libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op
[linux-2.6-block.git] / fs / xfs / xfs_ioctl.c
CommitLineData
1da177e4 1/*
7b718769
NS
2 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
3 * All Rights Reserved.
1da177e4 4 *
7b718769
NS
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License as
1da177e4
LT
7 * published by the Free Software Foundation.
8 *
7b718769
NS
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
1da177e4 13 *
7b718769
NS
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4 17 */
1da177e4 18#include "xfs.h"
1da177e4 19#include "xfs_fs.h"
70a9883c 20#include "xfs_shared.h"
239880ef
DC
21#include "xfs_format.h"
22#include "xfs_log_format.h"
23#include "xfs_trans_resv.h"
1da177e4 24#include "xfs_mount.h"
1da177e4 25#include "xfs_inode.h"
7bf446f8 26#include "xfs_ioctl.h"
a4fbe6ab 27#include "xfs_alloc.h"
1da177e4 28#include "xfs_rtalloc.h"
1da177e4 29#include "xfs_itable.h"
a844f451 30#include "xfs_error.h"
1da177e4 31#include "xfs_attr.h"
a844f451 32#include "xfs_bmap.h"
68988114 33#include "xfs_bmap_util.h"
1da177e4 34#include "xfs_fsops.h"
a46db608 35#include "xfs_discard.h"
25fe55e8 36#include "xfs_quota.h"
d296d30a 37#include "xfs_export.h"
0b1b213f 38#include "xfs_trace.h"
8ca149de 39#include "xfs_icache.h"
c24b5dfa 40#include "xfs_symlink.h"
a4fbe6ab 41#include "xfs_trans.h"
781355c6 42#include "xfs_pnfs.h"
47e1bf64 43#include "xfs_acl.h"
1da177e4 44
16f7e0fe 45#include <linux/capability.h>
1da177e4
LT
46#include <linux/dcache.h>
47#include <linux/mount.h>
48#include <linux/namei.h>
49#include <linux/pagemap.h>
5a0e3ad6 50#include <linux/slab.h>
d296d30a 51#include <linux/exportfs.h>
1da177e4
LT
52
53/*
54 * xfs_find_handle maps from userspace xfs_fsop_handlereq structure to
55 * a file or fs handle.
56 *
57 * XFS_IOC_PATH_TO_FSHANDLE
58 * returns fs handle for a mount point or path within that mount point
59 * XFS_IOC_FD_TO_HANDLE
60 * returns full handle for a FD opened in user space
61 * XFS_IOC_PATH_TO_HANDLE
62 * returns full handle for a path
63 */
d5547f9f 64int
1da177e4
LT
65xfs_find_handle(
66 unsigned int cmd,
743bb465 67 xfs_fsop_handlereq_t *hreq)
1da177e4
LT
68{
69 int hsize;
70 xfs_handle_t handle;
1da177e4 71 struct inode *inode;
a30b0367 72 struct fd f = {NULL};
4346cdd4 73 struct path path;
2903ff01 74 int error;
4346cdd4 75 struct xfs_inode *ip;
1da177e4 76
4346cdd4 77 if (cmd == XFS_IOC_FD_TO_HANDLE) {
2903ff01
AV
78 f = fdget(hreq->fd);
79 if (!f.file)
4346cdd4 80 return -EBADF;
496ad9aa 81 inode = file_inode(f.file);
4346cdd4
CH
82 } else {
83 error = user_lpath((const char __user *)hreq->path, &path);
84 if (error)
85 return error;
2b0143b5 86 inode = d_inode(path.dentry);
1da177e4 87 }
4346cdd4
CH
88 ip = XFS_I(inode);
89
90 /*
91 * We can only generate handles for inodes residing on a XFS filesystem,
92 * and only for regular files, directories or symbolic links.
93 */
94 error = -EINVAL;
95 if (inode->i_sb->s_magic != XFS_SB_MAGIC)
96 goto out_put;
97
98 error = -EBADF;
99 if (!S_ISREG(inode->i_mode) &&
100 !S_ISDIR(inode->i_mode) &&
101 !S_ISLNK(inode->i_mode))
102 goto out_put;
103
104
105 memcpy(&handle.ha_fsid, ip->i_mount->m_fixedfsid, sizeof(xfs_fsid_t));
106
107 if (cmd == XFS_IOC_PATH_TO_FSHANDLE) {
108 /*
109 * This handle only contains an fsid, zero the rest.
110 */
111 memset(&handle.ha_fid, 0, sizeof(handle.ha_fid));
112 hsize = sizeof(xfs_fsid_t);
113 } else {
c6143911
CH
114 handle.ha_fid.fid_len = sizeof(xfs_fid_t) -
115 sizeof(handle.ha_fid.fid_len);
116 handle.ha_fid.fid_pad = 0;
117 handle.ha_fid.fid_gen = ip->i_d.di_gen;
118 handle.ha_fid.fid_ino = ip->i_ino;
1da177e4
LT
119
120 hsize = XFS_HSIZE(handle);
121 }
122
4346cdd4 123 error = -EFAULT;
743bb465 124 if (copy_to_user(hreq->ohandle, &handle, hsize) ||
4346cdd4
CH
125 copy_to_user(hreq->ohandlen, &hsize, sizeof(__s32)))
126 goto out_put;
1da177e4 127
4346cdd4
CH
128 error = 0;
129
130 out_put:
131 if (cmd == XFS_IOC_FD_TO_HANDLE)
2903ff01 132 fdput(f);
4346cdd4
CH
133 else
134 path_put(&path);
135 return error;
1da177e4
LT
136}
137
1da177e4 138/*
d296d30a
CH
139 * No need to do permission checks on the various pathname components
140 * as the handle operations are privileged.
1da177e4
LT
141 */
142STATIC int
d296d30a
CH
143xfs_handle_acceptable(
144 void *context,
145 struct dentry *dentry)
146{
147 return 1;
148}
149
150/*
151 * Convert userspace handle data into a dentry.
152 */
153struct dentry *
154xfs_handle_to_dentry(
155 struct file *parfilp,
156 void __user *uhandle,
157 u32 hlen)
1da177e4 158{
1da177e4 159 xfs_handle_t handle;
d296d30a 160 struct xfs_fid64 fid;
1da177e4
LT
161
162 /*
163 * Only allow handle opens under a directory.
164 */
496ad9aa 165 if (!S_ISDIR(file_inode(parfilp)->i_mode))
d296d30a
CH
166 return ERR_PTR(-ENOTDIR);
167
168 if (hlen != sizeof(xfs_handle_t))
169 return ERR_PTR(-EINVAL);
170 if (copy_from_user(&handle, uhandle, hlen))
171 return ERR_PTR(-EFAULT);
172 if (handle.ha_fid.fid_len !=
173 sizeof(handle.ha_fid) - sizeof(handle.ha_fid.fid_len))
174 return ERR_PTR(-EINVAL);
175
176 memset(&fid, 0, sizeof(struct fid));
177 fid.ino = handle.ha_fid.fid_ino;
178 fid.gen = handle.ha_fid.fid_gen;
179
180 return exportfs_decode_fh(parfilp->f_path.mnt, (struct fid *)&fid, 3,
181 FILEID_INO32_GEN | XFS_FILEID_TYPE_64FLAG,
182 xfs_handle_acceptable, NULL);
183}
1da177e4 184
d296d30a
CH
185STATIC struct dentry *
186xfs_handlereq_to_dentry(
187 struct file *parfilp,
188 xfs_fsop_handlereq_t *hreq)
189{
190 return xfs_handle_to_dentry(parfilp, hreq->ihandle, hreq->ihandlen);
1da177e4
LT
191}
192
d5547f9f 193int
1da177e4 194xfs_open_by_handle(
1da177e4 195 struct file *parfilp,
d296d30a 196 xfs_fsop_handlereq_t *hreq)
1da177e4 197{
745ca247 198 const struct cred *cred = current_cred();
1da177e4 199 int error;
d296d30a 200 int fd;
1da177e4
LT
201 int permflag;
202 struct file *filp;
203 struct inode *inode;
204 struct dentry *dentry;
1a1d7724 205 fmode_t fmode;
765927b2 206 struct path path;
1da177e4
LT
207
208 if (!capable(CAP_SYS_ADMIN))
b474c7ae 209 return -EPERM;
1da177e4 210
d296d30a
CH
211 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
212 if (IS_ERR(dentry))
213 return PTR_ERR(dentry);
2b0143b5 214 inode = d_inode(dentry);
1da177e4
LT
215
216 /* Restrict xfs_open_by_handle to directories & regular files. */
217 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) {
b474c7ae 218 error = -EPERM;
d296d30a 219 goto out_dput;
1da177e4
LT
220 }
221
222#if BITS_PER_LONG != 32
743bb465 223 hreq->oflags |= O_LARGEFILE;
1da177e4 224#endif
d296d30a 225
743bb465 226 permflag = hreq->oflags;
1a1d7724 227 fmode = OPEN_FMODE(permflag);
1da177e4 228 if ((!(permflag & O_APPEND) || (permflag & O_TRUNC)) &&
1a1d7724 229 (fmode & FMODE_WRITE) && IS_APPEND(inode)) {
b474c7ae 230 error = -EPERM;
d296d30a 231 goto out_dput;
1da177e4
LT
232 }
233
1a1d7724 234 if ((fmode & FMODE_WRITE) && IS_IMMUTABLE(inode)) {
b474c7ae 235 error = -EACCES;
d296d30a 236 goto out_dput;
1da177e4
LT
237 }
238
239 /* Can't write directories. */
1a1d7724 240 if (S_ISDIR(inode->i_mode) && (fmode & FMODE_WRITE)) {
b474c7ae 241 error = -EISDIR;
d296d30a 242 goto out_dput;
1da177e4
LT
243 }
244
862a6293 245 fd = get_unused_fd_flags(0);
d296d30a
CH
246 if (fd < 0) {
247 error = fd;
248 goto out_dput;
1da177e4
LT
249 }
250
765927b2
AV
251 path.mnt = parfilp->f_path.mnt;
252 path.dentry = dentry;
253 filp = dentry_open(&path, hreq->oflags, cred);
254 dput(dentry);
1da177e4 255 if (IS_ERR(filp)) {
d296d30a
CH
256 put_unused_fd(fd);
257 return PTR_ERR(filp);
1da177e4 258 }
4d4be482 259
03209378 260 if (S_ISREG(inode->i_mode)) {
2e2e7bb1 261 filp->f_flags |= O_NOATIME;
4d4be482 262 filp->f_mode |= FMODE_NOCMTIME;
2e2e7bb1 263 }
1da177e4 264
d296d30a
CH
265 fd_install(fd, filp);
266 return fd;
267
268 out_dput:
269 dput(dentry);
270 return error;
1da177e4
LT
271}
272
d5547f9f 273int
1da177e4 274xfs_readlink_by_handle(
d296d30a
CH
275 struct file *parfilp,
276 xfs_fsop_handlereq_t *hreq)
1da177e4 277{
d296d30a 278 struct dentry *dentry;
1da177e4 279 __u32 olen;
804c83c3
CH
280 void *link;
281 int error;
1da177e4
LT
282
283 if (!capable(CAP_SYS_ADMIN))
b474c7ae 284 return -EPERM;
1da177e4 285
d296d30a
CH
286 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
287 if (IS_ERR(dentry))
288 return PTR_ERR(dentry);
1da177e4
LT
289
290 /* Restrict this handle operation to symlinks only. */
e36cb0b8 291 if (!d_is_symlink(dentry)) {
b474c7ae 292 error = -EINVAL;
d296d30a 293 goto out_dput;
1da177e4
LT
294 }
295
743bb465 296 if (copy_from_user(&olen, hreq->ohandlen, sizeof(__u32))) {
b474c7ae 297 error = -EFAULT;
d296d30a 298 goto out_dput;
1da177e4 299 }
1da177e4 300
804c83c3 301 link = kmalloc(MAXPATHLEN+1, GFP_KERNEL);
d296d30a 302 if (!link) {
b474c7ae 303 error = -ENOMEM;
d296d30a
CH
304 goto out_dput;
305 }
1da177e4 306
2b0143b5 307 error = xfs_readlink(XFS_I(d_inode(dentry)), link);
67fcaa73 308 if (error)
804c83c3 309 goto out_kfree;
5d826c84 310 error = readlink_copy(hreq->ohandle, olen, link);
804c83c3
CH
311 if (error)
312 goto out_kfree;
67fcaa73 313
804c83c3
CH
314 out_kfree:
315 kfree(link);
d296d30a
CH
316 out_dput:
317 dput(dentry);
804c83c3 318 return error;
1da177e4
LT
319}
320
c24b5dfa
DC
321int
322xfs_set_dmattrs(
323 xfs_inode_t *ip,
324 u_int evmask,
325 u_int16_t state)
326{
327 xfs_mount_t *mp = ip->i_mount;
328 xfs_trans_t *tp;
329 int error;
330
331 if (!capable(CAP_SYS_ADMIN))
2451337d 332 return -EPERM;
c24b5dfa
DC
333
334 if (XFS_FORCED_SHUTDOWN(mp))
2451337d 335 return -EIO;
c24b5dfa
DC
336
337 tp = xfs_trans_alloc(mp, XFS_TRANS_SET_DMATTRS);
3d3c8b52 338 error = xfs_trans_reserve(tp, &M_RES(mp)->tr_ichange, 0, 0);
c24b5dfa 339 if (error) {
4906e215 340 xfs_trans_cancel(tp);
c24b5dfa
DC
341 return error;
342 }
343 xfs_ilock(ip, XFS_ILOCK_EXCL);
344 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL);
345
346 ip->i_d.di_dmevmask = evmask;
347 ip->i_d.di_dmstate = state;
348
349 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
70393313 350 error = xfs_trans_commit(tp);
c24b5dfa
DC
351
352 return error;
353}
354
1da177e4
LT
355STATIC int
356xfs_fssetdm_by_handle(
d296d30a
CH
357 struct file *parfilp,
358 void __user *arg)
1da177e4
LT
359{
360 int error;
361 struct fsdmidata fsd;
362 xfs_fsop_setdm_handlereq_t dmhreq;
d296d30a 363 struct dentry *dentry;
1da177e4
LT
364
365 if (!capable(CAP_MKNOD))
b474c7ae 366 return -EPERM;
1da177e4 367 if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t)))
b474c7ae 368 return -EFAULT;
1da177e4 369
d9457dc0
JK
370 error = mnt_want_write_file(parfilp);
371 if (error)
372 return error;
373
d296d30a 374 dentry = xfs_handlereq_to_dentry(parfilp, &dmhreq.hreq);
d9457dc0
JK
375 if (IS_ERR(dentry)) {
376 mnt_drop_write_file(parfilp);
d296d30a 377 return PTR_ERR(dentry);
d9457dc0 378 }
1da177e4 379
2b0143b5 380 if (IS_IMMUTABLE(d_inode(dentry)) || IS_APPEND(d_inode(dentry))) {
b474c7ae 381 error = -EPERM;
6e7f75ea 382 goto out;
1da177e4
LT
383 }
384
385 if (copy_from_user(&fsd, dmhreq.data, sizeof(fsd))) {
b474c7ae 386 error = -EFAULT;
6e7f75ea 387 goto out;
1da177e4
LT
388 }
389
2b0143b5 390 error = xfs_set_dmattrs(XFS_I(d_inode(dentry)), fsd.fsd_dmevmask,
6e7f75ea 391 fsd.fsd_dmstate);
1da177e4 392
6e7f75ea 393 out:
d9457dc0 394 mnt_drop_write_file(parfilp);
d296d30a 395 dput(dentry);
6e7f75ea 396 return error;
1da177e4
LT
397}
398
399STATIC int
400xfs_attrlist_by_handle(
d296d30a
CH
401 struct file *parfilp,
402 void __user *arg)
1da177e4 403{
d296d30a 404 int error = -ENOMEM;
1da177e4
LT
405 attrlist_cursor_kern_t *cursor;
406 xfs_fsop_attrlist_handlereq_t al_hreq;
d296d30a 407 struct dentry *dentry;
1da177e4
LT
408 char *kbuf;
409
410 if (!capable(CAP_SYS_ADMIN))
b474c7ae 411 return -EPERM;
1da177e4 412 if (copy_from_user(&al_hreq, arg, sizeof(xfs_fsop_attrlist_handlereq_t)))
b474c7ae 413 return -EFAULT;
071c529e 414 if (al_hreq.buflen < sizeof(struct attrlist) ||
4e247614 415 al_hreq.buflen > XFS_XATTR_LIST_MAX)
b474c7ae 416 return -EINVAL;
1da177e4 417
90ad58a8
CH
418 /*
419 * Reject flags, only allow namespaces.
420 */
421 if (al_hreq.flags & ~(ATTR_ROOT | ATTR_SECURE))
b474c7ae 422 return -EINVAL;
90ad58a8 423
d296d30a
CH
424 dentry = xfs_handlereq_to_dentry(parfilp, &al_hreq.hreq);
425 if (IS_ERR(dentry))
426 return PTR_ERR(dentry);
1da177e4 427
fdd3ccee
DC
428 kbuf = kmem_zalloc_large(al_hreq.buflen, KM_SLEEP);
429 if (!kbuf)
430 goto out_dput;
1da177e4
LT
431
432 cursor = (attrlist_cursor_kern_t *)&al_hreq.pos;
2b0143b5 433 error = xfs_attr_list(XFS_I(d_inode(dentry)), kbuf, al_hreq.buflen,
739bfb2a 434 al_hreq.flags, cursor);
1da177e4
LT
435 if (error)
436 goto out_kfree;
437
438 if (copy_to_user(al_hreq.buffer, kbuf, al_hreq.buflen))
439 error = -EFAULT;
440
fdd3ccee
DC
441out_kfree:
442 kmem_free(kbuf);
443out_dput:
d296d30a
CH
444 dput(dentry);
445 return error;
1da177e4
LT
446}
447
28750975 448int
1da177e4 449xfs_attrmulti_attr_get(
739bfb2a 450 struct inode *inode,
a9273ca5
DC
451 unsigned char *name,
452 unsigned char __user *ubuf,
1da177e4
LT
453 __uint32_t *len,
454 __uint32_t flags)
455{
a9273ca5 456 unsigned char *kbuf;
2451337d 457 int error = -EFAULT;
e8b0ebaa 458
51fcbfe7 459 if (*len > XFS_XATTR_SIZE_MAX)
2451337d 460 return -EINVAL;
fdd3ccee
DC
461 kbuf = kmem_zalloc_large(*len, KM_SLEEP);
462 if (!kbuf)
2451337d 463 return -ENOMEM;
1da177e4 464
e8b0ebaa 465 error = xfs_attr_get(XFS_I(inode), name, kbuf, (int *)len, flags);
1da177e4
LT
466 if (error)
467 goto out_kfree;
468
469 if (copy_to_user(ubuf, kbuf, *len))
2451337d 470 error = -EFAULT;
1da177e4 471
fdd3ccee
DC
472out_kfree:
473 kmem_free(kbuf);
1da177e4
LT
474 return error;
475}
476
28750975 477int
1da177e4 478xfs_attrmulti_attr_set(
739bfb2a 479 struct inode *inode,
a9273ca5
DC
480 unsigned char *name,
481 const unsigned char __user *ubuf,
1da177e4
LT
482 __uint32_t len,
483 __uint32_t flags)
484{
a9273ca5 485 unsigned char *kbuf;
09cb22d2 486 int error;
1da177e4 487
739bfb2a 488 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 489 return -EPERM;
51fcbfe7 490 if (len > XFS_XATTR_SIZE_MAX)
2451337d 491 return -EINVAL;
1da177e4 492
0e639bde
LZ
493 kbuf = memdup_user(ubuf, len);
494 if (IS_ERR(kbuf))
495 return PTR_ERR(kbuf);
e8b0ebaa 496
09cb22d2 497 error = xfs_attr_set(XFS_I(inode), name, kbuf, len, flags);
47e1bf64
AG
498 if (!error)
499 xfs_forget_acl(inode, name, flags);
09cb22d2
AG
500 kfree(kbuf);
501 return error;
1da177e4
LT
502}
503
28750975 504int
1da177e4 505xfs_attrmulti_attr_remove(
739bfb2a 506 struct inode *inode,
a9273ca5 507 unsigned char *name,
1da177e4
LT
508 __uint32_t flags)
509{
47e1bf64
AG
510 int error;
511
739bfb2a 512 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 513 return -EPERM;
47e1bf64
AG
514 error = xfs_attr_remove(XFS_I(inode), name, flags);
515 if (!error)
516 xfs_forget_acl(inode, name, flags);
517 return error;
1da177e4
LT
518}
519
520STATIC int
521xfs_attrmulti_by_handle(
42a74f20 522 struct file *parfilp,
d296d30a 523 void __user *arg)
1da177e4
LT
524{
525 int error;
526 xfs_attr_multiop_t *ops;
527 xfs_fsop_attrmulti_handlereq_t am_hreq;
d296d30a 528 struct dentry *dentry;
1da177e4 529 unsigned int i, size;
a9273ca5 530 unsigned char *attr_name;
1da177e4
LT
531
532 if (!capable(CAP_SYS_ADMIN))
b474c7ae 533 return -EPERM;
1da177e4 534 if (copy_from_user(&am_hreq, arg, sizeof(xfs_fsop_attrmulti_handlereq_t)))
b474c7ae 535 return -EFAULT;
1da177e4 536
fda168c2
ZW
537 /* overflow check */
538 if (am_hreq.opcount >= INT_MAX / sizeof(xfs_attr_multiop_t))
539 return -E2BIG;
540
d296d30a
CH
541 dentry = xfs_handlereq_to_dentry(parfilp, &am_hreq.hreq);
542 if (IS_ERR(dentry))
543 return PTR_ERR(dentry);
1da177e4 544
2451337d 545 error = -E2BIG;
e182f57a 546 size = am_hreq.opcount * sizeof(xfs_attr_multiop_t);
1da177e4 547 if (!size || size > 16 * PAGE_SIZE)
d296d30a 548 goto out_dput;
1da177e4 549
0e639bde
LZ
550 ops = memdup_user(am_hreq.ops, size);
551 if (IS_ERR(ops)) {
2451337d 552 error = PTR_ERR(ops);
d296d30a 553 goto out_dput;
0e639bde 554 }
1da177e4 555
2451337d 556 error = -ENOMEM;
1da177e4
LT
557 attr_name = kmalloc(MAXNAMELEN, GFP_KERNEL);
558 if (!attr_name)
559 goto out_kfree_ops;
560
1da177e4
LT
561 error = 0;
562 for (i = 0; i < am_hreq.opcount; i++) {
a9273ca5 563 ops[i].am_error = strncpy_from_user((char *)attr_name,
1da177e4
LT
564 ops[i].am_attrname, MAXNAMELEN);
565 if (ops[i].am_error == 0 || ops[i].am_error == MAXNAMELEN)
2451337d 566 error = -ERANGE;
1da177e4
LT
567 if (ops[i].am_error < 0)
568 break;
569
570 switch (ops[i].am_opcode) {
571 case ATTR_OP_GET:
d296d30a 572 ops[i].am_error = xfs_attrmulti_attr_get(
2b0143b5 573 d_inode(dentry), attr_name,
d296d30a
CH
574 ops[i].am_attrvalue, &ops[i].am_length,
575 ops[i].am_flags);
1da177e4
LT
576 break;
577 case ATTR_OP_SET:
a561be71 578 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
579 if (ops[i].am_error)
580 break;
d296d30a 581 ops[i].am_error = xfs_attrmulti_attr_set(
2b0143b5 582 d_inode(dentry), attr_name,
d296d30a
CH
583 ops[i].am_attrvalue, ops[i].am_length,
584 ops[i].am_flags);
2a79f17e 585 mnt_drop_write_file(parfilp);
1da177e4
LT
586 break;
587 case ATTR_OP_REMOVE:
a561be71 588 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
589 if (ops[i].am_error)
590 break;
d296d30a 591 ops[i].am_error = xfs_attrmulti_attr_remove(
2b0143b5 592 d_inode(dentry), attr_name,
d296d30a 593 ops[i].am_flags);
2a79f17e 594 mnt_drop_write_file(parfilp);
1da177e4
LT
595 break;
596 default:
2451337d 597 ops[i].am_error = -EINVAL;
1da177e4
LT
598 }
599 }
600
601 if (copy_to_user(am_hreq.ops, ops, size))
2451337d 602 error = -EFAULT;
1da177e4
LT
603
604 kfree(attr_name);
605 out_kfree_ops:
606 kfree(ops);
d296d30a
CH
607 out_dput:
608 dput(dentry);
2451337d 609 return error;
1da177e4
LT
610}
611
d5547f9f 612int
1da177e4 613xfs_ioc_space(
993386c1 614 struct xfs_inode *ip,
f37ea149 615 struct inode *inode,
1da177e4
LT
616 struct file *filp,
617 int ioflags,
618 unsigned int cmd,
743bb465 619 xfs_flock64_t *bf)
1da177e4 620{
865e9446 621 struct iattr iattr;
8add71ca 622 enum xfs_prealloc_flags flags = 0;
781355c6 623 uint iolock = XFS_IOLOCK_EXCL;
1da177e4
LT
624 int error;
625
743bb465 626 /*
627 * Only allow the sys admin to reserve space unless
628 * unwritten extents are enabled.
629 */
630 if (!xfs_sb_version_hasextflgbit(&ip->i_mount->m_sb) &&
631 !capable(CAP_SYS_ADMIN))
b474c7ae 632 return -EPERM;
743bb465 633
f37ea149 634 if (inode->i_flags & (S_IMMUTABLE|S_APPEND))
b474c7ae 635 return -EPERM;
1da177e4 636
ad4a8ac4 637 if (!(filp->f_mode & FMODE_WRITE))
b474c7ae 638 return -EBADF;
1da177e4 639
f37ea149 640 if (!S_ISREG(inode->i_mode))
b474c7ae 641 return -EINVAL;
1da177e4 642
8add71ca
CH
643 if (filp->f_flags & O_DSYNC)
644 flags |= XFS_PREALLOC_SYNC;
e8e9ad42 645 if (ioflags & XFS_IO_INVIS)
8add71ca
CH
646 flags |= XFS_PREALLOC_INVISIBLE;
647
d9457dc0
JK
648 error = mnt_want_write_file(filp);
649 if (error)
650 return error;
865e9446 651
781355c6 652 xfs_ilock(ip, iolock);
21c3ea18 653 error = xfs_break_layouts(inode, &iolock, false);
781355c6
CH
654 if (error)
655 goto out_unlock;
865e9446 656
e8e9ad42
DC
657 xfs_ilock(ip, XFS_MMAPLOCK_EXCL);
658 iolock |= XFS_MMAPLOCK_EXCL;
659
865e9446
CH
660 switch (bf->l_whence) {
661 case 0: /*SEEK_SET*/
662 break;
663 case 1: /*SEEK_CUR*/
664 bf->l_start += filp->f_pos;
665 break;
666 case 2: /*SEEK_END*/
667 bf->l_start += XFS_ISIZE(ip);
668 break;
669 default:
2451337d 670 error = -EINVAL;
865e9446
CH
671 goto out_unlock;
672 }
673
674 /*
675 * length of <= 0 for resv/unresv/zero is invalid. length for
676 * alloc/free is ignored completely and we have no idea what userspace
677 * might have set it to, so set it to zero to allow range
678 * checks to pass.
679 */
680 switch (cmd) {
681 case XFS_IOC_ZERO_RANGE:
682 case XFS_IOC_RESVSP:
683 case XFS_IOC_RESVSP64:
684 case XFS_IOC_UNRESVSP:
685 case XFS_IOC_UNRESVSP64:
686 if (bf->l_len <= 0) {
2451337d 687 error = -EINVAL;
865e9446
CH
688 goto out_unlock;
689 }
690 break;
691 default:
692 bf->l_len = 0;
693 break;
694 }
695
696 if (bf->l_start < 0 ||
8add71ca 697 bf->l_start > inode->i_sb->s_maxbytes ||
865e9446 698 bf->l_start + bf->l_len < 0 ||
8add71ca 699 bf->l_start + bf->l_len >= inode->i_sb->s_maxbytes) {
2451337d 700 error = -EINVAL;
865e9446
CH
701 goto out_unlock;
702 }
703
704 switch (cmd) {
705 case XFS_IOC_ZERO_RANGE:
8add71ca 706 flags |= XFS_PREALLOC_SET;
865e9446 707 error = xfs_zero_file_space(ip, bf->l_start, bf->l_len);
865e9446
CH
708 break;
709 case XFS_IOC_RESVSP:
710 case XFS_IOC_RESVSP64:
8add71ca 711 flags |= XFS_PREALLOC_SET;
865e9446
CH
712 error = xfs_alloc_file_space(ip, bf->l_start, bf->l_len,
713 XFS_BMAPI_PREALLOC);
865e9446
CH
714 break;
715 case XFS_IOC_UNRESVSP:
716 case XFS_IOC_UNRESVSP64:
717 error = xfs_free_file_space(ip, bf->l_start, bf->l_len);
718 break;
719 case XFS_IOC_ALLOCSP:
720 case XFS_IOC_ALLOCSP64:
721 case XFS_IOC_FREESP:
722 case XFS_IOC_FREESP64:
8add71ca 723 flags |= XFS_PREALLOC_CLEAR;
865e9446
CH
724 if (bf->l_start > XFS_ISIZE(ip)) {
725 error = xfs_alloc_file_space(ip, XFS_ISIZE(ip),
726 bf->l_start - XFS_ISIZE(ip), 0);
727 if (error)
728 goto out_unlock;
729 }
730
731 iattr.ia_valid = ATTR_SIZE;
732 iattr.ia_size = bf->l_start;
733
734 error = xfs_setattr_size(ip, &iattr);
865e9446
CH
735 break;
736 default:
737 ASSERT(0);
2451337d 738 error = -EINVAL;
865e9446
CH
739 }
740
741 if (error)
742 goto out_unlock;
743
8add71ca 744 error = xfs_update_prealloc_flags(ip, flags);
865e9446
CH
745
746out_unlock:
781355c6 747 xfs_iunlock(ip, iolock);
d9457dc0 748 mnt_drop_write_file(filp);
2451337d 749 return error;
1da177e4
LT
750}
751
752STATIC int
753xfs_ioc_bulkstat(
754 xfs_mount_t *mp,
755 unsigned int cmd,
756 void __user *arg)
757{
758 xfs_fsop_bulkreq_t bulkreq;
759 int count; /* # of records returned */
760 xfs_ino_t inlast; /* last inode number */
761 int done;
762 int error;
763
764 /* done = 1 if there are more stats to get and if bulkstat */
765 /* should be called again (unused here, but used in dmapi) */
766
767 if (!capable(CAP_SYS_ADMIN))
768 return -EPERM;
769
770 if (XFS_FORCED_SHUTDOWN(mp))
b474c7ae 771 return -EIO;
1da177e4
LT
772
773 if (copy_from_user(&bulkreq, arg, sizeof(xfs_fsop_bulkreq_t)))
b474c7ae 774 return -EFAULT;
1da177e4
LT
775
776 if (copy_from_user(&inlast, bulkreq.lastip, sizeof(__s64)))
b474c7ae 777 return -EFAULT;
1da177e4
LT
778
779 if ((count = bulkreq.icount) <= 0)
b474c7ae 780 return -EINVAL;
1da177e4 781
cd57e594 782 if (bulkreq.ubuffer == NULL)
b474c7ae 783 return -EINVAL;
cd57e594 784
1da177e4
LT
785 if (cmd == XFS_IOC_FSINUMBERS)
786 error = xfs_inumbers(mp, &inlast, &count,
faa63e95 787 bulkreq.ubuffer, xfs_inumbers_fmt);
1da177e4 788 else if (cmd == XFS_IOC_FSBULKSTAT_SINGLE)
d716f8ee
CH
789 error = xfs_bulkstat_one(mp, inlast, bulkreq.ubuffer,
790 sizeof(xfs_bstat_t), NULL, &done);
cd57e594 791 else /* XFS_IOC_FSBULKSTAT */
7dce11db
CH
792 error = xfs_bulkstat(mp, &inlast, &count, xfs_bulkstat_one,
793 sizeof(xfs_bstat_t), bulkreq.ubuffer,
794 &done);
1da177e4
LT
795
796 if (error)
2451337d 797 return error;
1da177e4
LT
798
799 if (bulkreq.ocount != NULL) {
800 if (copy_to_user(bulkreq.lastip, &inlast,
801 sizeof(xfs_ino_t)))
b474c7ae 802 return -EFAULT;
1da177e4
LT
803
804 if (copy_to_user(bulkreq.ocount, &count, sizeof(count)))
b474c7ae 805 return -EFAULT;
1da177e4
LT
806 }
807
808 return 0;
809}
810
811STATIC int
812xfs_ioc_fsgeometry_v1(
813 xfs_mount_t *mp,
814 void __user *arg)
815{
eeb2036b 816 xfs_fsop_geom_t fsgeo;
1da177e4
LT
817 int error;
818
eeb2036b 819 error = xfs_fs_geometry(mp, &fsgeo, 3);
1da177e4 820 if (error)
2451337d 821 return error;
1da177e4 822
eeb2036b
AE
823 /*
824 * Caller should have passed an argument of type
825 * xfs_fsop_geom_v1_t. This is a proper subset of the
826 * xfs_fsop_geom_t that xfs_fs_geometry() fills in.
827 */
828 if (copy_to_user(arg, &fsgeo, sizeof(xfs_fsop_geom_v1_t)))
b474c7ae 829 return -EFAULT;
1da177e4
LT
830 return 0;
831}
832
833STATIC int
834xfs_ioc_fsgeometry(
835 xfs_mount_t *mp,
836 void __user *arg)
837{
838 xfs_fsop_geom_t fsgeo;
839 int error;
840
841 error = xfs_fs_geometry(mp, &fsgeo, 4);
842 if (error)
2451337d 843 return error;
1da177e4
LT
844
845 if (copy_to_user(arg, &fsgeo, sizeof(fsgeo)))
b474c7ae 846 return -EFAULT;
1da177e4
LT
847 return 0;
848}
849
850/*
851 * Linux extended inode flags interface.
852 */
1da177e4
LT
853
854STATIC unsigned int
855xfs_merge_ioc_xflags(
856 unsigned int flags,
857 unsigned int start)
858{
859 unsigned int xflags = start;
860
39058a0e 861 if (flags & FS_IMMUTABLE_FL)
e7b89481 862 xflags |= FS_XFLAG_IMMUTABLE;
1da177e4 863 else
e7b89481 864 xflags &= ~FS_XFLAG_IMMUTABLE;
39058a0e 865 if (flags & FS_APPEND_FL)
e7b89481 866 xflags |= FS_XFLAG_APPEND;
1da177e4 867 else
e7b89481 868 xflags &= ~FS_XFLAG_APPEND;
39058a0e 869 if (flags & FS_SYNC_FL)
e7b89481 870 xflags |= FS_XFLAG_SYNC;
1da177e4 871 else
e7b89481 872 xflags &= ~FS_XFLAG_SYNC;
39058a0e 873 if (flags & FS_NOATIME_FL)
e7b89481 874 xflags |= FS_XFLAG_NOATIME;
1da177e4 875 else
e7b89481 876 xflags &= ~FS_XFLAG_NOATIME;
39058a0e 877 if (flags & FS_NODUMP_FL)
e7b89481 878 xflags |= FS_XFLAG_NODUMP;
1da177e4 879 else
e7b89481 880 xflags &= ~FS_XFLAG_NODUMP;
1da177e4
LT
881
882 return xflags;
883}
884
885STATIC unsigned int
886xfs_di2lxflags(
887 __uint16_t di_flags)
888{
889 unsigned int flags = 0;
890
891 if (di_flags & XFS_DIFLAG_IMMUTABLE)
39058a0e 892 flags |= FS_IMMUTABLE_FL;
1da177e4 893 if (di_flags & XFS_DIFLAG_APPEND)
39058a0e 894 flags |= FS_APPEND_FL;
1da177e4 895 if (di_flags & XFS_DIFLAG_SYNC)
39058a0e 896 flags |= FS_SYNC_FL;
1da177e4 897 if (di_flags & XFS_DIFLAG_NOATIME)
39058a0e 898 flags |= FS_NOATIME_FL;
1da177e4 899 if (di_flags & XFS_DIFLAG_NODUMP)
39058a0e 900 flags |= FS_NODUMP_FL;
1da177e4
LT
901 return flags;
902}
903
c83bfab1
CH
904STATIC int
905xfs_ioc_fsgetxattr(
906 xfs_inode_t *ip,
907 int attr,
908 void __user *arg)
909{
910 struct fsxattr fa;
911
a122eb2f
DR
912 memset(&fa, 0, sizeof(struct fsxattr));
913
c83bfab1
CH
914 xfs_ilock(ip, XFS_ILOCK_SHARED);
915 fa.fsx_xflags = xfs_ip2xflags(ip);
916 fa.fsx_extsize = ip->i_d.di_extsize << ip->i_mount->m_sb.sb_blocklog;
6743099c 917 fa.fsx_projid = xfs_get_projid(ip);
c83bfab1
CH
918
919 if (attr) {
920 if (ip->i_afp) {
921 if (ip->i_afp->if_flags & XFS_IFEXTENTS)
922 fa.fsx_nextents = ip->i_afp->if_bytes /
923 sizeof(xfs_bmbt_rec_t);
924 else
925 fa.fsx_nextents = ip->i_d.di_anextents;
926 } else
927 fa.fsx_nextents = 0;
928 } else {
929 if (ip->i_df.if_flags & XFS_IFEXTENTS)
930 fa.fsx_nextents = ip->i_df.if_bytes /
931 sizeof(xfs_bmbt_rec_t);
932 else
933 fa.fsx_nextents = ip->i_d.di_nextents;
934 }
935 xfs_iunlock(ip, XFS_ILOCK_SHARED);
936
937 if (copy_to_user(arg, &fa, sizeof(fa)))
938 return -EFAULT;
939 return 0;
940}
941
25fe55e8
CH
942STATIC void
943xfs_set_diflags(
944 struct xfs_inode *ip,
945 unsigned int xflags)
946{
947 unsigned int di_flags;
58f88ca2 948 uint64_t di_flags2;
25fe55e8
CH
949
950 /* can't set PREALLOC this way, just preserve it */
951 di_flags = (ip->i_d.di_flags & XFS_DIFLAG_PREALLOC);
e7b89481 952 if (xflags & FS_XFLAG_IMMUTABLE)
25fe55e8 953 di_flags |= XFS_DIFLAG_IMMUTABLE;
e7b89481 954 if (xflags & FS_XFLAG_APPEND)
25fe55e8 955 di_flags |= XFS_DIFLAG_APPEND;
e7b89481 956 if (xflags & FS_XFLAG_SYNC)
25fe55e8 957 di_flags |= XFS_DIFLAG_SYNC;
e7b89481 958 if (xflags & FS_XFLAG_NOATIME)
25fe55e8 959 di_flags |= XFS_DIFLAG_NOATIME;
e7b89481 960 if (xflags & FS_XFLAG_NODUMP)
25fe55e8 961 di_flags |= XFS_DIFLAG_NODUMP;
e7b89481 962 if (xflags & FS_XFLAG_NODEFRAG)
25fe55e8 963 di_flags |= XFS_DIFLAG_NODEFRAG;
e7b89481 964 if (xflags & FS_XFLAG_FILESTREAM)
25fe55e8 965 di_flags |= XFS_DIFLAG_FILESTREAM;
abbede1b 966 if (S_ISDIR(ip->i_d.di_mode)) {
e7b89481 967 if (xflags & FS_XFLAG_RTINHERIT)
25fe55e8 968 di_flags |= XFS_DIFLAG_RTINHERIT;
e7b89481 969 if (xflags & FS_XFLAG_NOSYMLINKS)
25fe55e8 970 di_flags |= XFS_DIFLAG_NOSYMLINKS;
e7b89481 971 if (xflags & FS_XFLAG_EXTSZINHERIT)
25fe55e8 972 di_flags |= XFS_DIFLAG_EXTSZINHERIT;
e7b89481 973 if (xflags & FS_XFLAG_PROJINHERIT)
9336e3a7 974 di_flags |= XFS_DIFLAG_PROJINHERIT;
abbede1b 975 } else if (S_ISREG(ip->i_d.di_mode)) {
e7b89481 976 if (xflags & FS_XFLAG_REALTIME)
25fe55e8 977 di_flags |= XFS_DIFLAG_REALTIME;
e7b89481 978 if (xflags & FS_XFLAG_EXTSIZE)
25fe55e8
CH
979 di_flags |= XFS_DIFLAG_EXTSIZE;
980 }
25fe55e8 981 ip->i_d.di_flags = di_flags;
58f88ca2
DC
982
983 /* diflags2 only valid for v3 inodes. */
984 if (ip->i_d.di_version < 3)
985 return;
986
987 di_flags2 = 0;
988 if (xflags & FS_XFLAG_DAX)
989 di_flags2 |= XFS_DIFLAG2_DAX;
990
991 ip->i_d.di_flags2 = di_flags2;
992
25fe55e8
CH
993}
994
f13fae2d
CH
995STATIC void
996xfs_diflags_to_linux(
997 struct xfs_inode *ip)
998{
e4f75291 999 struct inode *inode = VFS_I(ip);
f13fae2d
CH
1000 unsigned int xflags = xfs_ip2xflags(ip);
1001
e7b89481 1002 if (xflags & FS_XFLAG_IMMUTABLE)
f13fae2d
CH
1003 inode->i_flags |= S_IMMUTABLE;
1004 else
1005 inode->i_flags &= ~S_IMMUTABLE;
e7b89481 1006 if (xflags & FS_XFLAG_APPEND)
f13fae2d
CH
1007 inode->i_flags |= S_APPEND;
1008 else
1009 inode->i_flags &= ~S_APPEND;
e7b89481 1010 if (xflags & FS_XFLAG_SYNC)
f13fae2d
CH
1011 inode->i_flags |= S_SYNC;
1012 else
1013 inode->i_flags &= ~S_SYNC;
e7b89481 1014 if (xflags & FS_XFLAG_NOATIME)
f13fae2d
CH
1015 inode->i_flags |= S_NOATIME;
1016 else
1017 inode->i_flags &= ~S_NOATIME;
58f88ca2
DC
1018 if (xflags & FS_XFLAG_DAX)
1019 inode->i_flags |= S_DAX;
1020 else
1021 inode->i_flags &= ~S_DAX;
1022
f13fae2d 1023}
25fe55e8 1024
29a17c00
DC
1025static int
1026xfs_ioctl_setattr_xflags(
1027 struct xfs_trans *tp,
1028 struct xfs_inode *ip,
1029 struct fsxattr *fa)
1030{
1031 struct xfs_mount *mp = ip->i_mount;
1032
1033 /* Can't change realtime flag if any extents are allocated. */
1034 if ((ip->i_d.di_nextents || ip->i_delayed_blks) &&
e7b89481 1035 XFS_IS_REALTIME_INODE(ip) != (fa->fsx_xflags & FS_XFLAG_REALTIME))
29a17c00
DC
1036 return -EINVAL;
1037
1038 /* If realtime flag is set then must have realtime device */
e7b89481 1039 if (fa->fsx_xflags & FS_XFLAG_REALTIME) {
29a17c00
DC
1040 if (mp->m_sb.sb_rblocks == 0 || mp->m_sb.sb_rextsize == 0 ||
1041 (ip->i_d.di_extsize % mp->m_sb.sb_rextsize))
1042 return -EINVAL;
1043 }
1044
1045 /*
1046 * Can't modify an immutable/append-only file unless
1047 * we have appropriate permission.
1048 */
1049 if (((ip->i_d.di_flags & (XFS_DIFLAG_IMMUTABLE | XFS_DIFLAG_APPEND)) ||
e7b89481 1050 (fa->fsx_xflags & (FS_XFLAG_IMMUTABLE | FS_XFLAG_APPEND))) &&
29a17c00
DC
1051 !capable(CAP_LINUX_IMMUTABLE))
1052 return -EPERM;
1053
29a17c00
DC
1054 xfs_set_diflags(ip, fa->fsx_xflags);
1055 xfs_diflags_to_linux(ip);
1056 xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG);
1057 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
ff6d6af2 1058 XFS_STATS_INC(mp, xs_ig_attrchg);
29a17c00
DC
1059 return 0;
1060}
1061
8f3d17ab
DC
1062/*
1063 * Set up the transaction structure for the setattr operation, checking that we
1064 * have permission to do so. On success, return a clean transaction and the
1065 * inode locked exclusively ready for further operation specific checks. On
1066 * failure, return an error without modifying or locking the inode.
1067 */
1068static struct xfs_trans *
1069xfs_ioctl_setattr_get_trans(
1070 struct xfs_inode *ip)
1071{
1072 struct xfs_mount *mp = ip->i_mount;
1073 struct xfs_trans *tp;
1074 int error;
1075
1076 if (mp->m_flags & XFS_MOUNT_RDONLY)
1077 return ERR_PTR(-EROFS);
1078 if (XFS_FORCED_SHUTDOWN(mp))
1079 return ERR_PTR(-EIO);
1080
1081 tp = xfs_trans_alloc(mp, XFS_TRANS_SETATTR_NOT_SIZE);
1082 error = xfs_trans_reserve(tp, &M_RES(mp)->tr_ichange, 0, 0);
1083 if (error)
1084 goto out_cancel;
1085
1086 xfs_ilock(ip, XFS_ILOCK_EXCL);
1087 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL);
1088
1089 /*
1090 * CAP_FOWNER overrides the following restrictions:
1091 *
1092 * The user ID of the calling process must be equal to the file owner
1093 * ID, except in cases where the CAP_FSETID capability is applicable.
1094 */
1095 if (!inode_owner_or_capable(VFS_I(ip))) {
1096 error = -EPERM;
1097 goto out_cancel;
1098 }
1099
1100 if (mp->m_flags & XFS_MOUNT_WSYNC)
1101 xfs_trans_set_sync(tp);
1102
1103 return tp;
1104
1105out_cancel:
4906e215 1106 xfs_trans_cancel(tp);
8f3d17ab
DC
1107 return ERR_PTR(error);
1108}
1109
9b94fcc3
IP
1110/*
1111 * extent size hint validation is somewhat cumbersome. Rules are:
1112 *
1113 * 1. extent size hint is only valid for directories and regular files
e7b89481
DC
1114 * 2. FS_XFLAG_EXTSIZE is only valid for regular files
1115 * 3. FS_XFLAG_EXTSZINHERIT is only valid for directories.
9b94fcc3
IP
1116 * 4. can only be changed on regular files if no extents are allocated
1117 * 5. can be changed on directories at any time
1118 * 6. extsize hint of 0 turns off hints, clears inode flags.
1119 * 7. Extent size must be a multiple of the appropriate block size.
1120 * 8. for non-realtime files, the extent size hint must be limited
1121 * to half the AG size to avoid alignment extending the extent beyond the
1122 * limits of the AG.
1123 */
f92090e9 1124static int
d4388d3c
DC
1125xfs_ioctl_setattr_check_extsize(
1126 struct xfs_inode *ip,
1127 struct fsxattr *fa)
1128{
1129 struct xfs_mount *mp = ip->i_mount;
1130
e7b89481 1131 if ((fa->fsx_xflags & FS_XFLAG_EXTSIZE) && !S_ISREG(ip->i_d.di_mode))
9b94fcc3
IP
1132 return -EINVAL;
1133
e7b89481 1134 if ((fa->fsx_xflags & FS_XFLAG_EXTSZINHERIT) &&
9b94fcc3
IP
1135 !S_ISDIR(ip->i_d.di_mode))
1136 return -EINVAL;
1137
1138 if (S_ISREG(ip->i_d.di_mode) && ip->i_d.di_nextents &&
d4388d3c
DC
1139 ((ip->i_d.di_extsize << mp->m_sb.sb_blocklog) != fa->fsx_extsize))
1140 return -EINVAL;
1141
d4388d3c
DC
1142 if (fa->fsx_extsize != 0) {
1143 xfs_extlen_t size;
1144 xfs_fsblock_t extsize_fsb;
1145
1146 extsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_extsize);
1147 if (extsize_fsb > MAXEXTLEN)
1148 return -EINVAL;
1149
1150 if (XFS_IS_REALTIME_INODE(ip) ||
e7b89481 1151 (fa->fsx_xflags & FS_XFLAG_REALTIME)) {
d4388d3c
DC
1152 size = mp->m_sb.sb_rextsize << mp->m_sb.sb_blocklog;
1153 } else {
1154 size = mp->m_sb.sb_blocksize;
1155 if (extsize_fsb > mp->m_sb.sb_agblocks / 2)
1156 return -EINVAL;
1157 }
1158
1159 if (fa->fsx_extsize % size)
1160 return -EINVAL;
9b94fcc3 1161 } else
e7b89481 1162 fa->fsx_xflags &= ~(FS_XFLAG_EXTSIZE | FS_XFLAG_EXTSZINHERIT);
9b94fcc3 1163
d4388d3c
DC
1164 return 0;
1165}
1166
f92090e9 1167static int
23bd0735
DC
1168xfs_ioctl_setattr_check_projid(
1169 struct xfs_inode *ip,
1170 struct fsxattr *fa)
1171{
1172 /* Disallow 32bit project ids if projid32bit feature is not enabled. */
1173 if (fa->fsx_projid > (__uint16_t)-1 &&
1174 !xfs_sb_version_hasprojid32bit(&ip->i_mount->m_sb))
1175 return -EINVAL;
1176
1177 /*
1178 * Project Quota ID state is only allowed to change from within the init
1179 * namespace. Enforce that restriction only if we are trying to change
1180 * the quota ID state. Everything else is allowed in user namespaces.
1181 */
1182 if (current_user_ns() == &init_user_ns)
1183 return 0;
1184
1185 if (xfs_get_projid(ip) != fa->fsx_projid)
1186 return -EINVAL;
e7b89481 1187 if ((fa->fsx_xflags & FS_XFLAG_PROJINHERIT) !=
23bd0735
DC
1188 (ip->i_d.di_flags & XFS_DIFLAG_PROJINHERIT))
1189 return -EINVAL;
1190
1191 return 0;
1192}
25fe55e8
CH
1193
1194STATIC int
1195xfs_ioctl_setattr(
1196 xfs_inode_t *ip,
fd179b9c 1197 struct fsxattr *fa)
25fe55e8
CH
1198{
1199 struct xfs_mount *mp = ip->i_mount;
1200 struct xfs_trans *tp;
7d095257 1201 struct xfs_dquot *udqp = NULL;
92f8ff73 1202 struct xfs_dquot *pdqp = NULL;
25fe55e8
CH
1203 struct xfs_dquot *olddquot = NULL;
1204 int code;
1205
cca28fb8 1206 trace_xfs_ioctl_setattr(ip);
25fe55e8 1207
23bd0735
DC
1208 code = xfs_ioctl_setattr_check_projid(ip, fa);
1209 if (code)
1210 return code;
23963e54 1211
25fe55e8
CH
1212 /*
1213 * If disk quotas is on, we make sure that the dquots do exist on disk,
1214 * before we start any other transactions. Trying to do this later
1215 * is messy. We don't care to take a readlock to look at the ids
1216 * in inode here, because we can't hold it across the trans_reserve.
1217 * If the IDs do change before we take the ilock, we're covered
1218 * because the i_*dquot fields will get updated anyway.
1219 */
fd179b9c 1220 if (XFS_IS_QUOTA_ON(mp)) {
7d095257 1221 code = xfs_qm_vop_dqalloc(ip, ip->i_d.di_uid,
25fe55e8 1222 ip->i_d.di_gid, fa->fsx_projid,
92f8ff73 1223 XFS_QMOPT_PQUOTA, &udqp, NULL, &pdqp);
25fe55e8
CH
1224 if (code)
1225 return code;
1226 }
1227
8f3d17ab
DC
1228 tp = xfs_ioctl_setattr_get_trans(ip);
1229 if (IS_ERR(tp)) {
1230 code = PTR_ERR(tp);
1231 goto error_free_dquots;
25fe55e8
CH
1232 }
1233
25fe55e8 1234
fd179b9c
DC
1235 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp) &&
1236 xfs_get_projid(ip) != fa->fsx_projid) {
1237 code = xfs_qm_vop_chown_reserve(tp, ip, udqp, NULL, pdqp,
1238 capable(CAP_FOWNER) ? XFS_QMOPT_FORCE_RES : 0);
1239 if (code) /* out of quota */
d4388d3c 1240 goto error_trans_cancel;
25fe55e8
CH
1241 }
1242
d4388d3c
DC
1243 code = xfs_ioctl_setattr_check_extsize(ip, fa);
1244 if (code)
1245 goto error_trans_cancel;
25fe55e8 1246
29a17c00
DC
1247 code = xfs_ioctl_setattr_xflags(tp, ip, fa);
1248 if (code)
d4388d3c 1249 goto error_trans_cancel;
25fe55e8
CH
1250
1251 /*
fd179b9c
DC
1252 * Change file ownership. Must be the owner or privileged. CAP_FSETID
1253 * overrides the following restrictions:
1254 *
1255 * The set-user-ID and set-group-ID bits of a file will be cleared upon
1256 * successful return from chown()
25fe55e8 1257 */
25fe55e8 1258
fd179b9c
DC
1259 if ((ip->i_d.di_mode & (S_ISUID|S_ISGID)) &&
1260 !capable_wrt_inode_uidgid(VFS_I(ip), CAP_FSETID))
1261 ip->i_d.di_mode &= ~(S_ISUID|S_ISGID);
25fe55e8 1262
fd179b9c
DC
1263 /* Change the ownerships and register project quota modifications */
1264 if (xfs_get_projid(ip) != fa->fsx_projid) {
1265 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp)) {
1266 olddquot = xfs_qm_vop_chown(tp, ip,
1267 &ip->i_pdquot, pdqp);
1268 }
1269 ASSERT(ip->i_d.di_version > 1);
1270 xfs_set_projid(ip, fa->fsx_projid);
f13fae2d 1271 }
25fe55e8 1272
a872703f
DC
1273 /*
1274 * Only set the extent size hint if we've already determined that the
1275 * extent size hint should be set on the inode. If no extent size flags
1276 * are set on the inode then unconditionally clear the extent size hint.
1277 */
fd179b9c
DC
1278 if (ip->i_d.di_flags & (XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT))
1279 ip->i_d.di_extsize = fa->fsx_extsize >> mp->m_sb.sb_blocklog;
1280 else
1281 ip->i_d.di_extsize = 0;
25fe55e8 1282
70393313 1283 code = xfs_trans_commit(tp);
25fe55e8
CH
1284
1285 /*
1286 * Release any dquot(s) the inode had kept before chown.
1287 */
7d095257
CH
1288 xfs_qm_dqrele(olddquot);
1289 xfs_qm_dqrele(udqp);
92f8ff73 1290 xfs_qm_dqrele(pdqp);
25fe55e8 1291
288699fe 1292 return code;
25fe55e8 1293
d4388d3c 1294error_trans_cancel:
4906e215 1295 xfs_trans_cancel(tp);
8f3d17ab 1296error_free_dquots:
7d095257 1297 xfs_qm_dqrele(udqp);
92f8ff73 1298 xfs_qm_dqrele(pdqp);
25fe55e8
CH
1299 return code;
1300}
1301
1da177e4 1302STATIC int
df26cfe8 1303xfs_ioc_fssetxattr(
1da177e4
LT
1304 xfs_inode_t *ip,
1305 struct file *filp,
1da177e4
LT
1306 void __user *arg)
1307{
1308 struct fsxattr fa;
d9457dc0 1309 int error;
df26cfe8
LM
1310
1311 if (copy_from_user(&fa, arg, sizeof(fa)))
1312 return -EFAULT;
1da177e4 1313
d9457dc0
JK
1314 error = mnt_want_write_file(filp);
1315 if (error)
1316 return error;
fd179b9c 1317 error = xfs_ioctl_setattr(ip, &fa);
d9457dc0 1318 mnt_drop_write_file(filp);
2451337d 1319 return error;
df26cfe8 1320}
1da177e4 1321
df26cfe8
LM
1322STATIC int
1323xfs_ioc_getxflags(
1324 xfs_inode_t *ip,
1325 void __user *arg)
1326{
1327 unsigned int flags;
1da177e4 1328
df26cfe8
LM
1329 flags = xfs_di2lxflags(ip->i_d.di_flags);
1330 if (copy_to_user(arg, &flags, sizeof(flags)))
1331 return -EFAULT;
1332 return 0;
1333}
1da177e4 1334
df26cfe8
LM
1335STATIC int
1336xfs_ioc_setxflags(
f96291f6 1337 struct xfs_inode *ip,
df26cfe8
LM
1338 struct file *filp,
1339 void __user *arg)
1340{
f96291f6 1341 struct xfs_trans *tp;
25fe55e8 1342 struct fsxattr fa;
df26cfe8 1343 unsigned int flags;
f96291f6 1344 int error;
1da177e4 1345
df26cfe8
LM
1346 if (copy_from_user(&flags, arg, sizeof(flags)))
1347 return -EFAULT;
1da177e4 1348
df26cfe8
LM
1349 if (flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL | \
1350 FS_NOATIME_FL | FS_NODUMP_FL | \
1351 FS_SYNC_FL))
1352 return -EOPNOTSUPP;
1da177e4 1353
25fe55e8 1354 fa.fsx_xflags = xfs_merge_ioc_xflags(flags, xfs_ip2xflags(ip));
1da177e4 1355
d9457dc0
JK
1356 error = mnt_want_write_file(filp);
1357 if (error)
1358 return error;
f96291f6
DC
1359
1360 tp = xfs_ioctl_setattr_get_trans(ip);
1361 if (IS_ERR(tp)) {
1362 error = PTR_ERR(tp);
1363 goto out_drop_write;
1364 }
1365
1366 error = xfs_ioctl_setattr_xflags(tp, ip, &fa);
1367 if (error) {
4906e215 1368 xfs_trans_cancel(tp);
f96291f6
DC
1369 goto out_drop_write;
1370 }
1371
70393313 1372 error = xfs_trans_commit(tp);
f96291f6 1373out_drop_write:
d9457dc0 1374 mnt_drop_write_file(filp);
2451337d 1375 return error;
1da177e4
LT
1376}
1377
8a7141a8
ES
1378STATIC int
1379xfs_getbmap_format(void **ap, struct getbmapx *bmv, int *full)
1380{
b972d079 1381 struct getbmap __user *base = (struct getbmap __user *)*ap;
8a7141a8
ES
1382
1383 /* copy only getbmap portion (not getbmapx) */
1384 if (copy_to_user(base, bmv, sizeof(struct getbmap)))
2451337d 1385 return -EFAULT;
8a7141a8
ES
1386
1387 *ap += sizeof(struct getbmap);
1388 return 0;
1389}
1390
1da177e4
LT
1391STATIC int
1392xfs_ioc_getbmap(
993386c1 1393 struct xfs_inode *ip,
1da177e4
LT
1394 int ioflags,
1395 unsigned int cmd,
1396 void __user *arg)
1397{
8a7141a8 1398 struct getbmapx bmx;
1da177e4
LT
1399 int error;
1400
8a7141a8 1401 if (copy_from_user(&bmx, arg, sizeof(struct getbmapx)))
b474c7ae 1402 return -EFAULT;
1da177e4 1403
8a7141a8 1404 if (bmx.bmv_count < 2)
b474c7ae 1405 return -EINVAL;
1da177e4 1406
8a7141a8 1407 bmx.bmv_iflags = (cmd == XFS_IOC_GETBMAPA ? BMV_IF_ATTRFORK : 0);
b92cc59f 1408 if (ioflags & XFS_IO_INVIS)
8a7141a8 1409 bmx.bmv_iflags |= BMV_IF_NO_DMAPI_READ;
1da177e4 1410
8a7141a8 1411 error = xfs_getbmap(ip, &bmx, xfs_getbmap_format,
b972d079 1412 (__force struct getbmap *)arg+1);
1da177e4 1413 if (error)
2451337d 1414 return error;
1da177e4 1415
8a7141a8
ES
1416 /* copy back header - only size of getbmap */
1417 if (copy_to_user(arg, &bmx, sizeof(struct getbmap)))
b474c7ae 1418 return -EFAULT;
1da177e4
LT
1419 return 0;
1420}
1421
8a7141a8
ES
1422STATIC int
1423xfs_getbmapx_format(void **ap, struct getbmapx *bmv, int *full)
1424{
b972d079 1425 struct getbmapx __user *base = (struct getbmapx __user *)*ap;
8a7141a8
ES
1426
1427 if (copy_to_user(base, bmv, sizeof(struct getbmapx)))
2451337d 1428 return -EFAULT;
8a7141a8
ES
1429
1430 *ap += sizeof(struct getbmapx);
1431 return 0;
1432}
1433
1da177e4
LT
1434STATIC int
1435xfs_ioc_getbmapx(
993386c1 1436 struct xfs_inode *ip,
1da177e4
LT
1437 void __user *arg)
1438{
1439 struct getbmapx bmx;
1da177e4
LT
1440 int error;
1441
1442 if (copy_from_user(&bmx, arg, sizeof(bmx)))
b474c7ae 1443 return -EFAULT;
1da177e4
LT
1444
1445 if (bmx.bmv_count < 2)
b474c7ae 1446 return -EINVAL;
1da177e4 1447
8a7141a8 1448 if (bmx.bmv_iflags & (~BMV_IF_VALID))
b474c7ae 1449 return -EINVAL;
1da177e4 1450
8a7141a8 1451 error = xfs_getbmap(ip, &bmx, xfs_getbmapx_format,
b972d079 1452 (__force struct getbmapx *)arg+1);
1da177e4 1453 if (error)
2451337d 1454 return error;
1da177e4 1455
8a7141a8
ES
1456 /* copy back header */
1457 if (copy_to_user(arg, &bmx, sizeof(struct getbmapx)))
b474c7ae 1458 return -EFAULT;
1da177e4
LT
1459
1460 return 0;
1461}
df26cfe8 1462
a133d952
DC
1463int
1464xfs_ioc_swapext(
1465 xfs_swapext_t *sxp)
1466{
1467 xfs_inode_t *ip, *tip;
1468 struct fd f, tmp;
1469 int error = 0;
1470
1471 /* Pull information for the target fd */
1472 f = fdget((int)sxp->sx_fdtarget);
1473 if (!f.file) {
2451337d 1474 error = -EINVAL;
a133d952
DC
1475 goto out;
1476 }
1477
1478 if (!(f.file->f_mode & FMODE_WRITE) ||
1479 !(f.file->f_mode & FMODE_READ) ||
1480 (f.file->f_flags & O_APPEND)) {
2451337d 1481 error = -EBADF;
a133d952
DC
1482 goto out_put_file;
1483 }
1484
1485 tmp = fdget((int)sxp->sx_fdtmp);
1486 if (!tmp.file) {
2451337d 1487 error = -EINVAL;
a133d952
DC
1488 goto out_put_file;
1489 }
1490
1491 if (!(tmp.file->f_mode & FMODE_WRITE) ||
1492 !(tmp.file->f_mode & FMODE_READ) ||
1493 (tmp.file->f_flags & O_APPEND)) {
2451337d 1494 error = -EBADF;
a133d952
DC
1495 goto out_put_tmp_file;
1496 }
1497
1498 if (IS_SWAPFILE(file_inode(f.file)) ||
1499 IS_SWAPFILE(file_inode(tmp.file))) {
2451337d 1500 error = -EINVAL;
a133d952
DC
1501 goto out_put_tmp_file;
1502 }
1503
1504 ip = XFS_I(file_inode(f.file));
1505 tip = XFS_I(file_inode(tmp.file));
1506
1507 if (ip->i_mount != tip->i_mount) {
2451337d 1508 error = -EINVAL;
a133d952
DC
1509 goto out_put_tmp_file;
1510 }
1511
1512 if (ip->i_ino == tip->i_ino) {
2451337d 1513 error = -EINVAL;
a133d952
DC
1514 goto out_put_tmp_file;
1515 }
1516
1517 if (XFS_FORCED_SHUTDOWN(ip->i_mount)) {
2451337d 1518 error = -EIO;
a133d952
DC
1519 goto out_put_tmp_file;
1520 }
1521
1522 error = xfs_swap_extents(ip, tip, sxp);
1523
1524 out_put_tmp_file:
1525 fdput(tmp);
1526 out_put_file:
1527 fdput(f);
1528 out:
1529 return error;
1530}
1531
4d4be482
CH
1532/*
1533 * Note: some of the ioctl's return positive numbers as a
1534 * byte count indicating success, such as readlink_by_handle.
1535 * So we don't "sign flip" like most other routines. This means
1536 * true errors need to be returned as a negative value.
1537 */
1538long
1539xfs_file_ioctl(
df26cfe8 1540 struct file *filp,
df26cfe8 1541 unsigned int cmd,
4d4be482 1542 unsigned long p)
df26cfe8 1543{
496ad9aa 1544 struct inode *inode = file_inode(filp);
4d4be482
CH
1545 struct xfs_inode *ip = XFS_I(inode);
1546 struct xfs_mount *mp = ip->i_mount;
1547 void __user *arg = (void __user *)p;
1548 int ioflags = 0;
df26cfe8
LM
1549 int error;
1550
4d4be482 1551 if (filp->f_mode & FMODE_NOCMTIME)
b92cc59f 1552 ioflags |= XFS_IO_INVIS;
df26cfe8 1553
cca28fb8 1554 trace_xfs_file_ioctl(ip);
4d4be482
CH
1555
1556 switch (cmd) {
a46db608
CH
1557 case FITRIM:
1558 return xfs_ioc_trim(mp, arg);
df26cfe8
LM
1559 case XFS_IOC_ALLOCSP:
1560 case XFS_IOC_FREESP:
1561 case XFS_IOC_RESVSP:
1562 case XFS_IOC_UNRESVSP:
1563 case XFS_IOC_ALLOCSP64:
1564 case XFS_IOC_FREESP64:
1565 case XFS_IOC_RESVSP64:
44722352
DC
1566 case XFS_IOC_UNRESVSP64:
1567 case XFS_IOC_ZERO_RANGE: {
743bb465 1568 xfs_flock64_t bf;
df26cfe8 1569
743bb465 1570 if (copy_from_user(&bf, arg, sizeof(bf)))
b474c7ae 1571 return -EFAULT;
743bb465 1572 return xfs_ioc_space(ip, inode, filp, ioflags, cmd, &bf);
1573 }
df26cfe8
LM
1574 case XFS_IOC_DIOINFO: {
1575 struct dioattr da;
1576 xfs_buftarg_t *target =
1577 XFS_IS_REALTIME_INODE(ip) ?
1578 mp->m_rtdev_targp : mp->m_ddev_targp;
1579
7c71ee78 1580 da.d_mem = da.d_miniosz = target->bt_logical_sectorsize;
df26cfe8
LM
1581 da.d_maxiosz = INT_MAX & ~(da.d_miniosz - 1);
1582
1583 if (copy_to_user(arg, &da, sizeof(da)))
b474c7ae 1584 return -EFAULT;
df26cfe8
LM
1585 return 0;
1586 }
1587
1588 case XFS_IOC_FSBULKSTAT_SINGLE:
1589 case XFS_IOC_FSBULKSTAT:
1590 case XFS_IOC_FSINUMBERS:
1591 return xfs_ioc_bulkstat(mp, cmd, arg);
1592
1593 case XFS_IOC_FSGEOMETRY_V1:
1594 return xfs_ioc_fsgeometry_v1(mp, arg);
1595
1596 case XFS_IOC_FSGEOMETRY:
1597 return xfs_ioc_fsgeometry(mp, arg);
1598
1599 case XFS_IOC_GETVERSION:
1600 return put_user(inode->i_generation, (int __user *)arg);
1601
1602 case XFS_IOC_FSGETXATTR:
1603 return xfs_ioc_fsgetxattr(ip, 0, arg);
1604 case XFS_IOC_FSGETXATTRA:
1605 return xfs_ioc_fsgetxattr(ip, 1, arg);
65e67f51
LM
1606 case XFS_IOC_FSSETXATTR:
1607 return xfs_ioc_fssetxattr(ip, filp, arg);
df26cfe8 1608 case XFS_IOC_GETXFLAGS:
65e67f51 1609 return xfs_ioc_getxflags(ip, arg);
df26cfe8 1610 case XFS_IOC_SETXFLAGS:
65e67f51 1611 return xfs_ioc_setxflags(ip, filp, arg);
df26cfe8
LM
1612
1613 case XFS_IOC_FSSETDM: {
1614 struct fsdmidata dmi;
1615
1616 if (copy_from_user(&dmi, arg, sizeof(dmi)))
b474c7ae 1617 return -EFAULT;
df26cfe8 1618
d9457dc0
JK
1619 error = mnt_want_write_file(filp);
1620 if (error)
1621 return error;
1622
df26cfe8
LM
1623 error = xfs_set_dmattrs(ip, dmi.fsd_dmevmask,
1624 dmi.fsd_dmstate);
d9457dc0 1625 mnt_drop_write_file(filp);
2451337d 1626 return error;
df26cfe8
LM
1627 }
1628
1629 case XFS_IOC_GETBMAP:
1630 case XFS_IOC_GETBMAPA:
1631 return xfs_ioc_getbmap(ip, ioflags, cmd, arg);
1632
1633 case XFS_IOC_GETBMAPX:
1634 return xfs_ioc_getbmapx(ip, arg);
1635
1636 case XFS_IOC_FD_TO_HANDLE:
1637 case XFS_IOC_PATH_TO_HANDLE:
743bb465 1638 case XFS_IOC_PATH_TO_FSHANDLE: {
1639 xfs_fsop_handlereq_t hreq;
df26cfe8 1640
743bb465 1641 if (copy_from_user(&hreq, arg, sizeof(hreq)))
b474c7ae 1642 return -EFAULT;
743bb465 1643 return xfs_find_handle(cmd, &hreq);
1644 }
1645 case XFS_IOC_OPEN_BY_HANDLE: {
1646 xfs_fsop_handlereq_t hreq;
df26cfe8 1647
743bb465 1648 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1649 return -EFAULT;
d296d30a 1650 return xfs_open_by_handle(filp, &hreq);
743bb465 1651 }
df26cfe8 1652 case XFS_IOC_FSSETDM_BY_HANDLE:
d296d30a 1653 return xfs_fssetdm_by_handle(filp, arg);
df26cfe8 1654
743bb465 1655 case XFS_IOC_READLINK_BY_HANDLE: {
1656 xfs_fsop_handlereq_t hreq;
df26cfe8 1657
743bb465 1658 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1659 return -EFAULT;
d296d30a 1660 return xfs_readlink_by_handle(filp, &hreq);
743bb465 1661 }
df26cfe8 1662 case XFS_IOC_ATTRLIST_BY_HANDLE:
d296d30a 1663 return xfs_attrlist_by_handle(filp, arg);
df26cfe8
LM
1664
1665 case XFS_IOC_ATTRMULTI_BY_HANDLE:
d296d30a 1666 return xfs_attrmulti_by_handle(filp, arg);
df26cfe8
LM
1667
1668 case XFS_IOC_SWAPEXT: {
743bb465 1669 struct xfs_swapext sxp;
1670
1671 if (copy_from_user(&sxp, arg, sizeof(xfs_swapext_t)))
b474c7ae 1672 return -EFAULT;
d9457dc0
JK
1673 error = mnt_want_write_file(filp);
1674 if (error)
1675 return error;
a133d952 1676 error = xfs_ioc_swapext(&sxp);
d9457dc0 1677 mnt_drop_write_file(filp);
2451337d 1678 return error;
df26cfe8
LM
1679 }
1680
1681 case XFS_IOC_FSCOUNTS: {
1682 xfs_fsop_counts_t out;
1683
1684 error = xfs_fs_counts(mp, &out);
1685 if (error)
2451337d 1686 return error;
df26cfe8
LM
1687
1688 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1689 return -EFAULT;
df26cfe8
LM
1690 return 0;
1691 }
1692
1693 case XFS_IOC_SET_RESBLKS: {
1694 xfs_fsop_resblks_t inout;
1695 __uint64_t in;
1696
1697 if (!capable(CAP_SYS_ADMIN))
1698 return -EPERM;
1699
d5db0f97 1700 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 1701 return -EROFS;
d5db0f97 1702
df26cfe8 1703 if (copy_from_user(&inout, arg, sizeof(inout)))
b474c7ae 1704 return -EFAULT;
df26cfe8 1705
d9457dc0
JK
1706 error = mnt_want_write_file(filp);
1707 if (error)
1708 return error;
1709
df26cfe8
LM
1710 /* input parameter is passed in resblks field of structure */
1711 in = inout.resblks;
1712 error = xfs_reserve_blocks(mp, &in, &inout);
d9457dc0 1713 mnt_drop_write_file(filp);
df26cfe8 1714 if (error)
2451337d 1715 return error;
df26cfe8
LM
1716
1717 if (copy_to_user(arg, &inout, sizeof(inout)))
b474c7ae 1718 return -EFAULT;
df26cfe8
LM
1719 return 0;
1720 }
1721
1722 case XFS_IOC_GET_RESBLKS: {
1723 xfs_fsop_resblks_t out;
1724
1725 if (!capable(CAP_SYS_ADMIN))
1726 return -EPERM;
1727
1728 error = xfs_reserve_blocks(mp, NULL, &out);
1729 if (error)
2451337d 1730 return error;
df26cfe8
LM
1731
1732 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1733 return -EFAULT;
df26cfe8
LM
1734
1735 return 0;
1736 }
1737
1738 case XFS_IOC_FSGROWFSDATA: {
1739 xfs_growfs_data_t in;
1740
df26cfe8 1741 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1742 return -EFAULT;
df26cfe8 1743
d9457dc0
JK
1744 error = mnt_want_write_file(filp);
1745 if (error)
1746 return error;
df26cfe8 1747 error = xfs_growfs_data(mp, &in);
d9457dc0 1748 mnt_drop_write_file(filp);
2451337d 1749 return error;
df26cfe8
LM
1750 }
1751
1752 case XFS_IOC_FSGROWFSLOG: {
1753 xfs_growfs_log_t in;
1754
df26cfe8 1755 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1756 return -EFAULT;
df26cfe8 1757
d9457dc0
JK
1758 error = mnt_want_write_file(filp);
1759 if (error)
1760 return error;
df26cfe8 1761 error = xfs_growfs_log(mp, &in);
d9457dc0 1762 mnt_drop_write_file(filp);
2451337d 1763 return error;
df26cfe8
LM
1764 }
1765
1766 case XFS_IOC_FSGROWFSRT: {
1767 xfs_growfs_rt_t in;
1768
df26cfe8 1769 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1770 return -EFAULT;
df26cfe8 1771
d9457dc0
JK
1772 error = mnt_want_write_file(filp);
1773 if (error)
1774 return error;
df26cfe8 1775 error = xfs_growfs_rt(mp, &in);
d9457dc0 1776 mnt_drop_write_file(filp);
2451337d 1777 return error;
df26cfe8
LM
1778 }
1779
df26cfe8
LM
1780 case XFS_IOC_GOINGDOWN: {
1781 __uint32_t in;
1782
1783 if (!capable(CAP_SYS_ADMIN))
1784 return -EPERM;
1785
1786 if (get_user(in, (__uint32_t __user *)arg))
b474c7ae 1787 return -EFAULT;
df26cfe8 1788
2451337d 1789 return xfs_fs_goingdown(mp, in);
df26cfe8
LM
1790 }
1791
1792 case XFS_IOC_ERROR_INJECTION: {
1793 xfs_error_injection_t in;
1794
1795 if (!capable(CAP_SYS_ADMIN))
1796 return -EPERM;
1797
1798 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1799 return -EFAULT;
df26cfe8 1800
2451337d 1801 return xfs_errortag_add(in.errtag, mp);
df26cfe8
LM
1802 }
1803
1804 case XFS_IOC_ERROR_CLEARALL:
1805 if (!capable(CAP_SYS_ADMIN))
1806 return -EPERM;
1807
2451337d 1808 return xfs_errortag_clearall(mp, 1);
df26cfe8 1809
8ca149de 1810 case XFS_IOC_FREE_EOFBLOCKS: {
b9fe5052
DE
1811 struct xfs_fs_eofblocks eofb;
1812 struct xfs_eofblocks keofb;
8ca149de 1813
8c567a7f
DE
1814 if (!capable(CAP_SYS_ADMIN))
1815 return -EPERM;
1816
1817 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 1818 return -EROFS;
8c567a7f 1819
8ca149de 1820 if (copy_from_user(&eofb, arg, sizeof(eofb)))
b474c7ae 1821 return -EFAULT;
8ca149de 1822
b9fe5052
DE
1823 error = xfs_fs_eofblocks_from_user(&eofb, &keofb);
1824 if (error)
2451337d 1825 return error;
8ca149de 1826
2451337d 1827 return xfs_icache_free_eofblocks(mp, &keofb);
8ca149de
BF
1828 }
1829
df26cfe8
LM
1830 default:
1831 return -ENOTTY;
1832 }
1833}