* [PATCH 0/2 RESEND] POSIX-compliant version of fchmodat with flag argument
@ 2012-01-13 1:53 Andrew Ayer
2012-01-13 1:53 ` [PATCH 1/2] vfs: Add fchmodat4 syscall: " Andrew Ayer
` (2 more replies)
0 siblings, 3 replies; 7+ messages in thread
From: Andrew Ayer @ 2012-01-13 1:53 UTC (permalink / raw)
To: Alexander Viro; +Cc: linux-fsdevel, linux-kernel
Hi,
The below patches implement a 4 argument version of fchmodat (fchmodat4)
that has a flag argument, as specified by POSIX. This is needed to
implement a proper glibc wrapper.
fchmodat4 supports the same two flags as fchownat: AT_SYMLINK_NOFOLLOW
and AT_EMPTY_PATH.
Besides the POSIX-compliance, this patch will make it possible to
ensure, in a race-free way, that you do not follow symlinks when
chmodding. Previously, you could open a file with O_NOFOLLOW and fchmod
it, but this only worked if you had read or write permissions on the
file. Now you can open the file with O_PATH|O_NOFOLLOW and do fchmodat
with AT_EMPTY_PATH.
Could this patch be applied? Any feedback is welcome.
Cheers,
Andrew
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH 1/2] vfs: Add fchmodat4 syscall: fchmodat with flag argument
2012-01-13 1:53 [PATCH 0/2 RESEND] POSIX-compliant version of fchmodat with flag argument Andrew Ayer
@ 2012-01-13 1:53 ` Andrew Ayer
2014-01-21 7:30 ` Florian Weimer
2012-01-13 1:53 ` [PATCH 2/2] x86: Hook up new fchmodat4 syscall Andrew Ayer
2012-09-18 20:39 ` [PATCH 0/2 RESEND] POSIX-compliant version of fchmodat with flag argument Kenny Root
2 siblings, 1 reply; 7+ messages in thread
From: Andrew Ayer @ 2012-01-13 1:53 UTC (permalink / raw)
To: Alexander Viro; +Cc: linux-fsdevel, linux-kernel
This adds a 4 argument version of fchmodat (fchmodat4) that
supports a flag argument, as specified by POSIX. It supports
the same two flags as fchownat: AT_SYMLINK_NOFOLLOW and AT_EMPTY_PATH.
Signed-off-by: Andrew Ayer <agwa@andrewayer.name>
---
fs/open.c | 21 +++++++++++++++++++--
include/linux/syscalls.h | 2 ++
2 files changed, 21 insertions(+), 2 deletions(-)
diff --git a/fs/open.c b/fs/open.c
index 77becc0..4f087e7 100644
--- a/fs/open.c
+++ b/fs/open.c
@@ -452,6 +452,9 @@ static int chmod_common(struct path *path, umode_t mode)
struct iattr newattrs;
int error;
+ if (S_ISLNK(inode->i_mode))
+ return -EOPNOTSUPP;
+
error = mnt_want_write(path->mnt);
if (error)
return error;
@@ -484,10 +487,24 @@ SYSCALL_DEFINE2(fchmod, unsigned int, fd, umode_t, mode)
SYSCALL_DEFINE3(fchmodat, int, dfd, const char __user *, filename, umode_t, mode)
{
+ return sys_fchmodat4(dfd, filename, mode, 0);
+}
+
+SYSCALL_DEFINE4(fchmodat4, int, dfd, const char __user *, filename,
+ umode_t, mode, int, flag)
+{
struct path path;
int error;
+ int lookup_flags;
+
+ if ((flag & ~(AT_SYMLINK_NOFOLLOW | AT_EMPTY_PATH)) != 0)
+ return -EINVAL;
- error = user_path_at(dfd, filename, LOOKUP_FOLLOW, &path);
+ lookup_flags = (flag & AT_SYMLINK_NOFOLLOW) ? 0 : LOOKUP_FOLLOW;
+ if (flag & AT_EMPTY_PATH)
+ lookup_flags |= LOOKUP_EMPTY;
+
+ error = user_path_at(dfd, filename, lookup_flags, &path);
if (!error) {
error = chmod_common(&path, mode);
path_put(&path);
@@ -497,7 +514,7 @@ SYSCALL_DEFINE3(fchmodat, int, dfd, const char __user *, filename, umode_t, mode
SYSCALL_DEFINE2(chmod, const char __user *, filename, umode_t, mode)
{
- return sys_fchmodat(AT_FDCWD, filename, mode);
+ return sys_fchmodat4(AT_FDCWD, filename, mode, 0);
}
static int chown_common(struct path *path, uid_t user, gid_t group)
diff --git a/include/linux/syscalls.h b/include/linux/syscalls.h
index 515669f..4834904 100644
--- a/include/linux/syscalls.h
+++ b/include/linux/syscalls.h
@@ -770,6 +770,8 @@ asmlinkage long sys_futimesat(int dfd, const char __user *filename,
asmlinkage long sys_faccessat(int dfd, const char __user *filename, int mode);
asmlinkage long sys_fchmodat(int dfd, const char __user * filename,
umode_t mode);
+asmlinkage long sys_fchmodat4(int dfd, const char __user * filename,
+ umode_t mode, int flag);
asmlinkage long sys_fchownat(int dfd, const char __user *filename, uid_t user,
gid_t group, int flag);
asmlinkage long sys_openat(int dfd, const char __user *filename, int flags,
--
1.7.1
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH 2/2] x86: Hook up new fchmodat4 syscall
2012-01-13 1:53 [PATCH 0/2 RESEND] POSIX-compliant version of fchmodat with flag argument Andrew Ayer
2012-01-13 1:53 ` [PATCH 1/2] vfs: Add fchmodat4 syscall: " Andrew Ayer
@ 2012-01-13 1:53 ` Andrew Ayer
2012-09-18 20:39 ` [PATCH 0/2 RESEND] POSIX-compliant version of fchmodat with flag argument Kenny Root
2 siblings, 0 replies; 7+ messages in thread
From: Andrew Ayer @ 2012-01-13 1:53 UTC (permalink / raw)
To: Alexander Viro; +Cc: linux-fsdevel, linux-kernel
Signed-off-by: Andrew Ayer <agwa@andrewayer.name>
---
arch/x86/ia32/ia32entry.S | 1 +
arch/x86/include/asm/unistd_32.h | 3 ++-
arch/x86/include/asm/unistd_64.h | 2 ++
arch/x86/kernel/syscall_table_32.S | 1 +
4 files changed, 6 insertions(+), 1 deletions(-)
diff --git a/arch/x86/ia32/ia32entry.S b/arch/x86/ia32/ia32entry.S
index 3e27456..f026e9f 100644
--- a/arch/x86/ia32/ia32entry.S
+++ b/arch/x86/ia32/ia32entry.S
@@ -847,4 +847,5 @@ ia32_sys_call_table:
.quad sys_setns
.quad compat_sys_process_vm_readv
.quad compat_sys_process_vm_writev
+ .quad sys_fchmodat4
ia32_syscall_end:
diff --git a/arch/x86/include/asm/unistd_32.h b/arch/x86/include/asm/unistd_32.h
index 599c77d..112b299 100644
--- a/arch/x86/include/asm/unistd_32.h
+++ b/arch/x86/include/asm/unistd_32.h
@@ -354,10 +354,11 @@
#define __NR_setns 346
#define __NR_process_vm_readv 347
#define __NR_process_vm_writev 348
+#define __NR_fchmodat4 349
#ifdef __KERNEL__
-#define NR_syscalls 349
+#define NR_syscalls 350
#define __ARCH_WANT_IPC_PARSE_VERSION
#define __ARCH_WANT_OLD_READDIR
diff --git a/arch/x86/include/asm/unistd_64.h b/arch/x86/include/asm/unistd_64.h
index 0431f19..21564f9 100644
--- a/arch/x86/include/asm/unistd_64.h
+++ b/arch/x86/include/asm/unistd_64.h
@@ -686,6 +686,8 @@ __SYSCALL(__NR_getcpu, sys_getcpu)
__SYSCALL(__NR_process_vm_readv, sys_process_vm_readv)
#define __NR_process_vm_writev 311
__SYSCALL(__NR_process_vm_writev, sys_process_vm_writev)
+#define __NR_fchmodat4 312
+__SYSCALL(__NR_fchmodat4, sys_fchmodat4)
#ifndef __NO_STUBS
#define __ARCH_WANT_OLD_READDIR
diff --git a/arch/x86/kernel/syscall_table_32.S b/arch/x86/kernel/syscall_table_32.S
index 9a0e312..bff82a6 100644
--- a/arch/x86/kernel/syscall_table_32.S
+++ b/arch/x86/kernel/syscall_table_32.S
@@ -348,3 +348,4 @@ ENTRY(sys_call_table)
.long sys_setns
.long sys_process_vm_readv
.long sys_process_vm_writev
+ .long sys_fchmodat4
--
1.7.1
^ permalink raw reply related [flat|nested] 7+ messages in thread
* Re: [PATCH 0/2 RESEND] POSIX-compliant version of fchmodat with flag argument
2012-01-13 1:53 [PATCH 0/2 RESEND] POSIX-compliant version of fchmodat with flag argument Andrew Ayer
2012-01-13 1:53 ` [PATCH 1/2] vfs: Add fchmodat4 syscall: " Andrew Ayer
2012-01-13 1:53 ` [PATCH 2/2] x86: Hook up new fchmodat4 syscall Andrew Ayer
@ 2012-09-18 20:39 ` Kenny Root
2 siblings, 0 replies; 7+ messages in thread
From: Kenny Root @ 2012-09-18 20:39 UTC (permalink / raw)
To: Alexander Viro; +Cc: linux-fsdevel, linux-kernel, Andrew Ayer
On Thu, Jan 12, 2012 at 05:53:44PM -0800, Andrew Ayer wrote:
> Besides the POSIX-compliance, this patch will make it possible to
> ensure, in a race-free way, that you do not follow symlinks when
> chmodding. Previously, you could open a file with O_NOFOLLOW and fchmod
> it, but this only worked if you had read or write permissions on the
> file. Now you can open the file with O_PATH|O_NOFOLLOW and do fchmodat
> with AT_EMPTY_PATH.
Alexander, this patch solves a particular problem in a useful way. I
find it useful and I would be happy to see it included in mainline.
Thanks,
Kenny
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH 1/2] vfs: Add fchmodat4 syscall: fchmodat with flag argument
2012-01-13 1:53 ` [PATCH 1/2] vfs: Add fchmodat4 syscall: " Andrew Ayer
@ 2014-01-21 7:30 ` Florian Weimer
2014-01-21 18:57 ` Andrew Ayer
0 siblings, 1 reply; 7+ messages in thread
From: Florian Weimer @ 2014-01-21 7:30 UTC (permalink / raw)
To: Andrew Ayer, Alexander Viro; +Cc: linux-fsdevel, linux-kernel
On 01/13/2012 02:53 AM, Andrew Ayer wrote:
> This adds a 4 argument version of fchmodat (fchmodat4) that
> supports a flag argument, as specified by POSIX. It supports
> the same two flags as fchownat: AT_SYMLINK_NOFOLLOW and AT_EMPTY_PATH.
I don't think it's possible to emulate AT_EMPTY_PATH in user space, so I
wonder if this could be applied, and if not, why. Thanks.
--
Florian Weimer / Red Hat Product Security Team
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH 1/2] vfs: Add fchmodat4 syscall: fchmodat with flag argument
2014-01-21 7:30 ` Florian Weimer
@ 2014-01-21 18:57 ` Andrew Ayer
2014-01-21 18:58 ` [PATCH] vfs: Add version of " Andrew Ayer
0 siblings, 1 reply; 7+ messages in thread
From: Andrew Ayer @ 2014-01-21 18:57 UTC (permalink / raw)
To: Florian Weimer, Alexander Viro; +Cc: linux-fsdevel, linux-kernel
On Tue, 21 Jan 2014 08:30:16 +0100
Florian Weimer <fweimer@redhat.com> wrote:
> On 01/13/2012 02:53 AM, Andrew Ayer wrote:
> > This adds a 4 argument version of fchmodat (fchmodat4) that
> > supports a flag argument, as specified by POSIX. It supports
> > the same two flags as fchownat: AT_SYMLINK_NOFOLLOW and AT_EMPTY_PATH.
>
> I don't think it's possible to emulate AT_EMPTY_PATH in user space, so I
> wonder if this could be applied, and if not, why. Thanks.
The original patch no longer applies because there were some
minor changes to fs/open.c. I'll fix up the patch and send it in.
I too would very much like to see this applied, or to know why it can't
be.
Thanks,
Andrew
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH] vfs: Add version of fchmodat with flag argument
2014-01-21 18:57 ` Andrew Ayer
@ 2014-01-21 18:58 ` Andrew Ayer
0 siblings, 0 replies; 7+ messages in thread
From: Andrew Ayer @ 2014-01-21 18:58 UTC (permalink / raw)
To: viro; +Cc: linux-fsdevel, linux-kernel, fweimer
This adds a 4 argument version of fchmodat (fchmodat4) that
supports a flag argument, as specified by POSIX. It supports
the same two flags as fchownat: AT_SYMLINK_NOFOLLOW and AT_EMPTY_PATH.
Signed-off-by: Andrew Ayer <agwa@andrewayer.name>
---
fs/open.c | 23 ++++++++++++++++++++---
include/linux/syscalls.h | 2 ++
2 files changed, 22 insertions(+), 3 deletions(-)
diff --git a/fs/open.c b/fs/open.c
index 4b3e1ed..6f661f9 100644
--- a/fs/open.c
+++ b/fs/open.c
@@ -469,6 +469,9 @@ static int chmod_common(struct path *path, umode_t mode)
struct iattr newattrs;
int error;
+ if (S_ISLNK(inode->i_mode))
+ return -EOPNOTSUPP;
+
error = mnt_want_write(path->mnt);
if (error)
return error;
@@ -506,9 +509,22 @@ SYSCALL_DEFINE2(fchmod, unsigned int, fd, umode_t, mode)
SYSCALL_DEFINE3(fchmodat, int, dfd, const char __user *, filename, umode_t, mode)
{
+ return sys_fchmodat4(dfd, filename, mode, 0);
+}
+
+SYSCALL_DEFINE4(fchmodat4, int, dfd, const char __user *, filename,
+ umode_t, mode, int, flag)
+{
struct path path;
- int error;
- unsigned int lookup_flags = LOOKUP_FOLLOW;
+ int error = -EINVAL;
+ unsigned int lookup_flags;
+
+ if ((flag & ~(AT_SYMLINK_NOFOLLOW | AT_EMPTY_PATH)) != 0)
+ goto out;
+
+ lookup_flags = (flag & AT_SYMLINK_NOFOLLOW) ? 0 : LOOKUP_FOLLOW;
+ if (flag & AT_EMPTY_PATH)
+ lookup_flags |= LOOKUP_EMPTY;
retry:
error = user_path_at(dfd, filename, lookup_flags, &path);
if (!error) {
@@ -519,12 +535,13 @@ retry:
goto retry;
}
}
+out:
return error;
}
SYSCALL_DEFINE2(chmod, const char __user *, filename, umode_t, mode)
{
- return sys_fchmodat(AT_FDCWD, filename, mode);
+ return sys_fchmodat4(AT_FDCWD, filename, mode, 0);
}
static int chown_common(struct path *path, uid_t user, gid_t group)
diff --git a/include/linux/syscalls.h b/include/linux/syscalls.h
index 40ed9e9..32811df 100644
--- a/include/linux/syscalls.h
+++ b/include/linux/syscalls.h
@@ -747,6 +747,8 @@ asmlinkage long sys_futimesat(int dfd, const char __user *filename,
asmlinkage long sys_faccessat(int dfd, const char __user *filename, int mode);
asmlinkage long sys_fchmodat(int dfd, const char __user * filename,
umode_t mode);
+asmlinkage long sys_fchmodat4(int dfd, const char __user *filename,
+ umode_t mode, int flag);
asmlinkage long sys_fchownat(int dfd, const char __user *filename, uid_t user,
gid_t group, int flag);
asmlinkage long sys_openat(int dfd, const char __user *filename, int flags,
--
1.7.10.4
^ permalink raw reply related [flat|nested] 7+ messages in thread
end of thread, other threads:[~2014-01-21 19:06 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-01-13 1:53 [PATCH 0/2 RESEND] POSIX-compliant version of fchmodat with flag argument Andrew Ayer
2012-01-13 1:53 ` [PATCH 1/2] vfs: Add fchmodat4 syscall: " Andrew Ayer
2014-01-21 7:30 ` Florian Weimer
2014-01-21 18:57 ` Andrew Ayer
2014-01-21 18:58 ` [PATCH] vfs: Add version of " Andrew Ayer
2012-01-13 1:53 ` [PATCH 2/2] x86: Hook up new fchmodat4 syscall Andrew Ayer
2012-09-18 20:39 ` [PATCH 0/2 RESEND] POSIX-compliant version of fchmodat with flag argument Kenny Root
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).