]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
3d14c5d2 | 2 | #include <linux/ceph/ceph_debug.h> |
25e6bae3 | 3 | #include <linux/ceph/pagelist.h> |
3d14c5d2 | 4 | |
355da1eb | 5 | #include "super.h" |
3d14c5d2 YS |
6 | #include "mds_client.h" |
7 | ||
8 | #include <linux/ceph/decode.h> | |
355da1eb SW |
9 | |
10 | #include <linux/xattr.h> | |
ac6713cc | 11 | #include <linux/security.h> |
4db658ea | 12 | #include <linux/posix_acl_xattr.h> |
5a0e3ad6 | 13 | #include <linux/slab.h> |
355da1eb | 14 | |
22891907 AE |
15 | #define XATTR_CEPH_PREFIX "ceph." |
16 | #define XATTR_CEPH_PREFIX_LEN (sizeof (XATTR_CEPH_PREFIX) - 1) | |
17 | ||
bcdfeb2e YZ |
18 | static int __remove_xattr(struct ceph_inode_info *ci, |
19 | struct ceph_inode_xattr *xattr); | |
20 | ||
355da1eb SW |
21 | static bool ceph_is_valid_xattr(const char *name) |
22 | { | |
b8fe918b JL |
23 | return !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) || |
24 | !strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN) || | |
355da1eb SW |
25 | !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) || |
26 | !strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN); | |
27 | } | |
28 | ||
29 | /* | |
30 | * These define virtual xattrs exposing the recursive directory | |
31 | * statistics and layout metadata. | |
32 | */ | |
881a5fa2 | 33 | struct ceph_vxattr { |
355da1eb | 34 | char *name; |
3ce6cd12 | 35 | size_t name_size; /* strlen(name) + 1 (for '\0') */ |
f1d1b51d JL |
36 | ssize_t (*getxattr_cb)(struct ceph_inode_info *ci, char *val, |
37 | size_t size); | |
f36e4472 | 38 | bool (*exists_cb)(struct ceph_inode_info *ci); |
4e9906e7 | 39 | unsigned int flags; |
355da1eb SW |
40 | }; |
41 | ||
4e9906e7 YZ |
42 | #define VXATTR_FLAG_READONLY (1<<0) |
43 | #define VXATTR_FLAG_HIDDEN (1<<1) | |
49a9f4f6 | 44 | #define VXATTR_FLAG_RSTAT (1<<2) |
81048c00 | 45 | #define VXATTR_FLAG_DIRSTAT (1<<3) |
4e9906e7 | 46 | |
32ab0bd7 SW |
47 | /* layouts */ |
48 | ||
49 | static bool ceph_vxattrcb_layout_exists(struct ceph_inode_info *ci) | |
50 | { | |
779fe0fb YZ |
51 | struct ceph_file_layout *fl = &ci->i_layout; |
52 | return (fl->stripe_unit > 0 || fl->stripe_count > 0 || | |
53 | fl->object_size > 0 || fl->pool_id >= 0 || | |
54 | rcu_dereference_raw(fl->pool_ns) != NULL); | |
32ab0bd7 SW |
55 | } |
56 | ||
f1d1b51d JL |
57 | static ssize_t ceph_vxattrcb_layout(struct ceph_inode_info *ci, char *val, |
58 | size_t size) | |
32ab0bd7 | 59 | { |
32ab0bd7 SW |
60 | struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb); |
61 | struct ceph_osd_client *osdc = &fsc->client->osdc; | |
779fe0fb | 62 | struct ceph_string *pool_ns; |
7627151e | 63 | s64 pool = ci->i_layout.pool_id; |
32ab0bd7 | 64 | const char *pool_name; |
779fe0fb | 65 | const char *ns_field = " pool_namespace="; |
1e5c6649 | 66 | char buf[128]; |
779fe0fb | 67 | size_t len, total_len = 0; |
3b421018 | 68 | ssize_t ret; |
779fe0fb YZ |
69 | |
70 | pool_ns = ceph_try_get_string(ci->i_layout.pool_ns); | |
32ab0bd7 SW |
71 | |
72 | dout("ceph_vxattrcb_layout %p\n", &ci->vfs_inode); | |
5aea3dcd | 73 | down_read(&osdc->lock); |
32ab0bd7 | 74 | pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool); |
1e5c6649 | 75 | if (pool_name) { |
779fe0fb | 76 | len = snprintf(buf, sizeof(buf), |
7627151e YZ |
77 | "stripe_unit=%u stripe_count=%u object_size=%u pool=", |
78 | ci->i_layout.stripe_unit, ci->i_layout.stripe_count, | |
79 | ci->i_layout.object_size); | |
779fe0fb | 80 | total_len = len + strlen(pool_name); |
1e5c6649 | 81 | } else { |
779fe0fb | 82 | len = snprintf(buf, sizeof(buf), |
7627151e YZ |
83 | "stripe_unit=%u stripe_count=%u object_size=%u pool=%lld", |
84 | ci->i_layout.stripe_unit, ci->i_layout.stripe_count, | |
f1d1b51d | 85 | ci->i_layout.object_size, pool); |
779fe0fb YZ |
86 | total_len = len; |
87 | } | |
88 | ||
89 | if (pool_ns) | |
90 | total_len += strlen(ns_field) + pool_ns->len; | |
91 | ||
3b421018 JL |
92 | ret = total_len; |
93 | if (size >= total_len) { | |
779fe0fb YZ |
94 | memcpy(val, buf, len); |
95 | ret = len; | |
96 | if (pool_name) { | |
97 | len = strlen(pool_name); | |
98 | memcpy(val + ret, pool_name, len); | |
99 | ret += len; | |
100 | } | |
101 | if (pool_ns) { | |
102 | len = strlen(ns_field); | |
103 | memcpy(val + ret, ns_field, len); | |
104 | ret += len; | |
105 | memcpy(val + ret, pool_ns->str, pool_ns->len); | |
106 | ret += pool_ns->len; | |
1e5c6649 YZ |
107 | } |
108 | } | |
5aea3dcd | 109 | up_read(&osdc->lock); |
779fe0fb | 110 | ceph_put_string(pool_ns); |
32ab0bd7 SW |
111 | return ret; |
112 | } | |
113 | ||
26350535 JL |
114 | /* |
115 | * The convention with strings in xattrs is that they should not be NULL | |
116 | * terminated, since we're returning the length with them. snprintf always | |
117 | * NULL terminates however, so call it on a temporary buffer and then memcpy | |
118 | * the result into place. | |
119 | */ | |
f6fbdcd9 ID |
120 | static __printf(3, 4) |
121 | int ceph_fmt_xattr(char *val, size_t size, const char *fmt, ...) | |
26350535 JL |
122 | { |
123 | int ret; | |
124 | va_list args; | |
125 | char buf[96]; /* NB: reevaluate size if new vxattrs are added */ | |
126 | ||
127 | va_start(args, fmt); | |
128 | ret = vsnprintf(buf, size ? sizeof(buf) : 0, fmt, args); | |
129 | va_end(args); | |
130 | ||
131 | /* Sanity check */ | |
132 | if (size && ret + 1 > sizeof(buf)) { | |
133 | WARN_ONCE(true, "Returned length too big (%d)", ret); | |
134 | return -E2BIG; | |
135 | } | |
136 | ||
137 | if (ret <= size) | |
138 | memcpy(val, buf, ret); | |
139 | return ret; | |
140 | } | |
141 | ||
f1d1b51d JL |
142 | static ssize_t ceph_vxattrcb_layout_stripe_unit(struct ceph_inode_info *ci, |
143 | char *val, size_t size) | |
695b7119 | 144 | { |
26350535 | 145 | return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_unit); |
695b7119 SW |
146 | } |
147 | ||
f1d1b51d JL |
148 | static ssize_t ceph_vxattrcb_layout_stripe_count(struct ceph_inode_info *ci, |
149 | char *val, size_t size) | |
695b7119 | 150 | { |
26350535 | 151 | return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_count); |
695b7119 SW |
152 | } |
153 | ||
f1d1b51d JL |
154 | static ssize_t ceph_vxattrcb_layout_object_size(struct ceph_inode_info *ci, |
155 | char *val, size_t size) | |
695b7119 | 156 | { |
26350535 | 157 | return ceph_fmt_xattr(val, size, "%u", ci->i_layout.object_size); |
695b7119 SW |
158 | } |
159 | ||
f1d1b51d JL |
160 | static ssize_t ceph_vxattrcb_layout_pool(struct ceph_inode_info *ci, |
161 | char *val, size_t size) | |
695b7119 | 162 | { |
f1d1b51d | 163 | ssize_t ret; |
695b7119 SW |
164 | struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb); |
165 | struct ceph_osd_client *osdc = &fsc->client->osdc; | |
7627151e | 166 | s64 pool = ci->i_layout.pool_id; |
695b7119 SW |
167 | const char *pool_name; |
168 | ||
5aea3dcd | 169 | down_read(&osdc->lock); |
695b7119 | 170 | pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool); |
26350535 JL |
171 | if (pool_name) { |
172 | ret = strlen(pool_name); | |
173 | if (ret <= size) | |
174 | memcpy(val, pool_name, ret); | |
175 | } else { | |
176 | ret = ceph_fmt_xattr(val, size, "%lld", pool); | |
177 | } | |
5aea3dcd | 178 | up_read(&osdc->lock); |
695b7119 SW |
179 | return ret; |
180 | } | |
181 | ||
f1d1b51d JL |
182 | static ssize_t ceph_vxattrcb_layout_pool_namespace(struct ceph_inode_info *ci, |
183 | char *val, size_t size) | |
779fe0fb | 184 | { |
26350535 | 185 | ssize_t ret = 0; |
779fe0fb | 186 | struct ceph_string *ns = ceph_try_get_string(ci->i_layout.pool_ns); |
26350535 | 187 | |
779fe0fb | 188 | if (ns) { |
26350535 JL |
189 | ret = ns->len; |
190 | if (ret <= size) | |
191 | memcpy(val, ns->str, ret); | |
779fe0fb YZ |
192 | ceph_put_string(ns); |
193 | } | |
194 | return ret; | |
195 | } | |
196 | ||
355da1eb SW |
197 | /* directories */ |
198 | ||
f1d1b51d JL |
199 | static ssize_t ceph_vxattrcb_dir_entries(struct ceph_inode_info *ci, char *val, |
200 | size_t size) | |
355da1eb | 201 | { |
26350535 | 202 | return ceph_fmt_xattr(val, size, "%lld", ci->i_files + ci->i_subdirs); |
355da1eb SW |
203 | } |
204 | ||
f1d1b51d JL |
205 | static ssize_t ceph_vxattrcb_dir_files(struct ceph_inode_info *ci, char *val, |
206 | size_t size) | |
355da1eb | 207 | { |
26350535 | 208 | return ceph_fmt_xattr(val, size, "%lld", ci->i_files); |
355da1eb SW |
209 | } |
210 | ||
f1d1b51d JL |
211 | static ssize_t ceph_vxattrcb_dir_subdirs(struct ceph_inode_info *ci, char *val, |
212 | size_t size) | |
355da1eb | 213 | { |
26350535 | 214 | return ceph_fmt_xattr(val, size, "%lld", ci->i_subdirs); |
355da1eb SW |
215 | } |
216 | ||
f1d1b51d JL |
217 | static ssize_t ceph_vxattrcb_dir_rentries(struct ceph_inode_info *ci, char *val, |
218 | size_t size) | |
355da1eb | 219 | { |
26350535 JL |
220 | return ceph_fmt_xattr(val, size, "%lld", |
221 | ci->i_rfiles + ci->i_rsubdirs); | |
355da1eb SW |
222 | } |
223 | ||
f1d1b51d JL |
224 | static ssize_t ceph_vxattrcb_dir_rfiles(struct ceph_inode_info *ci, char *val, |
225 | size_t size) | |
355da1eb | 226 | { |
26350535 | 227 | return ceph_fmt_xattr(val, size, "%lld", ci->i_rfiles); |
355da1eb SW |
228 | } |
229 | ||
f1d1b51d JL |
230 | static ssize_t ceph_vxattrcb_dir_rsubdirs(struct ceph_inode_info *ci, char *val, |
231 | size_t size) | |
355da1eb | 232 | { |
26350535 | 233 | return ceph_fmt_xattr(val, size, "%lld", ci->i_rsubdirs); |
355da1eb SW |
234 | } |
235 | ||
e7f72952 YC |
236 | static ssize_t ceph_vxattrcb_dir_rsnaps(struct ceph_inode_info *ci, char *val, |
237 | size_t size) | |
238 | { | |
239 | return ceph_fmt_xattr(val, size, "%lld", ci->i_rsnaps); | |
240 | } | |
241 | ||
f1d1b51d JL |
242 | static ssize_t ceph_vxattrcb_dir_rbytes(struct ceph_inode_info *ci, char *val, |
243 | size_t size) | |
355da1eb | 244 | { |
26350535 | 245 | return ceph_fmt_xattr(val, size, "%lld", ci->i_rbytes); |
355da1eb SW |
246 | } |
247 | ||
f1d1b51d JL |
248 | static ssize_t ceph_vxattrcb_dir_rctime(struct ceph_inode_info *ci, char *val, |
249 | size_t size) | |
355da1eb | 250 | { |
26350535 JL |
251 | return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_rctime.tv_sec, |
252 | ci->i_rctime.tv_nsec); | |
355da1eb SW |
253 | } |
254 | ||
08796873 YZ |
255 | /* dir pin */ |
256 | static bool ceph_vxattrcb_dir_pin_exists(struct ceph_inode_info *ci) | |
257 | { | |
258 | return ci->i_dir_pin != -ENODATA; | |
259 | } | |
260 | ||
f1d1b51d JL |
261 | static ssize_t ceph_vxattrcb_dir_pin(struct ceph_inode_info *ci, char *val, |
262 | size_t size) | |
08796873 | 263 | { |
26350535 | 264 | return ceph_fmt_xattr(val, size, "%d", (int)ci->i_dir_pin); |
08796873 | 265 | } |
fb18a575 | 266 | |
08796873 | 267 | /* quotas */ |
fb18a575 LH |
268 | static bool ceph_vxattrcb_quota_exists(struct ceph_inode_info *ci) |
269 | { | |
f1919826 YZ |
270 | bool ret = false; |
271 | spin_lock(&ci->i_ceph_lock); | |
272 | if ((ci->i_max_files || ci->i_max_bytes) && | |
273 | ci->i_vino.snap == CEPH_NOSNAP && | |
274 | ci->i_snap_realm && | |
275 | ci->i_snap_realm->ino == ci->i_vino.ino) | |
276 | ret = true; | |
277 | spin_unlock(&ci->i_ceph_lock); | |
278 | return ret; | |
fb18a575 LH |
279 | } |
280 | ||
f1d1b51d JL |
281 | static ssize_t ceph_vxattrcb_quota(struct ceph_inode_info *ci, char *val, |
282 | size_t size) | |
fb18a575 | 283 | { |
26350535 JL |
284 | return ceph_fmt_xattr(val, size, "max_bytes=%llu max_files=%llu", |
285 | ci->i_max_bytes, ci->i_max_files); | |
fb18a575 LH |
286 | } |
287 | ||
f1d1b51d JL |
288 | static ssize_t ceph_vxattrcb_quota_max_bytes(struct ceph_inode_info *ci, |
289 | char *val, size_t size) | |
fb18a575 | 290 | { |
26350535 | 291 | return ceph_fmt_xattr(val, size, "%llu", ci->i_max_bytes); |
fb18a575 LH |
292 | } |
293 | ||
f1d1b51d JL |
294 | static ssize_t ceph_vxattrcb_quota_max_files(struct ceph_inode_info *ci, |
295 | char *val, size_t size) | |
fb18a575 | 296 | { |
26350535 | 297 | return ceph_fmt_xattr(val, size, "%llu", ci->i_max_files); |
fb18a575 | 298 | } |
32ab0bd7 | 299 | |
100cc610 DD |
300 | /* snapshots */ |
301 | static bool ceph_vxattrcb_snap_btime_exists(struct ceph_inode_info *ci) | |
302 | { | |
303 | return (ci->i_snap_btime.tv_sec != 0 || ci->i_snap_btime.tv_nsec != 0); | |
304 | } | |
305 | ||
f1d1b51d JL |
306 | static ssize_t ceph_vxattrcb_snap_btime(struct ceph_inode_info *ci, char *val, |
307 | size_t size) | |
100cc610 | 308 | { |
26350535 JL |
309 | return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_snap_btime.tv_sec, |
310 | ci->i_snap_btime.tv_nsec); | |
100cc610 DD |
311 | } |
312 | ||
5a9e2f5d XL |
313 | static ssize_t ceph_vxattrcb_cluster_fsid(struct ceph_inode_info *ci, |
314 | char *val, size_t size) | |
315 | { | |
316 | struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb); | |
317 | ||
318 | return ceph_fmt_xattr(val, size, "%pU", &fsc->client->fsid); | |
319 | } | |
320 | ||
321 | static ssize_t ceph_vxattrcb_client_id(struct ceph_inode_info *ci, | |
322 | char *val, size_t size) | |
323 | { | |
324 | struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb); | |
325 | ||
326 | return ceph_fmt_xattr(val, size, "client%lld", | |
327 | ceph_client_gid(fsc->client)); | |
328 | } | |
329 | ||
dd980fc0 LH |
330 | static ssize_t ceph_vxattrcb_caps(struct ceph_inode_info *ci, char *val, |
331 | size_t size) | |
332 | { | |
333 | int issued; | |
334 | ||
335 | spin_lock(&ci->i_ceph_lock); | |
336 | issued = __ceph_caps_issued(ci, NULL); | |
337 | spin_unlock(&ci->i_ceph_lock); | |
338 | ||
339 | return ceph_fmt_xattr(val, size, "%s/0x%x", | |
340 | ceph_cap_string(issued), issued); | |
341 | } | |
342 | ||
eb788084 | 343 | #define CEPH_XATTR_NAME(_type, _name) XATTR_CEPH_PREFIX #_type "." #_name |
695b7119 SW |
344 | #define CEPH_XATTR_NAME2(_type, _name, _name2) \ |
345 | XATTR_CEPH_PREFIX #_type "." #_name "." #_name2 | |
eb788084 | 346 | |
49a9f4f6 | 347 | #define XATTR_NAME_CEPH(_type, _name, _flags) \ |
8860147a SW |
348 | { \ |
349 | .name = CEPH_XATTR_NAME(_type, _name), \ | |
350 | .name_size = sizeof (CEPH_XATTR_NAME(_type, _name)), \ | |
351 | .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \ | |
49a9f4f6 YZ |
352 | .exists_cb = NULL, \ |
353 | .flags = (VXATTR_FLAG_READONLY | _flags), \ | |
8860147a | 354 | } |
49a9f4f6 YZ |
355 | #define XATTR_RSTAT_FIELD(_type, _name) \ |
356 | XATTR_NAME_CEPH(_type, _name, VXATTR_FLAG_RSTAT) | |
695b7119 SW |
357 | #define XATTR_LAYOUT_FIELD(_type, _name, _field) \ |
358 | { \ | |
359 | .name = CEPH_XATTR_NAME2(_type, _name, _field), \ | |
360 | .name_size = sizeof (CEPH_XATTR_NAME2(_type, _name, _field)), \ | |
361 | .getxattr_cb = ceph_vxattrcb_ ## _name ## _ ## _field, \ | |
695b7119 | 362 | .exists_cb = ceph_vxattrcb_layout_exists, \ |
4e9906e7 | 363 | .flags = VXATTR_FLAG_HIDDEN, \ |
695b7119 | 364 | } |
fb18a575 LH |
365 | #define XATTR_QUOTA_FIELD(_type, _name) \ |
366 | { \ | |
367 | .name = CEPH_XATTR_NAME(_type, _name), \ | |
368 | .name_size = sizeof(CEPH_XATTR_NAME(_type, _name)), \ | |
369 | .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \ | |
fb18a575 | 370 | .exists_cb = ceph_vxattrcb_quota_exists, \ |
4e9906e7 | 371 | .flags = VXATTR_FLAG_HIDDEN, \ |
fb18a575 | 372 | } |
eb788084 | 373 | |
881a5fa2 | 374 | static struct ceph_vxattr ceph_dir_vxattrs[] = { |
1f08f2b0 SW |
375 | { |
376 | .name = "ceph.dir.layout", | |
377 | .name_size = sizeof("ceph.dir.layout"), | |
378 | .getxattr_cb = ceph_vxattrcb_layout, | |
1f08f2b0 | 379 | .exists_cb = ceph_vxattrcb_layout_exists, |
4e9906e7 | 380 | .flags = VXATTR_FLAG_HIDDEN, |
1f08f2b0 | 381 | }, |
695b7119 SW |
382 | XATTR_LAYOUT_FIELD(dir, layout, stripe_unit), |
383 | XATTR_LAYOUT_FIELD(dir, layout, stripe_count), | |
384 | XATTR_LAYOUT_FIELD(dir, layout, object_size), | |
385 | XATTR_LAYOUT_FIELD(dir, layout, pool), | |
779fe0fb | 386 | XATTR_LAYOUT_FIELD(dir, layout, pool_namespace), |
81048c00 JL |
387 | XATTR_NAME_CEPH(dir, entries, VXATTR_FLAG_DIRSTAT), |
388 | XATTR_NAME_CEPH(dir, files, VXATTR_FLAG_DIRSTAT), | |
389 | XATTR_NAME_CEPH(dir, subdirs, VXATTR_FLAG_DIRSTAT), | |
49a9f4f6 YZ |
390 | XATTR_RSTAT_FIELD(dir, rentries), |
391 | XATTR_RSTAT_FIELD(dir, rfiles), | |
392 | XATTR_RSTAT_FIELD(dir, rsubdirs), | |
e7f72952 | 393 | XATTR_RSTAT_FIELD(dir, rsnaps), |
49a9f4f6 YZ |
394 | XATTR_RSTAT_FIELD(dir, rbytes), |
395 | XATTR_RSTAT_FIELD(dir, rctime), | |
08796873 YZ |
396 | { |
397 | .name = "ceph.dir.pin", | |
e1b81439 | 398 | .name_size = sizeof("ceph.dir.pin"), |
08796873 YZ |
399 | .getxattr_cb = ceph_vxattrcb_dir_pin, |
400 | .exists_cb = ceph_vxattrcb_dir_pin_exists, | |
401 | .flags = VXATTR_FLAG_HIDDEN, | |
402 | }, | |
fb18a575 LH |
403 | { |
404 | .name = "ceph.quota", | |
405 | .name_size = sizeof("ceph.quota"), | |
406 | .getxattr_cb = ceph_vxattrcb_quota, | |
fb18a575 | 407 | .exists_cb = ceph_vxattrcb_quota_exists, |
4e9906e7 | 408 | .flags = VXATTR_FLAG_HIDDEN, |
fb18a575 LH |
409 | }, |
410 | XATTR_QUOTA_FIELD(quota, max_bytes), | |
411 | XATTR_QUOTA_FIELD(quota, max_files), | |
100cc610 DD |
412 | { |
413 | .name = "ceph.snap.btime", | |
414 | .name_size = sizeof("ceph.snap.btime"), | |
415 | .getxattr_cb = ceph_vxattrcb_snap_btime, | |
416 | .exists_cb = ceph_vxattrcb_snap_btime_exists, | |
417 | .flags = VXATTR_FLAG_READONLY, | |
418 | }, | |
dd980fc0 LH |
419 | { |
420 | .name = "ceph.caps", | |
421 | .name_size = sizeof("ceph.caps"), | |
422 | .getxattr_cb = ceph_vxattrcb_caps, | |
423 | .exists_cb = NULL, | |
424 | .flags = VXATTR_FLAG_HIDDEN, | |
425 | }, | |
2c3dd4ff | 426 | { .name = NULL, 0 } /* Required table terminator */ |
355da1eb SW |
427 | }; |
428 | ||
429 | /* files */ | |
430 | ||
881a5fa2 | 431 | static struct ceph_vxattr ceph_file_vxattrs[] = { |
32ab0bd7 SW |
432 | { |
433 | .name = "ceph.file.layout", | |
434 | .name_size = sizeof("ceph.file.layout"), | |
435 | .getxattr_cb = ceph_vxattrcb_layout, | |
32ab0bd7 | 436 | .exists_cb = ceph_vxattrcb_layout_exists, |
4e9906e7 | 437 | .flags = VXATTR_FLAG_HIDDEN, |
32ab0bd7 | 438 | }, |
695b7119 SW |
439 | XATTR_LAYOUT_FIELD(file, layout, stripe_unit), |
440 | XATTR_LAYOUT_FIELD(file, layout, stripe_count), | |
441 | XATTR_LAYOUT_FIELD(file, layout, object_size), | |
442 | XATTR_LAYOUT_FIELD(file, layout, pool), | |
779fe0fb | 443 | XATTR_LAYOUT_FIELD(file, layout, pool_namespace), |
100cc610 DD |
444 | { |
445 | .name = "ceph.snap.btime", | |
446 | .name_size = sizeof("ceph.snap.btime"), | |
447 | .getxattr_cb = ceph_vxattrcb_snap_btime, | |
448 | .exists_cb = ceph_vxattrcb_snap_btime_exists, | |
449 | .flags = VXATTR_FLAG_READONLY, | |
450 | }, | |
dd980fc0 LH |
451 | { |
452 | .name = "ceph.caps", | |
453 | .name_size = sizeof("ceph.caps"), | |
454 | .getxattr_cb = ceph_vxattrcb_caps, | |
455 | .exists_cb = NULL, | |
456 | .flags = VXATTR_FLAG_HIDDEN, | |
457 | }, | |
2c3dd4ff | 458 | { .name = NULL, 0 } /* Required table terminator */ |
355da1eb SW |
459 | }; |
460 | ||
5a9e2f5d XL |
461 | static struct ceph_vxattr ceph_common_vxattrs[] = { |
462 | { | |
463 | .name = "ceph.cluster_fsid", | |
464 | .name_size = sizeof("ceph.cluster_fsid"), | |
465 | .getxattr_cb = ceph_vxattrcb_cluster_fsid, | |
466 | .exists_cb = NULL, | |
467 | .flags = VXATTR_FLAG_READONLY, | |
468 | }, | |
469 | { | |
470 | .name = "ceph.client_id", | |
471 | .name_size = sizeof("ceph.client_id"), | |
472 | .getxattr_cb = ceph_vxattrcb_client_id, | |
473 | .exists_cb = NULL, | |
474 | .flags = VXATTR_FLAG_READONLY, | |
475 | }, | |
476 | { .name = NULL, 0 } /* Required table terminator */ | |
477 | }; | |
478 | ||
881a5fa2 | 479 | static struct ceph_vxattr *ceph_inode_vxattrs(struct inode *inode) |
355da1eb SW |
480 | { |
481 | if (S_ISDIR(inode->i_mode)) | |
482 | return ceph_dir_vxattrs; | |
483 | else if (S_ISREG(inode->i_mode)) | |
484 | return ceph_file_vxattrs; | |
485 | return NULL; | |
486 | } | |
487 | ||
881a5fa2 | 488 | static struct ceph_vxattr *ceph_match_vxattr(struct inode *inode, |
355da1eb SW |
489 | const char *name) |
490 | { | |
881a5fa2 | 491 | struct ceph_vxattr *vxattr = ceph_inode_vxattrs(inode); |
06476a69 AE |
492 | |
493 | if (vxattr) { | |
494 | while (vxattr->name) { | |
495 | if (!strcmp(vxattr->name, name)) | |
496 | return vxattr; | |
497 | vxattr++; | |
498 | } | |
499 | } | |
5a9e2f5d XL |
500 | |
501 | vxattr = ceph_common_vxattrs; | |
502 | while (vxattr->name) { | |
503 | if (!strcmp(vxattr->name, name)) | |
504 | return vxattr; | |
505 | vxattr++; | |
506 | } | |
06476a69 | 507 | |
355da1eb SW |
508 | return NULL; |
509 | } | |
510 | ||
511 | static int __set_xattr(struct ceph_inode_info *ci, | |
512 | const char *name, int name_len, | |
513 | const char *val, int val_len, | |
fbc0b970 | 514 | int flags, int update_xattr, |
355da1eb SW |
515 | struct ceph_inode_xattr **newxattr) |
516 | { | |
517 | struct rb_node **p; | |
518 | struct rb_node *parent = NULL; | |
519 | struct ceph_inode_xattr *xattr = NULL; | |
520 | int c; | |
521 | int new = 0; | |
522 | ||
523 | p = &ci->i_xattrs.index.rb_node; | |
524 | while (*p) { | |
525 | parent = *p; | |
526 | xattr = rb_entry(parent, struct ceph_inode_xattr, node); | |
527 | c = strncmp(name, xattr->name, min(name_len, xattr->name_len)); | |
528 | if (c < 0) | |
529 | p = &(*p)->rb_left; | |
530 | else if (c > 0) | |
531 | p = &(*p)->rb_right; | |
532 | else { | |
533 | if (name_len == xattr->name_len) | |
534 | break; | |
535 | else if (name_len < xattr->name_len) | |
536 | p = &(*p)->rb_left; | |
537 | else | |
538 | p = &(*p)->rb_right; | |
539 | } | |
540 | xattr = NULL; | |
541 | } | |
542 | ||
fbc0b970 YZ |
543 | if (update_xattr) { |
544 | int err = 0; | |
eeca958d | 545 | |
fbc0b970 YZ |
546 | if (xattr && (flags & XATTR_CREATE)) |
547 | err = -EEXIST; | |
548 | else if (!xattr && (flags & XATTR_REPLACE)) | |
549 | err = -ENODATA; | |
550 | if (err) { | |
551 | kfree(name); | |
552 | kfree(val); | |
eeca958d | 553 | kfree(*newxattr); |
fbc0b970 YZ |
554 | return err; |
555 | } | |
bcdfeb2e YZ |
556 | if (update_xattr < 0) { |
557 | if (xattr) | |
558 | __remove_xattr(ci, xattr); | |
559 | kfree(name); | |
eeca958d | 560 | kfree(*newxattr); |
bcdfeb2e YZ |
561 | return 0; |
562 | } | |
fbc0b970 YZ |
563 | } |
564 | ||
355da1eb SW |
565 | if (!xattr) { |
566 | new = 1; | |
567 | xattr = *newxattr; | |
568 | xattr->name = name; | |
569 | xattr->name_len = name_len; | |
fbc0b970 | 570 | xattr->should_free_name = update_xattr; |
355da1eb SW |
571 | |
572 | ci->i_xattrs.count++; | |
573 | dout("__set_xattr count=%d\n", ci->i_xattrs.count); | |
574 | } else { | |
575 | kfree(*newxattr); | |
576 | *newxattr = NULL; | |
577 | if (xattr->should_free_val) | |
c00e4522 | 578 | kfree(xattr->val); |
355da1eb | 579 | |
fbc0b970 | 580 | if (update_xattr) { |
c00e4522 | 581 | kfree(name); |
355da1eb SW |
582 | name = xattr->name; |
583 | } | |
584 | ci->i_xattrs.names_size -= xattr->name_len; | |
585 | ci->i_xattrs.vals_size -= xattr->val_len; | |
586 | } | |
355da1eb SW |
587 | ci->i_xattrs.names_size += name_len; |
588 | ci->i_xattrs.vals_size += val_len; | |
589 | if (val) | |
590 | xattr->val = val; | |
591 | else | |
592 | xattr->val = ""; | |
593 | ||
594 | xattr->val_len = val_len; | |
fbc0b970 YZ |
595 | xattr->dirty = update_xattr; |
596 | xattr->should_free_val = (val && update_xattr); | |
355da1eb SW |
597 | |
598 | if (new) { | |
599 | rb_link_node(&xattr->node, parent, p); | |
600 | rb_insert_color(&xattr->node, &ci->i_xattrs.index); | |
601 | dout("__set_xattr_val p=%p\n", p); | |
602 | } | |
603 | ||
05729781 YZ |
604 | dout("__set_xattr_val added %llx.%llx xattr %p %.*s=%.*s\n", |
605 | ceph_vinop(&ci->vfs_inode), xattr, name_len, name, val_len, val); | |
355da1eb SW |
606 | |
607 | return 0; | |
608 | } | |
609 | ||
610 | static struct ceph_inode_xattr *__get_xattr(struct ceph_inode_info *ci, | |
611 | const char *name) | |
612 | { | |
613 | struct rb_node **p; | |
614 | struct rb_node *parent = NULL; | |
615 | struct ceph_inode_xattr *xattr = NULL; | |
17db143f | 616 | int name_len = strlen(name); |
355da1eb SW |
617 | int c; |
618 | ||
619 | p = &ci->i_xattrs.index.rb_node; | |
620 | while (*p) { | |
621 | parent = *p; | |
622 | xattr = rb_entry(parent, struct ceph_inode_xattr, node); | |
623 | c = strncmp(name, xattr->name, xattr->name_len); | |
17db143f SW |
624 | if (c == 0 && name_len > xattr->name_len) |
625 | c = 1; | |
355da1eb SW |
626 | if (c < 0) |
627 | p = &(*p)->rb_left; | |
628 | else if (c > 0) | |
629 | p = &(*p)->rb_right; | |
630 | else { | |
631 | dout("__get_xattr %s: found %.*s\n", name, | |
632 | xattr->val_len, xattr->val); | |
633 | return xattr; | |
634 | } | |
635 | } | |
636 | ||
637 | dout("__get_xattr %s: not found\n", name); | |
638 | ||
639 | return NULL; | |
640 | } | |
641 | ||
642 | static void __free_xattr(struct ceph_inode_xattr *xattr) | |
643 | { | |
644 | BUG_ON(!xattr); | |
645 | ||
646 | if (xattr->should_free_name) | |
c00e4522 | 647 | kfree(xattr->name); |
355da1eb | 648 | if (xattr->should_free_val) |
c00e4522 | 649 | kfree(xattr->val); |
355da1eb SW |
650 | |
651 | kfree(xattr); | |
652 | } | |
653 | ||
654 | static int __remove_xattr(struct ceph_inode_info *ci, | |
655 | struct ceph_inode_xattr *xattr) | |
656 | { | |
657 | if (!xattr) | |
524186ac | 658 | return -ENODATA; |
355da1eb SW |
659 | |
660 | rb_erase(&xattr->node, &ci->i_xattrs.index); | |
661 | ||
662 | if (xattr->should_free_name) | |
c00e4522 | 663 | kfree(xattr->name); |
355da1eb | 664 | if (xattr->should_free_val) |
c00e4522 | 665 | kfree(xattr->val); |
355da1eb SW |
666 | |
667 | ci->i_xattrs.names_size -= xattr->name_len; | |
668 | ci->i_xattrs.vals_size -= xattr->val_len; | |
669 | ci->i_xattrs.count--; | |
670 | kfree(xattr); | |
671 | ||
672 | return 0; | |
673 | } | |
674 | ||
355da1eb SW |
675 | static char *__copy_xattr_names(struct ceph_inode_info *ci, |
676 | char *dest) | |
677 | { | |
678 | struct rb_node *p; | |
679 | struct ceph_inode_xattr *xattr = NULL; | |
680 | ||
681 | p = rb_first(&ci->i_xattrs.index); | |
682 | dout("__copy_xattr_names count=%d\n", ci->i_xattrs.count); | |
683 | ||
684 | while (p) { | |
685 | xattr = rb_entry(p, struct ceph_inode_xattr, node); | |
686 | memcpy(dest, xattr->name, xattr->name_len); | |
687 | dest[xattr->name_len] = '\0'; | |
688 | ||
689 | dout("dest=%s %p (%s) (%d/%d)\n", dest, xattr, xattr->name, | |
690 | xattr->name_len, ci->i_xattrs.names_size); | |
691 | ||
692 | dest += xattr->name_len + 1; | |
693 | p = rb_next(p); | |
694 | } | |
695 | ||
696 | return dest; | |
697 | } | |
698 | ||
699 | void __ceph_destroy_xattrs(struct ceph_inode_info *ci) | |
700 | { | |
701 | struct rb_node *p, *tmp; | |
702 | struct ceph_inode_xattr *xattr = NULL; | |
703 | ||
704 | p = rb_first(&ci->i_xattrs.index); | |
705 | ||
706 | dout("__ceph_destroy_xattrs p=%p\n", p); | |
707 | ||
708 | while (p) { | |
709 | xattr = rb_entry(p, struct ceph_inode_xattr, node); | |
710 | tmp = p; | |
711 | p = rb_next(tmp); | |
712 | dout("__ceph_destroy_xattrs next p=%p (%.*s)\n", p, | |
713 | xattr->name_len, xattr->name); | |
714 | rb_erase(tmp, &ci->i_xattrs.index); | |
715 | ||
716 | __free_xattr(xattr); | |
717 | } | |
718 | ||
719 | ci->i_xattrs.names_size = 0; | |
720 | ci->i_xattrs.vals_size = 0; | |
721 | ci->i_xattrs.index_version = 0; | |
722 | ci->i_xattrs.count = 0; | |
723 | ci->i_xattrs.index = RB_ROOT; | |
724 | } | |
725 | ||
726 | static int __build_xattrs(struct inode *inode) | |
be655596 SW |
727 | __releases(ci->i_ceph_lock) |
728 | __acquires(ci->i_ceph_lock) | |
355da1eb SW |
729 | { |
730 | u32 namelen; | |
731 | u32 numattr = 0; | |
732 | void *p, *end; | |
733 | u32 len; | |
734 | const char *name, *val; | |
735 | struct ceph_inode_info *ci = ceph_inode(inode); | |
0eb30853 | 736 | u64 xattr_version; |
355da1eb | 737 | struct ceph_inode_xattr **xattrs = NULL; |
63ff78b2 | 738 | int err = 0; |
355da1eb SW |
739 | int i; |
740 | ||
741 | dout("__build_xattrs() len=%d\n", | |
742 | ci->i_xattrs.blob ? (int)ci->i_xattrs.blob->vec.iov_len : 0); | |
743 | ||
744 | if (ci->i_xattrs.index_version >= ci->i_xattrs.version) | |
745 | return 0; /* already built */ | |
746 | ||
747 | __ceph_destroy_xattrs(ci); | |
748 | ||
749 | start: | |
750 | /* updated internal xattr rb tree */ | |
751 | if (ci->i_xattrs.blob && ci->i_xattrs.blob->vec.iov_len > 4) { | |
752 | p = ci->i_xattrs.blob->vec.iov_base; | |
753 | end = p + ci->i_xattrs.blob->vec.iov_len; | |
754 | ceph_decode_32_safe(&p, end, numattr, bad); | |
755 | xattr_version = ci->i_xattrs.version; | |
be655596 | 756 | spin_unlock(&ci->i_ceph_lock); |
355da1eb | 757 | |
7e8a2952 | 758 | xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), |
355da1eb SW |
759 | GFP_NOFS); |
760 | err = -ENOMEM; | |
761 | if (!xattrs) | |
762 | goto bad_lock; | |
1a295bd8 | 763 | |
355da1eb SW |
764 | for (i = 0; i < numattr; i++) { |
765 | xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), | |
766 | GFP_NOFS); | |
767 | if (!xattrs[i]) | |
768 | goto bad_lock; | |
769 | } | |
770 | ||
be655596 | 771 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
772 | if (ci->i_xattrs.version != xattr_version) { |
773 | /* lost a race, retry */ | |
774 | for (i = 0; i < numattr; i++) | |
775 | kfree(xattrs[i]); | |
776 | kfree(xattrs); | |
21ec6ffa | 777 | xattrs = NULL; |
355da1eb SW |
778 | goto start; |
779 | } | |
780 | err = -EIO; | |
781 | while (numattr--) { | |
782 | ceph_decode_32_safe(&p, end, len, bad); | |
783 | namelen = len; | |
784 | name = p; | |
785 | p += len; | |
786 | ceph_decode_32_safe(&p, end, len, bad); | |
787 | val = p; | |
788 | p += len; | |
789 | ||
790 | err = __set_xattr(ci, name, namelen, val, len, | |
fbc0b970 | 791 | 0, 0, &xattrs[numattr]); |
355da1eb SW |
792 | |
793 | if (err < 0) | |
794 | goto bad; | |
795 | } | |
796 | kfree(xattrs); | |
797 | } | |
798 | ci->i_xattrs.index_version = ci->i_xattrs.version; | |
799 | ci->i_xattrs.dirty = false; | |
800 | ||
801 | return err; | |
802 | bad_lock: | |
be655596 | 803 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
804 | bad: |
805 | if (xattrs) { | |
806 | for (i = 0; i < numattr; i++) | |
807 | kfree(xattrs[i]); | |
808 | kfree(xattrs); | |
809 | } | |
810 | ci->i_xattrs.names_size = 0; | |
811 | return err; | |
812 | } | |
813 | ||
814 | static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size, | |
815 | int val_size) | |
816 | { | |
817 | /* | |
818 | * 4 bytes for the length, and additional 4 bytes per each xattr name, | |
819 | * 4 bytes per each value | |
820 | */ | |
821 | int size = 4 + ci->i_xattrs.count*(4 + 4) + | |
822 | ci->i_xattrs.names_size + | |
823 | ci->i_xattrs.vals_size; | |
824 | dout("__get_required_blob_size c=%d names.size=%d vals.size=%d\n", | |
825 | ci->i_xattrs.count, ci->i_xattrs.names_size, | |
826 | ci->i_xattrs.vals_size); | |
827 | ||
828 | if (name_size) | |
829 | size += 4 + 4 + name_size + val_size; | |
830 | ||
831 | return size; | |
832 | } | |
833 | ||
834 | /* | |
835 | * If there are dirty xattrs, reencode xattrs into the prealloc_blob | |
12fe3dda LH |
836 | * and swap into place. It returns the old i_xattrs.blob (or NULL) so |
837 | * that it can be freed by the caller as the i_ceph_lock is likely to be | |
838 | * held. | |
355da1eb | 839 | */ |
12fe3dda | 840 | struct ceph_buffer *__ceph_build_xattrs_blob(struct ceph_inode_info *ci) |
355da1eb SW |
841 | { |
842 | struct rb_node *p; | |
843 | struct ceph_inode_xattr *xattr = NULL; | |
12fe3dda | 844 | struct ceph_buffer *old_blob = NULL; |
355da1eb SW |
845 | void *dest; |
846 | ||
847 | dout("__build_xattrs_blob %p\n", &ci->vfs_inode); | |
848 | if (ci->i_xattrs.dirty) { | |
849 | int need = __get_required_blob_size(ci, 0, 0); | |
850 | ||
851 | BUG_ON(need > ci->i_xattrs.prealloc_blob->alloc_len); | |
852 | ||
853 | p = rb_first(&ci->i_xattrs.index); | |
854 | dest = ci->i_xattrs.prealloc_blob->vec.iov_base; | |
855 | ||
856 | ceph_encode_32(&dest, ci->i_xattrs.count); | |
857 | while (p) { | |
858 | xattr = rb_entry(p, struct ceph_inode_xattr, node); | |
859 | ||
860 | ceph_encode_32(&dest, xattr->name_len); | |
861 | memcpy(dest, xattr->name, xattr->name_len); | |
862 | dest += xattr->name_len; | |
863 | ceph_encode_32(&dest, xattr->val_len); | |
864 | memcpy(dest, xattr->val, xattr->val_len); | |
865 | dest += xattr->val_len; | |
866 | ||
867 | p = rb_next(p); | |
868 | } | |
869 | ||
870 | /* adjust buffer len; it may be larger than we need */ | |
871 | ci->i_xattrs.prealloc_blob->vec.iov_len = | |
872 | dest - ci->i_xattrs.prealloc_blob->vec.iov_base; | |
873 | ||
b6c1d5b8 | 874 | if (ci->i_xattrs.blob) |
12fe3dda | 875 | old_blob = ci->i_xattrs.blob; |
355da1eb SW |
876 | ci->i_xattrs.blob = ci->i_xattrs.prealloc_blob; |
877 | ci->i_xattrs.prealloc_blob = NULL; | |
878 | ci->i_xattrs.dirty = false; | |
4a625be4 | 879 | ci->i_xattrs.version++; |
355da1eb | 880 | } |
12fe3dda LH |
881 | |
882 | return old_blob; | |
355da1eb SW |
883 | } |
884 | ||
315f2408 YZ |
885 | static inline int __get_request_mask(struct inode *in) { |
886 | struct ceph_mds_request *req = current->journal_info; | |
887 | int mask = 0; | |
888 | if (req && req->r_target_inode == in) { | |
889 | if (req->r_op == CEPH_MDS_OP_LOOKUP || | |
890 | req->r_op == CEPH_MDS_OP_LOOKUPINO || | |
891 | req->r_op == CEPH_MDS_OP_LOOKUPPARENT || | |
892 | req->r_op == CEPH_MDS_OP_GETATTR) { | |
893 | mask = le32_to_cpu(req->r_args.getattr.mask); | |
894 | } else if (req->r_op == CEPH_MDS_OP_OPEN || | |
895 | req->r_op == CEPH_MDS_OP_CREATE) { | |
896 | mask = le32_to_cpu(req->r_args.open.mask); | |
897 | } | |
898 | } | |
899 | return mask; | |
900 | } | |
901 | ||
7221fe4c | 902 | ssize_t __ceph_getxattr(struct inode *inode, const char *name, void *value, |
355da1eb SW |
903 | size_t size) |
904 | { | |
355da1eb | 905 | struct ceph_inode_info *ci = ceph_inode(inode); |
355da1eb | 906 | struct ceph_inode_xattr *xattr; |
881a5fa2 | 907 | struct ceph_vxattr *vxattr = NULL; |
315f2408 | 908 | int req_mask; |
f1d1b51d | 909 | ssize_t err; |
355da1eb | 910 | |
0bee82fb SW |
911 | /* let's see if a virtual xattr was requested */ |
912 | vxattr = ceph_match_vxattr(inode, name); | |
29dccfa5 | 913 | if (vxattr) { |
49a9f4f6 YZ |
914 | int mask = 0; |
915 | if (vxattr->flags & VXATTR_FLAG_RSTAT) | |
916 | mask |= CEPH_STAT_RSTAT; | |
81048c00 JL |
917 | if (vxattr->flags & VXATTR_FLAG_DIRSTAT) |
918 | mask |= CEPH_CAP_FILE_SHARED; | |
49a9f4f6 | 919 | err = ceph_do_getattr(inode, mask, true); |
1684dd03 YZ |
920 | if (err) |
921 | return err; | |
29dccfa5 | 922 | err = -ENODATA; |
3b421018 | 923 | if (!(vxattr->exists_cb && !vxattr->exists_cb(ci))) { |
29dccfa5 | 924 | err = vxattr->getxattr_cb(ci, value, size); |
3b421018 JL |
925 | if (size && size < err) |
926 | err = -ERANGE; | |
927 | } | |
a1dc1937 | 928 | return err; |
0bee82fb SW |
929 | } |
930 | ||
315f2408 YZ |
931 | req_mask = __get_request_mask(inode); |
932 | ||
a1dc1937 | 933 | spin_lock(&ci->i_ceph_lock); |
d36e0b62 | 934 | dout("getxattr %p name '%s' ver=%lld index_ver=%lld\n", inode, name, |
a1dc1937 | 935 | ci->i_xattrs.version, ci->i_xattrs.index_version); |
936 | ||
508b32d8 | 937 | if (ci->i_xattrs.version == 0 || |
315f2408 | 938 | !((req_mask & CEPH_CAP_XATTR_SHARED) || |
1af16d54 | 939 | __ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1))) { |
be655596 | 940 | spin_unlock(&ci->i_ceph_lock); |
315f2408 YZ |
941 | |
942 | /* security module gets xattr while filling trace */ | |
d37b1d99 | 943 | if (current->journal_info) { |
315f2408 YZ |
944 | pr_warn_ratelimited("sync getxattr %p " |
945 | "during filling trace\n", inode); | |
946 | return -EBUSY; | |
947 | } | |
948 | ||
355da1eb | 949 | /* get xattrs from mds (if we don't already have them) */ |
508b32d8 | 950 | err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true); |
355da1eb SW |
951 | if (err) |
952 | return err; | |
508b32d8 | 953 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
954 | } |
955 | ||
355da1eb SW |
956 | err = __build_xattrs(inode); |
957 | if (err < 0) | |
958 | goto out; | |
959 | ||
355da1eb SW |
960 | err = -ENODATA; /* == ENOATTR */ |
961 | xattr = __get_xattr(ci, name); | |
0bee82fb | 962 | if (!xattr) |
355da1eb | 963 | goto out; |
355da1eb SW |
964 | |
965 | err = -ERANGE; | |
966 | if (size && size < xattr->val_len) | |
967 | goto out; | |
968 | ||
969 | err = xattr->val_len; | |
970 | if (size == 0) | |
971 | goto out; | |
972 | ||
973 | memcpy(value, xattr->val, xattr->val_len); | |
974 | ||
d37b1d99 | 975 | if (current->journal_info && |
026105eb JL |
976 | !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) && |
977 | security_ismaclabel(name + XATTR_SECURITY_PREFIX_LEN)) | |
315f2408 | 978 | ci->i_ceph_flags |= CEPH_I_SEC_INITED; |
355da1eb | 979 | out: |
be655596 | 980 | spin_unlock(&ci->i_ceph_lock); |
355da1eb SW |
981 | return err; |
982 | } | |
983 | ||
984 | ssize_t ceph_listxattr(struct dentry *dentry, char *names, size_t size) | |
985 | { | |
2b0143b5 | 986 | struct inode *inode = d_inode(dentry); |
355da1eb | 987 | struct ceph_inode_info *ci = ceph_inode(inode); |
2b2abcac | 988 | bool len_only = (size == 0); |
355da1eb SW |
989 | u32 namelen; |
990 | int err; | |
355da1eb | 991 | |
be655596 | 992 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
993 | dout("listxattr %p ver=%lld index_ver=%lld\n", inode, |
994 | ci->i_xattrs.version, ci->i_xattrs.index_version); | |
995 | ||
508b32d8 | 996 | if (ci->i_xattrs.version == 0 || |
1af16d54 | 997 | !__ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1)) { |
be655596 | 998 | spin_unlock(&ci->i_ceph_lock); |
508b32d8 | 999 | err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true); |
355da1eb SW |
1000 | if (err) |
1001 | return err; | |
508b32d8 | 1002 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
1003 | } |
1004 | ||
355da1eb SW |
1005 | err = __build_xattrs(inode); |
1006 | if (err < 0) | |
1007 | goto out; | |
3ce6cd12 | 1008 | |
2b2abcac | 1009 | /* add 1 byte for each xattr due to the null termination */ |
b65917dd | 1010 | namelen = ci->i_xattrs.names_size + ci->i_xattrs.count; |
2b2abcac DD |
1011 | if (!len_only) { |
1012 | if (namelen > size) { | |
1013 | err = -ERANGE; | |
1014 | goto out; | |
1015 | } | |
1016 | names = __copy_xattr_names(ci, names); | |
1017 | size -= namelen; | |
1018 | } | |
2b2abcac | 1019 | err = namelen; |
355da1eb | 1020 | out: |
be655596 | 1021 | spin_unlock(&ci->i_ceph_lock); |
355da1eb SW |
1022 | return err; |
1023 | } | |
1024 | ||
a26fecca | 1025 | static int ceph_sync_setxattr(struct inode *inode, const char *name, |
355da1eb SW |
1026 | const char *value, size_t size, int flags) |
1027 | { | |
a26fecca | 1028 | struct ceph_fs_client *fsc = ceph_sb_to_client(inode->i_sb); |
355da1eb | 1029 | struct ceph_inode_info *ci = ceph_inode(inode); |
355da1eb | 1030 | struct ceph_mds_request *req; |
3d14c5d2 | 1031 | struct ceph_mds_client *mdsc = fsc->mdsc; |
968cd14e | 1032 | struct ceph_osd_client *osdc = &fsc->client->osdc; |
25e6bae3 | 1033 | struct ceph_pagelist *pagelist = NULL; |
04303d8a | 1034 | int op = CEPH_MDS_OP_SETXATTR; |
355da1eb | 1035 | int err; |
25e6bae3 | 1036 | |
0aeff37a | 1037 | if (size > 0) { |
25e6bae3 | 1038 | /* copy value into pagelist */ |
33165d47 | 1039 | pagelist = ceph_pagelist_alloc(GFP_NOFS); |
25e6bae3 | 1040 | if (!pagelist) |
355da1eb | 1041 | return -ENOMEM; |
25e6bae3 | 1042 | |
25e6bae3 YZ |
1043 | err = ceph_pagelist_append(pagelist, value, size); |
1044 | if (err) | |
1045 | goto out; | |
0aeff37a | 1046 | } else if (!value) { |
04303d8a YZ |
1047 | if (flags & CEPH_XATTR_REPLACE) |
1048 | op = CEPH_MDS_OP_RMXATTR; | |
1049 | else | |
1050 | flags |= CEPH_XATTR_REMOVE; | |
355da1eb SW |
1051 | } |
1052 | ||
1053 | dout("setxattr value=%.*s\n", (int)size, value); | |
1054 | ||
1055 | /* do request */ | |
04303d8a | 1056 | req = ceph_mdsc_create_request(mdsc, op, USE_AUTH_MDS); |
60d87733 JL |
1057 | if (IS_ERR(req)) { |
1058 | err = PTR_ERR(req); | |
1059 | goto out; | |
1060 | } | |
a149bb9a | 1061 | |
355da1eb | 1062 | req->r_path2 = kstrdup(name, GFP_NOFS); |
a149bb9a SK |
1063 | if (!req->r_path2) { |
1064 | ceph_mdsc_put_request(req); | |
1065 | err = -ENOMEM; | |
1066 | goto out; | |
1067 | } | |
355da1eb | 1068 | |
04303d8a YZ |
1069 | if (op == CEPH_MDS_OP_SETXATTR) { |
1070 | req->r_args.setxattr.flags = cpu_to_le32(flags); | |
968cd14e XL |
1071 | req->r_args.setxattr.osdmap_epoch = |
1072 | cpu_to_le32(osdc->osdmap->epoch); | |
04303d8a YZ |
1073 | req->r_pagelist = pagelist; |
1074 | pagelist = NULL; | |
1075 | } | |
355da1eb | 1076 | |
a149bb9a SK |
1077 | req->r_inode = inode; |
1078 | ihold(inode); | |
1079 | req->r_num_caps = 1; | |
1080 | req->r_inode_drop = CEPH_CAP_XATTR_SHARED; | |
1081 | ||
355da1eb | 1082 | dout("xattr.ver (before): %lld\n", ci->i_xattrs.version); |
752c8bdc | 1083 | err = ceph_mdsc_do_request(mdsc, NULL, req); |
355da1eb SW |
1084 | ceph_mdsc_put_request(req); |
1085 | dout("xattr.ver (after): %lld\n", ci->i_xattrs.version); | |
1086 | ||
1087 | out: | |
25e6bae3 YZ |
1088 | if (pagelist) |
1089 | ceph_pagelist_release(pagelist); | |
355da1eb SW |
1090 | return err; |
1091 | } | |
1092 | ||
a26fecca | 1093 | int __ceph_setxattr(struct inode *inode, const char *name, |
7221fe4c | 1094 | const void *value, size_t size, int flags) |
355da1eb | 1095 | { |
881a5fa2 | 1096 | struct ceph_vxattr *vxattr; |
355da1eb | 1097 | struct ceph_inode_info *ci = ceph_inode(inode); |
a26fecca | 1098 | struct ceph_mds_client *mdsc = ceph_sb_to_client(inode->i_sb)->mdsc; |
f66fd9f0 | 1099 | struct ceph_cap_flush *prealloc_cf = NULL; |
86968ef2 | 1100 | struct ceph_buffer *old_blob = NULL; |
18fa8b3f | 1101 | int issued; |
355da1eb | 1102 | int err; |
fbc0b970 | 1103 | int dirty = 0; |
355da1eb SW |
1104 | int name_len = strlen(name); |
1105 | int val_len = size; | |
1106 | char *newname = NULL; | |
1107 | char *newval = NULL; | |
1108 | struct ceph_inode_xattr *xattr = NULL; | |
355da1eb | 1109 | int required_blob_size; |
f1919826 | 1110 | bool check_realm = false; |
604d1b02 | 1111 | bool lock_snap_rwsem = false; |
355da1eb | 1112 | |
2cdeb1e4 AG |
1113 | if (ceph_snap(inode) != CEPH_NOSNAP) |
1114 | return -EROFS; | |
355da1eb | 1115 | |
06476a69 | 1116 | vxattr = ceph_match_vxattr(inode, name); |
f1919826 | 1117 | if (vxattr) { |
4e9906e7 | 1118 | if (vxattr->flags & VXATTR_FLAG_READONLY) |
f1919826 YZ |
1119 | return -EOPNOTSUPP; |
1120 | if (value && !strncmp(vxattr->name, "ceph.quota", 10)) | |
1121 | check_realm = true; | |
1122 | } | |
355da1eb | 1123 | |
3adf654d SW |
1124 | /* pass any unhandled ceph.* xattrs through to the MDS */ |
1125 | if (!strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN)) | |
1126 | goto do_sync_unlocked; | |
1127 | ||
355da1eb SW |
1128 | /* preallocate memory for xattr name, value, index node */ |
1129 | err = -ENOMEM; | |
61413c2f | 1130 | newname = kmemdup(name, name_len + 1, GFP_NOFS); |
355da1eb SW |
1131 | if (!newname) |
1132 | goto out; | |
355da1eb SW |
1133 | |
1134 | if (val_len) { | |
b829c195 | 1135 | newval = kmemdup(value, val_len, GFP_NOFS); |
355da1eb SW |
1136 | if (!newval) |
1137 | goto out; | |
355da1eb SW |
1138 | } |
1139 | ||
1140 | xattr = kmalloc(sizeof(struct ceph_inode_xattr), GFP_NOFS); | |
1141 | if (!xattr) | |
1142 | goto out; | |
1143 | ||
f66fd9f0 YZ |
1144 | prealloc_cf = ceph_alloc_cap_flush(); |
1145 | if (!prealloc_cf) | |
1146 | goto out; | |
1147 | ||
be655596 | 1148 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
1149 | retry: |
1150 | issued = __ceph_caps_issued(ci, NULL); | |
508b32d8 | 1151 | if (ci->i_xattrs.version == 0 || !(issued & CEPH_CAP_XATTR_EXCL)) |
355da1eb | 1152 | goto do_sync; |
604d1b02 YZ |
1153 | |
1154 | if (!lock_snap_rwsem && !ci->i_head_snapc) { | |
1155 | lock_snap_rwsem = true; | |
1156 | if (!down_read_trylock(&mdsc->snap_rwsem)) { | |
1157 | spin_unlock(&ci->i_ceph_lock); | |
1158 | down_read(&mdsc->snap_rwsem); | |
1159 | spin_lock(&ci->i_ceph_lock); | |
1160 | goto retry; | |
1161 | } | |
1162 | } | |
1163 | ||
d36e0b62 JL |
1164 | dout("setxattr %p name '%s' issued %s\n", inode, name, |
1165 | ceph_cap_string(issued)); | |
355da1eb SW |
1166 | __build_xattrs(inode); |
1167 | ||
1168 | required_blob_size = __get_required_blob_size(ci, name_len, val_len); | |
1169 | ||
1170 | if (!ci->i_xattrs.prealloc_blob || | |
1171 | required_blob_size > ci->i_xattrs.prealloc_blob->alloc_len) { | |
18fa8b3f | 1172 | struct ceph_buffer *blob; |
355da1eb | 1173 | |
be655596 | 1174 | spin_unlock(&ci->i_ceph_lock); |
86968ef2 LH |
1175 | ceph_buffer_put(old_blob); /* Shouldn't be required */ |
1176 | dout(" pre-allocating new blob size=%d\n", required_blob_size); | |
b6c1d5b8 | 1177 | blob = ceph_buffer_new(required_blob_size, GFP_NOFS); |
355da1eb | 1178 | if (!blob) |
604d1b02 | 1179 | goto do_sync_unlocked; |
be655596 | 1180 | spin_lock(&ci->i_ceph_lock); |
86968ef2 | 1181 | /* prealloc_blob can't be released while holding i_ceph_lock */ |
b6c1d5b8 | 1182 | if (ci->i_xattrs.prealloc_blob) |
86968ef2 | 1183 | old_blob = ci->i_xattrs.prealloc_blob; |
355da1eb SW |
1184 | ci->i_xattrs.prealloc_blob = blob; |
1185 | goto retry; | |
1186 | } | |
1187 | ||
bcdfeb2e YZ |
1188 | err = __set_xattr(ci, newname, name_len, newval, val_len, |
1189 | flags, value ? 1 : -1, &xattr); | |
18fa8b3f | 1190 | |
fbc0b970 | 1191 | if (!err) { |
f66fd9f0 YZ |
1192 | dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_XATTR_EXCL, |
1193 | &prealloc_cf); | |
fbc0b970 | 1194 | ci->i_xattrs.dirty = true; |
c2050a45 | 1195 | inode->i_ctime = current_time(inode); |
fbc0b970 | 1196 | } |
18fa8b3f | 1197 | |
be655596 | 1198 | spin_unlock(&ci->i_ceph_lock); |
86968ef2 | 1199 | ceph_buffer_put(old_blob); |
604d1b02 YZ |
1200 | if (lock_snap_rwsem) |
1201 | up_read(&mdsc->snap_rwsem); | |
fca65b4a SW |
1202 | if (dirty) |
1203 | __mark_inode_dirty(inode, dirty); | |
f66fd9f0 | 1204 | ceph_free_cap_flush(prealloc_cf); |
355da1eb SW |
1205 | return err; |
1206 | ||
1207 | do_sync: | |
be655596 | 1208 | spin_unlock(&ci->i_ceph_lock); |
3adf654d | 1209 | do_sync_unlocked: |
604d1b02 YZ |
1210 | if (lock_snap_rwsem) |
1211 | up_read(&mdsc->snap_rwsem); | |
315f2408 YZ |
1212 | |
1213 | /* security module set xattr while filling trace */ | |
d37b1d99 | 1214 | if (current->journal_info) { |
315f2408 YZ |
1215 | pr_warn_ratelimited("sync setxattr %p " |
1216 | "during filling trace\n", inode); | |
1217 | err = -EBUSY; | |
1218 | } else { | |
a26fecca | 1219 | err = ceph_sync_setxattr(inode, name, value, size, flags); |
f1919826 YZ |
1220 | if (err >= 0 && check_realm) { |
1221 | /* check if snaprealm was created for quota inode */ | |
1222 | spin_lock(&ci->i_ceph_lock); | |
1223 | if ((ci->i_max_files || ci->i_max_bytes) && | |
1224 | !(ci->i_snap_realm && | |
1225 | ci->i_snap_realm->ino == ci->i_vino.ino)) | |
1226 | err = -EOPNOTSUPP; | |
1227 | spin_unlock(&ci->i_ceph_lock); | |
1228 | } | |
315f2408 | 1229 | } |
355da1eb | 1230 | out: |
f66fd9f0 | 1231 | ceph_free_cap_flush(prealloc_cf); |
355da1eb SW |
1232 | kfree(newname); |
1233 | kfree(newval); | |
1234 | kfree(xattr); | |
1235 | return err; | |
1236 | } | |
1237 | ||
2cdeb1e4 AG |
1238 | static int ceph_get_xattr_handler(const struct xattr_handler *handler, |
1239 | struct dentry *dentry, struct inode *inode, | |
1240 | const char *name, void *value, size_t size) | |
7221fe4c | 1241 | { |
2cdeb1e4 AG |
1242 | if (!ceph_is_valid_xattr(name)) |
1243 | return -EOPNOTSUPP; | |
1244 | return __ceph_getxattr(inode, name, value, size); | |
1245 | } | |
7221fe4c | 1246 | |
2cdeb1e4 | 1247 | static int ceph_set_xattr_handler(const struct xattr_handler *handler, |
e65ce2a5 | 1248 | struct user_namespace *mnt_userns, |
59301226 AV |
1249 | struct dentry *unused, struct inode *inode, |
1250 | const char *name, const void *value, | |
1251 | size_t size, int flags) | |
2cdeb1e4 AG |
1252 | { |
1253 | if (!ceph_is_valid_xattr(name)) | |
1254 | return -EOPNOTSUPP; | |
59301226 | 1255 | return __ceph_setxattr(inode, name, value, size, flags); |
7221fe4c | 1256 | } |
315f2408 | 1257 | |
5130ccea | 1258 | static const struct xattr_handler ceph_other_xattr_handler = { |
2cdeb1e4 AG |
1259 | .prefix = "", /* match any name => handlers called with full name */ |
1260 | .get = ceph_get_xattr_handler, | |
1261 | .set = ceph_set_xattr_handler, | |
1262 | }; | |
1263 | ||
315f2408 YZ |
1264 | #ifdef CONFIG_SECURITY |
1265 | bool ceph_security_xattr_wanted(struct inode *in) | |
1266 | { | |
1267 | return in->i_security != NULL; | |
1268 | } | |
1269 | ||
1270 | bool ceph_security_xattr_deadlock(struct inode *in) | |
1271 | { | |
1272 | struct ceph_inode_info *ci; | |
1273 | bool ret; | |
d37b1d99 | 1274 | if (!in->i_security) |
315f2408 YZ |
1275 | return false; |
1276 | ci = ceph_inode(in); | |
1277 | spin_lock(&ci->i_ceph_lock); | |
1278 | ret = !(ci->i_ceph_flags & CEPH_I_SEC_INITED) && | |
1279 | !(ci->i_xattrs.version > 0 && | |
1280 | __ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 0)); | |
1281 | spin_unlock(&ci->i_ceph_lock); | |
1282 | return ret; | |
1283 | } | |
ac6713cc YZ |
1284 | |
1285 | #ifdef CONFIG_CEPH_FS_SECURITY_LABEL | |
1286 | int ceph_security_init_secctx(struct dentry *dentry, umode_t mode, | |
1287 | struct ceph_acl_sec_ctx *as_ctx) | |
1288 | { | |
1289 | struct ceph_pagelist *pagelist = as_ctx->pagelist; | |
1290 | const char *name; | |
1291 | size_t name_len; | |
1292 | int err; | |
1293 | ||
1294 | err = security_dentry_init_security(dentry, mode, &dentry->d_name, | |
1295 | &as_ctx->sec_ctx, | |
1296 | &as_ctx->sec_ctxlen); | |
1297 | if (err < 0) { | |
1298 | WARN_ON_ONCE(err != -EOPNOTSUPP); | |
1299 | err = 0; /* do nothing */ | |
1300 | goto out; | |
1301 | } | |
1302 | ||
1303 | err = -ENOMEM; | |
1304 | if (!pagelist) { | |
1305 | pagelist = ceph_pagelist_alloc(GFP_KERNEL); | |
1306 | if (!pagelist) | |
1307 | goto out; | |
1308 | err = ceph_pagelist_reserve(pagelist, PAGE_SIZE); | |
1309 | if (err) | |
1310 | goto out; | |
1311 | ceph_pagelist_encode_32(pagelist, 1); | |
1312 | } | |
1313 | ||
1314 | /* | |
1315 | * FIXME: Make security_dentry_init_security() generic. Currently | |
1316 | * It only supports single security module and only selinux has | |
1317 | * dentry_init_security hook. | |
1318 | */ | |
1319 | name = XATTR_NAME_SELINUX; | |
1320 | name_len = strlen(name); | |
1321 | err = ceph_pagelist_reserve(pagelist, | |
1322 | 4 * 2 + name_len + as_ctx->sec_ctxlen); | |
1323 | if (err) | |
1324 | goto out; | |
1325 | ||
1326 | if (as_ctx->pagelist) { | |
1327 | /* update count of KV pairs */ | |
1328 | BUG_ON(pagelist->length <= sizeof(__le32)); | |
1329 | if (list_is_singular(&pagelist->head)) { | |
1330 | le32_add_cpu((__le32*)pagelist->mapped_tail, 1); | |
1331 | } else { | |
1332 | struct page *page = list_first_entry(&pagelist->head, | |
1333 | struct page, lru); | |
1334 | void *addr = kmap_atomic(page); | |
1335 | le32_add_cpu((__le32*)addr, 1); | |
1336 | kunmap_atomic(addr); | |
1337 | } | |
1338 | } else { | |
1339 | as_ctx->pagelist = pagelist; | |
1340 | } | |
1341 | ||
1342 | ceph_pagelist_encode_32(pagelist, name_len); | |
1343 | ceph_pagelist_append(pagelist, name, name_len); | |
1344 | ||
1345 | ceph_pagelist_encode_32(pagelist, as_ctx->sec_ctxlen); | |
1346 | ceph_pagelist_append(pagelist, as_ctx->sec_ctx, as_ctx->sec_ctxlen); | |
1347 | ||
1348 | err = 0; | |
1349 | out: | |
1350 | if (pagelist && !as_ctx->pagelist) | |
1351 | ceph_pagelist_release(pagelist); | |
1352 | return err; | |
1353 | } | |
668959a5 JL |
1354 | #endif /* CONFIG_CEPH_FS_SECURITY_LABEL */ |
1355 | #endif /* CONFIG_SECURITY */ | |
5c31e92d YZ |
1356 | |
1357 | void ceph_release_acl_sec_ctx(struct ceph_acl_sec_ctx *as_ctx) | |
1358 | { | |
1359 | #ifdef CONFIG_CEPH_FS_POSIX_ACL | |
1360 | posix_acl_release(as_ctx->acl); | |
1361 | posix_acl_release(as_ctx->default_acl); | |
ac6713cc YZ |
1362 | #endif |
1363 | #ifdef CONFIG_CEPH_FS_SECURITY_LABEL | |
1364 | security_release_secctx(as_ctx->sec_ctx, as_ctx->sec_ctxlen); | |
5c31e92d YZ |
1365 | #endif |
1366 | if (as_ctx->pagelist) | |
1367 | ceph_pagelist_release(as_ctx->pagelist); | |
1368 | } | |
ac6713cc YZ |
1369 | |
1370 | /* | |
1371 | * List of handlers for synthetic system.* attributes. Other | |
1372 | * attributes are handled directly. | |
1373 | */ | |
1374 | const struct xattr_handler *ceph_xattr_handlers[] = { | |
1375 | #ifdef CONFIG_CEPH_FS_POSIX_ACL | |
1376 | &posix_acl_access_xattr_handler, | |
1377 | &posix_acl_default_xattr_handler, | |
ac6713cc YZ |
1378 | #endif |
1379 | &ceph_other_xattr_handler, | |
1380 | NULL, | |
1381 | }; |