mirror of
https://github.com/torvalds/linux.git
synced 2024-11-11 14:42:24 +00:00
549c729771
Extend some inode methods with an additional user namespace argument. A filesystem that is aware of idmapped mounts will receive the user namespace the mount has been marked with. This can be used for additional permission checking and also to enable filesystems to translate between uids and gids if they need to. We have implemented all relevant helpers in earlier patches. As requested we simply extend the exisiting inode method instead of introducing new ones. This is a little more code churn but it's mostly mechanical and doesnt't leave us with additional inode methods. Link: https://lore.kernel.org/r/20210121131959.646623-25-christian.brauner@ubuntu.com Cc: Christoph Hellwig <hch@lst.de> Cc: David Howells <dhowells@redhat.com> Cc: Al Viro <viro@zeniv.linux.org.uk> Cc: linux-fsdevel@vger.kernel.org Reviewed-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
89 lines
2.2 KiB
C
89 lines
2.2 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Pioctl operations for Coda.
|
|
* Original version: (C) 1996 Peter Braam
|
|
* Rewritten for Linux 2.1: (C) 1997 Carnegie Mellon University
|
|
*
|
|
* Carnegie Mellon encourages users of this code to contribute improvements
|
|
* to the Coda project. Contact Peter Braam <coda@cs.cmu.edu>.
|
|
*/
|
|
|
|
#include <linux/types.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/time.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/stat.h>
|
|
#include <linux/errno.h>
|
|
#include <linux/string.h>
|
|
#include <linux/namei.h>
|
|
#include <linux/module.h>
|
|
#include <linux/uaccess.h>
|
|
|
|
#include <linux/coda.h>
|
|
#include "coda_psdev.h"
|
|
#include "coda_linux.h"
|
|
|
|
/* pioctl ops */
|
|
static int coda_ioctl_permission(struct user_namespace *mnt_userns,
|
|
struct inode *inode, int mask);
|
|
static long coda_pioctl(struct file *filp, unsigned int cmd,
|
|
unsigned long user_data);
|
|
|
|
/* exported from this file */
|
|
const struct inode_operations coda_ioctl_inode_operations = {
|
|
.permission = coda_ioctl_permission,
|
|
.setattr = coda_setattr,
|
|
};
|
|
|
|
const struct file_operations coda_ioctl_operations = {
|
|
.unlocked_ioctl = coda_pioctl,
|
|
.llseek = noop_llseek,
|
|
};
|
|
|
|
/* the coda pioctl inode ops */
|
|
static int coda_ioctl_permission(struct user_namespace *mnt_userns,
|
|
struct inode *inode, int mask)
|
|
{
|
|
return (mask & MAY_EXEC) ? -EACCES : 0;
|
|
}
|
|
|
|
static long coda_pioctl(struct file *filp, unsigned int cmd,
|
|
unsigned long user_data)
|
|
{
|
|
struct path path;
|
|
int error;
|
|
struct PioctlData data;
|
|
struct inode *inode = file_inode(filp);
|
|
struct inode *target_inode = NULL;
|
|
struct coda_inode_info *cnp;
|
|
|
|
/* get the Pioctl data arguments from user space */
|
|
if (copy_from_user(&data, (void __user *)user_data, sizeof(data)))
|
|
return -EINVAL;
|
|
|
|
/*
|
|
* Look up the pathname. Note that the pathname is in
|
|
* user memory, and namei takes care of this
|
|
*/
|
|
error = user_path_at(AT_FDCWD, data.path,
|
|
data.follow ? LOOKUP_FOLLOW : 0, &path);
|
|
if (error)
|
|
return error;
|
|
|
|
target_inode = d_inode(path.dentry);
|
|
|
|
/* return if it is not a Coda inode */
|
|
if (target_inode->i_sb != inode->i_sb) {
|
|
error = -EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
/* now proceed to make the upcall */
|
|
cnp = ITOC(target_inode);
|
|
|
|
error = venus_pioctl(inode->i_sb, &(cnp->c_fid), cmd, &data);
|
|
out:
|
|
path_put(&path);
|
|
return error;
|
|
}
|