Blame view
fs/attr.c
6.71 KB
1da177e4c Linux-2.6.12-rc2 |
1 2 3 4 5 6 7 8 9 10 11 |
/* * linux/fs/attr.c * * Copyright (C) 1991, 1992 Linus Torvalds * changes by Thomas Schoebel-Theuer */ #include <linux/module.h> #include <linux/time.h> #include <linux/mm.h> #include <linux/string.h> |
16f7e0fe2 [PATCH] capable/c... |
12 |
#include <linux/capability.h> |
0eeca2830 [PATCH] inotify |
13 |
#include <linux/fsnotify.h> |
1da177e4c Linux-2.6.12-rc2 |
14 |
#include <linux/fcntl.h> |
1da177e4c Linux-2.6.12-rc2 |
15 |
#include <linux/security.h> |
975d29437 evm: imbed evm_in... |
16 |
#include <linux/evm.h> |
1da177e4c Linux-2.6.12-rc2 |
17 |
|
2c27c65ed check ATTR_SIZE c... |
18 19 20 21 22 23 24 25 26 27 28 29 |
/** * inode_change_ok - check if attribute changes to an inode are allowed * @inode: inode to check * @attr: attributes to change * * Check if we are allowed to change the attributes contained in @attr * in the given inode. This includes the normal unix access permission * checks, as well as checks for rlimits and others. * * Should be called as the first thing in ->setattr implementations, * possibly after taking additional locks. */ |
25d9e2d15 truncate: new hel... |
30 |
int inode_change_ok(const struct inode *inode, struct iattr *attr) |
1da177e4c Linux-2.6.12-rc2 |
31 |
{ |
1da177e4c Linux-2.6.12-rc2 |
32 |
unsigned int ia_valid = attr->ia_valid; |
2c27c65ed check ATTR_SIZE c... |
33 34 35 36 37 38 39 40 41 |
/* * First check size constraints. These can't be overriden using * ATTR_FORCE. */ if (ia_valid & ATTR_SIZE) { int error = inode_newsize_ok(inode, attr->ia_size); if (error) return error; } |
1da177e4c Linux-2.6.12-rc2 |
42 43 |
/* If force is set do it anyway. */ if (ia_valid & ATTR_FORCE) |
2c27c65ed check ATTR_SIZE c... |
44 |
return 0; |
1da177e4c Linux-2.6.12-rc2 |
45 46 47 |
/* Make sure a caller can chown. */ if ((ia_valid & ATTR_UID) && |
da9592ede CRED: Wrap task c... |
48 |
(current_fsuid() != inode->i_uid || |
1da177e4c Linux-2.6.12-rc2 |
49 |
attr->ia_uid != inode->i_uid) && !capable(CAP_CHOWN)) |
2c27c65ed check ATTR_SIZE c... |
50 |
return -EPERM; |
1da177e4c Linux-2.6.12-rc2 |
51 52 53 |
/* Make sure caller can chgrp. */ if ((ia_valid & ATTR_GID) && |
da9592ede CRED: Wrap task c... |
54 |
(current_fsuid() != inode->i_uid || |
1da177e4c Linux-2.6.12-rc2 |
55 56 |
(!in_group_p(attr->ia_gid) && attr->ia_gid != inode->i_gid)) && !capable(CAP_CHOWN)) |
2c27c65ed check ATTR_SIZE c... |
57 |
return -EPERM; |
1da177e4c Linux-2.6.12-rc2 |
58 59 60 |
/* Make sure a caller can chmod. */ if (ia_valid & ATTR_MODE) { |
2e1496707 userns: rename is... |
61 |
if (!inode_owner_or_capable(inode)) |
2c27c65ed check ATTR_SIZE c... |
62 |
return -EPERM; |
1da177e4c Linux-2.6.12-rc2 |
63 64 65 66 67 68 69 |
/* Also check the setgid bit! */ if (!in_group_p((ia_valid & ATTR_GID) ? attr->ia_gid : inode->i_gid) && !capable(CAP_FSETID)) attr->ia_mode &= ~S_ISGID; } /* Check for setting the inode time. */ |
9767d7495 [patch 1/4] vfs: ... |
70 |
if (ia_valid & (ATTR_MTIME_SET | ATTR_ATIME_SET | ATTR_TIMES_SET)) { |
2e1496707 userns: rename is... |
71 |
if (!inode_owner_or_capable(inode)) |
2c27c65ed check ATTR_SIZE c... |
72 |
return -EPERM; |
1da177e4c Linux-2.6.12-rc2 |
73 |
} |
2c27c65ed check ATTR_SIZE c... |
74 75 |
return 0; |
1da177e4c Linux-2.6.12-rc2 |
76 |
} |
1da177e4c Linux-2.6.12-rc2 |
77 |
EXPORT_SYMBOL(inode_change_ok); |
25d9e2d15 truncate: new hel... |
78 79 80 81 82 83 |
/** * inode_newsize_ok - may this inode be truncated to a given size * @inode: the inode to be truncated * @offset: the new size to assign to the inode * @Returns: 0 on success, -ve errno on failure * |
7bb46a673 fs: introduce new... |
84 85 |
* inode_newsize_ok must be called with i_mutex held. * |
25d9e2d15 truncate: new hel... |
86 87 88 89 90 91 |
* inode_newsize_ok will check filesystem limits and ulimits to check that the * new inode size is within limits. inode_newsize_ok will also send SIGXFSZ * when necessary. Caller must not proceed with inode size change if failure is * returned. @inode must be a file (not directory), with appropriate * permissions to allow truncate (inode_newsize_ok does NOT check these * conditions). |
25d9e2d15 truncate: new hel... |
92 93 94 95 96 |
*/ int inode_newsize_ok(const struct inode *inode, loff_t offset) { if (inode->i_size < offset) { unsigned long limit; |
d554ed895 fs: use rlimit he... |
97 |
limit = rlimit(RLIMIT_FSIZE); |
25d9e2d15 truncate: new hel... |
98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 |
if (limit != RLIM_INFINITY && offset > limit) goto out_sig; if (offset > inode->i_sb->s_maxbytes) goto out_big; } else { /* * truncation of in-use swapfiles is disallowed - it would * cause subsequent swapout to scribble on the now-freed * blocks. */ if (IS_SWAPFILE(inode)) return -ETXTBSY; } return 0; out_sig: send_sig(SIGXFSZ, current, 0); out_big: return -EFBIG; } EXPORT_SYMBOL(inode_newsize_ok); |
7bb46a673 fs: introduce new... |
119 |
/** |
6a1a90ad1 rename generic_se... |
120 |
* setattr_copy - copy simple metadata updates into the generic inode |
7bb46a673 fs: introduce new... |
121 122 123 |
* @inode: the inode to be updated * @attr: the new attributes * |
6a1a90ad1 rename generic_se... |
124 |
* setattr_copy must be called with i_mutex held. |
7bb46a673 fs: introduce new... |
125 |
* |
6a1a90ad1 rename generic_se... |
126 |
* setattr_copy updates the inode's metadata with that specified |
25985edce Fix common misspe... |
127 |
* in attr. Noticeably missing is inode size update, which is more complex |
2c27c65ed check ATTR_SIZE c... |
128 |
* as it requires pagecache updates. |
7bb46a673 fs: introduce new... |
129 130 131 132 133 |
* * The inode is not marked as dirty after this operation. The rationale is * that for "simple" filesystems, the struct inode is the inode storage. * The caller is free to mark the inode dirty afterwards if needed. */ |
6a1a90ad1 rename generic_se... |
134 |
void setattr_copy(struct inode *inode, const struct iattr *attr) |
1da177e4c Linux-2.6.12-rc2 |
135 136 |
{ unsigned int ia_valid = attr->ia_valid; |
4a30131e7 [PATCH] Fix some ... |
137 |
|
1da177e4c Linux-2.6.12-rc2 |
138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 |
if (ia_valid & ATTR_UID) inode->i_uid = attr->ia_uid; if (ia_valid & ATTR_GID) inode->i_gid = attr->ia_gid; if (ia_valid & ATTR_ATIME) inode->i_atime = timespec_trunc(attr->ia_atime, inode->i_sb->s_time_gran); if (ia_valid & ATTR_MTIME) inode->i_mtime = timespec_trunc(attr->ia_mtime, inode->i_sb->s_time_gran); if (ia_valid & ATTR_CTIME) inode->i_ctime = timespec_trunc(attr->ia_ctime, inode->i_sb->s_time_gran); if (ia_valid & ATTR_MODE) { umode_t mode = attr->ia_mode; if (!in_group_p(inode->i_gid) && !capable(CAP_FSETID)) mode &= ~S_ISGID; inode->i_mode = mode; } |
7bb46a673 fs: introduce new... |
158 |
} |
6a1a90ad1 rename generic_se... |
159 |
EXPORT_SYMBOL(setattr_copy); |
7bb46a673 fs: introduce new... |
160 |
|
1da177e4c Linux-2.6.12-rc2 |
161 162 163 |
int notify_change(struct dentry * dentry, struct iattr * attr) { struct inode *inode = dentry->d_inode; |
8d334acdd switch is_sxid() ... |
164 |
umode_t mode = inode->i_mode; |
1da177e4c Linux-2.6.12-rc2 |
165 166 167 |
int error; struct timespec now; unsigned int ia_valid = attr->ia_valid; |
beb29e058 [patch 4/4] vfs: ... |
168 169 170 171 |
if (ia_valid & (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_TIMES_SET)) { if (IS_IMMUTABLE(inode) || IS_APPEND(inode)) return -EPERM; } |
69b457329 Cache xattr secur... |
172 |
if ((ia_valid & ATTR_MODE)) { |
8d334acdd switch is_sxid() ... |
173 |
umode_t amode = attr->ia_mode; |
69b457329 Cache xattr secur... |
174 175 176 177 |
/* Flag setting protected by i_mutex */ if (is_sxid(amode)) inode->i_flags &= ~S_NOSEC; } |
1da177e4c Linux-2.6.12-rc2 |
178 179 180 181 182 183 184 |
now = current_fs_time(inode->i_sb); attr->ia_ctime = now; if (!(ia_valid & ATTR_ATIME_SET)) attr->ia_atime = now; if (!(ia_valid & ATTR_MTIME_SET)) attr->ia_mtime = now; |
b53767719 Implement file po... |
185 186 187 188 189 190 191 192 193 |
if (ia_valid & ATTR_KILL_PRIV) { attr->ia_valid &= ~ATTR_KILL_PRIV; ia_valid &= ~ATTR_KILL_PRIV; error = security_inode_need_killpriv(dentry); if (error > 0) error = security_inode_killpriv(dentry); if (error) return error; } |
6de0ec00b VFS: make notify_... |
194 195 196 197 198 199 200 201 202 203 204 |
/* * We now pass ATTR_KILL_S*ID to the lower level setattr function so * that the function has the ability to reinterpret a mode change * that's due to these bits. This adds an implicit restriction that * no function will ever call notify_change with both ATTR_MODE and * ATTR_KILL_S*ID set. */ if ((ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID)) && (ia_valid & ATTR_MODE)) BUG(); |
1da177e4c Linux-2.6.12-rc2 |
205 |
if (ia_valid & ATTR_KILL_SUID) { |
1da177e4c Linux-2.6.12-rc2 |
206 |
if (mode & S_ISUID) { |
6de0ec00b VFS: make notify_... |
207 208 |
ia_valid = attr->ia_valid |= ATTR_MODE; attr->ia_mode = (inode->i_mode & ~S_ISUID); |
1da177e4c Linux-2.6.12-rc2 |
209 210 211 |
} } if (ia_valid & ATTR_KILL_SGID) { |
1da177e4c Linux-2.6.12-rc2 |
212 213 214 215 216 217 218 219 |
if ((mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { if (!(ia_valid & ATTR_MODE)) { ia_valid = attr->ia_valid |= ATTR_MODE; attr->ia_mode = inode->i_mode; } attr->ia_mode &= ~S_ISGID; } } |
6de0ec00b VFS: make notify_... |
220 |
if (!(attr->ia_valid & ~(ATTR_KILL_SUID | ATTR_KILL_SGID))) |
1da177e4c Linux-2.6.12-rc2 |
221 |
return 0; |
a77b72da2 [patch] vfs: make... |
222 223 224 |
error = security_inode_setattr(dentry, attr); if (error) return error; |
eef2380c1 default to simple... |
225 |
if (inode->i_op->setattr) |
a77b72da2 [patch] vfs: make... |
226 |
error = inode->i_op->setattr(dentry, attr); |
eef2380c1 default to simple... |
227 228 |
else error = simple_setattr(dentry, attr); |
1da177e4c Linux-2.6.12-rc2 |
229 |
|
975d29437 evm: imbed evm_in... |
230 |
if (!error) { |
0eeca2830 [PATCH] inotify |
231 |
fsnotify_change(dentry, ia_valid); |
975d29437 evm: imbed evm_in... |
232 233 |
evm_inode_post_setattr(dentry, ia_valid); } |
0eeca2830 [PATCH] inotify |
234 |
|
1da177e4c Linux-2.6.12-rc2 |
235 236 237 238 |
return error; } EXPORT_SYMBOL(notify_change); |