/* SPDX-License-Identifier: LGPL-2.1-or-later */ #include #include #include #include #include #include #include #include /* This needs to be included after sys/mount.h, as since [0] linux/btrfs.h * includes linux/fs.h causing build errors * See: https://github.com/systemd/systemd/issues/8507 * [0] https://github.com/torvalds/linux/commit/a28135303a669917002f569aecebd5758263e4aa */ #include #include "sd-device.h" #include "blockdev-util.h" #include "btrfs-util.h" #include "cryptsetup-util.h" #include "device-nodes.h" #include "device-util.h" #include "devnum-util.h" #include "dissect-image.h" #include "escape.h" #include "fd-util.h" #include "format-util.h" #include "log.h" #include "main-func.h" #include "mountpoint-util.h" #include "parse-util.h" #include "pretty-print.h" #include "resize-fs.h" static const char *arg_target = NULL; static bool arg_dry_run = false; #if HAVE_LIBCRYPTSETUP static int resize_crypt_luks_device(dev_t devno, const char *fstype, dev_t main_devno) { _cleanup_free_ char *devpath = NULL, *main_devpath = NULL; _cleanup_(sym_crypt_freep) struct crypt_device *cd = NULL; _cleanup_close_ int main_devfd = -1; uint64_t size; int r; r = dlopen_cryptsetup(); if (r < 0) return log_error_errno(r, "Cannot resize LUKS device: %m"); main_devfd = r = device_open_from_devnum(S_IFBLK, main_devno, O_RDONLY|O_CLOEXEC, &main_devpath); if (r < 0) return log_error_errno(r, "Failed to open main block device " DEVNUM_FORMAT_STR ": %m", DEVNUM_FORMAT_VAL(main_devno)); if (ioctl(main_devfd, BLKGETSIZE64, &size) != 0) return log_error_errno(errno, "Failed to query size of \"%s\" (before resize): %m", main_devpath); log_debug("%s is %"PRIu64" bytes", main_devpath, size); r = devname_from_devnum(S_IFBLK, devno, &devpath); if (r < 0) return log_error_errno(r, "Failed to get devpath of " DEVNUM_FORMAT_STR ": %m", DEVNUM_FORMAT_VAL(devno)); r = sym_crypt_init(&cd, devpath); if (r < 0) return log_error_errno(r, "crypt_init(\"%s\") failed: %m", devpath); cryptsetup_enable_logging(cd); r = sym_crypt_load(cd, CRYPT_LUKS, NULL); if (r < 0) return log_debug_errno(r, "Failed to load LUKS metadata for %s: %m", devpath); if (arg_dry_run) return 0; r = sym_crypt_resize(cd, main_devpath, 0); if (r < 0) return log_error_errno(r, "crypt_resize() of %s failed: %m", devpath); if (ioctl(main_devfd, BLKGETSIZE64, &size) != 0) log_warning_errno(errno, "Failed to query size of \"%s\" (after resize): %m", devpath); else log_debug("%s is now %"PRIu64" bytes", main_devpath, size); return 1; } #endif static int maybe_resize_underlying_device( int mountfd, const char *mountpath, dev_t main_devno) { _cleanup_free_ char *devpath = NULL, *fstype = NULL; dev_t devno; int r; assert(mountfd >= 0); assert(mountpath); #if HAVE_LIBCRYPTSETUP cryptsetup_enable_logging(NULL); #endif r = get_block_device_harder_fd(mountfd, &devno); if (r < 0) return log_error_errno(r, "Failed to determine underlying block device of \"%s\": %m", mountpath); if (devno == 0) return log_error_errno(SYNTHETIC_ERRNO(ENODEV), "File system \"%s\" not backed by block device.", arg_target); log_debug("Underlying device " DEVNUM_FORMAT_STR ", main dev " DEVNUM_FORMAT_STR ", %s", DEVNUM_FORMAT_VAL(devno), DEVNUM_FORMAT_VAL(main_devno), devno == main_devno ? "same" : "different"); if (devno == main_devno) return 0; r = devname_from_devnum(S_IFBLK, devno, &devpath); if (r < 0) return log_error_errno(r, "Failed to get devpath for block device " DEVNUM_FORMAT_STR ": %m", DEVNUM_FORMAT_VAL(devno)); r = probe_filesystem(devpath, &fstype); if (r == -EUCLEAN) return log_warning_errno(r, "Cannot reliably determine probe \"%s\", refusing to proceed.", devpath); if (r < 0) return log_warning_errno(r, "Failed to probe \"%s\": %m", devpath); #if HAVE_LIBCRYPTSETUP if (streq_ptr(fstype, "crypto_LUKS")) return resize_crypt_luks_device(devno, fstype, main_devno); #endif log_debug("Don't know how to resize %s of type %s, ignoring.", devpath, strnull(fstype)); return 0; } static int help(void) { _cleanup_free_ char *link = NULL; int r; r = terminal_urlify_man("systemd-growfs@.service", "8", &link); if (r < 0) return log_oom(); printf("%s [OPTIONS...] /path/to/mountpoint\n\n" "Grow filesystem or encrypted payload to device size.\n\n" "Options:\n" " -h --help Show this help and exit\n" " --version Print version string and exit\n" " -n --dry-run Just print what would be done\n" "\nSee the %s for details.\n", program_invocation_short_name, link); return 0; } static int parse_argv(int argc, char *argv[]) { enum { ARG_VERSION = 0x100, }; int c; static const struct option options[] = { { "help", no_argument, NULL, 'h' }, { "version" , no_argument, NULL, ARG_VERSION }, { "dry-run", no_argument, NULL, 'n' }, {} }; assert(argc >= 0); assert(argv); while ((c = getopt_long(argc, argv, "hn", options, NULL)) >= 0) switch (c) { case 'h': return help(); case ARG_VERSION: return version(); case 'n': arg_dry_run = true; break; case '?': return -EINVAL; default: assert_not_reached(); } if (optind + 1 != argc) return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "%s excepts exactly one argument (the mount point).", program_invocation_short_name); arg_target = argv[optind]; return 1; } static int run(int argc, char *argv[]) { _cleanup_close_ int mountfd = -1, devfd = -1; _cleanup_free_ char *devpath = NULL; uint64_t size, newsize; dev_t devno; int r; log_setup(); r = parse_argv(argc, argv); if (r <= 0) return r; r = path_is_mount_point(arg_target, NULL, 0); if (r < 0) return log_error_errno(r, "Failed to check if \"%s\" is a mount point: %m", arg_target); if (r == 0) return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "\"%s\" is not a mount point: %m", arg_target); mountfd = open(arg_target, O_RDONLY|O_CLOEXEC|O_DIRECTORY); if (mountfd < 0) return log_error_errno(errno, "Failed to open \"%s\": %m", arg_target); r = get_block_device_fd(mountfd, &devno); if (r == -EUCLEAN) return btrfs_log_dev_root(LOG_ERR, r, arg_target); if (r < 0) return log_error_errno(r, "Failed to determine block device of \"%s\": %m", arg_target); if (devno == 0) return log_error_errno(SYNTHETIC_ERRNO(ENODEV), "File system \"%s\" not backed by block device.", arg_target); r = maybe_resize_underlying_device(mountfd, arg_target, devno); if (r < 0) log_warning_errno(r, "Unable to resize underlying device of \"%s\", proceeding anyway: %m", arg_target); devfd = r = device_open_from_devnum(S_IFBLK, devno, O_RDONLY|O_CLOEXEC, &devpath); if (r < 0) return log_error_errno(r, "Failed to open block device " DEVNUM_FORMAT_STR ": %m", DEVNUM_FORMAT_VAL(devno)); if (ioctl(devfd, BLKGETSIZE64, &size) != 0) return log_error_errno(errno, "Failed to query size of \"%s\": %m", devpath); log_debug("Resizing \"%s\" to %"PRIu64" bytes...", arg_target, size); if (arg_dry_run) return 0; r = resize_fs(mountfd, size, &newsize); if (r < 0) return log_error_errno(r, "Failed to resize \"%s\" to %"PRIu64" bytes: %m", arg_target, size); if (newsize == size) log_info("Successfully resized \"%s\" to %s bytes.", arg_target, FORMAT_BYTES(newsize)); else log_info("Successfully resized \"%s\" to %s bytes (%"PRIu64" bytes lost due to blocksize).", arg_target, FORMAT_BYTES(newsize), size - newsize); return 0; } DEFINE_MAIN_FUNCTION(run);