1 // SPDX-License-Identifier: GPL-2.0
3 * linux/fs/ext4/ioctl.c
5 * Copyright (C) 1993, 1994, 1995
6 * Remy Card (card@masi.ibp.fr)
7 * Laboratoire MASI - Institut Blaise Pascal
8 * Universite Pierre et Marie Curie (Paris VI)
12 #include <linux/capability.h>
13 #include <linux/time.h>
14 #include <linux/compat.h>
15 #include <linux/mount.h>
16 #include <linux/file.h>
17 #include <linux/quotaops.h>
18 #include <linux/random.h>
19 #include <linux/uaccess.h>
20 #include <linux/delay.h>
21 #include <linux/iversion.h>
22 #include <linux/fileattr.h>
23 #include <linux/uuid.h>
24 #include "ext4_jbd2.h"
26 #include <linux/fsmap.h>
28 #include <trace/events/ext4.h>
30 typedef void ext4_update_sb_callback(struct ext4_super_block
*es
,
34 * Superblock modification callback function for changing file system
37 static void ext4_sb_setlabel(struct ext4_super_block
*es
, const void *arg
)
39 /* Sanity check, this should never happen */
40 BUILD_BUG_ON(sizeof(es
->s_volume_name
) < EXT4_LABEL_MAX
);
42 memcpy(es
->s_volume_name
, (char *)arg
, EXT4_LABEL_MAX
);
46 * Superblock modification callback function for changing file system
49 static void ext4_sb_setuuid(struct ext4_super_block
*es
, const void *arg
)
51 memcpy(es
->s_uuid
, (__u8
*)arg
, UUID_SIZE
);
55 int ext4_update_primary_sb(struct super_block
*sb
, handle_t
*handle
,
56 ext4_update_sb_callback func
,
60 struct ext4_sb_info
*sbi
= EXT4_SB(sb
);
61 struct buffer_head
*bh
= sbi
->s_sbh
;
62 struct ext4_super_block
*es
= sbi
->s_es
;
64 trace_ext4_update_sb(sb
, bh
->b_blocknr
, 1);
66 BUFFER_TRACE(bh
, "get_write_access");
67 err
= ext4_journal_get_write_access(handle
, sb
,
75 ext4_superblock_csum_set(sb
);
78 if (buffer_write_io_error(bh
) || !buffer_uptodate(bh
)) {
79 ext4_msg(sbi
->s_sb
, KERN_ERR
, "previous I/O error to "
80 "superblock detected");
81 clear_buffer_write_io_error(bh
);
82 set_buffer_uptodate(bh
);
85 err
= ext4_handle_dirty_metadata(handle
, NULL
, bh
);
88 err
= sync_dirty_buffer(bh
);
90 ext4_std_error(sb
, err
);
95 * Update one backup superblock in the group 'grp' using the callback
96 * function 'func' and argument 'arg'. If the handle is NULL the
97 * modification is not journalled.
99 * Returns: 0 when no modification was done (no superblock in the group)
100 * 1 when the modification was successful
103 static int ext4_update_backup_sb(struct super_block
*sb
,
104 handle_t
*handle
, ext4_group_t grp
,
105 ext4_update_sb_callback func
, const void *arg
)
108 ext4_fsblk_t sb_block
;
109 struct buffer_head
*bh
;
110 unsigned long offset
= 0;
111 struct ext4_super_block
*es
;
113 if (!ext4_bg_has_super(sb
, grp
))
117 * For the group 0 there is always 1k padding, so we have
118 * either adjust offset, or sb_block depending on blocksize
121 sb_block
= 1 * EXT4_MIN_BLOCK_SIZE
;
122 offset
= do_div(sb_block
, sb
->s_blocksize
);
124 sb_block
= ext4_group_first_block_no(sb
, grp
);
128 trace_ext4_update_sb(sb
, sb_block
, handle
? 1 : 0);
130 bh
= ext4_sb_bread(sb
, sb_block
, 0);
135 BUFFER_TRACE(bh
, "get_write_access");
136 err
= ext4_journal_get_write_access(handle
, sb
,
143 es
= (struct ext4_super_block
*) (bh
->b_data
+ offset
);
145 if (ext4_has_metadata_csum(sb
) &&
146 es
->s_checksum
!= ext4_superblock_csum(sb
, es
)) {
147 ext4_msg(sb
, KERN_ERR
, "Invalid checksum for backup "
148 "superblock %llu", sb_block
);
153 if (ext4_has_metadata_csum(sb
))
154 es
->s_checksum
= ext4_superblock_csum(sb
, es
);
155 set_buffer_uptodate(bh
);
159 err
= ext4_handle_dirty_metadata(handle
, NULL
, bh
);
163 BUFFER_TRACE(bh
, "marking dirty");
164 mark_buffer_dirty(bh
);
166 err
= sync_dirty_buffer(bh
);
170 ext4_std_error(sb
, err
);
171 return (err
) ? err
: 1;
175 * Update primary and backup superblocks using the provided function
176 * func and argument arg.
178 * Only the primary superblock and at most two backup superblock
179 * modifications are journalled; the rest is modified without journal.
180 * This is safe because e2fsck will re-write them if there is a problem,
181 * and we're very unlikely to ever need more than two backups.
184 int ext4_update_superblocks_fn(struct super_block
*sb
,
185 ext4_update_sb_callback func
,
189 ext4_group_t ngroups
;
190 unsigned int three
= 1;
191 unsigned int five
= 5;
192 unsigned int seven
= 7;
194 ext4_group_t grp
, primary_grp
;
195 struct ext4_sb_info
*sbi
= EXT4_SB(sb
);
198 * We can't update superblocks while the online resize is running
200 if (test_and_set_bit_lock(EXT4_FLAGS_RESIZING
,
201 &sbi
->s_ext4_flags
)) {
202 ext4_msg(sb
, KERN_ERR
, "Can't modify superblock while"
203 "performing online resize");
208 * We're only going to update primary superblock and two
209 * backup superblocks in this transaction.
211 handle
= ext4_journal_start_sb(sb
, EXT4_HT_MISC
, 3);
212 if (IS_ERR(handle
)) {
213 err
= PTR_ERR(handle
);
217 /* Update primary superblock */
218 err
= ext4_update_primary_sb(sb
, handle
, func
, arg
);
220 ext4_msg(sb
, KERN_ERR
, "Failed to update primary "
225 primary_grp
= ext4_get_group_number(sb
, sbi
->s_sbh
->b_blocknr
);
226 ngroups
= ext4_get_groups_count(sb
);
229 * Update backup superblocks. We have to start from group 0
230 * because it might not be where the primary superblock is
231 * if the fs is mounted with -o sb=<backup_sb_block>
235 while (grp
< ngroups
) {
236 /* Skip primary superblock */
237 if (grp
== primary_grp
)
240 ret
= ext4_update_backup_sb(sb
, handle
, grp
, func
, arg
);
242 /* Ignore bad checksum; try to update next sb */
243 if (ret
== -EFSBADCRC
)
250 if (handle
&& i
> 1) {
252 * We're only journalling primary superblock and
253 * two backup superblocks; the rest is not
256 err
= ext4_journal_stop(handle
);
262 grp
= ext4_list_backups(sb
, &three
, &five
, &seven
);
267 ret
= ext4_journal_stop(handle
);
272 clear_bit_unlock(EXT4_FLAGS_RESIZING
, &sbi
->s_ext4_flags
);
273 smp_mb__after_atomic();
274 return err
? err
: 0;
278 * Swap memory between @a and @b for @len bytes.
280 * @a: pointer to first memory area
281 * @b: pointer to second memory area
282 * @len: number of bytes to swap
285 static void memswap(void *a
, void *b
, size_t len
)
287 unsigned char *ap
, *bp
;
289 ap
= (unsigned char *)a
;
290 bp
= (unsigned char *)b
;
299 * Swap i_data and associated attributes between @inode1 and @inode2.
300 * This function is used for the primary swap between inode1 and inode2
301 * and also to revert this primary swap in case of errors.
303 * Therefore you have to make sure, that calling this method twice
304 * will revert all changes.
306 * @inode1: pointer to first inode
307 * @inode2: pointer to second inode
309 static void swap_inode_data(struct inode
*inode1
, struct inode
*inode2
)
312 struct ext4_inode_info
*ei1
;
313 struct ext4_inode_info
*ei2
;
315 struct timespec64 ts1
, ts2
;
317 ei1
= EXT4_I(inode1
);
318 ei2
= EXT4_I(inode2
);
320 swap(inode1
->i_version
, inode2
->i_version
);
322 ts1
= inode_get_atime(inode1
);
323 ts2
= inode_get_atime(inode2
);
324 inode_set_atime_to_ts(inode1
, ts2
);
325 inode_set_atime_to_ts(inode2
, ts1
);
327 ts1
= inode_get_mtime(inode1
);
328 ts2
= inode_get_mtime(inode2
);
329 inode_set_mtime_to_ts(inode1
, ts2
);
330 inode_set_mtime_to_ts(inode2
, ts1
);
332 memswap(ei1
->i_data
, ei2
->i_data
, sizeof(ei1
->i_data
));
333 tmp
= ei1
->i_flags
& EXT4_FL_SHOULD_SWAP
;
334 ei1
->i_flags
= (ei2
->i_flags
& EXT4_FL_SHOULD_SWAP
) |
335 (ei1
->i_flags
& ~EXT4_FL_SHOULD_SWAP
);
336 ei2
->i_flags
= tmp
| (ei2
->i_flags
& ~EXT4_FL_SHOULD_SWAP
);
337 swap(ei1
->i_disksize
, ei2
->i_disksize
);
338 ext4_es_remove_extent(inode1
, 0, EXT_MAX_BLOCKS
);
339 ext4_es_remove_extent(inode2
, 0, EXT_MAX_BLOCKS
);
341 isize
= i_size_read(inode1
);
342 i_size_write(inode1
, i_size_read(inode2
));
343 i_size_write(inode2
, isize
);
346 void ext4_reset_inode_seed(struct inode
*inode
)
348 struct ext4_inode_info
*ei
= EXT4_I(inode
);
349 struct ext4_sb_info
*sbi
= EXT4_SB(inode
->i_sb
);
350 __le32 inum
= cpu_to_le32(inode
->i_ino
);
351 __le32 gen
= cpu_to_le32(inode
->i_generation
);
354 if (!ext4_has_metadata_csum(inode
->i_sb
))
357 csum
= ext4_chksum(sbi
, sbi
->s_csum_seed
, (__u8
*)&inum
, sizeof(inum
));
358 ei
->i_csum_seed
= ext4_chksum(sbi
, csum
, (__u8
*)&gen
, sizeof(gen
));
362 * Swap the information from the given @inode and the inode
363 * EXT4_BOOT_LOADER_INO. It will basically swap i_data and all other
364 * important fields of the inodes.
366 * @sb: the super block of the filesystem
367 * @idmap: idmap of the mount the inode was found from
368 * @inode: the inode to swap with EXT4_BOOT_LOADER_INO
371 static long swap_inode_boot_loader(struct super_block
*sb
,
372 struct mnt_idmap
*idmap
,
377 struct inode
*inode_bl
;
378 struct ext4_inode_info
*ei_bl
;
379 qsize_t size
, size_bl
, diff
;
381 unsigned short bytes
;
383 inode_bl
= ext4_iget(sb
, EXT4_BOOT_LOADER_INO
,
384 EXT4_IGET_SPECIAL
| EXT4_IGET_BAD
);
385 if (IS_ERR(inode_bl
))
386 return PTR_ERR(inode_bl
);
387 ei_bl
= EXT4_I(inode_bl
);
389 /* Protect orig inodes against a truncate and make sure,
390 * that only 1 swap_inode_boot_loader is running. */
391 lock_two_nondirectories(inode
, inode_bl
);
393 if (inode
->i_nlink
!= 1 || !S_ISREG(inode
->i_mode
) ||
394 IS_SWAPFILE(inode
) || IS_ENCRYPTED(inode
) ||
395 (EXT4_I(inode
)->i_flags
& EXT4_JOURNAL_DATA_FL
) ||
396 ext4_has_inline_data(inode
)) {
398 goto journal_err_out
;
401 if (IS_RDONLY(inode
) || IS_APPEND(inode
) || IS_IMMUTABLE(inode
) ||
402 !inode_owner_or_capable(idmap
, inode
) ||
403 !capable(CAP_SYS_ADMIN
)) {
405 goto journal_err_out
;
408 filemap_invalidate_lock(inode
->i_mapping
);
409 err
= filemap_write_and_wait(inode
->i_mapping
);
413 err
= filemap_write_and_wait(inode_bl
->i_mapping
);
417 /* Wait for all existing dio workers */
418 inode_dio_wait(inode
);
419 inode_dio_wait(inode_bl
);
421 truncate_inode_pages(&inode
->i_data
, 0);
422 truncate_inode_pages(&inode_bl
->i_data
, 0);
424 handle
= ext4_journal_start(inode_bl
, EXT4_HT_MOVE_EXTENTS
, 2);
425 if (IS_ERR(handle
)) {
429 ext4_fc_mark_ineligible(sb
, EXT4_FC_REASON_SWAP_BOOT
, handle
);
431 /* Protect extent tree against block allocations via delalloc */
432 ext4_double_down_write_data_sem(inode
, inode_bl
);
434 if (is_bad_inode(inode_bl
) || !S_ISREG(inode_bl
->i_mode
)) {
435 /* this inode has never been used as a BOOT_LOADER */
436 set_nlink(inode_bl
, 1);
437 i_uid_write(inode_bl
, 0);
438 i_gid_write(inode_bl
, 0);
439 inode_bl
->i_flags
= 0;
441 inode_set_iversion(inode_bl
, 1);
442 i_size_write(inode_bl
, 0);
443 EXT4_I(inode_bl
)->i_disksize
= inode_bl
->i_size
;
444 inode_bl
->i_mode
= S_IFREG
;
445 if (ext4_has_feature_extents(sb
)) {
446 ext4_set_inode_flag(inode_bl
, EXT4_INODE_EXTENTS
);
447 ext4_ext_tree_init(handle
, inode_bl
);
449 memset(ei_bl
->i_data
, 0, sizeof(ei_bl
->i_data
));
452 err
= dquot_initialize(inode
);
456 size
= (qsize_t
)(inode
->i_blocks
) * (1 << 9) + inode
->i_bytes
;
457 size_bl
= (qsize_t
)(inode_bl
->i_blocks
) * (1 << 9) + inode_bl
->i_bytes
;
458 diff
= size
- size_bl
;
459 swap_inode_data(inode
, inode_bl
);
461 inode_set_ctime_current(inode
);
462 inode_set_ctime_current(inode_bl
);
463 inode_inc_iversion(inode
);
465 inode
->i_generation
= get_random_u32();
466 inode_bl
->i_generation
= get_random_u32();
467 ext4_reset_inode_seed(inode
);
468 ext4_reset_inode_seed(inode_bl
);
470 ext4_discard_preallocations(inode
);
472 err
= ext4_mark_inode_dirty(handle
, inode
);
474 /* No need to update quota information. */
475 ext4_warning(inode
->i_sb
,
476 "couldn't mark inode #%lu dirty (err %d)",
478 /* Revert all changes: */
479 swap_inode_data(inode
, inode_bl
);
480 ext4_mark_inode_dirty(handle
, inode
);
484 blocks
= inode_bl
->i_blocks
;
485 bytes
= inode_bl
->i_bytes
;
486 inode_bl
->i_blocks
= inode
->i_blocks
;
487 inode_bl
->i_bytes
= inode
->i_bytes
;
488 err
= ext4_mark_inode_dirty(handle
, inode_bl
);
490 /* No need to update quota information. */
491 ext4_warning(inode_bl
->i_sb
,
492 "couldn't mark inode #%lu dirty (err %d)",
493 inode_bl
->i_ino
, err
);
497 /* Bootloader inode should not be counted into quota information. */
499 dquot_free_space(inode
, diff
);
501 err
= dquot_alloc_space(inode
, -1 * diff
);
505 /* Revert all changes: */
506 inode_bl
->i_blocks
= blocks
;
507 inode_bl
->i_bytes
= bytes
;
508 swap_inode_data(inode
, inode_bl
);
509 ext4_mark_inode_dirty(handle
, inode
);
510 ext4_mark_inode_dirty(handle
, inode_bl
);
514 ext4_journal_stop(handle
);
515 ext4_double_up_write_data_sem(inode
, inode_bl
);
518 filemap_invalidate_unlock(inode
->i_mapping
);
520 unlock_two_nondirectories(inode
, inode_bl
);
526 * If immutable is set and we are not clearing it, we're not allowed to change
527 * anything else in the inode. Don't error out if we're only trying to set
528 * immutable on an immutable file.
530 static int ext4_ioctl_check_immutable(struct inode
*inode
, __u32 new_projid
,
533 struct ext4_inode_info
*ei
= EXT4_I(inode
);
534 unsigned int oldflags
= ei
->i_flags
;
536 if (!(oldflags
& EXT4_IMMUTABLE_FL
) || !(flags
& EXT4_IMMUTABLE_FL
))
539 if ((oldflags
& ~EXT4_IMMUTABLE_FL
) != (flags
& ~EXT4_IMMUTABLE_FL
))
541 if (ext4_has_feature_project(inode
->i_sb
) &&
542 __kprojid_val(ei
->i_projid
) != new_projid
)
548 static void ext4_dax_dontcache(struct inode
*inode
, unsigned int flags
)
550 struct ext4_inode_info
*ei
= EXT4_I(inode
);
552 if (S_ISDIR(inode
->i_mode
))
555 if (test_opt2(inode
->i_sb
, DAX_NEVER
) ||
556 test_opt(inode
->i_sb
, DAX_ALWAYS
))
559 if ((ei
->i_flags
^ flags
) & EXT4_DAX_FL
)
560 d_mark_dontcache(inode
);
563 static bool dax_compatible(struct inode
*inode
, unsigned int oldflags
,
566 /* Allow the DAX flag to be changed on inline directories */
567 if (S_ISDIR(inode
->i_mode
)) {
568 flags
&= ~EXT4_INLINE_DATA_FL
;
569 oldflags
&= ~EXT4_INLINE_DATA_FL
;
572 if (flags
& EXT4_DAX_FL
) {
573 if ((oldflags
& EXT4_DAX_MUT_EXCL
) ||
574 ext4_test_inode_state(inode
,
575 EXT4_STATE_VERITY_IN_PROGRESS
)) {
580 if ((flags
& EXT4_DAX_MUT_EXCL
) && (oldflags
& EXT4_DAX_FL
))
586 static int ext4_ioctl_setflags(struct inode
*inode
,
589 struct ext4_inode_info
*ei
= EXT4_I(inode
);
590 handle_t
*handle
= NULL
;
591 int err
= -EPERM
, migrate
= 0;
592 struct ext4_iloc iloc
;
593 unsigned int oldflags
, mask
, i
;
594 struct super_block
*sb
= inode
->i_sb
;
596 /* Is it quota file? Do not allow user to mess with it */
597 if (ext4_is_quota_file(inode
))
600 oldflags
= ei
->i_flags
;
602 * The JOURNAL_DATA flag can only be changed by
603 * the relevant capability.
605 if ((flags
^ oldflags
) & (EXT4_JOURNAL_DATA_FL
)) {
606 if (!capable(CAP_SYS_RESOURCE
))
610 if (!dax_compatible(inode
, oldflags
, flags
)) {
615 if ((flags
^ oldflags
) & EXT4_EXTENTS_FL
)
618 if ((flags
^ oldflags
) & EXT4_CASEFOLD_FL
) {
619 if (!ext4_has_feature_casefold(sb
)) {
624 if (!S_ISDIR(inode
->i_mode
)) {
629 if (!ext4_empty_dir(inode
)) {
636 * Wait for all pending directio and then flush all the dirty pages
637 * for this file. The flush marks all the pages readonly, so any
638 * subsequent attempt to write to the file (particularly mmap pages)
639 * will come through the filesystem and fail.
641 if (S_ISREG(inode
->i_mode
) && !IS_IMMUTABLE(inode
) &&
642 (flags
& EXT4_IMMUTABLE_FL
)) {
643 inode_dio_wait(inode
);
644 err
= filemap_write_and_wait(inode
->i_mapping
);
649 handle
= ext4_journal_start(inode
, EXT4_HT_INODE
, 1);
650 if (IS_ERR(handle
)) {
651 err
= PTR_ERR(handle
);
655 ext4_handle_sync(handle
);
656 err
= ext4_reserve_inode_write(handle
, inode
, &iloc
);
660 ext4_dax_dontcache(inode
, flags
);
662 for (i
= 0, mask
= 1; i
< 32; i
++, mask
<<= 1) {
663 if (!(mask
& EXT4_FL_USER_MODIFIABLE
))
665 /* These flags get special treatment later */
666 if (mask
== EXT4_JOURNAL_DATA_FL
|| mask
== EXT4_EXTENTS_FL
)
669 ext4_set_inode_flag(inode
, i
);
671 ext4_clear_inode_flag(inode
, i
);
674 ext4_set_inode_flags(inode
, false);
676 inode_set_ctime_current(inode
);
677 inode_inc_iversion(inode
);
679 err
= ext4_mark_iloc_dirty(handle
, inode
, &iloc
);
681 ext4_journal_stop(handle
);
685 if ((flags
^ oldflags
) & (EXT4_JOURNAL_DATA_FL
)) {
687 * Changes to the journaling mode can cause unsafe changes to
688 * S_DAX if the inode is DAX
695 err
= ext4_change_inode_journal_flag(inode
,
696 flags
& EXT4_JOURNAL_DATA_FL
);
701 if (flags
& EXT4_EXTENTS_FL
)
702 err
= ext4_ext_migrate(inode
);
704 err
= ext4_ind_migrate(inode
);
712 static int ext4_ioctl_setproject(struct inode
*inode
, __u32 projid
)
714 struct super_block
*sb
= inode
->i_sb
;
715 struct ext4_inode_info
*ei
= EXT4_I(inode
);
719 struct ext4_iloc iloc
;
720 struct ext4_inode
*raw_inode
;
721 struct dquot
*transfer_to
[MAXQUOTAS
] = { };
723 if (!ext4_has_feature_project(sb
)) {
724 if (projid
!= EXT4_DEF_PROJID
)
730 if (EXT4_INODE_SIZE(sb
) <= EXT4_GOOD_OLD_INODE_SIZE
)
733 kprojid
= make_kprojid(&init_user_ns
, (projid_t
)projid
);
735 if (projid_eq(kprojid
, EXT4_I(inode
)->i_projid
))
739 /* Is it quota file? Do not allow user to mess with it */
740 if (ext4_is_quota_file(inode
))
743 err
= dquot_initialize(inode
);
747 err
= ext4_get_inode_loc(inode
, &iloc
);
751 raw_inode
= ext4_raw_inode(&iloc
);
752 if (!EXT4_FITS_IN_INODE(raw_inode
, ei
, i_projid
)) {
753 err
= ext4_expand_extra_isize(inode
,
754 EXT4_SB(sb
)->s_want_extra_isize
,
762 handle
= ext4_journal_start(inode
, EXT4_HT_QUOTA
,
763 EXT4_QUOTA_INIT_BLOCKS(sb
) +
764 EXT4_QUOTA_DEL_BLOCKS(sb
) + 3);
766 return PTR_ERR(handle
);
768 err
= ext4_reserve_inode_write(handle
, inode
, &iloc
);
772 transfer_to
[PRJQUOTA
] = dqget(sb
, make_kqid_projid(kprojid
));
773 if (!IS_ERR(transfer_to
[PRJQUOTA
])) {
775 /* __dquot_transfer() calls back ext4_get_inode_usage() which
776 * counts xattr inode references.
778 down_read(&EXT4_I(inode
)->xattr_sem
);
779 err
= __dquot_transfer(inode
, transfer_to
);
780 up_read(&EXT4_I(inode
)->xattr_sem
);
781 dqput(transfer_to
[PRJQUOTA
]);
786 EXT4_I(inode
)->i_projid
= kprojid
;
787 inode_set_ctime_current(inode
);
788 inode_inc_iversion(inode
);
790 rc
= ext4_mark_iloc_dirty(handle
, inode
, &iloc
);
794 ext4_journal_stop(handle
);
798 static int ext4_ioctl_setproject(struct inode
*inode
, __u32 projid
)
800 if (projid
!= EXT4_DEF_PROJID
)
806 int ext4_force_shutdown(struct super_block
*sb
, u32 flags
)
808 struct ext4_sb_info
*sbi
= EXT4_SB(sb
);
811 if (flags
> EXT4_GOING_FLAGS_NOLOGFLUSH
)
814 if (ext4_forced_shutdown(sb
))
817 ext4_msg(sb
, KERN_ALERT
, "shut down requested (%d)", flags
);
818 trace_ext4_shutdown(sb
, flags
);
821 case EXT4_GOING_FLAGS_DEFAULT
:
822 ret
= bdev_freeze(sb
->s_bdev
);
825 set_bit(EXT4_FLAGS_SHUTDOWN
, &sbi
->s_ext4_flags
);
826 bdev_thaw(sb
->s_bdev
);
828 case EXT4_GOING_FLAGS_LOGFLUSH
:
829 set_bit(EXT4_FLAGS_SHUTDOWN
, &sbi
->s_ext4_flags
);
830 if (sbi
->s_journal
&& !is_journal_aborted(sbi
->s_journal
)) {
831 (void) ext4_force_commit(sb
);
832 jbd2_journal_abort(sbi
->s_journal
, -ESHUTDOWN
);
835 case EXT4_GOING_FLAGS_NOLOGFLUSH
:
836 set_bit(EXT4_FLAGS_SHUTDOWN
, &sbi
->s_ext4_flags
);
837 if (sbi
->s_journal
&& !is_journal_aborted(sbi
->s_journal
))
838 jbd2_journal_abort(sbi
->s_journal
, -ESHUTDOWN
);
843 clear_opt(sb
, DISCARD
);
847 static int ext4_ioctl_shutdown(struct super_block
*sb
, unsigned long arg
)
851 if (!capable(CAP_SYS_ADMIN
))
854 if (get_user(flags
, (__u32 __user
*)arg
))
857 return ext4_force_shutdown(sb
, flags
);
860 struct getfsmap_info
{
861 struct super_block
*gi_sb
;
862 struct fsmap_head __user
*gi_data
;
867 static int ext4_getfsmap_format(struct ext4_fsmap
*xfm
, void *priv
)
869 struct getfsmap_info
*info
= priv
;
872 trace_ext4_getfsmap_mapping(info
->gi_sb
, xfm
);
874 info
->gi_last_flags
= xfm
->fmr_flags
;
875 ext4_fsmap_from_internal(info
->gi_sb
, &fm
, xfm
);
876 if (copy_to_user(&info
->gi_data
->fmh_recs
[info
->gi_idx
++], &fm
,
877 sizeof(struct fsmap
)))
883 static int ext4_ioc_getfsmap(struct super_block
*sb
,
884 struct fsmap_head __user
*arg
)
886 struct getfsmap_info info
= { NULL
};
887 struct ext4_fsmap_head xhead
= {0};
888 struct fsmap_head head
;
889 bool aborted
= false;
892 if (copy_from_user(&head
, arg
, sizeof(struct fsmap_head
)))
894 if (memchr_inv(head
.fmh_reserved
, 0, sizeof(head
.fmh_reserved
)) ||
895 memchr_inv(head
.fmh_keys
[0].fmr_reserved
, 0,
896 sizeof(head
.fmh_keys
[0].fmr_reserved
)) ||
897 memchr_inv(head
.fmh_keys
[1].fmr_reserved
, 0,
898 sizeof(head
.fmh_keys
[1].fmr_reserved
)))
901 * ext4 doesn't report file extents at all, so the only valid
902 * file offsets are the magic ones (all zeroes or all ones).
904 if (head
.fmh_keys
[0].fmr_offset
||
905 (head
.fmh_keys
[1].fmr_offset
!= 0 &&
906 head
.fmh_keys
[1].fmr_offset
!= -1ULL))
909 xhead
.fmh_iflags
= head
.fmh_iflags
;
910 xhead
.fmh_count
= head
.fmh_count
;
911 ext4_fsmap_to_internal(sb
, &xhead
.fmh_keys
[0], &head
.fmh_keys
[0]);
912 ext4_fsmap_to_internal(sb
, &xhead
.fmh_keys
[1], &head
.fmh_keys
[1]);
914 trace_ext4_getfsmap_low_key(sb
, &xhead
.fmh_keys
[0]);
915 trace_ext4_getfsmap_high_key(sb
, &xhead
.fmh_keys
[1]);
919 error
= ext4_getfsmap(sb
, &xhead
, ext4_getfsmap_format
, &info
);
920 if (error
== EXT4_QUERY_RANGE_ABORT
)
925 /* If we didn't abort, set the "last" flag in the last fmx */
926 if (!aborted
&& info
.gi_idx
) {
927 info
.gi_last_flags
|= FMR_OF_LAST
;
928 if (copy_to_user(&info
.gi_data
->fmh_recs
[info
.gi_idx
- 1].fmr_flags
,
930 sizeof(info
.gi_last_flags
)))
934 /* copy back header */
935 head
.fmh_entries
= xhead
.fmh_entries
;
936 head
.fmh_oflags
= xhead
.fmh_oflags
;
937 if (copy_to_user(arg
, &head
, sizeof(struct fsmap_head
)))
943 static long ext4_ioctl_group_add(struct file
*file
,
944 struct ext4_new_group_data
*input
)
946 struct super_block
*sb
= file_inode(file
)->i_sb
;
949 err
= ext4_resize_begin(sb
);
953 if (ext4_has_feature_bigalloc(sb
)) {
954 ext4_msg(sb
, KERN_ERR
,
955 "Online resizing not supported with bigalloc");
960 err
= mnt_want_write_file(file
);
964 err
= ext4_group_add(sb
, input
);
965 if (EXT4_SB(sb
)->s_journal
) {
966 jbd2_journal_lock_updates(EXT4_SB(sb
)->s_journal
);
967 err2
= jbd2_journal_flush(EXT4_SB(sb
)->s_journal
, 0);
968 jbd2_journal_unlock_updates(EXT4_SB(sb
)->s_journal
);
972 mnt_drop_write_file(file
);
973 if (!err
&& ext4_has_group_desc_csum(sb
) &&
974 test_opt(sb
, INIT_INODE_TABLE
))
975 err
= ext4_register_li_request(sb
, input
->group
);
977 err2
= ext4_resize_end(sb
, false);
983 int ext4_fileattr_get(struct dentry
*dentry
, struct fileattr
*fa
)
985 struct inode
*inode
= d_inode(dentry
);
986 struct ext4_inode_info
*ei
= EXT4_I(inode
);
987 u32 flags
= ei
->i_flags
& EXT4_FL_USER_VISIBLE
;
989 if (S_ISREG(inode
->i_mode
))
990 flags
&= ~FS_PROJINHERIT_FL
;
992 fileattr_fill_flags(fa
, flags
);
993 if (ext4_has_feature_project(inode
->i_sb
))
994 fa
->fsx_projid
= from_kprojid(&init_user_ns
, ei
->i_projid
);
999 int ext4_fileattr_set(struct mnt_idmap
*idmap
,
1000 struct dentry
*dentry
, struct fileattr
*fa
)
1002 struct inode
*inode
= d_inode(dentry
);
1003 u32 flags
= fa
->flags
;
1004 int err
= -EOPNOTSUPP
;
1006 if (flags
& ~EXT4_FL_USER_VISIBLE
)
1010 * chattr(1) grabs flags via GETFLAGS, modifies the result and
1011 * passes that to SETFLAGS. So we cannot easily make SETFLAGS
1012 * more restrictive than just silently masking off visible but
1013 * not settable flags as we always did.
1015 flags
&= EXT4_FL_USER_MODIFIABLE
;
1016 if (ext4_mask_flags(inode
->i_mode
, flags
) != flags
)
1018 err
= ext4_ioctl_check_immutable(inode
, fa
->fsx_projid
, flags
);
1021 err
= ext4_ioctl_setflags(inode
, flags
);
1024 err
= ext4_ioctl_setproject(inode
, fa
->fsx_projid
);
1029 /* So that the fiemap access checks can't overflow on 32 bit machines. */
1030 #define FIEMAP_MAX_EXTENTS (UINT_MAX / sizeof(struct fiemap_extent))
1032 static int ext4_ioctl_get_es_cache(struct file
*filp
, unsigned long arg
)
1034 struct fiemap fiemap
;
1035 struct fiemap __user
*ufiemap
= (struct fiemap __user
*) arg
;
1036 struct fiemap_extent_info fieinfo
= { 0, };
1037 struct inode
*inode
= file_inode(filp
);
1040 if (copy_from_user(&fiemap
, ufiemap
, sizeof(fiemap
)))
1043 if (fiemap
.fm_extent_count
> FIEMAP_MAX_EXTENTS
)
1046 fieinfo
.fi_flags
= fiemap
.fm_flags
;
1047 fieinfo
.fi_extents_max
= fiemap
.fm_extent_count
;
1048 fieinfo
.fi_extents_start
= ufiemap
->fm_extents
;
1050 error
= ext4_get_es_cache(inode
, &fieinfo
, fiemap
.fm_start
,
1052 fiemap
.fm_flags
= fieinfo
.fi_flags
;
1053 fiemap
.fm_mapped_extents
= fieinfo
.fi_extents_mapped
;
1054 if (copy_to_user(ufiemap
, &fiemap
, sizeof(fiemap
)))
1060 static int ext4_ioctl_checkpoint(struct file
*filp
, unsigned long arg
)
1064 unsigned int flush_flags
= 0;
1065 struct super_block
*sb
= file_inode(filp
)->i_sb
;
1067 if (copy_from_user(&flags
, (__u32 __user
*)arg
,
1071 if (!capable(CAP_SYS_ADMIN
))
1074 /* check for invalid bits set */
1075 if ((flags
& ~EXT4_IOC_CHECKPOINT_FLAG_VALID
) ||
1076 ((flags
& JBD2_JOURNAL_FLUSH_DISCARD
) &&
1077 (flags
& JBD2_JOURNAL_FLUSH_ZEROOUT
)))
1080 if (!EXT4_SB(sb
)->s_journal
)
1083 if ((flags
& JBD2_JOURNAL_FLUSH_DISCARD
) &&
1084 !bdev_max_discard_sectors(EXT4_SB(sb
)->s_journal
->j_dev
))
1087 if (flags
& EXT4_IOC_CHECKPOINT_FLAG_DRY_RUN
)
1090 if (flags
& EXT4_IOC_CHECKPOINT_FLAG_DISCARD
)
1091 flush_flags
|= JBD2_JOURNAL_FLUSH_DISCARD
;
1093 if (flags
& EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT
) {
1094 flush_flags
|= JBD2_JOURNAL_FLUSH_ZEROOUT
;
1095 pr_info_ratelimited("warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow");
1098 jbd2_journal_lock_updates(EXT4_SB(sb
)->s_journal
);
1099 err
= jbd2_journal_flush(EXT4_SB(sb
)->s_journal
, flush_flags
);
1100 jbd2_journal_unlock_updates(EXT4_SB(sb
)->s_journal
);
1105 static int ext4_ioctl_setlabel(struct file
*filp
, const char __user
*user_label
)
1109 char new_label
[EXT4_LABEL_MAX
+ 1];
1110 struct super_block
*sb
= file_inode(filp
)->i_sb
;
1112 if (!capable(CAP_SYS_ADMIN
))
1116 * Copy the maximum length allowed for ext4 label with one more to
1117 * find the required terminating null byte in order to test the
1118 * label length. The on disk label doesn't need to be null terminated.
1120 if (copy_from_user(new_label
, user_label
, EXT4_LABEL_MAX
+ 1))
1123 len
= strnlen(new_label
, EXT4_LABEL_MAX
+ 1);
1124 if (len
> EXT4_LABEL_MAX
)
1128 * Clear the buffer after the new label
1130 memset(new_label
+ len
, 0, EXT4_LABEL_MAX
- len
);
1132 ret
= mnt_want_write_file(filp
);
1136 ret
= ext4_update_superblocks_fn(sb
, ext4_sb_setlabel
, new_label
);
1138 mnt_drop_write_file(filp
);
1142 static int ext4_ioctl_getlabel(struct ext4_sb_info
*sbi
, char __user
*user_label
)
1144 char label
[EXT4_LABEL_MAX
+ 1];
1147 * EXT4_LABEL_MAX must always be smaller than FSLABEL_MAX because
1148 * FSLABEL_MAX must include terminating null byte, while s_volume_name
1151 BUILD_BUG_ON(EXT4_LABEL_MAX
>= FSLABEL_MAX
);
1153 lock_buffer(sbi
->s_sbh
);
1154 memtostr_pad(label
, sbi
->s_es
->s_volume_name
);
1155 unlock_buffer(sbi
->s_sbh
);
1157 if (copy_to_user(user_label
, label
, sizeof(label
)))
1162 static int ext4_ioctl_getuuid(struct ext4_sb_info
*sbi
,
1163 struct fsuuid __user
*ufsuuid
)
1165 struct fsuuid fsuuid
;
1166 __u8 uuid
[UUID_SIZE
];
1168 if (copy_from_user(&fsuuid
, ufsuuid
, sizeof(fsuuid
)))
1171 if (fsuuid
.fsu_len
== 0) {
1172 fsuuid
.fsu_len
= UUID_SIZE
;
1173 if (copy_to_user(&ufsuuid
->fsu_len
, &fsuuid
.fsu_len
,
1174 sizeof(fsuuid
.fsu_len
)))
1179 if (fsuuid
.fsu_len
< UUID_SIZE
|| fsuuid
.fsu_flags
!= 0)
1182 lock_buffer(sbi
->s_sbh
);
1183 memcpy(uuid
, sbi
->s_es
->s_uuid
, UUID_SIZE
);
1184 unlock_buffer(sbi
->s_sbh
);
1186 fsuuid
.fsu_len
= UUID_SIZE
;
1187 if (copy_to_user(ufsuuid
, &fsuuid
, sizeof(fsuuid
)) ||
1188 copy_to_user(&ufsuuid
->fsu_uuid
[0], uuid
, UUID_SIZE
))
1193 static int ext4_ioctl_setuuid(struct file
*filp
,
1194 const struct fsuuid __user
*ufsuuid
)
1197 struct super_block
*sb
= file_inode(filp
)->i_sb
;
1198 struct fsuuid fsuuid
;
1199 __u8 uuid
[UUID_SIZE
];
1201 if (!capable(CAP_SYS_ADMIN
))
1205 * If any checksums (group descriptors or metadata) are being used
1206 * then the checksum seed feature is required to change the UUID.
1208 if (((ext4_has_feature_gdt_csum(sb
) || ext4_has_metadata_csum(sb
))
1209 && !ext4_has_feature_csum_seed(sb
))
1210 || ext4_has_feature_stable_inodes(sb
))
1213 if (copy_from_user(&fsuuid
, ufsuuid
, sizeof(fsuuid
)))
1216 if (fsuuid
.fsu_len
!= UUID_SIZE
|| fsuuid
.fsu_flags
!= 0)
1219 if (copy_from_user(uuid
, &ufsuuid
->fsu_uuid
[0], UUID_SIZE
))
1222 ret
= mnt_want_write_file(filp
);
1226 ret
= ext4_update_superblocks_fn(sb
, ext4_sb_setuuid
, &uuid
);
1227 mnt_drop_write_file(filp
);
1232 static long __ext4_ioctl(struct file
*filp
, unsigned int cmd
, unsigned long arg
)
1234 struct inode
*inode
= file_inode(filp
);
1235 struct super_block
*sb
= inode
->i_sb
;
1236 struct mnt_idmap
*idmap
= file_mnt_idmap(filp
);
1238 ext4_debug("cmd = %u, arg = %lu\n", cmd
, arg
);
1241 case FS_IOC_GETFSMAP
:
1242 return ext4_ioc_getfsmap(sb
, (void __user
*)arg
);
1243 case EXT4_IOC_GETVERSION
:
1244 case EXT4_IOC_GETVERSION_OLD
:
1245 return put_user(inode
->i_generation
, (int __user
*) arg
);
1246 case EXT4_IOC_SETVERSION
:
1247 case EXT4_IOC_SETVERSION_OLD
: {
1249 struct ext4_iloc iloc
;
1253 if (!inode_owner_or_capable(idmap
, inode
))
1256 if (ext4_has_metadata_csum(inode
->i_sb
)) {
1257 ext4_warning(sb
, "Setting inode version is not "
1258 "supported with metadata_csum enabled.");
1262 err
= mnt_want_write_file(filp
);
1265 if (get_user(generation
, (int __user
*) arg
)) {
1267 goto setversion_out
;
1271 handle
= ext4_journal_start(inode
, EXT4_HT_INODE
, 1);
1272 if (IS_ERR(handle
)) {
1273 err
= PTR_ERR(handle
);
1276 err
= ext4_reserve_inode_write(handle
, inode
, &iloc
);
1278 inode_set_ctime_current(inode
);
1279 inode_inc_iversion(inode
);
1280 inode
->i_generation
= generation
;
1281 err
= ext4_mark_iloc_dirty(handle
, inode
, &iloc
);
1283 ext4_journal_stop(handle
);
1286 inode_unlock(inode
);
1288 mnt_drop_write_file(filp
);
1291 case EXT4_IOC_GROUP_EXTEND
: {
1292 ext4_fsblk_t n_blocks_count
;
1295 err
= ext4_resize_begin(sb
);
1299 if (get_user(n_blocks_count
, (__u32 __user
*)arg
)) {
1301 goto group_extend_out
;
1304 if (ext4_has_feature_bigalloc(sb
)) {
1305 ext4_msg(sb
, KERN_ERR
,
1306 "Online resizing not supported with bigalloc");
1308 goto group_extend_out
;
1311 err
= mnt_want_write_file(filp
);
1313 goto group_extend_out
;
1315 err
= ext4_group_extend(sb
, EXT4_SB(sb
)->s_es
, n_blocks_count
);
1316 if (EXT4_SB(sb
)->s_journal
) {
1317 jbd2_journal_lock_updates(EXT4_SB(sb
)->s_journal
);
1318 err2
= jbd2_journal_flush(EXT4_SB(sb
)->s_journal
, 0);
1319 jbd2_journal_unlock_updates(EXT4_SB(sb
)->s_journal
);
1323 mnt_drop_write_file(filp
);
1325 err2
= ext4_resize_end(sb
, false);
1331 case EXT4_IOC_MOVE_EXT
: {
1332 struct move_extent me
;
1335 if (!(filp
->f_mode
& FMODE_READ
) ||
1336 !(filp
->f_mode
& FMODE_WRITE
))
1339 if (copy_from_user(&me
,
1340 (struct move_extent __user
*)arg
, sizeof(me
)))
1344 CLASS(fd
, donor
)(me
.donor_fd
);
1345 if (fd_empty(donor
))
1348 if (!(fd_file(donor
)->f_mode
& FMODE_WRITE
))
1351 if (ext4_has_feature_bigalloc(sb
)) {
1352 ext4_msg(sb
, KERN_ERR
,
1353 "Online defrag not supported with bigalloc");
1355 } else if (IS_DAX(inode
)) {
1356 ext4_msg(sb
, KERN_ERR
,
1357 "Online defrag not supported with DAX");
1361 err
= mnt_want_write_file(filp
);
1365 err
= ext4_move_extents(filp
, fd_file(donor
), me
.orig_start
,
1366 me
.donor_start
, me
.len
, &me
.moved_len
);
1367 mnt_drop_write_file(filp
);
1369 if (copy_to_user((struct move_extent __user
*)arg
,
1375 case EXT4_IOC_GROUP_ADD
: {
1376 struct ext4_new_group_data input
;
1378 if (copy_from_user(&input
, (struct ext4_new_group_input __user
*)arg
,
1382 return ext4_ioctl_group_add(filp
, &input
);
1385 case EXT4_IOC_MIGRATE
:
1388 if (!inode_owner_or_capable(idmap
, inode
))
1391 err
= mnt_want_write_file(filp
);
1395 * inode_mutex prevent write and truncate on the file.
1396 * Read still goes through. We take i_data_sem in
1397 * ext4_ext_swap_inode_data before we switch the
1398 * inode format to prevent read.
1400 inode_lock((inode
));
1401 err
= ext4_ext_migrate(inode
);
1402 inode_unlock((inode
));
1403 mnt_drop_write_file(filp
);
1407 case EXT4_IOC_ALLOC_DA_BLKS
:
1410 if (!inode_owner_or_capable(idmap
, inode
))
1413 err
= mnt_want_write_file(filp
);
1416 err
= ext4_alloc_da_blocks(inode
);
1417 mnt_drop_write_file(filp
);
1421 case EXT4_IOC_SWAP_BOOT
:
1424 if (!(filp
->f_mode
& FMODE_WRITE
))
1426 err
= mnt_want_write_file(filp
);
1429 err
= swap_inode_boot_loader(sb
, idmap
, inode
);
1430 mnt_drop_write_file(filp
);
1434 case EXT4_IOC_RESIZE_FS
: {
1435 ext4_fsblk_t n_blocks_count
;
1436 int err
= 0, err2
= 0;
1437 ext4_group_t o_group
= EXT4_SB(sb
)->s_groups_count
;
1439 if (copy_from_user(&n_blocks_count
, (__u64 __user
*)arg
,
1444 err
= ext4_resize_begin(sb
);
1448 err
= mnt_want_write_file(filp
);
1452 err
= ext4_resize_fs(sb
, n_blocks_count
);
1453 if (EXT4_SB(sb
)->s_journal
) {
1454 ext4_fc_mark_ineligible(sb
, EXT4_FC_REASON_RESIZE
, NULL
);
1455 jbd2_journal_lock_updates(EXT4_SB(sb
)->s_journal
);
1456 err2
= jbd2_journal_flush(EXT4_SB(sb
)->s_journal
, 0);
1457 jbd2_journal_unlock_updates(EXT4_SB(sb
)->s_journal
);
1461 mnt_drop_write_file(filp
);
1462 if (!err
&& (o_group
< EXT4_SB(sb
)->s_groups_count
) &&
1463 ext4_has_group_desc_csum(sb
) &&
1464 test_opt(sb
, INIT_INODE_TABLE
))
1465 err
= ext4_register_li_request(sb
, o_group
);
1468 err2
= ext4_resize_end(sb
, true);
1476 struct fstrim_range range
;
1479 if (!capable(CAP_SYS_ADMIN
))
1482 if (!bdev_max_discard_sectors(sb
->s_bdev
))
1486 * We haven't replayed the journal, so we cannot use our
1487 * block-bitmap-guided storage zapping commands.
1489 if (test_opt(sb
, NOLOAD
) && ext4_has_feature_journal(sb
))
1492 if (copy_from_user(&range
, (struct fstrim_range __user
*)arg
,
1496 ret
= ext4_trim_fs(sb
, &range
);
1500 if (copy_to_user((struct fstrim_range __user
*)arg
, &range
,
1506 case EXT4_IOC_PRECACHE_EXTENTS
:
1507 return ext4_ext_precache(inode
);
1509 case FS_IOC_SET_ENCRYPTION_POLICY
:
1510 if (!ext4_has_feature_encrypt(sb
))
1512 return fscrypt_ioctl_set_policy(filp
, (const void __user
*)arg
);
1514 case FS_IOC_GET_ENCRYPTION_PWSALT
:
1515 return ext4_ioctl_get_encryption_pwsalt(filp
, (void __user
*)arg
);
1517 case FS_IOC_GET_ENCRYPTION_POLICY
:
1518 if (!ext4_has_feature_encrypt(sb
))
1520 return fscrypt_ioctl_get_policy(filp
, (void __user
*)arg
);
1522 case FS_IOC_GET_ENCRYPTION_POLICY_EX
:
1523 if (!ext4_has_feature_encrypt(sb
))
1525 return fscrypt_ioctl_get_policy_ex(filp
, (void __user
*)arg
);
1527 case FS_IOC_ADD_ENCRYPTION_KEY
:
1528 if (!ext4_has_feature_encrypt(sb
))
1530 return fscrypt_ioctl_add_key(filp
, (void __user
*)arg
);
1532 case FS_IOC_REMOVE_ENCRYPTION_KEY
:
1533 if (!ext4_has_feature_encrypt(sb
))
1535 return fscrypt_ioctl_remove_key(filp
, (void __user
*)arg
);
1537 case FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS
:
1538 if (!ext4_has_feature_encrypt(sb
))
1540 return fscrypt_ioctl_remove_key_all_users(filp
,
1541 (void __user
*)arg
);
1542 case FS_IOC_GET_ENCRYPTION_KEY_STATUS
:
1543 if (!ext4_has_feature_encrypt(sb
))
1545 return fscrypt_ioctl_get_key_status(filp
, (void __user
*)arg
);
1547 case FS_IOC_GET_ENCRYPTION_NONCE
:
1548 if (!ext4_has_feature_encrypt(sb
))
1550 return fscrypt_ioctl_get_nonce(filp
, (void __user
*)arg
);
1552 case EXT4_IOC_CLEAR_ES_CACHE
:
1554 if (!inode_owner_or_capable(idmap
, inode
))
1556 ext4_clear_inode_es(inode
);
1560 case EXT4_IOC_GETSTATE
:
1564 if (ext4_test_inode_state(inode
, EXT4_STATE_EXT_PRECACHED
))
1565 state
|= EXT4_STATE_FLAG_EXT_PRECACHED
;
1566 if (ext4_test_inode_state(inode
, EXT4_STATE_NEW
))
1567 state
|= EXT4_STATE_FLAG_NEW
;
1568 if (ext4_test_inode_state(inode
, EXT4_STATE_NEWENTRY
))
1569 state
|= EXT4_STATE_FLAG_NEWENTRY
;
1570 if (ext4_test_inode_state(inode
, EXT4_STATE_DA_ALLOC_CLOSE
))
1571 state
|= EXT4_STATE_FLAG_DA_ALLOC_CLOSE
;
1573 return put_user(state
, (__u32 __user
*) arg
);
1576 case EXT4_IOC_GET_ES_CACHE
:
1577 return ext4_ioctl_get_es_cache(filp
, arg
);
1579 case EXT4_IOC_SHUTDOWN
:
1580 return ext4_ioctl_shutdown(sb
, arg
);
1582 case FS_IOC_ENABLE_VERITY
:
1583 if (!ext4_has_feature_verity(sb
))
1585 return fsverity_ioctl_enable(filp
, (const void __user
*)arg
);
1587 case FS_IOC_MEASURE_VERITY
:
1588 if (!ext4_has_feature_verity(sb
))
1590 return fsverity_ioctl_measure(filp
, (void __user
*)arg
);
1592 case FS_IOC_READ_VERITY_METADATA
:
1593 if (!ext4_has_feature_verity(sb
))
1595 return fsverity_ioctl_read_metadata(filp
,
1596 (const void __user
*)arg
);
1598 case EXT4_IOC_CHECKPOINT
:
1599 return ext4_ioctl_checkpoint(filp
, arg
);
1601 case FS_IOC_GETFSLABEL
:
1602 return ext4_ioctl_getlabel(EXT4_SB(sb
), (void __user
*)arg
);
1604 case FS_IOC_SETFSLABEL
:
1605 return ext4_ioctl_setlabel(filp
,
1606 (const void __user
*)arg
);
1608 case EXT4_IOC_GETFSUUID
:
1609 return ext4_ioctl_getuuid(EXT4_SB(sb
), (void __user
*)arg
);
1610 case EXT4_IOC_SETFSUUID
:
1611 return ext4_ioctl_setuuid(filp
, (const void __user
*)arg
);
1617 long ext4_ioctl(struct file
*filp
, unsigned int cmd
, unsigned long arg
)
1619 return __ext4_ioctl(filp
, cmd
, arg
);
1622 #ifdef CONFIG_COMPAT
1623 long ext4_compat_ioctl(struct file
*file
, unsigned int cmd
, unsigned long arg
)
1625 /* These are just misnamed, they actually get/put from/to user an int */
1627 case EXT4_IOC32_GETVERSION
:
1628 cmd
= EXT4_IOC_GETVERSION
;
1630 case EXT4_IOC32_SETVERSION
:
1631 cmd
= EXT4_IOC_SETVERSION
;
1633 case EXT4_IOC32_GROUP_EXTEND
:
1634 cmd
= EXT4_IOC_GROUP_EXTEND
;
1636 case EXT4_IOC32_GETVERSION_OLD
:
1637 cmd
= EXT4_IOC_GETVERSION_OLD
;
1639 case EXT4_IOC32_SETVERSION_OLD
:
1640 cmd
= EXT4_IOC_SETVERSION_OLD
;
1642 case EXT4_IOC32_GETRSVSZ
:
1643 cmd
= EXT4_IOC_GETRSVSZ
;
1645 case EXT4_IOC32_SETRSVSZ
:
1646 cmd
= EXT4_IOC_SETRSVSZ
;
1648 case EXT4_IOC32_GROUP_ADD
: {
1649 struct compat_ext4_new_group_input __user
*uinput
;
1650 struct ext4_new_group_data input
;
1653 uinput
= compat_ptr(arg
);
1654 err
= get_user(input
.group
, &uinput
->group
);
1655 err
|= get_user(input
.block_bitmap
, &uinput
->block_bitmap
);
1656 err
|= get_user(input
.inode_bitmap
, &uinput
->inode_bitmap
);
1657 err
|= get_user(input
.inode_table
, &uinput
->inode_table
);
1658 err
|= get_user(input
.blocks_count
, &uinput
->blocks_count
);
1659 err
|= get_user(input
.reserved_blocks
,
1660 &uinput
->reserved_blocks
);
1663 return ext4_ioctl_group_add(file
, &input
);
1665 case EXT4_IOC_MOVE_EXT
:
1666 case EXT4_IOC_RESIZE_FS
:
1668 case EXT4_IOC_PRECACHE_EXTENTS
:
1669 case FS_IOC_SET_ENCRYPTION_POLICY
:
1670 case FS_IOC_GET_ENCRYPTION_PWSALT
:
1671 case FS_IOC_GET_ENCRYPTION_POLICY
:
1672 case FS_IOC_GET_ENCRYPTION_POLICY_EX
:
1673 case FS_IOC_ADD_ENCRYPTION_KEY
:
1674 case FS_IOC_REMOVE_ENCRYPTION_KEY
:
1675 case FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS
:
1676 case FS_IOC_GET_ENCRYPTION_KEY_STATUS
:
1677 case FS_IOC_GET_ENCRYPTION_NONCE
:
1678 case EXT4_IOC_SHUTDOWN
:
1679 case FS_IOC_GETFSMAP
:
1680 case FS_IOC_ENABLE_VERITY
:
1681 case FS_IOC_MEASURE_VERITY
:
1682 case FS_IOC_READ_VERITY_METADATA
:
1683 case EXT4_IOC_CLEAR_ES_CACHE
:
1684 case EXT4_IOC_GETSTATE
:
1685 case EXT4_IOC_GET_ES_CACHE
:
1686 case EXT4_IOC_CHECKPOINT
:
1687 case FS_IOC_GETFSLABEL
:
1688 case FS_IOC_SETFSLABEL
:
1689 case EXT4_IOC_GETFSUUID
:
1690 case EXT4_IOC_SETFSUUID
:
1693 return -ENOIOCTLCMD
;
1695 return ext4_ioctl(file
, cmd
, (unsigned long) compat_ptr(arg
));
1699 static void set_overhead(struct ext4_super_block
*es
, const void *arg
)
1701 es
->s_overhead_clusters
= cpu_to_le32(*((unsigned long *) arg
));
1704 int ext4_update_overhead(struct super_block
*sb
, bool force
)
1706 struct ext4_sb_info
*sbi
= EXT4_SB(sb
);
1711 (sbi
->s_overhead
== 0 ||
1712 sbi
->s_overhead
== le32_to_cpu(sbi
->s_es
->s_overhead_clusters
)))
1714 return ext4_update_superblocks_fn(sb
, set_overhead
, &sbi
->s_overhead
);