]> Git Repo - linux.git/blame - fs/ceph/xattr.c
Merge tag 'block-6.13-20241228' of git://git.kernel.dk/linux
[linux.git] / fs / ceph / xattr.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
3d14c5d2 2#include <linux/ceph/ceph_debug.h>
25e6bae3 3#include <linux/ceph/pagelist.h>
3d14c5d2 4
355da1eb 5#include "super.h"
3d14c5d2
YS
6#include "mds_client.h"
7
8#include <linux/ceph/decode.h>
355da1eb
SW
9
10#include <linux/xattr.h>
ac6713cc 11#include <linux/security.h>
4db658ea 12#include <linux/posix_acl_xattr.h>
5a0e3ad6 13#include <linux/slab.h>
355da1eb 14
22891907
AE
15#define XATTR_CEPH_PREFIX "ceph."
16#define XATTR_CEPH_PREFIX_LEN (sizeof (XATTR_CEPH_PREFIX) - 1)
17
bcdfeb2e
YZ
18static int __remove_xattr(struct ceph_inode_info *ci,
19 struct ceph_inode_xattr *xattr);
20
355da1eb
SW
21static bool ceph_is_valid_xattr(const char *name)
22{
b8fe918b
JL
23 return !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) ||
24 !strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN) ||
355da1eb
SW
25 !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) ||
26 !strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN);
27}
28
29/*
30 * These define virtual xattrs exposing the recursive directory
31 * statistics and layout metadata.
32 */
881a5fa2 33struct ceph_vxattr {
355da1eb 34 char *name;
3ce6cd12 35 size_t name_size; /* strlen(name) + 1 (for '\0') */
f1d1b51d
JL
36 ssize_t (*getxattr_cb)(struct ceph_inode_info *ci, char *val,
37 size_t size);
f36e4472 38 bool (*exists_cb)(struct ceph_inode_info *ci);
4e9906e7 39 unsigned int flags;
355da1eb
SW
40};
41
4e9906e7
YZ
42#define VXATTR_FLAG_READONLY (1<<0)
43#define VXATTR_FLAG_HIDDEN (1<<1)
49a9f4f6 44#define VXATTR_FLAG_RSTAT (1<<2)
81048c00 45#define VXATTR_FLAG_DIRSTAT (1<<3)
4e9906e7 46
32ab0bd7
SW
47/* layouts */
48
49static bool ceph_vxattrcb_layout_exists(struct ceph_inode_info *ci)
50{
779fe0fb
YZ
51 struct ceph_file_layout *fl = &ci->i_layout;
52 return (fl->stripe_unit > 0 || fl->stripe_count > 0 ||
53 fl->object_size > 0 || fl->pool_id >= 0 ||
54 rcu_dereference_raw(fl->pool_ns) != NULL);
32ab0bd7
SW
55}
56
f1d1b51d
JL
57static ssize_t ceph_vxattrcb_layout(struct ceph_inode_info *ci, char *val,
58 size_t size)
32ab0bd7 59{
5995d90d 60 struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
38d46409 61 struct ceph_client *cl = fsc->client;
32ab0bd7 62 struct ceph_osd_client *osdc = &fsc->client->osdc;
779fe0fb 63 struct ceph_string *pool_ns;
7627151e 64 s64 pool = ci->i_layout.pool_id;
32ab0bd7 65 const char *pool_name;
779fe0fb 66 const char *ns_field = " pool_namespace=";
1e5c6649 67 char buf[128];
779fe0fb 68 size_t len, total_len = 0;
3b421018 69 ssize_t ret;
779fe0fb
YZ
70
71 pool_ns = ceph_try_get_string(ci->i_layout.pool_ns);
32ab0bd7 72
38d46409 73 doutc(cl, "%p\n", &ci->netfs.inode);
5aea3dcd 74 down_read(&osdc->lock);
32ab0bd7 75 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
1e5c6649 76 if (pool_name) {
779fe0fb 77 len = snprintf(buf, sizeof(buf),
7627151e
YZ
78 "stripe_unit=%u stripe_count=%u object_size=%u pool=",
79 ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
80 ci->i_layout.object_size);
779fe0fb 81 total_len = len + strlen(pool_name);
1e5c6649 82 } else {
779fe0fb 83 len = snprintf(buf, sizeof(buf),
7627151e
YZ
84 "stripe_unit=%u stripe_count=%u object_size=%u pool=%lld",
85 ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
f1d1b51d 86 ci->i_layout.object_size, pool);
779fe0fb
YZ
87 total_len = len;
88 }
89
90 if (pool_ns)
91 total_len += strlen(ns_field) + pool_ns->len;
92
3b421018
JL
93 ret = total_len;
94 if (size >= total_len) {
779fe0fb
YZ
95 memcpy(val, buf, len);
96 ret = len;
97 if (pool_name) {
98 len = strlen(pool_name);
99 memcpy(val + ret, pool_name, len);
100 ret += len;
101 }
102 if (pool_ns) {
103 len = strlen(ns_field);
104 memcpy(val + ret, ns_field, len);
105 ret += len;
106 memcpy(val + ret, pool_ns->str, pool_ns->len);
107 ret += pool_ns->len;
1e5c6649
YZ
108 }
109 }
5aea3dcd 110 up_read(&osdc->lock);
779fe0fb 111 ceph_put_string(pool_ns);
32ab0bd7
SW
112 return ret;
113}
114
26350535
JL
115/*
116 * The convention with strings in xattrs is that they should not be NULL
117 * terminated, since we're returning the length with them. snprintf always
118 * NULL terminates however, so call it on a temporary buffer and then memcpy
119 * the result into place.
120 */
f6fbdcd9
ID
121static __printf(3, 4)
122int ceph_fmt_xattr(char *val, size_t size, const char *fmt, ...)
26350535
JL
123{
124 int ret;
125 va_list args;
126 char buf[96]; /* NB: reevaluate size if new vxattrs are added */
127
128 va_start(args, fmt);
129 ret = vsnprintf(buf, size ? sizeof(buf) : 0, fmt, args);
130 va_end(args);
131
132 /* Sanity check */
133 if (size && ret + 1 > sizeof(buf)) {
134 WARN_ONCE(true, "Returned length too big (%d)", ret);
135 return -E2BIG;
136 }
137
138 if (ret <= size)
139 memcpy(val, buf, ret);
140 return ret;
141}
142
f1d1b51d
JL
143static ssize_t ceph_vxattrcb_layout_stripe_unit(struct ceph_inode_info *ci,
144 char *val, size_t size)
695b7119 145{
26350535 146 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_unit);
695b7119
SW
147}
148
f1d1b51d
JL
149static ssize_t ceph_vxattrcb_layout_stripe_count(struct ceph_inode_info *ci,
150 char *val, size_t size)
695b7119 151{
26350535 152 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_count);
695b7119
SW
153}
154
f1d1b51d
JL
155static ssize_t ceph_vxattrcb_layout_object_size(struct ceph_inode_info *ci,
156 char *val, size_t size)
695b7119 157{
26350535 158 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.object_size);
695b7119
SW
159}
160
f1d1b51d
JL
161static ssize_t ceph_vxattrcb_layout_pool(struct ceph_inode_info *ci,
162 char *val, size_t size)
695b7119 163{
f1d1b51d 164 ssize_t ret;
5995d90d 165 struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
695b7119 166 struct ceph_osd_client *osdc = &fsc->client->osdc;
7627151e 167 s64 pool = ci->i_layout.pool_id;
695b7119
SW
168 const char *pool_name;
169
5aea3dcd 170 down_read(&osdc->lock);
695b7119 171 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
26350535
JL
172 if (pool_name) {
173 ret = strlen(pool_name);
174 if (ret <= size)
175 memcpy(val, pool_name, ret);
176 } else {
177 ret = ceph_fmt_xattr(val, size, "%lld", pool);
178 }
5aea3dcd 179 up_read(&osdc->lock);
695b7119
SW
180 return ret;
181}
182
f1d1b51d
JL
183static ssize_t ceph_vxattrcb_layout_pool_namespace(struct ceph_inode_info *ci,
184 char *val, size_t size)
779fe0fb 185{
26350535 186 ssize_t ret = 0;
779fe0fb 187 struct ceph_string *ns = ceph_try_get_string(ci->i_layout.pool_ns);
26350535 188
779fe0fb 189 if (ns) {
26350535
JL
190 ret = ns->len;
191 if (ret <= size)
192 memcpy(val, ns->str, ret);
779fe0fb
YZ
193 ceph_put_string(ns);
194 }
195 return ret;
196}
197
355da1eb
SW
198/* directories */
199
f1d1b51d
JL
200static ssize_t ceph_vxattrcb_dir_entries(struct ceph_inode_info *ci, char *val,
201 size_t size)
355da1eb 202{
26350535 203 return ceph_fmt_xattr(val, size, "%lld", ci->i_files + ci->i_subdirs);
355da1eb
SW
204}
205
f1d1b51d
JL
206static ssize_t ceph_vxattrcb_dir_files(struct ceph_inode_info *ci, char *val,
207 size_t size)
355da1eb 208{
26350535 209 return ceph_fmt_xattr(val, size, "%lld", ci->i_files);
355da1eb
SW
210}
211
f1d1b51d
JL
212static ssize_t ceph_vxattrcb_dir_subdirs(struct ceph_inode_info *ci, char *val,
213 size_t size)
355da1eb 214{
26350535 215 return ceph_fmt_xattr(val, size, "%lld", ci->i_subdirs);
355da1eb
SW
216}
217
f1d1b51d
JL
218static ssize_t ceph_vxattrcb_dir_rentries(struct ceph_inode_info *ci, char *val,
219 size_t size)
355da1eb 220{
26350535
JL
221 return ceph_fmt_xattr(val, size, "%lld",
222 ci->i_rfiles + ci->i_rsubdirs);
355da1eb
SW
223}
224
f1d1b51d
JL
225static ssize_t ceph_vxattrcb_dir_rfiles(struct ceph_inode_info *ci, char *val,
226 size_t size)
355da1eb 227{
26350535 228 return ceph_fmt_xattr(val, size, "%lld", ci->i_rfiles);
355da1eb
SW
229}
230
f1d1b51d
JL
231static ssize_t ceph_vxattrcb_dir_rsubdirs(struct ceph_inode_info *ci, char *val,
232 size_t size)
355da1eb 233{
26350535 234 return ceph_fmt_xattr(val, size, "%lld", ci->i_rsubdirs);
355da1eb
SW
235}
236
e7f72952
YC
237static ssize_t ceph_vxattrcb_dir_rsnaps(struct ceph_inode_info *ci, char *val,
238 size_t size)
239{
240 return ceph_fmt_xattr(val, size, "%lld", ci->i_rsnaps);
241}
242
f1d1b51d
JL
243static ssize_t ceph_vxattrcb_dir_rbytes(struct ceph_inode_info *ci, char *val,
244 size_t size)
355da1eb 245{
26350535 246 return ceph_fmt_xattr(val, size, "%lld", ci->i_rbytes);
355da1eb
SW
247}
248
f1d1b51d
JL
249static ssize_t ceph_vxattrcb_dir_rctime(struct ceph_inode_info *ci, char *val,
250 size_t size)
355da1eb 251{
26350535
JL
252 return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_rctime.tv_sec,
253 ci->i_rctime.tv_nsec);
355da1eb
SW
254}
255
08796873
YZ
256/* dir pin */
257static bool ceph_vxattrcb_dir_pin_exists(struct ceph_inode_info *ci)
258{
259 return ci->i_dir_pin != -ENODATA;
260}
261
f1d1b51d
JL
262static ssize_t ceph_vxattrcb_dir_pin(struct ceph_inode_info *ci, char *val,
263 size_t size)
08796873 264{
26350535 265 return ceph_fmt_xattr(val, size, "%d", (int)ci->i_dir_pin);
08796873 266}
fb18a575 267
08796873 268/* quotas */
fb18a575
LH
269static bool ceph_vxattrcb_quota_exists(struct ceph_inode_info *ci)
270{
f1919826
YZ
271 bool ret = false;
272 spin_lock(&ci->i_ceph_lock);
273 if ((ci->i_max_files || ci->i_max_bytes) &&
274 ci->i_vino.snap == CEPH_NOSNAP &&
275 ci->i_snap_realm &&
276 ci->i_snap_realm->ino == ci->i_vino.ino)
277 ret = true;
278 spin_unlock(&ci->i_ceph_lock);
279 return ret;
fb18a575
LH
280}
281
f1d1b51d
JL
282static ssize_t ceph_vxattrcb_quota(struct ceph_inode_info *ci, char *val,
283 size_t size)
fb18a575 284{
26350535
JL
285 return ceph_fmt_xattr(val, size, "max_bytes=%llu max_files=%llu",
286 ci->i_max_bytes, ci->i_max_files);
fb18a575
LH
287}
288
f1d1b51d
JL
289static ssize_t ceph_vxattrcb_quota_max_bytes(struct ceph_inode_info *ci,
290 char *val, size_t size)
fb18a575 291{
26350535 292 return ceph_fmt_xattr(val, size, "%llu", ci->i_max_bytes);
fb18a575
LH
293}
294
f1d1b51d
JL
295static ssize_t ceph_vxattrcb_quota_max_files(struct ceph_inode_info *ci,
296 char *val, size_t size)
fb18a575 297{
26350535 298 return ceph_fmt_xattr(val, size, "%llu", ci->i_max_files);
fb18a575 299}
32ab0bd7 300
100cc610
DD
301/* snapshots */
302static bool ceph_vxattrcb_snap_btime_exists(struct ceph_inode_info *ci)
303{
304 return (ci->i_snap_btime.tv_sec != 0 || ci->i_snap_btime.tv_nsec != 0);
305}
306
f1d1b51d
JL
307static ssize_t ceph_vxattrcb_snap_btime(struct ceph_inode_info *ci, char *val,
308 size_t size)
100cc610 309{
26350535
JL
310 return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_snap_btime.tv_sec,
311 ci->i_snap_btime.tv_nsec);
100cc610
DD
312}
313
5a9e2f5d
XL
314static ssize_t ceph_vxattrcb_cluster_fsid(struct ceph_inode_info *ci,
315 char *val, size_t size)
316{
5995d90d 317 struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
5a9e2f5d
XL
318
319 return ceph_fmt_xattr(val, size, "%pU", &fsc->client->fsid);
320}
321
322static ssize_t ceph_vxattrcb_client_id(struct ceph_inode_info *ci,
323 char *val, size_t size)
324{
5995d90d 325 struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
5a9e2f5d
XL
326
327 return ceph_fmt_xattr(val, size, "client%lld",
328 ceph_client_gid(fsc->client));
329}
330
dd980fc0
LH
331static ssize_t ceph_vxattrcb_caps(struct ceph_inode_info *ci, char *val,
332 size_t size)
333{
334 int issued;
335
336 spin_lock(&ci->i_ceph_lock);
337 issued = __ceph_caps_issued(ci, NULL);
338 spin_unlock(&ci->i_ceph_lock);
339
340 return ceph_fmt_xattr(val, size, "%s/0x%x",
341 ceph_cap_string(issued), issued);
342}
343
40e309de
JL
344static ssize_t ceph_vxattrcb_auth_mds(struct ceph_inode_info *ci,
345 char *val, size_t size)
346{
347 int ret;
348
349 spin_lock(&ci->i_ceph_lock);
350 ret = ceph_fmt_xattr(val, size, "%d",
351 ci->i_auth_cap ? ci->i_auth_cap->session->s_mds : -1);
352 spin_unlock(&ci->i_ceph_lock);
353 return ret;
354}
355
f061feda
JL
356#if IS_ENABLED(CONFIG_FS_ENCRYPTION)
357static bool ceph_vxattrcb_fscrypt_auth_exists(struct ceph_inode_info *ci)
358{
359 return ci->fscrypt_auth_len;
360}
361
362static ssize_t ceph_vxattrcb_fscrypt_auth(struct ceph_inode_info *ci,
363 char *val, size_t size)
364{
365 if (size) {
366 if (size < ci->fscrypt_auth_len)
367 return -ERANGE;
368 memcpy(val, ci->fscrypt_auth, ci->fscrypt_auth_len);
369 }
370 return ci->fscrypt_auth_len;
371}
372#endif /* CONFIG_FS_ENCRYPTION */
373
eb788084 374#define CEPH_XATTR_NAME(_type, _name) XATTR_CEPH_PREFIX #_type "." #_name
695b7119
SW
375#define CEPH_XATTR_NAME2(_type, _name, _name2) \
376 XATTR_CEPH_PREFIX #_type "." #_name "." #_name2
eb788084 377
49a9f4f6 378#define XATTR_NAME_CEPH(_type, _name, _flags) \
8860147a
SW
379 { \
380 .name = CEPH_XATTR_NAME(_type, _name), \
381 .name_size = sizeof (CEPH_XATTR_NAME(_type, _name)), \
382 .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \
49a9f4f6
YZ
383 .exists_cb = NULL, \
384 .flags = (VXATTR_FLAG_READONLY | _flags), \
8860147a 385 }
49a9f4f6
YZ
386#define XATTR_RSTAT_FIELD(_type, _name) \
387 XATTR_NAME_CEPH(_type, _name, VXATTR_FLAG_RSTAT)
d7a2dc52
VS
388#define XATTR_RSTAT_FIELD_UPDATABLE(_type, _name) \
389 { \
390 .name = CEPH_XATTR_NAME(_type, _name), \
391 .name_size = sizeof (CEPH_XATTR_NAME(_type, _name)), \
392 .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \
393 .exists_cb = NULL, \
394 .flags = VXATTR_FLAG_RSTAT, \
395 }
695b7119
SW
396#define XATTR_LAYOUT_FIELD(_type, _name, _field) \
397 { \
398 .name = CEPH_XATTR_NAME2(_type, _name, _field), \
399 .name_size = sizeof (CEPH_XATTR_NAME2(_type, _name, _field)), \
400 .getxattr_cb = ceph_vxattrcb_ ## _name ## _ ## _field, \
695b7119 401 .exists_cb = ceph_vxattrcb_layout_exists, \
4e9906e7 402 .flags = VXATTR_FLAG_HIDDEN, \
695b7119 403 }
fb18a575
LH
404#define XATTR_QUOTA_FIELD(_type, _name) \
405 { \
406 .name = CEPH_XATTR_NAME(_type, _name), \
407 .name_size = sizeof(CEPH_XATTR_NAME(_type, _name)), \
408 .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \
fb18a575 409 .exists_cb = ceph_vxattrcb_quota_exists, \
4e9906e7 410 .flags = VXATTR_FLAG_HIDDEN, \
fb18a575 411 }
eb788084 412
881a5fa2 413static struct ceph_vxattr ceph_dir_vxattrs[] = {
1f08f2b0
SW
414 {
415 .name = "ceph.dir.layout",
416 .name_size = sizeof("ceph.dir.layout"),
417 .getxattr_cb = ceph_vxattrcb_layout,
1f08f2b0 418 .exists_cb = ceph_vxattrcb_layout_exists,
4e9906e7 419 .flags = VXATTR_FLAG_HIDDEN,
1f08f2b0 420 },
695b7119
SW
421 XATTR_LAYOUT_FIELD(dir, layout, stripe_unit),
422 XATTR_LAYOUT_FIELD(dir, layout, stripe_count),
423 XATTR_LAYOUT_FIELD(dir, layout, object_size),
424 XATTR_LAYOUT_FIELD(dir, layout, pool),
779fe0fb 425 XATTR_LAYOUT_FIELD(dir, layout, pool_namespace),
81048c00
JL
426 XATTR_NAME_CEPH(dir, entries, VXATTR_FLAG_DIRSTAT),
427 XATTR_NAME_CEPH(dir, files, VXATTR_FLAG_DIRSTAT),
428 XATTR_NAME_CEPH(dir, subdirs, VXATTR_FLAG_DIRSTAT),
49a9f4f6
YZ
429 XATTR_RSTAT_FIELD(dir, rentries),
430 XATTR_RSTAT_FIELD(dir, rfiles),
431 XATTR_RSTAT_FIELD(dir, rsubdirs),
e7f72952 432 XATTR_RSTAT_FIELD(dir, rsnaps),
49a9f4f6 433 XATTR_RSTAT_FIELD(dir, rbytes),
d7a2dc52 434 XATTR_RSTAT_FIELD_UPDATABLE(dir, rctime),
08796873
YZ
435 {
436 .name = "ceph.dir.pin",
e1b81439 437 .name_size = sizeof("ceph.dir.pin"),
08796873
YZ
438 .getxattr_cb = ceph_vxattrcb_dir_pin,
439 .exists_cb = ceph_vxattrcb_dir_pin_exists,
440 .flags = VXATTR_FLAG_HIDDEN,
441 },
fb18a575
LH
442 {
443 .name = "ceph.quota",
444 .name_size = sizeof("ceph.quota"),
445 .getxattr_cb = ceph_vxattrcb_quota,
fb18a575 446 .exists_cb = ceph_vxattrcb_quota_exists,
4e9906e7 447 .flags = VXATTR_FLAG_HIDDEN,
fb18a575
LH
448 },
449 XATTR_QUOTA_FIELD(quota, max_bytes),
450 XATTR_QUOTA_FIELD(quota, max_files),
100cc610
DD
451 {
452 .name = "ceph.snap.btime",
453 .name_size = sizeof("ceph.snap.btime"),
454 .getxattr_cb = ceph_vxattrcb_snap_btime,
455 .exists_cb = ceph_vxattrcb_snap_btime_exists,
456 .flags = VXATTR_FLAG_READONLY,
457 },
dd980fc0
LH
458 {
459 .name = "ceph.caps",
460 .name_size = sizeof("ceph.caps"),
461 .getxattr_cb = ceph_vxattrcb_caps,
462 .exists_cb = NULL,
463 .flags = VXATTR_FLAG_HIDDEN,
464 },
2c3dd4ff 465 { .name = NULL, 0 } /* Required table terminator */
355da1eb
SW
466};
467
468/* files */
469
881a5fa2 470static struct ceph_vxattr ceph_file_vxattrs[] = {
32ab0bd7
SW
471 {
472 .name = "ceph.file.layout",
473 .name_size = sizeof("ceph.file.layout"),
474 .getxattr_cb = ceph_vxattrcb_layout,
32ab0bd7 475 .exists_cb = ceph_vxattrcb_layout_exists,
4e9906e7 476 .flags = VXATTR_FLAG_HIDDEN,
32ab0bd7 477 },
695b7119
SW
478 XATTR_LAYOUT_FIELD(file, layout, stripe_unit),
479 XATTR_LAYOUT_FIELD(file, layout, stripe_count),
480 XATTR_LAYOUT_FIELD(file, layout, object_size),
481 XATTR_LAYOUT_FIELD(file, layout, pool),
779fe0fb 482 XATTR_LAYOUT_FIELD(file, layout, pool_namespace),
100cc610
DD
483 {
484 .name = "ceph.snap.btime",
485 .name_size = sizeof("ceph.snap.btime"),
486 .getxattr_cb = ceph_vxattrcb_snap_btime,
487 .exists_cb = ceph_vxattrcb_snap_btime_exists,
488 .flags = VXATTR_FLAG_READONLY,
489 },
dd980fc0
LH
490 {
491 .name = "ceph.caps",
492 .name_size = sizeof("ceph.caps"),
493 .getxattr_cb = ceph_vxattrcb_caps,
494 .exists_cb = NULL,
495 .flags = VXATTR_FLAG_HIDDEN,
496 },
2c3dd4ff 497 { .name = NULL, 0 } /* Required table terminator */
355da1eb
SW
498};
499
5a9e2f5d
XL
500static struct ceph_vxattr ceph_common_vxattrs[] = {
501 {
502 .name = "ceph.cluster_fsid",
503 .name_size = sizeof("ceph.cluster_fsid"),
504 .getxattr_cb = ceph_vxattrcb_cluster_fsid,
505 .exists_cb = NULL,
506 .flags = VXATTR_FLAG_READONLY,
507 },
508 {
509 .name = "ceph.client_id",
510 .name_size = sizeof("ceph.client_id"),
511 .getxattr_cb = ceph_vxattrcb_client_id,
512 .exists_cb = NULL,
513 .flags = VXATTR_FLAG_READONLY,
514 },
40e309de
JL
515 {
516 .name = "ceph.auth_mds",
517 .name_size = sizeof("ceph.auth_mds"),
518 .getxattr_cb = ceph_vxattrcb_auth_mds,
519 .exists_cb = NULL,
520 .flags = VXATTR_FLAG_READONLY,
521 },
f061feda
JL
522#if IS_ENABLED(CONFIG_FS_ENCRYPTION)
523 {
524 .name = "ceph.fscrypt.auth",
525 .name_size = sizeof("ceph.fscrypt.auth"),
526 .getxattr_cb = ceph_vxattrcb_fscrypt_auth,
527 .exists_cb = ceph_vxattrcb_fscrypt_auth_exists,
528 .flags = VXATTR_FLAG_READONLY,
529 },
530#endif /* CONFIG_FS_ENCRYPTION */
5a9e2f5d
XL
531 { .name = NULL, 0 } /* Required table terminator */
532};
533
881a5fa2 534static struct ceph_vxattr *ceph_inode_vxattrs(struct inode *inode)
355da1eb
SW
535{
536 if (S_ISDIR(inode->i_mode))
537 return ceph_dir_vxattrs;
538 else if (S_ISREG(inode->i_mode))
539 return ceph_file_vxattrs;
540 return NULL;
541}
542
881a5fa2 543static struct ceph_vxattr *ceph_match_vxattr(struct inode *inode,
355da1eb
SW
544 const char *name)
545{
881a5fa2 546 struct ceph_vxattr *vxattr = ceph_inode_vxattrs(inode);
06476a69
AE
547
548 if (vxattr) {
549 while (vxattr->name) {
550 if (!strcmp(vxattr->name, name))
551 return vxattr;
552 vxattr++;
553 }
554 }
5a9e2f5d
XL
555
556 vxattr = ceph_common_vxattrs;
557 while (vxattr->name) {
558 if (!strcmp(vxattr->name, name))
559 return vxattr;
560 vxattr++;
561 }
06476a69 562
355da1eb
SW
563 return NULL;
564}
565
7a6c3a03
XL
566#define MAX_XATTR_VAL_PRINT_LEN 256
567
355da1eb
SW
568static int __set_xattr(struct ceph_inode_info *ci,
569 const char *name, int name_len,
570 const char *val, int val_len,
fbc0b970 571 int flags, int update_xattr,
355da1eb
SW
572 struct ceph_inode_xattr **newxattr)
573{
38d46409
XL
574 struct inode *inode = &ci->netfs.inode;
575 struct ceph_client *cl = ceph_inode_to_client(inode);
355da1eb
SW
576 struct rb_node **p;
577 struct rb_node *parent = NULL;
578 struct ceph_inode_xattr *xattr = NULL;
579 int c;
580 int new = 0;
581
582 p = &ci->i_xattrs.index.rb_node;
583 while (*p) {
584 parent = *p;
585 xattr = rb_entry(parent, struct ceph_inode_xattr, node);
586 c = strncmp(name, xattr->name, min(name_len, xattr->name_len));
587 if (c < 0)
588 p = &(*p)->rb_left;
589 else if (c > 0)
590 p = &(*p)->rb_right;
591 else {
592 if (name_len == xattr->name_len)
593 break;
594 else if (name_len < xattr->name_len)
595 p = &(*p)->rb_left;
596 else
597 p = &(*p)->rb_right;
598 }
599 xattr = NULL;
600 }
601
fbc0b970
YZ
602 if (update_xattr) {
603 int err = 0;
eeca958d 604
fbc0b970
YZ
605 if (xattr && (flags & XATTR_CREATE))
606 err = -EEXIST;
607 else if (!xattr && (flags & XATTR_REPLACE))
608 err = -ENODATA;
609 if (err) {
610 kfree(name);
611 kfree(val);
eeca958d 612 kfree(*newxattr);
fbc0b970
YZ
613 return err;
614 }
bcdfeb2e
YZ
615 if (update_xattr < 0) {
616 if (xattr)
617 __remove_xattr(ci, xattr);
618 kfree(name);
eeca958d 619 kfree(*newxattr);
bcdfeb2e
YZ
620 return 0;
621 }
fbc0b970
YZ
622 }
623
355da1eb
SW
624 if (!xattr) {
625 new = 1;
626 xattr = *newxattr;
627 xattr->name = name;
628 xattr->name_len = name_len;
fbc0b970 629 xattr->should_free_name = update_xattr;
355da1eb
SW
630
631 ci->i_xattrs.count++;
38d46409 632 doutc(cl, "count=%d\n", ci->i_xattrs.count);
355da1eb
SW
633 } else {
634 kfree(*newxattr);
635 *newxattr = NULL;
636 if (xattr->should_free_val)
c00e4522 637 kfree(xattr->val);
355da1eb 638
fbc0b970 639 if (update_xattr) {
c00e4522 640 kfree(name);
355da1eb
SW
641 name = xattr->name;
642 }
643 ci->i_xattrs.names_size -= xattr->name_len;
644 ci->i_xattrs.vals_size -= xattr->val_len;
645 }
355da1eb
SW
646 ci->i_xattrs.names_size += name_len;
647 ci->i_xattrs.vals_size += val_len;
648 if (val)
649 xattr->val = val;
650 else
651 xattr->val = "";
652
653 xattr->val_len = val_len;
fbc0b970
YZ
654 xattr->dirty = update_xattr;
655 xattr->should_free_val = (val && update_xattr);
355da1eb
SW
656
657 if (new) {
658 rb_link_node(&xattr->node, parent, p);
659 rb_insert_color(&xattr->node, &ci->i_xattrs.index);
38d46409 660 doutc(cl, "p=%p\n", p);
355da1eb
SW
661 }
662
38d46409
XL
663 doutc(cl, "added %p %llx.%llx xattr %p %.*s=%.*s%s\n", inode,
664 ceph_vinop(inode), xattr, name_len, name, min(val_len,
665 MAX_XATTR_VAL_PRINT_LEN), val,
666 val_len > MAX_XATTR_VAL_PRINT_LEN ? "..." : "");
355da1eb
SW
667
668 return 0;
669}
670
671static struct ceph_inode_xattr *__get_xattr(struct ceph_inode_info *ci,
672 const char *name)
673{
38d46409 674 struct ceph_client *cl = ceph_inode_to_client(&ci->netfs.inode);
355da1eb
SW
675 struct rb_node **p;
676 struct rb_node *parent = NULL;
677 struct ceph_inode_xattr *xattr = NULL;
17db143f 678 int name_len = strlen(name);
355da1eb
SW
679 int c;
680
681 p = &ci->i_xattrs.index.rb_node;
682 while (*p) {
683 parent = *p;
684 xattr = rb_entry(parent, struct ceph_inode_xattr, node);
685 c = strncmp(name, xattr->name, xattr->name_len);
17db143f
SW
686 if (c == 0 && name_len > xattr->name_len)
687 c = 1;
355da1eb
SW
688 if (c < 0)
689 p = &(*p)->rb_left;
690 else if (c > 0)
691 p = &(*p)->rb_right;
692 else {
7a6c3a03
XL
693 int len = min(xattr->val_len, MAX_XATTR_VAL_PRINT_LEN);
694
38d46409
XL
695 doutc(cl, "%s found %.*s%s\n", name, len, xattr->val,
696 xattr->val_len > len ? "..." : "");
355da1eb
SW
697 return xattr;
698 }
699 }
700
38d46409 701 doutc(cl, "%s not found\n", name);
355da1eb
SW
702
703 return NULL;
704}
705
706static void __free_xattr(struct ceph_inode_xattr *xattr)
707{
708 BUG_ON(!xattr);
709
710 if (xattr->should_free_name)
c00e4522 711 kfree(xattr->name);
355da1eb 712 if (xattr->should_free_val)
c00e4522 713 kfree(xattr->val);
355da1eb
SW
714
715 kfree(xattr);
716}
717
718static int __remove_xattr(struct ceph_inode_info *ci,
719 struct ceph_inode_xattr *xattr)
720{
721 if (!xattr)
524186ac 722 return -ENODATA;
355da1eb
SW
723
724 rb_erase(&xattr->node, &ci->i_xattrs.index);
725
726 if (xattr->should_free_name)
c00e4522 727 kfree(xattr->name);
355da1eb 728 if (xattr->should_free_val)
c00e4522 729 kfree(xattr->val);
355da1eb
SW
730
731 ci->i_xattrs.names_size -= xattr->name_len;
732 ci->i_xattrs.vals_size -= xattr->val_len;
733 ci->i_xattrs.count--;
734 kfree(xattr);
735
736 return 0;
737}
738
355da1eb
SW
739static char *__copy_xattr_names(struct ceph_inode_info *ci,
740 char *dest)
741{
38d46409 742 struct ceph_client *cl = ceph_inode_to_client(&ci->netfs.inode);
355da1eb
SW
743 struct rb_node *p;
744 struct ceph_inode_xattr *xattr = NULL;
745
746 p = rb_first(&ci->i_xattrs.index);
38d46409 747 doutc(cl, "count=%d\n", ci->i_xattrs.count);
355da1eb
SW
748
749 while (p) {
750 xattr = rb_entry(p, struct ceph_inode_xattr, node);
751 memcpy(dest, xattr->name, xattr->name_len);
752 dest[xattr->name_len] = '\0';
753
38d46409
XL
754 doutc(cl, "dest=%s %p (%s) (%d/%d)\n", dest, xattr, xattr->name,
755 xattr->name_len, ci->i_xattrs.names_size);
355da1eb
SW
756
757 dest += xattr->name_len + 1;
758 p = rb_next(p);
759 }
760
761 return dest;
762}
763
764void __ceph_destroy_xattrs(struct ceph_inode_info *ci)
765{
38d46409 766 struct ceph_client *cl = ceph_inode_to_client(&ci->netfs.inode);
355da1eb
SW
767 struct rb_node *p, *tmp;
768 struct ceph_inode_xattr *xattr = NULL;
769
770 p = rb_first(&ci->i_xattrs.index);
771
38d46409 772 doutc(cl, "p=%p\n", p);
355da1eb
SW
773
774 while (p) {
775 xattr = rb_entry(p, struct ceph_inode_xattr, node);
776 tmp = p;
777 p = rb_next(tmp);
38d46409 778 doutc(cl, "next p=%p (%.*s)\n", p, xattr->name_len, xattr->name);
355da1eb
SW
779 rb_erase(tmp, &ci->i_xattrs.index);
780
781 __free_xattr(xattr);
782 }
783
784 ci->i_xattrs.names_size = 0;
785 ci->i_xattrs.vals_size = 0;
786 ci->i_xattrs.index_version = 0;
787 ci->i_xattrs.count = 0;
788 ci->i_xattrs.index = RB_ROOT;
789}
790
791static int __build_xattrs(struct inode *inode)
be655596
SW
792 __releases(ci->i_ceph_lock)
793 __acquires(ci->i_ceph_lock)
355da1eb 794{
38d46409 795 struct ceph_client *cl = ceph_inode_to_client(inode);
355da1eb
SW
796 u32 namelen;
797 u32 numattr = 0;
798 void *p, *end;
799 u32 len;
800 const char *name, *val;
801 struct ceph_inode_info *ci = ceph_inode(inode);
0eb30853 802 u64 xattr_version;
355da1eb 803 struct ceph_inode_xattr **xattrs = NULL;
63ff78b2 804 int err = 0;
355da1eb
SW
805 int i;
806
38d46409
XL
807 doutc(cl, "len=%d\n",
808 ci->i_xattrs.blob ? (int)ci->i_xattrs.blob->vec.iov_len : 0);
355da1eb
SW
809
810 if (ci->i_xattrs.index_version >= ci->i_xattrs.version)
811 return 0; /* already built */
812
813 __ceph_destroy_xattrs(ci);
814
815start:
816 /* updated internal xattr rb tree */
817 if (ci->i_xattrs.blob && ci->i_xattrs.blob->vec.iov_len > 4) {
818 p = ci->i_xattrs.blob->vec.iov_base;
819 end = p + ci->i_xattrs.blob->vec.iov_len;
820 ceph_decode_32_safe(&p, end, numattr, bad);
821 xattr_version = ci->i_xattrs.version;
be655596 822 spin_unlock(&ci->i_ceph_lock);
355da1eb 823
7e8a2952 824 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *),
355da1eb
SW
825 GFP_NOFS);
826 err = -ENOMEM;
827 if (!xattrs)
828 goto bad_lock;
1a295bd8 829
355da1eb
SW
830 for (i = 0; i < numattr; i++) {
831 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr),
832 GFP_NOFS);
833 if (!xattrs[i])
834 goto bad_lock;
835 }
836
be655596 837 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
838 if (ci->i_xattrs.version != xattr_version) {
839 /* lost a race, retry */
840 for (i = 0; i < numattr; i++)
841 kfree(xattrs[i]);
842 kfree(xattrs);
21ec6ffa 843 xattrs = NULL;
355da1eb
SW
844 goto start;
845 }
846 err = -EIO;
847 while (numattr--) {
848 ceph_decode_32_safe(&p, end, len, bad);
849 namelen = len;
850 name = p;
851 p += len;
852 ceph_decode_32_safe(&p, end, len, bad);
853 val = p;
854 p += len;
855
856 err = __set_xattr(ci, name, namelen, val, len,
fbc0b970 857 0, 0, &xattrs[numattr]);
355da1eb
SW
858
859 if (err < 0)
860 goto bad;
861 }
862 kfree(xattrs);
863 }
864 ci->i_xattrs.index_version = ci->i_xattrs.version;
865 ci->i_xattrs.dirty = false;
866
867 return err;
868bad_lock:
be655596 869 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
870bad:
871 if (xattrs) {
872 for (i = 0; i < numattr; i++)
873 kfree(xattrs[i]);
874 kfree(xattrs);
875 }
876 ci->i_xattrs.names_size = 0;
877 return err;
878}
879
880static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size,
881 int val_size)
882{
38d46409
XL
883 struct ceph_client *cl = ceph_inode_to_client(&ci->netfs.inode);
884
355da1eb
SW
885 /*
886 * 4 bytes for the length, and additional 4 bytes per each xattr name,
887 * 4 bytes per each value
888 */
889 int size = 4 + ci->i_xattrs.count*(4 + 4) +
890 ci->i_xattrs.names_size +
891 ci->i_xattrs.vals_size;
38d46409
XL
892 doutc(cl, "c=%d names.size=%d vals.size=%d\n", ci->i_xattrs.count,
893 ci->i_xattrs.names_size, ci->i_xattrs.vals_size);
355da1eb
SW
894
895 if (name_size)
896 size += 4 + 4 + name_size + val_size;
897
898 return size;
899}
900
901/*
3500000b 902 * If there are dirty xattrs, re-encode xattrs into the prealloc_blob
12fe3dda
LH
903 * and swap into place. It returns the old i_xattrs.blob (or NULL) so
904 * that it can be freed by the caller as the i_ceph_lock is likely to be
905 * held.
355da1eb 906 */
12fe3dda 907struct ceph_buffer *__ceph_build_xattrs_blob(struct ceph_inode_info *ci)
355da1eb 908{
38d46409
XL
909 struct inode *inode = &ci->netfs.inode;
910 struct ceph_client *cl = ceph_inode_to_client(inode);
355da1eb
SW
911 struct rb_node *p;
912 struct ceph_inode_xattr *xattr = NULL;
12fe3dda 913 struct ceph_buffer *old_blob = NULL;
355da1eb
SW
914 void *dest;
915
38d46409 916 doutc(cl, "%p %llx.%llx\n", inode, ceph_vinop(inode));
355da1eb
SW
917 if (ci->i_xattrs.dirty) {
918 int need = __get_required_blob_size(ci, 0, 0);
919
920 BUG_ON(need > ci->i_xattrs.prealloc_blob->alloc_len);
921
922 p = rb_first(&ci->i_xattrs.index);
923 dest = ci->i_xattrs.prealloc_blob->vec.iov_base;
924
925 ceph_encode_32(&dest, ci->i_xattrs.count);
926 while (p) {
927 xattr = rb_entry(p, struct ceph_inode_xattr, node);
928
929 ceph_encode_32(&dest, xattr->name_len);
930 memcpy(dest, xattr->name, xattr->name_len);
931 dest += xattr->name_len;
932 ceph_encode_32(&dest, xattr->val_len);
933 memcpy(dest, xattr->val, xattr->val_len);
934 dest += xattr->val_len;
935
936 p = rb_next(p);
937 }
938
939 /* adjust buffer len; it may be larger than we need */
940 ci->i_xattrs.prealloc_blob->vec.iov_len =
941 dest - ci->i_xattrs.prealloc_blob->vec.iov_base;
942
b6c1d5b8 943 if (ci->i_xattrs.blob)
12fe3dda 944 old_blob = ci->i_xattrs.blob;
355da1eb
SW
945 ci->i_xattrs.blob = ci->i_xattrs.prealloc_blob;
946 ci->i_xattrs.prealloc_blob = NULL;
947 ci->i_xattrs.dirty = false;
4a625be4 948 ci->i_xattrs.version++;
355da1eb 949 }
12fe3dda
LH
950
951 return old_blob;
355da1eb
SW
952}
953
315f2408
YZ
954static inline int __get_request_mask(struct inode *in) {
955 struct ceph_mds_request *req = current->journal_info;
956 int mask = 0;
957 if (req && req->r_target_inode == in) {
958 if (req->r_op == CEPH_MDS_OP_LOOKUP ||
959 req->r_op == CEPH_MDS_OP_LOOKUPINO ||
960 req->r_op == CEPH_MDS_OP_LOOKUPPARENT ||
961 req->r_op == CEPH_MDS_OP_GETATTR) {
962 mask = le32_to_cpu(req->r_args.getattr.mask);
963 } else if (req->r_op == CEPH_MDS_OP_OPEN ||
964 req->r_op == CEPH_MDS_OP_CREATE) {
965 mask = le32_to_cpu(req->r_args.open.mask);
966 }
967 }
968 return mask;
969}
970
7221fe4c 971ssize_t __ceph_getxattr(struct inode *inode, const char *name, void *value,
355da1eb
SW
972 size_t size)
973{
38d46409 974 struct ceph_client *cl = ceph_inode_to_client(inode);
355da1eb 975 struct ceph_inode_info *ci = ceph_inode(inode);
355da1eb 976 struct ceph_inode_xattr *xattr;
6ddf5f16 977 struct ceph_vxattr *vxattr;
315f2408 978 int req_mask;
f1d1b51d 979 ssize_t err;
355da1eb 980
6ddf5f16
MC
981 if (strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN))
982 goto handle_non_vxattrs;
983
0bee82fb
SW
984 /* let's see if a virtual xattr was requested */
985 vxattr = ceph_match_vxattr(inode, name);
29dccfa5 986 if (vxattr) {
49a9f4f6
YZ
987 int mask = 0;
988 if (vxattr->flags & VXATTR_FLAG_RSTAT)
989 mask |= CEPH_STAT_RSTAT;
81048c00
JL
990 if (vxattr->flags & VXATTR_FLAG_DIRSTAT)
991 mask |= CEPH_CAP_FILE_SHARED;
49a9f4f6 992 err = ceph_do_getattr(inode, mask, true);
1684dd03
YZ
993 if (err)
994 return err;
29dccfa5 995 err = -ENODATA;
3b421018 996 if (!(vxattr->exists_cb && !vxattr->exists_cb(ci))) {
29dccfa5 997 err = vxattr->getxattr_cb(ci, value, size);
3b421018
JL
998 if (size && size < err)
999 err = -ERANGE;
1000 }
a1dc1937 1001 return err;
6ddf5f16
MC
1002 } else {
1003 err = ceph_do_getvxattr(inode, name, value, size);
1004 /* this would happen with a new client and old server combo */
1005 if (err == -EOPNOTSUPP)
1006 err = -ENODATA;
1007 return err;
0bee82fb 1008 }
6ddf5f16 1009handle_non_vxattrs:
315f2408
YZ
1010 req_mask = __get_request_mask(inode);
1011
a1dc1937 1012 spin_lock(&ci->i_ceph_lock);
38d46409
XL
1013 doutc(cl, "%p %llx.%llx name '%s' ver=%lld index_ver=%lld\n", inode,
1014 ceph_vinop(inode), name, ci->i_xattrs.version,
1015 ci->i_xattrs.index_version);
a1dc1937 1016
508b32d8 1017 if (ci->i_xattrs.version == 0 ||
315f2408 1018 !((req_mask & CEPH_CAP_XATTR_SHARED) ||
1af16d54 1019 __ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1))) {
be655596 1020 spin_unlock(&ci->i_ceph_lock);
315f2408
YZ
1021
1022 /* security module gets xattr while filling trace */
d37b1d99 1023 if (current->journal_info) {
38d46409
XL
1024 pr_warn_ratelimited_client(cl,
1025 "sync %p %llx.%llx during filling trace\n",
1026 inode, ceph_vinop(inode));
315f2408
YZ
1027 return -EBUSY;
1028 }
1029
355da1eb 1030 /* get xattrs from mds (if we don't already have them) */
508b32d8 1031 err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
355da1eb
SW
1032 if (err)
1033 return err;
508b32d8 1034 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
1035 }
1036
355da1eb
SW
1037 err = __build_xattrs(inode);
1038 if (err < 0)
1039 goto out;
1040
355da1eb
SW
1041 err = -ENODATA; /* == ENOATTR */
1042 xattr = __get_xattr(ci, name);
0bee82fb 1043 if (!xattr)
355da1eb 1044 goto out;
355da1eb
SW
1045
1046 err = -ERANGE;
1047 if (size && size < xattr->val_len)
1048 goto out;
1049
1050 err = xattr->val_len;
1051 if (size == 0)
1052 goto out;
1053
1054 memcpy(value, xattr->val, xattr->val_len);
1055
d37b1d99 1056 if (current->journal_info &&
026105eb
JL
1057 !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) &&
1058 security_ismaclabel(name + XATTR_SECURITY_PREFIX_LEN))
315f2408 1059 ci->i_ceph_flags |= CEPH_I_SEC_INITED;
355da1eb 1060out:
be655596 1061 spin_unlock(&ci->i_ceph_lock);
355da1eb
SW
1062 return err;
1063}
1064
1065ssize_t ceph_listxattr(struct dentry *dentry, char *names, size_t size)
1066{
2b0143b5 1067 struct inode *inode = d_inode(dentry);
38d46409 1068 struct ceph_client *cl = ceph_inode_to_client(inode);
355da1eb 1069 struct ceph_inode_info *ci = ceph_inode(inode);
2b2abcac 1070 bool len_only = (size == 0);
355da1eb
SW
1071 u32 namelen;
1072 int err;
355da1eb 1073
be655596 1074 spin_lock(&ci->i_ceph_lock);
38d46409
XL
1075 doutc(cl, "%p %llx.%llx ver=%lld index_ver=%lld\n", inode,
1076 ceph_vinop(inode), ci->i_xattrs.version,
1077 ci->i_xattrs.index_version);
355da1eb 1078
508b32d8 1079 if (ci->i_xattrs.version == 0 ||
1af16d54 1080 !__ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1)) {
be655596 1081 spin_unlock(&ci->i_ceph_lock);
508b32d8 1082 err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
355da1eb
SW
1083 if (err)
1084 return err;
508b32d8 1085 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
1086 }
1087
355da1eb
SW
1088 err = __build_xattrs(inode);
1089 if (err < 0)
1090 goto out;
3ce6cd12 1091
2b2abcac 1092 /* add 1 byte for each xattr due to the null termination */
b65917dd 1093 namelen = ci->i_xattrs.names_size + ci->i_xattrs.count;
2b2abcac
DD
1094 if (!len_only) {
1095 if (namelen > size) {
1096 err = -ERANGE;
1097 goto out;
1098 }
1099 names = __copy_xattr_names(ci, names);
1100 size -= namelen;
1101 }
2b2abcac 1102 err = namelen;
355da1eb 1103out:
be655596 1104 spin_unlock(&ci->i_ceph_lock);
355da1eb
SW
1105 return err;
1106}
1107
a26fecca 1108static int ceph_sync_setxattr(struct inode *inode, const char *name,
355da1eb
SW
1109 const char *value, size_t size, int flags)
1110{
5995d90d 1111 struct ceph_fs_client *fsc = ceph_sb_to_fs_client(inode->i_sb);
38d46409 1112 struct ceph_client *cl = ceph_inode_to_client(inode);
355da1eb 1113 struct ceph_inode_info *ci = ceph_inode(inode);
355da1eb 1114 struct ceph_mds_request *req;
3d14c5d2 1115 struct ceph_mds_client *mdsc = fsc->mdsc;
968cd14e 1116 struct ceph_osd_client *osdc = &fsc->client->osdc;
25e6bae3 1117 struct ceph_pagelist *pagelist = NULL;
04303d8a 1118 int op = CEPH_MDS_OP_SETXATTR;
355da1eb 1119 int err;
25e6bae3 1120
0aeff37a 1121 if (size > 0) {
25e6bae3 1122 /* copy value into pagelist */
33165d47 1123 pagelist = ceph_pagelist_alloc(GFP_NOFS);
25e6bae3 1124 if (!pagelist)
355da1eb 1125 return -ENOMEM;
25e6bae3 1126
25e6bae3
YZ
1127 err = ceph_pagelist_append(pagelist, value, size);
1128 if (err)
1129 goto out;
0aeff37a 1130 } else if (!value) {
04303d8a
YZ
1131 if (flags & CEPH_XATTR_REPLACE)
1132 op = CEPH_MDS_OP_RMXATTR;
1133 else
1134 flags |= CEPH_XATTR_REMOVE;
355da1eb
SW
1135 }
1136
38d46409 1137 doutc(cl, "name %s value size %zu\n", name, size);
355da1eb
SW
1138
1139 /* do request */
04303d8a 1140 req = ceph_mdsc_create_request(mdsc, op, USE_AUTH_MDS);
60d87733
JL
1141 if (IS_ERR(req)) {
1142 err = PTR_ERR(req);
1143 goto out;
1144 }
a149bb9a 1145
355da1eb 1146 req->r_path2 = kstrdup(name, GFP_NOFS);
a149bb9a
SK
1147 if (!req->r_path2) {
1148 ceph_mdsc_put_request(req);
1149 err = -ENOMEM;
1150 goto out;
1151 }
355da1eb 1152
04303d8a
YZ
1153 if (op == CEPH_MDS_OP_SETXATTR) {
1154 req->r_args.setxattr.flags = cpu_to_le32(flags);
968cd14e
XL
1155 req->r_args.setxattr.osdmap_epoch =
1156 cpu_to_le32(osdc->osdmap->epoch);
04303d8a
YZ
1157 req->r_pagelist = pagelist;
1158 pagelist = NULL;
1159 }
355da1eb 1160
a149bb9a
SK
1161 req->r_inode = inode;
1162 ihold(inode);
1163 req->r_num_caps = 1;
1164 req->r_inode_drop = CEPH_CAP_XATTR_SHARED;
1165
38d46409 1166 doutc(cl, "xattr.ver (before): %lld\n", ci->i_xattrs.version);
752c8bdc 1167 err = ceph_mdsc_do_request(mdsc, NULL, req);
355da1eb 1168 ceph_mdsc_put_request(req);
38d46409 1169 doutc(cl, "xattr.ver (after): %lld\n", ci->i_xattrs.version);
355da1eb
SW
1170
1171out:
25e6bae3
YZ
1172 if (pagelist)
1173 ceph_pagelist_release(pagelist);
355da1eb
SW
1174 return err;
1175}
1176
a26fecca 1177int __ceph_setxattr(struct inode *inode, const char *name,
7221fe4c 1178 const void *value, size_t size, int flags)
355da1eb 1179{
38d46409 1180 struct ceph_client *cl = ceph_inode_to_client(inode);
881a5fa2 1181 struct ceph_vxattr *vxattr;
355da1eb 1182 struct ceph_inode_info *ci = ceph_inode(inode);
5995d90d 1183 struct ceph_mds_client *mdsc = ceph_sb_to_fs_client(inode->i_sb)->mdsc;
f66fd9f0 1184 struct ceph_cap_flush *prealloc_cf = NULL;
86968ef2 1185 struct ceph_buffer *old_blob = NULL;
18fa8b3f 1186 int issued;
355da1eb 1187 int err;
fbc0b970 1188 int dirty = 0;
355da1eb
SW
1189 int name_len = strlen(name);
1190 int val_len = size;
1191 char *newname = NULL;
1192 char *newval = NULL;
1193 struct ceph_inode_xattr *xattr = NULL;
355da1eb 1194 int required_blob_size;
f1919826 1195 bool check_realm = false;
604d1b02 1196 bool lock_snap_rwsem = false;
355da1eb 1197
2cdeb1e4
AG
1198 if (ceph_snap(inode) != CEPH_NOSNAP)
1199 return -EROFS;
355da1eb 1200
06476a69 1201 vxattr = ceph_match_vxattr(inode, name);
f1919826 1202 if (vxattr) {
4e9906e7 1203 if (vxattr->flags & VXATTR_FLAG_READONLY)
f1919826
YZ
1204 return -EOPNOTSUPP;
1205 if (value && !strncmp(vxattr->name, "ceph.quota", 10))
1206 check_realm = true;
1207 }
355da1eb 1208
3adf654d
SW
1209 /* pass any unhandled ceph.* xattrs through to the MDS */
1210 if (!strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN))
1211 goto do_sync_unlocked;
1212
355da1eb
SW
1213 /* preallocate memory for xattr name, value, index node */
1214 err = -ENOMEM;
61413c2f 1215 newname = kmemdup(name, name_len + 1, GFP_NOFS);
355da1eb
SW
1216 if (!newname)
1217 goto out;
355da1eb
SW
1218
1219 if (val_len) {
b829c195 1220 newval = kmemdup(value, val_len, GFP_NOFS);
355da1eb
SW
1221 if (!newval)
1222 goto out;
355da1eb
SW
1223 }
1224
1225 xattr = kmalloc(sizeof(struct ceph_inode_xattr), GFP_NOFS);
1226 if (!xattr)
1227 goto out;
1228
f66fd9f0
YZ
1229 prealloc_cf = ceph_alloc_cap_flush();
1230 if (!prealloc_cf)
1231 goto out;
1232
be655596 1233 spin_lock(&ci->i_ceph_lock);
355da1eb
SW
1234retry:
1235 issued = __ceph_caps_issued(ci, NULL);
d93231a6
LH
1236 required_blob_size = __get_required_blob_size(ci, name_len, val_len);
1237 if ((ci->i_xattrs.version == 0) || !(issued & CEPH_CAP_XATTR_EXCL) ||
1238 (required_blob_size > mdsc->mdsmap->m_max_xattr_size)) {
38d46409
XL
1239 doutc(cl, "sync version: %llu size: %d max: %llu\n",
1240 ci->i_xattrs.version, required_blob_size,
1241 mdsc->mdsmap->m_max_xattr_size);
355da1eb 1242 goto do_sync;
d93231a6 1243 }
604d1b02
YZ
1244
1245 if (!lock_snap_rwsem && !ci->i_head_snapc) {
1246 lock_snap_rwsem = true;
1247 if (!down_read_trylock(&mdsc->snap_rwsem)) {
1248 spin_unlock(&ci->i_ceph_lock);
1249 down_read(&mdsc->snap_rwsem);
1250 spin_lock(&ci->i_ceph_lock);
1251 goto retry;
1252 }
1253 }
1254
38d46409
XL
1255 doutc(cl, "%p %llx.%llx name '%s' issued %s\n", inode,
1256 ceph_vinop(inode), name, ceph_cap_string(issued));
355da1eb
SW
1257 __build_xattrs(inode);
1258
355da1eb
SW
1259 if (!ci->i_xattrs.prealloc_blob ||
1260 required_blob_size > ci->i_xattrs.prealloc_blob->alloc_len) {
18fa8b3f 1261 struct ceph_buffer *blob;
355da1eb 1262
be655596 1263 spin_unlock(&ci->i_ceph_lock);
86968ef2 1264 ceph_buffer_put(old_blob); /* Shouldn't be required */
38d46409
XL
1265 doutc(cl, " pre-allocating new blob size=%d\n",
1266 required_blob_size);
b6c1d5b8 1267 blob = ceph_buffer_new(required_blob_size, GFP_NOFS);
355da1eb 1268 if (!blob)
604d1b02 1269 goto do_sync_unlocked;
be655596 1270 spin_lock(&ci->i_ceph_lock);
86968ef2 1271 /* prealloc_blob can't be released while holding i_ceph_lock */
b6c1d5b8 1272 if (ci->i_xattrs.prealloc_blob)
86968ef2 1273 old_blob = ci->i_xattrs.prealloc_blob;
355da1eb
SW
1274 ci->i_xattrs.prealloc_blob = blob;
1275 goto retry;
1276 }
1277
bcdfeb2e
YZ
1278 err = __set_xattr(ci, newname, name_len, newval, val_len,
1279 flags, value ? 1 : -1, &xattr);
18fa8b3f 1280
fbc0b970 1281 if (!err) {
f66fd9f0
YZ
1282 dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_XATTR_EXCL,
1283 &prealloc_cf);
fbc0b970 1284 ci->i_xattrs.dirty = true;
7795aef0 1285 inode_set_ctime_current(inode);
fbc0b970 1286 }
18fa8b3f 1287
be655596 1288 spin_unlock(&ci->i_ceph_lock);
86968ef2 1289 ceph_buffer_put(old_blob);
604d1b02
YZ
1290 if (lock_snap_rwsem)
1291 up_read(&mdsc->snap_rwsem);
fca65b4a
SW
1292 if (dirty)
1293 __mark_inode_dirty(inode, dirty);
f66fd9f0 1294 ceph_free_cap_flush(prealloc_cf);
355da1eb
SW
1295 return err;
1296
1297do_sync:
be655596 1298 spin_unlock(&ci->i_ceph_lock);
3adf654d 1299do_sync_unlocked:
604d1b02
YZ
1300 if (lock_snap_rwsem)
1301 up_read(&mdsc->snap_rwsem);
315f2408
YZ
1302
1303 /* security module set xattr while filling trace */
d37b1d99 1304 if (current->journal_info) {
38d46409
XL
1305 pr_warn_ratelimited_client(cl,
1306 "sync %p %llx.%llx during filling trace\n",
1307 inode, ceph_vinop(inode));
315f2408
YZ
1308 err = -EBUSY;
1309 } else {
a26fecca 1310 err = ceph_sync_setxattr(inode, name, value, size, flags);
f1919826
YZ
1311 if (err >= 0 && check_realm) {
1312 /* check if snaprealm was created for quota inode */
1313 spin_lock(&ci->i_ceph_lock);
1314 if ((ci->i_max_files || ci->i_max_bytes) &&
1315 !(ci->i_snap_realm &&
1316 ci->i_snap_realm->ino == ci->i_vino.ino))
1317 err = -EOPNOTSUPP;
1318 spin_unlock(&ci->i_ceph_lock);
1319 }
315f2408 1320 }
355da1eb 1321out:
f66fd9f0 1322 ceph_free_cap_flush(prealloc_cf);
355da1eb
SW
1323 kfree(newname);
1324 kfree(newval);
1325 kfree(xattr);
1326 return err;
1327}
1328
2cdeb1e4
AG
1329static int ceph_get_xattr_handler(const struct xattr_handler *handler,
1330 struct dentry *dentry, struct inode *inode,
1331 const char *name, void *value, size_t size)
7221fe4c 1332{
2cdeb1e4
AG
1333 if (!ceph_is_valid_xattr(name))
1334 return -EOPNOTSUPP;
1335 return __ceph_getxattr(inode, name, value, size);
1336}
7221fe4c 1337
2cdeb1e4 1338static int ceph_set_xattr_handler(const struct xattr_handler *handler,
39f60c1c 1339 struct mnt_idmap *idmap,
59301226
AV
1340 struct dentry *unused, struct inode *inode,
1341 const char *name, const void *value,
1342 size_t size, int flags)
2cdeb1e4
AG
1343{
1344 if (!ceph_is_valid_xattr(name))
1345 return -EOPNOTSUPP;
59301226 1346 return __ceph_setxattr(inode, name, value, size, flags);
7221fe4c 1347}
315f2408 1348
5130ccea 1349static const struct xattr_handler ceph_other_xattr_handler = {
2cdeb1e4
AG
1350 .prefix = "", /* match any name => handlers called with full name */
1351 .get = ceph_get_xattr_handler,
1352 .set = ceph_set_xattr_handler,
1353};
1354
315f2408
YZ
1355#ifdef CONFIG_SECURITY
1356bool ceph_security_xattr_wanted(struct inode *in)
1357{
1358 return in->i_security != NULL;
1359}
1360
1361bool ceph_security_xattr_deadlock(struct inode *in)
1362{
1363 struct ceph_inode_info *ci;
1364 bool ret;
d37b1d99 1365 if (!in->i_security)
315f2408
YZ
1366 return false;
1367 ci = ceph_inode(in);
1368 spin_lock(&ci->i_ceph_lock);
1369 ret = !(ci->i_ceph_flags & CEPH_I_SEC_INITED) &&
1370 !(ci->i_xattrs.version > 0 &&
1371 __ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 0));
1372 spin_unlock(&ci->i_ceph_lock);
1373 return ret;
1374}
ac6713cc
YZ
1375
1376#ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1377int ceph_security_init_secctx(struct dentry *dentry, umode_t mode,
1378 struct ceph_acl_sec_ctx *as_ctx)
1379{
1380 struct ceph_pagelist *pagelist = as_ctx->pagelist;
1381 const char *name;
1382 size_t name_len;
1383 int err;
1384
1385 err = security_dentry_init_security(dentry, mode, &dentry->d_name,
15bf3239 1386 &name, &as_ctx->sec_ctx,
ac6713cc
YZ
1387 &as_ctx->sec_ctxlen);
1388 if (err < 0) {
1389 WARN_ON_ONCE(err != -EOPNOTSUPP);
1390 err = 0; /* do nothing */
1391 goto out;
1392 }
1393
1394 err = -ENOMEM;
1395 if (!pagelist) {
1396 pagelist = ceph_pagelist_alloc(GFP_KERNEL);
1397 if (!pagelist)
1398 goto out;
1399 err = ceph_pagelist_reserve(pagelist, PAGE_SIZE);
1400 if (err)
1401 goto out;
1402 ceph_pagelist_encode_32(pagelist, 1);
1403 }
1404
1405 /*
1406 * FIXME: Make security_dentry_init_security() generic. Currently
1407 * It only supports single security module and only selinux has
1408 * dentry_init_security hook.
1409 */
ac6713cc
YZ
1410 name_len = strlen(name);
1411 err = ceph_pagelist_reserve(pagelist,
1412 4 * 2 + name_len + as_ctx->sec_ctxlen);
1413 if (err)
1414 goto out;
1415
1416 if (as_ctx->pagelist) {
1417 /* update count of KV pairs */
1418 BUG_ON(pagelist->length <= sizeof(__le32));
1419 if (list_is_singular(&pagelist->head)) {
1420 le32_add_cpu((__le32*)pagelist->mapped_tail, 1);
1421 } else {
1422 struct page *page = list_first_entry(&pagelist->head,
1423 struct page, lru);
1424 void *addr = kmap_atomic(page);
1425 le32_add_cpu((__le32*)addr, 1);
1426 kunmap_atomic(addr);
1427 }
1428 } else {
1429 as_ctx->pagelist = pagelist;
1430 }
1431
1432 ceph_pagelist_encode_32(pagelist, name_len);
1433 ceph_pagelist_append(pagelist, name, name_len);
1434
1435 ceph_pagelist_encode_32(pagelist, as_ctx->sec_ctxlen);
1436 ceph_pagelist_append(pagelist, as_ctx->sec_ctx, as_ctx->sec_ctxlen);
1437
1438 err = 0;
1439out:
1440 if (pagelist && !as_ctx->pagelist)
1441 ceph_pagelist_release(pagelist);
1442 return err;
1443}
668959a5
JL
1444#endif /* CONFIG_CEPH_FS_SECURITY_LABEL */
1445#endif /* CONFIG_SECURITY */
5c31e92d
YZ
1446
1447void ceph_release_acl_sec_ctx(struct ceph_acl_sec_ctx *as_ctx)
1448{
1449#ifdef CONFIG_CEPH_FS_POSIX_ACL
1450 posix_acl_release(as_ctx->acl);
1451 posix_acl_release(as_ctx->default_acl);
ac6713cc
YZ
1452#endif
1453#ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1454 security_release_secctx(as_ctx->sec_ctx, as_ctx->sec_ctxlen);
6b5717bd
JL
1455#endif
1456#ifdef CONFIG_FS_ENCRYPTION
1457 kfree(as_ctx->fscrypt_auth);
5c31e92d
YZ
1458#endif
1459 if (as_ctx->pagelist)
1460 ceph_pagelist_release(as_ctx->pagelist);
1461}
ac6713cc
YZ
1462
1463/*
1464 * List of handlers for synthetic system.* attributes. Other
1465 * attributes are handled directly.
1466 */
10f9fbe9 1467const struct xattr_handler * const ceph_xattr_handlers[] = {
ac6713cc
YZ
1468 &ceph_other_xattr_handler,
1469 NULL,
1470};
This page took 1.759197 seconds and 4 git commands to generate.