Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v4.7 64 lines 1.6 kB view raw
1/* 2 * linux/fs/ext4/xattr_security.c 3 * Handler for storing security labels as extended attributes. 4 */ 5 6#include <linux/string.h> 7#include <linux/fs.h> 8#include <linux/security.h> 9#include <linux/slab.h> 10#include "ext4_jbd2.h" 11#include "ext4.h" 12#include "xattr.h" 13 14static int 15ext4_xattr_security_get(const struct xattr_handler *handler, 16 struct dentry *unused, struct inode *inode, 17 const char *name, void *buffer, size_t size) 18{ 19 return ext4_xattr_get(inode, EXT4_XATTR_INDEX_SECURITY, 20 name, buffer, size); 21} 22 23static int 24ext4_xattr_security_set(const struct xattr_handler *handler, 25 struct dentry *unused, struct inode *inode, 26 const char *name, const void *value, 27 size_t size, int flags) 28{ 29 return ext4_xattr_set(inode, EXT4_XATTR_INDEX_SECURITY, 30 name, value, size, flags); 31} 32 33static int 34ext4_initxattrs(struct inode *inode, const struct xattr *xattr_array, 35 void *fs_info) 36{ 37 const struct xattr *xattr; 38 handle_t *handle = fs_info; 39 int err = 0; 40 41 for (xattr = xattr_array; xattr->name != NULL; xattr++) { 42 err = ext4_xattr_set_handle(handle, inode, 43 EXT4_XATTR_INDEX_SECURITY, 44 xattr->name, xattr->value, 45 xattr->value_len, 0); 46 if (err < 0) 47 break; 48 } 49 return err; 50} 51 52int 53ext4_init_security(handle_t *handle, struct inode *inode, struct inode *dir, 54 const struct qstr *qstr) 55{ 56 return security_inode_init_security(inode, dir, qstr, 57 &ext4_initxattrs, handle); 58} 59 60const struct xattr_handler ext4_xattr_security_handler = { 61 .prefix = XATTR_SECURITY_PREFIX, 62 .get = ext4_xattr_security_get, 63 .set = ext4_xattr_security_set, 64};