Blame view

fs/attr.c 13.5 KB
b24413180   Greg Kroah-Hartman   License cleanup: ...
1
  // SPDX-License-Identifier: GPL-2.0
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2
3
4
5
6
7
  /*
   *  linux/fs/attr.c
   *
   *  Copyright (C) 1991, 1992  Linus Torvalds
   *  changes by Thomas Schoebel-Theuer
   */
630d9c472   Paul Gortmaker   fs: reduce the us...
8
  #include <linux/export.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
9
10
11
  #include <linux/time.h>
  #include <linux/mm.h>
  #include <linux/string.h>
3f07c0144   Ingo Molnar   sched/headers: Pr...
12
  #include <linux/sched/signal.h>
16f7e0fe2   Randy Dunlap   [PATCH] capable/c...
13
  #include <linux/capability.h>
0eeca2830   Robert Love   [PATCH] inotify
14
  #include <linux/fsnotify.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
15
  #include <linux/fcntl.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
16
  #include <linux/security.h>
975d29437   Mimi Zohar   evm: imbed evm_in...
17
  #include <linux/evm.h>
9957a5043   Mimi Zohar   ima: add inode_po...
18
  #include <linux/ima.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
19

2f221d6f7   Christian Brauner   attr: handle idma...
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  /**
   * chown_ok - verify permissions to chown inode
   * @mnt_userns:	user namespace of the mount @inode was found from
   * @inode:	inode to check permissions on
   * @uid:	uid to chown @inode to
   *
   * If the inode has been found through an idmapped mount the user namespace of
   * the vfsmount must be passed through @mnt_userns. This function will then
   * take care to map the inode according to @mnt_userns before checking
   * permissions. On non-idmapped mounts or if permission checking is to be
   * performed on the raw inode simply passs init_user_ns.
   */
  static bool chown_ok(struct user_namespace *mnt_userns,
  		     const struct inode *inode,
  		     kuid_t uid)
0031181c4   Eric W. Biederman   fs: Allow superbl...
35
  {
2f221d6f7   Christian Brauner   attr: handle idma...
36
  	kuid_t kuid = i_uid_into_mnt(mnt_userns, inode);
7c48010ba   Christian Brauner   fs: handle circul...
37
  	if (uid_eq(current_fsuid(), kuid) && uid_eq(uid, inode->i_uid))
0031181c4   Eric W. Biederman   fs: Allow superbl...
38
  		return true;
2f221d6f7   Christian Brauner   attr: handle idma...
39
  	if (capable_wrt_inode_uidgid(mnt_userns, inode, CAP_CHOWN))
0031181c4   Eric W. Biederman   fs: Allow superbl...
40
  		return true;
2f221d6f7   Christian Brauner   attr: handle idma...
41
  	if (uid_eq(kuid, INVALID_UID) &&
0031181c4   Eric W. Biederman   fs: Allow superbl...
42
43
44
45
  	    ns_capable(inode->i_sb->s_user_ns, CAP_CHOWN))
  		return true;
  	return false;
  }
2f221d6f7   Christian Brauner   attr: handle idma...
46
47
48
49
50
51
52
53
54
55
56
57
58
59
  /**
   * chgrp_ok - verify permissions to chgrp inode
   * @mnt_userns:	user namespace of the mount @inode was found from
   * @inode:	inode to check permissions on
   * @gid:	gid to chown @inode to
   *
   * If the inode has been found through an idmapped mount the user namespace of
   * the vfsmount must be passed through @mnt_userns. This function will then
   * take care to map the inode according to @mnt_userns before checking
   * permissions. On non-idmapped mounts or if permission checking is to be
   * performed on the raw inode simply passs init_user_ns.
   */
  static bool chgrp_ok(struct user_namespace *mnt_userns,
  		     const struct inode *inode, kgid_t gid)
0031181c4   Eric W. Biederman   fs: Allow superbl...
60
  {
2f221d6f7   Christian Brauner   attr: handle idma...
61
  	kgid_t kgid = i_gid_into_mnt(mnt_userns, inode);
e8d4878dc   Christian Brauner   fs: account for g...
62
63
64
65
66
67
68
69
70
  	if (uid_eq(current_fsuid(), i_uid_into_mnt(mnt_userns, inode))) {
  		kgid_t mapped_gid;
  
  		if (gid_eq(gid, inode->i_gid))
  			return true;
  		mapped_gid = mapped_kgid_fs(mnt_userns, i_user_ns(inode), gid);
  		if (in_group_p(mapped_gid))
  			return true;
  	}
2f221d6f7   Christian Brauner   attr: handle idma...
71
  	if (capable_wrt_inode_uidgid(mnt_userns, inode, CAP_CHOWN))
0031181c4   Eric W. Biederman   fs: Allow superbl...
72
  		return true;
2f221d6f7   Christian Brauner   attr: handle idma...
73
  	if (gid_eq(kgid, INVALID_GID) &&
0031181c4   Eric W. Biederman   fs: Allow superbl...
74
75
76
77
  	    ns_capable(inode->i_sb->s_user_ns, CAP_CHOWN))
  		return true;
  	return false;
  }
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
78
  /**
31051c85b   Jan Kara   fs: Give dentry t...
79
   * setattr_prepare - check if attribute changes to a dentry are allowed
2f221d6f7   Christian Brauner   attr: handle idma...
80
   * @mnt_userns:	user namespace of the mount the inode was found from
31051c85b   Jan Kara   fs: Give dentry t...
81
   * @dentry:	dentry to check
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
82
83
84
   * @attr:	attributes to change
   *
   * Check if we are allowed to change the attributes contained in @attr
31051c85b   Jan Kara   fs: Give dentry t...
85
86
87
88
   * in the given dentry.  This includes the normal unix access permission
   * checks, as well as checks for rlimits and others. The function also clears
   * SGID bit from mode if user is not allowed to set it. Also file capabilities
   * and IMA extended attributes are cleared if ATTR_KILL_PRIV is set.
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
89
   *
2f221d6f7   Christian Brauner   attr: handle idma...
90
91
92
93
94
95
   * If the inode has been found through an idmapped mount the user namespace of
   * the vfsmount must be passed through @mnt_userns. This function will then
   * take care to map the inode according to @mnt_userns before checking
   * permissions. On non-idmapped mounts or if permission checking is to be
   * performed on the raw inode simply passs init_user_ns.
   *
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
96
97
98
   * Should be called as the first thing in ->setattr implementations,
   * possibly after taking additional locks.
   */
2f221d6f7   Christian Brauner   attr: handle idma...
99
100
  int setattr_prepare(struct user_namespace *mnt_userns, struct dentry *dentry,
  		    struct iattr *attr)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
101
  {
31051c85b   Jan Kara   fs: Give dentry t...
102
  	struct inode *inode = d_inode(dentry);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
103
  	unsigned int ia_valid = attr->ia_valid;
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
104
105
106
107
108
109
110
111
112
  	/*
  	 * First check size constraints.  These can't be overriden using
  	 * ATTR_FORCE.
  	 */
  	if (ia_valid & ATTR_SIZE) {
  		int error = inode_newsize_ok(inode, attr->ia_size);
  		if (error)
  			return error;
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
113
114
  	/* If force is set do it anyway. */
  	if (ia_valid & ATTR_FORCE)
030b533c4   Jan Kara   fs: Avoid prematu...
115
  		goto kill_priv;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
116
117
  
  	/* Make sure a caller can chown. */
2f221d6f7   Christian Brauner   attr: handle idma...
118
  	if ((ia_valid & ATTR_UID) && !chown_ok(mnt_userns, inode, attr->ia_uid))
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
119
  		return -EPERM;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
120
121
  
  	/* Make sure caller can chgrp. */
2f221d6f7   Christian Brauner   attr: handle idma...
122
  	if ((ia_valid & ATTR_GID) && !chgrp_ok(mnt_userns, inode, attr->ia_gid))
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
123
  		return -EPERM;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
124
125
126
  
  	/* Make sure a caller can chmod. */
  	if (ia_valid & ATTR_MODE) {
e8d4878dc   Christian Brauner   fs: account for g...
127
  		kgid_t mapped_gid;
2f221d6f7   Christian Brauner   attr: handle idma...
128
  		if (!inode_owner_or_capable(mnt_userns, inode))
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
129
  			return -EPERM;
e8d4878dc   Christian Brauner   fs: account for g...
130
131
132
133
134
135
  
  		if (ia_valid & ATTR_GID)
  			mapped_gid = mapped_kgid_fs(mnt_userns,
  						i_user_ns(inode), attr->ia_gid);
  		else
  			mapped_gid = i_gid_into_mnt(mnt_userns, inode);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
136
  		/* Also check the setgid bit! */
e8d4878dc   Christian Brauner   fs: account for g...
137
138
  		if (!in_group_p(mapped_gid) &&
  		    !capable_wrt_inode_uidgid(mnt_userns, inode, CAP_FSETID))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
139
140
141
142
  			attr->ia_mode &= ~S_ISGID;
  	}
  
  	/* Check for setting the inode time. */
9767d7495   Miklos Szeredi   [patch 1/4] vfs: ...
143
  	if (ia_valid & (ATTR_MTIME_SET | ATTR_ATIME_SET | ATTR_TIMES_SET)) {
2f221d6f7   Christian Brauner   attr: handle idma...
144
  		if (!inode_owner_or_capable(mnt_userns, inode))
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
145
  			return -EPERM;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
146
  	}
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
147

030b533c4   Jan Kara   fs: Avoid prematu...
148
149
150
151
  kill_priv:
  	/* User has permission for the change */
  	if (ia_valid & ATTR_KILL_PRIV) {
  		int error;
71bc356f9   Christian Brauner   commoncap: handle...
152
  		error = security_inode_killpriv(mnt_userns, dentry);
030b533c4   Jan Kara   fs: Avoid prematu...
153
154
155
  		if (error)
  			return error;
  	}
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
156
  	return 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
157
  }
31051c85b   Jan Kara   fs: Give dentry t...
158
  EXPORT_SYMBOL(setattr_prepare);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
159

25d9e2d15   npiggin@suse.de   truncate: new hel...
160
161
162
163
  /**
   * inode_newsize_ok - may this inode be truncated to a given size
   * @inode:	the inode to be truncated
   * @offset:	the new size to assign to the inode
25d9e2d15   npiggin@suse.de   truncate: new hel...
164
   *
7bb46a673   npiggin@suse.de   fs: introduce new...
165
166
   * inode_newsize_ok must be called with i_mutex held.
   *
25d9e2d15   npiggin@suse.de   truncate: new hel...
167
168
169
170
171
172
   * inode_newsize_ok will check filesystem limits and ulimits to check that the
   * new inode size is within limits. inode_newsize_ok will also send SIGXFSZ
   * when necessary. Caller must not proceed with inode size change if failure is
   * returned. @inode must be a file (not directory), with appropriate
   * permissions to allow truncate (inode_newsize_ok does NOT check these
   * conditions).
3fae17468   Matthew Wilcox   fs: Fix attr.c ke...
173
174
   *
   * Return: 0 on success, -ve errno on failure
25d9e2d15   npiggin@suse.de   truncate: new hel...
175
176
177
   */
  int inode_newsize_ok(const struct inode *inode, loff_t offset)
  {
5efc5b3ba   David Howells   vfs: Check the tr...
178
179
  	if (offset < 0)
  		return -EINVAL;
25d9e2d15   npiggin@suse.de   truncate: new hel...
180
181
  	if (inode->i_size < offset) {
  		unsigned long limit;
d554ed895   Jiri Slaby   fs: use rlimit he...
182
  		limit = rlimit(RLIMIT_FSIZE);
25d9e2d15   npiggin@suse.de   truncate: new hel...
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
  		if (limit != RLIM_INFINITY && offset > limit)
  			goto out_sig;
  		if (offset > inode->i_sb->s_maxbytes)
  			goto out_big;
  	} else {
  		/*
  		 * truncation of in-use swapfiles is disallowed - it would
  		 * cause subsequent swapout to scribble on the now-freed
  		 * blocks.
  		 */
  		if (IS_SWAPFILE(inode))
  			return -ETXTBSY;
  	}
  
  	return 0;
  out_sig:
  	send_sig(SIGXFSZ, current, 0);
  out_big:
  	return -EFBIG;
  }
  EXPORT_SYMBOL(inode_newsize_ok);
7bb46a673   npiggin@suse.de   fs: introduce new...
204
  /**
6a1a90ad1   Christoph Hellwig   rename generic_se...
205
   * setattr_copy - copy simple metadata updates into the generic inode
2f221d6f7   Christian Brauner   attr: handle idma...
206
   * @mnt_userns:	user namespace of the mount the inode was found from
7bb46a673   npiggin@suse.de   fs: introduce new...
207
208
209
   * @inode:	the inode to be updated
   * @attr:	the new attributes
   *
6a1a90ad1   Christoph Hellwig   rename generic_se...
210
   * setattr_copy must be called with i_mutex held.
7bb46a673   npiggin@suse.de   fs: introduce new...
211
   *
6a1a90ad1   Christoph Hellwig   rename generic_se...
212
   * setattr_copy updates the inode's metadata with that specified
2f221d6f7   Christian Brauner   attr: handle idma...
213
214
215
216
217
218
   * in attr on idmapped mounts. If file ownership is changed setattr_copy
   * doesn't map ia_uid and ia_gid. It will asssume the caller has already
   * provided the intended values. Necessary permission checks to determine
   * whether or not the S_ISGID property needs to be removed are performed with
   * the correct idmapped mount permission helpers.
   * Noticeably missing is inode size update, which is more complex
2c27c65ed   Christoph Hellwig   check ATTR_SIZE c...
219
   * as it requires pagecache updates.
7bb46a673   npiggin@suse.de   fs: introduce new...
220
   *
2f221d6f7   Christian Brauner   attr: handle idma...
221
222
223
224
225
226
   * If the inode has been found through an idmapped mount the user namespace of
   * the vfsmount must be passed through @mnt_userns. This function will then
   * take care to map the inode according to @mnt_userns before checking
   * permissions. On non-idmapped mounts or if permission checking is to be
   * performed on the raw inode simply passs init_user_ns.
   *
7bb46a673   npiggin@suse.de   fs: introduce new...
227
228
229
230
   * The inode is not marked as dirty after this operation. The rationale is
   * that for "simple" filesystems, the struct inode is the inode storage.
   * The caller is free to mark the inode dirty afterwards if needed.
   */
2f221d6f7   Christian Brauner   attr: handle idma...
231
232
  void setattr_copy(struct user_namespace *mnt_userns, struct inode *inode,
  		  const struct iattr *attr)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
233
234
  {
  	unsigned int ia_valid = attr->ia_valid;
4a30131e7   NeilBrown   [PATCH] Fix some ...
235

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
236
237
238
239
  	if (ia_valid & ATTR_UID)
  		inode->i_uid = attr->ia_uid;
  	if (ia_valid & ATTR_GID)
  		inode->i_gid = attr->ia_gid;
eb31e2f63   Amir Goldstein   utimes: Clamp the...
240
241
242
243
244
245
  	if (ia_valid & ATTR_ATIME)
  		inode->i_atime = attr->ia_atime;
  	if (ia_valid & ATTR_MTIME)
  		inode->i_mtime = attr->ia_mtime;
  	if (ia_valid & ATTR_CTIME)
  		inode->i_ctime = attr->ia_ctime;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
246
247
  	if (ia_valid & ATTR_MODE) {
  		umode_t mode = attr->ia_mode;
2f221d6f7   Christian Brauner   attr: handle idma...
248
249
250
  		kgid_t kgid = i_gid_into_mnt(mnt_userns, inode);
  		if (!in_group_p(kgid) &&
  		    !capable_wrt_inode_uidgid(mnt_userns, inode, CAP_FSETID))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
251
252
253
  			mode &= ~S_ISGID;
  		inode->i_mode = mode;
  	}
7bb46a673   npiggin@suse.de   fs: introduce new...
254
  }
6a1a90ad1   Christoph Hellwig   rename generic_se...
255
  EXPORT_SYMBOL(setattr_copy);
7bb46a673   npiggin@suse.de   fs: introduce new...
256

7bb698f09   Andreas Gruenbacher   fs: Move notify_c...
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
  int may_setattr(struct user_namespace *mnt_userns, struct inode *inode,
  		unsigned int ia_valid)
  {
  	int error;
  
  	if (ia_valid & (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_TIMES_SET)) {
  		if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
  			return -EPERM;
  	}
  
  	/*
  	 * If utimes(2) and friends are called with times == NULL (or both
  	 * times are UTIME_NOW), then we need to check for write permission
  	 */
  	if (ia_valid & ATTR_TOUCH) {
  		if (IS_IMMUTABLE(inode))
  			return -EPERM;
  
  		if (!inode_owner_or_capable(mnt_userns, inode)) {
  			error = inode_permission(mnt_userns, inode, MAY_WRITE);
  			if (error)
  				return error;
  		}
  	}
  	return 0;
  }
  EXPORT_SYMBOL(may_setattr);
27ac0ffea   J. Bruce Fields   locks: break dele...
284
285
  /**
   * notify_change - modify attributes of a filesytem object
2f221d6f7   Christian Brauner   attr: handle idma...
286
   * @mnt_userns:	user namespace of the mount the inode was found from
27ac0ffea   J. Bruce Fields   locks: break dele...
287
   * @dentry:	object affected
3fae17468   Matthew Wilcox   fs: Fix attr.c ke...
288
   * @attr:	new attributes
27ac0ffea   J. Bruce Fields   locks: break dele...
289
290
291
292
293
294
295
296
297
298
   * @delegated_inode: returns inode, if the inode is delegated
   *
   * The caller must hold the i_mutex on the affected object.
   *
   * If notify_change discovers a delegation in need of breaking,
   * it will return -EWOULDBLOCK and return a reference to the inode in
   * delegated_inode.  The caller should then break the delegation and
   * retry.  Because breaking a delegation may take a long time, the
   * caller should drop the i_mutex before doing so.
   *
2f221d6f7   Christian Brauner   attr: handle idma...
299
300
301
   * If file ownership is changed notify_change() doesn't map ia_uid and
   * ia_gid. It will asssume the caller has already provided the intended values.
   *
27ac0ffea   J. Bruce Fields   locks: break dele...
302
303
304
305
306
   * Alternatively, a caller may pass NULL for delegated_inode.  This may
   * be appropriate for callers that expect the underlying filesystem not
   * to be NFS exported.  Also, passing NULL is fine for callers holding
   * the file open for write, as there can be no conflicting delegation in
   * that case.
2f221d6f7   Christian Brauner   attr: handle idma...
307
308
309
310
311
312
   *
   * If the inode has been found through an idmapped mount the user namespace of
   * the vfsmount must be passed through @mnt_userns. This function will then
   * take care to map the inode according to @mnt_userns before checking
   * permissions. On non-idmapped mounts or if permission checking is to be
   * performed on the raw inode simply passs init_user_ns.
27ac0ffea   J. Bruce Fields   locks: break dele...
313
   */
2f221d6f7   Christian Brauner   attr: handle idma...
314
315
  int notify_change(struct user_namespace *mnt_userns, struct dentry *dentry,
  		  struct iattr *attr, struct inode **delegated_inode)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
316
317
  {
  	struct inode *inode = dentry->d_inode;
8d334acdd   Al Viro   switch is_sxid() ...
318
  	umode_t mode = inode->i_mode;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
319
  	int error;
95582b008   Deepa Dinamani   vfs: change inode...
320
  	struct timespec64 now;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
321
  	unsigned int ia_valid = attr->ia_valid;
5955102c9   Al Viro   wrappers for ->i_...
322
  	WARN_ON_ONCE(!inode_is_locked(inode));
c4107b309   Andrew Morton   notify_change(): ...
323

7bb698f09   Andreas Gruenbacher   fs: Move notify_c...
324
325
326
  	error = may_setattr(mnt_userns, inode, ia_valid);
  	if (error)
  		return error;
f2b20f6ee   Miklos Szeredi   vfs: move permiss...
327

69b457329   Andi Kleen   Cache xattr secur...
328
  	if ((ia_valid & ATTR_MODE)) {
8d334acdd   Al Viro   switch is_sxid() ...
329
  		umode_t amode = attr->ia_mode;
69b457329   Andi Kleen   Cache xattr secur...
330
331
332
333
  		/* Flag setting protected by i_mutex */
  		if (is_sxid(amode))
  			inode->i_flags &= ~S_NOSEC;
  	}
c2050a454   Deepa Dinamani   fs: Replace curre...
334
  	now = current_time(inode);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
335
336
337
338
  
  	attr->ia_ctime = now;
  	if (!(ia_valid & ATTR_ATIME_SET))
  		attr->ia_atime = now;
eb31e2f63   Amir Goldstein   utimes: Clamp the...
339
340
  	else
  		attr->ia_atime = timestamp_truncate(attr->ia_atime, inode);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
341
342
  	if (!(ia_valid & ATTR_MTIME_SET))
  		attr->ia_mtime = now;
eb31e2f63   Amir Goldstein   utimes: Clamp the...
343
344
  	else
  		attr->ia_mtime = timestamp_truncate(attr->ia_mtime, inode);
b53767719   Serge E. Hallyn   Implement file po...
345
  	if (ia_valid & ATTR_KILL_PRIV) {
b53767719   Serge E. Hallyn   Implement file po...
346
  		error = security_inode_need_killpriv(dentry);
030b533c4   Jan Kara   fs: Avoid prematu...
347
  		if (error < 0)
b53767719   Serge E. Hallyn   Implement file po...
348
  			return error;
030b533c4   Jan Kara   fs: Avoid prematu...
349
350
  		if (error == 0)
  			ia_valid = attr->ia_valid &= ~ATTR_KILL_PRIV;
b53767719   Serge E. Hallyn   Implement file po...
351
  	}
6de0ec00b   Jeff Layton   VFS: make notify_...
352
353
354
355
356
357
358
359
360
361
362
  
  	/*
  	 * We now pass ATTR_KILL_S*ID to the lower level setattr function so
  	 * that the function has the ability to reinterpret a mode change
  	 * that's due to these bits. This adds an implicit restriction that
  	 * no function will ever call notify_change with both ATTR_MODE and
  	 * ATTR_KILL_S*ID set.
  	 */
  	if ((ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID)) &&
  	    (ia_valid & ATTR_MODE))
  		BUG();
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
363
  	if (ia_valid & ATTR_KILL_SUID) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
364
  		if (mode & S_ISUID) {
6de0ec00b   Jeff Layton   VFS: make notify_...
365
366
  			ia_valid = attr->ia_valid |= ATTR_MODE;
  			attr->ia_mode = (inode->i_mode & ~S_ISUID);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
367
368
369
  		}
  	}
  	if (ia_valid & ATTR_KILL_SGID) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
370
371
372
373
374
375
376
377
  		if ((mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
  			if (!(ia_valid & ATTR_MODE)) {
  				ia_valid = attr->ia_valid |= ATTR_MODE;
  				attr->ia_mode = inode->i_mode;
  			}
  			attr->ia_mode &= ~S_ISGID;
  		}
  	}
6de0ec00b   Jeff Layton   VFS: make notify_...
378
  	if (!(attr->ia_valid & ~(ATTR_KILL_SUID | ATTR_KILL_SGID)))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
379
  		return 0;
a475acf01   Seth Forshee   fs: Refuse uid/gi...
380
381
382
383
384
385
386
387
388
389
  	/*
  	 * Verify that uid/gid changes are valid in the target
  	 * namespace of the superblock.
  	 */
  	if (ia_valid & ATTR_UID &&
  	    !kuid_has_mapping(inode->i_sb->s_user_ns, attr->ia_uid))
  		return -EOVERFLOW;
  	if (ia_valid & ATTR_GID &&
  	    !kgid_has_mapping(inode->i_sb->s_user_ns, attr->ia_gid))
  		return -EOVERFLOW;
0bd23d09b   Eric W. Biederman   vfs: Don't modify...
390
391
392
  	/* Don't allow modifications of files with invalid uids or
  	 * gids unless those uids & gids are being made valid.
  	 */
2f221d6f7   Christian Brauner   attr: handle idma...
393
394
  	if (!(ia_valid & ATTR_UID) &&
  	    !uid_valid(i_uid_into_mnt(mnt_userns, inode)))
0bd23d09b   Eric W. Biederman   vfs: Don't modify...
395
  		return -EOVERFLOW;
2f221d6f7   Christian Brauner   attr: handle idma...
396
397
  	if (!(ia_valid & ATTR_GID) &&
  	    !gid_valid(i_gid_into_mnt(mnt_userns, inode)))
0bd23d09b   Eric W. Biederman   vfs: Don't modify...
398
  		return -EOVERFLOW;
a77b72da2   Miklos Szeredi   [patch] vfs: make...
399
400
401
  	error = security_inode_setattr(dentry, attr);
  	if (error)
  		return error;
27ac0ffea   J. Bruce Fields   locks: break dele...
402
403
404
  	error = try_break_deleg(inode, delegated_inode);
  	if (error)
  		return error;
a77b72da2   Miklos Szeredi   [patch] vfs: make...
405

eef2380c1   Christoph Hellwig   default to simple...
406
  	if (inode->i_op->setattr)
549c72977   Christian Brauner   fs: make helpers ...
407
  		error = inode->i_op->setattr(mnt_userns, dentry, attr);
eef2380c1   Christoph Hellwig   default to simple...
408
  	else
549c72977   Christian Brauner   fs: make helpers ...
409
  		error = simple_setattr(mnt_userns, dentry, attr);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
410

975d29437   Mimi Zohar   evm: imbed evm_in...
411
  	if (!error) {
0eeca2830   Robert Love   [PATCH] inotify
412
  		fsnotify_change(dentry, ia_valid);
a2d2329e3   Christian Brauner   ima: handle idmap...
413
  		ima_inode_post_setattr(mnt_userns, dentry);
975d29437   Mimi Zohar   evm: imbed evm_in...
414
415
  		evm_inode_post_setattr(dentry, ia_valid);
  	}
0eeca2830   Robert Love   [PATCH] inotify
416

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
417
418
  	return error;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
419
  EXPORT_SYMBOL(notify_change);