The patch titled
ext2: Enable atomic inode security labeling
has been added to the -mm tree. Its filename is
ext2-enable-atomic-inode-security-labeling.patch
Patches currently in -mm which might be from [EMAIL PROTECTED] are
security-enable-atomic-inode-security-labeling.patch
security-enable-atomic-inode-security-labeling-use-kstrdup.patch
ext2-enable-atomic-inode-security-labeling.patch
ext3-enable-atomic-inode-security-labeling.patch
From: Stephen Smalley <[EMAIL PROTECTED]>
This patch modifies ext2 to call the inode_init_security LSM hook to obtain
the security attribute for a newly created inode and to set the resulting
attribute on the new inode. This parallels the existing processing for
setting ACLs on newly created inodes.
Signed-off-by: Andrew Morton <[EMAIL PROTECTED]>
---
fs/ext2/ialloc.c | 5 +++++
fs/ext2/xattr.h | 1 +
fs/ext2/xattr_security.c | 22 ++++++++++++++++++++++
3 files changed, 28 insertions(+)
diff -puN fs/ext2/ialloc.c~ext2-enable-atomic-inode-security-labeling
fs/ext2/ialloc.c
--- 25/fs/ext2/ialloc.c~ext2-enable-atomic-inode-security-labeling Fri Jul
8 16:35:13 2005
+++ 25-akpm/fs/ext2/ialloc.c Fri Jul 8 16:35:13 2005
@@ -614,6 +614,11 @@ got:
DQUOT_FREE_INODE(inode);
goto fail2;
}
+ err = ext2_init_security(inode,dir);
+ if (err) {
+ DQUOT_FREE_INODE(inode);
+ goto fail2;
+ }
mark_inode_dirty(inode);
ext2_debug("allocating inode %lu\n", inode->i_ino);
ext2_preread_inode(inode);
diff -puN fs/ext2/xattr.h~ext2-enable-atomic-inode-security-labeling
fs/ext2/xattr.h
--- 25/fs/ext2/xattr.h~ext2-enable-atomic-inode-security-labeling Fri Jul
8 16:35:13 2005
+++ 25-akpm/fs/ext2/xattr.h Fri Jul 8 16:35:13 2005
@@ -64,6 +64,7 @@ extern struct xattr_handler ext2_xattr_s
extern ssize_t ext2_listxattr(struct dentry *, char *, size_t);
+extern int ext2_init_security(struct inode *inode, struct inode *dir);
extern int ext2_xattr_get(struct inode *, int, const char *, void *, size_t);
extern int ext2_xattr_set(struct inode *, int, const char *, const void *,
size_t, int);
diff -puN fs/ext2/xattr_security.c~ext2-enable-atomic-inode-security-labeling
fs/ext2/xattr_security.c
--- 25/fs/ext2/xattr_security.c~ext2-enable-atomic-inode-security-labeling
Fri Jul 8 16:35:13 2005
+++ 25-akpm/fs/ext2/xattr_security.c Fri Jul 8 16:35:13 2005
@@ -8,6 +8,7 @@
#include <linux/fs.h>
#include <linux/smp_lock.h>
#include <linux/ext2_fs.h>
+#include <linux/security.h>
#include "xattr.h"
static size_t
@@ -45,6 +46,27 @@ ext2_xattr_security_set(struct inode *in
value, size, flags);
}
+int
+ext2_init_security(struct inode *inode, struct inode *dir)
+{
+ int err;
+ size_t len;
+ void *value;
+ char *name;
+
+ err = security_inode_init_security(inode, dir, &name, &value, &len);
+ if (err) {
+ if (err == -EOPNOTSUPP)
+ return 0;
+ return err;
+ }
+ err = ext2_xattr_set(inode, EXT2_XATTR_INDEX_SECURITY,
+ name, value, len, 0);
+ kfree(name);
+ kfree(value);
+ return err;
+}
+
struct xattr_handler ext2_xattr_security_handler = {
.prefix = XATTR_SECURITY_PREFIX,
.list = ext2_xattr_security_list,
_
-
To unsubscribe from this list: send the line "unsubscribe mm-commits" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html