Merge remote-tracking branch 'mmc-uh/next'
[deliverable/linux.git] / fs / f2fs / xattr.c
CommitLineData
0a8165d7 1/*
af48b85b
JK
2 * fs/f2fs/xattr.c
3 *
4 * Copyright (c) 2012 Samsung Electronics Co., Ltd.
5 * http://www.samsung.com/
6 *
7 * Portions of this code from linux/fs/ext2/xattr.c
8 *
9 * Copyright (C) 2001-2003 Andreas Gruenbacher <agruen@suse.de>
10 *
11 * Fix by Harrison Xing <harrison@mountainviewdata.com>.
12 * Extended attributes for symlinks and special files added per
13 * suggestion of Luka Renko <luka.renko@hermes.si>.
14 * xattr consolidation Copyright (c) 2004 James Morris <jmorris@redhat.com>,
15 * Red Hat Inc.
16 *
17 * This program is free software; you can redistribute it and/or modify
18 * it under the terms of the GNU General Public License version 2 as
19 * published by the Free Software Foundation.
20 */
21#include <linux/rwsem.h>
22#include <linux/f2fs_fs.h>
8ae8f162 23#include <linux/security.h>
a6dda0e6 24#include <linux/posix_acl_xattr.h>
af48b85b
JK
25#include "f2fs.h"
26#include "xattr.h"
27
d9a82a04 28static int f2fs_xattr_generic_get(const struct xattr_handler *handler,
b296821a
AV
29 struct dentry *unused, struct inode *inode,
30 const char *name, void *buffer, size_t size)
af48b85b 31{
b296821a 32 struct f2fs_sb_info *sbi = F2FS_SB(inode->i_sb);
af48b85b 33
d9a82a04 34 switch (handler->flags) {
af48b85b
JK
35 case F2FS_XATTR_INDEX_USER:
36 if (!test_opt(sbi, XATTR_USER))
37 return -EOPNOTSUPP;
38 break;
39 case F2FS_XATTR_INDEX_TRUSTED:
40 if (!capable(CAP_SYS_ADMIN))
41 return -EPERM;
42 break;
8ae8f162
JK
43 case F2FS_XATTR_INDEX_SECURITY:
44 break;
af48b85b
JK
45 default:
46 return -EINVAL;
47 }
b296821a 48 return f2fs_getxattr(inode, handler->flags, name,
d9a82a04 49 buffer, size, NULL);
af48b85b
JK
50}
51
d9a82a04 52static int f2fs_xattr_generic_set(const struct xattr_handler *handler,
59301226
AV
53 struct dentry *unused, struct inode *inode,
54 const char *name, const void *value,
d9a82a04 55 size_t size, int flags)
af48b85b 56{
59301226 57 struct f2fs_sb_info *sbi = F2FS_SB(inode->i_sb);
af48b85b 58
d9a82a04 59 switch (handler->flags) {
af48b85b
JK
60 case F2FS_XATTR_INDEX_USER:
61 if (!test_opt(sbi, XATTR_USER))
62 return -EOPNOTSUPP;
63 break;
64 case F2FS_XATTR_INDEX_TRUSTED:
65 if (!capable(CAP_SYS_ADMIN))
66 return -EPERM;
67 break;
8ae8f162
JK
68 case F2FS_XATTR_INDEX_SECURITY:
69 break;
af48b85b
JK
70 default:
71 return -EINVAL;
72 }
59301226 73 return f2fs_setxattr(inode, handler->flags, name,
c02745ef 74 value, size, NULL, flags);
af48b85b
JK
75}
76
764a5c6b 77static bool f2fs_xattr_user_list(struct dentry *dentry)
573ea5fc 78{
764a5c6b
AG
79 struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb);
80
81 return test_opt(sbi, XATTR_USER);
82}
573ea5fc 83
764a5c6b
AG
84static bool f2fs_xattr_trusted_list(struct dentry *dentry)
85{
86 return capable(CAP_SYS_ADMIN);
573ea5fc
JK
87}
88
d9a82a04 89static int f2fs_xattr_advise_get(const struct xattr_handler *handler,
b296821a
AV
90 struct dentry *unused, struct inode *inode,
91 const char *name, void *buffer, size_t size)
573ea5fc 92{
84e97c27
CY
93 if (buffer)
94 *((char *)buffer) = F2FS_I(inode)->i_advise;
573ea5fc
JK
95 return sizeof(char);
96}
97
d9a82a04 98static int f2fs_xattr_advise_set(const struct xattr_handler *handler,
59301226
AV
99 struct dentry *unused, struct inode *inode,
100 const char *name, const void *value,
d9a82a04 101 size_t size, int flags)
573ea5fc 102{
573ea5fc
JK
103 if (!inode_owner_or_capable(inode))
104 return -EPERM;
105 if (value == NULL)
106 return -EINVAL;
107
108 F2FS_I(inode)->i_advise |= *(char *)value;
b56ab837 109 f2fs_mark_inode_dirty_sync(inode);
573ea5fc
JK
110 return 0;
111}
112
8ae8f162
JK
113#ifdef CONFIG_F2FS_FS_SECURITY
114static int f2fs_initxattrs(struct inode *inode, const struct xattr *xattr_array,
115 void *page)
116{
117 const struct xattr *xattr;
118 int err = 0;
119
120 for (xattr = xattr_array; xattr->name != NULL; xattr++) {
d631abda 121 err = f2fs_setxattr(inode, F2FS_XATTR_INDEX_SECURITY,
8ae8f162 122 xattr->name, xattr->value,
c02745ef 123 xattr->value_len, (struct page *)page, 0);
8ae8f162
JK
124 if (err < 0)
125 break;
126 }
127 return err;
128}
129
130int f2fs_init_security(struct inode *inode, struct inode *dir,
131 const struct qstr *qstr, struct page *ipage)
132{
133 return security_inode_init_security(inode, dir, qstr,
134 &f2fs_initxattrs, ipage);
135}
136#endif
137
af48b85b
JK
138const struct xattr_handler f2fs_xattr_user_handler = {
139 .prefix = XATTR_USER_PREFIX,
140 .flags = F2FS_XATTR_INDEX_USER,
764a5c6b 141 .list = f2fs_xattr_user_list,
af48b85b
JK
142 .get = f2fs_xattr_generic_get,
143 .set = f2fs_xattr_generic_set,
144};
145
146const struct xattr_handler f2fs_xattr_trusted_handler = {
147 .prefix = XATTR_TRUSTED_PREFIX,
148 .flags = F2FS_XATTR_INDEX_TRUSTED,
764a5c6b 149 .list = f2fs_xattr_trusted_list,
af48b85b
JK
150 .get = f2fs_xattr_generic_get,
151 .set = f2fs_xattr_generic_set,
152};
153
573ea5fc 154const struct xattr_handler f2fs_xattr_advise_handler = {
98e9cb57 155 .name = F2FS_SYSTEM_ADVISE_NAME,
573ea5fc 156 .flags = F2FS_XATTR_INDEX_ADVISE,
573ea5fc
JK
157 .get = f2fs_xattr_advise_get,
158 .set = f2fs_xattr_advise_set,
159};
160
8ae8f162
JK
161const struct xattr_handler f2fs_xattr_security_handler = {
162 .prefix = XATTR_SECURITY_PREFIX,
163 .flags = F2FS_XATTR_INDEX_SECURITY,
8ae8f162
JK
164 .get = f2fs_xattr_generic_get,
165 .set = f2fs_xattr_generic_set,
166};
167
af48b85b
JK
168static const struct xattr_handler *f2fs_xattr_handler_map[] = {
169 [F2FS_XATTR_INDEX_USER] = &f2fs_xattr_user_handler,
170#ifdef CONFIG_F2FS_FS_POSIX_ACL
a6dda0e6
CH
171 [F2FS_XATTR_INDEX_POSIX_ACL_ACCESS] = &posix_acl_access_xattr_handler,
172 [F2FS_XATTR_INDEX_POSIX_ACL_DEFAULT] = &posix_acl_default_xattr_handler,
af48b85b
JK
173#endif
174 [F2FS_XATTR_INDEX_TRUSTED] = &f2fs_xattr_trusted_handler,
8ae8f162
JK
175#ifdef CONFIG_F2FS_FS_SECURITY
176 [F2FS_XATTR_INDEX_SECURITY] = &f2fs_xattr_security_handler,
177#endif
af48b85b
JK
178 [F2FS_XATTR_INDEX_ADVISE] = &f2fs_xattr_advise_handler,
179};
180
181const struct xattr_handler *f2fs_xattr_handlers[] = {
182 &f2fs_xattr_user_handler,
183#ifdef CONFIG_F2FS_FS_POSIX_ACL
a6dda0e6
CH
184 &posix_acl_access_xattr_handler,
185 &posix_acl_default_xattr_handler,
af48b85b
JK
186#endif
187 &f2fs_xattr_trusted_handler,
8ae8f162
JK
188#ifdef CONFIG_F2FS_FS_SECURITY
189 &f2fs_xattr_security_handler,
190#endif
af48b85b
JK
191 &f2fs_xattr_advise_handler,
192 NULL,
193};
194
e1123268 195static inline const struct xattr_handler *f2fs_xattr_handler(int index)
af48b85b
JK
196{
197 const struct xattr_handler *handler = NULL;
198
e1123268
JK
199 if (index > 0 && index < ARRAY_SIZE(f2fs_xattr_handler_map))
200 handler = f2fs_xattr_handler_map[index];
af48b85b
JK
201 return handler;
202}
203
e1123268
JK
204static struct f2fs_xattr_entry *__find_xattr(void *base_addr, int index,
205 size_t len, const char *name)
dd9cfe23
JK
206{
207 struct f2fs_xattr_entry *entry;
208
209 list_for_each_xattr(entry, base_addr) {
e1123268 210 if (entry->e_name_index != index)
dd9cfe23 211 continue;
e1123268 212 if (entry->e_name_len != len)
dd9cfe23 213 continue;
e1123268 214 if (!memcmp(entry->e_name, name, len))
dd9cfe23
JK
215 break;
216 }
217 return entry;
218}
219
65985d93
JK
220static void *read_all_xattrs(struct inode *inode, struct page *ipage)
221{
4081363f 222 struct f2fs_sb_info *sbi = F2FS_I_SB(inode);
65985d93
JK
223 struct f2fs_xattr_header *header;
224 size_t size = PAGE_SIZE, inline_size = 0;
225 void *txattr_addr;
226
227 inline_size = inline_xattr_size(inode);
228
808a1d74 229 txattr_addr = kzalloc(inline_size + size, GFP_F2FS_ZERO);
65985d93
JK
230 if (!txattr_addr)
231 return NULL;
232
233 /* read from inline xattr */
234 if (inline_size) {
235 struct page *page = NULL;
236 void *inline_addr;
237
238 if (ipage) {
239 inline_addr = inline_xattr_addr(ipage);
240 } else {
241 page = get_node_page(sbi, inode->i_ino);
242 if (IS_ERR(page))
243 goto fail;
244 inline_addr = inline_xattr_addr(page);
245 }
246 memcpy(txattr_addr, inline_addr, inline_size);
247 f2fs_put_page(page, 1);
248 }
249
250 /* read from xattr node block */
251 if (F2FS_I(inode)->i_xattr_nid) {
252 struct page *xpage;
253 void *xattr_addr;
254
255 /* The inode already has an extended attribute block. */
256 xpage = get_node_page(sbi, F2FS_I(inode)->i_xattr_nid);
257 if (IS_ERR(xpage))
258 goto fail;
259
260 xattr_addr = page_address(xpage);
261 memcpy(txattr_addr + inline_size, xattr_addr, PAGE_SIZE);
262 f2fs_put_page(xpage, 1);
263 }
264
265 header = XATTR_HDR(txattr_addr);
266
267 /* never been allocated xattrs */
268 if (le32_to_cpu(header->h_magic) != F2FS_XATTR_MAGIC) {
269 header->h_magic = cpu_to_le32(F2FS_XATTR_MAGIC);
270 header->h_refcount = cpu_to_le32(1);
271 }
272 return txattr_addr;
273fail:
274 kzfree(txattr_addr);
275 return NULL;
276}
277
278static inline int write_all_xattrs(struct inode *inode, __u32 hsize,
279 void *txattr_addr, struct page *ipage)
280{
4081363f 281 struct f2fs_sb_info *sbi = F2FS_I_SB(inode);
65985d93
JK
282 size_t inline_size = 0;
283 void *xattr_addr;
284 struct page *xpage;
285 nid_t new_nid = 0;
286 int err;
287
288 inline_size = inline_xattr_size(inode);
289
290 if (hsize > inline_size && !F2FS_I(inode)->i_xattr_nid)
291 if (!alloc_nid(sbi, &new_nid))
292 return -ENOSPC;
293
294 /* write to inline xattr */
295 if (inline_size) {
296 struct page *page = NULL;
297 void *inline_addr;
298
299 if (ipage) {
300 inline_addr = inline_xattr_addr(ipage);
fec1d657 301 f2fs_wait_on_page_writeback(ipage, NODE, true);
ee6d182f 302 set_page_dirty(ipage);
65985d93
JK
303 } else {
304 page = get_node_page(sbi, inode->i_ino);
305 if (IS_ERR(page)) {
306 alloc_nid_failed(sbi, new_nid);
307 return PTR_ERR(page);
308 }
309 inline_addr = inline_xattr_addr(page);
fec1d657 310 f2fs_wait_on_page_writeback(page, NODE, true);
65985d93
JK
311 }
312 memcpy(inline_addr, txattr_addr, inline_size);
313 f2fs_put_page(page, 1);
314
315 /* no need to use xattr node block */
316 if (hsize <= inline_size) {
317 err = truncate_xattr_node(inode, ipage);
318 alloc_nid_failed(sbi, new_nid);
319 return err;
320 }
321 }
322
323 /* write to xattr node block */
324 if (F2FS_I(inode)->i_xattr_nid) {
325 xpage = get_node_page(sbi, F2FS_I(inode)->i_xattr_nid);
326 if (IS_ERR(xpage)) {
327 alloc_nid_failed(sbi, new_nid);
328 return PTR_ERR(xpage);
329 }
9850cf4a 330 f2fs_bug_on(sbi, new_nid);
fec1d657 331 f2fs_wait_on_page_writeback(xpage, NODE, true);
65985d93
JK
332 } else {
333 struct dnode_of_data dn;
334 set_new_dnode(&dn, inode, NULL, NULL, new_nid);
335 xpage = new_node_page(&dn, XATTR_NODE_OFFSET, ipage);
336 if (IS_ERR(xpage)) {
337 alloc_nid_failed(sbi, new_nid);
338 return PTR_ERR(xpage);
339 }
340 alloc_nid_done(sbi, new_nid);
341 }
342
343 xattr_addr = page_address(xpage);
344 memcpy(xattr_addr, txattr_addr + inline_size, PAGE_SIZE -
345 sizeof(struct node_footer));
346 set_page_dirty(xpage);
347 f2fs_put_page(xpage, 1);
348
349 /* need to checkpoint during fsync */
350 F2FS_I(inode)->xattr_ver = cur_cp_version(F2FS_CKPT(sbi));
351 return 0;
352}
353
e1123268 354int f2fs_getxattr(struct inode *inode, int index, const char *name,
bce8d112 355 void *buffer, size_t buffer_size, struct page *ipage)
af48b85b 356{
af48b85b 357 struct f2fs_xattr_entry *entry;
65985d93 358 void *base_addr;
dd9cfe23 359 int error = 0;
e1123268 360 size_t size, len;
af48b85b
JK
361
362 if (name == NULL)
363 return -EINVAL;
e1123268
JK
364
365 len = strlen(name);
366 if (len > F2FS_NAME_LEN)
6e452d69 367 return -ERANGE;
af48b85b 368
bce8d112 369 base_addr = read_all_xattrs(inode, ipage);
65985d93
JK
370 if (!base_addr)
371 return -ENOMEM;
af48b85b 372
e1123268 373 entry = __find_xattr(base_addr, index, len, name);
dd9cfe23 374 if (IS_XATTR_LAST_ENTRY(entry)) {
af48b85b
JK
375 error = -ENODATA;
376 goto cleanup;
377 }
378
e1123268 379 size = le16_to_cpu(entry->e_value_size);
af48b85b 380
e1123268 381 if (buffer && size > buffer_size) {
af48b85b
JK
382 error = -ERANGE;
383 goto cleanup;
384 }
385
386 if (buffer) {
387 char *pval = entry->e_name + entry->e_name_len;
e1123268 388 memcpy(buffer, pval, size);
af48b85b 389 }
e1123268 390 error = size;
af48b85b
JK
391
392cleanup:
65985d93 393 kzfree(base_addr);
af48b85b
JK
394 return error;
395}
396
397ssize_t f2fs_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
398{
2b0143b5 399 struct inode *inode = d_inode(dentry);
af48b85b 400 struct f2fs_xattr_entry *entry;
af48b85b
JK
401 void *base_addr;
402 int error = 0;
403 size_t rest = buffer_size;
404
65985d93
JK
405 base_addr = read_all_xattrs(inode, NULL);
406 if (!base_addr)
407 return -ENOMEM;
af48b85b
JK
408
409 list_for_each_xattr(entry, base_addr) {
410 const struct xattr_handler *handler =
411 f2fs_xattr_handler(entry->e_name_index);
764a5c6b
AG
412 const char *prefix;
413 size_t prefix_len;
af48b85b
JK
414 size_t size;
415
764a5c6b 416 if (!handler || (handler->list && !handler->list(dentry)))
af48b85b
JK
417 continue;
418
764a5c6b
AG
419 prefix = handler->prefix ?: handler->name;
420 prefix_len = strlen(prefix);
421 size = prefix_len + entry->e_name_len + 1;
422 if (buffer) {
423 if (size > rest) {
424 error = -ERANGE;
425 goto cleanup;
426 }
427 memcpy(buffer, prefix, prefix_len);
428 buffer += prefix_len;
429 memcpy(buffer, entry->e_name, entry->e_name_len);
430 buffer += entry->e_name_len;
431 *buffer++ = 0;
af48b85b 432 }
af48b85b
JK
433 rest -= size;
434 }
435 error = buffer_size - rest;
436cleanup:
65985d93 437 kzfree(base_addr);
af48b85b
JK
438 return error;
439}
440
e1123268
JK
441static int __f2fs_setxattr(struct inode *inode, int index,
442 const char *name, const void *value, size_t size,
c02745ef 443 struct page *ipage, int flags)
af48b85b 444{
af48b85b 445 struct f2fs_xattr_entry *here, *last;
af48b85b 446 void *base_addr;
65985d93 447 int found, newsize;
e1123268 448 size_t len;
65985d93 449 __u32 new_hsize;
a0995af6 450 int error = 0;
af48b85b
JK
451
452 if (name == NULL)
453 return -EINVAL;
af48b85b
JK
454
455 if (value == NULL)
e1123268 456 size = 0;
af48b85b 457
e1123268 458 len = strlen(name);
7c909772 459
037fe70c 460 if (len > F2FS_NAME_LEN)
af48b85b
JK
461 return -ERANGE;
462
037fe70c
CY
463 if (size > MAX_VALUE_LEN(inode))
464 return -E2BIG;
465
65985d93
JK
466 base_addr = read_all_xattrs(inode, ipage);
467 if (!base_addr)
a0995af6 468 return -ENOMEM;
af48b85b
JK
469
470 /* find entry with wanted name. */
e1123268 471 here = __find_xattr(base_addr, index, len, name);
af48b85b 472
dd9cfe23 473 found = IS_XATTR_LAST_ENTRY(here) ? 0 : 1;
af48b85b 474
916decbf
JK
475 if ((flags & XATTR_REPLACE) && !found) {
476 error = -ENODATA;
477 goto exit;
478 } else if ((flags & XATTR_CREATE) && found) {
479 error = -EEXIST;
480 goto exit;
481 }
482
483 last = here;
af48b85b
JK
484 while (!IS_XATTR_LAST_ENTRY(last))
485 last = XATTR_NEXT_ENTRY(last);
486
e1123268 487 newsize = XATTR_ALIGN(sizeof(struct f2fs_xattr_entry) + len + size);
af48b85b
JK
488
489 /* 1. Check space */
490 if (value) {
65985d93
JK
491 int free;
492 /*
493 * If value is NULL, it is remove operation.
e1c42045 494 * In case of update operation, we calculate free.
af48b85b 495 */
65985d93 496 free = MIN_OFFSET(inode) - ((char *)last - (char *)base_addr);
af48b85b 497 if (found)
cc3de6a3 498 free = free + ENTRY_SIZE(here);
af48b85b 499
6bacf52f 500 if (unlikely(free < newsize)) {
58457f1c 501 error = -E2BIG;
65985d93 502 goto exit;
af48b85b
JK
503 }
504 }
505
506 /* 2. Remove old entry */
507 if (found) {
65985d93
JK
508 /*
509 * If entry is found, remove old entry.
af48b85b
JK
510 * If not found, remove operation is not needed.
511 */
512 struct f2fs_xattr_entry *next = XATTR_NEXT_ENTRY(here);
513 int oldsize = ENTRY_SIZE(here);
514
515 memmove(here, next, (char *)last - (char *)next);
516 last = (struct f2fs_xattr_entry *)((char *)last - oldsize);
517 memset(last, 0, oldsize);
518 }
519
65985d93
JK
520 new_hsize = (char *)last - (char *)base_addr;
521
af48b85b
JK
522 /* 3. Write new entry */
523 if (value) {
65985d93
JK
524 char *pval;
525 /*
526 * Before we come here, old entry is removed.
527 * We just write new entry.
528 */
e1123268
JK
529 last->e_name_index = index;
530 last->e_name_len = len;
531 memcpy(last->e_name, name, len);
532 pval = last->e_name + len;
533 memcpy(pval, value, size);
534 last->e_value_size = cpu_to_le16(size);
65985d93 535 new_hsize += newsize;
af48b85b
JK
536 }
537
65985d93
JK
538 error = write_all_xattrs(inode, new_hsize, base_addr, ipage);
539 if (error)
540 goto exit;
af48b85b 541
91942321
JK
542 if (is_inode_flag_set(inode, FI_ACL_MODE)) {
543 inode->i_mode = F2FS_I(inode)->i_acl_mode;
af48b85b 544 inode->i_ctime = CURRENT_TIME;
91942321 545 clear_inode_flag(inode, FI_ACL_MODE);
af48b85b 546 }
f424f664
JK
547 if (index == F2FS_XATTR_INDEX_ENCRYPTION &&
548 !strcmp(name, F2FS_XATTR_NAME_ENCRYPTION_CONTEXT))
549 f2fs_set_encrypted_inode(inode);
b56ab837 550 f2fs_mark_inode_dirty_sync(inode);
bbf156f7
JK
551 if (!error && S_ISDIR(inode->i_mode))
552 set_sbi_flag(F2FS_I_SB(inode), SBI_NEED_CP);
7c909772 553exit:
65985d93 554 kzfree(base_addr);
af48b85b
JK
555 return error;
556}
52ab9560 557
e1123268
JK
558int f2fs_setxattr(struct inode *inode, int index, const char *name,
559 const void *value, size_t size,
c02745ef 560 struct page *ipage, int flags)
52ab9560 561{
4081363f 562 struct f2fs_sb_info *sbi = F2FS_I_SB(inode);
52ab9560
RK
563 int err;
564
d631abda
JK
565 /* this case is only from init_inode_metadata */
566 if (ipage)
567 return __f2fs_setxattr(inode, index, name, value,
568 size, ipage, flags);
2c4db1a6 569 f2fs_balance_fs(sbi, true);
52ab9560 570
e479556b 571 f2fs_lock_op(sbi);
d928bfbf
JK
572 /* protect xattr_ver */
573 down_write(&F2FS_I(inode)->i_sem);
c02745ef 574 err = __f2fs_setxattr(inode, index, name, value, size, ipage, flags);
d928bfbf 575 up_write(&F2FS_I(inode)->i_sem);
e479556b 576 f2fs_unlock_op(sbi);
52ab9560 577
d0239e1b 578 f2fs_update_time(sbi, REQ_TIME);
52ab9560
RK
579 return err;
580}
This page took 0.199591 seconds and 5 git commands to generate.