1
0
mirror of git://sourceware.org/git/lvm2.git synced 2024-12-21 13:34:40 +03:00
lvm2/lib/misc/lvm-string.c

320 lines
7.0 KiB
C
Raw Normal View History

/*
2008-01-30 17:00:02 +03:00
* Copyright (C) 2001-2004 Sistina Software, Inc. All rights reserved.
* Copyright (C) 2004-2007 Red Hat, Inc. All rights reserved.
*
2004-03-30 23:35:44 +04:00
* This file is part of LVM2.
*
* This copyrighted material is made available to anyone wishing to use,
* modify, copy, or redistribute it subject to the terms and conditions
* of the GNU Lesser General Public License v.2.1.
2004-03-30 23:35:44 +04:00
*
* You should have received a copy of the GNU Lesser General Public License
2004-03-30 23:35:44 +04:00
* along with this program; if not, write to the Free Software Foundation,
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
*/
#include "lib/misc/lib.h"
#include "lib/misc/lvm-string.h"
#include "lib/metadata/metadata-exported.h"
#include "lib/display/display.h"
2006-08-21 16:54:53 +04:00
#include <ctype.h>
#include <stdarg.h>
2003-09-18 00:35:57 +04:00
int emit_to_buffer(char **buffer, size_t *size, const char *fmt, ...)
{
int n;
va_list ap;
va_start(ap, fmt);
n = vsnprintf(*buffer, *size, fmt, ap);
va_end(ap);
/*
* Revert to old glibc behaviour (version <= 2.0.6) where snprintf
* returned -1 if buffer was too small. From glibc 2.1 it returns number
* of chars that would have been written had there been room.
*/
if (n < 0 || ((unsigned) n + 1 > *size))
n = -1;
if (n < 0 || ((size_t)n == *size))
2003-09-18 00:35:57 +04:00
return 0;
*buffer += n;
*size -= n;
return 1;
}
2004-02-13 17:43:35 +03:00
/*
* A-Za-z0-9._-+/=!:&#
*/
int validate_tag(const char *n)
{
register char c;
/* int len = 0; */
if (!n || !*n)
return 0;
/* FIXME: Is unlimited tag size support needed ? */
while ((/* len++, */ c = *n++))
if (!isalnum(c) && c != '.' && c != '_' && c != '-' && c != '+' && c != '/'
&& c != '=' && c != '!' && c != ':' && c != '&' && c != '#')
return 0;
return 1;
}
2014-05-07 15:52:01 +04:00
static name_error_t _validate_name(const char *n)
{
register char c;
register int len = 0;
if (!n || !*n)
2014-05-07 15:52:01 +04:00
return NAME_INVALID_EMPTY;
/* Hyphen used as VG-LV separator - ambiguity if LV starts with it */
if (*n == '-')
2015-02-23 20:09:35 +03:00
return NAME_INVALID_HYPHEN;
if ((*n == '.') && (!n[1] || (n[1] == '.' && !n[2]))) /* ".", ".." */
2014-05-07 15:52:01 +04:00
return NAME_INVALID_DOTS;
while ((len++, c = *n++))
if (!isalnum(c) && c != '.' && c != '_' && c != '-' && c != '+')
2014-05-07 15:52:01 +04:00
return NAME_INVALID_CHARSET;
if (len > NAME_LEN)
2014-05-07 15:52:01 +04:00
return NAME_INVALID_LENGTH;
2014-05-07 15:52:01 +04:00
return NAME_VALID;
}
/*
* Device layer names are all of the form <vg>-<lv>-<layer>, any
* other hyphens that appear in these names are quoted with yet
* another hyphen. The top layer of any device has no layer
* name. eg, vg0-lvol0.
*/
int validate_name(const char *n)
{
2014-05-07 15:52:01 +04:00
return (_validate_name(n) == NAME_VALID) ? 1 : 0;
}
/*
* Copy valid systemid characters from source to destination.
* Invalid characters are skipped. Copying is stopped
* when NAME_LEN characters have been copied.
* A terminating NUL is appended.
*/
void copy_systemid_chars(const char *src, char *dst)
{
const char *s = src;
char *d = dst;
int len = 0;
char c;
if (!s || !*s)
return;
/* Skip non-alphanumeric starting characters */
while (*s && !isalnum(*s))
s++;
while ((c = *s++)) {
if (!isalnum(c) && c != '.' && c != '_' && c != '-' && c != '+')
continue;
*d++ = c;
if (++len >= NAME_LEN)
break;
}
*d = '\0';
}
static const char *_lvname_has_reserved_prefix(const char *lvname)
{
static const char _prefixes[][12] = {
2011-09-06 19:38:44 +04:00
"pvmove",
"snapshot"
2011-09-06 19:38:44 +04:00
};
unsigned i;
for (i = 0; i < DM_ARRAY_SIZE(_prefixes); ++i)
if (!strncmp(lvname, _prefixes[i], strlen(_prefixes[i])))
return _prefixes[i];
2011-09-06 19:38:44 +04:00
return NULL;
}
static const char *_lvname_has_reserved_component_string(const char *lvname)
{
static const char _strings[][12] = {
/* Suffixes for compoment LVs */
"_cdata",
"_cmeta",
2014-11-08 15:16:35 +03:00
"_corig",
2019-10-22 17:07:21 +03:00
"_cpool",
"_cvol",
"_wcorig",
2011-09-06 19:38:44 +04:00
"_mimage",
"_mlog",
2011-09-06 19:38:44 +04:00
"_rimage",
"_rmeta",
"_tdata",
"_tmeta",
Allow dm-integrity to be used for raid images dm-integrity stores checksums of the data written to an LV, and returns an error if data read from the LV does not match the previously saved checksum. When used on raid images, dm-raid will correct the error by reading the block from another image, and the device user sees no error. The integrity metadata (checksums) are stored on an internal LV allocated by lvm for each linear image. The internal LV is allocated on the same PV as the image. Create a raid LV with an integrity layer over each raid image (for raid levels 1,4,5,6,10): lvcreate --type raidN --raidintegrity y [options] Add an integrity layer to images of an existing raid LV: lvconvert --raidintegrity y LV Remove the integrity layer from images of a raid LV: lvconvert --raidintegrity n LV Settings Use --raidintegritymode journal|bitmap (journal is default) to configure the method used by dm-integrity to ensure crash consistency. Initialization When integrity is added to an LV, the kernel needs to initialize the integrity metadata/checksums for all blocks in the LV. The data corruption checking performed by dm-integrity will only operate on areas of the LV that are already initialized. The progress of integrity initialization is reported by the "syncpercent" LV reporting field (and under the Cpy%Sync lvs column.) Example: create a raid1 LV with integrity: $ lvcreate --type raid1 -m1 --raidintegrity y -n rr -L1G foo Creating integrity metadata LV rr_rimage_0_imeta with size 12.00 MiB. Logical volume "rr_rimage_0_imeta" created. Creating integrity metadata LV rr_rimage_1_imeta with size 12.00 MiB. Logical volume "rr_rimage_1_imeta" created. Logical volume "rr" created. $ lvs -a foo LV VG Attr LSize Origin Cpy%Sync rr foo rwi-a-r--- 1.00g 4.93 [rr_rimage_0] foo gwi-aor--- 1.00g [rr_rimage_0_iorig] 41.02 [rr_rimage_0_imeta] foo ewi-ao---- 12.00m [rr_rimage_0_iorig] foo -wi-ao---- 1.00g [rr_rimage_1] foo gwi-aor--- 1.00g [rr_rimage_1_iorig] 39.45 [rr_rimage_1_imeta] foo ewi-ao---- 12.00m [rr_rimage_1_iorig] foo -wi-ao---- 1.00g [rr_rmeta_0] foo ewi-aor--- 4.00m [rr_rmeta_1] foo ewi-aor--- 4.00m
2019-11-21 01:07:27 +03:00
"_vdata",
"_imeta",
"_iorig"
};
unsigned i;
for (i = 0; i < DM_ARRAY_SIZE(_strings); ++i)
if (strstr(lvname, _strings[i]))
return _strings[i];
return NULL;
}
static const char *_lvname_has_reserved_string(const char *lvname)
{
static const char _strings[][12] = {
/* Additional suffixes for non-compoment LVs */
"_pmspare",
"_vorigin"
2011-09-06 19:38:44 +04:00
};
unsigned i;
const char *cs;
if ((cs = _lvname_has_reserved_component_string(lvname)))
return cs;
for (i = 0; i < DM_ARRAY_SIZE(_strings); ++i)
if (strstr(lvname, _strings[i]))
return _strings[i];
return NULL;
}
int apply_lvname_restrictions(const char *name)
{
2011-09-06 19:38:44 +04:00
const char *s;
if ((s = _lvname_has_reserved_prefix(name))) {
log_error("Names starting \"%s\" are reserved. "
"Please choose a different LV name.", s);
return 0;
}
if ((s = _lvname_has_reserved_string(name))) {
log_error("Names including \"%s\" are reserved. "
"Please choose a different LV name.", s);
return 0;
}
return 1;
}
/*
* Validates name and returns an emunerated reason for name validataion failure.
*/
name_error_t validate_name_detailed(const char *name)
{
return _validate_name(name);
}
int is_reserved_lvname(const char *name)
{
return (_lvname_has_reserved_prefix(name) ||
_lvname_has_reserved_string(name)) ? 1 : 0;
}
int is_component_lvname(const char *name)
{
return (_lvname_has_reserved_component_string(name)) ? 1 : 0;
}
char *build_dm_uuid(struct dm_pool *mem, const struct logical_volume *lv,
const char *layer)
{
const char *lvid = lv->lvid.s;
char *dlid;
if (!layer) {
/*
* Mark internal LVs with layer suffix
* so tools like blkid may immeditelly see it's
* an internal LV they should not scan.
* Should also make internal detection simpler.
*/
/* Suffixes used here MUST match lib/activate/dev_manager.c */
layer = lv_is_cache_origin(lv) ? "real" :
lv_is_writecache_origin(lv) ? "real" :
2014-11-10 12:56:43 +03:00
(lv_is_cache(lv) && lv_is_pending_delete(lv)) ? "real" :
lv_is_cache_pool_data(lv) ? "cdata" :
lv_is_cache_pool_metadata(lv) ? "cmeta" :
lv_is_cache_vol(lv) ? "cvol" :
// FIXME: dm-tree needs fixes for mirrors/raids
//lv_is_mirror_image(lv) ? "mimage" :
//lv_is_mirror_log(lv) ? "mlog" :
//lv_is_raid_image(lv) ? "rimage" :
//lv_is_raid_metadata(lv) ? "rmeta" :
lv_is_thin_pool(lv) ? "pool" :
lv_is_thin_pool_data(lv) ? "tdata" :
lv_is_thin_pool_metadata(lv) ? "tmeta" :
lv_is_vdo_pool(lv) ? "pool" :
lv_is_vdo_pool_data(lv) ? "vdata" :
NULL;
}
if (!(dlid = dm_build_dm_uuid(mem, UUID_PREFIX, lvid, layer)))
log_error("Failed to build LVM dlid for %s.",
display_lvname(lv));
return dlid;
}
2016-07-14 16:46:38 +03:00
char *first_substring(const char *str, ...)
{
char *substr, *r = NULL;
va_list ap;
va_start(ap, str);
while ((substr = va_arg(ap, char *)))
if ((r = strstr(str, substr)))
break;
va_end(ap);
return r;
}
/* Cut suffix (if present) and write the name into NAME_LEN sized new_name buffer
* When suffix is NULL, everythin past the last '_' is removed.
* Returns 1 when suffix was removed, 0 otherwise.
*/
int drop_lvname_suffix(char *new_name, const char *name, const char *suffix)
{
char *c;
if (!_dm_strncpy(new_name, name, NAME_LEN)) {
log_debug(INTERNAL_ERROR "Name is too long.");
return 0;
}
if (!(c = strrchr(new_name, '_')))
return 0;
if (suffix && strcmp(c + 1, suffix))
return 0;
*c = 0; /* remove suffix */
return 1;
}