]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/xfs/xfs_ioctl.c
fs/xfs: Use %pS printk format for direct addresses
[mirror_ubuntu-artful-kernel.git] / fs / xfs / xfs_ioctl.c
CommitLineData
1da177e4 1/*
7b718769
NS
2 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
3 * All Rights Reserved.
1da177e4 4 *
7b718769
NS
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License as
1da177e4
LT
7 * published by the Free Software Foundation.
8 *
7b718769
NS
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
1da177e4 13 *
7b718769
NS
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4 17 */
1da177e4 18#include "xfs.h"
1da177e4 19#include "xfs_fs.h"
70a9883c 20#include "xfs_shared.h"
239880ef
DC
21#include "xfs_format.h"
22#include "xfs_log_format.h"
23#include "xfs_trans_resv.h"
1da177e4 24#include "xfs_mount.h"
1da177e4 25#include "xfs_inode.h"
7bf446f8 26#include "xfs_ioctl.h"
a4fbe6ab 27#include "xfs_alloc.h"
1da177e4 28#include "xfs_rtalloc.h"
1da177e4 29#include "xfs_itable.h"
a844f451 30#include "xfs_error.h"
1da177e4 31#include "xfs_attr.h"
a844f451 32#include "xfs_bmap.h"
68988114 33#include "xfs_bmap_util.h"
1da177e4 34#include "xfs_fsops.h"
a46db608 35#include "xfs_discard.h"
25fe55e8 36#include "xfs_quota.h"
d296d30a 37#include "xfs_export.h"
0b1b213f 38#include "xfs_trace.h"
8ca149de 39#include "xfs_icache.h"
c24b5dfa 40#include "xfs_symlink.h"
a4fbe6ab 41#include "xfs_trans.h"
781355c6 42#include "xfs_pnfs.h"
47e1bf64 43#include "xfs_acl.h"
e89c0413
DW
44#include "xfs_btree.h"
45#include <linux/fsmap.h>
46#include "xfs_fsmap.h"
1da177e4 47
16f7e0fe 48#include <linux/capability.h>
5b825c3a 49#include <linux/cred.h>
1da177e4
LT
50#include <linux/dcache.h>
51#include <linux/mount.h>
52#include <linux/namei.h>
53#include <linux/pagemap.h>
5a0e3ad6 54#include <linux/slab.h>
d296d30a 55#include <linux/exportfs.h>
1da177e4
LT
56
57/*
58 * xfs_find_handle maps from userspace xfs_fsop_handlereq structure to
59 * a file or fs handle.
60 *
61 * XFS_IOC_PATH_TO_FSHANDLE
62 * returns fs handle for a mount point or path within that mount point
63 * XFS_IOC_FD_TO_HANDLE
64 * returns full handle for a FD opened in user space
65 * XFS_IOC_PATH_TO_HANDLE
66 * returns full handle for a path
67 */
d5547f9f 68int
1da177e4
LT
69xfs_find_handle(
70 unsigned int cmd,
743bb465 71 xfs_fsop_handlereq_t *hreq)
1da177e4
LT
72{
73 int hsize;
74 xfs_handle_t handle;
1da177e4 75 struct inode *inode;
a30b0367 76 struct fd f = {NULL};
4346cdd4 77 struct path path;
2903ff01 78 int error;
4346cdd4 79 struct xfs_inode *ip;
1da177e4 80
4346cdd4 81 if (cmd == XFS_IOC_FD_TO_HANDLE) {
2903ff01
AV
82 f = fdget(hreq->fd);
83 if (!f.file)
4346cdd4 84 return -EBADF;
496ad9aa 85 inode = file_inode(f.file);
4346cdd4
CH
86 } else {
87 error = user_lpath((const char __user *)hreq->path, &path);
88 if (error)
89 return error;
2b0143b5 90 inode = d_inode(path.dentry);
1da177e4 91 }
4346cdd4
CH
92 ip = XFS_I(inode);
93
94 /*
95 * We can only generate handles for inodes residing on a XFS filesystem,
96 * and only for regular files, directories or symbolic links.
97 */
98 error = -EINVAL;
99 if (inode->i_sb->s_magic != XFS_SB_MAGIC)
100 goto out_put;
101
102 error = -EBADF;
103 if (!S_ISREG(inode->i_mode) &&
104 !S_ISDIR(inode->i_mode) &&
105 !S_ISLNK(inode->i_mode))
106 goto out_put;
107
108
109 memcpy(&handle.ha_fsid, ip->i_mount->m_fixedfsid, sizeof(xfs_fsid_t));
110
111 if (cmd == XFS_IOC_PATH_TO_FSHANDLE) {
112 /*
113 * This handle only contains an fsid, zero the rest.
114 */
115 memset(&handle.ha_fid, 0, sizeof(handle.ha_fid));
116 hsize = sizeof(xfs_fsid_t);
117 } else {
c6143911
CH
118 handle.ha_fid.fid_len = sizeof(xfs_fid_t) -
119 sizeof(handle.ha_fid.fid_len);
120 handle.ha_fid.fid_pad = 0;
9e9a2674 121 handle.ha_fid.fid_gen = inode->i_generation;
c6143911 122 handle.ha_fid.fid_ino = ip->i_ino;
3398a400 123 hsize = sizeof(xfs_handle_t);
1da177e4
LT
124 }
125
4346cdd4 126 error = -EFAULT;
743bb465 127 if (copy_to_user(hreq->ohandle, &handle, hsize) ||
4346cdd4
CH
128 copy_to_user(hreq->ohandlen, &hsize, sizeof(__s32)))
129 goto out_put;
1da177e4 130
4346cdd4
CH
131 error = 0;
132
133 out_put:
134 if (cmd == XFS_IOC_FD_TO_HANDLE)
2903ff01 135 fdput(f);
4346cdd4
CH
136 else
137 path_put(&path);
138 return error;
1da177e4
LT
139}
140
1da177e4 141/*
d296d30a
CH
142 * No need to do permission checks on the various pathname components
143 * as the handle operations are privileged.
1da177e4
LT
144 */
145STATIC int
d296d30a
CH
146xfs_handle_acceptable(
147 void *context,
148 struct dentry *dentry)
149{
150 return 1;
151}
152
153/*
154 * Convert userspace handle data into a dentry.
155 */
156struct dentry *
157xfs_handle_to_dentry(
158 struct file *parfilp,
159 void __user *uhandle,
160 u32 hlen)
1da177e4 161{
1da177e4 162 xfs_handle_t handle;
d296d30a 163 struct xfs_fid64 fid;
1da177e4
LT
164
165 /*
166 * Only allow handle opens under a directory.
167 */
496ad9aa 168 if (!S_ISDIR(file_inode(parfilp)->i_mode))
d296d30a
CH
169 return ERR_PTR(-ENOTDIR);
170
171 if (hlen != sizeof(xfs_handle_t))
172 return ERR_PTR(-EINVAL);
173 if (copy_from_user(&handle, uhandle, hlen))
174 return ERR_PTR(-EFAULT);
175 if (handle.ha_fid.fid_len !=
176 sizeof(handle.ha_fid) - sizeof(handle.ha_fid.fid_len))
177 return ERR_PTR(-EINVAL);
178
179 memset(&fid, 0, sizeof(struct fid));
180 fid.ino = handle.ha_fid.fid_ino;
181 fid.gen = handle.ha_fid.fid_gen;
182
183 return exportfs_decode_fh(parfilp->f_path.mnt, (struct fid *)&fid, 3,
184 FILEID_INO32_GEN | XFS_FILEID_TYPE_64FLAG,
185 xfs_handle_acceptable, NULL);
186}
1da177e4 187
d296d30a
CH
188STATIC struct dentry *
189xfs_handlereq_to_dentry(
190 struct file *parfilp,
191 xfs_fsop_handlereq_t *hreq)
192{
193 return xfs_handle_to_dentry(parfilp, hreq->ihandle, hreq->ihandlen);
1da177e4
LT
194}
195
d5547f9f 196int
1da177e4 197xfs_open_by_handle(
1da177e4 198 struct file *parfilp,
d296d30a 199 xfs_fsop_handlereq_t *hreq)
1da177e4 200{
745ca247 201 const struct cred *cred = current_cred();
1da177e4 202 int error;
d296d30a 203 int fd;
1da177e4
LT
204 int permflag;
205 struct file *filp;
206 struct inode *inode;
207 struct dentry *dentry;
1a1d7724 208 fmode_t fmode;
765927b2 209 struct path path;
1da177e4
LT
210
211 if (!capable(CAP_SYS_ADMIN))
b474c7ae 212 return -EPERM;
1da177e4 213
d296d30a
CH
214 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
215 if (IS_ERR(dentry))
216 return PTR_ERR(dentry);
2b0143b5 217 inode = d_inode(dentry);
1da177e4
LT
218
219 /* Restrict xfs_open_by_handle to directories & regular files. */
220 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) {
b474c7ae 221 error = -EPERM;
d296d30a 222 goto out_dput;
1da177e4
LT
223 }
224
225#if BITS_PER_LONG != 32
743bb465 226 hreq->oflags |= O_LARGEFILE;
1da177e4 227#endif
d296d30a 228
743bb465 229 permflag = hreq->oflags;
1a1d7724 230 fmode = OPEN_FMODE(permflag);
1da177e4 231 if ((!(permflag & O_APPEND) || (permflag & O_TRUNC)) &&
1a1d7724 232 (fmode & FMODE_WRITE) && IS_APPEND(inode)) {
b474c7ae 233 error = -EPERM;
d296d30a 234 goto out_dput;
1da177e4
LT
235 }
236
1a1d7724 237 if ((fmode & FMODE_WRITE) && IS_IMMUTABLE(inode)) {
337684a1 238 error = -EPERM;
d296d30a 239 goto out_dput;
1da177e4
LT
240 }
241
242 /* Can't write directories. */
1a1d7724 243 if (S_ISDIR(inode->i_mode) && (fmode & FMODE_WRITE)) {
b474c7ae 244 error = -EISDIR;
d296d30a 245 goto out_dput;
1da177e4
LT
246 }
247
862a6293 248 fd = get_unused_fd_flags(0);
d296d30a
CH
249 if (fd < 0) {
250 error = fd;
251 goto out_dput;
1da177e4
LT
252 }
253
765927b2
AV
254 path.mnt = parfilp->f_path.mnt;
255 path.dentry = dentry;
256 filp = dentry_open(&path, hreq->oflags, cred);
257 dput(dentry);
1da177e4 258 if (IS_ERR(filp)) {
d296d30a
CH
259 put_unused_fd(fd);
260 return PTR_ERR(filp);
1da177e4 261 }
4d4be482 262
03209378 263 if (S_ISREG(inode->i_mode)) {
2e2e7bb1 264 filp->f_flags |= O_NOATIME;
4d4be482 265 filp->f_mode |= FMODE_NOCMTIME;
2e2e7bb1 266 }
1da177e4 267
d296d30a
CH
268 fd_install(fd, filp);
269 return fd;
270
271 out_dput:
272 dput(dentry);
273 return error;
1da177e4
LT
274}
275
d5547f9f 276int
1da177e4 277xfs_readlink_by_handle(
d296d30a
CH
278 struct file *parfilp,
279 xfs_fsop_handlereq_t *hreq)
1da177e4 280{
d296d30a 281 struct dentry *dentry;
1da177e4 282 __u32 olen;
804c83c3 283 int error;
1da177e4
LT
284
285 if (!capable(CAP_SYS_ADMIN))
b474c7ae 286 return -EPERM;
1da177e4 287
d296d30a
CH
288 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
289 if (IS_ERR(dentry))
290 return PTR_ERR(dentry);
1da177e4
LT
291
292 /* Restrict this handle operation to symlinks only. */
fd4a0edf 293 if (!d_is_symlink(dentry)) {
b474c7ae 294 error = -EINVAL;
d296d30a 295 goto out_dput;
1da177e4
LT
296 }
297
743bb465 298 if (copy_from_user(&olen, hreq->ohandlen, sizeof(__u32))) {
b474c7ae 299 error = -EFAULT;
d296d30a 300 goto out_dput;
1da177e4 301 }
1da177e4 302
fd4a0edf 303 error = vfs_readlink(dentry, hreq->ohandle, olen);
67fcaa73 304
d296d30a
CH
305 out_dput:
306 dput(dentry);
804c83c3 307 return error;
1da177e4
LT
308}
309
c24b5dfa
DC
310int
311xfs_set_dmattrs(
312 xfs_inode_t *ip,
313 u_int evmask,
314 u_int16_t state)
315{
316 xfs_mount_t *mp = ip->i_mount;
317 xfs_trans_t *tp;
318 int error;
319
320 if (!capable(CAP_SYS_ADMIN))
2451337d 321 return -EPERM;
c24b5dfa
DC
322
323 if (XFS_FORCED_SHUTDOWN(mp))
2451337d 324 return -EIO;
c24b5dfa 325
253f4911
CH
326 error = xfs_trans_alloc(mp, &M_RES(mp)->tr_ichange, 0, 0, 0, &tp);
327 if (error)
c24b5dfa 328 return error;
253f4911 329
c24b5dfa
DC
330 xfs_ilock(ip, XFS_ILOCK_EXCL);
331 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL);
332
333 ip->i_d.di_dmevmask = evmask;
334 ip->i_d.di_dmstate = state;
335
336 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
70393313 337 error = xfs_trans_commit(tp);
c24b5dfa
DC
338
339 return error;
340}
341
1da177e4
LT
342STATIC int
343xfs_fssetdm_by_handle(
d296d30a
CH
344 struct file *parfilp,
345 void __user *arg)
1da177e4
LT
346{
347 int error;
348 struct fsdmidata fsd;
349 xfs_fsop_setdm_handlereq_t dmhreq;
d296d30a 350 struct dentry *dentry;
1da177e4
LT
351
352 if (!capable(CAP_MKNOD))
b474c7ae 353 return -EPERM;
1da177e4 354 if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t)))
b474c7ae 355 return -EFAULT;
1da177e4 356
d9457dc0
JK
357 error = mnt_want_write_file(parfilp);
358 if (error)
359 return error;
360
d296d30a 361 dentry = xfs_handlereq_to_dentry(parfilp, &dmhreq.hreq);
d9457dc0
JK
362 if (IS_ERR(dentry)) {
363 mnt_drop_write_file(parfilp);
d296d30a 364 return PTR_ERR(dentry);
d9457dc0 365 }
1da177e4 366
2b0143b5 367 if (IS_IMMUTABLE(d_inode(dentry)) || IS_APPEND(d_inode(dentry))) {
b474c7ae 368 error = -EPERM;
6e7f75ea 369 goto out;
1da177e4
LT
370 }
371
372 if (copy_from_user(&fsd, dmhreq.data, sizeof(fsd))) {
b474c7ae 373 error = -EFAULT;
6e7f75ea 374 goto out;
1da177e4
LT
375 }
376
2b0143b5 377 error = xfs_set_dmattrs(XFS_I(d_inode(dentry)), fsd.fsd_dmevmask,
6e7f75ea 378 fsd.fsd_dmstate);
1da177e4 379
6e7f75ea 380 out:
d9457dc0 381 mnt_drop_write_file(parfilp);
d296d30a 382 dput(dentry);
6e7f75ea 383 return error;
1da177e4
LT
384}
385
386STATIC int
387xfs_attrlist_by_handle(
d296d30a
CH
388 struct file *parfilp,
389 void __user *arg)
1da177e4 390{
d296d30a 391 int error = -ENOMEM;
1da177e4 392 attrlist_cursor_kern_t *cursor;
0facef7f 393 struct xfs_fsop_attrlist_handlereq __user *p = arg;
1da177e4 394 xfs_fsop_attrlist_handlereq_t al_hreq;
d296d30a 395 struct dentry *dentry;
1da177e4
LT
396 char *kbuf;
397
398 if (!capable(CAP_SYS_ADMIN))
b474c7ae 399 return -EPERM;
1da177e4 400 if (copy_from_user(&al_hreq, arg, sizeof(xfs_fsop_attrlist_handlereq_t)))
b474c7ae 401 return -EFAULT;
071c529e 402 if (al_hreq.buflen < sizeof(struct attrlist) ||
4e247614 403 al_hreq.buflen > XFS_XATTR_LIST_MAX)
b474c7ae 404 return -EINVAL;
1da177e4 405
90ad58a8
CH
406 /*
407 * Reject flags, only allow namespaces.
408 */
409 if (al_hreq.flags & ~(ATTR_ROOT | ATTR_SECURE))
b474c7ae 410 return -EINVAL;
90ad58a8 411
d296d30a
CH
412 dentry = xfs_handlereq_to_dentry(parfilp, &al_hreq.hreq);
413 if (IS_ERR(dentry))
414 return PTR_ERR(dentry);
1da177e4 415
fdd3ccee
DC
416 kbuf = kmem_zalloc_large(al_hreq.buflen, KM_SLEEP);
417 if (!kbuf)
418 goto out_dput;
1da177e4
LT
419
420 cursor = (attrlist_cursor_kern_t *)&al_hreq.pos;
2b0143b5 421 error = xfs_attr_list(XFS_I(d_inode(dentry)), kbuf, al_hreq.buflen,
739bfb2a 422 al_hreq.flags, cursor);
1da177e4
LT
423 if (error)
424 goto out_kfree;
425
0facef7f
DW
426 if (copy_to_user(&p->pos, cursor, sizeof(attrlist_cursor_kern_t))) {
427 error = -EFAULT;
428 goto out_kfree;
429 }
430
1da177e4
LT
431 if (copy_to_user(al_hreq.buffer, kbuf, al_hreq.buflen))
432 error = -EFAULT;
433
fdd3ccee
DC
434out_kfree:
435 kmem_free(kbuf);
436out_dput:
d296d30a
CH
437 dput(dentry);
438 return error;
1da177e4
LT
439}
440
28750975 441int
1da177e4 442xfs_attrmulti_attr_get(
739bfb2a 443 struct inode *inode,
a9273ca5
DC
444 unsigned char *name,
445 unsigned char __user *ubuf,
c8ce540d
DW
446 uint32_t *len,
447 uint32_t flags)
1da177e4 448{
a9273ca5 449 unsigned char *kbuf;
2451337d 450 int error = -EFAULT;
e8b0ebaa 451
51fcbfe7 452 if (*len > XFS_XATTR_SIZE_MAX)
2451337d 453 return -EINVAL;
fdd3ccee
DC
454 kbuf = kmem_zalloc_large(*len, KM_SLEEP);
455 if (!kbuf)
2451337d 456 return -ENOMEM;
1da177e4 457
e8b0ebaa 458 error = xfs_attr_get(XFS_I(inode), name, kbuf, (int *)len, flags);
1da177e4
LT
459 if (error)
460 goto out_kfree;
461
462 if (copy_to_user(ubuf, kbuf, *len))
2451337d 463 error = -EFAULT;
1da177e4 464
fdd3ccee
DC
465out_kfree:
466 kmem_free(kbuf);
1da177e4
LT
467 return error;
468}
469
28750975 470int
1da177e4 471xfs_attrmulti_attr_set(
739bfb2a 472 struct inode *inode,
a9273ca5
DC
473 unsigned char *name,
474 const unsigned char __user *ubuf,
c8ce540d
DW
475 uint32_t len,
476 uint32_t flags)
1da177e4 477{
a9273ca5 478 unsigned char *kbuf;
09cb22d2 479 int error;
1da177e4 480
739bfb2a 481 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 482 return -EPERM;
51fcbfe7 483 if (len > XFS_XATTR_SIZE_MAX)
2451337d 484 return -EINVAL;
1da177e4 485
0e639bde
LZ
486 kbuf = memdup_user(ubuf, len);
487 if (IS_ERR(kbuf))
488 return PTR_ERR(kbuf);
e8b0ebaa 489
09cb22d2 490 error = xfs_attr_set(XFS_I(inode), name, kbuf, len, flags);
47e1bf64
AG
491 if (!error)
492 xfs_forget_acl(inode, name, flags);
09cb22d2
AG
493 kfree(kbuf);
494 return error;
1da177e4
LT
495}
496
28750975 497int
1da177e4 498xfs_attrmulti_attr_remove(
739bfb2a 499 struct inode *inode,
a9273ca5 500 unsigned char *name,
c8ce540d 501 uint32_t flags)
1da177e4 502{
47e1bf64
AG
503 int error;
504
739bfb2a 505 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 506 return -EPERM;
47e1bf64
AG
507 error = xfs_attr_remove(XFS_I(inode), name, flags);
508 if (!error)
509 xfs_forget_acl(inode, name, flags);
510 return error;
1da177e4
LT
511}
512
513STATIC int
514xfs_attrmulti_by_handle(
42a74f20 515 struct file *parfilp,
d296d30a 516 void __user *arg)
1da177e4
LT
517{
518 int error;
519 xfs_attr_multiop_t *ops;
520 xfs_fsop_attrmulti_handlereq_t am_hreq;
d296d30a 521 struct dentry *dentry;
1da177e4 522 unsigned int i, size;
a9273ca5 523 unsigned char *attr_name;
1da177e4
LT
524
525 if (!capable(CAP_SYS_ADMIN))
b474c7ae 526 return -EPERM;
1da177e4 527 if (copy_from_user(&am_hreq, arg, sizeof(xfs_fsop_attrmulti_handlereq_t)))
b474c7ae 528 return -EFAULT;
1da177e4 529
fda168c2
ZW
530 /* overflow check */
531 if (am_hreq.opcount >= INT_MAX / sizeof(xfs_attr_multiop_t))
532 return -E2BIG;
533
d296d30a
CH
534 dentry = xfs_handlereq_to_dentry(parfilp, &am_hreq.hreq);
535 if (IS_ERR(dentry))
536 return PTR_ERR(dentry);
1da177e4 537
2451337d 538 error = -E2BIG;
e182f57a 539 size = am_hreq.opcount * sizeof(xfs_attr_multiop_t);
1da177e4 540 if (!size || size > 16 * PAGE_SIZE)
d296d30a 541 goto out_dput;
1da177e4 542
0e639bde
LZ
543 ops = memdup_user(am_hreq.ops, size);
544 if (IS_ERR(ops)) {
2451337d 545 error = PTR_ERR(ops);
d296d30a 546 goto out_dput;
0e639bde 547 }
1da177e4 548
2451337d 549 error = -ENOMEM;
1da177e4
LT
550 attr_name = kmalloc(MAXNAMELEN, GFP_KERNEL);
551 if (!attr_name)
552 goto out_kfree_ops;
553
1da177e4
LT
554 error = 0;
555 for (i = 0; i < am_hreq.opcount; i++) {
a9273ca5 556 ops[i].am_error = strncpy_from_user((char *)attr_name,
1da177e4
LT
557 ops[i].am_attrname, MAXNAMELEN);
558 if (ops[i].am_error == 0 || ops[i].am_error == MAXNAMELEN)
2451337d 559 error = -ERANGE;
1da177e4
LT
560 if (ops[i].am_error < 0)
561 break;
562
563 switch (ops[i].am_opcode) {
564 case ATTR_OP_GET:
d296d30a 565 ops[i].am_error = xfs_attrmulti_attr_get(
2b0143b5 566 d_inode(dentry), attr_name,
d296d30a
CH
567 ops[i].am_attrvalue, &ops[i].am_length,
568 ops[i].am_flags);
1da177e4
LT
569 break;
570 case ATTR_OP_SET:
a561be71 571 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
572 if (ops[i].am_error)
573 break;
d296d30a 574 ops[i].am_error = xfs_attrmulti_attr_set(
2b0143b5 575 d_inode(dentry), attr_name,
d296d30a
CH
576 ops[i].am_attrvalue, ops[i].am_length,
577 ops[i].am_flags);
2a79f17e 578 mnt_drop_write_file(parfilp);
1da177e4
LT
579 break;
580 case ATTR_OP_REMOVE:
a561be71 581 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
582 if (ops[i].am_error)
583 break;
d296d30a 584 ops[i].am_error = xfs_attrmulti_attr_remove(
2b0143b5 585 d_inode(dentry), attr_name,
d296d30a 586 ops[i].am_flags);
2a79f17e 587 mnt_drop_write_file(parfilp);
1da177e4
LT
588 break;
589 default:
2451337d 590 ops[i].am_error = -EINVAL;
1da177e4
LT
591 }
592 }
593
594 if (copy_to_user(am_hreq.ops, ops, size))
2451337d 595 error = -EFAULT;
1da177e4
LT
596
597 kfree(attr_name);
598 out_kfree_ops:
599 kfree(ops);
d296d30a
CH
600 out_dput:
601 dput(dentry);
2451337d 602 return error;
1da177e4
LT
603}
604
d5547f9f 605int
1da177e4 606xfs_ioc_space(
1da177e4 607 struct file *filp,
1da177e4 608 unsigned int cmd,
743bb465 609 xfs_flock64_t *bf)
1da177e4 610{
8f3e2058
CH
611 struct inode *inode = file_inode(filp);
612 struct xfs_inode *ip = XFS_I(inode);
865e9446 613 struct iattr iattr;
8add71ca 614 enum xfs_prealloc_flags flags = 0;
781355c6 615 uint iolock = XFS_IOLOCK_EXCL;
1da177e4
LT
616 int error;
617
743bb465 618 /*
619 * Only allow the sys admin to reserve space unless
620 * unwritten extents are enabled.
621 */
622 if (!xfs_sb_version_hasextflgbit(&ip->i_mount->m_sb) &&
623 !capable(CAP_SYS_ADMIN))
b474c7ae 624 return -EPERM;
743bb465 625
f37ea149 626 if (inode->i_flags & (S_IMMUTABLE|S_APPEND))
b474c7ae 627 return -EPERM;
1da177e4 628
ad4a8ac4 629 if (!(filp->f_mode & FMODE_WRITE))
b474c7ae 630 return -EBADF;
1da177e4 631
f37ea149 632 if (!S_ISREG(inode->i_mode))
b474c7ae 633 return -EINVAL;
1da177e4 634
8add71ca
CH
635 if (filp->f_flags & O_DSYNC)
636 flags |= XFS_PREALLOC_SYNC;
8f3e2058 637 if (filp->f_mode & FMODE_NOCMTIME)
8add71ca
CH
638 flags |= XFS_PREALLOC_INVISIBLE;
639
d9457dc0
JK
640 error = mnt_want_write_file(filp);
641 if (error)
642 return error;
865e9446 643
781355c6 644 xfs_ilock(ip, iolock);
65523218 645 error = xfs_break_layouts(inode, &iolock);
781355c6
CH
646 if (error)
647 goto out_unlock;
865e9446 648
e8e9ad42
DC
649 xfs_ilock(ip, XFS_MMAPLOCK_EXCL);
650 iolock |= XFS_MMAPLOCK_EXCL;
651
865e9446
CH
652 switch (bf->l_whence) {
653 case 0: /*SEEK_SET*/
654 break;
655 case 1: /*SEEK_CUR*/
656 bf->l_start += filp->f_pos;
657 break;
658 case 2: /*SEEK_END*/
659 bf->l_start += XFS_ISIZE(ip);
660 break;
661 default:
2451337d 662 error = -EINVAL;
865e9446
CH
663 goto out_unlock;
664 }
665
666 /*
667 * length of <= 0 for resv/unresv/zero is invalid. length for
668 * alloc/free is ignored completely and we have no idea what userspace
669 * might have set it to, so set it to zero to allow range
670 * checks to pass.
671 */
672 switch (cmd) {
673 case XFS_IOC_ZERO_RANGE:
674 case XFS_IOC_RESVSP:
675 case XFS_IOC_RESVSP64:
676 case XFS_IOC_UNRESVSP:
677 case XFS_IOC_UNRESVSP64:
678 if (bf->l_len <= 0) {
2451337d 679 error = -EINVAL;
865e9446
CH
680 goto out_unlock;
681 }
682 break;
683 default:
684 bf->l_len = 0;
685 break;
686 }
687
688 if (bf->l_start < 0 ||
8add71ca 689 bf->l_start > inode->i_sb->s_maxbytes ||
865e9446 690 bf->l_start + bf->l_len < 0 ||
8add71ca 691 bf->l_start + bf->l_len >= inode->i_sb->s_maxbytes) {
2451337d 692 error = -EINVAL;
865e9446
CH
693 goto out_unlock;
694 }
695
696 switch (cmd) {
697 case XFS_IOC_ZERO_RANGE:
8add71ca 698 flags |= XFS_PREALLOC_SET;
865e9446 699 error = xfs_zero_file_space(ip, bf->l_start, bf->l_len);
865e9446
CH
700 break;
701 case XFS_IOC_RESVSP:
702 case XFS_IOC_RESVSP64:
8add71ca 703 flags |= XFS_PREALLOC_SET;
865e9446
CH
704 error = xfs_alloc_file_space(ip, bf->l_start, bf->l_len,
705 XFS_BMAPI_PREALLOC);
865e9446
CH
706 break;
707 case XFS_IOC_UNRESVSP:
708 case XFS_IOC_UNRESVSP64:
709 error = xfs_free_file_space(ip, bf->l_start, bf->l_len);
710 break;
711 case XFS_IOC_ALLOCSP:
712 case XFS_IOC_ALLOCSP64:
713 case XFS_IOC_FREESP:
714 case XFS_IOC_FREESP64:
8add71ca 715 flags |= XFS_PREALLOC_CLEAR;
865e9446
CH
716 if (bf->l_start > XFS_ISIZE(ip)) {
717 error = xfs_alloc_file_space(ip, XFS_ISIZE(ip),
718 bf->l_start - XFS_ISIZE(ip), 0);
719 if (error)
720 goto out_unlock;
721 }
722
723 iattr.ia_valid = ATTR_SIZE;
724 iattr.ia_size = bf->l_start;
725
69bca807 726 error = xfs_vn_setattr_size(file_dentry(filp), &iattr);
865e9446
CH
727 break;
728 default:
729 ASSERT(0);
2451337d 730 error = -EINVAL;
865e9446
CH
731 }
732
733 if (error)
734 goto out_unlock;
735
8add71ca 736 error = xfs_update_prealloc_flags(ip, flags);
865e9446
CH
737
738out_unlock:
781355c6 739 xfs_iunlock(ip, iolock);
d9457dc0 740 mnt_drop_write_file(filp);
2451337d 741 return error;
1da177e4
LT
742}
743
744STATIC int
745xfs_ioc_bulkstat(
746 xfs_mount_t *mp,
747 unsigned int cmd,
748 void __user *arg)
749{
750 xfs_fsop_bulkreq_t bulkreq;
751 int count; /* # of records returned */
752 xfs_ino_t inlast; /* last inode number */
753 int done;
754 int error;
755
756 /* done = 1 if there are more stats to get and if bulkstat */
757 /* should be called again (unused here, but used in dmapi) */
758
759 if (!capable(CAP_SYS_ADMIN))
760 return -EPERM;
761
762 if (XFS_FORCED_SHUTDOWN(mp))
b474c7ae 763 return -EIO;
1da177e4
LT
764
765 if (copy_from_user(&bulkreq, arg, sizeof(xfs_fsop_bulkreq_t)))
b474c7ae 766 return -EFAULT;
1da177e4
LT
767
768 if (copy_from_user(&inlast, bulkreq.lastip, sizeof(__s64)))
b474c7ae 769 return -EFAULT;
1da177e4
LT
770
771 if ((count = bulkreq.icount) <= 0)
b474c7ae 772 return -EINVAL;
1da177e4 773
cd57e594 774 if (bulkreq.ubuffer == NULL)
b474c7ae 775 return -EINVAL;
cd57e594 776
1da177e4
LT
777 if (cmd == XFS_IOC_FSINUMBERS)
778 error = xfs_inumbers(mp, &inlast, &count,
faa63e95 779 bulkreq.ubuffer, xfs_inumbers_fmt);
1da177e4 780 else if (cmd == XFS_IOC_FSBULKSTAT_SINGLE)
d716f8ee
CH
781 error = xfs_bulkstat_one(mp, inlast, bulkreq.ubuffer,
782 sizeof(xfs_bstat_t), NULL, &done);
cd57e594 783 else /* XFS_IOC_FSBULKSTAT */
7dce11db
CH
784 error = xfs_bulkstat(mp, &inlast, &count, xfs_bulkstat_one,
785 sizeof(xfs_bstat_t), bulkreq.ubuffer,
786 &done);
1da177e4
LT
787
788 if (error)
2451337d 789 return error;
1da177e4
LT
790
791 if (bulkreq.ocount != NULL) {
792 if (copy_to_user(bulkreq.lastip, &inlast,
793 sizeof(xfs_ino_t)))
b474c7ae 794 return -EFAULT;
1da177e4
LT
795
796 if (copy_to_user(bulkreq.ocount, &count, sizeof(count)))
b474c7ae 797 return -EFAULT;
1da177e4
LT
798 }
799
800 return 0;
801}
802
803STATIC int
804xfs_ioc_fsgeometry_v1(
805 xfs_mount_t *mp,
806 void __user *arg)
807{
eeb2036b 808 xfs_fsop_geom_t fsgeo;
1da177e4
LT
809 int error;
810
eeb2036b 811 error = xfs_fs_geometry(mp, &fsgeo, 3);
1da177e4 812 if (error)
2451337d 813 return error;
1da177e4 814
eeb2036b
AE
815 /*
816 * Caller should have passed an argument of type
817 * xfs_fsop_geom_v1_t. This is a proper subset of the
818 * xfs_fsop_geom_t that xfs_fs_geometry() fills in.
819 */
820 if (copy_to_user(arg, &fsgeo, sizeof(xfs_fsop_geom_v1_t)))
b474c7ae 821 return -EFAULT;
1da177e4
LT
822 return 0;
823}
824
825STATIC int
826xfs_ioc_fsgeometry(
827 xfs_mount_t *mp,
828 void __user *arg)
829{
830 xfs_fsop_geom_t fsgeo;
831 int error;
832
833 error = xfs_fs_geometry(mp, &fsgeo, 4);
834 if (error)
2451337d 835 return error;
1da177e4
LT
836
837 if (copy_to_user(arg, &fsgeo, sizeof(fsgeo)))
b474c7ae 838 return -EFAULT;
1da177e4
LT
839 return 0;
840}
841
842/*
843 * Linux extended inode flags interface.
844 */
1da177e4
LT
845
846STATIC unsigned int
847xfs_merge_ioc_xflags(
848 unsigned int flags,
849 unsigned int start)
850{
851 unsigned int xflags = start;
852
39058a0e 853 if (flags & FS_IMMUTABLE_FL)
e7b89481 854 xflags |= FS_XFLAG_IMMUTABLE;
1da177e4 855 else
e7b89481 856 xflags &= ~FS_XFLAG_IMMUTABLE;
39058a0e 857 if (flags & FS_APPEND_FL)
e7b89481 858 xflags |= FS_XFLAG_APPEND;
1da177e4 859 else
e7b89481 860 xflags &= ~FS_XFLAG_APPEND;
39058a0e 861 if (flags & FS_SYNC_FL)
e7b89481 862 xflags |= FS_XFLAG_SYNC;
1da177e4 863 else
e7b89481 864 xflags &= ~FS_XFLAG_SYNC;
39058a0e 865 if (flags & FS_NOATIME_FL)
e7b89481 866 xflags |= FS_XFLAG_NOATIME;
1da177e4 867 else
e7b89481 868 xflags &= ~FS_XFLAG_NOATIME;
39058a0e 869 if (flags & FS_NODUMP_FL)
e7b89481 870 xflags |= FS_XFLAG_NODUMP;
1da177e4 871 else
e7b89481 872 xflags &= ~FS_XFLAG_NODUMP;
1da177e4
LT
873
874 return xflags;
875}
876
877STATIC unsigned int
878xfs_di2lxflags(
c8ce540d 879 uint16_t di_flags)
1da177e4
LT
880{
881 unsigned int flags = 0;
882
883 if (di_flags & XFS_DIFLAG_IMMUTABLE)
39058a0e 884 flags |= FS_IMMUTABLE_FL;
1da177e4 885 if (di_flags & XFS_DIFLAG_APPEND)
39058a0e 886 flags |= FS_APPEND_FL;
1da177e4 887 if (di_flags & XFS_DIFLAG_SYNC)
39058a0e 888 flags |= FS_SYNC_FL;
1da177e4 889 if (di_flags & XFS_DIFLAG_NOATIME)
39058a0e 890 flags |= FS_NOATIME_FL;
1da177e4 891 if (di_flags & XFS_DIFLAG_NODUMP)
39058a0e 892 flags |= FS_NODUMP_FL;
1da177e4
LT
893 return flags;
894}
895
c83bfab1
CH
896STATIC int
897xfs_ioc_fsgetxattr(
898 xfs_inode_t *ip,
899 int attr,
900 void __user *arg)
901{
902 struct fsxattr fa;
903
a122eb2f
DR
904 memset(&fa, 0, sizeof(struct fsxattr));
905
c83bfab1
CH
906 xfs_ilock(ip, XFS_ILOCK_SHARED);
907 fa.fsx_xflags = xfs_ip2xflags(ip);
908 fa.fsx_extsize = ip->i_d.di_extsize << ip->i_mount->m_sb.sb_blocklog;
f7ca3522
DW
909 fa.fsx_cowextsize = ip->i_d.di_cowextsize <<
910 ip->i_mount->m_sb.sb_blocklog;
6743099c 911 fa.fsx_projid = xfs_get_projid(ip);
c83bfab1
CH
912
913 if (attr) {
914 if (ip->i_afp) {
915 if (ip->i_afp->if_flags & XFS_IFEXTENTS)
5d829300 916 fa.fsx_nextents = xfs_iext_count(ip->i_afp);
c83bfab1
CH
917 else
918 fa.fsx_nextents = ip->i_d.di_anextents;
919 } else
920 fa.fsx_nextents = 0;
921 } else {
922 if (ip->i_df.if_flags & XFS_IFEXTENTS)
5d829300 923 fa.fsx_nextents = xfs_iext_count(&ip->i_df);
c83bfab1
CH
924 else
925 fa.fsx_nextents = ip->i_d.di_nextents;
926 }
927 xfs_iunlock(ip, XFS_ILOCK_SHARED);
928
929 if (copy_to_user(arg, &fa, sizeof(fa)))
930 return -EFAULT;
931 return 0;
932}
933
a11ba10d
CH
934STATIC uint16_t
935xfs_flags2diflags(
25fe55e8
CH
936 struct xfs_inode *ip,
937 unsigned int xflags)
938{
25fe55e8 939 /* can't set PREALLOC this way, just preserve it */
a11ba10d
CH
940 uint16_t di_flags =
941 (ip->i_d.di_flags & XFS_DIFLAG_PREALLOC);
942
e7b89481 943 if (xflags & FS_XFLAG_IMMUTABLE)
25fe55e8 944 di_flags |= XFS_DIFLAG_IMMUTABLE;
e7b89481 945 if (xflags & FS_XFLAG_APPEND)
25fe55e8 946 di_flags |= XFS_DIFLAG_APPEND;
e7b89481 947 if (xflags & FS_XFLAG_SYNC)
25fe55e8 948 di_flags |= XFS_DIFLAG_SYNC;
e7b89481 949 if (xflags & FS_XFLAG_NOATIME)
25fe55e8 950 di_flags |= XFS_DIFLAG_NOATIME;
e7b89481 951 if (xflags & FS_XFLAG_NODUMP)
25fe55e8 952 di_flags |= XFS_DIFLAG_NODUMP;
e7b89481 953 if (xflags & FS_XFLAG_NODEFRAG)
25fe55e8 954 di_flags |= XFS_DIFLAG_NODEFRAG;
e7b89481 955 if (xflags & FS_XFLAG_FILESTREAM)
25fe55e8 956 di_flags |= XFS_DIFLAG_FILESTREAM;
c19b3b05 957 if (S_ISDIR(VFS_I(ip)->i_mode)) {
e7b89481 958 if (xflags & FS_XFLAG_RTINHERIT)
25fe55e8 959 di_flags |= XFS_DIFLAG_RTINHERIT;
e7b89481 960 if (xflags & FS_XFLAG_NOSYMLINKS)
25fe55e8 961 di_flags |= XFS_DIFLAG_NOSYMLINKS;
e7b89481 962 if (xflags & FS_XFLAG_EXTSZINHERIT)
25fe55e8 963 di_flags |= XFS_DIFLAG_EXTSZINHERIT;
e7b89481 964 if (xflags & FS_XFLAG_PROJINHERIT)
9336e3a7 965 di_flags |= XFS_DIFLAG_PROJINHERIT;
c19b3b05 966 } else if (S_ISREG(VFS_I(ip)->i_mode)) {
e7b89481 967 if (xflags & FS_XFLAG_REALTIME)
25fe55e8 968 di_flags |= XFS_DIFLAG_REALTIME;
e7b89481 969 if (xflags & FS_XFLAG_EXTSIZE)
25fe55e8
CH
970 di_flags |= XFS_DIFLAG_EXTSIZE;
971 }
58f88ca2 972
a11ba10d
CH
973 return di_flags;
974}
975
976STATIC uint64_t
977xfs_flags2diflags2(
978 struct xfs_inode *ip,
979 unsigned int xflags)
980{
981 uint64_t di_flags2 =
982 (ip->i_d.di_flags2 & XFS_DIFLAG2_REFLINK);
58f88ca2 983
58f88ca2
DC
984 if (xflags & FS_XFLAG_DAX)
985 di_flags2 |= XFS_DIFLAG2_DAX;
f7ca3522
DW
986 if (xflags & FS_XFLAG_COWEXTSIZE)
987 di_flags2 |= XFS_DIFLAG2_COWEXTSIZE;
58f88ca2 988
a11ba10d 989 return di_flags2;
25fe55e8
CH
990}
991
f13fae2d
CH
992STATIC void
993xfs_diflags_to_linux(
994 struct xfs_inode *ip)
995{
e4f75291 996 struct inode *inode = VFS_I(ip);
f13fae2d
CH
997 unsigned int xflags = xfs_ip2xflags(ip);
998
e7b89481 999 if (xflags & FS_XFLAG_IMMUTABLE)
f13fae2d
CH
1000 inode->i_flags |= S_IMMUTABLE;
1001 else
1002 inode->i_flags &= ~S_IMMUTABLE;
e7b89481 1003 if (xflags & FS_XFLAG_APPEND)
f13fae2d
CH
1004 inode->i_flags |= S_APPEND;
1005 else
1006 inode->i_flags &= ~S_APPEND;
e7b89481 1007 if (xflags & FS_XFLAG_SYNC)
f13fae2d
CH
1008 inode->i_flags |= S_SYNC;
1009 else
1010 inode->i_flags &= ~S_SYNC;
e7b89481 1011 if (xflags & FS_XFLAG_NOATIME)
f13fae2d
CH
1012 inode->i_flags |= S_NOATIME;
1013 else
1014 inode->i_flags &= ~S_NOATIME;
86f908df 1015#if 0 /* disabled until the flag switching races are sorted out */
58f88ca2
DC
1016 if (xflags & FS_XFLAG_DAX)
1017 inode->i_flags |= S_DAX;
1018 else
1019 inode->i_flags &= ~S_DAX;
86f908df 1020#endif
f13fae2d 1021}
25fe55e8 1022
29a17c00
DC
1023static int
1024xfs_ioctl_setattr_xflags(
1025 struct xfs_trans *tp,
1026 struct xfs_inode *ip,
1027 struct fsxattr *fa)
1028{
1029 struct xfs_mount *mp = ip->i_mount;
a11ba10d 1030 uint64_t di_flags2;
29a17c00
DC
1031
1032 /* Can't change realtime flag if any extents are allocated. */
1033 if ((ip->i_d.di_nextents || ip->i_delayed_blks) &&
e7b89481 1034 XFS_IS_REALTIME_INODE(ip) != (fa->fsx_xflags & FS_XFLAG_REALTIME))
29a17c00
DC
1035 return -EINVAL;
1036
1037 /* If realtime flag is set then must have realtime device */
e7b89481 1038 if (fa->fsx_xflags & FS_XFLAG_REALTIME) {
29a17c00
DC
1039 if (mp->m_sb.sb_rblocks == 0 || mp->m_sb.sb_rextsize == 0 ||
1040 (ip->i_d.di_extsize % mp->m_sb.sb_rextsize))
1041 return -EINVAL;
1042 }
1043
1987fd74 1044 /* Clear reflink if we are actually able to set the rt flag. */
c8e156ac 1045 if ((fa->fsx_xflags & FS_XFLAG_REALTIME) && xfs_is_reflink_inode(ip))
1987fd74 1046 ip->i_d.di_flags2 &= ~XFS_DIFLAG2_REFLINK;
c8e156ac 1047
4f435ebe
DW
1048 /* Don't allow us to set DAX mode for a reflinked file for now. */
1049 if ((fa->fsx_xflags & FS_XFLAG_DAX) && xfs_is_reflink_inode(ip))
1050 return -EINVAL;
1051
29a17c00
DC
1052 /*
1053 * Can't modify an immutable/append-only file unless
1054 * we have appropriate permission.
1055 */
1056 if (((ip->i_d.di_flags & (XFS_DIFLAG_IMMUTABLE | XFS_DIFLAG_APPEND)) ||
e7b89481 1057 (fa->fsx_xflags & (FS_XFLAG_IMMUTABLE | FS_XFLAG_APPEND))) &&
29a17c00
DC
1058 !capable(CAP_LINUX_IMMUTABLE))
1059 return -EPERM;
1060
a11ba10d
CH
1061 /* diflags2 only valid for v3 inodes. */
1062 di_flags2 = xfs_flags2diflags2(ip, fa->fsx_xflags);
1063 if (di_flags2 && ip->i_d.di_version < 3)
1064 return -EINVAL;
1065
1066 ip->i_d.di_flags = xfs_flags2diflags(ip, fa->fsx_xflags);
1067 ip->i_d.di_flags2 = di_flags2;
1068
29a17c00
DC
1069 xfs_diflags_to_linux(ip);
1070 xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG);
1071 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
ff6d6af2 1072 XFS_STATS_INC(mp, xs_ig_attrchg);
29a17c00
DC
1073 return 0;
1074}
1075
3a6a854a
DC
1076/*
1077 * If we are changing DAX flags, we have to ensure the file is clean and any
1078 * cached objects in the address space are invalidated and removed. This
1079 * requires us to lock out other IO and page faults similar to a truncate
1080 * operation. The locks need to be held until the transaction has been committed
1081 * so that the cache invalidation is atomic with respect to the DAX flag
1082 * manipulation.
1083 */
1084static int
1085xfs_ioctl_setattr_dax_invalidate(
1086 struct xfs_inode *ip,
1087 struct fsxattr *fa,
1088 int *join_flags)
1089{
1090 struct inode *inode = VFS_I(ip);
2b555d7e 1091 struct super_block *sb = inode->i_sb;
3a6a854a
DC
1092 int error;
1093
1094 *join_flags = 0;
1095
e8897529
DC
1096 /*
1097 * It is only valid to set the DAX flag on regular files and
64485437
DC
1098 * directories on filesystems where the block size is equal to the page
1099 * size. On directories it serves as an inherit hint.
e8897529 1100 */
64485437
DC
1101 if (fa->fsx_xflags & FS_XFLAG_DAX) {
1102 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode)))
1103 return -EINVAL;
2b555d7e 1104 if (bdev_dax_supported(sb, sb->s_blocksize) < 0)
64485437
DC
1105 return -EINVAL;
1106 }
e8897529 1107
3a6a854a
DC
1108 /* If the DAX state is not changing, we have nothing to do here. */
1109 if ((fa->fsx_xflags & FS_XFLAG_DAX) && IS_DAX(inode))
1110 return 0;
1111 if (!(fa->fsx_xflags & FS_XFLAG_DAX) && !IS_DAX(inode))
1112 return 0;
1113
1114 /* lock, flush and invalidate mapping in preparation for flag change */
1115 xfs_ilock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1116 error = filemap_write_and_wait(inode->i_mapping);
1117 if (error)
1118 goto out_unlock;
1119 error = invalidate_inode_pages2(inode->i_mapping);
1120 if (error)
1121 goto out_unlock;
1122
1123 *join_flags = XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL;
29a17c00 1124 return 0;
3a6a854a
DC
1125
1126out_unlock:
1127 xfs_iunlock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1128 return error;
1129
29a17c00
DC
1130}
1131
8f3d17ab
DC
1132/*
1133 * Set up the transaction structure for the setattr operation, checking that we
1134 * have permission to do so. On success, return a clean transaction and the
1135 * inode locked exclusively ready for further operation specific checks. On
1136 * failure, return an error without modifying or locking the inode.
3a6a854a
DC
1137 *
1138 * The inode might already be IO locked on call. If this is the case, it is
1139 * indicated in @join_flags and we take full responsibility for ensuring they
1140 * are unlocked from now on. Hence if we have an error here, we still have to
1141 * unlock them. Otherwise, once they are joined to the transaction, they will
1142 * be unlocked on commit/cancel.
8f3d17ab
DC
1143 */
1144static struct xfs_trans *
1145xfs_ioctl_setattr_get_trans(
3a6a854a
DC
1146 struct xfs_inode *ip,
1147 int join_flags)
8f3d17ab
DC
1148{
1149 struct xfs_mount *mp = ip->i_mount;
1150 struct xfs_trans *tp;
3a6a854a 1151 int error = -EROFS;
8f3d17ab
DC
1152
1153 if (mp->m_flags & XFS_MOUNT_RDONLY)
3a6a854a
DC
1154 goto out_unlock;
1155 error = -EIO;
8f3d17ab 1156 if (XFS_FORCED_SHUTDOWN(mp))
3a6a854a 1157 goto out_unlock;
8f3d17ab 1158
253f4911 1159 error = xfs_trans_alloc(mp, &M_RES(mp)->tr_ichange, 0, 0, 0, &tp);
8f3d17ab 1160 if (error)
253f4911 1161 return ERR_PTR(error);
8f3d17ab
DC
1162
1163 xfs_ilock(ip, XFS_ILOCK_EXCL);
3a6a854a
DC
1164 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL | join_flags);
1165 join_flags = 0;
8f3d17ab
DC
1166
1167 /*
1168 * CAP_FOWNER overrides the following restrictions:
1169 *
1170 * The user ID of the calling process must be equal to the file owner
1171 * ID, except in cases where the CAP_FSETID capability is applicable.
1172 */
1173 if (!inode_owner_or_capable(VFS_I(ip))) {
1174 error = -EPERM;
1175 goto out_cancel;
1176 }
1177
1178 if (mp->m_flags & XFS_MOUNT_WSYNC)
1179 xfs_trans_set_sync(tp);
1180
1181 return tp;
1182
1183out_cancel:
4906e215 1184 xfs_trans_cancel(tp);
3a6a854a
DC
1185out_unlock:
1186 if (join_flags)
1187 xfs_iunlock(ip, join_flags);
8f3d17ab
DC
1188 return ERR_PTR(error);
1189}
1190
9b94fcc3
IP
1191/*
1192 * extent size hint validation is somewhat cumbersome. Rules are:
1193 *
1194 * 1. extent size hint is only valid for directories and regular files
e7b89481
DC
1195 * 2. FS_XFLAG_EXTSIZE is only valid for regular files
1196 * 3. FS_XFLAG_EXTSZINHERIT is only valid for directories.
9b94fcc3
IP
1197 * 4. can only be changed on regular files if no extents are allocated
1198 * 5. can be changed on directories at any time
1199 * 6. extsize hint of 0 turns off hints, clears inode flags.
1200 * 7. Extent size must be a multiple of the appropriate block size.
1201 * 8. for non-realtime files, the extent size hint must be limited
1202 * to half the AG size to avoid alignment extending the extent beyond the
1203 * limits of the AG.
1204 */
f92090e9 1205static int
d4388d3c
DC
1206xfs_ioctl_setattr_check_extsize(
1207 struct xfs_inode *ip,
1208 struct fsxattr *fa)
1209{
1210 struct xfs_mount *mp = ip->i_mount;
1211
c19b3b05 1212 if ((fa->fsx_xflags & FS_XFLAG_EXTSIZE) && !S_ISREG(VFS_I(ip)->i_mode))
9b94fcc3
IP
1213 return -EINVAL;
1214
e7b89481 1215 if ((fa->fsx_xflags & FS_XFLAG_EXTSZINHERIT) &&
c19b3b05 1216 !S_ISDIR(VFS_I(ip)->i_mode))
9b94fcc3
IP
1217 return -EINVAL;
1218
c19b3b05 1219 if (S_ISREG(VFS_I(ip)->i_mode) && ip->i_d.di_nextents &&
d4388d3c
DC
1220 ((ip->i_d.di_extsize << mp->m_sb.sb_blocklog) != fa->fsx_extsize))
1221 return -EINVAL;
1222
d4388d3c
DC
1223 if (fa->fsx_extsize != 0) {
1224 xfs_extlen_t size;
1225 xfs_fsblock_t extsize_fsb;
1226
1227 extsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_extsize);
1228 if (extsize_fsb > MAXEXTLEN)
1229 return -EINVAL;
1230
1231 if (XFS_IS_REALTIME_INODE(ip) ||
e7b89481 1232 (fa->fsx_xflags & FS_XFLAG_REALTIME)) {
d4388d3c
DC
1233 size = mp->m_sb.sb_rextsize << mp->m_sb.sb_blocklog;
1234 } else {
1235 size = mp->m_sb.sb_blocksize;
1236 if (extsize_fsb > mp->m_sb.sb_agblocks / 2)
1237 return -EINVAL;
1238 }
1239
1240 if (fa->fsx_extsize % size)
1241 return -EINVAL;
9b94fcc3 1242 } else
e7b89481 1243 fa->fsx_xflags &= ~(FS_XFLAG_EXTSIZE | FS_XFLAG_EXTSZINHERIT);
9b94fcc3 1244
d4388d3c
DC
1245 return 0;
1246}
1247
f7ca3522
DW
1248/*
1249 * CoW extent size hint validation rules are:
1250 *
1251 * 1. CoW extent size hint can only be set if reflink is enabled on the fs.
1252 * The inode does not have to have any shared blocks, but it must be a v3.
1253 * 2. FS_XFLAG_COWEXTSIZE is only valid for directories and regular files;
1254 * for a directory, the hint is propagated to new files.
1255 * 3. Can be changed on files & directories at any time.
1256 * 4. CoW extsize hint of 0 turns off hints, clears inode flags.
1257 * 5. Extent size must be a multiple of the appropriate block size.
1258 * 6. The extent size hint must be limited to half the AG size to avoid
1259 * alignment extending the extent beyond the limits of the AG.
1260 */
1261static int
1262xfs_ioctl_setattr_check_cowextsize(
1263 struct xfs_inode *ip,
1264 struct fsxattr *fa)
1265{
1266 struct xfs_mount *mp = ip->i_mount;
1267
1268 if (!(fa->fsx_xflags & FS_XFLAG_COWEXTSIZE))
1269 return 0;
1270
1271 if (!xfs_sb_version_hasreflink(&ip->i_mount->m_sb) ||
1272 ip->i_d.di_version != 3)
1273 return -EINVAL;
1274
1275 if (!S_ISREG(VFS_I(ip)->i_mode) && !S_ISDIR(VFS_I(ip)->i_mode))
1276 return -EINVAL;
1277
1278 if (fa->fsx_cowextsize != 0) {
1279 xfs_extlen_t size;
1280 xfs_fsblock_t cowextsize_fsb;
1281
1282 cowextsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_cowextsize);
1283 if (cowextsize_fsb > MAXEXTLEN)
1284 return -EINVAL;
1285
1286 size = mp->m_sb.sb_blocksize;
1287 if (cowextsize_fsb > mp->m_sb.sb_agblocks / 2)
1288 return -EINVAL;
1289
1290 if (fa->fsx_cowextsize % size)
1291 return -EINVAL;
1292 } else
1293 fa->fsx_xflags &= ~FS_XFLAG_COWEXTSIZE;
1294
1295 return 0;
1296}
1297
f92090e9 1298static int
23bd0735
DC
1299xfs_ioctl_setattr_check_projid(
1300 struct xfs_inode *ip,
1301 struct fsxattr *fa)
1302{
1303 /* Disallow 32bit project ids if projid32bit feature is not enabled. */
c8ce540d 1304 if (fa->fsx_projid > (uint16_t)-1 &&
23bd0735
DC
1305 !xfs_sb_version_hasprojid32bit(&ip->i_mount->m_sb))
1306 return -EINVAL;
1307
1308 /*
1309 * Project Quota ID state is only allowed to change from within the init
1310 * namespace. Enforce that restriction only if we are trying to change
1311 * the quota ID state. Everything else is allowed in user namespaces.
1312 */
1313 if (current_user_ns() == &init_user_ns)
1314 return 0;
1315
1316 if (xfs_get_projid(ip) != fa->fsx_projid)
1317 return -EINVAL;
e7b89481 1318 if ((fa->fsx_xflags & FS_XFLAG_PROJINHERIT) !=
23bd0735
DC
1319 (ip->i_d.di_flags & XFS_DIFLAG_PROJINHERIT))
1320 return -EINVAL;
1321
1322 return 0;
1323}
25fe55e8
CH
1324
1325STATIC int
1326xfs_ioctl_setattr(
1327 xfs_inode_t *ip,
fd179b9c 1328 struct fsxattr *fa)
25fe55e8
CH
1329{
1330 struct xfs_mount *mp = ip->i_mount;
1331 struct xfs_trans *tp;
7d095257 1332 struct xfs_dquot *udqp = NULL;
92f8ff73 1333 struct xfs_dquot *pdqp = NULL;
25fe55e8
CH
1334 struct xfs_dquot *olddquot = NULL;
1335 int code;
3a6a854a 1336 int join_flags = 0;
25fe55e8 1337
cca28fb8 1338 trace_xfs_ioctl_setattr(ip);
25fe55e8 1339
23bd0735
DC
1340 code = xfs_ioctl_setattr_check_projid(ip, fa);
1341 if (code)
1342 return code;
23963e54 1343
25fe55e8
CH
1344 /*
1345 * If disk quotas is on, we make sure that the dquots do exist on disk,
1346 * before we start any other transactions. Trying to do this later
1347 * is messy. We don't care to take a readlock to look at the ids
1348 * in inode here, because we can't hold it across the trans_reserve.
1349 * If the IDs do change before we take the ilock, we're covered
1350 * because the i_*dquot fields will get updated anyway.
1351 */
fd179b9c 1352 if (XFS_IS_QUOTA_ON(mp)) {
7d095257 1353 code = xfs_qm_vop_dqalloc(ip, ip->i_d.di_uid,
25fe55e8 1354 ip->i_d.di_gid, fa->fsx_projid,
92f8ff73 1355 XFS_QMOPT_PQUOTA, &udqp, NULL, &pdqp);
25fe55e8
CH
1356 if (code)
1357 return code;
1358 }
1359
3a6a854a
DC
1360 /*
1361 * Changing DAX config may require inode locking for mapping
1362 * invalidation. These need to be held all the way to transaction commit
1363 * or cancel time, so need to be passed through to
1364 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1365 * appropriately.
1366 */
1367 code = xfs_ioctl_setattr_dax_invalidate(ip, fa, &join_flags);
1368 if (code)
1369 goto error_free_dquots;
1370
1371 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
8f3d17ab
DC
1372 if (IS_ERR(tp)) {
1373 code = PTR_ERR(tp);
1374 goto error_free_dquots;
25fe55e8
CH
1375 }
1376
25fe55e8 1377
fd179b9c
DC
1378 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp) &&
1379 xfs_get_projid(ip) != fa->fsx_projid) {
1380 code = xfs_qm_vop_chown_reserve(tp, ip, udqp, NULL, pdqp,
1381 capable(CAP_FOWNER) ? XFS_QMOPT_FORCE_RES : 0);
1382 if (code) /* out of quota */
d4388d3c 1383 goto error_trans_cancel;
25fe55e8
CH
1384 }
1385
d4388d3c
DC
1386 code = xfs_ioctl_setattr_check_extsize(ip, fa);
1387 if (code)
1388 goto error_trans_cancel;
25fe55e8 1389
f7ca3522
DW
1390 code = xfs_ioctl_setattr_check_cowextsize(ip, fa);
1391 if (code)
1392 goto error_trans_cancel;
1393
29a17c00
DC
1394 code = xfs_ioctl_setattr_xflags(tp, ip, fa);
1395 if (code)
d4388d3c 1396 goto error_trans_cancel;
25fe55e8
CH
1397
1398 /*
fd179b9c
DC
1399 * Change file ownership. Must be the owner or privileged. CAP_FSETID
1400 * overrides the following restrictions:
1401 *
1402 * The set-user-ID and set-group-ID bits of a file will be cleared upon
1403 * successful return from chown()
25fe55e8 1404 */
25fe55e8 1405
c19b3b05 1406 if ((VFS_I(ip)->i_mode & (S_ISUID|S_ISGID)) &&
fd179b9c 1407 !capable_wrt_inode_uidgid(VFS_I(ip), CAP_FSETID))
c19b3b05 1408 VFS_I(ip)->i_mode &= ~(S_ISUID|S_ISGID);
25fe55e8 1409
fd179b9c
DC
1410 /* Change the ownerships and register project quota modifications */
1411 if (xfs_get_projid(ip) != fa->fsx_projid) {
1412 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp)) {
1413 olddquot = xfs_qm_vop_chown(tp, ip,
1414 &ip->i_pdquot, pdqp);
1415 }
1416 ASSERT(ip->i_d.di_version > 1);
1417 xfs_set_projid(ip, fa->fsx_projid);
f13fae2d 1418 }
25fe55e8 1419
a872703f
DC
1420 /*
1421 * Only set the extent size hint if we've already determined that the
1422 * extent size hint should be set on the inode. If no extent size flags
1423 * are set on the inode then unconditionally clear the extent size hint.
1424 */
fd179b9c
DC
1425 if (ip->i_d.di_flags & (XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT))
1426 ip->i_d.di_extsize = fa->fsx_extsize >> mp->m_sb.sb_blocklog;
1427 else
1428 ip->i_d.di_extsize = 0;
f7ca3522
DW
1429 if (ip->i_d.di_version == 3 &&
1430 (ip->i_d.di_flags2 & XFS_DIFLAG2_COWEXTSIZE))
1431 ip->i_d.di_cowextsize = fa->fsx_cowextsize >>
1432 mp->m_sb.sb_blocklog;
1433 else
1434 ip->i_d.di_cowextsize = 0;
25fe55e8 1435
70393313 1436 code = xfs_trans_commit(tp);
25fe55e8
CH
1437
1438 /*
1439 * Release any dquot(s) the inode had kept before chown.
1440 */
7d095257
CH
1441 xfs_qm_dqrele(olddquot);
1442 xfs_qm_dqrele(udqp);
92f8ff73 1443 xfs_qm_dqrele(pdqp);
25fe55e8 1444
288699fe 1445 return code;
25fe55e8 1446
d4388d3c 1447error_trans_cancel:
4906e215 1448 xfs_trans_cancel(tp);
8f3d17ab 1449error_free_dquots:
7d095257 1450 xfs_qm_dqrele(udqp);
92f8ff73 1451 xfs_qm_dqrele(pdqp);
25fe55e8
CH
1452 return code;
1453}
1454
1da177e4 1455STATIC int
df26cfe8 1456xfs_ioc_fssetxattr(
1da177e4
LT
1457 xfs_inode_t *ip,
1458 struct file *filp,
1da177e4
LT
1459 void __user *arg)
1460{
1461 struct fsxattr fa;
d9457dc0 1462 int error;
df26cfe8
LM
1463
1464 if (copy_from_user(&fa, arg, sizeof(fa)))
1465 return -EFAULT;
1da177e4 1466
d9457dc0
JK
1467 error = mnt_want_write_file(filp);
1468 if (error)
1469 return error;
fd179b9c 1470 error = xfs_ioctl_setattr(ip, &fa);
d9457dc0 1471 mnt_drop_write_file(filp);
2451337d 1472 return error;
df26cfe8 1473}
1da177e4 1474
df26cfe8
LM
1475STATIC int
1476xfs_ioc_getxflags(
1477 xfs_inode_t *ip,
1478 void __user *arg)
1479{
1480 unsigned int flags;
1da177e4 1481
df26cfe8
LM
1482 flags = xfs_di2lxflags(ip->i_d.di_flags);
1483 if (copy_to_user(arg, &flags, sizeof(flags)))
1484 return -EFAULT;
1485 return 0;
1486}
1da177e4 1487
df26cfe8
LM
1488STATIC int
1489xfs_ioc_setxflags(
f96291f6 1490 struct xfs_inode *ip,
df26cfe8
LM
1491 struct file *filp,
1492 void __user *arg)
1493{
f96291f6 1494 struct xfs_trans *tp;
25fe55e8 1495 struct fsxattr fa;
df26cfe8 1496 unsigned int flags;
3a6a854a 1497 int join_flags = 0;
f96291f6 1498 int error;
1da177e4 1499
df26cfe8
LM
1500 if (copy_from_user(&flags, arg, sizeof(flags)))
1501 return -EFAULT;
1da177e4 1502
df26cfe8
LM
1503 if (flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL | \
1504 FS_NOATIME_FL | FS_NODUMP_FL | \
1505 FS_SYNC_FL))
1506 return -EOPNOTSUPP;
1da177e4 1507
25fe55e8 1508 fa.fsx_xflags = xfs_merge_ioc_xflags(flags, xfs_ip2xflags(ip));
1da177e4 1509
d9457dc0
JK
1510 error = mnt_want_write_file(filp);
1511 if (error)
1512 return error;
f96291f6 1513
3a6a854a
DC
1514 /*
1515 * Changing DAX config may require inode locking for mapping
1516 * invalidation. These need to be held all the way to transaction commit
1517 * or cancel time, so need to be passed through to
1518 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1519 * appropriately.
1520 */
1521 error = xfs_ioctl_setattr_dax_invalidate(ip, &fa, &join_flags);
1522 if (error)
1523 goto out_drop_write;
1524
1525 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
f96291f6
DC
1526 if (IS_ERR(tp)) {
1527 error = PTR_ERR(tp);
1528 goto out_drop_write;
1529 }
1530
1531 error = xfs_ioctl_setattr_xflags(tp, ip, &fa);
1532 if (error) {
4906e215 1533 xfs_trans_cancel(tp);
f96291f6
DC
1534 goto out_drop_write;
1535 }
1536
70393313 1537 error = xfs_trans_commit(tp);
f96291f6 1538out_drop_write:
d9457dc0 1539 mnt_drop_write_file(filp);
2451337d 1540 return error;
1da177e4
LT
1541}
1542
8a7141a8 1543STATIC int
1dbba086 1544xfs_getbmap_format(void **ap, struct getbmapx *bmv)
8a7141a8 1545{
b972d079 1546 struct getbmap __user *base = (struct getbmap __user *)*ap;
8a7141a8
ES
1547
1548 /* copy only getbmap portion (not getbmapx) */
1549 if (copy_to_user(base, bmv, sizeof(struct getbmap)))
2451337d 1550 return -EFAULT;
8a7141a8
ES
1551
1552 *ap += sizeof(struct getbmap);
1553 return 0;
1554}
1555
1da177e4
LT
1556STATIC int
1557xfs_ioc_getbmap(
8f3e2058 1558 struct file *file,
1da177e4
LT
1559 unsigned int cmd,
1560 void __user *arg)
1561{
be6324c0 1562 struct getbmapx bmx = { 0 };
1da177e4
LT
1563 int error;
1564
be6324c0
DW
1565 /* struct getbmap is a strict subset of struct getbmapx. */
1566 if (copy_from_user(&bmx, arg, offsetof(struct getbmapx, bmv_iflags)))
b474c7ae 1567 return -EFAULT;
1da177e4 1568
8a7141a8 1569 if (bmx.bmv_count < 2)
b474c7ae 1570 return -EINVAL;
1da177e4 1571
8a7141a8 1572 bmx.bmv_iflags = (cmd == XFS_IOC_GETBMAPA ? BMV_IF_ATTRFORK : 0);
8f3e2058 1573 if (file->f_mode & FMODE_NOCMTIME)
8a7141a8 1574 bmx.bmv_iflags |= BMV_IF_NO_DMAPI_READ;
1da177e4 1575
8f3e2058 1576 error = xfs_getbmap(XFS_I(file_inode(file)), &bmx, xfs_getbmap_format,
b972d079 1577 (__force struct getbmap *)arg+1);
1da177e4 1578 if (error)
2451337d 1579 return error;
1da177e4 1580
8a7141a8
ES
1581 /* copy back header - only size of getbmap */
1582 if (copy_to_user(arg, &bmx, sizeof(struct getbmap)))
b474c7ae 1583 return -EFAULT;
1da177e4
LT
1584 return 0;
1585}
1586
8a7141a8 1587STATIC int
1dbba086 1588xfs_getbmapx_format(void **ap, struct getbmapx *bmv)
8a7141a8 1589{
b972d079 1590 struct getbmapx __user *base = (struct getbmapx __user *)*ap;
8a7141a8
ES
1591
1592 if (copy_to_user(base, bmv, sizeof(struct getbmapx)))
2451337d 1593 return -EFAULT;
8a7141a8
ES
1594
1595 *ap += sizeof(struct getbmapx);
1596 return 0;
1597}
1598
1da177e4
LT
1599STATIC int
1600xfs_ioc_getbmapx(
993386c1 1601 struct xfs_inode *ip,
1da177e4
LT
1602 void __user *arg)
1603{
1604 struct getbmapx bmx;
1da177e4
LT
1605 int error;
1606
1607 if (copy_from_user(&bmx, arg, sizeof(bmx)))
b474c7ae 1608 return -EFAULT;
1da177e4
LT
1609
1610 if (bmx.bmv_count < 2)
b474c7ae 1611 return -EINVAL;
1da177e4 1612
8a7141a8 1613 if (bmx.bmv_iflags & (~BMV_IF_VALID))
b474c7ae 1614 return -EINVAL;
1da177e4 1615
8a7141a8 1616 error = xfs_getbmap(ip, &bmx, xfs_getbmapx_format,
b972d079 1617 (__force struct getbmapx *)arg+1);
1da177e4 1618 if (error)
2451337d 1619 return error;
1da177e4 1620
8a7141a8
ES
1621 /* copy back header */
1622 if (copy_to_user(arg, &bmx, sizeof(struct getbmapx)))
b474c7ae 1623 return -EFAULT;
1da177e4
LT
1624
1625 return 0;
1626}
df26cfe8 1627
e89c0413
DW
1628struct getfsmap_info {
1629 struct xfs_mount *mp;
9d17e14c
CH
1630 struct fsmap_head __user *data;
1631 unsigned int idx;
e89c0413
DW
1632 __u32 last_flags;
1633};
1634
1635STATIC int
1636xfs_getfsmap_format(struct xfs_fsmap *xfm, void *priv)
1637{
1638 struct getfsmap_info *info = priv;
1639 struct fsmap fm;
1640
1641 trace_xfs_getfsmap_mapping(info->mp, xfm);
1642
1643 info->last_flags = xfm->fmr_flags;
1644 xfs_fsmap_from_internal(&fm, xfm);
9d17e14c
CH
1645 if (copy_to_user(&info->data->fmh_recs[info->idx++], &fm,
1646 sizeof(struct fsmap)))
e89c0413
DW
1647 return -EFAULT;
1648
e89c0413
DW
1649 return 0;
1650}
1651
1652STATIC int
1653xfs_ioc_getfsmap(
1654 struct xfs_inode *ip,
9d17e14c 1655 struct fsmap_head __user *arg)
e89c0413 1656{
ef2b67ec 1657 struct getfsmap_info info = { NULL };
e89c0413
DW
1658 struct xfs_fsmap_head xhead = {0};
1659 struct fsmap_head head;
1660 bool aborted = false;
1661 int error;
1662
1663 if (copy_from_user(&head, arg, sizeof(struct fsmap_head)))
1664 return -EFAULT;
1665 if (memchr_inv(head.fmh_reserved, 0, sizeof(head.fmh_reserved)) ||
1666 memchr_inv(head.fmh_keys[0].fmr_reserved, 0,
1667 sizeof(head.fmh_keys[0].fmr_reserved)) ||
1668 memchr_inv(head.fmh_keys[1].fmr_reserved, 0,
1669 sizeof(head.fmh_keys[1].fmr_reserved)))
1670 return -EINVAL;
1671
1672 xhead.fmh_iflags = head.fmh_iflags;
1673 xhead.fmh_count = head.fmh_count;
1674 xfs_fsmap_to_internal(&xhead.fmh_keys[0], &head.fmh_keys[0]);
1675 xfs_fsmap_to_internal(&xhead.fmh_keys[1], &head.fmh_keys[1]);
1676
1677 trace_xfs_getfsmap_low_key(ip->i_mount, &xhead.fmh_keys[0]);
1678 trace_xfs_getfsmap_high_key(ip->i_mount, &xhead.fmh_keys[1]);
1679
1680 info.mp = ip->i_mount;
9d17e14c 1681 info.data = arg;
e89c0413
DW
1682 error = xfs_getfsmap(ip->i_mount, &xhead, xfs_getfsmap_format, &info);
1683 if (error == XFS_BTREE_QUERY_RANGE_ABORT) {
1684 error = 0;
1685 aborted = true;
1686 } else if (error)
1687 return error;
1688
1689 /* If we didn't abort, set the "last" flag in the last fmx */
12e4a381 1690 if (!aborted && info.idx) {
e89c0413 1691 info.last_flags |= FMR_OF_LAST;
9d17e14c
CH
1692 if (copy_to_user(&info.data->fmh_recs[info.idx - 1].fmr_flags,
1693 &info.last_flags, sizeof(info.last_flags)))
e89c0413
DW
1694 return -EFAULT;
1695 }
1696
1697 /* copy back header */
1698 head.fmh_entries = xhead.fmh_entries;
1699 head.fmh_oflags = xhead.fmh_oflags;
1700 if (copy_to_user(arg, &head, sizeof(struct fsmap_head)))
1701 return -EFAULT;
1702
1703 return 0;
1704}
1705
a133d952
DC
1706int
1707xfs_ioc_swapext(
1708 xfs_swapext_t *sxp)
1709{
1710 xfs_inode_t *ip, *tip;
1711 struct fd f, tmp;
1712 int error = 0;
1713
1714 /* Pull information for the target fd */
1715 f = fdget((int)sxp->sx_fdtarget);
1716 if (!f.file) {
2451337d 1717 error = -EINVAL;
a133d952
DC
1718 goto out;
1719 }
1720
1721 if (!(f.file->f_mode & FMODE_WRITE) ||
1722 !(f.file->f_mode & FMODE_READ) ||
1723 (f.file->f_flags & O_APPEND)) {
2451337d 1724 error = -EBADF;
a133d952
DC
1725 goto out_put_file;
1726 }
1727
1728 tmp = fdget((int)sxp->sx_fdtmp);
1729 if (!tmp.file) {
2451337d 1730 error = -EINVAL;
a133d952
DC
1731 goto out_put_file;
1732 }
1733
1734 if (!(tmp.file->f_mode & FMODE_WRITE) ||
1735 !(tmp.file->f_mode & FMODE_READ) ||
1736 (tmp.file->f_flags & O_APPEND)) {
2451337d 1737 error = -EBADF;
a133d952
DC
1738 goto out_put_tmp_file;
1739 }
1740
1741 if (IS_SWAPFILE(file_inode(f.file)) ||
1742 IS_SWAPFILE(file_inode(tmp.file))) {
2451337d 1743 error = -EINVAL;
a133d952
DC
1744 goto out_put_tmp_file;
1745 }
1746
7f1b6245
JH
1747 /*
1748 * We need to ensure that the fds passed in point to XFS inodes
1749 * before we cast and access them as XFS structures as we have no
1750 * control over what the user passes us here.
1751 */
1752 if (f.file->f_op != &xfs_file_operations ||
1753 tmp.file->f_op != &xfs_file_operations) {
1754 error = -EINVAL;
1755 goto out_put_tmp_file;
1756 }
1757
a133d952
DC
1758 ip = XFS_I(file_inode(f.file));
1759 tip = XFS_I(file_inode(tmp.file));
1760
1761 if (ip->i_mount != tip->i_mount) {
2451337d 1762 error = -EINVAL;
a133d952
DC
1763 goto out_put_tmp_file;
1764 }
1765
1766 if (ip->i_ino == tip->i_ino) {
2451337d 1767 error = -EINVAL;
a133d952
DC
1768 goto out_put_tmp_file;
1769 }
1770
1771 if (XFS_FORCED_SHUTDOWN(ip->i_mount)) {
2451337d 1772 error = -EIO;
a133d952
DC
1773 goto out_put_tmp_file;
1774 }
1775
1776 error = xfs_swap_extents(ip, tip, sxp);
1777
1778 out_put_tmp_file:
1779 fdput(tmp);
1780 out_put_file:
1781 fdput(f);
1782 out:
1783 return error;
1784}
1785
4d4be482
CH
1786/*
1787 * Note: some of the ioctl's return positive numbers as a
1788 * byte count indicating success, such as readlink_by_handle.
1789 * So we don't "sign flip" like most other routines. This means
1790 * true errors need to be returned as a negative value.
1791 */
1792long
1793xfs_file_ioctl(
df26cfe8 1794 struct file *filp,
df26cfe8 1795 unsigned int cmd,
4d4be482 1796 unsigned long p)
df26cfe8 1797{
496ad9aa 1798 struct inode *inode = file_inode(filp);
4d4be482
CH
1799 struct xfs_inode *ip = XFS_I(inode);
1800 struct xfs_mount *mp = ip->i_mount;
1801 void __user *arg = (void __user *)p;
df26cfe8
LM
1802 int error;
1803
cca28fb8 1804 trace_xfs_file_ioctl(ip);
4d4be482
CH
1805
1806 switch (cmd) {
a46db608
CH
1807 case FITRIM:
1808 return xfs_ioc_trim(mp, arg);
df26cfe8
LM
1809 case XFS_IOC_ALLOCSP:
1810 case XFS_IOC_FREESP:
1811 case XFS_IOC_RESVSP:
1812 case XFS_IOC_UNRESVSP:
1813 case XFS_IOC_ALLOCSP64:
1814 case XFS_IOC_FREESP64:
1815 case XFS_IOC_RESVSP64:
44722352
DC
1816 case XFS_IOC_UNRESVSP64:
1817 case XFS_IOC_ZERO_RANGE: {
743bb465 1818 xfs_flock64_t bf;
df26cfe8 1819
743bb465 1820 if (copy_from_user(&bf, arg, sizeof(bf)))
b474c7ae 1821 return -EFAULT;
8f3e2058 1822 return xfs_ioc_space(filp, cmd, &bf);
743bb465 1823 }
df26cfe8
LM
1824 case XFS_IOC_DIOINFO: {
1825 struct dioattr da;
1826 xfs_buftarg_t *target =
1827 XFS_IS_REALTIME_INODE(ip) ?
1828 mp->m_rtdev_targp : mp->m_ddev_targp;
1829
7c71ee78 1830 da.d_mem = da.d_miniosz = target->bt_logical_sectorsize;
df26cfe8
LM
1831 da.d_maxiosz = INT_MAX & ~(da.d_miniosz - 1);
1832
1833 if (copy_to_user(arg, &da, sizeof(da)))
b474c7ae 1834 return -EFAULT;
df26cfe8
LM
1835 return 0;
1836 }
1837
1838 case XFS_IOC_FSBULKSTAT_SINGLE:
1839 case XFS_IOC_FSBULKSTAT:
1840 case XFS_IOC_FSINUMBERS:
1841 return xfs_ioc_bulkstat(mp, cmd, arg);
1842
1843 case XFS_IOC_FSGEOMETRY_V1:
1844 return xfs_ioc_fsgeometry_v1(mp, arg);
1845
1846 case XFS_IOC_FSGEOMETRY:
1847 return xfs_ioc_fsgeometry(mp, arg);
1848
1849 case XFS_IOC_GETVERSION:
1850 return put_user(inode->i_generation, (int __user *)arg);
1851
1852 case XFS_IOC_FSGETXATTR:
1853 return xfs_ioc_fsgetxattr(ip, 0, arg);
1854 case XFS_IOC_FSGETXATTRA:
1855 return xfs_ioc_fsgetxattr(ip, 1, arg);
65e67f51
LM
1856 case XFS_IOC_FSSETXATTR:
1857 return xfs_ioc_fssetxattr(ip, filp, arg);
df26cfe8 1858 case XFS_IOC_GETXFLAGS:
65e67f51 1859 return xfs_ioc_getxflags(ip, arg);
df26cfe8 1860 case XFS_IOC_SETXFLAGS:
65e67f51 1861 return xfs_ioc_setxflags(ip, filp, arg);
df26cfe8
LM
1862
1863 case XFS_IOC_FSSETDM: {
1864 struct fsdmidata dmi;
1865
1866 if (copy_from_user(&dmi, arg, sizeof(dmi)))
b474c7ae 1867 return -EFAULT;
df26cfe8 1868
d9457dc0
JK
1869 error = mnt_want_write_file(filp);
1870 if (error)
1871 return error;
1872
df26cfe8
LM
1873 error = xfs_set_dmattrs(ip, dmi.fsd_dmevmask,
1874 dmi.fsd_dmstate);
d9457dc0 1875 mnt_drop_write_file(filp);
2451337d 1876 return error;
df26cfe8
LM
1877 }
1878
1879 case XFS_IOC_GETBMAP:
1880 case XFS_IOC_GETBMAPA:
8f3e2058 1881 return xfs_ioc_getbmap(filp, cmd, arg);
df26cfe8
LM
1882
1883 case XFS_IOC_GETBMAPX:
1884 return xfs_ioc_getbmapx(ip, arg);
1885
e89c0413
DW
1886 case FS_IOC_GETFSMAP:
1887 return xfs_ioc_getfsmap(ip, arg);
1888
df26cfe8
LM
1889 case XFS_IOC_FD_TO_HANDLE:
1890 case XFS_IOC_PATH_TO_HANDLE:
743bb465 1891 case XFS_IOC_PATH_TO_FSHANDLE: {
1892 xfs_fsop_handlereq_t hreq;
df26cfe8 1893
743bb465 1894 if (copy_from_user(&hreq, arg, sizeof(hreq)))
b474c7ae 1895 return -EFAULT;
743bb465 1896 return xfs_find_handle(cmd, &hreq);
1897 }
1898 case XFS_IOC_OPEN_BY_HANDLE: {
1899 xfs_fsop_handlereq_t hreq;
df26cfe8 1900
743bb465 1901 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1902 return -EFAULT;
d296d30a 1903 return xfs_open_by_handle(filp, &hreq);
743bb465 1904 }
df26cfe8 1905 case XFS_IOC_FSSETDM_BY_HANDLE:
d296d30a 1906 return xfs_fssetdm_by_handle(filp, arg);
df26cfe8 1907
743bb465 1908 case XFS_IOC_READLINK_BY_HANDLE: {
1909 xfs_fsop_handlereq_t hreq;
df26cfe8 1910
743bb465 1911 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1912 return -EFAULT;
d296d30a 1913 return xfs_readlink_by_handle(filp, &hreq);
743bb465 1914 }
df26cfe8 1915 case XFS_IOC_ATTRLIST_BY_HANDLE:
d296d30a 1916 return xfs_attrlist_by_handle(filp, arg);
df26cfe8
LM
1917
1918 case XFS_IOC_ATTRMULTI_BY_HANDLE:
d296d30a 1919 return xfs_attrmulti_by_handle(filp, arg);
df26cfe8
LM
1920
1921 case XFS_IOC_SWAPEXT: {
743bb465 1922 struct xfs_swapext sxp;
1923
1924 if (copy_from_user(&sxp, arg, sizeof(xfs_swapext_t)))
b474c7ae 1925 return -EFAULT;
d9457dc0
JK
1926 error = mnt_want_write_file(filp);
1927 if (error)
1928 return error;
a133d952 1929 error = xfs_ioc_swapext(&sxp);
d9457dc0 1930 mnt_drop_write_file(filp);
2451337d 1931 return error;
df26cfe8
LM
1932 }
1933
1934 case XFS_IOC_FSCOUNTS: {
1935 xfs_fsop_counts_t out;
1936
1937 error = xfs_fs_counts(mp, &out);
1938 if (error)
2451337d 1939 return error;
df26cfe8
LM
1940
1941 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1942 return -EFAULT;
df26cfe8
LM
1943 return 0;
1944 }
1945
1946 case XFS_IOC_SET_RESBLKS: {
1947 xfs_fsop_resblks_t inout;
c8ce540d 1948 uint64_t in;
df26cfe8
LM
1949
1950 if (!capable(CAP_SYS_ADMIN))
1951 return -EPERM;
1952
d5db0f97 1953 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 1954 return -EROFS;
d5db0f97 1955
df26cfe8 1956 if (copy_from_user(&inout, arg, sizeof(inout)))
b474c7ae 1957 return -EFAULT;
df26cfe8 1958
d9457dc0
JK
1959 error = mnt_want_write_file(filp);
1960 if (error)
1961 return error;
1962
df26cfe8
LM
1963 /* input parameter is passed in resblks field of structure */
1964 in = inout.resblks;
1965 error = xfs_reserve_blocks(mp, &in, &inout);
d9457dc0 1966 mnt_drop_write_file(filp);
df26cfe8 1967 if (error)
2451337d 1968 return error;
df26cfe8
LM
1969
1970 if (copy_to_user(arg, &inout, sizeof(inout)))
b474c7ae 1971 return -EFAULT;
df26cfe8
LM
1972 return 0;
1973 }
1974
1975 case XFS_IOC_GET_RESBLKS: {
1976 xfs_fsop_resblks_t out;
1977
1978 if (!capable(CAP_SYS_ADMIN))
1979 return -EPERM;
1980
1981 error = xfs_reserve_blocks(mp, NULL, &out);
1982 if (error)
2451337d 1983 return error;
df26cfe8
LM
1984
1985 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1986 return -EFAULT;
df26cfe8
LM
1987
1988 return 0;
1989 }
1990
1991 case XFS_IOC_FSGROWFSDATA: {
1992 xfs_growfs_data_t in;
1993
df26cfe8 1994 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1995 return -EFAULT;
df26cfe8 1996
d9457dc0
JK
1997 error = mnt_want_write_file(filp);
1998 if (error)
1999 return error;
df26cfe8 2000 error = xfs_growfs_data(mp, &in);
d9457dc0 2001 mnt_drop_write_file(filp);
2451337d 2002 return error;
df26cfe8
LM
2003 }
2004
2005 case XFS_IOC_FSGROWFSLOG: {
2006 xfs_growfs_log_t in;
2007
df26cfe8 2008 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2009 return -EFAULT;
df26cfe8 2010
d9457dc0
JK
2011 error = mnt_want_write_file(filp);
2012 if (error)
2013 return error;
df26cfe8 2014 error = xfs_growfs_log(mp, &in);
d9457dc0 2015 mnt_drop_write_file(filp);
2451337d 2016 return error;
df26cfe8
LM
2017 }
2018
2019 case XFS_IOC_FSGROWFSRT: {
2020 xfs_growfs_rt_t in;
2021
df26cfe8 2022 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2023 return -EFAULT;
df26cfe8 2024
d9457dc0
JK
2025 error = mnt_want_write_file(filp);
2026 if (error)
2027 return error;
df26cfe8 2028 error = xfs_growfs_rt(mp, &in);
d9457dc0 2029 mnt_drop_write_file(filp);
2451337d 2030 return error;
df26cfe8
LM
2031 }
2032
df26cfe8 2033 case XFS_IOC_GOINGDOWN: {
c8ce540d 2034 uint32_t in;
df26cfe8
LM
2035
2036 if (!capable(CAP_SYS_ADMIN))
2037 return -EPERM;
2038
c8ce540d 2039 if (get_user(in, (uint32_t __user *)arg))
b474c7ae 2040 return -EFAULT;
df26cfe8 2041
2451337d 2042 return xfs_fs_goingdown(mp, in);
df26cfe8
LM
2043 }
2044
2045 case XFS_IOC_ERROR_INJECTION: {
2046 xfs_error_injection_t in;
2047
2048 if (!capable(CAP_SYS_ADMIN))
2049 return -EPERM;
2050
2051 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2052 return -EFAULT;
df26cfe8 2053
31965ef3 2054 return xfs_errortag_add(mp, in.errtag);
df26cfe8
LM
2055 }
2056
2057 case XFS_IOC_ERROR_CLEARALL:
2058 if (!capable(CAP_SYS_ADMIN))
2059 return -EPERM;
2060
31965ef3 2061 return xfs_errortag_clearall(mp);
df26cfe8 2062
8ca149de 2063 case XFS_IOC_FREE_EOFBLOCKS: {
b9fe5052
DE
2064 struct xfs_fs_eofblocks eofb;
2065 struct xfs_eofblocks keofb;
8ca149de 2066
8c567a7f
DE
2067 if (!capable(CAP_SYS_ADMIN))
2068 return -EPERM;
2069
2070 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 2071 return -EROFS;
8c567a7f 2072
8ca149de 2073 if (copy_from_user(&eofb, arg, sizeof(eofb)))
b474c7ae 2074 return -EFAULT;
8ca149de 2075
b9fe5052
DE
2076 error = xfs_fs_eofblocks_from_user(&eofb, &keofb);
2077 if (error)
2451337d 2078 return error;
8ca149de 2079
2451337d 2080 return xfs_icache_free_eofblocks(mp, &keofb);
8ca149de
BF
2081 }
2082
df26cfe8
LM
2083 default:
2084 return -ENOTTY;
2085 }
2086}