]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - fs/ceph/xattr.c
Merge tag 'pci-v5.4-changes' of git://git.kernel.org/pub/scm/linux/kernel/git/helgaas/pci
[mirror_ubuntu-jammy-kernel.git] / fs / ceph / xattr.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
3d14c5d2 2#include <linux/ceph/ceph_debug.h>
25e6bae3 3#include <linux/ceph/pagelist.h>
3d14c5d2 4
355da1eb 5#include "super.h"
3d14c5d2
YS
6#include "mds_client.h"
7
8#include <linux/ceph/decode.h>
355da1eb
SW
9
10#include <linux/xattr.h>
ac6713cc 11#include <linux/security.h>
4db658ea 12#include <linux/posix_acl_xattr.h>
5a0e3ad6 13#include <linux/slab.h>
355da1eb 14
22891907
AE
15#define XATTR_CEPH_PREFIX "ceph."
16#define XATTR_CEPH_PREFIX_LEN (sizeof (XATTR_CEPH_PREFIX) - 1)
17
bcdfeb2e
YZ
18static int __remove_xattr(struct ceph_inode_info *ci,
19 struct ceph_inode_xattr *xattr);
20
355da1eb
SW
21static bool ceph_is_valid_xattr(const char *name)
22{
22891907 23 return !strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN) ||
355da1eb
SW
24 !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) ||
25 !strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN);
26}
27
28/*
29 * These define virtual xattrs exposing the recursive directory
30 * statistics and layout metadata.
31 */
881a5fa2 32struct ceph_vxattr {
355da1eb 33 char *name;
3ce6cd12 34 size_t name_size; /* strlen(name) + 1 (for '\0') */
f1d1b51d
JL
35 ssize_t (*getxattr_cb)(struct ceph_inode_info *ci, char *val,
36 size_t size);
f36e4472 37 bool (*exists_cb)(struct ceph_inode_info *ci);
4e9906e7 38 unsigned int flags;
355da1eb
SW
39};
40
4e9906e7
YZ
41#define VXATTR_FLAG_READONLY (1<<0)
42#define VXATTR_FLAG_HIDDEN (1<<1)
49a9f4f6 43#define VXATTR_FLAG_RSTAT (1<<2)
4e9906e7 44
32ab0bd7
SW
45/* layouts */
46
47static bool ceph_vxattrcb_layout_exists(struct ceph_inode_info *ci)
48{
779fe0fb
YZ
49 struct ceph_file_layout *fl = &ci->i_layout;
50 return (fl->stripe_unit > 0 || fl->stripe_count > 0 ||
51 fl->object_size > 0 || fl->pool_id >= 0 ||
52 rcu_dereference_raw(fl->pool_ns) != NULL);
32ab0bd7
SW
53}
54
f1d1b51d
JL
55static ssize_t ceph_vxattrcb_layout(struct ceph_inode_info *ci, char *val,
56 size_t size)
32ab0bd7 57{
32ab0bd7
SW
58 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb);
59 struct ceph_osd_client *osdc = &fsc->client->osdc;
779fe0fb 60 struct ceph_string *pool_ns;
7627151e 61 s64 pool = ci->i_layout.pool_id;
32ab0bd7 62 const char *pool_name;
779fe0fb 63 const char *ns_field = " pool_namespace=";
1e5c6649 64 char buf[128];
779fe0fb 65 size_t len, total_len = 0;
3b421018 66 ssize_t ret;
779fe0fb
YZ
67
68 pool_ns = ceph_try_get_string(ci->i_layout.pool_ns);
32ab0bd7
SW
69
70 dout("ceph_vxattrcb_layout %p\n", &ci->vfs_inode);
5aea3dcd 71 down_read(&osdc->lock);
32ab0bd7 72 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
1e5c6649 73 if (pool_name) {
779fe0fb 74 len = snprintf(buf, sizeof(buf),
7627151e
YZ
75 "stripe_unit=%u stripe_count=%u object_size=%u pool=",
76 ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
77 ci->i_layout.object_size);
779fe0fb 78 total_len = len + strlen(pool_name);
1e5c6649 79 } else {
779fe0fb 80 len = snprintf(buf, sizeof(buf),
7627151e
YZ
81 "stripe_unit=%u stripe_count=%u object_size=%u pool=%lld",
82 ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
f1d1b51d 83 ci->i_layout.object_size, pool);
779fe0fb
YZ
84 total_len = len;
85 }
86
87 if (pool_ns)
88 total_len += strlen(ns_field) + pool_ns->len;
89
3b421018
JL
90 ret = total_len;
91 if (size >= total_len) {
779fe0fb
YZ
92 memcpy(val, buf, len);
93 ret = len;
94 if (pool_name) {
95 len = strlen(pool_name);
96 memcpy(val + ret, pool_name, len);
97 ret += len;
98 }
99 if (pool_ns) {
100 len = strlen(ns_field);
101 memcpy(val + ret, ns_field, len);
102 ret += len;
103 memcpy(val + ret, pool_ns->str, pool_ns->len);
104 ret += pool_ns->len;
1e5c6649
YZ
105 }
106 }
5aea3dcd 107 up_read(&osdc->lock);
779fe0fb 108 ceph_put_string(pool_ns);
32ab0bd7
SW
109 return ret;
110}
111
26350535
JL
112/*
113 * The convention with strings in xattrs is that they should not be NULL
114 * terminated, since we're returning the length with them. snprintf always
115 * NULL terminates however, so call it on a temporary buffer and then memcpy
116 * the result into place.
117 */
118static int ceph_fmt_xattr(char *val, size_t size, const char *fmt, ...)
119{
120 int ret;
121 va_list args;
122 char buf[96]; /* NB: reevaluate size if new vxattrs are added */
123
124 va_start(args, fmt);
125 ret = vsnprintf(buf, size ? sizeof(buf) : 0, fmt, args);
126 va_end(args);
127
128 /* Sanity check */
129 if (size && ret + 1 > sizeof(buf)) {
130 WARN_ONCE(true, "Returned length too big (%d)", ret);
131 return -E2BIG;
132 }
133
134 if (ret <= size)
135 memcpy(val, buf, ret);
136 return ret;
137}
138
f1d1b51d
JL
139static ssize_t ceph_vxattrcb_layout_stripe_unit(struct ceph_inode_info *ci,
140 char *val, size_t size)
695b7119 141{
26350535 142 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_unit);
695b7119
SW
143}
144
f1d1b51d
JL
145static ssize_t ceph_vxattrcb_layout_stripe_count(struct ceph_inode_info *ci,
146 char *val, size_t size)
695b7119 147{
26350535 148 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_count);
695b7119
SW
149}
150
f1d1b51d
JL
151static ssize_t ceph_vxattrcb_layout_object_size(struct ceph_inode_info *ci,
152 char *val, size_t size)
695b7119 153{
26350535 154 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.object_size);
695b7119
SW
155}
156
f1d1b51d
JL
157static ssize_t ceph_vxattrcb_layout_pool(struct ceph_inode_info *ci,
158 char *val, size_t size)
695b7119 159{
f1d1b51d 160 ssize_t ret;
695b7119
SW
161 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb);
162 struct ceph_osd_client *osdc = &fsc->client->osdc;
7627151e 163 s64 pool = ci->i_layout.pool_id;
695b7119
SW
164 const char *pool_name;
165
5aea3dcd 166 down_read(&osdc->lock);
695b7119 167 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
26350535
JL
168 if (pool_name) {
169 ret = strlen(pool_name);
170 if (ret <= size)
171 memcpy(val, pool_name, ret);
172 } else {
173 ret = ceph_fmt_xattr(val, size, "%lld", pool);
174 }
5aea3dcd 175 up_read(&osdc->lock);
695b7119
SW
176 return ret;
177}
178
f1d1b51d
JL
179static ssize_t ceph_vxattrcb_layout_pool_namespace(struct ceph_inode_info *ci,
180 char *val, size_t size)
779fe0fb 181{
26350535 182 ssize_t ret = 0;
779fe0fb 183 struct ceph_string *ns = ceph_try_get_string(ci->i_layout.pool_ns);
26350535 184
779fe0fb 185 if (ns) {
26350535
JL
186 ret = ns->len;
187 if (ret <= size)
188 memcpy(val, ns->str, ret);
779fe0fb
YZ
189 ceph_put_string(ns);
190 }
191 return ret;
192}
193
355da1eb
SW
194/* directories */
195
f1d1b51d
JL
196static ssize_t ceph_vxattrcb_dir_entries(struct ceph_inode_info *ci, char *val,
197 size_t size)
355da1eb 198{
26350535 199 return ceph_fmt_xattr(val, size, "%lld", ci->i_files + ci->i_subdirs);
355da1eb
SW
200}
201
f1d1b51d
JL
202static ssize_t ceph_vxattrcb_dir_files(struct ceph_inode_info *ci, char *val,
203 size_t size)
355da1eb 204{
26350535 205 return ceph_fmt_xattr(val, size, "%lld", ci->i_files);
355da1eb
SW
206}
207
f1d1b51d
JL
208static ssize_t ceph_vxattrcb_dir_subdirs(struct ceph_inode_info *ci, char *val,
209 size_t size)
355da1eb 210{
26350535 211 return ceph_fmt_xattr(val, size, "%lld", ci->i_subdirs);
355da1eb
SW
212}
213
f1d1b51d
JL
214static ssize_t ceph_vxattrcb_dir_rentries(struct ceph_inode_info *ci, char *val,
215 size_t size)
355da1eb 216{
26350535
JL
217 return ceph_fmt_xattr(val, size, "%lld",
218 ci->i_rfiles + ci->i_rsubdirs);
355da1eb
SW
219}
220
f1d1b51d
JL
221static ssize_t ceph_vxattrcb_dir_rfiles(struct ceph_inode_info *ci, char *val,
222 size_t size)
355da1eb 223{
26350535 224 return ceph_fmt_xattr(val, size, "%lld", ci->i_rfiles);
355da1eb
SW
225}
226
f1d1b51d
JL
227static ssize_t ceph_vxattrcb_dir_rsubdirs(struct ceph_inode_info *ci, char *val,
228 size_t size)
355da1eb 229{
26350535 230 return ceph_fmt_xattr(val, size, "%lld", ci->i_rsubdirs);
355da1eb
SW
231}
232
f1d1b51d
JL
233static ssize_t ceph_vxattrcb_dir_rbytes(struct ceph_inode_info *ci, char *val,
234 size_t size)
355da1eb 235{
26350535 236 return ceph_fmt_xattr(val, size, "%lld", ci->i_rbytes);
355da1eb
SW
237}
238
f1d1b51d
JL
239static ssize_t ceph_vxattrcb_dir_rctime(struct ceph_inode_info *ci, char *val,
240 size_t size)
355da1eb 241{
26350535
JL
242 return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_rctime.tv_sec,
243 ci->i_rctime.tv_nsec);
355da1eb
SW
244}
245
08796873
YZ
246/* dir pin */
247static bool ceph_vxattrcb_dir_pin_exists(struct ceph_inode_info *ci)
248{
249 return ci->i_dir_pin != -ENODATA;
250}
251
f1d1b51d
JL
252static ssize_t ceph_vxattrcb_dir_pin(struct ceph_inode_info *ci, char *val,
253 size_t size)
08796873 254{
26350535 255 return ceph_fmt_xattr(val, size, "%d", (int)ci->i_dir_pin);
08796873 256}
fb18a575 257
08796873 258/* quotas */
fb18a575
LH
259static bool ceph_vxattrcb_quota_exists(struct ceph_inode_info *ci)
260{
f1919826
YZ
261 bool ret = false;
262 spin_lock(&ci->i_ceph_lock);
263 if ((ci->i_max_files || ci->i_max_bytes) &&
264 ci->i_vino.snap == CEPH_NOSNAP &&
265 ci->i_snap_realm &&
266 ci->i_snap_realm->ino == ci->i_vino.ino)
267 ret = true;
268 spin_unlock(&ci->i_ceph_lock);
269 return ret;
fb18a575
LH
270}
271
f1d1b51d
JL
272static ssize_t ceph_vxattrcb_quota(struct ceph_inode_info *ci, char *val,
273 size_t size)
fb18a575 274{
26350535
JL
275 return ceph_fmt_xattr(val, size, "max_bytes=%llu max_files=%llu",
276 ci->i_max_bytes, ci->i_max_files);
fb18a575
LH
277}
278
f1d1b51d
JL
279static ssize_t ceph_vxattrcb_quota_max_bytes(struct ceph_inode_info *ci,
280 char *val, size_t size)
fb18a575 281{
26350535 282 return ceph_fmt_xattr(val, size, "%llu", ci->i_max_bytes);
fb18a575
LH
283}
284
f1d1b51d
JL
285static ssize_t ceph_vxattrcb_quota_max_files(struct ceph_inode_info *ci,
286 char *val, size_t size)
fb18a575 287{
26350535 288 return ceph_fmt_xattr(val, size, "%llu", ci->i_max_files);
fb18a575 289}
32ab0bd7 290
100cc610
DD
291/* snapshots */
292static bool ceph_vxattrcb_snap_btime_exists(struct ceph_inode_info *ci)
293{
294 return (ci->i_snap_btime.tv_sec != 0 || ci->i_snap_btime.tv_nsec != 0);
295}
296
f1d1b51d
JL
297static ssize_t ceph_vxattrcb_snap_btime(struct ceph_inode_info *ci, char *val,
298 size_t size)
100cc610 299{
26350535
JL
300 return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_snap_btime.tv_sec,
301 ci->i_snap_btime.tv_nsec);
100cc610
DD
302}
303
eb788084 304#define CEPH_XATTR_NAME(_type, _name) XATTR_CEPH_PREFIX #_type "." #_name
695b7119
SW
305#define CEPH_XATTR_NAME2(_type, _name, _name2) \
306 XATTR_CEPH_PREFIX #_type "." #_name "." #_name2
eb788084 307
49a9f4f6 308#define XATTR_NAME_CEPH(_type, _name, _flags) \
8860147a
SW
309 { \
310 .name = CEPH_XATTR_NAME(_type, _name), \
311 .name_size = sizeof (CEPH_XATTR_NAME(_type, _name)), \
312 .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \
49a9f4f6
YZ
313 .exists_cb = NULL, \
314 .flags = (VXATTR_FLAG_READONLY | _flags), \
8860147a 315 }
49a9f4f6
YZ
316#define XATTR_RSTAT_FIELD(_type, _name) \
317 XATTR_NAME_CEPH(_type, _name, VXATTR_FLAG_RSTAT)
695b7119
SW
318#define XATTR_LAYOUT_FIELD(_type, _name, _field) \
319 { \
320 .name = CEPH_XATTR_NAME2(_type, _name, _field), \
321 .name_size = sizeof (CEPH_XATTR_NAME2(_type, _name, _field)), \
322 .getxattr_cb = ceph_vxattrcb_ ## _name ## _ ## _field, \
695b7119 323 .exists_cb = ceph_vxattrcb_layout_exists, \
4e9906e7 324 .flags = VXATTR_FLAG_HIDDEN, \
695b7119 325 }
fb18a575
LH
326#define XATTR_QUOTA_FIELD(_type, _name) \
327 { \
328 .name = CEPH_XATTR_NAME(_type, _name), \
329 .name_size = sizeof(CEPH_XATTR_NAME(_type, _name)), \
330 .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \
fb18a575 331 .exists_cb = ceph_vxattrcb_quota_exists, \
4e9906e7 332 .flags = VXATTR_FLAG_HIDDEN, \
fb18a575 333 }
eb788084 334
881a5fa2 335static struct ceph_vxattr ceph_dir_vxattrs[] = {
1f08f2b0
SW
336 {
337 .name = "ceph.dir.layout",
338 .name_size = sizeof("ceph.dir.layout"),
339 .getxattr_cb = ceph_vxattrcb_layout,
1f08f2b0 340 .exists_cb = ceph_vxattrcb_layout_exists,
4e9906e7 341 .flags = VXATTR_FLAG_HIDDEN,
1f08f2b0 342 },
695b7119
SW
343 XATTR_LAYOUT_FIELD(dir, layout, stripe_unit),
344 XATTR_LAYOUT_FIELD(dir, layout, stripe_count),
345 XATTR_LAYOUT_FIELD(dir, layout, object_size),
346 XATTR_LAYOUT_FIELD(dir, layout, pool),
779fe0fb 347 XATTR_LAYOUT_FIELD(dir, layout, pool_namespace),
49a9f4f6
YZ
348 XATTR_NAME_CEPH(dir, entries, 0),
349 XATTR_NAME_CEPH(dir, files, 0),
350 XATTR_NAME_CEPH(dir, subdirs, 0),
351 XATTR_RSTAT_FIELD(dir, rentries),
352 XATTR_RSTAT_FIELD(dir, rfiles),
353 XATTR_RSTAT_FIELD(dir, rsubdirs),
354 XATTR_RSTAT_FIELD(dir, rbytes),
355 XATTR_RSTAT_FIELD(dir, rctime),
08796873
YZ
356 {
357 .name = "ceph.dir.pin",
e1b81439 358 .name_size = sizeof("ceph.dir.pin"),
08796873
YZ
359 .getxattr_cb = ceph_vxattrcb_dir_pin,
360 .exists_cb = ceph_vxattrcb_dir_pin_exists,
361 .flags = VXATTR_FLAG_HIDDEN,
362 },
fb18a575
LH
363 {
364 .name = "ceph.quota",
365 .name_size = sizeof("ceph.quota"),
366 .getxattr_cb = ceph_vxattrcb_quota,
fb18a575 367 .exists_cb = ceph_vxattrcb_quota_exists,
4e9906e7 368 .flags = VXATTR_FLAG_HIDDEN,
fb18a575
LH
369 },
370 XATTR_QUOTA_FIELD(quota, max_bytes),
371 XATTR_QUOTA_FIELD(quota, max_files),
100cc610
DD
372 {
373 .name = "ceph.snap.btime",
374 .name_size = sizeof("ceph.snap.btime"),
375 .getxattr_cb = ceph_vxattrcb_snap_btime,
376 .exists_cb = ceph_vxattrcb_snap_btime_exists,
377 .flags = VXATTR_FLAG_READONLY,
378 },
2c3dd4ff 379 { .name = NULL, 0 } /* Required table terminator */
355da1eb
SW
380};
381
382/* files */
383
881a5fa2 384static struct ceph_vxattr ceph_file_vxattrs[] = {
32ab0bd7
SW
385 {
386 .name = "ceph.file.layout",
387 .name_size = sizeof("ceph.file.layout"),
388 .getxattr_cb = ceph_vxattrcb_layout,
32ab0bd7 389 .exists_cb = ceph_vxattrcb_layout_exists,
4e9906e7 390 .flags = VXATTR_FLAG_HIDDEN,
32ab0bd7 391 },
695b7119
SW
392 XATTR_LAYOUT_FIELD(file, layout, stripe_unit),
393 XATTR_LAYOUT_FIELD(file, layout, stripe_count),
394 XATTR_LAYOUT_FIELD(file, layout, object_size),
395 XATTR_LAYOUT_FIELD(file, layout, pool),
779fe0fb 396 XATTR_LAYOUT_FIELD(file, layout, pool_namespace),
100cc610
DD
397 {
398 .name = "ceph.snap.btime",
399 .name_size = sizeof("ceph.snap.btime"),
400 .getxattr_cb = ceph_vxattrcb_snap_btime,
401 .exists_cb = ceph_vxattrcb_snap_btime_exists,
402 .flags = VXATTR_FLAG_READONLY,
403 },
2c3dd4ff 404 { .name = NULL, 0 } /* Required table terminator */
355da1eb
SW
405};
406
881a5fa2 407static struct ceph_vxattr *ceph_inode_vxattrs(struct inode *inode)
355da1eb
SW
408{
409 if (S_ISDIR(inode->i_mode))
410 return ceph_dir_vxattrs;
411 else if (S_ISREG(inode->i_mode))
412 return ceph_file_vxattrs;
413 return NULL;
414}
415
881a5fa2 416static struct ceph_vxattr *ceph_match_vxattr(struct inode *inode,
355da1eb
SW
417 const char *name)
418{
881a5fa2 419 struct ceph_vxattr *vxattr = ceph_inode_vxattrs(inode);
06476a69
AE
420
421 if (vxattr) {
422 while (vxattr->name) {
423 if (!strcmp(vxattr->name, name))
424 return vxattr;
425 vxattr++;
426 }
427 }
428
355da1eb
SW
429 return NULL;
430}
431
432static int __set_xattr(struct ceph_inode_info *ci,
433 const char *name, int name_len,
434 const char *val, int val_len,
fbc0b970 435 int flags, int update_xattr,
355da1eb
SW
436 struct ceph_inode_xattr **newxattr)
437{
438 struct rb_node **p;
439 struct rb_node *parent = NULL;
440 struct ceph_inode_xattr *xattr = NULL;
441 int c;
442 int new = 0;
443
444 p = &ci->i_xattrs.index.rb_node;
445 while (*p) {
446 parent = *p;
447 xattr = rb_entry(parent, struct ceph_inode_xattr, node);
448 c = strncmp(name, xattr->name, min(name_len, xattr->name_len));
449 if (c < 0)
450 p = &(*p)->rb_left;
451 else if (c > 0)
452 p = &(*p)->rb_right;
453 else {
454 if (name_len == xattr->name_len)
455 break;
456 else if (name_len < xattr->name_len)
457 p = &(*p)->rb_left;
458 else
459 p = &(*p)->rb_right;
460 }
461 xattr = NULL;
462 }
463
fbc0b970
YZ
464 if (update_xattr) {
465 int err = 0;
eeca958d 466
fbc0b970
YZ
467 if (xattr && (flags & XATTR_CREATE))
468 err = -EEXIST;
469 else if (!xattr && (flags & XATTR_REPLACE))
470 err = -ENODATA;
471 if (err) {
472 kfree(name);
473 kfree(val);
eeca958d 474 kfree(*newxattr);
fbc0b970
YZ
475 return err;
476 }
bcdfeb2e
YZ
477 if (update_xattr < 0) {
478 if (xattr)
479 __remove_xattr(ci, xattr);
480 kfree(name);
eeca958d 481 kfree(*newxattr);
bcdfeb2e
YZ
482 return 0;
483 }
fbc0b970
YZ
484 }
485
355da1eb
SW
486 if (!xattr) {
487 new = 1;
488 xattr = *newxattr;
489 xattr->name = name;
490 xattr->name_len = name_len;
fbc0b970 491 xattr->should_free_name = update_xattr;
355da1eb
SW
492
493 ci->i_xattrs.count++;
494 dout("__set_xattr count=%d\n", ci->i_xattrs.count);
495 } else {
496 kfree(*newxattr);
497 *newxattr = NULL;
498 if (xattr->should_free_val)
499 kfree((void *)xattr->val);
500
fbc0b970 501 if (update_xattr) {
355da1eb
SW
502 kfree((void *)name);
503 name = xattr->name;
504 }
505 ci->i_xattrs.names_size -= xattr->name_len;
506 ci->i_xattrs.vals_size -= xattr->val_len;
507 }
355da1eb
SW
508 ci->i_xattrs.names_size += name_len;
509 ci->i_xattrs.vals_size += val_len;
510 if (val)
511 xattr->val = val;
512 else
513 xattr->val = "";
514
515 xattr->val_len = val_len;
fbc0b970
YZ
516 xattr->dirty = update_xattr;
517 xattr->should_free_val = (val && update_xattr);
355da1eb
SW
518
519 if (new) {
520 rb_link_node(&xattr->node, parent, p);
521 rb_insert_color(&xattr->node, &ci->i_xattrs.index);
522 dout("__set_xattr_val p=%p\n", p);
523 }
524
05729781
YZ
525 dout("__set_xattr_val added %llx.%llx xattr %p %.*s=%.*s\n",
526 ceph_vinop(&ci->vfs_inode), xattr, name_len, name, val_len, val);
355da1eb
SW
527
528 return 0;
529}
530
531static struct ceph_inode_xattr *__get_xattr(struct ceph_inode_info *ci,
532 const char *name)
533{
534 struct rb_node **p;
535 struct rb_node *parent = NULL;
536 struct ceph_inode_xattr *xattr = NULL;
17db143f 537 int name_len = strlen(name);
355da1eb
SW
538 int c;
539
540 p = &ci->i_xattrs.index.rb_node;
541 while (*p) {
542 parent = *p;
543 xattr = rb_entry(parent, struct ceph_inode_xattr, node);
544 c = strncmp(name, xattr->name, xattr->name_len);
17db143f
SW
545 if (c == 0 && name_len > xattr->name_len)
546 c = 1;
355da1eb
SW
547 if (c < 0)
548 p = &(*p)->rb_left;
549 else if (c > 0)
550 p = &(*p)->rb_right;
551 else {
552 dout("__get_xattr %s: found %.*s\n", name,
553 xattr->val_len, xattr->val);
554 return xattr;
555 }
556 }
557
558 dout("__get_xattr %s: not found\n", name);
559
560 return NULL;
561}
562
563static void __free_xattr(struct ceph_inode_xattr *xattr)
564{
565 BUG_ON(!xattr);
566
567 if (xattr->should_free_name)
568 kfree((void *)xattr->name);
569 if (xattr->should_free_val)
570 kfree((void *)xattr->val);
571
572 kfree(xattr);
573}
574
575static int __remove_xattr(struct ceph_inode_info *ci,
576 struct ceph_inode_xattr *xattr)
577{
578 if (!xattr)
524186ac 579 return -ENODATA;
355da1eb
SW
580
581 rb_erase(&xattr->node, &ci->i_xattrs.index);
582
583 if (xattr->should_free_name)
584 kfree((void *)xattr->name);
585 if (xattr->should_free_val)
586 kfree((void *)xattr->val);
587
588 ci->i_xattrs.names_size -= xattr->name_len;
589 ci->i_xattrs.vals_size -= xattr->val_len;
590 ci->i_xattrs.count--;
591 kfree(xattr);
592
593 return 0;
594}
595
355da1eb
SW
596static char *__copy_xattr_names(struct ceph_inode_info *ci,
597 char *dest)
598{
599 struct rb_node *p;
600 struct ceph_inode_xattr *xattr = NULL;
601
602 p = rb_first(&ci->i_xattrs.index);
603 dout("__copy_xattr_names count=%d\n", ci->i_xattrs.count);
604
605 while (p) {
606 xattr = rb_entry(p, struct ceph_inode_xattr, node);
607 memcpy(dest, xattr->name, xattr->name_len);
608 dest[xattr->name_len] = '\0';
609
610 dout("dest=%s %p (%s) (%d/%d)\n", dest, xattr, xattr->name,
611 xattr->name_len, ci->i_xattrs.names_size);
612
613 dest += xattr->name_len + 1;
614 p = rb_next(p);
615 }
616
617 return dest;
618}
619
620void __ceph_destroy_xattrs(struct ceph_inode_info *ci)
621{
622 struct rb_node *p, *tmp;
623 struct ceph_inode_xattr *xattr = NULL;
624
625 p = rb_first(&ci->i_xattrs.index);
626
627 dout("__ceph_destroy_xattrs p=%p\n", p);
628
629 while (p) {
630 xattr = rb_entry(p, struct ceph_inode_xattr, node);
631 tmp = p;
632 p = rb_next(tmp);
633 dout("__ceph_destroy_xattrs next p=%p (%.*s)\n", p,
634 xattr->name_len, xattr->name);
635 rb_erase(tmp, &ci->i_xattrs.index);
636
637 __free_xattr(xattr);
638 }
639
640 ci->i_xattrs.names_size = 0;
641 ci->i_xattrs.vals_size = 0;
642 ci->i_xattrs.index_version = 0;
643 ci->i_xattrs.count = 0;
644 ci->i_xattrs.index = RB_ROOT;
645}
646
647static int __build_xattrs(struct inode *inode)
be655596
SW
648 __releases(ci->i_ceph_lock)
649 __acquires(ci->i_ceph_lock)
355da1eb
SW
650{
651 u32 namelen;
652 u32 numattr = 0;
653 void *p, *end;
654 u32 len;
655 const char *name, *val;
656 struct ceph_inode_info *ci = ceph_inode(inode);
657 int xattr_version;
658 struct ceph_inode_xattr **xattrs = NULL;
63ff78b2 659 int err = 0;
355da1eb
SW
660 int i;
661
662 dout("__build_xattrs() len=%d\n",
663 ci->i_xattrs.blob ? (int)ci->i_xattrs.blob->vec.iov_len : 0);
664
665 if (ci->i_xattrs.index_version >= ci->i_xattrs.version)
666 return 0; /* already built */
667
668 __ceph_destroy_xattrs(ci);
669
670start:
671 /* updated internal xattr rb tree */
672 if (ci->i_xattrs.blob && ci->i_xattrs.blob->vec.iov_len > 4) {
673 p = ci->i_xattrs.blob->vec.iov_base;
674 end = p + ci->i_xattrs.blob->vec.iov_len;
675 ceph_decode_32_safe(&p, end, numattr, bad);
676 xattr_version = ci->i_xattrs.version;
be655596 677 spin_unlock(&ci->i_ceph_lock);
355da1eb 678
7e8a2952 679 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *),
355da1eb
SW
680 GFP_NOFS);
681 err = -ENOMEM;
682 if (!xattrs)
683 goto bad_lock;
1a295bd8 684
355da1eb
SW
685 for (i = 0; i < numattr; i++) {
686 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr),
687 GFP_NOFS);
688 if (!xattrs[i])
689 goto bad_lock;
690 }
691
be655596 692 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
693 if (ci->i_xattrs.version != xattr_version) {
694 /* lost a race, retry */
695 for (i = 0; i < numattr; i++)
696 kfree(xattrs[i]);
697 kfree(xattrs);
21ec6ffa 698 xattrs = NULL;
355da1eb
SW
699 goto start;
700 }
701 err = -EIO;
702 while (numattr--) {
703 ceph_decode_32_safe(&p, end, len, bad);
704 namelen = len;
705 name = p;
706 p += len;
707 ceph_decode_32_safe(&p, end, len, bad);
708 val = p;
709 p += len;
710
711 err = __set_xattr(ci, name, namelen, val, len,
fbc0b970 712 0, 0, &xattrs[numattr]);
355da1eb
SW
713
714 if (err < 0)
715 goto bad;
716 }
717 kfree(xattrs);
718 }
719 ci->i_xattrs.index_version = ci->i_xattrs.version;
720 ci->i_xattrs.dirty = false;
721
722 return err;
723bad_lock:
be655596 724 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
725bad:
726 if (xattrs) {
727 for (i = 0; i < numattr; i++)
728 kfree(xattrs[i]);
729 kfree(xattrs);
730 }
731 ci->i_xattrs.names_size = 0;
732 return err;
733}
734
735static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size,
736 int val_size)
737{
738 /*
739 * 4 bytes for the length, and additional 4 bytes per each xattr name,
740 * 4 bytes per each value
741 */
742 int size = 4 + ci->i_xattrs.count*(4 + 4) +
743 ci->i_xattrs.names_size +
744 ci->i_xattrs.vals_size;
745 dout("__get_required_blob_size c=%d names.size=%d vals.size=%d\n",
746 ci->i_xattrs.count, ci->i_xattrs.names_size,
747 ci->i_xattrs.vals_size);
748
749 if (name_size)
750 size += 4 + 4 + name_size + val_size;
751
752 return size;
753}
754
755/*
756 * If there are dirty xattrs, reencode xattrs into the prealloc_blob
12fe3dda
LH
757 * and swap into place. It returns the old i_xattrs.blob (or NULL) so
758 * that it can be freed by the caller as the i_ceph_lock is likely to be
759 * held.
355da1eb 760 */
12fe3dda 761struct ceph_buffer *__ceph_build_xattrs_blob(struct ceph_inode_info *ci)
355da1eb
SW
762{
763 struct rb_node *p;
764 struct ceph_inode_xattr *xattr = NULL;
12fe3dda 765 struct ceph_buffer *old_blob = NULL;
355da1eb
SW
766 void *dest;
767
768 dout("__build_xattrs_blob %p\n", &ci->vfs_inode);
769 if (ci->i_xattrs.dirty) {
770 int need = __get_required_blob_size(ci, 0, 0);
771
772 BUG_ON(need > ci->i_xattrs.prealloc_blob->alloc_len);
773
774 p = rb_first(&ci->i_xattrs.index);
775 dest = ci->i_xattrs.prealloc_blob->vec.iov_base;
776
777 ceph_encode_32(&dest, ci->i_xattrs.count);
778 while (p) {
779 xattr = rb_entry(p, struct ceph_inode_xattr, node);
780
781 ceph_encode_32(&dest, xattr->name_len);
782 memcpy(dest, xattr->name, xattr->name_len);
783 dest += xattr->name_len;
784 ceph_encode_32(&dest, xattr->val_len);
785 memcpy(dest, xattr->val, xattr->val_len);
786 dest += xattr->val_len;
787
788 p = rb_next(p);
789 }
790
791 /* adjust buffer len; it may be larger than we need */
792 ci->i_xattrs.prealloc_blob->vec.iov_len =
793 dest - ci->i_xattrs.prealloc_blob->vec.iov_base;
794
b6c1d5b8 795 if (ci->i_xattrs.blob)
12fe3dda 796 old_blob = ci->i_xattrs.blob;
355da1eb
SW
797 ci->i_xattrs.blob = ci->i_xattrs.prealloc_blob;
798 ci->i_xattrs.prealloc_blob = NULL;
799 ci->i_xattrs.dirty = false;
4a625be4 800 ci->i_xattrs.version++;
355da1eb 801 }
12fe3dda
LH
802
803 return old_blob;
355da1eb
SW
804}
805
315f2408
YZ
806static inline int __get_request_mask(struct inode *in) {
807 struct ceph_mds_request *req = current->journal_info;
808 int mask = 0;
809 if (req && req->r_target_inode == in) {
810 if (req->r_op == CEPH_MDS_OP_LOOKUP ||
811 req->r_op == CEPH_MDS_OP_LOOKUPINO ||
812 req->r_op == CEPH_MDS_OP_LOOKUPPARENT ||
813 req->r_op == CEPH_MDS_OP_GETATTR) {
814 mask = le32_to_cpu(req->r_args.getattr.mask);
815 } else if (req->r_op == CEPH_MDS_OP_OPEN ||
816 req->r_op == CEPH_MDS_OP_CREATE) {
817 mask = le32_to_cpu(req->r_args.open.mask);
818 }
819 }
820 return mask;
821}
822
7221fe4c 823ssize_t __ceph_getxattr(struct inode *inode, const char *name, void *value,
355da1eb
SW
824 size_t size)
825{
355da1eb 826 struct ceph_inode_info *ci = ceph_inode(inode);
355da1eb 827 struct ceph_inode_xattr *xattr;
881a5fa2 828 struct ceph_vxattr *vxattr = NULL;
315f2408 829 int req_mask;
f1d1b51d 830 ssize_t err;
355da1eb 831
0bee82fb
SW
832 /* let's see if a virtual xattr was requested */
833 vxattr = ceph_match_vxattr(inode, name);
29dccfa5 834 if (vxattr) {
49a9f4f6
YZ
835 int mask = 0;
836 if (vxattr->flags & VXATTR_FLAG_RSTAT)
837 mask |= CEPH_STAT_RSTAT;
838 err = ceph_do_getattr(inode, mask, true);
1684dd03
YZ
839 if (err)
840 return err;
29dccfa5 841 err = -ENODATA;
3b421018 842 if (!(vxattr->exists_cb && !vxattr->exists_cb(ci))) {
29dccfa5 843 err = vxattr->getxattr_cb(ci, value, size);
3b421018
JL
844 if (size && size < err)
845 err = -ERANGE;
846 }
a1dc1937 847 return err;
0bee82fb
SW
848 }
849
315f2408
YZ
850 req_mask = __get_request_mask(inode);
851
a1dc1937 852 spin_lock(&ci->i_ceph_lock);
853 dout("getxattr %p ver=%lld index_ver=%lld\n", inode,
854 ci->i_xattrs.version, ci->i_xattrs.index_version);
855
508b32d8 856 if (ci->i_xattrs.version == 0 ||
315f2408
YZ
857 !((req_mask & CEPH_CAP_XATTR_SHARED) ||
858 __ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 1))) {
be655596 859 spin_unlock(&ci->i_ceph_lock);
315f2408
YZ
860
861 /* security module gets xattr while filling trace */
d37b1d99 862 if (current->journal_info) {
315f2408
YZ
863 pr_warn_ratelimited("sync getxattr %p "
864 "during filling trace\n", inode);
865 return -EBUSY;
866 }
867
355da1eb 868 /* get xattrs from mds (if we don't already have them) */
508b32d8 869 err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
355da1eb
SW
870 if (err)
871 return err;
508b32d8 872 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
873 }
874
355da1eb
SW
875 err = __build_xattrs(inode);
876 if (err < 0)
877 goto out;
878
355da1eb
SW
879 err = -ENODATA; /* == ENOATTR */
880 xattr = __get_xattr(ci, name);
0bee82fb 881 if (!xattr)
355da1eb 882 goto out;
355da1eb
SW
883
884 err = -ERANGE;
885 if (size && size < xattr->val_len)
886 goto out;
887
888 err = xattr->val_len;
889 if (size == 0)
890 goto out;
891
892 memcpy(value, xattr->val, xattr->val_len);
893
d37b1d99 894 if (current->journal_info &&
315f2408
YZ
895 !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN))
896 ci->i_ceph_flags |= CEPH_I_SEC_INITED;
355da1eb 897out:
be655596 898 spin_unlock(&ci->i_ceph_lock);
355da1eb
SW
899 return err;
900}
901
902ssize_t ceph_listxattr(struct dentry *dentry, char *names, size_t size)
903{
2b0143b5 904 struct inode *inode = d_inode(dentry);
355da1eb 905 struct ceph_inode_info *ci = ceph_inode(inode);
881a5fa2 906 struct ceph_vxattr *vxattrs = ceph_inode_vxattrs(inode);
2b2abcac 907 bool len_only = (size == 0);
355da1eb
SW
908 u32 namelen;
909 int err;
355da1eb
SW
910 int i;
911
be655596 912 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
913 dout("listxattr %p ver=%lld index_ver=%lld\n", inode,
914 ci->i_xattrs.version, ci->i_xattrs.index_version);
915
508b32d8
YZ
916 if (ci->i_xattrs.version == 0 ||
917 !__ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 1)) {
be655596 918 spin_unlock(&ci->i_ceph_lock);
508b32d8 919 err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
355da1eb
SW
920 if (err)
921 return err;
508b32d8 922 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
923 }
924
355da1eb
SW
925 err = __build_xattrs(inode);
926 if (err < 0)
927 goto out;
3ce6cd12 928
2b2abcac 929 /* add 1 byte for each xattr due to the null termination */
b65917dd 930 namelen = ci->i_xattrs.names_size + ci->i_xattrs.count;
2b2abcac
DD
931 if (!len_only) {
932 if (namelen > size) {
933 err = -ERANGE;
934 goto out;
935 }
936 names = __copy_xattr_names(ci, names);
937 size -= namelen;
938 }
355da1eb 939
355da1eb
SW
940
941 /* virtual xattr names, too */
b65917dd 942 if (vxattrs) {
355da1eb 943 for (i = 0; vxattrs[i].name; i++) {
2b2abcac
DD
944 size_t this_len;
945
946 if (vxattrs[i].flags & VXATTR_FLAG_HIDDEN)
947 continue;
948 if (vxattrs[i].exists_cb && !vxattrs[i].exists_cb(ci))
949 continue;
950
951 this_len = strlen(vxattrs[i].name) + 1;
952 namelen += this_len;
953 if (len_only)
954 continue;
955
956 if (this_len > size) {
957 err = -ERANGE;
958 goto out;
b65917dd 959 }
2b2abcac
DD
960
961 memcpy(names, vxattrs[i].name, this_len);
962 names += this_len;
963 size -= this_len;
355da1eb 964 }
b65917dd 965 }
2b2abcac 966 err = namelen;
355da1eb 967out:
be655596 968 spin_unlock(&ci->i_ceph_lock);
355da1eb
SW
969 return err;
970}
971
a26fecca 972static int ceph_sync_setxattr(struct inode *inode, const char *name,
355da1eb
SW
973 const char *value, size_t size, int flags)
974{
a26fecca 975 struct ceph_fs_client *fsc = ceph_sb_to_client(inode->i_sb);
355da1eb 976 struct ceph_inode_info *ci = ceph_inode(inode);
355da1eb 977 struct ceph_mds_request *req;
3d14c5d2 978 struct ceph_mds_client *mdsc = fsc->mdsc;
25e6bae3 979 struct ceph_pagelist *pagelist = NULL;
04303d8a 980 int op = CEPH_MDS_OP_SETXATTR;
355da1eb 981 int err;
25e6bae3 982
0aeff37a 983 if (size > 0) {
25e6bae3 984 /* copy value into pagelist */
33165d47 985 pagelist = ceph_pagelist_alloc(GFP_NOFS);
25e6bae3 986 if (!pagelist)
355da1eb 987 return -ENOMEM;
25e6bae3 988
25e6bae3
YZ
989 err = ceph_pagelist_append(pagelist, value, size);
990 if (err)
991 goto out;
0aeff37a 992 } else if (!value) {
04303d8a
YZ
993 if (flags & CEPH_XATTR_REPLACE)
994 op = CEPH_MDS_OP_RMXATTR;
995 else
996 flags |= CEPH_XATTR_REMOVE;
355da1eb
SW
997 }
998
999 dout("setxattr value=%.*s\n", (int)size, value);
1000
1001 /* do request */
04303d8a 1002 req = ceph_mdsc_create_request(mdsc, op, USE_AUTH_MDS);
60d87733
JL
1003 if (IS_ERR(req)) {
1004 err = PTR_ERR(req);
1005 goto out;
1006 }
a149bb9a 1007
355da1eb 1008 req->r_path2 = kstrdup(name, GFP_NOFS);
a149bb9a
SK
1009 if (!req->r_path2) {
1010 ceph_mdsc_put_request(req);
1011 err = -ENOMEM;
1012 goto out;
1013 }
355da1eb 1014
04303d8a
YZ
1015 if (op == CEPH_MDS_OP_SETXATTR) {
1016 req->r_args.setxattr.flags = cpu_to_le32(flags);
1017 req->r_pagelist = pagelist;
1018 pagelist = NULL;
1019 }
355da1eb 1020
a149bb9a
SK
1021 req->r_inode = inode;
1022 ihold(inode);
1023 req->r_num_caps = 1;
1024 req->r_inode_drop = CEPH_CAP_XATTR_SHARED;
1025
355da1eb 1026 dout("xattr.ver (before): %lld\n", ci->i_xattrs.version);
752c8bdc 1027 err = ceph_mdsc_do_request(mdsc, NULL, req);
355da1eb
SW
1028 ceph_mdsc_put_request(req);
1029 dout("xattr.ver (after): %lld\n", ci->i_xattrs.version);
1030
1031out:
25e6bae3
YZ
1032 if (pagelist)
1033 ceph_pagelist_release(pagelist);
355da1eb
SW
1034 return err;
1035}
1036
a26fecca 1037int __ceph_setxattr(struct inode *inode, const char *name,
7221fe4c 1038 const void *value, size_t size, int flags)
355da1eb 1039{
881a5fa2 1040 struct ceph_vxattr *vxattr;
355da1eb 1041 struct ceph_inode_info *ci = ceph_inode(inode);
a26fecca 1042 struct ceph_mds_client *mdsc = ceph_sb_to_client(inode->i_sb)->mdsc;
f66fd9f0 1043 struct ceph_cap_flush *prealloc_cf = NULL;
86968ef2 1044 struct ceph_buffer *old_blob = NULL;
18fa8b3f 1045 int issued;
355da1eb 1046 int err;
fbc0b970 1047 int dirty = 0;
355da1eb
SW
1048 int name_len = strlen(name);
1049 int val_len = size;
1050 char *newname = NULL;
1051 char *newval = NULL;
1052 struct ceph_inode_xattr *xattr = NULL;
355da1eb 1053 int required_blob_size;
f1919826 1054 bool check_realm = false;
604d1b02 1055 bool lock_snap_rwsem = false;
355da1eb 1056
2cdeb1e4
AG
1057 if (ceph_snap(inode) != CEPH_NOSNAP)
1058 return -EROFS;
355da1eb 1059
06476a69 1060 vxattr = ceph_match_vxattr(inode, name);
f1919826 1061 if (vxattr) {
4e9906e7 1062 if (vxattr->flags & VXATTR_FLAG_READONLY)
f1919826
YZ
1063 return -EOPNOTSUPP;
1064 if (value && !strncmp(vxattr->name, "ceph.quota", 10))
1065 check_realm = true;
1066 }
355da1eb 1067
3adf654d
SW
1068 /* pass any unhandled ceph.* xattrs through to the MDS */
1069 if (!strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN))
1070 goto do_sync_unlocked;
1071
355da1eb
SW
1072 /* preallocate memory for xattr name, value, index node */
1073 err = -ENOMEM;
61413c2f 1074 newname = kmemdup(name, name_len + 1, GFP_NOFS);
355da1eb
SW
1075 if (!newname)
1076 goto out;
355da1eb
SW
1077
1078 if (val_len) {
b829c195 1079 newval = kmemdup(value, val_len, GFP_NOFS);
355da1eb
SW
1080 if (!newval)
1081 goto out;
355da1eb
SW
1082 }
1083
1084 xattr = kmalloc(sizeof(struct ceph_inode_xattr), GFP_NOFS);
1085 if (!xattr)
1086 goto out;
1087
f66fd9f0
YZ
1088 prealloc_cf = ceph_alloc_cap_flush();
1089 if (!prealloc_cf)
1090 goto out;
1091
be655596 1092 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
1093retry:
1094 issued = __ceph_caps_issued(ci, NULL);
508b32d8 1095 if (ci->i_xattrs.version == 0 || !(issued & CEPH_CAP_XATTR_EXCL))
355da1eb 1096 goto do_sync;
604d1b02
YZ
1097
1098 if (!lock_snap_rwsem && !ci->i_head_snapc) {
1099 lock_snap_rwsem = true;
1100 if (!down_read_trylock(&mdsc->snap_rwsem)) {
1101 spin_unlock(&ci->i_ceph_lock);
1102 down_read(&mdsc->snap_rwsem);
1103 spin_lock(&ci->i_ceph_lock);
1104 goto retry;
1105 }
1106 }
1107
1108 dout("setxattr %p issued %s\n", inode, ceph_cap_string(issued));
355da1eb
SW
1109 __build_xattrs(inode);
1110
1111 required_blob_size = __get_required_blob_size(ci, name_len, val_len);
1112
1113 if (!ci->i_xattrs.prealloc_blob ||
1114 required_blob_size > ci->i_xattrs.prealloc_blob->alloc_len) {
18fa8b3f 1115 struct ceph_buffer *blob;
355da1eb 1116
be655596 1117 spin_unlock(&ci->i_ceph_lock);
86968ef2
LH
1118 ceph_buffer_put(old_blob); /* Shouldn't be required */
1119 dout(" pre-allocating new blob size=%d\n", required_blob_size);
b6c1d5b8 1120 blob = ceph_buffer_new(required_blob_size, GFP_NOFS);
355da1eb 1121 if (!blob)
604d1b02 1122 goto do_sync_unlocked;
be655596 1123 spin_lock(&ci->i_ceph_lock);
86968ef2 1124 /* prealloc_blob can't be released while holding i_ceph_lock */
b6c1d5b8 1125 if (ci->i_xattrs.prealloc_blob)
86968ef2 1126 old_blob = ci->i_xattrs.prealloc_blob;
355da1eb
SW
1127 ci->i_xattrs.prealloc_blob = blob;
1128 goto retry;
1129 }
1130
bcdfeb2e
YZ
1131 err = __set_xattr(ci, newname, name_len, newval, val_len,
1132 flags, value ? 1 : -1, &xattr);
18fa8b3f 1133
fbc0b970 1134 if (!err) {
f66fd9f0
YZ
1135 dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_XATTR_EXCL,
1136 &prealloc_cf);
fbc0b970 1137 ci->i_xattrs.dirty = true;
c2050a45 1138 inode->i_ctime = current_time(inode);
fbc0b970 1139 }
18fa8b3f 1140
be655596 1141 spin_unlock(&ci->i_ceph_lock);
86968ef2 1142 ceph_buffer_put(old_blob);
604d1b02
YZ
1143 if (lock_snap_rwsem)
1144 up_read(&mdsc->snap_rwsem);
fca65b4a
SW
1145 if (dirty)
1146 __mark_inode_dirty(inode, dirty);
f66fd9f0 1147 ceph_free_cap_flush(prealloc_cf);
355da1eb
SW
1148 return err;
1149
1150do_sync:
be655596 1151 spin_unlock(&ci->i_ceph_lock);
3adf654d 1152do_sync_unlocked:
604d1b02
YZ
1153 if (lock_snap_rwsem)
1154 up_read(&mdsc->snap_rwsem);
315f2408
YZ
1155
1156 /* security module set xattr while filling trace */
d37b1d99 1157 if (current->journal_info) {
315f2408
YZ
1158 pr_warn_ratelimited("sync setxattr %p "
1159 "during filling trace\n", inode);
1160 err = -EBUSY;
1161 } else {
a26fecca 1162 err = ceph_sync_setxattr(inode, name, value, size, flags);
f1919826
YZ
1163 if (err >= 0 && check_realm) {
1164 /* check if snaprealm was created for quota inode */
1165 spin_lock(&ci->i_ceph_lock);
1166 if ((ci->i_max_files || ci->i_max_bytes) &&
1167 !(ci->i_snap_realm &&
1168 ci->i_snap_realm->ino == ci->i_vino.ino))
1169 err = -EOPNOTSUPP;
1170 spin_unlock(&ci->i_ceph_lock);
1171 }
315f2408 1172 }
355da1eb 1173out:
f66fd9f0 1174 ceph_free_cap_flush(prealloc_cf);
355da1eb
SW
1175 kfree(newname);
1176 kfree(newval);
1177 kfree(xattr);
1178 return err;
1179}
1180
2cdeb1e4
AG
1181static int ceph_get_xattr_handler(const struct xattr_handler *handler,
1182 struct dentry *dentry, struct inode *inode,
1183 const char *name, void *value, size_t size)
7221fe4c 1184{
2cdeb1e4
AG
1185 if (!ceph_is_valid_xattr(name))
1186 return -EOPNOTSUPP;
1187 return __ceph_getxattr(inode, name, value, size);
1188}
7221fe4c 1189
2cdeb1e4 1190static int ceph_set_xattr_handler(const struct xattr_handler *handler,
59301226
AV
1191 struct dentry *unused, struct inode *inode,
1192 const char *name, const void *value,
1193 size_t size, int flags)
2cdeb1e4
AG
1194{
1195 if (!ceph_is_valid_xattr(name))
1196 return -EOPNOTSUPP;
59301226 1197 return __ceph_setxattr(inode, name, value, size, flags);
7221fe4c 1198}
315f2408 1199
5130ccea 1200static const struct xattr_handler ceph_other_xattr_handler = {
2cdeb1e4
AG
1201 .prefix = "", /* match any name => handlers called with full name */
1202 .get = ceph_get_xattr_handler,
1203 .set = ceph_set_xattr_handler,
1204};
1205
315f2408
YZ
1206#ifdef CONFIG_SECURITY
1207bool ceph_security_xattr_wanted(struct inode *in)
1208{
1209 return in->i_security != NULL;
1210}
1211
1212bool ceph_security_xattr_deadlock(struct inode *in)
1213{
1214 struct ceph_inode_info *ci;
1215 bool ret;
d37b1d99 1216 if (!in->i_security)
315f2408
YZ
1217 return false;
1218 ci = ceph_inode(in);
1219 spin_lock(&ci->i_ceph_lock);
1220 ret = !(ci->i_ceph_flags & CEPH_I_SEC_INITED) &&
1221 !(ci->i_xattrs.version > 0 &&
1222 __ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 0));
1223 spin_unlock(&ci->i_ceph_lock);
1224 return ret;
1225}
ac6713cc
YZ
1226
1227#ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1228int ceph_security_init_secctx(struct dentry *dentry, umode_t mode,
1229 struct ceph_acl_sec_ctx *as_ctx)
1230{
1231 struct ceph_pagelist *pagelist = as_ctx->pagelist;
1232 const char *name;
1233 size_t name_len;
1234 int err;
1235
1236 err = security_dentry_init_security(dentry, mode, &dentry->d_name,
1237 &as_ctx->sec_ctx,
1238 &as_ctx->sec_ctxlen);
1239 if (err < 0) {
1240 WARN_ON_ONCE(err != -EOPNOTSUPP);
1241 err = 0; /* do nothing */
1242 goto out;
1243 }
1244
1245 err = -ENOMEM;
1246 if (!pagelist) {
1247 pagelist = ceph_pagelist_alloc(GFP_KERNEL);
1248 if (!pagelist)
1249 goto out;
1250 err = ceph_pagelist_reserve(pagelist, PAGE_SIZE);
1251 if (err)
1252 goto out;
1253 ceph_pagelist_encode_32(pagelist, 1);
1254 }
1255
1256 /*
1257 * FIXME: Make security_dentry_init_security() generic. Currently
1258 * It only supports single security module and only selinux has
1259 * dentry_init_security hook.
1260 */
1261 name = XATTR_NAME_SELINUX;
1262 name_len = strlen(name);
1263 err = ceph_pagelist_reserve(pagelist,
1264 4 * 2 + name_len + as_ctx->sec_ctxlen);
1265 if (err)
1266 goto out;
1267
1268 if (as_ctx->pagelist) {
1269 /* update count of KV pairs */
1270 BUG_ON(pagelist->length <= sizeof(__le32));
1271 if (list_is_singular(&pagelist->head)) {
1272 le32_add_cpu((__le32*)pagelist->mapped_tail, 1);
1273 } else {
1274 struct page *page = list_first_entry(&pagelist->head,
1275 struct page, lru);
1276 void *addr = kmap_atomic(page);
1277 le32_add_cpu((__le32*)addr, 1);
1278 kunmap_atomic(addr);
1279 }
1280 } else {
1281 as_ctx->pagelist = pagelist;
1282 }
1283
1284 ceph_pagelist_encode_32(pagelist, name_len);
1285 ceph_pagelist_append(pagelist, name, name_len);
1286
1287 ceph_pagelist_encode_32(pagelist, as_ctx->sec_ctxlen);
1288 ceph_pagelist_append(pagelist, as_ctx->sec_ctx, as_ctx->sec_ctxlen);
1289
1290 err = 0;
1291out:
1292 if (pagelist && !as_ctx->pagelist)
1293 ceph_pagelist_release(pagelist);
1294 return err;
1295}
1296
1297void ceph_security_invalidate_secctx(struct inode *inode)
1298{
1299 security_inode_invalidate_secctx(inode);
1300}
1301
1302static int ceph_xattr_set_security_label(const struct xattr_handler *handler,
1303 struct dentry *unused, struct inode *inode,
1304 const char *key, const void *buf,
1305 size_t buflen, int flags)
1306{
1307 if (security_ismaclabel(key)) {
1308 const char *name = xattr_full_name(handler, key);
1309 return __ceph_setxattr(inode, name, buf, buflen, flags);
1310 }
1311 return -EOPNOTSUPP;
1312}
1313
1314static int ceph_xattr_get_security_label(const struct xattr_handler *handler,
1315 struct dentry *unused, struct inode *inode,
1316 const char *key, void *buf, size_t buflen)
1317{
1318 if (security_ismaclabel(key)) {
1319 const char *name = xattr_full_name(handler, key);
1320 return __ceph_getxattr(inode, name, buf, buflen);
1321 }
1322 return -EOPNOTSUPP;
1323}
1324
1325static const struct xattr_handler ceph_security_label_handler = {
1326 .prefix = XATTR_SECURITY_PREFIX,
1327 .get = ceph_xattr_get_security_label,
1328 .set = ceph_xattr_set_security_label,
1329};
1330#endif
315f2408 1331#endif
5c31e92d
YZ
1332
1333void ceph_release_acl_sec_ctx(struct ceph_acl_sec_ctx *as_ctx)
1334{
1335#ifdef CONFIG_CEPH_FS_POSIX_ACL
1336 posix_acl_release(as_ctx->acl);
1337 posix_acl_release(as_ctx->default_acl);
ac6713cc
YZ
1338#endif
1339#ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1340 security_release_secctx(as_ctx->sec_ctx, as_ctx->sec_ctxlen);
5c31e92d
YZ
1341#endif
1342 if (as_ctx->pagelist)
1343 ceph_pagelist_release(as_ctx->pagelist);
1344}
ac6713cc
YZ
1345
1346/*
1347 * List of handlers for synthetic system.* attributes. Other
1348 * attributes are handled directly.
1349 */
1350const struct xattr_handler *ceph_xattr_handlers[] = {
1351#ifdef CONFIG_CEPH_FS_POSIX_ACL
1352 &posix_acl_access_xattr_handler,
1353 &posix_acl_default_xattr_handler,
1354#endif
1355#ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1356 &ceph_security_label_handler,
1357#endif
1358 &ceph_other_xattr_handler,
1359 NULL,
1360};