On Fri, Dec 01, 2023 at 05:41:19PM +0100, Christian Brauner wrote: > > /** > > - * get_vfs_caps_from_disk - retrieve vfs caps from disk > > + * vfs_caps_from_xattr - convert raw caps xattr data to vfs_caps > > * > > - * @idmap: idmap of the mount the inode was found from > > - * @dentry: dentry from which @inode is retrieved > > - * @cpu_caps: vfs capabilities > > + * @idmap: idmap of the mount the inode was found from > > + * @src_userns: user namespace for ids in xattr data > > + * @vfs_caps: destination buffer for vfs_caps data > > + * @data: rax xattr caps data > > + * @size: size of xattr data > > * > > - * Extract the on-exec-apply capability sets for an executable file. > > + * Converts a raw security.capability xattr into the kernel-internal > > + * capabilities format. > > * > > - * If the inode has been found through an idmapped mount the idmap of > > - * the vfsmount must be passed through @idmap. This function will then > > - * take care to map the inode according to @idmap before checking > > - * permissions. On non-idmapped mounts or if permission checking is to be > > - * performed on the raw inode simply pass @nop_mnt_idmap. > > + * If the xattr is being read or written through an idmapped mount the > > + * idmap of the vfsmount must be passed through @idmap. This function > > + * will then take care to map the rootid according to @idmap. > > + * > > + * Return: On success, return 0; on error, return < 0. > > */ > > -int get_vfs_caps_from_disk(struct mnt_idmap *idmap, > > - const struct dentry *dentry, > > - struct vfs_caps *cpu_caps) > > +int vfs_caps_from_xattr(struct mnt_idmap *idmap, > > + struct user_namespace *src_userns, > > + struct vfs_caps *vfs_caps, > > + const void *data, int size) > > { > > - struct inode *inode = d_backing_inode(dentry); > > __u32 magic_etc; > > - int size; > > - struct vfs_ns_cap_data data, *nscaps = &data; > > - struct vfs_cap_data *caps = (struct vfs_cap_data *) &data; > > + const struct vfs_ns_cap_data *ns_caps = data; > > The casting here is predicated on the compatibility of these two structs > and I'm kinda surprised to see no static assertions about their layout. > So I would recommend to add some to the header: > > diff --git a/include/uapi/linux/capability.h b/include/uapi/linux/capability.h > index 5bb906098697..0fd75aab9754 100644 > --- a/include/uapi/linux/capability.h > +++ b/include/uapi/linux/capability.h > @@ -16,6 +16,10 @@ > > #include <linux/types.h> > > +#ifdef __KERNEL__ > +#include <linux/build_bug.h> > +#endif > + > /* User-level do most of the mapping between kernel and user > capabilities based on the version tag given by the kernel. The > kernel might be somewhat backwards compatible, but don't bet on > @@ -100,6 +104,15 @@ struct vfs_ns_cap_data { > #define _LINUX_CAPABILITY_VERSION _LINUX_CAPABILITY_VERSION_1 > #define _LINUX_CAPABILITY_U32S _LINUX_CAPABILITY_U32S_1 > > +#else > + > +static_assert(offsetof(struct vfs_cap_data, magic_etc) == > + offsetof(struct vfs_ns_cap_data, magic_etc)); > +static_assert(offsetof(struct vfs_cap_data, data) == > + offsetof(struct vfs_ns_cap_data, data)); > +static_assert(sizeof(struct vfs_cap_data) == > + offsetof(struct vfs_ns_cap_data, rootid)); > + > #endif It's a little orthogonal to the changes, but I can certainly add a patch for this. > > +/** > > + * vfs_caps_to_xattr - convert vfs_caps to raw caps xattr data > > + * > > + * @idmap: idmap of the mount the inode was found from > > + * @dest_userns: user namespace for ids in xattr data > > + * @vfs_caps: source vfs_caps data > > + * @data: destination buffer for rax xattr caps data > > + * @size: size of the @data buffer > > + * > > + * Converts a kernel-interrnal capability into the raw security.capability > > s/interrnal/internal/ > > > + * xattr format. > > + * > > + * If the xattr is being read or written through an idmapped mount the > > + * idmap of the vfsmount must be passed through @idmap. This function > > + * will then take care to map the rootid according to @idmap. > > + * > > + * Return: On success, return 0; on error, return < 0. > > + */ > > +int vfs_caps_to_xattr(struct mnt_idmap *idmap, > > + struct user_namespace *dest_userns, > > + const struct vfs_caps *vfs_caps, > > + void *data, int size) > > +{ > > + struct vfs_ns_cap_data *caps = data; > > + int ret; > > + > > + ret = __vfs_caps_to_xattr(idmap, dest_userns, vfs_caps, data, size); > > + if (ret > 0 && > > + (vfs_caps->magic_etc & VFS_CAP_REVISION_MASK) == VFS_CAP_REVISION_3 && > > + le32_to_cpu(caps->rootid) == (uid_t)-1) > > + return -EOVERFLOW; > > I think the return value situation of these two helper is a bit > confusing. So if they return the size or a negative error pointer the > return value of both functions should likely be ssize_t. > > But unless you actually later use the size in the callers of these > helpers it would be easier to just stick with 0 on success, negative > errno on failure. Note that that's what vfs_caps_from_xattr() is doing. > > I'll see whether that becomes relevant later in the series though. Size is relevant since the different versions have different xattr sizes, and callers need to know how much data to write to disk or copy to userspace. ssize_t probably is better though, so I'll change it.