xattr.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646
  1. /*
  2. File: fs/xattr.c
  3. Extended attribute handling.
  4. Copyright (C) 2001 by Andreas Gruenbacher <a.gruenbacher@computer.org>
  5. Copyright (C) 2001 SGI - Silicon Graphics, Inc <linux-xfs@oss.sgi.com>
  6. Copyright (c) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
  7. */
  8. #include <linux/fs.h>
  9. #include <linux/slab.h>
  10. #include <linux/file.h>
  11. #include <linux/xattr.h>
  12. #include <linux/namei.h>
  13. #include <linux/security.h>
  14. #include <linux/syscalls.h>
  15. #include <linux/module.h>
  16. #include <linux/fsnotify.h>
  17. #include <linux/audit.h>
  18. #include <asm/uaccess.h>
  19. /*
  20. * Check permissions for extended attribute access. This is a bit complicated
  21. * because different namespaces have very different rules.
  22. */
  23. static int
  24. xattr_permission(struct inode *inode, const char *name, int mask)
  25. {
  26. /*
  27. * We can never set or remove an extended attribute on a read-only
  28. * filesystem or on an immutable / append-only inode.
  29. */
  30. if (mask & MAY_WRITE) {
  31. if (IS_RDONLY(inode))
  32. return -EROFS;
  33. if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
  34. return -EPERM;
  35. }
  36. /*
  37. * No restriction for security.* and system.* from the VFS. Decision
  38. * on these is left to the underlying filesystem / security module.
  39. */
  40. if (!strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) ||
  41. !strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN))
  42. return 0;
  43. /*
  44. * The trusted.* namespace can only be accessed by a privileged user.
  45. */
  46. if (!strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN))
  47. return (capable(CAP_SYS_ADMIN) ? 0 : -EPERM);
  48. /* In user.* namespace, only regular files and directories can have
  49. * extended attributes. For sticky directories, only the owner and
  50. * privileged user can write attributes.
  51. */
  52. if (!strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) {
  53. if (!S_ISREG(inode->i_mode) && !S_ISDIR(inode->i_mode))
  54. return -EPERM;
  55. if (S_ISDIR(inode->i_mode) && (inode->i_mode & S_ISVTX) &&
  56. (mask & MAY_WRITE) && !is_owner_or_cap(inode))
  57. return -EPERM;
  58. }
  59. return permission(inode, mask, NULL);
  60. }
  61. int
  62. vfs_setxattr(struct dentry *dentry, char *name, void *value,
  63. size_t size, int flags)
  64. {
  65. struct inode *inode = dentry->d_inode;
  66. int error;
  67. error = xattr_permission(inode, name, MAY_WRITE);
  68. if (error)
  69. return error;
  70. mutex_lock(&inode->i_mutex);
  71. error = security_inode_setxattr(dentry, name, value, size, flags);
  72. if (error)
  73. goto out;
  74. error = -EOPNOTSUPP;
  75. if (inode->i_op->setxattr) {
  76. error = inode->i_op->setxattr(dentry, name, value, size, flags);
  77. if (!error) {
  78. fsnotify_xattr(dentry);
  79. security_inode_post_setxattr(dentry, name, value,
  80. size, flags);
  81. }
  82. } else if (!strncmp(name, XATTR_SECURITY_PREFIX,
  83. XATTR_SECURITY_PREFIX_LEN)) {
  84. const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
  85. error = security_inode_setsecurity(inode, suffix, value,
  86. size, flags);
  87. if (!error)
  88. fsnotify_xattr(dentry);
  89. }
  90. out:
  91. mutex_unlock(&inode->i_mutex);
  92. return error;
  93. }
  94. EXPORT_SYMBOL_GPL(vfs_setxattr);
  95. ssize_t
  96. xattr_getsecurity(struct inode *inode, const char *name, void *value,
  97. size_t size)
  98. {
  99. void *buffer = NULL;
  100. ssize_t len;
  101. if (!value || !size) {
  102. len = security_inode_getsecurity(inode, name, &buffer, false);
  103. goto out_noalloc;
  104. }
  105. len = security_inode_getsecurity(inode, name, &buffer, true);
  106. if (len < 0)
  107. return len;
  108. if (size < len) {
  109. len = -ERANGE;
  110. goto out;
  111. }
  112. memcpy(value, buffer, len);
  113. out:
  114. security_release_secctx(buffer, len);
  115. out_noalloc:
  116. return len;
  117. }
  118. EXPORT_SYMBOL_GPL(xattr_getsecurity);
  119. ssize_t
  120. vfs_getxattr(struct dentry *dentry, char *name, void *value, size_t size)
  121. {
  122. struct inode *inode = dentry->d_inode;
  123. int error;
  124. error = xattr_permission(inode, name, MAY_READ);
  125. if (error)
  126. return error;
  127. error = security_inode_getxattr(dentry, name);
  128. if (error)
  129. return error;
  130. if (inode->i_op->getxattr)
  131. error = inode->i_op->getxattr(dentry, name, value, size);
  132. else
  133. error = -EOPNOTSUPP;
  134. if (!strncmp(name, XATTR_SECURITY_PREFIX,
  135. XATTR_SECURITY_PREFIX_LEN)) {
  136. const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
  137. int ret = xattr_getsecurity(inode, suffix, value, size);
  138. /*
  139. * Only overwrite the return value if a security module
  140. * is actually active.
  141. */
  142. if (ret != -EOPNOTSUPP)
  143. error = ret;
  144. }
  145. return error;
  146. }
  147. EXPORT_SYMBOL_GPL(vfs_getxattr);
  148. ssize_t
  149. vfs_listxattr(struct dentry *d, char *list, size_t size)
  150. {
  151. ssize_t error;
  152. error = security_inode_listxattr(d);
  153. if (error)
  154. return error;
  155. error = -EOPNOTSUPP;
  156. if (d->d_inode->i_op && d->d_inode->i_op->listxattr) {
  157. error = d->d_inode->i_op->listxattr(d, list, size);
  158. } else {
  159. error = security_inode_listsecurity(d->d_inode, list, size);
  160. if (size && error > size)
  161. error = -ERANGE;
  162. }
  163. return error;
  164. }
  165. EXPORT_SYMBOL_GPL(vfs_listxattr);
  166. int
  167. vfs_removexattr(struct dentry *dentry, char *name)
  168. {
  169. struct inode *inode = dentry->d_inode;
  170. int error;
  171. if (!inode->i_op->removexattr)
  172. return -EOPNOTSUPP;
  173. error = xattr_permission(inode, name, MAY_WRITE);
  174. if (error)
  175. return error;
  176. error = security_inode_removexattr(dentry, name);
  177. if (error)
  178. return error;
  179. mutex_lock(&inode->i_mutex);
  180. error = inode->i_op->removexattr(dentry, name);
  181. mutex_unlock(&inode->i_mutex);
  182. if (!error)
  183. fsnotify_xattr(dentry);
  184. return error;
  185. }
  186. EXPORT_SYMBOL_GPL(vfs_removexattr);
  187. /*
  188. * Extended attribute SET operations
  189. */
  190. static long
  191. setxattr(struct dentry *d, char __user *name, void __user *value,
  192. size_t size, int flags)
  193. {
  194. int error;
  195. void *kvalue = NULL;
  196. char kname[XATTR_NAME_MAX + 1];
  197. if (flags & ~(XATTR_CREATE|XATTR_REPLACE))
  198. return -EINVAL;
  199. error = strncpy_from_user(kname, name, sizeof(kname));
  200. if (error == 0 || error == sizeof(kname))
  201. error = -ERANGE;
  202. if (error < 0)
  203. return error;
  204. if (size) {
  205. if (size > XATTR_SIZE_MAX)
  206. return -E2BIG;
  207. kvalue = kmalloc(size, GFP_KERNEL);
  208. if (!kvalue)
  209. return -ENOMEM;
  210. if (copy_from_user(kvalue, value, size)) {
  211. kfree(kvalue);
  212. return -EFAULT;
  213. }
  214. }
  215. error = vfs_setxattr(d, kname, kvalue, size, flags);
  216. kfree(kvalue);
  217. return error;
  218. }
  219. asmlinkage long
  220. sys_setxattr(char __user *path, char __user *name, void __user *value,
  221. size_t size, int flags)
  222. {
  223. struct nameidata nd;
  224. int error;
  225. error = user_path_walk(path, &nd);
  226. if (error)
  227. return error;
  228. error = setxattr(nd.dentry, name, value, size, flags);
  229. path_release(&nd);
  230. return error;
  231. }
  232. asmlinkage long
  233. sys_lsetxattr(char __user *path, char __user *name, void __user *value,
  234. size_t size, int flags)
  235. {
  236. struct nameidata nd;
  237. int error;
  238. error = user_path_walk_link(path, &nd);
  239. if (error)
  240. return error;
  241. error = setxattr(nd.dentry, name, value, size, flags);
  242. path_release(&nd);
  243. return error;
  244. }
  245. asmlinkage long
  246. sys_fsetxattr(int fd, char __user *name, void __user *value,
  247. size_t size, int flags)
  248. {
  249. struct file *f;
  250. struct dentry *dentry;
  251. int error = -EBADF;
  252. f = fget(fd);
  253. if (!f)
  254. return error;
  255. dentry = f->f_path.dentry;
  256. audit_inode(NULL, dentry);
  257. error = setxattr(dentry, name, value, size, flags);
  258. fput(f);
  259. return error;
  260. }
  261. /*
  262. * Extended attribute GET operations
  263. */
  264. static ssize_t
  265. getxattr(struct dentry *d, char __user *name, void __user *value, size_t size)
  266. {
  267. ssize_t error;
  268. void *kvalue = NULL;
  269. char kname[XATTR_NAME_MAX + 1];
  270. error = strncpy_from_user(kname, name, sizeof(kname));
  271. if (error == 0 || error == sizeof(kname))
  272. error = -ERANGE;
  273. if (error < 0)
  274. return error;
  275. if (size) {
  276. if (size > XATTR_SIZE_MAX)
  277. size = XATTR_SIZE_MAX;
  278. kvalue = kzalloc(size, GFP_KERNEL);
  279. if (!kvalue)
  280. return -ENOMEM;
  281. }
  282. error = vfs_getxattr(d, kname, kvalue, size);
  283. if (error > 0) {
  284. if (size && copy_to_user(value, kvalue, error))
  285. error = -EFAULT;
  286. } else if (error == -ERANGE && size >= XATTR_SIZE_MAX) {
  287. /* The file system tried to returned a value bigger
  288. than XATTR_SIZE_MAX bytes. Not possible. */
  289. error = -E2BIG;
  290. }
  291. kfree(kvalue);
  292. return error;
  293. }
  294. asmlinkage ssize_t
  295. sys_getxattr(char __user *path, char __user *name, void __user *value,
  296. size_t size)
  297. {
  298. struct nameidata nd;
  299. ssize_t error;
  300. error = user_path_walk(path, &nd);
  301. if (error)
  302. return error;
  303. error = getxattr(nd.dentry, name, value, size);
  304. path_release(&nd);
  305. return error;
  306. }
  307. asmlinkage ssize_t
  308. sys_lgetxattr(char __user *path, char __user *name, void __user *value,
  309. size_t size)
  310. {
  311. struct nameidata nd;
  312. ssize_t error;
  313. error = user_path_walk_link(path, &nd);
  314. if (error)
  315. return error;
  316. error = getxattr(nd.dentry, name, value, size);
  317. path_release(&nd);
  318. return error;
  319. }
  320. asmlinkage ssize_t
  321. sys_fgetxattr(int fd, char __user *name, void __user *value, size_t size)
  322. {
  323. struct file *f;
  324. ssize_t error = -EBADF;
  325. f = fget(fd);
  326. if (!f)
  327. return error;
  328. audit_inode(NULL, f->f_path.dentry);
  329. error = getxattr(f->f_path.dentry, name, value, size);
  330. fput(f);
  331. return error;
  332. }
  333. /*
  334. * Extended attribute LIST operations
  335. */
  336. static ssize_t
  337. listxattr(struct dentry *d, char __user *list, size_t size)
  338. {
  339. ssize_t error;
  340. char *klist = NULL;
  341. if (size) {
  342. if (size > XATTR_LIST_MAX)
  343. size = XATTR_LIST_MAX;
  344. klist = kmalloc(size, GFP_KERNEL);
  345. if (!klist)
  346. return -ENOMEM;
  347. }
  348. error = vfs_listxattr(d, klist, size);
  349. if (error > 0) {
  350. if (size && copy_to_user(list, klist, error))
  351. error = -EFAULT;
  352. } else if (error == -ERANGE && size >= XATTR_LIST_MAX) {
  353. /* The file system tried to returned a list bigger
  354. than XATTR_LIST_MAX bytes. Not possible. */
  355. error = -E2BIG;
  356. }
  357. kfree(klist);
  358. return error;
  359. }
  360. asmlinkage ssize_t
  361. sys_listxattr(char __user *path, char __user *list, size_t size)
  362. {
  363. struct nameidata nd;
  364. ssize_t error;
  365. error = user_path_walk(path, &nd);
  366. if (error)
  367. return error;
  368. error = listxattr(nd.dentry, list, size);
  369. path_release(&nd);
  370. return error;
  371. }
  372. asmlinkage ssize_t
  373. sys_llistxattr(char __user *path, char __user *list, size_t size)
  374. {
  375. struct nameidata nd;
  376. ssize_t error;
  377. error = user_path_walk_link(path, &nd);
  378. if (error)
  379. return error;
  380. error = listxattr(nd.dentry, list, size);
  381. path_release(&nd);
  382. return error;
  383. }
  384. asmlinkage ssize_t
  385. sys_flistxattr(int fd, char __user *list, size_t size)
  386. {
  387. struct file *f;
  388. ssize_t error = -EBADF;
  389. f = fget(fd);
  390. if (!f)
  391. return error;
  392. audit_inode(NULL, f->f_path.dentry);
  393. error = listxattr(f->f_path.dentry, list, size);
  394. fput(f);
  395. return error;
  396. }
  397. /*
  398. * Extended attribute REMOVE operations
  399. */
  400. static long
  401. removexattr(struct dentry *d, char __user *name)
  402. {
  403. int error;
  404. char kname[XATTR_NAME_MAX + 1];
  405. error = strncpy_from_user(kname, name, sizeof(kname));
  406. if (error == 0 || error == sizeof(kname))
  407. error = -ERANGE;
  408. if (error < 0)
  409. return error;
  410. return vfs_removexattr(d, kname);
  411. }
  412. asmlinkage long
  413. sys_removexattr(char __user *path, char __user *name)
  414. {
  415. struct nameidata nd;
  416. int error;
  417. error = user_path_walk(path, &nd);
  418. if (error)
  419. return error;
  420. error = removexattr(nd.dentry, name);
  421. path_release(&nd);
  422. return error;
  423. }
  424. asmlinkage long
  425. sys_lremovexattr(char __user *path, char __user *name)
  426. {
  427. struct nameidata nd;
  428. int error;
  429. error = user_path_walk_link(path, &nd);
  430. if (error)
  431. return error;
  432. error = removexattr(nd.dentry, name);
  433. path_release(&nd);
  434. return error;
  435. }
  436. asmlinkage long
  437. sys_fremovexattr(int fd, char __user *name)
  438. {
  439. struct file *f;
  440. struct dentry *dentry;
  441. int error = -EBADF;
  442. f = fget(fd);
  443. if (!f)
  444. return error;
  445. dentry = f->f_path.dentry;
  446. audit_inode(NULL, dentry);
  447. error = removexattr(dentry, name);
  448. fput(f);
  449. return error;
  450. }
  451. static const char *
  452. strcmp_prefix(const char *a, const char *a_prefix)
  453. {
  454. while (*a_prefix && *a == *a_prefix) {
  455. a++;
  456. a_prefix++;
  457. }
  458. return *a_prefix ? NULL : a;
  459. }
  460. /*
  461. * In order to implement different sets of xattr operations for each xattr
  462. * prefix with the generic xattr API, a filesystem should create a
  463. * null-terminated array of struct xattr_handler (one for each prefix) and
  464. * hang a pointer to it off of the s_xattr field of the superblock.
  465. *
  466. * The generic_fooxattr() functions will use this list to dispatch xattr
  467. * operations to the correct xattr_handler.
  468. */
  469. #define for_each_xattr_handler(handlers, handler) \
  470. for ((handler) = *(handlers)++; \
  471. (handler) != NULL; \
  472. (handler) = *(handlers)++)
  473. /*
  474. * Find the xattr_handler with the matching prefix.
  475. */
  476. static struct xattr_handler *
  477. xattr_resolve_name(struct xattr_handler **handlers, const char **name)
  478. {
  479. struct xattr_handler *handler;
  480. if (!*name)
  481. return NULL;
  482. for_each_xattr_handler(handlers, handler) {
  483. const char *n = strcmp_prefix(*name, handler->prefix);
  484. if (n) {
  485. *name = n;
  486. break;
  487. }
  488. }
  489. return handler;
  490. }
  491. /*
  492. * Find the handler for the prefix and dispatch its get() operation.
  493. */
  494. ssize_t
  495. generic_getxattr(struct dentry *dentry, const char *name, void *buffer, size_t size)
  496. {
  497. struct xattr_handler *handler;
  498. struct inode *inode = dentry->d_inode;
  499. handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
  500. if (!handler)
  501. return -EOPNOTSUPP;
  502. return handler->get(inode, name, buffer, size);
  503. }
  504. /*
  505. * Combine the results of the list() operation from every xattr_handler in the
  506. * list.
  507. */
  508. ssize_t
  509. generic_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
  510. {
  511. struct inode *inode = dentry->d_inode;
  512. struct xattr_handler *handler, **handlers = inode->i_sb->s_xattr;
  513. unsigned int size = 0;
  514. if (!buffer) {
  515. for_each_xattr_handler(handlers, handler)
  516. size += handler->list(inode, NULL, 0, NULL, 0);
  517. } else {
  518. char *buf = buffer;
  519. for_each_xattr_handler(handlers, handler) {
  520. size = handler->list(inode, buf, buffer_size, NULL, 0);
  521. if (size > buffer_size)
  522. return -ERANGE;
  523. buf += size;
  524. buffer_size -= size;
  525. }
  526. size = buf - buffer;
  527. }
  528. return size;
  529. }
  530. /*
  531. * Find the handler for the prefix and dispatch its set() operation.
  532. */
  533. int
  534. generic_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags)
  535. {
  536. struct xattr_handler *handler;
  537. struct inode *inode = dentry->d_inode;
  538. if (size == 0)
  539. value = ""; /* empty EA, do not remove */
  540. handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
  541. if (!handler)
  542. return -EOPNOTSUPP;
  543. return handler->set(inode, name, value, size, flags);
  544. }
  545. /*
  546. * Find the handler for the prefix and dispatch its set() operation to remove
  547. * any associated extended attribute.
  548. */
  549. int
  550. generic_removexattr(struct dentry *dentry, const char *name)
  551. {
  552. struct xattr_handler *handler;
  553. struct inode *inode = dentry->d_inode;
  554. handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
  555. if (!handler)
  556. return -EOPNOTSUPP;
  557. return handler->set(inode, name, NULL, 0, XATTR_REPLACE);
  558. }
  559. EXPORT_SYMBOL(generic_getxattr);
  560. EXPORT_SYMBOL(generic_listxattr);
  561. EXPORT_SYMBOL(generic_setxattr);
  562. EXPORT_SYMBOL(generic_removexattr);