4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License version 2 for more details (a copy is included
14 * in the LICENSE file that accompanied this code).
16 * You should have received a copy of the GNU General Public License
17 * version 2 along with this program; If not, see
18 * http://www.sun.com/software/products/lustre/docs/GPLv2.pdf
20 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
21 * CA 95054 USA or visit www.sun.com if you need additional information or
27 * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
28 * Use is subject to license terms.
30 * Copyright (c) 2011, 2014, Intel Corporation.
33 * This file is part of Lustre, http://www.lustre.org/
34 * Lustre is a trademark of Sun Microsystems, Inc.
36 * lustre/mdt/mdt_xattr.c
38 * Lustre Metadata Target (mdt) extended attributes management.
40 * Author: Peter Braam <braam@clusterfs.com>
41 * Author: Andreas Dilger <adilger@clusterfs.com>
42 * Author: Phil Schwan <phil@clusterfs.com>
43 * Author: Huang Hua <huanghua@clusterfs.com>
46 #define DEBUG_SUBSYSTEM S_MDS
48 #include <linux/xattr.h>
49 #include <obd_class.h>
50 #include <lustre_nodemap.h>
51 #include <lustre_acl.h>
52 #include "mdt_internal.h"
55 /* return EADATA length to the caller. negative value means error */
56 static int mdt_getxattr_pack_reply(struct mdt_thread_info * info)
58 struct req_capsule *pill = info->mti_pill ;
59 struct ptlrpc_request *req = mdt_info_req(info);
62 static const char user_string[] = "user.";
66 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_GETXATTR_PACK))
69 valid = info->mti_body->mbo_valid & (OBD_MD_FLXATTR | OBD_MD_FLXATTRLS);
71 /* Determine how many bytes we need */
72 if (valid == OBD_MD_FLXATTR) {
73 xattr_name = req_capsule_client_get(pill, &RMF_NAME);
77 if (!(exp_connect_flags(req->rq_export) & OBD_CONNECT_XATTR) &&
78 !strncmp(xattr_name, user_string, sizeof(user_string) - 1))
81 size = mo_xattr_get(info->mti_env,
82 mdt_object_child(info->mti_object),
83 &LU_BUF_NULL, xattr_name);
84 } else if (valid == OBD_MD_FLXATTRLS) {
85 size = mo_xattr_list(info->mti_env,
86 mdt_object_child(info->mti_object),
88 } else if (valid == OBD_MD_FLXATTRALL) {
89 /* N.B. eadatasize = 0 is not valid for FLXATTRALL */
90 /* We could calculate accurate sizes, but this would
91 * introduce a lot of overhead, let's do it later... */
92 size = info->mti_body->mbo_eadatasize;
93 req_capsule_set_size(pill, &RMF_EAVALS, RCL_SERVER, size);
94 req_capsule_set_size(pill, &RMF_EAVALS_LENS, RCL_SERVER, size);
96 CDEBUG(D_INFO, "Valid bits: "LPX64"\n",
97 info->mti_body->mbo_valid);
101 if (size == -ENODATA) {
103 } else if (size < 0) {
104 if (size != -EOPNOTSUPP)
105 CERROR("Error geting EA size: %d\n", size);
109 req_capsule_set_size(pill, &RMF_EADATA, RCL_SERVER,
110 info->mti_body->mbo_eadatasize == 0 ? 0 : size);
111 rc = req_capsule_server_pack(pill);
121 mdt_getxattr_one(struct mdt_thread_info *info,
122 char *xattr_name, struct md_object *next,
123 struct lu_buf *buf, struct mdt_export_data *med,
126 __u32 remote = exp_connect_rmtclient(info->mti_exp);
127 int flags = CFS_IC_NOTHING, rc;
131 CDEBUG(D_INODE, "getxattr %s\n", xattr_name);
133 rc = mo_xattr_get(info->mti_env, next, buf, xattr_name);
137 if (info->mti_body->mbo_valid &
138 (OBD_MD_FLRMTLSETFACL | OBD_MD_FLRMTLGETFACL))
140 else if (info->mti_body->mbo_valid & OBD_MD_FLRMTRGETFACL)
141 flags = CFS_IC_MAPPED;
143 if (rc > 0 && flags != CFS_IC_NOTHING) {
146 if (unlikely(!remote))
147 GOTO(out, rc = -EINVAL);
149 rc1 = lustre_posix_acl_xattr_id2client(uc,
151 (posix_acl_xattr_header *)(buf->lb_buf),
153 if (unlikely(rc1 < 0))
161 static int mdt_getxattr_all(struct mdt_thread_info *info,
162 struct mdt_body *reqbody, struct mdt_body *repbody,
163 struct lu_buf *buf, struct md_object *next)
165 const struct lu_env *env = info->mti_env;
166 struct ptlrpc_request *req = mdt_info_req(info);
167 struct mdt_export_data *med = mdt_req2med(req);
168 struct lu_ucred *uc = mdt_ucred(info);
169 char *v, *b, *eadatahead, *eadatatail;
171 int eadatasize, eavallen = 0, eavallens = 0, rc;
176 * The format of the pill is the following:
177 * EADATA: attr1\0attr2\0...attrn\0
178 * EAVALS: val1val2...valn
179 * EAVALS_LENS: 4,4,...4
182 eadatahead = buf->lb_buf;
184 /* Fill out EADATA first */
185 eadatasize = mo_xattr_list(env, next, buf);
187 GOTO(out, rc = eadatasize);
189 eadatatail = eadatahead + eadatasize;
191 v = req_capsule_server_get(info->mti_pill, &RMF_EAVALS);
192 sizes = req_capsule_server_get(info->mti_pill, &RMF_EAVALS_LENS);
194 /* Fill out EAVALS and EAVALS_LENS */
195 for (b = eadatahead; b < eadatatail; b += strlen(b) + 1, v += rc) {
197 buf->lb_len = reqbody->mbo_eadatasize - eavallen;
198 rc = mdt_getxattr_one(info, b, next, buf, med, uc);
202 sizes[eavallens] = rc;
207 repbody->mbo_aclsize = eavallen;
208 repbody->mbo_max_mdsize = eavallens;
210 req_capsule_shrink(info->mti_pill, &RMF_EAVALS, eavallen, RCL_SERVER);
211 req_capsule_shrink(info->mti_pill, &RMF_EAVALS_LENS,
212 eavallens * sizeof(__u32), RCL_SERVER);
213 req_capsule_shrink(info->mti_pill, &RMF_EADATA, eadatasize, RCL_SERVER);
215 GOTO(out, rc = eadatasize);
220 int mdt_getxattr(struct mdt_thread_info *info)
222 struct ptlrpc_request *req = mdt_info_req(info);
223 struct mdt_export_data *med = mdt_req2med(req);
224 struct lu_ucred *uc = lu_ucred(info->mti_env);
225 struct mdt_body *reqbody;
226 struct mdt_body *repbody = NULL;
227 struct md_object *next;
229 __u32 remote = exp_connect_rmtclient(info->mti_exp);
235 LASSERT(info->mti_object != NULL);
236 LASSERT(lu_object_assert_exists(&info->mti_object->mot_obj));
238 CDEBUG(D_INODE, "getxattr "DFID"\n", PFID(&info->mti_body->mbo_fid1));
240 reqbody = req_capsule_client_get(info->mti_pill, &RMF_MDT_BODY);
242 RETURN(err_serious(-EFAULT));
244 rc = mdt_init_ucred(info, reqbody);
246 RETURN(err_serious(rc));
248 next = mdt_object_child(info->mti_object);
250 if (info->mti_body->mbo_valid & OBD_MD_FLRMTRGETFACL) {
251 if (unlikely(!remote))
252 GOTO(out, rc = err_serious(-EINVAL));
254 perm = mdt_identity_get_perm(uc->uc_identity, remote,
256 if (!(perm & CFS_RMTACL_PERM))
257 GOTO(out, rc = err_serious(-EPERM));
259 rc = mo_permission(info->mti_env, NULL, next, NULL,
262 GOTO(out, rc = err_serious(rc));
265 easize = mdt_getxattr_pack_reply(info);
267 GOTO(out, rc = err_serious(easize));
269 repbody = req_capsule_server_get(info->mti_pill, &RMF_MDT_BODY);
270 LASSERT(repbody != NULL);
272 /* No need further getxattr. */
273 if (easize == 0 || reqbody->mbo_eadatasize == 0)
274 GOTO(out, rc = easize);
276 buf = &info->mti_buf;
277 buf->lb_buf = req_capsule_server_get(info->mti_pill, &RMF_EADATA);
278 buf->lb_len = easize;
280 valid = info->mti_body->mbo_valid & (OBD_MD_FLXATTR | OBD_MD_FLXATTRLS);
282 if (valid == OBD_MD_FLXATTR) {
283 char *xattr_name = req_capsule_client_get(info->mti_pill,
285 rc = mdt_getxattr_one(info, xattr_name, next, buf, med, uc);
286 } else if (valid == OBD_MD_FLXATTRLS) {
287 CDEBUG(D_INODE, "listxattr\n");
289 rc = mo_xattr_list(info->mti_env, next, buf);
291 CDEBUG(D_INFO, "listxattr failed: %d\n", rc);
292 } else if (valid == OBD_MD_FLXATTRALL) {
293 rc = mdt_getxattr_all(info, reqbody, repbody,
301 mdt_counter_incr(req, LPROC_MDT_GETXATTR);
302 repbody->mbo_eadatasize = rc;
305 mdt_exit_ucred(info);
309 static int mdt_rmtlsetfacl(struct mdt_thread_info *info,
310 struct md_object *next,
311 const char *xattr_name,
312 ext_acl_xattr_header *header,
313 posix_acl_xattr_header **out)
315 struct ptlrpc_request *req = mdt_info_req(info);
316 struct mdt_export_data *med = mdt_req2med(req);
317 struct lu_ucred *uc = mdt_ucred(info);
318 struct lu_buf *buf = &info->mti_buf;
322 rc = lustre_ext_acl_xattr_id2server(uc, med->med_idmap, header);
326 rc = mo_xattr_get(info->mti_env, next, &LU_BUF_NULL, xattr_name);
333 if (buf->lb_len > 0) {
334 OBD_ALLOC_LARGE(buf->lb_buf, buf->lb_len);
335 if (unlikely(buf->lb_buf == NULL))
338 rc = mo_xattr_get(info->mti_env, next, buf, xattr_name);
340 CERROR("getxattr failed: %d\n", rc);
346 rc = lustre_acl_xattr_merge2posix((posix_acl_xattr_header *)(buf->lb_buf),
347 buf->lb_len, header, out);
351 if (rc <= 0 && buf->lb_buf != NULL)
352 OBD_FREE_LARGE(buf->lb_buf, buf->lb_len);
356 int mdt_reint_setxattr(struct mdt_thread_info *info,
357 struct mdt_lock_handle *unused)
359 struct ptlrpc_request *req = mdt_info_req(info);
360 struct lu_ucred *uc = lu_ucred(info->mti_env);
361 struct mdt_lock_handle *lh;
362 const struct lu_env *env = info->mti_env;
363 struct lu_buf *buf = &info->mti_buf;
364 struct mdt_reint_record *rr = &info->mti_rr;
365 struct md_attr *ma = &info->mti_attr;
366 struct lu_attr *attr = &info->mti_attr.ma_attr;
367 struct mdt_object *obj;
368 struct md_object *child;
369 struct obd_export *exp = info->mti_exp;
370 struct lu_nodemap *nodemap = exp->exp_target_data.ted_nodemap;
371 __u64 valid = attr->la_valid;
372 const char *xattr_name = rr->rr_name.ln_name;
373 int xattr_len = rr->rr_eadatalen;
376 posix_acl_xattr_header *new_xattr = NULL;
377 __u32 remote = exp_connect_rmtclient(info->mti_exp);
381 CDEBUG(D_INODE, "setxattr for "DFID": %s %s\n", PFID(rr->rr_fid1),
382 valid & OBD_MD_FLXATTR ? "set" : "remove", xattr_name);
384 if (info->mti_dlm_req)
385 ldlm_request_cancel(req, info->mti_dlm_req, 0, LATF_SKIP);
387 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_SETXATTR))
388 RETURN(err_serious(-ENOMEM));
390 rc = mdt_init_ucred_reint(info);
394 if (valid & OBD_MD_FLRMTRSETFACL) {
395 if (unlikely(!remote))
396 GOTO(out, rc = err_serious(-EINVAL));
398 perm = mdt_identity_get_perm(uc->uc_identity, remote,
400 if (!(perm & CFS_RMTACL_PERM))
401 GOTO(out, rc = err_serious(-EPERM));
404 if (strncmp(xattr_name, XATTR_USER_PREFIX,
405 sizeof(XATTR_USER_PREFIX) - 1) == 0) {
406 if (!(exp_connect_flags(req->rq_export) & OBD_CONNECT_XATTR))
407 GOTO(out, rc = -EOPNOTSUPP);
408 } else if (strncmp(xattr_name, XATTR_TRUSTED_PREFIX,
409 sizeof(XATTR_TRUSTED_PREFIX) - 1) == 0) {
411 if (!md_capable(mdt_ucred(info), CFS_CAP_SYS_ADMIN))
412 GOTO(out, rc = -EPERM);
414 if (strcmp(xattr_name, XATTR_NAME_LOV) == 0 ||
415 strcmp(xattr_name, XATTR_NAME_LMA) == 0 ||
416 strcmp(xattr_name, XATTR_NAME_LMV) == 0 ||
417 strcmp(xattr_name, XATTR_NAME_LINK) == 0 ||
418 strcmp(xattr_name, XATTR_NAME_FID) == 0 ||
419 strcmp(xattr_name, XATTR_NAME_VERSION) == 0 ||
420 strcmp(xattr_name, XATTR_NAME_SOM) == 0 ||
421 strcmp(xattr_name, XATTR_NAME_HSM) == 0 ||
422 strcmp(xattr_name, XATTR_NAME_LFSCK_NAMESPACE) == 0)
425 #if LUSTRE_VERSION_CODE < OBD_OCD_VERSION(2, 8, 53, 0)
426 if (strcmp(xattr_name, XATTR_NAME_LFSCK_NAMESPACE_OLD) == 0)
429 } else if ((valid & OBD_MD_FLXATTR) &&
430 (strcmp(xattr_name, XATTR_NAME_ACL_ACCESS) == 0 ||
431 strcmp(xattr_name, XATTR_NAME_ACL_DEFAULT) == 0)) {
433 /* currently lustre limit acl access size */
434 if (xattr_len > LUSTRE_POSIX_ACL_MAX_SIZE)
435 GOTO(out, rc = -ERANGE);
437 rc = nodemap_map_acl(nodemap, rr->rr_eadata, xattr_len,
438 NODEMAP_CLIENT_TO_FS);
442 /* ACLs were mapped out, return an error so the user knows */
444 GOTO(out, rc = -EPERM);
447 lockpart = MDS_INODELOCK_UPDATE;
448 /* Revoke all clients' lookup lock, since the access
449 * permissions for this inode is changed when ACL_ACCESS is
450 * set. This isn't needed for ACL_DEFAULT, since that does
451 * not change the access permissions of this inode, nor any
452 * other existing inodes. It is setting the ACLs inherited
453 * by new directories/files at create time. */
454 /* We need revoke both LOOKUP|PERM lock here, see mdt_attr_set. */
455 if (!strcmp(xattr_name, XATTR_NAME_ACL_ACCESS))
456 lockpart |= MDS_INODELOCK_PERM | MDS_INODELOCK_LOOKUP;
457 /* We need to take the lock on behalf of old clients so that newer
458 * clients flush their xattr caches */
460 lockpart |= MDS_INODELOCK_XATTR;
462 lh = &info->mti_lh[MDT_LH_PARENT];
463 /* ACLs were sent to clients under LCK_CR locks, so taking LCK_EX
465 mdt_lock_reg_init(lh, LCK_EX);
466 obj = mdt_object_find_lock(info, rr->rr_fid1, lh, lockpart);
468 GOTO(out, rc = PTR_ERR(obj));
470 tgt_vbr_obj_set(env, mdt_obj2dt(obj));
471 rc = mdt_version_get_check_save(info, obj, 0);
473 GOTO(out_unlock, rc);
475 if (unlikely(!(valid & OBD_MD_FLCTIME))) {
476 /* This isn't strictly an error, but all current clients
477 * should set OBD_MD_FLCTIME when setting attributes. */
478 CWARN("%s: client miss to set OBD_MD_FLCTIME when "
479 "setxattr %s: [object "DFID"] [valid "LPU64"]\n",
480 mdt_obd_name(info->mti_mdt), xattr_name,
481 PFID(rr->rr_fid1), valid);
482 attr->la_ctime = cfs_time_current_sec();
484 attr->la_valid = LA_CTIME;
485 child = mdt_object_child(obj);
486 if (valid & OBD_MD_FLXATTR) {
487 void *xattr = rr->rr_eadata;
490 if (valid & OBD_MD_FLRMTLSETFACL) {
491 if (unlikely(!remote))
492 GOTO(out_unlock, rc = -EINVAL);
494 xattr_len = mdt_rmtlsetfacl(info, child, xattr_name,
497 GOTO(out_unlock, rc = xattr_len);
502 if (attr->la_flags & XATTR_REPLACE)
503 flags |= LU_XATTR_REPLACE;
505 if (attr->la_flags & XATTR_CREATE)
506 flags |= LU_XATTR_CREATE;
508 mdt_fail_write(env, info->mti_mdt->mdt_bottom,
509 OBD_FAIL_MDS_SETXATTR_WRITE);
512 buf->lb_len = xattr_len;
513 rc = mo_xattr_set(env, child, buf, xattr_name, flags);
514 /* update ctime after xattr changed */
516 ma->ma_attr_flags |= MDS_PERM_BYPASS;
517 mo_attr_set(env, child, ma);
519 } else if (valid & OBD_MD_FLXATTRRM) {
520 rc = mo_xattr_del(env, child, xattr_name);
521 /* update ctime after xattr changed */
523 ma->ma_attr_flags |= MDS_PERM_BYPASS;
524 mo_attr_set(env, child, ma);
527 CDEBUG(D_INFO, "valid bits: "LPX64"\n", valid);
531 mdt_counter_incr(req, LPROC_MDT_SETXATTR);
535 mdt_object_unlock_put(info, obj, lh, rc);
536 if (unlikely(new_xattr != NULL))
537 lustre_posix_acl_xattr_free(new_xattr, xattr_len);
539 mdt_exit_ucred(info);