Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v4.8-rc8 57 lines 1.4 kB view raw
1/* 2 * linux/fs/ext2/xattr_security.c 3 * Handler for storing security labels as extended attributes. 4 */ 5 6#include "ext2.h" 7#include <linux/security.h> 8#include "xattr.h" 9 10static int 11ext2_xattr_security_get(const struct xattr_handler *handler, 12 struct dentry *unused, struct inode *inode, 13 const char *name, void *buffer, size_t size) 14{ 15 return ext2_xattr_get(inode, EXT2_XATTR_INDEX_SECURITY, name, 16 buffer, size); 17} 18 19static int 20ext2_xattr_security_set(const struct xattr_handler *handler, 21 struct dentry *unused, struct inode *inode, 22 const char *name, const void *value, 23 size_t size, int flags) 24{ 25 return ext2_xattr_set(inode, EXT2_XATTR_INDEX_SECURITY, name, 26 value, size, flags); 27} 28 29static int ext2_initxattrs(struct inode *inode, const struct xattr *xattr_array, 30 void *fs_info) 31{ 32 const struct xattr *xattr; 33 int err = 0; 34 35 for (xattr = xattr_array; xattr->name != NULL; xattr++) { 36 err = ext2_xattr_set(inode, EXT2_XATTR_INDEX_SECURITY, 37 xattr->name, xattr->value, 38 xattr->value_len, 0); 39 if (err < 0) 40 break; 41 } 42 return err; 43} 44 45int 46ext2_init_security(struct inode *inode, struct inode *dir, 47 const struct qstr *qstr) 48{ 49 return security_inode_init_security(inode, dir, qstr, 50 &ext2_initxattrs, NULL); 51} 52 53const struct xattr_handler ext2_xattr_security_handler = { 54 .prefix = XATTR_SECURITY_PREFIX, 55 .get = ext2_xattr_security_get, 56 .set = ext2_xattr_security_set, 57};