Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3495358imm; Tue, 29 May 2018 08:11:52 -0700 (PDT) X-Google-Smtp-Source: ADUXVKK4h1l0AlchThaBSZb0O28Dkr5BGHBtGff7SZ0R4MBpXt9k+fBQJdkfU/T6wukar4P+Go3J X-Received: by 2002:a17:902:563:: with SMTP id 90-v6mr3946624plf.327.1527606712296; Tue, 29 May 2018 08:11:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527606712; cv=none; d=google.com; s=arc-20160816; b=0HGieDscGnSnIUIhlY//8bf9YlCM4W4teMED4dkK/p1x9+3f6aMBnamZIdFh6hrO6H CThB478KWHmzGyxxYiBBL2FPw5eQTdVju61qQbraCHqqlSie7j0gOMKddQGCN6toGUKy GoB8y8gPdZXwIQ8HK+ix7nfxpI5TaPjcfMy7aC2WRbHkAbtUiLDTbsP1h51cobU0PDOj 2jtsSb3sYXWJCf/aYVZT/xQvGNrANlT91Ai5x7nMVnPFo0buXELCpKn3ziaU1ZokxpYG xBqFhnDvXLDH8636ubSVP8UuHwrJqq28Zu6RF4AF7rCC5vjqHm3LfllVIgtU+Lvhl4nx 0bPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=tycFrXomZ2LQ3ZNAXOaD95Iousaw6QxL/rMCceB8VEQ=; b=bsy2y9sw86cGsxrOhB3c4FsGAjkyVc8Xm7TXgG0NE/t8imK7yCPtMqINLi8iscwDUa GSq2wgou8fnGduzG/sfc1UIGhLsZkksJMNWlGLpEDeCzI9wD+eUvJyYcFvX+YG8LYkBx HX6xA37PY4E8Q2gErk71KgWFK/VqcPIiMuPbNuusPECeJRUXbO8mv1x7rylXgxbHnpKX YeMVygxtQhzIw/3q7qm+L2lHY4fhYYBhZJfRXtVS9oJ58Pafzrmo6bumwR11tD9k5wTo za/14eymveSVaoifHmMyz5Q9vcwXr6NU01Oq+R8DMkG72siTHee4FJDr6LrOWG4qVC2u W0JA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r28-v6si5990089pfe.168.2018.05.29.08.11.38; Tue, 29 May 2018 08:11:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S936489AbeE2PLU (ORCPT + 99 others); Tue, 29 May 2018 11:11:20 -0400 Received: from mail-wm0-f68.google.com ([74.125.82.68]:53895 "EHLO mail-wm0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S935682AbeE2OoH (ORCPT ); Tue, 29 May 2018 10:44:07 -0400 Received: by mail-wm0-f68.google.com with SMTP id a67-v6so41193140wmf.3 for ; Tue, 29 May 2018 07:44:06 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=tycFrXomZ2LQ3ZNAXOaD95Iousaw6QxL/rMCceB8VEQ=; b=O92PviKbDsvpVJbLXo5SH7PO4hlzabdAi1ekJ1iuDdlMU0RZrC7hX3b1MAH1NbV97S CS0eh11GMD3sPKxPkYIkIq55tlNwhcuihrNOr6OIkzqkRvbHyiRBF7zBe8KyJ0aYeROh 2NFJG5NpKvKfroOl8gzXHorWIqFOzugZgxu+LWN0V9zgUJFWnoCZ2GyP9jMcEfpw5Uee uG+9l+/IMukBbaOp/fPmO3/Shfh9qHHd3r38LgQ4e9U+Et80P1R15gREtzoGYjVL7lFv +cNlatsseTMEOezLmWW2h5xFp1HWJw95NKeTnPf2+TBQDXsid5Xal4fHFC0wMSNQBuGZ RBmw== X-Gm-Message-State: ALKqPwcvbq/Ul4XHg76q/efs193WHsmNBx6KxyG8RzGpqUS5XztQoY8z +vs7JYlhzkM/DL9viZjq0JWlUQ== X-Received: by 2002:a1c:ec82:: with SMTP id h2-v6mr10887570wmi.137.1527605046312; Tue, 29 May 2018 07:44:06 -0700 (PDT) Received: from veci.piliscsaba.redhat.com (catv-176-63-54-97.catv.broadband.hu. [176.63.54.97]) by smtp.gmail.com with ESMTPSA id t198-v6sm18834422wmt.23.2018.05.29.07.44.05 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 29 May 2018 07:44:05 -0700 (PDT) From: Miklos Szeredi To: linux-unionfs@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 21/39] ovl: add lsattr/chattr support Date: Tue, 29 May 2018 16:43:21 +0200 Message-Id: <20180529144339.16538-22-mszeredi@redhat.com> X-Mailer: git-send-email 2.14.3 In-Reply-To: <20180529144339.16538-1-mszeredi@redhat.com> References: <20180529144339.16538-1-mszeredi@redhat.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Implement FS_IOC_GETFLAGS and FS_IOC_SETFLAGS. Signed-off-by: Miklos Szeredi --- fs/overlayfs/file.c | 79 +++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 79 insertions(+) diff --git a/fs/overlayfs/file.c b/fs/overlayfs/file.c index 069599d53511..3f610a5b38e4 100644 --- a/fs/overlayfs/file.c +++ b/fs/overlayfs/file.c @@ -8,6 +8,7 @@ #include #include +#include #include #include #include "overlayfs.h" @@ -305,6 +306,82 @@ static long ovl_fallocate(struct file *file, int mode, loff_t offset, loff_t len return ret; } +static long ovl_real_ioctl(struct file *file, unsigned int cmd, + unsigned long arg) +{ + struct fd real; + const struct cred *old_cred; + long ret; + + ret = ovl_real_fdget(file, &real); + if (ret) + return ret; + + old_cred = ovl_override_creds(file_inode(file)->i_sb); + ret = vfs_ioctl(real.file, cmd, arg); + revert_creds(old_cred); + + fdput(real); + + return ret; +} + +static long ovl_ioctl(struct file *file, unsigned int cmd, unsigned long arg) +{ + long ret; + struct inode *inode = file_inode(file); + + switch (cmd) { + case FS_IOC_GETFLAGS: + ret = ovl_real_ioctl(file, cmd, arg); + break; + + case FS_IOC_SETFLAGS: + if (!inode_owner_or_capable(inode)) + return -EACCES; + + ret = mnt_want_write_file(file); + if (ret) + return ret; + + ret = ovl_copy_up(file_dentry(file)); + if (!ret) { + ret = ovl_real_ioctl(file, cmd, arg); + + inode_lock(inode); + ovl_copyflags(ovl_inode_real(inode), inode); + inode_unlock(inode); + } + + mnt_drop_write_file(file); + break; + + default: + ret = -ENOTTY; + } + + return ret; +} + +static long ovl_compat_ioctl(struct file *file, unsigned int cmd, + unsigned long arg) +{ + switch (cmd) { + case FS_IOC32_GETFLAGS: + cmd = FS_IOC_GETFLAGS; + break; + + case FS_IOC32_SETFLAGS: + cmd = FS_IOC_SETFLAGS; + break; + + default: + return -ENOIOCTLCMD; + } + + return ovl_ioctl(file, cmd, arg); +} + const struct file_operations ovl_file_operations = { .open = ovl_open, .release = ovl_release, @@ -314,4 +391,6 @@ const struct file_operations ovl_file_operations = { .fsync = ovl_fsync, .mmap = ovl_mmap, .fallocate = ovl_fallocate, + .unlocked_ioctl = ovl_ioctl, + .compat_ioctl = ovl_compat_ioctl, }; -- 2.14.3