]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blob - fs/xfs/xfs_ioctl.c
55ec4d44d4ba270306af233bdae875b4d39a6516
[mirror_ubuntu-bionic-kernel.git] / fs / xfs / xfs_ioctl.c
1 /*
2 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
3 * All Rights Reserved.
4 *
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License as
7 * published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
17 */
18 #include "xfs.h"
19 #include "xfs_fs.h"
20 #include "xfs_shared.h"
21 #include "xfs_format.h"
22 #include "xfs_log_format.h"
23 #include "xfs_trans_resv.h"
24 #include "xfs_mount.h"
25 #include "xfs_inode.h"
26 #include "xfs_ioctl.h"
27 #include "xfs_alloc.h"
28 #include "xfs_rtalloc.h"
29 #include "xfs_itable.h"
30 #include "xfs_error.h"
31 #include "xfs_attr.h"
32 #include "xfs_bmap.h"
33 #include "xfs_bmap_util.h"
34 #include "xfs_fsops.h"
35 #include "xfs_discard.h"
36 #include "xfs_quota.h"
37 #include "xfs_export.h"
38 #include "xfs_trace.h"
39 #include "xfs_icache.h"
40 #include "xfs_symlink.h"
41 #include "xfs_trans.h"
42 #include "xfs_pnfs.h"
43 #include "xfs_acl.h"
44
45 #include <linux/capability.h>
46 #include <linux/dcache.h>
47 #include <linux/mount.h>
48 #include <linux/namei.h>
49 #include <linux/pagemap.h>
50 #include <linux/slab.h>
51 #include <linux/exportfs.h>
52
53 /*
54 * xfs_find_handle maps from userspace xfs_fsop_handlereq structure to
55 * a file or fs handle.
56 *
57 * XFS_IOC_PATH_TO_FSHANDLE
58 * returns fs handle for a mount point or path within that mount point
59 * XFS_IOC_FD_TO_HANDLE
60 * returns full handle for a FD opened in user space
61 * XFS_IOC_PATH_TO_HANDLE
62 * returns full handle for a path
63 */
64 int
65 xfs_find_handle(
66 unsigned int cmd,
67 xfs_fsop_handlereq_t *hreq)
68 {
69 int hsize;
70 xfs_handle_t handle;
71 struct inode *inode;
72 struct fd f = {NULL};
73 struct path path;
74 int error;
75 struct xfs_inode *ip;
76
77 if (cmd == XFS_IOC_FD_TO_HANDLE) {
78 f = fdget(hreq->fd);
79 if (!f.file)
80 return -EBADF;
81 inode = file_inode(f.file);
82 } else {
83 error = user_lpath((const char __user *)hreq->path, &path);
84 if (error)
85 return error;
86 inode = d_inode(path.dentry);
87 }
88 ip = XFS_I(inode);
89
90 /*
91 * We can only generate handles for inodes residing on a XFS filesystem,
92 * and only for regular files, directories or symbolic links.
93 */
94 error = -EINVAL;
95 if (inode->i_sb->s_magic != XFS_SB_MAGIC)
96 goto out_put;
97
98 error = -EBADF;
99 if (!S_ISREG(inode->i_mode) &&
100 !S_ISDIR(inode->i_mode) &&
101 !S_ISLNK(inode->i_mode))
102 goto out_put;
103
104
105 memcpy(&handle.ha_fsid, ip->i_mount->m_fixedfsid, sizeof(xfs_fsid_t));
106
107 if (cmd == XFS_IOC_PATH_TO_FSHANDLE) {
108 /*
109 * This handle only contains an fsid, zero the rest.
110 */
111 memset(&handle.ha_fid, 0, sizeof(handle.ha_fid));
112 hsize = sizeof(xfs_fsid_t);
113 } else {
114 handle.ha_fid.fid_len = sizeof(xfs_fid_t) -
115 sizeof(handle.ha_fid.fid_len);
116 handle.ha_fid.fid_pad = 0;
117 handle.ha_fid.fid_gen = ip->i_d.di_gen;
118 handle.ha_fid.fid_ino = ip->i_ino;
119
120 hsize = XFS_HSIZE(handle);
121 }
122
123 error = -EFAULT;
124 if (copy_to_user(hreq->ohandle, &handle, hsize) ||
125 copy_to_user(hreq->ohandlen, &hsize, sizeof(__s32)))
126 goto out_put;
127
128 error = 0;
129
130 out_put:
131 if (cmd == XFS_IOC_FD_TO_HANDLE)
132 fdput(f);
133 else
134 path_put(&path);
135 return error;
136 }
137
138 /*
139 * No need to do permission checks on the various pathname components
140 * as the handle operations are privileged.
141 */
142 STATIC int
143 xfs_handle_acceptable(
144 void *context,
145 struct dentry *dentry)
146 {
147 return 1;
148 }
149
150 /*
151 * Convert userspace handle data into a dentry.
152 */
153 struct dentry *
154 xfs_handle_to_dentry(
155 struct file *parfilp,
156 void __user *uhandle,
157 u32 hlen)
158 {
159 xfs_handle_t handle;
160 struct xfs_fid64 fid;
161
162 /*
163 * Only allow handle opens under a directory.
164 */
165 if (!S_ISDIR(file_inode(parfilp)->i_mode))
166 return ERR_PTR(-ENOTDIR);
167
168 if (hlen != sizeof(xfs_handle_t))
169 return ERR_PTR(-EINVAL);
170 if (copy_from_user(&handle, uhandle, hlen))
171 return ERR_PTR(-EFAULT);
172 if (handle.ha_fid.fid_len !=
173 sizeof(handle.ha_fid) - sizeof(handle.ha_fid.fid_len))
174 return ERR_PTR(-EINVAL);
175
176 memset(&fid, 0, sizeof(struct fid));
177 fid.ino = handle.ha_fid.fid_ino;
178 fid.gen = handle.ha_fid.fid_gen;
179
180 return exportfs_decode_fh(parfilp->f_path.mnt, (struct fid *)&fid, 3,
181 FILEID_INO32_GEN | XFS_FILEID_TYPE_64FLAG,
182 xfs_handle_acceptable, NULL);
183 }
184
185 STATIC struct dentry *
186 xfs_handlereq_to_dentry(
187 struct file *parfilp,
188 xfs_fsop_handlereq_t *hreq)
189 {
190 return xfs_handle_to_dentry(parfilp, hreq->ihandle, hreq->ihandlen);
191 }
192
193 int
194 xfs_open_by_handle(
195 struct file *parfilp,
196 xfs_fsop_handlereq_t *hreq)
197 {
198 const struct cred *cred = current_cred();
199 int error;
200 int fd;
201 int permflag;
202 struct file *filp;
203 struct inode *inode;
204 struct dentry *dentry;
205 fmode_t fmode;
206 struct path path;
207
208 if (!capable(CAP_SYS_ADMIN))
209 return -EPERM;
210
211 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
212 if (IS_ERR(dentry))
213 return PTR_ERR(dentry);
214 inode = d_inode(dentry);
215
216 /* Restrict xfs_open_by_handle to directories & regular files. */
217 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) {
218 error = -EPERM;
219 goto out_dput;
220 }
221
222 #if BITS_PER_LONG != 32
223 hreq->oflags |= O_LARGEFILE;
224 #endif
225
226 permflag = hreq->oflags;
227 fmode = OPEN_FMODE(permflag);
228 if ((!(permflag & O_APPEND) || (permflag & O_TRUNC)) &&
229 (fmode & FMODE_WRITE) && IS_APPEND(inode)) {
230 error = -EPERM;
231 goto out_dput;
232 }
233
234 if ((fmode & FMODE_WRITE) && IS_IMMUTABLE(inode)) {
235 error = -EACCES;
236 goto out_dput;
237 }
238
239 /* Can't write directories. */
240 if (S_ISDIR(inode->i_mode) && (fmode & FMODE_WRITE)) {
241 error = -EISDIR;
242 goto out_dput;
243 }
244
245 fd = get_unused_fd_flags(0);
246 if (fd < 0) {
247 error = fd;
248 goto out_dput;
249 }
250
251 path.mnt = parfilp->f_path.mnt;
252 path.dentry = dentry;
253 filp = dentry_open(&path, hreq->oflags, cred);
254 dput(dentry);
255 if (IS_ERR(filp)) {
256 put_unused_fd(fd);
257 return PTR_ERR(filp);
258 }
259
260 if (S_ISREG(inode->i_mode)) {
261 filp->f_flags |= O_NOATIME;
262 filp->f_mode |= FMODE_NOCMTIME;
263 }
264
265 fd_install(fd, filp);
266 return fd;
267
268 out_dput:
269 dput(dentry);
270 return error;
271 }
272
273 int
274 xfs_readlink_by_handle(
275 struct file *parfilp,
276 xfs_fsop_handlereq_t *hreq)
277 {
278 struct dentry *dentry;
279 __u32 olen;
280 void *link;
281 int error;
282
283 if (!capable(CAP_SYS_ADMIN))
284 return -EPERM;
285
286 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
287 if (IS_ERR(dentry))
288 return PTR_ERR(dentry);
289
290 /* Restrict this handle operation to symlinks only. */
291 if (!d_is_symlink(dentry)) {
292 error = -EINVAL;
293 goto out_dput;
294 }
295
296 if (copy_from_user(&olen, hreq->ohandlen, sizeof(__u32))) {
297 error = -EFAULT;
298 goto out_dput;
299 }
300
301 link = kmalloc(MAXPATHLEN+1, GFP_KERNEL);
302 if (!link) {
303 error = -ENOMEM;
304 goto out_dput;
305 }
306
307 error = xfs_readlink(XFS_I(d_inode(dentry)), link);
308 if (error)
309 goto out_kfree;
310 error = readlink_copy(hreq->ohandle, olen, link);
311 if (error)
312 goto out_kfree;
313
314 out_kfree:
315 kfree(link);
316 out_dput:
317 dput(dentry);
318 return error;
319 }
320
321 int
322 xfs_set_dmattrs(
323 xfs_inode_t *ip,
324 u_int evmask,
325 u_int16_t state)
326 {
327 xfs_mount_t *mp = ip->i_mount;
328 xfs_trans_t *tp;
329 int error;
330
331 if (!capable(CAP_SYS_ADMIN))
332 return -EPERM;
333
334 if (XFS_FORCED_SHUTDOWN(mp))
335 return -EIO;
336
337 tp = xfs_trans_alloc(mp, XFS_TRANS_SET_DMATTRS);
338 error = xfs_trans_reserve(tp, &M_RES(mp)->tr_ichange, 0, 0);
339 if (error) {
340 xfs_trans_cancel(tp);
341 return error;
342 }
343 xfs_ilock(ip, XFS_ILOCK_EXCL);
344 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL);
345
346 ip->i_d.di_dmevmask = evmask;
347 ip->i_d.di_dmstate = state;
348
349 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
350 error = xfs_trans_commit(tp);
351
352 return error;
353 }
354
355 STATIC int
356 xfs_fssetdm_by_handle(
357 struct file *parfilp,
358 void __user *arg)
359 {
360 int error;
361 struct fsdmidata fsd;
362 xfs_fsop_setdm_handlereq_t dmhreq;
363 struct dentry *dentry;
364
365 if (!capable(CAP_MKNOD))
366 return -EPERM;
367 if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t)))
368 return -EFAULT;
369
370 error = mnt_want_write_file(parfilp);
371 if (error)
372 return error;
373
374 dentry = xfs_handlereq_to_dentry(parfilp, &dmhreq.hreq);
375 if (IS_ERR(dentry)) {
376 mnt_drop_write_file(parfilp);
377 return PTR_ERR(dentry);
378 }
379
380 if (IS_IMMUTABLE(d_inode(dentry)) || IS_APPEND(d_inode(dentry))) {
381 error = -EPERM;
382 goto out;
383 }
384
385 if (copy_from_user(&fsd, dmhreq.data, sizeof(fsd))) {
386 error = -EFAULT;
387 goto out;
388 }
389
390 error = xfs_set_dmattrs(XFS_I(d_inode(dentry)), fsd.fsd_dmevmask,
391 fsd.fsd_dmstate);
392
393 out:
394 mnt_drop_write_file(parfilp);
395 dput(dentry);
396 return error;
397 }
398
399 STATIC int
400 xfs_attrlist_by_handle(
401 struct file *parfilp,
402 void __user *arg)
403 {
404 int error = -ENOMEM;
405 attrlist_cursor_kern_t *cursor;
406 xfs_fsop_attrlist_handlereq_t al_hreq;
407 struct dentry *dentry;
408 char *kbuf;
409
410 if (!capable(CAP_SYS_ADMIN))
411 return -EPERM;
412 if (copy_from_user(&al_hreq, arg, sizeof(xfs_fsop_attrlist_handlereq_t)))
413 return -EFAULT;
414 if (al_hreq.buflen < sizeof(struct attrlist) ||
415 al_hreq.buflen > XFS_XATTR_LIST_MAX)
416 return -EINVAL;
417
418 /*
419 * Reject flags, only allow namespaces.
420 */
421 if (al_hreq.flags & ~(ATTR_ROOT | ATTR_SECURE))
422 return -EINVAL;
423
424 dentry = xfs_handlereq_to_dentry(parfilp, &al_hreq.hreq);
425 if (IS_ERR(dentry))
426 return PTR_ERR(dentry);
427
428 kbuf = kmem_zalloc_large(al_hreq.buflen, KM_SLEEP);
429 if (!kbuf)
430 goto out_dput;
431
432 cursor = (attrlist_cursor_kern_t *)&al_hreq.pos;
433 error = xfs_attr_list(XFS_I(d_inode(dentry)), kbuf, al_hreq.buflen,
434 al_hreq.flags, cursor);
435 if (error)
436 goto out_kfree;
437
438 if (copy_to_user(al_hreq.buffer, kbuf, al_hreq.buflen))
439 error = -EFAULT;
440
441 out_kfree:
442 kmem_free(kbuf);
443 out_dput:
444 dput(dentry);
445 return error;
446 }
447
448 int
449 xfs_attrmulti_attr_get(
450 struct inode *inode,
451 unsigned char *name,
452 unsigned char __user *ubuf,
453 __uint32_t *len,
454 __uint32_t flags)
455 {
456 unsigned char *kbuf;
457 int error = -EFAULT;
458
459 if (*len > XFS_XATTR_SIZE_MAX)
460 return -EINVAL;
461 kbuf = kmem_zalloc_large(*len, KM_SLEEP);
462 if (!kbuf)
463 return -ENOMEM;
464
465 error = xfs_attr_get(XFS_I(inode), name, kbuf, (int *)len, flags);
466 if (error)
467 goto out_kfree;
468
469 if (copy_to_user(ubuf, kbuf, *len))
470 error = -EFAULT;
471
472 out_kfree:
473 kmem_free(kbuf);
474 return error;
475 }
476
477 int
478 xfs_attrmulti_attr_set(
479 struct inode *inode,
480 unsigned char *name,
481 const unsigned char __user *ubuf,
482 __uint32_t len,
483 __uint32_t flags)
484 {
485 unsigned char *kbuf;
486 int error;
487
488 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
489 return -EPERM;
490 if (len > XFS_XATTR_SIZE_MAX)
491 return -EINVAL;
492
493 kbuf = memdup_user(ubuf, len);
494 if (IS_ERR(kbuf))
495 return PTR_ERR(kbuf);
496
497 error = xfs_attr_set(XFS_I(inode), name, kbuf, len, flags);
498 if (!error)
499 xfs_forget_acl(inode, name, flags);
500 kfree(kbuf);
501 return error;
502 }
503
504 int
505 xfs_attrmulti_attr_remove(
506 struct inode *inode,
507 unsigned char *name,
508 __uint32_t flags)
509 {
510 int error;
511
512 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
513 return -EPERM;
514 error = xfs_attr_remove(XFS_I(inode), name, flags);
515 if (!error)
516 xfs_forget_acl(inode, name, flags);
517 return error;
518 }
519
520 STATIC int
521 xfs_attrmulti_by_handle(
522 struct file *parfilp,
523 void __user *arg)
524 {
525 int error;
526 xfs_attr_multiop_t *ops;
527 xfs_fsop_attrmulti_handlereq_t am_hreq;
528 struct dentry *dentry;
529 unsigned int i, size;
530 unsigned char *attr_name;
531
532 if (!capable(CAP_SYS_ADMIN))
533 return -EPERM;
534 if (copy_from_user(&am_hreq, arg, sizeof(xfs_fsop_attrmulti_handlereq_t)))
535 return -EFAULT;
536
537 /* overflow check */
538 if (am_hreq.opcount >= INT_MAX / sizeof(xfs_attr_multiop_t))
539 return -E2BIG;
540
541 dentry = xfs_handlereq_to_dentry(parfilp, &am_hreq.hreq);
542 if (IS_ERR(dentry))
543 return PTR_ERR(dentry);
544
545 error = -E2BIG;
546 size = am_hreq.opcount * sizeof(xfs_attr_multiop_t);
547 if (!size || size > 16 * PAGE_SIZE)
548 goto out_dput;
549
550 ops = memdup_user(am_hreq.ops, size);
551 if (IS_ERR(ops)) {
552 error = PTR_ERR(ops);
553 goto out_dput;
554 }
555
556 error = -ENOMEM;
557 attr_name = kmalloc(MAXNAMELEN, GFP_KERNEL);
558 if (!attr_name)
559 goto out_kfree_ops;
560
561 error = 0;
562 for (i = 0; i < am_hreq.opcount; i++) {
563 ops[i].am_error = strncpy_from_user((char *)attr_name,
564 ops[i].am_attrname, MAXNAMELEN);
565 if (ops[i].am_error == 0 || ops[i].am_error == MAXNAMELEN)
566 error = -ERANGE;
567 if (ops[i].am_error < 0)
568 break;
569
570 switch (ops[i].am_opcode) {
571 case ATTR_OP_GET:
572 ops[i].am_error = xfs_attrmulti_attr_get(
573 d_inode(dentry), attr_name,
574 ops[i].am_attrvalue, &ops[i].am_length,
575 ops[i].am_flags);
576 break;
577 case ATTR_OP_SET:
578 ops[i].am_error = mnt_want_write_file(parfilp);
579 if (ops[i].am_error)
580 break;
581 ops[i].am_error = xfs_attrmulti_attr_set(
582 d_inode(dentry), attr_name,
583 ops[i].am_attrvalue, ops[i].am_length,
584 ops[i].am_flags);
585 mnt_drop_write_file(parfilp);
586 break;
587 case ATTR_OP_REMOVE:
588 ops[i].am_error = mnt_want_write_file(parfilp);
589 if (ops[i].am_error)
590 break;
591 ops[i].am_error = xfs_attrmulti_attr_remove(
592 d_inode(dentry), attr_name,
593 ops[i].am_flags);
594 mnt_drop_write_file(parfilp);
595 break;
596 default:
597 ops[i].am_error = -EINVAL;
598 }
599 }
600
601 if (copy_to_user(am_hreq.ops, ops, size))
602 error = -EFAULT;
603
604 kfree(attr_name);
605 out_kfree_ops:
606 kfree(ops);
607 out_dput:
608 dput(dentry);
609 return error;
610 }
611
612 int
613 xfs_ioc_space(
614 struct xfs_inode *ip,
615 struct inode *inode,
616 struct file *filp,
617 int ioflags,
618 unsigned int cmd,
619 xfs_flock64_t *bf)
620 {
621 struct iattr iattr;
622 enum xfs_prealloc_flags flags = 0;
623 uint iolock = XFS_IOLOCK_EXCL;
624 int error;
625
626 /*
627 * Only allow the sys admin to reserve space unless
628 * unwritten extents are enabled.
629 */
630 if (!xfs_sb_version_hasextflgbit(&ip->i_mount->m_sb) &&
631 !capable(CAP_SYS_ADMIN))
632 return -EPERM;
633
634 if (inode->i_flags & (S_IMMUTABLE|S_APPEND))
635 return -EPERM;
636
637 if (!(filp->f_mode & FMODE_WRITE))
638 return -EBADF;
639
640 if (!S_ISREG(inode->i_mode))
641 return -EINVAL;
642
643 if (filp->f_flags & O_DSYNC)
644 flags |= XFS_PREALLOC_SYNC;
645 if (ioflags & XFS_IO_INVIS)
646 flags |= XFS_PREALLOC_INVISIBLE;
647
648 error = mnt_want_write_file(filp);
649 if (error)
650 return error;
651
652 xfs_ilock(ip, iolock);
653 error = xfs_break_layouts(inode, &iolock, false);
654 if (error)
655 goto out_unlock;
656
657 xfs_ilock(ip, XFS_MMAPLOCK_EXCL);
658 iolock |= XFS_MMAPLOCK_EXCL;
659
660 switch (bf->l_whence) {
661 case 0: /*SEEK_SET*/
662 break;
663 case 1: /*SEEK_CUR*/
664 bf->l_start += filp->f_pos;
665 break;
666 case 2: /*SEEK_END*/
667 bf->l_start += XFS_ISIZE(ip);
668 break;
669 default:
670 error = -EINVAL;
671 goto out_unlock;
672 }
673
674 /*
675 * length of <= 0 for resv/unresv/zero is invalid. length for
676 * alloc/free is ignored completely and we have no idea what userspace
677 * might have set it to, so set it to zero to allow range
678 * checks to pass.
679 */
680 switch (cmd) {
681 case XFS_IOC_ZERO_RANGE:
682 case XFS_IOC_RESVSP:
683 case XFS_IOC_RESVSP64:
684 case XFS_IOC_UNRESVSP:
685 case XFS_IOC_UNRESVSP64:
686 if (bf->l_len <= 0) {
687 error = -EINVAL;
688 goto out_unlock;
689 }
690 break;
691 default:
692 bf->l_len = 0;
693 break;
694 }
695
696 if (bf->l_start < 0 ||
697 bf->l_start > inode->i_sb->s_maxbytes ||
698 bf->l_start + bf->l_len < 0 ||
699 bf->l_start + bf->l_len >= inode->i_sb->s_maxbytes) {
700 error = -EINVAL;
701 goto out_unlock;
702 }
703
704 switch (cmd) {
705 case XFS_IOC_ZERO_RANGE:
706 flags |= XFS_PREALLOC_SET;
707 error = xfs_zero_file_space(ip, bf->l_start, bf->l_len);
708 break;
709 case XFS_IOC_RESVSP:
710 case XFS_IOC_RESVSP64:
711 flags |= XFS_PREALLOC_SET;
712 error = xfs_alloc_file_space(ip, bf->l_start, bf->l_len,
713 XFS_BMAPI_PREALLOC);
714 break;
715 case XFS_IOC_UNRESVSP:
716 case XFS_IOC_UNRESVSP64:
717 error = xfs_free_file_space(ip, bf->l_start, bf->l_len);
718 break;
719 case XFS_IOC_ALLOCSP:
720 case XFS_IOC_ALLOCSP64:
721 case XFS_IOC_FREESP:
722 case XFS_IOC_FREESP64:
723 flags |= XFS_PREALLOC_CLEAR;
724 if (bf->l_start > XFS_ISIZE(ip)) {
725 error = xfs_alloc_file_space(ip, XFS_ISIZE(ip),
726 bf->l_start - XFS_ISIZE(ip), 0);
727 if (error)
728 goto out_unlock;
729 }
730
731 iattr.ia_valid = ATTR_SIZE;
732 iattr.ia_size = bf->l_start;
733
734 error = xfs_setattr_size(ip, &iattr);
735 break;
736 default:
737 ASSERT(0);
738 error = -EINVAL;
739 }
740
741 if (error)
742 goto out_unlock;
743
744 error = xfs_update_prealloc_flags(ip, flags);
745
746 out_unlock:
747 xfs_iunlock(ip, iolock);
748 mnt_drop_write_file(filp);
749 return error;
750 }
751
752 STATIC int
753 xfs_ioc_bulkstat(
754 xfs_mount_t *mp,
755 unsigned int cmd,
756 void __user *arg)
757 {
758 xfs_fsop_bulkreq_t bulkreq;
759 int count; /* # of records returned */
760 xfs_ino_t inlast; /* last inode number */
761 int done;
762 int error;
763
764 /* done = 1 if there are more stats to get and if bulkstat */
765 /* should be called again (unused here, but used in dmapi) */
766
767 if (!capable(CAP_SYS_ADMIN))
768 return -EPERM;
769
770 if (XFS_FORCED_SHUTDOWN(mp))
771 return -EIO;
772
773 if (copy_from_user(&bulkreq, arg, sizeof(xfs_fsop_bulkreq_t)))
774 return -EFAULT;
775
776 if (copy_from_user(&inlast, bulkreq.lastip, sizeof(__s64)))
777 return -EFAULT;
778
779 if ((count = bulkreq.icount) <= 0)
780 return -EINVAL;
781
782 if (bulkreq.ubuffer == NULL)
783 return -EINVAL;
784
785 if (cmd == XFS_IOC_FSINUMBERS)
786 error = xfs_inumbers(mp, &inlast, &count,
787 bulkreq.ubuffer, xfs_inumbers_fmt);
788 else if (cmd == XFS_IOC_FSBULKSTAT_SINGLE)
789 error = xfs_bulkstat_one(mp, inlast, bulkreq.ubuffer,
790 sizeof(xfs_bstat_t), NULL, &done);
791 else /* XFS_IOC_FSBULKSTAT */
792 error = xfs_bulkstat(mp, &inlast, &count, xfs_bulkstat_one,
793 sizeof(xfs_bstat_t), bulkreq.ubuffer,
794 &done);
795
796 if (error)
797 return error;
798
799 if (bulkreq.ocount != NULL) {
800 if (copy_to_user(bulkreq.lastip, &inlast,
801 sizeof(xfs_ino_t)))
802 return -EFAULT;
803
804 if (copy_to_user(bulkreq.ocount, &count, sizeof(count)))
805 return -EFAULT;
806 }
807
808 return 0;
809 }
810
811 STATIC int
812 xfs_ioc_fsgeometry_v1(
813 xfs_mount_t *mp,
814 void __user *arg)
815 {
816 xfs_fsop_geom_t fsgeo;
817 int error;
818
819 error = xfs_fs_geometry(mp, &fsgeo, 3);
820 if (error)
821 return error;
822
823 /*
824 * Caller should have passed an argument of type
825 * xfs_fsop_geom_v1_t. This is a proper subset of the
826 * xfs_fsop_geom_t that xfs_fs_geometry() fills in.
827 */
828 if (copy_to_user(arg, &fsgeo, sizeof(xfs_fsop_geom_v1_t)))
829 return -EFAULT;
830 return 0;
831 }
832
833 STATIC int
834 xfs_ioc_fsgeometry(
835 xfs_mount_t *mp,
836 void __user *arg)
837 {
838 xfs_fsop_geom_t fsgeo;
839 int error;
840
841 error = xfs_fs_geometry(mp, &fsgeo, 4);
842 if (error)
843 return error;
844
845 if (copy_to_user(arg, &fsgeo, sizeof(fsgeo)))
846 return -EFAULT;
847 return 0;
848 }
849
850 /*
851 * Linux extended inode flags interface.
852 */
853
854 STATIC unsigned int
855 xfs_merge_ioc_xflags(
856 unsigned int flags,
857 unsigned int start)
858 {
859 unsigned int xflags = start;
860
861 if (flags & FS_IMMUTABLE_FL)
862 xflags |= FS_XFLAG_IMMUTABLE;
863 else
864 xflags &= ~FS_XFLAG_IMMUTABLE;
865 if (flags & FS_APPEND_FL)
866 xflags |= FS_XFLAG_APPEND;
867 else
868 xflags &= ~FS_XFLAG_APPEND;
869 if (flags & FS_SYNC_FL)
870 xflags |= FS_XFLAG_SYNC;
871 else
872 xflags &= ~FS_XFLAG_SYNC;
873 if (flags & FS_NOATIME_FL)
874 xflags |= FS_XFLAG_NOATIME;
875 else
876 xflags &= ~FS_XFLAG_NOATIME;
877 if (flags & FS_NODUMP_FL)
878 xflags |= FS_XFLAG_NODUMP;
879 else
880 xflags &= ~FS_XFLAG_NODUMP;
881
882 return xflags;
883 }
884
885 STATIC unsigned int
886 xfs_di2lxflags(
887 __uint16_t di_flags)
888 {
889 unsigned int flags = 0;
890
891 if (di_flags & XFS_DIFLAG_IMMUTABLE)
892 flags |= FS_IMMUTABLE_FL;
893 if (di_flags & XFS_DIFLAG_APPEND)
894 flags |= FS_APPEND_FL;
895 if (di_flags & XFS_DIFLAG_SYNC)
896 flags |= FS_SYNC_FL;
897 if (di_flags & XFS_DIFLAG_NOATIME)
898 flags |= FS_NOATIME_FL;
899 if (di_flags & XFS_DIFLAG_NODUMP)
900 flags |= FS_NODUMP_FL;
901 return flags;
902 }
903
904 STATIC int
905 xfs_ioc_fsgetxattr(
906 xfs_inode_t *ip,
907 int attr,
908 void __user *arg)
909 {
910 struct fsxattr fa;
911
912 memset(&fa, 0, sizeof(struct fsxattr));
913
914 xfs_ilock(ip, XFS_ILOCK_SHARED);
915 fa.fsx_xflags = xfs_ip2xflags(ip);
916 fa.fsx_extsize = ip->i_d.di_extsize << ip->i_mount->m_sb.sb_blocklog;
917 fa.fsx_projid = xfs_get_projid(ip);
918
919 if (attr) {
920 if (ip->i_afp) {
921 if (ip->i_afp->if_flags & XFS_IFEXTENTS)
922 fa.fsx_nextents = ip->i_afp->if_bytes /
923 sizeof(xfs_bmbt_rec_t);
924 else
925 fa.fsx_nextents = ip->i_d.di_anextents;
926 } else
927 fa.fsx_nextents = 0;
928 } else {
929 if (ip->i_df.if_flags & XFS_IFEXTENTS)
930 fa.fsx_nextents = ip->i_df.if_bytes /
931 sizeof(xfs_bmbt_rec_t);
932 else
933 fa.fsx_nextents = ip->i_d.di_nextents;
934 }
935 xfs_iunlock(ip, XFS_ILOCK_SHARED);
936
937 if (copy_to_user(arg, &fa, sizeof(fa)))
938 return -EFAULT;
939 return 0;
940 }
941
942 STATIC void
943 xfs_set_diflags(
944 struct xfs_inode *ip,
945 unsigned int xflags)
946 {
947 unsigned int di_flags;
948 uint64_t di_flags2;
949
950 /* can't set PREALLOC this way, just preserve it */
951 di_flags = (ip->i_d.di_flags & XFS_DIFLAG_PREALLOC);
952 if (xflags & FS_XFLAG_IMMUTABLE)
953 di_flags |= XFS_DIFLAG_IMMUTABLE;
954 if (xflags & FS_XFLAG_APPEND)
955 di_flags |= XFS_DIFLAG_APPEND;
956 if (xflags & FS_XFLAG_SYNC)
957 di_flags |= XFS_DIFLAG_SYNC;
958 if (xflags & FS_XFLAG_NOATIME)
959 di_flags |= XFS_DIFLAG_NOATIME;
960 if (xflags & FS_XFLAG_NODUMP)
961 di_flags |= XFS_DIFLAG_NODUMP;
962 if (xflags & FS_XFLAG_NODEFRAG)
963 di_flags |= XFS_DIFLAG_NODEFRAG;
964 if (xflags & FS_XFLAG_FILESTREAM)
965 di_flags |= XFS_DIFLAG_FILESTREAM;
966 if (S_ISDIR(ip->i_d.di_mode)) {
967 if (xflags & FS_XFLAG_RTINHERIT)
968 di_flags |= XFS_DIFLAG_RTINHERIT;
969 if (xflags & FS_XFLAG_NOSYMLINKS)
970 di_flags |= XFS_DIFLAG_NOSYMLINKS;
971 if (xflags & FS_XFLAG_EXTSZINHERIT)
972 di_flags |= XFS_DIFLAG_EXTSZINHERIT;
973 if (xflags & FS_XFLAG_PROJINHERIT)
974 di_flags |= XFS_DIFLAG_PROJINHERIT;
975 } else if (S_ISREG(ip->i_d.di_mode)) {
976 if (xflags & FS_XFLAG_REALTIME)
977 di_flags |= XFS_DIFLAG_REALTIME;
978 if (xflags & FS_XFLAG_EXTSIZE)
979 di_flags |= XFS_DIFLAG_EXTSIZE;
980 }
981 ip->i_d.di_flags = di_flags;
982
983 /* diflags2 only valid for v3 inodes. */
984 if (ip->i_d.di_version < 3)
985 return;
986
987 di_flags2 = 0;
988 if (xflags & FS_XFLAG_DAX)
989 di_flags2 |= XFS_DIFLAG2_DAX;
990
991 ip->i_d.di_flags2 = di_flags2;
992
993 }
994
995 STATIC void
996 xfs_diflags_to_linux(
997 struct xfs_inode *ip)
998 {
999 struct inode *inode = VFS_I(ip);
1000 unsigned int xflags = xfs_ip2xflags(ip);
1001
1002 if (xflags & FS_XFLAG_IMMUTABLE)
1003 inode->i_flags |= S_IMMUTABLE;
1004 else
1005 inode->i_flags &= ~S_IMMUTABLE;
1006 if (xflags & FS_XFLAG_APPEND)
1007 inode->i_flags |= S_APPEND;
1008 else
1009 inode->i_flags &= ~S_APPEND;
1010 if (xflags & FS_XFLAG_SYNC)
1011 inode->i_flags |= S_SYNC;
1012 else
1013 inode->i_flags &= ~S_SYNC;
1014 if (xflags & FS_XFLAG_NOATIME)
1015 inode->i_flags |= S_NOATIME;
1016 else
1017 inode->i_flags &= ~S_NOATIME;
1018 if (xflags & FS_XFLAG_DAX)
1019 inode->i_flags |= S_DAX;
1020 else
1021 inode->i_flags &= ~S_DAX;
1022
1023 }
1024
1025 static int
1026 xfs_ioctl_setattr_xflags(
1027 struct xfs_trans *tp,
1028 struct xfs_inode *ip,
1029 struct fsxattr *fa)
1030 {
1031 struct xfs_mount *mp = ip->i_mount;
1032
1033 /* Can't change realtime flag if any extents are allocated. */
1034 if ((ip->i_d.di_nextents || ip->i_delayed_blks) &&
1035 XFS_IS_REALTIME_INODE(ip) != (fa->fsx_xflags & FS_XFLAG_REALTIME))
1036 return -EINVAL;
1037
1038 /* If realtime flag is set then must have realtime device */
1039 if (fa->fsx_xflags & FS_XFLAG_REALTIME) {
1040 if (mp->m_sb.sb_rblocks == 0 || mp->m_sb.sb_rextsize == 0 ||
1041 (ip->i_d.di_extsize % mp->m_sb.sb_rextsize))
1042 return -EINVAL;
1043 }
1044
1045 /*
1046 * Can't modify an immutable/append-only file unless
1047 * we have appropriate permission.
1048 */
1049 if (((ip->i_d.di_flags & (XFS_DIFLAG_IMMUTABLE | XFS_DIFLAG_APPEND)) ||
1050 (fa->fsx_xflags & (FS_XFLAG_IMMUTABLE | FS_XFLAG_APPEND))) &&
1051 !capable(CAP_LINUX_IMMUTABLE))
1052 return -EPERM;
1053
1054 xfs_set_diflags(ip, fa->fsx_xflags);
1055 xfs_diflags_to_linux(ip);
1056 xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG);
1057 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
1058 XFS_STATS_INC(mp, xs_ig_attrchg);
1059 return 0;
1060 }
1061
1062 /*
1063 * If we are changing DAX flags, we have to ensure the file is clean and any
1064 * cached objects in the address space are invalidated and removed. This
1065 * requires us to lock out other IO and page faults similar to a truncate
1066 * operation. The locks need to be held until the transaction has been committed
1067 * so that the cache invalidation is atomic with respect to the DAX flag
1068 * manipulation.
1069 */
1070 static int
1071 xfs_ioctl_setattr_dax_invalidate(
1072 struct xfs_inode *ip,
1073 struct fsxattr *fa,
1074 int *join_flags)
1075 {
1076 struct inode *inode = VFS_I(ip);
1077 int error;
1078
1079 *join_flags = 0;
1080
1081 /*
1082 * It is only valid to set the DAX flag on regular files and
1083 * directories. On directories it serves as an inherit hint.
1084 */
1085 if ((fa->fsx_xflags & FS_XFLAG_DAX) &&
1086 !(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode)))
1087 return -EINVAL;
1088
1089 /* If the DAX state is not changing, we have nothing to do here. */
1090 if ((fa->fsx_xflags & FS_XFLAG_DAX) && IS_DAX(inode))
1091 return 0;
1092 if (!(fa->fsx_xflags & FS_XFLAG_DAX) && !IS_DAX(inode))
1093 return 0;
1094
1095 /* lock, flush and invalidate mapping in preparation for flag change */
1096 xfs_ilock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1097 error = filemap_write_and_wait(inode->i_mapping);
1098 if (error)
1099 goto out_unlock;
1100 error = invalidate_inode_pages2(inode->i_mapping);
1101 if (error)
1102 goto out_unlock;
1103
1104 *join_flags = XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL;
1105 return 0;
1106
1107 out_unlock:
1108 xfs_iunlock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1109 return error;
1110
1111 }
1112
1113 /*
1114 * Set up the transaction structure for the setattr operation, checking that we
1115 * have permission to do so. On success, return a clean transaction and the
1116 * inode locked exclusively ready for further operation specific checks. On
1117 * failure, return an error without modifying or locking the inode.
1118 *
1119 * The inode might already be IO locked on call. If this is the case, it is
1120 * indicated in @join_flags and we take full responsibility for ensuring they
1121 * are unlocked from now on. Hence if we have an error here, we still have to
1122 * unlock them. Otherwise, once they are joined to the transaction, they will
1123 * be unlocked on commit/cancel.
1124 */
1125 static struct xfs_trans *
1126 xfs_ioctl_setattr_get_trans(
1127 struct xfs_inode *ip,
1128 int join_flags)
1129 {
1130 struct xfs_mount *mp = ip->i_mount;
1131 struct xfs_trans *tp;
1132 int error = -EROFS;
1133
1134 if (mp->m_flags & XFS_MOUNT_RDONLY)
1135 goto out_unlock;
1136 error = -EIO;
1137 if (XFS_FORCED_SHUTDOWN(mp))
1138 goto out_unlock;
1139
1140 tp = xfs_trans_alloc(mp, XFS_TRANS_SETATTR_NOT_SIZE);
1141 error = xfs_trans_reserve(tp, &M_RES(mp)->tr_ichange, 0, 0);
1142 if (error)
1143 goto out_cancel;
1144
1145 xfs_ilock(ip, XFS_ILOCK_EXCL);
1146 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL | join_flags);
1147 join_flags = 0;
1148
1149 /*
1150 * CAP_FOWNER overrides the following restrictions:
1151 *
1152 * The user ID of the calling process must be equal to the file owner
1153 * ID, except in cases where the CAP_FSETID capability is applicable.
1154 */
1155 if (!inode_owner_or_capable(VFS_I(ip))) {
1156 error = -EPERM;
1157 goto out_cancel;
1158 }
1159
1160 if (mp->m_flags & XFS_MOUNT_WSYNC)
1161 xfs_trans_set_sync(tp);
1162
1163 return tp;
1164
1165 out_cancel:
1166 xfs_trans_cancel(tp);
1167 out_unlock:
1168 if (join_flags)
1169 xfs_iunlock(ip, join_flags);
1170 return ERR_PTR(error);
1171 }
1172
1173 /*
1174 * extent size hint validation is somewhat cumbersome. Rules are:
1175 *
1176 * 1. extent size hint is only valid for directories and regular files
1177 * 2. FS_XFLAG_EXTSIZE is only valid for regular files
1178 * 3. FS_XFLAG_EXTSZINHERIT is only valid for directories.
1179 * 4. can only be changed on regular files if no extents are allocated
1180 * 5. can be changed on directories at any time
1181 * 6. extsize hint of 0 turns off hints, clears inode flags.
1182 * 7. Extent size must be a multiple of the appropriate block size.
1183 * 8. for non-realtime files, the extent size hint must be limited
1184 * to half the AG size to avoid alignment extending the extent beyond the
1185 * limits of the AG.
1186 */
1187 static int
1188 xfs_ioctl_setattr_check_extsize(
1189 struct xfs_inode *ip,
1190 struct fsxattr *fa)
1191 {
1192 struct xfs_mount *mp = ip->i_mount;
1193
1194 if ((fa->fsx_xflags & FS_XFLAG_EXTSIZE) && !S_ISREG(ip->i_d.di_mode))
1195 return -EINVAL;
1196
1197 if ((fa->fsx_xflags & FS_XFLAG_EXTSZINHERIT) &&
1198 !S_ISDIR(ip->i_d.di_mode))
1199 return -EINVAL;
1200
1201 if (S_ISREG(ip->i_d.di_mode) && ip->i_d.di_nextents &&
1202 ((ip->i_d.di_extsize << mp->m_sb.sb_blocklog) != fa->fsx_extsize))
1203 return -EINVAL;
1204
1205 if (fa->fsx_extsize != 0) {
1206 xfs_extlen_t size;
1207 xfs_fsblock_t extsize_fsb;
1208
1209 extsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_extsize);
1210 if (extsize_fsb > MAXEXTLEN)
1211 return -EINVAL;
1212
1213 if (XFS_IS_REALTIME_INODE(ip) ||
1214 (fa->fsx_xflags & FS_XFLAG_REALTIME)) {
1215 size = mp->m_sb.sb_rextsize << mp->m_sb.sb_blocklog;
1216 } else {
1217 size = mp->m_sb.sb_blocksize;
1218 if (extsize_fsb > mp->m_sb.sb_agblocks / 2)
1219 return -EINVAL;
1220 }
1221
1222 if (fa->fsx_extsize % size)
1223 return -EINVAL;
1224 } else
1225 fa->fsx_xflags &= ~(FS_XFLAG_EXTSIZE | FS_XFLAG_EXTSZINHERIT);
1226
1227 return 0;
1228 }
1229
1230 static int
1231 xfs_ioctl_setattr_check_projid(
1232 struct xfs_inode *ip,
1233 struct fsxattr *fa)
1234 {
1235 /* Disallow 32bit project ids if projid32bit feature is not enabled. */
1236 if (fa->fsx_projid > (__uint16_t)-1 &&
1237 !xfs_sb_version_hasprojid32bit(&ip->i_mount->m_sb))
1238 return -EINVAL;
1239
1240 /*
1241 * Project Quota ID state is only allowed to change from within the init
1242 * namespace. Enforce that restriction only if we are trying to change
1243 * the quota ID state. Everything else is allowed in user namespaces.
1244 */
1245 if (current_user_ns() == &init_user_ns)
1246 return 0;
1247
1248 if (xfs_get_projid(ip) != fa->fsx_projid)
1249 return -EINVAL;
1250 if ((fa->fsx_xflags & FS_XFLAG_PROJINHERIT) !=
1251 (ip->i_d.di_flags & XFS_DIFLAG_PROJINHERIT))
1252 return -EINVAL;
1253
1254 return 0;
1255 }
1256
1257 STATIC int
1258 xfs_ioctl_setattr(
1259 xfs_inode_t *ip,
1260 struct fsxattr *fa)
1261 {
1262 struct xfs_mount *mp = ip->i_mount;
1263 struct xfs_trans *tp;
1264 struct xfs_dquot *udqp = NULL;
1265 struct xfs_dquot *pdqp = NULL;
1266 struct xfs_dquot *olddquot = NULL;
1267 int code;
1268 int join_flags = 0;
1269
1270 trace_xfs_ioctl_setattr(ip);
1271
1272 code = xfs_ioctl_setattr_check_projid(ip, fa);
1273 if (code)
1274 return code;
1275
1276 /*
1277 * If disk quotas is on, we make sure that the dquots do exist on disk,
1278 * before we start any other transactions. Trying to do this later
1279 * is messy. We don't care to take a readlock to look at the ids
1280 * in inode here, because we can't hold it across the trans_reserve.
1281 * If the IDs do change before we take the ilock, we're covered
1282 * because the i_*dquot fields will get updated anyway.
1283 */
1284 if (XFS_IS_QUOTA_ON(mp)) {
1285 code = xfs_qm_vop_dqalloc(ip, ip->i_d.di_uid,
1286 ip->i_d.di_gid, fa->fsx_projid,
1287 XFS_QMOPT_PQUOTA, &udqp, NULL, &pdqp);
1288 if (code)
1289 return code;
1290 }
1291
1292 /*
1293 * Changing DAX config may require inode locking for mapping
1294 * invalidation. These need to be held all the way to transaction commit
1295 * or cancel time, so need to be passed through to
1296 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1297 * appropriately.
1298 */
1299 code = xfs_ioctl_setattr_dax_invalidate(ip, fa, &join_flags);
1300 if (code)
1301 goto error_free_dquots;
1302
1303 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
1304 if (IS_ERR(tp)) {
1305 code = PTR_ERR(tp);
1306 goto error_free_dquots;
1307 }
1308
1309
1310 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp) &&
1311 xfs_get_projid(ip) != fa->fsx_projid) {
1312 code = xfs_qm_vop_chown_reserve(tp, ip, udqp, NULL, pdqp,
1313 capable(CAP_FOWNER) ? XFS_QMOPT_FORCE_RES : 0);
1314 if (code) /* out of quota */
1315 goto error_trans_cancel;
1316 }
1317
1318 code = xfs_ioctl_setattr_check_extsize(ip, fa);
1319 if (code)
1320 goto error_trans_cancel;
1321
1322 code = xfs_ioctl_setattr_xflags(tp, ip, fa);
1323 if (code)
1324 goto error_trans_cancel;
1325
1326 /*
1327 * Change file ownership. Must be the owner or privileged. CAP_FSETID
1328 * overrides the following restrictions:
1329 *
1330 * The set-user-ID and set-group-ID bits of a file will be cleared upon
1331 * successful return from chown()
1332 */
1333
1334 if ((ip->i_d.di_mode & (S_ISUID|S_ISGID)) &&
1335 !capable_wrt_inode_uidgid(VFS_I(ip), CAP_FSETID))
1336 ip->i_d.di_mode &= ~(S_ISUID|S_ISGID);
1337
1338 /* Change the ownerships and register project quota modifications */
1339 if (xfs_get_projid(ip) != fa->fsx_projid) {
1340 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp)) {
1341 olddquot = xfs_qm_vop_chown(tp, ip,
1342 &ip->i_pdquot, pdqp);
1343 }
1344 ASSERT(ip->i_d.di_version > 1);
1345 xfs_set_projid(ip, fa->fsx_projid);
1346 }
1347
1348 /*
1349 * Only set the extent size hint if we've already determined that the
1350 * extent size hint should be set on the inode. If no extent size flags
1351 * are set on the inode then unconditionally clear the extent size hint.
1352 */
1353 if (ip->i_d.di_flags & (XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT))
1354 ip->i_d.di_extsize = fa->fsx_extsize >> mp->m_sb.sb_blocklog;
1355 else
1356 ip->i_d.di_extsize = 0;
1357
1358 code = xfs_trans_commit(tp);
1359
1360 /*
1361 * Release any dquot(s) the inode had kept before chown.
1362 */
1363 xfs_qm_dqrele(olddquot);
1364 xfs_qm_dqrele(udqp);
1365 xfs_qm_dqrele(pdqp);
1366
1367 return code;
1368
1369 error_trans_cancel:
1370 xfs_trans_cancel(tp);
1371 error_free_dquots:
1372 xfs_qm_dqrele(udqp);
1373 xfs_qm_dqrele(pdqp);
1374 return code;
1375 }
1376
1377 STATIC int
1378 xfs_ioc_fssetxattr(
1379 xfs_inode_t *ip,
1380 struct file *filp,
1381 void __user *arg)
1382 {
1383 struct fsxattr fa;
1384 int error;
1385
1386 if (copy_from_user(&fa, arg, sizeof(fa)))
1387 return -EFAULT;
1388
1389 error = mnt_want_write_file(filp);
1390 if (error)
1391 return error;
1392 error = xfs_ioctl_setattr(ip, &fa);
1393 mnt_drop_write_file(filp);
1394 return error;
1395 }
1396
1397 STATIC int
1398 xfs_ioc_getxflags(
1399 xfs_inode_t *ip,
1400 void __user *arg)
1401 {
1402 unsigned int flags;
1403
1404 flags = xfs_di2lxflags(ip->i_d.di_flags);
1405 if (copy_to_user(arg, &flags, sizeof(flags)))
1406 return -EFAULT;
1407 return 0;
1408 }
1409
1410 STATIC int
1411 xfs_ioc_setxflags(
1412 struct xfs_inode *ip,
1413 struct file *filp,
1414 void __user *arg)
1415 {
1416 struct xfs_trans *tp;
1417 struct fsxattr fa;
1418 unsigned int flags;
1419 int join_flags = 0;
1420 int error;
1421
1422 if (copy_from_user(&flags, arg, sizeof(flags)))
1423 return -EFAULT;
1424
1425 if (flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL | \
1426 FS_NOATIME_FL | FS_NODUMP_FL | \
1427 FS_SYNC_FL))
1428 return -EOPNOTSUPP;
1429
1430 fa.fsx_xflags = xfs_merge_ioc_xflags(flags, xfs_ip2xflags(ip));
1431
1432 error = mnt_want_write_file(filp);
1433 if (error)
1434 return error;
1435
1436 /*
1437 * Changing DAX config may require inode locking for mapping
1438 * invalidation. These need to be held all the way to transaction commit
1439 * or cancel time, so need to be passed through to
1440 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1441 * appropriately.
1442 */
1443 error = xfs_ioctl_setattr_dax_invalidate(ip, &fa, &join_flags);
1444 if (error)
1445 goto out_drop_write;
1446
1447 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
1448 if (IS_ERR(tp)) {
1449 error = PTR_ERR(tp);
1450 goto out_drop_write;
1451 }
1452
1453 error = xfs_ioctl_setattr_xflags(tp, ip, &fa);
1454 if (error) {
1455 xfs_trans_cancel(tp);
1456 goto out_drop_write;
1457 }
1458
1459 error = xfs_trans_commit(tp);
1460 out_drop_write:
1461 mnt_drop_write_file(filp);
1462 return error;
1463 }
1464
1465 STATIC int
1466 xfs_getbmap_format(void **ap, struct getbmapx *bmv, int *full)
1467 {
1468 struct getbmap __user *base = (struct getbmap __user *)*ap;
1469
1470 /* copy only getbmap portion (not getbmapx) */
1471 if (copy_to_user(base, bmv, sizeof(struct getbmap)))
1472 return -EFAULT;
1473
1474 *ap += sizeof(struct getbmap);
1475 return 0;
1476 }
1477
1478 STATIC int
1479 xfs_ioc_getbmap(
1480 struct xfs_inode *ip,
1481 int ioflags,
1482 unsigned int cmd,
1483 void __user *arg)
1484 {
1485 struct getbmapx bmx;
1486 int error;
1487
1488 if (copy_from_user(&bmx, arg, sizeof(struct getbmapx)))
1489 return -EFAULT;
1490
1491 if (bmx.bmv_count < 2)
1492 return -EINVAL;
1493
1494 bmx.bmv_iflags = (cmd == XFS_IOC_GETBMAPA ? BMV_IF_ATTRFORK : 0);
1495 if (ioflags & XFS_IO_INVIS)
1496 bmx.bmv_iflags |= BMV_IF_NO_DMAPI_READ;
1497
1498 error = xfs_getbmap(ip, &bmx, xfs_getbmap_format,
1499 (__force struct getbmap *)arg+1);
1500 if (error)
1501 return error;
1502
1503 /* copy back header - only size of getbmap */
1504 if (copy_to_user(arg, &bmx, sizeof(struct getbmap)))
1505 return -EFAULT;
1506 return 0;
1507 }
1508
1509 STATIC int
1510 xfs_getbmapx_format(void **ap, struct getbmapx *bmv, int *full)
1511 {
1512 struct getbmapx __user *base = (struct getbmapx __user *)*ap;
1513
1514 if (copy_to_user(base, bmv, sizeof(struct getbmapx)))
1515 return -EFAULT;
1516
1517 *ap += sizeof(struct getbmapx);
1518 return 0;
1519 }
1520
1521 STATIC int
1522 xfs_ioc_getbmapx(
1523 struct xfs_inode *ip,
1524 void __user *arg)
1525 {
1526 struct getbmapx bmx;
1527 int error;
1528
1529 if (copy_from_user(&bmx, arg, sizeof(bmx)))
1530 return -EFAULT;
1531
1532 if (bmx.bmv_count < 2)
1533 return -EINVAL;
1534
1535 if (bmx.bmv_iflags & (~BMV_IF_VALID))
1536 return -EINVAL;
1537
1538 error = xfs_getbmap(ip, &bmx, xfs_getbmapx_format,
1539 (__force struct getbmapx *)arg+1);
1540 if (error)
1541 return error;
1542
1543 /* copy back header */
1544 if (copy_to_user(arg, &bmx, sizeof(struct getbmapx)))
1545 return -EFAULT;
1546
1547 return 0;
1548 }
1549
1550 int
1551 xfs_ioc_swapext(
1552 xfs_swapext_t *sxp)
1553 {
1554 xfs_inode_t *ip, *tip;
1555 struct fd f, tmp;
1556 int error = 0;
1557
1558 /* Pull information for the target fd */
1559 f = fdget((int)sxp->sx_fdtarget);
1560 if (!f.file) {
1561 error = -EINVAL;
1562 goto out;
1563 }
1564
1565 if (!(f.file->f_mode & FMODE_WRITE) ||
1566 !(f.file->f_mode & FMODE_READ) ||
1567 (f.file->f_flags & O_APPEND)) {
1568 error = -EBADF;
1569 goto out_put_file;
1570 }
1571
1572 tmp = fdget((int)sxp->sx_fdtmp);
1573 if (!tmp.file) {
1574 error = -EINVAL;
1575 goto out_put_file;
1576 }
1577
1578 if (!(tmp.file->f_mode & FMODE_WRITE) ||
1579 !(tmp.file->f_mode & FMODE_READ) ||
1580 (tmp.file->f_flags & O_APPEND)) {
1581 error = -EBADF;
1582 goto out_put_tmp_file;
1583 }
1584
1585 if (IS_SWAPFILE(file_inode(f.file)) ||
1586 IS_SWAPFILE(file_inode(tmp.file))) {
1587 error = -EINVAL;
1588 goto out_put_tmp_file;
1589 }
1590
1591 ip = XFS_I(file_inode(f.file));
1592 tip = XFS_I(file_inode(tmp.file));
1593
1594 if (ip->i_mount != tip->i_mount) {
1595 error = -EINVAL;
1596 goto out_put_tmp_file;
1597 }
1598
1599 if (ip->i_ino == tip->i_ino) {
1600 error = -EINVAL;
1601 goto out_put_tmp_file;
1602 }
1603
1604 if (XFS_FORCED_SHUTDOWN(ip->i_mount)) {
1605 error = -EIO;
1606 goto out_put_tmp_file;
1607 }
1608
1609 error = xfs_swap_extents(ip, tip, sxp);
1610
1611 out_put_tmp_file:
1612 fdput(tmp);
1613 out_put_file:
1614 fdput(f);
1615 out:
1616 return error;
1617 }
1618
1619 /*
1620 * Note: some of the ioctl's return positive numbers as a
1621 * byte count indicating success, such as readlink_by_handle.
1622 * So we don't "sign flip" like most other routines. This means
1623 * true errors need to be returned as a negative value.
1624 */
1625 long
1626 xfs_file_ioctl(
1627 struct file *filp,
1628 unsigned int cmd,
1629 unsigned long p)
1630 {
1631 struct inode *inode = file_inode(filp);
1632 struct xfs_inode *ip = XFS_I(inode);
1633 struct xfs_mount *mp = ip->i_mount;
1634 void __user *arg = (void __user *)p;
1635 int ioflags = 0;
1636 int error;
1637
1638 if (filp->f_mode & FMODE_NOCMTIME)
1639 ioflags |= XFS_IO_INVIS;
1640
1641 trace_xfs_file_ioctl(ip);
1642
1643 switch (cmd) {
1644 case FITRIM:
1645 return xfs_ioc_trim(mp, arg);
1646 case XFS_IOC_ALLOCSP:
1647 case XFS_IOC_FREESP:
1648 case XFS_IOC_RESVSP:
1649 case XFS_IOC_UNRESVSP:
1650 case XFS_IOC_ALLOCSP64:
1651 case XFS_IOC_FREESP64:
1652 case XFS_IOC_RESVSP64:
1653 case XFS_IOC_UNRESVSP64:
1654 case XFS_IOC_ZERO_RANGE: {
1655 xfs_flock64_t bf;
1656
1657 if (copy_from_user(&bf, arg, sizeof(bf)))
1658 return -EFAULT;
1659 return xfs_ioc_space(ip, inode, filp, ioflags, cmd, &bf);
1660 }
1661 case XFS_IOC_DIOINFO: {
1662 struct dioattr da;
1663 xfs_buftarg_t *target =
1664 XFS_IS_REALTIME_INODE(ip) ?
1665 mp->m_rtdev_targp : mp->m_ddev_targp;
1666
1667 da.d_mem = da.d_miniosz = target->bt_logical_sectorsize;
1668 da.d_maxiosz = INT_MAX & ~(da.d_miniosz - 1);
1669
1670 if (copy_to_user(arg, &da, sizeof(da)))
1671 return -EFAULT;
1672 return 0;
1673 }
1674
1675 case XFS_IOC_FSBULKSTAT_SINGLE:
1676 case XFS_IOC_FSBULKSTAT:
1677 case XFS_IOC_FSINUMBERS:
1678 return xfs_ioc_bulkstat(mp, cmd, arg);
1679
1680 case XFS_IOC_FSGEOMETRY_V1:
1681 return xfs_ioc_fsgeometry_v1(mp, arg);
1682
1683 case XFS_IOC_FSGEOMETRY:
1684 return xfs_ioc_fsgeometry(mp, arg);
1685
1686 case XFS_IOC_GETVERSION:
1687 return put_user(inode->i_generation, (int __user *)arg);
1688
1689 case XFS_IOC_FSGETXATTR:
1690 return xfs_ioc_fsgetxattr(ip, 0, arg);
1691 case XFS_IOC_FSGETXATTRA:
1692 return xfs_ioc_fsgetxattr(ip, 1, arg);
1693 case XFS_IOC_FSSETXATTR:
1694 return xfs_ioc_fssetxattr(ip, filp, arg);
1695 case XFS_IOC_GETXFLAGS:
1696 return xfs_ioc_getxflags(ip, arg);
1697 case XFS_IOC_SETXFLAGS:
1698 return xfs_ioc_setxflags(ip, filp, arg);
1699
1700 case XFS_IOC_FSSETDM: {
1701 struct fsdmidata dmi;
1702
1703 if (copy_from_user(&dmi, arg, sizeof(dmi)))
1704 return -EFAULT;
1705
1706 error = mnt_want_write_file(filp);
1707 if (error)
1708 return error;
1709
1710 error = xfs_set_dmattrs(ip, dmi.fsd_dmevmask,
1711 dmi.fsd_dmstate);
1712 mnt_drop_write_file(filp);
1713 return error;
1714 }
1715
1716 case XFS_IOC_GETBMAP:
1717 case XFS_IOC_GETBMAPA:
1718 return xfs_ioc_getbmap(ip, ioflags, cmd, arg);
1719
1720 case XFS_IOC_GETBMAPX:
1721 return xfs_ioc_getbmapx(ip, arg);
1722
1723 case XFS_IOC_FD_TO_HANDLE:
1724 case XFS_IOC_PATH_TO_HANDLE:
1725 case XFS_IOC_PATH_TO_FSHANDLE: {
1726 xfs_fsop_handlereq_t hreq;
1727
1728 if (copy_from_user(&hreq, arg, sizeof(hreq)))
1729 return -EFAULT;
1730 return xfs_find_handle(cmd, &hreq);
1731 }
1732 case XFS_IOC_OPEN_BY_HANDLE: {
1733 xfs_fsop_handlereq_t hreq;
1734
1735 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
1736 return -EFAULT;
1737 return xfs_open_by_handle(filp, &hreq);
1738 }
1739 case XFS_IOC_FSSETDM_BY_HANDLE:
1740 return xfs_fssetdm_by_handle(filp, arg);
1741
1742 case XFS_IOC_READLINK_BY_HANDLE: {
1743 xfs_fsop_handlereq_t hreq;
1744
1745 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
1746 return -EFAULT;
1747 return xfs_readlink_by_handle(filp, &hreq);
1748 }
1749 case XFS_IOC_ATTRLIST_BY_HANDLE:
1750 return xfs_attrlist_by_handle(filp, arg);
1751
1752 case XFS_IOC_ATTRMULTI_BY_HANDLE:
1753 return xfs_attrmulti_by_handle(filp, arg);
1754
1755 case XFS_IOC_SWAPEXT: {
1756 struct xfs_swapext sxp;
1757
1758 if (copy_from_user(&sxp, arg, sizeof(xfs_swapext_t)))
1759 return -EFAULT;
1760 error = mnt_want_write_file(filp);
1761 if (error)
1762 return error;
1763 error = xfs_ioc_swapext(&sxp);
1764 mnt_drop_write_file(filp);
1765 return error;
1766 }
1767
1768 case XFS_IOC_FSCOUNTS: {
1769 xfs_fsop_counts_t out;
1770
1771 error = xfs_fs_counts(mp, &out);
1772 if (error)
1773 return error;
1774
1775 if (copy_to_user(arg, &out, sizeof(out)))
1776 return -EFAULT;
1777 return 0;
1778 }
1779
1780 case XFS_IOC_SET_RESBLKS: {
1781 xfs_fsop_resblks_t inout;
1782 __uint64_t in;
1783
1784 if (!capable(CAP_SYS_ADMIN))
1785 return -EPERM;
1786
1787 if (mp->m_flags & XFS_MOUNT_RDONLY)
1788 return -EROFS;
1789
1790 if (copy_from_user(&inout, arg, sizeof(inout)))
1791 return -EFAULT;
1792
1793 error = mnt_want_write_file(filp);
1794 if (error)
1795 return error;
1796
1797 /* input parameter is passed in resblks field of structure */
1798 in = inout.resblks;
1799 error = xfs_reserve_blocks(mp, &in, &inout);
1800 mnt_drop_write_file(filp);
1801 if (error)
1802 return error;
1803
1804 if (copy_to_user(arg, &inout, sizeof(inout)))
1805 return -EFAULT;
1806 return 0;
1807 }
1808
1809 case XFS_IOC_GET_RESBLKS: {
1810 xfs_fsop_resblks_t out;
1811
1812 if (!capable(CAP_SYS_ADMIN))
1813 return -EPERM;
1814
1815 error = xfs_reserve_blocks(mp, NULL, &out);
1816 if (error)
1817 return error;
1818
1819 if (copy_to_user(arg, &out, sizeof(out)))
1820 return -EFAULT;
1821
1822 return 0;
1823 }
1824
1825 case XFS_IOC_FSGROWFSDATA: {
1826 xfs_growfs_data_t in;
1827
1828 if (copy_from_user(&in, arg, sizeof(in)))
1829 return -EFAULT;
1830
1831 error = mnt_want_write_file(filp);
1832 if (error)
1833 return error;
1834 error = xfs_growfs_data(mp, &in);
1835 mnt_drop_write_file(filp);
1836 return error;
1837 }
1838
1839 case XFS_IOC_FSGROWFSLOG: {
1840 xfs_growfs_log_t in;
1841
1842 if (copy_from_user(&in, arg, sizeof(in)))
1843 return -EFAULT;
1844
1845 error = mnt_want_write_file(filp);
1846 if (error)
1847 return error;
1848 error = xfs_growfs_log(mp, &in);
1849 mnt_drop_write_file(filp);
1850 return error;
1851 }
1852
1853 case XFS_IOC_FSGROWFSRT: {
1854 xfs_growfs_rt_t in;
1855
1856 if (copy_from_user(&in, arg, sizeof(in)))
1857 return -EFAULT;
1858
1859 error = mnt_want_write_file(filp);
1860 if (error)
1861 return error;
1862 error = xfs_growfs_rt(mp, &in);
1863 mnt_drop_write_file(filp);
1864 return error;
1865 }
1866
1867 case XFS_IOC_GOINGDOWN: {
1868 __uint32_t in;
1869
1870 if (!capable(CAP_SYS_ADMIN))
1871 return -EPERM;
1872
1873 if (get_user(in, (__uint32_t __user *)arg))
1874 return -EFAULT;
1875
1876 return xfs_fs_goingdown(mp, in);
1877 }
1878
1879 case XFS_IOC_ERROR_INJECTION: {
1880 xfs_error_injection_t in;
1881
1882 if (!capable(CAP_SYS_ADMIN))
1883 return -EPERM;
1884
1885 if (copy_from_user(&in, arg, sizeof(in)))
1886 return -EFAULT;
1887
1888 return xfs_errortag_add(in.errtag, mp);
1889 }
1890
1891 case XFS_IOC_ERROR_CLEARALL:
1892 if (!capable(CAP_SYS_ADMIN))
1893 return -EPERM;
1894
1895 return xfs_errortag_clearall(mp, 1);
1896
1897 case XFS_IOC_FREE_EOFBLOCKS: {
1898 struct xfs_fs_eofblocks eofb;
1899 struct xfs_eofblocks keofb;
1900
1901 if (!capable(CAP_SYS_ADMIN))
1902 return -EPERM;
1903
1904 if (mp->m_flags & XFS_MOUNT_RDONLY)
1905 return -EROFS;
1906
1907 if (copy_from_user(&eofb, arg, sizeof(eofb)))
1908 return -EFAULT;
1909
1910 error = xfs_fs_eofblocks_from_user(&eofb, &keofb);
1911 if (error)
1912 return error;
1913
1914 return xfs_icache_free_eofblocks(mp, &keofb);
1915 }
1916
1917 default:
1918 return -ENOTTY;
1919 }
1920 }