1 // SPDX-License-Identifier: GPL-2.0 2 #include <linux/ceph/ceph_debug.h> 3 #include <linux/ceph/pagelist.h> 4 5 #include "super.h" 6 #include "mds_client.h" 7 8 #include <linux/ceph/decode.h> 9 10 #include <linux/xattr.h> 11 #include <linux/security.h> 12 #include <linux/posix_acl_xattr.h> 13 #include <linux/slab.h> 14 15 #define XATTR_CEPH_PREFIX "ceph." 16 #define XATTR_CEPH_PREFIX_LEN (sizeof (XATTR_CEPH_PREFIX) - 1) 17 18 static int __remove_xattr(struct ceph_inode_info *ci, 19 struct ceph_inode_xattr *xattr); 20 21 static bool ceph_is_valid_xattr(const char *name) 22 { 23 return !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) || 24 !strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN) || 25 !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) || 26 !strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN); 27 } 28 29 /* 30 * These define virtual xattrs exposing the recursive directory 31 * statistics and layout metadata. 32 */ 33 struct ceph_vxattr { 34 char *name; 35 size_t name_size; /* strlen(name) + 1 (for '\0') */ 36 ssize_t (*getxattr_cb)(struct ceph_inode_info *ci, char *val, 37 size_t size); 38 bool (*exists_cb)(struct ceph_inode_info *ci); 39 unsigned int flags; 40 }; 41 42 #define VXATTR_FLAG_READONLY (1<<0) 43 #define VXATTR_FLAG_HIDDEN (1<<1) 44 #define VXATTR_FLAG_RSTAT (1<<2) 45 #define VXATTR_FLAG_DIRSTAT (1<<3) 46 47 /* layouts */ 48 49 static bool ceph_vxattrcb_layout_exists(struct ceph_inode_info *ci) 50 { 51 struct ceph_file_layout *fl = &ci->i_layout; 52 return (fl->stripe_unit > 0 || fl->stripe_count > 0 || 53 fl->object_size > 0 || fl->pool_id >= 0 || 54 rcu_dereference_raw(fl->pool_ns) != NULL); 55 } 56 57 static ssize_t ceph_vxattrcb_layout(struct ceph_inode_info *ci, char *val, 58 size_t size) 59 { 60 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb); 61 struct ceph_osd_client *osdc = &fsc->client->osdc; 62 struct ceph_string *pool_ns; 63 s64 pool = ci->i_layout.pool_id; 64 const char *pool_name; 65 const char *ns_field = " pool_namespace="; 66 char buf[128]; 67 size_t len, total_len = 0; 68 ssize_t ret; 69 70 pool_ns = ceph_try_get_string(ci->i_layout.pool_ns); 71 72 dout("ceph_vxattrcb_layout %p\n", &ci->vfs_inode); 73 down_read(&osdc->lock); 74 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool); 75 if (pool_name) { 76 len = snprintf(buf, sizeof(buf), 77 "stripe_unit=%u stripe_count=%u object_size=%u pool=", 78 ci->i_layout.stripe_unit, ci->i_layout.stripe_count, 79 ci->i_layout.object_size); 80 total_len = len + strlen(pool_name); 81 } else { 82 len = snprintf(buf, sizeof(buf), 83 "stripe_unit=%u stripe_count=%u object_size=%u pool=%lld", 84 ci->i_layout.stripe_unit, ci->i_layout.stripe_count, 85 ci->i_layout.object_size, pool); 86 total_len = len; 87 } 88 89 if (pool_ns) 90 total_len += strlen(ns_field) + pool_ns->len; 91 92 ret = total_len; 93 if (size >= total_len) { 94 memcpy(val, buf, len); 95 ret = len; 96 if (pool_name) { 97 len = strlen(pool_name); 98 memcpy(val + ret, pool_name, len); 99 ret += len; 100 } 101 if (pool_ns) { 102 len = strlen(ns_field); 103 memcpy(val + ret, ns_field, len); 104 ret += len; 105 memcpy(val + ret, pool_ns->str, pool_ns->len); 106 ret += pool_ns->len; 107 } 108 } 109 up_read(&osdc->lock); 110 ceph_put_string(pool_ns); 111 return ret; 112 } 113 114 /* 115 * The convention with strings in xattrs is that they should not be NULL 116 * terminated, since we're returning the length with them. snprintf always 117 * NULL terminates however, so call it on a temporary buffer and then memcpy 118 * the result into place. 119 */ 120 static __printf(3, 4) 121 int ceph_fmt_xattr(char *val, size_t size, const char *fmt, ...) 122 { 123 int ret; 124 va_list args; 125 char buf[96]; /* NB: reevaluate size if new vxattrs are added */ 126 127 va_start(args, fmt); 128 ret = vsnprintf(buf, size ? sizeof(buf) : 0, fmt, args); 129 va_end(args); 130 131 /* Sanity check */ 132 if (size && ret + 1 > sizeof(buf)) { 133 WARN_ONCE(true, "Returned length too big (%d)", ret); 134 return -E2BIG; 135 } 136 137 if (ret <= size) 138 memcpy(val, buf, ret); 139 return ret; 140 } 141 142 static ssize_t ceph_vxattrcb_layout_stripe_unit(struct ceph_inode_info *ci, 143 char *val, size_t size) 144 { 145 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_unit); 146 } 147 148 static ssize_t ceph_vxattrcb_layout_stripe_count(struct ceph_inode_info *ci, 149 char *val, size_t size) 150 { 151 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_count); 152 } 153 154 static ssize_t ceph_vxattrcb_layout_object_size(struct ceph_inode_info *ci, 155 char *val, size_t size) 156 { 157 return ceph_fmt_xattr(val, size, "%u", ci->i_layout.object_size); 158 } 159 160 static ssize_t ceph_vxattrcb_layout_pool(struct ceph_inode_info *ci, 161 char *val, size_t size) 162 { 163 ssize_t ret; 164 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb); 165 struct ceph_osd_client *osdc = &fsc->client->osdc; 166 s64 pool = ci->i_layout.pool_id; 167 const char *pool_name; 168 169 down_read(&osdc->lock); 170 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool); 171 if (pool_name) { 172 ret = strlen(pool_name); 173 if (ret <= size) 174 memcpy(val, pool_name, ret); 175 } else { 176 ret = ceph_fmt_xattr(val, size, "%lld", pool); 177 } 178 up_read(&osdc->lock); 179 return ret; 180 } 181 182 static ssize_t ceph_vxattrcb_layout_pool_namespace(struct ceph_inode_info *ci, 183 char *val, size_t size) 184 { 185 ssize_t ret = 0; 186 struct ceph_string *ns = ceph_try_get_string(ci->i_layout.pool_ns); 187 188 if (ns) { 189 ret = ns->len; 190 if (ret <= size) 191 memcpy(val, ns->str, ret); 192 ceph_put_string(ns); 193 } 194 return ret; 195 } 196 197 /* directories */ 198 199 static ssize_t ceph_vxattrcb_dir_entries(struct ceph_inode_info *ci, char *val, 200 size_t size) 201 { 202 return ceph_fmt_xattr(val, size, "%lld", ci->i_files + ci->i_subdirs); 203 } 204 205 static ssize_t ceph_vxattrcb_dir_files(struct ceph_inode_info *ci, char *val, 206 size_t size) 207 { 208 return ceph_fmt_xattr(val, size, "%lld", ci->i_files); 209 } 210 211 static ssize_t ceph_vxattrcb_dir_subdirs(struct ceph_inode_info *ci, char *val, 212 size_t size) 213 { 214 return ceph_fmt_xattr(val, size, "%lld", ci->i_subdirs); 215 } 216 217 static ssize_t ceph_vxattrcb_dir_rentries(struct ceph_inode_info *ci, char *val, 218 size_t size) 219 { 220 return ceph_fmt_xattr(val, size, "%lld", 221 ci->i_rfiles + ci->i_rsubdirs); 222 } 223 224 static ssize_t ceph_vxattrcb_dir_rfiles(struct ceph_inode_info *ci, char *val, 225 size_t size) 226 { 227 return ceph_fmt_xattr(val, size, "%lld", ci->i_rfiles); 228 } 229 230 static ssize_t ceph_vxattrcb_dir_rsubdirs(struct ceph_inode_info *ci, char *val, 231 size_t size) 232 { 233 return ceph_fmt_xattr(val, size, "%lld", ci->i_rsubdirs); 234 } 235 236 static ssize_t ceph_vxattrcb_dir_rsnaps(struct ceph_inode_info *ci, char *val, 237 size_t size) 238 { 239 return ceph_fmt_xattr(val, size, "%lld", ci->i_rsnaps); 240 } 241 242 static ssize_t ceph_vxattrcb_dir_rbytes(struct ceph_inode_info *ci, char *val, 243 size_t size) 244 { 245 return ceph_fmt_xattr(val, size, "%lld", ci->i_rbytes); 246 } 247 248 static ssize_t ceph_vxattrcb_dir_rctime(struct ceph_inode_info *ci, char *val, 249 size_t size) 250 { 251 return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_rctime.tv_sec, 252 ci->i_rctime.tv_nsec); 253 } 254 255 /* dir pin */ 256 static bool ceph_vxattrcb_dir_pin_exists(struct ceph_inode_info *ci) 257 { 258 return ci->i_dir_pin != -ENODATA; 259 } 260 261 static ssize_t ceph_vxattrcb_dir_pin(struct ceph_inode_info *ci, char *val, 262 size_t size) 263 { 264 return ceph_fmt_xattr(val, size, "%d", (int)ci->i_dir_pin); 265 } 266 267 /* quotas */ 268 static bool ceph_vxattrcb_quota_exists(struct ceph_inode_info *ci) 269 { 270 bool ret = false; 271 spin_lock(&ci->i_ceph_lock); 272 if ((ci->i_max_files || ci->i_max_bytes) && 273 ci->i_vino.snap == CEPH_NOSNAP && 274 ci->i_snap_realm && 275 ci->i_snap_realm->ino == ci->i_vino.ino) 276 ret = true; 277 spin_unlock(&ci->i_ceph_lock); 278 return ret; 279 } 280 281 static ssize_t ceph_vxattrcb_quota(struct ceph_inode_info *ci, char *val, 282 size_t size) 283 { 284 return ceph_fmt_xattr(val, size, "max_bytes=%llu max_files=%llu", 285 ci->i_max_bytes, ci->i_max_files); 286 } 287 288 static ssize_t ceph_vxattrcb_quota_max_bytes(struct ceph_inode_info *ci, 289 char *val, size_t size) 290 { 291 return ceph_fmt_xattr(val, size, "%llu", ci->i_max_bytes); 292 } 293 294 static ssize_t ceph_vxattrcb_quota_max_files(struct ceph_inode_info *ci, 295 char *val, size_t size) 296 { 297 return ceph_fmt_xattr(val, size, "%llu", ci->i_max_files); 298 } 299 300 /* snapshots */ 301 static bool ceph_vxattrcb_snap_btime_exists(struct ceph_inode_info *ci) 302 { 303 return (ci->i_snap_btime.tv_sec != 0 || ci->i_snap_btime.tv_nsec != 0); 304 } 305 306 static ssize_t ceph_vxattrcb_snap_btime(struct ceph_inode_info *ci, char *val, 307 size_t size) 308 { 309 return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_snap_btime.tv_sec, 310 ci->i_snap_btime.tv_nsec); 311 } 312 313 static ssize_t ceph_vxattrcb_cluster_fsid(struct ceph_inode_info *ci, 314 char *val, size_t size) 315 { 316 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb); 317 318 return ceph_fmt_xattr(val, size, "%pU", &fsc->client->fsid); 319 } 320 321 static ssize_t ceph_vxattrcb_client_id(struct ceph_inode_info *ci, 322 char *val, size_t size) 323 { 324 struct ceph_fs_client *fsc = ceph_sb_to_client(ci->vfs_inode.i_sb); 325 326 return ceph_fmt_xattr(val, size, "client%lld", 327 ceph_client_gid(fsc->client)); 328 } 329 330 static ssize_t ceph_vxattrcb_caps(struct ceph_inode_info *ci, char *val, 331 size_t size) 332 { 333 int issued; 334 335 spin_lock(&ci->i_ceph_lock); 336 issued = __ceph_caps_issued(ci, NULL); 337 spin_unlock(&ci->i_ceph_lock); 338 339 return ceph_fmt_xattr(val, size, "%s/0x%x", 340 ceph_cap_string(issued), issued); 341 } 342 343 #define CEPH_XATTR_NAME(_type, _name) XATTR_CEPH_PREFIX #_type "." #_name 344 #define CEPH_XATTR_NAME2(_type, _name, _name2) \ 345 XATTR_CEPH_PREFIX #_type "." #_name "." #_name2 346 347 #define XATTR_NAME_CEPH(_type, _name, _flags) \ 348 { \ 349 .name = CEPH_XATTR_NAME(_type, _name), \ 350 .name_size = sizeof (CEPH_XATTR_NAME(_type, _name)), \ 351 .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \ 352 .exists_cb = NULL, \ 353 .flags = (VXATTR_FLAG_READONLY | _flags), \ 354 } 355 #define XATTR_RSTAT_FIELD(_type, _name) \ 356 XATTR_NAME_CEPH(_type, _name, VXATTR_FLAG_RSTAT) 357 #define XATTR_LAYOUT_FIELD(_type, _name, _field) \ 358 { \ 359 .name = CEPH_XATTR_NAME2(_type, _name, _field), \ 360 .name_size = sizeof (CEPH_XATTR_NAME2(_type, _name, _field)), \ 361 .getxattr_cb = ceph_vxattrcb_ ## _name ## _ ## _field, \ 362 .exists_cb = ceph_vxattrcb_layout_exists, \ 363 .flags = VXATTR_FLAG_HIDDEN, \ 364 } 365 #define XATTR_QUOTA_FIELD(_type, _name) \ 366 { \ 367 .name = CEPH_XATTR_NAME(_type, _name), \ 368 .name_size = sizeof(CEPH_XATTR_NAME(_type, _name)), \ 369 .getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \ 370 .exists_cb = ceph_vxattrcb_quota_exists, \ 371 .flags = VXATTR_FLAG_HIDDEN, \ 372 } 373 374 static struct ceph_vxattr ceph_dir_vxattrs[] = { 375 { 376 .name = "ceph.dir.layout", 377 .name_size = sizeof("ceph.dir.layout"), 378 .getxattr_cb = ceph_vxattrcb_layout, 379 .exists_cb = ceph_vxattrcb_layout_exists, 380 .flags = VXATTR_FLAG_HIDDEN, 381 }, 382 XATTR_LAYOUT_FIELD(dir, layout, stripe_unit), 383 XATTR_LAYOUT_FIELD(dir, layout, stripe_count), 384 XATTR_LAYOUT_FIELD(dir, layout, object_size), 385 XATTR_LAYOUT_FIELD(dir, layout, pool), 386 XATTR_LAYOUT_FIELD(dir, layout, pool_namespace), 387 XATTR_NAME_CEPH(dir, entries, VXATTR_FLAG_DIRSTAT), 388 XATTR_NAME_CEPH(dir, files, VXATTR_FLAG_DIRSTAT), 389 XATTR_NAME_CEPH(dir, subdirs, VXATTR_FLAG_DIRSTAT), 390 XATTR_RSTAT_FIELD(dir, rentries), 391 XATTR_RSTAT_FIELD(dir, rfiles), 392 XATTR_RSTAT_FIELD(dir, rsubdirs), 393 XATTR_RSTAT_FIELD(dir, rsnaps), 394 XATTR_RSTAT_FIELD(dir, rbytes), 395 XATTR_RSTAT_FIELD(dir, rctime), 396 { 397 .name = "ceph.dir.pin", 398 .name_size = sizeof("ceph.dir.pin"), 399 .getxattr_cb = ceph_vxattrcb_dir_pin, 400 .exists_cb = ceph_vxattrcb_dir_pin_exists, 401 .flags = VXATTR_FLAG_HIDDEN, 402 }, 403 { 404 .name = "ceph.quota", 405 .name_size = sizeof("ceph.quota"), 406 .getxattr_cb = ceph_vxattrcb_quota, 407 .exists_cb = ceph_vxattrcb_quota_exists, 408 .flags = VXATTR_FLAG_HIDDEN, 409 }, 410 XATTR_QUOTA_FIELD(quota, max_bytes), 411 XATTR_QUOTA_FIELD(quota, max_files), 412 { 413 .name = "ceph.snap.btime", 414 .name_size = sizeof("ceph.snap.btime"), 415 .getxattr_cb = ceph_vxattrcb_snap_btime, 416 .exists_cb = ceph_vxattrcb_snap_btime_exists, 417 .flags = VXATTR_FLAG_READONLY, 418 }, 419 { 420 .name = "ceph.caps", 421 .name_size = sizeof("ceph.caps"), 422 .getxattr_cb = ceph_vxattrcb_caps, 423 .exists_cb = NULL, 424 .flags = VXATTR_FLAG_HIDDEN, 425 }, 426 { .name = NULL, 0 } /* Required table terminator */ 427 }; 428 429 /* files */ 430 431 static struct ceph_vxattr ceph_file_vxattrs[] = { 432 { 433 .name = "ceph.file.layout", 434 .name_size = sizeof("ceph.file.layout"), 435 .getxattr_cb = ceph_vxattrcb_layout, 436 .exists_cb = ceph_vxattrcb_layout_exists, 437 .flags = VXATTR_FLAG_HIDDEN, 438 }, 439 XATTR_LAYOUT_FIELD(file, layout, stripe_unit), 440 XATTR_LAYOUT_FIELD(file, layout, stripe_count), 441 XATTR_LAYOUT_FIELD(file, layout, object_size), 442 XATTR_LAYOUT_FIELD(file, layout, pool), 443 XATTR_LAYOUT_FIELD(file, layout, pool_namespace), 444 { 445 .name = "ceph.snap.btime", 446 .name_size = sizeof("ceph.snap.btime"), 447 .getxattr_cb = ceph_vxattrcb_snap_btime, 448 .exists_cb = ceph_vxattrcb_snap_btime_exists, 449 .flags = VXATTR_FLAG_READONLY, 450 }, 451 { 452 .name = "ceph.caps", 453 .name_size = sizeof("ceph.caps"), 454 .getxattr_cb = ceph_vxattrcb_caps, 455 .exists_cb = NULL, 456 .flags = VXATTR_FLAG_HIDDEN, 457 }, 458 { .name = NULL, 0 } /* Required table terminator */ 459 }; 460 461 static struct ceph_vxattr ceph_common_vxattrs[] = { 462 { 463 .name = "ceph.cluster_fsid", 464 .name_size = sizeof("ceph.cluster_fsid"), 465 .getxattr_cb = ceph_vxattrcb_cluster_fsid, 466 .exists_cb = NULL, 467 .flags = VXATTR_FLAG_READONLY, 468 }, 469 { 470 .name = "ceph.client_id", 471 .name_size = sizeof("ceph.client_id"), 472 .getxattr_cb = ceph_vxattrcb_client_id, 473 .exists_cb = NULL, 474 .flags = VXATTR_FLAG_READONLY, 475 }, 476 { .name = NULL, 0 } /* Required table terminator */ 477 }; 478 479 static struct ceph_vxattr *ceph_inode_vxattrs(struct inode *inode) 480 { 481 if (S_ISDIR(inode->i_mode)) 482 return ceph_dir_vxattrs; 483 else if (S_ISREG(inode->i_mode)) 484 return ceph_file_vxattrs; 485 return NULL; 486 } 487 488 static struct ceph_vxattr *ceph_match_vxattr(struct inode *inode, 489 const char *name) 490 { 491 struct ceph_vxattr *vxattr = ceph_inode_vxattrs(inode); 492 493 if (vxattr) { 494 while (vxattr->name) { 495 if (!strcmp(vxattr->name, name)) 496 return vxattr; 497 vxattr++; 498 } 499 } 500 501 vxattr = ceph_common_vxattrs; 502 while (vxattr->name) { 503 if (!strcmp(vxattr->name, name)) 504 return vxattr; 505 vxattr++; 506 } 507 508 return NULL; 509 } 510 511 static int __set_xattr(struct ceph_inode_info *ci, 512 const char *name, int name_len, 513 const char *val, int val_len, 514 int flags, int update_xattr, 515 struct ceph_inode_xattr **newxattr) 516 { 517 struct rb_node **p; 518 struct rb_node *parent = NULL; 519 struct ceph_inode_xattr *xattr = NULL; 520 int c; 521 int new = 0; 522 523 p = &ci->i_xattrs.index.rb_node; 524 while (*p) { 525 parent = *p; 526 xattr = rb_entry(parent, struct ceph_inode_xattr, node); 527 c = strncmp(name, xattr->name, min(name_len, xattr->name_len)); 528 if (c < 0) 529 p = &(*p)->rb_left; 530 else if (c > 0) 531 p = &(*p)->rb_right; 532 else { 533 if (name_len == xattr->name_len) 534 break; 535 else if (name_len < xattr->name_len) 536 p = &(*p)->rb_left; 537 else 538 p = &(*p)->rb_right; 539 } 540 xattr = NULL; 541 } 542 543 if (update_xattr) { 544 int err = 0; 545 546 if (xattr && (flags & XATTR_CREATE)) 547 err = -EEXIST; 548 else if (!xattr && (flags & XATTR_REPLACE)) 549 err = -ENODATA; 550 if (err) { 551 kfree(name); 552 kfree(val); 553 kfree(*newxattr); 554 return err; 555 } 556 if (update_xattr < 0) { 557 if (xattr) 558 __remove_xattr(ci, xattr); 559 kfree(name); 560 kfree(*newxattr); 561 return 0; 562 } 563 } 564 565 if (!xattr) { 566 new = 1; 567 xattr = *newxattr; 568 xattr->name = name; 569 xattr->name_len = name_len; 570 xattr->should_free_name = update_xattr; 571 572 ci->i_xattrs.count++; 573 dout("__set_xattr count=%d\n", ci->i_xattrs.count); 574 } else { 575 kfree(*newxattr); 576 *newxattr = NULL; 577 if (xattr->should_free_val) 578 kfree(xattr->val); 579 580 if (update_xattr) { 581 kfree(name); 582 name = xattr->name; 583 } 584 ci->i_xattrs.names_size -= xattr->name_len; 585 ci->i_xattrs.vals_size -= xattr->val_len; 586 } 587 ci->i_xattrs.names_size += name_len; 588 ci->i_xattrs.vals_size += val_len; 589 if (val) 590 xattr->val = val; 591 else 592 xattr->val = ""; 593 594 xattr->val_len = val_len; 595 xattr->dirty = update_xattr; 596 xattr->should_free_val = (val && update_xattr); 597 598 if (new) { 599 rb_link_node(&xattr->node, parent, p); 600 rb_insert_color(&xattr->node, &ci->i_xattrs.index); 601 dout("__set_xattr_val p=%p\n", p); 602 } 603 604 dout("__set_xattr_val added %llx.%llx xattr %p %.*s=%.*s\n", 605 ceph_vinop(&ci->vfs_inode), xattr, name_len, name, val_len, val); 606 607 return 0; 608 } 609 610 static struct ceph_inode_xattr *__get_xattr(struct ceph_inode_info *ci, 611 const char *name) 612 { 613 struct rb_node **p; 614 struct rb_node *parent = NULL; 615 struct ceph_inode_xattr *xattr = NULL; 616 int name_len = strlen(name); 617 int c; 618 619 p = &ci->i_xattrs.index.rb_node; 620 while (*p) { 621 parent = *p; 622 xattr = rb_entry(parent, struct ceph_inode_xattr, node); 623 c = strncmp(name, xattr->name, xattr->name_len); 624 if (c == 0 && name_len > xattr->name_len) 625 c = 1; 626 if (c < 0) 627 p = &(*p)->rb_left; 628 else if (c > 0) 629 p = &(*p)->rb_right; 630 else { 631 dout("__get_xattr %s: found %.*s\n", name, 632 xattr->val_len, xattr->val); 633 return xattr; 634 } 635 } 636 637 dout("__get_xattr %s: not found\n", name); 638 639 return NULL; 640 } 641 642 static void __free_xattr(struct ceph_inode_xattr *xattr) 643 { 644 BUG_ON(!xattr); 645 646 if (xattr->should_free_name) 647 kfree(xattr->name); 648 if (xattr->should_free_val) 649 kfree(xattr->val); 650 651 kfree(xattr); 652 } 653 654 static int __remove_xattr(struct ceph_inode_info *ci, 655 struct ceph_inode_xattr *xattr) 656 { 657 if (!xattr) 658 return -ENODATA; 659 660 rb_erase(&xattr->node, &ci->i_xattrs.index); 661 662 if (xattr->should_free_name) 663 kfree(xattr->name); 664 if (xattr->should_free_val) 665 kfree(xattr->val); 666 667 ci->i_xattrs.names_size -= xattr->name_len; 668 ci->i_xattrs.vals_size -= xattr->val_len; 669 ci->i_xattrs.count--; 670 kfree(xattr); 671 672 return 0; 673 } 674 675 static char *__copy_xattr_names(struct ceph_inode_info *ci, 676 char *dest) 677 { 678 struct rb_node *p; 679 struct ceph_inode_xattr *xattr = NULL; 680 681 p = rb_first(&ci->i_xattrs.index); 682 dout("__copy_xattr_names count=%d\n", ci->i_xattrs.count); 683 684 while (p) { 685 xattr = rb_entry(p, struct ceph_inode_xattr, node); 686 memcpy(dest, xattr->name, xattr->name_len); 687 dest[xattr->name_len] = '\0'; 688 689 dout("dest=%s %p (%s) (%d/%d)\n", dest, xattr, xattr->name, 690 xattr->name_len, ci->i_xattrs.names_size); 691 692 dest += xattr->name_len + 1; 693 p = rb_next(p); 694 } 695 696 return dest; 697 } 698 699 void __ceph_destroy_xattrs(struct ceph_inode_info *ci) 700 { 701 struct rb_node *p, *tmp; 702 struct ceph_inode_xattr *xattr = NULL; 703 704 p = rb_first(&ci->i_xattrs.index); 705 706 dout("__ceph_destroy_xattrs p=%p\n", p); 707 708 while (p) { 709 xattr = rb_entry(p, struct ceph_inode_xattr, node); 710 tmp = p; 711 p = rb_next(tmp); 712 dout("__ceph_destroy_xattrs next p=%p (%.*s)\n", p, 713 xattr->name_len, xattr->name); 714 rb_erase(tmp, &ci->i_xattrs.index); 715 716 __free_xattr(xattr); 717 } 718 719 ci->i_xattrs.names_size = 0; 720 ci->i_xattrs.vals_size = 0; 721 ci->i_xattrs.index_version = 0; 722 ci->i_xattrs.count = 0; 723 ci->i_xattrs.index = RB_ROOT; 724 } 725 726 static int __build_xattrs(struct inode *inode) 727 __releases(ci->i_ceph_lock) 728 __acquires(ci->i_ceph_lock) 729 { 730 u32 namelen; 731 u32 numattr = 0; 732 void *p, *end; 733 u32 len; 734 const char *name, *val; 735 struct ceph_inode_info *ci = ceph_inode(inode); 736 u64 xattr_version; 737 struct ceph_inode_xattr **xattrs = NULL; 738 int err = 0; 739 int i; 740 741 dout("__build_xattrs() len=%d\n", 742 ci->i_xattrs.blob ? (int)ci->i_xattrs.blob->vec.iov_len : 0); 743 744 if (ci->i_xattrs.index_version >= ci->i_xattrs.version) 745 return 0; /* already built */ 746 747 __ceph_destroy_xattrs(ci); 748 749 start: 750 /* updated internal xattr rb tree */ 751 if (ci->i_xattrs.blob && ci->i_xattrs.blob->vec.iov_len > 4) { 752 p = ci->i_xattrs.blob->vec.iov_base; 753 end = p + ci->i_xattrs.blob->vec.iov_len; 754 ceph_decode_32_safe(&p, end, numattr, bad); 755 xattr_version = ci->i_xattrs.version; 756 spin_unlock(&ci->i_ceph_lock); 757 758 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), 759 GFP_NOFS); 760 err = -ENOMEM; 761 if (!xattrs) 762 goto bad_lock; 763 764 for (i = 0; i < numattr; i++) { 765 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), 766 GFP_NOFS); 767 if (!xattrs[i]) 768 goto bad_lock; 769 } 770 771 spin_lock(&ci->i_ceph_lock); 772 if (ci->i_xattrs.version != xattr_version) { 773 /* lost a race, retry */ 774 for (i = 0; i < numattr; i++) 775 kfree(xattrs[i]); 776 kfree(xattrs); 777 xattrs = NULL; 778 goto start; 779 } 780 err = -EIO; 781 while (numattr--) { 782 ceph_decode_32_safe(&p, end, len, bad); 783 namelen = len; 784 name = p; 785 p += len; 786 ceph_decode_32_safe(&p, end, len, bad); 787 val = p; 788 p += len; 789 790 err = __set_xattr(ci, name, namelen, val, len, 791 0, 0, &xattrs[numattr]); 792 793 if (err < 0) 794 goto bad; 795 } 796 kfree(xattrs); 797 } 798 ci->i_xattrs.index_version = ci->i_xattrs.version; 799 ci->i_xattrs.dirty = false; 800 801 return err; 802 bad_lock: 803 spin_lock(&ci->i_ceph_lock); 804 bad: 805 if (xattrs) { 806 for (i = 0; i < numattr; i++) 807 kfree(xattrs[i]); 808 kfree(xattrs); 809 } 810 ci->i_xattrs.names_size = 0; 811 return err; 812 } 813 814 static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size, 815 int val_size) 816 { 817 /* 818 * 4 bytes for the length, and additional 4 bytes per each xattr name, 819 * 4 bytes per each value 820 */ 821 int size = 4 + ci->i_xattrs.count*(4 + 4) + 822 ci->i_xattrs.names_size + 823 ci->i_xattrs.vals_size; 824 dout("__get_required_blob_size c=%d names.size=%d vals.size=%d\n", 825 ci->i_xattrs.count, ci->i_xattrs.names_size, 826 ci->i_xattrs.vals_size); 827 828 if (name_size) 829 size += 4 + 4 + name_size + val_size; 830 831 return size; 832 } 833 834 /* 835 * If there are dirty xattrs, reencode xattrs into the prealloc_blob 836 * and swap into place. It returns the old i_xattrs.blob (or NULL) so 837 * that it can be freed by the caller as the i_ceph_lock is likely to be 838 * held. 839 */ 840 struct ceph_buffer *__ceph_build_xattrs_blob(struct ceph_inode_info *ci) 841 { 842 struct rb_node *p; 843 struct ceph_inode_xattr *xattr = NULL; 844 struct ceph_buffer *old_blob = NULL; 845 void *dest; 846 847 dout("__build_xattrs_blob %p\n", &ci->vfs_inode); 848 if (ci->i_xattrs.dirty) { 849 int need = __get_required_blob_size(ci, 0, 0); 850 851 BUG_ON(need > ci->i_xattrs.prealloc_blob->alloc_len); 852 853 p = rb_first(&ci->i_xattrs.index); 854 dest = ci->i_xattrs.prealloc_blob->vec.iov_base; 855 856 ceph_encode_32(&dest, ci->i_xattrs.count); 857 while (p) { 858 xattr = rb_entry(p, struct ceph_inode_xattr, node); 859 860 ceph_encode_32(&dest, xattr->name_len); 861 memcpy(dest, xattr->name, xattr->name_len); 862 dest += xattr->name_len; 863 ceph_encode_32(&dest, xattr->val_len); 864 memcpy(dest, xattr->val, xattr->val_len); 865 dest += xattr->val_len; 866 867 p = rb_next(p); 868 } 869 870 /* adjust buffer len; it may be larger than we need */ 871 ci->i_xattrs.prealloc_blob->vec.iov_len = 872 dest - ci->i_xattrs.prealloc_blob->vec.iov_base; 873 874 if (ci->i_xattrs.blob) 875 old_blob = ci->i_xattrs.blob; 876 ci->i_xattrs.blob = ci->i_xattrs.prealloc_blob; 877 ci->i_xattrs.prealloc_blob = NULL; 878 ci->i_xattrs.dirty = false; 879 ci->i_xattrs.version++; 880 } 881 882 return old_blob; 883 } 884 885 static inline int __get_request_mask(struct inode *in) { 886 struct ceph_mds_request *req = current->journal_info; 887 int mask = 0; 888 if (req && req->r_target_inode == in) { 889 if (req->r_op == CEPH_MDS_OP_LOOKUP || 890 req->r_op == CEPH_MDS_OP_LOOKUPINO || 891 req->r_op == CEPH_MDS_OP_LOOKUPPARENT || 892 req->r_op == CEPH_MDS_OP_GETATTR) { 893 mask = le32_to_cpu(req->r_args.getattr.mask); 894 } else if (req->r_op == CEPH_MDS_OP_OPEN || 895 req->r_op == CEPH_MDS_OP_CREATE) { 896 mask = le32_to_cpu(req->r_args.open.mask); 897 } 898 } 899 return mask; 900 } 901 902 ssize_t __ceph_getxattr(struct inode *inode, const char *name, void *value, 903 size_t size) 904 { 905 struct ceph_inode_info *ci = ceph_inode(inode); 906 struct ceph_inode_xattr *xattr; 907 struct ceph_vxattr *vxattr = NULL; 908 int req_mask; 909 ssize_t err; 910 911 /* let's see if a virtual xattr was requested */ 912 vxattr = ceph_match_vxattr(inode, name); 913 if (vxattr) { 914 int mask = 0; 915 if (vxattr->flags & VXATTR_FLAG_RSTAT) 916 mask |= CEPH_STAT_RSTAT; 917 if (vxattr->flags & VXATTR_FLAG_DIRSTAT) 918 mask |= CEPH_CAP_FILE_SHARED; 919 err = ceph_do_getattr(inode, mask, true); 920 if (err) 921 return err; 922 err = -ENODATA; 923 if (!(vxattr->exists_cb && !vxattr->exists_cb(ci))) { 924 err = vxattr->getxattr_cb(ci, value, size); 925 if (size && size < err) 926 err = -ERANGE; 927 } 928 return err; 929 } 930 931 req_mask = __get_request_mask(inode); 932 933 spin_lock(&ci->i_ceph_lock); 934 dout("getxattr %p name '%s' ver=%lld index_ver=%lld\n", inode, name, 935 ci->i_xattrs.version, ci->i_xattrs.index_version); 936 937 if (ci->i_xattrs.version == 0 || 938 !((req_mask & CEPH_CAP_XATTR_SHARED) || 939 __ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1))) { 940 spin_unlock(&ci->i_ceph_lock); 941 942 /* security module gets xattr while filling trace */ 943 if (current->journal_info) { 944 pr_warn_ratelimited("sync getxattr %p " 945 "during filling trace\n", inode); 946 return -EBUSY; 947 } 948 949 /* get xattrs from mds (if we don't already have them) */ 950 err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true); 951 if (err) 952 return err; 953 spin_lock(&ci->i_ceph_lock); 954 } 955 956 err = __build_xattrs(inode); 957 if (err < 0) 958 goto out; 959 960 err = -ENODATA; /* == ENOATTR */ 961 xattr = __get_xattr(ci, name); 962 if (!xattr) 963 goto out; 964 965 err = -ERANGE; 966 if (size && size < xattr->val_len) 967 goto out; 968 969 err = xattr->val_len; 970 if (size == 0) 971 goto out; 972 973 memcpy(value, xattr->val, xattr->val_len); 974 975 if (current->journal_info && 976 !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) && 977 security_ismaclabel(name + XATTR_SECURITY_PREFIX_LEN)) 978 ci->i_ceph_flags |= CEPH_I_SEC_INITED; 979 out: 980 spin_unlock(&ci->i_ceph_lock); 981 return err; 982 } 983 984 ssize_t ceph_listxattr(struct dentry *dentry, char *names, size_t size) 985 { 986 struct inode *inode = d_inode(dentry); 987 struct ceph_inode_info *ci = ceph_inode(inode); 988 bool len_only = (size == 0); 989 u32 namelen; 990 int err; 991 992 spin_lock(&ci->i_ceph_lock); 993 dout("listxattr %p ver=%lld index_ver=%lld\n", inode, 994 ci->i_xattrs.version, ci->i_xattrs.index_version); 995 996 if (ci->i_xattrs.version == 0 || 997 !__ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1)) { 998 spin_unlock(&ci->i_ceph_lock); 999 err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true); 1000 if (err) 1001 return err; 1002 spin_lock(&ci->i_ceph_lock); 1003 } 1004 1005 err = __build_xattrs(inode); 1006 if (err < 0) 1007 goto out; 1008 1009 /* add 1 byte for each xattr due to the null termination */ 1010 namelen = ci->i_xattrs.names_size + ci->i_xattrs.count; 1011 if (!len_only) { 1012 if (namelen > size) { 1013 err = -ERANGE; 1014 goto out; 1015 } 1016 names = __copy_xattr_names(ci, names); 1017 size -= namelen; 1018 } 1019 err = namelen; 1020 out: 1021 spin_unlock(&ci->i_ceph_lock); 1022 return err; 1023 } 1024 1025 static int ceph_sync_setxattr(struct inode *inode, const char *name, 1026 const char *value, size_t size, int flags) 1027 { 1028 struct ceph_fs_client *fsc = ceph_sb_to_client(inode->i_sb); 1029 struct ceph_inode_info *ci = ceph_inode(inode); 1030 struct ceph_mds_request *req; 1031 struct ceph_mds_client *mdsc = fsc->mdsc; 1032 struct ceph_osd_client *osdc = &fsc->client->osdc; 1033 struct ceph_pagelist *pagelist = NULL; 1034 int op = CEPH_MDS_OP_SETXATTR; 1035 int err; 1036 1037 if (size > 0) { 1038 /* copy value into pagelist */ 1039 pagelist = ceph_pagelist_alloc(GFP_NOFS); 1040 if (!pagelist) 1041 return -ENOMEM; 1042 1043 err = ceph_pagelist_append(pagelist, value, size); 1044 if (err) 1045 goto out; 1046 } else if (!value) { 1047 if (flags & CEPH_XATTR_REPLACE) 1048 op = CEPH_MDS_OP_RMXATTR; 1049 else 1050 flags |= CEPH_XATTR_REMOVE; 1051 } 1052 1053 dout("setxattr value=%.*s\n", (int)size, value); 1054 1055 /* do request */ 1056 req = ceph_mdsc_create_request(mdsc, op, USE_AUTH_MDS); 1057 if (IS_ERR(req)) { 1058 err = PTR_ERR(req); 1059 goto out; 1060 } 1061 1062 req->r_path2 = kstrdup(name, GFP_NOFS); 1063 if (!req->r_path2) { 1064 ceph_mdsc_put_request(req); 1065 err = -ENOMEM; 1066 goto out; 1067 } 1068 1069 if (op == CEPH_MDS_OP_SETXATTR) { 1070 req->r_args.setxattr.flags = cpu_to_le32(flags); 1071 req->r_args.setxattr.osdmap_epoch = 1072 cpu_to_le32(osdc->osdmap->epoch); 1073 req->r_pagelist = pagelist; 1074 pagelist = NULL; 1075 } 1076 1077 req->r_inode = inode; 1078 ihold(inode); 1079 req->r_num_caps = 1; 1080 req->r_inode_drop = CEPH_CAP_XATTR_SHARED; 1081 1082 dout("xattr.ver (before): %lld\n", ci->i_xattrs.version); 1083 err = ceph_mdsc_do_request(mdsc, NULL, req); 1084 ceph_mdsc_put_request(req); 1085 dout("xattr.ver (after): %lld\n", ci->i_xattrs.version); 1086 1087 out: 1088 if (pagelist) 1089 ceph_pagelist_release(pagelist); 1090 return err; 1091 } 1092 1093 int __ceph_setxattr(struct inode *inode, const char *name, 1094 const void *value, size_t size, int flags) 1095 { 1096 struct ceph_vxattr *vxattr; 1097 struct ceph_inode_info *ci = ceph_inode(inode); 1098 struct ceph_mds_client *mdsc = ceph_sb_to_client(inode->i_sb)->mdsc; 1099 struct ceph_cap_flush *prealloc_cf = NULL; 1100 struct ceph_buffer *old_blob = NULL; 1101 int issued; 1102 int err; 1103 int dirty = 0; 1104 int name_len = strlen(name); 1105 int val_len = size; 1106 char *newname = NULL; 1107 char *newval = NULL; 1108 struct ceph_inode_xattr *xattr = NULL; 1109 int required_blob_size; 1110 bool check_realm = false; 1111 bool lock_snap_rwsem = false; 1112 1113 if (ceph_snap(inode) != CEPH_NOSNAP) 1114 return -EROFS; 1115 1116 vxattr = ceph_match_vxattr(inode, name); 1117 if (vxattr) { 1118 if (vxattr->flags & VXATTR_FLAG_READONLY) 1119 return -EOPNOTSUPP; 1120 if (value && !strncmp(vxattr->name, "ceph.quota", 10)) 1121 check_realm = true; 1122 } 1123 1124 /* pass any unhandled ceph.* xattrs through to the MDS */ 1125 if (!strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN)) 1126 goto do_sync_unlocked; 1127 1128 /* preallocate memory for xattr name, value, index node */ 1129 err = -ENOMEM; 1130 newname = kmemdup(name, name_len + 1, GFP_NOFS); 1131 if (!newname) 1132 goto out; 1133 1134 if (val_len) { 1135 newval = kmemdup(value, val_len, GFP_NOFS); 1136 if (!newval) 1137 goto out; 1138 } 1139 1140 xattr = kmalloc(sizeof(struct ceph_inode_xattr), GFP_NOFS); 1141 if (!xattr) 1142 goto out; 1143 1144 prealloc_cf = ceph_alloc_cap_flush(); 1145 if (!prealloc_cf) 1146 goto out; 1147 1148 spin_lock(&ci->i_ceph_lock); 1149 retry: 1150 issued = __ceph_caps_issued(ci, NULL); 1151 if (ci->i_xattrs.version == 0 || !(issued & CEPH_CAP_XATTR_EXCL)) 1152 goto do_sync; 1153 1154 if (!lock_snap_rwsem && !ci->i_head_snapc) { 1155 lock_snap_rwsem = true; 1156 if (!down_read_trylock(&mdsc->snap_rwsem)) { 1157 spin_unlock(&ci->i_ceph_lock); 1158 down_read(&mdsc->snap_rwsem); 1159 spin_lock(&ci->i_ceph_lock); 1160 goto retry; 1161 } 1162 } 1163 1164 dout("setxattr %p name '%s' issued %s\n", inode, name, 1165 ceph_cap_string(issued)); 1166 __build_xattrs(inode); 1167 1168 required_blob_size = __get_required_blob_size(ci, name_len, val_len); 1169 1170 if (!ci->i_xattrs.prealloc_blob || 1171 required_blob_size > ci->i_xattrs.prealloc_blob->alloc_len) { 1172 struct ceph_buffer *blob; 1173 1174 spin_unlock(&ci->i_ceph_lock); 1175 ceph_buffer_put(old_blob); /* Shouldn't be required */ 1176 dout(" pre-allocating new blob size=%d\n", required_blob_size); 1177 blob = ceph_buffer_new(required_blob_size, GFP_NOFS); 1178 if (!blob) 1179 goto do_sync_unlocked; 1180 spin_lock(&ci->i_ceph_lock); 1181 /* prealloc_blob can't be released while holding i_ceph_lock */ 1182 if (ci->i_xattrs.prealloc_blob) 1183 old_blob = ci->i_xattrs.prealloc_blob; 1184 ci->i_xattrs.prealloc_blob = blob; 1185 goto retry; 1186 } 1187 1188 err = __set_xattr(ci, newname, name_len, newval, val_len, 1189 flags, value ? 1 : -1, &xattr); 1190 1191 if (!err) { 1192 dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_XATTR_EXCL, 1193 &prealloc_cf); 1194 ci->i_xattrs.dirty = true; 1195 inode->i_ctime = current_time(inode); 1196 } 1197 1198 spin_unlock(&ci->i_ceph_lock); 1199 ceph_buffer_put(old_blob); 1200 if (lock_snap_rwsem) 1201 up_read(&mdsc->snap_rwsem); 1202 if (dirty) 1203 __mark_inode_dirty(inode, dirty); 1204 ceph_free_cap_flush(prealloc_cf); 1205 return err; 1206 1207 do_sync: 1208 spin_unlock(&ci->i_ceph_lock); 1209 do_sync_unlocked: 1210 if (lock_snap_rwsem) 1211 up_read(&mdsc->snap_rwsem); 1212 1213 /* security module set xattr while filling trace */ 1214 if (current->journal_info) { 1215 pr_warn_ratelimited("sync setxattr %p " 1216 "during filling trace\n", inode); 1217 err = -EBUSY; 1218 } else { 1219 err = ceph_sync_setxattr(inode, name, value, size, flags); 1220 if (err >= 0 && check_realm) { 1221 /* check if snaprealm was created for quota inode */ 1222 spin_lock(&ci->i_ceph_lock); 1223 if ((ci->i_max_files || ci->i_max_bytes) && 1224 !(ci->i_snap_realm && 1225 ci->i_snap_realm->ino == ci->i_vino.ino)) 1226 err = -EOPNOTSUPP; 1227 spin_unlock(&ci->i_ceph_lock); 1228 } 1229 } 1230 out: 1231 ceph_free_cap_flush(prealloc_cf); 1232 kfree(newname); 1233 kfree(newval); 1234 kfree(xattr); 1235 return err; 1236 } 1237 1238 static int ceph_get_xattr_handler(const struct xattr_handler *handler, 1239 struct dentry *dentry, struct inode *inode, 1240 const char *name, void *value, size_t size) 1241 { 1242 if (!ceph_is_valid_xattr(name)) 1243 return -EOPNOTSUPP; 1244 return __ceph_getxattr(inode, name, value, size); 1245 } 1246 1247 static int ceph_set_xattr_handler(const struct xattr_handler *handler, 1248 struct user_namespace *mnt_userns, 1249 struct dentry *unused, struct inode *inode, 1250 const char *name, const void *value, 1251 size_t size, int flags) 1252 { 1253 if (!ceph_is_valid_xattr(name)) 1254 return -EOPNOTSUPP; 1255 return __ceph_setxattr(inode, name, value, size, flags); 1256 } 1257 1258 static const struct xattr_handler ceph_other_xattr_handler = { 1259 .prefix = "", /* match any name => handlers called with full name */ 1260 .get = ceph_get_xattr_handler, 1261 .set = ceph_set_xattr_handler, 1262 }; 1263 1264 #ifdef CONFIG_SECURITY 1265 bool ceph_security_xattr_wanted(struct inode *in) 1266 { 1267 return in->i_security != NULL; 1268 } 1269 1270 bool ceph_security_xattr_deadlock(struct inode *in) 1271 { 1272 struct ceph_inode_info *ci; 1273 bool ret; 1274 if (!in->i_security) 1275 return false; 1276 ci = ceph_inode(in); 1277 spin_lock(&ci->i_ceph_lock); 1278 ret = !(ci->i_ceph_flags & CEPH_I_SEC_INITED) && 1279 !(ci->i_xattrs.version > 0 && 1280 __ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 0)); 1281 spin_unlock(&ci->i_ceph_lock); 1282 return ret; 1283 } 1284 1285 #ifdef CONFIG_CEPH_FS_SECURITY_LABEL 1286 int ceph_security_init_secctx(struct dentry *dentry, umode_t mode, 1287 struct ceph_acl_sec_ctx *as_ctx) 1288 { 1289 struct ceph_pagelist *pagelist = as_ctx->pagelist; 1290 const char *name; 1291 size_t name_len; 1292 int err; 1293 1294 err = security_dentry_init_security(dentry, mode, &dentry->d_name, 1295 &as_ctx->sec_ctx, 1296 &as_ctx->sec_ctxlen); 1297 if (err < 0) { 1298 WARN_ON_ONCE(err != -EOPNOTSUPP); 1299 err = 0; /* do nothing */ 1300 goto out; 1301 } 1302 1303 err = -ENOMEM; 1304 if (!pagelist) { 1305 pagelist = ceph_pagelist_alloc(GFP_KERNEL); 1306 if (!pagelist) 1307 goto out; 1308 err = ceph_pagelist_reserve(pagelist, PAGE_SIZE); 1309 if (err) 1310 goto out; 1311 ceph_pagelist_encode_32(pagelist, 1); 1312 } 1313 1314 /* 1315 * FIXME: Make security_dentry_init_security() generic. Currently 1316 * It only supports single security module and only selinux has 1317 * dentry_init_security hook. 1318 */ 1319 name = XATTR_NAME_SELINUX; 1320 name_len = strlen(name); 1321 err = ceph_pagelist_reserve(pagelist, 1322 4 * 2 + name_len + as_ctx->sec_ctxlen); 1323 if (err) 1324 goto out; 1325 1326 if (as_ctx->pagelist) { 1327 /* update count of KV pairs */ 1328 BUG_ON(pagelist->length <= sizeof(__le32)); 1329 if (list_is_singular(&pagelist->head)) { 1330 le32_add_cpu((__le32*)pagelist->mapped_tail, 1); 1331 } else { 1332 struct page *page = list_first_entry(&pagelist->head, 1333 struct page, lru); 1334 void *addr = kmap_atomic(page); 1335 le32_add_cpu((__le32*)addr, 1); 1336 kunmap_atomic(addr); 1337 } 1338 } else { 1339 as_ctx->pagelist = pagelist; 1340 } 1341 1342 ceph_pagelist_encode_32(pagelist, name_len); 1343 ceph_pagelist_append(pagelist, name, name_len); 1344 1345 ceph_pagelist_encode_32(pagelist, as_ctx->sec_ctxlen); 1346 ceph_pagelist_append(pagelist, as_ctx->sec_ctx, as_ctx->sec_ctxlen); 1347 1348 err = 0; 1349 out: 1350 if (pagelist && !as_ctx->pagelist) 1351 ceph_pagelist_release(pagelist); 1352 return err; 1353 } 1354 #endif /* CONFIG_CEPH_FS_SECURITY_LABEL */ 1355 #endif /* CONFIG_SECURITY */ 1356 1357 void ceph_release_acl_sec_ctx(struct ceph_acl_sec_ctx *as_ctx) 1358 { 1359 #ifdef CONFIG_CEPH_FS_POSIX_ACL 1360 posix_acl_release(as_ctx->acl); 1361 posix_acl_release(as_ctx->default_acl); 1362 #endif 1363 #ifdef CONFIG_CEPH_FS_SECURITY_LABEL 1364 security_release_secctx(as_ctx->sec_ctx, as_ctx->sec_ctxlen); 1365 #endif 1366 if (as_ctx->pagelist) 1367 ceph_pagelist_release(as_ctx->pagelist); 1368 } 1369 1370 /* 1371 * List of handlers for synthetic system.* attributes. Other 1372 * attributes are handled directly. 1373 */ 1374 const struct xattr_handler *ceph_xattr_handlers[] = { 1375 #ifdef CONFIG_CEPH_FS_POSIX_ACL 1376 &posix_acl_access_xattr_handler, 1377 &posix_acl_default_xattr_handler, 1378 #endif 1379 &ceph_other_xattr_handler, 1380 NULL, 1381 }; 1382