1 // SPDX-License-Identifier: GPL-2.0 2 #ifndef NO_BCACHEFS_CHARDEV 3 4 #include "bcachefs.h" 5 #include "bcachefs_ioctl.h" 6 #include "buckets.h" 7 #include "chardev.h" 8 #include "disk_accounting.h" 9 #include "fsck.h" 10 #include "journal.h" 11 #include "move.h" 12 #include "recovery_passes.h" 13 #include "replicas.h" 14 #include "super-io.h" 15 #include "thread_with_file.h" 16 17 #include <linux/cdev.h> 18 #include <linux/device.h> 19 #include <linux/fs.h> 20 #include <linux/ioctl.h> 21 #include <linux/major.h> 22 #include <linux/sched/task.h> 23 #include <linux/slab.h> 24 #include <linux/uaccess.h> 25 26 /* returns with ref on ca->ref */ 27 static struct bch_dev *bch2_device_lookup(struct bch_fs *c, u64 dev, 28 unsigned flags) 29 { 30 struct bch_dev *ca; 31 32 if (flags & BCH_BY_INDEX) { 33 if (dev >= c->sb.nr_devices) 34 return ERR_PTR(-EINVAL); 35 36 ca = bch2_dev_tryget_noerror(c, dev); 37 if (!ca) 38 return ERR_PTR(-EINVAL); 39 } else { 40 char *path; 41 42 path = strndup_user((const char __user *) 43 (unsigned long) dev, PATH_MAX); 44 if (IS_ERR(path)) 45 return ERR_CAST(path); 46 47 ca = bch2_dev_lookup(c, path); 48 kfree(path); 49 } 50 51 return ca; 52 } 53 54 #if 0 55 static long bch2_ioctl_assemble(struct bch_ioctl_assemble __user *user_arg) 56 { 57 struct bch_ioctl_assemble arg; 58 struct bch_fs *c; 59 u64 *user_devs = NULL; 60 char **devs = NULL; 61 unsigned i; 62 int ret = -EFAULT; 63 64 if (copy_from_user(&arg, user_arg, sizeof(arg))) 65 return -EFAULT; 66 67 if (arg.flags || arg.pad) 68 return -EINVAL; 69 70 user_devs = kmalloc_array(arg.nr_devs, sizeof(u64), GFP_KERNEL); 71 if (!user_devs) 72 return -ENOMEM; 73 74 devs = kcalloc(arg.nr_devs, sizeof(char *), GFP_KERNEL); 75 76 if (copy_from_user(user_devs, user_arg->devs, 77 sizeof(u64) * arg.nr_devs)) 78 goto err; 79 80 for (i = 0; i < arg.nr_devs; i++) { 81 devs[i] = strndup_user((const char __user *)(unsigned long) 82 user_devs[i], 83 PATH_MAX); 84 ret= PTR_ERR_OR_ZERO(devs[i]); 85 if (ret) 86 goto err; 87 } 88 89 c = bch2_fs_open(devs, arg.nr_devs, bch2_opts_empty()); 90 ret = PTR_ERR_OR_ZERO(c); 91 if (!ret) 92 closure_put(&c->cl); 93 err: 94 if (devs) 95 for (i = 0; i < arg.nr_devs; i++) 96 kfree(devs[i]); 97 kfree(devs); 98 return ret; 99 } 100 101 static long bch2_ioctl_incremental(struct bch_ioctl_incremental __user *user_arg) 102 { 103 struct bch_ioctl_incremental arg; 104 const char *err; 105 char *path; 106 107 if (copy_from_user(&arg, user_arg, sizeof(arg))) 108 return -EFAULT; 109 110 if (arg.flags || arg.pad) 111 return -EINVAL; 112 113 path = strndup_user((const char __user *)(unsigned long) arg.dev, PATH_MAX); 114 ret = PTR_ERR_OR_ZERO(path); 115 if (ret) 116 return ret; 117 118 err = bch2_fs_open_incremental(path); 119 kfree(path); 120 121 if (err) { 122 pr_err("Could not register bcachefs devices: %s", err); 123 return -EINVAL; 124 } 125 126 return 0; 127 } 128 #endif 129 130 static long bch2_global_ioctl(unsigned cmd, void __user *arg) 131 { 132 long ret; 133 134 switch (cmd) { 135 #if 0 136 case BCH_IOCTL_ASSEMBLE: 137 return bch2_ioctl_assemble(arg); 138 case BCH_IOCTL_INCREMENTAL: 139 return bch2_ioctl_incremental(arg); 140 #endif 141 case BCH_IOCTL_FSCK_OFFLINE: { 142 ret = bch2_ioctl_fsck_offline(arg); 143 break; 144 } 145 default: 146 ret = -ENOTTY; 147 break; 148 } 149 150 if (ret < 0) 151 ret = bch2_err_class(ret); 152 return ret; 153 } 154 155 static long bch2_ioctl_query_uuid(struct bch_fs *c, 156 struct bch_ioctl_query_uuid __user *user_arg) 157 { 158 return copy_to_user_errcode(&user_arg->uuid, &c->sb.user_uuid, 159 sizeof(c->sb.user_uuid)); 160 } 161 162 #if 0 163 static long bch2_ioctl_start(struct bch_fs *c, struct bch_ioctl_start arg) 164 { 165 if (!capable(CAP_SYS_ADMIN)) 166 return -EPERM; 167 168 if (arg.flags || arg.pad) 169 return -EINVAL; 170 171 return bch2_fs_start(c); 172 } 173 174 static long bch2_ioctl_stop(struct bch_fs *c) 175 { 176 if (!capable(CAP_SYS_ADMIN)) 177 return -EPERM; 178 179 bch2_fs_stop(c); 180 return 0; 181 } 182 #endif 183 184 static long bch2_ioctl_disk_add(struct bch_fs *c, struct bch_ioctl_disk arg) 185 { 186 char *path; 187 int ret; 188 189 if (!capable(CAP_SYS_ADMIN)) 190 return -EPERM; 191 192 if (arg.flags || arg.pad) 193 return -EINVAL; 194 195 path = strndup_user((const char __user *)(unsigned long) arg.dev, PATH_MAX); 196 ret = PTR_ERR_OR_ZERO(path); 197 if (ret) 198 return ret; 199 200 ret = bch2_dev_add(c, path); 201 if (!IS_ERR(path)) 202 kfree(path); 203 204 return ret; 205 } 206 207 static long bch2_ioctl_disk_remove(struct bch_fs *c, struct bch_ioctl_disk arg) 208 { 209 struct bch_dev *ca; 210 211 if (!capable(CAP_SYS_ADMIN)) 212 return -EPERM; 213 214 if ((arg.flags & ~(BCH_FORCE_IF_DATA_LOST| 215 BCH_FORCE_IF_METADATA_LOST| 216 BCH_FORCE_IF_DEGRADED| 217 BCH_BY_INDEX)) || 218 arg.pad) 219 return -EINVAL; 220 221 ca = bch2_device_lookup(c, arg.dev, arg.flags); 222 if (IS_ERR(ca)) 223 return PTR_ERR(ca); 224 225 return bch2_dev_remove(c, ca, arg.flags); 226 } 227 228 static long bch2_ioctl_disk_online(struct bch_fs *c, struct bch_ioctl_disk arg) 229 { 230 char *path; 231 int ret; 232 233 if (!capable(CAP_SYS_ADMIN)) 234 return -EPERM; 235 236 if (arg.flags || arg.pad) 237 return -EINVAL; 238 239 path = strndup_user((const char __user *)(unsigned long) arg.dev, PATH_MAX); 240 ret = PTR_ERR_OR_ZERO(path); 241 if (ret) 242 return ret; 243 244 ret = bch2_dev_online(c, path); 245 kfree(path); 246 return ret; 247 } 248 249 static long bch2_ioctl_disk_offline(struct bch_fs *c, struct bch_ioctl_disk arg) 250 { 251 struct bch_dev *ca; 252 int ret; 253 254 if (!capable(CAP_SYS_ADMIN)) 255 return -EPERM; 256 257 if ((arg.flags & ~(BCH_FORCE_IF_DATA_LOST| 258 BCH_FORCE_IF_METADATA_LOST| 259 BCH_FORCE_IF_DEGRADED| 260 BCH_BY_INDEX)) || 261 arg.pad) 262 return -EINVAL; 263 264 ca = bch2_device_lookup(c, arg.dev, arg.flags); 265 if (IS_ERR(ca)) 266 return PTR_ERR(ca); 267 268 ret = bch2_dev_offline(c, ca, arg.flags); 269 bch2_dev_put(ca); 270 return ret; 271 } 272 273 static long bch2_ioctl_disk_set_state(struct bch_fs *c, 274 struct bch_ioctl_disk_set_state arg) 275 { 276 struct bch_dev *ca; 277 int ret; 278 279 if (!capable(CAP_SYS_ADMIN)) 280 return -EPERM; 281 282 if ((arg.flags & ~(BCH_FORCE_IF_DATA_LOST| 283 BCH_FORCE_IF_METADATA_LOST| 284 BCH_FORCE_IF_DEGRADED| 285 BCH_BY_INDEX)) || 286 arg.pad[0] || arg.pad[1] || arg.pad[2] || 287 arg.new_state >= BCH_MEMBER_STATE_NR) 288 return -EINVAL; 289 290 ca = bch2_device_lookup(c, arg.dev, arg.flags); 291 if (IS_ERR(ca)) 292 return PTR_ERR(ca); 293 294 ret = bch2_dev_set_state(c, ca, arg.new_state, arg.flags); 295 if (ret) 296 bch_err(c, "Error setting device state: %s", bch2_err_str(ret)); 297 298 bch2_dev_put(ca); 299 return ret; 300 } 301 302 struct bch_data_ctx { 303 struct thread_with_file thr; 304 305 struct bch_fs *c; 306 struct bch_ioctl_data arg; 307 struct bch_move_stats stats; 308 }; 309 310 static int bch2_data_thread(void *arg) 311 { 312 struct bch_data_ctx *ctx = container_of(arg, struct bch_data_ctx, thr); 313 314 ctx->thr.ret = bch2_data_job(ctx->c, &ctx->stats, ctx->arg); 315 ctx->stats.data_type = U8_MAX; 316 return 0; 317 } 318 319 static int bch2_data_job_release(struct inode *inode, struct file *file) 320 { 321 struct bch_data_ctx *ctx = container_of(file->private_data, struct bch_data_ctx, thr); 322 323 bch2_thread_with_file_exit(&ctx->thr); 324 kfree(ctx); 325 return 0; 326 } 327 328 static ssize_t bch2_data_job_read(struct file *file, char __user *buf, 329 size_t len, loff_t *ppos) 330 { 331 struct bch_data_ctx *ctx = container_of(file->private_data, struct bch_data_ctx, thr); 332 struct bch_fs *c = ctx->c; 333 struct bch_ioctl_data_event e = { 334 .type = BCH_DATA_EVENT_PROGRESS, 335 .p.data_type = ctx->stats.data_type, 336 .p.btree_id = ctx->stats.pos.btree, 337 .p.pos = ctx->stats.pos.pos, 338 .p.sectors_done = atomic64_read(&ctx->stats.sectors_seen), 339 .p.sectors_total = bch2_fs_usage_read_short(c).used, 340 }; 341 342 if (len < sizeof(e)) 343 return -EINVAL; 344 345 return copy_to_user_errcode(buf, &e, sizeof(e)) ?: sizeof(e); 346 } 347 348 static const struct file_operations bcachefs_data_ops = { 349 .release = bch2_data_job_release, 350 .read = bch2_data_job_read, 351 }; 352 353 static long bch2_ioctl_data(struct bch_fs *c, 354 struct bch_ioctl_data arg) 355 { 356 struct bch_data_ctx *ctx; 357 int ret; 358 359 if (!capable(CAP_SYS_ADMIN)) 360 return -EPERM; 361 362 if (arg.op >= BCH_DATA_OP_NR || arg.flags) 363 return -EINVAL; 364 365 ctx = kzalloc(sizeof(*ctx), GFP_KERNEL); 366 if (!ctx) 367 return -ENOMEM; 368 369 ctx->c = c; 370 ctx->arg = arg; 371 372 ret = bch2_run_thread_with_file(&ctx->thr, 373 &bcachefs_data_ops, 374 bch2_data_thread); 375 if (ret < 0) 376 kfree(ctx); 377 return ret; 378 } 379 380 static long bch2_ioctl_fs_usage(struct bch_fs *c, 381 struct bch_ioctl_fs_usage __user *user_arg) 382 { 383 struct bch_ioctl_fs_usage arg = {}; 384 darray_char replicas = {}; 385 u32 replica_entries_bytes; 386 int ret = 0; 387 388 if (!test_bit(BCH_FS_started, &c->flags)) 389 return -EINVAL; 390 391 if (get_user(replica_entries_bytes, &user_arg->replica_entries_bytes)) 392 return -EFAULT; 393 394 ret = bch2_fs_replicas_usage_read(c, &replicas) ?: 395 (replica_entries_bytes < replicas.nr ? -ERANGE : 0) ?: 396 copy_to_user_errcode(&user_arg->replicas, replicas.data, replicas.nr); 397 if (ret) 398 goto err; 399 400 struct bch_fs_usage_short u = bch2_fs_usage_read_short(c); 401 arg.capacity = c->capacity; 402 arg.used = u.used; 403 arg.online_reserved = percpu_u64_get(c->online_reserved); 404 arg.replica_entries_bytes = replicas.nr; 405 406 for (unsigned i = 0; i < BCH_REPLICAS_MAX; i++) { 407 struct disk_accounting_pos k = { 408 .type = BCH_DISK_ACCOUNTING_persistent_reserved, 409 .persistent_reserved.nr_replicas = i, 410 }; 411 412 bch2_accounting_mem_read(c, 413 disk_accounting_pos_to_bpos(&k), 414 &arg.persistent_reserved[i], 1); 415 } 416 417 ret = copy_to_user_errcode(user_arg, &arg, sizeof(arg)); 418 err: 419 darray_exit(&replicas); 420 return ret; 421 } 422 423 static long bch2_ioctl_query_accounting(struct bch_fs *c, 424 struct bch_ioctl_query_accounting __user *user_arg) 425 { 426 struct bch_ioctl_query_accounting arg; 427 darray_char accounting = {}; 428 int ret = 0; 429 430 if (!test_bit(BCH_FS_started, &c->flags)) 431 return -EINVAL; 432 433 ret = copy_from_user_errcode(&arg, user_arg, sizeof(arg)) ?: 434 bch2_fs_accounting_read(c, &accounting, arg.accounting_types_mask) ?: 435 (arg.accounting_u64s * sizeof(u64) < accounting.nr ? -ERANGE : 0) ?: 436 copy_to_user_errcode(&user_arg->accounting, accounting.data, accounting.nr); 437 if (ret) 438 goto err; 439 440 arg.capacity = c->capacity; 441 arg.used = bch2_fs_usage_read_short(c).used; 442 arg.online_reserved = percpu_u64_get(c->online_reserved); 443 arg.accounting_u64s = accounting.nr / sizeof(u64); 444 445 ret = copy_to_user_errcode(user_arg, &arg, sizeof(arg)); 446 err: 447 darray_exit(&accounting); 448 return ret; 449 } 450 451 /* obsolete, didn't allow for new data types: */ 452 static long bch2_ioctl_dev_usage(struct bch_fs *c, 453 struct bch_ioctl_dev_usage __user *user_arg) 454 { 455 struct bch_ioctl_dev_usage arg; 456 struct bch_dev_usage src; 457 struct bch_dev *ca; 458 unsigned i; 459 460 if (!test_bit(BCH_FS_started, &c->flags)) 461 return -EINVAL; 462 463 if (copy_from_user(&arg, user_arg, sizeof(arg))) 464 return -EFAULT; 465 466 if ((arg.flags & ~BCH_BY_INDEX) || 467 arg.pad[0] || 468 arg.pad[1] || 469 arg.pad[2]) 470 return -EINVAL; 471 472 ca = bch2_device_lookup(c, arg.dev, arg.flags); 473 if (IS_ERR(ca)) 474 return PTR_ERR(ca); 475 476 src = bch2_dev_usage_read(ca); 477 478 arg.state = ca->mi.state; 479 arg.bucket_size = ca->mi.bucket_size; 480 arg.nr_buckets = ca->mi.nbuckets - ca->mi.first_bucket; 481 482 for (i = 0; i < ARRAY_SIZE(arg.d); i++) { 483 arg.d[i].buckets = src.d[i].buckets; 484 arg.d[i].sectors = src.d[i].sectors; 485 arg.d[i].fragmented = src.d[i].fragmented; 486 } 487 488 bch2_dev_put(ca); 489 490 return copy_to_user_errcode(user_arg, &arg, sizeof(arg)); 491 } 492 493 static long bch2_ioctl_dev_usage_v2(struct bch_fs *c, 494 struct bch_ioctl_dev_usage_v2 __user *user_arg) 495 { 496 struct bch_ioctl_dev_usage_v2 arg; 497 struct bch_dev_usage src; 498 struct bch_dev *ca; 499 int ret = 0; 500 501 if (!test_bit(BCH_FS_started, &c->flags)) 502 return -EINVAL; 503 504 if (copy_from_user(&arg, user_arg, sizeof(arg))) 505 return -EFAULT; 506 507 if ((arg.flags & ~BCH_BY_INDEX) || 508 arg.pad[0] || 509 arg.pad[1] || 510 arg.pad[2]) 511 return -EINVAL; 512 513 ca = bch2_device_lookup(c, arg.dev, arg.flags); 514 if (IS_ERR(ca)) 515 return PTR_ERR(ca); 516 517 src = bch2_dev_usage_read(ca); 518 519 arg.state = ca->mi.state; 520 arg.bucket_size = ca->mi.bucket_size; 521 arg.nr_data_types = min(arg.nr_data_types, BCH_DATA_NR); 522 arg.nr_buckets = ca->mi.nbuckets - ca->mi.first_bucket; 523 524 ret = copy_to_user_errcode(user_arg, &arg, sizeof(arg)); 525 if (ret) 526 goto err; 527 528 for (unsigned i = 0; i < arg.nr_data_types; i++) { 529 struct bch_ioctl_dev_usage_type t = { 530 .buckets = src.d[i].buckets, 531 .sectors = src.d[i].sectors, 532 .fragmented = src.d[i].fragmented, 533 }; 534 535 ret = copy_to_user_errcode(&user_arg->d[i], &t, sizeof(t)); 536 if (ret) 537 goto err; 538 } 539 err: 540 bch2_dev_put(ca); 541 return ret; 542 } 543 544 static long bch2_ioctl_read_super(struct bch_fs *c, 545 struct bch_ioctl_read_super arg) 546 { 547 struct bch_dev *ca = NULL; 548 struct bch_sb *sb; 549 int ret = 0; 550 551 if (!capable(CAP_SYS_ADMIN)) 552 return -EPERM; 553 554 if ((arg.flags & ~(BCH_BY_INDEX|BCH_READ_DEV)) || 555 arg.pad) 556 return -EINVAL; 557 558 mutex_lock(&c->sb_lock); 559 560 if (arg.flags & BCH_READ_DEV) { 561 ca = bch2_device_lookup(c, arg.dev, arg.flags); 562 ret = PTR_ERR_OR_ZERO(ca); 563 if (ret) 564 goto err_unlock; 565 566 sb = ca->disk_sb.sb; 567 } else { 568 sb = c->disk_sb.sb; 569 } 570 571 if (vstruct_bytes(sb) > arg.size) { 572 ret = -ERANGE; 573 goto err; 574 } 575 576 ret = copy_to_user_errcode((void __user *)(unsigned long)arg.sb, sb, 577 vstruct_bytes(sb)); 578 err: 579 bch2_dev_put(ca); 580 err_unlock: 581 mutex_unlock(&c->sb_lock); 582 return ret; 583 } 584 585 static long bch2_ioctl_disk_get_idx(struct bch_fs *c, 586 struct bch_ioctl_disk_get_idx arg) 587 { 588 dev_t dev = huge_decode_dev(arg.dev); 589 590 if (!capable(CAP_SYS_ADMIN)) 591 return -EPERM; 592 593 if (!dev) 594 return -EINVAL; 595 596 for_each_online_member(c, ca) 597 if (ca->dev == dev) { 598 percpu_ref_put(&ca->io_ref); 599 return ca->dev_idx; 600 } 601 602 return -BCH_ERR_ENOENT_dev_idx_not_found; 603 } 604 605 static long bch2_ioctl_disk_resize(struct bch_fs *c, 606 struct bch_ioctl_disk_resize arg) 607 { 608 struct bch_dev *ca; 609 int ret; 610 611 if (!capable(CAP_SYS_ADMIN)) 612 return -EPERM; 613 614 if ((arg.flags & ~BCH_BY_INDEX) || 615 arg.pad) 616 return -EINVAL; 617 618 ca = bch2_device_lookup(c, arg.dev, arg.flags); 619 if (IS_ERR(ca)) 620 return PTR_ERR(ca); 621 622 ret = bch2_dev_resize(c, ca, arg.nbuckets); 623 624 bch2_dev_put(ca); 625 return ret; 626 } 627 628 static long bch2_ioctl_disk_resize_journal(struct bch_fs *c, 629 struct bch_ioctl_disk_resize_journal arg) 630 { 631 struct bch_dev *ca; 632 int ret; 633 634 if (!capable(CAP_SYS_ADMIN)) 635 return -EPERM; 636 637 if ((arg.flags & ~BCH_BY_INDEX) || 638 arg.pad) 639 return -EINVAL; 640 641 if (arg.nbuckets > U32_MAX) 642 return -EINVAL; 643 644 ca = bch2_device_lookup(c, arg.dev, arg.flags); 645 if (IS_ERR(ca)) 646 return PTR_ERR(ca); 647 648 ret = bch2_set_nr_journal_buckets(c, ca, arg.nbuckets); 649 650 bch2_dev_put(ca); 651 return ret; 652 } 653 654 #define BCH_IOCTL(_name, _argtype) \ 655 do { \ 656 _argtype i; \ 657 \ 658 if (copy_from_user(&i, arg, sizeof(i))) \ 659 return -EFAULT; \ 660 ret = bch2_ioctl_##_name(c, i); \ 661 goto out; \ 662 } while (0) 663 664 long bch2_fs_ioctl(struct bch_fs *c, unsigned cmd, void __user *arg) 665 { 666 long ret; 667 668 switch (cmd) { 669 case BCH_IOCTL_QUERY_UUID: 670 return bch2_ioctl_query_uuid(c, arg); 671 case BCH_IOCTL_FS_USAGE: 672 return bch2_ioctl_fs_usage(c, arg); 673 case BCH_IOCTL_DEV_USAGE: 674 return bch2_ioctl_dev_usage(c, arg); 675 case BCH_IOCTL_DEV_USAGE_V2: 676 return bch2_ioctl_dev_usage_v2(c, arg); 677 #if 0 678 case BCH_IOCTL_START: 679 BCH_IOCTL(start, struct bch_ioctl_start); 680 case BCH_IOCTL_STOP: 681 return bch2_ioctl_stop(c); 682 #endif 683 case BCH_IOCTL_READ_SUPER: 684 BCH_IOCTL(read_super, struct bch_ioctl_read_super); 685 case BCH_IOCTL_DISK_GET_IDX: 686 BCH_IOCTL(disk_get_idx, struct bch_ioctl_disk_get_idx); 687 } 688 689 if (!test_bit(BCH_FS_started, &c->flags)) 690 return -EINVAL; 691 692 switch (cmd) { 693 case BCH_IOCTL_DISK_ADD: 694 BCH_IOCTL(disk_add, struct bch_ioctl_disk); 695 case BCH_IOCTL_DISK_REMOVE: 696 BCH_IOCTL(disk_remove, struct bch_ioctl_disk); 697 case BCH_IOCTL_DISK_ONLINE: 698 BCH_IOCTL(disk_online, struct bch_ioctl_disk); 699 case BCH_IOCTL_DISK_OFFLINE: 700 BCH_IOCTL(disk_offline, struct bch_ioctl_disk); 701 case BCH_IOCTL_DISK_SET_STATE: 702 BCH_IOCTL(disk_set_state, struct bch_ioctl_disk_set_state); 703 case BCH_IOCTL_DATA: 704 BCH_IOCTL(data, struct bch_ioctl_data); 705 case BCH_IOCTL_DISK_RESIZE: 706 BCH_IOCTL(disk_resize, struct bch_ioctl_disk_resize); 707 case BCH_IOCTL_DISK_RESIZE_JOURNAL: 708 BCH_IOCTL(disk_resize_journal, struct bch_ioctl_disk_resize_journal); 709 case BCH_IOCTL_FSCK_ONLINE: 710 BCH_IOCTL(fsck_online, struct bch_ioctl_fsck_online); 711 case BCH_IOCTL_QUERY_ACCOUNTING: 712 return bch2_ioctl_query_accounting(c, arg); 713 default: 714 return -ENOTTY; 715 } 716 out: 717 if (ret < 0) 718 ret = bch2_err_class(ret); 719 return ret; 720 } 721 722 static DEFINE_IDR(bch_chardev_minor); 723 724 static long bch2_chardev_ioctl(struct file *filp, unsigned cmd, unsigned long v) 725 { 726 unsigned minor = iminor(file_inode(filp)); 727 struct bch_fs *c = minor < U8_MAX ? idr_find(&bch_chardev_minor, minor) : NULL; 728 void __user *arg = (void __user *) v; 729 730 return c 731 ? bch2_fs_ioctl(c, cmd, arg) 732 : bch2_global_ioctl(cmd, arg); 733 } 734 735 static const struct file_operations bch_chardev_fops = { 736 .owner = THIS_MODULE, 737 .unlocked_ioctl = bch2_chardev_ioctl, 738 .open = nonseekable_open, 739 }; 740 741 static int bch_chardev_major; 742 static const struct class bch_chardev_class = { 743 .name = "bcachefs", 744 }; 745 static struct device *bch_chardev; 746 747 void bch2_fs_chardev_exit(struct bch_fs *c) 748 { 749 if (!IS_ERR_OR_NULL(c->chardev)) 750 device_unregister(c->chardev); 751 if (c->minor >= 0) 752 idr_remove(&bch_chardev_minor, c->minor); 753 } 754 755 int bch2_fs_chardev_init(struct bch_fs *c) 756 { 757 c->minor = idr_alloc(&bch_chardev_minor, c, 0, 0, GFP_KERNEL); 758 if (c->minor < 0) 759 return c->minor; 760 761 c->chardev = device_create(&bch_chardev_class, NULL, 762 MKDEV(bch_chardev_major, c->minor), c, 763 "bcachefs%u-ctl", c->minor); 764 if (IS_ERR(c->chardev)) 765 return PTR_ERR(c->chardev); 766 767 return 0; 768 } 769 770 void bch2_chardev_exit(void) 771 { 772 device_destroy(&bch_chardev_class, MKDEV(bch_chardev_major, U8_MAX)); 773 class_unregister(&bch_chardev_class); 774 if (bch_chardev_major > 0) 775 unregister_chrdev(bch_chardev_major, "bcachefs"); 776 } 777 778 int __init bch2_chardev_init(void) 779 { 780 int ret; 781 782 bch_chardev_major = register_chrdev(0, "bcachefs-ctl", &bch_chardev_fops); 783 if (bch_chardev_major < 0) 784 return bch_chardev_major; 785 786 ret = class_register(&bch_chardev_class); 787 if (ret) 788 goto major_out; 789 790 bch_chardev = device_create(&bch_chardev_class, NULL, 791 MKDEV(bch_chardev_major, U8_MAX), 792 NULL, "bcachefs-ctl"); 793 if (IS_ERR(bch_chardev)) { 794 ret = PTR_ERR(bch_chardev); 795 goto class_out; 796 } 797 798 return 0; 799 800 class_out: 801 class_unregister(&bch_chardev_class); 802 major_out: 803 unregister_chrdev(bch_chardev_major, "bcachefs-ctl"); 804 return ret; 805 } 806 807 #endif /* NO_BCACHEFS_CHARDEV */ 808