]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - fs/ceph/xattr.c
Merge remote-tracking branch 'asoc/for-5.14' into asoc-linus
[mirror_ubuntu-jammy-kernel.git] / fs / ceph / xattr.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
3d14c5d2 2#include <linux/ceph/ceph_debug.h>
25e6bae3 3#include <linux/ceph/pagelist.h>
3d14c5d2 4
355da1eb 5#include "super.h"
3d14c5d2
YS
6#include "mds_client.h"
7
8#include <linux/ceph/decode.h>
355da1eb
SW
9
10#include <linux/xattr.h>
ac6713cc 11#include <linux/security.h>
4db658ea 12#include <linux/posix_acl_xattr.h>
5a0e3ad6 13#include <linux/slab.h>
355da1eb 14
22891907
AE
15#define XATTR_CEPH_PREFIX "ceph."
16#define XATTR_CEPH_PREFIX_LEN (sizeof (XATTR_CEPH_PREFIX) - 1)
17
bcdfeb2e
YZ
18static int __remove_xattr(struct ceph_inode_info *ci,
19 struct ceph_inode_xattr *xattr);
20
355da1eb
SW
21static bool ceph_is_valid_xattr(const char *name)
22{
b8fe918b
JL
23 return !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) ||
24 !strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN) ||
355da1eb
SW
25 !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) ||
26 !strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN);
27}
28
29/*
30 * These define virtual xattrs exposing the recursive directory
31 * statistics and layout metadata.
32 */
881a5fa2 33struct ceph_vxattr {
355da1eb 34 char *name;
3ce6cd12 35 size_t name_size; /* strlen(name) + 1 (for '\0') */
f1d1b51d
JL
36 ssize_t (*getxattr_cb)(struct ceph_inode_info *ci, char *val,
37 size_t size);
f36e4472 38 bool (*exists_cb)(struct ceph_inode_info *ci);
4e9906e7 39 unsigned int flags;
355da1eb
SW
40};
41
4e9906e7
YZ
42#define VXATTR_FLAG_READONLY (1<<0)
43#define VXATTR_FLAG_HIDDEN (1<<1)
49a9f4f6 44#define VXATTR_FLAG_RSTAT (1<<2)
81048c00 45#define VXATTR_FLAG_DIRSTAT (1<<3)
4e9906e7 46
32ab0bd7
SW
47/* layouts */
48
49static bool ceph_vxattrcb_layout_exists(struct ceph_inode_info *ci)
50{
779fe0fb
YZ
51 struct ceph_file_layout *fl = &ci->i_layout;
52 return (fl->stripe_unit > 0 || fl->stripe_count > 0 ||
53 fl->object_size > 0 || fl->pool_id >= 0 ||
54 rcu_dereference_raw(fl->pool_ns) != NULL);
32ab0bd7
SW
55}
56
f1d1b51d
JL
57static ssize_t ceph_vxattrcb_layout(struct ceph_inode_info *ci, char *val,
58 size_t size)
32ab0bd7 59{
32ab0bd7
SW
60 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb);
61 struct ceph_osd_client *osdc = &fsc->client->osdc;
779fe0fb 62 struct ceph_string *pool_ns;
7627151e 63 s64 pool = ci->i_layout.pool_id;
32ab0bd7 64 const char *pool_name;
779fe0fb 65 const char *ns_field = " pool_namespace=";
1e5c6649 66 char buf[128];
779fe0fb 67 size_t len, total_len = 0;
3b421018 68 ssize_t ret;
779fe0fb
YZ
69
70 pool_ns = ceph_try_get_string(ci->i_layout.pool_ns);
32ab0bd7
SW
71
72 dout("ceph_vxattrcb_layout %p\n", &ci->vfs_inode);
5aea3dcd 73 down_read(&osdc->lock);
32ab0bd7 74 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
1e5c6649 75 if (pool_name) {
779fe0fb 76 len = snprintf(buf, sizeof(buf),
7627151e
YZ
77 "stripe_unit=%u stripe_count=%u object_size=%u pool=",
78 ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
79 ci->i_layout.object_size);
779fe0fb 80 total_len = len + strlen(pool_name);
1e5c6649 81 } else {
779fe0fb 82 len = snprintf(buf, sizeof(buf),
7627151e
YZ
83 "stripe_unit=%u stripe_count=%u object_size=%u pool=%lld",
84 ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
f1d1b51d 85 ci->i_layout.object_size, pool);
779fe0fb
YZ
86 total_len = len;
87 }
88
89 if (pool_ns)
90 total_len += strlen(ns_field) + pool_ns->len;
91
3b421018
JL
92 ret = total_len;
93 if (size >= total_len) {
779fe0fb
YZ
94 memcpy(val, buf, len);
95 ret = len;
96 if (pool_name) {
97 len = strlen(pool_name);
98 memcpy(val + ret, pool_name, len);
99 ret += len;
100 }
101 if (pool_ns) {
102 len = strlen(ns_field);
103 memcpy(val + ret, ns_field, len);
104 ret += len;
105 memcpy(val + ret, pool_ns->str, pool_ns->len);
106 ret += pool_ns->len;
1e5c6649
YZ
107 }
108 }
5aea3dcd 109 up_read(&osdc->lock);
779fe0fb 110 ceph_put_string(pool_ns);
32ab0bd7
SW
111 return ret;
112}
113
26350535
JL
114/*
115 * The convention with strings in xattrs is that they should not be NULL
116 * terminated, since we're returning the length with them. snprintf always
117 * NULL terminates however, so call it on a temporary buffer and then memcpy
118 * the result into place.
119 */
f6fbdcd9
ID
120static __printf(3, 4)
121int ceph_fmt_xattr(char *val, size_t size, const char *fmt, ...)
26350535
JL
122{
123 int ret;
124 va_list args;
125 char buf[96]; /* NB: reevaluate size if new vxattrs are added */
126
127 va_start(args, fmt);
128 ret = vsnprintf(buf, size ? sizeof(buf) : 0, fmt, args);
129 va_end(args);
130
131 /* Sanity check */
132 if (size && ret + 1 > sizeof(buf)) {
133 WARN_ONCE(true, "Returned length too big (%d)", ret);
134 return -E2BIG;
135 }
136
137 if (ret <= size)
138 memcpy(val, buf, ret);
139 return ret;
140}
141
f1d1b51d
JL
142static ssize_t ceph_vxattrcb_layout_stripe_unit(struct ceph_inode_info *ci,
143 char *val, size_t size)
695b7119 144{
26350535 145 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_unit);
695b7119
SW
146}
147
f1d1b51d
JL
148static ssize_t ceph_vxattrcb_layout_stripe_count(struct ceph_inode_info *ci,
149 char *val, size_t size)
695b7119 150{
26350535 151 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_count);
695b7119
SW
152}
153
f1d1b51d
JL
154static ssize_t ceph_vxattrcb_layout_object_size(struct ceph_inode_info *ci,
155 char *val, size_t size)
695b7119 156{
26350535 157 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.object_size);
695b7119
SW
158}
159
f1d1b51d
JL
160static ssize_t ceph_vxattrcb_layout_pool(struct ceph_inode_info *ci,
161 char *val, size_t size)
695b7119 162{
f1d1b51d 163 ssize_t ret;
695b7119
SW
164 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb);
165 struct ceph_osd_client *osdc = &fsc->client->osdc;
7627151e 166 s64 pool = ci->i_layout.pool_id;
695b7119
SW
167 const char *pool_name;
168
5aea3dcd 169 down_read(&osdc->lock);
695b7119 170 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
26350535
JL
171 if (pool_name) {
172 ret = strlen(pool_name);
173 if (ret <= size)
174 memcpy(val, pool_name, ret);
175 } else {
176 ret = ceph_fmt_xattr(val, size, "%lld", pool);
177 }
5aea3dcd 178 up_read(&osdc->lock);
695b7119
SW
179 return ret;
180}
181
f1d1b51d
JL
182static ssize_t ceph_vxattrcb_layout_pool_namespace(struct ceph_inode_info *ci,
183 char *val, size_t size)
779fe0fb 184{
26350535 185 ssize_t ret = 0;
779fe0fb 186 struct ceph_string *ns = ceph_try_get_string(ci->i_layout.pool_ns);
26350535 187
779fe0fb 188 if (ns) {
26350535
JL
189 ret = ns->len;
190 if (ret <= size)
191 memcpy(val, ns->str, ret);
779fe0fb
YZ
192 ceph_put_string(ns);
193 }
194 return ret;
195}
196
355da1eb
SW
197/* directories */
198
f1d1b51d
JL
199static ssize_t ceph_vxattrcb_dir_entries(struct ceph_inode_info *ci, char *val,
200 size_t size)
355da1eb 201{
26350535 202 return ceph_fmt_xattr(val, size, "%lld", ci->i_files + ci->i_subdirs);
355da1eb
SW
203}
204
f1d1b51d
JL
205static ssize_t ceph_vxattrcb_dir_files(struct ceph_inode_info *ci, char *val,
206 size_t size)
355da1eb 207{
26350535 208 return ceph_fmt_xattr(val, size, "%lld", ci->i_files);
355da1eb
SW
209}
210
f1d1b51d
JL
211static ssize_t ceph_vxattrcb_dir_subdirs(struct ceph_inode_info *ci, char *val,
212 size_t size)
355da1eb 213{
26350535 214 return ceph_fmt_xattr(val, size, "%lld", ci->i_subdirs);
355da1eb
SW
215}
216
f1d1b51d
JL
217static ssize_t ceph_vxattrcb_dir_rentries(struct ceph_inode_info *ci, char *val,
218 size_t size)
355da1eb 219{
26350535
JL
220 return ceph_fmt_xattr(val, size, "%lld",
221 ci->i_rfiles + ci->i_rsubdirs);
355da1eb
SW
222}
223
f1d1b51d
JL
224static ssize_t ceph_vxattrcb_dir_rfiles(struct ceph_inode_info *ci, char *val,
225 size_t size)
355da1eb 226{
26350535 227 return ceph_fmt_xattr(val, size, "%lld", ci->i_rfiles);
355da1eb
SW
228}
229
f1d1b51d
JL
230static ssize_t ceph_vxattrcb_dir_rsubdirs(struct ceph_inode_info *ci, char *val,
231 size_t size)
355da1eb 232{
26350535 233 return ceph_fmt_xattr(val, size, "%lld", ci->i_rsubdirs);
355da1eb
SW
234}
235
e7f72952
YC
236static ssize_t ceph_vxattrcb_dir_rsnaps(struct ceph_inode_info *ci, char *val,
237 size_t size)
238{
239 return ceph_fmt_xattr(val, size, "%lld", ci->i_rsnaps);
240}
241
f1d1b51d
JL
242static ssize_t ceph_vxattrcb_dir_rbytes(struct ceph_inode_info *ci, char *val,
243 size_t size)
355da1eb 244{
26350535 245 return ceph_fmt_xattr(val, size, "%lld", ci->i_rbytes);
355da1eb
SW
246}
247
f1d1b51d
JL
248static ssize_t ceph_vxattrcb_dir_rctime(struct ceph_inode_info *ci, char *val,
249 size_t size)
355da1eb 250{
26350535
JL
251 return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_rctime.tv_sec,
252 ci->i_rctime.tv_nsec);
355da1eb
SW
253}
254
08796873
YZ
255/* dir pin */
256static bool ceph_vxattrcb_dir_pin_exists(struct ceph_inode_info *ci)
257{
258 return ci->i_dir_pin != -ENODATA;
259}
260
f1d1b51d
JL
261static ssize_t ceph_vxattrcb_dir_pin(struct ceph_inode_info *ci, char *val,
262 size_t size)
08796873 263{
26350535 264 return ceph_fmt_xattr(val, size, "%d", (int)ci->i_dir_pin);
08796873 265}
fb18a575 266
08796873 267/* quotas */
fb18a575
LH
268static bool ceph_vxattrcb_quota_exists(struct ceph_inode_info *ci)
269{
f1919826
YZ
270 bool ret = false;
271 spin_lock(&ci->i_ceph_lock);
272 if ((ci->i_max_files || ci->i_max_bytes) &&
273 ci->i_vino.snap == CEPH_NOSNAP &&
274 ci->i_snap_realm &&
275 ci->i_snap_realm->ino == ci->i_vino.ino)
276 ret = true;
277 spin_unlock(&ci->i_ceph_lock);
278 return ret;
fb18a575
LH
279}
280
f1d1b51d
JL
281static ssize_t ceph_vxattrcb_quota(struct ceph_inode_info *ci, char *val,
282 size_t size)
fb18a575 283{
26350535
JL
284 return ceph_fmt_xattr(val, size, "max_bytes=%llu max_files=%llu",
285 ci->i_max_bytes, ci->i_max_files);
fb18a575
LH
286}
287
f1d1b51d
JL
288static ssize_t ceph_vxattrcb_quota_max_bytes(struct ceph_inode_info *ci,
289 char *val, size_t size)
fb18a575 290{
26350535 291 return ceph_fmt_xattr(val, size, "%llu", ci->i_max_bytes);
fb18a575
LH
292}
293
f1d1b51d
JL
294static ssize_t ceph_vxattrcb_quota_max_files(struct ceph_inode_info *ci,
295 char *val, size_t size)
fb18a575 296{
26350535 297 return ceph_fmt_xattr(val, size, "%llu", ci->i_max_files);
fb18a575 298}
32ab0bd7 299
100cc610
DD
300/* snapshots */
301static bool ceph_vxattrcb_snap_btime_exists(struct ceph_inode_info *ci)
302{
303 return (ci->i_snap_btime.tv_sec != 0 || ci->i_snap_btime.tv_nsec != 0);
304}
305
f1d1b51d
JL
306static ssize_t ceph_vxattrcb_snap_btime(struct ceph_inode_info *ci, char *val,
307 size_t size)
100cc610 308{
26350535
JL
309 return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_snap_btime.tv_sec,
310 ci->i_snap_btime.tv_nsec);
100cc610
DD
311}
312
5a9e2f5d
XL
313static ssize_t ceph_vxattrcb_cluster_fsid(struct ceph_inode_info *ci,
314 char *val, size_t size)
315{
316 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb);
317
318 return ceph_fmt_xattr(val, size, "%pU", &fsc->client->fsid);
319}
320
321static ssize_t ceph_vxattrcb_client_id(struct ceph_inode_info *ci,
322 char *val, size_t size)
323{
324 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb);
325
326 return ceph_fmt_xattr(val, size, "client%lld",
327 ceph_client_gid(fsc->client));
328}
329
dd980fc0
LH
330static ssize_t ceph_vxattrcb_caps(struct ceph_inode_info *ci, char *val,
331 size_t size)
332{
333 int issued;
334
335 spin_lock(&ci->i_ceph_lock);
336 issued = __ceph_caps_issued(ci, NULL);
337 spin_unlock(&ci->i_ceph_lock);
338
339 return ceph_fmt_xattr(val, size, "%s/0x%x",
340 ceph_cap_string(issued), issued);
341}
342
eb788084 343#define CEPH_XATTR_NAME(_type, _name) XATTR_CEPH_PREFIX #_type "." #_name
695b7119
SW
344#define CEPH_XATTR_NAME2(_type, _name, _name2) \
345 XATTR_CEPH_PREFIX #_type "." #_name "." #_name2
eb788084 346
49a9f4f6 347#define XATTR_NAME_CEPH(_type, _name, _flags) \
8860147a
SW
348 { \
349 .name = CEPH_XATTR_NAME(_type, _name), \
350 .name_size = sizeof (CEPH_XATTR_NAME(_type, _name)), \
351 .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \
49a9f4f6
YZ
352 .exists_cb = NULL, \
353 .flags = (VXATTR_FLAG_READONLY | _flags), \
8860147a 354 }
49a9f4f6
YZ
355#define XATTR_RSTAT_FIELD(_type, _name) \
356 XATTR_NAME_CEPH(_type, _name, VXATTR_FLAG_RSTAT)
695b7119
SW
357#define XATTR_LAYOUT_FIELD(_type, _name, _field) \
358 { \
359 .name = CEPH_XATTR_NAME2(_type, _name, _field), \
360 .name_size = sizeof (CEPH_XATTR_NAME2(_type, _name, _field)), \
361 .getxattr_cb = ceph_vxattrcb_ ## _name ## _ ## _field, \
695b7119 362 .exists_cb = ceph_vxattrcb_layout_exists, \
4e9906e7 363 .flags = VXATTR_FLAG_HIDDEN, \
695b7119 364 }
fb18a575
LH
365#define XATTR_QUOTA_FIELD(_type, _name) \
366 { \
367 .name = CEPH_XATTR_NAME(_type, _name), \
368 .name_size = sizeof(CEPH_XATTR_NAME(_type, _name)), \
369 .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \
fb18a575 370 .exists_cb = ceph_vxattrcb_quota_exists, \
4e9906e7 371 .flags = VXATTR_FLAG_HIDDEN, \
fb18a575 372 }
eb788084 373
881a5fa2 374static struct ceph_vxattr ceph_dir_vxattrs[] = {
1f08f2b0
SW
375 {
376 .name = "ceph.dir.layout",
377 .name_size = sizeof("ceph.dir.layout"),
378 .getxattr_cb = ceph_vxattrcb_layout,
1f08f2b0 379 .exists_cb = ceph_vxattrcb_layout_exists,
4e9906e7 380 .flags = VXATTR_FLAG_HIDDEN,
1f08f2b0 381 },
695b7119
SW
382 XATTR_LAYOUT_FIELD(dir, layout, stripe_unit),
383 XATTR_LAYOUT_FIELD(dir, layout, stripe_count),
384 XATTR_LAYOUT_FIELD(dir, layout, object_size),
385 XATTR_LAYOUT_FIELD(dir, layout, pool),
779fe0fb 386 XATTR_LAYOUT_FIELD(dir, layout, pool_namespace),
81048c00
JL
387 XATTR_NAME_CEPH(dir, entries, VXATTR_FLAG_DIRSTAT),
388 XATTR_NAME_CEPH(dir, files, VXATTR_FLAG_DIRSTAT),
389 XATTR_NAME_CEPH(dir, subdirs, VXATTR_FLAG_DIRSTAT),
49a9f4f6
YZ
390 XATTR_RSTAT_FIELD(dir, rentries),
391 XATTR_RSTAT_FIELD(dir, rfiles),
392 XATTR_RSTAT_FIELD(dir, rsubdirs),
e7f72952 393 XATTR_RSTAT_FIELD(dir, rsnaps),
49a9f4f6
YZ
394 XATTR_RSTAT_FIELD(dir, rbytes),
395 XATTR_RSTAT_FIELD(dir, rctime),
08796873
YZ
396 {
397 .name = "ceph.dir.pin",
e1b81439 398 .name_size = sizeof("ceph.dir.pin"),
08796873
YZ
399 .getxattr_cb = ceph_vxattrcb_dir_pin,
400 .exists_cb = ceph_vxattrcb_dir_pin_exists,
401 .flags = VXATTR_FLAG_HIDDEN,
402 },
fb18a575
LH
403 {
404 .name = "ceph.quota",
405 .name_size = sizeof("ceph.quota"),
406 .getxattr_cb = ceph_vxattrcb_quota,
fb18a575 407 .exists_cb = ceph_vxattrcb_quota_exists,
4e9906e7 408 .flags = VXATTR_FLAG_HIDDEN,
fb18a575
LH
409 },
410 XATTR_QUOTA_FIELD(quota, max_bytes),
411 XATTR_QUOTA_FIELD(quota, max_files),
100cc610
DD
412 {
413 .name = "ceph.snap.btime",
414 .name_size = sizeof("ceph.snap.btime"),
415 .getxattr_cb = ceph_vxattrcb_snap_btime,
416 .exists_cb = ceph_vxattrcb_snap_btime_exists,
417 .flags = VXATTR_FLAG_READONLY,
418 },
dd980fc0
LH
419 {
420 .name = "ceph.caps",
421 .name_size = sizeof("ceph.caps"),
422 .getxattr_cb = ceph_vxattrcb_caps,
423 .exists_cb = NULL,
424 .flags = VXATTR_FLAG_HIDDEN,
425 },
2c3dd4ff 426 { .name = NULL, 0 } /* Required table terminator */
355da1eb
SW
427};
428
429/* files */
430
881a5fa2 431static struct ceph_vxattr ceph_file_vxattrs[] = {
32ab0bd7
SW
432 {
433 .name = "ceph.file.layout",
434 .name_size = sizeof("ceph.file.layout"),
435 .getxattr_cb = ceph_vxattrcb_layout,
32ab0bd7 436 .exists_cb = ceph_vxattrcb_layout_exists,
4e9906e7 437 .flags = VXATTR_FLAG_HIDDEN,
32ab0bd7 438 },
695b7119
SW
439 XATTR_LAYOUT_FIELD(file, layout, stripe_unit),
440 XATTR_LAYOUT_FIELD(file, layout, stripe_count),
441 XATTR_LAYOUT_FIELD(file, layout, object_size),
442 XATTR_LAYOUT_FIELD(file, layout, pool),
779fe0fb 443 XATTR_LAYOUT_FIELD(file, layout, pool_namespace),
100cc610
DD
444 {
445 .name = "ceph.snap.btime",
446 .name_size = sizeof("ceph.snap.btime"),
447 .getxattr_cb = ceph_vxattrcb_snap_btime,
448 .exists_cb = ceph_vxattrcb_snap_btime_exists,
449 .flags = VXATTR_FLAG_READONLY,
450 },
dd980fc0
LH
451 {
452 .name = "ceph.caps",
453 .name_size = sizeof("ceph.caps"),
454 .getxattr_cb = ceph_vxattrcb_caps,
455 .exists_cb = NULL,
456 .flags = VXATTR_FLAG_HIDDEN,
457 },
2c3dd4ff 458 { .name = NULL, 0 } /* Required table terminator */
355da1eb
SW
459};
460
5a9e2f5d
XL
461static struct ceph_vxattr ceph_common_vxattrs[] = {
462 {
463 .name = "ceph.cluster_fsid",
464 .name_size = sizeof("ceph.cluster_fsid"),
465 .getxattr_cb = ceph_vxattrcb_cluster_fsid,
466 .exists_cb = NULL,
467 .flags = VXATTR_FLAG_READONLY,
468 },
469 {
470 .name = "ceph.client_id",
471 .name_size = sizeof("ceph.client_id"),
472 .getxattr_cb = ceph_vxattrcb_client_id,
473 .exists_cb = NULL,
474 .flags = VXATTR_FLAG_READONLY,
475 },
476 { .name = NULL, 0 } /* Required table terminator */
477};
478
881a5fa2 479static struct ceph_vxattr *ceph_inode_vxattrs(struct inode *inode)
355da1eb
SW
480{
481 if (S_ISDIR(inode->i_mode))
482 return ceph_dir_vxattrs;
483 else if (S_ISREG(inode->i_mode))
484 return ceph_file_vxattrs;
485 return NULL;
486}
487
881a5fa2 488static struct ceph_vxattr *ceph_match_vxattr(struct inode *inode,
355da1eb
SW
489 const char *name)
490{
881a5fa2 491 struct ceph_vxattr *vxattr = ceph_inode_vxattrs(inode);
06476a69
AE
492
493 if (vxattr) {
494 while (vxattr->name) {
495 if (!strcmp(vxattr->name, name))
496 return vxattr;
497 vxattr++;
498 }
499 }
5a9e2f5d
XL
500
501 vxattr = ceph_common_vxattrs;
502 while (vxattr->name) {
503 if (!strcmp(vxattr->name, name))
504 return vxattr;
505 vxattr++;
506 }
06476a69 507
355da1eb
SW
508 return NULL;
509}
510
511static int __set_xattr(struct ceph_inode_info *ci,
512 const char *name, int name_len,
513 const char *val, int val_len,
fbc0b970 514 int flags, int update_xattr,
355da1eb
SW
515 struct ceph_inode_xattr **newxattr)
516{
517 struct rb_node **p;
518 struct rb_node *parent = NULL;
519 struct ceph_inode_xattr *xattr = NULL;
520 int c;
521 int new = 0;
522
523 p = &ci->i_xattrs.index.rb_node;
524 while (*p) {
525 parent = *p;
526 xattr = rb_entry(parent, struct ceph_inode_xattr, node);
527 c = strncmp(name, xattr->name, min(name_len, xattr->name_len));
528 if (c < 0)
529 p = &(*p)->rb_left;
530 else if (c > 0)
531 p = &(*p)->rb_right;
532 else {
533 if (name_len == xattr->name_len)
534 break;
535 else if (name_len < xattr->name_len)
536 p = &(*p)->rb_left;
537 else
538 p = &(*p)->rb_right;
539 }
540 xattr = NULL;
541 }
542
fbc0b970
YZ
543 if (update_xattr) {
544 int err = 0;
eeca958d 545
fbc0b970
YZ
546 if (xattr && (flags & XATTR_CREATE))
547 err = -EEXIST;
548 else if (!xattr && (flags & XATTR_REPLACE))
549 err = -ENODATA;
550 if (err) {
551 kfree(name);
552 kfree(val);
eeca958d 553 kfree(*newxattr);
fbc0b970
YZ
554 return err;
555 }
bcdfeb2e
YZ
556 if (update_xattr < 0) {
557 if (xattr)
558 __remove_xattr(ci, xattr);
559 kfree(name);
eeca958d 560 kfree(*newxattr);
bcdfeb2e
YZ
561 return 0;
562 }
fbc0b970
YZ
563 }
564
355da1eb
SW
565 if (!xattr) {
566 new = 1;
567 xattr = *newxattr;
568 xattr->name = name;
569 xattr->name_len = name_len;
fbc0b970 570 xattr->should_free_name = update_xattr;
355da1eb
SW
571
572 ci->i_xattrs.count++;
573 dout("__set_xattr count=%d\n", ci->i_xattrs.count);
574 } else {
575 kfree(*newxattr);
576 *newxattr = NULL;
577 if (xattr->should_free_val)
c00e4522 578 kfree(xattr->val);
355da1eb 579
fbc0b970 580 if (update_xattr) {
c00e4522 581 kfree(name);
355da1eb
SW
582 name = xattr->name;
583 }
584 ci->i_xattrs.names_size -= xattr->name_len;
585 ci->i_xattrs.vals_size -= xattr->val_len;
586 }
355da1eb
SW
587 ci->i_xattrs.names_size += name_len;
588 ci->i_xattrs.vals_size += val_len;
589 if (val)
590 xattr->val = val;
591 else
592 xattr->val = "";
593
594 xattr->val_len = val_len;
fbc0b970
YZ
595 xattr->dirty = update_xattr;
596 xattr->should_free_val = (val && update_xattr);
355da1eb
SW
597
598 if (new) {
599 rb_link_node(&xattr->node, parent, p);
600 rb_insert_color(&xattr->node, &ci->i_xattrs.index);
601 dout("__set_xattr_val p=%p\n", p);
602 }
603
05729781
YZ
604 dout("__set_xattr_val added %llx.%llx xattr %p %.*s=%.*s\n",
605 ceph_vinop(&ci->vfs_inode), xattr, name_len, name, val_len, val);
355da1eb
SW
606
607 return 0;
608}
609
610static struct ceph_inode_xattr *__get_xattr(struct ceph_inode_info *ci,
611 const char *name)
612{
613 struct rb_node **p;
614 struct rb_node *parent = NULL;
615 struct ceph_inode_xattr *xattr = NULL;
17db143f 616 int name_len = strlen(name);
355da1eb
SW
617 int c;
618
619 p = &ci->i_xattrs.index.rb_node;
620 while (*p) {
621 parent = *p;
622 xattr = rb_entry(parent, struct ceph_inode_xattr, node);
623 c = strncmp(name, xattr->name, xattr->name_len);
17db143f
SW
624 if (c == 0 && name_len > xattr->name_len)
625 c = 1;
355da1eb
SW
626 if (c < 0)
627 p = &(*p)->rb_left;
628 else if (c > 0)
629 p = &(*p)->rb_right;
630 else {
631 dout("__get_xattr %s: found %.*s\n", name,
632 xattr->val_len, xattr->val);
633 return xattr;
634 }
635 }
636
637 dout("__get_xattr %s: not found\n", name);
638
639 return NULL;
640}
641
642static void __free_xattr(struct ceph_inode_xattr *xattr)
643{
644 BUG_ON(!xattr);
645
646 if (xattr->should_free_name)
c00e4522 647 kfree(xattr->name);
355da1eb 648 if (xattr->should_free_val)
c00e4522 649 kfree(xattr->val);
355da1eb
SW
650
651 kfree(xattr);
652}
653
654static int __remove_xattr(struct ceph_inode_info *ci,
655 struct ceph_inode_xattr *xattr)
656{
657 if (!xattr)
524186ac 658 return -ENODATA;
355da1eb
SW
659
660 rb_erase(&xattr->node, &ci->i_xattrs.index);
661
662 if (xattr->should_free_name)
c00e4522 663 kfree(xattr->name);
355da1eb 664 if (xattr->should_free_val)
c00e4522 665 kfree(xattr->val);
355da1eb
SW
666
667 ci->i_xattrs.names_size -= xattr->name_len;
668 ci->i_xattrs.vals_size -= xattr->val_len;
669 ci->i_xattrs.count--;
670 kfree(xattr);
671
672 return 0;
673}
674
355da1eb
SW
675static char *__copy_xattr_names(struct ceph_inode_info *ci,
676 char *dest)
677{
678 struct rb_node *p;
679 struct ceph_inode_xattr *xattr = NULL;
680
681 p = rb_first(&ci->i_xattrs.index);
682 dout("__copy_xattr_names count=%d\n", ci->i_xattrs.count);
683
684 while (p) {
685 xattr = rb_entry(p, struct ceph_inode_xattr, node);
686 memcpy(dest, xattr->name, xattr->name_len);
687 dest[xattr->name_len] = '\0';
688
689 dout("dest=%s %p (%s) (%d/%d)\n", dest, xattr, xattr->name,
690 xattr->name_len, ci->i_xattrs.names_size);
691
692 dest += xattr->name_len + 1;
693 p = rb_next(p);
694 }
695
696 return dest;
697}
698
699void __ceph_destroy_xattrs(struct ceph_inode_info *ci)
700{
701 struct rb_node *p, *tmp;
702 struct ceph_inode_xattr *xattr = NULL;
703
704 p = rb_first(&ci->i_xattrs.index);
705
706 dout("__ceph_destroy_xattrs p=%p\n", p);
707
708 while (p) {
709 xattr = rb_entry(p, struct ceph_inode_xattr, node);
710 tmp = p;
711 p = rb_next(tmp);
712 dout("__ceph_destroy_xattrs next p=%p (%.*s)\n", p,
713 xattr->name_len, xattr->name);
714 rb_erase(tmp, &ci->i_xattrs.index);
715
716 __free_xattr(xattr);
717 }
718
719 ci->i_xattrs.names_size = 0;
720 ci->i_xattrs.vals_size = 0;
721 ci->i_xattrs.index_version = 0;
722 ci->i_xattrs.count = 0;
723 ci->i_xattrs.index = RB_ROOT;
724}
725
726static int __build_xattrs(struct inode *inode)
be655596
SW
727 __releases(ci->i_ceph_lock)
728 __acquires(ci->i_ceph_lock)
355da1eb
SW
729{
730 u32 namelen;
731 u32 numattr = 0;
732 void *p, *end;
733 u32 len;
734 const char *name, *val;
735 struct ceph_inode_info *ci = ceph_inode(inode);
0eb30853 736 u64 xattr_version;
355da1eb 737 struct ceph_inode_xattr **xattrs = NULL;
63ff78b2 738 int err = 0;
355da1eb
SW
739 int i;
740
741 dout("__build_xattrs() len=%d\n",
742 ci->i_xattrs.blob ? (int)ci->i_xattrs.blob->vec.iov_len : 0);
743
744 if (ci->i_xattrs.index_version >= ci->i_xattrs.version)
745 return 0; /* already built */
746
747 __ceph_destroy_xattrs(ci);
748
749start:
750 /* updated internal xattr rb tree */
751 if (ci->i_xattrs.blob && ci->i_xattrs.blob->vec.iov_len > 4) {
752 p = ci->i_xattrs.blob->vec.iov_base;
753 end = p + ci->i_xattrs.blob->vec.iov_len;
754 ceph_decode_32_safe(&p, end, numattr, bad);
755 xattr_version = ci->i_xattrs.version;
be655596 756 spin_unlock(&ci->i_ceph_lock);
355da1eb 757
7e8a2952 758 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *),
355da1eb
SW
759 GFP_NOFS);
760 err = -ENOMEM;
761 if (!xattrs)
762 goto bad_lock;
1a295bd8 763
355da1eb
SW
764 for (i = 0; i < numattr; i++) {
765 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr),
766 GFP_NOFS);
767 if (!xattrs[i])
768 goto bad_lock;
769 }
770
be655596 771 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
772 if (ci->i_xattrs.version != xattr_version) {
773 /* lost a race, retry */
774 for (i = 0; i < numattr; i++)
775 kfree(xattrs[i]);
776 kfree(xattrs);
21ec6ffa 777 xattrs = NULL;
355da1eb
SW
778 goto start;
779 }
780 err = -EIO;
781 while (numattr--) {
782 ceph_decode_32_safe(&p, end, len, bad);
783 namelen = len;
784 name = p;
785 p += len;
786 ceph_decode_32_safe(&p, end, len, bad);
787 val = p;
788 p += len;
789
790 err = __set_xattr(ci, name, namelen, val, len,
fbc0b970 791 0, 0, &xattrs[numattr]);
355da1eb
SW
792
793 if (err < 0)
794 goto bad;
795 }
796 kfree(xattrs);
797 }
798 ci->i_xattrs.index_version = ci->i_xattrs.version;
799 ci->i_xattrs.dirty = false;
800
801 return err;
802bad_lock:
be655596 803 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
804bad:
805 if (xattrs) {
806 for (i = 0; i < numattr; i++)
807 kfree(xattrs[i]);
808 kfree(xattrs);
809 }
810 ci->i_xattrs.names_size = 0;
811 return err;
812}
813
814static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size,
815 int val_size)
816{
817 /*
818 * 4 bytes for the length, and additional 4 bytes per each xattr name,
819 * 4 bytes per each value
820 */
821 int size = 4 + ci->i_xattrs.count*(4 + 4) +
822 ci->i_xattrs.names_size +
823 ci->i_xattrs.vals_size;
824 dout("__get_required_blob_size c=%d names.size=%d vals.size=%d\n",
825 ci->i_xattrs.count, ci->i_xattrs.names_size,
826 ci->i_xattrs.vals_size);
827
828 if (name_size)
829 size += 4 + 4 + name_size + val_size;
830
831 return size;
832}
833
834/*
835 * If there are dirty xattrs, reencode xattrs into the prealloc_blob
12fe3dda
LH
836 * and swap into place. It returns the old i_xattrs.blob (or NULL) so
837 * that it can be freed by the caller as the i_ceph_lock is likely to be
838 * held.
355da1eb 839 */
12fe3dda 840struct ceph_buffer *__ceph_build_xattrs_blob(struct ceph_inode_info *ci)
355da1eb
SW
841{
842 struct rb_node *p;
843 struct ceph_inode_xattr *xattr = NULL;
12fe3dda 844 struct ceph_buffer *old_blob = NULL;
355da1eb
SW
845 void *dest;
846
847 dout("__build_xattrs_blob %p\n", &ci->vfs_inode);
848 if (ci->i_xattrs.dirty) {
849 int need = __get_required_blob_size(ci, 0, 0);
850
851 BUG_ON(need > ci->i_xattrs.prealloc_blob->alloc_len);
852
853 p = rb_first(&ci->i_xattrs.index);
854 dest = ci->i_xattrs.prealloc_blob->vec.iov_base;
855
856 ceph_encode_32(&dest, ci->i_xattrs.count);
857 while (p) {
858 xattr = rb_entry(p, struct ceph_inode_xattr, node);
859
860 ceph_encode_32(&dest, xattr->name_len);
861 memcpy(dest, xattr->name, xattr->name_len);
862 dest += xattr->name_len;
863 ceph_encode_32(&dest, xattr->val_len);
864 memcpy(dest, xattr->val, xattr->val_len);
865 dest += xattr->val_len;
866
867 p = rb_next(p);
868 }
869
870 /* adjust buffer len; it may be larger than we need */
871 ci->i_xattrs.prealloc_blob->vec.iov_len =
872 dest - ci->i_xattrs.prealloc_blob->vec.iov_base;
873
b6c1d5b8 874 if (ci->i_xattrs.blob)
12fe3dda 875 old_blob = ci->i_xattrs.blob;
355da1eb
SW
876 ci->i_xattrs.blob = ci->i_xattrs.prealloc_blob;
877 ci->i_xattrs.prealloc_blob = NULL;
878 ci->i_xattrs.dirty = false;
4a625be4 879 ci->i_xattrs.version++;
355da1eb 880 }
12fe3dda
LH
881
882 return old_blob;
355da1eb
SW
883}
884
315f2408
YZ
885static inline int __get_request_mask(struct inode *in) {
886 struct ceph_mds_request *req = current->journal_info;
887 int mask = 0;
888 if (req && req->r_target_inode == in) {
889 if (req->r_op == CEPH_MDS_OP_LOOKUP ||
890 req->r_op == CEPH_MDS_OP_LOOKUPINO ||
891 req->r_op == CEPH_MDS_OP_LOOKUPPARENT ||
892 req->r_op == CEPH_MDS_OP_GETATTR) {
893 mask = le32_to_cpu(req->r_args.getattr.mask);
894 } else if (req->r_op == CEPH_MDS_OP_OPEN ||
895 req->r_op == CEPH_MDS_OP_CREATE) {
896 mask = le32_to_cpu(req->r_args.open.mask);
897 }
898 }
899 return mask;
900}
901
7221fe4c 902ssize_t __ceph_getxattr(struct inode *inode, const char *name, void *value,
355da1eb
SW
903 size_t size)
904{
355da1eb 905 struct ceph_inode_info *ci = ceph_inode(inode);
355da1eb 906 struct ceph_inode_xattr *xattr;
881a5fa2 907 struct ceph_vxattr *vxattr = NULL;
315f2408 908 int req_mask;
f1d1b51d 909 ssize_t err;
355da1eb 910
0bee82fb
SW
911 /* let's see if a virtual xattr was requested */
912 vxattr = ceph_match_vxattr(inode, name);
29dccfa5 913 if (vxattr) {
49a9f4f6
YZ
914 int mask = 0;
915 if (vxattr->flags & VXATTR_FLAG_RSTAT)
916 mask |= CEPH_STAT_RSTAT;
81048c00
JL
917 if (vxattr->flags & VXATTR_FLAG_DIRSTAT)
918 mask |= CEPH_CAP_FILE_SHARED;
49a9f4f6 919 err = ceph_do_getattr(inode, mask, true);
1684dd03
YZ
920 if (err)
921 return err;
29dccfa5 922 err = -ENODATA;
3b421018 923 if (!(vxattr->exists_cb && !vxattr->exists_cb(ci))) {
29dccfa5 924 err = vxattr->getxattr_cb(ci, value, size);
3b421018
JL
925 if (size && size < err)
926 err = -ERANGE;
927 }
a1dc1937 928 return err;
0bee82fb
SW
929 }
930
315f2408
YZ
931 req_mask = __get_request_mask(inode);
932
a1dc1937 933 spin_lock(&ci->i_ceph_lock);
d36e0b62 934 dout("getxattr %p name '%s' ver=%lld index_ver=%lld\n", inode, name,
a1dc1937 935 ci->i_xattrs.version, ci->i_xattrs.index_version);
936
508b32d8 937 if (ci->i_xattrs.version == 0 ||
315f2408 938 !((req_mask & CEPH_CAP_XATTR_SHARED) ||
1af16d54 939 __ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1))) {
be655596 940 spin_unlock(&ci->i_ceph_lock);
315f2408
YZ
941
942 /* security module gets xattr while filling trace */
d37b1d99 943 if (current->journal_info) {
315f2408
YZ
944 pr_warn_ratelimited("sync getxattr %p "
945 "during filling trace\n", inode);
946 return -EBUSY;
947 }
948
355da1eb 949 /* get xattrs from mds (if we don't already have them) */
508b32d8 950 err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
355da1eb
SW
951 if (err)
952 return err;
508b32d8 953 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
954 }
955
355da1eb
SW
956 err = __build_xattrs(inode);
957 if (err < 0)
958 goto out;
959
355da1eb
SW
960 err = -ENODATA; /* == ENOATTR */
961 xattr = __get_xattr(ci, name);
0bee82fb 962 if (!xattr)
355da1eb 963 goto out;
355da1eb
SW
964
965 err = -ERANGE;
966 if (size && size < xattr->val_len)
967 goto out;
968
969 err = xattr->val_len;
970 if (size == 0)
971 goto out;
972
973 memcpy(value, xattr->val, xattr->val_len);
974
d37b1d99 975 if (current->journal_info &&
026105eb
JL
976 !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) &&
977 security_ismaclabel(name + XATTR_SECURITY_PREFIX_LEN))
315f2408 978 ci->i_ceph_flags |= CEPH_I_SEC_INITED;
355da1eb 979out:
be655596 980 spin_unlock(&ci->i_ceph_lock);
355da1eb
SW
981 return err;
982}
983
984ssize_t ceph_listxattr(struct dentry *dentry, char *names, size_t size)
985{
2b0143b5 986 struct inode *inode = d_inode(dentry);
355da1eb 987 struct ceph_inode_info *ci = ceph_inode(inode);
2b2abcac 988 bool len_only = (size == 0);
355da1eb
SW
989 u32 namelen;
990 int err;
355da1eb 991
be655596 992 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
993 dout("listxattr %p ver=%lld index_ver=%lld\n", inode,
994 ci->i_xattrs.version, ci->i_xattrs.index_version);
995
508b32d8 996 if (ci->i_xattrs.version == 0 ||
1af16d54 997 !__ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1)) {
be655596 998 spin_unlock(&ci->i_ceph_lock);
508b32d8 999 err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
355da1eb
SW
1000 if (err)
1001 return err;
508b32d8 1002 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
1003 }
1004
355da1eb
SW
1005 err = __build_xattrs(inode);
1006 if (err < 0)
1007 goto out;
3ce6cd12 1008
2b2abcac 1009 /* add 1 byte for each xattr due to the null termination */
b65917dd 1010 namelen = ci->i_xattrs.names_size + ci->i_xattrs.count;
2b2abcac
DD
1011 if (!len_only) {
1012 if (namelen > size) {
1013 err = -ERANGE;
1014 goto out;
1015 }
1016 names = __copy_xattr_names(ci, names);
1017 size -= namelen;
1018 }
2b2abcac 1019 err = namelen;
355da1eb 1020out:
be655596 1021 spin_unlock(&ci->i_ceph_lock);
355da1eb
SW
1022 return err;
1023}
1024
a26fecca 1025static int ceph_sync_setxattr(struct inode *inode, const char *name,
355da1eb
SW
1026 const char *value, size_t size, int flags)
1027{
a26fecca 1028 struct ceph_fs_client *fsc = ceph_sb_to_client(inode->i_sb);
355da1eb 1029 struct ceph_inode_info *ci = ceph_inode(inode);
355da1eb 1030 struct ceph_mds_request *req;
3d14c5d2 1031 struct ceph_mds_client *mdsc = fsc->mdsc;
968cd14e 1032 struct ceph_osd_client *osdc = &fsc->client->osdc;
25e6bae3 1033 struct ceph_pagelist *pagelist = NULL;
04303d8a 1034 int op = CEPH_MDS_OP_SETXATTR;
355da1eb 1035 int err;
25e6bae3 1036
0aeff37a 1037 if (size > 0) {
25e6bae3 1038 /* copy value into pagelist */
33165d47 1039 pagelist = ceph_pagelist_alloc(GFP_NOFS);
25e6bae3 1040 if (!pagelist)
355da1eb 1041 return -ENOMEM;
25e6bae3 1042
25e6bae3
YZ
1043 err = ceph_pagelist_append(pagelist, value, size);
1044 if (err)
1045 goto out;
0aeff37a 1046 } else if (!value) {
04303d8a
YZ
1047 if (flags & CEPH_XATTR_REPLACE)
1048 op = CEPH_MDS_OP_RMXATTR;
1049 else
1050 flags |= CEPH_XATTR_REMOVE;
355da1eb
SW
1051 }
1052
1053 dout("setxattr value=%.*s\n", (int)size, value);
1054
1055 /* do request */
04303d8a 1056 req = ceph_mdsc_create_request(mdsc, op, USE_AUTH_MDS);
60d87733
JL
1057 if (IS_ERR(req)) {
1058 err = PTR_ERR(req);
1059 goto out;
1060 }
a149bb9a 1061
355da1eb 1062 req->r_path2 = kstrdup(name, GFP_NOFS);
a149bb9a
SK
1063 if (!req->r_path2) {
1064 ceph_mdsc_put_request(req);
1065 err = -ENOMEM;
1066 goto out;
1067 }
355da1eb 1068
04303d8a
YZ
1069 if (op == CEPH_MDS_OP_SETXATTR) {
1070 req->r_args.setxattr.flags = cpu_to_le32(flags);
968cd14e
XL
1071 req->r_args.setxattr.osdmap_epoch =
1072 cpu_to_le32(osdc->osdmap->epoch);
04303d8a
YZ
1073 req->r_pagelist = pagelist;
1074 pagelist = NULL;
1075 }
355da1eb 1076
a149bb9a
SK
1077 req->r_inode = inode;
1078 ihold(inode);
1079 req->r_num_caps = 1;
1080 req->r_inode_drop = CEPH_CAP_XATTR_SHARED;
1081
355da1eb 1082 dout("xattr.ver (before): %lld\n", ci->i_xattrs.version);
752c8bdc 1083 err = ceph_mdsc_do_request(mdsc, NULL, req);
355da1eb
SW
1084 ceph_mdsc_put_request(req);
1085 dout("xattr.ver (after): %lld\n", ci->i_xattrs.version);
1086
1087out:
25e6bae3
YZ
1088 if (pagelist)
1089 ceph_pagelist_release(pagelist);
355da1eb
SW
1090 return err;
1091}
1092
a26fecca 1093int __ceph_setxattr(struct inode *inode, const char *name,
7221fe4c 1094 const void *value, size_t size, int flags)
355da1eb 1095{
881a5fa2 1096 struct ceph_vxattr *vxattr;
355da1eb 1097 struct ceph_inode_info *ci = ceph_inode(inode);
a26fecca 1098 struct ceph_mds_client *mdsc = ceph_sb_to_client(inode->i_sb)->mdsc;
f66fd9f0 1099 struct ceph_cap_flush *prealloc_cf = NULL;
86968ef2 1100 struct ceph_buffer *old_blob = NULL;
18fa8b3f 1101 int issued;
355da1eb 1102 int err;
fbc0b970 1103 int dirty = 0;
355da1eb
SW
1104 int name_len = strlen(name);
1105 int val_len = size;
1106 char *newname = NULL;
1107 char *newval = NULL;
1108 struct ceph_inode_xattr *xattr = NULL;
355da1eb 1109 int required_blob_size;
f1919826 1110 bool check_realm = false;
604d1b02 1111 bool lock_snap_rwsem = false;
355da1eb 1112
2cdeb1e4
AG
1113 if (ceph_snap(inode) != CEPH_NOSNAP)
1114 return -EROFS;
355da1eb 1115
06476a69 1116 vxattr = ceph_match_vxattr(inode, name);
f1919826 1117 if (vxattr) {
4e9906e7 1118 if (vxattr->flags & VXATTR_FLAG_READONLY)
f1919826
YZ
1119 return -EOPNOTSUPP;
1120 if (value && !strncmp(vxattr->name, "ceph.quota", 10))
1121 check_realm = true;
1122 }
355da1eb 1123
3adf654d
SW
1124 /* pass any unhandled ceph.* xattrs through to the MDS */
1125 if (!strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN))
1126 goto do_sync_unlocked;
1127
355da1eb
SW
1128 /* preallocate memory for xattr name, value, index node */
1129 err = -ENOMEM;
61413c2f 1130 newname = kmemdup(name, name_len + 1, GFP_NOFS);
355da1eb
SW
1131 if (!newname)
1132 goto out;
355da1eb
SW
1133
1134 if (val_len) {
b829c195 1135 newval = kmemdup(value, val_len, GFP_NOFS);
355da1eb
SW
1136 if (!newval)
1137 goto out;
355da1eb
SW
1138 }
1139
1140 xattr = kmalloc(sizeof(struct ceph_inode_xattr), GFP_NOFS);
1141 if (!xattr)
1142 goto out;
1143
f66fd9f0
YZ
1144 prealloc_cf = ceph_alloc_cap_flush();
1145 if (!prealloc_cf)
1146 goto out;
1147
be655596 1148 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
1149retry:
1150 issued = __ceph_caps_issued(ci, NULL);
508b32d8 1151 if (ci->i_xattrs.version == 0 || !(issued & CEPH_CAP_XATTR_EXCL))
355da1eb 1152 goto do_sync;
604d1b02
YZ
1153
1154 if (!lock_snap_rwsem && !ci->i_head_snapc) {
1155 lock_snap_rwsem = true;
1156 if (!down_read_trylock(&mdsc->snap_rwsem)) {
1157 spin_unlock(&ci->i_ceph_lock);
1158 down_read(&mdsc->snap_rwsem);
1159 spin_lock(&ci->i_ceph_lock);
1160 goto retry;
1161 }
1162 }
1163
d36e0b62
JL
1164 dout("setxattr %p name '%s' issued %s\n", inode, name,
1165 ceph_cap_string(issued));
355da1eb
SW
1166 __build_xattrs(inode);
1167
1168 required_blob_size = __get_required_blob_size(ci, name_len, val_len);
1169
1170 if (!ci->i_xattrs.prealloc_blob ||
1171 required_blob_size > ci->i_xattrs.prealloc_blob->alloc_len) {
18fa8b3f 1172 struct ceph_buffer *blob;
355da1eb 1173
be655596 1174 spin_unlock(&ci->i_ceph_lock);
86968ef2
LH
1175 ceph_buffer_put(old_blob); /* Shouldn't be required */
1176 dout(" pre-allocating new blob size=%d\n", required_blob_size);
b6c1d5b8 1177 blob = ceph_buffer_new(required_blob_size, GFP_NOFS);
355da1eb 1178 if (!blob)
604d1b02 1179 goto do_sync_unlocked;
be655596 1180 spin_lock(&ci->i_ceph_lock);
86968ef2 1181 /* prealloc_blob can't be released while holding i_ceph_lock */
b6c1d5b8 1182 if (ci->i_xattrs.prealloc_blob)
86968ef2 1183 old_blob = ci->i_xattrs.prealloc_blob;
355da1eb
SW
1184 ci->i_xattrs.prealloc_blob = blob;
1185 goto retry;
1186 }
1187
bcdfeb2e
YZ
1188 err = __set_xattr(ci, newname, name_len, newval, val_len,
1189 flags, value ? 1 : -1, &xattr);
18fa8b3f 1190
fbc0b970 1191 if (!err) {
f66fd9f0
YZ
1192 dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_XATTR_EXCL,
1193 &prealloc_cf);
fbc0b970 1194 ci->i_xattrs.dirty = true;
c2050a45 1195 inode->i_ctime = current_time(inode);
fbc0b970 1196 }
18fa8b3f 1197
be655596 1198 spin_unlock(&ci->i_ceph_lock);
86968ef2 1199 ceph_buffer_put(old_blob);
604d1b02
YZ
1200 if (lock_snap_rwsem)
1201 up_read(&mdsc->snap_rwsem);
fca65b4a
SW
1202 if (dirty)
1203 __mark_inode_dirty(inode, dirty);
f66fd9f0 1204 ceph_free_cap_flush(prealloc_cf);
355da1eb
SW
1205 return err;
1206
1207do_sync:
be655596 1208 spin_unlock(&ci->i_ceph_lock);
3adf654d 1209do_sync_unlocked:
604d1b02
YZ
1210 if (lock_snap_rwsem)
1211 up_read(&mdsc->snap_rwsem);
315f2408
YZ
1212
1213 /* security module set xattr while filling trace */
d37b1d99 1214 if (current->journal_info) {
315f2408
YZ
1215 pr_warn_ratelimited("sync setxattr %p "
1216 "during filling trace\n", inode);
1217 err = -EBUSY;
1218 } else {
a26fecca 1219 err = ceph_sync_setxattr(inode, name, value, size, flags);
f1919826
YZ
1220 if (err >= 0 && check_realm) {
1221 /* check if snaprealm was created for quota inode */
1222 spin_lock(&ci->i_ceph_lock);
1223 if ((ci->i_max_files || ci->i_max_bytes) &&
1224 !(ci->i_snap_realm &&
1225 ci->i_snap_realm->ino == ci->i_vino.ino))
1226 err = -EOPNOTSUPP;
1227 spin_unlock(&ci->i_ceph_lock);
1228 }
315f2408 1229 }
355da1eb 1230out:
f66fd9f0 1231 ceph_free_cap_flush(prealloc_cf);
355da1eb
SW
1232 kfree(newname);
1233 kfree(newval);
1234 kfree(xattr);
1235 return err;
1236}
1237
2cdeb1e4
AG
1238static int ceph_get_xattr_handler(const struct xattr_handler *handler,
1239 struct dentry *dentry, struct inode *inode,
1240 const char *name, void *value, size_t size)
7221fe4c 1241{
2cdeb1e4
AG
1242 if (!ceph_is_valid_xattr(name))
1243 return -EOPNOTSUPP;
1244 return __ceph_getxattr(inode, name, value, size);
1245}
7221fe4c 1246
2cdeb1e4 1247static int ceph_set_xattr_handler(const struct xattr_handler *handler,
e65ce2a5 1248 struct user_namespace *mnt_userns,
59301226
AV
1249 struct dentry *unused, struct inode *inode,
1250 const char *name, const void *value,
1251 size_t size, int flags)
2cdeb1e4
AG
1252{
1253 if (!ceph_is_valid_xattr(name))
1254 return -EOPNOTSUPP;
59301226 1255 return __ceph_setxattr(inode, name, value, size, flags);
7221fe4c 1256}
315f2408 1257
5130ccea 1258static const struct xattr_handler ceph_other_xattr_handler = {
2cdeb1e4
AG
1259 .prefix = "", /* match any name => handlers called with full name */
1260 .get = ceph_get_xattr_handler,
1261 .set = ceph_set_xattr_handler,
1262};
1263
315f2408
YZ
1264#ifdef CONFIG_SECURITY
1265bool ceph_security_xattr_wanted(struct inode *in)
1266{
1267 return in->i_security != NULL;
1268}
1269
1270bool ceph_security_xattr_deadlock(struct inode *in)
1271{
1272 struct ceph_inode_info *ci;
1273 bool ret;
d37b1d99 1274 if (!in->i_security)
315f2408
YZ
1275 return false;
1276 ci = ceph_inode(in);
1277 spin_lock(&ci->i_ceph_lock);
1278 ret = !(ci->i_ceph_flags & CEPH_I_SEC_INITED) &&
1279 !(ci->i_xattrs.version > 0 &&
1280 __ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 0));
1281 spin_unlock(&ci->i_ceph_lock);
1282 return ret;
1283}
ac6713cc
YZ
1284
1285#ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1286int ceph_security_init_secctx(struct dentry *dentry, umode_t mode,
1287 struct ceph_acl_sec_ctx *as_ctx)
1288{
1289 struct ceph_pagelist *pagelist = as_ctx->pagelist;
1290 const char *name;
1291 size_t name_len;
1292 int err;
1293
1294 err = security_dentry_init_security(dentry, mode, &dentry->d_name,
1295 &as_ctx->sec_ctx,
1296 &as_ctx->sec_ctxlen);
1297 if (err < 0) {
1298 WARN_ON_ONCE(err != -EOPNOTSUPP);
1299 err = 0; /* do nothing */
1300 goto out;
1301 }
1302
1303 err = -ENOMEM;
1304 if (!pagelist) {
1305 pagelist = ceph_pagelist_alloc(GFP_KERNEL);
1306 if (!pagelist)
1307 goto out;
1308 err = ceph_pagelist_reserve(pagelist, PAGE_SIZE);
1309 if (err)
1310 goto out;
1311 ceph_pagelist_encode_32(pagelist, 1);
1312 }
1313
1314 /*
1315 * FIXME: Make security_dentry_init_security() generic. Currently
1316 * It only supports single security module and only selinux has
1317 * dentry_init_security hook.
1318 */
1319 name = XATTR_NAME_SELINUX;
1320 name_len = strlen(name);
1321 err = ceph_pagelist_reserve(pagelist,
1322 4 * 2 + name_len + as_ctx->sec_ctxlen);
1323 if (err)
1324 goto out;
1325
1326 if (as_ctx->pagelist) {
1327 /* update count of KV pairs */
1328 BUG_ON(pagelist->length <= sizeof(__le32));
1329 if (list_is_singular(&pagelist->head)) {
1330 le32_add_cpu((__le32*)pagelist->mapped_tail, 1);
1331 } else {
1332 struct page *page = list_first_entry(&pagelist->head,
1333 struct page, lru);
1334 void *addr = kmap_atomic(page);
1335 le32_add_cpu((__le32*)addr, 1);
1336 kunmap_atomic(addr);
1337 }
1338 } else {
1339 as_ctx->pagelist = pagelist;
1340 }
1341
1342 ceph_pagelist_encode_32(pagelist, name_len);
1343 ceph_pagelist_append(pagelist, name, name_len);
1344
1345 ceph_pagelist_encode_32(pagelist, as_ctx->sec_ctxlen);
1346 ceph_pagelist_append(pagelist, as_ctx->sec_ctx, as_ctx->sec_ctxlen);
1347
1348 err = 0;
1349out:
1350 if (pagelist && !as_ctx->pagelist)
1351 ceph_pagelist_release(pagelist);
1352 return err;
1353}
668959a5
JL
1354#endif /* CONFIG_CEPH_FS_SECURITY_LABEL */
1355#endif /* CONFIG_SECURITY */
5c31e92d
YZ
1356
1357void ceph_release_acl_sec_ctx(struct ceph_acl_sec_ctx *as_ctx)
1358{
1359#ifdef CONFIG_CEPH_FS_POSIX_ACL
1360 posix_acl_release(as_ctx->acl);
1361 posix_acl_release(as_ctx->default_acl);
ac6713cc
YZ
1362#endif
1363#ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1364 security_release_secctx(as_ctx->sec_ctx, as_ctx->sec_ctxlen);
5c31e92d
YZ
1365#endif
1366 if (as_ctx->pagelist)
1367 ceph_pagelist_release(as_ctx->pagelist);
1368}
ac6713cc
YZ
1369
1370/*
1371 * List of handlers for synthetic system.* attributes. Other
1372 * attributes are handled directly.
1373 */
1374const struct xattr_handler *ceph_xattr_handlers[] = {
1375#ifdef CONFIG_CEPH_FS_POSIX_ACL
1376 &posix_acl_access_xattr_handler,
1377 &posix_acl_default_xattr_handler,
ac6713cc
YZ
1378#endif
1379 &ceph_other_xattr_handler,
1380 NULL,
1381};