Merge tag 'integrity-v5.8-fix' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar...
[linux-2.6-block.git] / fs / xfs / xfs_ioctl.c
CommitLineData
0b61f8a4 1// SPDX-License-Identifier: GPL-2.0
1da177e4 2/*
7b718769
NS
3 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
4 * All Rights Reserved.
1da177e4 5 */
1da177e4 6#include "xfs.h"
1da177e4 7#include "xfs_fs.h"
70a9883c 8#include "xfs_shared.h"
239880ef
DC
9#include "xfs_format.h"
10#include "xfs_log_format.h"
11#include "xfs_trans_resv.h"
1da177e4 12#include "xfs_mount.h"
1da177e4 13#include "xfs_inode.h"
1da177e4 14#include "xfs_rtalloc.h"
2810bd68 15#include "xfs_iwalk.h"
1da177e4 16#include "xfs_itable.h"
a844f451 17#include "xfs_error.h"
1da177e4 18#include "xfs_attr.h"
a844f451 19#include "xfs_bmap.h"
68988114 20#include "xfs_bmap_util.h"
1da177e4 21#include "xfs_fsops.h"
a46db608 22#include "xfs_discard.h"
25fe55e8 23#include "xfs_quota.h"
d296d30a 24#include "xfs_export.h"
0b1b213f 25#include "xfs_trace.h"
8ca149de 26#include "xfs_icache.h"
a4fbe6ab 27#include "xfs_trans.h"
47e1bf64 28#include "xfs_acl.h"
e89c0413
DW
29#include "xfs_btree.h"
30#include <linux/fsmap.h>
31#include "xfs_fsmap.h"
36fd6e86 32#include "scrub/xfs_scrub.h"
c368ebcd 33#include "xfs_sb.h"
7cd5006b 34#include "xfs_ag.h"
c23232d4 35#include "xfs_health.h"
7a42c70e 36#include "xfs_reflink.h"
5f213ddb 37#include "xfs_ioctl.h"
a2544622
CH
38#include "xfs_da_format.h"
39#include "xfs_da_btree.h"
1da177e4 40
1da177e4
LT
41#include <linux/mount.h>
42#include <linux/namei.h>
1da177e4
LT
43
44/*
45 * xfs_find_handle maps from userspace xfs_fsop_handlereq structure to
46 * a file or fs handle.
47 *
48 * XFS_IOC_PATH_TO_FSHANDLE
49 * returns fs handle for a mount point or path within that mount point
50 * XFS_IOC_FD_TO_HANDLE
51 * returns full handle for a FD opened in user space
52 * XFS_IOC_PATH_TO_HANDLE
53 * returns full handle for a path
54 */
d5547f9f 55int
1da177e4
LT
56xfs_find_handle(
57 unsigned int cmd,
743bb465 58 xfs_fsop_handlereq_t *hreq)
1da177e4
LT
59{
60 int hsize;
61 xfs_handle_t handle;
1da177e4 62 struct inode *inode;
a30b0367 63 struct fd f = {NULL};
4346cdd4 64 struct path path;
2903ff01 65 int error;
4346cdd4 66 struct xfs_inode *ip;
1da177e4 67
4346cdd4 68 if (cmd == XFS_IOC_FD_TO_HANDLE) {
2903ff01
AV
69 f = fdget(hreq->fd);
70 if (!f.file)
4346cdd4 71 return -EBADF;
496ad9aa 72 inode = file_inode(f.file);
4346cdd4 73 } else {
ce6595a2 74 error = user_path_at(AT_FDCWD, hreq->path, 0, &path);
4346cdd4
CH
75 if (error)
76 return error;
2b0143b5 77 inode = d_inode(path.dentry);
1da177e4 78 }
4346cdd4
CH
79 ip = XFS_I(inode);
80
81 /*
82 * We can only generate handles for inodes residing on a XFS filesystem,
83 * and only for regular files, directories or symbolic links.
84 */
85 error = -EINVAL;
86 if (inode->i_sb->s_magic != XFS_SB_MAGIC)
87 goto out_put;
88
89 error = -EBADF;
90 if (!S_ISREG(inode->i_mode) &&
91 !S_ISDIR(inode->i_mode) &&
92 !S_ISLNK(inode->i_mode))
93 goto out_put;
94
95
96 memcpy(&handle.ha_fsid, ip->i_mount->m_fixedfsid, sizeof(xfs_fsid_t));
97
98 if (cmd == XFS_IOC_PATH_TO_FSHANDLE) {
99 /*
100 * This handle only contains an fsid, zero the rest.
101 */
102 memset(&handle.ha_fid, 0, sizeof(handle.ha_fid));
103 hsize = sizeof(xfs_fsid_t);
104 } else {
c6143911
CH
105 handle.ha_fid.fid_len = sizeof(xfs_fid_t) -
106 sizeof(handle.ha_fid.fid_len);
107 handle.ha_fid.fid_pad = 0;
9e9a2674 108 handle.ha_fid.fid_gen = inode->i_generation;
c6143911 109 handle.ha_fid.fid_ino = ip->i_ino;
3398a400 110 hsize = sizeof(xfs_handle_t);
1da177e4
LT
111 }
112
4346cdd4 113 error = -EFAULT;
743bb465 114 if (copy_to_user(hreq->ohandle, &handle, hsize) ||
4346cdd4
CH
115 copy_to_user(hreq->ohandlen, &hsize, sizeof(__s32)))
116 goto out_put;
1da177e4 117
4346cdd4
CH
118 error = 0;
119
120 out_put:
121 if (cmd == XFS_IOC_FD_TO_HANDLE)
2903ff01 122 fdput(f);
4346cdd4
CH
123 else
124 path_put(&path);
125 return error;
1da177e4
LT
126}
127
1da177e4 128/*
d296d30a
CH
129 * No need to do permission checks on the various pathname components
130 * as the handle operations are privileged.
1da177e4
LT
131 */
132STATIC int
d296d30a
CH
133xfs_handle_acceptable(
134 void *context,
135 struct dentry *dentry)
136{
137 return 1;
138}
139
140/*
141 * Convert userspace handle data into a dentry.
142 */
143struct dentry *
144xfs_handle_to_dentry(
145 struct file *parfilp,
146 void __user *uhandle,
147 u32 hlen)
1da177e4 148{
1da177e4 149 xfs_handle_t handle;
d296d30a 150 struct xfs_fid64 fid;
1da177e4
LT
151
152 /*
153 * Only allow handle opens under a directory.
154 */
496ad9aa 155 if (!S_ISDIR(file_inode(parfilp)->i_mode))
d296d30a
CH
156 return ERR_PTR(-ENOTDIR);
157
158 if (hlen != sizeof(xfs_handle_t))
159 return ERR_PTR(-EINVAL);
160 if (copy_from_user(&handle, uhandle, hlen))
161 return ERR_PTR(-EFAULT);
162 if (handle.ha_fid.fid_len !=
163 sizeof(handle.ha_fid) - sizeof(handle.ha_fid.fid_len))
164 return ERR_PTR(-EINVAL);
165
166 memset(&fid, 0, sizeof(struct fid));
167 fid.ino = handle.ha_fid.fid_ino;
168 fid.gen = handle.ha_fid.fid_gen;
169
170 return exportfs_decode_fh(parfilp->f_path.mnt, (struct fid *)&fid, 3,
171 FILEID_INO32_GEN | XFS_FILEID_TYPE_64FLAG,
172 xfs_handle_acceptable, NULL);
173}
1da177e4 174
d296d30a
CH
175STATIC struct dentry *
176xfs_handlereq_to_dentry(
177 struct file *parfilp,
178 xfs_fsop_handlereq_t *hreq)
179{
180 return xfs_handle_to_dentry(parfilp, hreq->ihandle, hreq->ihandlen);
1da177e4
LT
181}
182
d5547f9f 183int
1da177e4 184xfs_open_by_handle(
1da177e4 185 struct file *parfilp,
d296d30a 186 xfs_fsop_handlereq_t *hreq)
1da177e4 187{
745ca247 188 const struct cred *cred = current_cred();
1da177e4 189 int error;
d296d30a 190 int fd;
1da177e4
LT
191 int permflag;
192 struct file *filp;
193 struct inode *inode;
194 struct dentry *dentry;
1a1d7724 195 fmode_t fmode;
765927b2 196 struct path path;
1da177e4
LT
197
198 if (!capable(CAP_SYS_ADMIN))
b474c7ae 199 return -EPERM;
1da177e4 200
d296d30a
CH
201 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
202 if (IS_ERR(dentry))
203 return PTR_ERR(dentry);
2b0143b5 204 inode = d_inode(dentry);
1da177e4
LT
205
206 /* Restrict xfs_open_by_handle to directories & regular files. */
207 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) {
b474c7ae 208 error = -EPERM;
d296d30a 209 goto out_dput;
1da177e4
LT
210 }
211
212#if BITS_PER_LONG != 32
743bb465 213 hreq->oflags |= O_LARGEFILE;
1da177e4 214#endif
d296d30a 215
743bb465 216 permflag = hreq->oflags;
1a1d7724 217 fmode = OPEN_FMODE(permflag);
1da177e4 218 if ((!(permflag & O_APPEND) || (permflag & O_TRUNC)) &&
1a1d7724 219 (fmode & FMODE_WRITE) && IS_APPEND(inode)) {
b474c7ae 220 error = -EPERM;
d296d30a 221 goto out_dput;
1da177e4
LT
222 }
223
1a1d7724 224 if ((fmode & FMODE_WRITE) && IS_IMMUTABLE(inode)) {
337684a1 225 error = -EPERM;
d296d30a 226 goto out_dput;
1da177e4
LT
227 }
228
229 /* Can't write directories. */
1a1d7724 230 if (S_ISDIR(inode->i_mode) && (fmode & FMODE_WRITE)) {
b474c7ae 231 error = -EISDIR;
d296d30a 232 goto out_dput;
1da177e4
LT
233 }
234
862a6293 235 fd = get_unused_fd_flags(0);
d296d30a
CH
236 if (fd < 0) {
237 error = fd;
238 goto out_dput;
1da177e4
LT
239 }
240
765927b2
AV
241 path.mnt = parfilp->f_path.mnt;
242 path.dentry = dentry;
243 filp = dentry_open(&path, hreq->oflags, cred);
244 dput(dentry);
1da177e4 245 if (IS_ERR(filp)) {
d296d30a
CH
246 put_unused_fd(fd);
247 return PTR_ERR(filp);
1da177e4 248 }
4d4be482 249
03209378 250 if (S_ISREG(inode->i_mode)) {
2e2e7bb1 251 filp->f_flags |= O_NOATIME;
4d4be482 252 filp->f_mode |= FMODE_NOCMTIME;
2e2e7bb1 253 }
1da177e4 254
d296d30a
CH
255 fd_install(fd, filp);
256 return fd;
257
258 out_dput:
259 dput(dentry);
260 return error;
1da177e4
LT
261}
262
d5547f9f 263int
1da177e4 264xfs_readlink_by_handle(
d296d30a
CH
265 struct file *parfilp,
266 xfs_fsop_handlereq_t *hreq)
1da177e4 267{
d296d30a 268 struct dentry *dentry;
1da177e4 269 __u32 olen;
804c83c3 270 int error;
1da177e4
LT
271
272 if (!capable(CAP_SYS_ADMIN))
b474c7ae 273 return -EPERM;
1da177e4 274
d296d30a
CH
275 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
276 if (IS_ERR(dentry))
277 return PTR_ERR(dentry);
1da177e4
LT
278
279 /* Restrict this handle operation to symlinks only. */
fd4a0edf 280 if (!d_is_symlink(dentry)) {
b474c7ae 281 error = -EINVAL;
d296d30a 282 goto out_dput;
1da177e4
LT
283 }
284
743bb465 285 if (copy_from_user(&olen, hreq->ohandlen, sizeof(__u32))) {
b474c7ae 286 error = -EFAULT;
d296d30a 287 goto out_dput;
1da177e4 288 }
1da177e4 289
fd4a0edf 290 error = vfs_readlink(dentry, hreq->ohandle, olen);
67fcaa73 291
d296d30a
CH
292 out_dput:
293 dput(dentry);
804c83c3 294 return error;
1da177e4
LT
295}
296
3e7a7799
CH
297/*
298 * Format an attribute and copy it out to the user's buffer.
299 * Take care to check values and protect against them changing later,
300 * we may be reading them directly out of a user buffer.
301 */
302static void
303xfs_ioc_attr_put_listent(
304 struct xfs_attr_list_context *context,
305 int flags,
306 unsigned char *name,
307 int namelen,
308 int valuelen)
309{
310 struct xfs_attrlist *alist = context->buffer;
311 struct xfs_attrlist_ent *aep;
312 int arraytop;
313
314 ASSERT(!context->seen_enough);
315 ASSERT(context->count >= 0);
316 ASSERT(context->count < (ATTR_MAX_VALUELEN/8));
317 ASSERT(context->firstu >= sizeof(*alist));
318 ASSERT(context->firstu <= context->bufsize);
319
320 /*
321 * Only list entries in the right namespace.
322 */
d5f0f49a 323 if (context->attr_filter != (flags & XFS_ATTR_NSP_ONDISK_MASK))
3e7a7799
CH
324 return;
325
326 arraytop = sizeof(*alist) +
327 context->count * sizeof(alist->al_offset[0]);
328
329 /* decrement by the actual bytes used by the attr */
330 context->firstu -= round_up(offsetof(struct xfs_attrlist_ent, a_name) +
331 namelen + 1, sizeof(uint32_t));
332 if (context->firstu < arraytop) {
333 trace_xfs_attr_list_full(context);
334 alist->al_more = 1;
335 context->seen_enough = 1;
336 return;
337 }
338
339 aep = context->buffer + context->firstu;
340 aep->a_valuelen = valuelen;
341 memcpy(aep->a_name, name, namelen);
342 aep->a_name[namelen] = 0;
343 alist->al_offset[context->count++] = context->firstu;
344 alist->al_count = context->count;
345 trace_xfs_attr_list_add(context);
346}
347
d5f0f49a
CH
348static unsigned int
349xfs_attr_filter(
350 u32 ioc_flags)
351{
352 if (ioc_flags & XFS_IOC_ATTR_ROOT)
353 return XFS_ATTR_ROOT;
354 if (ioc_flags & XFS_IOC_ATTR_SECURE)
355 return XFS_ATTR_SECURE;
356 return 0;
357}
358
359static unsigned int
360xfs_attr_flags(
361 u32 ioc_flags)
362{
363 if (ioc_flags & XFS_IOC_ATTR_CREATE)
364 return XATTR_CREATE;
365 if (ioc_flags & XFS_IOC_ATTR_REPLACE)
366 return XATTR_REPLACE;
367 return 0;
368}
369
3e7a7799
CH
370int
371xfs_ioc_attr_list(
372 struct xfs_inode *dp,
eb241c74 373 void __user *ubuf,
3e7a7799
CH
374 int bufsize,
375 int flags,
53ac39fd 376 struct xfs_attrlist_cursor __user *ucursor)
3e7a7799 377{
e3a19cde 378 struct xfs_attr_list_context context = { };
3e7a7799 379 struct xfs_attrlist *alist;
eb241c74 380 void *buffer;
3e7a7799
CH
381 int error;
382
f6046319
CH
383 if (bufsize < sizeof(struct xfs_attrlist) ||
384 bufsize > XFS_XATTR_LIST_MAX)
385 return -EINVAL;
386
387 /*
388 * Reject flags, only allow namespaces.
389 */
d5f0f49a 390 if (flags & ~(XFS_IOC_ATTR_ROOT | XFS_IOC_ATTR_SECURE))
f6046319 391 return -EINVAL;
d5f0f49a 392 if (flags == (XFS_IOC_ATTR_ROOT | XFS_IOC_ATTR_SECURE))
f6046319
CH
393 return -EINVAL;
394
3e7a7799
CH
395 /*
396 * Validate the cursor.
397 */
e3a19cde 398 if (copy_from_user(&context.cursor, ucursor, sizeof(context.cursor)))
53ac39fd 399 return -EFAULT;
e3a19cde 400 if (context.cursor.pad1 || context.cursor.pad2)
3e7a7799 401 return -EINVAL;
e3a19cde
CH
402 if (!context.cursor.initted &&
403 (context.cursor.hashval || context.cursor.blkno ||
404 context.cursor.offset))
3e7a7799
CH
405 return -EINVAL;
406
eb241c74
CH
407 buffer = kmem_zalloc_large(bufsize, 0);
408 if (!buffer)
409 return -ENOMEM;
3e7a7799
CH
410
411 /*
412 * Initialize the output buffer.
413 */
3e7a7799 414 context.dp = dp;
3e7a7799 415 context.resynch = 1;
d5f0f49a 416 context.attr_filter = xfs_attr_filter(flags);
3e7a7799 417 context.buffer = buffer;
f311d771 418 context.bufsize = round_down(bufsize, sizeof(uint32_t));
3e7a7799
CH
419 context.firstu = context.bufsize;
420 context.put_listent = xfs_ioc_attr_put_listent;
421
422 alist = context.buffer;
423 alist->al_count = 0;
424 alist->al_more = 0;
425 alist->al_offset[0] = context.bufsize;
426
17e1dd83 427 error = xfs_attr_list(&context);
eb241c74
CH
428 if (error)
429 goto out_free;
430
53ac39fd 431 if (copy_to_user(ubuf, buffer, bufsize) ||
e3a19cde 432 copy_to_user(ucursor, &context.cursor, sizeof(context.cursor)))
eb241c74
CH
433 error = -EFAULT;
434out_free:
435 kmem_free(buffer);
3e7a7799
CH
436 return error;
437}
438
1da177e4
LT
439STATIC int
440xfs_attrlist_by_handle(
d296d30a 441 struct file *parfilp,
53ac39fd 442 struct xfs_fsop_attrlist_handlereq __user *p)
1da177e4 443{
53ac39fd 444 struct xfs_fsop_attrlist_handlereq al_hreq;
d296d30a 445 struct dentry *dentry;
53ac39fd 446 int error = -ENOMEM;
1da177e4
LT
447
448 if (!capable(CAP_SYS_ADMIN))
b474c7ae 449 return -EPERM;
53ac39fd 450 if (copy_from_user(&al_hreq, p, sizeof(al_hreq)))
b474c7ae 451 return -EFAULT;
90ad58a8 452
d296d30a
CH
453 dentry = xfs_handlereq_to_dentry(parfilp, &al_hreq.hreq);
454 if (IS_ERR(dentry))
455 return PTR_ERR(dentry);
1da177e4 456
eb241c74 457 error = xfs_ioc_attr_list(XFS_I(d_inode(dentry)), al_hreq.buffer,
53ac39fd 458 al_hreq.buflen, al_hreq.flags, &p->pos);
d296d30a
CH
459 dput(dentry);
460 return error;
1da177e4
LT
461}
462
d0ce6439 463static int
1da177e4 464xfs_attrmulti_attr_get(
739bfb2a 465 struct inode *inode,
a9273ca5
DC
466 unsigned char *name,
467 unsigned char __user *ubuf,
c8ce540d
DW
468 uint32_t *len,
469 uint32_t flags)
1da177e4 470{
e5171d7e
CH
471 struct xfs_da_args args = {
472 .dp = XFS_I(inode),
d5f0f49a
CH
473 .attr_filter = xfs_attr_filter(flags),
474 .attr_flags = xfs_attr_flags(flags),
e5171d7e
CH
475 .name = name,
476 .namelen = strlen(name),
477 .valuelen = *len,
478 };
479 int error;
e8b0ebaa 480
51fcbfe7 481 if (*len > XFS_XATTR_SIZE_MAX)
2451337d 482 return -EINVAL;
e5171d7e 483
e5171d7e 484 error = xfs_attr_get(&args);
1da177e4
LT
485 if (error)
486 goto out_kfree;
487
e5171d7e
CH
488 *len = args.valuelen;
489 if (copy_to_user(ubuf, args.value, args.valuelen))
2451337d 490 error = -EFAULT;
1da177e4 491
fdd3ccee 492out_kfree:
e5171d7e 493 kmem_free(args.value);
1da177e4
LT
494 return error;
495}
496
d0ce6439 497static int
1da177e4 498xfs_attrmulti_attr_set(
739bfb2a 499 struct inode *inode,
a9273ca5
DC
500 unsigned char *name,
501 const unsigned char __user *ubuf,
c8ce540d
DW
502 uint32_t len,
503 uint32_t flags)
1da177e4 504{
a2544622
CH
505 struct xfs_da_args args = {
506 .dp = XFS_I(inode),
d5f0f49a
CH
507 .attr_filter = xfs_attr_filter(flags),
508 .attr_flags = xfs_attr_flags(flags),
a2544622
CH
509 .name = name,
510 .namelen = strlen(name),
511 };
09cb22d2 512 int error;
1da177e4 513
739bfb2a 514 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 515 return -EPERM;
1da177e4 516
6cc4f4ff
CH
517 if (ubuf) {
518 if (len > XFS_XATTR_SIZE_MAX)
519 return -EINVAL;
a2544622
CH
520 args.value = memdup_user(ubuf, len);
521 if (IS_ERR(args.value))
522 return PTR_ERR(args.value);
523 args.valuelen = len;
6cc4f4ff 524 }
e8b0ebaa 525
a2544622 526 error = xfs_attr_set(&args);
d5f0f49a 527 if (!error && (flags & XFS_IOC_ATTR_ROOT))
5a3930e2 528 xfs_forget_acl(inode, name);
a2544622 529 kfree(args.value);
09cb22d2 530 return error;
1da177e4
LT
531}
532
d0ce6439
CH
533int
534xfs_ioc_attrmulti_one(
535 struct file *parfilp,
536 struct inode *inode,
537 uint32_t opcode,
538 void __user *uname,
539 void __user *value,
540 uint32_t *len,
541 uint32_t flags)
542{
543 unsigned char *name;
544 int error;
545
d5f0f49a 546 if ((flags & XFS_IOC_ATTR_ROOT) && (flags & XFS_IOC_ATTR_SECURE))
d0ce6439 547 return -EINVAL;
d0ce6439
CH
548
549 name = strndup_user(uname, MAXNAMELEN);
550 if (IS_ERR(name))
551 return PTR_ERR(name);
552
553 switch (opcode) {
554 case ATTR_OP_GET:
555 error = xfs_attrmulti_attr_get(inode, name, value, len, flags);
556 break;
557 case ATTR_OP_REMOVE:
558 value = NULL;
559 *len = 0;
560 /* fall through */
561 case ATTR_OP_SET:
562 error = mnt_want_write_file(parfilp);
563 if (error)
564 break;
565 error = xfs_attrmulti_attr_set(inode, name, value, *len, flags);
566 mnt_drop_write_file(parfilp);
567 break;
568 default:
569 error = -EINVAL;
570 break;
571 }
572
573 kfree(name);
574 return error;
575}
576
1da177e4
LT
577STATIC int
578xfs_attrmulti_by_handle(
42a74f20 579 struct file *parfilp,
d296d30a 580 void __user *arg)
1da177e4
LT
581{
582 int error;
583 xfs_attr_multiop_t *ops;
584 xfs_fsop_attrmulti_handlereq_t am_hreq;
d296d30a 585 struct dentry *dentry;
1da177e4 586 unsigned int i, size;
1da177e4
LT
587
588 if (!capable(CAP_SYS_ADMIN))
b474c7ae 589 return -EPERM;
1da177e4 590 if (copy_from_user(&am_hreq, arg, sizeof(xfs_fsop_attrmulti_handlereq_t)))
b474c7ae 591 return -EFAULT;
1da177e4 592
fda168c2
ZW
593 /* overflow check */
594 if (am_hreq.opcount >= INT_MAX / sizeof(xfs_attr_multiop_t))
595 return -E2BIG;
596
d296d30a
CH
597 dentry = xfs_handlereq_to_dentry(parfilp, &am_hreq.hreq);
598 if (IS_ERR(dentry))
599 return PTR_ERR(dentry);
1da177e4 600
2451337d 601 error = -E2BIG;
e182f57a 602 size = am_hreq.opcount * sizeof(xfs_attr_multiop_t);
1da177e4 603 if (!size || size > 16 * PAGE_SIZE)
d296d30a 604 goto out_dput;
1da177e4 605
0e639bde
LZ
606 ops = memdup_user(am_hreq.ops, size);
607 if (IS_ERR(ops)) {
2451337d 608 error = PTR_ERR(ops);
d296d30a 609 goto out_dput;
0e639bde 610 }
1da177e4 611
1da177e4
LT
612 error = 0;
613 for (i = 0; i < am_hreq.opcount; i++) {
d0ce6439
CH
614 ops[i].am_error = xfs_ioc_attrmulti_one(parfilp,
615 d_inode(dentry), ops[i].am_opcode,
616 ops[i].am_attrname, ops[i].am_attrvalue,
617 &ops[i].am_length, ops[i].am_flags);
1da177e4
LT
618 }
619
620 if (copy_to_user(am_hreq.ops, ops, size))
2451337d 621 error = -EFAULT;
1da177e4 622
1da177e4 623 kfree(ops);
d296d30a
CH
624 out_dput:
625 dput(dentry);
2451337d 626 return error;
1da177e4
LT
627}
628
d5547f9f 629int
1da177e4 630xfs_ioc_space(
1da177e4 631 struct file *filp,
743bb465 632 xfs_flock64_t *bf)
1da177e4 633{
8f3e2058
CH
634 struct inode *inode = file_inode(filp);
635 struct xfs_inode *ip = XFS_I(inode);
865e9446 636 struct iattr iattr;
837a6e7f 637 enum xfs_prealloc_flags flags = XFS_PREALLOC_CLEAR;
c63a8eae 638 uint iolock = XFS_IOLOCK_EXCL | XFS_MMAPLOCK_EXCL;
1da177e4
LT
639 int error;
640
f37ea149 641 if (inode->i_flags & (S_IMMUTABLE|S_APPEND))
b474c7ae 642 return -EPERM;
1da177e4 643
ad4a8ac4 644 if (!(filp->f_mode & FMODE_WRITE))
b474c7ae 645 return -EBADF;
1da177e4 646
f37ea149 647 if (!S_ISREG(inode->i_mode))
b474c7ae 648 return -EINVAL;
1da177e4 649
7a42c70e
CH
650 if (xfs_is_always_cow_inode(ip))
651 return -EOPNOTSUPP;
652
8add71ca
CH
653 if (filp->f_flags & O_DSYNC)
654 flags |= XFS_PREALLOC_SYNC;
8f3e2058 655 if (filp->f_mode & FMODE_NOCMTIME)
8add71ca
CH
656 flags |= XFS_PREALLOC_INVISIBLE;
657
d9457dc0
JK
658 error = mnt_want_write_file(filp);
659 if (error)
660 return error;
865e9446 661
781355c6 662 xfs_ilock(ip, iolock);
69eb5fa1 663 error = xfs_break_layouts(inode, &iolock, BREAK_UNMAP);
781355c6
CH
664 if (error)
665 goto out_unlock;
249bd908 666 inode_dio_wait(inode);
865e9446
CH
667
668 switch (bf->l_whence) {
669 case 0: /*SEEK_SET*/
670 break;
671 case 1: /*SEEK_CUR*/
672 bf->l_start += filp->f_pos;
673 break;
674 case 2: /*SEEK_END*/
675 bf->l_start += XFS_ISIZE(ip);
676 break;
677 default:
2451337d 678 error = -EINVAL;
865e9446
CH
679 goto out_unlock;
680 }
681
837a6e7f 682 if (bf->l_start < 0 || bf->l_start > inode->i_sb->s_maxbytes) {
2451337d 683 error = -EINVAL;
865e9446
CH
684 goto out_unlock;
685 }
686
837a6e7f
CH
687 if (bf->l_start > XFS_ISIZE(ip)) {
688 error = xfs_alloc_file_space(ip, XFS_ISIZE(ip),
689 bf->l_start - XFS_ISIZE(ip), 0);
690 if (error)
691 goto out_unlock;
865e9446
CH
692 }
693
837a6e7f
CH
694 iattr.ia_valid = ATTR_SIZE;
695 iattr.ia_size = bf->l_start;
696 error = xfs_vn_setattr_size(file_dentry(filp), &iattr);
865e9446
CH
697 if (error)
698 goto out_unlock;
699
8add71ca 700 error = xfs_update_prealloc_flags(ip, flags);
865e9446
CH
701
702out_unlock:
781355c6 703 xfs_iunlock(ip, iolock);
d9457dc0 704 mnt_drop_write_file(filp);
2451337d 705 return error;
1da177e4
LT
706}
707
2810bd68
DW
708/* Return 0 on success or positive error */
709int
8bfe9d18 710xfs_fsbulkstat_one_fmt(
7035f972
DW
711 struct xfs_ibulk *breq,
712 const struct xfs_bulkstat *bstat)
2810bd68 713{
7035f972
DW
714 struct xfs_bstat bs1;
715
716 xfs_bulkstat_to_bstat(breq->mp, &bs1, bstat);
717 if (copy_to_user(breq->ubuffer, &bs1, sizeof(bs1)))
2810bd68
DW
718 return -EFAULT;
719 return xfs_ibulk_advance(breq, sizeof(struct xfs_bstat));
720}
721
677717fb 722int
8bfe9d18 723xfs_fsinumbers_fmt(
5f19c7fc
DW
724 struct xfs_ibulk *breq,
725 const struct xfs_inumbers *igrp)
677717fb 726{
5f19c7fc
DW
727 struct xfs_inogrp ig1;
728
729 xfs_inumbers_to_inogrp(&ig1, igrp);
730 if (copy_to_user(breq->ubuffer, &ig1, sizeof(struct xfs_inogrp)))
677717fb
DW
731 return -EFAULT;
732 return xfs_ibulk_advance(breq, sizeof(struct xfs_inogrp));
733}
734
1da177e4 735STATIC int
8bfe9d18 736xfs_ioc_fsbulkstat(
1da177e4
LT
737 xfs_mount_t *mp,
738 unsigned int cmd,
739 void __user *arg)
740{
2810bd68
DW
741 struct xfs_fsop_bulkreq bulkreq;
742 struct xfs_ibulk breq = {
743 .mp = mp,
744 .ocount = 0,
745 };
746 xfs_ino_t lastino;
1da177e4
LT
747 int error;
748
749 /* done = 1 if there are more stats to get and if bulkstat */
750 /* should be called again (unused here, but used in dmapi) */
751
752 if (!capable(CAP_SYS_ADMIN))
753 return -EPERM;
754
755 if (XFS_FORCED_SHUTDOWN(mp))
b474c7ae 756 return -EIO;
1da177e4 757
6f71fb68 758 if (copy_from_user(&bulkreq, arg, sizeof(struct xfs_fsop_bulkreq)))
b474c7ae 759 return -EFAULT;
1da177e4 760
2810bd68 761 if (copy_from_user(&lastino, bulkreq.lastip, sizeof(__s64)))
b474c7ae 762 return -EFAULT;
1da177e4 763
2810bd68 764 if (bulkreq.icount <= 0)
b474c7ae 765 return -EINVAL;
1da177e4 766
cd57e594 767 if (bulkreq.ubuffer == NULL)
b474c7ae 768 return -EINVAL;
cd57e594 769
2810bd68
DW
770 breq.ubuffer = bulkreq.ubuffer;
771 breq.icount = bulkreq.icount;
772
773 /*
774 * FSBULKSTAT_SINGLE expects that *lastip contains the inode number
775 * that we want to stat. However, FSINUMBERS and FSBULKSTAT expect
776 * that *lastip contains either zero or the number of the last inode to
777 * be examined by the previous call and return results starting with
778 * the next inode after that. The new bulk request back end functions
779 * take the inode to start with, so we have to compute the startino
780 * parameter from lastino to maintain correct function. lastino == 0
781 * is a special case because it has traditionally meant "first inode
782 * in filesystem".
783 */
784 if (cmd == XFS_IOC_FSINUMBERS) {
677717fb 785 breq.startino = lastino ? lastino + 1 : 0;
8bfe9d18 786 error = xfs_inumbers(&breq, xfs_fsinumbers_fmt);
677717fb 787 lastino = breq.startino - 1;
2810bd68
DW
788 } else if (cmd == XFS_IOC_FSBULKSTAT_SINGLE) {
789 breq.startino = lastino;
790 breq.icount = 1;
8bfe9d18 791 error = xfs_bulkstat_one(&breq, xfs_fsbulkstat_one_fmt);
2810bd68
DW
792 } else { /* XFS_IOC_FSBULKSTAT */
793 breq.startino = lastino ? lastino + 1 : 0;
8bfe9d18 794 error = xfs_bulkstat(&breq, xfs_fsbulkstat_one_fmt);
2810bd68
DW
795 lastino = breq.startino - 1;
796 }
1da177e4
LT
797
798 if (error)
2451337d 799 return error;
1da177e4 800
f16fe3ec 801 if (bulkreq.lastip != NULL &&
2810bd68 802 copy_to_user(bulkreq.lastip, &lastino, sizeof(xfs_ino_t)))
f16fe3ec 803 return -EFAULT;
1da177e4 804
f16fe3ec 805 if (bulkreq.ocount != NULL &&
2810bd68 806 copy_to_user(bulkreq.ocount, &breq.ocount, sizeof(__s32)))
f16fe3ec 807 return -EFAULT;
1da177e4
LT
808
809 return 0;
810}
811
0448b6f4
DW
812/* Return 0 on success or positive error */
813static int
814xfs_bulkstat_fmt(
815 struct xfs_ibulk *breq,
816 const struct xfs_bulkstat *bstat)
817{
818 if (copy_to_user(breq->ubuffer, bstat, sizeof(struct xfs_bulkstat)))
819 return -EFAULT;
820 return xfs_ibulk_advance(breq, sizeof(struct xfs_bulkstat));
821}
822
823/*
824 * Check the incoming bulk request @hdr from userspace and initialize the
825 * internal @breq bulk request appropriately. Returns 0 if the bulk request
e7ee96df 826 * should proceed; -ECANCELED if there's nothing to do; or the usual
0448b6f4
DW
827 * negative error code.
828 */
829static int
830xfs_bulk_ireq_setup(
831 struct xfs_mount *mp,
832 struct xfs_bulk_ireq *hdr,
833 struct xfs_ibulk *breq,
834 void __user *ubuffer)
835{
836 if (hdr->icount == 0 ||
837 (hdr->flags & ~XFS_BULK_IREQ_FLAGS_ALL) ||
0448b6f4
DW
838 memchr_inv(hdr->reserved, 0, sizeof(hdr->reserved)))
839 return -EINVAL;
840
841 breq->startino = hdr->ino;
842 breq->ubuffer = ubuffer;
843 breq->icount = hdr->icount;
844 breq->ocount = 0;
13d59a2a
DW
845 breq->flags = 0;
846
bf3cb394
DW
847 /*
848 * The @ino parameter is a special value, so we must look it up here.
849 * We're not allowed to have IREQ_AGNO, and we only return one inode
850 * worth of data.
851 */
852 if (hdr->flags & XFS_BULK_IREQ_SPECIAL) {
853 if (hdr->flags & XFS_BULK_IREQ_AGNO)
854 return -EINVAL;
855
856 switch (hdr->ino) {
857 case XFS_BULK_IREQ_SPECIAL_ROOT:
858 hdr->ino = mp->m_sb.sb_rootino;
859 break;
860 default:
861 return -EINVAL;
862 }
863 breq->icount = 1;
1da177e4
LT
864 }
865
13d59a2a
DW
866 /*
867 * The IREQ_AGNO flag means that we only want results from a given AG.
868 * If @hdr->ino is zero, we start iterating in that AG. If @hdr->ino is
869 * beyond the specified AG then we return no results.
870 */
871 if (hdr->flags & XFS_BULK_IREQ_AGNO) {
872 if (hdr->agno >= mp->m_sb.sb_agcount)
873 return -EINVAL;
874
875 if (breq->startino == 0)
876 breq->startino = XFS_AGINO_TO_INO(mp, hdr->agno, 0);
877 else if (XFS_INO_TO_AGNO(mp, breq->startino) < hdr->agno)
878 return -EINVAL;
879
880 breq->flags |= XFS_IBULK_SAME_AG;
881
882 /* Asking for an inode past the end of the AG? We're done! */
883 if (XFS_INO_TO_AGNO(mp, breq->startino) > hdr->agno)
e7ee96df 884 return -ECANCELED;
13d59a2a
DW
885 } else if (hdr->agno)
886 return -EINVAL;
0448b6f4
DW
887
888 /* Asking for an inode past the end of the FS? We're done! */
889 if (XFS_INO_TO_AGNO(mp, breq->startino) >= mp->m_sb.sb_agcount)
e7ee96df 890 return -ECANCELED;
0448b6f4
DW
891
892 return 0;
893}
894
895/*
896 * Update the userspace bulk request @hdr to reflect the end state of the
897 * internal bulk request @breq.
898 */
899static void
900xfs_bulk_ireq_teardown(
901 struct xfs_bulk_ireq *hdr,
902 struct xfs_ibulk *breq)
903{
904 hdr->ino = breq->startino;
905 hdr->ocount = breq->ocount;
906}
907
908/* Handle the v5 bulkstat ioctl. */
909STATIC int
910xfs_ioc_bulkstat(
911 struct xfs_mount *mp,
912 unsigned int cmd,
913 struct xfs_bulkstat_req __user *arg)
914{
915 struct xfs_bulk_ireq hdr;
916 struct xfs_ibulk breq = {
917 .mp = mp,
918 };
919 int error;
920
921 if (!capable(CAP_SYS_ADMIN))
922 return -EPERM;
923
924 if (XFS_FORCED_SHUTDOWN(mp))
925 return -EIO;
926
927 if (copy_from_user(&hdr, &arg->hdr, sizeof(hdr)))
928 return -EFAULT;
929
930 error = xfs_bulk_ireq_setup(mp, &hdr, &breq, arg->bulkstat);
e7ee96df 931 if (error == -ECANCELED)
0448b6f4
DW
932 goto out_teardown;
933 if (error < 0)
934 return error;
935
936 error = xfs_bulkstat(&breq, xfs_bulkstat_fmt);
937 if (error)
938 return error;
939
940out_teardown:
941 xfs_bulk_ireq_teardown(&hdr, &breq);
942 if (copy_to_user(&arg->hdr, &hdr, sizeof(hdr)))
943 return -EFAULT;
944
945 return 0;
946}
947
fba9760a
DW
948STATIC int
949xfs_inumbers_fmt(
950 struct xfs_ibulk *breq,
951 const struct xfs_inumbers *igrp)
952{
953 if (copy_to_user(breq->ubuffer, igrp, sizeof(struct xfs_inumbers)))
954 return -EFAULT;
955 return xfs_ibulk_advance(breq, sizeof(struct xfs_inumbers));
956}
957
958/* Handle the v5 inumbers ioctl. */
959STATIC int
960xfs_ioc_inumbers(
961 struct xfs_mount *mp,
962 unsigned int cmd,
963 struct xfs_inumbers_req __user *arg)
964{
965 struct xfs_bulk_ireq hdr;
966 struct xfs_ibulk breq = {
967 .mp = mp,
968 };
969 int error;
970
971 if (!capable(CAP_SYS_ADMIN))
972 return -EPERM;
973
974 if (XFS_FORCED_SHUTDOWN(mp))
975 return -EIO;
976
977 if (copy_from_user(&hdr, &arg->hdr, sizeof(hdr)))
978 return -EFAULT;
979
980 error = xfs_bulk_ireq_setup(mp, &hdr, &breq, arg->inumbers);
e7ee96df 981 if (error == -ECANCELED)
fba9760a
DW
982 goto out_teardown;
983 if (error < 0)
984 return error;
985
986 error = xfs_inumbers(&breq, xfs_inumbers_fmt);
987 if (error)
988 return error;
989
990out_teardown:
991 xfs_bulk_ireq_teardown(&hdr, &breq);
992 if (copy_to_user(&arg->hdr, &hdr, sizeof(hdr)))
993 return -EFAULT;
994
1da177e4
LT
995 return 0;
996}
997
1da177e4
LT
998STATIC int
999xfs_ioc_fsgeometry(
1b6d968d
DC
1000 struct xfs_mount *mp,
1001 void __user *arg,
1002 int struct_version)
1da177e4 1003{
1b6d968d
DC
1004 struct xfs_fsop_geom fsgeo;
1005 size_t len;
1da177e4 1006
91083269 1007 xfs_fs_geometry(&mp->m_sb, &fsgeo, struct_version);
1da177e4 1008
1b6d968d
DC
1009 if (struct_version <= 3)
1010 len = sizeof(struct xfs_fsop_geom_v1);
1011 else if (struct_version == 4)
1012 len = sizeof(struct xfs_fsop_geom_v4);
c23232d4
DW
1013 else {
1014 xfs_fsop_geom_health(mp, &fsgeo);
1b6d968d 1015 len = sizeof(fsgeo);
c23232d4 1016 }
1b6d968d
DC
1017
1018 if (copy_to_user(arg, &fsgeo, len))
b474c7ae 1019 return -EFAULT;
1da177e4
LT
1020 return 0;
1021}
1022
7cd5006b
DW
1023STATIC int
1024xfs_ioc_ag_geometry(
1025 struct xfs_mount *mp,
1026 void __user *arg)
1027{
1028 struct xfs_ag_geometry ageo;
1029 int error;
1030
1031 if (copy_from_user(&ageo, arg, sizeof(ageo)))
1032 return -EFAULT;
76f17933
DW
1033 if (ageo.ag_flags)
1034 return -EINVAL;
1035 if (memchr_inv(&ageo.ag_reserved, 0, sizeof(ageo.ag_reserved)))
1036 return -EINVAL;
7cd5006b
DW
1037
1038 error = xfs_ag_get_geometry(mp, ageo.ag_number, &ageo);
1039 if (error)
1040 return error;
1041
1042 if (copy_to_user(arg, &ageo, sizeof(ageo)))
1043 return -EFAULT;
1044 return 0;
1045}
1046
1da177e4
LT
1047/*
1048 * Linux extended inode flags interface.
1049 */
1da177e4
LT
1050
1051STATIC unsigned int
1052xfs_merge_ioc_xflags(
1053 unsigned int flags,
1054 unsigned int start)
1055{
1056 unsigned int xflags = start;
1057
39058a0e 1058 if (flags & FS_IMMUTABLE_FL)
e7b89481 1059 xflags |= FS_XFLAG_IMMUTABLE;
1da177e4 1060 else
e7b89481 1061 xflags &= ~FS_XFLAG_IMMUTABLE;
39058a0e 1062 if (flags & FS_APPEND_FL)
e7b89481 1063 xflags |= FS_XFLAG_APPEND;
1da177e4 1064 else
e7b89481 1065 xflags &= ~FS_XFLAG_APPEND;
39058a0e 1066 if (flags & FS_SYNC_FL)
e7b89481 1067 xflags |= FS_XFLAG_SYNC;
1da177e4 1068 else
e7b89481 1069 xflags &= ~FS_XFLAG_SYNC;
39058a0e 1070 if (flags & FS_NOATIME_FL)
e7b89481 1071 xflags |= FS_XFLAG_NOATIME;
1da177e4 1072 else
e7b89481 1073 xflags &= ~FS_XFLAG_NOATIME;
39058a0e 1074 if (flags & FS_NODUMP_FL)
e7b89481 1075 xflags |= FS_XFLAG_NODUMP;
1da177e4 1076 else
e7b89481 1077 xflags &= ~FS_XFLAG_NODUMP;
1da177e4
LT
1078
1079 return xflags;
1080}
1081
1082STATIC unsigned int
1083xfs_di2lxflags(
c8ce540d 1084 uint16_t di_flags)
1da177e4
LT
1085{
1086 unsigned int flags = 0;
1087
1088 if (di_flags & XFS_DIFLAG_IMMUTABLE)
39058a0e 1089 flags |= FS_IMMUTABLE_FL;
1da177e4 1090 if (di_flags & XFS_DIFLAG_APPEND)
39058a0e 1091 flags |= FS_APPEND_FL;
1da177e4 1092 if (di_flags & XFS_DIFLAG_SYNC)
39058a0e 1093 flags |= FS_SYNC_FL;
1da177e4 1094 if (di_flags & XFS_DIFLAG_NOATIME)
39058a0e 1095 flags |= FS_NOATIME_FL;
1da177e4 1096 if (di_flags & XFS_DIFLAG_NODUMP)
39058a0e 1097 flags |= FS_NODUMP_FL;
1da177e4
LT
1098 return flags;
1099}
1100
7b0e492e
DW
1101static void
1102xfs_fill_fsxattr(
1103 struct xfs_inode *ip,
1104 bool attr,
1105 struct fsxattr *fa)
c83bfab1 1106{
daf83964
CH
1107 struct xfs_ifork *ifp = attr ? ip->i_afp : &ip->i_df;
1108
7b0e492e
DW
1109 simple_fill_fsxattr(fa, xfs_ip2xflags(ip));
1110 fa->fsx_extsize = ip->i_d.di_extsize << ip->i_mount->m_sb.sb_blocklog;
1111 fa->fsx_cowextsize = ip->i_d.di_cowextsize <<
f7ca3522 1112 ip->i_mount->m_sb.sb_blocklog;
de7a866f 1113 fa->fsx_projid = ip->i_d.di_projid;
daf83964
CH
1114 if (ifp && (ifp->if_flags & XFS_IFEXTENTS))
1115 fa->fsx_nextents = xfs_iext_count(ifp);
1116 else
1117 fa->fsx_nextents = xfs_ifork_nextents(ifp);
7b0e492e
DW
1118}
1119
1120STATIC int
1121xfs_ioc_fsgetxattr(
1122 xfs_inode_t *ip,
1123 int attr,
1124 void __user *arg)
1125{
1126 struct fsxattr fa;
1127
1128 xfs_ilock(ip, XFS_ILOCK_SHARED);
1129 xfs_fill_fsxattr(ip, attr, &fa);
c83bfab1
CH
1130 xfs_iunlock(ip, XFS_ILOCK_SHARED);
1131
1132 if (copy_to_user(arg, &fa, sizeof(fa)))
1133 return -EFAULT;
1134 return 0;
1135}
1136
dd60687e
CH
1137STATIC uint16_t
1138xfs_flags2diflags(
25fe55e8
CH
1139 struct xfs_inode *ip,
1140 unsigned int xflags)
1141{
25fe55e8 1142 /* can't set PREALLOC this way, just preserve it */
dd60687e
CH
1143 uint16_t di_flags =
1144 (ip->i_d.di_flags & XFS_DIFLAG_PREALLOC);
1145
e7b89481 1146 if (xflags & FS_XFLAG_IMMUTABLE)
25fe55e8 1147 di_flags |= XFS_DIFLAG_IMMUTABLE;
e7b89481 1148 if (xflags & FS_XFLAG_APPEND)
25fe55e8 1149 di_flags |= XFS_DIFLAG_APPEND;
e7b89481 1150 if (xflags & FS_XFLAG_SYNC)
25fe55e8 1151 di_flags |= XFS_DIFLAG_SYNC;
e7b89481 1152 if (xflags & FS_XFLAG_NOATIME)
25fe55e8 1153 di_flags |= XFS_DIFLAG_NOATIME;
e7b89481 1154 if (xflags & FS_XFLAG_NODUMP)
25fe55e8 1155 di_flags |= XFS_DIFLAG_NODUMP;
e7b89481 1156 if (xflags & FS_XFLAG_NODEFRAG)
25fe55e8 1157 di_flags |= XFS_DIFLAG_NODEFRAG;
e7b89481 1158 if (xflags & FS_XFLAG_FILESTREAM)
25fe55e8 1159 di_flags |= XFS_DIFLAG_FILESTREAM;
c19b3b05 1160 if (S_ISDIR(VFS_I(ip)->i_mode)) {
e7b89481 1161 if (xflags & FS_XFLAG_RTINHERIT)
25fe55e8 1162 di_flags |= XFS_DIFLAG_RTINHERIT;
e7b89481 1163 if (xflags & FS_XFLAG_NOSYMLINKS)
25fe55e8 1164 di_flags |= XFS_DIFLAG_NOSYMLINKS;
e7b89481 1165 if (xflags & FS_XFLAG_EXTSZINHERIT)
25fe55e8 1166 di_flags |= XFS_DIFLAG_EXTSZINHERIT;
e7b89481 1167 if (xflags & FS_XFLAG_PROJINHERIT)
9336e3a7 1168 di_flags |= XFS_DIFLAG_PROJINHERIT;
c19b3b05 1169 } else if (S_ISREG(VFS_I(ip)->i_mode)) {
e7b89481 1170 if (xflags & FS_XFLAG_REALTIME)
25fe55e8 1171 di_flags |= XFS_DIFLAG_REALTIME;
e7b89481 1172 if (xflags & FS_XFLAG_EXTSIZE)
25fe55e8
CH
1173 di_flags |= XFS_DIFLAG_EXTSIZE;
1174 }
58f88ca2 1175
dd60687e
CH
1176 return di_flags;
1177}
1178
1179STATIC uint64_t
1180xfs_flags2diflags2(
1181 struct xfs_inode *ip,
1182 unsigned int xflags)
1183{
1184 uint64_t di_flags2 =
1185 (ip->i_d.di_flags2 & XFS_DIFLAG2_REFLINK);
58f88ca2 1186
58f88ca2
DC
1187 if (xflags & FS_XFLAG_DAX)
1188 di_flags2 |= XFS_DIFLAG2_DAX;
f7ca3522
DW
1189 if (xflags & FS_XFLAG_COWEXTSIZE)
1190 di_flags2 |= XFS_DIFLAG2_COWEXTSIZE;
58f88ca2 1191
dd60687e 1192 return di_flags2;
25fe55e8
CH
1193}
1194
29a17c00
DC
1195static int
1196xfs_ioctl_setattr_xflags(
1197 struct xfs_trans *tp,
1198 struct xfs_inode *ip,
1199 struct fsxattr *fa)
1200{
1201 struct xfs_mount *mp = ip->i_mount;
dd60687e 1202 uint64_t di_flags2;
29a17c00
DC
1203
1204 /* Can't change realtime flag if any extents are allocated. */
daf83964 1205 if ((ip->i_df.if_nextents || ip->i_delayed_blks) &&
e7b89481 1206 XFS_IS_REALTIME_INODE(ip) != (fa->fsx_xflags & FS_XFLAG_REALTIME))
29a17c00
DC
1207 return -EINVAL;
1208
1209 /* If realtime flag is set then must have realtime device */
e7b89481 1210 if (fa->fsx_xflags & FS_XFLAG_REALTIME) {
29a17c00
DC
1211 if (mp->m_sb.sb_rblocks == 0 || mp->m_sb.sb_rextsize == 0 ||
1212 (ip->i_d.di_extsize % mp->m_sb.sb_rextsize))
1213 return -EINVAL;
1214 }
1215
1987fd74 1216 /* Clear reflink if we are actually able to set the rt flag. */
c8e156ac 1217 if ((fa->fsx_xflags & FS_XFLAG_REALTIME) && xfs_is_reflink_inode(ip))
1987fd74 1218 ip->i_d.di_flags2 &= ~XFS_DIFLAG2_REFLINK;
c8e156ac 1219
4f435ebe
DW
1220 /* Don't allow us to set DAX mode for a reflinked file for now. */
1221 if ((fa->fsx_xflags & FS_XFLAG_DAX) && xfs_is_reflink_inode(ip))
1222 return -EINVAL;
1223
dd60687e
CH
1224 /* diflags2 only valid for v3 inodes. */
1225 di_flags2 = xfs_flags2diflags2(ip, fa->fsx_xflags);
6471e9c5 1226 if (di_flags2 && !xfs_sb_version_has_v3inode(&mp->m_sb))
dd60687e
CH
1227 return -EINVAL;
1228
1229 ip->i_d.di_flags = xfs_flags2diflags(ip, fa->fsx_xflags);
1230 ip->i_d.di_flags2 = di_flags2;
1231
840d493d 1232 xfs_diflags_to_iflags(ip, false);
29a17c00
DC
1233 xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG);
1234 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
ff6d6af2 1235 XFS_STATS_INC(mp, xs_ig_attrchg);
29a17c00
DC
1236 return 0;
1237}
1238
e4f9ba20
IW
1239static void
1240xfs_ioctl_setattr_prepare_dax(
3a6a854a 1241 struct xfs_inode *ip,
e4f9ba20 1242 struct fsxattr *fa)
3a6a854a 1243{
e4f9ba20
IW
1244 struct xfs_mount *mp = ip->i_mount;
1245 struct inode *inode = VFS_I(ip);
3a6a854a 1246
aaacdd25 1247 if (S_ISDIR(inode->i_mode))
e4f9ba20 1248 return;
3a6a854a 1249
e4f9ba20
IW
1250 if ((mp->m_flags & XFS_MOUNT_DAX_ALWAYS) ||
1251 (mp->m_flags & XFS_MOUNT_DAX_NEVER))
1252 return;
3a6a854a 1253
e4f9ba20
IW
1254 if (((fa->fsx_xflags & FS_XFLAG_DAX) &&
1255 !(ip->i_d.di_flags2 & XFS_DIFLAG2_DAX)) ||
1256 (!(fa->fsx_xflags & FS_XFLAG_DAX) &&
1257 (ip->i_d.di_flags2 & XFS_DIFLAG2_DAX)))
1258 d_mark_dontcache(inode);
29a17c00
DC
1259}
1260
8f3d17ab
DC
1261/*
1262 * Set up the transaction structure for the setattr operation, checking that we
1263 * have permission to do so. On success, return a clean transaction and the
1264 * inode locked exclusively ready for further operation specific checks. On
1265 * failure, return an error without modifying or locking the inode.
1266 */
1267static struct xfs_trans *
1268xfs_ioctl_setattr_get_trans(
e4f9ba20 1269 struct xfs_inode *ip)
8f3d17ab
DC
1270{
1271 struct xfs_mount *mp = ip->i_mount;
1272 struct xfs_trans *tp;
3a6a854a 1273 int error = -EROFS;
8f3d17ab
DC
1274
1275 if (mp->m_flags & XFS_MOUNT_RDONLY)
3a6a854a
DC
1276 goto out_unlock;
1277 error = -EIO;
8f3d17ab 1278 if (XFS_FORCED_SHUTDOWN(mp))
3a6a854a 1279 goto out_unlock;
8f3d17ab 1280
253f4911 1281 error = xfs_trans_alloc(mp, &M_RES(mp)->tr_ichange, 0, 0, 0, &tp);
8f3d17ab 1282 if (error)
3de5eab3 1283 goto out_unlock;
8f3d17ab
DC
1284
1285 xfs_ilock(ip, XFS_ILOCK_EXCL);
e4f9ba20 1286 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL);
8f3d17ab
DC
1287
1288 /*
1289 * CAP_FOWNER overrides the following restrictions:
1290 *
1291 * The user ID of the calling process must be equal to the file owner
1292 * ID, except in cases where the CAP_FSETID capability is applicable.
1293 */
1294 if (!inode_owner_or_capable(VFS_I(ip))) {
1295 error = -EPERM;
1296 goto out_cancel;
1297 }
1298
1299 if (mp->m_flags & XFS_MOUNT_WSYNC)
1300 xfs_trans_set_sync(tp);
1301
1302 return tp;
1303
1304out_cancel:
4906e215 1305 xfs_trans_cancel(tp);
3a6a854a 1306out_unlock:
8f3d17ab
DC
1307 return ERR_PTR(error);
1308}
1309
9b94fcc3
IP
1310/*
1311 * extent size hint validation is somewhat cumbersome. Rules are:
1312 *
1313 * 1. extent size hint is only valid for directories and regular files
e7b89481
DC
1314 * 2. FS_XFLAG_EXTSIZE is only valid for regular files
1315 * 3. FS_XFLAG_EXTSZINHERIT is only valid for directories.
9b94fcc3
IP
1316 * 4. can only be changed on regular files if no extents are allocated
1317 * 5. can be changed on directories at any time
1318 * 6. extsize hint of 0 turns off hints, clears inode flags.
1319 * 7. Extent size must be a multiple of the appropriate block size.
1320 * 8. for non-realtime files, the extent size hint must be limited
1321 * to half the AG size to avoid alignment extending the extent beyond the
1322 * limits of the AG.
80e4e126
DW
1323 *
1324 * Please keep this function in sync with xfs_scrub_inode_extsize.
9b94fcc3 1325 */
f92090e9 1326static int
d4388d3c
DC
1327xfs_ioctl_setattr_check_extsize(
1328 struct xfs_inode *ip,
1329 struct fsxattr *fa)
1330{
1331 struct xfs_mount *mp = ip->i_mount;
ca29be75
DW
1332 xfs_extlen_t size;
1333 xfs_fsblock_t extsize_fsb;
9b94fcc3 1334
daf83964 1335 if (S_ISREG(VFS_I(ip)->i_mode) && ip->i_df.if_nextents &&
d4388d3c
DC
1336 ((ip->i_d.di_extsize << mp->m_sb.sb_blocklog) != fa->fsx_extsize))
1337 return -EINVAL;
1338
ca29be75
DW
1339 if (fa->fsx_extsize == 0)
1340 return 0;
d4388d3c 1341
ca29be75
DW
1342 extsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_extsize);
1343 if (extsize_fsb > MAXEXTLEN)
1344 return -EINVAL;
d4388d3c 1345
ca29be75
DW
1346 if (XFS_IS_REALTIME_INODE(ip) ||
1347 (fa->fsx_xflags & FS_XFLAG_REALTIME)) {
1348 size = mp->m_sb.sb_rextsize << mp->m_sb.sb_blocklog;
1349 } else {
1350 size = mp->m_sb.sb_blocksize;
1351 if (extsize_fsb > mp->m_sb.sb_agblocks / 2)
d4388d3c 1352 return -EINVAL;
ca29be75
DW
1353 }
1354
1355 if (fa->fsx_extsize % size)
1356 return -EINVAL;
9b94fcc3 1357
d4388d3c
DC
1358 return 0;
1359}
1360
f7ca3522
DW
1361/*
1362 * CoW extent size hint validation rules are:
1363 *
1364 * 1. CoW extent size hint can only be set if reflink is enabled on the fs.
1365 * The inode does not have to have any shared blocks, but it must be a v3.
1366 * 2. FS_XFLAG_COWEXTSIZE is only valid for directories and regular files;
1367 * for a directory, the hint is propagated to new files.
1368 * 3. Can be changed on files & directories at any time.
1369 * 4. CoW extsize hint of 0 turns off hints, clears inode flags.
1370 * 5. Extent size must be a multiple of the appropriate block size.
1371 * 6. The extent size hint must be limited to half the AG size to avoid
1372 * alignment extending the extent beyond the limits of the AG.
80e4e126
DW
1373 *
1374 * Please keep this function in sync with xfs_scrub_inode_cowextsize.
f7ca3522
DW
1375 */
1376static int
1377xfs_ioctl_setattr_check_cowextsize(
1378 struct xfs_inode *ip,
1379 struct fsxattr *fa)
1380{
1381 struct xfs_mount *mp = ip->i_mount;
ca29be75
DW
1382 xfs_extlen_t size;
1383 xfs_fsblock_t cowextsize_fsb;
f7ca3522
DW
1384
1385 if (!(fa->fsx_xflags & FS_XFLAG_COWEXTSIZE))
1386 return 0;
1387
5e28aafe 1388 if (!xfs_sb_version_hasreflink(&ip->i_mount->m_sb))
f7ca3522
DW
1389 return -EINVAL;
1390
ca29be75
DW
1391 if (fa->fsx_cowextsize == 0)
1392 return 0;
f7ca3522 1393
ca29be75
DW
1394 cowextsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_cowextsize);
1395 if (cowextsize_fsb > MAXEXTLEN)
1396 return -EINVAL;
f7ca3522 1397
ca29be75
DW
1398 size = mp->m_sb.sb_blocksize;
1399 if (cowextsize_fsb > mp->m_sb.sb_agblocks / 2)
1400 return -EINVAL;
f7ca3522 1401
ca29be75
DW
1402 if (fa->fsx_cowextsize % size)
1403 return -EINVAL;
f7ca3522
DW
1404
1405 return 0;
1406}
1407
f92090e9 1408static int
23bd0735
DC
1409xfs_ioctl_setattr_check_projid(
1410 struct xfs_inode *ip,
1411 struct fsxattr *fa)
1412{
1413 /* Disallow 32bit project ids if projid32bit feature is not enabled. */
c8ce540d 1414 if (fa->fsx_projid > (uint16_t)-1 &&
23bd0735
DC
1415 !xfs_sb_version_hasprojid32bit(&ip->i_mount->m_sb))
1416 return -EINVAL;
23bd0735
DC
1417 return 0;
1418}
25fe55e8
CH
1419
1420STATIC int
1421xfs_ioctl_setattr(
1422 xfs_inode_t *ip,
fd179b9c 1423 struct fsxattr *fa)
25fe55e8 1424{
7b0e492e 1425 struct fsxattr old_fa;
25fe55e8
CH
1426 struct xfs_mount *mp = ip->i_mount;
1427 struct xfs_trans *tp;
92f8ff73 1428 struct xfs_dquot *pdqp = NULL;
25fe55e8
CH
1429 struct xfs_dquot *olddquot = NULL;
1430 int code;
1431
cca28fb8 1432 trace_xfs_ioctl_setattr(ip);
25fe55e8 1433
23bd0735
DC
1434 code = xfs_ioctl_setattr_check_projid(ip, fa);
1435 if (code)
1436 return code;
23963e54 1437
25fe55e8
CH
1438 /*
1439 * If disk quotas is on, we make sure that the dquots do exist on disk,
1440 * before we start any other transactions. Trying to do this later
1441 * is messy. We don't care to take a readlock to look at the ids
1442 * in inode here, because we can't hold it across the trans_reserve.
1443 * If the IDs do change before we take the ilock, we're covered
1444 * because the i_*dquot fields will get updated anyway.
1445 */
fd179b9c 1446 if (XFS_IS_QUOTA_ON(mp)) {
54295159
CH
1447 code = xfs_qm_vop_dqalloc(ip, VFS_I(ip)->i_uid,
1448 VFS_I(ip)->i_gid, fa->fsx_projid,
ea1c9040 1449 XFS_QMOPT_PQUOTA, NULL, NULL, &pdqp);
25fe55e8
CH
1450 if (code)
1451 return code;
1452 }
1453
e4f9ba20 1454 xfs_ioctl_setattr_prepare_dax(ip, fa);
3a6a854a 1455
e4f9ba20 1456 tp = xfs_ioctl_setattr_get_trans(ip);
8f3d17ab
DC
1457 if (IS_ERR(tp)) {
1458 code = PTR_ERR(tp);
1459 goto error_free_dquots;
25fe55e8
CH
1460 }
1461
fd179b9c 1462 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp) &&
de7a866f 1463 ip->i_d.di_projid != fa->fsx_projid) {
ea1c9040 1464 code = xfs_qm_vop_chown_reserve(tp, ip, NULL, NULL, pdqp,
fd179b9c
DC
1465 capable(CAP_FOWNER) ? XFS_QMOPT_FORCE_RES : 0);
1466 if (code) /* out of quota */
d4388d3c 1467 goto error_trans_cancel;
25fe55e8
CH
1468 }
1469
7b0e492e
DW
1470 xfs_fill_fsxattr(ip, false, &old_fa);
1471 code = vfs_ioc_fssetxattr_check(VFS_I(ip), &old_fa, fa);
1472 if (code)
1473 goto error_trans_cancel;
1474
d4388d3c
DC
1475 code = xfs_ioctl_setattr_check_extsize(ip, fa);
1476 if (code)
1477 goto error_trans_cancel;
25fe55e8 1478
f7ca3522
DW
1479 code = xfs_ioctl_setattr_check_cowextsize(ip, fa);
1480 if (code)
1481 goto error_trans_cancel;
1482
29a17c00
DC
1483 code = xfs_ioctl_setattr_xflags(tp, ip, fa);
1484 if (code)
d4388d3c 1485 goto error_trans_cancel;
25fe55e8
CH
1486
1487 /*
fd179b9c
DC
1488 * Change file ownership. Must be the owner or privileged. CAP_FSETID
1489 * overrides the following restrictions:
1490 *
1491 * The set-user-ID and set-group-ID bits of a file will be cleared upon
1492 * successful return from chown()
25fe55e8 1493 */
25fe55e8 1494
c19b3b05 1495 if ((VFS_I(ip)->i_mode & (S_ISUID|S_ISGID)) &&
fd179b9c 1496 !capable_wrt_inode_uidgid(VFS_I(ip), CAP_FSETID))
c19b3b05 1497 VFS_I(ip)->i_mode &= ~(S_ISUID|S_ISGID);
25fe55e8 1498
fd179b9c 1499 /* Change the ownerships and register project quota modifications */
de7a866f 1500 if (ip->i_d.di_projid != fa->fsx_projid) {
fd179b9c
DC
1501 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp)) {
1502 olddquot = xfs_qm_vop_chown(tp, ip,
1503 &ip->i_pdquot, pdqp);
1504 }
de7a866f 1505 ip->i_d.di_projid = fa->fsx_projid;
f13fae2d 1506 }
25fe55e8 1507
a872703f
DC
1508 /*
1509 * Only set the extent size hint if we've already determined that the
1510 * extent size hint should be set on the inode. If no extent size flags
1511 * are set on the inode then unconditionally clear the extent size hint.
1512 */
fd179b9c
DC
1513 if (ip->i_d.di_flags & (XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT))
1514 ip->i_d.di_extsize = fa->fsx_extsize >> mp->m_sb.sb_blocklog;
1515 else
1516 ip->i_d.di_extsize = 0;
6471e9c5 1517 if (xfs_sb_version_has_v3inode(&mp->m_sb) &&
f7ca3522
DW
1518 (ip->i_d.di_flags2 & XFS_DIFLAG2_COWEXTSIZE))
1519 ip->i_d.di_cowextsize = fa->fsx_cowextsize >>
1520 mp->m_sb.sb_blocklog;
1521 else
1522 ip->i_d.di_cowextsize = 0;
25fe55e8 1523
70393313 1524 code = xfs_trans_commit(tp);
25fe55e8
CH
1525
1526 /*
1527 * Release any dquot(s) the inode had kept before chown.
1528 */
7d095257 1529 xfs_qm_dqrele(olddquot);
92f8ff73 1530 xfs_qm_dqrele(pdqp);
25fe55e8 1531
288699fe 1532 return code;
25fe55e8 1533
d4388d3c 1534error_trans_cancel:
4906e215 1535 xfs_trans_cancel(tp);
8f3d17ab 1536error_free_dquots:
92f8ff73 1537 xfs_qm_dqrele(pdqp);
25fe55e8
CH
1538 return code;
1539}
1540
1da177e4 1541STATIC int
df26cfe8 1542xfs_ioc_fssetxattr(
1da177e4
LT
1543 xfs_inode_t *ip,
1544 struct file *filp,
1da177e4
LT
1545 void __user *arg)
1546{
1547 struct fsxattr fa;
d9457dc0 1548 int error;
df26cfe8
LM
1549
1550 if (copy_from_user(&fa, arg, sizeof(fa)))
1551 return -EFAULT;
1da177e4 1552
d9457dc0
JK
1553 error = mnt_want_write_file(filp);
1554 if (error)
1555 return error;
fd179b9c 1556 error = xfs_ioctl_setattr(ip, &fa);
d9457dc0 1557 mnt_drop_write_file(filp);
2451337d 1558 return error;
df26cfe8 1559}
1da177e4 1560
df26cfe8
LM
1561STATIC int
1562xfs_ioc_getxflags(
1563 xfs_inode_t *ip,
1564 void __user *arg)
1565{
1566 unsigned int flags;
1da177e4 1567
df26cfe8
LM
1568 flags = xfs_di2lxflags(ip->i_d.di_flags);
1569 if (copy_to_user(arg, &flags, sizeof(flags)))
1570 return -EFAULT;
1571 return 0;
1572}
1da177e4 1573
df26cfe8
LM
1574STATIC int
1575xfs_ioc_setxflags(
f96291f6 1576 struct xfs_inode *ip,
df26cfe8
LM
1577 struct file *filp,
1578 void __user *arg)
1579{
f96291f6 1580 struct xfs_trans *tp;
25fe55e8 1581 struct fsxattr fa;
7b0e492e 1582 struct fsxattr old_fa;
df26cfe8 1583 unsigned int flags;
f96291f6 1584 int error;
1da177e4 1585
df26cfe8
LM
1586 if (copy_from_user(&flags, arg, sizeof(flags)))
1587 return -EFAULT;
1da177e4 1588
df26cfe8
LM
1589 if (flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL | \
1590 FS_NOATIME_FL | FS_NODUMP_FL | \
1591 FS_SYNC_FL))
1592 return -EOPNOTSUPP;
1da177e4 1593
25fe55e8 1594 fa.fsx_xflags = xfs_merge_ioc_xflags(flags, xfs_ip2xflags(ip));
1da177e4 1595
d9457dc0
JK
1596 error = mnt_want_write_file(filp);
1597 if (error)
1598 return error;
f96291f6 1599
e4f9ba20 1600 xfs_ioctl_setattr_prepare_dax(ip, &fa);
3a6a854a 1601
e4f9ba20 1602 tp = xfs_ioctl_setattr_get_trans(ip);
f96291f6
DC
1603 if (IS_ERR(tp)) {
1604 error = PTR_ERR(tp);
1605 goto out_drop_write;
1606 }
1607
7b0e492e
DW
1608 xfs_fill_fsxattr(ip, false, &old_fa);
1609 error = vfs_ioc_fssetxattr_check(VFS_I(ip), &old_fa, &fa);
1610 if (error) {
1611 xfs_trans_cancel(tp);
1612 goto out_drop_write;
1613 }
1614
f96291f6
DC
1615 error = xfs_ioctl_setattr_xflags(tp, ip, &fa);
1616 if (error) {
4906e215 1617 xfs_trans_cancel(tp);
f96291f6
DC
1618 goto out_drop_write;
1619 }
1620
70393313 1621 error = xfs_trans_commit(tp);
f96291f6 1622out_drop_write:
d9457dc0 1623 mnt_drop_write_file(filp);
2451337d 1624 return error;
1da177e4
LT
1625}
1626
232b5194
CH
1627static bool
1628xfs_getbmap_format(
1629 struct kgetbmap *p,
1630 struct getbmapx __user *u,
1631 size_t recsize)
8a7141a8 1632{
232b5194
CH
1633 if (put_user(p->bmv_offset, &u->bmv_offset) ||
1634 put_user(p->bmv_block, &u->bmv_block) ||
1635 put_user(p->bmv_length, &u->bmv_length) ||
1636 put_user(0, &u->bmv_count) ||
1637 put_user(0, &u->bmv_entries))
1638 return false;
1639 if (recsize < sizeof(struct getbmapx))
1640 return true;
1641 if (put_user(0, &u->bmv_iflags) ||
1642 put_user(p->bmv_oflags, &u->bmv_oflags) ||
1643 put_user(0, &u->bmv_unused1) ||
1644 put_user(0, &u->bmv_unused2))
1645 return false;
1646 return true;
8a7141a8
ES
1647}
1648
1da177e4
LT
1649STATIC int
1650xfs_ioc_getbmap(
8f3e2058 1651 struct file *file,
1da177e4
LT
1652 unsigned int cmd,
1653 void __user *arg)
1654{
be6324c0 1655 struct getbmapx bmx = { 0 };
232b5194
CH
1656 struct kgetbmap *buf;
1657 size_t recsize;
1658 int error, i;
1da177e4 1659
232b5194
CH
1660 switch (cmd) {
1661 case XFS_IOC_GETBMAPA:
1662 bmx.bmv_iflags = BMV_IF_ATTRFORK;
1663 /*FALLTHRU*/
1664 case XFS_IOC_GETBMAP:
1665 if (file->f_mode & FMODE_NOCMTIME)
1666 bmx.bmv_iflags |= BMV_IF_NO_DMAPI_READ;
1667 /* struct getbmap is a strict subset of struct getbmapx. */
1668 recsize = sizeof(struct getbmap);
1669 break;
1670 case XFS_IOC_GETBMAPX:
1671 recsize = sizeof(struct getbmapx);
1672 break;
1673 default:
b474c7ae 1674 return -EINVAL;
232b5194 1675 }
1da177e4 1676
232b5194 1677 if (copy_from_user(&bmx, arg, recsize))
b474c7ae 1678 return -EFAULT;
1da177e4
LT
1679
1680 if (bmx.bmv_count < 2)
b474c7ae 1681 return -EINVAL;
232b5194
CH
1682 if (bmx.bmv_count > ULONG_MAX / recsize)
1683 return -ENOMEM;
1da177e4 1684
232b5194
CH
1685 buf = kmem_zalloc_large(bmx.bmv_count * sizeof(*buf), 0);
1686 if (!buf)
1687 return -ENOMEM;
1da177e4 1688
232b5194 1689 error = xfs_getbmap(XFS_I(file_inode(file)), &bmx, buf);
1da177e4 1690 if (error)
232b5194 1691 goto out_free_buf;
1da177e4 1692
232b5194
CH
1693 error = -EFAULT;
1694 if (copy_to_user(arg, &bmx, recsize))
1695 goto out_free_buf;
1696 arg += recsize;
1697
1698 for (i = 0; i < bmx.bmv_entries; i++) {
1699 if (!xfs_getbmap_format(buf + i, arg, recsize))
1700 goto out_free_buf;
1701 arg += recsize;
1702 }
1da177e4 1703
232b5194
CH
1704 error = 0;
1705out_free_buf:
1706 kmem_free(buf);
132bf672 1707 return error;
1da177e4 1708}
df26cfe8 1709
e89c0413
DW
1710struct getfsmap_info {
1711 struct xfs_mount *mp;
9d17e14c
CH
1712 struct fsmap_head __user *data;
1713 unsigned int idx;
e89c0413
DW
1714 __u32 last_flags;
1715};
1716
1717STATIC int
1718xfs_getfsmap_format(struct xfs_fsmap *xfm, void *priv)
1719{
1720 struct getfsmap_info *info = priv;
1721 struct fsmap fm;
1722
1723 trace_xfs_getfsmap_mapping(info->mp, xfm);
1724
1725 info->last_flags = xfm->fmr_flags;
1726 xfs_fsmap_from_internal(&fm, xfm);
9d17e14c
CH
1727 if (copy_to_user(&info->data->fmh_recs[info->idx++], &fm,
1728 sizeof(struct fsmap)))
e89c0413
DW
1729 return -EFAULT;
1730
e89c0413
DW
1731 return 0;
1732}
1733
1734STATIC int
1735xfs_ioc_getfsmap(
1736 struct xfs_inode *ip,
9d17e14c 1737 struct fsmap_head __user *arg)
e89c0413 1738{
ef2b67ec 1739 struct getfsmap_info info = { NULL };
e89c0413
DW
1740 struct xfs_fsmap_head xhead = {0};
1741 struct fsmap_head head;
1742 bool aborted = false;
1743 int error;
1744
1745 if (copy_from_user(&head, arg, sizeof(struct fsmap_head)))
1746 return -EFAULT;
1747 if (memchr_inv(head.fmh_reserved, 0, sizeof(head.fmh_reserved)) ||
1748 memchr_inv(head.fmh_keys[0].fmr_reserved, 0,
1749 sizeof(head.fmh_keys[0].fmr_reserved)) ||
1750 memchr_inv(head.fmh_keys[1].fmr_reserved, 0,
1751 sizeof(head.fmh_keys[1].fmr_reserved)))
1752 return -EINVAL;
1753
1754 xhead.fmh_iflags = head.fmh_iflags;
1755 xhead.fmh_count = head.fmh_count;
1756 xfs_fsmap_to_internal(&xhead.fmh_keys[0], &head.fmh_keys[0]);
1757 xfs_fsmap_to_internal(&xhead.fmh_keys[1], &head.fmh_keys[1]);
1758
1759 trace_xfs_getfsmap_low_key(ip->i_mount, &xhead.fmh_keys[0]);
1760 trace_xfs_getfsmap_high_key(ip->i_mount, &xhead.fmh_keys[1]);
1761
1762 info.mp = ip->i_mount;
9d17e14c 1763 info.data = arg;
e89c0413 1764 error = xfs_getfsmap(ip->i_mount, &xhead, xfs_getfsmap_format, &info);
e7ee96df 1765 if (error == -ECANCELED) {
e89c0413
DW
1766 error = 0;
1767 aborted = true;
1768 } else if (error)
1769 return error;
1770
1771 /* If we didn't abort, set the "last" flag in the last fmx */
12e4a381 1772 if (!aborted && info.idx) {
e89c0413 1773 info.last_flags |= FMR_OF_LAST;
9d17e14c
CH
1774 if (copy_to_user(&info.data->fmh_recs[info.idx - 1].fmr_flags,
1775 &info.last_flags, sizeof(info.last_flags)))
e89c0413
DW
1776 return -EFAULT;
1777 }
1778
1779 /* copy back header */
1780 head.fmh_entries = xhead.fmh_entries;
1781 head.fmh_oflags = xhead.fmh_oflags;
1782 if (copy_to_user(arg, &head, sizeof(struct fsmap_head)))
1783 return -EFAULT;
1784
1785 return 0;
1786}
1787
36fd6e86
DW
1788STATIC int
1789xfs_ioc_scrub_metadata(
1790 struct xfs_inode *ip,
1791 void __user *arg)
1792{
1793 struct xfs_scrub_metadata scrub;
1794 int error;
1795
1796 if (!capable(CAP_SYS_ADMIN))
1797 return -EPERM;
1798
1799 if (copy_from_user(&scrub, arg, sizeof(scrub)))
1800 return -EFAULT;
1801
1802 error = xfs_scrub_metadata(ip, &scrub);
1803 if (error)
1804 return error;
1805
1806 if (copy_to_user(arg, &scrub, sizeof(scrub)))
1807 return -EFAULT;
1808
1809 return 0;
1810}
1811
a133d952
DC
1812int
1813xfs_ioc_swapext(
1814 xfs_swapext_t *sxp)
1815{
1816 xfs_inode_t *ip, *tip;
1817 struct fd f, tmp;
1818 int error = 0;
1819
1820 /* Pull information for the target fd */
1821 f = fdget((int)sxp->sx_fdtarget);
1822 if (!f.file) {
2451337d 1823 error = -EINVAL;
a133d952
DC
1824 goto out;
1825 }
1826
1827 if (!(f.file->f_mode & FMODE_WRITE) ||
1828 !(f.file->f_mode & FMODE_READ) ||
1829 (f.file->f_flags & O_APPEND)) {
2451337d 1830 error = -EBADF;
a133d952
DC
1831 goto out_put_file;
1832 }
1833
1834 tmp = fdget((int)sxp->sx_fdtmp);
1835 if (!tmp.file) {
2451337d 1836 error = -EINVAL;
a133d952
DC
1837 goto out_put_file;
1838 }
1839
1840 if (!(tmp.file->f_mode & FMODE_WRITE) ||
1841 !(tmp.file->f_mode & FMODE_READ) ||
1842 (tmp.file->f_flags & O_APPEND)) {
2451337d 1843 error = -EBADF;
a133d952
DC
1844 goto out_put_tmp_file;
1845 }
1846
1847 if (IS_SWAPFILE(file_inode(f.file)) ||
1848 IS_SWAPFILE(file_inode(tmp.file))) {
2451337d 1849 error = -EINVAL;
a133d952
DC
1850 goto out_put_tmp_file;
1851 }
1852
7f1b6245
JH
1853 /*
1854 * We need to ensure that the fds passed in point to XFS inodes
1855 * before we cast and access them as XFS structures as we have no
1856 * control over what the user passes us here.
1857 */
1858 if (f.file->f_op != &xfs_file_operations ||
1859 tmp.file->f_op != &xfs_file_operations) {
1860 error = -EINVAL;
1861 goto out_put_tmp_file;
1862 }
1863
a133d952
DC
1864 ip = XFS_I(file_inode(f.file));
1865 tip = XFS_I(file_inode(tmp.file));
1866
1867 if (ip->i_mount != tip->i_mount) {
2451337d 1868 error = -EINVAL;
a133d952
DC
1869 goto out_put_tmp_file;
1870 }
1871
1872 if (ip->i_ino == tip->i_ino) {
2451337d 1873 error = -EINVAL;
a133d952
DC
1874 goto out_put_tmp_file;
1875 }
1876
1877 if (XFS_FORCED_SHUTDOWN(ip->i_mount)) {
2451337d 1878 error = -EIO;
a133d952
DC
1879 goto out_put_tmp_file;
1880 }
1881
1882 error = xfs_swap_extents(ip, tip, sxp);
1883
1884 out_put_tmp_file:
1885 fdput(tmp);
1886 out_put_file:
1887 fdput(f);
1888 out:
1889 return error;
1890}
1891
f7664b31
ES
1892static int
1893xfs_ioc_getlabel(
1894 struct xfs_mount *mp,
1895 char __user *user_label)
1896{
1897 struct xfs_sb *sbp = &mp->m_sb;
1898 char label[XFSLABEL_MAX + 1];
1899
1900 /* Paranoia */
1901 BUILD_BUG_ON(sizeof(sbp->sb_fname) > FSLABEL_MAX);
1902
4bb8b65a
AB
1903 /* 1 larger than sb_fname, so this ensures a trailing NUL char */
1904 memset(label, 0, sizeof(label));
f7664b31 1905 spin_lock(&mp->m_sb_lock);
4bb8b65a 1906 strncpy(label, sbp->sb_fname, XFSLABEL_MAX);
f7664b31
ES
1907 spin_unlock(&mp->m_sb_lock);
1908
4bb8b65a 1909 if (copy_to_user(user_label, label, sizeof(label)))
f7664b31
ES
1910 return -EFAULT;
1911 return 0;
1912}
1913
1914static int
1915xfs_ioc_setlabel(
1916 struct file *filp,
1917 struct xfs_mount *mp,
1918 char __user *newlabel)
1919{
1920 struct xfs_sb *sbp = &mp->m_sb;
1921 char label[XFSLABEL_MAX + 1];
1922 size_t len;
1923 int error;
1924
1925 if (!capable(CAP_SYS_ADMIN))
1926 return -EPERM;
1927 /*
1928 * The generic ioctl allows up to FSLABEL_MAX chars, but XFS is much
1929 * smaller, at 12 bytes. We copy one more to be sure we find the
1930 * (required) NULL character to test the incoming label length.
1931 * NB: The on disk label doesn't need to be null terminated.
1932 */
1933 if (copy_from_user(label, newlabel, XFSLABEL_MAX + 1))
1934 return -EFAULT;
1935 len = strnlen(label, XFSLABEL_MAX + 1);
1936 if (len > sizeof(sbp->sb_fname))
1937 return -EINVAL;
1938
1939 error = mnt_want_write_file(filp);
1940 if (error)
1941 return error;
1942
1943 spin_lock(&mp->m_sb_lock);
1944 memset(sbp->sb_fname, 0, sizeof(sbp->sb_fname));
4bb8b65a 1945 memcpy(sbp->sb_fname, label, len);
f7664b31
ES
1946 spin_unlock(&mp->m_sb_lock);
1947
1948 /*
1949 * Now we do several things to satisfy userspace.
1950 * In addition to normal logging of the primary superblock, we also
1951 * immediately write these changes to sector zero for the primary, then
1952 * update all backup supers (as xfs_db does for a label change), then
1953 * invalidate the block device page cache. This is so that any prior
1954 * buffered reads from userspace (i.e. from blkid) are invalidated,
1955 * and userspace will see the newly-written label.
1956 */
1957 error = xfs_sync_sb_buf(mp);
1958 if (error)
1959 goto out;
1960 /*
1961 * growfs also updates backup supers so lock against that.
1962 */
1963 mutex_lock(&mp->m_growlock);
1964 error = xfs_update_secondary_sbs(mp);
1965 mutex_unlock(&mp->m_growlock);
1966
1967 invalidate_bdev(mp->m_ddev_targp->bt_bdev);
1968
1969out:
1970 mnt_drop_write_file(filp);
1971 return error;
1972}
1973
3737bb2c
DW
1974static inline int
1975xfs_fs_eofblocks_from_user(
1976 struct xfs_fs_eofblocks *src,
1977 struct xfs_eofblocks *dst)
1978{
1979 if (src->eof_version != XFS_EOFBLOCKS_VERSION)
1980 return -EINVAL;
1981
1982 if (src->eof_flags & ~XFS_EOF_FLAGS_VALID)
1983 return -EINVAL;
1984
1985 if (memchr_inv(&src->pad32, 0, sizeof(src->pad32)) ||
1986 memchr_inv(src->pad64, 0, sizeof(src->pad64)))
1987 return -EINVAL;
1988
1989 dst->eof_flags = src->eof_flags;
1990 dst->eof_prid = src->eof_prid;
1991 dst->eof_min_file_size = src->eof_min_file_size;
1992
1993 dst->eof_uid = INVALID_UID;
1994 if (src->eof_flags & XFS_EOF_FLAGS_UID) {
1995 dst->eof_uid = make_kuid(current_user_ns(), src->eof_uid);
1996 if (!uid_valid(dst->eof_uid))
1997 return -EINVAL;
1998 }
1999
2000 dst->eof_gid = INVALID_GID;
2001 if (src->eof_flags & XFS_EOF_FLAGS_GID) {
2002 dst->eof_gid = make_kgid(current_user_ns(), src->eof_gid);
2003 if (!gid_valid(dst->eof_gid))
2004 return -EINVAL;
2005 }
2006 return 0;
2007}
2008
4d4be482
CH
2009/*
2010 * Note: some of the ioctl's return positive numbers as a
2011 * byte count indicating success, such as readlink_by_handle.
2012 * So we don't "sign flip" like most other routines. This means
2013 * true errors need to be returned as a negative value.
2014 */
2015long
2016xfs_file_ioctl(
df26cfe8 2017 struct file *filp,
df26cfe8 2018 unsigned int cmd,
4d4be482 2019 unsigned long p)
df26cfe8 2020{
496ad9aa 2021 struct inode *inode = file_inode(filp);
4d4be482
CH
2022 struct xfs_inode *ip = XFS_I(inode);
2023 struct xfs_mount *mp = ip->i_mount;
2024 void __user *arg = (void __user *)p;
df26cfe8
LM
2025 int error;
2026
cca28fb8 2027 trace_xfs_file_ioctl(ip);
4d4be482
CH
2028
2029 switch (cmd) {
a46db608
CH
2030 case FITRIM:
2031 return xfs_ioc_trim(mp, arg);
f7664b31
ES
2032 case FS_IOC_GETFSLABEL:
2033 return xfs_ioc_getlabel(mp, arg);
2034 case FS_IOC_SETFSLABEL:
2035 return xfs_ioc_setlabel(filp, mp, arg);
df26cfe8
LM
2036 case XFS_IOC_ALLOCSP:
2037 case XFS_IOC_FREESP:
df26cfe8 2038 case XFS_IOC_ALLOCSP64:
837a6e7f 2039 case XFS_IOC_FREESP64: {
743bb465 2040 xfs_flock64_t bf;
df26cfe8 2041
743bb465 2042 if (copy_from_user(&bf, arg, sizeof(bf)))
b474c7ae 2043 return -EFAULT;
837a6e7f 2044 return xfs_ioc_space(filp, &bf);
743bb465 2045 }
df26cfe8 2046 case XFS_IOC_DIOINFO: {
c7d68318
CH
2047 struct xfs_buftarg *target = xfs_inode_buftarg(ip);
2048 struct dioattr da;
df26cfe8 2049
7c71ee78 2050 da.d_mem = da.d_miniosz = target->bt_logical_sectorsize;
df26cfe8
LM
2051 da.d_maxiosz = INT_MAX & ~(da.d_miniosz - 1);
2052
2053 if (copy_to_user(arg, &da, sizeof(da)))
b474c7ae 2054 return -EFAULT;
df26cfe8
LM
2055 return 0;
2056 }
2057
2058 case XFS_IOC_FSBULKSTAT_SINGLE:
2059 case XFS_IOC_FSBULKSTAT:
2060 case XFS_IOC_FSINUMBERS:
8bfe9d18 2061 return xfs_ioc_fsbulkstat(mp, cmd, arg);
df26cfe8 2062
0448b6f4 2063 case XFS_IOC_BULKSTAT:
df26cfe8 2064 return xfs_ioc_bulkstat(mp, cmd, arg);
fba9760a
DW
2065 case XFS_IOC_INUMBERS:
2066 return xfs_ioc_inumbers(mp, cmd, arg);
df26cfe8
LM
2067
2068 case XFS_IOC_FSGEOMETRY_V1:
1b6d968d
DC
2069 return xfs_ioc_fsgeometry(mp, arg, 3);
2070 case XFS_IOC_FSGEOMETRY_V4:
2071 return xfs_ioc_fsgeometry(mp, arg, 4);
df26cfe8 2072 case XFS_IOC_FSGEOMETRY:
1b6d968d 2073 return xfs_ioc_fsgeometry(mp, arg, 5);
df26cfe8 2074
7cd5006b
DW
2075 case XFS_IOC_AG_GEOMETRY:
2076 return xfs_ioc_ag_geometry(mp, arg);
2077
df26cfe8
LM
2078 case XFS_IOC_GETVERSION:
2079 return put_user(inode->i_generation, (int __user *)arg);
2080
2081 case XFS_IOC_FSGETXATTR:
2082 return xfs_ioc_fsgetxattr(ip, 0, arg);
2083 case XFS_IOC_FSGETXATTRA:
2084 return xfs_ioc_fsgetxattr(ip, 1, arg);
65e67f51
LM
2085 case XFS_IOC_FSSETXATTR:
2086 return xfs_ioc_fssetxattr(ip, filp, arg);
df26cfe8 2087 case XFS_IOC_GETXFLAGS:
65e67f51 2088 return xfs_ioc_getxflags(ip, arg);
df26cfe8 2089 case XFS_IOC_SETXFLAGS:
65e67f51 2090 return xfs_ioc_setxflags(ip, filp, arg);
df26cfe8 2091
df26cfe8
LM
2092 case XFS_IOC_GETBMAP:
2093 case XFS_IOC_GETBMAPA:
df26cfe8 2094 case XFS_IOC_GETBMAPX:
232b5194 2095 return xfs_ioc_getbmap(filp, cmd, arg);
df26cfe8 2096
e89c0413
DW
2097 case FS_IOC_GETFSMAP:
2098 return xfs_ioc_getfsmap(ip, arg);
2099
36fd6e86
DW
2100 case XFS_IOC_SCRUB_METADATA:
2101 return xfs_ioc_scrub_metadata(ip, arg);
2102
df26cfe8
LM
2103 case XFS_IOC_FD_TO_HANDLE:
2104 case XFS_IOC_PATH_TO_HANDLE:
743bb465 2105 case XFS_IOC_PATH_TO_FSHANDLE: {
2106 xfs_fsop_handlereq_t hreq;
df26cfe8 2107
743bb465 2108 if (copy_from_user(&hreq, arg, sizeof(hreq)))
b474c7ae 2109 return -EFAULT;
743bb465 2110 return xfs_find_handle(cmd, &hreq);
2111 }
2112 case XFS_IOC_OPEN_BY_HANDLE: {
2113 xfs_fsop_handlereq_t hreq;
df26cfe8 2114
743bb465 2115 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 2116 return -EFAULT;
d296d30a 2117 return xfs_open_by_handle(filp, &hreq);
743bb465 2118 }
df26cfe8 2119
743bb465 2120 case XFS_IOC_READLINK_BY_HANDLE: {
2121 xfs_fsop_handlereq_t hreq;
df26cfe8 2122
743bb465 2123 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 2124 return -EFAULT;
d296d30a 2125 return xfs_readlink_by_handle(filp, &hreq);
743bb465 2126 }
df26cfe8 2127 case XFS_IOC_ATTRLIST_BY_HANDLE:
d296d30a 2128 return xfs_attrlist_by_handle(filp, arg);
df26cfe8
LM
2129
2130 case XFS_IOC_ATTRMULTI_BY_HANDLE:
d296d30a 2131 return xfs_attrmulti_by_handle(filp, arg);
df26cfe8
LM
2132
2133 case XFS_IOC_SWAPEXT: {
743bb465 2134 struct xfs_swapext sxp;
2135
2136 if (copy_from_user(&sxp, arg, sizeof(xfs_swapext_t)))
b474c7ae 2137 return -EFAULT;
d9457dc0
JK
2138 error = mnt_want_write_file(filp);
2139 if (error)
2140 return error;
a133d952 2141 error = xfs_ioc_swapext(&sxp);
d9457dc0 2142 mnt_drop_write_file(filp);
2451337d 2143 return error;
df26cfe8
LM
2144 }
2145
2146 case XFS_IOC_FSCOUNTS: {
2147 xfs_fsop_counts_t out;
2148
91083269 2149 xfs_fs_counts(mp, &out);
df26cfe8
LM
2150
2151 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 2152 return -EFAULT;
df26cfe8
LM
2153 return 0;
2154 }
2155
2156 case XFS_IOC_SET_RESBLKS: {
2157 xfs_fsop_resblks_t inout;
c8ce540d 2158 uint64_t in;
df26cfe8
LM
2159
2160 if (!capable(CAP_SYS_ADMIN))
2161 return -EPERM;
2162
d5db0f97 2163 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 2164 return -EROFS;
d5db0f97 2165
df26cfe8 2166 if (copy_from_user(&inout, arg, sizeof(inout)))
b474c7ae 2167 return -EFAULT;
df26cfe8 2168
d9457dc0
JK
2169 error = mnt_want_write_file(filp);
2170 if (error)
2171 return error;
2172
df26cfe8
LM
2173 /* input parameter is passed in resblks field of structure */
2174 in = inout.resblks;
2175 error = xfs_reserve_blocks(mp, &in, &inout);
d9457dc0 2176 mnt_drop_write_file(filp);
df26cfe8 2177 if (error)
2451337d 2178 return error;
df26cfe8
LM
2179
2180 if (copy_to_user(arg, &inout, sizeof(inout)))
b474c7ae 2181 return -EFAULT;
df26cfe8
LM
2182 return 0;
2183 }
2184
2185 case XFS_IOC_GET_RESBLKS: {
2186 xfs_fsop_resblks_t out;
2187
2188 if (!capable(CAP_SYS_ADMIN))
2189 return -EPERM;
2190
2191 error = xfs_reserve_blocks(mp, NULL, &out);
2192 if (error)
2451337d 2193 return error;
df26cfe8
LM
2194
2195 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 2196 return -EFAULT;
df26cfe8
LM
2197
2198 return 0;
2199 }
2200
2201 case XFS_IOC_FSGROWFSDATA: {
2202 xfs_growfs_data_t in;
2203
df26cfe8 2204 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2205 return -EFAULT;
df26cfe8 2206
d9457dc0
JK
2207 error = mnt_want_write_file(filp);
2208 if (error)
2209 return error;
df26cfe8 2210 error = xfs_growfs_data(mp, &in);
d9457dc0 2211 mnt_drop_write_file(filp);
2451337d 2212 return error;
df26cfe8
LM
2213 }
2214
2215 case XFS_IOC_FSGROWFSLOG: {
2216 xfs_growfs_log_t in;
2217
df26cfe8 2218 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2219 return -EFAULT;
df26cfe8 2220
d9457dc0
JK
2221 error = mnt_want_write_file(filp);
2222 if (error)
2223 return error;
df26cfe8 2224 error = xfs_growfs_log(mp, &in);
d9457dc0 2225 mnt_drop_write_file(filp);
2451337d 2226 return error;
df26cfe8
LM
2227 }
2228
2229 case XFS_IOC_FSGROWFSRT: {
2230 xfs_growfs_rt_t in;
2231
df26cfe8 2232 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2233 return -EFAULT;
df26cfe8 2234
d9457dc0
JK
2235 error = mnt_want_write_file(filp);
2236 if (error)
2237 return error;
df26cfe8 2238 error = xfs_growfs_rt(mp, &in);
d9457dc0 2239 mnt_drop_write_file(filp);
2451337d 2240 return error;
df26cfe8
LM
2241 }
2242
df26cfe8 2243 case XFS_IOC_GOINGDOWN: {
c8ce540d 2244 uint32_t in;
df26cfe8
LM
2245
2246 if (!capable(CAP_SYS_ADMIN))
2247 return -EPERM;
2248
c8ce540d 2249 if (get_user(in, (uint32_t __user *)arg))
b474c7ae 2250 return -EFAULT;
df26cfe8 2251
2451337d 2252 return xfs_fs_goingdown(mp, in);
df26cfe8
LM
2253 }
2254
2255 case XFS_IOC_ERROR_INJECTION: {
2256 xfs_error_injection_t in;
2257
2258 if (!capable(CAP_SYS_ADMIN))
2259 return -EPERM;
2260
2261 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2262 return -EFAULT;
df26cfe8 2263
31965ef3 2264 return xfs_errortag_add(mp, in.errtag);
df26cfe8
LM
2265 }
2266
2267 case XFS_IOC_ERROR_CLEARALL:
2268 if (!capable(CAP_SYS_ADMIN))
2269 return -EPERM;
2270
31965ef3 2271 return xfs_errortag_clearall(mp);
df26cfe8 2272
8ca149de 2273 case XFS_IOC_FREE_EOFBLOCKS: {
b9fe5052
DE
2274 struct xfs_fs_eofblocks eofb;
2275 struct xfs_eofblocks keofb;
8ca149de 2276
8c567a7f
DE
2277 if (!capable(CAP_SYS_ADMIN))
2278 return -EPERM;
2279
2280 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 2281 return -EROFS;
8c567a7f 2282
8ca149de 2283 if (copy_from_user(&eofb, arg, sizeof(eofb)))
b474c7ae 2284 return -EFAULT;
8ca149de 2285
b9fe5052
DE
2286 error = xfs_fs_eofblocks_from_user(&eofb, &keofb);
2287 if (error)
2451337d 2288 return error;
8ca149de 2289
4b674b9a
BF
2290 sb_start_write(mp->m_super);
2291 error = xfs_icache_free_eofblocks(mp, &keofb);
2292 sb_end_write(mp->m_super);
2293 return error;
8ca149de
BF
2294 }
2295
df26cfe8
LM
2296 default:
2297 return -ENOTTY;
2298 }
2299}