xen/blkback: Shuffle code around (vbd_translate moved higher).
[deliverable/linux.git] / drivers / xen / blkback / blkback.c
CommitLineData
4d05a28d 1/******************************************************************************
4d05a28d
KRW
2 *
3 * Back-end of the driver for virtual block devices. This portion of the
4 * driver exports a 'unified' block-device interface that can be accessed
5 * by any operating system that implements a compatible front end. A
6 * reference front-end implementation can be found in:
a1397fa3 7 * drivers/block/xen-blkfront.c
4d05a28d
KRW
8 *
9 * Copyright (c) 2003-2004, Keir Fraser & Steve Hand
10 * Copyright (c) 2005, Christopher Clark
11 *
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License version 2
14 * as published by the Free Software Foundation; or, when distributed
15 * separately from the Linux kernel or incorporated into other
16 * software packages, subject to the following license:
17 *
18 * Permission is hereby granted, free of charge, to any person obtaining a copy
19 * of this source file (the "Software"), to deal in the Software without
20 * restriction, including without limitation the rights to use, copy, modify,
21 * merge, publish, distribute, sublicense, and/or sell copies of the Software,
22 * and to permit persons to whom the Software is furnished to do so, subject to
23 * the following conditions:
24 *
25 * The above copyright notice and this permission notice shall be included in
26 * all copies or substantial portions of the Software.
27 *
28 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
29 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
30 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
31 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
32 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
33 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
34 * IN THE SOFTWARE.
35 */
36
37#include <linux/spinlock.h>
38#include <linux/kthread.h>
39#include <linux/list.h>
40#include <linux/delay.h>
88122933 41#include <linux/freezer.h>
afd91d07 42
88122933
JF
43#include <xen/events.h>
44#include <xen/page.h>
45#include <asm/xen/hypervisor.h>
46#include <asm/xen/hypercall.h>
4d05a28d
KRW
47#include "common.h"
48
314146e5
TG
49#define WRITE_BARRIER (REQ_WRITE | REQ_FLUSH | REQ_FUA)
50
4d05a28d
KRW
51/*
52 * These are rather arbitrary. They are fairly large because adjacent requests
53 * pulled from a communication ring are quite likely to end up being part of
54 * the same scatter/gather request at the disc.
55 *
56 * ** TRY INCREASING 'blkif_reqs' IF WRITE SPEEDS SEEM TOO LOW **
57 *
58 * This will increase the chances of being able to write whole tracks.
59 * 64 should be enough to keep us competitive with Linux.
60 */
61static int blkif_reqs = 64;
62module_param_named(reqs, blkif_reqs, int, 0);
63MODULE_PARM_DESC(reqs, "Number of blkback requests to allocate");
64
65/* Run-time switchable: /sys/module/blkback/parameters/ */
2e9977c2
KRW
66static unsigned int log_stats;
67static unsigned int debug_lvl;
4d05a28d
KRW
68module_param(log_stats, int, 0644);
69module_param(debug_lvl, int, 0644);
70
71/*
72 * Each outstanding request that we've passed to the lower device layers has a
73 * 'pending_req' allocated to it. Each buffer_head that completes decrements
74 * the pendcnt towards zero. When it hits zero, the specified domain has a
75 * response queued for it, with the saved 'id' passed back.
76 */
2e9977c2 77struct pending_req {
5489377c 78 struct blkif_st *blkif;
4d05a28d
KRW
79 u64 id;
80 int nr_pages;
81 atomic_t pendcnt;
82 unsigned short operation;
83 int status;
84 struct list_head free_list;
2e9977c2 85};
4d05a28d 86
4d05a28d
KRW
87#define BLKBACK_INVALID_HANDLE (~0)
88
e8e28871 89struct xen_blkbk {
2e9977c2 90 struct pending_req *pending_reqs;
a1397fa3 91 /* List of all 'pending_req' available */
e8e28871 92 struct list_head pending_free;
a1397fa3 93 /* And its spinlock. */
e8e28871
KRW
94 spinlock_t pending_free_lock;
95 wait_queue_head_t pending_free_wq;
a1397fa3 96 /* The list of all pages that are available. */
e8e28871 97 struct page **pending_pages;
a1397fa3 98 /* And the grant handles that are available. */
e8e28871
KRW
99 grant_handle_t *pending_grant_handles;
100};
101
102static struct xen_blkbk *blkbk;
4d05a28d 103
a1397fa3
KRW
104/*
105 * Little helpful macro to figure out the index and virtual address of the
106 * pending_pages[..]. For each 'pending_req' we have have up to
107 * BLKIF_MAX_SEGMENTS_PER_REQUEST (11) pages. The seg would be from 0 through
108 * 10 and would index in the pending_pages[..]. */
2e9977c2 109static inline int vaddr_pagenr(struct pending_req *req, int seg)
4d05a28d 110{
2e9977c2
KRW
111 return (req - blkbk->pending_reqs) *
112 BLKIF_MAX_SEGMENTS_PER_REQUEST + seg;
4d05a28d
KRW
113}
114
efe08a3e
JB
115#define pending_page(req, seg) pending_pages[vaddr_pagenr(req, seg)]
116
2e9977c2 117static inline unsigned long vaddr(struct pending_req *req, int seg)
4d05a28d 118{
e8e28871 119 unsigned long pfn = page_to_pfn(blkbk->pending_page(req, seg));
4d05a28d
KRW
120 return (unsigned long)pfn_to_kaddr(pfn);
121}
122
123#define pending_handle(_req, _seg) \
e8e28871 124 (blkbk->pending_grant_handles[vaddr_pagenr(_req, _seg)])
4d05a28d
KRW
125
126
5489377c
KRW
127static int do_block_io_op(struct blkif_st *blkif);
128static void dispatch_rw_block_io(struct blkif_st *blkif,
88122933 129 struct blkif_request *req,
2e9977c2 130 struct pending_req *pending_req);
5489377c 131static void make_response(struct blkif_st *blkif, u64 id,
4d05a28d
KRW
132 unsigned short op, int st);
133
a1397fa3
KRW
134/*
135 * Retrieve from the 'pending_reqs' a free pending_req structure to be used.
4d05a28d 136 */
2e9977c2 137static struct pending_req *alloc_req(void)
4d05a28d 138{
2e9977c2 139 struct pending_req *req = NULL;
4d05a28d
KRW
140 unsigned long flags;
141
e8e28871
KRW
142 spin_lock_irqsave(&blkbk->pending_free_lock, flags);
143 if (!list_empty(&blkbk->pending_free)) {
2e9977c2
KRW
144 req = list_entry(blkbk->pending_free.next, struct pending_req,
145 free_list);
4d05a28d
KRW
146 list_del(&req->free_list);
147 }
e8e28871 148 spin_unlock_irqrestore(&blkbk->pending_free_lock, flags);
4d05a28d
KRW
149 return req;
150}
151
a1397fa3
KRW
152/*
153 * Return the 'pending_req' structure back to the freepool. We also
154 * wake up the thread if it was waiting for a free page.
155 */
2e9977c2 156static void free_req(struct pending_req *req)
4d05a28d
KRW
157{
158 unsigned long flags;
159 int was_empty;
160
e8e28871
KRW
161 spin_lock_irqsave(&blkbk->pending_free_lock, flags);
162 was_empty = list_empty(&blkbk->pending_free);
163 list_add(&req->free_list, &blkbk->pending_free);
164 spin_unlock_irqrestore(&blkbk->pending_free_lock, flags);
4d05a28d 165 if (was_empty)
e8e28871 166 wake_up(&blkbk->pending_free_wq);
4d05a28d
KRW
167}
168
a1397fa3 169/*
b0aef179
KRW
170 * Notification from the guest OS.
171 */
172static void blkif_notify_work(struct blkif_st *blkif)
4d05a28d 173{
b0aef179
KRW
174 blkif->waiting_reqs = 1;
175 wake_up(&blkif->wq);
176}
4d05a28d 177
b0aef179
KRW
178irqreturn_t blkif_be_int(int irq, void *dev_id)
179{
180 blkif_notify_work(dev_id);
181 return IRQ_HANDLED;
4d05a28d
KRW
182}
183
2e9977c2 184/*
4d05a28d
KRW
185 * SCHEDULER FUNCTIONS
186 */
187
5489377c 188static void print_stats(struct blkif_st *blkif)
4d05a28d
KRW
189{
190 printk(KERN_DEBUG "%s: oo %3d | rd %4d | wr %4d | br %4d\n",
191 current->comm, blkif->st_oo_req,
192 blkif->st_rd_req, blkif->st_wr_req, blkif->st_br_req);
193 blkif->st_print = jiffies + msecs_to_jiffies(10 * 1000);
194 blkif->st_rd_req = 0;
195 blkif->st_wr_req = 0;
196 blkif->st_oo_req = 0;
197}
198
199int blkif_schedule(void *arg)
200{
5489377c 201 struct blkif_st *blkif = arg;
2ccbfe26 202 struct vbd *vbd = &blkif->vbd;
4d05a28d
KRW
203
204 blkif_get(blkif);
205
206 if (debug_lvl)
207 printk(KERN_DEBUG "%s: started\n", current->comm);
208
209 while (!kthread_should_stop()) {
210 if (try_to_freeze())
211 continue;
2ccbfe26
S
212 if (unlikely(vbd->size != vbd_size(vbd)))
213 vbd_resize(blkif);
4d05a28d
KRW
214
215 wait_event_interruptible(
216 blkif->wq,
217 blkif->waiting_reqs || kthread_should_stop());
218 wait_event_interruptible(
e8e28871 219 blkbk->pending_free_wq,
2e9977c2
KRW
220 !list_empty(&blkbk->pending_free) ||
221 kthread_should_stop());
4d05a28d
KRW
222
223 blkif->waiting_reqs = 0;
224 smp_mb(); /* clear flag *before* checking for work */
225
226 if (do_block_io_op(blkif))
227 blkif->waiting_reqs = 1;
4d05a28d
KRW
228
229 if (log_stats && time_after(jiffies, blkif->st_print))
230 print_stats(blkif);
231 }
232
233 if (log_stats)
234 print_stats(blkif);
235 if (debug_lvl)
236 printk(KERN_DEBUG "%s: exiting\n", current->comm);
237
238 blkif->xenblkd = NULL;
239 blkif_put(blkif);
240
241 return 0;
242}
243
1a95fe6e
KRW
244struct seg_buf {
245 unsigned long buf;
246 unsigned int nsec;
247};
b0aef179
KRW
248/*
249 * Unmap the grant references, and also remove the M2P over-rides
250 * used in the 'pending_req'.
251*/
252static void fast_flush_area(struct pending_req *req)
253{
254 struct gnttab_unmap_grant_ref unmap[BLKIF_MAX_SEGMENTS_PER_REQUEST];
255 unsigned int i, invcount = 0;
256 grant_handle_t handle;
257 int ret;
258
259 for (i = 0; i < req->nr_pages; i++) {
260 handle = pending_handle(req, i);
261 if (handle == BLKBACK_INVALID_HANDLE)
262 continue;
263 gnttab_set_unmap_op(&unmap[invcount], vaddr(req, i),
264 GNTMAP_host_map, handle);
265 pending_handle(req, i) = BLKBACK_INVALID_HANDLE;
266 invcount++;
267 }
268
269 ret = HYPERVISOR_grant_table_op(
270 GNTTABOP_unmap_grant_ref, unmap, invcount);
271 BUG_ON(ret);
272 /* Note, we use invcount, so nr->pages, so we can't index
273 * using vaddr(req, i).
274 */
275 for (i = 0; i < invcount; i++) {
276 ret = m2p_remove_override(
277 virt_to_page(unmap[i].host_addr), false);
278 if (ret) {
279 printk(KERN_ALERT "Failed to remove M2P override for " \
280 "%lx\n", (unsigned long)unmap[i].host_addr);
281 continue;
282 }
283 }
284}
1a95fe6e
KRW
285static int xen_blk_map_buf(struct blkif_request *req, struct pending_req *pending_req,
286 struct seg_buf seg[])
287{
288 struct gnttab_map_grant_ref map[BLKIF_MAX_SEGMENTS_PER_REQUEST];
289 int i;
290 int nseg = req->nr_segments;
291 int ret = 0;
292 /* Fill out preq.nr_sects with proper amount of sectors, and setup
293 * assign map[..] with the PFN of the page in our domain with the
294 * corresponding grant reference for each page.
295 */
296 for (i = 0; i < nseg; i++) {
297 uint32_t flags;
298
299 flags = GNTMAP_host_map;
300 if (pending_req->operation != BLKIF_OP_READ)
301 flags |= GNTMAP_readonly;
302 gnttab_set_map_op(&map[i], vaddr(pending_req, i), flags,
303 req->u.rw.seg[i].gref, pending_req->blkif->domid);
304 }
305
306 ret = HYPERVISOR_grant_table_op(GNTTABOP_map_grant_ref, map, nseg);
307 BUG_ON(ret);
308
309 /* Now swizzel the MFN in our domain with the MFN from the other domain
310 * so that when we access vaddr(pending_req,i) it has the contents of
311 * the page from the other domain.
312 */
313 for (i = 0; i < nseg; i++) {
314 if (unlikely(map[i].status != 0)) {
315 DPRINTK("invalid buffer -- could not remap it\n");
316 map[i].handle = BLKBACK_INVALID_HANDLE;
317 ret |= 1;
318 }
319
320 pending_handle(pending_req, i) = map[i].handle;
321
322 if (ret)
323 continue;
324
325 ret = m2p_add_override(PFN_DOWN(map[i].dev_bus_addr),
326 blkbk->pending_page(pending_req, i), false);
327 if (ret) {
328 printk(KERN_ALERT "Failed to install M2P override for"\
329 " %lx (ret: %d)\n", (unsigned long)
330 map[i].dev_bus_addr, ret);
331 /* We could switch over to GNTTABOP_copy */
332 continue;
333 }
334
335 seg[i].buf = map[i].dev_bus_addr |
336 (req->u.rw.seg[i].first_sect << 9);
337 }
338 return ret;
339}
340
a1397fa3
KRW
341/*
342 * Completion callback on the bio's. Called as bh->b_end_io()
4d05a28d
KRW
343 */
344
2e9977c2 345static void __end_block_io_op(struct pending_req *pending_req, int error)
4d05a28d
KRW
346{
347 /* An error fails the entire request. */
348 if ((pending_req->operation == BLKIF_OP_WRITE_BARRIER) &&
349 (error == -EOPNOTSUPP)) {
350 DPRINTK("blkback: write barrier op failed, not supported\n");
351 blkback_barrier(XBT_NIL, pending_req->blkif->be, 0);
352 pending_req->status = BLKIF_RSP_EOPNOTSUPP;
353 } else if (error) {
354 DPRINTK("Buffer not up-to-date at end of operation, "
355 "error=%d\n", error);
356 pending_req->status = BLKIF_RSP_ERROR;
357 }
358
a1397fa3
KRW
359 /* If all of the bio's have completed it is time to unmap
360 * the grant references associated with 'request' and provide
2e9977c2
KRW
361 * the proper response on the ring.
362 */
4d05a28d
KRW
363 if (atomic_dec_and_test(&pending_req->pendcnt)) {
364 fast_flush_area(pending_req);
365 make_response(pending_req->blkif, pending_req->id,
366 pending_req->operation, pending_req->status);
367 blkif_put(pending_req->blkif);
368 free_req(pending_req);
369 }
370}
371
a1397fa3
KRW
372/*
373 * bio callback.
374 */
88122933 375static void end_block_io_op(struct bio *bio, int error)
4d05a28d 376{
4d05a28d
KRW
377 __end_block_io_op(bio->bi_private, error);
378 bio_put(bio);
4d05a28d
KRW
379}
380
381
4d05a28d 382
a1397fa3
KRW
383/*
384 * Function to copy the from the ring buffer the 'struct blkif_request'
385 * (which has the sectors we want, number of them, grant references, etc),
386 * and transmute it to the block API to hand it over to the proper block disk.
4d05a28d 387 */
5489377c 388static int do_block_io_op(struct blkif_st *blkif)
4d05a28d 389{
88122933
JF
390 union blkif_back_rings *blk_rings = &blkif->blk_rings;
391 struct blkif_request req;
2e9977c2 392 struct pending_req *pending_req;
4d05a28d
KRW
393 RING_IDX rc, rp;
394 int more_to_do = 0;
395
396 rc = blk_rings->common.req_cons;
397 rp = blk_rings->common.sring->req_prod;
398 rmb(); /* Ensure we see queued requests up to 'rp'. */
399
400 while (rc != rp) {
401
402 if (RING_REQUEST_CONS_OVERFLOW(&blk_rings->common, rc))
403 break;
404
8270b45b 405 if (kthread_should_stop()) {
4d05a28d
KRW
406 more_to_do = 1;
407 break;
408 }
409
8270b45b
KF
410 pending_req = alloc_req();
411 if (NULL == pending_req) {
412 blkif->st_oo_req++;
4d05a28d
KRW
413 more_to_do = 1;
414 break;
415 }
416
417 switch (blkif->blk_protocol) {
418 case BLKIF_PROTOCOL_NATIVE:
419 memcpy(&req, RING_GET_REQUEST(&blk_rings->native, rc), sizeof(req));
420 break;
421 case BLKIF_PROTOCOL_X86_32:
422 blkif_get_x86_32_req(&req, RING_GET_REQUEST(&blk_rings->x86_32, rc));
423 break;
424 case BLKIF_PROTOCOL_X86_64:
425 blkif_get_x86_64_req(&req, RING_GET_REQUEST(&blk_rings->x86_64, rc));
426 break;
427 default:
428 BUG();
429 }
430 blk_rings->common.req_cons = ++rc; /* before make_response() */
431
432 /* Apply all sanity checks to /private copy/ of request. */
433 barrier();
434
435 switch (req.operation) {
436 case BLKIF_OP_READ:
437 blkif->st_rd_req++;
438 dispatch_rw_block_io(blkif, &req, pending_req);
439 break;
440 case BLKIF_OP_WRITE_BARRIER:
441 blkif->st_br_req++;
442 /* fall through */
443 case BLKIF_OP_WRITE:
444 blkif->st_wr_req++;
445 dispatch_rw_block_io(blkif, &req, pending_req);
446 break;
447 default:
448 /* A good sign something is wrong: sleep for a while to
449 * avoid excessive CPU consumption by a bad guest. */
450 msleep(1);
451 DPRINTK("error: unknown block io operation [%d]\n",
452 req.operation);
453 make_response(blkif, req.id, req.operation,
454 BLKIF_RSP_ERROR);
455 free_req(pending_req);
456 break;
457 }
458
459 /* Yield point for this unbounded loop. */
460 cond_resched();
461 }
462
463 return more_to_do;
464}
465
a1397fa3
KRW
466/*
467 * Transumation of the 'struct blkif_request' to a proper 'struct bio'
468 * and call the 'submit_bio' to pass it to the underlaying storage.
469 */
5489377c 470static void dispatch_rw_block_io(struct blkif_st *blkif,
88122933 471 struct blkif_request *req,
2e9977c2 472 struct pending_req *pending_req)
4d05a28d 473{
4d05a28d 474 struct phys_req preq;
1a95fe6e 475 struct seg_buf seg[BLKIF_MAX_SEGMENTS_PER_REQUEST];
4d05a28d
KRW
476 unsigned int nseg;
477 struct bio *bio = NULL;
77089926 478 struct bio *biolist[BLKIF_MAX_SEGMENTS_PER_REQUEST];
1a95fe6e 479 int i, nbio = 0;
4d05a28d 480 int operation;
0faa8cca
KRW
481 struct blk_plug plug;
482 struct request_queue *q;
4d05a28d
KRW
483
484 switch (req->operation) {
485 case BLKIF_OP_READ:
486 operation = READ;
487 break;
488 case BLKIF_OP_WRITE:
489 operation = WRITE;
490 break;
491 case BLKIF_OP_WRITE_BARRIER:
314146e5 492 operation = WRITE_BARRIER;
4d05a28d
KRW
493 break;
494 default:
495 operation = 0; /* make gcc happy */
496 BUG();
497 }
498
a1397fa3 499 /* Check that the number of segments is sane. */
4d05a28d 500 nseg = req->nr_segments;
314146e5 501 if (unlikely(nseg == 0 && operation != WRITE_BARRIER) ||
4d05a28d
KRW
502 unlikely(nseg > BLKIF_MAX_SEGMENTS_PER_REQUEST)) {
503 DPRINTK("Bad number of segments in request (%d)\n", nseg);
1a95fe6e 504 /* Haven't submitted any bio's yet. */
4d05a28d
KRW
505 goto fail_response;
506 }
507
508 preq.dev = req->handle;
c35950bf 509 preq.sector_number = req->u.rw.sector_number;
4d05a28d
KRW
510 preq.nr_sects = 0;
511
512 pending_req->blkif = blkif;
513 pending_req->id = req->id;
514 pending_req->operation = req->operation;
515 pending_req->status = BLKIF_RSP_OKAY;
516 pending_req->nr_pages = nseg;
4d05a28d 517 for (i = 0; i < nseg; i++) {
c35950bf
KRW
518 seg[i].nsec = req->u.rw.seg[i].last_sect -
519 req->u.rw.seg[i].first_sect + 1;
c35950bf
KRW
520 if ((req->u.rw.seg[i].last_sect >= (PAGE_SIZE >> 9)) ||
521 (req->u.rw.seg[i].last_sect < req->u.rw.seg[i].first_sect))
4d05a28d
KRW
522 goto fail_response;
523 preq.nr_sects += seg[i].nsec;
4d05a28d
KRW
524 }
525
1a95fe6e
KRW
526 if (vbd_translate(&preq, blkif, operation) != 0) {
527 DPRINTK("access denied: %s of [%llu,%llu] on dev=%04x\n",
528 operation == READ ? "read" : "write",
529 preq.sector_number,
530 preq.sector_number + preq.nr_sects, preq.dev);
531 goto fail_response;
4d05a28d 532 }
2e9977c2
KRW
533 /* If we have failed at this point, we need to undo the M2P override,
534 * set gnttab_set_unmap_op on all of the grant references and perform
535 * the hypercall to unmap the grants - that is all done in
536 * fast_flush_area.
537 */
1a95fe6e 538 if (xen_blk_map_buf(req, pending_req, seg))
4d05a28d
KRW
539 goto fail_flush;
540
77089926 541 /* This corresponding blkif_put is done in __end_block_io_op */
4d05a28d
KRW
542 blkif_get(blkif);
543
544 for (i = 0; i < nseg; i++) {
545 if (((int)preq.sector_number|(int)seg[i].nsec) &
05d43865 546 ((bdev_logical_block_size(preq.bdev) >> 9) - 1)) {
4d05a28d
KRW
547 DPRINTK("Misaligned I/O request from domain %d",
548 blkif->domid);
549 goto fail_put_bio;
550 }
551
552 while ((bio == NULL) ||
553 (bio_add_page(bio,
e8e28871 554 blkbk->pending_page(pending_req, i),
4d05a28d
KRW
555 seg[i].nsec << 9,
556 seg[i].buf & ~PAGE_MASK) == 0)) {
2e9977c2 557
77089926 558 bio = biolist[nbio++] = bio_alloc(GFP_KERNEL, nseg-i);
4d05a28d
KRW
559 if (unlikely(bio == NULL))
560 goto fail_put_bio;
561
562 bio->bi_bdev = preq.bdev;
563 bio->bi_private = pending_req;
564 bio->bi_end_io = end_block_io_op;
565 bio->bi_sector = preq.sector_number;
566 }
567
568 preq.sector_number += seg[i].nsec;
569 }
570
a1397fa3 571 /* This will be hit if the operation was a barrier. */
4d05a28d 572 if (!bio) {
314146e5 573 BUG_ON(operation != WRITE_BARRIER);
77089926 574 bio = biolist[nbio++] = bio_alloc(GFP_KERNEL, 0);
4d05a28d
KRW
575 if (unlikely(bio == NULL))
576 goto fail_put_bio;
577
578 bio->bi_bdev = preq.bdev;
579 bio->bi_private = pending_req;
580 bio->bi_end_io = end_block_io_op;
581 bio->bi_sector = -1;
582 }
583
77089926
KRW
584
585 /* We set it one so that the last submit_bio does not have to call
586 * atomic_inc.
587 */
588 atomic_set(&pending_req->pendcnt, nbio);
589
590 /* Get a reference count for the disk queue and start sending I/O */
591 blk_get_queue(q);
592 blk_start_plug(&plug);
593
594 for (i = 0; i < nbio; i++)
595 submit_bio(operation, biolist[i]);
596
597 blk_finish_plug(&plug);
598 /* Let the I/Os go.. */
599 blk_put_queue(q);
4d05a28d
KRW
600
601 if (operation == READ)
602 blkif->st_rd_sect += preq.nr_sects;
314146e5 603 else if (operation == WRITE || operation == WRITE_BARRIER)
4d05a28d
KRW
604 blkif->st_wr_sect += preq.nr_sects;
605
606 return;
607
608 fail_flush:
609 fast_flush_area(pending_req);
610 fail_response:
0faa8cca 611 /* Haven't submitted any bio's yet. */
4d05a28d
KRW
612 make_response(blkif, req->id, req->operation, BLKIF_RSP_ERROR);
613 free_req(pending_req);
614 msleep(1); /* back off a bit */
615 return;
616
617 fail_put_bio:
77089926
KRW
618 for (i = 0; i < (nbio-1); i++)
619 bio_put(biolist[i]);
4d05a28d 620 __end_block_io_op(pending_req, -EINVAL);
4d05a28d
KRW
621 msleep(1); /* back off a bit */
622 return;
623}
624
625
626
a1397fa3
KRW
627/*
628 * Put a response on the ring on how the operation fared.
4d05a28d 629 */
5489377c 630static void make_response(struct blkif_st *blkif, u64 id,
4d05a28d
KRW
631 unsigned short op, int st)
632{
88122933 633 struct blkif_response resp;
4d05a28d 634 unsigned long flags;
88122933 635 union blkif_back_rings *blk_rings = &blkif->blk_rings;
4d05a28d
KRW
636 int more_to_do = 0;
637 int notify;
638
639 resp.id = id;
640 resp.operation = op;
641 resp.status = st;
642
643 spin_lock_irqsave(&blkif->blk_ring_lock, flags);
644 /* Place on the response ring for the relevant domain. */
645 switch (blkif->blk_protocol) {
646 case BLKIF_PROTOCOL_NATIVE:
647 memcpy(RING_GET_RESPONSE(&blk_rings->native, blk_rings->native.rsp_prod_pvt),
648 &resp, sizeof(resp));
649 break;
650 case BLKIF_PROTOCOL_X86_32:
651 memcpy(RING_GET_RESPONSE(&blk_rings->x86_32, blk_rings->x86_32.rsp_prod_pvt),
652 &resp, sizeof(resp));
653 break;
654 case BLKIF_PROTOCOL_X86_64:
655 memcpy(RING_GET_RESPONSE(&blk_rings->x86_64, blk_rings->x86_64.rsp_prod_pvt),
656 &resp, sizeof(resp));
657 break;
658 default:
659 BUG();
660 }
661 blk_rings->common.rsp_prod_pvt++;
662 RING_PUSH_RESPONSES_AND_CHECK_NOTIFY(&blk_rings->common, notify);
663 if (blk_rings->common.rsp_prod_pvt == blk_rings->common.req_cons) {
664 /*
665 * Tail check for pending requests. Allows frontend to avoid
666 * notifications if requests are already in flight (lower
667 * overheads and promotes batching).
668 */
669 RING_FINAL_CHECK_FOR_REQUESTS(&blk_rings->common, more_to_do);
670
671 } else if (RING_HAS_UNCONSUMED_REQUESTS(&blk_rings->common)) {
672 more_to_do = 1;
673 }
674
675 spin_unlock_irqrestore(&blkif->blk_ring_lock, flags);
676
677 if (more_to_do)
678 blkif_notify_work(blkif);
679 if (notify)
680 notify_remote_via_irq(blkif->irq);
681}
682
683static int __init blkif_init(void)
684{
685 int i, mmap_pages;
8770b268 686 int rc = 0;
4d05a28d 687
88122933 688 if (!xen_pv_domain())
4d05a28d
KRW
689 return -ENODEV;
690
2e9977c2 691 blkbk = kzalloc(sizeof(struct xen_blkbk), GFP_KERNEL);
e8e28871
KRW
692 if (!blkbk) {
693 printk(KERN_ALERT "%s: out of memory!\n", __func__);
694 return -ENOMEM;
695 }
696
4d05a28d
KRW
697 mmap_pages = blkif_reqs * BLKIF_MAX_SEGMENTS_PER_REQUEST;
698
e8e28871 699 blkbk->pending_reqs = kmalloc(sizeof(blkbk->pending_reqs[0]) *
4d05a28d 700 blkif_reqs, GFP_KERNEL);
a742b02c
KRW
701 blkbk->pending_grant_handles = kzalloc(sizeof(blkbk->pending_grant_handles[0]) *
702 mmap_pages, GFP_KERNEL);
703 blkbk->pending_pages = kzalloc(sizeof(blkbk->pending_pages[0]) *
704 mmap_pages, GFP_KERNEL);
4d05a28d 705
2e9977c2
KRW
706 if (!blkbk->pending_reqs || !blkbk->pending_grant_handles ||
707 !blkbk->pending_pages) {
8770b268 708 rc = -ENOMEM;
4d05a28d 709 goto out_of_memory;
8770b268 710 }
4d05a28d 711
464fb419 712 for (i = 0; i < mmap_pages; i++) {
e8e28871 713 blkbk->pending_grant_handles[i] = BLKBACK_INVALID_HANDLE;
a742b02c 714 blkbk->pending_pages[i] = alloc_page(GFP_KERNEL);
464fb419
KRW
715 if (blkbk->pending_pages[i] == NULL) {
716 rc = -ENOMEM;
717 goto out_of_memory;
718 }
719 }
8770b268
KRW
720 rc = blkif_interface_init();
721 if (rc)
722 goto failed_init;
4d05a28d 723
e8e28871
KRW
724 memset(blkbk->pending_reqs, 0, sizeof(blkbk->pending_reqs));
725
726 INIT_LIST_HEAD(&blkbk->pending_free);
727 spin_lock_init(&blkbk->pending_free_lock);
728 init_waitqueue_head(&blkbk->pending_free_wq);
4d05a28d
KRW
729
730 for (i = 0; i < blkif_reqs; i++)
2e9977c2
KRW
731 list_add_tail(&blkbk->pending_reqs[i].free_list,
732 &blkbk->pending_free);
4d05a28d 733
8770b268
KRW
734 rc = blkif_xenbus_init();
735 if (rc)
736 goto failed_init;
4d05a28d
KRW
737
738 return 0;
739
740 out_of_memory:
8770b268
KRW
741 printk(KERN_ERR "%s: out of memory\n", __func__);
742 failed_init:
e8e28871 743 kfree(blkbk->pending_reqs);
a742b02c 744 kfree(blkbk->pending_grant_handles);
464fb419
KRW
745 for (i = 0; i < mmap_pages; i++) {
746 if (blkbk->pending_pages[i])
747 __free_page(blkbk->pending_pages[i]);
748 }
a742b02c
KRW
749 kfree(blkbk->pending_pages);
750 kfree(blkbk);
e8e28871 751 blkbk = NULL;
8770b268 752 return rc;
4d05a28d
KRW
753}
754
755module_init(blkif_init);
756
757MODULE_LICENSE("Dual BSD/GPL");
This page took 0.090878 seconds and 5 git commands to generate.