2 * Copyright (C) Sistina Software, Inc. 1997-2003 All rights reserved.
3 * Copyright (C) 2004-2006 Red Hat, Inc. All rights reserved.
5 * This copyrighted material is made available to anyone wishing to use,
6 * modify, copy, or redistribute it subject to the terms and conditions
7 * of the GNU General Public License version 2.
10 #include <linux/slab.h>
11 #include <linux/spinlock.h>
12 #include <linux/completion.h>
13 #include <linux/buffer_head.h>
14 #include <linux/capability.h>
15 #include <linux/xattr.h>
16 #include <linux/gfs2_ondisk.h>
17 #include <linux/lm_interface.h>
18 #include <asm/uaccess.h>
28 * gfs2_ea_name2type - get the type of the ea, and truncate type from the name
29 * @namep: ea name, possibly with type appended
31 * Returns: GFS2_EATYPE_XXX
34 unsigned int gfs2_ea_name2type(const char *name
, const char **truncated_name
)
38 if (strncmp(name
, "system.", 7) == 0) {
39 type
= GFS2_EATYPE_SYS
;
41 *truncated_name
= name
+ sizeof("system.") - 1;
42 } else if (strncmp(name
, "user.", 5) == 0) {
43 type
= GFS2_EATYPE_USR
;
45 *truncated_name
= name
+ sizeof("user.") - 1;
46 } else if (strncmp(name
, "security.", 9) == 0) {
47 type
= GFS2_EATYPE_SECURITY
;
49 *truncated_name
= name
+ sizeof("security.") - 1;
51 type
= GFS2_EATYPE_UNUSED
;
53 *truncated_name
= NULL
;
59 static int system_eo_get(struct gfs2_inode
*ip
, struct gfs2_ea_request
*er
)
61 if (!GFS2_ACL_IS_ACCESS(er
->er_name
, er
->er_name_len
) &&
62 !GFS2_ACL_IS_DEFAULT(er
->er_name
, er
->er_name_len
) &&
63 !capable(CAP_SYS_ADMIN
))
66 if (GFS2_SB(&ip
->i_inode
)->sd_args
.ar_posix_acl
== 0 &&
67 (GFS2_ACL_IS_ACCESS(er
->er_name
, er
->er_name_len
) ||
68 GFS2_ACL_IS_DEFAULT(er
->er_name
, er
->er_name_len
)))
71 return gfs2_ea_get_i(ip
, er
);
74 static int system_eo_set(struct gfs2_inode
*ip
, struct gfs2_ea_request
*er
)
79 if (GFS2_ACL_IS_ACCESS(er
->er_name
, er
->er_name_len
)) {
80 if (!(er
->er_flags
& GFS2_ERF_MODE
)) {
81 er
->er_mode
= ip
->i_inode
.i_mode
;
82 er
->er_flags
|= GFS2_ERF_MODE
;
84 error
= gfs2_acl_validate_set(ip
, 1, er
,
85 &remove
, &er
->er_mode
);
88 error
= gfs2_ea_set_i(ip
, er
);
92 gfs2_ea_remove_i(ip
, er
);
95 } else if (GFS2_ACL_IS_DEFAULT(er
->er_name
, er
->er_name_len
)) {
96 error
= gfs2_acl_validate_set(ip
, 0, er
,
101 error
= gfs2_ea_set_i(ip
, er
);
103 error
= gfs2_ea_remove_i(ip
, er
);
104 if (error
== -ENODATA
)
113 static int system_eo_remove(struct gfs2_inode
*ip
, struct gfs2_ea_request
*er
)
115 if (GFS2_ACL_IS_ACCESS(er
->er_name
, er
->er_name_len
)) {
116 int error
= gfs2_acl_validate_remove(ip
, 1);
120 } else if (GFS2_ACL_IS_DEFAULT(er
->er_name
, er
->er_name_len
)) {
121 int error
= gfs2_acl_validate_remove(ip
, 0);
128 return gfs2_ea_remove_i(ip
, er
);
131 static const struct gfs2_eattr_operations gfs2_user_eaops
= {
132 .eo_get
= gfs2_ea_get_i
,
133 .eo_set
= gfs2_ea_set_i
,
134 .eo_remove
= gfs2_ea_remove_i
,
138 const struct gfs2_eattr_operations gfs2_system_eaops
= {
139 .eo_get
= system_eo_get
,
140 .eo_set
= system_eo_set
,
141 .eo_remove
= system_eo_remove
,
145 static const struct gfs2_eattr_operations gfs2_security_eaops
= {
146 .eo_get
= gfs2_ea_get_i
,
147 .eo_set
= gfs2_ea_set_i
,
148 .eo_remove
= gfs2_ea_remove_i
,
149 .eo_name
= "security",
152 const struct gfs2_eattr_operations
*gfs2_ea_ops
[] = {
156 &gfs2_security_eaops
,