]>
git.ipfire.org Git - thirdparty/systemd.git/blob - src/shared/blockdev-util.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
6 #include "alloc-util.h"
7 #include "blockdev-util.h"
8 #include "btrfs-util.h"
9 #include "dirent-util.h"
12 #include "missing_magic.h"
13 #include "parse-util.h"
14 #include "stat-util.h"
16 int block_get_whole_disk(dev_t d
, dev_t
*ret
) {
17 char p
[SYS_BLOCK_PATH_MAX("/partition")];
18 _cleanup_free_
char *s
= NULL
;
27 /* If it has a queue this is good enough for us */
28 xsprintf_sys_block_path(p
, "/queue", d
);
29 if (access(p
, F_OK
) >= 0) {
36 /* If it is a partition find the originating device */
37 xsprintf_sys_block_path(p
, "/partition", d
);
38 if (access(p
, F_OK
) < 0)
41 /* Get parent dev_t */
42 xsprintf_sys_block_path(p
, "/../dev", d
);
43 r
= read_one_line_file(p
, &s
);
47 r
= parse_dev(s
, &devt
);
51 /* Only return this if it is really good enough for us. */
52 xsprintf_sys_block_path(p
, "/queue", devt
);
53 if (access(p
, F_OK
) < 0)
60 int get_block_device_fd(int fd
, dev_t
*ret
) {
67 /* Gets the block device directly backing a file system. If the block device is encrypted, returns
68 * the device mapper block device. */
73 if (major(st
.st_dev
) != 0) {
78 r
= btrfs_get_block_device_fd(fd
, ret
);
81 if (r
!= -ENOTTY
) /* not btrfs */
88 int get_block_device(const char *path
, dev_t
*ret
) {
89 _cleanup_close_
int fd
= -1;
94 fd
= open(path
, O_RDONLY
|O_NOFOLLOW
|O_CLOEXEC
);
98 return get_block_device_fd(fd
, ret
);
101 int block_get_originating(dev_t dt
, dev_t
*ret
) {
102 _cleanup_closedir_
DIR *d
= NULL
;
103 _cleanup_free_
char *t
= NULL
;
104 char p
[SYS_BLOCK_PATH_MAX("/slaves")];
105 _cleanup_free_
char *first_found
= NULL
;
111 /* For the specified block device tries to chase it through the layers, in case LUKS-style DM stacking is used,
112 * trying to find the next underlying layer. */
114 xsprintf_sys_block_path(p
, "/slaves", dt
);
119 FOREACH_DIRENT_ALL(de
, d
, return -errno
) {
121 if (dot_or_dot_dot(de
->d_name
))
124 if (!IN_SET(de
->d_type
, DT_LNK
, DT_UNKNOWN
))
128 _cleanup_free_
char *u
= NULL
, *v
= NULL
, *a
= NULL
, *b
= NULL
;
130 /* We found a device backed by multiple other devices. We don't really support
131 * automatic discovery on such setups, with the exception of dm-verity partitions. In
132 * this case there are two backing devices: the data partition and the hash
133 * partition. We are fine with such setups, however, only if both partitions are on
134 * the same physical device. Hence, let's verify this by iterating over every node
135 * in the 'slaves/' directory and comparing them with the first that gets returned by
136 * readdir(), to ensure they all point to the same device. */
138 u
= path_join(p
, de
->d_name
, "../dev");
142 v
= path_join(p
, first_found
, "../dev");
146 r
= read_one_line_file(u
, &a
);
148 return log_debug_errno(r
, "Failed to read %s: %m", u
);
150 r
= read_one_line_file(v
, &b
);
152 return log_debug_errno(r
, "Failed to read %s: %m", v
);
154 /* Check if the parent device is the same. If not, then the two backing devices are on
155 * different physical devices, and we don't support that. */
159 first_found
= strdup(de
->d_name
);
168 q
= strjoina(p
, "/", first_found
, "/dev");
170 r
= read_one_line_file(q
, &t
);
174 r
= parse_dev(t
, &devt
);
178 if (major(devt
) == 0)
185 int get_block_device_harder(const char *path
, dev_t
*ret
) {
191 /* Gets the backing block device for a file system, and handles LUKS encrypted file systems, looking for its
192 * immediate parent, if there is one. */
194 r
= get_block_device(path
, ret
);
198 r
= block_get_originating(*ret
, ret
);
200 log_debug_errno(r
, "Failed to chase block device '%s', ignoring: %m", path
);
205 int lock_whole_block_device(dev_t devt
, int operation
) {
206 _cleanup_free_
char *whole_node
= NULL
;
207 _cleanup_close_
int lock_fd
= -1;
211 /* Let's get a BSD file lock on the whole block device, as per: https://systemd.io/BLOCK_DEVICE_LOCKING */
213 r
= block_get_whole_disk(devt
, &whole_devt
);
217 r
= device_path_make_major_minor(S_IFBLK
, whole_devt
, &whole_node
);
221 lock_fd
= open(whole_node
, O_RDONLY
|O_CLOEXEC
|O_NONBLOCK
);
225 if (flock(lock_fd
, operation
) < 0)
228 return TAKE_FD(lock_fd
);
231 int blockdev_partscan_enabled(int fd
) {
232 _cleanup_free_
char *p
= NULL
, *buf
= NULL
;
233 unsigned long long ull
;
237 /* Checks if partition scanning is correctly enabled on the block device */
239 if (fstat(fd
, &st
) < 0)
242 if (!S_ISBLK(st
.st_mode
))
245 if (asprintf(&p
, "/sys/dev/block/%u:%u/capability", major(st
.st_rdev
), minor(st
.st_rdev
)) < 0)
248 r
= read_one_line_file(p
, &buf
);
249 if (r
== -ENOENT
) /* If the capability file doesn't exist then we are most likely looking at a
250 * partition block device, not the whole block device. And that means we have no
251 * partition scanning on for it (we do for its parent, but not for the partition
257 r
= safe_atollu_full(buf
, 16, &ull
);
261 #ifndef GENHD_FL_NO_PART_SCAN
262 #define GENHD_FL_NO_PART_SCAN (0x0200)
265 return !FLAGS_SET(ull
, GENHD_FL_NO_PART_SCAN
);
268 static int blockdev_is_encrypted(const char *sysfs_path
, unsigned depth_left
) {
269 _cleanup_free_
char *p
= NULL
, *uuids
= NULL
;
270 _cleanup_closedir_
DIR *d
= NULL
;
271 int r
, found_encrypted
= false;
278 p
= path_join(sysfs_path
, "dm/uuid");
282 r
= read_one_line_file(p
, &uuids
);
287 /* The DM device's uuid attribute is prefixed with "CRYPT-" if this is a dm-crypt device. */
288 if (startswith(uuids
, "CRYPT-"))
292 /* Not a dm-crypt device itself. But maybe it is on top of one? Follow the links in the "slaves/"
296 p
= path_join(sysfs_path
, "slaves");
302 if (errno
== ENOENT
) /* Doesn't have underlying devices */
309 _cleanup_free_
char *q
= NULL
;
313 de
= readdir_no_dot(d
);
318 break; /* No more underlying devices */
321 q
= path_join(p
, de
->d_name
);
325 r
= blockdev_is_encrypted(q
, depth_left
- 1);
328 if (r
== 0) /* we found one that is not encrypted? then propagate that immediately */
331 found_encrypted
= true;
334 return found_encrypted
;
337 int fd_is_encrypted(int fd
) {
338 char p
[SYS_BLOCK_PATH_MAX(NULL
)];
342 r
= get_block_device_fd(fd
, &devt
);
345 if (r
== 0) /* doesn't have a block device */
348 xsprintf_sys_block_path(p
, NULL
, devt
);
350 return blockdev_is_encrypted(p
, 10 /* safety net: maximum recursion depth */);
353 int path_is_encrypted(const char *path
) {
354 char p
[SYS_BLOCK_PATH_MAX(NULL
)];
358 r
= get_block_device(path
, &devt
);
361 if (r
== 0) /* doesn't have a block device */
364 xsprintf_sys_block_path(p
, NULL
, devt
);
366 return blockdev_is_encrypted(p
, 10 /* safety net: maximum recursion depth */);