2019-05-19 20:08:55 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Copyright (C) 1991, 1992 Linus Torvalds
|
|
|
|
* Copyright (C) 2001 Andrea Arcangeli <andrea@suse.de> SuSE
|
2020-12-10 15:55:44 +08:00
|
|
|
* Copyright (C) 2016 - 2020 Christoph Hellwig
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/mm.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/kmod.h>
|
|
|
|
#include <linux/major.h>
|
2008-06-06 13:46:27 +08:00
|
|
|
#include <linux/device_cgroup.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/blkdev.h>
|
2021-09-20 20:33:27 +08:00
|
|
|
#include <linux/blk-integrity.h>
|
2015-05-23 05:13:32 +08:00
|
|
|
#include <linux/backing-dev.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/blkpg.h>
|
2012-03-24 06:01:50 +08:00
|
|
|
#include <linux/magic.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/buffer_head.h>
|
2011-09-16 14:31:11 +08:00
|
|
|
#include <linux/swap.h>
|
2006-08-30 02:06:09 +08:00
|
|
|
#include <linux/writeback.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/mount.h>
|
2019-03-26 00:38:23 +08:00
|
|
|
#include <linux/pseudo_fs.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/uio.h>
|
|
|
|
#include <linux/namei.h>
|
block,lsm: add LSM blob and new LSM hooks for block devices
This patch introduces a new LSM blob to the block_device structure,
enabling the security subsystem to store security-sensitive data related
to block devices. Currently, for a device mapper's mapped device containing
a dm-verity target, critical security information such as the roothash and
its signing state are not readily accessible. Specifically, while the
dm-verity volume creation process passes the dm-verity roothash and its
signature from userspace to the kernel, the roothash is stored privately
within the dm-verity target, and its signature is discarded
post-verification. This makes it extremely hard for the security subsystem
to utilize these data.
With the addition of the LSM blob to the block_device structure, the
security subsystem can now retain and manage important security metadata
such as the roothash and the signing state of a dm-verity by storing them
inside the blob. Access decisions can then be based on these stored data.
The implementation follows the same approach used for security blobs in
other structures like struct file, struct inode, and struct superblock.
The initialization of the security blob occurs after the creation of the
struct block_device, performed by the security subsystem. Similarly, the
security blob is freed by the security subsystem before the struct
block_device is deallocated or freed.
This patch also introduces a new hook security_bdev_setintegrity() to save
block device's integrity data to the new LSM blob. For example, for
dm-verity, it can use this hook to expose its roothash and signing state
to LSMs, then LSMs can save these data into the LSM blob.
Please note that the new hook should be invoked every time the security
information is updated to keep these data current. For example, in
dm-verity, if the mapping table is reloaded and configured to use a
different dm-verity target with a new roothash and signing information,
the previously stored data in the LSM blob will become obsolete. It is
crucial to re-invoke the hook to refresh these data and ensure they are up
to date. This necessity arises from the design of device-mapper, where a
device-mapper device is first created, and then targets are subsequently
loaded into it. These targets can be modified multiple times during the
device's lifetime. Therefore, while the LSM blob is allocated during the
creation of the block device, its actual contents are not initialized at
this stage and can change substantially over time. This includes
alterations from data that the LSM 'trusts' to those it does not, making
it essential to handle these changes correctly. Failure to address this
dynamic aspect could potentially allow for bypassing LSM checks.
Signed-off-by: Deven Bowers <deven.desai@linux.microsoft.com>
Signed-off-by: Fan Wu <wufan@linux.microsoft.com>
[PM: merge fuzz, subject line tweaks]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2024-08-03 14:08:25 +08:00
|
|
|
#include <linux/security.h>
|
2020-11-24 16:34:00 +08:00
|
|
|
#include <linux/part_stat.h>
|
2016-12-25 03:46:01 +08:00
|
|
|
#include <linux/uaccess.h>
|
2022-08-27 14:58:45 +08:00
|
|
|
#include <linux/stat.h>
|
2021-09-07 22:13:03 +08:00
|
|
|
#include "../fs/internal.h"
|
|
|
|
#include "blk.h"
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2023-11-02 01:43:08 +08:00
|
|
|
/* Should we allow writing to mounted block devices? */
|
|
|
|
static bool bdev_allow_write_mounted = IS_ENABLED(CONFIG_BLK_DEV_WRITE_MOUNTED);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
struct bdev_inode {
|
|
|
|
struct block_device bdev;
|
|
|
|
struct inode vfs_inode;
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline struct bdev_inode *BDEV_I(struct inode *inode)
|
|
|
|
{
|
|
|
|
return container_of(inode, struct bdev_inode, vfs_inode);
|
|
|
|
}
|
|
|
|
|
2024-04-29 07:09:12 +08:00
|
|
|
static inline struct inode *BD_INODE(struct block_device *bdev)
|
|
|
|
{
|
|
|
|
return &container_of(bdev, struct bdev_inode, bdev)->vfs_inode;
|
|
|
|
}
|
|
|
|
|
2015-06-26 19:58:32 +08:00
|
|
|
struct block_device *I_BDEV(struct inode *inode)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
return &BDEV_I(inode)->bdev;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(I_BDEV);
|
|
|
|
|
2024-02-09 01:47:35 +08:00
|
|
|
struct block_device *file_bdev(struct file *bdev_file)
|
|
|
|
{
|
2024-01-23 21:26:47 +08:00
|
|
|
return I_BDEV(bdev_file->f_mapping->host);
|
2024-02-09 01:47:35 +08:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(file_bdev);
|
|
|
|
|
2015-11-10 00:23:40 +08:00
|
|
|
static void bdev_write_inode(struct block_device *bdev)
|
2015-01-14 17:42:33 +08:00
|
|
|
{
|
2024-04-29 07:09:12 +08:00
|
|
|
struct inode *inode = BD_INODE(bdev);
|
2015-11-10 00:23:40 +08:00
|
|
|
int ret;
|
|
|
|
|
2015-01-14 17:42:33 +08:00
|
|
|
spin_lock(&inode->i_lock);
|
|
|
|
while (inode->i_state & I_DIRTY) {
|
|
|
|
spin_unlock(&inode->i_lock);
|
2015-11-10 00:23:40 +08:00
|
|
|
ret = write_inode_now(inode, true);
|
2022-07-13 13:53:09 +08:00
|
|
|
if (ret)
|
|
|
|
pr_warn_ratelimited(
|
|
|
|
"VFS: Dirty inode writeback failed for block device %pg (err=%d).\n",
|
|
|
|
bdev, ret);
|
2015-01-14 17:42:33 +08:00
|
|
|
spin_lock(&inode->i_lock);
|
|
|
|
}
|
|
|
|
spin_unlock(&inode->i_lock);
|
|
|
|
}
|
|
|
|
|
2007-05-07 05:49:55 +08:00
|
|
|
/* Kill _all_ buffers and pagecache , dirty or not.. */
|
2020-06-18 12:21:38 +08:00
|
|
|
static void kill_bdev(struct block_device *bdev)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2024-04-11 22:53:37 +08:00
|
|
|
struct address_space *mapping = bdev->bd_mapping;
|
2011-09-16 14:31:11 +08:00
|
|
|
|
2021-05-05 09:32:45 +08:00
|
|
|
if (mapping_empty(mapping))
|
2007-05-07 05:49:55 +08:00
|
|
|
return;
|
2011-09-16 14:31:11 +08:00
|
|
|
|
2007-05-07 05:49:55 +08:00
|
|
|
invalidate_bh_lrus();
|
2011-09-16 14:31:11 +08:00
|
|
|
truncate_inode_pages(mapping, 0);
|
2020-06-18 12:21:38 +08:00
|
|
|
}
|
2011-09-16 14:31:11 +08:00
|
|
|
|
|
|
|
/* Invalidate clean unused buffers and pagecache. */
|
|
|
|
void invalidate_bdev(struct block_device *bdev)
|
|
|
|
{
|
2024-04-11 22:53:37 +08:00
|
|
|
struct address_space *mapping = bdev->bd_mapping;
|
2011-09-16 14:31:11 +08:00
|
|
|
|
2017-05-04 05:56:02 +08:00
|
|
|
if (mapping->nrpages) {
|
|
|
|
invalidate_bh_lrus();
|
|
|
|
lru_add_drain_all(); /* make sure all lru add caches are flushed */
|
|
|
|
invalidate_mapping_pages(mapping, 0, -1);
|
|
|
|
}
|
2011-09-16 14:31:11 +08:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(invalidate_bdev);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2020-09-04 16:58:52 +08:00
|
|
|
/*
|
|
|
|
* Drop all buffers & page cache for given bdev range. This function bails
|
|
|
|
* with error if bdev has other exclusive owner (such as filesystem).
|
|
|
|
*/
|
2023-06-08 19:02:55 +08:00
|
|
|
int truncate_bdev_range(struct block_device *bdev, blk_mode_t mode,
|
2020-09-04 16:58:52 +08:00
|
|
|
loff_t lstart, loff_t lend)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* If we don't hold exclusive handle for the device, upgrade to it
|
|
|
|
* while we discard the buffer cache to avoid discarding buffers
|
|
|
|
* under live filesystem.
|
|
|
|
*/
|
2023-06-08 19:02:55 +08:00
|
|
|
if (!(mode & BLK_OPEN_EXCL)) {
|
2023-06-01 17:44:52 +08:00
|
|
|
int err = bd_prepare_to_claim(bdev, truncate_bdev_range, NULL);
|
2020-09-04 16:58:52 +08:00
|
|
|
if (err)
|
2021-02-22 17:48:09 +08:00
|
|
|
goto invalidate;
|
2020-09-04 16:58:52 +08:00
|
|
|
}
|
2020-11-26 04:20:08 +08:00
|
|
|
|
2024-04-11 22:53:37 +08:00
|
|
|
truncate_inode_pages_range(bdev->bd_mapping, lstart, lend);
|
2023-06-08 19:02:55 +08:00
|
|
|
if (!(mode & BLK_OPEN_EXCL))
|
2020-11-26 04:20:08 +08:00
|
|
|
bd_abort_claiming(bdev, truncate_bdev_range);
|
2020-09-04 16:58:52 +08:00
|
|
|
return 0;
|
2021-02-22 17:48:09 +08:00
|
|
|
|
|
|
|
invalidate:
|
|
|
|
/*
|
|
|
|
* Someone else has handle exclusively open. Try invalidating instead.
|
|
|
|
* The 'end' argument is inclusive so the rounding is safe.
|
|
|
|
*/
|
2024-04-11 22:53:37 +08:00
|
|
|
return invalidate_inode_pages2_range(bdev->bd_mapping,
|
2021-02-22 17:48:09 +08:00
|
|
|
lstart >> PAGE_SHIFT,
|
|
|
|
lend >> PAGE_SHIFT);
|
2020-09-04 16:58:52 +08:00
|
|
|
}
|
|
|
|
|
2019-01-14 16:48:10 +08:00
|
|
|
static void set_init_blocksize(struct block_device *bdev)
|
|
|
|
{
|
2021-01-27 03:59:07 +08:00
|
|
|
unsigned int bsize = bdev_logical_block_size(bdev);
|
2024-04-29 07:09:12 +08:00
|
|
|
loff_t size = i_size_read(BD_INODE(bdev));
|
2021-01-27 03:59:07 +08:00
|
|
|
|
|
|
|
while (bsize < PAGE_SIZE) {
|
|
|
|
if (size & bsize)
|
|
|
|
break;
|
|
|
|
bsize <<= 1;
|
|
|
|
}
|
2024-04-29 07:09:12 +08:00
|
|
|
BD_INODE(bdev)->i_blkbits = blksize_bits(bsize);
|
2019-01-14 16:48:10 +08:00
|
|
|
}
|
|
|
|
|
2024-04-18 12:34:31 +08:00
|
|
|
int set_blocksize(struct file *file, int size)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2024-04-18 12:34:31 +08:00
|
|
|
struct inode *inode = file->f_mapping->host;
|
|
|
|
struct block_device *bdev = I_BDEV(inode);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* Size must be a power of two, and between 512 and PAGE_SIZE */
|
2007-05-08 15:24:32 +08:00
|
|
|
if (size > PAGE_SIZE || size < 512 || !is_power_of_2(size))
|
2005-04-17 06:20:36 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/* Size cannot be smaller than the size supported by the device */
|
2009-05-23 05:17:49 +08:00
|
|
|
if (size < bdev_logical_block_size(bdev))
|
2005-04-17 06:20:36 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
2024-05-03 05:36:32 +08:00
|
|
|
if (!file->private_data)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* Don't change the size if it is same as current */
|
2024-04-18 12:34:31 +08:00
|
|
|
if (inode->i_blkbits != blksize_bits(size)) {
|
2005-04-17 06:20:36 +08:00
|
|
|
sync_blockdev(bdev);
|
2024-04-18 12:34:31 +08:00
|
|
|
inode->i_blkbits = blksize_bits(size);
|
2005-04-17 06:20:36 +08:00
|
|
|
kill_bdev(bdev);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT_SYMBOL(set_blocksize);
|
|
|
|
|
|
|
|
int sb_set_blocksize(struct super_block *sb, int size)
|
|
|
|
{
|
2024-04-18 12:34:31 +08:00
|
|
|
if (set_blocksize(sb->s_bdev_file, size))
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
|
|
|
/* If we get here, we know size is power of two
|
|
|
|
* and it's value is between 512 and PAGE_SIZE */
|
|
|
|
sb->s_blocksize = size;
|
2006-03-24 19:18:05 +08:00
|
|
|
sb->s_blocksize_bits = blksize_bits(size);
|
2005-04-17 06:20:36 +08:00
|
|
|
return sb->s_blocksize;
|
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT_SYMBOL(sb_set_blocksize);
|
|
|
|
|
|
|
|
int sb_min_blocksize(struct super_block *sb, int size)
|
|
|
|
{
|
2009-05-23 05:17:49 +08:00
|
|
|
int minsize = bdev_logical_block_size(sb->s_bdev);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (size < minsize)
|
|
|
|
size = minsize;
|
|
|
|
return sb_set_blocksize(sb, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT_SYMBOL(sb_min_blocksize);
|
|
|
|
|
2021-10-19 14:25:25 +08:00
|
|
|
int sync_blockdev_nowait(struct block_device *bdev)
|
2009-04-27 22:43:51 +08:00
|
|
|
{
|
|
|
|
if (!bdev)
|
|
|
|
return 0;
|
2024-04-11 22:53:37 +08:00
|
|
|
return filemap_flush(bdev->bd_mapping);
|
2009-04-27 22:43:51 +08:00
|
|
|
}
|
2021-10-19 14:25:25 +08:00
|
|
|
EXPORT_SYMBOL_GPL(sync_blockdev_nowait);
|
2009-04-27 22:43:51 +08:00
|
|
|
|
2009-02-25 17:44:19 +08:00
|
|
|
/*
|
|
|
|
* Write out and wait upon all the dirty data associated with a block
|
|
|
|
* device via its mapping. Does not take the superblock lock.
|
|
|
|
*/
|
|
|
|
int sync_blockdev(struct block_device *bdev)
|
|
|
|
{
|
2021-10-19 14:25:25 +08:00
|
|
|
if (!bdev)
|
|
|
|
return 0;
|
2024-04-11 22:53:37 +08:00
|
|
|
return filemap_write_and_wait(bdev->bd_mapping);
|
2009-02-25 17:44:19 +08:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(sync_blockdev);
|
|
|
|
|
2022-04-12 11:23:10 +08:00
|
|
|
int sync_blockdev_range(struct block_device *bdev, loff_t lstart, loff_t lend)
|
|
|
|
{
|
2024-04-11 22:53:37 +08:00
|
|
|
return filemap_write_and_wait_range(bdev->bd_mapping,
|
2022-04-12 11:23:10 +08:00
|
|
|
lstart, lend);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(sync_blockdev_range);
|
|
|
|
|
2009-02-25 17:44:19 +08:00
|
|
|
/**
|
2023-10-24 21:01:08 +08:00
|
|
|
* bdev_freeze - lock a filesystem and force it into a consistent state
|
2009-02-25 17:44:19 +08:00
|
|
|
* @bdev: blockdevice to lock
|
|
|
|
*
|
|
|
|
* If a superblock is found on this device, we take the s_umount semaphore
|
|
|
|
* on it to make sure nobody unmounts until the snapshot creation is done.
|
|
|
|
* The reference counter (bd_fsfreeze_count) guarantees that only the last
|
|
|
|
* unfreeze process can unfreeze the frozen filesystem actually when multiple
|
2023-10-24 21:01:08 +08:00
|
|
|
* freeze requests arrive simultaneously. It counts up in bdev_freeze() and
|
|
|
|
* count down in bdev_thaw(). When it becomes 0, thaw_bdev() will unfreeze
|
2009-02-25 17:44:19 +08:00
|
|
|
* actually.
|
2023-10-24 21:01:08 +08:00
|
|
|
*
|
|
|
|
* Return: On success zero is returned, negative error code on failure.
|
2009-02-25 17:44:19 +08:00
|
|
|
*/
|
2023-10-24 21:01:08 +08:00
|
|
|
int bdev_freeze(struct block_device *bdev)
|
2009-02-25 17:44:19 +08:00
|
|
|
{
|
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
mutex_lock(&bdev->bd_fsfreeze_mutex);
|
2020-11-24 18:54:06 +08:00
|
|
|
|
2023-09-27 21:21:16 +08:00
|
|
|
if (atomic_inc_return(&bdev->bd_fsfreeze_count) > 1) {
|
|
|
|
mutex_unlock(&bdev->bd_fsfreeze_mutex);
|
|
|
|
return 0;
|
2009-02-25 17:44:19 +08:00
|
|
|
}
|
2020-11-24 18:54:06 +08:00
|
|
|
|
2023-09-27 21:21:16 +08:00
|
|
|
mutex_lock(&bdev->bd_holder_lock);
|
|
|
|
if (bdev->bd_holder_ops && bdev->bd_holder_ops->freeze) {
|
|
|
|
error = bdev->bd_holder_ops->freeze(bdev);
|
|
|
|
lockdep_assert_not_held(&bdev->bd_holder_lock);
|
|
|
|
} else {
|
|
|
|
mutex_unlock(&bdev->bd_holder_lock);
|
|
|
|
error = sync_blockdev(bdev);
|
2009-02-25 17:44:19 +08:00
|
|
|
}
|
2020-11-24 18:54:06 +08:00
|
|
|
|
2023-09-27 21:21:16 +08:00
|
|
|
if (error)
|
|
|
|
atomic_dec(&bdev->bd_fsfreeze_count);
|
|
|
|
|
2009-02-25 17:44:19 +08:00
|
|
|
mutex_unlock(&bdev->bd_fsfreeze_mutex);
|
2020-11-24 18:54:06 +08:00
|
|
|
return error;
|
2009-02-25 17:44:19 +08:00
|
|
|
}
|
2023-10-24 21:01:08 +08:00
|
|
|
EXPORT_SYMBOL(bdev_freeze);
|
2009-02-25 17:44:19 +08:00
|
|
|
|
|
|
|
/**
|
2023-10-24 21:01:08 +08:00
|
|
|
* bdev_thaw - unlock filesystem
|
2009-02-25 17:44:19 +08:00
|
|
|
* @bdev: blockdevice to unlock
|
|
|
|
*
|
2023-10-24 21:01:08 +08:00
|
|
|
* Unlocks the filesystem and marks it writeable again after bdev_freeze().
|
|
|
|
*
|
|
|
|
* Return: On success zero is returned, negative error code on failure.
|
2009-02-25 17:44:19 +08:00
|
|
|
*/
|
2023-10-24 21:01:08 +08:00
|
|
|
int bdev_thaw(struct block_device *bdev)
|
2009-02-25 17:44:19 +08:00
|
|
|
{
|
2023-09-27 21:21:16 +08:00
|
|
|
int error = -EINVAL, nr_freeze;
|
2009-02-25 17:44:19 +08:00
|
|
|
|
|
|
|
mutex_lock(&bdev->bd_fsfreeze_mutex);
|
2023-09-27 21:21:16 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If this returns < 0 it means that @bd_fsfreeze_count was
|
|
|
|
* already 0 and no decrement was performed.
|
|
|
|
*/
|
|
|
|
nr_freeze = atomic_dec_if_positive(&bdev->bd_fsfreeze_count);
|
|
|
|
if (nr_freeze < 0)
|
2010-03-23 22:34:56 +08:00
|
|
|
goto out;
|
2009-08-04 05:28:35 +08:00
|
|
|
|
|
|
|
error = 0;
|
2023-09-27 21:21:16 +08:00
|
|
|
if (nr_freeze > 0)
|
2010-03-23 22:34:56 +08:00
|
|
|
goto out;
|
2009-08-04 05:28:35 +08:00
|
|
|
|
2023-09-27 21:21:16 +08:00
|
|
|
mutex_lock(&bdev->bd_holder_lock);
|
|
|
|
if (bdev->bd_holder_ops && bdev->bd_holder_ops->thaw) {
|
|
|
|
error = bdev->bd_holder_ops->thaw(bdev);
|
|
|
|
lockdep_assert_not_held(&bdev->bd_holder_lock);
|
|
|
|
} else {
|
|
|
|
mutex_unlock(&bdev->bd_holder_lock);
|
|
|
|
}
|
2009-08-04 05:28:35 +08:00
|
|
|
|
2016-10-04 16:53:40 +08:00
|
|
|
if (error)
|
2023-09-27 21:21:16 +08:00
|
|
|
atomic_inc(&bdev->bd_fsfreeze_count);
|
2010-03-23 22:34:56 +08:00
|
|
|
out:
|
2009-02-25 17:44:19 +08:00
|
|
|
mutex_unlock(&bdev->bd_fsfreeze_mutex);
|
2016-10-04 16:53:40 +08:00
|
|
|
return error;
|
2009-02-25 17:44:19 +08:00
|
|
|
}
|
2023-10-24 21:01:08 +08:00
|
|
|
EXPORT_SYMBOL(bdev_thaw);
|
2009-02-25 17:44:19 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* pseudo-fs
|
|
|
|
*/
|
|
|
|
|
2023-06-01 17:44:46 +08:00
|
|
|
static __cacheline_aligned_in_smp DEFINE_MUTEX(bdev_lock);
|
2023-10-12 00:55:00 +08:00
|
|
|
static struct kmem_cache *bdev_cachep __ro_after_init;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
static struct inode *bdev_alloc_inode(struct super_block *sb)
|
|
|
|
{
|
2022-03-23 05:41:03 +08:00
|
|
|
struct bdev_inode *ei = alloc_inode_sb(sb, bdev_cachep, GFP_KERNEL);
|
2021-01-08 02:36:40 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
if (!ei)
|
|
|
|
return NULL;
|
2021-01-08 02:36:40 +08:00
|
|
|
memset(&ei->bdev, 0, sizeof(ei->bdev));
|
block,lsm: add LSM blob and new LSM hooks for block devices
This patch introduces a new LSM blob to the block_device structure,
enabling the security subsystem to store security-sensitive data related
to block devices. Currently, for a device mapper's mapped device containing
a dm-verity target, critical security information such as the roothash and
its signing state are not readily accessible. Specifically, while the
dm-verity volume creation process passes the dm-verity roothash and its
signature from userspace to the kernel, the roothash is stored privately
within the dm-verity target, and its signature is discarded
post-verification. This makes it extremely hard for the security subsystem
to utilize these data.
With the addition of the LSM blob to the block_device structure, the
security subsystem can now retain and manage important security metadata
such as the roothash and the signing state of a dm-verity by storing them
inside the blob. Access decisions can then be based on these stored data.
The implementation follows the same approach used for security blobs in
other structures like struct file, struct inode, and struct superblock.
The initialization of the security blob occurs after the creation of the
struct block_device, performed by the security subsystem. Similarly, the
security blob is freed by the security subsystem before the struct
block_device is deallocated or freed.
This patch also introduces a new hook security_bdev_setintegrity() to save
block device's integrity data to the new LSM blob. For example, for
dm-verity, it can use this hook to expose its roothash and signing state
to LSMs, then LSMs can save these data into the LSM blob.
Please note that the new hook should be invoked every time the security
information is updated to keep these data current. For example, in
dm-verity, if the mapping table is reloaded and configured to use a
different dm-verity target with a new roothash and signing information,
the previously stored data in the LSM blob will become obsolete. It is
crucial to re-invoke the hook to refresh these data and ensure they are up
to date. This necessity arises from the design of device-mapper, where a
device-mapper device is first created, and then targets are subsequently
loaded into it. These targets can be modified multiple times during the
device's lifetime. Therefore, while the LSM blob is allocated during the
creation of the block device, its actual contents are not initialized at
this stage and can change substantially over time. This includes
alterations from data that the LSM 'trusts' to those it does not, making
it essential to handle these changes correctly. Failure to address this
dynamic aspect could potentially allow for bypassing LSM checks.
Signed-off-by: Deven Bowers <deven.desai@linux.microsoft.com>
Signed-off-by: Fan Wu <wufan@linux.microsoft.com>
[PM: merge fuzz, subject line tweaks]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2024-08-03 14:08:25 +08:00
|
|
|
|
|
|
|
if (security_bdev_alloc(&ei->bdev)) {
|
|
|
|
kmem_cache_free(bdev_cachep, ei);
|
|
|
|
return NULL;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
return &ei->vfs_inode;
|
|
|
|
}
|
|
|
|
|
2019-04-11 03:12:38 +08:00
|
|
|
static void bdev_free_inode(struct inode *inode)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2020-11-24 16:34:00 +08:00
|
|
|
struct block_device *bdev = I_BDEV(inode);
|
|
|
|
|
|
|
|
free_percpu(bdev->bd_stats);
|
2020-11-24 19:01:45 +08:00
|
|
|
kfree(bdev->bd_meta_info);
|
block,lsm: add LSM blob and new LSM hooks for block devices
This patch introduces a new LSM blob to the block_device structure,
enabling the security subsystem to store security-sensitive data related
to block devices. Currently, for a device mapper's mapped device containing
a dm-verity target, critical security information such as the roothash and
its signing state are not readily accessible. Specifically, while the
dm-verity volume creation process passes the dm-verity roothash and its
signature from userspace to the kernel, the roothash is stored privately
within the dm-verity target, and its signature is discarded
post-verification. This makes it extremely hard for the security subsystem
to utilize these data.
With the addition of the LSM blob to the block_device structure, the
security subsystem can now retain and manage important security metadata
such as the roothash and the signing state of a dm-verity by storing them
inside the blob. Access decisions can then be based on these stored data.
The implementation follows the same approach used for security blobs in
other structures like struct file, struct inode, and struct superblock.
The initialization of the security blob occurs after the creation of the
struct block_device, performed by the security subsystem. Similarly, the
security blob is freed by the security subsystem before the struct
block_device is deallocated or freed.
This patch also introduces a new hook security_bdev_setintegrity() to save
block device's integrity data to the new LSM blob. For example, for
dm-verity, it can use this hook to expose its roothash and signing state
to LSMs, then LSMs can save these data into the LSM blob.
Please note that the new hook should be invoked every time the security
information is updated to keep these data current. For example, in
dm-verity, if the mapping table is reloaded and configured to use a
different dm-verity target with a new roothash and signing information,
the previously stored data in the LSM blob will become obsolete. It is
crucial to re-invoke the hook to refresh these data and ensure they are up
to date. This necessity arises from the design of device-mapper, where a
device-mapper device is first created, and then targets are subsequently
loaded into it. These targets can be modified multiple times during the
device's lifetime. Therefore, while the LSM blob is allocated during the
creation of the block device, its actual contents are not initialized at
this stage and can change substantially over time. This includes
alterations from data that the LSM 'trusts' to those it does not, making
it essential to handle these changes correctly. Failure to address this
dynamic aspect could potentially allow for bypassing LSM checks.
Signed-off-by: Deven Bowers <deven.desai@linux.microsoft.com>
Signed-off-by: Fan Wu <wufan@linux.microsoft.com>
[PM: merge fuzz, subject line tweaks]
Signed-off-by: Paul Moore <paul@paul-moore.com>
2024-08-03 14:08:25 +08:00
|
|
|
security_bdev_free(bdev);
|
2020-11-24 16:34:00 +08:00
|
|
|
|
2021-08-16 20:26:14 +08:00
|
|
|
if (!bdev_is_partition(bdev)) {
|
|
|
|
if (bdev->bd_disk && bdev->bd_disk->bdi)
|
|
|
|
bdi_put(bdev->bd_disk->bdi);
|
2021-07-22 15:53:54 +08:00
|
|
|
kfree(bdev->bd_disk);
|
2021-08-16 20:26:14 +08:00
|
|
|
}
|
2021-08-16 20:26:13 +08:00
|
|
|
|
|
|
|
if (MAJOR(bdev->bd_dev) == BLOCK_EXT_MAJOR)
|
|
|
|
blk_free_ext_minor(MINOR(bdev->bd_dev));
|
|
|
|
|
2019-04-11 03:12:38 +08:00
|
|
|
kmem_cache_free(bdev_cachep, BDEV_I(inode));
|
2011-01-07 14:49:49 +08:00
|
|
|
}
|
|
|
|
|
2020-11-23 22:41:40 +08:00
|
|
|
static void init_once(void *data)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2020-11-23 22:41:40 +08:00
|
|
|
struct bdev_inode *ei = data;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-05-17 13:10:57 +08:00
|
|
|
inode_init_once(&ei->vfs_inode);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2010-06-08 02:34:48 +08:00
|
|
|
static void bdev_evict_inode(struct inode *inode)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2014-04-04 05:47:49 +08:00
|
|
|
truncate_inode_pages_final(&inode->i_data);
|
2010-06-08 02:34:48 +08:00
|
|
|
invalidate_inode_buffers(inode); /* is it needed here? */
|
2012-05-03 20:48:02 +08:00
|
|
|
clear_inode(inode);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2007-02-12 16:55:41 +08:00
|
|
|
static const struct super_operations bdev_sops = {
|
2005-04-17 06:20:36 +08:00
|
|
|
.statfs = simple_statfs,
|
|
|
|
.alloc_inode = bdev_alloc_inode,
|
2019-04-11 03:12:38 +08:00
|
|
|
.free_inode = bdev_free_inode,
|
2005-04-17 06:20:36 +08:00
|
|
|
.drop_inode = generic_delete_inode,
|
2010-06-08 02:34:48 +08:00
|
|
|
.evict_inode = bdev_evict_inode,
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2019-03-26 00:38:23 +08:00
|
|
|
static int bd_init_fs_context(struct fs_context *fc)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2019-03-26 00:38:23 +08:00
|
|
|
struct pseudo_fs_context *ctx = init_pseudo(fc, BDEVFS_MAGIC);
|
|
|
|
if (!ctx)
|
|
|
|
return -ENOMEM;
|
|
|
|
fc->s_iflags |= SB_I_CGROUPWB;
|
|
|
|
ctx->ops = &bdev_sops;
|
|
|
|
return 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct file_system_type bd_type = {
|
|
|
|
.name = "bdev",
|
2019-03-26 00:38:23 +08:00
|
|
|
.init_fs_context = bd_init_fs_context,
|
2005-04-17 06:20:36 +08:00
|
|
|
.kill_sb = kill_anon_super,
|
|
|
|
};
|
|
|
|
|
2023-10-12 00:55:00 +08:00
|
|
|
struct super_block *blockdev_superblock __ro_after_init;
|
2024-06-14 17:03:43 +08:00
|
|
|
static struct vfsmount *blockdev_mnt __ro_after_init;
|
2015-05-23 05:13:33 +08:00
|
|
|
EXPORT_SYMBOL_GPL(blockdev_superblock);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
void __init bdev_cache_init(void)
|
|
|
|
{
|
|
|
|
int err;
|
2008-12-02 06:34:56 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
bdev_cachep = kmem_cache_create("bdev_cache", sizeof(struct bdev_inode),
|
2006-03-24 19:16:06 +08:00
|
|
|
0, (SLAB_HWCACHE_ALIGN|SLAB_RECLAIM_ACCOUNT|
|
2024-02-24 21:46:46 +08:00
|
|
|
SLAB_ACCOUNT|SLAB_PANIC),
|
2007-07-20 09:11:58 +08:00
|
|
|
init_once);
|
2005-04-17 06:20:36 +08:00
|
|
|
err = register_filesystem(&bd_type);
|
|
|
|
if (err)
|
|
|
|
panic("Cannot register bdev pseudo-fs");
|
2024-02-09 01:47:35 +08:00
|
|
|
blockdev_mnt = kern_mount(&bd_type);
|
|
|
|
if (IS_ERR(blockdev_mnt))
|
2005-04-17 06:20:36 +08:00
|
|
|
panic("Cannot create bdev pseudo-fs");
|
2024-02-09 01:47:35 +08:00
|
|
|
blockdev_superblock = blockdev_mnt->mnt_sb; /* For writeback */
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2020-11-26 16:23:26 +08:00
|
|
|
struct block_device *bdev_alloc(struct gendisk *disk, u8 partno)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct block_device *bdev;
|
|
|
|
struct inode *inode;
|
|
|
|
|
2020-11-26 16:23:26 +08:00
|
|
|
inode = new_inode(blockdev_superblock);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (!inode)
|
|
|
|
return NULL;
|
2020-11-26 16:23:26 +08:00
|
|
|
inode->i_mode = S_IFBLK;
|
|
|
|
inode->i_rdev = 0;
|
|
|
|
inode->i_data.a_ops = &def_blk_aops;
|
|
|
|
mapping_set_gfp_mask(&inode->i_data, GFP_USER);
|
|
|
|
|
|
|
|
bdev = I_BDEV(inode);
|
2020-11-23 22:41:40 +08:00
|
|
|
mutex_init(&bdev->bd_fsfreeze_mutex);
|
2020-11-26 16:23:26 +08:00
|
|
|
spin_lock_init(&bdev->bd_size_lock);
|
2023-06-01 17:44:52 +08:00
|
|
|
mutex_init(&bdev->bd_holder_lock);
|
2024-04-12 13:07:29 +08:00
|
|
|
atomic_set(&bdev->__bd_flags, partno);
|
2024-04-11 22:53:36 +08:00
|
|
|
bdev->bd_mapping = &inode->i_data;
|
2021-10-14 22:03:26 +08:00
|
|
|
bdev->bd_queue = disk->queue;
|
2024-04-12 13:21:45 +08:00
|
|
|
if (partno && bdev_test_flag(disk->part0, BD_HAS_SUBMIT_BIO))
|
|
|
|
bdev_set_flag(bdev, BD_HAS_SUBMIT_BIO);
|
2020-11-24 16:34:00 +08:00
|
|
|
bdev->bd_stats = alloc_percpu(struct disk_stats);
|
|
|
|
if (!bdev->bd_stats) {
|
|
|
|
iput(inode);
|
|
|
|
return NULL;
|
|
|
|
}
|
2021-10-02 17:23:02 +08:00
|
|
|
bdev->bd_disk = disk;
|
2020-11-26 16:23:26 +08:00
|
|
|
return bdev;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2023-04-24 21:13:18 +08:00
|
|
|
void bdev_set_nr_sectors(struct block_device *bdev, sector_t sectors)
|
|
|
|
{
|
|
|
|
spin_lock(&bdev->bd_size_lock);
|
2024-04-29 07:09:12 +08:00
|
|
|
i_size_write(BD_INODE(bdev), (loff_t)sectors << SECTOR_SHIFT);
|
2023-04-24 21:13:18 +08:00
|
|
|
bdev->bd_nr_sectors = sectors;
|
|
|
|
spin_unlock(&bdev->bd_size_lock);
|
|
|
|
}
|
|
|
|
|
2020-11-26 16:23:26 +08:00
|
|
|
void bdev_add(struct block_device *bdev, dev_t dev)
|
|
|
|
{
|
2024-04-29 07:09:12 +08:00
|
|
|
struct inode *inode = BD_INODE(bdev);
|
2023-10-25 22:10:18 +08:00
|
|
|
if (bdev_stable_writes(bdev))
|
2024-04-11 22:53:37 +08:00
|
|
|
mapping_set_stable_writes(bdev->bd_mapping);
|
2020-11-26 16:23:26 +08:00
|
|
|
bdev->bd_dev = dev;
|
2024-04-29 07:09:12 +08:00
|
|
|
inode->i_rdev = dev;
|
|
|
|
inode->i_ino = dev;
|
|
|
|
insert_inode_hash(inode);
|
2020-11-26 16:23:26 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2024-04-29 07:01:39 +08:00
|
|
|
void bdev_unhash(struct block_device *bdev)
|
|
|
|
{
|
2024-04-29 07:09:12 +08:00
|
|
|
remove_inode_hash(BD_INODE(bdev));
|
2024-04-29 07:01:39 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void bdev_drop(struct block_device *bdev)
|
|
|
|
{
|
2024-04-29 07:09:12 +08:00
|
|
|
iput(BD_INODE(bdev));
|
2020-11-26 16:23:26 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
long nr_blockdev_pages(void)
|
|
|
|
{
|
2020-06-26 16:01:58 +08:00
|
|
|
struct inode *inode;
|
2005-04-17 06:20:36 +08:00
|
|
|
long ret = 0;
|
2020-06-26 16:01:58 +08:00
|
|
|
|
|
|
|
spin_lock(&blockdev_superblock->s_inode_list_lock);
|
|
|
|
list_for_each_entry(inode, &blockdev_superblock->s_inodes, i_sb_list)
|
|
|
|
ret += inode->i_mapping->nrpages;
|
|
|
|
spin_unlock(&blockdev_superblock->s_inode_list_lock);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2010-04-07 17:52:29 +08:00
|
|
|
/**
|
|
|
|
* bd_may_claim - test whether a block device can be claimed
|
|
|
|
* @bdev: block device of interest
|
|
|
|
* @holder: holder trying to claim @bdev
|
2023-06-01 17:44:52 +08:00
|
|
|
* @hops: holder ops
|
2010-04-07 17:52:29 +08:00
|
|
|
*
|
2011-03-31 09:57:33 +08:00
|
|
|
* Test whether @bdev can be claimed by @holder.
|
2010-04-07 17:52:29 +08:00
|
|
|
*
|
|
|
|
* RETURNS:
|
|
|
|
* %true if @bdev can be claimed, %false otherwise.
|
|
|
|
*/
|
2023-06-01 17:44:52 +08:00
|
|
|
static bool bd_may_claim(struct block_device *bdev, void *holder,
|
|
|
|
const struct blk_holder_ops *hops)
|
2023-06-01 17:44:45 +08:00
|
|
|
{
|
|
|
|
struct block_device *whole = bdev_whole(bdev);
|
|
|
|
|
2023-06-01 17:44:46 +08:00
|
|
|
lockdep_assert_held(&bdev_lock);
|
|
|
|
|
2023-06-01 17:44:45 +08:00
|
|
|
if (bdev->bd_holder) {
|
|
|
|
/*
|
|
|
|
* The same holder can always re-claim.
|
|
|
|
*/
|
2023-06-01 17:44:52 +08:00
|
|
|
if (bdev->bd_holder == holder) {
|
|
|
|
if (WARN_ON_ONCE(bdev->bd_holder_ops != hops))
|
|
|
|
return false;
|
2023-06-01 17:44:45 +08:00
|
|
|
return true;
|
2023-06-01 17:44:52 +08:00
|
|
|
}
|
2023-06-01 17:44:45 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the whole devices holder is set to bd_may_claim, a partition on
|
|
|
|
* the device is claimed, but not the whole device.
|
|
|
|
*/
|
|
|
|
if (whole != bdev &&
|
|
|
|
whole->bd_holder && whole->bd_holder != bd_may_claim)
|
|
|
|
return false;
|
|
|
|
return true;
|
2010-04-07 17:52:29 +08:00
|
|
|
}
|
|
|
|
|
2010-04-07 17:53:59 +08:00
|
|
|
/**
|
2020-07-16 22:33:08 +08:00
|
|
|
* bd_prepare_to_claim - claim a block device
|
2010-04-07 17:53:59 +08:00
|
|
|
* @bdev: block device of interest
|
|
|
|
* @holder: holder trying to claim @bdev
|
2023-06-01 17:44:52 +08:00
|
|
|
* @hops: holder ops.
|
2010-04-07 17:53:59 +08:00
|
|
|
*
|
2020-07-16 22:33:08 +08:00
|
|
|
* Claim @bdev. This function fails if @bdev is already claimed by another
|
|
|
|
* holder and waits if another claiming is in progress. return, the caller
|
|
|
|
* has ownership of bd_claiming and bd_holder[s].
|
2010-04-07 17:53:59 +08:00
|
|
|
*
|
|
|
|
* RETURNS:
|
|
|
|
* 0 if @bdev can be claimed, -EBUSY otherwise.
|
|
|
|
*/
|
2023-06-01 17:44:52 +08:00
|
|
|
int bd_prepare_to_claim(struct block_device *bdev, void *holder,
|
|
|
|
const struct blk_holder_ops *hops)
|
2010-04-07 17:53:59 +08:00
|
|
|
{
|
2020-11-26 04:20:08 +08:00
|
|
|
struct block_device *whole = bdev_whole(bdev);
|
|
|
|
|
|
|
|
if (WARN_ON_ONCE(!holder))
|
|
|
|
return -EINVAL;
|
2010-04-07 17:53:59 +08:00
|
|
|
retry:
|
2023-06-01 17:44:46 +08:00
|
|
|
mutex_lock(&bdev_lock);
|
2010-04-07 17:53:59 +08:00
|
|
|
/* if someone else claimed, fail */
|
2023-06-01 17:44:52 +08:00
|
|
|
if (!bd_may_claim(bdev, holder, hops)) {
|
2023-06-01 17:44:46 +08:00
|
|
|
mutex_unlock(&bdev_lock);
|
2010-04-07 17:53:59 +08:00
|
|
|
return -EBUSY;
|
2020-07-16 22:33:08 +08:00
|
|
|
}
|
2010-04-07 17:53:59 +08:00
|
|
|
|
2010-08-04 23:59:39 +08:00
|
|
|
/* if claiming is already in progress, wait for it to finish */
|
|
|
|
if (whole->bd_claiming) {
|
2024-08-26 14:30:58 +08:00
|
|
|
wait_queue_head_t *wq = __var_waitqueue(&whole->bd_claiming);
|
2010-04-07 17:53:59 +08:00
|
|
|
DEFINE_WAIT(wait);
|
|
|
|
|
|
|
|
prepare_to_wait(wq, &wait, TASK_UNINTERRUPTIBLE);
|
2023-06-01 17:44:46 +08:00
|
|
|
mutex_unlock(&bdev_lock);
|
2010-04-07 17:53:59 +08:00
|
|
|
schedule();
|
|
|
|
finish_wait(wq, &wait);
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* yay, all mine */
|
2020-07-16 22:33:08 +08:00
|
|
|
whole->bd_claiming = holder;
|
2023-06-01 17:44:46 +08:00
|
|
|
mutex_unlock(&bdev_lock);
|
2010-04-07 17:53:59 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2020-07-16 22:33:09 +08:00
|
|
|
EXPORT_SYMBOL_GPL(bd_prepare_to_claim); /* only for the loop driver */
|
2010-04-07 17:53:59 +08:00
|
|
|
|
2019-07-30 19:10:14 +08:00
|
|
|
static void bd_clear_claiming(struct block_device *whole, void *holder)
|
|
|
|
{
|
|
|
|
lockdep_assert_held(&bdev_lock);
|
|
|
|
/* tell others that we're done */
|
|
|
|
BUG_ON(whole->bd_claiming != holder);
|
|
|
|
whole->bd_claiming = NULL;
|
2024-08-26 14:30:58 +08:00
|
|
|
wake_up_var(&whole->bd_claiming);
|
2019-07-30 19:10:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* bd_finish_claiming - finish claiming of a block device
|
|
|
|
* @bdev: block device of interest
|
|
|
|
* @holder: holder that has claimed @bdev
|
2023-06-22 00:50:54 +08:00
|
|
|
* @hops: block device holder operations
|
2019-07-30 19:10:14 +08:00
|
|
|
*
|
|
|
|
* Finish exclusive open of a block device. Mark the device as exlusively
|
|
|
|
* open by the holder and wake up all waiters for exclusive open to finish.
|
|
|
|
*/
|
2023-06-01 17:44:52 +08:00
|
|
|
static void bd_finish_claiming(struct block_device *bdev, void *holder,
|
|
|
|
const struct blk_holder_ops *hops)
|
2019-07-30 19:10:14 +08:00
|
|
|
{
|
2020-11-26 04:20:08 +08:00
|
|
|
struct block_device *whole = bdev_whole(bdev);
|
|
|
|
|
2023-06-01 17:44:46 +08:00
|
|
|
mutex_lock(&bdev_lock);
|
2023-06-01 17:44:52 +08:00
|
|
|
BUG_ON(!bd_may_claim(bdev, holder, hops));
|
2019-07-30 19:10:14 +08:00
|
|
|
/*
|
|
|
|
* Note that for a whole device bd_holders will be incremented twice,
|
|
|
|
* and bd_holder will be set to bd_may_claim before being set to holder
|
|
|
|
*/
|
|
|
|
whole->bd_holders++;
|
|
|
|
whole->bd_holder = bd_may_claim;
|
|
|
|
bdev->bd_holders++;
|
2023-06-01 17:44:52 +08:00
|
|
|
mutex_lock(&bdev->bd_holder_lock);
|
2019-07-30 19:10:14 +08:00
|
|
|
bdev->bd_holder = holder;
|
2023-06-01 17:44:52 +08:00
|
|
|
bdev->bd_holder_ops = hops;
|
|
|
|
mutex_unlock(&bdev->bd_holder_lock);
|
2019-07-30 19:10:14 +08:00
|
|
|
bd_clear_claiming(whole, holder);
|
2023-06-01 17:44:46 +08:00
|
|
|
mutex_unlock(&bdev_lock);
|
2019-07-30 19:10:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* bd_abort_claiming - abort claiming of a block device
|
|
|
|
* @bdev: block device of interest
|
|
|
|
* @holder: holder that has claimed @bdev
|
|
|
|
*
|
|
|
|
* Abort claiming of a block device when the exclusive open failed. This can be
|
|
|
|
* also used when exclusive open is not actually desired and we just needed
|
|
|
|
* to block other exclusive openers for a while.
|
|
|
|
*/
|
2020-11-26 04:20:08 +08:00
|
|
|
void bd_abort_claiming(struct block_device *bdev, void *holder)
|
2019-07-30 19:10:14 +08:00
|
|
|
{
|
2023-06-01 17:44:46 +08:00
|
|
|
mutex_lock(&bdev_lock);
|
2020-11-26 04:20:08 +08:00
|
|
|
bd_clear_claiming(bdev_whole(bdev), holder);
|
2023-06-01 17:44:46 +08:00
|
|
|
mutex_unlock(&bdev_lock);
|
2019-07-30 19:10:14 +08:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(bd_abort_claiming);
|
2010-04-07 17:53:59 +08:00
|
|
|
|
2023-06-08 19:02:43 +08:00
|
|
|
static void bd_end_claim(struct block_device *bdev, void *holder)
|
2023-06-01 17:44:44 +08:00
|
|
|
{
|
|
|
|
struct block_device *whole = bdev_whole(bdev);
|
|
|
|
bool unblock = false;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Release a claim on the device. The holder fields are protected with
|
|
|
|
* bdev_lock. open_mutex is used to synchronize disk_holder unlinking.
|
|
|
|
*/
|
2023-06-01 17:44:46 +08:00
|
|
|
mutex_lock(&bdev_lock);
|
2023-06-08 19:02:43 +08:00
|
|
|
WARN_ON_ONCE(bdev->bd_holder != holder);
|
2023-06-01 17:44:44 +08:00
|
|
|
WARN_ON_ONCE(--bdev->bd_holders < 0);
|
|
|
|
WARN_ON_ONCE(--whole->bd_holders < 0);
|
|
|
|
if (!bdev->bd_holders) {
|
2023-06-01 17:44:52 +08:00
|
|
|
mutex_lock(&bdev->bd_holder_lock);
|
2023-06-01 17:44:44 +08:00
|
|
|
bdev->bd_holder = NULL;
|
2023-06-01 17:44:52 +08:00
|
|
|
bdev->bd_holder_ops = NULL;
|
|
|
|
mutex_unlock(&bdev->bd_holder_lock);
|
2024-04-12 13:18:24 +08:00
|
|
|
if (bdev_test_flag(bdev, BD_WRITE_HOLDER))
|
2023-06-01 17:44:44 +08:00
|
|
|
unblock = true;
|
|
|
|
}
|
|
|
|
if (!whole->bd_holders)
|
|
|
|
whole->bd_holder = NULL;
|
2023-06-01 17:44:46 +08:00
|
|
|
mutex_unlock(&bdev_lock);
|
2023-06-01 17:44:44 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If this was the last claim, remove holder link and unblock evpoll if
|
|
|
|
* it was a write holder.
|
|
|
|
*/
|
|
|
|
if (unblock) {
|
|
|
|
disk_unblock_events(bdev->bd_disk);
|
2024-04-12 13:18:24 +08:00
|
|
|
bdev_clear_flag(bdev, BD_WRITE_HOLDER);
|
2023-06-01 17:44:44 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-25 14:12:58 +08:00
|
|
|
static void blkdev_flush_mapping(struct block_device *bdev)
|
|
|
|
{
|
|
|
|
WARN_ON_ONCE(bdev->bd_holders);
|
|
|
|
sync_blockdev(bdev);
|
|
|
|
kill_bdev(bdev);
|
|
|
|
bdev_write_inode(bdev);
|
|
|
|
}
|
[PATCH] lockdep: simplify some aspects of bd_mutex nesting
When we open (actually blkdev_get) a partition we need to also open (get) the
whole device that holds the partition. The involves some limited recursion.
This patch tries to simplify some aspects of this.
As well as opening the whole device, we need to increment ->bd_part_count when
a partition is opened (this is used by rescan_partitions to avoid a rescan if
any partition is active, as that would be confusing).
The main change this patch makes is to move the inc/dec of bd_part_count into
blkdev_{get,put} for the whole rather than doing it in blkdev_{get,put} for
the partition.
More specifically, we introduce __blkdev_get and __blkdev_put which do exactly
what blkdev_{get,put} did, only with an extra "for_part" argument
(blkget_{get,put} then call the __ version with a '0' for the extra argument).
If for_part is 1, then the blkdev is being get(put) because a partition is
being opened(closed) for the first(last) time, and so bd_part_count should be
updated (on success). The particular advantage of pushing this function down
is that the bd_mutex lock (which is needed to update bd_part_count) is already
held at the lower level.
Note that this slightly changes the semantics of bd_part_count. Instead of
updating it whenever a partition is opened or released, it is now only updated
on the first open or last release. This is an adequate semantic as it is only
ever tested for "== 0".
Having introduced these functions we remove the current bd_part_count updates
from do_open (which is really the body of blkdev_get) and call
__blkdev_get(... 1). Similarly in blkget_put we remove the old bd_part_count
updates and call __blkget_put(..., 1). This call is moved to the end of
__blkdev_put to avoid nested locks of bd_mutex.
Finally the mutex_lock on whole->bd_mutex in do_open can be removed. It was
only really needed to protect bd_part_count, and that is now managed (and
protected) within the recursive call.
The observation that bd_part_count is central to the locking issues, and the
modifications to create __blkdev_put are from Peter Zijlstra.
Cc: Ingo Molnar <mingo@elte.hu>
Acked-by: Peter Zijlstra <a.p.zijlstra@chello.nl>
Signed-off-by: Neil Brown <neilb@suse.de>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-08 18:36:16 +08:00
|
|
|
|
2024-04-17 22:47:43 +08:00
|
|
|
static void blkdev_put_whole(struct block_device *bdev)
|
|
|
|
{
|
|
|
|
if (atomic_dec_and_test(&bdev->bd_openers))
|
|
|
|
blkdev_flush_mapping(bdev);
|
|
|
|
if (bdev->bd_disk->fops->release)
|
|
|
|
bdev->bd_disk->fops->release(bdev->bd_disk);
|
|
|
|
}
|
|
|
|
|
2023-06-08 19:02:55 +08:00
|
|
|
static int blkdev_get_whole(struct block_device *bdev, blk_mode_t mode)
|
2019-11-14 22:34:34 +08:00
|
|
|
{
|
2019-11-14 22:34:35 +08:00
|
|
|
struct gendisk *disk = bdev->bd_disk;
|
2021-11-27 07:06:52 +08:00
|
|
|
int ret;
|
2019-11-14 22:34:34 +08:00
|
|
|
|
2021-05-25 14:12:54 +08:00
|
|
|
if (disk->fops->open) {
|
2023-06-08 19:02:36 +08:00
|
|
|
ret = disk->fops->open(disk, mode);
|
2021-05-25 14:12:54 +08:00
|
|
|
if (ret) {
|
|
|
|
/* avoid ghost partitions on a removed medium */
|
|
|
|
if (ret == -ENOMEDIUM &&
|
|
|
|
test_bit(GD_NEED_PART_SCAN, &disk->state))
|
2021-06-24 20:32:40 +08:00
|
|
|
bdev_disk_changed(disk, true);
|
2021-05-25 14:12:54 +08:00
|
|
|
return ret;
|
|
|
|
}
|
2020-03-18 16:12:06 +08:00
|
|
|
}
|
2019-11-14 22:34:34 +08:00
|
|
|
|
2022-03-30 13:29:07 +08:00
|
|
|
if (!atomic_read(&bdev->bd_openers))
|
2021-05-25 14:12:54 +08:00
|
|
|
set_init_blocksize(bdev);
|
2022-03-30 13:29:07 +08:00
|
|
|
atomic_inc(&bdev->bd_openers);
|
2024-04-17 22:47:43 +08:00
|
|
|
if (test_bit(GD_NEED_PART_SCAN, &disk->state)) {
|
|
|
|
/*
|
|
|
|
* Only return scanning errors if we are called from contexts
|
|
|
|
* that explicitly want them, e.g. the BLKRRPART ioctl.
|
|
|
|
*/
|
|
|
|
ret = bdev_disk_changed(disk, false);
|
|
|
|
if (ret && (mode & BLK_OPEN_STRICT_SCAN)) {
|
|
|
|
blkdev_put_whole(bdev);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
}
|
2022-02-28 01:01:24 +08:00
|
|
|
return 0;
|
2021-05-25 14:12:54 +08:00
|
|
|
}
|
2019-11-14 22:34:34 +08:00
|
|
|
|
2023-06-08 19:02:55 +08:00
|
|
|
static int blkdev_get_part(struct block_device *part, blk_mode_t mode)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2021-05-25 14:12:54 +08:00
|
|
|
struct gendisk *disk = part->bd_disk;
|
|
|
|
int ret;
|
2020-07-16 22:33:10 +08:00
|
|
|
|
2021-07-22 15:53:58 +08:00
|
|
|
ret = blkdev_get_whole(bdev_whole(part), mode);
|
2021-05-25 14:12:56 +08:00
|
|
|
if (ret)
|
2021-07-22 15:53:58 +08:00
|
|
|
return ret;
|
2011-05-23 19:26:07 +08:00
|
|
|
|
2021-05-25 14:12:54 +08:00
|
|
|
ret = -ENXIO;
|
|
|
|
if (!bdev_nr_sectors(part))
|
|
|
|
goto out_blkdev_put;
|
2011-05-23 19:26:07 +08:00
|
|
|
|
2023-06-08 19:02:29 +08:00
|
|
|
if (!atomic_read(&part->bd_openers)) {
|
|
|
|
disk->open_partitions++;
|
|
|
|
set_init_blocksize(part);
|
|
|
|
}
|
2022-03-30 13:29:07 +08:00
|
|
|
atomic_inc(&part->bd_openers);
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
2015-12-01 02:20:29 +08:00
|
|
|
|
2021-05-25 14:12:54 +08:00
|
|
|
out_blkdev_put:
|
2023-06-08 19:02:37 +08:00
|
|
|
blkdev_put_whole(bdev_whole(part));
|
2021-05-25 14:12:54 +08:00
|
|
|
return ret;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2020-11-23 17:19:22 +08:00
|
|
|
|
2024-01-23 21:26:46 +08:00
|
|
|
int bdev_permission(dev_t dev, blk_mode_t mode, void *holder)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = devcgroup_check_permission(DEVCG_DEV_BLOCK,
|
|
|
|
MAJOR(dev), MINOR(dev),
|
|
|
|
((mode & BLK_OPEN_READ) ? DEVCG_ACC_READ : 0) |
|
|
|
|
((mode & BLK_OPEN_WRITE) ? DEVCG_ACC_WRITE : 0));
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
/* Blocking writes requires exclusive opener */
|
|
|
|
if (mode & BLK_OPEN_RESTRICT_WRITES && !holder)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2024-01-23 21:26:49 +08:00
|
|
|
/*
|
|
|
|
* We're using error pointers to indicate to ->release() when we
|
|
|
|
* failed to open that block device. Also this doesn't make sense.
|
|
|
|
*/
|
|
|
|
if (WARN_ON_ONCE(IS_ERR(holder)))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2024-01-23 21:26:46 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2023-06-08 19:02:37 +08:00
|
|
|
static void blkdev_put_part(struct block_device *part)
|
2021-05-25 14:12:58 +08:00
|
|
|
{
|
|
|
|
struct block_device *whole = bdev_whole(part);
|
2017-03-23 08:36:53 +08:00
|
|
|
|
2023-06-08 19:02:29 +08:00
|
|
|
if (atomic_dec_and_test(&part->bd_openers)) {
|
|
|
|
blkdev_flush_mapping(part);
|
|
|
|
whole->bd_disk->open_partitions--;
|
|
|
|
}
|
2023-06-08 19:02:37 +08:00
|
|
|
blkdev_put_whole(whole);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2020-11-26 16:23:26 +08:00
|
|
|
struct block_device *blkdev_get_no_open(dev_t dev)
|
|
|
|
{
|
|
|
|
struct block_device *bdev;
|
2021-07-22 15:53:58 +08:00
|
|
|
struct inode *inode;
|
2020-11-26 16:23:26 +08:00
|
|
|
|
2021-07-22 15:53:58 +08:00
|
|
|
inode = ilookup(blockdev_superblock, dev);
|
2022-01-04 15:16:47 +08:00
|
|
|
if (!inode && IS_ENABLED(CONFIG_BLOCK_LEGACY_AUTOLOAD)) {
|
2020-11-26 16:23:26 +08:00
|
|
|
blk_request_module(dev);
|
2021-07-22 15:53:58 +08:00
|
|
|
inode = ilookup(blockdev_superblock, dev);
|
2022-01-04 15:16:47 +08:00
|
|
|
if (inode)
|
|
|
|
pr_warn_ratelimited(
|
2022-02-26 02:14:40 +08:00
|
|
|
"block device autoloading is deprecated and will be removed.\n");
|
2020-11-26 16:23:26 +08:00
|
|
|
}
|
2022-01-04 15:16:47 +08:00
|
|
|
if (!inode)
|
|
|
|
return NULL;
|
2020-11-26 16:23:26 +08:00
|
|
|
|
2021-07-22 15:53:58 +08:00
|
|
|
/* switch from the inode reference to a device mode one: */
|
|
|
|
bdev = &BDEV_I(inode)->bdev;
|
|
|
|
if (!kobject_get_unless_zero(&bdev->bd_device.kobj))
|
|
|
|
bdev = NULL;
|
|
|
|
iput(inode);
|
2020-11-26 16:23:26 +08:00
|
|
|
return bdev;
|
|
|
|
}
|
|
|
|
|
|
|
|
void blkdev_put_no_open(struct block_device *bdev)
|
|
|
|
{
|
2021-07-22 15:53:58 +08:00
|
|
|
put_device(&bdev->bd_device);
|
2020-11-26 16:23:26 +08:00
|
|
|
}
|
2023-11-02 01:43:08 +08:00
|
|
|
|
|
|
|
static bool bdev_writes_blocked(struct block_device *bdev)
|
|
|
|
{
|
2024-03-24 00:11:20 +08:00
|
|
|
return bdev->bd_writers < 0;
|
2023-11-02 01:43:08 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void bdev_block_writes(struct block_device *bdev)
|
|
|
|
{
|
2024-03-24 00:11:20 +08:00
|
|
|
bdev->bd_writers--;
|
2023-11-02 01:43:08 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void bdev_unblock_writes(struct block_device *bdev)
|
|
|
|
{
|
2024-03-24 00:11:20 +08:00
|
|
|
bdev->bd_writers++;
|
2023-11-02 01:43:08 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static bool bdev_may_open(struct block_device *bdev, blk_mode_t mode)
|
|
|
|
{
|
|
|
|
if (bdev_allow_write_mounted)
|
|
|
|
return true;
|
|
|
|
/* Writes blocked? */
|
|
|
|
if (mode & BLK_OPEN_WRITE && bdev_writes_blocked(bdev))
|
|
|
|
return false;
|
|
|
|
if (mode & BLK_OPEN_RESTRICT_WRITES && bdev->bd_writers > 0)
|
|
|
|
return false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void bdev_claim_write_access(struct block_device *bdev, blk_mode_t mode)
|
|
|
|
{
|
|
|
|
if (bdev_allow_write_mounted)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Claim exclusive or shared write access. */
|
|
|
|
if (mode & BLK_OPEN_RESTRICT_WRITES)
|
|
|
|
bdev_block_writes(bdev);
|
|
|
|
else if (mode & BLK_OPEN_WRITE)
|
|
|
|
bdev->bd_writers++;
|
|
|
|
}
|
|
|
|
|
2024-03-26 20:47:22 +08:00
|
|
|
static inline bool bdev_unclaimed(const struct file *bdev_file)
|
|
|
|
{
|
|
|
|
return bdev_file->private_data == BDEV_I(bdev_file->f_mapping->host);
|
|
|
|
}
|
|
|
|
|
2024-01-23 21:26:49 +08:00
|
|
|
static void bdev_yield_write_access(struct file *bdev_file)
|
2023-11-02 01:43:08 +08:00
|
|
|
{
|
2024-01-23 21:26:48 +08:00
|
|
|
struct block_device *bdev;
|
|
|
|
|
2023-11-02 01:43:08 +08:00
|
|
|
if (bdev_allow_write_mounted)
|
|
|
|
return;
|
|
|
|
|
2024-03-26 20:47:22 +08:00
|
|
|
if (bdev_unclaimed(bdev_file))
|
|
|
|
return;
|
|
|
|
|
2024-01-23 21:26:48 +08:00
|
|
|
bdev = file_bdev(bdev_file);
|
2024-03-24 00:11:19 +08:00
|
|
|
|
|
|
|
if (bdev_file->f_mode & FMODE_WRITE_RESTRICTED)
|
|
|
|
bdev_unblock_writes(bdev);
|
|
|
|
else if (bdev_file->f_mode & FMODE_WRITE)
|
|
|
|
bdev->bd_writers--;
|
2023-11-02 01:43:08 +08:00
|
|
|
}
|
|
|
|
|
2010-11-13 18:55:18 +08:00
|
|
|
/**
|
2024-01-23 21:26:46 +08:00
|
|
|
* bdev_open - open a block device
|
|
|
|
* @bdev: block device to open
|
2023-06-08 19:02:55 +08:00
|
|
|
* @mode: open mode (BLK_OPEN_*)
|
2010-11-13 18:55:18 +08:00
|
|
|
* @holder: exclusive holder identifier
|
2023-06-01 17:44:52 +08:00
|
|
|
* @hops: holder operations
|
2024-01-23 21:26:46 +08:00
|
|
|
* @bdev_file: file for the block device
|
2010-11-13 18:55:18 +08:00
|
|
|
*
|
2024-01-23 21:26:46 +08:00
|
|
|
* Open the block device. If @holder is not %NULL, the block device is opened
|
|
|
|
* with exclusive access. Exclusive opens may nest for the same @holder.
|
2010-11-13 18:55:18 +08:00
|
|
|
*
|
|
|
|
* CONTEXT:
|
|
|
|
* Might sleep.
|
|
|
|
*
|
|
|
|
* RETURNS:
|
2024-01-23 21:26:46 +08:00
|
|
|
* zero on success, -errno on failure.
|
2010-11-13 18:55:18 +08:00
|
|
|
*/
|
2024-01-23 21:26:46 +08:00
|
|
|
int bdev_open(struct block_device *bdev, blk_mode_t mode, void *holder,
|
|
|
|
const struct blk_holder_ops *hops, struct file *bdev_file)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2023-11-02 01:43:07 +08:00
|
|
|
bool unblock_events = true;
|
2024-01-23 21:26:46 +08:00
|
|
|
struct gendisk *disk = bdev->bd_disk;
|
2020-11-23 17:19:22 +08:00
|
|
|
int ret;
|
block: make blkdev_get/put() handle exclusive access
Over time, block layer has accumulated a set of APIs dealing with bdev
open, close, claim and release.
* blkdev_get/put() are the primary open and close functions.
* bd_claim/release() deal with exclusive open.
* open/close_bdev_exclusive() are combination of open and claim and
the other way around, respectively.
* bd_link/unlink_disk_holder() to create and remove holder/slave
symlinks.
* open_by_devnum() wraps bdget() + blkdev_get().
The interface is a bit confusing and the decoupling of open and claim
makes it impossible to properly guarantee exclusive access as
in-kernel open + claim sequence can disturb the existing exclusive
open even before the block layer knows the current open if for another
exclusive access. Reorganize the interface such that,
* blkdev_get() is extended to include exclusive access management.
@holder argument is added and, if is @FMODE_EXCL specified, it will
gain exclusive access atomically w.r.t. other exclusive accesses.
* blkdev_put() is similarly extended. It now takes @mode argument and
if @FMODE_EXCL is set, it releases an exclusive access. Also, when
the last exclusive claim is released, the holder/slave symlinks are
removed automatically.
* bd_claim/release() and close_bdev_exclusive() are no longer
necessary and either made static or removed.
* bd_link_disk_holder() remains the same but bd_unlink_disk_holder()
is no longer necessary and removed.
* open_bdev_exclusive() becomes a simple wrapper around lookup_bdev()
and blkdev_get(). It also has an unexpected extra bdev_read_only()
test which probably should be moved into blkdev_get().
* open_by_devnum() is modified to take @holder argument and pass it to
blkdev_get().
Most of bdev open/close operations are unified into blkdev_get/put()
and most exclusive accesses are tested atomically at the open time (as
it should). This cleans up code and removes some, both valid and
invalid, but unnecessary all the same, corner cases.
open_bdev_exclusive() and open_by_devnum() can use further cleanup -
rename to blkdev_get_by_path() and blkdev_get_by_devt() and drop
special features. Well, let's leave them for another day.
Most conversions are straight-forward. drbd conversion is a bit more
involved as there was some reordering, but the logic should stay the
same.
Signed-off-by: Tejun Heo <tj@kernel.org>
Acked-by: Neil Brown <neilb@suse.de>
Acked-by: Ryusuke Konishi <konishi.ryusuke@lab.ntt.co.jp>
Acked-by: Mike Snitzer <snitzer@redhat.com>
Acked-by: Philipp Reisner <philipp.reisner@linbit.com>
Cc: Peter Osterlund <petero2@telia.com>
Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
Cc: Heiko Carstens <heiko.carstens@de.ibm.com>
Cc: Jan Kara <jack@suse.cz>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Andreas Dilger <adilger.kernel@dilger.ca>
Cc: "Theodore Ts'o" <tytso@mit.edu>
Cc: Mark Fasheh <mfasheh@suse.com>
Cc: Joel Becker <joel.becker@oracle.com>
Cc: Alex Elder <aelder@sgi.com>
Cc: Christoph Hellwig <hch@infradead.org>
Cc: dm-devel@redhat.com
Cc: drbd-dev@lists.linbit.com
Cc: Leo Chen <leochen@broadcom.com>
Cc: Scott Branden <sbranden@broadcom.com>
Cc: Chris Mason <chris.mason@oracle.com>
Cc: Steven Whitehouse <swhiteho@redhat.com>
Cc: Dave Kleikamp <shaggy@linux.vnet.ibm.com>
Cc: Joern Engel <joern@logfs.org>
Cc: reiserfs-devel@vger.kernel.org
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
2010-11-13 18:55:17 +08:00
|
|
|
|
2023-06-08 19:02:43 +08:00
|
|
|
if (holder) {
|
2023-06-08 19:02:55 +08:00
|
|
|
mode |= BLK_OPEN_EXCL;
|
2023-06-01 17:44:52 +08:00
|
|
|
ret = bd_prepare_to_claim(bdev, holder, hops);
|
2020-11-23 17:19:22 +08:00
|
|
|
if (ret)
|
2024-01-23 21:26:49 +08:00
|
|
|
return ret;
|
2023-06-08 19:02:43 +08:00
|
|
|
} else {
|
2024-01-23 21:26:49 +08:00
|
|
|
if (WARN_ON_ONCE(mode & BLK_OPEN_EXCL))
|
|
|
|
return -EIO;
|
2020-11-23 17:19:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
disk_block_events(disk);
|
|
|
|
|
2021-05-25 14:12:56 +08:00
|
|
|
mutex_lock(&disk->open_mutex);
|
2021-05-25 14:12:54 +08:00
|
|
|
ret = -ENXIO;
|
2021-08-09 14:40:28 +08:00
|
|
|
if (!disk_live(disk))
|
2021-05-25 14:12:54 +08:00
|
|
|
goto abort_claiming;
|
2021-11-11 10:03:43 +08:00
|
|
|
if (!try_module_get(disk->fops->owner))
|
|
|
|
goto abort_claiming;
|
2023-11-02 01:43:08 +08:00
|
|
|
ret = -EBUSY;
|
|
|
|
if (!bdev_may_open(bdev, mode))
|
2024-04-06 17:09:25 +08:00
|
|
|
goto put_module;
|
2021-05-25 14:12:54 +08:00
|
|
|
if (bdev_is_partition(bdev))
|
|
|
|
ret = blkdev_get_part(bdev, mode);
|
|
|
|
else
|
|
|
|
ret = blkdev_get_whole(bdev, mode);
|
2020-11-26 16:23:26 +08:00
|
|
|
if (ret)
|
2021-11-11 10:03:43 +08:00
|
|
|
goto put_module;
|
2023-11-02 01:43:08 +08:00
|
|
|
bdev_claim_write_access(bdev, mode);
|
2023-06-08 19:02:43 +08:00
|
|
|
if (holder) {
|
2023-06-01 17:44:52 +08:00
|
|
|
bd_finish_claiming(bdev, holder, hops);
|
2020-11-23 17:19:22 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Block event polling for write claims if requested. Any write
|
|
|
|
* holder makes the write_holder state stick until all are
|
|
|
|
* released. This is good enough and tracking individual
|
|
|
|
* writeable reference is too fragile given the way @mode is
|
|
|
|
* used in blkdev_get/put().
|
|
|
|
*/
|
2024-04-12 13:18:24 +08:00
|
|
|
if ((mode & BLK_OPEN_WRITE) &&
|
|
|
|
!bdev_test_flag(bdev, BD_WRITE_HOLDER) &&
|
2021-11-22 21:06:13 +08:00
|
|
|
(disk->event_flags & DISK_EVENT_FLAG_BLOCK_ON_EXCL_WRITE)) {
|
2024-04-12 13:18:24 +08:00
|
|
|
bdev_set_flag(bdev, BD_WRITE_HOLDER);
|
2020-11-23 17:19:22 +08:00
|
|
|
unblock_events = false;
|
|
|
|
}
|
|
|
|
}
|
2021-05-25 14:12:56 +08:00
|
|
|
mutex_unlock(&disk->open_mutex);
|
2020-11-23 17:19:22 +08:00
|
|
|
|
|
|
|
if (unblock_events)
|
|
|
|
disk_unblock_events(disk);
|
2024-01-23 21:26:46 +08:00
|
|
|
|
|
|
|
bdev_file->f_flags |= O_LARGEFILE;
|
2024-03-28 20:27:24 +08:00
|
|
|
bdev_file->f_mode |= FMODE_CAN_ODIRECT;
|
2024-01-23 21:26:46 +08:00
|
|
|
if (bdev_nowait(bdev))
|
|
|
|
bdev_file->f_mode |= FMODE_NOWAIT;
|
2024-03-24 00:11:19 +08:00
|
|
|
if (mode & BLK_OPEN_RESTRICT_WRITES)
|
|
|
|
bdev_file->f_mode |= FMODE_WRITE_RESTRICTED;
|
2024-04-11 22:53:37 +08:00
|
|
|
bdev_file->f_mapping = bdev->bd_mapping;
|
2024-01-23 21:26:46 +08:00
|
|
|
bdev_file->f_wb_err = filemap_sample_wb_err(bdev_file->f_mapping);
|
2024-01-23 21:26:49 +08:00
|
|
|
bdev_file->private_data = holder;
|
2024-01-23 21:26:46 +08:00
|
|
|
|
|
|
|
return 0;
|
2021-11-11 10:03:43 +08:00
|
|
|
put_module:
|
|
|
|
module_put(disk->fops->owner);
|
2020-11-26 16:23:26 +08:00
|
|
|
abort_claiming:
|
2023-06-08 19:02:43 +08:00
|
|
|
if (holder)
|
2020-11-26 04:20:08 +08:00
|
|
|
bd_abort_claiming(bdev, holder);
|
2021-05-25 14:12:56 +08:00
|
|
|
mutex_unlock(&disk->open_mutex);
|
2020-11-26 16:23:26 +08:00
|
|
|
disk_unblock_events(disk);
|
2024-01-23 21:26:46 +08:00
|
|
|
return ret;
|
[PATCH] lockdep: simplify some aspects of bd_mutex nesting
When we open (actually blkdev_get) a partition we need to also open (get) the
whole device that holds the partition. The involves some limited recursion.
This patch tries to simplify some aspects of this.
As well as opening the whole device, we need to increment ->bd_part_count when
a partition is opened (this is used by rescan_partitions to avoid a rescan if
any partition is active, as that would be confusing).
The main change this patch makes is to move the inc/dec of bd_part_count into
blkdev_{get,put} for the whole rather than doing it in blkdev_{get,put} for
the partition.
More specifically, we introduce __blkdev_get and __blkdev_put which do exactly
what blkdev_{get,put} did, only with an extra "for_part" argument
(blkget_{get,put} then call the __ version with a '0' for the extra argument).
If for_part is 1, then the blkdev is being get(put) because a partition is
being opened(closed) for the first(last) time, and so bd_part_count should be
updated (on success). The particular advantage of pushing this function down
is that the bd_mutex lock (which is needed to update bd_part_count) is already
held at the lower level.
Note that this slightly changes the semantics of bd_part_count. Instead of
updating it whenever a partition is opened or released, it is now only updated
on the first open or last release. This is an adequate semantic as it is only
ever tested for "== 0".
Having introduced these functions we remove the current bd_part_count updates
from do_open (which is really the body of blkdev_get) and call
__blkdev_get(... 1). Similarly in blkget_put we remove the old bd_part_count
updates and call __blkget_put(..., 1). This call is moved to the end of
__blkdev_put to avoid nested locks of bd_mutex.
Finally the mutex_lock on whole->bd_mutex in do_open can be removed. It was
only really needed to protect bd_part_count, and that is now managed (and
protected) within the recursive call.
The observation that bd_part_count is central to the locking issues, and the
modifications to create __blkdev_put are from Peter Zijlstra.
Cc: Ingo Molnar <mingo@elte.hu>
Acked-by: Peter Zijlstra <a.p.zijlstra@chello.nl>
Signed-off-by: Neil Brown <neilb@suse.de>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-08 18:36:16 +08:00
|
|
|
}
|
2023-09-27 17:34:07 +08:00
|
|
|
|
2024-02-09 01:47:35 +08:00
|
|
|
/*
|
|
|
|
* If BLK_OPEN_WRITE_IOCTL is set then this is a historical quirk
|
|
|
|
* associated with the floppy driver where it has allowed ioctls if the
|
|
|
|
* file was opened for writing, but does not allow reads or writes.
|
|
|
|
* Make sure that this quirk is reflected in @f_flags.
|
|
|
|
*
|
|
|
|
* It can also happen if a block device is opened as O_RDWR | O_WRONLY.
|
|
|
|
*/
|
|
|
|
static unsigned blk_to_file_flags(blk_mode_t mode)
|
|
|
|
{
|
|
|
|
unsigned int flags = 0;
|
|
|
|
|
|
|
|
if ((mode & (BLK_OPEN_READ | BLK_OPEN_WRITE)) ==
|
|
|
|
(BLK_OPEN_READ | BLK_OPEN_WRITE))
|
|
|
|
flags |= O_RDWR;
|
|
|
|
else if (mode & BLK_OPEN_WRITE_IOCTL)
|
|
|
|
flags |= O_RDWR | O_WRONLY;
|
|
|
|
else if (mode & BLK_OPEN_WRITE)
|
|
|
|
flags |= O_WRONLY;
|
|
|
|
else if (mode & BLK_OPEN_READ)
|
|
|
|
flags |= O_RDONLY; /* homeopathic, because O_RDONLY is 0 */
|
|
|
|
else
|
|
|
|
WARN_ON_ONCE(true);
|
|
|
|
|
|
|
|
if (mode & BLK_OPEN_NDELAY)
|
|
|
|
flags |= O_NDELAY;
|
|
|
|
|
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct file *bdev_file_open_by_dev(dev_t dev, blk_mode_t mode, void *holder,
|
|
|
|
const struct blk_holder_ops *hops)
|
|
|
|
{
|
|
|
|
struct file *bdev_file;
|
2024-01-23 21:26:46 +08:00
|
|
|
struct block_device *bdev;
|
2024-02-09 01:47:35 +08:00
|
|
|
unsigned int flags;
|
2024-01-23 21:26:46 +08:00
|
|
|
int ret;
|
2024-02-09 01:47:35 +08:00
|
|
|
|
2024-01-23 21:26:46 +08:00
|
|
|
ret = bdev_permission(dev, mode, holder);
|
|
|
|
if (ret)
|
|
|
|
return ERR_PTR(ret);
|
|
|
|
|
|
|
|
bdev = blkdev_get_no_open(dev);
|
|
|
|
if (!bdev)
|
|
|
|
return ERR_PTR(-ENXIO);
|
2024-02-09 01:47:35 +08:00
|
|
|
|
|
|
|
flags = blk_to_file_flags(mode);
|
2024-04-29 07:09:12 +08:00
|
|
|
bdev_file = alloc_file_pseudo_noaccount(BD_INODE(bdev),
|
2024-02-09 01:47:35 +08:00
|
|
|
blockdev_mnt, "", flags | O_LARGEFILE, &def_blk_fops);
|
|
|
|
if (IS_ERR(bdev_file)) {
|
2024-01-23 21:26:46 +08:00
|
|
|
blkdev_put_no_open(bdev);
|
2024-02-09 01:47:35 +08:00
|
|
|
return bdev_file;
|
|
|
|
}
|
2024-04-29 07:09:12 +08:00
|
|
|
ihold(BD_INODE(bdev));
|
2024-02-09 01:47:35 +08:00
|
|
|
|
2024-01-23 21:26:46 +08:00
|
|
|
ret = bdev_open(bdev, mode, holder, hops, bdev_file);
|
|
|
|
if (ret) {
|
2024-01-23 21:26:49 +08:00
|
|
|
/* We failed to open the block device. Let ->release() know. */
|
|
|
|
bdev_file->private_data = ERR_PTR(ret);
|
2024-01-23 21:26:46 +08:00
|
|
|
fput(bdev_file);
|
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
2024-02-09 01:47:35 +08:00
|
|
|
return bdev_file;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(bdev_file_open_by_dev);
|
|
|
|
|
|
|
|
struct file *bdev_file_open_by_path(const char *path, blk_mode_t mode,
|
|
|
|
void *holder,
|
|
|
|
const struct blk_holder_ops *hops)
|
|
|
|
{
|
2024-01-23 21:26:47 +08:00
|
|
|
struct file *file;
|
2024-02-09 01:47:35 +08:00
|
|
|
dev_t dev;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = lookup_bdev(path, &dev);
|
|
|
|
if (error)
|
|
|
|
return ERR_PTR(error);
|
|
|
|
|
2024-01-23 21:26:47 +08:00
|
|
|
file = bdev_file_open_by_dev(dev, mode, holder, hops);
|
|
|
|
if (!IS_ERR(file) && (mode & BLK_OPEN_WRITE)) {
|
|
|
|
if (bdev_read_only(file_bdev(file))) {
|
|
|
|
fput(file);
|
|
|
|
file = ERR_PTR(-EACCES);
|
2024-02-09 01:47:35 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-23 21:26:47 +08:00
|
|
|
return file;
|
2024-02-09 01:47:35 +08:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(bdev_file_open_by_path);
|
|
|
|
|
2024-03-26 20:47:22 +08:00
|
|
|
static inline void bd_yield_claim(struct file *bdev_file)
|
|
|
|
{
|
|
|
|
struct block_device *bdev = file_bdev(bdev_file);
|
|
|
|
void *holder = bdev_file->private_data;
|
|
|
|
|
|
|
|
lockdep_assert_held(&bdev->bd_disk->open_mutex);
|
|
|
|
|
|
|
|
if (WARN_ON_ONCE(IS_ERR_OR_NULL(holder)))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!bdev_unclaimed(bdev_file))
|
|
|
|
bd_end_claim(bdev, holder);
|
|
|
|
}
|
|
|
|
|
2024-01-23 21:26:47 +08:00
|
|
|
void bdev_release(struct file *bdev_file)
|
2006-12-08 18:36:13 +08:00
|
|
|
{
|
2024-01-23 21:26:47 +08:00
|
|
|
struct block_device *bdev = file_bdev(bdev_file);
|
2024-01-23 21:26:49 +08:00
|
|
|
void *holder = bdev_file->private_data;
|
2006-12-08 18:36:13 +08:00
|
|
|
struct gendisk *disk = bdev->bd_disk;
|
|
|
|
|
2024-01-23 21:26:49 +08:00
|
|
|
/* We failed to open that block device. */
|
|
|
|
if (IS_ERR(holder))
|
|
|
|
goto put_no_open;
|
|
|
|
|
2020-03-25 05:48:27 +08:00
|
|
|
/*
|
|
|
|
* Sync early if it looks like we're the last one. If someone else
|
|
|
|
* opens the block device between now and the decrement of bd_openers
|
|
|
|
* then we did a sync that we didn't need to, but that's not the end
|
|
|
|
* of the world and we want to avoid long (could be several minute)
|
|
|
|
* syncs while holding the mutex.
|
|
|
|
*/
|
2022-03-30 13:29:07 +08:00
|
|
|
if (atomic_read(&bdev->bd_openers) == 1)
|
2020-03-25 05:48:27 +08:00
|
|
|
sync_blockdev(bdev);
|
|
|
|
|
2021-05-25 14:12:56 +08:00
|
|
|
mutex_lock(&disk->open_mutex);
|
2024-01-23 21:26:49 +08:00
|
|
|
bdev_yield_write_access(bdev_file);
|
2023-11-02 01:43:08 +08:00
|
|
|
|
2024-01-23 21:26:49 +08:00
|
|
|
if (holder)
|
2024-03-26 20:47:22 +08:00
|
|
|
bd_yield_claim(bdev_file);
|
implement in-kernel gendisk events handling
Currently, media presence polling for removeable block devices is done
from userland. There are several issues with this.
* Polling is done by periodically opening the device. For SCSI
devices, the command sequence generated by such action involves a
few different commands including TEST_UNIT_READY. This behavior,
while perfectly legal, is different from Windows which only issues
single command, GET_EVENT_STATUS_NOTIFICATION. Unfortunately, some
ATAPI devices lock up after being periodically queried such command
sequences.
* There is no reliable and unintrusive way for a userland program to
tell whether the target device is safe for media presence polling.
For example, polling for media presence during an on-going burning
session can make it fail. The polling program can avoid this by
opening the device with O_EXCL but then it risks making a valid
exclusive user of the device fail w/ -EBUSY.
* Userland polling is unnecessarily heavy and in-kernel implementation
is lighter and better coordinated (workqueue, timer slack).
This patch implements framework for in-kernel disk event handling,
which includes media presence polling.
* bdops->check_events() is added, which supercedes ->media_changed().
It should check whether there's any pending event and return if so.
Currently, two events are defined - DISK_EVENT_MEDIA_CHANGE and
DISK_EVENT_EJECT_REQUEST. ->check_events() is guaranteed not to be
called parallelly.
* gendisk->events and ->async_events are added. These should be
initialized by block driver before passing the device to add_disk().
The former contains the mask of all supported events and the latter
the mask of all events which the device can report without polling.
/sys/block/*/events[_async] export these to userland.
* Kernel parameter block.events_dfl_poll_msecs controls the system
polling interval (default is 0 which means disable) and
/sys/block/*/events_poll_msecs control polling intervals for
individual devices (default is -1 meaning use system setting). Note
that if a device can report all supported events asynchronously and
its polling interval isn't explicitly set, the device won't be
polled regardless of the system polling interval.
* If a device is opened exclusively with write access, event checking
is automatically disabled until all write exclusive accesses are
released.
* There are event 'clearing' events. For example, both of currently
defined events are cleared after the device has been successfully
opened. This information is passed to ->check_events() callback
using @clearing argument as a hint.
* Event checking is always performed from system_nrt_wq and timer
slack is set to 25% for polling.
* Nothing changes for drivers which implement ->media_changed() but
not ->check_events(). Going forward, all drivers will be converted
to ->check_events() and ->media_change() will be dropped.
Signed-off-by: Tejun Heo <tj@kernel.org>
Cc: Kay Sievers <kay.sievers@vrfy.org>
Cc: Jan Kara <jack@suse.cz>
Signed-off-by: Jens Axboe <jaxboe@fusionio.com>
2010-12-09 03:57:37 +08:00
|
|
|
|
2011-07-01 22:17:47 +08:00
|
|
|
/*
|
|
|
|
* Trigger event checking and tell drivers to flush MEDIA_CHANGE
|
|
|
|
* event. This is to ensure detection of media removal commanded
|
|
|
|
* from userland - e.g. eject(1).
|
|
|
|
*/
|
2020-11-23 17:19:22 +08:00
|
|
|
disk_flush_events(disk, DISK_EVENT_MEDIA_CHANGE);
|
2011-07-01 22:17:47 +08:00
|
|
|
|
2021-05-25 14:12:58 +08:00
|
|
|
if (bdev_is_partition(bdev))
|
2023-06-08 19:02:37 +08:00
|
|
|
blkdev_put_part(bdev);
|
2021-05-25 14:12:58 +08:00
|
|
|
else
|
2023-06-08 19:02:37 +08:00
|
|
|
blkdev_put_whole(bdev);
|
2021-05-25 14:12:56 +08:00
|
|
|
mutex_unlock(&disk->open_mutex);
|
|
|
|
|
2021-11-11 10:03:43 +08:00
|
|
|
module_put(disk->fops->owner);
|
2024-01-23 21:26:49 +08:00
|
|
|
put_no_open:
|
2020-11-26 16:23:26 +08:00
|
|
|
blkdev_put_no_open(bdev);
|
2023-09-27 17:34:07 +08:00
|
|
|
}
|
|
|
|
|
2024-03-26 20:47:22 +08:00
|
|
|
/**
|
|
|
|
* bdev_fput - yield claim to the block device and put the file
|
|
|
|
* @bdev_file: open block device
|
|
|
|
*
|
|
|
|
* Yield claim on the block device and put the file. Ensure that the
|
|
|
|
* block device can be reclaimed before the file is closed which is a
|
|
|
|
* deferred operation.
|
|
|
|
*/
|
|
|
|
void bdev_fput(struct file *bdev_file)
|
|
|
|
{
|
|
|
|
if (WARN_ON_ONCE(bdev_file->f_op != &def_blk_fops))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (bdev_file->private_data) {
|
|
|
|
struct block_device *bdev = file_bdev(bdev_file);
|
|
|
|
struct gendisk *disk = bdev->bd_disk;
|
|
|
|
|
|
|
|
mutex_lock(&disk->open_mutex);
|
|
|
|
bdev_yield_write_access(bdev_file);
|
|
|
|
bd_yield_claim(bdev_file);
|
|
|
|
/*
|
|
|
|
* Tell release we already gave up our hold on the
|
|
|
|
* device and if write restrictions are available that
|
|
|
|
* we already gave up write access to the device.
|
|
|
|
*/
|
|
|
|
bdev_file->private_data = BDEV_I(bdev_file->f_mapping->host);
|
|
|
|
mutex_unlock(&disk->open_mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
fput(bdev_file);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(bdev_fput);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
2021-12-14 01:11:13 +08:00
|
|
|
* lookup_bdev() - Look up a struct block_device by name.
|
|
|
|
* @pathname: Name of the block device in the filesystem.
|
|
|
|
* @dev: Pointer to the block device's dev_t, if found.
|
2005-04-17 06:20:36 +08:00
|
|
|
*
|
2021-10-21 15:13:43 +08:00
|
|
|
* Lookup the block device's dev_t at @pathname in the current
|
2021-12-14 01:11:13 +08:00
|
|
|
* namespace if possible and return it in @dev.
|
2021-10-21 15:13:43 +08:00
|
|
|
*
|
2021-12-14 01:11:13 +08:00
|
|
|
* Context: May sleep.
|
|
|
|
* Return: 0 if succeeded, negative errno otherwise.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2020-11-23 20:38:40 +08:00
|
|
|
int lookup_bdev(const char *pathname, dev_t *dev)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
struct inode *inode;
|
2008-08-02 13:04:36 +08:00
|
|
|
struct path path;
|
2005-04-17 06:20:36 +08:00
|
|
|
int error;
|
|
|
|
|
2008-08-02 13:04:36 +08:00
|
|
|
if (!pathname || !*pathname)
|
2020-11-23 20:38:40 +08:00
|
|
|
return -EINVAL;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2008-08-02 13:04:36 +08:00
|
|
|
error = kern_path(pathname, LOOKUP_FOLLOW, &path);
|
2005-04-17 06:20:36 +08:00
|
|
|
if (error)
|
2020-11-23 20:38:40 +08:00
|
|
|
return error;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2015-03-18 06:26:21 +08:00
|
|
|
inode = d_backing_inode(path.dentry);
|
2005-04-17 06:20:36 +08:00
|
|
|
error = -ENOTBLK;
|
|
|
|
if (!S_ISBLK(inode->i_mode))
|
2020-11-23 20:38:40 +08:00
|
|
|
goto out_path_put;
|
2005-04-17 06:20:36 +08:00
|
|
|
error = -EACCES;
|
2016-06-10 04:34:02 +08:00
|
|
|
if (!may_open_dev(&path))
|
2020-11-23 20:38:40 +08:00
|
|
|
goto out_path_put;
|
|
|
|
|
|
|
|
*dev = inode->i_rdev;
|
|
|
|
error = 0;
|
|
|
|
out_path_put:
|
2008-08-02 13:04:36 +08:00
|
|
|
path_put(&path);
|
2020-11-23 20:38:40 +08:00
|
|
|
return error;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2008-08-01 17:00:11 +08:00
|
|
|
EXPORT_SYMBOL(lookup_bdev);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2023-08-11 18:08:24 +08:00
|
|
|
/**
|
|
|
|
* bdev_mark_dead - mark a block device as dead
|
|
|
|
* @bdev: block device to operate on
|
|
|
|
* @surprise: indicate a surprise removal
|
|
|
|
*
|
|
|
|
* Tell the file system that this devices or media is dead. If @surprise is set
|
|
|
|
* to %true the device or media is already gone, if not we are preparing for an
|
|
|
|
* orderly removal.
|
|
|
|
*
|
2023-08-11 18:08:25 +08:00
|
|
|
* This calls into the file system, which then typicall syncs out all dirty data
|
|
|
|
* and writes back inodes and then invalidates any cached data in the inodes on
|
|
|
|
* the file system. In addition we also invalidate the block device mapping.
|
2023-08-11 18:08:24 +08:00
|
|
|
*/
|
|
|
|
void bdev_mark_dead(struct block_device *bdev, bool surprise)
|
2006-08-30 02:06:11 +08:00
|
|
|
{
|
2023-08-11 18:08:25 +08:00
|
|
|
mutex_lock(&bdev->bd_holder_lock);
|
|
|
|
if (bdev->bd_holder_ops && bdev->bd_holder_ops->mark_dead)
|
|
|
|
bdev->bd_holder_ops->mark_dead(bdev, surprise);
|
2023-10-18 23:29:24 +08:00
|
|
|
else {
|
|
|
|
mutex_unlock(&bdev->bd_holder_lock);
|
2023-08-11 18:08:25 +08:00
|
|
|
sync_blockdev(bdev);
|
2023-10-18 23:29:24 +08:00
|
|
|
}
|
2006-08-30 02:06:11 +08:00
|
|
|
|
2007-05-07 05:49:54 +08:00
|
|
|
invalidate_bdev(bdev);
|
2006-08-30 02:06:11 +08:00
|
|
|
}
|
2023-08-11 18:08:24 +08:00
|
|
|
/*
|
2023-10-18 02:48:21 +08:00
|
|
|
* New drivers should not use this directly. There are some drivers however
|
|
|
|
* that needs this for historical reasons. For example, the DASD driver has
|
|
|
|
* historically had a shutdown to offline mode that doesn't actually remove the
|
|
|
|
* gendisk that otherwise looks a lot like a safe device removal.
|
2023-08-11 18:08:24 +08:00
|
|
|
*/
|
|
|
|
EXPORT_SYMBOL_GPL(bdev_mark_dead);
|
2012-07-03 22:45:31 +08:00
|
|
|
|
2021-10-19 14:25:30 +08:00
|
|
|
void sync_bdevs(bool wait)
|
2012-07-03 22:45:31 +08:00
|
|
|
{
|
|
|
|
struct inode *inode, *old_inode = NULL;
|
|
|
|
|
2015-03-05 01:37:22 +08:00
|
|
|
spin_lock(&blockdev_superblock->s_inode_list_lock);
|
2012-07-03 22:45:31 +08:00
|
|
|
list_for_each_entry(inode, &blockdev_superblock->s_inodes, i_sb_list) {
|
|
|
|
struct address_space *mapping = inode->i_mapping;
|
2016-12-01 16:18:28 +08:00
|
|
|
struct block_device *bdev;
|
2012-07-03 22:45:31 +08:00
|
|
|
|
|
|
|
spin_lock(&inode->i_lock);
|
|
|
|
if (inode->i_state & (I_FREEING|I_WILL_FREE|I_NEW) ||
|
|
|
|
mapping->nrpages == 0) {
|
|
|
|
spin_unlock(&inode->i_lock);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
__iget(inode);
|
|
|
|
spin_unlock(&inode->i_lock);
|
2015-03-05 01:37:22 +08:00
|
|
|
spin_unlock(&blockdev_superblock->s_inode_list_lock);
|
2012-07-03 22:45:31 +08:00
|
|
|
/*
|
|
|
|
* We hold a reference to 'inode' so it couldn't have been
|
|
|
|
* removed from s_inodes list while we dropped the
|
2015-03-05 01:37:22 +08:00
|
|
|
* s_inode_list_lock We cannot iput the inode now as we can
|
2012-07-03 22:45:31 +08:00
|
|
|
* be holding the last reference and we cannot iput it under
|
2015-03-05 01:37:22 +08:00
|
|
|
* s_inode_list_lock. So we keep the reference and iput it
|
2012-07-03 22:45:31 +08:00
|
|
|
* later.
|
|
|
|
*/
|
|
|
|
iput(old_inode);
|
|
|
|
old_inode = inode;
|
2016-12-01 16:18:28 +08:00
|
|
|
bdev = I_BDEV(inode);
|
2012-07-03 22:45:31 +08:00
|
|
|
|
2021-05-25 14:12:56 +08:00
|
|
|
mutex_lock(&bdev->bd_disk->open_mutex);
|
2022-03-30 13:29:07 +08:00
|
|
|
if (!atomic_read(&bdev->bd_openers)) {
|
2021-10-19 14:25:30 +08:00
|
|
|
; /* skip */
|
|
|
|
} else if (wait) {
|
|
|
|
/*
|
|
|
|
* We keep the error status of individual mapping so
|
|
|
|
* that applications can catch the writeback error using
|
|
|
|
* fsync(2). See filemap_fdatawait_keep_errors() for
|
|
|
|
* details.
|
|
|
|
*/
|
|
|
|
filemap_fdatawait_keep_errors(inode->i_mapping);
|
|
|
|
} else {
|
|
|
|
filemap_fdatawrite(inode->i_mapping);
|
|
|
|
}
|
2021-05-25 14:12:56 +08:00
|
|
|
mutex_unlock(&bdev->bd_disk->open_mutex);
|
2012-07-03 22:45:31 +08:00
|
|
|
|
2015-03-05 01:37:22 +08:00
|
|
|
spin_lock(&blockdev_superblock->s_inode_list_lock);
|
2012-07-03 22:45:31 +08:00
|
|
|
}
|
2015-03-05 01:37:22 +08:00
|
|
|
spin_unlock(&blockdev_superblock->s_inode_list_lock);
|
2012-07-03 22:45:31 +08:00
|
|
|
iput(old_inode);
|
|
|
|
}
|
2022-08-27 14:58:45 +08:00
|
|
|
|
|
|
|
/*
|
2024-06-20 20:53:55 +08:00
|
|
|
* Handle STATX_{DIOALIGN, WRITE_ATOMIC} for block devices.
|
2022-08-27 14:58:45 +08:00
|
|
|
*/
|
for-6.11/block-20240710
-----BEGIN PGP SIGNATURE-----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=wVi8
-----END PGP SIGNATURE-----
Merge tag 'for-6.11/block-20240710' of git://git.kernel.dk/linux
Pull block updates from Jens Axboe:
- NVMe updates via Keith:
- Device initialization memory leak fixes (Keith)
- More constants defined (Weiwen)
- Target debugfs support (Hannes)
- PCIe subsystem reset enhancements (Keith)
- Queue-depth multipath policy (Redhat and PureStorage)
- Implement get_unique_id (Christoph)
- Authentication error fixes (Gaosheng)
- MD updates via Song
- sync_action fix and refactoring (Yu Kuai)
- Various small fixes (Christoph Hellwig, Li Nan, and Ofir Gal, Yu
Kuai, Benjamin Marzinski, Christophe JAILLET, Yang Li)
- Fix loop detach/open race (Gulam)
- Fix lower control limit for blk-throttle (Yu)
- Add module descriptions to various drivers (Jeff)
- Add support for atomic writes for block devices, and statx reporting
for same. Includes SCSI and NVMe (John, Prasad, Alan)
- Add IO priority information to block trace points (Dongliang)
- Various zone improvements and tweaks (Damien)
- mq-deadline tag reservation improvements (Bart)
- Ignore direct reclaim swap writes in writeback throttling (Baokun)
- Block integrity improvements and fixes (Anuj)
- Add basic support for rust based block drivers. Has a dummy null_blk
variant for now (Andreas)
- Series converting driver settings to queue limits, and cleanups and
fixes related to that (Christoph)
- Cleanup for poking too deeply into the bvec internals, in preparation
for DMA mapping API changes (Christoph)
- Various minor tweaks and fixes (Jiapeng, John, Kanchan, Mikulas,
Ming, Zhu, Damien, Christophe, Chaitanya)
* tag 'for-6.11/block-20240710' of git://git.kernel.dk/linux: (206 commits)
floppy: add missing MODULE_DESCRIPTION() macro
loop: add missing MODULE_DESCRIPTION() macro
ublk_drv: add missing MODULE_DESCRIPTION() macro
xen/blkback: add missing MODULE_DESCRIPTION() macro
block/rnbd: Constify struct kobj_type
block: take offset into account in blk_bvec_map_sg again
block: fix get_max_segment_size() warning
loop: Don't bother validating blocksize
virtio_blk: Don't bother validating blocksize
null_blk: Don't bother validating blocksize
block: Validate logical block size in blk_validate_limits()
virtio_blk: Fix default logical block size fallback
nvmet-auth: fix nvmet_auth hash error handling
nvme: implement ->get_unique_id
block: pass a phys_addr_t to get_max_segment_size
block: add a bvec_phys helper
blk-lib: check for kill signal in ioctl BLKZEROOUT
block: limit the Write Zeroes to manually writing zeroes fallback
block: refacto blkdev_issue_zeroout
block: move read-only and supported checks into (__)blkdev_issue_zeroout
...
2024-07-16 05:20:22 +08:00
|
|
|
void bdev_statx(struct path *path, struct kstat *stat,
|
2024-06-20 20:53:55 +08:00
|
|
|
u32 request_mask)
|
2022-08-27 14:58:45 +08:00
|
|
|
{
|
for-6.11/block-20240710
-----BEGIN PGP SIGNATURE-----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=wVi8
-----END PGP SIGNATURE-----
Merge tag 'for-6.11/block-20240710' of git://git.kernel.dk/linux
Pull block updates from Jens Axboe:
- NVMe updates via Keith:
- Device initialization memory leak fixes (Keith)
- More constants defined (Weiwen)
- Target debugfs support (Hannes)
- PCIe subsystem reset enhancements (Keith)
- Queue-depth multipath policy (Redhat and PureStorage)
- Implement get_unique_id (Christoph)
- Authentication error fixes (Gaosheng)
- MD updates via Song
- sync_action fix and refactoring (Yu Kuai)
- Various small fixes (Christoph Hellwig, Li Nan, and Ofir Gal, Yu
Kuai, Benjamin Marzinski, Christophe JAILLET, Yang Li)
- Fix loop detach/open race (Gulam)
- Fix lower control limit for blk-throttle (Yu)
- Add module descriptions to various drivers (Jeff)
- Add support for atomic writes for block devices, and statx reporting
for same. Includes SCSI and NVMe (John, Prasad, Alan)
- Add IO priority information to block trace points (Dongliang)
- Various zone improvements and tweaks (Damien)
- mq-deadline tag reservation improvements (Bart)
- Ignore direct reclaim swap writes in writeback throttling (Baokun)
- Block integrity improvements and fixes (Anuj)
- Add basic support for rust based block drivers. Has a dummy null_blk
variant for now (Andreas)
- Series converting driver settings to queue limits, and cleanups and
fixes related to that (Christoph)
- Cleanup for poking too deeply into the bvec internals, in preparation
for DMA mapping API changes (Christoph)
- Various minor tweaks and fixes (Jiapeng, John, Kanchan, Mikulas,
Ming, Zhu, Damien, Christophe, Chaitanya)
* tag 'for-6.11/block-20240710' of git://git.kernel.dk/linux: (206 commits)
floppy: add missing MODULE_DESCRIPTION() macro
loop: add missing MODULE_DESCRIPTION() macro
ublk_drv: add missing MODULE_DESCRIPTION() macro
xen/blkback: add missing MODULE_DESCRIPTION() macro
block/rnbd: Constify struct kobj_type
block: take offset into account in blk_bvec_map_sg again
block: fix get_max_segment_size() warning
loop: Don't bother validating blocksize
virtio_blk: Don't bother validating blocksize
null_blk: Don't bother validating blocksize
block: Validate logical block size in blk_validate_limits()
virtio_blk: Fix default logical block size fallback
nvmet-auth: fix nvmet_auth hash error handling
nvme: implement ->get_unique_id
block: pass a phys_addr_t to get_max_segment_size
block: add a bvec_phys helper
blk-lib: check for kill signal in ioctl BLKZEROOUT
block: limit the Write Zeroes to manually writing zeroes fallback
block: refacto blkdev_issue_zeroout
block: move read-only and supported checks into (__)blkdev_issue_zeroout
...
2024-07-16 05:20:22 +08:00
|
|
|
struct inode *backing_inode;
|
2022-08-27 14:58:45 +08:00
|
|
|
struct block_device *bdev;
|
|
|
|
|
2024-06-20 20:53:55 +08:00
|
|
|
if (!(request_mask & (STATX_DIOALIGN | STATX_WRITE_ATOMIC)))
|
|
|
|
return;
|
|
|
|
|
for-6.11/block-20240710
-----BEGIN PGP SIGNATURE-----
iQJEBAABCAAuFiEEwPw5LcreJtl1+l5K99NY+ylx4KYFAmaOTd8QHGF4Ym9lQGtl
cm5lbC5kawAKCRD301j7KXHgppqIEACUr8Vv2FtezvT3OfVSlYWHHLXzkRhwEG5s
vdk0o7Ow6U54sMjfymbHTgLD0ZOJf3uJ6BI95FQuW41jPzDFVbx4Hy8QzqonMkw9
1D/YQ4zrVL2mOKBzATbKpoGJzMOzGeoXEueFZ1AYPAX7RrDtP4xPQNfrcfkdE2zF
LycJN70Vp6lrZZMuI9yb9ts1tf7TFzK0HJANxOAKTgSiPmBmxesjkJlhrdUrgkAU
qDVyjj7u/ssndBJAb9i6Bl95Do8s9t4DeJq5/6wgKqtf5hClMXzPVB8Wy084gr6E
rTRsCEhOug3qEZSqfAgAxnd3XFRNc/p2KMUe5YZ4mAqux4hpSmIQQDM/5X5K9vEv
f4MNqUGlqyqntZx+KPyFpf7kLHFYS1qK4ub0FojWJEY4GrbBPNjjncLJ9+ozR0c8
kNDaFjMNAjalBee1FxNNH8LdVcd28rrCkPxRLEfO/gvBMUmvJf4ZyKmSED0v5DhY
vZqKlBqG+wg0EXvdiWEHMDh9Y+q/2XBIkS6NN/Bhh61HNu+XzC838ts1X7lR+4o2
AM5Vapw+v0q6kFBMRP3IcJI/c0UcIU8EQU7axMyzWtvhog8kx8x01hIj1L4UyYYr
rUdWrkugBVXJbywFuH/QIJxWxS/z4JdSw5VjASJLIrXy+aANmmG9Wonv95eyhpUv
5iv+EdRSNA==
=wVi8
-----END PGP SIGNATURE-----
Merge tag 'for-6.11/block-20240710' of git://git.kernel.dk/linux
Pull block updates from Jens Axboe:
- NVMe updates via Keith:
- Device initialization memory leak fixes (Keith)
- More constants defined (Weiwen)
- Target debugfs support (Hannes)
- PCIe subsystem reset enhancements (Keith)
- Queue-depth multipath policy (Redhat and PureStorage)
- Implement get_unique_id (Christoph)
- Authentication error fixes (Gaosheng)
- MD updates via Song
- sync_action fix and refactoring (Yu Kuai)
- Various small fixes (Christoph Hellwig, Li Nan, and Ofir Gal, Yu
Kuai, Benjamin Marzinski, Christophe JAILLET, Yang Li)
- Fix loop detach/open race (Gulam)
- Fix lower control limit for blk-throttle (Yu)
- Add module descriptions to various drivers (Jeff)
- Add support for atomic writes for block devices, and statx reporting
for same. Includes SCSI and NVMe (John, Prasad, Alan)
- Add IO priority information to block trace points (Dongliang)
- Various zone improvements and tweaks (Damien)
- mq-deadline tag reservation improvements (Bart)
- Ignore direct reclaim swap writes in writeback throttling (Baokun)
- Block integrity improvements and fixes (Anuj)
- Add basic support for rust based block drivers. Has a dummy null_blk
variant for now (Andreas)
- Series converting driver settings to queue limits, and cleanups and
fixes related to that (Christoph)
- Cleanup for poking too deeply into the bvec internals, in preparation
for DMA mapping API changes (Christoph)
- Various minor tweaks and fixes (Jiapeng, John, Kanchan, Mikulas,
Ming, Zhu, Damien, Christophe, Chaitanya)
* tag 'for-6.11/block-20240710' of git://git.kernel.dk/linux: (206 commits)
floppy: add missing MODULE_DESCRIPTION() macro
loop: add missing MODULE_DESCRIPTION() macro
ublk_drv: add missing MODULE_DESCRIPTION() macro
xen/blkback: add missing MODULE_DESCRIPTION() macro
block/rnbd: Constify struct kobj_type
block: take offset into account in blk_bvec_map_sg again
block: fix get_max_segment_size() warning
loop: Don't bother validating blocksize
virtio_blk: Don't bother validating blocksize
null_blk: Don't bother validating blocksize
block: Validate logical block size in blk_validate_limits()
virtio_blk: Fix default logical block size fallback
nvmet-auth: fix nvmet_auth hash error handling
nvme: implement ->get_unique_id
block: pass a phys_addr_t to get_max_segment_size
block: add a bvec_phys helper
blk-lib: check for kill signal in ioctl BLKZEROOUT
block: limit the Write Zeroes to manually writing zeroes fallback
block: refacto blkdev_issue_zeroout
block: move read-only and supported checks into (__)blkdev_issue_zeroout
...
2024-07-16 05:20:22 +08:00
|
|
|
backing_inode = d_backing_inode(path->dentry);
|
|
|
|
|
2024-06-20 20:53:55 +08:00
|
|
|
/*
|
|
|
|
* Note that backing_inode is the inode of a block device node file,
|
|
|
|
* not the block device's internal inode. Therefore it is *not* valid
|
|
|
|
* to use I_BDEV() here; the block device has to be looked up by i_rdev
|
|
|
|
* instead.
|
|
|
|
*/
|
|
|
|
bdev = blkdev_get_no_open(backing_inode->i_rdev);
|
2022-08-27 14:58:45 +08:00
|
|
|
if (!bdev)
|
|
|
|
return;
|
|
|
|
|
2024-06-20 20:53:55 +08:00
|
|
|
if (request_mask & STATX_DIOALIGN) {
|
|
|
|
stat->dio_mem_align = bdev_dma_alignment(bdev) + 1;
|
|
|
|
stat->dio_offset_align = bdev_logical_block_size(bdev);
|
|
|
|
stat->result_mask |= STATX_DIOALIGN;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (request_mask & STATX_WRITE_ATOMIC && bdev_can_atomic_write(bdev)) {
|
|
|
|
struct request_queue *bd_queue = bdev->bd_queue;
|
|
|
|
|
|
|
|
generic_fill_statx_atomic_writes(stat,
|
|
|
|
queue_atomic_write_unit_min_bytes(bd_queue),
|
|
|
|
queue_atomic_write_unit_max_bytes(bd_queue));
|
|
|
|
}
|
2022-08-27 14:58:45 +08:00
|
|
|
|
|
|
|
blkdev_put_no_open(bdev);
|
|
|
|
}
|
2023-11-02 01:43:08 +08:00
|
|
|
|
2024-04-11 22:53:43 +08:00
|
|
|
bool disk_live(struct gendisk *disk)
|
|
|
|
{
|
2024-04-29 07:09:12 +08:00
|
|
|
return !inode_unhashed(BD_INODE(disk->part0));
|
2024-04-11 22:53:43 +08:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(disk_live);
|
|
|
|
|
|
|
|
unsigned int block_size(struct block_device *bdev)
|
|
|
|
{
|
2024-04-29 07:09:12 +08:00
|
|
|
return 1 << BD_INODE(bdev)->i_blkbits;
|
2024-04-11 22:53:43 +08:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(block_size);
|
|
|
|
|
2023-11-02 01:43:08 +08:00
|
|
|
static int __init setup_bdev_allow_write_mounted(char *str)
|
|
|
|
{
|
|
|
|
if (kstrtobool(str, &bdev_allow_write_mounted))
|
|
|
|
pr_warn("Invalid option string for bdev_allow_write_mounted:"
|
|
|
|
" '%s'\n", str);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
__setup("bdev_allow_write_mounted=", setup_bdev_allow_write_mounted);
|