diff options
Diffstat (limited to 'fs/xattr.c')
| -rw-r--r-- | fs/xattr.c | 199 |
1 files changed, 146 insertions, 53 deletions
diff --git a/fs/xattr.c b/fs/xattr.c index bcc2156d4d28..80eca7d3d69f 100644 --- a/fs/xattr.c +++ b/fs/xattr.c | |||
| @@ -19,6 +19,149 @@ | |||
| 19 | #include <linux/fsnotify.h> | 19 | #include <linux/fsnotify.h> |
| 20 | #include <asm/uaccess.h> | 20 | #include <asm/uaccess.h> |
| 21 | 21 | ||
| 22 | |||
| 23 | /* | ||
| 24 | * Check permissions for extended attribute access. This is a bit complicated | ||
| 25 | * because different namespaces have very different rules. | ||
| 26 | */ | ||
| 27 | static int | ||
| 28 | xattr_permission(struct inode *inode, const char *name, int mask) | ||
| 29 | { | ||
| 30 | /* | ||
| 31 | * We can never set or remove an extended attribute on a read-only | ||
| 32 | * filesystem or on an immutable / append-only inode. | ||
| 33 | */ | ||
| 34 | if (mask & MAY_WRITE) { | ||
| 35 | if (IS_RDONLY(inode)) | ||
| 36 | return -EROFS; | ||
| 37 | if (IS_IMMUTABLE(inode) || IS_APPEND(inode)) | ||
| 38 | return -EPERM; | ||
| 39 | } | ||
| 40 | |||
| 41 | /* | ||
| 42 | * No restriction for security.* and system.* from the VFS. Decision | ||
| 43 | * on these is left to the underlying filesystem / security module. | ||
| 44 | */ | ||
| 45 | if (!strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) || | ||
| 46 | !strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN)) | ||
| 47 | return 0; | ||
| 48 | |||
| 49 | /* | ||
| 50 | * The trusted.* namespace can only accessed by a privilegued user. | ||
| 51 | */ | ||
| 52 | if (!strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN)) | ||
| 53 | return (capable(CAP_SYS_ADMIN) ? 0 : -EPERM); | ||
| 54 | |||
| 55 | if (!strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) { | ||
| 56 | if (!S_ISREG(inode->i_mode) && | ||
| 57 | (!S_ISDIR(inode->i_mode) || inode->i_mode & S_ISVTX)) | ||
| 58 | return -EPERM; | ||
| 59 | } | ||
| 60 | |||
| 61 | return permission(inode, mask, NULL); | ||
| 62 | } | ||
| 63 | |||
| 64 | int | ||
| 65 | vfs_setxattr(struct dentry *dentry, char *name, void *value, | ||
| 66 | size_t size, int flags) | ||
| 67 | { | ||
| 68 | struct inode *inode = dentry->d_inode; | ||
| 69 | int error; | ||
| 70 | |||
| 71 | error = xattr_permission(inode, name, MAY_WRITE); | ||
| 72 | if (error) | ||
| 73 | return error; | ||
| 74 | |||
| 75 | mutex_lock(&inode->i_mutex); | ||
| 76 | error = security_inode_setxattr(dentry, name, value, size, flags); | ||
| 77 | if (error) | ||
| 78 | goto out; | ||
| 79 | error = -EOPNOTSUPP; | ||
| 80 | if (inode->i_op->setxattr) { | ||
| 81 | error = inode->i_op->setxattr(dentry, name, value, size, flags); | ||
| 82 | if (!error) { | ||
| 83 | fsnotify_xattr(dentry); | ||
| 84 | security_inode_post_setxattr(dentry, name, value, | ||
| 85 | size, flags); | ||
| 86 | } | ||
| 87 | } else if (!strncmp(name, XATTR_SECURITY_PREFIX, | ||
| 88 | XATTR_SECURITY_PREFIX_LEN)) { | ||
| 89 | const char *suffix = name + XATTR_SECURITY_PREFIX_LEN; | ||
| 90 | error = security_inode_setsecurity(inode, suffix, value, | ||
| 91 | size, flags); | ||
| 92 | if (!error) | ||
| 93 | fsnotify_xattr(dentry); | ||
| 94 | } | ||
| 95 | out: | ||
| 96 | mutex_unlock(&inode->i_mutex); | ||
| 97 | return error; | ||
| 98 | } | ||
| 99 | EXPORT_SYMBOL_GPL(vfs_setxattr); | ||
| 100 | |||
| 101 | ssize_t | ||
| 102 | vfs_getxattr(struct dentry *dentry, char *name, void *value, size_t size) | ||
| 103 | { | ||
| 104 | struct inode *inode = dentry->d_inode; | ||
| 105 | int error; | ||
| 106 | |||
| 107 | error = xattr_permission(inode, name, MAY_READ); | ||
| 108 | if (error) | ||
| 109 | return error; | ||
| 110 | |||
| 111 | error = security_inode_getxattr(dentry, name); | ||
| 112 | if (error) | ||
| 113 | return error; | ||
| 114 | |||
| 115 | if (inode->i_op->getxattr) | ||
| 116 | error = inode->i_op->getxattr(dentry, name, value, size); | ||
| 117 | else | ||
| 118 | error = -EOPNOTSUPP; | ||
| 119 | |||
| 120 | if (!strncmp(name, XATTR_SECURITY_PREFIX, | ||
| 121 | XATTR_SECURITY_PREFIX_LEN)) { | ||
| 122 | const char *suffix = name + XATTR_SECURITY_PREFIX_LEN; | ||
| 123 | int ret = security_inode_getsecurity(inode, suffix, value, | ||
| 124 | size, error); | ||
| 125 | /* | ||
| 126 | * Only overwrite the return value if a security module | ||
| 127 | * is actually active. | ||
| 128 | */ | ||
| 129 | if (ret != -EOPNOTSUPP) | ||
| 130 | error = ret; | ||
| 131 | } | ||
| 132 | |||
| 133 | return error; | ||
| 134 | } | ||
| 135 | EXPORT_SYMBOL_GPL(vfs_getxattr); | ||
| 136 | |||
| 137 | int | ||
| 138 | vfs_removexattr(struct dentry *dentry, char *name) | ||
| 139 | { | ||
| 140 | struct inode *inode = dentry->d_inode; | ||
| 141 | int error; | ||
| 142 | |||
| 143 | if (!inode->i_op->removexattr) | ||
| 144 | return -EOPNOTSUPP; | ||
| 145 | |||
| 146 | error = xattr_permission(inode, name, MAY_WRITE); | ||
| 147 | if (error) | ||
| 148 | return error; | ||
| 149 | |||
| 150 | error = security_inode_removexattr(dentry, name); | ||
| 151 | if (error) | ||
| 152 | return error; | ||
| 153 | |||
| 154 | mutex_lock(&inode->i_mutex); | ||
| 155 | error = inode->i_op->removexattr(dentry, name); | ||
| 156 | mutex_unlock(&inode->i_mutex); | ||
| 157 | |||
| 158 | if (!error) | ||
| 159 | fsnotify_xattr(dentry); | ||
| 160 | return error; | ||
| 161 | } | ||
| 162 | EXPORT_SYMBOL_GPL(vfs_removexattr); | ||
| 163 | |||
| 164 | |||
| 22 | /* | 165 | /* |
| 23 | * Extended attribute SET operations | 166 | * Extended attribute SET operations |
| 24 | */ | 167 | */ |
| @@ -51,29 +194,7 @@ setxattr(struct dentry *d, char __user *name, void __user *value, | |||
| 51 | } | 194 | } |
| 52 | } | 195 | } |
| 53 | 196 | ||
| 54 | down(&d->d_inode->i_sem); | 197 | error = vfs_setxattr(d, kname, kvalue, size, flags); |
| 55 | error = security_inode_setxattr(d, kname, kvalue, size, flags); | ||
| 56 | if (error) | ||
| 57 | goto out; | ||
| 58 | error = -EOPNOTSUPP; | ||
| 59 | if (d->d_inode->i_op && d->d_inode->i_op->setxattr) { | ||
| 60 | error = d->d_inode->i_op->setxattr(d, kname, kvalue, | ||
| 61 | size, flags); | ||
| 62 | if (!error) { | ||
| 63 | fsnotify_xattr(d); | ||
| 64 | security_inode_post_setxattr(d, kname, kvalue, | ||
| 65 | size, flags); | ||
| 66 | } | ||
| 67 | } else if (!strncmp(kname, XATTR_SECURITY_PREFIX, | ||
| 68 | sizeof XATTR_SECURITY_PREFIX - 1)) { | ||
| 69 | const char *suffix = kname + sizeof XATTR_SECURITY_PREFIX - 1; | ||
| 70 | error = security_inode_setsecurity(d->d_inode, suffix, kvalue, | ||
| 71 | size, flags); | ||
| 72 | if (!error) | ||
| 73 | fsnotify_xattr(d); | ||
| 74 | } | ||
| 75 | out: | ||
| 76 | up(&d->d_inode->i_sem); | ||
| 77 | kfree(kvalue); | 198 | kfree(kvalue); |
| 78 | return error; | 199 | return error; |
| 79 | } | 200 | } |
| @@ -147,22 +268,7 @@ getxattr(struct dentry *d, char __user *name, void __user *value, size_t size) | |||
| 147 | return -ENOMEM; | 268 | return -ENOMEM; |
| 148 | } | 269 | } |
| 149 | 270 | ||
| 150 | error = security_inode_getxattr(d, kname); | 271 | error = vfs_getxattr(d, kname, kvalue, size); |
| 151 | if (error) | ||
| 152 | goto out; | ||
| 153 | error = -EOPNOTSUPP; | ||
| 154 | if (d->d_inode->i_op && d->d_inode->i_op->getxattr) | ||
| 155 | error = d->d_inode->i_op->getxattr(d, kname, kvalue, size); | ||
| 156 | |||
| 157 | if (!strncmp(kname, XATTR_SECURITY_PREFIX, | ||
| 158 | sizeof XATTR_SECURITY_PREFIX - 1)) { | ||
| 159 | const char *suffix = kname + sizeof XATTR_SECURITY_PREFIX - 1; | ||
| 160 | int rv = security_inode_getsecurity(d->d_inode, suffix, kvalue, | ||
| 161 | size, error); | ||
| 162 | /* Security module active: overwrite error value */ | ||
| 163 | if (rv != -EOPNOTSUPP) | ||
| 164 | error = rv; | ||
| 165 | } | ||
| 166 | if (error > 0) { | 272 | if (error > 0) { |
| 167 | if (size && copy_to_user(value, kvalue, error)) | 273 | if (size && copy_to_user(value, kvalue, error)) |
| 168 | error = -EFAULT; | 274 | error = -EFAULT; |
| @@ -171,7 +277,6 @@ getxattr(struct dentry *d, char __user *name, void __user *value, size_t size) | |||
| 171 | than XATTR_SIZE_MAX bytes. Not possible. */ | 277 | than XATTR_SIZE_MAX bytes. Not possible. */ |
| 172 | error = -E2BIG; | 278 | error = -E2BIG; |
| 173 | } | 279 | } |
| 174 | out: | ||
| 175 | kfree(kvalue); | 280 | kfree(kvalue); |
| 176 | return error; | 281 | return error; |
| 177 | } | 282 | } |
| @@ -318,19 +423,7 @@ removexattr(struct dentry *d, char __user *name) | |||
| 318 | if (error < 0) | 423 | if (error < 0) |
| 319 | return error; | 424 | return error; |
| 320 | 425 | ||
| 321 | error = -EOPNOTSUPP; | 426 | return vfs_removexattr(d, kname); |
| 322 | if (d->d_inode->i_op && d->d_inode->i_op->removexattr) { | ||
| 323 | error = security_inode_removexattr(d, kname); | ||
| 324 | if (error) | ||
| 325 | goto out; | ||
| 326 | down(&d->d_inode->i_sem); | ||
| 327 | error = d->d_inode->i_op->removexattr(d, kname); | ||
| 328 | up(&d->d_inode->i_sem); | ||
| 329 | if (!error) | ||
| 330 | fsnotify_xattr(d); | ||
| 331 | } | ||
| 332 | out: | ||
| 333 | return error; | ||
| 334 | } | 427 | } |
| 335 | 428 | ||
| 336 | asmlinkage long | 429 | asmlinkage long |
