On 10.07.20 г. 13:05 ч., David Sterba wrote: > User Forza reported on IRC that some invalid combinations of file > attributes are accepted by chattr. > > The NODATACOW and compression file flags/attributes are mutually > exclusive, but they could be set by 'chattr +c +C' on an empty file. The > nodatacow will be in effect because it's checked first in > btrfs_run_delalloc_range. > > Extend the flag validation to catch the following cases: > > - input flags are conflicting > - old and new flags are conflicting > - initialize the local variable with inode flags after inode ls locked > > CC: stable@xxxxxxxxxxxxxxx # 4.4+ > Signed-off-by: David Sterba <dsterba@xxxxxxxx> > --- > fs/btrfs/ioctl.c | 30 ++++++++++++++++++++++-------- > 1 file changed, 22 insertions(+), 8 deletions(-) > > diff --git a/fs/btrfs/ioctl.c b/fs/btrfs/ioctl.c > index 3a566cf71fc6..0c13bb38425b 100644 > --- a/fs/btrfs/ioctl.c > +++ b/fs/btrfs/ioctl.c > @@ -164,8 +164,11 @@ static int btrfs_ioctl_getflags(struct file *file, void __user *arg) > return 0; > } > > -/* Check if @flags are a supported and valid set of FS_*_FL flags */ > -static int check_fsflags(unsigned int flags) > +/* > + * Check if @flags are a supported and valid set of FS_*_FL flags and that > + * the old and new flags are not conflicting > + */ > +static int check_fsflags(unsigned int old_flags, unsigned int flags) > { > if (flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL | \ > FS_NOATIME_FL | FS_NODUMP_FL | \ > @@ -174,9 +177,19 @@ static int check_fsflags(unsigned int flags) > FS_NOCOW_FL)) > return -EOPNOTSUPP; > > + /* COMPR and NOCOMP on new/old are valid */ > if ((flags & FS_NOCOMP_FL) && (flags & FS_COMPR_FL)) > return -EINVAL; > > + if ((flags & FS_COMPR_FL) && (flags & FS_NOCOW_FL)) > + return -EINVAL; > + > + /* NOCOW and compression options are mutually exclusive */ > + if ((old_flags & FS_NOCOW_FL) && (flags & (FS_COMPR_FL | FS_NOCOMP_FL))) Why is NOCOW and setting NOCOMP (which would really be a NOOP) an invalid combination? > + return -EINVAL; > + if ((flags & FS_NOCOW_FL) && (old_flags & (FS_COMPR_FL | FS_NOCOMP_FL))) > + return -EINVAL; Same thing here, just inverted? > + > return 0; > } > > @@ -190,7 +203,7 @@ static int btrfs_ioctl_setflags(struct file *file, void __user *arg) > unsigned int fsflags, old_fsflags; > int ret; > const char *comp = NULL; > - u32 binode_flags = binode->flags; > + u32 binode_flags; > > if (!inode_owner_or_capable(inode)) > return -EPERM; > @@ -201,22 +214,23 @@ static int btrfs_ioctl_setflags(struct file *file, void __user *arg) > if (copy_from_user(&fsflags, arg, sizeof(fsflags))) > return -EFAULT; > > - ret = check_fsflags(fsflags); > - if (ret) > - return ret; > - > ret = mnt_want_write_file(file); > if (ret) > return ret; > > inode_lock(inode); > - > fsflags = btrfs_mask_fsflags_for_type(inode, fsflags); > old_fsflags = btrfs_inode_flags_to_fsflags(binode->flags); > + > ret = vfs_ioc_setflags_prepare(inode, old_fsflags, fsflags); > if (ret) > goto out_unlock; > > + ret = check_fsflags(old_fsflags, fsflags); > + if (ret) > + goto out_unlock; > + > + binode_flags = binode->flags; > if (fsflags & FS_SYNC_FL) > binode_flags |= BTRFS_INODE_SYNC; > else >