xattr.c 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597
  1. /*
  2. File: fs/xattr.c
  3. Extended attribute handling.
  4. Copyright (C) 2001 by Andreas Gruenbacher <a.gruenbacher@computer.org>
  5. Copyright (C) 2001 SGI - Silicon Graphics, Inc <linux-xfs@oss.sgi.com>
  6. Copyright (c) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
  7. */
  8. #include <linux/fs.h>
  9. #include <linux/slab.h>
  10. #include <linux/smp_lock.h>
  11. #include <linux/file.h>
  12. #include <linux/xattr.h>
  13. #include <linux/namei.h>
  14. #include <linux/security.h>
  15. #include <linux/syscalls.h>
  16. #include <linux/module.h>
  17. #include <linux/fsnotify.h>
  18. #include <asm/uaccess.h>
  19. /*
  20. * Check permissions for extended attribute access. This is a bit complicated
  21. * because different namespaces have very different rules.
  22. */
  23. static int
  24. xattr_permission(struct inode *inode, const char *name, int mask)
  25. {
  26. /*
  27. * We can never set or remove an extended attribute on a read-only
  28. * filesystem or on an immutable / append-only inode.
  29. */
  30. if (mask & MAY_WRITE) {
  31. if (IS_RDONLY(inode))
  32. return -EROFS;
  33. if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
  34. return -EPERM;
  35. }
  36. /*
  37. * No restriction for security.* and system.* from the VFS. Decision
  38. * on these is left to the underlying filesystem / security module.
  39. */
  40. if (!strncmp(name, XATTR_SECURITY_PREFIX, XATTR_SECURITY_PREFIX_LEN) ||
  41. !strncmp(name, XATTR_SYSTEM_PREFIX, XATTR_SYSTEM_PREFIX_LEN))
  42. return 0;
  43. /*
  44. * The trusted.* namespace can only accessed by a privilegued user.
  45. */
  46. if (!strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN))
  47. return (capable(CAP_SYS_ADMIN) ? 0 : -EPERM);
  48. if (!strncmp(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) {
  49. if (!S_ISREG(inode->i_mode) &&
  50. (!S_ISDIR(inode->i_mode) || inode->i_mode & S_ISVTX))
  51. return -EPERM;
  52. }
  53. return permission(inode, mask, NULL);
  54. }
  55. int
  56. vfs_setxattr(struct dentry *dentry, char *name, void *value,
  57. size_t size, int flags)
  58. {
  59. struct inode *inode = dentry->d_inode;
  60. int error;
  61. error = xattr_permission(inode, name, MAY_WRITE);
  62. if (error)
  63. return error;
  64. mutex_lock(&inode->i_mutex);
  65. error = security_inode_setxattr(dentry, name, value, size, flags);
  66. if (error)
  67. goto out;
  68. error = -EOPNOTSUPP;
  69. if (inode->i_op->setxattr) {
  70. error = inode->i_op->setxattr(dentry, name, value, size, flags);
  71. if (!error) {
  72. fsnotify_xattr(dentry);
  73. security_inode_post_setxattr(dentry, name, value,
  74. size, flags);
  75. }
  76. } else if (!strncmp(name, XATTR_SECURITY_PREFIX,
  77. XATTR_SECURITY_PREFIX_LEN)) {
  78. const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
  79. error = security_inode_setsecurity(inode, suffix, value,
  80. size, flags);
  81. if (!error)
  82. fsnotify_xattr(dentry);
  83. }
  84. out:
  85. mutex_unlock(&inode->i_mutex);
  86. return error;
  87. }
  88. EXPORT_SYMBOL_GPL(vfs_setxattr);
  89. ssize_t
  90. vfs_getxattr(struct dentry *dentry, char *name, void *value, size_t size)
  91. {
  92. struct inode *inode = dentry->d_inode;
  93. int error;
  94. error = xattr_permission(inode, name, MAY_READ);
  95. if (error)
  96. return error;
  97. error = security_inode_getxattr(dentry, name);
  98. if (error)
  99. return error;
  100. if (inode->i_op->getxattr)
  101. error = inode->i_op->getxattr(dentry, name, value, size);
  102. else
  103. error = -EOPNOTSUPP;
  104. if (!strncmp(name, XATTR_SECURITY_PREFIX,
  105. XATTR_SECURITY_PREFIX_LEN)) {
  106. const char *suffix = name + XATTR_SECURITY_PREFIX_LEN;
  107. int ret = security_inode_getsecurity(inode, suffix, value,
  108. size, error);
  109. /*
  110. * Only overwrite the return value if a security module
  111. * is actually active.
  112. */
  113. if (ret != -EOPNOTSUPP)
  114. error = ret;
  115. }
  116. return error;
  117. }
  118. EXPORT_SYMBOL_GPL(vfs_getxattr);
  119. int
  120. vfs_removexattr(struct dentry *dentry, char *name)
  121. {
  122. struct inode *inode = dentry->d_inode;
  123. int error;
  124. if (!inode->i_op->removexattr)
  125. return -EOPNOTSUPP;
  126. error = xattr_permission(inode, name, MAY_WRITE);
  127. if (error)
  128. return error;
  129. error = security_inode_removexattr(dentry, name);
  130. if (error)
  131. return error;
  132. mutex_lock(&inode->i_mutex);
  133. error = inode->i_op->removexattr(dentry, name);
  134. mutex_unlock(&inode->i_mutex);
  135. if (!error)
  136. fsnotify_xattr(dentry);
  137. return error;
  138. }
  139. EXPORT_SYMBOL_GPL(vfs_removexattr);
  140. /*
  141. * Extended attribute SET operations
  142. */
  143. static long
  144. setxattr(struct dentry *d, char __user *name, void __user *value,
  145. size_t size, int flags)
  146. {
  147. int error;
  148. void *kvalue = NULL;
  149. char kname[XATTR_NAME_MAX + 1];
  150. if (flags & ~(XATTR_CREATE|XATTR_REPLACE))
  151. return -EINVAL;
  152. error = strncpy_from_user(kname, name, sizeof(kname));
  153. if (error == 0 || error == sizeof(kname))
  154. error = -ERANGE;
  155. if (error < 0)
  156. return error;
  157. if (size) {
  158. if (size > XATTR_SIZE_MAX)
  159. return -E2BIG;
  160. kvalue = kmalloc(size, GFP_KERNEL);
  161. if (!kvalue)
  162. return -ENOMEM;
  163. if (copy_from_user(kvalue, value, size)) {
  164. kfree(kvalue);
  165. return -EFAULT;
  166. }
  167. }
  168. error = vfs_setxattr(d, kname, kvalue, size, flags);
  169. kfree(kvalue);
  170. return error;
  171. }
  172. asmlinkage long
  173. sys_setxattr(char __user *path, char __user *name, void __user *value,
  174. size_t size, int flags)
  175. {
  176. struct nameidata nd;
  177. int error;
  178. error = user_path_walk(path, &nd);
  179. if (error)
  180. return error;
  181. error = setxattr(nd.dentry, name, value, size, flags);
  182. path_release(&nd);
  183. return error;
  184. }
  185. asmlinkage long
  186. sys_lsetxattr(char __user *path, char __user *name, void __user *value,
  187. size_t size, int flags)
  188. {
  189. struct nameidata nd;
  190. int error;
  191. error = user_path_walk_link(path, &nd);
  192. if (error)
  193. return error;
  194. error = setxattr(nd.dentry, name, value, size, flags);
  195. path_release(&nd);
  196. return error;
  197. }
  198. asmlinkage long
  199. sys_fsetxattr(int fd, char __user *name, void __user *value,
  200. size_t size, int flags)
  201. {
  202. struct file *f;
  203. int error = -EBADF;
  204. f = fget(fd);
  205. if (!f)
  206. return error;
  207. error = setxattr(f->f_dentry, name, value, size, flags);
  208. fput(f);
  209. return error;
  210. }
  211. /*
  212. * Extended attribute GET operations
  213. */
  214. static ssize_t
  215. getxattr(struct dentry *d, char __user *name, void __user *value, size_t size)
  216. {
  217. ssize_t error;
  218. void *kvalue = NULL;
  219. char kname[XATTR_NAME_MAX + 1];
  220. error = strncpy_from_user(kname, name, sizeof(kname));
  221. if (error == 0 || error == sizeof(kname))
  222. error = -ERANGE;
  223. if (error < 0)
  224. return error;
  225. if (size) {
  226. if (size > XATTR_SIZE_MAX)
  227. size = XATTR_SIZE_MAX;
  228. kvalue = kzalloc(size, GFP_KERNEL);
  229. if (!kvalue)
  230. return -ENOMEM;
  231. }
  232. error = vfs_getxattr(d, kname, kvalue, size);
  233. if (error > 0) {
  234. if (size && copy_to_user(value, kvalue, error))
  235. error = -EFAULT;
  236. } else if (error == -ERANGE && size >= XATTR_SIZE_MAX) {
  237. /* The file system tried to returned a value bigger
  238. than XATTR_SIZE_MAX bytes. Not possible. */
  239. error = -E2BIG;
  240. }
  241. kfree(kvalue);
  242. return error;
  243. }
  244. asmlinkage ssize_t
  245. sys_getxattr(char __user *path, char __user *name, void __user *value,
  246. size_t size)
  247. {
  248. struct nameidata nd;
  249. ssize_t error;
  250. error = user_path_walk(path, &nd);
  251. if (error)
  252. return error;
  253. error = getxattr(nd.dentry, name, value, size);
  254. path_release(&nd);
  255. return error;
  256. }
  257. asmlinkage ssize_t
  258. sys_lgetxattr(char __user *path, char __user *name, void __user *value,
  259. size_t size)
  260. {
  261. struct nameidata nd;
  262. ssize_t error;
  263. error = user_path_walk_link(path, &nd);
  264. if (error)
  265. return error;
  266. error = getxattr(nd.dentry, name, value, size);
  267. path_release(&nd);
  268. return error;
  269. }
  270. asmlinkage ssize_t
  271. sys_fgetxattr(int fd, char __user *name, void __user *value, size_t size)
  272. {
  273. struct file *f;
  274. ssize_t error = -EBADF;
  275. f = fget(fd);
  276. if (!f)
  277. return error;
  278. error = getxattr(f->f_dentry, name, value, size);
  279. fput(f);
  280. return error;
  281. }
  282. /*
  283. * Extended attribute LIST operations
  284. */
  285. static ssize_t
  286. listxattr(struct dentry *d, char __user *list, size_t size)
  287. {
  288. ssize_t error;
  289. char *klist = NULL;
  290. if (size) {
  291. if (size > XATTR_LIST_MAX)
  292. size = XATTR_LIST_MAX;
  293. klist = kmalloc(size, GFP_KERNEL);
  294. if (!klist)
  295. return -ENOMEM;
  296. }
  297. error = security_inode_listxattr(d);
  298. if (error)
  299. goto out;
  300. error = -EOPNOTSUPP;
  301. if (d->d_inode->i_op && d->d_inode->i_op->listxattr) {
  302. error = d->d_inode->i_op->listxattr(d, klist, size);
  303. } else {
  304. error = security_inode_listsecurity(d->d_inode, klist, size);
  305. if (size && error > size)
  306. error = -ERANGE;
  307. }
  308. if (error > 0) {
  309. if (size && copy_to_user(list, klist, error))
  310. error = -EFAULT;
  311. } else if (error == -ERANGE && size >= XATTR_LIST_MAX) {
  312. /* The file system tried to returned a list bigger
  313. than XATTR_LIST_MAX bytes. Not possible. */
  314. error = -E2BIG;
  315. }
  316. out:
  317. kfree(klist);
  318. return error;
  319. }
  320. asmlinkage ssize_t
  321. sys_listxattr(char __user *path, char __user *list, size_t size)
  322. {
  323. struct nameidata nd;
  324. ssize_t error;
  325. error = user_path_walk(path, &nd);
  326. if (error)
  327. return error;
  328. error = listxattr(nd.dentry, list, size);
  329. path_release(&nd);
  330. return error;
  331. }
  332. asmlinkage ssize_t
  333. sys_llistxattr(char __user *path, char __user *list, size_t size)
  334. {
  335. struct nameidata nd;
  336. ssize_t error;
  337. error = user_path_walk_link(path, &nd);
  338. if (error)
  339. return error;
  340. error = listxattr(nd.dentry, list, size);
  341. path_release(&nd);
  342. return error;
  343. }
  344. asmlinkage ssize_t
  345. sys_flistxattr(int fd, char __user *list, size_t size)
  346. {
  347. struct file *f;
  348. ssize_t error = -EBADF;
  349. f = fget(fd);
  350. if (!f)
  351. return error;
  352. error = listxattr(f->f_dentry, list, size);
  353. fput(f);
  354. return error;
  355. }
  356. /*
  357. * Extended attribute REMOVE operations
  358. */
  359. static long
  360. removexattr(struct dentry *d, char __user *name)
  361. {
  362. int error;
  363. char kname[XATTR_NAME_MAX + 1];
  364. error = strncpy_from_user(kname, name, sizeof(kname));
  365. if (error == 0 || error == sizeof(kname))
  366. error = -ERANGE;
  367. if (error < 0)
  368. return error;
  369. return vfs_removexattr(d, kname);
  370. }
  371. asmlinkage long
  372. sys_removexattr(char __user *path, char __user *name)
  373. {
  374. struct nameidata nd;
  375. int error;
  376. error = user_path_walk(path, &nd);
  377. if (error)
  378. return error;
  379. error = removexattr(nd.dentry, name);
  380. path_release(&nd);
  381. return error;
  382. }
  383. asmlinkage long
  384. sys_lremovexattr(char __user *path, char __user *name)
  385. {
  386. struct nameidata nd;
  387. int error;
  388. error = user_path_walk_link(path, &nd);
  389. if (error)
  390. return error;
  391. error = removexattr(nd.dentry, name);
  392. path_release(&nd);
  393. return error;
  394. }
  395. asmlinkage long
  396. sys_fremovexattr(int fd, char __user *name)
  397. {
  398. struct file *f;
  399. int error = -EBADF;
  400. f = fget(fd);
  401. if (!f)
  402. return error;
  403. error = removexattr(f->f_dentry, name);
  404. fput(f);
  405. return error;
  406. }
  407. static const char *
  408. strcmp_prefix(const char *a, const char *a_prefix)
  409. {
  410. while (*a_prefix && *a == *a_prefix) {
  411. a++;
  412. a_prefix++;
  413. }
  414. return *a_prefix ? NULL : a;
  415. }
  416. /*
  417. * In order to implement different sets of xattr operations for each xattr
  418. * prefix with the generic xattr API, a filesystem should create a
  419. * null-terminated array of struct xattr_handler (one for each prefix) and
  420. * hang a pointer to it off of the s_xattr field of the superblock.
  421. *
  422. * The generic_fooxattr() functions will use this list to dispatch xattr
  423. * operations to the correct xattr_handler.
  424. */
  425. #define for_each_xattr_handler(handlers, handler) \
  426. for ((handler) = *(handlers)++; \
  427. (handler) != NULL; \
  428. (handler) = *(handlers)++)
  429. /*
  430. * Find the xattr_handler with the matching prefix.
  431. */
  432. static struct xattr_handler *
  433. xattr_resolve_name(struct xattr_handler **handlers, const char **name)
  434. {
  435. struct xattr_handler *handler;
  436. if (!*name)
  437. return NULL;
  438. for_each_xattr_handler(handlers, handler) {
  439. const char *n = strcmp_prefix(*name, handler->prefix);
  440. if (n) {
  441. *name = n;
  442. break;
  443. }
  444. }
  445. return handler;
  446. }
  447. /*
  448. * Find the handler for the prefix and dispatch its get() operation.
  449. */
  450. ssize_t
  451. generic_getxattr(struct dentry *dentry, const char *name, void *buffer, size_t size)
  452. {
  453. struct xattr_handler *handler;
  454. struct inode *inode = dentry->d_inode;
  455. handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
  456. if (!handler)
  457. return -EOPNOTSUPP;
  458. return handler->get(inode, name, buffer, size);
  459. }
  460. /*
  461. * Combine the results of the list() operation from every xattr_handler in the
  462. * list.
  463. */
  464. ssize_t
  465. generic_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
  466. {
  467. struct inode *inode = dentry->d_inode;
  468. struct xattr_handler *handler, **handlers = inode->i_sb->s_xattr;
  469. unsigned int size = 0;
  470. if (!buffer) {
  471. for_each_xattr_handler(handlers, handler)
  472. size += handler->list(inode, NULL, 0, NULL, 0);
  473. } else {
  474. char *buf = buffer;
  475. for_each_xattr_handler(handlers, handler) {
  476. size = handler->list(inode, buf, buffer_size, NULL, 0);
  477. if (size > buffer_size)
  478. return -ERANGE;
  479. buf += size;
  480. buffer_size -= size;
  481. }
  482. size = buf - buffer;
  483. }
  484. return size;
  485. }
  486. /*
  487. * Find the handler for the prefix and dispatch its set() operation.
  488. */
  489. int
  490. generic_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags)
  491. {
  492. struct xattr_handler *handler;
  493. struct inode *inode = dentry->d_inode;
  494. if (size == 0)
  495. value = ""; /* empty EA, do not remove */
  496. handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
  497. if (!handler)
  498. return -EOPNOTSUPP;
  499. return handler->set(inode, name, value, size, flags);
  500. }
  501. /*
  502. * Find the handler for the prefix and dispatch its set() operation to remove
  503. * any associated extended attribute.
  504. */
  505. int
  506. generic_removexattr(struct dentry *dentry, const char *name)
  507. {
  508. struct xattr_handler *handler;
  509. struct inode *inode = dentry->d_inode;
  510. handler = xattr_resolve_name(inode->i_sb->s_xattr, &name);
  511. if (!handler)
  512. return -EOPNOTSUPP;
  513. return handler->set(inode, name, NULL, 0, XATTR_REPLACE);
  514. }
  515. EXPORT_SYMBOL(generic_getxattr);
  516. EXPORT_SYMBOL(generic_listxattr);
  517. EXPORT_SYMBOL(generic_setxattr);
  518. EXPORT_SYMBOL(generic_removexattr);