]> bbs.cooldavid.org Git - net-next-2.6.git/blame - fs/ext4/ioctl.c
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm
[net-next-2.6.git] / fs / ext4 / ioctl.c
CommitLineData
ac27a0ec 1/*
617ba13b 2 * linux/fs/ext4/ioctl.c
ac27a0ec
DK
3 *
4 * Copyright (C) 1993, 1994, 1995
5 * Remy Card (card@masi.ibp.fr)
6 * Laboratoire MASI - Institut Blaise Pascal
7 * Universite Pierre et Marie Curie (Paris VI)
8 */
9
10#include <linux/fs.h>
dab291af 11#include <linux/jbd2.h>
ac27a0ec 12#include <linux/capability.h>
617ba13b 13#include <linux/ext4_fs.h>
dab291af 14#include <linux/ext4_jbd2.h>
ac27a0ec
DK
15#include <linux/time.h>
16#include <linux/compat.h>
17#include <linux/smp_lock.h>
18#include <asm/uaccess.h>
19
617ba13b 20int ext4_ioctl (struct inode * inode, struct file * filp, unsigned int cmd,
ac27a0ec
DK
21 unsigned long arg)
22{
617ba13b 23 struct ext4_inode_info *ei = EXT4_I(inode);
ac27a0ec
DK
24 unsigned int flags;
25 unsigned short rsv_window_size;
26
617ba13b 27 ext4_debug ("cmd = %u, arg = %lu\n", cmd, arg);
ac27a0ec
DK
28
29 switch (cmd) {
617ba13b
MC
30 case EXT4_IOC_GETFLAGS:
31 flags = ei->i_flags & EXT4_FL_USER_VISIBLE;
ac27a0ec 32 return put_user(flags, (int __user *) arg);
617ba13b 33 case EXT4_IOC_SETFLAGS: {
ac27a0ec
DK
34 handle_t *handle = NULL;
35 int err;
617ba13b 36 struct ext4_iloc iloc;
ac27a0ec
DK
37 unsigned int oldflags;
38 unsigned int jflag;
39
40 if (IS_RDONLY(inode))
41 return -EROFS;
42
43 if ((current->fsuid != inode->i_uid) && !capable(CAP_FOWNER))
44 return -EACCES;
45
46 if (get_user(flags, (int __user *) arg))
47 return -EFAULT;
48
49 if (!S_ISDIR(inode->i_mode))
617ba13b 50 flags &= ~EXT4_DIRSYNC_FL;
ac27a0ec
DK
51
52 mutex_lock(&inode->i_mutex);
53 oldflags = ei->i_flags;
54
55 /* The JOURNAL_DATA flag is modifiable only by root */
617ba13b 56 jflag = flags & EXT4_JOURNAL_DATA_FL;
ac27a0ec
DK
57
58 /*
59 * The IMMUTABLE and APPEND_ONLY flags can only be changed by
60 * the relevant capability.
61 *
62 * This test looks nicer. Thanks to Pauline Middelink
63 */
617ba13b 64 if ((flags ^ oldflags) & (EXT4_APPEND_FL | EXT4_IMMUTABLE_FL)) {
ac27a0ec
DK
65 if (!capable(CAP_LINUX_IMMUTABLE)) {
66 mutex_unlock(&inode->i_mutex);
67 return -EPERM;
68 }
69 }
70
71 /*
72 * The JOURNAL_DATA flag can only be changed by
73 * the relevant capability.
74 */
617ba13b 75 if ((jflag ^ oldflags) & (EXT4_JOURNAL_DATA_FL)) {
ac27a0ec
DK
76 if (!capable(CAP_SYS_RESOURCE)) {
77 mutex_unlock(&inode->i_mutex);
78 return -EPERM;
79 }
80 }
81
82
617ba13b 83 handle = ext4_journal_start(inode, 1);
ac27a0ec
DK
84 if (IS_ERR(handle)) {
85 mutex_unlock(&inode->i_mutex);
86 return PTR_ERR(handle);
87 }
88 if (IS_SYNC(inode))
89 handle->h_sync = 1;
617ba13b 90 err = ext4_reserve_inode_write(handle, inode, &iloc);
ac27a0ec
DK
91 if (err)
92 goto flags_err;
93
617ba13b
MC
94 flags = flags & EXT4_FL_USER_MODIFIABLE;
95 flags |= oldflags & ~EXT4_FL_USER_MODIFIABLE;
ac27a0ec
DK
96 ei->i_flags = flags;
97
617ba13b 98 ext4_set_inode_flags(inode);
ac27a0ec
DK
99 inode->i_ctime = CURRENT_TIME_SEC;
100
617ba13b 101 err = ext4_mark_iloc_dirty(handle, inode, &iloc);
ac27a0ec 102flags_err:
617ba13b 103 ext4_journal_stop(handle);
ac27a0ec
DK
104 if (err) {
105 mutex_unlock(&inode->i_mutex);
106 return err;
107 }
108
617ba13b
MC
109 if ((jflag ^ oldflags) & (EXT4_JOURNAL_DATA_FL))
110 err = ext4_change_inode_journal_flag(inode, jflag);
ac27a0ec
DK
111 mutex_unlock(&inode->i_mutex);
112 return err;
113 }
617ba13b
MC
114 case EXT4_IOC_GETVERSION:
115 case EXT4_IOC_GETVERSION_OLD:
ac27a0ec 116 return put_user(inode->i_generation, (int __user *) arg);
617ba13b
MC
117 case EXT4_IOC_SETVERSION:
118 case EXT4_IOC_SETVERSION_OLD: {
ac27a0ec 119 handle_t *handle;
617ba13b 120 struct ext4_iloc iloc;
ac27a0ec
DK
121 __u32 generation;
122 int err;
123
124 if ((current->fsuid != inode->i_uid) && !capable(CAP_FOWNER))
125 return -EPERM;
126 if (IS_RDONLY(inode))
127 return -EROFS;
128 if (get_user(generation, (int __user *) arg))
129 return -EFAULT;
130
617ba13b 131 handle = ext4_journal_start(inode, 1);
ac27a0ec
DK
132 if (IS_ERR(handle))
133 return PTR_ERR(handle);
617ba13b 134 err = ext4_reserve_inode_write(handle, inode, &iloc);
ac27a0ec
DK
135 if (err == 0) {
136 inode->i_ctime = CURRENT_TIME_SEC;
137 inode->i_generation = generation;
617ba13b 138 err = ext4_mark_iloc_dirty(handle, inode, &iloc);
ac27a0ec 139 }
617ba13b 140 ext4_journal_stop(handle);
ac27a0ec
DK
141 return err;
142 }
143#ifdef CONFIG_JBD_DEBUG
617ba13b 144 case EXT4_IOC_WAIT_FOR_READONLY:
ac27a0ec
DK
145 /*
146 * This is racy - by the time we're woken up and running,
147 * the superblock could be released. And the module could
148 * have been unloaded. So sue me.
149 *
150 * Returns 1 if it slept, else zero.
151 */
152 {
153 struct super_block *sb = inode->i_sb;
154 DECLARE_WAITQUEUE(wait, current);
155 int ret = 0;
156
157 set_current_state(TASK_INTERRUPTIBLE);
617ba13b
MC
158 add_wait_queue(&EXT4_SB(sb)->ro_wait_queue, &wait);
159 if (timer_pending(&EXT4_SB(sb)->turn_ro_timer)) {
ac27a0ec
DK
160 schedule();
161 ret = 1;
162 }
617ba13b 163 remove_wait_queue(&EXT4_SB(sb)->ro_wait_queue, &wait);
ac27a0ec
DK
164 return ret;
165 }
166#endif
617ba13b 167 case EXT4_IOC_GETRSVSZ:
ac27a0ec
DK
168 if (test_opt(inode->i_sb, RESERVATION)
169 && S_ISREG(inode->i_mode)
170 && ei->i_block_alloc_info) {
171 rsv_window_size = ei->i_block_alloc_info->rsv_window_node.rsv_goal_size;
172 return put_user(rsv_window_size, (int __user *)arg);
173 }
174 return -ENOTTY;
617ba13b 175 case EXT4_IOC_SETRSVSZ: {
ac27a0ec
DK
176
177 if (!test_opt(inode->i_sb, RESERVATION) ||!S_ISREG(inode->i_mode))
178 return -ENOTTY;
179
180 if (IS_RDONLY(inode))
181 return -EROFS;
182
183 if ((current->fsuid != inode->i_uid) && !capable(CAP_FOWNER))
184 return -EACCES;
185
186 if (get_user(rsv_window_size, (int __user *)arg))
187 return -EFAULT;
188
617ba13b
MC
189 if (rsv_window_size > EXT4_MAX_RESERVE_BLOCKS)
190 rsv_window_size = EXT4_MAX_RESERVE_BLOCKS;
ac27a0ec
DK
191
192 /*
193 * need to allocate reservation structure for this inode
194 * before set the window size
195 */
196 mutex_lock(&ei->truncate_mutex);
197 if (!ei->i_block_alloc_info)
617ba13b 198 ext4_init_block_alloc_info(inode);
ac27a0ec
DK
199
200 if (ei->i_block_alloc_info){
617ba13b 201 struct ext4_reserve_window_node *rsv = &ei->i_block_alloc_info->rsv_window_node;
ac27a0ec
DK
202 rsv->rsv_goal_size = rsv_window_size;
203 }
204 mutex_unlock(&ei->truncate_mutex);
205 return 0;
206 }
617ba13b
MC
207 case EXT4_IOC_GROUP_EXTEND: {
208 ext4_fsblk_t n_blocks_count;
ac27a0ec
DK
209 struct super_block *sb = inode->i_sb;
210 int err;
211
212 if (!capable(CAP_SYS_RESOURCE))
213 return -EPERM;
214
215 if (IS_RDONLY(inode))
216 return -EROFS;
217
218 if (get_user(n_blocks_count, (__u32 __user *)arg))
219 return -EFAULT;
220
617ba13b 221 err = ext4_group_extend(sb, EXT4_SB(sb)->s_es, n_blocks_count);
dab291af
MC
222 jbd2_journal_lock_updates(EXT4_SB(sb)->s_journal);
223 jbd2_journal_flush(EXT4_SB(sb)->s_journal);
224 jbd2_journal_unlock_updates(EXT4_SB(sb)->s_journal);
ac27a0ec
DK
225
226 return err;
227 }
617ba13b
MC
228 case EXT4_IOC_GROUP_ADD: {
229 struct ext4_new_group_data input;
ac27a0ec
DK
230 struct super_block *sb = inode->i_sb;
231 int err;
232
233 if (!capable(CAP_SYS_RESOURCE))
234 return -EPERM;
235
236 if (IS_RDONLY(inode))
237 return -EROFS;
238
617ba13b 239 if (copy_from_user(&input, (struct ext4_new_group_input __user *)arg,
ac27a0ec
DK
240 sizeof(input)))
241 return -EFAULT;
242
617ba13b 243 err = ext4_group_add(sb, &input);
dab291af
MC
244 jbd2_journal_lock_updates(EXT4_SB(sb)->s_journal);
245 jbd2_journal_flush(EXT4_SB(sb)->s_journal);
246 jbd2_journal_unlock_updates(EXT4_SB(sb)->s_journal);
ac27a0ec
DK
247
248 return err;
249 }
250
ac27a0ec
DK
251 default:
252 return -ENOTTY;
253 }
254}
255
256#ifdef CONFIG_COMPAT
617ba13b 257long ext4_compat_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
ac27a0ec 258{
9d549890 259 struct inode *inode = file->f_path.dentry->d_inode;
ac27a0ec
DK
260 int ret;
261
262 /* These are just misnamed, they actually get/put from/to user an int */
263 switch (cmd) {
617ba13b
MC
264 case EXT4_IOC32_GETFLAGS:
265 cmd = EXT4_IOC_GETFLAGS;
ac27a0ec 266 break;
617ba13b
MC
267 case EXT4_IOC32_SETFLAGS:
268 cmd = EXT4_IOC_SETFLAGS;
ac27a0ec 269 break;
617ba13b
MC
270 case EXT4_IOC32_GETVERSION:
271 cmd = EXT4_IOC_GETVERSION;
ac27a0ec 272 break;
617ba13b
MC
273 case EXT4_IOC32_SETVERSION:
274 cmd = EXT4_IOC_SETVERSION;
ac27a0ec 275 break;
617ba13b
MC
276 case EXT4_IOC32_GROUP_EXTEND:
277 cmd = EXT4_IOC_GROUP_EXTEND;
ac27a0ec 278 break;
617ba13b
MC
279 case EXT4_IOC32_GETVERSION_OLD:
280 cmd = EXT4_IOC_GETVERSION_OLD;
ac27a0ec 281 break;
617ba13b
MC
282 case EXT4_IOC32_SETVERSION_OLD:
283 cmd = EXT4_IOC_SETVERSION_OLD;
ac27a0ec
DK
284 break;
285#ifdef CONFIG_JBD_DEBUG
617ba13b
MC
286 case EXT4_IOC32_WAIT_FOR_READONLY:
287 cmd = EXT4_IOC_WAIT_FOR_READONLY;
ac27a0ec
DK
288 break;
289#endif
617ba13b
MC
290 case EXT4_IOC32_GETRSVSZ:
291 cmd = EXT4_IOC_GETRSVSZ;
ac27a0ec 292 break;
617ba13b
MC
293 case EXT4_IOC32_SETRSVSZ:
294 cmd = EXT4_IOC_SETRSVSZ;
ac27a0ec 295 break;
617ba13b 296 case EXT4_IOC_GROUP_ADD:
ac27a0ec
DK
297 break;
298 default:
299 return -ENOIOCTLCMD;
300 }
301 lock_kernel();
617ba13b 302 ret = ext4_ioctl(inode, file, cmd, (unsigned long) compat_ptr(arg));
ac27a0ec
DK
303 unlock_kernel();
304 return ret;
305}
306#endif