xref: /openbmc/linux/fs/ceph/xattr.c (revision e4c881d2)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <linux/ceph/ceph_debug.h>
3 #include <linux/ceph/pagelist.h>
4 
5 #include "super.h"
6 #include "mds_client.h"
7 
8 #include <linux/ceph/decode.h>
9 
10 #include <linux/xattr.h>
11 #include <linux/security.h>
12 #include <linux/posix_acl_xattr.h>
13 #include <linux/slab.h>
14 
15 #define XATTR_CEPH_PREFIX "ceph."
16 #define XATTR_CEPH_PREFIX_LEN (sizeof (XATTR_CEPH_PREFIX) - 1)
17 
18 static int __remove_xattr(struct ceph_inode_info *ci,
19 			  struct ceph_inode_xattr *xattr);
20 
21 static bool ceph_is_valid_xattr(const char *name)
22 {
23 	return !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) ||
24 	       !strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN) ||
25 	       !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) ||
26 	       !strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN);
27 }
28 
29 /*
30  * These define virtual xattrs exposing the recursive directory
31  * statistics and layout metadata.
32  */
33 struct ceph_vxattr {
34 	char *name;
35 	size_t name_size;	/* strlen(name) + 1 (for '\0') */
36 	ssize_t (*getxattr_cb)(struct ceph_inode_info *ci, char *val,
37 			       size_t size);
38 	bool (*exists_cb)(struct ceph_inode_info *ci);
39 	unsigned int flags;
40 };
41 
42 #define VXATTR_FLAG_READONLY		(1<<0)
43 #define VXATTR_FLAG_HIDDEN		(1<<1)
44 #define VXATTR_FLAG_RSTAT		(1<<2)
45 #define VXATTR_FLAG_DIRSTAT		(1<<3)
46 
47 /* layouts */
48 
49 static bool ceph_vxattrcb_layout_exists(struct ceph_inode_info *ci)
50 {
51 	struct ceph_file_layout *fl = &ci->i_layout;
52 	return (fl->stripe_unit > 0 || fl->stripe_count > 0 ||
53 		fl->object_size > 0 || fl->pool_id >= 0 ||
54 		rcu_dereference_raw(fl->pool_ns) != NULL);
55 }
56 
57 static ssize_t ceph_vxattrcb_layout(struct ceph_inode_info *ci, char *val,
58 				    size_t size)
59 {
60 	struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
61 	struct ceph_osd_client *osdc = &fsc->client->osdc;
62 	struct ceph_string *pool_ns;
63 	s64 pool = ci->i_layout.pool_id;
64 	const char *pool_name;
65 	const char *ns_field = " pool_namespace=";
66 	char buf[128];
67 	size_t len, total_len = 0;
68 	ssize_t ret;
69 
70 	pool_ns = ceph_try_get_string(ci->i_layout.pool_ns);
71 
72 	dout("ceph_vxattrcb_layout %p\n", &ci->netfs.inode);
73 	down_read(&osdc->lock);
74 	pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
75 	if (pool_name) {
76 		len = snprintf(buf, sizeof(buf),
77 		"stripe_unit=%u stripe_count=%u object_size=%u pool=",
78 		ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
79 	        ci->i_layout.object_size);
80 		total_len = len + strlen(pool_name);
81 	} else {
82 		len = snprintf(buf, sizeof(buf),
83 		"stripe_unit=%u stripe_count=%u object_size=%u pool=%lld",
84 		ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
85 		ci->i_layout.object_size, pool);
86 		total_len = len;
87 	}
88 
89 	if (pool_ns)
90 		total_len += strlen(ns_field) + pool_ns->len;
91 
92 	ret = total_len;
93 	if (size >= total_len) {
94 		memcpy(val, buf, len);
95 		ret = len;
96 		if (pool_name) {
97 			len = strlen(pool_name);
98 			memcpy(val + ret, pool_name, len);
99 			ret += len;
100 		}
101 		if (pool_ns) {
102 			len = strlen(ns_field);
103 			memcpy(val + ret, ns_field, len);
104 			ret += len;
105 			memcpy(val + ret, pool_ns->str, pool_ns->len);
106 			ret += pool_ns->len;
107 		}
108 	}
109 	up_read(&osdc->lock);
110 	ceph_put_string(pool_ns);
111 	return ret;
112 }
113 
114 /*
115  * The convention with strings in xattrs is that they should not be NULL
116  * terminated, since we're returning the length with them. snprintf always
117  * NULL terminates however, so call it on a temporary buffer and then memcpy
118  * the result into place.
119  */
120 static __printf(3, 4)
121 int ceph_fmt_xattr(char *val, size_t size, const char *fmt, ...)
122 {
123 	int ret;
124 	va_list args;
125 	char buf[96]; /* NB: reevaluate size if new vxattrs are added */
126 
127 	va_start(args, fmt);
128 	ret = vsnprintf(buf, size ? sizeof(buf) : 0, fmt, args);
129 	va_end(args);
130 
131 	/* Sanity check */
132 	if (size && ret + 1 > sizeof(buf)) {
133 		WARN_ONCE(true, "Returned length too big (%d)", ret);
134 		return -E2BIG;
135 	}
136 
137 	if (ret <= size)
138 		memcpy(val, buf, ret);
139 	return ret;
140 }
141 
142 static ssize_t ceph_vxattrcb_layout_stripe_unit(struct ceph_inode_info *ci,
143 						char *val, size_t size)
144 {
145 	return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_unit);
146 }
147 
148 static ssize_t ceph_vxattrcb_layout_stripe_count(struct ceph_inode_info *ci,
149 						 char *val, size_t size)
150 {
151 	return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_count);
152 }
153 
154 static ssize_t ceph_vxattrcb_layout_object_size(struct ceph_inode_info *ci,
155 						char *val, size_t size)
156 {
157 	return ceph_fmt_xattr(val, size, "%u", ci->i_layout.object_size);
158 }
159 
160 static ssize_t ceph_vxattrcb_layout_pool(struct ceph_inode_info *ci,
161 					 char *val, size_t size)
162 {
163 	ssize_t ret;
164 	struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
165 	struct ceph_osd_client *osdc = &fsc->client->osdc;
166 	s64 pool = ci->i_layout.pool_id;
167 	const char *pool_name;
168 
169 	down_read(&osdc->lock);
170 	pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
171 	if (pool_name) {
172 		ret = strlen(pool_name);
173 		if (ret <= size)
174 			memcpy(val, pool_name, ret);
175 	} else {
176 		ret = ceph_fmt_xattr(val, size, "%lld", pool);
177 	}
178 	up_read(&osdc->lock);
179 	return ret;
180 }
181 
182 static ssize_t ceph_vxattrcb_layout_pool_namespace(struct ceph_inode_info *ci,
183 						   char *val, size_t size)
184 {
185 	ssize_t ret = 0;
186 	struct ceph_string *ns = ceph_try_get_string(ci->i_layout.pool_ns);
187 
188 	if (ns) {
189 		ret = ns->len;
190 		if (ret <= size)
191 			memcpy(val, ns->str, ret);
192 		ceph_put_string(ns);
193 	}
194 	return ret;
195 }
196 
197 /* directories */
198 
199 static ssize_t ceph_vxattrcb_dir_entries(struct ceph_inode_info *ci, char *val,
200 					 size_t size)
201 {
202 	return ceph_fmt_xattr(val, size, "%lld", ci->i_files + ci->i_subdirs);
203 }
204 
205 static ssize_t ceph_vxattrcb_dir_files(struct ceph_inode_info *ci, char *val,
206 				       size_t size)
207 {
208 	return ceph_fmt_xattr(val, size, "%lld", ci->i_files);
209 }
210 
211 static ssize_t ceph_vxattrcb_dir_subdirs(struct ceph_inode_info *ci, char *val,
212 					 size_t size)
213 {
214 	return ceph_fmt_xattr(val, size, "%lld", ci->i_subdirs);
215 }
216 
217 static ssize_t ceph_vxattrcb_dir_rentries(struct ceph_inode_info *ci, char *val,
218 					  size_t size)
219 {
220 	return ceph_fmt_xattr(val, size, "%lld",
221 				ci->i_rfiles + ci->i_rsubdirs);
222 }
223 
224 static ssize_t ceph_vxattrcb_dir_rfiles(struct ceph_inode_info *ci, char *val,
225 					size_t size)
226 {
227 	return ceph_fmt_xattr(val, size, "%lld", ci->i_rfiles);
228 }
229 
230 static ssize_t ceph_vxattrcb_dir_rsubdirs(struct ceph_inode_info *ci, char *val,
231 					  size_t size)
232 {
233 	return ceph_fmt_xattr(val, size, "%lld", ci->i_rsubdirs);
234 }
235 
236 static ssize_t ceph_vxattrcb_dir_rsnaps(struct ceph_inode_info *ci, char *val,
237 					  size_t size)
238 {
239 	return ceph_fmt_xattr(val, size, "%lld", ci->i_rsnaps);
240 }
241 
242 static ssize_t ceph_vxattrcb_dir_rbytes(struct ceph_inode_info *ci, char *val,
243 					size_t size)
244 {
245 	return ceph_fmt_xattr(val, size, "%lld", ci->i_rbytes);
246 }
247 
248 static ssize_t ceph_vxattrcb_dir_rctime(struct ceph_inode_info *ci, char *val,
249 					size_t size)
250 {
251 	return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_rctime.tv_sec,
252 				ci->i_rctime.tv_nsec);
253 }
254 
255 /* dir pin */
256 static bool ceph_vxattrcb_dir_pin_exists(struct ceph_inode_info *ci)
257 {
258 	return ci->i_dir_pin != -ENODATA;
259 }
260 
261 static ssize_t ceph_vxattrcb_dir_pin(struct ceph_inode_info *ci, char *val,
262 				     size_t size)
263 {
264 	return ceph_fmt_xattr(val, size, "%d", (int)ci->i_dir_pin);
265 }
266 
267 /* quotas */
268 static bool ceph_vxattrcb_quota_exists(struct ceph_inode_info *ci)
269 {
270 	bool ret = false;
271 	spin_lock(&ci->i_ceph_lock);
272 	if ((ci->i_max_files || ci->i_max_bytes) &&
273 	    ci->i_vino.snap == CEPH_NOSNAP &&
274 	    ci->i_snap_realm &&
275 	    ci->i_snap_realm->ino == ci->i_vino.ino)
276 		ret = true;
277 	spin_unlock(&ci->i_ceph_lock);
278 	return ret;
279 }
280 
281 static ssize_t ceph_vxattrcb_quota(struct ceph_inode_info *ci, char *val,
282 				   size_t size)
283 {
284 	return ceph_fmt_xattr(val, size, "max_bytes=%llu max_files=%llu",
285 				ci->i_max_bytes, ci->i_max_files);
286 }
287 
288 static ssize_t ceph_vxattrcb_quota_max_bytes(struct ceph_inode_info *ci,
289 					     char *val, size_t size)
290 {
291 	return ceph_fmt_xattr(val, size, "%llu", ci->i_max_bytes);
292 }
293 
294 static ssize_t ceph_vxattrcb_quota_max_files(struct ceph_inode_info *ci,
295 					     char *val, size_t size)
296 {
297 	return ceph_fmt_xattr(val, size, "%llu", ci->i_max_files);
298 }
299 
300 /* snapshots */
301 static bool ceph_vxattrcb_snap_btime_exists(struct ceph_inode_info *ci)
302 {
303 	return (ci->i_snap_btime.tv_sec != 0 || ci->i_snap_btime.tv_nsec != 0);
304 }
305 
306 static ssize_t ceph_vxattrcb_snap_btime(struct ceph_inode_info *ci, char *val,
307 					size_t size)
308 {
309 	return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_snap_btime.tv_sec,
310 				ci->i_snap_btime.tv_nsec);
311 }
312 
313 static ssize_t ceph_vxattrcb_cluster_fsid(struct ceph_inode_info *ci,
314 					  char *val, size_t size)
315 {
316 	struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
317 
318 	return ceph_fmt_xattr(val, size, "%pU", &fsc->client->fsid);
319 }
320 
321 static ssize_t ceph_vxattrcb_client_id(struct ceph_inode_info *ci,
322 				       char *val, size_t size)
323 {
324 	struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
325 
326 	return ceph_fmt_xattr(val, size, "client%lld",
327 			      ceph_client_gid(fsc->client));
328 }
329 
330 static ssize_t ceph_vxattrcb_caps(struct ceph_inode_info *ci, char *val,
331 					size_t size)
332 {
333 	int issued;
334 
335 	spin_lock(&ci->i_ceph_lock);
336 	issued = __ceph_caps_issued(ci, NULL);
337 	spin_unlock(&ci->i_ceph_lock);
338 
339 	return ceph_fmt_xattr(val, size, "%s/0x%x",
340 			      ceph_cap_string(issued), issued);
341 }
342 
343 static ssize_t ceph_vxattrcb_auth_mds(struct ceph_inode_info *ci,
344 				       char *val, size_t size)
345 {
346 	int ret;
347 
348 	spin_lock(&ci->i_ceph_lock);
349 	ret = ceph_fmt_xattr(val, size, "%d",
350 			     ci->i_auth_cap ? ci->i_auth_cap->session->s_mds : -1);
351 	spin_unlock(&ci->i_ceph_lock);
352 	return ret;
353 }
354 
355 #if IS_ENABLED(CONFIG_FS_ENCRYPTION)
356 static bool ceph_vxattrcb_fscrypt_auth_exists(struct ceph_inode_info *ci)
357 {
358 	return ci->fscrypt_auth_len;
359 }
360 
361 static ssize_t ceph_vxattrcb_fscrypt_auth(struct ceph_inode_info *ci,
362 					  char *val, size_t size)
363 {
364 	if (size) {
365 		if (size < ci->fscrypt_auth_len)
366 			return -ERANGE;
367 		memcpy(val, ci->fscrypt_auth, ci->fscrypt_auth_len);
368 	}
369 	return ci->fscrypt_auth_len;
370 }
371 #endif /* CONFIG_FS_ENCRYPTION */
372 
373 #define CEPH_XATTR_NAME(_type, _name)	XATTR_CEPH_PREFIX #_type "." #_name
374 #define CEPH_XATTR_NAME2(_type, _name, _name2)	\
375 	XATTR_CEPH_PREFIX #_type "." #_name "." #_name2
376 
377 #define XATTR_NAME_CEPH(_type, _name, _flags)				\
378 	{								\
379 		.name = CEPH_XATTR_NAME(_type, _name),			\
380 		.name_size = sizeof (CEPH_XATTR_NAME(_type, _name)), \
381 		.getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \
382 		.exists_cb = NULL,					\
383 		.flags = (VXATTR_FLAG_READONLY | _flags),		\
384 	}
385 #define XATTR_RSTAT_FIELD(_type, _name)			\
386 	XATTR_NAME_CEPH(_type, _name, VXATTR_FLAG_RSTAT)
387 #define XATTR_RSTAT_FIELD_UPDATABLE(_type, _name)			\
388 	{								\
389 		.name = CEPH_XATTR_NAME(_type, _name),			\
390 		.name_size = sizeof (CEPH_XATTR_NAME(_type, _name)),	\
391 		.getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name,	\
392 		.exists_cb = NULL,					\
393 		.flags = VXATTR_FLAG_RSTAT,				\
394 	}
395 #define XATTR_LAYOUT_FIELD(_type, _name, _field)			\
396 	{								\
397 		.name = CEPH_XATTR_NAME2(_type, _name, _field),	\
398 		.name_size = sizeof (CEPH_XATTR_NAME2(_type, _name, _field)), \
399 		.getxattr_cb = ceph_vxattrcb_ ## _name ## _ ## _field, \
400 		.exists_cb = ceph_vxattrcb_layout_exists,	\
401 		.flags = VXATTR_FLAG_HIDDEN,			\
402 	}
403 #define XATTR_QUOTA_FIELD(_type, _name)					\
404 	{								\
405 		.name = CEPH_XATTR_NAME(_type, _name),			\
406 		.name_size = sizeof(CEPH_XATTR_NAME(_type, _name)),	\
407 		.getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name,	\
408 		.exists_cb = ceph_vxattrcb_quota_exists,		\
409 		.flags = VXATTR_FLAG_HIDDEN,				\
410 	}
411 
412 static struct ceph_vxattr ceph_dir_vxattrs[] = {
413 	{
414 		.name = "ceph.dir.layout",
415 		.name_size = sizeof("ceph.dir.layout"),
416 		.getxattr_cb = ceph_vxattrcb_layout,
417 		.exists_cb = ceph_vxattrcb_layout_exists,
418 		.flags = VXATTR_FLAG_HIDDEN,
419 	},
420 	XATTR_LAYOUT_FIELD(dir, layout, stripe_unit),
421 	XATTR_LAYOUT_FIELD(dir, layout, stripe_count),
422 	XATTR_LAYOUT_FIELD(dir, layout, object_size),
423 	XATTR_LAYOUT_FIELD(dir, layout, pool),
424 	XATTR_LAYOUT_FIELD(dir, layout, pool_namespace),
425 	XATTR_NAME_CEPH(dir, entries, VXATTR_FLAG_DIRSTAT),
426 	XATTR_NAME_CEPH(dir, files, VXATTR_FLAG_DIRSTAT),
427 	XATTR_NAME_CEPH(dir, subdirs, VXATTR_FLAG_DIRSTAT),
428 	XATTR_RSTAT_FIELD(dir, rentries),
429 	XATTR_RSTAT_FIELD(dir, rfiles),
430 	XATTR_RSTAT_FIELD(dir, rsubdirs),
431 	XATTR_RSTAT_FIELD(dir, rsnaps),
432 	XATTR_RSTAT_FIELD(dir, rbytes),
433 	XATTR_RSTAT_FIELD_UPDATABLE(dir, rctime),
434 	{
435 		.name = "ceph.dir.pin",
436 		.name_size = sizeof("ceph.dir.pin"),
437 		.getxattr_cb = ceph_vxattrcb_dir_pin,
438 		.exists_cb = ceph_vxattrcb_dir_pin_exists,
439 		.flags = VXATTR_FLAG_HIDDEN,
440 	},
441 	{
442 		.name = "ceph.quota",
443 		.name_size = sizeof("ceph.quota"),
444 		.getxattr_cb = ceph_vxattrcb_quota,
445 		.exists_cb = ceph_vxattrcb_quota_exists,
446 		.flags = VXATTR_FLAG_HIDDEN,
447 	},
448 	XATTR_QUOTA_FIELD(quota, max_bytes),
449 	XATTR_QUOTA_FIELD(quota, max_files),
450 	{
451 		.name = "ceph.snap.btime",
452 		.name_size = sizeof("ceph.snap.btime"),
453 		.getxattr_cb = ceph_vxattrcb_snap_btime,
454 		.exists_cb = ceph_vxattrcb_snap_btime_exists,
455 		.flags = VXATTR_FLAG_READONLY,
456 	},
457 	{
458 		.name = "ceph.caps",
459 		.name_size = sizeof("ceph.caps"),
460 		.getxattr_cb = ceph_vxattrcb_caps,
461 		.exists_cb = NULL,
462 		.flags = VXATTR_FLAG_HIDDEN,
463 	},
464 	{ .name = NULL, 0 }	/* Required table terminator */
465 };
466 
467 /* files */
468 
469 static struct ceph_vxattr ceph_file_vxattrs[] = {
470 	{
471 		.name = "ceph.file.layout",
472 		.name_size = sizeof("ceph.file.layout"),
473 		.getxattr_cb = ceph_vxattrcb_layout,
474 		.exists_cb = ceph_vxattrcb_layout_exists,
475 		.flags = VXATTR_FLAG_HIDDEN,
476 	},
477 	XATTR_LAYOUT_FIELD(file, layout, stripe_unit),
478 	XATTR_LAYOUT_FIELD(file, layout, stripe_count),
479 	XATTR_LAYOUT_FIELD(file, layout, object_size),
480 	XATTR_LAYOUT_FIELD(file, layout, pool),
481 	XATTR_LAYOUT_FIELD(file, layout, pool_namespace),
482 	{
483 		.name = "ceph.snap.btime",
484 		.name_size = sizeof("ceph.snap.btime"),
485 		.getxattr_cb = ceph_vxattrcb_snap_btime,
486 		.exists_cb = ceph_vxattrcb_snap_btime_exists,
487 		.flags = VXATTR_FLAG_READONLY,
488 	},
489 	{
490 		.name = "ceph.caps",
491 		.name_size = sizeof("ceph.caps"),
492 		.getxattr_cb = ceph_vxattrcb_caps,
493 		.exists_cb = NULL,
494 		.flags = VXATTR_FLAG_HIDDEN,
495 	},
496 	{ .name = NULL, 0 }	/* Required table terminator */
497 };
498 
499 static struct ceph_vxattr ceph_common_vxattrs[] = {
500 	{
501 		.name = "ceph.cluster_fsid",
502 		.name_size = sizeof("ceph.cluster_fsid"),
503 		.getxattr_cb = ceph_vxattrcb_cluster_fsid,
504 		.exists_cb = NULL,
505 		.flags = VXATTR_FLAG_READONLY,
506 	},
507 	{
508 		.name = "ceph.client_id",
509 		.name_size = sizeof("ceph.client_id"),
510 		.getxattr_cb = ceph_vxattrcb_client_id,
511 		.exists_cb = NULL,
512 		.flags = VXATTR_FLAG_READONLY,
513 	},
514 	{
515 		.name = "ceph.auth_mds",
516 		.name_size = sizeof("ceph.auth_mds"),
517 		.getxattr_cb = ceph_vxattrcb_auth_mds,
518 		.exists_cb = NULL,
519 		.flags = VXATTR_FLAG_READONLY,
520 	},
521 #if IS_ENABLED(CONFIG_FS_ENCRYPTION)
522 	{
523 		.name = "ceph.fscrypt.auth",
524 		.name_size = sizeof("ceph.fscrypt.auth"),
525 		.getxattr_cb = ceph_vxattrcb_fscrypt_auth,
526 		.exists_cb = ceph_vxattrcb_fscrypt_auth_exists,
527 		.flags = VXATTR_FLAG_READONLY,
528 	},
529 #endif /* CONFIG_FS_ENCRYPTION */
530 	{ .name = NULL, 0 }	/* Required table terminator */
531 };
532 
533 static struct ceph_vxattr *ceph_inode_vxattrs(struct inode *inode)
534 {
535 	if (S_ISDIR(inode->i_mode))
536 		return ceph_dir_vxattrs;
537 	else if (S_ISREG(inode->i_mode))
538 		return ceph_file_vxattrs;
539 	return NULL;
540 }
541 
542 static struct ceph_vxattr *ceph_match_vxattr(struct inode *inode,
543 						const char *name)
544 {
545 	struct ceph_vxattr *vxattr = ceph_inode_vxattrs(inode);
546 
547 	if (vxattr) {
548 		while (vxattr->name) {
549 			if (!strcmp(vxattr->name, name))
550 				return vxattr;
551 			vxattr++;
552 		}
553 	}
554 
555 	vxattr = ceph_common_vxattrs;
556 	while (vxattr->name) {
557 		if (!strcmp(vxattr->name, name))
558 			return vxattr;
559 		vxattr++;
560 	}
561 
562 	return NULL;
563 }
564 
565 #define MAX_XATTR_VAL_PRINT_LEN 256
566 
567 static int __set_xattr(struct ceph_inode_info *ci,
568 			   const char *name, int name_len,
569 			   const char *val, int val_len,
570 			   int flags, int update_xattr,
571 			   struct ceph_inode_xattr **newxattr)
572 {
573 	struct rb_node **p;
574 	struct rb_node *parent = NULL;
575 	struct ceph_inode_xattr *xattr = NULL;
576 	int c;
577 	int new = 0;
578 
579 	p = &ci->i_xattrs.index.rb_node;
580 	while (*p) {
581 		parent = *p;
582 		xattr = rb_entry(parent, struct ceph_inode_xattr, node);
583 		c = strncmp(name, xattr->name, min(name_len, xattr->name_len));
584 		if (c < 0)
585 			p = &(*p)->rb_left;
586 		else if (c > 0)
587 			p = &(*p)->rb_right;
588 		else {
589 			if (name_len == xattr->name_len)
590 				break;
591 			else if (name_len < xattr->name_len)
592 				p = &(*p)->rb_left;
593 			else
594 				p = &(*p)->rb_right;
595 		}
596 		xattr = NULL;
597 	}
598 
599 	if (update_xattr) {
600 		int err = 0;
601 
602 		if (xattr && (flags & XATTR_CREATE))
603 			err = -EEXIST;
604 		else if (!xattr && (flags & XATTR_REPLACE))
605 			err = -ENODATA;
606 		if (err) {
607 			kfree(name);
608 			kfree(val);
609 			kfree(*newxattr);
610 			return err;
611 		}
612 		if (update_xattr < 0) {
613 			if (xattr)
614 				__remove_xattr(ci, xattr);
615 			kfree(name);
616 			kfree(*newxattr);
617 			return 0;
618 		}
619 	}
620 
621 	if (!xattr) {
622 		new = 1;
623 		xattr = *newxattr;
624 		xattr->name = name;
625 		xattr->name_len = name_len;
626 		xattr->should_free_name = update_xattr;
627 
628 		ci->i_xattrs.count++;
629 		dout("%s count=%d\n", __func__, ci->i_xattrs.count);
630 	} else {
631 		kfree(*newxattr);
632 		*newxattr = NULL;
633 		if (xattr->should_free_val)
634 			kfree(xattr->val);
635 
636 		if (update_xattr) {
637 			kfree(name);
638 			name = xattr->name;
639 		}
640 		ci->i_xattrs.names_size -= xattr->name_len;
641 		ci->i_xattrs.vals_size -= xattr->val_len;
642 	}
643 	ci->i_xattrs.names_size += name_len;
644 	ci->i_xattrs.vals_size += val_len;
645 	if (val)
646 		xattr->val = val;
647 	else
648 		xattr->val = "";
649 
650 	xattr->val_len = val_len;
651 	xattr->dirty = update_xattr;
652 	xattr->should_free_val = (val && update_xattr);
653 
654 	if (new) {
655 		rb_link_node(&xattr->node, parent, p);
656 		rb_insert_color(&xattr->node, &ci->i_xattrs.index);
657 		dout("%s p=%p\n", __func__, p);
658 	}
659 
660 	dout("%s added %llx.%llx xattr %p %.*s=%.*s%s\n", __func__,
661 	     ceph_vinop(&ci->netfs.inode), xattr, name_len, name,
662 	     min(val_len, MAX_XATTR_VAL_PRINT_LEN), val,
663 	     val_len > MAX_XATTR_VAL_PRINT_LEN ? "..." : "");
664 
665 	return 0;
666 }
667 
668 static struct ceph_inode_xattr *__get_xattr(struct ceph_inode_info *ci,
669 			   const char *name)
670 {
671 	struct rb_node **p;
672 	struct rb_node *parent = NULL;
673 	struct ceph_inode_xattr *xattr = NULL;
674 	int name_len = strlen(name);
675 	int c;
676 
677 	p = &ci->i_xattrs.index.rb_node;
678 	while (*p) {
679 		parent = *p;
680 		xattr = rb_entry(parent, struct ceph_inode_xattr, node);
681 		c = strncmp(name, xattr->name, xattr->name_len);
682 		if (c == 0 && name_len > xattr->name_len)
683 			c = 1;
684 		if (c < 0)
685 			p = &(*p)->rb_left;
686 		else if (c > 0)
687 			p = &(*p)->rb_right;
688 		else {
689 			int len = min(xattr->val_len, MAX_XATTR_VAL_PRINT_LEN);
690 
691 			dout("%s %s: found %.*s%s\n", __func__, name, len,
692 			     xattr->val, xattr->val_len > len ? "..." : "");
693 			return xattr;
694 		}
695 	}
696 
697 	dout("%s %s: not found\n", __func__, name);
698 
699 	return NULL;
700 }
701 
702 static void __free_xattr(struct ceph_inode_xattr *xattr)
703 {
704 	BUG_ON(!xattr);
705 
706 	if (xattr->should_free_name)
707 		kfree(xattr->name);
708 	if (xattr->should_free_val)
709 		kfree(xattr->val);
710 
711 	kfree(xattr);
712 }
713 
714 static int __remove_xattr(struct ceph_inode_info *ci,
715 			  struct ceph_inode_xattr *xattr)
716 {
717 	if (!xattr)
718 		return -ENODATA;
719 
720 	rb_erase(&xattr->node, &ci->i_xattrs.index);
721 
722 	if (xattr->should_free_name)
723 		kfree(xattr->name);
724 	if (xattr->should_free_val)
725 		kfree(xattr->val);
726 
727 	ci->i_xattrs.names_size -= xattr->name_len;
728 	ci->i_xattrs.vals_size -= xattr->val_len;
729 	ci->i_xattrs.count--;
730 	kfree(xattr);
731 
732 	return 0;
733 }
734 
735 static char *__copy_xattr_names(struct ceph_inode_info *ci,
736 				char *dest)
737 {
738 	struct rb_node *p;
739 	struct ceph_inode_xattr *xattr = NULL;
740 
741 	p = rb_first(&ci->i_xattrs.index);
742 	dout("__copy_xattr_names count=%d\n", ci->i_xattrs.count);
743 
744 	while (p) {
745 		xattr = rb_entry(p, struct ceph_inode_xattr, node);
746 		memcpy(dest, xattr->name, xattr->name_len);
747 		dest[xattr->name_len] = '\0';
748 
749 		dout("dest=%s %p (%s) (%d/%d)\n", dest, xattr, xattr->name,
750 		     xattr->name_len, ci->i_xattrs.names_size);
751 
752 		dest += xattr->name_len + 1;
753 		p = rb_next(p);
754 	}
755 
756 	return dest;
757 }
758 
759 void __ceph_destroy_xattrs(struct ceph_inode_info *ci)
760 {
761 	struct rb_node *p, *tmp;
762 	struct ceph_inode_xattr *xattr = NULL;
763 
764 	p = rb_first(&ci->i_xattrs.index);
765 
766 	dout("__ceph_destroy_xattrs p=%p\n", p);
767 
768 	while (p) {
769 		xattr = rb_entry(p, struct ceph_inode_xattr, node);
770 		tmp = p;
771 		p = rb_next(tmp);
772 		dout("__ceph_destroy_xattrs next p=%p (%.*s)\n", p,
773 		     xattr->name_len, xattr->name);
774 		rb_erase(tmp, &ci->i_xattrs.index);
775 
776 		__free_xattr(xattr);
777 	}
778 
779 	ci->i_xattrs.names_size = 0;
780 	ci->i_xattrs.vals_size = 0;
781 	ci->i_xattrs.index_version = 0;
782 	ci->i_xattrs.count = 0;
783 	ci->i_xattrs.index = RB_ROOT;
784 }
785 
786 static int __build_xattrs(struct inode *inode)
787 	__releases(ci->i_ceph_lock)
788 	__acquires(ci->i_ceph_lock)
789 {
790 	u32 namelen;
791 	u32 numattr = 0;
792 	void *p, *end;
793 	u32 len;
794 	const char *name, *val;
795 	struct ceph_inode_info *ci = ceph_inode(inode);
796 	u64 xattr_version;
797 	struct ceph_inode_xattr **xattrs = NULL;
798 	int err = 0;
799 	int i;
800 
801 	dout("__build_xattrs() len=%d\n",
802 	     ci->i_xattrs.blob ? (int)ci->i_xattrs.blob->vec.iov_len : 0);
803 
804 	if (ci->i_xattrs.index_version >= ci->i_xattrs.version)
805 		return 0; /* already built */
806 
807 	__ceph_destroy_xattrs(ci);
808 
809 start:
810 	/* updated internal xattr rb tree */
811 	if (ci->i_xattrs.blob && ci->i_xattrs.blob->vec.iov_len > 4) {
812 		p = ci->i_xattrs.blob->vec.iov_base;
813 		end = p + ci->i_xattrs.blob->vec.iov_len;
814 		ceph_decode_32_safe(&p, end, numattr, bad);
815 		xattr_version = ci->i_xattrs.version;
816 		spin_unlock(&ci->i_ceph_lock);
817 
818 		xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *),
819 				 GFP_NOFS);
820 		err = -ENOMEM;
821 		if (!xattrs)
822 			goto bad_lock;
823 
824 		for (i = 0; i < numattr; i++) {
825 			xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr),
826 					    GFP_NOFS);
827 			if (!xattrs[i])
828 				goto bad_lock;
829 		}
830 
831 		spin_lock(&ci->i_ceph_lock);
832 		if (ci->i_xattrs.version != xattr_version) {
833 			/* lost a race, retry */
834 			for (i = 0; i < numattr; i++)
835 				kfree(xattrs[i]);
836 			kfree(xattrs);
837 			xattrs = NULL;
838 			goto start;
839 		}
840 		err = -EIO;
841 		while (numattr--) {
842 			ceph_decode_32_safe(&p, end, len, bad);
843 			namelen = len;
844 			name = p;
845 			p += len;
846 			ceph_decode_32_safe(&p, end, len, bad);
847 			val = p;
848 			p += len;
849 
850 			err = __set_xattr(ci, name, namelen, val, len,
851 					  0, 0, &xattrs[numattr]);
852 
853 			if (err < 0)
854 				goto bad;
855 		}
856 		kfree(xattrs);
857 	}
858 	ci->i_xattrs.index_version = ci->i_xattrs.version;
859 	ci->i_xattrs.dirty = false;
860 
861 	return err;
862 bad_lock:
863 	spin_lock(&ci->i_ceph_lock);
864 bad:
865 	if (xattrs) {
866 		for (i = 0; i < numattr; i++)
867 			kfree(xattrs[i]);
868 		kfree(xattrs);
869 	}
870 	ci->i_xattrs.names_size = 0;
871 	return err;
872 }
873 
874 static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size,
875 				    int val_size)
876 {
877 	/*
878 	 * 4 bytes for the length, and additional 4 bytes per each xattr name,
879 	 * 4 bytes per each value
880 	 */
881 	int size = 4 + ci->i_xattrs.count*(4 + 4) +
882 			     ci->i_xattrs.names_size +
883 			     ci->i_xattrs.vals_size;
884 	dout("__get_required_blob_size c=%d names.size=%d vals.size=%d\n",
885 	     ci->i_xattrs.count, ci->i_xattrs.names_size,
886 	     ci->i_xattrs.vals_size);
887 
888 	if (name_size)
889 		size += 4 + 4 + name_size + val_size;
890 
891 	return size;
892 }
893 
894 /*
895  * If there are dirty xattrs, reencode xattrs into the prealloc_blob
896  * and swap into place.  It returns the old i_xattrs.blob (or NULL) so
897  * that it can be freed by the caller as the i_ceph_lock is likely to be
898  * held.
899  */
900 struct ceph_buffer *__ceph_build_xattrs_blob(struct ceph_inode_info *ci)
901 {
902 	struct rb_node *p;
903 	struct ceph_inode_xattr *xattr = NULL;
904 	struct ceph_buffer *old_blob = NULL;
905 	void *dest;
906 
907 	dout("__build_xattrs_blob %p\n", &ci->netfs.inode);
908 	if (ci->i_xattrs.dirty) {
909 		int need = __get_required_blob_size(ci, 0, 0);
910 
911 		BUG_ON(need > ci->i_xattrs.prealloc_blob->alloc_len);
912 
913 		p = rb_first(&ci->i_xattrs.index);
914 		dest = ci->i_xattrs.prealloc_blob->vec.iov_base;
915 
916 		ceph_encode_32(&dest, ci->i_xattrs.count);
917 		while (p) {
918 			xattr = rb_entry(p, struct ceph_inode_xattr, node);
919 
920 			ceph_encode_32(&dest, xattr->name_len);
921 			memcpy(dest, xattr->name, xattr->name_len);
922 			dest += xattr->name_len;
923 			ceph_encode_32(&dest, xattr->val_len);
924 			memcpy(dest, xattr->val, xattr->val_len);
925 			dest += xattr->val_len;
926 
927 			p = rb_next(p);
928 		}
929 
930 		/* adjust buffer len; it may be larger than we need */
931 		ci->i_xattrs.prealloc_blob->vec.iov_len =
932 			dest - ci->i_xattrs.prealloc_blob->vec.iov_base;
933 
934 		if (ci->i_xattrs.blob)
935 			old_blob = ci->i_xattrs.blob;
936 		ci->i_xattrs.blob = ci->i_xattrs.prealloc_blob;
937 		ci->i_xattrs.prealloc_blob = NULL;
938 		ci->i_xattrs.dirty = false;
939 		ci->i_xattrs.version++;
940 	}
941 
942 	return old_blob;
943 }
944 
945 static inline int __get_request_mask(struct inode *in) {
946 	struct ceph_mds_request *req = current->journal_info;
947 	int mask = 0;
948 	if (req && req->r_target_inode == in) {
949 		if (req->r_op == CEPH_MDS_OP_LOOKUP ||
950 		    req->r_op == CEPH_MDS_OP_LOOKUPINO ||
951 		    req->r_op == CEPH_MDS_OP_LOOKUPPARENT ||
952 		    req->r_op == CEPH_MDS_OP_GETATTR) {
953 			mask = le32_to_cpu(req->r_args.getattr.mask);
954 		} else if (req->r_op == CEPH_MDS_OP_OPEN ||
955 			   req->r_op == CEPH_MDS_OP_CREATE) {
956 			mask = le32_to_cpu(req->r_args.open.mask);
957 		}
958 	}
959 	return mask;
960 }
961 
962 ssize_t __ceph_getxattr(struct inode *inode, const char *name, void *value,
963 		      size_t size)
964 {
965 	struct ceph_inode_info *ci = ceph_inode(inode);
966 	struct ceph_inode_xattr *xattr;
967 	struct ceph_vxattr *vxattr;
968 	int req_mask;
969 	ssize_t err;
970 
971 	if (strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN))
972 		goto handle_non_vxattrs;
973 
974 	/* let's see if a virtual xattr was requested */
975 	vxattr = ceph_match_vxattr(inode, name);
976 	if (vxattr) {
977 		int mask = 0;
978 		if (vxattr->flags & VXATTR_FLAG_RSTAT)
979 			mask |= CEPH_STAT_RSTAT;
980 		if (vxattr->flags & VXATTR_FLAG_DIRSTAT)
981 			mask |= CEPH_CAP_FILE_SHARED;
982 		err = ceph_do_getattr(inode, mask, true);
983 		if (err)
984 			return err;
985 		err = -ENODATA;
986 		if (!(vxattr->exists_cb && !vxattr->exists_cb(ci))) {
987 			err = vxattr->getxattr_cb(ci, value, size);
988 			if (size && size < err)
989 				err = -ERANGE;
990 		}
991 		return err;
992 	} else {
993 		err = ceph_do_getvxattr(inode, name, value, size);
994 		/* this would happen with a new client and old server combo */
995 		if (err == -EOPNOTSUPP)
996 			err = -ENODATA;
997 		return err;
998 	}
999 handle_non_vxattrs:
1000 	req_mask = __get_request_mask(inode);
1001 
1002 	spin_lock(&ci->i_ceph_lock);
1003 	dout("getxattr %p name '%s' ver=%lld index_ver=%lld\n", inode, name,
1004 	     ci->i_xattrs.version, ci->i_xattrs.index_version);
1005 
1006 	if (ci->i_xattrs.version == 0 ||
1007 	    !((req_mask & CEPH_CAP_XATTR_SHARED) ||
1008 	      __ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1))) {
1009 		spin_unlock(&ci->i_ceph_lock);
1010 
1011 		/* security module gets xattr while filling trace */
1012 		if (current->journal_info) {
1013 			pr_warn_ratelimited("sync getxattr %p "
1014 					    "during filling trace\n", inode);
1015 			return -EBUSY;
1016 		}
1017 
1018 		/* get xattrs from mds (if we don't already have them) */
1019 		err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
1020 		if (err)
1021 			return err;
1022 		spin_lock(&ci->i_ceph_lock);
1023 	}
1024 
1025 	err = __build_xattrs(inode);
1026 	if (err < 0)
1027 		goto out;
1028 
1029 	err = -ENODATA;  /* == ENOATTR */
1030 	xattr = __get_xattr(ci, name);
1031 	if (!xattr)
1032 		goto out;
1033 
1034 	err = -ERANGE;
1035 	if (size && size < xattr->val_len)
1036 		goto out;
1037 
1038 	err = xattr->val_len;
1039 	if (size == 0)
1040 		goto out;
1041 
1042 	memcpy(value, xattr->val, xattr->val_len);
1043 
1044 	if (current->journal_info &&
1045 	    !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) &&
1046 	    security_ismaclabel(name + XATTR_SECURITY_PREFIX_LEN))
1047 		ci->i_ceph_flags |= CEPH_I_SEC_INITED;
1048 out:
1049 	spin_unlock(&ci->i_ceph_lock);
1050 	return err;
1051 }
1052 
1053 ssize_t ceph_listxattr(struct dentry *dentry, char *names, size_t size)
1054 {
1055 	struct inode *inode = d_inode(dentry);
1056 	struct ceph_inode_info *ci = ceph_inode(inode);
1057 	bool len_only = (size == 0);
1058 	u32 namelen;
1059 	int err;
1060 
1061 	spin_lock(&ci->i_ceph_lock);
1062 	dout("listxattr %p ver=%lld index_ver=%lld\n", inode,
1063 	     ci->i_xattrs.version, ci->i_xattrs.index_version);
1064 
1065 	if (ci->i_xattrs.version == 0 ||
1066 	    !__ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1)) {
1067 		spin_unlock(&ci->i_ceph_lock);
1068 		err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
1069 		if (err)
1070 			return err;
1071 		spin_lock(&ci->i_ceph_lock);
1072 	}
1073 
1074 	err = __build_xattrs(inode);
1075 	if (err < 0)
1076 		goto out;
1077 
1078 	/* add 1 byte for each xattr due to the null termination */
1079 	namelen = ci->i_xattrs.names_size + ci->i_xattrs.count;
1080 	if (!len_only) {
1081 		if (namelen > size) {
1082 			err = -ERANGE;
1083 			goto out;
1084 		}
1085 		names = __copy_xattr_names(ci, names);
1086 		size -= namelen;
1087 	}
1088 	err = namelen;
1089 out:
1090 	spin_unlock(&ci->i_ceph_lock);
1091 	return err;
1092 }
1093 
1094 static int ceph_sync_setxattr(struct inode *inode, const char *name,
1095 			      const char *value, size_t size, int flags)
1096 {
1097 	struct ceph_fs_client *fsc = ceph_sb_to_fs_client(inode->i_sb);
1098 	struct ceph_inode_info *ci = ceph_inode(inode);
1099 	struct ceph_mds_request *req;
1100 	struct ceph_mds_client *mdsc = fsc->mdsc;
1101 	struct ceph_osd_client *osdc = &fsc->client->osdc;
1102 	struct ceph_pagelist *pagelist = NULL;
1103 	int op = CEPH_MDS_OP_SETXATTR;
1104 	int err;
1105 
1106 	if (size > 0) {
1107 		/* copy value into pagelist */
1108 		pagelist = ceph_pagelist_alloc(GFP_NOFS);
1109 		if (!pagelist)
1110 			return -ENOMEM;
1111 
1112 		err = ceph_pagelist_append(pagelist, value, size);
1113 		if (err)
1114 			goto out;
1115 	} else if (!value) {
1116 		if (flags & CEPH_XATTR_REPLACE)
1117 			op = CEPH_MDS_OP_RMXATTR;
1118 		else
1119 			flags |= CEPH_XATTR_REMOVE;
1120 	}
1121 
1122 	dout("setxattr value size: %zu\n", size);
1123 
1124 	/* do request */
1125 	req = ceph_mdsc_create_request(mdsc, op, USE_AUTH_MDS);
1126 	if (IS_ERR(req)) {
1127 		err = PTR_ERR(req);
1128 		goto out;
1129 	}
1130 
1131 	req->r_path2 = kstrdup(name, GFP_NOFS);
1132 	if (!req->r_path2) {
1133 		ceph_mdsc_put_request(req);
1134 		err = -ENOMEM;
1135 		goto out;
1136 	}
1137 
1138 	if (op == CEPH_MDS_OP_SETXATTR) {
1139 		req->r_args.setxattr.flags = cpu_to_le32(flags);
1140 		req->r_args.setxattr.osdmap_epoch =
1141 			cpu_to_le32(osdc->osdmap->epoch);
1142 		req->r_pagelist = pagelist;
1143 		pagelist = NULL;
1144 	}
1145 
1146 	req->r_inode = inode;
1147 	ihold(inode);
1148 	req->r_num_caps = 1;
1149 	req->r_inode_drop = CEPH_CAP_XATTR_SHARED;
1150 
1151 	dout("xattr.ver (before): %lld\n", ci->i_xattrs.version);
1152 	err = ceph_mdsc_do_request(mdsc, NULL, req);
1153 	ceph_mdsc_put_request(req);
1154 	dout("xattr.ver (after): %lld\n", ci->i_xattrs.version);
1155 
1156 out:
1157 	if (pagelist)
1158 		ceph_pagelist_release(pagelist);
1159 	return err;
1160 }
1161 
1162 int __ceph_setxattr(struct inode *inode, const char *name,
1163 			const void *value, size_t size, int flags)
1164 {
1165 	struct ceph_vxattr *vxattr;
1166 	struct ceph_inode_info *ci = ceph_inode(inode);
1167 	struct ceph_mds_client *mdsc = ceph_sb_to_fs_client(inode->i_sb)->mdsc;
1168 	struct ceph_cap_flush *prealloc_cf = NULL;
1169 	struct ceph_buffer *old_blob = NULL;
1170 	int issued;
1171 	int err;
1172 	int dirty = 0;
1173 	int name_len = strlen(name);
1174 	int val_len = size;
1175 	char *newname = NULL;
1176 	char *newval = NULL;
1177 	struct ceph_inode_xattr *xattr = NULL;
1178 	int required_blob_size;
1179 	bool check_realm = false;
1180 	bool lock_snap_rwsem = false;
1181 
1182 	if (ceph_snap(inode) != CEPH_NOSNAP)
1183 		return -EROFS;
1184 
1185 	vxattr = ceph_match_vxattr(inode, name);
1186 	if (vxattr) {
1187 		if (vxattr->flags & VXATTR_FLAG_READONLY)
1188 			return -EOPNOTSUPP;
1189 		if (value && !strncmp(vxattr->name, "ceph.quota", 10))
1190 			check_realm = true;
1191 	}
1192 
1193 	/* pass any unhandled ceph.* xattrs through to the MDS */
1194 	if (!strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN))
1195 		goto do_sync_unlocked;
1196 
1197 	/* preallocate memory for xattr name, value, index node */
1198 	err = -ENOMEM;
1199 	newname = kmemdup(name, name_len + 1, GFP_NOFS);
1200 	if (!newname)
1201 		goto out;
1202 
1203 	if (val_len) {
1204 		newval = kmemdup(value, val_len, GFP_NOFS);
1205 		if (!newval)
1206 			goto out;
1207 	}
1208 
1209 	xattr = kmalloc(sizeof(struct ceph_inode_xattr), GFP_NOFS);
1210 	if (!xattr)
1211 		goto out;
1212 
1213 	prealloc_cf = ceph_alloc_cap_flush();
1214 	if (!prealloc_cf)
1215 		goto out;
1216 
1217 	spin_lock(&ci->i_ceph_lock);
1218 retry:
1219 	issued = __ceph_caps_issued(ci, NULL);
1220 	required_blob_size = __get_required_blob_size(ci, name_len, val_len);
1221 	if ((ci->i_xattrs.version == 0) || !(issued & CEPH_CAP_XATTR_EXCL) ||
1222 	    (required_blob_size > mdsc->mdsmap->m_max_xattr_size)) {
1223 		dout("%s do sync setxattr: version: %llu size: %d max: %llu\n",
1224 		     __func__, ci->i_xattrs.version, required_blob_size,
1225 		     mdsc->mdsmap->m_max_xattr_size);
1226 		goto do_sync;
1227 	}
1228 
1229 	if (!lock_snap_rwsem && !ci->i_head_snapc) {
1230 		lock_snap_rwsem = true;
1231 		if (!down_read_trylock(&mdsc->snap_rwsem)) {
1232 			spin_unlock(&ci->i_ceph_lock);
1233 			down_read(&mdsc->snap_rwsem);
1234 			spin_lock(&ci->i_ceph_lock);
1235 			goto retry;
1236 		}
1237 	}
1238 
1239 	dout("setxattr %p name '%s' issued %s\n", inode, name,
1240 	     ceph_cap_string(issued));
1241 	__build_xattrs(inode);
1242 
1243 	if (!ci->i_xattrs.prealloc_blob ||
1244 	    required_blob_size > ci->i_xattrs.prealloc_blob->alloc_len) {
1245 		struct ceph_buffer *blob;
1246 
1247 		spin_unlock(&ci->i_ceph_lock);
1248 		ceph_buffer_put(old_blob); /* Shouldn't be required */
1249 		dout(" pre-allocating new blob size=%d\n", required_blob_size);
1250 		blob = ceph_buffer_new(required_blob_size, GFP_NOFS);
1251 		if (!blob)
1252 			goto do_sync_unlocked;
1253 		spin_lock(&ci->i_ceph_lock);
1254 		/* prealloc_blob can't be released while holding i_ceph_lock */
1255 		if (ci->i_xattrs.prealloc_blob)
1256 			old_blob = ci->i_xattrs.prealloc_blob;
1257 		ci->i_xattrs.prealloc_blob = blob;
1258 		goto retry;
1259 	}
1260 
1261 	err = __set_xattr(ci, newname, name_len, newval, val_len,
1262 			  flags, value ? 1 : -1, &xattr);
1263 
1264 	if (!err) {
1265 		dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_XATTR_EXCL,
1266 					       &prealloc_cf);
1267 		ci->i_xattrs.dirty = true;
1268 		inode_set_ctime_current(inode);
1269 	}
1270 
1271 	spin_unlock(&ci->i_ceph_lock);
1272 	ceph_buffer_put(old_blob);
1273 	if (lock_snap_rwsem)
1274 		up_read(&mdsc->snap_rwsem);
1275 	if (dirty)
1276 		__mark_inode_dirty(inode, dirty);
1277 	ceph_free_cap_flush(prealloc_cf);
1278 	return err;
1279 
1280 do_sync:
1281 	spin_unlock(&ci->i_ceph_lock);
1282 do_sync_unlocked:
1283 	if (lock_snap_rwsem)
1284 		up_read(&mdsc->snap_rwsem);
1285 
1286 	/* security module set xattr while filling trace */
1287 	if (current->journal_info) {
1288 		pr_warn_ratelimited("sync setxattr %p "
1289 				    "during filling trace\n", inode);
1290 		err = -EBUSY;
1291 	} else {
1292 		err = ceph_sync_setxattr(inode, name, value, size, flags);
1293 		if (err >= 0 && check_realm) {
1294 			/* check if snaprealm was created for quota inode */
1295 			spin_lock(&ci->i_ceph_lock);
1296 			if ((ci->i_max_files || ci->i_max_bytes) &&
1297 			    !(ci->i_snap_realm &&
1298 			      ci->i_snap_realm->ino == ci->i_vino.ino))
1299 				err = -EOPNOTSUPP;
1300 			spin_unlock(&ci->i_ceph_lock);
1301 		}
1302 	}
1303 out:
1304 	ceph_free_cap_flush(prealloc_cf);
1305 	kfree(newname);
1306 	kfree(newval);
1307 	kfree(xattr);
1308 	return err;
1309 }
1310 
1311 static int ceph_get_xattr_handler(const struct xattr_handler *handler,
1312 				  struct dentry *dentry, struct inode *inode,
1313 				  const char *name, void *value, size_t size)
1314 {
1315 	if (!ceph_is_valid_xattr(name))
1316 		return -EOPNOTSUPP;
1317 	return __ceph_getxattr(inode, name, value, size);
1318 }
1319 
1320 static int ceph_set_xattr_handler(const struct xattr_handler *handler,
1321 				  struct mnt_idmap *idmap,
1322 				  struct dentry *unused, struct inode *inode,
1323 				  const char *name, const void *value,
1324 				  size_t size, int flags)
1325 {
1326 	if (!ceph_is_valid_xattr(name))
1327 		return -EOPNOTSUPP;
1328 	return __ceph_setxattr(inode, name, value, size, flags);
1329 }
1330 
1331 static const struct xattr_handler ceph_other_xattr_handler = {
1332 	.prefix = "",  /* match any name => handlers called with full name */
1333 	.get = ceph_get_xattr_handler,
1334 	.set = ceph_set_xattr_handler,
1335 };
1336 
1337 #ifdef CONFIG_SECURITY
1338 bool ceph_security_xattr_wanted(struct inode *in)
1339 {
1340 	return in->i_security != NULL;
1341 }
1342 
1343 bool ceph_security_xattr_deadlock(struct inode *in)
1344 {
1345 	struct ceph_inode_info *ci;
1346 	bool ret;
1347 	if (!in->i_security)
1348 		return false;
1349 	ci = ceph_inode(in);
1350 	spin_lock(&ci->i_ceph_lock);
1351 	ret = !(ci->i_ceph_flags & CEPH_I_SEC_INITED) &&
1352 	      !(ci->i_xattrs.version > 0 &&
1353 		__ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 0));
1354 	spin_unlock(&ci->i_ceph_lock);
1355 	return ret;
1356 }
1357 
1358 #ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1359 int ceph_security_init_secctx(struct dentry *dentry, umode_t mode,
1360 			   struct ceph_acl_sec_ctx *as_ctx)
1361 {
1362 	struct ceph_pagelist *pagelist = as_ctx->pagelist;
1363 	const char *name;
1364 	size_t name_len;
1365 	int err;
1366 
1367 	err = security_dentry_init_security(dentry, mode, &dentry->d_name,
1368 					    &name, &as_ctx->sec_ctx,
1369 					    &as_ctx->sec_ctxlen);
1370 	if (err < 0) {
1371 		WARN_ON_ONCE(err != -EOPNOTSUPP);
1372 		err = 0; /* do nothing */
1373 		goto out;
1374 	}
1375 
1376 	err = -ENOMEM;
1377 	if (!pagelist) {
1378 		pagelist = ceph_pagelist_alloc(GFP_KERNEL);
1379 		if (!pagelist)
1380 			goto out;
1381 		err = ceph_pagelist_reserve(pagelist, PAGE_SIZE);
1382 		if (err)
1383 			goto out;
1384 		ceph_pagelist_encode_32(pagelist, 1);
1385 	}
1386 
1387 	/*
1388 	 * FIXME: Make security_dentry_init_security() generic. Currently
1389 	 * It only supports single security module and only selinux has
1390 	 * dentry_init_security hook.
1391 	 */
1392 	name_len = strlen(name);
1393 	err = ceph_pagelist_reserve(pagelist,
1394 				    4 * 2 + name_len + as_ctx->sec_ctxlen);
1395 	if (err)
1396 		goto out;
1397 
1398 	if (as_ctx->pagelist) {
1399 		/* update count of KV pairs */
1400 		BUG_ON(pagelist->length <= sizeof(__le32));
1401 		if (list_is_singular(&pagelist->head)) {
1402 			le32_add_cpu((__le32*)pagelist->mapped_tail, 1);
1403 		} else {
1404 			struct page *page = list_first_entry(&pagelist->head,
1405 							     struct page, lru);
1406 			void *addr = kmap_atomic(page);
1407 			le32_add_cpu((__le32*)addr, 1);
1408 			kunmap_atomic(addr);
1409 		}
1410 	} else {
1411 		as_ctx->pagelist = pagelist;
1412 	}
1413 
1414 	ceph_pagelist_encode_32(pagelist, name_len);
1415 	ceph_pagelist_append(pagelist, name, name_len);
1416 
1417 	ceph_pagelist_encode_32(pagelist, as_ctx->sec_ctxlen);
1418 	ceph_pagelist_append(pagelist, as_ctx->sec_ctx, as_ctx->sec_ctxlen);
1419 
1420 	err = 0;
1421 out:
1422 	if (pagelist && !as_ctx->pagelist)
1423 		ceph_pagelist_release(pagelist);
1424 	return err;
1425 }
1426 #endif /* CONFIG_CEPH_FS_SECURITY_LABEL */
1427 #endif /* CONFIG_SECURITY */
1428 
1429 void ceph_release_acl_sec_ctx(struct ceph_acl_sec_ctx *as_ctx)
1430 {
1431 #ifdef CONFIG_CEPH_FS_POSIX_ACL
1432 	posix_acl_release(as_ctx->acl);
1433 	posix_acl_release(as_ctx->default_acl);
1434 #endif
1435 #ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1436 	security_release_secctx(as_ctx->sec_ctx, as_ctx->sec_ctxlen);
1437 #endif
1438 #ifdef CONFIG_FS_ENCRYPTION
1439 	kfree(as_ctx->fscrypt_auth);
1440 #endif
1441 	if (as_ctx->pagelist)
1442 		ceph_pagelist_release(as_ctx->pagelist);
1443 }
1444 
1445 /*
1446  * List of handlers for synthetic system.* attributes. Other
1447  * attributes are handled directly.
1448  */
1449 const struct xattr_handler *ceph_xattr_handlers[] = {
1450 	&ceph_other_xattr_handler,
1451 	NULL,
1452 };
1453