xfs: better xfs_trans_alloc interface
[deliverable/linux.git] / fs / xfs / xfs_ioctl.c
CommitLineData
1da177e4 1/*
7b718769
NS
2 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
3 * All Rights Reserved.
1da177e4 4 *
7b718769
NS
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License as
1da177e4
LT
7 * published by the Free Software Foundation.
8 *
7b718769
NS
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
1da177e4 13 *
7b718769
NS
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4 17 */
1da177e4 18#include "xfs.h"
1da177e4 19#include "xfs_fs.h"
70a9883c 20#include "xfs_shared.h"
239880ef
DC
21#include "xfs_format.h"
22#include "xfs_log_format.h"
23#include "xfs_trans_resv.h"
1da177e4 24#include "xfs_mount.h"
1da177e4 25#include "xfs_inode.h"
7bf446f8 26#include "xfs_ioctl.h"
a4fbe6ab 27#include "xfs_alloc.h"
1da177e4 28#include "xfs_rtalloc.h"
1da177e4 29#include "xfs_itable.h"
a844f451 30#include "xfs_error.h"
1da177e4 31#include "xfs_attr.h"
a844f451 32#include "xfs_bmap.h"
68988114 33#include "xfs_bmap_util.h"
1da177e4 34#include "xfs_fsops.h"
a46db608 35#include "xfs_discard.h"
25fe55e8 36#include "xfs_quota.h"
d296d30a 37#include "xfs_export.h"
0b1b213f 38#include "xfs_trace.h"
8ca149de 39#include "xfs_icache.h"
c24b5dfa 40#include "xfs_symlink.h"
a4fbe6ab 41#include "xfs_trans.h"
781355c6 42#include "xfs_pnfs.h"
47e1bf64 43#include "xfs_acl.h"
1da177e4 44
16f7e0fe 45#include <linux/capability.h>
1da177e4
LT
46#include <linux/dcache.h>
47#include <linux/mount.h>
48#include <linux/namei.h>
49#include <linux/pagemap.h>
5a0e3ad6 50#include <linux/slab.h>
d296d30a 51#include <linux/exportfs.h>
1da177e4
LT
52
53/*
54 * xfs_find_handle maps from userspace xfs_fsop_handlereq structure to
55 * a file or fs handle.
56 *
57 * XFS_IOC_PATH_TO_FSHANDLE
58 * returns fs handle for a mount point or path within that mount point
59 * XFS_IOC_FD_TO_HANDLE
60 * returns full handle for a FD opened in user space
61 * XFS_IOC_PATH_TO_HANDLE
62 * returns full handle for a path
63 */
d5547f9f 64int
1da177e4
LT
65xfs_find_handle(
66 unsigned int cmd,
743bb465 67 xfs_fsop_handlereq_t *hreq)
1da177e4
LT
68{
69 int hsize;
70 xfs_handle_t handle;
1da177e4 71 struct inode *inode;
a30b0367 72 struct fd f = {NULL};
4346cdd4 73 struct path path;
2903ff01 74 int error;
4346cdd4 75 struct xfs_inode *ip;
1da177e4 76
4346cdd4 77 if (cmd == XFS_IOC_FD_TO_HANDLE) {
2903ff01
AV
78 f = fdget(hreq->fd);
79 if (!f.file)
4346cdd4 80 return -EBADF;
496ad9aa 81 inode = file_inode(f.file);
4346cdd4
CH
82 } else {
83 error = user_lpath((const char __user *)hreq->path, &path);
84 if (error)
85 return error;
2b0143b5 86 inode = d_inode(path.dentry);
1da177e4 87 }
4346cdd4
CH
88 ip = XFS_I(inode);
89
90 /*
91 * We can only generate handles for inodes residing on a XFS filesystem,
92 * and only for regular files, directories or symbolic links.
93 */
94 error = -EINVAL;
95 if (inode->i_sb->s_magic != XFS_SB_MAGIC)
96 goto out_put;
97
98 error = -EBADF;
99 if (!S_ISREG(inode->i_mode) &&
100 !S_ISDIR(inode->i_mode) &&
101 !S_ISLNK(inode->i_mode))
102 goto out_put;
103
104
105 memcpy(&handle.ha_fsid, ip->i_mount->m_fixedfsid, sizeof(xfs_fsid_t));
106
107 if (cmd == XFS_IOC_PATH_TO_FSHANDLE) {
108 /*
109 * This handle only contains an fsid, zero the rest.
110 */
111 memset(&handle.ha_fid, 0, sizeof(handle.ha_fid));
112 hsize = sizeof(xfs_fsid_t);
113 } else {
c6143911
CH
114 handle.ha_fid.fid_len = sizeof(xfs_fid_t) -
115 sizeof(handle.ha_fid.fid_len);
116 handle.ha_fid.fid_pad = 0;
9e9a2674 117 handle.ha_fid.fid_gen = inode->i_generation;
c6143911 118 handle.ha_fid.fid_ino = ip->i_ino;
1da177e4
LT
119
120 hsize = XFS_HSIZE(handle);
121 }
122
4346cdd4 123 error = -EFAULT;
743bb465 124 if (copy_to_user(hreq->ohandle, &handle, hsize) ||
4346cdd4
CH
125 copy_to_user(hreq->ohandlen, &hsize, sizeof(__s32)))
126 goto out_put;
1da177e4 127
4346cdd4
CH
128 error = 0;
129
130 out_put:
131 if (cmd == XFS_IOC_FD_TO_HANDLE)
2903ff01 132 fdput(f);
4346cdd4
CH
133 else
134 path_put(&path);
135 return error;
1da177e4
LT
136}
137
1da177e4 138/*
d296d30a
CH
139 * No need to do permission checks on the various pathname components
140 * as the handle operations are privileged.
1da177e4
LT
141 */
142STATIC int
d296d30a
CH
143xfs_handle_acceptable(
144 void *context,
145 struct dentry *dentry)
146{
147 return 1;
148}
149
150/*
151 * Convert userspace handle data into a dentry.
152 */
153struct dentry *
154xfs_handle_to_dentry(
155 struct file *parfilp,
156 void __user *uhandle,
157 u32 hlen)
1da177e4 158{
1da177e4 159 xfs_handle_t handle;
d296d30a 160 struct xfs_fid64 fid;
1da177e4
LT
161
162 /*
163 * Only allow handle opens under a directory.
164 */
496ad9aa 165 if (!S_ISDIR(file_inode(parfilp)->i_mode))
d296d30a
CH
166 return ERR_PTR(-ENOTDIR);
167
168 if (hlen != sizeof(xfs_handle_t))
169 return ERR_PTR(-EINVAL);
170 if (copy_from_user(&handle, uhandle, hlen))
171 return ERR_PTR(-EFAULT);
172 if (handle.ha_fid.fid_len !=
173 sizeof(handle.ha_fid) - sizeof(handle.ha_fid.fid_len))
174 return ERR_PTR(-EINVAL);
175
176 memset(&fid, 0, sizeof(struct fid));
177 fid.ino = handle.ha_fid.fid_ino;
178 fid.gen = handle.ha_fid.fid_gen;
179
180 return exportfs_decode_fh(parfilp->f_path.mnt, (struct fid *)&fid, 3,
181 FILEID_INO32_GEN | XFS_FILEID_TYPE_64FLAG,
182 xfs_handle_acceptable, NULL);
183}
1da177e4 184
d296d30a
CH
185STATIC struct dentry *
186xfs_handlereq_to_dentry(
187 struct file *parfilp,
188 xfs_fsop_handlereq_t *hreq)
189{
190 return xfs_handle_to_dentry(parfilp, hreq->ihandle, hreq->ihandlen);
1da177e4
LT
191}
192
d5547f9f 193int
1da177e4 194xfs_open_by_handle(
1da177e4 195 struct file *parfilp,
d296d30a 196 xfs_fsop_handlereq_t *hreq)
1da177e4 197{
745ca247 198 const struct cred *cred = current_cred();
1da177e4 199 int error;
d296d30a 200 int fd;
1da177e4
LT
201 int permflag;
202 struct file *filp;
203 struct inode *inode;
204 struct dentry *dentry;
1a1d7724 205 fmode_t fmode;
765927b2 206 struct path path;
1da177e4
LT
207
208 if (!capable(CAP_SYS_ADMIN))
b474c7ae 209 return -EPERM;
1da177e4 210
d296d30a
CH
211 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
212 if (IS_ERR(dentry))
213 return PTR_ERR(dentry);
2b0143b5 214 inode = d_inode(dentry);
1da177e4
LT
215
216 /* Restrict xfs_open_by_handle to directories & regular files. */
217 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) {
b474c7ae 218 error = -EPERM;
d296d30a 219 goto out_dput;
1da177e4
LT
220 }
221
222#if BITS_PER_LONG != 32
743bb465 223 hreq->oflags |= O_LARGEFILE;
1da177e4 224#endif
d296d30a 225
743bb465 226 permflag = hreq->oflags;
1a1d7724 227 fmode = OPEN_FMODE(permflag);
1da177e4 228 if ((!(permflag & O_APPEND) || (permflag & O_TRUNC)) &&
1a1d7724 229 (fmode & FMODE_WRITE) && IS_APPEND(inode)) {
b474c7ae 230 error = -EPERM;
d296d30a 231 goto out_dput;
1da177e4
LT
232 }
233
1a1d7724 234 if ((fmode & FMODE_WRITE) && IS_IMMUTABLE(inode)) {
b474c7ae 235 error = -EACCES;
d296d30a 236 goto out_dput;
1da177e4
LT
237 }
238
239 /* Can't write directories. */
1a1d7724 240 if (S_ISDIR(inode->i_mode) && (fmode & FMODE_WRITE)) {
b474c7ae 241 error = -EISDIR;
d296d30a 242 goto out_dput;
1da177e4
LT
243 }
244
862a6293 245 fd = get_unused_fd_flags(0);
d296d30a
CH
246 if (fd < 0) {
247 error = fd;
248 goto out_dput;
1da177e4
LT
249 }
250
765927b2
AV
251 path.mnt = parfilp->f_path.mnt;
252 path.dentry = dentry;
253 filp = dentry_open(&path, hreq->oflags, cred);
254 dput(dentry);
1da177e4 255 if (IS_ERR(filp)) {
d296d30a
CH
256 put_unused_fd(fd);
257 return PTR_ERR(filp);
1da177e4 258 }
4d4be482 259
03209378 260 if (S_ISREG(inode->i_mode)) {
2e2e7bb1 261 filp->f_flags |= O_NOATIME;
4d4be482 262 filp->f_mode |= FMODE_NOCMTIME;
2e2e7bb1 263 }
1da177e4 264
d296d30a
CH
265 fd_install(fd, filp);
266 return fd;
267
268 out_dput:
269 dput(dentry);
270 return error;
1da177e4
LT
271}
272
d5547f9f 273int
1da177e4 274xfs_readlink_by_handle(
d296d30a
CH
275 struct file *parfilp,
276 xfs_fsop_handlereq_t *hreq)
1da177e4 277{
d296d30a 278 struct dentry *dentry;
1da177e4 279 __u32 olen;
804c83c3
CH
280 void *link;
281 int error;
1da177e4
LT
282
283 if (!capable(CAP_SYS_ADMIN))
b474c7ae 284 return -EPERM;
1da177e4 285
d296d30a
CH
286 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
287 if (IS_ERR(dentry))
288 return PTR_ERR(dentry);
1da177e4
LT
289
290 /* Restrict this handle operation to symlinks only. */
e36cb0b8 291 if (!d_is_symlink(dentry)) {
b474c7ae 292 error = -EINVAL;
d296d30a 293 goto out_dput;
1da177e4
LT
294 }
295
743bb465 296 if (copy_from_user(&olen, hreq->ohandlen, sizeof(__u32))) {
b474c7ae 297 error = -EFAULT;
d296d30a 298 goto out_dput;
1da177e4 299 }
1da177e4 300
804c83c3 301 link = kmalloc(MAXPATHLEN+1, GFP_KERNEL);
d296d30a 302 if (!link) {
b474c7ae 303 error = -ENOMEM;
d296d30a
CH
304 goto out_dput;
305 }
1da177e4 306
2b0143b5 307 error = xfs_readlink(XFS_I(d_inode(dentry)), link);
67fcaa73 308 if (error)
804c83c3 309 goto out_kfree;
5d826c84 310 error = readlink_copy(hreq->ohandle, olen, link);
804c83c3
CH
311 if (error)
312 goto out_kfree;
67fcaa73 313
804c83c3
CH
314 out_kfree:
315 kfree(link);
d296d30a
CH
316 out_dput:
317 dput(dentry);
804c83c3 318 return error;
1da177e4
LT
319}
320
c24b5dfa
DC
321int
322xfs_set_dmattrs(
323 xfs_inode_t *ip,
324 u_int evmask,
325 u_int16_t state)
326{
327 xfs_mount_t *mp = ip->i_mount;
328 xfs_trans_t *tp;
329 int error;
330
331 if (!capable(CAP_SYS_ADMIN))
2451337d 332 return -EPERM;
c24b5dfa
DC
333
334 if (XFS_FORCED_SHUTDOWN(mp))
2451337d 335 return -EIO;
c24b5dfa 336
253f4911
CH
337 error = xfs_trans_alloc(mp, &M_RES(mp)->tr_ichange, 0, 0, 0, &tp);
338 if (error)
c24b5dfa 339 return error;
253f4911 340
c24b5dfa
DC
341 xfs_ilock(ip, XFS_ILOCK_EXCL);
342 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL);
343
344 ip->i_d.di_dmevmask = evmask;
345 ip->i_d.di_dmstate = state;
346
347 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
70393313 348 error = xfs_trans_commit(tp);
c24b5dfa
DC
349
350 return error;
351}
352
1da177e4
LT
353STATIC int
354xfs_fssetdm_by_handle(
d296d30a
CH
355 struct file *parfilp,
356 void __user *arg)
1da177e4
LT
357{
358 int error;
359 struct fsdmidata fsd;
360 xfs_fsop_setdm_handlereq_t dmhreq;
d296d30a 361 struct dentry *dentry;
1da177e4
LT
362
363 if (!capable(CAP_MKNOD))
b474c7ae 364 return -EPERM;
1da177e4 365 if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t)))
b474c7ae 366 return -EFAULT;
1da177e4 367
d9457dc0
JK
368 error = mnt_want_write_file(parfilp);
369 if (error)
370 return error;
371
d296d30a 372 dentry = xfs_handlereq_to_dentry(parfilp, &dmhreq.hreq);
d9457dc0
JK
373 if (IS_ERR(dentry)) {
374 mnt_drop_write_file(parfilp);
d296d30a 375 return PTR_ERR(dentry);
d9457dc0 376 }
1da177e4 377
2b0143b5 378 if (IS_IMMUTABLE(d_inode(dentry)) || IS_APPEND(d_inode(dentry))) {
b474c7ae 379 error = -EPERM;
6e7f75ea 380 goto out;
1da177e4
LT
381 }
382
383 if (copy_from_user(&fsd, dmhreq.data, sizeof(fsd))) {
b474c7ae 384 error = -EFAULT;
6e7f75ea 385 goto out;
1da177e4
LT
386 }
387
2b0143b5 388 error = xfs_set_dmattrs(XFS_I(d_inode(dentry)), fsd.fsd_dmevmask,
6e7f75ea 389 fsd.fsd_dmstate);
1da177e4 390
6e7f75ea 391 out:
d9457dc0 392 mnt_drop_write_file(parfilp);
d296d30a 393 dput(dentry);
6e7f75ea 394 return error;
1da177e4
LT
395}
396
397STATIC int
398xfs_attrlist_by_handle(
d296d30a
CH
399 struct file *parfilp,
400 void __user *arg)
1da177e4 401{
d296d30a 402 int error = -ENOMEM;
1da177e4
LT
403 attrlist_cursor_kern_t *cursor;
404 xfs_fsop_attrlist_handlereq_t al_hreq;
d296d30a 405 struct dentry *dentry;
1da177e4
LT
406 char *kbuf;
407
408 if (!capable(CAP_SYS_ADMIN))
b474c7ae 409 return -EPERM;
1da177e4 410 if (copy_from_user(&al_hreq, arg, sizeof(xfs_fsop_attrlist_handlereq_t)))
b474c7ae 411 return -EFAULT;
071c529e 412 if (al_hreq.buflen < sizeof(struct attrlist) ||
4e247614 413 al_hreq.buflen > XFS_XATTR_LIST_MAX)
b474c7ae 414 return -EINVAL;
1da177e4 415
90ad58a8
CH
416 /*
417 * Reject flags, only allow namespaces.
418 */
419 if (al_hreq.flags & ~(ATTR_ROOT | ATTR_SECURE))
b474c7ae 420 return -EINVAL;
90ad58a8 421
d296d30a
CH
422 dentry = xfs_handlereq_to_dentry(parfilp, &al_hreq.hreq);
423 if (IS_ERR(dentry))
424 return PTR_ERR(dentry);
1da177e4 425
fdd3ccee
DC
426 kbuf = kmem_zalloc_large(al_hreq.buflen, KM_SLEEP);
427 if (!kbuf)
428 goto out_dput;
1da177e4
LT
429
430 cursor = (attrlist_cursor_kern_t *)&al_hreq.pos;
2b0143b5 431 error = xfs_attr_list(XFS_I(d_inode(dentry)), kbuf, al_hreq.buflen,
739bfb2a 432 al_hreq.flags, cursor);
1da177e4
LT
433 if (error)
434 goto out_kfree;
435
436 if (copy_to_user(al_hreq.buffer, kbuf, al_hreq.buflen))
437 error = -EFAULT;
438
fdd3ccee
DC
439out_kfree:
440 kmem_free(kbuf);
441out_dput:
d296d30a
CH
442 dput(dentry);
443 return error;
1da177e4
LT
444}
445
28750975 446int
1da177e4 447xfs_attrmulti_attr_get(
739bfb2a 448 struct inode *inode,
a9273ca5
DC
449 unsigned char *name,
450 unsigned char __user *ubuf,
1da177e4
LT
451 __uint32_t *len,
452 __uint32_t flags)
453{
a9273ca5 454 unsigned char *kbuf;
2451337d 455 int error = -EFAULT;
e8b0ebaa 456
51fcbfe7 457 if (*len > XFS_XATTR_SIZE_MAX)
2451337d 458 return -EINVAL;
fdd3ccee
DC
459 kbuf = kmem_zalloc_large(*len, KM_SLEEP);
460 if (!kbuf)
2451337d 461 return -ENOMEM;
1da177e4 462
e8b0ebaa 463 error = xfs_attr_get(XFS_I(inode), name, kbuf, (int *)len, flags);
1da177e4
LT
464 if (error)
465 goto out_kfree;
466
467 if (copy_to_user(ubuf, kbuf, *len))
2451337d 468 error = -EFAULT;
1da177e4 469
fdd3ccee
DC
470out_kfree:
471 kmem_free(kbuf);
1da177e4
LT
472 return error;
473}
474
28750975 475int
1da177e4 476xfs_attrmulti_attr_set(
739bfb2a 477 struct inode *inode,
a9273ca5
DC
478 unsigned char *name,
479 const unsigned char __user *ubuf,
1da177e4
LT
480 __uint32_t len,
481 __uint32_t flags)
482{
a9273ca5 483 unsigned char *kbuf;
09cb22d2 484 int error;
1da177e4 485
739bfb2a 486 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 487 return -EPERM;
51fcbfe7 488 if (len > XFS_XATTR_SIZE_MAX)
2451337d 489 return -EINVAL;
1da177e4 490
0e639bde
LZ
491 kbuf = memdup_user(ubuf, len);
492 if (IS_ERR(kbuf))
493 return PTR_ERR(kbuf);
e8b0ebaa 494
09cb22d2 495 error = xfs_attr_set(XFS_I(inode), name, kbuf, len, flags);
47e1bf64
AG
496 if (!error)
497 xfs_forget_acl(inode, name, flags);
09cb22d2
AG
498 kfree(kbuf);
499 return error;
1da177e4
LT
500}
501
28750975 502int
1da177e4 503xfs_attrmulti_attr_remove(
739bfb2a 504 struct inode *inode,
a9273ca5 505 unsigned char *name,
1da177e4
LT
506 __uint32_t flags)
507{
47e1bf64
AG
508 int error;
509
739bfb2a 510 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 511 return -EPERM;
47e1bf64
AG
512 error = xfs_attr_remove(XFS_I(inode), name, flags);
513 if (!error)
514 xfs_forget_acl(inode, name, flags);
515 return error;
1da177e4
LT
516}
517
518STATIC int
519xfs_attrmulti_by_handle(
42a74f20 520 struct file *parfilp,
d296d30a 521 void __user *arg)
1da177e4
LT
522{
523 int error;
524 xfs_attr_multiop_t *ops;
525 xfs_fsop_attrmulti_handlereq_t am_hreq;
d296d30a 526 struct dentry *dentry;
1da177e4 527 unsigned int i, size;
a9273ca5 528 unsigned char *attr_name;
1da177e4
LT
529
530 if (!capable(CAP_SYS_ADMIN))
b474c7ae 531 return -EPERM;
1da177e4 532 if (copy_from_user(&am_hreq, arg, sizeof(xfs_fsop_attrmulti_handlereq_t)))
b474c7ae 533 return -EFAULT;
1da177e4 534
fda168c2
ZW
535 /* overflow check */
536 if (am_hreq.opcount >= INT_MAX / sizeof(xfs_attr_multiop_t))
537 return -E2BIG;
538
d296d30a
CH
539 dentry = xfs_handlereq_to_dentry(parfilp, &am_hreq.hreq);
540 if (IS_ERR(dentry))
541 return PTR_ERR(dentry);
1da177e4 542
2451337d 543 error = -E2BIG;
e182f57a 544 size = am_hreq.opcount * sizeof(xfs_attr_multiop_t);
1da177e4 545 if (!size || size > 16 * PAGE_SIZE)
d296d30a 546 goto out_dput;
1da177e4 547
0e639bde
LZ
548 ops = memdup_user(am_hreq.ops, size);
549 if (IS_ERR(ops)) {
2451337d 550 error = PTR_ERR(ops);
d296d30a 551 goto out_dput;
0e639bde 552 }
1da177e4 553
2451337d 554 error = -ENOMEM;
1da177e4
LT
555 attr_name = kmalloc(MAXNAMELEN, GFP_KERNEL);
556 if (!attr_name)
557 goto out_kfree_ops;
558
1da177e4
LT
559 error = 0;
560 for (i = 0; i < am_hreq.opcount; i++) {
a9273ca5 561 ops[i].am_error = strncpy_from_user((char *)attr_name,
1da177e4
LT
562 ops[i].am_attrname, MAXNAMELEN);
563 if (ops[i].am_error == 0 || ops[i].am_error == MAXNAMELEN)
2451337d 564 error = -ERANGE;
1da177e4
LT
565 if (ops[i].am_error < 0)
566 break;
567
568 switch (ops[i].am_opcode) {
569 case ATTR_OP_GET:
d296d30a 570 ops[i].am_error = xfs_attrmulti_attr_get(
2b0143b5 571 d_inode(dentry), attr_name,
d296d30a
CH
572 ops[i].am_attrvalue, &ops[i].am_length,
573 ops[i].am_flags);
1da177e4
LT
574 break;
575 case ATTR_OP_SET:
a561be71 576 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
577 if (ops[i].am_error)
578 break;
d296d30a 579 ops[i].am_error = xfs_attrmulti_attr_set(
2b0143b5 580 d_inode(dentry), attr_name,
d296d30a
CH
581 ops[i].am_attrvalue, ops[i].am_length,
582 ops[i].am_flags);
2a79f17e 583 mnt_drop_write_file(parfilp);
1da177e4
LT
584 break;
585 case ATTR_OP_REMOVE:
a561be71 586 ops[i].am_error = mnt_want_write_file(parfilp);
42a74f20
DH
587 if (ops[i].am_error)
588 break;
d296d30a 589 ops[i].am_error = xfs_attrmulti_attr_remove(
2b0143b5 590 d_inode(dentry), attr_name,
d296d30a 591 ops[i].am_flags);
2a79f17e 592 mnt_drop_write_file(parfilp);
1da177e4
LT
593 break;
594 default:
2451337d 595 ops[i].am_error = -EINVAL;
1da177e4
LT
596 }
597 }
598
599 if (copy_to_user(am_hreq.ops, ops, size))
2451337d 600 error = -EFAULT;
1da177e4
LT
601
602 kfree(attr_name);
603 out_kfree_ops:
604 kfree(ops);
d296d30a
CH
605 out_dput:
606 dput(dentry);
2451337d 607 return error;
1da177e4
LT
608}
609
d5547f9f 610int
1da177e4 611xfs_ioc_space(
993386c1 612 struct xfs_inode *ip,
f37ea149 613 struct inode *inode,
1da177e4
LT
614 struct file *filp,
615 int ioflags,
616 unsigned int cmd,
743bb465 617 xfs_flock64_t *bf)
1da177e4 618{
865e9446 619 struct iattr iattr;
8add71ca 620 enum xfs_prealloc_flags flags = 0;
781355c6 621 uint iolock = XFS_IOLOCK_EXCL;
1da177e4
LT
622 int error;
623
743bb465 624 /*
625 * Only allow the sys admin to reserve space unless
626 * unwritten extents are enabled.
627 */
628 if (!xfs_sb_version_hasextflgbit(&ip->i_mount->m_sb) &&
629 !capable(CAP_SYS_ADMIN))
b474c7ae 630 return -EPERM;
743bb465 631
f37ea149 632 if (inode->i_flags & (S_IMMUTABLE|S_APPEND))
b474c7ae 633 return -EPERM;
1da177e4 634
ad4a8ac4 635 if (!(filp->f_mode & FMODE_WRITE))
b474c7ae 636 return -EBADF;
1da177e4 637
f37ea149 638 if (!S_ISREG(inode->i_mode))
b474c7ae 639 return -EINVAL;
1da177e4 640
8add71ca
CH
641 if (filp->f_flags & O_DSYNC)
642 flags |= XFS_PREALLOC_SYNC;
e8e9ad42 643 if (ioflags & XFS_IO_INVIS)
8add71ca
CH
644 flags |= XFS_PREALLOC_INVISIBLE;
645
d9457dc0
JK
646 error = mnt_want_write_file(filp);
647 if (error)
648 return error;
865e9446 649
781355c6 650 xfs_ilock(ip, iolock);
21c3ea18 651 error = xfs_break_layouts(inode, &iolock, false);
781355c6
CH
652 if (error)
653 goto out_unlock;
865e9446 654
e8e9ad42
DC
655 xfs_ilock(ip, XFS_MMAPLOCK_EXCL);
656 iolock |= XFS_MMAPLOCK_EXCL;
657
865e9446
CH
658 switch (bf->l_whence) {
659 case 0: /*SEEK_SET*/
660 break;
661 case 1: /*SEEK_CUR*/
662 bf->l_start += filp->f_pos;
663 break;
664 case 2: /*SEEK_END*/
665 bf->l_start += XFS_ISIZE(ip);
666 break;
667 default:
2451337d 668 error = -EINVAL;
865e9446
CH
669 goto out_unlock;
670 }
671
672 /*
673 * length of <= 0 for resv/unresv/zero is invalid. length for
674 * alloc/free is ignored completely and we have no idea what userspace
675 * might have set it to, so set it to zero to allow range
676 * checks to pass.
677 */
678 switch (cmd) {
679 case XFS_IOC_ZERO_RANGE:
680 case XFS_IOC_RESVSP:
681 case XFS_IOC_RESVSP64:
682 case XFS_IOC_UNRESVSP:
683 case XFS_IOC_UNRESVSP64:
684 if (bf->l_len <= 0) {
2451337d 685 error = -EINVAL;
865e9446
CH
686 goto out_unlock;
687 }
688 break;
689 default:
690 bf->l_len = 0;
691 break;
692 }
693
694 if (bf->l_start < 0 ||
8add71ca 695 bf->l_start > inode->i_sb->s_maxbytes ||
865e9446 696 bf->l_start + bf->l_len < 0 ||
8add71ca 697 bf->l_start + bf->l_len >= inode->i_sb->s_maxbytes) {
2451337d 698 error = -EINVAL;
865e9446
CH
699 goto out_unlock;
700 }
701
702 switch (cmd) {
703 case XFS_IOC_ZERO_RANGE:
8add71ca 704 flags |= XFS_PREALLOC_SET;
865e9446 705 error = xfs_zero_file_space(ip, bf->l_start, bf->l_len);
865e9446
CH
706 break;
707 case XFS_IOC_RESVSP:
708 case XFS_IOC_RESVSP64:
8add71ca 709 flags |= XFS_PREALLOC_SET;
865e9446
CH
710 error = xfs_alloc_file_space(ip, bf->l_start, bf->l_len,
711 XFS_BMAPI_PREALLOC);
865e9446
CH
712 break;
713 case XFS_IOC_UNRESVSP:
714 case XFS_IOC_UNRESVSP64:
715 error = xfs_free_file_space(ip, bf->l_start, bf->l_len);
716 break;
717 case XFS_IOC_ALLOCSP:
718 case XFS_IOC_ALLOCSP64:
719 case XFS_IOC_FREESP:
720 case XFS_IOC_FREESP64:
8add71ca 721 flags |= XFS_PREALLOC_CLEAR;
865e9446
CH
722 if (bf->l_start > XFS_ISIZE(ip)) {
723 error = xfs_alloc_file_space(ip, XFS_ISIZE(ip),
724 bf->l_start - XFS_ISIZE(ip), 0);
725 if (error)
726 goto out_unlock;
727 }
728
729 iattr.ia_valid = ATTR_SIZE;
730 iattr.ia_size = bf->l_start;
731
732 error = xfs_setattr_size(ip, &iattr);
865e9446
CH
733 break;
734 default:
735 ASSERT(0);
2451337d 736 error = -EINVAL;
865e9446
CH
737 }
738
739 if (error)
740 goto out_unlock;
741
8add71ca 742 error = xfs_update_prealloc_flags(ip, flags);
865e9446
CH
743
744out_unlock:
781355c6 745 xfs_iunlock(ip, iolock);
d9457dc0 746 mnt_drop_write_file(filp);
2451337d 747 return error;
1da177e4
LT
748}
749
750STATIC int
751xfs_ioc_bulkstat(
752 xfs_mount_t *mp,
753 unsigned int cmd,
754 void __user *arg)
755{
756 xfs_fsop_bulkreq_t bulkreq;
757 int count; /* # of records returned */
758 xfs_ino_t inlast; /* last inode number */
759 int done;
760 int error;
761
762 /* done = 1 if there are more stats to get and if bulkstat */
763 /* should be called again (unused here, but used in dmapi) */
764
765 if (!capable(CAP_SYS_ADMIN))
766 return -EPERM;
767
768 if (XFS_FORCED_SHUTDOWN(mp))
b474c7ae 769 return -EIO;
1da177e4
LT
770
771 if (copy_from_user(&bulkreq, arg, sizeof(xfs_fsop_bulkreq_t)))
b474c7ae 772 return -EFAULT;
1da177e4
LT
773
774 if (copy_from_user(&inlast, bulkreq.lastip, sizeof(__s64)))
b474c7ae 775 return -EFAULT;
1da177e4
LT
776
777 if ((count = bulkreq.icount) <= 0)
b474c7ae 778 return -EINVAL;
1da177e4 779
cd57e594 780 if (bulkreq.ubuffer == NULL)
b474c7ae 781 return -EINVAL;
cd57e594 782
1da177e4
LT
783 if (cmd == XFS_IOC_FSINUMBERS)
784 error = xfs_inumbers(mp, &inlast, &count,
faa63e95 785 bulkreq.ubuffer, xfs_inumbers_fmt);
1da177e4 786 else if (cmd == XFS_IOC_FSBULKSTAT_SINGLE)
d716f8ee
CH
787 error = xfs_bulkstat_one(mp, inlast, bulkreq.ubuffer,
788 sizeof(xfs_bstat_t), NULL, &done);
cd57e594 789 else /* XFS_IOC_FSBULKSTAT */
7dce11db
CH
790 error = xfs_bulkstat(mp, &inlast, &count, xfs_bulkstat_one,
791 sizeof(xfs_bstat_t), bulkreq.ubuffer,
792 &done);
1da177e4
LT
793
794 if (error)
2451337d 795 return error;
1da177e4
LT
796
797 if (bulkreq.ocount != NULL) {
798 if (copy_to_user(bulkreq.lastip, &inlast,
799 sizeof(xfs_ino_t)))
b474c7ae 800 return -EFAULT;
1da177e4
LT
801
802 if (copy_to_user(bulkreq.ocount, &count, sizeof(count)))
b474c7ae 803 return -EFAULT;
1da177e4
LT
804 }
805
806 return 0;
807}
808
809STATIC int
810xfs_ioc_fsgeometry_v1(
811 xfs_mount_t *mp,
812 void __user *arg)
813{
eeb2036b 814 xfs_fsop_geom_t fsgeo;
1da177e4
LT
815 int error;
816
eeb2036b 817 error = xfs_fs_geometry(mp, &fsgeo, 3);
1da177e4 818 if (error)
2451337d 819 return error;
1da177e4 820
eeb2036b
AE
821 /*
822 * Caller should have passed an argument of type
823 * xfs_fsop_geom_v1_t. This is a proper subset of the
824 * xfs_fsop_geom_t that xfs_fs_geometry() fills in.
825 */
826 if (copy_to_user(arg, &fsgeo, sizeof(xfs_fsop_geom_v1_t)))
b474c7ae 827 return -EFAULT;
1da177e4
LT
828 return 0;
829}
830
831STATIC int
832xfs_ioc_fsgeometry(
833 xfs_mount_t *mp,
834 void __user *arg)
835{
836 xfs_fsop_geom_t fsgeo;
837 int error;
838
839 error = xfs_fs_geometry(mp, &fsgeo, 4);
840 if (error)
2451337d 841 return error;
1da177e4
LT
842
843 if (copy_to_user(arg, &fsgeo, sizeof(fsgeo)))
b474c7ae 844 return -EFAULT;
1da177e4
LT
845 return 0;
846}
847
848/*
849 * Linux extended inode flags interface.
850 */
1da177e4
LT
851
852STATIC unsigned int
853xfs_merge_ioc_xflags(
854 unsigned int flags,
855 unsigned int start)
856{
857 unsigned int xflags = start;
858
39058a0e 859 if (flags & FS_IMMUTABLE_FL)
e7b89481 860 xflags |= FS_XFLAG_IMMUTABLE;
1da177e4 861 else
e7b89481 862 xflags &= ~FS_XFLAG_IMMUTABLE;
39058a0e 863 if (flags & FS_APPEND_FL)
e7b89481 864 xflags |= FS_XFLAG_APPEND;
1da177e4 865 else
e7b89481 866 xflags &= ~FS_XFLAG_APPEND;
39058a0e 867 if (flags & FS_SYNC_FL)
e7b89481 868 xflags |= FS_XFLAG_SYNC;
1da177e4 869 else
e7b89481 870 xflags &= ~FS_XFLAG_SYNC;
39058a0e 871 if (flags & FS_NOATIME_FL)
e7b89481 872 xflags |= FS_XFLAG_NOATIME;
1da177e4 873 else
e7b89481 874 xflags &= ~FS_XFLAG_NOATIME;
39058a0e 875 if (flags & FS_NODUMP_FL)
e7b89481 876 xflags |= FS_XFLAG_NODUMP;
1da177e4 877 else
e7b89481 878 xflags &= ~FS_XFLAG_NODUMP;
1da177e4
LT
879
880 return xflags;
881}
882
883STATIC unsigned int
884xfs_di2lxflags(
885 __uint16_t di_flags)
886{
887 unsigned int flags = 0;
888
889 if (di_flags & XFS_DIFLAG_IMMUTABLE)
39058a0e 890 flags |= FS_IMMUTABLE_FL;
1da177e4 891 if (di_flags & XFS_DIFLAG_APPEND)
39058a0e 892 flags |= FS_APPEND_FL;
1da177e4 893 if (di_flags & XFS_DIFLAG_SYNC)
39058a0e 894 flags |= FS_SYNC_FL;
1da177e4 895 if (di_flags & XFS_DIFLAG_NOATIME)
39058a0e 896 flags |= FS_NOATIME_FL;
1da177e4 897 if (di_flags & XFS_DIFLAG_NODUMP)
39058a0e 898 flags |= FS_NODUMP_FL;
1da177e4
LT
899 return flags;
900}
901
c83bfab1
CH
902STATIC int
903xfs_ioc_fsgetxattr(
904 xfs_inode_t *ip,
905 int attr,
906 void __user *arg)
907{
908 struct fsxattr fa;
909
a122eb2f
DR
910 memset(&fa, 0, sizeof(struct fsxattr));
911
c83bfab1
CH
912 xfs_ilock(ip, XFS_ILOCK_SHARED);
913 fa.fsx_xflags = xfs_ip2xflags(ip);
914 fa.fsx_extsize = ip->i_d.di_extsize << ip->i_mount->m_sb.sb_blocklog;
6743099c 915 fa.fsx_projid = xfs_get_projid(ip);
c83bfab1
CH
916
917 if (attr) {
918 if (ip->i_afp) {
919 if (ip->i_afp->if_flags & XFS_IFEXTENTS)
920 fa.fsx_nextents = ip->i_afp->if_bytes /
921 sizeof(xfs_bmbt_rec_t);
922 else
923 fa.fsx_nextents = ip->i_d.di_anextents;
924 } else
925 fa.fsx_nextents = 0;
926 } else {
927 if (ip->i_df.if_flags & XFS_IFEXTENTS)
928 fa.fsx_nextents = ip->i_df.if_bytes /
929 sizeof(xfs_bmbt_rec_t);
930 else
931 fa.fsx_nextents = ip->i_d.di_nextents;
932 }
933 xfs_iunlock(ip, XFS_ILOCK_SHARED);
934
935 if (copy_to_user(arg, &fa, sizeof(fa)))
936 return -EFAULT;
937 return 0;
938}
939
25fe55e8
CH
940STATIC void
941xfs_set_diflags(
942 struct xfs_inode *ip,
943 unsigned int xflags)
944{
945 unsigned int di_flags;
58f88ca2 946 uint64_t di_flags2;
25fe55e8
CH
947
948 /* can't set PREALLOC this way, just preserve it */
949 di_flags = (ip->i_d.di_flags & XFS_DIFLAG_PREALLOC);
e7b89481 950 if (xflags & FS_XFLAG_IMMUTABLE)
25fe55e8 951 di_flags |= XFS_DIFLAG_IMMUTABLE;
e7b89481 952 if (xflags & FS_XFLAG_APPEND)
25fe55e8 953 di_flags |= XFS_DIFLAG_APPEND;
e7b89481 954 if (xflags & FS_XFLAG_SYNC)
25fe55e8 955 di_flags |= XFS_DIFLAG_SYNC;
e7b89481 956 if (xflags & FS_XFLAG_NOATIME)
25fe55e8 957 di_flags |= XFS_DIFLAG_NOATIME;
e7b89481 958 if (xflags & FS_XFLAG_NODUMP)
25fe55e8 959 di_flags |= XFS_DIFLAG_NODUMP;
e7b89481 960 if (xflags & FS_XFLAG_NODEFRAG)
25fe55e8 961 di_flags |= XFS_DIFLAG_NODEFRAG;
e7b89481 962 if (xflags & FS_XFLAG_FILESTREAM)
25fe55e8 963 di_flags |= XFS_DIFLAG_FILESTREAM;
c19b3b05 964 if (S_ISDIR(VFS_I(ip)->i_mode)) {
e7b89481 965 if (xflags & FS_XFLAG_RTINHERIT)
25fe55e8 966 di_flags |= XFS_DIFLAG_RTINHERIT;
e7b89481 967 if (xflags & FS_XFLAG_NOSYMLINKS)
25fe55e8 968 di_flags |= XFS_DIFLAG_NOSYMLINKS;
e7b89481 969 if (xflags & FS_XFLAG_EXTSZINHERIT)
25fe55e8 970 di_flags |= XFS_DIFLAG_EXTSZINHERIT;
e7b89481 971 if (xflags & FS_XFLAG_PROJINHERIT)
9336e3a7 972 di_flags |= XFS_DIFLAG_PROJINHERIT;
c19b3b05 973 } else if (S_ISREG(VFS_I(ip)->i_mode)) {
e7b89481 974 if (xflags & FS_XFLAG_REALTIME)
25fe55e8 975 di_flags |= XFS_DIFLAG_REALTIME;
e7b89481 976 if (xflags & FS_XFLAG_EXTSIZE)
25fe55e8
CH
977 di_flags |= XFS_DIFLAG_EXTSIZE;
978 }
25fe55e8 979 ip->i_d.di_flags = di_flags;
58f88ca2
DC
980
981 /* diflags2 only valid for v3 inodes. */
982 if (ip->i_d.di_version < 3)
983 return;
984
985 di_flags2 = 0;
986 if (xflags & FS_XFLAG_DAX)
987 di_flags2 |= XFS_DIFLAG2_DAX;
988
989 ip->i_d.di_flags2 = di_flags2;
990
25fe55e8
CH
991}
992
f13fae2d
CH
993STATIC void
994xfs_diflags_to_linux(
995 struct xfs_inode *ip)
996{
e4f75291 997 struct inode *inode = VFS_I(ip);
f13fae2d
CH
998 unsigned int xflags = xfs_ip2xflags(ip);
999
e7b89481 1000 if (xflags & FS_XFLAG_IMMUTABLE)
f13fae2d
CH
1001 inode->i_flags |= S_IMMUTABLE;
1002 else
1003 inode->i_flags &= ~S_IMMUTABLE;
e7b89481 1004 if (xflags & FS_XFLAG_APPEND)
f13fae2d
CH
1005 inode->i_flags |= S_APPEND;
1006 else
1007 inode->i_flags &= ~S_APPEND;
e7b89481 1008 if (xflags & FS_XFLAG_SYNC)
f13fae2d
CH
1009 inode->i_flags |= S_SYNC;
1010 else
1011 inode->i_flags &= ~S_SYNC;
e7b89481 1012 if (xflags & FS_XFLAG_NOATIME)
f13fae2d
CH
1013 inode->i_flags |= S_NOATIME;
1014 else
1015 inode->i_flags &= ~S_NOATIME;
58f88ca2
DC
1016 if (xflags & FS_XFLAG_DAX)
1017 inode->i_flags |= S_DAX;
1018 else
1019 inode->i_flags &= ~S_DAX;
1020
f13fae2d 1021}
25fe55e8 1022
29a17c00
DC
1023static int
1024xfs_ioctl_setattr_xflags(
1025 struct xfs_trans *tp,
1026 struct xfs_inode *ip,
1027 struct fsxattr *fa)
1028{
1029 struct xfs_mount *mp = ip->i_mount;
1030
1031 /* Can't change realtime flag if any extents are allocated. */
1032 if ((ip->i_d.di_nextents || ip->i_delayed_blks) &&
e7b89481 1033 XFS_IS_REALTIME_INODE(ip) != (fa->fsx_xflags & FS_XFLAG_REALTIME))
29a17c00
DC
1034 return -EINVAL;
1035
1036 /* If realtime flag is set then must have realtime device */
e7b89481 1037 if (fa->fsx_xflags & FS_XFLAG_REALTIME) {
29a17c00
DC
1038 if (mp->m_sb.sb_rblocks == 0 || mp->m_sb.sb_rextsize == 0 ||
1039 (ip->i_d.di_extsize % mp->m_sb.sb_rextsize))
1040 return -EINVAL;
1041 }
1042
1043 /*
1044 * Can't modify an immutable/append-only file unless
1045 * we have appropriate permission.
1046 */
1047 if (((ip->i_d.di_flags & (XFS_DIFLAG_IMMUTABLE | XFS_DIFLAG_APPEND)) ||
e7b89481 1048 (fa->fsx_xflags & (FS_XFLAG_IMMUTABLE | FS_XFLAG_APPEND))) &&
29a17c00
DC
1049 !capable(CAP_LINUX_IMMUTABLE))
1050 return -EPERM;
1051
29a17c00
DC
1052 xfs_set_diflags(ip, fa->fsx_xflags);
1053 xfs_diflags_to_linux(ip);
1054 xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG);
1055 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
ff6d6af2 1056 XFS_STATS_INC(mp, xs_ig_attrchg);
29a17c00
DC
1057 return 0;
1058}
1059
3a6a854a
DC
1060/*
1061 * If we are changing DAX flags, we have to ensure the file is clean and any
1062 * cached objects in the address space are invalidated and removed. This
1063 * requires us to lock out other IO and page faults similar to a truncate
1064 * operation. The locks need to be held until the transaction has been committed
1065 * so that the cache invalidation is atomic with respect to the DAX flag
1066 * manipulation.
1067 */
1068static int
1069xfs_ioctl_setattr_dax_invalidate(
1070 struct xfs_inode *ip,
1071 struct fsxattr *fa,
1072 int *join_flags)
1073{
1074 struct inode *inode = VFS_I(ip);
1075 int error;
1076
1077 *join_flags = 0;
1078
e8897529
DC
1079 /*
1080 * It is only valid to set the DAX flag on regular files and
64485437
DC
1081 * directories on filesystems where the block size is equal to the page
1082 * size. On directories it serves as an inherit hint.
e8897529 1083 */
64485437
DC
1084 if (fa->fsx_xflags & FS_XFLAG_DAX) {
1085 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode)))
1086 return -EINVAL;
1087 if (ip->i_mount->m_sb.sb_blocksize != PAGE_SIZE)
1088 return -EINVAL;
1089 }
e8897529 1090
3a6a854a
DC
1091 /* If the DAX state is not changing, we have nothing to do here. */
1092 if ((fa->fsx_xflags & FS_XFLAG_DAX) && IS_DAX(inode))
1093 return 0;
1094 if (!(fa->fsx_xflags & FS_XFLAG_DAX) && !IS_DAX(inode))
1095 return 0;
1096
1097 /* lock, flush and invalidate mapping in preparation for flag change */
1098 xfs_ilock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1099 error = filemap_write_and_wait(inode->i_mapping);
1100 if (error)
1101 goto out_unlock;
1102 error = invalidate_inode_pages2(inode->i_mapping);
1103 if (error)
1104 goto out_unlock;
1105
1106 *join_flags = XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL;
29a17c00 1107 return 0;
3a6a854a
DC
1108
1109out_unlock:
1110 xfs_iunlock(ip, XFS_MMAPLOCK_EXCL | XFS_IOLOCK_EXCL);
1111 return error;
1112
29a17c00
DC
1113}
1114
8f3d17ab
DC
1115/*
1116 * Set up the transaction structure for the setattr operation, checking that we
1117 * have permission to do so. On success, return a clean transaction and the
1118 * inode locked exclusively ready for further operation specific checks. On
1119 * failure, return an error without modifying or locking the inode.
3a6a854a
DC
1120 *
1121 * The inode might already be IO locked on call. If this is the case, it is
1122 * indicated in @join_flags and we take full responsibility for ensuring they
1123 * are unlocked from now on. Hence if we have an error here, we still have to
1124 * unlock them. Otherwise, once they are joined to the transaction, they will
1125 * be unlocked on commit/cancel.
8f3d17ab
DC
1126 */
1127static struct xfs_trans *
1128xfs_ioctl_setattr_get_trans(
3a6a854a
DC
1129 struct xfs_inode *ip,
1130 int join_flags)
8f3d17ab
DC
1131{
1132 struct xfs_mount *mp = ip->i_mount;
1133 struct xfs_trans *tp;
3a6a854a 1134 int error = -EROFS;
8f3d17ab
DC
1135
1136 if (mp->m_flags & XFS_MOUNT_RDONLY)
3a6a854a
DC
1137 goto out_unlock;
1138 error = -EIO;
8f3d17ab 1139 if (XFS_FORCED_SHUTDOWN(mp))
3a6a854a 1140 goto out_unlock;
8f3d17ab 1141
253f4911 1142 error = xfs_trans_alloc(mp, &M_RES(mp)->tr_ichange, 0, 0, 0, &tp);
8f3d17ab 1143 if (error)
253f4911 1144 return ERR_PTR(error);
8f3d17ab
DC
1145
1146 xfs_ilock(ip, XFS_ILOCK_EXCL);
3a6a854a
DC
1147 xfs_trans_ijoin(tp, ip, XFS_ILOCK_EXCL | join_flags);
1148 join_flags = 0;
8f3d17ab
DC
1149
1150 /*
1151 * CAP_FOWNER overrides the following restrictions:
1152 *
1153 * The user ID of the calling process must be equal to the file owner
1154 * ID, except in cases where the CAP_FSETID capability is applicable.
1155 */
1156 if (!inode_owner_or_capable(VFS_I(ip))) {
1157 error = -EPERM;
1158 goto out_cancel;
1159 }
1160
1161 if (mp->m_flags & XFS_MOUNT_WSYNC)
1162 xfs_trans_set_sync(tp);
1163
1164 return tp;
1165
1166out_cancel:
4906e215 1167 xfs_trans_cancel(tp);
3a6a854a
DC
1168out_unlock:
1169 if (join_flags)
1170 xfs_iunlock(ip, join_flags);
8f3d17ab
DC
1171 return ERR_PTR(error);
1172}
1173
9b94fcc3
IP
1174/*
1175 * extent size hint validation is somewhat cumbersome. Rules are:
1176 *
1177 * 1. extent size hint is only valid for directories and regular files
e7b89481
DC
1178 * 2. FS_XFLAG_EXTSIZE is only valid for regular files
1179 * 3. FS_XFLAG_EXTSZINHERIT is only valid for directories.
9b94fcc3
IP
1180 * 4. can only be changed on regular files if no extents are allocated
1181 * 5. can be changed on directories at any time
1182 * 6. extsize hint of 0 turns off hints, clears inode flags.
1183 * 7. Extent size must be a multiple of the appropriate block size.
1184 * 8. for non-realtime files, the extent size hint must be limited
1185 * to half the AG size to avoid alignment extending the extent beyond the
1186 * limits of the AG.
1187 */
f92090e9 1188static int
d4388d3c
DC
1189xfs_ioctl_setattr_check_extsize(
1190 struct xfs_inode *ip,
1191 struct fsxattr *fa)
1192{
1193 struct xfs_mount *mp = ip->i_mount;
1194
c19b3b05 1195 if ((fa->fsx_xflags & FS_XFLAG_EXTSIZE) && !S_ISREG(VFS_I(ip)->i_mode))
9b94fcc3
IP
1196 return -EINVAL;
1197
e7b89481 1198 if ((fa->fsx_xflags & FS_XFLAG_EXTSZINHERIT) &&
c19b3b05 1199 !S_ISDIR(VFS_I(ip)->i_mode))
9b94fcc3
IP
1200 return -EINVAL;
1201
c19b3b05 1202 if (S_ISREG(VFS_I(ip)->i_mode) && ip->i_d.di_nextents &&
d4388d3c
DC
1203 ((ip->i_d.di_extsize << mp->m_sb.sb_blocklog) != fa->fsx_extsize))
1204 return -EINVAL;
1205
d4388d3c
DC
1206 if (fa->fsx_extsize != 0) {
1207 xfs_extlen_t size;
1208 xfs_fsblock_t extsize_fsb;
1209
1210 extsize_fsb = XFS_B_TO_FSB(mp, fa->fsx_extsize);
1211 if (extsize_fsb > MAXEXTLEN)
1212 return -EINVAL;
1213
1214 if (XFS_IS_REALTIME_INODE(ip) ||
e7b89481 1215 (fa->fsx_xflags & FS_XFLAG_REALTIME)) {
d4388d3c
DC
1216 size = mp->m_sb.sb_rextsize << mp->m_sb.sb_blocklog;
1217 } else {
1218 size = mp->m_sb.sb_blocksize;
1219 if (extsize_fsb > mp->m_sb.sb_agblocks / 2)
1220 return -EINVAL;
1221 }
1222
1223 if (fa->fsx_extsize % size)
1224 return -EINVAL;
9b94fcc3 1225 } else
e7b89481 1226 fa->fsx_xflags &= ~(FS_XFLAG_EXTSIZE | FS_XFLAG_EXTSZINHERIT);
9b94fcc3 1227
d4388d3c
DC
1228 return 0;
1229}
1230
f92090e9 1231static int
23bd0735
DC
1232xfs_ioctl_setattr_check_projid(
1233 struct xfs_inode *ip,
1234 struct fsxattr *fa)
1235{
1236 /* Disallow 32bit project ids if projid32bit feature is not enabled. */
1237 if (fa->fsx_projid > (__uint16_t)-1 &&
1238 !xfs_sb_version_hasprojid32bit(&ip->i_mount->m_sb))
1239 return -EINVAL;
1240
1241 /*
1242 * Project Quota ID state is only allowed to change from within the init
1243 * namespace. Enforce that restriction only if we are trying to change
1244 * the quota ID state. Everything else is allowed in user namespaces.
1245 */
1246 if (current_user_ns() == &init_user_ns)
1247 return 0;
1248
1249 if (xfs_get_projid(ip) != fa->fsx_projid)
1250 return -EINVAL;
e7b89481 1251 if ((fa->fsx_xflags & FS_XFLAG_PROJINHERIT) !=
23bd0735
DC
1252 (ip->i_d.di_flags & XFS_DIFLAG_PROJINHERIT))
1253 return -EINVAL;
1254
1255 return 0;
1256}
25fe55e8
CH
1257
1258STATIC int
1259xfs_ioctl_setattr(
1260 xfs_inode_t *ip,
fd179b9c 1261 struct fsxattr *fa)
25fe55e8
CH
1262{
1263 struct xfs_mount *mp = ip->i_mount;
1264 struct xfs_trans *tp;
7d095257 1265 struct xfs_dquot *udqp = NULL;
92f8ff73 1266 struct xfs_dquot *pdqp = NULL;
25fe55e8
CH
1267 struct xfs_dquot *olddquot = NULL;
1268 int code;
3a6a854a 1269 int join_flags = 0;
25fe55e8 1270
cca28fb8 1271 trace_xfs_ioctl_setattr(ip);
25fe55e8 1272
23bd0735
DC
1273 code = xfs_ioctl_setattr_check_projid(ip, fa);
1274 if (code)
1275 return code;
23963e54 1276
25fe55e8
CH
1277 /*
1278 * If disk quotas is on, we make sure that the dquots do exist on disk,
1279 * before we start any other transactions. Trying to do this later
1280 * is messy. We don't care to take a readlock to look at the ids
1281 * in inode here, because we can't hold it across the trans_reserve.
1282 * If the IDs do change before we take the ilock, we're covered
1283 * because the i_*dquot fields will get updated anyway.
1284 */
fd179b9c 1285 if (XFS_IS_QUOTA_ON(mp)) {
7d095257 1286 code = xfs_qm_vop_dqalloc(ip, ip->i_d.di_uid,
25fe55e8 1287 ip->i_d.di_gid, fa->fsx_projid,
92f8ff73 1288 XFS_QMOPT_PQUOTA, &udqp, NULL, &pdqp);
25fe55e8
CH
1289 if (code)
1290 return code;
1291 }
1292
3a6a854a
DC
1293 /*
1294 * Changing DAX config may require inode locking for mapping
1295 * invalidation. These need to be held all the way to transaction commit
1296 * or cancel time, so need to be passed through to
1297 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1298 * appropriately.
1299 */
1300 code = xfs_ioctl_setattr_dax_invalidate(ip, fa, &join_flags);
1301 if (code)
1302 goto error_free_dquots;
1303
1304 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
8f3d17ab
DC
1305 if (IS_ERR(tp)) {
1306 code = PTR_ERR(tp);
1307 goto error_free_dquots;
25fe55e8
CH
1308 }
1309
25fe55e8 1310
fd179b9c
DC
1311 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp) &&
1312 xfs_get_projid(ip) != fa->fsx_projid) {
1313 code = xfs_qm_vop_chown_reserve(tp, ip, udqp, NULL, pdqp,
1314 capable(CAP_FOWNER) ? XFS_QMOPT_FORCE_RES : 0);
1315 if (code) /* out of quota */
d4388d3c 1316 goto error_trans_cancel;
25fe55e8
CH
1317 }
1318
d4388d3c
DC
1319 code = xfs_ioctl_setattr_check_extsize(ip, fa);
1320 if (code)
1321 goto error_trans_cancel;
25fe55e8 1322
29a17c00
DC
1323 code = xfs_ioctl_setattr_xflags(tp, ip, fa);
1324 if (code)
d4388d3c 1325 goto error_trans_cancel;
25fe55e8
CH
1326
1327 /*
fd179b9c
DC
1328 * Change file ownership. Must be the owner or privileged. CAP_FSETID
1329 * overrides the following restrictions:
1330 *
1331 * The set-user-ID and set-group-ID bits of a file will be cleared upon
1332 * successful return from chown()
25fe55e8 1333 */
25fe55e8 1334
c19b3b05 1335 if ((VFS_I(ip)->i_mode & (S_ISUID|S_ISGID)) &&
fd179b9c 1336 !capable_wrt_inode_uidgid(VFS_I(ip), CAP_FSETID))
c19b3b05 1337 VFS_I(ip)->i_mode &= ~(S_ISUID|S_ISGID);
25fe55e8 1338
fd179b9c
DC
1339 /* Change the ownerships and register project quota modifications */
1340 if (xfs_get_projid(ip) != fa->fsx_projid) {
1341 if (XFS_IS_QUOTA_RUNNING(mp) && XFS_IS_PQUOTA_ON(mp)) {
1342 olddquot = xfs_qm_vop_chown(tp, ip,
1343 &ip->i_pdquot, pdqp);
1344 }
1345 ASSERT(ip->i_d.di_version > 1);
1346 xfs_set_projid(ip, fa->fsx_projid);
f13fae2d 1347 }
25fe55e8 1348
a872703f
DC
1349 /*
1350 * Only set the extent size hint if we've already determined that the
1351 * extent size hint should be set on the inode. If no extent size flags
1352 * are set on the inode then unconditionally clear the extent size hint.
1353 */
fd179b9c
DC
1354 if (ip->i_d.di_flags & (XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT))
1355 ip->i_d.di_extsize = fa->fsx_extsize >> mp->m_sb.sb_blocklog;
1356 else
1357 ip->i_d.di_extsize = 0;
25fe55e8 1358
70393313 1359 code = xfs_trans_commit(tp);
25fe55e8
CH
1360
1361 /*
1362 * Release any dquot(s) the inode had kept before chown.
1363 */
7d095257
CH
1364 xfs_qm_dqrele(olddquot);
1365 xfs_qm_dqrele(udqp);
92f8ff73 1366 xfs_qm_dqrele(pdqp);
25fe55e8 1367
288699fe 1368 return code;
25fe55e8 1369
d4388d3c 1370error_trans_cancel:
4906e215 1371 xfs_trans_cancel(tp);
8f3d17ab 1372error_free_dquots:
7d095257 1373 xfs_qm_dqrele(udqp);
92f8ff73 1374 xfs_qm_dqrele(pdqp);
25fe55e8
CH
1375 return code;
1376}
1377
1da177e4 1378STATIC int
df26cfe8 1379xfs_ioc_fssetxattr(
1da177e4
LT
1380 xfs_inode_t *ip,
1381 struct file *filp,
1da177e4
LT
1382 void __user *arg)
1383{
1384 struct fsxattr fa;
d9457dc0 1385 int error;
df26cfe8
LM
1386
1387 if (copy_from_user(&fa, arg, sizeof(fa)))
1388 return -EFAULT;
1da177e4 1389
d9457dc0
JK
1390 error = mnt_want_write_file(filp);
1391 if (error)
1392 return error;
fd179b9c 1393 error = xfs_ioctl_setattr(ip, &fa);
d9457dc0 1394 mnt_drop_write_file(filp);
2451337d 1395 return error;
df26cfe8 1396}
1da177e4 1397
df26cfe8
LM
1398STATIC int
1399xfs_ioc_getxflags(
1400 xfs_inode_t *ip,
1401 void __user *arg)
1402{
1403 unsigned int flags;
1da177e4 1404
df26cfe8
LM
1405 flags = xfs_di2lxflags(ip->i_d.di_flags);
1406 if (copy_to_user(arg, &flags, sizeof(flags)))
1407 return -EFAULT;
1408 return 0;
1409}
1da177e4 1410
df26cfe8
LM
1411STATIC int
1412xfs_ioc_setxflags(
f96291f6 1413 struct xfs_inode *ip,
df26cfe8
LM
1414 struct file *filp,
1415 void __user *arg)
1416{
f96291f6 1417 struct xfs_trans *tp;
25fe55e8 1418 struct fsxattr fa;
df26cfe8 1419 unsigned int flags;
3a6a854a 1420 int join_flags = 0;
f96291f6 1421 int error;
1da177e4 1422
df26cfe8
LM
1423 if (copy_from_user(&flags, arg, sizeof(flags)))
1424 return -EFAULT;
1da177e4 1425
df26cfe8
LM
1426 if (flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL | \
1427 FS_NOATIME_FL | FS_NODUMP_FL | \
1428 FS_SYNC_FL))
1429 return -EOPNOTSUPP;
1da177e4 1430
25fe55e8 1431 fa.fsx_xflags = xfs_merge_ioc_xflags(flags, xfs_ip2xflags(ip));
1da177e4 1432
d9457dc0
JK
1433 error = mnt_want_write_file(filp);
1434 if (error)
1435 return error;
f96291f6 1436
3a6a854a
DC
1437 /*
1438 * Changing DAX config may require inode locking for mapping
1439 * invalidation. These need to be held all the way to transaction commit
1440 * or cancel time, so need to be passed through to
1441 * xfs_ioctl_setattr_get_trans() so it can apply them to the join call
1442 * appropriately.
1443 */
1444 error = xfs_ioctl_setattr_dax_invalidate(ip, &fa, &join_flags);
1445 if (error)
1446 goto out_drop_write;
1447
1448 tp = xfs_ioctl_setattr_get_trans(ip, join_flags);
f96291f6
DC
1449 if (IS_ERR(tp)) {
1450 error = PTR_ERR(tp);
1451 goto out_drop_write;
1452 }
1453
1454 error = xfs_ioctl_setattr_xflags(tp, ip, &fa);
1455 if (error) {
4906e215 1456 xfs_trans_cancel(tp);
f96291f6
DC
1457 goto out_drop_write;
1458 }
1459
70393313 1460 error = xfs_trans_commit(tp);
f96291f6 1461out_drop_write:
d9457dc0 1462 mnt_drop_write_file(filp);
2451337d 1463 return error;
1da177e4
LT
1464}
1465
8a7141a8
ES
1466STATIC int
1467xfs_getbmap_format(void **ap, struct getbmapx *bmv, int *full)
1468{
b972d079 1469 struct getbmap __user *base = (struct getbmap __user *)*ap;
8a7141a8
ES
1470
1471 /* copy only getbmap portion (not getbmapx) */
1472 if (copy_to_user(base, bmv, sizeof(struct getbmap)))
2451337d 1473 return -EFAULT;
8a7141a8
ES
1474
1475 *ap += sizeof(struct getbmap);
1476 return 0;
1477}
1478
1da177e4
LT
1479STATIC int
1480xfs_ioc_getbmap(
993386c1 1481 struct xfs_inode *ip,
1da177e4
LT
1482 int ioflags,
1483 unsigned int cmd,
1484 void __user *arg)
1485{
8a7141a8 1486 struct getbmapx bmx;
1da177e4
LT
1487 int error;
1488
8a7141a8 1489 if (copy_from_user(&bmx, arg, sizeof(struct getbmapx)))
b474c7ae 1490 return -EFAULT;
1da177e4 1491
8a7141a8 1492 if (bmx.bmv_count < 2)
b474c7ae 1493 return -EINVAL;
1da177e4 1494
8a7141a8 1495 bmx.bmv_iflags = (cmd == XFS_IOC_GETBMAPA ? BMV_IF_ATTRFORK : 0);
b92cc59f 1496 if (ioflags & XFS_IO_INVIS)
8a7141a8 1497 bmx.bmv_iflags |= BMV_IF_NO_DMAPI_READ;
1da177e4 1498
8a7141a8 1499 error = xfs_getbmap(ip, &bmx, xfs_getbmap_format,
b972d079 1500 (__force struct getbmap *)arg+1);
1da177e4 1501 if (error)
2451337d 1502 return error;
1da177e4 1503
8a7141a8
ES
1504 /* copy back header - only size of getbmap */
1505 if (copy_to_user(arg, &bmx, sizeof(struct getbmap)))
b474c7ae 1506 return -EFAULT;
1da177e4
LT
1507 return 0;
1508}
1509
8a7141a8
ES
1510STATIC int
1511xfs_getbmapx_format(void **ap, struct getbmapx *bmv, int *full)
1512{
b972d079 1513 struct getbmapx __user *base = (struct getbmapx __user *)*ap;
8a7141a8
ES
1514
1515 if (copy_to_user(base, bmv, sizeof(struct getbmapx)))
2451337d 1516 return -EFAULT;
8a7141a8
ES
1517
1518 *ap += sizeof(struct getbmapx);
1519 return 0;
1520}
1521
1da177e4
LT
1522STATIC int
1523xfs_ioc_getbmapx(
993386c1 1524 struct xfs_inode *ip,
1da177e4
LT
1525 void __user *arg)
1526{
1527 struct getbmapx bmx;
1da177e4
LT
1528 int error;
1529
1530 if (copy_from_user(&bmx, arg, sizeof(bmx)))
b474c7ae 1531 return -EFAULT;
1da177e4
LT
1532
1533 if (bmx.bmv_count < 2)
b474c7ae 1534 return -EINVAL;
1da177e4 1535
8a7141a8 1536 if (bmx.bmv_iflags & (~BMV_IF_VALID))
b474c7ae 1537 return -EINVAL;
1da177e4 1538
8a7141a8 1539 error = xfs_getbmap(ip, &bmx, xfs_getbmapx_format,
b972d079 1540 (__force struct getbmapx *)arg+1);
1da177e4 1541 if (error)
2451337d 1542 return error;
1da177e4 1543
8a7141a8
ES
1544 /* copy back header */
1545 if (copy_to_user(arg, &bmx, sizeof(struct getbmapx)))
b474c7ae 1546 return -EFAULT;
1da177e4
LT
1547
1548 return 0;
1549}
df26cfe8 1550
a133d952
DC
1551int
1552xfs_ioc_swapext(
1553 xfs_swapext_t *sxp)
1554{
1555 xfs_inode_t *ip, *tip;
1556 struct fd f, tmp;
1557 int error = 0;
1558
1559 /* Pull information for the target fd */
1560 f = fdget((int)sxp->sx_fdtarget);
1561 if (!f.file) {
2451337d 1562 error = -EINVAL;
a133d952
DC
1563 goto out;
1564 }
1565
1566 if (!(f.file->f_mode & FMODE_WRITE) ||
1567 !(f.file->f_mode & FMODE_READ) ||
1568 (f.file->f_flags & O_APPEND)) {
2451337d 1569 error = -EBADF;
a133d952
DC
1570 goto out_put_file;
1571 }
1572
1573 tmp = fdget((int)sxp->sx_fdtmp);
1574 if (!tmp.file) {
2451337d 1575 error = -EINVAL;
a133d952
DC
1576 goto out_put_file;
1577 }
1578
1579 if (!(tmp.file->f_mode & FMODE_WRITE) ||
1580 !(tmp.file->f_mode & FMODE_READ) ||
1581 (tmp.file->f_flags & O_APPEND)) {
2451337d 1582 error = -EBADF;
a133d952
DC
1583 goto out_put_tmp_file;
1584 }
1585
1586 if (IS_SWAPFILE(file_inode(f.file)) ||
1587 IS_SWAPFILE(file_inode(tmp.file))) {
2451337d 1588 error = -EINVAL;
a133d952
DC
1589 goto out_put_tmp_file;
1590 }
1591
1592 ip = XFS_I(file_inode(f.file));
1593 tip = XFS_I(file_inode(tmp.file));
1594
1595 if (ip->i_mount != tip->i_mount) {
2451337d 1596 error = -EINVAL;
a133d952
DC
1597 goto out_put_tmp_file;
1598 }
1599
1600 if (ip->i_ino == tip->i_ino) {
2451337d 1601 error = -EINVAL;
a133d952
DC
1602 goto out_put_tmp_file;
1603 }
1604
1605 if (XFS_FORCED_SHUTDOWN(ip->i_mount)) {
2451337d 1606 error = -EIO;
a133d952
DC
1607 goto out_put_tmp_file;
1608 }
1609
1610 error = xfs_swap_extents(ip, tip, sxp);
1611
1612 out_put_tmp_file:
1613 fdput(tmp);
1614 out_put_file:
1615 fdput(f);
1616 out:
1617 return error;
1618}
1619
4d4be482
CH
1620/*
1621 * Note: some of the ioctl's return positive numbers as a
1622 * byte count indicating success, such as readlink_by_handle.
1623 * So we don't "sign flip" like most other routines. This means
1624 * true errors need to be returned as a negative value.
1625 */
1626long
1627xfs_file_ioctl(
df26cfe8 1628 struct file *filp,
df26cfe8 1629 unsigned int cmd,
4d4be482 1630 unsigned long p)
df26cfe8 1631{
496ad9aa 1632 struct inode *inode = file_inode(filp);
4d4be482
CH
1633 struct xfs_inode *ip = XFS_I(inode);
1634 struct xfs_mount *mp = ip->i_mount;
1635 void __user *arg = (void __user *)p;
1636 int ioflags = 0;
df26cfe8
LM
1637 int error;
1638
4d4be482 1639 if (filp->f_mode & FMODE_NOCMTIME)
b92cc59f 1640 ioflags |= XFS_IO_INVIS;
df26cfe8 1641
cca28fb8 1642 trace_xfs_file_ioctl(ip);
4d4be482
CH
1643
1644 switch (cmd) {
a46db608
CH
1645 case FITRIM:
1646 return xfs_ioc_trim(mp, arg);
df26cfe8
LM
1647 case XFS_IOC_ALLOCSP:
1648 case XFS_IOC_FREESP:
1649 case XFS_IOC_RESVSP:
1650 case XFS_IOC_UNRESVSP:
1651 case XFS_IOC_ALLOCSP64:
1652 case XFS_IOC_FREESP64:
1653 case XFS_IOC_RESVSP64:
44722352
DC
1654 case XFS_IOC_UNRESVSP64:
1655 case XFS_IOC_ZERO_RANGE: {
743bb465 1656 xfs_flock64_t bf;
df26cfe8 1657
743bb465 1658 if (copy_from_user(&bf, arg, sizeof(bf)))
b474c7ae 1659 return -EFAULT;
743bb465 1660 return xfs_ioc_space(ip, inode, filp, ioflags, cmd, &bf);
1661 }
df26cfe8
LM
1662 case XFS_IOC_DIOINFO: {
1663 struct dioattr da;
1664 xfs_buftarg_t *target =
1665 XFS_IS_REALTIME_INODE(ip) ?
1666 mp->m_rtdev_targp : mp->m_ddev_targp;
1667
7c71ee78 1668 da.d_mem = da.d_miniosz = target->bt_logical_sectorsize;
df26cfe8
LM
1669 da.d_maxiosz = INT_MAX & ~(da.d_miniosz - 1);
1670
1671 if (copy_to_user(arg, &da, sizeof(da)))
b474c7ae 1672 return -EFAULT;
df26cfe8
LM
1673 return 0;
1674 }
1675
1676 case XFS_IOC_FSBULKSTAT_SINGLE:
1677 case XFS_IOC_FSBULKSTAT:
1678 case XFS_IOC_FSINUMBERS:
1679 return xfs_ioc_bulkstat(mp, cmd, arg);
1680
1681 case XFS_IOC_FSGEOMETRY_V1:
1682 return xfs_ioc_fsgeometry_v1(mp, arg);
1683
1684 case XFS_IOC_FSGEOMETRY:
1685 return xfs_ioc_fsgeometry(mp, arg);
1686
1687 case XFS_IOC_GETVERSION:
1688 return put_user(inode->i_generation, (int __user *)arg);
1689
1690 case XFS_IOC_FSGETXATTR:
1691 return xfs_ioc_fsgetxattr(ip, 0, arg);
1692 case XFS_IOC_FSGETXATTRA:
1693 return xfs_ioc_fsgetxattr(ip, 1, arg);
65e67f51
LM
1694 case XFS_IOC_FSSETXATTR:
1695 return xfs_ioc_fssetxattr(ip, filp, arg);
df26cfe8 1696 case XFS_IOC_GETXFLAGS:
65e67f51 1697 return xfs_ioc_getxflags(ip, arg);
df26cfe8 1698 case XFS_IOC_SETXFLAGS:
65e67f51 1699 return xfs_ioc_setxflags(ip, filp, arg);
df26cfe8
LM
1700
1701 case XFS_IOC_FSSETDM: {
1702 struct fsdmidata dmi;
1703
1704 if (copy_from_user(&dmi, arg, sizeof(dmi)))
b474c7ae 1705 return -EFAULT;
df26cfe8 1706
d9457dc0
JK
1707 error = mnt_want_write_file(filp);
1708 if (error)
1709 return error;
1710
df26cfe8
LM
1711 error = xfs_set_dmattrs(ip, dmi.fsd_dmevmask,
1712 dmi.fsd_dmstate);
d9457dc0 1713 mnt_drop_write_file(filp);
2451337d 1714 return error;
df26cfe8
LM
1715 }
1716
1717 case XFS_IOC_GETBMAP:
1718 case XFS_IOC_GETBMAPA:
1719 return xfs_ioc_getbmap(ip, ioflags, cmd, arg);
1720
1721 case XFS_IOC_GETBMAPX:
1722 return xfs_ioc_getbmapx(ip, arg);
1723
1724 case XFS_IOC_FD_TO_HANDLE:
1725 case XFS_IOC_PATH_TO_HANDLE:
743bb465 1726 case XFS_IOC_PATH_TO_FSHANDLE: {
1727 xfs_fsop_handlereq_t hreq;
df26cfe8 1728
743bb465 1729 if (copy_from_user(&hreq, arg, sizeof(hreq)))
b474c7ae 1730 return -EFAULT;
743bb465 1731 return xfs_find_handle(cmd, &hreq);
1732 }
1733 case XFS_IOC_OPEN_BY_HANDLE: {
1734 xfs_fsop_handlereq_t hreq;
df26cfe8 1735
743bb465 1736 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1737 return -EFAULT;
d296d30a 1738 return xfs_open_by_handle(filp, &hreq);
743bb465 1739 }
df26cfe8 1740 case XFS_IOC_FSSETDM_BY_HANDLE:
d296d30a 1741 return xfs_fssetdm_by_handle(filp, arg);
df26cfe8 1742
743bb465 1743 case XFS_IOC_READLINK_BY_HANDLE: {
1744 xfs_fsop_handlereq_t hreq;
df26cfe8 1745
743bb465 1746 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1747 return -EFAULT;
d296d30a 1748 return xfs_readlink_by_handle(filp, &hreq);
743bb465 1749 }
df26cfe8 1750 case XFS_IOC_ATTRLIST_BY_HANDLE:
d296d30a 1751 return xfs_attrlist_by_handle(filp, arg);
df26cfe8
LM
1752
1753 case XFS_IOC_ATTRMULTI_BY_HANDLE:
d296d30a 1754 return xfs_attrmulti_by_handle(filp, arg);
df26cfe8
LM
1755
1756 case XFS_IOC_SWAPEXT: {
743bb465 1757 struct xfs_swapext sxp;
1758
1759 if (copy_from_user(&sxp, arg, sizeof(xfs_swapext_t)))
b474c7ae 1760 return -EFAULT;
d9457dc0
JK
1761 error = mnt_want_write_file(filp);
1762 if (error)
1763 return error;
a133d952 1764 error = xfs_ioc_swapext(&sxp);
d9457dc0 1765 mnt_drop_write_file(filp);
2451337d 1766 return error;
df26cfe8
LM
1767 }
1768
1769 case XFS_IOC_FSCOUNTS: {
1770 xfs_fsop_counts_t out;
1771
1772 error = xfs_fs_counts(mp, &out);
1773 if (error)
2451337d 1774 return error;
df26cfe8
LM
1775
1776 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1777 return -EFAULT;
df26cfe8
LM
1778 return 0;
1779 }
1780
1781 case XFS_IOC_SET_RESBLKS: {
1782 xfs_fsop_resblks_t inout;
1783 __uint64_t in;
1784
1785 if (!capable(CAP_SYS_ADMIN))
1786 return -EPERM;
1787
d5db0f97 1788 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 1789 return -EROFS;
d5db0f97 1790
df26cfe8 1791 if (copy_from_user(&inout, arg, sizeof(inout)))
b474c7ae 1792 return -EFAULT;
df26cfe8 1793
d9457dc0
JK
1794 error = mnt_want_write_file(filp);
1795 if (error)
1796 return error;
1797
df26cfe8
LM
1798 /* input parameter is passed in resblks field of structure */
1799 in = inout.resblks;
1800 error = xfs_reserve_blocks(mp, &in, &inout);
d9457dc0 1801 mnt_drop_write_file(filp);
df26cfe8 1802 if (error)
2451337d 1803 return error;
df26cfe8
LM
1804
1805 if (copy_to_user(arg, &inout, sizeof(inout)))
b474c7ae 1806 return -EFAULT;
df26cfe8
LM
1807 return 0;
1808 }
1809
1810 case XFS_IOC_GET_RESBLKS: {
1811 xfs_fsop_resblks_t out;
1812
1813 if (!capable(CAP_SYS_ADMIN))
1814 return -EPERM;
1815
1816 error = xfs_reserve_blocks(mp, NULL, &out);
1817 if (error)
2451337d 1818 return error;
df26cfe8
LM
1819
1820 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1821 return -EFAULT;
df26cfe8
LM
1822
1823 return 0;
1824 }
1825
1826 case XFS_IOC_FSGROWFSDATA: {
1827 xfs_growfs_data_t in;
1828
df26cfe8 1829 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1830 return -EFAULT;
df26cfe8 1831
d9457dc0
JK
1832 error = mnt_want_write_file(filp);
1833 if (error)
1834 return error;
df26cfe8 1835 error = xfs_growfs_data(mp, &in);
d9457dc0 1836 mnt_drop_write_file(filp);
2451337d 1837 return error;
df26cfe8
LM
1838 }
1839
1840 case XFS_IOC_FSGROWFSLOG: {
1841 xfs_growfs_log_t in;
1842
df26cfe8 1843 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1844 return -EFAULT;
df26cfe8 1845
d9457dc0
JK
1846 error = mnt_want_write_file(filp);
1847 if (error)
1848 return error;
df26cfe8 1849 error = xfs_growfs_log(mp, &in);
d9457dc0 1850 mnt_drop_write_file(filp);
2451337d 1851 return error;
df26cfe8
LM
1852 }
1853
1854 case XFS_IOC_FSGROWFSRT: {
1855 xfs_growfs_rt_t in;
1856
df26cfe8 1857 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1858 return -EFAULT;
df26cfe8 1859
d9457dc0
JK
1860 error = mnt_want_write_file(filp);
1861 if (error)
1862 return error;
df26cfe8 1863 error = xfs_growfs_rt(mp, &in);
d9457dc0 1864 mnt_drop_write_file(filp);
2451337d 1865 return error;
df26cfe8
LM
1866 }
1867
df26cfe8
LM
1868 case XFS_IOC_GOINGDOWN: {
1869 __uint32_t in;
1870
1871 if (!capable(CAP_SYS_ADMIN))
1872 return -EPERM;
1873
1874 if (get_user(in, (__uint32_t __user *)arg))
b474c7ae 1875 return -EFAULT;
df26cfe8 1876
2451337d 1877 return xfs_fs_goingdown(mp, in);
df26cfe8
LM
1878 }
1879
1880 case XFS_IOC_ERROR_INJECTION: {
1881 xfs_error_injection_t in;
1882
1883 if (!capable(CAP_SYS_ADMIN))
1884 return -EPERM;
1885
1886 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 1887 return -EFAULT;
df26cfe8 1888
2451337d 1889 return xfs_errortag_add(in.errtag, mp);
df26cfe8
LM
1890 }
1891
1892 case XFS_IOC_ERROR_CLEARALL:
1893 if (!capable(CAP_SYS_ADMIN))
1894 return -EPERM;
1895
2451337d 1896 return xfs_errortag_clearall(mp, 1);
df26cfe8 1897
8ca149de 1898 case XFS_IOC_FREE_EOFBLOCKS: {
b9fe5052
DE
1899 struct xfs_fs_eofblocks eofb;
1900 struct xfs_eofblocks keofb;
8ca149de 1901
8c567a7f
DE
1902 if (!capable(CAP_SYS_ADMIN))
1903 return -EPERM;
1904
1905 if (mp->m_flags & XFS_MOUNT_RDONLY)
b474c7ae 1906 return -EROFS;
8c567a7f 1907
8ca149de 1908 if (copy_from_user(&eofb, arg, sizeof(eofb)))
b474c7ae 1909 return -EFAULT;
8ca149de 1910
b9fe5052
DE
1911 error = xfs_fs_eofblocks_from_user(&eofb, &keofb);
1912 if (error)
2451337d 1913 return error;
8ca149de 1914
2451337d 1915 return xfs_icache_free_eofblocks(mp, &keofb);
8ca149de
BF
1916 }
1917
df26cfe8
LM
1918 default:
1919 return -ENOTTY;
1920 }
1921}
This page took 0.82962 seconds and 5 git commands to generate.