|  | // SPDX-License-Identifier: GPL-2.0 | 
|  | #include <linux/ceph/ceph_debug.h> | 
|  | #include <linux/ceph/pagelist.h> | 
|  |  | 
|  | #include "super.h" | 
|  | #include "mds_client.h" | 
|  |  | 
|  | #include <linux/ceph/decode.h> | 
|  |  | 
|  | #include <linux/xattr.h> | 
|  | #include <linux/security.h> | 
|  | #include <linux/posix_acl_xattr.h> | 
|  | #include <linux/slab.h> | 
|  |  | 
|  | #define XATTR_CEPH_PREFIX "ceph." | 
|  | #define XATTR_CEPH_PREFIX_LEN (sizeof (XATTR_CEPH_PREFIX) - 1) | 
|  |  | 
|  | static int __remove_xattr(struct ceph_inode_info *ci, | 
|  | struct ceph_inode_xattr *xattr); | 
|  |  | 
|  | static bool ceph_is_valid_xattr(const char *name) | 
|  | { | 
|  | return !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) || | 
|  | !strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN) || | 
|  | !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) || | 
|  | !strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN); | 
|  | } | 
|  |  | 
|  | /* | 
|  | * These define virtual xattrs exposing the recursive directory | 
|  | * statistics and layout metadata. | 
|  | */ | 
|  | struct ceph_vxattr { | 
|  | char *name; | 
|  | size_t name_size;	/* strlen(name) + 1 (for '\0') */ | 
|  | ssize_t (*getxattr_cb)(struct ceph_inode_info *ci, char *val, | 
|  | size_t size); | 
|  | bool (*exists_cb)(struct ceph_inode_info *ci); | 
|  | unsigned int flags; | 
|  | }; | 
|  |  | 
|  | #define VXATTR_FLAG_READONLY		(1<<0) | 
|  | #define VXATTR_FLAG_HIDDEN		(1<<1) | 
|  | #define VXATTR_FLAG_RSTAT		(1<<2) | 
|  | #define VXATTR_FLAG_DIRSTAT		(1<<3) | 
|  |  | 
|  | /* layouts */ | 
|  |  | 
|  | static bool ceph_vxattrcb_layout_exists(struct ceph_inode_info *ci) | 
|  | { | 
|  | struct ceph_file_layout *fl = &ci->i_layout; | 
|  | return (fl->stripe_unit > 0 || fl->stripe_count > 0 || | 
|  | fl->object_size > 0 || fl->pool_id >= 0 || | 
|  | rcu_dereference_raw(fl->pool_ns) != NULL); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_layout(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | struct ceph_fs_client *fsc = ceph_sb_to_client(ci->netfs.inode.i_sb); | 
|  | struct ceph_osd_client *osdc = &fsc->client->osdc; | 
|  | struct ceph_string *pool_ns; | 
|  | s64 pool = ci->i_layout.pool_id; | 
|  | const char *pool_name; | 
|  | const char *ns_field = " pool_namespace="; | 
|  | char buf[128]; | 
|  | size_t len, total_len = 0; | 
|  | ssize_t ret; | 
|  |  | 
|  | pool_ns = ceph_try_get_string(ci->i_layout.pool_ns); | 
|  |  | 
|  | dout("ceph_vxattrcb_layout %p\n", &ci->netfs.inode); | 
|  | down_read(&osdc->lock); | 
|  | pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool); | 
|  | if (pool_name) { | 
|  | len = snprintf(buf, sizeof(buf), | 
|  | "stripe_unit=%u stripe_count=%u object_size=%u pool=", | 
|  | ci->i_layout.stripe_unit, ci->i_layout.stripe_count, | 
|  | ci->i_layout.object_size); | 
|  | total_len = len + strlen(pool_name); | 
|  | } else { | 
|  | len = snprintf(buf, sizeof(buf), | 
|  | "stripe_unit=%u stripe_count=%u object_size=%u pool=%lld", | 
|  | ci->i_layout.stripe_unit, ci->i_layout.stripe_count, | 
|  | ci->i_layout.object_size, pool); | 
|  | total_len = len; | 
|  | } | 
|  |  | 
|  | if (pool_ns) | 
|  | total_len += strlen(ns_field) + pool_ns->len; | 
|  |  | 
|  | ret = total_len; | 
|  | if (size >= total_len) { | 
|  | memcpy(val, buf, len); | 
|  | ret = len; | 
|  | if (pool_name) { | 
|  | len = strlen(pool_name); | 
|  | memcpy(val + ret, pool_name, len); | 
|  | ret += len; | 
|  | } | 
|  | if (pool_ns) { | 
|  | len = strlen(ns_field); | 
|  | memcpy(val + ret, ns_field, len); | 
|  | ret += len; | 
|  | memcpy(val + ret, pool_ns->str, pool_ns->len); | 
|  | ret += pool_ns->len; | 
|  | } | 
|  | } | 
|  | up_read(&osdc->lock); | 
|  | ceph_put_string(pool_ns); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * The convention with strings in xattrs is that they should not be NULL | 
|  | * terminated, since we're returning the length with them. snprintf always | 
|  | * NULL terminates however, so call it on a temporary buffer and then memcpy | 
|  | * the result into place. | 
|  | */ | 
|  | static __printf(3, 4) | 
|  | int ceph_fmt_xattr(char *val, size_t size, const char *fmt, ...) | 
|  | { | 
|  | int ret; | 
|  | va_list args; | 
|  | char buf[96]; /* NB: reevaluate size if new vxattrs are added */ | 
|  |  | 
|  | va_start(args, fmt); | 
|  | ret = vsnprintf(buf, size ? sizeof(buf) : 0, fmt, args); | 
|  | va_end(args); | 
|  |  | 
|  | /* Sanity check */ | 
|  | if (size && ret + 1 > sizeof(buf)) { | 
|  | WARN_ONCE(true, "Returned length too big (%d)", ret); | 
|  | return -E2BIG; | 
|  | } | 
|  |  | 
|  | if (ret <= size) | 
|  | memcpy(val, buf, ret); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_layout_stripe_unit(struct ceph_inode_info *ci, | 
|  | char *val, size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_unit); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_layout_stripe_count(struct ceph_inode_info *ci, | 
|  | char *val, size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_count); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_layout_object_size(struct ceph_inode_info *ci, | 
|  | char *val, size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%u", ci->i_layout.object_size); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_layout_pool(struct ceph_inode_info *ci, | 
|  | char *val, size_t size) | 
|  | { | 
|  | ssize_t ret; | 
|  | struct ceph_fs_client *fsc = ceph_sb_to_client(ci->netfs.inode.i_sb); | 
|  | struct ceph_osd_client *osdc = &fsc->client->osdc; | 
|  | s64 pool = ci->i_layout.pool_id; | 
|  | const char *pool_name; | 
|  |  | 
|  | down_read(&osdc->lock); | 
|  | pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool); | 
|  | if (pool_name) { | 
|  | ret = strlen(pool_name); | 
|  | if (ret <= size) | 
|  | memcpy(val, pool_name, ret); | 
|  | } else { | 
|  | ret = ceph_fmt_xattr(val, size, "%lld", pool); | 
|  | } | 
|  | up_read(&osdc->lock); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_layout_pool_namespace(struct ceph_inode_info *ci, | 
|  | char *val, size_t size) | 
|  | { | 
|  | ssize_t ret = 0; | 
|  | struct ceph_string *ns = ceph_try_get_string(ci->i_layout.pool_ns); | 
|  |  | 
|  | if (ns) { | 
|  | ret = ns->len; | 
|  | if (ret <= size) | 
|  | memcpy(val, ns->str, ret); | 
|  | ceph_put_string(ns); | 
|  | } | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* directories */ | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_dir_entries(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%lld", ci->i_files + ci->i_subdirs); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_dir_files(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%lld", ci->i_files); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_dir_subdirs(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%lld", ci->i_subdirs); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_dir_rentries(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%lld", | 
|  | ci->i_rfiles + ci->i_rsubdirs); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_dir_rfiles(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%lld", ci->i_rfiles); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_dir_rsubdirs(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%lld", ci->i_rsubdirs); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_dir_rsnaps(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%lld", ci->i_rsnaps); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_dir_rbytes(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%lld", ci->i_rbytes); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_dir_rctime(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_rctime.tv_sec, | 
|  | ci->i_rctime.tv_nsec); | 
|  | } | 
|  |  | 
|  | /* dir pin */ | 
|  | static bool ceph_vxattrcb_dir_pin_exists(struct ceph_inode_info *ci) | 
|  | { | 
|  | return ci->i_dir_pin != -ENODATA; | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_dir_pin(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%d", (int)ci->i_dir_pin); | 
|  | } | 
|  |  | 
|  | /* quotas */ | 
|  | static bool ceph_vxattrcb_quota_exists(struct ceph_inode_info *ci) | 
|  | { | 
|  | bool ret = false; | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | if ((ci->i_max_files || ci->i_max_bytes) && | 
|  | ci->i_vino.snap == CEPH_NOSNAP && | 
|  | ci->i_snap_realm && | 
|  | ci->i_snap_realm->ino == ci->i_vino.ino) | 
|  | ret = true; | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_quota(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "max_bytes=%llu max_files=%llu", | 
|  | ci->i_max_bytes, ci->i_max_files); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_quota_max_bytes(struct ceph_inode_info *ci, | 
|  | char *val, size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%llu", ci->i_max_bytes); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_quota_max_files(struct ceph_inode_info *ci, | 
|  | char *val, size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%llu", ci->i_max_files); | 
|  | } | 
|  |  | 
|  | /* snapshots */ | 
|  | static bool ceph_vxattrcb_snap_btime_exists(struct ceph_inode_info *ci) | 
|  | { | 
|  | return (ci->i_snap_btime.tv_sec != 0 || ci->i_snap_btime.tv_nsec != 0); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_snap_btime(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_snap_btime.tv_sec, | 
|  | ci->i_snap_btime.tv_nsec); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_cluster_fsid(struct ceph_inode_info *ci, | 
|  | char *val, size_t size) | 
|  | { | 
|  | struct ceph_fs_client *fsc = ceph_sb_to_client(ci->netfs.inode.i_sb); | 
|  |  | 
|  | return ceph_fmt_xattr(val, size, "%pU", &fsc->client->fsid); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_client_id(struct ceph_inode_info *ci, | 
|  | char *val, size_t size) | 
|  | { | 
|  | struct ceph_fs_client *fsc = ceph_sb_to_client(ci->netfs.inode.i_sb); | 
|  |  | 
|  | return ceph_fmt_xattr(val, size, "client%lld", | 
|  | ceph_client_gid(fsc->client)); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_caps(struct ceph_inode_info *ci, char *val, | 
|  | size_t size) | 
|  | { | 
|  | int issued; | 
|  |  | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | issued = __ceph_caps_issued(ci, NULL); | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  |  | 
|  | return ceph_fmt_xattr(val, size, "%s/0x%x", | 
|  | ceph_cap_string(issued), issued); | 
|  | } | 
|  |  | 
|  | static ssize_t ceph_vxattrcb_auth_mds(struct ceph_inode_info *ci, | 
|  | char *val, size_t size) | 
|  | { | 
|  | int ret; | 
|  |  | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | ret = ceph_fmt_xattr(val, size, "%d", | 
|  | ci->i_auth_cap ? ci->i_auth_cap->session->s_mds : -1); | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | #define CEPH_XATTR_NAME(_type, _name)	XATTR_CEPH_PREFIX #_type "." #_name | 
|  | #define CEPH_XATTR_NAME2(_type, _name, _name2)	\ | 
|  | XATTR_CEPH_PREFIX #_type "." #_name "." #_name2 | 
|  |  | 
|  | #define XATTR_NAME_CEPH(_type, _name, _flags)				\ | 
|  | {								\ | 
|  | .name = CEPH_XATTR_NAME(_type, _name),			\ | 
|  | .name_size = sizeof (CEPH_XATTR_NAME(_type, _name)), \ | 
|  | .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \ | 
|  | .exists_cb = NULL,					\ | 
|  | .flags = (VXATTR_FLAG_READONLY | _flags),		\ | 
|  | } | 
|  | #define XATTR_RSTAT_FIELD(_type, _name)			\ | 
|  | XATTR_NAME_CEPH(_type, _name, VXATTR_FLAG_RSTAT) | 
|  | #define XATTR_RSTAT_FIELD_UPDATABLE(_type, _name)			\ | 
|  | {								\ | 
|  | .name = CEPH_XATTR_NAME(_type, _name),			\ | 
|  | .name_size = sizeof (CEPH_XATTR_NAME(_type, _name)),	\ | 
|  | .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name,	\ | 
|  | .exists_cb = NULL,					\ | 
|  | .flags = VXATTR_FLAG_RSTAT,				\ | 
|  | } | 
|  | #define XATTR_LAYOUT_FIELD(_type, _name, _field)			\ | 
|  | {								\ | 
|  | .name = CEPH_XATTR_NAME2(_type, _name, _field),	\ | 
|  | .name_size = sizeof (CEPH_XATTR_NAME2(_type, _name, _field)), \ | 
|  | .getxattr_cb = ceph_vxattrcb_ ## _name ## _ ## _field, \ | 
|  | .exists_cb = ceph_vxattrcb_layout_exists,	\ | 
|  | .flags = VXATTR_FLAG_HIDDEN,			\ | 
|  | } | 
|  | #define XATTR_QUOTA_FIELD(_type, _name)					\ | 
|  | {								\ | 
|  | .name = CEPH_XATTR_NAME(_type, _name),			\ | 
|  | .name_size = sizeof(CEPH_XATTR_NAME(_type, _name)),	\ | 
|  | .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name,	\ | 
|  | .exists_cb = ceph_vxattrcb_quota_exists,		\ | 
|  | .flags = VXATTR_FLAG_HIDDEN,				\ | 
|  | } | 
|  |  | 
|  | static struct ceph_vxattr ceph_dir_vxattrs[] = { | 
|  | { | 
|  | .name = "ceph.dir.layout", | 
|  | .name_size = sizeof("ceph.dir.layout"), | 
|  | .getxattr_cb = ceph_vxattrcb_layout, | 
|  | .exists_cb = ceph_vxattrcb_layout_exists, | 
|  | .flags = VXATTR_FLAG_HIDDEN, | 
|  | }, | 
|  | XATTR_LAYOUT_FIELD(dir, layout, stripe_unit), | 
|  | XATTR_LAYOUT_FIELD(dir, layout, stripe_count), | 
|  | XATTR_LAYOUT_FIELD(dir, layout, object_size), | 
|  | XATTR_LAYOUT_FIELD(dir, layout, pool), | 
|  | XATTR_LAYOUT_FIELD(dir, layout, pool_namespace), | 
|  | XATTR_NAME_CEPH(dir, entries, VXATTR_FLAG_DIRSTAT), | 
|  | XATTR_NAME_CEPH(dir, files, VXATTR_FLAG_DIRSTAT), | 
|  | XATTR_NAME_CEPH(dir, subdirs, VXATTR_FLAG_DIRSTAT), | 
|  | XATTR_RSTAT_FIELD(dir, rentries), | 
|  | XATTR_RSTAT_FIELD(dir, rfiles), | 
|  | XATTR_RSTAT_FIELD(dir, rsubdirs), | 
|  | XATTR_RSTAT_FIELD(dir, rsnaps), | 
|  | XATTR_RSTAT_FIELD(dir, rbytes), | 
|  | XATTR_RSTAT_FIELD_UPDATABLE(dir, rctime), | 
|  | { | 
|  | .name = "ceph.dir.pin", | 
|  | .name_size = sizeof("ceph.dir.pin"), | 
|  | .getxattr_cb = ceph_vxattrcb_dir_pin, | 
|  | .exists_cb = ceph_vxattrcb_dir_pin_exists, | 
|  | .flags = VXATTR_FLAG_HIDDEN, | 
|  | }, | 
|  | { | 
|  | .name = "ceph.quota", | 
|  | .name_size = sizeof("ceph.quota"), | 
|  | .getxattr_cb = ceph_vxattrcb_quota, | 
|  | .exists_cb = ceph_vxattrcb_quota_exists, | 
|  | .flags = VXATTR_FLAG_HIDDEN, | 
|  | }, | 
|  | XATTR_QUOTA_FIELD(quota, max_bytes), | 
|  | XATTR_QUOTA_FIELD(quota, max_files), | 
|  | { | 
|  | .name = "ceph.snap.btime", | 
|  | .name_size = sizeof("ceph.snap.btime"), | 
|  | .getxattr_cb = ceph_vxattrcb_snap_btime, | 
|  | .exists_cb = ceph_vxattrcb_snap_btime_exists, | 
|  | .flags = VXATTR_FLAG_READONLY, | 
|  | }, | 
|  | { | 
|  | .name = "ceph.caps", | 
|  | .name_size = sizeof("ceph.caps"), | 
|  | .getxattr_cb = ceph_vxattrcb_caps, | 
|  | .exists_cb = NULL, | 
|  | .flags = VXATTR_FLAG_HIDDEN, | 
|  | }, | 
|  | { .name = NULL, 0 }	/* Required table terminator */ | 
|  | }; | 
|  |  | 
|  | /* files */ | 
|  |  | 
|  | static struct ceph_vxattr ceph_file_vxattrs[] = { | 
|  | { | 
|  | .name = "ceph.file.layout", | 
|  | .name_size = sizeof("ceph.file.layout"), | 
|  | .getxattr_cb = ceph_vxattrcb_layout, | 
|  | .exists_cb = ceph_vxattrcb_layout_exists, | 
|  | .flags = VXATTR_FLAG_HIDDEN, | 
|  | }, | 
|  | XATTR_LAYOUT_FIELD(file, layout, stripe_unit), | 
|  | XATTR_LAYOUT_FIELD(file, layout, stripe_count), | 
|  | XATTR_LAYOUT_FIELD(file, layout, object_size), | 
|  | XATTR_LAYOUT_FIELD(file, layout, pool), | 
|  | XATTR_LAYOUT_FIELD(file, layout, pool_namespace), | 
|  | { | 
|  | .name = "ceph.snap.btime", | 
|  | .name_size = sizeof("ceph.snap.btime"), | 
|  | .getxattr_cb = ceph_vxattrcb_snap_btime, | 
|  | .exists_cb = ceph_vxattrcb_snap_btime_exists, | 
|  | .flags = VXATTR_FLAG_READONLY, | 
|  | }, | 
|  | { | 
|  | .name = "ceph.caps", | 
|  | .name_size = sizeof("ceph.caps"), | 
|  | .getxattr_cb = ceph_vxattrcb_caps, | 
|  | .exists_cb = NULL, | 
|  | .flags = VXATTR_FLAG_HIDDEN, | 
|  | }, | 
|  | { .name = NULL, 0 }	/* Required table terminator */ | 
|  | }; | 
|  |  | 
|  | static struct ceph_vxattr ceph_common_vxattrs[] = { | 
|  | { | 
|  | .name = "ceph.cluster_fsid", | 
|  | .name_size = sizeof("ceph.cluster_fsid"), | 
|  | .getxattr_cb = ceph_vxattrcb_cluster_fsid, | 
|  | .exists_cb = NULL, | 
|  | .flags = VXATTR_FLAG_READONLY, | 
|  | }, | 
|  | { | 
|  | .name = "ceph.client_id", | 
|  | .name_size = sizeof("ceph.client_id"), | 
|  | .getxattr_cb = ceph_vxattrcb_client_id, | 
|  | .exists_cb = NULL, | 
|  | .flags = VXATTR_FLAG_READONLY, | 
|  | }, | 
|  | { | 
|  | .name = "ceph.auth_mds", | 
|  | .name_size = sizeof("ceph.auth_mds"), | 
|  | .getxattr_cb = ceph_vxattrcb_auth_mds, | 
|  | .exists_cb = NULL, | 
|  | .flags = VXATTR_FLAG_READONLY, | 
|  | }, | 
|  | { .name = NULL, 0 }	/* Required table terminator */ | 
|  | }; | 
|  |  | 
|  | static struct ceph_vxattr *ceph_inode_vxattrs(struct inode *inode) | 
|  | { | 
|  | if (S_ISDIR(inode->i_mode)) | 
|  | return ceph_dir_vxattrs; | 
|  | else if (S_ISREG(inode->i_mode)) | 
|  | return ceph_file_vxattrs; | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | static struct ceph_vxattr *ceph_match_vxattr(struct inode *inode, | 
|  | const char *name) | 
|  | { | 
|  | struct ceph_vxattr *vxattr = ceph_inode_vxattrs(inode); | 
|  |  | 
|  | if (vxattr) { | 
|  | while (vxattr->name) { | 
|  | if (!strcmp(vxattr->name, name)) | 
|  | return vxattr; | 
|  | vxattr++; | 
|  | } | 
|  | } | 
|  |  | 
|  | vxattr = ceph_common_vxattrs; | 
|  | while (vxattr->name) { | 
|  | if (!strcmp(vxattr->name, name)) | 
|  | return vxattr; | 
|  | vxattr++; | 
|  | } | 
|  |  | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | static int __set_xattr(struct ceph_inode_info *ci, | 
|  | const char *name, int name_len, | 
|  | const char *val, int val_len, | 
|  | int flags, int update_xattr, | 
|  | struct ceph_inode_xattr **newxattr) | 
|  | { | 
|  | struct rb_node **p; | 
|  | struct rb_node *parent = NULL; | 
|  | struct ceph_inode_xattr *xattr = NULL; | 
|  | int c; | 
|  | int new = 0; | 
|  |  | 
|  | p = &ci->i_xattrs.index.rb_node; | 
|  | while (*p) { | 
|  | parent = *p; | 
|  | xattr = rb_entry(parent, struct ceph_inode_xattr, node); | 
|  | c = strncmp(name, xattr->name, min(name_len, xattr->name_len)); | 
|  | if (c < 0) | 
|  | p = &(*p)->rb_left; | 
|  | else if (c > 0) | 
|  | p = &(*p)->rb_right; | 
|  | else { | 
|  | if (name_len == xattr->name_len) | 
|  | break; | 
|  | else if (name_len < xattr->name_len) | 
|  | p = &(*p)->rb_left; | 
|  | else | 
|  | p = &(*p)->rb_right; | 
|  | } | 
|  | xattr = NULL; | 
|  | } | 
|  |  | 
|  | if (update_xattr) { | 
|  | int err = 0; | 
|  |  | 
|  | if (xattr && (flags & XATTR_CREATE)) | 
|  | err = -EEXIST; | 
|  | else if (!xattr && (flags & XATTR_REPLACE)) | 
|  | err = -ENODATA; | 
|  | if (err) { | 
|  | kfree(name); | 
|  | kfree(val); | 
|  | kfree(*newxattr); | 
|  | return err; | 
|  | } | 
|  | if (update_xattr < 0) { | 
|  | if (xattr) | 
|  | __remove_xattr(ci, xattr); | 
|  | kfree(name); | 
|  | kfree(*newxattr); | 
|  | return 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (!xattr) { | 
|  | new = 1; | 
|  | xattr = *newxattr; | 
|  | xattr->name = name; | 
|  | xattr->name_len = name_len; | 
|  | xattr->should_free_name = update_xattr; | 
|  |  | 
|  | ci->i_xattrs.count++; | 
|  | dout("__set_xattr count=%d\n", ci->i_xattrs.count); | 
|  | } else { | 
|  | kfree(*newxattr); | 
|  | *newxattr = NULL; | 
|  | if (xattr->should_free_val) | 
|  | kfree(xattr->val); | 
|  |  | 
|  | if (update_xattr) { | 
|  | kfree(name); | 
|  | name = xattr->name; | 
|  | } | 
|  | ci->i_xattrs.names_size -= xattr->name_len; | 
|  | ci->i_xattrs.vals_size -= xattr->val_len; | 
|  | } | 
|  | ci->i_xattrs.names_size += name_len; | 
|  | ci->i_xattrs.vals_size += val_len; | 
|  | if (val) | 
|  | xattr->val = val; | 
|  | else | 
|  | xattr->val = ""; | 
|  |  | 
|  | xattr->val_len = val_len; | 
|  | xattr->dirty = update_xattr; | 
|  | xattr->should_free_val = (val && update_xattr); | 
|  |  | 
|  | if (new) { | 
|  | rb_link_node(&xattr->node, parent, p); | 
|  | rb_insert_color(&xattr->node, &ci->i_xattrs.index); | 
|  | dout("__set_xattr_val p=%p\n", p); | 
|  | } | 
|  |  | 
|  | dout("__set_xattr_val added %llx.%llx xattr %p %.*s=%.*s\n", | 
|  | ceph_vinop(&ci->netfs.inode), xattr, name_len, name, val_len, val); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static struct ceph_inode_xattr *__get_xattr(struct ceph_inode_info *ci, | 
|  | const char *name) | 
|  | { | 
|  | struct rb_node **p; | 
|  | struct rb_node *parent = NULL; | 
|  | struct ceph_inode_xattr *xattr = NULL; | 
|  | int name_len = strlen(name); | 
|  | int c; | 
|  |  | 
|  | p = &ci->i_xattrs.index.rb_node; | 
|  | while (*p) { | 
|  | parent = *p; | 
|  | xattr = rb_entry(parent, struct ceph_inode_xattr, node); | 
|  | c = strncmp(name, xattr->name, xattr->name_len); | 
|  | if (c == 0 && name_len > xattr->name_len) | 
|  | c = 1; | 
|  | if (c < 0) | 
|  | p = &(*p)->rb_left; | 
|  | else if (c > 0) | 
|  | p = &(*p)->rb_right; | 
|  | else { | 
|  | dout("__get_xattr %s: found %.*s\n", name, | 
|  | xattr->val_len, xattr->val); | 
|  | return xattr; | 
|  | } | 
|  | } | 
|  |  | 
|  | dout("__get_xattr %s: not found\n", name); | 
|  |  | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | static void __free_xattr(struct ceph_inode_xattr *xattr) | 
|  | { | 
|  | BUG_ON(!xattr); | 
|  |  | 
|  | if (xattr->should_free_name) | 
|  | kfree(xattr->name); | 
|  | if (xattr->should_free_val) | 
|  | kfree(xattr->val); | 
|  |  | 
|  | kfree(xattr); | 
|  | } | 
|  |  | 
|  | static int __remove_xattr(struct ceph_inode_info *ci, | 
|  | struct ceph_inode_xattr *xattr) | 
|  | { | 
|  | if (!xattr) | 
|  | return -ENODATA; | 
|  |  | 
|  | rb_erase(&xattr->node, &ci->i_xattrs.index); | 
|  |  | 
|  | if (xattr->should_free_name) | 
|  | kfree(xattr->name); | 
|  | if (xattr->should_free_val) | 
|  | kfree(xattr->val); | 
|  |  | 
|  | ci->i_xattrs.names_size -= xattr->name_len; | 
|  | ci->i_xattrs.vals_size -= xattr->val_len; | 
|  | ci->i_xattrs.count--; | 
|  | kfree(xattr); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static char *__copy_xattr_names(struct ceph_inode_info *ci, | 
|  | char *dest) | 
|  | { | 
|  | struct rb_node *p; | 
|  | struct ceph_inode_xattr *xattr = NULL; | 
|  |  | 
|  | p = rb_first(&ci->i_xattrs.index); | 
|  | dout("__copy_xattr_names count=%d\n", ci->i_xattrs.count); | 
|  |  | 
|  | while (p) { | 
|  | xattr = rb_entry(p, struct ceph_inode_xattr, node); | 
|  | memcpy(dest, xattr->name, xattr->name_len); | 
|  | dest[xattr->name_len] = '\0'; | 
|  |  | 
|  | dout("dest=%s %p (%s) (%d/%d)\n", dest, xattr, xattr->name, | 
|  | xattr->name_len, ci->i_xattrs.names_size); | 
|  |  | 
|  | dest += xattr->name_len + 1; | 
|  | p = rb_next(p); | 
|  | } | 
|  |  | 
|  | return dest; | 
|  | } | 
|  |  | 
|  | void __ceph_destroy_xattrs(struct ceph_inode_info *ci) | 
|  | { | 
|  | struct rb_node *p, *tmp; | 
|  | struct ceph_inode_xattr *xattr = NULL; | 
|  |  | 
|  | p = rb_first(&ci->i_xattrs.index); | 
|  |  | 
|  | dout("__ceph_destroy_xattrs p=%p\n", p); | 
|  |  | 
|  | while (p) { | 
|  | xattr = rb_entry(p, struct ceph_inode_xattr, node); | 
|  | tmp = p; | 
|  | p = rb_next(tmp); | 
|  | dout("__ceph_destroy_xattrs next p=%p (%.*s)\n", p, | 
|  | xattr->name_len, xattr->name); | 
|  | rb_erase(tmp, &ci->i_xattrs.index); | 
|  |  | 
|  | __free_xattr(xattr); | 
|  | } | 
|  |  | 
|  | ci->i_xattrs.names_size = 0; | 
|  | ci->i_xattrs.vals_size = 0; | 
|  | ci->i_xattrs.index_version = 0; | 
|  | ci->i_xattrs.count = 0; | 
|  | ci->i_xattrs.index = RB_ROOT; | 
|  | } | 
|  |  | 
|  | static int __build_xattrs(struct inode *inode) | 
|  | __releases(ci->i_ceph_lock) | 
|  | __acquires(ci->i_ceph_lock) | 
|  | { | 
|  | u32 namelen; | 
|  | u32 numattr = 0; | 
|  | void *p, *end; | 
|  | u32 len; | 
|  | const char *name, *val; | 
|  | struct ceph_inode_info *ci = ceph_inode(inode); | 
|  | u64 xattr_version; | 
|  | struct ceph_inode_xattr **xattrs = NULL; | 
|  | int err = 0; | 
|  | int i; | 
|  |  | 
|  | dout("__build_xattrs() len=%d\n", | 
|  | ci->i_xattrs.blob ? (int)ci->i_xattrs.blob->vec.iov_len : 0); | 
|  |  | 
|  | if (ci->i_xattrs.index_version >= ci->i_xattrs.version) | 
|  | return 0; /* already built */ | 
|  |  | 
|  | __ceph_destroy_xattrs(ci); | 
|  |  | 
|  | start: | 
|  | /* updated internal xattr rb tree */ | 
|  | if (ci->i_xattrs.blob && ci->i_xattrs.blob->vec.iov_len > 4) { | 
|  | p = ci->i_xattrs.blob->vec.iov_base; | 
|  | end = p + ci->i_xattrs.blob->vec.iov_len; | 
|  | ceph_decode_32_safe(&p, end, numattr, bad); | 
|  | xattr_version = ci->i_xattrs.version; | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  |  | 
|  | xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), | 
|  | GFP_NOFS); | 
|  | err = -ENOMEM; | 
|  | if (!xattrs) | 
|  | goto bad_lock; | 
|  |  | 
|  | for (i = 0; i < numattr; i++) { | 
|  | xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), | 
|  | GFP_NOFS); | 
|  | if (!xattrs[i]) | 
|  | goto bad_lock; | 
|  | } | 
|  |  | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | if (ci->i_xattrs.version != xattr_version) { | 
|  | /* lost a race, retry */ | 
|  | for (i = 0; i < numattr; i++) | 
|  | kfree(xattrs[i]); | 
|  | kfree(xattrs); | 
|  | xattrs = NULL; | 
|  | goto start; | 
|  | } | 
|  | err = -EIO; | 
|  | while (numattr--) { | 
|  | ceph_decode_32_safe(&p, end, len, bad); | 
|  | namelen = len; | 
|  | name = p; | 
|  | p += len; | 
|  | ceph_decode_32_safe(&p, end, len, bad); | 
|  | val = p; | 
|  | p += len; | 
|  |  | 
|  | err = __set_xattr(ci, name, namelen, val, len, | 
|  | 0, 0, &xattrs[numattr]); | 
|  |  | 
|  | if (err < 0) | 
|  | goto bad; | 
|  | } | 
|  | kfree(xattrs); | 
|  | } | 
|  | ci->i_xattrs.index_version = ci->i_xattrs.version; | 
|  | ci->i_xattrs.dirty = false; | 
|  |  | 
|  | return err; | 
|  | bad_lock: | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | bad: | 
|  | if (xattrs) { | 
|  | for (i = 0; i < numattr; i++) | 
|  | kfree(xattrs[i]); | 
|  | kfree(xattrs); | 
|  | } | 
|  | ci->i_xattrs.names_size = 0; | 
|  | return err; | 
|  | } | 
|  |  | 
|  | static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size, | 
|  | int val_size) | 
|  | { | 
|  | /* | 
|  | * 4 bytes for the length, and additional 4 bytes per each xattr name, | 
|  | * 4 bytes per each value | 
|  | */ | 
|  | int size = 4 + ci->i_xattrs.count*(4 + 4) + | 
|  | ci->i_xattrs.names_size + | 
|  | ci->i_xattrs.vals_size; | 
|  | dout("__get_required_blob_size c=%d names.size=%d vals.size=%d\n", | 
|  | ci->i_xattrs.count, ci->i_xattrs.names_size, | 
|  | ci->i_xattrs.vals_size); | 
|  |  | 
|  | if (name_size) | 
|  | size += 4 + 4 + name_size + val_size; | 
|  |  | 
|  | return size; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * If there are dirty xattrs, reencode xattrs into the prealloc_blob | 
|  | * and swap into place.  It returns the old i_xattrs.blob (or NULL) so | 
|  | * that it can be freed by the caller as the i_ceph_lock is likely to be | 
|  | * held. | 
|  | */ | 
|  | struct ceph_buffer *__ceph_build_xattrs_blob(struct ceph_inode_info *ci) | 
|  | { | 
|  | struct rb_node *p; | 
|  | struct ceph_inode_xattr *xattr = NULL; | 
|  | struct ceph_buffer *old_blob = NULL; | 
|  | void *dest; | 
|  |  | 
|  | dout("__build_xattrs_blob %p\n", &ci->netfs.inode); | 
|  | if (ci->i_xattrs.dirty) { | 
|  | int need = __get_required_blob_size(ci, 0, 0); | 
|  |  | 
|  | BUG_ON(need > ci->i_xattrs.prealloc_blob->alloc_len); | 
|  |  | 
|  | p = rb_first(&ci->i_xattrs.index); | 
|  | dest = ci->i_xattrs.prealloc_blob->vec.iov_base; | 
|  |  | 
|  | ceph_encode_32(&dest, ci->i_xattrs.count); | 
|  | while (p) { | 
|  | xattr = rb_entry(p, struct ceph_inode_xattr, node); | 
|  |  | 
|  | ceph_encode_32(&dest, xattr->name_len); | 
|  | memcpy(dest, xattr->name, xattr->name_len); | 
|  | dest += xattr->name_len; | 
|  | ceph_encode_32(&dest, xattr->val_len); | 
|  | memcpy(dest, xattr->val, xattr->val_len); | 
|  | dest += xattr->val_len; | 
|  |  | 
|  | p = rb_next(p); | 
|  | } | 
|  |  | 
|  | /* adjust buffer len; it may be larger than we need */ | 
|  | ci->i_xattrs.prealloc_blob->vec.iov_len = | 
|  | dest - ci->i_xattrs.prealloc_blob->vec.iov_base; | 
|  |  | 
|  | if (ci->i_xattrs.blob) | 
|  | old_blob = ci->i_xattrs.blob; | 
|  | ci->i_xattrs.blob = ci->i_xattrs.prealloc_blob; | 
|  | ci->i_xattrs.prealloc_blob = NULL; | 
|  | ci->i_xattrs.dirty = false; | 
|  | ci->i_xattrs.version++; | 
|  | } | 
|  |  | 
|  | return old_blob; | 
|  | } | 
|  |  | 
|  | static inline int __get_request_mask(struct inode *in) { | 
|  | struct ceph_mds_request *req = current->journal_info; | 
|  | int mask = 0; | 
|  | if (req && req->r_target_inode == in) { | 
|  | if (req->r_op == CEPH_MDS_OP_LOOKUP || | 
|  | req->r_op == CEPH_MDS_OP_LOOKUPINO || | 
|  | req->r_op == CEPH_MDS_OP_LOOKUPPARENT || | 
|  | req->r_op == CEPH_MDS_OP_GETATTR) { | 
|  | mask = le32_to_cpu(req->r_args.getattr.mask); | 
|  | } else if (req->r_op == CEPH_MDS_OP_OPEN || | 
|  | req->r_op == CEPH_MDS_OP_CREATE) { | 
|  | mask = le32_to_cpu(req->r_args.open.mask); | 
|  | } | 
|  | } | 
|  | return mask; | 
|  | } | 
|  |  | 
|  | ssize_t __ceph_getxattr(struct inode *inode, const char *name, void *value, | 
|  | size_t size) | 
|  | { | 
|  | struct ceph_inode_info *ci = ceph_inode(inode); | 
|  | struct ceph_inode_xattr *xattr; | 
|  | struct ceph_vxattr *vxattr; | 
|  | int req_mask; | 
|  | ssize_t err; | 
|  |  | 
|  | if (strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN)) | 
|  | goto handle_non_vxattrs; | 
|  |  | 
|  | /* let's see if a virtual xattr was requested */ | 
|  | vxattr = ceph_match_vxattr(inode, name); | 
|  | if (vxattr) { | 
|  | int mask = 0; | 
|  | if (vxattr->flags & VXATTR_FLAG_RSTAT) | 
|  | mask |= CEPH_STAT_RSTAT; | 
|  | if (vxattr->flags & VXATTR_FLAG_DIRSTAT) | 
|  | mask |= CEPH_CAP_FILE_SHARED; | 
|  | err = ceph_do_getattr(inode, mask, true); | 
|  | if (err) | 
|  | return err; | 
|  | err = -ENODATA; | 
|  | if (!(vxattr->exists_cb && !vxattr->exists_cb(ci))) { | 
|  | err = vxattr->getxattr_cb(ci, value, size); | 
|  | if (size && size < err) | 
|  | err = -ERANGE; | 
|  | } | 
|  | return err; | 
|  | } else { | 
|  | err = ceph_do_getvxattr(inode, name, value, size); | 
|  | /* this would happen with a new client and old server combo */ | 
|  | if (err == -EOPNOTSUPP) | 
|  | err = -ENODATA; | 
|  | return err; | 
|  | } | 
|  | handle_non_vxattrs: | 
|  | req_mask = __get_request_mask(inode); | 
|  |  | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | dout("getxattr %p name '%s' ver=%lld index_ver=%lld\n", inode, name, | 
|  | ci->i_xattrs.version, ci->i_xattrs.index_version); | 
|  |  | 
|  | if (ci->i_xattrs.version == 0 || | 
|  | !((req_mask & CEPH_CAP_XATTR_SHARED) || | 
|  | __ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1))) { | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  |  | 
|  | /* security module gets xattr while filling trace */ | 
|  | if (current->journal_info) { | 
|  | pr_warn_ratelimited("sync getxattr %p " | 
|  | "during filling trace\n", inode); | 
|  | return -EBUSY; | 
|  | } | 
|  |  | 
|  | /* get xattrs from mds (if we don't already have them) */ | 
|  | err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true); | 
|  | if (err) | 
|  | return err; | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | } | 
|  |  | 
|  | err = __build_xattrs(inode); | 
|  | if (err < 0) | 
|  | goto out; | 
|  |  | 
|  | err = -ENODATA;  /* == ENOATTR */ | 
|  | xattr = __get_xattr(ci, name); | 
|  | if (!xattr) | 
|  | goto out; | 
|  |  | 
|  | err = -ERANGE; | 
|  | if (size && size < xattr->val_len) | 
|  | goto out; | 
|  |  | 
|  | err = xattr->val_len; | 
|  | if (size == 0) | 
|  | goto out; | 
|  |  | 
|  | memcpy(value, xattr->val, xattr->val_len); | 
|  |  | 
|  | if (current->journal_info && | 
|  | !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) && | 
|  | security_ismaclabel(name + XATTR_SECURITY_PREFIX_LEN)) | 
|  | ci->i_ceph_flags |= CEPH_I_SEC_INITED; | 
|  | out: | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  | return err; | 
|  | } | 
|  |  | 
|  | ssize_t ceph_listxattr(struct dentry *dentry, char *names, size_t size) | 
|  | { | 
|  | struct inode *inode = d_inode(dentry); | 
|  | struct ceph_inode_info *ci = ceph_inode(inode); | 
|  | bool len_only = (size == 0); | 
|  | u32 namelen; | 
|  | int err; | 
|  |  | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | dout("listxattr %p ver=%lld index_ver=%lld\n", inode, | 
|  | ci->i_xattrs.version, ci->i_xattrs.index_version); | 
|  |  | 
|  | if (ci->i_xattrs.version == 0 || | 
|  | !__ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1)) { | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  | err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true); | 
|  | if (err) | 
|  | return err; | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | } | 
|  |  | 
|  | err = __build_xattrs(inode); | 
|  | if (err < 0) | 
|  | goto out; | 
|  |  | 
|  | /* add 1 byte for each xattr due to the null termination */ | 
|  | namelen = ci->i_xattrs.names_size + ci->i_xattrs.count; | 
|  | if (!len_only) { | 
|  | if (namelen > size) { | 
|  | err = -ERANGE; | 
|  | goto out; | 
|  | } | 
|  | names = __copy_xattr_names(ci, names); | 
|  | size -= namelen; | 
|  | } | 
|  | err = namelen; | 
|  | out: | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  | return err; | 
|  | } | 
|  |  | 
|  | static int ceph_sync_setxattr(struct inode *inode, const char *name, | 
|  | const char *value, size_t size, int flags) | 
|  | { | 
|  | struct ceph_fs_client *fsc = ceph_sb_to_client(inode->i_sb); | 
|  | struct ceph_inode_info *ci = ceph_inode(inode); | 
|  | struct ceph_mds_request *req; | 
|  | struct ceph_mds_client *mdsc = fsc->mdsc; | 
|  | struct ceph_osd_client *osdc = &fsc->client->osdc; | 
|  | struct ceph_pagelist *pagelist = NULL; | 
|  | int op = CEPH_MDS_OP_SETXATTR; | 
|  | int err; | 
|  |  | 
|  | if (size > 0) { | 
|  | /* copy value into pagelist */ | 
|  | pagelist = ceph_pagelist_alloc(GFP_NOFS); | 
|  | if (!pagelist) | 
|  | return -ENOMEM; | 
|  |  | 
|  | err = ceph_pagelist_append(pagelist, value, size); | 
|  | if (err) | 
|  | goto out; | 
|  | } else if (!value) { | 
|  | if (flags & CEPH_XATTR_REPLACE) | 
|  | op = CEPH_MDS_OP_RMXATTR; | 
|  | else | 
|  | flags |= CEPH_XATTR_REMOVE; | 
|  | } | 
|  |  | 
|  | dout("setxattr value size: %zu\n", size); | 
|  |  | 
|  | /* do request */ | 
|  | req = ceph_mdsc_create_request(mdsc, op, USE_AUTH_MDS); | 
|  | if (IS_ERR(req)) { | 
|  | err = PTR_ERR(req); | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | req->r_path2 = kstrdup(name, GFP_NOFS); | 
|  | if (!req->r_path2) { | 
|  | ceph_mdsc_put_request(req); | 
|  | err = -ENOMEM; | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | if (op == CEPH_MDS_OP_SETXATTR) { | 
|  | req->r_args.setxattr.flags = cpu_to_le32(flags); | 
|  | req->r_args.setxattr.osdmap_epoch = | 
|  | cpu_to_le32(osdc->osdmap->epoch); | 
|  | req->r_pagelist = pagelist; | 
|  | pagelist = NULL; | 
|  | } | 
|  |  | 
|  | req->r_inode = inode; | 
|  | ihold(inode); | 
|  | req->r_num_caps = 1; | 
|  | req->r_inode_drop = CEPH_CAP_XATTR_SHARED; | 
|  |  | 
|  | dout("xattr.ver (before): %lld\n", ci->i_xattrs.version); | 
|  | err = ceph_mdsc_do_request(mdsc, NULL, req); | 
|  | ceph_mdsc_put_request(req); | 
|  | dout("xattr.ver (after): %lld\n", ci->i_xattrs.version); | 
|  |  | 
|  | out: | 
|  | if (pagelist) | 
|  | ceph_pagelist_release(pagelist); | 
|  | return err; | 
|  | } | 
|  |  | 
|  | int __ceph_setxattr(struct inode *inode, const char *name, | 
|  | const void *value, size_t size, int flags) | 
|  | { | 
|  | struct ceph_vxattr *vxattr; | 
|  | struct ceph_inode_info *ci = ceph_inode(inode); | 
|  | struct ceph_mds_client *mdsc = ceph_sb_to_client(inode->i_sb)->mdsc; | 
|  | struct ceph_cap_flush *prealloc_cf = NULL; | 
|  | struct ceph_buffer *old_blob = NULL; | 
|  | int issued; | 
|  | int err; | 
|  | int dirty = 0; | 
|  | int name_len = strlen(name); | 
|  | int val_len = size; | 
|  | char *newname = NULL; | 
|  | char *newval = NULL; | 
|  | struct ceph_inode_xattr *xattr = NULL; | 
|  | int required_blob_size; | 
|  | bool check_realm = false; | 
|  | bool lock_snap_rwsem = false; | 
|  |  | 
|  | if (ceph_snap(inode) != CEPH_NOSNAP) | 
|  | return -EROFS; | 
|  |  | 
|  | vxattr = ceph_match_vxattr(inode, name); | 
|  | if (vxattr) { | 
|  | if (vxattr->flags & VXATTR_FLAG_READONLY) | 
|  | return -EOPNOTSUPP; | 
|  | if (value && !strncmp(vxattr->name, "ceph.quota", 10)) | 
|  | check_realm = true; | 
|  | } | 
|  |  | 
|  | /* pass any unhandled ceph.* xattrs through to the MDS */ | 
|  | if (!strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN)) | 
|  | goto do_sync_unlocked; | 
|  |  | 
|  | /* preallocate memory for xattr name, value, index node */ | 
|  | err = -ENOMEM; | 
|  | newname = kmemdup(name, name_len + 1, GFP_NOFS); | 
|  | if (!newname) | 
|  | goto out; | 
|  |  | 
|  | if (val_len) { | 
|  | newval = kmemdup(value, val_len, GFP_NOFS); | 
|  | if (!newval) | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | xattr = kmalloc(sizeof(struct ceph_inode_xattr), GFP_NOFS); | 
|  | if (!xattr) | 
|  | goto out; | 
|  |  | 
|  | prealloc_cf = ceph_alloc_cap_flush(); | 
|  | if (!prealloc_cf) | 
|  | goto out; | 
|  |  | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | retry: | 
|  | issued = __ceph_caps_issued(ci, NULL); | 
|  | required_blob_size = __get_required_blob_size(ci, name_len, val_len); | 
|  | if ((ci->i_xattrs.version == 0) || !(issued & CEPH_CAP_XATTR_EXCL) || | 
|  | (required_blob_size > mdsc->mdsmap->m_max_xattr_size)) { | 
|  | dout("%s do sync setxattr: version: %llu size: %d max: %llu\n", | 
|  | __func__, ci->i_xattrs.version, required_blob_size, | 
|  | mdsc->mdsmap->m_max_xattr_size); | 
|  | goto do_sync; | 
|  | } | 
|  |  | 
|  | if (!lock_snap_rwsem && !ci->i_head_snapc) { | 
|  | lock_snap_rwsem = true; | 
|  | if (!down_read_trylock(&mdsc->snap_rwsem)) { | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  | down_read(&mdsc->snap_rwsem); | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | goto retry; | 
|  | } | 
|  | } | 
|  |  | 
|  | dout("setxattr %p name '%s' issued %s\n", inode, name, | 
|  | ceph_cap_string(issued)); | 
|  | __build_xattrs(inode); | 
|  |  | 
|  | if (!ci->i_xattrs.prealloc_blob || | 
|  | required_blob_size > ci->i_xattrs.prealloc_blob->alloc_len) { | 
|  | struct ceph_buffer *blob; | 
|  |  | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  | ceph_buffer_put(old_blob); /* Shouldn't be required */ | 
|  | dout(" pre-allocating new blob size=%d\n", required_blob_size); | 
|  | blob = ceph_buffer_new(required_blob_size, GFP_NOFS); | 
|  | if (!blob) | 
|  | goto do_sync_unlocked; | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | /* prealloc_blob can't be released while holding i_ceph_lock */ | 
|  | if (ci->i_xattrs.prealloc_blob) | 
|  | old_blob = ci->i_xattrs.prealloc_blob; | 
|  | ci->i_xattrs.prealloc_blob = blob; | 
|  | goto retry; | 
|  | } | 
|  |  | 
|  | err = __set_xattr(ci, newname, name_len, newval, val_len, | 
|  | flags, value ? 1 : -1, &xattr); | 
|  |  | 
|  | if (!err) { | 
|  | dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_XATTR_EXCL, | 
|  | &prealloc_cf); | 
|  | ci->i_xattrs.dirty = true; | 
|  | inode->i_ctime = current_time(inode); | 
|  | } | 
|  |  | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  | ceph_buffer_put(old_blob); | 
|  | if (lock_snap_rwsem) | 
|  | up_read(&mdsc->snap_rwsem); | 
|  | if (dirty) | 
|  | __mark_inode_dirty(inode, dirty); | 
|  | ceph_free_cap_flush(prealloc_cf); | 
|  | return err; | 
|  |  | 
|  | do_sync: | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  | do_sync_unlocked: | 
|  | if (lock_snap_rwsem) | 
|  | up_read(&mdsc->snap_rwsem); | 
|  |  | 
|  | /* security module set xattr while filling trace */ | 
|  | if (current->journal_info) { | 
|  | pr_warn_ratelimited("sync setxattr %p " | 
|  | "during filling trace\n", inode); | 
|  | err = -EBUSY; | 
|  | } else { | 
|  | err = ceph_sync_setxattr(inode, name, value, size, flags); | 
|  | if (err >= 0 && check_realm) { | 
|  | /* check if snaprealm was created for quota inode */ | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | if ((ci->i_max_files || ci->i_max_bytes) && | 
|  | !(ci->i_snap_realm && | 
|  | ci->i_snap_realm->ino == ci->i_vino.ino)) | 
|  | err = -EOPNOTSUPP; | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  | } | 
|  | } | 
|  | out: | 
|  | ceph_free_cap_flush(prealloc_cf); | 
|  | kfree(newname); | 
|  | kfree(newval); | 
|  | kfree(xattr); | 
|  | return err; | 
|  | } | 
|  |  | 
|  | static int ceph_get_xattr_handler(const struct xattr_handler *handler, | 
|  | struct dentry *dentry, struct inode *inode, | 
|  | const char *name, void *value, size_t size) | 
|  | { | 
|  | if (!ceph_is_valid_xattr(name)) | 
|  | return -EOPNOTSUPP; | 
|  | return __ceph_getxattr(inode, name, value, size); | 
|  | } | 
|  |  | 
|  | static int ceph_set_xattr_handler(const struct xattr_handler *handler, | 
|  | struct user_namespace *mnt_userns, | 
|  | struct dentry *unused, struct inode *inode, | 
|  | const char *name, const void *value, | 
|  | size_t size, int flags) | 
|  | { | 
|  | if (!ceph_is_valid_xattr(name)) | 
|  | return -EOPNOTSUPP; | 
|  | return __ceph_setxattr(inode, name, value, size, flags); | 
|  | } | 
|  |  | 
|  | static const struct xattr_handler ceph_other_xattr_handler = { | 
|  | .prefix = "",  /* match any name => handlers called with full name */ | 
|  | .get = ceph_get_xattr_handler, | 
|  | .set = ceph_set_xattr_handler, | 
|  | }; | 
|  |  | 
|  | #ifdef CONFIG_SECURITY | 
|  | bool ceph_security_xattr_wanted(struct inode *in) | 
|  | { | 
|  | return in->i_security != NULL; | 
|  | } | 
|  |  | 
|  | bool ceph_security_xattr_deadlock(struct inode *in) | 
|  | { | 
|  | struct ceph_inode_info *ci; | 
|  | bool ret; | 
|  | if (!in->i_security) | 
|  | return false; | 
|  | ci = ceph_inode(in); | 
|  | spin_lock(&ci->i_ceph_lock); | 
|  | ret = !(ci->i_ceph_flags & CEPH_I_SEC_INITED) && | 
|  | !(ci->i_xattrs.version > 0 && | 
|  | __ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 0)); | 
|  | spin_unlock(&ci->i_ceph_lock); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | #ifdef CONFIG_CEPH_FS_SECURITY_LABEL | 
|  | int ceph_security_init_secctx(struct dentry *dentry, umode_t mode, | 
|  | struct ceph_acl_sec_ctx *as_ctx) | 
|  | { | 
|  | struct ceph_pagelist *pagelist = as_ctx->pagelist; | 
|  | const char *name; | 
|  | size_t name_len; | 
|  | int err; | 
|  |  | 
|  | err = security_dentry_init_security(dentry, mode, &dentry->d_name, | 
|  | &name, &as_ctx->sec_ctx, | 
|  | &as_ctx->sec_ctxlen); | 
|  | if (err < 0) { | 
|  | WARN_ON_ONCE(err != -EOPNOTSUPP); | 
|  | err = 0; /* do nothing */ | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | err = -ENOMEM; | 
|  | if (!pagelist) { | 
|  | pagelist = ceph_pagelist_alloc(GFP_KERNEL); | 
|  | if (!pagelist) | 
|  | goto out; | 
|  | err = ceph_pagelist_reserve(pagelist, PAGE_SIZE); | 
|  | if (err) | 
|  | goto out; | 
|  | ceph_pagelist_encode_32(pagelist, 1); | 
|  | } | 
|  |  | 
|  | /* | 
|  | * FIXME: Make security_dentry_init_security() generic. Currently | 
|  | * It only supports single security module and only selinux has | 
|  | * dentry_init_security hook. | 
|  | */ | 
|  | name_len = strlen(name); | 
|  | err = ceph_pagelist_reserve(pagelist, | 
|  | 4 * 2 + name_len + as_ctx->sec_ctxlen); | 
|  | if (err) | 
|  | goto out; | 
|  |  | 
|  | if (as_ctx->pagelist) { | 
|  | /* update count of KV pairs */ | 
|  | BUG_ON(pagelist->length <= sizeof(__le32)); | 
|  | if (list_is_singular(&pagelist->head)) { | 
|  | le32_add_cpu((__le32*)pagelist->mapped_tail, 1); | 
|  | } else { | 
|  | struct page *page = list_first_entry(&pagelist->head, | 
|  | struct page, lru); | 
|  | void *addr = kmap_atomic(page); | 
|  | le32_add_cpu((__le32*)addr, 1); | 
|  | kunmap_atomic(addr); | 
|  | } | 
|  | } else { | 
|  | as_ctx->pagelist = pagelist; | 
|  | } | 
|  |  | 
|  | ceph_pagelist_encode_32(pagelist, name_len); | 
|  | ceph_pagelist_append(pagelist, name, name_len); | 
|  |  | 
|  | ceph_pagelist_encode_32(pagelist, as_ctx->sec_ctxlen); | 
|  | ceph_pagelist_append(pagelist, as_ctx->sec_ctx, as_ctx->sec_ctxlen); | 
|  |  | 
|  | err = 0; | 
|  | out: | 
|  | if (pagelist && !as_ctx->pagelist) | 
|  | ceph_pagelist_release(pagelist); | 
|  | return err; | 
|  | } | 
|  | #endif /* CONFIG_CEPH_FS_SECURITY_LABEL */ | 
|  | #endif /* CONFIG_SECURITY */ | 
|  |  | 
|  | void ceph_release_acl_sec_ctx(struct ceph_acl_sec_ctx *as_ctx) | 
|  | { | 
|  | #ifdef CONFIG_CEPH_FS_POSIX_ACL | 
|  | posix_acl_release(as_ctx->acl); | 
|  | posix_acl_release(as_ctx->default_acl); | 
|  | #endif | 
|  | #ifdef CONFIG_CEPH_FS_SECURITY_LABEL | 
|  | security_release_secctx(as_ctx->sec_ctx, as_ctx->sec_ctxlen); | 
|  | #endif | 
|  | if (as_ctx->pagelist) | 
|  | ceph_pagelist_release(as_ctx->pagelist); | 
|  | } | 
|  |  | 
|  | /* | 
|  | * List of handlers for synthetic system.* attributes. Other | 
|  | * attributes are handled directly. | 
|  | */ | 
|  | const struct xattr_handler *ceph_xattr_handlers[] = { | 
|  | #ifdef CONFIG_CEPH_FS_POSIX_ACL | 
|  | &posix_acl_access_xattr_handler, | 
|  | &posix_acl_default_xattr_handler, | 
|  | #endif | 
|  | &ceph_other_xattr_handler, | 
|  | NULL, | 
|  | }; |