]>
Commit | Line | Data |
---|---|---|
0a8165d7 | 1 | /* |
af48b85b JK |
2 | * fs/f2fs/xattr.c |
3 | * | |
4 | * Copyright (c) 2012 Samsung Electronics Co., Ltd. | |
5 | * http://www.samsung.com/ | |
6 | * | |
7 | * Portions of this code from linux/fs/ext2/xattr.c | |
8 | * | |
9 | * Copyright (C) 2001-2003 Andreas Gruenbacher <agruen@suse.de> | |
10 | * | |
11 | * Fix by Harrison Xing <harrison@mountainviewdata.com>. | |
12 | * Extended attributes for symlinks and special files added per | |
13 | * suggestion of Luka Renko <luka.renko@hermes.si>. | |
14 | * xattr consolidation Copyright (c) 2004 James Morris <jmorris@redhat.com>, | |
15 | * Red Hat Inc. | |
16 | * | |
17 | * This program is free software; you can redistribute it and/or modify | |
18 | * it under the terms of the GNU General Public License version 2 as | |
19 | * published by the Free Software Foundation. | |
20 | */ | |
21 | #include <linux/rwsem.h> | |
22 | #include <linux/f2fs_fs.h> | |
8ae8f162 | 23 | #include <linux/security.h> |
af48b85b JK |
24 | #include "f2fs.h" |
25 | #include "xattr.h" | |
26 | ||
27 | static size_t f2fs_xattr_generic_list(struct dentry *dentry, char *list, | |
28 | size_t list_size, const char *name, size_t name_len, int type) | |
29 | { | |
30 | struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb); | |
31 | int total_len, prefix_len = 0; | |
32 | const char *prefix = NULL; | |
33 | ||
34 | switch (type) { | |
35 | case F2FS_XATTR_INDEX_USER: | |
36 | if (!test_opt(sbi, XATTR_USER)) | |
37 | return -EOPNOTSUPP; | |
38 | prefix = XATTR_USER_PREFIX; | |
39 | prefix_len = XATTR_USER_PREFIX_LEN; | |
40 | break; | |
41 | case F2FS_XATTR_INDEX_TRUSTED: | |
42 | if (!capable(CAP_SYS_ADMIN)) | |
43 | return -EPERM; | |
44 | prefix = XATTR_TRUSTED_PREFIX; | |
45 | prefix_len = XATTR_TRUSTED_PREFIX_LEN; | |
46 | break; | |
8ae8f162 JK |
47 | case F2FS_XATTR_INDEX_SECURITY: |
48 | prefix = XATTR_SECURITY_PREFIX; | |
49 | prefix_len = XATTR_SECURITY_PREFIX_LEN; | |
50 | break; | |
af48b85b JK |
51 | default: |
52 | return -EINVAL; | |
53 | } | |
54 | ||
55 | total_len = prefix_len + name_len + 1; | |
56 | if (list && total_len <= list_size) { | |
57 | memcpy(list, prefix, prefix_len); | |
8ae8f162 | 58 | memcpy(list + prefix_len, name, name_len); |
af48b85b JK |
59 | list[prefix_len + name_len] = '\0'; |
60 | } | |
61 | return total_len; | |
62 | } | |
63 | ||
64 | static int f2fs_xattr_generic_get(struct dentry *dentry, const char *name, | |
65 | void *buffer, size_t size, int type) | |
66 | { | |
67 | struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb); | |
68 | ||
69 | switch (type) { | |
70 | case F2FS_XATTR_INDEX_USER: | |
71 | if (!test_opt(sbi, XATTR_USER)) | |
72 | return -EOPNOTSUPP; | |
73 | break; | |
74 | case F2FS_XATTR_INDEX_TRUSTED: | |
75 | if (!capable(CAP_SYS_ADMIN)) | |
76 | return -EPERM; | |
77 | break; | |
8ae8f162 JK |
78 | case F2FS_XATTR_INDEX_SECURITY: |
79 | break; | |
af48b85b JK |
80 | default: |
81 | return -EINVAL; | |
82 | } | |
83 | if (strcmp(name, "") == 0) | |
84 | return -EINVAL; | |
8ae8f162 | 85 | return f2fs_getxattr(dentry->d_inode, type, name, buffer, size); |
af48b85b JK |
86 | } |
87 | ||
88 | static int f2fs_xattr_generic_set(struct dentry *dentry, const char *name, | |
89 | const void *value, size_t size, int flags, int type) | |
90 | { | |
91 | struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb); | |
92 | ||
93 | switch (type) { | |
94 | case F2FS_XATTR_INDEX_USER: | |
95 | if (!test_opt(sbi, XATTR_USER)) | |
96 | return -EOPNOTSUPP; | |
97 | break; | |
98 | case F2FS_XATTR_INDEX_TRUSTED: | |
99 | if (!capable(CAP_SYS_ADMIN)) | |
100 | return -EPERM; | |
101 | break; | |
8ae8f162 JK |
102 | case F2FS_XATTR_INDEX_SECURITY: |
103 | break; | |
af48b85b JK |
104 | default: |
105 | return -EINVAL; | |
106 | } | |
107 | if (strcmp(name, "") == 0) | |
108 | return -EINVAL; | |
109 | ||
8ae8f162 | 110 | return f2fs_setxattr(dentry->d_inode, type, name, value, size, NULL); |
af48b85b JK |
111 | } |
112 | ||
573ea5fc JK |
113 | static size_t f2fs_xattr_advise_list(struct dentry *dentry, char *list, |
114 | size_t list_size, const char *name, size_t name_len, int type) | |
115 | { | |
116 | const char *xname = F2FS_SYSTEM_ADVISE_PREFIX; | |
117 | size_t size; | |
118 | ||
119 | if (type != F2FS_XATTR_INDEX_ADVISE) | |
120 | return 0; | |
121 | ||
122 | size = strlen(xname) + 1; | |
123 | if (list && size <= list_size) | |
124 | memcpy(list, xname, size); | |
125 | return size; | |
126 | } | |
127 | ||
128 | static int f2fs_xattr_advise_get(struct dentry *dentry, const char *name, | |
129 | void *buffer, size_t size, int type) | |
130 | { | |
131 | struct inode *inode = dentry->d_inode; | |
132 | ||
133 | if (strcmp(name, "") != 0) | |
134 | return -EINVAL; | |
135 | ||
136 | *((char *)buffer) = F2FS_I(inode)->i_advise; | |
137 | return sizeof(char); | |
138 | } | |
139 | ||
140 | static int f2fs_xattr_advise_set(struct dentry *dentry, const char *name, | |
141 | const void *value, size_t size, int flags, int type) | |
142 | { | |
143 | struct inode *inode = dentry->d_inode; | |
144 | ||
145 | if (strcmp(name, "") != 0) | |
146 | return -EINVAL; | |
147 | if (!inode_owner_or_capable(inode)) | |
148 | return -EPERM; | |
149 | if (value == NULL) | |
150 | return -EINVAL; | |
151 | ||
152 | F2FS_I(inode)->i_advise |= *(char *)value; | |
153 | return 0; | |
154 | } | |
155 | ||
8ae8f162 JK |
156 | #ifdef CONFIG_F2FS_FS_SECURITY |
157 | static int f2fs_initxattrs(struct inode *inode, const struct xattr *xattr_array, | |
158 | void *page) | |
159 | { | |
160 | const struct xattr *xattr; | |
161 | int err = 0; | |
162 | ||
163 | for (xattr = xattr_array; xattr->name != NULL; xattr++) { | |
164 | err = f2fs_setxattr(inode, F2FS_XATTR_INDEX_SECURITY, | |
165 | xattr->name, xattr->value, | |
166 | xattr->value_len, (struct page *)page); | |
167 | if (err < 0) | |
168 | break; | |
169 | } | |
170 | return err; | |
171 | } | |
172 | ||
173 | int f2fs_init_security(struct inode *inode, struct inode *dir, | |
174 | const struct qstr *qstr, struct page *ipage) | |
175 | { | |
176 | return security_inode_init_security(inode, dir, qstr, | |
177 | &f2fs_initxattrs, ipage); | |
178 | } | |
179 | #endif | |
180 | ||
af48b85b JK |
181 | const struct xattr_handler f2fs_xattr_user_handler = { |
182 | .prefix = XATTR_USER_PREFIX, | |
183 | .flags = F2FS_XATTR_INDEX_USER, | |
184 | .list = f2fs_xattr_generic_list, | |
185 | .get = f2fs_xattr_generic_get, | |
186 | .set = f2fs_xattr_generic_set, | |
187 | }; | |
188 | ||
189 | const struct xattr_handler f2fs_xattr_trusted_handler = { | |
190 | .prefix = XATTR_TRUSTED_PREFIX, | |
191 | .flags = F2FS_XATTR_INDEX_TRUSTED, | |
192 | .list = f2fs_xattr_generic_list, | |
193 | .get = f2fs_xattr_generic_get, | |
194 | .set = f2fs_xattr_generic_set, | |
195 | }; | |
196 | ||
573ea5fc JK |
197 | const struct xattr_handler f2fs_xattr_advise_handler = { |
198 | .prefix = F2FS_SYSTEM_ADVISE_PREFIX, | |
199 | .flags = F2FS_XATTR_INDEX_ADVISE, | |
200 | .list = f2fs_xattr_advise_list, | |
201 | .get = f2fs_xattr_advise_get, | |
202 | .set = f2fs_xattr_advise_set, | |
203 | }; | |
204 | ||
8ae8f162 JK |
205 | const struct xattr_handler f2fs_xattr_security_handler = { |
206 | .prefix = XATTR_SECURITY_PREFIX, | |
207 | .flags = F2FS_XATTR_INDEX_SECURITY, | |
208 | .list = f2fs_xattr_generic_list, | |
209 | .get = f2fs_xattr_generic_get, | |
210 | .set = f2fs_xattr_generic_set, | |
211 | }; | |
212 | ||
af48b85b JK |
213 | static const struct xattr_handler *f2fs_xattr_handler_map[] = { |
214 | [F2FS_XATTR_INDEX_USER] = &f2fs_xattr_user_handler, | |
215 | #ifdef CONFIG_F2FS_FS_POSIX_ACL | |
216 | [F2FS_XATTR_INDEX_POSIX_ACL_ACCESS] = &f2fs_xattr_acl_access_handler, | |
217 | [F2FS_XATTR_INDEX_POSIX_ACL_DEFAULT] = &f2fs_xattr_acl_default_handler, | |
218 | #endif | |
219 | [F2FS_XATTR_INDEX_TRUSTED] = &f2fs_xattr_trusted_handler, | |
8ae8f162 JK |
220 | #ifdef CONFIG_F2FS_FS_SECURITY |
221 | [F2FS_XATTR_INDEX_SECURITY] = &f2fs_xattr_security_handler, | |
222 | #endif | |
af48b85b JK |
223 | [F2FS_XATTR_INDEX_ADVISE] = &f2fs_xattr_advise_handler, |
224 | }; | |
225 | ||
226 | const struct xattr_handler *f2fs_xattr_handlers[] = { | |
227 | &f2fs_xattr_user_handler, | |
228 | #ifdef CONFIG_F2FS_FS_POSIX_ACL | |
229 | &f2fs_xattr_acl_access_handler, | |
230 | &f2fs_xattr_acl_default_handler, | |
231 | #endif | |
232 | &f2fs_xattr_trusted_handler, | |
8ae8f162 JK |
233 | #ifdef CONFIG_F2FS_FS_SECURITY |
234 | &f2fs_xattr_security_handler, | |
235 | #endif | |
af48b85b JK |
236 | &f2fs_xattr_advise_handler, |
237 | NULL, | |
238 | }; | |
239 | ||
240 | static inline const struct xattr_handler *f2fs_xattr_handler(int name_index) | |
241 | { | |
242 | const struct xattr_handler *handler = NULL; | |
243 | ||
244 | if (name_index > 0 && name_index < ARRAY_SIZE(f2fs_xattr_handler_map)) | |
245 | handler = f2fs_xattr_handler_map[name_index]; | |
246 | return handler; | |
247 | } | |
248 | ||
dd9cfe23 JK |
249 | static struct f2fs_xattr_entry *__find_xattr(void *base_addr, int name_index, |
250 | size_t name_len, const char *name) | |
251 | { | |
252 | struct f2fs_xattr_entry *entry; | |
253 | ||
254 | list_for_each_xattr(entry, base_addr) { | |
255 | if (entry->e_name_index != name_index) | |
256 | continue; | |
257 | if (entry->e_name_len != name_len) | |
258 | continue; | |
259 | if (!memcmp(entry->e_name, name, name_len)) | |
260 | break; | |
261 | } | |
262 | return entry; | |
263 | } | |
264 | ||
af48b85b JK |
265 | int f2fs_getxattr(struct inode *inode, int name_index, const char *name, |
266 | void *buffer, size_t buffer_size) | |
267 | { | |
268 | struct f2fs_sb_info *sbi = F2FS_SB(inode->i_sb); | |
269 | struct f2fs_inode_info *fi = F2FS_I(inode); | |
270 | struct f2fs_xattr_entry *entry; | |
271 | struct page *page; | |
dd9cfe23 | 272 | int error = 0; |
9836b8b9 | 273 | size_t value_len, name_len; |
af48b85b JK |
274 | |
275 | if (name == NULL) | |
276 | return -EINVAL; | |
277 | name_len = strlen(name); | |
278 | ||
279 | if (!fi->i_xattr_nid) | |
280 | return -ENODATA; | |
281 | ||
282 | page = get_node_page(sbi, fi->i_xattr_nid); | |
1e03e38b JH |
283 | if (IS_ERR(page)) |
284 | return PTR_ERR(page); | |
af48b85b | 285 | |
dd9cfe23 JK |
286 | entry = __find_xattr(page_address(page), name_index, name_len, name); |
287 | if (IS_XATTR_LAST_ENTRY(entry)) { | |
af48b85b JK |
288 | error = -ENODATA; |
289 | goto cleanup; | |
290 | } | |
291 | ||
292 | value_len = le16_to_cpu(entry->e_value_size); | |
293 | ||
294 | if (buffer && value_len > buffer_size) { | |
295 | error = -ERANGE; | |
296 | goto cleanup; | |
297 | } | |
298 | ||
299 | if (buffer) { | |
300 | char *pval = entry->e_name + entry->e_name_len; | |
301 | memcpy(buffer, pval, value_len); | |
302 | } | |
303 | error = value_len; | |
304 | ||
305 | cleanup: | |
306 | f2fs_put_page(page, 1); | |
307 | return error; | |
308 | } | |
309 | ||
310 | ssize_t f2fs_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size) | |
311 | { | |
312 | struct inode *inode = dentry->d_inode; | |
313 | struct f2fs_sb_info *sbi = F2FS_SB(inode->i_sb); | |
314 | struct f2fs_inode_info *fi = F2FS_I(inode); | |
315 | struct f2fs_xattr_entry *entry; | |
316 | struct page *page; | |
317 | void *base_addr; | |
318 | int error = 0; | |
319 | size_t rest = buffer_size; | |
320 | ||
321 | if (!fi->i_xattr_nid) | |
322 | return 0; | |
323 | ||
324 | page = get_node_page(sbi, fi->i_xattr_nid); | |
1e03e38b JH |
325 | if (IS_ERR(page)) |
326 | return PTR_ERR(page); | |
af48b85b JK |
327 | base_addr = page_address(page); |
328 | ||
329 | list_for_each_xattr(entry, base_addr) { | |
330 | const struct xattr_handler *handler = | |
331 | f2fs_xattr_handler(entry->e_name_index); | |
332 | size_t size; | |
333 | ||
334 | if (!handler) | |
335 | continue; | |
336 | ||
337 | size = handler->list(dentry, buffer, rest, entry->e_name, | |
338 | entry->e_name_len, handler->flags); | |
339 | if (buffer && size > rest) { | |
340 | error = -ERANGE; | |
341 | goto cleanup; | |
342 | } | |
343 | ||
344 | if (buffer) | |
345 | buffer += size; | |
346 | rest -= size; | |
347 | } | |
348 | error = buffer_size - rest; | |
349 | cleanup: | |
350 | f2fs_put_page(page, 1); | |
351 | return error; | |
352 | } | |
353 | ||
354 | int f2fs_setxattr(struct inode *inode, int name_index, const char *name, | |
8ae8f162 | 355 | const void *value, size_t value_len, struct page *ipage) |
af48b85b JK |
356 | { |
357 | struct f2fs_sb_info *sbi = F2FS_SB(inode->i_sb); | |
358 | struct f2fs_inode_info *fi = F2FS_I(inode); | |
359 | struct f2fs_xattr_header *header = NULL; | |
360 | struct f2fs_xattr_entry *here, *last; | |
361 | struct page *page; | |
362 | void *base_addr; | |
9836b8b9 LR |
363 | int error, found, free, newsize; |
364 | size_t name_len; | |
af48b85b | 365 | char *pval; |
39936837 | 366 | int ilock; |
af48b85b JK |
367 | |
368 | if (name == NULL) | |
369 | return -EINVAL; | |
af48b85b JK |
370 | |
371 | if (value == NULL) | |
372 | value_len = 0; | |
373 | ||
7c909772 NJ |
374 | name_len = strlen(name); |
375 | ||
376 | if (name_len > F2FS_NAME_LEN || value_len > MAX_VALUE_LEN) | |
af48b85b JK |
377 | return -ERANGE; |
378 | ||
7d82db83 JK |
379 | f2fs_balance_fs(sbi); |
380 | ||
39936837 JK |
381 | ilock = mutex_lock_op(sbi); |
382 | ||
af48b85b JK |
383 | if (!fi->i_xattr_nid) { |
384 | /* Allocate new attribute block */ | |
385 | struct dnode_of_data dn; | |
479bd73a | 386 | nid_t new_nid; |
af48b85b | 387 | |
479bd73a | 388 | if (!alloc_nid(sbi, &new_nid)) { |
7c909772 NJ |
389 | error = -ENOSPC; |
390 | goto exit; | |
af48b85b | 391 | } |
479bd73a | 392 | set_new_dnode(&dn, inode, NULL, NULL, new_nid); |
af48b85b JK |
393 | mark_inode_dirty(inode); |
394 | ||
8ae8f162 | 395 | page = new_node_page(&dn, XATTR_NODE_OFFSET, ipage); |
af48b85b | 396 | if (IS_ERR(page)) { |
479bd73a | 397 | alloc_nid_failed(sbi, new_nid); |
7c909772 NJ |
398 | error = PTR_ERR(page); |
399 | goto exit; | |
af48b85b JK |
400 | } |
401 | ||
479bd73a | 402 | alloc_nid_done(sbi, new_nid); |
af48b85b JK |
403 | base_addr = page_address(page); |
404 | header = XATTR_HDR(base_addr); | |
405 | header->h_magic = cpu_to_le32(F2FS_XATTR_MAGIC); | |
406 | header->h_refcount = cpu_to_le32(1); | |
407 | } else { | |
408 | /* The inode already has an extended attribute block. */ | |
409 | page = get_node_page(sbi, fi->i_xattr_nid); | |
410 | if (IS_ERR(page)) { | |
7c909772 NJ |
411 | error = PTR_ERR(page); |
412 | goto exit; | |
af48b85b JK |
413 | } |
414 | ||
415 | base_addr = page_address(page); | |
416 | header = XATTR_HDR(base_addr); | |
417 | } | |
418 | ||
419 | if (le32_to_cpu(header->h_magic) != F2FS_XATTR_MAGIC) { | |
420 | error = -EIO; | |
421 | goto cleanup; | |
422 | } | |
423 | ||
424 | /* find entry with wanted name. */ | |
dd9cfe23 | 425 | here = __find_xattr(base_addr, name_index, name_len, name); |
af48b85b | 426 | |
dd9cfe23 | 427 | found = IS_XATTR_LAST_ENTRY(here) ? 0 : 1; |
af48b85b JK |
428 | last = here; |
429 | ||
430 | while (!IS_XATTR_LAST_ENTRY(last)) | |
431 | last = XATTR_NEXT_ENTRY(last); | |
432 | ||
433 | newsize = XATTR_ALIGN(sizeof(struct f2fs_xattr_entry) + | |
434 | name_len + value_len); | |
435 | ||
436 | /* 1. Check space */ | |
437 | if (value) { | |
438 | /* If value is NULL, it is remove operation. | |
439 | * In case of update operation, we caculate free. | |
440 | */ | |
441 | free = MIN_OFFSET - ((char *)last - (char *)header); | |
442 | if (found) | |
443 | free = free - ENTRY_SIZE(here); | |
444 | ||
445 | if (free < newsize) { | |
446 | error = -ENOSPC; | |
447 | goto cleanup; | |
448 | } | |
449 | } | |
450 | ||
451 | /* 2. Remove old entry */ | |
452 | if (found) { | |
453 | /* If entry is found, remove old entry. | |
454 | * If not found, remove operation is not needed. | |
455 | */ | |
456 | struct f2fs_xattr_entry *next = XATTR_NEXT_ENTRY(here); | |
457 | int oldsize = ENTRY_SIZE(here); | |
458 | ||
459 | memmove(here, next, (char *)last - (char *)next); | |
460 | last = (struct f2fs_xattr_entry *)((char *)last - oldsize); | |
461 | memset(last, 0, oldsize); | |
462 | } | |
463 | ||
464 | /* 3. Write new entry */ | |
465 | if (value) { | |
466 | /* Before we come here, old entry is removed. | |
467 | * We just write new entry. */ | |
468 | memset(last, 0, newsize); | |
469 | last->e_name_index = name_index; | |
470 | last->e_name_len = name_len; | |
471 | memcpy(last->e_name, name, name_len); | |
472 | pval = last->e_name + name_len; | |
473 | memcpy(pval, value, value_len); | |
474 | last->e_value_size = cpu_to_le16(value_len); | |
475 | } | |
476 | ||
477 | set_page_dirty(page); | |
478 | f2fs_put_page(page, 1); | |
479 | ||
480 | if (is_inode_flag_set(fi, FI_ACL_MODE)) { | |
481 | inode->i_mode = fi->i_acl_mode; | |
482 | inode->i_ctime = CURRENT_TIME; | |
483 | clear_inode_flag(fi, FI_ACL_MODE); | |
484 | } | |
e518ff81 JK |
485 | |
486 | /* store checkpoint version for conducting checkpoint during fsync */ | |
d71b5564 | 487 | fi->xattr_ver = cur_cp_version(F2FS_CKPT(sbi)); |
e518ff81 | 488 | |
8ae8f162 JK |
489 | if (ipage) |
490 | update_inode(inode, ipage); | |
491 | else | |
492 | update_inode_page(inode); | |
39936837 | 493 | mutex_unlock_op(sbi, ilock); |
af48b85b JK |
494 | |
495 | return 0; | |
496 | cleanup: | |
497 | f2fs_put_page(page, 1); | |
7c909772 | 498 | exit: |
39936837 | 499 | mutex_unlock_op(sbi, ilock); |
af48b85b JK |
500 | return error; |
501 | } |