feaa7bba02
This patch fixes the way we have been dealing with unlinked, but still open files. It removes all limits (other than memory for inodes, as per every other filesystem) on numbers of these which we can support on GFS2. It also means that (like other fs) its the responsibility of the last process to close the file to deallocate the storage, rather than the person who did the unlinking. Note that with GFS2, those two events might take place on different nodes. Also there are a number of other changes: o We use the Linux inode subsystem as it was intended to be used, wrt allocating GFS2 inodes o The Linux inode cache is now the point which we use for local enforcement of only holding one copy of the inode in core at once (previous to this we used the glock layer). o We no longer use the unlinked "special" file. We just ignore it completely. This makes unlinking more efficient. o We now use the 4th block allocation state. The previously unused state is used to track unlinked but still open inodes. o gfs2_inoded is no longer needed o Several fields are now no longer needed (and removed) from the in core struct gfs2_inode o Several fields are no longer needed (and removed) from the in core superblock There are a number of future possible optimisations and clean ups which have been made possible by this patch. Signed-off-by: Steven Whitehouse <swhiteho@redhat.com>
230 lines
5.3 KiB
C
230 lines
5.3 KiB
C
/*
|
|
* Copyright (C) Sistina Software, Inc. 1997-2003 All rights reserved.
|
|
* Copyright (C) 2004-2006 Red Hat, Inc. All rights reserved.
|
|
*
|
|
* This copyrighted material is made available to anyone wishing to use,
|
|
* modify, copy, or redistribute it subject to the terms and conditions
|
|
* of the GNU General Public License v.2.
|
|
*/
|
|
|
|
#include <linux/sched.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/spinlock.h>
|
|
#include <linux/completion.h>
|
|
#include <linux/buffer_head.h>
|
|
#include <linux/xattr.h>
|
|
#include <linux/gfs2_ondisk.h>
|
|
#include <asm/uaccess.h>
|
|
|
|
#include "gfs2.h"
|
|
#include "lm_interface.h"
|
|
#include "incore.h"
|
|
#include "acl.h"
|
|
#include "eaops.h"
|
|
#include "eattr.h"
|
|
#include "util.h"
|
|
|
|
/**
|
|
* gfs2_ea_name2type - get the type of the ea, and truncate type from the name
|
|
* @namep: ea name, possibly with type appended
|
|
*
|
|
* Returns: GFS2_EATYPE_XXX
|
|
*/
|
|
|
|
unsigned int gfs2_ea_name2type(const char *name, char **truncated_name)
|
|
{
|
|
unsigned int type;
|
|
|
|
if (strncmp(name, "system.", 7) == 0) {
|
|
type = GFS2_EATYPE_SYS;
|
|
if (truncated_name)
|
|
*truncated_name = strchr(name, '.') + 1;
|
|
} else if (strncmp(name, "user.", 5) == 0) {
|
|
type = GFS2_EATYPE_USR;
|
|
if (truncated_name)
|
|
*truncated_name = strchr(name, '.') + 1;
|
|
} else if (strncmp(name, "security.", 9) == 0) {
|
|
type = GFS2_EATYPE_SECURITY;
|
|
if (truncated_name)
|
|
*truncated_name = strchr(name, '.') + 1;
|
|
} else {
|
|
type = GFS2_EATYPE_UNUSED;
|
|
if (truncated_name)
|
|
*truncated_name = NULL;
|
|
}
|
|
|
|
return type;
|
|
}
|
|
|
|
static int user_eo_get(struct gfs2_inode *ip, struct gfs2_ea_request *er)
|
|
{
|
|
struct inode *inode = &ip->i_inode;
|
|
int error = permission(inode, MAY_READ, NULL);
|
|
if (error)
|
|
return error;
|
|
|
|
return gfs2_ea_get_i(ip, er);
|
|
}
|
|
|
|
static int user_eo_set(struct gfs2_inode *ip, struct gfs2_ea_request *er)
|
|
{
|
|
struct inode *inode = &ip->i_inode;
|
|
|
|
if (S_ISREG(inode->i_mode) ||
|
|
(S_ISDIR(inode->i_mode) && !(inode->i_mode & S_ISVTX))) {
|
|
int error = permission(inode, MAY_WRITE, NULL);
|
|
if (error)
|
|
return error;
|
|
} else
|
|
return -EPERM;
|
|
|
|
return gfs2_ea_set_i(ip, er);
|
|
}
|
|
|
|
static int user_eo_remove(struct gfs2_inode *ip, struct gfs2_ea_request *er)
|
|
{
|
|
struct inode *inode = &ip->i_inode;
|
|
|
|
if (S_ISREG(inode->i_mode) ||
|
|
(S_ISDIR(inode->i_mode) && !(inode->i_mode & S_ISVTX))) {
|
|
int error = permission(inode, MAY_WRITE, NULL);
|
|
if (error)
|
|
return error;
|
|
} else
|
|
return -EPERM;
|
|
|
|
return gfs2_ea_remove_i(ip, er);
|
|
}
|
|
|
|
static int system_eo_get(struct gfs2_inode *ip, struct gfs2_ea_request *er)
|
|
{
|
|
if (!GFS2_ACL_IS_ACCESS(er->er_name, er->er_name_len) &&
|
|
!GFS2_ACL_IS_DEFAULT(er->er_name, er->er_name_len) &&
|
|
!capable(CAP_SYS_ADMIN))
|
|
return -EPERM;
|
|
|
|
if (GFS2_SB(&ip->i_inode)->sd_args.ar_posix_acl == 0 &&
|
|
(GFS2_ACL_IS_ACCESS(er->er_name, er->er_name_len) ||
|
|
GFS2_ACL_IS_DEFAULT(er->er_name, er->er_name_len)))
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
return gfs2_ea_get_i(ip, er);
|
|
}
|
|
|
|
static int system_eo_set(struct gfs2_inode *ip, struct gfs2_ea_request *er)
|
|
{
|
|
int remove = 0;
|
|
int error;
|
|
|
|
if (GFS2_ACL_IS_ACCESS(er->er_name, er->er_name_len)) {
|
|
if (!(er->er_flags & GFS2_ERF_MODE)) {
|
|
er->er_mode = ip->i_di.di_mode;
|
|
er->er_flags |= GFS2_ERF_MODE;
|
|
}
|
|
error = gfs2_acl_validate_set(ip, 1, er,
|
|
&remove, &er->er_mode);
|
|
if (error)
|
|
return error;
|
|
error = gfs2_ea_set_i(ip, er);
|
|
if (error)
|
|
return error;
|
|
if (remove)
|
|
gfs2_ea_remove_i(ip, er);
|
|
return 0;
|
|
|
|
} else if (GFS2_ACL_IS_DEFAULT(er->er_name, er->er_name_len)) {
|
|
error = gfs2_acl_validate_set(ip, 0, er,
|
|
&remove, NULL);
|
|
if (error)
|
|
return error;
|
|
if (!remove)
|
|
error = gfs2_ea_set_i(ip, er);
|
|
else {
|
|
error = gfs2_ea_remove_i(ip, er);
|
|
if (error == -ENODATA)
|
|
error = 0;
|
|
}
|
|
return error;
|
|
}
|
|
|
|
return -EPERM;
|
|
}
|
|
|
|
static int system_eo_remove(struct gfs2_inode *ip, struct gfs2_ea_request *er)
|
|
{
|
|
if (GFS2_ACL_IS_ACCESS(er->er_name, er->er_name_len)) {
|
|
int error = gfs2_acl_validate_remove(ip, 1);
|
|
if (error)
|
|
return error;
|
|
|
|
} else if (GFS2_ACL_IS_DEFAULT(er->er_name, er->er_name_len)) {
|
|
int error = gfs2_acl_validate_remove(ip, 0);
|
|
if (error)
|
|
return error;
|
|
|
|
} else
|
|
return -EPERM;
|
|
|
|
return gfs2_ea_remove_i(ip, er);
|
|
}
|
|
|
|
static int security_eo_get(struct gfs2_inode *ip, struct gfs2_ea_request *er)
|
|
{
|
|
struct inode *inode = &ip->i_inode;
|
|
int error = permission(inode, MAY_READ, NULL);
|
|
if (error)
|
|
return error;
|
|
|
|
return gfs2_ea_get_i(ip, er);
|
|
}
|
|
|
|
static int security_eo_set(struct gfs2_inode *ip, struct gfs2_ea_request *er)
|
|
{
|
|
struct inode *inode = &ip->i_inode;
|
|
int error = permission(inode, MAY_WRITE, NULL);
|
|
if (error)
|
|
return error;
|
|
|
|
return gfs2_ea_set_i(ip, er);
|
|
}
|
|
|
|
static int security_eo_remove(struct gfs2_inode *ip, struct gfs2_ea_request *er)
|
|
{
|
|
struct inode *inode = &ip->i_inode;
|
|
int error = permission(inode, MAY_WRITE, NULL);
|
|
if (error)
|
|
return error;
|
|
|
|
return gfs2_ea_remove_i(ip, er);
|
|
}
|
|
|
|
static struct gfs2_eattr_operations gfs2_user_eaops = {
|
|
.eo_get = user_eo_get,
|
|
.eo_set = user_eo_set,
|
|
.eo_remove = user_eo_remove,
|
|
.eo_name = "user",
|
|
};
|
|
|
|
struct gfs2_eattr_operations gfs2_system_eaops = {
|
|
.eo_get = system_eo_get,
|
|
.eo_set = system_eo_set,
|
|
.eo_remove = system_eo_remove,
|
|
.eo_name = "system",
|
|
};
|
|
|
|
struct gfs2_eattr_operations gfs2_security_eaops = {
|
|
.eo_get = security_eo_get,
|
|
.eo_set = security_eo_set,
|
|
.eo_remove = security_eo_remove,
|
|
.eo_name = "security",
|
|
};
|
|
|
|
struct gfs2_eattr_operations *gfs2_ea_ops[] = {
|
|
NULL,
|
|
&gfs2_user_eaops,
|
|
&gfs2_system_eaops,
|
|
&gfs2_security_eaops,
|
|
};
|
|
|