18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * Copyright 2008 Red Hat, Inc. All rights reserved. 48c2ecf20Sopenharmony_ci * Copyright 2008 Ian Kent <raven@themaw.net> 58c2ecf20Sopenharmony_ci */ 68c2ecf20Sopenharmony_ci 78c2ecf20Sopenharmony_ci#include <linux/miscdevice.h> 88c2ecf20Sopenharmony_ci#include <linux/compat.h> 98c2ecf20Sopenharmony_ci#include <linux/syscalls.h> 108c2ecf20Sopenharmony_ci#include <linux/magic.h> 118c2ecf20Sopenharmony_ci#include <linux/nospec.h> 128c2ecf20Sopenharmony_ci 138c2ecf20Sopenharmony_ci#include "autofs_i.h" 148c2ecf20Sopenharmony_ci 158c2ecf20Sopenharmony_ci/* 168c2ecf20Sopenharmony_ci * This module implements an interface for routing autofs ioctl control 178c2ecf20Sopenharmony_ci * commands via a miscellaneous device file. 188c2ecf20Sopenharmony_ci * 198c2ecf20Sopenharmony_ci * The alternate interface is needed because we need to be able open 208c2ecf20Sopenharmony_ci * an ioctl file descriptor on an autofs mount that may be covered by 218c2ecf20Sopenharmony_ci * another mount. This situation arises when starting automount(8) 228c2ecf20Sopenharmony_ci * or other user space daemon which uses direct mounts or offset 238c2ecf20Sopenharmony_ci * mounts (used for autofs lazy mount/umount of nested mount trees), 248c2ecf20Sopenharmony_ci * which have been left busy at service shutdown. 258c2ecf20Sopenharmony_ci */ 268c2ecf20Sopenharmony_ci 278c2ecf20Sopenharmony_citypedef int (*ioctl_fn)(struct file *, struct autofs_sb_info *, 288c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *); 298c2ecf20Sopenharmony_ci 308c2ecf20Sopenharmony_cistatic int check_name(const char *name) 318c2ecf20Sopenharmony_ci{ 328c2ecf20Sopenharmony_ci if (!strchr(name, '/')) 338c2ecf20Sopenharmony_ci return -EINVAL; 348c2ecf20Sopenharmony_ci return 0; 358c2ecf20Sopenharmony_ci} 368c2ecf20Sopenharmony_ci 378c2ecf20Sopenharmony_ci/* 388c2ecf20Sopenharmony_ci * Check a string doesn't overrun the chunk of 398c2ecf20Sopenharmony_ci * memory we copied from user land. 408c2ecf20Sopenharmony_ci */ 418c2ecf20Sopenharmony_cistatic int invalid_str(char *str, size_t size) 428c2ecf20Sopenharmony_ci{ 438c2ecf20Sopenharmony_ci if (memchr(str, 0, size)) 448c2ecf20Sopenharmony_ci return 0; 458c2ecf20Sopenharmony_ci return -EINVAL; 468c2ecf20Sopenharmony_ci} 478c2ecf20Sopenharmony_ci 488c2ecf20Sopenharmony_ci/* 498c2ecf20Sopenharmony_ci * Check that the user compiled against correct version of autofs 508c2ecf20Sopenharmony_ci * misc device code. 518c2ecf20Sopenharmony_ci * 528c2ecf20Sopenharmony_ci * As well as checking the version compatibility this always copies 538c2ecf20Sopenharmony_ci * the kernel interface version out. 548c2ecf20Sopenharmony_ci */ 558c2ecf20Sopenharmony_cistatic int check_dev_ioctl_version(int cmd, struct autofs_dev_ioctl *param) 568c2ecf20Sopenharmony_ci{ 578c2ecf20Sopenharmony_ci int err = 0; 588c2ecf20Sopenharmony_ci 598c2ecf20Sopenharmony_ci if ((param->ver_major != AUTOFS_DEV_IOCTL_VERSION_MAJOR) || 608c2ecf20Sopenharmony_ci (param->ver_minor > AUTOFS_DEV_IOCTL_VERSION_MINOR)) { 618c2ecf20Sopenharmony_ci pr_warn("ioctl control interface version mismatch: " 628c2ecf20Sopenharmony_ci "kernel(%u.%u), user(%u.%u), cmd(0x%08x)\n", 638c2ecf20Sopenharmony_ci AUTOFS_DEV_IOCTL_VERSION_MAJOR, 648c2ecf20Sopenharmony_ci AUTOFS_DEV_IOCTL_VERSION_MINOR, 658c2ecf20Sopenharmony_ci param->ver_major, param->ver_minor, cmd); 668c2ecf20Sopenharmony_ci err = -EINVAL; 678c2ecf20Sopenharmony_ci } 688c2ecf20Sopenharmony_ci 698c2ecf20Sopenharmony_ci /* Fill in the kernel version. */ 708c2ecf20Sopenharmony_ci param->ver_major = AUTOFS_DEV_IOCTL_VERSION_MAJOR; 718c2ecf20Sopenharmony_ci param->ver_minor = AUTOFS_DEV_IOCTL_VERSION_MINOR; 728c2ecf20Sopenharmony_ci 738c2ecf20Sopenharmony_ci return err; 748c2ecf20Sopenharmony_ci} 758c2ecf20Sopenharmony_ci 768c2ecf20Sopenharmony_ci/* 778c2ecf20Sopenharmony_ci * Copy parameter control struct, including a possible path allocated 788c2ecf20Sopenharmony_ci * at the end of the struct. 798c2ecf20Sopenharmony_ci */ 808c2ecf20Sopenharmony_cistatic struct autofs_dev_ioctl * 818c2ecf20Sopenharmony_cicopy_dev_ioctl(struct autofs_dev_ioctl __user *in) 828c2ecf20Sopenharmony_ci{ 838c2ecf20Sopenharmony_ci struct autofs_dev_ioctl tmp, *res; 848c2ecf20Sopenharmony_ci 858c2ecf20Sopenharmony_ci if (copy_from_user(&tmp, in, AUTOFS_DEV_IOCTL_SIZE)) 868c2ecf20Sopenharmony_ci return ERR_PTR(-EFAULT); 878c2ecf20Sopenharmony_ci 888c2ecf20Sopenharmony_ci if (tmp.size < AUTOFS_DEV_IOCTL_SIZE) 898c2ecf20Sopenharmony_ci return ERR_PTR(-EINVAL); 908c2ecf20Sopenharmony_ci 918c2ecf20Sopenharmony_ci if (tmp.size > AUTOFS_DEV_IOCTL_SIZE + PATH_MAX) 928c2ecf20Sopenharmony_ci return ERR_PTR(-ENAMETOOLONG); 938c2ecf20Sopenharmony_ci 948c2ecf20Sopenharmony_ci res = memdup_user(in, tmp.size); 958c2ecf20Sopenharmony_ci if (!IS_ERR(res)) 968c2ecf20Sopenharmony_ci res->size = tmp.size; 978c2ecf20Sopenharmony_ci 988c2ecf20Sopenharmony_ci return res; 998c2ecf20Sopenharmony_ci} 1008c2ecf20Sopenharmony_ci 1018c2ecf20Sopenharmony_cistatic inline void free_dev_ioctl(struct autofs_dev_ioctl *param) 1028c2ecf20Sopenharmony_ci{ 1038c2ecf20Sopenharmony_ci kfree(param); 1048c2ecf20Sopenharmony_ci} 1058c2ecf20Sopenharmony_ci 1068c2ecf20Sopenharmony_ci/* 1078c2ecf20Sopenharmony_ci * Check sanity of parameter control fields and if a path is present 1088c2ecf20Sopenharmony_ci * check that it is terminated and contains at least one "/". 1098c2ecf20Sopenharmony_ci */ 1108c2ecf20Sopenharmony_cistatic int validate_dev_ioctl(int cmd, struct autofs_dev_ioctl *param) 1118c2ecf20Sopenharmony_ci{ 1128c2ecf20Sopenharmony_ci int err; 1138c2ecf20Sopenharmony_ci 1148c2ecf20Sopenharmony_ci err = check_dev_ioctl_version(cmd, param); 1158c2ecf20Sopenharmony_ci if (err) { 1168c2ecf20Sopenharmony_ci pr_warn("invalid device control module version " 1178c2ecf20Sopenharmony_ci "supplied for cmd(0x%08x)\n", cmd); 1188c2ecf20Sopenharmony_ci goto out; 1198c2ecf20Sopenharmony_ci } 1208c2ecf20Sopenharmony_ci 1218c2ecf20Sopenharmony_ci if (param->size > AUTOFS_DEV_IOCTL_SIZE) { 1228c2ecf20Sopenharmony_ci err = invalid_str(param->path, param->size - AUTOFS_DEV_IOCTL_SIZE); 1238c2ecf20Sopenharmony_ci if (err) { 1248c2ecf20Sopenharmony_ci pr_warn( 1258c2ecf20Sopenharmony_ci "path string terminator missing for cmd(0x%08x)\n", 1268c2ecf20Sopenharmony_ci cmd); 1278c2ecf20Sopenharmony_ci goto out; 1288c2ecf20Sopenharmony_ci } 1298c2ecf20Sopenharmony_ci 1308c2ecf20Sopenharmony_ci err = check_name(param->path); 1318c2ecf20Sopenharmony_ci if (err) { 1328c2ecf20Sopenharmony_ci pr_warn("invalid path supplied for cmd(0x%08x)\n", 1338c2ecf20Sopenharmony_ci cmd); 1348c2ecf20Sopenharmony_ci goto out; 1358c2ecf20Sopenharmony_ci } 1368c2ecf20Sopenharmony_ci } else { 1378c2ecf20Sopenharmony_ci unsigned int inr = _IOC_NR(cmd); 1388c2ecf20Sopenharmony_ci 1398c2ecf20Sopenharmony_ci if (inr == AUTOFS_DEV_IOCTL_OPENMOUNT_CMD || 1408c2ecf20Sopenharmony_ci inr == AUTOFS_DEV_IOCTL_REQUESTER_CMD || 1418c2ecf20Sopenharmony_ci inr == AUTOFS_DEV_IOCTL_ISMOUNTPOINT_CMD) { 1428c2ecf20Sopenharmony_ci err = -EINVAL; 1438c2ecf20Sopenharmony_ci goto out; 1448c2ecf20Sopenharmony_ci } 1458c2ecf20Sopenharmony_ci } 1468c2ecf20Sopenharmony_ci 1478c2ecf20Sopenharmony_ci err = 0; 1488c2ecf20Sopenharmony_ciout: 1498c2ecf20Sopenharmony_ci return err; 1508c2ecf20Sopenharmony_ci} 1518c2ecf20Sopenharmony_ci 1528c2ecf20Sopenharmony_ci/* Return autofs dev ioctl version */ 1538c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_version(struct file *fp, 1548c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 1558c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 1568c2ecf20Sopenharmony_ci{ 1578c2ecf20Sopenharmony_ci /* This should have already been set. */ 1588c2ecf20Sopenharmony_ci param->ver_major = AUTOFS_DEV_IOCTL_VERSION_MAJOR; 1598c2ecf20Sopenharmony_ci param->ver_minor = AUTOFS_DEV_IOCTL_VERSION_MINOR; 1608c2ecf20Sopenharmony_ci return 0; 1618c2ecf20Sopenharmony_ci} 1628c2ecf20Sopenharmony_ci 1638c2ecf20Sopenharmony_ci/* Return autofs module protocol version */ 1648c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_protover(struct file *fp, 1658c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 1668c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 1678c2ecf20Sopenharmony_ci{ 1688c2ecf20Sopenharmony_ci param->protover.version = sbi->version; 1698c2ecf20Sopenharmony_ci return 0; 1708c2ecf20Sopenharmony_ci} 1718c2ecf20Sopenharmony_ci 1728c2ecf20Sopenharmony_ci/* Return autofs module protocol sub version */ 1738c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_protosubver(struct file *fp, 1748c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 1758c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 1768c2ecf20Sopenharmony_ci{ 1778c2ecf20Sopenharmony_ci param->protosubver.sub_version = sbi->sub_version; 1788c2ecf20Sopenharmony_ci return 0; 1798c2ecf20Sopenharmony_ci} 1808c2ecf20Sopenharmony_ci 1818c2ecf20Sopenharmony_ci/* Find the topmost mount satisfying test() */ 1828c2ecf20Sopenharmony_cistatic int find_autofs_mount(const char *pathname, 1838c2ecf20Sopenharmony_ci struct path *res, 1848c2ecf20Sopenharmony_ci int test(const struct path *path, void *data), 1858c2ecf20Sopenharmony_ci void *data) 1868c2ecf20Sopenharmony_ci{ 1878c2ecf20Sopenharmony_ci struct path path; 1888c2ecf20Sopenharmony_ci int err; 1898c2ecf20Sopenharmony_ci 1908c2ecf20Sopenharmony_ci err = kern_path(pathname, LOOKUP_MOUNTPOINT, &path); 1918c2ecf20Sopenharmony_ci if (err) 1928c2ecf20Sopenharmony_ci return err; 1938c2ecf20Sopenharmony_ci err = -ENOENT; 1948c2ecf20Sopenharmony_ci while (path.dentry == path.mnt->mnt_root) { 1958c2ecf20Sopenharmony_ci if (path.dentry->d_sb->s_magic == AUTOFS_SUPER_MAGIC) { 1968c2ecf20Sopenharmony_ci if (test(&path, data)) { 1978c2ecf20Sopenharmony_ci path_get(&path); 1988c2ecf20Sopenharmony_ci *res = path; 1998c2ecf20Sopenharmony_ci err = 0; 2008c2ecf20Sopenharmony_ci break; 2018c2ecf20Sopenharmony_ci } 2028c2ecf20Sopenharmony_ci } 2038c2ecf20Sopenharmony_ci if (!follow_up(&path)) 2048c2ecf20Sopenharmony_ci break; 2058c2ecf20Sopenharmony_ci } 2068c2ecf20Sopenharmony_ci path_put(&path); 2078c2ecf20Sopenharmony_ci return err; 2088c2ecf20Sopenharmony_ci} 2098c2ecf20Sopenharmony_ci 2108c2ecf20Sopenharmony_cistatic int test_by_dev(const struct path *path, void *p) 2118c2ecf20Sopenharmony_ci{ 2128c2ecf20Sopenharmony_ci return path->dentry->d_sb->s_dev == *(dev_t *)p; 2138c2ecf20Sopenharmony_ci} 2148c2ecf20Sopenharmony_ci 2158c2ecf20Sopenharmony_cistatic int test_by_type(const struct path *path, void *p) 2168c2ecf20Sopenharmony_ci{ 2178c2ecf20Sopenharmony_ci struct autofs_info *ino = autofs_dentry_ino(path->dentry); 2188c2ecf20Sopenharmony_ci 2198c2ecf20Sopenharmony_ci return ino && ino->sbi->type & *(unsigned *)p; 2208c2ecf20Sopenharmony_ci} 2218c2ecf20Sopenharmony_ci 2228c2ecf20Sopenharmony_ci/* 2238c2ecf20Sopenharmony_ci * Open a file descriptor on the autofs mount point corresponding 2248c2ecf20Sopenharmony_ci * to the given path and device number (aka. new_encode_dev(sb->s_dev)). 2258c2ecf20Sopenharmony_ci */ 2268c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_open_mountpoint(const char *name, dev_t devid) 2278c2ecf20Sopenharmony_ci{ 2288c2ecf20Sopenharmony_ci int err, fd; 2298c2ecf20Sopenharmony_ci 2308c2ecf20Sopenharmony_ci fd = get_unused_fd_flags(O_CLOEXEC); 2318c2ecf20Sopenharmony_ci if (likely(fd >= 0)) { 2328c2ecf20Sopenharmony_ci struct file *filp; 2338c2ecf20Sopenharmony_ci struct path path; 2348c2ecf20Sopenharmony_ci 2358c2ecf20Sopenharmony_ci err = find_autofs_mount(name, &path, test_by_dev, &devid); 2368c2ecf20Sopenharmony_ci if (err) 2378c2ecf20Sopenharmony_ci goto out; 2388c2ecf20Sopenharmony_ci 2398c2ecf20Sopenharmony_ci filp = dentry_open(&path, O_RDONLY, current_cred()); 2408c2ecf20Sopenharmony_ci path_put(&path); 2418c2ecf20Sopenharmony_ci if (IS_ERR(filp)) { 2428c2ecf20Sopenharmony_ci err = PTR_ERR(filp); 2438c2ecf20Sopenharmony_ci goto out; 2448c2ecf20Sopenharmony_ci } 2458c2ecf20Sopenharmony_ci 2468c2ecf20Sopenharmony_ci fd_install(fd, filp); 2478c2ecf20Sopenharmony_ci } 2488c2ecf20Sopenharmony_ci 2498c2ecf20Sopenharmony_ci return fd; 2508c2ecf20Sopenharmony_ci 2518c2ecf20Sopenharmony_ciout: 2528c2ecf20Sopenharmony_ci put_unused_fd(fd); 2538c2ecf20Sopenharmony_ci return err; 2548c2ecf20Sopenharmony_ci} 2558c2ecf20Sopenharmony_ci 2568c2ecf20Sopenharmony_ci/* Open a file descriptor on an autofs mount point */ 2578c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_openmount(struct file *fp, 2588c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 2598c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 2608c2ecf20Sopenharmony_ci{ 2618c2ecf20Sopenharmony_ci const char *path; 2628c2ecf20Sopenharmony_ci dev_t devid; 2638c2ecf20Sopenharmony_ci int err, fd; 2648c2ecf20Sopenharmony_ci 2658c2ecf20Sopenharmony_ci /* param->path has been checked in validate_dev_ioctl() */ 2668c2ecf20Sopenharmony_ci 2678c2ecf20Sopenharmony_ci if (!param->openmount.devid) 2688c2ecf20Sopenharmony_ci return -EINVAL; 2698c2ecf20Sopenharmony_ci 2708c2ecf20Sopenharmony_ci param->ioctlfd = -1; 2718c2ecf20Sopenharmony_ci 2728c2ecf20Sopenharmony_ci path = param->path; 2738c2ecf20Sopenharmony_ci devid = new_decode_dev(param->openmount.devid); 2748c2ecf20Sopenharmony_ci 2758c2ecf20Sopenharmony_ci err = 0; 2768c2ecf20Sopenharmony_ci fd = autofs_dev_ioctl_open_mountpoint(path, devid); 2778c2ecf20Sopenharmony_ci if (unlikely(fd < 0)) { 2788c2ecf20Sopenharmony_ci err = fd; 2798c2ecf20Sopenharmony_ci goto out; 2808c2ecf20Sopenharmony_ci } 2818c2ecf20Sopenharmony_ci 2828c2ecf20Sopenharmony_ci param->ioctlfd = fd; 2838c2ecf20Sopenharmony_ciout: 2848c2ecf20Sopenharmony_ci return err; 2858c2ecf20Sopenharmony_ci} 2868c2ecf20Sopenharmony_ci 2878c2ecf20Sopenharmony_ci/* Close file descriptor allocated above (user can also use close(2)). */ 2888c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_closemount(struct file *fp, 2898c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 2908c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 2918c2ecf20Sopenharmony_ci{ 2928c2ecf20Sopenharmony_ci return ksys_close(param->ioctlfd); 2938c2ecf20Sopenharmony_ci} 2948c2ecf20Sopenharmony_ci 2958c2ecf20Sopenharmony_ci/* 2968c2ecf20Sopenharmony_ci * Send "ready" status for an existing wait (either a mount or an expire 2978c2ecf20Sopenharmony_ci * request). 2988c2ecf20Sopenharmony_ci */ 2998c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_ready(struct file *fp, 3008c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 3018c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 3028c2ecf20Sopenharmony_ci{ 3038c2ecf20Sopenharmony_ci autofs_wqt_t token; 3048c2ecf20Sopenharmony_ci 3058c2ecf20Sopenharmony_ci token = (autofs_wqt_t) param->ready.token; 3068c2ecf20Sopenharmony_ci return autofs_wait_release(sbi, token, 0); 3078c2ecf20Sopenharmony_ci} 3088c2ecf20Sopenharmony_ci 3098c2ecf20Sopenharmony_ci/* 3108c2ecf20Sopenharmony_ci * Send "fail" status for an existing wait (either a mount or an expire 3118c2ecf20Sopenharmony_ci * request). 3128c2ecf20Sopenharmony_ci */ 3138c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_fail(struct file *fp, 3148c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 3158c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 3168c2ecf20Sopenharmony_ci{ 3178c2ecf20Sopenharmony_ci autofs_wqt_t token; 3188c2ecf20Sopenharmony_ci int status; 3198c2ecf20Sopenharmony_ci 3208c2ecf20Sopenharmony_ci token = (autofs_wqt_t) param->fail.token; 3218c2ecf20Sopenharmony_ci status = param->fail.status < 0 ? param->fail.status : -ENOENT; 3228c2ecf20Sopenharmony_ci return autofs_wait_release(sbi, token, status); 3238c2ecf20Sopenharmony_ci} 3248c2ecf20Sopenharmony_ci 3258c2ecf20Sopenharmony_ci/* 3268c2ecf20Sopenharmony_ci * Set the pipe fd for kernel communication to the daemon. 3278c2ecf20Sopenharmony_ci * 3288c2ecf20Sopenharmony_ci * Normally this is set at mount using an option but if we 3298c2ecf20Sopenharmony_ci * are reconnecting to a busy mount then we need to use this 3308c2ecf20Sopenharmony_ci * to tell the autofs mount about the new kernel pipe fd. In 3318c2ecf20Sopenharmony_ci * order to protect mounts against incorrectly setting the 3328c2ecf20Sopenharmony_ci * pipefd we also require that the autofs mount be catatonic. 3338c2ecf20Sopenharmony_ci * 3348c2ecf20Sopenharmony_ci * This also sets the process group id used to identify the 3358c2ecf20Sopenharmony_ci * controlling process (eg. the owning automount(8) daemon). 3368c2ecf20Sopenharmony_ci */ 3378c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_setpipefd(struct file *fp, 3388c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 3398c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 3408c2ecf20Sopenharmony_ci{ 3418c2ecf20Sopenharmony_ci int pipefd; 3428c2ecf20Sopenharmony_ci int err = 0; 3438c2ecf20Sopenharmony_ci struct pid *new_pid = NULL; 3448c2ecf20Sopenharmony_ci 3458c2ecf20Sopenharmony_ci if (param->setpipefd.pipefd == -1) 3468c2ecf20Sopenharmony_ci return -EINVAL; 3478c2ecf20Sopenharmony_ci 3488c2ecf20Sopenharmony_ci pipefd = param->setpipefd.pipefd; 3498c2ecf20Sopenharmony_ci 3508c2ecf20Sopenharmony_ci mutex_lock(&sbi->wq_mutex); 3518c2ecf20Sopenharmony_ci if (!(sbi->flags & AUTOFS_SBI_CATATONIC)) { 3528c2ecf20Sopenharmony_ci mutex_unlock(&sbi->wq_mutex); 3538c2ecf20Sopenharmony_ci return -EBUSY; 3548c2ecf20Sopenharmony_ci } else { 3558c2ecf20Sopenharmony_ci struct file *pipe; 3568c2ecf20Sopenharmony_ci 3578c2ecf20Sopenharmony_ci new_pid = get_task_pid(current, PIDTYPE_PGID); 3588c2ecf20Sopenharmony_ci 3598c2ecf20Sopenharmony_ci if (ns_of_pid(new_pid) != ns_of_pid(sbi->oz_pgrp)) { 3608c2ecf20Sopenharmony_ci pr_warn("not allowed to change PID namespace\n"); 3618c2ecf20Sopenharmony_ci err = -EINVAL; 3628c2ecf20Sopenharmony_ci goto out; 3638c2ecf20Sopenharmony_ci } 3648c2ecf20Sopenharmony_ci 3658c2ecf20Sopenharmony_ci pipe = fget(pipefd); 3668c2ecf20Sopenharmony_ci if (!pipe) { 3678c2ecf20Sopenharmony_ci err = -EBADF; 3688c2ecf20Sopenharmony_ci goto out; 3698c2ecf20Sopenharmony_ci } 3708c2ecf20Sopenharmony_ci if (autofs_prepare_pipe(pipe) < 0) { 3718c2ecf20Sopenharmony_ci err = -EPIPE; 3728c2ecf20Sopenharmony_ci fput(pipe); 3738c2ecf20Sopenharmony_ci goto out; 3748c2ecf20Sopenharmony_ci } 3758c2ecf20Sopenharmony_ci swap(sbi->oz_pgrp, new_pid); 3768c2ecf20Sopenharmony_ci sbi->pipefd = pipefd; 3778c2ecf20Sopenharmony_ci sbi->pipe = pipe; 3788c2ecf20Sopenharmony_ci sbi->flags &= ~AUTOFS_SBI_CATATONIC; 3798c2ecf20Sopenharmony_ci } 3808c2ecf20Sopenharmony_ciout: 3818c2ecf20Sopenharmony_ci put_pid(new_pid); 3828c2ecf20Sopenharmony_ci mutex_unlock(&sbi->wq_mutex); 3838c2ecf20Sopenharmony_ci return err; 3848c2ecf20Sopenharmony_ci} 3858c2ecf20Sopenharmony_ci 3868c2ecf20Sopenharmony_ci/* 3878c2ecf20Sopenharmony_ci * Make the autofs mount point catatonic, no longer responsive to 3888c2ecf20Sopenharmony_ci * mount requests. Also closes the kernel pipe file descriptor. 3898c2ecf20Sopenharmony_ci */ 3908c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_catatonic(struct file *fp, 3918c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 3928c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 3938c2ecf20Sopenharmony_ci{ 3948c2ecf20Sopenharmony_ci autofs_catatonic_mode(sbi); 3958c2ecf20Sopenharmony_ci return 0; 3968c2ecf20Sopenharmony_ci} 3978c2ecf20Sopenharmony_ci 3988c2ecf20Sopenharmony_ci/* Set the autofs mount timeout */ 3998c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_timeout(struct file *fp, 4008c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 4018c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 4028c2ecf20Sopenharmony_ci{ 4038c2ecf20Sopenharmony_ci unsigned long timeout; 4048c2ecf20Sopenharmony_ci 4058c2ecf20Sopenharmony_ci timeout = param->timeout.timeout; 4068c2ecf20Sopenharmony_ci param->timeout.timeout = sbi->exp_timeout / HZ; 4078c2ecf20Sopenharmony_ci sbi->exp_timeout = timeout * HZ; 4088c2ecf20Sopenharmony_ci return 0; 4098c2ecf20Sopenharmony_ci} 4108c2ecf20Sopenharmony_ci 4118c2ecf20Sopenharmony_ci/* 4128c2ecf20Sopenharmony_ci * Return the uid and gid of the last request for the mount 4138c2ecf20Sopenharmony_ci * 4148c2ecf20Sopenharmony_ci * When reconstructing an autofs mount tree with active mounts 4158c2ecf20Sopenharmony_ci * we need to re-connect to mounts that may have used the original 4168c2ecf20Sopenharmony_ci * process uid and gid (or string variations of them) for mount 4178c2ecf20Sopenharmony_ci * lookups within the map entry. 4188c2ecf20Sopenharmony_ci */ 4198c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_requester(struct file *fp, 4208c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 4218c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 4228c2ecf20Sopenharmony_ci{ 4238c2ecf20Sopenharmony_ci struct autofs_info *ino; 4248c2ecf20Sopenharmony_ci struct path path; 4258c2ecf20Sopenharmony_ci dev_t devid; 4268c2ecf20Sopenharmony_ci int err = -ENOENT; 4278c2ecf20Sopenharmony_ci 4288c2ecf20Sopenharmony_ci /* param->path has been checked in validate_dev_ioctl() */ 4298c2ecf20Sopenharmony_ci 4308c2ecf20Sopenharmony_ci devid = sbi->sb->s_dev; 4318c2ecf20Sopenharmony_ci 4328c2ecf20Sopenharmony_ci param->requester.uid = param->requester.gid = -1; 4338c2ecf20Sopenharmony_ci 4348c2ecf20Sopenharmony_ci err = find_autofs_mount(param->path, &path, test_by_dev, &devid); 4358c2ecf20Sopenharmony_ci if (err) 4368c2ecf20Sopenharmony_ci goto out; 4378c2ecf20Sopenharmony_ci 4388c2ecf20Sopenharmony_ci ino = autofs_dentry_ino(path.dentry); 4398c2ecf20Sopenharmony_ci if (ino) { 4408c2ecf20Sopenharmony_ci err = 0; 4418c2ecf20Sopenharmony_ci autofs_expire_wait(&path, 0); 4428c2ecf20Sopenharmony_ci spin_lock(&sbi->fs_lock); 4438c2ecf20Sopenharmony_ci param->requester.uid = 4448c2ecf20Sopenharmony_ci from_kuid_munged(current_user_ns(), ino->uid); 4458c2ecf20Sopenharmony_ci param->requester.gid = 4468c2ecf20Sopenharmony_ci from_kgid_munged(current_user_ns(), ino->gid); 4478c2ecf20Sopenharmony_ci spin_unlock(&sbi->fs_lock); 4488c2ecf20Sopenharmony_ci } 4498c2ecf20Sopenharmony_ci path_put(&path); 4508c2ecf20Sopenharmony_ciout: 4518c2ecf20Sopenharmony_ci return err; 4528c2ecf20Sopenharmony_ci} 4538c2ecf20Sopenharmony_ci 4548c2ecf20Sopenharmony_ci/* 4558c2ecf20Sopenharmony_ci * Call repeatedly until it returns -EAGAIN, meaning there's nothing 4568c2ecf20Sopenharmony_ci * more that can be done. 4578c2ecf20Sopenharmony_ci */ 4588c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_expire(struct file *fp, 4598c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 4608c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 4618c2ecf20Sopenharmony_ci{ 4628c2ecf20Sopenharmony_ci struct vfsmount *mnt; 4638c2ecf20Sopenharmony_ci int how; 4648c2ecf20Sopenharmony_ci 4658c2ecf20Sopenharmony_ci how = param->expire.how; 4668c2ecf20Sopenharmony_ci mnt = fp->f_path.mnt; 4678c2ecf20Sopenharmony_ci 4688c2ecf20Sopenharmony_ci return autofs_do_expire_multi(sbi->sb, mnt, sbi, how); 4698c2ecf20Sopenharmony_ci} 4708c2ecf20Sopenharmony_ci 4718c2ecf20Sopenharmony_ci/* Check if autofs mount point is in use */ 4728c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_askumount(struct file *fp, 4738c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 4748c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 4758c2ecf20Sopenharmony_ci{ 4768c2ecf20Sopenharmony_ci param->askumount.may_umount = 0; 4778c2ecf20Sopenharmony_ci if (may_umount(fp->f_path.mnt)) 4788c2ecf20Sopenharmony_ci param->askumount.may_umount = 1; 4798c2ecf20Sopenharmony_ci return 0; 4808c2ecf20Sopenharmony_ci} 4818c2ecf20Sopenharmony_ci 4828c2ecf20Sopenharmony_ci/* 4838c2ecf20Sopenharmony_ci * Check if the given path is a mountpoint. 4848c2ecf20Sopenharmony_ci * 4858c2ecf20Sopenharmony_ci * If we are supplied with the file descriptor of an autofs 4868c2ecf20Sopenharmony_ci * mount we're looking for a specific mount. In this case 4878c2ecf20Sopenharmony_ci * the path is considered a mountpoint if it is itself a 4888c2ecf20Sopenharmony_ci * mountpoint or contains a mount, such as a multi-mount 4898c2ecf20Sopenharmony_ci * without a root mount. In this case we return 1 if the 4908c2ecf20Sopenharmony_ci * path is a mount point and the super magic of the covering 4918c2ecf20Sopenharmony_ci * mount if there is one or 0 if it isn't a mountpoint. 4928c2ecf20Sopenharmony_ci * 4938c2ecf20Sopenharmony_ci * If we aren't supplied with a file descriptor then we 4948c2ecf20Sopenharmony_ci * lookup the path and check if it is the root of a mount. 4958c2ecf20Sopenharmony_ci * If a type is given we are looking for a particular autofs 4968c2ecf20Sopenharmony_ci * mount and if we don't find a match we return fail. If the 4978c2ecf20Sopenharmony_ci * located path is the root of a mount we return 1 along with 4988c2ecf20Sopenharmony_ci * the super magic of the mount or 0 otherwise. 4998c2ecf20Sopenharmony_ci * 5008c2ecf20Sopenharmony_ci * In both cases the device number (as returned by 5018c2ecf20Sopenharmony_ci * new_encode_dev()) is also returned. 5028c2ecf20Sopenharmony_ci */ 5038c2ecf20Sopenharmony_cistatic int autofs_dev_ioctl_ismountpoint(struct file *fp, 5048c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi, 5058c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param) 5068c2ecf20Sopenharmony_ci{ 5078c2ecf20Sopenharmony_ci struct path path; 5088c2ecf20Sopenharmony_ci const char *name; 5098c2ecf20Sopenharmony_ci unsigned int type; 5108c2ecf20Sopenharmony_ci unsigned int devid, magic; 5118c2ecf20Sopenharmony_ci int err = -ENOENT; 5128c2ecf20Sopenharmony_ci 5138c2ecf20Sopenharmony_ci /* param->path has been checked in validate_dev_ioctl() */ 5148c2ecf20Sopenharmony_ci 5158c2ecf20Sopenharmony_ci name = param->path; 5168c2ecf20Sopenharmony_ci type = param->ismountpoint.in.type; 5178c2ecf20Sopenharmony_ci 5188c2ecf20Sopenharmony_ci param->ismountpoint.out.devid = devid = 0; 5198c2ecf20Sopenharmony_ci param->ismountpoint.out.magic = magic = 0; 5208c2ecf20Sopenharmony_ci 5218c2ecf20Sopenharmony_ci if (!fp || param->ioctlfd == -1) { 5228c2ecf20Sopenharmony_ci if (autofs_type_any(type)) 5238c2ecf20Sopenharmony_ci err = kern_path(name, LOOKUP_FOLLOW | LOOKUP_MOUNTPOINT, 5248c2ecf20Sopenharmony_ci &path); 5258c2ecf20Sopenharmony_ci else 5268c2ecf20Sopenharmony_ci err = find_autofs_mount(name, &path, 5278c2ecf20Sopenharmony_ci test_by_type, &type); 5288c2ecf20Sopenharmony_ci if (err) 5298c2ecf20Sopenharmony_ci goto out; 5308c2ecf20Sopenharmony_ci devid = new_encode_dev(path.dentry->d_sb->s_dev); 5318c2ecf20Sopenharmony_ci err = 0; 5328c2ecf20Sopenharmony_ci if (path.mnt->mnt_root == path.dentry) { 5338c2ecf20Sopenharmony_ci err = 1; 5348c2ecf20Sopenharmony_ci magic = path.dentry->d_sb->s_magic; 5358c2ecf20Sopenharmony_ci } 5368c2ecf20Sopenharmony_ci } else { 5378c2ecf20Sopenharmony_ci dev_t dev = sbi->sb->s_dev; 5388c2ecf20Sopenharmony_ci 5398c2ecf20Sopenharmony_ci err = find_autofs_mount(name, &path, test_by_dev, &dev); 5408c2ecf20Sopenharmony_ci if (err) 5418c2ecf20Sopenharmony_ci goto out; 5428c2ecf20Sopenharmony_ci 5438c2ecf20Sopenharmony_ci devid = new_encode_dev(dev); 5448c2ecf20Sopenharmony_ci 5458c2ecf20Sopenharmony_ci err = path_has_submounts(&path); 5468c2ecf20Sopenharmony_ci 5478c2ecf20Sopenharmony_ci if (follow_down_one(&path)) 5488c2ecf20Sopenharmony_ci magic = path.dentry->d_sb->s_magic; 5498c2ecf20Sopenharmony_ci } 5508c2ecf20Sopenharmony_ci 5518c2ecf20Sopenharmony_ci param->ismountpoint.out.devid = devid; 5528c2ecf20Sopenharmony_ci param->ismountpoint.out.magic = magic; 5538c2ecf20Sopenharmony_ci path_put(&path); 5548c2ecf20Sopenharmony_ciout: 5558c2ecf20Sopenharmony_ci return err; 5568c2ecf20Sopenharmony_ci} 5578c2ecf20Sopenharmony_ci 5588c2ecf20Sopenharmony_ci/* 5598c2ecf20Sopenharmony_ci * Our range of ioctl numbers isn't 0 based so we need to shift 5608c2ecf20Sopenharmony_ci * the array index by _IOC_NR(AUTOFS_CTL_IOC_FIRST) for the table 5618c2ecf20Sopenharmony_ci * lookup. 5628c2ecf20Sopenharmony_ci */ 5638c2ecf20Sopenharmony_ci#define cmd_idx(cmd) (cmd - _IOC_NR(AUTOFS_DEV_IOCTL_IOC_FIRST)) 5648c2ecf20Sopenharmony_ci 5658c2ecf20Sopenharmony_cistatic ioctl_fn lookup_dev_ioctl(unsigned int cmd) 5668c2ecf20Sopenharmony_ci{ 5678c2ecf20Sopenharmony_ci static const ioctl_fn _ioctls[] = { 5688c2ecf20Sopenharmony_ci autofs_dev_ioctl_version, 5698c2ecf20Sopenharmony_ci autofs_dev_ioctl_protover, 5708c2ecf20Sopenharmony_ci autofs_dev_ioctl_protosubver, 5718c2ecf20Sopenharmony_ci autofs_dev_ioctl_openmount, 5728c2ecf20Sopenharmony_ci autofs_dev_ioctl_closemount, 5738c2ecf20Sopenharmony_ci autofs_dev_ioctl_ready, 5748c2ecf20Sopenharmony_ci autofs_dev_ioctl_fail, 5758c2ecf20Sopenharmony_ci autofs_dev_ioctl_setpipefd, 5768c2ecf20Sopenharmony_ci autofs_dev_ioctl_catatonic, 5778c2ecf20Sopenharmony_ci autofs_dev_ioctl_timeout, 5788c2ecf20Sopenharmony_ci autofs_dev_ioctl_requester, 5798c2ecf20Sopenharmony_ci autofs_dev_ioctl_expire, 5808c2ecf20Sopenharmony_ci autofs_dev_ioctl_askumount, 5818c2ecf20Sopenharmony_ci autofs_dev_ioctl_ismountpoint, 5828c2ecf20Sopenharmony_ci }; 5838c2ecf20Sopenharmony_ci unsigned int idx = cmd_idx(cmd); 5848c2ecf20Sopenharmony_ci 5858c2ecf20Sopenharmony_ci if (idx >= ARRAY_SIZE(_ioctls)) 5868c2ecf20Sopenharmony_ci return NULL; 5878c2ecf20Sopenharmony_ci idx = array_index_nospec(idx, ARRAY_SIZE(_ioctls)); 5888c2ecf20Sopenharmony_ci return _ioctls[idx]; 5898c2ecf20Sopenharmony_ci} 5908c2ecf20Sopenharmony_ci 5918c2ecf20Sopenharmony_ci/* ioctl dispatcher */ 5928c2ecf20Sopenharmony_cistatic int _autofs_dev_ioctl(unsigned int command, 5938c2ecf20Sopenharmony_ci struct autofs_dev_ioctl __user *user) 5948c2ecf20Sopenharmony_ci{ 5958c2ecf20Sopenharmony_ci struct autofs_dev_ioctl *param; 5968c2ecf20Sopenharmony_ci struct file *fp; 5978c2ecf20Sopenharmony_ci struct autofs_sb_info *sbi; 5988c2ecf20Sopenharmony_ci unsigned int cmd_first, cmd; 5998c2ecf20Sopenharmony_ci ioctl_fn fn = NULL; 6008c2ecf20Sopenharmony_ci int err = 0; 6018c2ecf20Sopenharmony_ci 6028c2ecf20Sopenharmony_ci cmd_first = _IOC_NR(AUTOFS_DEV_IOCTL_IOC_FIRST); 6038c2ecf20Sopenharmony_ci cmd = _IOC_NR(command); 6048c2ecf20Sopenharmony_ci 6058c2ecf20Sopenharmony_ci if (_IOC_TYPE(command) != _IOC_TYPE(AUTOFS_DEV_IOCTL_IOC_FIRST) || 6068c2ecf20Sopenharmony_ci cmd - cmd_first > AUTOFS_DEV_IOCTL_IOC_COUNT) { 6078c2ecf20Sopenharmony_ci return -ENOTTY; 6088c2ecf20Sopenharmony_ci } 6098c2ecf20Sopenharmony_ci 6108c2ecf20Sopenharmony_ci /* Only root can use ioctls other than AUTOFS_DEV_IOCTL_VERSION_CMD 6118c2ecf20Sopenharmony_ci * and AUTOFS_DEV_IOCTL_ISMOUNTPOINT_CMD 6128c2ecf20Sopenharmony_ci */ 6138c2ecf20Sopenharmony_ci if (cmd != AUTOFS_DEV_IOCTL_VERSION_CMD && 6148c2ecf20Sopenharmony_ci cmd != AUTOFS_DEV_IOCTL_ISMOUNTPOINT_CMD && 6158c2ecf20Sopenharmony_ci !capable(CAP_SYS_ADMIN)) 6168c2ecf20Sopenharmony_ci return -EPERM; 6178c2ecf20Sopenharmony_ci 6188c2ecf20Sopenharmony_ci /* Copy the parameters into kernel space. */ 6198c2ecf20Sopenharmony_ci param = copy_dev_ioctl(user); 6208c2ecf20Sopenharmony_ci if (IS_ERR(param)) 6218c2ecf20Sopenharmony_ci return PTR_ERR(param); 6228c2ecf20Sopenharmony_ci 6238c2ecf20Sopenharmony_ci err = validate_dev_ioctl(command, param); 6248c2ecf20Sopenharmony_ci if (err) 6258c2ecf20Sopenharmony_ci goto out; 6268c2ecf20Sopenharmony_ci 6278c2ecf20Sopenharmony_ci fn = lookup_dev_ioctl(cmd); 6288c2ecf20Sopenharmony_ci if (!fn) { 6298c2ecf20Sopenharmony_ci pr_warn("unknown command 0x%08x\n", command); 6308c2ecf20Sopenharmony_ci err = -ENOTTY; 6318c2ecf20Sopenharmony_ci goto out; 6328c2ecf20Sopenharmony_ci } 6338c2ecf20Sopenharmony_ci 6348c2ecf20Sopenharmony_ci fp = NULL; 6358c2ecf20Sopenharmony_ci sbi = NULL; 6368c2ecf20Sopenharmony_ci 6378c2ecf20Sopenharmony_ci /* 6388c2ecf20Sopenharmony_ci * For obvious reasons the openmount can't have a file 6398c2ecf20Sopenharmony_ci * descriptor yet. We don't take a reference to the 6408c2ecf20Sopenharmony_ci * file during close to allow for immediate release, 6418c2ecf20Sopenharmony_ci * and the same for retrieving ioctl version. 6428c2ecf20Sopenharmony_ci */ 6438c2ecf20Sopenharmony_ci if (cmd != AUTOFS_DEV_IOCTL_VERSION_CMD && 6448c2ecf20Sopenharmony_ci cmd != AUTOFS_DEV_IOCTL_OPENMOUNT_CMD && 6458c2ecf20Sopenharmony_ci cmd != AUTOFS_DEV_IOCTL_CLOSEMOUNT_CMD) { 6468c2ecf20Sopenharmony_ci struct super_block *sb; 6478c2ecf20Sopenharmony_ci 6488c2ecf20Sopenharmony_ci fp = fget(param->ioctlfd); 6498c2ecf20Sopenharmony_ci if (!fp) { 6508c2ecf20Sopenharmony_ci if (cmd == AUTOFS_DEV_IOCTL_ISMOUNTPOINT_CMD) 6518c2ecf20Sopenharmony_ci goto cont; 6528c2ecf20Sopenharmony_ci err = -EBADF; 6538c2ecf20Sopenharmony_ci goto out; 6548c2ecf20Sopenharmony_ci } 6558c2ecf20Sopenharmony_ci 6568c2ecf20Sopenharmony_ci sb = file_inode(fp)->i_sb; 6578c2ecf20Sopenharmony_ci if (sb->s_type != &autofs_fs_type) { 6588c2ecf20Sopenharmony_ci err = -EINVAL; 6598c2ecf20Sopenharmony_ci fput(fp); 6608c2ecf20Sopenharmony_ci goto out; 6618c2ecf20Sopenharmony_ci } 6628c2ecf20Sopenharmony_ci sbi = autofs_sbi(sb); 6638c2ecf20Sopenharmony_ci 6648c2ecf20Sopenharmony_ci /* 6658c2ecf20Sopenharmony_ci * Admin needs to be able to set the mount catatonic in 6668c2ecf20Sopenharmony_ci * order to be able to perform the re-open. 6678c2ecf20Sopenharmony_ci */ 6688c2ecf20Sopenharmony_ci if (!autofs_oz_mode(sbi) && 6698c2ecf20Sopenharmony_ci cmd != AUTOFS_DEV_IOCTL_CATATONIC_CMD) { 6708c2ecf20Sopenharmony_ci err = -EACCES; 6718c2ecf20Sopenharmony_ci fput(fp); 6728c2ecf20Sopenharmony_ci goto out; 6738c2ecf20Sopenharmony_ci } 6748c2ecf20Sopenharmony_ci } 6758c2ecf20Sopenharmony_cicont: 6768c2ecf20Sopenharmony_ci err = fn(fp, sbi, param); 6778c2ecf20Sopenharmony_ci 6788c2ecf20Sopenharmony_ci if (fp) 6798c2ecf20Sopenharmony_ci fput(fp); 6808c2ecf20Sopenharmony_ci if (err >= 0 && copy_to_user(user, param, AUTOFS_DEV_IOCTL_SIZE)) 6818c2ecf20Sopenharmony_ci err = -EFAULT; 6828c2ecf20Sopenharmony_ciout: 6838c2ecf20Sopenharmony_ci free_dev_ioctl(param); 6848c2ecf20Sopenharmony_ci return err; 6858c2ecf20Sopenharmony_ci} 6868c2ecf20Sopenharmony_ci 6878c2ecf20Sopenharmony_cistatic long autofs_dev_ioctl(struct file *file, unsigned int command, 6888c2ecf20Sopenharmony_ci unsigned long u) 6898c2ecf20Sopenharmony_ci{ 6908c2ecf20Sopenharmony_ci int err; 6918c2ecf20Sopenharmony_ci 6928c2ecf20Sopenharmony_ci err = _autofs_dev_ioctl(command, (struct autofs_dev_ioctl __user *) u); 6938c2ecf20Sopenharmony_ci return (long) err; 6948c2ecf20Sopenharmony_ci} 6958c2ecf20Sopenharmony_ci 6968c2ecf20Sopenharmony_ci#ifdef CONFIG_COMPAT 6978c2ecf20Sopenharmony_cistatic long autofs_dev_ioctl_compat(struct file *file, unsigned int command, 6988c2ecf20Sopenharmony_ci unsigned long u) 6998c2ecf20Sopenharmony_ci{ 7008c2ecf20Sopenharmony_ci return autofs_dev_ioctl(file, command, (unsigned long) compat_ptr(u)); 7018c2ecf20Sopenharmony_ci} 7028c2ecf20Sopenharmony_ci#else 7038c2ecf20Sopenharmony_ci#define autofs_dev_ioctl_compat NULL 7048c2ecf20Sopenharmony_ci#endif 7058c2ecf20Sopenharmony_ci 7068c2ecf20Sopenharmony_cistatic const struct file_operations _dev_ioctl_fops = { 7078c2ecf20Sopenharmony_ci .unlocked_ioctl = autofs_dev_ioctl, 7088c2ecf20Sopenharmony_ci .compat_ioctl = autofs_dev_ioctl_compat, 7098c2ecf20Sopenharmony_ci .owner = THIS_MODULE, 7108c2ecf20Sopenharmony_ci .llseek = noop_llseek, 7118c2ecf20Sopenharmony_ci}; 7128c2ecf20Sopenharmony_ci 7138c2ecf20Sopenharmony_cistatic struct miscdevice _autofs_dev_ioctl_misc = { 7148c2ecf20Sopenharmony_ci .minor = AUTOFS_MINOR, 7158c2ecf20Sopenharmony_ci .name = AUTOFS_DEVICE_NAME, 7168c2ecf20Sopenharmony_ci .fops = &_dev_ioctl_fops, 7178c2ecf20Sopenharmony_ci .mode = 0644, 7188c2ecf20Sopenharmony_ci}; 7198c2ecf20Sopenharmony_ci 7208c2ecf20Sopenharmony_ciMODULE_ALIAS_MISCDEV(AUTOFS_MINOR); 7218c2ecf20Sopenharmony_ciMODULE_ALIAS("devname:autofs"); 7228c2ecf20Sopenharmony_ci 7238c2ecf20Sopenharmony_ci/* Register/deregister misc character device */ 7248c2ecf20Sopenharmony_ciint __init autofs_dev_ioctl_init(void) 7258c2ecf20Sopenharmony_ci{ 7268c2ecf20Sopenharmony_ci int r; 7278c2ecf20Sopenharmony_ci 7288c2ecf20Sopenharmony_ci r = misc_register(&_autofs_dev_ioctl_misc); 7298c2ecf20Sopenharmony_ci if (r) { 7308c2ecf20Sopenharmony_ci pr_err("misc_register failed for control device\n"); 7318c2ecf20Sopenharmony_ci return r; 7328c2ecf20Sopenharmony_ci } 7338c2ecf20Sopenharmony_ci 7348c2ecf20Sopenharmony_ci return 0; 7358c2ecf20Sopenharmony_ci} 7368c2ecf20Sopenharmony_ci 7378c2ecf20Sopenharmony_civoid autofs_dev_ioctl_exit(void) 7388c2ecf20Sopenharmony_ci{ 7398c2ecf20Sopenharmony_ci misc_deregister(&_autofs_dev_ioctl_misc); 7408c2ecf20Sopenharmony_ci} 741