Merge tag 'asoc-fix-4.17-rc2' of https://git.kernel.org/pub/scm/linux/kernel/git...
[linux-2.6-block.git] / fs / xfs / xfs_ioctl.c
CommitLineData
1da177e4 1/*
7b718769
NS
2 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
3 * All Rights Reserved.
1da177e4 4 *
7b718769
NS
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License as
1da177e4
LT
7 * published by the Free Software Foundation.
8 *
7b718769
NS
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
1da177e4 13 *
7b718769
NS
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4 17 */
1da177e4 18#include "xfs.h"
1da177e4 19#include "xfs_fs.h"
70a9883c 20#include "xfs_shared.h"
239880ef
DC
21#include "xfs_format.h"
22#include "xfs_log_format.h"
23#include "xfs_trans_resv.h"
1da177e4 24#include "xfs_mount.h"
1da177e4 25#include "xfs_inode.h"
7bf446f8 26#include "xfs_ioctl.h"
a4fbe6ab 27#include "xfs_alloc.h"
1da177e4 28#include "xfs_rtalloc.h"
1da177e4 29#include "xfs_itable.h"
a844f451 30#include "xfs_error.h"
1da177e4 31#include "xfs_attr.h"
a844f451 32#include "xfs_bmap.h"
68988114 33#include "xfs_bmap_util.h"
1da177e4 34#include "xfs_fsops.h"
a46db608 35#include "xfs_discard.h"
25fe55e8 36#include "xfs_quota.h"
d296d30a 37#include "xfs_export.h"
0b1b213f 38#include "xfs_trace.h"
8ca149de 39#include "xfs_icache.h"
c24b5dfa 40#include "xfs_symlink.h"
a4fbe6ab 41#include "xfs_trans.h"
781355c6 42#include "xfs_pnfs.h"
47e1bf64 43#include "xfs_acl.h"
e89c0413
DW
44#include "xfs_btree.h"
45#include <linux/fsmap.h>
46#include "xfs_fsmap.h"
36fd6e86 47#include "scrub/xfs_scrub.h"
c368ebcd 48#include "xfs_sb.h"
1da177e4 49
16f7e0fe 50#include <linux/capability.h>
5b825c3a 51#include <linux/cred.h>
1da177e4
LT
52#include <linux/dcache.h>
53#include <linux/mount.h>
54#include <linux/namei.h>
55#include <linux/pagemap.h>
5a0e3ad6 56#include <linux/slab.h>
d296d30a 57#include <linux/exportfs.h>
1da177e4
LT
58
59/*
60 * xfs_find_handle maps from userspace xfs_fsop_handlereq structure to
61 * a file or fs handle.
62 *
63 * XFS_IOC_PATH_TO_FSHANDLE
64 * returns fs handle for a mount point or path within that mount point
65 * XFS_IOC_FD_TO_HANDLE
66 * returns full handle for a FD opened in user space
67 * XFS_IOC_PATH_TO_HANDLE
68 * returns full handle for a path
69 */
d5547f9f 70int
1da177e4
LT
71xfs_find_handle(
72 unsigned int cmd,
743bb465 73 xfs_fsop_handlereq_t *hreq)
1da177e4
LT
74{
75 int hsize;
76 xfs_handle_t handle;
1da177e4 77 struct inode *inode;
a30b0367 78 struct fd f = {NULL};
4346cdd4 79 struct path path;
2903ff01 80 int error;
4346cdd4 81 struct xfs_inode *ip;
1da177e4 82
4346cdd4 83 if (cmd == XFS_IOC_FD_TO_HANDLE) {
2903ff01
AV
84 f = fdget(hreq->fd);
85 if (!f.file)
4346cdd4 86 return -EBADF;
496ad9aa 87 inode = file_inode(f.file);
4346cdd4
CH
88 } else {
89 error = user_lpath((const char __user *)hreq->path, &path);
90 if (error)
91 return error;
2b0143b5 92 inode = d_inode(path.dentry);
1da177e4 93 }
4346cdd4
CH
94 ip = XFS_I(inode);
95
96 /*
97 * We can only generate handles for inodes residing on a XFS filesystem,
98 * and only for regular files, directories or symbolic links.
99 */
100 error = -EINVAL;
101 if (inode->i_sb->s_magic != XFS_SB_MAGIC)
102 goto out_put;
103
104 error = -EBADF;
105 if (!S_ISREG(inode->i_mode) &&
106 !S_ISDIR(inode->i_mode) &&
107 !S_ISLNK(inode->i_mode))
108 goto out_put;
109
110
111 memcpy(&handle.ha_fsid, ip->i_mount->m_fixedfsid, sizeof(xfs_fsid_t));
112
113 if (cmd == XFS_IOC_PATH_TO_FSHANDLE) {
114 /*
115 * This handle only contains an fsid, zero the rest.
116 */
117 memset(&handle.ha_fid, 0, sizeof(handle.ha_fid));
118 hsize = sizeof(xfs_fsid_t);
119 } else {
c6143911
CH
120 handle.ha_fid.fid_len = sizeof(xfs_fid_t) -
121 sizeof(handle.ha_fid.fid_len);
122 handle.ha_fid.fid_pad = 0;
9e9a2674 123 handle.ha_fid.fid_gen = inode->i_generation;
c6143911 124 handle.ha_fid.fid_ino = ip->i_ino;
3398a400 125 hsize = sizeof(xfs_handle_t);
1da177e4
LT
126 }
127
4346cdd4 128 error = -EFAULT;
743bb465 129 if (copy_to_user(hreq->ohandle, &handle, hsize) ||
4346cdd4
CH
130 copy_to_user(hreq->ohandlen, &hsize, sizeof(__s32)))
131 goto out_put;
1da177e4 132
4346cdd4
CH
133 error = 0;
134
135 out_put:
136 if (cmd == XFS_IOC_FD_TO_HANDLE)
2903ff01 137 fdput(f);
4346cdd4
CH
138 else
139 path_put(&path);
140 return error;
1da177e4
LT
141}
142
1da177e4 143/*
d296d30a
CH
144 * No need to do permission checks on the various pathname components
145 * as the handle operations are privileged.
1da177e4
LT
146 */
147STATIC int
d296d30a
CH
148xfs_handle_acceptable(
149 void *context,
150 struct dentry *dentry)
151{
152 return 1;
153}
154
155/*
156 * Convert userspace handle data into a dentry.
157 */
158struct dentry *
159xfs_handle_to_dentry(
160 struct file *parfilp,
161 void __user *uhandle,
162 u32 hlen)
1da177e4 163{
1da177e4 164 xfs_handle_t handle;
d296d30a 165 struct xfs_fid64 fid;
1da177e4
LT
166
167 /*
168 * Only allow handle opens under a directory.
169 */
496ad9aa 170 if (!S_ISDIR(file_inode(parfilp)->i_mode))
d296d30a
CH
171 return ERR_PTR(-ENOTDIR);
172
173 if (hlen != sizeof(xfs_handle_t))
174 return ERR_PTR(-EINVAL);
175 if (copy_from_user(&handle, uhandle, hlen))
176 return ERR_PTR(-EFAULT);
177 if (handle.ha_fid.fid_len !=
178 sizeof(handle.ha_fid) - sizeof(handle.ha_fid.fid_len))
179 return ERR_PTR(-EINVAL);
180
181 memset(&fid, 0, sizeof(struct fid));
182 fid.ino = handle.ha_fid.fid_ino;
183 fid.gen = handle.ha_fid.fid_gen;
184
185 return exportfs_decode_fh(parfilp->f_path.mnt, (struct fid *)&fid, 3,
186 FILEID_INO32_GEN | XFS_FILEID_TYPE_64FLAG,
187 xfs_handle_acceptable, NULL);
188}
1da177e4 189
d296d30a
CH
190STATIC struct dentry *
191xfs_handlereq_to_dentry(
192 struct file *parfilp,
193 xfs_fsop_handlereq_t *hreq)
194{
195 return xfs_handle_to_dentry(parfilp, hreq->ihandle, hreq->ihandlen);
1da177e4
LT
196}
197
d5547f9f 198int
1da177e4 199xfs_open_by_handle(
1da177e4 200 struct file *parfilp,
d296d30a 201 xfs_fsop_handlereq_t *hreq)
1da177e4 202{
745ca247 203 const struct cred *cred = current_cred();
1da177e4 204 int error;
d296d30a 205 int fd;
1da177e4
LT
206 int permflag;
207 struct file *filp;
208 struct inode *inode;
209 struct dentry *dentry;
1a1d7724 210 fmode_t fmode;
765927b2 211 struct path path;
1da177e4
LT
212
213 if (!capable(CAP_SYS_ADMIN))
b474c7ae 214 return -EPERM;
1da177e4 215
d296d30a
CH
216 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
217 if (IS_ERR(dentry))
218 return PTR_ERR(dentry);
2b0143b5 219 inode = d_inode(dentry);
1da177e4
LT
220
221 /* Restrict xfs_open_by_handle to directories & regular files. */
222 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) {
b474c7ae 223 error = -EPERM;
d296d30a 224 goto out_dput;
1da177e4
LT
225 }
226
227#if BITS_PER_LONG != 32
743bb465 228 hreq->oflags |= O_LARGEFILE;
1da177e4 229#endif
d296d30a 230
743bb465 231 permflag = hreq->oflags;
1a1d7724 232 fmode = OPEN_FMODE(permflag);
1da177e4 233 if ((!(permflag & O_APPEND) || (permflag & O_TRUNC)) &&
1a1d7724 234 (fmode & FMODE_WRITE) && IS_APPEND(inode)) {
b474c7ae 235 error = -EPERM;
d296d30a 236 goto out_dput;
1da177e4
LT
237 }
238
1a1d7724 239 if ((fmode & FMODE_WRITE) && IS_IMMUTABLE(inode)) {
337684a1 240 error = -EPERM;
d296d30a 241 goto out_dput;
1da177e4
LT
242 }
243
244 /* Can't write directories. */
1a1d7724 245 if (S_ISDIR(inode->i_mode) && (fmode & FMODE_WRITE)) {
b474c7ae 246 error = -EISDIR;
d296d30a 247 goto out_dput;
1da177e4
LT
248 }
249
862a6293 250 fd = get_unused_fd_flags(0);
d296d30a
CH
251 if (fd < 0) {
252 error = fd;
253 goto out_dput;
1da177e4
LT
254 }
255
765927b2
AV
256 path.mnt = parfilp->f_path.mnt;
257 path.dentry = dentry;
258 filp = dentry_open(&path, hreq->oflags, cred);
259 dput(dentry);
1da177e4 260 if (IS_ERR(filp)) {
d296d30a
CH
261 put_unused_fd(fd);
262 return PTR_ERR(filp);
1da177e4 263 }
4d4be482 264
03209378 265 if (S_ISREG(inode->i_mode)) {
2e2e7bb1 266 filp->f_flags |= O_NOATIME;
4d4be482 267 filp->f_mode |= FMODE_NOCMTIME;
2e2e7bb1 268 }
1da177e4 269
d296d30a
CH
270 fd_install(fd, filp);
271 return fd;
272
273 out_dput:
274 dput(dentry);
275 return error;
1da177e4
LT
276}
277
d5547f9f 278int
1da177e4 279xfs_readlink_by_handle(
d296d30a
CH
280 struct file *parfilp,
281 xfs_fsop_handlereq_t *hreq)
1da177e4 282{
d296d30a 283 struct dentry *dentry;
1da177e4 284 __u32 olen;
804c83c3 285 int error;
1da177e4
LT
286
287 if (!capable(CAP_SYS_ADMIN))
b474c7ae 288 return -EPERM;
1da177e4 289
d296d30a
CH
290 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
291 if (IS_ERR(dentry))
292 return PTR_ERR(dentry);
1da177e4
LT
293
294 /* Restrict this handle operation to symlinks only. */
fd4a0edf 295 if (!d_is_symlink(dentry)) {
b474c7ae 296 error = -EINVAL;
d296d30a 297 goto out_dput;
1da177e4
LT
298 }
299
743bb465 300 if (copy_from_user(&olen, hreq->ohandlen, sizeof(__u32))) {
b474c7ae 301 error = -EFAULT;
d296d30a 302 goto out_dput;
1da177e4 303 }
1da177e4 304
fd4a0edf 305 error = vfs_readlink(dentry, hreq->ohandle, olen);
67fcaa73 306
d296d30a
CH
307 out_dput:
308 dput(dentry);
804c83c3 309 return error;
1da177e4
LT
310}
311
c24b5dfa
DC
312int
313xfs_set_dmattrs(
314 xfs_inode_t *ip,
65a7935d
DW
315 uint evmask,
316 uint16_t state)
c24b5dfa
DC
317{
318 xfs_mount_t *mp = ip->i_mount;
319 xfs_trans_t *tp;
320 int error;
321
322 if (!capable(CAP_SYS_ADMIN))
2451337d 323 return -EPERM;
c24b5dfa
DC
324
325 if (XFS_FORCED_SHUTDOWN(mp))
2451337d 326 return -EIO;
c24b5dfa 327
253f4911
CH
328 error = xfs_trans_alloc(mp, &M_RES(mp)->tr_ichange, 0, 0, 0, &tp);
329 if (error)
c24b5dfa 330 return error;
253f4911 331
c24b5dfa
DC
332 xfs_ilock(ip, XFS_ILOCK_EXCL);
333 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL);
334
335 ip->i_d.di_dmevmask = evmask;
336 ip->i_d.di_dmstate = state;
337
338 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
70393313 339 error = xfs_trans_commit(tp);
c24b5dfa
DC
340
341 return error;
342}
343
1da177e4
LT
344STATIC int
345xfs_fssetdm_by_handle(
d296d30a
CH
346 struct file *parfilp,
347 void __user *arg)
1da177e4
LT
348{
349 int error;
350 struct fsdmidata fsd;
351 xfs_fsop_setdm_handlereq_t dmhreq;
d296d30a 352 struct dentry *dentry;
1da177e4
LT
353
354 if (!capable(CAP_MKNOD))
b474c7ae 355 return -EPERM;
1da177e4 356 if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t)))
b474c7ae 357 return -EFAULT;
1da177e4 358
d9457dc0
JK
359 error = mnt_want_write_file(parfilp);
360 if (error)
361 return error;
362
d296d30a 363 dentry = xfs_handlereq_to_dentry(parfilp, &dmhreq.hreq);
d9457dc0
JK
364 if (IS_ERR(dentry)) {
365 mnt_drop_write_file(parfilp);
d296d30a 366 return PTR_ERR(dentry);
d9457dc0 367 }
1da177e4 368
2b0143b5 369 if (IS_IMMUTABLE(d_inode(dentry)) || IS_APPEND(d_inode(dentry))) {
b474c7ae 370 error = -EPERM;
6e7f75ea 371 goto out;
1da177e4
LT
372 }
373
374 if (copy_from_user(&fsd, dmhreq.data, sizeof(fsd))) {
b474c7ae 375 error = -EFAULT;
6e7f75ea 376 goto out;
1da177e4
LT
377 }
378
2b0143b5 379 error = xfs_set_dmattrs(XFS_I(d_inode(dentry)), fsd.fsd_dmevmask,
6e7f75ea 380 fsd.fsd_dmstate);
1da177e4 381
6e7f75ea 382 out:
d9457dc0 383 mnt_drop_write_file(parfilp);
d296d30a 384 dput(dentry);
6e7f75ea 385 return error;
1da177e4
LT
386}
387
388STATIC int
389xfs_attrlist_by_handle(
d296d30a
CH
390 struct file *parfilp,
391 void __user *arg)
1da177e4 392{
d296d30a 393 int error = -ENOMEM;
1da177e4 394 attrlist_cursor_kern_t *cursor;
0facef7f 395 struct xfs_fsop_attrlist_handlereq __user *p = arg;
1da177e4 396 xfs_fsop_attrlist_handlereq_t al_hreq;
d296d30a 397 struct dentry *dentry;
1da177e4
LT
398 char *kbuf;
399
400 if (!capable(CAP_SYS_ADMIN))
b474c7ae 401 return -EPERM;
1da177e4 402 if (copy_from_user(&al_hreq, arg, sizeof(xfs_fsop_attrlist_handlereq_t)))
b474c7ae 403 return -EFAULT;
071c529e 404 if (al_hreq.buflen < sizeof(struct attrlist) ||
4e247614 405 al_hreq.buflen > XFS_XATTR_LIST_MAX)
b474c7ae 406 return -EINVAL;
1da177e4 407
90ad58a8
CH
408 /*
409 * Reject flags, only allow namespaces.
410 */
411 if (al_hreq.flags & ~(ATTR_ROOT | ATTR_SECURE))
b474c7ae 412 return -EINVAL;
90ad58a8 413
d296d30a
CH
414 dentry = xfs_handlereq_to_dentry(parfilp, &al_hreq.hreq);
415 if (IS_ERR(dentry))
416 return PTR_ERR(dentry);
1da177e4 417
fdd3ccee
DC
418 kbuf = kmem_zalloc_large(al_hreq.buflen, KM_SLEEP);
419 if (!kbuf)
420 goto out_dput;
1da177e4
LT
421
422 cursor = (attrlist_cursor_kern_t *)&al_hreq.pos;
2b0143b5 423 error = xfs_attr_list(XFS_I(d_inode(dentry)), kbuf, al_hreq.buflen,
739bfb2a 424 al_hreq.flags, cursor);
1da177e4
LT
425 if (error)
426 goto out_kfree;
427
0facef7f
DW
428 if (copy_to_user(&p->pos, cursor, sizeof(attrlist_cursor_kern_t))) {
429 error = -EFAULT;
430 goto out_kfree;
431 }
432
1da177e4
LT
433 if (copy_to_user(al_hreq.buffer, kbuf, al_hreq.buflen))
434 error = -EFAULT;
435
fdd3ccee
DC
436out_kfree:
437 kmem_free(kbuf);
438out_dput:
d296d30a
CH
439 dput(dentry);
440 return error;
1da177e4
LT
441}
442
28750975 443int
1da177e4 444xfs_attrmulti_attr_get(
739bfb2a 445 struct inode *inode,
a9273ca5
DC
446 unsigned char *name,
447 unsigned char __user *ubuf,
c8ce540d
DW
448 uint32_t *len,
449 uint32_t flags)
1da177e4 450{
a9273ca5 451 unsigned char *kbuf;
2451337d 452 int error = -EFAULT;
e8b0ebaa 453
51fcbfe7 454 if (*len > XFS_XATTR_SIZE_MAX)
2451337d 455 return -EINVAL;
fdd3ccee
DC
456 kbuf = kmem_zalloc_large(*len, KM_SLEEP);
457 if (!kbuf)
2451337d 458 return -ENOMEM;
1da177e4 459
e8b0ebaa 460 error = xfs_attr_get(XFS_I(inode), name, kbuf, (int *)len, flags);
1da177e4
LT
461 if (error)
462 goto out_kfree;
463
464 if (copy_to_user(ubuf, kbuf, *len))
2451337d 465 error = -EFAULT;
1da177e4 466
fdd3ccee
DC
467out_kfree:
468 kmem_free(kbuf);
1da177e4
LT
469 return error;
470}
471
28750975 472int
1da177e4 473xfs_attrmulti_attr_set(
739bfb2a 474 struct inode *inode,
a9273ca5
DC
475 unsigned char *name,
476 const unsigned char __user *ubuf,
c8ce540d
DW
477 uint32_t len,
478 uint32_t flags)
1da177e4 479{
a9273ca5 480 unsigned char *kbuf;
09cb22d2 481 int error;
1da177e4 482
739bfb2a 483 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 484 return -EPERM;
51fcbfe7 485 if (len > XFS_XATTR_SIZE_MAX)
2451337d 486 return -EINVAL;
1da177e4 487
0e639bde
LZ
488 kbuf = memdup_user(ubuf, len);
489 if (IS_ERR(kbuf))
490 return PTR_ERR(kbuf);
e8b0ebaa 491
09cb22d2 492 error = xfs_attr_set(XFS_I(inode), name, kbuf, len, flags);
47e1bf64
AG
493 if (!error)
494 xfs_forget_acl(inode, name, flags);
09cb22d2
AG
495 kfree(kbuf);
496 return error;
1da177e4
LT
497}
498
28750975 499int
1da177e4 500xfs_attrmulti_attr_remove(
739bfb2a 501 struct inode *inode,
a9273ca5 502 unsigned char *name,
c8ce540d 503 uint32_t flags)
1da177e4 504{
47e1bf64
AG
505 int error;
506
739bfb2a 507 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 508 return -EPERM;
47e1bf64
AG
509 error = xfs_attr_remove(XFS_I(inode), name, flags);
510 if (!error)
511 xfs_forget_acl(inode, name, flags);
512 return error;
1da177e4
LT
513}
514
515STATIC int
516xfs_attrmulti_by_handle(
42a74f20 517 struct file *parfilp,
d296d30a 518 void __user *arg)
1da177e4
LT
519{
520 int error;
521 xfs_attr_multiop_t *ops;
522 xfs_fsop_attrmulti_handlereq_t am_hreq;
d296d30a 523 struct dentry *dentry;
1da177e4 524 unsigned int i, size;
a9273ca5 525 unsigned char *attr_name;
1da177e4
LT
526
527 if (!capable(CAP_SYS_ADMIN))
b474c7ae 528 return -EPERM;
1da177e4 529 if (copy_from_user(&am_hreq, arg, sizeof(xfs_fsop_attrmulti_handlereq_t)))
b474c7ae 530 return -EFAULT;
1da177e4 531
fda168c2
ZW
532 /* overflow check */
533 if (am_hreq.opcount >= INT_MAX / sizeof(xfs_attr_multiop_t))
534 return -E2BIG;
535
d296d30a
CH
536 dentry = xfs_handlereq_to_dentry(parfilp, &am_hreq.hreq);
537 if (IS_ERR(dentry))
538 return PTR_ERR(dentry);
1da177e4 539
2451337d 540 error = -E2BIG;
e182f57a 541 size = am_hreq.opcount * sizeof(xfs_attr_multiop_t);
1da177e4 542 if (!size || size > 16 * PAGE_SIZE)
d296d30a 543 goto out_dput;
1da177e4 544
0e639bde
LZ
545 ops = memdup_user(am_hreq.ops, size);
546 if (IS_ERR(ops)) {
2451337d 547 error = PTR_ERR(ops);
d296d30a 548 goto out_dput;
0e639bde 549 }
1da177e4 550
2451337d 551 error = -ENOMEM;
1da177e4
LT
552 attr_name = kmalloc(MAXNAMELEN, GFP_KERNEL);
553 if (!attr_name)
554 goto out_kfree_ops;
555
1da177e4
LT
556 error = 0;
557 for (i = 0; i < am_hreq.opcount; i++) {
a9273ca5 558 ops[i].am_error = strncpy_from_user((char *)attr_name,
1da177e4
LT
559 ops[i].am_attrname, MAXNAMELEN);
560 if (ops[i].am_error == 0 || ops[i].am_error == MAXNAMELEN)
2451337d 561 error = -ERANGE;
1da177e4
LT
562 if (ops[i].am_error < 0)
563 break;
564
565 switch (ops[i].am_opcode) {
566 case ATTR_OP_GET:
d296d30a 567 ops[i].am_error = xfs_attrmulti_attr_get(
2b0143b5 568 d_inode(dentry), attr_name,
d296d30a
CH
569 ops[i].am_attrvalue, &ops[i].am_length,
570 ops[i].am_flags);
1da177e4
LT
571 break;
572 case ATTR_OP_SET:
a561be71 573 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
574 if (ops[i].am_error)
575 break;
d296d30a 576 ops[i].am_error = xfs_attrmulti_attr_set(
2b0143b5 577 d_inode(dentry), attr_name,
d296d30a
CH
578 ops[i].am_attrvalue, ops[i].am_length,
579 ops[i].am_flags);
2a79f17e 580 mnt_drop_write_file(parfilp);
1da177e4
LT
581 break;
582 case ATTR_OP_REMOVE:
a561be71 583 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
584 if (ops[i].am_error)
585 break;
d296d30a 586 ops[i].am_error = xfs_attrmulti_attr_remove(
2b0143b5 587 d_inode(dentry), attr_name,
d296d30a 588 ops[i].am_flags);
2a79f17e 589 mnt_drop_write_file(parfilp);
1da177e4
LT
590 break;
591 default:
2451337d 592 ops[i].am_error = -EINVAL;
1da177e4
LT
593 }
594 }
595
596 if (copy_to_user(am_hreq.ops, ops, size))
2451337d 597 error = -EFAULT;
1da177e4
LT
598
599 kfree(attr_name);
600 out_kfree_ops:
601 kfree(ops);
d296d30a
CH
602 out_dput:
603 dput(dentry);
2451337d 604 return error;
1da177e4
LT
605}
606
d5547f9f 607int
1da177e4 608xfs_ioc_space(
1da177e4 609 struct file *filp,
1da177e4 610 unsigned int cmd,
743bb465 611 xfs_flock64_t *bf)
1da177e4 612{
8f3e2058
CH
613 struct inode *inode = file_inode(filp);
614 struct xfs_inode *ip = XFS_I(inode);
865e9446 615 struct iattr iattr;
8add71ca 616 enum xfs_prealloc_flags flags = 0;
781355c6 617 uint iolock = XFS_IOLOCK_EXCL;
1da177e4
LT
618 int error;
619
743bb465 620 /*
621 * Only allow the sys admin to reserve space unless
622 * unwritten extents are enabled.
623 */
624 if (!xfs_sb_version_hasextflgbit(&ip->i_mount->m_sb) &&
625 !capable(CAP_SYS_ADMIN))
b474c7ae 626 return -EPERM;
743bb465 627
f37ea149 628 if (inode->i_flags & (S_IMMUTABLE|S_APPEND))
b474c7ae 629 return -EPERM;
1da177e4 630
ad4a8ac4 631 if (!(filp->f_mode & FMODE_WRITE))
b474c7ae 632 return -EBADF;
1da177e4 633
f37ea149 634 if (!S_ISREG(inode->i_mode))
b474c7ae 635 return -EINVAL;
1da177e4 636
8add71ca
CH
637 if (filp->f_flags & O_DSYNC)
638 flags |= XFS_PREALLOC_SYNC;
8f3e2058 639 if (filp->f_mode & FMODE_NOCMTIME)
8add71ca
CH
640 flags |= XFS_PREALLOC_INVISIBLE;
641
d9457dc0
JK
642 error = mnt_want_write_file(filp);
643 if (error)
644 return error;
865e9446 645
781355c6 646 xfs_ilock(ip, iolock);
65523218 647 error = xfs_break_layouts(inode, &iolock);
781355c6
CH
648 if (error)
649 goto out_unlock;
865e9446 650
e8e9ad42
DC
651 xfs_ilock(ip, XFS_MMAPLOCK_EXCL);
652 iolock |= XFS_MMAPLOCK_EXCL;
653
865e9446
CH
654 switch (bf->l_whence) {
655 case 0: /*SEEK_SET*/
656 break;
657 case 1: /*SEEK_CUR*/
658 bf->l_start += filp->f_pos;
659 break;
660 case 2: /*SEEK_END*/
661 bf->l_start += XFS_ISIZE(ip);
662 break;
663 default:
2451337d 664 error = -EINVAL;
865e9446
CH
665 goto out_unlock;
666 }
667
668 /*
669 * length of <= 0 for resv/unresv/zero is invalid. length for
670 * alloc/free is ignored completely and we have no idea what userspace
671 * might have set it to, so set it to zero to allow range
672 * checks to pass.
673 */
674 switch (cmd) {
675 case XFS_IOC_ZERO_RANGE:
676 case XFS_IOC_RESVSP:
677 case XFS_IOC_RESVSP64:
678 case XFS_IOC_UNRESVSP:
679 case XFS_IOC_UNRESVSP64:
680 if (bf->l_len <= 0) {
2451337d 681 error = -EINVAL;
865e9446
CH
682 goto out_unlock;
683 }
684 break;
685 default:
686 bf->l_len = 0;
687 break;
688 }
689
690 if (bf->l_start < 0 ||
8add71ca 691 bf->l_start > inode->i_sb->s_maxbytes ||
865e9446 692 bf->l_start + bf->l_len < 0 ||
8add71ca 693 bf->l_start + bf->l_len >= inode->i_sb->s_maxbytes) {
2451337d 694 error = -EINVAL;
865e9446
CH
695 goto out_unlock;
696 }
697
698 switch (cmd) {
699 case XFS_IOC_ZERO_RANGE:
8add71ca 700 flags |= XFS_PREALLOC_SET;
865e9446 701 error = xfs_zero_file_space(ip, bf->l_start, bf->l_len);
865e9446
CH
702 break;
703 case XFS_IOC_RESVSP:
704 case XFS_IOC_RESVSP64:
8add71ca 705 flags |= XFS_PREALLOC_SET;
865e9446
CH
706 error = xfs_alloc_file_space(ip, bf->l_start, bf->l_len,
707 XFS_BMAPI_PREALLOC);
865e9446
CH
708 break;
709 case XFS_IOC_UNRESVSP:
710 case XFS_IOC_UNRESVSP64:
711 error = xfs_free_file_space(ip, bf->l_start, bf->l_len);
712 break;
713 case XFS_IOC_ALLOCSP:
714 case XFS_IOC_ALLOCSP64:
715 case XFS_IOC_FREESP:
716 case XFS_IOC_FREESP64:
8add71ca 717 flags |= XFS_PREALLOC_CLEAR;
865e9446
CH
718 if (bf->l_start > XFS_ISIZE(ip)) {
719 error = xfs_alloc_file_space(ip, XFS_ISIZE(ip),
720 bf->l_start - XFS_ISIZE(ip), 0);
721 if (error)
722 goto out_unlock;
723 }
724
725 iattr.ia_valid = ATTR_SIZE;
726 iattr.ia_size = bf->l_start;
727
69bca807 728 error = xfs_vn_setattr_size(file_dentry(filp), &iattr);
865e9446
CH
729 break;
730 default:
731 ASSERT(0);
2451337d 732 error = -EINVAL;
865e9446
CH
733 }
734
735 if (error)
736 goto out_unlock;
737
8add71ca 738 error = xfs_update_prealloc_flags(ip, flags);
865e9446
CH
739
740out_unlock:
781355c6 741 xfs_iunlock(ip, iolock);
d9457dc0 742 mnt_drop_write_file(filp);
2451337d 743 return error;
1da177e4
LT
744}
745
746STATIC int
747xfs_ioc_bulkstat(
748 xfs_mount_t *mp,
749 unsigned int cmd,
750 void __user *arg)
751{
752 xfs_fsop_bulkreq_t bulkreq;
753 int count; /* # of records returned */
754 xfs_ino_t inlast; /* last inode number */
755 int done;
756 int error;
757
758 /* done = 1 if there are more stats to get and if bulkstat */
759 /* should be called again (unused here, but used in dmapi) */
760
761 if (!capable(CAP_SYS_ADMIN))
762 return -EPERM;
763
764 if (XFS_FORCED_SHUTDOWN(mp))
b474c7ae 765 return -EIO;
1da177e4
LT
766
767 if (copy_from_user(&bulkreq, arg, sizeof(xfs_fsop_bulkreq_t)))
b474c7ae 768 return -EFAULT;
1da177e4
LT
769
770 if (copy_from_user(&inlast, bulkreq.lastip, sizeof(__s64)))
b474c7ae 771 return -EFAULT;
1da177e4
LT
772
773 if ((count = bulkreq.icount) <= 0)
b474c7ae 774 return -EINVAL;
1da177e4 775
cd57e594 776 if (bulkreq.ubuffer == NULL)
b474c7ae 777 return -EINVAL;
cd57e594 778
1da177e4
LT
779 if (cmd == XFS_IOC_FSINUMBERS)
780 error = xfs_inumbers(mp, &inlast, &count,
faa63e95 781 bulkreq.ubuffer, xfs_inumbers_fmt);
1da177e4 782 else if (cmd == XFS_IOC_FSBULKSTAT_SINGLE)
d716f8ee
CH
783 error = xfs_bulkstat_one(mp, inlast, bulkreq.ubuffer,
784 sizeof(xfs_bstat_t), NULL, &done);
cd57e594 785 else /* XFS_IOC_FSBULKSTAT */
7dce11db
CH
786 error = xfs_bulkstat(mp, &inlast, &count, xfs_bulkstat_one,
787 sizeof(xfs_bstat_t), bulkreq.ubuffer,
788 &done);
1da177e4
LT
789
790 if (error)
2451337d 791 return error;
1da177e4
LT
792
793 if (bulkreq.ocount != NULL) {
794 if (copy_to_user(bulkreq.lastip, &inlast,
795 sizeof(xfs_ino_t)))
b474c7ae 796 return -EFAULT;
1da177e4
LT
797
798 if (copy_to_user(bulkreq.ocount, &count, sizeof(count)))
b474c7ae 799 return -EFAULT;
1da177e4
LT
800 }
801
802 return 0;
803}
804
805STATIC int
806xfs_ioc_fsgeometry_v1(
807 xfs_mount_t *mp,
808 void __user *arg)
809{
eeb2036b 810 xfs_fsop_geom_t fsgeo;
1da177e4
LT
811 int error;
812
ac503a4c 813 error = xfs_fs_geometry(&mp->m_sb, &fsgeo, 3);
1da177e4 814 if (error)
2451337d 815 return error;
1da177e4 816
eeb2036b
AE
817 /*
818 * Caller should have passed an argument of type
819 * xfs_fsop_geom_v1_t. This is a proper subset of the
820 * xfs_fsop_geom_t that xfs_fs_geometry() fills in.
821 */
822 if (copy_to_user(arg, &fsgeo, sizeof(xfs_fsop_geom_v1_t)))
b474c7ae 823 return -EFAULT;
1da177e4
LT
824 return 0;
825}
826
827STATIC int
828xfs_ioc_fsgeometry(
829 xfs_mount_t *mp,
830 void __user *arg)
831{
832 xfs_fsop_geom_t fsgeo;
833 int error;
834
ac503a4c 835 error = xfs_fs_geometry(&mp->m_sb, &fsgeo, 4);
1da177e4 836 if (error)
2451337d 837 return error;
1da177e4
LT
838
839 if (copy_to_user(arg, &fsgeo, sizeof(fsgeo)))
b474c7ae 840 return -EFAULT;
1da177e4
LT
841 return 0;
842}
843
844/*
845 * Linux extended inode flags interface.
846 */
1da177e4
LT
847
848STATIC unsigned int
849xfs_merge_ioc_xflags(
850 unsigned int flags,
851 unsigned int start)
852{
853 unsigned int xflags = start;
854
39058a0e 855 if (flags & FS_IMMUTABLE_FL)
e7b89481 856 xflags |= FS_XFLAG_IMMUTABLE;
1da177e4 857 else
e7b89481 858 xflags &= ~FS_XFLAG_IMMUTABLE;
39058a0e 859 if (flags & FS_APPEND_FL)
e7b89481 860 xflags |= FS_XFLAG_APPEND;
1da177e4 861 else
e7b89481 862 xflags &= ~FS_XFLAG_APPEND;
39058a0e 863 if (flags & FS_SYNC_FL)
e7b89481 864 xflags |= FS_XFLAG_SYNC;
1da177e4 865 else
e7b89481 866 xflags &= ~FS_XFLAG_SYNC;
39058a0e 867 if (flags & FS_NOATIME_FL)
e7b89481 868 xflags |= FS_XFLAG_NOATIME;
1da177e4 869 else
e7b89481 870 xflags &= ~FS_XFLAG_NOATIME;
39058a0e 871 if (flags & FS_NODUMP_FL)
e7b89481 872 xflags |= FS_XFLAG_NODUMP;
1da177e4 873 else
e7b89481 874 xflags &= ~FS_XFLAG_NODUMP;
1da177e4
LT
875
876 return xflags;
877}
878
879STATIC unsigned int
880xfs_di2lxflags(
c8ce540d 881 uint16_t di_flags)
1da177e4
LT
882{
883 unsigned int flags = 0;
884
885 if (di_flags & XFS_DIFLAG_IMMUTABLE)
39058a0e 886 flags |= FS_IMMUTABLE_FL;
1da177e4 887 if (di_flags & XFS_DIFLAG_APPEND)
39058a0e 888 flags |= FS_APPEND_FL;
1da177e4 889 if (di_flags & XFS_DIFLAG_SYNC)
39058a0e 890 flags |= FS_SYNC_FL;
1da177e4 891 if (di_flags & XFS_DIFLAG_NOATIME)
39058a0e 892 flags |= FS_NOATIME_FL;
1da177e4 893 if (di_flags & XFS_DIFLAG_NODUMP)
39058a0e 894 flags |= FS_NODUMP_FL;
1da177e4
LT
895 return flags;
896}
897
c83bfab1
CH
898STATIC int
899xfs_ioc_fsgetxattr(
900 xfs_inode_t *ip,
901 int attr,
902 void __user *arg)
903{
904 struct fsxattr fa;
905
a122eb2f
DR
906 memset(&fa, 0, sizeof(struct fsxattr));
907
c83bfab1
CH
908 xfs_ilock(ip, XFS_ILOCK_SHARED);
909 fa.fsx_xflags = xfs_ip2xflags(ip);
910 fa.fsx_extsize = ip->i_d.di_extsize << ip->i_mount->m_sb.sb_blocklog;
f7ca3522
DW
911 fa.fsx_cowextsize = ip->i_d.di_cowextsize <<
912 ip->i_mount->m_sb.sb_blocklog;
6743099c 913 fa.fsx_projid = xfs_get_projid(ip);
c83bfab1
CH
914
915 if (attr) {
916 if (ip->i_afp) {
917 if (ip->i_afp->if_flags & XFS_IFEXTENTS)
5d829300 918 fa.fsx_nextents = xfs_iext_count(ip->i_afp);
c83bfab1
CH
919 else
920 fa.fsx_nextents = ip->i_d.di_anextents;
921 } else
922 fa.fsx_nextents = 0;
923 } else {
924 if (ip->i_df.if_flags & XFS_IFEXTENTS)
5d829300 925 fa.fsx_nextents = xfs_iext_count(&ip->i_df);
c83bfab1
CH
926 else
927 fa.fsx_nextents = ip->i_d.di_nextents;
928 }
929 xfs_iunlock(ip, XFS_ILOCK_SHARED);
930
931 if (copy_to_user(arg, &fa, sizeof(fa)))
932 return -EFAULT;
933 return 0;
934}
935
dd60687e
CH
936STATIC uint16_t
937xfs_flags2diflags(
25fe55e8
CH
938 struct xfs_inode *ip,
939 unsigned int xflags)
940{
25fe55e8 941 /* can't set PREALLOC this way, just preserve it */
dd60687e
CH
942 uint16_t di_flags =
943 (ip->i_d.di_flags & XFS_DIFLAG_PREALLOC);
944
e7b89481 945 if (xflags & FS_XFLAG_IMMUTABLE)
25fe55e8 946 di_flags |= XFS_DIFLAG_IMMUTABLE;
e7b89481 947 if (xflags & FS_XFLAG_APPEND)
25fe55e8 948 di_flags |= XFS_DIFLAG_APPEND;
e7b89481 949 if (xflags & FS_XFLAG_SYNC)
25fe55e8 950 di_flags |= XFS_DIFLAG_SYNC;
e7b89481 951 if (xflags & FS_XFLAG_NOATIME)
25fe55e8 952 di_flags |= XFS_DIFLAG_NOATIME;
e7b89481 953 if (xflags & FS_XFLAG_NODUMP)
25fe55e8 954 di_flags |= XFS_DIFLAG_NODUMP;
e7b89481 955 if (xflags & FS_XFLAG_NODEFRAG)
25fe55e8 956 di_flags |= XFS_DIFLAG_NODEFRAG;
e7b89481 957 if (xflags & FS_XFLAG_FILESTREAM)
25fe55e8 958 di_flags |= XFS_DIFLAG_FILESTREAM;
c19b3b05 959 if (S_ISDIR(VFS_I(ip)->i_mode)) {
e7b89481 960 if (xflags & FS_XFLAG_RTINHERIT)
25fe55e8 961 di_flags |= XFS_DIFLAG_RTINHERIT;
e7b89481 962 if (xflags & FS_XFLAG_NOSYMLINKS)
25fe55e8 963 di_flags |= XFS_DIFLAG_NOSYMLINKS;
e7b89481 964 if (xflags & FS_XFLAG_EXTSZINHERIT)
25fe55e8 965 di_flags |= XFS_DIFLAG_EXTSZINHERIT;
e7b89481 966 if (xflags & FS_XFLAG_PROJINHERIT)
9336e3a7 967 di_flags |= XFS_DIFLAG_PROJINHERIT;
c19b3b05 968 } else if (S_ISREG(VFS_I(ip)->i_mode)) {
e7b89481 969 if (xflags & FS_XFLAG_REALTIME)
25fe55e8 970 di_flags |= XFS_DIFLAG_REALTIME;
e7b89481 971 if (xflags & FS_XFLAG_EXTSIZE)
25fe55e8
CH
972 di_flags |= XFS_DIFLAG_EXTSIZE;
973 }
58f88ca2 974
dd60687e
CH
975 return di_flags;
976}
977
978STATIC uint64_t
979xfs_flags2diflags2(
980 struct xfs_inode *ip,
981 unsigned int xflags)
982{
983 uint64_t di_flags2 =
984 (ip->i_d.di_flags2 & XFS_DIFLAG2_REFLINK);
58f88ca2 985
58f88ca2
DC
986 if (xflags & FS_XFLAG_DAX)
987 di_flags2 |= XFS_DIFLAG2_DAX;
f7ca3522
DW
988 if (xflags & FS_XFLAG_COWEXTSIZE)
989 di_flags2 |= XFS_DIFLAG2_COWEXTSIZE;
58f88ca2 990
dd60687e 991 return di_flags2;
25fe55e8
CH
992}
993
f13fae2d
CH
994STATIC void
995xfs_diflags_to_linux(
996 struct xfs_inode *ip)
997{
e4f75291 998 struct inode *inode = VFS_I(ip);
f13fae2d
CH
999 unsigned int xflags = xfs_ip2xflags(ip);
1000
e7b89481 1001 if (xflags & FS_XFLAG_IMMUTABLE)
f13fae2d
CH
1002 inode->i_flags |= S_IMMUTABLE;
1003 else
1004 inode->i_flags &= ~S_IMMUTABLE;
e7b89481 1005 if (xflags & FS_XFLAG_APPEND)
f13fae2d
CH
1006 inode->i_flags |= S_APPEND;
1007 else
1008 inode->i_flags &= ~S_APPEND;
e7b89481 1009 if (xflags & FS_XFLAG_SYNC)
f13fae2d
CH
1010 inode->i_flags |= S_SYNC;
1011 else
1012 inode->i_flags &= ~S_SYNC;
e7b89481 1013 if (xflags & FS_XFLAG_NOATIME)
f13fae2d
CH
1014 inode->i_flags |= S_NOATIME;
1015 else
1016 inode->i_flags &= ~S_NOATIME;
742d8429 1017#if 0 /* disabled until the flag switching races are sorted out */
58f88ca2
DC
1018 if (xflags & FS_XFLAG_DAX)
1019 inode->i_flags |= S_DAX;
1020 else
1021 inode->i_flags &= ~S_DAX;
742d8429 1022#endif
f13fae2d 1023}
25fe55e8 1024
29a17c00
DC
1025static int
1026xfs_ioctl_setattr_xflags(
1027 struct xfs_trans *tp,
1028 struct xfs_inode *ip,
1029 struct fsxattr *fa)
1030{
1031 struct xfs_mount *mp = ip->i_mount;
dd60687e 1032 uint64_t di_flags2;
29a17c00
DC
1033
1034 /* Can't change realtime flag if any extents are allocated. */
1035 if ((ip->i_d.di_nextents || ip->i_delayed_blks) &&
e7b89481 1036 XFS_IS_REALTIME_INODE(ip) != (fa->fsx_xflags & FS_XFLAG_REALTIME))
29a17c00
DC
1037 return -EINVAL;
1038
1039 /* If realtime flag is set then must have realtime device */
e7b89481 1040 if (fa->fsx_xflags & FS_XFLAG_REALTIME) {
29a17c00
DC
1041 if (mp->m_sb.sb_rblocks == 0 || mp->m_sb.sb_rextsize == 0 ||
1042 (ip->i_d.di_extsize % mp->m_sb.sb_rextsize))
1043 return -EINVAL;
1044 }
1045
1987fd74 1046 /* Clear reflink if we are actually able to set the rt flag. */
c8e156ac 1047 if ((fa->fsx_xflags & FS_XFLAG_REALTIME) && xfs_is_reflink_inode(ip))
1987fd74 1048 ip->i_d.di_flags2 &= ~XFS_DIFLAG2_REFLINK;
c8e156ac 1049
4f435ebe
DW
1050 /* Don't allow us to set DAX mode for a reflinked file for now. */
1051 if ((fa->fsx_xflags & FS_XFLAG_DAX) && xfs_is_reflink_inode(ip))
1052 return -EINVAL;
1053
29a17c00
DC
1054 /*
1055 * Can't modify an immutable/append-only file unless
1056 * we have appropriate permission.
1057 */
1058 if (((ip->i_d.di_flags & (XFS_DIFLAG_IMMUTABLE | XFS_DIFLAG_APPEND)) ||
e7b89481 1059 (fa->fsx_xflags & (FS_XFLAG_IMMUTABLE | FS_XFLAG_APPEND))) &&
29a17c00
DC
1060 !capable(CAP_LINUX_IMMUTABLE))
1061 return -EPERM;
1062
dd60687e
CH
1063 /* diflags2 only valid for v3 inodes. */
1064 di_flags2 = xfs_flags2diflags2(ip, fa->fsx_xflags);
1065 if (di_flags2 && ip->i_d.di_version < 3)
1066 return -EINVAL;
1067
1068 ip->i_d.di_flags = xfs_flags2diflags(ip, fa->fsx_xflags);
1069 ip->i_d.di_flags2 = di_flags2;
1070
29a17c00
DC
1071 xfs_diflags_to_linux(ip);
1072 xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG);
1073 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
ff6d6af2 1074 XFS_STATS_INC(mp, xs_ig_attrchg);
29a17c00
DC
1075 return 0;
1076}
1077
3a6a854a
DC
1078/*
1079 * If we are changing DAX flags, we have to ensure the file is clean and any
1080 * cached objects in the address space are invalidated and removed. This
1081 * requires us to lock out other IO and page faults similar to a truncate
1082 * operation. The locks need to be held until the transaction has been committed
1083 * so that the cache invalidation is atomic with respect to the DAX flag
1084 * manipulation.
1085 */
1086static int
1087xfs_ioctl_setattr_dax_invalidate(
1088 struct xfs_inode *ip,
1089 struct fsxattr *fa,
1090 int *join_flags)
1091{
1092 struct inode *inode = VFS_I(ip);
6851a3db 1093 struct super_block *sb = inode->i_sb;
3a6a854a
DC
1094 int error;
1095
1096 *join_flags = 0;
1097
e8897529
DC
1098 /*
1099 * It is only valid to set the DAX flag on regular files and
64485437
DC
1100 * directories on filesystems where the block size is equal to the page
1101 * size. On directories it serves as an inherit hint.
e8897529 1102 */
64485437
DC
1103 if (fa->fsx_xflags & FS_XFLAG_DAX) {
1104 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode)))
1105 return -EINVAL;
6851a3db 1106 if (bdev_dax_supported(sb, sb->s_blocksize) < 0)
64485437
DC
1107 return -EINVAL;
1108 }
e8897529 1109
3a6a854a
DC
1110 /* If the DAX state is not changing, we have nothing to do here. */
1111 if ((fa->fsx_xflags & FS_XFLAG_DAX) && IS_DAX(inode))
1112 return 0;
1113 if (!(fa->fsx_xflags & FS_XFLAG_DAX) && !IS_DAX(inode))
1114 return 0;
1115
1116 /* lock, flush and invalidate mapping in preparation for flag change */
1117 xfs_ilock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1118 error = filemap_write_and_wait(inode->i_mapping);
1119 if (error)
1120 goto out_unlock;
1121 error = invalidate_inode_pages2(inode->i_mapping);
1122 if (error)
1123 goto out_unlock;
1124
1125 *join_flags = XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL;
29a17c00 1126 return 0;
3a6a854a
DC
1127
1128out_unlock:
1129 xfs_iunlock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1130 return error;
1131
29a17c00
DC
1132}
1133
8f3d17ab
DC
1134/*
1135 * Set up the transaction structure for the setattr operation, checking that we
1136 * have permission to do so. On success, return a clean transaction and the
1137 * inode locked exclusively ready for further operation specific checks. On
1138 * failure, return an error without modifying or locking the inode.
3a6a854a
DC
1139 *
1140 * The inode might already be IO locked on call. If this is the case, it is
1141 * indicated in @join_flags and we take full responsibility for ensuring they
1142 * are unlocked from now on. Hence if we have an error here, we still have to
1143 * unlock them. Otherwise, once they are joined to the transaction, they will
1144 * be unlocked on commit/cancel.
8f3d17ab
DC
1145 */
1146static struct xfs_trans *
1147xfs_ioctl_setattr_get_trans(
3a6a854a
DC
1148 struct xfs_inode *ip,
1149 int join_flags)
8f3d17ab
DC
1150{
1151 struct xfs_mount *mp = ip->i_mount;
1152 struct xfs_trans *tp;
3a6a854a 1153 int error = -EROFS;
8f3d17ab
DC
1154
1155 if (mp->m_flags & XFS_MOUNT_RDONLY)
3a6a854a
DC
1156 goto out_unlock;
1157 error = -EIO;
8f3d17ab 1158 if (XFS_FORCED_SHUTDOWN(mp))
3a6a854a 1159 goto out_unlock;
8f3d17ab 1160
253f4911 1161 error = xfs_trans_alloc(mp, &M_RES(mp)->tr_ichange, 0, 0, 0, &tp);
8f3d17ab 1162 if (error)
253f4911 1163 return ERR_PTR(error);
8f3d17ab
DC
1164
1165 xfs_ilock(ip, XFS_ILOCK_EXCL);
3a6a854a
DC
1166 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL | join_flags);
1167 join_flags = 0;
8f3d17ab
DC
1168
1169 /*
1170 * CAP_FOWNER overrides the following restrictions:
1171 *
1172 * The user ID of the calling process must be equal to the file owner
1173 * ID, except in cases where the CAP_FSETID capability is applicable.
1174 */
1175 if (!inode_owner_or_capable(VFS_I(ip))) {
1176 error = -EPERM;
1177 goto out_cancel;
1178 }
1179
1180 if (mp->m_flags & XFS_MOUNT_WSYNC)
1181 xfs_trans_set_sync(tp);
1182
1183 return tp;
1184
1185out_cancel:
4906e215 1186 xfs_trans_cancel(tp);
3a6a854a
DC
1187out_unlock:
1188 if (join_flags)
1189 xfs_iunlock(ip, join_flags);
8f3d17ab
DC
1190 return ERR_PTR(error);
1191}
1192
9b94fcc3
IP
1193/*
1194 * extent size hint validation is somewhat cumbersome. Rules are:
1195 *
1196 * 1. extent size hint is only valid for directories and regular files
e7b89481
DC
1197 * 2. FS_XFLAG_EXTSIZE is only valid for regular files
1198 * 3. FS_XFLAG_EXTSZINHERIT is only valid for directories.
9b94fcc3
IP
1199 * 4. can only be changed on regular files if no extents are allocated
1200 * 5. can be changed on directories at any time
1201 * 6. extsize hint of 0 turns off hints, clears inode flags.
1202 * 7. Extent size must be a multiple of the appropriate block size.
1203 * 8. for non-realtime files, the extent size hint must be limited
1204 * to half the AG size to avoid alignment extending the extent beyond the
1205 * limits of the AG.
80e4e126
DW
1206 *
1207 * Please keep this function in sync with xfs_scrub_inode_extsize.
9b94fcc3 1208 */
f92090e9 1209static int
d4388d3c
DC
1210xfs_ioctl_setattr_check_extsize(
1211 struct xfs_inode *ip,
1212 struct fsxattr *fa)
1213{
1214 struct xfs_mount *mp = ip->i_mount;
1215
c19b3b05 1216 if ((fa->fsx_xflags & FS_XFLAG_EXTSIZE) && !S_ISREG(VFS_I(ip)->i_mode))
9b94fcc3
IP
1217 return -EINVAL;
1218
e7b89481 1219 if ((fa->fsx_xflags & FS_XFLAG_EXTSZINHERIT) &&
c19b3b05 1220 !S_ISDIR(VFS_I(ip)->i_mode))
9b94fcc3
IP
1221 return -EINVAL;
1222
c19b3b05 1223 if (S_ISREG(VFS_I(ip)->i_mode) && ip->i_d.di_nextents &&
d4388d3c
DC
1224 ((ip->i_d.di_extsize << mp->m_sb.sb_blocklog) != fa->fsx_extsize))
1225 return -EINVAL;
1226
d4388d3c
DC
1227 if (fa->fsx_extsize != 0) {
1228 xfs_extlen_t size;
1229 xfs_fsblock_t extsize_fsb;
1230
1231 extsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_extsize);
1232 if (extsize_fsb > MAXEXTLEN)
1233 return -EINVAL;
1234
1235 if (XFS_IS_REALTIME_INODE(ip) ||
e7b89481 1236 (fa->fsx_xflags & FS_XFLAG_REALTIME)) {
d4388d3c
DC
1237 size = mp->m_sb.sb_rextsize << mp->m_sb.sb_blocklog;
1238 } else {
1239 size = mp->m_sb.sb_blocksize;
1240 if (extsize_fsb > mp->m_sb.sb_agblocks / 2)
1241 return -EINVAL;
1242 }
1243
1244 if (fa->fsx_extsize % size)
1245 return -EINVAL;
9b94fcc3 1246 } else
e7b89481 1247 fa->fsx_xflags &= ~(FS_XFLAG_EXTSIZE | FS_XFLAG_EXTSZINHERIT);
9b94fcc3 1248
d4388d3c
DC
1249 return 0;
1250}
1251
f7ca3522
DW
1252/*
1253 * CoW extent size hint validation rules are:
1254 *
1255 * 1. CoW extent size hint can only be set if reflink is enabled on the fs.
1256 * The inode does not have to have any shared blocks, but it must be a v3.
1257 * 2. FS_XFLAG_COWEXTSIZE is only valid for directories and regular files;
1258 * for a directory, the hint is propagated to new files.
1259 * 3. Can be changed on files & directories at any time.
1260 * 4. CoW extsize hint of 0 turns off hints, clears inode flags.
1261 * 5. Extent size must be a multiple of the appropriate block size.
1262 * 6. The extent size hint must be limited to half the AG size to avoid
1263 * alignment extending the extent beyond the limits of the AG.
80e4e126
DW
1264 *
1265 * Please keep this function in sync with xfs_scrub_inode_cowextsize.
f7ca3522
DW
1266 */
1267static int
1268xfs_ioctl_setattr_check_cowextsize(
1269 struct xfs_inode *ip,
1270 struct fsxattr *fa)
1271{
1272 struct xfs_mount *mp = ip->i_mount;
1273
1274 if (!(fa->fsx_xflags & FS_XFLAG_COWEXTSIZE))
1275 return 0;
1276
1277 if (!xfs_sb_version_hasreflink(&ip->i_mount->m_sb) ||
1278 ip->i_d.di_version != 3)
1279 return -EINVAL;
1280
1281 if (!S_ISREG(VFS_I(ip)->i_mode) && !S_ISDIR(VFS_I(ip)->i_mode))
1282 return -EINVAL;
1283
1284 if (fa->fsx_cowextsize != 0) {
1285 xfs_extlen_t size;
1286 xfs_fsblock_t cowextsize_fsb;
1287
1288 cowextsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_cowextsize);
1289 if (cowextsize_fsb > MAXEXTLEN)
1290 return -EINVAL;
1291
1292 size = mp->m_sb.sb_blocksize;
1293 if (cowextsize_fsb > mp->m_sb.sb_agblocks / 2)
1294 return -EINVAL;
1295
1296 if (fa->fsx_cowextsize % size)
1297 return -EINVAL;
1298 } else
1299 fa->fsx_xflags &= ~FS_XFLAG_COWEXTSIZE;
1300
1301 return 0;
1302}
1303
f92090e9 1304static int
23bd0735
DC
1305xfs_ioctl_setattr_check_projid(
1306 struct xfs_inode *ip,
1307 struct fsxattr *fa)
1308{
1309 /* Disallow 32bit project ids if projid32bit feature is not enabled. */
c8ce540d 1310 if (fa->fsx_projid > (uint16_t)-1 &&
23bd0735
DC
1311 !xfs_sb_version_hasprojid32bit(&ip->i_mount->m_sb))
1312 return -EINVAL;
1313
1314 /*
1315 * Project Quota ID state is only allowed to change from within the init
1316 * namespace. Enforce that restriction only if we are trying to change
1317 * the quota ID state. Everything else is allowed in user namespaces.
1318 */
1319 if (current_user_ns() == &init_user_ns)
1320 return 0;
1321
1322 if (xfs_get_projid(ip) != fa->fsx_projid)
1323 return -EINVAL;
e7b89481 1324 if ((fa->fsx_xflags & FS_XFLAG_PROJINHERIT) !=
23bd0735
DC
1325 (ip->i_d.di_flags & XFS_DIFLAG_PROJINHERIT))
1326 return -EINVAL;
1327
1328 return 0;
1329}
25fe55e8
CH
1330
1331STATIC int
1332xfs_ioctl_setattr(
1333 xfs_inode_t *ip,
fd179b9c 1334 struct fsxattr *fa)
25fe55e8
CH
1335{
1336 struct xfs_mount *mp = ip->i_mount;
1337 struct xfs_trans *tp;
7d095257 1338 struct xfs_dquot *udqp = NULL;
92f8ff73 1339 struct xfs_dquot *pdqp = NULL;
25fe55e8
CH
1340 struct xfs_dquot *olddquot = NULL;
1341 int code;
3a6a854a 1342 int join_flags = 0;
25fe55e8 1343
cca28fb8 1344 trace_xfs_ioctl_setattr(ip);
25fe55e8 1345
23bd0735
DC
1346 code = xfs_ioctl_setattr_check_projid(ip, fa);
1347 if (code)
1348 return code;
23963e54 1349
25fe55e8
CH
1350 /*
1351 * If disk quotas is on, we make sure that the dquots do exist on disk,
1352 * before we start any other transactions. Trying to do this later
1353 * is messy. We don't care to take a readlock to look at the ids
1354 * in inode here, because we can't hold it across the trans_reserve.
1355 * If the IDs do change before we take the ilock, we're covered
1356 * because the i_*dquot fields will get updated anyway.
1357 */
fd179b9c 1358 if (XFS_IS_QUOTA_ON(mp)) {
7d095257 1359 code = xfs_qm_vop_dqalloc(ip, ip->i_d.di_uid,
25fe55e8 1360 ip->i_d.di_gid, fa->fsx_projid,
92f8ff73 1361 XFS_QMOPT_PQUOTA, &udqp, NULL, &pdqp);
25fe55e8
CH
1362 if (code)
1363 return code;
1364 }
1365
3a6a854a
DC
1366 /*
1367 * Changing DAX config may require inode locking for mapping
1368 * invalidation. These need to be held all the way to transaction commit
1369 * or cancel time, so need to be passed through to
1370 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1371 * appropriately.
1372 */
1373 code = xfs_ioctl_setattr_dax_invalidate(ip, fa, &join_flags);
1374 if (code)
1375 goto error_free_dquots;
1376
1377 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
8f3d17ab
DC
1378 if (IS_ERR(tp)) {
1379 code = PTR_ERR(tp);
1380 goto error_free_dquots;
25fe55e8
CH
1381 }
1382
25fe55e8 1383
fd179b9c
DC
1384 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp) &&
1385 xfs_get_projid(ip) != fa->fsx_projid) {
1386 code = xfs_qm_vop_chown_reserve(tp, ip, udqp, NULL, pdqp,
1387 capable(CAP_FOWNER) ? XFS_QMOPT_FORCE_RES : 0);
1388 if (code) /* out of quota */
d4388d3c 1389 goto error_trans_cancel;
25fe55e8
CH
1390 }
1391
d4388d3c
DC
1392 code = xfs_ioctl_setattr_check_extsize(ip, fa);
1393 if (code)
1394 goto error_trans_cancel;
25fe55e8 1395
f7ca3522
DW
1396 code = xfs_ioctl_setattr_check_cowextsize(ip, fa);
1397 if (code)
1398 goto error_trans_cancel;
1399
29a17c00
DC
1400 code = xfs_ioctl_setattr_xflags(tp, ip, fa);
1401 if (code)
d4388d3c 1402 goto error_trans_cancel;
25fe55e8
CH
1403
1404 /*
fd179b9c
DC
1405 * Change file ownership. Must be the owner or privileged. CAP_FSETID
1406 * overrides the following restrictions:
1407 *
1408 * The set-user-ID and set-group-ID bits of a file will be cleared upon
1409 * successful return from chown()
25fe55e8 1410 */
25fe55e8 1411
c19b3b05 1412 if ((VFS_I(ip)->i_mode & (S_ISUID|S_ISGID)) &&
fd179b9c 1413 !capable_wrt_inode_uidgid(VFS_I(ip), CAP_FSETID))
c19b3b05 1414 VFS_I(ip)->i_mode &= ~(S_ISUID|S_ISGID);
25fe55e8 1415
fd179b9c
DC
1416 /* Change the ownerships and register project quota modifications */
1417 if (xfs_get_projid(ip) != fa->fsx_projid) {
1418 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp)) {
1419 olddquot = xfs_qm_vop_chown(tp, ip,
1420 &ip->i_pdquot, pdqp);
1421 }
1422 ASSERT(ip->i_d.di_version > 1);
1423 xfs_set_projid(ip, fa->fsx_projid);
f13fae2d 1424 }
25fe55e8 1425
a872703f
DC
1426 /*
1427 * Only set the extent size hint if we've already determined that the
1428 * extent size hint should be set on the inode. If no extent size flags
1429 * are set on the inode then unconditionally clear the extent size hint.
1430 */
fd179b9c
DC
1431 if (ip->i_d.di_flags & (XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT))
1432 ip->i_d.di_extsize = fa->fsx_extsize >> mp->m_sb.sb_blocklog;
1433 else
1434 ip->i_d.di_extsize = 0;
f7ca3522
DW
1435 if (ip->i_d.di_version == 3 &&
1436 (ip->i_d.di_flags2 & XFS_DIFLAG2_COWEXTSIZE))
1437 ip->i_d.di_cowextsize = fa->fsx_cowextsize >>
1438 mp->m_sb.sb_blocklog;
1439 else
1440 ip->i_d.di_cowextsize = 0;
25fe55e8 1441
70393313 1442 code = xfs_trans_commit(tp);
25fe55e8
CH
1443
1444 /*
1445 * Release any dquot(s) the inode had kept before chown.
1446 */
7d095257
CH
1447 xfs_qm_dqrele(olddquot);
1448 xfs_qm_dqrele(udqp);
92f8ff73 1449 xfs_qm_dqrele(pdqp);
25fe55e8 1450
288699fe 1451 return code;
25fe55e8 1452
d4388d3c 1453error_trans_cancel:
4906e215 1454 xfs_trans_cancel(tp);
8f3d17ab 1455error_free_dquots:
7d095257 1456 xfs_qm_dqrele(udqp);
92f8ff73 1457 xfs_qm_dqrele(pdqp);
25fe55e8
CH
1458 return code;
1459}
1460
1da177e4 1461STATIC int
df26cfe8 1462xfs_ioc_fssetxattr(
1da177e4
LT
1463 xfs_inode_t *ip,
1464 struct file *filp,
1da177e4
LT
1465 void __user *arg)
1466{
1467 struct fsxattr fa;
d9457dc0 1468 int error;
df26cfe8
LM
1469
1470 if (copy_from_user(&fa, arg, sizeof(fa)))
1471 return -EFAULT;
1da177e4 1472
d9457dc0
JK
1473 error = mnt_want_write_file(filp);
1474 if (error)
1475 return error;
fd179b9c 1476 error = xfs_ioctl_setattr(ip, &fa);
d9457dc0 1477 mnt_drop_write_file(filp);
2451337d 1478 return error;
df26cfe8 1479}
1da177e4 1480
df26cfe8
LM
1481STATIC int
1482xfs_ioc_getxflags(
1483 xfs_inode_t *ip,
1484 void __user *arg)
1485{
1486 unsigned int flags;
1da177e4 1487
df26cfe8
LM
1488 flags = xfs_di2lxflags(ip->i_d.di_flags);
1489 if (copy_to_user(arg, &flags, sizeof(flags)))
1490 return -EFAULT;
1491 return 0;
1492}
1da177e4 1493
df26cfe8
LM
1494STATIC int
1495xfs_ioc_setxflags(
f96291f6 1496 struct xfs_inode *ip,
df26cfe8
LM
1497 struct file *filp,
1498 void __user *arg)
1499{
f96291f6 1500 struct xfs_trans *tp;
25fe55e8 1501 struct fsxattr fa;
df26cfe8 1502 unsigned int flags;
3a6a854a 1503 int join_flags = 0;
f96291f6 1504 int error;
1da177e4 1505
df26cfe8
LM
1506 if (copy_from_user(&flags, arg, sizeof(flags)))
1507 return -EFAULT;
1da177e4 1508
df26cfe8
LM
1509 if (flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL | \
1510 FS_NOATIME_FL | FS_NODUMP_FL | \
1511 FS_SYNC_FL))
1512 return -EOPNOTSUPP;
1da177e4 1513
25fe55e8 1514 fa.fsx_xflags = xfs_merge_ioc_xflags(flags, xfs_ip2xflags(ip));
1da177e4 1515
d9457dc0
JK
1516 error = mnt_want_write_file(filp);
1517 if (error)
1518 return error;
f96291f6 1519
3a6a854a
DC
1520 /*
1521 * Changing DAX config may require inode locking for mapping
1522 * invalidation. These need to be held all the way to transaction commit
1523 * or cancel time, so need to be passed through to
1524 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1525 * appropriately.
1526 */
1527 error = xfs_ioctl_setattr_dax_invalidate(ip, &fa, &join_flags);
1528 if (error)
1529 goto out_drop_write;
1530
1531 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
f96291f6
DC
1532 if (IS_ERR(tp)) {
1533 error = PTR_ERR(tp);
1534 goto out_drop_write;
1535 }
1536
1537 error = xfs_ioctl_setattr_xflags(tp, ip, &fa);
1538 if (error) {
4906e215 1539 xfs_trans_cancel(tp);
f96291f6
DC
1540 goto out_drop_write;
1541 }
1542
70393313 1543 error = xfs_trans_commit(tp);
f96291f6 1544out_drop_write:
d9457dc0 1545 mnt_drop_write_file(filp);
2451337d 1546 return error;
1da177e4
LT
1547}
1548
232b5194
CH
1549static bool
1550xfs_getbmap_format(
1551 struct kgetbmap *p,
1552 struct getbmapx __user *u,
1553 size_t recsize)
8a7141a8 1554{
232b5194
CH
1555 if (put_user(p->bmv_offset, &u->bmv_offset) ||
1556 put_user(p->bmv_block, &u->bmv_block) ||
1557 put_user(p->bmv_length, &u->bmv_length) ||
1558 put_user(0, &u->bmv_count) ||
1559 put_user(0, &u->bmv_entries))
1560 return false;
1561 if (recsize < sizeof(struct getbmapx))
1562 return true;
1563 if (put_user(0, &u->bmv_iflags) ||
1564 put_user(p->bmv_oflags, &u->bmv_oflags) ||
1565 put_user(0, &u->bmv_unused1) ||
1566 put_user(0, &u->bmv_unused2))
1567 return false;
1568 return true;
8a7141a8
ES
1569}
1570
1da177e4
LT
1571STATIC int
1572xfs_ioc_getbmap(
8f3e2058 1573 struct file *file,
1da177e4
LT
1574 unsigned int cmd,
1575 void __user *arg)
1576{
be6324c0 1577 struct getbmapx bmx = { 0 };
232b5194
CH
1578 struct kgetbmap *buf;
1579 size_t recsize;
1580 int error, i;
1da177e4 1581
232b5194
CH
1582 switch (cmd) {
1583 case XFS_IOC_GETBMAPA:
1584 bmx.bmv_iflags = BMV_IF_ATTRFORK;
1585 /*FALLTHRU*/
1586 case XFS_IOC_GETBMAP:
1587 if (file->f_mode & FMODE_NOCMTIME)
1588 bmx.bmv_iflags |= BMV_IF_NO_DMAPI_READ;
1589 /* struct getbmap is a strict subset of struct getbmapx. */
1590 recsize = sizeof(struct getbmap);
1591 break;
1592 case XFS_IOC_GETBMAPX:
1593 recsize = sizeof(struct getbmapx);
1594 break;
1595 default:
b474c7ae 1596 return -EINVAL;
232b5194 1597 }
1da177e4 1598
232b5194 1599 if (copy_from_user(&bmx, arg, recsize))
b474c7ae 1600 return -EFAULT;
1da177e4
LT
1601
1602 if (bmx.bmv_count < 2)
b474c7ae 1603 return -EINVAL;
232b5194
CH
1604 if (bmx.bmv_count > ULONG_MAX / recsize)
1605 return -ENOMEM;
1da177e4 1606
232b5194
CH
1607 buf = kmem_zalloc_large(bmx.bmv_count * sizeof(*buf), 0);
1608 if (!buf)
1609 return -ENOMEM;
1da177e4 1610
232b5194 1611 error = xfs_getbmap(XFS_I(file_inode(file)), &bmx, buf);
1da177e4 1612 if (error)
232b5194 1613 goto out_free_buf;
1da177e4 1614
232b5194
CH
1615 error = -EFAULT;
1616 if (copy_to_user(arg, &bmx, recsize))
1617 goto out_free_buf;
1618 arg += recsize;
1619
1620 for (i = 0; i < bmx.bmv_entries; i++) {
1621 if (!xfs_getbmap_format(buf + i, arg, recsize))
1622 goto out_free_buf;
1623 arg += recsize;
1624 }
1da177e4 1625
232b5194
CH
1626 error = 0;
1627out_free_buf:
1628 kmem_free(buf);
1da177e4
LT
1629 return 0;
1630}
df26cfe8 1631
e89c0413
DW
1632struct getfsmap_info {
1633 struct xfs_mount *mp;
9d17e14c
CH
1634 struct fsmap_head __user *data;
1635 unsigned int idx;
e89c0413
DW
1636 __u32 last_flags;
1637};
1638
1639STATIC int
1640xfs_getfsmap_format(struct xfs_fsmap *xfm, void *priv)
1641{
1642 struct getfsmap_info *info = priv;
1643 struct fsmap fm;
1644
1645 trace_xfs_getfsmap_mapping(info->mp, xfm);
1646
1647 info->last_flags = xfm->fmr_flags;
1648 xfs_fsmap_from_internal(&fm, xfm);
9d17e14c
CH
1649 if (copy_to_user(&info->data->fmh_recs[info->idx++], &fm,
1650 sizeof(struct fsmap)))
e89c0413
DW
1651 return -EFAULT;
1652
e89c0413
DW
1653 return 0;
1654}
1655
1656STATIC int
1657xfs_ioc_getfsmap(
1658 struct xfs_inode *ip,
9d17e14c 1659 struct fsmap_head __user *arg)
e89c0413 1660{
ef2b67ec 1661 struct getfsmap_info info = { NULL };
e89c0413
DW
1662 struct xfs_fsmap_head xhead = {0};
1663 struct fsmap_head head;
1664 bool aborted = false;
1665 int error;
1666
1667 if (copy_from_user(&head, arg, sizeof(struct fsmap_head)))
1668 return -EFAULT;
1669 if (memchr_inv(head.fmh_reserved, 0, sizeof(head.fmh_reserved)) ||
1670 memchr_inv(head.fmh_keys[0].fmr_reserved, 0,
1671 sizeof(head.fmh_keys[0].fmr_reserved)) ||
1672 memchr_inv(head.fmh_keys[1].fmr_reserved, 0,
1673 sizeof(head.fmh_keys[1].fmr_reserved)))
1674 return -EINVAL;
1675
1676 xhead.fmh_iflags = head.fmh_iflags;
1677 xhead.fmh_count = head.fmh_count;
1678 xfs_fsmap_to_internal(&xhead.fmh_keys[0], &head.fmh_keys[0]);
1679 xfs_fsmap_to_internal(&xhead.fmh_keys[1], &head.fmh_keys[1]);
1680
1681 trace_xfs_getfsmap_low_key(ip->i_mount, &xhead.fmh_keys[0]);
1682 trace_xfs_getfsmap_high_key(ip->i_mount, &xhead.fmh_keys[1]);
1683
1684 info.mp = ip->i_mount;
9d17e14c 1685 info.data = arg;
e89c0413
DW
1686 error = xfs_getfsmap(ip->i_mount, &xhead, xfs_getfsmap_format, &info);
1687 if (error == XFS_BTREE_QUERY_RANGE_ABORT) {
1688 error = 0;
1689 aborted = true;
1690 } else if (error)
1691 return error;
1692
1693 /* If we didn't abort, set the "last" flag in the last fmx */
12e4a381 1694 if (!aborted && info.idx) {
e89c0413 1695 info.last_flags |= FMR_OF_LAST;
9d17e14c
CH
1696 if (copy_to_user(&info.data->fmh_recs[info.idx - 1].fmr_flags,
1697 &info.last_flags, sizeof(info.last_flags)))
e89c0413
DW
1698 return -EFAULT;
1699 }
1700
1701 /* copy back header */
1702 head.fmh_entries = xhead.fmh_entries;
1703 head.fmh_oflags = xhead.fmh_oflags;
1704 if (copy_to_user(arg, &head, sizeof(struct fsmap_head)))
1705 return -EFAULT;
1706
1707 return 0;
1708}
1709
36fd6e86
DW
1710STATIC int
1711xfs_ioc_scrub_metadata(
1712 struct xfs_inode *ip,
1713 void __user *arg)
1714{
1715 struct xfs_scrub_metadata scrub;
1716 int error;
1717
1718 if (!capable(CAP_SYS_ADMIN))
1719 return -EPERM;
1720
1721 if (copy_from_user(&scrub, arg, sizeof(scrub)))
1722 return -EFAULT;
1723
1724 error = xfs_scrub_metadata(ip, &scrub);
1725 if (error)
1726 return error;
1727
1728 if (copy_to_user(arg, &scrub, sizeof(scrub)))
1729 return -EFAULT;
1730
1731 return 0;
1732}
1733
a133d952
DC
1734int
1735xfs_ioc_swapext(
1736 xfs_swapext_t *sxp)
1737{
1738 xfs_inode_t *ip, *tip;
1739 struct fd f, tmp;
1740 int error = 0;
1741
1742 /* Pull information for the target fd */
1743 f = fdget((int)sxp->sx_fdtarget);
1744 if (!f.file) {
2451337d 1745 error = -EINVAL;
a133d952
DC
1746 goto out;
1747 }
1748
1749 if (!(f.file->f_mode & FMODE_WRITE) ||
1750 !(f.file->f_mode & FMODE_READ) ||
1751 (f.file->f_flags & O_APPEND)) {
2451337d 1752 error = -EBADF;
a133d952
DC
1753 goto out_put_file;
1754 }
1755
1756 tmp = fdget((int)sxp->sx_fdtmp);
1757 if (!tmp.file) {
2451337d 1758 error = -EINVAL;
a133d952
DC
1759 goto out_put_file;
1760 }
1761
1762 if (!(tmp.file->f_mode & FMODE_WRITE) ||
1763 !(tmp.file->f_mode & FMODE_READ) ||
1764 (tmp.file->f_flags & O_APPEND)) {
2451337d 1765 error = -EBADF;
a133d952
DC
1766 goto out_put_tmp_file;
1767 }
1768
1769 if (IS_SWAPFILE(file_inode(f.file)) ||
1770 IS_SWAPFILE(file_inode(tmp.file))) {
2451337d 1771 error = -EINVAL;
a133d952
DC
1772 goto out_put_tmp_file;
1773 }
1774
7f1b6245
JH
1775 /*
1776 * We need to ensure that the fds passed in point to XFS inodes
1777 * before we cast and access them as XFS structures as we have no
1778 * control over what the user passes us here.
1779 */
1780 if (f.file->f_op != &xfs_file_operations ||
1781 tmp.file->f_op != &xfs_file_operations) {
1782 error = -EINVAL;
1783 goto out_put_tmp_file;
1784 }
1785
a133d952
DC
1786 ip = XFS_I(file_inode(f.file));
1787 tip = XFS_I(file_inode(tmp.file));
1788
1789 if (ip->i_mount != tip->i_mount) {
2451337d 1790 error = -EINVAL;
a133d952
DC
1791 goto out_put_tmp_file;
1792 }
1793
1794 if (ip->i_ino == tip->i_ino) {
2451337d 1795 error = -EINVAL;
a133d952
DC
1796 goto out_put_tmp_file;
1797 }
1798
1799 if (XFS_FORCED_SHUTDOWN(ip->i_mount)) {
2451337d 1800 error = -EIO;
a133d952
DC
1801 goto out_put_tmp_file;
1802 }
1803
1804 error = xfs_swap_extents(ip, tip, sxp);
1805
1806 out_put_tmp_file:
1807 fdput(tmp);
1808 out_put_file:
1809 fdput(f);
1810 out:
1811 return error;
1812}
1813
4d4be482
CH
1814/*
1815 * Note: some of the ioctl's return positive numbers as a
1816 * byte count indicating success, such as readlink_by_handle.
1817 * So we don't "sign flip" like most other routines. This means
1818 * true errors need to be returned as a negative value.
1819 */
1820long
1821xfs_file_ioctl(
df26cfe8 1822 struct file *filp,
df26cfe8 1823 unsigned int cmd,
4d4be482 1824 unsigned long p)
df26cfe8 1825{
496ad9aa 1826 struct inode *inode = file_inode(filp);
4d4be482
CH
1827 struct xfs_inode *ip = XFS_I(inode);
1828 struct xfs_mount *mp = ip->i_mount;
1829 void __user *arg = (void __user *)p;
df26cfe8
LM
1830 int error;
1831
cca28fb8 1832 trace_xfs_file_ioctl(ip);
4d4be482
CH
1833
1834 switch (cmd) {
a46db608
CH
1835 case FITRIM:
1836 return xfs_ioc_trim(mp, arg);
df26cfe8
LM
1837 case XFS_IOC_ALLOCSP:
1838 case XFS_IOC_FREESP:
1839 case XFS_IOC_RESVSP:
1840 case XFS_IOC_UNRESVSP:
1841 case XFS_IOC_ALLOCSP64:
1842 case XFS_IOC_FREESP64:
1843 case XFS_IOC_RESVSP64:
44722352
DC
1844 case XFS_IOC_UNRESVSP64:
1845 case XFS_IOC_ZERO_RANGE: {
743bb465 1846 xfs_flock64_t bf;
df26cfe8 1847
743bb465 1848 if (copy_from_user(&bf, arg, sizeof(bf)))
b474c7ae 1849 return -EFAULT;
8f3e2058 1850 return xfs_ioc_space(filp, cmd, &bf);
743bb465 1851 }
df26cfe8
LM
1852 case XFS_IOC_DIOINFO: {
1853 struct dioattr da;
1854 xfs_buftarg_t *target =
1855 XFS_IS_REALTIME_INODE(ip) ?
1856 mp->m_rtdev_targp : mp->m_ddev_targp;
1857
7c71ee78 1858 da.d_mem = da.d_miniosz = target->bt_logical_sectorsize;
df26cfe8
LM
1859 da.d_maxiosz = INT_MAX & ~(da.d_miniosz - 1);
1860
1861 if (copy_to_user(arg, &da, sizeof(da)))
b474c7ae 1862 return -EFAULT;
df26cfe8
LM
1863 return 0;
1864 }
1865
1866 case XFS_IOC_FSBULKSTAT_SINGLE:
1867 case XFS_IOC_FSBULKSTAT:
1868 case XFS_IOC_FSINUMBERS:
1869 return xfs_ioc_bulkstat(mp, cmd, arg);
1870
1871 case XFS_IOC_FSGEOMETRY_V1:
1872 return xfs_ioc_fsgeometry_v1(mp, arg);
1873
1874 case XFS_IOC_FSGEOMETRY:
1875 return xfs_ioc_fsgeometry(mp, arg);
1876
1877 case XFS_IOC_GETVERSION:
1878 return put_user(inode->i_generation, (int __user *)arg);
1879
1880 case XFS_IOC_FSGETXATTR:
1881 return xfs_ioc_fsgetxattr(ip, 0, arg);
1882 case XFS_IOC_FSGETXATTRA:
1883 return xfs_ioc_fsgetxattr(ip, 1, arg);
65e67f51
LM
1884 case XFS_IOC_FSSETXATTR:
1885 return xfs_ioc_fssetxattr(ip, filp, arg);
df26cfe8 1886 case XFS_IOC_GETXFLAGS:
65e67f51 1887 return xfs_ioc_getxflags(ip, arg);
df26cfe8 1888 case XFS_IOC_SETXFLAGS:
65e67f51 1889 return xfs_ioc_setxflags(ip, filp, arg);
df26cfe8
LM
1890
1891 case XFS_IOC_FSSETDM: {
1892 struct fsdmidata dmi;
1893
1894 if (copy_from_user(&dmi, arg, sizeof(dmi)))
b474c7ae 1895 return -EFAULT;
df26cfe8 1896
d9457dc0
JK
1897 error = mnt_want_write_file(filp);
1898 if (error)
1899 return error;
1900
df26cfe8
LM
1901 error = xfs_set_dmattrs(ip, dmi.fsd_dmevmask,
1902 dmi.fsd_dmstate);
d9457dc0 1903 mnt_drop_write_file(filp);
2451337d 1904 return error;
df26cfe8
LM
1905 }
1906
1907 case XFS_IOC_GETBMAP:
1908 case XFS_IOC_GETBMAPA:
df26cfe8 1909 case XFS_IOC_GETBMAPX:
232b5194 1910 return xfs_ioc_getbmap(filp, cmd, arg);
df26cfe8 1911
e89c0413
DW
1912 case FS_IOC_GETFSMAP:
1913 return xfs_ioc_getfsmap(ip, arg);
1914
36fd6e86
DW
1915 case XFS_IOC_SCRUB_METADATA:
1916 return xfs_ioc_scrub_metadata(ip, arg);
1917
df26cfe8
LM
1918 case XFS_IOC_FD_TO_HANDLE:
1919 case XFS_IOC_PATH_TO_HANDLE:
743bb465 1920 case XFS_IOC_PATH_TO_FSHANDLE: {
1921 xfs_fsop_handlereq_t hreq;
df26cfe8 1922
743bb465 1923 if (copy_from_user(&hreq, arg, sizeof(hreq)))
b474c7ae 1924 return -EFAULT;
743bb465 1925 return xfs_find_handle(cmd, &hreq);
1926 }
1927 case XFS_IOC_OPEN_BY_HANDLE: {
1928 xfs_fsop_handlereq_t hreq;
df26cfe8 1929
743bb465 1930 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1931 return -EFAULT;
d296d30a 1932 return xfs_open_by_handle(filp, &hreq);
743bb465 1933 }
df26cfe8 1934 case XFS_IOC_FSSETDM_BY_HANDLE:
d296d30a 1935 return xfs_fssetdm_by_handle(filp, arg);
df26cfe8 1936
743bb465 1937 case XFS_IOC_READLINK_BY_HANDLE: {
1938 xfs_fsop_handlereq_t hreq;
df26cfe8 1939
743bb465 1940 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1941 return -EFAULT;
d296d30a 1942 return xfs_readlink_by_handle(filp, &hreq);
743bb465 1943 }
df26cfe8 1944 case XFS_IOC_ATTRLIST_BY_HANDLE:
d296d30a 1945 return xfs_attrlist_by_handle(filp, arg);
df26cfe8
LM
1946
1947 case XFS_IOC_ATTRMULTI_BY_HANDLE:
d296d30a 1948 return xfs_attrmulti_by_handle(filp, arg);
df26cfe8
LM
1949
1950 case XFS_IOC_SWAPEXT: {
743bb465 1951 struct xfs_swapext sxp;
1952
1953 if (copy_from_user(&sxp, arg, sizeof(xfs_swapext_t)))
b474c7ae 1954 return -EFAULT;
d9457dc0
JK
1955 error = mnt_want_write_file(filp);
1956 if (error)
1957 return error;
a133d952 1958 error = xfs_ioc_swapext(&sxp);
d9457dc0 1959 mnt_drop_write_file(filp);
2451337d 1960 return error;
df26cfe8
LM
1961 }
1962
1963 case XFS_IOC_FSCOUNTS: {
1964 xfs_fsop_counts_t out;
1965
1966 error = xfs_fs_counts(mp, &out);
1967 if (error)
2451337d 1968 return error;
df26cfe8
LM
1969
1970 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1971 return -EFAULT;
df26cfe8
LM
1972 return 0;
1973 }
1974
1975 case XFS_IOC_SET_RESBLKS: {
1976 xfs_fsop_resblks_t inout;
c8ce540d 1977 uint64_t in;
df26cfe8
LM
1978
1979 if (!capable(CAP_SYS_ADMIN))
1980 return -EPERM;
1981
d5db0f97 1982 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 1983 return -EROFS;
d5db0f97 1984
df26cfe8 1985 if (copy_from_user(&inout, arg, sizeof(inout)))
b474c7ae 1986 return -EFAULT;
df26cfe8 1987
d9457dc0
JK
1988 error = mnt_want_write_file(filp);
1989 if (error)
1990 return error;
1991
df26cfe8
LM
1992 /* input parameter is passed in resblks field of structure */
1993 in = inout.resblks;
1994 error = xfs_reserve_blocks(mp, &in, &inout);
d9457dc0 1995 mnt_drop_write_file(filp);
df26cfe8 1996 if (error)
2451337d 1997 return error;
df26cfe8
LM
1998
1999 if (copy_to_user(arg, &inout, sizeof(inout)))
b474c7ae 2000 return -EFAULT;
df26cfe8
LM
2001 return 0;
2002 }
2003
2004 case XFS_IOC_GET_RESBLKS: {
2005 xfs_fsop_resblks_t out;
2006
2007 if (!capable(CAP_SYS_ADMIN))
2008 return -EPERM;
2009
2010 error = xfs_reserve_blocks(mp, NULL, &out);
2011 if (error)
2451337d 2012 return error;
df26cfe8
LM
2013
2014 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 2015 return -EFAULT;
df26cfe8
LM
2016
2017 return 0;
2018 }
2019
2020 case XFS_IOC_FSGROWFSDATA: {
2021 xfs_growfs_data_t in;
2022
df26cfe8 2023 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2024 return -EFAULT;
df26cfe8 2025
d9457dc0
JK
2026 error = mnt_want_write_file(filp);
2027 if (error)
2028 return error;
df26cfe8 2029 error = xfs_growfs_data(mp, &in);
d9457dc0 2030 mnt_drop_write_file(filp);
2451337d 2031 return error;
df26cfe8
LM
2032 }
2033
2034 case XFS_IOC_FSGROWFSLOG: {
2035 xfs_growfs_log_t in;
2036
df26cfe8 2037 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2038 return -EFAULT;
df26cfe8 2039
d9457dc0
JK
2040 error = mnt_want_write_file(filp);
2041 if (error)
2042 return error;
df26cfe8 2043 error = xfs_growfs_log(mp, &in);
d9457dc0 2044 mnt_drop_write_file(filp);
2451337d 2045 return error;
df26cfe8
LM
2046 }
2047
2048 case XFS_IOC_FSGROWFSRT: {
2049 xfs_growfs_rt_t in;
2050
df26cfe8 2051 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2052 return -EFAULT;
df26cfe8 2053
d9457dc0
JK
2054 error = mnt_want_write_file(filp);
2055 if (error)
2056 return error;
df26cfe8 2057 error = xfs_growfs_rt(mp, &in);
d9457dc0 2058 mnt_drop_write_file(filp);
2451337d 2059 return error;
df26cfe8
LM
2060 }
2061
df26cfe8 2062 case XFS_IOC_GOINGDOWN: {
c8ce540d 2063 uint32_t in;
df26cfe8
LM
2064
2065 if (!capable(CAP_SYS_ADMIN))
2066 return -EPERM;
2067
c8ce540d 2068 if (get_user(in, (uint32_t __user *)arg))
b474c7ae 2069 return -EFAULT;
df26cfe8 2070
2451337d 2071 return xfs_fs_goingdown(mp, in);
df26cfe8
LM
2072 }
2073
2074 case XFS_IOC_ERROR_INJECTION: {
2075 xfs_error_injection_t in;
2076
2077 if (!capable(CAP_SYS_ADMIN))
2078 return -EPERM;
2079
2080 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2081 return -EFAULT;
df26cfe8 2082
31965ef3 2083 return xfs_errortag_add(mp, in.errtag);
df26cfe8
LM
2084 }
2085
2086 case XFS_IOC_ERROR_CLEARALL:
2087 if (!capable(CAP_SYS_ADMIN))
2088 return -EPERM;
2089
31965ef3 2090 return xfs_errortag_clearall(mp);
df26cfe8 2091
8ca149de 2092 case XFS_IOC_FREE_EOFBLOCKS: {
b9fe5052
DE
2093 struct xfs_fs_eofblocks eofb;
2094 struct xfs_eofblocks keofb;
8ca149de 2095
8c567a7f
DE
2096 if (!capable(CAP_SYS_ADMIN))
2097 return -EPERM;
2098
2099 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 2100 return -EROFS;
8c567a7f 2101
8ca149de 2102 if (copy_from_user(&eofb, arg, sizeof(eofb)))
b474c7ae 2103 return -EFAULT;
8ca149de 2104
b9fe5052
DE
2105 error = xfs_fs_eofblocks_from_user(&eofb, &keofb);
2106 if (error)
2451337d 2107 return error;
8ca149de 2108
2451337d 2109 return xfs_icache_free_eofblocks(mp, &keofb);
8ca149de
BF
2110 }
2111
df26cfe8
LM
2112 default:
2113 return -ENOTTY;
2114 }
2115}