]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
3d14c5d2 | 2 | #include <linux/ceph/ceph_debug.h> |
25e6bae3 | 3 | #include <linux/ceph/pagelist.h> |
3d14c5d2 | 4 | |
355da1eb | 5 | #include "super.h" |
3d14c5d2 YS |
6 | #include "mds_client.h" |
7 | ||
8 | #include <linux/ceph/decode.h> | |
355da1eb SW |
9 | |
10 | #include <linux/xattr.h> | |
ac6713cc | 11 | #include <linux/security.h> |
4db658ea | 12 | #include <linux/posix_acl_xattr.h> |
5a0e3ad6 | 13 | #include <linux/slab.h> |
355da1eb | 14 | |
22891907 AE |
15 | #define XATTR_CEPH_PREFIX "ceph." |
16 | #define XATTR_CEPH_PREFIX_LEN (sizeof (XATTR_CEPH_PREFIX) - 1) | |
17 | ||
bcdfeb2e YZ |
18 | static int __remove_xattr(struct ceph_inode_info *ci, |
19 | struct ceph_inode_xattr *xattr); | |
20 | ||
355da1eb SW |
21 | static bool ceph_is_valid_xattr(const char *name) |
22 | { | |
22891907 | 23 | return !strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN) || |
355da1eb SW |
24 | !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) || |
25 | !strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN); | |
26 | } | |
27 | ||
28 | /* | |
29 | * These define virtual xattrs exposing the recursive directory | |
30 | * statistics and layout metadata. | |
31 | */ | |
881a5fa2 | 32 | struct ceph_vxattr { |
355da1eb | 33 | char *name; |
3ce6cd12 | 34 | size_t name_size; /* strlen(name) + 1 (for '\0') */ |
f1d1b51d JL |
35 | ssize_t (*getxattr_cb)(struct ceph_inode_info *ci, char *val, |
36 | size_t size); | |
f36e4472 | 37 | bool (*exists_cb)(struct ceph_inode_info *ci); |
4e9906e7 | 38 | unsigned int flags; |
355da1eb SW |
39 | }; |
40 | ||
4e9906e7 YZ |
41 | #define VXATTR_FLAG_READONLY (1<<0) |
42 | #define VXATTR_FLAG_HIDDEN (1<<1) | |
49a9f4f6 | 43 | #define VXATTR_FLAG_RSTAT (1<<2) |
4e9906e7 | 44 | |
32ab0bd7 SW |
45 | /* layouts */ |
46 | ||
47 | static bool ceph_vxattrcb_layout_exists(struct ceph_inode_info *ci) | |
48 | { | |
779fe0fb YZ |
49 | struct ceph_file_layout *fl = &ci->i_layout; |
50 | return (fl->stripe_unit > 0 || fl->stripe_count > 0 || | |
51 | fl->object_size > 0 || fl->pool_id >= 0 || | |
52 | rcu_dereference_raw(fl->pool_ns) != NULL); | |
32ab0bd7 SW |
53 | } |
54 | ||
f1d1b51d JL |
55 | static ssize_t ceph_vxattrcb_layout(struct ceph_inode_info *ci, char *val, |
56 | size_t size) | |
32ab0bd7 | 57 | { |
32ab0bd7 SW |
58 | struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb); |
59 | struct ceph_osd_client *osdc = &fsc->client->osdc; | |
779fe0fb | 60 | struct ceph_string *pool_ns; |
7627151e | 61 | s64 pool = ci->i_layout.pool_id; |
32ab0bd7 | 62 | const char *pool_name; |
779fe0fb | 63 | const char *ns_field = " pool_namespace="; |
1e5c6649 | 64 | char buf[128]; |
779fe0fb | 65 | size_t len, total_len = 0; |
3b421018 | 66 | ssize_t ret; |
779fe0fb YZ |
67 | |
68 | pool_ns = ceph_try_get_string(ci->i_layout.pool_ns); | |
32ab0bd7 SW |
69 | |
70 | dout("ceph_vxattrcb_layout %p\n", &ci->vfs_inode); | |
5aea3dcd | 71 | down_read(&osdc->lock); |
32ab0bd7 | 72 | pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool); |
1e5c6649 | 73 | if (pool_name) { |
779fe0fb | 74 | len = snprintf(buf, sizeof(buf), |
7627151e YZ |
75 | "stripe_unit=%u stripe_count=%u object_size=%u pool=", |
76 | ci->i_layout.stripe_unit, ci->i_layout.stripe_count, | |
77 | ci->i_layout.object_size); | |
779fe0fb | 78 | total_len = len + strlen(pool_name); |
1e5c6649 | 79 | } else { |
779fe0fb | 80 | len = snprintf(buf, sizeof(buf), |
7627151e YZ |
81 | "stripe_unit=%u stripe_count=%u object_size=%u pool=%lld", |
82 | ci->i_layout.stripe_unit, ci->i_layout.stripe_count, | |
f1d1b51d | 83 | ci->i_layout.object_size, pool); |
779fe0fb YZ |
84 | total_len = len; |
85 | } | |
86 | ||
87 | if (pool_ns) | |
88 | total_len += strlen(ns_field) + pool_ns->len; | |
89 | ||
3b421018 JL |
90 | ret = total_len; |
91 | if (size >= total_len) { | |
779fe0fb YZ |
92 | memcpy(val, buf, len); |
93 | ret = len; | |
94 | if (pool_name) { | |
95 | len = strlen(pool_name); | |
96 | memcpy(val + ret, pool_name, len); | |
97 | ret += len; | |
98 | } | |
99 | if (pool_ns) { | |
100 | len = strlen(ns_field); | |
101 | memcpy(val + ret, ns_field, len); | |
102 | ret += len; | |
103 | memcpy(val + ret, pool_ns->str, pool_ns->len); | |
104 | ret += pool_ns->len; | |
1e5c6649 YZ |
105 | } |
106 | } | |
5aea3dcd | 107 | up_read(&osdc->lock); |
779fe0fb | 108 | ceph_put_string(pool_ns); |
32ab0bd7 SW |
109 | return ret; |
110 | } | |
111 | ||
26350535 JL |
112 | /* |
113 | * The convention with strings in xattrs is that they should not be NULL | |
114 | * terminated, since we're returning the length with them. snprintf always | |
115 | * NULL terminates however, so call it on a temporary buffer and then memcpy | |
116 | * the result into place. | |
117 | */ | |
118 | static int ceph_fmt_xattr(char *val, size_t size, const char *fmt, ...) | |
119 | { | |
120 | int ret; | |
121 | va_list args; | |
122 | char buf[96]; /* NB: reevaluate size if new vxattrs are added */ | |
123 | ||
124 | va_start(args, fmt); | |
125 | ret = vsnprintf(buf, size ? sizeof(buf) : 0, fmt, args); | |
126 | va_end(args); | |
127 | ||
128 | /* Sanity check */ | |
129 | if (size && ret + 1 > sizeof(buf)) { | |
130 | WARN_ONCE(true, "Returned length too big (%d)", ret); | |
131 | return -E2BIG; | |
132 | } | |
133 | ||
134 | if (ret <= size) | |
135 | memcpy(val, buf, ret); | |
136 | return ret; | |
137 | } | |
138 | ||
f1d1b51d JL |
139 | static ssize_t ceph_vxattrcb_layout_stripe_unit(struct ceph_inode_info *ci, |
140 | char *val, size_t size) | |
695b7119 | 141 | { |
26350535 | 142 | return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_unit); |
695b7119 SW |
143 | } |
144 | ||
f1d1b51d JL |
145 | static ssize_t ceph_vxattrcb_layout_stripe_count(struct ceph_inode_info *ci, |
146 | char *val, size_t size) | |
695b7119 | 147 | { |
26350535 | 148 | return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_count); |
695b7119 SW |
149 | } |
150 | ||
f1d1b51d JL |
151 | static ssize_t ceph_vxattrcb_layout_object_size(struct ceph_inode_info *ci, |
152 | char *val, size_t size) | |
695b7119 | 153 | { |
26350535 | 154 | return ceph_fmt_xattr(val, size, "%u", ci->i_layout.object_size); |
695b7119 SW |
155 | } |
156 | ||
f1d1b51d JL |
157 | static ssize_t ceph_vxattrcb_layout_pool(struct ceph_inode_info *ci, |
158 | char *val, size_t size) | |
695b7119 | 159 | { |
f1d1b51d | 160 | ssize_t ret; |
695b7119 SW |
161 | struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb); |
162 | struct ceph_osd_client *osdc = &fsc->client->osdc; | |
7627151e | 163 | s64 pool = ci->i_layout.pool_id; |
695b7119 SW |
164 | const char *pool_name; |
165 | ||
5aea3dcd | 166 | down_read(&osdc->lock); |
695b7119 | 167 | pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool); |
26350535 JL |
168 | if (pool_name) { |
169 | ret = strlen(pool_name); | |
170 | if (ret <= size) | |
171 | memcpy(val, pool_name, ret); | |
172 | } else { | |
173 | ret = ceph_fmt_xattr(val, size, "%lld", pool); | |
174 | } | |
5aea3dcd | 175 | up_read(&osdc->lock); |
695b7119 SW |
176 | return ret; |
177 | } | |
178 | ||
f1d1b51d JL |
179 | static ssize_t ceph_vxattrcb_layout_pool_namespace(struct ceph_inode_info *ci, |
180 | char *val, size_t size) | |
779fe0fb | 181 | { |
26350535 | 182 | ssize_t ret = 0; |
779fe0fb | 183 | struct ceph_string *ns = ceph_try_get_string(ci->i_layout.pool_ns); |
26350535 | 184 | |
779fe0fb | 185 | if (ns) { |
26350535 JL |
186 | ret = ns->len; |
187 | if (ret <= size) | |
188 | memcpy(val, ns->str, ret); | |
779fe0fb YZ |
189 | ceph_put_string(ns); |
190 | } | |
191 | return ret; | |
192 | } | |
193 | ||
355da1eb SW |
194 | /* directories */ |
195 | ||
f1d1b51d JL |
196 | static ssize_t ceph_vxattrcb_dir_entries(struct ceph_inode_info *ci, char *val, |
197 | size_t size) | |
355da1eb | 198 | { |
26350535 | 199 | return ceph_fmt_xattr(val, size, "%lld", ci->i_files + ci->i_subdirs); |
355da1eb SW |
200 | } |
201 | ||
f1d1b51d JL |
202 | static ssize_t ceph_vxattrcb_dir_files(struct ceph_inode_info *ci, char *val, |
203 | size_t size) | |
355da1eb | 204 | { |
26350535 | 205 | return ceph_fmt_xattr(val, size, "%lld", ci->i_files); |
355da1eb SW |
206 | } |
207 | ||
f1d1b51d JL |
208 | static ssize_t ceph_vxattrcb_dir_subdirs(struct ceph_inode_info *ci, char *val, |
209 | size_t size) | |
355da1eb | 210 | { |
26350535 | 211 | return ceph_fmt_xattr(val, size, "%lld", ci->i_subdirs); |
355da1eb SW |
212 | } |
213 | ||
f1d1b51d JL |
214 | static ssize_t ceph_vxattrcb_dir_rentries(struct ceph_inode_info *ci, char *val, |
215 | size_t size) | |
355da1eb | 216 | { |
26350535 JL |
217 | return ceph_fmt_xattr(val, size, "%lld", |
218 | ci->i_rfiles + ci->i_rsubdirs); | |
355da1eb SW |
219 | } |
220 | ||
f1d1b51d JL |
221 | static ssize_t ceph_vxattrcb_dir_rfiles(struct ceph_inode_info *ci, char *val, |
222 | size_t size) | |
355da1eb | 223 | { |
26350535 | 224 | return ceph_fmt_xattr(val, size, "%lld", ci->i_rfiles); |
355da1eb SW |
225 | } |
226 | ||
f1d1b51d JL |
227 | static ssize_t ceph_vxattrcb_dir_rsubdirs(struct ceph_inode_info *ci, char *val, |
228 | size_t size) | |
355da1eb | 229 | { |
26350535 | 230 | return ceph_fmt_xattr(val, size, "%lld", ci->i_rsubdirs); |
355da1eb SW |
231 | } |
232 | ||
f1d1b51d JL |
233 | static ssize_t ceph_vxattrcb_dir_rbytes(struct ceph_inode_info *ci, char *val, |
234 | size_t size) | |
355da1eb | 235 | { |
26350535 | 236 | return ceph_fmt_xattr(val, size, "%lld", ci->i_rbytes); |
355da1eb SW |
237 | } |
238 | ||
f1d1b51d JL |
239 | static ssize_t ceph_vxattrcb_dir_rctime(struct ceph_inode_info *ci, char *val, |
240 | size_t size) | |
355da1eb | 241 | { |
26350535 JL |
242 | return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_rctime.tv_sec, |
243 | ci->i_rctime.tv_nsec); | |
355da1eb SW |
244 | } |
245 | ||
08796873 YZ |
246 | /* dir pin */ |
247 | static bool ceph_vxattrcb_dir_pin_exists(struct ceph_inode_info *ci) | |
248 | { | |
249 | return ci->i_dir_pin != -ENODATA; | |
250 | } | |
251 | ||
f1d1b51d JL |
252 | static ssize_t ceph_vxattrcb_dir_pin(struct ceph_inode_info *ci, char *val, |
253 | size_t size) | |
08796873 | 254 | { |
26350535 | 255 | return ceph_fmt_xattr(val, size, "%d", (int)ci->i_dir_pin); |
08796873 | 256 | } |
fb18a575 | 257 | |
08796873 | 258 | /* quotas */ |
fb18a575 LH |
259 | static bool ceph_vxattrcb_quota_exists(struct ceph_inode_info *ci) |
260 | { | |
f1919826 YZ |
261 | bool ret = false; |
262 | spin_lock(&ci->i_ceph_lock); | |
263 | if ((ci->i_max_files || ci->i_max_bytes) && | |
264 | ci->i_vino.snap == CEPH_NOSNAP && | |
265 | ci->i_snap_realm && | |
266 | ci->i_snap_realm->ino == ci->i_vino.ino) | |
267 | ret = true; | |
268 | spin_unlock(&ci->i_ceph_lock); | |
269 | return ret; | |
fb18a575 LH |
270 | } |
271 | ||
f1d1b51d JL |
272 | static ssize_t ceph_vxattrcb_quota(struct ceph_inode_info *ci, char *val, |
273 | size_t size) | |
fb18a575 | 274 | { |
26350535 JL |
275 | return ceph_fmt_xattr(val, size, "max_bytes=%llu max_files=%llu", |
276 | ci->i_max_bytes, ci->i_max_files); | |
fb18a575 LH |
277 | } |
278 | ||
f1d1b51d JL |
279 | static ssize_t ceph_vxattrcb_quota_max_bytes(struct ceph_inode_info *ci, |
280 | char *val, size_t size) | |
fb18a575 | 281 | { |
26350535 | 282 | return ceph_fmt_xattr(val, size, "%llu", ci->i_max_bytes); |
fb18a575 LH |
283 | } |
284 | ||
f1d1b51d JL |
285 | static ssize_t ceph_vxattrcb_quota_max_files(struct ceph_inode_info *ci, |
286 | char *val, size_t size) | |
fb18a575 | 287 | { |
26350535 | 288 | return ceph_fmt_xattr(val, size, "%llu", ci->i_max_files); |
fb18a575 | 289 | } |
32ab0bd7 | 290 | |
100cc610 DD |
291 | /* snapshots */ |
292 | static bool ceph_vxattrcb_snap_btime_exists(struct ceph_inode_info *ci) | |
293 | { | |
294 | return (ci->i_snap_btime.tv_sec != 0 || ci->i_snap_btime.tv_nsec != 0); | |
295 | } | |
296 | ||
f1d1b51d JL |
297 | static ssize_t ceph_vxattrcb_snap_btime(struct ceph_inode_info *ci, char *val, |
298 | size_t size) | |
100cc610 | 299 | { |
26350535 JL |
300 | return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_snap_btime.tv_sec, |
301 | ci->i_snap_btime.tv_nsec); | |
100cc610 DD |
302 | } |
303 | ||
eb788084 | 304 | #define CEPH_XATTR_NAME(_type, _name) XATTR_CEPH_PREFIX #_type "." #_name |
695b7119 SW |
305 | #define CEPH_XATTR_NAME2(_type, _name, _name2) \ |
306 | XATTR_CEPH_PREFIX #_type "." #_name "." #_name2 | |
eb788084 | 307 | |
49a9f4f6 | 308 | #define XATTR_NAME_CEPH(_type, _name, _flags) \ |
8860147a SW |
309 | { \ |
310 | .name = CEPH_XATTR_NAME(_type, _name), \ | |
311 | .name_size = sizeof (CEPH_XATTR_NAME(_type, _name)), \ | |
312 | .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \ | |
49a9f4f6 YZ |
313 | .exists_cb = NULL, \ |
314 | .flags = (VXATTR_FLAG_READONLY | _flags), \ | |
8860147a | 315 | } |
49a9f4f6 YZ |
316 | #define XATTR_RSTAT_FIELD(_type, _name) \ |
317 | XATTR_NAME_CEPH(_type, _name, VXATTR_FLAG_RSTAT) | |
695b7119 SW |
318 | #define XATTR_LAYOUT_FIELD(_type, _name, _field) \ |
319 | { \ | |
320 | .name = CEPH_XATTR_NAME2(_type, _name, _field), \ | |
321 | .name_size = sizeof (CEPH_XATTR_NAME2(_type, _name, _field)), \ | |
322 | .getxattr_cb = ceph_vxattrcb_ ## _name ## _ ## _field, \ | |
695b7119 | 323 | .exists_cb = ceph_vxattrcb_layout_exists, \ |
4e9906e7 | 324 | .flags = VXATTR_FLAG_HIDDEN, \ |
695b7119 | 325 | } |
fb18a575 LH |
326 | #define XATTR_QUOTA_FIELD(_type, _name) \ |
327 | { \ | |
328 | .name = CEPH_XATTR_NAME(_type, _name), \ | |
329 | .name_size = sizeof(CEPH_XATTR_NAME(_type, _name)), \ | |
330 | .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \ | |
fb18a575 | 331 | .exists_cb = ceph_vxattrcb_quota_exists, \ |
4e9906e7 | 332 | .flags = VXATTR_FLAG_HIDDEN, \ |
fb18a575 | 333 | } |
eb788084 | 334 | |
881a5fa2 | 335 | static struct ceph_vxattr ceph_dir_vxattrs[] = { |
1f08f2b0 SW |
336 | { |
337 | .name = "ceph.dir.layout", | |
338 | .name_size = sizeof("ceph.dir.layout"), | |
339 | .getxattr_cb = ceph_vxattrcb_layout, | |
1f08f2b0 | 340 | .exists_cb = ceph_vxattrcb_layout_exists, |
4e9906e7 | 341 | .flags = VXATTR_FLAG_HIDDEN, |
1f08f2b0 | 342 | }, |
695b7119 SW |
343 | XATTR_LAYOUT_FIELD(dir, layout, stripe_unit), |
344 | XATTR_LAYOUT_FIELD(dir, layout, stripe_count), | |
345 | XATTR_LAYOUT_FIELD(dir, layout, object_size), | |
346 | XATTR_LAYOUT_FIELD(dir, layout, pool), | |
779fe0fb | 347 | XATTR_LAYOUT_FIELD(dir, layout, pool_namespace), |
49a9f4f6 YZ |
348 | XATTR_NAME_CEPH(dir, entries, 0), |
349 | XATTR_NAME_CEPH(dir, files, 0), | |
350 | XATTR_NAME_CEPH(dir, subdirs, 0), | |
351 | XATTR_RSTAT_FIELD(dir, rentries), | |
352 | XATTR_RSTAT_FIELD(dir, rfiles), | |
353 | XATTR_RSTAT_FIELD(dir, rsubdirs), | |
354 | XATTR_RSTAT_FIELD(dir, rbytes), | |
355 | XATTR_RSTAT_FIELD(dir, rctime), | |
08796873 YZ |
356 | { |
357 | .name = "ceph.dir.pin", | |
e1b81439 | 358 | .name_size = sizeof("ceph.dir.pin"), |
08796873 YZ |
359 | .getxattr_cb = ceph_vxattrcb_dir_pin, |
360 | .exists_cb = ceph_vxattrcb_dir_pin_exists, | |
361 | .flags = VXATTR_FLAG_HIDDEN, | |
362 | }, | |
fb18a575 LH |
363 | { |
364 | .name = "ceph.quota", | |
365 | .name_size = sizeof("ceph.quota"), | |
366 | .getxattr_cb = ceph_vxattrcb_quota, | |
fb18a575 | 367 | .exists_cb = ceph_vxattrcb_quota_exists, |
4e9906e7 | 368 | .flags = VXATTR_FLAG_HIDDEN, |
fb18a575 LH |
369 | }, |
370 | XATTR_QUOTA_FIELD(quota, max_bytes), | |
371 | XATTR_QUOTA_FIELD(quota, max_files), | |
100cc610 DD |
372 | { |
373 | .name = "ceph.snap.btime", | |
374 | .name_size = sizeof("ceph.snap.btime"), | |
375 | .getxattr_cb = ceph_vxattrcb_snap_btime, | |
376 | .exists_cb = ceph_vxattrcb_snap_btime_exists, | |
377 | .flags = VXATTR_FLAG_READONLY, | |
378 | }, | |
2c3dd4ff | 379 | { .name = NULL, 0 } /* Required table terminator */ |
355da1eb SW |
380 | }; |
381 | ||
382 | /* files */ | |
383 | ||
881a5fa2 | 384 | static struct ceph_vxattr ceph_file_vxattrs[] = { |
32ab0bd7 SW |
385 | { |
386 | .name = "ceph.file.layout", | |
387 | .name_size = sizeof("ceph.file.layout"), | |
388 | .getxattr_cb = ceph_vxattrcb_layout, | |
32ab0bd7 | 389 | .exists_cb = ceph_vxattrcb_layout_exists, |
4e9906e7 | 390 | .flags = VXATTR_FLAG_HIDDEN, |
32ab0bd7 | 391 | }, |
695b7119 SW |
392 | XATTR_LAYOUT_FIELD(file, layout, stripe_unit), |
393 | XATTR_LAYOUT_FIELD(file, layout, stripe_count), | |
394 | XATTR_LAYOUT_FIELD(file, layout, object_size), | |
395 | XATTR_LAYOUT_FIELD(file, layout, pool), | |
779fe0fb | 396 | XATTR_LAYOUT_FIELD(file, layout, pool_namespace), |
100cc610 DD |
397 | { |
398 | .name = "ceph.snap.btime", | |
399 | .name_size = sizeof("ceph.snap.btime"), | |
400 | .getxattr_cb = ceph_vxattrcb_snap_btime, | |
401 | .exists_cb = ceph_vxattrcb_snap_btime_exists, | |
402 | .flags = VXATTR_FLAG_READONLY, | |
403 | }, | |
2c3dd4ff | 404 | { .name = NULL, 0 } /* Required table terminator */ |
355da1eb SW |
405 | }; |
406 | ||
881a5fa2 | 407 | static struct ceph_vxattr *ceph_inode_vxattrs(struct inode *inode) |
355da1eb SW |
408 | { |
409 | if (S_ISDIR(inode->i_mode)) | |
410 | return ceph_dir_vxattrs; | |
411 | else if (S_ISREG(inode->i_mode)) | |
412 | return ceph_file_vxattrs; | |
413 | return NULL; | |
414 | } | |
415 | ||
881a5fa2 | 416 | static struct ceph_vxattr *ceph_match_vxattr(struct inode *inode, |
355da1eb SW |
417 | const char *name) |
418 | { | |
881a5fa2 | 419 | struct ceph_vxattr *vxattr = ceph_inode_vxattrs(inode); |
06476a69 AE |
420 | |
421 | if (vxattr) { | |
422 | while (vxattr->name) { | |
423 | if (!strcmp(vxattr->name, name)) | |
424 | return vxattr; | |
425 | vxattr++; | |
426 | } | |
427 | } | |
428 | ||
355da1eb SW |
429 | return NULL; |
430 | } | |
431 | ||
432 | static int __set_xattr(struct ceph_inode_info *ci, | |
433 | const char *name, int name_len, | |
434 | const char *val, int val_len, | |
fbc0b970 | 435 | int flags, int update_xattr, |
355da1eb SW |
436 | struct ceph_inode_xattr **newxattr) |
437 | { | |
438 | struct rb_node **p; | |
439 | struct rb_node *parent = NULL; | |
440 | struct ceph_inode_xattr *xattr = NULL; | |
441 | int c; | |
442 | int new = 0; | |
443 | ||
444 | p = &ci->i_xattrs.index.rb_node; | |
445 | while (*p) { | |
446 | parent = *p; | |
447 | xattr = rb_entry(parent, struct ceph_inode_xattr, node); | |
448 | c = strncmp(name, xattr->name, min(name_len, xattr->name_len)); | |
449 | if (c < 0) | |
450 | p = &(*p)->rb_left; | |
451 | else if (c > 0) | |
452 | p = &(*p)->rb_right; | |
453 | else { | |
454 | if (name_len == xattr->name_len) | |
455 | break; | |
456 | else if (name_len < xattr->name_len) | |
457 | p = &(*p)->rb_left; | |
458 | else | |
459 | p = &(*p)->rb_right; | |
460 | } | |
461 | xattr = NULL; | |
462 | } | |
463 | ||
fbc0b970 YZ |
464 | if (update_xattr) { |
465 | int err = 0; | |
eeca958d | 466 | |
fbc0b970 YZ |
467 | if (xattr && (flags & XATTR_CREATE)) |
468 | err = -EEXIST; | |
469 | else if (!xattr && (flags & XATTR_REPLACE)) | |
470 | err = -ENODATA; | |
471 | if (err) { | |
472 | kfree(name); | |
473 | kfree(val); | |
eeca958d | 474 | kfree(*newxattr); |
fbc0b970 YZ |
475 | return err; |
476 | } | |
bcdfeb2e YZ |
477 | if (update_xattr < 0) { |
478 | if (xattr) | |
479 | __remove_xattr(ci, xattr); | |
480 | kfree(name); | |
eeca958d | 481 | kfree(*newxattr); |
bcdfeb2e YZ |
482 | return 0; |
483 | } | |
fbc0b970 YZ |
484 | } |
485 | ||
355da1eb SW |
486 | if (!xattr) { |
487 | new = 1; | |
488 | xattr = *newxattr; | |
489 | xattr->name = name; | |
490 | xattr->name_len = name_len; | |
fbc0b970 | 491 | xattr->should_free_name = update_xattr; |
355da1eb SW |
492 | |
493 | ci->i_xattrs.count++; | |
494 | dout("__set_xattr count=%d\n", ci->i_xattrs.count); | |
495 | } else { | |
496 | kfree(*newxattr); | |
497 | *newxattr = NULL; | |
498 | if (xattr->should_free_val) | |
499 | kfree((void *)xattr->val); | |
500 | ||
fbc0b970 | 501 | if (update_xattr) { |
355da1eb SW |
502 | kfree((void *)name); |
503 | name = xattr->name; | |
504 | } | |
505 | ci->i_xattrs.names_size -= xattr->name_len; | |
506 | ci->i_xattrs.vals_size -= xattr->val_len; | |
507 | } | |
355da1eb SW |
508 | ci->i_xattrs.names_size += name_len; |
509 | ci->i_xattrs.vals_size += val_len; | |
510 | if (val) | |
511 | xattr->val = val; | |
512 | else | |
513 | xattr->val = ""; | |
514 | ||
515 | xattr->val_len = val_len; | |
fbc0b970 YZ |
516 | xattr->dirty = update_xattr; |
517 | xattr->should_free_val = (val && update_xattr); | |
355da1eb SW |
518 | |
519 | if (new) { | |
520 | rb_link_node(&xattr->node, parent, p); | |
521 | rb_insert_color(&xattr->node, &ci->i_xattrs.index); | |
522 | dout("__set_xattr_val p=%p\n", p); | |
523 | } | |
524 | ||
05729781 YZ |
525 | dout("__set_xattr_val added %llx.%llx xattr %p %.*s=%.*s\n", |
526 | ceph_vinop(&ci->vfs_inode), xattr, name_len, name, val_len, val); | |
355da1eb SW |
527 | |
528 | return 0; | |
529 | } | |
530 | ||
531 | static struct ceph_inode_xattr *__get_xattr(struct ceph_inode_info *ci, | |
532 | const char *name) | |
533 | { | |
534 | struct rb_node **p; | |
535 | struct rb_node *parent = NULL; | |
536 | struct ceph_inode_xattr *xattr = NULL; | |
17db143f | 537 | int name_len = strlen(name); |
355da1eb SW |
538 | int c; |
539 | ||
540 | p = &ci->i_xattrs.index.rb_node; | |
541 | while (*p) { | |
542 | parent = *p; | |
543 | xattr = rb_entry(parent, struct ceph_inode_xattr, node); | |
544 | c = strncmp(name, xattr->name, xattr->name_len); | |
17db143f SW |
545 | if (c == 0 && name_len > xattr->name_len) |
546 | c = 1; | |
355da1eb SW |
547 | if (c < 0) |
548 | p = &(*p)->rb_left; | |
549 | else if (c > 0) | |
550 | p = &(*p)->rb_right; | |
551 | else { | |
552 | dout("__get_xattr %s: found %.*s\n", name, | |
553 | xattr->val_len, xattr->val); | |
554 | return xattr; | |
555 | } | |
556 | } | |
557 | ||
558 | dout("__get_xattr %s: not found\n", name); | |
559 | ||
560 | return NULL; | |
561 | } | |
562 | ||
563 | static void __free_xattr(struct ceph_inode_xattr *xattr) | |
564 | { | |
565 | BUG_ON(!xattr); | |
566 | ||
567 | if (xattr->should_free_name) | |
568 | kfree((void *)xattr->name); | |
569 | if (xattr->should_free_val) | |
570 | kfree((void *)xattr->val); | |
571 | ||
572 | kfree(xattr); | |
573 | } | |
574 | ||
575 | static int __remove_xattr(struct ceph_inode_info *ci, | |
576 | struct ceph_inode_xattr *xattr) | |
577 | { | |
578 | if (!xattr) | |
524186ac | 579 | return -ENODATA; |
355da1eb SW |
580 | |
581 | rb_erase(&xattr->node, &ci->i_xattrs.index); | |
582 | ||
583 | if (xattr->should_free_name) | |
584 | kfree((void *)xattr->name); | |
585 | if (xattr->should_free_val) | |
586 | kfree((void *)xattr->val); | |
587 | ||
588 | ci->i_xattrs.names_size -= xattr->name_len; | |
589 | ci->i_xattrs.vals_size -= xattr->val_len; | |
590 | ci->i_xattrs.count--; | |
591 | kfree(xattr); | |
592 | ||
593 | return 0; | |
594 | } | |
595 | ||
355da1eb SW |
596 | static char *__copy_xattr_names(struct ceph_inode_info *ci, |
597 | char *dest) | |
598 | { | |
599 | struct rb_node *p; | |
600 | struct ceph_inode_xattr *xattr = NULL; | |
601 | ||
602 | p = rb_first(&ci->i_xattrs.index); | |
603 | dout("__copy_xattr_names count=%d\n", ci->i_xattrs.count); | |
604 | ||
605 | while (p) { | |
606 | xattr = rb_entry(p, struct ceph_inode_xattr, node); | |
607 | memcpy(dest, xattr->name, xattr->name_len); | |
608 | dest[xattr->name_len] = '\0'; | |
609 | ||
610 | dout("dest=%s %p (%s) (%d/%d)\n", dest, xattr, xattr->name, | |
611 | xattr->name_len, ci->i_xattrs.names_size); | |
612 | ||
613 | dest += xattr->name_len + 1; | |
614 | p = rb_next(p); | |
615 | } | |
616 | ||
617 | return dest; | |
618 | } | |
619 | ||
620 | void __ceph_destroy_xattrs(struct ceph_inode_info *ci) | |
621 | { | |
622 | struct rb_node *p, *tmp; | |
623 | struct ceph_inode_xattr *xattr = NULL; | |
624 | ||
625 | p = rb_first(&ci->i_xattrs.index); | |
626 | ||
627 | dout("__ceph_destroy_xattrs p=%p\n", p); | |
628 | ||
629 | while (p) { | |
630 | xattr = rb_entry(p, struct ceph_inode_xattr, node); | |
631 | tmp = p; | |
632 | p = rb_next(tmp); | |
633 | dout("__ceph_destroy_xattrs next p=%p (%.*s)\n", p, | |
634 | xattr->name_len, xattr->name); | |
635 | rb_erase(tmp, &ci->i_xattrs.index); | |
636 | ||
637 | __free_xattr(xattr); | |
638 | } | |
639 | ||
640 | ci->i_xattrs.names_size = 0; | |
641 | ci->i_xattrs.vals_size = 0; | |
642 | ci->i_xattrs.index_version = 0; | |
643 | ci->i_xattrs.count = 0; | |
644 | ci->i_xattrs.index = RB_ROOT; | |
645 | } | |
646 | ||
647 | static int __build_xattrs(struct inode *inode) | |
be655596 SW |
648 | __releases(ci->i_ceph_lock) |
649 | __acquires(ci->i_ceph_lock) | |
355da1eb SW |
650 | { |
651 | u32 namelen; | |
652 | u32 numattr = 0; | |
653 | void *p, *end; | |
654 | u32 len; | |
655 | const char *name, *val; | |
656 | struct ceph_inode_info *ci = ceph_inode(inode); | |
657 | int xattr_version; | |
658 | struct ceph_inode_xattr **xattrs = NULL; | |
63ff78b2 | 659 | int err = 0; |
355da1eb SW |
660 | int i; |
661 | ||
662 | dout("__build_xattrs() len=%d\n", | |
663 | ci->i_xattrs.blob ? (int)ci->i_xattrs.blob->vec.iov_len : 0); | |
664 | ||
665 | if (ci->i_xattrs.index_version >= ci->i_xattrs.version) | |
666 | return 0; /* already built */ | |
667 | ||
668 | __ceph_destroy_xattrs(ci); | |
669 | ||
670 | start: | |
671 | /* updated internal xattr rb tree */ | |
672 | if (ci->i_xattrs.blob && ci->i_xattrs.blob->vec.iov_len > 4) { | |
673 | p = ci->i_xattrs.blob->vec.iov_base; | |
674 | end = p + ci->i_xattrs.blob->vec.iov_len; | |
675 | ceph_decode_32_safe(&p, end, numattr, bad); | |
676 | xattr_version = ci->i_xattrs.version; | |
be655596 | 677 | spin_unlock(&ci->i_ceph_lock); |
355da1eb | 678 | |
7e8a2952 | 679 | xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), |
355da1eb SW |
680 | GFP_NOFS); |
681 | err = -ENOMEM; | |
682 | if (!xattrs) | |
683 | goto bad_lock; | |
1a295bd8 | 684 | |
355da1eb SW |
685 | for (i = 0; i < numattr; i++) { |
686 | xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), | |
687 | GFP_NOFS); | |
688 | if (!xattrs[i]) | |
689 | goto bad_lock; | |
690 | } | |
691 | ||
be655596 | 692 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
693 | if (ci->i_xattrs.version != xattr_version) { |
694 | /* lost a race, retry */ | |
695 | for (i = 0; i < numattr; i++) | |
696 | kfree(xattrs[i]); | |
697 | kfree(xattrs); | |
21ec6ffa | 698 | xattrs = NULL; |
355da1eb SW |
699 | goto start; |
700 | } | |
701 | err = -EIO; | |
702 | while (numattr--) { | |
703 | ceph_decode_32_safe(&p, end, len, bad); | |
704 | namelen = len; | |
705 | name = p; | |
706 | p += len; | |
707 | ceph_decode_32_safe(&p, end, len, bad); | |
708 | val = p; | |
709 | p += len; | |
710 | ||
711 | err = __set_xattr(ci, name, namelen, val, len, | |
fbc0b970 | 712 | 0, 0, &xattrs[numattr]); |
355da1eb SW |
713 | |
714 | if (err < 0) | |
715 | goto bad; | |
716 | } | |
717 | kfree(xattrs); | |
718 | } | |
719 | ci->i_xattrs.index_version = ci->i_xattrs.version; | |
720 | ci->i_xattrs.dirty = false; | |
721 | ||
722 | return err; | |
723 | bad_lock: | |
be655596 | 724 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
725 | bad: |
726 | if (xattrs) { | |
727 | for (i = 0; i < numattr; i++) | |
728 | kfree(xattrs[i]); | |
729 | kfree(xattrs); | |
730 | } | |
731 | ci->i_xattrs.names_size = 0; | |
732 | return err; | |
733 | } | |
734 | ||
735 | static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size, | |
736 | int val_size) | |
737 | { | |
738 | /* | |
739 | * 4 bytes for the length, and additional 4 bytes per each xattr name, | |
740 | * 4 bytes per each value | |
741 | */ | |
742 | int size = 4 + ci->i_xattrs.count*(4 + 4) + | |
743 | ci->i_xattrs.names_size + | |
744 | ci->i_xattrs.vals_size; | |
745 | dout("__get_required_blob_size c=%d names.size=%d vals.size=%d\n", | |
746 | ci->i_xattrs.count, ci->i_xattrs.names_size, | |
747 | ci->i_xattrs.vals_size); | |
748 | ||
749 | if (name_size) | |
750 | size += 4 + 4 + name_size + val_size; | |
751 | ||
752 | return size; | |
753 | } | |
754 | ||
755 | /* | |
756 | * If there are dirty xattrs, reencode xattrs into the prealloc_blob | |
12fe3dda LH |
757 | * and swap into place. It returns the old i_xattrs.blob (or NULL) so |
758 | * that it can be freed by the caller as the i_ceph_lock is likely to be | |
759 | * held. | |
355da1eb | 760 | */ |
12fe3dda | 761 | struct ceph_buffer *__ceph_build_xattrs_blob(struct ceph_inode_info *ci) |
355da1eb SW |
762 | { |
763 | struct rb_node *p; | |
764 | struct ceph_inode_xattr *xattr = NULL; | |
12fe3dda | 765 | struct ceph_buffer *old_blob = NULL; |
355da1eb SW |
766 | void *dest; |
767 | ||
768 | dout("__build_xattrs_blob %p\n", &ci->vfs_inode); | |
769 | if (ci->i_xattrs.dirty) { | |
770 | int need = __get_required_blob_size(ci, 0, 0); | |
771 | ||
772 | BUG_ON(need > ci->i_xattrs.prealloc_blob->alloc_len); | |
773 | ||
774 | p = rb_first(&ci->i_xattrs.index); | |
775 | dest = ci->i_xattrs.prealloc_blob->vec.iov_base; | |
776 | ||
777 | ceph_encode_32(&dest, ci->i_xattrs.count); | |
778 | while (p) { | |
779 | xattr = rb_entry(p, struct ceph_inode_xattr, node); | |
780 | ||
781 | ceph_encode_32(&dest, xattr->name_len); | |
782 | memcpy(dest, xattr->name, xattr->name_len); | |
783 | dest += xattr->name_len; | |
784 | ceph_encode_32(&dest, xattr->val_len); | |
785 | memcpy(dest, xattr->val, xattr->val_len); | |
786 | dest += xattr->val_len; | |
787 | ||
788 | p = rb_next(p); | |
789 | } | |
790 | ||
791 | /* adjust buffer len; it may be larger than we need */ | |
792 | ci->i_xattrs.prealloc_blob->vec.iov_len = | |
793 | dest - ci->i_xattrs.prealloc_blob->vec.iov_base; | |
794 | ||
b6c1d5b8 | 795 | if (ci->i_xattrs.blob) |
12fe3dda | 796 | old_blob = ci->i_xattrs.blob; |
355da1eb SW |
797 | ci->i_xattrs.blob = ci->i_xattrs.prealloc_blob; |
798 | ci->i_xattrs.prealloc_blob = NULL; | |
799 | ci->i_xattrs.dirty = false; | |
4a625be4 | 800 | ci->i_xattrs.version++; |
355da1eb | 801 | } |
12fe3dda LH |
802 | |
803 | return old_blob; | |
355da1eb SW |
804 | } |
805 | ||
315f2408 YZ |
806 | static inline int __get_request_mask(struct inode *in) { |
807 | struct ceph_mds_request *req = current->journal_info; | |
808 | int mask = 0; | |
809 | if (req && req->r_target_inode == in) { | |
810 | if (req->r_op == CEPH_MDS_OP_LOOKUP || | |
811 | req->r_op == CEPH_MDS_OP_LOOKUPINO || | |
812 | req->r_op == CEPH_MDS_OP_LOOKUPPARENT || | |
813 | req->r_op == CEPH_MDS_OP_GETATTR) { | |
814 | mask = le32_to_cpu(req->r_args.getattr.mask); | |
815 | } else if (req->r_op == CEPH_MDS_OP_OPEN || | |
816 | req->r_op == CEPH_MDS_OP_CREATE) { | |
817 | mask = le32_to_cpu(req->r_args.open.mask); | |
818 | } | |
819 | } | |
820 | return mask; | |
821 | } | |
822 | ||
7221fe4c | 823 | ssize_t __ceph_getxattr(struct inode *inode, const char *name, void *value, |
355da1eb SW |
824 | size_t size) |
825 | { | |
355da1eb | 826 | struct ceph_inode_info *ci = ceph_inode(inode); |
355da1eb | 827 | struct ceph_inode_xattr *xattr; |
881a5fa2 | 828 | struct ceph_vxattr *vxattr = NULL; |
315f2408 | 829 | int req_mask; |
f1d1b51d | 830 | ssize_t err; |
355da1eb | 831 | |
0bee82fb SW |
832 | /* let's see if a virtual xattr was requested */ |
833 | vxattr = ceph_match_vxattr(inode, name); | |
29dccfa5 | 834 | if (vxattr) { |
49a9f4f6 YZ |
835 | int mask = 0; |
836 | if (vxattr->flags & VXATTR_FLAG_RSTAT) | |
837 | mask |= CEPH_STAT_RSTAT; | |
838 | err = ceph_do_getattr(inode, mask, true); | |
1684dd03 YZ |
839 | if (err) |
840 | return err; | |
29dccfa5 | 841 | err = -ENODATA; |
3b421018 | 842 | if (!(vxattr->exists_cb && !vxattr->exists_cb(ci))) { |
29dccfa5 | 843 | err = vxattr->getxattr_cb(ci, value, size); |
3b421018 JL |
844 | if (size && size < err) |
845 | err = -ERANGE; | |
846 | } | |
a1dc1937 | 847 | return err; |
0bee82fb SW |
848 | } |
849 | ||
315f2408 YZ |
850 | req_mask = __get_request_mask(inode); |
851 | ||
a1dc1937 | 852 | spin_lock(&ci->i_ceph_lock); |
853 | dout("getxattr %p ver=%lld index_ver=%lld\n", inode, | |
854 | ci->i_xattrs.version, ci->i_xattrs.index_version); | |
855 | ||
508b32d8 | 856 | if (ci->i_xattrs.version == 0 || |
315f2408 YZ |
857 | !((req_mask & CEPH_CAP_XATTR_SHARED) || |
858 | __ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 1))) { | |
be655596 | 859 | spin_unlock(&ci->i_ceph_lock); |
315f2408 YZ |
860 | |
861 | /* security module gets xattr while filling trace */ | |
d37b1d99 | 862 | if (current->journal_info) { |
315f2408 YZ |
863 | pr_warn_ratelimited("sync getxattr %p " |
864 | "during filling trace\n", inode); | |
865 | return -EBUSY; | |
866 | } | |
867 | ||
355da1eb | 868 | /* get xattrs from mds (if we don't already have them) */ |
508b32d8 | 869 | err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true); |
355da1eb SW |
870 | if (err) |
871 | return err; | |
508b32d8 | 872 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
873 | } |
874 | ||
355da1eb SW |
875 | err = __build_xattrs(inode); |
876 | if (err < 0) | |
877 | goto out; | |
878 | ||
355da1eb SW |
879 | err = -ENODATA; /* == ENOATTR */ |
880 | xattr = __get_xattr(ci, name); | |
0bee82fb | 881 | if (!xattr) |
355da1eb | 882 | goto out; |
355da1eb SW |
883 | |
884 | err = -ERANGE; | |
885 | if (size && size < xattr->val_len) | |
886 | goto out; | |
887 | ||
888 | err = xattr->val_len; | |
889 | if (size == 0) | |
890 | goto out; | |
891 | ||
892 | memcpy(value, xattr->val, xattr->val_len); | |
893 | ||
d37b1d99 | 894 | if (current->journal_info && |
315f2408 YZ |
895 | !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN)) |
896 | ci->i_ceph_flags |= CEPH_I_SEC_INITED; | |
355da1eb | 897 | out: |
be655596 | 898 | spin_unlock(&ci->i_ceph_lock); |
355da1eb SW |
899 | return err; |
900 | } | |
901 | ||
902 | ssize_t ceph_listxattr(struct dentry *dentry, char *names, size_t size) | |
903 | { | |
2b0143b5 | 904 | struct inode *inode = d_inode(dentry); |
355da1eb | 905 | struct ceph_inode_info *ci = ceph_inode(inode); |
881a5fa2 | 906 | struct ceph_vxattr *vxattrs = ceph_inode_vxattrs(inode); |
2b2abcac | 907 | bool len_only = (size == 0); |
355da1eb SW |
908 | u32 namelen; |
909 | int err; | |
355da1eb SW |
910 | int i; |
911 | ||
be655596 | 912 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
913 | dout("listxattr %p ver=%lld index_ver=%lld\n", inode, |
914 | ci->i_xattrs.version, ci->i_xattrs.index_version); | |
915 | ||
508b32d8 YZ |
916 | if (ci->i_xattrs.version == 0 || |
917 | !__ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 1)) { | |
be655596 | 918 | spin_unlock(&ci->i_ceph_lock); |
508b32d8 | 919 | err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true); |
355da1eb SW |
920 | if (err) |
921 | return err; | |
508b32d8 | 922 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
923 | } |
924 | ||
355da1eb SW |
925 | err = __build_xattrs(inode); |
926 | if (err < 0) | |
927 | goto out; | |
3ce6cd12 | 928 | |
2b2abcac | 929 | /* add 1 byte for each xattr due to the null termination */ |
b65917dd | 930 | namelen = ci->i_xattrs.names_size + ci->i_xattrs.count; |
2b2abcac DD |
931 | if (!len_only) { |
932 | if (namelen > size) { | |
933 | err = -ERANGE; | |
934 | goto out; | |
935 | } | |
936 | names = __copy_xattr_names(ci, names); | |
937 | size -= namelen; | |
938 | } | |
355da1eb | 939 | |
355da1eb SW |
940 | |
941 | /* virtual xattr names, too */ | |
b65917dd | 942 | if (vxattrs) { |
355da1eb | 943 | for (i = 0; vxattrs[i].name; i++) { |
2b2abcac DD |
944 | size_t this_len; |
945 | ||
946 | if (vxattrs[i].flags & VXATTR_FLAG_HIDDEN) | |
947 | continue; | |
948 | if (vxattrs[i].exists_cb && !vxattrs[i].exists_cb(ci)) | |
949 | continue; | |
950 | ||
951 | this_len = strlen(vxattrs[i].name) + 1; | |
952 | namelen += this_len; | |
953 | if (len_only) | |
954 | continue; | |
955 | ||
956 | if (this_len > size) { | |
957 | err = -ERANGE; | |
958 | goto out; | |
b65917dd | 959 | } |
2b2abcac DD |
960 | |
961 | memcpy(names, vxattrs[i].name, this_len); | |
962 | names += this_len; | |
963 | size -= this_len; | |
355da1eb | 964 | } |
b65917dd | 965 | } |
2b2abcac | 966 | err = namelen; |
355da1eb | 967 | out: |
be655596 | 968 | spin_unlock(&ci->i_ceph_lock); |
355da1eb SW |
969 | return err; |
970 | } | |
971 | ||
a26fecca | 972 | static int ceph_sync_setxattr(struct inode *inode, const char *name, |
355da1eb SW |
973 | const char *value, size_t size, int flags) |
974 | { | |
a26fecca | 975 | struct ceph_fs_client *fsc = ceph_sb_to_client(inode->i_sb); |
355da1eb | 976 | struct ceph_inode_info *ci = ceph_inode(inode); |
355da1eb | 977 | struct ceph_mds_request *req; |
3d14c5d2 | 978 | struct ceph_mds_client *mdsc = fsc->mdsc; |
25e6bae3 | 979 | struct ceph_pagelist *pagelist = NULL; |
04303d8a | 980 | int op = CEPH_MDS_OP_SETXATTR; |
355da1eb | 981 | int err; |
25e6bae3 | 982 | |
0aeff37a | 983 | if (size > 0) { |
25e6bae3 | 984 | /* copy value into pagelist */ |
33165d47 | 985 | pagelist = ceph_pagelist_alloc(GFP_NOFS); |
25e6bae3 | 986 | if (!pagelist) |
355da1eb | 987 | return -ENOMEM; |
25e6bae3 | 988 | |
25e6bae3 YZ |
989 | err = ceph_pagelist_append(pagelist, value, size); |
990 | if (err) | |
991 | goto out; | |
0aeff37a | 992 | } else if (!value) { |
04303d8a YZ |
993 | if (flags & CEPH_XATTR_REPLACE) |
994 | op = CEPH_MDS_OP_RMXATTR; | |
995 | else | |
996 | flags |= CEPH_XATTR_REMOVE; | |
355da1eb SW |
997 | } |
998 | ||
999 | dout("setxattr value=%.*s\n", (int)size, value); | |
1000 | ||
1001 | /* do request */ | |
04303d8a | 1002 | req = ceph_mdsc_create_request(mdsc, op, USE_AUTH_MDS); |
60d87733 JL |
1003 | if (IS_ERR(req)) { |
1004 | err = PTR_ERR(req); | |
1005 | goto out; | |
1006 | } | |
a149bb9a | 1007 | |
355da1eb | 1008 | req->r_path2 = kstrdup(name, GFP_NOFS); |
a149bb9a SK |
1009 | if (!req->r_path2) { |
1010 | ceph_mdsc_put_request(req); | |
1011 | err = -ENOMEM; | |
1012 | goto out; | |
1013 | } | |
355da1eb | 1014 | |
04303d8a YZ |
1015 | if (op == CEPH_MDS_OP_SETXATTR) { |
1016 | req->r_args.setxattr.flags = cpu_to_le32(flags); | |
1017 | req->r_pagelist = pagelist; | |
1018 | pagelist = NULL; | |
1019 | } | |
355da1eb | 1020 | |
a149bb9a SK |
1021 | req->r_inode = inode; |
1022 | ihold(inode); | |
1023 | req->r_num_caps = 1; | |
1024 | req->r_inode_drop = CEPH_CAP_XATTR_SHARED; | |
1025 | ||
355da1eb | 1026 | dout("xattr.ver (before): %lld\n", ci->i_xattrs.version); |
752c8bdc | 1027 | err = ceph_mdsc_do_request(mdsc, NULL, req); |
355da1eb SW |
1028 | ceph_mdsc_put_request(req); |
1029 | dout("xattr.ver (after): %lld\n", ci->i_xattrs.version); | |
1030 | ||
1031 | out: | |
25e6bae3 YZ |
1032 | if (pagelist) |
1033 | ceph_pagelist_release(pagelist); | |
355da1eb SW |
1034 | return err; |
1035 | } | |
1036 | ||
a26fecca | 1037 | int __ceph_setxattr(struct inode *inode, const char *name, |
7221fe4c | 1038 | const void *value, size_t size, int flags) |
355da1eb | 1039 | { |
881a5fa2 | 1040 | struct ceph_vxattr *vxattr; |
355da1eb | 1041 | struct ceph_inode_info *ci = ceph_inode(inode); |
a26fecca | 1042 | struct ceph_mds_client *mdsc = ceph_sb_to_client(inode->i_sb)->mdsc; |
f66fd9f0 | 1043 | struct ceph_cap_flush *prealloc_cf = NULL; |
86968ef2 | 1044 | struct ceph_buffer *old_blob = NULL; |
18fa8b3f | 1045 | int issued; |
355da1eb | 1046 | int err; |
fbc0b970 | 1047 | int dirty = 0; |
355da1eb SW |
1048 | int name_len = strlen(name); |
1049 | int val_len = size; | |
1050 | char *newname = NULL; | |
1051 | char *newval = NULL; | |
1052 | struct ceph_inode_xattr *xattr = NULL; | |
355da1eb | 1053 | int required_blob_size; |
f1919826 | 1054 | bool check_realm = false; |
604d1b02 | 1055 | bool lock_snap_rwsem = false; |
355da1eb | 1056 | |
2cdeb1e4 AG |
1057 | if (ceph_snap(inode) != CEPH_NOSNAP) |
1058 | return -EROFS; | |
355da1eb | 1059 | |
06476a69 | 1060 | vxattr = ceph_match_vxattr(inode, name); |
f1919826 | 1061 | if (vxattr) { |
4e9906e7 | 1062 | if (vxattr->flags & VXATTR_FLAG_READONLY) |
f1919826 YZ |
1063 | return -EOPNOTSUPP; |
1064 | if (value && !strncmp(vxattr->name, "ceph.quota", 10)) | |
1065 | check_realm = true; | |
1066 | } | |
355da1eb | 1067 | |
3adf654d SW |
1068 | /* pass any unhandled ceph.* xattrs through to the MDS */ |
1069 | if (!strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN)) | |
1070 | goto do_sync_unlocked; | |
1071 | ||
355da1eb SW |
1072 | /* preallocate memory for xattr name, value, index node */ |
1073 | err = -ENOMEM; | |
61413c2f | 1074 | newname = kmemdup(name, name_len + 1, GFP_NOFS); |
355da1eb SW |
1075 | if (!newname) |
1076 | goto out; | |
355da1eb SW |
1077 | |
1078 | if (val_len) { | |
b829c195 | 1079 | newval = kmemdup(value, val_len, GFP_NOFS); |
355da1eb SW |
1080 | if (!newval) |
1081 | goto out; | |
355da1eb SW |
1082 | } |
1083 | ||
1084 | xattr = kmalloc(sizeof(struct ceph_inode_xattr), GFP_NOFS); | |
1085 | if (!xattr) | |
1086 | goto out; | |
1087 | ||
f66fd9f0 YZ |
1088 | prealloc_cf = ceph_alloc_cap_flush(); |
1089 | if (!prealloc_cf) | |
1090 | goto out; | |
1091 | ||
be655596 | 1092 | spin_lock(&ci->i_ceph_lock); |
355da1eb SW |
1093 | retry: |
1094 | issued = __ceph_caps_issued(ci, NULL); | |
508b32d8 | 1095 | if (ci->i_xattrs.version == 0 || !(issued & CEPH_CAP_XATTR_EXCL)) |
355da1eb | 1096 | goto do_sync; |
604d1b02 YZ |
1097 | |
1098 | if (!lock_snap_rwsem && !ci->i_head_snapc) { | |
1099 | lock_snap_rwsem = true; | |
1100 | if (!down_read_trylock(&mdsc->snap_rwsem)) { | |
1101 | spin_unlock(&ci->i_ceph_lock); | |
1102 | down_read(&mdsc->snap_rwsem); | |
1103 | spin_lock(&ci->i_ceph_lock); | |
1104 | goto retry; | |
1105 | } | |
1106 | } | |
1107 | ||
1108 | dout("setxattr %p issued %s\n", inode, ceph_cap_string(issued)); | |
355da1eb SW |
1109 | __build_xattrs(inode); |
1110 | ||
1111 | required_blob_size = __get_required_blob_size(ci, name_len, val_len); | |
1112 | ||
1113 | if (!ci->i_xattrs.prealloc_blob || | |
1114 | required_blob_size > ci->i_xattrs.prealloc_blob->alloc_len) { | |
18fa8b3f | 1115 | struct ceph_buffer *blob; |
355da1eb | 1116 | |
be655596 | 1117 | spin_unlock(&ci->i_ceph_lock); |
86968ef2 LH |
1118 | ceph_buffer_put(old_blob); /* Shouldn't be required */ |
1119 | dout(" pre-allocating new blob size=%d\n", required_blob_size); | |
b6c1d5b8 | 1120 | blob = ceph_buffer_new(required_blob_size, GFP_NOFS); |
355da1eb | 1121 | if (!blob) |
604d1b02 | 1122 | goto do_sync_unlocked; |
be655596 | 1123 | spin_lock(&ci->i_ceph_lock); |
86968ef2 | 1124 | /* prealloc_blob can't be released while holding i_ceph_lock */ |
b6c1d5b8 | 1125 | if (ci->i_xattrs.prealloc_blob) |
86968ef2 | 1126 | old_blob = ci->i_xattrs.prealloc_blob; |
355da1eb SW |
1127 | ci->i_xattrs.prealloc_blob = blob; |
1128 | goto retry; | |
1129 | } | |
1130 | ||
bcdfeb2e YZ |
1131 | err = __set_xattr(ci, newname, name_len, newval, val_len, |
1132 | flags, value ? 1 : -1, &xattr); | |
18fa8b3f | 1133 | |
fbc0b970 | 1134 | if (!err) { |
f66fd9f0 YZ |
1135 | dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_XATTR_EXCL, |
1136 | &prealloc_cf); | |
fbc0b970 | 1137 | ci->i_xattrs.dirty = true; |
c2050a45 | 1138 | inode->i_ctime = current_time(inode); |
fbc0b970 | 1139 | } |
18fa8b3f | 1140 | |
be655596 | 1141 | spin_unlock(&ci->i_ceph_lock); |
86968ef2 | 1142 | ceph_buffer_put(old_blob); |
604d1b02 YZ |
1143 | if (lock_snap_rwsem) |
1144 | up_read(&mdsc->snap_rwsem); | |
fca65b4a SW |
1145 | if (dirty) |
1146 | __mark_inode_dirty(inode, dirty); | |
f66fd9f0 | 1147 | ceph_free_cap_flush(prealloc_cf); |
355da1eb SW |
1148 | return err; |
1149 | ||
1150 | do_sync: | |
be655596 | 1151 | spin_unlock(&ci->i_ceph_lock); |
3adf654d | 1152 | do_sync_unlocked: |
604d1b02 YZ |
1153 | if (lock_snap_rwsem) |
1154 | up_read(&mdsc->snap_rwsem); | |
315f2408 YZ |
1155 | |
1156 | /* security module set xattr while filling trace */ | |
d37b1d99 | 1157 | if (current->journal_info) { |
315f2408 YZ |
1158 | pr_warn_ratelimited("sync setxattr %p " |
1159 | "during filling trace\n", inode); | |
1160 | err = -EBUSY; | |
1161 | } else { | |
a26fecca | 1162 | err = ceph_sync_setxattr(inode, name, value, size, flags); |
f1919826 YZ |
1163 | if (err >= 0 && check_realm) { |
1164 | /* check if snaprealm was created for quota inode */ | |
1165 | spin_lock(&ci->i_ceph_lock); | |
1166 | if ((ci->i_max_files || ci->i_max_bytes) && | |
1167 | !(ci->i_snap_realm && | |
1168 | ci->i_snap_realm->ino == ci->i_vino.ino)) | |
1169 | err = -EOPNOTSUPP; | |
1170 | spin_unlock(&ci->i_ceph_lock); | |
1171 | } | |
315f2408 | 1172 | } |
355da1eb | 1173 | out: |
f66fd9f0 | 1174 | ceph_free_cap_flush(prealloc_cf); |
355da1eb SW |
1175 | kfree(newname); |
1176 | kfree(newval); | |
1177 | kfree(xattr); | |
1178 | return err; | |
1179 | } | |
1180 | ||
2cdeb1e4 AG |
1181 | static int ceph_get_xattr_handler(const struct xattr_handler *handler, |
1182 | struct dentry *dentry, struct inode *inode, | |
1183 | const char *name, void *value, size_t size) | |
7221fe4c | 1184 | { |
2cdeb1e4 AG |
1185 | if (!ceph_is_valid_xattr(name)) |
1186 | return -EOPNOTSUPP; | |
1187 | return __ceph_getxattr(inode, name, value, size); | |
1188 | } | |
7221fe4c | 1189 | |
2cdeb1e4 | 1190 | static int ceph_set_xattr_handler(const struct xattr_handler *handler, |
59301226 AV |
1191 | struct dentry *unused, struct inode *inode, |
1192 | const char *name, const void *value, | |
1193 | size_t size, int flags) | |
2cdeb1e4 AG |
1194 | { |
1195 | if (!ceph_is_valid_xattr(name)) | |
1196 | return -EOPNOTSUPP; | |
59301226 | 1197 | return __ceph_setxattr(inode, name, value, size, flags); |
7221fe4c | 1198 | } |
315f2408 | 1199 | |
5130ccea | 1200 | static const struct xattr_handler ceph_other_xattr_handler = { |
2cdeb1e4 AG |
1201 | .prefix = "", /* match any name => handlers called with full name */ |
1202 | .get = ceph_get_xattr_handler, | |
1203 | .set = ceph_set_xattr_handler, | |
1204 | }; | |
1205 | ||
315f2408 YZ |
1206 | #ifdef CONFIG_SECURITY |
1207 | bool ceph_security_xattr_wanted(struct inode *in) | |
1208 | { | |
1209 | return in->i_security != NULL; | |
1210 | } | |
1211 | ||
1212 | bool ceph_security_xattr_deadlock(struct inode *in) | |
1213 | { | |
1214 | struct ceph_inode_info *ci; | |
1215 | bool ret; | |
d37b1d99 | 1216 | if (!in->i_security) |
315f2408 YZ |
1217 | return false; |
1218 | ci = ceph_inode(in); | |
1219 | spin_lock(&ci->i_ceph_lock); | |
1220 | ret = !(ci->i_ceph_flags & CEPH_I_SEC_INITED) && | |
1221 | !(ci->i_xattrs.version > 0 && | |
1222 | __ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 0)); | |
1223 | spin_unlock(&ci->i_ceph_lock); | |
1224 | return ret; | |
1225 | } | |
ac6713cc YZ |
1226 | |
1227 | #ifdef CONFIG_CEPH_FS_SECURITY_LABEL | |
1228 | int ceph_security_init_secctx(struct dentry *dentry, umode_t mode, | |
1229 | struct ceph_acl_sec_ctx *as_ctx) | |
1230 | { | |
1231 | struct ceph_pagelist *pagelist = as_ctx->pagelist; | |
1232 | const char *name; | |
1233 | size_t name_len; | |
1234 | int err; | |
1235 | ||
1236 | err = security_dentry_init_security(dentry, mode, &dentry->d_name, | |
1237 | &as_ctx->sec_ctx, | |
1238 | &as_ctx->sec_ctxlen); | |
1239 | if (err < 0) { | |
1240 | WARN_ON_ONCE(err != -EOPNOTSUPP); | |
1241 | err = 0; /* do nothing */ | |
1242 | goto out; | |
1243 | } | |
1244 | ||
1245 | err = -ENOMEM; | |
1246 | if (!pagelist) { | |
1247 | pagelist = ceph_pagelist_alloc(GFP_KERNEL); | |
1248 | if (!pagelist) | |
1249 | goto out; | |
1250 | err = ceph_pagelist_reserve(pagelist, PAGE_SIZE); | |
1251 | if (err) | |
1252 | goto out; | |
1253 | ceph_pagelist_encode_32(pagelist, 1); | |
1254 | } | |
1255 | ||
1256 | /* | |
1257 | * FIXME: Make security_dentry_init_security() generic. Currently | |
1258 | * It only supports single security module and only selinux has | |
1259 | * dentry_init_security hook. | |
1260 | */ | |
1261 | name = XATTR_NAME_SELINUX; | |
1262 | name_len = strlen(name); | |
1263 | err = ceph_pagelist_reserve(pagelist, | |
1264 | 4 * 2 + name_len + as_ctx->sec_ctxlen); | |
1265 | if (err) | |
1266 | goto out; | |
1267 | ||
1268 | if (as_ctx->pagelist) { | |
1269 | /* update count of KV pairs */ | |
1270 | BUG_ON(pagelist->length <= sizeof(__le32)); | |
1271 | if (list_is_singular(&pagelist->head)) { | |
1272 | le32_add_cpu((__le32*)pagelist->mapped_tail, 1); | |
1273 | } else { | |
1274 | struct page *page = list_first_entry(&pagelist->head, | |
1275 | struct page, lru); | |
1276 | void *addr = kmap_atomic(page); | |
1277 | le32_add_cpu((__le32*)addr, 1); | |
1278 | kunmap_atomic(addr); | |
1279 | } | |
1280 | } else { | |
1281 | as_ctx->pagelist = pagelist; | |
1282 | } | |
1283 | ||
1284 | ceph_pagelist_encode_32(pagelist, name_len); | |
1285 | ceph_pagelist_append(pagelist, name, name_len); | |
1286 | ||
1287 | ceph_pagelist_encode_32(pagelist, as_ctx->sec_ctxlen); | |
1288 | ceph_pagelist_append(pagelist, as_ctx->sec_ctx, as_ctx->sec_ctxlen); | |
1289 | ||
1290 | err = 0; | |
1291 | out: | |
1292 | if (pagelist && !as_ctx->pagelist) | |
1293 | ceph_pagelist_release(pagelist); | |
1294 | return err; | |
1295 | } | |
1296 | ||
1297 | void ceph_security_invalidate_secctx(struct inode *inode) | |
1298 | { | |
1299 | security_inode_invalidate_secctx(inode); | |
1300 | } | |
1301 | ||
1302 | static int ceph_xattr_set_security_label(const struct xattr_handler *handler, | |
1303 | struct dentry *unused, struct inode *inode, | |
1304 | const char *key, const void *buf, | |
1305 | size_t buflen, int flags) | |
1306 | { | |
1307 | if (security_ismaclabel(key)) { | |
1308 | const char *name = xattr_full_name(handler, key); | |
1309 | return __ceph_setxattr(inode, name, buf, buflen, flags); | |
1310 | } | |
1311 | return -EOPNOTSUPP; | |
1312 | } | |
1313 | ||
1314 | static int ceph_xattr_get_security_label(const struct xattr_handler *handler, | |
1315 | struct dentry *unused, struct inode *inode, | |
1316 | const char *key, void *buf, size_t buflen) | |
1317 | { | |
1318 | if (security_ismaclabel(key)) { | |
1319 | const char *name = xattr_full_name(handler, key); | |
1320 | return __ceph_getxattr(inode, name, buf, buflen); | |
1321 | } | |
1322 | return -EOPNOTSUPP; | |
1323 | } | |
1324 | ||
1325 | static const struct xattr_handler ceph_security_label_handler = { | |
1326 | .prefix = XATTR_SECURITY_PREFIX, | |
1327 | .get = ceph_xattr_get_security_label, | |
1328 | .set = ceph_xattr_set_security_label, | |
1329 | }; | |
1330 | #endif | |
315f2408 | 1331 | #endif |
5c31e92d YZ |
1332 | |
1333 | void ceph_release_acl_sec_ctx(struct ceph_acl_sec_ctx *as_ctx) | |
1334 | { | |
1335 | #ifdef CONFIG_CEPH_FS_POSIX_ACL | |
1336 | posix_acl_release(as_ctx->acl); | |
1337 | posix_acl_release(as_ctx->default_acl); | |
ac6713cc YZ |
1338 | #endif |
1339 | #ifdef CONFIG_CEPH_FS_SECURITY_LABEL | |
1340 | security_release_secctx(as_ctx->sec_ctx, as_ctx->sec_ctxlen); | |
5c31e92d YZ |
1341 | #endif |
1342 | if (as_ctx->pagelist) | |
1343 | ceph_pagelist_release(as_ctx->pagelist); | |
1344 | } | |
ac6713cc YZ |
1345 | |
1346 | /* | |
1347 | * List of handlers for synthetic system.* attributes. Other | |
1348 | * attributes are handled directly. | |
1349 | */ | |
1350 | const struct xattr_handler *ceph_xattr_handlers[] = { | |
1351 | #ifdef CONFIG_CEPH_FS_POSIX_ACL | |
1352 | &posix_acl_access_xattr_handler, | |
1353 | &posix_acl_default_xattr_handler, | |
1354 | #endif | |
1355 | #ifdef CONFIG_CEPH_FS_SECURITY_LABEL | |
1356 | &ceph_security_label_handler, | |
1357 | #endif | |
1358 | &ceph_other_xattr_handler, | |
1359 | NULL, | |
1360 | }; |