1 // SPDX-License-Identifier: GPL-2.0
2 #ifndef NO_BCACHEFS_CHARDEV
3
4 #include "bcachefs.h"
5 #include "bcachefs_ioctl.h"
6 #include "buckets.h"
7 #include "chardev.h"
8 #include "disk_accounting.h"
9 #include "fsck.h"
10 #include "journal.h"
11 #include "move.h"
12 #include "recovery_passes.h"
13 #include "replicas.h"
14 #include "super-io.h"
15 #include "thread_with_file.h"
16
17 #include <linux/cdev.h>
18 #include <linux/device.h>
19 #include <linux/fs.h>
20 #include <linux/ioctl.h>
21 #include <linux/major.h>
22 #include <linux/sched/task.h>
23 #include <linux/slab.h>
24 #include <linux/uaccess.h>
25
26 /* returns with ref on ca->ref */
bch2_device_lookup(struct bch_fs * c,u64 dev,unsigned flags)27 static struct bch_dev *bch2_device_lookup(struct bch_fs *c, u64 dev,
28 unsigned flags)
29 {
30 struct bch_dev *ca;
31
32 if (flags & BCH_BY_INDEX) {
33 if (dev >= c->sb.nr_devices)
34 return ERR_PTR(-EINVAL);
35
36 ca = bch2_dev_tryget_noerror(c, dev);
37 if (!ca)
38 return ERR_PTR(-EINVAL);
39 } else {
40 char *path;
41
42 path = strndup_user((const char __user *)
43 (unsigned long) dev, PATH_MAX);
44 if (IS_ERR(path))
45 return ERR_CAST(path);
46
47 ca = bch2_dev_lookup(c, path);
48 kfree(path);
49 }
50
51 return ca;
52 }
53
54 #if 0
55 static long bch2_ioctl_assemble(struct bch_ioctl_assemble __user *user_arg)
56 {
57 struct bch_ioctl_assemble arg;
58 struct bch_fs *c;
59 u64 *user_devs = NULL;
60 char **devs = NULL;
61 unsigned i;
62 int ret = -EFAULT;
63
64 if (copy_from_user(&arg, user_arg, sizeof(arg)))
65 return -EFAULT;
66
67 if (arg.flags || arg.pad)
68 return -EINVAL;
69
70 user_devs = kmalloc_array(arg.nr_devs, sizeof(u64), GFP_KERNEL);
71 if (!user_devs)
72 return -ENOMEM;
73
74 devs = kcalloc(arg.nr_devs, sizeof(char *), GFP_KERNEL);
75
76 if (copy_from_user(user_devs, user_arg->devs,
77 sizeof(u64) * arg.nr_devs))
78 goto err;
79
80 for (i = 0; i < arg.nr_devs; i++) {
81 devs[i] = strndup_user((const char __user *)(unsigned long)
82 user_devs[i],
83 PATH_MAX);
84 ret= PTR_ERR_OR_ZERO(devs[i]);
85 if (ret)
86 goto err;
87 }
88
89 c = bch2_fs_open(devs, arg.nr_devs, bch2_opts_empty());
90 ret = PTR_ERR_OR_ZERO(c);
91 if (!ret)
92 closure_put(&c->cl);
93 err:
94 if (devs)
95 for (i = 0; i < arg.nr_devs; i++)
96 kfree(devs[i]);
97 kfree(devs);
98 return ret;
99 }
100
101 static long bch2_ioctl_incremental(struct bch_ioctl_incremental __user *user_arg)
102 {
103 struct bch_ioctl_incremental arg;
104 const char *err;
105 char *path;
106
107 if (copy_from_user(&arg, user_arg, sizeof(arg)))
108 return -EFAULT;
109
110 if (arg.flags || arg.pad)
111 return -EINVAL;
112
113 path = strndup_user((const char __user *)(unsigned long) arg.dev, PATH_MAX);
114 ret = PTR_ERR_OR_ZERO(path);
115 if (ret)
116 return ret;
117
118 err = bch2_fs_open_incremental(path);
119 kfree(path);
120
121 if (err) {
122 pr_err("Could not register bcachefs devices: %s", err);
123 return -EINVAL;
124 }
125
126 return 0;
127 }
128 #endif
129
bch2_global_ioctl(unsigned cmd,void __user * arg)130 static long bch2_global_ioctl(unsigned cmd, void __user *arg)
131 {
132 long ret;
133
134 switch (cmd) {
135 #if 0
136 case BCH_IOCTL_ASSEMBLE:
137 return bch2_ioctl_assemble(arg);
138 case BCH_IOCTL_INCREMENTAL:
139 return bch2_ioctl_incremental(arg);
140 #endif
141 case BCH_IOCTL_FSCK_OFFLINE: {
142 ret = bch2_ioctl_fsck_offline(arg);
143 break;
144 }
145 default:
146 ret = -ENOTTY;
147 break;
148 }
149
150 if (ret < 0)
151 ret = bch2_err_class(ret);
152 return ret;
153 }
154
bch2_ioctl_query_uuid(struct bch_fs * c,struct bch_ioctl_query_uuid __user * user_arg)155 static long bch2_ioctl_query_uuid(struct bch_fs *c,
156 struct bch_ioctl_query_uuid __user *user_arg)
157 {
158 return copy_to_user_errcode(&user_arg->uuid, &c->sb.user_uuid,
159 sizeof(c->sb.user_uuid));
160 }
161
162 #if 0
163 static long bch2_ioctl_start(struct bch_fs *c, struct bch_ioctl_start arg)
164 {
165 if (!capable(CAP_SYS_ADMIN))
166 return -EPERM;
167
168 if (arg.flags || arg.pad)
169 return -EINVAL;
170
171 return bch2_fs_start(c);
172 }
173
174 static long bch2_ioctl_stop(struct bch_fs *c)
175 {
176 if (!capable(CAP_SYS_ADMIN))
177 return -EPERM;
178
179 bch2_fs_stop(c);
180 return 0;
181 }
182 #endif
183
bch2_ioctl_disk_add(struct bch_fs * c,struct bch_ioctl_disk arg)184 static long bch2_ioctl_disk_add(struct bch_fs *c, struct bch_ioctl_disk arg)
185 {
186 char *path;
187 int ret;
188
189 if (!capable(CAP_SYS_ADMIN))
190 return -EPERM;
191
192 if (arg.flags || arg.pad)
193 return -EINVAL;
194
195 path = strndup_user((const char __user *)(unsigned long) arg.dev, PATH_MAX);
196 ret = PTR_ERR_OR_ZERO(path);
197 if (ret)
198 return ret;
199
200 ret = bch2_dev_add(c, path);
201 if (!IS_ERR(path))
202 kfree(path);
203
204 return ret;
205 }
206
bch2_ioctl_disk_remove(struct bch_fs * c,struct bch_ioctl_disk arg)207 static long bch2_ioctl_disk_remove(struct bch_fs *c, struct bch_ioctl_disk arg)
208 {
209 struct bch_dev *ca;
210
211 if (!capable(CAP_SYS_ADMIN))
212 return -EPERM;
213
214 if ((arg.flags & ~(BCH_FORCE_IF_DATA_LOST|
215 BCH_FORCE_IF_METADATA_LOST|
216 BCH_FORCE_IF_DEGRADED|
217 BCH_BY_INDEX)) ||
218 arg.pad)
219 return -EINVAL;
220
221 ca = bch2_device_lookup(c, arg.dev, arg.flags);
222 if (IS_ERR(ca))
223 return PTR_ERR(ca);
224
225 return bch2_dev_remove(c, ca, arg.flags);
226 }
227
bch2_ioctl_disk_online(struct bch_fs * c,struct bch_ioctl_disk arg)228 static long bch2_ioctl_disk_online(struct bch_fs *c, struct bch_ioctl_disk arg)
229 {
230 char *path;
231 int ret;
232
233 if (!capable(CAP_SYS_ADMIN))
234 return -EPERM;
235
236 if (arg.flags || arg.pad)
237 return -EINVAL;
238
239 path = strndup_user((const char __user *)(unsigned long) arg.dev, PATH_MAX);
240 ret = PTR_ERR_OR_ZERO(path);
241 if (ret)
242 return ret;
243
244 ret = bch2_dev_online(c, path);
245 kfree(path);
246 return ret;
247 }
248
bch2_ioctl_disk_offline(struct bch_fs * c,struct bch_ioctl_disk arg)249 static long bch2_ioctl_disk_offline(struct bch_fs *c, struct bch_ioctl_disk arg)
250 {
251 struct bch_dev *ca;
252 int ret;
253
254 if (!capable(CAP_SYS_ADMIN))
255 return -EPERM;
256
257 if ((arg.flags & ~(BCH_FORCE_IF_DATA_LOST|
258 BCH_FORCE_IF_METADATA_LOST|
259 BCH_FORCE_IF_DEGRADED|
260 BCH_BY_INDEX)) ||
261 arg.pad)
262 return -EINVAL;
263
264 ca = bch2_device_lookup(c, arg.dev, arg.flags);
265 if (IS_ERR(ca))
266 return PTR_ERR(ca);
267
268 ret = bch2_dev_offline(c, ca, arg.flags);
269 bch2_dev_put(ca);
270 return ret;
271 }
272
bch2_ioctl_disk_set_state(struct bch_fs * c,struct bch_ioctl_disk_set_state arg)273 static long bch2_ioctl_disk_set_state(struct bch_fs *c,
274 struct bch_ioctl_disk_set_state arg)
275 {
276 struct bch_dev *ca;
277 int ret;
278
279 if (!capable(CAP_SYS_ADMIN))
280 return -EPERM;
281
282 if ((arg.flags & ~(BCH_FORCE_IF_DATA_LOST|
283 BCH_FORCE_IF_METADATA_LOST|
284 BCH_FORCE_IF_DEGRADED|
285 BCH_BY_INDEX)) ||
286 arg.pad[0] || arg.pad[1] || arg.pad[2] ||
287 arg.new_state >= BCH_MEMBER_STATE_NR)
288 return -EINVAL;
289
290 ca = bch2_device_lookup(c, arg.dev, arg.flags);
291 if (IS_ERR(ca))
292 return PTR_ERR(ca);
293
294 ret = bch2_dev_set_state(c, ca, arg.new_state, arg.flags);
295 if (ret)
296 bch_err(c, "Error setting device state: %s", bch2_err_str(ret));
297
298 bch2_dev_put(ca);
299 return ret;
300 }
301
302 struct bch_data_ctx {
303 struct thread_with_file thr;
304
305 struct bch_fs *c;
306 struct bch_ioctl_data arg;
307 struct bch_move_stats stats;
308 };
309
bch2_data_thread(void * arg)310 static int bch2_data_thread(void *arg)
311 {
312 struct bch_data_ctx *ctx = container_of(arg, struct bch_data_ctx, thr);
313
314 ctx->thr.ret = bch2_data_job(ctx->c, &ctx->stats, ctx->arg);
315 ctx->stats.data_type = U8_MAX;
316 return 0;
317 }
318
bch2_data_job_release(struct inode * inode,struct file * file)319 static int bch2_data_job_release(struct inode *inode, struct file *file)
320 {
321 struct bch_data_ctx *ctx = container_of(file->private_data, struct bch_data_ctx, thr);
322
323 bch2_thread_with_file_exit(&ctx->thr);
324 kfree(ctx);
325 return 0;
326 }
327
bch2_data_job_read(struct file * file,char __user * buf,size_t len,loff_t * ppos)328 static ssize_t bch2_data_job_read(struct file *file, char __user *buf,
329 size_t len, loff_t *ppos)
330 {
331 struct bch_data_ctx *ctx = container_of(file->private_data, struct bch_data_ctx, thr);
332 struct bch_fs *c = ctx->c;
333 struct bch_ioctl_data_event e = {
334 .type = BCH_DATA_EVENT_PROGRESS,
335 .p.data_type = ctx->stats.data_type,
336 .p.btree_id = ctx->stats.pos.btree,
337 .p.pos = ctx->stats.pos.pos,
338 .p.sectors_done = atomic64_read(&ctx->stats.sectors_seen),
339 .p.sectors_total = bch2_fs_usage_read_short(c).used,
340 };
341
342 if (len < sizeof(e))
343 return -EINVAL;
344
345 return copy_to_user_errcode(buf, &e, sizeof(e)) ?: sizeof(e);
346 }
347
348 static const struct file_operations bcachefs_data_ops = {
349 .release = bch2_data_job_release,
350 .read = bch2_data_job_read,
351 };
352
bch2_ioctl_data(struct bch_fs * c,struct bch_ioctl_data arg)353 static long bch2_ioctl_data(struct bch_fs *c,
354 struct bch_ioctl_data arg)
355 {
356 struct bch_data_ctx *ctx;
357 int ret;
358
359 if (!capable(CAP_SYS_ADMIN))
360 return -EPERM;
361
362 if (arg.op >= BCH_DATA_OP_NR || arg.flags)
363 return -EINVAL;
364
365 ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
366 if (!ctx)
367 return -ENOMEM;
368
369 ctx->c = c;
370 ctx->arg = arg;
371
372 ret = bch2_run_thread_with_file(&ctx->thr,
373 &bcachefs_data_ops,
374 bch2_data_thread);
375 if (ret < 0)
376 kfree(ctx);
377 return ret;
378 }
379
bch2_ioctl_fs_usage(struct bch_fs * c,struct bch_ioctl_fs_usage __user * user_arg)380 static long bch2_ioctl_fs_usage(struct bch_fs *c,
381 struct bch_ioctl_fs_usage __user *user_arg)
382 {
383 struct bch_ioctl_fs_usage arg = {};
384 darray_char replicas = {};
385 u32 replica_entries_bytes;
386 int ret = 0;
387
388 if (!test_bit(BCH_FS_started, &c->flags))
389 return -EINVAL;
390
391 if (get_user(replica_entries_bytes, &user_arg->replica_entries_bytes))
392 return -EFAULT;
393
394 ret = bch2_fs_replicas_usage_read(c, &replicas) ?:
395 (replica_entries_bytes < replicas.nr ? -ERANGE : 0) ?:
396 copy_to_user_errcode(&user_arg->replicas, replicas.data, replicas.nr);
397 if (ret)
398 goto err;
399
400 struct bch_fs_usage_short u = bch2_fs_usage_read_short(c);
401 arg.capacity = c->capacity;
402 arg.used = u.used;
403 arg.online_reserved = percpu_u64_get(c->online_reserved);
404 arg.replica_entries_bytes = replicas.nr;
405
406 for (unsigned i = 0; i < BCH_REPLICAS_MAX; i++) {
407 struct disk_accounting_pos k = {
408 .type = BCH_DISK_ACCOUNTING_persistent_reserved,
409 .persistent_reserved.nr_replicas = i,
410 };
411
412 bch2_accounting_mem_read(c,
413 disk_accounting_pos_to_bpos(&k),
414 &arg.persistent_reserved[i], 1);
415 }
416
417 ret = copy_to_user_errcode(user_arg, &arg, sizeof(arg));
418 err:
419 darray_exit(&replicas);
420 return ret;
421 }
422
bch2_ioctl_query_accounting(struct bch_fs * c,struct bch_ioctl_query_accounting __user * user_arg)423 static long bch2_ioctl_query_accounting(struct bch_fs *c,
424 struct bch_ioctl_query_accounting __user *user_arg)
425 {
426 struct bch_ioctl_query_accounting arg;
427 darray_char accounting = {};
428 int ret = 0;
429
430 if (!test_bit(BCH_FS_started, &c->flags))
431 return -EINVAL;
432
433 ret = copy_from_user_errcode(&arg, user_arg, sizeof(arg)) ?:
434 bch2_fs_accounting_read(c, &accounting, arg.accounting_types_mask) ?:
435 (arg.accounting_u64s * sizeof(u64) < accounting.nr ? -ERANGE : 0) ?:
436 copy_to_user_errcode(&user_arg->accounting, accounting.data, accounting.nr);
437 if (ret)
438 goto err;
439
440 arg.capacity = c->capacity;
441 arg.used = bch2_fs_usage_read_short(c).used;
442 arg.online_reserved = percpu_u64_get(c->online_reserved);
443 arg.accounting_u64s = accounting.nr / sizeof(u64);
444
445 ret = copy_to_user_errcode(user_arg, &arg, sizeof(arg));
446 err:
447 darray_exit(&accounting);
448 return ret;
449 }
450
451 /* obsolete, didn't allow for new data types: */
bch2_ioctl_dev_usage(struct bch_fs * c,struct bch_ioctl_dev_usage __user * user_arg)452 static long bch2_ioctl_dev_usage(struct bch_fs *c,
453 struct bch_ioctl_dev_usage __user *user_arg)
454 {
455 struct bch_ioctl_dev_usage arg;
456 struct bch_dev_usage src;
457 struct bch_dev *ca;
458 unsigned i;
459
460 if (!test_bit(BCH_FS_started, &c->flags))
461 return -EINVAL;
462
463 if (copy_from_user(&arg, user_arg, sizeof(arg)))
464 return -EFAULT;
465
466 if ((arg.flags & ~BCH_BY_INDEX) ||
467 arg.pad[0] ||
468 arg.pad[1] ||
469 arg.pad[2])
470 return -EINVAL;
471
472 ca = bch2_device_lookup(c, arg.dev, arg.flags);
473 if (IS_ERR(ca))
474 return PTR_ERR(ca);
475
476 src = bch2_dev_usage_read(ca);
477
478 arg.state = ca->mi.state;
479 arg.bucket_size = ca->mi.bucket_size;
480 arg.nr_buckets = ca->mi.nbuckets - ca->mi.first_bucket;
481
482 for (i = 0; i < ARRAY_SIZE(arg.d); i++) {
483 arg.d[i].buckets = src.d[i].buckets;
484 arg.d[i].sectors = src.d[i].sectors;
485 arg.d[i].fragmented = src.d[i].fragmented;
486 }
487
488 bch2_dev_put(ca);
489
490 return copy_to_user_errcode(user_arg, &arg, sizeof(arg));
491 }
492
bch2_ioctl_dev_usage_v2(struct bch_fs * c,struct bch_ioctl_dev_usage_v2 __user * user_arg)493 static long bch2_ioctl_dev_usage_v2(struct bch_fs *c,
494 struct bch_ioctl_dev_usage_v2 __user *user_arg)
495 {
496 struct bch_ioctl_dev_usage_v2 arg;
497 struct bch_dev_usage src;
498 struct bch_dev *ca;
499 int ret = 0;
500
501 if (!test_bit(BCH_FS_started, &c->flags))
502 return -EINVAL;
503
504 if (copy_from_user(&arg, user_arg, sizeof(arg)))
505 return -EFAULT;
506
507 if ((arg.flags & ~BCH_BY_INDEX) ||
508 arg.pad[0] ||
509 arg.pad[1] ||
510 arg.pad[2])
511 return -EINVAL;
512
513 ca = bch2_device_lookup(c, arg.dev, arg.flags);
514 if (IS_ERR(ca))
515 return PTR_ERR(ca);
516
517 src = bch2_dev_usage_read(ca);
518
519 arg.state = ca->mi.state;
520 arg.bucket_size = ca->mi.bucket_size;
521 arg.nr_data_types = min(arg.nr_data_types, BCH_DATA_NR);
522 arg.nr_buckets = ca->mi.nbuckets - ca->mi.first_bucket;
523
524 ret = copy_to_user_errcode(user_arg, &arg, sizeof(arg));
525 if (ret)
526 goto err;
527
528 for (unsigned i = 0; i < arg.nr_data_types; i++) {
529 struct bch_ioctl_dev_usage_type t = {
530 .buckets = src.d[i].buckets,
531 .sectors = src.d[i].sectors,
532 .fragmented = src.d[i].fragmented,
533 };
534
535 ret = copy_to_user_errcode(&user_arg->d[i], &t, sizeof(t));
536 if (ret)
537 goto err;
538 }
539 err:
540 bch2_dev_put(ca);
541 return ret;
542 }
543
bch2_ioctl_read_super(struct bch_fs * c,struct bch_ioctl_read_super arg)544 static long bch2_ioctl_read_super(struct bch_fs *c,
545 struct bch_ioctl_read_super arg)
546 {
547 struct bch_dev *ca = NULL;
548 struct bch_sb *sb;
549 int ret = 0;
550
551 if (!capable(CAP_SYS_ADMIN))
552 return -EPERM;
553
554 if ((arg.flags & ~(BCH_BY_INDEX|BCH_READ_DEV)) ||
555 arg.pad)
556 return -EINVAL;
557
558 mutex_lock(&c->sb_lock);
559
560 if (arg.flags & BCH_READ_DEV) {
561 ca = bch2_device_lookup(c, arg.dev, arg.flags);
562 ret = PTR_ERR_OR_ZERO(ca);
563 if (ret)
564 goto err_unlock;
565
566 sb = ca->disk_sb.sb;
567 } else {
568 sb = c->disk_sb.sb;
569 }
570
571 if (vstruct_bytes(sb) > arg.size) {
572 ret = -ERANGE;
573 goto err;
574 }
575
576 ret = copy_to_user_errcode((void __user *)(unsigned long)arg.sb, sb,
577 vstruct_bytes(sb));
578 err:
579 bch2_dev_put(ca);
580 err_unlock:
581 mutex_unlock(&c->sb_lock);
582 return ret;
583 }
584
bch2_ioctl_disk_get_idx(struct bch_fs * c,struct bch_ioctl_disk_get_idx arg)585 static long bch2_ioctl_disk_get_idx(struct bch_fs *c,
586 struct bch_ioctl_disk_get_idx arg)
587 {
588 dev_t dev = huge_decode_dev(arg.dev);
589
590 if (!capable(CAP_SYS_ADMIN))
591 return -EPERM;
592
593 if (!dev)
594 return -EINVAL;
595
596 for_each_online_member(c, ca)
597 if (ca->dev == dev) {
598 percpu_ref_put(&ca->io_ref);
599 return ca->dev_idx;
600 }
601
602 return -BCH_ERR_ENOENT_dev_idx_not_found;
603 }
604
bch2_ioctl_disk_resize(struct bch_fs * c,struct bch_ioctl_disk_resize arg)605 static long bch2_ioctl_disk_resize(struct bch_fs *c,
606 struct bch_ioctl_disk_resize arg)
607 {
608 struct bch_dev *ca;
609 int ret;
610
611 if (!capable(CAP_SYS_ADMIN))
612 return -EPERM;
613
614 if ((arg.flags & ~BCH_BY_INDEX) ||
615 arg.pad)
616 return -EINVAL;
617
618 ca = bch2_device_lookup(c, arg.dev, arg.flags);
619 if (IS_ERR(ca))
620 return PTR_ERR(ca);
621
622 ret = bch2_dev_resize(c, ca, arg.nbuckets);
623
624 bch2_dev_put(ca);
625 return ret;
626 }
627
bch2_ioctl_disk_resize_journal(struct bch_fs * c,struct bch_ioctl_disk_resize_journal arg)628 static long bch2_ioctl_disk_resize_journal(struct bch_fs *c,
629 struct bch_ioctl_disk_resize_journal arg)
630 {
631 struct bch_dev *ca;
632 int ret;
633
634 if (!capable(CAP_SYS_ADMIN))
635 return -EPERM;
636
637 if ((arg.flags & ~BCH_BY_INDEX) ||
638 arg.pad)
639 return -EINVAL;
640
641 if (arg.nbuckets > U32_MAX)
642 return -EINVAL;
643
644 ca = bch2_device_lookup(c, arg.dev, arg.flags);
645 if (IS_ERR(ca))
646 return PTR_ERR(ca);
647
648 ret = bch2_set_nr_journal_buckets(c, ca, arg.nbuckets);
649
650 bch2_dev_put(ca);
651 return ret;
652 }
653
654 #define BCH_IOCTL(_name, _argtype) \
655 do { \
656 _argtype i; \
657 \
658 if (copy_from_user(&i, arg, sizeof(i))) \
659 return -EFAULT; \
660 ret = bch2_ioctl_##_name(c, i); \
661 goto out; \
662 } while (0)
663
bch2_fs_ioctl(struct bch_fs * c,unsigned cmd,void __user * arg)664 long bch2_fs_ioctl(struct bch_fs *c, unsigned cmd, void __user *arg)
665 {
666 long ret;
667
668 switch (cmd) {
669 case BCH_IOCTL_QUERY_UUID:
670 return bch2_ioctl_query_uuid(c, arg);
671 case BCH_IOCTL_FS_USAGE:
672 return bch2_ioctl_fs_usage(c, arg);
673 case BCH_IOCTL_DEV_USAGE:
674 return bch2_ioctl_dev_usage(c, arg);
675 case BCH_IOCTL_DEV_USAGE_V2:
676 return bch2_ioctl_dev_usage_v2(c, arg);
677 #if 0
678 case BCH_IOCTL_START:
679 BCH_IOCTL(start, struct bch_ioctl_start);
680 case BCH_IOCTL_STOP:
681 return bch2_ioctl_stop(c);
682 #endif
683 case BCH_IOCTL_READ_SUPER:
684 BCH_IOCTL(read_super, struct bch_ioctl_read_super);
685 case BCH_IOCTL_DISK_GET_IDX:
686 BCH_IOCTL(disk_get_idx, struct bch_ioctl_disk_get_idx);
687 }
688
689 if (!test_bit(BCH_FS_started, &c->flags))
690 return -EINVAL;
691
692 switch (cmd) {
693 case BCH_IOCTL_DISK_ADD:
694 BCH_IOCTL(disk_add, struct bch_ioctl_disk);
695 case BCH_IOCTL_DISK_REMOVE:
696 BCH_IOCTL(disk_remove, struct bch_ioctl_disk);
697 case BCH_IOCTL_DISK_ONLINE:
698 BCH_IOCTL(disk_online, struct bch_ioctl_disk);
699 case BCH_IOCTL_DISK_OFFLINE:
700 BCH_IOCTL(disk_offline, struct bch_ioctl_disk);
701 case BCH_IOCTL_DISK_SET_STATE:
702 BCH_IOCTL(disk_set_state, struct bch_ioctl_disk_set_state);
703 case BCH_IOCTL_DATA:
704 BCH_IOCTL(data, struct bch_ioctl_data);
705 case BCH_IOCTL_DISK_RESIZE:
706 BCH_IOCTL(disk_resize, struct bch_ioctl_disk_resize);
707 case BCH_IOCTL_DISK_RESIZE_JOURNAL:
708 BCH_IOCTL(disk_resize_journal, struct bch_ioctl_disk_resize_journal);
709 case BCH_IOCTL_FSCK_ONLINE:
710 BCH_IOCTL(fsck_online, struct bch_ioctl_fsck_online);
711 case BCH_IOCTL_QUERY_ACCOUNTING:
712 return bch2_ioctl_query_accounting(c, arg);
713 default:
714 return -ENOTTY;
715 }
716 out:
717 if (ret < 0)
718 ret = bch2_err_class(ret);
719 return ret;
720 }
721
722 static DEFINE_IDR(bch_chardev_minor);
723
bch2_chardev_ioctl(struct file * filp,unsigned cmd,unsigned long v)724 static long bch2_chardev_ioctl(struct file *filp, unsigned cmd, unsigned long v)
725 {
726 unsigned minor = iminor(file_inode(filp));
727 struct bch_fs *c = minor < U8_MAX ? idr_find(&bch_chardev_minor, minor) : NULL;
728 void __user *arg = (void __user *) v;
729
730 return c
731 ? bch2_fs_ioctl(c, cmd, arg)
732 : bch2_global_ioctl(cmd, arg);
733 }
734
735 static const struct file_operations bch_chardev_fops = {
736 .owner = THIS_MODULE,
737 .unlocked_ioctl = bch2_chardev_ioctl,
738 .open = nonseekable_open,
739 };
740
741 static int bch_chardev_major;
742 static const struct class bch_chardev_class = {
743 .name = "bcachefs",
744 };
745 static struct device *bch_chardev;
746
bch2_fs_chardev_exit(struct bch_fs * c)747 void bch2_fs_chardev_exit(struct bch_fs *c)
748 {
749 if (!IS_ERR_OR_NULL(c->chardev))
750 device_unregister(c->chardev);
751 if (c->minor >= 0)
752 idr_remove(&bch_chardev_minor, c->minor);
753 }
754
bch2_fs_chardev_init(struct bch_fs * c)755 int bch2_fs_chardev_init(struct bch_fs *c)
756 {
757 c->minor = idr_alloc(&bch_chardev_minor, c, 0, 0, GFP_KERNEL);
758 if (c->minor < 0)
759 return c->minor;
760
761 c->chardev = device_create(&bch_chardev_class, NULL,
762 MKDEV(bch_chardev_major, c->minor), c,
763 "bcachefs%u-ctl", c->minor);
764 if (IS_ERR(c->chardev))
765 return PTR_ERR(c->chardev);
766
767 return 0;
768 }
769
bch2_chardev_exit(void)770 void bch2_chardev_exit(void)
771 {
772 device_destroy(&bch_chardev_class, MKDEV(bch_chardev_major, U8_MAX));
773 class_unregister(&bch_chardev_class);
774 if (bch_chardev_major > 0)
775 unregister_chrdev(bch_chardev_major, "bcachefs");
776 }
777
bch2_chardev_init(void)778 int __init bch2_chardev_init(void)
779 {
780 int ret;
781
782 bch_chardev_major = register_chrdev(0, "bcachefs-ctl", &bch_chardev_fops);
783 if (bch_chardev_major < 0)
784 return bch_chardev_major;
785
786 ret = class_register(&bch_chardev_class);
787 if (ret)
788 goto major_out;
789
790 bch_chardev = device_create(&bch_chardev_class, NULL,
791 MKDEV(bch_chardev_major, U8_MAX),
792 NULL, "bcachefs-ctl");
793 if (IS_ERR(bch_chardev)) {
794 ret = PTR_ERR(bch_chardev);
795 goto class_out;
796 }
797
798 return 0;
799
800 class_out:
801 class_unregister(&bch_chardev_class);
802 major_out:
803 unregister_chrdev(bch_chardev_major, "bcachefs-ctl");
804 return ret;
805 }
806
807 #endif /* NO_BCACHEFS_CHARDEV */
808