Commit | Line | Data |
---|---|---|
0b61f8a4 | 1 | // SPDX-License-Identifier: GPL-2.0 |
1da177e4 | 2 | /* |
7b718769 NS |
3 | * Copyright (c) 2000-2005 Silicon Graphics, Inc. |
4 | * All Rights Reserved. | |
1da177e4 | 5 | */ |
1da177e4 | 6 | #include "xfs.h" |
1da177e4 | 7 | #include "xfs_fs.h" |
70a9883c | 8 | #include "xfs_shared.h" |
239880ef DC |
9 | #include "xfs_format.h" |
10 | #include "xfs_log_format.h" | |
11 | #include "xfs_trans_resv.h" | |
1da177e4 | 12 | #include "xfs_mount.h" |
1da177e4 | 13 | #include "xfs_inode.h" |
1da177e4 | 14 | #include "xfs_rtalloc.h" |
2810bd68 | 15 | #include "xfs_iwalk.h" |
1da177e4 | 16 | #include "xfs_itable.h" |
a844f451 | 17 | #include "xfs_error.h" |
e0c41089 DC |
18 | #include "xfs_da_format.h" |
19 | #include "xfs_da_btree.h" | |
1da177e4 | 20 | #include "xfs_attr.h" |
a844f451 | 21 | #include "xfs_bmap.h" |
68988114 | 22 | #include "xfs_bmap_util.h" |
1da177e4 | 23 | #include "xfs_fsops.h" |
a46db608 | 24 | #include "xfs_discard.h" |
25fe55e8 | 25 | #include "xfs_quota.h" |
d296d30a | 26 | #include "xfs_export.h" |
0b1b213f | 27 | #include "xfs_trace.h" |
8ca149de | 28 | #include "xfs_icache.h" |
a4fbe6ab | 29 | #include "xfs_trans.h" |
47e1bf64 | 30 | #include "xfs_acl.h" |
e89c0413 DW |
31 | #include "xfs_btree.h" |
32 | #include <linux/fsmap.h> | |
33 | #include "xfs_fsmap.h" | |
36fd6e86 | 34 | #include "scrub/xfs_scrub.h" |
c368ebcd | 35 | #include "xfs_sb.h" |
7cd5006b | 36 | #include "xfs_ag.h" |
c23232d4 | 37 | #include "xfs_health.h" |
7a42c70e | 38 | #include "xfs_reflink.h" |
5f213ddb | 39 | #include "xfs_ioctl.h" |
efc2efeb | 40 | #include "xfs_xattr.h" |
1da177e4 | 41 | |
1da177e4 LT |
42 | #include <linux/mount.h> |
43 | #include <linux/namei.h> | |
9fefd5db | 44 | #include <linux/fileattr.h> |
1da177e4 LT |
45 | |
46 | /* | |
47 | * xfs_find_handle maps from userspace xfs_fsop_handlereq structure to | |
48 | * a file or fs handle. | |
49 | * | |
50 | * XFS_IOC_PATH_TO_FSHANDLE | |
51 | * returns fs handle for a mount point or path within that mount point | |
52 | * XFS_IOC_FD_TO_HANDLE | |
53 | * returns full handle for a FD opened in user space | |
54 | * XFS_IOC_PATH_TO_HANDLE | |
55 | * returns full handle for a path | |
56 | */ | |
d5547f9f | 57 | int |
1da177e4 LT |
58 | xfs_find_handle( |
59 | unsigned int cmd, | |
743bb465 | 60 | xfs_fsop_handlereq_t *hreq) |
1da177e4 LT |
61 | { |
62 | int hsize; | |
63 | xfs_handle_t handle; | |
1da177e4 | 64 | struct inode *inode; |
a30b0367 | 65 | struct fd f = {NULL}; |
4346cdd4 | 66 | struct path path; |
2903ff01 | 67 | int error; |
4346cdd4 | 68 | struct xfs_inode *ip; |
1da177e4 | 69 | |
4346cdd4 | 70 | if (cmd == XFS_IOC_FD_TO_HANDLE) { |
2903ff01 AV |
71 | f = fdget(hreq->fd); |
72 | if (!f.file) | |
4346cdd4 | 73 | return -EBADF; |
496ad9aa | 74 | inode = file_inode(f.file); |
4346cdd4 | 75 | } else { |
ce6595a2 | 76 | error = user_path_at(AT_FDCWD, hreq->path, 0, &path); |
4346cdd4 CH |
77 | if (error) |
78 | return error; | |
2b0143b5 | 79 | inode = d_inode(path.dentry); |
1da177e4 | 80 | } |
4346cdd4 CH |
81 | ip = XFS_I(inode); |
82 | ||
83 | /* | |
84 | * We can only generate handles for inodes residing on a XFS filesystem, | |
85 | * and only for regular files, directories or symbolic links. | |
86 | */ | |
87 | error = -EINVAL; | |
88 | if (inode->i_sb->s_magic != XFS_SB_MAGIC) | |
89 | goto out_put; | |
90 | ||
91 | error = -EBADF; | |
92 | if (!S_ISREG(inode->i_mode) && | |
93 | !S_ISDIR(inode->i_mode) && | |
94 | !S_ISLNK(inode->i_mode)) | |
95 | goto out_put; | |
96 | ||
97 | ||
98 | memcpy(&handle.ha_fsid, ip->i_mount->m_fixedfsid, sizeof(xfs_fsid_t)); | |
99 | ||
100 | if (cmd == XFS_IOC_PATH_TO_FSHANDLE) { | |
101 | /* | |
102 | * This handle only contains an fsid, zero the rest. | |
103 | */ | |
104 | memset(&handle.ha_fid, 0, sizeof(handle.ha_fid)); | |
105 | hsize = sizeof(xfs_fsid_t); | |
106 | } else { | |
c6143911 CH |
107 | handle.ha_fid.fid_len = sizeof(xfs_fid_t) - |
108 | sizeof(handle.ha_fid.fid_len); | |
109 | handle.ha_fid.fid_pad = 0; | |
9e9a2674 | 110 | handle.ha_fid.fid_gen = inode->i_generation; |
c6143911 | 111 | handle.ha_fid.fid_ino = ip->i_ino; |
3398a400 | 112 | hsize = sizeof(xfs_handle_t); |
1da177e4 LT |
113 | } |
114 | ||
4346cdd4 | 115 | error = -EFAULT; |
743bb465 | 116 | if (copy_to_user(hreq->ohandle, &handle, hsize) || |
4346cdd4 CH |
117 | copy_to_user(hreq->ohandlen, &hsize, sizeof(__s32))) |
118 | goto out_put; | |
1da177e4 | 119 | |
4346cdd4 CH |
120 | error = 0; |
121 | ||
122 | out_put: | |
123 | if (cmd == XFS_IOC_FD_TO_HANDLE) | |
2903ff01 | 124 | fdput(f); |
4346cdd4 CH |
125 | else |
126 | path_put(&path); | |
127 | return error; | |
1da177e4 LT |
128 | } |
129 | ||
1da177e4 | 130 | /* |
d296d30a CH |
131 | * No need to do permission checks on the various pathname components |
132 | * as the handle operations are privileged. | |
1da177e4 LT |
133 | */ |
134 | STATIC int | |
d296d30a CH |
135 | xfs_handle_acceptable( |
136 | void *context, | |
137 | struct dentry *dentry) | |
138 | { | |
139 | return 1; | |
140 | } | |
141 | ||
142 | /* | |
143 | * Convert userspace handle data into a dentry. | |
144 | */ | |
145 | struct dentry * | |
146 | xfs_handle_to_dentry( | |
147 | struct file *parfilp, | |
148 | void __user *uhandle, | |
149 | u32 hlen) | |
1da177e4 | 150 | { |
1da177e4 | 151 | xfs_handle_t handle; |
d296d30a | 152 | struct xfs_fid64 fid; |
1da177e4 LT |
153 | |
154 | /* | |
155 | * Only allow handle opens under a directory. | |
156 | */ | |
496ad9aa | 157 | if (!S_ISDIR(file_inode(parfilp)->i_mode)) |
d296d30a CH |
158 | return ERR_PTR(-ENOTDIR); |
159 | ||
160 | if (hlen != sizeof(xfs_handle_t)) | |
161 | return ERR_PTR(-EINVAL); | |
162 | if (copy_from_user(&handle, uhandle, hlen)) | |
163 | return ERR_PTR(-EFAULT); | |
164 | if (handle.ha_fid.fid_len != | |
165 | sizeof(handle.ha_fid) - sizeof(handle.ha_fid.fid_len)) | |
166 | return ERR_PTR(-EINVAL); | |
167 | ||
168 | memset(&fid, 0, sizeof(struct fid)); | |
169 | fid.ino = handle.ha_fid.fid_ino; | |
170 | fid.gen = handle.ha_fid.fid_gen; | |
171 | ||
172 | return exportfs_decode_fh(parfilp->f_path.mnt, (struct fid *)&fid, 3, | |
173 | FILEID_INO32_GEN | XFS_FILEID_TYPE_64FLAG, | |
174 | xfs_handle_acceptable, NULL); | |
175 | } | |
1da177e4 | 176 | |
d296d30a CH |
177 | STATIC struct dentry * |
178 | xfs_handlereq_to_dentry( | |
179 | struct file *parfilp, | |
180 | xfs_fsop_handlereq_t *hreq) | |
181 | { | |
182 | return xfs_handle_to_dentry(parfilp, hreq->ihandle, hreq->ihandlen); | |
1da177e4 LT |
183 | } |
184 | ||
d5547f9f | 185 | int |
1da177e4 | 186 | xfs_open_by_handle( |
1da177e4 | 187 | struct file *parfilp, |
d296d30a | 188 | xfs_fsop_handlereq_t *hreq) |
1da177e4 | 189 | { |
745ca247 | 190 | const struct cred *cred = current_cred(); |
1da177e4 | 191 | int error; |
d296d30a | 192 | int fd; |
1da177e4 LT |
193 | int permflag; |
194 | struct file *filp; | |
195 | struct inode *inode; | |
196 | struct dentry *dentry; | |
1a1d7724 | 197 | fmode_t fmode; |
765927b2 | 198 | struct path path; |
1da177e4 LT |
199 | |
200 | if (!capable(CAP_SYS_ADMIN)) | |
b474c7ae | 201 | return -EPERM; |
1da177e4 | 202 | |
d296d30a CH |
203 | dentry = xfs_handlereq_to_dentry(parfilp, hreq); |
204 | if (IS_ERR(dentry)) | |
205 | return PTR_ERR(dentry); | |
2b0143b5 | 206 | inode = d_inode(dentry); |
1da177e4 LT |
207 | |
208 | /* Restrict xfs_open_by_handle to directories & regular files. */ | |
209 | if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) { | |
b474c7ae | 210 | error = -EPERM; |
d296d30a | 211 | goto out_dput; |
1da177e4 LT |
212 | } |
213 | ||
214 | #if BITS_PER_LONG != 32 | |
743bb465 | 215 | hreq->oflags |= O_LARGEFILE; |
1da177e4 | 216 | #endif |
d296d30a | 217 | |
743bb465 | 218 | permflag = hreq->oflags; |
1a1d7724 | 219 | fmode = OPEN_FMODE(permflag); |
1da177e4 | 220 | if ((!(permflag & O_APPEND) || (permflag & O_TRUNC)) && |
1a1d7724 | 221 | (fmode & FMODE_WRITE) && IS_APPEND(inode)) { |
b474c7ae | 222 | error = -EPERM; |
d296d30a | 223 | goto out_dput; |
1da177e4 LT |
224 | } |
225 | ||
1a1d7724 | 226 | if ((fmode & FMODE_WRITE) && IS_IMMUTABLE(inode)) { |
337684a1 | 227 | error = -EPERM; |
d296d30a | 228 | goto out_dput; |
1da177e4 LT |
229 | } |
230 | ||
231 | /* Can't write directories. */ | |
1a1d7724 | 232 | if (S_ISDIR(inode->i_mode) && (fmode & FMODE_WRITE)) { |
b474c7ae | 233 | error = -EISDIR; |
d296d30a | 234 | goto out_dput; |
1da177e4 LT |
235 | } |
236 | ||
862a6293 | 237 | fd = get_unused_fd_flags(0); |
d296d30a CH |
238 | if (fd < 0) { |
239 | error = fd; | |
240 | goto out_dput; | |
1da177e4 LT |
241 | } |
242 | ||
765927b2 AV |
243 | path.mnt = parfilp->f_path.mnt; |
244 | path.dentry = dentry; | |
245 | filp = dentry_open(&path, hreq->oflags, cred); | |
246 | dput(dentry); | |
1da177e4 | 247 | if (IS_ERR(filp)) { |
d296d30a CH |
248 | put_unused_fd(fd); |
249 | return PTR_ERR(filp); | |
1da177e4 | 250 | } |
4d4be482 | 251 | |
03209378 | 252 | if (S_ISREG(inode->i_mode)) { |
2e2e7bb1 | 253 | filp->f_flags |= O_NOATIME; |
4d4be482 | 254 | filp->f_mode |= FMODE_NOCMTIME; |
2e2e7bb1 | 255 | } |
1da177e4 | 256 | |
d296d30a CH |
257 | fd_install(fd, filp); |
258 | return fd; | |
259 | ||
260 | out_dput: | |
261 | dput(dentry); | |
262 | return error; | |
1da177e4 LT |
263 | } |
264 | ||
d5547f9f | 265 | int |
1da177e4 | 266 | xfs_readlink_by_handle( |
d296d30a CH |
267 | struct file *parfilp, |
268 | xfs_fsop_handlereq_t *hreq) | |
1da177e4 | 269 | { |
d296d30a | 270 | struct dentry *dentry; |
1da177e4 | 271 | __u32 olen; |
804c83c3 | 272 | int error; |
1da177e4 LT |
273 | |
274 | if (!capable(CAP_SYS_ADMIN)) | |
b474c7ae | 275 | return -EPERM; |
1da177e4 | 276 | |
d296d30a CH |
277 | dentry = xfs_handlereq_to_dentry(parfilp, hreq); |
278 | if (IS_ERR(dentry)) | |
279 | return PTR_ERR(dentry); | |
1da177e4 LT |
280 | |
281 | /* Restrict this handle operation to symlinks only. */ | |
fd4a0edf | 282 | if (!d_is_symlink(dentry)) { |
b474c7ae | 283 | error = -EINVAL; |
d296d30a | 284 | goto out_dput; |
1da177e4 LT |
285 | } |
286 | ||
743bb465 | 287 | if (copy_from_user(&olen, hreq->ohandlen, sizeof(__u32))) { |
b474c7ae | 288 | error = -EFAULT; |
d296d30a | 289 | goto out_dput; |
1da177e4 | 290 | } |
1da177e4 | 291 | |
fd4a0edf | 292 | error = vfs_readlink(dentry, hreq->ohandle, olen); |
67fcaa73 | 293 | |
d296d30a CH |
294 | out_dput: |
295 | dput(dentry); | |
804c83c3 | 296 | return error; |
1da177e4 LT |
297 | } |
298 | ||
3e7a7799 CH |
299 | /* |
300 | * Format an attribute and copy it out to the user's buffer. | |
301 | * Take care to check values and protect against them changing later, | |
302 | * we may be reading them directly out of a user buffer. | |
303 | */ | |
304 | static void | |
305 | xfs_ioc_attr_put_listent( | |
306 | struct xfs_attr_list_context *context, | |
307 | int flags, | |
308 | unsigned char *name, | |
309 | int namelen, | |
310 | int valuelen) | |
311 | { | |
312 | struct xfs_attrlist *alist = context->buffer; | |
313 | struct xfs_attrlist_ent *aep; | |
314 | int arraytop; | |
315 | ||
316 | ASSERT(!context->seen_enough); | |
317 | ASSERT(context->count >= 0); | |
318 | ASSERT(context->count < (ATTR_MAX_VALUELEN/8)); | |
319 | ASSERT(context->firstu >= sizeof(*alist)); | |
320 | ASSERT(context->firstu <= context->bufsize); | |
321 | ||
322 | /* | |
323 | * Only list entries in the right namespace. | |
324 | */ | |
d5f0f49a | 325 | if (context->attr_filter != (flags & XFS_ATTR_NSP_ONDISK_MASK)) |
3e7a7799 CH |
326 | return; |
327 | ||
328 | arraytop = sizeof(*alist) + | |
329 | context->count * sizeof(alist->al_offset[0]); | |
330 | ||
331 | /* decrement by the actual bytes used by the attr */ | |
332 | context->firstu -= round_up(offsetof(struct xfs_attrlist_ent, a_name) + | |
333 | namelen + 1, sizeof(uint32_t)); | |
334 | if (context->firstu < arraytop) { | |
335 | trace_xfs_attr_list_full(context); | |
336 | alist->al_more = 1; | |
337 | context->seen_enough = 1; | |
338 | return; | |
339 | } | |
340 | ||
341 | aep = context->buffer + context->firstu; | |
342 | aep->a_valuelen = valuelen; | |
343 | memcpy(aep->a_name, name, namelen); | |
344 | aep->a_name[namelen] = 0; | |
345 | alist->al_offset[context->count++] = context->firstu; | |
346 | alist->al_count = context->count; | |
347 | trace_xfs_attr_list_add(context); | |
348 | } | |
349 | ||
d5f0f49a CH |
350 | static unsigned int |
351 | xfs_attr_filter( | |
352 | u32 ioc_flags) | |
353 | { | |
354 | if (ioc_flags & XFS_IOC_ATTR_ROOT) | |
355 | return XFS_ATTR_ROOT; | |
356 | if (ioc_flags & XFS_IOC_ATTR_SECURE) | |
357 | return XFS_ATTR_SECURE; | |
358 | return 0; | |
359 | } | |
360 | ||
361 | static unsigned int | |
362 | xfs_attr_flags( | |
363 | u32 ioc_flags) | |
364 | { | |
365 | if (ioc_flags & XFS_IOC_ATTR_CREATE) | |
366 | return XATTR_CREATE; | |
367 | if (ioc_flags & XFS_IOC_ATTR_REPLACE) | |
368 | return XATTR_REPLACE; | |
369 | return 0; | |
370 | } | |
371 | ||
3e7a7799 CH |
372 | int |
373 | xfs_ioc_attr_list( | |
374 | struct xfs_inode *dp, | |
eb241c74 | 375 | void __user *ubuf, |
6ed6356b | 376 | size_t bufsize, |
3e7a7799 | 377 | int flags, |
53ac39fd | 378 | struct xfs_attrlist_cursor __user *ucursor) |
3e7a7799 | 379 | { |
e3a19cde | 380 | struct xfs_attr_list_context context = { }; |
3e7a7799 | 381 | struct xfs_attrlist *alist; |
eb241c74 | 382 | void *buffer; |
3e7a7799 CH |
383 | int error; |
384 | ||
f6046319 CH |
385 | if (bufsize < sizeof(struct xfs_attrlist) || |
386 | bufsize > XFS_XATTR_LIST_MAX) | |
387 | return -EINVAL; | |
388 | ||
389 | /* | |
390 | * Reject flags, only allow namespaces. | |
391 | */ | |
d5f0f49a | 392 | if (flags & ~(XFS_IOC_ATTR_ROOT | XFS_IOC_ATTR_SECURE)) |
f6046319 | 393 | return -EINVAL; |
d5f0f49a | 394 | if (flags == (XFS_IOC_ATTR_ROOT | XFS_IOC_ATTR_SECURE)) |
f6046319 CH |
395 | return -EINVAL; |
396 | ||
3e7a7799 CH |
397 | /* |
398 | * Validate the cursor. | |
399 | */ | |
e3a19cde | 400 | if (copy_from_user(&context.cursor, ucursor, sizeof(context.cursor))) |
53ac39fd | 401 | return -EFAULT; |
e3a19cde | 402 | if (context.cursor.pad1 || context.cursor.pad2) |
3e7a7799 | 403 | return -EINVAL; |
e3a19cde CH |
404 | if (!context.cursor.initted && |
405 | (context.cursor.hashval || context.cursor.blkno || | |
406 | context.cursor.offset)) | |
3e7a7799 CH |
407 | return -EINVAL; |
408 | ||
8ca79df8 | 409 | buffer = kvzalloc(bufsize, GFP_KERNEL); |
eb241c74 CH |
410 | if (!buffer) |
411 | return -ENOMEM; | |
3e7a7799 CH |
412 | |
413 | /* | |
414 | * Initialize the output buffer. | |
415 | */ | |
3e7a7799 | 416 | context.dp = dp; |
3e7a7799 | 417 | context.resynch = 1; |
d5f0f49a | 418 | context.attr_filter = xfs_attr_filter(flags); |
3e7a7799 | 419 | context.buffer = buffer; |
f311d771 | 420 | context.bufsize = round_down(bufsize, sizeof(uint32_t)); |
3e7a7799 CH |
421 | context.firstu = context.bufsize; |
422 | context.put_listent = xfs_ioc_attr_put_listent; | |
423 | ||
424 | alist = context.buffer; | |
425 | alist->al_count = 0; | |
426 | alist->al_more = 0; | |
427 | alist->al_offset[0] = context.bufsize; | |
428 | ||
17e1dd83 | 429 | error = xfs_attr_list(&context); |
eb241c74 CH |
430 | if (error) |
431 | goto out_free; | |
432 | ||
53ac39fd | 433 | if (copy_to_user(ubuf, buffer, bufsize) || |
e3a19cde | 434 | copy_to_user(ucursor, &context.cursor, sizeof(context.cursor))) |
eb241c74 CH |
435 | error = -EFAULT; |
436 | out_free: | |
437 | kmem_free(buffer); | |
3e7a7799 CH |
438 | return error; |
439 | } | |
440 | ||
1da177e4 LT |
441 | STATIC int |
442 | xfs_attrlist_by_handle( | |
d296d30a | 443 | struct file *parfilp, |
53ac39fd | 444 | struct xfs_fsop_attrlist_handlereq __user *p) |
1da177e4 | 445 | { |
53ac39fd | 446 | struct xfs_fsop_attrlist_handlereq al_hreq; |
d296d30a | 447 | struct dentry *dentry; |
53ac39fd | 448 | int error = -ENOMEM; |
1da177e4 LT |
449 | |
450 | if (!capable(CAP_SYS_ADMIN)) | |
b474c7ae | 451 | return -EPERM; |
53ac39fd | 452 | if (copy_from_user(&al_hreq, p, sizeof(al_hreq))) |
b474c7ae | 453 | return -EFAULT; |
90ad58a8 | 454 | |
d296d30a CH |
455 | dentry = xfs_handlereq_to_dentry(parfilp, &al_hreq.hreq); |
456 | if (IS_ERR(dentry)) | |
457 | return PTR_ERR(dentry); | |
1da177e4 | 458 | |
eb241c74 | 459 | error = xfs_ioc_attr_list(XFS_I(d_inode(dentry)), al_hreq.buffer, |
53ac39fd | 460 | al_hreq.buflen, al_hreq.flags, &p->pos); |
d296d30a CH |
461 | dput(dentry); |
462 | return error; | |
1da177e4 LT |
463 | } |
464 | ||
d0ce6439 | 465 | static int |
1da177e4 | 466 | xfs_attrmulti_attr_get( |
739bfb2a | 467 | struct inode *inode, |
a9273ca5 DC |
468 | unsigned char *name, |
469 | unsigned char __user *ubuf, | |
c8ce540d DW |
470 | uint32_t *len, |
471 | uint32_t flags) | |
1da177e4 | 472 | { |
e5171d7e CH |
473 | struct xfs_da_args args = { |
474 | .dp = XFS_I(inode), | |
d5f0f49a CH |
475 | .attr_filter = xfs_attr_filter(flags), |
476 | .attr_flags = xfs_attr_flags(flags), | |
e5171d7e CH |
477 | .name = name, |
478 | .namelen = strlen(name), | |
479 | .valuelen = *len, | |
480 | }; | |
481 | int error; | |
e8b0ebaa | 482 | |
51fcbfe7 | 483 | if (*len > XFS_XATTR_SIZE_MAX) |
2451337d | 484 | return -EINVAL; |
e5171d7e | 485 | |
e5171d7e | 486 | error = xfs_attr_get(&args); |
1da177e4 LT |
487 | if (error) |
488 | goto out_kfree; | |
489 | ||
e5171d7e CH |
490 | *len = args.valuelen; |
491 | if (copy_to_user(ubuf, args.value, args.valuelen)) | |
2451337d | 492 | error = -EFAULT; |
1da177e4 | 493 | |
fdd3ccee | 494 | out_kfree: |
e5171d7e | 495 | kmem_free(args.value); |
1da177e4 LT |
496 | return error; |
497 | } | |
498 | ||
d0ce6439 | 499 | static int |
1da177e4 | 500 | xfs_attrmulti_attr_set( |
739bfb2a | 501 | struct inode *inode, |
a9273ca5 DC |
502 | unsigned char *name, |
503 | const unsigned char __user *ubuf, | |
c8ce540d DW |
504 | uint32_t len, |
505 | uint32_t flags) | |
1da177e4 | 506 | { |
a2544622 CH |
507 | struct xfs_da_args args = { |
508 | .dp = XFS_I(inode), | |
d5f0f49a CH |
509 | .attr_filter = xfs_attr_filter(flags), |
510 | .attr_flags = xfs_attr_flags(flags), | |
a2544622 CH |
511 | .name = name, |
512 | .namelen = strlen(name), | |
513 | }; | |
09cb22d2 | 514 | int error; |
1da177e4 | 515 | |
739bfb2a | 516 | if (IS_IMMUTABLE(inode) || IS_APPEND(inode)) |
2451337d | 517 | return -EPERM; |
1da177e4 | 518 | |
6cc4f4ff CH |
519 | if (ubuf) { |
520 | if (len > XFS_XATTR_SIZE_MAX) | |
521 | return -EINVAL; | |
a2544622 CH |
522 | args.value = memdup_user(ubuf, len); |
523 | if (IS_ERR(args.value)) | |
524 | return PTR_ERR(args.value); | |
525 | args.valuelen = len; | |
6cc4f4ff | 526 | } |
e8b0ebaa | 527 | |
efc2efeb | 528 | error = xfs_attr_change(&args); |
d5f0f49a | 529 | if (!error && (flags & XFS_IOC_ATTR_ROOT)) |
5a3930e2 | 530 | xfs_forget_acl(inode, name); |
a2544622 | 531 | kfree(args.value); |
09cb22d2 | 532 | return error; |
1da177e4 LT |
533 | } |
534 | ||
d0ce6439 CH |
535 | int |
536 | xfs_ioc_attrmulti_one( | |
537 | struct file *parfilp, | |
538 | struct inode *inode, | |
539 | uint32_t opcode, | |
540 | void __user *uname, | |
541 | void __user *value, | |
542 | uint32_t *len, | |
543 | uint32_t flags) | |
544 | { | |
545 | unsigned char *name; | |
546 | int error; | |
547 | ||
d5f0f49a | 548 | if ((flags & XFS_IOC_ATTR_ROOT) && (flags & XFS_IOC_ATTR_SECURE)) |
d0ce6439 | 549 | return -EINVAL; |
d0ce6439 CH |
550 | |
551 | name = strndup_user(uname, MAXNAMELEN); | |
552 | if (IS_ERR(name)) | |
553 | return PTR_ERR(name); | |
554 | ||
555 | switch (opcode) { | |
556 | case ATTR_OP_GET: | |
557 | error = xfs_attrmulti_attr_get(inode, name, value, len, flags); | |
558 | break; | |
559 | case ATTR_OP_REMOVE: | |
560 | value = NULL; | |
561 | *len = 0; | |
53004ee7 | 562 | fallthrough; |
d0ce6439 CH |
563 | case ATTR_OP_SET: |
564 | error = mnt_want_write_file(parfilp); | |
565 | if (error) | |
566 | break; | |
567 | error = xfs_attrmulti_attr_set(inode, name, value, *len, flags); | |
568 | mnt_drop_write_file(parfilp); | |
569 | break; | |
570 | default: | |
571 | error = -EINVAL; | |
572 | break; | |
573 | } | |
574 | ||
575 | kfree(name); | |
576 | return error; | |
577 | } | |
578 | ||
1da177e4 LT |
579 | STATIC int |
580 | xfs_attrmulti_by_handle( | |
42a74f20 | 581 | struct file *parfilp, |
d296d30a | 582 | void __user *arg) |
1da177e4 LT |
583 | { |
584 | int error; | |
585 | xfs_attr_multiop_t *ops; | |
586 | xfs_fsop_attrmulti_handlereq_t am_hreq; | |
d296d30a | 587 | struct dentry *dentry; |
1da177e4 | 588 | unsigned int i, size; |
1da177e4 LT |
589 | |
590 | if (!capable(CAP_SYS_ADMIN)) | |
b474c7ae | 591 | return -EPERM; |
1da177e4 | 592 | if (copy_from_user(&am_hreq, arg, sizeof(xfs_fsop_attrmulti_handlereq_t))) |
b474c7ae | 593 | return -EFAULT; |
1da177e4 | 594 | |
fda168c2 ZW |
595 | /* overflow check */ |
596 | if (am_hreq.opcount >= INT_MAX / sizeof(xfs_attr_multiop_t)) | |
597 | return -E2BIG; | |
598 | ||
d296d30a CH |
599 | dentry = xfs_handlereq_to_dentry(parfilp, &am_hreq.hreq); |
600 | if (IS_ERR(dentry)) | |
601 | return PTR_ERR(dentry); | |
1da177e4 | 602 | |
2451337d | 603 | error = -E2BIG; |
e182f57a | 604 | size = am_hreq.opcount * sizeof(xfs_attr_multiop_t); |
1da177e4 | 605 | if (!size || size > 16 * PAGE_SIZE) |
d296d30a | 606 | goto out_dput; |
1da177e4 | 607 | |
0e639bde LZ |
608 | ops = memdup_user(am_hreq.ops, size); |
609 | if (IS_ERR(ops)) { | |
2451337d | 610 | error = PTR_ERR(ops); |
d296d30a | 611 | goto out_dput; |
0e639bde | 612 | } |
1da177e4 | 613 | |
1da177e4 LT |
614 | error = 0; |
615 | for (i = 0; i < am_hreq.opcount; i++) { | |
d0ce6439 CH |
616 | ops[i].am_error = xfs_ioc_attrmulti_one(parfilp, |
617 | d_inode(dentry), ops[i].am_opcode, | |
618 | ops[i].am_attrname, ops[i].am_attrvalue, | |
619 | &ops[i].am_length, ops[i].am_flags); | |
1da177e4 LT |
620 | } |
621 | ||
622 | if (copy_to_user(am_hreq.ops, ops, size)) | |
2451337d | 623 | error = -EFAULT; |
1da177e4 | 624 | |
1da177e4 | 625 | kfree(ops); |
d296d30a CH |
626 | out_dput: |
627 | dput(dentry); | |
2451337d | 628 | return error; |
1da177e4 LT |
629 | } |
630 | ||
2810bd68 DW |
631 | /* Return 0 on success or positive error */ |
632 | int | |
8bfe9d18 | 633 | xfs_fsbulkstat_one_fmt( |
7035f972 DW |
634 | struct xfs_ibulk *breq, |
635 | const struct xfs_bulkstat *bstat) | |
2810bd68 | 636 | { |
7035f972 DW |
637 | struct xfs_bstat bs1; |
638 | ||
639 | xfs_bulkstat_to_bstat(breq->mp, &bs1, bstat); | |
640 | if (copy_to_user(breq->ubuffer, &bs1, sizeof(bs1))) | |
2810bd68 DW |
641 | return -EFAULT; |
642 | return xfs_ibulk_advance(breq, sizeof(struct xfs_bstat)); | |
643 | } | |
644 | ||
677717fb | 645 | int |
8bfe9d18 | 646 | xfs_fsinumbers_fmt( |
5f19c7fc DW |
647 | struct xfs_ibulk *breq, |
648 | const struct xfs_inumbers *igrp) | |
677717fb | 649 | { |
5f19c7fc DW |
650 | struct xfs_inogrp ig1; |
651 | ||
652 | xfs_inumbers_to_inogrp(&ig1, igrp); | |
653 | if (copy_to_user(breq->ubuffer, &ig1, sizeof(struct xfs_inogrp))) | |
677717fb DW |
654 | return -EFAULT; |
655 | return xfs_ibulk_advance(breq, sizeof(struct xfs_inogrp)); | |
656 | } | |
657 | ||
1da177e4 | 658 | STATIC int |
8bfe9d18 | 659 | xfs_ioc_fsbulkstat( |
f736d93d | 660 | struct file *file, |
1da177e4 LT |
661 | unsigned int cmd, |
662 | void __user *arg) | |
663 | { | |
f736d93d | 664 | struct xfs_mount *mp = XFS_I(file_inode(file))->i_mount; |
2810bd68 DW |
665 | struct xfs_fsop_bulkreq bulkreq; |
666 | struct xfs_ibulk breq = { | |
667 | .mp = mp, | |
e67fe633 | 668 | .idmap = file_mnt_idmap(file), |
2810bd68 DW |
669 | .ocount = 0, |
670 | }; | |
671 | xfs_ino_t lastino; | |
1da177e4 LT |
672 | int error; |
673 | ||
674 | /* done = 1 if there are more stats to get and if bulkstat */ | |
675 | /* should be called again (unused here, but used in dmapi) */ | |
676 | ||
677 | if (!capable(CAP_SYS_ADMIN)) | |
678 | return -EPERM; | |
679 | ||
75c8c50f | 680 | if (xfs_is_shutdown(mp)) |
b474c7ae | 681 | return -EIO; |
1da177e4 | 682 | |
6f71fb68 | 683 | if (copy_from_user(&bulkreq, arg, sizeof(struct xfs_fsop_bulkreq))) |
b474c7ae | 684 | return -EFAULT; |
1da177e4 | 685 | |
2810bd68 | 686 | if (copy_from_user(&lastino, bulkreq.lastip, sizeof(__s64))) |
b474c7ae | 687 | return -EFAULT; |
1da177e4 | 688 | |
2810bd68 | 689 | if (bulkreq.icount <= 0) |
b474c7ae | 690 | return -EINVAL; |
1da177e4 | 691 | |
cd57e594 | 692 | if (bulkreq.ubuffer == NULL) |
b474c7ae | 693 | return -EINVAL; |
cd57e594 | 694 | |
2810bd68 DW |
695 | breq.ubuffer = bulkreq.ubuffer; |
696 | breq.icount = bulkreq.icount; | |
697 | ||
698 | /* | |
699 | * FSBULKSTAT_SINGLE expects that *lastip contains the inode number | |
700 | * that we want to stat. However, FSINUMBERS and FSBULKSTAT expect | |
701 | * that *lastip contains either zero or the number of the last inode to | |
702 | * be examined by the previous call and return results starting with | |
703 | * the next inode after that. The new bulk request back end functions | |
704 | * take the inode to start with, so we have to compute the startino | |
705 | * parameter from lastino to maintain correct function. lastino == 0 | |
706 | * is a special case because it has traditionally meant "first inode | |
707 | * in filesystem". | |
708 | */ | |
709 | if (cmd == XFS_IOC_FSINUMBERS) { | |
677717fb | 710 | breq.startino = lastino ? lastino + 1 : 0; |
8bfe9d18 | 711 | error = xfs_inumbers(&breq, xfs_fsinumbers_fmt); |
677717fb | 712 | lastino = breq.startino - 1; |
2810bd68 DW |
713 | } else if (cmd == XFS_IOC_FSBULKSTAT_SINGLE) { |
714 | breq.startino = lastino; | |
715 | breq.icount = 1; | |
8bfe9d18 | 716 | error = xfs_bulkstat_one(&breq, xfs_fsbulkstat_one_fmt); |
2810bd68 DW |
717 | } else { /* XFS_IOC_FSBULKSTAT */ |
718 | breq.startino = lastino ? lastino + 1 : 0; | |
8bfe9d18 | 719 | error = xfs_bulkstat(&breq, xfs_fsbulkstat_one_fmt); |
2810bd68 DW |
720 | lastino = breq.startino - 1; |
721 | } | |
1da177e4 LT |
722 | |
723 | if (error) | |
2451337d | 724 | return error; |
1da177e4 | 725 | |
f16fe3ec | 726 | if (bulkreq.lastip != NULL && |
2810bd68 | 727 | copy_to_user(bulkreq.lastip, &lastino, sizeof(xfs_ino_t))) |
f16fe3ec | 728 | return -EFAULT; |
1da177e4 | 729 | |
f16fe3ec | 730 | if (bulkreq.ocount != NULL && |
2810bd68 | 731 | copy_to_user(bulkreq.ocount, &breq.ocount, sizeof(__s32))) |
f16fe3ec | 732 | return -EFAULT; |
1da177e4 LT |
733 | |
734 | return 0; | |
735 | } | |
736 | ||
0448b6f4 DW |
737 | /* Return 0 on success or positive error */ |
738 | static int | |
739 | xfs_bulkstat_fmt( | |
740 | struct xfs_ibulk *breq, | |
741 | const struct xfs_bulkstat *bstat) | |
742 | { | |
743 | if (copy_to_user(breq->ubuffer, bstat, sizeof(struct xfs_bulkstat))) | |
744 | return -EFAULT; | |
745 | return xfs_ibulk_advance(breq, sizeof(struct xfs_bulkstat)); | |
746 | } | |
747 | ||
748 | /* | |
749 | * Check the incoming bulk request @hdr from userspace and initialize the | |
750 | * internal @breq bulk request appropriately. Returns 0 if the bulk request | |
e7ee96df | 751 | * should proceed; -ECANCELED if there's nothing to do; or the usual |
0448b6f4 DW |
752 | * negative error code. |
753 | */ | |
754 | static int | |
755 | xfs_bulk_ireq_setup( | |
756 | struct xfs_mount *mp, | |
817644fa | 757 | const struct xfs_bulk_ireq *hdr, |
0448b6f4 DW |
758 | struct xfs_ibulk *breq, |
759 | void __user *ubuffer) | |
760 | { | |
761 | if (hdr->icount == 0 || | |
762 | (hdr->flags & ~XFS_BULK_IREQ_FLAGS_ALL) || | |
0448b6f4 DW |
763 | memchr_inv(hdr->reserved, 0, sizeof(hdr->reserved))) |
764 | return -EINVAL; | |
765 | ||
766 | breq->startino = hdr->ino; | |
767 | breq->ubuffer = ubuffer; | |
768 | breq->icount = hdr->icount; | |
769 | breq->ocount = 0; | |
13d59a2a DW |
770 | breq->flags = 0; |
771 | ||
bf3cb394 DW |
772 | /* |
773 | * The @ino parameter is a special value, so we must look it up here. | |
774 | * We're not allowed to have IREQ_AGNO, and we only return one inode | |
775 | * worth of data. | |
776 | */ | |
777 | if (hdr->flags & XFS_BULK_IREQ_SPECIAL) { | |
778 | if (hdr->flags & XFS_BULK_IREQ_AGNO) | |
779 | return -EINVAL; | |
780 | ||
781 | switch (hdr->ino) { | |
782 | case XFS_BULK_IREQ_SPECIAL_ROOT: | |
817644fa | 783 | breq->startino = mp->m_sb.sb_rootino; |
bf3cb394 DW |
784 | break; |
785 | default: | |
786 | return -EINVAL; | |
787 | } | |
788 | breq->icount = 1; | |
1da177e4 LT |
789 | } |
790 | ||
13d59a2a DW |
791 | /* |
792 | * The IREQ_AGNO flag means that we only want results from a given AG. | |
793 | * If @hdr->ino is zero, we start iterating in that AG. If @hdr->ino is | |
794 | * beyond the specified AG then we return no results. | |
795 | */ | |
796 | if (hdr->flags & XFS_BULK_IREQ_AGNO) { | |
797 | if (hdr->agno >= mp->m_sb.sb_agcount) | |
798 | return -EINVAL; | |
799 | ||
800 | if (breq->startino == 0) | |
801 | breq->startino = XFS_AGINO_TO_INO(mp, hdr->agno, 0); | |
802 | else if (XFS_INO_TO_AGNO(mp, breq->startino) < hdr->agno) | |
803 | return -EINVAL; | |
804 | ||
805 | breq->flags |= XFS_IBULK_SAME_AG; | |
806 | ||
807 | /* Asking for an inode past the end of the AG? We're done! */ | |
808 | if (XFS_INO_TO_AGNO(mp, breq->startino) > hdr->agno) | |
e7ee96df | 809 | return -ECANCELED; |
13d59a2a DW |
810 | } else if (hdr->agno) |
811 | return -EINVAL; | |
0448b6f4 DW |
812 | |
813 | /* Asking for an inode past the end of the FS? We're done! */ | |
814 | if (XFS_INO_TO_AGNO(mp, breq->startino) >= mp->m_sb.sb_agcount) | |
e7ee96df | 815 | return -ECANCELED; |
0448b6f4 | 816 | |
c3c4ecb5 CB |
817 | if (hdr->flags & XFS_BULK_IREQ_NREXT64) |
818 | breq->flags |= XFS_IBULK_NREXT64; | |
819 | ||
0448b6f4 DW |
820 | return 0; |
821 | } | |
822 | ||
823 | /* | |
824 | * Update the userspace bulk request @hdr to reflect the end state of the | |
825 | * internal bulk request @breq. | |
826 | */ | |
827 | static void | |
828 | xfs_bulk_ireq_teardown( | |
829 | struct xfs_bulk_ireq *hdr, | |
830 | struct xfs_ibulk *breq) | |
831 | { | |
832 | hdr->ino = breq->startino; | |
833 | hdr->ocount = breq->ocount; | |
834 | } | |
835 | ||
836 | /* Handle the v5 bulkstat ioctl. */ | |
837 | STATIC int | |
838 | xfs_ioc_bulkstat( | |
f736d93d | 839 | struct file *file, |
0448b6f4 DW |
840 | unsigned int cmd, |
841 | struct xfs_bulkstat_req __user *arg) | |
842 | { | |
f736d93d | 843 | struct xfs_mount *mp = XFS_I(file_inode(file))->i_mount; |
0448b6f4 DW |
844 | struct xfs_bulk_ireq hdr; |
845 | struct xfs_ibulk breq = { | |
846 | .mp = mp, | |
e67fe633 | 847 | .idmap = file_mnt_idmap(file), |
0448b6f4 DW |
848 | }; |
849 | int error; | |
850 | ||
851 | if (!capable(CAP_SYS_ADMIN)) | |
852 | return -EPERM; | |
853 | ||
75c8c50f | 854 | if (xfs_is_shutdown(mp)) |
0448b6f4 DW |
855 | return -EIO; |
856 | ||
857 | if (copy_from_user(&hdr, &arg->hdr, sizeof(hdr))) | |
858 | return -EFAULT; | |
859 | ||
860 | error = xfs_bulk_ireq_setup(mp, &hdr, &breq, arg->bulkstat); | |
e7ee96df | 861 | if (error == -ECANCELED) |
0448b6f4 DW |
862 | goto out_teardown; |
863 | if (error < 0) | |
864 | return error; | |
865 | ||
866 | error = xfs_bulkstat(&breq, xfs_bulkstat_fmt); | |
867 | if (error) | |
868 | return error; | |
869 | ||
870 | out_teardown: | |
871 | xfs_bulk_ireq_teardown(&hdr, &breq); | |
872 | if (copy_to_user(&arg->hdr, &hdr, sizeof(hdr))) | |
873 | return -EFAULT; | |
874 | ||
875 | return 0; | |
876 | } | |
877 | ||
fba9760a DW |
878 | STATIC int |
879 | xfs_inumbers_fmt( | |
880 | struct xfs_ibulk *breq, | |
881 | const struct xfs_inumbers *igrp) | |
882 | { | |
883 | if (copy_to_user(breq->ubuffer, igrp, sizeof(struct xfs_inumbers))) | |
884 | return -EFAULT; | |
885 | return xfs_ibulk_advance(breq, sizeof(struct xfs_inumbers)); | |
886 | } | |
887 | ||
888 | /* Handle the v5 inumbers ioctl. */ | |
889 | STATIC int | |
890 | xfs_ioc_inumbers( | |
891 | struct xfs_mount *mp, | |
892 | unsigned int cmd, | |
893 | struct xfs_inumbers_req __user *arg) | |
894 | { | |
895 | struct xfs_bulk_ireq hdr; | |
896 | struct xfs_ibulk breq = { | |
897 | .mp = mp, | |
898 | }; | |
899 | int error; | |
900 | ||
901 | if (!capable(CAP_SYS_ADMIN)) | |
902 | return -EPERM; | |
903 | ||
75c8c50f | 904 | if (xfs_is_shutdown(mp)) |
fba9760a DW |
905 | return -EIO; |
906 | ||
907 | if (copy_from_user(&hdr, &arg->hdr, sizeof(hdr))) | |
908 | return -EFAULT; | |
909 | ||
910 | error = xfs_bulk_ireq_setup(mp, &hdr, &breq, arg->inumbers); | |
e7ee96df | 911 | if (error == -ECANCELED) |
fba9760a DW |
912 | goto out_teardown; |
913 | if (error < 0) | |
914 | return error; | |
915 | ||
916 | error = xfs_inumbers(&breq, xfs_inumbers_fmt); | |
917 | if (error) | |
918 | return error; | |
919 | ||
920 | out_teardown: | |
921 | xfs_bulk_ireq_teardown(&hdr, &breq); | |
922 | if (copy_to_user(&arg->hdr, &hdr, sizeof(hdr))) | |
923 | return -EFAULT; | |
924 | ||
1da177e4 LT |
925 | return 0; |
926 | } | |
927 | ||
1da177e4 LT |
928 | STATIC int |
929 | xfs_ioc_fsgeometry( | |
1b6d968d DC |
930 | struct xfs_mount *mp, |
931 | void __user *arg, | |
932 | int struct_version) | |
1da177e4 | 933 | { |
1b6d968d DC |
934 | struct xfs_fsop_geom fsgeo; |
935 | size_t len; | |
1da177e4 | 936 | |
03288b19 | 937 | xfs_fs_geometry(mp, &fsgeo, struct_version); |
1da177e4 | 938 | |
1b6d968d DC |
939 | if (struct_version <= 3) |
940 | len = sizeof(struct xfs_fsop_geom_v1); | |
941 | else if (struct_version == 4) | |
942 | len = sizeof(struct xfs_fsop_geom_v4); | |
c23232d4 DW |
943 | else { |
944 | xfs_fsop_geom_health(mp, &fsgeo); | |
1b6d968d | 945 | len = sizeof(fsgeo); |
c23232d4 | 946 | } |
1b6d968d DC |
947 | |
948 | if (copy_to_user(arg, &fsgeo, len)) | |
b474c7ae | 949 | return -EFAULT; |
1da177e4 LT |
950 | return 0; |
951 | } | |
952 | ||
7cd5006b DW |
953 | STATIC int |
954 | xfs_ioc_ag_geometry( | |
955 | struct xfs_mount *mp, | |
956 | void __user *arg) | |
957 | { | |
c6aee248 | 958 | struct xfs_perag *pag; |
7cd5006b DW |
959 | struct xfs_ag_geometry ageo; |
960 | int error; | |
961 | ||
962 | if (copy_from_user(&ageo, arg, sizeof(ageo))) | |
963 | return -EFAULT; | |
76f17933 DW |
964 | if (ageo.ag_flags) |
965 | return -EINVAL; | |
966 | if (memchr_inv(&ageo.ag_reserved, 0, sizeof(ageo.ag_reserved))) | |
967 | return -EINVAL; | |
7cd5006b | 968 | |
c6aee248 DC |
969 | pag = xfs_perag_get(mp, ageo.ag_number); |
970 | if (!pag) | |
971 | return -EINVAL; | |
972 | ||
973 | error = xfs_ag_get_geometry(pag, &ageo); | |
974 | xfs_perag_put(pag); | |
7cd5006b DW |
975 | if (error) |
976 | return error; | |
977 | ||
978 | if (copy_to_user(arg, &ageo, sizeof(ageo))) | |
979 | return -EFAULT; | |
980 | return 0; | |
981 | } | |
982 | ||
1da177e4 LT |
983 | /* |
984 | * Linux extended inode flags interface. | |
985 | */ | |
1da177e4 | 986 | |
7b0e492e DW |
987 | static void |
988 | xfs_fill_fsxattr( | |
989 | struct xfs_inode *ip, | |
9fefd5db MS |
990 | int whichfork, |
991 | struct fileattr *fa) | |
c83bfab1 | 992 | { |
4800887b | 993 | struct xfs_mount *mp = ip->i_mount; |
732436ef | 994 | struct xfs_ifork *ifp = xfs_ifork_ptr(ip, whichfork); |
daf83964 | 995 | |
9fefd5db | 996 | fileattr_fill_xflags(fa, xfs_ip2xflags(ip)); |
4800887b | 997 | |
5aa5b278 DW |
998 | if (ip->i_diflags & XFS_DIFLAG_EXTSIZE) { |
999 | fa->fsx_extsize = XFS_FSB_TO_B(mp, ip->i_extsize); | |
1000 | } else if (ip->i_diflags & XFS_DIFLAG_EXTSZINHERIT) { | |
1001 | /* | |
1002 | * Don't let a misaligned extent size hint on a directory | |
1003 | * escape to userspace if it won't pass the setattr checks | |
1004 | * later. | |
1005 | */ | |
1006 | if ((ip->i_diflags & XFS_DIFLAG_RTINHERIT) && | |
1007 | ip->i_extsize % mp->m_sb.sb_rextsize > 0) { | |
1008 | fa->fsx_xflags &= ~(FS_XFLAG_EXTSIZE | | |
1009 | FS_XFLAG_EXTSZINHERIT); | |
1010 | fa->fsx_extsize = 0; | |
1011 | } else { | |
1012 | fa->fsx_extsize = XFS_FSB_TO_B(mp, ip->i_extsize); | |
1013 | } | |
1014 | } | |
1015 | ||
3e09ab8f | 1016 | if (ip->i_diflags2 & XFS_DIFLAG2_COWEXTSIZE) |
ee7b83fd | 1017 | fa->fsx_cowextsize = XFS_FSB_TO_B(mp, ip->i_cowextsize); |
ceaf603c | 1018 | fa->fsx_projid = ip->i_projid; |
b2197a36 | 1019 | if (ifp && !xfs_need_iread_extents(ifp)) |
daf83964 CH |
1020 | fa->fsx_nextents = xfs_iext_count(ifp); |
1021 | else | |
1022 | fa->fsx_nextents = xfs_ifork_nextents(ifp); | |
7b0e492e DW |
1023 | } |
1024 | ||
1025 | STATIC int | |
9fefd5db | 1026 | xfs_ioc_fsgetxattra( |
7b0e492e | 1027 | xfs_inode_t *ip, |
7b0e492e DW |
1028 | void __user *arg) |
1029 | { | |
9fefd5db | 1030 | struct fileattr fa; |
7b0e492e DW |
1031 | |
1032 | xfs_ilock(ip, XFS_ILOCK_SHARED); | |
9fefd5db MS |
1033 | xfs_fill_fsxattr(ip, XFS_ATTR_FORK, &fa); |
1034 | xfs_iunlock(ip, XFS_ILOCK_SHARED); | |
1035 | ||
1036 | return copy_fsxattr_to_user(&fa, arg); | |
1037 | } | |
1038 | ||
1039 | int | |
1040 | xfs_fileattr_get( | |
1041 | struct dentry *dentry, | |
1042 | struct fileattr *fa) | |
1043 | { | |
1044 | struct xfs_inode *ip = XFS_I(d_inode(dentry)); | |
1045 | ||
1046 | if (d_is_special(dentry)) | |
1047 | return -ENOTTY; | |
1048 | ||
1049 | xfs_ilock(ip, XFS_ILOCK_SHARED); | |
1050 | xfs_fill_fsxattr(ip, XFS_DATA_FORK, fa); | |
c83bfab1 CH |
1051 | xfs_iunlock(ip, XFS_ILOCK_SHARED); |
1052 | ||
c83bfab1 CH |
1053 | return 0; |
1054 | } | |
1055 | ||
dd60687e CH |
1056 | STATIC uint16_t |
1057 | xfs_flags2diflags( | |
25fe55e8 CH |
1058 | struct xfs_inode *ip, |
1059 | unsigned int xflags) | |
1060 | { | |
25fe55e8 | 1061 | /* can't set PREALLOC this way, just preserve it */ |
dd60687e | 1062 | uint16_t di_flags = |
db07349d | 1063 | (ip->i_diflags & XFS_DIFLAG_PREALLOC); |
dd60687e | 1064 | |
e7b89481 | 1065 | if (xflags & FS_XFLAG_IMMUTABLE) |
25fe55e8 | 1066 | di_flags |= XFS_DIFLAG_IMMUTABLE; |
e7b89481 | 1067 | if (xflags & FS_XFLAG_APPEND) |
25fe55e8 | 1068 | di_flags |= XFS_DIFLAG_APPEND; |
e7b89481 | 1069 | if (xflags & FS_XFLAG_SYNC) |
25fe55e8 | 1070 | di_flags |= XFS_DIFLAG_SYNC; |
e7b89481 | 1071 | if (xflags & FS_XFLAG_NOATIME) |
25fe55e8 | 1072 | di_flags |= XFS_DIFLAG_NOATIME; |
e7b89481 | 1073 | if (xflags & FS_XFLAG_NODUMP) |
25fe55e8 | 1074 | di_flags |= XFS_DIFLAG_NODUMP; |
e7b89481 | 1075 | if (xflags & FS_XFLAG_NODEFRAG) |
25fe55e8 | 1076 | di_flags |= XFS_DIFLAG_NODEFRAG; |
e7b89481 | 1077 | if (xflags & FS_XFLAG_FILESTREAM) |
25fe55e8 | 1078 | di_flags |= XFS_DIFLAG_FILESTREAM; |
c19b3b05 | 1079 | if (S_ISDIR(VFS_I(ip)->i_mode)) { |
e7b89481 | 1080 | if (xflags & FS_XFLAG_RTINHERIT) |
25fe55e8 | 1081 | di_flags |= XFS_DIFLAG_RTINHERIT; |
e7b89481 | 1082 | if (xflags & FS_XFLAG_NOSYMLINKS) |
25fe55e8 | 1083 | di_flags |= XFS_DIFLAG_NOSYMLINKS; |
e7b89481 | 1084 | if (xflags & FS_XFLAG_EXTSZINHERIT) |
25fe55e8 | 1085 | di_flags |= XFS_DIFLAG_EXTSZINHERIT; |
e7b89481 | 1086 | if (xflags & FS_XFLAG_PROJINHERIT) |
9336e3a7 | 1087 | di_flags |= XFS_DIFLAG_PROJINHERIT; |
c19b3b05 | 1088 | } else if (S_ISREG(VFS_I(ip)->i_mode)) { |
e7b89481 | 1089 | if (xflags & FS_XFLAG_REALTIME) |
25fe55e8 | 1090 | di_flags |= XFS_DIFLAG_REALTIME; |
e7b89481 | 1091 | if (xflags & FS_XFLAG_EXTSIZE) |
25fe55e8 CH |
1092 | di_flags |= XFS_DIFLAG_EXTSIZE; |
1093 | } | |
58f88ca2 | 1094 | |
dd60687e CH |
1095 | return di_flags; |
1096 | } | |
1097 | ||
1098 | STATIC uint64_t | |
1099 | xfs_flags2diflags2( | |
1100 | struct xfs_inode *ip, | |
1101 | unsigned int xflags) | |
1102 | { | |
1103 | uint64_t di_flags2 = | |
3e09ab8f | 1104 | (ip->i_diflags2 & (XFS_DIFLAG2_REFLINK | |
e89ab76d DW |
1105 | XFS_DIFLAG2_BIGTIME | |
1106 | XFS_DIFLAG2_NREXT64)); | |
58f88ca2 | 1107 | |
58f88ca2 DC |
1108 | if (xflags & FS_XFLAG_DAX) |
1109 | di_flags2 |= XFS_DIFLAG2_DAX; | |
f7ca3522 DW |
1110 | if (xflags & FS_XFLAG_COWEXTSIZE) |
1111 | di_flags2 |= XFS_DIFLAG2_COWEXTSIZE; | |
58f88ca2 | 1112 | |
dd60687e | 1113 | return di_flags2; |
25fe55e8 CH |
1114 | } |
1115 | ||
29a17c00 DC |
1116 | static int |
1117 | xfs_ioctl_setattr_xflags( | |
1118 | struct xfs_trans *tp, | |
1119 | struct xfs_inode *ip, | |
9fefd5db | 1120 | struct fileattr *fa) |
29a17c00 DC |
1121 | { |
1122 | struct xfs_mount *mp = ip->i_mount; | |
3e09ab8f | 1123 | uint64_t i_flags2; |
29a17c00 DC |
1124 | |
1125 | /* Can't change realtime flag if any extents are allocated. */ | |
daf83964 | 1126 | if ((ip->i_df.if_nextents || ip->i_delayed_blks) && |
e7b89481 | 1127 | XFS_IS_REALTIME_INODE(ip) != (fa->fsx_xflags & FS_XFLAG_REALTIME)) |
29a17c00 DC |
1128 | return -EINVAL; |
1129 | ||
1130 | /* If realtime flag is set then must have realtime device */ | |
e7b89481 | 1131 | if (fa->fsx_xflags & FS_XFLAG_REALTIME) { |
29a17c00 | 1132 | if (mp->m_sb.sb_rblocks == 0 || mp->m_sb.sb_rextsize == 0 || |
031474c2 | 1133 | (ip->i_extsize % mp->m_sb.sb_rextsize)) |
29a17c00 DC |
1134 | return -EINVAL; |
1135 | } | |
1136 | ||
1987fd74 | 1137 | /* Clear reflink if we are actually able to set the rt flag. */ |
c8e156ac | 1138 | if ((fa->fsx_xflags & FS_XFLAG_REALTIME) && xfs_is_reflink_inode(ip)) |
3e09ab8f | 1139 | ip->i_diflags2 &= ~XFS_DIFLAG2_REFLINK; |
c8e156ac | 1140 | |
dd60687e | 1141 | /* diflags2 only valid for v3 inodes. */ |
3e09ab8f | 1142 | i_flags2 = xfs_flags2diflags2(ip, fa->fsx_xflags); |
38c26bfd | 1143 | if (i_flags2 && !xfs_has_v3inodes(mp)) |
dd60687e CH |
1144 | return -EINVAL; |
1145 | ||
db07349d | 1146 | ip->i_diflags = xfs_flags2diflags(ip, fa->fsx_xflags); |
3e09ab8f | 1147 | ip->i_diflags2 = i_flags2; |
dd60687e | 1148 | |
840d493d | 1149 | xfs_diflags_to_iflags(ip, false); |
29a17c00 DC |
1150 | xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG); |
1151 | xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE); | |
ff6d6af2 | 1152 | XFS_STATS_INC(mp, xs_ig_attrchg); |
29a17c00 DC |
1153 | return 0; |
1154 | } | |
1155 | ||
e4f9ba20 IW |
1156 | static void |
1157 | xfs_ioctl_setattr_prepare_dax( | |
3a6a854a | 1158 | struct xfs_inode *ip, |
9fefd5db | 1159 | struct fileattr *fa) |
3a6a854a | 1160 | { |
e4f9ba20 IW |
1161 | struct xfs_mount *mp = ip->i_mount; |
1162 | struct inode *inode = VFS_I(ip); | |
3a6a854a | 1163 | |
aaacdd25 | 1164 | if (S_ISDIR(inode->i_mode)) |
e4f9ba20 | 1165 | return; |
3a6a854a | 1166 | |
0560f31a | 1167 | if (xfs_has_dax_always(mp) || xfs_has_dax_never(mp)) |
e4f9ba20 | 1168 | return; |
3a6a854a | 1169 | |
e4f9ba20 | 1170 | if (((fa->fsx_xflags & FS_XFLAG_DAX) && |
3e09ab8f | 1171 | !(ip->i_diflags2 & XFS_DIFLAG2_DAX)) || |
e4f9ba20 | 1172 | (!(fa->fsx_xflags & FS_XFLAG_DAX) && |
3e09ab8f | 1173 | (ip->i_diflags2 & XFS_DIFLAG2_DAX))) |
e4f9ba20 | 1174 | d_mark_dontcache(inode); |
29a17c00 DC |
1175 | } |
1176 | ||
8f3d17ab DC |
1177 | /* |
1178 | * Set up the transaction structure for the setattr operation, checking that we | |
1179 | * have permission to do so. On success, return a clean transaction and the | |
1180 | * inode locked exclusively ready for further operation specific checks. On | |
1181 | * failure, return an error without modifying or locking the inode. | |
1182 | */ | |
1183 | static struct xfs_trans * | |
1184 | xfs_ioctl_setattr_get_trans( | |
9fefd5db | 1185 | struct xfs_inode *ip, |
7317a03d | 1186 | struct xfs_dquot *pdqp) |
8f3d17ab DC |
1187 | { |
1188 | struct xfs_mount *mp = ip->i_mount; | |
1189 | struct xfs_trans *tp; | |
3a6a854a | 1190 | int error = -EROFS; |
8f3d17ab | 1191 | |
2e973b2c | 1192 | if (xfs_is_readonly(mp)) |
7317a03d | 1193 | goto out_error; |
3a6a854a | 1194 | error = -EIO; |
75c8c50f | 1195 | if (xfs_is_shutdown(mp)) |
7317a03d | 1196 | goto out_error; |
8f3d17ab | 1197 | |
7317a03d | 1198 | error = xfs_trans_alloc_ichange(ip, NULL, NULL, pdqp, |
eba0549b | 1199 | has_capability_noaudit(current, CAP_FOWNER), &tp); |
8f3d17ab | 1200 | if (error) |
7317a03d | 1201 | goto out_error; |
8f3d17ab | 1202 | |
0560f31a | 1203 | if (xfs_has_wsync(mp)) |
8f3d17ab DC |
1204 | xfs_trans_set_sync(tp); |
1205 | ||
1206 | return tp; | |
1207 | ||
7317a03d | 1208 | out_error: |
8f3d17ab DC |
1209 | return ERR_PTR(error); |
1210 | } | |
1211 | ||
9b94fcc3 | 1212 | /* |
6b69e485 DW |
1213 | * Validate a proposed extent size hint. For regular files, the hint can only |
1214 | * be changed if no extents are allocated. | |
9b94fcc3 | 1215 | */ |
f92090e9 | 1216 | static int |
d4388d3c DC |
1217 | xfs_ioctl_setattr_check_extsize( |
1218 | struct xfs_inode *ip, | |
9fefd5db | 1219 | struct fileattr *fa) |
d4388d3c DC |
1220 | { |
1221 | struct xfs_mount *mp = ip->i_mount; | |
6b69e485 DW |
1222 | xfs_failaddr_t failaddr; |
1223 | uint16_t new_diflags; | |
9b94fcc3 | 1224 | |
9fefd5db MS |
1225 | if (!fa->fsx_valid) |
1226 | return 0; | |
1227 | ||
daf83964 | 1228 | if (S_ISREG(VFS_I(ip)->i_mode) && ip->i_df.if_nextents && |
6b69e485 | 1229 | XFS_FSB_TO_B(mp, ip->i_extsize) != fa->fsx_extsize) |
d4388d3c DC |
1230 | return -EINVAL; |
1231 | ||
6b69e485 | 1232 | if (fa->fsx_extsize & mp->m_blockmask) |
ca29be75 | 1233 | return -EINVAL; |
d4388d3c | 1234 | |
6b69e485 | 1235 | new_diflags = xfs_flags2diflags(ip, fa->fsx_xflags); |
9b94fcc3 | 1236 | |
603f000b | 1237 | /* |
83193e5e DW |
1238 | * Inode verifiers do not check that the extent size hint is an integer |
1239 | * multiple of the rt extent size on a directory with both rtinherit | |
1240 | * and extszinherit flags set. Don't let sysadmins misconfigure | |
1241 | * directories. | |
603f000b DW |
1242 | */ |
1243 | if ((new_diflags & XFS_DIFLAG_RTINHERIT) && | |
1244 | (new_diflags & XFS_DIFLAG_EXTSZINHERIT)) { | |
1245 | unsigned int rtextsize_bytes; | |
1246 | ||
1247 | rtextsize_bytes = XFS_FSB_TO_B(mp, mp->m_sb.sb_rextsize); | |
1248 | if (fa->fsx_extsize % rtextsize_bytes) | |
1249 | return -EINVAL; | |
1250 | } | |
1251 | ||
6b69e485 DW |
1252 | failaddr = xfs_inode_validate_extsize(ip->i_mount, |
1253 | XFS_B_TO_FSB(mp, fa->fsx_extsize), | |
1254 | VFS_I(ip)->i_mode, new_diflags); | |
1255 | return failaddr != NULL ? -EINVAL : 0; | |
d4388d3c DC |
1256 | } |
1257 | ||
f7ca3522 DW |
1258 | static int |
1259 | xfs_ioctl_setattr_check_cowextsize( | |
1260 | struct xfs_inode *ip, | |
9fefd5db | 1261 | struct fileattr *fa) |
f7ca3522 DW |
1262 | { |
1263 | struct xfs_mount *mp = ip->i_mount; | |
6b69e485 DW |
1264 | xfs_failaddr_t failaddr; |
1265 | uint64_t new_diflags2; | |
1266 | uint16_t new_diflags; | |
f7ca3522 | 1267 | |
9fefd5db MS |
1268 | if (!fa->fsx_valid) |
1269 | return 0; | |
1270 | ||
6b69e485 | 1271 | if (fa->fsx_cowextsize & mp->m_blockmask) |
ca29be75 | 1272 | return -EINVAL; |
f7ca3522 | 1273 | |
6b69e485 DW |
1274 | new_diflags = xfs_flags2diflags(ip, fa->fsx_xflags); |
1275 | new_diflags2 = xfs_flags2diflags2(ip, fa->fsx_xflags); | |
f7ca3522 | 1276 | |
6b69e485 DW |
1277 | failaddr = xfs_inode_validate_cowextsize(ip->i_mount, |
1278 | XFS_B_TO_FSB(mp, fa->fsx_cowextsize), | |
1279 | VFS_I(ip)->i_mode, new_diflags, new_diflags2); | |
1280 | return failaddr != NULL ? -EINVAL : 0; | |
f7ca3522 DW |
1281 | } |
1282 | ||
f92090e9 | 1283 | static int |
23bd0735 DC |
1284 | xfs_ioctl_setattr_check_projid( |
1285 | struct xfs_inode *ip, | |
9fefd5db | 1286 | struct fileattr *fa) |
23bd0735 | 1287 | { |
9fefd5db MS |
1288 | if (!fa->fsx_valid) |
1289 | return 0; | |
1290 | ||
38c26bfd | 1291 | /* Disallow 32bit project ids if 32bit IDs are not enabled. */ |
c8ce540d | 1292 | if (fa->fsx_projid > (uint16_t)-1 && |
38c26bfd | 1293 | !xfs_has_projid32(ip->i_mount)) |
23bd0735 | 1294 | return -EINVAL; |
23bd0735 DC |
1295 | return 0; |
1296 | } | |
25fe55e8 | 1297 | |
9fefd5db MS |
1298 | int |
1299 | xfs_fileattr_set( | |
8782a9ae | 1300 | struct mnt_idmap *idmap, |
9fefd5db MS |
1301 | struct dentry *dentry, |
1302 | struct fileattr *fa) | |
25fe55e8 | 1303 | { |
9fefd5db | 1304 | struct xfs_inode *ip = XFS_I(d_inode(dentry)); |
25fe55e8 CH |
1305 | struct xfs_mount *mp = ip->i_mount; |
1306 | struct xfs_trans *tp; | |
92f8ff73 | 1307 | struct xfs_dquot *pdqp = NULL; |
25fe55e8 | 1308 | struct xfs_dquot *olddquot = NULL; |
fea7aae6 | 1309 | int error; |
25fe55e8 | 1310 | |
cca28fb8 | 1311 | trace_xfs_ioctl_setattr(ip); |
25fe55e8 | 1312 | |
9fefd5db MS |
1313 | if (d_is_special(dentry)) |
1314 | return -ENOTTY; | |
1315 | ||
1316 | if (!fa->fsx_valid) { | |
1317 | if (fa->flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL | | |
1318 | FS_NOATIME_FL | FS_NODUMP_FL | | |
1319 | FS_SYNC_FL | FS_DAX_FL | FS_PROJINHERIT_FL)) | |
1320 | return -EOPNOTSUPP; | |
1321 | } | |
1322 | ||
fea7aae6 DW |
1323 | error = xfs_ioctl_setattr_check_projid(ip, fa); |
1324 | if (error) | |
1325 | return error; | |
23963e54 | 1326 | |
25fe55e8 CH |
1327 | /* |
1328 | * If disk quotas is on, we make sure that the dquots do exist on disk, | |
1329 | * before we start any other transactions. Trying to do this later | |
1330 | * is messy. We don't care to take a readlock to look at the ids | |
1331 | * in inode here, because we can't hold it across the trans_reserve. | |
1332 | * If the IDs do change before we take the ilock, we're covered | |
1333 | * because the i_*dquot fields will get updated anyway. | |
1334 | */ | |
9fefd5db | 1335 | if (fa->fsx_valid && XFS_IS_QUOTA_ON(mp)) { |
fea7aae6 | 1336 | error = xfs_qm_vop_dqalloc(ip, VFS_I(ip)->i_uid, |
54295159 | 1337 | VFS_I(ip)->i_gid, fa->fsx_projid, |
ea1c9040 | 1338 | XFS_QMOPT_PQUOTA, NULL, NULL, &pdqp); |
fea7aae6 DW |
1339 | if (error) |
1340 | return error; | |
25fe55e8 CH |
1341 | } |
1342 | ||
e4f9ba20 | 1343 | xfs_ioctl_setattr_prepare_dax(ip, fa); |
3a6a854a | 1344 | |
9fefd5db | 1345 | tp = xfs_ioctl_setattr_get_trans(ip, pdqp); |
8f3d17ab | 1346 | if (IS_ERR(tp)) { |
fea7aae6 | 1347 | error = PTR_ERR(tp); |
8f3d17ab | 1348 | goto error_free_dquots; |
25fe55e8 CH |
1349 | } |
1350 | ||
fea7aae6 DW |
1351 | error = xfs_ioctl_setattr_check_extsize(ip, fa); |
1352 | if (error) | |
d4388d3c | 1353 | goto error_trans_cancel; |
25fe55e8 | 1354 | |
fea7aae6 DW |
1355 | error = xfs_ioctl_setattr_check_cowextsize(ip, fa); |
1356 | if (error) | |
f7ca3522 DW |
1357 | goto error_trans_cancel; |
1358 | ||
fea7aae6 DW |
1359 | error = xfs_ioctl_setattr_xflags(tp, ip, fa); |
1360 | if (error) | |
d4388d3c | 1361 | goto error_trans_cancel; |
25fe55e8 | 1362 | |
9fefd5db MS |
1363 | if (!fa->fsx_valid) |
1364 | goto skip_xattr; | |
25fe55e8 | 1365 | /* |
fd179b9c DC |
1366 | * Change file ownership. Must be the owner or privileged. CAP_FSETID |
1367 | * overrides the following restrictions: | |
1368 | * | |
1369 | * The set-user-ID and set-group-ID bits of a file will be cleared upon | |
1370 | * successful return from chown() | |
25fe55e8 | 1371 | */ |
25fe55e8 | 1372 | |
c19b3b05 | 1373 | if ((VFS_I(ip)->i_mode & (S_ISUID|S_ISGID)) && |
9452e93e | 1374 | !capable_wrt_inode_uidgid(idmap, VFS_I(ip), CAP_FSETID)) |
c19b3b05 | 1375 | VFS_I(ip)->i_mode &= ~(S_ISUID|S_ISGID); |
25fe55e8 | 1376 | |
fd179b9c | 1377 | /* Change the ownerships and register project quota modifications */ |
ceaf603c | 1378 | if (ip->i_projid != fa->fsx_projid) { |
149e53af | 1379 | if (XFS_IS_PQUOTA_ON(mp)) { |
fd179b9c DC |
1380 | olddquot = xfs_qm_vop_chown(tp, ip, |
1381 | &ip->i_pdquot, pdqp); | |
1382 | } | |
ceaf603c | 1383 | ip->i_projid = fa->fsx_projid; |
f13fae2d | 1384 | } |
25fe55e8 | 1385 | |
a872703f DC |
1386 | /* |
1387 | * Only set the extent size hint if we've already determined that the | |
1388 | * extent size hint should be set on the inode. If no extent size flags | |
1389 | * are set on the inode then unconditionally clear the extent size hint. | |
1390 | */ | |
db07349d | 1391 | if (ip->i_diflags & (XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT)) |
b231b122 | 1392 | ip->i_extsize = XFS_B_TO_FSB(mp, fa->fsx_extsize); |
f7ca3522 | 1393 | else |
031474c2 | 1394 | ip->i_extsize = 0; |
ee7b83fd | 1395 | |
38c26bfd | 1396 | if (xfs_has_v3inodes(mp)) { |
3e09ab8f | 1397 | if (ip->i_diflags2 & XFS_DIFLAG2_COWEXTSIZE) |
ee7b83fd CH |
1398 | ip->i_cowextsize = XFS_B_TO_FSB(mp, fa->fsx_cowextsize); |
1399 | else | |
1400 | ip->i_cowextsize = 0; | |
1401 | } | |
25fe55e8 | 1402 | |
9fefd5db | 1403 | skip_xattr: |
fea7aae6 | 1404 | error = xfs_trans_commit(tp); |
25fe55e8 CH |
1405 | |
1406 | /* | |
1407 | * Release any dquot(s) the inode had kept before chown. | |
1408 | */ | |
7d095257 | 1409 | xfs_qm_dqrele(olddquot); |
92f8ff73 | 1410 | xfs_qm_dqrele(pdqp); |
25fe55e8 | 1411 | |
fea7aae6 | 1412 | return error; |
25fe55e8 | 1413 | |
d4388d3c | 1414 | error_trans_cancel: |
4906e215 | 1415 | xfs_trans_cancel(tp); |
8f3d17ab | 1416 | error_free_dquots: |
92f8ff73 | 1417 | xfs_qm_dqrele(pdqp); |
fea7aae6 | 1418 | return error; |
25fe55e8 CH |
1419 | } |
1420 | ||
232b5194 CH |
1421 | static bool |
1422 | xfs_getbmap_format( | |
1423 | struct kgetbmap *p, | |
1424 | struct getbmapx __user *u, | |
1425 | size_t recsize) | |
8a7141a8 | 1426 | { |
232b5194 CH |
1427 | if (put_user(p->bmv_offset, &u->bmv_offset) || |
1428 | put_user(p->bmv_block, &u->bmv_block) || | |
1429 | put_user(p->bmv_length, &u->bmv_length) || | |
1430 | put_user(0, &u->bmv_count) || | |
1431 | put_user(0, &u->bmv_entries)) | |
1432 | return false; | |
1433 | if (recsize < sizeof(struct getbmapx)) | |
1434 | return true; | |
1435 | if (put_user(0, &u->bmv_iflags) || | |
1436 | put_user(p->bmv_oflags, &u->bmv_oflags) || | |
1437 | put_user(0, &u->bmv_unused1) || | |
1438 | put_user(0, &u->bmv_unused2)) | |
1439 | return false; | |
1440 | return true; | |
8a7141a8 ES |
1441 | } |
1442 | ||
1da177e4 LT |
1443 | STATIC int |
1444 | xfs_ioc_getbmap( | |
8f3e2058 | 1445 | struct file *file, |
1da177e4 LT |
1446 | unsigned int cmd, |
1447 | void __user *arg) | |
1448 | { | |
be6324c0 | 1449 | struct getbmapx bmx = { 0 }; |
232b5194 CH |
1450 | struct kgetbmap *buf; |
1451 | size_t recsize; | |
1452 | int error, i; | |
1da177e4 | 1453 | |
232b5194 CH |
1454 | switch (cmd) { |
1455 | case XFS_IOC_GETBMAPA: | |
1456 | bmx.bmv_iflags = BMV_IF_ATTRFORK; | |
53004ee7 | 1457 | fallthrough; |
232b5194 | 1458 | case XFS_IOC_GETBMAP: |
232b5194 CH |
1459 | /* struct getbmap is a strict subset of struct getbmapx. */ |
1460 | recsize = sizeof(struct getbmap); | |
1461 | break; | |
1462 | case XFS_IOC_GETBMAPX: | |
1463 | recsize = sizeof(struct getbmapx); | |
1464 | break; | |
1465 | default: | |
b474c7ae | 1466 | return -EINVAL; |
232b5194 | 1467 | } |
1da177e4 | 1468 | |
232b5194 | 1469 | if (copy_from_user(&bmx, arg, recsize)) |
b474c7ae | 1470 | return -EFAULT; |
1da177e4 LT |
1471 | |
1472 | if (bmx.bmv_count < 2) | |
b474c7ae | 1473 | return -EINVAL; |
29d650f7 | 1474 | if (bmx.bmv_count >= INT_MAX / recsize) |
232b5194 | 1475 | return -ENOMEM; |
1da177e4 | 1476 | |
c2e4e3b7 | 1477 | buf = kvcalloc(bmx.bmv_count, sizeof(*buf), GFP_KERNEL); |
232b5194 CH |
1478 | if (!buf) |
1479 | return -ENOMEM; | |
1da177e4 | 1480 | |
232b5194 | 1481 | error = xfs_getbmap(XFS_I(file_inode(file)), &bmx, buf); |
1da177e4 | 1482 | if (error) |
232b5194 | 1483 | goto out_free_buf; |
1da177e4 | 1484 | |
232b5194 CH |
1485 | error = -EFAULT; |
1486 | if (copy_to_user(arg, &bmx, recsize)) | |
1487 | goto out_free_buf; | |
1488 | arg += recsize; | |
1489 | ||
1490 | for (i = 0; i < bmx.bmv_entries; i++) { | |
1491 | if (!xfs_getbmap_format(buf + i, arg, recsize)) | |
1492 | goto out_free_buf; | |
1493 | arg += recsize; | |
1494 | } | |
1da177e4 | 1495 | |
232b5194 CH |
1496 | error = 0; |
1497 | out_free_buf: | |
1498 | kmem_free(buf); | |
132bf672 | 1499 | return error; |
1da177e4 | 1500 | } |
df26cfe8 | 1501 | |
e89c0413 DW |
1502 | STATIC int |
1503 | xfs_ioc_getfsmap( | |
1504 | struct xfs_inode *ip, | |
9d17e14c | 1505 | struct fsmap_head __user *arg) |
e89c0413 | 1506 | { |
e89c0413 DW |
1507 | struct xfs_fsmap_head xhead = {0}; |
1508 | struct fsmap_head head; | |
8ffa90e1 DW |
1509 | struct fsmap *recs; |
1510 | unsigned int count; | |
1511 | __u32 last_flags = 0; | |
1512 | bool done = false; | |
e89c0413 DW |
1513 | int error; |
1514 | ||
1515 | if (copy_from_user(&head, arg, sizeof(struct fsmap_head))) | |
1516 | return -EFAULT; | |
1517 | if (memchr_inv(head.fmh_reserved, 0, sizeof(head.fmh_reserved)) || | |
1518 | memchr_inv(head.fmh_keys[0].fmr_reserved, 0, | |
1519 | sizeof(head.fmh_keys[0].fmr_reserved)) || | |
1520 | memchr_inv(head.fmh_keys[1].fmr_reserved, 0, | |
1521 | sizeof(head.fmh_keys[1].fmr_reserved))) | |
1522 | return -EINVAL; | |
1523 | ||
8ffa90e1 DW |
1524 | /* |
1525 | * Use an internal memory buffer so that we don't have to copy fsmap | |
1526 | * data to userspace while holding locks. Start by trying to allocate | |
1527 | * up to 128k for the buffer, but fall back to a single page if needed. | |
1528 | */ | |
1529 | count = min_t(unsigned int, head.fmh_count, | |
1530 | 131072 / sizeof(struct fsmap)); | |
c2e4e3b7 | 1531 | recs = kvcalloc(count, sizeof(struct fsmap), GFP_KERNEL); |
8ffa90e1 DW |
1532 | if (!recs) { |
1533 | count = min_t(unsigned int, head.fmh_count, | |
1534 | PAGE_SIZE / sizeof(struct fsmap)); | |
c2e4e3b7 | 1535 | recs = kvcalloc(count, sizeof(struct fsmap), GFP_KERNEL); |
8ffa90e1 DW |
1536 | if (!recs) |
1537 | return -ENOMEM; | |
1538 | } | |
1539 | ||
e89c0413 | 1540 | xhead.fmh_iflags = head.fmh_iflags; |
e89c0413 DW |
1541 | xfs_fsmap_to_internal(&xhead.fmh_keys[0], &head.fmh_keys[0]); |
1542 | xfs_fsmap_to_internal(&xhead.fmh_keys[1], &head.fmh_keys[1]); | |
1543 | ||
1544 | trace_xfs_getfsmap_low_key(ip->i_mount, &xhead.fmh_keys[0]); | |
1545 | trace_xfs_getfsmap_high_key(ip->i_mount, &xhead.fmh_keys[1]); | |
1546 | ||
8ffa90e1 DW |
1547 | head.fmh_entries = 0; |
1548 | do { | |
1549 | struct fsmap __user *user_recs; | |
1550 | struct fsmap *last_rec; | |
1551 | ||
1552 | user_recs = &arg->fmh_recs[head.fmh_entries]; | |
1553 | xhead.fmh_entries = 0; | |
1554 | xhead.fmh_count = min_t(unsigned int, count, | |
1555 | head.fmh_count - head.fmh_entries); | |
1556 | ||
1557 | /* Run query, record how many entries we got. */ | |
1558 | error = xfs_getfsmap(ip->i_mount, &xhead, recs); | |
1559 | switch (error) { | |
1560 | case 0: | |
1561 | /* | |
1562 | * There are no more records in the result set. Copy | |
1563 | * whatever we got to userspace and break out. | |
1564 | */ | |
1565 | done = true; | |
1566 | break; | |
1567 | case -ECANCELED: | |
1568 | /* | |
1569 | * The internal memory buffer is full. Copy whatever | |
1570 | * records we got to userspace and go again if we have | |
1571 | * not yet filled the userspace buffer. | |
1572 | */ | |
1573 | error = 0; | |
1574 | break; | |
1575 | default: | |
1576 | goto out_free; | |
1577 | } | |
1578 | head.fmh_entries += xhead.fmh_entries; | |
1579 | head.fmh_oflags = xhead.fmh_oflags; | |
e89c0413 | 1580 | |
8ffa90e1 DW |
1581 | /* |
1582 | * If the caller wanted a record count or there aren't any | |
1583 | * new records to return, we're done. | |
1584 | */ | |
1585 | if (head.fmh_count == 0 || xhead.fmh_entries == 0) | |
1586 | break; | |
1587 | ||
1588 | /* Copy all the records we got out to userspace. */ | |
1589 | if (copy_to_user(user_recs, recs, | |
1590 | xhead.fmh_entries * sizeof(struct fsmap))) { | |
1591 | error = -EFAULT; | |
1592 | goto out_free; | |
1593 | } | |
1594 | ||
1595 | /* Remember the last record flags we copied to userspace. */ | |
1596 | last_rec = &recs[xhead.fmh_entries - 1]; | |
1597 | last_flags = last_rec->fmr_flags; | |
1598 | ||
1599 | /* Set up the low key for the next iteration. */ | |
1600 | xfs_fsmap_to_internal(&xhead.fmh_keys[0], last_rec); | |
1601 | trace_xfs_getfsmap_low_key(ip->i_mount, &xhead.fmh_keys[0]); | |
1602 | } while (!done && head.fmh_entries < head.fmh_count); | |
1603 | ||
1604 | /* | |
1605 | * If there are no more records in the query result set and we're not | |
1606 | * in counting mode, mark the last record returned with the LAST flag. | |
1607 | */ | |
1608 | if (done && head.fmh_count > 0 && head.fmh_entries > 0) { | |
1609 | struct fsmap __user *user_rec; | |
1610 | ||
1611 | last_flags |= FMR_OF_LAST; | |
1612 | user_rec = &arg->fmh_recs[head.fmh_entries - 1]; | |
1613 | ||
1614 | if (copy_to_user(&user_rec->fmr_flags, &last_flags, | |
1615 | sizeof(last_flags))) { | |
1616 | error = -EFAULT; | |
1617 | goto out_free; | |
1618 | } | |
e89c0413 DW |
1619 | } |
1620 | ||
1621 | /* copy back header */ | |
8ffa90e1 DW |
1622 | if (copy_to_user(arg, &head, sizeof(struct fsmap_head))) { |
1623 | error = -EFAULT; | |
1624 | goto out_free; | |
1625 | } | |
e89c0413 | 1626 | |
8ffa90e1 DW |
1627 | out_free: |
1628 | kmem_free(recs); | |
1629 | return error; | |
e89c0413 DW |
1630 | } |
1631 | ||
36fd6e86 DW |
1632 | STATIC int |
1633 | xfs_ioc_scrub_metadata( | |
71bddbcc | 1634 | struct file *file, |
36fd6e86 DW |
1635 | void __user *arg) |
1636 | { | |
1637 | struct xfs_scrub_metadata scrub; | |
1638 | int error; | |
1639 | ||
1640 | if (!capable(CAP_SYS_ADMIN)) | |
1641 | return -EPERM; | |
1642 | ||
1643 | if (copy_from_user(&scrub, arg, sizeof(scrub))) | |
1644 | return -EFAULT; | |
1645 | ||
71bddbcc | 1646 | error = xfs_scrub_metadata(file, &scrub); |
36fd6e86 DW |
1647 | if (error) |
1648 | return error; | |
1649 | ||
1650 | if (copy_to_user(arg, &scrub, sizeof(scrub))) | |
1651 | return -EFAULT; | |
1652 | ||
1653 | return 0; | |
1654 | } | |
1655 | ||
a133d952 DC |
1656 | int |
1657 | xfs_ioc_swapext( | |
1658 | xfs_swapext_t *sxp) | |
1659 | { | |
1660 | xfs_inode_t *ip, *tip; | |
1661 | struct fd f, tmp; | |
1662 | int error = 0; | |
1663 | ||
1664 | /* Pull information for the target fd */ | |
1665 | f = fdget((int)sxp->sx_fdtarget); | |
1666 | if (!f.file) { | |
2451337d | 1667 | error = -EINVAL; |
a133d952 DC |
1668 | goto out; |
1669 | } | |
1670 | ||
1671 | if (!(f.file->f_mode & FMODE_WRITE) || | |
1672 | !(f.file->f_mode & FMODE_READ) || | |
1673 | (f.file->f_flags & O_APPEND)) { | |
2451337d | 1674 | error = -EBADF; |
a133d952 DC |
1675 | goto out_put_file; |
1676 | } | |
1677 | ||
1678 | tmp = fdget((int)sxp->sx_fdtmp); | |
1679 | if (!tmp.file) { | |
2451337d | 1680 | error = -EINVAL; |
a133d952 DC |
1681 | goto out_put_file; |
1682 | } | |
1683 | ||
1684 | if (!(tmp.file->f_mode & FMODE_WRITE) || | |
1685 | !(tmp.file->f_mode & FMODE_READ) || | |
1686 | (tmp.file->f_flags & O_APPEND)) { | |
2451337d | 1687 | error = -EBADF; |
a133d952 DC |
1688 | goto out_put_tmp_file; |
1689 | } | |
1690 | ||
1691 | if (IS_SWAPFILE(file_inode(f.file)) || | |
1692 | IS_SWAPFILE(file_inode(tmp.file))) { | |
2451337d | 1693 | error = -EINVAL; |
a133d952 DC |
1694 | goto out_put_tmp_file; |
1695 | } | |
1696 | ||
7f1b6245 JH |
1697 | /* |
1698 | * We need to ensure that the fds passed in point to XFS inodes | |
1699 | * before we cast and access them as XFS structures as we have no | |
1700 | * control over what the user passes us here. | |
1701 | */ | |
1702 | if (f.file->f_op != &xfs_file_operations || | |
1703 | tmp.file->f_op != &xfs_file_operations) { | |
1704 | error = -EINVAL; | |
1705 | goto out_put_tmp_file; | |
1706 | } | |
1707 | ||
a133d952 DC |
1708 | ip = XFS_I(file_inode(f.file)); |
1709 | tip = XFS_I(file_inode(tmp.file)); | |
1710 | ||
1711 | if (ip->i_mount != tip->i_mount) { | |
2451337d | 1712 | error = -EINVAL; |
a133d952 DC |
1713 | goto out_put_tmp_file; |
1714 | } | |
1715 | ||
1716 | if (ip->i_ino == tip->i_ino) { | |
2451337d | 1717 | error = -EINVAL; |
a133d952 DC |
1718 | goto out_put_tmp_file; |
1719 | } | |
1720 | ||
75c8c50f | 1721 | if (xfs_is_shutdown(ip->i_mount)) { |
2451337d | 1722 | error = -EIO; |
a133d952 DC |
1723 | goto out_put_tmp_file; |
1724 | } | |
1725 | ||
1726 | error = xfs_swap_extents(ip, tip, sxp); | |
1727 | ||
1728 | out_put_tmp_file: | |
1729 | fdput(tmp); | |
1730 | out_put_file: | |
1731 | fdput(f); | |
1732 | out: | |
1733 | return error; | |
1734 | } | |
1735 | ||
f7664b31 ES |
1736 | static int |
1737 | xfs_ioc_getlabel( | |
1738 | struct xfs_mount *mp, | |
1739 | char __user *user_label) | |
1740 | { | |
1741 | struct xfs_sb *sbp = &mp->m_sb; | |
1742 | char label[XFSLABEL_MAX + 1]; | |
1743 | ||
1744 | /* Paranoia */ | |
1745 | BUILD_BUG_ON(sizeof(sbp->sb_fname) > FSLABEL_MAX); | |
1746 | ||
4bb8b65a AB |
1747 | /* 1 larger than sb_fname, so this ensures a trailing NUL char */ |
1748 | memset(label, 0, sizeof(label)); | |
f7664b31 | 1749 | spin_lock(&mp->m_sb_lock); |
4bb8b65a | 1750 | strncpy(label, sbp->sb_fname, XFSLABEL_MAX); |
f7664b31 ES |
1751 | spin_unlock(&mp->m_sb_lock); |
1752 | ||
4bb8b65a | 1753 | if (copy_to_user(user_label, label, sizeof(label))) |
f7664b31 ES |
1754 | return -EFAULT; |
1755 | return 0; | |
1756 | } | |
1757 | ||
1758 | static int | |
1759 | xfs_ioc_setlabel( | |
1760 | struct file *filp, | |
1761 | struct xfs_mount *mp, | |
1762 | char __user *newlabel) | |
1763 | { | |
1764 | struct xfs_sb *sbp = &mp->m_sb; | |
1765 | char label[XFSLABEL_MAX + 1]; | |
1766 | size_t len; | |
1767 | int error; | |
1768 | ||
1769 | if (!capable(CAP_SYS_ADMIN)) | |
1770 | return -EPERM; | |
1771 | /* | |
1772 | * The generic ioctl allows up to FSLABEL_MAX chars, but XFS is much | |
1773 | * smaller, at 12 bytes. We copy one more to be sure we find the | |
1774 | * (required) NULL character to test the incoming label length. | |
1775 | * NB: The on disk label doesn't need to be null terminated. | |
1776 | */ | |
1777 | if (copy_from_user(label, newlabel, XFSLABEL_MAX + 1)) | |
1778 | return -EFAULT; | |
1779 | len = strnlen(label, XFSLABEL_MAX + 1); | |
1780 | if (len > sizeof(sbp->sb_fname)) | |
1781 | return -EINVAL; | |
1782 | ||
1783 | error = mnt_want_write_file(filp); | |
1784 | if (error) | |
1785 | return error; | |
1786 | ||
1787 | spin_lock(&mp->m_sb_lock); | |
1788 | memset(sbp->sb_fname, 0, sizeof(sbp->sb_fname)); | |
4bb8b65a | 1789 | memcpy(sbp->sb_fname, label, len); |
f7664b31 ES |
1790 | spin_unlock(&mp->m_sb_lock); |
1791 | ||
1792 | /* | |
1793 | * Now we do several things to satisfy userspace. | |
1794 | * In addition to normal logging of the primary superblock, we also | |
1795 | * immediately write these changes to sector zero for the primary, then | |
1796 | * update all backup supers (as xfs_db does for a label change), then | |
1797 | * invalidate the block device page cache. This is so that any prior | |
1798 | * buffered reads from userspace (i.e. from blkid) are invalidated, | |
1799 | * and userspace will see the newly-written label. | |
1800 | */ | |
1801 | error = xfs_sync_sb_buf(mp); | |
1802 | if (error) | |
1803 | goto out; | |
1804 | /* | |
1805 | * growfs also updates backup supers so lock against that. | |
1806 | */ | |
1807 | mutex_lock(&mp->m_growlock); | |
1808 | error = xfs_update_secondary_sbs(mp); | |
1809 | mutex_unlock(&mp->m_growlock); | |
1810 | ||
1811 | invalidate_bdev(mp->m_ddev_targp->bt_bdev); | |
1812 | ||
1813 | out: | |
1814 | mnt_drop_write_file(filp); | |
1815 | return error; | |
1816 | } | |
1817 | ||
3737bb2c DW |
1818 | static inline int |
1819 | xfs_fs_eofblocks_from_user( | |
1820 | struct xfs_fs_eofblocks *src, | |
b26b2bf1 | 1821 | struct xfs_icwalk *dst) |
3737bb2c DW |
1822 | { |
1823 | if (src->eof_version != XFS_EOFBLOCKS_VERSION) | |
1824 | return -EINVAL; | |
1825 | ||
1826 | if (src->eof_flags & ~XFS_EOF_FLAGS_VALID) | |
1827 | return -EINVAL; | |
1828 | ||
1829 | if (memchr_inv(&src->pad32, 0, sizeof(src->pad32)) || | |
1830 | memchr_inv(src->pad64, 0, sizeof(src->pad64))) | |
1831 | return -EINVAL; | |
1832 | ||
b26b2bf1 | 1833 | dst->icw_flags = 0; |
2d53f66b | 1834 | if (src->eof_flags & XFS_EOF_FLAGS_SYNC) |
b26b2bf1 | 1835 | dst->icw_flags |= XFS_ICWALK_FLAG_SYNC; |
2d53f66b | 1836 | if (src->eof_flags & XFS_EOF_FLAGS_UID) |
b26b2bf1 | 1837 | dst->icw_flags |= XFS_ICWALK_FLAG_UID; |
2d53f66b | 1838 | if (src->eof_flags & XFS_EOF_FLAGS_GID) |
b26b2bf1 | 1839 | dst->icw_flags |= XFS_ICWALK_FLAG_GID; |
2d53f66b | 1840 | if (src->eof_flags & XFS_EOF_FLAGS_PRID) |
b26b2bf1 | 1841 | dst->icw_flags |= XFS_ICWALK_FLAG_PRID; |
2d53f66b | 1842 | if (src->eof_flags & XFS_EOF_FLAGS_MINFILESIZE) |
b26b2bf1 | 1843 | dst->icw_flags |= XFS_ICWALK_FLAG_MINFILESIZE; |
2d53f66b | 1844 | |
b26b2bf1 DW |
1845 | dst->icw_prid = src->eof_prid; |
1846 | dst->icw_min_file_size = src->eof_min_file_size; | |
3737bb2c | 1847 | |
b26b2bf1 | 1848 | dst->icw_uid = INVALID_UID; |
3737bb2c | 1849 | if (src->eof_flags & XFS_EOF_FLAGS_UID) { |
b26b2bf1 DW |
1850 | dst->icw_uid = make_kuid(current_user_ns(), src->eof_uid); |
1851 | if (!uid_valid(dst->icw_uid)) | |
3737bb2c DW |
1852 | return -EINVAL; |
1853 | } | |
1854 | ||
b26b2bf1 | 1855 | dst->icw_gid = INVALID_GID; |
3737bb2c | 1856 | if (src->eof_flags & XFS_EOF_FLAGS_GID) { |
b26b2bf1 DW |
1857 | dst->icw_gid = make_kgid(current_user_ns(), src->eof_gid); |
1858 | if (!gid_valid(dst->icw_gid)) | |
3737bb2c DW |
1859 | return -EINVAL; |
1860 | } | |
1861 | return 0; | |
1862 | } | |
1863 | ||
b3bb9413 DW |
1864 | /* |
1865 | * These long-unused ioctls were removed from the official ioctl API in 5.17, | |
1866 | * but retain these definitions so that we can log warnings about them. | |
1867 | */ | |
1868 | #define XFS_IOC_ALLOCSP _IOW ('X', 10, struct xfs_flock64) | |
1869 | #define XFS_IOC_FREESP _IOW ('X', 11, struct xfs_flock64) | |
1870 | #define XFS_IOC_ALLOCSP64 _IOW ('X', 36, struct xfs_flock64) | |
1871 | #define XFS_IOC_FREESP64 _IOW ('X', 37, struct xfs_flock64) | |
1872 | ||
4d4be482 CH |
1873 | /* |
1874 | * Note: some of the ioctl's return positive numbers as a | |
1875 | * byte count indicating success, such as readlink_by_handle. | |
1876 | * So we don't "sign flip" like most other routines. This means | |
1877 | * true errors need to be returned as a negative value. | |
1878 | */ | |
1879 | long | |
1880 | xfs_file_ioctl( | |
df26cfe8 | 1881 | struct file *filp, |
df26cfe8 | 1882 | unsigned int cmd, |
4d4be482 | 1883 | unsigned long p) |
df26cfe8 | 1884 | { |
496ad9aa | 1885 | struct inode *inode = file_inode(filp); |
4d4be482 CH |
1886 | struct xfs_inode *ip = XFS_I(inode); |
1887 | struct xfs_mount *mp = ip->i_mount; | |
1888 | void __user *arg = (void __user *)p; | |
df26cfe8 LM |
1889 | int error; |
1890 | ||
cca28fb8 | 1891 | trace_xfs_file_ioctl(ip); |
4d4be482 CH |
1892 | |
1893 | switch (cmd) { | |
a46db608 CH |
1894 | case FITRIM: |
1895 | return xfs_ioc_trim(mp, arg); | |
f7664b31 ES |
1896 | case FS_IOC_GETFSLABEL: |
1897 | return xfs_ioc_getlabel(mp, arg); | |
1898 | case FS_IOC_SETFSLABEL: | |
1899 | return xfs_ioc_setlabel(filp, mp, arg); | |
df26cfe8 LM |
1900 | case XFS_IOC_ALLOCSP: |
1901 | case XFS_IOC_FREESP: | |
df26cfe8 | 1902 | case XFS_IOC_ALLOCSP64: |
4d1b97f9 DW |
1903 | case XFS_IOC_FREESP64: |
1904 | xfs_warn_once(mp, | |
1905 | "%s should use fallocate; XFS_IOC_{ALLOC,FREE}SP ioctl unsupported", | |
1906 | current->comm); | |
1907 | return -ENOTTY; | |
df26cfe8 | 1908 | case XFS_IOC_DIOINFO: { |
c7d68318 CH |
1909 | struct xfs_buftarg *target = xfs_inode_buftarg(ip); |
1910 | struct dioattr da; | |
df26cfe8 | 1911 | |
7c71ee78 | 1912 | da.d_mem = da.d_miniosz = target->bt_logical_sectorsize; |
df26cfe8 LM |
1913 | da.d_maxiosz = INT_MAX & ~(da.d_miniosz - 1); |
1914 | ||
1915 | if (copy_to_user(arg, &da, sizeof(da))) | |
b474c7ae | 1916 | return -EFAULT; |
df26cfe8 LM |
1917 | return 0; |
1918 | } | |
1919 | ||
1920 | case XFS_IOC_FSBULKSTAT_SINGLE: | |
1921 | case XFS_IOC_FSBULKSTAT: | |
1922 | case XFS_IOC_FSINUMBERS: | |
f736d93d | 1923 | return xfs_ioc_fsbulkstat(filp, cmd, arg); |
df26cfe8 | 1924 | |
0448b6f4 | 1925 | case XFS_IOC_BULKSTAT: |
f736d93d | 1926 | return xfs_ioc_bulkstat(filp, cmd, arg); |
fba9760a DW |
1927 | case XFS_IOC_INUMBERS: |
1928 | return xfs_ioc_inumbers(mp, cmd, arg); | |
df26cfe8 LM |
1929 | |
1930 | case XFS_IOC_FSGEOMETRY_V1: | |
1b6d968d DC |
1931 | return xfs_ioc_fsgeometry(mp, arg, 3); |
1932 | case XFS_IOC_FSGEOMETRY_V4: | |
1933 | return xfs_ioc_fsgeometry(mp, arg, 4); | |
df26cfe8 | 1934 | case XFS_IOC_FSGEOMETRY: |
1b6d968d | 1935 | return xfs_ioc_fsgeometry(mp, arg, 5); |
df26cfe8 | 1936 | |
7cd5006b DW |
1937 | case XFS_IOC_AG_GEOMETRY: |
1938 | return xfs_ioc_ag_geometry(mp, arg); | |
1939 | ||
df26cfe8 LM |
1940 | case XFS_IOC_GETVERSION: |
1941 | return put_user(inode->i_generation, (int __user *)arg); | |
1942 | ||
df26cfe8 | 1943 | case XFS_IOC_FSGETXATTRA: |
9fefd5db | 1944 | return xfs_ioc_fsgetxattra(ip, arg); |
df26cfe8 | 1945 | |
df26cfe8 LM |
1946 | case XFS_IOC_GETBMAP: |
1947 | case XFS_IOC_GETBMAPA: | |
df26cfe8 | 1948 | case XFS_IOC_GETBMAPX: |
232b5194 | 1949 | return xfs_ioc_getbmap(filp, cmd, arg); |
df26cfe8 | 1950 | |
e89c0413 DW |
1951 | case FS_IOC_GETFSMAP: |
1952 | return xfs_ioc_getfsmap(ip, arg); | |
1953 | ||
36fd6e86 | 1954 | case XFS_IOC_SCRUB_METADATA: |
71bddbcc | 1955 | return xfs_ioc_scrub_metadata(filp, arg); |
36fd6e86 | 1956 | |
df26cfe8 LM |
1957 | case XFS_IOC_FD_TO_HANDLE: |
1958 | case XFS_IOC_PATH_TO_HANDLE: | |
743bb465 | 1959 | case XFS_IOC_PATH_TO_FSHANDLE: { |
1960 | xfs_fsop_handlereq_t hreq; | |
df26cfe8 | 1961 | |
743bb465 | 1962 | if (copy_from_user(&hreq, arg, sizeof(hreq))) |
b474c7ae | 1963 | return -EFAULT; |
743bb465 | 1964 | return xfs_find_handle(cmd, &hreq); |
1965 | } | |
1966 | case XFS_IOC_OPEN_BY_HANDLE: { | |
1967 | xfs_fsop_handlereq_t hreq; | |
df26cfe8 | 1968 | |
743bb465 | 1969 | if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t))) |
b474c7ae | 1970 | return -EFAULT; |
d296d30a | 1971 | return xfs_open_by_handle(filp, &hreq); |
743bb465 | 1972 | } |
df26cfe8 | 1973 | |
743bb465 | 1974 | case XFS_IOC_READLINK_BY_HANDLE: { |
1975 | xfs_fsop_handlereq_t hreq; | |
df26cfe8 | 1976 | |
743bb465 | 1977 | if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t))) |
b474c7ae | 1978 | return -EFAULT; |
d296d30a | 1979 | return xfs_readlink_by_handle(filp, &hreq); |
743bb465 | 1980 | } |
df26cfe8 | 1981 | case XFS_IOC_ATTRLIST_BY_HANDLE: |
d296d30a | 1982 | return xfs_attrlist_by_handle(filp, arg); |
df26cfe8 LM |
1983 | |
1984 | case XFS_IOC_ATTRMULTI_BY_HANDLE: | |
d296d30a | 1985 | return xfs_attrmulti_by_handle(filp, arg); |
df26cfe8 LM |
1986 | |
1987 | case XFS_IOC_SWAPEXT: { | |
743bb465 | 1988 | struct xfs_swapext sxp; |
1989 | ||
1990 | if (copy_from_user(&sxp, arg, sizeof(xfs_swapext_t))) | |
b474c7ae | 1991 | return -EFAULT; |
d9457dc0 JK |
1992 | error = mnt_want_write_file(filp); |
1993 | if (error) | |
1994 | return error; | |
a133d952 | 1995 | error = xfs_ioc_swapext(&sxp); |
d9457dc0 | 1996 | mnt_drop_write_file(filp); |
2451337d | 1997 | return error; |
df26cfe8 LM |
1998 | } |
1999 | ||
2000 | case XFS_IOC_FSCOUNTS: { | |
2001 | xfs_fsop_counts_t out; | |
2002 | ||
91083269 | 2003 | xfs_fs_counts(mp, &out); |
df26cfe8 LM |
2004 | |
2005 | if (copy_to_user(arg, &out, sizeof(out))) | |
b474c7ae | 2006 | return -EFAULT; |
df26cfe8 LM |
2007 | return 0; |
2008 | } | |
2009 | ||
2010 | case XFS_IOC_SET_RESBLKS: { | |
2011 | xfs_fsop_resblks_t inout; | |
c8ce540d | 2012 | uint64_t in; |
df26cfe8 LM |
2013 | |
2014 | if (!capable(CAP_SYS_ADMIN)) | |
2015 | return -EPERM; | |
2016 | ||
2e973b2c | 2017 | if (xfs_is_readonly(mp)) |
b474c7ae | 2018 | return -EROFS; |
d5db0f97 | 2019 | |
df26cfe8 | 2020 | if (copy_from_user(&inout, arg, sizeof(inout))) |
b474c7ae | 2021 | return -EFAULT; |
df26cfe8 | 2022 | |
d9457dc0 JK |
2023 | error = mnt_want_write_file(filp); |
2024 | if (error) | |
2025 | return error; | |
2026 | ||
df26cfe8 LM |
2027 | /* input parameter is passed in resblks field of structure */ |
2028 | in = inout.resblks; | |
2029 | error = xfs_reserve_blocks(mp, &in, &inout); | |
d9457dc0 | 2030 | mnt_drop_write_file(filp); |
df26cfe8 | 2031 | if (error) |
2451337d | 2032 | return error; |
df26cfe8 LM |
2033 | |
2034 | if (copy_to_user(arg, &inout, sizeof(inout))) | |
b474c7ae | 2035 | return -EFAULT; |
df26cfe8 LM |
2036 | return 0; |
2037 | } | |
2038 | ||
2039 | case XFS_IOC_GET_RESBLKS: { | |
2040 | xfs_fsop_resblks_t out; | |
2041 | ||
2042 | if (!capable(CAP_SYS_ADMIN)) | |
2043 | return -EPERM; | |
2044 | ||
2045 | error = xfs_reserve_blocks(mp, NULL, &out); | |
2046 | if (error) | |
2451337d | 2047 | return error; |
df26cfe8 LM |
2048 | |
2049 | if (copy_to_user(arg, &out, sizeof(out))) | |
b474c7ae | 2050 | return -EFAULT; |
df26cfe8 LM |
2051 | |
2052 | return 0; | |
2053 | } | |
2054 | ||
2055 | case XFS_IOC_FSGROWFSDATA: { | |
07aabd9c | 2056 | struct xfs_growfs_data in; |
df26cfe8 | 2057 | |
df26cfe8 | 2058 | if (copy_from_user(&in, arg, sizeof(in))) |
b474c7ae | 2059 | return -EFAULT; |
df26cfe8 | 2060 | |
d9457dc0 JK |
2061 | error = mnt_want_write_file(filp); |
2062 | if (error) | |
2063 | return error; | |
df26cfe8 | 2064 | error = xfs_growfs_data(mp, &in); |
d9457dc0 | 2065 | mnt_drop_write_file(filp); |
2451337d | 2066 | return error; |
df26cfe8 LM |
2067 | } |
2068 | ||
2069 | case XFS_IOC_FSGROWFSLOG: { | |
07aabd9c | 2070 | struct xfs_growfs_log in; |
df26cfe8 | 2071 | |
df26cfe8 | 2072 | if (copy_from_user(&in, arg, sizeof(in))) |
b474c7ae | 2073 | return -EFAULT; |
df26cfe8 | 2074 | |
d9457dc0 JK |
2075 | error = mnt_want_write_file(filp); |
2076 | if (error) | |
2077 | return error; | |
df26cfe8 | 2078 | error = xfs_growfs_log(mp, &in); |
d9457dc0 | 2079 | mnt_drop_write_file(filp); |
2451337d | 2080 | return error; |
df26cfe8 LM |
2081 | } |
2082 | ||
2083 | case XFS_IOC_FSGROWFSRT: { | |
2084 | xfs_growfs_rt_t in; | |
2085 | ||
df26cfe8 | 2086 | if (copy_from_user(&in, arg, sizeof(in))) |
b474c7ae | 2087 | return -EFAULT; |
df26cfe8 | 2088 | |
d9457dc0 JK |
2089 | error = mnt_want_write_file(filp); |
2090 | if (error) | |
2091 | return error; | |
df26cfe8 | 2092 | error = xfs_growfs_rt(mp, &in); |
d9457dc0 | 2093 | mnt_drop_write_file(filp); |
2451337d | 2094 | return error; |
df26cfe8 LM |
2095 | } |
2096 | ||
df26cfe8 | 2097 | case XFS_IOC_GOINGDOWN: { |
c8ce540d | 2098 | uint32_t in; |
df26cfe8 LM |
2099 | |
2100 | if (!capable(CAP_SYS_ADMIN)) | |
2101 | return -EPERM; | |
2102 | ||
c8ce540d | 2103 | if (get_user(in, (uint32_t __user *)arg)) |
b474c7ae | 2104 | return -EFAULT; |
df26cfe8 | 2105 | |
2451337d | 2106 | return xfs_fs_goingdown(mp, in); |
df26cfe8 LM |
2107 | } |
2108 | ||
2109 | case XFS_IOC_ERROR_INJECTION: { | |
2110 | xfs_error_injection_t in; | |
2111 | ||
2112 | if (!capable(CAP_SYS_ADMIN)) | |
2113 | return -EPERM; | |
2114 | ||
2115 | if (copy_from_user(&in, arg, sizeof(in))) | |
b474c7ae | 2116 | return -EFAULT; |
df26cfe8 | 2117 | |
31965ef3 | 2118 | return xfs_errortag_add(mp, in.errtag); |
df26cfe8 LM |
2119 | } |
2120 | ||
2121 | case XFS_IOC_ERROR_CLEARALL: | |
2122 | if (!capable(CAP_SYS_ADMIN)) | |
2123 | return -EPERM; | |
2124 | ||
31965ef3 | 2125 | return xfs_errortag_clearall(mp); |
df26cfe8 | 2126 | |
8ca149de | 2127 | case XFS_IOC_FREE_EOFBLOCKS: { |
b26b2bf1 DW |
2128 | struct xfs_fs_eofblocks eofb; |
2129 | struct xfs_icwalk icw; | |
8ca149de | 2130 | |
8c567a7f DE |
2131 | if (!capable(CAP_SYS_ADMIN)) |
2132 | return -EPERM; | |
2133 | ||
2e973b2c | 2134 | if (xfs_is_readonly(mp)) |
b474c7ae | 2135 | return -EROFS; |
8c567a7f | 2136 | |
8ca149de | 2137 | if (copy_from_user(&eofb, arg, sizeof(eofb))) |
b474c7ae | 2138 | return -EFAULT; |
8ca149de | 2139 | |
b26b2bf1 | 2140 | error = xfs_fs_eofblocks_from_user(&eofb, &icw); |
b9fe5052 | 2141 | if (error) |
2451337d | 2142 | return error; |
8ca149de | 2143 | |
b26b2bf1 | 2144 | trace_xfs_ioc_free_eofblocks(mp, &icw, _RET_IP_); |
38899f80 | 2145 | |
4b674b9a | 2146 | sb_start_write(mp->m_super); |
b26b2bf1 | 2147 | error = xfs_blockgc_free_space(mp, &icw); |
4b674b9a BF |
2148 | sb_end_write(mp->m_super); |
2149 | return error; | |
8ca149de BF |
2150 | } |
2151 | ||
df26cfe8 LM |
2152 | default: |
2153 | return -ENOTTY; | |
2154 | } | |
2155 | } |