PageRenderTime 25ms CodeModel.GetById 36ms RepoModel.GetById 1ms app.codeStats 0ms

/linux-2.6.21.x/fs/xattr.c

https://bitbucket.org/altlc/wive-rtnl-ralink-rt305x-routers-firmware-amod
C | 615 lines | 462 code | 79 blank | 74 comment | 102 complexity | e3c65b49857bf49258ee5ccdeddab13a MD5 | raw file
Possible License(s): CC-BY-SA-3.0, BSD-3-Clause, MPL-2.0-no-copyleft-exception, GPL-2.0, GPL-3.0, LGPL-3.0, 0BSD, AGPL-1.0, LGPL-2.1, LGPL-2.0
  1. /*
  2. File: fs/xattr.c
  3. Extended attribute handling.
  4. Copyright (C) 2001 by Andreas Gruenbacher <a.gruenbacher@computer.org>
  5. Copyright (C) 2001 SGI - Silicon Graphics, Inc <linux-xfs@oss.sgi.com>
  6. Copyright (c) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
  7. */
  8. #include <linux/fs.h>
  9. #include <linux/slab.h>
  10. #include <linux/file.h>
  11. #include <linux/xattr.h>
  12. #include <linux/namei.h>
  13. #include <linux/security.h>
  14. #include <linux/syscalls.h>
  15. #include <linux/module.h>
  16. #include <linux/fsnotify.h>
  17. #include <linux/audit.h>
  18. #include <asm/uaccess.h>
  19. /*
  20. * Check permissions for extended attribute access. This is a bit complicated
  21. * because different namespaces have very different rules.
  22. */
  23. static int
  24. xattr_permission(struct inode *inode, const char *name, int mask)
  25. {
  26. /*
  27. * We can never set or remove an extended attribute on a read-only
  28. * filesystem or on an immutable / append-only inode.
  29. */
  30. if (mask & MAY_WRITE) {
  31. if (IS_RDONLY(inode))
  32. return -EROFS;
  33. if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
  34. return -EPERM;
  35. }
  36. /*
  37. * No restriction for security.* and system.* from the VFS. Decision
  38. * on these is left to the underlying filesystem / security module.
  39. */
  40. if (!strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) ||
  41. !strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN))
  42. return 0;
  43. /*
  44. * The trusted.* namespace can only be accessed by a privileged user.
  45. */
  46. if (!strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN))
  47. return (capable(CAP_SYS_ADMIN) ? 0 : -EPERM);
  48. /* In user.* namespace, only regular files and directories can have
  49. * extended attributes. For sticky directories, only the owner and
  50. * privileged user can write attributes.
  51. */
  52. if (!strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) {
  53. if (!S_ISREG(inode->i_mode) && !S_ISDIR(inode->i_mode))
  54. return -EPERM;
  55. if (S_ISDIR(inode->i_mode) && (inode->i_mode & S_ISVTX) &&
  56. (mask & MAY_WRITE) && (current->fsuid != inode->i_uid) &&
  57. !capable(CAP_FOWNER))
  58. return -EPERM;
  59. }
  60. return permission(inode, mask, NULL);
  61. }
  62. int
  63. vfs_setxattr(struct dentry *dentry, char *name, void *value,
  64. size_t size, int flags)
  65. {
  66. struct inode *inode = dentry->d_inode;
  67. int error;
  68. error = xattr_permission(inode, name, MAY_WRITE);
  69. if (error)
  70. return error;
  71. mutex_lock(&inode->i_mutex);
  72. error = security_inode_setxattr(dentry, name, value, size, flags);
  73. if (error)
  74. goto out;
  75. error = -EOPNOTSUPP;
  76. if (inode->i_op->setxattr) {
  77. error = inode->i_op->setxattr(dentry, name, value, size, flags);
  78. if (!error) {
  79. fsnotify_xattr(dentry);
  80. security_inode_post_setxattr(dentry, name, value,
  81. size, flags);
  82. }
  83. } else if (!strncmp(name, XATTR_SECURITY_PREFIX,
  84. XATTR_SECURITY_PREFIX_LEN)) {
  85. const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
  86. error = security_inode_setsecurity(inode, suffix, value,
  87. size, flags);
  88. if (!error)
  89. fsnotify_xattr(dentry);
  90. }
  91. out:
  92. mutex_unlock(&inode->i_mutex);
  93. return error;
  94. }
  95. EXPORT_SYMBOL_GPL(vfs_setxattr);
  96. ssize_t
  97. vfs_getxattr(struct dentry *dentry, char *name, void *value, size_t size)
  98. {
  99. struct inode *inode = dentry->d_inode;
  100. int error;
  101. error = xattr_permission(inode, name, MAY_READ);
  102. if (error)
  103. return error;
  104. error = security_inode_getxattr(dentry, name);
  105. if (error)
  106. return error;
  107. if (inode->i_op->getxattr)
  108. error = inode->i_op->getxattr(dentry, name, value, size);
  109. else
  110. error = -EOPNOTSUPP;
  111. if (!strncmp(name, XATTR_SECURITY_PREFIX,
  112. XATTR_SECURITY_PREFIX_LEN)) {
  113. const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
  114. int ret = security_inode_getsecurity(inode, suffix, value,
  115. size, error);
  116. /*
  117. * Only overwrite the return value if a security module
  118. * is actually active.
  119. */
  120. if (ret != -EOPNOTSUPP)
  121. error = ret;
  122. }
  123. return error;
  124. }
  125. EXPORT_SYMBOL_GPL(vfs_getxattr);
  126. ssize_t
  127. vfs_listxattr(struct dentry *d, char *list, size_t size)
  128. {
  129. ssize_t error;
  130. error = security_inode_listxattr(d);
  131. if (error)
  132. return error;
  133. error = -EOPNOTSUPP;
  134. if (d->d_inode->i_op && d->d_inode->i_op->listxattr) {
  135. error = d->d_inode->i_op->listxattr(d, list, size);
  136. } else {
  137. error = security_inode_listsecurity(d->d_inode, list, size);
  138. if (size && error > size)
  139. error = -ERANGE;
  140. }
  141. return error;
  142. }
  143. EXPORT_SYMBOL_GPL(vfs_listxattr);
  144. int
  145. vfs_removexattr(struct dentry *dentry, char *name)
  146. {
  147. struct inode *inode = dentry->d_inode;
  148. int error;
  149. if (!inode->i_op->removexattr)
  150. return -EOPNOTSUPP;
  151. error = xattr_permission(inode, name, MAY_WRITE);
  152. if (error)
  153. return error;
  154. error = security_inode_removexattr(dentry, name);
  155. if (error)
  156. return error;
  157. mutex_lock(&inode->i_mutex);
  158. error = inode->i_op->removexattr(dentry, name);
  159. mutex_unlock(&inode->i_mutex);
  160. if (!error)
  161. fsnotify_xattr(dentry);
  162. return error;
  163. }
  164. EXPORT_SYMBOL_GPL(vfs_removexattr);
  165. /*
  166. * Extended attribute SET operations
  167. */
  168. static long
  169. setxattr(struct dentry *d, char __user *name, void __user *value,
  170. size_t size, int flags)
  171. {
  172. int error;
  173. void *kvalue = NULL;
  174. char kname[XATTR_NAME_MAX + 1];
  175. if (flags & ~(XATTR_CREATE|XATTR_REPLACE))
  176. return -EINVAL;
  177. error = strncpy_from_user(kname, name, sizeof(kname));
  178. if (error == 0 || error == sizeof(kname))
  179. error = -ERANGE;
  180. if (error < 0)
  181. return error;
  182. if (size) {
  183. if (size > XATTR_SIZE_MAX)
  184. return -E2BIG;
  185. kvalue = memdup_user(value, size);
  186. if (IS_ERR(kvalue))
  187. return PTR_ERR(kvalue);
  188. }
  189. error = vfs_setxattr(d, kname, kvalue, size, flags);
  190. kfree(kvalue);
  191. return error;
  192. }
  193. asmlinkage long
  194. sys_setxattr(char __user *path, char __user *name, void __user *value,
  195. size_t size, int flags)
  196. {
  197. struct nameidata nd;
  198. int error;
  199. error = user_path_walk(path, &nd);
  200. if (error)
  201. return error;
  202. error = setxattr(nd.dentry, name, value, size, flags);
  203. path_release(&nd);
  204. return error;
  205. }
  206. asmlinkage long
  207. sys_lsetxattr(char __user *path, char __user *name, void __user *value,
  208. size_t size, int flags)
  209. {
  210. struct nameidata nd;
  211. int error;
  212. error = user_path_walk_link(path, &nd);
  213. if (error)
  214. return error;
  215. error = setxattr(nd.dentry, name, value, size, flags);
  216. path_release(&nd);
  217. return error;
  218. }
  219. asmlinkage long
  220. sys_fsetxattr(int fd, char __user *name, void __user *value,
  221. size_t size, int flags)
  222. {
  223. struct file *f;
  224. struct dentry *dentry;
  225. int error = -EBADF;
  226. f = fget(fd);
  227. if (!f)
  228. return error;
  229. dentry = f->f_path.dentry;
  230. audit_inode(NULL, dentry->d_inode);
  231. error = setxattr(dentry, name, value, size, flags);
  232. fput(f);
  233. return error;
  234. }
  235. /*
  236. * Extended attribute GET operations
  237. */
  238. static ssize_t
  239. getxattr(struct dentry *d, char __user *name, void __user *value, size_t size)
  240. {
  241. ssize_t error;
  242. void *kvalue = NULL;
  243. char kname[XATTR_NAME_MAX + 1];
  244. error = strncpy_from_user(kname, name, sizeof(kname));
  245. if (error == 0 || error == sizeof(kname))
  246. error = -ERANGE;
  247. if (error < 0)
  248. return error;
  249. if (size) {
  250. if (size > XATTR_SIZE_MAX)
  251. size = XATTR_SIZE_MAX;
  252. kvalue = kzalloc(size, GFP_KERNEL);
  253. if (!kvalue)
  254. return -ENOMEM;
  255. }
  256. error = vfs_getxattr(d, kname, kvalue, size);
  257. if (error > 0) {
  258. if (size && copy_to_user(value, kvalue, error))
  259. error = -EFAULT;
  260. } else if (error == -ERANGE && size >= XATTR_SIZE_MAX) {
  261. /* The file system tried to returned a value bigger
  262. than XATTR_SIZE_MAX bytes. Not possible. */
  263. error = -E2BIG;
  264. }
  265. kfree(kvalue);
  266. return error;
  267. }
  268. asmlinkage ssize_t
  269. sys_getxattr(char __user *path, char __user *name, void __user *value,
  270. size_t size)
  271. {
  272. struct nameidata nd;
  273. ssize_t error;
  274. error = user_path_walk(path, &nd);
  275. if (error)
  276. return error;
  277. error = getxattr(nd.dentry, name, value, size);
  278. path_release(&nd);
  279. return error;
  280. }
  281. asmlinkage ssize_t
  282. sys_lgetxattr(char __user *path, char __user *name, void __user *value,
  283. size_t size)
  284. {
  285. struct nameidata nd;
  286. ssize_t error;
  287. error = user_path_walk_link(path, &nd);
  288. if (error)
  289. return error;
  290. error = getxattr(nd.dentry, name, value, size);
  291. path_release(&nd);
  292. return error;
  293. }
  294. asmlinkage ssize_t
  295. sys_fgetxattr(int fd, char __user *name, void __user *value, size_t size)
  296. {
  297. struct file *f;
  298. ssize_t error = -EBADF;
  299. f = fget(fd);
  300. if (!f)
  301. return error;
  302. error = getxattr(f->f_path.dentry, name, value, size);
  303. fput(f);
  304. return error;
  305. }
  306. /*
  307. * Extended attribute LIST operations
  308. */
  309. static ssize_t
  310. listxattr(struct dentry *d, char __user *list, size_t size)
  311. {
  312. ssize_t error;
  313. char *klist = NULL;
  314. if (size) {
  315. if (size > XATTR_LIST_MAX)
  316. size = XATTR_LIST_MAX;
  317. klist = kmalloc(size, GFP_KERNEL);
  318. if (!klist)
  319. return -ENOMEM;
  320. }
  321. error = vfs_listxattr(d, klist, size);
  322. if (error > 0) {
  323. if (size && copy_to_user(list, klist, error))
  324. error = -EFAULT;
  325. } else if (error == -ERANGE && size >= XATTR_LIST_MAX) {
  326. /* The file system tried to returned a list bigger
  327. than XATTR_LIST_MAX bytes. Not possible. */
  328. error = -E2BIG;
  329. }
  330. kfree(klist);
  331. return error;
  332. }
  333. asmlinkage ssize_t
  334. sys_listxattr(char __user *path, char __user *list, size_t size)
  335. {
  336. struct nameidata nd;
  337. ssize_t error;
  338. error = user_path_walk(path, &nd);
  339. if (error)
  340. return error;
  341. error = listxattr(nd.dentry, list, size);
  342. path_release(&nd);
  343. return error;
  344. }
  345. asmlinkage ssize_t
  346. sys_llistxattr(char __user *path, char __user *list, size_t size)
  347. {
  348. struct nameidata nd;
  349. ssize_t error;
  350. error = user_path_walk_link(path, &nd);
  351. if (error)
  352. return error;
  353. error = listxattr(nd.dentry, list, size);
  354. path_release(&nd);
  355. return error;
  356. }
  357. asmlinkage ssize_t
  358. sys_flistxattr(int fd, char __user *list, size_t size)
  359. {
  360. struct file *f;
  361. ssize_t error = -EBADF;
  362. f = fget(fd);
  363. if (!f)
  364. return error;
  365. error = listxattr(f->f_path.dentry, list, size);
  366. fput(f);
  367. return error;
  368. }
  369. /*
  370. * Extended attribute REMOVE operations
  371. */
  372. static long
  373. removexattr(struct dentry *d, char __user *name)
  374. {
  375. int error;
  376. char kname[XATTR_NAME_MAX + 1];
  377. error = strncpy_from_user(kname, name, sizeof(kname));
  378. if (error == 0 || error == sizeof(kname))
  379. error = -ERANGE;
  380. if (error < 0)
  381. return error;
  382. return vfs_removexattr(d, kname);
  383. }
  384. asmlinkage long
  385. sys_removexattr(char __user *path, char __user *name)
  386. {
  387. struct nameidata nd;
  388. int error;
  389. error = user_path_walk(path, &nd);
  390. if (error)
  391. return error;
  392. error = removexattr(nd.dentry, name);
  393. path_release(&nd);
  394. return error;
  395. }
  396. asmlinkage long
  397. sys_lremovexattr(char __user *path, char __user *name)
  398. {
  399. struct nameidata nd;
  400. int error;
  401. error = user_path_walk_link(path, &nd);
  402. if (error)
  403. return error;
  404. error = removexattr(nd.dentry, name);
  405. path_release(&nd);
  406. return error;
  407. }
  408. asmlinkage long
  409. sys_fremovexattr(int fd, char __user *name)
  410. {
  411. struct file *f;
  412. struct dentry *dentry;
  413. int error = -EBADF;
  414. f = fget(fd);
  415. if (!f)
  416. return error;
  417. dentry = f->f_path.dentry;
  418. audit_inode(NULL, dentry->d_inode);
  419. error = removexattr(dentry, name);
  420. fput(f);
  421. return error;
  422. }
  423. static const char *
  424. strcmp_prefix(const char *a, const char *a_prefix)
  425. {
  426. while (*a_prefix && *a == *a_prefix) {
  427. a++;
  428. a_prefix++;
  429. }
  430. return *a_prefix ? NULL : a;
  431. }
  432. /*
  433. * In order to implement different sets of xattr operations for each xattr
  434. * prefix with the generic xattr API, a filesystem should create a
  435. * null-terminated array of struct xattr_handler (one for each prefix) and
  436. * hang a pointer to it off of the s_xattr field of the superblock.
  437. *
  438. * The generic_fooxattr() functions will use this list to dispatch xattr
  439. * operations to the correct xattr_handler.
  440. */
  441. #define for_each_xattr_handler(handlers, handler) \
  442. for ((handler) = *(handlers)++; \
  443. (handler) != NULL; \
  444. (handler) = *(handlers)++)
  445. /*
  446. * Find the xattr_handler with the matching prefix.
  447. */
  448. static struct xattr_handler *
  449. xattr_resolve_name(struct xattr_handler **handlers, const char **name)
  450. {
  451. struct xattr_handler *handler;
  452. if (!*name)
  453. return NULL;
  454. for_each_xattr_handler(handlers, handler) {
  455. const char *n = strcmp_prefix(*name, handler->prefix);
  456. if (n) {
  457. *name = n;
  458. break;
  459. }
  460. }
  461. return handler;
  462. }
  463. /*
  464. * Find the handler for the prefix and dispatch its get() operation.
  465. */
  466. ssize_t
  467. generic_getxattr(struct dentry *dentry, const char *name, void *buffer, size_t size)
  468. {
  469. struct xattr_handler *handler;
  470. struct inode *inode = dentry->d_inode;
  471. handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
  472. if (!handler)
  473. return -EOPNOTSUPP;
  474. return handler->get(inode, name, buffer, size);
  475. }
  476. /*
  477. * Combine the results of the list() operation from every xattr_handler in the
  478. * list.
  479. */
  480. ssize_t
  481. generic_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
  482. {
  483. struct inode *inode = dentry->d_inode;
  484. struct xattr_handler *handler, **handlers = inode->i_sb->s_xattr;
  485. unsigned int size = 0;
  486. if (!buffer) {
  487. for_each_xattr_handler(handlers, handler)
  488. size += handler->list(inode, NULL, 0, NULL, 0);
  489. } else {
  490. char *buf = buffer;
  491. for_each_xattr_handler(handlers, handler) {
  492. size = handler->list(inode, buf, buffer_size, NULL, 0);
  493. if (size > buffer_size)
  494. return -ERANGE;
  495. buf += size;
  496. buffer_size -= size;
  497. }
  498. size = buf - buffer;
  499. }
  500. return size;
  501. }
  502. /*
  503. * Find the handler for the prefix and dispatch its set() operation.
  504. */
  505. int
  506. generic_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags)
  507. {
  508. struct xattr_handler *handler;
  509. struct inode *inode = dentry->d_inode;
  510. if (size == 0)
  511. value = ""; /* empty EA, do not remove */
  512. handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
  513. if (!handler)
  514. return -EOPNOTSUPP;
  515. return handler->set(inode, name, value, size, flags);
  516. }
  517. /*
  518. * Find the handler for the prefix and dispatch its set() operation to remove
  519. * any associated extended attribute.
  520. */
  521. int
  522. generic_removexattr(struct dentry *dentry, const char *name)
  523. {
  524. struct xattr_handler *handler;
  525. struct inode *inode = dentry->d_inode;
  526. handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
  527. if (!handler)
  528. return -EOPNOTSUPP;
  529. return handler->set(inode, name, NULL, 0, XATTR_REPLACE);
  530. }
  531. EXPORT_SYMBOL(generic_getxattr);
  532. EXPORT_SYMBOL(generic_listxattr);
  533. EXPORT_SYMBOL(generic_setxattr);
  534. EXPORT_SYMBOL(generic_removexattr);