4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License version 2 for more details (a copy is included
14 * in the LICENSE file that accompanied this code).
16 * You should have received a copy of the GNU General Public License
17 * version 2 along with this program; If not, see
18 * http://www.gnu.org/licenses/gpl-2.0.html
23 * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
24 * Use is subject to license terms.
26 * Copyright (c) 2011, 2017, Intel Corporation.
29 * This file is part of Lustre, http://www.lustre.org/
31 * lustre/mdt/mdt_xattr.c
33 * Lustre Metadata Target (mdt) extended attributes management.
35 * Author: Peter Braam <braam@clusterfs.com>
36 * Author: Andreas Dilger <adilger@clusterfs.com>
37 * Author: Phil Schwan <phil@clusterfs.com>
38 * Author: Huang Hua <huanghua@clusterfs.com>
41 #define DEBUG_SUBSYSTEM S_MDS
43 #include <linux/xattr.h>
44 #include <obd_class.h>
45 #include <lustre_nodemap.h>
46 #include <lustre_acl.h>
47 #include <lustre_lmv.h>
48 #include "mdt_internal.h"
51 /* return EADATA length to the caller. negative value means error */
52 static int mdt_getxattr_pack_reply(struct mdt_thread_info *info)
54 struct req_capsule *pill = info->mti_pill;
55 struct ptlrpc_request *req = mdt_info_req(info);
56 const char *xattr_name;
58 static const char user_string[] = "user.";
64 valid = info->mti_body->mbo_valid & (OBD_MD_FLXATTR | OBD_MD_FLXATTRLS);
66 /* Determine how many bytes we need */
67 if (valid == OBD_MD_FLXATTR) {
68 xattr_name = req_capsule_client_get(pill, &RMF_NAME);
72 if (!(exp_connect_flags(req->rq_export) & OBD_CONNECT_XATTR) &&
73 !strncmp(xattr_name, user_string, sizeof(user_string) - 1))
76 size = mo_xattr_get(info->mti_env,
77 mdt_object_child(info->mti_object),
78 &LU_BUF_NULL, xattr_name);
79 if (size == -ENODATA) {
80 /* XXX: Some client code will not handle -ENODATA
81 * for XATTR_NAME_LOV (trusted.lov) properly.
83 if (strcmp(xattr_name, XATTR_NAME_LOV) == 0)
90 } else if (valid == OBD_MD_FLXATTRLS) {
92 size = mo_xattr_list(info->mti_env,
93 mdt_object_child(info->mti_object),
95 } else if (valid == OBD_MD_FLXATTRALL) {
97 /* N.B. eadatasize = 0 is not valid for FLXATTRALL */
98 /* We could calculate accurate sizes, but this would
99 * introduce a lot of overhead, let's do it later...
101 size = info->mti_body->mbo_eadatasize;
102 if (size <= 0 || size > info->mti_mdt->mdt_max_ea_size ||
103 size & (sizeof(__u32) - 1)) {
104 DEBUG_REQ(D_ERROR, req,
105 "%s: invalid EA size(%d) for FLXATTRALL\n",
106 mdt_obd_name(info->mti_mdt), size);
109 req_capsule_set_size(pill, &RMF_EAVALS, RCL_SERVER, size);
110 req_capsule_set_size(pill, &RMF_EAVALS_LENS, RCL_SERVER, size);
112 CDEBUG(D_INFO, "Valid bits: %#llx\n",
113 info->mti_body->mbo_valid);
118 if (size != -EOPNOTSUPP && size != -ENOENT)
119 CERROR("%s: error geting EA size for '%s': rc = %d\n",
120 mdt_obd_name(info->mti_mdt), xattr_name, size);
124 if (req_capsule_has_field(pill, &RMF_ACL, RCL_SERVER))
125 req_capsule_set_size(pill, &RMF_ACL, RCL_SERVER,
126 LUSTRE_POSIX_ACL_MAX_SIZE_OLD);
128 req_capsule_set_size(pill, &RMF_EADATA, RCL_SERVER,
129 info->mti_body->mbo_eadatasize == 0 ? 0 : size);
131 rc2 = req_capsule_server_pack(pill);
135 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_GETXATTR_PACK))
138 RETURN(rc < 0 ? rc : size);
141 static int mdt_nodemap_map_acl(struct mdt_thread_info *info, void *buf,
142 size_t size, const char *name,
143 enum nodemap_tree_type tree_type)
145 struct lu_nodemap *nodemap;
146 struct obd_export *exp = info->mti_exp;
151 if (strcmp(name, XATTR_NAME_ACL_ACCESS) == 0 ||
152 strcmp(name, XATTR_NAME_ACL_DEFAULT) == 0) {
153 if (size > info->mti_mdt->mdt_max_ea_size ||
154 (!exp_connect_large_acl(exp) &&
155 size > LUSTRE_POSIX_ACL_MAX_SIZE_OLD))
156 GOTO(out, rc = -ERANGE);
158 nodemap = nodemap_get_from_exp(exp);
160 GOTO(out, rc = PTR_ERR(nodemap));
162 rc = nodemap_map_acl(nodemap, buf, size, tree_type);
163 nodemap_putref(nodemap);
171 static int mdt_getxattr_all(struct mdt_thread_info *info,
172 struct mdt_body *reqbody, struct mdt_body *repbody,
173 struct lu_buf *buf, struct md_object *next)
175 const struct lu_env *env = info->mti_env;
176 char *v, *b, *eadatahead, *eadatatail;
178 int eadatasize, eavallen = 0, eavallens = 0, rc;
183 * The format of the pill is the following:
184 * EADATA: attr1\0attr2\0...attrn\0
185 * EAVALS: val1val2...valn
186 * EAVALS_LENS: 4,4,...4
189 eadatahead = buf->lb_buf;
191 /* Fill out EADATA first */
192 rc = mo_xattr_list(env, next, buf);
194 GOTO(out_shrink, rc);
197 eadatatail = eadatahead + eadatasize;
199 v = req_capsule_server_get(info->mti_pill, &RMF_EAVALS);
200 sizes = req_capsule_server_get(info->mti_pill, &RMF_EAVALS_LENS);
202 /* Fill out EAVALS and EAVALS_LENS */
203 for (b = eadatahead; b < eadatatail; b += strlen(b) + 1, v += rc) {
205 buf->lb_len = reqbody->mbo_eadatasize - eavallen;
206 rc = mo_xattr_get(env, next, buf, b);
208 GOTO(out_shrink, rc);
209 rc = mdt_nodemap_map_acl(info, buf->lb_buf, rc, b,
210 NODEMAP_FS_TO_CLIENT);
212 GOTO(out_shrink, rc);
213 sizes[eavallens] = rc;
224 repbody->mbo_aclsize = eavallen;
225 repbody->mbo_max_mdsize = eavallens;
227 req_capsule_shrink(info->mti_pill, &RMF_EAVALS, eavallen, RCL_SERVER);
228 req_capsule_shrink(info->mti_pill, &RMF_EAVALS_LENS,
229 eavallens * sizeof(__u32), RCL_SERVER);
230 req_capsule_shrink(info->mti_pill, &RMF_EADATA, eadatasize, RCL_SERVER);
237 int mdt_getxattr(struct mdt_thread_info *info)
239 struct ptlrpc_request *req = mdt_info_req(info);
240 struct mdt_body *reqbody;
241 struct mdt_body *repbody = NULL;
242 struct md_object *next;
246 ktime_t kstart = ktime_get();
249 LASSERT(info->mti_object != NULL);
250 LASSERT(lu_object_assert_exists(&info->mti_object->mot_obj));
252 CDEBUG(D_INODE, "getxattr "DFID"\n", PFID(&info->mti_body->mbo_fid1));
254 rc = req_check_sepol(info->mti_pill);
256 RETURN(err_serious(rc));
258 reqbody = req_capsule_client_get(info->mti_pill, &RMF_MDT_BODY);
260 RETURN(err_serious(-EFAULT));
262 rc = mdt_init_ucred(info, reqbody);
264 RETURN(err_serious(rc));
266 next = mdt_object_child(info->mti_object);
267 easize = mdt_getxattr_pack_reply(info);
268 if (easize == -ENODATA)
269 GOTO(out, rc = easize);
271 GOTO(out, rc = err_serious(easize));
273 repbody = req_capsule_server_get(info->mti_pill, &RMF_MDT_BODY);
274 LASSERT(repbody != NULL);
276 /* No need further getxattr. */
277 if (easize == 0 || reqbody->mbo_eadatasize == 0)
278 GOTO(out, rc = easize);
280 buf = &info->mti_buf;
281 buf->lb_buf = req_capsule_server_get(info->mti_pill, &RMF_EADATA);
282 buf->lb_len = easize;
284 valid = info->mti_body->mbo_valid & (OBD_MD_FLXATTR | OBD_MD_FLXATTRLS);
286 if (valid == OBD_MD_FLXATTR) {
287 const char *xattr_name = req_capsule_client_get(info->mti_pill,
289 rc = mo_xattr_get(info->mti_env, next, buf, xattr_name);
293 rc = mdt_nodemap_map_acl(info, buf->lb_buf, rc, xattr_name,
294 NODEMAP_FS_TO_CLIENT);
295 } else if (valid == OBD_MD_FLXATTRLS) {
296 CDEBUG(D_INODE, "listxattr\n");
298 rc = mo_xattr_list(info->mti_env, next, buf);
300 CDEBUG(D_INFO, "listxattr failed: %d\n", rc);
301 } else if (valid == OBD_MD_FLXATTRALL) {
302 rc = mdt_getxattr_all(info, reqbody, repbody,
310 mdt_counter_incr(req, LPROC_MDT_GETXATTR,
311 ktime_us_delta(ktime_get(), kstart));
312 /* LU-11109: Set OBD_MD_FLXATTR on success so that
313 * newer clients can distinguish between nonexistent
314 * xattrs and zero length values.
316 repbody->mbo_valid |= OBD_MD_FLXATTR;
317 repbody->mbo_eadatasize = rc;
320 mdt_exit_ucred(info);
324 /* update dir layout after migration/restripe */
325 int mdt_dir_layout_update(struct mdt_thread_info *info)
327 const struct lu_env *env = info->mti_env;
328 struct mdt_device *mdt = info->mti_mdt;
329 struct lu_ucred *uc = mdt_ucred(info);
330 struct mdt_reint_record *rr = &info->mti_rr;
331 struct lmv_user_md *lmu = rr->rr_eadata;
332 __u32 lum_stripe_count = lmu->lum_stripe_count;
333 struct md_layout_change *mlc = &info->mti_mlc;
334 struct lmv_mds_md_v1 *lmv;
335 struct md_attr *ma = &info->mti_attr;
336 struct ldlm_enqueue_info *einfo = &info->mti_einfo;
337 struct mdt_object *pobj = NULL;
338 struct mdt_object *obj;
339 struct mdt_lock_handle *lhp = NULL;
340 struct mdt_lock_handle *lhc;
346 if (!mdt->mdt_enable_dir_migration)
349 /* we want rbac roles to have precedence over any other
350 * permission or capability checks
352 if (!uc->uc_rbac_dne_ops ||
353 (!cap_raised(uc->uc_cap, CAP_SYS_ADMIN) &&
354 uc->uc_gid != mdt->mdt_enable_remote_dir_gid &&
355 mdt->mdt_enable_remote_dir_gid != -1))
358 obj = mdt_object_find(env, mdt, rr->rr_fid1);
360 RETURN(PTR_ERR(obj));
362 /* get parent from PFID */
363 rc = mdt_attr_get_pfid(info, obj, &ma->ma_pfid);
367 pobj = mdt_object_find(env, mdt, &ma->ma_pfid);
369 GOTO(put_obj, rc = PTR_ERR(pobj));
372 * lock parent if dir will be shrunk to 1 stripe, because dir will be
373 * converted to normal directory, as will change dir FID and update
374 * namespace of parent.
376 lhp = &info->mti_lh[MDT_LH_PARENT];
377 if (le32_to_cpu(lmu->lum_stripe_count) < 2) {
378 rc = mdt_object_lock(info, pobj, lhp, MDS_INODELOCK_UPDATE,
385 lhc = &info->mti_lh[MDT_LH_CHILD];
386 rc = mdt_object_stripes_lock(info, pobj, obj, lhc, einfo,
387 MDS_INODELOCK_FULL, LCK_EX, true);
389 GOTO(unlock_pobj, rc);
391 rc = mdt_stripe_get(info, obj, ma, XATTR_NAME_LMV);
393 GOTO(unlock_obj, rc);
395 /* user may run 'lfs migrate' multiple times, so it's shrunk already */
396 if (!(ma->ma_valid & MA_LMV))
397 GOTO(unlock_obj, rc = -EALREADY);
399 lmv = &ma->ma_lmv->lmv_md_v1;
400 if (!lmv_is_sane(lmv))
401 GOTO(unlock_obj, rc = -EBADF);
404 if (!lmv_is_layout_changing(lmv))
405 GOTO(unlock_obj, rc = -EALREADY);
407 lum_stripe_count = lmu->lum_stripe_count;
408 if (!lum_stripe_count)
409 lum_stripe_count = cpu_to_le32(1);
411 if (lmv_is_migrating(lmv)) {
412 if (lmv->lmv_migrate_offset != lum_stripe_count) {
413 CERROR("%s: "DFID" migrate mdt count mismatch %u != %u\n",
414 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1),
415 lmv->lmv_migrate_offset, lmu->lum_stripe_count);
416 GOTO(unlock_obj, rc = -EINVAL);
419 /* lum_stripe_offset is not checked, because subdir is migrated
420 * to where its parent is located to avoid unnecessary remote
424 if (lum_stripe_count > 1 && lmu->lum_hash_type &&
425 lmu->lum_hash_type !=
426 (lmv->lmv_hash_type & cpu_to_le32(LMV_HASH_TYPE_MASK))) {
427 CERROR("%s: "DFID" migrate mdt hash mismatch %u != %u\n",
428 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1),
429 lmv->lmv_hash_type, lmu->lum_hash_type);
430 GOTO(unlock_obj, rc = -EINVAL);
434 } else if (lmv_is_splitting(lmv)) {
435 if (lmv->lmv_stripe_count != lum_stripe_count) {
436 CERROR("%s: "DFID" stripe count mismatch %u != %u\n",
437 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1),
438 lmv->lmv_stripe_count, lmu->lum_stripe_count);
439 GOTO(unlock_obj, rc = -EINVAL);
442 if (lmu->lum_stripe_offset != LMV_OFFSET_DEFAULT) {
443 CERROR("%s: "DFID" dir split offset %u != -1\n",
444 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1),
445 lmu->lum_stripe_offset);
446 GOTO(unlock_obj, rc = -EINVAL);
449 if (lmu->lum_hash_type &&
450 lmu->lum_hash_type !=
451 (lmv->lmv_hash_type & cpu_to_le32(LMV_HASH_TYPE_MASK))) {
452 CERROR("%s: "DFID" split hash mismatch %u != %u\n",
453 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1),
454 lmv->lmv_hash_type, lmu->lum_hash_type);
455 GOTO(unlock_obj, rc = -EINVAL);
457 } else if (lmv_is_merging(lmv)) {
458 if (lmv->lmv_merge_offset != lum_stripe_count) {
459 CERROR("%s: "DFID" stripe count mismatch %u != %u\n",
460 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1),
461 lmv->lmv_merge_offset, lmu->lum_stripe_count);
462 GOTO(unlock_obj, rc = -EINVAL);
465 if (lmu->lum_stripe_offset != LMV_OFFSET_DEFAULT) {
466 CERROR("%s: "DFID" dir merge offset %u != -1\n",
467 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1),
468 lmu->lum_stripe_offset);
469 GOTO(unlock_obj, rc = -EINVAL);
472 if (lmu->lum_hash_type &&
473 (lmu->lum_hash_type & cpu_to_le32(LMV_HASH_TYPE_MASK)) !=
474 (lmv->lmv_merge_hash & cpu_to_le32(LMV_HASH_TYPE_MASK))) {
475 CERROR("%s: "DFID" merge hash mismatch %u != %u\n",
476 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1),
477 lmv->lmv_merge_hash, lmu->lum_hash_type);
478 GOTO(unlock_obj, rc = -EINVAL);
481 if (lum_stripe_count < lmv->lmv_stripe_count)
486 mlc->mlc_opc = MD_LAYOUT_SHRINK;
487 mlc->mlc_buf.lb_buf = rr->rr_eadata;
488 mlc->mlc_buf.lb_len = rr->rr_eadatalen;
489 rc = mo_layout_change(env, mdt_object_child(obj), mlc);
491 struct lu_buf *buf = &info->mti_buf;
492 u32 version = le32_to_cpu(lmv->lmv_layout_version);
494 lmv->lmv_hash_type &= ~LMV_HASH_FLAG_LAYOUT_CHANGE;
495 lmv->lmv_layout_version = cpu_to_le32(++version);
496 lmv->lmv_migrate_offset = 0;
497 lmv->lmv_migrate_hash = 0;
499 buf->lb_len = sizeof(*lmv);
500 rc = mo_xattr_set(env, mdt_object_child(obj), buf,
501 XATTR_NAME_LMV, LU_XATTR_REPLACE);
503 GOTO(unlock_obj, rc);
506 mdt_object_stripes_unlock(info, obj, lhc, einfo, rc);
508 mdt_object_unlock(info, pobj, lhp, rc);
510 mdt_object_put(env, pobj);
512 mdt_object_put(env, obj);
517 int mdt_reint_setxattr(struct mdt_thread_info *info,
518 struct mdt_lock_handle *unused)
520 struct ptlrpc_request *req = mdt_info_req(info);
521 struct mdt_lock_handle *lh;
522 const struct lu_env *env = info->mti_env;
523 struct lu_buf *buf = &info->mti_buf;
524 struct mdt_reint_record *rr = &info->mti_rr;
525 struct md_attr *ma = &info->mti_attr;
526 struct lu_attr *attr = &info->mti_attr.ma_attr;
527 struct mdt_object *obj;
528 struct md_object *child;
529 __u64 valid = attr->la_valid;
530 const char *xattr_name = rr->rr_name.ln_name;
531 int xattr_len = rr->rr_eadatalen;
532 __u64 lockpart = MDS_INODELOCK_UPDATE;
533 ktime_t kstart = ktime_get();
537 CDEBUG(D_INODE, "setxattr for "DFID": %s %s\n", PFID(rr->rr_fid1),
538 valid & OBD_MD_FLXATTR ? "set" : "remove", xattr_name);
540 if (info->mti_dlm_req)
541 ldlm_request_cancel(req, info->mti_dlm_req, 0, LATF_SKIP);
543 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_SETXATTR))
544 RETURN(err_serious(-ENOMEM));
546 rc = mdt_init_ucred_reint(info);
550 if (strncmp(xattr_name, XATTR_USER_PREFIX,
551 sizeof(XATTR_USER_PREFIX) - 1) == 0) {
552 if (!(exp_connect_flags(req->rq_export) & OBD_CONNECT_XATTR))
553 GOTO(out, rc = -EOPNOTSUPP);
554 } else if (strncmp(xattr_name, XATTR_TRUSTED_PREFIX,
555 sizeof(XATTR_TRUSTED_PREFIX) - 1) == 0) {
557 /* setxattr(LMV) with lum is used to shrink dir layout */
558 if (strcmp(xattr_name, XATTR_NAME_LMV) == 0) {
559 __u32 *magic = rr->rr_eadata;
561 /* we don't let to remove LMV? */
565 if (le32_to_cpu(*magic) == LMV_USER_MAGIC ||
566 le32_to_cpu(*magic) == LMV_USER_MAGIC_SPECIFIC) {
567 rc = mdt_dir_layout_update(info);
572 if (!cap_raised(mdt_ucred(info)->uc_cap, CAP_SYS_ADMIN))
573 GOTO(out, rc = -EPERM);
575 if (strcmp(xattr_name, XATTR_NAME_LOV) == 0 ||
576 strcmp(xattr_name, XATTR_NAME_LMA) == 0 ||
577 strcmp(xattr_name, XATTR_NAME_LMV) == 0 ||
578 strcmp(xattr_name, XATTR_NAME_LINK) == 0 ||
579 strcmp(xattr_name, XATTR_NAME_FID) == 0 ||
580 strcmp(xattr_name, XATTR_NAME_VERSION) == 0 ||
581 strcmp(xattr_name, XATTR_NAME_SOM) == 0 ||
582 strcmp(xattr_name, XATTR_NAME_HSM) == 0 ||
583 strcmp(xattr_name, XATTR_NAME_LFSCK_NAMESPACE) == 0)
585 } else if ((valid & OBD_MD_FLXATTR) &&
586 (strcmp(xattr_name, XATTR_NAME_ACL_ACCESS) == 0 ||
587 strcmp(xattr_name, XATTR_NAME_ACL_DEFAULT) == 0)) {
588 rc = mdt_nodemap_map_acl(info, rr->rr_eadata, xattr_len,
589 xattr_name, NODEMAP_CLIENT_TO_FS);
592 /* ACLs were mapped out, return an error so the user knows */
594 GOTO(out, rc = -EPERM);
595 } else if ((strlen(xattr_name) > sizeof(XATTR_LUSTRE_LOV)) &&
596 strncmp(xattr_name, XATTR_LUSTRE_LOV,
597 strlen(XATTR_LUSTRE_LOV)) == 0) {
599 if (!allowed_lustre_lov(xattr_name)) {
600 CERROR("%s: invalid xattr name: %s\n",
601 mdt_obd_name(info->mti_mdt), xattr_name);
602 GOTO(out, rc = -EINVAL);
605 lockpart |= MDS_INODELOCK_LAYOUT;
608 if (!strcmp(xattr_name, XATTR_NAME_ACL_ACCESS))
609 lockpart |= MDS_INODELOCK_PERM;
610 /* We need to take the lock on behalf of old clients so that newer
611 * clients flush their xattr caches
614 lockpart |= MDS_INODELOCK_XATTR;
616 lh = &info->mti_lh[MDT_LH_PARENT];
617 /* ACLs were sent to clients under LCK_CR locks, so taking LCK_EX
620 obj = mdt_object_find_lock(info, rr->rr_fid1, lh, lockpart, LCK_EX);
622 GOTO(out, rc = PTR_ERR(obj));
624 tgt_vbr_obj_set(env, mdt_obj2dt(obj));
625 rc = mdt_version_get_check_save(info, obj, 0);
627 GOTO(out_unlock, rc);
629 if (unlikely(!(valid & OBD_MD_FLCTIME))) {
630 /* This isn't strictly an error, but all current clients
631 * should set OBD_MD_FLCTIME when setting attributes.
633 CWARN("%s: client miss to set OBD_MD_FLCTIME when setxattr %s: [object "DFID"] [valid %llu]\n",
634 mdt_obd_name(info->mti_mdt), xattr_name,
635 PFID(rr->rr_fid1), valid);
636 attr->la_ctime = ktime_get_real_seconds();
638 attr->la_valid = LA_CTIME;
639 child = mdt_object_child(obj);
640 if (valid & OBD_MD_FLXATTR) {
643 if (attr->la_flags & XATTR_REPLACE)
644 flags |= LU_XATTR_REPLACE;
646 if (attr->la_flags & XATTR_CREATE)
647 flags |= LU_XATTR_CREATE;
649 mdt_fail_write(env, info->mti_mdt->mdt_bottom,
650 OBD_FAIL_MDS_SETXATTR_WRITE);
652 buf->lb_buf = rr->rr_eadata;
653 buf->lb_len = xattr_len;
654 rc = mo_xattr_set(env, child, buf, xattr_name, flags);
655 /* update ctime after xattr changed */
657 ma->ma_attr_flags |= MDS_PERM_BYPASS;
658 mo_attr_set(env, child, ma);
660 } else if (valid & OBD_MD_FLXATTRRM) {
661 rc = mo_xattr_del(env, child, xattr_name);
662 /* update ctime after xattr changed */
664 ma->ma_attr_flags |= MDS_PERM_BYPASS;
665 mo_attr_set(env, child, ma);
668 CDEBUG(D_INFO, "valid bits: %#llx\n", valid);
673 mdt_counter_incr(req, LPROC_MDT_SETXATTR,
674 ktime_us_delta(ktime_get(), kstart));
678 mdt_object_unlock_put(info, obj, lh, rc);
680 mdt_exit_ucred(info);