(vap
, va_objtype
);
1374 if (ATTR_CMN_OBJTAG
& attr
) {
1375 vap
->va_objtag
= VT_HFS
;
1376 VATTR_SET_SUPPORTED(vap
, va_objtag
);
1379 * Exporting file IDs from HFS Plus:
1381 * For "normal" files the c_fileid is the same value as the
1382 * c_cnid. But for hard link files, they are different - the
1383 * c_cnid belongs to the active directory entry (ie the link)
1384 * and the c_fileid is for the actual inode (ie the data file).
1386 * The stat call (getattr) will always return the c_fileid
1387 * and Carbon APIs, which are hardlink-ignorant, will always
1388 * receive the c_cnid (from getattrlist).
1390 if ((ATTR_CMN_OBJID
& attr
) ||
1391 (ATTR_CMN_OBJPERMANENTID
& attr
)) {
1392 vap
->va_linkid
= cdp
->cd_cnid
;
1393 VATTR_SET_SUPPORTED(vap
, va_linkid
);
1396 if (ATTR_CMN_PAROBJID
& attr
) {
1397 vap
->va_parentid
= cdp
->cd_parentcnid
;
1398 VATTR_SET_SUPPORTED(vap
, va_parentid
);
1401 if (ATTR_CMN_SCRIPT
& attr
) {
1402 vap
->va_encoding
= cdp
->cd_encoding
;
1403 VATTR_SET_SUPPORTED(vap
, va_encoding
);
1406 if (ATTR_CMN_CRTIME
& attr
) {
1407 vap
->va_create_time
.tv_sec
= cap
->ca_itime
;
1408 vap
->va_create_time
.tv_nsec
= 0;
1409 VATTR_SET_SUPPORTED(vap
, va_create_time
);
1412 if (ATTR_CMN_MODTIME
& attr
) {
1413 vap
->va_modify_time
.tv_sec
= cap
->ca_mtime
;
1414 vap
->va_modify_time
.tv_nsec
= 0;
1415 VATTR_SET_SUPPORTED(vap
, va_modify_time
);
1418 if (ATTR_CMN_CHGTIME
& attr
) {
1419 vap
->va_change_time
.tv_sec
= cap
->ca_ctime
;
1420 vap
->va_change_time
.tv_nsec
= 0;
1421 VATTR_SET_SUPPORTED(vap
, va_change_time
);
1424 if (ATTR_CMN_ACCTIME
& attr
) {
1425 vap
->va_access_time
.tv_sec
= cap
->ca_atime
;
1426 vap
->va_access_time
.tv_nsec
= 0;
1427 VATTR_SET_SUPPORTED(vap
, va_access_time
);
1430 if (ATTR_CMN_BKUPTIME
& attr
) {
1431 vap
->va_backup_time
.tv_sec
= cap
->ca_btime
;
1432 vap
->va_backup_time
.tv_nsec
= 0;
1433 VATTR_SET_SUPPORTED(vap
, va_backup_time
);
1436 if (ATTR_CMN_FNDRINFO
& attr
) {
1437 u_int8_t
*finfo
= NULL
;
1439 bcopy(&cap
->ca_finderinfo
, &vap
->va_finderinfo
[0],
1440 sizeof(u_int8_t
) * 32);
1441 finfo
= (u_int8_t
*)(&vap
->va_finderinfo
[0]);
1443 /* Don't expose a symlink's private type/creator. */
1444 if (S_ISLNK(cap
->ca_mode
)) {
1445 struct FndrFileInfo
*fip
;
1447 fip
= (struct FndrFileInfo
*)finfo
;
1452 /* advance 16 bytes into the attrbuf */
1455 /* also don't expose the date_added or write_gen_counter fields */
1456 if (S_ISREG(cap
->ca_mode
) || S_ISLNK(cap
->ca_mode
)) {
1457 struct FndrExtendedFileInfo
*extinfo
=
1458 (struct FndrExtendedFileInfo
*)finfo
;
1459 extinfo
->document_id
= 0;
1460 extinfo
->date_added
= 0;
1461 extinfo
->write_gen_counter
= 0;
1462 } else if (S_ISDIR(cap
->ca_mode
)) {
1463 struct FndrExtendedDirInfo
*extinfo
=
1464 (struct FndrExtendedDirInfo
*)finfo
;
1465 extinfo
->document_id
= 0;
1466 extinfo
->date_added
= 0;
1467 extinfo
->write_gen_counter
= 0;
1470 VATTR_SET_SUPPORTED(vap
, va_finderinfo
);
1473 if (ATTR_CMN_OWNERID
& attr
) {
1474 uid_t nuid
= cap
->ca_uid
;
1477 if (((unsigned int)vfs_flags(HFSTOVFS(hfsmp
))) & MNT_UNKNOWNPERMISSIONS
)
1479 else if (nuid
== UNKNOWNUID
)
1484 VATTR_SET_SUPPORTED(vap
, va_uid
);
1487 if (ATTR_CMN_GRPID
& attr
) {
1488 gid_t ngid
= cap
->ca_gid
;
1491 gid_t cgid
= kauth_cred_getgid(vfs_context_ucred(ctx
));
1492 if (((unsigned int)vfs_flags(HFSTOVFS(hfsmp
))) & MNT_UNKNOWNPERMISSIONS
)
1494 else if (ngid
== UNKNOWNUID
)
1499 VATTR_SET_SUPPORTED(vap
, va_gid
);
1502 if (ATTR_CMN_ACCESSMASK
& attr
) {
1505 * [2856576] Since we are dynamically changing the owner, also
1506 * effectively turn off the set-user-id and set-group-id bits,
1507 * just like chmod(2) would when changing ownership. This prevents
1508 * a security hole where set-user-id programs run as whoever is
1509 * logged on (or root if nobody is logged in yet!)
1511 nmode
= (cap
->ca_uid
== UNKNOWNUID
) ?
1512 cap
->ca_mode
& ~(S_ISUID
| S_ISGID
) : cap
->ca_mode
;
1514 vap
->va_mode
= nmode
;
1515 VATTR_SET_SUPPORTED(vap
, va_mode
);
1518 if (ATTR_CMN_FLAGS
& attr
) {
1519 vap
->va_flags
= cap
->ca_flags
;
1520 VATTR_SET_SUPPORTED(vap
, va_flags
);
1523 if (ATTR_CMN_GEN_COUNT
& attr
) {
1524 vap
->va_write_gencount
= hfs_get_gencount_from_blob(
1525 (const uint8_t *)cap
->ca_finderinfo
, cap
->ca_mode
);
1526 VATTR_SET_SUPPORTED(vap
, va_write_gencount
);
1529 if (ATTR_CMN_DOCUMENT_ID
& attr
) {
1530 vap
->va_document_id
= hfs_get_document_id_from_blob(
1531 (const uint8_t *)cap
->ca_finderinfo
, cap
->ca_mode
);
1532 VATTR_SET_SUPPORTED(vap
, va_document_id
);
1535 if (ATTR_CMN_USERACCESS
& attr
) {
1536 u_int32_t user_access
;
1538 /* Take the long path when we have an ACL */
1539 if ((vp
!= NULLVP
) && (cap
->ca_recflags
& kHFSHasSecurityMask
)) {
1540 user_access
= hfs_real_user_access(vp
, ctx
);
1542 user_access
= DerivePermissionSummary(cap
->ca_uid
, cap
->ca_gid
,
1543 cap
->ca_mode
, mp
, vfs_context_ucred(ctx
), 0);
1545 /* Also consider READ-ONLY file system. */
1546 if (vfs_flags(mp
) & MNT_RDONLY
) {
1547 user_access
&= ~W_OK
;
1549 /* Locked objects are not writable either */
1550 if ((cap
->ca_flags
& UF_IMMUTABLE
) && (vfs_context_suser(ctx
) != 0))
1551 user_access
&= ~W_OK
;
1552 if ((cap
->ca_flags
& SF_IMMUTABLE
) && (vfs_context_suser(ctx
) == 0))
1553 user_access
&= ~W_OK
;
1555 vap
->va_user_access
= user_access
;
1556 VATTR_SET_SUPPORTED(vap
, va_user_access
);
1560 * Right now the best we can do is tell if we *don't* have extended
1561 * security (like hfs_vnop_getattr).
1563 if (ATTR_CMN_EXTENDED_SECURITY
& attr
) {
1564 if (!(cap
->ca_recflags
& kHFSHasSecurityMask
)) {
1565 vap
->va_acl
= (kauth_acl_t
) KAUTH_FILESEC_NONE
;
1566 VATTR_SET_SUPPORTED(vap
, va_acl
);
1570 if (ATTR_CMN_FILEID
& attr
) {
1571 vap
->va_fileid
= cap
->ca_fileid
;
1572 VATTR_SET_SUPPORTED(vap
, va_fileid
);
1575 if (ATTR_CMN_PARENTID
& attr
) {
1576 vap
->va_parentid
= cdp
->cd_parentcnid
;
1577 VATTR_SET_SUPPORTED(vap
, va_parentid
);
1580 if (ATTR_CMN_ADDEDTIME
& attr
) {
1581 if (cap
->ca_recflags
& kHFSHasDateAddedMask
) {
1582 vap
->va_addedtime
.tv_sec
= hfs_get_dateadded_from_blob(
1583 (const uint8_t *)cap
->ca_finderinfo
, cap
->ca_mode
);
1584 vap
->va_addedtime
.tv_nsec
= 0;
1585 VATTR_SET_SUPPORTED(vap
, va_addedtime
);
1591 vattr_data_for_dir_attrs(struct attrlist
*alp
, struct vnode_attr
*vap
,
1592 struct hfsmount
*hfsmp
, struct vnode
*vp
, struct cat_desc
* descp
,
1593 struct cat_attr
* cattrp
)
1595 attrgroup_t attr
= alp
->dirattr
;
1599 * The DIR_LINKCOUNT is the count of real directory hard links.
1600 * (i.e. its not the sum of the implied "." and ".." references
1601 * typically used in stat's st_nlink field)
1603 if (ATTR_DIR_LINKCOUNT
& attr
) {
1604 vap
->va_dirlinkcount
= cattrp
->ca_linkcount
;
1605 VATTR_SET_SUPPORTED(vap
, va_dirlinkcount
);
1607 if (ATTR_DIR_ENTRYCOUNT
& attr
) {
1608 entries
= cattrp
->ca_entries
;
1610 if (descp
->cd_parentcnid
== kHFSRootParentID
) {
1611 if (hfsmp
->hfs_private_desc
[FILE_HARDLINKS
].cd_cnid
!= 0)
1612 --entries
; /* hide private dir */
1613 if (hfsmp
->hfs_private_desc
[DIR_HARDLINKS
].cd_cnid
!= 0)
1614 --entries
; /* hide private dir */
1616 ((hfsmp
->vcbAtrb
& kHFSVolumeJournaledMask
) &&
1617 (hfsmp
->hfs_flags
& HFS_READ_ONLY
)))
1618 entries
-= 2; /* hide the journal files */
1621 vap
->va_nchildren
= entries
;
1622 VATTR_SET_SUPPORTED(vap
, va_nchildren
);
1625 if (ATTR_DIR_MOUNTSTATUS
& attr
) {
1627 * There is not vnode_attr for mount point status.
1628 * XXX. Should there be ?
1630 u_int32_t mstatus
= 0;
1632 if (vp
!= NULL
&& vnode_mountedhere(vp
) != NULL
)
1633 mstatus
= DIR_MNTSTATUS_MNTPOINT
;
1638 vattr_data_for_file_attrs(struct attrlist
*alp
, struct vnode_attr
*vap
,
1639 struct hfsmount
*hfsmp
, struct cat_attr
*cattrp
, struct cat_fork
*datafork
,
1640 struct cat_fork
*rsrcfork
, struct vnode
*vp
)
1642 #if !HFS_COMPRESSION
1645 attrgroup_t attr
= alp
->fileattr
;
1646 off_t da_size
, rsrc_len
, rsrc_alloc
;
1647 u_int32_t allocblksize
;
1649 allocblksize
= HFSTOVCB(hfsmp
)->blockSize
;
1651 off_t datasize
= datafork
->cf_size
;
1652 off_t totalsize
= datasize
+ rsrcfork
->cf_size
;
1654 int handle_compressed
;
1655 handle_compressed
= (cattrp
->ca_flags
& UF_COMPRESSED
);// && hfs_file_is_compressed(VTOC(vp), 1);
1657 if (handle_compressed
) {
1658 if (attr
& (ATTR_FILE_DATALENGTH
|ATTR_FILE_TOTALSIZE
)) {
1659 if ( 0 == hfs_uncompressed_size_of_compressed_file(hfsmp
, vp
, cattrp
->ca_fileid
, &datasize
, 1) ) { /* 1 == don't take the cnode lock */
1660 /* total size of a compressed file is just the data size */
1661 totalsize
= datasize
;
1667 if (ATTR_FILE_LINKCOUNT
& attr
) {
1668 vap
->va_nlink
= cattrp
->ca_linkcount
;
1669 VATTR_SET_SUPPORTED(vap
, va_nlink
);
1671 if (ATTR_FILE_TOTALSIZE
& attr
) {
1672 VATTR_RETURN(vap
, va_total_size
, totalsize
);
1674 if (ATTR_FILE_ALLOCSIZE
& attr
) {
1675 VATTR_RETURN(vap
, va_total_alloc
,
1676 (off_t
)cattrp
->ca_blocks
* (off_t
)allocblksize
);
1678 if (ATTR_FILE_IOBLOCKSIZE
& attr
) {
1679 VATTR_RETURN(vap
, va_iosize
, hfsmp
->hfs_logBlockSize
);
1682 /* ATTR_FILE_CLUMPSIZE is obsolete */
1684 if (ATTR_FILE_DEVTYPE
& attr
) {
1687 if (S_ISBLK(cattrp
->ca_mode
) || S_ISCHR(cattrp
->ca_mode
))
1688 dev
= (u_int32_t
)cattrp
->ca_rdev
;
1690 VATTR_RETURN(vap
, va_rdev
, dev
);
1693 if (ATTR_FILE_DATALENGTH
& attr
) {
1694 VATTR_RETURN(vap
, va_data_size
, datasize
);
1697 /* fake the data fork size on a decmpfs compressed file to reflect the
1698 * uncompressed size. This ensures proper reading and copying of these
1700 * NOTE: we may need to get the vnode here because the vnode parameter
1701 * passed by hfs_vnop_readdirattr() may be null.
1704 if (handle_compressed
) {
1705 da_size
= (off_t
)rsrcfork
->cf_blocks
* (off_t
)allocblksize
;
1712 da_size
= (off_t
)datafork
->cf_blocks
* (off_t
)allocblksize
;
1713 rsrc_len
= rsrcfork
->cf_size
;
1714 rsrc_alloc
= (off_t
)rsrcfork
->cf_blocks
* (off_t
)allocblksize
;
1717 if (ATTR_FILE_DATAALLOCSIZE
& attr
) {
1718 VATTR_RETURN(vap
, va_data_alloc
, da_size
);
1721 if (ATTR_FILE_RSRCLENGTH
& attr
) {
1722 VATTR_RETURN(vap
, va_rsrc_length
, rsrc_len
);
1725 if (ATTR_FILE_RSRCALLOCSIZE
& attr
) {
1726 VATTR_RETURN(vap
, va_rsrc_alloc
, rsrc_alloc
);