| // SPDX-License-Identifier: GPL-2.0 |
| /* |
| * linux/fs/ioctl.c |
| * |
| * Copyright (C) 1991, 1992 Linus Torvalds |
| */ |
| |
| #include <linux/syscalls.h> |
| #include <linux/mm.h> |
| #include <linux/capability.h> |
| #include <linux/compat.h> |
| #include <linux/file.h> |
| #include <linux/fs.h> |
| #include <linux/security.h> |
| #include <linux/export.h> |
| #include <linux/uaccess.h> |
| #include <linux/writeback.h> |
| #include <linux/buffer_head.h> |
| #include <linux/falloc.h> |
| #include <linux/sched/signal.h> |
| #include <linux/fiemap.h> |
| #include <linux/mount.h> |
| #include <linux/fscrypt.h> |
| #include <linux/fileattr.h> |
| |
| #include "internal.h" |
| |
| #include <asm/ioctls.h> |
| |
| /* So that the fiemap access checks can't overflow on 32 bit machines. */ |
| #define FIEMAP_MAX_EXTENTS (UINT_MAX / sizeof(struct fiemap_extent)) |
| |
| /** |
| * vfs_ioctl - call filesystem specific ioctl methods |
| * @filp: open file to invoke ioctl method on |
| * @cmd: ioctl command to execute |
| * @arg: command-specific argument for ioctl |
| * |
| * Invokes filesystem specific ->unlocked_ioctl, if one exists; otherwise |
| * returns -ENOTTY. |
| * |
| * Returns 0 on success, -errno on error. |
| */ |
| long vfs_ioctl(struct file *filp, unsigned int cmd, unsigned long arg) |
| { |
| int error = -ENOTTY; |
| |
| if (!filp->f_op->unlocked_ioctl) |
| goto out; |
| |
| error = filp->f_op->unlocked_ioctl(filp, cmd, arg); |
| if (error == -ENOIOCTLCMD) |
| error = -ENOTTY; |
| out: |
| return error; |
| } |
| EXPORT_SYMBOL(vfs_ioctl); |
| |
| static int ioctl_fibmap(struct file *filp, int __user *p) |
| { |
| struct inode *inode = file_inode(filp); |
| struct super_block *sb = inode->i_sb; |
| int error, ur_block; |
| sector_t block; |
| |
| if (!capable(CAP_SYS_RAWIO)) |
| return -EPERM; |
| |
| error = get_user(ur_block, p); |
| if (error) |
| return error; |
| |
| if (ur_block < 0) |
| return -EINVAL; |
| |
| block = ur_block; |
| error = bmap(inode, &block); |
| |
| if (block > INT_MAX) { |
| error = -ERANGE; |
| pr_warn_ratelimited("[%s/%d] FS: %s File: %pD4 would truncate fibmap result\n", |
| current->comm, task_pid_nr(current), |
| sb->s_id, filp); |
| } |
| |
| if (error) |
| ur_block = 0; |
| else |
| ur_block = block; |
| |
| if (put_user(ur_block, p)) |
| error = -EFAULT; |
| |
| return error; |
| } |
| |
| /** |
| * fiemap_fill_next_extent - Fiemap helper function |
| * @fieinfo: Fiemap context passed into ->fiemap |
| * @logical: Extent logical start offset, in bytes |
| * @phys: Extent physical start offset, in bytes |
| * @len: Extent length, in bytes |
| * @flags: FIEMAP_EXTENT flags that describe this extent |
| * |
| * Called from file system ->fiemap callback. Will populate extent |
| * info as passed in via arguments and copy to user memory. On |
| * success, extent count on fieinfo is incremented. |
| * |
| * Returns 0 on success, -errno on error, 1 if this was the last |
| * extent that will fit in user array. |
| */ |
| int fiemap_fill_next_extent(struct fiemap_extent_info *fieinfo, u64 logical, |
| u64 phys, u64 len, u32 flags) |
| { |
| struct fiemap_extent extent; |
| struct fiemap_extent __user *dest = fieinfo->fi_extents_start; |
| |
| /* only count the extents */ |
| if (fieinfo->fi_extents_max == 0) { |
| fieinfo->fi_extents_mapped++; |
| return (flags & FIEMAP_EXTENT_LAST) ? 1 : 0; |
| } |
| |
| if (fieinfo->fi_extents_mapped >= fieinfo->fi_extents_max) |
| return 1; |
| |
| #define SET_UNKNOWN_FLAGS (FIEMAP_EXTENT_DELALLOC) |
| #define SET_NO_UNMOUNTED_IO_FLAGS (FIEMAP_EXTENT_DATA_ENCRYPTED) |
| #define SET_NOT_ALIGNED_FLAGS (FIEMAP_EXTENT_DATA_TAIL|FIEMAP_EXTENT_DATA_INLINE) |
| |
| if (flags & SET_UNKNOWN_FLAGS) |
| flags |= FIEMAP_EXTENT_UNKNOWN; |
| if (flags & SET_NO_UNMOUNTED_IO_FLAGS) |
| flags |= FIEMAP_EXTENT_ENCODED; |
| if (flags & SET_NOT_ALIGNED_FLAGS) |
| flags |= FIEMAP_EXTENT_NOT_ALIGNED; |
| |
| memset(&extent, 0, sizeof(extent)); |
| extent.fe_logical = logical; |
| extent.fe_physical = phys; |
| extent.fe_length = len; |
| extent.fe_flags = flags; |
| |
| dest += fieinfo->fi_extents_mapped; |
| if (copy_to_user(dest, &extent, sizeof(extent))) |
| return -EFAULT; |
| |
| fieinfo->fi_extents_mapped++; |
| if (fieinfo->fi_extents_mapped == fieinfo->fi_extents_max) |
| return 1; |
| return (flags & FIEMAP_EXTENT_LAST) ? 1 : 0; |
| } |
| EXPORT_SYMBOL(fiemap_fill_next_extent); |
| |
| /** |
| * fiemap_prep - check validity of requested flags for fiemap |
| * @inode: Inode to operate on |
| * @fieinfo: Fiemap context passed into ->fiemap |
| * @start: Start of the mapped range |
| * @len: Length of the mapped range, can be truncated by this function. |
| * @supported_flags: Set of fiemap flags that the file system understands |
| * |
| * This function must be called from each ->fiemap instance to validate the |
| * fiemap request against the file system parameters. |
| * |
| * Returns 0 on success, or a negative error on failure. |
| */ |
| int fiemap_prep(struct inode *inode, struct fiemap_extent_info *fieinfo, |
| u64 start, u64 *len, u32 supported_flags) |
| { |
| u64 maxbytes = inode->i_sb->s_maxbytes; |
| u32 incompat_flags; |
| int ret = 0; |
| |
| if (*len == 0) |
| return -EINVAL; |
| if (start >= maxbytes) |
| return -EFBIG; |
| |
| /* |
| * Shrink request scope to what the fs can actually handle. |
| */ |
| if (*len > maxbytes || (maxbytes - *len) < start) |
| *len = maxbytes - start; |
| |
| supported_flags |= FIEMAP_FLAG_SYNC; |
| supported_flags &= FIEMAP_FLAGS_COMPAT; |
| incompat_flags = fieinfo->fi_flags & ~supported_flags; |
| if (incompat_flags) { |
| fieinfo->fi_flags = incompat_flags; |
| return -EBADR; |
| } |
| |
| if (fieinfo->fi_flags & FIEMAP_FLAG_SYNC) |
| ret = filemap_write_and_wait(inode->i_mapping); |
| return ret; |
| } |
| EXPORT_SYMBOL(fiemap_prep); |
| |
| static int ioctl_fiemap(struct file *filp, struct fiemap __user *ufiemap) |
| { |
| struct fiemap fiemap; |
| struct fiemap_extent_info fieinfo = { 0, }; |
| struct inode *inode = file_inode(filp); |
| int error; |
| |
| if (!inode->i_op->fiemap) |
| return -EOPNOTSUPP; |
| |
| if (copy_from_user(&fiemap, ufiemap, sizeof(fiemap))) |
| return -EFAULT; |
| |
| if (fiemap.fm_extent_count > FIEMAP_MAX_EXTENTS) |
| return -EINVAL; |
| |
| fieinfo.fi_flags = fiemap.fm_flags; |
| fieinfo.fi_extents_max = fiemap.fm_extent_count; |
| fieinfo.fi_extents_start = ufiemap->fm_extents; |
| |
| error = inode->i_op->fiemap(inode, &fieinfo, fiemap.fm_start, |
| fiemap.fm_length); |
| |
| fiemap.fm_flags = fieinfo.fi_flags; |
| fiemap.fm_mapped_extents = fieinfo.fi_extents_mapped; |
| if (copy_to_user(ufiemap, &fiemap, sizeof(fiemap))) |
| error = -EFAULT; |
| |
| return error; |
| } |
| |
| static long ioctl_file_clone(struct file *dst_file, unsigned long srcfd, |
| u64 off, u64 olen, u64 destoff) |
| { |
| struct fd src_file = fdget(srcfd); |
| loff_t cloned; |
| int ret; |
| |
| if (!fd_file(src_file)) |
| return -EBADF; |
| cloned = vfs_clone_file_range(fd_file(src_file), off, dst_file, destoff, |
| olen, 0); |
| if (cloned < 0) |
| ret = cloned; |
| else if (olen && cloned != olen) |
| ret = -EINVAL; |
| else |
| ret = 0; |
| fdput(src_file); |
| return ret; |
| } |
| |
| static long ioctl_file_clone_range(struct file *file, |
| struct file_clone_range __user *argp) |
| { |
| struct file_clone_range args; |
| |
| if (copy_from_user(&args, argp, sizeof(args))) |
| return -EFAULT; |
| return ioctl_file_clone(file, args.src_fd, args.src_offset, |
| args.src_length, args.dest_offset); |
| } |
| |
| /* |
| * This provides compatibility with legacy XFS pre-allocation ioctls |
| * which predate the fallocate syscall. |
| * |
| * Only the l_start, l_len and l_whence fields of the 'struct space_resv' |
| * are used here, rest are ignored. |
| */ |
| static int ioctl_preallocate(struct file *filp, int mode, void __user *argp) |
| { |
| struct inode *inode = file_inode(filp); |
| struct space_resv sr; |
| |
| if (copy_from_user(&sr, argp, sizeof(sr))) |
| return -EFAULT; |
| |
| switch (sr.l_whence) { |
| case SEEK_SET: |
| break; |
| case SEEK_CUR: |
| sr.l_start += filp->f_pos; |
| break; |
| case SEEK_END: |
| sr.l_start += i_size_read(inode); |
| break; |
| default: |
| return -EINVAL; |
| } |
| |
| return vfs_fallocate(filp, mode | FALLOC_FL_KEEP_SIZE, sr.l_start, |
| sr.l_len); |
| } |
| |
| /* on ia32 l_start is on a 32-bit boundary */ |
| #if defined CONFIG_COMPAT && defined(CONFIG_X86_64) |
| /* just account for different alignment */ |
| static int compat_ioctl_preallocate(struct file *file, int mode, |
| struct space_resv_32 __user *argp) |
| { |
| struct inode *inode = file_inode(file); |
| struct space_resv_32 sr; |
| |
| if (copy_from_user(&sr, argp, sizeof(sr))) |
| return -EFAULT; |
| |
| switch (sr.l_whence) { |
| case SEEK_SET: |
| break; |
| case SEEK_CUR: |
| sr.l_start += file->f_pos; |
| break; |
| case SEEK_END: |
| sr.l_start += i_size_read(inode); |
| break; |
| default: |
| return -EINVAL; |
| } |
| |
| return vfs_fallocate(file, mode | FALLOC_FL_KEEP_SIZE, sr.l_start, sr.l_len); |
| } |
| #endif |
| |
| static int file_ioctl(struct file *filp, unsigned int cmd, int __user *p) |
| { |
| switch (cmd) { |
| case FIBMAP: |
| return ioctl_fibmap(filp, p); |
| case FS_IOC_RESVSP: |
| case FS_IOC_RESVSP64: |
| return ioctl_preallocate(filp, 0, p); |
| case FS_IOC_UNRESVSP: |
| case FS_IOC_UNRESVSP64: |
| return ioctl_preallocate(filp, FALLOC_FL_PUNCH_HOLE, p); |
| case FS_IOC_ZERO_RANGE: |
| return ioctl_preallocate(filp, FALLOC_FL_ZERO_RANGE, p); |
| } |
| |
| return -ENOIOCTLCMD; |
| } |
| |
| static int ioctl_fionbio(struct file *filp, int __user *argp) |
| { |
| unsigned int flag; |
| int on, error; |
| |
| error = get_user(on, argp); |
| if (error) |
| return error; |
| flag = O_NONBLOCK; |
| #ifdef __sparc__ |
| /* SunOS compatibility item. */ |
| if (O_NONBLOCK != O_NDELAY) |
| flag |= O_NDELAY; |
| #endif |
| spin_lock(&filp->f_lock); |
| if (on) |
| filp->f_flags |= flag; |
| else |
| filp->f_flags &= ~flag; |
| spin_unlock(&filp->f_lock); |
| return error; |
| } |
| |
| static int ioctl_fioasync(unsigned int fd, struct file *filp, |
| int __user *argp) |
| { |
| unsigned int flag; |
| int on, error; |
| |
| error = get_user(on, argp); |
| if (error) |
| return error; |
| flag = on ? FASYNC : 0; |
| |
| /* Did FASYNC state change ? */ |
| if ((flag ^ filp->f_flags) & FASYNC) { |
| if (filp->f_op->fasync) |
| /* fasync() adjusts filp->f_flags */ |
| error = filp->f_op->fasync(fd, filp, on); |
| else |
| error = -ENOTTY; |
| } |
| return error < 0 ? error : 0; |
| } |
| |
| static int ioctl_fsfreeze(struct file *filp) |
| { |
| struct super_block *sb = file_inode(filp)->i_sb; |
| |
| if (!ns_capable(sb->s_user_ns, CAP_SYS_ADMIN)) |
| return -EPERM; |
| |
| /* If filesystem doesn't support freeze feature, return. */ |
| if (sb->s_op->freeze_fs == NULL && sb->s_op->freeze_super == NULL) |
| return -EOPNOTSUPP; |
| |
| /* Freeze */ |
| if (sb->s_op->freeze_super) |
| return sb->s_op->freeze_super(sb, FREEZE_HOLDER_USERSPACE); |
| return freeze_super(sb, FREEZE_HOLDER_USERSPACE); |
| } |
| |
| static int ioctl_fsthaw(struct file *filp) |
| { |
| struct super_block *sb = file_inode(filp)->i_sb; |
| |
| if (!ns_capable(sb->s_user_ns, CAP_SYS_ADMIN)) |
| return -EPERM; |
| |
| /* Thaw */ |
| if (sb->s_op->thaw_super) |
| return sb->s_op->thaw_super(sb, FREEZE_HOLDER_USERSPACE); |
| return thaw_super(sb, FREEZE_HOLDER_USERSPACE); |
| } |
| |
| static int ioctl_file_dedupe_range(struct file *file, |
| struct file_dedupe_range __user *argp) |
| { |
| struct file_dedupe_range *same = NULL; |
| int ret; |
| unsigned long size; |
| u16 count; |
| |
| if (get_user(count, &argp->dest_count)) { |
| ret = -EFAULT; |
| goto out; |
| } |
| |
| size = offsetof(struct file_dedupe_range, info[count]); |
| if (size > PAGE_SIZE) { |
| ret = -ENOMEM; |
| goto out; |
| } |
| |
| same = memdup_user(argp, size); |
| if (IS_ERR(same)) { |
| ret = PTR_ERR(same); |
| same = NULL; |
| goto out; |
| } |
| |
| same->dest_count = count; |
| ret = vfs_dedupe_file_range(file, same); |
| if (ret) |
| goto out; |
| |
| ret = copy_to_user(argp, same, size); |
| if (ret) |
| ret = -EFAULT; |
| |
| out: |
| kfree(same); |
| return ret; |
| } |
| |
| /** |
| * fileattr_fill_xflags - initialize fileattr with xflags |
| * @fa: fileattr pointer |
| * @xflags: FS_XFLAG_* flags |
| * |
| * Set ->fsx_xflags, ->fsx_valid and ->flags (translated xflags). All |
| * other fields are zeroed. |
| */ |
| void fileattr_fill_xflags(struct fileattr *fa, u32 xflags) |
| { |
| memset(fa, 0, sizeof(*fa)); |
| fa->fsx_valid = true; |
| fa->fsx_xflags = xflags; |
| if (fa->fsx_xflags & FS_XFLAG_IMMUTABLE) |
| fa->flags |= FS_IMMUTABLE_FL; |
| if (fa->fsx_xflags & FS_XFLAG_APPEND) |
| fa->flags |= FS_APPEND_FL; |
| if (fa->fsx_xflags & FS_XFLAG_SYNC) |
| fa->flags |= FS_SYNC_FL; |
| if (fa->fsx_xflags & FS_XFLAG_NOATIME) |
| fa->flags |= FS_NOATIME_FL; |
| if (fa->fsx_xflags & FS_XFLAG_NODUMP) |
| fa->flags |= FS_NODUMP_FL; |
| if (fa->fsx_xflags & FS_XFLAG_DAX) |
| fa->flags |= FS_DAX_FL; |
| if (fa->fsx_xflags & FS_XFLAG_PROJINHERIT) |
| fa->flags |= FS_PROJINHERIT_FL; |
| } |
| EXPORT_SYMBOL(fileattr_fill_xflags); |
| |
| /** |
| * fileattr_fill_flags - initialize fileattr with flags |
| * @fa: fileattr pointer |
| * @flags: FS_*_FL flags |
| * |
| * Set ->flags, ->flags_valid and ->fsx_xflags (translated flags). |
| * All other fields are zeroed. |
| */ |
| void fileattr_fill_flags(struct fileattr *fa, u32 flags) |
| { |
| memset(fa, 0, sizeof(*fa)); |
| fa->flags_valid = true; |
| fa->flags = flags; |
| if (fa->flags & FS_SYNC_FL) |
| fa->fsx_xflags |= FS_XFLAG_SYNC; |
| if (fa->flags & FS_IMMUTABLE_FL) |
| fa->fsx_xflags |= FS_XFLAG_IMMUTABLE; |
| if (fa->flags & FS_APPEND_FL) |
| fa->fsx_xflags |= FS_XFLAG_APPEND; |
| if (fa->flags & FS_NODUMP_FL) |
| fa->fsx_xflags |= FS_XFLAG_NODUMP; |
| if (fa->flags & FS_NOATIME_FL) |
| fa->fsx_xflags |= FS_XFLAG_NOATIME; |
| if (fa->flags & FS_DAX_FL) |
| fa->fsx_xflags |= FS_XFLAG_DAX; |
| if (fa->flags & FS_PROJINHERIT_FL) |
| fa->fsx_xflags |= FS_XFLAG_PROJINHERIT; |
| } |
| EXPORT_SYMBOL(fileattr_fill_flags); |
| |
| /** |
| * vfs_fileattr_get - retrieve miscellaneous file attributes |
| * @dentry: the object to retrieve from |
| * @fa: fileattr pointer |
| * |
| * Call i_op->fileattr_get() callback, if exists. |
| * |
| * Return: 0 on success, or a negative error on failure. |
| */ |
| int vfs_fileattr_get(struct dentry *dentry, struct fileattr *fa) |
| { |
| struct inode *inode = d_inode(dentry); |
| |
| if (!inode->i_op->fileattr_get) |
| return -ENOIOCTLCMD; |
| |
| return inode->i_op->fileattr_get(dentry, fa); |
| } |
| EXPORT_SYMBOL(vfs_fileattr_get); |
| |
| /** |
| * copy_fsxattr_to_user - copy fsxattr to userspace. |
| * @fa: fileattr pointer |
| * @ufa: fsxattr user pointer |
| * |
| * Return: 0 on success, or -EFAULT on failure. |
| */ |
| int copy_fsxattr_to_user(const struct fileattr *fa, struct fsxattr __user *ufa) |
| { |
| struct fsxattr xfa; |
| |
| memset(&xfa, 0, sizeof(xfa)); |
| xfa.fsx_xflags = fa->fsx_xflags; |
| xfa.fsx_extsize = fa->fsx_extsize; |
| xfa.fsx_nextents = fa->fsx_nextents; |
| xfa.fsx_projid = fa->fsx_projid; |
| xfa.fsx_cowextsize = fa->fsx_cowextsize; |
| |
| if (copy_to_user(ufa, &xfa, sizeof(xfa))) |
| return -EFAULT; |
| |
| return 0; |
| } |
| EXPORT_SYMBOL(copy_fsxattr_to_user); |
| |
| static int copy_fsxattr_from_user(struct fileattr *fa, |
| struct fsxattr __user *ufa) |
| { |
| struct fsxattr xfa; |
| |
| if (copy_from_user(&xfa, ufa, sizeof(xfa))) |
| return -EFAULT; |
| |
| fileattr_fill_xflags(fa, xfa.fsx_xflags); |
| fa->fsx_extsize = xfa.fsx_extsize; |
| fa->fsx_nextents = xfa.fsx_nextents; |
| fa->fsx_projid = xfa.fsx_projid; |
| fa->fsx_cowextsize = xfa.fsx_cowextsize; |
| |
| return 0; |
| } |
| |
| /* |
| * Generic function to check FS_IOC_FSSETXATTR/FS_IOC_SETFLAGS values and reject |
| * any invalid configurations. |
| * |
| * Note: must be called with inode lock held. |
| */ |
| static int fileattr_set_prepare(struct inode *inode, |
| const struct fileattr *old_ma, |
| struct fileattr *fa) |
| { |
| int err; |
| |
| /* |
| * The IMMUTABLE and APPEND_ONLY flags can only be changed by |
| * the relevant capability. |
| */ |
| if ((fa->flags ^ old_ma->flags) & (FS_APPEND_FL | FS_IMMUTABLE_FL) && |
| !capable(CAP_LINUX_IMMUTABLE)) |
| return -EPERM; |
| |
| err = fscrypt_prepare_setflags(inode, old_ma->flags, fa->flags); |
| if (err) |
| return err; |
| |
| /* |
| * Project Quota ID state is only allowed to change from within the init |
| * namespace. Enforce that restriction only if we are trying to change |
| * the quota ID state. Everything else is allowed in user namespaces. |
| */ |
| if (current_user_ns() != &init_user_ns) { |
| if (old_ma->fsx_projid != fa->fsx_projid) |
| return -EINVAL; |
| if ((old_ma->fsx_xflags ^ fa->fsx_xflags) & |
| FS_XFLAG_PROJINHERIT) |
| return -EINVAL; |
| } else { |
| /* |
| * Caller is allowed to change the project ID. If it is being |
| * changed, make sure that the new value is valid. |
| */ |
| if (old_ma->fsx_projid != fa->fsx_projid && |
| !projid_valid(make_kprojid(&init_user_ns, fa->fsx_projid))) |
| return -EINVAL; |
| } |
| |
| /* Check extent size hints. */ |
| if ((fa->fsx_xflags & FS_XFLAG_EXTSIZE) && !S_ISREG(inode->i_mode)) |
| return -EINVAL; |
| |
| if ((fa->fsx_xflags & FS_XFLAG_EXTSZINHERIT) && |
| !S_ISDIR(inode->i_mode)) |
| return -EINVAL; |
| |
| if ((fa->fsx_xflags & FS_XFLAG_COWEXTSIZE) && |
| !S_ISREG(inode->i_mode) && !S_ISDIR(inode->i_mode)) |
| return -EINVAL; |
| |
| /* |
| * It is only valid to set the DAX flag on regular files and |
| * directories on filesystems. |
| */ |
| if ((fa->fsx_xflags & FS_XFLAG_DAX) && |
| !(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) |
| return -EINVAL; |
| |
| /* Extent size hints of zero turn off the flags. */ |
| if (fa->fsx_extsize == 0) |
| fa->fsx_xflags &= ~(FS_XFLAG_EXTSIZE | FS_XFLAG_EXTSZINHERIT); |
| if (fa->fsx_cowextsize == 0) |
| fa->fsx_xflags &= ~FS_XFLAG_COWEXTSIZE; |
| |
| return 0; |
| } |
| |
| /** |
| * vfs_fileattr_set - change miscellaneous file attributes |
| * @idmap: idmap of the mount |
| * @dentry: the object to change |
| * @fa: fileattr pointer |
| * |
| * After verifying permissions, call i_op->fileattr_set() callback, if |
| * exists. |
| * |
| * Verifying attributes involves retrieving current attributes with |
| * i_op->fileattr_get(), this also allows initializing attributes that have |
| * not been set by the caller to current values. Inode lock is held |
| * thoughout to prevent racing with another instance. |
| * |
| * Return: 0 on success, or a negative error on failure. |
| */ |
| int vfs_fileattr_set(struct mnt_idmap *idmap, struct dentry *dentry, |
| struct fileattr *fa) |
| { |
| struct inode *inode = d_inode(dentry); |
| struct fileattr old_ma = {}; |
| int err; |
| |
| if (!inode->i_op->fileattr_set) |
| return -ENOIOCTLCMD; |
| |
| if (!inode_owner_or_capable(idmap, inode)) |
| return -EPERM; |
| |
| inode_lock(inode); |
| err = vfs_fileattr_get(dentry, &old_ma); |
| if (!err) { |
| /* initialize missing bits from old_ma */ |
| if (fa->flags_valid) { |
| fa->fsx_xflags |= old_ma.fsx_xflags & ~FS_XFLAG_COMMON; |
| fa->fsx_extsize = old_ma.fsx_extsize; |
| fa->fsx_nextents = old_ma.fsx_nextents; |
| fa->fsx_projid = old_ma.fsx_projid; |
| fa->fsx_cowextsize = old_ma.fsx_cowextsize; |
| } else { |
| fa->flags |= old_ma.flags & ~FS_COMMON_FL; |
| } |
| err = fileattr_set_prepare(inode, &old_ma, fa); |
| if (!err) |
| err = inode->i_op->fileattr_set(idmap, dentry, fa); |
| } |
| inode_unlock(inode); |
| |
| return err; |
| } |
| EXPORT_SYMBOL(vfs_fileattr_set); |
| |
| static int ioctl_getflags(struct file *file, unsigned int __user *argp) |
| { |
| struct fileattr fa = { .flags_valid = true }; /* hint only */ |
| int err; |
| |
| err = vfs_fileattr_get(file->f_path.dentry, &fa); |
| if (!err) |
| err = put_user(fa.flags, argp); |
| return err; |
| } |
| |
| static int ioctl_setflags(struct file *file, unsigned int __user *argp) |
| { |
| struct mnt_idmap *idmap = file_mnt_idmap(file); |
| struct dentry *dentry = file->f_path.dentry; |
| struct fileattr fa; |
| unsigned int flags; |
| int err; |
| |
| err = get_user(flags, argp); |
| if (!err) { |
| err = mnt_want_write_file(file); |
| if (!err) { |
| fileattr_fill_flags(&fa, flags); |
| err = vfs_fileattr_set(idmap, dentry, &fa); |
| mnt_drop_write_file(file); |
| } |
| } |
| return err; |
| } |
| |
| static int ioctl_fsgetxattr(struct file *file, void __user *argp) |
| { |
| struct fileattr fa = { .fsx_valid = true }; /* hint only */ |
| int err; |
| |
| err = vfs_fileattr_get(file->f_path.dentry, &fa); |
| if (!err) |
| err = copy_fsxattr_to_user(&fa, argp); |
| |
| return err; |
| } |
| |
| static int ioctl_fssetxattr(struct file *file, void __user *argp) |
| { |
| struct mnt_idmap *idmap = file_mnt_idmap(file); |
| struct dentry *dentry = file->f_path.dentry; |
| struct fileattr fa; |
| int err; |
| |
| err = copy_fsxattr_from_user(&fa, argp); |
| if (!err) { |
| err = mnt_want_write_file(file); |
| if (!err) { |
| err = vfs_fileattr_set(idmap, dentry, &fa); |
| mnt_drop_write_file(file); |
| } |
| } |
| return err; |
| } |
| |
| static int ioctl_getfsuuid(struct file *file, void __user *argp) |
| { |
| struct super_block *sb = file_inode(file)->i_sb; |
| struct fsuuid2 u = { .len = sb->s_uuid_len, }; |
| |
| if (!sb->s_uuid_len) |
| return -ENOTTY; |
| |
| memcpy(&u.uuid[0], &sb->s_uuid, sb->s_uuid_len); |
| |
| return copy_to_user(argp, &u, sizeof(u)) ? -EFAULT : 0; |
| } |
| |
| static int ioctl_get_fs_sysfs_path(struct file *file, void __user *argp) |
| { |
| struct super_block *sb = file_inode(file)->i_sb; |
| |
| if (!strlen(sb->s_sysfs_name)) |
| return -ENOTTY; |
| |
| struct fs_sysfs_path u = {}; |
| |
| u.len = scnprintf(u.name, sizeof(u.name), "%s/%s", sb->s_type->name, sb->s_sysfs_name); |
| |
| return copy_to_user(argp, &u, sizeof(u)) ? -EFAULT : 0; |
| } |
| |
| /* |
| * do_vfs_ioctl() is not for drivers and not intended to be EXPORT_SYMBOL()'d. |
| * It's just a simple helper for sys_ioctl and compat_sys_ioctl. |
| * |
| * When you add any new common ioctls to the switches above and below, |
| * please ensure they have compatible arguments in compat mode. |
| * |
| * The LSM mailing list should also be notified of any command additions or |
| * changes, as specific LSMs may be affected. |
| */ |
| static int do_vfs_ioctl(struct file *filp, unsigned int fd, |
| unsigned int cmd, unsigned long arg) |
| { |
| void __user *argp = (void __user *)arg; |
| struct inode *inode = file_inode(filp); |
| |
| switch (cmd) { |
| case FIOCLEX: |
| set_close_on_exec(fd, 1); |
| return 0; |
| |
| case FIONCLEX: |
| set_close_on_exec(fd, 0); |
| return 0; |
| |
| case FIONBIO: |
| return ioctl_fionbio(filp, argp); |
| |
| case FIOASYNC: |
| return ioctl_fioasync(fd, filp, argp); |
| |
| case FIOQSIZE: |
| if (S_ISDIR(inode->i_mode) || S_ISREG(inode->i_mode) || |
| S_ISLNK(inode->i_mode)) { |
| loff_t res = inode_get_bytes(inode); |
| return copy_to_user(argp, &res, sizeof(res)) ? |
| -EFAULT : 0; |
| } |
| |
| return -ENOTTY; |
| |
| case FIFREEZE: |
| return ioctl_fsfreeze(filp); |
| |
| case FITHAW: |
| return ioctl_fsthaw(filp); |
| |
| case FS_IOC_FIEMAP: |
| return ioctl_fiemap(filp, argp); |
| |
| case FIGETBSZ: |
| /* anon_bdev filesystems may not have a block size */ |
| if (!inode->i_sb->s_blocksize) |
| return -EINVAL; |
| |
| return put_user(inode->i_sb->s_blocksize, (int __user *)argp); |
| |
| case FICLONE: |
| return ioctl_file_clone(filp, arg, 0, 0, 0); |
| |
| case FICLONERANGE: |
| return ioctl_file_clone_range(filp, argp); |
| |
| case FIDEDUPERANGE: |
| return ioctl_file_dedupe_range(filp, argp); |
| |
| case FIONREAD: |
| if (!S_ISREG(inode->i_mode)) |
| return vfs_ioctl(filp, cmd, arg); |
| |
| return put_user(i_size_read(inode) - filp->f_pos, |
| (int __user *)argp); |
| |
| case FS_IOC_GETFLAGS: |
| return ioctl_getflags(filp, argp); |
| |
| case FS_IOC_SETFLAGS: |
| return ioctl_setflags(filp, argp); |
| |
| case FS_IOC_FSGETXATTR: |
| return ioctl_fsgetxattr(filp, argp); |
| |
| case FS_IOC_FSSETXATTR: |
| return ioctl_fssetxattr(filp, argp); |
| |
| case FS_IOC_GETFSUUID: |
| return ioctl_getfsuuid(filp, argp); |
| |
| case FS_IOC_GETFSSYSFSPATH: |
| return ioctl_get_fs_sysfs_path(filp, argp); |
| |
| default: |
| if (S_ISREG(inode->i_mode)) |
| return file_ioctl(filp, cmd, argp); |
| break; |
| } |
| |
| return -ENOIOCTLCMD; |
| } |
| |
| SYSCALL_DEFINE3(ioctl, unsigned int, fd, unsigned int, cmd, unsigned long, arg) |
| { |
| struct fd f = fdget(fd); |
| int error; |
| |
| if (!fd_file(f)) |
| return -EBADF; |
| |
| error = security_file_ioctl(fd_file(f), cmd, arg); |
| if (error) |
| goto out; |
| |
| error = do_vfs_ioctl(fd_file(f), fd, cmd, arg); |
| if (error == -ENOIOCTLCMD) |
| error = vfs_ioctl(fd_file(f), cmd, arg); |
| |
| out: |
| fdput(f); |
| return error; |
| } |
| |
| #ifdef CONFIG_COMPAT |
| /** |
| * compat_ptr_ioctl - generic implementation of .compat_ioctl file operation |
| * @file: The file to operate on. |
| * @cmd: The ioctl command number. |
| * @arg: The argument to the ioctl. |
| * |
| * This is not normally called as a function, but instead set in struct |
| * file_operations as |
| * |
| * .compat_ioctl = compat_ptr_ioctl, |
| * |
| * On most architectures, the compat_ptr_ioctl() just passes all arguments |
| * to the corresponding ->ioctl handler. The exception is arch/s390, where |
| * compat_ptr() clears the top bit of a 32-bit pointer value, so user space |
| * pointers to the second 2GB alias the first 2GB, as is the case for |
| * native 32-bit s390 user space. |
| * |
| * The compat_ptr_ioctl() function must therefore be used only with ioctl |
| * functions that either ignore the argument or pass a pointer to a |
| * compatible data type. |
| * |
| * If any ioctl command handled by fops->unlocked_ioctl passes a plain |
| * integer instead of a pointer, or any of the passed data types |
| * is incompatible between 32-bit and 64-bit architectures, a proper |
| * handler is required instead of compat_ptr_ioctl. |
| */ |
| long compat_ptr_ioctl(struct file *file, unsigned int cmd, unsigned long arg) |
| { |
| if (!file->f_op->unlocked_ioctl) |
| return -ENOIOCTLCMD; |
| |
| return file->f_op->unlocked_ioctl(file, cmd, (unsigned long)compat_ptr(arg)); |
| } |
| EXPORT_SYMBOL(compat_ptr_ioctl); |
| |
| COMPAT_SYSCALL_DEFINE3(ioctl, unsigned int, fd, unsigned int, cmd, |
| compat_ulong_t, arg) |
| { |
| struct fd f = fdget(fd); |
| int error; |
| |
| if (!fd_file(f)) |
| return -EBADF; |
| |
| error = security_file_ioctl_compat(fd_file(f), cmd, arg); |
| if (error) |
| goto out; |
| |
| switch (cmd) { |
| /* FICLONE takes an int argument, so don't use compat_ptr() */ |
| case FICLONE: |
| error = ioctl_file_clone(fd_file(f), arg, 0, 0, 0); |
| break; |
| |
| #if defined(CONFIG_X86_64) |
| /* these get messy on amd64 due to alignment differences */ |
| case FS_IOC_RESVSP_32: |
| case FS_IOC_RESVSP64_32: |
| error = compat_ioctl_preallocate(fd_file(f), 0, compat_ptr(arg)); |
| break; |
| case FS_IOC_UNRESVSP_32: |
| case FS_IOC_UNRESVSP64_32: |
| error = compat_ioctl_preallocate(fd_file(f), FALLOC_FL_PUNCH_HOLE, |
| compat_ptr(arg)); |
| break; |
| case FS_IOC_ZERO_RANGE_32: |
| error = compat_ioctl_preallocate(fd_file(f), FALLOC_FL_ZERO_RANGE, |
| compat_ptr(arg)); |
| break; |
| #endif |
| |
| /* |
| * These access 32-bit values anyway so no further handling is |
| * necessary. |
| */ |
| case FS_IOC32_GETFLAGS: |
| case FS_IOC32_SETFLAGS: |
| cmd = (cmd == FS_IOC32_GETFLAGS) ? |
| FS_IOC_GETFLAGS : FS_IOC_SETFLAGS; |
| fallthrough; |
| /* |
| * everything else in do_vfs_ioctl() takes either a compatible |
| * pointer argument or no argument -- call it with a modified |
| * argument. |
| */ |
| default: |
| error = do_vfs_ioctl(fd_file(f), fd, cmd, |
| (unsigned long)compat_ptr(arg)); |
| if (error != -ENOIOCTLCMD) |
| break; |
| |
| if (fd_file(f)->f_op->compat_ioctl) |
| error = fd_file(f)->f_op->compat_ioctl(fd_file(f), cmd, arg); |
| if (error == -ENOIOCTLCMD) |
| error = -ENOTTY; |
| break; |
| } |
| |
| out: |
| fdput(f); |
| |
| return error; |
| } |
| #endif |