xref: /openbmc/linux/fs/reiserfs/xattr_security.c (revision d031f4e8)
1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
2f466c6fdSAl Viro #include "reiserfs.h"
31da177e4SLinus Torvalds #include <linux/errno.h>
41da177e4SLinus Torvalds #include <linux/fs.h>
51da177e4SLinus Torvalds #include <linux/pagemap.h>
61da177e4SLinus Torvalds #include <linux/xattr.h>
75a0e3ad6STejun Heo #include <linux/slab.h>
8c45ac888SAl Viro #include "xattr.h"
957fe60dfSJeff Mahoney #include <linux/security.h>
1017093991SFabian Frederick #include <linux/uaccess.h>
111da177e4SLinus Torvalds 
121da177e4SLinus Torvalds static int
security_get(const struct xattr_handler * handler,struct dentry * unused,struct inode * inode,const char * name,void * buffer,size_t size)13b296821aSAl Viro security_get(const struct xattr_handler *handler, struct dentry *unused,
14b296821aSAl Viro 	     struct inode *inode, const char *name, void *buffer, size_t size)
151da177e4SLinus Torvalds {
16b296821aSAl Viro 	if (IS_PRIVATE(inode))
171da177e4SLinus Torvalds 		return -EPERM;
181da177e4SLinus Torvalds 
19b296821aSAl Viro 	return reiserfs_xattr_get(inode, xattr_full_name(handler, name),
2079a628d1SAl Viro 				  buffer, size);
211da177e4SLinus Torvalds }
221da177e4SLinus Torvalds 
231da177e4SLinus Torvalds static int
security_set(const struct xattr_handler * handler,struct mnt_idmap * idmap,struct dentry * unused,struct inode * inode,const char * name,const void * buffer,size_t size,int flags)24e65ce2a5SChristian Brauner security_set(const struct xattr_handler *handler,
2539f60c1cSChristian Brauner 	     struct mnt_idmap *idmap, struct dentry *unused,
2659301226SAl Viro 	     struct inode *inode, const char *name, const void *buffer,
2759301226SAl Viro 	     size_t size, int flags)
281da177e4SLinus Torvalds {
2959301226SAl Viro 	if (IS_PRIVATE(inode))
301da177e4SLinus Torvalds 		return -EPERM;
311da177e4SLinus Torvalds 
3259301226SAl Viro 	return reiserfs_xattr_set(inode,
3379a628d1SAl Viro 				  xattr_full_name(handler, name),
3479a628d1SAl Viro 				  buffer, size, flags);
351da177e4SLinus Torvalds }
361da177e4SLinus Torvalds 
security_list(struct dentry * dentry)37764a5c6bSAndreas Gruenbacher static bool security_list(struct dentry *dentry)
381da177e4SLinus Torvalds {
39764a5c6bSAndreas Gruenbacher 	return !IS_PRIVATE(d_inode(dentry));
401da177e4SLinus Torvalds }
411da177e4SLinus Torvalds 
4252ca4b64SRoberto Sassu static int
reiserfs_initxattrs(struct inode * inode,const struct xattr * xattr_array,void * fs_info)4352ca4b64SRoberto Sassu reiserfs_initxattrs(struct inode *inode, const struct xattr *xattr_array,
4452ca4b64SRoberto Sassu 		    void *fs_info)
4552ca4b64SRoberto Sassu {
4652ca4b64SRoberto Sassu 	struct reiserfs_security_handle *sec = fs_info;
4752ca4b64SRoberto Sassu 
4852ca4b64SRoberto Sassu 	sec->value = kmemdup(xattr_array->value, xattr_array->value_len,
4952ca4b64SRoberto Sassu 			     GFP_KERNEL);
5052ca4b64SRoberto Sassu 	if (!sec->value)
5152ca4b64SRoberto Sassu 		return -ENOMEM;
5252ca4b64SRoberto Sassu 
5352ca4b64SRoberto Sassu 	sec->name = xattr_array->name;
5452ca4b64SRoberto Sassu 	sec->length = xattr_array->value_len;
5552ca4b64SRoberto Sassu 	return 0;
5652ca4b64SRoberto Sassu }
5752ca4b64SRoberto Sassu 
5857fe60dfSJeff Mahoney /* Initializes the security context for a new inode and returns the number
5957fe60dfSJeff Mahoney  * of blocks needed for the transaction. If successful, reiserfs_security
6057fe60dfSJeff Mahoney  * must be released using reiserfs_security_free when the caller is done. */
reiserfs_security_init(struct inode * dir,struct inode * inode,const struct qstr * qstr,struct reiserfs_security_handle * sec)6157fe60dfSJeff Mahoney int reiserfs_security_init(struct inode *dir, struct inode *inode,
622a7dba39SEric Paris 			   const struct qstr *qstr,
6357fe60dfSJeff Mahoney 			   struct reiserfs_security_handle *sec)
6457fe60dfSJeff Mahoney {
6557fe60dfSJeff Mahoney 	int blocks = 0;
66b82bb72bSJeff Mahoney 	int error;
67b82bb72bSJeff Mahoney 
68b82bb72bSJeff Mahoney 	sec->name = NULL;
69572302afSRoberto Sassu 	sec->value = NULL;
70*d031f4e8STetsuo Handa 	sec->length = 0;
71b82bb72bSJeff Mahoney 
72b82bb72bSJeff Mahoney 	/* Don't add selinux attributes on xattrs - they'll never get used */
73b82bb72bSJeff Mahoney 	if (IS_PRIVATE(dir))
74b82bb72bSJeff Mahoney 		return 0;
75b82bb72bSJeff Mahoney 
7652ca4b64SRoberto Sassu 	error = security_inode_init_security(inode, dir, qstr,
7752ca4b64SRoberto Sassu 					     &reiserfs_initxattrs, sec);
7857fe60dfSJeff Mahoney 	if (error) {
7957fe60dfSJeff Mahoney 		sec->name = NULL;
8057fe60dfSJeff Mahoney 		sec->value = NULL;
8157fe60dfSJeff Mahoney 		sec->length = 0;
8257fe60dfSJeff Mahoney 		return error;
8357fe60dfSJeff Mahoney 	}
8457fe60dfSJeff Mahoney 
856cb4aff0SJeff Mahoney 	if (sec->length && reiserfs_xattrs_initialized(inode->i_sb)) {
8657fe60dfSJeff Mahoney 		blocks = reiserfs_xattr_jcreate_nblocks(inode) +
8757fe60dfSJeff Mahoney 			 reiserfs_xattr_nblocks(inode, sec->length);
8857fe60dfSJeff Mahoney 		/* We don't want to count the directories twice if we have
8957fe60dfSJeff Mahoney 		 * a default ACL. */
9057fe60dfSJeff Mahoney 		REISERFS_I(inode)->i_flags |= i_has_xattr_dir;
9157fe60dfSJeff Mahoney 	}
9257fe60dfSJeff Mahoney 	return blocks;
9357fe60dfSJeff Mahoney }
9457fe60dfSJeff Mahoney 
reiserfs_security_write(struct reiserfs_transaction_handle * th,struct inode * inode,struct reiserfs_security_handle * sec)9557fe60dfSJeff Mahoney int reiserfs_security_write(struct reiserfs_transaction_handle *th,
9657fe60dfSJeff Mahoney 			    struct inode *inode,
9757fe60dfSJeff Mahoney 			    struct reiserfs_security_handle *sec)
9857fe60dfSJeff Mahoney {
99d82dcd9eSRoberto Sassu 	char xattr_name[XATTR_NAME_MAX + 1] = XATTR_SECURITY_PREFIX;
10057fe60dfSJeff Mahoney 	int error;
101d82dcd9eSRoberto Sassu 
102d82dcd9eSRoberto Sassu 	if (XATTR_SECURITY_PREFIX_LEN + strlen(sec->name) > XATTR_NAME_MAX)
10357fe60dfSJeff Mahoney 		return -EINVAL;
10457fe60dfSJeff Mahoney 
105d82dcd9eSRoberto Sassu 	strlcat(xattr_name, sec->name, sizeof(xattr_name));
106d82dcd9eSRoberto Sassu 
107d82dcd9eSRoberto Sassu 	error = reiserfs_xattr_set_handle(th, inode, xattr_name, sec->value,
10857fe60dfSJeff Mahoney 					  sec->length, XATTR_CREATE);
10957fe60dfSJeff Mahoney 	if (error == -ENODATA || error == -EOPNOTSUPP)
11057fe60dfSJeff Mahoney 		error = 0;
11157fe60dfSJeff Mahoney 
11257fe60dfSJeff Mahoney 	return error;
11357fe60dfSJeff Mahoney }
11457fe60dfSJeff Mahoney 
reiserfs_security_free(struct reiserfs_security_handle * sec)11557fe60dfSJeff Mahoney void reiserfs_security_free(struct reiserfs_security_handle *sec)
11657fe60dfSJeff Mahoney {
11757fe60dfSJeff Mahoney 	kfree(sec->value);
11857fe60dfSJeff Mahoney 	sec->name = NULL;
11957fe60dfSJeff Mahoney 	sec->value = NULL;
12057fe60dfSJeff Mahoney }
12157fe60dfSJeff Mahoney 
12294d09a98SStephen Hemminger const struct xattr_handler reiserfs_xattr_security_handler = {
1231da177e4SLinus Torvalds 	.prefix = XATTR_SECURITY_PREFIX,
1241da177e4SLinus Torvalds 	.get = security_get,
1251da177e4SLinus Torvalds 	.set = security_set,
1261da177e4SLinus Torvalds 	.list = security_list,
1271da177e4SLinus Torvalds };
128