xref: /openbmc/linux/fs/ext4/ioctl.c (revision ff694ab6)
1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
2ac27a0ecSDave Kleikamp /*
3617ba13bSMingming Cao  * linux/fs/ext4/ioctl.c
4ac27a0ecSDave Kleikamp  *
5ac27a0ecSDave Kleikamp  * Copyright (C) 1993, 1994, 1995
6ac27a0ecSDave Kleikamp  * Remy Card (card@masi.ibp.fr)
7ac27a0ecSDave Kleikamp  * Laboratoire MASI - Institut Blaise Pascal
8ac27a0ecSDave Kleikamp  * Universite Pierre et Marie Curie (Paris VI)
9ac27a0ecSDave Kleikamp  */
10ac27a0ecSDave Kleikamp 
11ac27a0ecSDave Kleikamp #include <linux/fs.h>
12ac27a0ecSDave Kleikamp #include <linux/capability.h>
13ac27a0ecSDave Kleikamp #include <linux/time.h>
14ac27a0ecSDave Kleikamp #include <linux/compat.h>
1542a74f20SDave Hansen #include <linux/mount.h>
16748de673SAkira Fujita #include <linux/file.h>
179b7365fcSLi Xi #include <linux/quotaops.h>
1823253068STheodore Ts'o #include <linux/random.h>
198da4b8c4SAndy Shevchenko #include <linux/uuid.h>
207c0f6ba6SLinus Torvalds #include <linux/uaccess.h>
21783d9485STheodore Ts'o #include <linux/delay.h>
22ee73f9a5SJeff Layton #include <linux/iversion.h>
233dcf5451SChristoph Hellwig #include "ext4_jbd2.h"
243dcf5451SChristoph Hellwig #include "ext4.h"
250c9ec4beSDarrick J. Wong #include <linux/fsmap.h>
260c9ec4beSDarrick J. Wong #include "fsmap.h"
270c9ec4beSDarrick J. Wong #include <trace/events/ext4.h>
28ac27a0ecSDave Kleikamp 
29393d1d1dSDr. Tilmann Bubeck /**
30393d1d1dSDr. Tilmann Bubeck  * Swap memory between @a and @b for @len bytes.
31393d1d1dSDr. Tilmann Bubeck  *
32393d1d1dSDr. Tilmann Bubeck  * @a:          pointer to first memory area
33393d1d1dSDr. Tilmann Bubeck  * @b:          pointer to second memory area
34393d1d1dSDr. Tilmann Bubeck  * @len:        number of bytes to swap
35393d1d1dSDr. Tilmann Bubeck  *
36393d1d1dSDr. Tilmann Bubeck  */
37393d1d1dSDr. Tilmann Bubeck static void memswap(void *a, void *b, size_t len)
38393d1d1dSDr. Tilmann Bubeck {
39393d1d1dSDr. Tilmann Bubeck 	unsigned char *ap, *bp;
40393d1d1dSDr. Tilmann Bubeck 
41393d1d1dSDr. Tilmann Bubeck 	ap = (unsigned char *)a;
42393d1d1dSDr. Tilmann Bubeck 	bp = (unsigned char *)b;
43393d1d1dSDr. Tilmann Bubeck 	while (len-- > 0) {
444b7e2db5SFabian Frederick 		swap(*ap, *bp);
45393d1d1dSDr. Tilmann Bubeck 		ap++;
46393d1d1dSDr. Tilmann Bubeck 		bp++;
47393d1d1dSDr. Tilmann Bubeck 	}
48393d1d1dSDr. Tilmann Bubeck }
49393d1d1dSDr. Tilmann Bubeck 
50393d1d1dSDr. Tilmann Bubeck /**
51393d1d1dSDr. Tilmann Bubeck  * Swap i_data and associated attributes between @inode1 and @inode2.
52393d1d1dSDr. Tilmann Bubeck  * This function is used for the primary swap between inode1 and inode2
53393d1d1dSDr. Tilmann Bubeck  * and also to revert this primary swap in case of errors.
54393d1d1dSDr. Tilmann Bubeck  *
55393d1d1dSDr. Tilmann Bubeck  * Therefore you have to make sure, that calling this method twice
56393d1d1dSDr. Tilmann Bubeck  * will revert all changes.
57393d1d1dSDr. Tilmann Bubeck  *
58393d1d1dSDr. Tilmann Bubeck  * @inode1:     pointer to first inode
59393d1d1dSDr. Tilmann Bubeck  * @inode2:     pointer to second inode
60393d1d1dSDr. Tilmann Bubeck  */
61393d1d1dSDr. Tilmann Bubeck static void swap_inode_data(struct inode *inode1, struct inode *inode2)
62393d1d1dSDr. Tilmann Bubeck {
63393d1d1dSDr. Tilmann Bubeck 	loff_t isize;
64393d1d1dSDr. Tilmann Bubeck 	struct ext4_inode_info *ei1;
65393d1d1dSDr. Tilmann Bubeck 	struct ext4_inode_info *ei2;
66abdc644eSyangerkun 	unsigned long tmp;
67393d1d1dSDr. Tilmann Bubeck 
68393d1d1dSDr. Tilmann Bubeck 	ei1 = EXT4_I(inode1);
69393d1d1dSDr. Tilmann Bubeck 	ei2 = EXT4_I(inode2);
70393d1d1dSDr. Tilmann Bubeck 
719c5d58fbSJeff Layton 	swap(inode1->i_version, inode2->i_version);
729c5d58fbSJeff Layton 	swap(inode1->i_atime, inode2->i_atime);
739c5d58fbSJeff Layton 	swap(inode1->i_mtime, inode2->i_mtime);
74393d1d1dSDr. Tilmann Bubeck 
75393d1d1dSDr. Tilmann Bubeck 	memswap(ei1->i_data, ei2->i_data, sizeof(ei1->i_data));
76abdc644eSyangerkun 	tmp = ei1->i_flags & EXT4_FL_SHOULD_SWAP;
77abdc644eSyangerkun 	ei1->i_flags = (ei2->i_flags & EXT4_FL_SHOULD_SWAP) |
78abdc644eSyangerkun 		(ei1->i_flags & ~EXT4_FL_SHOULD_SWAP);
79abdc644eSyangerkun 	ei2->i_flags = tmp | (ei2->i_flags & ~EXT4_FL_SHOULD_SWAP);
809c5d58fbSJeff Layton 	swap(ei1->i_disksize, ei2->i_disksize);
81cde2d7a7STheodore Ts'o 	ext4_es_remove_extent(inode1, 0, EXT_MAX_BLOCKS);
82cde2d7a7STheodore Ts'o 	ext4_es_remove_extent(inode2, 0, EXT_MAX_BLOCKS);
83393d1d1dSDr. Tilmann Bubeck 
84393d1d1dSDr. Tilmann Bubeck 	isize = i_size_read(inode1);
85393d1d1dSDr. Tilmann Bubeck 	i_size_write(inode1, i_size_read(inode2));
86393d1d1dSDr. Tilmann Bubeck 	i_size_write(inode2, isize);
87393d1d1dSDr. Tilmann Bubeck }
88393d1d1dSDr. Tilmann Bubeck 
8918aded17STheodore Ts'o static void reset_inode_seed(struct inode *inode)
9018aded17STheodore Ts'o {
9118aded17STheodore Ts'o 	struct ext4_inode_info *ei = EXT4_I(inode);
9218aded17STheodore Ts'o 	struct ext4_sb_info *sbi = EXT4_SB(inode->i_sb);
9318aded17STheodore Ts'o 	__le32 inum = cpu_to_le32(inode->i_ino);
9418aded17STheodore Ts'o 	__le32 gen = cpu_to_le32(inode->i_generation);
9518aded17STheodore Ts'o 	__u32 csum;
9618aded17STheodore Ts'o 
9718aded17STheodore Ts'o 	if (!ext4_has_metadata_csum(inode->i_sb))
9818aded17STheodore Ts'o 		return;
9918aded17STheodore Ts'o 
10018aded17STheodore Ts'o 	csum = ext4_chksum(sbi, sbi->s_csum_seed, (__u8 *)&inum, sizeof(inum));
10118aded17STheodore Ts'o 	ei->i_csum_seed = ext4_chksum(sbi, csum, (__u8 *)&gen, sizeof(gen));
10218aded17STheodore Ts'o }
10318aded17STheodore Ts'o 
104393d1d1dSDr. Tilmann Bubeck /**
105393d1d1dSDr. Tilmann Bubeck  * Swap the information from the given @inode and the inode
106393d1d1dSDr. Tilmann Bubeck  * EXT4_BOOT_LOADER_INO. It will basically swap i_data and all other
107393d1d1dSDr. Tilmann Bubeck  * important fields of the inodes.
108393d1d1dSDr. Tilmann Bubeck  *
109393d1d1dSDr. Tilmann Bubeck  * @sb:         the super block of the filesystem
110393d1d1dSDr. Tilmann Bubeck  * @inode:      the inode to swap with EXT4_BOOT_LOADER_INO
111393d1d1dSDr. Tilmann Bubeck  *
112393d1d1dSDr. Tilmann Bubeck  */
113393d1d1dSDr. Tilmann Bubeck static long swap_inode_boot_loader(struct super_block *sb,
114393d1d1dSDr. Tilmann Bubeck 				struct inode *inode)
115393d1d1dSDr. Tilmann Bubeck {
116393d1d1dSDr. Tilmann Bubeck 	handle_t *handle;
117393d1d1dSDr. Tilmann Bubeck 	int err;
118393d1d1dSDr. Tilmann Bubeck 	struct inode *inode_bl;
119393d1d1dSDr. Tilmann Bubeck 	struct ext4_inode_info *ei_bl;
120aa507b5fSyangerkun 	qsize_t size, size_bl, diff;
121aa507b5fSyangerkun 	blkcnt_t blocks;
122aa507b5fSyangerkun 	unsigned short bytes;
123393d1d1dSDr. Tilmann Bubeck 
1248a363970STheodore Ts'o 	inode_bl = ext4_iget(sb, EXT4_BOOT_LOADER_INO, EXT4_IGET_SPECIAL);
125d8558a29STheodore Ts'o 	if (IS_ERR(inode_bl))
126d8558a29STheodore Ts'o 		return PTR_ERR(inode_bl);
127393d1d1dSDr. Tilmann Bubeck 	ei_bl = EXT4_I(inode_bl);
128393d1d1dSDr. Tilmann Bubeck 
129393d1d1dSDr. Tilmann Bubeck 	/* Protect orig inodes against a truncate and make sure,
130393d1d1dSDr. Tilmann Bubeck 	 * that only 1 swap_inode_boot_loader is running. */
131375e289eSJ. Bruce Fields 	lock_two_nondirectories(inode, inode_bl);
132393d1d1dSDr. Tilmann Bubeck 
13367a11611Syangerkun 	if (inode->i_nlink != 1 || !S_ISREG(inode->i_mode) ||
13467a11611Syangerkun 	    IS_SWAPFILE(inode) || IS_ENCRYPTED(inode) ||
1356e589291STheodore Ts'o 	    (EXT4_I(inode)->i_flags & EXT4_JOURNAL_DATA_FL) ||
13667a11611Syangerkun 	    ext4_has_inline_data(inode)) {
13767a11611Syangerkun 		err = -EINVAL;
13867a11611Syangerkun 		goto journal_err_out;
13967a11611Syangerkun 	}
14067a11611Syangerkun 
14167a11611Syangerkun 	if (IS_RDONLY(inode) || IS_APPEND(inode) || IS_IMMUTABLE(inode) ||
14267a11611Syangerkun 	    !inode_owner_or_capable(inode) || !capable(CAP_SYS_ADMIN)) {
14367a11611Syangerkun 		err = -EPERM;
14467a11611Syangerkun 		goto journal_err_out;
14567a11611Syangerkun 	}
14667a11611Syangerkun 
147a46c68a3Syangerkun 	down_write(&EXT4_I(inode)->i_mmap_sem);
148a46c68a3Syangerkun 	err = filemap_write_and_wait(inode->i_mapping);
149a46c68a3Syangerkun 	if (err)
150a46c68a3Syangerkun 		goto err_out;
151a46c68a3Syangerkun 
152a46c68a3Syangerkun 	err = filemap_write_and_wait(inode_bl->i_mapping);
153a46c68a3Syangerkun 	if (err)
154a46c68a3Syangerkun 		goto err_out;
155a46c68a3Syangerkun 
156393d1d1dSDr. Tilmann Bubeck 	/* Wait for all existing dio workers */
157393d1d1dSDr. Tilmann Bubeck 	inode_dio_wait(inode);
158393d1d1dSDr. Tilmann Bubeck 	inode_dio_wait(inode_bl);
159393d1d1dSDr. Tilmann Bubeck 
16018aded17STheodore Ts'o 	truncate_inode_pages(&inode->i_data, 0);
16118aded17STheodore Ts'o 	truncate_inode_pages(&inode_bl->i_data, 0);
16218aded17STheodore Ts'o 
163393d1d1dSDr. Tilmann Bubeck 	handle = ext4_journal_start(inode_bl, EXT4_HT_MOVE_EXTENTS, 2);
164393d1d1dSDr. Tilmann Bubeck 	if (IS_ERR(handle)) {
165393d1d1dSDr. Tilmann Bubeck 		err = -EINVAL;
166a46c68a3Syangerkun 		goto err_out;
167393d1d1dSDr. Tilmann Bubeck 	}
168393d1d1dSDr. Tilmann Bubeck 
169393d1d1dSDr. Tilmann Bubeck 	/* Protect extent tree against block allocations via delalloc */
170393d1d1dSDr. Tilmann Bubeck 	ext4_double_down_write_data_sem(inode, inode_bl);
171393d1d1dSDr. Tilmann Bubeck 
172393d1d1dSDr. Tilmann Bubeck 	if (inode_bl->i_nlink == 0) {
173393d1d1dSDr. Tilmann Bubeck 		/* this inode has never been used as a BOOT_LOADER */
174393d1d1dSDr. Tilmann Bubeck 		set_nlink(inode_bl, 1);
175393d1d1dSDr. Tilmann Bubeck 		i_uid_write(inode_bl, 0);
176393d1d1dSDr. Tilmann Bubeck 		i_gid_write(inode_bl, 0);
177393d1d1dSDr. Tilmann Bubeck 		inode_bl->i_flags = 0;
178393d1d1dSDr. Tilmann Bubeck 		ei_bl->i_flags = 0;
179ee73f9a5SJeff Layton 		inode_set_iversion(inode_bl, 1);
180393d1d1dSDr. Tilmann Bubeck 		i_size_write(inode_bl, 0);
181393d1d1dSDr. Tilmann Bubeck 		inode_bl->i_mode = S_IFREG;
182e2b911c5SDarrick J. Wong 		if (ext4_has_feature_extents(sb)) {
183393d1d1dSDr. Tilmann Bubeck 			ext4_set_inode_flag(inode_bl, EXT4_INODE_EXTENTS);
184393d1d1dSDr. Tilmann Bubeck 			ext4_ext_tree_init(handle, inode_bl);
185393d1d1dSDr. Tilmann Bubeck 		} else
186393d1d1dSDr. Tilmann Bubeck 			memset(ei_bl->i_data, 0, sizeof(ei_bl->i_data));
187393d1d1dSDr. Tilmann Bubeck 	}
188393d1d1dSDr. Tilmann Bubeck 
189aa507b5fSyangerkun 	err = dquot_initialize(inode);
190aa507b5fSyangerkun 	if (err)
191aa507b5fSyangerkun 		goto err_out1;
192aa507b5fSyangerkun 
193aa507b5fSyangerkun 	size = (qsize_t)(inode->i_blocks) * (1 << 9) + inode->i_bytes;
194aa507b5fSyangerkun 	size_bl = (qsize_t)(inode_bl->i_blocks) * (1 << 9) + inode_bl->i_bytes;
195aa507b5fSyangerkun 	diff = size - size_bl;
196393d1d1dSDr. Tilmann Bubeck 	swap_inode_data(inode, inode_bl);
197393d1d1dSDr. Tilmann Bubeck 
198eeca7ea1SDeepa Dinamani 	inode->i_ctime = inode_bl->i_ctime = current_time(inode);
199393d1d1dSDr. Tilmann Bubeck 
20023253068STheodore Ts'o 	inode->i_generation = prandom_u32();
20123253068STheodore Ts'o 	inode_bl->i_generation = prandom_u32();
20218aded17STheodore Ts'o 	reset_inode_seed(inode);
20318aded17STheodore Ts'o 	reset_inode_seed(inode_bl);
204393d1d1dSDr. Tilmann Bubeck 
205393d1d1dSDr. Tilmann Bubeck 	ext4_discard_preallocations(inode);
206393d1d1dSDr. Tilmann Bubeck 
207393d1d1dSDr. Tilmann Bubeck 	err = ext4_mark_inode_dirty(handle, inode);
208393d1d1dSDr. Tilmann Bubeck 	if (err < 0) {
209aa507b5fSyangerkun 		/* No need to update quota information. */
210393d1d1dSDr. Tilmann Bubeck 		ext4_warning(inode->i_sb,
211393d1d1dSDr. Tilmann Bubeck 			"couldn't mark inode #%lu dirty (err %d)",
212393d1d1dSDr. Tilmann Bubeck 			inode->i_ino, err);
213393d1d1dSDr. Tilmann Bubeck 		/* Revert all changes: */
214393d1d1dSDr. Tilmann Bubeck 		swap_inode_data(inode, inode_bl);
21518aded17STheodore Ts'o 		ext4_mark_inode_dirty(handle, inode);
216aa507b5fSyangerkun 		goto err_out1;
217aa507b5fSyangerkun 	}
218aa507b5fSyangerkun 
219aa507b5fSyangerkun 	blocks = inode_bl->i_blocks;
220aa507b5fSyangerkun 	bytes = inode_bl->i_bytes;
221aa507b5fSyangerkun 	inode_bl->i_blocks = inode->i_blocks;
222aa507b5fSyangerkun 	inode_bl->i_bytes = inode->i_bytes;
223393d1d1dSDr. Tilmann Bubeck 	err = ext4_mark_inode_dirty(handle, inode_bl);
224393d1d1dSDr. Tilmann Bubeck 	if (err < 0) {
225aa507b5fSyangerkun 		/* No need to update quota information. */
226393d1d1dSDr. Tilmann Bubeck 		ext4_warning(inode_bl->i_sb,
227393d1d1dSDr. Tilmann Bubeck 			"couldn't mark inode #%lu dirty (err %d)",
228393d1d1dSDr. Tilmann Bubeck 			inode_bl->i_ino, err);
229aa507b5fSyangerkun 		goto revert;
230aa507b5fSyangerkun 	}
231aa507b5fSyangerkun 
232aa507b5fSyangerkun 	/* Bootloader inode should not be counted into quota information. */
233aa507b5fSyangerkun 	if (diff > 0)
234aa507b5fSyangerkun 		dquot_free_space(inode, diff);
235aa507b5fSyangerkun 	else
236aa507b5fSyangerkun 		err = dquot_alloc_space(inode, -1 * diff);
237aa507b5fSyangerkun 
238aa507b5fSyangerkun 	if (err < 0) {
239aa507b5fSyangerkun revert:
240393d1d1dSDr. Tilmann Bubeck 		/* Revert all changes: */
241aa507b5fSyangerkun 		inode_bl->i_blocks = blocks;
242aa507b5fSyangerkun 		inode_bl->i_bytes = bytes;
243393d1d1dSDr. Tilmann Bubeck 		swap_inode_data(inode, inode_bl);
244393d1d1dSDr. Tilmann Bubeck 		ext4_mark_inode_dirty(handle, inode);
24518aded17STheodore Ts'o 		ext4_mark_inode_dirty(handle, inode_bl);
246393d1d1dSDr. Tilmann Bubeck 	}
247aa507b5fSyangerkun 
248aa507b5fSyangerkun err_out1:
249393d1d1dSDr. Tilmann Bubeck 	ext4_journal_stop(handle);
250393d1d1dSDr. Tilmann Bubeck 	ext4_double_up_write_data_sem(inode, inode_bl);
251393d1d1dSDr. Tilmann Bubeck 
252a46c68a3Syangerkun err_out:
253a46c68a3Syangerkun 	up_write(&EXT4_I(inode)->i_mmap_sem);
25430d29b11SZheng Liu journal_err_out:
255375e289eSJ. Bruce Fields 	unlock_two_nondirectories(inode, inode_bl);
256393d1d1dSDr. Tilmann Bubeck 	iput(inode_bl);
257393d1d1dSDr. Tilmann Bubeck 	return err;
258393d1d1dSDr. Tilmann Bubeck }
259393d1d1dSDr. Tilmann Bubeck 
260643fa961SChandan Rajendra #ifdef CONFIG_FS_ENCRYPTION
2619bd8212fSMichael Halcrow static int uuid_is_zero(__u8 u[16])
2629bd8212fSMichael Halcrow {
2639bd8212fSMichael Halcrow 	int	i;
2649bd8212fSMichael Halcrow 
2659bd8212fSMichael Halcrow 	for (i = 0; i < 16; i++)
2669bd8212fSMichael Halcrow 		if (u[i])
2679bd8212fSMichael Halcrow 			return 0;
2689bd8212fSMichael Halcrow 	return 1;
2699bd8212fSMichael Halcrow }
270ba679017SEric Biggers #endif
2719bd8212fSMichael Halcrow 
2722e538403SDarrick J. Wong /*
2732e538403SDarrick J. Wong  * If immutable is set and we are not clearing it, we're not allowed to change
2742e538403SDarrick J. Wong  * anything else in the inode.  Don't error out if we're only trying to set
2752e538403SDarrick J. Wong  * immutable on an immutable file.
2762e538403SDarrick J. Wong  */
2772e538403SDarrick J. Wong static int ext4_ioctl_check_immutable(struct inode *inode, __u32 new_projid,
2782e538403SDarrick J. Wong 				      unsigned int flags)
2792e538403SDarrick J. Wong {
2802e538403SDarrick J. Wong 	struct ext4_inode_info *ei = EXT4_I(inode);
2812e538403SDarrick J. Wong 	unsigned int oldflags = ei->i_flags;
2822e538403SDarrick J. Wong 
2832e538403SDarrick J. Wong 	if (!(oldflags & EXT4_IMMUTABLE_FL) || !(flags & EXT4_IMMUTABLE_FL))
2842e538403SDarrick J. Wong 		return 0;
2852e538403SDarrick J. Wong 
2862e538403SDarrick J. Wong 	if ((oldflags & ~EXT4_IMMUTABLE_FL) != (flags & ~EXT4_IMMUTABLE_FL))
2872e538403SDarrick J. Wong 		return -EPERM;
2882e538403SDarrick J. Wong 	if (ext4_has_feature_project(inode->i_sb) &&
2892e538403SDarrick J. Wong 	    __kprojid_val(ei->i_projid) != new_projid)
2902e538403SDarrick J. Wong 		return -EPERM;
2912e538403SDarrick J. Wong 
2922e538403SDarrick J. Wong 	return 0;
2932e538403SDarrick J. Wong }
2942e538403SDarrick J. Wong 
2959b7365fcSLi Xi static int ext4_ioctl_setflags(struct inode *inode,
2969b7365fcSLi Xi 			       unsigned int flags)
297ac27a0ecSDave Kleikamp {
298617ba13bSMingming Cao 	struct ext4_inode_info *ei = EXT4_I(inode);
299ac27a0ecSDave Kleikamp 	handle_t *handle = NULL;
300fdde368eSAnton Protopopov 	int err = -EPERM, migrate = 0;
301617ba13bSMingming Cao 	struct ext4_iloc iloc;
30279906964STheodore Ts'o 	unsigned int oldflags, mask, i;
303ac27a0ecSDave Kleikamp 	unsigned int jflag;
304b886ee3eSGabriel Krisman Bertazi 	struct super_block *sb = inode->i_sb;
305ac27a0ecSDave Kleikamp 
306e47776a0SJan Kara 	/* Is it quota file? Do not allow user to mess with it */
30702749a4cSTahsin Erdogan 	if (ext4_is_quota_file(inode))
30842a74f20SDave Hansen 		goto flags_out;
30942a74f20SDave Hansen 
310ac27a0ecSDave Kleikamp 	oldflags = ei->i_flags;
311ac27a0ecSDave Kleikamp 
312ac27a0ecSDave Kleikamp 	/* The JOURNAL_DATA flag is modifiable only by root */
313617ba13bSMingming Cao 	jflag = flags & EXT4_JOURNAL_DATA_FL;
314ac27a0ecSDave Kleikamp 
3155aca2842SDarrick J. Wong 	err = vfs_ioc_setflags_prepare(inode, oldflags, flags);
3165aca2842SDarrick J. Wong 	if (err)
31742a74f20SDave Hansen 		goto flags_out;
318ac27a0ecSDave Kleikamp 
319ac27a0ecSDave Kleikamp 	/*
320ac27a0ecSDave Kleikamp 	 * The JOURNAL_DATA flag can only be changed by
321ac27a0ecSDave Kleikamp 	 * the relevant capability.
322ac27a0ecSDave Kleikamp 	 */
323617ba13bSMingming Cao 	if ((jflag ^ oldflags) & (EXT4_JOURNAL_DATA_FL)) {
32442a74f20SDave Hansen 		if (!capable(CAP_SYS_RESOURCE))
32542a74f20SDave Hansen 			goto flags_out;
326ac27a0ecSDave Kleikamp 	}
327996bb9fdSTheodore Ts'o 	if ((flags ^ oldflags) & EXT4_EXTENTS_FL)
3284db46fc2SAneesh Kumar K.V 		migrate = 1;
329ac27a0ecSDave Kleikamp 
330b886ee3eSGabriel Krisman Bertazi 	if ((flags ^ oldflags) & EXT4_CASEFOLD_FL) {
331b886ee3eSGabriel Krisman Bertazi 		if (!ext4_has_feature_casefold(sb)) {
332b886ee3eSGabriel Krisman Bertazi 			err = -EOPNOTSUPP;
333b886ee3eSGabriel Krisman Bertazi 			goto flags_out;
334b886ee3eSGabriel Krisman Bertazi 		}
335b886ee3eSGabriel Krisman Bertazi 
336b886ee3eSGabriel Krisman Bertazi 		if (!S_ISDIR(inode->i_mode)) {
337b886ee3eSGabriel Krisman Bertazi 			err = -ENOTDIR;
338b886ee3eSGabriel Krisman Bertazi 			goto flags_out;
339b886ee3eSGabriel Krisman Bertazi 		}
340b886ee3eSGabriel Krisman Bertazi 
341b886ee3eSGabriel Krisman Bertazi 		if (!ext4_empty_dir(inode)) {
342b886ee3eSGabriel Krisman Bertazi 			err = -ENOTEMPTY;
343b886ee3eSGabriel Krisman Bertazi 			goto flags_out;
344b886ee3eSGabriel Krisman Bertazi 		}
345b886ee3eSGabriel Krisman Bertazi 	}
346b886ee3eSGabriel Krisman Bertazi 
3472e538403SDarrick J. Wong 	/*
3482e538403SDarrick J. Wong 	 * Wait for all pending directio and then flush all the dirty pages
3492e538403SDarrick J. Wong 	 * for this file.  The flush marks all the pages readonly, so any
3502e538403SDarrick J. Wong 	 * subsequent attempt to write to the file (particularly mmap pages)
3512e538403SDarrick J. Wong 	 * will come through the filesystem and fail.
3522e538403SDarrick J. Wong 	 */
3532e538403SDarrick J. Wong 	if (S_ISREG(inode->i_mode) && !IS_IMMUTABLE(inode) &&
3542e538403SDarrick J. Wong 	    (flags & EXT4_IMMUTABLE_FL)) {
3552e538403SDarrick J. Wong 		inode_dio_wait(inode);
3562e538403SDarrick J. Wong 		err = filemap_write_and_wait(inode->i_mapping);
3572e538403SDarrick J. Wong 		if (err)
3582e538403SDarrick J. Wong 			goto flags_out;
3592e538403SDarrick J. Wong 	}
3602e538403SDarrick J. Wong 
3619924a92aSTheodore Ts'o 	handle = ext4_journal_start(inode, EXT4_HT_INODE, 1);
362ac27a0ecSDave Kleikamp 	if (IS_ERR(handle)) {
36342a74f20SDave Hansen 		err = PTR_ERR(handle);
36442a74f20SDave Hansen 		goto flags_out;
365ac27a0ecSDave Kleikamp 	}
366ac27a0ecSDave Kleikamp 	if (IS_SYNC(inode))
3670390131bSFrank Mayhar 		ext4_handle_sync(handle);
368617ba13bSMingming Cao 	err = ext4_reserve_inode_write(handle, inode, &iloc);
369ac27a0ecSDave Kleikamp 	if (err)
370ac27a0ecSDave Kleikamp 		goto flags_err;
371ac27a0ecSDave Kleikamp 
37279906964STheodore Ts'o 	for (i = 0, mask = 1; i < 32; i++, mask <<= 1) {
37379906964STheodore Ts'o 		if (!(mask & EXT4_FL_USER_MODIFIABLE))
37479906964STheodore Ts'o 			continue;
375f8011d93SJan Kara 		/* These flags get special treatment later */
376f8011d93SJan Kara 		if (mask == EXT4_JOURNAL_DATA_FL || mask == EXT4_EXTENTS_FL)
377f8011d93SJan Kara 			continue;
37879906964STheodore Ts'o 		if (mask & flags)
37979906964STheodore Ts'o 			ext4_set_inode_flag(inode, i);
38079906964STheodore Ts'o 		else
38179906964STheodore Ts'o 			ext4_clear_inode_flag(inode, i);
38279906964STheodore Ts'o 	}
383ac27a0ecSDave Kleikamp 
384617ba13bSMingming Cao 	ext4_set_inode_flags(inode);
385eeca7ea1SDeepa Dinamani 	inode->i_ctime = current_time(inode);
386ac27a0ecSDave Kleikamp 
387617ba13bSMingming Cao 	err = ext4_mark_iloc_dirty(handle, inode, &iloc);
388ac27a0ecSDave Kleikamp flags_err:
389617ba13bSMingming Cao 	ext4_journal_stop(handle);
39042a74f20SDave Hansen 	if (err)
39142a74f20SDave Hansen 		goto flags_out;
392ac27a0ecSDave Kleikamp 
393e9072d85SRoss Zwisler 	if ((jflag ^ oldflags) & (EXT4_JOURNAL_DATA_FL)) {
394e9072d85SRoss Zwisler 		/*
395e9072d85SRoss Zwisler 		 * Changes to the journaling mode can cause unsafe changes to
396ff694ab6SIra Weiny 		 * S_DAX if the inode is DAX
397e9072d85SRoss Zwisler 		 */
398ff694ab6SIra Weiny 		if (IS_DAX(inode)) {
399e9072d85SRoss Zwisler 			err = -EBUSY;
400e9072d85SRoss Zwisler 			goto flags_out;
401e9072d85SRoss Zwisler 		}
402e9072d85SRoss Zwisler 
403617ba13bSMingming Cao 		err = ext4_change_inode_journal_flag(inode, jflag);
4044db46fc2SAneesh Kumar K.V 		if (err)
4054db46fc2SAneesh Kumar K.V 			goto flags_out;
406e9072d85SRoss Zwisler 	}
407996bb9fdSTheodore Ts'o 	if (migrate) {
408996bb9fdSTheodore Ts'o 		if (flags & EXT4_EXTENTS_FL)
4094db46fc2SAneesh Kumar K.V 			err = ext4_ext_migrate(inode);
410996bb9fdSTheodore Ts'o 		else
411996bb9fdSTheodore Ts'o 			err = ext4_ind_migrate(inode);
412996bb9fdSTheodore Ts'o 	}
413996bb9fdSTheodore Ts'o 
41442a74f20SDave Hansen flags_out:
4159b7365fcSLi Xi 	return err;
4169b7365fcSLi Xi }
4179b7365fcSLi Xi 
4189b7365fcSLi Xi #ifdef CONFIG_QUOTA
4199b7365fcSLi Xi static int ext4_ioctl_setproject(struct file *filp, __u32 projid)
4209b7365fcSLi Xi {
4219b7365fcSLi Xi 	struct inode *inode = file_inode(filp);
4229b7365fcSLi Xi 	struct super_block *sb = inode->i_sb;
4239b7365fcSLi Xi 	struct ext4_inode_info *ei = EXT4_I(inode);
4249b7365fcSLi Xi 	int err, rc;
4259b7365fcSLi Xi 	handle_t *handle;
4269b7365fcSLi Xi 	kprojid_t kprojid;
4279b7365fcSLi Xi 	struct ext4_iloc iloc;
4289b7365fcSLi Xi 	struct ext4_inode *raw_inode;
429079788d0SWang Shilong 	struct dquot *transfer_to[MAXQUOTAS] = { };
4309b7365fcSLi Xi 
4310b7b7779SKaho Ng 	if (!ext4_has_feature_project(sb)) {
4329b7365fcSLi Xi 		if (projid != EXT4_DEF_PROJID)
4339b7365fcSLi Xi 			return -EOPNOTSUPP;
4349b7365fcSLi Xi 		else
4359b7365fcSLi Xi 			return 0;
4369b7365fcSLi Xi 	}
4379b7365fcSLi Xi 
4389b7365fcSLi Xi 	if (EXT4_INODE_SIZE(sb) <= EXT4_GOOD_OLD_INODE_SIZE)
4399b7365fcSLi Xi 		return -EOPNOTSUPP;
4409b7365fcSLi Xi 
4419b7365fcSLi Xi 	kprojid = make_kprojid(&init_user_ns, (projid_t)projid);
4429b7365fcSLi Xi 
4439b7365fcSLi Xi 	if (projid_eq(kprojid, EXT4_I(inode)->i_projid))
4449b7365fcSLi Xi 		return 0;
4459b7365fcSLi Xi 
4469b7365fcSLi Xi 	err = -EPERM;
4479b7365fcSLi Xi 	/* Is it quota file? Do not allow user to mess with it */
44802749a4cSTahsin Erdogan 	if (ext4_is_quota_file(inode))
449dc7ac6c4SWang Shilong 		return err;
4509b7365fcSLi Xi 
4519b7365fcSLi Xi 	err = ext4_get_inode_loc(inode, &iloc);
4529b7365fcSLi Xi 	if (err)
453dc7ac6c4SWang Shilong 		return err;
4549b7365fcSLi Xi 
4559b7365fcSLi Xi 	raw_inode = ext4_raw_inode(&iloc);
4569b7365fcSLi Xi 	if (!EXT4_FITS_IN_INODE(raw_inode, ei, i_projid)) {
457c03b45b8SMiao Xie 		err = ext4_expand_extra_isize(inode,
458c03b45b8SMiao Xie 					      EXT4_SB(sb)->s_want_extra_isize,
459c03b45b8SMiao Xie 					      &iloc);
460c03b45b8SMiao Xie 		if (err)
461dc7ac6c4SWang Shilong 			return err;
462c03b45b8SMiao Xie 	} else {
4639b7365fcSLi Xi 		brelse(iloc.bh);
464c03b45b8SMiao Xie 	}
4659b7365fcSLi Xi 
466182a79e0SWang Shilong 	err = dquot_initialize(inode);
467182a79e0SWang Shilong 	if (err)
468182a79e0SWang Shilong 		return err;
4699b7365fcSLi Xi 
4709b7365fcSLi Xi 	handle = ext4_journal_start(inode, EXT4_HT_QUOTA,
4719b7365fcSLi Xi 		EXT4_QUOTA_INIT_BLOCKS(sb) +
4729b7365fcSLi Xi 		EXT4_QUOTA_DEL_BLOCKS(sb) + 3);
473dc7ac6c4SWang Shilong 	if (IS_ERR(handle))
474dc7ac6c4SWang Shilong 		return PTR_ERR(handle);
4759b7365fcSLi Xi 
4769b7365fcSLi Xi 	err = ext4_reserve_inode_write(handle, inode, &iloc);
4779b7365fcSLi Xi 	if (err)
4789b7365fcSLi Xi 		goto out_stop;
4799b7365fcSLi Xi 
4809b7365fcSLi Xi 	transfer_to[PRJQUOTA] = dqget(sb, make_kqid_projid(kprojid));
481ff0bc084SSeth Forshee 	if (!IS_ERR(transfer_to[PRJQUOTA])) {
4827a9ca53aSTahsin Erdogan 
4837a9ca53aSTahsin Erdogan 		/* __dquot_transfer() calls back ext4_get_inode_usage() which
4847a9ca53aSTahsin Erdogan 		 * counts xattr inode references.
4857a9ca53aSTahsin Erdogan 		 */
4867a9ca53aSTahsin Erdogan 		down_read(&EXT4_I(inode)->xattr_sem);
4879b7365fcSLi Xi 		err = __dquot_transfer(inode, transfer_to);
4887a9ca53aSTahsin Erdogan 		up_read(&EXT4_I(inode)->xattr_sem);
4899b7365fcSLi Xi 		dqput(transfer_to[PRJQUOTA]);
4909b7365fcSLi Xi 		if (err)
4919b7365fcSLi Xi 			goto out_dirty;
4929b7365fcSLi Xi 	}
493079788d0SWang Shilong 
4949b7365fcSLi Xi 	EXT4_I(inode)->i_projid = kprojid;
495eeca7ea1SDeepa Dinamani 	inode->i_ctime = current_time(inode);
4969b7365fcSLi Xi out_dirty:
4979b7365fcSLi Xi 	rc = ext4_mark_iloc_dirty(handle, inode, &iloc);
4989b7365fcSLi Xi 	if (!err)
4999b7365fcSLi Xi 		err = rc;
5009b7365fcSLi Xi out_stop:
5019b7365fcSLi Xi 	ext4_journal_stop(handle);
5029b7365fcSLi Xi 	return err;
5039b7365fcSLi Xi }
5049b7365fcSLi Xi #else
5059b7365fcSLi Xi static int ext4_ioctl_setproject(struct file *filp, __u32 projid)
5069b7365fcSLi Xi {
5079b7365fcSLi Xi 	if (projid != EXT4_DEF_PROJID)
5089b7365fcSLi Xi 		return -EOPNOTSUPP;
5099b7365fcSLi Xi 	return 0;
5109b7365fcSLi Xi }
5119b7365fcSLi Xi #endif
5129b7365fcSLi Xi 
5139b7365fcSLi Xi /* Transfer internal flags to xflags */
5149b7365fcSLi Xi static inline __u32 ext4_iflags_to_xflags(unsigned long iflags)
5159b7365fcSLi Xi {
5169b7365fcSLi Xi 	__u32 xflags = 0;
5179b7365fcSLi Xi 
5189b7365fcSLi Xi 	if (iflags & EXT4_SYNC_FL)
5199b7365fcSLi Xi 		xflags |= FS_XFLAG_SYNC;
5209b7365fcSLi Xi 	if (iflags & EXT4_IMMUTABLE_FL)
5219b7365fcSLi Xi 		xflags |= FS_XFLAG_IMMUTABLE;
5229b7365fcSLi Xi 	if (iflags & EXT4_APPEND_FL)
5239b7365fcSLi Xi 		xflags |= FS_XFLAG_APPEND;
5249b7365fcSLi Xi 	if (iflags & EXT4_NODUMP_FL)
5259b7365fcSLi Xi 		xflags |= FS_XFLAG_NODUMP;
5269b7365fcSLi Xi 	if (iflags & EXT4_NOATIME_FL)
5279b7365fcSLi Xi 		xflags |= FS_XFLAG_NOATIME;
5289b7365fcSLi Xi 	if (iflags & EXT4_PROJINHERIT_FL)
5299b7365fcSLi Xi 		xflags |= FS_XFLAG_PROJINHERIT;
5309b7365fcSLi Xi 	return xflags;
5319b7365fcSLi Xi }
5329b7365fcSLi Xi 
533d14e7683SJan Kara #define EXT4_SUPPORTED_FS_XFLAGS (FS_XFLAG_SYNC | FS_XFLAG_IMMUTABLE | \
534d14e7683SJan Kara 				  FS_XFLAG_APPEND | FS_XFLAG_NODUMP | \
535d14e7683SJan Kara 				  FS_XFLAG_NOATIME | FS_XFLAG_PROJINHERIT)
536d14e7683SJan Kara 
5379b7365fcSLi Xi /* Transfer xflags flags to internal */
5389b7365fcSLi Xi static inline unsigned long ext4_xflags_to_iflags(__u32 xflags)
5399b7365fcSLi Xi {
5409b7365fcSLi Xi 	unsigned long iflags = 0;
5419b7365fcSLi Xi 
5429b7365fcSLi Xi 	if (xflags & FS_XFLAG_SYNC)
5439b7365fcSLi Xi 		iflags |= EXT4_SYNC_FL;
5449b7365fcSLi Xi 	if (xflags & FS_XFLAG_IMMUTABLE)
5459b7365fcSLi Xi 		iflags |= EXT4_IMMUTABLE_FL;
5469b7365fcSLi Xi 	if (xflags & FS_XFLAG_APPEND)
5479b7365fcSLi Xi 		iflags |= EXT4_APPEND_FL;
5489b7365fcSLi Xi 	if (xflags & FS_XFLAG_NODUMP)
5499b7365fcSLi Xi 		iflags |= EXT4_NODUMP_FL;
5509b7365fcSLi Xi 	if (xflags & FS_XFLAG_NOATIME)
5519b7365fcSLi Xi 		iflags |= EXT4_NOATIME_FL;
5529b7365fcSLi Xi 	if (xflags & FS_XFLAG_PROJINHERIT)
5539b7365fcSLi Xi 		iflags |= EXT4_PROJINHERIT_FL;
5549b7365fcSLi Xi 
5559b7365fcSLi Xi 	return iflags;
5569b7365fcSLi Xi }
5579b7365fcSLi Xi 
5581a20a630SEric Biggers static int ext4_shutdown(struct super_block *sb, unsigned long arg)
559783d9485STheodore Ts'o {
560783d9485STheodore Ts'o 	struct ext4_sb_info *sbi = EXT4_SB(sb);
561783d9485STheodore Ts'o 	__u32 flags;
562783d9485STheodore Ts'o 
563783d9485STheodore Ts'o 	if (!capable(CAP_SYS_ADMIN))
564783d9485STheodore Ts'o 		return -EPERM;
565783d9485STheodore Ts'o 
566783d9485STheodore Ts'o 	if (get_user(flags, (__u32 __user *)arg))
567783d9485STheodore Ts'o 		return -EFAULT;
568783d9485STheodore Ts'o 
569783d9485STheodore Ts'o 	if (flags > EXT4_GOING_FLAGS_NOLOGFLUSH)
570783d9485STheodore Ts'o 		return -EINVAL;
571783d9485STheodore Ts'o 
572783d9485STheodore Ts'o 	if (ext4_forced_shutdown(sbi))
573783d9485STheodore Ts'o 		return 0;
574783d9485STheodore Ts'o 
575783d9485STheodore Ts'o 	ext4_msg(sb, KERN_ALERT, "shut down requested (%d)", flags);
576ccf0f32aSTheodore Ts'o 	trace_ext4_shutdown(sb, flags);
577783d9485STheodore Ts'o 
578783d9485STheodore Ts'o 	switch (flags) {
579783d9485STheodore Ts'o 	case EXT4_GOING_FLAGS_DEFAULT:
580783d9485STheodore Ts'o 		freeze_bdev(sb->s_bdev);
581783d9485STheodore Ts'o 		set_bit(EXT4_FLAGS_SHUTDOWN, &sbi->s_ext4_flags);
582783d9485STheodore Ts'o 		thaw_bdev(sb->s_bdev, sb);
583783d9485STheodore Ts'o 		break;
584783d9485STheodore Ts'o 	case EXT4_GOING_FLAGS_LOGFLUSH:
585783d9485STheodore Ts'o 		set_bit(EXT4_FLAGS_SHUTDOWN, &sbi->s_ext4_flags);
586783d9485STheodore Ts'o 		if (sbi->s_journal && !is_journal_aborted(sbi->s_journal)) {
587783d9485STheodore Ts'o 			(void) ext4_force_commit(sb);
588fb7c0244STheodore Ts'o 			jbd2_journal_abort(sbi->s_journal, -ESHUTDOWN);
589783d9485STheodore Ts'o 		}
590783d9485STheodore Ts'o 		break;
591783d9485STheodore Ts'o 	case EXT4_GOING_FLAGS_NOLOGFLUSH:
592783d9485STheodore Ts'o 		set_bit(EXT4_FLAGS_SHUTDOWN, &sbi->s_ext4_flags);
593a6d9946bSTheodore Ts'o 		if (sbi->s_journal && !is_journal_aborted(sbi->s_journal))
594fb7c0244STheodore Ts'o 			jbd2_journal_abort(sbi->s_journal, -ESHUTDOWN);
595783d9485STheodore Ts'o 		break;
596783d9485STheodore Ts'o 	default:
597783d9485STheodore Ts'o 		return -EINVAL;
598783d9485STheodore Ts'o 	}
599783d9485STheodore Ts'o 	clear_opt(sb, DISCARD);
600783d9485STheodore Ts'o 	return 0;
601783d9485STheodore Ts'o }
602783d9485STheodore Ts'o 
6030c9ec4beSDarrick J. Wong struct getfsmap_info {
6040c9ec4beSDarrick J. Wong 	struct super_block	*gi_sb;
6050c9ec4beSDarrick J. Wong 	struct fsmap_head __user *gi_data;
6060c9ec4beSDarrick J. Wong 	unsigned int		gi_idx;
6070c9ec4beSDarrick J. Wong 	__u32			gi_last_flags;
6080c9ec4beSDarrick J. Wong };
6090c9ec4beSDarrick J. Wong 
6100c9ec4beSDarrick J. Wong static int ext4_getfsmap_format(struct ext4_fsmap *xfm, void *priv)
6110c9ec4beSDarrick J. Wong {
6120c9ec4beSDarrick J. Wong 	struct getfsmap_info *info = priv;
6130c9ec4beSDarrick J. Wong 	struct fsmap fm;
6140c9ec4beSDarrick J. Wong 
6150c9ec4beSDarrick J. Wong 	trace_ext4_getfsmap_mapping(info->gi_sb, xfm);
6160c9ec4beSDarrick J. Wong 
6170c9ec4beSDarrick J. Wong 	info->gi_last_flags = xfm->fmr_flags;
6180c9ec4beSDarrick J. Wong 	ext4_fsmap_from_internal(info->gi_sb, &fm, xfm);
6190c9ec4beSDarrick J. Wong 	if (copy_to_user(&info->gi_data->fmh_recs[info->gi_idx++], &fm,
6200c9ec4beSDarrick J. Wong 			sizeof(struct fsmap)))
6210c9ec4beSDarrick J. Wong 		return -EFAULT;
6220c9ec4beSDarrick J. Wong 
6230c9ec4beSDarrick J. Wong 	return 0;
6240c9ec4beSDarrick J. Wong }
6250c9ec4beSDarrick J. Wong 
6260c9ec4beSDarrick J. Wong static int ext4_ioc_getfsmap(struct super_block *sb,
6270c9ec4beSDarrick J. Wong 			     struct fsmap_head __user *arg)
6280c9ec4beSDarrick J. Wong {
6290ba33facSTheodore Ts'o 	struct getfsmap_info info = { NULL };
6300c9ec4beSDarrick J. Wong 	struct ext4_fsmap_head xhead = {0};
6310c9ec4beSDarrick J. Wong 	struct fsmap_head head;
6320c9ec4beSDarrick J. Wong 	bool aborted = false;
6330c9ec4beSDarrick J. Wong 	int error;
6340c9ec4beSDarrick J. Wong 
6350c9ec4beSDarrick J. Wong 	if (copy_from_user(&head, arg, sizeof(struct fsmap_head)))
6360c9ec4beSDarrick J. Wong 		return -EFAULT;
6370c9ec4beSDarrick J. Wong 	if (memchr_inv(head.fmh_reserved, 0, sizeof(head.fmh_reserved)) ||
6380c9ec4beSDarrick J. Wong 	    memchr_inv(head.fmh_keys[0].fmr_reserved, 0,
6390c9ec4beSDarrick J. Wong 		       sizeof(head.fmh_keys[0].fmr_reserved)) ||
6400c9ec4beSDarrick J. Wong 	    memchr_inv(head.fmh_keys[1].fmr_reserved, 0,
6410c9ec4beSDarrick J. Wong 		       sizeof(head.fmh_keys[1].fmr_reserved)))
6420c9ec4beSDarrick J. Wong 		return -EINVAL;
6430c9ec4beSDarrick J. Wong 	/*
6440c9ec4beSDarrick J. Wong 	 * ext4 doesn't report file extents at all, so the only valid
6450c9ec4beSDarrick J. Wong 	 * file offsets are the magic ones (all zeroes or all ones).
6460c9ec4beSDarrick J. Wong 	 */
6470c9ec4beSDarrick J. Wong 	if (head.fmh_keys[0].fmr_offset ||
6480c9ec4beSDarrick J. Wong 	    (head.fmh_keys[1].fmr_offset != 0 &&
6490c9ec4beSDarrick J. Wong 	     head.fmh_keys[1].fmr_offset != -1ULL))
6500c9ec4beSDarrick J. Wong 		return -EINVAL;
6510c9ec4beSDarrick J. Wong 
6520c9ec4beSDarrick J. Wong 	xhead.fmh_iflags = head.fmh_iflags;
6530c9ec4beSDarrick J. Wong 	xhead.fmh_count = head.fmh_count;
6540c9ec4beSDarrick J. Wong 	ext4_fsmap_to_internal(sb, &xhead.fmh_keys[0], &head.fmh_keys[0]);
6550c9ec4beSDarrick J. Wong 	ext4_fsmap_to_internal(sb, &xhead.fmh_keys[1], &head.fmh_keys[1]);
6560c9ec4beSDarrick J. Wong 
6570c9ec4beSDarrick J. Wong 	trace_ext4_getfsmap_low_key(sb, &xhead.fmh_keys[0]);
6580c9ec4beSDarrick J. Wong 	trace_ext4_getfsmap_high_key(sb, &xhead.fmh_keys[1]);
6590c9ec4beSDarrick J. Wong 
6600c9ec4beSDarrick J. Wong 	info.gi_sb = sb;
6610c9ec4beSDarrick J. Wong 	info.gi_data = arg;
6620c9ec4beSDarrick J. Wong 	error = ext4_getfsmap(sb, &xhead, ext4_getfsmap_format, &info);
6630c9ec4beSDarrick J. Wong 	if (error == EXT4_QUERY_RANGE_ABORT) {
6640c9ec4beSDarrick J. Wong 		error = 0;
6650c9ec4beSDarrick J. Wong 		aborted = true;
6660c9ec4beSDarrick J. Wong 	} else if (error)
6670c9ec4beSDarrick J. Wong 		return error;
6680c9ec4beSDarrick J. Wong 
6690c9ec4beSDarrick J. Wong 	/* If we didn't abort, set the "last" flag in the last fmx */
6700c9ec4beSDarrick J. Wong 	if (!aborted && info.gi_idx) {
6710c9ec4beSDarrick J. Wong 		info.gi_last_flags |= FMR_OF_LAST;
6720c9ec4beSDarrick J. Wong 		if (copy_to_user(&info.gi_data->fmh_recs[info.gi_idx - 1].fmr_flags,
6730c9ec4beSDarrick J. Wong 				 &info.gi_last_flags,
6740c9ec4beSDarrick J. Wong 				 sizeof(info.gi_last_flags)))
6750c9ec4beSDarrick J. Wong 			return -EFAULT;
6760c9ec4beSDarrick J. Wong 	}
6770c9ec4beSDarrick J. Wong 
6780c9ec4beSDarrick J. Wong 	/* copy back header */
6790c9ec4beSDarrick J. Wong 	head.fmh_entries = xhead.fmh_entries;
6800c9ec4beSDarrick J. Wong 	head.fmh_oflags = xhead.fmh_oflags;
6810c9ec4beSDarrick J. Wong 	if (copy_to_user(arg, &head, sizeof(struct fsmap_head)))
6820c9ec4beSDarrick J. Wong 		return -EFAULT;
6830c9ec4beSDarrick J. Wong 
6840c9ec4beSDarrick J. Wong 	return 0;
6850c9ec4beSDarrick J. Wong }
6860c9ec4beSDarrick J. Wong 
687e145b35bSAl Viro static long ext4_ioctl_group_add(struct file *file,
688e145b35bSAl Viro 				 struct ext4_new_group_data *input)
689e145b35bSAl Viro {
690e145b35bSAl Viro 	struct super_block *sb = file_inode(file)->i_sb;
691e145b35bSAl Viro 	int err, err2=0;
692e145b35bSAl Viro 
693e145b35bSAl Viro 	err = ext4_resize_begin(sb);
694e145b35bSAl Viro 	if (err)
695e145b35bSAl Viro 		return err;
696e145b35bSAl Viro 
697e145b35bSAl Viro 	if (ext4_has_feature_bigalloc(sb)) {
698e145b35bSAl Viro 		ext4_msg(sb, KERN_ERR,
699e145b35bSAl Viro 			 "Online resizing not supported with bigalloc");
700e145b35bSAl Viro 		err = -EOPNOTSUPP;
701e145b35bSAl Viro 		goto group_add_out;
702e145b35bSAl Viro 	}
703e145b35bSAl Viro 
704e145b35bSAl Viro 	err = mnt_want_write_file(file);
705e145b35bSAl Viro 	if (err)
706e145b35bSAl Viro 		goto group_add_out;
707e145b35bSAl Viro 
708e145b35bSAl Viro 	err = ext4_group_add(sb, input);
709e145b35bSAl Viro 	if (EXT4_SB(sb)->s_journal) {
710e145b35bSAl Viro 		jbd2_journal_lock_updates(EXT4_SB(sb)->s_journal);
711e145b35bSAl Viro 		err2 = jbd2_journal_flush(EXT4_SB(sb)->s_journal);
712e145b35bSAl Viro 		jbd2_journal_unlock_updates(EXT4_SB(sb)->s_journal);
713e145b35bSAl Viro 	}
714e145b35bSAl Viro 	if (err == 0)
715e145b35bSAl Viro 		err = err2;
716e145b35bSAl Viro 	mnt_drop_write_file(file);
717e145b35bSAl Viro 	if (!err && ext4_has_group_desc_csum(sb) &&
718e145b35bSAl Viro 	    test_opt(sb, INIT_INODE_TABLE))
719e145b35bSAl Viro 		err = ext4_register_li_request(sb, input->group);
720e145b35bSAl Viro group_add_out:
721e145b35bSAl Viro 	ext4_resize_end(sb);
722e145b35bSAl Viro 	return err;
723e145b35bSAl Viro }
724e145b35bSAl Viro 
7257b0e492eSDarrick J. Wong static void ext4_fill_fsxattr(struct inode *inode, struct fsxattr *fa)
726dc7ac6c4SWang Shilong {
7277b0e492eSDarrick J. Wong 	struct ext4_inode_info *ei = EXT4_I(inode);
728dc7ac6c4SWang Shilong 
7297b0e492eSDarrick J. Wong 	simple_fill_fsxattr(fa, ext4_iflags_to_xflags(ei->i_flags &
7307b0e492eSDarrick J. Wong 						      EXT4_FL_USER_VISIBLE));
731dc7ac6c4SWang Shilong 
7327b0e492eSDarrick J. Wong 	if (ext4_has_feature_project(inode->i_sb))
7337b0e492eSDarrick J. Wong 		fa->fsx_projid = from_kprojid(&init_user_ns, ei->i_projid);
734dc7ac6c4SWang Shilong }
735dc7ac6c4SWang Shilong 
736bb5835edSTheodore Ts'o /* copied from fs/ioctl.c */
737bb5835edSTheodore Ts'o static int fiemap_check_ranges(struct super_block *sb,
738bb5835edSTheodore Ts'o 			       u64 start, u64 len, u64 *new_len)
739bb5835edSTheodore Ts'o {
740bb5835edSTheodore Ts'o 	u64 maxbytes = (u64) sb->s_maxbytes;
741bb5835edSTheodore Ts'o 
742bb5835edSTheodore Ts'o 	*new_len = len;
743bb5835edSTheodore Ts'o 
744bb5835edSTheodore Ts'o 	if (len == 0)
745bb5835edSTheodore Ts'o 		return -EINVAL;
746bb5835edSTheodore Ts'o 
747bb5835edSTheodore Ts'o 	if (start > maxbytes)
748bb5835edSTheodore Ts'o 		return -EFBIG;
749bb5835edSTheodore Ts'o 
750bb5835edSTheodore Ts'o 	/*
751bb5835edSTheodore Ts'o 	 * Shrink request scope to what the fs can actually handle.
752bb5835edSTheodore Ts'o 	 */
753bb5835edSTheodore Ts'o 	if (len > maxbytes || (maxbytes - len) < start)
754bb5835edSTheodore Ts'o 		*new_len = maxbytes - start;
755bb5835edSTheodore Ts'o 
756bb5835edSTheodore Ts'o 	return 0;
757bb5835edSTheodore Ts'o }
758bb5835edSTheodore Ts'o 
759bb5835edSTheodore Ts'o /* So that the fiemap access checks can't overflow on 32 bit machines. */
760bb5835edSTheodore Ts'o #define FIEMAP_MAX_EXTENTS	(UINT_MAX / sizeof(struct fiemap_extent))
761bb5835edSTheodore Ts'o 
762bb5835edSTheodore Ts'o static int ext4_ioctl_get_es_cache(struct file *filp, unsigned long arg)
763bb5835edSTheodore Ts'o {
764bb5835edSTheodore Ts'o 	struct fiemap fiemap;
765bb5835edSTheodore Ts'o 	struct fiemap __user *ufiemap = (struct fiemap __user *) arg;
766bb5835edSTheodore Ts'o 	struct fiemap_extent_info fieinfo = { 0, };
767bb5835edSTheodore Ts'o 	struct inode *inode = file_inode(filp);
768bb5835edSTheodore Ts'o 	struct super_block *sb = inode->i_sb;
769bb5835edSTheodore Ts'o 	u64 len;
770bb5835edSTheodore Ts'o 	int error;
771bb5835edSTheodore Ts'o 
772bb5835edSTheodore Ts'o 	if (copy_from_user(&fiemap, ufiemap, sizeof(fiemap)))
773bb5835edSTheodore Ts'o 		return -EFAULT;
774bb5835edSTheodore Ts'o 
775bb5835edSTheodore Ts'o 	if (fiemap.fm_extent_count > FIEMAP_MAX_EXTENTS)
776bb5835edSTheodore Ts'o 		return -EINVAL;
777bb5835edSTheodore Ts'o 
778bb5835edSTheodore Ts'o 	error = fiemap_check_ranges(sb, fiemap.fm_start, fiemap.fm_length,
779bb5835edSTheodore Ts'o 				    &len);
780bb5835edSTheodore Ts'o 	if (error)
781bb5835edSTheodore Ts'o 		return error;
782bb5835edSTheodore Ts'o 
783bb5835edSTheodore Ts'o 	fieinfo.fi_flags = fiemap.fm_flags;
784bb5835edSTheodore Ts'o 	fieinfo.fi_extents_max = fiemap.fm_extent_count;
785bb5835edSTheodore Ts'o 	fieinfo.fi_extents_start = ufiemap->fm_extents;
786bb5835edSTheodore Ts'o 
787bb5835edSTheodore Ts'o 	if (fiemap.fm_extent_count != 0 &&
788bb5835edSTheodore Ts'o 	    !access_ok(fieinfo.fi_extents_start,
789bb5835edSTheodore Ts'o 		       fieinfo.fi_extents_max * sizeof(struct fiemap_extent)))
790bb5835edSTheodore Ts'o 		return -EFAULT;
791bb5835edSTheodore Ts'o 
792bb5835edSTheodore Ts'o 	if (fieinfo.fi_flags & FIEMAP_FLAG_SYNC)
793bb5835edSTheodore Ts'o 		filemap_write_and_wait(inode->i_mapping);
794bb5835edSTheodore Ts'o 
795bb5835edSTheodore Ts'o 	error = ext4_get_es_cache(inode, &fieinfo, fiemap.fm_start, len);
796bb5835edSTheodore Ts'o 	fiemap.fm_flags = fieinfo.fi_flags;
797bb5835edSTheodore Ts'o 	fiemap.fm_mapped_extents = fieinfo.fi_extents_mapped;
798bb5835edSTheodore Ts'o 	if (copy_to_user(ufiemap, &fiemap, sizeof(fiemap)))
799bb5835edSTheodore Ts'o 		error = -EFAULT;
800bb5835edSTheodore Ts'o 
801bb5835edSTheodore Ts'o 	return error;
802bb5835edSTheodore Ts'o }
803bb5835edSTheodore Ts'o 
8049b7365fcSLi Xi long ext4_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
8059b7365fcSLi Xi {
8069b7365fcSLi Xi 	struct inode *inode = file_inode(filp);
8079b7365fcSLi Xi 	struct super_block *sb = inode->i_sb;
8089b7365fcSLi Xi 	struct ext4_inode_info *ei = EXT4_I(inode);
8099b7365fcSLi Xi 	unsigned int flags;
8109b7365fcSLi Xi 
8119b7365fcSLi Xi 	ext4_debug("cmd = %u, arg = %lu\n", cmd, arg);
8129b7365fcSLi Xi 
8139b7365fcSLi Xi 	switch (cmd) {
8140c9ec4beSDarrick J. Wong 	case FS_IOC_GETFSMAP:
8150c9ec4beSDarrick J. Wong 		return ext4_ioc_getfsmap(sb, (void __user *)arg);
8169b7365fcSLi Xi 	case EXT4_IOC_GETFLAGS:
8179b7365fcSLi Xi 		flags = ei->i_flags & EXT4_FL_USER_VISIBLE;
8187ddf79a1SWang Shilong 		if (S_ISREG(inode->i_mode))
8197ddf79a1SWang Shilong 			flags &= ~EXT4_PROJINHERIT_FL;
8209b7365fcSLi Xi 		return put_user(flags, (int __user *) arg);
8219b7365fcSLi Xi 	case EXT4_IOC_SETFLAGS: {
8229b7365fcSLi Xi 		int err;
8239b7365fcSLi Xi 
8249b7365fcSLi Xi 		if (!inode_owner_or_capable(inode))
8259b7365fcSLi Xi 			return -EACCES;
8269b7365fcSLi Xi 
8279b7365fcSLi Xi 		if (get_user(flags, (int __user *) arg))
8289b7365fcSLi Xi 			return -EFAULT;
8299b7365fcSLi Xi 
830d14e7683SJan Kara 		if (flags & ~EXT4_FL_USER_VISIBLE)
831d14e7683SJan Kara 			return -EOPNOTSUPP;
832d14e7683SJan Kara 		/*
833d14e7683SJan Kara 		 * chattr(1) grabs flags via GETFLAGS, modifies the result and
834d14e7683SJan Kara 		 * passes that to SETFLAGS. So we cannot easily make SETFLAGS
835d14e7683SJan Kara 		 * more restrictive than just silently masking off visible but
836d14e7683SJan Kara 		 * not settable flags as we always did.
837d14e7683SJan Kara 		 */
838d14e7683SJan Kara 		flags &= EXT4_FL_USER_MODIFIABLE;
839d14e7683SJan Kara 		if (ext4_mask_flags(inode->i_mode, flags) != flags)
840d14e7683SJan Kara 			return -EOPNOTSUPP;
841d14e7683SJan Kara 
8429b7365fcSLi Xi 		err = mnt_want_write_file(filp);
8439b7365fcSLi Xi 		if (err)
8449b7365fcSLi Xi 			return err;
8459b7365fcSLi Xi 
8465955102cSAl Viro 		inode_lock(inode);
8472e538403SDarrick J. Wong 		err = ext4_ioctl_check_immutable(inode,
8482e538403SDarrick J. Wong 				from_kprojid(&init_user_ns, ei->i_projid),
8492e538403SDarrick J. Wong 				flags);
8502e538403SDarrick J. Wong 		if (!err)
8519b7365fcSLi Xi 			err = ext4_ioctl_setflags(inode, flags);
8525955102cSAl Viro 		inode_unlock(inode);
8532a79f17eSAl Viro 		mnt_drop_write_file(filp);
854ac27a0ecSDave Kleikamp 		return err;
855ac27a0ecSDave Kleikamp 	}
856617ba13bSMingming Cao 	case EXT4_IOC_GETVERSION:
857617ba13bSMingming Cao 	case EXT4_IOC_GETVERSION_OLD:
858ac27a0ecSDave Kleikamp 		return put_user(inode->i_generation, (int __user *) arg);
859617ba13bSMingming Cao 	case EXT4_IOC_SETVERSION:
860617ba13bSMingming Cao 	case EXT4_IOC_SETVERSION_OLD: {
861ac27a0ecSDave Kleikamp 		handle_t *handle;
862617ba13bSMingming Cao 		struct ext4_iloc iloc;
863ac27a0ecSDave Kleikamp 		__u32 generation;
864ac27a0ecSDave Kleikamp 		int err;
865ac27a0ecSDave Kleikamp 
8662e149670SSerge E. Hallyn 		if (!inode_owner_or_capable(inode))
867ac27a0ecSDave Kleikamp 			return -EPERM;
86842a74f20SDave Hansen 
8699aa5d32bSDmitry Monakhov 		if (ext4_has_metadata_csum(inode->i_sb)) {
870814525f4SDarrick J. Wong 			ext4_warning(sb, "Setting inode version is not "
871814525f4SDarrick J. Wong 				     "supported with metadata_csum enabled.");
872814525f4SDarrick J. Wong 			return -ENOTTY;
873814525f4SDarrick J. Wong 		}
874814525f4SDarrick J. Wong 
875a561be71SAl Viro 		err = mnt_want_write_file(filp);
87642a74f20SDave Hansen 		if (err)
87742a74f20SDave Hansen 			return err;
87842a74f20SDave Hansen 		if (get_user(generation, (int __user *) arg)) {
87942a74f20SDave Hansen 			err = -EFAULT;
88042a74f20SDave Hansen 			goto setversion_out;
88142a74f20SDave Hansen 		}
882ac27a0ecSDave Kleikamp 
8835955102cSAl Viro 		inode_lock(inode);
8849924a92aSTheodore Ts'o 		handle = ext4_journal_start(inode, EXT4_HT_INODE, 1);
88542a74f20SDave Hansen 		if (IS_ERR(handle)) {
88642a74f20SDave Hansen 			err = PTR_ERR(handle);
8876c2155b9SDjalal Harouni 			goto unlock_out;
88842a74f20SDave Hansen 		}
889617ba13bSMingming Cao 		err = ext4_reserve_inode_write(handle, inode, &iloc);
890ac27a0ecSDave Kleikamp 		if (err == 0) {
891eeca7ea1SDeepa Dinamani 			inode->i_ctime = current_time(inode);
892ac27a0ecSDave Kleikamp 			inode->i_generation = generation;
893617ba13bSMingming Cao 			err = ext4_mark_iloc_dirty(handle, inode, &iloc);
894ac27a0ecSDave Kleikamp 		}
895617ba13bSMingming Cao 		ext4_journal_stop(handle);
8966c2155b9SDjalal Harouni 
8976c2155b9SDjalal Harouni unlock_out:
8985955102cSAl Viro 		inode_unlock(inode);
89942a74f20SDave Hansen setversion_out:
9002a79f17eSAl Viro 		mnt_drop_write_file(filp);
901ac27a0ecSDave Kleikamp 		return err;
902ac27a0ecSDave Kleikamp 	}
903617ba13bSMingming Cao 	case EXT4_IOC_GROUP_EXTEND: {
904617ba13bSMingming Cao 		ext4_fsblk_t n_blocks_count;
905ac046f1dSPeng Tao 		int err, err2=0;
906ac27a0ecSDave Kleikamp 
9078f82f840SYongqiang Yang 		err = ext4_resize_begin(sb);
9088f82f840SYongqiang Yang 		if (err)
9098f82f840SYongqiang Yang 			return err;
910ac27a0ecSDave Kleikamp 
911014a1770SDjalal Harouni 		if (get_user(n_blocks_count, (__u32 __user *)arg)) {
912014a1770SDjalal Harouni 			err = -EFAULT;
913014a1770SDjalal Harouni 			goto group_extend_out;
914014a1770SDjalal Harouni 		}
915ac27a0ecSDave Kleikamp 
916e2b911c5SDarrick J. Wong 		if (ext4_has_feature_bigalloc(sb)) {
917bab08ab9STheodore Ts'o 			ext4_msg(sb, KERN_ERR,
918bab08ab9STheodore Ts'o 				 "Online resizing not supported with bigalloc");
919014a1770SDjalal Harouni 			err = -EOPNOTSUPP;
920014a1770SDjalal Harouni 			goto group_extend_out;
921bab08ab9STheodore Ts'o 		}
922bab08ab9STheodore Ts'o 
923a561be71SAl Viro 		err = mnt_want_write_file(filp);
92442a74f20SDave Hansen 		if (err)
925014a1770SDjalal Harouni 			goto group_extend_out;
92642a74f20SDave Hansen 
927617ba13bSMingming Cao 		err = ext4_group_extend(sb, EXT4_SB(sb)->s_es, n_blocks_count);
928ac046f1dSPeng Tao 		if (EXT4_SB(sb)->s_journal) {
929dab291afSMingming Cao 			jbd2_journal_lock_updates(EXT4_SB(sb)->s_journal);
9307ffe1ea8SHidehiro Kawai 			err2 = jbd2_journal_flush(EXT4_SB(sb)->s_journal);
931dab291afSMingming Cao 			jbd2_journal_unlock_updates(EXT4_SB(sb)->s_journal);
932ac046f1dSPeng Tao 		}
9337ffe1ea8SHidehiro Kawai 		if (err == 0)
9347ffe1ea8SHidehiro Kawai 			err = err2;
9352a79f17eSAl Viro 		mnt_drop_write_file(filp);
936014a1770SDjalal Harouni group_extend_out:
9378f82f840SYongqiang Yang 		ext4_resize_end(sb);
938ac27a0ecSDave Kleikamp 		return err;
939ac27a0ecSDave Kleikamp 	}
940748de673SAkira Fujita 
941748de673SAkira Fujita 	case EXT4_IOC_MOVE_EXT: {
942748de673SAkira Fujita 		struct move_extent me;
9432903ff01SAl Viro 		struct fd donor;
9442903ff01SAl Viro 		int err;
945748de673SAkira Fujita 
9464a58579bSAkira Fujita 		if (!(filp->f_mode & FMODE_READ) ||
9474a58579bSAkira Fujita 		    !(filp->f_mode & FMODE_WRITE))
9484a58579bSAkira Fujita 			return -EBADF;
9494a58579bSAkira Fujita 
950748de673SAkira Fujita 		if (copy_from_user(&me,
951748de673SAkira Fujita 			(struct move_extent __user *)arg, sizeof(me)))
952748de673SAkira Fujita 			return -EFAULT;
9534a58579bSAkira Fujita 		me.moved_len = 0;
954748de673SAkira Fujita 
9552903ff01SAl Viro 		donor = fdget(me.donor_fd);
9562903ff01SAl Viro 		if (!donor.file)
957748de673SAkira Fujita 			return -EBADF;
958748de673SAkira Fujita 
9592903ff01SAl Viro 		if (!(donor.file->f_mode & FMODE_WRITE)) {
9604a58579bSAkira Fujita 			err = -EBADF;
9614a58579bSAkira Fujita 			goto mext_out;
962748de673SAkira Fujita 		}
963748de673SAkira Fujita 
964e2b911c5SDarrick J. Wong 		if (ext4_has_feature_bigalloc(sb)) {
965bab08ab9STheodore Ts'o 			ext4_msg(sb, KERN_ERR,
966bab08ab9STheodore Ts'o 				 "Online defrag not supported with bigalloc");
967399c9b86SAl Viro 			err = -EOPNOTSUPP;
968399c9b86SAl Viro 			goto mext_out;
96973f34a5eSRoss Zwisler 		} else if (IS_DAX(inode)) {
97073f34a5eSRoss Zwisler 			ext4_msg(sb, KERN_ERR,
97173f34a5eSRoss Zwisler 				 "Online defrag not supported with DAX");
97273f34a5eSRoss Zwisler 			err = -EOPNOTSUPP;
97373f34a5eSRoss Zwisler 			goto mext_out;
974bab08ab9STheodore Ts'o 		}
975bab08ab9STheodore Ts'o 
976a561be71SAl Viro 		err = mnt_want_write_file(filp);
9774a58579bSAkira Fujita 		if (err)
9784a58579bSAkira Fujita 			goto mext_out;
9794a58579bSAkira Fujita 
9802903ff01SAl Viro 		err = ext4_move_extents(filp, donor.file, me.orig_start,
981748de673SAkira Fujita 					me.donor_start, me.len, &me.moved_len);
9822a79f17eSAl Viro 		mnt_drop_write_file(filp);
983748de673SAkira Fujita 
984c437b273SAkira Fujita 		if (copy_to_user((struct move_extent __user *)arg,
985c437b273SAkira Fujita 				 &me, sizeof(me)))
9864a58579bSAkira Fujita 			err = -EFAULT;
9874a58579bSAkira Fujita mext_out:
9882903ff01SAl Viro 		fdput(donor);
989748de673SAkira Fujita 		return err;
990748de673SAkira Fujita 	}
991748de673SAkira Fujita 
992617ba13bSMingming Cao 	case EXT4_IOC_GROUP_ADD: {
993617ba13bSMingming Cao 		struct ext4_new_group_data input;
994ac27a0ecSDave Kleikamp 
995617ba13bSMingming Cao 		if (copy_from_user(&input, (struct ext4_new_group_input __user *)arg,
996e145b35bSAl Viro 				sizeof(input)))
997e145b35bSAl Viro 			return -EFAULT;
998ac27a0ecSDave Kleikamp 
999e145b35bSAl Viro 		return ext4_ioctl_group_add(filp, &input);
1000ac27a0ecSDave Kleikamp 	}
1001ac27a0ecSDave Kleikamp 
1002c14c6fd5SAneesh Kumar K.V 	case EXT4_IOC_MIGRATE:
10032a43a878SAneesh Kumar K.V 	{
10042a43a878SAneesh Kumar K.V 		int err;
10052e149670SSerge E. Hallyn 		if (!inode_owner_or_capable(inode))
10062a43a878SAneesh Kumar K.V 			return -EACCES;
10072a43a878SAneesh Kumar K.V 
1008a561be71SAl Viro 		err = mnt_want_write_file(filp);
10092a43a878SAneesh Kumar K.V 		if (err)
10102a43a878SAneesh Kumar K.V 			return err;
10112a43a878SAneesh Kumar K.V 		/*
10122a43a878SAneesh Kumar K.V 		 * inode_mutex prevent write and truncate on the file.
10132a43a878SAneesh Kumar K.V 		 * Read still goes through. We take i_data_sem in
10142a43a878SAneesh Kumar K.V 		 * ext4_ext_swap_inode_data before we switch the
10152a43a878SAneesh Kumar K.V 		 * inode format to prevent read.
10162a43a878SAneesh Kumar K.V 		 */
10175955102cSAl Viro 		inode_lock((inode));
10182a43a878SAneesh Kumar K.V 		err = ext4_ext_migrate(inode);
10195955102cSAl Viro 		inode_unlock((inode));
10202a79f17eSAl Viro 		mnt_drop_write_file(filp);
10212a43a878SAneesh Kumar K.V 		return err;
10222a43a878SAneesh Kumar K.V 	}
1023c14c6fd5SAneesh Kumar K.V 
1024ccd2506bSTheodore Ts'o 	case EXT4_IOC_ALLOC_DA_BLKS:
1025ccd2506bSTheodore Ts'o 	{
1026ccd2506bSTheodore Ts'o 		int err;
10272e149670SSerge E. Hallyn 		if (!inode_owner_or_capable(inode))
1028ccd2506bSTheodore Ts'o 			return -EACCES;
1029ccd2506bSTheodore Ts'o 
1030a561be71SAl Viro 		err = mnt_want_write_file(filp);
1031ccd2506bSTheodore Ts'o 		if (err)
1032ccd2506bSTheodore Ts'o 			return err;
1033ccd2506bSTheodore Ts'o 		err = ext4_alloc_da_blocks(inode);
10342a79f17eSAl Viro 		mnt_drop_write_file(filp);
1035ccd2506bSTheodore Ts'o 		return err;
1036ccd2506bSTheodore Ts'o 	}
1037ccd2506bSTheodore Ts'o 
1038393d1d1dSDr. Tilmann Bubeck 	case EXT4_IOC_SWAP_BOOT:
10393e67cfadSDmitry Monakhov 	{
10403e67cfadSDmitry Monakhov 		int err;
1041393d1d1dSDr. Tilmann Bubeck 		if (!(filp->f_mode & FMODE_WRITE))
1042393d1d1dSDr. Tilmann Bubeck 			return -EBADF;
10433e67cfadSDmitry Monakhov 		err = mnt_want_write_file(filp);
10443e67cfadSDmitry Monakhov 		if (err)
10453e67cfadSDmitry Monakhov 			return err;
10463e67cfadSDmitry Monakhov 		err = swap_inode_boot_loader(sb, inode);
10473e67cfadSDmitry Monakhov 		mnt_drop_write_file(filp);
10483e67cfadSDmitry Monakhov 		return err;
10493e67cfadSDmitry Monakhov 	}
1050393d1d1dSDr. Tilmann Bubeck 
105119c5246dSYongqiang Yang 	case EXT4_IOC_RESIZE_FS: {
105219c5246dSYongqiang Yang 		ext4_fsblk_t n_blocks_count;
105319c5246dSYongqiang Yang 		int err = 0, err2 = 0;
10547f511862STheodore Ts'o 		ext4_group_t o_group = EXT4_SB(sb)->s_groups_count;
105519c5246dSYongqiang Yang 
105619c5246dSYongqiang Yang 		if (copy_from_user(&n_blocks_count, (__u64 __user *)arg,
105719c5246dSYongqiang Yang 				   sizeof(__u64))) {
105819c5246dSYongqiang Yang 			return -EFAULT;
105919c5246dSYongqiang Yang 		}
106019c5246dSYongqiang Yang 
106119c5246dSYongqiang Yang 		err = ext4_resize_begin(sb);
106219c5246dSYongqiang Yang 		if (err)
106319c5246dSYongqiang Yang 			return err;
106419c5246dSYongqiang Yang 
10658cae6f71SAl Viro 		err = mnt_want_write_file(filp);
106619c5246dSYongqiang Yang 		if (err)
106719c5246dSYongqiang Yang 			goto resizefs_out;
106819c5246dSYongqiang Yang 
106919c5246dSYongqiang Yang 		err = ext4_resize_fs(sb, n_blocks_count);
107019c5246dSYongqiang Yang 		if (EXT4_SB(sb)->s_journal) {
107119c5246dSYongqiang Yang 			jbd2_journal_lock_updates(EXT4_SB(sb)->s_journal);
107219c5246dSYongqiang Yang 			err2 = jbd2_journal_flush(EXT4_SB(sb)->s_journal);
107319c5246dSYongqiang Yang 			jbd2_journal_unlock_updates(EXT4_SB(sb)->s_journal);
107419c5246dSYongqiang Yang 		}
107519c5246dSYongqiang Yang 		if (err == 0)
107619c5246dSYongqiang Yang 			err = err2;
10778cae6f71SAl Viro 		mnt_drop_write_file(filp);
1078310a997fSKirill Tkhai 		if (!err && (o_group < EXT4_SB(sb)->s_groups_count) &&
10797f511862STheodore Ts'o 		    ext4_has_group_desc_csum(sb) &&
10807f511862STheodore Ts'o 		    test_opt(sb, INIT_INODE_TABLE))
10817f511862STheodore Ts'o 			err = ext4_register_li_request(sb, o_group);
10827f511862STheodore Ts'o 
108319c5246dSYongqiang Yang resizefs_out:
108419c5246dSYongqiang Yang 		ext4_resize_end(sb);
108519c5246dSYongqiang Yang 		return err;
108619c5246dSYongqiang Yang 	}
108719c5246dSYongqiang Yang 
1088e681c047SLukas Czerner 	case FITRIM:
1089e681c047SLukas Czerner 	{
109041431792SLukas Czerner 		struct request_queue *q = bdev_get_queue(sb->s_bdev);
1091e681c047SLukas Czerner 		struct fstrim_range range;
1092e681c047SLukas Czerner 		int ret = 0;
1093e681c047SLukas Czerner 
1094e681c047SLukas Czerner 		if (!capable(CAP_SYS_ADMIN))
1095e681c047SLukas Czerner 			return -EPERM;
1096e681c047SLukas Czerner 
109741431792SLukas Czerner 		if (!blk_queue_discard(q))
109841431792SLukas Czerner 			return -EOPNOTSUPP;
109941431792SLukas Czerner 
110018915b58SDarrick J. Wong 		/*
110118915b58SDarrick J. Wong 		 * We haven't replayed the journal, so we cannot use our
110218915b58SDarrick J. Wong 		 * block-bitmap-guided storage zapping commands.
110318915b58SDarrick J. Wong 		 */
110418915b58SDarrick J. Wong 		if (test_opt(sb, NOLOAD) && ext4_has_feature_journal(sb))
110518915b58SDarrick J. Wong 			return -EROFS;
110618915b58SDarrick J. Wong 
1107e6705f7cSH Hartley Sweeten 		if (copy_from_user(&range, (struct fstrim_range __user *)arg,
1108e681c047SLukas Czerner 		    sizeof(range)))
1109e681c047SLukas Czerner 			return -EFAULT;
1110e681c047SLukas Czerner 
11115c2ed62fSLukas Czerner 		range.minlen = max((unsigned int)range.minlen,
11125c2ed62fSLukas Czerner 				   q->limits.discard_granularity);
1113e681c047SLukas Czerner 		ret = ext4_trim_fs(sb, &range);
1114e681c047SLukas Czerner 		if (ret < 0)
1115e681c047SLukas Czerner 			return ret;
1116e681c047SLukas Czerner 
1117e6705f7cSH Hartley Sweeten 		if (copy_to_user((struct fstrim_range __user *)arg, &range,
1118e681c047SLukas Czerner 		    sizeof(range)))
1119e681c047SLukas Czerner 			return -EFAULT;
1120e681c047SLukas Czerner 
1121e681c047SLukas Czerner 		return 0;
1122e681c047SLukas Czerner 	}
11237869a4a6STheodore Ts'o 	case EXT4_IOC_PRECACHE_EXTENTS:
11247869a4a6STheodore Ts'o 		return ext4_ext_precache(inode);
1125e681c047SLukas Czerner 
1126db717d8eSEric Biggers 	case EXT4_IOC_SET_ENCRYPTION_POLICY:
11279a200d07SRichard Weinberger 		if (!ext4_has_feature_encrypt(sb))
11289a200d07SRichard Weinberger 			return -EOPNOTSUPP;
1129db717d8eSEric Biggers 		return fscrypt_ioctl_set_policy(filp, (const void __user *)arg);
11309a200d07SRichard Weinberger 
11319bd8212fSMichael Halcrow 	case EXT4_IOC_GET_ENCRYPTION_PWSALT: {
1132643fa961SChandan Rajendra #ifdef CONFIG_FS_ENCRYPTION
11339bd8212fSMichael Halcrow 		int err, err2;
11349bd8212fSMichael Halcrow 		struct ext4_sb_info *sbi = EXT4_SB(sb);
11359bd8212fSMichael Halcrow 		handle_t *handle;
11369bd8212fSMichael Halcrow 
113735997d1cSEric Biggers 		if (!ext4_has_feature_encrypt(sb))
11389bd8212fSMichael Halcrow 			return -EOPNOTSUPP;
11399bd8212fSMichael Halcrow 		if (uuid_is_zero(sbi->s_es->s_encrypt_pw_salt)) {
11409bd8212fSMichael Halcrow 			err = mnt_want_write_file(filp);
11419bd8212fSMichael Halcrow 			if (err)
11429bd8212fSMichael Halcrow 				return err;
11439bd8212fSMichael Halcrow 			handle = ext4_journal_start_sb(sb, EXT4_HT_MISC, 1);
11449bd8212fSMichael Halcrow 			if (IS_ERR(handle)) {
11459bd8212fSMichael Halcrow 				err = PTR_ERR(handle);
11469bd8212fSMichael Halcrow 				goto pwsalt_err_exit;
11479bd8212fSMichael Halcrow 			}
11489bd8212fSMichael Halcrow 			err = ext4_journal_get_write_access(handle, sbi->s_sbh);
11499bd8212fSMichael Halcrow 			if (err)
11509bd8212fSMichael Halcrow 				goto pwsalt_err_journal;
11519bd8212fSMichael Halcrow 			generate_random_uuid(sbi->s_es->s_encrypt_pw_salt);
11529bd8212fSMichael Halcrow 			err = ext4_handle_dirty_metadata(handle, NULL,
11539bd8212fSMichael Halcrow 							 sbi->s_sbh);
11549bd8212fSMichael Halcrow 		pwsalt_err_journal:
11559bd8212fSMichael Halcrow 			err2 = ext4_journal_stop(handle);
11569bd8212fSMichael Halcrow 			if (err2 && !err)
11579bd8212fSMichael Halcrow 				err = err2;
11589bd8212fSMichael Halcrow 		pwsalt_err_exit:
11599bd8212fSMichael Halcrow 			mnt_drop_write_file(filp);
11609bd8212fSMichael Halcrow 			if (err)
11619bd8212fSMichael Halcrow 				return err;
11629bd8212fSMichael Halcrow 		}
1163b4ab9e29SFabian Frederick 		if (copy_to_user((void __user *) arg,
1164b4ab9e29SFabian Frederick 				 sbi->s_es->s_encrypt_pw_salt, 16))
11659bd8212fSMichael Halcrow 			return -EFAULT;
11669bd8212fSMichael Halcrow 		return 0;
1167ba679017SEric Biggers #else
1168ba679017SEric Biggers 		return -EOPNOTSUPP;
1169ba679017SEric Biggers #endif
11709bd8212fSMichael Halcrow 	}
1171db717d8eSEric Biggers 	case EXT4_IOC_GET_ENCRYPTION_POLICY:
11720642ea24SChao Yu 		if (!ext4_has_feature_encrypt(sb))
11730642ea24SChao Yu 			return -EOPNOTSUPP;
1174db717d8eSEric Biggers 		return fscrypt_ioctl_get_policy(filp, (void __user *)arg);
11759bd8212fSMichael Halcrow 
117629b3692eSEric Biggers 	case FS_IOC_GET_ENCRYPTION_POLICY_EX:
117729b3692eSEric Biggers 		if (!ext4_has_feature_encrypt(sb))
117829b3692eSEric Biggers 			return -EOPNOTSUPP;
117929b3692eSEric Biggers 		return fscrypt_ioctl_get_policy_ex(filp, (void __user *)arg);
118029b3692eSEric Biggers 
118129b3692eSEric Biggers 	case FS_IOC_ADD_ENCRYPTION_KEY:
118229b3692eSEric Biggers 		if (!ext4_has_feature_encrypt(sb))
118329b3692eSEric Biggers 			return -EOPNOTSUPP;
118429b3692eSEric Biggers 		return fscrypt_ioctl_add_key(filp, (void __user *)arg);
118529b3692eSEric Biggers 
118629b3692eSEric Biggers 	case FS_IOC_REMOVE_ENCRYPTION_KEY:
118729b3692eSEric Biggers 		if (!ext4_has_feature_encrypt(sb))
118829b3692eSEric Biggers 			return -EOPNOTSUPP;
118929b3692eSEric Biggers 		return fscrypt_ioctl_remove_key(filp, (void __user *)arg);
119029b3692eSEric Biggers 
119129b3692eSEric Biggers 	case FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS:
119229b3692eSEric Biggers 		if (!ext4_has_feature_encrypt(sb))
119329b3692eSEric Biggers 			return -EOPNOTSUPP;
119429b3692eSEric Biggers 		return fscrypt_ioctl_remove_key_all_users(filp,
119529b3692eSEric Biggers 							  (void __user *)arg);
119629b3692eSEric Biggers 	case FS_IOC_GET_ENCRYPTION_KEY_STATUS:
119729b3692eSEric Biggers 		if (!ext4_has_feature_encrypt(sb))
119829b3692eSEric Biggers 			return -EOPNOTSUPP;
119929b3692eSEric Biggers 		return fscrypt_ioctl_get_key_status(filp, (void __user *)arg);
120029b3692eSEric Biggers 
12017ec9f3b4SEric Biggers 	case FS_IOC_GET_ENCRYPTION_NONCE:
12027ec9f3b4SEric Biggers 		if (!ext4_has_feature_encrypt(sb))
12037ec9f3b4SEric Biggers 			return -EOPNOTSUPP;
12047ec9f3b4SEric Biggers 		return fscrypt_ioctl_get_nonce(filp, (void __user *)arg);
12057ec9f3b4SEric Biggers 
1206b0c013e2STheodore Ts'o 	case EXT4_IOC_CLEAR_ES_CACHE:
1207b0c013e2STheodore Ts'o 	{
1208b0c013e2STheodore Ts'o 		if (!inode_owner_or_capable(inode))
1209b0c013e2STheodore Ts'o 			return -EACCES;
1210b0c013e2STheodore Ts'o 		ext4_clear_inode_es(inode);
1211b0c013e2STheodore Ts'o 		return 0;
1212b0c013e2STheodore Ts'o 	}
1213b0c013e2STheodore Ts'o 
12141ad3ea6eSTheodore Ts'o 	case EXT4_IOC_GETSTATE:
12151ad3ea6eSTheodore Ts'o 	{
12161ad3ea6eSTheodore Ts'o 		__u32	state = 0;
12171ad3ea6eSTheodore Ts'o 
12181ad3ea6eSTheodore Ts'o 		if (ext4_test_inode_state(inode, EXT4_STATE_EXT_PRECACHED))
12191ad3ea6eSTheodore Ts'o 			state |= EXT4_STATE_FLAG_EXT_PRECACHED;
12201ad3ea6eSTheodore Ts'o 		if (ext4_test_inode_state(inode, EXT4_STATE_NEW))
12211ad3ea6eSTheodore Ts'o 			state |= EXT4_STATE_FLAG_NEW;
12221ad3ea6eSTheodore Ts'o 		if (ext4_test_inode_state(inode, EXT4_STATE_NEWENTRY))
12231ad3ea6eSTheodore Ts'o 			state |= EXT4_STATE_FLAG_NEWENTRY;
12241ad3ea6eSTheodore Ts'o 		if (ext4_test_inode_state(inode, EXT4_STATE_DA_ALLOC_CLOSE))
12251ad3ea6eSTheodore Ts'o 			state |= EXT4_STATE_FLAG_DA_ALLOC_CLOSE;
12261ad3ea6eSTheodore Ts'o 
12271ad3ea6eSTheodore Ts'o 		return put_user(state, (__u32 __user *) arg);
12281ad3ea6eSTheodore Ts'o 	}
12291ad3ea6eSTheodore Ts'o 
1230bb5835edSTheodore Ts'o 	case EXT4_IOC_GET_ES_CACHE:
1231bb5835edSTheodore Ts'o 		return ext4_ioctl_get_es_cache(filp, arg);
1232bb5835edSTheodore Ts'o 
12339b7365fcSLi Xi 	case EXT4_IOC_FSGETXATTR:
12349b7365fcSLi Xi 	{
12359b7365fcSLi Xi 		struct fsxattr fa;
12369b7365fcSLi Xi 
12377b0e492eSDarrick J. Wong 		ext4_fill_fsxattr(inode, &fa);
12389b7365fcSLi Xi 
12399b7365fcSLi Xi 		if (copy_to_user((struct fsxattr __user *)arg,
12409b7365fcSLi Xi 				 &fa, sizeof(fa)))
12419b7365fcSLi Xi 			return -EFAULT;
12429b7365fcSLi Xi 		return 0;
12439b7365fcSLi Xi 	}
12449b7365fcSLi Xi 	case EXT4_IOC_FSSETXATTR:
12459b7365fcSLi Xi 	{
12467b0e492eSDarrick J. Wong 		struct fsxattr fa, old_fa;
12479b7365fcSLi Xi 		int err;
12489b7365fcSLi Xi 
12499b7365fcSLi Xi 		if (copy_from_user(&fa, (struct fsxattr __user *)arg,
12509b7365fcSLi Xi 				   sizeof(fa)))
12519b7365fcSLi Xi 			return -EFAULT;
12529b7365fcSLi Xi 
12539b7365fcSLi Xi 		/* Make sure caller has proper permission */
12549b7365fcSLi Xi 		if (!inode_owner_or_capable(inode))
12559b7365fcSLi Xi 			return -EACCES;
12569b7365fcSLi Xi 
1257d14e7683SJan Kara 		if (fa.fsx_xflags & ~EXT4_SUPPORTED_FS_XFLAGS)
1258d14e7683SJan Kara 			return -EOPNOTSUPP;
1259d14e7683SJan Kara 
1260d14e7683SJan Kara 		flags = ext4_xflags_to_iflags(fa.fsx_xflags);
1261d14e7683SJan Kara 		if (ext4_mask_flags(inode->i_mode, flags) != flags)
1262d14e7683SJan Kara 			return -EOPNOTSUPP;
1263d14e7683SJan Kara 
12649b7365fcSLi Xi 		err = mnt_want_write_file(filp);
12659b7365fcSLi Xi 		if (err)
12669b7365fcSLi Xi 			return err;
12679b7365fcSLi Xi 
12685955102cSAl Viro 		inode_lock(inode);
12697b0e492eSDarrick J. Wong 		ext4_fill_fsxattr(inode, &old_fa);
12707b0e492eSDarrick J. Wong 		err = vfs_ioc_fssetxattr_check(inode, &old_fa, &fa);
1271dc7ac6c4SWang Shilong 		if (err)
1272dc7ac6c4SWang Shilong 			goto out;
12739b7365fcSLi Xi 		flags = (ei->i_flags & ~EXT4_FL_XFLAG_VISIBLE) |
12749b7365fcSLi Xi 			 (flags & EXT4_FL_XFLAG_VISIBLE);
12752e538403SDarrick J. Wong 		err = ext4_ioctl_check_immutable(inode, fa.fsx_projid, flags);
12762e538403SDarrick J. Wong 		if (err)
12772e538403SDarrick J. Wong 			goto out;
12789b7365fcSLi Xi 		err = ext4_ioctl_setflags(inode, flags);
1279dc7ac6c4SWang Shilong 		if (err)
1280dc7ac6c4SWang Shilong 			goto out;
1281dc7ac6c4SWang Shilong 		err = ext4_ioctl_setproject(filp, fa.fsx_projid);
1282dc7ac6c4SWang Shilong out:
12835955102cSAl Viro 		inode_unlock(inode);
12849b7365fcSLi Xi 		mnt_drop_write_file(filp);
12859b7365fcSLi Xi 		return err;
12869b7365fcSLi Xi 	}
1287e9be2ac7STheodore Ts'o 	case EXT4_IOC_SHUTDOWN:
1288e9be2ac7STheodore Ts'o 		return ext4_shutdown(sb, arg);
1289c93d8f88SEric Biggers 
1290c93d8f88SEric Biggers 	case FS_IOC_ENABLE_VERITY:
1291c93d8f88SEric Biggers 		if (!ext4_has_feature_verity(sb))
1292c93d8f88SEric Biggers 			return -EOPNOTSUPP;
1293c93d8f88SEric Biggers 		return fsverity_ioctl_enable(filp, (const void __user *)arg);
1294c93d8f88SEric Biggers 
1295c93d8f88SEric Biggers 	case FS_IOC_MEASURE_VERITY:
1296c93d8f88SEric Biggers 		if (!ext4_has_feature_verity(sb))
1297c93d8f88SEric Biggers 			return -EOPNOTSUPP;
1298c93d8f88SEric Biggers 		return fsverity_ioctl_measure(filp, (void __user *)arg);
1299c93d8f88SEric Biggers 
1300ac27a0ecSDave Kleikamp 	default:
1301ac27a0ecSDave Kleikamp 		return -ENOTTY;
1302ac27a0ecSDave Kleikamp 	}
1303ac27a0ecSDave Kleikamp }
1304ac27a0ecSDave Kleikamp 
1305ac27a0ecSDave Kleikamp #ifdef CONFIG_COMPAT
1306617ba13bSMingming Cao long ext4_compat_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1307ac27a0ecSDave Kleikamp {
1308ac27a0ecSDave Kleikamp 	/* These are just misnamed, they actually get/put from/to user an int */
1309ac27a0ecSDave Kleikamp 	switch (cmd) {
1310617ba13bSMingming Cao 	case EXT4_IOC32_GETFLAGS:
1311617ba13bSMingming Cao 		cmd = EXT4_IOC_GETFLAGS;
1312ac27a0ecSDave Kleikamp 		break;
1313617ba13bSMingming Cao 	case EXT4_IOC32_SETFLAGS:
1314617ba13bSMingming Cao 		cmd = EXT4_IOC_SETFLAGS;
1315ac27a0ecSDave Kleikamp 		break;
1316617ba13bSMingming Cao 	case EXT4_IOC32_GETVERSION:
1317617ba13bSMingming Cao 		cmd = EXT4_IOC_GETVERSION;
1318ac27a0ecSDave Kleikamp 		break;
1319617ba13bSMingming Cao 	case EXT4_IOC32_SETVERSION:
1320617ba13bSMingming Cao 		cmd = EXT4_IOC_SETVERSION;
1321ac27a0ecSDave Kleikamp 		break;
1322617ba13bSMingming Cao 	case EXT4_IOC32_GROUP_EXTEND:
1323617ba13bSMingming Cao 		cmd = EXT4_IOC_GROUP_EXTEND;
1324ac27a0ecSDave Kleikamp 		break;
1325617ba13bSMingming Cao 	case EXT4_IOC32_GETVERSION_OLD:
1326617ba13bSMingming Cao 		cmd = EXT4_IOC_GETVERSION_OLD;
1327ac27a0ecSDave Kleikamp 		break;
1328617ba13bSMingming Cao 	case EXT4_IOC32_SETVERSION_OLD:
1329617ba13bSMingming Cao 		cmd = EXT4_IOC_SETVERSION_OLD;
1330ac27a0ecSDave Kleikamp 		break;
1331617ba13bSMingming Cao 	case EXT4_IOC32_GETRSVSZ:
1332617ba13bSMingming Cao 		cmd = EXT4_IOC_GETRSVSZ;
1333ac27a0ecSDave Kleikamp 		break;
1334617ba13bSMingming Cao 	case EXT4_IOC32_SETRSVSZ:
1335617ba13bSMingming Cao 		cmd = EXT4_IOC_SETRSVSZ;
1336ac27a0ecSDave Kleikamp 		break;
13374d92dc0fSBen Hutchings 	case EXT4_IOC32_GROUP_ADD: {
13384d92dc0fSBen Hutchings 		struct compat_ext4_new_group_input __user *uinput;
1339e145b35bSAl Viro 		struct ext4_new_group_data input;
13404d92dc0fSBen Hutchings 		int err;
13414d92dc0fSBen Hutchings 
13424d92dc0fSBen Hutchings 		uinput = compat_ptr(arg);
13434d92dc0fSBen Hutchings 		err = get_user(input.group, &uinput->group);
13444d92dc0fSBen Hutchings 		err |= get_user(input.block_bitmap, &uinput->block_bitmap);
13454d92dc0fSBen Hutchings 		err |= get_user(input.inode_bitmap, &uinput->inode_bitmap);
13464d92dc0fSBen Hutchings 		err |= get_user(input.inode_table, &uinput->inode_table);
13474d92dc0fSBen Hutchings 		err |= get_user(input.blocks_count, &uinput->blocks_count);
13484d92dc0fSBen Hutchings 		err |= get_user(input.reserved_blocks,
13494d92dc0fSBen Hutchings 				&uinput->reserved_blocks);
13504d92dc0fSBen Hutchings 		if (err)
13514d92dc0fSBen Hutchings 			return -EFAULT;
1352e145b35bSAl Viro 		return ext4_ioctl_group_add(file, &input);
13534d92dc0fSBen Hutchings 	}
1354b684b2eeSChristian Borntraeger 	case EXT4_IOC_MOVE_EXT:
135519c5246dSYongqiang Yang 	case EXT4_IOC_RESIZE_FS:
1356314999dcSArnd Bergmann 	case FITRIM:
13577869a4a6STheodore Ts'o 	case EXT4_IOC_PRECACHE_EXTENTS:
13589bd8212fSMichael Halcrow 	case EXT4_IOC_SET_ENCRYPTION_POLICY:
13599bd8212fSMichael Halcrow 	case EXT4_IOC_GET_ENCRYPTION_PWSALT:
13609bd8212fSMichael Halcrow 	case EXT4_IOC_GET_ENCRYPTION_POLICY:
136129b3692eSEric Biggers 	case FS_IOC_GET_ENCRYPTION_POLICY_EX:
136229b3692eSEric Biggers 	case FS_IOC_ADD_ENCRYPTION_KEY:
136329b3692eSEric Biggers 	case FS_IOC_REMOVE_ENCRYPTION_KEY:
136429b3692eSEric Biggers 	case FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS:
136529b3692eSEric Biggers 	case FS_IOC_GET_ENCRYPTION_KEY_STATUS:
13667ec9f3b4SEric Biggers 	case FS_IOC_GET_ENCRYPTION_NONCE:
1367e9be2ac7STheodore Ts'o 	case EXT4_IOC_SHUTDOWN:
13680c9ec4beSDarrick J. Wong 	case FS_IOC_GETFSMAP:
1369c93d8f88SEric Biggers 	case FS_IOC_ENABLE_VERITY:
1370c93d8f88SEric Biggers 	case FS_IOC_MEASURE_VERITY:
1371b0c013e2STheodore Ts'o 	case EXT4_IOC_CLEAR_ES_CACHE:
13721ad3ea6eSTheodore Ts'o 	case EXT4_IOC_GETSTATE:
1373bb5835edSTheodore Ts'o 	case EXT4_IOC_GET_ES_CACHE:
1374a54d8d34SMartijn Coenen 	case EXT4_IOC_FSGETXATTR:
1375a54d8d34SMartijn Coenen 	case EXT4_IOC_FSSETXATTR:
1376b684b2eeSChristian Borntraeger 		break;
1377ac27a0ecSDave Kleikamp 	default:
1378ac27a0ecSDave Kleikamp 		return -ENOIOCTLCMD;
1379ac27a0ecSDave Kleikamp 	}
13805cdd7b2dSAndi Kleen 	return ext4_ioctl(file, cmd, (unsigned long) compat_ptr(arg));
1381ac27a0ecSDave Kleikamp }
1382ac27a0ecSDave Kleikamp #endif
1383