Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp667948ybz; Wed, 22 Apr 2020 05:52:54 -0700 (PDT) X-Google-Smtp-Source: APiQypLrKNgHhz3hzw+3N4A1kRAlD7vgPxP0Z5NVo040T+o+UuDDzgo2MZJaZ3eT2HrZ0jNyiUtK X-Received: by 2002:a50:b882:: with SMTP id l2mr23208255ede.350.1587559974486; Wed, 22 Apr 2020 05:52:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587559974; cv=none; d=google.com; s=arc-20160816; b=GV3cRk+5R/w/Azp5asDCkc2QFCh24fMQvhXC2t03rlZb/gNn/puq/Hc5l5VuD7Ujn+ MOVjyhpr6HEN1mh4OqkB1xNyRCKCW3HqaytH2ZRrcTtkewj79Vi0YLfRhdtMMTqy06tB 0BEK5A6OneljM6Ou4JPXMOb3EIuTIU21soJ/FbU/+B6ltPsBDk+CVuZ3mufbark0AHtx emc/+trQoqIoJhnVO1y5aFBCxg/D8ciUlDQJZyyYTGJCKESOehXPzbFtZsxXvqHWSvIT GVecxezbcpv9nJ3szwYctQBha09cThUrLedkAQZz/q1/SdG4ivZfXSVap2SFT+twZ2Ar DPnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=F+0K7OIOKk8O51V5gNKinM3m15DeYTfEO7xsT25+AwY=; b=SErfWSufVUWbIh5tjSR+BcepU/eCJ3qYt58w0H5p83mvd3MyyfcnHqDN4HH25ppItA wQDASJkpKTMFs8mqHmN8GOJ3nKHvdPIklr8dtnM76U37XpwD7COhOt2/rfpwoeyWT/0p wUmfWwjKJJvb7Hy3pesU3BBBCeo3NYfLguBxr2+ZO+vVmqVbFyTnpKD0NPW4qQRYKd93 ZJ6Lvr2cO08FIz7WfosaFjOjWmj/WXyUASTlDDd6eqDYZl/lmeYN7nyAvk2hHNNje3qK 3tLH6w9bY2ovKXq4xm1R98syR2zf0Gy2W/9VTZOVjLXmV2PBccBB1TegIsSBTiE1KgVq EVSQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@android.com header.s=20161025 header.b=wCRZog2u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=android.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 5si3386753edy.189.2020.04.22.05.52.31; Wed, 22 Apr 2020 05:52:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@android.com header.s=20161025 header.b=wCRZog2u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=android.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732267AbgDVK4K (ORCPT + 99 others); Wed, 22 Apr 2020 06:56:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32878 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728396AbgDVKGp (ORCPT ); Wed, 22 Apr 2020 06:06:45 -0400 Received: from mail-wm1-x344.google.com (mail-wm1-x344.google.com [IPv6:2a00:1450:4864:20::344]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 07ED4C03C1AB for ; Wed, 22 Apr 2020 03:06:45 -0700 (PDT) Received: by mail-wm1-x344.google.com with SMTP id x25so1627664wmc.0 for ; Wed, 22 Apr 2020 03:06:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=android.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=F+0K7OIOKk8O51V5gNKinM3m15DeYTfEO7xsT25+AwY=; b=wCRZog2ujjq1VXrOoJzN2gxTVlzcdBgWGd3wj0+N+SFLxJ29cyO0YFt8VNRf5wO0nC ZQH2Gk7Q6cCNuGc9QTjkHwJXO7Hk0nDWCVOV2WP89hucJ9DSV9wdbxEmsJiuhuwKiA/s 7H2WPVbbwStLDHuxz8DSHCTRR15JUYRbay/2Xi9u+M1WKFPgbIHR+H+/Rn5sipM8/n3r u081iY2UAJC+76ZowLZMM8tQ8/Zy+sV6bJo633hYjILCUIZMZsvqbaIGfIQtJIsDY7qc w/kBe8QD68/OjBVnQVvwFyiN+QnrBHR+Z1qmFdKM9OBOk+zo/NKKauVi8+IpLAZLU1yH sz4w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=F+0K7OIOKk8O51V5gNKinM3m15DeYTfEO7xsT25+AwY=; b=fh3PGqLBR4t8HN5Nyf8NrG9+0bPm1UKiaHdDnO5tLZpHXTe/svS7zvMxYvUrB7Riej Ftk1yP0C/uUiqKDvebk80Bm3YE7rxppGDrFq6uZX0cEM9yp9f1EpJwEkjbVf0c7UijUr I9+r7ZphO4/Q0ECh9XVvtqsqPCg6OrkzK/tOmYLumPHkdskpQe4egTF6u/3Tx5y9TLC6 KC4T0XcsXoLfdTPk/cuAKWOJtdwCbF/4LeBQWNXd3bntkQyz8P5haSb7TS3r0p+jbauJ 8jf/wjX3wzcJXwqAZu5Mww0hbQgyvBIfYTSBqqyvgauFJM8AsTOrhZONd2ylJqo3Z0BA fJng== X-Gm-Message-State: AGi0PuY/iG2EqqP0hCFEIGpAhYOc2Xjt1kFTGRus+92b1AJSm+5C+KQ2 24SbHI9M7Wi8CnsCu2bJslJW0A== X-Received: by 2002:a1c:5448:: with SMTP id p8mr9466600wmi.173.1587550003569; Wed, 22 Apr 2020 03:06:43 -0700 (PDT) Received: from maco2.ams.corp.google.com (a83-162-234-235.adsl.xs4all.nl. [83.162.234.235]) by smtp.gmail.com with ESMTPSA id j13sm7812462wrq.24.2020.04.22.03.06.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 22 Apr 2020 03:06:42 -0700 (PDT) From: Martijn Coenen To: axboe@kernel.dk, hch@lst.de, ming.lei@redhat.com Cc: narayan@google.com, zezeozue@google.com, kernel-team@android.com, linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, maco@google.com, bvanassche@acm.org, Chaitanya.Kulkarni@wdc.com, jaegeuk@kernel.org, Martijn Coenen Subject: [PATCH v2 1/5] loop: Refactor size calculation Date: Wed, 22 Apr 2020 12:06:32 +0200 Message-Id: <20200422100636.46357-2-maco@android.com> X-Mailer: git-send-email 2.26.2.303.gf8c07b1a785-goog In-Reply-To: <20200422100636.46357-1-maco@android.com> References: <20200422100636.46357-1-maco@android.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org figure_loop_size() calculates the loop size based on the passed in parameters, but at the same time it updates the offset and sizelimit parameters in the loop device configuration. That is a somewhat unexpected side effect of a function with this name, and it is only only needed by one of the two callers of this function - loop_set_status(). Move the lo_offset and lo_sizelimit assignment back into loop_set_status(), and factor out a new function (loop_set_size()) to apply a newly calculated size that has been validated to fit in sector_t, and notify user-space. loop_update_size() is now solely used by loop_set_capacity to compute an updated size, and loop_set_status() uses a combination of functions to validate the loop size, and only apply it later. Signed-off-by: Martijn Coenen --- drivers/block/loop.c | 88 ++++++++++++++++++++++++++++---------------- 1 file changed, 56 insertions(+), 32 deletions(-) diff --git a/drivers/block/loop.c b/drivers/block/loop.c index f1754262fc94..4f5c765c73d8 100644 --- a/drivers/block/loop.c +++ b/drivers/block/loop.c @@ -228,23 +228,42 @@ static void __loop_update_dio(struct loop_device *lo, bool dio) blk_mq_unfreeze_queue(lo->lo_queue); } +/** + * loop_set_size - sets device size and notifies userspace + * @lo: struct loop_device to set the size for + * @size: new size of the loop device + * + * Callers must validate that the size passed into this function fits into + * a sector_t. + */ +static void loop_set_size(struct loop_device *lo, loff_t size) +{ + struct block_device *bdev = lo->lo_device; + + set_capacity(lo->lo_disk, size); + bd_set_size(bdev, size << SECTOR_SHIFT); + /* let user-space know about the new size */ + kobject_uevent(&disk_to_dev(bdev->bd_disk)->kobj, KOBJ_CHANGE); +} + +/** + * loop_update_size - updates device size from the backing file + * @lo: struct loop_device to update the size for + * + * Recomputes the device size from the backing file, and updates the device + * with the new size. + */ static int -figure_loop_size(struct loop_device *lo, loff_t offset, loff_t sizelimit) +loop_update_size(struct loop_device *lo) { - loff_t size = get_size(offset, sizelimit, lo->lo_backing_file); + loff_t size = get_loop_size(lo, lo->lo_backing_file); sector_t x = (sector_t)size; - struct block_device *bdev = lo->lo_device; if (unlikely((loff_t)x != size)) return -EFBIG; - if (lo->lo_offset != offset) - lo->lo_offset = offset; - if (lo->lo_sizelimit != sizelimit) - lo->lo_sizelimit = sizelimit; - set_capacity(lo->lo_disk, x); - bd_set_size(bdev, (loff_t)get_capacity(bdev->bd_disk) << 9); - /* let user-space know about the new size */ - kobject_uevent(&disk_to_dev(bdev->bd_disk)->kobj, KOBJ_CHANGE); + + loop_set_size(lo, size); + return 0; } @@ -1040,11 +1059,8 @@ static int loop_set_fd(struct loop_device *lo, fmode_t mode, loop_update_rotational(lo); loop_update_dio(lo); - set_capacity(lo->lo_disk, size); - bd_set_size(bdev, size << 9); loop_sysfs_init(lo); - /* let user-space know about the new size */ - kobject_uevent(&disk_to_dev(bdev->bd_disk)->kobj, KOBJ_CHANGE); + loop_set_size(lo, size); set_blocksize(bdev, S_ISBLK(inode->i_mode) ? block_size(inode->i_bdev) : PAGE_SIZE); @@ -1267,6 +1283,8 @@ loop_set_status(struct loop_device *lo, const struct loop_info64 *info) kuid_t uid = current_uid(); struct block_device *bdev; bool partscan = false; + bool size_changed = false; + loff_t validated_size; err = mutex_lock_killable(&loop_ctl_mutex); if (err) @@ -1288,6 +1306,14 @@ loop_set_status(struct loop_device *lo, const struct loop_info64 *info) if (lo->lo_offset != info->lo_offset || lo->lo_sizelimit != info->lo_sizelimit) { + size_t size = get_size(info->lo_offset, info->lo_sizelimit, + lo->lo_backing_file); + if ((loff_t)(sector_t)size != size) { + err = -EFBIG; + goto out_unlock; + } + size_changed = true; + validated_size = size; sync_blockdev(lo->lo_device); kill_bdev(lo->lo_device); } @@ -1295,6 +1321,15 @@ loop_set_status(struct loop_device *lo, const struct loop_info64 *info) /* I/O need to be drained during transfer transition */ blk_mq_freeze_queue(lo->lo_queue); + if (size_changed && lo->lo_device->bd_inode->i_mapping->nrpages) { + /* If any pages were dirtied after kill_bdev(), try again */ + err = -EAGAIN; + pr_warn("%s: loop%d (%s) has still dirty pages (nrpages=%lu)\n", + __func__, lo->lo_number, lo->lo_file_name, + lo->lo_device->bd_inode->i_mapping->nrpages); + goto out_unfreeze; + } + err = loop_release_xfer(lo); if (err) goto out_unfreeze; @@ -1318,22 +1353,8 @@ loop_set_status(struct loop_device *lo, const struct loop_info64 *info) if (err) goto out_unfreeze; - if (lo->lo_offset != info->lo_offset || - lo->lo_sizelimit != info->lo_sizelimit) { - /* kill_bdev should have truncated all the pages */ - if (lo->lo_device->bd_inode->i_mapping->nrpages) { - err = -EAGAIN; - pr_warn("%s: loop%d (%s) has still dirty pages (nrpages=%lu)\n", - __func__, lo->lo_number, lo->lo_file_name, - lo->lo_device->bd_inode->i_mapping->nrpages); - goto out_unfreeze; - } - if (figure_loop_size(lo, info->lo_offset, info->lo_sizelimit)) { - err = -EFBIG; - goto out_unfreeze; - } - } - + lo->lo_offset = info->lo_offset; + lo->lo_sizelimit = info->lo_sizelimit; memcpy(lo->lo_file_name, info->lo_file_name, LO_NAME_SIZE); memcpy(lo->lo_crypt_name, info->lo_crypt_name, LO_NAME_SIZE); lo->lo_file_name[LO_NAME_SIZE-1] = 0; @@ -1357,6 +1378,9 @@ loop_set_status(struct loop_device *lo, const struct loop_info64 *info) lo->lo_key_owner = uid; } + if (size_changed) + loop_set_size(lo, validated_size); + loop_config_discard(lo); /* update dio if lo_offset or transfer is changed */ @@ -1534,7 +1558,7 @@ static int loop_set_capacity(struct loop_device *lo) if (unlikely(lo->lo_state != Lo_bound)) return -ENXIO; - return figure_loop_size(lo, lo->lo_offset, lo->lo_sizelimit); + return loop_update_size(lo); } static int loop_set_dio(struct loop_device *lo, unsigned long arg) -- 2.26.2.303.gf8c07b1a785-goog