ca5777793e
This patch implements a new tree structure for ZFS, and uses it to store range trees more efficiently. The new structure is approximately a B-tree, though there are some small differences from the usual characterizations. The tree has core nodes and leaf nodes; each contain data elements, which the elements in the core nodes acting as separators between its children. The difference between core and leaf nodes is that the core nodes have an array of children, while leaf nodes don't. Every node in the tree may be only partially full; in most cases, they are all at least 50% full (in terms of element count) except for the root node, which can be less full. Underfull nodes will steal from their neighbors or merge to remain full enough, while overfull nodes will split in two. The data elements are contained in tree-controlled buffers; they are copied into these on insertion, and overwritten on deletion. This means that the elements are not independently allocated, which reduces overhead, but also means they can't be shared between trees (and also that pointers to them are only valid until a side-effectful tree operation occurs). The overhead varies based on how dense the tree is, but is usually on the order of about 50% of the element size; the per-node overheads are very small, and so don't make a significant difference. The trees can accept arbitrary records; they accept a size and a comparator to allow them to be used for a variety of purposes. The new trees replace the AVL trees used in the range trees today. Currently, the range_seg_t structure contains three 8 byte integers of payload and two 24 byte avl_tree_node_ts to handle its storage in both an offset-sorted tree and a size-sorted tree (total size: 64 bytes). In the new model, the range seg structures are usually two 4 byte integers, but a separate one needs to exist for the size-sorted and offset-sorted tree. Between the raw size, the 50% overhead, and the double storage, the new btrees are expected to use 8*1.5*2 = 24 bytes per record, or 33.3% as much memory as the AVL trees (this is for the purposes of storing metaslab range trees; for other purposes, like scrubs, they use ~50% as much memory). We reduced the size of the payload in the range segments by teaching range trees about starting offsets and shifts; since metaslabs have a fixed starting offset, and they all operate in terms of disk sectors, we can store the ranges using 4-byte integers as long as the size of the metaslab divided by the sector size is less than 2^32. For 512-byte sectors, this is a 2^41 (or 2TB) metaslab, which with the default settings corresponds to a 256PB disk. 4k sector disks can handle metaslabs up to 2^46 bytes, or 2^63 byte disks. Since we do not anticipate disks of this size in the near future, there should be almost no cases where metaslabs need 64-byte integers to store their ranges. We do still have the capability to store 64-byte integer ranges to account for cases where we are storing per-vdev (or per-dnode) trees, which could reasonably go above the limits discussed. We also do not store fill information in the compact version of the node, since it is only used for sorted scrub. We also optimized the metaslab loading process in various other ways to offset some inefficiencies in the btree model. While individual operations (find, insert, remove_from) are faster for the btree than they are for the avl tree, remove usually requires a find operation, while in the AVL tree model the element itself suffices. Some clever changes actually caused an overall speedup in metaslab loading; we use approximately 40% less cpu to load metaslabs in our tests on Illumos. Another memory and performance optimization was achieved by changing what is stored in the size-sorted trees. When a disk is heavily fragmented, the df algorithm used by default in ZFS will almost always find a number of small regions in its initial cursor-based search; it will usually only fall back to the size-sorted tree to find larger regions. If we increase the size of the cursor-based search slightly, and don't store segments that are smaller than a tunable size floor in the size-sorted tree, we can further cut memory usage down to below 20% of what the AVL trees store. This also results in further reductions in CPU time spent loading metaslabs. The 16KiB size floor was chosen because it results in substantial memory usage reduction while not usually resulting in situations where we can't find an appropriate chunk with the cursor and are forced to use an oversized chunk from the size-sorted tree. In addition, even if we do have to use an oversized chunk from the size-sorted tree, the chunk would be too small to use for ZIL allocations, so it isn't as big of a loss as it might otherwise be. And often, more small allocations will follow the initial one, and the cursor search will now find the remainder of the chunk we didn't use all of and use it for subsequent allocations. Practical testing has shown little or no change in fragmentation as a result of this change. If the size-sorted tree becomes empty while the offset sorted one still has entries, it will load all the entries from the offset sorted tree and disregard the size floor until it is unloaded again. This operation occurs rarely with the default setting, only on incredibly thoroughly fragmented pools. There are some other small changes to zdb to teach it to handle btrees, but nothing major. Reviewed-by: George Wilson <gwilson@delphix.com> Reviewed-by: Matt Ahrens <matt@delphix.com> Reviewed by: Sebastien Roy seb@delphix.com Reviewed-by: Igor Kozhukhov <igor@dilos.org> Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Signed-off-by: Paul Dagnelie <pcd@delphix.com> Closes #9181
775 lines
20 KiB
C
775 lines
20 KiB
C
/*
|
|
* CDDL HEADER START
|
|
*
|
|
* The contents of this file are subject to the terms of the
|
|
* Common Development and Distribution License (the "License").
|
|
* You may not use this file except in compliance with the License.
|
|
*
|
|
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
|
|
* or http://www.opensolaris.org/os/licensing.
|
|
* See the License for the specific language governing permissions
|
|
* and limitations under the License.
|
|
*
|
|
* When distributing Covered Code, include this CDDL HEADER in each
|
|
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
|
|
* If applicable, add the following below this CDDL HEADER, with the
|
|
* fields enclosed by brackets "[]" replaced with your own identifying
|
|
* information: Portions Copyright [yyyy] [name of copyright owner]
|
|
*
|
|
* CDDL HEADER END
|
|
*/
|
|
/*
|
|
* Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
|
|
* Copyright (c) 2011, 2015 by Delphix. All rights reserved.
|
|
*/
|
|
|
|
/*
|
|
* DSL permissions are stored in a two level zap attribute
|
|
* mechanism. The first level identifies the "class" of
|
|
* entry. The class is identified by the first 2 letters of
|
|
* the attribute. The second letter "l" or "d" identifies whether
|
|
* it is a local or descendent permission. The first letter
|
|
* identifies the type of entry.
|
|
*
|
|
* ul$<id> identifies permissions granted locally for this userid.
|
|
* ud$<id> identifies permissions granted on descendent datasets for
|
|
* this userid.
|
|
* Ul$<id> identifies permission sets granted locally for this userid.
|
|
* Ud$<id> identifies permission sets granted on descendent datasets for
|
|
* this userid.
|
|
* gl$<id> identifies permissions granted locally for this groupid.
|
|
* gd$<id> identifies permissions granted on descendent datasets for
|
|
* this groupid.
|
|
* Gl$<id> identifies permission sets granted locally for this groupid.
|
|
* Gd$<id> identifies permission sets granted on descendent datasets for
|
|
* this groupid.
|
|
* el$ identifies permissions granted locally for everyone.
|
|
* ed$ identifies permissions granted on descendent datasets
|
|
* for everyone.
|
|
* El$ identifies permission sets granted locally for everyone.
|
|
* Ed$ identifies permission sets granted to descendent datasets for
|
|
* everyone.
|
|
* c-$ identifies permission to create at dataset creation time.
|
|
* C-$ identifies permission sets to grant locally at dataset creation
|
|
* time.
|
|
* s-$@<name> permissions defined in specified set @<name>
|
|
* S-$@<name> Sets defined in named set @<name>
|
|
*
|
|
* Each of the above entities points to another zap attribute that contains one
|
|
* attribute for each allowed permission, such as create, destroy,...
|
|
* All of the "upper" case class types will specify permission set names
|
|
* rather than permissions.
|
|
*
|
|
* Basically it looks something like this:
|
|
* ul$12 -> ZAP OBJ -> permissions...
|
|
*
|
|
* The ZAP OBJ is referred to as the jump object.
|
|
*/
|
|
|
|
#include <sys/dmu.h>
|
|
#include <sys/dmu_objset.h>
|
|
#include <sys/dmu_tx.h>
|
|
#include <sys/dsl_dataset.h>
|
|
#include <sys/dsl_dir.h>
|
|
#include <sys/dsl_prop.h>
|
|
#include <sys/dsl_synctask.h>
|
|
#include <sys/dsl_deleg.h>
|
|
#include <sys/spa.h>
|
|
#include <sys/zap.h>
|
|
#include <sys/fs/zfs.h>
|
|
#include <sys/cred.h>
|
|
#include <sys/sunddi.h>
|
|
|
|
#include "zfs_deleg.h"
|
|
|
|
/*
|
|
* Validate that user is allowed to delegate specified permissions.
|
|
*
|
|
* In order to delegate "create" you must have "create"
|
|
* and "allow".
|
|
*/
|
|
int
|
|
dsl_deleg_can_allow(char *ddname, nvlist_t *nvp, cred_t *cr)
|
|
{
|
|
nvpair_t *whopair = NULL;
|
|
int error;
|
|
|
|
if ((error = dsl_deleg_access(ddname, ZFS_DELEG_PERM_ALLOW, cr)) != 0)
|
|
return (error);
|
|
|
|
while ((whopair = nvlist_next_nvpair(nvp, whopair))) {
|
|
nvlist_t *perms;
|
|
nvpair_t *permpair = NULL;
|
|
|
|
VERIFY(nvpair_value_nvlist(whopair, &perms) == 0);
|
|
|
|
while ((permpair = nvlist_next_nvpair(perms, permpair))) {
|
|
const char *perm = nvpair_name(permpair);
|
|
|
|
if (strcmp(perm, ZFS_DELEG_PERM_ALLOW) == 0)
|
|
return (SET_ERROR(EPERM));
|
|
|
|
if ((error = dsl_deleg_access(ddname, perm, cr)) != 0)
|
|
return (error);
|
|
}
|
|
}
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Validate that user is allowed to unallow specified permissions. They
|
|
* must have the 'allow' permission, and even then can only unallow
|
|
* perms for their uid.
|
|
*/
|
|
int
|
|
dsl_deleg_can_unallow(char *ddname, nvlist_t *nvp, cred_t *cr)
|
|
{
|
|
nvpair_t *whopair = NULL;
|
|
int error;
|
|
char idstr[32];
|
|
|
|
if ((error = dsl_deleg_access(ddname, ZFS_DELEG_PERM_ALLOW, cr)) != 0)
|
|
return (error);
|
|
|
|
(void) snprintf(idstr, sizeof (idstr), "%lld",
|
|
(longlong_t)crgetuid(cr));
|
|
|
|
while ((whopair = nvlist_next_nvpair(nvp, whopair))) {
|
|
zfs_deleg_who_type_t type = nvpair_name(whopair)[0];
|
|
|
|
if (type != ZFS_DELEG_USER &&
|
|
type != ZFS_DELEG_USER_SETS)
|
|
return (SET_ERROR(EPERM));
|
|
|
|
if (strcmp(idstr, &nvpair_name(whopair)[3]) != 0)
|
|
return (SET_ERROR(EPERM));
|
|
}
|
|
return (0);
|
|
}
|
|
|
|
typedef struct dsl_deleg_arg {
|
|
const char *dda_name;
|
|
nvlist_t *dda_nvlist;
|
|
} dsl_deleg_arg_t;
|
|
|
|
static void
|
|
dsl_deleg_set_sync(void *arg, dmu_tx_t *tx)
|
|
{
|
|
dsl_deleg_arg_t *dda = arg;
|
|
dsl_dir_t *dd;
|
|
dsl_pool_t *dp = dmu_tx_pool(tx);
|
|
objset_t *mos = dp->dp_meta_objset;
|
|
nvpair_t *whopair = NULL;
|
|
uint64_t zapobj;
|
|
|
|
VERIFY0(dsl_dir_hold(dp, dda->dda_name, FTAG, &dd, NULL));
|
|
|
|
zapobj = dsl_dir_phys(dd)->dd_deleg_zapobj;
|
|
if (zapobj == 0) {
|
|
dmu_buf_will_dirty(dd->dd_dbuf, tx);
|
|
zapobj = dsl_dir_phys(dd)->dd_deleg_zapobj = zap_create(mos,
|
|
DMU_OT_DSL_PERMS, DMU_OT_NONE, 0, tx);
|
|
}
|
|
|
|
while ((whopair = nvlist_next_nvpair(dda->dda_nvlist, whopair))) {
|
|
const char *whokey = nvpair_name(whopair);
|
|
nvlist_t *perms;
|
|
nvpair_t *permpair = NULL;
|
|
uint64_t jumpobj;
|
|
|
|
perms = fnvpair_value_nvlist(whopair);
|
|
|
|
if (zap_lookup(mos, zapobj, whokey, 8, 1, &jumpobj) != 0) {
|
|
jumpobj = zap_create_link(mos, DMU_OT_DSL_PERMS,
|
|
zapobj, whokey, tx);
|
|
}
|
|
|
|
while ((permpair = nvlist_next_nvpair(perms, permpair))) {
|
|
const char *perm = nvpair_name(permpair);
|
|
uint64_t n = 0;
|
|
|
|
VERIFY(zap_update(mos, jumpobj,
|
|
perm, 8, 1, &n, tx) == 0);
|
|
spa_history_log_internal_dd(dd, "permission update", tx,
|
|
"%s %s", whokey, perm);
|
|
}
|
|
}
|
|
dsl_dir_rele(dd, FTAG);
|
|
}
|
|
|
|
static void
|
|
dsl_deleg_unset_sync(void *arg, dmu_tx_t *tx)
|
|
{
|
|
dsl_deleg_arg_t *dda = arg;
|
|
dsl_dir_t *dd;
|
|
dsl_pool_t *dp = dmu_tx_pool(tx);
|
|
objset_t *mos = dp->dp_meta_objset;
|
|
nvpair_t *whopair = NULL;
|
|
uint64_t zapobj;
|
|
|
|
VERIFY0(dsl_dir_hold(dp, dda->dda_name, FTAG, &dd, NULL));
|
|
zapobj = dsl_dir_phys(dd)->dd_deleg_zapobj;
|
|
if (zapobj == 0) {
|
|
dsl_dir_rele(dd, FTAG);
|
|
return;
|
|
}
|
|
|
|
while ((whopair = nvlist_next_nvpair(dda->dda_nvlist, whopair))) {
|
|
const char *whokey = nvpair_name(whopair);
|
|
nvlist_t *perms;
|
|
nvpair_t *permpair = NULL;
|
|
uint64_t jumpobj;
|
|
|
|
if (nvpair_value_nvlist(whopair, &perms) != 0) {
|
|
if (zap_lookup(mos, zapobj, whokey, 8,
|
|
1, &jumpobj) == 0) {
|
|
(void) zap_remove(mos, zapobj, whokey, tx);
|
|
VERIFY(0 == zap_destroy(mos, jumpobj, tx));
|
|
}
|
|
spa_history_log_internal_dd(dd, "permission who remove",
|
|
tx, "%s", whokey);
|
|
continue;
|
|
}
|
|
|
|
if (zap_lookup(mos, zapobj, whokey, 8, 1, &jumpobj) != 0)
|
|
continue;
|
|
|
|
while ((permpair = nvlist_next_nvpair(perms, permpair))) {
|
|
const char *perm = nvpair_name(permpair);
|
|
uint64_t n = 0;
|
|
|
|
(void) zap_remove(mos, jumpobj, perm, tx);
|
|
if (zap_count(mos, jumpobj, &n) == 0 && n == 0) {
|
|
(void) zap_remove(mos, zapobj,
|
|
whokey, tx);
|
|
VERIFY(0 == zap_destroy(mos,
|
|
jumpobj, tx));
|
|
}
|
|
spa_history_log_internal_dd(dd, "permission remove", tx,
|
|
"%s %s", whokey, perm);
|
|
}
|
|
}
|
|
dsl_dir_rele(dd, FTAG);
|
|
}
|
|
|
|
static int
|
|
dsl_deleg_check(void *arg, dmu_tx_t *tx)
|
|
{
|
|
dsl_deleg_arg_t *dda = arg;
|
|
dsl_dir_t *dd;
|
|
int error;
|
|
|
|
if (spa_version(dmu_tx_pool(tx)->dp_spa) <
|
|
SPA_VERSION_DELEGATED_PERMS) {
|
|
return (SET_ERROR(ENOTSUP));
|
|
}
|
|
|
|
error = dsl_dir_hold(dmu_tx_pool(tx), dda->dda_name, FTAG, &dd, NULL);
|
|
if (error == 0)
|
|
dsl_dir_rele(dd, FTAG);
|
|
return (error);
|
|
}
|
|
|
|
int
|
|
dsl_deleg_set(const char *ddname, nvlist_t *nvp, boolean_t unset)
|
|
{
|
|
dsl_deleg_arg_t dda;
|
|
|
|
/* nvp must already have been verified to be valid */
|
|
|
|
dda.dda_name = ddname;
|
|
dda.dda_nvlist = nvp;
|
|
|
|
return (dsl_sync_task(ddname, dsl_deleg_check,
|
|
unset ? dsl_deleg_unset_sync : dsl_deleg_set_sync,
|
|
&dda, fnvlist_num_pairs(nvp), ZFS_SPACE_CHECK_RESERVED));
|
|
}
|
|
|
|
/*
|
|
* Find all 'allow' permissions from a given point and then continue
|
|
* traversing up to the root.
|
|
*
|
|
* This function constructs an nvlist of nvlists.
|
|
* each setpoint is an nvlist composed of an nvlist of an nvlist
|
|
* of the individual * users/groups/everyone/create
|
|
* permissions.
|
|
*
|
|
* The nvlist will look like this.
|
|
*
|
|
* { source fsname -> { whokeys { permissions,...}, ...}}
|
|
*
|
|
* The fsname nvpairs will be arranged in a bottom up order. For example,
|
|
* if we have the following structure a/b/c then the nvpairs for the fsnames
|
|
* will be ordered a/b/c, a/b, a.
|
|
*/
|
|
int
|
|
dsl_deleg_get(const char *ddname, nvlist_t **nvp)
|
|
{
|
|
dsl_dir_t *dd, *startdd;
|
|
dsl_pool_t *dp;
|
|
int error;
|
|
objset_t *mos;
|
|
zap_cursor_t *basezc, *zc;
|
|
zap_attribute_t *baseza, *za;
|
|
char *source;
|
|
|
|
error = dsl_pool_hold(ddname, FTAG, &dp);
|
|
if (error != 0)
|
|
return (error);
|
|
|
|
error = dsl_dir_hold(dp, ddname, FTAG, &startdd, NULL);
|
|
if (error != 0) {
|
|
dsl_pool_rele(dp, FTAG);
|
|
return (error);
|
|
}
|
|
|
|
dp = startdd->dd_pool;
|
|
mos = dp->dp_meta_objset;
|
|
|
|
zc = kmem_alloc(sizeof (zap_cursor_t), KM_SLEEP);
|
|
za = kmem_alloc(sizeof (zap_attribute_t), KM_SLEEP);
|
|
basezc = kmem_alloc(sizeof (zap_cursor_t), KM_SLEEP);
|
|
baseza = kmem_alloc(sizeof (zap_attribute_t), KM_SLEEP);
|
|
source = kmem_alloc(ZFS_MAX_DATASET_NAME_LEN, KM_SLEEP);
|
|
VERIFY(nvlist_alloc(nvp, NV_UNIQUE_NAME, KM_SLEEP) == 0);
|
|
|
|
for (dd = startdd; dd != NULL; dd = dd->dd_parent) {
|
|
nvlist_t *sp_nvp;
|
|
uint64_t n;
|
|
|
|
if (dsl_dir_phys(dd)->dd_deleg_zapobj == 0 ||
|
|
zap_count(mos,
|
|
dsl_dir_phys(dd)->dd_deleg_zapobj, &n) != 0 || n == 0)
|
|
continue;
|
|
|
|
sp_nvp = fnvlist_alloc();
|
|
for (zap_cursor_init(basezc, mos,
|
|
dsl_dir_phys(dd)->dd_deleg_zapobj);
|
|
zap_cursor_retrieve(basezc, baseza) == 0;
|
|
zap_cursor_advance(basezc)) {
|
|
nvlist_t *perms_nvp;
|
|
|
|
ASSERT(baseza->za_integer_length == 8);
|
|
ASSERT(baseza->za_num_integers == 1);
|
|
|
|
perms_nvp = fnvlist_alloc();
|
|
for (zap_cursor_init(zc, mos, baseza->za_first_integer);
|
|
zap_cursor_retrieve(zc, za) == 0;
|
|
zap_cursor_advance(zc)) {
|
|
fnvlist_add_boolean(perms_nvp, za->za_name);
|
|
}
|
|
zap_cursor_fini(zc);
|
|
fnvlist_add_nvlist(sp_nvp, baseza->za_name, perms_nvp);
|
|
fnvlist_free(perms_nvp);
|
|
}
|
|
|
|
zap_cursor_fini(basezc);
|
|
|
|
dsl_dir_name(dd, source);
|
|
fnvlist_add_nvlist(*nvp, source, sp_nvp);
|
|
nvlist_free(sp_nvp);
|
|
}
|
|
|
|
kmem_free(source, ZFS_MAX_DATASET_NAME_LEN);
|
|
kmem_free(baseza, sizeof (zap_attribute_t));
|
|
kmem_free(basezc, sizeof (zap_cursor_t));
|
|
kmem_free(za, sizeof (zap_attribute_t));
|
|
kmem_free(zc, sizeof (zap_cursor_t));
|
|
|
|
dsl_dir_rele(startdd, FTAG);
|
|
dsl_pool_rele(dp, FTAG);
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Routines for dsl_deleg_access() -- access checking.
|
|
*/
|
|
typedef struct perm_set {
|
|
avl_node_t p_node;
|
|
boolean_t p_matched;
|
|
char p_setname[ZFS_MAX_DELEG_NAME];
|
|
} perm_set_t;
|
|
|
|
static int
|
|
perm_set_compare(const void *arg1, const void *arg2)
|
|
{
|
|
const perm_set_t *node1 = (const perm_set_t *)arg1;
|
|
const perm_set_t *node2 = (const perm_set_t *)arg2;
|
|
int val;
|
|
|
|
val = strcmp(node1->p_setname, node2->p_setname);
|
|
|
|
return (TREE_ISIGN(val));
|
|
}
|
|
|
|
/*
|
|
* Determine whether a specified permission exists.
|
|
*
|
|
* First the base attribute has to be retrieved. i.e. ul$12
|
|
* Once the base object has been retrieved the actual permission
|
|
* is lookup up in the zap object the base object points to.
|
|
*
|
|
* Return 0 if permission exists, ENOENT if there is no whokey, EPERM if
|
|
* there is no perm in that jumpobj.
|
|
*/
|
|
static int
|
|
dsl_check_access(objset_t *mos, uint64_t zapobj,
|
|
char type, char checkflag, void *valp, const char *perm)
|
|
{
|
|
int error;
|
|
uint64_t jumpobj, zero;
|
|
char whokey[ZFS_MAX_DELEG_NAME];
|
|
|
|
zfs_deleg_whokey(whokey, type, checkflag, valp);
|
|
error = zap_lookup(mos, zapobj, whokey, 8, 1, &jumpobj);
|
|
if (error == 0) {
|
|
error = zap_lookup(mos, jumpobj, perm, 8, 1, &zero);
|
|
if (error == ENOENT)
|
|
error = SET_ERROR(EPERM);
|
|
}
|
|
return (error);
|
|
}
|
|
|
|
/*
|
|
* check a specified user/group for a requested permission
|
|
*/
|
|
static int
|
|
dsl_check_user_access(objset_t *mos, uint64_t zapobj, const char *perm,
|
|
int checkflag, cred_t *cr)
|
|
{
|
|
const gid_t *gids;
|
|
int ngids;
|
|
int i;
|
|
uint64_t id;
|
|
|
|
/* check for user */
|
|
id = crgetuid(cr);
|
|
if (dsl_check_access(mos, zapobj,
|
|
ZFS_DELEG_USER, checkflag, &id, perm) == 0)
|
|
return (0);
|
|
|
|
/* check for users primary group */
|
|
id = crgetgid(cr);
|
|
if (dsl_check_access(mos, zapobj,
|
|
ZFS_DELEG_GROUP, checkflag, &id, perm) == 0)
|
|
return (0);
|
|
|
|
/* check for everyone entry */
|
|
id = -1;
|
|
if (dsl_check_access(mos, zapobj,
|
|
ZFS_DELEG_EVERYONE, checkflag, &id, perm) == 0)
|
|
return (0);
|
|
|
|
/* check each supplemental group user is a member of */
|
|
ngids = crgetngroups(cr);
|
|
gids = crgetgroups(cr);
|
|
for (i = 0; i != ngids; i++) {
|
|
id = gids[i];
|
|
if (dsl_check_access(mos, zapobj,
|
|
ZFS_DELEG_GROUP, checkflag, &id, perm) == 0)
|
|
return (0);
|
|
}
|
|
|
|
return (SET_ERROR(EPERM));
|
|
}
|
|
|
|
/*
|
|
* Iterate over the sets specified in the specified zapobj
|
|
* and load them into the permsets avl tree.
|
|
*/
|
|
static int
|
|
dsl_load_sets(objset_t *mos, uint64_t zapobj,
|
|
char type, char checkflag, void *valp, avl_tree_t *avl)
|
|
{
|
|
zap_cursor_t zc;
|
|
zap_attribute_t za;
|
|
perm_set_t *permnode;
|
|
avl_index_t idx;
|
|
uint64_t jumpobj;
|
|
int error;
|
|
char whokey[ZFS_MAX_DELEG_NAME];
|
|
|
|
zfs_deleg_whokey(whokey, type, checkflag, valp);
|
|
|
|
error = zap_lookup(mos, zapobj, whokey, 8, 1, &jumpobj);
|
|
if (error != 0)
|
|
return (error);
|
|
|
|
for (zap_cursor_init(&zc, mos, jumpobj);
|
|
zap_cursor_retrieve(&zc, &za) == 0;
|
|
zap_cursor_advance(&zc)) {
|
|
permnode = kmem_alloc(sizeof (perm_set_t), KM_SLEEP);
|
|
(void) strlcpy(permnode->p_setname, za.za_name,
|
|
sizeof (permnode->p_setname));
|
|
permnode->p_matched = B_FALSE;
|
|
|
|
if (avl_find(avl, permnode, &idx) == NULL) {
|
|
avl_insert(avl, permnode, idx);
|
|
} else {
|
|
kmem_free(permnode, sizeof (perm_set_t));
|
|
}
|
|
}
|
|
zap_cursor_fini(&zc);
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Load all permissions user based on cred belongs to.
|
|
*/
|
|
static void
|
|
dsl_load_user_sets(objset_t *mos, uint64_t zapobj, avl_tree_t *avl,
|
|
char checkflag, cred_t *cr)
|
|
{
|
|
const gid_t *gids;
|
|
int ngids, i;
|
|
uint64_t id;
|
|
|
|
id = crgetuid(cr);
|
|
(void) dsl_load_sets(mos, zapobj,
|
|
ZFS_DELEG_USER_SETS, checkflag, &id, avl);
|
|
|
|
id = crgetgid(cr);
|
|
(void) dsl_load_sets(mos, zapobj,
|
|
ZFS_DELEG_GROUP_SETS, checkflag, &id, avl);
|
|
|
|
(void) dsl_load_sets(mos, zapobj,
|
|
ZFS_DELEG_EVERYONE_SETS, checkflag, NULL, avl);
|
|
|
|
ngids = crgetngroups(cr);
|
|
gids = crgetgroups(cr);
|
|
for (i = 0; i != ngids; i++) {
|
|
id = gids[i];
|
|
(void) dsl_load_sets(mos, zapobj,
|
|
ZFS_DELEG_GROUP_SETS, checkflag, &id, avl);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Check if user has requested permission.
|
|
*/
|
|
int
|
|
dsl_deleg_access_impl(dsl_dataset_t *ds, const char *perm, cred_t *cr)
|
|
{
|
|
dsl_dir_t *dd;
|
|
dsl_pool_t *dp;
|
|
void *cookie;
|
|
int error;
|
|
char checkflag;
|
|
objset_t *mos;
|
|
avl_tree_t permsets;
|
|
perm_set_t *setnode;
|
|
|
|
dp = ds->ds_dir->dd_pool;
|
|
mos = dp->dp_meta_objset;
|
|
|
|
if (dsl_delegation_on(mos) == B_FALSE)
|
|
return (SET_ERROR(ECANCELED));
|
|
|
|
if (spa_version(dmu_objset_spa(dp->dp_meta_objset)) <
|
|
SPA_VERSION_DELEGATED_PERMS)
|
|
return (SET_ERROR(EPERM));
|
|
|
|
if (ds->ds_is_snapshot) {
|
|
/*
|
|
* Snapshots are treated as descendents only,
|
|
* local permissions do not apply.
|
|
*/
|
|
checkflag = ZFS_DELEG_DESCENDENT;
|
|
} else {
|
|
checkflag = ZFS_DELEG_LOCAL;
|
|
}
|
|
|
|
avl_create(&permsets, perm_set_compare, sizeof (perm_set_t),
|
|
offsetof(perm_set_t, p_node));
|
|
|
|
ASSERT(dsl_pool_config_held(dp));
|
|
for (dd = ds->ds_dir; dd != NULL; dd = dd->dd_parent,
|
|
checkflag = ZFS_DELEG_DESCENDENT) {
|
|
uint64_t zapobj;
|
|
boolean_t expanded;
|
|
|
|
/*
|
|
* If not in global zone then make sure
|
|
* the zoned property is set
|
|
*/
|
|
if (!INGLOBALZONE(curproc)) {
|
|
uint64_t zoned;
|
|
|
|
if (dsl_prop_get_dd(dd,
|
|
zfs_prop_to_name(ZFS_PROP_ZONED),
|
|
8, 1, &zoned, NULL, B_FALSE) != 0)
|
|
break;
|
|
if (!zoned)
|
|
break;
|
|
}
|
|
zapobj = dsl_dir_phys(dd)->dd_deleg_zapobj;
|
|
|
|
if (zapobj == 0)
|
|
continue;
|
|
|
|
dsl_load_user_sets(mos, zapobj, &permsets, checkflag, cr);
|
|
again:
|
|
expanded = B_FALSE;
|
|
for (setnode = avl_first(&permsets); setnode;
|
|
setnode = AVL_NEXT(&permsets, setnode)) {
|
|
if (setnode->p_matched == B_TRUE)
|
|
continue;
|
|
|
|
/* See if this set directly grants this permission */
|
|
error = dsl_check_access(mos, zapobj,
|
|
ZFS_DELEG_NAMED_SET, 0, setnode->p_setname, perm);
|
|
if (error == 0)
|
|
goto success;
|
|
if (error == EPERM)
|
|
setnode->p_matched = B_TRUE;
|
|
|
|
/* See if this set includes other sets */
|
|
error = dsl_load_sets(mos, zapobj,
|
|
ZFS_DELEG_NAMED_SET_SETS, 0,
|
|
setnode->p_setname, &permsets);
|
|
if (error == 0)
|
|
setnode->p_matched = expanded = B_TRUE;
|
|
}
|
|
/*
|
|
* If we expanded any sets, that will define more sets,
|
|
* which we need to check.
|
|
*/
|
|
if (expanded)
|
|
goto again;
|
|
|
|
error = dsl_check_user_access(mos, zapobj, perm, checkflag, cr);
|
|
if (error == 0)
|
|
goto success;
|
|
}
|
|
error = SET_ERROR(EPERM);
|
|
success:
|
|
|
|
cookie = NULL;
|
|
while ((setnode = avl_destroy_nodes(&permsets, &cookie)) != NULL)
|
|
kmem_free(setnode, sizeof (perm_set_t));
|
|
|
|
return (error);
|
|
}
|
|
|
|
int
|
|
dsl_deleg_access(const char *dsname, const char *perm, cred_t *cr)
|
|
{
|
|
dsl_pool_t *dp;
|
|
dsl_dataset_t *ds;
|
|
int error;
|
|
|
|
error = dsl_pool_hold(dsname, FTAG, &dp);
|
|
if (error != 0)
|
|
return (error);
|
|
error = dsl_dataset_hold(dp, dsname, FTAG, &ds);
|
|
if (error == 0) {
|
|
error = dsl_deleg_access_impl(ds, perm, cr);
|
|
dsl_dataset_rele(ds, FTAG);
|
|
}
|
|
dsl_pool_rele(dp, FTAG);
|
|
|
|
return (error);
|
|
}
|
|
|
|
/*
|
|
* Other routines.
|
|
*/
|
|
|
|
static void
|
|
copy_create_perms(dsl_dir_t *dd, uint64_t pzapobj,
|
|
boolean_t dosets, uint64_t uid, dmu_tx_t *tx)
|
|
{
|
|
objset_t *mos = dd->dd_pool->dp_meta_objset;
|
|
uint64_t jumpobj, pjumpobj;
|
|
uint64_t zapobj = dsl_dir_phys(dd)->dd_deleg_zapobj;
|
|
zap_cursor_t zc;
|
|
zap_attribute_t za;
|
|
char whokey[ZFS_MAX_DELEG_NAME];
|
|
|
|
zfs_deleg_whokey(whokey,
|
|
dosets ? ZFS_DELEG_CREATE_SETS : ZFS_DELEG_CREATE,
|
|
ZFS_DELEG_LOCAL, NULL);
|
|
if (zap_lookup(mos, pzapobj, whokey, 8, 1, &pjumpobj) != 0)
|
|
return;
|
|
|
|
if (zapobj == 0) {
|
|
dmu_buf_will_dirty(dd->dd_dbuf, tx);
|
|
zapobj = dsl_dir_phys(dd)->dd_deleg_zapobj = zap_create(mos,
|
|
DMU_OT_DSL_PERMS, DMU_OT_NONE, 0, tx);
|
|
}
|
|
|
|
zfs_deleg_whokey(whokey,
|
|
dosets ? ZFS_DELEG_USER_SETS : ZFS_DELEG_USER,
|
|
ZFS_DELEG_LOCAL, &uid);
|
|
if (zap_lookup(mos, zapobj, whokey, 8, 1, &jumpobj) == ENOENT) {
|
|
jumpobj = zap_create(mos, DMU_OT_DSL_PERMS, DMU_OT_NONE, 0, tx);
|
|
VERIFY(zap_add(mos, zapobj, whokey, 8, 1, &jumpobj, tx) == 0);
|
|
}
|
|
|
|
for (zap_cursor_init(&zc, mos, pjumpobj);
|
|
zap_cursor_retrieve(&zc, &za) == 0;
|
|
zap_cursor_advance(&zc)) {
|
|
uint64_t zero = 0;
|
|
ASSERT(za.za_integer_length == 8 && za.za_num_integers == 1);
|
|
|
|
VERIFY(zap_update(mos, jumpobj, za.za_name,
|
|
8, 1, &zero, tx) == 0);
|
|
}
|
|
zap_cursor_fini(&zc);
|
|
}
|
|
|
|
/*
|
|
* set all create time permission on new dataset.
|
|
*/
|
|
void
|
|
dsl_deleg_set_create_perms(dsl_dir_t *sdd, dmu_tx_t *tx, cred_t *cr)
|
|
{
|
|
dsl_dir_t *dd;
|
|
uint64_t uid = crgetuid(cr);
|
|
|
|
if (spa_version(dmu_objset_spa(sdd->dd_pool->dp_meta_objset)) <
|
|
SPA_VERSION_DELEGATED_PERMS)
|
|
return;
|
|
|
|
for (dd = sdd->dd_parent; dd != NULL; dd = dd->dd_parent) {
|
|
uint64_t pzapobj = dsl_dir_phys(dd)->dd_deleg_zapobj;
|
|
|
|
if (pzapobj == 0)
|
|
continue;
|
|
|
|
copy_create_perms(sdd, pzapobj, B_FALSE, uid, tx);
|
|
copy_create_perms(sdd, pzapobj, B_TRUE, uid, tx);
|
|
}
|
|
}
|
|
|
|
int
|
|
dsl_deleg_destroy(objset_t *mos, uint64_t zapobj, dmu_tx_t *tx)
|
|
{
|
|
zap_cursor_t zc;
|
|
zap_attribute_t za;
|
|
|
|
if (zapobj == 0)
|
|
return (0);
|
|
|
|
for (zap_cursor_init(&zc, mos, zapobj);
|
|
zap_cursor_retrieve(&zc, &za) == 0;
|
|
zap_cursor_advance(&zc)) {
|
|
ASSERT(za.za_integer_length == 8 && za.za_num_integers == 1);
|
|
VERIFY(0 == zap_destroy(mos, za.za_first_integer, tx));
|
|
}
|
|
zap_cursor_fini(&zc);
|
|
VERIFY(0 == zap_destroy(mos, zapobj, tx));
|
|
return (0);
|
|
}
|
|
|
|
boolean_t
|
|
dsl_delegation_on(objset_t *os)
|
|
{
|
|
return (!!spa_delegation(os->os_spa));
|
|
}
|
|
|
|
#if defined(_KERNEL)
|
|
EXPORT_SYMBOL(dsl_deleg_get);
|
|
EXPORT_SYMBOL(dsl_deleg_set);
|
|
#endif
|