blob: c1c7a16cbf217cc1784bbab1089353e527fb15fd [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -08002/*
3 * linux/fs/hfsplus/xattr_trusted.c
4 *
5 * Vyacheslav Dubeyko <slava@dubeyko.com>
6 *
7 * Handler for storing security labels as extended attributes.
8 */
9
10#include <linux/security.h>
Hin-Tak Leungbf29e882014-06-06 14:36:22 -070011#include <linux/nls.h>
12
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080013#include "hfsplus_fs.h"
14#include "xattr.h"
15
Andreas Gruenbacherd9a82a02015-10-04 19:18:51 +020016static int hfsplus_security_getxattr(const struct xattr_handler *handler,
Al Virob2968212016-04-10 20:48:24 -040017 struct dentry *unused, struct inode *inode,
18 const char *name, void *buffer, size_t size)
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080019{
Al Virob2968212016-04-10 20:48:24 -040020 return hfsplus_getxattr(inode, name, buffer, size,
Fabian Fredericka3cef4c2015-04-16 12:46:58 -070021 XATTR_SECURITY_PREFIX,
22 XATTR_SECURITY_PREFIX_LEN);
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080023}
24
Andreas Gruenbacherd9a82a02015-10-04 19:18:51 +020025static int hfsplus_security_setxattr(const struct xattr_handler *handler,
Christian Braunere65ce2a2021-01-21 14:19:27 +010026 struct user_namespace *mnt_userns,
Al Viro59301222016-05-27 10:19:30 -040027 struct dentry *unused, struct inode *inode,
28 const char *name, const void *buffer,
29 size_t size, int flags)
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080030{
Al Viro59301222016-05-27 10:19:30 -040031 return hfsplus_setxattr(inode, name, buffer, size, flags,
Fabian Frederick5e614732015-04-16 12:47:01 -070032 XATTR_SECURITY_PREFIX,
33 XATTR_SECURITY_PREFIX_LEN);
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080034}
35
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080036static int hfsplus_initxattrs(struct inode *inode,
37 const struct xattr *xattr_array,
38 void *fs_info)
39{
40 const struct xattr *xattr;
Hin-Tak Leungbf29e882014-06-06 14:36:22 -070041 char *xattr_name;
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080042 int err = 0;
43
Hin-Tak Leungbf29e882014-06-06 14:36:22 -070044 xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1,
45 GFP_KERNEL);
46 if (!xattr_name)
47 return -ENOMEM;
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080048 for (xattr = xattr_array; xattr->name != NULL; xattr++) {
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080049
Hin-Tak Leungbf29e882014-06-06 14:36:22 -070050 if (!strcmp(xattr->name, ""))
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080051 continue;
52
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080053 strcpy(xattr_name, XATTR_SECURITY_PREFIX);
54 strcpy(xattr_name +
55 XATTR_SECURITY_PREFIX_LEN, xattr->name);
56 memset(xattr_name +
Hin-Tak Leungbf29e882014-06-06 14:36:22 -070057 XATTR_SECURITY_PREFIX_LEN + strlen(xattr->name), 0, 1);
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080058
59 err = __hfsplus_setxattr(inode, xattr_name,
60 xattr->value, xattr->value_len, 0);
61 if (err)
62 break;
63 }
Hin-Tak Leungbf29e882014-06-06 14:36:22 -070064 kfree(xattr_name);
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080065 return err;
66}
67
68int hfsplus_init_security(struct inode *inode, struct inode *dir,
69 const struct qstr *qstr)
70{
71 return security_inode_init_security(inode, dir, qstr,
72 &hfsplus_initxattrs, NULL);
73}
74
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080075const struct xattr_handler hfsplus_xattr_security_handler = {
76 .prefix = XATTR_SECURITY_PREFIX,
Vyacheslav Dubeyko127e5f52013-02-27 17:03:03 -080077 .get = hfsplus_security_getxattr,
78 .set = hfsplus_security_setxattr,
79};