]> Git Repo - linux.git/blame - fs/xfs/xfs_ioctl.c
Merge tag 'mvebu-arm-5.19-1' of git://git.kernel.org/pub/scm/linux/kernel/git/gclemen...
[linux.git] / fs / xfs / xfs_ioctl.c
CommitLineData
0b61f8a4 1// SPDX-License-Identifier: GPL-2.0
1da177e4 2/*
7b718769
NS
3 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
4 * All Rights Reserved.
1da177e4 5 */
1da177e4 6#include "xfs.h"
1da177e4 7#include "xfs_fs.h"
70a9883c 8#include "xfs_shared.h"
239880ef
DC
9#include "xfs_format.h"
10#include "xfs_log_format.h"
11#include "xfs_trans_resv.h"
1da177e4 12#include "xfs_mount.h"
1da177e4 13#include "xfs_inode.h"
1da177e4 14#include "xfs_rtalloc.h"
2810bd68 15#include "xfs_iwalk.h"
1da177e4 16#include "xfs_itable.h"
a844f451 17#include "xfs_error.h"
1da177e4 18#include "xfs_attr.h"
a844f451 19#include "xfs_bmap.h"
68988114 20#include "xfs_bmap_util.h"
1da177e4 21#include "xfs_fsops.h"
a46db608 22#include "xfs_discard.h"
25fe55e8 23#include "xfs_quota.h"
d296d30a 24#include "xfs_export.h"
0b1b213f 25#include "xfs_trace.h"
8ca149de 26#include "xfs_icache.h"
a4fbe6ab 27#include "xfs_trans.h"
47e1bf64 28#include "xfs_acl.h"
e89c0413
DW
29#include "xfs_btree.h"
30#include <linux/fsmap.h>
31#include "xfs_fsmap.h"
36fd6e86 32#include "scrub/xfs_scrub.h"
c368ebcd 33#include "xfs_sb.h"
7cd5006b 34#include "xfs_ag.h"
c23232d4 35#include "xfs_health.h"
7a42c70e 36#include "xfs_reflink.h"
5f213ddb 37#include "xfs_ioctl.h"
a2544622
CH
38#include "xfs_da_format.h"
39#include "xfs_da_btree.h"
1da177e4 40
1da177e4
LT
41#include <linux/mount.h>
42#include <linux/namei.h>
9fefd5db 43#include <linux/fileattr.h>
1da177e4
LT
44
45/*
46 * xfs_find_handle maps from userspace xfs_fsop_handlereq structure to
47 * a file or fs handle.
48 *
49 * XFS_IOC_PATH_TO_FSHANDLE
50 * returns fs handle for a mount point or path within that mount point
51 * XFS_IOC_FD_TO_HANDLE
52 * returns full handle for a FD opened in user space
53 * XFS_IOC_PATH_TO_HANDLE
54 * returns full handle for a path
55 */
d5547f9f 56int
1da177e4
LT
57xfs_find_handle(
58 unsigned int cmd,
743bb465 59 xfs_fsop_handlereq_t *hreq)
1da177e4
LT
60{
61 int hsize;
62 xfs_handle_t handle;
1da177e4 63 struct inode *inode;
a30b0367 64 struct fd f = {NULL};
4346cdd4 65 struct path path;
2903ff01 66 int error;
4346cdd4 67 struct xfs_inode *ip;
1da177e4 68
4346cdd4 69 if (cmd == XFS_IOC_FD_TO_HANDLE) {
2903ff01
AV
70 f = fdget(hreq->fd);
71 if (!f.file)
4346cdd4 72 return -EBADF;
496ad9aa 73 inode = file_inode(f.file);
4346cdd4 74 } else {
ce6595a2 75 error = user_path_at(AT_FDCWD, hreq->path, 0, &path);
4346cdd4
CH
76 if (error)
77 return error;
2b0143b5 78 inode = d_inode(path.dentry);
1da177e4 79 }
4346cdd4
CH
80 ip = XFS_I(inode);
81
82 /*
83 * We can only generate handles for inodes residing on a XFS filesystem,
84 * and only for regular files, directories or symbolic links.
85 */
86 error = -EINVAL;
87 if (inode->i_sb->s_magic != XFS_SB_MAGIC)
88 goto out_put;
89
90 error = -EBADF;
91 if (!S_ISREG(inode->i_mode) &&
92 !S_ISDIR(inode->i_mode) &&
93 !S_ISLNK(inode->i_mode))
94 goto out_put;
95
96
97 memcpy(&handle.ha_fsid, ip->i_mount->m_fixedfsid, sizeof(xfs_fsid_t));
98
99 if (cmd == XFS_IOC_PATH_TO_FSHANDLE) {
100 /*
101 * This handle only contains an fsid, zero the rest.
102 */
103 memset(&handle.ha_fid, 0, sizeof(handle.ha_fid));
104 hsize = sizeof(xfs_fsid_t);
105 } else {
c6143911
CH
106 handle.ha_fid.fid_len = sizeof(xfs_fid_t) -
107 sizeof(handle.ha_fid.fid_len);
108 handle.ha_fid.fid_pad = 0;
9e9a2674 109 handle.ha_fid.fid_gen = inode->i_generation;
c6143911 110 handle.ha_fid.fid_ino = ip->i_ino;
3398a400 111 hsize = sizeof(xfs_handle_t);
1da177e4
LT
112 }
113
4346cdd4 114 error = -EFAULT;
743bb465 115 if (copy_to_user(hreq->ohandle, &handle, hsize) ||
4346cdd4
CH
116 copy_to_user(hreq->ohandlen, &hsize, sizeof(__s32)))
117 goto out_put;
1da177e4 118
4346cdd4
CH
119 error = 0;
120
121 out_put:
122 if (cmd == XFS_IOC_FD_TO_HANDLE)
2903ff01 123 fdput(f);
4346cdd4
CH
124 else
125 path_put(&path);
126 return error;
1da177e4
LT
127}
128
1da177e4 129/*
d296d30a
CH
130 * No need to do permission checks on the various pathname components
131 * as the handle operations are privileged.
1da177e4
LT
132 */
133STATIC int
d296d30a
CH
134xfs_handle_acceptable(
135 void *context,
136 struct dentry *dentry)
137{
138 return 1;
139}
140
141/*
142 * Convert userspace handle data into a dentry.
143 */
144struct dentry *
145xfs_handle_to_dentry(
146 struct file *parfilp,
147 void __user *uhandle,
148 u32 hlen)
1da177e4 149{
1da177e4 150 xfs_handle_t handle;
d296d30a 151 struct xfs_fid64 fid;
1da177e4
LT
152
153 /*
154 * Only allow handle opens under a directory.
155 */
496ad9aa 156 if (!S_ISDIR(file_inode(parfilp)->i_mode))
d296d30a
CH
157 return ERR_PTR(-ENOTDIR);
158
159 if (hlen != sizeof(xfs_handle_t))
160 return ERR_PTR(-EINVAL);
161 if (copy_from_user(&handle, uhandle, hlen))
162 return ERR_PTR(-EFAULT);
163 if (handle.ha_fid.fid_len !=
164 sizeof(handle.ha_fid) - sizeof(handle.ha_fid.fid_len))
165 return ERR_PTR(-EINVAL);
166
167 memset(&fid, 0, sizeof(struct fid));
168 fid.ino = handle.ha_fid.fid_ino;
169 fid.gen = handle.ha_fid.fid_gen;
170
171 return exportfs_decode_fh(parfilp->f_path.mnt, (struct fid *)&fid, 3,
172 FILEID_INO32_GEN | XFS_FILEID_TYPE_64FLAG,
173 xfs_handle_acceptable, NULL);
174}
1da177e4 175
d296d30a
CH
176STATIC struct dentry *
177xfs_handlereq_to_dentry(
178 struct file *parfilp,
179 xfs_fsop_handlereq_t *hreq)
180{
181 return xfs_handle_to_dentry(parfilp, hreq->ihandle, hreq->ihandlen);
1da177e4
LT
182}
183
d5547f9f 184int
1da177e4 185xfs_open_by_handle(
1da177e4 186 struct file *parfilp,
d296d30a 187 xfs_fsop_handlereq_t *hreq)
1da177e4 188{
745ca247 189 const struct cred *cred = current_cred();
1da177e4 190 int error;
d296d30a 191 int fd;
1da177e4
LT
192 int permflag;
193 struct file *filp;
194 struct inode *inode;
195 struct dentry *dentry;
1a1d7724 196 fmode_t fmode;
765927b2 197 struct path path;
1da177e4
LT
198
199 if (!capable(CAP_SYS_ADMIN))
b474c7ae 200 return -EPERM;
1da177e4 201
d296d30a
CH
202 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
203 if (IS_ERR(dentry))
204 return PTR_ERR(dentry);
2b0143b5 205 inode = d_inode(dentry);
1da177e4
LT
206
207 /* Restrict xfs_open_by_handle to directories & regular files. */
208 if (!(S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode))) {
b474c7ae 209 error = -EPERM;
d296d30a 210 goto out_dput;
1da177e4
LT
211 }
212
213#if BITS_PER_LONG != 32
743bb465 214 hreq->oflags |= O_LARGEFILE;
1da177e4 215#endif
d296d30a 216
743bb465 217 permflag = hreq->oflags;
1a1d7724 218 fmode = OPEN_FMODE(permflag);
1da177e4 219 if ((!(permflag & O_APPEND) || (permflag & O_TRUNC)) &&
1a1d7724 220 (fmode & FMODE_WRITE) && IS_APPEND(inode)) {
b474c7ae 221 error = -EPERM;
d296d30a 222 goto out_dput;
1da177e4
LT
223 }
224
1a1d7724 225 if ((fmode & FMODE_WRITE) && IS_IMMUTABLE(inode)) {
337684a1 226 error = -EPERM;
d296d30a 227 goto out_dput;
1da177e4
LT
228 }
229
230 /* Can't write directories. */
1a1d7724 231 if (S_ISDIR(inode->i_mode) && (fmode & FMODE_WRITE)) {
b474c7ae 232 error = -EISDIR;
d296d30a 233 goto out_dput;
1da177e4
LT
234 }
235
862a6293 236 fd = get_unused_fd_flags(0);
d296d30a
CH
237 if (fd < 0) {
238 error = fd;
239 goto out_dput;
1da177e4
LT
240 }
241
765927b2
AV
242 path.mnt = parfilp->f_path.mnt;
243 path.dentry = dentry;
244 filp = dentry_open(&path, hreq->oflags, cred);
245 dput(dentry);
1da177e4 246 if (IS_ERR(filp)) {
d296d30a
CH
247 put_unused_fd(fd);
248 return PTR_ERR(filp);
1da177e4 249 }
4d4be482 250
03209378 251 if (S_ISREG(inode->i_mode)) {
2e2e7bb1 252 filp->f_flags |= O_NOATIME;
4d4be482 253 filp->f_mode |= FMODE_NOCMTIME;
2e2e7bb1 254 }
1da177e4 255
d296d30a
CH
256 fd_install(fd, filp);
257 return fd;
258
259 out_dput:
260 dput(dentry);
261 return error;
1da177e4
LT
262}
263
d5547f9f 264int
1da177e4 265xfs_readlink_by_handle(
d296d30a
CH
266 struct file *parfilp,
267 xfs_fsop_handlereq_t *hreq)
1da177e4 268{
d296d30a 269 struct dentry *dentry;
1da177e4 270 __u32 olen;
804c83c3 271 int error;
1da177e4
LT
272
273 if (!capable(CAP_SYS_ADMIN))
b474c7ae 274 return -EPERM;
1da177e4 275
d296d30a
CH
276 dentry = xfs_handlereq_to_dentry(parfilp, hreq);
277 if (IS_ERR(dentry))
278 return PTR_ERR(dentry);
1da177e4
LT
279
280 /* Restrict this handle operation to symlinks only. */
fd4a0edf 281 if (!d_is_symlink(dentry)) {
b474c7ae 282 error = -EINVAL;
d296d30a 283 goto out_dput;
1da177e4
LT
284 }
285
743bb465 286 if (copy_from_user(&olen, hreq->ohandlen, sizeof(__u32))) {
b474c7ae 287 error = -EFAULT;
d296d30a 288 goto out_dput;
1da177e4 289 }
1da177e4 290
fd4a0edf 291 error = vfs_readlink(dentry, hreq->ohandle, olen);
67fcaa73 292
d296d30a
CH
293 out_dput:
294 dput(dentry);
804c83c3 295 return error;
1da177e4
LT
296}
297
3e7a7799
CH
298/*
299 * Format an attribute and copy it out to the user's buffer.
300 * Take care to check values and protect against them changing later,
301 * we may be reading them directly out of a user buffer.
302 */
303static void
304xfs_ioc_attr_put_listent(
305 struct xfs_attr_list_context *context,
306 int flags,
307 unsigned char *name,
308 int namelen,
309 int valuelen)
310{
311 struct xfs_attrlist *alist = context->buffer;
312 struct xfs_attrlist_ent *aep;
313 int arraytop;
314
315 ASSERT(!context->seen_enough);
316 ASSERT(context->count >= 0);
317 ASSERT(context->count < (ATTR_MAX_VALUELEN/8));
318 ASSERT(context->firstu >= sizeof(*alist));
319 ASSERT(context->firstu <= context->bufsize);
320
321 /*
322 * Only list entries in the right namespace.
323 */
d5f0f49a 324 if (context->attr_filter != (flags & XFS_ATTR_NSP_ONDISK_MASK))
3e7a7799
CH
325 return;
326
327 arraytop = sizeof(*alist) +
328 context->count * sizeof(alist->al_offset[0]);
329
330 /* decrement by the actual bytes used by the attr */
331 context->firstu -= round_up(offsetof(struct xfs_attrlist_ent, a_name) +
332 namelen + 1, sizeof(uint32_t));
333 if (context->firstu < arraytop) {
334 trace_xfs_attr_list_full(context);
335 alist->al_more = 1;
336 context->seen_enough = 1;
337 return;
338 }
339
340 aep = context->buffer + context->firstu;
341 aep->a_valuelen = valuelen;
342 memcpy(aep->a_name, name, namelen);
343 aep->a_name[namelen] = 0;
344 alist->al_offset[context->count++] = context->firstu;
345 alist->al_count = context->count;
346 trace_xfs_attr_list_add(context);
347}
348
d5f0f49a
CH
349static unsigned int
350xfs_attr_filter(
351 u32 ioc_flags)
352{
353 if (ioc_flags & XFS_IOC_ATTR_ROOT)
354 return XFS_ATTR_ROOT;
355 if (ioc_flags & XFS_IOC_ATTR_SECURE)
356 return XFS_ATTR_SECURE;
357 return 0;
358}
359
360static unsigned int
361xfs_attr_flags(
362 u32 ioc_flags)
363{
364 if (ioc_flags & XFS_IOC_ATTR_CREATE)
365 return XATTR_CREATE;
366 if (ioc_flags & XFS_IOC_ATTR_REPLACE)
367 return XATTR_REPLACE;
368 return 0;
369}
370
3e7a7799
CH
371int
372xfs_ioc_attr_list(
373 struct xfs_inode *dp,
eb241c74 374 void __user *ubuf,
6ed6356b 375 size_t bufsize,
3e7a7799 376 int flags,
53ac39fd 377 struct xfs_attrlist_cursor __user *ucursor)
3e7a7799 378{
e3a19cde 379 struct xfs_attr_list_context context = { };
3e7a7799 380 struct xfs_attrlist *alist;
eb241c74 381 void *buffer;
3e7a7799
CH
382 int error;
383
f6046319
CH
384 if (bufsize < sizeof(struct xfs_attrlist) ||
385 bufsize > XFS_XATTR_LIST_MAX)
386 return -EINVAL;
387
388 /*
389 * Reject flags, only allow namespaces.
390 */
d5f0f49a 391 if (flags & ~(XFS_IOC_ATTR_ROOT | XFS_IOC_ATTR_SECURE))
f6046319 392 return -EINVAL;
d5f0f49a 393 if (flags == (XFS_IOC_ATTR_ROOT | XFS_IOC_ATTR_SECURE))
f6046319
CH
394 return -EINVAL;
395
3e7a7799
CH
396 /*
397 * Validate the cursor.
398 */
e3a19cde 399 if (copy_from_user(&context.cursor, ucursor, sizeof(context.cursor)))
53ac39fd 400 return -EFAULT;
e3a19cde 401 if (context.cursor.pad1 || context.cursor.pad2)
3e7a7799 402 return -EINVAL;
e3a19cde
CH
403 if (!context.cursor.initted &&
404 (context.cursor.hashval || context.cursor.blkno ||
405 context.cursor.offset))
3e7a7799
CH
406 return -EINVAL;
407
8ca79df8 408 buffer = kvzalloc(bufsize, GFP_KERNEL);
eb241c74
CH
409 if (!buffer)
410 return -ENOMEM;
3e7a7799
CH
411
412 /*
413 * Initialize the output buffer.
414 */
3e7a7799 415 context.dp = dp;
3e7a7799 416 context.resynch = 1;
d5f0f49a 417 context.attr_filter = xfs_attr_filter(flags);
3e7a7799 418 context.buffer = buffer;
f311d771 419 context.bufsize = round_down(bufsize, sizeof(uint32_t));
3e7a7799
CH
420 context.firstu = context.bufsize;
421 context.put_listent = xfs_ioc_attr_put_listent;
422
423 alist = context.buffer;
424 alist->al_count = 0;
425 alist->al_more = 0;
426 alist->al_offset[0] = context.bufsize;
427
17e1dd83 428 error = xfs_attr_list(&context);
eb241c74
CH
429 if (error)
430 goto out_free;
431
53ac39fd 432 if (copy_to_user(ubuf, buffer, bufsize) ||
e3a19cde 433 copy_to_user(ucursor, &context.cursor, sizeof(context.cursor)))
eb241c74
CH
434 error = -EFAULT;
435out_free:
436 kmem_free(buffer);
3e7a7799
CH
437 return error;
438}
439
1da177e4
LT
440STATIC int
441xfs_attrlist_by_handle(
d296d30a 442 struct file *parfilp,
53ac39fd 443 struct xfs_fsop_attrlist_handlereq __user *p)
1da177e4 444{
53ac39fd 445 struct xfs_fsop_attrlist_handlereq al_hreq;
d296d30a 446 struct dentry *dentry;
53ac39fd 447 int error = -ENOMEM;
1da177e4
LT
448
449 if (!capable(CAP_SYS_ADMIN))
b474c7ae 450 return -EPERM;
53ac39fd 451 if (copy_from_user(&al_hreq, p, sizeof(al_hreq)))
b474c7ae 452 return -EFAULT;
90ad58a8 453
d296d30a
CH
454 dentry = xfs_handlereq_to_dentry(parfilp, &al_hreq.hreq);
455 if (IS_ERR(dentry))
456 return PTR_ERR(dentry);
1da177e4 457
eb241c74 458 error = xfs_ioc_attr_list(XFS_I(d_inode(dentry)), al_hreq.buffer,
53ac39fd 459 al_hreq.buflen, al_hreq.flags, &p->pos);
d296d30a
CH
460 dput(dentry);
461 return error;
1da177e4
LT
462}
463
d0ce6439 464static int
1da177e4 465xfs_attrmulti_attr_get(
739bfb2a 466 struct inode *inode,
a9273ca5
DC
467 unsigned char *name,
468 unsigned char __user *ubuf,
c8ce540d
DW
469 uint32_t *len,
470 uint32_t flags)
1da177e4 471{
e5171d7e
CH
472 struct xfs_da_args args = {
473 .dp = XFS_I(inode),
d5f0f49a
CH
474 .attr_filter = xfs_attr_filter(flags),
475 .attr_flags = xfs_attr_flags(flags),
e5171d7e
CH
476 .name = name,
477 .namelen = strlen(name),
478 .valuelen = *len,
479 };
480 int error;
e8b0ebaa 481
51fcbfe7 482 if (*len > XFS_XATTR_SIZE_MAX)
2451337d 483 return -EINVAL;
e5171d7e 484
e5171d7e 485 error = xfs_attr_get(&args);
1da177e4
LT
486 if (error)
487 goto out_kfree;
488
e5171d7e
CH
489 *len = args.valuelen;
490 if (copy_to_user(ubuf, args.value, args.valuelen))
2451337d 491 error = -EFAULT;
1da177e4 492
fdd3ccee 493out_kfree:
e5171d7e 494 kmem_free(args.value);
1da177e4
LT
495 return error;
496}
497
d0ce6439 498static int
1da177e4 499xfs_attrmulti_attr_set(
739bfb2a 500 struct inode *inode,
a9273ca5
DC
501 unsigned char *name,
502 const unsigned char __user *ubuf,
c8ce540d
DW
503 uint32_t len,
504 uint32_t flags)
1da177e4 505{
a2544622
CH
506 struct xfs_da_args args = {
507 .dp = XFS_I(inode),
d5f0f49a
CH
508 .attr_filter = xfs_attr_filter(flags),
509 .attr_flags = xfs_attr_flags(flags),
a2544622
CH
510 .name = name,
511 .namelen = strlen(name),
512 };
09cb22d2 513 int error;
1da177e4 514
739bfb2a 515 if (IS_IMMUTABLE(inode) || IS_APPEND(inode))
2451337d 516 return -EPERM;
1da177e4 517
6cc4f4ff
CH
518 if (ubuf) {
519 if (len > XFS_XATTR_SIZE_MAX)
520 return -EINVAL;
a2544622
CH
521 args.value = memdup_user(ubuf, len);
522 if (IS_ERR(args.value))
523 return PTR_ERR(args.value);
524 args.valuelen = len;
6cc4f4ff 525 }
e8b0ebaa 526
a2544622 527 error = xfs_attr_set(&args);
d5f0f49a 528 if (!error && (flags & XFS_IOC_ATTR_ROOT))
5a3930e2 529 xfs_forget_acl(inode, name);
a2544622 530 kfree(args.value);
09cb22d2 531 return error;
1da177e4
LT
532}
533
d0ce6439
CH
534int
535xfs_ioc_attrmulti_one(
536 struct file *parfilp,
537 struct inode *inode,
538 uint32_t opcode,
539 void __user *uname,
540 void __user *value,
541 uint32_t *len,
542 uint32_t flags)
543{
544 unsigned char *name;
545 int error;
546
d5f0f49a 547 if ((flags & XFS_IOC_ATTR_ROOT) && (flags & XFS_IOC_ATTR_SECURE))
d0ce6439 548 return -EINVAL;
d0ce6439
CH
549
550 name = strndup_user(uname, MAXNAMELEN);
551 if (IS_ERR(name))
552 return PTR_ERR(name);
553
554 switch (opcode) {
555 case ATTR_OP_GET:
556 error = xfs_attrmulti_attr_get(inode, name, value, len, flags);
557 break;
558 case ATTR_OP_REMOVE:
559 value = NULL;
560 *len = 0;
53004ee7 561 fallthrough;
d0ce6439
CH
562 case ATTR_OP_SET:
563 error = mnt_want_write_file(parfilp);
564 if (error)
565 break;
566 error = xfs_attrmulti_attr_set(inode, name, value, *len, flags);
567 mnt_drop_write_file(parfilp);
568 break;
569 default:
570 error = -EINVAL;
571 break;
572 }
573
574 kfree(name);
575 return error;
576}
577
1da177e4
LT
578STATIC int
579xfs_attrmulti_by_handle(
42a74f20 580 struct file *parfilp,
d296d30a 581 void __user *arg)
1da177e4
LT
582{
583 int error;
584 xfs_attr_multiop_t *ops;
585 xfs_fsop_attrmulti_handlereq_t am_hreq;
d296d30a 586 struct dentry *dentry;
1da177e4 587 unsigned int i, size;
1da177e4
LT
588
589 if (!capable(CAP_SYS_ADMIN))
b474c7ae 590 return -EPERM;
1da177e4 591 if (copy_from_user(&am_hreq, arg, sizeof(xfs_fsop_attrmulti_handlereq_t)))
b474c7ae 592 return -EFAULT;
1da177e4 593
fda168c2
ZW
594 /* overflow check */
595 if (am_hreq.opcount >= INT_MAX / sizeof(xfs_attr_multiop_t))
596 return -E2BIG;
597
d296d30a
CH
598 dentry = xfs_handlereq_to_dentry(parfilp, &am_hreq.hreq);
599 if (IS_ERR(dentry))
600 return PTR_ERR(dentry);
1da177e4 601
2451337d 602 error = -E2BIG;
e182f57a 603 size = am_hreq.opcount * sizeof(xfs_attr_multiop_t);
1da177e4 604 if (!size || size > 16 * PAGE_SIZE)
d296d30a 605 goto out_dput;
1da177e4 606
0e639bde
LZ
607 ops = memdup_user(am_hreq.ops, size);
608 if (IS_ERR(ops)) {
2451337d 609 error = PTR_ERR(ops);
d296d30a 610 goto out_dput;
0e639bde 611 }
1da177e4 612
1da177e4
LT
613 error = 0;
614 for (i = 0; i < am_hreq.opcount; i++) {
d0ce6439
CH
615 ops[i].am_error = xfs_ioc_attrmulti_one(parfilp,
616 d_inode(dentry), ops[i].am_opcode,
617 ops[i].am_attrname, ops[i].am_attrvalue,
618 &ops[i].am_length, ops[i].am_flags);
1da177e4
LT
619 }
620
621 if (copy_to_user(am_hreq.ops, ops, size))
2451337d 622 error = -EFAULT;
1da177e4 623
1da177e4 624 kfree(ops);
d296d30a
CH
625 out_dput:
626 dput(dentry);
2451337d 627 return error;
1da177e4
LT
628}
629
2810bd68
DW
630/* Return 0 on success or positive error */
631int
8bfe9d18 632xfs_fsbulkstat_one_fmt(
7035f972
DW
633 struct xfs_ibulk *breq,
634 const struct xfs_bulkstat *bstat)
2810bd68 635{
7035f972
DW
636 struct xfs_bstat bs1;
637
638 xfs_bulkstat_to_bstat(breq->mp, &bs1, bstat);
639 if (copy_to_user(breq->ubuffer, &bs1, sizeof(bs1)))
2810bd68
DW
640 return -EFAULT;
641 return xfs_ibulk_advance(breq, sizeof(struct xfs_bstat));
642}
643
677717fb 644int
8bfe9d18 645xfs_fsinumbers_fmt(
5f19c7fc
DW
646 struct xfs_ibulk *breq,
647 const struct xfs_inumbers *igrp)
677717fb 648{
5f19c7fc
DW
649 struct xfs_inogrp ig1;
650
651 xfs_inumbers_to_inogrp(&ig1, igrp);
652 if (copy_to_user(breq->ubuffer, &ig1, sizeof(struct xfs_inogrp)))
677717fb
DW
653 return -EFAULT;
654 return xfs_ibulk_advance(breq, sizeof(struct xfs_inogrp));
655}
656
1da177e4 657STATIC int
8bfe9d18 658xfs_ioc_fsbulkstat(
f736d93d 659 struct file *file,
1da177e4
LT
660 unsigned int cmd,
661 void __user *arg)
662{
f736d93d 663 struct xfs_mount *mp = XFS_I(file_inode(file))->i_mount;
2810bd68
DW
664 struct xfs_fsop_bulkreq bulkreq;
665 struct xfs_ibulk breq = {
666 .mp = mp,
f736d93d 667 .mnt_userns = file_mnt_user_ns(file),
2810bd68
DW
668 .ocount = 0,
669 };
670 xfs_ino_t lastino;
1da177e4
LT
671 int error;
672
673 /* done = 1 if there are more stats to get and if bulkstat */
674 /* should be called again (unused here, but used in dmapi) */
675
676 if (!capable(CAP_SYS_ADMIN))
677 return -EPERM;
678
75c8c50f 679 if (xfs_is_shutdown(mp))
b474c7ae 680 return -EIO;
1da177e4 681
6f71fb68 682 if (copy_from_user(&bulkreq, arg, sizeof(struct xfs_fsop_bulkreq)))
b474c7ae 683 return -EFAULT;
1da177e4 684
2810bd68 685 if (copy_from_user(&lastino, bulkreq.lastip, sizeof(__s64)))
b474c7ae 686 return -EFAULT;
1da177e4 687
2810bd68 688 if (bulkreq.icount <= 0)
b474c7ae 689 return -EINVAL;
1da177e4 690
cd57e594 691 if (bulkreq.ubuffer == NULL)
b474c7ae 692 return -EINVAL;
cd57e594 693
2810bd68
DW
694 breq.ubuffer = bulkreq.ubuffer;
695 breq.icount = bulkreq.icount;
696
697 /*
698 * FSBULKSTAT_SINGLE expects that *lastip contains the inode number
699 * that we want to stat. However, FSINUMBERS and FSBULKSTAT expect
700 * that *lastip contains either zero or the number of the last inode to
701 * be examined by the previous call and return results starting with
702 * the next inode after that. The new bulk request back end functions
703 * take the inode to start with, so we have to compute the startino
704 * parameter from lastino to maintain correct function. lastino == 0
705 * is a special case because it has traditionally meant "first inode
706 * in filesystem".
707 */
708 if (cmd == XFS_IOC_FSINUMBERS) {
677717fb 709 breq.startino = lastino ? lastino + 1 : 0;
8bfe9d18 710 error = xfs_inumbers(&breq, xfs_fsinumbers_fmt);
677717fb 711 lastino = breq.startino - 1;
2810bd68
DW
712 } else if (cmd == XFS_IOC_FSBULKSTAT_SINGLE) {
713 breq.startino = lastino;
714 breq.icount = 1;
8bfe9d18 715 error = xfs_bulkstat_one(&breq, xfs_fsbulkstat_one_fmt);
2810bd68
DW
716 } else { /* XFS_IOC_FSBULKSTAT */
717 breq.startino = lastino ? lastino + 1 : 0;
8bfe9d18 718 error = xfs_bulkstat(&breq, xfs_fsbulkstat_one_fmt);
2810bd68
DW
719 lastino = breq.startino - 1;
720 }
1da177e4
LT
721
722 if (error)
2451337d 723 return error;
1da177e4 724
f16fe3ec 725 if (bulkreq.lastip != NULL &&
2810bd68 726 copy_to_user(bulkreq.lastip, &lastino, sizeof(xfs_ino_t)))
f16fe3ec 727 return -EFAULT;
1da177e4 728
f16fe3ec 729 if (bulkreq.ocount != NULL &&
2810bd68 730 copy_to_user(bulkreq.ocount, &breq.ocount, sizeof(__s32)))
f16fe3ec 731 return -EFAULT;
1da177e4
LT
732
733 return 0;
734}
735
0448b6f4
DW
736/* Return 0 on success or positive error */
737static int
738xfs_bulkstat_fmt(
739 struct xfs_ibulk *breq,
740 const struct xfs_bulkstat *bstat)
741{
742 if (copy_to_user(breq->ubuffer, bstat, sizeof(struct xfs_bulkstat)))
743 return -EFAULT;
744 return xfs_ibulk_advance(breq, sizeof(struct xfs_bulkstat));
745}
746
747/*
748 * Check the incoming bulk request @hdr from userspace and initialize the
749 * internal @breq bulk request appropriately. Returns 0 if the bulk request
e7ee96df 750 * should proceed; -ECANCELED if there's nothing to do; or the usual
0448b6f4
DW
751 * negative error code.
752 */
753static int
754xfs_bulk_ireq_setup(
755 struct xfs_mount *mp,
756 struct xfs_bulk_ireq *hdr,
757 struct xfs_ibulk *breq,
758 void __user *ubuffer)
759{
760 if (hdr->icount == 0 ||
761 (hdr->flags & ~XFS_BULK_IREQ_FLAGS_ALL) ||
0448b6f4
DW
762 memchr_inv(hdr->reserved, 0, sizeof(hdr->reserved)))
763 return -EINVAL;
764
765 breq->startino = hdr->ino;
766 breq->ubuffer = ubuffer;
767 breq->icount = hdr->icount;
768 breq->ocount = 0;
13d59a2a
DW
769 breq->flags = 0;
770
bf3cb394
DW
771 /*
772 * The @ino parameter is a special value, so we must look it up here.
773 * We're not allowed to have IREQ_AGNO, and we only return one inode
774 * worth of data.
775 */
776 if (hdr->flags & XFS_BULK_IREQ_SPECIAL) {
777 if (hdr->flags & XFS_BULK_IREQ_AGNO)
778 return -EINVAL;
779
780 switch (hdr->ino) {
781 case XFS_BULK_IREQ_SPECIAL_ROOT:
782 hdr->ino = mp->m_sb.sb_rootino;
783 break;
784 default:
785 return -EINVAL;
786 }
787 breq->icount = 1;
1da177e4
LT
788 }
789
13d59a2a
DW
790 /*
791 * The IREQ_AGNO flag means that we only want results from a given AG.
792 * If @hdr->ino is zero, we start iterating in that AG. If @hdr->ino is
793 * beyond the specified AG then we return no results.
794 */
795 if (hdr->flags & XFS_BULK_IREQ_AGNO) {
796 if (hdr->agno >= mp->m_sb.sb_agcount)
797 return -EINVAL;
798
799 if (breq->startino == 0)
800 breq->startino = XFS_AGINO_TO_INO(mp, hdr->agno, 0);
801 else if (XFS_INO_TO_AGNO(mp, breq->startino) < hdr->agno)
802 return -EINVAL;
803
804 breq->flags |= XFS_IBULK_SAME_AG;
805
806 /* Asking for an inode past the end of the AG? We're done! */
807 if (XFS_INO_TO_AGNO(mp, breq->startino) > hdr->agno)
e7ee96df 808 return -ECANCELED;
13d59a2a
DW
809 } else if (hdr->agno)
810 return -EINVAL;
0448b6f4
DW
811
812 /* Asking for an inode past the end of the FS? We're done! */
813 if (XFS_INO_TO_AGNO(mp, breq->startino) >= mp->m_sb.sb_agcount)
e7ee96df 814 return -ECANCELED;
0448b6f4
DW
815
816 return 0;
817}
818
819/*
820 * Update the userspace bulk request @hdr to reflect the end state of the
821 * internal bulk request @breq.
822 */
823static void
824xfs_bulk_ireq_teardown(
825 struct xfs_bulk_ireq *hdr,
826 struct xfs_ibulk *breq)
827{
828 hdr->ino = breq->startino;
829 hdr->ocount = breq->ocount;
830}
831
832/* Handle the v5 bulkstat ioctl. */
833STATIC int
834xfs_ioc_bulkstat(
f736d93d 835 struct file *file,
0448b6f4
DW
836 unsigned int cmd,
837 struct xfs_bulkstat_req __user *arg)
838{
f736d93d 839 struct xfs_mount *mp = XFS_I(file_inode(file))->i_mount;
0448b6f4
DW
840 struct xfs_bulk_ireq hdr;
841 struct xfs_ibulk breq = {
842 .mp = mp,
f736d93d 843 .mnt_userns = file_mnt_user_ns(file),
0448b6f4
DW
844 };
845 int error;
846
847 if (!capable(CAP_SYS_ADMIN))
848 return -EPERM;
849
75c8c50f 850 if (xfs_is_shutdown(mp))
0448b6f4
DW
851 return -EIO;
852
853 if (copy_from_user(&hdr, &arg->hdr, sizeof(hdr)))
854 return -EFAULT;
855
856 error = xfs_bulk_ireq_setup(mp, &hdr, &breq, arg->bulkstat);
e7ee96df 857 if (error == -ECANCELED)
0448b6f4
DW
858 goto out_teardown;
859 if (error < 0)
860 return error;
861
862 error = xfs_bulkstat(&breq, xfs_bulkstat_fmt);
863 if (error)
864 return error;
865
866out_teardown:
867 xfs_bulk_ireq_teardown(&hdr, &breq);
868 if (copy_to_user(&arg->hdr, &hdr, sizeof(hdr)))
869 return -EFAULT;
870
871 return 0;
872}
873
fba9760a
DW
874STATIC int
875xfs_inumbers_fmt(
876 struct xfs_ibulk *breq,
877 const struct xfs_inumbers *igrp)
878{
879 if (copy_to_user(breq->ubuffer, igrp, sizeof(struct xfs_inumbers)))
880 return -EFAULT;
881 return xfs_ibulk_advance(breq, sizeof(struct xfs_inumbers));
882}
883
884/* Handle the v5 inumbers ioctl. */
885STATIC int
886xfs_ioc_inumbers(
887 struct xfs_mount *mp,
888 unsigned int cmd,
889 struct xfs_inumbers_req __user *arg)
890{
891 struct xfs_bulk_ireq hdr;
892 struct xfs_ibulk breq = {
893 .mp = mp,
894 };
895 int error;
896
897 if (!capable(CAP_SYS_ADMIN))
898 return -EPERM;
899
75c8c50f 900 if (xfs_is_shutdown(mp))
fba9760a
DW
901 return -EIO;
902
903 if (copy_from_user(&hdr, &arg->hdr, sizeof(hdr)))
904 return -EFAULT;
905
906 error = xfs_bulk_ireq_setup(mp, &hdr, &breq, arg->inumbers);
e7ee96df 907 if (error == -ECANCELED)
fba9760a
DW
908 goto out_teardown;
909 if (error < 0)
910 return error;
911
912 error = xfs_inumbers(&breq, xfs_inumbers_fmt);
913 if (error)
914 return error;
915
916out_teardown:
917 xfs_bulk_ireq_teardown(&hdr, &breq);
918 if (copy_to_user(&arg->hdr, &hdr, sizeof(hdr)))
919 return -EFAULT;
920
1da177e4
LT
921 return 0;
922}
923
1da177e4
LT
924STATIC int
925xfs_ioc_fsgeometry(
1b6d968d
DC
926 struct xfs_mount *mp,
927 void __user *arg,
928 int struct_version)
1da177e4 929{
1b6d968d
DC
930 struct xfs_fsop_geom fsgeo;
931 size_t len;
1da177e4 932
03288b19 933 xfs_fs_geometry(mp, &fsgeo, struct_version);
1da177e4 934
1b6d968d
DC
935 if (struct_version <= 3)
936 len = sizeof(struct xfs_fsop_geom_v1);
937 else if (struct_version == 4)
938 len = sizeof(struct xfs_fsop_geom_v4);
c23232d4
DW
939 else {
940 xfs_fsop_geom_health(mp, &fsgeo);
1b6d968d 941 len = sizeof(fsgeo);
c23232d4 942 }
1b6d968d
DC
943
944 if (copy_to_user(arg, &fsgeo, len))
b474c7ae 945 return -EFAULT;
1da177e4
LT
946 return 0;
947}
948
7cd5006b
DW
949STATIC int
950xfs_ioc_ag_geometry(
951 struct xfs_mount *mp,
952 void __user *arg)
953{
954 struct xfs_ag_geometry ageo;
955 int error;
956
957 if (copy_from_user(&ageo, arg, sizeof(ageo)))
958 return -EFAULT;
76f17933
DW
959 if (ageo.ag_flags)
960 return -EINVAL;
961 if (memchr_inv(&ageo.ag_reserved, 0, sizeof(ageo.ag_reserved)))
962 return -EINVAL;
7cd5006b
DW
963
964 error = xfs_ag_get_geometry(mp, ageo.ag_number, &ageo);
965 if (error)
966 return error;
967
968 if (copy_to_user(arg, &ageo, sizeof(ageo)))
969 return -EFAULT;
970 return 0;
971}
972
1da177e4
LT
973/*
974 * Linux extended inode flags interface.
975 */
1da177e4 976
7b0e492e
DW
977static void
978xfs_fill_fsxattr(
979 struct xfs_inode *ip,
9fefd5db
MS
980 int whichfork,
981 struct fileattr *fa)
c83bfab1 982{
4800887b 983 struct xfs_mount *mp = ip->i_mount;
9fefd5db 984 struct xfs_ifork *ifp = XFS_IFORK_PTR(ip, whichfork);
daf83964 985
9fefd5db 986 fileattr_fill_xflags(fa, xfs_ip2xflags(ip));
4800887b 987
5aa5b278
DW
988 if (ip->i_diflags & XFS_DIFLAG_EXTSIZE) {
989 fa->fsx_extsize = XFS_FSB_TO_B(mp, ip->i_extsize);
990 } else if (ip->i_diflags & XFS_DIFLAG_EXTSZINHERIT) {
991 /*
992 * Don't let a misaligned extent size hint on a directory
993 * escape to userspace if it won't pass the setattr checks
994 * later.
995 */
996 if ((ip->i_diflags & XFS_DIFLAG_RTINHERIT) &&
997 ip->i_extsize % mp->m_sb.sb_rextsize > 0) {
998 fa->fsx_xflags &= ~(FS_XFLAG_EXTSIZE |
999 FS_XFLAG_EXTSZINHERIT);
1000 fa->fsx_extsize = 0;
1001 } else {
1002 fa->fsx_extsize = XFS_FSB_TO_B(mp, ip->i_extsize);
1003 }
1004 }
1005
3e09ab8f 1006 if (ip->i_diflags2 & XFS_DIFLAG2_COWEXTSIZE)
ee7b83fd 1007 fa->fsx_cowextsize = XFS_FSB_TO_B(mp, ip->i_cowextsize);
ceaf603c 1008 fa->fsx_projid = ip->i_projid;
b2197a36 1009 if (ifp && !xfs_need_iread_extents(ifp))
daf83964
CH
1010 fa->fsx_nextents = xfs_iext_count(ifp);
1011 else
1012 fa->fsx_nextents = xfs_ifork_nextents(ifp);
7b0e492e
DW
1013}
1014
1015STATIC int
9fefd5db 1016xfs_ioc_fsgetxattra(
7b0e492e 1017 xfs_inode_t *ip,
7b0e492e
DW
1018 void __user *arg)
1019{
9fefd5db 1020 struct fileattr fa;
7b0e492e
DW
1021
1022 xfs_ilock(ip, XFS_ILOCK_SHARED);
9fefd5db
MS
1023 xfs_fill_fsxattr(ip, XFS_ATTR_FORK, &fa);
1024 xfs_iunlock(ip, XFS_ILOCK_SHARED);
1025
1026 return copy_fsxattr_to_user(&fa, arg);
1027}
1028
1029int
1030xfs_fileattr_get(
1031 struct dentry *dentry,
1032 struct fileattr *fa)
1033{
1034 struct xfs_inode *ip = XFS_I(d_inode(dentry));
1035
1036 if (d_is_special(dentry))
1037 return -ENOTTY;
1038
1039 xfs_ilock(ip, XFS_ILOCK_SHARED);
1040 xfs_fill_fsxattr(ip, XFS_DATA_FORK, fa);
c83bfab1
CH
1041 xfs_iunlock(ip, XFS_ILOCK_SHARED);
1042
c83bfab1
CH
1043 return 0;
1044}
1045
dd60687e
CH
1046STATIC uint16_t
1047xfs_flags2diflags(
25fe55e8
CH
1048 struct xfs_inode *ip,
1049 unsigned int xflags)
1050{
25fe55e8 1051 /* can't set PREALLOC this way, just preserve it */
dd60687e 1052 uint16_t di_flags =
db07349d 1053 (ip->i_diflags & XFS_DIFLAG_PREALLOC);
dd60687e 1054
e7b89481 1055 if (xflags & FS_XFLAG_IMMUTABLE)
25fe55e8 1056 di_flags |= XFS_DIFLAG_IMMUTABLE;
e7b89481 1057 if (xflags & FS_XFLAG_APPEND)
25fe55e8 1058 di_flags |= XFS_DIFLAG_APPEND;
e7b89481 1059 if (xflags & FS_XFLAG_SYNC)
25fe55e8 1060 di_flags |= XFS_DIFLAG_SYNC;
e7b89481 1061 if (xflags & FS_XFLAG_NOATIME)
25fe55e8 1062 di_flags |= XFS_DIFLAG_NOATIME;
e7b89481 1063 if (xflags & FS_XFLAG_NODUMP)
25fe55e8 1064 di_flags |= XFS_DIFLAG_NODUMP;
e7b89481 1065 if (xflags & FS_XFLAG_NODEFRAG)
25fe55e8 1066 di_flags |= XFS_DIFLAG_NODEFRAG;
e7b89481 1067 if (xflags & FS_XFLAG_FILESTREAM)
25fe55e8 1068 di_flags |= XFS_DIFLAG_FILESTREAM;
c19b3b05 1069 if (S_ISDIR(VFS_I(ip)->i_mode)) {
e7b89481 1070 if (xflags & FS_XFLAG_RTINHERIT)
25fe55e8 1071 di_flags |= XFS_DIFLAG_RTINHERIT;
e7b89481 1072 if (xflags & FS_XFLAG_NOSYMLINKS)
25fe55e8 1073 di_flags |= XFS_DIFLAG_NOSYMLINKS;
e7b89481 1074 if (xflags & FS_XFLAG_EXTSZINHERIT)
25fe55e8 1075 di_flags |= XFS_DIFLAG_EXTSZINHERIT;
e7b89481 1076 if (xflags & FS_XFLAG_PROJINHERIT)
9336e3a7 1077 di_flags |= XFS_DIFLAG_PROJINHERIT;
c19b3b05 1078 } else if (S_ISREG(VFS_I(ip)->i_mode)) {
e7b89481 1079 if (xflags & FS_XFLAG_REALTIME)
25fe55e8 1080 di_flags |= XFS_DIFLAG_REALTIME;
e7b89481 1081 if (xflags & FS_XFLAG_EXTSIZE)
25fe55e8
CH
1082 di_flags |= XFS_DIFLAG_EXTSIZE;
1083 }
58f88ca2 1084
dd60687e
CH
1085 return di_flags;
1086}
1087
1088STATIC uint64_t
1089xfs_flags2diflags2(
1090 struct xfs_inode *ip,
1091 unsigned int xflags)
1092{
1093 uint64_t di_flags2 =
3e09ab8f
CH
1094 (ip->i_diflags2 & (XFS_DIFLAG2_REFLINK |
1095 XFS_DIFLAG2_BIGTIME));
58f88ca2 1096
58f88ca2
DC
1097 if (xflags & FS_XFLAG_DAX)
1098 di_flags2 |= XFS_DIFLAG2_DAX;
f7ca3522
DW
1099 if (xflags & FS_XFLAG_COWEXTSIZE)
1100 di_flags2 |= XFS_DIFLAG2_COWEXTSIZE;
58f88ca2 1101
dd60687e 1102 return di_flags2;
25fe55e8
CH
1103}
1104
29a17c00
DC
1105static int
1106xfs_ioctl_setattr_xflags(
1107 struct xfs_trans *tp,
1108 struct xfs_inode *ip,
9fefd5db 1109 struct fileattr *fa)
29a17c00
DC
1110{
1111 struct xfs_mount *mp = ip->i_mount;
3e09ab8f 1112 uint64_t i_flags2;
29a17c00
DC
1113
1114 /* Can't change realtime flag if any extents are allocated. */
daf83964 1115 if ((ip->i_df.if_nextents || ip->i_delayed_blks) &&
e7b89481 1116 XFS_IS_REALTIME_INODE(ip) != (fa->fsx_xflags & FS_XFLAG_REALTIME))
29a17c00
DC
1117 return -EINVAL;
1118
1119 /* If realtime flag is set then must have realtime device */
e7b89481 1120 if (fa->fsx_xflags & FS_XFLAG_REALTIME) {
29a17c00 1121 if (mp->m_sb.sb_rblocks == 0 || mp->m_sb.sb_rextsize == 0 ||
031474c2 1122 (ip->i_extsize % mp->m_sb.sb_rextsize))
29a17c00
DC
1123 return -EINVAL;
1124 }
1125
1987fd74 1126 /* Clear reflink if we are actually able to set the rt flag. */
c8e156ac 1127 if ((fa->fsx_xflags & FS_XFLAG_REALTIME) && xfs_is_reflink_inode(ip))
3e09ab8f 1128 ip->i_diflags2 &= ~XFS_DIFLAG2_REFLINK;
c8e156ac 1129
4f435ebe
DW
1130 /* Don't allow us to set DAX mode for a reflinked file for now. */
1131 if ((fa->fsx_xflags & FS_XFLAG_DAX) && xfs_is_reflink_inode(ip))
1132 return -EINVAL;
1133
dd60687e 1134 /* diflags2 only valid for v3 inodes. */
3e09ab8f 1135 i_flags2 = xfs_flags2diflags2(ip, fa->fsx_xflags);
38c26bfd 1136 if (i_flags2 && !xfs_has_v3inodes(mp))
dd60687e
CH
1137 return -EINVAL;
1138
db07349d 1139 ip->i_diflags = xfs_flags2diflags(ip, fa->fsx_xflags);
3e09ab8f 1140 ip->i_diflags2 = i_flags2;
dd60687e 1141
840d493d 1142 xfs_diflags_to_iflags(ip, false);
29a17c00
DC
1143 xfs_trans_ichgtime(tp, ip, XFS_ICHGTIME_CHG);
1144 xfs_trans_log_inode(tp, ip, XFS_ILOG_CORE);
ff6d6af2 1145 XFS_STATS_INC(mp, xs_ig_attrchg);
29a17c00
DC
1146 return 0;
1147}
1148
e4f9ba20
IW
1149static void
1150xfs_ioctl_setattr_prepare_dax(
3a6a854a 1151 struct xfs_inode *ip,
9fefd5db 1152 struct fileattr *fa)
3a6a854a 1153{
e4f9ba20
IW
1154 struct xfs_mount *mp = ip->i_mount;
1155 struct inode *inode = VFS_I(ip);
3a6a854a 1156
aaacdd25 1157 if (S_ISDIR(inode->i_mode))
e4f9ba20 1158 return;
3a6a854a 1159
0560f31a 1160 if (xfs_has_dax_always(mp) || xfs_has_dax_never(mp))
e4f9ba20 1161 return;
3a6a854a 1162
e4f9ba20 1163 if (((fa->fsx_xflags & FS_XFLAG_DAX) &&
3e09ab8f 1164 !(ip->i_diflags2 & XFS_DIFLAG2_DAX)) ||
e4f9ba20 1165 (!(fa->fsx_xflags & FS_XFLAG_DAX) &&
3e09ab8f 1166 (ip->i_diflags2 & XFS_DIFLAG2_DAX)))
e4f9ba20 1167 d_mark_dontcache(inode);
29a17c00
DC
1168}
1169
8f3d17ab
DC
1170/*
1171 * Set up the transaction structure for the setattr operation, checking that we
1172 * have permission to do so. On success, return a clean transaction and the
1173 * inode locked exclusively ready for further operation specific checks. On
1174 * failure, return an error without modifying or locking the inode.
1175 */
1176static struct xfs_trans *
1177xfs_ioctl_setattr_get_trans(
9fefd5db 1178 struct xfs_inode *ip,
7317a03d 1179 struct xfs_dquot *pdqp)
8f3d17ab
DC
1180{
1181 struct xfs_mount *mp = ip->i_mount;
1182 struct xfs_trans *tp;
3a6a854a 1183 int error = -EROFS;
8f3d17ab 1184
2e973b2c 1185 if (xfs_is_readonly(mp))
7317a03d 1186 goto out_error;
3a6a854a 1187 error = -EIO;
75c8c50f 1188 if (xfs_is_shutdown(mp))
7317a03d 1189 goto out_error;
8f3d17ab 1190
7317a03d 1191 error = xfs_trans_alloc_ichange(ip, NULL, NULL, pdqp,
eba0549b 1192 has_capability_noaudit(current, CAP_FOWNER), &tp);
8f3d17ab 1193 if (error)
7317a03d 1194 goto out_error;
8f3d17ab 1195
0560f31a 1196 if (xfs_has_wsync(mp))
8f3d17ab
DC
1197 xfs_trans_set_sync(tp);
1198
1199 return tp;
1200
7317a03d 1201out_error:
8f3d17ab
DC
1202 return ERR_PTR(error);
1203}
1204
9b94fcc3 1205/*
6b69e485
DW
1206 * Validate a proposed extent size hint. For regular files, the hint can only
1207 * be changed if no extents are allocated.
9b94fcc3 1208 */
f92090e9 1209static int
d4388d3c
DC
1210xfs_ioctl_setattr_check_extsize(
1211 struct xfs_inode *ip,
9fefd5db 1212 struct fileattr *fa)
d4388d3c
DC
1213{
1214 struct xfs_mount *mp = ip->i_mount;
6b69e485
DW
1215 xfs_failaddr_t failaddr;
1216 uint16_t new_diflags;
9b94fcc3 1217
9fefd5db
MS
1218 if (!fa->fsx_valid)
1219 return 0;
1220
daf83964 1221 if (S_ISREG(VFS_I(ip)->i_mode) && ip->i_df.if_nextents &&
6b69e485 1222 XFS_FSB_TO_B(mp, ip->i_extsize) != fa->fsx_extsize)
d4388d3c
DC
1223 return -EINVAL;
1224
6b69e485 1225 if (fa->fsx_extsize & mp->m_blockmask)
ca29be75 1226 return -EINVAL;
d4388d3c 1227
6b69e485 1228 new_diflags = xfs_flags2diflags(ip, fa->fsx_xflags);
9b94fcc3 1229
603f000b 1230 /*
83193e5e
DW
1231 * Inode verifiers do not check that the extent size hint is an integer
1232 * multiple of the rt extent size on a directory with both rtinherit
1233 * and extszinherit flags set. Don't let sysadmins misconfigure
1234 * directories.
603f000b
DW
1235 */
1236 if ((new_diflags & XFS_DIFLAG_RTINHERIT) &&
1237 (new_diflags & XFS_DIFLAG_EXTSZINHERIT)) {
1238 unsigned int rtextsize_bytes;
1239
1240 rtextsize_bytes = XFS_FSB_TO_B(mp, mp->m_sb.sb_rextsize);
1241 if (fa->fsx_extsize % rtextsize_bytes)
1242 return -EINVAL;
1243 }
1244
6b69e485
DW
1245 failaddr = xfs_inode_validate_extsize(ip->i_mount,
1246 XFS_B_TO_FSB(mp, fa->fsx_extsize),
1247 VFS_I(ip)->i_mode, new_diflags);
1248 return failaddr != NULL ? -EINVAL : 0;
d4388d3c
DC
1249}
1250
f7ca3522
DW
1251static int
1252xfs_ioctl_setattr_check_cowextsize(
1253 struct xfs_inode *ip,
9fefd5db 1254 struct fileattr *fa)
f7ca3522
DW
1255{
1256 struct xfs_mount *mp = ip->i_mount;
6b69e485
DW
1257 xfs_failaddr_t failaddr;
1258 uint64_t new_diflags2;
1259 uint16_t new_diflags;
f7ca3522 1260
9fefd5db
MS
1261 if (!fa->fsx_valid)
1262 return 0;
1263
6b69e485 1264 if (fa->fsx_cowextsize & mp->m_blockmask)
ca29be75 1265 return -EINVAL;
f7ca3522 1266
6b69e485
DW
1267 new_diflags = xfs_flags2diflags(ip, fa->fsx_xflags);
1268 new_diflags2 = xfs_flags2diflags2(ip, fa->fsx_xflags);
f7ca3522 1269
6b69e485
DW
1270 failaddr = xfs_inode_validate_cowextsize(ip->i_mount,
1271 XFS_B_TO_FSB(mp, fa->fsx_cowextsize),
1272 VFS_I(ip)->i_mode, new_diflags, new_diflags2);
1273 return failaddr != NULL ? -EINVAL : 0;
f7ca3522
DW
1274}
1275
f92090e9 1276static int
23bd0735
DC
1277xfs_ioctl_setattr_check_projid(
1278 struct xfs_inode *ip,
9fefd5db 1279 struct fileattr *fa)
23bd0735 1280{
9fefd5db
MS
1281 if (!fa->fsx_valid)
1282 return 0;
1283
38c26bfd 1284 /* Disallow 32bit project ids if 32bit IDs are not enabled. */
c8ce540d 1285 if (fa->fsx_projid > (uint16_t)-1 &&
38c26bfd 1286 !xfs_has_projid32(ip->i_mount))
23bd0735 1287 return -EINVAL;
23bd0735
DC
1288 return 0;
1289}
25fe55e8 1290
9fefd5db
MS
1291int
1292xfs_fileattr_set(
1293 struct user_namespace *mnt_userns,
1294 struct dentry *dentry,
1295 struct fileattr *fa)
25fe55e8 1296{
9fefd5db 1297 struct xfs_inode *ip = XFS_I(d_inode(dentry));
25fe55e8
CH
1298 struct xfs_mount *mp = ip->i_mount;
1299 struct xfs_trans *tp;
92f8ff73 1300 struct xfs_dquot *pdqp = NULL;
25fe55e8 1301 struct xfs_dquot *olddquot = NULL;
fea7aae6 1302 int error;
25fe55e8 1303
cca28fb8 1304 trace_xfs_ioctl_setattr(ip);
25fe55e8 1305
9fefd5db
MS
1306 if (d_is_special(dentry))
1307 return -ENOTTY;
1308
1309 if (!fa->fsx_valid) {
1310 if (fa->flags & ~(FS_IMMUTABLE_FL | FS_APPEND_FL |
1311 FS_NOATIME_FL | FS_NODUMP_FL |
1312 FS_SYNC_FL | FS_DAX_FL | FS_PROJINHERIT_FL))
1313 return -EOPNOTSUPP;
1314 }
1315
fea7aae6
DW
1316 error = xfs_ioctl_setattr_check_projid(ip, fa);
1317 if (error)
1318 return error;
23963e54 1319
25fe55e8
CH
1320 /*
1321 * If disk quotas is on, we make sure that the dquots do exist on disk,
1322 * before we start any other transactions. Trying to do this later
1323 * is messy. We don't care to take a readlock to look at the ids
1324 * in inode here, because we can't hold it across the trans_reserve.
1325 * If the IDs do change before we take the ilock, we're covered
1326 * because the i_*dquot fields will get updated anyway.
1327 */
9fefd5db 1328 if (fa->fsx_valid && XFS_IS_QUOTA_ON(mp)) {
fea7aae6 1329 error = xfs_qm_vop_dqalloc(ip, VFS_I(ip)->i_uid,
54295159 1330 VFS_I(ip)->i_gid, fa->fsx_projid,
ea1c9040 1331 XFS_QMOPT_PQUOTA, NULL, NULL, &pdqp);
fea7aae6
DW
1332 if (error)
1333 return error;
25fe55e8
CH
1334 }
1335
e4f9ba20 1336 xfs_ioctl_setattr_prepare_dax(ip, fa);
3a6a854a 1337
9fefd5db 1338 tp = xfs_ioctl_setattr_get_trans(ip, pdqp);
8f3d17ab 1339 if (IS_ERR(tp)) {
fea7aae6 1340 error = PTR_ERR(tp);
8f3d17ab 1341 goto error_free_dquots;
25fe55e8
CH
1342 }
1343
fea7aae6
DW
1344 error = xfs_ioctl_setattr_check_extsize(ip, fa);
1345 if (error)
d4388d3c 1346 goto error_trans_cancel;
25fe55e8 1347
fea7aae6
DW
1348 error = xfs_ioctl_setattr_check_cowextsize(ip, fa);
1349 if (error)
f7ca3522
DW
1350 goto error_trans_cancel;
1351
fea7aae6
DW
1352 error = xfs_ioctl_setattr_xflags(tp, ip, fa);
1353 if (error)
d4388d3c 1354 goto error_trans_cancel;
25fe55e8 1355
9fefd5db
MS
1356 if (!fa->fsx_valid)
1357 goto skip_xattr;
25fe55e8 1358 /*
fd179b9c
DC
1359 * Change file ownership. Must be the owner or privileged. CAP_FSETID
1360 * overrides the following restrictions:
1361 *
1362 * The set-user-ID and set-group-ID bits of a file will be cleared upon
1363 * successful return from chown()
25fe55e8 1364 */
25fe55e8 1365
c19b3b05 1366 if ((VFS_I(ip)->i_mode & (S_ISUID|S_ISGID)) &&
f736d93d 1367 !capable_wrt_inode_uidgid(mnt_userns, VFS_I(ip), CAP_FSETID))
c19b3b05 1368 VFS_I(ip)->i_mode &= ~(S_ISUID|S_ISGID);
25fe55e8 1369
fd179b9c 1370 /* Change the ownerships and register project quota modifications */
ceaf603c 1371 if (ip->i_projid != fa->fsx_projid) {
149e53af 1372 if (XFS_IS_PQUOTA_ON(mp)) {
fd179b9c
DC
1373 olddquot = xfs_qm_vop_chown(tp, ip,
1374 &ip->i_pdquot, pdqp);
1375 }
ceaf603c 1376 ip->i_projid = fa->fsx_projid;
f13fae2d 1377 }
25fe55e8 1378
a872703f
DC
1379 /*
1380 * Only set the extent size hint if we've already determined that the
1381 * extent size hint should be set on the inode. If no extent size flags
1382 * are set on the inode then unconditionally clear the extent size hint.
1383 */
db07349d 1384 if (ip->i_diflags & (XFS_DIFLAG_EXTSIZE | XFS_DIFLAG_EXTSZINHERIT))
b231b122 1385 ip->i_extsize = XFS_B_TO_FSB(mp, fa->fsx_extsize);
f7ca3522 1386 else
031474c2 1387 ip->i_extsize = 0;
ee7b83fd 1388
38c26bfd 1389 if (xfs_has_v3inodes(mp)) {
3e09ab8f 1390 if (ip->i_diflags2 & XFS_DIFLAG2_COWEXTSIZE)
ee7b83fd
CH
1391 ip->i_cowextsize = XFS_B_TO_FSB(mp, fa->fsx_cowextsize);
1392 else
1393 ip->i_cowextsize = 0;
1394 }
25fe55e8 1395
9fefd5db 1396skip_xattr:
fea7aae6 1397 error = xfs_trans_commit(tp);
25fe55e8
CH
1398
1399 /*
1400 * Release any dquot(s) the inode had kept before chown.
1401 */
7d095257 1402 xfs_qm_dqrele(olddquot);
92f8ff73 1403 xfs_qm_dqrele(pdqp);
25fe55e8 1404
fea7aae6 1405 return error;
25fe55e8 1406
d4388d3c 1407error_trans_cancel:
4906e215 1408 xfs_trans_cancel(tp);
8f3d17ab 1409error_free_dquots:
92f8ff73 1410 xfs_qm_dqrele(pdqp);
fea7aae6 1411 return error;
25fe55e8
CH
1412}
1413
232b5194
CH
1414static bool
1415xfs_getbmap_format(
1416 struct kgetbmap *p,
1417 struct getbmapx __user *u,
1418 size_t recsize)
8a7141a8 1419{
232b5194
CH
1420 if (put_user(p->bmv_offset, &u->bmv_offset) ||
1421 put_user(p->bmv_block, &u->bmv_block) ||
1422 put_user(p->bmv_length, &u->bmv_length) ||
1423 put_user(0, &u->bmv_count) ||
1424 put_user(0, &u->bmv_entries))
1425 return false;
1426 if (recsize < sizeof(struct getbmapx))
1427 return true;
1428 if (put_user(0, &u->bmv_iflags) ||
1429 put_user(p->bmv_oflags, &u->bmv_oflags) ||
1430 put_user(0, &u->bmv_unused1) ||
1431 put_user(0, &u->bmv_unused2))
1432 return false;
1433 return true;
8a7141a8
ES
1434}
1435
1da177e4
LT
1436STATIC int
1437xfs_ioc_getbmap(
8f3e2058 1438 struct file *file,
1da177e4
LT
1439 unsigned int cmd,
1440 void __user *arg)
1441{
be6324c0 1442 struct getbmapx bmx = { 0 };
232b5194
CH
1443 struct kgetbmap *buf;
1444 size_t recsize;
1445 int error, i;
1da177e4 1446
232b5194
CH
1447 switch (cmd) {
1448 case XFS_IOC_GETBMAPA:
1449 bmx.bmv_iflags = BMV_IF_ATTRFORK;
53004ee7 1450 fallthrough;
232b5194 1451 case XFS_IOC_GETBMAP:
232b5194
CH
1452 /* struct getbmap is a strict subset of struct getbmapx. */
1453 recsize = sizeof(struct getbmap);
1454 break;
1455 case XFS_IOC_GETBMAPX:
1456 recsize = sizeof(struct getbmapx);
1457 break;
1458 default:
b474c7ae 1459 return -EINVAL;
232b5194 1460 }
1da177e4 1461
232b5194 1462 if (copy_from_user(&bmx, arg, recsize))
b474c7ae 1463 return -EFAULT;
1da177e4
LT
1464
1465 if (bmx.bmv_count < 2)
b474c7ae 1466 return -EINVAL;
29d650f7 1467 if (bmx.bmv_count >= INT_MAX / recsize)
232b5194 1468 return -ENOMEM;
1da177e4 1469
c2e4e3b7 1470 buf = kvcalloc(bmx.bmv_count, sizeof(*buf), GFP_KERNEL);
232b5194
CH
1471 if (!buf)
1472 return -ENOMEM;
1da177e4 1473
232b5194 1474 error = xfs_getbmap(XFS_I(file_inode(file)), &bmx, buf);
1da177e4 1475 if (error)
232b5194 1476 goto out_free_buf;
1da177e4 1477
232b5194
CH
1478 error = -EFAULT;
1479 if (copy_to_user(arg, &bmx, recsize))
1480 goto out_free_buf;
1481 arg += recsize;
1482
1483 for (i = 0; i < bmx.bmv_entries; i++) {
1484 if (!xfs_getbmap_format(buf + i, arg, recsize))
1485 goto out_free_buf;
1486 arg += recsize;
1487 }
1da177e4 1488
232b5194
CH
1489 error = 0;
1490out_free_buf:
1491 kmem_free(buf);
132bf672 1492 return error;
1da177e4 1493}
df26cfe8 1494
e89c0413
DW
1495STATIC int
1496xfs_ioc_getfsmap(
1497 struct xfs_inode *ip,
9d17e14c 1498 struct fsmap_head __user *arg)
e89c0413 1499{
e89c0413
DW
1500 struct xfs_fsmap_head xhead = {0};
1501 struct fsmap_head head;
8ffa90e1
DW
1502 struct fsmap *recs;
1503 unsigned int count;
1504 __u32 last_flags = 0;
1505 bool done = false;
e89c0413
DW
1506 int error;
1507
1508 if (copy_from_user(&head, arg, sizeof(struct fsmap_head)))
1509 return -EFAULT;
1510 if (memchr_inv(head.fmh_reserved, 0, sizeof(head.fmh_reserved)) ||
1511 memchr_inv(head.fmh_keys[0].fmr_reserved, 0,
1512 sizeof(head.fmh_keys[0].fmr_reserved)) ||
1513 memchr_inv(head.fmh_keys[1].fmr_reserved, 0,
1514 sizeof(head.fmh_keys[1].fmr_reserved)))
1515 return -EINVAL;
1516
8ffa90e1
DW
1517 /*
1518 * Use an internal memory buffer so that we don't have to copy fsmap
1519 * data to userspace while holding locks. Start by trying to allocate
1520 * up to 128k for the buffer, but fall back to a single page if needed.
1521 */
1522 count = min_t(unsigned int, head.fmh_count,
1523 131072 / sizeof(struct fsmap));
c2e4e3b7 1524 recs = kvcalloc(count, sizeof(struct fsmap), GFP_KERNEL);
8ffa90e1
DW
1525 if (!recs) {
1526 count = min_t(unsigned int, head.fmh_count,
1527 PAGE_SIZE / sizeof(struct fsmap));
c2e4e3b7 1528 recs = kvcalloc(count, sizeof(struct fsmap), GFP_KERNEL);
8ffa90e1
DW
1529 if (!recs)
1530 return -ENOMEM;
1531 }
1532
e89c0413 1533 xhead.fmh_iflags = head.fmh_iflags;
e89c0413
DW
1534 xfs_fsmap_to_internal(&xhead.fmh_keys[0], &head.fmh_keys[0]);
1535 xfs_fsmap_to_internal(&xhead.fmh_keys[1], &head.fmh_keys[1]);
1536
1537 trace_xfs_getfsmap_low_key(ip->i_mount, &xhead.fmh_keys[0]);
1538 trace_xfs_getfsmap_high_key(ip->i_mount, &xhead.fmh_keys[1]);
1539
8ffa90e1
DW
1540 head.fmh_entries = 0;
1541 do {
1542 struct fsmap __user *user_recs;
1543 struct fsmap *last_rec;
1544
1545 user_recs = &arg->fmh_recs[head.fmh_entries];
1546 xhead.fmh_entries = 0;
1547 xhead.fmh_count = min_t(unsigned int, count,
1548 head.fmh_count - head.fmh_entries);
1549
1550 /* Run query, record how many entries we got. */
1551 error = xfs_getfsmap(ip->i_mount, &xhead, recs);
1552 switch (error) {
1553 case 0:
1554 /*
1555 * There are no more records in the result set. Copy
1556 * whatever we got to userspace and break out.
1557 */
1558 done = true;
1559 break;
1560 case -ECANCELED:
1561 /*
1562 * The internal memory buffer is full. Copy whatever
1563 * records we got to userspace and go again if we have
1564 * not yet filled the userspace buffer.
1565 */
1566 error = 0;
1567 break;
1568 default:
1569 goto out_free;
1570 }
1571 head.fmh_entries += xhead.fmh_entries;
1572 head.fmh_oflags = xhead.fmh_oflags;
e89c0413 1573
8ffa90e1
DW
1574 /*
1575 * If the caller wanted a record count or there aren't any
1576 * new records to return, we're done.
1577 */
1578 if (head.fmh_count == 0 || xhead.fmh_entries == 0)
1579 break;
1580
1581 /* Copy all the records we got out to userspace. */
1582 if (copy_to_user(user_recs, recs,
1583 xhead.fmh_entries * sizeof(struct fsmap))) {
1584 error = -EFAULT;
1585 goto out_free;
1586 }
1587
1588 /* Remember the last record flags we copied to userspace. */
1589 last_rec = &recs[xhead.fmh_entries - 1];
1590 last_flags = last_rec->fmr_flags;
1591
1592 /* Set up the low key for the next iteration. */
1593 xfs_fsmap_to_internal(&xhead.fmh_keys[0], last_rec);
1594 trace_xfs_getfsmap_low_key(ip->i_mount, &xhead.fmh_keys[0]);
1595 } while (!done && head.fmh_entries < head.fmh_count);
1596
1597 /*
1598 * If there are no more records in the query result set and we're not
1599 * in counting mode, mark the last record returned with the LAST flag.
1600 */
1601 if (done && head.fmh_count > 0 && head.fmh_entries > 0) {
1602 struct fsmap __user *user_rec;
1603
1604 last_flags |= FMR_OF_LAST;
1605 user_rec = &arg->fmh_recs[head.fmh_entries - 1];
1606
1607 if (copy_to_user(&user_rec->fmr_flags, &last_flags,
1608 sizeof(last_flags))) {
1609 error = -EFAULT;
1610 goto out_free;
1611 }
e89c0413
DW
1612 }
1613
1614 /* copy back header */
8ffa90e1
DW
1615 if (copy_to_user(arg, &head, sizeof(struct fsmap_head))) {
1616 error = -EFAULT;
1617 goto out_free;
1618 }
e89c0413 1619
8ffa90e1
DW
1620out_free:
1621 kmem_free(recs);
1622 return error;
e89c0413
DW
1623}
1624
36fd6e86
DW
1625STATIC int
1626xfs_ioc_scrub_metadata(
71bddbcc 1627 struct file *file,
36fd6e86
DW
1628 void __user *arg)
1629{
1630 struct xfs_scrub_metadata scrub;
1631 int error;
1632
1633 if (!capable(CAP_SYS_ADMIN))
1634 return -EPERM;
1635
1636 if (copy_from_user(&scrub, arg, sizeof(scrub)))
1637 return -EFAULT;
1638
71bddbcc 1639 error = xfs_scrub_metadata(file, &scrub);
36fd6e86
DW
1640 if (error)
1641 return error;
1642
1643 if (copy_to_user(arg, &scrub, sizeof(scrub)))
1644 return -EFAULT;
1645
1646 return 0;
1647}
1648
a133d952
DC
1649int
1650xfs_ioc_swapext(
1651 xfs_swapext_t *sxp)
1652{
1653 xfs_inode_t *ip, *tip;
1654 struct fd f, tmp;
1655 int error = 0;
1656
1657 /* Pull information for the target fd */
1658 f = fdget((int)sxp->sx_fdtarget);
1659 if (!f.file) {
2451337d 1660 error = -EINVAL;
a133d952
DC
1661 goto out;
1662 }
1663
1664 if (!(f.file->f_mode & FMODE_WRITE) ||
1665 !(f.file->f_mode & FMODE_READ) ||
1666 (f.file->f_flags & O_APPEND)) {
2451337d 1667 error = -EBADF;
a133d952
DC
1668 goto out_put_file;
1669 }
1670
1671 tmp = fdget((int)sxp->sx_fdtmp);
1672 if (!tmp.file) {
2451337d 1673 error = -EINVAL;
a133d952
DC
1674 goto out_put_file;
1675 }
1676
1677 if (!(tmp.file->f_mode & FMODE_WRITE) ||
1678 !(tmp.file->f_mode & FMODE_READ) ||
1679 (tmp.file->f_flags & O_APPEND)) {
2451337d 1680 error = -EBADF;
a133d952
DC
1681 goto out_put_tmp_file;
1682 }
1683
1684 if (IS_SWAPFILE(file_inode(f.file)) ||
1685 IS_SWAPFILE(file_inode(tmp.file))) {
2451337d 1686 error = -EINVAL;
a133d952
DC
1687 goto out_put_tmp_file;
1688 }
1689
7f1b6245
JH
1690 /*
1691 * We need to ensure that the fds passed in point to XFS inodes
1692 * before we cast and access them as XFS structures as we have no
1693 * control over what the user passes us here.
1694 */
1695 if (f.file->f_op != &xfs_file_operations ||
1696 tmp.file->f_op != &xfs_file_operations) {
1697 error = -EINVAL;
1698 goto out_put_tmp_file;
1699 }
1700
a133d952
DC
1701 ip = XFS_I(file_inode(f.file));
1702 tip = XFS_I(file_inode(tmp.file));
1703
1704 if (ip->i_mount != tip->i_mount) {
2451337d 1705 error = -EINVAL;
a133d952
DC
1706 goto out_put_tmp_file;
1707 }
1708
1709 if (ip->i_ino == tip->i_ino) {
2451337d 1710 error = -EINVAL;
a133d952
DC
1711 goto out_put_tmp_file;
1712 }
1713
75c8c50f 1714 if (xfs_is_shutdown(ip->i_mount)) {
2451337d 1715 error = -EIO;
a133d952
DC
1716 goto out_put_tmp_file;
1717 }
1718
1719 error = xfs_swap_extents(ip, tip, sxp);
1720
1721 out_put_tmp_file:
1722 fdput(tmp);
1723 out_put_file:
1724 fdput(f);
1725 out:
1726 return error;
1727}
1728
f7664b31
ES
1729static int
1730xfs_ioc_getlabel(
1731 struct xfs_mount *mp,
1732 char __user *user_label)
1733{
1734 struct xfs_sb *sbp = &mp->m_sb;
1735 char label[XFSLABEL_MAX + 1];
1736
1737 /* Paranoia */
1738 BUILD_BUG_ON(sizeof(sbp->sb_fname) > FSLABEL_MAX);
1739
4bb8b65a
AB
1740 /* 1 larger than sb_fname, so this ensures a trailing NUL char */
1741 memset(label, 0, sizeof(label));
f7664b31 1742 spin_lock(&mp->m_sb_lock);
4bb8b65a 1743 strncpy(label, sbp->sb_fname, XFSLABEL_MAX);
f7664b31
ES
1744 spin_unlock(&mp->m_sb_lock);
1745
4bb8b65a 1746 if (copy_to_user(user_label, label, sizeof(label)))
f7664b31
ES
1747 return -EFAULT;
1748 return 0;
1749}
1750
1751static int
1752xfs_ioc_setlabel(
1753 struct file *filp,
1754 struct xfs_mount *mp,
1755 char __user *newlabel)
1756{
1757 struct xfs_sb *sbp = &mp->m_sb;
1758 char label[XFSLABEL_MAX + 1];
1759 size_t len;
1760 int error;
1761
1762 if (!capable(CAP_SYS_ADMIN))
1763 return -EPERM;
1764 /*
1765 * The generic ioctl allows up to FSLABEL_MAX chars, but XFS is much
1766 * smaller, at 12 bytes. We copy one more to be sure we find the
1767 * (required) NULL character to test the incoming label length.
1768 * NB: The on disk label doesn't need to be null terminated.
1769 */
1770 if (copy_from_user(label, newlabel, XFSLABEL_MAX + 1))
1771 return -EFAULT;
1772 len = strnlen(label, XFSLABEL_MAX + 1);
1773 if (len > sizeof(sbp->sb_fname))
1774 return -EINVAL;
1775
1776 error = mnt_want_write_file(filp);
1777 if (error)
1778 return error;
1779
1780 spin_lock(&mp->m_sb_lock);
1781 memset(sbp->sb_fname, 0, sizeof(sbp->sb_fname));
4bb8b65a 1782 memcpy(sbp->sb_fname, label, len);
f7664b31
ES
1783 spin_unlock(&mp->m_sb_lock);
1784
1785 /*
1786 * Now we do several things to satisfy userspace.
1787 * In addition to normal logging of the primary superblock, we also
1788 * immediately write these changes to sector zero for the primary, then
1789 * update all backup supers (as xfs_db does for a label change), then
1790 * invalidate the block device page cache. This is so that any prior
1791 * buffered reads from userspace (i.e. from blkid) are invalidated,
1792 * and userspace will see the newly-written label.
1793 */
1794 error = xfs_sync_sb_buf(mp);
1795 if (error)
1796 goto out;
1797 /*
1798 * growfs also updates backup supers so lock against that.
1799 */
1800 mutex_lock(&mp->m_growlock);
1801 error = xfs_update_secondary_sbs(mp);
1802 mutex_unlock(&mp->m_growlock);
1803
1804 invalidate_bdev(mp->m_ddev_targp->bt_bdev);
1805
1806out:
1807 mnt_drop_write_file(filp);
1808 return error;
1809}
1810
3737bb2c
DW
1811static inline int
1812xfs_fs_eofblocks_from_user(
1813 struct xfs_fs_eofblocks *src,
b26b2bf1 1814 struct xfs_icwalk *dst)
3737bb2c
DW
1815{
1816 if (src->eof_version != XFS_EOFBLOCKS_VERSION)
1817 return -EINVAL;
1818
1819 if (src->eof_flags & ~XFS_EOF_FLAGS_VALID)
1820 return -EINVAL;
1821
1822 if (memchr_inv(&src->pad32, 0, sizeof(src->pad32)) ||
1823 memchr_inv(src->pad64, 0, sizeof(src->pad64)))
1824 return -EINVAL;
1825
b26b2bf1 1826 dst->icw_flags = 0;
2d53f66b 1827 if (src->eof_flags & XFS_EOF_FLAGS_SYNC)
b26b2bf1 1828 dst->icw_flags |= XFS_ICWALK_FLAG_SYNC;
2d53f66b 1829 if (src->eof_flags & XFS_EOF_FLAGS_UID)
b26b2bf1 1830 dst->icw_flags |= XFS_ICWALK_FLAG_UID;
2d53f66b 1831 if (src->eof_flags & XFS_EOF_FLAGS_GID)
b26b2bf1 1832 dst->icw_flags |= XFS_ICWALK_FLAG_GID;
2d53f66b 1833 if (src->eof_flags & XFS_EOF_FLAGS_PRID)
b26b2bf1 1834 dst->icw_flags |= XFS_ICWALK_FLAG_PRID;
2d53f66b 1835 if (src->eof_flags & XFS_EOF_FLAGS_MINFILESIZE)
b26b2bf1 1836 dst->icw_flags |= XFS_ICWALK_FLAG_MINFILESIZE;
2d53f66b 1837
b26b2bf1
DW
1838 dst->icw_prid = src->eof_prid;
1839 dst->icw_min_file_size = src->eof_min_file_size;
3737bb2c 1840
b26b2bf1 1841 dst->icw_uid = INVALID_UID;
3737bb2c 1842 if (src->eof_flags & XFS_EOF_FLAGS_UID) {
b26b2bf1
DW
1843 dst->icw_uid = make_kuid(current_user_ns(), src->eof_uid);
1844 if (!uid_valid(dst->icw_uid))
3737bb2c
DW
1845 return -EINVAL;
1846 }
1847
b26b2bf1 1848 dst->icw_gid = INVALID_GID;
3737bb2c 1849 if (src->eof_flags & XFS_EOF_FLAGS_GID) {
b26b2bf1
DW
1850 dst->icw_gid = make_kgid(current_user_ns(), src->eof_gid);
1851 if (!gid_valid(dst->icw_gid))
3737bb2c
DW
1852 return -EINVAL;
1853 }
1854 return 0;
1855}
1856
b3bb9413
DW
1857/*
1858 * These long-unused ioctls were removed from the official ioctl API in 5.17,
1859 * but retain these definitions so that we can log warnings about them.
1860 */
1861#define XFS_IOC_ALLOCSP _IOW ('X', 10, struct xfs_flock64)
1862#define XFS_IOC_FREESP _IOW ('X', 11, struct xfs_flock64)
1863#define XFS_IOC_ALLOCSP64 _IOW ('X', 36, struct xfs_flock64)
1864#define XFS_IOC_FREESP64 _IOW ('X', 37, struct xfs_flock64)
1865
4d4be482
CH
1866/*
1867 * Note: some of the ioctl's return positive numbers as a
1868 * byte count indicating success, such as readlink_by_handle.
1869 * So we don't "sign flip" like most other routines. This means
1870 * true errors need to be returned as a negative value.
1871 */
1872long
1873xfs_file_ioctl(
df26cfe8 1874 struct file *filp,
df26cfe8 1875 unsigned int cmd,
4d4be482 1876 unsigned long p)
df26cfe8 1877{
496ad9aa 1878 struct inode *inode = file_inode(filp);
4d4be482
CH
1879 struct xfs_inode *ip = XFS_I(inode);
1880 struct xfs_mount *mp = ip->i_mount;
1881 void __user *arg = (void __user *)p;
df26cfe8
LM
1882 int error;
1883
cca28fb8 1884 trace_xfs_file_ioctl(ip);
4d4be482
CH
1885
1886 switch (cmd) {
a46db608
CH
1887 case FITRIM:
1888 return xfs_ioc_trim(mp, arg);
f7664b31
ES
1889 case FS_IOC_GETFSLABEL:
1890 return xfs_ioc_getlabel(mp, arg);
1891 case FS_IOC_SETFSLABEL:
1892 return xfs_ioc_setlabel(filp, mp, arg);
df26cfe8
LM
1893 case XFS_IOC_ALLOCSP:
1894 case XFS_IOC_FREESP:
df26cfe8 1895 case XFS_IOC_ALLOCSP64:
4d1b97f9
DW
1896 case XFS_IOC_FREESP64:
1897 xfs_warn_once(mp,
1898 "%s should use fallocate; XFS_IOC_{ALLOC,FREE}SP ioctl unsupported",
1899 current->comm);
1900 return -ENOTTY;
df26cfe8 1901 case XFS_IOC_DIOINFO: {
c7d68318
CH
1902 struct xfs_buftarg *target = xfs_inode_buftarg(ip);
1903 struct dioattr da;
df26cfe8 1904
7c71ee78 1905 da.d_mem = da.d_miniosz = target->bt_logical_sectorsize;
df26cfe8
LM
1906 da.d_maxiosz = INT_MAX & ~(da.d_miniosz - 1);
1907
1908 if (copy_to_user(arg, &da, sizeof(da)))
b474c7ae 1909 return -EFAULT;
df26cfe8
LM
1910 return 0;
1911 }
1912
1913 case XFS_IOC_FSBULKSTAT_SINGLE:
1914 case XFS_IOC_FSBULKSTAT:
1915 case XFS_IOC_FSINUMBERS:
f736d93d 1916 return xfs_ioc_fsbulkstat(filp, cmd, arg);
df26cfe8 1917
0448b6f4 1918 case XFS_IOC_BULKSTAT:
f736d93d 1919 return xfs_ioc_bulkstat(filp, cmd, arg);
fba9760a
DW
1920 case XFS_IOC_INUMBERS:
1921 return xfs_ioc_inumbers(mp, cmd, arg);
df26cfe8
LM
1922
1923 case XFS_IOC_FSGEOMETRY_V1:
1b6d968d
DC
1924 return xfs_ioc_fsgeometry(mp, arg, 3);
1925 case XFS_IOC_FSGEOMETRY_V4:
1926 return xfs_ioc_fsgeometry(mp, arg, 4);
df26cfe8 1927 case XFS_IOC_FSGEOMETRY:
1b6d968d 1928 return xfs_ioc_fsgeometry(mp, arg, 5);
df26cfe8 1929
7cd5006b
DW
1930 case XFS_IOC_AG_GEOMETRY:
1931 return xfs_ioc_ag_geometry(mp, arg);
1932
df26cfe8
LM
1933 case XFS_IOC_GETVERSION:
1934 return put_user(inode->i_generation, (int __user *)arg);
1935
df26cfe8 1936 case XFS_IOC_FSGETXATTRA:
9fefd5db 1937 return xfs_ioc_fsgetxattra(ip, arg);
df26cfe8 1938
df26cfe8
LM
1939 case XFS_IOC_GETBMAP:
1940 case XFS_IOC_GETBMAPA:
df26cfe8 1941 case XFS_IOC_GETBMAPX:
232b5194 1942 return xfs_ioc_getbmap(filp, cmd, arg);
df26cfe8 1943
e89c0413
DW
1944 case FS_IOC_GETFSMAP:
1945 return xfs_ioc_getfsmap(ip, arg);
1946
36fd6e86 1947 case XFS_IOC_SCRUB_METADATA:
71bddbcc 1948 return xfs_ioc_scrub_metadata(filp, arg);
36fd6e86 1949
df26cfe8
LM
1950 case XFS_IOC_FD_TO_HANDLE:
1951 case XFS_IOC_PATH_TO_HANDLE:
743bb465 1952 case XFS_IOC_PATH_TO_FSHANDLE: {
1953 xfs_fsop_handlereq_t hreq;
df26cfe8 1954
743bb465 1955 if (copy_from_user(&hreq, arg, sizeof(hreq)))
b474c7ae 1956 return -EFAULT;
743bb465 1957 return xfs_find_handle(cmd, &hreq);
1958 }
1959 case XFS_IOC_OPEN_BY_HANDLE: {
1960 xfs_fsop_handlereq_t hreq;
df26cfe8 1961
743bb465 1962 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1963 return -EFAULT;
d296d30a 1964 return xfs_open_by_handle(filp, &hreq);
743bb465 1965 }
df26cfe8 1966
743bb465 1967 case XFS_IOC_READLINK_BY_HANDLE: {
1968 xfs_fsop_handlereq_t hreq;
df26cfe8 1969
743bb465 1970 if (copy_from_user(&hreq, arg, sizeof(xfs_fsop_handlereq_t)))
b474c7ae 1971 return -EFAULT;
d296d30a 1972 return xfs_readlink_by_handle(filp, &hreq);
743bb465 1973 }
df26cfe8 1974 case XFS_IOC_ATTRLIST_BY_HANDLE:
d296d30a 1975 return xfs_attrlist_by_handle(filp, arg);
df26cfe8
LM
1976
1977 case XFS_IOC_ATTRMULTI_BY_HANDLE:
d296d30a 1978 return xfs_attrmulti_by_handle(filp, arg);
df26cfe8
LM
1979
1980 case XFS_IOC_SWAPEXT: {
743bb465 1981 struct xfs_swapext sxp;
1982
1983 if (copy_from_user(&sxp, arg, sizeof(xfs_swapext_t)))
b474c7ae 1984 return -EFAULT;
d9457dc0
JK
1985 error = mnt_want_write_file(filp);
1986 if (error)
1987 return error;
a133d952 1988 error = xfs_ioc_swapext(&sxp);
d9457dc0 1989 mnt_drop_write_file(filp);
2451337d 1990 return error;
df26cfe8
LM
1991 }
1992
1993 case XFS_IOC_FSCOUNTS: {
1994 xfs_fsop_counts_t out;
1995
91083269 1996 xfs_fs_counts(mp, &out);
df26cfe8
LM
1997
1998 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 1999 return -EFAULT;
df26cfe8
LM
2000 return 0;
2001 }
2002
2003 case XFS_IOC_SET_RESBLKS: {
2004 xfs_fsop_resblks_t inout;
c8ce540d 2005 uint64_t in;
df26cfe8
LM
2006
2007 if (!capable(CAP_SYS_ADMIN))
2008 return -EPERM;
2009
2e973b2c 2010 if (xfs_is_readonly(mp))
b474c7ae 2011 return -EROFS;
d5db0f97 2012
df26cfe8 2013 if (copy_from_user(&inout, arg, sizeof(inout)))
b474c7ae 2014 return -EFAULT;
df26cfe8 2015
d9457dc0
JK
2016 error = mnt_want_write_file(filp);
2017 if (error)
2018 return error;
2019
df26cfe8
LM
2020 /* input parameter is passed in resblks field of structure */
2021 in = inout.resblks;
2022 error = xfs_reserve_blocks(mp, &in, &inout);
d9457dc0 2023 mnt_drop_write_file(filp);
df26cfe8 2024 if (error)
2451337d 2025 return error;
df26cfe8
LM
2026
2027 if (copy_to_user(arg, &inout, sizeof(inout)))
b474c7ae 2028 return -EFAULT;
df26cfe8
LM
2029 return 0;
2030 }
2031
2032 case XFS_IOC_GET_RESBLKS: {
2033 xfs_fsop_resblks_t out;
2034
2035 if (!capable(CAP_SYS_ADMIN))
2036 return -EPERM;
2037
2038 error = xfs_reserve_blocks(mp, NULL, &out);
2039 if (error)
2451337d 2040 return error;
df26cfe8
LM
2041
2042 if (copy_to_user(arg, &out, sizeof(out)))
b474c7ae 2043 return -EFAULT;
df26cfe8
LM
2044
2045 return 0;
2046 }
2047
2048 case XFS_IOC_FSGROWFSDATA: {
07aabd9c 2049 struct xfs_growfs_data in;
df26cfe8 2050
df26cfe8 2051 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2052 return -EFAULT;
df26cfe8 2053
d9457dc0
JK
2054 error = mnt_want_write_file(filp);
2055 if (error)
2056 return error;
df26cfe8 2057 error = xfs_growfs_data(mp, &in);
d9457dc0 2058 mnt_drop_write_file(filp);
2451337d 2059 return error;
df26cfe8
LM
2060 }
2061
2062 case XFS_IOC_FSGROWFSLOG: {
07aabd9c 2063 struct xfs_growfs_log in;
df26cfe8 2064
df26cfe8 2065 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2066 return -EFAULT;
df26cfe8 2067
d9457dc0
JK
2068 error = mnt_want_write_file(filp);
2069 if (error)
2070 return error;
df26cfe8 2071 error = xfs_growfs_log(mp, &in);
d9457dc0 2072 mnt_drop_write_file(filp);
2451337d 2073 return error;
df26cfe8
LM
2074 }
2075
2076 case XFS_IOC_FSGROWFSRT: {
2077 xfs_growfs_rt_t in;
2078
df26cfe8 2079 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2080 return -EFAULT;
df26cfe8 2081
d9457dc0
JK
2082 error = mnt_want_write_file(filp);
2083 if (error)
2084 return error;
df26cfe8 2085 error = xfs_growfs_rt(mp, &in);
d9457dc0 2086 mnt_drop_write_file(filp);
2451337d 2087 return error;
df26cfe8
LM
2088 }
2089
df26cfe8 2090 case XFS_IOC_GOINGDOWN: {
c8ce540d 2091 uint32_t in;
df26cfe8
LM
2092
2093 if (!capable(CAP_SYS_ADMIN))
2094 return -EPERM;
2095
c8ce540d 2096 if (get_user(in, (uint32_t __user *)arg))
b474c7ae 2097 return -EFAULT;
df26cfe8 2098
2451337d 2099 return xfs_fs_goingdown(mp, in);
df26cfe8
LM
2100 }
2101
2102 case XFS_IOC_ERROR_INJECTION: {
2103 xfs_error_injection_t in;
2104
2105 if (!capable(CAP_SYS_ADMIN))
2106 return -EPERM;
2107
2108 if (copy_from_user(&in, arg, sizeof(in)))
b474c7ae 2109 return -EFAULT;
df26cfe8 2110
31965ef3 2111 return xfs_errortag_add(mp, in.errtag);
df26cfe8
LM
2112 }
2113
2114 case XFS_IOC_ERROR_CLEARALL:
2115 if (!capable(CAP_SYS_ADMIN))
2116 return -EPERM;
2117
31965ef3 2118 return xfs_errortag_clearall(mp);
df26cfe8 2119
8ca149de 2120 case XFS_IOC_FREE_EOFBLOCKS: {
b26b2bf1
DW
2121 struct xfs_fs_eofblocks eofb;
2122 struct xfs_icwalk icw;
8ca149de 2123
8c567a7f
DE
2124 if (!capable(CAP_SYS_ADMIN))
2125 return -EPERM;
2126
2e973b2c 2127 if (xfs_is_readonly(mp))
b474c7ae 2128 return -EROFS;
8c567a7f 2129
8ca149de 2130 if (copy_from_user(&eofb, arg, sizeof(eofb)))
b474c7ae 2131 return -EFAULT;
8ca149de 2132
b26b2bf1 2133 error = xfs_fs_eofblocks_from_user(&eofb, &icw);
b9fe5052 2134 if (error)
2451337d 2135 return error;
8ca149de 2136
b26b2bf1 2137 trace_xfs_ioc_free_eofblocks(mp, &icw, _RET_IP_);
38899f80 2138
4b674b9a 2139 sb_start_write(mp->m_super);
b26b2bf1 2140 error = xfs_blockgc_free_space(mp, &icw);
4b674b9a
BF
2141 sb_end_write(mp->m_super);
2142 return error;
8ca149de
BF
2143 }
2144
df26cfe8
LM
2145 default:
2146 return -ENOTTY;
2147 }
2148}
This page took 1.532186 seconds and 4 git commands to generate.