]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/shared/blockdev-util.c
Merge pull request #22759 from msekletar/issue-18077-long-sysfs-paths-hashing
[thirdparty/systemd.git] / src / shared / blockdev-util.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <sys/file.h>
4 #include <unistd.h>
5
6 #include "alloc-util.h"
7 #include "blockdev-util.h"
8 #include "btrfs-util.h"
9 #include "devnum-util.h"
10 #include "dirent-util.h"
11 #include "fd-util.h"
12 #include "fileio.h"
13 #include "missing_magic.h"
14 #include "parse-util.h"
15
16 int block_get_whole_disk(dev_t d, dev_t *ret) {
17 char p[SYS_BLOCK_PATH_MAX("/partition")];
18 _cleanup_free_ char *s = NULL;
19 dev_t devt;
20 int r;
21
22 assert(ret);
23
24 if (major(d) == 0)
25 return -ENODEV;
26
27 /* If it has a queue this is good enough for us */
28 xsprintf_sys_block_path(p, "/queue", d);
29 if (access(p, F_OK) >= 0) {
30 *ret = d;
31 return 0;
32 }
33 if (errno != ENOENT)
34 return -errno;
35
36 /* If it is a partition find the originating device */
37 xsprintf_sys_block_path(p, "/partition", d);
38 if (access(p, F_OK) < 0)
39 return -errno;
40
41 /* Get parent dev_t */
42 xsprintf_sys_block_path(p, "/../dev", d);
43 r = read_one_line_file(p, &s);
44 if (r < 0)
45 return r;
46
47 r = parse_devnum(s, &devt);
48 if (r < 0)
49 return r;
50
51 /* Only return this if it is really good enough for us. */
52 xsprintf_sys_block_path(p, "/queue", devt);
53 if (access(p, F_OK) < 0)
54 return -errno;
55
56 *ret = devt;
57 return 1;
58 }
59
60 int get_block_device_fd(int fd, dev_t *ret) {
61 struct stat st;
62 int r;
63
64 assert(fd >= 0);
65 assert(ret);
66
67 /* Gets the block device directly backing a file system. If the block device is encrypted, returns
68 * the device mapper block device. */
69
70 if (fstat(fd, &st))
71 return -errno;
72
73 if (major(st.st_dev) != 0) {
74 *ret = st.st_dev;
75 return 1;
76 }
77
78 r = btrfs_get_block_device_fd(fd, ret);
79 if (r > 0)
80 return 1;
81 if (r != -ENOTTY) /* not btrfs */
82 return r;
83
84 *ret = 0;
85 return 0;
86 }
87
88 int get_block_device(const char *path, dev_t *ret) {
89 _cleanup_close_ int fd = -1;
90
91 assert(path);
92 assert(ret);
93
94 fd = open(path, O_RDONLY|O_NOFOLLOW|O_CLOEXEC);
95 if (fd < 0)
96 return -errno;
97
98 return get_block_device_fd(fd, ret);
99 }
100
101 int block_get_originating(dev_t dt, dev_t *ret) {
102 _cleanup_closedir_ DIR *d = NULL;
103 _cleanup_free_ char *t = NULL;
104 char p[SYS_BLOCK_PATH_MAX("/slaves")];
105 _cleanup_free_ char *first_found = NULL;
106 const char *q;
107 dev_t devt;
108 int r;
109
110 /* For the specified block device tries to chase it through the layers, in case LUKS-style DM stacking is used,
111 * trying to find the next underlying layer. */
112
113 xsprintf_sys_block_path(p, "/slaves", dt);
114 d = opendir(p);
115 if (!d)
116 return -errno;
117
118 FOREACH_DIRENT_ALL(de, d, return -errno) {
119
120 if (dot_or_dot_dot(de->d_name))
121 continue;
122
123 if (!IN_SET(de->d_type, DT_LNK, DT_UNKNOWN))
124 continue;
125
126 if (first_found) {
127 _cleanup_free_ char *u = NULL, *v = NULL, *a = NULL, *b = NULL;
128
129 /* We found a device backed by multiple other devices. We don't really support
130 * automatic discovery on such setups, with the exception of dm-verity partitions. In
131 * this case there are two backing devices: the data partition and the hash
132 * partition. We are fine with such setups, however, only if both partitions are on
133 * the same physical device. Hence, let's verify this by iterating over every node
134 * in the 'slaves/' directory and comparing them with the first that gets returned by
135 * readdir(), to ensure they all point to the same device. */
136
137 u = path_join(p, de->d_name, "../dev");
138 if (!u)
139 return -ENOMEM;
140
141 v = path_join(p, first_found, "../dev");
142 if (!v)
143 return -ENOMEM;
144
145 r = read_one_line_file(u, &a);
146 if (r < 0)
147 return log_debug_errno(r, "Failed to read %s: %m", u);
148
149 r = read_one_line_file(v, &b);
150 if (r < 0)
151 return log_debug_errno(r, "Failed to read %s: %m", v);
152
153 /* Check if the parent device is the same. If not, then the two backing devices are on
154 * different physical devices, and we don't support that. */
155 if (!streq(a, b))
156 return -ENOTUNIQ;
157 } else {
158 first_found = strdup(de->d_name);
159 if (!first_found)
160 return -ENOMEM;
161 }
162 }
163
164 if (!first_found)
165 return -ENOENT;
166
167 q = strjoina(p, "/", first_found, "/dev");
168
169 r = read_one_line_file(q, &t);
170 if (r < 0)
171 return r;
172
173 r = parse_devnum(t, &devt);
174 if (r < 0)
175 return -EINVAL;
176
177 if (major(devt) == 0)
178 return -ENOENT;
179
180 *ret = devt;
181 return 1;
182 }
183
184 int get_block_device_harder_fd(int fd, dev_t *ret) {
185 int r;
186
187 assert(fd >= 0);
188 assert(ret);
189
190 /* Gets the backing block device for a file system, and handles LUKS encrypted file systems, looking for its
191 * immediate parent, if there is one. */
192
193 r = get_block_device_fd(fd, ret);
194 if (r <= 0)
195 return r;
196
197 r = block_get_originating(*ret, ret);
198 if (r < 0)
199 log_debug_errno(r, "Failed to chase block device, ignoring: %m");
200
201 return 1;
202 }
203
204 int get_block_device_harder(const char *path, dev_t *ret) {
205 _cleanup_close_ int fd = -1;
206
207 assert(path);
208 assert(ret);
209
210 fd = open(path, O_RDONLY|O_NOFOLLOW|O_CLOEXEC);
211 if (fd < 0)
212 return -errno;
213
214 return get_block_device_harder_fd(fd, ret);
215 }
216
217 int lock_whole_block_device(dev_t devt, int operation) {
218 _cleanup_free_ char *whole_node = NULL;
219 _cleanup_close_ int lock_fd = -1;
220 dev_t whole_devt;
221 int r;
222
223 /* Let's get a BSD file lock on the whole block device, as per: https://systemd.io/BLOCK_DEVICE_LOCKING */
224
225 r = block_get_whole_disk(devt, &whole_devt);
226 if (r < 0)
227 return r;
228
229 r = device_path_make_major_minor(S_IFBLK, whole_devt, &whole_node);
230 if (r < 0)
231 return r;
232
233 lock_fd = open(whole_node, O_RDONLY|O_CLOEXEC|O_NONBLOCK);
234 if (lock_fd < 0)
235 return -errno;
236
237 if (flock(lock_fd, operation) < 0)
238 return -errno;
239
240 return TAKE_FD(lock_fd);
241 }
242
243 int blockdev_partscan_enabled(int fd) {
244 _cleanup_free_ char *p = NULL, *buf = NULL;
245 unsigned long long ull;
246 struct stat st;
247 int r;
248
249 /* Checks if partition scanning is correctly enabled on the block device */
250
251 if (fstat(fd, &st) < 0)
252 return -errno;
253
254 if (!S_ISBLK(st.st_mode))
255 return -ENOTBLK;
256
257 if (asprintf(&p, "/sys/dev/block/%u:%u/capability", major(st.st_rdev), minor(st.st_rdev)) < 0)
258 return -ENOMEM;
259
260 r = read_one_line_file(p, &buf);
261 if (r == -ENOENT) /* If the capability file doesn't exist then we are most likely looking at a
262 * partition block device, not the whole block device. And that means we have no
263 * partition scanning on for it (we do for its parent, but not for the partition
264 * itself). */
265 return false;
266 if (r < 0)
267 return r;
268
269 r = safe_atollu_full(buf, 16, &ull);
270 if (r < 0)
271 return r;
272
273 #ifndef GENHD_FL_NO_PART_SCAN
274 #define GENHD_FL_NO_PART_SCAN (0x0200)
275 #endif
276
277 return !FLAGS_SET(ull, GENHD_FL_NO_PART_SCAN);
278 }
279
280 static int blockdev_is_encrypted(const char *sysfs_path, unsigned depth_left) {
281 _cleanup_free_ char *p = NULL, *uuids = NULL;
282 _cleanup_closedir_ DIR *d = NULL;
283 int r, found_encrypted = false;
284
285 assert(sysfs_path);
286
287 if (depth_left == 0)
288 return -EINVAL;
289
290 p = path_join(sysfs_path, "dm/uuid");
291 if (!p)
292 return -ENOMEM;
293
294 r = read_one_line_file(p, &uuids);
295 if (r != -ENOENT) {
296 if (r < 0)
297 return r;
298
299 /* The DM device's uuid attribute is prefixed with "CRYPT-" if this is a dm-crypt device. */
300 if (startswith(uuids, "CRYPT-"))
301 return true;
302 }
303
304 /* Not a dm-crypt device itself. But maybe it is on top of one? Follow the links in the "slaves/"
305 * subdir. */
306
307 p = mfree(p);
308 p = path_join(sysfs_path, "slaves");
309 if (!p)
310 return -ENOMEM;
311
312 d = opendir(p);
313 if (!d) {
314 if (errno == ENOENT) /* Doesn't have underlying devices */
315 return false;
316
317 return -errno;
318 }
319
320 for (;;) {
321 _cleanup_free_ char *q = NULL;
322 struct dirent *de;
323
324 errno = 0;
325 de = readdir_no_dot(d);
326 if (!de) {
327 if (errno != 0)
328 return -errno;
329
330 break; /* No more underlying devices */
331 }
332
333 q = path_join(p, de->d_name);
334 if (!q)
335 return -ENOMEM;
336
337 r = blockdev_is_encrypted(q, depth_left - 1);
338 if (r < 0)
339 return r;
340 if (r == 0) /* we found one that is not encrypted? then propagate that immediately */
341 return false;
342
343 found_encrypted = true;
344 }
345
346 return found_encrypted;
347 }
348
349 int fd_is_encrypted(int fd) {
350 char p[SYS_BLOCK_PATH_MAX(NULL)];
351 dev_t devt;
352 int r;
353
354 r = get_block_device_fd(fd, &devt);
355 if (r < 0)
356 return r;
357 if (r == 0) /* doesn't have a block device */
358 return false;
359
360 xsprintf_sys_block_path(p, NULL, devt);
361
362 return blockdev_is_encrypted(p, 10 /* safety net: maximum recursion depth */);
363 }
364
365 int path_is_encrypted(const char *path) {
366 char p[SYS_BLOCK_PATH_MAX(NULL)];
367 dev_t devt;
368 int r;
369
370 r = get_block_device(path, &devt);
371 if (r < 0)
372 return r;
373 if (r == 0) /* doesn't have a block device */
374 return false;
375
376 xsprintf_sys_block_path(p, NULL, devt);
377
378 return blockdev_is_encrypted(p, 10 /* safety net: maximum recursion depth */);
379 }