1// SPDX-License-Identifier: GPL-2.0
2#include <linux/ceph/ceph_debug.h>
3#include <linux/ceph/pagelist.h>
4
5#include "super.h"
6#include "mds_client.h"
7
8#include <linux/ceph/decode.h>
9
10#include <linux/xattr.h>
11#include <linux/security.h>
12#include <linux/posix_acl_xattr.h>
13#include <linux/slab.h>
14
15#define XATTR_CEPH_PREFIX "ceph."
16#define XATTR_CEPH_PREFIX_LEN (sizeof (XATTR_CEPH_PREFIX) - 1)
17
18static int __remove_xattr(struct ceph_inode_info *ci,
19			  struct ceph_inode_xattr *xattr);
20
21static bool ceph_is_valid_xattr(const char *name)
22{
23	return !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) ||
24	       !strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN) ||
25	       !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) ||
26	       !strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN);
27}
28
29/*
30 * These define virtual xattrs exposing the recursive directory
31 * statistics and layout metadata.
32 */
33struct ceph_vxattr {
34	char *name;
35	size_t name_size;	/* strlen(name) + 1 (for '\0') */
36	ssize_t (*getxattr_cb)(struct ceph_inode_info *ci, char *val,
37			       size_t size);
38	bool (*exists_cb)(struct ceph_inode_info *ci);
39	unsigned int flags;
40};
41
42#define VXATTR_FLAG_READONLY		(1<<0)
43#define VXATTR_FLAG_HIDDEN		(1<<1)
44#define VXATTR_FLAG_RSTAT		(1<<2)
45#define VXATTR_FLAG_DIRSTAT		(1<<3)
46
47/* layouts */
48
49static bool ceph_vxattrcb_layout_exists(struct ceph_inode_info *ci)
50{
51	struct ceph_file_layout *fl = &ci->i_layout;
52	return (fl->stripe_unit > 0 || fl->stripe_count > 0 ||
53		fl->object_size > 0 || fl->pool_id >= 0 ||
54		rcu_dereference_raw(fl->pool_ns) != NULL);
55}
56
57static ssize_t ceph_vxattrcb_layout(struct ceph_inode_info *ci, char *val,
58				    size_t size)
59{
60	struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
61	struct ceph_client *cl = fsc->client;
62	struct ceph_osd_client *osdc = &fsc->client->osdc;
63	struct ceph_string *pool_ns;
64	s64 pool = ci->i_layout.pool_id;
65	const char *pool_name;
66	const char *ns_field = " pool_namespace=";
67	char buf[128];
68	size_t len, total_len = 0;
69	ssize_t ret;
70
71	pool_ns = ceph_try_get_string(ci->i_layout.pool_ns);
72
73	doutc(cl, "%p\n", &ci->netfs.inode);
74	down_read(&osdc->lock);
75	pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
76	if (pool_name) {
77		len = snprintf(buf, sizeof(buf),
78		"stripe_unit=%u stripe_count=%u object_size=%u pool=",
79		ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
80	        ci->i_layout.object_size);
81		total_len = len + strlen(pool_name);
82	} else {
83		len = snprintf(buf, sizeof(buf),
84		"stripe_unit=%u stripe_count=%u object_size=%u pool=%lld",
85		ci->i_layout.stripe_unit, ci->i_layout.stripe_count,
86		ci->i_layout.object_size, pool);
87		total_len = len;
88	}
89
90	if (pool_ns)
91		total_len += strlen(ns_field) + pool_ns->len;
92
93	ret = total_len;
94	if (size >= total_len) {
95		memcpy(val, buf, len);
96		ret = len;
97		if (pool_name) {
98			len = strlen(pool_name);
99			memcpy(val + ret, pool_name, len);
100			ret += len;
101		}
102		if (pool_ns) {
103			len = strlen(ns_field);
104			memcpy(val + ret, ns_field, len);
105			ret += len;
106			memcpy(val + ret, pool_ns->str, pool_ns->len);
107			ret += pool_ns->len;
108		}
109	}
110	up_read(&osdc->lock);
111	ceph_put_string(pool_ns);
112	return ret;
113}
114
115/*
116 * The convention with strings in xattrs is that they should not be NULL
117 * terminated, since we're returning the length with them. snprintf always
118 * NULL terminates however, so call it on a temporary buffer and then memcpy
119 * the result into place.
120 */
121static __printf(3, 4)
122int ceph_fmt_xattr(char *val, size_t size, const char *fmt, ...)
123{
124	int ret;
125	va_list args;
126	char buf[96]; /* NB: reevaluate size if new vxattrs are added */
127
128	va_start(args, fmt);
129	ret = vsnprintf(buf, size ? sizeof(buf) : 0, fmt, args);
130	va_end(args);
131
132	/* Sanity check */
133	if (size && ret + 1 > sizeof(buf)) {
134		WARN_ONCE(true, "Returned length too big (%d)", ret);
135		return -E2BIG;
136	}
137
138	if (ret <= size)
139		memcpy(val, buf, ret);
140	return ret;
141}
142
143static ssize_t ceph_vxattrcb_layout_stripe_unit(struct ceph_inode_info *ci,
144						char *val, size_t size)
145{
146	return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_unit);
147}
148
149static ssize_t ceph_vxattrcb_layout_stripe_count(struct ceph_inode_info *ci,
150						 char *val, size_t size)
151{
152	return ceph_fmt_xattr(val, size, "%u", ci->i_layout.stripe_count);
153}
154
155static ssize_t ceph_vxattrcb_layout_object_size(struct ceph_inode_info *ci,
156						char *val, size_t size)
157{
158	return ceph_fmt_xattr(val, size, "%u", ci->i_layout.object_size);
159}
160
161static ssize_t ceph_vxattrcb_layout_pool(struct ceph_inode_info *ci,
162					 char *val, size_t size)
163{
164	ssize_t ret;
165	struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
166	struct ceph_osd_client *osdc = &fsc->client->osdc;
167	s64 pool = ci->i_layout.pool_id;
168	const char *pool_name;
169
170	down_read(&osdc->lock);
171	pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, pool);
172	if (pool_name) {
173		ret = strlen(pool_name);
174		if (ret <= size)
175			memcpy(val, pool_name, ret);
176	} else {
177		ret = ceph_fmt_xattr(val, size, "%lld", pool);
178	}
179	up_read(&osdc->lock);
180	return ret;
181}
182
183static ssize_t ceph_vxattrcb_layout_pool_namespace(struct ceph_inode_info *ci,
184						   char *val, size_t size)
185{
186	ssize_t ret = 0;
187	struct ceph_string *ns = ceph_try_get_string(ci->i_layout.pool_ns);
188
189	if (ns) {
190		ret = ns->len;
191		if (ret <= size)
192			memcpy(val, ns->str, ret);
193		ceph_put_string(ns);
194	}
195	return ret;
196}
197
198/* directories */
199
200static ssize_t ceph_vxattrcb_dir_entries(struct ceph_inode_info *ci, char *val,
201					 size_t size)
202{
203	return ceph_fmt_xattr(val, size, "%lld", ci->i_files + ci->i_subdirs);
204}
205
206static ssize_t ceph_vxattrcb_dir_files(struct ceph_inode_info *ci, char *val,
207				       size_t size)
208{
209	return ceph_fmt_xattr(val, size, "%lld", ci->i_files);
210}
211
212static ssize_t ceph_vxattrcb_dir_subdirs(struct ceph_inode_info *ci, char *val,
213					 size_t size)
214{
215	return ceph_fmt_xattr(val, size, "%lld", ci->i_subdirs);
216}
217
218static ssize_t ceph_vxattrcb_dir_rentries(struct ceph_inode_info *ci, char *val,
219					  size_t size)
220{
221	return ceph_fmt_xattr(val, size, "%lld",
222				ci->i_rfiles + ci->i_rsubdirs);
223}
224
225static ssize_t ceph_vxattrcb_dir_rfiles(struct ceph_inode_info *ci, char *val,
226					size_t size)
227{
228	return ceph_fmt_xattr(val, size, "%lld", ci->i_rfiles);
229}
230
231static ssize_t ceph_vxattrcb_dir_rsubdirs(struct ceph_inode_info *ci, char *val,
232					  size_t size)
233{
234	return ceph_fmt_xattr(val, size, "%lld", ci->i_rsubdirs);
235}
236
237static ssize_t ceph_vxattrcb_dir_rsnaps(struct ceph_inode_info *ci, char *val,
238					  size_t size)
239{
240	return ceph_fmt_xattr(val, size, "%lld", ci->i_rsnaps);
241}
242
243static ssize_t ceph_vxattrcb_dir_rbytes(struct ceph_inode_info *ci, char *val,
244					size_t size)
245{
246	return ceph_fmt_xattr(val, size, "%lld", ci->i_rbytes);
247}
248
249static ssize_t ceph_vxattrcb_dir_rctime(struct ceph_inode_info *ci, char *val,
250					size_t size)
251{
252	return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_rctime.tv_sec,
253				ci->i_rctime.tv_nsec);
254}
255
256/* dir pin */
257static bool ceph_vxattrcb_dir_pin_exists(struct ceph_inode_info *ci)
258{
259	return ci->i_dir_pin != -ENODATA;
260}
261
262static ssize_t ceph_vxattrcb_dir_pin(struct ceph_inode_info *ci, char *val,
263				     size_t size)
264{
265	return ceph_fmt_xattr(val, size, "%d", (int)ci->i_dir_pin);
266}
267
268/* quotas */
269static bool ceph_vxattrcb_quota_exists(struct ceph_inode_info *ci)
270{
271	bool ret = false;
272	spin_lock(&ci->i_ceph_lock);
273	if ((ci->i_max_files || ci->i_max_bytes) &&
274	    ci->i_vino.snap == CEPH_NOSNAP &&
275	    ci->i_snap_realm &&
276	    ci->i_snap_realm->ino == ci->i_vino.ino)
277		ret = true;
278	spin_unlock(&ci->i_ceph_lock);
279	return ret;
280}
281
282static ssize_t ceph_vxattrcb_quota(struct ceph_inode_info *ci, char *val,
283				   size_t size)
284{
285	return ceph_fmt_xattr(val, size, "max_bytes=%llu max_files=%llu",
286				ci->i_max_bytes, ci->i_max_files);
287}
288
289static ssize_t ceph_vxattrcb_quota_max_bytes(struct ceph_inode_info *ci,
290					     char *val, size_t size)
291{
292	return ceph_fmt_xattr(val, size, "%llu", ci->i_max_bytes);
293}
294
295static ssize_t ceph_vxattrcb_quota_max_files(struct ceph_inode_info *ci,
296					     char *val, size_t size)
297{
298	return ceph_fmt_xattr(val, size, "%llu", ci->i_max_files);
299}
300
301/* snapshots */
302static bool ceph_vxattrcb_snap_btime_exists(struct ceph_inode_info *ci)
303{
304	return (ci->i_snap_btime.tv_sec != 0 || ci->i_snap_btime.tv_nsec != 0);
305}
306
307static ssize_t ceph_vxattrcb_snap_btime(struct ceph_inode_info *ci, char *val,
308					size_t size)
309{
310	return ceph_fmt_xattr(val, size, "%lld.%09ld", ci->i_snap_btime.tv_sec,
311				ci->i_snap_btime.tv_nsec);
312}
313
314static ssize_t ceph_vxattrcb_cluster_fsid(struct ceph_inode_info *ci,
315					  char *val, size_t size)
316{
317	struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
318
319	return ceph_fmt_xattr(val, size, "%pU", &fsc->client->fsid);
320}
321
322static ssize_t ceph_vxattrcb_client_id(struct ceph_inode_info *ci,
323				       char *val, size_t size)
324{
325	struct ceph_fs_client *fsc = ceph_sb_to_fs_client(ci->netfs.inode.i_sb);
326
327	return ceph_fmt_xattr(val, size, "client%lld",
328			      ceph_client_gid(fsc->client));
329}
330
331static ssize_t ceph_vxattrcb_caps(struct ceph_inode_info *ci, char *val,
332					size_t size)
333{
334	int issued;
335
336	spin_lock(&ci->i_ceph_lock);
337	issued = __ceph_caps_issued(ci, NULL);
338	spin_unlock(&ci->i_ceph_lock);
339
340	return ceph_fmt_xattr(val, size, "%s/0x%x",
341			      ceph_cap_string(issued), issued);
342}
343
344static ssize_t ceph_vxattrcb_auth_mds(struct ceph_inode_info *ci,
345				       char *val, size_t size)
346{
347	int ret;
348
349	spin_lock(&ci->i_ceph_lock);
350	ret = ceph_fmt_xattr(val, size, "%d",
351			     ci->i_auth_cap ? ci->i_auth_cap->session->s_mds : -1);
352	spin_unlock(&ci->i_ceph_lock);
353	return ret;
354}
355
356#if IS_ENABLED(CONFIG_FS_ENCRYPTION)
357static bool ceph_vxattrcb_fscrypt_auth_exists(struct ceph_inode_info *ci)
358{
359	return ci->fscrypt_auth_len;
360}
361
362static ssize_t ceph_vxattrcb_fscrypt_auth(struct ceph_inode_info *ci,
363					  char *val, size_t size)
364{
365	if (size) {
366		if (size < ci->fscrypt_auth_len)
367			return -ERANGE;
368		memcpy(val, ci->fscrypt_auth, ci->fscrypt_auth_len);
369	}
370	return ci->fscrypt_auth_len;
371}
372#endif /* CONFIG_FS_ENCRYPTION */
373
374#define CEPH_XATTR_NAME(_type, _name)	XATTR_CEPH_PREFIX #_type "." #_name
375#define CEPH_XATTR_NAME2(_type, _name, _name2)	\
376	XATTR_CEPH_PREFIX #_type "." #_name "." #_name2
377
378#define XATTR_NAME_CEPH(_type, _name, _flags)				\
379	{								\
380		.name = CEPH_XATTR_NAME(_type, _name),			\
381		.name_size = sizeof (CEPH_XATTR_NAME(_type, _name)), \
382		.getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name, \
383		.exists_cb = NULL,					\
384		.flags = (VXATTR_FLAG_READONLY | _flags),		\
385	}
386#define XATTR_RSTAT_FIELD(_type, _name)			\
387	XATTR_NAME_CEPH(_type, _name, VXATTR_FLAG_RSTAT)
388#define XATTR_RSTAT_FIELD_UPDATABLE(_type, _name)			\
389	{								\
390		.name = CEPH_XATTR_NAME(_type, _name),			\
391		.name_size = sizeof (CEPH_XATTR_NAME(_type, _name)),	\
392		.getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name,	\
393		.exists_cb = NULL,					\
394		.flags = VXATTR_FLAG_RSTAT,				\
395	}
396#define XATTR_LAYOUT_FIELD(_type, _name, _field)			\
397	{								\
398		.name = CEPH_XATTR_NAME2(_type, _name, _field),	\
399		.name_size = sizeof (CEPH_XATTR_NAME2(_type, _name, _field)), \
400		.getxattr_cb = ceph_vxattrcb_ ## _name ## _ ## _field, \
401		.exists_cb = ceph_vxattrcb_layout_exists,	\
402		.flags = VXATTR_FLAG_HIDDEN,			\
403	}
404#define XATTR_QUOTA_FIELD(_type, _name)					\
405	{								\
406		.name = CEPH_XATTR_NAME(_type, _name),			\
407		.name_size = sizeof(CEPH_XATTR_NAME(_type, _name)),	\
408		.getxattr_cb = ceph_vxattrcb_ ## _type ## _ ## _name,	\
409		.exists_cb = ceph_vxattrcb_quota_exists,		\
410		.flags = VXATTR_FLAG_HIDDEN,				\
411	}
412
413static struct ceph_vxattr ceph_dir_vxattrs[] = {
414	{
415		.name = "ceph.dir.layout",
416		.name_size = sizeof("ceph.dir.layout"),
417		.getxattr_cb = ceph_vxattrcb_layout,
418		.exists_cb = ceph_vxattrcb_layout_exists,
419		.flags = VXATTR_FLAG_HIDDEN,
420	},
421	XATTR_LAYOUT_FIELD(dir, layout, stripe_unit),
422	XATTR_LAYOUT_FIELD(dir, layout, stripe_count),
423	XATTR_LAYOUT_FIELD(dir, layout, object_size),
424	XATTR_LAYOUT_FIELD(dir, layout, pool),
425	XATTR_LAYOUT_FIELD(dir, layout, pool_namespace),
426	XATTR_NAME_CEPH(dir, entries, VXATTR_FLAG_DIRSTAT),
427	XATTR_NAME_CEPH(dir, files, VXATTR_FLAG_DIRSTAT),
428	XATTR_NAME_CEPH(dir, subdirs, VXATTR_FLAG_DIRSTAT),
429	XATTR_RSTAT_FIELD(dir, rentries),
430	XATTR_RSTAT_FIELD(dir, rfiles),
431	XATTR_RSTAT_FIELD(dir, rsubdirs),
432	XATTR_RSTAT_FIELD(dir, rsnaps),
433	XATTR_RSTAT_FIELD(dir, rbytes),
434	XATTR_RSTAT_FIELD_UPDATABLE(dir, rctime),
435	{
436		.name = "ceph.dir.pin",
437		.name_size = sizeof("ceph.dir.pin"),
438		.getxattr_cb = ceph_vxattrcb_dir_pin,
439		.exists_cb = ceph_vxattrcb_dir_pin_exists,
440		.flags = VXATTR_FLAG_HIDDEN,
441	},
442	{
443		.name = "ceph.quota",
444		.name_size = sizeof("ceph.quota"),
445		.getxattr_cb = ceph_vxattrcb_quota,
446		.exists_cb = ceph_vxattrcb_quota_exists,
447		.flags = VXATTR_FLAG_HIDDEN,
448	},
449	XATTR_QUOTA_FIELD(quota, max_bytes),
450	XATTR_QUOTA_FIELD(quota, max_files),
451	{
452		.name = "ceph.snap.btime",
453		.name_size = sizeof("ceph.snap.btime"),
454		.getxattr_cb = ceph_vxattrcb_snap_btime,
455		.exists_cb = ceph_vxattrcb_snap_btime_exists,
456		.flags = VXATTR_FLAG_READONLY,
457	},
458	{
459		.name = "ceph.caps",
460		.name_size = sizeof("ceph.caps"),
461		.getxattr_cb = ceph_vxattrcb_caps,
462		.exists_cb = NULL,
463		.flags = VXATTR_FLAG_HIDDEN,
464	},
465	{ .name = NULL, 0 }	/* Required table terminator */
466};
467
468/* files */
469
470static struct ceph_vxattr ceph_file_vxattrs[] = {
471	{
472		.name = "ceph.file.layout",
473		.name_size = sizeof("ceph.file.layout"),
474		.getxattr_cb = ceph_vxattrcb_layout,
475		.exists_cb = ceph_vxattrcb_layout_exists,
476		.flags = VXATTR_FLAG_HIDDEN,
477	},
478	XATTR_LAYOUT_FIELD(file, layout, stripe_unit),
479	XATTR_LAYOUT_FIELD(file, layout, stripe_count),
480	XATTR_LAYOUT_FIELD(file, layout, object_size),
481	XATTR_LAYOUT_FIELD(file, layout, pool),
482	XATTR_LAYOUT_FIELD(file, layout, pool_namespace),
483	{
484		.name = "ceph.snap.btime",
485		.name_size = sizeof("ceph.snap.btime"),
486		.getxattr_cb = ceph_vxattrcb_snap_btime,
487		.exists_cb = ceph_vxattrcb_snap_btime_exists,
488		.flags = VXATTR_FLAG_READONLY,
489	},
490	{
491		.name = "ceph.caps",
492		.name_size = sizeof("ceph.caps"),
493		.getxattr_cb = ceph_vxattrcb_caps,
494		.exists_cb = NULL,
495		.flags = VXATTR_FLAG_HIDDEN,
496	},
497	{ .name = NULL, 0 }	/* Required table terminator */
498};
499
500static struct ceph_vxattr ceph_common_vxattrs[] = {
501	{
502		.name = "ceph.cluster_fsid",
503		.name_size = sizeof("ceph.cluster_fsid"),
504		.getxattr_cb = ceph_vxattrcb_cluster_fsid,
505		.exists_cb = NULL,
506		.flags = VXATTR_FLAG_READONLY,
507	},
508	{
509		.name = "ceph.client_id",
510		.name_size = sizeof("ceph.client_id"),
511		.getxattr_cb = ceph_vxattrcb_client_id,
512		.exists_cb = NULL,
513		.flags = VXATTR_FLAG_READONLY,
514	},
515	{
516		.name = "ceph.auth_mds",
517		.name_size = sizeof("ceph.auth_mds"),
518		.getxattr_cb = ceph_vxattrcb_auth_mds,
519		.exists_cb = NULL,
520		.flags = VXATTR_FLAG_READONLY,
521	},
522#if IS_ENABLED(CONFIG_FS_ENCRYPTION)
523	{
524		.name = "ceph.fscrypt.auth",
525		.name_size = sizeof("ceph.fscrypt.auth"),
526		.getxattr_cb = ceph_vxattrcb_fscrypt_auth,
527		.exists_cb = ceph_vxattrcb_fscrypt_auth_exists,
528		.flags = VXATTR_FLAG_READONLY,
529	},
530#endif /* CONFIG_FS_ENCRYPTION */
531	{ .name = NULL, 0 }	/* Required table terminator */
532};
533
534static struct ceph_vxattr *ceph_inode_vxattrs(struct inode *inode)
535{
536	if (S_ISDIR(inode->i_mode))
537		return ceph_dir_vxattrs;
538	else if (S_ISREG(inode->i_mode))
539		return ceph_file_vxattrs;
540	return NULL;
541}
542
543static struct ceph_vxattr *ceph_match_vxattr(struct inode *inode,
544						const char *name)
545{
546	struct ceph_vxattr *vxattr = ceph_inode_vxattrs(inode);
547
548	if (vxattr) {
549		while (vxattr->name) {
550			if (!strcmp(vxattr->name, name))
551				return vxattr;
552			vxattr++;
553		}
554	}
555
556	vxattr = ceph_common_vxattrs;
557	while (vxattr->name) {
558		if (!strcmp(vxattr->name, name))
559			return vxattr;
560		vxattr++;
561	}
562
563	return NULL;
564}
565
566#define MAX_XATTR_VAL_PRINT_LEN 256
567
568static int __set_xattr(struct ceph_inode_info *ci,
569			   const char *name, int name_len,
570			   const char *val, int val_len,
571			   int flags, int update_xattr,
572			   struct ceph_inode_xattr **newxattr)
573{
574	struct inode *inode = &ci->netfs.inode;
575	struct ceph_client *cl = ceph_inode_to_client(inode);
576	struct rb_node **p;
577	struct rb_node *parent = NULL;
578	struct ceph_inode_xattr *xattr = NULL;
579	int c;
580	int new = 0;
581
582	p = &ci->i_xattrs.index.rb_node;
583	while (*p) {
584		parent = *p;
585		xattr = rb_entry(parent, struct ceph_inode_xattr, node);
586		c = strncmp(name, xattr->name, min(name_len, xattr->name_len));
587		if (c < 0)
588			p = &(*p)->rb_left;
589		else if (c > 0)
590			p = &(*p)->rb_right;
591		else {
592			if (name_len == xattr->name_len)
593				break;
594			else if (name_len < xattr->name_len)
595				p = &(*p)->rb_left;
596			else
597				p = &(*p)->rb_right;
598		}
599		xattr = NULL;
600	}
601
602	if (update_xattr) {
603		int err = 0;
604
605		if (xattr && (flags & XATTR_CREATE))
606			err = -EEXIST;
607		else if (!xattr && (flags & XATTR_REPLACE))
608			err = -ENODATA;
609		if (err) {
610			kfree(name);
611			kfree(val);
612			kfree(*newxattr);
613			return err;
614		}
615		if (update_xattr < 0) {
616			if (xattr)
617				__remove_xattr(ci, xattr);
618			kfree(name);
619			kfree(*newxattr);
620			return 0;
621		}
622	}
623
624	if (!xattr) {
625		new = 1;
626		xattr = *newxattr;
627		xattr->name = name;
628		xattr->name_len = name_len;
629		xattr->should_free_name = update_xattr;
630
631		ci->i_xattrs.count++;
632		doutc(cl, "count=%d\n", ci->i_xattrs.count);
633	} else {
634		kfree(*newxattr);
635		*newxattr = NULL;
636		if (xattr->should_free_val)
637			kfree(xattr->val);
638
639		if (update_xattr) {
640			kfree(name);
641			name = xattr->name;
642		}
643		ci->i_xattrs.names_size -= xattr->name_len;
644		ci->i_xattrs.vals_size -= xattr->val_len;
645	}
646	ci->i_xattrs.names_size += name_len;
647	ci->i_xattrs.vals_size += val_len;
648	if (val)
649		xattr->val = val;
650	else
651		xattr->val = "";
652
653	xattr->val_len = val_len;
654	xattr->dirty = update_xattr;
655	xattr->should_free_val = (val && update_xattr);
656
657	if (new) {
658		rb_link_node(&xattr->node, parent, p);
659		rb_insert_color(&xattr->node, &ci->i_xattrs.index);
660		doutc(cl, "p=%p\n", p);
661	}
662
663	doutc(cl, "added %p %llx.%llx xattr %p %.*s=%.*s%s\n", inode,
664	      ceph_vinop(inode), xattr, name_len, name, min(val_len,
665	      MAX_XATTR_VAL_PRINT_LEN), val,
666	      val_len > MAX_XATTR_VAL_PRINT_LEN ? "..." : "");
667
668	return 0;
669}
670
671static struct ceph_inode_xattr *__get_xattr(struct ceph_inode_info *ci,
672			   const char *name)
673{
674	struct ceph_client *cl = ceph_inode_to_client(&ci->netfs.inode);
675	struct rb_node **p;
676	struct rb_node *parent = NULL;
677	struct ceph_inode_xattr *xattr = NULL;
678	int name_len = strlen(name);
679	int c;
680
681	p = &ci->i_xattrs.index.rb_node;
682	while (*p) {
683		parent = *p;
684		xattr = rb_entry(parent, struct ceph_inode_xattr, node);
685		c = strncmp(name, xattr->name, xattr->name_len);
686		if (c == 0 && name_len > xattr->name_len)
687			c = 1;
688		if (c < 0)
689			p = &(*p)->rb_left;
690		else if (c > 0)
691			p = &(*p)->rb_right;
692		else {
693			int len = min(xattr->val_len, MAX_XATTR_VAL_PRINT_LEN);
694
695			doutc(cl, "%s found %.*s%s\n", name, len, xattr->val,
696			      xattr->val_len > len ? "..." : "");
697			return xattr;
698		}
699	}
700
701	doutc(cl, "%s not found\n", name);
702
703	return NULL;
704}
705
706static void __free_xattr(struct ceph_inode_xattr *xattr)
707{
708	BUG_ON(!xattr);
709
710	if (xattr->should_free_name)
711		kfree(xattr->name);
712	if (xattr->should_free_val)
713		kfree(xattr->val);
714
715	kfree(xattr);
716}
717
718static int __remove_xattr(struct ceph_inode_info *ci,
719			  struct ceph_inode_xattr *xattr)
720{
721	if (!xattr)
722		return -ENODATA;
723
724	rb_erase(&xattr->node, &ci->i_xattrs.index);
725
726	if (xattr->should_free_name)
727		kfree(xattr->name);
728	if (xattr->should_free_val)
729		kfree(xattr->val);
730
731	ci->i_xattrs.names_size -= xattr->name_len;
732	ci->i_xattrs.vals_size -= xattr->val_len;
733	ci->i_xattrs.count--;
734	kfree(xattr);
735
736	return 0;
737}
738
739static char *__copy_xattr_names(struct ceph_inode_info *ci,
740				char *dest)
741{
742	struct ceph_client *cl = ceph_inode_to_client(&ci->netfs.inode);
743	struct rb_node *p;
744	struct ceph_inode_xattr *xattr = NULL;
745
746	p = rb_first(&ci->i_xattrs.index);
747	doutc(cl, "count=%d\n", ci->i_xattrs.count);
748
749	while (p) {
750		xattr = rb_entry(p, struct ceph_inode_xattr, node);
751		memcpy(dest, xattr->name, xattr->name_len);
752		dest[xattr->name_len] = '\0';
753
754		doutc(cl, "dest=%s %p (%s) (%d/%d)\n", dest, xattr, xattr->name,
755		      xattr->name_len, ci->i_xattrs.names_size);
756
757		dest += xattr->name_len + 1;
758		p = rb_next(p);
759	}
760
761	return dest;
762}
763
764void __ceph_destroy_xattrs(struct ceph_inode_info *ci)
765{
766	struct ceph_client *cl = ceph_inode_to_client(&ci->netfs.inode);
767	struct rb_node *p, *tmp;
768	struct ceph_inode_xattr *xattr = NULL;
769
770	p = rb_first(&ci->i_xattrs.index);
771
772	doutc(cl, "p=%p\n", p);
773
774	while (p) {
775		xattr = rb_entry(p, struct ceph_inode_xattr, node);
776		tmp = p;
777		p = rb_next(tmp);
778		doutc(cl, "next p=%p (%.*s)\n", p, xattr->name_len, xattr->name);
779		rb_erase(tmp, &ci->i_xattrs.index);
780
781		__free_xattr(xattr);
782	}
783
784	ci->i_xattrs.names_size = 0;
785	ci->i_xattrs.vals_size = 0;
786	ci->i_xattrs.index_version = 0;
787	ci->i_xattrs.count = 0;
788	ci->i_xattrs.index = RB_ROOT;
789}
790
791static int __build_xattrs(struct inode *inode)
792	__releases(ci->i_ceph_lock)
793	__acquires(ci->i_ceph_lock)
794{
795	struct ceph_client *cl = ceph_inode_to_client(inode);
796	u32 namelen;
797	u32 numattr = 0;
798	void *p, *end;
799	u32 len;
800	const char *name, *val;
801	struct ceph_inode_info *ci = ceph_inode(inode);
802	u64 xattr_version;
803	struct ceph_inode_xattr **xattrs = NULL;
804	int err = 0;
805	int i;
806
807	doutc(cl, "len=%d\n",
808	      ci->i_xattrs.blob ? (int)ci->i_xattrs.blob->vec.iov_len : 0);
809
810	if (ci->i_xattrs.index_version >= ci->i_xattrs.version)
811		return 0; /* already built */
812
813	__ceph_destroy_xattrs(ci);
814
815start:
816	/* updated internal xattr rb tree */
817	if (ci->i_xattrs.blob && ci->i_xattrs.blob->vec.iov_len > 4) {
818		p = ci->i_xattrs.blob->vec.iov_base;
819		end = p + ci->i_xattrs.blob->vec.iov_len;
820		ceph_decode_32_safe(&p, end, numattr, bad);
821		xattr_version = ci->i_xattrs.version;
822		spin_unlock(&ci->i_ceph_lock);
823
824		xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *),
825				 GFP_NOFS);
826		err = -ENOMEM;
827		if (!xattrs)
828			goto bad_lock;
829
830		for (i = 0; i < numattr; i++) {
831			xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr),
832					    GFP_NOFS);
833			if (!xattrs[i])
834				goto bad_lock;
835		}
836
837		spin_lock(&ci->i_ceph_lock);
838		if (ci->i_xattrs.version != xattr_version) {
839			/* lost a race, retry */
840			for (i = 0; i < numattr; i++)
841				kfree(xattrs[i]);
842			kfree(xattrs);
843			xattrs = NULL;
844			goto start;
845		}
846		err = -EIO;
847		while (numattr--) {
848			ceph_decode_32_safe(&p, end, len, bad);
849			namelen = len;
850			name = p;
851			p += len;
852			ceph_decode_32_safe(&p, end, len, bad);
853			val = p;
854			p += len;
855
856			err = __set_xattr(ci, name, namelen, val, len,
857					  0, 0, &xattrs[numattr]);
858
859			if (err < 0)
860				goto bad;
861		}
862		kfree(xattrs);
863	}
864	ci->i_xattrs.index_version = ci->i_xattrs.version;
865	ci->i_xattrs.dirty = false;
866
867	return err;
868bad_lock:
869	spin_lock(&ci->i_ceph_lock);
870bad:
871	if (xattrs) {
872		for (i = 0; i < numattr; i++)
873			kfree(xattrs[i]);
874		kfree(xattrs);
875	}
876	ci->i_xattrs.names_size = 0;
877	return err;
878}
879
880static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size,
881				    int val_size)
882{
883	struct ceph_client *cl = ceph_inode_to_client(&ci->netfs.inode);
884
885	/*
886	 * 4 bytes for the length, and additional 4 bytes per each xattr name,
887	 * 4 bytes per each value
888	 */
889	int size = 4 + ci->i_xattrs.count*(4 + 4) +
890			     ci->i_xattrs.names_size +
891			     ci->i_xattrs.vals_size;
892	doutc(cl, "c=%d names.size=%d vals.size=%d\n", ci->i_xattrs.count,
893	      ci->i_xattrs.names_size, ci->i_xattrs.vals_size);
894
895	if (name_size)
896		size += 4 + 4 + name_size + val_size;
897
898	return size;
899}
900
901/*
902 * If there are dirty xattrs, reencode xattrs into the prealloc_blob
903 * and swap into place.  It returns the old i_xattrs.blob (or NULL) so
904 * that it can be freed by the caller as the i_ceph_lock is likely to be
905 * held.
906 */
907struct ceph_buffer *__ceph_build_xattrs_blob(struct ceph_inode_info *ci)
908{
909	struct inode *inode = &ci->netfs.inode;
910	struct ceph_client *cl = ceph_inode_to_client(inode);
911	struct rb_node *p;
912	struct ceph_inode_xattr *xattr = NULL;
913	struct ceph_buffer *old_blob = NULL;
914	void *dest;
915
916	doutc(cl, "%p %llx.%llx\n", inode, ceph_vinop(inode));
917	if (ci->i_xattrs.dirty) {
918		int need = __get_required_blob_size(ci, 0, 0);
919
920		BUG_ON(need > ci->i_xattrs.prealloc_blob->alloc_len);
921
922		p = rb_first(&ci->i_xattrs.index);
923		dest = ci->i_xattrs.prealloc_blob->vec.iov_base;
924
925		ceph_encode_32(&dest, ci->i_xattrs.count);
926		while (p) {
927			xattr = rb_entry(p, struct ceph_inode_xattr, node);
928
929			ceph_encode_32(&dest, xattr->name_len);
930			memcpy(dest, xattr->name, xattr->name_len);
931			dest += xattr->name_len;
932			ceph_encode_32(&dest, xattr->val_len);
933			memcpy(dest, xattr->val, xattr->val_len);
934			dest += xattr->val_len;
935
936			p = rb_next(p);
937		}
938
939		/* adjust buffer len; it may be larger than we need */
940		ci->i_xattrs.prealloc_blob->vec.iov_len =
941			dest - ci->i_xattrs.prealloc_blob->vec.iov_base;
942
943		if (ci->i_xattrs.blob)
944			old_blob = ci->i_xattrs.blob;
945		ci->i_xattrs.blob = ci->i_xattrs.prealloc_blob;
946		ci->i_xattrs.prealloc_blob = NULL;
947		ci->i_xattrs.dirty = false;
948		ci->i_xattrs.version++;
949	}
950
951	return old_blob;
952}
953
954static inline int __get_request_mask(struct inode *in) {
955	struct ceph_mds_request *req = current->journal_info;
956	int mask = 0;
957	if (req && req->r_target_inode == in) {
958		if (req->r_op == CEPH_MDS_OP_LOOKUP ||
959		    req->r_op == CEPH_MDS_OP_LOOKUPINO ||
960		    req->r_op == CEPH_MDS_OP_LOOKUPPARENT ||
961		    req->r_op == CEPH_MDS_OP_GETATTR) {
962			mask = le32_to_cpu(req->r_args.getattr.mask);
963		} else if (req->r_op == CEPH_MDS_OP_OPEN ||
964			   req->r_op == CEPH_MDS_OP_CREATE) {
965			mask = le32_to_cpu(req->r_args.open.mask);
966		}
967	}
968	return mask;
969}
970
971ssize_t __ceph_getxattr(struct inode *inode, const char *name, void *value,
972		      size_t size)
973{
974	struct ceph_client *cl = ceph_inode_to_client(inode);
975	struct ceph_inode_info *ci = ceph_inode(inode);
976	struct ceph_inode_xattr *xattr;
977	struct ceph_vxattr *vxattr;
978	int req_mask;
979	ssize_t err;
980
981	if (strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN))
982		goto handle_non_vxattrs;
983
984	/* let's see if a virtual xattr was requested */
985	vxattr = ceph_match_vxattr(inode, name);
986	if (vxattr) {
987		int mask = 0;
988		if (vxattr->flags & VXATTR_FLAG_RSTAT)
989			mask |= CEPH_STAT_RSTAT;
990		if (vxattr->flags & VXATTR_FLAG_DIRSTAT)
991			mask |= CEPH_CAP_FILE_SHARED;
992		err = ceph_do_getattr(inode, mask, true);
993		if (err)
994			return err;
995		err = -ENODATA;
996		if (!(vxattr->exists_cb && !vxattr->exists_cb(ci))) {
997			err = vxattr->getxattr_cb(ci, value, size);
998			if (size && size < err)
999				err = -ERANGE;
1000		}
1001		return err;
1002	} else {
1003		err = ceph_do_getvxattr(inode, name, value, size);
1004		/* this would happen with a new client and old server combo */
1005		if (err == -EOPNOTSUPP)
1006			err = -ENODATA;
1007		return err;
1008	}
1009handle_non_vxattrs:
1010	req_mask = __get_request_mask(inode);
1011
1012	spin_lock(&ci->i_ceph_lock);
1013	doutc(cl, "%p %llx.%llx name '%s' ver=%lld index_ver=%lld\n", inode,
1014	      ceph_vinop(inode), name, ci->i_xattrs.version,
1015	      ci->i_xattrs.index_version);
1016
1017	if (ci->i_xattrs.version == 0 ||
1018	    !((req_mask & CEPH_CAP_XATTR_SHARED) ||
1019	      __ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1))) {
1020		spin_unlock(&ci->i_ceph_lock);
1021
1022		/* security module gets xattr while filling trace */
1023		if (current->journal_info) {
1024			pr_warn_ratelimited_client(cl,
1025				"sync %p %llx.%llx during filling trace\n",
1026				inode, ceph_vinop(inode));
1027			return -EBUSY;
1028		}
1029
1030		/* get xattrs from mds (if we don't already have them) */
1031		err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
1032		if (err)
1033			return err;
1034		spin_lock(&ci->i_ceph_lock);
1035	}
1036
1037	err = __build_xattrs(inode);
1038	if (err < 0)
1039		goto out;
1040
1041	err = -ENODATA;  /* == ENOATTR */
1042	xattr = __get_xattr(ci, name);
1043	if (!xattr)
1044		goto out;
1045
1046	err = -ERANGE;
1047	if (size && size < xattr->val_len)
1048		goto out;
1049
1050	err = xattr->val_len;
1051	if (size == 0)
1052		goto out;
1053
1054	memcpy(value, xattr->val, xattr->val_len);
1055
1056	if (current->journal_info &&
1057	    !strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) &&
1058	    security_ismaclabel(name + XATTR_SECURITY_PREFIX_LEN))
1059		ci->i_ceph_flags |= CEPH_I_SEC_INITED;
1060out:
1061	spin_unlock(&ci->i_ceph_lock);
1062	return err;
1063}
1064
1065ssize_t ceph_listxattr(struct dentry *dentry, char *names, size_t size)
1066{
1067	struct inode *inode = d_inode(dentry);
1068	struct ceph_client *cl = ceph_inode_to_client(inode);
1069	struct ceph_inode_info *ci = ceph_inode(inode);
1070	bool len_only = (size == 0);
1071	u32 namelen;
1072	int err;
1073
1074	spin_lock(&ci->i_ceph_lock);
1075	doutc(cl, "%p %llx.%llx ver=%lld index_ver=%lld\n", inode,
1076	      ceph_vinop(inode), ci->i_xattrs.version,
1077	      ci->i_xattrs.index_version);
1078
1079	if (ci->i_xattrs.version == 0 ||
1080	    !__ceph_caps_issued_mask_metric(ci, CEPH_CAP_XATTR_SHARED, 1)) {
1081		spin_unlock(&ci->i_ceph_lock);
1082		err = ceph_do_getattr(inode, CEPH_STAT_CAP_XATTR, true);
1083		if (err)
1084			return err;
1085		spin_lock(&ci->i_ceph_lock);
1086	}
1087
1088	err = __build_xattrs(inode);
1089	if (err < 0)
1090		goto out;
1091
1092	/* add 1 byte for each xattr due to the null termination */
1093	namelen = ci->i_xattrs.names_size + ci->i_xattrs.count;
1094	if (!len_only) {
1095		if (namelen > size) {
1096			err = -ERANGE;
1097			goto out;
1098		}
1099		names = __copy_xattr_names(ci, names);
1100		size -= namelen;
1101	}
1102	err = namelen;
1103out:
1104	spin_unlock(&ci->i_ceph_lock);
1105	return err;
1106}
1107
1108static int ceph_sync_setxattr(struct inode *inode, const char *name,
1109			      const char *value, size_t size, int flags)
1110{
1111	struct ceph_fs_client *fsc = ceph_sb_to_fs_client(inode->i_sb);
1112	struct ceph_client *cl = ceph_inode_to_client(inode);
1113	struct ceph_inode_info *ci = ceph_inode(inode);
1114	struct ceph_mds_request *req;
1115	struct ceph_mds_client *mdsc = fsc->mdsc;
1116	struct ceph_osd_client *osdc = &fsc->client->osdc;
1117	struct ceph_pagelist *pagelist = NULL;
1118	int op = CEPH_MDS_OP_SETXATTR;
1119	int err;
1120
1121	if (size > 0) {
1122		/* copy value into pagelist */
1123		pagelist = ceph_pagelist_alloc(GFP_NOFS);
1124		if (!pagelist)
1125			return -ENOMEM;
1126
1127		err = ceph_pagelist_append(pagelist, value, size);
1128		if (err)
1129			goto out;
1130	} else if (!value) {
1131		if (flags & CEPH_XATTR_REPLACE)
1132			op = CEPH_MDS_OP_RMXATTR;
1133		else
1134			flags |= CEPH_XATTR_REMOVE;
1135	}
1136
1137	doutc(cl, "name %s value size %zu\n", name, size);
1138
1139	/* do request */
1140	req = ceph_mdsc_create_request(mdsc, op, USE_AUTH_MDS);
1141	if (IS_ERR(req)) {
1142		err = PTR_ERR(req);
1143		goto out;
1144	}
1145
1146	req->r_path2 = kstrdup(name, GFP_NOFS);
1147	if (!req->r_path2) {
1148		ceph_mdsc_put_request(req);
1149		err = -ENOMEM;
1150		goto out;
1151	}
1152
1153	if (op == CEPH_MDS_OP_SETXATTR) {
1154		req->r_args.setxattr.flags = cpu_to_le32(flags);
1155		req->r_args.setxattr.osdmap_epoch =
1156			cpu_to_le32(osdc->osdmap->epoch);
1157		req->r_pagelist = pagelist;
1158		pagelist = NULL;
1159	}
1160
1161	req->r_inode = inode;
1162	ihold(inode);
1163	req->r_num_caps = 1;
1164	req->r_inode_drop = CEPH_CAP_XATTR_SHARED;
1165
1166	doutc(cl, "xattr.ver (before): %lld\n", ci->i_xattrs.version);
1167	err = ceph_mdsc_do_request(mdsc, NULL, req);
1168	ceph_mdsc_put_request(req);
1169	doutc(cl, "xattr.ver (after): %lld\n", ci->i_xattrs.version);
1170
1171out:
1172	if (pagelist)
1173		ceph_pagelist_release(pagelist);
1174	return err;
1175}
1176
1177int __ceph_setxattr(struct inode *inode, const char *name,
1178			const void *value, size_t size, int flags)
1179{
1180	struct ceph_client *cl = ceph_inode_to_client(inode);
1181	struct ceph_vxattr *vxattr;
1182	struct ceph_inode_info *ci = ceph_inode(inode);
1183	struct ceph_mds_client *mdsc = ceph_sb_to_fs_client(inode->i_sb)->mdsc;
1184	struct ceph_cap_flush *prealloc_cf = NULL;
1185	struct ceph_buffer *old_blob = NULL;
1186	int issued;
1187	int err;
1188	int dirty = 0;
1189	int name_len = strlen(name);
1190	int val_len = size;
1191	char *newname = NULL;
1192	char *newval = NULL;
1193	struct ceph_inode_xattr *xattr = NULL;
1194	int required_blob_size;
1195	bool check_realm = false;
1196	bool lock_snap_rwsem = false;
1197
1198	if (ceph_snap(inode) != CEPH_NOSNAP)
1199		return -EROFS;
1200
1201	vxattr = ceph_match_vxattr(inode, name);
1202	if (vxattr) {
1203		if (vxattr->flags & VXATTR_FLAG_READONLY)
1204			return -EOPNOTSUPP;
1205		if (value && !strncmp(vxattr->name, "ceph.quota", 10))
1206			check_realm = true;
1207	}
1208
1209	/* pass any unhandled ceph.* xattrs through to the MDS */
1210	if (!strncmp(name, XATTR_CEPH_PREFIX, XATTR_CEPH_PREFIX_LEN))
1211		goto do_sync_unlocked;
1212
1213	/* preallocate memory for xattr name, value, index node */
1214	err = -ENOMEM;
1215	newname = kmemdup(name, name_len + 1, GFP_NOFS);
1216	if (!newname)
1217		goto out;
1218
1219	if (val_len) {
1220		newval = kmemdup(value, val_len, GFP_NOFS);
1221		if (!newval)
1222			goto out;
1223	}
1224
1225	xattr = kmalloc(sizeof(struct ceph_inode_xattr), GFP_NOFS);
1226	if (!xattr)
1227		goto out;
1228
1229	prealloc_cf = ceph_alloc_cap_flush();
1230	if (!prealloc_cf)
1231		goto out;
1232
1233	spin_lock(&ci->i_ceph_lock);
1234retry:
1235	issued = __ceph_caps_issued(ci, NULL);
1236	required_blob_size = __get_required_blob_size(ci, name_len, val_len);
1237	if ((ci->i_xattrs.version == 0) || !(issued & CEPH_CAP_XATTR_EXCL) ||
1238	    (required_blob_size > mdsc->mdsmap->m_max_xattr_size)) {
1239		doutc(cl, "sync version: %llu size: %d max: %llu\n",
1240		      ci->i_xattrs.version, required_blob_size,
1241		      mdsc->mdsmap->m_max_xattr_size);
1242		goto do_sync;
1243	}
1244
1245	if (!lock_snap_rwsem && !ci->i_head_snapc) {
1246		lock_snap_rwsem = true;
1247		if (!down_read_trylock(&mdsc->snap_rwsem)) {
1248			spin_unlock(&ci->i_ceph_lock);
1249			down_read(&mdsc->snap_rwsem);
1250			spin_lock(&ci->i_ceph_lock);
1251			goto retry;
1252		}
1253	}
1254
1255	doutc(cl, "%p %llx.%llx name '%s' issued %s\n", inode,
1256	      ceph_vinop(inode), name, ceph_cap_string(issued));
1257	__build_xattrs(inode);
1258
1259	if (!ci->i_xattrs.prealloc_blob ||
1260	    required_blob_size > ci->i_xattrs.prealloc_blob->alloc_len) {
1261		struct ceph_buffer *blob;
1262
1263		spin_unlock(&ci->i_ceph_lock);
1264		ceph_buffer_put(old_blob); /* Shouldn't be required */
1265		doutc(cl, " pre-allocating new blob size=%d\n",
1266		      required_blob_size);
1267		blob = ceph_buffer_new(required_blob_size, GFP_NOFS);
1268		if (!blob)
1269			goto do_sync_unlocked;
1270		spin_lock(&ci->i_ceph_lock);
1271		/* prealloc_blob can't be released while holding i_ceph_lock */
1272		if (ci->i_xattrs.prealloc_blob)
1273			old_blob = ci->i_xattrs.prealloc_blob;
1274		ci->i_xattrs.prealloc_blob = blob;
1275		goto retry;
1276	}
1277
1278	err = __set_xattr(ci, newname, name_len, newval, val_len,
1279			  flags, value ? 1 : -1, &xattr);
1280
1281	if (!err) {
1282		dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_XATTR_EXCL,
1283					       &prealloc_cf);
1284		ci->i_xattrs.dirty = true;
1285		inode_set_ctime_current(inode);
1286	}
1287
1288	spin_unlock(&ci->i_ceph_lock);
1289	ceph_buffer_put(old_blob);
1290	if (lock_snap_rwsem)
1291		up_read(&mdsc->snap_rwsem);
1292	if (dirty)
1293		__mark_inode_dirty(inode, dirty);
1294	ceph_free_cap_flush(prealloc_cf);
1295	return err;
1296
1297do_sync:
1298	spin_unlock(&ci->i_ceph_lock);
1299do_sync_unlocked:
1300	if (lock_snap_rwsem)
1301		up_read(&mdsc->snap_rwsem);
1302
1303	/* security module set xattr while filling trace */
1304	if (current->journal_info) {
1305		pr_warn_ratelimited_client(cl,
1306				"sync %p %llx.%llx during filling trace\n",
1307				inode, ceph_vinop(inode));
1308		err = -EBUSY;
1309	} else {
1310		err = ceph_sync_setxattr(inode, name, value, size, flags);
1311		if (err >= 0 && check_realm) {
1312			/* check if snaprealm was created for quota inode */
1313			spin_lock(&ci->i_ceph_lock);
1314			if ((ci->i_max_files || ci->i_max_bytes) &&
1315			    !(ci->i_snap_realm &&
1316			      ci->i_snap_realm->ino == ci->i_vino.ino))
1317				err = -EOPNOTSUPP;
1318			spin_unlock(&ci->i_ceph_lock);
1319		}
1320	}
1321out:
1322	ceph_free_cap_flush(prealloc_cf);
1323	kfree(newname);
1324	kfree(newval);
1325	kfree(xattr);
1326	return err;
1327}
1328
1329static int ceph_get_xattr_handler(const struct xattr_handler *handler,
1330				  struct dentry *dentry, struct inode *inode,
1331				  const char *name, void *value, size_t size)
1332{
1333	if (!ceph_is_valid_xattr(name))
1334		return -EOPNOTSUPP;
1335	return __ceph_getxattr(inode, name, value, size);
1336}
1337
1338static int ceph_set_xattr_handler(const struct xattr_handler *handler,
1339				  struct mnt_idmap *idmap,
1340				  struct dentry *unused, struct inode *inode,
1341				  const char *name, const void *value,
1342				  size_t size, int flags)
1343{
1344	if (!ceph_is_valid_xattr(name))
1345		return -EOPNOTSUPP;
1346	return __ceph_setxattr(inode, name, value, size, flags);
1347}
1348
1349static const struct xattr_handler ceph_other_xattr_handler = {
1350	.prefix = "",  /* match any name => handlers called with full name */
1351	.get = ceph_get_xattr_handler,
1352	.set = ceph_set_xattr_handler,
1353};
1354
1355#ifdef CONFIG_SECURITY
1356bool ceph_security_xattr_wanted(struct inode *in)
1357{
1358	return in->i_security != NULL;
1359}
1360
1361bool ceph_security_xattr_deadlock(struct inode *in)
1362{
1363	struct ceph_inode_info *ci;
1364	bool ret;
1365	if (!in->i_security)
1366		return false;
1367	ci = ceph_inode(in);
1368	spin_lock(&ci->i_ceph_lock);
1369	ret = !(ci->i_ceph_flags & CEPH_I_SEC_INITED) &&
1370	      !(ci->i_xattrs.version > 0 &&
1371		__ceph_caps_issued_mask(ci, CEPH_CAP_XATTR_SHARED, 0));
1372	spin_unlock(&ci->i_ceph_lock);
1373	return ret;
1374}
1375
1376#ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1377int ceph_security_init_secctx(struct dentry *dentry, umode_t mode,
1378			   struct ceph_acl_sec_ctx *as_ctx)
1379{
1380	struct ceph_pagelist *pagelist = as_ctx->pagelist;
1381	const char *name;
1382	size_t name_len;
1383	int err;
1384
1385	err = security_dentry_init_security(dentry, mode, &dentry->d_name,
1386					    &name, &as_ctx->sec_ctx,
1387					    &as_ctx->sec_ctxlen);
1388	if (err < 0) {
1389		WARN_ON_ONCE(err != -EOPNOTSUPP);
1390		err = 0; /* do nothing */
1391		goto out;
1392	}
1393
1394	err = -ENOMEM;
1395	if (!pagelist) {
1396		pagelist = ceph_pagelist_alloc(GFP_KERNEL);
1397		if (!pagelist)
1398			goto out;
1399		err = ceph_pagelist_reserve(pagelist, PAGE_SIZE);
1400		if (err)
1401			goto out;
1402		ceph_pagelist_encode_32(pagelist, 1);
1403	}
1404
1405	/*
1406	 * FIXME: Make security_dentry_init_security() generic. Currently
1407	 * It only supports single security module and only selinux has
1408	 * dentry_init_security hook.
1409	 */
1410	name_len = strlen(name);
1411	err = ceph_pagelist_reserve(pagelist,
1412				    4 * 2 + name_len + as_ctx->sec_ctxlen);
1413	if (err)
1414		goto out;
1415
1416	if (as_ctx->pagelist) {
1417		/* update count of KV pairs */
1418		BUG_ON(pagelist->length <= sizeof(__le32));
1419		if (list_is_singular(&pagelist->head)) {
1420			le32_add_cpu((__le32*)pagelist->mapped_tail, 1);
1421		} else {
1422			struct page *page = list_first_entry(&pagelist->head,
1423							     struct page, lru);
1424			void *addr = kmap_atomic(page);
1425			le32_add_cpu((__le32*)addr, 1);
1426			kunmap_atomic(addr);
1427		}
1428	} else {
1429		as_ctx->pagelist = pagelist;
1430	}
1431
1432	ceph_pagelist_encode_32(pagelist, name_len);
1433	ceph_pagelist_append(pagelist, name, name_len);
1434
1435	ceph_pagelist_encode_32(pagelist, as_ctx->sec_ctxlen);
1436	ceph_pagelist_append(pagelist, as_ctx->sec_ctx, as_ctx->sec_ctxlen);
1437
1438	err = 0;
1439out:
1440	if (pagelist && !as_ctx->pagelist)
1441		ceph_pagelist_release(pagelist);
1442	return err;
1443}
1444#endif /* CONFIG_CEPH_FS_SECURITY_LABEL */
1445#endif /* CONFIG_SECURITY */
1446
1447void ceph_release_acl_sec_ctx(struct ceph_acl_sec_ctx *as_ctx)
1448{
1449#ifdef CONFIG_CEPH_FS_POSIX_ACL
1450	posix_acl_release(as_ctx->acl);
1451	posix_acl_release(as_ctx->default_acl);
1452#endif
1453#ifdef CONFIG_CEPH_FS_SECURITY_LABEL
1454	security_release_secctx(as_ctx->sec_ctx, as_ctx->sec_ctxlen);
1455#endif
1456#ifdef CONFIG_FS_ENCRYPTION
1457	kfree(as_ctx->fscrypt_auth);
1458#endif
1459	if (as_ctx->pagelist)
1460		ceph_pagelist_release(as_ctx->pagelist);
1461}
1462
1463/*
1464 * List of handlers for synthetic system.* attributes. Other
1465 * attributes are handled directly.
1466 */
1467const struct xattr_handler * const ceph_xattr_handlers[] = {
1468	&ceph_other_xattr_handler,
1469	NULL,
1470};
1471