Merge branches 'pm-core', 'pm-clk', 'pm-domains' and 'pm-pci'
[deliverable/linux.git] / fs / xfs / xfs_ioctl.c
CommitLineData
1da177e4 1/*
7b718769
NS
2 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
3 * All Rights Reserved.
1da177e4 4 *
7b718769
NS
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License as
1da177e4
LT
7 * published by the Free Software Foundation.
8 *
7b718769
NS
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
1da177e4 13 *
7b718769
NS
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4 17 */
1da177e4 18#include "xfs.h"
1da177e4 19#include "xfs_fs.h"
70a9883c 20#include "xfs_shared.h"
239880ef
DC
21#include "xfs_format.h"
22#include "xfs_log_format.h"
23#include "xfs_trans_resv.h"
1da177e4 24#include "xfs_mount.h"
1da177e4 25#include "xfs_inode.h"
7bf446f8 26#include "xfs_ioctl.h"
a4fbe6ab 27#include "xfs_alloc.h"
1da177e4 28#include "xfs_rtalloc.h"
1da177e4 29#include "xfs_itable.h"
a844f451 30#include "xfs_error.h"
1da177e4 31#include "xfs_attr.h"
a844f451 32#include "xfs_bmap.h"
68988114 33#include "xfs_bmap_util.h"
1da177e4 34#include "xfs_fsops.h"
a46db608 35#include "xfs_discard.h"
25fe55e8 36#include "xfs_quota.h"
d296d30a 37#include "xfs_export.h"
0b1b213f 38#include "xfs_trace.h"
8ca149de 39#include "xfs_icache.h"
c24b5dfa 40#include "xfs_symlink.h"
a4fbe6ab 41#include "xfs_trans.h"
781355c6 42#include "xfs_pnfs.h"
47e1bf64 43#include "xfs_acl.h"
1da177e4 44
16f7e0fe 45#include <linux/capability.h>
1da177e4
LT
46#include <linux/dcache.h>
47#include <linux/mount.h>
48#include <linux/namei.h>
49#include <linux/pagemap.h>
5a0e3ad6 50#include <linux/slab.h>
d296d30a 51#include <linux/exportfs.h>
1da177e4
LT
52
53/*
54 * xfs_find_handle maps from userspace xfs_fsop_handlereq structure to
55 * a file or fs handle.
56 *
57 * XFS_IOC_PATH_TO_FSHANDLE
58 * returns fs handle for a mount point or path within that mount point
59 * XFS_IOC_FD_TO_HANDLE
60 * returns full handle for a FD opened in user space
61 * XFS_IOC_PATH_TO_HANDLE
62 * returns full handle for a path
63 */
d5547f9f 64int
1da177e4
LT
65xfs_find_handle(
66 unsigned int cmd,
743bb465 67 xfs_fsop_handlereq_t *hreq)
1da177e4
LT
68{
69 int hsize;
70 xfs_handle_t handle;
1da177e4 71 struct inode *inode;
a30b0367 72 struct fd f = {NULL};
4346cdd4 73 struct path path;
2903ff01 74 int error;
4346cdd4 75 struct xfs_inode *ip;
1da177e4 76
4346cdd4 77 if (cmd == XFS_IOC_FD_TO_HANDLE) {
2903ff01
AV
78 f = fdget(hreq->fd);
79 if (!f.file)
4346cdd4 80 return -EBADF;
496ad9aa 81 inode = file_inode(f.file);
4346cdd4
CH
82 } else {
83 error = user_lpath((const char __user *)hreq->path, &path);
84 if (error)
85 return error;
2b0143b5 86 inode = d_inode(path.dentry);
1da177e4 87 }
4346cdd4
CH
88 ip = XFS_I(inode);
89
90 /*
91 * We can only generate handles for inodes residing on a XFS filesystem,
92 * and only for regular files, directories or symbolic links.
93 */
94 error = -EINVAL;
95 if (inode->i_sb->s_magic != XFS_SB_MAGIC)
96 goto out_put;
97
98 error = -EBADF;
99 if (!S_ISREG(inode->i_mode) &&
100 !S_ISDIR(inode->i_mode) &&
101 !S_ISLNK(inode->i_mode))
102 goto out_put;
103
104
105 memcpy(&handle.ha_fsid, ip->i_mount->m_fixedfsid, sizeof(xfs_fsid_t));
106
107 if (cmd == XFS_IOC_PATH_TO_FSHANDLE) {
108 /*
109 * This handle only contains an fsid, zero the rest.
110 */
111 memset(&handle.ha_fid, 0, sizeof(handle.ha_fid));
112 hsize = sizeof(xfs_fsid_t);
113 } else {
c6143911
CH
114 handle.ha_fid.fid_len = sizeof(xfs_fid_t) -
115 sizeof(handle.ha_fid.fid_len);
116 handle.ha_fid.fid_pad = 0;
9e9a2674 117 handle.ha_fid.fid_gen = inode->i_generation;
c6143911 118 handle.ha_fid.fid_ino = ip->i_ino;
1da177e4
LT
119
120 hsize = XFS_HSIZE(handle);
121 }
122
4346cdd4 123 error = -EFAULT;
743bb465 124 if (copy_to_user(hreq->ohandle, &handle, hsize) ||
4346cdd4
CH
125 copy_to_user(hreq->ohandlen, &hsize, sizeof(__s32)))
126 goto out_put;
1da177e4 127
4346cdd4
CH
128 error = 0;
129
130 out_put:
131 if (cmd == XFS_IOC_FD_TO_HANDLE)
2903ff01 132 fdput(f);
4346cdd4
CH
133 else
134 path_put(&path);
135 return error;
1da177e4
LT
136}
137
1da177e4 138/*
d296d30a
CH
139 * No need to do permission checks on the various pathname components
140 * as the handle operations are privileged.
1da177e4
LT
141 */
142STATIC int
d296d30a
CH
143xfs_handle_acceptable(
144 void *context,
145 struct dentry *dentry)
146{
147 return 1;
148}
149
150/*
151 * Convert userspace handle data into a dentry.
152 */
153struct dentry *
154xfs_handle_to_dentry(
155 struct file *parfilp,
156 void __user *uhandle,
157 u32 hlen)
1da177e4 158{
1da177e4 159 xfs_handle_t handle;
d296d30a 160 struct xfs_fid64 fid;
1da177e4
LT
161
162 /*
163 * Only allow handle opens under a directory.
164 */
496ad9aa 165 if (!S_ISDIR(file_inode(parfilp)->i_mode))
d296d30a
CH
166 return ERR_PTR(-ENOTDIR);
167
168 if (hlen != sizeof(xfs_handle_t))
169 return ERR_PTR(-EINVAL);
170 if (copy_from_user(&handle, uhandle, hlen))
171 return ERR_PTR(-EFAULT);
172 if (handle.ha_fid.fid_len !=
173 sizeof(handle.ha_fid) - sizeof(handle.ha_fid.fid_len))
174 return ERR_PTR(-EINVAL);
175
176 memset(&fid, 0, sizeof(struct fid));
177 fid.ino = handle.ha_fid.fid_ino;
178 fid.gen = handle.ha_fid.fid_gen;
179
180 return exportfs_decode_fh(parfilp->f_path.mnt, (struct fid *)&fid, 3,
181 FILEID_INO32_GEN | XFS_FILEID_TYPE_64FLAG,
182 xfs_handle_acceptable, NULL);
183}
1da177e4 184
d296d30a
CH
185STATIC struct dentry *
186xfs_handlereq_to_dentry(
187 struct file *parfilp,
188 xfs_fsop_handlereq_t *hreq)
189{
190 return xfs_handle_to_dentry(parfilp, hreq->ihandle, hreq->ihandlen);
1da177e4
LT
191}
192
d5547f9f 193int
1da177e4 194xfs_open_by_handle(
1da177e4 195 struct file *parfilp,
d296d30a 196 xfs_fsop_handlereq_t *hreq)
1da177e4 197{
745ca247 198 const struct cred *cred = current_cred();
1da177e4 199 int error;
d296d30a 200 int fd;
1da177e4
LT
201 int permflag;
202 struct file *filp;
203 struct inode *inode;
204 struct dentry *dentry;
1a1d7724 205 fmode_t fmode;
765927b2 206 struct path path;
1da177e4
LT
207
208 if (!capable(CAP_SYS_ADMIN))
b474c7ae 209 return -EPERM;
1da177e4 210
d296d30a
CH
211 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
212 if (IS_ERR(dentry))
213 return PTR_ERR(dentry);
2b0143b5 214 inode = d_inode(dentry);
1da177e4
LT
215
216 /* Restrict xfs_open_by_handle to directories & regular files. */
217 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) {
b474c7ae 218 error = -EPERM;
d296d30a 219 goto out_dput;
1da177e4
LT
220 }
221
222#if BITS_PER_LONG != 32
743bb465 223 hreq->oflags |= O_LARGEFILE;
1da177e4 224#endif
d296d30a 225
743bb465 226 permflag = hreq->oflags;
1a1d7724 227 fmode = OPEN_FMODE(permflag);
1da177e4 228 if ((!(permflag & O_APPEND) || (permflag & O_TRUNC)) &&
1a1d7724 229 (fmode & FMODE_WRITE) && IS_APPEND(inode)) {
b474c7ae 230 error = -EPERM;
d296d30a 231 goto out_dput;
1da177e4
LT
232 }
233
1a1d7724 234 if ((fmode & FMODE_WRITE) && IS_IMMUTABLE(inode)) {
b474c7ae 235 error = -EACCES;
d296d30a 236 goto out_dput;
1da177e4
LT
237 }
238
239 /* Can't write directories. */
1a1d7724 240 if (S_ISDIR(inode->i_mode) && (fmode & FMODE_WRITE)) {
b474c7ae 241 error = -EISDIR;
d296d30a 242 goto out_dput;
1da177e4
LT
243 }
244
862a6293 245 fd = get_unused_fd_flags(0);
d296d30a
CH
246 if (fd < 0) {
247 error = fd;
248 goto out_dput;
1da177e4
LT
249 }
250
765927b2
AV
251 path.mnt = parfilp->f_path.mnt;
252 path.dentry = dentry;
253 filp = dentry_open(&path, hreq->oflags, cred);
254 dput(dentry);
1da177e4 255 if (IS_ERR(filp)) {
d296d30a
CH
256 put_unused_fd(fd);
257 return PTR_ERR(filp);
1da177e4 258 }
4d4be482 259
03209378 260 if (S_ISREG(inode->i_mode)) {
2e2e7bb1 261 filp->f_flags |= O_NOATIME;
4d4be482 262 filp->f_mode |= FMODE_NOCMTIME;
2e2e7bb1 263 }
1da177e4 264
d296d30a
CH
265 fd_install(fd, filp);
266 return fd;
267
268 out_dput:
269 dput(dentry);
270 return error;
1da177e4
LT
271}
272
d5547f9f 273int
1da177e4 274xfs_readlink_by_handle(
d296d30a
CH
275 struct file *parfilp,
276 xfs_fsop_handlereq_t *hreq)
1da177e4 277{
d296d30a 278 struct dentry *dentry;
1da177e4 279 __u32 olen;
804c83c3 280 int error;
1da177e4
LT
281
282 if (!capable(CAP_SYS_ADMIN))
b474c7ae 283 return -EPERM;
1da177e4 284
d296d30a
CH
285 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
286 if (IS_ERR(dentry))
287 return PTR_ERR(dentry);
1da177e4
LT
288
289 /* Restrict this handle operation to symlinks only. */
bfe8804d 290 if (!d_inode(dentry)->i_op->readlink) {
b474c7ae 291 error = -EINVAL;
d296d30a 292 goto out_dput;
1da177e4
LT
293 }
294
743bb465 295 if (copy_from_user(&olen, hreq->ohandlen, sizeof(__u32))) {
b474c7ae 296 error = -EFAULT;
d296d30a 297 goto out_dput;
1da177e4 298 }
1da177e4 299
bfe8804d 300 error = d_inode(dentry)->i_op->readlink(dentry, hreq->ohandle, olen);
67fcaa73 301
d296d30a
CH
302 out_dput:
303 dput(dentry);
804c83c3 304 return error;
1da177e4
LT
305}
306
c24b5dfa
DC
307int
308xfs_set_dmattrs(
309 xfs_inode_t *ip,
310 u_int evmask,
311 u_int16_t state)
312{
313 xfs_mount_t *mp = ip->i_mount;
314 xfs_trans_t *tp;
315 int error;
316
317 if (!capable(CAP_SYS_ADMIN))
2451337d 318 return -EPERM;
c24b5dfa
DC
319
320 if (XFS_FORCED_SHUTDOWN(mp))
2451337d 321 return -EIO;
c24b5dfa 322
253f4911
CH
323 error = xfs_trans_alloc(mp, &M_RES(mp)->tr_ichange, 0, 0, 0, &tp);
324 if (error)
c24b5dfa 325 return error;
253f4911 326
c24b5dfa
DC
327 xfs_ilock(ip, XFS_ILOCK_EXCL);
328 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL);
329
330 ip->i_d.di_dmevmask = evmask;
331 ip->i_d.di_dmstate = state;
332
333 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
70393313 334 error = xfs_trans_commit(tp);
c24b5dfa
DC
335
336 return error;
337}
338
1da177e4
LT
339STATIC int
340xfs_fssetdm_by_handle(
d296d30a
CH
341 struct file *parfilp,
342 void __user *arg)
1da177e4
LT
343{
344 int error;
345 struct fsdmidata fsd;
346 xfs_fsop_setdm_handlereq_t dmhreq;
d296d30a 347 struct dentry *dentry;
1da177e4
LT
348
349 if (!capable(CAP_MKNOD))
b474c7ae 350 return -EPERM;
1da177e4 351 if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t)))
b474c7ae 352 return -EFAULT;
1da177e4 353
d9457dc0
JK
354 error = mnt_want_write_file(parfilp);
355 if (error)
356 return error;
357
d296d30a 358 dentry = xfs_handlereq_to_dentry(parfilp, &dmhreq.hreq);
d9457dc0
JK
359 if (IS_ERR(dentry)) {
360 mnt_drop_write_file(parfilp);
d296d30a 361 return PTR_ERR(dentry);
d9457dc0 362 }
1da177e4 363
2b0143b5 364 if (IS_IMMUTABLE(d_inode(dentry)) || IS_APPEND(d_inode(dentry))) {
b474c7ae 365 error = -EPERM;
6e7f75ea 366 goto out;
1da177e4
LT
367 }
368
369 if (copy_from_user(&fsd, dmhreq.data, sizeof(fsd))) {
b474c7ae 370 error = -EFAULT;
6e7f75ea 371 goto out;
1da177e4
LT
372 }
373
2b0143b5 374 error = xfs_set_dmattrs(XFS_I(d_inode(dentry)), fsd.fsd_dmevmask,
6e7f75ea 375 fsd.fsd_dmstate);
1da177e4 376
6e7f75ea 377 out:
d9457dc0 378 mnt_drop_write_file(parfilp);
d296d30a 379 dput(dentry);
6e7f75ea 380 return error;
1da177e4
LT
381}
382
383STATIC int
384xfs_attrlist_by_handle(
d296d30a
CH
385 struct file *parfilp,
386 void __user *arg)
1da177e4 387{
d296d30a 388 int error = -ENOMEM;
1da177e4
LT
389 attrlist_cursor_kern_t *cursor;
390 xfs_fsop_attrlist_handlereq_t al_hreq;
d296d30a 391 struct dentry *dentry;
1da177e4
LT
392 char *kbuf;
393
394 if (!capable(CAP_SYS_ADMIN))
b474c7ae 395 return -EPERM;
1da177e4 396 if (copy_from_user(&al_hreq, arg, sizeof(xfs_fsop_attrlist_handlereq_t)))
b474c7ae 397 return -EFAULT;
071c529e 398 if (al_hreq.buflen < sizeof(struct attrlist) ||
4e247614 399 al_hreq.buflen > XFS_XATTR_LIST_MAX)
b474c7ae 400 return -EINVAL;
1da177e4 401
90ad58a8
CH
402 /*
403 * Reject flags, only allow namespaces.
404 */
405 if (al_hreq.flags & ~(ATTR_ROOT | ATTR_SECURE))
b474c7ae 406 return -EINVAL;
90ad58a8 407
d296d30a
CH
408 dentry = xfs_handlereq_to_dentry(parfilp, &al_hreq.hreq);
409 if (IS_ERR(dentry))
410 return PTR_ERR(dentry);
1da177e4 411
fdd3ccee
DC
412 kbuf = kmem_zalloc_large(al_hreq.buflen, KM_SLEEP);
413 if (!kbuf)
414 goto out_dput;
1da177e4
LT
415
416 cursor = (attrlist_cursor_kern_t *)&al_hreq.pos;
2b0143b5 417 error = xfs_attr_list(XFS_I(d_inode(dentry)), kbuf, al_hreq.buflen,
739bfb2a 418 al_hreq.flags, cursor);
1da177e4
LT
419 if (error)
420 goto out_kfree;
421
422 if (copy_to_user(al_hreq.buffer, kbuf, al_hreq.buflen))
423 error = -EFAULT;
424
fdd3ccee
DC
425out_kfree:
426 kmem_free(kbuf);
427out_dput:
d296d30a
CH
428 dput(dentry);
429 return error;
1da177e4
LT
430}
431
28750975 432int
1da177e4 433xfs_attrmulti_attr_get(
739bfb2a 434 struct inode *inode,
a9273ca5
DC
435 unsigned char *name,
436 unsigned char __user *ubuf,
1da177e4
LT
437 __uint32_t *len,
438 __uint32_t flags)
439{
a9273ca5 440 unsigned char *kbuf;
2451337d 441 int error = -EFAULT;
e8b0ebaa 442
51fcbfe7 443 if (*len > XFS_XATTR_SIZE_MAX)
2451337d 444 return -EINVAL;
fdd3ccee
DC
445 kbuf = kmem_zalloc_large(*len, KM_SLEEP);
446 if (!kbuf)
2451337d 447 return -ENOMEM;
1da177e4 448
e8b0ebaa 449 error = xfs_attr_get(XFS_I(inode), name, kbuf, (int *)len, flags);
1da177e4
LT
450 if (error)
451 goto out_kfree;
452
453 if (copy_to_user(ubuf, kbuf, *len))
2451337d 454 error = -EFAULT;
1da177e4 455
fdd3ccee
DC
456out_kfree:
457 kmem_free(kbuf);
1da177e4
LT
458 return error;
459}
460
28750975 461int
1da177e4 462xfs_attrmulti_attr_set(
739bfb2a 463 struct inode *inode,
a9273ca5
DC
464 unsigned char *name,
465 const unsigned char __user *ubuf,
1da177e4
LT
466 __uint32_t len,
467 __uint32_t flags)
468{
a9273ca5 469 unsigned char *kbuf;
09cb22d2 470 int error;
1da177e4 471
739bfb2a 472 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 473 return -EPERM;
51fcbfe7 474 if (len > XFS_XATTR_SIZE_MAX)
2451337d 475 return -EINVAL;
1da177e4 476
0e639bde
LZ
477 kbuf = memdup_user(ubuf, len);
478 if (IS_ERR(kbuf))
479 return PTR_ERR(kbuf);
e8b0ebaa 480
09cb22d2 481 error = xfs_attr_set(XFS_I(inode), name, kbuf, len, flags);
47e1bf64
AG
482 if (!error)
483 xfs_forget_acl(inode, name, flags);
09cb22d2
AG
484 kfree(kbuf);
485 return error;
1da177e4
LT
486}
487
28750975 488int
1da177e4 489xfs_attrmulti_attr_remove(
739bfb2a 490 struct inode *inode,
a9273ca5 491 unsigned char *name,
1da177e4
LT
492 __uint32_t flags)
493{
47e1bf64
AG
494 int error;
495
739bfb2a 496 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 497 return -EPERM;
47e1bf64
AG
498 error = xfs_attr_remove(XFS_I(inode), name, flags);
499 if (!error)
500 xfs_forget_acl(inode, name, flags);
501 return error;
1da177e4
LT
502}
503
504STATIC int
505xfs_attrmulti_by_handle(
42a74f20 506 struct file *parfilp,
d296d30a 507 void __user *arg)
1da177e4
LT
508{
509 int error;
510 xfs_attr_multiop_t *ops;
511 xfs_fsop_attrmulti_handlereq_t am_hreq;
d296d30a 512 struct dentry *dentry;
1da177e4 513 unsigned int i, size;
a9273ca5 514 unsigned char *attr_name;
1da177e4
LT
515
516 if (!capable(CAP_SYS_ADMIN))
b474c7ae 517 return -EPERM;
1da177e4 518 if (copy_from_user(&am_hreq, arg, sizeof(xfs_fsop_attrmulti_handlereq_t)))
b474c7ae 519 return -EFAULT;
1da177e4 520
fda168c2
ZW
521 /* overflow check */
522 if (am_hreq.opcount >= INT_MAX / sizeof(xfs_attr_multiop_t))
523 return -E2BIG;
524
d296d30a
CH
525 dentry = xfs_handlereq_to_dentry(parfilp, &am_hreq.hreq);
526 if (IS_ERR(dentry))
527 return PTR_ERR(dentry);
1da177e4 528
2451337d 529 error = -E2BIG;
e182f57a 530 size = am_hreq.opcount * sizeof(xfs_attr_multiop_t);
1da177e4 531 if (!size || size > 16 * PAGE_SIZE)
d296d30a 532 goto out_dput;
1da177e4 533
0e639bde
LZ
534 ops = memdup_user(am_hreq.ops, size);
535 if (IS_ERR(ops)) {
2451337d 536 error = PTR_ERR(ops);
d296d30a 537 goto out_dput;
0e639bde 538 }
1da177e4 539
2451337d 540 error = -ENOMEM;
1da177e4
LT
541 attr_name = kmalloc(MAXNAMELEN, GFP_KERNEL);
542 if (!attr_name)
543 goto out_kfree_ops;
544
1da177e4
LT
545 error = 0;
546 for (i = 0; i < am_hreq.opcount; i++) {
a9273ca5 547 ops[i].am_error = strncpy_from_user((char *)attr_name,
1da177e4
LT
548 ops[i].am_attrname, MAXNAMELEN);
549 if (ops[i].am_error == 0 || ops[i].am_error == MAXNAMELEN)
2451337d 550 error = -ERANGE;
1da177e4
LT
551 if (ops[i].am_error < 0)
552 break;
553
554 switch (ops[i].am_opcode) {
555 case ATTR_OP_GET:
d296d30a 556 ops[i].am_error = xfs_attrmulti_attr_get(
2b0143b5 557 d_inode(dentry), attr_name,
d296d30a
CH
558 ops[i].am_attrvalue, &ops[i].am_length,
559 ops[i].am_flags);
1da177e4
LT
560 break;
561 case ATTR_OP_SET:
a561be71 562 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
563 if (ops[i].am_error)
564 break;
d296d30a 565 ops[i].am_error = xfs_attrmulti_attr_set(
2b0143b5 566 d_inode(dentry), attr_name,
d296d30a
CH
567 ops[i].am_attrvalue, ops[i].am_length,
568 ops[i].am_flags);
2a79f17e 569 mnt_drop_write_file(parfilp);
1da177e4
LT
570 break;
571 case ATTR_OP_REMOVE:
a561be71 572 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
573 if (ops[i].am_error)
574 break;
d296d30a 575 ops[i].am_error = xfs_attrmulti_attr_remove(
2b0143b5 576 d_inode(dentry), attr_name,
d296d30a 577 ops[i].am_flags);
2a79f17e 578 mnt_drop_write_file(parfilp);
1da177e4
LT
579 break;
580 default:
2451337d 581 ops[i].am_error = -EINVAL;
1da177e4
LT
582 }
583 }
584
585 if (copy_to_user(am_hreq.ops, ops, size))
2451337d 586 error = -EFAULT;
1da177e4
LT
587
588 kfree(attr_name);
589 out_kfree_ops:
590 kfree(ops);
d296d30a
CH
591 out_dput:
592 dput(dentry);
2451337d 593 return error;
1da177e4
LT
594}
595
d5547f9f 596int
1da177e4 597xfs_ioc_space(
993386c1 598 struct xfs_inode *ip,
f37ea149 599 struct inode *inode,
1da177e4
LT
600 struct file *filp,
601 int ioflags,
602 unsigned int cmd,
743bb465 603 xfs_flock64_t *bf)
1da177e4 604{
865e9446 605 struct iattr iattr;
8add71ca 606 enum xfs_prealloc_flags flags = 0;
781355c6 607 uint iolock = XFS_IOLOCK_EXCL;
1da177e4
LT
608 int error;
609
743bb465 610 /*
611 * Only allow the sys admin to reserve space unless
612 * unwritten extents are enabled.
613 */
614 if (!xfs_sb_version_hasextflgbit(&ip->i_mount->m_sb) &&
615 !capable(CAP_SYS_ADMIN))
b474c7ae 616 return -EPERM;
743bb465 617
f37ea149 618 if (inode->i_flags & (S_IMMUTABLE|S_APPEND))
b474c7ae 619 return -EPERM;
1da177e4 620
ad4a8ac4 621 if (!(filp->f_mode & FMODE_WRITE))
b474c7ae 622 return -EBADF;
1da177e4 623
f37ea149 624 if (!S_ISREG(inode->i_mode))
b474c7ae 625 return -EINVAL;
1da177e4 626
8add71ca
CH
627 if (filp->f_flags & O_DSYNC)
628 flags |= XFS_PREALLOC_SYNC;
e8e9ad42 629 if (ioflags & XFS_IO_INVIS)
8add71ca
CH
630 flags |= XFS_PREALLOC_INVISIBLE;
631
d9457dc0
JK
632 error = mnt_want_write_file(filp);
633 if (error)
634 return error;
865e9446 635
781355c6 636 xfs_ilock(ip, iolock);
21c3ea18 637 error = xfs_break_layouts(inode, &iolock, false);
781355c6
CH
638 if (error)
639 goto out_unlock;
865e9446 640
e8e9ad42
DC
641 xfs_ilock(ip, XFS_MMAPLOCK_EXCL);
642 iolock |= XFS_MMAPLOCK_EXCL;
643
865e9446
CH
644 switch (bf->l_whence) {
645 case 0: /*SEEK_SET*/
646 break;
647 case 1: /*SEEK_CUR*/
648 bf->l_start += filp->f_pos;
649 break;
650 case 2: /*SEEK_END*/
651 bf->l_start += XFS_ISIZE(ip);
652 break;
653 default:
2451337d 654 error = -EINVAL;
865e9446
CH
655 goto out_unlock;
656 }
657
658 /*
659 * length of <= 0 for resv/unresv/zero is invalid. length for
660 * alloc/free is ignored completely and we have no idea what userspace
661 * might have set it to, so set it to zero to allow range
662 * checks to pass.
663 */
664 switch (cmd) {
665 case XFS_IOC_ZERO_RANGE:
666 case XFS_IOC_RESVSP:
667 case XFS_IOC_RESVSP64:
668 case XFS_IOC_UNRESVSP:
669 case XFS_IOC_UNRESVSP64:
670 if (bf->l_len <= 0) {
2451337d 671 error = -EINVAL;
865e9446
CH
672 goto out_unlock;
673 }
674 break;
675 default:
676 bf->l_len = 0;
677 break;
678 }
679
680 if (bf->l_start < 0 ||
8add71ca 681 bf->l_start > inode->i_sb->s_maxbytes ||
865e9446 682 bf->l_start + bf->l_len < 0 ||
8add71ca 683 bf->l_start + bf->l_len >= inode->i_sb->s_maxbytes) {
2451337d 684 error = -EINVAL;
865e9446
CH
685 goto out_unlock;
686 }
687
688 switch (cmd) {
689 case XFS_IOC_ZERO_RANGE:
8add71ca 690 flags |= XFS_PREALLOC_SET;
865e9446 691 error = xfs_zero_file_space(ip, bf->l_start, bf->l_len);
865e9446
CH
692 break;
693 case XFS_IOC_RESVSP:
694 case XFS_IOC_RESVSP64:
8add71ca 695 flags |= XFS_PREALLOC_SET;
865e9446
CH
696 error = xfs_alloc_file_space(ip, bf->l_start, bf->l_len,
697 XFS_BMAPI_PREALLOC);
865e9446
CH
698 break;
699 case XFS_IOC_UNRESVSP:
700 case XFS_IOC_UNRESVSP64:
701 error = xfs_free_file_space(ip, bf->l_start, bf->l_len);
702 break;
703 case XFS_IOC_ALLOCSP:
704 case XFS_IOC_ALLOCSP64:
705 case XFS_IOC_FREESP:
706 case XFS_IOC_FREESP64:
8add71ca 707 flags |= XFS_PREALLOC_CLEAR;
865e9446
CH
708 if (bf->l_start > XFS_ISIZE(ip)) {
709 error = xfs_alloc_file_space(ip, XFS_ISIZE(ip),
710 bf->l_start - XFS_ISIZE(ip), 0);
711 if (error)
712 goto out_unlock;
713 }
714
715 iattr.ia_valid = ATTR_SIZE;
716 iattr.ia_size = bf->l_start;
717
718 error = xfs_setattr_size(ip, &iattr);
865e9446
CH
719 break;
720 default:
721 ASSERT(0);
2451337d 722 error = -EINVAL;
865e9446
CH
723 }
724
725 if (error)
726 goto out_unlock;
727
8add71ca 728 error = xfs_update_prealloc_flags(ip, flags);
865e9446
CH
729
730out_unlock:
781355c6 731 xfs_iunlock(ip, iolock);
d9457dc0 732 mnt_drop_write_file(filp);
2451337d 733 return error;
1da177e4
LT
734}
735
736STATIC int
737xfs_ioc_bulkstat(
738 xfs_mount_t *mp,
739 unsigned int cmd,
740 void __user *arg)
741{
742 xfs_fsop_bulkreq_t bulkreq;
743 int count; /* # of records returned */
744 xfs_ino_t inlast; /* last inode number */
745 int done;
746 int error;
747
748 /* done = 1 if there are more stats to get and if bulkstat */
749 /* should be called again (unused here, but used in dmapi) */
750
751 if (!capable(CAP_SYS_ADMIN))
752 return -EPERM;
753
754 if (XFS_FORCED_SHUTDOWN(mp))
b474c7ae 755 return -EIO;
1da177e4
LT
756
757 if (copy_from_user(&bulkreq, arg, sizeof(xfs_fsop_bulkreq_t)))
b474c7ae 758 return -EFAULT;
1da177e4
LT
759
760 if (copy_from_user(&inlast, bulkreq.lastip, sizeof(__s64)))
b474c7ae 761 return -EFAULT;
1da177e4
LT
762
763 if ((count = bulkreq.icount) <= 0)
b474c7ae 764 return -EINVAL;
1da177e4 765
cd57e594 766 if (bulkreq.ubuffer == NULL)
b474c7ae 767 return -EINVAL;
cd57e594 768
1da177e4
LT
769 if (cmd == XFS_IOC_FSINUMBERS)
770 error = xfs_inumbers(mp, &inlast, &count,
faa63e95 771 bulkreq.ubuffer, xfs_inumbers_fmt);
1da177e4 772 else if (cmd == XFS_IOC_FSBULKSTAT_SINGLE)
d716f8ee
CH
773 error = xfs_bulkstat_one(mp, inlast, bulkreq.ubuffer,
774 sizeof(xfs_bstat_t), NULL, &done);
cd57e594 775 else /* XFS_IOC_FSBULKSTAT */
7dce11db
CH
776 error = xfs_bulkstat(mp, &inlast, &count, xfs_bulkstat_one,
777 sizeof(xfs_bstat_t), bulkreq.ubuffer,
778 &done);
1da177e4
LT
779
780 if (error)
2451337d 781 return error;
1da177e4
LT
782
783 if (bulkreq.ocount != NULL) {
784 if (copy_to_user(bulkreq.lastip, &inlast,
785 sizeof(xfs_ino_t)))
b474c7ae 786 return -EFAULT;
1da177e4
LT
787
788 if (copy_to_user(bulkreq.ocount, &count, sizeof(count)))
b474c7ae 789 return -EFAULT;
1da177e4
LT
790 }
791
792 return 0;
793}
794
795STATIC int
796xfs_ioc_fsgeometry_v1(
797 xfs_mount_t *mp,
798 void __user *arg)
799{
eeb2036b 800 xfs_fsop_geom_t fsgeo;
1da177e4
LT
801 int error;
802
eeb2036b 803 error = xfs_fs_geometry(mp, &fsgeo, 3);
1da177e4 804 if (error)
2451337d 805 return error;
1da177e4 806
eeb2036b
AE
807 /*
808 * Caller should have passed an argument of type
809 * xfs_fsop_geom_v1_t. This is a proper subset of the
810 * xfs_fsop_geom_t that xfs_fs_geometry() fills in.
811 */
812 if (copy_to_user(arg, &fsgeo, sizeof(xfs_fsop_geom_v1_t)))
b474c7ae 813 return -EFAULT;
1da177e4
LT
814 return 0;
815}
816
817STATIC int
818xfs_ioc_fsgeometry(
819 xfs_mount_t *mp,
820 void __user *arg)
821{
822 xfs_fsop_geom_t fsgeo;
823 int error;
824
825 error = xfs_fs_geometry(mp, &fsgeo, 4);
826 if (error)
2451337d 827 return error;
1da177e4
LT
828
829 if (copy_to_user(arg, &fsgeo, sizeof(fsgeo)))
b474c7ae 830 return -EFAULT;
1da177e4
LT
831 return 0;
832}
833
834/*
835 * Linux extended inode flags interface.
836 */
1da177e4
LT
837
838STATIC unsigned int
839xfs_merge_ioc_xflags(
840 unsigned int flags,
841 unsigned int start)
842{
843 unsigned int xflags = start;
844
39058a0e 845 if (flags & FS_IMMUTABLE_FL)
e7b89481 846 xflags |= FS_XFLAG_IMMUTABLE;
1da177e4 847 else
e7b89481 848 xflags &= ~FS_XFLAG_IMMUTABLE;
39058a0e 849 if (flags & FS_APPEND_FL)
e7b89481 850 xflags |= FS_XFLAG_APPEND;
1da177e4 851 else
e7b89481 852 xflags &= ~FS_XFLAG_APPEND;
39058a0e 853 if (flags & FS_SYNC_FL)
e7b89481 854 xflags |= FS_XFLAG_SYNC;
1da177e4 855 else
e7b89481 856 xflags &= ~FS_XFLAG_SYNC;
39058a0e 857 if (flags & FS_NOATIME_FL)
e7b89481 858 xflags |= FS_XFLAG_NOATIME;
1da177e4 859 else
e7b89481 860 xflags &= ~FS_XFLAG_NOATIME;
39058a0e 861 if (flags & FS_NODUMP_FL)
e7b89481 862 xflags |= FS_XFLAG_NODUMP;
1da177e4 863 else
e7b89481 864 xflags &= ~FS_XFLAG_NODUMP;
1da177e4
LT
865
866 return xflags;
867}
868
869STATIC unsigned int
870xfs_di2lxflags(
871 __uint16_t di_flags)
872{
873 unsigned int flags = 0;
874
875 if (di_flags & XFS_DIFLAG_IMMUTABLE)
39058a0e 876 flags |= FS_IMMUTABLE_FL;
1da177e4 877 if (di_flags & XFS_DIFLAG_APPEND)
39058a0e 878 flags |= FS_APPEND_FL;
1da177e4 879 if (di_flags & XFS_DIFLAG_SYNC)
39058a0e 880 flags |= FS_SYNC_FL;
1da177e4 881 if (di_flags & XFS_DIFLAG_NOATIME)
39058a0e 882 flags |= FS_NOATIME_FL;
1da177e4 883 if (di_flags & XFS_DIFLAG_NODUMP)
39058a0e 884 flags |= FS_NODUMP_FL;
1da177e4
LT
885 return flags;
886}
887
c83bfab1
CH
888STATIC int
889xfs_ioc_fsgetxattr(
890 xfs_inode_t *ip,
891 int attr,
892 void __user *arg)
893{
894 struct fsxattr fa;
895
a122eb2f
DR
896 memset(&fa, 0, sizeof(struct fsxattr));
897
c83bfab1
CH
898 xfs_ilock(ip, XFS_ILOCK_SHARED);
899 fa.fsx_xflags = xfs_ip2xflags(ip);
900 fa.fsx_extsize = ip->i_d.di_extsize << ip->i_mount->m_sb.sb_blocklog;
6743099c 901 fa.fsx_projid = xfs_get_projid(ip);
c83bfab1
CH
902
903 if (attr) {
904 if (ip->i_afp) {
905 if (ip->i_afp->if_flags & XFS_IFEXTENTS)
906 fa.fsx_nextents = ip->i_afp->if_bytes /
907 sizeof(xfs_bmbt_rec_t);
908 else
909 fa.fsx_nextents = ip->i_d.di_anextents;
910 } else
911 fa.fsx_nextents = 0;
912 } else {
913 if (ip->i_df.if_flags & XFS_IFEXTENTS)
914 fa.fsx_nextents = ip->i_df.if_bytes /
915 sizeof(xfs_bmbt_rec_t);
916 else
917 fa.fsx_nextents = ip->i_d.di_nextents;
918 }
919 xfs_iunlock(ip, XFS_ILOCK_SHARED);
920
921 if (copy_to_user(arg, &fa, sizeof(fa)))
922 return -EFAULT;
923 return 0;
924}
925
25fe55e8
CH
926STATIC void
927xfs_set_diflags(
928 struct xfs_inode *ip,
929 unsigned int xflags)
930{
931 unsigned int di_flags;
58f88ca2 932 uint64_t di_flags2;
25fe55e8
CH
933
934 /* can't set PREALLOC this way, just preserve it */
935 di_flags = (ip->i_d.di_flags & XFS_DIFLAG_PREALLOC);
e7b89481 936 if (xflags & FS_XFLAG_IMMUTABLE)
25fe55e8 937 di_flags |= XFS_DIFLAG_IMMUTABLE;
e7b89481 938 if (xflags & FS_XFLAG_APPEND)
25fe55e8 939 di_flags |= XFS_DIFLAG_APPEND;
e7b89481 940 if (xflags & FS_XFLAG_SYNC)
25fe55e8 941 di_flags |= XFS_DIFLAG_SYNC;
e7b89481 942 if (xflags & FS_XFLAG_NOATIME)
25fe55e8 943 di_flags |= XFS_DIFLAG_NOATIME;
e7b89481 944 if (xflags & FS_XFLAG_NODUMP)
25fe55e8 945 di_flags |= XFS_DIFLAG_NODUMP;
e7b89481 946 if (xflags & FS_XFLAG_NODEFRAG)
25fe55e8 947 di_flags |= XFS_DIFLAG_NODEFRAG;
e7b89481 948 if (xflags & FS_XFLAG_FILESTREAM)
25fe55e8 949 di_flags |= XFS_DIFLAG_FILESTREAM;
c19b3b05 950 if (S_ISDIR(VFS_I(ip)->i_mode)) {
e7b89481 951 if (xflags & FS_XFLAG_RTINHERIT)
25fe55e8 952 di_flags |= XFS_DIFLAG_RTINHERIT;
e7b89481 953 if (xflags & FS_XFLAG_NOSYMLINKS)
25fe55e8 954 di_flags |= XFS_DIFLAG_NOSYMLINKS;
e7b89481 955 if (xflags & FS_XFLAG_EXTSZINHERIT)
25fe55e8 956 di_flags |= XFS_DIFLAG_EXTSZINHERIT;
e7b89481 957 if (xflags & FS_XFLAG_PROJINHERIT)
9336e3a7 958 di_flags |= XFS_DIFLAG_PROJINHERIT;
c19b3b05 959 } else if (S_ISREG(VFS_I(ip)->i_mode)) {
e7b89481 960 if (xflags & FS_XFLAG_REALTIME)
25fe55e8 961 di_flags |= XFS_DIFLAG_REALTIME;
e7b89481 962 if (xflags & FS_XFLAG_EXTSIZE)
25fe55e8
CH
963 di_flags |= XFS_DIFLAG_EXTSIZE;
964 }
25fe55e8 965 ip->i_d.di_flags = di_flags;
58f88ca2
DC
966
967 /* diflags2 only valid for v3 inodes. */
968 if (ip->i_d.di_version < 3)
969 return;
970
971 di_flags2 = 0;
972 if (xflags & FS_XFLAG_DAX)
973 di_flags2 |= XFS_DIFLAG2_DAX;
974
975 ip->i_d.di_flags2 = di_flags2;
976
25fe55e8
CH
977}
978
f13fae2d
CH
979STATIC void
980xfs_diflags_to_linux(
981 struct xfs_inode *ip)
982{
e4f75291 983 struct inode *inode = VFS_I(ip);
f13fae2d
CH
984 unsigned int xflags = xfs_ip2xflags(ip);
985
e7b89481 986 if (xflags & FS_XFLAG_IMMUTABLE)
f13fae2d
CH
987 inode->i_flags |= S_IMMUTABLE;
988 else
989 inode->i_flags &= ~S_IMMUTABLE;
e7b89481 990 if (xflags & FS_XFLAG_APPEND)
f13fae2d
CH
991 inode->i_flags |= S_APPEND;
992 else
993 inode->i_flags &= ~S_APPEND;
e7b89481 994 if (xflags & FS_XFLAG_SYNC)
f13fae2d
CH
995 inode->i_flags |= S_SYNC;
996 else
997 inode->i_flags &= ~S_SYNC;
e7b89481 998 if (xflags & FS_XFLAG_NOATIME)
f13fae2d
CH
999 inode->i_flags |= S_NOATIME;
1000 else
1001 inode->i_flags &= ~S_NOATIME;
58f88ca2
DC
1002 if (xflags & FS_XFLAG_DAX)
1003 inode->i_flags |= S_DAX;
1004 else
1005 inode->i_flags &= ~S_DAX;
1006
f13fae2d 1007}
25fe55e8 1008
29a17c00
DC
1009static int
1010xfs_ioctl_setattr_xflags(
1011 struct xfs_trans *tp,
1012 struct xfs_inode *ip,
1013 struct fsxattr *fa)
1014{
1015 struct xfs_mount *mp = ip->i_mount;
1016
1017 /* Can't change realtime flag if any extents are allocated. */
1018 if ((ip->i_d.di_nextents || ip->i_delayed_blks) &&
e7b89481 1019 XFS_IS_REALTIME_INODE(ip) != (fa->fsx_xflags & FS_XFLAG_REALTIME))
29a17c00
DC
1020 return -EINVAL;
1021
1022 /* If realtime flag is set then must have realtime device */
e7b89481 1023 if (fa->fsx_xflags & FS_XFLAG_REALTIME) {
29a17c00
DC
1024 if (mp->m_sb.sb_rblocks == 0 || mp->m_sb.sb_rextsize == 0 ||
1025 (ip->i_d.di_extsize % mp->m_sb.sb_rextsize))
1026 return -EINVAL;
1027 }
1028
1029 /*
1030 * Can't modify an immutable/append-only file unless
1031 * we have appropriate permission.
1032 */
1033 if (((ip->i_d.di_flags & (XFS_DIFLAG_IMMUTABLE | XFS_DIFLAG_APPEND)) ||
e7b89481 1034 (fa->fsx_xflags & (FS_XFLAG_IMMUTABLE | FS_XFLAG_APPEND))) &&
29a17c00
DC
1035 !capable(CAP_LINUX_IMMUTABLE))
1036 return -EPERM;
1037
29a17c00
DC
1038 xfs_set_diflags(ip, fa->fsx_xflags);
1039 xfs_diflags_to_linux(ip);
1040 xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG);
1041 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
ff6d6af2 1042 XFS_STATS_INC(mp, xs_ig_attrchg);
29a17c00
DC
1043 return 0;
1044}
1045
3a6a854a
DC
1046/*
1047 * If we are changing DAX flags, we have to ensure the file is clean and any
1048 * cached objects in the address space are invalidated and removed. This
1049 * requires us to lock out other IO and page faults similar to a truncate
1050 * operation. The locks need to be held until the transaction has been committed
1051 * so that the cache invalidation is atomic with respect to the DAX flag
1052 * manipulation.
1053 */
1054static int
1055xfs_ioctl_setattr_dax_invalidate(
1056 struct xfs_inode *ip,
1057 struct fsxattr *fa,
1058 int *join_flags)
1059{
1060 struct inode *inode = VFS_I(ip);
1061 int error;
1062
1063 *join_flags = 0;
1064
e8897529
DC
1065 /*
1066 * It is only valid to set the DAX flag on regular files and
64485437
DC
1067 * directories on filesystems where the block size is equal to the page
1068 * size. On directories it serves as an inherit hint.
e8897529 1069 */
64485437
DC
1070 if (fa->fsx_xflags & FS_XFLAG_DAX) {
1071 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode)))
1072 return -EINVAL;
1073 if (ip->i_mount->m_sb.sb_blocksize != PAGE_SIZE)
1074 return -EINVAL;
1075 }
e8897529 1076
3a6a854a
DC
1077 /* If the DAX state is not changing, we have nothing to do here. */
1078 if ((fa->fsx_xflags & FS_XFLAG_DAX) && IS_DAX(inode))
1079 return 0;
1080 if (!(fa->fsx_xflags & FS_XFLAG_DAX) && !IS_DAX(inode))
1081 return 0;
1082
1083 /* lock, flush and invalidate mapping in preparation for flag change */
1084 xfs_ilock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1085 error = filemap_write_and_wait(inode->i_mapping);
1086 if (error)
1087 goto out_unlock;
1088 error = invalidate_inode_pages2(inode->i_mapping);
1089 if (error)
1090 goto out_unlock;
1091
1092 *join_flags = XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL;
29a17c00 1093 return 0;
3a6a854a
DC
1094
1095out_unlock:
1096 xfs_iunlock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1097 return error;
1098
29a17c00
DC
1099}
1100
8f3d17ab
DC
1101/*
1102 * Set up the transaction structure for the setattr operation, checking that we
1103 * have permission to do so. On success, return a clean transaction and the
1104 * inode locked exclusively ready for further operation specific checks. On
1105 * failure, return an error without modifying or locking the inode.
3a6a854a
DC
1106 *
1107 * The inode might already be IO locked on call. If this is the case, it is
1108 * indicated in @join_flags and we take full responsibility for ensuring they
1109 * are unlocked from now on. Hence if we have an error here, we still have to
1110 * unlock them. Otherwise, once they are joined to the transaction, they will
1111 * be unlocked on commit/cancel.
8f3d17ab
DC
1112 */
1113static struct xfs_trans *
1114xfs_ioctl_setattr_get_trans(
3a6a854a
DC
1115 struct xfs_inode *ip,
1116 int join_flags)
8f3d17ab
DC
1117{
1118 struct xfs_mount *mp = ip->i_mount;
1119 struct xfs_trans *tp;
3a6a854a 1120 int error = -EROFS;
8f3d17ab
DC
1121
1122 if (mp->m_flags & XFS_MOUNT_RDONLY)
3a6a854a
DC
1123 goto out_unlock;
1124 error = -EIO;
8f3d17ab 1125 if (XFS_FORCED_SHUTDOWN(mp))
3a6a854a 1126 goto out_unlock;
8f3d17ab 1127
253f4911 1128 error = xfs_trans_alloc(mp, &M_RES(mp)->tr_ichange, 0, 0, 0, &tp);
8f3d17ab 1129 if (error)
253f4911 1130 return ERR_PTR(error);
8f3d17ab
DC
1131
1132 xfs_ilock(ip, XFS_ILOCK_EXCL);
3a6a854a
DC
1133 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL | join_flags);
1134 join_flags = 0;
8f3d17ab
DC
1135
1136 /*
1137 * CAP_FOWNER overrides the following restrictions:
1138 *
1139 * The user ID of the calling process must be equal to the file owner
1140 * ID, except in cases where the CAP_FSETID capability is applicable.
1141 */
1142 if (!inode_owner_or_capable(VFS_I(ip))) {
1143 error = -EPERM;
1144 goto out_cancel;
1145 }
1146
1147 if (mp->m_flags & XFS_MOUNT_WSYNC)
1148 xfs_trans_set_sync(tp);
1149
1150 return tp;
1151
1152out_cancel:
4906e215 1153 xfs_trans_cancel(tp);
3a6a854a
DC
1154out_unlock:
1155 if (join_flags)
1156 xfs_iunlock(ip, join_flags);
8f3d17ab
DC
1157 return ERR_PTR(error);
1158}
1159
9b94fcc3
IP
1160/*
1161 * extent size hint validation is somewhat cumbersome. Rules are:
1162 *
1163 * 1. extent size hint is only valid for directories and regular files
e7b89481
DC
1164 * 2. FS_XFLAG_EXTSIZE is only valid for regular files
1165 * 3. FS_XFLAG_EXTSZINHERIT is only valid for directories.
9b94fcc3
IP
1166 * 4. can only be changed on regular files if no extents are allocated
1167 * 5. can be changed on directories at any time
1168 * 6. extsize hint of 0 turns off hints, clears inode flags.
1169 * 7. Extent size must be a multiple of the appropriate block size.
1170 * 8. for non-realtime files, the extent size hint must be limited
1171 * to half the AG size to avoid alignment extending the extent beyond the
1172 * limits of the AG.
1173 */
f92090e9 1174static int
d4388d3c
DC
1175xfs_ioctl_setattr_check_extsize(
1176 struct xfs_inode *ip,
1177 struct fsxattr *fa)
1178{
1179 struct xfs_mount *mp = ip->i_mount;
1180
c19b3b05 1181 if ((fa->fsx_xflags & FS_XFLAG_EXTSIZE) && !S_ISREG(VFS_I(ip)->i_mode))
9b94fcc3
IP
1182 return -EINVAL;
1183
e7b89481 1184 if ((fa->fsx_xflags & FS_XFLAG_EXTSZINHERIT) &&
c19b3b05 1185 !S_ISDIR(VFS_I(ip)->i_mode))
9b94fcc3
IP
1186 return -EINVAL;
1187
c19b3b05 1188 if (S_ISREG(VFS_I(ip)->i_mode) && ip->i_d.di_nextents &&
d4388d3c
DC
1189 ((ip->i_d.di_extsize << mp->m_sb.sb_blocklog) != fa->fsx_extsize))
1190 return -EINVAL;
1191
d4388d3c
DC
1192 if (fa->fsx_extsize != 0) {
1193 xfs_extlen_t size;
1194 xfs_fsblock_t extsize_fsb;
1195
1196 extsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_extsize);
1197 if (extsize_fsb > MAXEXTLEN)
1198 return -EINVAL;
1199
1200 if (XFS_IS_REALTIME_INODE(ip) ||
e7b89481 1201 (fa->fsx_xflags & FS_XFLAG_REALTIME)) {
d4388d3c
DC
1202 size = mp->m_sb.sb_rextsize << mp->m_sb.sb_blocklog;
1203 } else {
1204 size = mp->m_sb.sb_blocksize;
1205 if (extsize_fsb > mp->m_sb.sb_agblocks / 2)
1206 return -EINVAL;
1207 }
1208
1209 if (fa->fsx_extsize % size)
1210 return -EINVAL;
9b94fcc3 1211 } else
e7b89481 1212 fa->fsx_xflags &= ~(FS_XFLAG_EXTSIZE | FS_XFLAG_EXTSZINHERIT);
9b94fcc3 1213
d4388d3c
DC
1214 return 0;
1215}
1216
f92090e9 1217static int
23bd0735
DC
1218xfs_ioctl_setattr_check_projid(
1219 struct xfs_inode *ip,
1220 struct fsxattr *fa)
1221{
1222 /* Disallow 32bit project ids if projid32bit feature is not enabled. */
1223 if (fa->fsx_projid > (__uint16_t)-1 &&
1224 !xfs_sb_version_hasprojid32bit(&ip->i_mount->m_sb))
1225 return -EINVAL;
1226
1227 /*
1228 * Project Quota ID state is only allowed to change from within the init
1229 * namespace. Enforce that restriction only if we are trying to change
1230 * the quota ID state. Everything else is allowed in user namespaces.
1231 */
1232 if (current_user_ns() == &init_user_ns)
1233 return 0;
1234
1235 if (xfs_get_projid(ip) != fa->fsx_projid)
1236 return -EINVAL;
e7b89481 1237 if ((fa->fsx_xflags & FS_XFLAG_PROJINHERIT) !=
23bd0735
DC
1238 (ip->i_d.di_flags & XFS_DIFLAG_PROJINHERIT))
1239 return -EINVAL;
1240
1241 return 0;
1242}
25fe55e8
CH
1243
1244STATIC int
1245xfs_ioctl_setattr(
1246 xfs_inode_t *ip,
fd179b9c 1247 struct fsxattr *fa)
25fe55e8
CH
1248{
1249 struct xfs_mount *mp = ip->i_mount;
1250 struct xfs_trans *tp;
7d095257 1251 struct xfs_dquot *udqp = NULL;
92f8ff73 1252 struct xfs_dquot *pdqp = NULL;
25fe55e8
CH
1253 struct xfs_dquot *olddquot = NULL;
1254 int code;
3a6a854a 1255 int join_flags = 0;
25fe55e8 1256
cca28fb8 1257 trace_xfs_ioctl_setattr(ip);
25fe55e8 1258
23bd0735
DC
1259 code = xfs_ioctl_setattr_check_projid(ip, fa);
1260 if (code)
1261 return code;
23963e54 1262
25fe55e8
CH
1263 /*
1264 * If disk quotas is on, we make sure that the dquots do exist on disk,
1265 * before we start any other transactions. Trying to do this later
1266 * is messy. We don't care to take a readlock to look at the ids
1267 * in inode here, because we can't hold it across the trans_reserve.
1268 * If the IDs do change before we take the ilock, we're covered
1269 * because the i_*dquot fields will get updated anyway.
1270 */
fd179b9c 1271 if (XFS_IS_QUOTA_ON(mp)) {
7d095257 1272 code = xfs_qm_vop_dqalloc(ip, ip->i_d.di_uid,
25fe55e8 1273 ip->i_d.di_gid, fa->fsx_projid,
92f8ff73 1274 XFS_QMOPT_PQUOTA, &udqp, NULL, &pdqp);
25fe55e8
CH
1275 if (code)
1276 return code;
1277 }
1278
3a6a854a
DC
1279 /*
1280 * Changing DAX config may require inode locking for mapping
1281 * invalidation. These need to be held all the way to transaction commit
1282 * or cancel time, so need to be passed through to
1283 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1284 * appropriately.
1285 */
1286 code = xfs_ioctl_setattr_dax_invalidate(ip, fa, &join_flags);
1287 if (code)
1288 goto error_free_dquots;
1289
1290 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
8f3d17ab
DC
1291 if (IS_ERR(tp)) {
1292 code = PTR_ERR(tp);
1293 goto error_free_dquots;
25fe55e8
CH
1294 }
1295
25fe55e8 1296
fd179b9c
DC
1297 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp) &&
1298 xfs_get_projid(ip) != fa->fsx_projid) {
1299 code = xfs_qm_vop_chown_reserve(tp, ip, udqp, NULL, pdqp,
1300 capable(CAP_FOWNER) ? XFS_QMOPT_FORCE_RES : 0);
1301 if (code) /* out of quota */
d4388d3c 1302 goto error_trans_cancel;
25fe55e8
CH
1303 }
1304
d4388d3c
DC
1305 code = xfs_ioctl_setattr_check_extsize(ip, fa);
1306 if (code)
1307 goto error_trans_cancel;
25fe55e8 1308
29a17c00
DC
1309 code = xfs_ioctl_setattr_xflags(tp, ip, fa);
1310 if (code)
d4388d3c 1311 goto error_trans_cancel;
25fe55e8
CH
1312
1313 /*
fd179b9c
DC
1314 * Change file ownership. Must be the owner or privileged. CAP_FSETID
1315 * overrides the following restrictions:
1316 *
1317 * The set-user-ID and set-group-ID bits of a file will be cleared upon
1318 * successful return from chown()
25fe55e8 1319 */
25fe55e8 1320
c19b3b05 1321 if ((VFS_I(ip)->i_mode & (S_ISUID|S_ISGID)) &&
fd179b9c 1322 !capable_wrt_inode_uidgid(VFS_I(ip), CAP_FSETID))
c19b3b05 1323 VFS_I(ip)->i_mode &= ~(S_ISUID|S_ISGID);
25fe55e8 1324
fd179b9c
DC
1325 /* Change the ownerships and register project quota modifications */
1326 if (xfs_get_projid(ip) != fa->fsx_projid) {
1327 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp)) {
1328 olddquot = xfs_qm_vop_chown(tp, ip,
1329 &ip->i_pdquot, pdqp);
1330 }
1331 ASSERT(ip->i_d.di_version > 1);
1332 xfs_set_projid(ip, fa->fsx_projid);
f13fae2d 1333 }
25fe55e8 1334
a872703f
DC
1335 /*
1336 * Only set the extent size hint if we've already determined that the
1337 * extent size hint should be set on the inode. If no extent size flags
1338 * are set on the inode then unconditionally clear the extent size hint.
1339 */
fd179b9c
DC
1340 if (ip->i_d.di_flags & (XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT))
1341 ip->i_d.di_extsize = fa->fsx_extsize >> mp->m_sb.sb_blocklog;
1342 else
1343 ip->i_d.di_extsize = 0;
25fe55e8 1344
70393313 1345 code = xfs_trans_commit(tp);
25fe55e8
CH
1346
1347 /*
1348 * Release any dquot(s) the inode had kept before chown.
1349 */
7d095257
CH
1350 xfs_qm_dqrele(olddquot);
1351 xfs_qm_dqrele(udqp);
92f8ff73 1352 xfs_qm_dqrele(pdqp);
25fe55e8 1353
288699fe 1354 return code;
25fe55e8 1355
d4388d3c 1356error_trans_cancel:
4906e215 1357 xfs_trans_cancel(tp);
8f3d17ab 1358error_free_dquots:
7d095257 1359 xfs_qm_dqrele(udqp);
92f8ff73 1360 xfs_qm_dqrele(pdqp);
25fe55e8
CH
1361 return code;
1362}
1363
1da177e4 1364STATIC int
df26cfe8 1365xfs_ioc_fssetxattr(
1da177e4
LT
1366 xfs_inode_t *ip,
1367 struct file *filp,
1da177e4
LT
1368 void __user *arg)
1369{
1370 struct fsxattr fa;
d9457dc0 1371 int error;
df26cfe8
LM
1372
1373 if (copy_from_user(&fa, arg, sizeof(fa)))
1374 return -EFAULT;
1da177e4 1375
d9457dc0
JK
1376 error = mnt_want_write_file(filp);
1377 if (error)
1378 return error;
fd179b9c 1379 error = xfs_ioctl_setattr(ip, &fa);
d9457dc0 1380 mnt_drop_write_file(filp);
2451337d 1381 return error;
df26cfe8 1382}
1da177e4 1383
df26cfe8
LM
1384STATIC int
1385xfs_ioc_getxflags(
1386 xfs_inode_t *ip,
1387 void __user *arg)
1388{
1389 unsigned int flags;
1da177e4 1390
df26cfe8
LM
1391 flags = xfs_di2lxflags(ip->i_d.di_flags);
1392 if (copy_to_user(arg, &flags, sizeof(flags)))
1393 return -EFAULT;
1394 return 0;
1395}
1da177e4 1396
df26cfe8
LM
1397STATIC int
1398xfs_ioc_setxflags(
f96291f6 1399 struct xfs_inode *ip,
df26cfe8
LM
1400 struct file *filp,
1401 void __user *arg)
1402{
f96291f6 1403 struct xfs_trans *tp;
25fe55e8 1404 struct fsxattr fa;
df26cfe8 1405 unsigned int flags;
3a6a854a 1406 int join_flags = 0;
f96291f6 1407 int error;
1da177e4 1408
df26cfe8
LM
1409 if (copy_from_user(&flags, arg, sizeof(flags)))
1410 return -EFAULT;
1da177e4 1411
df26cfe8
LM
1412 if (flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL | \
1413 FS_NOATIME_FL | FS_NODUMP_FL | \
1414 FS_SYNC_FL))
1415 return -EOPNOTSUPP;
1da177e4 1416
25fe55e8 1417 fa.fsx_xflags = xfs_merge_ioc_xflags(flags, xfs_ip2xflags(ip));
1da177e4 1418
d9457dc0
JK
1419 error = mnt_want_write_file(filp);
1420 if (error)
1421 return error;
f96291f6 1422
3a6a854a
DC
1423 /*
1424 * Changing DAX config may require inode locking for mapping
1425 * invalidation. These need to be held all the way to transaction commit
1426 * or cancel time, so need to be passed through to
1427 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1428 * appropriately.
1429 */
1430 error = xfs_ioctl_setattr_dax_invalidate(ip, &fa, &join_flags);
1431 if (error)
1432 goto out_drop_write;
1433
1434 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
f96291f6
DC
1435 if (IS_ERR(tp)) {
1436 error = PTR_ERR(tp);
1437 goto out_drop_write;
1438 }
1439
1440 error = xfs_ioctl_setattr_xflags(tp, ip, &fa);
1441 if (error) {
4906e215 1442 xfs_trans_cancel(tp);
f96291f6
DC
1443 goto out_drop_write;
1444 }
1445
70393313 1446 error = xfs_trans_commit(tp);
f96291f6 1447out_drop_write:
d9457dc0 1448 mnt_drop_write_file(filp);
2451337d 1449 return error;
1da177e4
LT
1450}
1451
8a7141a8
ES
1452STATIC int
1453xfs_getbmap_format(void **ap, struct getbmapx *bmv, int *full)
1454{
b972d079 1455 struct getbmap __user *base = (struct getbmap __user *)*ap;
8a7141a8
ES
1456
1457 /* copy only getbmap portion (not getbmapx) */
1458 if (copy_to_user(base, bmv, sizeof(struct getbmap)))
2451337d 1459 return -EFAULT;
8a7141a8
ES
1460
1461 *ap += sizeof(struct getbmap);
1462 return 0;
1463}
1464
1da177e4
LT
1465STATIC int
1466xfs_ioc_getbmap(
993386c1 1467 struct xfs_inode *ip,
1da177e4
LT
1468 int ioflags,
1469 unsigned int cmd,
1470 void __user *arg)
1471{
8a7141a8 1472 struct getbmapx bmx;
1da177e4
LT
1473 int error;
1474
8a7141a8 1475 if (copy_from_user(&bmx, arg, sizeof(struct getbmapx)))
b474c7ae 1476 return -EFAULT;
1da177e4 1477
8a7141a8 1478 if (bmx.bmv_count < 2)
b474c7ae 1479 return -EINVAL;
1da177e4 1480
8a7141a8 1481 bmx.bmv_iflags = (cmd == XFS_IOC_GETBMAPA ? BMV_IF_ATTRFORK : 0);
b92cc59f 1482 if (ioflags & XFS_IO_INVIS)
8a7141a8 1483 bmx.bmv_iflags |= BMV_IF_NO_DMAPI_READ;
1da177e4 1484
8a7141a8 1485 error = xfs_getbmap(ip, &bmx, xfs_getbmap_format,
b972d079 1486 (__force struct getbmap *)arg+1);
1da177e4 1487 if (error)
2451337d 1488 return error;
1da177e4 1489
8a7141a8
ES
1490 /* copy back header - only size of getbmap */
1491 if (copy_to_user(arg, &bmx, sizeof(struct getbmap)))
b474c7ae 1492 return -EFAULT;
1da177e4
LT
1493 return 0;
1494}
1495
8a7141a8
ES
1496STATIC int
1497xfs_getbmapx_format(void **ap, struct getbmapx *bmv, int *full)
1498{
b972d079 1499 struct getbmapx __user *base = (struct getbmapx __user *)*ap;
8a7141a8
ES
1500
1501 if (copy_to_user(base, bmv, sizeof(struct getbmapx)))
2451337d 1502 return -EFAULT;
8a7141a8
ES
1503
1504 *ap += sizeof(struct getbmapx);
1505 return 0;
1506}
1507
1da177e4
LT
1508STATIC int
1509xfs_ioc_getbmapx(
993386c1 1510 struct xfs_inode *ip,
1da177e4
LT
1511 void __user *arg)
1512{
1513 struct getbmapx bmx;
1da177e4
LT
1514 int error;
1515
1516 if (copy_from_user(&bmx, arg, sizeof(bmx)))
b474c7ae 1517 return -EFAULT;
1da177e4
LT
1518
1519 if (bmx.bmv_count < 2)
b474c7ae 1520 return -EINVAL;
1da177e4 1521
8a7141a8 1522 if (bmx.bmv_iflags & (~BMV_IF_VALID))
b474c7ae 1523 return -EINVAL;
1da177e4 1524
8a7141a8 1525 error = xfs_getbmap(ip, &bmx, xfs_getbmapx_format,
b972d079 1526 (__force struct getbmapx *)arg+1);
1da177e4 1527 if (error)
2451337d 1528 return error;
1da177e4 1529
8a7141a8
ES
1530 /* copy back header */
1531 if (copy_to_user(arg, &bmx, sizeof(struct getbmapx)))
b474c7ae 1532 return -EFAULT;
1da177e4
LT
1533
1534 return 0;
1535}
df26cfe8 1536
a133d952
DC
1537int
1538xfs_ioc_swapext(
1539 xfs_swapext_t *sxp)
1540{
1541 xfs_inode_t *ip, *tip;
1542 struct fd f, tmp;
1543 int error = 0;
1544
1545 /* Pull information for the target fd */
1546 f = fdget((int)sxp->sx_fdtarget);
1547 if (!f.file) {
2451337d 1548 error = -EINVAL;
a133d952
DC
1549 goto out;
1550 }
1551
1552 if (!(f.file->f_mode & FMODE_WRITE) ||
1553 !(f.file->f_mode & FMODE_READ) ||
1554 (f.file->f_flags & O_APPEND)) {
2451337d 1555 error = -EBADF;
a133d952
DC
1556 goto out_put_file;
1557 }
1558
1559 tmp = fdget((int)sxp->sx_fdtmp);
1560 if (!tmp.file) {
2451337d 1561 error = -EINVAL;
a133d952
DC
1562 goto out_put_file;
1563 }
1564
1565 if (!(tmp.file->f_mode & FMODE_WRITE) ||
1566 !(tmp.file->f_mode & FMODE_READ) ||
1567 (tmp.file->f_flags & O_APPEND)) {
2451337d 1568 error = -EBADF;
a133d952
DC
1569 goto out_put_tmp_file;
1570 }
1571
1572 if (IS_SWAPFILE(file_inode(f.file)) ||
1573 IS_SWAPFILE(file_inode(tmp.file))) {
2451337d 1574 error = -EINVAL;
a133d952
DC
1575 goto out_put_tmp_file;
1576 }
1577
3e0a3965
JH
1578 if (f.file->f_op != &xfs_file_operations ||
1579 tmp.file->f_op != &xfs_file_operations) {
1580 error = -EINVAL;
1581 goto out_put_tmp_file;
1582 }
1583
a133d952
DC
1584 ip = XFS_I(file_inode(f.file));
1585 tip = XFS_I(file_inode(tmp.file));
1586
1587 if (ip->i_mount != tip->i_mount) {
2451337d 1588 error = -EINVAL;
a133d952
DC
1589 goto out_put_tmp_file;
1590 }
1591
1592 if (ip->i_ino == tip->i_ino) {
2451337d 1593 error = -EINVAL;
a133d952
DC
1594 goto out_put_tmp_file;
1595 }
1596
1597 if (XFS_FORCED_SHUTDOWN(ip->i_mount)) {
2451337d 1598 error = -EIO;
a133d952
DC
1599 goto out_put_tmp_file;
1600 }
1601
1602 error = xfs_swap_extents(ip, tip, sxp);
1603
1604 out_put_tmp_file:
1605 fdput(tmp);
1606 out_put_file:
1607 fdput(f);
1608 out:
1609 return error;
1610}
1611
4d4be482
CH
1612/*
1613 * Note: some of the ioctl's return positive numbers as a
1614 * byte count indicating success, such as readlink_by_handle.
1615 * So we don't "sign flip" like most other routines. This means
1616 * true errors need to be returned as a negative value.
1617 */
1618long
1619xfs_file_ioctl(
df26cfe8 1620 struct file *filp,
df26cfe8 1621 unsigned int cmd,
4d4be482 1622 unsigned long p)
df26cfe8 1623{
496ad9aa 1624 struct inode *inode = file_inode(filp);
4d4be482
CH
1625 struct xfs_inode *ip = XFS_I(inode);
1626 struct xfs_mount *mp = ip->i_mount;
1627 void __user *arg = (void __user *)p;
1628 int ioflags = 0;
df26cfe8
LM
1629 int error;
1630
4d4be482 1631 if (filp->f_mode & FMODE_NOCMTIME)
b92cc59f 1632 ioflags |= XFS_IO_INVIS;
df26cfe8 1633
cca28fb8 1634 trace_xfs_file_ioctl(ip);
4d4be482
CH
1635
1636 switch (cmd) {
a46db608
CH
1637 case FITRIM:
1638 return xfs_ioc_trim(mp, arg);
df26cfe8
LM
1639 case XFS_IOC_ALLOCSP:
1640 case XFS_IOC_FREESP:
1641 case XFS_IOC_RESVSP:
1642 case XFS_IOC_UNRESVSP:
1643 case XFS_IOC_ALLOCSP64:
1644 case XFS_IOC_FREESP64:
1645 case XFS_IOC_RESVSP64:
44722352
DC
1646 case XFS_IOC_UNRESVSP64:
1647 case XFS_IOC_ZERO_RANGE: {
743bb465 1648 xfs_flock64_t bf;
df26cfe8 1649
743bb465 1650 if (copy_from_user(&bf, arg, sizeof(bf)))
b474c7ae 1651 return -EFAULT;
743bb465 1652 return xfs_ioc_space(ip, inode, filp, ioflags, cmd, &bf);
1653 }
df26cfe8
LM
1654 case XFS_IOC_DIOINFO: {
1655 struct dioattr da;
1656 xfs_buftarg_t *target =
1657 XFS_IS_REALTIME_INODE(ip) ?
1658 mp->m_rtdev_targp : mp->m_ddev_targp;
1659
7c71ee78 1660 da.d_mem = da.d_miniosz = target->bt_logical_sectorsize;
df26cfe8
LM
1661 da.d_maxiosz = INT_MAX & ~(da.d_miniosz - 1);
1662
1663 if (copy_to_user(arg, &da, sizeof(da)))
b474c7ae 1664 return -EFAULT;
df26cfe8
LM
1665 return 0;
1666 }
1667
1668 case XFS_IOC_FSBULKSTAT_SINGLE:
1669 case XFS_IOC_FSBULKSTAT:
1670 case XFS_IOC_FSINUMBERS:
1671 return xfs_ioc_bulkstat(mp, cmd, arg);
1672
1673 case XFS_IOC_FSGEOMETRY_V1:
1674 return xfs_ioc_fsgeometry_v1(mp, arg);
1675
1676 case XFS_IOC_FSGEOMETRY:
1677 return xfs_ioc_fsgeometry(mp, arg);
1678
1679 case XFS_IOC_GETVERSION:
1680 return put_user(inode->i_generation, (int __user *)arg);
1681
1682 case XFS_IOC_FSGETXATTR:
1683 return xfs_ioc_fsgetxattr(ip, 0, arg);
1684 case XFS_IOC_FSGETXATTRA:
1685 return xfs_ioc_fsgetxattr(ip, 1, arg);
65e67f51
LM
1686 case XFS_IOC_FSSETXATTR:
1687 return xfs_ioc_fssetxattr(ip, filp, arg);
df26cfe8 1688 case XFS_IOC_GETXFLAGS:
65e67f51 1689 return xfs_ioc_getxflags(ip, arg);
df26cfe8 1690 case XFS_IOC_SETXFLAGS:
65e67f51 1691 return xfs_ioc_setxflags(ip, filp, arg);
df26cfe8
LM
1692
1693 case XFS_IOC_FSSETDM: {
1694 struct fsdmidata dmi;
1695
1696 if (copy_from_user(&dmi, arg, sizeof(dmi)))
b474c7ae 1697 return -EFAULT;
df26cfe8 1698
d9457dc0
JK
1699 error = mnt_want_write_file(filp);
1700 if (error)
1701 return error;
1702
df26cfe8
LM
1703 error = xfs_set_dmattrs(ip, dmi.fsd_dmevmask,
1704 dmi.fsd_dmstate);
d9457dc0 1705 mnt_drop_write_file(filp);
2451337d 1706 return error;
df26cfe8
LM
1707 }
1708
1709 case XFS_IOC_GETBMAP:
1710 case XFS_IOC_GETBMAPA:
1711 return xfs_ioc_getbmap(ip, ioflags, cmd, arg);
1712
1713 case XFS_IOC_GETBMAPX:
1714 return xfs_ioc_getbmapx(ip, arg);
1715
1716 case XFS_IOC_FD_TO_HANDLE:
1717 case XFS_IOC_PATH_TO_HANDLE:
743bb465 1718 case XFS_IOC_PATH_TO_FSHANDLE: {
1719 xfs_fsop_handlereq_t hreq;
df26cfe8 1720
743bb465 1721 if (copy_from_user(&hreq, arg, sizeof(hreq)))
b474c7ae 1722 return -EFAULT;
743bb465 1723 return xfs_find_handle(cmd, &hreq);
1724 }
1725 case XFS_IOC_OPEN_BY_HANDLE: {
1726 xfs_fsop_handlereq_t hreq;
df26cfe8 1727
743bb465 1728 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1729 return -EFAULT;
d296d30a 1730 return xfs_open_by_handle(filp, &hreq);
743bb465 1731 }
df26cfe8 1732 case XFS_IOC_FSSETDM_BY_HANDLE:
d296d30a 1733 return xfs_fssetdm_by_handle(filp, arg);
df26cfe8 1734
743bb465 1735 case XFS_IOC_READLINK_BY_HANDLE: {
1736 xfs_fsop_handlereq_t hreq;
df26cfe8 1737
743bb465 1738 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1739 return -EFAULT;
d296d30a 1740 return xfs_readlink_by_handle(filp, &hreq);
743bb465 1741 }
df26cfe8 1742 case XFS_IOC_ATTRLIST_BY_HANDLE:
d296d30a 1743 return xfs_attrlist_by_handle(filp, arg);
df26cfe8
LM
1744
1745 case XFS_IOC_ATTRMULTI_BY_HANDLE:
d296d30a 1746 return xfs_attrmulti_by_handle(filp, arg);
df26cfe8
LM
1747
1748 case XFS_IOC_SWAPEXT: {
743bb465 1749 struct xfs_swapext sxp;
1750
1751 if (copy_from_user(&sxp, arg, sizeof(xfs_swapext_t)))
b474c7ae 1752 return -EFAULT;
d9457dc0
JK
1753 error = mnt_want_write_file(filp);
1754 if (error)
1755 return error;
a133d952 1756 error = xfs_ioc_swapext(&sxp);
d9457dc0 1757 mnt_drop_write_file(filp);
2451337d 1758 return error;
df26cfe8
LM
1759 }
1760
1761 case XFS_IOC_FSCOUNTS: {
1762 xfs_fsop_counts_t out;
1763
1764 error = xfs_fs_counts(mp, &out);
1765 if (error)
2451337d 1766 return error;
df26cfe8
LM
1767
1768 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1769 return -EFAULT;
df26cfe8
LM
1770 return 0;
1771 }
1772
1773 case XFS_IOC_SET_RESBLKS: {
1774 xfs_fsop_resblks_t inout;
1775 __uint64_t in;
1776
1777 if (!capable(CAP_SYS_ADMIN))
1778 return -EPERM;
1779
d5db0f97 1780 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 1781 return -EROFS;
d5db0f97 1782
df26cfe8 1783 if (copy_from_user(&inout, arg, sizeof(inout)))
b474c7ae 1784 return -EFAULT;
df26cfe8 1785
d9457dc0
JK
1786 error = mnt_want_write_file(filp);
1787 if (error)
1788 return error;
1789
df26cfe8
LM
1790 /* input parameter is passed in resblks field of structure */
1791 in = inout.resblks;
1792 error = xfs_reserve_blocks(mp, &in, &inout);
d9457dc0 1793 mnt_drop_write_file(filp);
df26cfe8 1794 if (error)
2451337d 1795 return error;
df26cfe8
LM
1796
1797 if (copy_to_user(arg, &inout, sizeof(inout)))
b474c7ae 1798 return -EFAULT;
df26cfe8
LM
1799 return 0;
1800 }
1801
1802 case XFS_IOC_GET_RESBLKS: {
1803 xfs_fsop_resblks_t out;
1804
1805 if (!capable(CAP_SYS_ADMIN))
1806 return -EPERM;
1807
1808 error = xfs_reserve_blocks(mp, NULL, &out);
1809 if (error)
2451337d 1810 return error;
df26cfe8
LM
1811
1812 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1813 return -EFAULT;
df26cfe8
LM
1814
1815 return 0;
1816 }
1817
1818 case XFS_IOC_FSGROWFSDATA: {
1819 xfs_growfs_data_t in;
1820
df26cfe8 1821 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1822 return -EFAULT;
df26cfe8 1823
d9457dc0
JK
1824 error = mnt_want_write_file(filp);
1825 if (error)
1826 return error;
df26cfe8 1827 error = xfs_growfs_data(mp, &in);
d9457dc0 1828 mnt_drop_write_file(filp);
2451337d 1829 return error;
df26cfe8
LM
1830 }
1831
1832 case XFS_IOC_FSGROWFSLOG: {
1833 xfs_growfs_log_t in;
1834
df26cfe8 1835 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1836 return -EFAULT;
df26cfe8 1837
d9457dc0
JK
1838 error = mnt_want_write_file(filp);
1839 if (error)
1840 return error;
df26cfe8 1841 error = xfs_growfs_log(mp, &in);
d9457dc0 1842 mnt_drop_write_file(filp);
2451337d 1843 return error;
df26cfe8
LM
1844 }
1845
1846 case XFS_IOC_FSGROWFSRT: {
1847 xfs_growfs_rt_t in;
1848
df26cfe8 1849 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1850 return -EFAULT;
df26cfe8 1851
d9457dc0
JK
1852 error = mnt_want_write_file(filp);
1853 if (error)
1854 return error;
df26cfe8 1855 error = xfs_growfs_rt(mp, &in);
d9457dc0 1856 mnt_drop_write_file(filp);
2451337d 1857 return error;
df26cfe8
LM
1858 }
1859
df26cfe8
LM
1860 case XFS_IOC_GOINGDOWN: {
1861 __uint32_t in;
1862
1863 if (!capable(CAP_SYS_ADMIN))
1864 return -EPERM;
1865
1866 if (get_user(in, (__uint32_t __user *)arg))
b474c7ae 1867 return -EFAULT;
df26cfe8 1868
2451337d 1869 return xfs_fs_goingdown(mp, in);
df26cfe8
LM
1870 }
1871
1872 case XFS_IOC_ERROR_INJECTION: {
1873 xfs_error_injection_t in;
1874
1875 if (!capable(CAP_SYS_ADMIN))
1876 return -EPERM;
1877
1878 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1879 return -EFAULT;
df26cfe8 1880
2451337d 1881 return xfs_errortag_add(in.errtag, mp);
df26cfe8
LM
1882 }
1883
1884 case XFS_IOC_ERROR_CLEARALL:
1885 if (!capable(CAP_SYS_ADMIN))
1886 return -EPERM;
1887
2451337d 1888 return xfs_errortag_clearall(mp, 1);
df26cfe8 1889
8ca149de 1890 case XFS_IOC_FREE_EOFBLOCKS: {
b9fe5052
DE
1891 struct xfs_fs_eofblocks eofb;
1892 struct xfs_eofblocks keofb;
8ca149de 1893
8c567a7f
DE
1894 if (!capable(CAP_SYS_ADMIN))
1895 return -EPERM;
1896
1897 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 1898 return -EROFS;
8c567a7f 1899
8ca149de 1900 if (copy_from_user(&eofb, arg, sizeof(eofb)))
b474c7ae 1901 return -EFAULT;
8ca149de 1902
b9fe5052
DE
1903 error = xfs_fs_eofblocks_from_user(&eofb, &keofb);
1904 if (error)
2451337d 1905 return error;
8ca149de 1906
2451337d 1907 return xfs_icache_free_eofblocks(mp, &keofb);
8ca149de
BF
1908 }
1909
df26cfe8
LM
1910 default:
1911 return -ENOTTY;
1912 }
1913}
This page took 0.787697 seconds and 5 git commands to generate.