From mboxrd@z Thu Jan 1 00:00:00 1970 From: Christoph Hellwig Subject: Re: [RFC][PATCH 0/2] Correct behavior for listxattr and 'trusted' xattrs Date: Wed, 3 Mar 2010 09:09:41 -0500 Message-ID: <20100303140940.GA2253@infradead.org> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, David Woodhouse , Joel Becker , Mark Fasheh , Alex Elder , Chris Mason , a.gruenbacher@computer.org To: James Morris Return-path: Received: from bombadil.infradead.org ([18.85.46.34]:34860 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754463Ab0CCOJp (ORCPT ); Wed, 3 Mar 2010 09:09:45 -0500 Content-Disposition: inline In-Reply-To: Sender: linux-fsdevel-owner@vger.kernel.org List-ID: On Tue, Mar 02, 2010 at 07:01:05PM +1100, James Morris wrote: > I noticed that there are differences in the behavior of listxattr(2) for > xattrs in the trusted namespace. > > Some filesystems, such as ext[234], require CAP_SYS_ADMIN for this, i.e. > trusted xattr names are hidden from unprivileged users. > > I audited the kernel for users of the trusted xattr namespace, and found > the following filesystems not checking for CAP_SYS_ADMIN: > > - jffs2 > - ocfs2 > - btrfs > - xfs > > I've created patches for jffs2 (tested) and ocfs2 (not tested) to add the > check -- see following emails. btrfs and xfs have custom listxattr > operations and will need a bit more work to fix. I think the behaviour of the above filesystems is correct. There is no requirement for privilegues to see the existence of these attributes. We also don't hide entries that aren't readable from readdir output.