reiserfs: cleanup, remove nblocks argument from journal_end
[linux-block.git] / fs / reiserfs / xattr.c
CommitLineData
1da177e4
LT
1/*
2 * linux/fs/reiserfs/xattr.c
3 *
4 * Copyright (c) 2002 by Jeff Mahoney, <jeffm@suse.com>
5 *
6 */
7
8/*
9 * In order to implement EA/ACLs in a clean, backwards compatible manner,
10 * they are implemented as files in a "private" directory.
11 * Each EA is in it's own file, with the directory layout like so (/ is assumed
12 * to be relative to fs root). Inside the /.reiserfs_priv/xattrs directory,
13 * directories named using the capital-hex form of the objectid and
14 * generation number are used. Inside each directory are individual files
15 * named with the name of the extended attribute.
16 *
17 * So, for objectid 12648430, we could have:
18 * /.reiserfs_priv/xattrs/C0FFEE.0/system.posix_acl_access
19 * /.reiserfs_priv/xattrs/C0FFEE.0/system.posix_acl_default
20 * /.reiserfs_priv/xattrs/C0FFEE.0/user.Content-Type
21 * .. or similar.
22 *
23 * The file contents are the text of the EA. The size is known based on the
24 * stat data describing the file.
25 *
26 * In the case of system.posix_acl_access and system.posix_acl_default, since
27 * these are special cases for filesystem ACLs, they are interpreted by the
28 * kernel, in addition, they are negatively and positively cached and attached
29 * to the inode so that unnecessary lookups are avoided.
d984561b
JM
30 *
31 * Locking works like so:
8b6dd72a
JM
32 * Directory components (xattr root, xattr dir) are protectd by their i_mutex.
33 * The xattrs themselves are protected by the xattr_sem.
1da177e4
LT
34 */
35
f466c6fd 36#include "reiserfs.h"
16f7e0fe 37#include <linux/capability.h>
1da177e4
LT
38#include <linux/dcache.h>
39#include <linux/namei.h>
40#include <linux/errno.h>
5a0e3ad6 41#include <linux/gfp.h>
1da177e4
LT
42#include <linux/fs.h>
43#include <linux/file.h>
44#include <linux/pagemap.h>
45#include <linux/xattr.h>
c45ac888 46#include "xattr.h"
a3063ab8 47#include "acl.h"
1da177e4 48#include <asm/uaccess.h>
3277c39f 49#include <net/checksum.h>
1da177e4 50#include <linux/stat.h>
6c17675e 51#include <linux/quotaops.h>
431547b3 52#include <linux/security.h>
47f70d08 53#include <linux/posix_acl_xattr.h>
1da177e4 54
1da177e4
LT
55#define PRIVROOT_NAME ".reiserfs_priv"
56#define XAROOT_NAME "xattrs"
57
1da177e4 58
098297b2
JM
59/*
60 * Helpers for inode ops. We do this so that we don't have all the VFS
6c17675e 61 * overhead and also for proper i_mutex annotation.
098297b2
JM
62 * dir->i_mutex must be held for all of them.
63 */
3a355cc6 64#ifdef CONFIG_REISERFS_FS_XATTR
6c17675e 65static int xattr_create(struct inode *dir, struct dentry *dentry, int mode)
1da177e4 66{
6c17675e 67 BUG_ON(!mutex_is_locked(&dir->i_mutex));
ebfc3b49 68 return dir->i_op->create(dir, dentry, mode, true);
6c17675e 69}
3a355cc6 70#endif
bd4c625c 71
18bb1db3 72static int xattr_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode)
6c17675e
JM
73{
74 BUG_ON(!mutex_is_locked(&dir->i_mutex));
6c17675e
JM
75 return dir->i_op->mkdir(dir, dentry, mode);
76}
bd4c625c 77
098297b2
JM
78/*
79 * We use I_MUTEX_CHILD here to silence lockdep. It's safe because xattr
6c17675e
JM
80 * mutation ops aren't called during rename or splace, which are the
81 * only other users of I_MUTEX_CHILD. It violates the ordering, but that's
098297b2
JM
82 * better than allocating another subclass just for this code.
83 */
6c17675e
JM
84static int xattr_unlink(struct inode *dir, struct dentry *dentry)
85{
86 int error;
87 BUG_ON(!mutex_is_locked(&dir->i_mutex));
bd4c625c 88
4c05141d 89 mutex_lock_nested(&dentry->d_inode->i_mutex, I_MUTEX_CHILD);
6c17675e
JM
90 error = dir->i_op->unlink(dir, dentry);
91 mutex_unlock(&dentry->d_inode->i_mutex);
92
93 if (!error)
94 d_delete(dentry);
95 return error;
96}
97
98static int xattr_rmdir(struct inode *dir, struct dentry *dentry)
99{
100 int error;
101 BUG_ON(!mutex_is_locked(&dir->i_mutex));
6c17675e 102
4c05141d 103 mutex_lock_nested(&dentry->d_inode->i_mutex, I_MUTEX_CHILD);
6c17675e
JM
104 error = dir->i_op->rmdir(dir, dentry);
105 if (!error)
106 dentry->d_inode->i_flags |= S_DEAD;
107 mutex_unlock(&dentry->d_inode->i_mutex);
108 if (!error)
109 d_delete(dentry);
6c17675e
JM
110
111 return error;
112}
113
6c17675e
JM
114#define xattr_may_create(flags) (!flags || flags & XATTR_CREATE)
115
ab17c4f0 116static struct dentry *open_xa_root(struct super_block *sb, int flags)
6c17675e 117{
ab17c4f0
JM
118 struct dentry *privroot = REISERFS_SB(sb)->priv_root;
119 struct dentry *xaroot;
120 if (!privroot->d_inode)
121 return ERR_PTR(-ENODATA);
6c17675e 122
ab17c4f0 123 mutex_lock_nested(&privroot->d_inode->i_mutex, I_MUTEX_XATTR);
6c17675e 124
ab17c4f0 125 xaroot = dget(REISERFS_SB(sb)->xattr_root);
ceb5edc4
JM
126 if (!xaroot)
127 xaroot = ERR_PTR(-ENODATA);
128 else if (!xaroot->d_inode) {
ab17c4f0 129 int err = -ENODATA;
5a6059c3 130 if (xattr_may_create(flags))
ab17c4f0 131 err = xattr_mkdir(privroot->d_inode, xaroot, 0700);
9b7f3755 132 if (err) {
ab17c4f0
JM
133 dput(xaroot);
134 xaroot = ERR_PTR(err);
9b7f3755 135 }
bd4c625c 136 }
6c17675e 137
ab17c4f0
JM
138 mutex_unlock(&privroot->d_inode->i_mutex);
139 return xaroot;
1da177e4
LT
140}
141
bd4c625c 142static struct dentry *open_xa_dir(const struct inode *inode, int flags)
1da177e4 143{
bd4c625c
LT
144 struct dentry *xaroot, *xadir;
145 char namebuf[17];
146
6c17675e 147 xaroot = open_xa_root(inode->i_sb, flags);
9b7f3755 148 if (IS_ERR(xaroot))
bd4c625c 149 return xaroot;
bd4c625c 150
bd4c625c
LT
151 snprintf(namebuf, sizeof(namebuf), "%X.%X",
152 le32_to_cpu(INODE_PKEY(inode)->k_objectid),
153 inode->i_generation);
bd4c625c 154
ab17c4f0
JM
155 mutex_lock_nested(&xaroot->d_inode->i_mutex, I_MUTEX_XATTR);
156
157 xadir = lookup_one_len(namebuf, xaroot, strlen(namebuf));
158 if (!IS_ERR(xadir) && !xadir->d_inode) {
159 int err = -ENODATA;
160 if (xattr_may_create(flags))
161 err = xattr_mkdir(xaroot->d_inode, xadir, 0700);
162 if (err) {
163 dput(xadir);
164 xadir = ERR_PTR(err);
165 }
166 }
167
168 mutex_unlock(&xaroot->d_inode->i_mutex);
bd4c625c
LT
169 dput(xaroot);
170 return xadir;
1da177e4
LT
171}
172
098297b2
JM
173/*
174 * The following are side effects of other operations that aren't explicitly
48b32a35 175 * modifying extended attributes. This includes operations such as permissions
098297b2
JM
176 * or ownership changes, object deletions, etc.
177 */
a41f1a47 178struct reiserfs_dentry_buf {
4acf381e 179 struct dir_context ctx;
a41f1a47
JM
180 struct dentry *xadir;
181 int count;
182 struct dentry *dentries[8];
183};
bd4c625c 184
a72bdb1c 185static int
a41f1a47
JM
186fill_with_dentries(void *buf, const char *name, int namelen, loff_t offset,
187 u64 ino, unsigned int d_type)
a72bdb1c 188{
a41f1a47 189 struct reiserfs_dentry_buf *dbuf = buf;
a72bdb1c 190 struct dentry *dentry;
5a6059c3 191 WARN_ON_ONCE(!mutex_is_locked(&dbuf->xadir->d_inode->i_mutex));
bd4c625c 192
a41f1a47
JM
193 if (dbuf->count == ARRAY_SIZE(dbuf->dentries))
194 return -ENOSPC;
bd4c625c 195
35e5cbc0
JK
196 if (name[0] == '.' && (namelen < 2 ||
197 (namelen == 2 && name[1] == '.')))
a41f1a47 198 return 0;
bd4c625c 199
a41f1a47 200 dentry = lookup_one_len(name, dbuf->xadir, namelen);
a72bdb1c 201 if (IS_ERR(dentry)) {
a41f1a47 202 return PTR_ERR(dentry);
a72bdb1c 203 } else if (!dentry->d_inode) {
a41f1a47
JM
204 /* A directory entry exists, but no file? */
205 reiserfs_error(dentry->d_sb, "xattr-20003",
206 "Corrupted directory: xattr %s listed but "
207 "not found for file %s.\n",
208 dentry->d_name.name, dbuf->xadir->d_name.name);
209 dput(dentry);
210 return -EIO;
bd4c625c 211 }
1da177e4 212
a41f1a47
JM
213 dbuf->dentries[dbuf->count++] = dentry;
214 return 0;
1da177e4
LT
215}
216
a41f1a47
JM
217static void
218cleanup_dentry_buf(struct reiserfs_dentry_buf *buf)
1da177e4 219{
a41f1a47
JM
220 int i;
221 for (i = 0; i < buf->count; i++)
222 if (buf->dentries[i])
223 dput(buf->dentries[i]);
a72bdb1c
JM
224}
225
a41f1a47
JM
226static int reiserfs_for_each_xattr(struct inode *inode,
227 int (*action)(struct dentry *, void *),
228 void *data)
a72bdb1c 229{
a41f1a47
JM
230 struct dentry *dir;
231 int i, err = 0;
a41f1a47 232 struct reiserfs_dentry_buf buf = {
4acf381e 233 .ctx.actor = fill_with_dentries,
a41f1a47 234 };
1da177e4 235
a72bdb1c
JM
236 /* Skip out, an xattr has no xattrs associated with it */
237 if (IS_PRIVATE(inode) || get_inode_sd_version(inode) == STAT_DATA_V1)
238 return 0;
1da177e4 239
6c17675e 240 dir = open_xa_dir(inode, XATTR_REPLACE);
a72bdb1c
JM
241 if (IS_ERR(dir)) {
242 err = PTR_ERR(dir);
243 goto out;
244 } else if (!dir->d_inode) {
a41f1a47
JM
245 err = 0;
246 goto out_dir;
a72bdb1c 247 }
1da177e4 248
6c17675e 249 mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_XATTR);
27026a05 250
a41f1a47 251 buf.xadir = dir;
cd62cdae
AV
252 while (1) {
253 err = reiserfs_readdir_inode(dir->d_inode, &buf.ctx);
254 if (err)
255 break;
256 if (!buf.count)
257 break;
258 for (i = 0; !err && i < buf.count && buf.dentries[i]; i++) {
a41f1a47 259 struct dentry *dentry = buf.dentries[i];
1da177e4 260
cd62cdae
AV
261 if (!S_ISDIR(dentry->d_inode->i_mode))
262 err = action(dentry, data);
1da177e4 263
a41f1a47
JM
264 dput(dentry);
265 buf.dentries[i] = NULL;
bd4c625c 266 }
cd62cdae
AV
267 if (err)
268 break;
a41f1a47 269 buf.count = 0;
8b6dd72a 270 }
a41f1a47 271 mutex_unlock(&dir->d_inode->i_mutex);
1da177e4 272
a41f1a47 273 cleanup_dentry_buf(&buf);
1da177e4 274
d984561b 275 if (!err) {
098297b2
JM
276 /*
277 * We start a transaction here to avoid a ABBA situation
a41f1a47
JM
278 * between the xattr root's i_mutex and the journal lock.
279 * This doesn't incur much additional overhead since the
280 * new transaction will just nest inside the
098297b2
JM
281 * outer transaction.
282 */
a41f1a47
JM
283 int blocks = JOURNAL_PER_BALANCE_CNT * 2 + 2 +
284 4 * REISERFS_QUOTA_TRANS_BLOCKS(inode->i_sb);
285 struct reiserfs_transaction_handle th;
4c05141d 286 reiserfs_write_lock(inode->i_sb);
a41f1a47 287 err = journal_begin(&th, inode->i_sb, blocks);
4c05141d 288 reiserfs_write_unlock(inode->i_sb);
a41f1a47
JM
289 if (!err) {
290 int jerror;
4c05141d
JM
291 mutex_lock_nested(&dir->d_parent->d_inode->i_mutex,
292 I_MUTEX_XATTR);
a41f1a47 293 err = action(dir, data);
4c05141d 294 reiserfs_write_lock(inode->i_sb);
706a5323 295 jerror = journal_end(&th, inode->i_sb);
4c05141d 296 reiserfs_write_unlock(inode->i_sb);
a41f1a47
JM
297 mutex_unlock(&dir->d_parent->d_inode->i_mutex);
298 err = jerror ?: err;
299 }
a72bdb1c 300 }
a41f1a47
JM
301out_dir:
302 dput(dir);
a72bdb1c 303out:
a41f1a47
JM
304 /* -ENODATA isn't an error */
305 if (err == -ENODATA)
306 err = 0;
a72bdb1c
JM
307 return err;
308}
1da177e4 309
a41f1a47 310static int delete_one_xattr(struct dentry *dentry, void *data)
a72bdb1c 311{
a41f1a47 312 struct inode *dir = dentry->d_parent->d_inode;
1da177e4 313
a41f1a47
JM
314 /* This is the xattr dir, handle specially. */
315 if (S_ISDIR(dentry->d_inode->i_mode))
316 return xattr_rmdir(dir, dentry);
1da177e4 317
a41f1a47
JM
318 return xattr_unlink(dir, dentry);
319}
bd4c625c 320
a41f1a47
JM
321static int chown_one_xattr(struct dentry *dentry, void *data)
322{
323 struct iattr *attrs = data;
4a857011
JM
324 int ia_valid = attrs->ia_valid;
325 int err;
326
327 /*
328 * We only want the ownership bits. Otherwise, we'll do
329 * things like change a directory to a regular file if
330 * ATTR_MODE is set.
331 */
332 attrs->ia_valid &= (ATTR_UID|ATTR_GID);
333 err = reiserfs_setattr(dentry, attrs);
334 attrs->ia_valid = ia_valid;
335
336 return err;
a41f1a47 337}
1da177e4 338
a41f1a47
JM
339/* No i_mutex, but the inode is unconnected. */
340int reiserfs_delete_xattrs(struct inode *inode)
341{
342 int err = reiserfs_for_each_xattr(inode, delete_one_xattr, NULL);
343 if (err)
344 reiserfs_warning(inode->i_sb, "jdm-20004",
345 "Couldn't delete all xattrs (%d)\n", err);
a72bdb1c
JM
346 return err;
347}
1da177e4 348
a41f1a47 349/* inode->i_mutex: down */
a72bdb1c
JM
350int reiserfs_chown_xattrs(struct inode *inode, struct iattr *attrs)
351{
a41f1a47 352 int err = reiserfs_for_each_xattr(inode, chown_one_xattr, attrs);
8b6dd72a
JM
353 if (err)
354 reiserfs_warning(inode->i_sb, "jdm-20007",
355 "Couldn't chown all xattrs (%d)\n", err);
a72bdb1c 356 return err;
1da177e4
LT
357}
358
a72bdb1c 359#ifdef CONFIG_REISERFS_FS_XATTR
098297b2
JM
360/*
361 * Returns a dentry corresponding to a specific extended attribute file
a72bdb1c 362 * for the inode. If flags allow, the file is created. Otherwise, a
098297b2
JM
363 * valid or negative dentry, or an error is returned.
364 */
48b32a35
JM
365static struct dentry *xattr_lookup(struct inode *inode, const char *name,
366 int flags)
1da177e4 367{
a72bdb1c
JM
368 struct dentry *xadir, *xafile;
369 int err = 0;
370
371 xadir = open_xa_dir(inode, flags);
6c17675e 372 if (IS_ERR(xadir))
a72bdb1c 373 return ERR_CAST(xadir);
a72bdb1c 374
5a6059c3 375 mutex_lock_nested(&xadir->d_inode->i_mutex, I_MUTEX_XATTR);
a72bdb1c
JM
376 xafile = lookup_one_len(name, xadir, strlen(name));
377 if (IS_ERR(xafile)) {
6c17675e
JM
378 err = PTR_ERR(xafile);
379 goto out;
bd4c625c 380 }
a72bdb1c 381
6c17675e
JM
382 if (xafile->d_inode && (flags & XATTR_CREATE))
383 err = -EEXIST;
a72bdb1c 384
6c17675e
JM
385 if (!xafile->d_inode) {
386 err = -ENODATA;
5a6059c3 387 if (xattr_may_create(flags))
6c17675e
JM
388 err = xattr_create(xadir->d_inode, xafile,
389 0700|S_IFREG);
a72bdb1c
JM
390 }
391
6c17675e
JM
392 if (err)
393 dput(xafile);
a72bdb1c 394out:
5a6059c3 395 mutex_unlock(&xadir->d_inode->i_mutex);
a72bdb1c
JM
396 dput(xadir);
397 if (err)
6c17675e 398 return ERR_PTR(err);
a72bdb1c 399 return xafile;
1da177e4
LT
400}
401
1da177e4 402/* Internal operations on file data */
bd4c625c 403static inline void reiserfs_put_page(struct page *page)
1da177e4 404{
bd4c625c
LT
405 kunmap(page);
406 page_cache_release(page);
1da177e4
LT
407}
408
ec6ea56b 409static struct page *reiserfs_get_page(struct inode *dir, size_t n)
1da177e4 410{
bd4c625c
LT
411 struct address_space *mapping = dir->i_mapping;
412 struct page *page;
098297b2
JM
413 /*
414 * We can deadlock if we try to free dentries,
415 * and an unlink/rmdir has just occurred - GFP_NOFS avoids this
416 */
c4cdd038 417 mapping_set_gfp_mask(mapping, GFP_NOFS);
ec6ea56b 418 page = read_mapping_page(mapping, n >> PAGE_CACHE_SHIFT, NULL);
bd4c625c 419 if (!IS_ERR(page)) {
bd4c625c 420 kmap(page);
bd4c625c
LT
421 if (PageError(page))
422 goto fail;
423 }
424 return page;
425
426 fail:
427 reiserfs_put_page(page);
428 return ERR_PTR(-EIO);
1da177e4
LT
429}
430
bd4c625c 431static inline __u32 xattr_hash(const char *msg, int len)
1da177e4 432{
bd4c625c 433 return csum_partial(msg, len, 0);
1da177e4
LT
434}
435
ba9d8cec
VS
436int reiserfs_commit_write(struct file *f, struct page *page,
437 unsigned from, unsigned to);
ba9d8cec 438
48b32a35
JM
439static void update_ctime(struct inode *inode)
440{
441 struct timespec now = current_fs_time(inode->i_sb);
1d3382cb 442 if (inode_unhashed(inode) || !inode->i_nlink ||
48b32a35
JM
443 timespec_equal(&inode->i_ctime, &now))
444 return;
445
446 inode->i_ctime = CURRENT_TIME_SEC;
447 mark_inode_dirty(inode);
448}
449
450static int lookup_and_delete_xattr(struct inode *inode, const char *name)
451{
452 int err = 0;
453 struct dentry *dentry, *xadir;
454
455 xadir = open_xa_dir(inode, XATTR_REPLACE);
456 if (IS_ERR(xadir))
457 return PTR_ERR(xadir);
458
5a6059c3 459 mutex_lock_nested(&xadir->d_inode->i_mutex, I_MUTEX_XATTR);
48b32a35
JM
460 dentry = lookup_one_len(name, xadir, strlen(name));
461 if (IS_ERR(dentry)) {
462 err = PTR_ERR(dentry);
463 goto out_dput;
464 }
465
466 if (dentry->d_inode) {
48b32a35 467 err = xattr_unlink(xadir->d_inode, dentry);
48b32a35
JM
468 update_ctime(inode);
469 }
470
471 dput(dentry);
472out_dput:
5a6059c3 473 mutex_unlock(&xadir->d_inode->i_mutex);
48b32a35
JM
474 dput(xadir);
475 return err;
476}
477
ba9d8cec 478
1da177e4
LT
479/* Generic extended attribute operations that can be used by xa plugins */
480
481/*
1b1dcc1b 482 * inode->i_mutex: down
1da177e4
LT
483 */
484int
0ab2621e
JM
485reiserfs_xattr_set_handle(struct reiserfs_transaction_handle *th,
486 struct inode *inode, const char *name,
487 const void *buffer, size_t buffer_size, int flags)
1da177e4 488{
bd4c625c 489 int err = 0;
3227e14c 490 struct dentry *dentry;
bd4c625c
LT
491 struct page *page;
492 char *data;
bd4c625c
LT
493 size_t file_pos = 0;
494 size_t buffer_pos = 0;
48b32a35 495 size_t new_size;
bd4c625c
LT
496 __u32 xahash = 0;
497
bd4c625c
LT
498 if (get_inode_sd_version(inode) == STAT_DATA_V1)
499 return -EOPNOTSUPP;
500
4f3be1b5
FW
501 if (!buffer) {
502 err = lookup_and_delete_xattr(inode, name);
4f3be1b5
FW
503 return err;
504 }
505
48b32a35 506 dentry = xattr_lookup(inode, name, flags);
4c05141d 507 if (IS_ERR(dentry))
48b32a35 508 return PTR_ERR(dentry);
3f14fea6 509
f3e22f48 510 down_write(&REISERFS_I(inode)->i_xattr_sem);
bd4c625c 511
8b6dd72a 512 xahash = xattr_hash(buffer, buffer_size);
bd4c625c
LT
513 while (buffer_pos < buffer_size || buffer_pos == 0) {
514 size_t chunk;
515 size_t skip = 0;
516 size_t page_offset = (file_pos & (PAGE_CACHE_SIZE - 1));
517 if (buffer_size - buffer_pos > PAGE_CACHE_SIZE)
518 chunk = PAGE_CACHE_SIZE;
519 else
520 chunk = buffer_size - buffer_pos;
521
ec6ea56b 522 page = reiserfs_get_page(dentry->d_inode, file_pos);
bd4c625c
LT
523 if (IS_ERR(page)) {
524 err = PTR_ERR(page);
48b32a35 525 goto out_unlock;
bd4c625c
LT
526 }
527
528 lock_page(page);
529 data = page_address(page);
530
531 if (file_pos == 0) {
532 struct reiserfs_xattr_header *rxh;
533 skip = file_pos = sizeof(struct reiserfs_xattr_header);
534 if (chunk + skip > PAGE_CACHE_SIZE)
535 chunk = PAGE_CACHE_SIZE - skip;
536 rxh = (struct reiserfs_xattr_header *)data;
537 rxh->h_magic = cpu_to_le32(REISERFS_XATTR_MAGIC);
538 rxh->h_hash = cpu_to_le32(xahash);
539 }
540
4c05141d 541 reiserfs_write_lock(inode->i_sb);
ebdec241 542 err = __reiserfs_write_begin(page, page_offset, chunk + skip);
bd4c625c
LT
543 if (!err) {
544 if (buffer)
545 memcpy(data + skip, buffer + buffer_pos, chunk);
3227e14c
JM
546 err = reiserfs_commit_write(NULL, page, page_offset,
547 page_offset + chunk +
548 skip);
bd4c625c 549 }
4c05141d 550 reiserfs_write_unlock(inode->i_sb);
bd4c625c
LT
551 unlock_page(page);
552 reiserfs_put_page(page);
553 buffer_pos += chunk;
554 file_pos += chunk;
555 skip = 0;
556 if (err || buffer_size == 0 || !buffer)
557 break;
558 }
559
48b32a35
JM
560 new_size = buffer_size + sizeof(struct reiserfs_xattr_header);
561 if (!err && new_size < i_size_read(dentry->d_inode)) {
562 struct iattr newattrs = {
563 .ia_ctime = current_fs_time(inode->i_sb),
fb2162df 564 .ia_size = new_size,
48b32a35
JM
565 .ia_valid = ATTR_SIZE | ATTR_CTIME,
566 };
31370f62 567
48b32a35 568 mutex_lock_nested(&dentry->d_inode->i_mutex, I_MUTEX_XATTR);
bd5fe6c5 569 inode_dio_wait(dentry->d_inode);
31370f62 570
48b32a35 571 err = reiserfs_setattr(dentry, &newattrs);
48b32a35
JM
572 mutex_unlock(&dentry->d_inode->i_mutex);
573 } else
574 update_ctime(inode);
575out_unlock:
8b6dd72a 576 up_write(&REISERFS_I(inode)->i_xattr_sem);
3227e14c 577 dput(dentry);
48b32a35
JM
578 return err;
579}
bd4c625c 580
0ab2621e
JM
581/* We need to start a transaction to maintain lock ordering */
582int reiserfs_xattr_set(struct inode *inode, const char *name,
583 const void *buffer, size_t buffer_size, int flags)
48b32a35 584{
0ab2621e
JM
585
586 struct reiserfs_transaction_handle th;
587 int error, error2;
588 size_t jbegin_count = reiserfs_xattr_nblocks(inode, buffer_size);
589
590 if (!(flags & XATTR_REPLACE))
591 jbegin_count += reiserfs_xattr_jcreate_nblocks(inode);
592
593 reiserfs_write_lock(inode->i_sb);
594 error = journal_begin(&th, inode->i_sb, jbegin_count);
4c05141d 595 reiserfs_write_unlock(inode->i_sb);
0ab2621e 596 if (error) {
0ab2621e 597 return error;
1da177e4 598 }
bd4c625c 599
0ab2621e
JM
600 error = reiserfs_xattr_set_handle(&th, inode, name,
601 buffer, buffer_size, flags);
bd4c625c 602
4c05141d 603 reiserfs_write_lock(inode->i_sb);
706a5323 604 error2 = journal_end(&th, inode->i_sb);
4c05141d 605 reiserfs_write_unlock(inode->i_sb);
0ab2621e
JM
606 if (error == 0)
607 error = error2;
0ab2621e
JM
608
609 return error;
1da177e4
LT
610}
611
612/*
1b1dcc1b 613 * inode->i_mutex: down
1da177e4
LT
614 */
615int
48b32a35 616reiserfs_xattr_get(struct inode *inode, const char *name, void *buffer,
bd4c625c 617 size_t buffer_size)
1da177e4 618{
bd4c625c 619 ssize_t err = 0;
3227e14c 620 struct dentry *dentry;
bd4c625c
LT
621 size_t isize;
622 size_t file_pos = 0;
623 size_t buffer_pos = 0;
624 struct page *page;
bd4c625c
LT
625 __u32 hash = 0;
626
627 if (name == NULL)
628 return -EINVAL;
629
098297b2
JM
630 /*
631 * We can't have xattrs attached to v1 items since they don't have
632 * generation numbers
633 */
bd4c625c
LT
634 if (get_inode_sd_version(inode) == STAT_DATA_V1)
635 return -EOPNOTSUPP;
636
48b32a35 637 dentry = xattr_lookup(inode, name, XATTR_REPLACE);
3227e14c
JM
638 if (IS_ERR(dentry)) {
639 err = PTR_ERR(dentry);
bd4c625c
LT
640 goto out;
641 }
642
8b6dd72a 643 down_read(&REISERFS_I(inode)->i_xattr_sem);
d984561b 644
f437c529 645 isize = i_size_read(dentry->d_inode);
bd4c625c
LT
646
647 /* Just return the size needed */
648 if (buffer == NULL) {
649 err = isize - sizeof(struct reiserfs_xattr_header);
8b6dd72a 650 goto out_unlock;
bd4c625c
LT
651 }
652
653 if (buffer_size < isize - sizeof(struct reiserfs_xattr_header)) {
654 err = -ERANGE;
8b6dd72a 655 goto out_unlock;
bd4c625c
LT
656 }
657
658 while (file_pos < isize) {
659 size_t chunk;
660 char *data;
661 size_t skip = 0;
662 if (isize - file_pos > PAGE_CACHE_SIZE)
663 chunk = PAGE_CACHE_SIZE;
664 else
665 chunk = isize - file_pos;
666
a72bdb1c 667 page = reiserfs_get_page(dentry->d_inode, file_pos);
bd4c625c
LT
668 if (IS_ERR(page)) {
669 err = PTR_ERR(page);
8b6dd72a 670 goto out_unlock;
bd4c625c
LT
671 }
672
673 lock_page(page);
674 data = page_address(page);
675 if (file_pos == 0) {
676 struct reiserfs_xattr_header *rxh =
677 (struct reiserfs_xattr_header *)data;
678 skip = file_pos = sizeof(struct reiserfs_xattr_header);
679 chunk -= skip;
680 /* Magic doesn't match up.. */
681 if (rxh->h_magic != cpu_to_le32(REISERFS_XATTR_MAGIC)) {
682 unlock_page(page);
683 reiserfs_put_page(page);
a72bdb1c 684 reiserfs_warning(inode->i_sb, "jdm-20001",
bd4c625c
LT
685 "Invalid magic for xattr (%s) "
686 "associated with %k", name,
687 INODE_PKEY(inode));
688 err = -EIO;
8b6dd72a 689 goto out_unlock;
bd4c625c
LT
690 }
691 hash = le32_to_cpu(rxh->h_hash);
692 }
693 memcpy(buffer + buffer_pos, data + skip, chunk);
694 unlock_page(page);
695 reiserfs_put_page(page);
696 file_pos += chunk;
697 buffer_pos += chunk;
698 skip = 0;
699 }
700 err = isize - sizeof(struct reiserfs_xattr_header);
701
702 if (xattr_hash(buffer, isize - sizeof(struct reiserfs_xattr_header)) !=
703 hash) {
a72bdb1c 704 reiserfs_warning(inode->i_sb, "jdm-20002",
bd4c625c
LT
705 "Invalid hash for xattr (%s) associated "
706 "with %k", name, INODE_PKEY(inode));
707 err = -EIO;
708 }
709
8b6dd72a
JM
710out_unlock:
711 up_read(&REISERFS_I(inode)->i_xattr_sem);
3227e14c 712 dput(dentry);
bd4c625c 713
a72bdb1c 714out:
bd4c625c 715 return err;
1da177e4
LT
716}
717
48b32a35
JM
718/*
719 * In order to implement different sets of xattr operations for each xattr
720 * prefix with the generic xattr API, a filesystem should create a
721 * null-terminated array of struct xattr_handler (one for each prefix) and
722 * hang a pointer to it off of the s_xattr field of the superblock.
723 *
724 * The generic_fooxattr() functions will use this list to dispatch xattr
725 * operations to the correct xattr_handler.
726 */
727#define for_each_xattr_handler(handlers, handler) \
728 for ((handler) = *(handlers)++; \
729 (handler) != NULL; \
730 (handler) = *(handlers)++)
1da177e4 731
48b32a35 732/* This is the implementation for the xattr plugin infrastructure */
94d09a98
SH
733static inline const struct xattr_handler *
734find_xattr_handler_prefix(const struct xattr_handler **handlers,
48b32a35 735 const char *name)
1da177e4 736{
94d09a98 737 const struct xattr_handler *xah;
bd4c625c 738
48b32a35
JM
739 if (!handlers)
740 return NULL;
bd4c625c 741
48b32a35
JM
742 for_each_xattr_handler(handlers, xah) {
743 if (strncmp(xah->prefix, name, strlen(xah->prefix)) == 0)
744 break;
bd4c625c
LT
745 }
746
48b32a35 747 return xah;
bd4c625c 748}
1da177e4 749
1da177e4
LT
750
751/*
752 * Inode operation getxattr()
1da177e4
LT
753 */
754ssize_t
bd4c625c
LT
755reiserfs_getxattr(struct dentry * dentry, const char *name, void *buffer,
756 size_t size)
1da177e4 757{
94d09a98 758 const struct xattr_handler *handler;
bd4c625c 759
431547b3 760 handler = find_xattr_handler_prefix(dentry->d_sb->s_xattr, name);
48b32a35 761
431547b3 762 if (!handler || get_inode_sd_version(dentry->d_inode) == STAT_DATA_V1)
bd4c625c
LT
763 return -EOPNOTSUPP;
764
431547b3 765 return handler->get(dentry, name, buffer, size, handler->flags);
1da177e4
LT
766}
767
1da177e4
LT
768/*
769 * Inode operation setxattr()
770 *
1b1dcc1b 771 * dentry->d_inode->i_mutex down
1da177e4
LT
772 */
773int
bd4c625c
LT
774reiserfs_setxattr(struct dentry *dentry, const char *name, const void *value,
775 size_t size, int flags)
1da177e4 776{
94d09a98 777 const struct xattr_handler *handler;
bd4c625c 778
431547b3 779 handler = find_xattr_handler_prefix(dentry->d_sb->s_xattr, name);
48b32a35 780
431547b3 781 if (!handler || get_inode_sd_version(dentry->d_inode) == STAT_DATA_V1)
bd4c625c
LT
782 return -EOPNOTSUPP;
783
431547b3 784 return handler->set(dentry, name, value, size, flags, handler->flags);
1da177e4
LT
785}
786
787/*
788 * Inode operation removexattr()
789 *
1b1dcc1b 790 * dentry->d_inode->i_mutex down
1da177e4 791 */
bd4c625c 792int reiserfs_removexattr(struct dentry *dentry, const char *name)
1da177e4 793{
94d09a98 794 const struct xattr_handler *handler;
431547b3 795 handler = find_xattr_handler_prefix(dentry->d_sb->s_xattr, name);
1da177e4 796
431547b3 797 if (!handler || get_inode_sd_version(dentry->d_inode) == STAT_DATA_V1)
bd4c625c 798 return -EOPNOTSUPP;
1da177e4 799
431547b3 800 return handler->set(dentry, name, NULL, 0, XATTR_REPLACE, handler->flags);
1da177e4
LT
801}
802
48b32a35 803struct listxattr_buf {
4acf381e 804 struct dir_context ctx;
48b32a35
JM
805 size_t size;
806 size_t pos;
807 char *buf;
431547b3 808 struct dentry *dentry;
1da177e4
LT
809};
810
48b32a35
JM
811static int listxattr_filler(void *buf, const char *name, int namelen,
812 loff_t offset, u64 ino, unsigned int d_type)
1da177e4 813{
48b32a35
JM
814 struct listxattr_buf *b = (struct listxattr_buf *)buf;
815 size_t size;
816 if (name[0] != '.' ||
817 (namelen != 1 && (name[1] != '.' || namelen != 2))) {
94d09a98 818 const struct xattr_handler *handler;
431547b3 819 handler = find_xattr_handler_prefix(b->dentry->d_sb->s_xattr,
48b32a35
JM
820 name);
821 if (!handler) /* Unsupported xattr name */
822 return 0;
823 if (b->buf) {
431547b3
CH
824 size = handler->list(b->dentry, b->buf + b->pos,
825 b->size, name, namelen,
826 handler->flags);
48b32a35
JM
827 if (size > b->size)
828 return -ERANGE;
829 } else {
431547b3
CH
830 size = handler->list(b->dentry, NULL, 0, name,
831 namelen, handler->flags);
bd4c625c 832 }
bd4c625c 833
48b32a35
JM
834 b->pos += size;
835 }
bd4c625c 836 return 0;
1da177e4 837}
bd4c625c 838
1da177e4
LT
839/*
840 * Inode operation listxattr()
841 *
48b32a35
JM
842 * We totally ignore the generic listxattr here because it would be stupid
843 * not to. Since the xattrs are organized in a directory, we can just
844 * readdir to find them.
1da177e4 845 */
bd4c625c 846ssize_t reiserfs_listxattr(struct dentry * dentry, char *buffer, size_t size)
1da177e4 847{
bd4c625c
LT
848 struct dentry *dir;
849 int err = 0;
48b32a35 850 struct listxattr_buf buf = {
4acf381e 851 .ctx.actor = listxattr_filler,
431547b3 852 .dentry = dentry,
48b32a35
JM
853 .buf = buffer,
854 .size = buffer ? size : 0,
855 };
bd4c625c
LT
856
857 if (!dentry->d_inode)
858 return -EINVAL;
859
677c9b2e 860 if (!dentry->d_sb->s_xattr ||
bd4c625c
LT
861 get_inode_sd_version(dentry->d_inode) == STAT_DATA_V1)
862 return -EOPNOTSUPP;
863
6c17675e 864 dir = open_xa_dir(dentry->d_inode, XATTR_REPLACE);
bd4c625c
LT
865 if (IS_ERR(dir)) {
866 err = PTR_ERR(dir);
867 if (err == -ENODATA)
48b32a35 868 err = 0; /* Not an error if there aren't any xattrs */
bd4c625c
LT
869 goto out;
870 }
871
6c17675e 872 mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_XATTR);
cd62cdae 873 err = reiserfs_readdir_inode(dir->d_inode, &buf.ctx);
6c17675e 874 mutex_unlock(&dir->d_inode->i_mutex);
bd4c625c 875
48b32a35
JM
876 if (!err)
877 err = buf.pos;
bd4c625c 878
3227e14c 879 dput(dir);
8b6dd72a 880out:
bd4c625c 881 return err;
1da177e4
LT
882}
883
a72bdb1c 884static int create_privroot(struct dentry *dentry)
1da177e4 885{
a72bdb1c
JM
886 int err;
887 struct inode *inode = dentry->d_parent->d_inode;
5a6059c3
JM
888 WARN_ON_ONCE(!mutex_is_locked(&inode->i_mutex));
889
6c17675e 890 err = xattr_mkdir(inode, dentry, 0700);
edcc37a0
AV
891 if (err || !dentry->d_inode) {
892 reiserfs_warning(dentry->d_sb, "jdm-20006",
893 "xattrs/ACLs enabled and couldn't "
894 "find/create .reiserfs_priv. "
895 "Failing mount.");
896 return -EOPNOTSUPP;
bd4c625c
LT
897 }
898
edcc37a0
AV
899 dentry->d_inode->i_flags |= S_PRIVATE;
900 reiserfs_info(dentry->d_sb, "Created %s - reserved for xattr "
901 "storage.\n", PRIVROOT_NAME);
bd4c625c 902
edcc37a0 903 return 0;
1da177e4
LT
904}
905
12abb35a
JM
906#else
907int __init reiserfs_xattr_register_handlers(void) { return 0; }
908void reiserfs_xattr_unregister_handlers(void) {}
909static int create_privroot(struct dentry *dentry) { return 0; }
910#endif
911
912/* Actual operations that are exported to VFS-land */
da02eb72 913static const struct xattr_handler *reiserfs_xattr_handlers[] = {
12abb35a
JM
914#ifdef CONFIG_REISERFS_FS_XATTR
915 &reiserfs_xattr_user_handler,
916 &reiserfs_xattr_trusted_handler,
917#endif
918#ifdef CONFIG_REISERFS_FS_SECURITY
919 &reiserfs_xattr_security_handler,
920#endif
921#ifdef CONFIG_REISERFS_FS_POSIX_ACL
47f70d08
CH
922 &posix_acl_access_xattr_handler,
923 &posix_acl_default_xattr_handler,
12abb35a
JM
924#endif
925 NULL
926};
927
a72bdb1c 928static int xattr_mount_check(struct super_block *s)
1da177e4 929{
098297b2
JM
930 /*
931 * We need generation numbers to ensure that the oid mapping is correct
932 * v3.5 filesystems don't have them.
933 */
48b32a35
JM
934 if (old_format_only(s)) {
935 if (reiserfs_xattrs_optional(s)) {
098297b2
JM
936 /*
937 * Old format filesystem, but optional xattrs have
938 * been enabled. Error out.
939 */
48b32a35
JM
940 reiserfs_warning(s, "jdm-2005",
941 "xattrs/ACLs not supported "
942 "on pre-v3.6 format filesystems. "
943 "Failing mount.");
944 return -EOPNOTSUPP;
945 }
a72bdb1c
JM
946 }
947
948 return 0;
1da177e4
LT
949}
950
10556cb2 951int reiserfs_permission(struct inode *inode, int mask)
b83674c0
JM
952{
953 /*
954 * We don't do permission checks on the internal objects.
955 * Permissions are determined by the "owning" object.
956 */
957 if (IS_PRIVATE(inode))
958 return 0;
959
2830ba7f 960 return generic_permission(inode, mask);
b83674c0
JM
961}
962
0b728e19 963static int xattr_hide_revalidate(struct dentry *dentry, unsigned int flags)
1da177e4 964{
cac36f70 965 return -EPERM;
1da177e4
LT
966}
967
e16404ed 968static const struct dentry_operations xattr_lookup_poison_ops = {
cac36f70 969 .d_revalidate = xattr_hide_revalidate,
1da177e4
LT
970};
971
edcc37a0
AV
972int reiserfs_lookup_privroot(struct super_block *s)
973{
974 struct dentry *dentry;
975 int err = 0;
976
977 /* If we don't have the privroot located yet - go find it */
4c05141d 978 mutex_lock(&s->s_root->d_inode->i_mutex);
edcc37a0
AV
979 dentry = lookup_one_len(PRIVROOT_NAME, s->s_root,
980 strlen(PRIVROOT_NAME));
981 if (!IS_ERR(dentry)) {
982 REISERFS_SB(s)->priv_root = dentry;
fb045adb 983 d_set_d_op(dentry, &xattr_lookup_poison_ops);
edcc37a0
AV
984 if (dentry->d_inode)
985 dentry->d_inode->i_flags |= S_PRIVATE;
986 } else
987 err = PTR_ERR(dentry);
988 mutex_unlock(&s->s_root->d_inode->i_mutex);
989
990 return err;
991}
992
098297b2
JM
993/*
994 * We need to take a copy of the mount flags since things like
1da177e4 995 * MS_RDONLY don't get set until *after* we're called.
098297b2
JM
996 * mount_flags != mount_options
997 */
bd4c625c 998int reiserfs_xattr_init(struct super_block *s, int mount_flags)
1da177e4 999{
bd4c625c 1000 int err = 0;
ab17c4f0 1001 struct dentry *privroot = REISERFS_SB(s)->priv_root;
bd4c625c 1002
a72bdb1c
JM
1003 err = xattr_mount_check(s);
1004 if (err)
bd4c625c 1005 goto error;
bd4c625c 1006
ab17c4f0 1007 if (!privroot->d_inode && !(mount_flags & MS_RDONLY)) {
4c05141d 1008 mutex_lock(&s->s_root->d_inode->i_mutex);
edcc37a0 1009 err = create_privroot(REISERFS_SB(s)->priv_root);
5a6059c3 1010 mutex_unlock(&s->s_root->d_inode->i_mutex);
bd4c625c 1011 }
ab17c4f0
JM
1012
1013 if (privroot->d_inode) {
48b32a35 1014 s->s_xattr = reiserfs_xattr_handlers;
4c05141d 1015 mutex_lock(&privroot->d_inode->i_mutex);
ab17c4f0
JM
1016 if (!REISERFS_SB(s)->xattr_root) {
1017 struct dentry *dentry;
1018 dentry = lookup_one_len(XAROOT_NAME, privroot,
1019 strlen(XAROOT_NAME));
1020 if (!IS_ERR(dentry))
1021 REISERFS_SB(s)->xattr_root = dentry;
1022 else
1023 err = PTR_ERR(dentry);
1024 }
1025 mutex_unlock(&privroot->d_inode->i_mutex);
1026 }
48b32a35 1027
a72bdb1c 1028error:
bd4c625c 1029 if (err) {
bd4c625c
LT
1030 clear_bit(REISERFS_XATTRS_USER, &(REISERFS_SB(s)->s_mount_opt));
1031 clear_bit(REISERFS_POSIXACL, &(REISERFS_SB(s)->s_mount_opt));
1032 }
1033
1034 /* The super_block MS_POSIXACL must mirror the (no)acl mount option. */
bd4c625c
LT
1035 if (reiserfs_posixacl(s))
1036 s->s_flags |= MS_POSIXACL;
ab17c4f0 1037 else
ab17c4f0 1038 s->s_flags &= ~MS_POSIXACL;
bd4c625c
LT
1039
1040 return err;
1da177e4 1041}