]>
Commit | Line | Data |
---|---|---|
ac27a0ec | 1 | /* |
617ba13b | 2 | * linux/fs/ext4/ioctl.c |
ac27a0ec DK |
3 | * |
4 | * Copyright (C) 1993, 1994, 1995 | |
5 | * Remy Card (card@masi.ibp.fr) | |
6 | * Laboratoire MASI - Institut Blaise Pascal | |
7 | * Universite Pierre et Marie Curie (Paris VI) | |
8 | */ | |
9 | ||
10 | #include <linux/fs.h> | |
ac27a0ec | 11 | #include <linux/capability.h> |
ac27a0ec DK |
12 | #include <linux/time.h> |
13 | #include <linux/compat.h> | |
42a74f20 | 14 | #include <linux/mount.h> |
748de673 | 15 | #include <linux/file.h> |
9bd8212f | 16 | #include <linux/random.h> |
ac27a0ec | 17 | #include <asm/uaccess.h> |
3dcf5451 CH |
18 | #include "ext4_jbd2.h" |
19 | #include "ext4.h" | |
ac27a0ec | 20 | |
19c5246d YY |
21 | #define MAX_32_NUM ((((unsigned long long) 1) << 32) - 1) |
22 | ||
393d1d1d DTB |
23 | /** |
24 | * Swap memory between @a and @b for @len bytes. | |
25 | * | |
26 | * @a: pointer to first memory area | |
27 | * @b: pointer to second memory area | |
28 | * @len: number of bytes to swap | |
29 | * | |
30 | */ | |
31 | static void memswap(void *a, void *b, size_t len) | |
32 | { | |
33 | unsigned char *ap, *bp; | |
34 | unsigned char tmp; | |
35 | ||
36 | ap = (unsigned char *)a; | |
37 | bp = (unsigned char *)b; | |
38 | while (len-- > 0) { | |
39 | tmp = *ap; | |
40 | *ap = *bp; | |
41 | *bp = tmp; | |
42 | ap++; | |
43 | bp++; | |
44 | } | |
45 | } | |
46 | ||
47 | /** | |
48 | * Swap i_data and associated attributes between @inode1 and @inode2. | |
49 | * This function is used for the primary swap between inode1 and inode2 | |
50 | * and also to revert this primary swap in case of errors. | |
51 | * | |
52 | * Therefore you have to make sure, that calling this method twice | |
53 | * will revert all changes. | |
54 | * | |
55 | * @inode1: pointer to first inode | |
56 | * @inode2: pointer to second inode | |
57 | */ | |
58 | static void swap_inode_data(struct inode *inode1, struct inode *inode2) | |
59 | { | |
60 | loff_t isize; | |
61 | struct ext4_inode_info *ei1; | |
62 | struct ext4_inode_info *ei2; | |
63 | ||
64 | ei1 = EXT4_I(inode1); | |
65 | ei2 = EXT4_I(inode2); | |
66 | ||
67 | memswap(&inode1->i_flags, &inode2->i_flags, sizeof(inode1->i_flags)); | |
68 | memswap(&inode1->i_version, &inode2->i_version, | |
69 | sizeof(inode1->i_version)); | |
70 | memswap(&inode1->i_blocks, &inode2->i_blocks, | |
71 | sizeof(inode1->i_blocks)); | |
72 | memswap(&inode1->i_bytes, &inode2->i_bytes, sizeof(inode1->i_bytes)); | |
73 | memswap(&inode1->i_atime, &inode2->i_atime, sizeof(inode1->i_atime)); | |
74 | memswap(&inode1->i_mtime, &inode2->i_mtime, sizeof(inode1->i_mtime)); | |
75 | ||
76 | memswap(ei1->i_data, ei2->i_data, sizeof(ei1->i_data)); | |
77 | memswap(&ei1->i_flags, &ei2->i_flags, sizeof(ei1->i_flags)); | |
78 | memswap(&ei1->i_disksize, &ei2->i_disksize, sizeof(ei1->i_disksize)); | |
cde2d7a7 TT |
79 | ext4_es_remove_extent(inode1, 0, EXT_MAX_BLOCKS); |
80 | ext4_es_remove_extent(inode2, 0, EXT_MAX_BLOCKS); | |
393d1d1d DTB |
81 | |
82 | isize = i_size_read(inode1); | |
83 | i_size_write(inode1, i_size_read(inode2)); | |
84 | i_size_write(inode2, isize); | |
85 | } | |
86 | ||
87 | /** | |
88 | * Swap the information from the given @inode and the inode | |
89 | * EXT4_BOOT_LOADER_INO. It will basically swap i_data and all other | |
90 | * important fields of the inodes. | |
91 | * | |
92 | * @sb: the super block of the filesystem | |
93 | * @inode: the inode to swap with EXT4_BOOT_LOADER_INO | |
94 | * | |
95 | */ | |
96 | static long swap_inode_boot_loader(struct super_block *sb, | |
97 | struct inode *inode) | |
98 | { | |
99 | handle_t *handle; | |
100 | int err; | |
101 | struct inode *inode_bl; | |
393d1d1d | 102 | struct ext4_inode_info *ei_bl; |
d7092ae2 | 103 | struct ext4_sb_info *sbi = EXT4_SB(sb); |
393d1d1d | 104 | |
d8558a29 TT |
105 | if (inode->i_nlink != 1 || !S_ISREG(inode->i_mode)) |
106 | return -EINVAL; | |
393d1d1d | 107 | |
d8558a29 TT |
108 | if (!inode_owner_or_capable(inode) || !capable(CAP_SYS_ADMIN)) |
109 | return -EPERM; | |
393d1d1d | 110 | |
393d1d1d | 111 | inode_bl = ext4_iget(sb, EXT4_BOOT_LOADER_INO); |
d8558a29 TT |
112 | if (IS_ERR(inode_bl)) |
113 | return PTR_ERR(inode_bl); | |
393d1d1d DTB |
114 | ei_bl = EXT4_I(inode_bl); |
115 | ||
116 | filemap_flush(inode->i_mapping); | |
117 | filemap_flush(inode_bl->i_mapping); | |
118 | ||
119 | /* Protect orig inodes against a truncate and make sure, | |
120 | * that only 1 swap_inode_boot_loader is running. */ | |
375e289e | 121 | lock_two_nondirectories(inode, inode_bl); |
393d1d1d DTB |
122 | |
123 | truncate_inode_pages(&inode->i_data, 0); | |
124 | truncate_inode_pages(&inode_bl->i_data, 0); | |
125 | ||
126 | /* Wait for all existing dio workers */ | |
127 | ext4_inode_block_unlocked_dio(inode); | |
128 | ext4_inode_block_unlocked_dio(inode_bl); | |
129 | inode_dio_wait(inode); | |
130 | inode_dio_wait(inode_bl); | |
131 | ||
132 | handle = ext4_journal_start(inode_bl, EXT4_HT_MOVE_EXTENTS, 2); | |
133 | if (IS_ERR(handle)) { | |
134 | err = -EINVAL; | |
30d29b11 | 135 | goto journal_err_out; |
393d1d1d DTB |
136 | } |
137 | ||
138 | /* Protect extent tree against block allocations via delalloc */ | |
139 | ext4_double_down_write_data_sem(inode, inode_bl); | |
140 | ||
141 | if (inode_bl->i_nlink == 0) { | |
142 | /* this inode has never been used as a BOOT_LOADER */ | |
143 | set_nlink(inode_bl, 1); | |
144 | i_uid_write(inode_bl, 0); | |
145 | i_gid_write(inode_bl, 0); | |
146 | inode_bl->i_flags = 0; | |
147 | ei_bl->i_flags = 0; | |
148 | inode_bl->i_version = 1; | |
149 | i_size_write(inode_bl, 0); | |
150 | inode_bl->i_mode = S_IFREG; | |
151 | if (EXT4_HAS_INCOMPAT_FEATURE(sb, | |
152 | EXT4_FEATURE_INCOMPAT_EXTENTS)) { | |
153 | ext4_set_inode_flag(inode_bl, EXT4_INODE_EXTENTS); | |
154 | ext4_ext_tree_init(handle, inode_bl); | |
155 | } else | |
156 | memset(ei_bl->i_data, 0, sizeof(ei_bl->i_data)); | |
157 | } | |
158 | ||
159 | swap_inode_data(inode, inode_bl); | |
160 | ||
161 | inode->i_ctime = inode_bl->i_ctime = ext4_current_time(inode); | |
162 | ||
163 | spin_lock(&sbi->s_next_gen_lock); | |
164 | inode->i_generation = sbi->s_next_generation++; | |
165 | inode_bl->i_generation = sbi->s_next_generation++; | |
166 | spin_unlock(&sbi->s_next_gen_lock); | |
167 | ||
168 | ext4_discard_preallocations(inode); | |
169 | ||
170 | err = ext4_mark_inode_dirty(handle, inode); | |
171 | if (err < 0) { | |
172 | ext4_warning(inode->i_sb, | |
173 | "couldn't mark inode #%lu dirty (err %d)", | |
174 | inode->i_ino, err); | |
175 | /* Revert all changes: */ | |
176 | swap_inode_data(inode, inode_bl); | |
177 | } else { | |
178 | err = ext4_mark_inode_dirty(handle, inode_bl); | |
179 | if (err < 0) { | |
180 | ext4_warning(inode_bl->i_sb, | |
181 | "couldn't mark inode #%lu dirty (err %d)", | |
182 | inode_bl->i_ino, err); | |
183 | /* Revert all changes: */ | |
184 | swap_inode_data(inode, inode_bl); | |
185 | ext4_mark_inode_dirty(handle, inode); | |
186 | } | |
187 | } | |
393d1d1d | 188 | ext4_journal_stop(handle); |
393d1d1d DTB |
189 | ext4_double_up_write_data_sem(inode, inode_bl); |
190 | ||
30d29b11 | 191 | journal_err_out: |
393d1d1d DTB |
192 | ext4_inode_resume_unlocked_dio(inode); |
193 | ext4_inode_resume_unlocked_dio(inode_bl); | |
375e289e | 194 | unlock_two_nondirectories(inode, inode_bl); |
393d1d1d | 195 | iput(inode_bl); |
393d1d1d DTB |
196 | return err; |
197 | } | |
198 | ||
9bd8212f MH |
199 | static int uuid_is_zero(__u8 u[16]) |
200 | { | |
201 | int i; | |
202 | ||
203 | for (i = 0; i < 16; i++) | |
204 | if (u[i]) | |
205 | return 0; | |
206 | return 1; | |
207 | } | |
208 | ||
5cdd7b2d | 209 | long ext4_ioctl(struct file *filp, unsigned int cmd, unsigned long arg) |
ac27a0ec | 210 | { |
496ad9aa | 211 | struct inode *inode = file_inode(filp); |
bab08ab9 | 212 | struct super_block *sb = inode->i_sb; |
617ba13b | 213 | struct ext4_inode_info *ei = EXT4_I(inode); |
ac27a0ec | 214 | unsigned int flags; |
ac27a0ec | 215 | |
af5bc92d | 216 | ext4_debug("cmd = %u, arg = %lu\n", cmd, arg); |
ac27a0ec DK |
217 | |
218 | switch (cmd) { | |
617ba13b | 219 | case EXT4_IOC_GETFLAGS: |
ff9ddf7e | 220 | ext4_get_inode_flags(ei); |
617ba13b | 221 | flags = ei->i_flags & EXT4_FL_USER_VISIBLE; |
ac27a0ec | 222 | return put_user(flags, (int __user *) arg); |
617ba13b | 223 | case EXT4_IOC_SETFLAGS: { |
ac27a0ec | 224 | handle_t *handle = NULL; |
4db46fc2 | 225 | int err, migrate = 0; |
617ba13b | 226 | struct ext4_iloc iloc; |
79906964 | 227 | unsigned int oldflags, mask, i; |
ac27a0ec DK |
228 | unsigned int jflag; |
229 | ||
2e149670 | 230 | if (!inode_owner_or_capable(inode)) |
ac27a0ec DK |
231 | return -EACCES; |
232 | ||
233 | if (get_user(flags, (int __user *) arg)) | |
234 | return -EFAULT; | |
235 | ||
a561be71 | 236 | err = mnt_want_write_file(filp); |
42a74f20 DH |
237 | if (err) |
238 | return err; | |
239 | ||
2dc6b0d4 | 240 | flags = ext4_mask_flags(inode->i_mode, flags); |
ac27a0ec | 241 | |
42a74f20 | 242 | err = -EPERM; |
ac27a0ec | 243 | mutex_lock(&inode->i_mutex); |
e47776a0 | 244 | /* Is it quota file? Do not allow user to mess with it */ |
42a74f20 DH |
245 | if (IS_NOQUOTA(inode)) |
246 | goto flags_out; | |
247 | ||
ac27a0ec DK |
248 | oldflags = ei->i_flags; |
249 | ||
250 | /* The JOURNAL_DATA flag is modifiable only by root */ | |
617ba13b | 251 | jflag = flags & EXT4_JOURNAL_DATA_FL; |
ac27a0ec DK |
252 | |
253 | /* | |
254 | * The IMMUTABLE and APPEND_ONLY flags can only be changed by | |
255 | * the relevant capability. | |
256 | * | |
257 | * This test looks nicer. Thanks to Pauline Middelink | |
258 | */ | |
617ba13b | 259 | if ((flags ^ oldflags) & (EXT4_APPEND_FL | EXT4_IMMUTABLE_FL)) { |
42a74f20 DH |
260 | if (!capable(CAP_LINUX_IMMUTABLE)) |
261 | goto flags_out; | |
ac27a0ec DK |
262 | } |
263 | ||
264 | /* | |
265 | * The JOURNAL_DATA flag can only be changed by | |
266 | * the relevant capability. | |
267 | */ | |
617ba13b | 268 | if ((jflag ^ oldflags) & (EXT4_JOURNAL_DATA_FL)) { |
42a74f20 DH |
269 | if (!capable(CAP_SYS_RESOURCE)) |
270 | goto flags_out; | |
ac27a0ec | 271 | } |
996bb9fd | 272 | if ((flags ^ oldflags) & EXT4_EXTENTS_FL) |
4db46fc2 | 273 | migrate = 1; |
ac27a0ec | 274 | |
c8d46e41 JZ |
275 | if (flags & EXT4_EOFBLOCKS_FL) { |
276 | /* we don't support adding EOFBLOCKS flag */ | |
277 | if (!(oldflags & EXT4_EOFBLOCKS_FL)) { | |
278 | err = -EOPNOTSUPP; | |
279 | goto flags_out; | |
280 | } | |
281 | } else if (oldflags & EXT4_EOFBLOCKS_FL) | |
282 | ext4_truncate(inode); | |
283 | ||
9924a92a | 284 | handle = ext4_journal_start(inode, EXT4_HT_INODE, 1); |
ac27a0ec | 285 | if (IS_ERR(handle)) { |
42a74f20 DH |
286 | err = PTR_ERR(handle); |
287 | goto flags_out; | |
ac27a0ec DK |
288 | } |
289 | if (IS_SYNC(inode)) | |
0390131b | 290 | ext4_handle_sync(handle); |
617ba13b | 291 | err = ext4_reserve_inode_write(handle, inode, &iloc); |
ac27a0ec DK |
292 | if (err) |
293 | goto flags_err; | |
294 | ||
79906964 TT |
295 | for (i = 0, mask = 1; i < 32; i++, mask <<= 1) { |
296 | if (!(mask & EXT4_FL_USER_MODIFIABLE)) | |
297 | continue; | |
298 | if (mask & flags) | |
299 | ext4_set_inode_flag(inode, i); | |
300 | else | |
301 | ext4_clear_inode_flag(inode, i); | |
302 | } | |
ac27a0ec | 303 | |
617ba13b | 304 | ext4_set_inode_flags(inode); |
ef7f3835 | 305 | inode->i_ctime = ext4_current_time(inode); |
ac27a0ec | 306 | |
617ba13b | 307 | err = ext4_mark_iloc_dirty(handle, inode, &iloc); |
ac27a0ec | 308 | flags_err: |
617ba13b | 309 | ext4_journal_stop(handle); |
42a74f20 DH |
310 | if (err) |
311 | goto flags_out; | |
ac27a0ec | 312 | |
617ba13b MC |
313 | if ((jflag ^ oldflags) & (EXT4_JOURNAL_DATA_FL)) |
314 | err = ext4_change_inode_journal_flag(inode, jflag); | |
4db46fc2 AK |
315 | if (err) |
316 | goto flags_out; | |
996bb9fd TT |
317 | if (migrate) { |
318 | if (flags & EXT4_EXTENTS_FL) | |
319 | err = ext4_ext_migrate(inode); | |
320 | else | |
321 | err = ext4_ind_migrate(inode); | |
322 | } | |
323 | ||
42a74f20 | 324 | flags_out: |
ac27a0ec | 325 | mutex_unlock(&inode->i_mutex); |
2a79f17e | 326 | mnt_drop_write_file(filp); |
ac27a0ec DK |
327 | return err; |
328 | } | |
617ba13b MC |
329 | case EXT4_IOC_GETVERSION: |
330 | case EXT4_IOC_GETVERSION_OLD: | |
ac27a0ec | 331 | return put_user(inode->i_generation, (int __user *) arg); |
617ba13b MC |
332 | case EXT4_IOC_SETVERSION: |
333 | case EXT4_IOC_SETVERSION_OLD: { | |
ac27a0ec | 334 | handle_t *handle; |
617ba13b | 335 | struct ext4_iloc iloc; |
ac27a0ec DK |
336 | __u32 generation; |
337 | int err; | |
338 | ||
2e149670 | 339 | if (!inode_owner_or_capable(inode)) |
ac27a0ec | 340 | return -EPERM; |
42a74f20 | 341 | |
9aa5d32b | 342 | if (ext4_has_metadata_csum(inode->i_sb)) { |
814525f4 DW |
343 | ext4_warning(sb, "Setting inode version is not " |
344 | "supported with metadata_csum enabled."); | |
345 | return -ENOTTY; | |
346 | } | |
347 | ||
a561be71 | 348 | err = mnt_want_write_file(filp); |
42a74f20 DH |
349 | if (err) |
350 | return err; | |
351 | if (get_user(generation, (int __user *) arg)) { | |
352 | err = -EFAULT; | |
353 | goto setversion_out; | |
354 | } | |
ac27a0ec | 355 | |
6c2155b9 | 356 | mutex_lock(&inode->i_mutex); |
9924a92a | 357 | handle = ext4_journal_start(inode, EXT4_HT_INODE, 1); |
42a74f20 DH |
358 | if (IS_ERR(handle)) { |
359 | err = PTR_ERR(handle); | |
6c2155b9 | 360 | goto unlock_out; |
42a74f20 | 361 | } |
617ba13b | 362 | err = ext4_reserve_inode_write(handle, inode, &iloc); |
ac27a0ec | 363 | if (err == 0) { |
ef7f3835 | 364 | inode->i_ctime = ext4_current_time(inode); |
ac27a0ec | 365 | inode->i_generation = generation; |
617ba13b | 366 | err = ext4_mark_iloc_dirty(handle, inode, &iloc); |
ac27a0ec | 367 | } |
617ba13b | 368 | ext4_journal_stop(handle); |
6c2155b9 DH |
369 | |
370 | unlock_out: | |
371 | mutex_unlock(&inode->i_mutex); | |
42a74f20 | 372 | setversion_out: |
2a79f17e | 373 | mnt_drop_write_file(filp); |
ac27a0ec DK |
374 | return err; |
375 | } | |
617ba13b MC |
376 | case EXT4_IOC_GROUP_EXTEND: { |
377 | ext4_fsblk_t n_blocks_count; | |
ac046f1d | 378 | int err, err2=0; |
ac27a0ec | 379 | |
8f82f840 YY |
380 | err = ext4_resize_begin(sb); |
381 | if (err) | |
382 | return err; | |
ac27a0ec | 383 | |
014a1770 DH |
384 | if (get_user(n_blocks_count, (__u32 __user *)arg)) { |
385 | err = -EFAULT; | |
386 | goto group_extend_out; | |
387 | } | |
ac27a0ec | 388 | |
bab08ab9 TT |
389 | if (EXT4_HAS_RO_COMPAT_FEATURE(sb, |
390 | EXT4_FEATURE_RO_COMPAT_BIGALLOC)) { | |
391 | ext4_msg(sb, KERN_ERR, | |
392 | "Online resizing not supported with bigalloc"); | |
014a1770 DH |
393 | err = -EOPNOTSUPP; |
394 | goto group_extend_out; | |
bab08ab9 TT |
395 | } |
396 | ||
a561be71 | 397 | err = mnt_want_write_file(filp); |
42a74f20 | 398 | if (err) |
014a1770 | 399 | goto group_extend_out; |
42a74f20 | 400 | |
617ba13b | 401 | err = ext4_group_extend(sb, EXT4_SB(sb)->s_es, n_blocks_count); |
ac046f1d PT |
402 | if (EXT4_SB(sb)->s_journal) { |
403 | jbd2_journal_lock_updates(EXT4_SB(sb)->s_journal); | |
404 | err2 = jbd2_journal_flush(EXT4_SB(sb)->s_journal); | |
405 | jbd2_journal_unlock_updates(EXT4_SB(sb)->s_journal); | |
406 | } | |
7ffe1ea8 HK |
407 | if (err == 0) |
408 | err = err2; | |
2a79f17e | 409 | mnt_drop_write_file(filp); |
014a1770 | 410 | group_extend_out: |
8f82f840 | 411 | ext4_resize_end(sb); |
ac27a0ec DK |
412 | return err; |
413 | } | |
748de673 AF |
414 | |
415 | case EXT4_IOC_MOVE_EXT: { | |
416 | struct move_extent me; | |
2903ff01 AV |
417 | struct fd donor; |
418 | int err; | |
748de673 | 419 | |
4a58579b AF |
420 | if (!(filp->f_mode & FMODE_READ) || |
421 | !(filp->f_mode & FMODE_WRITE)) | |
422 | return -EBADF; | |
423 | ||
748de673 AF |
424 | if (copy_from_user(&me, |
425 | (struct move_extent __user *)arg, sizeof(me))) | |
426 | return -EFAULT; | |
4a58579b | 427 | me.moved_len = 0; |
748de673 | 428 | |
2903ff01 AV |
429 | donor = fdget(me.donor_fd); |
430 | if (!donor.file) | |
748de673 AF |
431 | return -EBADF; |
432 | ||
2903ff01 | 433 | if (!(donor.file->f_mode & FMODE_WRITE)) { |
4a58579b AF |
434 | err = -EBADF; |
435 | goto mext_out; | |
748de673 AF |
436 | } |
437 | ||
bab08ab9 TT |
438 | if (EXT4_HAS_RO_COMPAT_FEATURE(sb, |
439 | EXT4_FEATURE_RO_COMPAT_BIGALLOC)) { | |
440 | ext4_msg(sb, KERN_ERR, | |
441 | "Online defrag not supported with bigalloc"); | |
399c9b86 AV |
442 | err = -EOPNOTSUPP; |
443 | goto mext_out; | |
bab08ab9 TT |
444 | } |
445 | ||
a561be71 | 446 | err = mnt_want_write_file(filp); |
4a58579b AF |
447 | if (err) |
448 | goto mext_out; | |
449 | ||
2903ff01 | 450 | err = ext4_move_extents(filp, donor.file, me.orig_start, |
748de673 | 451 | me.donor_start, me.len, &me.moved_len); |
2a79f17e | 452 | mnt_drop_write_file(filp); |
748de673 | 453 | |
60e6679e | 454 | if (copy_to_user((struct move_extent __user *)arg, |
c437b273 | 455 | &me, sizeof(me))) |
4a58579b AF |
456 | err = -EFAULT; |
457 | mext_out: | |
2903ff01 | 458 | fdput(donor); |
748de673 AF |
459 | return err; |
460 | } | |
461 | ||
617ba13b MC |
462 | case EXT4_IOC_GROUP_ADD: { |
463 | struct ext4_new_group_data input; | |
ac046f1d | 464 | int err, err2=0; |
ac27a0ec | 465 | |
8f82f840 YY |
466 | err = ext4_resize_begin(sb); |
467 | if (err) | |
468 | return err; | |
ac27a0ec | 469 | |
617ba13b | 470 | if (copy_from_user(&input, (struct ext4_new_group_input __user *)arg, |
014a1770 DH |
471 | sizeof(input))) { |
472 | err = -EFAULT; | |
473 | goto group_add_out; | |
474 | } | |
ac27a0ec | 475 | |
bab08ab9 TT |
476 | if (EXT4_HAS_RO_COMPAT_FEATURE(sb, |
477 | EXT4_FEATURE_RO_COMPAT_BIGALLOC)) { | |
478 | ext4_msg(sb, KERN_ERR, | |
479 | "Online resizing not supported with bigalloc"); | |
014a1770 DH |
480 | err = -EOPNOTSUPP; |
481 | goto group_add_out; | |
bab08ab9 TT |
482 | } |
483 | ||
a561be71 | 484 | err = mnt_want_write_file(filp); |
42a74f20 | 485 | if (err) |
014a1770 | 486 | goto group_add_out; |
42a74f20 | 487 | |
617ba13b | 488 | err = ext4_group_add(sb, &input); |
ac046f1d PT |
489 | if (EXT4_SB(sb)->s_journal) { |
490 | jbd2_journal_lock_updates(EXT4_SB(sb)->s_journal); | |
491 | err2 = jbd2_journal_flush(EXT4_SB(sb)->s_journal); | |
492 | jbd2_journal_unlock_updates(EXT4_SB(sb)->s_journal); | |
493 | } | |
7ffe1ea8 HK |
494 | if (err == 0) |
495 | err = err2; | |
2a79f17e | 496 | mnt_drop_write_file(filp); |
7f511862 TT |
497 | if (!err && ext4_has_group_desc_csum(sb) && |
498 | test_opt(sb, INIT_INODE_TABLE)) | |
499 | err = ext4_register_li_request(sb, input.group); | |
014a1770 | 500 | group_add_out: |
8f82f840 | 501 | ext4_resize_end(sb); |
ac27a0ec DK |
502 | return err; |
503 | } | |
504 | ||
c14c6fd5 | 505 | case EXT4_IOC_MIGRATE: |
2a43a878 AK |
506 | { |
507 | int err; | |
2e149670 | 508 | if (!inode_owner_or_capable(inode)) |
2a43a878 AK |
509 | return -EACCES; |
510 | ||
a561be71 | 511 | err = mnt_want_write_file(filp); |
2a43a878 AK |
512 | if (err) |
513 | return err; | |
514 | /* | |
515 | * inode_mutex prevent write and truncate on the file. | |
516 | * Read still goes through. We take i_data_sem in | |
517 | * ext4_ext_swap_inode_data before we switch the | |
518 | * inode format to prevent read. | |
519 | */ | |
520 | mutex_lock(&(inode->i_mutex)); | |
521 | err = ext4_ext_migrate(inode); | |
522 | mutex_unlock(&(inode->i_mutex)); | |
2a79f17e | 523 | mnt_drop_write_file(filp); |
2a43a878 AK |
524 | return err; |
525 | } | |
c14c6fd5 | 526 | |
ccd2506b TT |
527 | case EXT4_IOC_ALLOC_DA_BLKS: |
528 | { | |
529 | int err; | |
2e149670 | 530 | if (!inode_owner_or_capable(inode)) |
ccd2506b TT |
531 | return -EACCES; |
532 | ||
a561be71 | 533 | err = mnt_want_write_file(filp); |
ccd2506b TT |
534 | if (err) |
535 | return err; | |
536 | err = ext4_alloc_da_blocks(inode); | |
2a79f17e | 537 | mnt_drop_write_file(filp); |
ccd2506b TT |
538 | return err; |
539 | } | |
540 | ||
393d1d1d | 541 | case EXT4_IOC_SWAP_BOOT: |
3e67cfad DM |
542 | { |
543 | int err; | |
393d1d1d DTB |
544 | if (!(filp->f_mode & FMODE_WRITE)) |
545 | return -EBADF; | |
3e67cfad DM |
546 | err = mnt_want_write_file(filp); |
547 | if (err) | |
548 | return err; | |
549 | err = swap_inode_boot_loader(sb, inode); | |
550 | mnt_drop_write_file(filp); | |
551 | return err; | |
552 | } | |
393d1d1d | 553 | |
19c5246d YY |
554 | case EXT4_IOC_RESIZE_FS: { |
555 | ext4_fsblk_t n_blocks_count; | |
19c5246d | 556 | int err = 0, err2 = 0; |
7f511862 | 557 | ext4_group_t o_group = EXT4_SB(sb)->s_groups_count; |
19c5246d YY |
558 | |
559 | if (EXT4_HAS_RO_COMPAT_FEATURE(sb, | |
560 | EXT4_FEATURE_RO_COMPAT_BIGALLOC)) { | |
561 | ext4_msg(sb, KERN_ERR, | |
562 | "Online resizing not (yet) supported with bigalloc"); | |
563 | return -EOPNOTSUPP; | |
564 | } | |
565 | ||
19c5246d YY |
566 | if (copy_from_user(&n_blocks_count, (__u64 __user *)arg, |
567 | sizeof(__u64))) { | |
568 | return -EFAULT; | |
569 | } | |
570 | ||
19c5246d YY |
571 | err = ext4_resize_begin(sb); |
572 | if (err) | |
573 | return err; | |
574 | ||
8cae6f71 | 575 | err = mnt_want_write_file(filp); |
19c5246d YY |
576 | if (err) |
577 | goto resizefs_out; | |
578 | ||
579 | err = ext4_resize_fs(sb, n_blocks_count); | |
580 | if (EXT4_SB(sb)->s_journal) { | |
581 | jbd2_journal_lock_updates(EXT4_SB(sb)->s_journal); | |
582 | err2 = jbd2_journal_flush(EXT4_SB(sb)->s_journal); | |
583 | jbd2_journal_unlock_updates(EXT4_SB(sb)->s_journal); | |
584 | } | |
585 | if (err == 0) | |
586 | err = err2; | |
8cae6f71 | 587 | mnt_drop_write_file(filp); |
7f511862 TT |
588 | if (!err && (o_group > EXT4_SB(sb)->s_groups_count) && |
589 | ext4_has_group_desc_csum(sb) && | |
590 | test_opt(sb, INIT_INODE_TABLE)) | |
591 | err = ext4_register_li_request(sb, o_group); | |
592 | ||
19c5246d YY |
593 | resizefs_out: |
594 | ext4_resize_end(sb); | |
595 | return err; | |
596 | } | |
597 | ||
e681c047 LC |
598 | case FITRIM: |
599 | { | |
41431792 | 600 | struct request_queue *q = bdev_get_queue(sb->s_bdev); |
e681c047 LC |
601 | struct fstrim_range range; |
602 | int ret = 0; | |
603 | ||
604 | if (!capable(CAP_SYS_ADMIN)) | |
605 | return -EPERM; | |
606 | ||
41431792 LC |
607 | if (!blk_queue_discard(q)) |
608 | return -EOPNOTSUPP; | |
609 | ||
e6705f7c | 610 | if (copy_from_user(&range, (struct fstrim_range __user *)arg, |
e681c047 LC |
611 | sizeof(range))) |
612 | return -EFAULT; | |
613 | ||
5c2ed62f LC |
614 | range.minlen = max((unsigned int)range.minlen, |
615 | q->limits.discard_granularity); | |
e681c047 LC |
616 | ret = ext4_trim_fs(sb, &range); |
617 | if (ret < 0) | |
618 | return ret; | |
619 | ||
e6705f7c | 620 | if (copy_to_user((struct fstrim_range __user *)arg, &range, |
e681c047 LC |
621 | sizeof(range))) |
622 | return -EFAULT; | |
623 | ||
624 | return 0; | |
625 | } | |
7869a4a6 TT |
626 | case EXT4_IOC_PRECACHE_EXTENTS: |
627 | return ext4_ext_precache(inode); | |
9bd8212f MH |
628 | case EXT4_IOC_SET_ENCRYPTION_POLICY: { |
629 | #ifdef CONFIG_EXT4_FS_ENCRYPTION | |
630 | struct ext4_encryption_policy policy; | |
631 | int err = 0; | |
632 | ||
633 | if (copy_from_user(&policy, | |
634 | (struct ext4_encryption_policy __user *)arg, | |
635 | sizeof(policy))) { | |
636 | err = -EFAULT; | |
637 | goto encryption_policy_out; | |
638 | } | |
e681c047 | 639 | |
9bd8212f MH |
640 | err = ext4_process_policy(&policy, inode); |
641 | encryption_policy_out: | |
642 | return err; | |
643 | #else | |
644 | return -EOPNOTSUPP; | |
645 | #endif | |
646 | } | |
647 | case EXT4_IOC_GET_ENCRYPTION_PWSALT: { | |
648 | int err, err2; | |
649 | struct ext4_sb_info *sbi = EXT4_SB(sb); | |
650 | handle_t *handle; | |
651 | ||
652 | if (!ext4_sb_has_crypto(sb)) | |
653 | return -EOPNOTSUPP; | |
654 | if (uuid_is_zero(sbi->s_es->s_encrypt_pw_salt)) { | |
655 | err = mnt_want_write_file(filp); | |
656 | if (err) | |
657 | return err; | |
658 | handle = ext4_journal_start_sb(sb, EXT4_HT_MISC, 1); | |
659 | if (IS_ERR(handle)) { | |
660 | err = PTR_ERR(handle); | |
661 | goto pwsalt_err_exit; | |
662 | } | |
663 | err = ext4_journal_get_write_access(handle, sbi->s_sbh); | |
664 | if (err) | |
665 | goto pwsalt_err_journal; | |
666 | generate_random_uuid(sbi->s_es->s_encrypt_pw_salt); | |
667 | err = ext4_handle_dirty_metadata(handle, NULL, | |
668 | sbi->s_sbh); | |
669 | pwsalt_err_journal: | |
670 | err2 = ext4_journal_stop(handle); | |
671 | if (err2 && !err) | |
672 | err = err2; | |
673 | pwsalt_err_exit: | |
674 | mnt_drop_write_file(filp); | |
675 | if (err) | |
676 | return err; | |
677 | } | |
b4ab9e29 FF |
678 | if (copy_to_user((void __user *) arg, |
679 | sbi->s_es->s_encrypt_pw_salt, 16)) | |
9bd8212f MH |
680 | return -EFAULT; |
681 | return 0; | |
682 | } | |
683 | case EXT4_IOC_GET_ENCRYPTION_POLICY: { | |
684 | #ifdef CONFIG_EXT4_FS_ENCRYPTION | |
685 | struct ext4_encryption_policy policy; | |
686 | int err = 0; | |
687 | ||
688 | if (!ext4_encrypted_inode(inode)) | |
689 | return -ENOENT; | |
690 | err = ext4_get_policy(inode, &policy); | |
691 | if (err) | |
692 | return err; | |
b4ab9e29 | 693 | if (copy_to_user((void __user *)arg, &policy, sizeof(policy))) |
9bd8212f MH |
694 | return -EFAULT; |
695 | return 0; | |
696 | #else | |
697 | return -EOPNOTSUPP; | |
698 | #endif | |
699 | } | |
ac27a0ec DK |
700 | default: |
701 | return -ENOTTY; | |
702 | } | |
703 | } | |
704 | ||
705 | #ifdef CONFIG_COMPAT | |
617ba13b | 706 | long ext4_compat_ioctl(struct file *file, unsigned int cmd, unsigned long arg) |
ac27a0ec | 707 | { |
ac27a0ec DK |
708 | /* These are just misnamed, they actually get/put from/to user an int */ |
709 | switch (cmd) { | |
617ba13b MC |
710 | case EXT4_IOC32_GETFLAGS: |
711 | cmd = EXT4_IOC_GETFLAGS; | |
ac27a0ec | 712 | break; |
617ba13b MC |
713 | case EXT4_IOC32_SETFLAGS: |
714 | cmd = EXT4_IOC_SETFLAGS; | |
ac27a0ec | 715 | break; |
617ba13b MC |
716 | case EXT4_IOC32_GETVERSION: |
717 | cmd = EXT4_IOC_GETVERSION; | |
ac27a0ec | 718 | break; |
617ba13b MC |
719 | case EXT4_IOC32_SETVERSION: |
720 | cmd = EXT4_IOC_SETVERSION; | |
ac27a0ec | 721 | break; |
617ba13b MC |
722 | case EXT4_IOC32_GROUP_EXTEND: |
723 | cmd = EXT4_IOC_GROUP_EXTEND; | |
ac27a0ec | 724 | break; |
617ba13b MC |
725 | case EXT4_IOC32_GETVERSION_OLD: |
726 | cmd = EXT4_IOC_GETVERSION_OLD; | |
ac27a0ec | 727 | break; |
617ba13b MC |
728 | case EXT4_IOC32_SETVERSION_OLD: |
729 | cmd = EXT4_IOC_SETVERSION_OLD; | |
ac27a0ec | 730 | break; |
617ba13b MC |
731 | case EXT4_IOC32_GETRSVSZ: |
732 | cmd = EXT4_IOC_GETRSVSZ; | |
ac27a0ec | 733 | break; |
617ba13b MC |
734 | case EXT4_IOC32_SETRSVSZ: |
735 | cmd = EXT4_IOC_SETRSVSZ; | |
ac27a0ec | 736 | break; |
4d92dc0f BH |
737 | case EXT4_IOC32_GROUP_ADD: { |
738 | struct compat_ext4_new_group_input __user *uinput; | |
739 | struct ext4_new_group_input input; | |
740 | mm_segment_t old_fs; | |
741 | int err; | |
742 | ||
743 | uinput = compat_ptr(arg); | |
744 | err = get_user(input.group, &uinput->group); | |
745 | err |= get_user(input.block_bitmap, &uinput->block_bitmap); | |
746 | err |= get_user(input.inode_bitmap, &uinput->inode_bitmap); | |
747 | err |= get_user(input.inode_table, &uinput->inode_table); | |
748 | err |= get_user(input.blocks_count, &uinput->blocks_count); | |
749 | err |= get_user(input.reserved_blocks, | |
750 | &uinput->reserved_blocks); | |
751 | if (err) | |
752 | return -EFAULT; | |
753 | old_fs = get_fs(); | |
754 | set_fs(KERNEL_DS); | |
755 | err = ext4_ioctl(file, EXT4_IOC_GROUP_ADD, | |
756 | (unsigned long) &input); | |
757 | set_fs(old_fs); | |
758 | return err; | |
759 | } | |
b684b2ee | 760 | case EXT4_IOC_MOVE_EXT: |
a56e69c2 | 761 | case FITRIM: |
19c5246d | 762 | case EXT4_IOC_RESIZE_FS: |
7869a4a6 | 763 | case EXT4_IOC_PRECACHE_EXTENTS: |
9bd8212f MH |
764 | case EXT4_IOC_SET_ENCRYPTION_POLICY: |
765 | case EXT4_IOC_GET_ENCRYPTION_PWSALT: | |
766 | case EXT4_IOC_GET_ENCRYPTION_POLICY: | |
b684b2ee | 767 | break; |
ac27a0ec DK |
768 | default: |
769 | return -ENOIOCTLCMD; | |
770 | } | |
5cdd7b2d | 771 | return ext4_ioctl(file, cmd, (unsigned long) compat_ptr(arg)); |
ac27a0ec DK |
772 | } |
773 | #endif |