Merge tag 'ceph-for-6.4-rc1' of https://github.com/ceph/ceph-client
[linux-block.git] / fs / xfs / xfs_ioctl.c
CommitLineData
0b61f8a4 1// SPDX-License-Identifier: GPL-2.0
1da177e4 2/*
7b718769
NS
3 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
4 * All Rights Reserved.
1da177e4 5 */
1da177e4 6#include "xfs.h"
1da177e4 7#include "xfs_fs.h"
70a9883c 8#include "xfs_shared.h"
239880ef
DC
9#include "xfs_format.h"
10#include "xfs_log_format.h"
11#include "xfs_trans_resv.h"
1da177e4 12#include "xfs_mount.h"
1da177e4 13#include "xfs_inode.h"
1da177e4 14#include "xfs_rtalloc.h"
2810bd68 15#include "xfs_iwalk.h"
1da177e4 16#include "xfs_itable.h"
a844f451 17#include "xfs_error.h"
e0c41089
DC
18#include "xfs_da_format.h"
19#include "xfs_da_btree.h"
1da177e4 20#include "xfs_attr.h"
a844f451 21#include "xfs_bmap.h"
68988114 22#include "xfs_bmap_util.h"
1da177e4 23#include "xfs_fsops.h"
a46db608 24#include "xfs_discard.h"
25fe55e8 25#include "xfs_quota.h"
d296d30a 26#include "xfs_export.h"
0b1b213f 27#include "xfs_trace.h"
8ca149de 28#include "xfs_icache.h"
a4fbe6ab 29#include "xfs_trans.h"
47e1bf64 30#include "xfs_acl.h"
e89c0413
DW
31#include "xfs_btree.h"
32#include <linux/fsmap.h>
33#include "xfs_fsmap.h"
36fd6e86 34#include "scrub/xfs_scrub.h"
c368ebcd 35#include "xfs_sb.h"
7cd5006b 36#include "xfs_ag.h"
c23232d4 37#include "xfs_health.h"
7a42c70e 38#include "xfs_reflink.h"
5f213ddb 39#include "xfs_ioctl.h"
efc2efeb 40#include "xfs_xattr.h"
1da177e4 41
1da177e4
LT
42#include <linux/mount.h>
43#include <linux/namei.h>
9fefd5db 44#include <linux/fileattr.h>
1da177e4
LT
45
46/*
47 * xfs_find_handle maps from userspace xfs_fsop_handlereq structure to
48 * a file or fs handle.
49 *
50 * XFS_IOC_PATH_TO_FSHANDLE
51 * returns fs handle for a mount point or path within that mount point
52 * XFS_IOC_FD_TO_HANDLE
53 * returns full handle for a FD opened in user space
54 * XFS_IOC_PATH_TO_HANDLE
55 * returns full handle for a path
56 */
d5547f9f 57int
1da177e4
LT
58xfs_find_handle(
59 unsigned int cmd,
743bb465 60 xfs_fsop_handlereq_t *hreq)
1da177e4
LT
61{
62 int hsize;
63 xfs_handle_t handle;
1da177e4 64 struct inode *inode;
a30b0367 65 struct fd f = {NULL};
4346cdd4 66 struct path path;
2903ff01 67 int error;
4346cdd4 68 struct xfs_inode *ip;
1da177e4 69
4346cdd4 70 if (cmd == XFS_IOC_FD_TO_HANDLE) {
2903ff01
AV
71 f = fdget(hreq->fd);
72 if (!f.file)
4346cdd4 73 return -EBADF;
496ad9aa 74 inode = file_inode(f.file);
4346cdd4 75 } else {
ce6595a2 76 error = user_path_at(AT_FDCWD, hreq->path, 0, &path);
4346cdd4
CH
77 if (error)
78 return error;
2b0143b5 79 inode = d_inode(path.dentry);
1da177e4 80 }
4346cdd4
CH
81 ip = XFS_I(inode);
82
83 /*
84 * We can only generate handles for inodes residing on a XFS filesystem,
85 * and only for regular files, directories or symbolic links.
86 */
87 error = -EINVAL;
88 if (inode->i_sb->s_magic != XFS_SB_MAGIC)
89 goto out_put;
90
91 error = -EBADF;
92 if (!S_ISREG(inode->i_mode) &&
93 !S_ISDIR(inode->i_mode) &&
94 !S_ISLNK(inode->i_mode))
95 goto out_put;
96
97
98 memcpy(&handle.ha_fsid, ip->i_mount->m_fixedfsid, sizeof(xfs_fsid_t));
99
100 if (cmd == XFS_IOC_PATH_TO_FSHANDLE) {
101 /*
102 * This handle only contains an fsid, zero the rest.
103 */
104 memset(&handle.ha_fid, 0, sizeof(handle.ha_fid));
105 hsize = sizeof(xfs_fsid_t);
106 } else {
c6143911
CH
107 handle.ha_fid.fid_len = sizeof(xfs_fid_t) -
108 sizeof(handle.ha_fid.fid_len);
109 handle.ha_fid.fid_pad = 0;
9e9a2674 110 handle.ha_fid.fid_gen = inode->i_generation;
c6143911 111 handle.ha_fid.fid_ino = ip->i_ino;
3398a400 112 hsize = sizeof(xfs_handle_t);
1da177e4
LT
113 }
114
4346cdd4 115 error = -EFAULT;
743bb465 116 if (copy_to_user(hreq->ohandle, &handle, hsize) ||
4346cdd4
CH
117 copy_to_user(hreq->ohandlen, &hsize, sizeof(__s32)))
118 goto out_put;
1da177e4 119
4346cdd4
CH
120 error = 0;
121
122 out_put:
123 if (cmd == XFS_IOC_FD_TO_HANDLE)
2903ff01 124 fdput(f);
4346cdd4
CH
125 else
126 path_put(&path);
127 return error;
1da177e4
LT
128}
129
1da177e4 130/*
d296d30a
CH
131 * No need to do permission checks on the various pathname components
132 * as the handle operations are privileged.
1da177e4
LT
133 */
134STATIC int
d296d30a
CH
135xfs_handle_acceptable(
136 void *context,
137 struct dentry *dentry)
138{
139 return 1;
140}
141
142/*
143 * Convert userspace handle data into a dentry.
144 */
145struct dentry *
146xfs_handle_to_dentry(
147 struct file *parfilp,
148 void __user *uhandle,
149 u32 hlen)
1da177e4 150{
1da177e4 151 xfs_handle_t handle;
d296d30a 152 struct xfs_fid64 fid;
1da177e4
LT
153
154 /*
155 * Only allow handle opens under a directory.
156 */
496ad9aa 157 if (!S_ISDIR(file_inode(parfilp)->i_mode))
d296d30a
CH
158 return ERR_PTR(-ENOTDIR);
159
160 if (hlen != sizeof(xfs_handle_t))
161 return ERR_PTR(-EINVAL);
162 if (copy_from_user(&handle, uhandle, hlen))
163 return ERR_PTR(-EFAULT);
164 if (handle.ha_fid.fid_len !=
165 sizeof(handle.ha_fid) - sizeof(handle.ha_fid.fid_len))
166 return ERR_PTR(-EINVAL);
167
168 memset(&fid, 0, sizeof(struct fid));
169 fid.ino = handle.ha_fid.fid_ino;
170 fid.gen = handle.ha_fid.fid_gen;
171
172 return exportfs_decode_fh(parfilp->f_path.mnt, (struct fid *)&fid, 3,
173 FILEID_INO32_GEN | XFS_FILEID_TYPE_64FLAG,
174 xfs_handle_acceptable, NULL);
175}
1da177e4 176
d296d30a
CH
177STATIC struct dentry *
178xfs_handlereq_to_dentry(
179 struct file *parfilp,
180 xfs_fsop_handlereq_t *hreq)
181{
182 return xfs_handle_to_dentry(parfilp, hreq->ihandle, hreq->ihandlen);
1da177e4
LT
183}
184
d5547f9f 185int
1da177e4 186xfs_open_by_handle(
1da177e4 187 struct file *parfilp,
d296d30a 188 xfs_fsop_handlereq_t *hreq)
1da177e4 189{
745ca247 190 const struct cred *cred = current_cred();
1da177e4 191 int error;
d296d30a 192 int fd;
1da177e4
LT
193 int permflag;
194 struct file *filp;
195 struct inode *inode;
196 struct dentry *dentry;
1a1d7724 197 fmode_t fmode;
765927b2 198 struct path path;
1da177e4
LT
199
200 if (!capable(CAP_SYS_ADMIN))
b474c7ae 201 return -EPERM;
1da177e4 202
d296d30a
CH
203 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
204 if (IS_ERR(dentry))
205 return PTR_ERR(dentry);
2b0143b5 206 inode = d_inode(dentry);
1da177e4
LT
207
208 /* Restrict xfs_open_by_handle to directories & regular files. */
209 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) {
b474c7ae 210 error = -EPERM;
d296d30a 211 goto out_dput;
1da177e4
LT
212 }
213
214#if BITS_PER_LONG != 32
743bb465 215 hreq->oflags |= O_LARGEFILE;
1da177e4 216#endif
d296d30a 217
743bb465 218 permflag = hreq->oflags;
1a1d7724 219 fmode = OPEN_FMODE(permflag);
1da177e4 220 if ((!(permflag & O_APPEND) || (permflag & O_TRUNC)) &&
1a1d7724 221 (fmode & FMODE_WRITE) && IS_APPEND(inode)) {
b474c7ae 222 error = -EPERM;
d296d30a 223 goto out_dput;
1da177e4
LT
224 }
225
1a1d7724 226 if ((fmode & FMODE_WRITE) && IS_IMMUTABLE(inode)) {
337684a1 227 error = -EPERM;
d296d30a 228 goto out_dput;
1da177e4
LT
229 }
230
231 /* Can't write directories. */
1a1d7724 232 if (S_ISDIR(inode->i_mode) && (fmode & FMODE_WRITE)) {
b474c7ae 233 error = -EISDIR;
d296d30a 234 goto out_dput;
1da177e4
LT
235 }
236
862a6293 237 fd = get_unused_fd_flags(0);
d296d30a
CH
238 if (fd < 0) {
239 error = fd;
240 goto out_dput;
1da177e4
LT
241 }
242
765927b2
AV
243 path.mnt = parfilp->f_path.mnt;
244 path.dentry = dentry;
245 filp = dentry_open(&path, hreq->oflags, cred);
246 dput(dentry);
1da177e4 247 if (IS_ERR(filp)) {
d296d30a
CH
248 put_unused_fd(fd);
249 return PTR_ERR(filp);
1da177e4 250 }
4d4be482 251
03209378 252 if (S_ISREG(inode->i_mode)) {
2e2e7bb1 253 filp->f_flags |= O_NOATIME;
4d4be482 254 filp->f_mode |= FMODE_NOCMTIME;
2e2e7bb1 255 }
1da177e4 256
d296d30a
CH
257 fd_install(fd, filp);
258 return fd;
259
260 out_dput:
261 dput(dentry);
262 return error;
1da177e4
LT
263}
264
d5547f9f 265int
1da177e4 266xfs_readlink_by_handle(
d296d30a
CH
267 struct file *parfilp,
268 xfs_fsop_handlereq_t *hreq)
1da177e4 269{
d296d30a 270 struct dentry *dentry;
1da177e4 271 __u32 olen;
804c83c3 272 int error;
1da177e4
LT
273
274 if (!capable(CAP_SYS_ADMIN))
b474c7ae 275 return -EPERM;
1da177e4 276
d296d30a
CH
277 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
278 if (IS_ERR(dentry))
279 return PTR_ERR(dentry);
1da177e4
LT
280
281 /* Restrict this handle operation to symlinks only. */
fd4a0edf 282 if (!d_is_symlink(dentry)) {
b474c7ae 283 error = -EINVAL;
d296d30a 284 goto out_dput;
1da177e4
LT
285 }
286
743bb465 287 if (copy_from_user(&olen, hreq->ohandlen, sizeof(__u32))) {
b474c7ae 288 error = -EFAULT;
d296d30a 289 goto out_dput;
1da177e4 290 }
1da177e4 291
fd4a0edf 292 error = vfs_readlink(dentry, hreq->ohandle, olen);
67fcaa73 293
d296d30a
CH
294 out_dput:
295 dput(dentry);
804c83c3 296 return error;
1da177e4
LT
297}
298
3e7a7799
CH
299/*
300 * Format an attribute and copy it out to the user's buffer.
301 * Take care to check values and protect against them changing later,
302 * we may be reading them directly out of a user buffer.
303 */
304static void
305xfs_ioc_attr_put_listent(
306 struct xfs_attr_list_context *context,
307 int flags,
308 unsigned char *name,
309 int namelen,
310 int valuelen)
311{
312 struct xfs_attrlist *alist = context->buffer;
313 struct xfs_attrlist_ent *aep;
314 int arraytop;
315
316 ASSERT(!context->seen_enough);
317 ASSERT(context->count >= 0);
318 ASSERT(context->count < (ATTR_MAX_VALUELEN/8));
319 ASSERT(context->firstu >= sizeof(*alist));
320 ASSERT(context->firstu <= context->bufsize);
321
322 /*
323 * Only list entries in the right namespace.
324 */
d5f0f49a 325 if (context->attr_filter != (flags & XFS_ATTR_NSP_ONDISK_MASK))
3e7a7799
CH
326 return;
327
328 arraytop = sizeof(*alist) +
329 context->count * sizeof(alist->al_offset[0]);
330
331 /* decrement by the actual bytes used by the attr */
332 context->firstu -= round_up(offsetof(struct xfs_attrlist_ent, a_name) +
333 namelen + 1, sizeof(uint32_t));
334 if (context->firstu < arraytop) {
335 trace_xfs_attr_list_full(context);
336 alist->al_more = 1;
337 context->seen_enough = 1;
338 return;
339 }
340
341 aep = context->buffer + context->firstu;
342 aep->a_valuelen = valuelen;
343 memcpy(aep->a_name, name, namelen);
344 aep->a_name[namelen] = 0;
345 alist->al_offset[context->count++] = context->firstu;
346 alist->al_count = context->count;
347 trace_xfs_attr_list_add(context);
348}
349
d5f0f49a
CH
350static unsigned int
351xfs_attr_filter(
352 u32 ioc_flags)
353{
354 if (ioc_flags & XFS_IOC_ATTR_ROOT)
355 return XFS_ATTR_ROOT;
356 if (ioc_flags & XFS_IOC_ATTR_SECURE)
357 return XFS_ATTR_SECURE;
358 return 0;
359}
360
361static unsigned int
362xfs_attr_flags(
363 u32 ioc_flags)
364{
365 if (ioc_flags & XFS_IOC_ATTR_CREATE)
366 return XATTR_CREATE;
367 if (ioc_flags & XFS_IOC_ATTR_REPLACE)
368 return XATTR_REPLACE;
369 return 0;
370}
371
3e7a7799
CH
372int
373xfs_ioc_attr_list(
374 struct xfs_inode *dp,
eb241c74 375 void __user *ubuf,
6ed6356b 376 size_t bufsize,
3e7a7799 377 int flags,
53ac39fd 378 struct xfs_attrlist_cursor __user *ucursor)
3e7a7799 379{
e3a19cde 380 struct xfs_attr_list_context context = { };
3e7a7799 381 struct xfs_attrlist *alist;
eb241c74 382 void *buffer;
3e7a7799
CH
383 int error;
384
f6046319
CH
385 if (bufsize < sizeof(struct xfs_attrlist) ||
386 bufsize > XFS_XATTR_LIST_MAX)
387 return -EINVAL;
388
389 /*
390 * Reject flags, only allow namespaces.
391 */
d5f0f49a 392 if (flags & ~(XFS_IOC_ATTR_ROOT | XFS_IOC_ATTR_SECURE))
f6046319 393 return -EINVAL;
d5f0f49a 394 if (flags == (XFS_IOC_ATTR_ROOT | XFS_IOC_ATTR_SECURE))
f6046319
CH
395 return -EINVAL;
396
3e7a7799
CH
397 /*
398 * Validate the cursor.
399 */
e3a19cde 400 if (copy_from_user(&context.cursor, ucursor, sizeof(context.cursor)))
53ac39fd 401 return -EFAULT;
e3a19cde 402 if (context.cursor.pad1 || context.cursor.pad2)
3e7a7799 403 return -EINVAL;
e3a19cde
CH
404 if (!context.cursor.initted &&
405 (context.cursor.hashval || context.cursor.blkno ||
406 context.cursor.offset))
3e7a7799
CH
407 return -EINVAL;
408
8ca79df8 409 buffer = kvzalloc(bufsize, GFP_KERNEL);
eb241c74
CH
410 if (!buffer)
411 return -ENOMEM;
3e7a7799
CH
412
413 /*
414 * Initialize the output buffer.
415 */
3e7a7799 416 context.dp = dp;
3e7a7799 417 context.resynch = 1;
d5f0f49a 418 context.attr_filter = xfs_attr_filter(flags);
3e7a7799 419 context.buffer = buffer;
f311d771 420 context.bufsize = round_down(bufsize, sizeof(uint32_t));
3e7a7799
CH
421 context.firstu = context.bufsize;
422 context.put_listent = xfs_ioc_attr_put_listent;
423
424 alist = context.buffer;
425 alist->al_count = 0;
426 alist->al_more = 0;
427 alist->al_offset[0] = context.bufsize;
428
17e1dd83 429 error = xfs_attr_list(&context);
eb241c74
CH
430 if (error)
431 goto out_free;
432
53ac39fd 433 if (copy_to_user(ubuf, buffer, bufsize) ||
e3a19cde 434 copy_to_user(ucursor, &context.cursor, sizeof(context.cursor)))
eb241c74
CH
435 error = -EFAULT;
436out_free:
437 kmem_free(buffer);
3e7a7799
CH
438 return error;
439}
440
1da177e4
LT
441STATIC int
442xfs_attrlist_by_handle(
d296d30a 443 struct file *parfilp,
53ac39fd 444 struct xfs_fsop_attrlist_handlereq __user *p)
1da177e4 445{
53ac39fd 446 struct xfs_fsop_attrlist_handlereq al_hreq;
d296d30a 447 struct dentry *dentry;
53ac39fd 448 int error = -ENOMEM;
1da177e4
LT
449
450 if (!capable(CAP_SYS_ADMIN))
b474c7ae 451 return -EPERM;
53ac39fd 452 if (copy_from_user(&al_hreq, p, sizeof(al_hreq)))
b474c7ae 453 return -EFAULT;
90ad58a8 454
d296d30a
CH
455 dentry = xfs_handlereq_to_dentry(parfilp, &al_hreq.hreq);
456 if (IS_ERR(dentry))
457 return PTR_ERR(dentry);
1da177e4 458
eb241c74 459 error = xfs_ioc_attr_list(XFS_I(d_inode(dentry)), al_hreq.buffer,
53ac39fd 460 al_hreq.buflen, al_hreq.flags, &p->pos);
d296d30a
CH
461 dput(dentry);
462 return error;
1da177e4
LT
463}
464
d0ce6439 465static int
1da177e4 466xfs_attrmulti_attr_get(
739bfb2a 467 struct inode *inode,
a9273ca5
DC
468 unsigned char *name,
469 unsigned char __user *ubuf,
c8ce540d
DW
470 uint32_t *len,
471 uint32_t flags)
1da177e4 472{
e5171d7e
CH
473 struct xfs_da_args args = {
474 .dp = XFS_I(inode),
d5f0f49a
CH
475 .attr_filter = xfs_attr_filter(flags),
476 .attr_flags = xfs_attr_flags(flags),
e5171d7e
CH
477 .name = name,
478 .namelen = strlen(name),
479 .valuelen = *len,
480 };
481 int error;
e8b0ebaa 482
51fcbfe7 483 if (*len > XFS_XATTR_SIZE_MAX)
2451337d 484 return -EINVAL;
e5171d7e 485
e5171d7e 486 error = xfs_attr_get(&args);
1da177e4
LT
487 if (error)
488 goto out_kfree;
489
e5171d7e
CH
490 *len = args.valuelen;
491 if (copy_to_user(ubuf, args.value, args.valuelen))
2451337d 492 error = -EFAULT;
1da177e4 493
fdd3ccee 494out_kfree:
e5171d7e 495 kmem_free(args.value);
1da177e4
LT
496 return error;
497}
498
d0ce6439 499static int
1da177e4 500xfs_attrmulti_attr_set(
739bfb2a 501 struct inode *inode,
a9273ca5
DC
502 unsigned char *name,
503 const unsigned char __user *ubuf,
c8ce540d
DW
504 uint32_t len,
505 uint32_t flags)
1da177e4 506{
a2544622
CH
507 struct xfs_da_args args = {
508 .dp = XFS_I(inode),
d5f0f49a
CH
509 .attr_filter = xfs_attr_filter(flags),
510 .attr_flags = xfs_attr_flags(flags),
a2544622
CH
511 .name = name,
512 .namelen = strlen(name),
513 };
09cb22d2 514 int error;
1da177e4 515
739bfb2a 516 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 517 return -EPERM;
1da177e4 518
6cc4f4ff
CH
519 if (ubuf) {
520 if (len > XFS_XATTR_SIZE_MAX)
521 return -EINVAL;
a2544622
CH
522 args.value = memdup_user(ubuf, len);
523 if (IS_ERR(args.value))
524 return PTR_ERR(args.value);
525 args.valuelen = len;
6cc4f4ff 526 }
e8b0ebaa 527
efc2efeb 528 error = xfs_attr_change(&args);
d5f0f49a 529 if (!error && (flags & XFS_IOC_ATTR_ROOT))
5a3930e2 530 xfs_forget_acl(inode, name);
a2544622 531 kfree(args.value);
09cb22d2 532 return error;
1da177e4
LT
533}
534
d0ce6439
CH
535int
536xfs_ioc_attrmulti_one(
537 struct file *parfilp,
538 struct inode *inode,
539 uint32_t opcode,
540 void __user *uname,
541 void __user *value,
542 uint32_t *len,
543 uint32_t flags)
544{
545 unsigned char *name;
546 int error;
547
d5f0f49a 548 if ((flags & XFS_IOC_ATTR_ROOT) && (flags & XFS_IOC_ATTR_SECURE))
d0ce6439 549 return -EINVAL;
d0ce6439
CH
550
551 name = strndup_user(uname, MAXNAMELEN);
552 if (IS_ERR(name))
553 return PTR_ERR(name);
554
555 switch (opcode) {
556 case ATTR_OP_GET:
557 error = xfs_attrmulti_attr_get(inode, name, value, len, flags);
558 break;
559 case ATTR_OP_REMOVE:
560 value = NULL;
561 *len = 0;
53004ee7 562 fallthrough;
d0ce6439
CH
563 case ATTR_OP_SET:
564 error = mnt_want_write_file(parfilp);
565 if (error)
566 break;
567 error = xfs_attrmulti_attr_set(inode, name, value, *len, flags);
568 mnt_drop_write_file(parfilp);
569 break;
570 default:
571 error = -EINVAL;
572 break;
573 }
574
575 kfree(name);
576 return error;
577}
578
1da177e4
LT
579STATIC int
580xfs_attrmulti_by_handle(
42a74f20 581 struct file *parfilp,
d296d30a 582 void __user *arg)
1da177e4
LT
583{
584 int error;
585 xfs_attr_multiop_t *ops;
586 xfs_fsop_attrmulti_handlereq_t am_hreq;
d296d30a 587 struct dentry *dentry;
1da177e4 588 unsigned int i, size;
1da177e4
LT
589
590 if (!capable(CAP_SYS_ADMIN))
b474c7ae 591 return -EPERM;
1da177e4 592 if (copy_from_user(&am_hreq, arg, sizeof(xfs_fsop_attrmulti_handlereq_t)))
b474c7ae 593 return -EFAULT;
1da177e4 594
fda168c2
ZW
595 /* overflow check */
596 if (am_hreq.opcount >= INT_MAX / sizeof(xfs_attr_multiop_t))
597 return -E2BIG;
598
d296d30a
CH
599 dentry = xfs_handlereq_to_dentry(parfilp, &am_hreq.hreq);
600 if (IS_ERR(dentry))
601 return PTR_ERR(dentry);
1da177e4 602
2451337d 603 error = -E2BIG;
e182f57a 604 size = am_hreq.opcount * sizeof(xfs_attr_multiop_t);
1da177e4 605 if (!size || size > 16 * PAGE_SIZE)
d296d30a 606 goto out_dput;
1da177e4 607
0e639bde
LZ
608 ops = memdup_user(am_hreq.ops, size);
609 if (IS_ERR(ops)) {
2451337d 610 error = PTR_ERR(ops);
d296d30a 611 goto out_dput;
0e639bde 612 }
1da177e4 613
1da177e4
LT
614 error = 0;
615 for (i = 0; i < am_hreq.opcount; i++) {
d0ce6439
CH
616 ops[i].am_error = xfs_ioc_attrmulti_one(parfilp,
617 d_inode(dentry), ops[i].am_opcode,
618 ops[i].am_attrname, ops[i].am_attrvalue,
619 &ops[i].am_length, ops[i].am_flags);
1da177e4
LT
620 }
621
622 if (copy_to_user(am_hreq.ops, ops, size))
2451337d 623 error = -EFAULT;
1da177e4 624
1da177e4 625 kfree(ops);
d296d30a
CH
626 out_dput:
627 dput(dentry);
2451337d 628 return error;
1da177e4
LT
629}
630
2810bd68
DW
631/* Return 0 on success or positive error */
632int
8bfe9d18 633xfs_fsbulkstat_one_fmt(
7035f972
DW
634 struct xfs_ibulk *breq,
635 const struct xfs_bulkstat *bstat)
2810bd68 636{
7035f972
DW
637 struct xfs_bstat bs1;
638
639 xfs_bulkstat_to_bstat(breq->mp, &bs1, bstat);
640 if (copy_to_user(breq->ubuffer, &bs1, sizeof(bs1)))
2810bd68
DW
641 return -EFAULT;
642 return xfs_ibulk_advance(breq, sizeof(struct xfs_bstat));
643}
644
677717fb 645int
8bfe9d18 646xfs_fsinumbers_fmt(
5f19c7fc
DW
647 struct xfs_ibulk *breq,
648 const struct xfs_inumbers *igrp)
677717fb 649{
5f19c7fc
DW
650 struct xfs_inogrp ig1;
651
652 xfs_inumbers_to_inogrp(&ig1, igrp);
653 if (copy_to_user(breq->ubuffer, &ig1, sizeof(struct xfs_inogrp)))
677717fb
DW
654 return -EFAULT;
655 return xfs_ibulk_advance(breq, sizeof(struct xfs_inogrp));
656}
657
1da177e4 658STATIC int
8bfe9d18 659xfs_ioc_fsbulkstat(
f736d93d 660 struct file *file,
1da177e4
LT
661 unsigned int cmd,
662 void __user *arg)
663{
f736d93d 664 struct xfs_mount *mp = XFS_I(file_inode(file))->i_mount;
2810bd68
DW
665 struct xfs_fsop_bulkreq bulkreq;
666 struct xfs_ibulk breq = {
667 .mp = mp,
e67fe633 668 .idmap = file_mnt_idmap(file),
2810bd68
DW
669 .ocount = 0,
670 };
671 xfs_ino_t lastino;
1da177e4
LT
672 int error;
673
674 /* done = 1 if there are more stats to get and if bulkstat */
675 /* should be called again (unused here, but used in dmapi) */
676
677 if (!capable(CAP_SYS_ADMIN))
678 return -EPERM;
679
75c8c50f 680 if (xfs_is_shutdown(mp))
b474c7ae 681 return -EIO;
1da177e4 682
6f71fb68 683 if (copy_from_user(&bulkreq, arg, sizeof(struct xfs_fsop_bulkreq)))
b474c7ae 684 return -EFAULT;
1da177e4 685
2810bd68 686 if (copy_from_user(&lastino, bulkreq.lastip, sizeof(__s64)))
b474c7ae 687 return -EFAULT;
1da177e4 688
2810bd68 689 if (bulkreq.icount <= 0)
b474c7ae 690 return -EINVAL;
1da177e4 691
cd57e594 692 if (bulkreq.ubuffer == NULL)
b474c7ae 693 return -EINVAL;
cd57e594 694
2810bd68
DW
695 breq.ubuffer = bulkreq.ubuffer;
696 breq.icount = bulkreq.icount;
697
698 /*
699 * FSBULKSTAT_SINGLE expects that *lastip contains the inode number
700 * that we want to stat. However, FSINUMBERS and FSBULKSTAT expect
701 * that *lastip contains either zero or the number of the last inode to
702 * be examined by the previous call and return results starting with
703 * the next inode after that. The new bulk request back end functions
704 * take the inode to start with, so we have to compute the startino
705 * parameter from lastino to maintain correct function. lastino == 0
706 * is a special case because it has traditionally meant "first inode
707 * in filesystem".
708 */
709 if (cmd == XFS_IOC_FSINUMBERS) {
677717fb 710 breq.startino = lastino ? lastino + 1 : 0;
8bfe9d18 711 error = xfs_inumbers(&breq, xfs_fsinumbers_fmt);
677717fb 712 lastino = breq.startino - 1;
2810bd68
DW
713 } else if (cmd == XFS_IOC_FSBULKSTAT_SINGLE) {
714 breq.startino = lastino;
715 breq.icount = 1;
8bfe9d18 716 error = xfs_bulkstat_one(&breq, xfs_fsbulkstat_one_fmt);
2810bd68
DW
717 } else { /* XFS_IOC_FSBULKSTAT */
718 breq.startino = lastino ? lastino + 1 : 0;
8bfe9d18 719 error = xfs_bulkstat(&breq, xfs_fsbulkstat_one_fmt);
2810bd68
DW
720 lastino = breq.startino - 1;
721 }
1da177e4
LT
722
723 if (error)
2451337d 724 return error;
1da177e4 725
f16fe3ec 726 if (bulkreq.lastip != NULL &&
2810bd68 727 copy_to_user(bulkreq.lastip, &lastino, sizeof(xfs_ino_t)))
f16fe3ec 728 return -EFAULT;
1da177e4 729
f16fe3ec 730 if (bulkreq.ocount != NULL &&
2810bd68 731 copy_to_user(bulkreq.ocount, &breq.ocount, sizeof(__s32)))
f16fe3ec 732 return -EFAULT;
1da177e4
LT
733
734 return 0;
735}
736
0448b6f4
DW
737/* Return 0 on success or positive error */
738static int
739xfs_bulkstat_fmt(
740 struct xfs_ibulk *breq,
741 const struct xfs_bulkstat *bstat)
742{
743 if (copy_to_user(breq->ubuffer, bstat, sizeof(struct xfs_bulkstat)))
744 return -EFAULT;
745 return xfs_ibulk_advance(breq, sizeof(struct xfs_bulkstat));
746}
747
748/*
749 * Check the incoming bulk request @hdr from userspace and initialize the
750 * internal @breq bulk request appropriately. Returns 0 if the bulk request
e7ee96df 751 * should proceed; -ECANCELED if there's nothing to do; or the usual
0448b6f4
DW
752 * negative error code.
753 */
754static int
755xfs_bulk_ireq_setup(
756 struct xfs_mount *mp,
817644fa 757 const struct xfs_bulk_ireq *hdr,
0448b6f4
DW
758 struct xfs_ibulk *breq,
759 void __user *ubuffer)
760{
761 if (hdr->icount == 0 ||
762 (hdr->flags & ~XFS_BULK_IREQ_FLAGS_ALL) ||
0448b6f4
DW
763 memchr_inv(hdr->reserved, 0, sizeof(hdr->reserved)))
764 return -EINVAL;
765
766 breq->startino = hdr->ino;
767 breq->ubuffer = ubuffer;
768 breq->icount = hdr->icount;
769 breq->ocount = 0;
13d59a2a
DW
770 breq->flags = 0;
771
bf3cb394
DW
772 /*
773 * The @ino parameter is a special value, so we must look it up here.
774 * We're not allowed to have IREQ_AGNO, and we only return one inode
775 * worth of data.
776 */
777 if (hdr->flags & XFS_BULK_IREQ_SPECIAL) {
778 if (hdr->flags & XFS_BULK_IREQ_AGNO)
779 return -EINVAL;
780
781 switch (hdr->ino) {
782 case XFS_BULK_IREQ_SPECIAL_ROOT:
817644fa 783 breq->startino = mp->m_sb.sb_rootino;
bf3cb394
DW
784 break;
785 default:
786 return -EINVAL;
787 }
788 breq->icount = 1;
1da177e4
LT
789 }
790
13d59a2a
DW
791 /*
792 * The IREQ_AGNO flag means that we only want results from a given AG.
793 * If @hdr->ino is zero, we start iterating in that AG. If @hdr->ino is
794 * beyond the specified AG then we return no results.
795 */
796 if (hdr->flags & XFS_BULK_IREQ_AGNO) {
797 if (hdr->agno >= mp->m_sb.sb_agcount)
798 return -EINVAL;
799
800 if (breq->startino == 0)
801 breq->startino = XFS_AGINO_TO_INO(mp, hdr->agno, 0);
802 else if (XFS_INO_TO_AGNO(mp, breq->startino) < hdr->agno)
803 return -EINVAL;
804
805 breq->flags |= XFS_IBULK_SAME_AG;
806
807 /* Asking for an inode past the end of the AG? We're done! */
808 if (XFS_INO_TO_AGNO(mp, breq->startino) > hdr->agno)
e7ee96df 809 return -ECANCELED;
13d59a2a
DW
810 } else if (hdr->agno)
811 return -EINVAL;
0448b6f4
DW
812
813 /* Asking for an inode past the end of the FS? We're done! */
814 if (XFS_INO_TO_AGNO(mp, breq->startino) >= mp->m_sb.sb_agcount)
e7ee96df 815 return -ECANCELED;
0448b6f4 816
c3c4ecb5
CB
817 if (hdr->flags & XFS_BULK_IREQ_NREXT64)
818 breq->flags |= XFS_IBULK_NREXT64;
819
0448b6f4
DW
820 return 0;
821}
822
823/*
824 * Update the userspace bulk request @hdr to reflect the end state of the
825 * internal bulk request @breq.
826 */
827static void
828xfs_bulk_ireq_teardown(
829 struct xfs_bulk_ireq *hdr,
830 struct xfs_ibulk *breq)
831{
832 hdr->ino = breq->startino;
833 hdr->ocount = breq->ocount;
834}
835
836/* Handle the v5 bulkstat ioctl. */
837STATIC int
838xfs_ioc_bulkstat(
f736d93d 839 struct file *file,
0448b6f4
DW
840 unsigned int cmd,
841 struct xfs_bulkstat_req __user *arg)
842{
f736d93d 843 struct xfs_mount *mp = XFS_I(file_inode(file))->i_mount;
0448b6f4
DW
844 struct xfs_bulk_ireq hdr;
845 struct xfs_ibulk breq = {
846 .mp = mp,
e67fe633 847 .idmap = file_mnt_idmap(file),
0448b6f4
DW
848 };
849 int error;
850
851 if (!capable(CAP_SYS_ADMIN))
852 return -EPERM;
853
75c8c50f 854 if (xfs_is_shutdown(mp))
0448b6f4
DW
855 return -EIO;
856
857 if (copy_from_user(&hdr, &arg->hdr, sizeof(hdr)))
858 return -EFAULT;
859
860 error = xfs_bulk_ireq_setup(mp, &hdr, &breq, arg->bulkstat);
e7ee96df 861 if (error == -ECANCELED)
0448b6f4
DW
862 goto out_teardown;
863 if (error < 0)
864 return error;
865
866 error = xfs_bulkstat(&breq, xfs_bulkstat_fmt);
867 if (error)
868 return error;
869
870out_teardown:
871 xfs_bulk_ireq_teardown(&hdr, &breq);
872 if (copy_to_user(&arg->hdr, &hdr, sizeof(hdr)))
873 return -EFAULT;
874
875 return 0;
876}
877
fba9760a
DW
878STATIC int
879xfs_inumbers_fmt(
880 struct xfs_ibulk *breq,
881 const struct xfs_inumbers *igrp)
882{
883 if (copy_to_user(breq->ubuffer, igrp, sizeof(struct xfs_inumbers)))
884 return -EFAULT;
885 return xfs_ibulk_advance(breq, sizeof(struct xfs_inumbers));
886}
887
888/* Handle the v5 inumbers ioctl. */
889STATIC int
890xfs_ioc_inumbers(
891 struct xfs_mount *mp,
892 unsigned int cmd,
893 struct xfs_inumbers_req __user *arg)
894{
895 struct xfs_bulk_ireq hdr;
896 struct xfs_ibulk breq = {
897 .mp = mp,
898 };
899 int error;
900
901 if (!capable(CAP_SYS_ADMIN))
902 return -EPERM;
903
75c8c50f 904 if (xfs_is_shutdown(mp))
fba9760a
DW
905 return -EIO;
906
907 if (copy_from_user(&hdr, &arg->hdr, sizeof(hdr)))
908 return -EFAULT;
909
910 error = xfs_bulk_ireq_setup(mp, &hdr, &breq, arg->inumbers);
e7ee96df 911 if (error == -ECANCELED)
fba9760a
DW
912 goto out_teardown;
913 if (error < 0)
914 return error;
915
916 error = xfs_inumbers(&breq, xfs_inumbers_fmt);
917 if (error)
918 return error;
919
920out_teardown:
921 xfs_bulk_ireq_teardown(&hdr, &breq);
922 if (copy_to_user(&arg->hdr, &hdr, sizeof(hdr)))
923 return -EFAULT;
924
1da177e4
LT
925 return 0;
926}
927
1da177e4
LT
928STATIC int
929xfs_ioc_fsgeometry(
1b6d968d
DC
930 struct xfs_mount *mp,
931 void __user *arg,
932 int struct_version)
1da177e4 933{
1b6d968d
DC
934 struct xfs_fsop_geom fsgeo;
935 size_t len;
1da177e4 936
03288b19 937 xfs_fs_geometry(mp, &fsgeo, struct_version);
1da177e4 938
1b6d968d
DC
939 if (struct_version <= 3)
940 len = sizeof(struct xfs_fsop_geom_v1);
941 else if (struct_version == 4)
942 len = sizeof(struct xfs_fsop_geom_v4);
c23232d4
DW
943 else {
944 xfs_fsop_geom_health(mp, &fsgeo);
1b6d968d 945 len = sizeof(fsgeo);
c23232d4 946 }
1b6d968d
DC
947
948 if (copy_to_user(arg, &fsgeo, len))
b474c7ae 949 return -EFAULT;
1da177e4
LT
950 return 0;
951}
952
7cd5006b
DW
953STATIC int
954xfs_ioc_ag_geometry(
955 struct xfs_mount *mp,
956 void __user *arg)
957{
c6aee248 958 struct xfs_perag *pag;
7cd5006b
DW
959 struct xfs_ag_geometry ageo;
960 int error;
961
962 if (copy_from_user(&ageo, arg, sizeof(ageo)))
963 return -EFAULT;
76f17933
DW
964 if (ageo.ag_flags)
965 return -EINVAL;
966 if (memchr_inv(&ageo.ag_reserved, 0, sizeof(ageo.ag_reserved)))
967 return -EINVAL;
7cd5006b 968
c6aee248
DC
969 pag = xfs_perag_get(mp, ageo.ag_number);
970 if (!pag)
971 return -EINVAL;
972
973 error = xfs_ag_get_geometry(pag, &ageo);
974 xfs_perag_put(pag);
7cd5006b
DW
975 if (error)
976 return error;
977
978 if (copy_to_user(arg, &ageo, sizeof(ageo)))
979 return -EFAULT;
980 return 0;
981}
982
1da177e4
LT
983/*
984 * Linux extended inode flags interface.
985 */
1da177e4 986
7b0e492e
DW
987static void
988xfs_fill_fsxattr(
989 struct xfs_inode *ip,
9fefd5db
MS
990 int whichfork,
991 struct fileattr *fa)
c83bfab1 992{
4800887b 993 struct xfs_mount *mp = ip->i_mount;
732436ef 994 struct xfs_ifork *ifp = xfs_ifork_ptr(ip, whichfork);
daf83964 995
9fefd5db 996 fileattr_fill_xflags(fa, xfs_ip2xflags(ip));
4800887b 997
5aa5b278
DW
998 if (ip->i_diflags & XFS_DIFLAG_EXTSIZE) {
999 fa->fsx_extsize = XFS_FSB_TO_B(mp, ip->i_extsize);
1000 } else if (ip->i_diflags & XFS_DIFLAG_EXTSZINHERIT) {
1001 /*
1002 * Don't let a misaligned extent size hint on a directory
1003 * escape to userspace if it won't pass the setattr checks
1004 * later.
1005 */
1006 if ((ip->i_diflags & XFS_DIFLAG_RTINHERIT) &&
1007 ip->i_extsize % mp->m_sb.sb_rextsize > 0) {
1008 fa->fsx_xflags &= ~(FS_XFLAG_EXTSIZE |
1009 FS_XFLAG_EXTSZINHERIT);
1010 fa->fsx_extsize = 0;
1011 } else {
1012 fa->fsx_extsize = XFS_FSB_TO_B(mp, ip->i_extsize);
1013 }
1014 }
1015
3e09ab8f 1016 if (ip->i_diflags2 & XFS_DIFLAG2_COWEXTSIZE)
ee7b83fd 1017 fa->fsx_cowextsize = XFS_FSB_TO_B(mp, ip->i_cowextsize);
ceaf603c 1018 fa->fsx_projid = ip->i_projid;
b2197a36 1019 if (ifp && !xfs_need_iread_extents(ifp))
daf83964
CH
1020 fa->fsx_nextents = xfs_iext_count(ifp);
1021 else
1022 fa->fsx_nextents = xfs_ifork_nextents(ifp);
7b0e492e
DW
1023}
1024
1025STATIC int
9fefd5db 1026xfs_ioc_fsgetxattra(
7b0e492e 1027 xfs_inode_t *ip,
7b0e492e
DW
1028 void __user *arg)
1029{
9fefd5db 1030 struct fileattr fa;
7b0e492e
DW
1031
1032 xfs_ilock(ip, XFS_ILOCK_SHARED);
9fefd5db
MS
1033 xfs_fill_fsxattr(ip, XFS_ATTR_FORK, &fa);
1034 xfs_iunlock(ip, XFS_ILOCK_SHARED);
1035
1036 return copy_fsxattr_to_user(&fa, arg);
1037}
1038
1039int
1040xfs_fileattr_get(
1041 struct dentry *dentry,
1042 struct fileattr *fa)
1043{
1044 struct xfs_inode *ip = XFS_I(d_inode(dentry));
1045
1046 if (d_is_special(dentry))
1047 return -ENOTTY;
1048
1049 xfs_ilock(ip, XFS_ILOCK_SHARED);
1050 xfs_fill_fsxattr(ip, XFS_DATA_FORK, fa);
c83bfab1
CH
1051 xfs_iunlock(ip, XFS_ILOCK_SHARED);
1052
c83bfab1
CH
1053 return 0;
1054}
1055
dd60687e
CH
1056STATIC uint16_t
1057xfs_flags2diflags(
25fe55e8
CH
1058 struct xfs_inode *ip,
1059 unsigned int xflags)
1060{
25fe55e8 1061 /* can't set PREALLOC this way, just preserve it */
dd60687e 1062 uint16_t di_flags =
db07349d 1063 (ip->i_diflags & XFS_DIFLAG_PREALLOC);
dd60687e 1064
e7b89481 1065 if (xflags & FS_XFLAG_IMMUTABLE)
25fe55e8 1066 di_flags |= XFS_DIFLAG_IMMUTABLE;
e7b89481 1067 if (xflags & FS_XFLAG_APPEND)
25fe55e8 1068 di_flags |= XFS_DIFLAG_APPEND;
e7b89481 1069 if (xflags & FS_XFLAG_SYNC)
25fe55e8 1070 di_flags |= XFS_DIFLAG_SYNC;
e7b89481 1071 if (xflags & FS_XFLAG_NOATIME)
25fe55e8 1072 di_flags |= XFS_DIFLAG_NOATIME;
e7b89481 1073 if (xflags & FS_XFLAG_NODUMP)
25fe55e8 1074 di_flags |= XFS_DIFLAG_NODUMP;
e7b89481 1075 if (xflags & FS_XFLAG_NODEFRAG)
25fe55e8 1076 di_flags |= XFS_DIFLAG_NODEFRAG;
e7b89481 1077 if (xflags & FS_XFLAG_FILESTREAM)
25fe55e8 1078 di_flags |= XFS_DIFLAG_FILESTREAM;
c19b3b05 1079 if (S_ISDIR(VFS_I(ip)->i_mode)) {
e7b89481 1080 if (xflags & FS_XFLAG_RTINHERIT)
25fe55e8 1081 di_flags |= XFS_DIFLAG_RTINHERIT;
e7b89481 1082 if (xflags & FS_XFLAG_NOSYMLINKS)
25fe55e8 1083 di_flags |= XFS_DIFLAG_NOSYMLINKS;
e7b89481 1084 if (xflags & FS_XFLAG_EXTSZINHERIT)
25fe55e8 1085 di_flags |= XFS_DIFLAG_EXTSZINHERIT;
e7b89481 1086 if (xflags & FS_XFLAG_PROJINHERIT)
9336e3a7 1087 di_flags |= XFS_DIFLAG_PROJINHERIT;
c19b3b05 1088 } else if (S_ISREG(VFS_I(ip)->i_mode)) {
e7b89481 1089 if (xflags & FS_XFLAG_REALTIME)
25fe55e8 1090 di_flags |= XFS_DIFLAG_REALTIME;
e7b89481 1091 if (xflags & FS_XFLAG_EXTSIZE)
25fe55e8
CH
1092 di_flags |= XFS_DIFLAG_EXTSIZE;
1093 }
58f88ca2 1094
dd60687e
CH
1095 return di_flags;
1096}
1097
1098STATIC uint64_t
1099xfs_flags2diflags2(
1100 struct xfs_inode *ip,
1101 unsigned int xflags)
1102{
1103 uint64_t di_flags2 =
3e09ab8f 1104 (ip->i_diflags2 & (XFS_DIFLAG2_REFLINK |
e89ab76d
DW
1105 XFS_DIFLAG2_BIGTIME |
1106 XFS_DIFLAG2_NREXT64));
58f88ca2 1107
58f88ca2
DC
1108 if (xflags & FS_XFLAG_DAX)
1109 di_flags2 |= XFS_DIFLAG2_DAX;
f7ca3522
DW
1110 if (xflags & FS_XFLAG_COWEXTSIZE)
1111 di_flags2 |= XFS_DIFLAG2_COWEXTSIZE;
58f88ca2 1112
dd60687e 1113 return di_flags2;
25fe55e8
CH
1114}
1115
29a17c00
DC
1116static int
1117xfs_ioctl_setattr_xflags(
1118 struct xfs_trans *tp,
1119 struct xfs_inode *ip,
9fefd5db 1120 struct fileattr *fa)
29a17c00
DC
1121{
1122 struct xfs_mount *mp = ip->i_mount;
3e09ab8f 1123 uint64_t i_flags2;
29a17c00
DC
1124
1125 /* Can't change realtime flag if any extents are allocated. */
daf83964 1126 if ((ip->i_df.if_nextents || ip->i_delayed_blks) &&
e7b89481 1127 XFS_IS_REALTIME_INODE(ip) != (fa->fsx_xflags & FS_XFLAG_REALTIME))
29a17c00
DC
1128 return -EINVAL;
1129
1130 /* If realtime flag is set then must have realtime device */
e7b89481 1131 if (fa->fsx_xflags & FS_XFLAG_REALTIME) {
29a17c00 1132 if (mp->m_sb.sb_rblocks == 0 || mp->m_sb.sb_rextsize == 0 ||
031474c2 1133 (ip->i_extsize % mp->m_sb.sb_rextsize))
29a17c00
DC
1134 return -EINVAL;
1135 }
1136
1987fd74 1137 /* Clear reflink if we are actually able to set the rt flag. */
c8e156ac 1138 if ((fa->fsx_xflags & FS_XFLAG_REALTIME) && xfs_is_reflink_inode(ip))
3e09ab8f 1139 ip->i_diflags2 &= ~XFS_DIFLAG2_REFLINK;
c8e156ac 1140
dd60687e 1141 /* diflags2 only valid for v3 inodes. */
3e09ab8f 1142 i_flags2 = xfs_flags2diflags2(ip, fa->fsx_xflags);
38c26bfd 1143 if (i_flags2 && !xfs_has_v3inodes(mp))
dd60687e
CH
1144 return -EINVAL;
1145
db07349d 1146 ip->i_diflags = xfs_flags2diflags(ip, fa->fsx_xflags);
3e09ab8f 1147 ip->i_diflags2 = i_flags2;
dd60687e 1148
840d493d 1149 xfs_diflags_to_iflags(ip, false);
29a17c00
DC
1150 xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG);
1151 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
ff6d6af2 1152 XFS_STATS_INC(mp, xs_ig_attrchg);
29a17c00
DC
1153 return 0;
1154}
1155
e4f9ba20
IW
1156static void
1157xfs_ioctl_setattr_prepare_dax(
3a6a854a 1158 struct xfs_inode *ip,
9fefd5db 1159 struct fileattr *fa)
3a6a854a 1160{
e4f9ba20
IW
1161 struct xfs_mount *mp = ip->i_mount;
1162 struct inode *inode = VFS_I(ip);
3a6a854a 1163
aaacdd25 1164 if (S_ISDIR(inode->i_mode))
e4f9ba20 1165 return;
3a6a854a 1166
0560f31a 1167 if (xfs_has_dax_always(mp) || xfs_has_dax_never(mp))
e4f9ba20 1168 return;
3a6a854a 1169
e4f9ba20 1170 if (((fa->fsx_xflags & FS_XFLAG_DAX) &&
3e09ab8f 1171 !(ip->i_diflags2 & XFS_DIFLAG2_DAX)) ||
e4f9ba20 1172 (!(fa->fsx_xflags & FS_XFLAG_DAX) &&
3e09ab8f 1173 (ip->i_diflags2 & XFS_DIFLAG2_DAX)))
e4f9ba20 1174 d_mark_dontcache(inode);
29a17c00
DC
1175}
1176
8f3d17ab
DC
1177/*
1178 * Set up the transaction structure for the setattr operation, checking that we
1179 * have permission to do so. On success, return a clean transaction and the
1180 * inode locked exclusively ready for further operation specific checks. On
1181 * failure, return an error without modifying or locking the inode.
1182 */
1183static struct xfs_trans *
1184xfs_ioctl_setattr_get_trans(
9fefd5db 1185 struct xfs_inode *ip,
7317a03d 1186 struct xfs_dquot *pdqp)
8f3d17ab
DC
1187{
1188 struct xfs_mount *mp = ip->i_mount;
1189 struct xfs_trans *tp;
3a6a854a 1190 int error = -EROFS;
8f3d17ab 1191
2e973b2c 1192 if (xfs_is_readonly(mp))
7317a03d 1193 goto out_error;
3a6a854a 1194 error = -EIO;
75c8c50f 1195 if (xfs_is_shutdown(mp))
7317a03d 1196 goto out_error;
8f3d17ab 1197
7317a03d 1198 error = xfs_trans_alloc_ichange(ip, NULL, NULL, pdqp,
eba0549b 1199 has_capability_noaudit(current, CAP_FOWNER), &tp);
8f3d17ab 1200 if (error)
7317a03d 1201 goto out_error;
8f3d17ab 1202
0560f31a 1203 if (xfs_has_wsync(mp))
8f3d17ab
DC
1204 xfs_trans_set_sync(tp);
1205
1206 return tp;
1207
7317a03d 1208out_error:
8f3d17ab
DC
1209 return ERR_PTR(error);
1210}
1211
9b94fcc3 1212/*
6b69e485
DW
1213 * Validate a proposed extent size hint. For regular files, the hint can only
1214 * be changed if no extents are allocated.
9b94fcc3 1215 */
f92090e9 1216static int
d4388d3c
DC
1217xfs_ioctl_setattr_check_extsize(
1218 struct xfs_inode *ip,
9fefd5db 1219 struct fileattr *fa)
d4388d3c
DC
1220{
1221 struct xfs_mount *mp = ip->i_mount;
6b69e485
DW
1222 xfs_failaddr_t failaddr;
1223 uint16_t new_diflags;
9b94fcc3 1224
9fefd5db
MS
1225 if (!fa->fsx_valid)
1226 return 0;
1227
daf83964 1228 if (S_ISREG(VFS_I(ip)->i_mode) && ip->i_df.if_nextents &&
6b69e485 1229 XFS_FSB_TO_B(mp, ip->i_extsize) != fa->fsx_extsize)
d4388d3c
DC
1230 return -EINVAL;
1231
6b69e485 1232 if (fa->fsx_extsize & mp->m_blockmask)
ca29be75 1233 return -EINVAL;
d4388d3c 1234
6b69e485 1235 new_diflags = xfs_flags2diflags(ip, fa->fsx_xflags);
9b94fcc3 1236
603f000b 1237 /*
83193e5e
DW
1238 * Inode verifiers do not check that the extent size hint is an integer
1239 * multiple of the rt extent size on a directory with both rtinherit
1240 * and extszinherit flags set. Don't let sysadmins misconfigure
1241 * directories.
603f000b
DW
1242 */
1243 if ((new_diflags & XFS_DIFLAG_RTINHERIT) &&
1244 (new_diflags & XFS_DIFLAG_EXTSZINHERIT)) {
1245 unsigned int rtextsize_bytes;
1246
1247 rtextsize_bytes = XFS_FSB_TO_B(mp, mp->m_sb.sb_rextsize);
1248 if (fa->fsx_extsize % rtextsize_bytes)
1249 return -EINVAL;
1250 }
1251
6b69e485
DW
1252 failaddr = xfs_inode_validate_extsize(ip->i_mount,
1253 XFS_B_TO_FSB(mp, fa->fsx_extsize),
1254 VFS_I(ip)->i_mode, new_diflags);
1255 return failaddr != NULL ? -EINVAL : 0;
d4388d3c
DC
1256}
1257
f7ca3522
DW
1258static int
1259xfs_ioctl_setattr_check_cowextsize(
1260 struct xfs_inode *ip,
9fefd5db 1261 struct fileattr *fa)
f7ca3522
DW
1262{
1263 struct xfs_mount *mp = ip->i_mount;
6b69e485
DW
1264 xfs_failaddr_t failaddr;
1265 uint64_t new_diflags2;
1266 uint16_t new_diflags;
f7ca3522 1267
9fefd5db
MS
1268 if (!fa->fsx_valid)
1269 return 0;
1270
6b69e485 1271 if (fa->fsx_cowextsize & mp->m_blockmask)
ca29be75 1272 return -EINVAL;
f7ca3522 1273
6b69e485
DW
1274 new_diflags = xfs_flags2diflags(ip, fa->fsx_xflags);
1275 new_diflags2 = xfs_flags2diflags2(ip, fa->fsx_xflags);
f7ca3522 1276
6b69e485
DW
1277 failaddr = xfs_inode_validate_cowextsize(ip->i_mount,
1278 XFS_B_TO_FSB(mp, fa->fsx_cowextsize),
1279 VFS_I(ip)->i_mode, new_diflags, new_diflags2);
1280 return failaddr != NULL ? -EINVAL : 0;
f7ca3522
DW
1281}
1282
f92090e9 1283static int
23bd0735
DC
1284xfs_ioctl_setattr_check_projid(
1285 struct xfs_inode *ip,
9fefd5db 1286 struct fileattr *fa)
23bd0735 1287{
9fefd5db
MS
1288 if (!fa->fsx_valid)
1289 return 0;
1290
38c26bfd 1291 /* Disallow 32bit project ids if 32bit IDs are not enabled. */
c8ce540d 1292 if (fa->fsx_projid > (uint16_t)-1 &&
38c26bfd 1293 !xfs_has_projid32(ip->i_mount))
23bd0735 1294 return -EINVAL;
23bd0735
DC
1295 return 0;
1296}
25fe55e8 1297
9fefd5db
MS
1298int
1299xfs_fileattr_set(
8782a9ae 1300 struct mnt_idmap *idmap,
9fefd5db
MS
1301 struct dentry *dentry,
1302 struct fileattr *fa)
25fe55e8 1303{
9fefd5db 1304 struct xfs_inode *ip = XFS_I(d_inode(dentry));
25fe55e8
CH
1305 struct xfs_mount *mp = ip->i_mount;
1306 struct xfs_trans *tp;
92f8ff73 1307 struct xfs_dquot *pdqp = NULL;
25fe55e8 1308 struct xfs_dquot *olddquot = NULL;
fea7aae6 1309 int error;
25fe55e8 1310
cca28fb8 1311 trace_xfs_ioctl_setattr(ip);
25fe55e8 1312
9fefd5db
MS
1313 if (d_is_special(dentry))
1314 return -ENOTTY;
1315
1316 if (!fa->fsx_valid) {
1317 if (fa->flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL |
1318 FS_NOATIME_FL | FS_NODUMP_FL |
1319 FS_SYNC_FL | FS_DAX_FL | FS_PROJINHERIT_FL))
1320 return -EOPNOTSUPP;
1321 }
1322
fea7aae6
DW
1323 error = xfs_ioctl_setattr_check_projid(ip, fa);
1324 if (error)
1325 return error;
23963e54 1326
25fe55e8
CH
1327 /*
1328 * If disk quotas is on, we make sure that the dquots do exist on disk,
1329 * before we start any other transactions. Trying to do this later
1330 * is messy. We don't care to take a readlock to look at the ids
1331 * in inode here, because we can't hold it across the trans_reserve.
1332 * If the IDs do change before we take the ilock, we're covered
1333 * because the i_*dquot fields will get updated anyway.
1334 */
9fefd5db 1335 if (fa->fsx_valid && XFS_IS_QUOTA_ON(mp)) {
fea7aae6 1336 error = xfs_qm_vop_dqalloc(ip, VFS_I(ip)->i_uid,
54295159 1337 VFS_I(ip)->i_gid, fa->fsx_projid,
ea1c9040 1338 XFS_QMOPT_PQUOTA, NULL, NULL, &pdqp);
fea7aae6
DW
1339 if (error)
1340 return error;
25fe55e8
CH
1341 }
1342
e4f9ba20 1343 xfs_ioctl_setattr_prepare_dax(ip, fa);
3a6a854a 1344
9fefd5db 1345 tp = xfs_ioctl_setattr_get_trans(ip, pdqp);
8f3d17ab 1346 if (IS_ERR(tp)) {
fea7aae6 1347 error = PTR_ERR(tp);
8f3d17ab 1348 goto error_free_dquots;
25fe55e8
CH
1349 }
1350
fea7aae6
DW
1351 error = xfs_ioctl_setattr_check_extsize(ip, fa);
1352 if (error)
d4388d3c 1353 goto error_trans_cancel;
25fe55e8 1354
fea7aae6
DW
1355 error = xfs_ioctl_setattr_check_cowextsize(ip, fa);
1356 if (error)
f7ca3522
DW
1357 goto error_trans_cancel;
1358
fea7aae6
DW
1359 error = xfs_ioctl_setattr_xflags(tp, ip, fa);
1360 if (error)
d4388d3c 1361 goto error_trans_cancel;
25fe55e8 1362
9fefd5db
MS
1363 if (!fa->fsx_valid)
1364 goto skip_xattr;
25fe55e8 1365 /*
fd179b9c
DC
1366 * Change file ownership. Must be the owner or privileged. CAP_FSETID
1367 * overrides the following restrictions:
1368 *
1369 * The set-user-ID and set-group-ID bits of a file will be cleared upon
1370 * successful return from chown()
25fe55e8 1371 */
25fe55e8 1372
c19b3b05 1373 if ((VFS_I(ip)->i_mode & (S_ISUID|S_ISGID)) &&
9452e93e 1374 !capable_wrt_inode_uidgid(idmap, VFS_I(ip), CAP_FSETID))
c19b3b05 1375 VFS_I(ip)->i_mode &= ~(S_ISUID|S_ISGID);
25fe55e8 1376
fd179b9c 1377 /* Change the ownerships and register project quota modifications */
ceaf603c 1378 if (ip->i_projid != fa->fsx_projid) {
149e53af 1379 if (XFS_IS_PQUOTA_ON(mp)) {
fd179b9c
DC
1380 olddquot = xfs_qm_vop_chown(tp, ip,
1381 &ip->i_pdquot, pdqp);
1382 }
ceaf603c 1383 ip->i_projid = fa->fsx_projid;
f13fae2d 1384 }
25fe55e8 1385
a872703f
DC
1386 /*
1387 * Only set the extent size hint if we've already determined that the
1388 * extent size hint should be set on the inode. If no extent size flags
1389 * are set on the inode then unconditionally clear the extent size hint.
1390 */
db07349d 1391 if (ip->i_diflags & (XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT))
b231b122 1392 ip->i_extsize = XFS_B_TO_FSB(mp, fa->fsx_extsize);
f7ca3522 1393 else
031474c2 1394 ip->i_extsize = 0;
ee7b83fd 1395
38c26bfd 1396 if (xfs_has_v3inodes(mp)) {
3e09ab8f 1397 if (ip->i_diflags2 & XFS_DIFLAG2_COWEXTSIZE)
ee7b83fd
CH
1398 ip->i_cowextsize = XFS_B_TO_FSB(mp, fa->fsx_cowextsize);
1399 else
1400 ip->i_cowextsize = 0;
1401 }
25fe55e8 1402
9fefd5db 1403skip_xattr:
fea7aae6 1404 error = xfs_trans_commit(tp);
25fe55e8
CH
1405
1406 /*
1407 * Release any dquot(s) the inode had kept before chown.
1408 */
7d095257 1409 xfs_qm_dqrele(olddquot);
92f8ff73 1410 xfs_qm_dqrele(pdqp);
25fe55e8 1411
fea7aae6 1412 return error;
25fe55e8 1413
d4388d3c 1414error_trans_cancel:
4906e215 1415 xfs_trans_cancel(tp);
8f3d17ab 1416error_free_dquots:
92f8ff73 1417 xfs_qm_dqrele(pdqp);
fea7aae6 1418 return error;
25fe55e8
CH
1419}
1420
232b5194
CH
1421static bool
1422xfs_getbmap_format(
1423 struct kgetbmap *p,
1424 struct getbmapx __user *u,
1425 size_t recsize)
8a7141a8 1426{
232b5194
CH
1427 if (put_user(p->bmv_offset, &u->bmv_offset) ||
1428 put_user(p->bmv_block, &u->bmv_block) ||
1429 put_user(p->bmv_length, &u->bmv_length) ||
1430 put_user(0, &u->bmv_count) ||
1431 put_user(0, &u->bmv_entries))
1432 return false;
1433 if (recsize < sizeof(struct getbmapx))
1434 return true;
1435 if (put_user(0, &u->bmv_iflags) ||
1436 put_user(p->bmv_oflags, &u->bmv_oflags) ||
1437 put_user(0, &u->bmv_unused1) ||
1438 put_user(0, &u->bmv_unused2))
1439 return false;
1440 return true;
8a7141a8
ES
1441}
1442
1da177e4
LT
1443STATIC int
1444xfs_ioc_getbmap(
8f3e2058 1445 struct file *file,
1da177e4
LT
1446 unsigned int cmd,
1447 void __user *arg)
1448{
be6324c0 1449 struct getbmapx bmx = { 0 };
232b5194
CH
1450 struct kgetbmap *buf;
1451 size_t recsize;
1452 int error, i;
1da177e4 1453
232b5194
CH
1454 switch (cmd) {
1455 case XFS_IOC_GETBMAPA:
1456 bmx.bmv_iflags = BMV_IF_ATTRFORK;
53004ee7 1457 fallthrough;
232b5194 1458 case XFS_IOC_GETBMAP:
232b5194
CH
1459 /* struct getbmap is a strict subset of struct getbmapx. */
1460 recsize = sizeof(struct getbmap);
1461 break;
1462 case XFS_IOC_GETBMAPX:
1463 recsize = sizeof(struct getbmapx);
1464 break;
1465 default:
b474c7ae 1466 return -EINVAL;
232b5194 1467 }
1da177e4 1468
232b5194 1469 if (copy_from_user(&bmx, arg, recsize))
b474c7ae 1470 return -EFAULT;
1da177e4
LT
1471
1472 if (bmx.bmv_count < 2)
b474c7ae 1473 return -EINVAL;
29d650f7 1474 if (bmx.bmv_count >= INT_MAX / recsize)
232b5194 1475 return -ENOMEM;
1da177e4 1476
c2e4e3b7 1477 buf = kvcalloc(bmx.bmv_count, sizeof(*buf), GFP_KERNEL);
232b5194
CH
1478 if (!buf)
1479 return -ENOMEM;
1da177e4 1480
232b5194 1481 error = xfs_getbmap(XFS_I(file_inode(file)), &bmx, buf);
1da177e4 1482 if (error)
232b5194 1483 goto out_free_buf;
1da177e4 1484
232b5194
CH
1485 error = -EFAULT;
1486 if (copy_to_user(arg, &bmx, recsize))
1487 goto out_free_buf;
1488 arg += recsize;
1489
1490 for (i = 0; i < bmx.bmv_entries; i++) {
1491 if (!xfs_getbmap_format(buf + i, arg, recsize))
1492 goto out_free_buf;
1493 arg += recsize;
1494 }
1da177e4 1495
232b5194
CH
1496 error = 0;
1497out_free_buf:
1498 kmem_free(buf);
132bf672 1499 return error;
1da177e4 1500}
df26cfe8 1501
e89c0413
DW
1502STATIC int
1503xfs_ioc_getfsmap(
1504 struct xfs_inode *ip,
9d17e14c 1505 struct fsmap_head __user *arg)
e89c0413 1506{
e89c0413
DW
1507 struct xfs_fsmap_head xhead = {0};
1508 struct fsmap_head head;
8ffa90e1
DW
1509 struct fsmap *recs;
1510 unsigned int count;
1511 __u32 last_flags = 0;
1512 bool done = false;
e89c0413
DW
1513 int error;
1514
1515 if (copy_from_user(&head, arg, sizeof(struct fsmap_head)))
1516 return -EFAULT;
1517 if (memchr_inv(head.fmh_reserved, 0, sizeof(head.fmh_reserved)) ||
1518 memchr_inv(head.fmh_keys[0].fmr_reserved, 0,
1519 sizeof(head.fmh_keys[0].fmr_reserved)) ||
1520 memchr_inv(head.fmh_keys[1].fmr_reserved, 0,
1521 sizeof(head.fmh_keys[1].fmr_reserved)))
1522 return -EINVAL;
1523
8ffa90e1
DW
1524 /*
1525 * Use an internal memory buffer so that we don't have to copy fsmap
1526 * data to userspace while holding locks. Start by trying to allocate
1527 * up to 128k for the buffer, but fall back to a single page if needed.
1528 */
1529 count = min_t(unsigned int, head.fmh_count,
1530 131072 / sizeof(struct fsmap));
c2e4e3b7 1531 recs = kvcalloc(count, sizeof(struct fsmap), GFP_KERNEL);
8ffa90e1
DW
1532 if (!recs) {
1533 count = min_t(unsigned int, head.fmh_count,
1534 PAGE_SIZE / sizeof(struct fsmap));
c2e4e3b7 1535 recs = kvcalloc(count, sizeof(struct fsmap), GFP_KERNEL);
8ffa90e1
DW
1536 if (!recs)
1537 return -ENOMEM;
1538 }
1539
e89c0413 1540 xhead.fmh_iflags = head.fmh_iflags;
e89c0413
DW
1541 xfs_fsmap_to_internal(&xhead.fmh_keys[0], &head.fmh_keys[0]);
1542 xfs_fsmap_to_internal(&xhead.fmh_keys[1], &head.fmh_keys[1]);
1543
1544 trace_xfs_getfsmap_low_key(ip->i_mount, &xhead.fmh_keys[0]);
1545 trace_xfs_getfsmap_high_key(ip->i_mount, &xhead.fmh_keys[1]);
1546
8ffa90e1
DW
1547 head.fmh_entries = 0;
1548 do {
1549 struct fsmap __user *user_recs;
1550 struct fsmap *last_rec;
1551
1552 user_recs = &arg->fmh_recs[head.fmh_entries];
1553 xhead.fmh_entries = 0;
1554 xhead.fmh_count = min_t(unsigned int, count,
1555 head.fmh_count - head.fmh_entries);
1556
1557 /* Run query, record how many entries we got. */
1558 error = xfs_getfsmap(ip->i_mount, &xhead, recs);
1559 switch (error) {
1560 case 0:
1561 /*
1562 * There are no more records in the result set. Copy
1563 * whatever we got to userspace and break out.
1564 */
1565 done = true;
1566 break;
1567 case -ECANCELED:
1568 /*
1569 * The internal memory buffer is full. Copy whatever
1570 * records we got to userspace and go again if we have
1571 * not yet filled the userspace buffer.
1572 */
1573 error = 0;
1574 break;
1575 default:
1576 goto out_free;
1577 }
1578 head.fmh_entries += xhead.fmh_entries;
1579 head.fmh_oflags = xhead.fmh_oflags;
e89c0413 1580
8ffa90e1
DW
1581 /*
1582 * If the caller wanted a record count or there aren't any
1583 * new records to return, we're done.
1584 */
1585 if (head.fmh_count == 0 || xhead.fmh_entries == 0)
1586 break;
1587
1588 /* Copy all the records we got out to userspace. */
1589 if (copy_to_user(user_recs, recs,
1590 xhead.fmh_entries * sizeof(struct fsmap))) {
1591 error = -EFAULT;
1592 goto out_free;
1593 }
1594
1595 /* Remember the last record flags we copied to userspace. */
1596 last_rec = &recs[xhead.fmh_entries - 1];
1597 last_flags = last_rec->fmr_flags;
1598
1599 /* Set up the low key for the next iteration. */
1600 xfs_fsmap_to_internal(&xhead.fmh_keys[0], last_rec);
1601 trace_xfs_getfsmap_low_key(ip->i_mount, &xhead.fmh_keys[0]);
1602 } while (!done && head.fmh_entries < head.fmh_count);
1603
1604 /*
1605 * If there are no more records in the query result set and we're not
1606 * in counting mode, mark the last record returned with the LAST flag.
1607 */
1608 if (done && head.fmh_count > 0 && head.fmh_entries > 0) {
1609 struct fsmap __user *user_rec;
1610
1611 last_flags |= FMR_OF_LAST;
1612 user_rec = &arg->fmh_recs[head.fmh_entries - 1];
1613
1614 if (copy_to_user(&user_rec->fmr_flags, &last_flags,
1615 sizeof(last_flags))) {
1616 error = -EFAULT;
1617 goto out_free;
1618 }
e89c0413
DW
1619 }
1620
1621 /* copy back header */
8ffa90e1
DW
1622 if (copy_to_user(arg, &head, sizeof(struct fsmap_head))) {
1623 error = -EFAULT;
1624 goto out_free;
1625 }
e89c0413 1626
8ffa90e1
DW
1627out_free:
1628 kmem_free(recs);
1629 return error;
e89c0413
DW
1630}
1631
36fd6e86
DW
1632STATIC int
1633xfs_ioc_scrub_metadata(
71bddbcc 1634 struct file *file,
36fd6e86
DW
1635 void __user *arg)
1636{
1637 struct xfs_scrub_metadata scrub;
1638 int error;
1639
1640 if (!capable(CAP_SYS_ADMIN))
1641 return -EPERM;
1642
1643 if (copy_from_user(&scrub, arg, sizeof(scrub)))
1644 return -EFAULT;
1645
71bddbcc 1646 error = xfs_scrub_metadata(file, &scrub);
36fd6e86
DW
1647 if (error)
1648 return error;
1649
1650 if (copy_to_user(arg, &scrub, sizeof(scrub)))
1651 return -EFAULT;
1652
1653 return 0;
1654}
1655
a133d952
DC
1656int
1657xfs_ioc_swapext(
1658 xfs_swapext_t *sxp)
1659{
1660 xfs_inode_t *ip, *tip;
1661 struct fd f, tmp;
1662 int error = 0;
1663
1664 /* Pull information for the target fd */
1665 f = fdget((int)sxp->sx_fdtarget);
1666 if (!f.file) {
2451337d 1667 error = -EINVAL;
a133d952
DC
1668 goto out;
1669 }
1670
1671 if (!(f.file->f_mode & FMODE_WRITE) ||
1672 !(f.file->f_mode & FMODE_READ) ||
1673 (f.file->f_flags & O_APPEND)) {
2451337d 1674 error = -EBADF;
a133d952
DC
1675 goto out_put_file;
1676 }
1677
1678 tmp = fdget((int)sxp->sx_fdtmp);
1679 if (!tmp.file) {
2451337d 1680 error = -EINVAL;
a133d952
DC
1681 goto out_put_file;
1682 }
1683
1684 if (!(tmp.file->f_mode & FMODE_WRITE) ||
1685 !(tmp.file->f_mode & FMODE_READ) ||
1686 (tmp.file->f_flags & O_APPEND)) {
2451337d 1687 error = -EBADF;
a133d952
DC
1688 goto out_put_tmp_file;
1689 }
1690
1691 if (IS_SWAPFILE(file_inode(f.file)) ||
1692 IS_SWAPFILE(file_inode(tmp.file))) {
2451337d 1693 error = -EINVAL;
a133d952
DC
1694 goto out_put_tmp_file;
1695 }
1696
7f1b6245
JH
1697 /*
1698 * We need to ensure that the fds passed in point to XFS inodes
1699 * before we cast and access them as XFS structures as we have no
1700 * control over what the user passes us here.
1701 */
1702 if (f.file->f_op != &xfs_file_operations ||
1703 tmp.file->f_op != &xfs_file_operations) {
1704 error = -EINVAL;
1705 goto out_put_tmp_file;
1706 }
1707
a133d952
DC
1708 ip = XFS_I(file_inode(f.file));
1709 tip = XFS_I(file_inode(tmp.file));
1710
1711 if (ip->i_mount != tip->i_mount) {
2451337d 1712 error = -EINVAL;
a133d952
DC
1713 goto out_put_tmp_file;
1714 }
1715
1716 if (ip->i_ino == tip->i_ino) {
2451337d 1717 error = -EINVAL;
a133d952
DC
1718 goto out_put_tmp_file;
1719 }
1720
75c8c50f 1721 if (xfs_is_shutdown(ip->i_mount)) {
2451337d 1722 error = -EIO;
a133d952
DC
1723 goto out_put_tmp_file;
1724 }
1725
1726 error = xfs_swap_extents(ip, tip, sxp);
1727
1728 out_put_tmp_file:
1729 fdput(tmp);
1730 out_put_file:
1731 fdput(f);
1732 out:
1733 return error;
1734}
1735
f7664b31
ES
1736static int
1737xfs_ioc_getlabel(
1738 struct xfs_mount *mp,
1739 char __user *user_label)
1740{
1741 struct xfs_sb *sbp = &mp->m_sb;
1742 char label[XFSLABEL_MAX + 1];
1743
1744 /* Paranoia */
1745 BUILD_BUG_ON(sizeof(sbp->sb_fname) > FSLABEL_MAX);
1746
4bb8b65a
AB
1747 /* 1 larger than sb_fname, so this ensures a trailing NUL char */
1748 memset(label, 0, sizeof(label));
f7664b31 1749 spin_lock(&mp->m_sb_lock);
4bb8b65a 1750 strncpy(label, sbp->sb_fname, XFSLABEL_MAX);
f7664b31
ES
1751 spin_unlock(&mp->m_sb_lock);
1752
4bb8b65a 1753 if (copy_to_user(user_label, label, sizeof(label)))
f7664b31
ES
1754 return -EFAULT;
1755 return 0;
1756}
1757
1758static int
1759xfs_ioc_setlabel(
1760 struct file *filp,
1761 struct xfs_mount *mp,
1762 char __user *newlabel)
1763{
1764 struct xfs_sb *sbp = &mp->m_sb;
1765 char label[XFSLABEL_MAX + 1];
1766 size_t len;
1767 int error;
1768
1769 if (!capable(CAP_SYS_ADMIN))
1770 return -EPERM;
1771 /*
1772 * The generic ioctl allows up to FSLABEL_MAX chars, but XFS is much
1773 * smaller, at 12 bytes. We copy one more to be sure we find the
1774 * (required) NULL character to test the incoming label length.
1775 * NB: The on disk label doesn't need to be null terminated.
1776 */
1777 if (copy_from_user(label, newlabel, XFSLABEL_MAX + 1))
1778 return -EFAULT;
1779 len = strnlen(label, XFSLABEL_MAX + 1);
1780 if (len > sizeof(sbp->sb_fname))
1781 return -EINVAL;
1782
1783 error = mnt_want_write_file(filp);
1784 if (error)
1785 return error;
1786
1787 spin_lock(&mp->m_sb_lock);
1788 memset(sbp->sb_fname, 0, sizeof(sbp->sb_fname));
4bb8b65a 1789 memcpy(sbp->sb_fname, label, len);
f7664b31
ES
1790 spin_unlock(&mp->m_sb_lock);
1791
1792 /*
1793 * Now we do several things to satisfy userspace.
1794 * In addition to normal logging of the primary superblock, we also
1795 * immediately write these changes to sector zero for the primary, then
1796 * update all backup supers (as xfs_db does for a label change), then
1797 * invalidate the block device page cache. This is so that any prior
1798 * buffered reads from userspace (i.e. from blkid) are invalidated,
1799 * and userspace will see the newly-written label.
1800 */
1801 error = xfs_sync_sb_buf(mp);
1802 if (error)
1803 goto out;
1804 /*
1805 * growfs also updates backup supers so lock against that.
1806 */
1807 mutex_lock(&mp->m_growlock);
1808 error = xfs_update_secondary_sbs(mp);
1809 mutex_unlock(&mp->m_growlock);
1810
1811 invalidate_bdev(mp->m_ddev_targp->bt_bdev);
1812
1813out:
1814 mnt_drop_write_file(filp);
1815 return error;
1816}
1817
3737bb2c
DW
1818static inline int
1819xfs_fs_eofblocks_from_user(
1820 struct xfs_fs_eofblocks *src,
b26b2bf1 1821 struct xfs_icwalk *dst)
3737bb2c
DW
1822{
1823 if (src->eof_version != XFS_EOFBLOCKS_VERSION)
1824 return -EINVAL;
1825
1826 if (src->eof_flags & ~XFS_EOF_FLAGS_VALID)
1827 return -EINVAL;
1828
1829 if (memchr_inv(&src->pad32, 0, sizeof(src->pad32)) ||
1830 memchr_inv(src->pad64, 0, sizeof(src->pad64)))
1831 return -EINVAL;
1832
b26b2bf1 1833 dst->icw_flags = 0;
2d53f66b 1834 if (src->eof_flags & XFS_EOF_FLAGS_SYNC)
b26b2bf1 1835 dst->icw_flags |= XFS_ICWALK_FLAG_SYNC;
2d53f66b 1836 if (src->eof_flags & XFS_EOF_FLAGS_UID)
b26b2bf1 1837 dst->icw_flags |= XFS_ICWALK_FLAG_UID;
2d53f66b 1838 if (src->eof_flags & XFS_EOF_FLAGS_GID)
b26b2bf1 1839 dst->icw_flags |= XFS_ICWALK_FLAG_GID;
2d53f66b 1840 if (src->eof_flags & XFS_EOF_FLAGS_PRID)
b26b2bf1 1841 dst->icw_flags |= XFS_ICWALK_FLAG_PRID;
2d53f66b 1842 if (src->eof_flags & XFS_EOF_FLAGS_MINFILESIZE)
b26b2bf1 1843 dst->icw_flags |= XFS_ICWALK_FLAG_MINFILESIZE;
2d53f66b 1844
b26b2bf1
DW
1845 dst->icw_prid = src->eof_prid;
1846 dst->icw_min_file_size = src->eof_min_file_size;
3737bb2c 1847
b26b2bf1 1848 dst->icw_uid = INVALID_UID;
3737bb2c 1849 if (src->eof_flags & XFS_EOF_FLAGS_UID) {
b26b2bf1
DW
1850 dst->icw_uid = make_kuid(current_user_ns(), src->eof_uid);
1851 if (!uid_valid(dst->icw_uid))
3737bb2c
DW
1852 return -EINVAL;
1853 }
1854
b26b2bf1 1855 dst->icw_gid = INVALID_GID;
3737bb2c 1856 if (src->eof_flags & XFS_EOF_FLAGS_GID) {
b26b2bf1
DW
1857 dst->icw_gid = make_kgid(current_user_ns(), src->eof_gid);
1858 if (!gid_valid(dst->icw_gid))
3737bb2c
DW
1859 return -EINVAL;
1860 }
1861 return 0;
1862}
1863
b3bb9413
DW
1864/*
1865 * These long-unused ioctls were removed from the official ioctl API in 5.17,
1866 * but retain these definitions so that we can log warnings about them.
1867 */
1868#define XFS_IOC_ALLOCSP _IOW ('X', 10, struct xfs_flock64)
1869#define XFS_IOC_FREESP _IOW ('X', 11, struct xfs_flock64)
1870#define XFS_IOC_ALLOCSP64 _IOW ('X', 36, struct xfs_flock64)
1871#define XFS_IOC_FREESP64 _IOW ('X', 37, struct xfs_flock64)
1872
4d4be482
CH
1873/*
1874 * Note: some of the ioctl's return positive numbers as a
1875 * byte count indicating success, such as readlink_by_handle.
1876 * So we don't "sign flip" like most other routines. This means
1877 * true errors need to be returned as a negative value.
1878 */
1879long
1880xfs_file_ioctl(
df26cfe8 1881 struct file *filp,
df26cfe8 1882 unsigned int cmd,
4d4be482 1883 unsigned long p)
df26cfe8 1884{
496ad9aa 1885 struct inode *inode = file_inode(filp);
4d4be482
CH
1886 struct xfs_inode *ip = XFS_I(inode);
1887 struct xfs_mount *mp = ip->i_mount;
1888 void __user *arg = (void __user *)p;
df26cfe8
LM
1889 int error;
1890
cca28fb8 1891 trace_xfs_file_ioctl(ip);
4d4be482
CH
1892
1893 switch (cmd) {
a46db608
CH
1894 case FITRIM:
1895 return xfs_ioc_trim(mp, arg);
f7664b31
ES
1896 case FS_IOC_GETFSLABEL:
1897 return xfs_ioc_getlabel(mp, arg);
1898 case FS_IOC_SETFSLABEL:
1899 return xfs_ioc_setlabel(filp, mp, arg);
df26cfe8
LM
1900 case XFS_IOC_ALLOCSP:
1901 case XFS_IOC_FREESP:
df26cfe8 1902 case XFS_IOC_ALLOCSP64:
4d1b97f9
DW
1903 case XFS_IOC_FREESP64:
1904 xfs_warn_once(mp,
1905 "%s should use fallocate; XFS_IOC_{ALLOC,FREE}SP ioctl unsupported",
1906 current->comm);
1907 return -ENOTTY;
df26cfe8 1908 case XFS_IOC_DIOINFO: {
c7d68318
CH
1909 struct xfs_buftarg *target = xfs_inode_buftarg(ip);
1910 struct dioattr da;
df26cfe8 1911
7c71ee78 1912 da.d_mem = da.d_miniosz = target->bt_logical_sectorsize;
df26cfe8
LM
1913 da.d_maxiosz = INT_MAX & ~(da.d_miniosz - 1);
1914
1915 if (copy_to_user(arg, &da, sizeof(da)))
b474c7ae 1916 return -EFAULT;
df26cfe8
LM
1917 return 0;
1918 }
1919
1920 case XFS_IOC_FSBULKSTAT_SINGLE:
1921 case XFS_IOC_FSBULKSTAT:
1922 case XFS_IOC_FSINUMBERS:
f736d93d 1923 return xfs_ioc_fsbulkstat(filp, cmd, arg);
df26cfe8 1924
0448b6f4 1925 case XFS_IOC_BULKSTAT:
f736d93d 1926 return xfs_ioc_bulkstat(filp, cmd, arg);
fba9760a
DW
1927 case XFS_IOC_INUMBERS:
1928 return xfs_ioc_inumbers(mp, cmd, arg);
df26cfe8
LM
1929
1930 case XFS_IOC_FSGEOMETRY_V1:
1b6d968d
DC
1931 return xfs_ioc_fsgeometry(mp, arg, 3);
1932 case XFS_IOC_FSGEOMETRY_V4:
1933 return xfs_ioc_fsgeometry(mp, arg, 4);
df26cfe8 1934 case XFS_IOC_FSGEOMETRY:
1b6d968d 1935 return xfs_ioc_fsgeometry(mp, arg, 5);
df26cfe8 1936
7cd5006b
DW
1937 case XFS_IOC_AG_GEOMETRY:
1938 return xfs_ioc_ag_geometry(mp, arg);
1939
df26cfe8
LM
1940 case XFS_IOC_GETVERSION:
1941 return put_user(inode->i_generation, (int __user *)arg);
1942
df26cfe8 1943 case XFS_IOC_FSGETXATTRA:
9fefd5db 1944 return xfs_ioc_fsgetxattra(ip, arg);
df26cfe8 1945
df26cfe8
LM
1946 case XFS_IOC_GETBMAP:
1947 case XFS_IOC_GETBMAPA:
df26cfe8 1948 case XFS_IOC_GETBMAPX:
232b5194 1949 return xfs_ioc_getbmap(filp, cmd, arg);
df26cfe8 1950
e89c0413
DW
1951 case FS_IOC_GETFSMAP:
1952 return xfs_ioc_getfsmap(ip, arg);
1953
36fd6e86 1954 case XFS_IOC_SCRUB_METADATA:
71bddbcc 1955 return xfs_ioc_scrub_metadata(filp, arg);
36fd6e86 1956
df26cfe8
LM
1957 case XFS_IOC_FD_TO_HANDLE:
1958 case XFS_IOC_PATH_TO_HANDLE:
743bb465 1959 case XFS_IOC_PATH_TO_FSHANDLE: {
1960 xfs_fsop_handlereq_t hreq;
df26cfe8 1961
743bb465 1962 if (copy_from_user(&hreq, arg, sizeof(hreq)))
b474c7ae 1963 return -EFAULT;
743bb465 1964 return xfs_find_handle(cmd, &hreq);
1965 }
1966 case XFS_IOC_OPEN_BY_HANDLE: {
1967 xfs_fsop_handlereq_t hreq;
df26cfe8 1968
743bb465 1969 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1970 return -EFAULT;
d296d30a 1971 return xfs_open_by_handle(filp, &hreq);
743bb465 1972 }
df26cfe8 1973
743bb465 1974 case XFS_IOC_READLINK_BY_HANDLE: {
1975 xfs_fsop_handlereq_t hreq;
df26cfe8 1976
743bb465 1977 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1978 return -EFAULT;
d296d30a 1979 return xfs_readlink_by_handle(filp, &hreq);
743bb465 1980 }
df26cfe8 1981 case XFS_IOC_ATTRLIST_BY_HANDLE:
d296d30a 1982 return xfs_attrlist_by_handle(filp, arg);
df26cfe8
LM
1983
1984 case XFS_IOC_ATTRMULTI_BY_HANDLE:
d296d30a 1985 return xfs_attrmulti_by_handle(filp, arg);
df26cfe8
LM
1986
1987 case XFS_IOC_SWAPEXT: {
743bb465 1988 struct xfs_swapext sxp;
1989
1990 if (copy_from_user(&sxp, arg, sizeof(xfs_swapext_t)))
b474c7ae 1991 return -EFAULT;
d9457dc0
JK
1992 error = mnt_want_write_file(filp);
1993 if (error)
1994 return error;
a133d952 1995 error = xfs_ioc_swapext(&sxp);
d9457dc0 1996 mnt_drop_write_file(filp);
2451337d 1997 return error;
df26cfe8
LM
1998 }
1999
2000 case XFS_IOC_FSCOUNTS: {
2001 xfs_fsop_counts_t out;
2002
91083269 2003 xfs_fs_counts(mp, &out);
df26cfe8
LM
2004
2005 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 2006 return -EFAULT;
df26cfe8
LM
2007 return 0;
2008 }
2009
2010 case XFS_IOC_SET_RESBLKS: {
2011 xfs_fsop_resblks_t inout;
c8ce540d 2012 uint64_t in;
df26cfe8
LM
2013
2014 if (!capable(CAP_SYS_ADMIN))
2015 return -EPERM;
2016
2e973b2c 2017 if (xfs_is_readonly(mp))
b474c7ae 2018 return -EROFS;
d5db0f97 2019
df26cfe8 2020 if (copy_from_user(&inout, arg, sizeof(inout)))
b474c7ae 2021 return -EFAULT;
df26cfe8 2022
d9457dc0
JK
2023 error = mnt_want_write_file(filp);
2024 if (error)
2025 return error;
2026
df26cfe8
LM
2027 /* input parameter is passed in resblks field of structure */
2028 in = inout.resblks;
2029 error = xfs_reserve_blocks(mp, &in, &inout);
d9457dc0 2030 mnt_drop_write_file(filp);
df26cfe8 2031 if (error)
2451337d 2032 return error;
df26cfe8
LM
2033
2034 if (copy_to_user(arg, &inout, sizeof(inout)))
b474c7ae 2035 return -EFAULT;
df26cfe8
LM
2036 return 0;
2037 }
2038
2039 case XFS_IOC_GET_RESBLKS: {
2040 xfs_fsop_resblks_t out;
2041
2042 if (!capable(CAP_SYS_ADMIN))
2043 return -EPERM;
2044
2045 error = xfs_reserve_blocks(mp, NULL, &out);
2046 if (error)
2451337d 2047 return error;
df26cfe8
LM
2048
2049 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 2050 return -EFAULT;
df26cfe8
LM
2051
2052 return 0;
2053 }
2054
2055 case XFS_IOC_FSGROWFSDATA: {
07aabd9c 2056 struct xfs_growfs_data in;
df26cfe8 2057
df26cfe8 2058 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2059 return -EFAULT;
df26cfe8 2060
d9457dc0
JK
2061 error = mnt_want_write_file(filp);
2062 if (error)
2063 return error;
df26cfe8 2064 error = xfs_growfs_data(mp, &in);
d9457dc0 2065 mnt_drop_write_file(filp);
2451337d 2066 return error;
df26cfe8
LM
2067 }
2068
2069 case XFS_IOC_FSGROWFSLOG: {
07aabd9c 2070 struct xfs_growfs_log in;
df26cfe8 2071
df26cfe8 2072 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2073 return -EFAULT;
df26cfe8 2074
d9457dc0
JK
2075 error = mnt_want_write_file(filp);
2076 if (error)
2077 return error;
df26cfe8 2078 error = xfs_growfs_log(mp, &in);
d9457dc0 2079 mnt_drop_write_file(filp);
2451337d 2080 return error;
df26cfe8
LM
2081 }
2082
2083 case XFS_IOC_FSGROWFSRT: {
2084 xfs_growfs_rt_t in;
2085
df26cfe8 2086 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2087 return -EFAULT;
df26cfe8 2088
d9457dc0
JK
2089 error = mnt_want_write_file(filp);
2090 if (error)
2091 return error;
df26cfe8 2092 error = xfs_growfs_rt(mp, &in);
d9457dc0 2093 mnt_drop_write_file(filp);
2451337d 2094 return error;
df26cfe8
LM
2095 }
2096
df26cfe8 2097 case XFS_IOC_GOINGDOWN: {
c8ce540d 2098 uint32_t in;
df26cfe8
LM
2099
2100 if (!capable(CAP_SYS_ADMIN))
2101 return -EPERM;
2102
c8ce540d 2103 if (get_user(in, (uint32_t __user *)arg))
b474c7ae 2104 return -EFAULT;
df26cfe8 2105
2451337d 2106 return xfs_fs_goingdown(mp, in);
df26cfe8
LM
2107 }
2108
2109 case XFS_IOC_ERROR_INJECTION: {
2110 xfs_error_injection_t in;
2111
2112 if (!capable(CAP_SYS_ADMIN))
2113 return -EPERM;
2114
2115 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2116 return -EFAULT;
df26cfe8 2117
31965ef3 2118 return xfs_errortag_add(mp, in.errtag);
df26cfe8
LM
2119 }
2120
2121 case XFS_IOC_ERROR_CLEARALL:
2122 if (!capable(CAP_SYS_ADMIN))
2123 return -EPERM;
2124
31965ef3 2125 return xfs_errortag_clearall(mp);
df26cfe8 2126
8ca149de 2127 case XFS_IOC_FREE_EOFBLOCKS: {
b26b2bf1
DW
2128 struct xfs_fs_eofblocks eofb;
2129 struct xfs_icwalk icw;
8ca149de 2130
8c567a7f
DE
2131 if (!capable(CAP_SYS_ADMIN))
2132 return -EPERM;
2133
2e973b2c 2134 if (xfs_is_readonly(mp))
b474c7ae 2135 return -EROFS;
8c567a7f 2136
8ca149de 2137 if (copy_from_user(&eofb, arg, sizeof(eofb)))
b474c7ae 2138 return -EFAULT;
8ca149de 2139
b26b2bf1 2140 error = xfs_fs_eofblocks_from_user(&eofb, &icw);
b9fe5052 2141 if (error)
2451337d 2142 return error;
8ca149de 2143
b26b2bf1 2144 trace_xfs_ioc_free_eofblocks(mp, &icw, _RET_IP_);
38899f80 2145
4b674b9a 2146 sb_start_write(mp->m_super);
b26b2bf1 2147 error = xfs_blockgc_free_space(mp, &icw);
4b674b9a
BF
2148 sb_end_write(mp->m_super);
2149 return error;
8ca149de
BF
2150 }
2151
df26cfe8
LM
2152 default:
2153 return -ENOTTY;
2154 }
2155}