0001
0002
0003
0004
0005
0006
0007
0008 #include <linux/string.h>
0009 #include <linux/mm.h>
0010 #include <linux/file.h>
0011 #include <linux/fdtable.h>
0012 #include <linux/fsnotify.h>
0013 #include <linux/module.h>
0014 #include <linux/tty.h>
0015 #include <linux/namei.h>
0016 #include <linux/backing-dev.h>
0017 #include <linux/capability.h>
0018 #include <linux/securebits.h>
0019 #include <linux/security.h>
0020 #include <linux/mount.h>
0021 #include <linux/fcntl.h>
0022 #include <linux/slab.h>
0023 #include <linux/uaccess.h>
0024 #include <linux/fs.h>
0025 #include <linux/personality.h>
0026 #include <linux/pagemap.h>
0027 #include <linux/syscalls.h>
0028 #include <linux/rcupdate.h>
0029 #include <linux/audit.h>
0030 #include <linux/falloc.h>
0031 #include <linux/fs_struct.h>
0032 #include <linux/ima.h>
0033 #include <linux/dnotify.h>
0034 #include <linux/compat.h>
0035 #include <linux/mnt_idmapping.h>
0036
0037 #include "internal.h"
0038
0039 int do_truncate(struct user_namespace *mnt_userns, struct dentry *dentry,
0040 loff_t length, unsigned int time_attrs, struct file *filp)
0041 {
0042 int ret;
0043 struct iattr newattrs;
0044
0045
0046 if (length < 0)
0047 return -EINVAL;
0048
0049 newattrs.ia_size = length;
0050 newattrs.ia_valid = ATTR_SIZE | time_attrs;
0051 if (filp) {
0052 newattrs.ia_file = filp;
0053 newattrs.ia_valid |= ATTR_FILE;
0054 }
0055
0056
0057 ret = dentry_needs_remove_privs(dentry);
0058 if (ret < 0)
0059 return ret;
0060 if (ret)
0061 newattrs.ia_valid |= ret | ATTR_FORCE;
0062
0063 inode_lock(dentry->d_inode);
0064
0065 ret = notify_change(mnt_userns, dentry, &newattrs, NULL);
0066 inode_unlock(dentry->d_inode);
0067 return ret;
0068 }
0069
0070 long vfs_truncate(const struct path *path, loff_t length)
0071 {
0072 struct user_namespace *mnt_userns;
0073 struct inode *inode;
0074 long error;
0075
0076 inode = path->dentry->d_inode;
0077
0078
0079 if (S_ISDIR(inode->i_mode))
0080 return -EISDIR;
0081 if (!S_ISREG(inode->i_mode))
0082 return -EINVAL;
0083
0084 error = mnt_want_write(path->mnt);
0085 if (error)
0086 goto out;
0087
0088 mnt_userns = mnt_user_ns(path->mnt);
0089 error = inode_permission(mnt_userns, inode, MAY_WRITE);
0090 if (error)
0091 goto mnt_drop_write_and_out;
0092
0093 error = -EPERM;
0094 if (IS_APPEND(inode))
0095 goto mnt_drop_write_and_out;
0096
0097 error = get_write_access(inode);
0098 if (error)
0099 goto mnt_drop_write_and_out;
0100
0101
0102
0103
0104
0105 error = break_lease(inode, O_WRONLY);
0106 if (error)
0107 goto put_write_and_out;
0108
0109 error = security_path_truncate(path);
0110 if (!error)
0111 error = do_truncate(mnt_userns, path->dentry, length, 0, NULL);
0112
0113 put_write_and_out:
0114 put_write_access(inode);
0115 mnt_drop_write_and_out:
0116 mnt_drop_write(path->mnt);
0117 out:
0118 return error;
0119 }
0120 EXPORT_SYMBOL_GPL(vfs_truncate);
0121
0122 long do_sys_truncate(const char __user *pathname, loff_t length)
0123 {
0124 unsigned int lookup_flags = LOOKUP_FOLLOW;
0125 struct path path;
0126 int error;
0127
0128 if (length < 0)
0129 return -EINVAL;
0130
0131 retry:
0132 error = user_path_at(AT_FDCWD, pathname, lookup_flags, &path);
0133 if (!error) {
0134 error = vfs_truncate(&path, length);
0135 path_put(&path);
0136 }
0137 if (retry_estale(error, lookup_flags)) {
0138 lookup_flags |= LOOKUP_REVAL;
0139 goto retry;
0140 }
0141 return error;
0142 }
0143
0144 SYSCALL_DEFINE2(truncate, const char __user *, path, long, length)
0145 {
0146 return do_sys_truncate(path, length);
0147 }
0148
0149 #ifdef CONFIG_COMPAT
0150 COMPAT_SYSCALL_DEFINE2(truncate, const char __user *, path, compat_off_t, length)
0151 {
0152 return do_sys_truncate(path, length);
0153 }
0154 #endif
0155
0156 long do_sys_ftruncate(unsigned int fd, loff_t length, int small)
0157 {
0158 struct inode *inode;
0159 struct dentry *dentry;
0160 struct fd f;
0161 int error;
0162
0163 error = -EINVAL;
0164 if (length < 0)
0165 goto out;
0166 error = -EBADF;
0167 f = fdget(fd);
0168 if (!f.file)
0169 goto out;
0170
0171
0172 if (f.file->f_flags & O_LARGEFILE)
0173 small = 0;
0174
0175 dentry = f.file->f_path.dentry;
0176 inode = dentry->d_inode;
0177 error = -EINVAL;
0178 if (!S_ISREG(inode->i_mode) || !(f.file->f_mode & FMODE_WRITE))
0179 goto out_putf;
0180
0181 error = -EINVAL;
0182
0183 if (small && length > MAX_NON_LFS)
0184 goto out_putf;
0185
0186 error = -EPERM;
0187
0188 if (IS_APPEND(file_inode(f.file)))
0189 goto out_putf;
0190 sb_start_write(inode->i_sb);
0191 error = security_path_truncate(&f.file->f_path);
0192 if (!error)
0193 error = do_truncate(file_mnt_user_ns(f.file), dentry, length,
0194 ATTR_MTIME | ATTR_CTIME, f.file);
0195 sb_end_write(inode->i_sb);
0196 out_putf:
0197 fdput(f);
0198 out:
0199 return error;
0200 }
0201
0202 SYSCALL_DEFINE2(ftruncate, unsigned int, fd, unsigned long, length)
0203 {
0204 return do_sys_ftruncate(fd, length, 1);
0205 }
0206
0207 #ifdef CONFIG_COMPAT
0208 COMPAT_SYSCALL_DEFINE2(ftruncate, unsigned int, fd, compat_ulong_t, length)
0209 {
0210 return do_sys_ftruncate(fd, length, 1);
0211 }
0212 #endif
0213
0214
0215 #if BITS_PER_LONG == 32
0216 SYSCALL_DEFINE2(truncate64, const char __user *, path, loff_t, length)
0217 {
0218 return do_sys_truncate(path, length);
0219 }
0220
0221 SYSCALL_DEFINE2(ftruncate64, unsigned int, fd, loff_t, length)
0222 {
0223 return do_sys_ftruncate(fd, length, 0);
0224 }
0225 #endif
0226
0227 #if defined(CONFIG_COMPAT) && defined(__ARCH_WANT_COMPAT_TRUNCATE64)
0228 COMPAT_SYSCALL_DEFINE3(truncate64, const char __user *, pathname,
0229 compat_arg_u64_dual(length))
0230 {
0231 return ksys_truncate(pathname, compat_arg_u64_glue(length));
0232 }
0233 #endif
0234
0235 #if defined(CONFIG_COMPAT) && defined(__ARCH_WANT_COMPAT_FTRUNCATE64)
0236 COMPAT_SYSCALL_DEFINE3(ftruncate64, unsigned int, fd,
0237 compat_arg_u64_dual(length))
0238 {
0239 return ksys_ftruncate(fd, compat_arg_u64_glue(length));
0240 }
0241 #endif
0242
0243 int vfs_fallocate(struct file *file, int mode, loff_t offset, loff_t len)
0244 {
0245 struct inode *inode = file_inode(file);
0246 long ret;
0247
0248 if (offset < 0 || len <= 0)
0249 return -EINVAL;
0250
0251
0252 if (mode & ~FALLOC_FL_SUPPORTED_MASK)
0253 return -EOPNOTSUPP;
0254
0255
0256 if ((mode & (FALLOC_FL_PUNCH_HOLE | FALLOC_FL_ZERO_RANGE)) ==
0257 (FALLOC_FL_PUNCH_HOLE | FALLOC_FL_ZERO_RANGE))
0258 return -EOPNOTSUPP;
0259
0260
0261 if ((mode & FALLOC_FL_PUNCH_HOLE) &&
0262 !(mode & FALLOC_FL_KEEP_SIZE))
0263 return -EOPNOTSUPP;
0264
0265
0266 if ((mode & FALLOC_FL_COLLAPSE_RANGE) &&
0267 (mode & ~FALLOC_FL_COLLAPSE_RANGE))
0268 return -EINVAL;
0269
0270
0271 if ((mode & FALLOC_FL_INSERT_RANGE) &&
0272 (mode & ~FALLOC_FL_INSERT_RANGE))
0273 return -EINVAL;
0274
0275
0276 if ((mode & FALLOC_FL_UNSHARE_RANGE) &&
0277 (mode & ~(FALLOC_FL_UNSHARE_RANGE | FALLOC_FL_KEEP_SIZE)))
0278 return -EINVAL;
0279
0280 if (!(file->f_mode & FMODE_WRITE))
0281 return -EBADF;
0282
0283
0284
0285
0286 if ((mode & ~FALLOC_FL_KEEP_SIZE) && IS_APPEND(inode))
0287 return -EPERM;
0288
0289 if (IS_IMMUTABLE(inode))
0290 return -EPERM;
0291
0292
0293
0294
0295 if (IS_SWAPFILE(inode))
0296 return -ETXTBSY;
0297
0298
0299
0300
0301
0302 ret = security_file_permission(file, MAY_WRITE);
0303 if (ret)
0304 return ret;
0305
0306 if (S_ISFIFO(inode->i_mode))
0307 return -ESPIPE;
0308
0309 if (S_ISDIR(inode->i_mode))
0310 return -EISDIR;
0311
0312 if (!S_ISREG(inode->i_mode) && !S_ISBLK(inode->i_mode))
0313 return -ENODEV;
0314
0315
0316 if (((offset + len) > inode->i_sb->s_maxbytes) || ((offset + len) < 0))
0317 return -EFBIG;
0318
0319 if (!file->f_op->fallocate)
0320 return -EOPNOTSUPP;
0321
0322 file_start_write(file);
0323 ret = file->f_op->fallocate(file, mode, offset, len);
0324
0325
0326
0327
0328
0329
0330
0331
0332 if (ret == 0)
0333 fsnotify_modify(file);
0334
0335 file_end_write(file);
0336 return ret;
0337 }
0338 EXPORT_SYMBOL_GPL(vfs_fallocate);
0339
0340 int ksys_fallocate(int fd, int mode, loff_t offset, loff_t len)
0341 {
0342 struct fd f = fdget(fd);
0343 int error = -EBADF;
0344
0345 if (f.file) {
0346 error = vfs_fallocate(f.file, mode, offset, len);
0347 fdput(f);
0348 }
0349 return error;
0350 }
0351
0352 SYSCALL_DEFINE4(fallocate, int, fd, int, mode, loff_t, offset, loff_t, len)
0353 {
0354 return ksys_fallocate(fd, mode, offset, len);
0355 }
0356
0357 #if defined(CONFIG_COMPAT) && defined(__ARCH_WANT_COMPAT_FALLOCATE)
0358 COMPAT_SYSCALL_DEFINE6(fallocate, int, fd, int, mode, compat_arg_u64_dual(offset),
0359 compat_arg_u64_dual(len))
0360 {
0361 return ksys_fallocate(fd, mode, compat_arg_u64_glue(offset),
0362 compat_arg_u64_glue(len));
0363 }
0364 #endif
0365
0366
0367
0368
0369
0370
0371 static const struct cred *access_override_creds(void)
0372 {
0373 const struct cred *old_cred;
0374 struct cred *override_cred;
0375
0376 override_cred = prepare_creds();
0377 if (!override_cred)
0378 return NULL;
0379
0380 override_cred->fsuid = override_cred->uid;
0381 override_cred->fsgid = override_cred->gid;
0382
0383 if (!issecure(SECURE_NO_SETUID_FIXUP)) {
0384
0385 kuid_t root_uid = make_kuid(override_cred->user_ns, 0);
0386 if (!uid_eq(override_cred->uid, root_uid))
0387 cap_clear(override_cred->cap_effective);
0388 else
0389 override_cred->cap_effective =
0390 override_cred->cap_permitted;
0391 }
0392
0393
0394
0395
0396
0397
0398
0399
0400
0401
0402
0403
0404
0405
0406
0407
0408
0409
0410 override_cred->non_rcu = 1;
0411
0412 old_cred = override_creds(override_cred);
0413
0414
0415 put_cred(override_cred);
0416
0417 return old_cred;
0418 }
0419
0420 static long do_faccessat(int dfd, const char __user *filename, int mode, int flags)
0421 {
0422 struct path path;
0423 struct inode *inode;
0424 int res;
0425 unsigned int lookup_flags = LOOKUP_FOLLOW;
0426 const struct cred *old_cred = NULL;
0427
0428 if (mode & ~S_IRWXO)
0429 return -EINVAL;
0430
0431 if (flags & ~(AT_EACCESS | AT_SYMLINK_NOFOLLOW | AT_EMPTY_PATH))
0432 return -EINVAL;
0433
0434 if (flags & AT_SYMLINK_NOFOLLOW)
0435 lookup_flags &= ~LOOKUP_FOLLOW;
0436 if (flags & AT_EMPTY_PATH)
0437 lookup_flags |= LOOKUP_EMPTY;
0438
0439 if (!(flags & AT_EACCESS)) {
0440 old_cred = access_override_creds();
0441 if (!old_cred)
0442 return -ENOMEM;
0443 }
0444
0445 retry:
0446 res = user_path_at(dfd, filename, lookup_flags, &path);
0447 if (res)
0448 goto out;
0449
0450 inode = d_backing_inode(path.dentry);
0451
0452 if ((mode & MAY_EXEC) && S_ISREG(inode->i_mode)) {
0453
0454
0455
0456
0457 res = -EACCES;
0458 if (path_noexec(&path))
0459 goto out_path_release;
0460 }
0461
0462 res = inode_permission(mnt_user_ns(path.mnt), inode, mode | MAY_ACCESS);
0463
0464 if (res || !(mode & S_IWOTH) || special_file(inode->i_mode))
0465 goto out_path_release;
0466
0467
0468
0469
0470
0471
0472
0473
0474
0475
0476 if (__mnt_is_readonly(path.mnt))
0477 res = -EROFS;
0478
0479 out_path_release:
0480 path_put(&path);
0481 if (retry_estale(res, lookup_flags)) {
0482 lookup_flags |= LOOKUP_REVAL;
0483 goto retry;
0484 }
0485 out:
0486 if (old_cred)
0487 revert_creds(old_cred);
0488
0489 return res;
0490 }
0491
0492 SYSCALL_DEFINE3(faccessat, int, dfd, const char __user *, filename, int, mode)
0493 {
0494 return do_faccessat(dfd, filename, mode, 0);
0495 }
0496
0497 SYSCALL_DEFINE4(faccessat2, int, dfd, const char __user *, filename, int, mode,
0498 int, flags)
0499 {
0500 return do_faccessat(dfd, filename, mode, flags);
0501 }
0502
0503 SYSCALL_DEFINE2(access, const char __user *, filename, int, mode)
0504 {
0505 return do_faccessat(AT_FDCWD, filename, mode, 0);
0506 }
0507
0508 SYSCALL_DEFINE1(chdir, const char __user *, filename)
0509 {
0510 struct path path;
0511 int error;
0512 unsigned int lookup_flags = LOOKUP_FOLLOW | LOOKUP_DIRECTORY;
0513 retry:
0514 error = user_path_at(AT_FDCWD, filename, lookup_flags, &path);
0515 if (error)
0516 goto out;
0517
0518 error = path_permission(&path, MAY_EXEC | MAY_CHDIR);
0519 if (error)
0520 goto dput_and_out;
0521
0522 set_fs_pwd(current->fs, &path);
0523
0524 dput_and_out:
0525 path_put(&path);
0526 if (retry_estale(error, lookup_flags)) {
0527 lookup_flags |= LOOKUP_REVAL;
0528 goto retry;
0529 }
0530 out:
0531 return error;
0532 }
0533
0534 SYSCALL_DEFINE1(fchdir, unsigned int, fd)
0535 {
0536 struct fd f = fdget_raw(fd);
0537 int error;
0538
0539 error = -EBADF;
0540 if (!f.file)
0541 goto out;
0542
0543 error = -ENOTDIR;
0544 if (!d_can_lookup(f.file->f_path.dentry))
0545 goto out_putf;
0546
0547 error = file_permission(f.file, MAY_EXEC | MAY_CHDIR);
0548 if (!error)
0549 set_fs_pwd(current->fs, &f.file->f_path);
0550 out_putf:
0551 fdput(f);
0552 out:
0553 return error;
0554 }
0555
0556 SYSCALL_DEFINE1(chroot, const char __user *, filename)
0557 {
0558 struct path path;
0559 int error;
0560 unsigned int lookup_flags = LOOKUP_FOLLOW | LOOKUP_DIRECTORY;
0561 retry:
0562 error = user_path_at(AT_FDCWD, filename, lookup_flags, &path);
0563 if (error)
0564 goto out;
0565
0566 error = path_permission(&path, MAY_EXEC | MAY_CHDIR);
0567 if (error)
0568 goto dput_and_out;
0569
0570 error = -EPERM;
0571 if (!ns_capable(current_user_ns(), CAP_SYS_CHROOT))
0572 goto dput_and_out;
0573 error = security_path_chroot(&path);
0574 if (error)
0575 goto dput_and_out;
0576
0577 set_fs_root(current->fs, &path);
0578 error = 0;
0579 dput_and_out:
0580 path_put(&path);
0581 if (retry_estale(error, lookup_flags)) {
0582 lookup_flags |= LOOKUP_REVAL;
0583 goto retry;
0584 }
0585 out:
0586 return error;
0587 }
0588
0589 int chmod_common(const struct path *path, umode_t mode)
0590 {
0591 struct inode *inode = path->dentry->d_inode;
0592 struct inode *delegated_inode = NULL;
0593 struct iattr newattrs;
0594 int error;
0595
0596 error = mnt_want_write(path->mnt);
0597 if (error)
0598 return error;
0599 retry_deleg:
0600 inode_lock(inode);
0601 error = security_path_chmod(path, mode);
0602 if (error)
0603 goto out_unlock;
0604 newattrs.ia_mode = (mode & S_IALLUGO) | (inode->i_mode & ~S_IALLUGO);
0605 newattrs.ia_valid = ATTR_MODE | ATTR_CTIME;
0606 error = notify_change(mnt_user_ns(path->mnt), path->dentry,
0607 &newattrs, &delegated_inode);
0608 out_unlock:
0609 inode_unlock(inode);
0610 if (delegated_inode) {
0611 error = break_deleg_wait(&delegated_inode);
0612 if (!error)
0613 goto retry_deleg;
0614 }
0615 mnt_drop_write(path->mnt);
0616 return error;
0617 }
0618
0619 int vfs_fchmod(struct file *file, umode_t mode)
0620 {
0621 audit_file(file);
0622 return chmod_common(&file->f_path, mode);
0623 }
0624
0625 SYSCALL_DEFINE2(fchmod, unsigned int, fd, umode_t, mode)
0626 {
0627 struct fd f = fdget(fd);
0628 int err = -EBADF;
0629
0630 if (f.file) {
0631 err = vfs_fchmod(f.file, mode);
0632 fdput(f);
0633 }
0634 return err;
0635 }
0636
0637 static int do_fchmodat(int dfd, const char __user *filename, umode_t mode)
0638 {
0639 struct path path;
0640 int error;
0641 unsigned int lookup_flags = LOOKUP_FOLLOW;
0642 retry:
0643 error = user_path_at(dfd, filename, lookup_flags, &path);
0644 if (!error) {
0645 error = chmod_common(&path, mode);
0646 path_put(&path);
0647 if (retry_estale(error, lookup_flags)) {
0648 lookup_flags |= LOOKUP_REVAL;
0649 goto retry;
0650 }
0651 }
0652 return error;
0653 }
0654
0655 SYSCALL_DEFINE3(fchmodat, int, dfd, const char __user *, filename,
0656 umode_t, mode)
0657 {
0658 return do_fchmodat(dfd, filename, mode);
0659 }
0660
0661 SYSCALL_DEFINE2(chmod, const char __user *, filename, umode_t, mode)
0662 {
0663 return do_fchmodat(AT_FDCWD, filename, mode);
0664 }
0665
0666
0667
0668
0669
0670
0671
0672
0673
0674
0675 static inline bool setattr_vfsuid(struct iattr *attr, kuid_t kuid)
0676 {
0677 if (!uid_valid(kuid))
0678 return false;
0679 attr->ia_valid |= ATTR_UID;
0680 attr->ia_vfsuid = VFSUIDT_INIT(kuid);
0681 return true;
0682 }
0683
0684
0685
0686
0687
0688
0689
0690
0691
0692
0693 static inline bool setattr_vfsgid(struct iattr *attr, kgid_t kgid)
0694 {
0695 if (!gid_valid(kgid))
0696 return false;
0697 attr->ia_valid |= ATTR_GID;
0698 attr->ia_vfsgid = VFSGIDT_INIT(kgid);
0699 return true;
0700 }
0701
0702 int chown_common(const struct path *path, uid_t user, gid_t group)
0703 {
0704 struct user_namespace *mnt_userns, *fs_userns;
0705 struct inode *inode = path->dentry->d_inode;
0706 struct inode *delegated_inode = NULL;
0707 int error;
0708 struct iattr newattrs;
0709 kuid_t uid;
0710 kgid_t gid;
0711
0712 uid = make_kuid(current_user_ns(), user);
0713 gid = make_kgid(current_user_ns(), group);
0714
0715 mnt_userns = mnt_user_ns(path->mnt);
0716 fs_userns = i_user_ns(inode);
0717
0718 retry_deleg:
0719 newattrs.ia_vfsuid = INVALID_VFSUID;
0720 newattrs.ia_vfsgid = INVALID_VFSGID;
0721 newattrs.ia_valid = ATTR_CTIME;
0722 if ((user != (uid_t)-1) && !setattr_vfsuid(&newattrs, uid))
0723 return -EINVAL;
0724 if ((group != (gid_t)-1) && !setattr_vfsgid(&newattrs, gid))
0725 return -EINVAL;
0726 if (!S_ISDIR(inode->i_mode))
0727 newattrs.ia_valid |=
0728 ATTR_KILL_SUID | ATTR_KILL_SGID | ATTR_KILL_PRIV;
0729 inode_lock(inode);
0730
0731 error = security_path_chown(
0732 path,
0733 from_vfsuid(mnt_userns, fs_userns, newattrs.ia_vfsuid),
0734 from_vfsgid(mnt_userns, fs_userns, newattrs.ia_vfsgid));
0735 if (!error)
0736 error = notify_change(mnt_userns, path->dentry, &newattrs,
0737 &delegated_inode);
0738 inode_unlock(inode);
0739 if (delegated_inode) {
0740 error = break_deleg_wait(&delegated_inode);
0741 if (!error)
0742 goto retry_deleg;
0743 }
0744 return error;
0745 }
0746
0747 int do_fchownat(int dfd, const char __user *filename, uid_t user, gid_t group,
0748 int flag)
0749 {
0750 struct path path;
0751 int error = -EINVAL;
0752 int lookup_flags;
0753
0754 if ((flag & ~(AT_SYMLINK_NOFOLLOW | AT_EMPTY_PATH)) != 0)
0755 goto out;
0756
0757 lookup_flags = (flag & AT_SYMLINK_NOFOLLOW) ? 0 : LOOKUP_FOLLOW;
0758 if (flag & AT_EMPTY_PATH)
0759 lookup_flags |= LOOKUP_EMPTY;
0760 retry:
0761 error = user_path_at(dfd, filename, lookup_flags, &path);
0762 if (error)
0763 goto out;
0764 error = mnt_want_write(path.mnt);
0765 if (error)
0766 goto out_release;
0767 error = chown_common(&path, user, group);
0768 mnt_drop_write(path.mnt);
0769 out_release:
0770 path_put(&path);
0771 if (retry_estale(error, lookup_flags)) {
0772 lookup_flags |= LOOKUP_REVAL;
0773 goto retry;
0774 }
0775 out:
0776 return error;
0777 }
0778
0779 SYSCALL_DEFINE5(fchownat, int, dfd, const char __user *, filename, uid_t, user,
0780 gid_t, group, int, flag)
0781 {
0782 return do_fchownat(dfd, filename, user, group, flag);
0783 }
0784
0785 SYSCALL_DEFINE3(chown, const char __user *, filename, uid_t, user, gid_t, group)
0786 {
0787 return do_fchownat(AT_FDCWD, filename, user, group, 0);
0788 }
0789
0790 SYSCALL_DEFINE3(lchown, const char __user *, filename, uid_t, user, gid_t, group)
0791 {
0792 return do_fchownat(AT_FDCWD, filename, user, group,
0793 AT_SYMLINK_NOFOLLOW);
0794 }
0795
0796 int vfs_fchown(struct file *file, uid_t user, gid_t group)
0797 {
0798 int error;
0799
0800 error = mnt_want_write_file(file);
0801 if (error)
0802 return error;
0803 audit_file(file);
0804 error = chown_common(&file->f_path, user, group);
0805 mnt_drop_write_file(file);
0806 return error;
0807 }
0808
0809 int ksys_fchown(unsigned int fd, uid_t user, gid_t group)
0810 {
0811 struct fd f = fdget(fd);
0812 int error = -EBADF;
0813
0814 if (f.file) {
0815 error = vfs_fchown(f.file, user, group);
0816 fdput(f);
0817 }
0818 return error;
0819 }
0820
0821 SYSCALL_DEFINE3(fchown, unsigned int, fd, uid_t, user, gid_t, group)
0822 {
0823 return ksys_fchown(fd, user, group);
0824 }
0825
0826 static int do_dentry_open(struct file *f,
0827 struct inode *inode,
0828 int (*open)(struct inode *, struct file *))
0829 {
0830 static const struct file_operations empty_fops = {};
0831 int error;
0832
0833 path_get(&f->f_path);
0834 f->f_inode = inode;
0835 f->f_mapping = inode->i_mapping;
0836 f->f_wb_err = filemap_sample_wb_err(f->f_mapping);
0837 f->f_sb_err = file_sample_sb_err(f);
0838
0839 if (unlikely(f->f_flags & O_PATH)) {
0840 f->f_mode = FMODE_PATH | FMODE_OPENED;
0841 f->f_op = &empty_fops;
0842 return 0;
0843 }
0844
0845 if (f->f_mode & FMODE_WRITE && !special_file(inode->i_mode)) {
0846 error = get_write_access(inode);
0847 if (unlikely(error))
0848 goto cleanup_file;
0849 error = __mnt_want_write(f->f_path.mnt);
0850 if (unlikely(error)) {
0851 put_write_access(inode);
0852 goto cleanup_file;
0853 }
0854 f->f_mode |= FMODE_WRITER;
0855 }
0856
0857
0858 if (S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))
0859 f->f_mode |= FMODE_ATOMIC_POS;
0860
0861 f->f_op = fops_get(inode->i_fop);
0862 if (WARN_ON(!f->f_op)) {
0863 error = -ENODEV;
0864 goto cleanup_all;
0865 }
0866
0867 error = security_file_open(f);
0868 if (error)
0869 goto cleanup_all;
0870
0871 error = break_lease(locks_inode(f), f->f_flags);
0872 if (error)
0873 goto cleanup_all;
0874
0875
0876 f->f_mode |= FMODE_LSEEK | FMODE_PREAD | FMODE_PWRITE;
0877 if (!open)
0878 open = f->f_op->open;
0879 if (open) {
0880 error = open(inode, f);
0881 if (error)
0882 goto cleanup_all;
0883 }
0884 f->f_mode |= FMODE_OPENED;
0885 if ((f->f_mode & (FMODE_READ | FMODE_WRITE)) == FMODE_READ)
0886 i_readcount_inc(inode);
0887 if ((f->f_mode & FMODE_READ) &&
0888 likely(f->f_op->read || f->f_op->read_iter))
0889 f->f_mode |= FMODE_CAN_READ;
0890 if ((f->f_mode & FMODE_WRITE) &&
0891 likely(f->f_op->write || f->f_op->write_iter))
0892 f->f_mode |= FMODE_CAN_WRITE;
0893 if ((f->f_mode & FMODE_LSEEK) && !f->f_op->llseek)
0894 f->f_mode &= ~FMODE_LSEEK;
0895 if (f->f_mapping->a_ops && f->f_mapping->a_ops->direct_IO)
0896 f->f_mode |= FMODE_CAN_ODIRECT;
0897
0898 f->f_flags &= ~(O_CREAT | O_EXCL | O_NOCTTY | O_TRUNC);
0899 f->f_iocb_flags = iocb_flags(f);
0900
0901 file_ra_state_init(&f->f_ra, f->f_mapping->host->i_mapping);
0902
0903 if ((f->f_flags & O_DIRECT) && !(f->f_mode & FMODE_CAN_ODIRECT))
0904 return -EINVAL;
0905
0906
0907
0908
0909
0910 if (f->f_mode & FMODE_WRITE) {
0911
0912
0913
0914
0915
0916
0917 smp_mb();
0918 if (filemap_nr_thps(inode->i_mapping)) {
0919 struct address_space *mapping = inode->i_mapping;
0920
0921 filemap_invalidate_lock(inode->i_mapping);
0922
0923
0924
0925
0926
0927
0928 unmap_mapping_range(mapping, 0, 0, 0);
0929 truncate_inode_pages(mapping, 0);
0930 filemap_invalidate_unlock(inode->i_mapping);
0931 }
0932 }
0933
0934 return 0;
0935
0936 cleanup_all:
0937 if (WARN_ON_ONCE(error > 0))
0938 error = -EINVAL;
0939 fops_put(f->f_op);
0940 if (f->f_mode & FMODE_WRITER) {
0941 put_write_access(inode);
0942 __mnt_drop_write(f->f_path.mnt);
0943 }
0944 cleanup_file:
0945 path_put(&f->f_path);
0946 f->f_path.mnt = NULL;
0947 f->f_path.dentry = NULL;
0948 f->f_inode = NULL;
0949 return error;
0950 }
0951
0952
0953
0954
0955
0956
0957
0958
0959
0960
0961
0962
0963
0964
0965
0966
0967
0968
0969
0970 int finish_open(struct file *file, struct dentry *dentry,
0971 int (*open)(struct inode *, struct file *))
0972 {
0973 BUG_ON(file->f_mode & FMODE_OPENED);
0974
0975 file->f_path.dentry = dentry;
0976 return do_dentry_open(file, d_backing_inode(dentry), open);
0977 }
0978 EXPORT_SYMBOL(finish_open);
0979
0980
0981
0982
0983
0984
0985
0986
0987
0988
0989
0990
0991
0992
0993
0994 int finish_no_open(struct file *file, struct dentry *dentry)
0995 {
0996 file->f_path.dentry = dentry;
0997 return 0;
0998 }
0999 EXPORT_SYMBOL(finish_no_open);
1000
1001 char *file_path(struct file *filp, char *buf, int buflen)
1002 {
1003 return d_path(&filp->f_path, buf, buflen);
1004 }
1005 EXPORT_SYMBOL(file_path);
1006
1007
1008
1009
1010
1011
1012
1013 int vfs_open(const struct path *path, struct file *file)
1014 {
1015 file->f_path = *path;
1016 return do_dentry_open(file, d_backing_inode(path->dentry), NULL);
1017 }
1018
1019 struct file *dentry_open(const struct path *path, int flags,
1020 const struct cred *cred)
1021 {
1022 int error;
1023 struct file *f;
1024
1025 validate_creds(cred);
1026
1027
1028 BUG_ON(!path->mnt);
1029
1030 f = alloc_empty_file(flags, cred);
1031 if (!IS_ERR(f)) {
1032 error = vfs_open(path, f);
1033 if (error) {
1034 fput(f);
1035 f = ERR_PTR(error);
1036 }
1037 }
1038 return f;
1039 }
1040 EXPORT_SYMBOL(dentry_open);
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059 struct file *dentry_create(const struct path *path, int flags, umode_t mode,
1060 const struct cred *cred)
1061 {
1062 struct file *f;
1063 int error;
1064
1065 validate_creds(cred);
1066 f = alloc_empty_file(flags, cred);
1067 if (IS_ERR(f))
1068 return f;
1069
1070 error = vfs_create(mnt_user_ns(path->mnt),
1071 d_inode(path->dentry->d_parent),
1072 path->dentry, mode, true);
1073 if (!error)
1074 error = vfs_open(path, f);
1075
1076 if (unlikely(error)) {
1077 fput(f);
1078 return ERR_PTR(error);
1079 }
1080 return f;
1081 }
1082 EXPORT_SYMBOL(dentry_create);
1083
1084 struct file *open_with_fake_path(const struct path *path, int flags,
1085 struct inode *inode, const struct cred *cred)
1086 {
1087 struct file *f = alloc_empty_file_noaccount(flags, cred);
1088 if (!IS_ERR(f)) {
1089 int error;
1090
1091 f->f_path = *path;
1092 error = do_dentry_open(f, inode, NULL);
1093 if (error) {
1094 fput(f);
1095 f = ERR_PTR(error);
1096 }
1097 }
1098 return f;
1099 }
1100 EXPORT_SYMBOL(open_with_fake_path);
1101
1102 #define WILL_CREATE(flags) (flags & (O_CREAT | __O_TMPFILE))
1103 #define O_PATH_FLAGS (O_DIRECTORY | O_NOFOLLOW | O_PATH | O_CLOEXEC)
1104
1105 inline struct open_how build_open_how(int flags, umode_t mode)
1106 {
1107 struct open_how how = {
1108 .flags = flags & VALID_OPEN_FLAGS,
1109 .mode = mode & S_IALLUGO,
1110 };
1111
1112
1113 if (how.flags & O_PATH)
1114 how.flags &= O_PATH_FLAGS;
1115
1116 if (!WILL_CREATE(how.flags))
1117 how.mode = 0;
1118 return how;
1119 }
1120
1121 inline int build_open_flags(const struct open_how *how, struct open_flags *op)
1122 {
1123 u64 flags = how->flags;
1124 u64 strip = FMODE_NONOTIFY | O_CLOEXEC;
1125 int lookup_flags = 0;
1126 int acc_mode = ACC_MODE(flags);
1127
1128 BUILD_BUG_ON_MSG(upper_32_bits(VALID_OPEN_FLAGS),
1129 "struct open_flags doesn't yet handle flags > 32 bits");
1130
1131
1132
1133
1134
1135
1136 flags &= ~strip;
1137
1138
1139
1140
1141
1142
1143 if (flags & ~VALID_OPEN_FLAGS)
1144 return -EINVAL;
1145 if (how->resolve & ~VALID_RESOLVE_FLAGS)
1146 return -EINVAL;
1147
1148
1149 if ((how->resolve & RESOLVE_BENEATH) && (how->resolve & RESOLVE_IN_ROOT))
1150 return -EINVAL;
1151
1152
1153 if (WILL_CREATE(flags)) {
1154 if (how->mode & ~S_IALLUGO)
1155 return -EINVAL;
1156 op->mode = how->mode | S_IFREG;
1157 } else {
1158 if (how->mode != 0)
1159 return -EINVAL;
1160 op->mode = 0;
1161 }
1162
1163
1164
1165
1166
1167
1168
1169 if (flags & __O_TMPFILE) {
1170 if ((flags & O_TMPFILE_MASK) != O_TMPFILE)
1171 return -EINVAL;
1172 if (!(acc_mode & MAY_WRITE))
1173 return -EINVAL;
1174 }
1175 if (flags & O_PATH) {
1176
1177 if (flags & ~O_PATH_FLAGS)
1178 return -EINVAL;
1179 acc_mode = 0;
1180 }
1181
1182
1183
1184
1185
1186
1187
1188 if (flags & __O_SYNC)
1189 flags |= O_DSYNC;
1190
1191 op->open_flag = flags;
1192
1193
1194 if (flags & O_TRUNC)
1195 acc_mode |= MAY_WRITE;
1196
1197
1198
1199 if (flags & O_APPEND)
1200 acc_mode |= MAY_APPEND;
1201
1202 op->acc_mode = acc_mode;
1203
1204 op->intent = flags & O_PATH ? 0 : LOOKUP_OPEN;
1205
1206 if (flags & O_CREAT) {
1207 op->intent |= LOOKUP_CREATE;
1208 if (flags & O_EXCL) {
1209 op->intent |= LOOKUP_EXCL;
1210 flags |= O_NOFOLLOW;
1211 }
1212 }
1213
1214 if (flags & O_DIRECTORY)
1215 lookup_flags |= LOOKUP_DIRECTORY;
1216 if (!(flags & O_NOFOLLOW))
1217 lookup_flags |= LOOKUP_FOLLOW;
1218
1219 if (how->resolve & RESOLVE_NO_XDEV)
1220 lookup_flags |= LOOKUP_NO_XDEV;
1221 if (how->resolve & RESOLVE_NO_MAGICLINKS)
1222 lookup_flags |= LOOKUP_NO_MAGICLINKS;
1223 if (how->resolve & RESOLVE_NO_SYMLINKS)
1224 lookup_flags |= LOOKUP_NO_SYMLINKS;
1225 if (how->resolve & RESOLVE_BENEATH)
1226 lookup_flags |= LOOKUP_BENEATH;
1227 if (how->resolve & RESOLVE_IN_ROOT)
1228 lookup_flags |= LOOKUP_IN_ROOT;
1229 if (how->resolve & RESOLVE_CACHED) {
1230
1231 if (flags & (O_TRUNC | O_CREAT | O_TMPFILE))
1232 return -EAGAIN;
1233 lookup_flags |= LOOKUP_CACHED;
1234 }
1235
1236 op->lookup_flags = lookup_flags;
1237 return 0;
1238 }
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251 struct file *file_open_name(struct filename *name, int flags, umode_t mode)
1252 {
1253 struct open_flags op;
1254 struct open_how how = build_open_how(flags, mode);
1255 int err = build_open_flags(&how, &op);
1256 if (err)
1257 return ERR_PTR(err);
1258 return do_filp_open(AT_FDCWD, name, &op);
1259 }
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272 struct file *filp_open(const char *filename, int flags, umode_t mode)
1273 {
1274 struct filename *name = getname_kernel(filename);
1275 struct file *file = ERR_CAST(name);
1276
1277 if (!IS_ERR(name)) {
1278 file = file_open_name(name, flags, mode);
1279 putname(name);
1280 }
1281 return file;
1282 }
1283 EXPORT_SYMBOL(filp_open);
1284
1285 struct file *file_open_root(const struct path *root,
1286 const char *filename, int flags, umode_t mode)
1287 {
1288 struct open_flags op;
1289 struct open_how how = build_open_how(flags, mode);
1290 int err = build_open_flags(&how, &op);
1291 if (err)
1292 return ERR_PTR(err);
1293 return do_file_open_root(root, filename, &op);
1294 }
1295 EXPORT_SYMBOL(file_open_root);
1296
1297 static long do_sys_openat2(int dfd, const char __user *filename,
1298 struct open_how *how)
1299 {
1300 struct open_flags op;
1301 int fd = build_open_flags(how, &op);
1302 struct filename *tmp;
1303
1304 if (fd)
1305 return fd;
1306
1307 tmp = getname(filename);
1308 if (IS_ERR(tmp))
1309 return PTR_ERR(tmp);
1310
1311 fd = get_unused_fd_flags(how->flags);
1312 if (fd >= 0) {
1313 struct file *f = do_filp_open(dfd, tmp, &op);
1314 if (IS_ERR(f)) {
1315 put_unused_fd(fd);
1316 fd = PTR_ERR(f);
1317 } else {
1318 fsnotify_open(f);
1319 fd_install(fd, f);
1320 }
1321 }
1322 putname(tmp);
1323 return fd;
1324 }
1325
1326 long do_sys_open(int dfd, const char __user *filename, int flags, umode_t mode)
1327 {
1328 struct open_how how = build_open_how(flags, mode);
1329 return do_sys_openat2(dfd, filename, &how);
1330 }
1331
1332
1333 SYSCALL_DEFINE3(open, const char __user *, filename, int, flags, umode_t, mode)
1334 {
1335 if (force_o_largefile())
1336 flags |= O_LARGEFILE;
1337 return do_sys_open(AT_FDCWD, filename, flags, mode);
1338 }
1339
1340 SYSCALL_DEFINE4(openat, int, dfd, const char __user *, filename, int, flags,
1341 umode_t, mode)
1342 {
1343 if (force_o_largefile())
1344 flags |= O_LARGEFILE;
1345 return do_sys_open(dfd, filename, flags, mode);
1346 }
1347
1348 SYSCALL_DEFINE4(openat2, int, dfd, const char __user *, filename,
1349 struct open_how __user *, how, size_t, usize)
1350 {
1351 int err;
1352 struct open_how tmp;
1353
1354 BUILD_BUG_ON(sizeof(struct open_how) < OPEN_HOW_SIZE_VER0);
1355 BUILD_BUG_ON(sizeof(struct open_how) != OPEN_HOW_SIZE_LATEST);
1356
1357 if (unlikely(usize < OPEN_HOW_SIZE_VER0))
1358 return -EINVAL;
1359
1360 err = copy_struct_from_user(&tmp, sizeof(tmp), how, usize);
1361 if (err)
1362 return err;
1363
1364 audit_openat2_how(&tmp);
1365
1366
1367 if (!(tmp.flags & O_PATH) && force_o_largefile())
1368 tmp.flags |= O_LARGEFILE;
1369
1370 return do_sys_openat2(dfd, filename, &tmp);
1371 }
1372
1373 #ifdef CONFIG_COMPAT
1374
1375
1376
1377
1378 COMPAT_SYSCALL_DEFINE3(open, const char __user *, filename, int, flags, umode_t, mode)
1379 {
1380 return do_sys_open(AT_FDCWD, filename, flags, mode);
1381 }
1382
1383
1384
1385
1386
1387 COMPAT_SYSCALL_DEFINE4(openat, int, dfd, const char __user *, filename, int, flags, umode_t, mode)
1388 {
1389 return do_sys_open(dfd, filename, flags, mode);
1390 }
1391 #endif
1392
1393 #ifndef __alpha__
1394
1395
1396
1397
1398
1399 SYSCALL_DEFINE2(creat, const char __user *, pathname, umode_t, mode)
1400 {
1401 int flags = O_CREAT | O_WRONLY | O_TRUNC;
1402
1403 if (force_o_largefile())
1404 flags |= O_LARGEFILE;
1405 return do_sys_open(AT_FDCWD, pathname, flags, mode);
1406 }
1407 #endif
1408
1409
1410
1411
1412
1413 int filp_close(struct file *filp, fl_owner_t id)
1414 {
1415 int retval = 0;
1416
1417 if (!file_count(filp)) {
1418 printk(KERN_ERR "VFS: Close: file count is 0\n");
1419 return 0;
1420 }
1421
1422 if (filp->f_op->flush)
1423 retval = filp->f_op->flush(filp, id);
1424
1425 if (likely(!(filp->f_mode & FMODE_PATH))) {
1426 dnotify_flush(filp, id);
1427 locks_remove_posix(filp, id);
1428 }
1429 fput(filp);
1430 return retval;
1431 }
1432
1433 EXPORT_SYMBOL(filp_close);
1434
1435
1436
1437
1438
1439
1440 SYSCALL_DEFINE1(close, unsigned int, fd)
1441 {
1442 int retval = close_fd(fd);
1443
1444
1445 if (unlikely(retval == -ERESTARTSYS ||
1446 retval == -ERESTARTNOINTR ||
1447 retval == -ERESTARTNOHAND ||
1448 retval == -ERESTART_RESTARTBLOCK))
1449 retval = -EINTR;
1450
1451 return retval;
1452 }
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465 SYSCALL_DEFINE3(close_range, unsigned int, fd, unsigned int, max_fd,
1466 unsigned int, flags)
1467 {
1468 return __close_range(fd, max_fd, flags);
1469 }
1470
1471
1472
1473
1474
1475 SYSCALL_DEFINE0(vhangup)
1476 {
1477 if (capable(CAP_SYS_TTY_CONFIG)) {
1478 tty_vhangup_self();
1479 return 0;
1480 }
1481 return -EPERM;
1482 }
1483
1484
1485
1486
1487
1488
1489
1490 int generic_file_open(struct inode * inode, struct file * filp)
1491 {
1492 if (!(filp->f_flags & O_LARGEFILE) && i_size_read(inode) > MAX_NON_LFS)
1493 return -EOVERFLOW;
1494 return 0;
1495 }
1496
1497 EXPORT_SYMBOL(generic_file_open);
1498
1499
1500
1501
1502
1503
1504
1505 int nonseekable_open(struct inode *inode, struct file *filp)
1506 {
1507 filp->f_mode &= ~(FMODE_LSEEK | FMODE_PREAD | FMODE_PWRITE);
1508 return 0;
1509 }
1510
1511 EXPORT_SYMBOL(nonseekable_open);
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523 int stream_open(struct inode *inode, struct file *filp)
1524 {
1525 filp->f_mode &= ~(FMODE_LSEEK | FMODE_PREAD | FMODE_PWRITE | FMODE_ATOMIC_POS);
1526 filp->f_mode |= FMODE_STREAM;
1527 return 0;
1528 }
1529
1530 EXPORT_SYMBOL(stream_open);