Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | #include <linux/reiserfs_fs.h> |
2 | #include <linux/errno.h> | |
3 | #include <linux/fs.h> | |
4 | #include <linux/pagemap.h> | |
5 | #include <linux/xattr.h> | |
6 | #include <linux/reiserfs_xattr.h> | |
57fe60df | 7 | #include <linux/security.h> |
1da177e4 LT |
8 | #include <asm/uaccess.h> |
9 | ||
1da177e4 | 10 | static int |
bd4c625c | 11 | security_get(struct inode *inode, const char *name, void *buffer, size_t size) |
1da177e4 | 12 | { |
bd4c625c LT |
13 | if (strlen(name) < sizeof(XATTR_SECURITY_PREFIX)) |
14 | return -EINVAL; | |
1da177e4 | 15 | |
6dfede69 | 16 | if (IS_PRIVATE(inode)) |
bd4c625c | 17 | return -EPERM; |
1da177e4 | 18 | |
bd4c625c | 19 | return reiserfs_xattr_get(inode, name, buffer, size); |
1da177e4 LT |
20 | } |
21 | ||
22 | static int | |
bd4c625c LT |
23 | security_set(struct inode *inode, const char *name, const void *buffer, |
24 | size_t size, int flags) | |
1da177e4 | 25 | { |
bd4c625c LT |
26 | if (strlen(name) < sizeof(XATTR_SECURITY_PREFIX)) |
27 | return -EINVAL; | |
1da177e4 | 28 | |
6dfede69 | 29 | if (IS_PRIVATE(inode)) |
bd4c625c | 30 | return -EPERM; |
1da177e4 | 31 | |
bd4c625c | 32 | return reiserfs_xattr_set(inode, name, buffer, size, flags); |
1da177e4 LT |
33 | } |
34 | ||
48b32a35 JM |
35 | static size_t security_list(struct inode *inode, char *list, size_t list_len, |
36 | const char *name, size_t namelen) | |
1da177e4 | 37 | { |
48b32a35 | 38 | const size_t len = namelen + 1; |
1da177e4 | 39 | |
6dfede69 | 40 | if (IS_PRIVATE(inode)) |
bd4c625c | 41 | return 0; |
1da177e4 | 42 | |
48b32a35 JM |
43 | if (list && len <= list_len) { |
44 | memcpy(list, name, namelen); | |
45 | list[namelen] = '\0'; | |
46 | } | |
1da177e4 | 47 | |
bd4c625c | 48 | return len; |
1da177e4 LT |
49 | } |
50 | ||
57fe60df JM |
51 | /* Initializes the security context for a new inode and returns the number |
52 | * of blocks needed for the transaction. If successful, reiserfs_security | |
53 | * must be released using reiserfs_security_free when the caller is done. */ | |
54 | int reiserfs_security_init(struct inode *dir, struct inode *inode, | |
55 | struct reiserfs_security_handle *sec) | |
56 | { | |
57 | int blocks = 0; | |
b82bb72b JM |
58 | int error; |
59 | ||
60 | sec->name = NULL; | |
61 | ||
62 | /* Don't add selinux attributes on xattrs - they'll never get used */ | |
63 | if (IS_PRIVATE(dir)) | |
64 | return 0; | |
65 | ||
66 | error = security_inode_init_security(inode, dir, &sec->name, | |
67 | &sec->value, &sec->length); | |
57fe60df JM |
68 | if (error) { |
69 | if (error == -EOPNOTSUPP) | |
70 | error = 0; | |
71 | ||
72 | sec->name = NULL; | |
73 | sec->value = NULL; | |
74 | sec->length = 0; | |
75 | return error; | |
76 | } | |
77 | ||
78 | if (sec->length) { | |
79 | blocks = reiserfs_xattr_jcreate_nblocks(inode) + | |
80 | reiserfs_xattr_nblocks(inode, sec->length); | |
81 | /* We don't want to count the directories twice if we have | |
82 | * a default ACL. */ | |
83 | REISERFS_I(inode)->i_flags |= i_has_xattr_dir; | |
84 | } | |
85 | return blocks; | |
86 | } | |
87 | ||
88 | int reiserfs_security_write(struct reiserfs_transaction_handle *th, | |
89 | struct inode *inode, | |
90 | struct reiserfs_security_handle *sec) | |
91 | { | |
92 | int error; | |
93 | if (strlen(sec->name) < sizeof(XATTR_SECURITY_PREFIX)) | |
94 | return -EINVAL; | |
95 | ||
96 | error = reiserfs_xattr_set_handle(th, inode, sec->name, sec->value, | |
97 | sec->length, XATTR_CREATE); | |
98 | if (error == -ENODATA || error == -EOPNOTSUPP) | |
99 | error = 0; | |
100 | ||
101 | return error; | |
102 | } | |
103 | ||
104 | void reiserfs_security_free(struct reiserfs_security_handle *sec) | |
105 | { | |
106 | kfree(sec->name); | |
107 | kfree(sec->value); | |
108 | sec->name = NULL; | |
109 | sec->value = NULL; | |
110 | } | |
111 | ||
48b32a35 | 112 | struct xattr_handler reiserfs_xattr_security_handler = { |
1da177e4 LT |
113 | .prefix = XATTR_SECURITY_PREFIX, |
114 | .get = security_get, | |
115 | .set = security_set, | |
1da177e4 LT |
116 | .list = security_list, |
117 | }; |