"fs_id: %u }", idmap->id_client,
idmap->id_fs);
}
+ for (node = rb_first(&nodemap->nm_client_to_fs_projidmap);
+ node; node = rb_next(node)) {
+ if (cont)
+ seq_printf(m, ",\n");
+ idmap = rb_entry(node, struct lu_idmap, id_client_to_fs);
+ if (idmap != NULL)
+ seq_printf(m,
+ " { idtype: projid, client_id: %u, fs_id: %u }",
+ idmap->id_client,
+ idmap->id_fs);
+ }
up_read(&nodemap->nm_idmap_lock);
seq_printf(m, "\n");
seq_printf(m, "]\n");
*/
static int nodemap_idmap_open(struct inode *inode, struct file *file)
{
- return single_open(file, nodemap_idmap_show, PDE_DATA(inode));
+ return single_open(file, nodemap_idmap_show, pde_data(inode));
}
/**
{
struct lu_nodemap *nodemap;
struct lu_nid_range *range;
- struct interval_node_extent ext;
char start_nidstr[LNET_NIDSTR_SIZE];
char end_nidstr[LNET_NIDSTR_SIZE];
bool cont = false;
if (cont)
seq_printf(m, ",\n");
cont = 1;
- ext = range->rn_node.in_extent;
- libcfs_nid2str_r(ext.start, start_nidstr, sizeof(start_nidstr));
- libcfs_nid2str_r(ext.end, end_nidstr, sizeof(end_nidstr));
+ libcfs_nidstr_r(&range->rn_start, start_nidstr, sizeof(start_nidstr));
+ libcfs_nidstr_r(&range->rn_end, end_nidstr, sizeof(end_nidstr));
seq_printf(m, " { id: %u, start_nid: %s, end_nid: %s }",
range->rn_id, start_nidstr, end_nidstr);
}
*/
static int nodemap_ranges_open(struct inode *inode, struct file *file)
{
- return single_open(file, nodemap_ranges_show, PDE_DATA(inode));
+ return single_open(file, nodemap_ranges_show, pde_data(inode));
}
/**
LPROC_SEQ_FOPS(nodemap_fileset);
/**
+ * Reads and prints the SELinux policy info for the given nodemap.
+ *
+ * \param m seq file in proc fs
+ * \param data unused
+ * \retval 0 success
+ */
+static int nodemap_sepol_seq_show(struct seq_file *m, void *data)
+{
+ struct lu_nodemap *nodemap;
+ int rc = 0;
+
+ mutex_lock(&active_config_lock);
+ nodemap = nodemap_lookup(m->private);
+ mutex_unlock(&active_config_lock);
+ if (IS_ERR(nodemap)) {
+ rc = PTR_ERR(nodemap);
+ CERROR("cannot find nodemap '%s': rc = %d\n",
+ (char *)m->private, rc);
+ return rc;
+ }
+
+ seq_printf(m, "%s\n", nodemap_get_sepol(nodemap));
+ nodemap_putref(nodemap);
+ return rc;
+}
+
+/**
+ * Set SELinux policy info on a nodemap.
+ *
+ * \param[in] file proc file
+ * \param[in] buffer string, "<sepol>"
+ * \param[in] count \a buffer length
+ * \param[in] off unused
+ * \retval \a count on success
+ * \retval negative number on error
+ */
+static ssize_t
+nodemap_sepol_seq_write(struct file *file,
+ const char __user *buffer,
+ size_t count, loff_t *off)
+{
+ struct seq_file *m = file->private_data;
+ char sepol[LUSTRE_NODEMAP_SEPOL_LENGTH + 1];
+ int rc = 0;
+
+ BUILD_BUG_ON(sizeof(sepol) !=
+ sizeof(((struct lu_nodemap *)0)->nm_sepol));
+
+ if (count > 0) {
+ if (count >= sizeof(sepol))
+ GOTO(out, rc = -ENAMETOOLONG);
+
+ if (copy_from_user(sepol, buffer, count))
+ GOTO(out, rc = -EFAULT);
+
+ sepol[count] = '\0';
+
+ rc = nodemap_set_sepol(m->private, sepol);
+ }
+
+out:
+ if (rc != 0)
+ return rc;
+
+ return count;
+}
+LPROC_SEQ_FOPS(nodemap_sepol);
+
+/**
* Reads and prints the exports attached to the given nodemap.
*
* \param m seq file in proc fs, stores nodemap
list_for_each_entry(exp, &nodemap->nm_member_list,
exp_target_data.ted_nodemap_member) {
if (exp->exp_connection != NULL)
- libcfs_nid2str_r(exp->exp_connection->c_peer.nid,
- nidstr, sizeof(nidstr));
+ libcfs_nidstr_r(&exp->exp_connection->c_peer.nid,
+ nidstr, sizeof(nidstr));
seq_printf(m, " { nid: %s, uuid: %s },",
nidstr, exp->exp_client_uuid.uuid);
*/
static int nodemap_exports_open(struct inode *inode, struct file *file)
{
- return single_open(file, nodemap_exports_show, PDE_DATA(inode));
+ return single_open(file, nodemap_exports_show, pde_data(inode));
}
/**
}
/**
+ * Reads and prints the squash PROJID for the given nodemap.
+ *
+ * \param m seq file in proc fs
+ * \param data unused
+ * \retval 0 success
+ */
+static int nodemap_squash_projid_seq_show(struct seq_file *m, void *data)
+{
+ struct lu_nodemap *nodemap;
+
+ mutex_lock(&active_config_lock);
+ nodemap = nodemap_lookup(m->private);
+ mutex_unlock(&active_config_lock);
+ if (IS_ERR(nodemap)) {
+ int rc = PTR_ERR(nodemap);
+
+ CERROR("cannot find nodemap '%s': rc = %d\n",
+ (char *)m->private, rc);
+ return rc;
+ }
+
+ seq_printf(m, "%u\n", nodemap->nm_squash_projid);
+ nodemap_putref(nodemap);
+ return 0;
+}
+
+/**
* Reads and prints the trusted flag for the given nodemap.
*
* \param m seq file in proc fs
static int nodemap_map_mode_seq_show(struct seq_file *m, void *data)
{
struct lu_nodemap *nodemap;
+ bool need_sep = false;
int rc;
mutex_lock(&active_config_lock);
return rc;
}
- if (nodemap->nmf_map_uid_only)
- seq_printf(m, "uid_only\n");
- else if (nodemap->nmf_map_gid_only)
- seq_printf(m, "gid_only\n");
- else
- seq_printf(m, "both\n");
+ if (nodemap->nmf_map_mode == NODEMAP_MAP_ALL) {
+ seq_puts(m, "all\n");
+ } else {
+ if (nodemap->nmf_map_mode & NODEMAP_MAP_UID) {
+ seq_puts(m, "uid");
+ need_sep = true;
+ }
+ if (nodemap->nmf_map_mode & NODEMAP_MAP_GID) {
+ seq_puts(m, need_sep ? ",gid" : "gid");
+ need_sep = true;
+ }
+ if (nodemap->nmf_map_mode & NODEMAP_MAP_PROJID)
+ seq_puts(m, need_sep ? ",projid" : "projid");
+ seq_puts(m, "\n");
+ }
+
+ nodemap_putref(nodemap);
+ return 0;
+}
+
+/**
+ * Reads and prints the rbac for the given nodemap.
+ *
+ * \param m seq file in proc fs
+ * \param data unused
+ * \retval 0 success
+ */
+static int nodemap_rbac_seq_show(struct seq_file *m, void *data)
+{
+ struct lu_nodemap *nodemap;
+ char *sep = "";
+ int i, rc;
+
+ mutex_lock(&active_config_lock);
+ nodemap = nodemap_lookup(m->private);
+ mutex_unlock(&active_config_lock);
+ if (IS_ERR(nodemap)) {
+ rc = PTR_ERR(nodemap);
+ CERROR("cannot find nodemap '%s': rc = %d\n",
+ (char *)m->private, rc);
+ return rc;
+ }
+
+ if (nodemap->nmf_rbac == NODEMAP_RBAC_ALL) {
+ for (i = 0; i < ARRAY_SIZE(nodemap_rbac_names); i++)
+ seq_printf(m, "%s%s", i == 0 ? "" : ",",
+ nodemap_rbac_names[i].nrn_name);
+ seq_puts(m, "\n");
+ } else if (nodemap->nmf_rbac == NODEMAP_RBAC_NONE) {
+ seq_puts(m, "none\n");
+ } else {
+ for (i = 0; i < ARRAY_SIZE(nodemap_rbac_names); i++) {
+ if (nodemap->nmf_rbac &
+ nodemap_rbac_names[i].nrn_mode) {
+ seq_printf(m, "%s%s", sep,
+ nodemap_rbac_names[i].nrn_name);
+ sep = ",";
+ }
+ }
+ seq_puts(m, "\n");
+ }
nodemap_putref(nodemap);
return 0;
return 0;
}
+/**
+ * Reads and prints the forbid_encryption flag for the given nodemap.
+ *
+ * \param m seq file in proc fs
+ * \param data unused
+ * \retval 0 success
+ */
+static int nodemap_forbid_encryption_seq_show(struct seq_file *m, void *data)
+{
+ struct lu_nodemap *nodemap;
+ int rc;
+
+ mutex_lock(&active_config_lock);
+ nodemap = nodemap_lookup(m->private);
+ mutex_unlock(&active_config_lock);
+ if (IS_ERR(nodemap)) {
+ rc = PTR_ERR(nodemap);
+ CERROR("cannot find nodemap '%s': rc = %d\n",
+ (char *)m->private, rc);
+ return rc;
+ }
+
+ seq_printf(m, "%d\n", (int)nodemap->nmf_forbid_encryption);
+ nodemap_putref(nodemap);
+ return 0;
+}
+
+/**
+ * Reads and prints the readonly_mount flag for the given nodemap.
+ *
+ * \param m seq file in proc fs
+ * \param data unused
+ * \retval 0 success
+ */
+static int nodemap_readonly_mount_seq_show(struct seq_file *m, void *data)
+{
+ struct lu_nodemap *nodemap;
+ int rc;
+
+ mutex_lock(&active_config_lock);
+ nodemap = nodemap_lookup(m->private);
+ mutex_unlock(&active_config_lock);
+ if (IS_ERR(nodemap)) {
+ rc = PTR_ERR(nodemap);
+ CERROR("cannot find nodemap '%s': rc = %d\n",
+ (char *)m->private, rc);
+ return rc;
+ }
+
+ seq_printf(m, "%d\n", (int)nodemap->nmf_readonly_mount);
+ nodemap_putref(nodemap);
+ return 0;
+}
+
static struct lprocfs_vars lprocfs_nm_module_vars[] = {
{
.name = "active",
LPROC_SEQ_FOPS_RO(nodemap_admin);
LPROC_SEQ_FOPS_RO(nodemap_squash_uid);
LPROC_SEQ_FOPS_RO(nodemap_squash_gid);
+LPROC_SEQ_FOPS_RO(nodemap_squash_projid);
LPROC_SEQ_FOPS_RO(nodemap_deny_unknown);
LPROC_SEQ_FOPS_RO(nodemap_map_mode);
+LPROC_SEQ_FOPS_RO(nodemap_rbac);
LPROC_SEQ_FOPS_RO(nodemap_audit_mode);
-
-const struct file_operations nodemap_ranges_fops = {
- .open = nodemap_ranges_open,
- .read = seq_read,
- .llseek = seq_lseek,
- .release = single_release
+LPROC_SEQ_FOPS_RO(nodemap_forbid_encryption);
+LPROC_SEQ_FOPS_RO(nodemap_readonly_mount);
+
+static const struct proc_ops nodemap_ranges_fops = {
+ .proc_open = nodemap_ranges_open,
+ .proc_read = seq_read,
+ .proc_lseek = seq_lseek,
+ .proc_release = single_release
};
-const struct file_operations nodemap_idmap_fops = {
- .open = nodemap_idmap_open,
- .read = seq_read,
- .llseek = seq_lseek,
- .release = single_release
+static const struct proc_ops nodemap_idmap_fops = {
+ .proc_open = nodemap_idmap_open,
+ .proc_read = seq_read,
+ .proc_lseek = seq_lseek,
+ .proc_release = single_release
};
-const struct file_operations nodemap_exports_fops = {
- .open = nodemap_exports_open,
- .read = seq_read,
- .llseek = seq_lseek,
- .release = single_release
+static const struct proc_ops nodemap_exports_fops = {
+ .proc_open = nodemap_exports_open,
+ .proc_read = seq_read,
+ .proc_lseek = seq_lseek,
+ .proc_release = single_release
};
static struct lprocfs_vars lprocfs_nodemap_vars[] = {
- {
- .name = "id",
- .fops = &nodemap_id_fops,
- },
- {
- .name = "trusted_nodemap",
- .fops = &nodemap_trusted_fops,
- },
+ /* in alphabetical order */
{
.name = "admin_nodemap",
.fops = &nodemap_admin_fops,
},
{
+ .name = "audit_mode",
+ .fops = &nodemap_audit_mode_fops,
+ },
+ {
.name = "deny_unknown",
.fops = &nodemap_deny_unknown_fops,
},
{
- .name = "map_mode",
- .fops = &nodemap_map_mode_fops,
+ .name = "exports",
+ .fops = &nodemap_exports_fops,
},
{
- .name = "audit_mode",
- .fops = &nodemap_audit_mode_fops,
+ .name = "fileset",
+ .fops = &nodemap_fileset_fops,
},
{
- .name = "squash_uid",
- .fops = &nodemap_squash_uid_fops,
+ .name = "forbid_encryption",
+ .fops = &nodemap_forbid_encryption_fops,
},
{
- .name = "squash_gid",
- .fops = &nodemap_squash_gid_fops,
+ .name = "id",
+ .fops = &nodemap_id_fops,
+ },
+ {
+ .name = "idmap",
+ .fops = &nodemap_idmap_fops,
+ },
+ {
+ .name = "map_mode",
+ .fops = &nodemap_map_mode_fops,
},
{
.name = "ranges",
.fops = &nodemap_ranges_fops,
},
{
- .name = "fileset",
- .fops = &nodemap_fileset_fops,
+ .name = "rbac",
+ .fops = &nodemap_rbac_fops,
},
{
- .name = "exports",
- .fops = &nodemap_exports_fops,
+ .name = "readonly_mount",
+ .fops = &nodemap_readonly_mount_fops,
},
{
- .name = "idmap",
- .fops = &nodemap_idmap_fops,
+ .name = "sepol",
+ .fops = &nodemap_sepol_fops,
+ },
+ {
+ .name = "squash_gid",
+ .fops = &nodemap_squash_gid_fops,
+ },
+ {
+ .name = "squash_projid",
+ .fops = &nodemap_squash_projid_fops,
+ },
+ {
+ .name = "squash_uid",
+ .fops = &nodemap_squash_uid_fops,
+ },
+ {
+ .name = "trusted_nodemap",
+ .fops = &nodemap_trusted_fops,
},
{
NULL
};
static struct lprocfs_vars lprocfs_default_nodemap_vars[] = {
+ /* in alphabetical order */
{
- .name = "id",
- .fops = &nodemap_id_fops,
+ .name = "admin_nodemap",
+ .fops = &nodemap_admin_fops,
},
{
- .name = "trusted_nodemap",
- .fops = &nodemap_trusted_fops,
+ .name = "audit_mode",
+ .fops = &nodemap_audit_mode_fops,
},
{
- .name = "admin_nodemap",
- .fops = &nodemap_admin_fops,
+ .name = "deny_unknown",
+ .fops = &nodemap_deny_unknown_fops,
},
{
- .name = "squash_uid",
- .fops = &nodemap_squash_uid_fops,
+ .name = "exports",
+ .fops = &nodemap_exports_fops,
+ },
+ {
+ .name = "fileset",
+ .fops = &nodemap_fileset_fops,
+ },
+ {
+ .name = "forbid_encryption",
+ .fops = &nodemap_forbid_encryption_fops,
+ },
+ {
+ .name = "id",
+ .fops = &nodemap_id_fops,
+ },
+ {
+ .name = "map_mode",
+ .fops = &nodemap_map_mode_fops,
+ },
+ {
+ .name = "readonly_mount",
+ .fops = &nodemap_readonly_mount_fops,
},
{
.name = "squash_gid",
.fops = &nodemap_squash_gid_fops,
},
{
- .name = "fileset",
- .fops = &nodemap_fileset_fops,
+ .name = "squash_projid",
+ .fops = &nodemap_squash_projid_fops,
},
{
- .name = "exports",
- .fops = &nodemap_exports_fops,
+ .name = "squash_uid",
+ .fops = &nodemap_squash_uid_fops,
},
{
- .name = "audit_mode",
- .fops = &nodemap_audit_mode_fops,
+ .name = "trusted_nodemap",
+ .fops = &nodemap_trusted_fops,
},
{
NULL