VFS: normal filesystems (and lustre): d_inode() annotations
[linux-2.6-block.git] / fs / ext4 / xattr_security.c
CommitLineData
ac27a0ec 1/*
617ba13b 2 * linux/fs/ext4/xattr_security.c
ac27a0ec
DK
3 * Handler for storing security labels as extended attributes.
4 */
5
ac27a0ec
DK
6#include <linux/string.h>
7#include <linux/fs.h>
ac27a0ec 8#include <linux/security.h>
5a0e3ad6 9#include <linux/slab.h>
3dcf5451
CH
10#include "ext4_jbd2.h"
11#include "ext4.h"
ac27a0ec
DK
12#include "xattr.h"
13
14static size_t
431547b3
CH
15ext4_xattr_security_list(struct dentry *dentry, char *list, size_t list_size,
16 const char *name, size_t name_len, int type)
ac27a0ec
DK
17{
18 const size_t prefix_len = sizeof(XATTR_SECURITY_PREFIX)-1;
19 const size_t total_len = prefix_len + name_len + 1;
20
21
22 if (list && total_len <= list_size) {
23 memcpy(list, XATTR_SECURITY_PREFIX, prefix_len);
24 memcpy(list+prefix_len, name, name_len);
25 list[prefix_len + name_len] = '\0';
26 }
27 return total_len;
28}
29
30static int
431547b3
CH
31ext4_xattr_security_get(struct dentry *dentry, const char *name,
32 void *buffer, size_t size, int type)
ac27a0ec
DK
33{
34 if (strcmp(name, "") == 0)
35 return -EINVAL;
2b0143b5 36 return ext4_xattr_get(d_inode(dentry), EXT4_XATTR_INDEX_SECURITY,
431547b3 37 name, buffer, size);
ac27a0ec
DK
38}
39
40static int
431547b3
CH
41ext4_xattr_security_set(struct dentry *dentry, const char *name,
42 const void *value, size_t size, int flags, int type)
ac27a0ec
DK
43{
44 if (strcmp(name, "") == 0)
45 return -EINVAL;
2b0143b5 46 return ext4_xattr_set(d_inode(dentry), EXT4_XATTR_INDEX_SECURITY,
431547b3 47 name, value, size, flags);
ac27a0ec
DK
48}
49
176576db
DH
50static int
51ext4_initxattrs(struct inode *inode, const struct xattr *xattr_array,
52 void *fs_info)
ac27a0ec 53{
9d8f13ba
MZ
54 const struct xattr *xattr;
55 handle_t *handle = fs_info;
56 int err = 0;
ac27a0ec 57
9d8f13ba
MZ
58 for (xattr = xattr_array; xattr->name != NULL; xattr++) {
59 err = ext4_xattr_set_handle(handle, inode,
60 EXT4_XATTR_INDEX_SECURITY,
61 xattr->name, xattr->value,
62 xattr->value_len, 0);
63 if (err < 0)
64 break;
ac27a0ec 65 }
ac27a0ec
DK
66 return err;
67}
68
9d8f13ba
MZ
69int
70ext4_init_security(handle_t *handle, struct inode *inode, struct inode *dir,
71 const struct qstr *qstr)
72{
73 return security_inode_init_security(inode, dir, qstr,
74 &ext4_initxattrs, handle);
75}
76
11e27528 77const struct xattr_handler ext4_xattr_security_handler = {
ac27a0ec 78 .prefix = XATTR_SECURITY_PREFIX,
617ba13b
MC
79 .list = ext4_xattr_security_list,
80 .get = ext4_xattr_security_get,
81 .set = ext4_xattr_security_set,
ac27a0ec 82};