inode.c 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227
  1. /*
  2. * inode.c - securityfs
  3. *
  4. * Copyright (C) 2005 Greg Kroah-Hartman <gregkh@suse.de>
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU General Public License version
  8. * 2 as published by the Free Software Foundation.
  9. *
  10. * Based on fs/debugfs/inode.c which had the following copyright notice:
  11. * Copyright (C) 2004 Greg Kroah-Hartman <greg@kroah.com>
  12. * Copyright (C) 2004 IBM Inc.
  13. */
  14. /* #define DEBUG */
  15. #include <linux/module.h>
  16. #include <linux/fs.h>
  17. #include <linux/mount.h>
  18. #include <linux/pagemap.h>
  19. #include <linux/init.h>
  20. #include <linux/namei.h>
  21. #include <linux/security.h>
  22. #include <linux/magic.h>
  23. static struct vfsmount *mount;
  24. static int mount_count;
  25. static int fill_super(struct super_block *sb, void *data, int silent)
  26. {
  27. static struct tree_descr files[] = {{""}};
  28. return simple_fill_super(sb, SECURITYFS_MAGIC, files);
  29. }
  30. static struct dentry *get_sb(struct file_system_type *fs_type,
  31. int flags, const char *dev_name,
  32. void *data)
  33. {
  34. return mount_single(fs_type, flags, data, fill_super);
  35. }
  36. static struct file_system_type fs_type = {
  37. .owner = THIS_MODULE,
  38. .name = "securityfs",
  39. .mount = get_sb,
  40. .kill_sb = kill_litter_super,
  41. };
  42. /**
  43. * securityfs_create_file - create a file in the securityfs filesystem
  44. *
  45. * @name: a pointer to a string containing the name of the file to create.
  46. * @mode: the permission that the file should have
  47. * @parent: a pointer to the parent dentry for this file. This should be a
  48. * directory dentry if set. If this parameter is %NULL, then the
  49. * file will be created in the root of the securityfs filesystem.
  50. * @data: a pointer to something that the caller will want to get to later
  51. * on. The inode.i_private pointer will point to this value on
  52. * the open() call.
  53. * @fops: a pointer to a struct file_operations that should be used for
  54. * this file.
  55. *
  56. * This is the basic "create a file" function for securityfs. It allows for a
  57. * wide range of flexibility in creating a file, or a directory (if you
  58. * want to create a directory, the securityfs_create_dir() function is
  59. * recommended to be used instead).
  60. *
  61. * This function returns a pointer to a dentry if it succeeds. This
  62. * pointer must be passed to the securityfs_remove() function when the file is
  63. * to be removed (no automatic cleanup happens if your module is unloaded,
  64. * you are responsible here). If an error occurs, the function will return
  65. * the error value (via ERR_PTR).
  66. *
  67. * If securityfs is not enabled in the kernel, the value %-ENODEV is
  68. * returned.
  69. */
  70. struct dentry *securityfs_create_file(const char *name, umode_t mode,
  71. struct dentry *parent, void *data,
  72. const struct file_operations *fops)
  73. {
  74. struct dentry *dentry;
  75. int is_dir = S_ISDIR(mode);
  76. struct inode *dir, *inode;
  77. int error;
  78. if (!is_dir) {
  79. BUG_ON(!fops);
  80. mode = (mode & S_IALLUGO) | S_IFREG;
  81. }
  82. pr_debug("securityfs: creating file '%s'\n",name);
  83. error = simple_pin_fs(&fs_type, &mount, &mount_count);
  84. if (error)
  85. return ERR_PTR(error);
  86. if (!parent)
  87. parent = mount->mnt_root;
  88. dir = d_inode(parent);
  89. mutex_lock(&dir->i_mutex);
  90. dentry = lookup_one_len(name, parent, strlen(name));
  91. if (IS_ERR(dentry))
  92. goto out;
  93. if (d_really_is_positive(dentry)) {
  94. error = -EEXIST;
  95. goto out1;
  96. }
  97. inode = new_inode(dir->i_sb);
  98. if (!inode) {
  99. error = -ENOMEM;
  100. goto out1;
  101. }
  102. inode->i_ino = get_next_ino();
  103. inode->i_mode = mode;
  104. inode->i_atime = inode->i_mtime = inode->i_ctime = CURRENT_TIME;
  105. inode->i_private = data;
  106. if (is_dir) {
  107. inode->i_op = &simple_dir_inode_operations;
  108. inode->i_fop = &simple_dir_operations;
  109. inc_nlink(inode);
  110. inc_nlink(dir);
  111. } else {
  112. inode->i_fop = fops;
  113. }
  114. d_instantiate(dentry, inode);
  115. dget(dentry);
  116. mutex_unlock(&dir->i_mutex);
  117. return dentry;
  118. out1:
  119. dput(dentry);
  120. dentry = ERR_PTR(error);
  121. out:
  122. mutex_unlock(&dir->i_mutex);
  123. simple_release_fs(&mount, &mount_count);
  124. return dentry;
  125. }
  126. EXPORT_SYMBOL_GPL(securityfs_create_file);
  127. /**
  128. * securityfs_create_dir - create a directory in the securityfs filesystem
  129. *
  130. * @name: a pointer to a string containing the name of the directory to
  131. * create.
  132. * @parent: a pointer to the parent dentry for this file. This should be a
  133. * directory dentry if set. If this parameter is %NULL, then the
  134. * directory will be created in the root of the securityfs filesystem.
  135. *
  136. * This function creates a directory in securityfs with the given @name.
  137. *
  138. * This function returns a pointer to a dentry if it succeeds. This
  139. * pointer must be passed to the securityfs_remove() function when the file is
  140. * to be removed (no automatic cleanup happens if your module is unloaded,
  141. * you are responsible here). If an error occurs, %NULL will be returned.
  142. *
  143. * If securityfs is not enabled in the kernel, the value %-ENODEV is
  144. * returned. It is not wise to check for this value, but rather, check for
  145. * %NULL or !%NULL instead as to eliminate the need for #ifdef in the calling
  146. * code.
  147. */
  148. struct dentry *securityfs_create_dir(const char *name, struct dentry *parent)
  149. {
  150. return securityfs_create_file(name,
  151. S_IFDIR | S_IRWXU | S_IRUGO | S_IXUGO,
  152. parent, NULL, NULL);
  153. }
  154. EXPORT_SYMBOL_GPL(securityfs_create_dir);
  155. /**
  156. * securityfs_remove - removes a file or directory from the securityfs filesystem
  157. *
  158. * @dentry: a pointer to a the dentry of the file or directory to be removed.
  159. *
  160. * This function removes a file or directory in securityfs that was previously
  161. * created with a call to another securityfs function (like
  162. * securityfs_create_file() or variants thereof.)
  163. *
  164. * This function is required to be called in order for the file to be
  165. * removed. No automatic cleanup of files will happen when a module is
  166. * removed; you are responsible here.
  167. */
  168. void securityfs_remove(struct dentry *dentry)
  169. {
  170. struct dentry *parent;
  171. if (!dentry || IS_ERR(dentry))
  172. return;
  173. parent = dentry->d_parent;
  174. if (!parent || d_really_is_negative(parent))
  175. return;
  176. mutex_lock(&d_inode(parent)->i_mutex);
  177. if (simple_positive(dentry)) {
  178. if (d_is_dir(dentry))
  179. simple_rmdir(d_inode(parent), dentry);
  180. else
  181. simple_unlink(d_inode(parent), dentry);
  182. dput(dentry);
  183. }
  184. mutex_unlock(&d_inode(parent)->i_mutex);
  185. simple_release_fs(&mount, &mount_count);
  186. }
  187. EXPORT_SYMBOL_GPL(securityfs_remove);
  188. static int __init securityfs_init(void)
  189. {
  190. int retval;
  191. retval = sysfs_create_mount_point(kernel_kobj, "security");
  192. if (retval)
  193. return retval;
  194. retval = register_filesystem(&fs_type);
  195. if (retval)
  196. sysfs_remove_mount_point(kernel_kobj, "security");
  197. return retval;
  198. }
  199. core_initcall(securityfs_init);
  200. MODULE_LICENSE("GPL");