1 /* -*- mode: c; c-basic-offset: 8; indent-tabs-mode: nil; -*-
2 * vim:expandtab:shiftwidth=8:tabstop=8:
6 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 only,
10 * as published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License version 2 for more details (a copy is included
16 * in the LICENSE file that accompanied this code).
18 * You should have received a copy of the GNU General Public License
19 * version 2 along with this program; If not, see
20 * http://www.sun.com/software/products/lustre/docs/GPLv2.pdf
22 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
23 * CA 95054 USA or visit www.sun.com if you need additional information or
29 * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
30 * Use is subject to license terms.
32 * Copyright (c) 2011, 2012, Whamcloud, Inc.
35 * This file is part of Lustre, http://www.lustre.org/
36 * Lustre is a trademark of Sun Microsystems, Inc.
38 * lustre/mdt/mdt_xattr.c
40 * Lustre Metadata Target (mdt) extended attributes management.
42 * Author: Peter Braam <braam@clusterfs.com>
43 * Author: Andreas Dilger <adilger@clusterfs.com>
44 * Author: Phil Schwan <phil@clusterfs.com>
45 * Author: Huang Hua <huanghua@clusterfs.com>
49 # define EXPORT_SYMTAB
51 #define DEBUG_SUBSYSTEM S_MDS
53 #include <lustre_acl.h>
54 #include "mdt_internal.h"
57 /* return EADATA length to the caller. negative value means error */
58 static int mdt_getxattr_pack_reply(struct mdt_thread_info * info)
60 struct req_capsule *pill = info->mti_pill ;
61 struct ptlrpc_request *req = mdt_info_req(info);
63 __u64 valid = info->mti_body->valid;
64 static const char user_string[] = "user.";
68 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_GETXATTR_PACK))
71 /* Determine how many bytes we need */
72 if (valid & OBD_MD_FLXATTR) {
73 xattr_name = req_capsule_client_get(pill, &RMF_NAME);
77 if (!(req->rq_export->exp_connect_flags & OBD_CONNECT_XATTR) &&
78 !strncmp(xattr_name, user_string, sizeof(user_string) - 1))
81 size = mo_xattr_get(info->mti_env,
82 mdt_object_child(info->mti_object),
83 &LU_BUF_NULL, xattr_name);
84 } else if (valid & OBD_MD_FLXATTRLS) {
85 size = mo_xattr_list(info->mti_env,
86 mdt_object_child(info->mti_object),
89 CDEBUG(D_INFO, "Valid bits: "LPX64"\n", info->mti_body->valid);
96 else if (size != -EOPNOTSUPP) {
97 CDEBUG(D_INFO, "Error geting EA size: %d\n", size);
102 if (info->mti_body->eadatasize != 0 &&
103 info->mti_body->eadatasize < size)
106 req_capsule_set_size(pill, &RMF_EADATA, RCL_SERVER,
107 min_t(int, size, info->mti_body->eadatasize));
109 rc = req_capsule_server_pack(pill);
118 int mdt_getxattr(struct mdt_thread_info *info)
120 struct ptlrpc_request *req = mdt_info_req(info);
121 struct mdt_export_data *med = mdt_req2med(req);
122 struct md_ucred *uc = mdt_ucred(info);
123 struct mdt_body *reqbody;
124 struct mdt_body *repbody = NULL;
125 struct md_object *next;
127 __u32 remote = exp_connect_rmtclient(info->mti_exp);
132 LASSERT(info->mti_object != NULL);
133 LASSERT(lu_object_assert_exists(&info->mti_object->mot_obj.mo_lu));
135 CDEBUG(D_INODE, "getxattr "DFID"\n", PFID(&info->mti_body->fid1));
137 reqbody = req_capsule_client_get(info->mti_pill, &RMF_MDT_BODY);
139 RETURN(err_serious(-EFAULT));
141 rc = mdt_init_ucred(info, reqbody);
143 RETURN(err_serious(rc));
145 next = mdt_object_child(info->mti_object);
147 if (info->mti_body->valid & OBD_MD_FLRMTRGETFACL) {
148 if (unlikely(!remote))
149 GOTO(out, rc = err_serious(-EINVAL));
151 perm = mdt_identity_get_perm(uc->mu_identity, remote,
153 if (!(perm & CFS_RMTACL_PERM))
154 GOTO(out, rc = err_serious(-EPERM));
156 rc = mo_permission(info->mti_env, NULL, next, NULL,
159 GOTO(out, rc = err_serious(rc));
162 easize = mdt_getxattr_pack_reply(info);
164 GOTO(out, rc = err_serious(easize));
166 repbody = req_capsule_server_get(info->mti_pill, &RMF_MDT_BODY);
167 LASSERT(repbody != NULL);
169 /* No need further getxattr. */
170 if (easize == 0 || reqbody->eadatasize == 0)
171 GOTO(out, rc = easize);
173 buf = &info->mti_buf;
174 buf->lb_buf = req_capsule_server_get(info->mti_pill, &RMF_EADATA);
175 buf->lb_len = easize;
177 if (info->mti_body->valid & OBD_MD_FLXATTR) {
178 int flags = CFS_IC_NOTHING;
179 char *xattr_name = req_capsule_client_get(info->mti_pill,
181 CDEBUG(D_INODE, "getxattr %s\n", xattr_name);
183 rc = mo_xattr_get(info->mti_env, next, buf, xattr_name);
185 CERROR("getxattr failed: %d\n", rc);
189 if (info->mti_body->valid &
190 (OBD_MD_FLRMTLSETFACL | OBD_MD_FLRMTLGETFACL))
192 else if (info->mti_body->valid & OBD_MD_FLRMTRGETFACL)
193 flags = CFS_IC_MAPPED;
195 if (rc > 0 && flags != CFS_IC_NOTHING) {
198 if (unlikely(!remote))
199 GOTO(out, rc = -EINVAL);
201 rc1 = lustre_posix_acl_xattr_id2client(uc,
203 (posix_acl_xattr_header *)(buf->lb_buf),
205 if (unlikely(rc1 < 0))
208 } else if (info->mti_body->valid & OBD_MD_FLXATTRLS) {
209 CDEBUG(D_INODE, "listxattr\n");
211 rc = mo_xattr_list(info->mti_env, next, buf);
213 CDEBUG(D_INFO, "listxattr failed: %d\n", rc);
220 mdt_counter_incr(req->rq_export, LPROC_MDT_GETXATTR);
221 repbody->eadatasize = rc;
224 mdt_exit_ucred(info);
228 static int mdt_rmtlsetfacl(struct mdt_thread_info *info,
229 struct md_object *next,
230 const char *xattr_name,
231 ext_acl_xattr_header *header,
232 posix_acl_xattr_header **out)
234 struct ptlrpc_request *req = mdt_info_req(info);
235 struct mdt_export_data *med = mdt_req2med(req);
236 struct md_ucred *uc = mdt_ucred(info);
237 struct lu_buf *buf = &info->mti_buf;
241 rc = lustre_ext_acl_xattr_id2server(uc, med->med_idmap, header);
245 rc = mo_xattr_get(info->mti_env, next, &LU_BUF_NULL, xattr_name);
252 if (buf->lb_len > 0) {
253 OBD_ALLOC_LARGE(buf->lb_buf, buf->lb_len);
254 if (unlikely(buf->lb_buf == NULL))
257 rc = mo_xattr_get(info->mti_env, next, buf, xattr_name);
259 CERROR("getxattr failed: %d\n", rc);
265 rc = lustre_acl_xattr_merge2posix((posix_acl_xattr_header *)(buf->lb_buf),
266 buf->lb_len, header, out);
270 if (rc <= 0 && buf->lb_buf != NULL)
271 OBD_FREE_LARGE(buf->lb_buf, buf->lb_len);
275 int mdt_reint_setxattr(struct mdt_thread_info *info,
276 struct mdt_lock_handle *unused)
278 struct ptlrpc_request *req = mdt_info_req(info);
279 struct md_ucred *uc = mdt_ucred(info);
280 struct mdt_lock_handle *lh;
281 struct req_capsule *pill = info->mti_pill;
282 const struct lu_env *env = info->mti_env;
283 struct lu_buf *buf = &info->mti_buf;
284 struct mdt_reint_record *rr = &info->mti_rr;
285 struct md_attr *ma = &info->mti_attr;
286 struct lu_attr *attr = &info->mti_attr.ma_attr;
287 struct mdt_object *obj;
288 struct md_object *child;
289 __u64 valid = attr->la_valid;
290 const char *xattr_name;
294 posix_acl_xattr_header *new_xattr = NULL;
295 __u32 remote = exp_connect_rmtclient(info->mti_exp);
299 CDEBUG(D_INODE, "setxattr for "DFID"\n", PFID(rr->rr_fid1));
301 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_SETXATTR))
302 RETURN(err_serious(-ENOMEM));
304 xattr_name = rr->rr_name;
306 CDEBUG(D_INODE, "%s xattr %s\n",
307 valid & OBD_MD_FLXATTR ? "set" : "remove", xattr_name);
309 rc = mdt_init_ucred_reint(info);
313 if (valid & OBD_MD_FLRMTRSETFACL) {
314 if (unlikely(!remote))
315 GOTO(out, rc = err_serious(-EINVAL));
317 perm = mdt_identity_get_perm(uc->mu_identity, remote,
319 if (!(perm & CFS_RMTACL_PERM))
320 GOTO(out, rc = err_serious(-EPERM));
323 /* various sanity check for xattr name */
324 xattr_name = req_capsule_client_get(pill, &RMF_NAME);
326 GOTO(out, rc = err_serious(-EFAULT));
328 if (strncmp(xattr_name, XATTR_USER_PREFIX,
329 sizeof(XATTR_USER_PREFIX) - 1) == 0) {
330 if (!(req->rq_export->exp_connect_flags & OBD_CONNECT_XATTR))
331 GOTO(out, rc = -EOPNOTSUPP);
332 if (strcmp(xattr_name, XATTR_NAME_LOV) == 0)
333 GOTO(out, rc = -EACCES);
334 if (strcmp(xattr_name, XATTR_NAME_LMA) == 0)
336 if (strcmp(xattr_name, XATTR_NAME_LINK) == 0)
338 } else if ((valid & OBD_MD_FLXATTR) &&
339 (strncmp(xattr_name, XATTR_NAME_ACL_ACCESS,
340 sizeof(XATTR_NAME_ACL_ACCESS) - 1) == 0 ||
341 strncmp(xattr_name, XATTR_NAME_ACL_DEFAULT,
342 sizeof(XATTR_NAME_ACL_DEFAULT) - 1) == 0)) {
343 /* currently lustre limit acl access size */
344 xattr_len = req_capsule_get_size(pill, &RMF_EADATA, RCL_CLIENT);
346 if (xattr_len > LUSTRE_POSIX_ACL_MAX_SIZE)
350 lockpart = MDS_INODELOCK_UPDATE;
351 /* Revoke all clients' lookup lock, since the access
352 * permissions for this inode is changed when ACL_ACCESS is
353 * set. This isn't needed for ACL_DEFAULT, since that does
354 * not change the access permissions of this inode, nor any
355 * other existing inodes. It is setting the ACLs inherited
356 * by new directories/files at create time. */
357 if (!strcmp(xattr_name, XATTR_NAME_ACL_ACCESS))
358 lockpart |= MDS_INODELOCK_LOOKUP;
360 lh = &info->mti_lh[MDT_LH_PARENT];
361 /* ACLs were sent to clients under LCK_CR locks, so taking LCK_EX
363 mdt_lock_reg_init(lh, LCK_EX);
364 obj = mdt_object_find_lock(info, rr->rr_fid1, lh, lockpart);
366 GOTO(out, rc = PTR_ERR(obj));
369 rc = mdt_version_get_check_save(info, obj, 0);
371 GOTO(out_unlock, rc);
373 if (unlikely(!(valid & OBD_MD_FLCTIME))) {
374 /* This isn't strictly an error, but all current clients
375 * should set OBD_MD_FLCTIME when setting attributes. */
376 CWARN("%s: client miss to set OBD_MD_FLCTIME when "
377 "setxattr %s: [object "DFID"] [valid "LPU64"]\n",
378 info->mti_exp->exp_obd->obd_name, xattr_name,
379 PFID(rr->rr_fid1), valid);
380 attr->la_ctime = cfs_time_current_sec();
382 attr->la_valid = LA_CTIME;
383 child = mdt_object_child(obj);
384 if (valid & OBD_MD_FLXATTR) {
387 if (!req_capsule_field_present(pill, &RMF_EADATA, RCL_CLIENT)) {
388 CDEBUG(D_INFO, "no xattr data supplied\n");
389 GOTO(out_unlock, rc = -EFAULT);
392 xattr_len = req_capsule_get_size(pill, &RMF_EADATA, RCL_CLIENT);
396 xattr = req_capsule_client_get(pill, &RMF_EADATA);
398 if (valid & OBD_MD_FLRMTLSETFACL) {
399 if (unlikely(!remote))
400 GOTO(out_unlock, rc = -EINVAL);
402 xattr_len = mdt_rmtlsetfacl(info, child,
404 (ext_acl_xattr_header *)xattr,
407 GOTO(out_unlock, rc = xattr_len);
409 xattr = (char *)new_xattr;
412 if (attr->la_flags & XATTR_REPLACE)
413 flags |= LU_XATTR_REPLACE;
415 if (attr->la_flags & XATTR_CREATE)
416 flags |= LU_XATTR_CREATE;
418 mdt_fail_write(env, info->mti_mdt->mdt_bottom,
419 OBD_FAIL_MDS_SETXATTR_WRITE);
422 buf->lb_len = xattr_len;
423 rc = mo_xattr_set(env, child, buf, xattr_name, flags);
424 /* update ctime after xattr changed */
426 ma->ma_attr_flags |= MDS_PERM_BYPASS;
427 mo_attr_set(env, child, ma);
430 } else if (valid & OBD_MD_FLXATTRRM) {
431 rc = mo_xattr_del(env, child, xattr_name);
432 /* update ctime after xattr changed */
434 ma->ma_attr_flags |= MDS_PERM_BYPASS;
435 mo_attr_set(env, child, ma);
438 CDEBUG(D_INFO, "valid bits: "LPX64"\n", valid);
442 mdt_counter_incr(req->rq_export, LPROC_MDT_SETXATTR);
446 mdt_object_unlock_put(info, obj, lh, rc);
447 if (unlikely(new_xattr != NULL))
448 lustre_posix_acl_xattr_free(new_xattr, xattr_len);
450 mdt_exit_ucred(info);