2 * linux/kernel/vserver/inode.c
4 * Virtual Server: File System Support
6 * Copyright (C) 2004-2005 Herbert Pötzl
8 * V0.01 separated from vcontext V0.05
12 #include <linux/sched.h>
13 #include <linux/vs_context.h>
14 #include <linux/proc_fs.h>
15 #include <linux/devpts_fs.h>
16 #include <linux/namei.h>
17 #include <linux/mount.h>
18 #include <linux/parser.h>
19 #include <linux/compat.h>
20 #include <linux/vserver/inode.h>
21 #include <linux/vserver/inode_cmd.h>
22 #include <linux/vserver/xid.h>
24 #include <asm/errno.h>
25 #include <asm/uaccess.h>
28 static int __vc_get_iattr(struct inode *in, uint32_t *xid, uint32_t *flags, uint32_t *mask)
30 struct proc_dir_entry *entry;
36 | (IS_BARRIER(in) ? IATTR_BARRIER : 0)
37 | (IS_IUNLINK(in) ? IATTR_IUNLINK : 0)
38 | (IS_IMMUTABLE(in) ? IATTR_IMMUTABLE : 0);
39 *mask = IATTR_IUNLINK | IATTR_IMMUTABLE;
41 if (S_ISDIR(in->i_mode))
42 *mask |= IATTR_BARRIER;
44 if (in->i_sb->s_flags & MS_TAGXID) {
49 switch (in->i_sb->s_magic) {
50 case PROC_SUPER_MAGIC:
51 entry = PROC_I(in)->pde;
53 /* check for specific inodes? */
57 *flags |= (entry->vx_flags & IATTR_FLAGS);
59 *flags |= (PROC_I(in)->vx_flags & IATTR_FLAGS);
62 case DEVPTS_SUPER_MAGIC:
73 int vc_get_iattr(uint32_t id, void __user *data)
76 struct vcmd_ctx_iattr_v1 vc_data = { .xid = -1 };
79 if (!vx_check(0, VX_ADMIN))
81 if (copy_from_user (&vc_data, data, sizeof(vc_data)))
84 ret = user_path_walk_link(vc_data.name, &nd);
86 ret = __vc_get_iattr(nd.dentry->d_inode,
87 &vc_data.xid, &vc_data.flags, &vc_data.mask);
93 if (copy_to_user (data, &vc_data, sizeof(vc_data)))
100 int vc_get_iattr_x32(uint32_t id, void __user *data)
103 struct vcmd_ctx_iattr_v1_x32 vc_data = { .xid = -1 };
106 if (!vx_check(0, VX_ADMIN))
108 if (copy_from_user (&vc_data, data, sizeof(vc_data)))
111 ret = user_path_walk_link(compat_ptr(vc_data.name_ptr), &nd);
113 ret = __vc_get_iattr(nd.dentry->d_inode,
114 &vc_data.xid, &vc_data.flags, &vc_data.mask);
120 if (copy_to_user (data, &vc_data, sizeof(vc_data)))
125 #endif /* CONFIG_COMPAT */
128 static int __vc_set_iattr(struct dentry *de, uint32_t *xid, uint32_t *flags, uint32_t *mask)
130 struct inode *in = de->d_inode;
131 int error = 0, is_proc = 0, has_xid = 0;
132 struct iattr attr = { 0 };
134 if (!in || !in->i_sb)
137 is_proc = (in->i_sb->s_magic == PROC_SUPER_MAGIC);
138 if ((*mask & IATTR_FLAGS) && !is_proc)
141 has_xid = (in->i_sb->s_flags & MS_TAGXID) ||
142 (in->i_sb->s_magic == DEVPTS_SUPER_MAGIC);
143 if ((*mask & IATTR_XID) && !has_xid)
147 if (*mask & IATTR_XID) {
149 attr.ia_valid |= ATTR_XID;
152 if (*mask & IATTR_FLAGS) {
153 struct proc_dir_entry *entry = PROC_I(in)->pde;
154 unsigned int iflags = PROC_I(in)->vx_flags;
156 iflags = (iflags & ~(*mask & IATTR_FLAGS))
157 | (*flags & IATTR_FLAGS);
158 PROC_I(in)->vx_flags = iflags;
160 entry->vx_flags = iflags;
163 if (*mask & (IATTR_BARRIER | IATTR_IUNLINK | IATTR_IMMUTABLE)) {
165 attr.ia_valid |= ATTR_ATTR_FLAG;
167 (IS_IMMUTABLE(in) ? ATTR_FLAG_IMMUTABLE : 0) |
168 (IS_IUNLINK(in) ? ATTR_FLAG_IUNLINK : 0) |
169 (IS_BARRIER(in) ? ATTR_FLAG_BARRIER : 0);
171 if (*mask & IATTR_IMMUTABLE) {
172 if (*flags & IATTR_IMMUTABLE)
173 attr.ia_attr_flags |= ATTR_FLAG_IMMUTABLE;
175 attr.ia_attr_flags &= ~ATTR_FLAG_IMMUTABLE;
177 if (*mask & IATTR_IUNLINK) {
178 if (*flags & IATTR_IUNLINK)
179 attr.ia_attr_flags |= ATTR_FLAG_IUNLINK;
181 attr.ia_attr_flags &= ~ATTR_FLAG_IUNLINK;
183 if (S_ISDIR(in->i_mode) && (*mask & IATTR_BARRIER)) {
184 if (*flags & IATTR_BARRIER)
185 attr.ia_attr_flags |= ATTR_FLAG_BARRIER;
187 attr.ia_attr_flags &= ~ATTR_FLAG_BARRIER;
192 if (in->i_op && in->i_op->setattr)
193 error = in->i_op->setattr(de, &attr);
195 error = inode_change_ok(in, &attr);
197 error = inode_setattr(in, &attr);
205 int vc_set_iattr(uint32_t id, void __user *data)
208 struct vcmd_ctx_iattr_v1 vc_data;
211 if (!capable(CAP_SYS_ADMIN) || !capable(CAP_LINUX_IMMUTABLE))
213 if (copy_from_user (&vc_data, data, sizeof(vc_data)))
216 ret = user_path_walk_link(vc_data.name, &nd);
218 ret = __vc_set_iattr(nd.dentry,
219 &vc_data.xid, &vc_data.flags, &vc_data.mask);
223 if (copy_to_user (data, &vc_data, sizeof(vc_data)))
230 int vc_set_iattr_x32(uint32_t id, void __user *data)
233 struct vcmd_ctx_iattr_v1_x32 vc_data;
236 if (!capable(CAP_SYS_ADMIN) || !capable(CAP_LINUX_IMMUTABLE))
238 if (copy_from_user (&vc_data, data, sizeof(vc_data)))
241 ret = user_path_walk_link(compat_ptr(vc_data.name_ptr), &nd);
243 ret = __vc_set_iattr(nd.dentry,
244 &vc_data.xid, &vc_data.flags, &vc_data.mask);
248 if (copy_to_user (data, &vc_data, sizeof(vc_data)))
253 #endif /* CONFIG_COMPAT */
255 #ifdef CONFIG_VSERVER_LEGACY
257 #define PROC_DYNAMIC_FIRST 0xF0000000UL
259 int vx_proc_ioctl(struct inode * inode, struct file * filp,
260 unsigned int cmd, unsigned long arg)
262 struct proc_dir_entry *entry;
266 if (inode->i_ino < PROC_DYNAMIC_FIRST)
269 entry = PROC_I(inode)->pde;
275 /* fixme: if stealth, return -ENOTTY */
277 flags = entry->vx_flags;
278 if (capable(CAP_CONTEXT))
279 error = put_user(flags, (int *) arg);
283 /* fixme: if stealth, return -ENOTTY */
285 if (!capable(CAP_CONTEXT))
288 if (IS_RDONLY(inode))
291 if (get_user(flags, (int *) arg))
294 entry->vx_flags = flags;
305 int vx_parse_xid(char *string, xid_t *xid, int remove)
307 static match_table_t tokens = {
311 substring_t args[MAX_OPT_ARGS];
312 int token, option = 0;
317 token = match_token(string, tokens, args);
318 if (token && xid && !match_int(args, &option))
321 vxdprintk(VXD_CBIT(xid, 7),
322 "vx_parse_xid(»%s«): %d:#%d",
323 string, token, option);
325 if (token && remove) {
326 char *p = strstr(string, "xid=");
330 while (*q != '\0' && *q != ',')
341 void vx_propagate_xid(struct nameidata *nd, struct inode *inode)
344 struct vfsmount *mnt;
353 propagate = (mnt->mnt_flags & MNT_XID);
355 new_xid = mnt->mnt_xid;
357 vxdprintk(VXD_CBIT(xid, 7),
358 "vx_propagate_xid(%p[#%lu.%d]): %d,%d",
359 inode, inode->i_ino, inode->i_xid,
360 new_xid, (propagate)?1:0);
363 inode->i_xid = new_xid;
366 #include <linux/module.h>
368 EXPORT_SYMBOL_GPL(vx_propagate_xid);