From patchwork Mon Mar 11 16:20:25 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Thomas Petazzoni X-Patchwork-Id: 1054564 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=lists.openwrt.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=bootlin.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="SW+O7ULT"; dkim-atps=neutral Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 44J3L474pMz9s4Y for ; Tue, 12 Mar 2019 03:22:52 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:Subject:MIME-Version:References: In-Reply-To:Message-Id:Date:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=0Elp5+3y0WOU3tWPwkI7XVc0tmlodZPyKP6oUD2lNNU=; b=SW+O7ULTStEV15 oNtxdSZ4tKkthxUf6CXkJscmpRRn+Nrg+5FGWORjwiXSR3fslWVJEBnIsjJwFXVcn9EyvBazK0KYz aAosyJyLEn+YFooP0W/RX6w3u25rlzkcgDsQuzuktx8F2Itd4ctHbzNTDD0JEX2fbOXihNZRomefF pGmQwwCdp6nL3bE8Z1mOFr3YhHNjLwSJv66nhLrZGS/mbLYJh8VHX/DOeyl6Zd+v8m2L4JFa8ily5 Ac8WnH6U2RmIOctEBxWlZSwGVQj7uMtQGnLyyfHQgs2z//gsuxqAyAv4POAEMmdyJhLDhmL+//Ba5 4uSCBEjMvhWCqh5kgwGA==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.90_1 #2 (Red Hat Linux)) id 1h3NhH-0003GZ-PJ; Mon, 11 Mar 2019 16:22:39 +0000 Received: from relay3-d.mail.gandi.net ([217.70.183.195]) by bombadil.infradead.org with esmtps (Exim 4.90_1 #2 (Red Hat Linux)) id 1h3NfS-0000A3-Cg for openwrt-devel@lists.openwrt.org; Mon, 11 Mar 2019 16:21:03 +0000 X-Originating-IP: 90.88.150.179 Received: from localhost (aaubervilliers-681-1-31-179.w90-88.abo.wanadoo.fr [90.88.150.179]) (Authenticated sender: thomas.petazzoni@bootlin.com) by relay3-d.mail.gandi.net (Postfix) with ESMTPSA id 31F0760018; Mon, 11 Mar 2019 16:20:36 +0000 (UTC) From: Thomas Petazzoni To: openwrt-devel@lists.openwrt.org Date: Mon, 11 Mar 2019 17:20:25 +0100 Message-Id: <20190311162028.13172-9-thomas.petazzoni@bootlin.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190311162028.13172-1-thomas.petazzoni@bootlin.com> References: <20190311162028.13172-1-thomas.petazzoni@bootlin.com> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20190311_092047_356278_F7DD2CCA X-CRM114-Status: GOOD ( 28.07 ) X-Spam-Score: -0.7 (/) X-Spam-Report: SpamAssassin version 3.4.2 on bombadil.infradead.org summary: Content analysis details: (-0.7 points) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at https://www.dnswl.org/, low trust [217.70.183.195 listed in list.dnswl.org] -0.0 RCVD_IN_MSPIKE_H2 RBL: Average reputation (+2) [217.70.183.195 listed in wl.mailspike.net] -0.0 SPF_PASS SPF: sender matches SPF record Subject: [OpenWrt-Devel] [PATCH 08/11] target/linux/generic: add patches to support dm-verity volume at boot X-BeenThere: openwrt-devel@lists.openwrt.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Thomas Petazzoni Sender: "openwrt-devel" Errors-To: openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org The upstream Linux kernel does not provide a mechanism to setup a DM volume at boot time using the kernel command line: an initramfs with user-space tools is strictly required. Since OpenWRT doesn't support an initramfs as an intermediate step before mounting the real root filesystem, this requirement of the upstream kernel makes it difficult to use dm-verity in the context of OpenWRT. However, some patches have been repeatedly contributed to the upstream kernel (but not accepted so far) to add a dm="..." kernel argument that allows to set up a DM device from the kernel command line. This allows to avoid the need for an initramfs just to set up a DM device at boot time. Signed-off-by: Thomas Petazzoni --- ...-to-directly-boot-to-a-mapped-device.patch | 633 ++++++++++++++++++ ...l-add-a-device-mapper-ioctl-function.patch | 98 +++ 2 files changed, 731 insertions(+) create mode 100644 target/linux/generic/pending-4.14/960-init-add-support-to-directly-boot-to-a-mapped-device.patch create mode 100644 target/linux/generic/pending-4.14/961-dm-ioctl-add-a-device-mapper-ioctl-function.patch diff --git a/target/linux/generic/pending-4.14/960-init-add-support-to-directly-boot-to-a-mapped-device.patch b/target/linux/generic/pending-4.14/960-init-add-support-to-directly-boot-to-a-mapped-device.patch new file mode 100644 index 0000000000..0448ffe910 --- /dev/null +++ b/target/linux/generic/pending-4.14/960-init-add-support-to-directly-boot-to-a-mapped-device.patch @@ -0,0 +1,633 @@ +From da4abfee16ed5cb2411121a503264809c25e9a57 Mon Sep 17 00:00:00 2001 +From: Will Drewry +Date: Fri, 19 May 2017 09:11:45 +0200 +Subject: [PATCH] init: add support to directly boot to a mapped device + +Add a dm= kernel parameter modeled after the md= parameter from +do_mounts_md. It allows for device-mapper targets to be configured at +boot time for use early in the boot process (as the root device or +otherwise). + +Signed-off-by: Will Drewry +Signed-off-by: Kees Cook +[rework to use dm_ioctl calls] +Signed-off-by: Enric Balletbo i Serra +--- + .../admin-guide/kernel-parameters.rst | 1 + + .../admin-guide/kernel-parameters.txt | 3 + + Documentation/device-mapper/dm-boot.txt | 65 +++ + init/Makefile | 1 + + init/do_mounts.c | 1 + + init/do_mounts.h | 10 + + init/do_mounts_dm.c | 459 ++++++++++++++++++ + 7 files changed, 540 insertions(+) + create mode 100644 Documentation/device-mapper/dm-boot.txt + create mode 100644 init/do_mounts_dm.c + +diff --git a/Documentation/admin-guide/kernel-parameters.rst b/Documentation/admin-guide/kernel-parameters.rst +index b2598cc9834c..55eb1a39d3e1 100644 +--- a/Documentation/admin-guide/kernel-parameters.rst ++++ b/Documentation/admin-guide/kernel-parameters.rst +@@ -92,6 +92,7 @@ parameter is applicable:: + BLACKFIN Blackfin architecture is enabled. + CLK Common clock infrastructure is enabled. + CMA Contiguous Memory Area support is enabled. ++ DM Device mapper support is enabled. + DRM Direct Rendering Management support is enabled. + DYNAMIC_DEBUG Build in debug messages and enable them at runtime + EDD BIOS Enhanced Disk Drive Services (EDD) is enabled +diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt +index 7d8b17ce8804..98c95029ec30 100644 +--- a/Documentation/admin-guide/kernel-parameters.txt ++++ b/Documentation/admin-guide/kernel-parameters.txt +@@ -837,6 +837,9 @@ + + dis_ucode_ldr [X86] Disable the microcode loader. + ++ dm= [DM] Allows early creation of a device-mapper device. ++ See Documentation/device-mapper/boot.txt. ++ + dma_debug=off If the kernel is compiled with DMA_API_DEBUG support, + this option disables the debugging code at boot. + +diff --git a/Documentation/device-mapper/dm-boot.txt b/Documentation/device-mapper/dm-boot.txt +new file mode 100644 +index 000000000000..50f08ecd2a48 +--- /dev/null ++++ b/Documentation/device-mapper/dm-boot.txt +@@ -0,0 +1,65 @@ ++Boot time creation of mapped devices ++==================================== ++ ++It is possible to configure a device mapper device to act as the root ++device for your system in two ways. ++ ++The first is to build an initial ramdisk which boots to a minimal ++userspace which configures the device, then pivot_root(8) in to it. ++ ++The second is to possible when the device-mapper and any targets are ++compiled into the kernel (not a module), one or more device-mappers may ++be created and used as the root device at boot time with the parameters ++given with the boot line dm=... ++ ++The format is specified as a simple string of data separated by commas and ++optionally semi-colons, where: ++ - a comma is used to separate fields like name, uuid, flags and table (specifies ++ one device) ++ - a semi-colon is used to separate devices. ++ ++So the format will look like this: ++ ++ dm=,,,[,
+][;,,,
[,
+]]+ ++ ++Where, ++ ::= The device name. ++ ::= xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx | "" ++ ::= "ro" | "rw" ++
::= ++ ::= "verity" | "bootcache" | ... ++ ++The dm line may be as normal when using the dmsetup tool when using the ++--bootformat argument. ++ ++Unless renamed by udev, the device node created will be dm-0 as the ++first minor number for the device-mapper is used during early creation. ++ ++Examples ++======== ++An example of booting to a linear array made up of user-mode linux block ++devices: ++ ++ dm="lroot,,rw, 0 4096 linear 98:16 0, 4096 4096 linear 98:32 0" \ ++ root=/dev/dm-0 ++ ++This will boot to a rw dm-linear target of 8192 sectors split across two ++block devices identified by their major:minor numbers. After boot, udev ++will rename this target to /dev/mapper/lroot (depending on the rules). ++No uuid was assigned. ++ ++An example of multiple device-mappers, with the dm="..." contents shown ++here split on multiple lines for readability: ++ ++ vboot,,ro, ++ 0 1768000 bootcache ++ aa55b119-2a47-8c45-946a-5ac57765011f+1 ++ 76e9be054b15884a9fa85973e9cb274c93afadb6 ++ 1768000 100000 23 20000; ++ vroot,,ro, ++ 0 1740800 verity 254:0 254:0 1740800 sha1 ++ 76e9be054b15884a9fa85973e9cb274c93afadb6 ++ 5b3549d54d6c7a3837b9b81ed72e49463a64c03680c47835bef94d768e5646fe; ++ vram,,rw, ++ 0 32768 linear 1:0 0, ++ 32768 32768 linear 1:1 0 +diff --git a/init/Makefile b/init/Makefile +index 1dbb23787290..a05fb048e32a 100644 +--- a/init/Makefile ++++ b/init/Makefile +@@ -21,6 +21,7 @@ mounts-y := do_mounts.o + mounts-$(CONFIG_BLK_DEV_RAM) += do_mounts_rd.o + mounts-$(CONFIG_BLK_DEV_INITRD) += do_mounts_initrd.o + mounts-$(CONFIG_BLK_DEV_MD) += do_mounts_md.o ++mounts-$(CONFIG_BLK_DEV_DM) += do_mounts_dm.o + + # dependencies on generated files need to be listed explicitly + $(obj)/version.o: include/generated/compile.h +diff --git a/init/do_mounts.c b/init/do_mounts.c +index 50c8bd3e38c5..12fcc6820847 100644 +--- a/init/do_mounts.c ++++ b/init/do_mounts.c +@@ -590,6 +590,7 @@ void __init prepare_namespace(void) + wait_for_device_probe(); + + md_run_setup(); ++ dm_run_setup(); + + if (saved_root_name[0]) { + root_device_name = saved_root_name; +diff --git a/init/do_mounts.h b/init/do_mounts.h +index 5b05c8f93f47..cd201124714b 100644 +--- a/init/do_mounts.h ++++ b/init/do_mounts.h +@@ -61,3 +61,13 @@ void md_run_setup(void); + static inline void md_run_setup(void) {} + + #endif ++ ++#ifdef CONFIG_BLK_DEV_DM ++ ++void dm_run_setup(void); ++ ++#else ++ ++static inline void dm_run_setup(void) {} ++ ++#endif +diff --git a/init/do_mounts_dm.c b/init/do_mounts_dm.c +new file mode 100644 +index 000000000000..87c430016d49 +--- /dev/null ++++ b/init/do_mounts_dm.c +@@ -0,0 +1,459 @@ ++/* ++ * do_mounts_dm.c ++ * Copyright (C) 2017 The Chromium OS Authors ++ * Based on do_mounts_md.c ++ * ++ * This file is released under the GPLv2. ++ */ ++#include ++#include ++#include ++#include ++#include ++#include ++ ++#include "do_mounts.h" ++ ++#define DM_MAX_DEVICES 256 ++#define DM_MAX_NAME 32 ++#define DM_MAX_UUID 129 ++ ++#define DM_MSG_PREFIX "init" ++ ++#define is_even(a) (((a) & 1) == 0) ++ ++/* See Documentation/device-mapper/dm-boot.txt for dm="..." format details. */ ++ ++struct target { ++ sector_t start; ++ sector_t length; ++ char *type; ++ char *params; ++ /* simple singly linked list */ ++ struct target *next; ++}; ++ ++struct dm_device { ++ int minor; ++ int ro; ++ char name[DM_MAX_NAME]; ++ char uuid[DM_MAX_UUID]; ++ struct target *table; ++ int table_count; ++ /* simple singly linked list */ ++ struct dm_device *next; ++}; ++ ++static struct { ++ unsigned long num_devices; ++ char *str; ++} dm_setup_args __initdata; ++ ++static int dm_early_setup __initdata; ++ ++static void __init *_align(void *ptr, unsigned int a) ++{ ++ register unsigned long agn = --a; ++ ++ return (void *) (((unsigned long) ptr + agn) & ~agn); ++} ++ ++/* ++ * Unescape characters in situ, it replaces all occurrences of "\c" ++ * with 'c'. This is normally used to unescape colons and semi-colons used ++ * in boot format. ++ */ ++static char __init *_unescape_char(char *str, const char c) ++{ ++ int i = 0, j = 0; ++ int len = strlen(str); ++ ++ if (len < 2) ++ return str; ++ ++ while (j < len - 1) { ++ if (str[j] == '\\' && str[j + 1] == c) { ++ j = j + 2; ++ str[i++] = c; ++ continue; ++ } ++ str[i++] = str[j++]; ++ } ++ ++ if (j == len - 1) ++ str[i++] = str[j]; ++ ++ str[i] = '\0'; ++ ++ return str; ++} ++ ++static void __init dm_setup_cleanup(struct dm_device *devices) ++{ ++ struct dm_device *dev = devices; ++ ++ while (dev) { ++ struct dm_device *old_dev = dev; ++ struct target *table = dev->table; ++ ++ while (table) { ++ struct target *old_table = table; ++ ++ kfree(table->type); ++ kfree(table->params); ++ table = table->next; ++ kfree(old_table); ++ dev->table_count--; ++ } ++ WARN_ON(dev->table_count); ++ dev = dev->next; ++ kfree(old_dev); ++ } ++} ++ ++/* ++ * Splits a string into tokens ignoring escaped chars ++ * ++ * Updates @s to point after the token, ready for the next call. ++ * ++ * @str: The string to be searched ++ * @c: The character to search for ++ * ++ * Returns: ++ * The string found or NULL. ++ */ ++static char __init *dm_find_unescaped_char(char **str, const char c) ++{ ++ char *s = *str; ++ char *p = strchr(*str, c); ++ ++ /* loop through all the characters */ ++ while (p != NULL) { ++ /* scan backwards through preceding escapes */ ++ char *q = p; ++ ++ while (q > s && *(q - 1) == '\\') ++ --q; ++ /* even number of escapes so c is a token */ ++ if (is_even(p - q)) { ++ *p = '\0'; ++ *str = p + 1; ++ return s; ++ } ++ /* else odd escapes so c is escaped, keep going */ ++ p = strchr(p + 1, c); ++ } ++ ++ if (strlen(*str)) { ++ *str += strlen(*str); ++ return s; ++ } ++ ++ return NULL; ++} ++ ++static struct target __init *dm_parse_table(struct dm_device *dev, char *str) ++{ ++ char type[DM_MAX_TYPE_NAME], *ptr; ++ struct target *table; ++ int n; ++ ++ /* trim trailing space */ ++ for (ptr = str + strlen(str) - 1; ptr >= str; ptr--) ++ if (!isspace((int) *ptr)) ++ break; ++ ptr++; ++ *ptr = '\0'; ++ ++ /* trim leading space */ ++ for (ptr = str; *ptr && isspace((int) *ptr); ptr++) ++ ; ++ ++ if (!*ptr) ++ return NULL; ++ ++ table = kzalloc(sizeof(struct target), GFP_KERNEL); ++ if (!table) ++ return NULL; ++ ++ if (sscanf(ptr, "%llu %llu %s %n", &table->start, &table->length, ++ type, &n) < 3) { ++ DMERR("invalid format of table \"%s\"", str); ++ goto parse_fail; ++ } ++ ++ table->type = kstrndup(type, strlen(type), GFP_KERNEL); ++ if (!table->type) { ++ DMERR("invalid type of table"); ++ goto parse_fail; ++ } ++ ++ ptr += n; ++ table->params = kstrndup(ptr, strlen(ptr), GFP_KERNEL); ++ if (!table->params) { ++ DMERR("invalid params for table"); ++ goto parse_fail; ++ } ++ ++ dev->table_count++; ++ ++ return table; ++ ++parse_fail: ++ kfree(table); ++ return NULL; ++} ++ ++static int __init dm_parse_device(struct dm_device *dev, char *dev_info) ++{ ++ int field = 0; ++ char *str = dev_info, *ptr = dev_info; ++ struct target *table; ++ struct target **tail = &dev->table; ++ ++ while ((str = dm_find_unescaped_char(&ptr, ',')) != NULL) { ++ str = _unescape_char(str, ','); ++ switch (field) { ++ case 0: /* set device name */ ++ strncpy(dev->name, str, strlen(str)); ++ break; ++ case 1: /* set uuid if any */ ++ strncpy(dev->uuid, str, strlen(str)); ++ break; ++ case 2: ++ /* set as read-only if flags = "ro" | "" */ ++ if (!strncmp(str, "ro", strlen(str)) || !strlen(str)) ++ dev->ro = 1; ++ else if (!strncmp(str, "rw", strlen(str))) ++ dev->ro = 0; ++ else ++ return -EINVAL; ++ break; ++ default: ++ table = dm_parse_table(dev, str); ++ if (!table) ++ goto parse_fail; ++ ++ *tail = table; ++ tail = &table->next; ++ ++ break; ++ } ++ field++; ++ } ++ ++ if (field < 4) ++ goto parse_fail; ++ ++ return 0; ++ ++parse_fail: ++ return -EINVAL; ++} ++ ++static struct dm_device __init *dm_parse_args(void) ++{ ++ struct dm_device *devices = NULL; ++ struct dm_device **tail = &devices; ++ struct dm_device *dev; ++ char *dev_info, *str = dm_setup_args.str; ++ ++ while ((dev_info = dm_find_unescaped_char(&str, ';')) != NULL) { ++ dev_info = _unescape_char(dev_info, ';'); ++ dev = kzalloc(sizeof(*dev), GFP_KERNEL); ++ if (!dev) ++ goto error; ++ ++ if (dm_parse_device(dev, dev_info)) ++ goto error; ++ ++ *tail = dev; ++ tail = &dev->next; ++ /* ++ * devices are given minor numbers 0 - n-1 in the order they are ++ * found in the arg string. ++ */ ++ dev->minor = dm_setup_args.num_devices++; ++ ++ if (dm_setup_args.num_devices > DM_MAX_DEVICES) { ++ DMERR("too many devices %lu > %d", ++ dm_setup_args.num_devices, DM_MAX_DEVICES); ++ goto error; ++ } ++ } ++ return devices; ++error: ++ dm_setup_cleanup(devices); ++ return NULL; ++} ++ ++/* ++ * Parse the command-line parameters given our kernel, but do not ++ * actually try to invoke the DM device now; that is handled by ++ * dm_setup_drives after the low-level disk drivers have initialised. ++ * dm format is described at the top of the file. ++ * ++ * Because dm minor numbers are assigned in ascending order starting with 0, ++ * You can assume the first device is /dev/dm-0, the next device is /dev/dm-1, ++ * and so forth. ++ */ ++static int __init dm_setup(char *str) ++{ ++ if (!str) { ++ DMERR("Invalid arguments supplied to dm=."); ++ return 0; ++ } ++ ++ DMDEBUG("Want to parse \"%s\"", str); ++ ++ dm_setup_args.num_devices = 0; ++ dm_setup_args.str = str; ++ ++ dm_early_setup = 1; ++ ++ return 1; ++} ++ ++static char __init *dm_add_target(struct target *table, char *out, char *end) ++{ ++ char *out_sp = out; ++ struct dm_target_spec sp; ++ size_t sp_size = sizeof(struct dm_target_spec); ++ int len; ++ char *pt; ++ ++ if (strlen(table->type) >= sizeof(sp.target_type)) { ++ DMERR("target type name %s is too long.", table->type); ++ return NULL; ++ } ++ ++ sp.status = 0; ++ sp.sector_start = table->start; ++ sp.length = table->length; ++ strncpy(sp.target_type, table->type, sizeof(sp.target_type) - 1); ++ sp.target_type[sizeof(sp.target_type) - 1] = '\0'; ++ ++ out += sp_size; ++ pt = table->params; ++ len = strlen(table->params); ++ ++ if ((out >= end) || (out + len + 1) >= end) { ++ DMERR("ran out of memory building ioctl parameter"); ++ return NULL; ++ } ++ ++ strcpy(out, table->params); ++ out += len + 1; ++ /* align next block */ ++ out = _align(out, 8); ++ ++ sp.next = out - out_sp; ++ memcpy(out_sp, &sp, sp_size); ++ ++ return out; ++} ++ ++static struct dm_ioctl __init *dm_setup_ioctl(struct dm_device *dev, int flags) ++{ ++ const size_t min_size = 16 * 1024; ++ size_t len = sizeof(struct dm_ioctl); ++ struct dm_ioctl *dmi; ++ struct target *table = dev->table; ++ char *b, *e; ++ ++ if (len < min_size) ++ len = min_size; ++ ++ dmi = kzalloc(len, GFP_KERNEL); ++ if (!dmi) ++ return NULL; ++ ++ dmi->version[0] = 4; ++ dmi->version[1] = 0; ++ dmi->version[2] = 0; ++ dmi->data_size = len; ++ dmi->data_start = sizeof(struct dm_ioctl); ++ dmi->flags = flags; ++ dmi->dev = dev->minor; ++ dmi->target_count = dev->table_count; ++ dmi->event_nr = 1; ++ ++ strncpy(dmi->name, dev->name, sizeof(dmi->name)); ++ ++ b = (char *) (dmi + 1); ++ e = (char *) dmi + len; ++ ++ while (table != NULL) { ++ DMDEBUG("device %s adding table '%llu %llu %s %s'", ++ dev->name, ++ (unsigned long long) table->start, ++ (unsigned long long) table->length, ++ table->type, table->params); ++ b = dm_add_target(table, b, e); ++ if (!b) ++ return NULL; ++ table = table->next; ++ } ++ ++ return dmi; ++} ++ ++static void __init dm_setup_drives(void) ++{ ++ struct dm_device *dev; ++ int flags; ++ struct dm_device *devices; ++ struct dm_ioctl *io = NULL; ++ ++ devices = dm_parse_args(); ++ ++ for (dev = devices; dev; dev = dev->next) { ++ io = dm_setup_ioctl(dev, 0); ++ if (!io) ++ return; ++ /* create a new device */ ++ if (dm_ioctl_cmd(DM_DEV_CREATE, io)) { ++ DMERR("failed to create device %s", dev->name); ++ goto out_free; ++ } ++ kfree(io); ++ ++ flags = DM_STATUS_TABLE_FLAG; ++ if (dev->ro) ++ flags |= DM_READONLY_FLAG; ++ ++ io = dm_setup_ioctl(dev, flags); ++ if (!io) ++ return; ++ /* load a table into the 'inactive' slot for the device. */ ++ if (dm_ioctl_cmd(DM_TABLE_LOAD, io)) { ++ DMERR("failed to load device %s tables", dev->name); ++ goto out_free; ++ } ++ kfree(io); ++ ++ io = dm_setup_ioctl(dev, 0); ++ if (!io) ++ return; ++ /* resume and the device should be ready. */ ++ if (dm_ioctl_cmd(DM_DEV_SUSPEND, io)) { ++ DMERR("failed to resume device %s", dev->name); ++ goto out_free; ++ } ++ ++ DMINFO("dm-%d (%s) is ready", dev->minor, dev->name); ++ } ++ ++out_free: ++ kfree(io); ++} ++ ++__setup("dm=", dm_setup); ++ ++void __init dm_run_setup(void) ++{ ++ if (!dm_early_setup) ++ return; ++ DMINFO("attempting early device configuration."); ++ dm_setup_drives(); ++} +-- +2.20.1 + diff --git a/target/linux/generic/pending-4.14/961-dm-ioctl-add-a-device-mapper-ioctl-function.patch b/target/linux/generic/pending-4.14/961-dm-ioctl-add-a-device-mapper-ioctl-function.patch new file mode 100644 index 0000000000..98606d8ad2 --- /dev/null +++ b/target/linux/generic/pending-4.14/961-dm-ioctl-add-a-device-mapper-ioctl-function.patch @@ -0,0 +1,98 @@ +From 4fecfe301c6ef626e441cac027faced38da965ce Mon Sep 17 00:00:00 2001 +From: Enric Balletbo i Serra +Date: Fri, 19 May 2017 09:11:46 +0200 +Subject: [PATCH] dm ioctl: add a device mapper ioctl function. + +Add a dm_ioctl_cmd to issue the equivalent of a DM ioctl call in kernel. + +Signed-off-by: Enric Balletbo i Serra +--- + drivers/md/dm-ioctl.c | 50 +++++++++++++++++++++++++++++++++++ + include/linux/device-mapper.h | 6 +++++ + 2 files changed, 56 insertions(+) + +diff --git a/drivers/md/dm-ioctl.c b/drivers/md/dm-ioctl.c +index ca948155191a..f41cd0c4c056 100644 +--- a/drivers/md/dm-ioctl.c ++++ b/drivers/md/dm-ioctl.c +@@ -2017,3 +2017,53 @@ int dm_copy_name_and_uuid(struct mapped_device *md, char *name, char *uuid) + + return r; + } ++ ++/** ++ * dm_ioctl_cmd - Device mapper ioctl's ++ * @command: ioctl command ++ * @param: Pointer to device mapped ioctl struct ++ */ ++int dm_ioctl_cmd(uint command, struct dm_ioctl *param) ++{ ++ int r = 0; ++ int ioctl_flags; ++ unsigned int cmd; ++ ioctl_fn fn = NULL; ++ size_t input_param_size; ++ struct file *filp = NULL; ++ ++ if (_IOC_TYPE(command) != DM_IOCTL) ++ return -ENOTTY; ++ ++ /* DM_DEV_ARM_POLL is not supported */ ++ if (command == DM_DEV_ARM_POLL) ++ return -EINVAL; ++ ++ cmd = _IOC_NR(command); ++ ++ /* ++ * Nothing more to do for the version command. ++ */ ++ if (cmd == DM_VERSION_CMD) ++ return 0; ++ ++ fn = lookup_ioctl(cmd, &ioctl_flags); ++ if (!fn) { ++ DMWARN("dm_ioctl: unknown command 0x%x", command); ++ return -ENOTTY; ++ } ++ ++ input_param_size = param->data_size; ++ r = validate_params(cmd, param); ++ if (r) ++ return r; ++ ++ param->data_size = sizeof(*param); ++ r = fn(filp, param, input_param_size); ++ ++ if (unlikely(param->flags & DM_BUFFER_FULL_FLAG) && ++ unlikely(ioctl_flags & IOCTL_FLAGS_NO_PARAMS)) ++ DMERR("ioctl %d tried to output some data but has IOCTL_FLAGS_NO_PARAMS set", cmd); ++ ++ return r; ++} +diff --git a/include/linux/device-mapper.h b/include/linux/device-mapper.h +index a5538433c927..eef393a26d7b 100644 +--- a/include/linux/device-mapper.h ++++ b/include/linux/device-mapper.h +@@ -12,6 +12,7 @@ + #include + #include + #include ++#include + + struct dm_dev; + struct dm_target; +@@ -457,6 +458,11 @@ void dm_remap_zone_report(struct dm_target *ti, struct bio *bio, + sector_t start); + union map_info *dm_get_rq_mapinfo(struct request *rq); + ++/* ++ * Device mapper ioctl function. ++ */ ++int dm_ioctl_cmd(unsigned int command, struct dm_ioctl *param); ++ + struct queue_limits *dm_get_queue_limits(struct mapped_device *md); + + /* +-- +2.20.1 +