xref: /linux/fs/bcachefs/chardev.c (revision a3a02a52bcfcbcc4a637d4b68bf1bc391c9fad02)
1 // SPDX-License-Identifier: GPL-2.0
2 #ifndef NO_BCACHEFS_CHARDEV
3 
4 #include "bcachefs.h"
5 #include "bcachefs_ioctl.h"
6 #include "buckets.h"
7 #include "chardev.h"
8 #include "disk_accounting.h"
9 #include "journal.h"
10 #include "move.h"
11 #include "recovery_passes.h"
12 #include "replicas.h"
13 #include "super.h"
14 #include "super-io.h"
15 #include "thread_with_file.h"
16 
17 #include <linux/cdev.h>
18 #include <linux/device.h>
19 #include <linux/fs.h>
20 #include <linux/ioctl.h>
21 #include <linux/major.h>
22 #include <linux/sched/task.h>
23 #include <linux/slab.h>
24 #include <linux/uaccess.h>
25 
26 /* returns with ref on ca->ref */
27 static struct bch_dev *bch2_device_lookup(struct bch_fs *c, u64 dev,
28 					  unsigned flags)
29 {
30 	struct bch_dev *ca;
31 
32 	if (flags & BCH_BY_INDEX) {
33 		if (dev >= c->sb.nr_devices)
34 			return ERR_PTR(-EINVAL);
35 
36 		ca = bch2_dev_tryget_noerror(c, dev);
37 		if (!ca)
38 			return ERR_PTR(-EINVAL);
39 	} else {
40 		char *path;
41 
42 		path = strndup_user((const char __user *)
43 				    (unsigned long) dev, PATH_MAX);
44 		if (IS_ERR(path))
45 			return ERR_CAST(path);
46 
47 		ca = bch2_dev_lookup(c, path);
48 		kfree(path);
49 	}
50 
51 	return ca;
52 }
53 
54 #if 0
55 static long bch2_ioctl_assemble(struct bch_ioctl_assemble __user *user_arg)
56 {
57 	struct bch_ioctl_assemble arg;
58 	struct bch_fs *c;
59 	u64 *user_devs = NULL;
60 	char **devs = NULL;
61 	unsigned i;
62 	int ret = -EFAULT;
63 
64 	if (copy_from_user(&arg, user_arg, sizeof(arg)))
65 		return -EFAULT;
66 
67 	if (arg.flags || arg.pad)
68 		return -EINVAL;
69 
70 	user_devs = kmalloc_array(arg.nr_devs, sizeof(u64), GFP_KERNEL);
71 	if (!user_devs)
72 		return -ENOMEM;
73 
74 	devs = kcalloc(arg.nr_devs, sizeof(char *), GFP_KERNEL);
75 
76 	if (copy_from_user(user_devs, user_arg->devs,
77 			   sizeof(u64) * arg.nr_devs))
78 		goto err;
79 
80 	for (i = 0; i < arg.nr_devs; i++) {
81 		devs[i] = strndup_user((const char __user *)(unsigned long)
82 				       user_devs[i],
83 				       PATH_MAX);
84 		ret= PTR_ERR_OR_ZERO(devs[i]);
85 		if (ret)
86 			goto err;
87 	}
88 
89 	c = bch2_fs_open(devs, arg.nr_devs, bch2_opts_empty());
90 	ret = PTR_ERR_OR_ZERO(c);
91 	if (!ret)
92 		closure_put(&c->cl);
93 err:
94 	if (devs)
95 		for (i = 0; i < arg.nr_devs; i++)
96 			kfree(devs[i]);
97 	kfree(devs);
98 	return ret;
99 }
100 
101 static long bch2_ioctl_incremental(struct bch_ioctl_incremental __user *user_arg)
102 {
103 	struct bch_ioctl_incremental arg;
104 	const char *err;
105 	char *path;
106 
107 	if (copy_from_user(&arg, user_arg, sizeof(arg)))
108 		return -EFAULT;
109 
110 	if (arg.flags || arg.pad)
111 		return -EINVAL;
112 
113 	path = strndup_user((const char __user *)(unsigned long) arg.dev, PATH_MAX);
114 	ret = PTR_ERR_OR_ZERO(path);
115 	if (ret)
116 		return ret;
117 
118 	err = bch2_fs_open_incremental(path);
119 	kfree(path);
120 
121 	if (err) {
122 		pr_err("Could not register bcachefs devices: %s", err);
123 		return -EINVAL;
124 	}
125 
126 	return 0;
127 }
128 #endif
129 
130 struct fsck_thread {
131 	struct thread_with_stdio thr;
132 	struct bch_fs		*c;
133 	struct bch_opts		opts;
134 };
135 
136 static void bch2_fsck_thread_exit(struct thread_with_stdio *_thr)
137 {
138 	struct fsck_thread *thr = container_of(_thr, struct fsck_thread, thr);
139 	kfree(thr);
140 }
141 
142 static int bch2_fsck_offline_thread_fn(struct thread_with_stdio *stdio)
143 {
144 	struct fsck_thread *thr = container_of(stdio, struct fsck_thread, thr);
145 	struct bch_fs *c = thr->c;
146 
147 	int ret = PTR_ERR_OR_ZERO(c);
148 	if (ret)
149 		return ret;
150 
151 	ret = bch2_fs_start(thr->c);
152 	if (ret)
153 		goto err;
154 
155 	if (test_bit(BCH_FS_errors_fixed, &c->flags)) {
156 		bch2_stdio_redirect_printf(&stdio->stdio, false, "%s: errors fixed\n", c->name);
157 		ret |= 1;
158 	}
159 	if (test_bit(BCH_FS_error, &c->flags)) {
160 		bch2_stdio_redirect_printf(&stdio->stdio, false, "%s: still has errors\n", c->name);
161 		ret |= 4;
162 	}
163 err:
164 	bch2_fs_stop(c);
165 	return ret;
166 }
167 
168 static const struct thread_with_stdio_ops bch2_offline_fsck_ops = {
169 	.exit		= bch2_fsck_thread_exit,
170 	.fn		= bch2_fsck_offline_thread_fn,
171 };
172 
173 static long bch2_ioctl_fsck_offline(struct bch_ioctl_fsck_offline __user *user_arg)
174 {
175 	struct bch_ioctl_fsck_offline arg;
176 	struct fsck_thread *thr = NULL;
177 	darray_str(devs) = {};
178 	long ret = 0;
179 
180 	if (copy_from_user(&arg, user_arg, sizeof(arg)))
181 		return -EFAULT;
182 
183 	if (arg.flags)
184 		return -EINVAL;
185 
186 	if (!capable(CAP_SYS_ADMIN))
187 		return -EPERM;
188 
189 	for (size_t i = 0; i < arg.nr_devs; i++) {
190 		u64 dev_u64;
191 		ret = copy_from_user_errcode(&dev_u64, &user_arg->devs[i], sizeof(u64));
192 		if (ret)
193 			goto err;
194 
195 		char *dev_str = strndup_user((char __user *)(unsigned long) dev_u64, PATH_MAX);
196 		ret = PTR_ERR_OR_ZERO(dev_str);
197 		if (ret)
198 			goto err;
199 
200 		ret = darray_push(&devs, dev_str);
201 		if (ret) {
202 			kfree(dev_str);
203 			goto err;
204 		}
205 	}
206 
207 	thr = kzalloc(sizeof(*thr), GFP_KERNEL);
208 	if (!thr) {
209 		ret = -ENOMEM;
210 		goto err;
211 	}
212 
213 	thr->opts = bch2_opts_empty();
214 
215 	if (arg.opts) {
216 		char *optstr = strndup_user((char __user *)(unsigned long) arg.opts, 1 << 16);
217 		ret =   PTR_ERR_OR_ZERO(optstr) ?:
218 			bch2_parse_mount_opts(NULL, &thr->opts, NULL, optstr);
219 		if (!IS_ERR(optstr))
220 			kfree(optstr);
221 
222 		if (ret)
223 			goto err;
224 	}
225 
226 	opt_set(thr->opts, stdio, (u64)(unsigned long)&thr->thr.stdio);
227 	opt_set(thr->opts, read_only, 1);
228 
229 	/* We need request_key() to be called before we punt to kthread: */
230 	opt_set(thr->opts, nostart, true);
231 
232 	bch2_thread_with_stdio_init(&thr->thr, &bch2_offline_fsck_ops);
233 
234 	thr->c = bch2_fs_open(devs.data, arg.nr_devs, thr->opts);
235 
236 	if (!IS_ERR(thr->c) &&
237 	    thr->c->opts.errors == BCH_ON_ERROR_panic)
238 		thr->c->opts.errors = BCH_ON_ERROR_ro;
239 
240 	ret = __bch2_run_thread_with_stdio(&thr->thr);
241 out:
242 	darray_for_each(devs, i)
243 		kfree(*i);
244 	darray_exit(&devs);
245 	return ret;
246 err:
247 	if (thr)
248 		bch2_fsck_thread_exit(&thr->thr);
249 	pr_err("ret %s", bch2_err_str(ret));
250 	goto out;
251 }
252 
253 static long bch2_global_ioctl(unsigned cmd, void __user *arg)
254 {
255 	long ret;
256 
257 	switch (cmd) {
258 #if 0
259 	case BCH_IOCTL_ASSEMBLE:
260 		return bch2_ioctl_assemble(arg);
261 	case BCH_IOCTL_INCREMENTAL:
262 		return bch2_ioctl_incremental(arg);
263 #endif
264 	case BCH_IOCTL_FSCK_OFFLINE: {
265 		ret = bch2_ioctl_fsck_offline(arg);
266 		break;
267 	}
268 	default:
269 		ret = -ENOTTY;
270 		break;
271 	}
272 
273 	if (ret < 0)
274 		ret = bch2_err_class(ret);
275 	return ret;
276 }
277 
278 static long bch2_ioctl_query_uuid(struct bch_fs *c,
279 			struct bch_ioctl_query_uuid __user *user_arg)
280 {
281 	return copy_to_user_errcode(&user_arg->uuid, &c->sb.user_uuid,
282 				    sizeof(c->sb.user_uuid));
283 }
284 
285 #if 0
286 static long bch2_ioctl_start(struct bch_fs *c, struct bch_ioctl_start arg)
287 {
288 	if (!capable(CAP_SYS_ADMIN))
289 		return -EPERM;
290 
291 	if (arg.flags || arg.pad)
292 		return -EINVAL;
293 
294 	return bch2_fs_start(c);
295 }
296 
297 static long bch2_ioctl_stop(struct bch_fs *c)
298 {
299 	if (!capable(CAP_SYS_ADMIN))
300 		return -EPERM;
301 
302 	bch2_fs_stop(c);
303 	return 0;
304 }
305 #endif
306 
307 static long bch2_ioctl_disk_add(struct bch_fs *c, struct bch_ioctl_disk arg)
308 {
309 	char *path;
310 	int ret;
311 
312 	if (!capable(CAP_SYS_ADMIN))
313 		return -EPERM;
314 
315 	if (arg.flags || arg.pad)
316 		return -EINVAL;
317 
318 	path = strndup_user((const char __user *)(unsigned long) arg.dev, PATH_MAX);
319 	ret = PTR_ERR_OR_ZERO(path);
320 	if (ret)
321 		return ret;
322 
323 	ret = bch2_dev_add(c, path);
324 	if (!IS_ERR(path))
325 		kfree(path);
326 
327 	return ret;
328 }
329 
330 static long bch2_ioctl_disk_remove(struct bch_fs *c, struct bch_ioctl_disk arg)
331 {
332 	struct bch_dev *ca;
333 
334 	if (!capable(CAP_SYS_ADMIN))
335 		return -EPERM;
336 
337 	if ((arg.flags & ~(BCH_FORCE_IF_DATA_LOST|
338 			   BCH_FORCE_IF_METADATA_LOST|
339 			   BCH_FORCE_IF_DEGRADED|
340 			   BCH_BY_INDEX)) ||
341 	    arg.pad)
342 		return -EINVAL;
343 
344 	ca = bch2_device_lookup(c, arg.dev, arg.flags);
345 	if (IS_ERR(ca))
346 		return PTR_ERR(ca);
347 
348 	return bch2_dev_remove(c, ca, arg.flags);
349 }
350 
351 static long bch2_ioctl_disk_online(struct bch_fs *c, struct bch_ioctl_disk arg)
352 {
353 	char *path;
354 	int ret;
355 
356 	if (!capable(CAP_SYS_ADMIN))
357 		return -EPERM;
358 
359 	if (arg.flags || arg.pad)
360 		return -EINVAL;
361 
362 	path = strndup_user((const char __user *)(unsigned long) arg.dev, PATH_MAX);
363 	ret = PTR_ERR_OR_ZERO(path);
364 	if (ret)
365 		return ret;
366 
367 	ret = bch2_dev_online(c, path);
368 	kfree(path);
369 	return ret;
370 }
371 
372 static long bch2_ioctl_disk_offline(struct bch_fs *c, struct bch_ioctl_disk arg)
373 {
374 	struct bch_dev *ca;
375 	int ret;
376 
377 	if (!capable(CAP_SYS_ADMIN))
378 		return -EPERM;
379 
380 	if ((arg.flags & ~(BCH_FORCE_IF_DATA_LOST|
381 			   BCH_FORCE_IF_METADATA_LOST|
382 			   BCH_FORCE_IF_DEGRADED|
383 			   BCH_BY_INDEX)) ||
384 	    arg.pad)
385 		return -EINVAL;
386 
387 	ca = bch2_device_lookup(c, arg.dev, arg.flags);
388 	if (IS_ERR(ca))
389 		return PTR_ERR(ca);
390 
391 	ret = bch2_dev_offline(c, ca, arg.flags);
392 	bch2_dev_put(ca);
393 	return ret;
394 }
395 
396 static long bch2_ioctl_disk_set_state(struct bch_fs *c,
397 			struct bch_ioctl_disk_set_state arg)
398 {
399 	struct bch_dev *ca;
400 	int ret;
401 
402 	if (!capable(CAP_SYS_ADMIN))
403 		return -EPERM;
404 
405 	if ((arg.flags & ~(BCH_FORCE_IF_DATA_LOST|
406 			   BCH_FORCE_IF_METADATA_LOST|
407 			   BCH_FORCE_IF_DEGRADED|
408 			   BCH_BY_INDEX)) ||
409 	    arg.pad[0] || arg.pad[1] || arg.pad[2] ||
410 	    arg.new_state >= BCH_MEMBER_STATE_NR)
411 		return -EINVAL;
412 
413 	ca = bch2_device_lookup(c, arg.dev, arg.flags);
414 	if (IS_ERR(ca))
415 		return PTR_ERR(ca);
416 
417 	ret = bch2_dev_set_state(c, ca, arg.new_state, arg.flags);
418 	if (ret)
419 		bch_err(c, "Error setting device state: %s", bch2_err_str(ret));
420 
421 	bch2_dev_put(ca);
422 	return ret;
423 }
424 
425 struct bch_data_ctx {
426 	struct thread_with_file		thr;
427 
428 	struct bch_fs			*c;
429 	struct bch_ioctl_data		arg;
430 	struct bch_move_stats		stats;
431 };
432 
433 static int bch2_data_thread(void *arg)
434 {
435 	struct bch_data_ctx *ctx = container_of(arg, struct bch_data_ctx, thr);
436 
437 	ctx->thr.ret = bch2_data_job(ctx->c, &ctx->stats, ctx->arg);
438 	ctx->stats.data_type = U8_MAX;
439 	return 0;
440 }
441 
442 static int bch2_data_job_release(struct inode *inode, struct file *file)
443 {
444 	struct bch_data_ctx *ctx = container_of(file->private_data, struct bch_data_ctx, thr);
445 
446 	bch2_thread_with_file_exit(&ctx->thr);
447 	kfree(ctx);
448 	return 0;
449 }
450 
451 static ssize_t bch2_data_job_read(struct file *file, char __user *buf,
452 				  size_t len, loff_t *ppos)
453 {
454 	struct bch_data_ctx *ctx = container_of(file->private_data, struct bch_data_ctx, thr);
455 	struct bch_fs *c = ctx->c;
456 	struct bch_ioctl_data_event e = {
457 		.type			= BCH_DATA_EVENT_PROGRESS,
458 		.p.data_type		= ctx->stats.data_type,
459 		.p.btree_id		= ctx->stats.pos.btree,
460 		.p.pos			= ctx->stats.pos.pos,
461 		.p.sectors_done		= atomic64_read(&ctx->stats.sectors_seen),
462 		.p.sectors_total	= bch2_fs_usage_read_short(c).used,
463 	};
464 
465 	if (len < sizeof(e))
466 		return -EINVAL;
467 
468 	return copy_to_user_errcode(buf, &e, sizeof(e)) ?: sizeof(e);
469 }
470 
471 static const struct file_operations bcachefs_data_ops = {
472 	.release	= bch2_data_job_release,
473 	.read		= bch2_data_job_read,
474 	.llseek		= no_llseek,
475 };
476 
477 static long bch2_ioctl_data(struct bch_fs *c,
478 			    struct bch_ioctl_data arg)
479 {
480 	struct bch_data_ctx *ctx;
481 	int ret;
482 
483 	if (!capable(CAP_SYS_ADMIN))
484 		return -EPERM;
485 
486 	if (arg.op >= BCH_DATA_OP_NR || arg.flags)
487 		return -EINVAL;
488 
489 	ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
490 	if (!ctx)
491 		return -ENOMEM;
492 
493 	ctx->c = c;
494 	ctx->arg = arg;
495 
496 	ret = bch2_run_thread_with_file(&ctx->thr,
497 			&bcachefs_data_ops,
498 			bch2_data_thread);
499 	if (ret < 0)
500 		kfree(ctx);
501 	return ret;
502 }
503 
504 static long bch2_ioctl_fs_usage(struct bch_fs *c,
505 				struct bch_ioctl_fs_usage __user *user_arg)
506 {
507 	struct bch_ioctl_fs_usage arg = {};
508 	darray_char replicas = {};
509 	u32 replica_entries_bytes;
510 	int ret = 0;
511 
512 	if (!test_bit(BCH_FS_started, &c->flags))
513 		return -EINVAL;
514 
515 	if (get_user(replica_entries_bytes, &user_arg->replica_entries_bytes))
516 		return -EFAULT;
517 
518 	ret   = bch2_fs_replicas_usage_read(c, &replicas) ?:
519 		(replica_entries_bytes < replicas.nr ? -ERANGE : 0) ?:
520 		copy_to_user_errcode(&user_arg->replicas, replicas.data, replicas.nr);
521 	if (ret)
522 		goto err;
523 
524 	struct bch_fs_usage_short u = bch2_fs_usage_read_short(c);
525 	arg.capacity		= c->capacity;
526 	arg.used		= u.used;
527 	arg.online_reserved	= percpu_u64_get(c->online_reserved);
528 	arg.replica_entries_bytes = replicas.nr;
529 
530 	for (unsigned i = 0; i < BCH_REPLICAS_MAX; i++) {
531 		struct disk_accounting_pos k = {
532 			.type = BCH_DISK_ACCOUNTING_persistent_reserved,
533 			.persistent_reserved.nr_replicas = i,
534 		};
535 
536 		bch2_accounting_mem_read(c,
537 					 disk_accounting_pos_to_bpos(&k),
538 					 &arg.persistent_reserved[i], 1);
539 	}
540 
541 	ret = copy_to_user_errcode(user_arg, &arg, sizeof(arg));
542 err:
543 	darray_exit(&replicas);
544 	return ret;
545 }
546 
547 static long bch2_ioctl_query_accounting(struct bch_fs *c,
548 			struct bch_ioctl_query_accounting __user *user_arg)
549 {
550 	struct bch_ioctl_query_accounting arg;
551 	darray_char accounting = {};
552 	int ret = 0;
553 
554 	if (!test_bit(BCH_FS_started, &c->flags))
555 		return -EINVAL;
556 
557 	ret   = copy_from_user_errcode(&arg, user_arg, sizeof(arg)) ?:
558 		bch2_fs_accounting_read(c, &accounting, arg.accounting_types_mask) ?:
559 		(arg.accounting_u64s * sizeof(u64) < accounting.nr ? -ERANGE : 0) ?:
560 		copy_to_user_errcode(&user_arg->accounting, accounting.data, accounting.nr);
561 	if (ret)
562 		goto err;
563 
564 	arg.capacity		= c->capacity;
565 	arg.used		= bch2_fs_usage_read_short(c).used;
566 	arg.online_reserved	= percpu_u64_get(c->online_reserved);
567 	arg.accounting_u64s	= accounting.nr / sizeof(u64);
568 
569 	ret = copy_to_user_errcode(user_arg, &arg, sizeof(arg));
570 err:
571 	darray_exit(&accounting);
572 	return ret;
573 }
574 
575 /* obsolete, didn't allow for new data types: */
576 static long bch2_ioctl_dev_usage(struct bch_fs *c,
577 				 struct bch_ioctl_dev_usage __user *user_arg)
578 {
579 	struct bch_ioctl_dev_usage arg;
580 	struct bch_dev_usage src;
581 	struct bch_dev *ca;
582 	unsigned i;
583 
584 	if (!test_bit(BCH_FS_started, &c->flags))
585 		return -EINVAL;
586 
587 	if (copy_from_user(&arg, user_arg, sizeof(arg)))
588 		return -EFAULT;
589 
590 	if ((arg.flags & ~BCH_BY_INDEX) ||
591 	    arg.pad[0] ||
592 	    arg.pad[1] ||
593 	    arg.pad[2])
594 		return -EINVAL;
595 
596 	ca = bch2_device_lookup(c, arg.dev, arg.flags);
597 	if (IS_ERR(ca))
598 		return PTR_ERR(ca);
599 
600 	src = bch2_dev_usage_read(ca);
601 
602 	arg.state		= ca->mi.state;
603 	arg.bucket_size		= ca->mi.bucket_size;
604 	arg.nr_buckets		= ca->mi.nbuckets - ca->mi.first_bucket;
605 
606 	for (i = 0; i < ARRAY_SIZE(arg.d); i++) {
607 		arg.d[i].buckets	= src.d[i].buckets;
608 		arg.d[i].sectors	= src.d[i].sectors;
609 		arg.d[i].fragmented	= src.d[i].fragmented;
610 	}
611 
612 	bch2_dev_put(ca);
613 
614 	return copy_to_user_errcode(user_arg, &arg, sizeof(arg));
615 }
616 
617 static long bch2_ioctl_dev_usage_v2(struct bch_fs *c,
618 				 struct bch_ioctl_dev_usage_v2 __user *user_arg)
619 {
620 	struct bch_ioctl_dev_usage_v2 arg;
621 	struct bch_dev_usage src;
622 	struct bch_dev *ca;
623 	int ret = 0;
624 
625 	if (!test_bit(BCH_FS_started, &c->flags))
626 		return -EINVAL;
627 
628 	if (copy_from_user(&arg, user_arg, sizeof(arg)))
629 		return -EFAULT;
630 
631 	if ((arg.flags & ~BCH_BY_INDEX) ||
632 	    arg.pad[0] ||
633 	    arg.pad[1] ||
634 	    arg.pad[2])
635 		return -EINVAL;
636 
637 	ca = bch2_device_lookup(c, arg.dev, arg.flags);
638 	if (IS_ERR(ca))
639 		return PTR_ERR(ca);
640 
641 	src = bch2_dev_usage_read(ca);
642 
643 	arg.state		= ca->mi.state;
644 	arg.bucket_size		= ca->mi.bucket_size;
645 	arg.nr_data_types	= min(arg.nr_data_types, BCH_DATA_NR);
646 	arg.nr_buckets		= ca->mi.nbuckets - ca->mi.first_bucket;
647 
648 	ret = copy_to_user_errcode(user_arg, &arg, sizeof(arg));
649 	if (ret)
650 		goto err;
651 
652 	for (unsigned i = 0; i < arg.nr_data_types; i++) {
653 		struct bch_ioctl_dev_usage_type t = {
654 			.buckets	= src.d[i].buckets,
655 			.sectors	= src.d[i].sectors,
656 			.fragmented	= src.d[i].fragmented,
657 		};
658 
659 		ret = copy_to_user_errcode(&user_arg->d[i], &t, sizeof(t));
660 		if (ret)
661 			goto err;
662 	}
663 err:
664 	bch2_dev_put(ca);
665 	return ret;
666 }
667 
668 static long bch2_ioctl_read_super(struct bch_fs *c,
669 				  struct bch_ioctl_read_super arg)
670 {
671 	struct bch_dev *ca = NULL;
672 	struct bch_sb *sb;
673 	int ret = 0;
674 
675 	if (!capable(CAP_SYS_ADMIN))
676 		return -EPERM;
677 
678 	if ((arg.flags & ~(BCH_BY_INDEX|BCH_READ_DEV)) ||
679 	    arg.pad)
680 		return -EINVAL;
681 
682 	mutex_lock(&c->sb_lock);
683 
684 	if (arg.flags & BCH_READ_DEV) {
685 		ca = bch2_device_lookup(c, arg.dev, arg.flags);
686 		ret = PTR_ERR_OR_ZERO(ca);
687 		if (ret)
688 			goto err_unlock;
689 
690 		sb = ca->disk_sb.sb;
691 	} else {
692 		sb = c->disk_sb.sb;
693 	}
694 
695 	if (vstruct_bytes(sb) > arg.size) {
696 		ret = -ERANGE;
697 		goto err;
698 	}
699 
700 	ret = copy_to_user_errcode((void __user *)(unsigned long)arg.sb, sb,
701 				   vstruct_bytes(sb));
702 err:
703 	bch2_dev_put(ca);
704 err_unlock:
705 	mutex_unlock(&c->sb_lock);
706 	return ret;
707 }
708 
709 static long bch2_ioctl_disk_get_idx(struct bch_fs *c,
710 				    struct bch_ioctl_disk_get_idx arg)
711 {
712 	dev_t dev = huge_decode_dev(arg.dev);
713 
714 	if (!capable(CAP_SYS_ADMIN))
715 		return -EPERM;
716 
717 	if (!dev)
718 		return -EINVAL;
719 
720 	for_each_online_member(c, ca)
721 		if (ca->dev == dev) {
722 			percpu_ref_put(&ca->io_ref);
723 			return ca->dev_idx;
724 		}
725 
726 	return -BCH_ERR_ENOENT_dev_idx_not_found;
727 }
728 
729 static long bch2_ioctl_disk_resize(struct bch_fs *c,
730 				   struct bch_ioctl_disk_resize arg)
731 {
732 	struct bch_dev *ca;
733 	int ret;
734 
735 	if (!capable(CAP_SYS_ADMIN))
736 		return -EPERM;
737 
738 	if ((arg.flags & ~BCH_BY_INDEX) ||
739 	    arg.pad)
740 		return -EINVAL;
741 
742 	ca = bch2_device_lookup(c, arg.dev, arg.flags);
743 	if (IS_ERR(ca))
744 		return PTR_ERR(ca);
745 
746 	ret = bch2_dev_resize(c, ca, arg.nbuckets);
747 
748 	bch2_dev_put(ca);
749 	return ret;
750 }
751 
752 static long bch2_ioctl_disk_resize_journal(struct bch_fs *c,
753 				   struct bch_ioctl_disk_resize_journal arg)
754 {
755 	struct bch_dev *ca;
756 	int ret;
757 
758 	if (!capable(CAP_SYS_ADMIN))
759 		return -EPERM;
760 
761 	if ((arg.flags & ~BCH_BY_INDEX) ||
762 	    arg.pad)
763 		return -EINVAL;
764 
765 	if (arg.nbuckets > U32_MAX)
766 		return -EINVAL;
767 
768 	ca = bch2_device_lookup(c, arg.dev, arg.flags);
769 	if (IS_ERR(ca))
770 		return PTR_ERR(ca);
771 
772 	ret = bch2_set_nr_journal_buckets(c, ca, arg.nbuckets);
773 
774 	bch2_dev_put(ca);
775 	return ret;
776 }
777 
778 static int bch2_fsck_online_thread_fn(struct thread_with_stdio *stdio)
779 {
780 	struct fsck_thread *thr = container_of(stdio, struct fsck_thread, thr);
781 	struct bch_fs *c = thr->c;
782 
783 	c->stdio_filter = current;
784 	c->stdio = &thr->thr.stdio;
785 
786 	/*
787 	 * XXX: can we figure out a way to do this without mucking with c->opts?
788 	 */
789 	unsigned old_fix_errors = c->opts.fix_errors;
790 	if (opt_defined(thr->opts, fix_errors))
791 		c->opts.fix_errors = thr->opts.fix_errors;
792 	else
793 		c->opts.fix_errors = FSCK_FIX_ask;
794 
795 	c->opts.fsck = true;
796 	set_bit(BCH_FS_fsck_running, &c->flags);
797 
798 	c->curr_recovery_pass = BCH_RECOVERY_PASS_check_alloc_info;
799 	int ret = bch2_run_online_recovery_passes(c);
800 
801 	clear_bit(BCH_FS_fsck_running, &c->flags);
802 	bch_err_fn(c, ret);
803 
804 	c->stdio = NULL;
805 	c->stdio_filter = NULL;
806 	c->opts.fix_errors = old_fix_errors;
807 
808 	up(&c->online_fsck_mutex);
809 	bch2_ro_ref_put(c);
810 	return ret;
811 }
812 
813 static const struct thread_with_stdio_ops bch2_online_fsck_ops = {
814 	.exit		= bch2_fsck_thread_exit,
815 	.fn		= bch2_fsck_online_thread_fn,
816 };
817 
818 static long bch2_ioctl_fsck_online(struct bch_fs *c,
819 				   struct bch_ioctl_fsck_online arg)
820 {
821 	struct fsck_thread *thr = NULL;
822 	long ret = 0;
823 
824 	if (arg.flags)
825 		return -EINVAL;
826 
827 	if (!capable(CAP_SYS_ADMIN))
828 		return -EPERM;
829 
830 	if (!bch2_ro_ref_tryget(c))
831 		return -EROFS;
832 
833 	if (down_trylock(&c->online_fsck_mutex)) {
834 		bch2_ro_ref_put(c);
835 		return -EAGAIN;
836 	}
837 
838 	thr = kzalloc(sizeof(*thr), GFP_KERNEL);
839 	if (!thr) {
840 		ret = -ENOMEM;
841 		goto err;
842 	}
843 
844 	thr->c = c;
845 	thr->opts = bch2_opts_empty();
846 
847 	if (arg.opts) {
848 		char *optstr = strndup_user((char __user *)(unsigned long) arg.opts, 1 << 16);
849 
850 		ret =   PTR_ERR_OR_ZERO(optstr) ?:
851 			bch2_parse_mount_opts(c, &thr->opts, NULL, optstr);
852 		if (!IS_ERR(optstr))
853 			kfree(optstr);
854 
855 		if (ret)
856 			goto err;
857 	}
858 
859 	ret = bch2_run_thread_with_stdio(&thr->thr, &bch2_online_fsck_ops);
860 err:
861 	if (ret < 0) {
862 		bch_err_fn(c, ret);
863 		if (thr)
864 			bch2_fsck_thread_exit(&thr->thr);
865 		up(&c->online_fsck_mutex);
866 		bch2_ro_ref_put(c);
867 	}
868 	return ret;
869 }
870 
871 #define BCH_IOCTL(_name, _argtype)					\
872 do {									\
873 	_argtype i;							\
874 									\
875 	if (copy_from_user(&i, arg, sizeof(i)))				\
876 		return -EFAULT;						\
877 	ret = bch2_ioctl_##_name(c, i);					\
878 	goto out;							\
879 } while (0)
880 
881 long bch2_fs_ioctl(struct bch_fs *c, unsigned cmd, void __user *arg)
882 {
883 	long ret;
884 
885 	switch (cmd) {
886 	case BCH_IOCTL_QUERY_UUID:
887 		return bch2_ioctl_query_uuid(c, arg);
888 	case BCH_IOCTL_FS_USAGE:
889 		return bch2_ioctl_fs_usage(c, arg);
890 	case BCH_IOCTL_DEV_USAGE:
891 		return bch2_ioctl_dev_usage(c, arg);
892 	case BCH_IOCTL_DEV_USAGE_V2:
893 		return bch2_ioctl_dev_usage_v2(c, arg);
894 #if 0
895 	case BCH_IOCTL_START:
896 		BCH_IOCTL(start, struct bch_ioctl_start);
897 	case BCH_IOCTL_STOP:
898 		return bch2_ioctl_stop(c);
899 #endif
900 	case BCH_IOCTL_READ_SUPER:
901 		BCH_IOCTL(read_super, struct bch_ioctl_read_super);
902 	case BCH_IOCTL_DISK_GET_IDX:
903 		BCH_IOCTL(disk_get_idx, struct bch_ioctl_disk_get_idx);
904 	}
905 
906 	if (!test_bit(BCH_FS_started, &c->flags))
907 		return -EINVAL;
908 
909 	switch (cmd) {
910 	case BCH_IOCTL_DISK_ADD:
911 		BCH_IOCTL(disk_add, struct bch_ioctl_disk);
912 	case BCH_IOCTL_DISK_REMOVE:
913 		BCH_IOCTL(disk_remove, struct bch_ioctl_disk);
914 	case BCH_IOCTL_DISK_ONLINE:
915 		BCH_IOCTL(disk_online, struct bch_ioctl_disk);
916 	case BCH_IOCTL_DISK_OFFLINE:
917 		BCH_IOCTL(disk_offline, struct bch_ioctl_disk);
918 	case BCH_IOCTL_DISK_SET_STATE:
919 		BCH_IOCTL(disk_set_state, struct bch_ioctl_disk_set_state);
920 	case BCH_IOCTL_DATA:
921 		BCH_IOCTL(data, struct bch_ioctl_data);
922 	case BCH_IOCTL_DISK_RESIZE:
923 		BCH_IOCTL(disk_resize, struct bch_ioctl_disk_resize);
924 	case BCH_IOCTL_DISK_RESIZE_JOURNAL:
925 		BCH_IOCTL(disk_resize_journal, struct bch_ioctl_disk_resize_journal);
926 	case BCH_IOCTL_FSCK_ONLINE:
927 		BCH_IOCTL(fsck_online, struct bch_ioctl_fsck_online);
928 	case BCH_IOCTL_QUERY_ACCOUNTING:
929 		return bch2_ioctl_query_accounting(c, arg);
930 	default:
931 		return -ENOTTY;
932 	}
933 out:
934 	if (ret < 0)
935 		ret = bch2_err_class(ret);
936 	return ret;
937 }
938 
939 static DEFINE_IDR(bch_chardev_minor);
940 
941 static long bch2_chardev_ioctl(struct file *filp, unsigned cmd, unsigned long v)
942 {
943 	unsigned minor = iminor(file_inode(filp));
944 	struct bch_fs *c = minor < U8_MAX ? idr_find(&bch_chardev_minor, minor) : NULL;
945 	void __user *arg = (void __user *) v;
946 
947 	return c
948 		? bch2_fs_ioctl(c, cmd, arg)
949 		: bch2_global_ioctl(cmd, arg);
950 }
951 
952 static const struct file_operations bch_chardev_fops = {
953 	.owner		= THIS_MODULE,
954 	.unlocked_ioctl = bch2_chardev_ioctl,
955 	.open		= nonseekable_open,
956 };
957 
958 static int bch_chardev_major;
959 static const struct class bch_chardev_class = {
960 	.name = "bcachefs",
961 };
962 static struct device *bch_chardev;
963 
964 void bch2_fs_chardev_exit(struct bch_fs *c)
965 {
966 	if (!IS_ERR_OR_NULL(c->chardev))
967 		device_unregister(c->chardev);
968 	if (c->minor >= 0)
969 		idr_remove(&bch_chardev_minor, c->minor);
970 }
971 
972 int bch2_fs_chardev_init(struct bch_fs *c)
973 {
974 	c->minor = idr_alloc(&bch_chardev_minor, c, 0, 0, GFP_KERNEL);
975 	if (c->minor < 0)
976 		return c->minor;
977 
978 	c->chardev = device_create(&bch_chardev_class, NULL,
979 				   MKDEV(bch_chardev_major, c->minor), c,
980 				   "bcachefs%u-ctl", c->minor);
981 	if (IS_ERR(c->chardev))
982 		return PTR_ERR(c->chardev);
983 
984 	return 0;
985 }
986 
987 void bch2_chardev_exit(void)
988 {
989 	device_destroy(&bch_chardev_class, MKDEV(bch_chardev_major, U8_MAX));
990 	class_unregister(&bch_chardev_class);
991 	if (bch_chardev_major > 0)
992 		unregister_chrdev(bch_chardev_major, "bcachefs");
993 }
994 
995 int __init bch2_chardev_init(void)
996 {
997 	int ret;
998 
999 	bch_chardev_major = register_chrdev(0, "bcachefs-ctl", &bch_chardev_fops);
1000 	if (bch_chardev_major < 0)
1001 		return bch_chardev_major;
1002 
1003 	ret = class_register(&bch_chardev_class);
1004 	if (ret)
1005 		goto major_out;
1006 
1007 	bch_chardev = device_create(&bch_chardev_class, NULL,
1008 				    MKDEV(bch_chardev_major, U8_MAX),
1009 				    NULL, "bcachefs-ctl");
1010 	if (IS_ERR(bch_chardev)) {
1011 		ret = PTR_ERR(bch_chardev);
1012 		goto class_out;
1013 	}
1014 
1015 	return 0;
1016 
1017 class_out:
1018 	class_unregister(&bch_chardev_class);
1019 major_out:
1020 	unregister_chrdev(bch_chardev_major, "bcachefs-ctl");
1021 	return ret;
1022 }
1023 
1024 #endif /* NO_BCACHEFS_CHARDEV */
1025