]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * linux/fs/attr.c | |
3 | * | |
4 | * Copyright (C) 1991, 1992 Linus Torvalds | |
5 | * changes by Thomas Schoebel-Theuer | |
6 | */ | |
7 | ||
630d9c47 | 8 | #include <linux/export.h> |
1da177e4 LT |
9 | #include <linux/time.h> |
10 | #include <linux/mm.h> | |
11 | #include <linux/string.h> | |
16f7e0fe | 12 | #include <linux/capability.h> |
0eeca283 | 13 | #include <linux/fsnotify.h> |
1da177e4 | 14 | #include <linux/fcntl.h> |
1da177e4 | 15 | #include <linux/security.h> |
975d2943 | 16 | #include <linux/evm.h> |
9957a504 | 17 | #include <linux/ima.h> |
1da177e4 | 18 | |
2c27c65e CH |
19 | /** |
20 | * inode_change_ok - check if attribute changes to an inode are allowed | |
21 | * @inode: inode to check | |
22 | * @attr: attributes to change | |
23 | * | |
24 | * Check if we are allowed to change the attributes contained in @attr | |
25 | * in the given inode. This includes the normal unix access permission | |
26 | * checks, as well as checks for rlimits and others. | |
27 | * | |
28 | * Should be called as the first thing in ->setattr implementations, | |
29 | * possibly after taking additional locks. | |
30 | */ | |
25d9e2d1 | 31 | int inode_change_ok(const struct inode *inode, struct iattr *attr) |
1da177e4 | 32 | { |
1da177e4 LT |
33 | unsigned int ia_valid = attr->ia_valid; |
34 | ||
2c27c65e CH |
35 | /* |
36 | * First check size constraints. These can't be overriden using | |
37 | * ATTR_FORCE. | |
38 | */ | |
39 | if (ia_valid & ATTR_SIZE) { | |
40 | int error = inode_newsize_ok(inode, attr->ia_size); | |
41 | if (error) | |
42 | return error; | |
43 | } | |
44 | ||
1da177e4 LT |
45 | /* If force is set do it anyway. */ |
46 | if (ia_valid & ATTR_FORCE) | |
2c27c65e | 47 | return 0; |
1da177e4 LT |
48 | |
49 | /* Make sure a caller can chown. */ | |
50 | if ((ia_valid & ATTR_UID) && | |
8e96e3b7 EB |
51 | (!uid_eq(current_fsuid(), inode->i_uid) || |
52 | !uid_eq(attr->ia_uid, inode->i_uid)) && !capable(CAP_CHOWN)) | |
2c27c65e | 53 | return -EPERM; |
1da177e4 LT |
54 | |
55 | /* Make sure caller can chgrp. */ | |
56 | if ((ia_valid & ATTR_GID) && | |
8e96e3b7 EB |
57 | (!uid_eq(current_fsuid(), inode->i_uid) || |
58 | (!in_group_p(attr->ia_gid) && !gid_eq(attr->ia_gid, inode->i_gid))) && | |
1da177e4 | 59 | !capable(CAP_CHOWN)) |
2c27c65e | 60 | return -EPERM; |
1da177e4 LT |
61 | |
62 | /* Make sure a caller can chmod. */ | |
63 | if (ia_valid & ATTR_MODE) { | |
2e149670 | 64 | if (!inode_owner_or_capable(inode)) |
2c27c65e | 65 | return -EPERM; |
1da177e4 LT |
66 | /* Also check the setgid bit! */ |
67 | if (!in_group_p((ia_valid & ATTR_GID) ? attr->ia_gid : | |
68 | inode->i_gid) && !capable(CAP_FSETID)) | |
69 | attr->ia_mode &= ~S_ISGID; | |
70 | } | |
71 | ||
72 | /* Check for setting the inode time. */ | |
9767d749 | 73 | if (ia_valid & (ATTR_MTIME_SET | ATTR_ATIME_SET | ATTR_TIMES_SET)) { |
2e149670 | 74 | if (!inode_owner_or_capable(inode)) |
2c27c65e | 75 | return -EPERM; |
1da177e4 | 76 | } |
2c27c65e CH |
77 | |
78 | return 0; | |
1da177e4 | 79 | } |
1da177e4 LT |
80 | EXPORT_SYMBOL(inode_change_ok); |
81 | ||
25d9e2d1 NP |
82 | /** |
83 | * inode_newsize_ok - may this inode be truncated to a given size | |
84 | * @inode: the inode to be truncated | |
85 | * @offset: the new size to assign to the inode | |
86 | * @Returns: 0 on success, -ve errno on failure | |
87 | * | |
7bb46a67 NP |
88 | * inode_newsize_ok must be called with i_mutex held. |
89 | * | |
25d9e2d1 NP |
90 | * inode_newsize_ok will check filesystem limits and ulimits to check that the |
91 | * new inode size is within limits. inode_newsize_ok will also send SIGXFSZ | |
92 | * when necessary. Caller must not proceed with inode size change if failure is | |
93 | * returned. @inode must be a file (not directory), with appropriate | |
94 | * permissions to allow truncate (inode_newsize_ok does NOT check these | |
95 | * conditions). | |
25d9e2d1 NP |
96 | */ |
97 | int inode_newsize_ok(const struct inode *inode, loff_t offset) | |
98 | { | |
99 | if (inode->i_size < offset) { | |
100 | unsigned long limit; | |
101 | ||
d554ed89 | 102 | limit = rlimit(RLIMIT_FSIZE); |
25d9e2d1 NP |
103 | if (limit != RLIM_INFINITY && offset > limit) |
104 | goto out_sig; | |
105 | if (offset > inode->i_sb->s_maxbytes) | |
106 | goto out_big; | |
107 | } else { | |
108 | /* | |
109 | * truncation of in-use swapfiles is disallowed - it would | |
110 | * cause subsequent swapout to scribble on the now-freed | |
111 | * blocks. | |
112 | */ | |
113 | if (IS_SWAPFILE(inode)) | |
114 | return -ETXTBSY; | |
115 | } | |
116 | ||
117 | return 0; | |
118 | out_sig: | |
119 | send_sig(SIGXFSZ, current, 0); | |
120 | out_big: | |
121 | return -EFBIG; | |
122 | } | |
123 | EXPORT_SYMBOL(inode_newsize_ok); | |
124 | ||
7bb46a67 | 125 | /** |
6a1a90ad | 126 | * setattr_copy - copy simple metadata updates into the generic inode |
7bb46a67 NP |
127 | * @inode: the inode to be updated |
128 | * @attr: the new attributes | |
129 | * | |
6a1a90ad | 130 | * setattr_copy must be called with i_mutex held. |
7bb46a67 | 131 | * |
6a1a90ad | 132 | * setattr_copy updates the inode's metadata with that specified |
25985edc | 133 | * in attr. Noticeably missing is inode size update, which is more complex |
2c27c65e | 134 | * as it requires pagecache updates. |
7bb46a67 NP |
135 | * |
136 | * The inode is not marked as dirty after this operation. The rationale is | |
137 | * that for "simple" filesystems, the struct inode is the inode storage. | |
138 | * The caller is free to mark the inode dirty afterwards if needed. | |
139 | */ | |
6a1a90ad | 140 | void setattr_copy(struct inode *inode, const struct iattr *attr) |
1da177e4 LT |
141 | { |
142 | unsigned int ia_valid = attr->ia_valid; | |
4a30131e | 143 | |
1da177e4 LT |
144 | if (ia_valid & ATTR_UID) |
145 | inode->i_uid = attr->ia_uid; | |
146 | if (ia_valid & ATTR_GID) | |
147 | inode->i_gid = attr->ia_gid; | |
148 | if (ia_valid & ATTR_ATIME) | |
149 | inode->i_atime = timespec_trunc(attr->ia_atime, | |
150 | inode->i_sb->s_time_gran); | |
151 | if (ia_valid & ATTR_MTIME) | |
152 | inode->i_mtime = timespec_trunc(attr->ia_mtime, | |
153 | inode->i_sb->s_time_gran); | |
154 | if (ia_valid & ATTR_CTIME) | |
155 | inode->i_ctime = timespec_trunc(attr->ia_ctime, | |
156 | inode->i_sb->s_time_gran); | |
157 | if (ia_valid & ATTR_MODE) { | |
158 | umode_t mode = attr->ia_mode; | |
159 | ||
160 | if (!in_group_p(inode->i_gid) && !capable(CAP_FSETID)) | |
161 | mode &= ~S_ISGID; | |
162 | inode->i_mode = mode; | |
163 | } | |
7bb46a67 | 164 | } |
6a1a90ad | 165 | EXPORT_SYMBOL(setattr_copy); |
7bb46a67 | 166 | |
1da177e4 LT |
167 | int notify_change(struct dentry * dentry, struct iattr * attr) |
168 | { | |
169 | struct inode *inode = dentry->d_inode; | |
8d334acd | 170 | umode_t mode = inode->i_mode; |
1da177e4 LT |
171 | int error; |
172 | struct timespec now; | |
173 | unsigned int ia_valid = attr->ia_valid; | |
174 | ||
c4107b30 AM |
175 | WARN_ON_ONCE(!mutex_is_locked(&inode->i_mutex)); |
176 | ||
beb29e05 MS |
177 | if (ia_valid & (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_TIMES_SET)) { |
178 | if (IS_IMMUTABLE(inode) || IS_APPEND(inode)) | |
179 | return -EPERM; | |
180 | } | |
181 | ||
799243a3 DK |
182 | if ((ia_valid & ATTR_SIZE) && IS_I_VERSION(inode)) { |
183 | if (attr->ia_size != inode->i_size) | |
184 | inode_inc_iversion(inode); | |
185 | } | |
186 | ||
69b45732 | 187 | if ((ia_valid & ATTR_MODE)) { |
8d334acd | 188 | umode_t amode = attr->ia_mode; |
69b45732 AK |
189 | /* Flag setting protected by i_mutex */ |
190 | if (is_sxid(amode)) | |
191 | inode->i_flags &= ~S_NOSEC; | |
192 | } | |
193 | ||
1da177e4 LT |
194 | now = current_fs_time(inode->i_sb); |
195 | ||
196 | attr->ia_ctime = now; | |
197 | if (!(ia_valid & ATTR_ATIME_SET)) | |
198 | attr->ia_atime = now; | |
199 | if (!(ia_valid & ATTR_MTIME_SET)) | |
200 | attr->ia_mtime = now; | |
b5376771 SH |
201 | if (ia_valid & ATTR_KILL_PRIV) { |
202 | attr->ia_valid &= ~ATTR_KILL_PRIV; | |
203 | ia_valid &= ~ATTR_KILL_PRIV; | |
204 | error = security_inode_need_killpriv(dentry); | |
205 | if (error > 0) | |
206 | error = security_inode_killpriv(dentry); | |
207 | if (error) | |
208 | return error; | |
209 | } | |
6de0ec00 JL |
210 | |
211 | /* | |
212 | * We now pass ATTR_KILL_S*ID to the lower level setattr function so | |
213 | * that the function has the ability to reinterpret a mode change | |
214 | * that's due to these bits. This adds an implicit restriction that | |
215 | * no function will ever call notify_change with both ATTR_MODE and | |
216 | * ATTR_KILL_S*ID set. | |
217 | */ | |
218 | if ((ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID)) && | |
219 | (ia_valid & ATTR_MODE)) | |
220 | BUG(); | |
221 | ||
1da177e4 | 222 | if (ia_valid & ATTR_KILL_SUID) { |
1da177e4 | 223 | if (mode & S_ISUID) { |
6de0ec00 JL |
224 | ia_valid = attr->ia_valid |= ATTR_MODE; |
225 | attr->ia_mode = (inode->i_mode & ~S_ISUID); | |
1da177e4 LT |
226 | } |
227 | } | |
228 | if (ia_valid & ATTR_KILL_SGID) { | |
1da177e4 LT |
229 | if ((mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { |
230 | if (!(ia_valid & ATTR_MODE)) { | |
231 | ia_valid = attr->ia_valid |= ATTR_MODE; | |
232 | attr->ia_mode = inode->i_mode; | |
233 | } | |
234 | attr->ia_mode &= ~S_ISGID; | |
235 | } | |
236 | } | |
6de0ec00 | 237 | if (!(attr->ia_valid & ~(ATTR_KILL_SUID | ATTR_KILL_SGID))) |
1da177e4 LT |
238 | return 0; |
239 | ||
a77b72da MS |
240 | error = security_inode_setattr(dentry, attr); |
241 | if (error) | |
242 | return error; | |
243 | ||
eef2380c | 244 | if (inode->i_op->setattr) |
a77b72da | 245 | error = inode->i_op->setattr(dentry, attr); |
eef2380c CH |
246 | else |
247 | error = simple_setattr(dentry, attr); | |
1da177e4 | 248 | |
975d2943 | 249 | if (!error) { |
0eeca283 | 250 | fsnotify_change(dentry, ia_valid); |
9957a504 | 251 | ima_inode_post_setattr(dentry); |
975d2943 MZ |
252 | evm_inode_post_setattr(dentry, ia_valid); |
253 | } | |
0eeca283 | 254 | |
1da177e4 LT |
255 | return error; |
256 | } | |
1da177e4 | 257 | EXPORT_SYMBOL(notify_change); |