]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/xfs/xfs_ioctl.c
Merge tag 'efi-urgent' of git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi into...
[mirror_ubuntu-artful-kernel.git] / fs / xfs / xfs_ioctl.c
CommitLineData
1da177e4 1/*
7b718769
NS
2 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
3 * All Rights Reserved.
1da177e4 4 *
7b718769
NS
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License as
1da177e4
LT
7 * published by the Free Software Foundation.
8 *
7b718769
NS
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
1da177e4 13 *
7b718769
NS
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4 17 */
1da177e4 18#include "xfs.h"
1da177e4 19#include "xfs_fs.h"
70a9883c 20#include "xfs_shared.h"
239880ef
DC
21#include "xfs_format.h"
22#include "xfs_log_format.h"
23#include "xfs_trans_resv.h"
1da177e4 24#include "xfs_mount.h"
1da177e4 25#include "xfs_inode.h"
7bf446f8 26#include "xfs_ioctl.h"
a4fbe6ab 27#include "xfs_alloc.h"
1da177e4 28#include "xfs_rtalloc.h"
1da177e4 29#include "xfs_itable.h"
a844f451 30#include "xfs_error.h"
1da177e4 31#include "xfs_attr.h"
a844f451 32#include "xfs_bmap.h"
68988114 33#include "xfs_bmap_util.h"
1da177e4 34#include "xfs_fsops.h"
a46db608 35#include "xfs_discard.h"
25fe55e8 36#include "xfs_quota.h"
d296d30a 37#include "xfs_export.h"
0b1b213f 38#include "xfs_trace.h"
8ca149de 39#include "xfs_icache.h"
c24b5dfa 40#include "xfs_symlink.h"
a4fbe6ab 41#include "xfs_trans.h"
781355c6 42#include "xfs_pnfs.h"
47e1bf64 43#include "xfs_acl.h"
1da177e4 44
16f7e0fe 45#include <linux/capability.h>
5b825c3a 46#include <linux/cred.h>
1da177e4
LT
47#include <linux/dcache.h>
48#include <linux/mount.h>
49#include <linux/namei.h>
50#include <linux/pagemap.h>
5a0e3ad6 51#include <linux/slab.h>
d296d30a 52#include <linux/exportfs.h>
1da177e4
LT
53
54/*
55 * xfs_find_handle maps from userspace xfs_fsop_handlereq structure to
56 * a file or fs handle.
57 *
58 * XFS_IOC_PATH_TO_FSHANDLE
59 * returns fs handle for a mount point or path within that mount point
60 * XFS_IOC_FD_TO_HANDLE
61 * returns full handle for a FD opened in user space
62 * XFS_IOC_PATH_TO_HANDLE
63 * returns full handle for a path
64 */
d5547f9f 65int
1da177e4
LT
66xfs_find_handle(
67 unsigned int cmd,
743bb465 68 xfs_fsop_handlereq_t *hreq)
1da177e4
LT
69{
70 int hsize;
71 xfs_handle_t handle;
1da177e4 72 struct inode *inode;
a30b0367 73 struct fd f = {NULL};
4346cdd4 74 struct path path;
2903ff01 75 int error;
4346cdd4 76 struct xfs_inode *ip;
1da177e4 77
4346cdd4 78 if (cmd == XFS_IOC_FD_TO_HANDLE) {
2903ff01
AV
79 f = fdget(hreq->fd);
80 if (!f.file)
4346cdd4 81 return -EBADF;
496ad9aa 82 inode = file_inode(f.file);
4346cdd4
CH
83 } else {
84 error = user_lpath((const char __user *)hreq->path, &path);
85 if (error)
86 return error;
2b0143b5 87 inode = d_inode(path.dentry);
1da177e4 88 }
4346cdd4
CH
89 ip = XFS_I(inode);
90
91 /*
92 * We can only generate handles for inodes residing on a XFS filesystem,
93 * and only for regular files, directories or symbolic links.
94 */
95 error = -EINVAL;
96 if (inode->i_sb->s_magic != XFS_SB_MAGIC)
97 goto out_put;
98
99 error = -EBADF;
100 if (!S_ISREG(inode->i_mode) &&
101 !S_ISDIR(inode->i_mode) &&
102 !S_ISLNK(inode->i_mode))
103 goto out_put;
104
105
106 memcpy(&handle.ha_fsid, ip->i_mount->m_fixedfsid, sizeof(xfs_fsid_t));
107
108 if (cmd == XFS_IOC_PATH_TO_FSHANDLE) {
109 /*
110 * This handle only contains an fsid, zero the rest.
111 */
112 memset(&handle.ha_fid, 0, sizeof(handle.ha_fid));
113 hsize = sizeof(xfs_fsid_t);
114 } else {
c6143911
CH
115 handle.ha_fid.fid_len = sizeof(xfs_fid_t) -
116 sizeof(handle.ha_fid.fid_len);
117 handle.ha_fid.fid_pad = 0;
9e9a2674 118 handle.ha_fid.fid_gen = inode->i_generation;
c6143911 119 handle.ha_fid.fid_ino = ip->i_ino;
1da177e4
LT
120
121 hsize = XFS_HSIZE(handle);
122 }
123
4346cdd4 124 error = -EFAULT;
743bb465 125 if (copy_to_user(hreq->ohandle, &handle, hsize) ||
4346cdd4
CH
126 copy_to_user(hreq->ohandlen, &hsize, sizeof(__s32)))
127 goto out_put;
1da177e4 128
4346cdd4
CH
129 error = 0;
130
131 out_put:
132 if (cmd == XFS_IOC_FD_TO_HANDLE)
2903ff01 133 fdput(f);
4346cdd4
CH
134 else
135 path_put(&path);
136 return error;
1da177e4
LT
137}
138
1da177e4 139/*
d296d30a
CH
140 * No need to do permission checks on the various pathname components
141 * as the handle operations are privileged.
1da177e4
LT
142 */
143STATIC int
d296d30a
CH
144xfs_handle_acceptable(
145 void *context,
146 struct dentry *dentry)
147{
148 return 1;
149}
150
151/*
152 * Convert userspace handle data into a dentry.
153 */
154struct dentry *
155xfs_handle_to_dentry(
156 struct file *parfilp,
157 void __user *uhandle,
158 u32 hlen)
1da177e4 159{
1da177e4 160 xfs_handle_t handle;
d296d30a 161 struct xfs_fid64 fid;
1da177e4
LT
162
163 /*
164 * Only allow handle opens under a directory.
165 */
496ad9aa 166 if (!S_ISDIR(file_inode(parfilp)->i_mode))
d296d30a
CH
167 return ERR_PTR(-ENOTDIR);
168
169 if (hlen != sizeof(xfs_handle_t))
170 return ERR_PTR(-EINVAL);
171 if (copy_from_user(&handle, uhandle, hlen))
172 return ERR_PTR(-EFAULT);
173 if (handle.ha_fid.fid_len !=
174 sizeof(handle.ha_fid) - sizeof(handle.ha_fid.fid_len))
175 return ERR_PTR(-EINVAL);
176
177 memset(&fid, 0, sizeof(struct fid));
178 fid.ino = handle.ha_fid.fid_ino;
179 fid.gen = handle.ha_fid.fid_gen;
180
181 return exportfs_decode_fh(parfilp->f_path.mnt, (struct fid *)&fid, 3,
182 FILEID_INO32_GEN | XFS_FILEID_TYPE_64FLAG,
183 xfs_handle_acceptable, NULL);
184}
1da177e4 185
d296d30a
CH
186STATIC struct dentry *
187xfs_handlereq_to_dentry(
188 struct file *parfilp,
189 xfs_fsop_handlereq_t *hreq)
190{
191 return xfs_handle_to_dentry(parfilp, hreq->ihandle, hreq->ihandlen);
1da177e4
LT
192}
193
d5547f9f 194int
1da177e4 195xfs_open_by_handle(
1da177e4 196 struct file *parfilp,
d296d30a 197 xfs_fsop_handlereq_t *hreq)
1da177e4 198{
745ca247 199 const struct cred *cred = current_cred();
1da177e4 200 int error;
d296d30a 201 int fd;
1da177e4
LT
202 int permflag;
203 struct file *filp;
204 struct inode *inode;
205 struct dentry *dentry;
1a1d7724 206 fmode_t fmode;
765927b2 207 struct path path;
1da177e4
LT
208
209 if (!capable(CAP_SYS_ADMIN))
b474c7ae 210 return -EPERM;
1da177e4 211
d296d30a
CH
212 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
213 if (IS_ERR(dentry))
214 return PTR_ERR(dentry);
2b0143b5 215 inode = d_inode(dentry);
1da177e4
LT
216
217 /* Restrict xfs_open_by_handle to directories & regular files. */
218 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) {
b474c7ae 219 error = -EPERM;
d296d30a 220 goto out_dput;
1da177e4
LT
221 }
222
223#if BITS_PER_LONG != 32
743bb465 224 hreq->oflags |= O_LARGEFILE;
1da177e4 225#endif
d296d30a 226
743bb465 227 permflag = hreq->oflags;
1a1d7724 228 fmode = OPEN_FMODE(permflag);
1da177e4 229 if ((!(permflag & O_APPEND) || (permflag & O_TRUNC)) &&
1a1d7724 230 (fmode & FMODE_WRITE) && IS_APPEND(inode)) {
b474c7ae 231 error = -EPERM;
d296d30a 232 goto out_dput;
1da177e4
LT
233 }
234
1a1d7724 235 if ((fmode & FMODE_WRITE) && IS_IMMUTABLE(inode)) {
337684a1 236 error = -EPERM;
d296d30a 237 goto out_dput;
1da177e4
LT
238 }
239
240 /* Can't write directories. */
1a1d7724 241 if (S_ISDIR(inode->i_mode) && (fmode & FMODE_WRITE)) {
b474c7ae 242 error = -EISDIR;
d296d30a 243 goto out_dput;
1da177e4
LT
244 }
245
862a6293 246 fd = get_unused_fd_flags(0);
d296d30a
CH
247 if (fd < 0) {
248 error = fd;
249 goto out_dput;
1da177e4
LT
250 }
251
765927b2
AV
252 path.mnt = parfilp->f_path.mnt;
253 path.dentry = dentry;
254 filp = dentry_open(&path, hreq->oflags, cred);
255 dput(dentry);
1da177e4 256 if (IS_ERR(filp)) {
d296d30a
CH
257 put_unused_fd(fd);
258 return PTR_ERR(filp);
1da177e4 259 }
4d4be482 260
03209378 261 if (S_ISREG(inode->i_mode)) {
2e2e7bb1 262 filp->f_flags |= O_NOATIME;
4d4be482 263 filp->f_mode |= FMODE_NOCMTIME;
2e2e7bb1 264 }
1da177e4 265
d296d30a
CH
266 fd_install(fd, filp);
267 return fd;
268
269 out_dput:
270 dput(dentry);
271 return error;
1da177e4
LT
272}
273
d5547f9f 274int
1da177e4 275xfs_readlink_by_handle(
d296d30a
CH
276 struct file *parfilp,
277 xfs_fsop_handlereq_t *hreq)
1da177e4 278{
d296d30a 279 struct dentry *dentry;
1da177e4 280 __u32 olen;
804c83c3 281 int error;
1da177e4
LT
282
283 if (!capable(CAP_SYS_ADMIN))
b474c7ae 284 return -EPERM;
1da177e4 285
d296d30a
CH
286 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
287 if (IS_ERR(dentry))
288 return PTR_ERR(dentry);
1da177e4
LT
289
290 /* Restrict this handle operation to symlinks only. */
fd4a0edf 291 if (!d_is_symlink(dentry)) {
b474c7ae 292 error = -EINVAL;
d296d30a 293 goto out_dput;
1da177e4
LT
294 }
295
743bb465 296 if (copy_from_user(&olen, hreq->ohandlen, sizeof(__u32))) {
b474c7ae 297 error = -EFAULT;
d296d30a 298 goto out_dput;
1da177e4 299 }
1da177e4 300
fd4a0edf 301 error = vfs_readlink(dentry, hreq->ohandle, olen);
67fcaa73 302
d296d30a
CH
303 out_dput:
304 dput(dentry);
804c83c3 305 return error;
1da177e4
LT
306}
307
c24b5dfa
DC
308int
309xfs_set_dmattrs(
310 xfs_inode_t *ip,
311 u_int evmask,
312 u_int16_t state)
313{
314 xfs_mount_t *mp = ip->i_mount;
315 xfs_trans_t *tp;
316 int error;
317
318 if (!capable(CAP_SYS_ADMIN))
2451337d 319 return -EPERM;
c24b5dfa
DC
320
321 if (XFS_FORCED_SHUTDOWN(mp))
2451337d 322 return -EIO;
c24b5dfa 323
253f4911
CH
324 error = xfs_trans_alloc(mp, &M_RES(mp)->tr_ichange, 0, 0, 0, &tp);
325 if (error)
c24b5dfa 326 return error;
253f4911 327
c24b5dfa
DC
328 xfs_ilock(ip, XFS_ILOCK_EXCL);
329 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL);
330
331 ip->i_d.di_dmevmask = evmask;
332 ip->i_d.di_dmstate = state;
333
334 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
70393313 335 error = xfs_trans_commit(tp);
c24b5dfa
DC
336
337 return error;
338}
339
1da177e4
LT
340STATIC int
341xfs_fssetdm_by_handle(
d296d30a
CH
342 struct file *parfilp,
343 void __user *arg)
1da177e4
LT
344{
345 int error;
346 struct fsdmidata fsd;
347 xfs_fsop_setdm_handlereq_t dmhreq;
d296d30a 348 struct dentry *dentry;
1da177e4
LT
349
350 if (!capable(CAP_MKNOD))
b474c7ae 351 return -EPERM;
1da177e4 352 if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t)))
b474c7ae 353 return -EFAULT;
1da177e4 354
d9457dc0
JK
355 error = mnt_want_write_file(parfilp);
356 if (error)
357 return error;
358
d296d30a 359 dentry = xfs_handlereq_to_dentry(parfilp, &dmhreq.hreq);
d9457dc0
JK
360 if (IS_ERR(dentry)) {
361 mnt_drop_write_file(parfilp);
d296d30a 362 return PTR_ERR(dentry);
d9457dc0 363 }
1da177e4 364
2b0143b5 365 if (IS_IMMUTABLE(d_inode(dentry)) || IS_APPEND(d_inode(dentry))) {
b474c7ae 366 error = -EPERM;
6e7f75ea 367 goto out;
1da177e4
LT
368 }
369
370 if (copy_from_user(&fsd, dmhreq.data, sizeof(fsd))) {
b474c7ae 371 error = -EFAULT;
6e7f75ea 372 goto out;
1da177e4
LT
373 }
374
2b0143b5 375 error = xfs_set_dmattrs(XFS_I(d_inode(dentry)), fsd.fsd_dmevmask,
6e7f75ea 376 fsd.fsd_dmstate);
1da177e4 377
6e7f75ea 378 out:
d9457dc0 379 mnt_drop_write_file(parfilp);
d296d30a 380 dput(dentry);
6e7f75ea 381 return error;
1da177e4
LT
382}
383
384STATIC int
385xfs_attrlist_by_handle(
d296d30a
CH
386 struct file *parfilp,
387 void __user *arg)
1da177e4 388{
d296d30a 389 int error = -ENOMEM;
1da177e4 390 attrlist_cursor_kern_t *cursor;
0facef7f 391 struct xfs_fsop_attrlist_handlereq __user *p = arg;
1da177e4 392 xfs_fsop_attrlist_handlereq_t al_hreq;
d296d30a 393 struct dentry *dentry;
1da177e4
LT
394 char *kbuf;
395
396 if (!capable(CAP_SYS_ADMIN))
b474c7ae 397 return -EPERM;
1da177e4 398 if (copy_from_user(&al_hreq, arg, sizeof(xfs_fsop_attrlist_handlereq_t)))
b474c7ae 399 return -EFAULT;
071c529e 400 if (al_hreq.buflen < sizeof(struct attrlist) ||
4e247614 401 al_hreq.buflen > XFS_XATTR_LIST_MAX)
b474c7ae 402 return -EINVAL;
1da177e4 403
90ad58a8
CH
404 /*
405 * Reject flags, only allow namespaces.
406 */
407 if (al_hreq.flags & ~(ATTR_ROOT | ATTR_SECURE))
b474c7ae 408 return -EINVAL;
90ad58a8 409
d296d30a
CH
410 dentry = xfs_handlereq_to_dentry(parfilp, &al_hreq.hreq);
411 if (IS_ERR(dentry))
412 return PTR_ERR(dentry);
1da177e4 413
fdd3ccee
DC
414 kbuf = kmem_zalloc_large(al_hreq.buflen, KM_SLEEP);
415 if (!kbuf)
416 goto out_dput;
1da177e4
LT
417
418 cursor = (attrlist_cursor_kern_t *)&al_hreq.pos;
2b0143b5 419 error = xfs_attr_list(XFS_I(d_inode(dentry)), kbuf, al_hreq.buflen,
739bfb2a 420 al_hreq.flags, cursor);
1da177e4
LT
421 if (error)
422 goto out_kfree;
423
0facef7f
DW
424 if (copy_to_user(&p->pos, cursor, sizeof(attrlist_cursor_kern_t))) {
425 error = -EFAULT;
426 goto out_kfree;
427 }
428
1da177e4
LT
429 if (copy_to_user(al_hreq.buffer, kbuf, al_hreq.buflen))
430 error = -EFAULT;
431
fdd3ccee
DC
432out_kfree:
433 kmem_free(kbuf);
434out_dput:
d296d30a
CH
435 dput(dentry);
436 return error;
1da177e4
LT
437}
438
28750975 439int
1da177e4 440xfs_attrmulti_attr_get(
739bfb2a 441 struct inode *inode,
a9273ca5
DC
442 unsigned char *name,
443 unsigned char __user *ubuf,
1da177e4
LT
444 __uint32_t *len,
445 __uint32_t flags)
446{
a9273ca5 447 unsigned char *kbuf;
2451337d 448 int error = -EFAULT;
e8b0ebaa 449
51fcbfe7 450 if (*len > XFS_XATTR_SIZE_MAX)
2451337d 451 return -EINVAL;
fdd3ccee
DC
452 kbuf = kmem_zalloc_large(*len, KM_SLEEP);
453 if (!kbuf)
2451337d 454 return -ENOMEM;
1da177e4 455
e8b0ebaa 456 error = xfs_attr_get(XFS_I(inode), name, kbuf, (int *)len, flags);
1da177e4
LT
457 if (error)
458 goto out_kfree;
459
460 if (copy_to_user(ubuf, kbuf, *len))
2451337d 461 error = -EFAULT;
1da177e4 462
fdd3ccee
DC
463out_kfree:
464 kmem_free(kbuf);
1da177e4
LT
465 return error;
466}
467
28750975 468int
1da177e4 469xfs_attrmulti_attr_set(
739bfb2a 470 struct inode *inode,
a9273ca5
DC
471 unsigned char *name,
472 const unsigned char __user *ubuf,
1da177e4
LT
473 __uint32_t len,
474 __uint32_t flags)
475{
a9273ca5 476 unsigned char *kbuf;
09cb22d2 477 int error;
1da177e4 478
739bfb2a 479 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 480 return -EPERM;
51fcbfe7 481 if (len > XFS_XATTR_SIZE_MAX)
2451337d 482 return -EINVAL;
1da177e4 483
0e639bde
LZ
484 kbuf = memdup_user(ubuf, len);
485 if (IS_ERR(kbuf))
486 return PTR_ERR(kbuf);
e8b0ebaa 487
09cb22d2 488 error = xfs_attr_set(XFS_I(inode), name, kbuf, len, flags);
47e1bf64
AG
489 if (!error)
490 xfs_forget_acl(inode, name, flags);
09cb22d2
AG
491 kfree(kbuf);
492 return error;
1da177e4
LT
493}
494
28750975 495int
1da177e4 496xfs_attrmulti_attr_remove(
739bfb2a 497 struct inode *inode,
a9273ca5 498 unsigned char *name,
1da177e4
LT
499 __uint32_t flags)
500{
47e1bf64
AG
501 int error;
502
739bfb2a 503 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 504 return -EPERM;
47e1bf64
AG
505 error = xfs_attr_remove(XFS_I(inode), name, flags);
506 if (!error)
507 xfs_forget_acl(inode, name, flags);
508 return error;
1da177e4
LT
509}
510
511STATIC int
512xfs_attrmulti_by_handle(
42a74f20 513 struct file *parfilp,
d296d30a 514 void __user *arg)
1da177e4
LT
515{
516 int error;
517 xfs_attr_multiop_t *ops;
518 xfs_fsop_attrmulti_handlereq_t am_hreq;
d296d30a 519 struct dentry *dentry;
1da177e4 520 unsigned int i, size;
a9273ca5 521 unsigned char *attr_name;
1da177e4
LT
522
523 if (!capable(CAP_SYS_ADMIN))
b474c7ae 524 return -EPERM;
1da177e4 525 if (copy_from_user(&am_hreq, arg, sizeof(xfs_fsop_attrmulti_handlereq_t)))
b474c7ae 526 return -EFAULT;
1da177e4 527
fda168c2
ZW
528 /* overflow check */
529 if (am_hreq.opcount >= INT_MAX / sizeof(xfs_attr_multiop_t))
530 return -E2BIG;
531
d296d30a
CH
532 dentry = xfs_handlereq_to_dentry(parfilp, &am_hreq.hreq);
533 if (IS_ERR(dentry))
534 return PTR_ERR(dentry);
1da177e4 535
2451337d 536 error = -E2BIG;
e182f57a 537 size = am_hreq.opcount * sizeof(xfs_attr_multiop_t);
1da177e4 538 if (!size || size > 16 * PAGE_SIZE)
d296d30a 539 goto out_dput;
1da177e4 540
0e639bde
LZ
541 ops = memdup_user(am_hreq.ops, size);
542 if (IS_ERR(ops)) {
2451337d 543 error = PTR_ERR(ops);
d296d30a 544 goto out_dput;
0e639bde 545 }
1da177e4 546
2451337d 547 error = -ENOMEM;
1da177e4
LT
548 attr_name = kmalloc(MAXNAMELEN, GFP_KERNEL);
549 if (!attr_name)
550 goto out_kfree_ops;
551
1da177e4
LT
552 error = 0;
553 for (i = 0; i < am_hreq.opcount; i++) {
a9273ca5 554 ops[i].am_error = strncpy_from_user((char *)attr_name,
1da177e4
LT
555 ops[i].am_attrname, MAXNAMELEN);
556 if (ops[i].am_error == 0 || ops[i].am_error == MAXNAMELEN)
2451337d 557 error = -ERANGE;
1da177e4
LT
558 if (ops[i].am_error < 0)
559 break;
560
561 switch (ops[i].am_opcode) {
562 case ATTR_OP_GET:
d296d30a 563 ops[i].am_error = xfs_attrmulti_attr_get(
2b0143b5 564 d_inode(dentry), attr_name,
d296d30a
CH
565 ops[i].am_attrvalue, &ops[i].am_length,
566 ops[i].am_flags);
1da177e4
LT
567 break;
568 case ATTR_OP_SET:
a561be71 569 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
570 if (ops[i].am_error)
571 break;
d296d30a 572 ops[i].am_error = xfs_attrmulti_attr_set(
2b0143b5 573 d_inode(dentry), attr_name,
d296d30a
CH
574 ops[i].am_attrvalue, ops[i].am_length,
575 ops[i].am_flags);
2a79f17e 576 mnt_drop_write_file(parfilp);
1da177e4
LT
577 break;
578 case ATTR_OP_REMOVE:
a561be71 579 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
580 if (ops[i].am_error)
581 break;
d296d30a 582 ops[i].am_error = xfs_attrmulti_attr_remove(
2b0143b5 583 d_inode(dentry), attr_name,
d296d30a 584 ops[i].am_flags);
2a79f17e 585 mnt_drop_write_file(parfilp);
1da177e4
LT
586 break;
587 default:
2451337d 588 ops[i].am_error = -EINVAL;
1da177e4
LT
589 }
590 }
591
592 if (copy_to_user(am_hreq.ops, ops, size))
2451337d 593 error = -EFAULT;
1da177e4
LT
594
595 kfree(attr_name);
596 out_kfree_ops:
597 kfree(ops);
d296d30a
CH
598 out_dput:
599 dput(dentry);
2451337d 600 return error;
1da177e4
LT
601}
602
d5547f9f 603int
1da177e4 604xfs_ioc_space(
1da177e4 605 struct file *filp,
1da177e4 606 unsigned int cmd,
743bb465 607 xfs_flock64_t *bf)
1da177e4 608{
8f3e2058
CH
609 struct inode *inode = file_inode(filp);
610 struct xfs_inode *ip = XFS_I(inode);
865e9446 611 struct iattr iattr;
8add71ca 612 enum xfs_prealloc_flags flags = 0;
781355c6 613 uint iolock = XFS_IOLOCK_EXCL;
1da177e4
LT
614 int error;
615
743bb465 616 /*
617 * Only allow the sys admin to reserve space unless
618 * unwritten extents are enabled.
619 */
620 if (!xfs_sb_version_hasextflgbit(&ip->i_mount->m_sb) &&
621 !capable(CAP_SYS_ADMIN))
b474c7ae 622 return -EPERM;
743bb465 623
f37ea149 624 if (inode->i_flags & (S_IMMUTABLE|S_APPEND))
b474c7ae 625 return -EPERM;
1da177e4 626
ad4a8ac4 627 if (!(filp->f_mode & FMODE_WRITE))
b474c7ae 628 return -EBADF;
1da177e4 629
f37ea149 630 if (!S_ISREG(inode->i_mode))
b474c7ae 631 return -EINVAL;
1da177e4 632
8add71ca
CH
633 if (filp->f_flags & O_DSYNC)
634 flags |= XFS_PREALLOC_SYNC;
8f3e2058 635 if (filp->f_mode & FMODE_NOCMTIME)
8add71ca
CH
636 flags |= XFS_PREALLOC_INVISIBLE;
637
d9457dc0
JK
638 error = mnt_want_write_file(filp);
639 if (error)
640 return error;
865e9446 641
781355c6 642 xfs_ilock(ip, iolock);
65523218 643 error = xfs_break_layouts(inode, &iolock);
781355c6
CH
644 if (error)
645 goto out_unlock;
865e9446 646
e8e9ad42
DC
647 xfs_ilock(ip, XFS_MMAPLOCK_EXCL);
648 iolock |= XFS_MMAPLOCK_EXCL;
649
865e9446
CH
650 switch (bf->l_whence) {
651 case 0: /*SEEK_SET*/
652 break;
653 case 1: /*SEEK_CUR*/
654 bf->l_start += filp->f_pos;
655 break;
656 case 2: /*SEEK_END*/
657 bf->l_start += XFS_ISIZE(ip);
658 break;
659 default:
2451337d 660 error = -EINVAL;
865e9446
CH
661 goto out_unlock;
662 }
663
664 /*
665 * length of <= 0 for resv/unresv/zero is invalid. length for
666 * alloc/free is ignored completely and we have no idea what userspace
667 * might have set it to, so set it to zero to allow range
668 * checks to pass.
669 */
670 switch (cmd) {
671 case XFS_IOC_ZERO_RANGE:
672 case XFS_IOC_RESVSP:
673 case XFS_IOC_RESVSP64:
674 case XFS_IOC_UNRESVSP:
675 case XFS_IOC_UNRESVSP64:
676 if (bf->l_len <= 0) {
2451337d 677 error = -EINVAL;
865e9446
CH
678 goto out_unlock;
679 }
680 break;
681 default:
682 bf->l_len = 0;
683 break;
684 }
685
686 if (bf->l_start < 0 ||
8add71ca 687 bf->l_start > inode->i_sb->s_maxbytes ||
865e9446 688 bf->l_start + bf->l_len < 0 ||
8add71ca 689 bf->l_start + bf->l_len >= inode->i_sb->s_maxbytes) {
2451337d 690 error = -EINVAL;
865e9446
CH
691 goto out_unlock;
692 }
693
694 switch (cmd) {
695 case XFS_IOC_ZERO_RANGE:
8add71ca 696 flags |= XFS_PREALLOC_SET;
865e9446 697 error = xfs_zero_file_space(ip, bf->l_start, bf->l_len);
865e9446
CH
698 break;
699 case XFS_IOC_RESVSP:
700 case XFS_IOC_RESVSP64:
8add71ca 701 flags |= XFS_PREALLOC_SET;
865e9446
CH
702 error = xfs_alloc_file_space(ip, bf->l_start, bf->l_len,
703 XFS_BMAPI_PREALLOC);
865e9446
CH
704 break;
705 case XFS_IOC_UNRESVSP:
706 case XFS_IOC_UNRESVSP64:
707 error = xfs_free_file_space(ip, bf->l_start, bf->l_len);
708 break;
709 case XFS_IOC_ALLOCSP:
710 case XFS_IOC_ALLOCSP64:
711 case XFS_IOC_FREESP:
712 case XFS_IOC_FREESP64:
8add71ca 713 flags |= XFS_PREALLOC_CLEAR;
865e9446
CH
714 if (bf->l_start > XFS_ISIZE(ip)) {
715 error = xfs_alloc_file_space(ip, XFS_ISIZE(ip),
716 bf->l_start - XFS_ISIZE(ip), 0);
717 if (error)
718 goto out_unlock;
719 }
720
721 iattr.ia_valid = ATTR_SIZE;
722 iattr.ia_size = bf->l_start;
723
69bca807 724 error = xfs_vn_setattr_size(file_dentry(filp), &iattr);
865e9446
CH
725 break;
726 default:
727 ASSERT(0);
2451337d 728 error = -EINVAL;
865e9446
CH
729 }
730
731 if (error)
732 goto out_unlock;
733
8add71ca 734 error = xfs_update_prealloc_flags(ip, flags);
865e9446
CH
735
736out_unlock:
781355c6 737 xfs_iunlock(ip, iolock);
d9457dc0 738 mnt_drop_write_file(filp);
2451337d 739 return error;
1da177e4
LT
740}
741
742STATIC int
743xfs_ioc_bulkstat(
744 xfs_mount_t *mp,
745 unsigned int cmd,
746 void __user *arg)
747{
748 xfs_fsop_bulkreq_t bulkreq;
749 int count; /* # of records returned */
750 xfs_ino_t inlast; /* last inode number */
751 int done;
752 int error;
753
754 /* done = 1 if there are more stats to get and if bulkstat */
755 /* should be called again (unused here, but used in dmapi) */
756
757 if (!capable(CAP_SYS_ADMIN))
758 return -EPERM;
759
760 if (XFS_FORCED_SHUTDOWN(mp))
b474c7ae 761 return -EIO;
1da177e4
LT
762
763 if (copy_from_user(&bulkreq, arg, sizeof(xfs_fsop_bulkreq_t)))
b474c7ae 764 return -EFAULT;
1da177e4
LT
765
766 if (copy_from_user(&inlast, bulkreq.lastip, sizeof(__s64)))
b474c7ae 767 return -EFAULT;
1da177e4
LT
768
769 if ((count = bulkreq.icount) <= 0)
b474c7ae 770 return -EINVAL;
1da177e4 771
cd57e594 772 if (bulkreq.ubuffer == NULL)
b474c7ae 773 return -EINVAL;
cd57e594 774
1da177e4
LT
775 if (cmd == XFS_IOC_FSINUMBERS)
776 error = xfs_inumbers(mp, &inlast, &count,
faa63e95 777 bulkreq.ubuffer, xfs_inumbers_fmt);
1da177e4 778 else if (cmd == XFS_IOC_FSBULKSTAT_SINGLE)
d716f8ee
CH
779 error = xfs_bulkstat_one(mp, inlast, bulkreq.ubuffer,
780 sizeof(xfs_bstat_t), NULL, &done);
cd57e594 781 else /* XFS_IOC_FSBULKSTAT */
7dce11db
CH
782 error = xfs_bulkstat(mp, &inlast, &count, xfs_bulkstat_one,
783 sizeof(xfs_bstat_t), bulkreq.ubuffer,
784 &done);
1da177e4
LT
785
786 if (error)
2451337d 787 return error;
1da177e4
LT
788
789 if (bulkreq.ocount != NULL) {
790 if (copy_to_user(bulkreq.lastip, &inlast,
791 sizeof(xfs_ino_t)))
b474c7ae 792 return -EFAULT;
1da177e4
LT
793
794 if (copy_to_user(bulkreq.ocount, &count, sizeof(count)))
b474c7ae 795 return -EFAULT;
1da177e4
LT
796 }
797
798 return 0;
799}
800
801STATIC int
802xfs_ioc_fsgeometry_v1(
803 xfs_mount_t *mp,
804 void __user *arg)
805{
eeb2036b 806 xfs_fsop_geom_t fsgeo;
1da177e4
LT
807 int error;
808
eeb2036b 809 error = xfs_fs_geometry(mp, &fsgeo, 3);
1da177e4 810 if (error)
2451337d 811 return error;
1da177e4 812
eeb2036b
AE
813 /*
814 * Caller should have passed an argument of type
815 * xfs_fsop_geom_v1_t. This is a proper subset of the
816 * xfs_fsop_geom_t that xfs_fs_geometry() fills in.
817 */
818 if (copy_to_user(arg, &fsgeo, sizeof(xfs_fsop_geom_v1_t)))
b474c7ae 819 return -EFAULT;
1da177e4
LT
820 return 0;
821}
822
823STATIC int
824xfs_ioc_fsgeometry(
825 xfs_mount_t *mp,
826 void __user *arg)
827{
828 xfs_fsop_geom_t fsgeo;
829 int error;
830
831 error = xfs_fs_geometry(mp, &fsgeo, 4);
832 if (error)
2451337d 833 return error;
1da177e4
LT
834
835 if (copy_to_user(arg, &fsgeo, sizeof(fsgeo)))
b474c7ae 836 return -EFAULT;
1da177e4
LT
837 return 0;
838}
839
840/*
841 * Linux extended inode flags interface.
842 */
1da177e4
LT
843
844STATIC unsigned int
845xfs_merge_ioc_xflags(
846 unsigned int flags,
847 unsigned int start)
848{
849 unsigned int xflags = start;
850
39058a0e 851 if (flags & FS_IMMUTABLE_FL)
e7b89481 852 xflags |= FS_XFLAG_IMMUTABLE;
1da177e4 853 else
e7b89481 854 xflags &= ~FS_XFLAG_IMMUTABLE;
39058a0e 855 if (flags & FS_APPEND_FL)
e7b89481 856 xflags |= FS_XFLAG_APPEND;
1da177e4 857 else
e7b89481 858 xflags &= ~FS_XFLAG_APPEND;
39058a0e 859 if (flags & FS_SYNC_FL)
e7b89481 860 xflags |= FS_XFLAG_SYNC;
1da177e4 861 else
e7b89481 862 xflags &= ~FS_XFLAG_SYNC;
39058a0e 863 if (flags & FS_NOATIME_FL)
e7b89481 864 xflags |= FS_XFLAG_NOATIME;
1da177e4 865 else
e7b89481 866 xflags &= ~FS_XFLAG_NOATIME;
39058a0e 867 if (flags & FS_NODUMP_FL)
e7b89481 868 xflags |= FS_XFLAG_NODUMP;
1da177e4 869 else
e7b89481 870 xflags &= ~FS_XFLAG_NODUMP;
1da177e4
LT
871
872 return xflags;
873}
874
875STATIC unsigned int
876xfs_di2lxflags(
877 __uint16_t di_flags)
878{
879 unsigned int flags = 0;
880
881 if (di_flags & XFS_DIFLAG_IMMUTABLE)
39058a0e 882 flags |= FS_IMMUTABLE_FL;
1da177e4 883 if (di_flags & XFS_DIFLAG_APPEND)
39058a0e 884 flags |= FS_APPEND_FL;
1da177e4 885 if (di_flags & XFS_DIFLAG_SYNC)
39058a0e 886 flags |= FS_SYNC_FL;
1da177e4 887 if (di_flags & XFS_DIFLAG_NOATIME)
39058a0e 888 flags |= FS_NOATIME_FL;
1da177e4 889 if (di_flags & XFS_DIFLAG_NODUMP)
39058a0e 890 flags |= FS_NODUMP_FL;
1da177e4
LT
891 return flags;
892}
893
c83bfab1
CH
894STATIC int
895xfs_ioc_fsgetxattr(
896 xfs_inode_t *ip,
897 int attr,
898 void __user *arg)
899{
900 struct fsxattr fa;
901
a122eb2f
DR
902 memset(&fa, 0, sizeof(struct fsxattr));
903
c83bfab1
CH
904 xfs_ilock(ip, XFS_ILOCK_SHARED);
905 fa.fsx_xflags = xfs_ip2xflags(ip);
906 fa.fsx_extsize = ip->i_d.di_extsize << ip->i_mount->m_sb.sb_blocklog;
f7ca3522
DW
907 fa.fsx_cowextsize = ip->i_d.di_cowextsize <<
908 ip->i_mount->m_sb.sb_blocklog;
6743099c 909 fa.fsx_projid = xfs_get_projid(ip);
c83bfab1
CH
910
911 if (attr) {
912 if (ip->i_afp) {
913 if (ip->i_afp->if_flags & XFS_IFEXTENTS)
5d829300 914 fa.fsx_nextents = xfs_iext_count(ip->i_afp);
c83bfab1
CH
915 else
916 fa.fsx_nextents = ip->i_d.di_anextents;
917 } else
918 fa.fsx_nextents = 0;
919 } else {
920 if (ip->i_df.if_flags & XFS_IFEXTENTS)
5d829300 921 fa.fsx_nextents = xfs_iext_count(&ip->i_df);
c83bfab1
CH
922 else
923 fa.fsx_nextents = ip->i_d.di_nextents;
924 }
925 xfs_iunlock(ip, XFS_ILOCK_SHARED);
926
927 if (copy_to_user(arg, &fa, sizeof(fa)))
928 return -EFAULT;
929 return 0;
930}
931
25fe55e8
CH
932STATIC void
933xfs_set_diflags(
934 struct xfs_inode *ip,
935 unsigned int xflags)
936{
937 unsigned int di_flags;
58f88ca2 938 uint64_t di_flags2;
25fe55e8
CH
939
940 /* can't set PREALLOC this way, just preserve it */
941 di_flags = (ip->i_d.di_flags & XFS_DIFLAG_PREALLOC);
e7b89481 942 if (xflags & FS_XFLAG_IMMUTABLE)
25fe55e8 943 di_flags |= XFS_DIFLAG_IMMUTABLE;
e7b89481 944 if (xflags & FS_XFLAG_APPEND)
25fe55e8 945 di_flags |= XFS_DIFLAG_APPEND;
e7b89481 946 if (xflags & FS_XFLAG_SYNC)
25fe55e8 947 di_flags |= XFS_DIFLAG_SYNC;
e7b89481 948 if (xflags & FS_XFLAG_NOATIME)
25fe55e8 949 di_flags |= XFS_DIFLAG_NOATIME;
e7b89481 950 if (xflags & FS_XFLAG_NODUMP)
25fe55e8 951 di_flags |= XFS_DIFLAG_NODUMP;
e7b89481 952 if (xflags & FS_XFLAG_NODEFRAG)
25fe55e8 953 di_flags |= XFS_DIFLAG_NODEFRAG;
e7b89481 954 if (xflags & FS_XFLAG_FILESTREAM)
25fe55e8 955 di_flags |= XFS_DIFLAG_FILESTREAM;
c19b3b05 956 if (S_ISDIR(VFS_I(ip)->i_mode)) {
e7b89481 957 if (xflags & FS_XFLAG_RTINHERIT)
25fe55e8 958 di_flags |= XFS_DIFLAG_RTINHERIT;
e7b89481 959 if (xflags & FS_XFLAG_NOSYMLINKS)
25fe55e8 960 di_flags |= XFS_DIFLAG_NOSYMLINKS;
e7b89481 961 if (xflags & FS_XFLAG_EXTSZINHERIT)
25fe55e8 962 di_flags |= XFS_DIFLAG_EXTSZINHERIT;
e7b89481 963 if (xflags & FS_XFLAG_PROJINHERIT)
9336e3a7 964 di_flags |= XFS_DIFLAG_PROJINHERIT;
c19b3b05 965 } else if (S_ISREG(VFS_I(ip)->i_mode)) {
e7b89481 966 if (xflags & FS_XFLAG_REALTIME)
25fe55e8 967 di_flags |= XFS_DIFLAG_REALTIME;
e7b89481 968 if (xflags & FS_XFLAG_EXTSIZE)
25fe55e8
CH
969 di_flags |= XFS_DIFLAG_EXTSIZE;
970 }
25fe55e8 971 ip->i_d.di_flags = di_flags;
58f88ca2
DC
972
973 /* diflags2 only valid for v3 inodes. */
974 if (ip->i_d.di_version < 3)
975 return;
976
f7ca3522 977 di_flags2 = (ip->i_d.di_flags2 & XFS_DIFLAG2_REFLINK);
58f88ca2
DC
978 if (xflags & FS_XFLAG_DAX)
979 di_flags2 |= XFS_DIFLAG2_DAX;
f7ca3522
DW
980 if (xflags & FS_XFLAG_COWEXTSIZE)
981 di_flags2 |= XFS_DIFLAG2_COWEXTSIZE;
58f88ca2
DC
982
983 ip->i_d.di_flags2 = di_flags2;
25fe55e8
CH
984}
985
f13fae2d
CH
986STATIC void
987xfs_diflags_to_linux(
988 struct xfs_inode *ip)
989{
e4f75291 990 struct inode *inode = VFS_I(ip);
f13fae2d
CH
991 unsigned int xflags = xfs_ip2xflags(ip);
992
e7b89481 993 if (xflags & FS_XFLAG_IMMUTABLE)
f13fae2d
CH
994 inode->i_flags |= S_IMMUTABLE;
995 else
996 inode->i_flags &= ~S_IMMUTABLE;
e7b89481 997 if (xflags & FS_XFLAG_APPEND)
f13fae2d
CH
998 inode->i_flags |= S_APPEND;
999 else
1000 inode->i_flags &= ~S_APPEND;
e7b89481 1001 if (xflags & FS_XFLAG_SYNC)
f13fae2d
CH
1002 inode->i_flags |= S_SYNC;
1003 else
1004 inode->i_flags &= ~S_SYNC;
e7b89481 1005 if (xflags & FS_XFLAG_NOATIME)
f13fae2d
CH
1006 inode->i_flags |= S_NOATIME;
1007 else
1008 inode->i_flags &= ~S_NOATIME;
58f88ca2
DC
1009 if (xflags & FS_XFLAG_DAX)
1010 inode->i_flags |= S_DAX;
1011 else
1012 inode->i_flags &= ~S_DAX;
1013
f13fae2d 1014}
25fe55e8 1015
29a17c00
DC
1016static int
1017xfs_ioctl_setattr_xflags(
1018 struct xfs_trans *tp,
1019 struct xfs_inode *ip,
1020 struct fsxattr *fa)
1021{
1022 struct xfs_mount *mp = ip->i_mount;
1023
1024 /* Can't change realtime flag if any extents are allocated. */
1025 if ((ip->i_d.di_nextents || ip->i_delayed_blks) &&
e7b89481 1026 XFS_IS_REALTIME_INODE(ip) != (fa->fsx_xflags & FS_XFLAG_REALTIME))
29a17c00
DC
1027 return -EINVAL;
1028
1029 /* If realtime flag is set then must have realtime device */
e7b89481 1030 if (fa->fsx_xflags & FS_XFLAG_REALTIME) {
29a17c00
DC
1031 if (mp->m_sb.sb_rblocks == 0 || mp->m_sb.sb_rextsize == 0 ||
1032 (ip->i_d.di_extsize % mp->m_sb.sb_rextsize))
1033 return -EINVAL;
1034 }
1035
1987fd74 1036 /* Clear reflink if we are actually able to set the rt flag. */
c8e156ac 1037 if ((fa->fsx_xflags & FS_XFLAG_REALTIME) && xfs_is_reflink_inode(ip))
1987fd74 1038 ip->i_d.di_flags2 &= ~XFS_DIFLAG2_REFLINK;
c8e156ac 1039
4f435ebe
DW
1040 /* Don't allow us to set DAX mode for a reflinked file for now. */
1041 if ((fa->fsx_xflags & FS_XFLAG_DAX) && xfs_is_reflink_inode(ip))
1042 return -EINVAL;
1043
29a17c00
DC
1044 /*
1045 * Can't modify an immutable/append-only file unless
1046 * we have appropriate permission.
1047 */
1048 if (((ip->i_d.di_flags & (XFS_DIFLAG_IMMUTABLE | XFS_DIFLAG_APPEND)) ||
e7b89481 1049 (fa->fsx_xflags & (FS_XFLAG_IMMUTABLE | FS_XFLAG_APPEND))) &&
29a17c00
DC
1050 !capable(CAP_LINUX_IMMUTABLE))
1051 return -EPERM;
1052
29a17c00
DC
1053 xfs_set_diflags(ip, fa->fsx_xflags);
1054 xfs_diflags_to_linux(ip);
1055 xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG);
1056 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
ff6d6af2 1057 XFS_STATS_INC(mp, xs_ig_attrchg);
29a17c00
DC
1058 return 0;
1059}
1060
3a6a854a
DC
1061/*
1062 * If we are changing DAX flags, we have to ensure the file is clean and any
1063 * cached objects in the address space are invalidated and removed. This
1064 * requires us to lock out other IO and page faults similar to a truncate
1065 * operation. The locks need to be held until the transaction has been committed
1066 * so that the cache invalidation is atomic with respect to the DAX flag
1067 * manipulation.
1068 */
1069static int
1070xfs_ioctl_setattr_dax_invalidate(
1071 struct xfs_inode *ip,
1072 struct fsxattr *fa,
1073 int *join_flags)
1074{
1075 struct inode *inode = VFS_I(ip);
1076 int error;
1077
1078 *join_flags = 0;
1079
e8897529
DC
1080 /*
1081 * It is only valid to set the DAX flag on regular files and
64485437
DC
1082 * directories on filesystems where the block size is equal to the page
1083 * size. On directories it serves as an inherit hint.
e8897529 1084 */
64485437
DC
1085 if (fa->fsx_xflags & FS_XFLAG_DAX) {
1086 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode)))
1087 return -EINVAL;
1088 if (ip->i_mount->m_sb.sb_blocksize != PAGE_SIZE)
1089 return -EINVAL;
1090 }
e8897529 1091
3a6a854a
DC
1092 /* If the DAX state is not changing, we have nothing to do here. */
1093 if ((fa->fsx_xflags & FS_XFLAG_DAX) && IS_DAX(inode))
1094 return 0;
1095 if (!(fa->fsx_xflags & FS_XFLAG_DAX) && !IS_DAX(inode))
1096 return 0;
1097
1098 /* lock, flush and invalidate mapping in preparation for flag change */
1099 xfs_ilock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1100 error = filemap_write_and_wait(inode->i_mapping);
1101 if (error)
1102 goto out_unlock;
1103 error = invalidate_inode_pages2(inode->i_mapping);
1104 if (error)
1105 goto out_unlock;
1106
1107 *join_flags = XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL;
29a17c00 1108 return 0;
3a6a854a
DC
1109
1110out_unlock:
1111 xfs_iunlock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1112 return error;
1113
29a17c00
DC
1114}
1115
8f3d17ab
DC
1116/*
1117 * Set up the transaction structure for the setattr operation, checking that we
1118 * have permission to do so. On success, return a clean transaction and the
1119 * inode locked exclusively ready for further operation specific checks. On
1120 * failure, return an error without modifying or locking the inode.
3a6a854a
DC
1121 *
1122 * The inode might already be IO locked on call. If this is the case, it is
1123 * indicated in @join_flags and we take full responsibility for ensuring they
1124 * are unlocked from now on. Hence if we have an error here, we still have to
1125 * unlock them. Otherwise, once they are joined to the transaction, they will
1126 * be unlocked on commit/cancel.
8f3d17ab
DC
1127 */
1128static struct xfs_trans *
1129xfs_ioctl_setattr_get_trans(
3a6a854a
DC
1130 struct xfs_inode *ip,
1131 int join_flags)
8f3d17ab
DC
1132{
1133 struct xfs_mount *mp = ip->i_mount;
1134 struct xfs_trans *tp;
3a6a854a 1135 int error = -EROFS;
8f3d17ab
DC
1136
1137 if (mp->m_flags & XFS_MOUNT_RDONLY)
3a6a854a
DC
1138 goto out_unlock;
1139 error = -EIO;
8f3d17ab 1140 if (XFS_FORCED_SHUTDOWN(mp))
3a6a854a 1141 goto out_unlock;
8f3d17ab 1142
253f4911 1143 error = xfs_trans_alloc(mp, &M_RES(mp)->tr_ichange, 0, 0, 0, &tp);
8f3d17ab 1144 if (error)
253f4911 1145 return ERR_PTR(error);
8f3d17ab
DC
1146
1147 xfs_ilock(ip, XFS_ILOCK_EXCL);
3a6a854a
DC
1148 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL | join_flags);
1149 join_flags = 0;
8f3d17ab
DC
1150
1151 /*
1152 * CAP_FOWNER overrides the following restrictions:
1153 *
1154 * The user ID of the calling process must be equal to the file owner
1155 * ID, except in cases where the CAP_FSETID capability is applicable.
1156 */
1157 if (!inode_owner_or_capable(VFS_I(ip))) {
1158 error = -EPERM;
1159 goto out_cancel;
1160 }
1161
1162 if (mp->m_flags & XFS_MOUNT_WSYNC)
1163 xfs_trans_set_sync(tp);
1164
1165 return tp;
1166
1167out_cancel:
4906e215 1168 xfs_trans_cancel(tp);
3a6a854a
DC
1169out_unlock:
1170 if (join_flags)
1171 xfs_iunlock(ip, join_flags);
8f3d17ab
DC
1172 return ERR_PTR(error);
1173}
1174
9b94fcc3
IP
1175/*
1176 * extent size hint validation is somewhat cumbersome. Rules are:
1177 *
1178 * 1. extent size hint is only valid for directories and regular files
e7b89481
DC
1179 * 2. FS_XFLAG_EXTSIZE is only valid for regular files
1180 * 3. FS_XFLAG_EXTSZINHERIT is only valid for directories.
9b94fcc3
IP
1181 * 4. can only be changed on regular files if no extents are allocated
1182 * 5. can be changed on directories at any time
1183 * 6. extsize hint of 0 turns off hints, clears inode flags.
1184 * 7. Extent size must be a multiple of the appropriate block size.
1185 * 8. for non-realtime files, the extent size hint must be limited
1186 * to half the AG size to avoid alignment extending the extent beyond the
1187 * limits of the AG.
1188 */
f92090e9 1189static int
d4388d3c
DC
1190xfs_ioctl_setattr_check_extsize(
1191 struct xfs_inode *ip,
1192 struct fsxattr *fa)
1193{
1194 struct xfs_mount *mp = ip->i_mount;
1195
c19b3b05 1196 if ((fa->fsx_xflags & FS_XFLAG_EXTSIZE) && !S_ISREG(VFS_I(ip)->i_mode))
9b94fcc3
IP
1197 return -EINVAL;
1198
e7b89481 1199 if ((fa->fsx_xflags & FS_XFLAG_EXTSZINHERIT) &&
c19b3b05 1200 !S_ISDIR(VFS_I(ip)->i_mode))
9b94fcc3
IP
1201 return -EINVAL;
1202
c19b3b05 1203 if (S_ISREG(VFS_I(ip)->i_mode) && ip->i_d.di_nextents &&
d4388d3c
DC
1204 ((ip->i_d.di_extsize << mp->m_sb.sb_blocklog) != fa->fsx_extsize))
1205 return -EINVAL;
1206
d4388d3c
DC
1207 if (fa->fsx_extsize != 0) {
1208 xfs_extlen_t size;
1209 xfs_fsblock_t extsize_fsb;
1210
1211 extsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_extsize);
1212 if (extsize_fsb > MAXEXTLEN)
1213 return -EINVAL;
1214
1215 if (XFS_IS_REALTIME_INODE(ip) ||
e7b89481 1216 (fa->fsx_xflags & FS_XFLAG_REALTIME)) {
d4388d3c
DC
1217 size = mp->m_sb.sb_rextsize << mp->m_sb.sb_blocklog;
1218 } else {
1219 size = mp->m_sb.sb_blocksize;
1220 if (extsize_fsb > mp->m_sb.sb_agblocks / 2)
1221 return -EINVAL;
1222 }
1223
1224 if (fa->fsx_extsize % size)
1225 return -EINVAL;
9b94fcc3 1226 } else
e7b89481 1227 fa->fsx_xflags &= ~(FS_XFLAG_EXTSIZE | FS_XFLAG_EXTSZINHERIT);
9b94fcc3 1228
d4388d3c
DC
1229 return 0;
1230}
1231
f7ca3522
DW
1232/*
1233 * CoW extent size hint validation rules are:
1234 *
1235 * 1. CoW extent size hint can only be set if reflink is enabled on the fs.
1236 * The inode does not have to have any shared blocks, but it must be a v3.
1237 * 2. FS_XFLAG_COWEXTSIZE is only valid for directories and regular files;
1238 * for a directory, the hint is propagated to new files.
1239 * 3. Can be changed on files & directories at any time.
1240 * 4. CoW extsize hint of 0 turns off hints, clears inode flags.
1241 * 5. Extent size must be a multiple of the appropriate block size.
1242 * 6. The extent size hint must be limited to half the AG size to avoid
1243 * alignment extending the extent beyond the limits of the AG.
1244 */
1245static int
1246xfs_ioctl_setattr_check_cowextsize(
1247 struct xfs_inode *ip,
1248 struct fsxattr *fa)
1249{
1250 struct xfs_mount *mp = ip->i_mount;
1251
1252 if (!(fa->fsx_xflags & FS_XFLAG_COWEXTSIZE))
1253 return 0;
1254
1255 if (!xfs_sb_version_hasreflink(&ip->i_mount->m_sb) ||
1256 ip->i_d.di_version != 3)
1257 return -EINVAL;
1258
1259 if (!S_ISREG(VFS_I(ip)->i_mode) && !S_ISDIR(VFS_I(ip)->i_mode))
1260 return -EINVAL;
1261
1262 if (fa->fsx_cowextsize != 0) {
1263 xfs_extlen_t size;
1264 xfs_fsblock_t cowextsize_fsb;
1265
1266 cowextsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_cowextsize);
1267 if (cowextsize_fsb > MAXEXTLEN)
1268 return -EINVAL;
1269
1270 size = mp->m_sb.sb_blocksize;
1271 if (cowextsize_fsb > mp->m_sb.sb_agblocks / 2)
1272 return -EINVAL;
1273
1274 if (fa->fsx_cowextsize % size)
1275 return -EINVAL;
1276 } else
1277 fa->fsx_xflags &= ~FS_XFLAG_COWEXTSIZE;
1278
1279 return 0;
1280}
1281
f92090e9 1282static int
23bd0735
DC
1283xfs_ioctl_setattr_check_projid(
1284 struct xfs_inode *ip,
1285 struct fsxattr *fa)
1286{
1287 /* Disallow 32bit project ids if projid32bit feature is not enabled. */
1288 if (fa->fsx_projid > (__uint16_t)-1 &&
1289 !xfs_sb_version_hasprojid32bit(&ip->i_mount->m_sb))
1290 return -EINVAL;
1291
1292 /*
1293 * Project Quota ID state is only allowed to change from within the init
1294 * namespace. Enforce that restriction only if we are trying to change
1295 * the quota ID state. Everything else is allowed in user namespaces.
1296 */
1297 if (current_user_ns() == &init_user_ns)
1298 return 0;
1299
1300 if (xfs_get_projid(ip) != fa->fsx_projid)
1301 return -EINVAL;
e7b89481 1302 if ((fa->fsx_xflags & FS_XFLAG_PROJINHERIT) !=
23bd0735
DC
1303 (ip->i_d.di_flags & XFS_DIFLAG_PROJINHERIT))
1304 return -EINVAL;
1305
1306 return 0;
1307}
25fe55e8
CH
1308
1309STATIC int
1310xfs_ioctl_setattr(
1311 xfs_inode_t *ip,
fd179b9c 1312 struct fsxattr *fa)
25fe55e8
CH
1313{
1314 struct xfs_mount *mp = ip->i_mount;
1315 struct xfs_trans *tp;
7d095257 1316 struct xfs_dquot *udqp = NULL;
92f8ff73 1317 struct xfs_dquot *pdqp = NULL;
25fe55e8
CH
1318 struct xfs_dquot *olddquot = NULL;
1319 int code;
3a6a854a 1320 int join_flags = 0;
25fe55e8 1321
cca28fb8 1322 trace_xfs_ioctl_setattr(ip);
25fe55e8 1323
23bd0735
DC
1324 code = xfs_ioctl_setattr_check_projid(ip, fa);
1325 if (code)
1326 return code;
23963e54 1327
25fe55e8
CH
1328 /*
1329 * If disk quotas is on, we make sure that the dquots do exist on disk,
1330 * before we start any other transactions. Trying to do this later
1331 * is messy. We don't care to take a readlock to look at the ids
1332 * in inode here, because we can't hold it across the trans_reserve.
1333 * If the IDs do change before we take the ilock, we're covered
1334 * because the i_*dquot fields will get updated anyway.
1335 */
fd179b9c 1336 if (XFS_IS_QUOTA_ON(mp)) {
7d095257 1337 code = xfs_qm_vop_dqalloc(ip, ip->i_d.di_uid,
25fe55e8 1338 ip->i_d.di_gid, fa->fsx_projid,
92f8ff73 1339 XFS_QMOPT_PQUOTA, &udqp, NULL, &pdqp);
25fe55e8
CH
1340 if (code)
1341 return code;
1342 }
1343
3a6a854a
DC
1344 /*
1345 * Changing DAX config may require inode locking for mapping
1346 * invalidation. These need to be held all the way to transaction commit
1347 * or cancel time, so need to be passed through to
1348 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1349 * appropriately.
1350 */
1351 code = xfs_ioctl_setattr_dax_invalidate(ip, fa, &join_flags);
1352 if (code)
1353 goto error_free_dquots;
1354
1355 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
8f3d17ab
DC
1356 if (IS_ERR(tp)) {
1357 code = PTR_ERR(tp);
1358 goto error_free_dquots;
25fe55e8
CH
1359 }
1360
25fe55e8 1361
fd179b9c
DC
1362 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp) &&
1363 xfs_get_projid(ip) != fa->fsx_projid) {
1364 code = xfs_qm_vop_chown_reserve(tp, ip, udqp, NULL, pdqp,
1365 capable(CAP_FOWNER) ? XFS_QMOPT_FORCE_RES : 0);
1366 if (code) /* out of quota */
d4388d3c 1367 goto error_trans_cancel;
25fe55e8
CH
1368 }
1369
d4388d3c
DC
1370 code = xfs_ioctl_setattr_check_extsize(ip, fa);
1371 if (code)
1372 goto error_trans_cancel;
25fe55e8 1373
f7ca3522
DW
1374 code = xfs_ioctl_setattr_check_cowextsize(ip, fa);
1375 if (code)
1376 goto error_trans_cancel;
1377
29a17c00
DC
1378 code = xfs_ioctl_setattr_xflags(tp, ip, fa);
1379 if (code)
d4388d3c 1380 goto error_trans_cancel;
25fe55e8
CH
1381
1382 /*
fd179b9c
DC
1383 * Change file ownership. Must be the owner or privileged. CAP_FSETID
1384 * overrides the following restrictions:
1385 *
1386 * The set-user-ID and set-group-ID bits of a file will be cleared upon
1387 * successful return from chown()
25fe55e8 1388 */
25fe55e8 1389
c19b3b05 1390 if ((VFS_I(ip)->i_mode & (S_ISUID|S_ISGID)) &&
fd179b9c 1391 !capable_wrt_inode_uidgid(VFS_I(ip), CAP_FSETID))
c19b3b05 1392 VFS_I(ip)->i_mode &= ~(S_ISUID|S_ISGID);
25fe55e8 1393
fd179b9c
DC
1394 /* Change the ownerships and register project quota modifications */
1395 if (xfs_get_projid(ip) != fa->fsx_projid) {
1396 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp)) {
1397 olddquot = xfs_qm_vop_chown(tp, ip,
1398 &ip->i_pdquot, pdqp);
1399 }
1400 ASSERT(ip->i_d.di_version > 1);
1401 xfs_set_projid(ip, fa->fsx_projid);
f13fae2d 1402 }
25fe55e8 1403
a872703f
DC
1404 /*
1405 * Only set the extent size hint if we've already determined that the
1406 * extent size hint should be set on the inode. If no extent size flags
1407 * are set on the inode then unconditionally clear the extent size hint.
1408 */
fd179b9c
DC
1409 if (ip->i_d.di_flags & (XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT))
1410 ip->i_d.di_extsize = fa->fsx_extsize >> mp->m_sb.sb_blocklog;
1411 else
1412 ip->i_d.di_extsize = 0;
f7ca3522
DW
1413 if (ip->i_d.di_version == 3 &&
1414 (ip->i_d.di_flags2 & XFS_DIFLAG2_COWEXTSIZE))
1415 ip->i_d.di_cowextsize = fa->fsx_cowextsize >>
1416 mp->m_sb.sb_blocklog;
1417 else
1418 ip->i_d.di_cowextsize = 0;
25fe55e8 1419
70393313 1420 code = xfs_trans_commit(tp);
25fe55e8
CH
1421
1422 /*
1423 * Release any dquot(s) the inode had kept before chown.
1424 */
7d095257
CH
1425 xfs_qm_dqrele(olddquot);
1426 xfs_qm_dqrele(udqp);
92f8ff73 1427 xfs_qm_dqrele(pdqp);
25fe55e8 1428
288699fe 1429 return code;
25fe55e8 1430
d4388d3c 1431error_trans_cancel:
4906e215 1432 xfs_trans_cancel(tp);
8f3d17ab 1433error_free_dquots:
7d095257 1434 xfs_qm_dqrele(udqp);
92f8ff73 1435 xfs_qm_dqrele(pdqp);
25fe55e8
CH
1436 return code;
1437}
1438
1da177e4 1439STATIC int
df26cfe8 1440xfs_ioc_fssetxattr(
1da177e4
LT
1441 xfs_inode_t *ip,
1442 struct file *filp,
1da177e4
LT
1443 void __user *arg)
1444{
1445 struct fsxattr fa;
d9457dc0 1446 int error;
df26cfe8
LM
1447
1448 if (copy_from_user(&fa, arg, sizeof(fa)))
1449 return -EFAULT;
1da177e4 1450
d9457dc0
JK
1451 error = mnt_want_write_file(filp);
1452 if (error)
1453 return error;
fd179b9c 1454 error = xfs_ioctl_setattr(ip, &fa);
d9457dc0 1455 mnt_drop_write_file(filp);
2451337d 1456 return error;
df26cfe8 1457}
1da177e4 1458
df26cfe8
LM
1459STATIC int
1460xfs_ioc_getxflags(
1461 xfs_inode_t *ip,
1462 void __user *arg)
1463{
1464 unsigned int flags;
1da177e4 1465
df26cfe8
LM
1466 flags = xfs_di2lxflags(ip->i_d.di_flags);
1467 if (copy_to_user(arg, &flags, sizeof(flags)))
1468 return -EFAULT;
1469 return 0;
1470}
1da177e4 1471
df26cfe8
LM
1472STATIC int
1473xfs_ioc_setxflags(
f96291f6 1474 struct xfs_inode *ip,
df26cfe8
LM
1475 struct file *filp,
1476 void __user *arg)
1477{
f96291f6 1478 struct xfs_trans *tp;
25fe55e8 1479 struct fsxattr fa;
df26cfe8 1480 unsigned int flags;
3a6a854a 1481 int join_flags = 0;
f96291f6 1482 int error;
1da177e4 1483
df26cfe8
LM
1484 if (copy_from_user(&flags, arg, sizeof(flags)))
1485 return -EFAULT;
1da177e4 1486
df26cfe8
LM
1487 if (flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL | \
1488 FS_NOATIME_FL | FS_NODUMP_FL | \
1489 FS_SYNC_FL))
1490 return -EOPNOTSUPP;
1da177e4 1491
25fe55e8 1492 fa.fsx_xflags = xfs_merge_ioc_xflags(flags, xfs_ip2xflags(ip));
1da177e4 1493
d9457dc0
JK
1494 error = mnt_want_write_file(filp);
1495 if (error)
1496 return error;
f96291f6 1497
3a6a854a
DC
1498 /*
1499 * Changing DAX config may require inode locking for mapping
1500 * invalidation. These need to be held all the way to transaction commit
1501 * or cancel time, so need to be passed through to
1502 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1503 * appropriately.
1504 */
1505 error = xfs_ioctl_setattr_dax_invalidate(ip, &fa, &join_flags);
1506 if (error)
1507 goto out_drop_write;
1508
1509 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
f96291f6
DC
1510 if (IS_ERR(tp)) {
1511 error = PTR_ERR(tp);
1512 goto out_drop_write;
1513 }
1514
1515 error = xfs_ioctl_setattr_xflags(tp, ip, &fa);
1516 if (error) {
4906e215 1517 xfs_trans_cancel(tp);
f96291f6
DC
1518 goto out_drop_write;
1519 }
1520
70393313 1521 error = xfs_trans_commit(tp);
f96291f6 1522out_drop_write:
d9457dc0 1523 mnt_drop_write_file(filp);
2451337d 1524 return error;
1da177e4
LT
1525}
1526
8a7141a8 1527STATIC int
1dbba086 1528xfs_getbmap_format(void **ap, struct getbmapx *bmv)
8a7141a8 1529{
b972d079 1530 struct getbmap __user *base = (struct getbmap __user *)*ap;
8a7141a8
ES
1531
1532 /* copy only getbmap portion (not getbmapx) */
1533 if (copy_to_user(base, bmv, sizeof(struct getbmap)))
2451337d 1534 return -EFAULT;
8a7141a8
ES
1535
1536 *ap += sizeof(struct getbmap);
1537 return 0;
1538}
1539
1da177e4
LT
1540STATIC int
1541xfs_ioc_getbmap(
8f3e2058 1542 struct file *file,
1da177e4
LT
1543 unsigned int cmd,
1544 void __user *arg)
1545{
8a7141a8 1546 struct getbmapx bmx;
1da177e4
LT
1547 int error;
1548
8a7141a8 1549 if (copy_from_user(&bmx, arg, sizeof(struct getbmapx)))
b474c7ae 1550 return -EFAULT;
1da177e4 1551
8a7141a8 1552 if (bmx.bmv_count < 2)
b474c7ae 1553 return -EINVAL;
1da177e4 1554
8a7141a8 1555 bmx.bmv_iflags = (cmd == XFS_IOC_GETBMAPA ? BMV_IF_ATTRFORK : 0);
8f3e2058 1556 if (file->f_mode & FMODE_NOCMTIME)
8a7141a8 1557 bmx.bmv_iflags |= BMV_IF_NO_DMAPI_READ;
1da177e4 1558
8f3e2058 1559 error = xfs_getbmap(XFS_I(file_inode(file)), &bmx, xfs_getbmap_format,
b972d079 1560 (__force struct getbmap *)arg+1);
1da177e4 1561 if (error)
2451337d 1562 return error;
1da177e4 1563
8a7141a8
ES
1564 /* copy back header - only size of getbmap */
1565 if (copy_to_user(arg, &bmx, sizeof(struct getbmap)))
b474c7ae 1566 return -EFAULT;
1da177e4
LT
1567 return 0;
1568}
1569
8a7141a8 1570STATIC int
1dbba086 1571xfs_getbmapx_format(void **ap, struct getbmapx *bmv)
8a7141a8 1572{
b972d079 1573 struct getbmapx __user *base = (struct getbmapx __user *)*ap;
8a7141a8
ES
1574
1575 if (copy_to_user(base, bmv, sizeof(struct getbmapx)))
2451337d 1576 return -EFAULT;
8a7141a8
ES
1577
1578 *ap += sizeof(struct getbmapx);
1579 return 0;
1580}
1581
1da177e4
LT
1582STATIC int
1583xfs_ioc_getbmapx(
993386c1 1584 struct xfs_inode *ip,
1da177e4
LT
1585 void __user *arg)
1586{
1587 struct getbmapx bmx;
1da177e4
LT
1588 int error;
1589
1590 if (copy_from_user(&bmx, arg, sizeof(bmx)))
b474c7ae 1591 return -EFAULT;
1da177e4
LT
1592
1593 if (bmx.bmv_count < 2)
b474c7ae 1594 return -EINVAL;
1da177e4 1595
8a7141a8 1596 if (bmx.bmv_iflags & (~BMV_IF_VALID))
b474c7ae 1597 return -EINVAL;
1da177e4 1598
8a7141a8 1599 error = xfs_getbmap(ip, &bmx, xfs_getbmapx_format,
b972d079 1600 (__force struct getbmapx *)arg+1);
1da177e4 1601 if (error)
2451337d 1602 return error;
1da177e4 1603
8a7141a8
ES
1604 /* copy back header */
1605 if (copy_to_user(arg, &bmx, sizeof(struct getbmapx)))
b474c7ae 1606 return -EFAULT;
1da177e4
LT
1607
1608 return 0;
1609}
df26cfe8 1610
a133d952
DC
1611int
1612xfs_ioc_swapext(
1613 xfs_swapext_t *sxp)
1614{
1615 xfs_inode_t *ip, *tip;
1616 struct fd f, tmp;
1617 int error = 0;
1618
1619 /* Pull information for the target fd */
1620 f = fdget((int)sxp->sx_fdtarget);
1621 if (!f.file) {
2451337d 1622 error = -EINVAL;
a133d952
DC
1623 goto out;
1624 }
1625
1626 if (!(f.file->f_mode & FMODE_WRITE) ||
1627 !(f.file->f_mode & FMODE_READ) ||
1628 (f.file->f_flags & O_APPEND)) {
2451337d 1629 error = -EBADF;
a133d952
DC
1630 goto out_put_file;
1631 }
1632
1633 tmp = fdget((int)sxp->sx_fdtmp);
1634 if (!tmp.file) {
2451337d 1635 error = -EINVAL;
a133d952
DC
1636 goto out_put_file;
1637 }
1638
1639 if (!(tmp.file->f_mode & FMODE_WRITE) ||
1640 !(tmp.file->f_mode & FMODE_READ) ||
1641 (tmp.file->f_flags & O_APPEND)) {
2451337d 1642 error = -EBADF;
a133d952
DC
1643 goto out_put_tmp_file;
1644 }
1645
1646 if (IS_SWAPFILE(file_inode(f.file)) ||
1647 IS_SWAPFILE(file_inode(tmp.file))) {
2451337d 1648 error = -EINVAL;
a133d952
DC
1649 goto out_put_tmp_file;
1650 }
1651
7f1b6245
JH
1652 /*
1653 * We need to ensure that the fds passed in point to XFS inodes
1654 * before we cast and access them as XFS structures as we have no
1655 * control over what the user passes us here.
1656 */
1657 if (f.file->f_op != &xfs_file_operations ||
1658 tmp.file->f_op != &xfs_file_operations) {
1659 error = -EINVAL;
1660 goto out_put_tmp_file;
1661 }
1662
a133d952
DC
1663 ip = XFS_I(file_inode(f.file));
1664 tip = XFS_I(file_inode(tmp.file));
1665
1666 if (ip->i_mount != tip->i_mount) {
2451337d 1667 error = -EINVAL;
a133d952
DC
1668 goto out_put_tmp_file;
1669 }
1670
1671 if (ip->i_ino == tip->i_ino) {
2451337d 1672 error = -EINVAL;
a133d952
DC
1673 goto out_put_tmp_file;
1674 }
1675
1676 if (XFS_FORCED_SHUTDOWN(ip->i_mount)) {
2451337d 1677 error = -EIO;
a133d952
DC
1678 goto out_put_tmp_file;
1679 }
1680
1681 error = xfs_swap_extents(ip, tip, sxp);
1682
1683 out_put_tmp_file:
1684 fdput(tmp);
1685 out_put_file:
1686 fdput(f);
1687 out:
1688 return error;
1689}
1690
4d4be482
CH
1691/*
1692 * Note: some of the ioctl's return positive numbers as a
1693 * byte count indicating success, such as readlink_by_handle.
1694 * So we don't "sign flip" like most other routines. This means
1695 * true errors need to be returned as a negative value.
1696 */
1697long
1698xfs_file_ioctl(
df26cfe8 1699 struct file *filp,
df26cfe8 1700 unsigned int cmd,
4d4be482 1701 unsigned long p)
df26cfe8 1702{
496ad9aa 1703 struct inode *inode = file_inode(filp);
4d4be482
CH
1704 struct xfs_inode *ip = XFS_I(inode);
1705 struct xfs_mount *mp = ip->i_mount;
1706 void __user *arg = (void __user *)p;
df26cfe8
LM
1707 int error;
1708
cca28fb8 1709 trace_xfs_file_ioctl(ip);
4d4be482
CH
1710
1711 switch (cmd) {
a46db608
CH
1712 case FITRIM:
1713 return xfs_ioc_trim(mp, arg);
df26cfe8
LM
1714 case XFS_IOC_ALLOCSP:
1715 case XFS_IOC_FREESP:
1716 case XFS_IOC_RESVSP:
1717 case XFS_IOC_UNRESVSP:
1718 case XFS_IOC_ALLOCSP64:
1719 case XFS_IOC_FREESP64:
1720 case XFS_IOC_RESVSP64:
44722352
DC
1721 case XFS_IOC_UNRESVSP64:
1722 case XFS_IOC_ZERO_RANGE: {
743bb465 1723 xfs_flock64_t bf;
df26cfe8 1724
743bb465 1725 if (copy_from_user(&bf, arg, sizeof(bf)))
b474c7ae 1726 return -EFAULT;
8f3e2058 1727 return xfs_ioc_space(filp, cmd, &bf);
743bb465 1728 }
df26cfe8
LM
1729 case XFS_IOC_DIOINFO: {
1730 struct dioattr da;
1731 xfs_buftarg_t *target =
1732 XFS_IS_REALTIME_INODE(ip) ?
1733 mp->m_rtdev_targp : mp->m_ddev_targp;
1734
7c71ee78 1735 da.d_mem = da.d_miniosz = target->bt_logical_sectorsize;
df26cfe8
LM
1736 da.d_maxiosz = INT_MAX & ~(da.d_miniosz - 1);
1737
1738 if (copy_to_user(arg, &da, sizeof(da)))
b474c7ae 1739 return -EFAULT;
df26cfe8
LM
1740 return 0;
1741 }
1742
1743 case XFS_IOC_FSBULKSTAT_SINGLE:
1744 case XFS_IOC_FSBULKSTAT:
1745 case XFS_IOC_FSINUMBERS:
1746 return xfs_ioc_bulkstat(mp, cmd, arg);
1747
1748 case XFS_IOC_FSGEOMETRY_V1:
1749 return xfs_ioc_fsgeometry_v1(mp, arg);
1750
1751 case XFS_IOC_FSGEOMETRY:
1752 return xfs_ioc_fsgeometry(mp, arg);
1753
1754 case XFS_IOC_GETVERSION:
1755 return put_user(inode->i_generation, (int __user *)arg);
1756
1757 case XFS_IOC_FSGETXATTR:
1758 return xfs_ioc_fsgetxattr(ip, 0, arg);
1759 case XFS_IOC_FSGETXATTRA:
1760 return xfs_ioc_fsgetxattr(ip, 1, arg);
65e67f51
LM
1761 case XFS_IOC_FSSETXATTR:
1762 return xfs_ioc_fssetxattr(ip, filp, arg);
df26cfe8 1763 case XFS_IOC_GETXFLAGS:
65e67f51 1764 return xfs_ioc_getxflags(ip, arg);
df26cfe8 1765 case XFS_IOC_SETXFLAGS:
65e67f51 1766 return xfs_ioc_setxflags(ip, filp, arg);
df26cfe8
LM
1767
1768 case XFS_IOC_FSSETDM: {
1769 struct fsdmidata dmi;
1770
1771 if (copy_from_user(&dmi, arg, sizeof(dmi)))
b474c7ae 1772 return -EFAULT;
df26cfe8 1773
d9457dc0
JK
1774 error = mnt_want_write_file(filp);
1775 if (error)
1776 return error;
1777
df26cfe8
LM
1778 error = xfs_set_dmattrs(ip, dmi.fsd_dmevmask,
1779 dmi.fsd_dmstate);
d9457dc0 1780 mnt_drop_write_file(filp);
2451337d 1781 return error;
df26cfe8
LM
1782 }
1783
1784 case XFS_IOC_GETBMAP:
1785 case XFS_IOC_GETBMAPA:
8f3e2058 1786 return xfs_ioc_getbmap(filp, cmd, arg);
df26cfe8
LM
1787
1788 case XFS_IOC_GETBMAPX:
1789 return xfs_ioc_getbmapx(ip, arg);
1790
1791 case XFS_IOC_FD_TO_HANDLE:
1792 case XFS_IOC_PATH_TO_HANDLE:
743bb465 1793 case XFS_IOC_PATH_TO_FSHANDLE: {
1794 xfs_fsop_handlereq_t hreq;
df26cfe8 1795
743bb465 1796 if (copy_from_user(&hreq, arg, sizeof(hreq)))
b474c7ae 1797 return -EFAULT;
743bb465 1798 return xfs_find_handle(cmd, &hreq);
1799 }
1800 case XFS_IOC_OPEN_BY_HANDLE: {
1801 xfs_fsop_handlereq_t hreq;
df26cfe8 1802
743bb465 1803 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1804 return -EFAULT;
d296d30a 1805 return xfs_open_by_handle(filp, &hreq);
743bb465 1806 }
df26cfe8 1807 case XFS_IOC_FSSETDM_BY_HANDLE:
d296d30a 1808 return xfs_fssetdm_by_handle(filp, arg);
df26cfe8 1809
743bb465 1810 case XFS_IOC_READLINK_BY_HANDLE: {
1811 xfs_fsop_handlereq_t hreq;
df26cfe8 1812
743bb465 1813 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1814 return -EFAULT;
d296d30a 1815 return xfs_readlink_by_handle(filp, &hreq);
743bb465 1816 }
df26cfe8 1817 case XFS_IOC_ATTRLIST_BY_HANDLE:
d296d30a 1818 return xfs_attrlist_by_handle(filp, arg);
df26cfe8
LM
1819
1820 case XFS_IOC_ATTRMULTI_BY_HANDLE:
d296d30a 1821 return xfs_attrmulti_by_handle(filp, arg);
df26cfe8
LM
1822
1823 case XFS_IOC_SWAPEXT: {
743bb465 1824 struct xfs_swapext sxp;
1825
1826 if (copy_from_user(&sxp, arg, sizeof(xfs_swapext_t)))
b474c7ae 1827 return -EFAULT;
d9457dc0
JK
1828 error = mnt_want_write_file(filp);
1829 if (error)
1830 return error;
a133d952 1831 error = xfs_ioc_swapext(&sxp);
d9457dc0 1832 mnt_drop_write_file(filp);
2451337d 1833 return error;
df26cfe8
LM
1834 }
1835
1836 case XFS_IOC_FSCOUNTS: {
1837 xfs_fsop_counts_t out;
1838
1839 error = xfs_fs_counts(mp, &out);
1840 if (error)
2451337d 1841 return error;
df26cfe8
LM
1842
1843 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1844 return -EFAULT;
df26cfe8
LM
1845 return 0;
1846 }
1847
1848 case XFS_IOC_SET_RESBLKS: {
1849 xfs_fsop_resblks_t inout;
1850 __uint64_t in;
1851
1852 if (!capable(CAP_SYS_ADMIN))
1853 return -EPERM;
1854
d5db0f97 1855 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 1856 return -EROFS;
d5db0f97 1857
df26cfe8 1858 if (copy_from_user(&inout, arg, sizeof(inout)))
b474c7ae 1859 return -EFAULT;
df26cfe8 1860
d9457dc0
JK
1861 error = mnt_want_write_file(filp);
1862 if (error)
1863 return error;
1864
df26cfe8
LM
1865 /* input parameter is passed in resblks field of structure */
1866 in = inout.resblks;
1867 error = xfs_reserve_blocks(mp, &in, &inout);
d9457dc0 1868 mnt_drop_write_file(filp);
df26cfe8 1869 if (error)
2451337d 1870 return error;
df26cfe8
LM
1871
1872 if (copy_to_user(arg, &inout, sizeof(inout)))
b474c7ae 1873 return -EFAULT;
df26cfe8
LM
1874 return 0;
1875 }
1876
1877 case XFS_IOC_GET_RESBLKS: {
1878 xfs_fsop_resblks_t out;
1879
1880 if (!capable(CAP_SYS_ADMIN))
1881 return -EPERM;
1882
1883 error = xfs_reserve_blocks(mp, NULL, &out);
1884 if (error)
2451337d 1885 return error;
df26cfe8
LM
1886
1887 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1888 return -EFAULT;
df26cfe8
LM
1889
1890 return 0;
1891 }
1892
1893 case XFS_IOC_FSGROWFSDATA: {
1894 xfs_growfs_data_t in;
1895
df26cfe8 1896 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1897 return -EFAULT;
df26cfe8 1898
d9457dc0
JK
1899 error = mnt_want_write_file(filp);
1900 if (error)
1901 return error;
df26cfe8 1902 error = xfs_growfs_data(mp, &in);
d9457dc0 1903 mnt_drop_write_file(filp);
2451337d 1904 return error;
df26cfe8
LM
1905 }
1906
1907 case XFS_IOC_FSGROWFSLOG: {
1908 xfs_growfs_log_t in;
1909
df26cfe8 1910 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1911 return -EFAULT;
df26cfe8 1912
d9457dc0
JK
1913 error = mnt_want_write_file(filp);
1914 if (error)
1915 return error;
df26cfe8 1916 error = xfs_growfs_log(mp, &in);
d9457dc0 1917 mnt_drop_write_file(filp);
2451337d 1918 return error;
df26cfe8
LM
1919 }
1920
1921 case XFS_IOC_FSGROWFSRT: {
1922 xfs_growfs_rt_t in;
1923
df26cfe8 1924 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1925 return -EFAULT;
df26cfe8 1926
d9457dc0
JK
1927 error = mnt_want_write_file(filp);
1928 if (error)
1929 return error;
df26cfe8 1930 error = xfs_growfs_rt(mp, &in);
d9457dc0 1931 mnt_drop_write_file(filp);
2451337d 1932 return error;
df26cfe8
LM
1933 }
1934
df26cfe8
LM
1935 case XFS_IOC_GOINGDOWN: {
1936 __uint32_t in;
1937
1938 if (!capable(CAP_SYS_ADMIN))
1939 return -EPERM;
1940
1941 if (get_user(in, (__uint32_t __user *)arg))
b474c7ae 1942 return -EFAULT;
df26cfe8 1943
2451337d 1944 return xfs_fs_goingdown(mp, in);
df26cfe8
LM
1945 }
1946
1947 case XFS_IOC_ERROR_INJECTION: {
1948 xfs_error_injection_t in;
1949
1950 if (!capable(CAP_SYS_ADMIN))
1951 return -EPERM;
1952
1953 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1954 return -EFAULT;
df26cfe8 1955
2451337d 1956 return xfs_errortag_add(in.errtag, mp);
df26cfe8
LM
1957 }
1958
1959 case XFS_IOC_ERROR_CLEARALL:
1960 if (!capable(CAP_SYS_ADMIN))
1961 return -EPERM;
1962
2451337d 1963 return xfs_errortag_clearall(mp, 1);
df26cfe8 1964
8ca149de 1965 case XFS_IOC_FREE_EOFBLOCKS: {
b9fe5052
DE
1966 struct xfs_fs_eofblocks eofb;
1967 struct xfs_eofblocks keofb;
8ca149de 1968
8c567a7f
DE
1969 if (!capable(CAP_SYS_ADMIN))
1970 return -EPERM;
1971
1972 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 1973 return -EROFS;
8c567a7f 1974
8ca149de 1975 if (copy_from_user(&eofb, arg, sizeof(eofb)))
b474c7ae 1976 return -EFAULT;
8ca149de 1977
b9fe5052
DE
1978 error = xfs_fs_eofblocks_from_user(&eofb, &keofb);
1979 if (error)
2451337d 1980 return error;
8ca149de 1981
2451337d 1982 return xfs_icache_free_eofblocks(mp, &keofb);
8ca149de
BF
1983 }
1984
df26cfe8
LM
1985 default:
1986 return -ENOTTY;
1987 }
1988}