Commit | Line | Data |
---|---|---|
3bd94003 | 1 | // SPDX-License-Identifier: GPL-2.0-only |
1da177e4 LT |
2 | /* |
3 | * Copyright (C) 2001, 2002 Sistina Software (UK) Limited. | |
2b06cfff | 4 | * Copyright (C) 2004 - 2006 Red Hat, Inc. All rights reserved. |
1da177e4 LT |
5 | * |
6 | * This file is released under the GPL. | |
7 | */ | |
8 | ||
4cc96131 | 9 | #include "dm-core.h" |
91ccbbac | 10 | #include "dm-ima.h" |
1da177e4 LT |
11 | #include <linux/module.h> |
12 | #include <linux/vmalloc.h> | |
13 | #include <linux/miscdevice.h> | |
5b3cc15a | 14 | #include <linux/sched/mm.h> |
1da177e4 LT |
15 | #include <linux/init.h> |
16 | #include <linux/wait.h> | |
17 | #include <linux/slab.h> | |
b82096af | 18 | #include <linux/rbtree.h> |
1da177e4 | 19 | #include <linux/dm-ioctl.h> |
3ac51e74 | 20 | #include <linux/hdreg.h> |
76c072b4 | 21 | #include <linux/compat.h> |
cd9c88da | 22 | #include <linux/nospec.h> |
1da177e4 | 23 | |
7c0f6ba6 | 24 | #include <linux/uaccess.h> |
91ccbbac | 25 | #include <linux/ima.h> |
1da177e4 | 26 | |
72d94861 | 27 | #define DM_MSG_PREFIX "ioctl" |
86ab1b84 | 28 | #define DM_DRIVER_EMAIL "dm-devel@lists.linux.dev" |
1da177e4 | 29 | |
93e6442c MP |
30 | struct dm_file { |
31 | /* | |
32 | * poll will wait until the global event number is greater than | |
33 | * this value. | |
34 | */ | |
86a3238c | 35 | volatile unsigned int global_event_nr; |
93e6442c MP |
36 | }; |
37 | ||
a4a82ce3 HM |
38 | /* |
39 | *--------------------------------------------------------------- | |
1da177e4 LT |
40 | * The ioctl interface needs to be able to look up devices by |
41 | * name or uuid. | |
a4a82ce3 HM |
42 | *--------------------------------------------------------------- |
43 | */ | |
1da177e4 | 44 | struct hash_cell { |
b82096af MP |
45 | struct rb_node name_node; |
46 | struct rb_node uuid_node; | |
47 | bool name_set; | |
48 | bool uuid_set; | |
1da177e4 LT |
49 | |
50 | char *name; | |
51 | char *uuid; | |
52 | struct mapped_device *md; | |
53 | struct dm_table *new_map; | |
54 | }; | |
55 | ||
56 | struct vers_iter { | |
8ca817c4 HM |
57 | size_t param_size; |
58 | struct dm_target_versions *vers, *old_vers; | |
59 | char *end; | |
60 | uint32_t flags; | |
1da177e4 LT |
61 | }; |
62 | ||
63 | ||
b82096af MP |
64 | static struct rb_root name_rb_tree = RB_ROOT; |
65 | static struct rb_root uuid_rb_tree = RB_ROOT; | |
1da177e4 | 66 | |
2c140a24 | 67 | static void dm_hash_remove_all(bool keep_open_devices, bool mark_deferred, bool only_deferred); |
1da177e4 LT |
68 | |
69 | /* | |
70 | * Guards access to both hash tables. | |
71 | */ | |
72 | static DECLARE_RWSEM(_hash_lock); | |
73 | ||
6076905b MP |
74 | /* |
75 | * Protects use of mdptr to obtain hash cell name and uuid from mapped device. | |
76 | */ | |
77 | static DEFINE_MUTEX(dm_hash_cells_mutex); | |
78 | ||
1da177e4 LT |
79 | static void dm_hash_exit(void) |
80 | { | |
2c140a24 | 81 | dm_hash_remove_all(false, false, false); |
1da177e4 LT |
82 | } |
83 | ||
a4a82ce3 HM |
84 | /* |
85 | *--------------------------------------------------------------- | |
1da177e4 | 86 | * Code for looking up a device by name |
a4a82ce3 HM |
87 | *--------------------------------------------------------------- |
88 | */ | |
1da177e4 LT |
89 | static struct hash_cell *__get_name_cell(const char *str) |
90 | { | |
b82096af | 91 | struct rb_node *n = name_rb_tree.rb_node; |
1da177e4 | 92 | |
b82096af MP |
93 | while (n) { |
94 | struct hash_cell *hc = container_of(n, struct hash_cell, name_node); | |
0ef0b471 HM |
95 | int c; |
96 | ||
97 | c = strcmp(hc->name, str); | |
b82096af | 98 | if (!c) { |
7ec75f25 | 99 | dm_get(hc->md); |
1da177e4 | 100 | return hc; |
7ec75f25 | 101 | } |
b82096af MP |
102 | n = c >= 0 ? n->rb_left : n->rb_right; |
103 | } | |
1da177e4 LT |
104 | |
105 | return NULL; | |
106 | } | |
107 | ||
108 | static struct hash_cell *__get_uuid_cell(const char *str) | |
109 | { | |
b82096af | 110 | struct rb_node *n = uuid_rb_tree.rb_node; |
1da177e4 | 111 | |
b82096af MP |
112 | while (n) { |
113 | struct hash_cell *hc = container_of(n, struct hash_cell, uuid_node); | |
0ef0b471 HM |
114 | int c; |
115 | ||
116 | c = strcmp(hc->uuid, str); | |
b82096af | 117 | if (!c) { |
7ec75f25 | 118 | dm_get(hc->md); |
1da177e4 | 119 | return hc; |
7ec75f25 | 120 | } |
b82096af MP |
121 | n = c >= 0 ? n->rb_left : n->rb_right; |
122 | } | |
1da177e4 LT |
123 | |
124 | return NULL; | |
125 | } | |
126 | ||
b82096af MP |
127 | static void __unlink_name(struct hash_cell *hc) |
128 | { | |
129 | if (hc->name_set) { | |
130 | hc->name_set = false; | |
131 | rb_erase(&hc->name_node, &name_rb_tree); | |
132 | } | |
133 | } | |
134 | ||
135 | static void __unlink_uuid(struct hash_cell *hc) | |
136 | { | |
137 | if (hc->uuid_set) { | |
138 | hc->uuid_set = false; | |
139 | rb_erase(&hc->uuid_node, &uuid_rb_tree); | |
140 | } | |
141 | } | |
142 | ||
143 | static void __link_name(struct hash_cell *new_hc) | |
144 | { | |
145 | struct rb_node **n, *parent; | |
146 | ||
147 | __unlink_name(new_hc); | |
148 | ||
149 | new_hc->name_set = true; | |
150 | ||
151 | n = &name_rb_tree.rb_node; | |
152 | parent = NULL; | |
153 | ||
154 | while (*n) { | |
155 | struct hash_cell *hc = container_of(*n, struct hash_cell, name_node); | |
0ef0b471 HM |
156 | int c; |
157 | ||
158 | c = strcmp(hc->name, new_hc->name); | |
b82096af MP |
159 | BUG_ON(!c); |
160 | parent = *n; | |
161 | n = c >= 0 ? &hc->name_node.rb_left : &hc->name_node.rb_right; | |
162 | } | |
163 | ||
164 | rb_link_node(&new_hc->name_node, parent, n); | |
165 | rb_insert_color(&new_hc->name_node, &name_rb_tree); | |
166 | } | |
167 | ||
168 | static void __link_uuid(struct hash_cell *new_hc) | |
169 | { | |
170 | struct rb_node **n, *parent; | |
171 | ||
172 | __unlink_uuid(new_hc); | |
173 | ||
174 | new_hc->uuid_set = true; | |
175 | ||
176 | n = &uuid_rb_tree.rb_node; | |
177 | parent = NULL; | |
178 | ||
179 | while (*n) { | |
180 | struct hash_cell *hc = container_of(*n, struct hash_cell, uuid_node); | |
0ef0b471 HM |
181 | int c; |
182 | ||
183 | c = strcmp(hc->uuid, new_hc->uuid); | |
b82096af MP |
184 | BUG_ON(!c); |
185 | parent = *n; | |
186 | n = c > 0 ? &hc->uuid_node.rb_left : &hc->uuid_node.rb_right; | |
187 | } | |
188 | ||
189 | rb_link_node(&new_hc->uuid_node, parent, n); | |
190 | rb_insert_color(&new_hc->uuid_node, &uuid_rb_tree); | |
191 | } | |
192 | ||
ba2e19b0 MP |
193 | static struct hash_cell *__get_dev_cell(uint64_t dev) |
194 | { | |
195 | struct mapped_device *md; | |
196 | struct hash_cell *hc; | |
197 | ||
198 | md = dm_get_md(huge_decode_dev(dev)); | |
199 | if (!md) | |
200 | return NULL; | |
201 | ||
202 | hc = dm_get_mdptr(md); | |
203 | if (!hc) { | |
204 | dm_put(md); | |
205 | return NULL; | |
206 | } | |
207 | ||
208 | return hc; | |
209 | } | |
210 | ||
a4a82ce3 HM |
211 | /* |
212 | *--------------------------------------------------------------- | |
1da177e4 | 213 | * Inserting, removing and renaming a device. |
a4a82ce3 HM |
214 | *--------------------------------------------------------------- |
215 | */ | |
1da177e4 LT |
216 | static struct hash_cell *alloc_cell(const char *name, const char *uuid, |
217 | struct mapped_device *md) | |
218 | { | |
219 | struct hash_cell *hc; | |
220 | ||
221 | hc = kmalloc(sizeof(*hc), GFP_KERNEL); | |
222 | if (!hc) | |
223 | return NULL; | |
224 | ||
543537bd | 225 | hc->name = kstrdup(name, GFP_KERNEL); |
1da177e4 LT |
226 | if (!hc->name) { |
227 | kfree(hc); | |
228 | return NULL; | |
229 | } | |
230 | ||
231 | if (!uuid) | |
232 | hc->uuid = NULL; | |
233 | ||
234 | else { | |
543537bd | 235 | hc->uuid = kstrdup(uuid, GFP_KERNEL); |
1da177e4 LT |
236 | if (!hc->uuid) { |
237 | kfree(hc->name); | |
238 | kfree(hc); | |
239 | return NULL; | |
240 | } | |
241 | } | |
242 | ||
b82096af | 243 | hc->name_set = hc->uuid_set = false; |
1da177e4 LT |
244 | hc->md = md; |
245 | hc->new_map = NULL; | |
246 | return hc; | |
247 | } | |
248 | ||
249 | static void free_cell(struct hash_cell *hc) | |
250 | { | |
251 | if (hc) { | |
252 | kfree(hc->name); | |
253 | kfree(hc->uuid); | |
254 | kfree(hc); | |
255 | } | |
256 | } | |
257 | ||
1da177e4 LT |
258 | /* |
259 | * The kdev_t and uuid of a device can never change once it is | |
260 | * initially inserted. | |
261 | */ | |
262 | static int dm_hash_insert(const char *name, const char *uuid, struct mapped_device *md) | |
263 | { | |
7ec75f25 | 264 | struct hash_cell *cell, *hc; |
1da177e4 LT |
265 | |
266 | /* | |
267 | * Allocate the new cells. | |
268 | */ | |
269 | cell = alloc_cell(name, uuid, md); | |
270 | if (!cell) | |
271 | return -ENOMEM; | |
272 | ||
273 | /* | |
274 | * Insert the cell into both hash tables. | |
275 | */ | |
276 | down_write(&_hash_lock); | |
7ec75f25 JM |
277 | hc = __get_name_cell(name); |
278 | if (hc) { | |
279 | dm_put(hc->md); | |
1da177e4 | 280 | goto bad; |
7ec75f25 | 281 | } |
1da177e4 | 282 | |
b82096af | 283 | __link_name(cell); |
1da177e4 LT |
284 | |
285 | if (uuid) { | |
7ec75f25 JM |
286 | hc = __get_uuid_cell(uuid); |
287 | if (hc) { | |
b82096af | 288 | __unlink_name(cell); |
7ec75f25 | 289 | dm_put(hc->md); |
1da177e4 LT |
290 | goto bad; |
291 | } | |
b82096af | 292 | __link_uuid(cell); |
1da177e4 | 293 | } |
1da177e4 | 294 | dm_get(md); |
6076905b | 295 | mutex_lock(&dm_hash_cells_mutex); |
1da177e4 | 296 | dm_set_mdptr(md, cell); |
6076905b | 297 | mutex_unlock(&dm_hash_cells_mutex); |
1da177e4 LT |
298 | up_write(&_hash_lock); |
299 | ||
300 | return 0; | |
301 | ||
302 | bad: | |
303 | up_write(&_hash_lock); | |
304 | free_cell(cell); | |
305 | return -EBUSY; | |
306 | } | |
307 | ||
83d5e5b0 | 308 | static struct dm_table *__hash_remove(struct hash_cell *hc) |
1da177e4 | 309 | { |
269fd2a6 | 310 | struct dm_table *table; |
83d5e5b0 | 311 | int srcu_idx; |
269fd2a6 | 312 | |
69868beb MS |
313 | lockdep_assert_held(&_hash_lock); |
314 | ||
b82096af MP |
315 | /* remove from the dev trees */ |
316 | __unlink_name(hc); | |
317 | __unlink_uuid(hc); | |
6076905b | 318 | mutex_lock(&dm_hash_cells_mutex); |
1da177e4 | 319 | dm_set_mdptr(hc->md, NULL); |
6076905b | 320 | mutex_unlock(&dm_hash_cells_mutex); |
269fd2a6 | 321 | |
83d5e5b0 MP |
322 | table = dm_get_live_table(hc->md, &srcu_idx); |
323 | if (table) | |
269fd2a6 | 324 | dm_table_event(table); |
83d5e5b0 | 325 | dm_put_live_table(hc->md, srcu_idx); |
269fd2a6 | 326 | |
83d5e5b0 | 327 | table = NULL; |
1da177e4 | 328 | if (hc->new_map) |
83d5e5b0 | 329 | table = hc->new_map; |
1134e5ae | 330 | dm_put(hc->md); |
1da177e4 | 331 | free_cell(hc); |
83d5e5b0 MP |
332 | |
333 | return table; | |
1da177e4 LT |
334 | } |
335 | ||
2c140a24 | 336 | static void dm_hash_remove_all(bool keep_open_devices, bool mark_deferred, bool only_deferred) |
1da177e4 | 337 | { |
b82096af MP |
338 | int dev_skipped; |
339 | struct rb_node *n; | |
1da177e4 | 340 | struct hash_cell *hc; |
98f33285 | 341 | struct mapped_device *md; |
83d5e5b0 | 342 | struct dm_table *t; |
98f33285 KU |
343 | |
344 | retry: | |
345 | dev_skipped = 0; | |
1da177e4 LT |
346 | |
347 | down_write(&_hash_lock); | |
5c6bd75d | 348 | |
b82096af MP |
349 | for (n = rb_first(&name_rb_tree); n; n = rb_next(n)) { |
350 | hc = container_of(n, struct hash_cell, name_node); | |
351 | md = hc->md; | |
352 | dm_get(md); | |
5c6bd75d | 353 | |
b82096af MP |
354 | if (keep_open_devices && |
355 | dm_lock_for_deletion(md, mark_deferred, only_deferred)) { | |
356 | dm_put(md); | |
357 | dev_skipped++; | |
358 | continue; | |
359 | } | |
98f33285 | 360 | |
b82096af | 361 | t = __hash_remove(hc); |
5c6bd75d | 362 | |
b82096af | 363 | up_write(&_hash_lock); |
5c6bd75d | 364 | |
b82096af MP |
365 | if (t) { |
366 | dm_sync_table(md); | |
367 | dm_table_destroy(t); | |
98f33285 | 368 | } |
84010e51 | 369 | dm_ima_measure_on_device_remove(md, true); |
b82096af MP |
370 | dm_put(md); |
371 | if (likely(keep_open_devices)) | |
372 | dm_destroy(md); | |
373 | else | |
374 | dm_destroy_immediate(md); | |
375 | ||
376 | /* | |
377 | * Some mapped devices may be using other mapped | |
378 | * devices, so repeat until we make no further | |
379 | * progress. If a new mapped device is created | |
380 | * here it will also get removed. | |
381 | */ | |
382 | goto retry; | |
5c6bd75d AK |
383 | } |
384 | ||
1da177e4 | 385 | up_write(&_hash_lock); |
98f33285 KU |
386 | |
387 | if (dev_skipped) | |
388 | DMWARN("remove_all left %d open device(s)", dev_skipped); | |
1da177e4 LT |
389 | } |
390 | ||
84c89557 PJ |
391 | /* |
392 | * Set the uuid of a hash_cell that isn't already set. | |
393 | */ | |
394 | static void __set_cell_uuid(struct hash_cell *hc, char *new_uuid) | |
395 | { | |
396 | mutex_lock(&dm_hash_cells_mutex); | |
397 | hc->uuid = new_uuid; | |
398 | mutex_unlock(&dm_hash_cells_mutex); | |
399 | ||
b82096af | 400 | __link_uuid(hc); |
84c89557 PJ |
401 | } |
402 | ||
403 | /* | |
404 | * Changes the name of a hash_cell and returns the old name for | |
405 | * the caller to free. | |
406 | */ | |
407 | static char *__change_cell_name(struct hash_cell *hc, char *new_name) | |
408 | { | |
409 | char *old_name; | |
410 | ||
411 | /* | |
412 | * Rename and move the name cell. | |
413 | */ | |
b82096af | 414 | __unlink_name(hc); |
84c89557 PJ |
415 | old_name = hc->name; |
416 | ||
417 | mutex_lock(&dm_hash_cells_mutex); | |
418 | hc->name = new_name; | |
419 | mutex_unlock(&dm_hash_cells_mutex); | |
420 | ||
b82096af | 421 | __link_name(hc); |
84c89557 PJ |
422 | |
423 | return old_name; | |
424 | } | |
425 | ||
856a6f1d PR |
426 | static struct mapped_device *dm_hash_rename(struct dm_ioctl *param, |
427 | const char *new) | |
1da177e4 | 428 | { |
84c89557 | 429 | char *new_data, *old_name = NULL; |
1da177e4 | 430 | struct hash_cell *hc; |
81f1777a | 431 | struct dm_table *table; |
856a6f1d | 432 | struct mapped_device *md; |
86a3238c | 433 | unsigned int change_uuid = (param->flags & DM_UUID_FLAG) ? 1 : 0; |
83d5e5b0 | 434 | int srcu_idx; |
1da177e4 LT |
435 | |
436 | /* | |
437 | * duplicate new. | |
438 | */ | |
84c89557 PJ |
439 | new_data = kstrdup(new, GFP_KERNEL); |
440 | if (!new_data) | |
856a6f1d | 441 | return ERR_PTR(-ENOMEM); |
1da177e4 LT |
442 | |
443 | down_write(&_hash_lock); | |
444 | ||
445 | /* | |
446 | * Is new free ? | |
447 | */ | |
84c89557 PJ |
448 | if (change_uuid) |
449 | hc = __get_uuid_cell(new); | |
450 | else | |
451 | hc = __get_name_cell(new); | |
452 | ||
1da177e4 | 453 | if (hc) { |
2e84fecf | 454 | DMERR("Unable to change %s on mapped device %s to one that already exists: %s", |
43e6c111 MP |
455 | change_uuid ? "uuid" : "name", |
456 | param->name, new); | |
7ec75f25 | 457 | dm_put(hc->md); |
1da177e4 | 458 | up_write(&_hash_lock); |
84c89557 | 459 | kfree(new_data); |
856a6f1d | 460 | return ERR_PTR(-EBUSY); |
1da177e4 LT |
461 | } |
462 | ||
463 | /* | |
464 | * Is there such a device as 'old' ? | |
465 | */ | |
856a6f1d | 466 | hc = __get_name_cell(param->name); |
1da177e4 | 467 | if (!hc) { |
43e6c111 MP |
468 | DMERR("Unable to rename non-existent device, %s to %s%s", |
469 | param->name, change_uuid ? "uuid " : "", new); | |
1da177e4 | 470 | up_write(&_hash_lock); |
84c89557 | 471 | kfree(new_data); |
856a6f1d | 472 | return ERR_PTR(-ENXIO); |
1da177e4 LT |
473 | } |
474 | ||
475 | /* | |
84c89557 | 476 | * Does this device already have a uuid? |
1da177e4 | 477 | */ |
84c89557 | 478 | if (change_uuid && hc->uuid) { |
43e6c111 MP |
479 | DMERR("Unable to change uuid of mapped device %s to %s " |
480 | "because uuid is already set to %s", | |
481 | param->name, new, hc->uuid); | |
84c89557 PJ |
482 | dm_put(hc->md); |
483 | up_write(&_hash_lock); | |
484 | kfree(new_data); | |
485 | return ERR_PTR(-EINVAL); | |
486 | } | |
487 | ||
488 | if (change_uuid) | |
489 | __set_cell_uuid(hc, new_data); | |
490 | else | |
491 | old_name = __change_cell_name(hc, new_data); | |
1da177e4 | 492 | |
81f1777a | 493 | /* |
494 | * Wake up any dm event waiters. | |
495 | */ | |
83d5e5b0 MP |
496 | table = dm_get_live_table(hc->md, &srcu_idx); |
497 | if (table) | |
81f1777a | 498 | dm_table_event(table); |
83d5e5b0 | 499 | dm_put_live_table(hc->md, srcu_idx); |
81f1777a | 500 | |
7533afa1 | 501 | if (!dm_kobject_uevent(hc->md, KOBJ_CHANGE, param->event_nr, false)) |
856a6f1d | 502 | param->flags |= DM_UEVENT_GENERATED_FLAG; |
69267a30 | 503 | |
856a6f1d | 504 | md = hc->md; |
7d1d1df8 TS |
505 | |
506 | dm_ima_measure_on_device_rename(md); | |
507 | ||
1da177e4 LT |
508 | up_write(&_hash_lock); |
509 | kfree(old_name); | |
856a6f1d PR |
510 | |
511 | return md; | |
1da177e4 LT |
512 | } |
513 | ||
2c140a24 MP |
514 | void dm_deferred_remove(void) |
515 | { | |
516 | dm_hash_remove_all(true, false, true); | |
517 | } | |
518 | ||
a4a82ce3 HM |
519 | /* |
520 | *--------------------------------------------------------------- | |
1da177e4 | 521 | * Implementation of the ioctl commands |
a4a82ce3 HM |
522 | *--------------------------------------------------------------- |
523 | */ | |
1da177e4 LT |
524 | /* |
525 | * All the ioctl commands get dispatched to functions with this | |
526 | * prototype. | |
527 | */ | |
fc1841e1 | 528 | typedef int (*ioctl_fn)(struct file *filp, struct dm_ioctl *param, size_t param_size); |
1da177e4 | 529 | |
fc1841e1 | 530 | static int remove_all(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 | 531 | { |
2c140a24 | 532 | dm_hash_remove_all(true, !!(param->flags & DM_DEFERRED_REMOVE), false); |
1da177e4 LT |
533 | param->data_size = 0; |
534 | return 0; | |
535 | } | |
536 | ||
537 | /* | |
538 | * Round up the ptr to an 8-byte boundary. | |
539 | */ | |
540 | #define ALIGN_MASK 7 | |
62e08243 MP |
541 | static inline size_t align_val(size_t val) |
542 | { | |
543 | return (val + ALIGN_MASK) & ~ALIGN_MASK; | |
544 | } | |
1da177e4 LT |
545 | static inline void *align_ptr(void *ptr) |
546 | { | |
62e08243 | 547 | return (void *)align_val((size_t)ptr); |
1da177e4 LT |
548 | } |
549 | ||
550 | /* | |
551 | * Retrieves the data payload buffer from an already allocated | |
552 | * struct dm_ioctl. | |
553 | */ | |
554 | static void *get_result_buffer(struct dm_ioctl *param, size_t param_size, | |
555 | size_t *len) | |
556 | { | |
557 | param->data_start = align_ptr(param + 1) - (void *) param; | |
558 | ||
559 | if (param->data_start < param_size) | |
560 | *len = param_size - param->data_start; | |
561 | else | |
562 | *len = 0; | |
563 | ||
564 | return ((void *) param) + param->data_start; | |
565 | } | |
566 | ||
c909085b MP |
567 | static bool filter_device(struct hash_cell *hc, const char *pfx_name, const char *pfx_uuid) |
568 | { | |
569 | const char *val; | |
570 | size_t val_len, pfx_len; | |
571 | ||
572 | val = hc->name; | |
573 | val_len = strlen(val); | |
574 | pfx_len = strnlen(pfx_name, DM_NAME_LEN); | |
575 | if (pfx_len > val_len) | |
576 | return false; | |
577 | if (memcmp(val, pfx_name, pfx_len)) | |
578 | return false; | |
579 | ||
580 | val = hc->uuid ? hc->uuid : ""; | |
581 | val_len = strlen(val); | |
582 | pfx_len = strnlen(pfx_uuid, DM_UUID_LEN); | |
583 | if (pfx_len > val_len) | |
584 | return false; | |
585 | if (memcmp(val, pfx_uuid, pfx_len)) | |
586 | return false; | |
587 | ||
588 | return true; | |
589 | } | |
590 | ||
fc1841e1 | 591 | static int list_devices(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 | 592 | { |
b82096af | 593 | struct rb_node *n; |
1da177e4 LT |
594 | struct hash_cell *hc; |
595 | size_t len, needed = 0; | |
596 | struct gendisk *disk; | |
62e08243 | 597 | struct dm_name_list *orig_nl, *nl, *old_nl = NULL; |
23d70c5e | 598 | uint32_t *event_nr; |
1da177e4 LT |
599 | |
600 | down_write(&_hash_lock); | |
601 | ||
602 | /* | |
603 | * Loop through all the devices working out how much | |
604 | * space we need. | |
605 | */ | |
b82096af MP |
606 | for (n = rb_first(&name_rb_tree); n; n = rb_next(n)) { |
607 | hc = container_of(n, struct hash_cell, name_node); | |
c909085b MP |
608 | if (!filter_device(hc, param->name, param->uuid)) |
609 | continue; | |
b82096af | 610 | needed += align_val(offsetof(struct dm_name_list, name) + strlen(hc->name) + 1); |
8b638081 MP |
611 | needed += align_val(sizeof(uint32_t) * 2); |
612 | if (param->flags & DM_UUID_FLAG && hc->uuid) | |
613 | needed += align_val(strlen(hc->uuid) + 1); | |
1da177e4 LT |
614 | } |
615 | ||
616 | /* | |
617 | * Grab our output buffer. | |
618 | */ | |
62e08243 | 619 | nl = orig_nl = get_result_buffer(param, param_size, &len); |
4edbe1d7 | 620 | if (len < needed || len < sizeof(nl->dev)) { |
1da177e4 LT |
621 | param->flags |= DM_BUFFER_FULL_FLAG; |
622 | goto out; | |
623 | } | |
624 | param->data_size = param->data_start + needed; | |
625 | ||
626 | nl->dev = 0; /* Flags no data */ | |
627 | ||
628 | /* | |
629 | * Now loop through filling out the names. | |
630 | */ | |
b82096af | 631 | for (n = rb_first(&name_rb_tree); n; n = rb_next(n)) { |
8b638081 | 632 | void *uuid_ptr; |
0ef0b471 | 633 | |
b82096af | 634 | hc = container_of(n, struct hash_cell, name_node); |
c909085b MP |
635 | if (!filter_device(hc, param->name, param->uuid)) |
636 | continue; | |
b82096af MP |
637 | if (old_nl) |
638 | old_nl->next = (uint32_t) ((void *) nl - | |
639 | (void *) old_nl); | |
640 | disk = dm_disk(hc->md); | |
641 | nl->dev = huge_encode_dev(disk_devt(disk)); | |
642 | nl->next = 0; | |
643 | strcpy(nl->name, hc->name); | |
644 | ||
645 | old_nl = nl; | |
646 | event_nr = align_ptr(nl->name + strlen(hc->name) + 1); | |
8b638081 MP |
647 | event_nr[0] = dm_get_event_nr(hc->md); |
648 | event_nr[1] = 0; | |
649 | uuid_ptr = align_ptr(event_nr + 2); | |
650 | if (param->flags & DM_UUID_FLAG) { | |
651 | if (hc->uuid) { | |
652 | event_nr[1] |= DM_NAME_LIST_FLAG_HAS_UUID; | |
653 | strcpy(uuid_ptr, hc->uuid); | |
654 | uuid_ptr = align_ptr(uuid_ptr + strlen(hc->uuid) + 1); | |
655 | } else { | |
656 | event_nr[1] |= DM_NAME_LIST_FLAG_DOESNT_HAVE_UUID; | |
657 | } | |
658 | } | |
659 | nl = uuid_ptr; | |
1da177e4 | 660 | } |
62e08243 MP |
661 | /* |
662 | * If mismatch happens, security may be compromised due to buffer | |
663 | * overflow, so it's better to crash. | |
664 | */ | |
665 | BUG_ON((char *)nl - (char *)orig_nl != needed); | |
1da177e4 LT |
666 | |
667 | out: | |
668 | up_write(&_hash_lock); | |
669 | return 0; | |
670 | } | |
671 | ||
672 | static void list_version_get_needed(struct target_type *tt, void *needed_param) | |
673 | { | |
8ca817c4 | 674 | size_t *needed = needed_param; |
1da177e4 | 675 | |
8ca817c4 HM |
676 | *needed += sizeof(struct dm_target_versions); |
677 | *needed += strlen(tt->name) + 1; | |
678 | *needed += ALIGN_MASK; | |
1da177e4 LT |
679 | } |
680 | ||
681 | static void list_version_get_info(struct target_type *tt, void *param) | |
682 | { | |
8ca817c4 | 683 | struct vers_iter *info = param; |
1da177e4 | 684 | |
8ca817c4 HM |
685 | /* Check space - it might have changed since the first iteration */ |
686 | if ((char *)info->vers + sizeof(tt->version) + strlen(tt->name) + 1 > info->end) { | |
687 | info->flags = DM_BUFFER_FULL_FLAG; | |
688 | return; | |
689 | } | |
1da177e4 | 690 | |
8ca817c4 HM |
691 | if (info->old_vers) |
692 | info->old_vers->next = (uint32_t) ((void *)info->vers - (void *)info->old_vers); | |
1da177e4 | 693 | |
8ca817c4 HM |
694 | info->vers->version[0] = tt->version[0]; |
695 | info->vers->version[1] = tt->version[1]; | |
696 | info->vers->version[2] = tt->version[2]; | |
697 | info->vers->next = 0; | |
698 | strcpy(info->vers->name, tt->name); | |
1da177e4 | 699 | |
8ca817c4 HM |
700 | info->old_vers = info->vers; |
701 | info->vers = align_ptr((void *)(info->vers + 1) + strlen(tt->name) + 1); | |
1da177e4 LT |
702 | } |
703 | ||
afa179eb | 704 | static int __list_versions(struct dm_ioctl *param, size_t param_size, const char *name) |
1da177e4 LT |
705 | { |
706 | size_t len, needed = 0; | |
707 | struct dm_target_versions *vers; | |
708 | struct vers_iter iter_info; | |
afa179eb MP |
709 | struct target_type *tt = NULL; |
710 | ||
711 | if (name) { | |
712 | tt = dm_get_target_type(name); | |
713 | if (!tt) | |
714 | return -EINVAL; | |
715 | } | |
1da177e4 LT |
716 | |
717 | /* | |
718 | * Loop through all the devices working out how much | |
719 | * space we need. | |
720 | */ | |
afa179eb MP |
721 | if (!tt) |
722 | dm_target_iterate(list_version_get_needed, &needed); | |
723 | else | |
724 | list_version_get_needed(tt, &needed); | |
1da177e4 LT |
725 | |
726 | /* | |
727 | * Grab our output buffer. | |
728 | */ | |
729 | vers = get_result_buffer(param, param_size, &len); | |
730 | if (len < needed) { | |
731 | param->flags |= DM_BUFFER_FULL_FLAG; | |
732 | goto out; | |
733 | } | |
734 | param->data_size = param->data_start + needed; | |
735 | ||
736 | iter_info.param_size = param_size; | |
737 | iter_info.old_vers = NULL; | |
738 | iter_info.vers = vers; | |
739 | iter_info.flags = 0; | |
4fe1ec99 | 740 | iter_info.end = (char *)vers + needed; |
1da177e4 LT |
741 | |
742 | /* | |
743 | * Now loop through filling out the names & versions. | |
744 | */ | |
afa179eb MP |
745 | if (!tt) |
746 | dm_target_iterate(list_version_get_info, &iter_info); | |
747 | else | |
748 | list_version_get_info(tt, &iter_info); | |
1da177e4 LT |
749 | param->flags |= iter_info.flags; |
750 | ||
751 | out: | |
afa179eb MP |
752 | if (tt) |
753 | dm_put_target_type(tt); | |
1da177e4 LT |
754 | return 0; |
755 | } | |
756 | ||
afa179eb MP |
757 | static int list_versions(struct file *filp, struct dm_ioctl *param, size_t param_size) |
758 | { | |
759 | return __list_versions(param, param_size, NULL); | |
760 | } | |
761 | ||
762 | static int get_target_version(struct file *filp, struct dm_ioctl *param, size_t param_size) | |
763 | { | |
764 | return __list_versions(param, param_size, param->name); | |
765 | } | |
766 | ||
1da177e4 LT |
767 | static int check_name(const char *name) |
768 | { | |
769 | if (strchr(name, '/')) { | |
a85f1a9d DMO |
770 | DMERR("device name cannot contain '/'"); |
771 | return -EINVAL; | |
772 | } | |
773 | ||
81ca2dbe DMO |
774 | if (strcmp(name, DM_CONTROL_NODE) == 0 || |
775 | strcmp(name, ".") == 0 || | |
776 | strcmp(name, "..") == 0) { | |
777 | DMERR("device name cannot be \"%s\", \".\", or \"..\"", DM_CONTROL_NODE); | |
1da177e4 LT |
778 | return -EINVAL; |
779 | } | |
780 | ||
781 | return 0; | |
782 | } | |
783 | ||
1d0f3ce8 MS |
784 | /* |
785 | * On successful return, the caller must not attempt to acquire | |
88e2f901 JB |
786 | * _hash_lock without first calling dm_put_live_table, because dm_table_destroy |
787 | * waits for this dm_put_live_table and could be called under this lock. | |
1d0f3ce8 | 788 | */ |
83d5e5b0 | 789 | static struct dm_table *dm_get_inactive_table(struct mapped_device *md, int *srcu_idx) |
1d0f3ce8 MS |
790 | { |
791 | struct hash_cell *hc; | |
792 | struct dm_table *table = NULL; | |
793 | ||
83d5e5b0 MP |
794 | /* increment rcu count, we don't care about the table pointer */ |
795 | dm_get_live_table(md, srcu_idx); | |
796 | ||
1d0f3ce8 MS |
797 | down_read(&_hash_lock); |
798 | hc = dm_get_mdptr(md); | |
a2f998a7 | 799 | if (!hc) { |
43e6c111 | 800 | DMERR("device has been removed from the dev hash table."); |
1d0f3ce8 MS |
801 | goto out; |
802 | } | |
803 | ||
804 | table = hc->new_map; | |
1d0f3ce8 MS |
805 | |
806 | out: | |
807 | up_read(&_hash_lock); | |
808 | ||
809 | return table; | |
810 | } | |
811 | ||
812 | static struct dm_table *dm_get_live_or_inactive_table(struct mapped_device *md, | |
83d5e5b0 MP |
813 | struct dm_ioctl *param, |
814 | int *srcu_idx) | |
1d0f3ce8 MS |
815 | { |
816 | return (param->flags & DM_QUERY_INACTIVE_TABLE_FLAG) ? | |
83d5e5b0 | 817 | dm_get_inactive_table(md, srcu_idx) : dm_get_live_table(md, srcu_idx); |
1d0f3ce8 MS |
818 | } |
819 | ||
1da177e4 LT |
820 | /* |
821 | * Fills in a dm_ioctl structure, ready for sending back to | |
822 | * userland. | |
823 | */ | |
094ea9a0 | 824 | static void __dev_status(struct mapped_device *md, struct dm_ioctl *param) |
1da177e4 LT |
825 | { |
826 | struct gendisk *disk = dm_disk(md); | |
827 | struct dm_table *table; | |
83d5e5b0 | 828 | int srcu_idx; |
1da177e4 LT |
829 | |
830 | param->flags &= ~(DM_SUSPEND_FLAG | DM_READONLY_FLAG | | |
ffcc3936 | 831 | DM_ACTIVE_PRESENT_FLAG | DM_INTERNAL_SUSPEND_FLAG); |
1da177e4 | 832 | |
4f186f8b | 833 | if (dm_suspended_md(md)) |
1da177e4 LT |
834 | param->flags |= DM_SUSPEND_FLAG; |
835 | ||
ffcc3936 MS |
836 | if (dm_suspended_internally_md(md)) |
837 | param->flags |= DM_INTERNAL_SUSPEND_FLAG; | |
838 | ||
2c140a24 MP |
839 | if (dm_test_deferred_remove_flag(md)) |
840 | param->flags |= DM_DEFERRED_REMOVE; | |
841 | ||
f331c029 | 842 | param->dev = huge_encode_dev(disk_devt(disk)); |
1da177e4 | 843 | |
5c6bd75d AK |
844 | /* |
845 | * Yes, this will be out of date by the time it gets back | |
846 | * to userland, but it is still very useful for | |
847 | * debugging. | |
848 | */ | |
849 | param->open_count = dm_open_count(md); | |
1da177e4 | 850 | |
1da177e4 | 851 | param->event_nr = dm_get_event_nr(md); |
1d0f3ce8 | 852 | param->target_count = 0; |
1da177e4 | 853 | |
83d5e5b0 | 854 | table = dm_get_live_table(md, &srcu_idx); |
1da177e4 | 855 | if (table) { |
1d0f3ce8 MS |
856 | if (!(param->flags & DM_QUERY_INACTIVE_TABLE_FLAG)) { |
857 | if (get_disk_ro(disk)) | |
858 | param->flags |= DM_READONLY_FLAG; | |
2aec377a | 859 | param->target_count = table->num_targets; |
1d0f3ce8 | 860 | } |
1d0f3ce8 MS |
861 | |
862 | param->flags |= DM_ACTIVE_PRESENT_FLAG; | |
863 | } | |
83d5e5b0 | 864 | dm_put_live_table(md, srcu_idx); |
1d0f3ce8 MS |
865 | |
866 | if (param->flags & DM_QUERY_INACTIVE_TABLE_FLAG) { | |
83d5e5b0 | 867 | int srcu_idx; |
0ef0b471 | 868 | |
83d5e5b0 | 869 | table = dm_get_inactive_table(md, &srcu_idx); |
1d0f3ce8 | 870 | if (table) { |
05bdb996 | 871 | if (!(dm_table_get_mode(table) & BLK_OPEN_WRITE)) |
1d0f3ce8 | 872 | param->flags |= DM_READONLY_FLAG; |
2aec377a | 873 | param->target_count = table->num_targets; |
1d0f3ce8 | 874 | } |
83d5e5b0 | 875 | dm_put_live_table(md, srcu_idx); |
1d0f3ce8 | 876 | } |
1da177e4 LT |
877 | } |
878 | ||
fc1841e1 | 879 | static int dev_create(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 | 880 | { |
2b06cfff | 881 | int r, m = DM_ANY_MINOR; |
1da177e4 LT |
882 | struct mapped_device *md; |
883 | ||
884 | r = check_name(param->name); | |
885 | if (r) | |
886 | return r; | |
887 | ||
888 | if (param->flags & DM_PERSISTENT_DEV_FLAG) | |
2b06cfff | 889 | m = MINOR(huge_decode_dev(param->dev)); |
1da177e4 | 890 | |
2b06cfff | 891 | r = dm_create(m, &md); |
1da177e4 LT |
892 | if (r) |
893 | return r; | |
894 | ||
895 | r = dm_hash_insert(param->name, *param->uuid ? param->uuid : NULL, md); | |
3f77316d KU |
896 | if (r) { |
897 | dm_put(md); | |
898 | dm_destroy(md); | |
899 | return r; | |
900 | } | |
1da177e4 LT |
901 | |
902 | param->flags &= ~DM_INACTIVE_PRESENT_FLAG; | |
903 | ||
094ea9a0 AK |
904 | __dev_status(md, param); |
905 | ||
1da177e4 LT |
906 | dm_put(md); |
907 | ||
3f77316d | 908 | return 0; |
1da177e4 LT |
909 | } |
910 | ||
911 | /* | |
912 | * Always use UUID for lookups if it's present, otherwise use name or dev. | |
913 | */ | |
858119e1 | 914 | static struct hash_cell *__find_device_hash_cell(struct dm_ioctl *param) |
1da177e4 | 915 | { |
0ddf9644 | 916 | struct hash_cell *hc = NULL; |
9ade92a9 | 917 | |
0ddf9644 | 918 | if (*param->uuid) { |
dbdcc906 MP |
919 | if (*param->name || param->dev) { |
920 | DMERR("Invalid ioctl structure: uuid %s, name %s, dev %llx", | |
921 | param->uuid, param->name, (unsigned long long)param->dev); | |
759dea20 | 922 | return NULL; |
dbdcc906 | 923 | } |
759dea20 | 924 | |
0ddf9644 MP |
925 | hc = __get_uuid_cell(param->uuid); |
926 | if (!hc) | |
927 | return NULL; | |
ba2e19b0 | 928 | } else if (*param->name) { |
dbdcc906 MP |
929 | if (param->dev) { |
930 | DMERR("Invalid ioctl structure: name %s, dev %llx", | |
931 | param->name, (unsigned long long)param->dev); | |
759dea20 | 932 | return NULL; |
dbdcc906 | 933 | } |
759dea20 | 934 | |
0ddf9644 MP |
935 | hc = __get_name_cell(param->name); |
936 | if (!hc) | |
937 | return NULL; | |
ba2e19b0 MP |
938 | } else if (param->dev) { |
939 | hc = __get_dev_cell(param->dev); | |
940 | if (!hc) | |
941 | return NULL; | |
942 | } else | |
0ddf9644 | 943 | return NULL; |
9ade92a9 | 944 | |
0ddf9644 MP |
945 | /* |
946 | * Sneakily write in both the name and the uuid | |
947 | * while we have the cell. | |
948 | */ | |
22a8b849 | 949 | strscpy(param->name, hc->name, sizeof(param->name)); |
0ddf9644 | 950 | if (hc->uuid) |
22a8b849 | 951 | strscpy(param->uuid, hc->uuid, sizeof(param->uuid)); |
0ddf9644 MP |
952 | else |
953 | param->uuid[0] = '\0'; | |
954 | ||
955 | if (hc->new_map) | |
956 | param->flags |= DM_INACTIVE_PRESENT_FLAG; | |
957 | else | |
958 | param->flags &= ~DM_INACTIVE_PRESENT_FLAG; | |
959 | ||
960 | return hc; | |
1da177e4 LT |
961 | } |
962 | ||
858119e1 | 963 | static struct mapped_device *find_device(struct dm_ioctl *param) |
1da177e4 LT |
964 | { |
965 | struct hash_cell *hc; | |
966 | struct mapped_device *md = NULL; | |
967 | ||
968 | down_read(&_hash_lock); | |
969 | hc = __find_device_hash_cell(param); | |
0ddf9644 | 970 | if (hc) |
1da177e4 | 971 | md = hc->md; |
1da177e4 LT |
972 | up_read(&_hash_lock); |
973 | ||
974 | return md; | |
975 | } | |
976 | ||
fc1841e1 | 977 | static int dev_remove(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 LT |
978 | { |
979 | struct hash_cell *hc; | |
7ec75f25 | 980 | struct mapped_device *md; |
5c6bd75d | 981 | int r; |
83d5e5b0 | 982 | struct dm_table *t; |
1da177e4 LT |
983 | |
984 | down_write(&_hash_lock); | |
985 | hc = __find_device_hash_cell(param); | |
986 | ||
987 | if (!hc) { | |
810b4923 | 988 | DMDEBUG_LIMIT("device doesn't appear to be in the dev hash table."); |
1da177e4 LT |
989 | up_write(&_hash_lock); |
990 | return -ENXIO; | |
991 | } | |
992 | ||
7ec75f25 JM |
993 | md = hc->md; |
994 | ||
5c6bd75d AK |
995 | /* |
996 | * Ensure the device is not open and nothing further can open it. | |
997 | */ | |
2c140a24 | 998 | r = dm_lock_for_deletion(md, !!(param->flags & DM_DEFERRED_REMOVE), false); |
5c6bd75d | 999 | if (r) { |
2c140a24 MP |
1000 | if (r == -EBUSY && param->flags & DM_DEFERRED_REMOVE) { |
1001 | up_write(&_hash_lock); | |
1002 | dm_put(md); | |
1003 | return 0; | |
1004 | } | |
810b4923 | 1005 | DMDEBUG_LIMIT("unable to remove open device %s", hc->name); |
5c6bd75d AK |
1006 | up_write(&_hash_lock); |
1007 | dm_put(md); | |
1008 | return r; | |
1009 | } | |
1010 | ||
83d5e5b0 | 1011 | t = __hash_remove(hc); |
1da177e4 | 1012 | up_write(&_hash_lock); |
60935eb2 | 1013 | |
83d5e5b0 MP |
1014 | if (t) { |
1015 | dm_sync_table(md); | |
1016 | dm_table_destroy(t); | |
1017 | } | |
1018 | ||
2c140a24 MP |
1019 | param->flags &= ~DM_DEFERRED_REMOVE; |
1020 | ||
84010e51 TS |
1021 | dm_ima_measure_on_device_remove(md, false); |
1022 | ||
7533afa1 | 1023 | if (!dm_kobject_uevent(md, KOBJ_REMOVE, param->event_nr, false)) |
3abf85b5 | 1024 | param->flags |= DM_UEVENT_GENERATED_FLAG; |
60935eb2 | 1025 | |
7ec75f25 | 1026 | dm_put(md); |
3f77316d | 1027 | dm_destroy(md); |
1da177e4 LT |
1028 | return 0; |
1029 | } | |
1030 | ||
1031 | /* | |
1032 | * Check a string doesn't overrun the chunk of | |
1033 | * memory we copied from userland. | |
1034 | */ | |
1035 | static int invalid_str(char *str, void *end) | |
1036 | { | |
1037 | while ((void *) str < end) | |
1038 | if (!*str++) | |
1039 | return 0; | |
1040 | ||
1041 | return -EINVAL; | |
1042 | } | |
1043 | ||
fc1841e1 | 1044 | static int dev_rename(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 LT |
1045 | { |
1046 | int r; | |
84c89557 | 1047 | char *new_data = (char *) param + param->data_start; |
856a6f1d | 1048 | struct mapped_device *md; |
86a3238c | 1049 | unsigned int change_uuid = (param->flags & DM_UUID_FLAG) ? 1 : 0; |
1da177e4 | 1050 | |
84c89557 | 1051 | if (new_data < param->data || |
c2b04824 | 1052 | invalid_str(new_data, (void *) param + param_size) || !*new_data || |
84c89557 | 1053 | strlen(new_data) > (change_uuid ? DM_UUID_LEN - 1 : DM_NAME_LEN - 1)) { |
43e6c111 | 1054 | DMERR("Invalid new mapped device name or uuid string supplied."); |
1da177e4 LT |
1055 | return -EINVAL; |
1056 | } | |
1057 | ||
84c89557 PJ |
1058 | if (!change_uuid) { |
1059 | r = check_name(new_data); | |
1060 | if (r) | |
1061 | return r; | |
1062 | } | |
1da177e4 | 1063 | |
84c89557 | 1064 | md = dm_hash_rename(param, new_data); |
856a6f1d PR |
1065 | if (IS_ERR(md)) |
1066 | return PTR_ERR(md); | |
3abf85b5 | 1067 | |
856a6f1d PR |
1068 | __dev_status(md, param); |
1069 | dm_put(md); | |
1070 | ||
1071 | return 0; | |
1da177e4 LT |
1072 | } |
1073 | ||
fc1841e1 | 1074 | static int dev_set_geometry(struct file *filp, struct dm_ioctl *param, size_t param_size) |
3ac51e74 DW |
1075 | { |
1076 | int r = -EINVAL, x; | |
1077 | struct mapped_device *md; | |
1078 | struct hd_geometry geometry; | |
1079 | unsigned long indata[4]; | |
1080 | char *geostr = (char *) param + param->data_start; | |
31998ef1 | 1081 | char dummy; |
3ac51e74 DW |
1082 | |
1083 | md = find_device(param); | |
1084 | if (!md) | |
1085 | return -ENXIO; | |
1086 | ||
27238b2b | 1087 | if (geostr < param->data || |
3ac51e74 | 1088 | invalid_str(geostr, (void *) param + param_size)) { |
43e6c111 | 1089 | DMERR("Invalid geometry supplied."); |
3ac51e74 DW |
1090 | goto out; |
1091 | } | |
1092 | ||
31998ef1 MP |
1093 | x = sscanf(geostr, "%lu %lu %lu %lu%c", indata, |
1094 | indata + 1, indata + 2, indata + 3, &dummy); | |
3ac51e74 DW |
1095 | |
1096 | if (x != 4) { | |
43e6c111 | 1097 | DMERR("Unable to interpret geometry settings."); |
3ac51e74 DW |
1098 | goto out; |
1099 | } | |
1100 | ||
151d8122 | 1101 | if (indata[0] > 65535 || indata[1] > 255 || indata[2] > 255) { |
43e6c111 | 1102 | DMERR("Geometry exceeds range limits."); |
3ac51e74 DW |
1103 | goto out; |
1104 | } | |
1105 | ||
1106 | geometry.cylinders = indata[0]; | |
1107 | geometry.heads = indata[1]; | |
1108 | geometry.sectors = indata[2]; | |
1109 | geometry.start = indata[3]; | |
1110 | ||
1111 | r = dm_set_geometry(md, &geometry); | |
3ac51e74 DW |
1112 | |
1113 | param->data_size = 0; | |
1114 | ||
1115 | out: | |
1116 | dm_put(md); | |
1117 | return r; | |
1118 | } | |
1119 | ||
1da177e4 LT |
1120 | static int do_suspend(struct dm_ioctl *param) |
1121 | { | |
1122 | int r = 0; | |
86a3238c | 1123 | unsigned int suspend_flags = DM_SUSPEND_LOCKFS_FLAG; |
1da177e4 LT |
1124 | struct mapped_device *md; |
1125 | ||
1126 | md = find_device(param); | |
1127 | if (!md) | |
1128 | return -ENXIO; | |
1129 | ||
6da487dc | 1130 | if (param->flags & DM_SKIP_LOCKFS_FLAG) |
a3d77d35 | 1131 | suspend_flags &= ~DM_SUSPEND_LOCKFS_FLAG; |
81fdb096 KU |
1132 | if (param->flags & DM_NOFLUSH_FLAG) |
1133 | suspend_flags |= DM_SUSPEND_NOFLUSH_FLAG; | |
6da487dc | 1134 | |
094ea9a0 | 1135 | if (!dm_suspended_md(md)) { |
a3d77d35 | 1136 | r = dm_suspend(md, suspend_flags); |
094ea9a0 AK |
1137 | if (r) |
1138 | goto out; | |
1139 | } | |
1da177e4 | 1140 | |
094ea9a0 | 1141 | __dev_status(md, param); |
1da177e4 | 1142 | |
094ea9a0 | 1143 | out: |
1da177e4 | 1144 | dm_put(md); |
094ea9a0 | 1145 | |
1da177e4 LT |
1146 | return r; |
1147 | } | |
1148 | ||
1149 | static int do_resume(struct dm_ioctl *param) | |
1150 | { | |
1151 | int r = 0; | |
86a3238c | 1152 | unsigned int suspend_flags = DM_SUSPEND_LOCKFS_FLAG; |
1da177e4 LT |
1153 | struct hash_cell *hc; |
1154 | struct mapped_device *md; | |
042d2a9b | 1155 | struct dm_table *new_map, *old_map = NULL; |
7533afa1 | 1156 | bool need_resize_uevent = false; |
1da177e4 LT |
1157 | |
1158 | down_write(&_hash_lock); | |
1159 | ||
1160 | hc = __find_device_hash_cell(param); | |
1161 | if (!hc) { | |
810b4923 | 1162 | DMDEBUG_LIMIT("device doesn't appear to be in the dev hash table."); |
1da177e4 LT |
1163 | up_write(&_hash_lock); |
1164 | return -ENXIO; | |
1165 | } | |
1166 | ||
1167 | md = hc->md; | |
1da177e4 LT |
1168 | |
1169 | new_map = hc->new_map; | |
1170 | hc->new_map = NULL; | |
1171 | param->flags &= ~DM_INACTIVE_PRESENT_FLAG; | |
1172 | ||
1173 | up_write(&_hash_lock); | |
1174 | ||
1175 | /* Do we need to load a new map ? */ | |
1176 | if (new_map) { | |
7533afa1 MP |
1177 | sector_t old_size, new_size; |
1178 | ||
1da177e4 | 1179 | /* Suspend if it isn't already suspended */ |
2760904d | 1180 | if (param->flags & DM_SKIP_LOCKFS_FLAG) |
a3d77d35 | 1181 | suspend_flags &= ~DM_SUSPEND_LOCKFS_FLAG; |
81fdb096 KU |
1182 | if (param->flags & DM_NOFLUSH_FLAG) |
1183 | suspend_flags |= DM_SUSPEND_NOFLUSH_FLAG; | |
4f186f8b | 1184 | if (!dm_suspended_md(md)) |
a3d77d35 | 1185 | dm_suspend(md, suspend_flags); |
1da177e4 | 1186 | |
7533afa1 | 1187 | old_size = dm_get_size(md); |
042d2a9b AK |
1188 | old_map = dm_swap_table(md, new_map); |
1189 | if (IS_ERR(old_map)) { | |
83d5e5b0 | 1190 | dm_sync_table(md); |
d5816876 | 1191 | dm_table_destroy(new_map); |
1da177e4 | 1192 | dm_put(md); |
042d2a9b | 1193 | return PTR_ERR(old_map); |
1da177e4 | 1194 | } |
7533afa1 MP |
1195 | new_size = dm_get_size(md); |
1196 | if (old_size && new_size && old_size != new_size) | |
1197 | need_resize_uevent = true; | |
1da177e4 | 1198 | |
05bdb996 | 1199 | if (dm_table_get_mode(new_map) & BLK_OPEN_WRITE) |
1da177e4 LT |
1200 | set_disk_ro(dm_disk(md), 0); |
1201 | else | |
1202 | set_disk_ro(dm_disk(md), 1); | |
1da177e4 LT |
1203 | } |
1204 | ||
0f3649a9 | 1205 | if (dm_suspended_md(md)) { |
1da177e4 | 1206 | r = dm_resume(md); |
8eb6fab4 TS |
1207 | if (!r) { |
1208 | dm_ima_measure_on_device_resume(md, new_map ? true : false); | |
1209 | ||
7533afa1 | 1210 | if (!dm_kobject_uevent(md, KOBJ_CHANGE, param->event_nr, need_resize_uevent)) |
8eb6fab4 TS |
1211 | param->flags |= DM_UEVENT_GENERATED_FLAG; |
1212 | } | |
0f3649a9 | 1213 | } |
1da177e4 | 1214 | |
83d5e5b0 MP |
1215 | /* |
1216 | * Since dm_swap_table synchronizes RCU, nobody should be in | |
1217 | * read-side critical section already. | |
1218 | */ | |
042d2a9b AK |
1219 | if (old_map) |
1220 | dm_table_destroy(old_map); | |
60935eb2 | 1221 | |
0f3649a9 | 1222 | if (!r) |
094ea9a0 | 1223 | __dev_status(md, param); |
1da177e4 LT |
1224 | |
1225 | dm_put(md); | |
1226 | return r; | |
1227 | } | |
1228 | ||
1229 | /* | |
1230 | * Set or unset the suspension state of a device. | |
1231 | * If the device already is in the requested state we just return its status. | |
1232 | */ | |
fc1841e1 | 1233 | static int dev_suspend(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 LT |
1234 | { |
1235 | if (param->flags & DM_SUSPEND_FLAG) | |
1236 | return do_suspend(param); | |
1237 | ||
1238 | return do_resume(param); | |
1239 | } | |
1240 | ||
1241 | /* | |
1242 | * Copies device info back to user space, used by | |
1243 | * the create and info ioctls. | |
1244 | */ | |
fc1841e1 | 1245 | static int dev_status(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 | 1246 | { |
1da177e4 LT |
1247 | struct mapped_device *md; |
1248 | ||
1249 | md = find_device(param); | |
1250 | if (!md) | |
1251 | return -ENXIO; | |
1252 | ||
094ea9a0 | 1253 | __dev_status(md, param); |
1da177e4 | 1254 | dm_put(md); |
094ea9a0 AK |
1255 | |
1256 | return 0; | |
1da177e4 LT |
1257 | } |
1258 | ||
1259 | /* | |
1260 | * Build up the status struct for each target | |
1261 | */ | |
1262 | static void retrieve_status(struct dm_table *table, | |
1263 | struct dm_ioctl *param, size_t param_size) | |
1264 | { | |
1265 | unsigned int i, num_targets; | |
1266 | struct dm_target_spec *spec; | |
1267 | char *outbuf, *outptr; | |
1268 | status_type_t type; | |
1269 | size_t remaining, len, used = 0; | |
86a3238c | 1270 | unsigned int status_flags = 0; |
1da177e4 LT |
1271 | |
1272 | outptr = outbuf = get_result_buffer(param, param_size, &len); | |
1273 | ||
1274 | if (param->flags & DM_STATUS_TABLE_FLAG) | |
1275 | type = STATUSTYPE_TABLE; | |
91ccbbac TS |
1276 | else if (param->flags & DM_IMA_MEASUREMENT_FLAG) |
1277 | type = STATUSTYPE_IMA; | |
1da177e4 LT |
1278 | else |
1279 | type = STATUSTYPE_INFO; | |
1280 | ||
1281 | /* Get all the target info */ | |
2aec377a | 1282 | num_targets = table->num_targets; |
1da177e4 LT |
1283 | for (i = 0; i < num_targets; i++) { |
1284 | struct dm_target *ti = dm_table_get_target(table, i); | |
fd7c092e | 1285 | size_t l; |
1da177e4 LT |
1286 | |
1287 | remaining = len - (outptr - outbuf); | |
1288 | if (remaining <= sizeof(struct dm_target_spec)) { | |
1289 | param->flags |= DM_BUFFER_FULL_FLAG; | |
1290 | break; | |
1291 | } | |
1292 | ||
1293 | spec = (struct dm_target_spec *) outptr; | |
1294 | ||
1295 | spec->status = 0; | |
1296 | spec->sector_start = ti->begin; | |
1297 | spec->length = ti->len; | |
0ffb645e JS |
1298 | strscpy_pad(spec->target_type, ti->type->name, |
1299 | sizeof(spec->target_type)); | |
1da177e4 LT |
1300 | |
1301 | outptr += sizeof(struct dm_target_spec); | |
1302 | remaining = len - (outptr - outbuf); | |
1303 | if (remaining <= 0) { | |
1304 | param->flags |= DM_BUFFER_FULL_FLAG; | |
1305 | break; | |
1306 | } | |
1307 | ||
1308 | /* Get the status/table string from the target driver */ | |
1309 | if (ti->type->status) { | |
1f4e0ff0 AK |
1310 | if (param->flags & DM_NOFLUSH_FLAG) |
1311 | status_flags |= DM_STATUS_NOFLUSH_FLAG; | |
fd7c092e | 1312 | ti->type->status(ti, type, status_flags, outptr, remaining); |
1da177e4 LT |
1313 | } else |
1314 | outptr[0] = '\0'; | |
1315 | ||
fd7c092e MP |
1316 | l = strlen(outptr) + 1; |
1317 | if (l == remaining) { | |
1318 | param->flags |= DM_BUFFER_FULL_FLAG; | |
1319 | break; | |
1320 | } | |
1321 | ||
1322 | outptr += l; | |
1da177e4 LT |
1323 | used = param->data_start + (outptr - outbuf); |
1324 | ||
1325 | outptr = align_ptr(outptr); | |
1326 | spec->next = outptr - outbuf; | |
1327 | } | |
1328 | ||
1329 | if (used) | |
1330 | param->data_size = used; | |
1331 | ||
1332 | param->target_count = num_targets; | |
1333 | } | |
1334 | ||
1335 | /* | |
1336 | * Wait for a device to report an event | |
1337 | */ | |
fc1841e1 | 1338 | static int dev_wait(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 | 1339 | { |
094ea9a0 | 1340 | int r = 0; |
1da177e4 LT |
1341 | struct mapped_device *md; |
1342 | struct dm_table *table; | |
83d5e5b0 | 1343 | int srcu_idx; |
1da177e4 LT |
1344 | |
1345 | md = find_device(param); | |
1346 | if (!md) | |
1347 | return -ENXIO; | |
1348 | ||
1349 | /* | |
1350 | * Wait for a notification event | |
1351 | */ | |
1352 | if (dm_wait_event(md, param->event_nr)) { | |
1353 | r = -ERESTARTSYS; | |
1354 | goto out; | |
1355 | } | |
1356 | ||
1357 | /* | |
1358 | * The userland program is going to want to know what | |
1359 | * changed to trigger the event, so we may as well tell | |
1360 | * him and save an ioctl. | |
1361 | */ | |
094ea9a0 | 1362 | __dev_status(md, param); |
1da177e4 | 1363 | |
83d5e5b0 MP |
1364 | table = dm_get_live_or_inactive_table(md, param, &srcu_idx); |
1365 | if (table) | |
1da177e4 | 1366 | retrieve_status(table, param, param_size); |
83d5e5b0 | 1367 | dm_put_live_table(md, srcu_idx); |
1da177e4 | 1368 | |
094ea9a0 | 1369 | out: |
1da177e4 | 1370 | dm_put(md); |
094ea9a0 | 1371 | |
1da177e4 LT |
1372 | return r; |
1373 | } | |
1374 | ||
fc1841e1 MP |
1375 | /* |
1376 | * Remember the global event number and make it possible to poll | |
1377 | * for further events. | |
1378 | */ | |
1379 | static int dev_arm_poll(struct file *filp, struct dm_ioctl *param, size_t param_size) | |
1380 | { | |
1381 | struct dm_file *priv = filp->private_data; | |
1382 | ||
1383 | priv->global_event_nr = atomic_read(&dm_global_event_nr); | |
1384 | ||
1385 | return 0; | |
1386 | } | |
1387 | ||
05bdb996 | 1388 | static inline blk_mode_t get_mode(struct dm_ioctl *param) |
1da177e4 | 1389 | { |
05bdb996 | 1390 | blk_mode_t mode = BLK_OPEN_READ | BLK_OPEN_WRITE; |
1da177e4 LT |
1391 | |
1392 | if (param->flags & DM_READONLY_FLAG) | |
05bdb996 | 1393 | mode = BLK_OPEN_READ; |
1da177e4 LT |
1394 | |
1395 | return mode; | |
1396 | } | |
1397 | ||
10655c7a | 1398 | static int next_target(struct dm_target_spec *last, uint32_t next, const char *end, |
1da177e4 LT |
1399 | struct dm_target_spec **spec, char **target_params) |
1400 | { | |
b60528d9 DMO |
1401 | static_assert(__alignof__(struct dm_target_spec) <= 8, |
1402 | "struct dm_target_spec must not require more than 8-byte alignment"); | |
1403 | ||
13f4a697 DMO |
1404 | /* |
1405 | * Number of bytes remaining, starting with last. This is always | |
1406 | * sizeof(struct dm_target_spec) or more, as otherwise *last was | |
1407 | * out of bounds already. | |
1408 | */ | |
10655c7a | 1409 | size_t remaining = end - (char *)last; |
13f4a697 DMO |
1410 | |
1411 | /* | |
1412 | * There must be room for both the next target spec and the | |
1413 | * NUL-terminator of the target itself. | |
1414 | */ | |
1415 | if (remaining - sizeof(struct dm_target_spec) <= next) { | |
1416 | DMERR("Target spec extends beyond end of parameters"); | |
1417 | return -EINVAL; | |
1418 | } | |
1da177e4 | 1419 | |
b60528d9 DMO |
1420 | if (next % __alignof__(struct dm_target_spec)) { |
1421 | DMERR("Next dm_target_spec (offset %u) is not %zu-byte aligned", | |
1422 | next, __alignof__(struct dm_target_spec)); | |
1da177e4 | 1423 | return -EINVAL; |
b60528d9 DMO |
1424 | } |
1425 | ||
1da177e4 LT |
1426 | *spec = (struct dm_target_spec *) ((unsigned char *) last + next); |
1427 | *target_params = (char *) (*spec + 1); | |
1da177e4 | 1428 | |
10655c7a | 1429 | return 0; |
1da177e4 LT |
1430 | } |
1431 | ||
1432 | static int populate_table(struct dm_table *table, | |
1433 | struct dm_ioctl *param, size_t param_size) | |
1434 | { | |
1435 | int r; | |
1436 | unsigned int i = 0; | |
1437 | struct dm_target_spec *spec = (struct dm_target_spec *) param; | |
1438 | uint32_t next = param->data_start; | |
10655c7a | 1439 | const char *const end = (const char *) param + param_size; |
1da177e4 | 1440 | char *target_params; |
10655c7a | 1441 | size_t min_size = sizeof(struct dm_ioctl); |
1da177e4 LT |
1442 | |
1443 | if (!param->target_count) { | |
1c131886 | 1444 | DMERR("%s: no targets specified", __func__); |
1da177e4 LT |
1445 | return -EINVAL; |
1446 | } | |
1447 | ||
1448 | for (i = 0; i < param->target_count; i++) { | |
10655c7a DMO |
1449 | const char *nul_terminator; |
1450 | ||
1451 | if (next < min_size) { | |
1452 | DMERR("%s: next target spec (offset %u) overlaps %s", | |
1453 | __func__, next, i ? "previous target" : "'struct dm_ioctl'"); | |
1454 | return -EINVAL; | |
1455 | } | |
1da177e4 LT |
1456 | |
1457 | r = next_target(spec, next, end, &spec, &target_params); | |
1458 | if (r) { | |
43e6c111 | 1459 | DMERR("unable to find target"); |
1da177e4 LT |
1460 | return r; |
1461 | } | |
1462 | ||
10655c7a DMO |
1463 | nul_terminator = memchr(target_params, 0, (size_t)(end - target_params)); |
1464 | if (nul_terminator == NULL) { | |
1465 | DMERR("%s: target parameters not NUL-terminated", __func__); | |
1466 | return -EINVAL; | |
1467 | } | |
1468 | ||
1469 | /* Add 1 for NUL terminator */ | |
1470 | min_size = (size_t)(nul_terminator - (const char *)spec) + 1; | |
1471 | ||
1da177e4 LT |
1472 | r = dm_table_add_target(table, spec->target_type, |
1473 | (sector_t) spec->sector_start, | |
1474 | (sector_t) spec->length, | |
1475 | target_params); | |
1476 | if (r) { | |
43e6c111 | 1477 | DMERR("error adding target to table"); |
1da177e4 LT |
1478 | return r; |
1479 | } | |
1480 | ||
1481 | next = spec->next; | |
1482 | } | |
1483 | ||
1484 | return dm_table_complete(table); | |
1485 | } | |
1486 | ||
7e0d574f | 1487 | static bool is_valid_type(enum dm_queue_mode cur, enum dm_queue_mode new) |
b5ab4a9b TK |
1488 | { |
1489 | if (cur == new || | |
1490 | (cur == DM_TYPE_BIO_BASED && new == DM_TYPE_DAX_BIO_BASED)) | |
1491 | return true; | |
1492 | ||
1493 | return false; | |
1494 | } | |
1495 | ||
fc1841e1 | 1496 | static int table_load(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 LT |
1497 | { |
1498 | int r; | |
1499 | struct hash_cell *hc; | |
83d5e5b0 | 1500 | struct dm_table *t, *old_map = NULL; |
1134e5ae | 1501 | struct mapped_device *md; |
36a0456f | 1502 | struct target_type *immutable_target_type; |
1134e5ae MA |
1503 | |
1504 | md = find_device(param); | |
1505 | if (!md) | |
1506 | return -ENXIO; | |
1da177e4 | 1507 | |
1134e5ae | 1508 | r = dm_table_create(&t, get_mode(param), param->target_count, md); |
1da177e4 | 1509 | if (r) |
f11c1c56 | 1510 | goto err; |
1da177e4 | 1511 | |
00c4fc3b MS |
1512 | /* Protect md->type and md->queue against concurrent table loads. */ |
1513 | dm_lock_md_type(md); | |
1da177e4 | 1514 | r = populate_table(t, param, param_size); |
f11c1c56 MS |
1515 | if (r) |
1516 | goto err_unlock_md_type; | |
1da177e4 | 1517 | |
91ccbbac TS |
1518 | dm_ima_measure_on_table_load(t, STATUSTYPE_IMA); |
1519 | ||
36a0456f AK |
1520 | immutable_target_type = dm_get_immutable_target_type(md); |
1521 | if (immutable_target_type && | |
f083b09b MS |
1522 | (immutable_target_type != dm_table_get_immutable_target_type(t)) && |
1523 | !dm_table_get_wildcard_target(t)) { | |
43e6c111 MP |
1524 | DMERR("can't replace immutable target type %s", |
1525 | immutable_target_type->name); | |
36a0456f | 1526 | r = -EINVAL; |
f11c1c56 | 1527 | goto err_unlock_md_type; |
36a0456f AK |
1528 | } |
1529 | ||
3e6180f0 | 1530 | if (dm_get_md_type(md) == DM_TYPE_NONE) { |
3e6180f0 | 1531 | /* setup md->queue to reflect md's type (may block) */ |
591ddcfc | 1532 | r = dm_setup_md_queue(md, t); |
3e6180f0 | 1533 | if (r) { |
43e6c111 | 1534 | DMERR("unable to set up device queue for new table."); |
3e6180f0 CH |
1535 | goto err_unlock_md_type; |
1536 | } | |
b5ab4a9b | 1537 | } else if (!is_valid_type(dm_get_md_type(md), dm_table_get_type(t))) { |
43e6c111 MP |
1538 | DMERR("can't change device type (old=%u vs new=%u) after initial table load.", |
1539 | dm_get_md_type(md), dm_table_get_type(t)); | |
a5664dad | 1540 | r = -EINVAL; |
f11c1c56 | 1541 | goto err_unlock_md_type; |
a5664dad | 1542 | } |
4a0b4ddf | 1543 | |
a5664dad MS |
1544 | dm_unlock_md_type(md); |
1545 | ||
1546 | /* stage inactive table */ | |
1da177e4 | 1547 | down_write(&_hash_lock); |
1134e5ae | 1548 | hc = dm_get_mdptr(md); |
a2f998a7 | 1549 | if (!hc) { |
43e6c111 | 1550 | DMERR("device has been removed from the dev hash table."); |
1134e5ae MA |
1551 | up_write(&_hash_lock); |
1552 | r = -ENXIO; | |
f11c1c56 | 1553 | goto err_destroy_table; |
1da177e4 LT |
1554 | } |
1555 | ||
1556 | if (hc->new_map) | |
83d5e5b0 | 1557 | old_map = hc->new_map; |
1da177e4 | 1558 | hc->new_map = t; |
1134e5ae MA |
1559 | up_write(&_hash_lock); |
1560 | ||
1da177e4 | 1561 | param->flags |= DM_INACTIVE_PRESENT_FLAG; |
094ea9a0 | 1562 | __dev_status(md, param); |
1134e5ae | 1563 | |
83d5e5b0 MP |
1564 | if (old_map) { |
1565 | dm_sync_table(md); | |
1566 | dm_table_destroy(old_map); | |
1567 | } | |
1568 | ||
1134e5ae | 1569 | dm_put(md); |
1da177e4 | 1570 | |
f11c1c56 MS |
1571 | return 0; |
1572 | ||
1573 | err_unlock_md_type: | |
1574 | dm_unlock_md_type(md); | |
1575 | err_destroy_table: | |
1576 | dm_table_destroy(t); | |
1577 | err: | |
1578 | dm_put(md); | |
1579 | ||
1da177e4 LT |
1580 | return r; |
1581 | } | |
1582 | ||
fc1841e1 | 1583 | static int table_clear(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 | 1584 | { |
1da177e4 | 1585 | struct hash_cell *hc; |
7ec75f25 | 1586 | struct mapped_device *md; |
83d5e5b0 | 1587 | struct dm_table *old_map = NULL; |
99169b93 | 1588 | bool has_new_map = false; |
1da177e4 LT |
1589 | |
1590 | down_write(&_hash_lock); | |
1591 | ||
1592 | hc = __find_device_hash_cell(param); | |
1593 | if (!hc) { | |
810b4923 | 1594 | DMDEBUG_LIMIT("device doesn't appear to be in the dev hash table."); |
1da177e4 LT |
1595 | up_write(&_hash_lock); |
1596 | return -ENXIO; | |
1597 | } | |
1598 | ||
1599 | if (hc->new_map) { | |
83d5e5b0 | 1600 | old_map = hc->new_map; |
1da177e4 | 1601 | hc->new_map = NULL; |
99169b93 | 1602 | has_new_map = true; |
1da177e4 LT |
1603 | } |
1604 | ||
7ec75f25 | 1605 | md = hc->md; |
1da177e4 | 1606 | up_write(&_hash_lock); |
3d32aaa7 MS |
1607 | |
1608 | param->flags &= ~DM_INACTIVE_PRESENT_FLAG; | |
1609 | __dev_status(md, param); | |
1610 | ||
83d5e5b0 MP |
1611 | if (old_map) { |
1612 | dm_sync_table(md); | |
1613 | dm_table_destroy(old_map); | |
1614 | } | |
99169b93 | 1615 | dm_ima_measure_on_table_clear(md, has_new_map); |
7ec75f25 | 1616 | dm_put(md); |
094ea9a0 AK |
1617 | |
1618 | return 0; | |
1da177e4 LT |
1619 | } |
1620 | ||
1621 | /* | |
1622 | * Retrieves a list of devices used by a particular dm device. | |
1623 | */ | |
1624 | static void retrieve_deps(struct dm_table *table, | |
1625 | struct dm_ioctl *param, size_t param_size) | |
1626 | { | |
1627 | unsigned int count = 0; | |
1628 | struct list_head *tmp; | |
1629 | size_t len, needed; | |
82b1519b | 1630 | struct dm_dev_internal *dd; |
1da177e4 LT |
1631 | struct dm_target_deps *deps; |
1632 | ||
f6007dce MP |
1633 | down_read(&table->devices_lock); |
1634 | ||
1da177e4 LT |
1635 | deps = get_result_buffer(param, param_size, &len); |
1636 | ||
1637 | /* | |
1638 | * Count the devices. | |
1639 | */ | |
43be9c74 | 1640 | list_for_each(tmp, dm_table_get_devices(table)) |
1da177e4 LT |
1641 | count++; |
1642 | ||
1643 | /* | |
1644 | * Check we have enough space. | |
1645 | */ | |
da899625 | 1646 | needed = struct_size(deps, dev, count); |
1da177e4 LT |
1647 | if (len < needed) { |
1648 | param->flags |= DM_BUFFER_FULL_FLAG; | |
f6007dce | 1649 | goto out; |
1da177e4 LT |
1650 | } |
1651 | ||
1652 | /* | |
1653 | * Fill in the devices. | |
1654 | */ | |
1655 | deps->count = count; | |
1656 | count = 0; | |
43be9c74 | 1657 | list_for_each_entry(dd, dm_table_get_devices(table), list) |
86f1152b | 1658 | deps->dev[count++] = huge_encode_dev(dd->dm_dev->bdev->bd_dev); |
1da177e4 LT |
1659 | |
1660 | param->data_size = param->data_start + needed; | |
f6007dce MP |
1661 | |
1662 | out: | |
1663 | up_read(&table->devices_lock); | |
1da177e4 LT |
1664 | } |
1665 | ||
fc1841e1 | 1666 | static int table_deps(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 | 1667 | { |
1da177e4 LT |
1668 | struct mapped_device *md; |
1669 | struct dm_table *table; | |
83d5e5b0 | 1670 | int srcu_idx; |
1da177e4 LT |
1671 | |
1672 | md = find_device(param); | |
1673 | if (!md) | |
1674 | return -ENXIO; | |
1675 | ||
094ea9a0 | 1676 | __dev_status(md, param); |
1da177e4 | 1677 | |
83d5e5b0 MP |
1678 | table = dm_get_live_or_inactive_table(md, param, &srcu_idx); |
1679 | if (table) | |
1da177e4 | 1680 | retrieve_deps(table, param, param_size); |
83d5e5b0 | 1681 | dm_put_live_table(md, srcu_idx); |
1da177e4 | 1682 | |
1da177e4 | 1683 | dm_put(md); |
094ea9a0 AK |
1684 | |
1685 | return 0; | |
1da177e4 LT |
1686 | } |
1687 | ||
1688 | /* | |
1689 | * Return the status of a device as a text string for each | |
1690 | * target. | |
1691 | */ | |
fc1841e1 | 1692 | static int table_status(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 | 1693 | { |
1da177e4 LT |
1694 | struct mapped_device *md; |
1695 | struct dm_table *table; | |
83d5e5b0 | 1696 | int srcu_idx; |
1da177e4 LT |
1697 | |
1698 | md = find_device(param); | |
1699 | if (!md) | |
1700 | return -ENXIO; | |
1701 | ||
094ea9a0 | 1702 | __dev_status(md, param); |
1da177e4 | 1703 | |
83d5e5b0 MP |
1704 | table = dm_get_live_or_inactive_table(md, param, &srcu_idx); |
1705 | if (table) | |
1da177e4 | 1706 | retrieve_status(table, param, param_size); |
83d5e5b0 | 1707 | dm_put_live_table(md, srcu_idx); |
1da177e4 | 1708 | |
1da177e4 | 1709 | dm_put(md); |
094ea9a0 AK |
1710 | |
1711 | return 0; | |
1da177e4 LT |
1712 | } |
1713 | ||
a2606241 | 1714 | /* |
fd2ed4d2 MP |
1715 | * Process device-mapper dependent messages. Messages prefixed with '@' |
1716 | * are processed by the DM core. All others are delivered to the target. | |
a2606241 MP |
1717 | * Returns a number <= 1 if message was processed by device mapper. |
1718 | * Returns 2 if message should be delivered to the target. | |
1719 | */ | |
86a3238c HM |
1720 | static int message_for_md(struct mapped_device *md, unsigned int argc, char **argv, |
1721 | char *result, unsigned int maxlen) | |
a2606241 | 1722 | { |
fd2ed4d2 MP |
1723 | int r; |
1724 | ||
1725 | if (**argv != '@') | |
1726 | return 2; /* no '@' prefix, deliver to target */ | |
1727 | ||
2c140a24 MP |
1728 | if (!strcasecmp(argv[0], "@cancel_deferred_remove")) { |
1729 | if (argc != 1) { | |
1730 | DMERR("Invalid arguments for @cancel_deferred_remove"); | |
1731 | return -EINVAL; | |
1732 | } | |
1733 | return dm_cancel_deferred_remove(md); | |
1734 | } | |
1735 | ||
fd2ed4d2 MP |
1736 | r = dm_stats_message(md, argc, argv, result, maxlen); |
1737 | if (r < 2) | |
1738 | return r; | |
1739 | ||
1740 | DMERR("Unsupported message sent to DM core: %s", argv[0]); | |
1741 | return -EINVAL; | |
a2606241 MP |
1742 | } |
1743 | ||
1da177e4 LT |
1744 | /* |
1745 | * Pass a message to the target that's at the supplied device offset. | |
1746 | */ | |
fc1841e1 | 1747 | static int target_message(struct file *filp, struct dm_ioctl *param, size_t param_size) |
1da177e4 LT |
1748 | { |
1749 | int r, argc; | |
1750 | char **argv; | |
1751 | struct mapped_device *md; | |
1752 | struct dm_table *table; | |
1753 | struct dm_target *ti; | |
1754 | struct dm_target_msg *tmsg = (void *) param + param->data_start; | |
a2606241 MP |
1755 | size_t maxlen; |
1756 | char *result = get_result_buffer(param, param_size, &maxlen); | |
83d5e5b0 | 1757 | int srcu_idx; |
1da177e4 LT |
1758 | |
1759 | md = find_device(param); | |
1760 | if (!md) | |
1761 | return -ENXIO; | |
1762 | ||
027d50f9 | 1763 | if (tmsg < (struct dm_target_msg *) param->data || |
1da177e4 | 1764 | invalid_str(tmsg->message, (void *) param + param_size)) { |
43e6c111 | 1765 | DMERR("Invalid target message parameters."); |
1da177e4 LT |
1766 | r = -EINVAL; |
1767 | goto out; | |
1768 | } | |
1769 | ||
1770 | r = dm_split_args(&argc, &argv, tmsg->message); | |
1771 | if (r) { | |
43e6c111 | 1772 | DMERR("Failed to split target message parameters"); |
1da177e4 LT |
1773 | goto out; |
1774 | } | |
1775 | ||
2ca4c92f | 1776 | if (!argc) { |
43e6c111 | 1777 | DMERR("Empty message received."); |
4d7659bf | 1778 | r = -EINVAL; |
902c6a96 | 1779 | goto out_argv; |
2ca4c92f AK |
1780 | } |
1781 | ||
a2606241 MP |
1782 | r = message_for_md(md, argc, argv, result, maxlen); |
1783 | if (r <= 1) | |
1784 | goto out_argv; | |
1785 | ||
83d5e5b0 | 1786 | table = dm_get_live_table(md, &srcu_idx); |
1da177e4 | 1787 | if (!table) |
83d5e5b0 | 1788 | goto out_table; |
1da177e4 | 1789 | |
c50abeb3 MA |
1790 | if (dm_deleting_md(md)) { |
1791 | r = -ENXIO; | |
1792 | goto out_table; | |
1793 | } | |
1794 | ||
512875bd | 1795 | ti = dm_table_find_target(table, tmsg->sector); |
123d87d5 | 1796 | if (!ti) { |
43e6c111 | 1797 | DMERR("Target message sector outside device."); |
1da177e4 | 1798 | r = -EINVAL; |
512875bd | 1799 | } else if (ti->type->message) |
1eb5fa84 | 1800 | r = ti->type->message(ti, argc, argv, result, maxlen); |
1da177e4 | 1801 | else { |
43e6c111 | 1802 | DMERR("Target type does not support messages"); |
1da177e4 LT |
1803 | r = -EINVAL; |
1804 | } | |
1805 | ||
c50abeb3 | 1806 | out_table: |
83d5e5b0 | 1807 | dm_put_live_table(md, srcu_idx); |
1da177e4 LT |
1808 | out_argv: |
1809 | kfree(argv); | |
1810 | out: | |
a2606241 MP |
1811 | if (r >= 0) |
1812 | __dev_status(md, param); | |
1813 | ||
1814 | if (r == 1) { | |
1815 | param->flags |= DM_DATA_OUT_FLAG; | |
fd2ed4d2 | 1816 | if (dm_message_test_buffer_overflow(result, maxlen)) |
a2606241 MP |
1817 | param->flags |= DM_BUFFER_FULL_FLAG; |
1818 | else | |
1819 | param->data_size = param->data_start + strlen(result) + 1; | |
1820 | r = 0; | |
1821 | } | |
1822 | ||
1da177e4 LT |
1823 | dm_put(md); |
1824 | return r; | |
1825 | } | |
1826 | ||
e2914cc2 MP |
1827 | /* |
1828 | * The ioctl parameter block consists of two parts, a dm_ioctl struct | |
1829 | * followed by a data buffer. This flag is set if the second part, | |
1830 | * which has a variable size, is not used by the function processing | |
1831 | * the ioctl. | |
1832 | */ | |
62e08243 MP |
1833 | #define IOCTL_FLAGS_NO_PARAMS 1 |
1834 | #define IOCTL_FLAGS_ISSUE_GLOBAL_EVENT 2 | |
e2914cc2 | 1835 | |
a4a82ce3 HM |
1836 | /* |
1837 | *--------------------------------------------------------------- | |
1838 | * Implementation of open/close/ioctl on the special char device. | |
1839 | *--------------------------------------------------------------- | |
1840 | */ | |
e2914cc2 | 1841 | static ioctl_fn lookup_ioctl(unsigned int cmd, int *ioctl_flags) |
1da177e4 | 1842 | { |
cf0dec66 | 1843 | static const struct { |
1da177e4 | 1844 | int cmd; |
e2914cc2 | 1845 | int flags; |
1da177e4 LT |
1846 | ioctl_fn fn; |
1847 | } _ioctls[] = { | |
e2914cc2 | 1848 | {DM_VERSION_CMD, 0, NULL}, /* version is dealt with elsewhere */ |
62e08243 | 1849 | {DM_REMOVE_ALL_CMD, IOCTL_FLAGS_NO_PARAMS | IOCTL_FLAGS_ISSUE_GLOBAL_EVENT, remove_all}, |
e2914cc2 MP |
1850 | {DM_LIST_DEVICES_CMD, 0, list_devices}, |
1851 | ||
62e08243 MP |
1852 | {DM_DEV_CREATE_CMD, IOCTL_FLAGS_NO_PARAMS | IOCTL_FLAGS_ISSUE_GLOBAL_EVENT, dev_create}, |
1853 | {DM_DEV_REMOVE_CMD, IOCTL_FLAGS_NO_PARAMS | IOCTL_FLAGS_ISSUE_GLOBAL_EVENT, dev_remove}, | |
1854 | {DM_DEV_RENAME_CMD, IOCTL_FLAGS_ISSUE_GLOBAL_EVENT, dev_rename}, | |
e2914cc2 MP |
1855 | {DM_DEV_SUSPEND_CMD, IOCTL_FLAGS_NO_PARAMS, dev_suspend}, |
1856 | {DM_DEV_STATUS_CMD, IOCTL_FLAGS_NO_PARAMS, dev_status}, | |
1857 | {DM_DEV_WAIT_CMD, 0, dev_wait}, | |
1858 | ||
1859 | {DM_TABLE_LOAD_CMD, 0, table_load}, | |
1860 | {DM_TABLE_CLEAR_CMD, IOCTL_FLAGS_NO_PARAMS, table_clear}, | |
1861 | {DM_TABLE_DEPS_CMD, 0, table_deps}, | |
1862 | {DM_TABLE_STATUS_CMD, 0, table_status}, | |
1863 | ||
1864 | {DM_LIST_VERSIONS_CMD, 0, list_versions}, | |
1865 | ||
1866 | {DM_TARGET_MSG_CMD, 0, target_message}, | |
fc1841e1 | 1867 | {DM_DEV_SET_GEOMETRY_CMD, 0, dev_set_geometry}, |
b52c3de8 MP |
1868 | {DM_DEV_ARM_POLL_CMD, IOCTL_FLAGS_NO_PARAMS, dev_arm_poll}, |
1869 | {DM_GET_TARGET_VERSION_CMD, 0, get_target_version}, | |
1da177e4 LT |
1870 | }; |
1871 | ||
e2914cc2 MP |
1872 | if (unlikely(cmd >= ARRAY_SIZE(_ioctls))) |
1873 | return NULL; | |
1874 | ||
cd9c88da | 1875 | cmd = array_index_nospec(cmd, ARRAY_SIZE(_ioctls)); |
e2914cc2 MP |
1876 | *ioctl_flags = _ioctls[cmd].flags; |
1877 | return _ioctls[cmd].fn; | |
1da177e4 LT |
1878 | } |
1879 | ||
1880 | /* | |
1881 | * As well as checking the version compatibility this always | |
1882 | * copies the kernel interface version out. | |
1883 | */ | |
249bed82 DMO |
1884 | static int check_version(unsigned int cmd, struct dm_ioctl __user *user, |
1885 | struct dm_ioctl *kernel_params) | |
1da177e4 | 1886 | { |
1da177e4 LT |
1887 | int r = 0; |
1888 | ||
249bed82 DMO |
1889 | /* Make certain version is first member of dm_ioctl struct */ |
1890 | BUILD_BUG_ON(offsetof(struct dm_ioctl, version) != 0); | |
1891 | ||
1892 | if (copy_from_user(kernel_params->version, user->version, sizeof(kernel_params->version))) | |
1da177e4 LT |
1893 | return -EFAULT; |
1894 | ||
249bed82 DMO |
1895 | if ((kernel_params->version[0] != DM_VERSION_MAJOR) || |
1896 | (kernel_params->version[1] > DM_VERSION_MINOR)) { | |
2e84fecf | 1897 | DMERR("ioctl interface mismatch: kernel(%u.%u.%u), user(%u.%u.%u), cmd(%d)", |
43e6c111 MP |
1898 | DM_VERSION_MAJOR, DM_VERSION_MINOR, |
1899 | DM_VERSION_PATCHLEVEL, | |
249bed82 DMO |
1900 | kernel_params->version[0], |
1901 | kernel_params->version[1], | |
1902 | kernel_params->version[2], | |
1903 | cmd); | |
1da177e4 LT |
1904 | r = -EINVAL; |
1905 | } | |
1906 | ||
1907 | /* | |
1908 | * Fill in the kernel version. | |
1909 | */ | |
249bed82 DMO |
1910 | kernel_params->version[0] = DM_VERSION_MAJOR; |
1911 | kernel_params->version[1] = DM_VERSION_MINOR; | |
1912 | kernel_params->version[2] = DM_VERSION_PATCHLEVEL; | |
1913 | if (copy_to_user(user->version, kernel_params->version, sizeof(kernel_params->version))) | |
1da177e4 LT |
1914 | return -EFAULT; |
1915 | ||
1916 | return r; | |
1917 | } | |
1918 | ||
028b39e3 | 1919 | #define DM_PARAMS_MALLOC 0x0001 /* Params allocated with kvmalloc() */ |
9c5091f2 MP |
1920 | #define DM_WIPE_BUFFER 0x0010 /* Wipe input buffer before returning from ioctl */ |
1921 | ||
1922 | static void free_params(struct dm_ioctl *param, size_t param_size, int param_flags) | |
1923 | { | |
1924 | if (param_flags & DM_WIPE_BUFFER) | |
1925 | memset(param, 0, param_size); | |
1926 | ||
028b39e3 BVA |
1927 | if (param_flags & DM_PARAMS_MALLOC) |
1928 | kvfree(param); | |
9c5091f2 MP |
1929 | } |
1930 | ||
02cde50b | 1931 | static int copy_params(struct dm_ioctl __user *user, struct dm_ioctl *param_kernel, |
800a7340 | 1932 | int ioctl_flags, struct dm_ioctl **param, int *param_flags) |
1da177e4 | 1933 | { |
02cde50b | 1934 | struct dm_ioctl *dmi; |
f8681205 | 1935 | int secure_data; |
6080758d | 1936 | const size_t minimum_data_size = offsetof(struct dm_ioctl, data); |
1da177e4 | 1937 | |
249bed82 DMO |
1938 | /* check_version() already copied version from userspace, avoid TOCTOU */ |
1939 | if (copy_from_user((char *)param_kernel + sizeof(param_kernel->version), | |
1940 | (char __user *)user + sizeof(param_kernel->version), | |
1941 | minimum_data_size - sizeof(param_kernel->version))) | |
1da177e4 LT |
1942 | return -EFAULT; |
1943 | ||
bd504bcf MP |
1944 | if (unlikely(param_kernel->data_size < minimum_data_size) || |
1945 | unlikely(param_kernel->data_size > DM_MAX_TARGETS * DM_MAX_TARGET_PARAMS)) { | |
dbdcc906 MP |
1946 | DMERR("Invalid data size in the ioctl structure: %u", |
1947 | param_kernel->data_size); | |
1da177e4 | 1948 | return -EINVAL; |
dbdcc906 | 1949 | } |
1da177e4 | 1950 | |
02cde50b | 1951 | secure_data = param_kernel->flags & DM_SECURE_DATA_FLAG; |
f8681205 | 1952 | |
9c5091f2 MP |
1953 | *param_flags = secure_data ? DM_WIPE_BUFFER : 0; |
1954 | ||
02cde50b MP |
1955 | if (ioctl_flags & IOCTL_FLAGS_NO_PARAMS) { |
1956 | dmi = param_kernel; | |
1957 | dmi->data_size = minimum_data_size; | |
1958 | goto data_copied; | |
1959 | } | |
1960 | ||
5023e5cf | 1961 | /* |
8c1e2162 JS |
1962 | * Use __GFP_HIGH to avoid low memory issues when a device is |
1963 | * suspended and the ioctl is needed to resume it. | |
9c5091f2 | 1964 | * Use kmalloc() rather than vmalloc() when we can. |
5023e5cf | 1965 | */ |
9c5091f2 | 1966 | dmi = NULL; |
e2c789ca | 1967 | dmi = kvmalloc(param_kernel->data_size, GFP_NOIO | __GFP_HIGH); |
9c5091f2 | 1968 | |
f8681205 | 1969 | if (!dmi) { |
02cde50b | 1970 | if (secure_data && clear_user(user, param_kernel->data_size)) |
f8681205 | 1971 | return -EFAULT; |
1da177e4 | 1972 | return -ENOMEM; |
f8681205 | 1973 | } |
1da177e4 | 1974 | |
028b39e3 BVA |
1975 | *param_flags |= DM_PARAMS_MALLOC; |
1976 | ||
800a7340 WW |
1977 | /* Copy from param_kernel (which was already copied from user) */ |
1978 | memcpy(dmi, param_kernel, minimum_data_size); | |
1da177e4 | 1979 | |
800a7340 WW |
1980 | if (copy_from_user(&dmi->data, (char __user *)user + minimum_data_size, |
1981 | param_kernel->data_size - minimum_data_size)) | |
e910d7eb | 1982 | goto bad; |
800a7340 | 1983 | data_copied: |
f8681205 | 1984 | /* Wipe the user buffer so we do not return it to userspace */ |
02cde50b | 1985 | if (secure_data && clear_user(user, param_kernel->data_size)) |
f8681205 MB |
1986 | goto bad; |
1987 | ||
1da177e4 LT |
1988 | *param = dmi; |
1989 | return 0; | |
6bb43b5d MB |
1990 | |
1991 | bad: | |
02cde50b | 1992 | free_params(dmi, param_kernel->data_size, *param_flags); |
9c5091f2 | 1993 | |
6bb43b5d | 1994 | return -EFAULT; |
1da177e4 LT |
1995 | } |
1996 | ||
1997 | static int validate_params(uint cmd, struct dm_ioctl *param) | |
1998 | { | |
1999 | /* Always clear this flag */ | |
2000 | param->flags &= ~DM_BUFFER_FULL_FLAG; | |
3abf85b5 | 2001 | param->flags &= ~DM_UEVENT_GENERATED_FLAG; |
f8681205 | 2002 | param->flags &= ~DM_SECURE_DATA_FLAG; |
a2606241 | 2003 | param->flags &= ~DM_DATA_OUT_FLAG; |
1da177e4 LT |
2004 | |
2005 | /* Ignores parameters */ | |
2006 | if (cmd == DM_REMOVE_ALL_CMD || | |
2007 | cmd == DM_LIST_DEVICES_CMD || | |
2008 | cmd == DM_LIST_VERSIONS_CMD) | |
2009 | return 0; | |
2010 | ||
e36215d8 | 2011 | if (cmd == DM_DEV_CREATE_CMD) { |
1da177e4 | 2012 | if (!*param->name) { |
43e6c111 | 2013 | DMERR("name not supplied when creating device"); |
1da177e4 LT |
2014 | return -EINVAL; |
2015 | } | |
e36215d8 | 2016 | } else if (*param->uuid && *param->name) { |
43e6c111 | 2017 | DMERR("only supply one of name or uuid, cmd(%u)", cmd); |
1da177e4 LT |
2018 | return -EINVAL; |
2019 | } | |
2020 | ||
2021 | /* Ensure strings are terminated */ | |
2022 | param->name[DM_NAME_LEN - 1] = '\0'; | |
2023 | param->uuid[DM_UUID_LEN - 1] = '\0'; | |
2024 | ||
2025 | return 0; | |
2026 | } | |
2027 | ||
fc1841e1 | 2028 | static int ctl_ioctl(struct file *file, uint command, struct dm_ioctl __user *user) |
1da177e4 LT |
2029 | { |
2030 | int r = 0; | |
e2914cc2 | 2031 | int ioctl_flags; |
9c5091f2 | 2032 | int param_flags; |
1da177e4 | 2033 | unsigned int cmd; |
3f649ab7 | 2034 | struct dm_ioctl *param; |
1da177e4 | 2035 | ioctl_fn fn = NULL; |
6bb43b5d | 2036 | size_t input_param_size; |
02cde50b | 2037 | struct dm_ioctl param_kernel; |
1da177e4 LT |
2038 | |
2039 | /* only root can play with this */ | |
2040 | if (!capable(CAP_SYS_ADMIN)) | |
2041 | return -EACCES; | |
2042 | ||
2043 | if (_IOC_TYPE(command) != DM_IOCTL) | |
2044 | return -ENOTTY; | |
2045 | ||
2046 | cmd = _IOC_NR(command); | |
2047 | ||
2048 | /* | |
2049 | * Check the interface version passed in. This also | |
2050 | * writes out the kernel's interface version. | |
2051 | */ | |
249bed82 | 2052 | r = check_version(cmd, user, ¶m_kernel); |
1da177e4 LT |
2053 | if (r) |
2054 | return r; | |
2055 | ||
2056 | /* | |
2057 | * Nothing more to do for the version command. | |
2058 | */ | |
2059 | if (cmd == DM_VERSION_CMD) | |
2060 | return 0; | |
2061 | ||
e2914cc2 | 2062 | fn = lookup_ioctl(cmd, &ioctl_flags); |
1da177e4 | 2063 | if (!fn) { |
43e6c111 | 2064 | DMERR("dm_ctl_ioctl: unknown command 0x%x", command); |
1da177e4 LT |
2065 | return -ENOTTY; |
2066 | } | |
2067 | ||
1da177e4 LT |
2068 | /* |
2069 | * Copy the parameters into kernel space. | |
2070 | */ | |
02cde50b | 2071 | r = copy_params(user, ¶m_kernel, ioctl_flags, ¶m, ¶m_flags); |
1da177e4 | 2072 | |
dab6a429 AK |
2073 | if (r) |
2074 | return r; | |
1da177e4 | 2075 | |
f8681205 | 2076 | input_param_size = param->data_size; |
1da177e4 LT |
2077 | r = validate_params(cmd, param); |
2078 | if (r) | |
2079 | goto out; | |
2080 | ||
4617f564 | 2081 | param->data_size = offsetof(struct dm_ioctl, data); |
fc1841e1 | 2082 | r = fn(file, param, input_param_size); |
1da177e4 | 2083 | |
e2914cc2 MP |
2084 | if (unlikely(param->flags & DM_BUFFER_FULL_FLAG) && |
2085 | unlikely(ioctl_flags & IOCTL_FLAGS_NO_PARAMS)) | |
2086 | DMERR("ioctl %d tried to output some data but has IOCTL_FLAGS_NO_PARAMS set", cmd); | |
2087 | ||
62e08243 MP |
2088 | if (!r && ioctl_flags & IOCTL_FLAGS_ISSUE_GLOBAL_EVENT) |
2089 | dm_issue_global_event(); | |
2090 | ||
1da177e4 LT |
2091 | /* |
2092 | * Copy the results back to userland. | |
2093 | */ | |
2094 | if (!r && copy_to_user(user, param, param->data_size)) | |
2095 | r = -EFAULT; | |
2096 | ||
6bb43b5d | 2097 | out: |
9c5091f2 | 2098 | free_params(param, input_param_size, param_flags); |
1da177e4 LT |
2099 | return r; |
2100 | } | |
2101 | ||
27238b2b AK |
2102 | static long dm_ctl_ioctl(struct file *file, uint command, ulong u) |
2103 | { | |
fc1841e1 | 2104 | return (long)ctl_ioctl(file, command, (struct dm_ioctl __user *)u); |
27238b2b AK |
2105 | } |
2106 | ||
76c072b4 MB |
2107 | #ifdef CONFIG_COMPAT |
2108 | static long dm_compat_ctl_ioctl(struct file *file, uint command, ulong u) | |
2109 | { | |
2110 | return (long)dm_ctl_ioctl(file, command, (ulong) compat_ptr(u)); | |
2111 | } | |
2112 | #else | |
2113 | #define dm_compat_ctl_ioctl NULL | |
2114 | #endif | |
2115 | ||
93e6442c MP |
2116 | static int dm_open(struct inode *inode, struct file *filp) |
2117 | { | |
2118 | int r; | |
2119 | struct dm_file *priv; | |
2120 | ||
2121 | r = nonseekable_open(inode, filp); | |
2122 | if (unlikely(r)) | |
2123 | return r; | |
2124 | ||
2125 | priv = filp->private_data = kmalloc(sizeof(struct dm_file), GFP_KERNEL); | |
2126 | if (!priv) | |
2127 | return -ENOMEM; | |
2128 | ||
2129 | priv->global_event_nr = atomic_read(&dm_global_event_nr); | |
2130 | ||
2131 | return 0; | |
2132 | } | |
2133 | ||
2134 | static int dm_release(struct inode *inode, struct file *filp) | |
2135 | { | |
2136 | kfree(filp->private_data); | |
2137 | return 0; | |
2138 | } | |
2139 | ||
afc9a42b | 2140 | static __poll_t dm_poll(struct file *filp, poll_table *wait) |
93e6442c MP |
2141 | { |
2142 | struct dm_file *priv = filp->private_data; | |
afc9a42b | 2143 | __poll_t mask = 0; |
93e6442c MP |
2144 | |
2145 | poll_wait(filp, &dm_global_eventq, wait); | |
2146 | ||
2147 | if ((int)(atomic_read(&dm_global_event_nr) - priv->global_event_nr) > 0) | |
a9a08845 | 2148 | mask |= EPOLLIN; |
93e6442c MP |
2149 | |
2150 | return mask; | |
2151 | } | |
2152 | ||
fa027c2a | 2153 | static const struct file_operations _ctl_fops = { |
93e6442c MP |
2154 | .open = dm_open, |
2155 | .release = dm_release, | |
2156 | .poll = dm_poll, | |
27238b2b | 2157 | .unlocked_ioctl = dm_ctl_ioctl, |
76c072b4 | 2158 | .compat_ioctl = dm_compat_ctl_ioctl, |
1da177e4 | 2159 | .owner = THIS_MODULE, |
6038f373 | 2160 | .llseek = noop_llseek, |
1da177e4 LT |
2161 | }; |
2162 | ||
2163 | static struct miscdevice _dm_misc = { | |
7e507eb6 | 2164 | .minor = MAPPER_CTRL_MINOR, |
8ca817c4 | 2165 | .name = DM_NAME, |
7e507eb6 | 2166 | .nodename = DM_DIR "/" DM_CONTROL_NODE, |
8ca817c4 | 2167 | .fops = &_ctl_fops |
1da177e4 LT |
2168 | }; |
2169 | ||
7e507eb6 PR |
2170 | MODULE_ALIAS_MISCDEV(MAPPER_CTRL_MINOR); |
2171 | MODULE_ALIAS("devname:" DM_DIR "/" DM_CONTROL_NODE); | |
2172 | ||
1da177e4 LT |
2173 | /* |
2174 | * Create misc character device and link to DM_DIR/control. | |
2175 | */ | |
2176 | int __init dm_interface_init(void) | |
2177 | { | |
2178 | int r; | |
2179 | ||
1da177e4 LT |
2180 | r = misc_register(&_dm_misc); |
2181 | if (r) { | |
2182 | DMERR("misc_register failed for control device"); | |
1da177e4 LT |
2183 | return r; |
2184 | } | |
2185 | ||
2186 | DMINFO("%d.%d.%d%s initialised: %s", DM_VERSION_MAJOR, | |
2187 | DM_VERSION_MINOR, DM_VERSION_PATCHLEVEL, DM_VERSION_EXTRA, | |
2188 | DM_DRIVER_EMAIL); | |
2189 | return 0; | |
2190 | } | |
2191 | ||
2192 | void dm_interface_exit(void) | |
2193 | { | |
f368ed60 | 2194 | misc_deregister(&_dm_misc); |
1da177e4 LT |
2195 | dm_hash_exit(); |
2196 | } | |
96a1f7db MA |
2197 | |
2198 | /** | |
2199 | * dm_copy_name_and_uuid - Copy mapped device name & uuid into supplied buffers | |
2200 | * @md: Pointer to mapped_device | |
2201 | * @name: Buffer (size DM_NAME_LEN) for name | |
2202 | * @uuid: Buffer (size DM_UUID_LEN) for uuid or empty string if uuid not defined | |
2203 | */ | |
2204 | int dm_copy_name_and_uuid(struct mapped_device *md, char *name, char *uuid) | |
2205 | { | |
2206 | int r = 0; | |
2207 | struct hash_cell *hc; | |
2208 | ||
2209 | if (!md) | |
2210 | return -ENXIO; | |
2211 | ||
6076905b | 2212 | mutex_lock(&dm_hash_cells_mutex); |
96a1f7db | 2213 | hc = dm_get_mdptr(md); |
a2f998a7 | 2214 | if (!hc) { |
96a1f7db MA |
2215 | r = -ENXIO; |
2216 | goto out; | |
2217 | } | |
2218 | ||
23d39f63 MB |
2219 | if (name) |
2220 | strcpy(name, hc->name); | |
2221 | if (uuid) | |
2222 | strcpy(uuid, hc->uuid ? : ""); | |
96a1f7db MA |
2223 | |
2224 | out: | |
6076905b | 2225 | mutex_unlock(&dm_hash_cells_mutex); |
96a1f7db MA |
2226 | |
2227 | return r; | |
2228 | } | |
61931c0e | 2229 | EXPORT_SYMBOL_GPL(dm_copy_name_and_uuid); |
6bbc923d HK |
2230 | |
2231 | /** | |
2232 | * dm_early_create - create a mapped device in early boot. | |
2233 | * | |
2234 | * @dmi: Contains main information of the device mapping to be created. | |
2235 | * @spec_array: array of pointers to struct dm_target_spec. Describes the | |
2236 | * mapping table of the device. | |
2237 | * @target_params_array: array of strings with the parameters to a specific | |
2238 | * target. | |
2239 | * | |
2240 | * Instead of having the struct dm_target_spec and the parameters for every | |
2241 | * target embedded at the end of struct dm_ioctl (as performed in a normal | |
2242 | * ioctl), pass them as arguments, so the caller doesn't need to serialize them. | |
2243 | * The size of the spec_array and target_params_array is given by | |
2244 | * @dmi->target_count. | |
2245 | * This function is supposed to be called in early boot, so locking mechanisms | |
2246 | * to protect against concurrent loads are not required. | |
2247 | */ | |
2248 | int __init dm_early_create(struct dm_ioctl *dmi, | |
2249 | struct dm_target_spec **spec_array, | |
2250 | char **target_params_array) | |
2251 | { | |
2252 | int r, m = DM_ANY_MINOR; | |
2253 | struct dm_table *t, *old_map; | |
2254 | struct mapped_device *md; | |
2255 | unsigned int i; | |
2256 | ||
2257 | if (!dmi->target_count) | |
2258 | return -EINVAL; | |
2259 | ||
2260 | r = check_name(dmi->name); | |
2261 | if (r) | |
2262 | return r; | |
2263 | ||
2264 | if (dmi->flags & DM_PERSISTENT_DEV_FLAG) | |
2265 | m = MINOR(huge_decode_dev(dmi->dev)); | |
2266 | ||
2267 | /* alloc dm device */ | |
2268 | r = dm_create(m, &md); | |
2269 | if (r) | |
2270 | return r; | |
2271 | ||
2272 | /* hash insert */ | |
2273 | r = dm_hash_insert(dmi->name, *dmi->uuid ? dmi->uuid : NULL, md); | |
2274 | if (r) | |
2275 | goto err_destroy_dm; | |
2276 | ||
2277 | /* alloc table */ | |
2278 | r = dm_table_create(&t, get_mode(dmi), dmi->target_count, md); | |
2279 | if (r) | |
0f41fcf7 | 2280 | goto err_hash_remove; |
6bbc923d HK |
2281 | |
2282 | /* add targets */ | |
2283 | for (i = 0; i < dmi->target_count; i++) { | |
2284 | r = dm_table_add_target(t, spec_array[i]->target_type, | |
2285 | (sector_t) spec_array[i]->sector_start, | |
2286 | (sector_t) spec_array[i]->length, | |
2287 | target_params_array[i]); | |
2288 | if (r) { | |
43e6c111 | 2289 | DMERR("error adding target to table"); |
6bbc923d HK |
2290 | goto err_destroy_table; |
2291 | } | |
2292 | } | |
2293 | ||
2294 | /* finish table */ | |
2295 | r = dm_table_complete(t); | |
2296 | if (r) | |
2297 | goto err_destroy_table; | |
2298 | ||
6bbc923d HK |
2299 | /* setup md->queue to reflect md's type (may block) */ |
2300 | r = dm_setup_md_queue(md, t); | |
2301 | if (r) { | |
43e6c111 | 2302 | DMERR("unable to set up device queue for new table."); |
6bbc923d HK |
2303 | goto err_destroy_table; |
2304 | } | |
2305 | ||
2306 | /* Set new map */ | |
2307 | dm_suspend(md, 0); | |
2308 | old_map = dm_swap_table(md, t); | |
2309 | if (IS_ERR(old_map)) { | |
2310 | r = PTR_ERR(old_map); | |
2311 | goto err_destroy_table; | |
2312 | } | |
2313 | set_disk_ro(dm_disk(md), !!(dmi->flags & DM_READONLY_FLAG)); | |
2314 | ||
2315 | /* resume device */ | |
2316 | r = dm_resume(md); | |
2317 | if (r) | |
2318 | goto err_destroy_table; | |
2319 | ||
2320 | DMINFO("%s (%s) is ready", md->disk->disk_name, dmi->name); | |
2321 | dm_put(md); | |
2322 | return 0; | |
2323 | ||
2324 | err_destroy_table: | |
2325 | dm_table_destroy(t); | |
0f41fcf7 | 2326 | err_hash_remove: |
69868beb | 2327 | down_write(&_hash_lock); |
0f41fcf7 | 2328 | (void) __hash_remove(__get_name_cell(dmi->name)); |
69868beb | 2329 | up_write(&_hash_lock); |
0f41fcf7 HK |
2330 | /* release reference from __get_name_cell */ |
2331 | dm_put(md); | |
6bbc923d HK |
2332 | err_destroy_dm: |
2333 | dm_put(md); | |
2334 | dm_destroy(md); | |
2335 | return r; | |
2336 | } |