]> git.ipfire.org Git - people/ms/linux.git/blame - fs/ceph/xattr.c
ceph: print r_direct_hash in hex in __choose_mds() dout
[people/ms/linux.git] / fs / ceph / xattr.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
3d14c5d2 2#include <linux/ceph/ceph_debug.h>
25e6bae3 3#include <linux/ceph/pagelist.h>
3d14c5d2 4
355da1eb 5#include "super.h"
3d14c5d2
YS
6#include "mds_client.h"
7
8#include <linux/ceph/decode.h>
355da1eb
SW
9
10#include <linux/xattr.h>
ac6713cc 11#include <linux/security.h>
4db658ea 12#include <linux/posix_acl_xattr.h>
5a0e3ad6 13#include <linux/slab.h>
355da1eb 14
22891907
AE
15#define XATTR_CEPH_PREFIX "ceph."
16#define XATTR_CEPH_PREFIX_LEN (sizeof (XATTR_CEPH_PREFIX) - 1)
17
bcdfeb2e
YZ
18static int __remove_xattr(struct ceph_inode_info *ci,
19 struct ceph_inode_xattr *xattr);
20
355da1eb
SW
21static bool ceph_is_valid_xattr(const char *name)
22{
b8fe918b
JL
23 return !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) ||
24 !strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN) ||
355da1eb
SW
25 !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) ||
26 !strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN);
27}
28
29/*
30 * These define virtual xattrs exposing the recursive directory
31 * statistics and layout metadata.
32 */
881a5fa2 33struct ceph_vxattr {
355da1eb 34 char *name;
3ce6cd12 35 size_t name_size; /* strlen(name) + 1 (for '\0') */
f1d1b51d
JL
36 ssize_t (*getxattr_cb)(struct ceph_inode_info *ci, char *val,
37 size_t size);
f36e4472 38 bool (*exists_cb)(struct ceph_inode_info *ci);
4e9906e7 39 unsigned int flags;
355da1eb
SW
40};
41
4e9906e7
YZ
42#define VXATTR_FLAG_READONLY (1<<0)
43#define VXATTR_FLAG_HIDDEN (1<<1)
49a9f4f6 44#define VXATTR_FLAG_RSTAT (1<<2)
4e9906e7 45
32ab0bd7
SW
46/* layouts */
47
48static bool ceph_vxattrcb_layout_exists(struct ceph_inode_info *ci)
49{
779fe0fb
YZ
50 struct ceph_file_layout *fl = &ci->i_layout;
51 return (fl->stripe_unit > 0 || fl->stripe_count > 0 ||
52 fl->object_size > 0 || fl->pool_id >= 0 ||
53 rcu_dereference_raw(fl->pool_ns) != NULL);
32ab0bd7
SW
54}
55
f1d1b51d
JL
56static ssize_t ceph_vxattrcb_layout(struct ceph_inode_info *ci, char *val,
57 size_t size)
32ab0bd7 58{
32ab0bd7
SW
59 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb);
60 struct ceph_osd_client *osdc = &fsc->client->osdc;
779fe0fb 61 struct ceph_string *pool_ns;
7627151e 62 s64 pool = ci->i_layout.pool_id;
32ab0bd7 63 const char *pool_name;
779fe0fb 64 const char *ns_field = " pool_namespace=";
1e5c6649 65 char buf[128];
779fe0fb 66 size_t len, total_len = 0;
3b421018 67 ssize_t ret;
779fe0fb
YZ
68
69 pool_ns = ceph_try_get_string(ci->i_layout.pool_ns);
32ab0bd7
SW
70
71 dout("ceph_vxattrcb_layout %p\n", &ci->vfs_inode);
5aea3dcd 72 down_read(&osdc->lock);
32ab0bd7 73 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
1e5c6649 74 if (pool_name) {
779fe0fb 75 len = snprintf(buf, sizeof(buf),
7627151e
YZ
76 "stripe_unit=%u stripe_count=%u object_size=%u pool=",
77 ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
78 ci->i_layout.object_size);
779fe0fb 79 total_len = len + strlen(pool_name);
1e5c6649 80 } else {
779fe0fb 81 len = snprintf(buf, sizeof(buf),
7627151e
YZ
82 "stripe_unit=%u stripe_count=%u object_size=%u pool=%lld",
83 ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
f1d1b51d 84 ci->i_layout.object_size, pool);
779fe0fb
YZ
85 total_len = len;
86 }
87
88 if (pool_ns)
89 total_len += strlen(ns_field) + pool_ns->len;
90
3b421018
JL
91 ret = total_len;
92 if (size >= total_len) {
779fe0fb
YZ
93 memcpy(val, buf, len);
94 ret = len;
95 if (pool_name) {
96 len = strlen(pool_name);
97 memcpy(val + ret, pool_name, len);
98 ret += len;
99 }
100 if (pool_ns) {
101 len = strlen(ns_field);
102 memcpy(val + ret, ns_field, len);
103 ret += len;
104 memcpy(val + ret, pool_ns->str, pool_ns->len);
105 ret += pool_ns->len;
1e5c6649
YZ
106 }
107 }
5aea3dcd 108 up_read(&osdc->lock);
779fe0fb 109 ceph_put_string(pool_ns);
32ab0bd7
SW
110 return ret;
111}
112
26350535
JL
113/*
114 * The convention with strings in xattrs is that they should not be NULL
115 * terminated, since we're returning the length with them. snprintf always
116 * NULL terminates however, so call it on a temporary buffer and then memcpy
117 * the result into place.
118 */
119static int ceph_fmt_xattr(char *val, size_t size, const char *fmt, ...)
120{
121 int ret;
122 va_list args;
123 char buf[96]; /* NB: reevaluate size if new vxattrs are added */
124
125 va_start(args, fmt);
126 ret = vsnprintf(buf, size ? sizeof(buf) : 0, fmt, args);
127 va_end(args);
128
129 /* Sanity check */
130 if (size && ret + 1 > sizeof(buf)) {
131 WARN_ONCE(true, "Returned length too big (%d)", ret);
132 return -E2BIG;
133 }
134
135 if (ret <= size)
136 memcpy(val, buf, ret);
137 return ret;
138}
139
f1d1b51d
JL
140static ssize_t ceph_vxattrcb_layout_stripe_unit(struct ceph_inode_info *ci,
141 char *val, size_t size)
695b7119 142{
26350535 143 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_unit);
695b7119
SW
144}
145
f1d1b51d
JL
146static ssize_t ceph_vxattrcb_layout_stripe_count(struct ceph_inode_info *ci,
147 char *val, size_t size)
695b7119 148{
26350535 149 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_count);
695b7119
SW
150}
151
f1d1b51d
JL
152static ssize_t ceph_vxattrcb_layout_object_size(struct ceph_inode_info *ci,
153 char *val, size_t size)
695b7119 154{
26350535 155 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.object_size);
695b7119
SW
156}
157
f1d1b51d
JL
158static ssize_t ceph_vxattrcb_layout_pool(struct ceph_inode_info *ci,
159 char *val, size_t size)
695b7119 160{
f1d1b51d 161 ssize_t ret;
695b7119
SW
162 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb);
163 struct ceph_osd_client *osdc = &fsc->client->osdc;
7627151e 164 s64 pool = ci->i_layout.pool_id;
695b7119
SW
165 const char *pool_name;
166
5aea3dcd 167 down_read(&osdc->lock);
695b7119 168 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
26350535
JL
169 if (pool_name) {
170 ret = strlen(pool_name);
171 if (ret <= size)
172 memcpy(val, pool_name, ret);
173 } else {
174 ret = ceph_fmt_xattr(val, size, "%lld", pool);
175 }
5aea3dcd 176 up_read(&osdc->lock);
695b7119
SW
177 return ret;
178}
179
f1d1b51d
JL
180static ssize_t ceph_vxattrcb_layout_pool_namespace(struct ceph_inode_info *ci,
181 char *val, size_t size)
779fe0fb 182{
26350535 183 ssize_t ret = 0;
779fe0fb 184 struct ceph_string *ns = ceph_try_get_string(ci->i_layout.pool_ns);
26350535 185
779fe0fb 186 if (ns) {
26350535
JL
187 ret = ns->len;
188 if (ret <= size)
189 memcpy(val, ns->str, ret);
779fe0fb
YZ
190 ceph_put_string(ns);
191 }
192 return ret;
193}
194
355da1eb
SW
195/* directories */
196
f1d1b51d
JL
197static ssize_t ceph_vxattrcb_dir_entries(struct ceph_inode_info *ci, char *val,
198 size_t size)
355da1eb 199{
26350535 200 return ceph_fmt_xattr(val, size, "%lld", ci->i_files + ci->i_subdirs);
355da1eb
SW
201}
202
f1d1b51d
JL
203static ssize_t ceph_vxattrcb_dir_files(struct ceph_inode_info *ci, char *val,
204 size_t size)
355da1eb 205{
26350535 206 return ceph_fmt_xattr(val, size, "%lld", ci->i_files);
355da1eb
SW
207}
208
f1d1b51d
JL
209static ssize_t ceph_vxattrcb_dir_subdirs(struct ceph_inode_info *ci, char *val,
210 size_t size)
355da1eb 211{
26350535 212 return ceph_fmt_xattr(val, size, "%lld", ci->i_subdirs);
355da1eb
SW
213}
214
f1d1b51d
JL
215static ssize_t ceph_vxattrcb_dir_rentries(struct ceph_inode_info *ci, char *val,
216 size_t size)
355da1eb 217{
26350535
JL
218 return ceph_fmt_xattr(val, size, "%lld",
219 ci->i_rfiles + ci->i_rsubdirs);
355da1eb
SW
220}
221
f1d1b51d
JL
222static ssize_t ceph_vxattrcb_dir_rfiles(struct ceph_inode_info *ci, char *val,
223 size_t size)
355da1eb 224{
26350535 225 return ceph_fmt_xattr(val, size, "%lld", ci->i_rfiles);
355da1eb
SW
226}
227
f1d1b51d
JL
228static ssize_t ceph_vxattrcb_dir_rsubdirs(struct ceph_inode_info *ci, char *val,
229 size_t size)
355da1eb 230{
26350535 231 return ceph_fmt_xattr(val, size, "%lld", ci->i_rsubdirs);
355da1eb
SW
232}
233
f1d1b51d
JL
234static ssize_t ceph_vxattrcb_dir_rbytes(struct ceph_inode_info *ci, char *val,
235 size_t size)
355da1eb 236{
26350535 237 return ceph_fmt_xattr(val, size, "%lld", ci->i_rbytes);
355da1eb
SW
238}
239
f1d1b51d
JL
240static ssize_t ceph_vxattrcb_dir_rctime(struct ceph_inode_info *ci, char *val,
241 size_t size)
355da1eb 242{
26350535
JL
243 return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_rctime.tv_sec,
244 ci->i_rctime.tv_nsec);
355da1eb
SW
245}
246
08796873
YZ
247/* dir pin */
248static bool ceph_vxattrcb_dir_pin_exists(struct ceph_inode_info *ci)
249{
250 return ci->i_dir_pin != -ENODATA;
251}
252
f1d1b51d
JL
253static ssize_t ceph_vxattrcb_dir_pin(struct ceph_inode_info *ci, char *val,
254 size_t size)
08796873 255{
26350535 256 return ceph_fmt_xattr(val, size, "%d", (int)ci->i_dir_pin);
08796873 257}
fb18a575 258
08796873 259/* quotas */
fb18a575
LH
260static bool ceph_vxattrcb_quota_exists(struct ceph_inode_info *ci)
261{
f1919826
YZ
262 bool ret = false;
263 spin_lock(&ci->i_ceph_lock);
264 if ((ci->i_max_files || ci->i_max_bytes) &&
265 ci->i_vino.snap == CEPH_NOSNAP &&
266 ci->i_snap_realm &&
267 ci->i_snap_realm->ino == ci->i_vino.ino)
268 ret = true;
269 spin_unlock(&ci->i_ceph_lock);
270 return ret;
fb18a575
LH
271}
272
f1d1b51d
JL
273static ssize_t ceph_vxattrcb_quota(struct ceph_inode_info *ci, char *val,
274 size_t size)
fb18a575 275{
26350535
JL
276 return ceph_fmt_xattr(val, size, "max_bytes=%llu max_files=%llu",
277 ci->i_max_bytes, ci->i_max_files);
fb18a575
LH
278}
279
f1d1b51d
JL
280static ssize_t ceph_vxattrcb_quota_max_bytes(struct ceph_inode_info *ci,
281 char *val, size_t size)
fb18a575 282{
26350535 283 return ceph_fmt_xattr(val, size, "%llu", ci->i_max_bytes);
fb18a575
LH
284}
285
f1d1b51d
JL
286static ssize_t ceph_vxattrcb_quota_max_files(struct ceph_inode_info *ci,
287 char *val, size_t size)
fb18a575 288{
26350535 289 return ceph_fmt_xattr(val, size, "%llu", ci->i_max_files);
fb18a575 290}
32ab0bd7 291
100cc610
DD
292/* snapshots */
293static bool ceph_vxattrcb_snap_btime_exists(struct ceph_inode_info *ci)
294{
295 return (ci->i_snap_btime.tv_sec != 0 || ci->i_snap_btime.tv_nsec != 0);
296}
297
f1d1b51d
JL
298static ssize_t ceph_vxattrcb_snap_btime(struct ceph_inode_info *ci, char *val,
299 size_t size)
100cc610 300{
26350535
JL
301 return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_snap_btime.tv_sec,
302 ci->i_snap_btime.tv_nsec);
100cc610
DD
303}
304
eb788084 305#define CEPH_XATTR_NAME(_type, _name) XATTR_CEPH_PREFIX #_type "." #_name
695b7119
SW
306#define CEPH_XATTR_NAME2(_type, _name, _name2) \
307 XATTR_CEPH_PREFIX #_type "." #_name "." #_name2
eb788084 308
49a9f4f6 309#define XATTR_NAME_CEPH(_type, _name, _flags) \
8860147a
SW
310 { \
311 .name = CEPH_XATTR_NAME(_type, _name), \
312 .name_size = sizeof (CEPH_XATTR_NAME(_type, _name)), \
313 .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \
49a9f4f6
YZ
314 .exists_cb = NULL, \
315 .flags = (VXATTR_FLAG_READONLY | _flags), \
8860147a 316 }
49a9f4f6
YZ
317#define XATTR_RSTAT_FIELD(_type, _name) \
318 XATTR_NAME_CEPH(_type, _name, VXATTR_FLAG_RSTAT)
695b7119
SW
319#define XATTR_LAYOUT_FIELD(_type, _name, _field) \
320 { \
321 .name = CEPH_XATTR_NAME2(_type, _name, _field), \
322 .name_size = sizeof (CEPH_XATTR_NAME2(_type, _name, _field)), \
323 .getxattr_cb = ceph_vxattrcb_ ## _name ## _ ## _field, \
695b7119 324 .exists_cb = ceph_vxattrcb_layout_exists, \
4e9906e7 325 .flags = VXATTR_FLAG_HIDDEN, \
695b7119 326 }
fb18a575
LH
327#define XATTR_QUOTA_FIELD(_type, _name) \
328 { \
329 .name = CEPH_XATTR_NAME(_type, _name), \
330 .name_size = sizeof(CEPH_XATTR_NAME(_type, _name)), \
331 .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \
fb18a575 332 .exists_cb = ceph_vxattrcb_quota_exists, \
4e9906e7 333 .flags = VXATTR_FLAG_HIDDEN, \
fb18a575 334 }
eb788084 335
881a5fa2 336static struct ceph_vxattr ceph_dir_vxattrs[] = {
1f08f2b0
SW
337 {
338 .name = "ceph.dir.layout",
339 .name_size = sizeof("ceph.dir.layout"),
340 .getxattr_cb = ceph_vxattrcb_layout,
1f08f2b0 341 .exists_cb = ceph_vxattrcb_layout_exists,
4e9906e7 342 .flags = VXATTR_FLAG_HIDDEN,
1f08f2b0 343 },
695b7119
SW
344 XATTR_LAYOUT_FIELD(dir, layout, stripe_unit),
345 XATTR_LAYOUT_FIELD(dir, layout, stripe_count),
346 XATTR_LAYOUT_FIELD(dir, layout, object_size),
347 XATTR_LAYOUT_FIELD(dir, layout, pool),
779fe0fb 348 XATTR_LAYOUT_FIELD(dir, layout, pool_namespace),
49a9f4f6
YZ
349 XATTR_NAME_CEPH(dir, entries, 0),
350 XATTR_NAME_CEPH(dir, files, 0),
351 XATTR_NAME_CEPH(dir, subdirs, 0),
352 XATTR_RSTAT_FIELD(dir, rentries),
353 XATTR_RSTAT_FIELD(dir, rfiles),
354 XATTR_RSTAT_FIELD(dir, rsubdirs),
355 XATTR_RSTAT_FIELD(dir, rbytes),
356 XATTR_RSTAT_FIELD(dir, rctime),
08796873
YZ
357 {
358 .name = "ceph.dir.pin",
e1b81439 359 .name_size = sizeof("ceph.dir.pin"),
08796873
YZ
360 .getxattr_cb = ceph_vxattrcb_dir_pin,
361 .exists_cb = ceph_vxattrcb_dir_pin_exists,
362 .flags = VXATTR_FLAG_HIDDEN,
363 },
fb18a575
LH
364 {
365 .name = "ceph.quota",
366 .name_size = sizeof("ceph.quota"),
367 .getxattr_cb = ceph_vxattrcb_quota,
fb18a575 368 .exists_cb = ceph_vxattrcb_quota_exists,
4e9906e7 369 .flags = VXATTR_FLAG_HIDDEN,
fb18a575
LH
370 },
371 XATTR_QUOTA_FIELD(quota, max_bytes),
372 XATTR_QUOTA_FIELD(quota, max_files),
100cc610
DD
373 {
374 .name = "ceph.snap.btime",
375 .name_size = sizeof("ceph.snap.btime"),
376 .getxattr_cb = ceph_vxattrcb_snap_btime,
377 .exists_cb = ceph_vxattrcb_snap_btime_exists,
378 .flags = VXATTR_FLAG_READONLY,
379 },
2c3dd4ff 380 { .name = NULL, 0 } /* Required table terminator */
355da1eb
SW
381};
382
383/* files */
384
881a5fa2 385static struct ceph_vxattr ceph_file_vxattrs[] = {
32ab0bd7
SW
386 {
387 .name = "ceph.file.layout",
388 .name_size = sizeof("ceph.file.layout"),
389 .getxattr_cb = ceph_vxattrcb_layout,
32ab0bd7 390 .exists_cb = ceph_vxattrcb_layout_exists,
4e9906e7 391 .flags = VXATTR_FLAG_HIDDEN,
32ab0bd7 392 },
695b7119
SW
393 XATTR_LAYOUT_FIELD(file, layout, stripe_unit),
394 XATTR_LAYOUT_FIELD(file, layout, stripe_count),
395 XATTR_LAYOUT_FIELD(file, layout, object_size),
396 XATTR_LAYOUT_FIELD(file, layout, pool),
779fe0fb 397 XATTR_LAYOUT_FIELD(file, layout, pool_namespace),
100cc610
DD
398 {
399 .name = "ceph.snap.btime",
400 .name_size = sizeof("ceph.snap.btime"),
401 .getxattr_cb = ceph_vxattrcb_snap_btime,
402 .exists_cb = ceph_vxattrcb_snap_btime_exists,
403 .flags = VXATTR_FLAG_READONLY,
404 },
2c3dd4ff 405 { .name = NULL, 0 } /* Required table terminator */
355da1eb
SW
406};
407
881a5fa2 408static struct ceph_vxattr *ceph_inode_vxattrs(struct inode *inode)
355da1eb
SW
409{
410 if (S_ISDIR(inode->i_mode))
411 return ceph_dir_vxattrs;
412 else if (S_ISREG(inode->i_mode))
413 return ceph_file_vxattrs;
414 return NULL;
415}
416
881a5fa2 417static struct ceph_vxattr *ceph_match_vxattr(struct inode *inode,
355da1eb
SW
418 const char *name)
419{
881a5fa2 420 struct ceph_vxattr *vxattr = ceph_inode_vxattrs(inode);
06476a69
AE
421
422 if (vxattr) {
423 while (vxattr->name) {
424 if (!strcmp(vxattr->name, name))
425 return vxattr;
426 vxattr++;
427 }
428 }
429
355da1eb
SW
430 return NULL;
431}
432
433static int __set_xattr(struct ceph_inode_info *ci,
434 const char *name, int name_len,
435 const char *val, int val_len,
fbc0b970 436 int flags, int update_xattr,
355da1eb
SW
437 struct ceph_inode_xattr **newxattr)
438{
439 struct rb_node **p;
440 struct rb_node *parent = NULL;
441 struct ceph_inode_xattr *xattr = NULL;
442 int c;
443 int new = 0;
444
445 p = &ci->i_xattrs.index.rb_node;
446 while (*p) {
447 parent = *p;
448 xattr = rb_entry(parent, struct ceph_inode_xattr, node);
449 c = strncmp(name, xattr->name, min(name_len, xattr->name_len));
450 if (c < 0)
451 p = &(*p)->rb_left;
452 else if (c > 0)
453 p = &(*p)->rb_right;
454 else {
455 if (name_len == xattr->name_len)
456 break;
457 else if (name_len < xattr->name_len)
458 p = &(*p)->rb_left;
459 else
460 p = &(*p)->rb_right;
461 }
462 xattr = NULL;
463 }
464
fbc0b970
YZ
465 if (update_xattr) {
466 int err = 0;
eeca958d 467
fbc0b970
YZ
468 if (xattr && (flags & XATTR_CREATE))
469 err = -EEXIST;
470 else if (!xattr && (flags & XATTR_REPLACE))
471 err = -ENODATA;
472 if (err) {
473 kfree(name);
474 kfree(val);
eeca958d 475 kfree(*newxattr);
fbc0b970
YZ
476 return err;
477 }
bcdfeb2e
YZ
478 if (update_xattr < 0) {
479 if (xattr)
480 __remove_xattr(ci, xattr);
481 kfree(name);
eeca958d 482 kfree(*newxattr);
bcdfeb2e
YZ
483 return 0;
484 }
fbc0b970
YZ
485 }
486
355da1eb
SW
487 if (!xattr) {
488 new = 1;
489 xattr = *newxattr;
490 xattr->name = name;
491 xattr->name_len = name_len;
fbc0b970 492 xattr->should_free_name = update_xattr;
355da1eb
SW
493
494 ci->i_xattrs.count++;
495 dout("__set_xattr count=%d\n", ci->i_xattrs.count);
496 } else {
497 kfree(*newxattr);
498 *newxattr = NULL;
499 if (xattr->should_free_val)
500 kfree((void *)xattr->val);
501
fbc0b970 502 if (update_xattr) {
355da1eb
SW
503 kfree((void *)name);
504 name = xattr->name;
505 }
506 ci->i_xattrs.names_size -= xattr->name_len;
507 ci->i_xattrs.vals_size -= xattr->val_len;
508 }
355da1eb
SW
509 ci->i_xattrs.names_size += name_len;
510 ci->i_xattrs.vals_size += val_len;
511 if (val)
512 xattr->val = val;
513 else
514 xattr->val = "";
515
516 xattr->val_len = val_len;
fbc0b970
YZ
517 xattr->dirty = update_xattr;
518 xattr->should_free_val = (val && update_xattr);
355da1eb
SW
519
520 if (new) {
521 rb_link_node(&xattr->node, parent, p);
522 rb_insert_color(&xattr->node, &ci->i_xattrs.index);
523 dout("__set_xattr_val p=%p\n", p);
524 }
525
05729781
YZ
526 dout("__set_xattr_val added %llx.%llx xattr %p %.*s=%.*s\n",
527 ceph_vinop(&ci->vfs_inode), xattr, name_len, name, val_len, val);
355da1eb
SW
528
529 return 0;
530}
531
532static struct ceph_inode_xattr *__get_xattr(struct ceph_inode_info *ci,
533 const char *name)
534{
535 struct rb_node **p;
536 struct rb_node *parent = NULL;
537 struct ceph_inode_xattr *xattr = NULL;
17db143f 538 int name_len = strlen(name);
355da1eb
SW
539 int c;
540
541 p = &ci->i_xattrs.index.rb_node;
542 while (*p) {
543 parent = *p;
544 xattr = rb_entry(parent, struct ceph_inode_xattr, node);
545 c = strncmp(name, xattr->name, xattr->name_len);
17db143f
SW
546 if (c == 0 && name_len > xattr->name_len)
547 c = 1;
355da1eb
SW
548 if (c < 0)
549 p = &(*p)->rb_left;
550 else if (c > 0)
551 p = &(*p)->rb_right;
552 else {
553 dout("__get_xattr %s: found %.*s\n", name,
554 xattr->val_len, xattr->val);
555 return xattr;
556 }
557 }
558
559 dout("__get_xattr %s: not found\n", name);
560
561 return NULL;
562}
563
564static void __free_xattr(struct ceph_inode_xattr *xattr)
565{
566 BUG_ON(!xattr);
567
568 if (xattr->should_free_name)
569 kfree((void *)xattr->name);
570 if (xattr->should_free_val)
571 kfree((void *)xattr->val);
572
573 kfree(xattr);
574}
575
576static int __remove_xattr(struct ceph_inode_info *ci,
577 struct ceph_inode_xattr *xattr)
578{
579 if (!xattr)
524186ac 580 return -ENODATA;
355da1eb
SW
581
582 rb_erase(&xattr->node, &ci->i_xattrs.index);
583
584 if (xattr->should_free_name)
585 kfree((void *)xattr->name);
586 if (xattr->should_free_val)
587 kfree((void *)xattr->val);
588
589 ci->i_xattrs.names_size -= xattr->name_len;
590 ci->i_xattrs.vals_size -= xattr->val_len;
591 ci->i_xattrs.count--;
592 kfree(xattr);
593
594 return 0;
595}
596
355da1eb
SW
597static char *__copy_xattr_names(struct ceph_inode_info *ci,
598 char *dest)
599{
600 struct rb_node *p;
601 struct ceph_inode_xattr *xattr = NULL;
602
603 p = rb_first(&ci->i_xattrs.index);
604 dout("__copy_xattr_names count=%d\n", ci->i_xattrs.count);
605
606 while (p) {
607 xattr = rb_entry(p, struct ceph_inode_xattr, node);
608 memcpy(dest, xattr->name, xattr->name_len);
609 dest[xattr->name_len] = '\0';
610
611 dout("dest=%s %p (%s) (%d/%d)\n", dest, xattr, xattr->name,
612 xattr->name_len, ci->i_xattrs.names_size);
613
614 dest += xattr->name_len + 1;
615 p = rb_next(p);
616 }
617
618 return dest;
619}
620
621void __ceph_destroy_xattrs(struct ceph_inode_info *ci)
622{
623 struct rb_node *p, *tmp;
624 struct ceph_inode_xattr *xattr = NULL;
625
626 p = rb_first(&ci->i_xattrs.index);
627
628 dout("__ceph_destroy_xattrs p=%p\n", p);
629
630 while (p) {
631 xattr = rb_entry(p, struct ceph_inode_xattr, node);
632 tmp = p;
633 p = rb_next(tmp);
634 dout("__ceph_destroy_xattrs next p=%p (%.*s)\n", p,
635 xattr->name_len, xattr->name);
636 rb_erase(tmp, &ci->i_xattrs.index);
637
638 __free_xattr(xattr);
639 }
640
641 ci->i_xattrs.names_size = 0;
642 ci->i_xattrs.vals_size = 0;
643 ci->i_xattrs.index_version = 0;
644 ci->i_xattrs.count = 0;
645 ci->i_xattrs.index = RB_ROOT;
646}
647
648static int __build_xattrs(struct inode *inode)
be655596
SW
649 __releases(ci->i_ceph_lock)
650 __acquires(ci->i_ceph_lock)
355da1eb
SW
651{
652 u32 namelen;
653 u32 numattr = 0;
654 void *p, *end;
655 u32 len;
656 const char *name, *val;
657 struct ceph_inode_info *ci = ceph_inode(inode);
0eb30853 658 u64 xattr_version;
355da1eb 659 struct ceph_inode_xattr **xattrs = NULL;
63ff78b2 660 int err = 0;
355da1eb
SW
661 int i;
662
663 dout("__build_xattrs() len=%d\n",
664 ci->i_xattrs.blob ? (int)ci->i_xattrs.blob->vec.iov_len : 0);
665
666 if (ci->i_xattrs.index_version >= ci->i_xattrs.version)
667 return 0; /* already built */
668
669 __ceph_destroy_xattrs(ci);
670
671start:
672 /* updated internal xattr rb tree */
673 if (ci->i_xattrs.blob && ci->i_xattrs.blob->vec.iov_len > 4) {
674 p = ci->i_xattrs.blob->vec.iov_base;
675 end = p + ci->i_xattrs.blob->vec.iov_len;
676 ceph_decode_32_safe(&p, end, numattr, bad);
677 xattr_version = ci->i_xattrs.version;
be655596 678 spin_unlock(&ci->i_ceph_lock);
355da1eb 679
7e8a2952 680 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *),
355da1eb
SW
681 GFP_NOFS);
682 err = -ENOMEM;
683 if (!xattrs)
684 goto bad_lock;
1a295bd8 685
355da1eb
SW
686 for (i = 0; i < numattr; i++) {
687 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr),
688 GFP_NOFS);
689 if (!xattrs[i])
690 goto bad_lock;
691 }
692
be655596 693 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
694 if (ci->i_xattrs.version != xattr_version) {
695 /* lost a race, retry */
696 for (i = 0; i < numattr; i++)
697 kfree(xattrs[i]);
698 kfree(xattrs);
21ec6ffa 699 xattrs = NULL;
355da1eb
SW
700 goto start;
701 }
702 err = -EIO;
703 while (numattr--) {
704 ceph_decode_32_safe(&p, end, len, bad);
705 namelen = len;
706 name = p;
707 p += len;
708 ceph_decode_32_safe(&p, end, len, bad);
709 val = p;
710 p += len;
711
712 err = __set_xattr(ci, name, namelen, val, len,
fbc0b970 713 0, 0, &xattrs[numattr]);
355da1eb
SW
714
715 if (err < 0)
716 goto bad;
717 }
718 kfree(xattrs);
719 }
720 ci->i_xattrs.index_version = ci->i_xattrs.version;
721 ci->i_xattrs.dirty = false;
722
723 return err;
724bad_lock:
be655596 725 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
726bad:
727 if (xattrs) {
728 for (i = 0; i < numattr; i++)
729 kfree(xattrs[i]);
730 kfree(xattrs);
731 }
732 ci->i_xattrs.names_size = 0;
733 return err;
734}
735
736static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size,
737 int val_size)
738{
739 /*
740 * 4 bytes for the length, and additional 4 bytes per each xattr name,
741 * 4 bytes per each value
742 */
743 int size = 4 + ci->i_xattrs.count*(4 + 4) +
744 ci->i_xattrs.names_size +
745 ci->i_xattrs.vals_size;
746 dout("__get_required_blob_size c=%d names.size=%d vals.size=%d\n",
747 ci->i_xattrs.count, ci->i_xattrs.names_size,
748 ci->i_xattrs.vals_size);
749
750 if (name_size)
751 size += 4 + 4 + name_size + val_size;
752
753 return size;
754}
755
756/*
757 * If there are dirty xattrs, reencode xattrs into the prealloc_blob
12fe3dda
LH
758 * and swap into place. It returns the old i_xattrs.blob (or NULL) so
759 * that it can be freed by the caller as the i_ceph_lock is likely to be
760 * held.
355da1eb 761 */
12fe3dda 762struct ceph_buffer *__ceph_build_xattrs_blob(struct ceph_inode_info *ci)
355da1eb
SW
763{
764 struct rb_node *p;
765 struct ceph_inode_xattr *xattr = NULL;
12fe3dda 766 struct ceph_buffer *old_blob = NULL;
355da1eb
SW
767 void *dest;
768
769 dout("__build_xattrs_blob %p\n", &ci->vfs_inode);
770 if (ci->i_xattrs.dirty) {
771 int need = __get_required_blob_size(ci, 0, 0);
772
773 BUG_ON(need > ci->i_xattrs.prealloc_blob->alloc_len);
774
775 p = rb_first(&ci->i_xattrs.index);
776 dest = ci->i_xattrs.prealloc_blob->vec.iov_base;
777
778 ceph_encode_32(&dest, ci->i_xattrs.count);
779 while (p) {
780 xattr = rb_entry(p, struct ceph_inode_xattr, node);
781
782 ceph_encode_32(&dest, xattr->name_len);
783 memcpy(dest, xattr->name, xattr->name_len);
784 dest += xattr->name_len;
785 ceph_encode_32(&dest, xattr->val_len);
786 memcpy(dest, xattr->val, xattr->val_len);
787 dest += xattr->val_len;
788
789 p = rb_next(p);
790 }
791
792 /* adjust buffer len; it may be larger than we need */
793 ci->i_xattrs.prealloc_blob->vec.iov_len =
794 dest - ci->i_xattrs.prealloc_blob->vec.iov_base;
795
b6c1d5b8 796 if (ci->i_xattrs.blob)
12fe3dda 797 old_blob = ci->i_xattrs.blob;
355da1eb
SW
798 ci->i_xattrs.blob = ci->i_xattrs.prealloc_blob;
799 ci->i_xattrs.prealloc_blob = NULL;
800 ci->i_xattrs.dirty = false;
4a625be4 801 ci->i_xattrs.version++;
355da1eb 802 }
12fe3dda
LH
803
804 return old_blob;
355da1eb
SW
805}
806
315f2408
YZ
807static inline int __get_request_mask(struct inode *in) {
808 struct ceph_mds_request *req = current->journal_info;
809 int mask = 0;
810 if (req && req->r_target_inode == in) {
811 if (req->r_op == CEPH_MDS_OP_LOOKUP ||
812 req->r_op == CEPH_MDS_OP_LOOKUPINO ||
813 req->r_op == CEPH_MDS_OP_LOOKUPPARENT ||
814 req->r_op == CEPH_MDS_OP_GETATTR) {
815 mask = le32_to_cpu(req->r_args.getattr.mask);
816 } else if (req->r_op == CEPH_MDS_OP_OPEN ||
817 req->r_op == CEPH_MDS_OP_CREATE) {
818 mask = le32_to_cpu(req->r_args.open.mask);
819 }
820 }
821 return mask;
822}
823
7221fe4c 824ssize_t __ceph_getxattr(struct inode *inode, const char *name, void *value,
355da1eb
SW
825 size_t size)
826{
355da1eb 827 struct ceph_inode_info *ci = ceph_inode(inode);
355da1eb 828 struct ceph_inode_xattr *xattr;
881a5fa2 829 struct ceph_vxattr *vxattr = NULL;
315f2408 830 int req_mask;
f1d1b51d 831 ssize_t err;
355da1eb 832
0bee82fb
SW
833 /* let's see if a virtual xattr was requested */
834 vxattr = ceph_match_vxattr(inode, name);
29dccfa5 835 if (vxattr) {
49a9f4f6
YZ
836 int mask = 0;
837 if (vxattr->flags & VXATTR_FLAG_RSTAT)
838 mask |= CEPH_STAT_RSTAT;
839 err = ceph_do_getattr(inode, mask, true);
1684dd03
YZ
840 if (err)
841 return err;
29dccfa5 842 err = -ENODATA;
3b421018 843 if (!(vxattr->exists_cb && !vxattr->exists_cb(ci))) {
29dccfa5 844 err = vxattr->getxattr_cb(ci, value, size);
3b421018
JL
845 if (size && size < err)
846 err = -ERANGE;
847 }
a1dc1937 848 return err;
0bee82fb
SW
849 }
850
315f2408
YZ
851 req_mask = __get_request_mask(inode);
852
a1dc1937 853 spin_lock(&ci->i_ceph_lock);
854 dout("getxattr %p ver=%lld index_ver=%lld\n", inode,
855 ci->i_xattrs.version, ci->i_xattrs.index_version);
856
508b32d8 857 if (ci->i_xattrs.version == 0 ||
315f2408
YZ
858 !((req_mask & CEPH_CAP_XATTR_SHARED) ||
859 __ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 1))) {
be655596 860 spin_unlock(&ci->i_ceph_lock);
315f2408
YZ
861
862 /* security module gets xattr while filling trace */
d37b1d99 863 if (current->journal_info) {
315f2408
YZ
864 pr_warn_ratelimited("sync getxattr %p "
865 "during filling trace\n", inode);
866 return -EBUSY;
867 }
868
355da1eb 869 /* get xattrs from mds (if we don't already have them) */
508b32d8 870 err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
355da1eb
SW
871 if (err)
872 return err;
508b32d8 873 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
874 }
875
355da1eb
SW
876 err = __build_xattrs(inode);
877 if (err < 0)
878 goto out;
879
355da1eb
SW
880 err = -ENODATA; /* == ENOATTR */
881 xattr = __get_xattr(ci, name);
0bee82fb 882 if (!xattr)
355da1eb 883 goto out;
355da1eb
SW
884
885 err = -ERANGE;
886 if (size && size < xattr->val_len)
887 goto out;
888
889 err = xattr->val_len;
890 if (size == 0)
891 goto out;
892
893 memcpy(value, xattr->val, xattr->val_len);
894
d37b1d99 895 if (current->journal_info &&
026105eb
JL
896 !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) &&
897 security_ismaclabel(name + XATTR_SECURITY_PREFIX_LEN))
315f2408 898 ci->i_ceph_flags |= CEPH_I_SEC_INITED;
355da1eb 899out:
be655596 900 spin_unlock(&ci->i_ceph_lock);
355da1eb
SW
901 return err;
902}
903
904ssize_t ceph_listxattr(struct dentry *dentry, char *names, size_t size)
905{
2b0143b5 906 struct inode *inode = d_inode(dentry);
355da1eb 907 struct ceph_inode_info *ci = ceph_inode(inode);
2b2abcac 908 bool len_only = (size == 0);
355da1eb
SW
909 u32 namelen;
910 int err;
355da1eb 911
be655596 912 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
913 dout("listxattr %p ver=%lld index_ver=%lld\n", inode,
914 ci->i_xattrs.version, ci->i_xattrs.index_version);
915
508b32d8
YZ
916 if (ci->i_xattrs.version == 0 ||
917 !__ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 1)) {
be655596 918 spin_unlock(&ci->i_ceph_lock);
508b32d8 919 err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
355da1eb
SW
920 if (err)
921 return err;
508b32d8 922 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
923 }
924
355da1eb
SW
925 err = __build_xattrs(inode);
926 if (err < 0)
927 goto out;
3ce6cd12 928
2b2abcac 929 /* add 1 byte for each xattr due to the null termination */
b65917dd 930 namelen = ci->i_xattrs.names_size + ci->i_xattrs.count;
2b2abcac
DD
931 if (!len_only) {
932 if (namelen > size) {
933 err = -ERANGE;
934 goto out;
935 }
936 names = __copy_xattr_names(ci, names);
937 size -= namelen;
938 }
2b2abcac 939 err = namelen;
355da1eb 940out:
be655596 941 spin_unlock(&ci->i_ceph_lock);
355da1eb
SW
942 return err;
943}
944
a26fecca 945static int ceph_sync_setxattr(struct inode *inode, const char *name,
355da1eb
SW
946 const char *value, size_t size, int flags)
947{
a26fecca 948 struct ceph_fs_client *fsc = ceph_sb_to_client(inode->i_sb);
355da1eb 949 struct ceph_inode_info *ci = ceph_inode(inode);
355da1eb 950 struct ceph_mds_request *req;
3d14c5d2 951 struct ceph_mds_client *mdsc = fsc->mdsc;
25e6bae3 952 struct ceph_pagelist *pagelist = NULL;
04303d8a 953 int op = CEPH_MDS_OP_SETXATTR;
355da1eb 954 int err;
25e6bae3 955
0aeff37a 956 if (size > 0) {
25e6bae3 957 /* copy value into pagelist */
33165d47 958 pagelist = ceph_pagelist_alloc(GFP_NOFS);
25e6bae3 959 if (!pagelist)
355da1eb 960 return -ENOMEM;
25e6bae3 961
25e6bae3
YZ
962 err = ceph_pagelist_append(pagelist, value, size);
963 if (err)
964 goto out;
0aeff37a 965 } else if (!value) {
04303d8a
YZ
966 if (flags & CEPH_XATTR_REPLACE)
967 op = CEPH_MDS_OP_RMXATTR;
968 else
969 flags |= CEPH_XATTR_REMOVE;
355da1eb
SW
970 }
971
972 dout("setxattr value=%.*s\n", (int)size, value);
973
974 /* do request */
04303d8a 975 req = ceph_mdsc_create_request(mdsc, op, USE_AUTH_MDS);
60d87733
JL
976 if (IS_ERR(req)) {
977 err = PTR_ERR(req);
978 goto out;
979 }
a149bb9a 980
355da1eb 981 req->r_path2 = kstrdup(name, GFP_NOFS);
a149bb9a
SK
982 if (!req->r_path2) {
983 ceph_mdsc_put_request(req);
984 err = -ENOMEM;
985 goto out;
986 }
355da1eb 987
04303d8a
YZ
988 if (op == CEPH_MDS_OP_SETXATTR) {
989 req->r_args.setxattr.flags = cpu_to_le32(flags);
990 req->r_pagelist = pagelist;
991 pagelist = NULL;
992 }
355da1eb 993
a149bb9a
SK
994 req->r_inode = inode;
995 ihold(inode);
996 req->r_num_caps = 1;
997 req->r_inode_drop = CEPH_CAP_XATTR_SHARED;
998
355da1eb 999 dout("xattr.ver (before): %lld\n", ci->i_xattrs.version);
752c8bdc 1000 err = ceph_mdsc_do_request(mdsc, NULL, req);
355da1eb
SW
1001 ceph_mdsc_put_request(req);
1002 dout("xattr.ver (after): %lld\n", ci->i_xattrs.version);
1003
1004out:
25e6bae3
YZ
1005 if (pagelist)
1006 ceph_pagelist_release(pagelist);
355da1eb
SW
1007 return err;
1008}
1009
a26fecca 1010int __ceph_setxattr(struct inode *inode, const char *name,
7221fe4c 1011 const void *value, size_t size, int flags)
355da1eb 1012{
881a5fa2 1013 struct ceph_vxattr *vxattr;
355da1eb 1014 struct ceph_inode_info *ci = ceph_inode(inode);
a26fecca 1015 struct ceph_mds_client *mdsc = ceph_sb_to_client(inode->i_sb)->mdsc;
f66fd9f0 1016 struct ceph_cap_flush *prealloc_cf = NULL;
86968ef2 1017 struct ceph_buffer *old_blob = NULL;
18fa8b3f 1018 int issued;
355da1eb 1019 int err;
fbc0b970 1020 int dirty = 0;
355da1eb
SW
1021 int name_len = strlen(name);
1022 int val_len = size;
1023 char *newname = NULL;
1024 char *newval = NULL;
1025 struct ceph_inode_xattr *xattr = NULL;
355da1eb 1026 int required_blob_size;
f1919826 1027 bool check_realm = false;
604d1b02 1028 bool lock_snap_rwsem = false;
355da1eb 1029
2cdeb1e4
AG
1030 if (ceph_snap(inode) != CEPH_NOSNAP)
1031 return -EROFS;
355da1eb 1032
06476a69 1033 vxattr = ceph_match_vxattr(inode, name);
f1919826 1034 if (vxattr) {
4e9906e7 1035 if (vxattr->flags & VXATTR_FLAG_READONLY)
f1919826
YZ
1036 return -EOPNOTSUPP;
1037 if (value && !strncmp(vxattr->name, "ceph.quota", 10))
1038 check_realm = true;
1039 }
355da1eb 1040
3adf654d
SW
1041 /* pass any unhandled ceph.* xattrs through to the MDS */
1042 if (!strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN))
1043 goto do_sync_unlocked;
1044
355da1eb
SW
1045 /* preallocate memory for xattr name, value, index node */
1046 err = -ENOMEM;
61413c2f 1047 newname = kmemdup(name, name_len + 1, GFP_NOFS);
355da1eb
SW
1048 if (!newname)
1049 goto out;
355da1eb
SW
1050
1051 if (val_len) {
b829c195 1052 newval = kmemdup(value, val_len, GFP_NOFS);
355da1eb
SW
1053 if (!newval)
1054 goto out;
355da1eb
SW
1055 }
1056
1057 xattr = kmalloc(sizeof(struct ceph_inode_xattr), GFP_NOFS);
1058 if (!xattr)
1059 goto out;
1060
f66fd9f0
YZ
1061 prealloc_cf = ceph_alloc_cap_flush();
1062 if (!prealloc_cf)
1063 goto out;
1064
be655596 1065 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
1066retry:
1067 issued = __ceph_caps_issued(ci, NULL);
508b32d8 1068 if (ci->i_xattrs.version == 0 || !(issued & CEPH_CAP_XATTR_EXCL))
355da1eb 1069 goto do_sync;
604d1b02
YZ
1070
1071 if (!lock_snap_rwsem && !ci->i_head_snapc) {
1072 lock_snap_rwsem = true;
1073 if (!down_read_trylock(&mdsc->snap_rwsem)) {
1074 spin_unlock(&ci->i_ceph_lock);
1075 down_read(&mdsc->snap_rwsem);
1076 spin_lock(&ci->i_ceph_lock);
1077 goto retry;
1078 }
1079 }
1080
1081 dout("setxattr %p issued %s\n", inode, ceph_cap_string(issued));
355da1eb
SW
1082 __build_xattrs(inode);
1083
1084 required_blob_size = __get_required_blob_size(ci, name_len, val_len);
1085
1086 if (!ci->i_xattrs.prealloc_blob ||
1087 required_blob_size > ci->i_xattrs.prealloc_blob->alloc_len) {
18fa8b3f 1088 struct ceph_buffer *blob;
355da1eb 1089
be655596 1090 spin_unlock(&ci->i_ceph_lock);
86968ef2
LH
1091 ceph_buffer_put(old_blob); /* Shouldn't be required */
1092 dout(" pre-allocating new blob size=%d\n", required_blob_size);
b6c1d5b8 1093 blob = ceph_buffer_new(required_blob_size, GFP_NOFS);
355da1eb 1094 if (!blob)
604d1b02 1095 goto do_sync_unlocked;
be655596 1096 spin_lock(&ci->i_ceph_lock);
86968ef2 1097 /* prealloc_blob can't be released while holding i_ceph_lock */
b6c1d5b8 1098 if (ci->i_xattrs.prealloc_blob)
86968ef2 1099 old_blob = ci->i_xattrs.prealloc_blob;
355da1eb
SW
1100 ci->i_xattrs.prealloc_blob = blob;
1101 goto retry;
1102 }
1103
bcdfeb2e
YZ
1104 err = __set_xattr(ci, newname, name_len, newval, val_len,
1105 flags, value ? 1 : -1, &xattr);
18fa8b3f 1106
fbc0b970 1107 if (!err) {
f66fd9f0
YZ
1108 dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_XATTR_EXCL,
1109 &prealloc_cf);
fbc0b970 1110 ci->i_xattrs.dirty = true;
c2050a45 1111 inode->i_ctime = current_time(inode);
fbc0b970 1112 }
18fa8b3f 1113
be655596 1114 spin_unlock(&ci->i_ceph_lock);
86968ef2 1115 ceph_buffer_put(old_blob);
604d1b02
YZ
1116 if (lock_snap_rwsem)
1117 up_read(&mdsc->snap_rwsem);
fca65b4a
SW
1118 if (dirty)
1119 __mark_inode_dirty(inode, dirty);
f66fd9f0 1120 ceph_free_cap_flush(prealloc_cf);
355da1eb
SW
1121 return err;
1122
1123do_sync:
be655596 1124 spin_unlock(&ci->i_ceph_lock);
3adf654d 1125do_sync_unlocked:
604d1b02
YZ
1126 if (lock_snap_rwsem)
1127 up_read(&mdsc->snap_rwsem);
315f2408
YZ
1128
1129 /* security module set xattr while filling trace */
d37b1d99 1130 if (current->journal_info) {
315f2408
YZ
1131 pr_warn_ratelimited("sync setxattr %p "
1132 "during filling trace\n", inode);
1133 err = -EBUSY;
1134 } else {
a26fecca 1135 err = ceph_sync_setxattr(inode, name, value, size, flags);
f1919826
YZ
1136 if (err >= 0 && check_realm) {
1137 /* check if snaprealm was created for quota inode */
1138 spin_lock(&ci->i_ceph_lock);
1139 if ((ci->i_max_files || ci->i_max_bytes) &&
1140 !(ci->i_snap_realm &&
1141 ci->i_snap_realm->ino == ci->i_vino.ino))
1142 err = -EOPNOTSUPP;
1143 spin_unlock(&ci->i_ceph_lock);
1144 }
315f2408 1145 }
355da1eb 1146out:
f66fd9f0 1147 ceph_free_cap_flush(prealloc_cf);
355da1eb
SW
1148 kfree(newname);
1149 kfree(newval);
1150 kfree(xattr);
1151 return err;
1152}
1153
2cdeb1e4
AG
1154static int ceph_get_xattr_handler(const struct xattr_handler *handler,
1155 struct dentry *dentry, struct inode *inode,
1156 const char *name, void *value, size_t size)
7221fe4c 1157{
2cdeb1e4
AG
1158 if (!ceph_is_valid_xattr(name))
1159 return -EOPNOTSUPP;
1160 return __ceph_getxattr(inode, name, value, size);
1161}
7221fe4c 1162
2cdeb1e4 1163static int ceph_set_xattr_handler(const struct xattr_handler *handler,
59301226
AV
1164 struct dentry *unused, struct inode *inode,
1165 const char *name, const void *value,
1166 size_t size, int flags)
2cdeb1e4
AG
1167{
1168 if (!ceph_is_valid_xattr(name))
1169 return -EOPNOTSUPP;
59301226 1170 return __ceph_setxattr(inode, name, value, size, flags);
7221fe4c 1171}
315f2408 1172
5130ccea 1173static const struct xattr_handler ceph_other_xattr_handler = {
2cdeb1e4
AG
1174 .prefix = "", /* match any name => handlers called with full name */
1175 .get = ceph_get_xattr_handler,
1176 .set = ceph_set_xattr_handler,
1177};
1178
315f2408
YZ
1179#ifdef CONFIG_SECURITY
1180bool ceph_security_xattr_wanted(struct inode *in)
1181{
1182 return in->i_security != NULL;
1183}
1184
1185bool ceph_security_xattr_deadlock(struct inode *in)
1186{
1187 struct ceph_inode_info *ci;
1188 bool ret;
d37b1d99 1189 if (!in->i_security)
315f2408
YZ
1190 return false;
1191 ci = ceph_inode(in);
1192 spin_lock(&ci->i_ceph_lock);
1193 ret = !(ci->i_ceph_flags & CEPH_I_SEC_INITED) &&
1194 !(ci->i_xattrs.version > 0 &&
1195 __ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 0));
1196 spin_unlock(&ci->i_ceph_lock);
1197 return ret;
1198}
ac6713cc
YZ
1199
1200#ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1201int ceph_security_init_secctx(struct dentry *dentry, umode_t mode,
1202 struct ceph_acl_sec_ctx *as_ctx)
1203{
1204 struct ceph_pagelist *pagelist = as_ctx->pagelist;
1205 const char *name;
1206 size_t name_len;
1207 int err;
1208
1209 err = security_dentry_init_security(dentry, mode, &dentry->d_name,
1210 &as_ctx->sec_ctx,
1211 &as_ctx->sec_ctxlen);
1212 if (err < 0) {
1213 WARN_ON_ONCE(err != -EOPNOTSUPP);
1214 err = 0; /* do nothing */
1215 goto out;
1216 }
1217
1218 err = -ENOMEM;
1219 if (!pagelist) {
1220 pagelist = ceph_pagelist_alloc(GFP_KERNEL);
1221 if (!pagelist)
1222 goto out;
1223 err = ceph_pagelist_reserve(pagelist, PAGE_SIZE);
1224 if (err)
1225 goto out;
1226 ceph_pagelist_encode_32(pagelist, 1);
1227 }
1228
1229 /*
1230 * FIXME: Make security_dentry_init_security() generic. Currently
1231 * It only supports single security module and only selinux has
1232 * dentry_init_security hook.
1233 */
1234 name = XATTR_NAME_SELINUX;
1235 name_len = strlen(name);
1236 err = ceph_pagelist_reserve(pagelist,
1237 4 * 2 + name_len + as_ctx->sec_ctxlen);
1238 if (err)
1239 goto out;
1240
1241 if (as_ctx->pagelist) {
1242 /* update count of KV pairs */
1243 BUG_ON(pagelist->length <= sizeof(__le32));
1244 if (list_is_singular(&pagelist->head)) {
1245 le32_add_cpu((__le32*)pagelist->mapped_tail, 1);
1246 } else {
1247 struct page *page = list_first_entry(&pagelist->head,
1248 struct page, lru);
1249 void *addr = kmap_atomic(page);
1250 le32_add_cpu((__le32*)addr, 1);
1251 kunmap_atomic(addr);
1252 }
1253 } else {
1254 as_ctx->pagelist = pagelist;
1255 }
1256
1257 ceph_pagelist_encode_32(pagelist, name_len);
1258 ceph_pagelist_append(pagelist, name, name_len);
1259
1260 ceph_pagelist_encode_32(pagelist, as_ctx->sec_ctxlen);
1261 ceph_pagelist_append(pagelist, as_ctx->sec_ctx, as_ctx->sec_ctxlen);
1262
1263 err = 0;
1264out:
1265 if (pagelist && !as_ctx->pagelist)
1266 ceph_pagelist_release(pagelist);
1267 return err;
1268}
668959a5
JL
1269#endif /* CONFIG_CEPH_FS_SECURITY_LABEL */
1270#endif /* CONFIG_SECURITY */
5c31e92d
YZ
1271
1272void ceph_release_acl_sec_ctx(struct ceph_acl_sec_ctx *as_ctx)
1273{
1274#ifdef CONFIG_CEPH_FS_POSIX_ACL
1275 posix_acl_release(as_ctx->acl);
1276 posix_acl_release(as_ctx->default_acl);
ac6713cc
YZ
1277#endif
1278#ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1279 security_release_secctx(as_ctx->sec_ctx, as_ctx->sec_ctxlen);
5c31e92d
YZ
1280#endif
1281 if (as_ctx->pagelist)
1282 ceph_pagelist_release(as_ctx->pagelist);
1283}
ac6713cc
YZ
1284
1285/*
1286 * List of handlers for synthetic system.* attributes. Other
1287 * attributes are handled directly.
1288 */
1289const struct xattr_handler *ceph_xattr_handlers[] = {
1290#ifdef CONFIG_CEPH_FS_POSIX_ACL
1291 &posix_acl_access_xattr_handler,
1292 &posix_acl_default_xattr_handler,
ac6713cc
YZ
1293#endif
1294 &ceph_other_xattr_handler,
1295 NULL,
1296};