From 5a451c5f8ebbe84081bb2f61968cf69303472a0c Mon Sep 17 00:00:00 2001 From: Mikhail Pershin Date: Thu, 13 May 2010 17:41:52 +0400 Subject: [PATCH] b=15587 don't handle security.capability xattr i=johann,adilger --- lustre/llite/xattr.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/lustre/llite/xattr.c b/lustre/llite/xattr.c index 1f261bf..8b0ac86 100644 --- a/lustre/llite/xattr.c +++ b/lustre/llite/xattr.c @@ -142,6 +142,11 @@ int ll_setxattr_common(struct inode *inode, const char *name, (xattr_type == XATTR_LUSTRE_T && strcmp(name, "lustre.lov") == 0)) RETURN(0); + /* b15587: ignore security.capability xattr for now */ + if ((xattr_type == XATTR_SECURITY_T && + strcmp(name, "security.capability") == 0)) + RETURN(0); + ll_inode2fid(&fid, inode); rc = mdc_setxattr(sbi->ll_mdc_exp, &fid, valid, name, value, size, 0, flags, &req); @@ -252,6 +257,11 @@ int ll_getxattr_common(struct inode *inode, const char *name, if (rc) RETURN(rc); + /* b15587: ignore security.capability xattr for now */ + if ((xattr_type == XATTR_SECURITY_T && + strcmp(name, "security.capability") == 0)) + RETURN(-ENODATA); + /* posix acl is under protection of LOOKUP lock. when calling to this, * we just have path resolution to the target inode, so we have great * chance that cached ACL is uptodate. -- 1.8.3.1