jim owens
2009-Jan-07 20:19 UTC
[PATCH] Btrfs: support security xattr with SELinux enabled
Add call to LSM security initialization and save resulting security xattr for new inodes. Add xattr support to symlink inode ops. Set inode->i_op for existing special files. Signed-off-by: jim owens <jowens@hp.com> --- fs/btrfs/inode.c | 23 +++++++++++++++++++---- fs/btrfs/xattr.c | 32 ++++++++++++++++++++++++++++++++ fs/btrfs/xattr.h | 2 ++ 3 files changed, 53 insertions(+), 4 deletions(-) diff --git a/fs/btrfs/inode.c b/fs/btrfs/inode.c index cdb7011..dd6152a 100644 --- a/fs/btrfs/inode.c +++ b/fs/btrfs/inode.c @@ -91,6 +91,16 @@ static noinline int cow_file_range(struct inode *inode, u64 start, u64 end, int *page_started, unsigned long *nr_written, int unlock); +static int btrfs_init_inode_security(struct inode *inode, struct inode *dir) +{ + int err; + + err = btrfs_init_acl(inode, dir); + if (!err) + err = btrfs_xattr_security_init(inode, dir); + return err; +} + /* * a very lame attempt at stopping writes when the FS is 85% full. There * are countless ways this is incorrect, but it is better than nothing. @@ -2039,6 +2049,7 @@ void btrfs_read_locked_inode(struct inode *inode) inode->i_mapping->backing_dev_info = &root->fs_info->bdi; break; default: + inode->i_op = &btrfs_special_inode_operations; init_special_inode(inode, inode->i_mode, rdev); break; } @@ -3586,7 +3597,7 @@ static int btrfs_mknod(struct inode *dir, struct dentry *dentry, if (IS_ERR(inode)) goto out_unlock; - err = btrfs_init_acl(inode, dir); + err = btrfs_init_inode_security(inode, dir); if (err) { drop_inode = 1; goto out_unlock; @@ -3649,7 +3660,7 @@ static int btrfs_create(struct inode *dir, struct dentry *dentry, if (IS_ERR(inode)) goto out_unlock; - err = btrfs_init_acl(inode, dir); + err = btrfs_init_inode_security(inode, dir); if (err) { drop_inode = 1; goto out_unlock; @@ -3772,7 +3783,7 @@ static int btrfs_mkdir(struct inode *dir, struct dentry *dentry, int mode) drop_on_err = 1; - err = btrfs_init_acl(inode, dir); + err = btrfs_init_inode_security(inode, dir); if (err) goto out_fail; @@ -4733,7 +4744,7 @@ static int btrfs_symlink(struct inode *dir, struct dentry *dentry, if (IS_ERR(inode)) goto out_unlock; - err = btrfs_init_acl(inode, dir); + err = btrfs_init_inode_security(inode, dir); if (err) { drop_inode = 1; goto out_unlock; @@ -5032,4 +5043,8 @@ static struct inode_operations btrfs_symlink_inode_operations = { .follow_link = page_follow_link_light, .put_link = page_put_link, .permission = btrfs_permission, + .setxattr = btrfs_setxattr, + .getxattr = btrfs_getxattr, + .listxattr = btrfs_listxattr, + .removexattr = btrfs_removexattr, }; diff --git a/fs/btrfs/xattr.c b/fs/btrfs/xattr.c index 7f332e2..02195f4 100644 --- a/fs/btrfs/xattr.c +++ b/fs/btrfs/xattr.c @@ -21,6 +21,7 @@ #include <linux/slab.h> #include <linux/rwsem.h> #include <linux/xattr.h> +#include <linux/security.h> #include "ctree.h" #include "btrfs_inode.h" #include "transaction.h" @@ -320,3 +321,34 @@ int btrfs_removexattr(struct dentry *dentry, const char *name) return -EOPNOTSUPP; return __btrfs_setxattr(dentry->d_inode, name, NULL, 0, XATTR_REPLACE); } + +int btrfs_xattr_security_init(struct inode *inode, struct inode *dir) +{ + int err; + size_t len; + void *value; + char *suffix; + char *name; + + err = security_inode_init_security(inode, dir, &suffix, &value, &len); + if (err) { + if (err == -EOPNOTSUPP) + return 0; + return err; + } + + name = kmalloc(XATTR_SECURITY_PREFIX_LEN + strlen(suffix) + 1, + GFP_NOFS); + if (!name) { + err = -ENOMEM; + } else { + strcpy(name, XATTR_SECURITY_PREFIX); + strcpy(name + XATTR_SECURITY_PREFIX_LEN, suffix); + err = __btrfs_setxattr(inode, name, value, len, 0); + kfree(name); + } + + kfree(suffix); + kfree(value); + return err; +} diff --git a/fs/btrfs/xattr.h b/fs/btrfs/xattr.h index 5b1d08f..c71e9c3 100644 --- a/fs/btrfs/xattr.h +++ b/fs/btrfs/xattr.h @@ -36,4 +36,6 @@ extern int btrfs_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags); extern int btrfs_removexattr(struct dentry *dentry, const char *name); +extern int btrfs_xattr_security_init(struct inode *inode, struct inode *dir); + #endif /* __XATTR__ */ -- 1.5.4.3 -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Josef Bacik
2009-Jan-07 20:48 UTC
Re: [PATCH] Btrfs: support security xattr with SELinux enabled
On Wed, Jan 07, 2009 at 03:19:38PM -0500, jim owens wrote:> > Add call to LSM security initialization and save > resulting security xattr for new inodes. > > Add xattr support to symlink inode ops. > > Set inode->i_op for existing special files. > > Signed-off-by: jim owens <jowens@hp.com> > --- > fs/btrfs/inode.c | 23 +++++++++++++++++++---- > fs/btrfs/xattr.c | 32 ++++++++++++++++++++++++++++++++ > fs/btrfs/xattr.h | 2 ++ > 3 files changed, 53 insertions(+), 4 deletions(-) > > diff --git a/fs/btrfs/inode.c b/fs/btrfs/inode.c > index cdb7011..dd6152a 100644 > --- a/fs/btrfs/inode.c > +++ b/fs/btrfs/inode.c > @@ -91,6 +91,16 @@ static noinline int cow_file_range(struct inode *inode, > u64 start, u64 end, int *page_started, > unsigned long *nr_written, int unlock); > > +static int btrfs_init_inode_security(struct inode *inode, struct inode > *dir) > +{ > + int err; > + > + err = btrfs_init_acl(inode, dir); > + if (!err) > + err = btrfs_xattr_security_init(inode, dir); > + return err; > +} > + > /* > * a very lame attempt at stopping writes when the FS is 85% full. There > * are countless ways this is incorrect, but it is better than nothing. > @@ -2039,6 +2049,7 @@ void btrfs_read_locked_inode(struct inode *inode) > inode->i_mapping->backing_dev_info = &root->fs_info->bdi; > break; > default: > + inode->i_op = &btrfs_special_inode_operations; > init_special_inode(inode, inode->i_mode, rdev); > break; > } > @@ -3586,7 +3597,7 @@ static int btrfs_mknod(struct inode *dir, struct > dentry *dentry, > if (IS_ERR(inode)) > goto out_unlock; > > - err = btrfs_init_acl(inode, dir); > + err = btrfs_init_inode_security(inode, dir); > if (err) { > drop_inode = 1; > goto out_unlock; > @@ -3649,7 +3660,7 @@ static int btrfs_create(struct inode *dir, struct > dentry *dentry, > if (IS_ERR(inode)) > goto out_unlock; > > - err = btrfs_init_acl(inode, dir); > + err = btrfs_init_inode_security(inode, dir); > if (err) { > drop_inode = 1; > goto out_unlock; > @@ -3772,7 +3783,7 @@ static int btrfs_mkdir(struct inode *dir, struct > dentry *dentry, int mode) > > drop_on_err = 1; > > - err = btrfs_init_acl(inode, dir); > + err = btrfs_init_inode_security(inode, dir); > if (err) > goto out_fail; > > @@ -4733,7 +4744,7 @@ static int btrfs_symlink(struct inode *dir, struct > dentry *dentry, > if (IS_ERR(inode)) > goto out_unlock; > > - err = btrfs_init_acl(inode, dir); > + err = btrfs_init_inode_security(inode, dir); > if (err) { > drop_inode = 1; > goto out_unlock; > @@ -5032,4 +5043,8 @@ static struct inode_operations > btrfs_symlink_inode_operations = { > .follow_link = page_follow_link_light, > .put_link = page_put_link, > .permission = btrfs_permission, > + .setxattr = btrfs_setxattr, > + .getxattr = btrfs_getxattr, > + .listxattr = btrfs_listxattr, > + .removexattr = btrfs_removexattr, > }; > diff --git a/fs/btrfs/xattr.c b/fs/btrfs/xattr.c > index 7f332e2..02195f4 100644 > --- a/fs/btrfs/xattr.c > +++ b/fs/btrfs/xattr.c > @@ -21,6 +21,7 @@ > #include <linux/slab.h> > #include <linux/rwsem.h> > #include <linux/xattr.h> > +#include <linux/security.h> > #include "ctree.h" > #include "btrfs_inode.h" > #include "transaction.h" > @@ -320,3 +321,34 @@ int btrfs_removexattr(struct dentry *dentry, const > char *name) > return -EOPNOTSUPP; > return __btrfs_setxattr(dentry->d_inode, name, NULL, 0, XATTR_REPLACE); > } > + > +int btrfs_xattr_security_init(struct inode *inode, struct inode *dir) > +{ > + int err; > + size_t len; > + void *value; > + char *suffix; > + char *name; > + > + err = security_inode_init_security(inode, dir, &suffix, &value, &len); > + if (err) { > + if (err == -EOPNOTSUPP) > + return 0; > + return err; > + } > + > + name = kmalloc(XATTR_SECURITY_PREFIX_LEN + strlen(suffix) + 1, > + GFP_NOFS);Use kzalloc here otherwise the end of name could be some random thing and strlen() will read past the end of the memory. Thanks, Josef -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
jim owens
2009-Jan-08 00:22 UTC
Re: [PATCH] Btrfs: support security xattr with SELinux enabled
Josef Bacik wrote:> On Wed, Jan 07, 2009 at 03:19:38PM -0500, jim owens wrote: >> +int btrfs_xattr_security_init(struct inode *inode, struct inode *dir) >> +{ >> + int err; >> + size_t len; >> + void *value; >> + char *suffix; >> + char *name; >> + >> + err = security_inode_init_security(inode, dir, &suffix, &value, &len); >> + if (err) { >> + if (err == -EOPNOTSUPP) >> + return 0; >> + return err; >> + } >> + >> + name = kmalloc(XATTR_SECURITY_PREFIX_LEN + strlen(suffix) + 1, >> + GFP_NOFS); > > Use kzalloc here otherwise the end of name could be some random thing and > strlen() will read past the end of the memory. Thanks,I don''t understand what you think can happen... + strcpy(name, XATTR_SECURITY_PREFIX); + strcpy(name + XATTR_SECURITY_PREFIX_LEN, suffix); always forces "name" to be \0 terminated. jim -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Josef Bacik
2009-Jan-08 00:47 UTC
Re: [PATCH] Btrfs: support security xattr with SELinux enabled
On Wed, Jan 07, 2009 at 07:22:58PM -0500, jim owens wrote:> Josef Bacik wrote: >> On Wed, Jan 07, 2009 at 03:19:38PM -0500, jim owens wrote: >>> +int btrfs_xattr_security_init(struct inode *inode, struct inode *dir) >>> +{ >>> + int err; >>> + size_t len; >>> + void *value; >>> + char *suffix; >>> + char *name; >>> + >>> + err = security_inode_init_security(inode, dir, &suffix, &value, &len); >>> + if (err) { >>> + if (err == -EOPNOTSUPP) >>> + return 0; >>> + return err; >>> + } >>> + >>> + name = kmalloc(XATTR_SECURITY_PREFIX_LEN + strlen(suffix) + 1, >>> + GFP_NOFS); >> >> Use kzalloc here otherwise the end of name could be some random thing and >> strlen() will read past the end of the memory. Thanks, > > I don''t understand what you think can happen... > > + strcpy(name, XATTR_SECURITY_PREFIX); > + strcpy(name + XATTR_SECURITY_PREFIX_LEN, suffix); > > always forces "name" to be \0 terminated. >Oh derr sorry I forget suffix is \0 terminated. Nevermind. Josef -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html