xattr.c (20613B)
1// SPDX-License-Identifier: GPL-2.0 2/* 3 * fs/f2fs/xattr.c 4 * 5 * Copyright (c) 2012 Samsung Electronics Co., Ltd. 6 * http://www.samsung.com/ 7 * 8 * Portions of this code from linux/fs/ext2/xattr.c 9 * 10 * Copyright (C) 2001-2003 Andreas Gruenbacher <agruen@suse.de> 11 * 12 * Fix by Harrison Xing <harrison@mountainviewdata.com>. 13 * Extended attributes for symlinks and special files added per 14 * suggestion of Luka Renko <luka.renko@hermes.si>. 15 * xattr consolidation Copyright (c) 2004 James Morris <jmorris@redhat.com>, 16 * Red Hat Inc. 17 */ 18#include <linux/rwsem.h> 19#include <linux/f2fs_fs.h> 20#include <linux/security.h> 21#include <linux/posix_acl_xattr.h> 22#include "f2fs.h" 23#include "xattr.h" 24#include "segment.h" 25 26static void *xattr_alloc(struct f2fs_sb_info *sbi, int size, bool *is_inline) 27{ 28 if (likely(size == sbi->inline_xattr_slab_size)) { 29 *is_inline = true; 30 return f2fs_kmem_cache_alloc(sbi->inline_xattr_slab, 31 GFP_F2FS_ZERO, false, sbi); 32 } 33 *is_inline = false; 34 return f2fs_kzalloc(sbi, size, GFP_NOFS); 35} 36 37static void xattr_free(struct f2fs_sb_info *sbi, void *xattr_addr, 38 bool is_inline) 39{ 40 if (is_inline) 41 kmem_cache_free(sbi->inline_xattr_slab, xattr_addr); 42 else 43 kfree(xattr_addr); 44} 45 46static int f2fs_xattr_generic_get(const struct xattr_handler *handler, 47 struct dentry *unused, struct inode *inode, 48 const char *name, void *buffer, size_t size) 49{ 50 struct f2fs_sb_info *sbi = F2FS_SB(inode->i_sb); 51 52 switch (handler->flags) { 53 case F2FS_XATTR_INDEX_USER: 54 if (!test_opt(sbi, XATTR_USER)) 55 return -EOPNOTSUPP; 56 break; 57 case F2FS_XATTR_INDEX_TRUSTED: 58 case F2FS_XATTR_INDEX_SECURITY: 59 break; 60 default: 61 return -EINVAL; 62 } 63 return f2fs_getxattr(inode, handler->flags, name, 64 buffer, size, NULL); 65} 66 67static int f2fs_xattr_generic_set(const struct xattr_handler *handler, 68 struct user_namespace *mnt_userns, 69 struct dentry *unused, struct inode *inode, 70 const char *name, const void *value, 71 size_t size, int flags) 72{ 73 struct f2fs_sb_info *sbi = F2FS_SB(inode->i_sb); 74 75 switch (handler->flags) { 76 case F2FS_XATTR_INDEX_USER: 77 if (!test_opt(sbi, XATTR_USER)) 78 return -EOPNOTSUPP; 79 break; 80 case F2FS_XATTR_INDEX_TRUSTED: 81 case F2FS_XATTR_INDEX_SECURITY: 82 break; 83 default: 84 return -EINVAL; 85 } 86 return f2fs_setxattr(inode, handler->flags, name, 87 value, size, NULL, flags); 88} 89 90static bool f2fs_xattr_user_list(struct dentry *dentry) 91{ 92 struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb); 93 94 return test_opt(sbi, XATTR_USER); 95} 96 97static bool f2fs_xattr_trusted_list(struct dentry *dentry) 98{ 99 return capable(CAP_SYS_ADMIN); 100} 101 102static int f2fs_xattr_advise_get(const struct xattr_handler *handler, 103 struct dentry *unused, struct inode *inode, 104 const char *name, void *buffer, size_t size) 105{ 106 if (buffer) 107 *((char *)buffer) = F2FS_I(inode)->i_advise; 108 return sizeof(char); 109} 110 111static int f2fs_xattr_advise_set(const struct xattr_handler *handler, 112 struct user_namespace *mnt_userns, 113 struct dentry *unused, struct inode *inode, 114 const char *name, const void *value, 115 size_t size, int flags) 116{ 117 unsigned char old_advise = F2FS_I(inode)->i_advise; 118 unsigned char new_advise; 119 120 if (!inode_owner_or_capable(&init_user_ns, inode)) 121 return -EPERM; 122 if (value == NULL) 123 return -EINVAL; 124 125 new_advise = *(char *)value; 126 if (new_advise & ~FADVISE_MODIFIABLE_BITS) 127 return -EINVAL; 128 129 new_advise = new_advise & FADVISE_MODIFIABLE_BITS; 130 new_advise |= old_advise & ~FADVISE_MODIFIABLE_BITS; 131 132 F2FS_I(inode)->i_advise = new_advise; 133 f2fs_mark_inode_dirty_sync(inode, true); 134 return 0; 135} 136 137#ifdef CONFIG_F2FS_FS_SECURITY 138static int f2fs_initxattrs(struct inode *inode, const struct xattr *xattr_array, 139 void *page) 140{ 141 const struct xattr *xattr; 142 int err = 0; 143 144 for (xattr = xattr_array; xattr->name != NULL; xattr++) { 145 err = f2fs_setxattr(inode, F2FS_XATTR_INDEX_SECURITY, 146 xattr->name, xattr->value, 147 xattr->value_len, (struct page *)page, 0); 148 if (err < 0) 149 break; 150 } 151 return err; 152} 153 154int f2fs_init_security(struct inode *inode, struct inode *dir, 155 const struct qstr *qstr, struct page *ipage) 156{ 157 return security_inode_init_security(inode, dir, qstr, 158 &f2fs_initxattrs, ipage); 159} 160#endif 161 162const struct xattr_handler f2fs_xattr_user_handler = { 163 .prefix = XATTR_USER_PREFIX, 164 .flags = F2FS_XATTR_INDEX_USER, 165 .list = f2fs_xattr_user_list, 166 .get = f2fs_xattr_generic_get, 167 .set = f2fs_xattr_generic_set, 168}; 169 170const struct xattr_handler f2fs_xattr_trusted_handler = { 171 .prefix = XATTR_TRUSTED_PREFIX, 172 .flags = F2FS_XATTR_INDEX_TRUSTED, 173 .list = f2fs_xattr_trusted_list, 174 .get = f2fs_xattr_generic_get, 175 .set = f2fs_xattr_generic_set, 176}; 177 178const struct xattr_handler f2fs_xattr_advise_handler = { 179 .name = F2FS_SYSTEM_ADVISE_NAME, 180 .flags = F2FS_XATTR_INDEX_ADVISE, 181 .get = f2fs_xattr_advise_get, 182 .set = f2fs_xattr_advise_set, 183}; 184 185const struct xattr_handler f2fs_xattr_security_handler = { 186 .prefix = XATTR_SECURITY_PREFIX, 187 .flags = F2FS_XATTR_INDEX_SECURITY, 188 .get = f2fs_xattr_generic_get, 189 .set = f2fs_xattr_generic_set, 190}; 191 192static const struct xattr_handler *f2fs_xattr_handler_map[] = { 193 [F2FS_XATTR_INDEX_USER] = &f2fs_xattr_user_handler, 194#ifdef CONFIG_F2FS_FS_POSIX_ACL 195 [F2FS_XATTR_INDEX_POSIX_ACL_ACCESS] = &posix_acl_access_xattr_handler, 196 [F2FS_XATTR_INDEX_POSIX_ACL_DEFAULT] = &posix_acl_default_xattr_handler, 197#endif 198 [F2FS_XATTR_INDEX_TRUSTED] = &f2fs_xattr_trusted_handler, 199#ifdef CONFIG_F2FS_FS_SECURITY 200 [F2FS_XATTR_INDEX_SECURITY] = &f2fs_xattr_security_handler, 201#endif 202 [F2FS_XATTR_INDEX_ADVISE] = &f2fs_xattr_advise_handler, 203}; 204 205const struct xattr_handler *f2fs_xattr_handlers[] = { 206 &f2fs_xattr_user_handler, 207#ifdef CONFIG_F2FS_FS_POSIX_ACL 208 &posix_acl_access_xattr_handler, 209 &posix_acl_default_xattr_handler, 210#endif 211 &f2fs_xattr_trusted_handler, 212#ifdef CONFIG_F2FS_FS_SECURITY 213 &f2fs_xattr_security_handler, 214#endif 215 &f2fs_xattr_advise_handler, 216 NULL, 217}; 218 219static inline const struct xattr_handler *f2fs_xattr_handler(int index) 220{ 221 const struct xattr_handler *handler = NULL; 222 223 if (index > 0 && index < ARRAY_SIZE(f2fs_xattr_handler_map)) 224 handler = f2fs_xattr_handler_map[index]; 225 return handler; 226} 227 228static struct f2fs_xattr_entry *__find_xattr(void *base_addr, 229 void *last_base_addr, void **last_addr, 230 int index, size_t len, const char *name) 231{ 232 struct f2fs_xattr_entry *entry; 233 234 list_for_each_xattr(entry, base_addr) { 235 if ((void *)(entry) + sizeof(__u32) > last_base_addr || 236 (void *)XATTR_NEXT_ENTRY(entry) > last_base_addr) { 237 if (last_addr) 238 *last_addr = entry; 239 return NULL; 240 } 241 242 if (entry->e_name_index != index) 243 continue; 244 if (entry->e_name_len != len) 245 continue; 246 if (!memcmp(entry->e_name, name, len)) 247 break; 248 } 249 return entry; 250} 251 252static struct f2fs_xattr_entry *__find_inline_xattr(struct inode *inode, 253 void *base_addr, void **last_addr, int index, 254 size_t len, const char *name) 255{ 256 struct f2fs_xattr_entry *entry; 257 unsigned int inline_size = inline_xattr_size(inode); 258 void *max_addr = base_addr + inline_size; 259 260 entry = __find_xattr(base_addr, max_addr, last_addr, index, len, name); 261 if (!entry) 262 return NULL; 263 264 /* inline xattr header or entry across max inline xattr size */ 265 if (IS_XATTR_LAST_ENTRY(entry) && 266 (void *)entry + sizeof(__u32) > max_addr) { 267 *last_addr = entry; 268 return NULL; 269 } 270 return entry; 271} 272 273static int read_inline_xattr(struct inode *inode, struct page *ipage, 274 void *txattr_addr) 275{ 276 struct f2fs_sb_info *sbi = F2FS_I_SB(inode); 277 unsigned int inline_size = inline_xattr_size(inode); 278 struct page *page = NULL; 279 void *inline_addr; 280 281 if (ipage) { 282 inline_addr = inline_xattr_addr(inode, ipage); 283 } else { 284 page = f2fs_get_node_page(sbi, inode->i_ino); 285 if (IS_ERR(page)) 286 return PTR_ERR(page); 287 288 inline_addr = inline_xattr_addr(inode, page); 289 } 290 memcpy(txattr_addr, inline_addr, inline_size); 291 f2fs_put_page(page, 1); 292 293 return 0; 294} 295 296static int read_xattr_block(struct inode *inode, void *txattr_addr) 297{ 298 struct f2fs_sb_info *sbi = F2FS_I_SB(inode); 299 nid_t xnid = F2FS_I(inode)->i_xattr_nid; 300 unsigned int inline_size = inline_xattr_size(inode); 301 struct page *xpage; 302 void *xattr_addr; 303 304 /* The inode already has an extended attribute block. */ 305 xpage = f2fs_get_node_page(sbi, xnid); 306 if (IS_ERR(xpage)) 307 return PTR_ERR(xpage); 308 309 xattr_addr = page_address(xpage); 310 memcpy(txattr_addr + inline_size, xattr_addr, VALID_XATTR_BLOCK_SIZE); 311 f2fs_put_page(xpage, 1); 312 313 return 0; 314} 315 316static int lookup_all_xattrs(struct inode *inode, struct page *ipage, 317 unsigned int index, unsigned int len, 318 const char *name, struct f2fs_xattr_entry **xe, 319 void **base_addr, int *base_size, 320 bool *is_inline) 321{ 322 void *cur_addr, *txattr_addr, *last_txattr_addr; 323 void *last_addr = NULL; 324 nid_t xnid = F2FS_I(inode)->i_xattr_nid; 325 unsigned int inline_size = inline_xattr_size(inode); 326 int err; 327 328 if (!xnid && !inline_size) 329 return -ENODATA; 330 331 *base_size = XATTR_SIZE(inode) + XATTR_PADDING_SIZE; 332 txattr_addr = xattr_alloc(F2FS_I_SB(inode), *base_size, is_inline); 333 if (!txattr_addr) 334 return -ENOMEM; 335 336 last_txattr_addr = (void *)txattr_addr + XATTR_SIZE(inode); 337 338 /* read from inline xattr */ 339 if (inline_size) { 340 err = read_inline_xattr(inode, ipage, txattr_addr); 341 if (err) 342 goto out; 343 344 *xe = __find_inline_xattr(inode, txattr_addr, &last_addr, 345 index, len, name); 346 if (*xe) { 347 *base_size = inline_size; 348 goto check; 349 } 350 } 351 352 /* read from xattr node block */ 353 if (xnid) { 354 err = read_xattr_block(inode, txattr_addr); 355 if (err) 356 goto out; 357 } 358 359 if (last_addr) 360 cur_addr = XATTR_HDR(last_addr) - 1; 361 else 362 cur_addr = txattr_addr; 363 364 *xe = __find_xattr(cur_addr, last_txattr_addr, NULL, index, len, name); 365 if (!*xe) { 366 f2fs_err(F2FS_I_SB(inode), "inode (%lu) has corrupted xattr", 367 inode->i_ino); 368 set_sbi_flag(F2FS_I_SB(inode), SBI_NEED_FSCK); 369 err = -EFSCORRUPTED; 370 goto out; 371 } 372check: 373 if (IS_XATTR_LAST_ENTRY(*xe)) { 374 err = -ENODATA; 375 goto out; 376 } 377 378 *base_addr = txattr_addr; 379 return 0; 380out: 381 xattr_free(F2FS_I_SB(inode), txattr_addr, *is_inline); 382 return err; 383} 384 385static int read_all_xattrs(struct inode *inode, struct page *ipage, 386 void **base_addr) 387{ 388 struct f2fs_xattr_header *header; 389 nid_t xnid = F2FS_I(inode)->i_xattr_nid; 390 unsigned int size = VALID_XATTR_BLOCK_SIZE; 391 unsigned int inline_size = inline_xattr_size(inode); 392 void *txattr_addr; 393 int err; 394 395 txattr_addr = f2fs_kzalloc(F2FS_I_SB(inode), 396 inline_size + size + XATTR_PADDING_SIZE, GFP_NOFS); 397 if (!txattr_addr) 398 return -ENOMEM; 399 400 /* read from inline xattr */ 401 if (inline_size) { 402 err = read_inline_xattr(inode, ipage, txattr_addr); 403 if (err) 404 goto fail; 405 } 406 407 /* read from xattr node block */ 408 if (xnid) { 409 err = read_xattr_block(inode, txattr_addr); 410 if (err) 411 goto fail; 412 } 413 414 header = XATTR_HDR(txattr_addr); 415 416 /* never been allocated xattrs */ 417 if (le32_to_cpu(header->h_magic) != F2FS_XATTR_MAGIC) { 418 header->h_magic = cpu_to_le32(F2FS_XATTR_MAGIC); 419 header->h_refcount = cpu_to_le32(1); 420 } 421 *base_addr = txattr_addr; 422 return 0; 423fail: 424 kfree(txattr_addr); 425 return err; 426} 427 428static inline int write_all_xattrs(struct inode *inode, __u32 hsize, 429 void *txattr_addr, struct page *ipage) 430{ 431 struct f2fs_sb_info *sbi = F2FS_I_SB(inode); 432 size_t inline_size = inline_xattr_size(inode); 433 struct page *in_page = NULL; 434 void *xattr_addr; 435 void *inline_addr = NULL; 436 struct page *xpage; 437 nid_t new_nid = 0; 438 int err = 0; 439 440 if (hsize > inline_size && !F2FS_I(inode)->i_xattr_nid) 441 if (!f2fs_alloc_nid(sbi, &new_nid)) 442 return -ENOSPC; 443 444 /* write to inline xattr */ 445 if (inline_size) { 446 if (ipage) { 447 inline_addr = inline_xattr_addr(inode, ipage); 448 } else { 449 in_page = f2fs_get_node_page(sbi, inode->i_ino); 450 if (IS_ERR(in_page)) { 451 f2fs_alloc_nid_failed(sbi, new_nid); 452 return PTR_ERR(in_page); 453 } 454 inline_addr = inline_xattr_addr(inode, in_page); 455 } 456 457 f2fs_wait_on_page_writeback(ipage ? ipage : in_page, 458 NODE, true, true); 459 /* no need to use xattr node block */ 460 if (hsize <= inline_size) { 461 err = f2fs_truncate_xattr_node(inode); 462 f2fs_alloc_nid_failed(sbi, new_nid); 463 if (err) { 464 f2fs_put_page(in_page, 1); 465 return err; 466 } 467 memcpy(inline_addr, txattr_addr, inline_size); 468 set_page_dirty(ipage ? ipage : in_page); 469 goto in_page_out; 470 } 471 } 472 473 /* write to xattr node block */ 474 if (F2FS_I(inode)->i_xattr_nid) { 475 xpage = f2fs_get_node_page(sbi, F2FS_I(inode)->i_xattr_nid); 476 if (IS_ERR(xpage)) { 477 err = PTR_ERR(xpage); 478 f2fs_alloc_nid_failed(sbi, new_nid); 479 goto in_page_out; 480 } 481 f2fs_bug_on(sbi, new_nid); 482 f2fs_wait_on_page_writeback(xpage, NODE, true, true); 483 } else { 484 struct dnode_of_data dn; 485 486 set_new_dnode(&dn, inode, NULL, NULL, new_nid); 487 xpage = f2fs_new_node_page(&dn, XATTR_NODE_OFFSET); 488 if (IS_ERR(xpage)) { 489 err = PTR_ERR(xpage); 490 f2fs_alloc_nid_failed(sbi, new_nid); 491 goto in_page_out; 492 } 493 f2fs_alloc_nid_done(sbi, new_nid); 494 } 495 xattr_addr = page_address(xpage); 496 497 if (inline_size) 498 memcpy(inline_addr, txattr_addr, inline_size); 499 memcpy(xattr_addr, txattr_addr + inline_size, VALID_XATTR_BLOCK_SIZE); 500 501 if (inline_size) 502 set_page_dirty(ipage ? ipage : in_page); 503 set_page_dirty(xpage); 504 505 f2fs_put_page(xpage, 1); 506in_page_out: 507 f2fs_put_page(in_page, 1); 508 return err; 509} 510 511int f2fs_getxattr(struct inode *inode, int index, const char *name, 512 void *buffer, size_t buffer_size, struct page *ipage) 513{ 514 struct f2fs_xattr_entry *entry = NULL; 515 int error; 516 unsigned int size, len; 517 void *base_addr = NULL; 518 int base_size; 519 bool is_inline; 520 521 if (name == NULL) 522 return -EINVAL; 523 524 len = strlen(name); 525 if (len > F2FS_NAME_LEN) 526 return -ERANGE; 527 528 f2fs_down_read(&F2FS_I(inode)->i_xattr_sem); 529 error = lookup_all_xattrs(inode, ipage, index, len, name, 530 &entry, &base_addr, &base_size, &is_inline); 531 f2fs_up_read(&F2FS_I(inode)->i_xattr_sem); 532 if (error) 533 return error; 534 535 size = le16_to_cpu(entry->e_value_size); 536 537 if (buffer && size > buffer_size) { 538 error = -ERANGE; 539 goto out; 540 } 541 542 if (buffer) { 543 char *pval = entry->e_name + entry->e_name_len; 544 545 if (base_size - (pval - (char *)base_addr) < size) { 546 error = -ERANGE; 547 goto out; 548 } 549 memcpy(buffer, pval, size); 550 } 551 error = size; 552out: 553 xattr_free(F2FS_I_SB(inode), base_addr, is_inline); 554 return error; 555} 556 557ssize_t f2fs_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size) 558{ 559 struct inode *inode = d_inode(dentry); 560 struct f2fs_xattr_entry *entry; 561 void *base_addr, *last_base_addr; 562 int error; 563 size_t rest = buffer_size; 564 565 f2fs_down_read(&F2FS_I(inode)->i_xattr_sem); 566 error = read_all_xattrs(inode, NULL, &base_addr); 567 f2fs_up_read(&F2FS_I(inode)->i_xattr_sem); 568 if (error) 569 return error; 570 571 last_base_addr = (void *)base_addr + XATTR_SIZE(inode); 572 573 list_for_each_xattr(entry, base_addr) { 574 const struct xattr_handler *handler = 575 f2fs_xattr_handler(entry->e_name_index); 576 const char *prefix; 577 size_t prefix_len; 578 size_t size; 579 580 if ((void *)(entry) + sizeof(__u32) > last_base_addr || 581 (void *)XATTR_NEXT_ENTRY(entry) > last_base_addr) { 582 f2fs_err(F2FS_I_SB(inode), "inode (%lu) has corrupted xattr", 583 inode->i_ino); 584 set_sbi_flag(F2FS_I_SB(inode), SBI_NEED_FSCK); 585 error = -EFSCORRUPTED; 586 goto cleanup; 587 } 588 589 if (!handler || (handler->list && !handler->list(dentry))) 590 continue; 591 592 prefix = xattr_prefix(handler); 593 prefix_len = strlen(prefix); 594 size = prefix_len + entry->e_name_len + 1; 595 if (buffer) { 596 if (size > rest) { 597 error = -ERANGE; 598 goto cleanup; 599 } 600 memcpy(buffer, prefix, prefix_len); 601 buffer += prefix_len; 602 memcpy(buffer, entry->e_name, entry->e_name_len); 603 buffer += entry->e_name_len; 604 *buffer++ = 0; 605 } 606 rest -= size; 607 } 608 error = buffer_size - rest; 609cleanup: 610 kfree(base_addr); 611 return error; 612} 613 614static bool f2fs_xattr_value_same(struct f2fs_xattr_entry *entry, 615 const void *value, size_t size) 616{ 617 void *pval = entry->e_name + entry->e_name_len; 618 619 return (le16_to_cpu(entry->e_value_size) == size) && 620 !memcmp(pval, value, size); 621} 622 623static int __f2fs_setxattr(struct inode *inode, int index, 624 const char *name, const void *value, size_t size, 625 struct page *ipage, int flags) 626{ 627 struct f2fs_xattr_entry *here, *last; 628 void *base_addr, *last_base_addr; 629 int found, newsize; 630 size_t len; 631 __u32 new_hsize; 632 int error; 633 634 if (name == NULL) 635 return -EINVAL; 636 637 if (value == NULL) 638 size = 0; 639 640 len = strlen(name); 641 642 if (len > F2FS_NAME_LEN) 643 return -ERANGE; 644 645 if (size > MAX_VALUE_LEN(inode)) 646 return -E2BIG; 647 648 error = read_all_xattrs(inode, ipage, &base_addr); 649 if (error) 650 return error; 651 652 last_base_addr = (void *)base_addr + XATTR_SIZE(inode); 653 654 /* find entry with wanted name. */ 655 here = __find_xattr(base_addr, last_base_addr, NULL, index, len, name); 656 if (!here) { 657 f2fs_err(F2FS_I_SB(inode), "inode (%lu) has corrupted xattr", 658 inode->i_ino); 659 set_sbi_flag(F2FS_I_SB(inode), SBI_NEED_FSCK); 660 error = -EFSCORRUPTED; 661 goto exit; 662 } 663 664 found = IS_XATTR_LAST_ENTRY(here) ? 0 : 1; 665 666 if (found) { 667 if ((flags & XATTR_CREATE)) { 668 error = -EEXIST; 669 goto exit; 670 } 671 672 if (value && f2fs_xattr_value_same(here, value, size)) 673 goto same; 674 } else if ((flags & XATTR_REPLACE)) { 675 error = -ENODATA; 676 goto exit; 677 } 678 679 last = here; 680 while (!IS_XATTR_LAST_ENTRY(last)) { 681 if ((void *)(last) + sizeof(__u32) > last_base_addr || 682 (void *)XATTR_NEXT_ENTRY(last) > last_base_addr) { 683 f2fs_err(F2FS_I_SB(inode), "inode (%lu) has invalid last xattr entry, entry_size: %zu", 684 inode->i_ino, ENTRY_SIZE(last)); 685 set_sbi_flag(F2FS_I_SB(inode), SBI_NEED_FSCK); 686 error = -EFSCORRUPTED; 687 goto exit; 688 } 689 last = XATTR_NEXT_ENTRY(last); 690 } 691 692 newsize = XATTR_ALIGN(sizeof(struct f2fs_xattr_entry) + len + size); 693 694 /* 1. Check space */ 695 if (value) { 696 int free; 697 /* 698 * If value is NULL, it is remove operation. 699 * In case of update operation, we calculate free. 700 */ 701 free = MIN_OFFSET(inode) - ((char *)last - (char *)base_addr); 702 if (found) 703 free = free + ENTRY_SIZE(here); 704 705 if (unlikely(free < newsize)) { 706 error = -E2BIG; 707 goto exit; 708 } 709 } 710 711 /* 2. Remove old entry */ 712 if (found) { 713 /* 714 * If entry is found, remove old entry. 715 * If not found, remove operation is not needed. 716 */ 717 struct f2fs_xattr_entry *next = XATTR_NEXT_ENTRY(here); 718 int oldsize = ENTRY_SIZE(here); 719 720 memmove(here, next, (char *)last - (char *)next); 721 last = (struct f2fs_xattr_entry *)((char *)last - oldsize); 722 memset(last, 0, oldsize); 723 } 724 725 new_hsize = (char *)last - (char *)base_addr; 726 727 /* 3. Write new entry */ 728 if (value) { 729 char *pval; 730 /* 731 * Before we come here, old entry is removed. 732 * We just write new entry. 733 */ 734 last->e_name_index = index; 735 last->e_name_len = len; 736 memcpy(last->e_name, name, len); 737 pval = last->e_name + len; 738 memcpy(pval, value, size); 739 last->e_value_size = cpu_to_le16(size); 740 new_hsize += newsize; 741 } 742 743 error = write_all_xattrs(inode, new_hsize, base_addr, ipage); 744 if (error) 745 goto exit; 746 747 if (index == F2FS_XATTR_INDEX_ENCRYPTION && 748 !strcmp(name, F2FS_XATTR_NAME_ENCRYPTION_CONTEXT)) 749 f2fs_set_encrypted_inode(inode); 750 f2fs_mark_inode_dirty_sync(inode, true); 751 if (!error && S_ISDIR(inode->i_mode)) 752 set_sbi_flag(F2FS_I_SB(inode), SBI_NEED_CP); 753 754same: 755 if (is_inode_flag_set(inode, FI_ACL_MODE)) { 756 inode->i_mode = F2FS_I(inode)->i_acl_mode; 757 inode->i_ctime = current_time(inode); 758 clear_inode_flag(inode, FI_ACL_MODE); 759 } 760 761exit: 762 kfree(base_addr); 763 return error; 764} 765 766int f2fs_setxattr(struct inode *inode, int index, const char *name, 767 const void *value, size_t size, 768 struct page *ipage, int flags) 769{ 770 struct f2fs_sb_info *sbi = F2FS_I_SB(inode); 771 int err; 772 773 if (unlikely(f2fs_cp_error(sbi))) 774 return -EIO; 775 if (!f2fs_is_checkpoint_ready(sbi)) 776 return -ENOSPC; 777 778 err = f2fs_dquot_initialize(inode); 779 if (err) 780 return err; 781 782 /* this case is only from f2fs_init_inode_metadata */ 783 if (ipage) 784 return __f2fs_setxattr(inode, index, name, value, 785 size, ipage, flags); 786 f2fs_balance_fs(sbi, true); 787 788 f2fs_lock_op(sbi); 789 f2fs_down_write(&F2FS_I(inode)->i_xattr_sem); 790 err = __f2fs_setxattr(inode, index, name, value, size, ipage, flags); 791 f2fs_up_write(&F2FS_I(inode)->i_xattr_sem); 792 f2fs_unlock_op(sbi); 793 794 f2fs_update_time(sbi, REQ_TIME); 795 return err; 796} 797 798int f2fs_init_xattr_caches(struct f2fs_sb_info *sbi) 799{ 800 dev_t dev = sbi->sb->s_bdev->bd_dev; 801 char slab_name[32]; 802 803 sprintf(slab_name, "f2fs_xattr_entry-%u:%u", MAJOR(dev), MINOR(dev)); 804 805 sbi->inline_xattr_slab_size = F2FS_OPTION(sbi).inline_xattr_size * 806 sizeof(__le32) + XATTR_PADDING_SIZE; 807 808 sbi->inline_xattr_slab = f2fs_kmem_cache_create(slab_name, 809 sbi->inline_xattr_slab_size); 810 if (!sbi->inline_xattr_slab) 811 return -ENOMEM; 812 813 return 0; 814} 815 816void f2fs_destroy_xattr_caches(struct f2fs_sb_info *sbi) 817{ 818 kmem_cache_destroy(sbi->inline_xattr_slab); 819}