Return-Path: <zaitcev@kotori.zaitcev.us>
Received: from takane.zaitcev.us ([96.126.117.152]) by mx-ha.gmx.net (mxgmx017
 [212.227.15.9]) with ESMTPS (Nemesis) id 1MFcRo-1jFP8A17fy-00HDsy for
 <deller@gmx.de>; Mon, 17 Feb 2020 22:50:32 +0100
Received: from suzdal.zaitcev.lan (unknown [IPv6:2600:1700:1d1:f0c0::48])
	by takane.zaitcev.us (Postfix) with ESMTPSA id 59B81D127;
	Mon, 17 Feb 2020 14:50:29 -0700 (MST)
Date: Mon, 17 Feb 2020 15:50:28 -0600
From: Pete Zaitcev <zaitcev@kotori.zaitcev.us>
To: linux-mm@kvack.org
Cc: Pete Zaitcev <zaitcev@kotori.zaitcev.us>, Helge Deller <deller@gmx.de>,
 Hugh Dickins <hughd@google.com>
Subject: [patch] fs: Allow user.* xattr in tmpfs
Message-ID: <20200217155028.632662af@suzdal.zaitcev.lan>
X-Mailer: Claws Mail 3.17.4 (GTK+ 2.24.32; x86_64-redhat-linux-gnu)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Envelope-To: <deller@gmx.de>
X-GMX-Antispam: 0 (Mail was not recognized as spam); Detail=V3;
X-Spam-Flag: NO
X-UI-Filterresults: notjunk:1;V03:K0:ACR9Gi/HAxg=:63s0adYNX39vfmaaC2YshDTPxO
 QwIQXZ4LRBp64XgWXTw3ZF48QJQHVGr8zibH/QlV2wQAO1wifx5WgqGjP95GGR4drZbbMPufS
 B/oNNdhVOgUwt2Wi8j646u9mt3eoWghrIxyrfqi/0QV7r4c3+geXw26+yunPXJN5vzXb2xWSm
 bawnVZgcXTgHl8IGrzOBI67jWmx8XVMfke78ubHecbW9wl4iHK3SXc7uIkpDiQuh3SE2u8Vc2
 Iogt+IGgJGG7yBfAljIA3XXPangUmo2raiHcrzZVKVME8Ud62FKtDyHZmMwnuFPdQBNAOTDkI
 yn/heBUIpZdF6+vLk11+WUNZYktCOUQYlO42XvXuyazpTvCKshlAnB8LfWxYNyCajpbWdYHnF
 /oVg+TgOc9zouSSMvdvOfS6AJHmNjKsh6R9bwvmCjgN7dGCFTCLb4tEPyhAZJCj8ZibhXuRkI
 kHLxzVj52VZefSwxvvuWR63JVPZ37aeoF9qyacsjPvDaB9ibKkTS8MLanVTaBkpqlUdeTwV4Z
 YzJ/tK+EG7Qq8d6hWjmz5lEVNNZ6CdhfpYkHQwE3FE5vOVvJsz0Plpmj98GbPbGhBeEwb61pL
 83QW3o0pKaDNCkH60Vr2GKj9k9HbUg5+F+lA8+Vccon1X8N63JnFMOcxQw9VBNiNpZSfHXuUs
 ZHadjy3iA7G66Db266lLteNTFGxxtP8v6mS/yTFlt8kn3ZB6gY+4FWF+BroCP5tGlB0XAvC42
 M3ZPmbXbrii0DeVoK7kAjgW6t1w4dN8eTyRWcWehy3N+A5yUkXpUPqvbda4LRCLD1BLGimzm/
 kdSBuI5oGAheAl4XL/6mtx//fQdWhTFn+XSTj0lEK3POG54V3jhUjZ5mM/DYmzilC83dTeYG9
 qgSLmuR5vqeWMaiFucH+y6MiXMy+/oMksw32XincxBu/ucEdTvjCzXhSB22VAK0v28+epn5iD
 LE1C1CnrzhuZIQ/oHtPLTTv+totyxB/qzzVQYHtE4Exh1DKTa38wtNHxsSshyUBPd9jt6XxSB
 XeoRa5bA/trJvQetng6RJv42mmwzgXS/686xxP5LTr9+HDnO4pNWBKAH6aAou97p7/19AQZan
 SapxCOUQSFHsGTK3jNFZvT7OcAPENNUy4IOVLrxWXnZs87Y/PqPSCXJgx5E1FvpaMHGGItft2
 RGoB0QhM/kHqPIb/6BcskP/Av809jSsY/1WXfMWOmep2yCDMybKVrOdzeDIrRDNZIaau0gYcy
 HPKLouR7cAoKjuu2CPKFeIzbR7b2N2pwXPVh2BJQ+ZA231EpPTEedKfOMYMddGaqq3z+uvmwJ
 SJoulxwzv2SAsMU+m3I9nMZpFubbY76yKvrZY9FQC4OakFXZjqFW71alspjyA/t24vcijReY3
 QkqRrTvtTrsF63cgm+9CS8f7aNDmiLUuWotL8QihMzr65QiBmWnoBAQ/Bt0MrKf5pxqqMgCZ0
 ol6mWfSJj3uM/v0PMkE6ADcHOnXZ2/sEL+qBY4jpgT9Kat6hR0vf7PBWbHgMa2voQ8AeRMdbr
 zmUGoZ+MIjdrXt2BiMevIk+1kgb3gJu2jkHAXXAs4do43ijy3N76m0hqJ/3lWfN97TlV4w77c
 vc9S2LWFOaNpvVFLjkML/ZIy72LMnnPZ38ENgpeBtCttwKpW4gb0+kGxzFkzMHcfhkXCr60eu
 s5/jo1ymu3dm6+VY4ZwyTAI5CQDIsLQ2ldTJW9Zxvn6ulGAnkeRe3FY/Dy/7dZPpkzs0uqI8C
 +uNAW10gz1n/w2Z/axpmDr6mCfggqXOsZFig+OI6zD3W7RLTCqF98IMglTtRN7EyDPw52RQZM
 j0DeMLEu0AzClH1Av4ZfO3/pg0bslcgvyvyLMupWLJOkkK0lk48hALdgL7lXiNNr4O+mRVROB
 FFWILkcNjx1GzGPPEQG0IsdOliGIwNG56driwZO9K3BhEx8UfLKBJr2xfzODfcTTm+BdcDpD4
 ywWa5CSjsX03A8lqPyGfYLoUVhFRwNeLhcZnVEnnJjSbMljXQ2V9wHw+DJBWcgBs/gj2oa1mh
 ye/xn0ISCm9t/oGNt6L3y+STHnv6eniwGnLh+1rz46TBt8ve7wsd8ak3gEsB1Gp/ranOLe3kN
 UIelI2ktt4hZyAbJu+fLHKX3RCyDUzsfAXUFDTrD18ZgX0AvnIqiThw4KHeZIbGZN130MqS8u
 y4gesln8E6P0ByaHE9fQZu3pKa/pJ3AJhx0H0g9L4VZ41cAJBZPw77riJkJEREpJDTS6elYfR
 9y4ywdSa2xG7C5maLG5WlXxGafkrVgDyif1pYl2WRAQPsyvKy7IPxakIfU/tkrcdNTj8Sx5m6
 qQh97qAMfHLRbMZzleNg/Anuxidc1GTj9l8sh8unVSVoCis+uqXJDLb1B2wRC13B+Gf8EANH9
 mYy0jSJ926LpTvtrLy71YtYAbj2lgR6nWp58NLCl8aDb6aqnPXaAiznsr7XmMZDmXQvRxl9fx
 C+45sKaapaaQ3262TLuu2LQNY24bze3Rf/B2AO4nUgqaJAI2FkAy6u8HyZrjlBXHkU9hstD98
 JxTjJ8Zm3nogv440XaG1eKwGH423sqFoR7lc12x/dzHyceNaSZtMDHqYMu0jHH3zdfcYV8BOq
 aQ2ZYmTVhQkbDOYzxtBQ5wGxz2NcfCU7KSMPGOkmzkccmlj/5Zt5sqVmceaxpPzjzUhFtVvUi
 EBzE=

Not having xattr in /tmp can be worked around usually by configuring
the affected software with TMPDIR=/var/tmp and the like, but I prefer
having this automated, if possible.

Signed-off-by: Pete Zaitcev <zaitcev@yahoo.com>
---
 fs/xattr.c            |    3 +++
 include/linux/xattr.h |   13 +++++++++++++
 mm/shmem.c            |   25 +++++++++++++++++++++++++
 3 files changed, 41 insertions(+)

diff --git a/fs/xattr.c b/fs/xattr.c
index 90dd78f0eb27..502567a4a478 100644
--- a/fs/xattr.c
+++ b/fs/xattr.c
@@ -896,6 +896,7 @@ int simple_xattr_set(struct simple_xattrs *xattrs, const char *name,
 			} else if (new_xattr) {
 				list_replace(&xattr->list, &new_xattr->list);
 			} else {
+				--xattrs->count;
 				list_del(&xattr->list);
 			}
 			goto out;
@@ -906,6 +907,7 @@ int simple_xattr_set(struct simple_xattrs *xattrs, const char *name,
 		err = -ENODATA;
 	} else {
 		list_add(&new_xattr->list, &xattrs->head);
+		xattrs->count++;
 		xattr = NULL;
 	}
 out:
@@ -988,5 +990,6 @@ void simple_xattr_list_add(struct simple_xattrs *xattrs,
 {
 	spin_lock(&xattrs->lock);
 	list_add(&new_xattr->list, &xattrs->head);
+	xattrs->count++;
 	spin_unlock(&xattrs->lock);
 }
diff --git a/include/linux/xattr.h b/include/linux/xattr.h
index 6dad031be3c2..e1ed5910ef5c 100644
--- a/include/linux/xattr.h
+++ b/include/linux/xattr.h
@@ -67,6 +67,7 @@ static inline const char *xattr_prefix(const struct xattr_handler *handler)
 struct simple_xattrs {
 	struct list_head head;
 	spinlock_t lock;
+	int count;
 };
 
 struct simple_xattr {
@@ -83,6 +84,7 @@ static inline void simple_xattrs_init(struct simple_xattrs *xattrs)
 {
 	INIT_LIST_HEAD(&xattrs->head);
 	spin_lock_init(&xattrs->lock);
+	xattrs->count = 0;
 }
 
 /*
@@ -96,6 +98,17 @@ static inline void simple_xattrs_free(struct simple_xattrs *xattrs)
 		kfree(xattr->name);
 		kfree(xattr);
 	}
+	xattrs->count = 0;
+}
+
+static inline int simple_xattrs_count(struct simple_xattrs *xattrs)
+{
+	int ret;
+
+	spin_lock(&xattrs->lock);
+	ret = xattrs->count;
+	spin_unlock(&xattrs->lock);
+	return ret;
 }
 
 struct simple_xattr *simple_xattr_alloc(const void *value, size_t size);
diff --git a/mm/shmem.c b/mm/shmem.c
index c8f7540ef048..0ce17afad30e 100644
--- a/mm/shmem.c
+++ b/mm/shmem.c
@@ -3246,6 +3246,30 @@ static int shmem_xattr_handler_set(const struct xattr_handler *handler,
 	return simple_xattr_set(&info->xattrs, name, value, size, flags);
 }
 
+static int shmem_xattr_handler_set_user(const struct xattr_handler *handler,
+				   struct dentry *unused, struct inode *inode,
+				   const char *name, const void *value,
+				   size_t size, int flags)
+{
+	struct shmem_inode_info *info = SHMEM_I(inode);
+	struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
+
+	if (value) {
+		if (size > 8192)
+			return -EINVAL;
+		if (simple_xattrs_count(&info->xattrs) >= sbinfo->max_inodes)
+			return -ENOSPC;
+	}
+	name = xattr_full_name(handler, name);
+	return simple_xattr_set(&info->xattrs, name, value, size, flags, NULL);
+}
+
+static const struct xattr_handler shmem_user_xattr_handler = {
+	.prefix = XATTR_USER_PREFIX,
+	.get = shmem_xattr_handler_get,
+	.set = shmem_xattr_handler_set_user,
+};
+
 static const struct xattr_handler shmem_security_xattr_handler = {
 	.prefix = XATTR_SECURITY_PREFIX,
 	.get = shmem_xattr_handler_get,
@@ -3263,6 +3287,7 @@ static const struct xattr_handler *shmem_xattr_handlers[] = {
 	&posix_acl_access_xattr_handler,
 	&posix_acl_default_xattr_handler,
 #endif
+	&shmem_user_xattr_handler,
 	&shmem_security_xattr_handler,
 	&shmem_trusted_xattr_handler,
 	NULL
