| /* |
| * linux/drivers/block/loop.c |
| * |
| * Written by Theodore Ts'o, 3/29/93 |
| * |
| * Copyright 1993 by Theodore Ts'o. Redistribution of this file is |
| * permitted under the GNU General Public License. |
| * |
| * DES encryption plus some minor changes by Werner Almesberger, 30-MAY-1993 |
| * more DES encryption plus IDEA encryption by Nicholas J. Leon, June 20, 1996 |
| * |
| * Modularized and updated for 1.1.16 kernel - Mitch Dsouza 28th May 1994 |
| * Adapted for 1.3.59 kernel - Andries Brouwer, 1 Feb 1996 |
| * |
| * Fixed do_loop_request() re-entrancy - Vincent.Renardias@waw.com Mar 20, 1997 |
| * |
| * Added devfs support - Richard Gooch <rgooch@atnf.csiro.au> 16-Jan-1998 |
| * |
| * Handle sparse backing files correctly - Kenn Humborg, Jun 28, 1998 |
| * |
| * Loadable modules and other fixes by AK, 1998 |
| * |
| * Make real block number available to downstream transfer functions, enables |
| * CBC (and relatives) mode encryption requiring unique IVs per data block. |
| * Reed H. Petty, rhp@draper.net |
| * |
| * Maximum number of loop devices now dynamic via max_loop module parameter. |
| * Russell Kroll <rkroll@exploits.org> 19990701 |
| * |
| * Maximum number of loop devices when compiled-in now selectable by passing |
| * max_loop=<1-255> to the kernel on boot. |
| * Erik I. Bolsø, <eriki@himolde.no>, Oct 31, 1999 |
| * |
| * Completely rewrite request handling to be make_request_fn style and |
| * non blocking, pushing work to a helper thread. Lots of fixes from |
| * Al Viro too. |
| * Jens Axboe <axboe@suse.de>, Nov 2000 |
| * |
| * Support up to 256 loop devices |
| * Heinz Mauelshagen <mge@sistina.com>, Feb 2002 |
| * |
| * Support for falling back on the write file operation when the address space |
| * operations prepare_write and/or commit_write are not available on the |
| * backing filesystem. |
| * Anton Altaparmakov, 16 Feb 2005 |
| * |
| * Still To Fix: |
| * - Advisory locking is ignored here. |
| * - Should use an own CAP_* category instead of CAP_SYS_ADMIN |
| * |
| */ |
| |
| #include <linux/module.h> |
| #include <linux/moduleparam.h> |
| #include <linux/sched.h> |
| #include <linux/fs.h> |
| #include <linux/file.h> |
| #include <linux/stat.h> |
| #include <linux/errno.h> |
| #include <linux/major.h> |
| #include <linux/wait.h> |
| #include <linux/blkdev.h> |
| #include <linux/blkpg.h> |
| #include <linux/init.h> |
| #include <linux/smp_lock.h> |
| #include <linux/swap.h> |
| #include <linux/slab.h> |
| #include <linux/loop.h> |
| #include <linux/compat.h> |
| #include <linux/suspend.h> |
| #include <linux/writeback.h> |
| #include <linux/buffer_head.h> /* for invalidate_bdev() */ |
| #include <linux/completion.h> |
| #include <linux/highmem.h> |
| #include <linux/gfp.h> |
| #include <linux/kthread.h> |
| |
| #include <asm/uaccess.h> |
| |
| static LIST_HEAD(loop_devices); |
| static DEFINE_MUTEX(loop_devices_mutex); |
| |
| /* |
| * Transfer functions |
| */ |
| static int transfer_none(struct loop_device *lo, int cmd, |
| struct page *raw_page, unsigned raw_off, |
| struct page *loop_page, unsigned loop_off, |
| int size, sector_t real_block) |
| { |
| char *raw_buf = kmap_atomic(raw_page, KM_USER0) + raw_off; |
| char *loop_buf = kmap_atomic(loop_page, KM_USER1) + loop_off; |
| |
| if (cmd == READ) |
| memcpy(loop_buf, raw_buf, size); |
| else |
| memcpy(raw_buf, loop_buf, size); |
| |
| kunmap_atomic(raw_buf, KM_USER0); |
| kunmap_atomic(loop_buf, KM_USER1); |
| cond_resched(); |
| return 0; |
| } |
| |
| static int transfer_xor(struct loop_device *lo, int cmd, |
| struct page *raw_page, unsigned raw_off, |
| struct page *loop_page, unsigned loop_off, |
| int size, sector_t real_block) |
| { |
| char *raw_buf = kmap_atomic(raw_page, KM_USER0) + raw_off; |
| char *loop_buf = kmap_atomic(loop_page, KM_USER1) + loop_off; |
| char *in, *out, *key; |
| int i, keysize; |
| |
| if (cmd == READ) { |
| in = raw_buf; |
| out = loop_buf; |
| } else { |
| in = loop_buf; |
| out = raw_buf; |
| } |
| |
| key = lo->lo_encrypt_key; |
| keysize = lo->lo_encrypt_key_size; |
| for (i = 0; i < size; i++) |
| *out++ = *in++ ^ key[(i & 511) % keysize]; |
| |
| kunmap_atomic(raw_buf, KM_USER0); |
| kunmap_atomic(loop_buf, KM_USER1); |
| cond_resched(); |
| return 0; |
| } |
| |
| static int xor_init(struct loop_device *lo, const struct loop_info64 *info) |
| { |
| if (unlikely(info->lo_encrypt_key_size <= 0)) |
| return -EINVAL; |
| return 0; |
| } |
| |
| static struct loop_func_table none_funcs = { |
| .number = LO_CRYPT_NONE, |
| .transfer = transfer_none, |
| }; |
| |
| static struct loop_func_table xor_funcs = { |
| .number = LO_CRYPT_XOR, |
| .transfer = transfer_xor, |
| .init = xor_init |
| }; |
| |
| /* xfer_funcs[0] is special - its release function is never called */ |
| static struct loop_func_table *xfer_funcs[MAX_LO_CRYPT] = { |
| &none_funcs, |
| &xor_funcs |
| }; |
| |
| static loff_t get_loop_size(struct loop_device *lo, struct file *file) |
| { |
| loff_t size, offset, loopsize; |
| |
| /* Compute loopsize in bytes */ |
| size = i_size_read(file->f_mapping->host); |
| offset = lo->lo_offset; |
| loopsize = size - offset; |
| if (lo->lo_sizelimit > 0 && lo->lo_sizelimit < loopsize) |
| loopsize = lo->lo_sizelimit; |
| |
| /* |
| * Unfortunately, if we want to do I/O on the device, |
| * the number of 512-byte sectors has to fit into a sector_t. |
| */ |
| return loopsize >> 9; |
| } |
| |
| static int |
| figure_loop_size(struct loop_device *lo) |
| { |
| loff_t size = get_loop_size(lo, lo->lo_backing_file); |
| sector_t x = (sector_t)size; |
| |
| if (unlikely((loff_t)x != size)) |
| return -EFBIG; |
| |
| set_capacity(lo->lo_disk, x); |
| return 0; |
| } |
| |
| static inline int |
| lo_do_transfer(struct loop_device *lo, int cmd, |
| struct page *rpage, unsigned roffs, |
| struct page *lpage, unsigned loffs, |
| int size, sector_t rblock) |
| { |
| if (unlikely(!lo->transfer)) |
| return 0; |
| |
| return lo->transfer(lo, cmd, rpage, roffs, lpage, loffs, size, rblock); |
| } |
| |
| /** |
| * do_lo_send_aops - helper for writing data to a loop device |
| * |
| * This is the fast version for backing filesystems which implement the address |
| * space operations prepare_write and commit_write. |
| */ |
| static int do_lo_send_aops(struct loop_device *lo, struct bio_vec *bvec, |
| int bsize, loff_t pos, struct page *page) |
| { |
| struct file *file = lo->lo_backing_file; /* kudos to NFsckingS */ |
| struct address_space *mapping = file->f_mapping; |
| const struct address_space_operations *aops = mapping->a_ops; |
| pgoff_t index; |
| unsigned offset, bv_offs; |
| int len, ret; |
| |
| mutex_lock(&mapping->host->i_mutex); |
| index = pos >> PAGE_CACHE_SHIFT; |
| offset = pos & ((pgoff_t)PAGE_CACHE_SIZE - 1); |
| bv_offs = bvec->bv_offset; |
| len = bvec->bv_len; |
| while (len > 0) { |
| sector_t IV; |
| unsigned size; |
| int transfer_result; |
| |
| IV = ((sector_t)index << (PAGE_CACHE_SHIFT - 9))+(offset >> 9); |
| size = PAGE_CACHE_SIZE - offset; |
| if (size > len) |
| size = len; |
| page = grab_cache_page(mapping, index); |
| if (unlikely(!page)) |
| goto fail; |
| ret = aops->prepare_write(file, page, offset, |
| offset + size); |
| if (unlikely(ret)) { |
| if (ret == AOP_TRUNCATED_PAGE) { |
| page_cache_release(page); |
| continue; |
| } |
| goto unlock; |
| } |
| transfer_result = lo_do_transfer(lo, WRITE, page, offset, |
| bvec->bv_page, bv_offs, size, IV); |
| if (unlikely(transfer_result)) { |
| /* |
| * The transfer failed, but we still write the data to |
| * keep prepare/commit calls balanced. |
| */ |
| printk(KERN_ERR "loop: transfer error block %llu\n", |
| (unsigned long long)index); |
| zero_user_page(page, offset, size, KM_USER0); |
| } |
| flush_dcache_page(page); |
| ret = aops->commit_write(file, page, offset, |
| offset + size); |
| if (unlikely(ret)) { |
| if (ret == AOP_TRUNCATED_PAGE) { |
| page_cache_release(page); |
| continue; |
| } |
| goto unlock; |
| } |
| if (unlikely(transfer_result)) |
| goto unlock; |
| bv_offs += size; |
| len -= size; |
| offset = 0; |
| index++; |
| pos += size; |
| unlock_page(page); |
| page_cache_release(page); |
| } |
| ret = 0; |
| out: |
| mutex_unlock(&mapping->host->i_mutex); |
| return ret; |
| unlock: |
| unlock_page(page); |
| page_cache_release(page); |
| fail: |
| ret = -1; |
| goto out; |
| } |
| |
| /** |
| * __do_lo_send_write - helper for writing data to a loop device |
| * |
| * This helper just factors out common code between do_lo_send_direct_write() |
| * and do_lo_send_write(). |
| */ |
| static int __do_lo_send_write(struct file *file, |
| u8 *buf, const int len, loff_t pos) |
| { |
| ssize_t bw; |
| mm_segment_t old_fs = get_fs(); |
| |
| set_fs(get_ds()); |
| bw = file->f_op->write(file, buf, len, &pos); |
| set_fs(old_fs); |
| if (likely(bw == len)) |
| return 0; |
| printk(KERN_ERR "loop: Write error at byte offset %llu, length %i.\n", |
| (unsigned long long)pos, len); |
| if (bw >= 0) |
| bw = -EIO; |
| return bw; |
| } |
| |
| /** |
| * do_lo_send_direct_write - helper for writing data to a loop device |
| * |
| * This is the fast, non-transforming version for backing filesystems which do |
| * not implement the address space operations prepare_write and commit_write. |
| * It uses the write file operation which should be present on all writeable |
| * filesystems. |
| */ |
| static int do_lo_send_direct_write(struct loop_device *lo, |
| struct bio_vec *bvec, int bsize, loff_t pos, struct page *page) |
| { |
| ssize_t bw = __do_lo_send_write(lo->lo_backing_file, |
| kmap(bvec->bv_page) + bvec->bv_offset, |
| bvec->bv_len, pos); |
| kunmap(bvec->bv_page); |
| cond_resched(); |
| return bw; |
| } |
| |
| /** |
| * do_lo_send_write - helper for writing data to a loop device |
| * |
| * This is the slow, transforming version for filesystems which do not |
| * implement the address space operations prepare_write and commit_write. It |
| * uses the write file operation which should be present on all writeable |
| * filesystems. |
| * |
| * Using fops->write is slower than using aops->{prepare,commit}_write in the |
| * transforming case because we need to double buffer the data as we cannot do |
| * the transformations in place as we do not have direct access to the |
| * destination pages of the backing file. |
| */ |
| static int do_lo_send_write(struct loop_device *lo, struct bio_vec *bvec, |
| int bsize, loff_t pos, struct page *page) |
| { |
| int ret = lo_do_transfer(lo, WRITE, page, 0, bvec->bv_page, |
| bvec->bv_offset, bvec->bv_len, pos >> 9); |
| if (likely(!ret)) |
| return __do_lo_send_write(lo->lo_backing_file, |
| page_address(page), bvec->bv_len, |
| pos); |
| printk(KERN_ERR "loop: Transfer error at byte offset %llu, " |
| "length %i.\n", (unsigned long long)pos, bvec->bv_len); |
| if (ret > 0) |
| ret = -EIO; |
| return ret; |
| } |
| |
| static int lo_send(struct loop_device *lo, struct bio *bio, int bsize, |
| loff_t pos) |
| { |
| int (*do_lo_send)(struct loop_device *, struct bio_vec *, int, loff_t, |
| struct page *page); |
| struct bio_vec *bvec; |
| struct page *page = NULL; |
| int i, ret = 0; |
| |
| do_lo_send = do_lo_send_aops; |
| if (!(lo->lo_flags & LO_FLAGS_USE_AOPS)) { |
| do_lo_send = do_lo_send_direct_write; |
| if (lo->transfer != transfer_none) { |
| page = alloc_page(GFP_NOIO | __GFP_HIGHMEM); |
| if (unlikely(!page)) |
| goto fail; |
| kmap(page); |
| do_lo_send = do_lo_send_write; |
| } |
| } |
| bio_for_each_segment(bvec, bio, i) { |
| ret = do_lo_send(lo, bvec, bsize, pos, page); |
| if (ret < 0) |
| break; |
| pos += bvec->bv_len; |
| } |
| if (page) { |
| kunmap(page); |
| __free_page(page); |
| } |
| out: |
| return ret; |
| fail: |
| printk(KERN_ERR "loop: Failed to allocate temporary page for write.\n"); |
| ret = -ENOMEM; |
| goto out; |
| } |
| |
| struct lo_read_data { |
| struct loop_device *lo; |
| struct page *page; |
| unsigned offset; |
| int bsize; |
| }; |
| |
| static int |
| lo_read_actor(read_descriptor_t *desc, struct page *page, |
| unsigned long offset, unsigned long size) |
| { |
| unsigned long count = desc->count; |
| struct lo_read_data *p = desc->arg.data; |
| struct loop_device *lo = p->lo; |
| sector_t IV; |
| |
| IV = ((sector_t) page->index << (PAGE_CACHE_SHIFT - 9))+(offset >> 9); |
| |
| if (size > count) |
| size = count; |
| |
| if (lo_do_transfer(lo, READ, page, offset, p->page, p->offset, size, IV)) { |
| size = 0; |
| printk(KERN_ERR "loop: transfer error block %ld\n", |
| page->index); |
| desc->error = -EINVAL; |
| } |
| |
| flush_dcache_page(p->page); |
| |
| desc->count = count - size; |
| desc->written += size; |
| p->offset += size; |
| return size; |
| } |
| |
| static int |
| do_lo_receive(struct loop_device *lo, |
| struct bio_vec *bvec, int bsize, loff_t pos) |
| { |
| struct lo_read_data cookie; |
| struct file *file; |
| int retval; |
| |
| cookie.lo = lo; |
| cookie.page = bvec->bv_page; |
| cookie.offset = bvec->bv_offset; |
| cookie.bsize = bsize; |
| file = lo->lo_backing_file; |
| retval = file->f_op->sendfile(file, &pos, bvec->bv_len, |
| lo_read_actor, &cookie); |
| return (retval < 0)? retval: 0; |
| } |
| |
| static int |
| lo_receive(struct loop_device *lo, struct bio *bio, int bsize, loff_t pos) |
| { |
| struct bio_vec *bvec; |
| int i, ret = 0; |
| |
| bio_for_each_segment(bvec, bio, i) { |
| ret = do_lo_receive(lo, bvec, bsize, pos); |
| if (ret < 0) |
| break; |
| pos += bvec->bv_len; |
| } |
| return ret; |
| } |
| |
| static int do_bio_filebacked(struct loop_device *lo, struct bio *bio) |
| { |
| loff_t pos; |
| int ret; |
| |
| pos = ((loff_t) bio->bi_sector << 9) + lo->lo_offset; |
| if (bio_rw(bio) == WRITE) |
| ret = lo_send(lo, bio, lo->lo_blocksize, pos); |
| else |
| ret = lo_receive(lo, bio, lo->lo_blocksize, pos); |
| return ret; |
| } |
| |
| /* |
| * Add bio to back of pending list |
| */ |
| static void loop_add_bio(struct loop_device *lo, struct bio *bio) |
| { |
| if (lo->lo_biotail) { |
| lo->lo_biotail->bi_next = bio; |
| lo->lo_biotail = bio; |
| } else |
| lo->lo_bio = lo->lo_biotail = bio; |
| } |
| |
| /* |
| * Grab first pending buffer |
| */ |
| static struct bio *loop_get_bio(struct loop_device *lo) |
| { |
| struct bio *bio; |
| |
| if ((bio = lo->lo_bio)) { |
| if (bio == lo->lo_biotail) |
| lo->lo_biotail = NULL; |
| lo->lo_bio = bio->bi_next; |
| bio->bi_next = NULL; |
| } |
| |
| return bio; |
| } |
| |
| static int loop_make_request(request_queue_t *q, struct bio *old_bio) |
| { |
| struct loop_device *lo = q->queuedata; |
| int rw = bio_rw(old_bio); |
| |
| if (rw == READA) |
| rw = READ; |
| |
| BUG_ON(!lo || (rw != READ && rw != WRITE)); |
| |
| spin_lock_irq(&lo->lo_lock); |
| if (lo->lo_state != Lo_bound) |
| goto out; |
| if (unlikely(rw == WRITE && (lo->lo_flags & LO_FLAGS_READ_ONLY))) |
| goto out; |
| loop_add_bio(lo, old_bio); |
| wake_up(&lo->lo_event); |
| spin_unlock_irq(&lo->lo_lock); |
| return 0; |
| |
| out: |
| spin_unlock_irq(&lo->lo_lock); |
| bio_io_error(old_bio, old_bio->bi_size); |
| return 0; |
| } |
| |
| /* |
| * kick off io on the underlying address space |
| */ |
| static void loop_unplug(request_queue_t *q) |
| { |
| struct loop_device *lo = q->queuedata; |
| |
| clear_bit(QUEUE_FLAG_PLUGGED, &q->queue_flags); |
| blk_run_address_space(lo->lo_backing_file->f_mapping); |
| } |
| |
| struct switch_request { |
| struct file *file; |
| struct completion wait; |
| }; |
| |
| static void do_loop_switch(struct loop_device *, struct switch_request *); |
| |
| static inline void loop_handle_bio(struct loop_device *lo, struct bio *bio) |
| { |
| if (unlikely(!bio->bi_bdev)) { |
| do_loop_switch(lo, bio->bi_private); |
| bio_put(bio); |
| } else { |
| int ret = do_bio_filebacked(lo, bio); |
| bio_endio(bio, bio->bi_size, ret); |
| } |
| } |
| |
| /* |
| * worker thread that handles reads/writes to file backed loop devices, |
| * to avoid blocking in our make_request_fn. it also does loop decrypting |
| * on reads for block backed loop, as that is too heavy to do from |
| * b_end_io context where irqs may be disabled. |
| * |
| * Loop explanation: loop_clr_fd() sets lo_state to Lo_rundown before |
| * calling kthread_stop(). Therefore once kthread_should_stop() is |
| * true, make_request will not place any more requests. Therefore |
| * once kthread_should_stop() is true and lo_bio is NULL, we are |
| * done with the loop. |
| */ |
| static int loop_thread(void *data) |
| { |
| struct loop_device *lo = data; |
| struct bio *bio; |
| |
| /* |
| * loop can be used in an encrypted device, |
| * hence, it mustn't be stopped at all |
| * because it could be indirectly used during suspension |
| */ |
| current->flags |= PF_NOFREEZE; |
| |
| set_user_nice(current, -20); |
| |
| while (!kthread_should_stop() || lo->lo_bio) { |
| |
| wait_event_interruptible(lo->lo_event, |
| lo->lo_bio || kthread_should_stop()); |
| |
| if (!lo->lo_bio) |
| continue; |
| spin_lock_irq(&lo->lo_lock); |
| bio = loop_get_bio(lo); |
| spin_unlock_irq(&lo->lo_lock); |
| |
| BUG_ON(!bio); |
| loop_handle_bio(lo, bio); |
| } |
| |
| return 0; |
| } |
| |
| /* |
| * loop_switch performs the hard work of switching a backing store. |
| * First it needs to flush existing IO, it does this by sending a magic |
| * BIO down the pipe. The completion of this BIO does the actual switch. |
| */ |
| static int loop_switch(struct loop_device *lo, struct file *file) |
| { |
| struct switch_request w; |
| struct bio *bio = bio_alloc(GFP_KERNEL, 1); |
| if (!bio) |
| return -ENOMEM; |
| init_completion(&w.wait); |
| w.file = file; |
| bio->bi_private = &w; |
| bio->bi_bdev = NULL; |
| loop_make_request(lo->lo_queue, bio); |
| wait_for_completion(&w.wait); |
| return 0; |
| } |
| |
| /* |
| * Do the actual switch; called from the BIO completion routine |
| */ |
| static void do_loop_switch(struct loop_device *lo, struct switch_request *p) |
| { |
| struct file *file = p->file; |
| struct file *old_file = lo->lo_backing_file; |
| struct address_space *mapping = file->f_mapping; |
| |
| mapping_set_gfp_mask(old_file->f_mapping, lo->old_gfp_mask); |
| lo->lo_backing_file = file; |
| lo->lo_blocksize = S_ISBLK(mapping->host->i_mode) ? |
| mapping->host->i_bdev->bd_block_size : PAGE_SIZE; |
| lo->old_gfp_mask = mapping_gfp_mask(mapping); |
| mapping_set_gfp_mask(mapping, lo->old_gfp_mask & ~(__GFP_IO|__GFP_FS)); |
| complete(&p->wait); |
| } |
| |
| |
| /* |
| * loop_change_fd switched the backing store of a loopback device to |
| * a new file. This is useful for operating system installers to free up |
| * the original file and in High Availability environments to switch to |
| * an alternative location for the content in case of server meltdown. |
| * This can only work if the loop device is used read-only, and if the |
| * new backing store is the same size and type as the old backing store. |
| */ |
| static int loop_change_fd(struct loop_device *lo, struct file *lo_file, |
| struct block_device *bdev, unsigned int arg) |
| { |
| struct file *file, *old_file; |
| struct inode *inode; |
| int error; |
| |
| error = -ENXIO; |
| if (lo->lo_state != Lo_bound) |
| goto out; |
| |
| /* the loop device has to be read-only */ |
| error = -EINVAL; |
| if (!(lo->lo_flags & LO_FLAGS_READ_ONLY)) |
| goto out; |
| |
| error = -EBADF; |
| file = fget(arg); |
| if (!file) |
| goto out; |
| |
| inode = file->f_mapping->host; |
| old_file = lo->lo_backing_file; |
| |
| error = -EINVAL; |
| |
| if (!S_ISREG(inode->i_mode) && !S_ISBLK(inode->i_mode)) |
| goto out_putf; |
| |
| /* new backing store needs to support loop (eg sendfile) */ |
| if (!inode->i_fop->sendfile) |
| goto out_putf; |
| |
| /* size of the new backing store needs to be the same */ |
| if (get_loop_size(lo, file) != get_loop_size(lo, old_file)) |
| goto out_putf; |
| |
| /* and ... switch */ |
| error = loop_switch(lo, file); |
| if (error) |
| goto out_putf; |
| |
| fput(old_file); |
| return 0; |
| |
| out_putf: |
| fput(file); |
| out: |
| return error; |
| } |
| |
| static inline int is_loop_device(struct file *file) |
| { |
| struct inode *i = file->f_mapping->host; |
| |
| return i && S_ISBLK(i->i_mode) && MAJOR(i->i_rdev) == LOOP_MAJOR; |
| } |
| |
| static int loop_set_fd(struct loop_device *lo, struct file *lo_file, |
| struct block_device *bdev, unsigned int arg) |
| { |
| struct file *file, *f; |
| struct inode *inode; |
| struct address_space *mapping; |
| unsigned lo_blocksize; |
| int lo_flags = 0; |
| int error; |
| loff_t size; |
| |
| /* This is safe, since we have a reference from open(). */ |
| __module_get(THIS_MODULE); |
| |
| error = -EBADF; |
| file = fget(arg); |
| if (!file) |
| goto out; |
| |
| error = -EBUSY; |
| if (lo->lo_state != Lo_unbound) |
| goto out_putf; |
| |
| /* Avoid recursion */ |
| f = file; |
| while (is_loop_device(f)) { |
| struct loop_device *l; |
| |
| if (f->f_mapping->host->i_rdev == lo_file->f_mapping->host->i_rdev) |
| goto out_putf; |
| |
| l = f->f_mapping->host->i_bdev->bd_disk->private_data; |
| if (l->lo_state == Lo_unbound) { |
| error = -EINVAL; |
| goto out_putf; |
| } |
| f = l->lo_backing_file; |
| } |
| |
| mapping = file->f_mapping; |
| inode = mapping->host; |
| |
| if (!(file->f_mode & FMODE_WRITE)) |
| lo_flags |= LO_FLAGS_READ_ONLY; |
| |
| error = -EINVAL; |
| if (S_ISREG(inode->i_mode) || S_ISBLK(inode->i_mode)) { |
| const struct address_space_operations *aops = mapping->a_ops; |
| /* |
| * If we can't read - sorry. If we only can't write - well, |
| * it's going to be read-only. |
| */ |
| if (!file->f_op->sendfile) |
| goto out_putf; |
| if (aops->prepare_write && aops->commit_write) |
| lo_flags |= LO_FLAGS_USE_AOPS; |
| if (!(lo_flags & LO_FLAGS_USE_AOPS) && !file->f_op->write) |
| lo_flags |= LO_FLAGS_READ_ONLY; |
| |
| lo_blocksize = S_ISBLK(inode->i_mode) ? |
| inode->i_bdev->bd_block_size : PAGE_SIZE; |
| |
| error = 0; |
| } else { |
| goto out_putf; |
| } |
| |
| size = get_loop_size(lo, file); |
| |
| if ((loff_t)(sector_t)size != size) { |
| error = -EFBIG; |
| goto out_putf; |
| } |
| |
| if (!(lo_file->f_mode & FMODE_WRITE)) |
| lo_flags |= LO_FLAGS_READ_ONLY; |
| |
| set_device_ro(bdev, (lo_flags & LO_FLAGS_READ_ONLY) != 0); |
| |
| lo->lo_blocksize = lo_blocksize; |
| lo->lo_device = bdev; |
| lo->lo_flags = lo_flags; |
| lo->lo_backing_file = file; |
| lo->transfer = transfer_none; |
| lo->ioctl = NULL; |
| lo->lo_sizelimit = 0; |
| lo->old_gfp_mask = mapping_gfp_mask(mapping); |
| mapping_set_gfp_mask(mapping, lo->old_gfp_mask & ~(__GFP_IO|__GFP_FS)); |
| |
| lo->lo_bio = lo->lo_biotail = NULL; |
| |
| /* |
| * set queue make_request_fn, and add limits based on lower level |
| * device |
| */ |
| blk_queue_make_request(lo->lo_queue, loop_make_request); |
| lo->lo_queue->queuedata = lo; |
| lo->lo_queue->unplug_fn = loop_unplug; |
| |
| set_capacity(lo->lo_disk, size); |
| bd_set_size(bdev, size << 9); |
| |
| set_blocksize(bdev, lo_blocksize); |
| |
| lo->lo_thread = kthread_create(loop_thread, lo, "loop%d", |
| lo->lo_number); |
| if (IS_ERR(lo->lo_thread)) { |
| error = PTR_ERR(lo->lo_thread); |
| goto out_clr; |
| } |
| lo->lo_state = Lo_bound; |
| wake_up_process(lo->lo_thread); |
| return 0; |
| |
| out_clr: |
| lo->lo_thread = NULL; |
| lo->lo_device = NULL; |
| lo->lo_backing_file = NULL; |
| lo->lo_flags = 0; |
| set_capacity(lo->lo_disk, 0); |
| invalidate_bdev(bdev); |
| bd_set_size(bdev, 0); |
| mapping_set_gfp_mask(mapping, lo->old_gfp_mask); |
| lo->lo_state = Lo_unbound; |
| out_putf: |
| fput(file); |
| out: |
| /* This is safe: open() is still holding a reference. */ |
| module_put(THIS_MODULE); |
| return error; |
| } |
| |
| static int |
| loop_release_xfer(struct loop_device *lo) |
| { |
| int err = 0; |
| struct loop_func_table *xfer = lo->lo_encryption; |
| |
| if (xfer) { |
| if (xfer->release) |
| err = xfer->release(lo); |
| lo->transfer = NULL; |
| lo->lo_encryption = NULL; |
| module_put(xfer->owner); |
| } |
| return err; |
| } |
| |
| static int |
| loop_init_xfer(struct loop_device *lo, struct loop_func_table *xfer, |
| const struct loop_info64 *i) |
| { |
| int err = 0; |
| |
| if (xfer) { |
| struct module *owner = xfer->owner; |
| |
| if (!try_module_get(owner)) |
| return -EINVAL; |
| if (xfer->init) |
| err = xfer->init(lo, i); |
| if (err) |
| module_put(owner); |
| else |
| lo->lo_encryption = xfer; |
| } |
| return err; |
| } |
| |
| static int loop_clr_fd(struct loop_device *lo, struct block_device *bdev) |
| { |
| struct file *filp = lo->lo_backing_file; |
| gfp_t gfp = lo->old_gfp_mask; |
| |
| if (lo->lo_state != Lo_bound) |
| return -ENXIO; |
| |
| if (lo->lo_refcnt > 1) /* we needed one fd for the ioctl */ |
| return -EBUSY; |
| |
| if (filp == NULL) |
| return -EINVAL; |
| |
| spin_lock_irq(&lo->lo_lock); |
| lo->lo_state = Lo_rundown; |
| spin_unlock_irq(&lo->lo_lock); |
| |
| kthread_stop(lo->lo_thread); |
| |
| lo->lo_backing_file = NULL; |
| |
| loop_release_xfer(lo); |
| lo->transfer = NULL; |
| lo->ioctl = NULL; |
| lo->lo_device = NULL; |
| lo->lo_encryption = NULL; |
| lo->lo_offset = 0; |
| lo->lo_sizelimit = 0; |
| lo->lo_encrypt_key_size = 0; |
| lo->lo_flags = 0; |
| lo->lo_thread = NULL; |
| memset(lo->lo_encrypt_key, 0, LO_KEY_SIZE); |
| memset(lo->lo_crypt_name, 0, LO_NAME_SIZE); |
| memset(lo->lo_file_name, 0, LO_NAME_SIZE); |
| invalidate_bdev(bdev); |
| set_capacity(lo->lo_disk, 0); |
| bd_set_size(bdev, 0); |
| mapping_set_gfp_mask(filp->f_mapping, gfp); |
| lo->lo_state = Lo_unbound; |
| fput(filp); |
| /* This is safe: open() is still holding a reference. */ |
| module_put(THIS_MODULE); |
| return 0; |
| } |
| |
| static int |
| loop_set_status(struct loop_device *lo, const struct loop_info64 *info) |
| { |
| int err; |
| struct loop_func_table *xfer; |
| |
| if (lo->lo_encrypt_key_size && lo->lo_key_owner != current->uid && |
| !capable(CAP_SYS_ADMIN)) |
| return -EPERM; |
| if (lo->lo_state != Lo_bound) |
| return -ENXIO; |
| if ((unsigned int) info->lo_encrypt_key_size > LO_KEY_SIZE) |
| return -EINVAL; |
| |
| err = loop_release_xfer(lo); |
| if (err) |
| return err; |
| |
| if (info->lo_encrypt_type) { |
| unsigned int type = info->lo_encrypt_type; |
| |
| if (type >= MAX_LO_CRYPT) |
| return -EINVAL; |
| xfer = xfer_funcs[type]; |
| if (xfer == NULL) |
| return -EINVAL; |
| } else |
| xfer = NULL; |
| |
| err = loop_init_xfer(lo, xfer, info); |
| if (err) |
| return err; |
| |
| if (lo->lo_offset != info->lo_offset || |
| lo->lo_sizelimit != info->lo_sizelimit) { |
| lo->lo_offset = info->lo_offset; |
| lo->lo_sizelimit = info->lo_sizelimit; |
| if (figure_loop_size(lo)) |
| return -EFBIG; |
| } |
| |
| memcpy(lo->lo_file_name, info->lo_file_name, LO_NAME_SIZE); |
| memcpy(lo->lo_crypt_name, info->lo_crypt_name, LO_NAME_SIZE); |
| lo->lo_file_name[LO_NAME_SIZE-1] = 0; |
| lo->lo_crypt_name[LO_NAME_SIZE-1] = 0; |
| |
| if (!xfer) |
| xfer = &none_funcs; |
| lo->transfer = xfer->transfer; |
| lo->ioctl = xfer->ioctl; |
| |
| lo->lo_encrypt_key_size = info->lo_encrypt_key_size; |
| lo->lo_init[0] = info->lo_init[0]; |
| lo->lo_init[1] = info->lo_init[1]; |
| if (info->lo_encrypt_key_size) { |
| memcpy(lo->lo_encrypt_key, info->lo_encrypt_key, |
| info->lo_encrypt_key_size); |
| lo->lo_key_owner = current->uid; |
| } |
| |
| return 0; |
| } |
| |
| static int |
| loop_get_status(struct loop_device *lo, struct loop_info64 *info) |
| { |
| struct file *file = lo->lo_backing_file; |
| struct kstat stat; |
| int error; |
| |
| if (lo->lo_state != Lo_bound) |
| return -ENXIO; |
| error = vfs_getattr(file->f_path.mnt, file->f_path.dentry, &stat); |
| if (error) |
| return error; |
| memset(info, 0, sizeof(*info)); |
| info->lo_number = lo->lo_number; |
| info->lo_device = huge_encode_dev(stat.dev); |
| info->lo_inode = stat.ino; |
| info->lo_rdevice = huge_encode_dev(lo->lo_device ? stat.rdev : stat.dev); |
| info->lo_offset = lo->lo_offset; |
| info->lo_sizelimit = lo->lo_sizelimit; |
| info->lo_flags = lo->lo_flags; |
| memcpy(info->lo_file_name, lo->lo_file_name, LO_NAME_SIZE); |
| memcpy(info->lo_crypt_name, lo->lo_crypt_name, LO_NAME_SIZE); |
| info->lo_encrypt_type = |
| lo->lo_encryption ? lo->lo_encryption->number : 0; |
| if (lo->lo_encrypt_key_size && capable(CAP_SYS_ADMIN)) { |
| info->lo_encrypt_key_size = lo->lo_encrypt_key_size; |
| memcpy(info->lo_encrypt_key, lo->lo_encrypt_key, |
| lo->lo_encrypt_key_size); |
| } |
| return 0; |
| } |
| |
| static void |
| loop_info64_from_old(const struct loop_info *info, struct loop_info64 *info64) |
| { |
| memset(info64, 0, sizeof(*info64)); |
| info64->lo_number = info->lo_number; |
| info64->lo_device = info->lo_device; |
| info64->lo_inode = info->lo_inode; |
| info64->lo_rdevice = info->lo_rdevice; |
| info64->lo_offset = info->lo_offset; |
| info64->lo_sizelimit = 0; |
| info64->lo_encrypt_type = info->lo_encrypt_type; |
| info64->lo_encrypt_key_size = info->lo_encrypt_key_size; |
| info64->lo_flags = info->lo_flags; |
| info64->lo_init[0] = info->lo_init[0]; |
| info64->lo_init[1] = info->lo_init[1]; |
| if (info->lo_encrypt_type == LO_CRYPT_CRYPTOAPI) |
| memcpy(info64->lo_crypt_name, info->lo_name, LO_NAME_SIZE); |
| else |
| memcpy(info64->lo_file_name, info->lo_name, LO_NAME_SIZE); |
| memcpy(info64->lo_encrypt_key, info->lo_encrypt_key, LO_KEY_SIZE); |
| } |
| |
| static int |
| loop_info64_to_old(const struct loop_info64 *info64, struct loop_info *info) |
| { |
| memset(info, 0, sizeof(*info)); |
| info->lo_number = info64->lo_number; |
| info->lo_device = info64->lo_device; |
| info->lo_inode = info64->lo_inode; |
| info->lo_rdevice = info64->lo_rdevice; |
| info->lo_offset = info64->lo_offset; |
| info->lo_encrypt_type = info64->lo_encrypt_type; |
| info->lo_encrypt_key_size = info64->lo_encrypt_key_size; |
| info->lo_flags = info64->lo_flags; |
| info->lo_init[0] = info64->lo_init[0]; |
| info->lo_init[1] = info64->lo_init[1]; |
| if (info->lo_encrypt_type == LO_CRYPT_CRYPTOAPI) |
| memcpy(info->lo_name, info64->lo_crypt_name, LO_NAME_SIZE); |
| else |
| memcpy(info->lo_name, info64->lo_file_name, LO_NAME_SIZE); |
| memcpy(info->lo_encrypt_key, info64->lo_encrypt_key, LO_KEY_SIZE); |
| |
| /* error in case values were truncated */ |
| if (info->lo_device != info64->lo_device || |
| info->lo_rdevice != info64->lo_rdevice || |
| info->lo_inode != info64->lo_inode || |
| info->lo_offset != info64->lo_offset) |
| return -EOVERFLOW; |
| |
| return 0; |
| } |
| |
| static int |
| loop_set_status_old(struct loop_device *lo, const struct loop_info __user *arg) |
| { |
| struct loop_info info; |
| struct loop_info64 info64; |
| |
| if (copy_from_user(&info, arg, sizeof (struct loop_info))) |
| return -EFAULT; |
| loop_info64_from_old(&info, &info64); |
| return loop_set_status(lo, &info64); |
| } |
| |
| static int |
| loop_set_status64(struct loop_device *lo, const struct loop_info64 __user *arg) |
| { |
| struct loop_info64 info64; |
| |
| if (copy_from_user(&info64, arg, sizeof (struct loop_info64))) |
| return -EFAULT; |
| return loop_set_status(lo, &info64); |
| } |
| |
| static int |
| loop_get_status_old(struct loop_device *lo, struct loop_info __user *arg) { |
| struct loop_info info; |
| struct loop_info64 info64; |
| int err = 0; |
| |
| if (!arg) |
| err = -EINVAL; |
| if (!err) |
| err = loop_get_status(lo, &info64); |
| if (!err) |
| err = loop_info64_to_old(&info64, &info); |
| if (!err && copy_to_user(arg, &info, sizeof(info))) |
| err = -EFAULT; |
| |
| return err; |
| } |
| |
| static int |
| loop_get_status64(struct loop_device *lo, struct loop_info64 __user *arg) { |
| struct loop_info64 info64; |
| int err = 0; |
| |
| if (!arg) |
| err = -EINVAL; |
| if (!err) |
| err = loop_get_status(lo, &info64); |
| if (!err && copy_to_user(arg, &info64, sizeof(info64))) |
| err = -EFAULT; |
| |
| return err; |
| } |
| |
| static int lo_ioctl(struct inode * inode, struct file * file, |
| unsigned int cmd, unsigned long arg) |
| { |
| struct loop_device *lo = inode->i_bdev->bd_disk->private_data; |
| int err; |
| |
| mutex_lock(&lo->lo_ctl_mutex); |
| switch (cmd) { |
| case LOOP_SET_FD: |
| err = loop_set_fd(lo, file, inode->i_bdev, arg); |
| break; |
| case LOOP_CHANGE_FD: |
| err = loop_change_fd(lo, file, inode->i_bdev, arg); |
| break; |
| case LOOP_CLR_FD: |
| err = loop_clr_fd(lo, inode->i_bdev); |
| break; |
| case LOOP_SET_STATUS: |
| err = loop_set_status_old(lo, (struct loop_info __user *) arg); |
| break; |
| case LOOP_GET_STATUS: |
| err = loop_get_status_old(lo, (struct loop_info __user *) arg); |
| break; |
| case LOOP_SET_STATUS64: |
| err = loop_set_status64(lo, (struct loop_info64 __user *) arg); |
| break; |
| case LOOP_GET_STATUS64: |
| err = loop_get_status64(lo, (struct loop_info64 __user *) arg); |
| break; |
| default: |
| err = lo->ioctl ? lo->ioctl(lo, cmd, arg) : -EINVAL; |
| } |
| mutex_unlock(&lo->lo_ctl_mutex); |
| return err; |
| } |
| |
| #ifdef CONFIG_COMPAT |
| struct compat_loop_info { |
| compat_int_t lo_number; /* ioctl r/o */ |
| compat_dev_t lo_device; /* ioctl r/o */ |
| compat_ulong_t lo_inode; /* ioctl r/o */ |
| compat_dev_t lo_rdevice; /* ioctl r/o */ |
| compat_int_t lo_offset; |
| compat_int_t lo_encrypt_type; |
| compat_int_t lo_encrypt_key_size; /* ioctl w/o */ |
| compat_int_t lo_flags; /* ioctl r/o */ |
| char lo_name[LO_NAME_SIZE]; |
| unsigned char lo_encrypt_key[LO_KEY_SIZE]; /* ioctl w/o */ |
| compat_ulong_t lo_init[2]; |
| char reserved[4]; |
| }; |
| |
| /* |
| * Transfer 32-bit compatibility structure in userspace to 64-bit loop info |
| * - noinlined to reduce stack space usage in main part of driver |
| */ |
| static noinline int |
| loop_info64_from_compat(const struct compat_loop_info __user *arg, |
| struct loop_info64 *info64) |
| { |
| struct compat_loop_info info; |
| |
| if (copy_from_user(&info, arg, sizeof(info))) |
| return -EFAULT; |
| |
| memset(info64, 0, sizeof(*info64)); |
| info64->lo_number = info.lo_number; |
| info64->lo_device = info.lo_device; |
| info64->lo_inode = info.lo_inode; |
| info64->lo_rdevice = info.lo_rdevice; |
| info64->lo_offset = info.lo_offset; |
| info64->lo_sizelimit = 0; |
| info64->lo_encrypt_type = info.lo_encrypt_type; |
| info64->lo_encrypt_key_size = info.lo_encrypt_key_size; |
| info64->lo_flags = info.lo_flags; |
| info64->lo_init[0] = info.lo_init[0]; |
| info64->lo_init[1] = info.lo_init[1]; |
| if (info.lo_encrypt_type == LO_CRYPT_CRYPTOAPI) |
| memcpy(info64->lo_crypt_name, info.lo_name, LO_NAME_SIZE); |
| else |
| memcpy(info64->lo_file_name, info.lo_name, LO_NAME_SIZE); |
| memcpy(info64->lo_encrypt_key, info.lo_encrypt_key, LO_KEY_SIZE); |
| return 0; |
| } |
| |
| /* |
| * Transfer 64-bit loop info to 32-bit compatibility structure in userspace |
| * - noinlined to reduce stack space usage in main part of driver |
| */ |
| static noinline int |
| loop_info64_to_compat(const struct loop_info64 *info64, |
| struct compat_loop_info __user *arg) |
| { |
| struct compat_loop_info info; |
| |
| memset(&info, 0, sizeof(info)); |
| info.lo_number = info64->lo_number; |
| info.lo_device = info64->lo_device; |
| info.lo_inode = info64->lo_inode; |
| info.lo_rdevice = info64->lo_rdevice; |
| info.lo_offset = info64->lo_offset; |
| info.lo_encrypt_type = info64->lo_encrypt_type; |
| info.lo_encrypt_key_size = info64->lo_encrypt_key_size; |
| info.lo_flags = info64->lo_flags; |
| info.lo_init[0] = info64->lo_init[0]; |
| info.lo_init[1] = info64->lo_init[1]; |
| if (info.lo_encrypt_type == LO_CRYPT_CRYPTOAPI) |
| memcpy(info.lo_name, info64->lo_crypt_name, LO_NAME_SIZE); |
| else |
| memcpy(info.lo_name, info64->lo_file_name, LO_NAME_SIZE); |
| memcpy(info.lo_encrypt_key, info64->lo_encrypt_key, LO_KEY_SIZE); |
| |
| /* error in case values were truncated */ |
| if (info.lo_device != info64->lo_device || |
| info.lo_rdevice != info64->lo_rdevice || |
| info.lo_inode != info64->lo_inode || |
| info.lo_offset != info64->lo_offset || |
| info.lo_init[0] != info64->lo_init[0] || |
| info.lo_init[1] != info64->lo_init[1]) |
| return -EOVERFLOW; |
| |
| if (copy_to_user(arg, &info, sizeof(info))) |
| return -EFAULT; |
| return 0; |
| } |
| |
| static int |
| loop_set_status_compat(struct loop_device *lo, |
| const struct compat_loop_info __user *arg) |
| { |
| struct loop_info64 info64; |
| int ret; |
| |
| ret = loop_info64_from_compat(arg, &info64); |
| if (ret < 0) |
| return ret; |
| return loop_set_status(lo, &info64); |
| } |
| |
| static int |
| loop_get_status_compat(struct loop_device *lo, |
| struct compat_loop_info __user *arg) |
| { |
| struct loop_info64 info64; |
| int err = 0; |
| |
| if (!arg) |
| err = -EINVAL; |
| if (!err) |
| err = loop_get_status(lo, &info64); |
| if (!err) |
| err = loop_info64_to_compat(&info64, arg); |
| return err; |
| } |
| |
| static long lo_compat_ioctl(struct file *file, unsigned int cmd, unsigned long arg) |
| { |
| struct inode *inode = file->f_path.dentry->d_inode; |
| struct loop_device *lo = inode->i_bdev->bd_disk->private_data; |
| int err; |
| |
| lock_kernel(); |
| switch(cmd) { |
| case LOOP_SET_STATUS: |
| mutex_lock(&lo->lo_ctl_mutex); |
| err = loop_set_status_compat( |
| lo, (const struct compat_loop_info __user *) arg); |
| mutex_unlock(&lo->lo_ctl_mutex); |
| break; |
| case LOOP_GET_STATUS: |
| mutex_lock(&lo->lo_ctl_mutex); |
| err = loop_get_status_compat( |
| lo, (struct compat_loop_info __user *) arg); |
| mutex_unlock(&lo->lo_ctl_mutex); |
| break; |
| case LOOP_CLR_FD: |
| case LOOP_GET_STATUS64: |
| case LOOP_SET_STATUS64: |
| arg = (unsigned long) compat_ptr(arg); |
| case LOOP_SET_FD: |
| case LOOP_CHANGE_FD: |
| err = lo_ioctl(inode, file, cmd, arg); |
| break; |
| default: |
| err = -ENOIOCTLCMD; |
| break; |
| } |
| unlock_kernel(); |
| return err; |
| } |
| #endif |
| |
| static int lo_open(struct inode *inode, struct file *file) |
| { |
| struct loop_device *lo = inode->i_bdev->bd_disk->private_data; |
| |
| mutex_lock(&lo->lo_ctl_mutex); |
| lo->lo_refcnt++; |
| mutex_unlock(&lo->lo_ctl_mutex); |
| |
| return 0; |
| } |
| |
| static int lo_release(struct inode *inode, struct file *file) |
| { |
| struct loop_device *lo = inode->i_bdev->bd_disk->private_data; |
| |
| mutex_lock(&lo->lo_ctl_mutex); |
| --lo->lo_refcnt; |
| mutex_unlock(&lo->lo_ctl_mutex); |
| |
| return 0; |
| } |
| |
| static struct block_device_operations lo_fops = { |
| .owner = THIS_MODULE, |
| .open = lo_open, |
| .release = lo_release, |
| .ioctl = lo_ioctl, |
| #ifdef CONFIG_COMPAT |
| .compat_ioctl = lo_compat_ioctl, |
| #endif |
| }; |
| |
| /* |
| * And now the modules code and kernel interface. |
| */ |
| static int max_loop; |
| module_param(max_loop, int, 0); |
| MODULE_PARM_DESC(max_loop, "obsolete, loop device is created on-demand"); |
| MODULE_LICENSE("GPL"); |
| MODULE_ALIAS_BLOCKDEV_MAJOR(LOOP_MAJOR); |
| |
| int loop_register_transfer(struct loop_func_table *funcs) |
| { |
| unsigned int n = funcs->number; |
| |
| if (n >= MAX_LO_CRYPT || xfer_funcs[n]) |
| return -EINVAL; |
| xfer_funcs[n] = funcs; |
| return 0; |
| } |
| |
| int loop_unregister_transfer(int number) |
| { |
| unsigned int n = number; |
| struct loop_device *lo; |
| struct loop_func_table *xfer; |
| |
| if (n == 0 || n >= MAX_LO_CRYPT || (xfer = xfer_funcs[n]) == NULL) |
| return -EINVAL; |
| |
| xfer_funcs[n] = NULL; |
| |
| list_for_each_entry(lo, &loop_devices, lo_list) { |
| mutex_lock(&lo->lo_ctl_mutex); |
| |
| if (lo->lo_encryption == xfer) |
| loop_release_xfer(lo); |
| |
| mutex_unlock(&lo->lo_ctl_mutex); |
| } |
| |
| return 0; |
| } |
| |
| EXPORT_SYMBOL(loop_register_transfer); |
| EXPORT_SYMBOL(loop_unregister_transfer); |
| |
| static struct loop_device *loop_init_one(int i) |
| { |
| struct loop_device *lo; |
| struct gendisk *disk; |
| |
| lo = kzalloc(sizeof(*lo), GFP_KERNEL); |
| if (!lo) |
| goto out; |
| |
| lo->lo_queue = blk_alloc_queue(GFP_KERNEL); |
| if (!lo->lo_queue) |
| goto out_free_dev; |
| |
| disk = lo->lo_disk = alloc_disk(1); |
| if (!disk) |
| goto out_free_queue; |
| |
| mutex_init(&lo->lo_ctl_mutex); |
| lo->lo_number = i; |
| lo->lo_thread = NULL; |
| init_waitqueue_head(&lo->lo_event); |
| spin_lock_init(&lo->lo_lock); |
| disk->major = LOOP_MAJOR; |
| disk->first_minor = i; |
| disk->fops = &lo_fops; |
| disk->private_data = lo; |
| disk->queue = lo->lo_queue; |
| sprintf(disk->disk_name, "loop%d", i); |
| add_disk(disk); |
| list_add_tail(&lo->lo_list, &loop_devices); |
| return lo; |
| |
| out_free_queue: |
| blk_cleanup_queue(lo->lo_queue); |
| out_free_dev: |
| kfree(lo); |
| out: |
| return NULL; |
| } |
| |
| static void loop_del_one(struct loop_device *lo) |
| { |
| del_gendisk(lo->lo_disk); |
| blk_cleanup_queue(lo->lo_queue); |
| put_disk(lo->lo_disk); |
| list_del(&lo->lo_list); |
| kfree(lo); |
| } |
| |
| static int loop_lock(dev_t dev, void *data) |
| { |
| mutex_lock(&loop_devices_mutex); |
| return 0; |
| } |
| |
| static struct kobject *loop_probe(dev_t dev, int *part, void *data) |
| { |
| struct loop_device *lo = loop_init_one(dev & MINORMASK); |
| struct kobject *kobj; |
| |
| kobj = lo ? get_disk(lo->lo_disk) : ERR_PTR(-ENOMEM); |
| mutex_unlock(&loop_devices_mutex); |
| |
| *part = 0; |
| return kobj; |
| } |
| |
| static int __init loop_init(void) |
| { |
| if (register_blkdev(LOOP_MAJOR, "loop")) |
| return -EIO; |
| blk_register_region(MKDEV(LOOP_MAJOR, 0), 1UL << MINORBITS, |
| THIS_MODULE, loop_probe, loop_lock, NULL); |
| |
| if (max_loop) { |
| printk(KERN_INFO "loop: the max_loop option is obsolete " |
| "and will be removed in March 2008\n"); |
| |
| } |
| printk(KERN_INFO "loop: module loaded\n"); |
| return 0; |
| } |
| |
| static void __exit loop_exit(void) |
| { |
| struct loop_device *lo, *next; |
| |
| list_for_each_entry_safe(lo, next, &loop_devices, lo_list) |
| loop_del_one(lo); |
| |
| blk_unregister_region(MKDEV(LOOP_MAJOR, 0), 1UL << MINORBITS); |
| if (unregister_blkdev(LOOP_MAJOR, "loop")) |
| printk(KERN_WARNING "loop: cannot unregister blkdev\n"); |
| } |
| |
| module_init(loop_init); |
| module_exit(loop_exit); |
| |
| #ifndef MODULE |
| static int __init max_loop_setup(char *str) |
| { |
| max_loop = simple_strtol(str, NULL, 0); |
| return 1; |
| } |
| |
| __setup("max_loop=", max_loop_setup); |
| #endif |