Blame view
fs/attr.c
7.87 KB
1da177e4c
|
1 2 3 4 5 6 |
/* * linux/fs/attr.c * * Copyright (C) 1991, 1992 Linus Torvalds * changes by Thomas Schoebel-Theuer */ |
630d9c472
|
7 |
#include <linux/export.h> |
1da177e4c
|
8 9 10 |
#include <linux/time.h> #include <linux/mm.h> #include <linux/string.h> |
16f7e0fe2
|
11 |
#include <linux/capability.h> |
0eeca2830
|
12 |
#include <linux/fsnotify.h> |
1da177e4c
|
13 |
#include <linux/fcntl.h> |
1da177e4c
|
14 |
#include <linux/security.h> |
975d29437
|
15 |
#include <linux/evm.h> |
9957a5043
|
16 |
#include <linux/ima.h> |
1da177e4c
|
17 |
|
2c27c65ed
|
18 19 20 21 22 23 24 25 26 27 28 29 |
/** * inode_change_ok - check if attribute changes to an inode are allowed * @inode: inode to check * @attr: attributes to change * * Check if we are allowed to change the attributes contained in @attr * in the given inode. This includes the normal unix access permission * checks, as well as checks for rlimits and others. * * Should be called as the first thing in ->setattr implementations, * possibly after taking additional locks. */ |
25d9e2d15
|
30 |
int inode_change_ok(const struct inode *inode, struct iattr *attr) |
1da177e4c
|
31 |
{ |
1da177e4c
|
32 |
unsigned int ia_valid = attr->ia_valid; |
2c27c65ed
|
33 34 35 36 37 38 39 40 41 |
/* * First check size constraints. These can't be overriden using * ATTR_FORCE. */ if (ia_valid & ATTR_SIZE) { int error = inode_newsize_ok(inode, attr->ia_size); if (error) return error; } |
1da177e4c
|
42 43 |
/* If force is set do it anyway. */ if (ia_valid & ATTR_FORCE) |
2c27c65ed
|
44 |
return 0; |
1da177e4c
|
45 46 47 |
/* Make sure a caller can chown. */ if ((ia_valid & ATTR_UID) && |
8e96e3b7b
|
48 |
(!uid_eq(current_fsuid(), inode->i_uid) || |
7fa294c89
|
49 50 |
!uid_eq(attr->ia_uid, inode->i_uid)) && !inode_capable(inode, CAP_CHOWN)) |
2c27c65ed
|
51 |
return -EPERM; |
1da177e4c
|
52 53 54 |
/* Make sure caller can chgrp. */ if ((ia_valid & ATTR_GID) && |
8e96e3b7b
|
55 56 |
(!uid_eq(current_fsuid(), inode->i_uid) || (!in_group_p(attr->ia_gid) && !gid_eq(attr->ia_gid, inode->i_gid))) && |
7fa294c89
|
57 |
!inode_capable(inode, CAP_CHOWN)) |
2c27c65ed
|
58 |
return -EPERM; |
1da177e4c
|
59 60 61 |
/* Make sure a caller can chmod. */ if (ia_valid & ATTR_MODE) { |
2e1496707
|
62 |
if (!inode_owner_or_capable(inode)) |
2c27c65ed
|
63 |
return -EPERM; |
1da177e4c
|
64 65 |
/* Also check the setgid bit! */ if (!in_group_p((ia_valid & ATTR_GID) ? attr->ia_gid : |
7fa294c89
|
66 67 |
inode->i_gid) && !inode_capable(inode, CAP_FSETID)) |
1da177e4c
|
68 69 70 71 |
attr->ia_mode &= ~S_ISGID; } /* Check for setting the inode time. */ |
9767d7495
|
72 |
if (ia_valid & (ATTR_MTIME_SET | ATTR_ATIME_SET | ATTR_TIMES_SET)) { |
2e1496707
|
73 |
if (!inode_owner_or_capable(inode)) |
2c27c65ed
|
74 |
return -EPERM; |
1da177e4c
|
75 |
} |
2c27c65ed
|
76 77 |
return 0; |
1da177e4c
|
78 |
} |
1da177e4c
|
79 |
EXPORT_SYMBOL(inode_change_ok); |
25d9e2d15
|
80 81 82 83 84 85 |
/** * inode_newsize_ok - may this inode be truncated to a given size * @inode: the inode to be truncated * @offset: the new size to assign to the inode * @Returns: 0 on success, -ve errno on failure * |
7bb46a673
|
86 87 |
* inode_newsize_ok must be called with i_mutex held. * |
25d9e2d15
|
88 89 90 91 92 93 |
* inode_newsize_ok will check filesystem limits and ulimits to check that the * new inode size is within limits. inode_newsize_ok will also send SIGXFSZ * when necessary. Caller must not proceed with inode size change if failure is * returned. @inode must be a file (not directory), with appropriate * permissions to allow truncate (inode_newsize_ok does NOT check these * conditions). |
25d9e2d15
|
94 95 96 97 98 |
*/ int inode_newsize_ok(const struct inode *inode, loff_t offset) { if (inode->i_size < offset) { unsigned long limit; |
d554ed895
|
99 |
limit = rlimit(RLIMIT_FSIZE); |
25d9e2d15
|
100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 |
if (limit != RLIM_INFINITY && offset > limit) goto out_sig; if (offset > inode->i_sb->s_maxbytes) goto out_big; } else { /* * truncation of in-use swapfiles is disallowed - it would * cause subsequent swapout to scribble on the now-freed * blocks. */ if (IS_SWAPFILE(inode)) return -ETXTBSY; } return 0; out_sig: send_sig(SIGXFSZ, current, 0); out_big: return -EFBIG; } EXPORT_SYMBOL(inode_newsize_ok); |
7bb46a673
|
121 |
/** |
6a1a90ad1
|
122 |
* setattr_copy - copy simple metadata updates into the generic inode |
7bb46a673
|
123 124 125 |
* @inode: the inode to be updated * @attr: the new attributes * |
6a1a90ad1
|
126 |
* setattr_copy must be called with i_mutex held. |
7bb46a673
|
127 |
* |
6a1a90ad1
|
128 |
* setattr_copy updates the inode's metadata with that specified |
25985edce
|
129 |
* in attr. Noticeably missing is inode size update, which is more complex |
2c27c65ed
|
130 |
* as it requires pagecache updates. |
7bb46a673
|
131 132 133 134 135 |
* * The inode is not marked as dirty after this operation. The rationale is * that for "simple" filesystems, the struct inode is the inode storage. * The caller is free to mark the inode dirty afterwards if needed. */ |
6a1a90ad1
|
136 |
void setattr_copy(struct inode *inode, const struct iattr *attr) |
1da177e4c
|
137 138 |
{ unsigned int ia_valid = attr->ia_valid; |
4a30131e7
|
139 |
|
1da177e4c
|
140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 |
if (ia_valid & ATTR_UID) inode->i_uid = attr->ia_uid; if (ia_valid & ATTR_GID) inode->i_gid = attr->ia_gid; if (ia_valid & ATTR_ATIME) inode->i_atime = timespec_trunc(attr->ia_atime, inode->i_sb->s_time_gran); if (ia_valid & ATTR_MTIME) inode->i_mtime = timespec_trunc(attr->ia_mtime, inode->i_sb->s_time_gran); if (ia_valid & ATTR_CTIME) inode->i_ctime = timespec_trunc(attr->ia_ctime, inode->i_sb->s_time_gran); if (ia_valid & ATTR_MODE) { umode_t mode = attr->ia_mode; |
7fa294c89
|
155 156 |
if (!in_group_p(inode->i_gid) && !inode_capable(inode, CAP_FSETID)) |
1da177e4c
|
157 158 159 |
mode &= ~S_ISGID; inode->i_mode = mode; } |
7bb46a673
|
160 |
} |
6a1a90ad1
|
161 |
EXPORT_SYMBOL(setattr_copy); |
7bb46a673
|
162 |
|
27ac0ffea
|
163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 |
/** * notify_change - modify attributes of a filesytem object * @dentry: object affected * @iattr: new attributes * @delegated_inode: returns inode, if the inode is delegated * * The caller must hold the i_mutex on the affected object. * * If notify_change discovers a delegation in need of breaking, * it will return -EWOULDBLOCK and return a reference to the inode in * delegated_inode. The caller should then break the delegation and * retry. Because breaking a delegation may take a long time, the * caller should drop the i_mutex before doing so. * * Alternatively, a caller may pass NULL for delegated_inode. This may * be appropriate for callers that expect the underlying filesystem not * to be NFS exported. Also, passing NULL is fine for callers holding * the file open for write, as there can be no conflicting delegation in * that case. */ int notify_change(struct dentry * dentry, struct iattr * attr, struct inode **delegated_inode) |
1da177e4c
|
184 185 |
{ struct inode *inode = dentry->d_inode; |
8d334acdd
|
186 |
umode_t mode = inode->i_mode; |
1da177e4c
|
187 188 189 |
int error; struct timespec now; unsigned int ia_valid = attr->ia_valid; |
c4107b309
|
190 |
WARN_ON_ONCE(!mutex_is_locked(&inode->i_mutex)); |
beb29e058
|
191 192 193 194 |
if (ia_valid & (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_TIMES_SET)) { if (IS_IMMUTABLE(inode) || IS_APPEND(inode)) return -EPERM; } |
69b457329
|
195 |
if ((ia_valid & ATTR_MODE)) { |
8d334acdd
|
196 |
umode_t amode = attr->ia_mode; |
69b457329
|
197 198 199 200 |
/* Flag setting protected by i_mutex */ if (is_sxid(amode)) inode->i_flags &= ~S_NOSEC; } |
1da177e4c
|
201 202 203 204 205 206 207 |
now = current_fs_time(inode->i_sb); attr->ia_ctime = now; if (!(ia_valid & ATTR_ATIME_SET)) attr->ia_atime = now; if (!(ia_valid & ATTR_MTIME_SET)) attr->ia_mtime = now; |
b53767719
|
208 209 210 211 212 213 214 215 216 |
if (ia_valid & ATTR_KILL_PRIV) { attr->ia_valid &= ~ATTR_KILL_PRIV; ia_valid &= ~ATTR_KILL_PRIV; error = security_inode_need_killpriv(dentry); if (error > 0) error = security_inode_killpriv(dentry); if (error) return error; } |
6de0ec00b
|
217 218 219 220 221 222 223 224 225 226 227 |
/* * We now pass ATTR_KILL_S*ID to the lower level setattr function so * that the function has the ability to reinterpret a mode change * that's due to these bits. This adds an implicit restriction that * no function will ever call notify_change with both ATTR_MODE and * ATTR_KILL_S*ID set. */ if ((ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID)) && (ia_valid & ATTR_MODE)) BUG(); |
1da177e4c
|
228 |
if (ia_valid & ATTR_KILL_SUID) { |
1da177e4c
|
229 |
if (mode & S_ISUID) { |
6de0ec00b
|
230 231 |
ia_valid = attr->ia_valid |= ATTR_MODE; attr->ia_mode = (inode->i_mode & ~S_ISUID); |
1da177e4c
|
232 233 234 |
} } if (ia_valid & ATTR_KILL_SGID) { |
1da177e4c
|
235 236 237 238 239 240 241 242 |
if ((mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { if (!(ia_valid & ATTR_MODE)) { ia_valid = attr->ia_valid |= ATTR_MODE; attr->ia_mode = inode->i_mode; } attr->ia_mode &= ~S_ISGID; } } |
6de0ec00b
|
243 |
if (!(attr->ia_valid & ~(ATTR_KILL_SUID | ATTR_KILL_SGID))) |
1da177e4c
|
244 |
return 0; |
a77b72da2
|
245 246 247 |
error = security_inode_setattr(dentry, attr); if (error) return error; |
27ac0ffea
|
248 249 250 |
error = try_break_deleg(inode, delegated_inode); if (error) return error; |
a77b72da2
|
251 |
|
eef2380c1
|
252 |
if (inode->i_op->setattr) |
a77b72da2
|
253 |
error = inode->i_op->setattr(dentry, attr); |
eef2380c1
|
254 255 |
else error = simple_setattr(dentry, attr); |
1da177e4c
|
256 |
|
975d29437
|
257 |
if (!error) { |
0eeca2830
|
258 |
fsnotify_change(dentry, ia_valid); |
9957a5043
|
259 |
ima_inode_post_setattr(dentry); |
975d29437
|
260 261 |
evm_inode_post_setattr(dentry, ia_valid); } |
0eeca2830
|
262 |
|
1da177e4c
|
263 264 |
return error; } |
1da177e4c
|
265 |
EXPORT_SYMBOL(notify_change); |