4 * Copyright (C) 1995, 1996 by Volker Lendecke
5 * Modified 1997 Peter Waltenberg, Bill Hawes, David Woodhouse for 2.1 dcache
6 * Modified 1998, 1999 Wolfram Pienkoss for NLS
10 #include <linux/capability.h>
11 #include <linux/compat.h>
12 #include <linux/errno.h>
14 #include <linux/ioctl.h>
15 #include <linux/time.h>
17 #include <linux/mount.h>
18 #include <linux/slab.h>
19 #include <linux/highuid.h>
20 #include <linux/vmalloc.h>
21 #include <linux/sched.h>
23 #include <linux/ncp_fs.h>
25 #include <asm/uaccess.h>
27 #include "ncplib_kernel.h"
29 /* maximum limit for ncp_objectname_ioctl */
30 #define NCP_OBJECT_NAME_MAX_LEN 4096
31 /* maximum limit for ncp_privatedata_ioctl */
32 #define NCP_PRIVATE_DATA_MAX_LEN 8192
33 /* maximum negotiable packet size */
34 #define NCP_PACKET_SIZE_INTERNAL 65536
37 ncp_get_fs_info(struct ncp_server
* server
, struct inode
*inode
,
38 struct ncp_fs_info __user
*arg
)
40 struct ncp_fs_info info
;
42 if (copy_from_user(&info
, arg
, sizeof(info
)))
45 if (info
.version
!= NCP_GET_FS_INFO_VERSION
) {
46 DPRINTK("info.version invalid: %d\n", info
.version
);
49 /* TODO: info.addr = server->m.serv_addr; */
50 SET_UID(info
.mounted_uid
, server
->m
.mounted_uid
);
51 info
.connection
= server
->connection
;
52 info
.buffer_size
= server
->buffer_size
;
53 info
.volume_number
= NCP_FINFO(inode
)->volNumber
;
54 info
.directory_id
= NCP_FINFO(inode
)->DosDirNum
;
56 if (copy_to_user(arg
, &info
, sizeof(info
)))
62 ncp_get_fs_info_v2(struct ncp_server
* server
, struct inode
*inode
,
63 struct ncp_fs_info_v2 __user
* arg
)
65 struct ncp_fs_info_v2 info2
;
67 if (copy_from_user(&info2
, arg
, sizeof(info2
)))
70 if (info2
.version
!= NCP_GET_FS_INFO_VERSION_V2
) {
71 DPRINTK("info.version invalid: %d\n", info2
.version
);
74 info2
.mounted_uid
= server
->m
.mounted_uid
;
75 info2
.connection
= server
->connection
;
76 info2
.buffer_size
= server
->buffer_size
;
77 info2
.volume_number
= NCP_FINFO(inode
)->volNumber
;
78 info2
.directory_id
= NCP_FINFO(inode
)->DosDirNum
;
79 info2
.dummy1
= info2
.dummy2
= info2
.dummy3
= 0;
81 if (copy_to_user(arg
, &info2
, sizeof(info2
)))
87 struct compat_ncp_objectname_ioctl
91 compat_caddr_t object_name
; /* a userspace data, in most cases user name */
94 struct compat_ncp_fs_info_v2
{
108 struct compat_ncp_ioctl_request
{
114 struct compat_ncp_privatedata_ioctl
117 compat_caddr_t data
; /* ~1000 for NDS */
120 #define NCP_IOC_GET_FS_INFO_V2_32 _IOWR('n', 4, struct compat_ncp_fs_info_v2)
121 #define NCP_IOC_NCPREQUEST_32 _IOR('n', 1, struct compat_ncp_ioctl_request)
122 #define NCP_IOC_GETOBJECTNAME_32 _IOWR('n', 9, struct compat_ncp_objectname_ioctl)
123 #define NCP_IOC_SETOBJECTNAME_32 _IOR('n', 9, struct compat_ncp_objectname_ioctl)
124 #define NCP_IOC_GETPRIVATEDATA_32 _IOWR('n', 10, struct compat_ncp_privatedata_ioctl)
125 #define NCP_IOC_SETPRIVATEDATA_32 _IOR('n', 10, struct compat_ncp_privatedata_ioctl)
128 ncp_get_compat_fs_info_v2(struct ncp_server
* server
, struct inode
*inode
,
129 struct compat_ncp_fs_info_v2 __user
* arg
)
131 struct compat_ncp_fs_info_v2 info2
;
133 if (copy_from_user(&info2
, arg
, sizeof(info2
)))
136 if (info2
.version
!= NCP_GET_FS_INFO_VERSION_V2
) {
137 DPRINTK("info.version invalid: %d\n", info2
.version
);
140 info2
.mounted_uid
= server
->m
.mounted_uid
;
141 info2
.connection
= server
->connection
;
142 info2
.buffer_size
= server
->buffer_size
;
143 info2
.volume_number
= NCP_FINFO(inode
)->volNumber
;
144 info2
.directory_id
= NCP_FINFO(inode
)->DosDirNum
;
145 info2
.dummy1
= info2
.dummy2
= info2
.dummy3
= 0;
147 if (copy_to_user(arg
, &info2
, sizeof(info2
)))
153 #define NCP_IOC_GETMOUNTUID16 _IOW('n', 2, u16)
154 #define NCP_IOC_GETMOUNTUID32 _IOW('n', 2, u32)
155 #define NCP_IOC_GETMOUNTUID64 _IOW('n', 2, u64)
157 #ifdef CONFIG_NCPFS_NLS
158 /* Here we are select the iocharset and the codepage for NLS.
159 * Thanks Petr Vandrovec for idea and many hints.
162 ncp_set_charsets(struct ncp_server
* server
, struct ncp_nls_ioctl __user
*arg
)
164 struct ncp_nls_ioctl user
;
165 struct nls_table
*codepage
;
166 struct nls_table
*iocharset
;
167 struct nls_table
*oldset_io
;
168 struct nls_table
*oldset_cp
;
172 if (copy_from_user(&user
, arg
, sizeof(user
)))
176 user
.codepage
[NCP_IOCSNAME_LEN
] = 0;
177 if (!user
.codepage
[0] || !strcmp(user
.codepage
, "default"))
178 codepage
= load_nls_default();
180 codepage
= load_nls(user
.codepage
);
187 user
.iocharset
[NCP_IOCSNAME_LEN
] = 0;
188 if (!user
.iocharset
[0] || !strcmp(user
.iocharset
, "default")) {
189 iocharset
= load_nls_default();
191 } else if (!strcmp(user
.iocharset
, "utf8")) {
192 iocharset
= load_nls_default();
195 iocharset
= load_nls(user
.iocharset
);
197 unload_nls(codepage
);
203 mutex_lock(&server
->root_setup_lock
);
204 if (server
->root_setuped
) {
205 oldset_cp
= codepage
;
206 oldset_io
= iocharset
;
210 NCP_SET_FLAG(server
, NCP_FLAG_UTF8
);
212 NCP_CLR_FLAG(server
, NCP_FLAG_UTF8
);
213 oldset_cp
= server
->nls_vol
;
214 server
->nls_vol
= codepage
;
215 oldset_io
= server
->nls_io
;
216 server
->nls_io
= iocharset
;
219 mutex_unlock(&server
->root_setup_lock
);
220 unload_nls(oldset_cp
);
221 unload_nls(oldset_io
);
227 ncp_get_charsets(struct ncp_server
* server
, struct ncp_nls_ioctl __user
*arg
)
229 struct ncp_nls_ioctl user
;
232 memset(&user
, 0, sizeof(user
));
233 mutex_lock(&server
->root_setup_lock
);
234 if (server
->nls_vol
&& server
->nls_vol
->charset
) {
235 len
= strlen(server
->nls_vol
->charset
);
236 if (len
> NCP_IOCSNAME_LEN
)
237 len
= NCP_IOCSNAME_LEN
;
238 strncpy(user
.codepage
, server
->nls_vol
->charset
, len
);
239 user
.codepage
[len
] = 0;
242 if (NCP_IS_FLAG(server
, NCP_FLAG_UTF8
))
243 strcpy(user
.iocharset
, "utf8");
244 else if (server
->nls_io
&& server
->nls_io
->charset
) {
245 len
= strlen(server
->nls_io
->charset
);
246 if (len
> NCP_IOCSNAME_LEN
)
247 len
= NCP_IOCSNAME_LEN
;
248 strncpy(user
.iocharset
, server
->nls_io
->charset
, len
);
249 user
.iocharset
[len
] = 0;
251 mutex_unlock(&server
->root_setup_lock
);
253 if (copy_to_user(arg
, &user
, sizeof(user
)))
257 #endif /* CONFIG_NCPFS_NLS */
259 static long __ncp_ioctl(struct inode
*inode
, unsigned int cmd
, unsigned long arg
)
261 struct ncp_server
*server
= NCP_SERVER(inode
);
263 struct ncp_ioctl_request request
;
265 void __user
*argp
= (void __user
*)arg
;
269 case NCP_IOC_NCPREQUEST_32
:
271 case NCP_IOC_NCPREQUEST
:
273 if (cmd
== NCP_IOC_NCPREQUEST_32
) {
274 struct compat_ncp_ioctl_request request32
;
275 if (copy_from_user(&request32
, argp
, sizeof(request32
)))
277 request
.function
= request32
.function
;
278 request
.size
= request32
.size
;
279 request
.data
= compat_ptr(request32
.data
);
282 if (copy_from_user(&request
, argp
, sizeof(request
)))
285 if ((request
.function
> 255)
287 NCP_PACKET_SIZE
- sizeof(struct ncp_request_header
))) {
290 bouncebuffer
= vmalloc(NCP_PACKET_SIZE_INTERNAL
);
293 if (copy_from_user(bouncebuffer
, request
.data
, request
.size
)) {
297 ncp_lock_server(server
);
299 /* FIXME: We hack around in the server's structures
300 here to be able to use ncp_request */
302 server
->has_subfunction
= 0;
303 server
->current_size
= request
.size
;
304 memcpy(server
->packet
, bouncebuffer
, request
.size
);
306 result
= ncp_request2(server
, request
.function
,
307 bouncebuffer
, NCP_PACKET_SIZE_INTERNAL
);
311 result
= server
->reply_size
;
312 ncp_unlock_server(server
);
313 DPRINTK("ncp_ioctl: copy %d bytes\n",
316 if (copy_to_user(request
.data
, bouncebuffer
, result
))
321 case NCP_IOC_CONN_LOGGED_IN
:
323 if (!(server
->m
.int_flags
& NCP_IMOUNT_LOGGEDIN_POSSIBLE
))
325 mutex_lock(&server
->root_setup_lock
);
326 if (server
->root_setuped
)
329 result
= ncp_conn_logged_in(inode
->i_sb
);
331 server
->root_setuped
= 1;
333 mutex_unlock(&server
->root_setup_lock
);
336 case NCP_IOC_GET_FS_INFO
:
337 return ncp_get_fs_info(server
, inode
, argp
);
339 case NCP_IOC_GET_FS_INFO_V2
:
340 return ncp_get_fs_info_v2(server
, inode
, argp
);
343 case NCP_IOC_GET_FS_INFO_V2_32
:
344 return ncp_get_compat_fs_info_v2(server
, inode
, argp
);
346 /* we have too many combinations of CONFIG_COMPAT,
347 * CONFIG_64BIT and CONFIG_UID16, so just handle
348 * any of the possible ioctls */
349 case NCP_IOC_GETMOUNTUID16
:
353 SET_UID(uid
, server
->m
.mounted_uid
);
354 if (put_user(uid
, (u16 __user
*)argp
))
358 case NCP_IOC_GETMOUNTUID32
:
359 if (put_user(server
->m
.mounted_uid
,
363 case NCP_IOC_GETMOUNTUID64
:
364 if (put_user(server
->m
.mounted_uid
,
369 case NCP_IOC_GETROOT
:
371 struct ncp_setroot_ioctl sr
;
374 mutex_lock(&server
->root_setup_lock
);
375 if (server
->m
.mounted_vol
[0]) {
376 struct dentry
* dentry
= inode
->i_sb
->s_root
;
379 struct inode
* s_inode
= dentry
->d_inode
;
382 sr
.volNumber
= NCP_FINFO(s_inode
)->volNumber
;
383 sr
.dirEntNum
= NCP_FINFO(s_inode
)->dirEntNum
;
384 sr
.namespace = server
->name_space
[sr
.volNumber
];
387 DPRINTK("ncpfs: s_root->d_inode==NULL\n");
389 DPRINTK("ncpfs: s_root==NULL\n");
396 mutex_unlock(&server
->root_setup_lock
);
397 if (!result
&& copy_to_user(argp
, &sr
, sizeof(sr
)))
402 case NCP_IOC_SETROOT
:
404 struct ncp_setroot_ioctl sr
;
408 struct dentry
* dentry
;
410 if (copy_from_user(&sr
, argp
, sizeof(sr
)))
412 mutex_lock(&server
->root_setup_lock
);
413 if (server
->root_setuped
)
416 if (sr
.volNumber
< 0) {
417 server
->m
.mounted_vol
[0] = 0;
418 vnum
= NCP_NUMBER_OF_VOLUMES
;
422 } else if (sr
.volNumber
>= NCP_NUMBER_OF_VOLUMES
) {
424 } else if (ncp_mount_subdir(server
, sr
.volNumber
,
425 sr
.namespace, sr
.dirEntNum
,
426 &vnum
, &de
, &dosde
)) {
432 dentry
= inode
->i_sb
->s_root
;
434 struct inode
* s_inode
= dentry
->d_inode
;
437 NCP_FINFO(s_inode
)->volNumber
= vnum
;
438 NCP_FINFO(s_inode
)->dirEntNum
= de
;
439 NCP_FINFO(s_inode
)->DosDirNum
= dosde
;
440 server
->root_setuped
= 1;
442 DPRINTK("ncpfs: s_root->d_inode==NULL\n");
446 DPRINTK("ncpfs: s_root==NULL\n");
452 mutex_unlock(&server
->root_setup_lock
);
457 #ifdef CONFIG_NCPFS_PACKET_SIGNING
458 case NCP_IOC_SIGN_INIT
:
460 struct ncp_sign_init sign
;
463 if (copy_from_user(&sign
, argp
, sizeof(sign
)))
465 ncp_lock_server(server
);
466 mutex_lock(&server
->rcv
.creq_mutex
);
468 if (server
->sign_wanted
) {
469 memcpy(server
->sign_root
,sign
.sign_root
,8);
470 memcpy(server
->sign_last
,sign
.sign_last
,16);
471 server
->sign_active
= 1;
473 /* ignore when signatures not wanted */
475 server
->sign_active
= 0;
477 mutex_unlock(&server
->rcv
.creq_mutex
);
478 ncp_unlock_server(server
);
482 case NCP_IOC_SIGN_WANTED
:
486 ncp_lock_server(server
);
487 state
= server
->sign_wanted
;
488 ncp_unlock_server(server
);
489 if (put_user(state
, (int __user
*)argp
))
494 case NCP_IOC_SET_SIGN_WANTED
:
498 /* get only low 8 bits... */
499 if (get_user(newstate
, (unsigned char __user
*)argp
))
502 ncp_lock_server(server
);
503 if (server
->sign_active
) {
504 /* cannot turn signatures OFF when active */
508 server
->sign_wanted
= newstate
!= 0;
510 ncp_unlock_server(server
);
514 #endif /* CONFIG_NCPFS_PACKET_SIGNING */
516 #ifdef CONFIG_NCPFS_IOCTL_LOCKING
517 case NCP_IOC_LOCKUNLOCK
:
519 struct ncp_lock_ioctl rqdata
;
521 if (copy_from_user(&rqdata
, argp
, sizeof(rqdata
)))
523 if (rqdata
.origin
!= 0)
526 switch (rqdata
.cmd
) {
529 if (rqdata
.timeout
== 0)
530 rqdata
.timeout
= NCP_LOCK_DEFAULT_TIMEOUT
;
531 else if (rqdata
.timeout
> NCP_LOCK_MAX_TIMEOUT
)
532 rqdata
.timeout
= NCP_LOCK_MAX_TIMEOUT
;
535 rqdata
.timeout
= NCP_LOCK_DEFAULT_TIMEOUT
; /* has no effect */
541 /* locking needs both read and write access */
542 if ((result
= ncp_make_open(inode
, O_RDWR
)) != 0)
547 if (!S_ISREG(inode
->i_mode
))
549 if (rqdata
.cmd
== NCP_LOCK_CLEAR
)
551 result
= ncp_ClearPhysicalRecord(NCP_SERVER(inode
),
552 NCP_FINFO(inode
)->file_handle
,
555 if (result
> 0) result
= 0; /* no such lock */
563 case NCP_LOCK_EX
: lockcmd
=1; break;
564 case NCP_LOCK_SH
: lockcmd
=3; break;
565 default: lockcmd
=0; break;
567 result
= ncp_LogPhysicalRecord(NCP_SERVER(inode
),
568 NCP_FINFO(inode
)->file_handle
,
573 if (result
> 0) result
= -EAGAIN
;
576 ncp_inode_close(inode
);
579 #endif /* CONFIG_NCPFS_IOCTL_LOCKING */
582 case NCP_IOC_GETOBJECTNAME_32
:
584 struct compat_ncp_objectname_ioctl user
;
587 if (copy_from_user(&user
, argp
, sizeof(user
)))
589 down_read(&server
->auth_rwsem
);
590 user
.auth_type
= server
->auth
.auth_type
;
591 outl
= user
.object_name_len
;
592 user
.object_name_len
= server
->auth
.object_name_len
;
593 if (outl
> user
.object_name_len
)
594 outl
= user
.object_name_len
;
597 if (copy_to_user(compat_ptr(user
.object_name
),
598 server
->auth
.object_name
,
602 up_read(&server
->auth_rwsem
);
603 if (!result
&& copy_to_user(argp
, &user
, sizeof(user
)))
609 case NCP_IOC_GETOBJECTNAME
:
611 struct ncp_objectname_ioctl user
;
614 if (copy_from_user(&user
, argp
, sizeof(user
)))
616 down_read(&server
->auth_rwsem
);
617 user
.auth_type
= server
->auth
.auth_type
;
618 outl
= user
.object_name_len
;
619 user
.object_name_len
= server
->auth
.object_name_len
;
620 if (outl
> user
.object_name_len
)
621 outl
= user
.object_name_len
;
624 if (copy_to_user(user
.object_name
,
625 server
->auth
.object_name
,
629 up_read(&server
->auth_rwsem
);
630 if (!result
&& copy_to_user(argp
, &user
, sizeof(user
)))
636 case NCP_IOC_SETOBJECTNAME_32
:
638 case NCP_IOC_SETOBJECTNAME
:
640 struct ncp_objectname_ioctl user
;
645 size_t oldprivatelen
;
648 if (cmd
== NCP_IOC_SETOBJECTNAME_32
) {
649 struct compat_ncp_objectname_ioctl user32
;
650 if (copy_from_user(&user32
, argp
, sizeof(user32
)))
652 user
.auth_type
= user32
.auth_type
;
653 user
.object_name_len
= user32
.object_name_len
;
654 user
.object_name
= compat_ptr(user32
.object_name
);
657 if (copy_from_user(&user
, argp
, sizeof(user
)))
660 if (user
.object_name_len
> NCP_OBJECT_NAME_MAX_LEN
)
662 if (user
.object_name_len
) {
663 newname
= memdup_user(user
.object_name
,
664 user
.object_name_len
);
666 return PTR_ERR(newname
);
670 down_write(&server
->auth_rwsem
);
671 oldname
= server
->auth
.object_name
;
672 oldnamelen
= server
->auth
.object_name_len
;
673 oldprivate
= server
->priv
.data
;
674 oldprivatelen
= server
->priv
.len
;
675 server
->auth
.auth_type
= user
.auth_type
;
676 server
->auth
.object_name_len
= user
.object_name_len
;
677 server
->auth
.object_name
= newname
;
678 server
->priv
.len
= 0;
679 server
->priv
.data
= NULL
;
680 up_write(&server
->auth_rwsem
);
687 case NCP_IOC_GETPRIVATEDATA_32
:
689 case NCP_IOC_GETPRIVATEDATA
:
691 struct ncp_privatedata_ioctl user
;
695 if (cmd
== NCP_IOC_GETPRIVATEDATA_32
) {
696 struct compat_ncp_privatedata_ioctl user32
;
697 if (copy_from_user(&user32
, argp
, sizeof(user32
)))
699 user
.len
= user32
.len
;
700 user
.data
= compat_ptr(user32
.data
);
703 if (copy_from_user(&user
, argp
, sizeof(user
)))
706 down_read(&server
->auth_rwsem
);
708 user
.len
= server
->priv
.len
;
709 if (outl
> user
.len
) outl
= user
.len
;
712 if (copy_to_user(user
.data
,
717 up_read(&server
->auth_rwsem
);
721 if (cmd
== NCP_IOC_GETPRIVATEDATA_32
) {
722 struct compat_ncp_privatedata_ioctl user32
;
723 user32
.len
= user
.len
;
724 user32
.data
= (unsigned long) user
.data
;
725 if (copy_to_user(argp
, &user32
, sizeof(user32
)))
729 if (copy_to_user(argp
, &user
, sizeof(user
)))
736 case NCP_IOC_SETPRIVATEDATA_32
:
738 case NCP_IOC_SETPRIVATEDATA
:
740 struct ncp_privatedata_ioctl user
;
746 if (cmd
== NCP_IOC_SETPRIVATEDATA_32
) {
747 struct compat_ncp_privatedata_ioctl user32
;
748 if (copy_from_user(&user32
, argp
, sizeof(user32
)))
750 user
.len
= user32
.len
;
751 user
.data
= compat_ptr(user32
.data
);
754 if (copy_from_user(&user
, argp
, sizeof(user
)))
757 if (user
.len
> NCP_PRIVATE_DATA_MAX_LEN
)
760 new = memdup_user(user
.data
, user
.len
);
766 down_write(&server
->auth_rwsem
);
767 old
= server
->priv
.data
;
768 oldlen
= server
->priv
.len
;
769 server
->priv
.len
= user
.len
;
770 server
->priv
.data
= new;
771 up_write(&server
->auth_rwsem
);
776 #ifdef CONFIG_NCPFS_NLS
777 case NCP_IOC_SETCHARSETS
:
778 return ncp_set_charsets(server
, argp
);
780 case NCP_IOC_GETCHARSETS
:
781 return ncp_get_charsets(server
, argp
);
783 #endif /* CONFIG_NCPFS_NLS */
785 case NCP_IOC_SETDENTRYTTL
:
789 if (copy_from_user(&user
, argp
, sizeof(user
)))
791 /* 20 secs at most... */
794 user
= (user
* HZ
) / 1000;
795 atomic_set(&server
->dentry_ttl
, user
);
799 case NCP_IOC_GETDENTRYTTL
:
801 u_int32_t user
= (atomic_read(&server
->dentry_ttl
) * 1000) / HZ
;
802 if (copy_to_user(argp
, &user
, sizeof(user
)))
811 long ncp_ioctl(struct file
*filp
, unsigned int cmd
, unsigned long arg
)
813 struct inode
*inode
= filp
->f_dentry
->d_inode
;
814 struct ncp_server
*server
= NCP_SERVER(inode
);
815 uid_t uid
= current_uid();
816 int need_drop_write
= 0;
820 case NCP_IOC_SETCHARSETS
:
821 case NCP_IOC_CONN_LOGGED_IN
:
822 case NCP_IOC_SETROOT
:
823 if (!capable(CAP_SYS_ADMIN
)) {
829 if (server
->m
.mounted_uid
!= uid
) {
832 * Only mount owner can issue these ioctls. Information
833 * necessary to authenticate to other NDS servers are
836 case NCP_IOC_GETOBJECTNAME
:
837 case NCP_IOC_SETOBJECTNAME
:
838 case NCP_IOC_GETPRIVATEDATA
:
839 case NCP_IOC_SETPRIVATEDATA
:
841 case NCP_IOC_GETOBJECTNAME_32
:
842 case NCP_IOC_SETOBJECTNAME_32
:
843 case NCP_IOC_GETPRIVATEDATA_32
:
844 case NCP_IOC_SETPRIVATEDATA_32
:
849 * These require write access on the inode if user id
850 * does not match. Note that they do not write to the
851 * file... But old code did mnt_want_write, so I keep
852 * it as is. Of course not for mountpoint owner, as
853 * that breaks read-only mounts altogether as ncpmount
854 * needs working NCP_IOC_NCPREQUEST and
855 * NCP_IOC_GET_FS_INFO. Some of these codes (setdentryttl,
856 * signinit, setsignwanted) should be probably restricted
857 * to owner only, or even more to CAP_SYS_ADMIN).
859 case NCP_IOC_GET_FS_INFO
:
860 case NCP_IOC_GET_FS_INFO_V2
:
861 case NCP_IOC_NCPREQUEST
:
862 case NCP_IOC_SETDENTRYTTL
:
863 case NCP_IOC_SIGN_INIT
:
864 case NCP_IOC_LOCKUNLOCK
:
865 case NCP_IOC_SET_SIGN_WANTED
:
867 case NCP_IOC_GET_FS_INFO_V2_32
:
868 case NCP_IOC_NCPREQUEST_32
:
870 ret
= mnt_want_write_file(filp
);
874 ret
= inode_permission(inode
, MAY_WRITE
);
879 * Read access required.
881 case NCP_IOC_GETMOUNTUID16
:
882 case NCP_IOC_GETMOUNTUID32
:
883 case NCP_IOC_GETMOUNTUID64
:
884 case NCP_IOC_GETROOT
:
885 case NCP_IOC_SIGN_WANTED
:
886 ret
= inode_permission(inode
, MAY_READ
);
891 * Anybody can read these.
893 case NCP_IOC_GETCHARSETS
:
894 case NCP_IOC_GETDENTRYTTL
:
896 /* Three codes below are protected by CAP_SYS_ADMIN above. */
897 case NCP_IOC_SETCHARSETS
:
898 case NCP_IOC_CONN_LOGGED_IN
:
899 case NCP_IOC_SETROOT
:
903 ret
= __ncp_ioctl(inode
, cmd
, arg
);
906 mnt_drop_write(filp
->f_path
.mnt
);
912 long ncp_compat_ioctl(struct file
*file
, unsigned int cmd
, unsigned long arg
)
916 arg
= (unsigned long) compat_ptr(arg
);
917 ret
= ncp_ioctl(file
, cmd
, arg
);