Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Copyright (C) 2001, 2002 Sistina Software (UK) Limited. | |
784aae73 | 3 | * Copyright (C) 2004-2008 Red Hat, Inc. All rights reserved. |
1da177e4 LT |
4 | * |
5 | * This file is released under the GPL. | |
6 | */ | |
7 | ||
8 | #include "dm.h" | |
51e5b2bd | 9 | #include "dm-uevent.h" |
1da177e4 LT |
10 | |
11 | #include <linux/init.h> | |
12 | #include <linux/module.h> | |
48c9c27b | 13 | #include <linux/mutex.h> |
1da177e4 LT |
14 | #include <linux/moduleparam.h> |
15 | #include <linux/blkpg.h> | |
16 | #include <linux/bio.h> | |
1da177e4 LT |
17 | #include <linux/mempool.h> |
18 | #include <linux/slab.h> | |
19 | #include <linux/idr.h> | |
3ac51e74 | 20 | #include <linux/hdreg.h> |
3f77316d | 21 | #include <linux/delay.h> |
ffcc3936 | 22 | #include <linux/wait.h> |
2eb6e1e3 | 23 | #include <linux/kthread.h> |
0ce65797 | 24 | #include <linux/ktime.h> |
de3ec86d | 25 | #include <linux/elevator.h> /* for rq_end_sector() */ |
bfebd1cd | 26 | #include <linux/blk-mq.h> |
55782138 LZ |
27 | |
28 | #include <trace/events/block.h> | |
1da177e4 | 29 | |
72d94861 AK |
30 | #define DM_MSG_PREFIX "core" |
31 | ||
71a16736 NK |
32 | #ifdef CONFIG_PRINTK |
33 | /* | |
34 | * ratelimit state to be used in DMXXX_LIMIT(). | |
35 | */ | |
36 | DEFINE_RATELIMIT_STATE(dm_ratelimit_state, | |
37 | DEFAULT_RATELIMIT_INTERVAL, | |
38 | DEFAULT_RATELIMIT_BURST); | |
39 | EXPORT_SYMBOL(dm_ratelimit_state); | |
40 | #endif | |
41 | ||
60935eb2 MB |
42 | /* |
43 | * Cookies are numeric values sent with CHANGE and REMOVE | |
44 | * uevents while resuming, removing or renaming the device. | |
45 | */ | |
46 | #define DM_COOKIE_ENV_VAR_NAME "DM_COOKIE" | |
47 | #define DM_COOKIE_LENGTH 24 | |
48 | ||
1da177e4 LT |
49 | static const char *_name = DM_NAME; |
50 | ||
51 | static unsigned int major = 0; | |
52 | static unsigned int _major = 0; | |
53 | ||
d15b774c AK |
54 | static DEFINE_IDR(_minor_idr); |
55 | ||
f32c10b0 | 56 | static DEFINE_SPINLOCK(_minor_lock); |
2c140a24 MP |
57 | |
58 | static void do_deferred_remove(struct work_struct *w); | |
59 | ||
60 | static DECLARE_WORK(deferred_remove_work, do_deferred_remove); | |
61 | ||
acfe0ad7 MP |
62 | static struct workqueue_struct *deferred_remove_workqueue; |
63 | ||
1da177e4 | 64 | /* |
8fbf26ad | 65 | * For bio-based dm. |
1da177e4 LT |
66 | * One of these is allocated per bio. |
67 | */ | |
68 | struct dm_io { | |
69 | struct mapped_device *md; | |
70 | int error; | |
1da177e4 | 71 | atomic_t io_count; |
6ae2fa67 | 72 | struct bio *bio; |
3eaf840e | 73 | unsigned long start_time; |
f88fb981 | 74 | spinlock_t endio_lock; |
fd2ed4d2 | 75 | struct dm_stats_aux stats_aux; |
1da177e4 LT |
76 | }; |
77 | ||
8fbf26ad KU |
78 | /* |
79 | * For request-based dm. | |
80 | * One of these is allocated per request. | |
81 | */ | |
82 | struct dm_rq_target_io { | |
83 | struct mapped_device *md; | |
84 | struct dm_target *ti; | |
1ae49ea2 | 85 | struct request *orig, *clone; |
2eb6e1e3 | 86 | struct kthread_work work; |
8fbf26ad KU |
87 | int error; |
88 | union map_info info; | |
e262f347 MP |
89 | struct dm_stats_aux stats_aux; |
90 | unsigned long duration_jiffies; | |
91 | unsigned n_sectors; | |
8fbf26ad KU |
92 | }; |
93 | ||
94 | /* | |
94818742 KO |
95 | * For request-based dm - the bio clones we allocate are embedded in these |
96 | * structs. | |
97 | * | |
98 | * We allocate these with bio_alloc_bioset, using the front_pad parameter when | |
99 | * the bioset is created - this means the bio has to come at the end of the | |
100 | * struct. | |
8fbf26ad KU |
101 | */ |
102 | struct dm_rq_clone_bio_info { | |
103 | struct bio *orig; | |
cec47e3d | 104 | struct dm_rq_target_io *tio; |
94818742 | 105 | struct bio clone; |
8fbf26ad KU |
106 | }; |
107 | ||
cec47e3d KU |
108 | union map_info *dm_get_rq_mapinfo(struct request *rq) |
109 | { | |
110 | if (rq && rq->end_io_data) | |
111 | return &((struct dm_rq_target_io *)rq->end_io_data)->info; | |
112 | return NULL; | |
113 | } | |
114 | EXPORT_SYMBOL_GPL(dm_get_rq_mapinfo); | |
115 | ||
ba61fdd1 JM |
116 | #define MINOR_ALLOCED ((void *)-1) |
117 | ||
1da177e4 LT |
118 | /* |
119 | * Bits for the md->flags field. | |
120 | */ | |
1eb787ec | 121 | #define DMF_BLOCK_IO_FOR_SUSPEND 0 |
1da177e4 | 122 | #define DMF_SUSPENDED 1 |
aa8d7c2f | 123 | #define DMF_FROZEN 2 |
fba9f90e | 124 | #define DMF_FREEING 3 |
5c6bd75d | 125 | #define DMF_DELETING 4 |
2e93ccc1 | 126 | #define DMF_NOFLUSH_SUSPENDING 5 |
d5b9dd04 | 127 | #define DMF_MERGE_IS_OPTIONAL 6 |
2c140a24 | 128 | #define DMF_DEFERRED_REMOVE 7 |
ffcc3936 | 129 | #define DMF_SUSPENDED_INTERNALLY 8 |
1da177e4 | 130 | |
83d5e5b0 MP |
131 | /* |
132 | * A dummy definition to make RCU happy. | |
133 | * struct dm_table should never be dereferenced in this file. | |
134 | */ | |
135 | struct dm_table { | |
136 | int undefined__; | |
137 | }; | |
138 | ||
304f3f6a MB |
139 | /* |
140 | * Work processed by per-device workqueue. | |
141 | */ | |
1da177e4 | 142 | struct mapped_device { |
83d5e5b0 | 143 | struct srcu_struct io_barrier; |
e61290a4 | 144 | struct mutex suspend_lock; |
1da177e4 | 145 | atomic_t holders; |
5c6bd75d | 146 | atomic_t open_count; |
1da177e4 | 147 | |
2a7faeb1 MP |
148 | /* |
149 | * The current mapping. | |
150 | * Use dm_get_live_table{_fast} or take suspend_lock for | |
151 | * dereference. | |
152 | */ | |
6fa99520 | 153 | struct dm_table __rcu *map; |
2a7faeb1 | 154 | |
86f1152b BM |
155 | struct list_head table_devices; |
156 | struct mutex table_devices_lock; | |
157 | ||
1da177e4 LT |
158 | unsigned long flags; |
159 | ||
165125e1 | 160 | struct request_queue *queue; |
a5664dad | 161 | unsigned type; |
4a0b4ddf | 162 | /* Protect queue and type against concurrent access. */ |
a5664dad MS |
163 | struct mutex type_lock; |
164 | ||
36a0456f AK |
165 | struct target_type *immutable_target_type; |
166 | ||
1da177e4 | 167 | struct gendisk *disk; |
7e51f257 | 168 | char name[16]; |
1da177e4 LT |
169 | |
170 | void *interface_ptr; | |
171 | ||
172 | /* | |
173 | * A list of ios that arrived while we were suspended. | |
174 | */ | |
316d315b | 175 | atomic_t pending[2]; |
1da177e4 | 176 | wait_queue_head_t wait; |
53d5914f | 177 | struct work_struct work; |
74859364 | 178 | struct bio_list deferred; |
022c2611 | 179 | spinlock_t deferred_lock; |
1da177e4 | 180 | |
af7e466a | 181 | /* |
29e4013d | 182 | * Processing queue (flush) |
304f3f6a MB |
183 | */ |
184 | struct workqueue_struct *wq; | |
185 | ||
1da177e4 LT |
186 | /* |
187 | * io objects are allocated from here. | |
188 | */ | |
189 | mempool_t *io_pool; | |
1ae49ea2 | 190 | mempool_t *rq_pool; |
1da177e4 | 191 | |
9faf400f SB |
192 | struct bio_set *bs; |
193 | ||
1da177e4 LT |
194 | /* |
195 | * Event handling. | |
196 | */ | |
197 | atomic_t event_nr; | |
198 | wait_queue_head_t eventq; | |
7a8c3d3b MA |
199 | atomic_t uevent_seq; |
200 | struct list_head uevent_list; | |
201 | spinlock_t uevent_lock; /* Protect access to uevent_list */ | |
1da177e4 LT |
202 | |
203 | /* | |
204 | * freeze/thaw support require holding onto a super block | |
205 | */ | |
206 | struct super_block *frozen_sb; | |
db8fef4f | 207 | struct block_device *bdev; |
3ac51e74 DW |
208 | |
209 | /* forced geometry settings */ | |
210 | struct hd_geometry geometry; | |
784aae73 | 211 | |
2995fa78 MP |
212 | /* kobject and completion */ |
213 | struct dm_kobject_holder kobj_holder; | |
be35f486 | 214 | |
d87f4c14 TH |
215 | /* zero-length flush that will be cloned and submitted to targets */ |
216 | struct bio flush_bio; | |
fd2ed4d2 | 217 | |
96b26c8c MP |
218 | /* the number of internal suspends */ |
219 | unsigned internal_suspend_count; | |
220 | ||
fd2ed4d2 | 221 | struct dm_stats stats; |
2eb6e1e3 KB |
222 | |
223 | struct kthread_worker kworker; | |
224 | struct task_struct *kworker_task; | |
de3ec86d MS |
225 | |
226 | /* for request-based merge heuristic in dm_request_fn() */ | |
0ce65797 | 227 | unsigned seq_rq_merge_deadline_usecs; |
de3ec86d | 228 | int last_rq_rw; |
0ce65797 MS |
229 | sector_t last_rq_pos; |
230 | ktime_t last_rq_start_time; | |
bfebd1cd MS |
231 | |
232 | /* for blk-mq request-based DM support */ | |
233 | struct blk_mq_tag_set tag_set; | |
17e149b8 | 234 | bool use_blk_mq; |
1da177e4 LT |
235 | }; |
236 | ||
17e149b8 MS |
237 | #ifdef CONFIG_DM_MQ_DEFAULT |
238 | static bool use_blk_mq = true; | |
239 | #else | |
240 | static bool use_blk_mq = false; | |
241 | #endif | |
242 | ||
243 | bool dm_use_blk_mq(struct mapped_device *md) | |
244 | { | |
245 | return md->use_blk_mq; | |
246 | } | |
247 | ||
e6ee8c0b KU |
248 | /* |
249 | * For mempools pre-allocation at the table loading time. | |
250 | */ | |
251 | struct dm_md_mempools { | |
252 | mempool_t *io_pool; | |
1ae49ea2 | 253 | mempool_t *rq_pool; |
e6ee8c0b KU |
254 | struct bio_set *bs; |
255 | }; | |
256 | ||
86f1152b BM |
257 | struct table_device { |
258 | struct list_head list; | |
259 | atomic_t count; | |
260 | struct dm_dev dm_dev; | |
261 | }; | |
262 | ||
6cfa5857 MS |
263 | #define RESERVED_BIO_BASED_IOS 16 |
264 | #define RESERVED_REQUEST_BASED_IOS 256 | |
f4790826 | 265 | #define RESERVED_MAX_IOS 1024 |
e18b890b | 266 | static struct kmem_cache *_io_cache; |
8fbf26ad | 267 | static struct kmem_cache *_rq_tio_cache; |
1ae49ea2 | 268 | static struct kmem_cache *_rq_cache; |
94818742 | 269 | |
e8603136 MS |
270 | /* |
271 | * Bio-based DM's mempools' reserved IOs set by the user. | |
272 | */ | |
273 | static unsigned reserved_bio_based_ios = RESERVED_BIO_BASED_IOS; | |
274 | ||
f4790826 MS |
275 | /* |
276 | * Request-based DM's mempools' reserved IOs set by the user. | |
277 | */ | |
278 | static unsigned reserved_rq_based_ios = RESERVED_REQUEST_BASED_IOS; | |
279 | ||
09c2d531 | 280 | static unsigned __dm_get_module_param(unsigned *module_param, |
f4790826 MS |
281 | unsigned def, unsigned max) |
282 | { | |
09c2d531 MS |
283 | unsigned param = ACCESS_ONCE(*module_param); |
284 | unsigned modified_param = 0; | |
f4790826 | 285 | |
09c2d531 MS |
286 | if (!param) |
287 | modified_param = def; | |
288 | else if (param > max) | |
289 | modified_param = max; | |
f4790826 | 290 | |
09c2d531 MS |
291 | if (modified_param) { |
292 | (void)cmpxchg(module_param, param, modified_param); | |
293 | param = modified_param; | |
f4790826 MS |
294 | } |
295 | ||
09c2d531 | 296 | return param; |
f4790826 MS |
297 | } |
298 | ||
e8603136 MS |
299 | unsigned dm_get_reserved_bio_based_ios(void) |
300 | { | |
09c2d531 | 301 | return __dm_get_module_param(&reserved_bio_based_ios, |
e8603136 MS |
302 | RESERVED_BIO_BASED_IOS, RESERVED_MAX_IOS); |
303 | } | |
304 | EXPORT_SYMBOL_GPL(dm_get_reserved_bio_based_ios); | |
305 | ||
f4790826 MS |
306 | unsigned dm_get_reserved_rq_based_ios(void) |
307 | { | |
09c2d531 | 308 | return __dm_get_module_param(&reserved_rq_based_ios, |
f4790826 MS |
309 | RESERVED_REQUEST_BASED_IOS, RESERVED_MAX_IOS); |
310 | } | |
311 | EXPORT_SYMBOL_GPL(dm_get_reserved_rq_based_ios); | |
312 | ||
1da177e4 LT |
313 | static int __init local_init(void) |
314 | { | |
51157b4a | 315 | int r = -ENOMEM; |
1da177e4 | 316 | |
1da177e4 | 317 | /* allocate a slab for the dm_ios */ |
028867ac | 318 | _io_cache = KMEM_CACHE(dm_io, 0); |
1da177e4 | 319 | if (!_io_cache) |
51157b4a | 320 | return r; |
1da177e4 | 321 | |
8fbf26ad KU |
322 | _rq_tio_cache = KMEM_CACHE(dm_rq_target_io, 0); |
323 | if (!_rq_tio_cache) | |
dba14160 | 324 | goto out_free_io_cache; |
8fbf26ad | 325 | |
1ae49ea2 MS |
326 | _rq_cache = kmem_cache_create("dm_clone_request", sizeof(struct request), |
327 | __alignof__(struct request), 0, NULL); | |
328 | if (!_rq_cache) | |
329 | goto out_free_rq_tio_cache; | |
330 | ||
51e5b2bd | 331 | r = dm_uevent_init(); |
51157b4a | 332 | if (r) |
1ae49ea2 | 333 | goto out_free_rq_cache; |
51e5b2bd | 334 | |
acfe0ad7 MP |
335 | deferred_remove_workqueue = alloc_workqueue("kdmremove", WQ_UNBOUND, 1); |
336 | if (!deferred_remove_workqueue) { | |
337 | r = -ENOMEM; | |
338 | goto out_uevent_exit; | |
339 | } | |
340 | ||
1da177e4 LT |
341 | _major = major; |
342 | r = register_blkdev(_major, _name); | |
51157b4a | 343 | if (r < 0) |
acfe0ad7 | 344 | goto out_free_workqueue; |
1da177e4 LT |
345 | |
346 | if (!_major) | |
347 | _major = r; | |
348 | ||
349 | return 0; | |
51157b4a | 350 | |
acfe0ad7 MP |
351 | out_free_workqueue: |
352 | destroy_workqueue(deferred_remove_workqueue); | |
51157b4a KU |
353 | out_uevent_exit: |
354 | dm_uevent_exit(); | |
1ae49ea2 MS |
355 | out_free_rq_cache: |
356 | kmem_cache_destroy(_rq_cache); | |
8fbf26ad KU |
357 | out_free_rq_tio_cache: |
358 | kmem_cache_destroy(_rq_tio_cache); | |
51157b4a KU |
359 | out_free_io_cache: |
360 | kmem_cache_destroy(_io_cache); | |
361 | ||
362 | return r; | |
1da177e4 LT |
363 | } |
364 | ||
365 | static void local_exit(void) | |
366 | { | |
2c140a24 | 367 | flush_scheduled_work(); |
acfe0ad7 | 368 | destroy_workqueue(deferred_remove_workqueue); |
2c140a24 | 369 | |
1ae49ea2 | 370 | kmem_cache_destroy(_rq_cache); |
8fbf26ad | 371 | kmem_cache_destroy(_rq_tio_cache); |
1da177e4 | 372 | kmem_cache_destroy(_io_cache); |
00d59405 | 373 | unregister_blkdev(_major, _name); |
51e5b2bd | 374 | dm_uevent_exit(); |
1da177e4 LT |
375 | |
376 | _major = 0; | |
377 | ||
378 | DMINFO("cleaned up"); | |
379 | } | |
380 | ||
b9249e55 | 381 | static int (*_inits[])(void) __initdata = { |
1da177e4 LT |
382 | local_init, |
383 | dm_target_init, | |
384 | dm_linear_init, | |
385 | dm_stripe_init, | |
952b3557 | 386 | dm_io_init, |
945fa4d2 | 387 | dm_kcopyd_init, |
1da177e4 | 388 | dm_interface_init, |
fd2ed4d2 | 389 | dm_statistics_init, |
1da177e4 LT |
390 | }; |
391 | ||
b9249e55 | 392 | static void (*_exits[])(void) = { |
1da177e4 LT |
393 | local_exit, |
394 | dm_target_exit, | |
395 | dm_linear_exit, | |
396 | dm_stripe_exit, | |
952b3557 | 397 | dm_io_exit, |
945fa4d2 | 398 | dm_kcopyd_exit, |
1da177e4 | 399 | dm_interface_exit, |
fd2ed4d2 | 400 | dm_statistics_exit, |
1da177e4 LT |
401 | }; |
402 | ||
403 | static int __init dm_init(void) | |
404 | { | |
405 | const int count = ARRAY_SIZE(_inits); | |
406 | ||
407 | int r, i; | |
408 | ||
409 | for (i = 0; i < count; i++) { | |
410 | r = _inits[i](); | |
411 | if (r) | |
412 | goto bad; | |
413 | } | |
414 | ||
415 | return 0; | |
416 | ||
417 | bad: | |
418 | while (i--) | |
419 | _exits[i](); | |
420 | ||
421 | return r; | |
422 | } | |
423 | ||
424 | static void __exit dm_exit(void) | |
425 | { | |
426 | int i = ARRAY_SIZE(_exits); | |
427 | ||
428 | while (i--) | |
429 | _exits[i](); | |
d15b774c AK |
430 | |
431 | /* | |
432 | * Should be empty by this point. | |
433 | */ | |
d15b774c | 434 | idr_destroy(&_minor_idr); |
1da177e4 LT |
435 | } |
436 | ||
437 | /* | |
438 | * Block device functions | |
439 | */ | |
432a212c MA |
440 | int dm_deleting_md(struct mapped_device *md) |
441 | { | |
442 | return test_bit(DMF_DELETING, &md->flags); | |
443 | } | |
444 | ||
fe5f9f2c | 445 | static int dm_blk_open(struct block_device *bdev, fmode_t mode) |
1da177e4 LT |
446 | { |
447 | struct mapped_device *md; | |
448 | ||
fba9f90e JM |
449 | spin_lock(&_minor_lock); |
450 | ||
fe5f9f2c | 451 | md = bdev->bd_disk->private_data; |
fba9f90e JM |
452 | if (!md) |
453 | goto out; | |
454 | ||
5c6bd75d | 455 | if (test_bit(DMF_FREEING, &md->flags) || |
432a212c | 456 | dm_deleting_md(md)) { |
fba9f90e JM |
457 | md = NULL; |
458 | goto out; | |
459 | } | |
460 | ||
1da177e4 | 461 | dm_get(md); |
5c6bd75d | 462 | atomic_inc(&md->open_count); |
fba9f90e JM |
463 | out: |
464 | spin_unlock(&_minor_lock); | |
465 | ||
466 | return md ? 0 : -ENXIO; | |
1da177e4 LT |
467 | } |
468 | ||
db2a144b | 469 | static void dm_blk_close(struct gendisk *disk, fmode_t mode) |
1da177e4 | 470 | { |
63a4f065 | 471 | struct mapped_device *md; |
6e9624b8 | 472 | |
4a1aeb98 MB |
473 | spin_lock(&_minor_lock); |
474 | ||
63a4f065 MS |
475 | md = disk->private_data; |
476 | if (WARN_ON(!md)) | |
477 | goto out; | |
478 | ||
2c140a24 MP |
479 | if (atomic_dec_and_test(&md->open_count) && |
480 | (test_bit(DMF_DEFERRED_REMOVE, &md->flags))) | |
acfe0ad7 | 481 | queue_work(deferred_remove_workqueue, &deferred_remove_work); |
2c140a24 | 482 | |
1da177e4 | 483 | dm_put(md); |
63a4f065 | 484 | out: |
4a1aeb98 | 485 | spin_unlock(&_minor_lock); |
1da177e4 LT |
486 | } |
487 | ||
5c6bd75d AK |
488 | int dm_open_count(struct mapped_device *md) |
489 | { | |
490 | return atomic_read(&md->open_count); | |
491 | } | |
492 | ||
493 | /* | |
494 | * Guarantees nothing is using the device before it's deleted. | |
495 | */ | |
2c140a24 | 496 | int dm_lock_for_deletion(struct mapped_device *md, bool mark_deferred, bool only_deferred) |
5c6bd75d AK |
497 | { |
498 | int r = 0; | |
499 | ||
500 | spin_lock(&_minor_lock); | |
501 | ||
2c140a24 | 502 | if (dm_open_count(md)) { |
5c6bd75d | 503 | r = -EBUSY; |
2c140a24 MP |
504 | if (mark_deferred) |
505 | set_bit(DMF_DEFERRED_REMOVE, &md->flags); | |
506 | } else if (only_deferred && !test_bit(DMF_DEFERRED_REMOVE, &md->flags)) | |
507 | r = -EEXIST; | |
5c6bd75d AK |
508 | else |
509 | set_bit(DMF_DELETING, &md->flags); | |
510 | ||
511 | spin_unlock(&_minor_lock); | |
512 | ||
513 | return r; | |
514 | } | |
515 | ||
2c140a24 MP |
516 | int dm_cancel_deferred_remove(struct mapped_device *md) |
517 | { | |
518 | int r = 0; | |
519 | ||
520 | spin_lock(&_minor_lock); | |
521 | ||
522 | if (test_bit(DMF_DELETING, &md->flags)) | |
523 | r = -EBUSY; | |
524 | else | |
525 | clear_bit(DMF_DEFERRED_REMOVE, &md->flags); | |
526 | ||
527 | spin_unlock(&_minor_lock); | |
528 | ||
529 | return r; | |
530 | } | |
531 | ||
532 | static void do_deferred_remove(struct work_struct *w) | |
533 | { | |
534 | dm_deferred_remove(); | |
535 | } | |
536 | ||
fd2ed4d2 MP |
537 | sector_t dm_get_size(struct mapped_device *md) |
538 | { | |
539 | return get_capacity(md->disk); | |
540 | } | |
541 | ||
9974fa2c MS |
542 | struct request_queue *dm_get_md_queue(struct mapped_device *md) |
543 | { | |
544 | return md->queue; | |
545 | } | |
546 | ||
fd2ed4d2 MP |
547 | struct dm_stats *dm_get_stats(struct mapped_device *md) |
548 | { | |
549 | return &md->stats; | |
550 | } | |
551 | ||
3ac51e74 DW |
552 | static int dm_blk_getgeo(struct block_device *bdev, struct hd_geometry *geo) |
553 | { | |
554 | struct mapped_device *md = bdev->bd_disk->private_data; | |
555 | ||
556 | return dm_get_geometry(md, geo); | |
557 | } | |
558 | ||
fe5f9f2c | 559 | static int dm_blk_ioctl(struct block_device *bdev, fmode_t mode, |
aa129a22 MB |
560 | unsigned int cmd, unsigned long arg) |
561 | { | |
fe5f9f2c | 562 | struct mapped_device *md = bdev->bd_disk->private_data; |
83d5e5b0 | 563 | int srcu_idx; |
6c182cd8 | 564 | struct dm_table *map; |
aa129a22 MB |
565 | struct dm_target *tgt; |
566 | int r = -ENOTTY; | |
567 | ||
6c182cd8 | 568 | retry: |
83d5e5b0 MP |
569 | map = dm_get_live_table(md, &srcu_idx); |
570 | ||
aa129a22 MB |
571 | if (!map || !dm_table_get_size(map)) |
572 | goto out; | |
573 | ||
574 | /* We only support devices that have a single target */ | |
575 | if (dm_table_get_num_targets(map) != 1) | |
576 | goto out; | |
577 | ||
578 | tgt = dm_table_get_target(map, 0); | |
4d341d82 MS |
579 | if (!tgt->type->ioctl) |
580 | goto out; | |
aa129a22 | 581 | |
4f186f8b | 582 | if (dm_suspended_md(md)) { |
aa129a22 MB |
583 | r = -EAGAIN; |
584 | goto out; | |
585 | } | |
586 | ||
4d341d82 | 587 | r = tgt->type->ioctl(tgt, cmd, arg); |
aa129a22 MB |
588 | |
589 | out: | |
83d5e5b0 | 590 | dm_put_live_table(md, srcu_idx); |
aa129a22 | 591 | |
6c182cd8 HR |
592 | if (r == -ENOTCONN) { |
593 | msleep(10); | |
594 | goto retry; | |
595 | } | |
596 | ||
aa129a22 MB |
597 | return r; |
598 | } | |
599 | ||
028867ac | 600 | static struct dm_io *alloc_io(struct mapped_device *md) |
1da177e4 LT |
601 | { |
602 | return mempool_alloc(md->io_pool, GFP_NOIO); | |
603 | } | |
604 | ||
028867ac | 605 | static void free_io(struct mapped_device *md, struct dm_io *io) |
1da177e4 LT |
606 | { |
607 | mempool_free(io, md->io_pool); | |
608 | } | |
609 | ||
028867ac | 610 | static void free_tio(struct mapped_device *md, struct dm_target_io *tio) |
1da177e4 | 611 | { |
dba14160 | 612 | bio_put(&tio->clone); |
1da177e4 LT |
613 | } |
614 | ||
08885643 KU |
615 | static struct dm_rq_target_io *alloc_rq_tio(struct mapped_device *md, |
616 | gfp_t gfp_mask) | |
cec47e3d | 617 | { |
5f015204 | 618 | return mempool_alloc(md->io_pool, gfp_mask); |
cec47e3d KU |
619 | } |
620 | ||
621 | static void free_rq_tio(struct dm_rq_target_io *tio) | |
622 | { | |
5f015204 | 623 | mempool_free(tio, tio->md->io_pool); |
cec47e3d KU |
624 | } |
625 | ||
1ae49ea2 MS |
626 | static struct request *alloc_clone_request(struct mapped_device *md, |
627 | gfp_t gfp_mask) | |
628 | { | |
629 | return mempool_alloc(md->rq_pool, gfp_mask); | |
630 | } | |
631 | ||
632 | static void free_clone_request(struct mapped_device *md, struct request *rq) | |
633 | { | |
634 | mempool_free(rq, md->rq_pool); | |
635 | } | |
636 | ||
90abb8c4 KU |
637 | static int md_in_flight(struct mapped_device *md) |
638 | { | |
639 | return atomic_read(&md->pending[READ]) + | |
640 | atomic_read(&md->pending[WRITE]); | |
641 | } | |
642 | ||
3eaf840e JNN |
643 | static void start_io_acct(struct dm_io *io) |
644 | { | |
645 | struct mapped_device *md = io->md; | |
fd2ed4d2 | 646 | struct bio *bio = io->bio; |
c9959059 | 647 | int cpu; |
fd2ed4d2 | 648 | int rw = bio_data_dir(bio); |
3eaf840e JNN |
649 | |
650 | io->start_time = jiffies; | |
651 | ||
074a7aca TH |
652 | cpu = part_stat_lock(); |
653 | part_round_stats(cpu, &dm_disk(md)->part0); | |
654 | part_stat_unlock(); | |
1e9bb880 SL |
655 | atomic_set(&dm_disk(md)->part0.in_flight[rw], |
656 | atomic_inc_return(&md->pending[rw])); | |
fd2ed4d2 MP |
657 | |
658 | if (unlikely(dm_stats_used(&md->stats))) | |
4f024f37 | 659 | dm_stats_account_io(&md->stats, bio->bi_rw, bio->bi_iter.bi_sector, |
fd2ed4d2 | 660 | bio_sectors(bio), false, 0, &io->stats_aux); |
3eaf840e JNN |
661 | } |
662 | ||
d221d2e7 | 663 | static void end_io_acct(struct dm_io *io) |
3eaf840e JNN |
664 | { |
665 | struct mapped_device *md = io->md; | |
666 | struct bio *bio = io->bio; | |
667 | unsigned long duration = jiffies - io->start_time; | |
18c0b223 | 668 | int pending; |
3eaf840e JNN |
669 | int rw = bio_data_dir(bio); |
670 | ||
18c0b223 | 671 | generic_end_io_acct(rw, &dm_disk(md)->part0, io->start_time); |
3eaf840e | 672 | |
fd2ed4d2 | 673 | if (unlikely(dm_stats_used(&md->stats))) |
4f024f37 | 674 | dm_stats_account_io(&md->stats, bio->bi_rw, bio->bi_iter.bi_sector, |
fd2ed4d2 MP |
675 | bio_sectors(bio), true, duration, &io->stats_aux); |
676 | ||
af7e466a MP |
677 | /* |
678 | * After this is decremented the bio must not be touched if it is | |
d87f4c14 | 679 | * a flush. |
af7e466a | 680 | */ |
1e9bb880 SL |
681 | pending = atomic_dec_return(&md->pending[rw]); |
682 | atomic_set(&dm_disk(md)->part0.in_flight[rw], pending); | |
316d315b | 683 | pending += atomic_read(&md->pending[rw^0x1]); |
3eaf840e | 684 | |
d221d2e7 MP |
685 | /* nudge anyone waiting on suspend queue */ |
686 | if (!pending) | |
687 | wake_up(&md->wait); | |
3eaf840e JNN |
688 | } |
689 | ||
1da177e4 LT |
690 | /* |
691 | * Add the bio to the list of deferred io. | |
692 | */ | |
92c63902 | 693 | static void queue_io(struct mapped_device *md, struct bio *bio) |
1da177e4 | 694 | { |
05447420 | 695 | unsigned long flags; |
1da177e4 | 696 | |
05447420 | 697 | spin_lock_irqsave(&md->deferred_lock, flags); |
1da177e4 | 698 | bio_list_add(&md->deferred, bio); |
05447420 | 699 | spin_unlock_irqrestore(&md->deferred_lock, flags); |
6a8736d1 | 700 | queue_work(md->wq, &md->work); |
1da177e4 LT |
701 | } |
702 | ||
703 | /* | |
704 | * Everyone (including functions in this file), should use this | |
705 | * function to access the md->map field, and make sure they call | |
83d5e5b0 | 706 | * dm_put_live_table() when finished. |
1da177e4 | 707 | */ |
83d5e5b0 | 708 | struct dm_table *dm_get_live_table(struct mapped_device *md, int *srcu_idx) __acquires(md->io_barrier) |
1da177e4 | 709 | { |
83d5e5b0 MP |
710 | *srcu_idx = srcu_read_lock(&md->io_barrier); |
711 | ||
712 | return srcu_dereference(md->map, &md->io_barrier); | |
713 | } | |
1da177e4 | 714 | |
83d5e5b0 MP |
715 | void dm_put_live_table(struct mapped_device *md, int srcu_idx) __releases(md->io_barrier) |
716 | { | |
717 | srcu_read_unlock(&md->io_barrier, srcu_idx); | |
718 | } | |
719 | ||
720 | void dm_sync_table(struct mapped_device *md) | |
721 | { | |
722 | synchronize_srcu(&md->io_barrier); | |
723 | synchronize_rcu_expedited(); | |
724 | } | |
725 | ||
726 | /* | |
727 | * A fast alternative to dm_get_live_table/dm_put_live_table. | |
728 | * The caller must not block between these two functions. | |
729 | */ | |
730 | static struct dm_table *dm_get_live_table_fast(struct mapped_device *md) __acquires(RCU) | |
731 | { | |
732 | rcu_read_lock(); | |
733 | return rcu_dereference(md->map); | |
734 | } | |
1da177e4 | 735 | |
83d5e5b0 MP |
736 | static void dm_put_live_table_fast(struct mapped_device *md) __releases(RCU) |
737 | { | |
738 | rcu_read_unlock(); | |
1da177e4 LT |
739 | } |
740 | ||
86f1152b BM |
741 | /* |
742 | * Open a table device so we can use it as a map destination. | |
743 | */ | |
744 | static int open_table_device(struct table_device *td, dev_t dev, | |
745 | struct mapped_device *md) | |
746 | { | |
747 | static char *_claim_ptr = "I belong to device-mapper"; | |
748 | struct block_device *bdev; | |
749 | ||
750 | int r; | |
751 | ||
752 | BUG_ON(td->dm_dev.bdev); | |
753 | ||
754 | bdev = blkdev_get_by_dev(dev, td->dm_dev.mode | FMODE_EXCL, _claim_ptr); | |
755 | if (IS_ERR(bdev)) | |
756 | return PTR_ERR(bdev); | |
757 | ||
758 | r = bd_link_disk_holder(bdev, dm_disk(md)); | |
759 | if (r) { | |
760 | blkdev_put(bdev, td->dm_dev.mode | FMODE_EXCL); | |
761 | return r; | |
762 | } | |
763 | ||
764 | td->dm_dev.bdev = bdev; | |
765 | return 0; | |
766 | } | |
767 | ||
768 | /* | |
769 | * Close a table device that we've been using. | |
770 | */ | |
771 | static void close_table_device(struct table_device *td, struct mapped_device *md) | |
772 | { | |
773 | if (!td->dm_dev.bdev) | |
774 | return; | |
775 | ||
776 | bd_unlink_disk_holder(td->dm_dev.bdev, dm_disk(md)); | |
777 | blkdev_put(td->dm_dev.bdev, td->dm_dev.mode | FMODE_EXCL); | |
778 | td->dm_dev.bdev = NULL; | |
779 | } | |
780 | ||
781 | static struct table_device *find_table_device(struct list_head *l, dev_t dev, | |
782 | fmode_t mode) { | |
783 | struct table_device *td; | |
784 | ||
785 | list_for_each_entry(td, l, list) | |
786 | if (td->dm_dev.bdev->bd_dev == dev && td->dm_dev.mode == mode) | |
787 | return td; | |
788 | ||
789 | return NULL; | |
790 | } | |
791 | ||
792 | int dm_get_table_device(struct mapped_device *md, dev_t dev, fmode_t mode, | |
793 | struct dm_dev **result) { | |
794 | int r; | |
795 | struct table_device *td; | |
796 | ||
797 | mutex_lock(&md->table_devices_lock); | |
798 | td = find_table_device(&md->table_devices, dev, mode); | |
799 | if (!td) { | |
800 | td = kmalloc(sizeof(*td), GFP_KERNEL); | |
801 | if (!td) { | |
802 | mutex_unlock(&md->table_devices_lock); | |
803 | return -ENOMEM; | |
804 | } | |
805 | ||
806 | td->dm_dev.mode = mode; | |
807 | td->dm_dev.bdev = NULL; | |
808 | ||
809 | if ((r = open_table_device(td, dev, md))) { | |
810 | mutex_unlock(&md->table_devices_lock); | |
811 | kfree(td); | |
812 | return r; | |
813 | } | |
814 | ||
815 | format_dev_t(td->dm_dev.name, dev); | |
816 | ||
817 | atomic_set(&td->count, 0); | |
818 | list_add(&td->list, &md->table_devices); | |
819 | } | |
820 | atomic_inc(&td->count); | |
821 | mutex_unlock(&md->table_devices_lock); | |
822 | ||
823 | *result = &td->dm_dev; | |
824 | return 0; | |
825 | } | |
826 | EXPORT_SYMBOL_GPL(dm_get_table_device); | |
827 | ||
828 | void dm_put_table_device(struct mapped_device *md, struct dm_dev *d) | |
829 | { | |
830 | struct table_device *td = container_of(d, struct table_device, dm_dev); | |
831 | ||
832 | mutex_lock(&md->table_devices_lock); | |
833 | if (atomic_dec_and_test(&td->count)) { | |
834 | close_table_device(td, md); | |
835 | list_del(&td->list); | |
836 | kfree(td); | |
837 | } | |
838 | mutex_unlock(&md->table_devices_lock); | |
839 | } | |
840 | EXPORT_SYMBOL(dm_put_table_device); | |
841 | ||
842 | static void free_table_devices(struct list_head *devices) | |
843 | { | |
844 | struct list_head *tmp, *next; | |
845 | ||
846 | list_for_each_safe(tmp, next, devices) { | |
847 | struct table_device *td = list_entry(tmp, struct table_device, list); | |
848 | ||
849 | DMWARN("dm_destroy: %s still exists with %d references", | |
850 | td->dm_dev.name, atomic_read(&td->count)); | |
851 | kfree(td); | |
852 | } | |
853 | } | |
854 | ||
3ac51e74 DW |
855 | /* |
856 | * Get the geometry associated with a dm device | |
857 | */ | |
858 | int dm_get_geometry(struct mapped_device *md, struct hd_geometry *geo) | |
859 | { | |
860 | *geo = md->geometry; | |
861 | ||
862 | return 0; | |
863 | } | |
864 | ||
865 | /* | |
866 | * Set the geometry of a device. | |
867 | */ | |
868 | int dm_set_geometry(struct mapped_device *md, struct hd_geometry *geo) | |
869 | { | |
870 | sector_t sz = (sector_t)geo->cylinders * geo->heads * geo->sectors; | |
871 | ||
872 | if (geo->start > sz) { | |
873 | DMWARN("Start sector is beyond the geometry limits."); | |
874 | return -EINVAL; | |
875 | } | |
876 | ||
877 | md->geometry = *geo; | |
878 | ||
879 | return 0; | |
880 | } | |
881 | ||
1da177e4 LT |
882 | /*----------------------------------------------------------------- |
883 | * CRUD START: | |
884 | * A more elegant soln is in the works that uses the queue | |
885 | * merge fn, unfortunately there are a couple of changes to | |
886 | * the block layer that I want to make for this. So in the | |
887 | * interests of getting something for people to use I give | |
888 | * you this clearly demarcated crap. | |
889 | *---------------------------------------------------------------*/ | |
890 | ||
2e93ccc1 KU |
891 | static int __noflush_suspending(struct mapped_device *md) |
892 | { | |
893 | return test_bit(DMF_NOFLUSH_SUSPENDING, &md->flags); | |
894 | } | |
895 | ||
1da177e4 LT |
896 | /* |
897 | * Decrements the number of outstanding ios that a bio has been | |
898 | * cloned into, completing the original io if necc. | |
899 | */ | |
858119e1 | 900 | static void dec_pending(struct dm_io *io, int error) |
1da177e4 | 901 | { |
2e93ccc1 | 902 | unsigned long flags; |
b35f8caa MB |
903 | int io_error; |
904 | struct bio *bio; | |
905 | struct mapped_device *md = io->md; | |
2e93ccc1 KU |
906 | |
907 | /* Push-back supersedes any I/O errors */ | |
f88fb981 KU |
908 | if (unlikely(error)) { |
909 | spin_lock_irqsave(&io->endio_lock, flags); | |
910 | if (!(io->error > 0 && __noflush_suspending(md))) | |
911 | io->error = error; | |
912 | spin_unlock_irqrestore(&io->endio_lock, flags); | |
913 | } | |
1da177e4 LT |
914 | |
915 | if (atomic_dec_and_test(&io->io_count)) { | |
2e93ccc1 KU |
916 | if (io->error == DM_ENDIO_REQUEUE) { |
917 | /* | |
918 | * Target requested pushing back the I/O. | |
2e93ccc1 | 919 | */ |
022c2611 | 920 | spin_lock_irqsave(&md->deferred_lock, flags); |
6a8736d1 TH |
921 | if (__noflush_suspending(md)) |
922 | bio_list_add_head(&md->deferred, io->bio); | |
923 | else | |
2e93ccc1 KU |
924 | /* noflush suspend was interrupted. */ |
925 | io->error = -EIO; | |
022c2611 | 926 | spin_unlock_irqrestore(&md->deferred_lock, flags); |
2e93ccc1 KU |
927 | } |
928 | ||
b35f8caa MB |
929 | io_error = io->error; |
930 | bio = io->bio; | |
6a8736d1 TH |
931 | end_io_acct(io); |
932 | free_io(md, io); | |
933 | ||
934 | if (io_error == DM_ENDIO_REQUEUE) | |
935 | return; | |
2e93ccc1 | 936 | |
4f024f37 | 937 | if ((bio->bi_rw & REQ_FLUSH) && bio->bi_iter.bi_size) { |
af7e466a | 938 | /* |
6a8736d1 TH |
939 | * Preflush done for flush with data, reissue |
940 | * without REQ_FLUSH. | |
af7e466a | 941 | */ |
6a8736d1 TH |
942 | bio->bi_rw &= ~REQ_FLUSH; |
943 | queue_io(md, bio); | |
af7e466a | 944 | } else { |
b372d360 | 945 | /* done with normal IO or empty flush */ |
0a82a8d1 | 946 | trace_block_bio_complete(md->queue, bio, io_error); |
b372d360 | 947 | bio_endio(bio, io_error); |
b35f8caa | 948 | } |
1da177e4 LT |
949 | } |
950 | } | |
951 | ||
7eee4ae2 MS |
952 | static void disable_write_same(struct mapped_device *md) |
953 | { | |
954 | struct queue_limits *limits = dm_get_queue_limits(md); | |
955 | ||
956 | /* device doesn't really support WRITE SAME, disable it */ | |
957 | limits->max_write_same_sectors = 0; | |
958 | } | |
959 | ||
6712ecf8 | 960 | static void clone_endio(struct bio *bio, int error) |
1da177e4 | 961 | { |
5164bece | 962 | int r = error; |
bfc6d41c | 963 | struct dm_target_io *tio = container_of(bio, struct dm_target_io, clone); |
b35f8caa | 964 | struct dm_io *io = tio->io; |
9faf400f | 965 | struct mapped_device *md = tio->io->md; |
1da177e4 LT |
966 | dm_endio_fn endio = tio->ti->type->end_io; |
967 | ||
1da177e4 LT |
968 | if (!bio_flagged(bio, BIO_UPTODATE) && !error) |
969 | error = -EIO; | |
970 | ||
971 | if (endio) { | |
7de3ee57 | 972 | r = endio(tio->ti, bio, error); |
2e93ccc1 KU |
973 | if (r < 0 || r == DM_ENDIO_REQUEUE) |
974 | /* | |
975 | * error and requeue request are handled | |
976 | * in dec_pending(). | |
977 | */ | |
1da177e4 | 978 | error = r; |
45cbcd79 KU |
979 | else if (r == DM_ENDIO_INCOMPLETE) |
980 | /* The target will handle the io */ | |
6712ecf8 | 981 | return; |
45cbcd79 KU |
982 | else if (r) { |
983 | DMWARN("unimplemented target endio return value: %d", r); | |
984 | BUG(); | |
985 | } | |
1da177e4 LT |
986 | } |
987 | ||
7eee4ae2 MS |
988 | if (unlikely(r == -EREMOTEIO && (bio->bi_rw & REQ_WRITE_SAME) && |
989 | !bdev_get_queue(bio->bi_bdev)->limits.max_write_same_sectors)) | |
990 | disable_write_same(md); | |
991 | ||
9faf400f | 992 | free_tio(md, tio); |
b35f8caa | 993 | dec_pending(io, error); |
1da177e4 LT |
994 | } |
995 | ||
78d8e58a MS |
996 | /* |
997 | * Partial completion handling for request-based dm | |
998 | */ | |
999 | static void end_clone_bio(struct bio *clone, int error) | |
1000 | { | |
1001 | struct dm_rq_clone_bio_info *info = | |
1002 | container_of(clone, struct dm_rq_clone_bio_info, clone); | |
1003 | struct dm_rq_target_io *tio = info->tio; | |
1004 | struct bio *bio = info->orig; | |
1005 | unsigned int nr_bytes = info->orig->bi_iter.bi_size; | |
1006 | ||
1007 | bio_put(clone); | |
1008 | ||
1009 | if (tio->error) | |
1010 | /* | |
1011 | * An error has already been detected on the request. | |
1012 | * Once error occurred, just let clone->end_io() handle | |
1013 | * the remainder. | |
1014 | */ | |
1015 | return; | |
1016 | else if (error) { | |
1017 | /* | |
1018 | * Don't notice the error to the upper layer yet. | |
1019 | * The error handling decision is made by the target driver, | |
1020 | * when the request is completed. | |
1021 | */ | |
1022 | tio->error = error; | |
1023 | return; | |
1024 | } | |
1025 | ||
1026 | /* | |
1027 | * I/O for the bio successfully completed. | |
1028 | * Notice the data completion to the upper layer. | |
1029 | */ | |
1030 | ||
1031 | /* | |
1032 | * bios are processed from the head of the list. | |
1033 | * So the completing bio should always be rq->bio. | |
1034 | * If it's not, something wrong is happening. | |
1035 | */ | |
1036 | if (tio->orig->bio != bio) | |
1037 | DMERR("bio completion is going in the middle of the request"); | |
1038 | ||
1039 | /* | |
1040 | * Update the original request. | |
1041 | * Do not use blk_end_request() here, because it may complete | |
1042 | * the original request before the clone, and break the ordering. | |
1043 | */ | |
1044 | blk_update_request(tio->orig, 0, nr_bytes); | |
1045 | } | |
1046 | ||
bfebd1cd MS |
1047 | static struct dm_rq_target_io *tio_from_request(struct request *rq) |
1048 | { | |
1049 | return (rq->q->mq_ops ? blk_mq_rq_to_pdu(rq) : rq->special); | |
1050 | } | |
1051 | ||
e262f347 MP |
1052 | static void rq_end_stats(struct mapped_device *md, struct request *orig) |
1053 | { | |
1054 | if (unlikely(dm_stats_used(&md->stats))) { | |
1055 | struct dm_rq_target_io *tio = tio_from_request(orig); | |
1056 | tio->duration_jiffies = jiffies - tio->duration_jiffies; | |
1057 | dm_stats_account_io(&md->stats, orig->cmd_flags, blk_rq_pos(orig), | |
1058 | tio->n_sectors, true, tio->duration_jiffies, | |
1059 | &tio->stats_aux); | |
1060 | } | |
1061 | } | |
1062 | ||
cec47e3d KU |
1063 | /* |
1064 | * Don't touch any member of the md after calling this function because | |
1065 | * the md may be freed in dm_put() at the end of this function. | |
1066 | * Or do dm_get() before calling this function and dm_put() later. | |
1067 | */ | |
466d89a6 | 1068 | static void rq_completed(struct mapped_device *md, int rw, bool run_queue) |
cec47e3d | 1069 | { |
b4324fee | 1070 | atomic_dec(&md->pending[rw]); |
cec47e3d KU |
1071 | |
1072 | /* nudge anyone waiting on suspend queue */ | |
621739b0 | 1073 | if (!md_in_flight(md)) |
cec47e3d KU |
1074 | wake_up(&md->wait); |
1075 | ||
a8c32a5c JA |
1076 | /* |
1077 | * Run this off this callpath, as drivers could invoke end_io while | |
1078 | * inside their request_fn (and holding the queue lock). Calling | |
1079 | * back into ->request_fn() could deadlock attempting to grab the | |
1080 | * queue lock again. | |
1081 | */ | |
9a0e609e | 1082 | if (run_queue) { |
bfebd1cd MS |
1083 | if (md->queue->mq_ops) |
1084 | blk_mq_run_hw_queues(md->queue, true); | |
621739b0 | 1085 | else |
9a0e609e MS |
1086 | blk_run_queue_async(md->queue); |
1087 | } | |
cec47e3d KU |
1088 | |
1089 | /* | |
1090 | * dm_put() must be at the end of this function. See the comment above | |
1091 | */ | |
1092 | dm_put(md); | |
1093 | } | |
1094 | ||
e5d8de32 | 1095 | static void free_rq_clone(struct request *clone) |
a77e28c7 KU |
1096 | { |
1097 | struct dm_rq_target_io *tio = clone->end_io_data; | |
bfebd1cd | 1098 | struct mapped_device *md = tio->md; |
a77e28c7 | 1099 | |
78d8e58a MS |
1100 | blk_rq_unprep_clone(clone); |
1101 | ||
aa6df8dd MS |
1102 | if (md->type == DM_TYPE_MQ_REQUEST_BASED) |
1103 | /* stacked on blk-mq queue(s) */ | |
e5863d9a | 1104 | tio->ti->type->release_clone_rq(clone); |
02233342 MS |
1105 | else if (!md->queue->mq_ops) |
1106 | /* request_fn queue stacked on request_fn queue(s) */ | |
bfebd1cd | 1107 | free_clone_request(md, clone); |
aa6df8dd MS |
1108 | /* |
1109 | * NOTE: for the blk-mq queue stacked on request_fn queue(s) case: | |
1110 | * no need to call free_clone_request() because we leverage blk-mq by | |
1111 | * allocating the clone at the end of the blk-mq pdu (see: clone_rq) | |
1112 | */ | |
bfebd1cd MS |
1113 | |
1114 | if (!md->queue->mq_ops) | |
1115 | free_rq_tio(tio); | |
a77e28c7 KU |
1116 | } |
1117 | ||
980691e5 KU |
1118 | /* |
1119 | * Complete the clone and the original request. | |
466d89a6 KB |
1120 | * Must be called without clone's queue lock held, |
1121 | * see end_clone_request() for more details. | |
980691e5 KU |
1122 | */ |
1123 | static void dm_end_request(struct request *clone, int error) | |
1124 | { | |
1125 | int rw = rq_data_dir(clone); | |
1126 | struct dm_rq_target_io *tio = clone->end_io_data; | |
1127 | struct mapped_device *md = tio->md; | |
1128 | struct request *rq = tio->orig; | |
1129 | ||
29e4013d | 1130 | if (rq->cmd_type == REQ_TYPE_BLOCK_PC) { |
980691e5 KU |
1131 | rq->errors = clone->errors; |
1132 | rq->resid_len = clone->resid_len; | |
1133 | ||
1134 | if (rq->sense) | |
1135 | /* | |
1136 | * We are using the sense buffer of the original | |
1137 | * request. | |
1138 | * So setting the length of the sense data is enough. | |
1139 | */ | |
1140 | rq->sense_len = clone->sense_len; | |
1141 | } | |
1142 | ||
e5d8de32 | 1143 | free_rq_clone(clone); |
e262f347 | 1144 | rq_end_stats(md, rq); |
bfebd1cd MS |
1145 | if (!rq->q->mq_ops) |
1146 | blk_end_request_all(rq, error); | |
1147 | else | |
1148 | blk_mq_end_request(rq, error); | |
29e4013d | 1149 | rq_completed(md, rw, true); |
980691e5 KU |
1150 | } |
1151 | ||
cec47e3d KU |
1152 | static void dm_unprep_request(struct request *rq) |
1153 | { | |
bfebd1cd | 1154 | struct dm_rq_target_io *tio = tio_from_request(rq); |
466d89a6 | 1155 | struct request *clone = tio->clone; |
cec47e3d | 1156 | |
bfebd1cd MS |
1157 | if (!rq->q->mq_ops) { |
1158 | rq->special = NULL; | |
1159 | rq->cmd_flags &= ~REQ_DONTPREP; | |
1160 | } | |
cec47e3d | 1161 | |
e5863d9a | 1162 | if (clone) |
e5d8de32 | 1163 | free_rq_clone(clone); |
cec47e3d KU |
1164 | } |
1165 | ||
1166 | /* | |
1167 | * Requeue the original request of a clone. | |
1168 | */ | |
bfebd1cd | 1169 | static void old_requeue_request(struct request *rq) |
cec47e3d | 1170 | { |
cec47e3d KU |
1171 | struct request_queue *q = rq->q; |
1172 | unsigned long flags; | |
1173 | ||
cec47e3d | 1174 | spin_lock_irqsave(q->queue_lock, flags); |
cec47e3d | 1175 | blk_requeue_request(q, rq); |
4ae9944d | 1176 | blk_run_queue_async(q); |
cec47e3d | 1177 | spin_unlock_irqrestore(q->queue_lock, flags); |
bfebd1cd MS |
1178 | } |
1179 | ||
2d76fff1 MS |
1180 | static void dm_requeue_original_request(struct mapped_device *md, |
1181 | struct request *rq) | |
bfebd1cd MS |
1182 | { |
1183 | int rw = rq_data_dir(rq); | |
1184 | ||
1185 | dm_unprep_request(rq); | |
1186 | ||
e262f347 | 1187 | rq_end_stats(md, rq); |
bfebd1cd MS |
1188 | if (!rq->q->mq_ops) |
1189 | old_requeue_request(rq); | |
1190 | else { | |
1191 | blk_mq_requeue_request(rq); | |
1192 | blk_mq_kick_requeue_list(rq->q); | |
1193 | } | |
cec47e3d | 1194 | |
466d89a6 KB |
1195 | rq_completed(md, rw, false); |
1196 | } | |
1197 | ||
bfebd1cd | 1198 | static void old_stop_queue(struct request_queue *q) |
cec47e3d KU |
1199 | { |
1200 | unsigned long flags; | |
1201 | ||
bfebd1cd MS |
1202 | if (blk_queue_stopped(q)) |
1203 | return; | |
1204 | ||
cec47e3d | 1205 | spin_lock_irqsave(q->queue_lock, flags); |
bfebd1cd | 1206 | blk_stop_queue(q); |
cec47e3d KU |
1207 | spin_unlock_irqrestore(q->queue_lock, flags); |
1208 | } | |
1209 | ||
bfebd1cd | 1210 | static void stop_queue(struct request_queue *q) |
cec47e3d | 1211 | { |
bfebd1cd MS |
1212 | if (!q->mq_ops) |
1213 | old_stop_queue(q); | |
1214 | else | |
1215 | blk_mq_stop_hw_queues(q); | |
cec47e3d KU |
1216 | } |
1217 | ||
bfebd1cd | 1218 | static void old_start_queue(struct request_queue *q) |
cec47e3d KU |
1219 | { |
1220 | unsigned long flags; | |
1221 | ||
1222 | spin_lock_irqsave(q->queue_lock, flags); | |
bfebd1cd MS |
1223 | if (blk_queue_stopped(q)) |
1224 | blk_start_queue(q); | |
cec47e3d KU |
1225 | spin_unlock_irqrestore(q->queue_lock, flags); |
1226 | } | |
1227 | ||
bfebd1cd MS |
1228 | static void start_queue(struct request_queue *q) |
1229 | { | |
1230 | if (!q->mq_ops) | |
1231 | old_start_queue(q); | |
1232 | else | |
1233 | blk_mq_start_stopped_hw_queues(q, true); | |
1234 | } | |
1235 | ||
11a68244 | 1236 | static void dm_done(struct request *clone, int error, bool mapped) |
cec47e3d | 1237 | { |
11a68244 | 1238 | int r = error; |
cec47e3d | 1239 | struct dm_rq_target_io *tio = clone->end_io_data; |
ba1cbad9 | 1240 | dm_request_endio_fn rq_end_io = NULL; |
cec47e3d | 1241 | |
ba1cbad9 MS |
1242 | if (tio->ti) { |
1243 | rq_end_io = tio->ti->type->rq_end_io; | |
1244 | ||
1245 | if (mapped && rq_end_io) | |
1246 | r = rq_end_io(tio->ti, clone, error, &tio->info); | |
1247 | } | |
cec47e3d | 1248 | |
7eee4ae2 MS |
1249 | if (unlikely(r == -EREMOTEIO && (clone->cmd_flags & REQ_WRITE_SAME) && |
1250 | !clone->q->limits.max_write_same_sectors)) | |
1251 | disable_write_same(tio->md); | |
1252 | ||
11a68244 | 1253 | if (r <= 0) |
cec47e3d | 1254 | /* The target wants to complete the I/O */ |
11a68244 KU |
1255 | dm_end_request(clone, r); |
1256 | else if (r == DM_ENDIO_INCOMPLETE) | |
cec47e3d KU |
1257 | /* The target will handle the I/O */ |
1258 | return; | |
11a68244 | 1259 | else if (r == DM_ENDIO_REQUEUE) |
cec47e3d | 1260 | /* The target wants to requeue the I/O */ |
2d76fff1 | 1261 | dm_requeue_original_request(tio->md, tio->orig); |
cec47e3d | 1262 | else { |
11a68244 | 1263 | DMWARN("unimplemented target endio return value: %d", r); |
cec47e3d KU |
1264 | BUG(); |
1265 | } | |
1266 | } | |
1267 | ||
11a68244 KU |
1268 | /* |
1269 | * Request completion handler for request-based dm | |
1270 | */ | |
1271 | static void dm_softirq_done(struct request *rq) | |
1272 | { | |
1273 | bool mapped = true; | |
bfebd1cd | 1274 | struct dm_rq_target_io *tio = tio_from_request(rq); |
466d89a6 | 1275 | struct request *clone = tio->clone; |
bfebd1cd | 1276 | int rw; |
11a68244 | 1277 | |
e5863d9a | 1278 | if (!clone) { |
e262f347 | 1279 | rq_end_stats(tio->md, rq); |
bfebd1cd MS |
1280 | rw = rq_data_dir(rq); |
1281 | if (!rq->q->mq_ops) { | |
1282 | blk_end_request_all(rq, tio->error); | |
1283 | rq_completed(tio->md, rw, false); | |
1284 | free_rq_tio(tio); | |
1285 | } else { | |
1286 | blk_mq_end_request(rq, tio->error); | |
1287 | rq_completed(tio->md, rw, false); | |
1288 | } | |
e5863d9a MS |
1289 | return; |
1290 | } | |
11a68244 KU |
1291 | |
1292 | if (rq->cmd_flags & REQ_FAILED) | |
1293 | mapped = false; | |
1294 | ||
1295 | dm_done(clone, tio->error, mapped); | |
1296 | } | |
1297 | ||
cec47e3d KU |
1298 | /* |
1299 | * Complete the clone and the original request with the error status | |
1300 | * through softirq context. | |
1301 | */ | |
466d89a6 | 1302 | static void dm_complete_request(struct request *rq, int error) |
cec47e3d | 1303 | { |
bfebd1cd | 1304 | struct dm_rq_target_io *tio = tio_from_request(rq); |
cec47e3d KU |
1305 | |
1306 | tio->error = error; | |
cec47e3d KU |
1307 | blk_complete_request(rq); |
1308 | } | |
1309 | ||
1310 | /* | |
1311 | * Complete the not-mapped clone and the original request with the error status | |
1312 | * through softirq context. | |
1313 | * Target's rq_end_io() function isn't called. | |
e5863d9a | 1314 | * This may be used when the target's map_rq() or clone_and_map_rq() functions fail. |
cec47e3d | 1315 | */ |
466d89a6 | 1316 | static void dm_kill_unmapped_request(struct request *rq, int error) |
cec47e3d | 1317 | { |
cec47e3d | 1318 | rq->cmd_flags |= REQ_FAILED; |
466d89a6 | 1319 | dm_complete_request(rq, error); |
cec47e3d | 1320 | } |
cec47e3d KU |
1321 | |
1322 | /* | |
bfebd1cd | 1323 | * Called with the clone's queue lock held (for non-blk-mq) |
cec47e3d KU |
1324 | */ |
1325 | static void end_clone_request(struct request *clone, int error) | |
1326 | { | |
466d89a6 KB |
1327 | struct dm_rq_target_io *tio = clone->end_io_data; |
1328 | ||
e5863d9a MS |
1329 | if (!clone->q->mq_ops) { |
1330 | /* | |
1331 | * For just cleaning up the information of the queue in which | |
1332 | * the clone was dispatched. | |
1333 | * The clone is *NOT* freed actually here because it is alloced | |
1334 | * from dm own mempool (REQ_ALLOCED isn't set). | |
1335 | */ | |
1336 | __blk_put_request(clone->q, clone); | |
1337 | } | |
cec47e3d KU |
1338 | |
1339 | /* | |
1340 | * Actual request completion is done in a softirq context which doesn't | |
466d89a6 | 1341 | * hold the clone's queue lock. Otherwise, deadlock could occur because: |
cec47e3d KU |
1342 | * - another request may be submitted by the upper level driver |
1343 | * of the stacking during the completion | |
1344 | * - the submission which requires queue lock may be done | |
466d89a6 | 1345 | * against this clone's queue |
cec47e3d | 1346 | */ |
466d89a6 | 1347 | dm_complete_request(tio->orig, error); |
cec47e3d KU |
1348 | } |
1349 | ||
56a67df7 MS |
1350 | /* |
1351 | * Return maximum size of I/O possible at the supplied sector up to the current | |
1352 | * target boundary. | |
1353 | */ | |
1354 | static sector_t max_io_len_target_boundary(sector_t sector, struct dm_target *ti) | |
1355 | { | |
1356 | sector_t target_offset = dm_target_offset(ti, sector); | |
1357 | ||
1358 | return ti->len - target_offset; | |
1359 | } | |
1360 | ||
1361 | static sector_t max_io_len(sector_t sector, struct dm_target *ti) | |
1da177e4 | 1362 | { |
56a67df7 | 1363 | sector_t len = max_io_len_target_boundary(sector, ti); |
542f9038 | 1364 | sector_t offset, max_len; |
1da177e4 LT |
1365 | |
1366 | /* | |
542f9038 | 1367 | * Does the target need to split even further? |
1da177e4 | 1368 | */ |
542f9038 MS |
1369 | if (ti->max_io_len) { |
1370 | offset = dm_target_offset(ti, sector); | |
1371 | if (unlikely(ti->max_io_len & (ti->max_io_len - 1))) | |
1372 | max_len = sector_div(offset, ti->max_io_len); | |
1373 | else | |
1374 | max_len = offset & (ti->max_io_len - 1); | |
1375 | max_len = ti->max_io_len - max_len; | |
1376 | ||
1377 | if (len > max_len) | |
1378 | len = max_len; | |
1da177e4 LT |
1379 | } |
1380 | ||
1381 | return len; | |
1382 | } | |
1383 | ||
542f9038 MS |
1384 | int dm_set_target_max_io_len(struct dm_target *ti, sector_t len) |
1385 | { | |
1386 | if (len > UINT_MAX) { | |
1387 | DMERR("Specified maximum size of target IO (%llu) exceeds limit (%u)", | |
1388 | (unsigned long long)len, UINT_MAX); | |
1389 | ti->error = "Maximum size of target IO is too large"; | |
1390 | return -EINVAL; | |
1391 | } | |
1392 | ||
1393 | ti->max_io_len = (uint32_t) len; | |
1394 | ||
1395 | return 0; | |
1396 | } | |
1397 | EXPORT_SYMBOL_GPL(dm_set_target_max_io_len); | |
1398 | ||
1dd40c3e MP |
1399 | /* |
1400 | * A target may call dm_accept_partial_bio only from the map routine. It is | |
1401 | * allowed for all bio types except REQ_FLUSH. | |
1402 | * | |
1403 | * dm_accept_partial_bio informs the dm that the target only wants to process | |
1404 | * additional n_sectors sectors of the bio and the rest of the data should be | |
1405 | * sent in a next bio. | |
1406 | * | |
1407 | * A diagram that explains the arithmetics: | |
1408 | * +--------------------+---------------+-------+ | |
1409 | * | 1 | 2 | 3 | | |
1410 | * +--------------------+---------------+-------+ | |
1411 | * | |
1412 | * <-------------- *tio->len_ptr ---------------> | |
1413 | * <------- bi_size -------> | |
1414 | * <-- n_sectors --> | |
1415 | * | |
1416 | * Region 1 was already iterated over with bio_advance or similar function. | |
1417 | * (it may be empty if the target doesn't use bio_advance) | |
1418 | * Region 2 is the remaining bio size that the target wants to process. | |
1419 | * (it may be empty if region 1 is non-empty, although there is no reason | |
1420 | * to make it empty) | |
1421 | * The target requires that region 3 is to be sent in the next bio. | |
1422 | * | |
1423 | * If the target wants to receive multiple copies of the bio (via num_*bios, etc), | |
1424 | * the partially processed part (the sum of regions 1+2) must be the same for all | |
1425 | * copies of the bio. | |
1426 | */ | |
1427 | void dm_accept_partial_bio(struct bio *bio, unsigned n_sectors) | |
1428 | { | |
1429 | struct dm_target_io *tio = container_of(bio, struct dm_target_io, clone); | |
1430 | unsigned bi_size = bio->bi_iter.bi_size >> SECTOR_SHIFT; | |
1431 | BUG_ON(bio->bi_rw & REQ_FLUSH); | |
1432 | BUG_ON(bi_size > *tio->len_ptr); | |
1433 | BUG_ON(n_sectors > bi_size); | |
1434 | *tio->len_ptr -= bi_size - n_sectors; | |
1435 | bio->bi_iter.bi_size = n_sectors << SECTOR_SHIFT; | |
1436 | } | |
1437 | EXPORT_SYMBOL_GPL(dm_accept_partial_bio); | |
1438 | ||
bd2a49b8 | 1439 | static void __map_bio(struct dm_target_io *tio) |
1da177e4 LT |
1440 | { |
1441 | int r; | |
2056a782 | 1442 | sector_t sector; |
9faf400f | 1443 | struct mapped_device *md; |
dba14160 | 1444 | struct bio *clone = &tio->clone; |
bd2a49b8 | 1445 | struct dm_target *ti = tio->ti; |
1da177e4 | 1446 | |
1da177e4 | 1447 | clone->bi_end_io = clone_endio; |
1da177e4 LT |
1448 | |
1449 | /* | |
1450 | * Map the clone. If r == 0 we don't need to do | |
1451 | * anything, the target has assumed ownership of | |
1452 | * this io. | |
1453 | */ | |
1454 | atomic_inc(&tio->io->io_count); | |
4f024f37 | 1455 | sector = clone->bi_iter.bi_sector; |
7de3ee57 | 1456 | r = ti->type->map(ti, clone); |
45cbcd79 | 1457 | if (r == DM_MAPIO_REMAPPED) { |
1da177e4 | 1458 | /* the bio has been remapped so dispatch it */ |
2056a782 | 1459 | |
d07335e5 MS |
1460 | trace_block_bio_remap(bdev_get_queue(clone->bi_bdev), clone, |
1461 | tio->io->bio->bi_bdev->bd_dev, sector); | |
2056a782 | 1462 | |
1da177e4 | 1463 | generic_make_request(clone); |
2e93ccc1 KU |
1464 | } else if (r < 0 || r == DM_MAPIO_REQUEUE) { |
1465 | /* error the io and bail out, or requeue it if needed */ | |
9faf400f SB |
1466 | md = tio->io->md; |
1467 | dec_pending(tio->io, r); | |
9faf400f | 1468 | free_tio(md, tio); |
45cbcd79 KU |
1469 | } else if (r) { |
1470 | DMWARN("unimplemented target map return value: %d", r); | |
1471 | BUG(); | |
1da177e4 LT |
1472 | } |
1473 | } | |
1474 | ||
1475 | struct clone_info { | |
1476 | struct mapped_device *md; | |
1477 | struct dm_table *map; | |
1478 | struct bio *bio; | |
1479 | struct dm_io *io; | |
1480 | sector_t sector; | |
e0d6609a | 1481 | unsigned sector_count; |
1da177e4 LT |
1482 | }; |
1483 | ||
e0d6609a | 1484 | static void bio_setup_sector(struct bio *bio, sector_t sector, unsigned len) |
bd2a49b8 | 1485 | { |
4f024f37 KO |
1486 | bio->bi_iter.bi_sector = sector; |
1487 | bio->bi_iter.bi_size = to_bytes(len); | |
1da177e4 LT |
1488 | } |
1489 | ||
1490 | /* | |
1491 | * Creates a bio that consists of range of complete bvecs. | |
1492 | */ | |
dba14160 | 1493 | static void clone_bio(struct dm_target_io *tio, struct bio *bio, |
1c3b13e6 | 1494 | sector_t sector, unsigned len) |
1da177e4 | 1495 | { |
dba14160 | 1496 | struct bio *clone = &tio->clone; |
1da177e4 | 1497 | |
1c3b13e6 KO |
1498 | __bio_clone_fast(clone, bio); |
1499 | ||
1500 | if (bio_integrity(bio)) | |
1501 | bio_integrity_clone(clone, bio, GFP_NOIO); | |
bd2a49b8 | 1502 | |
1c3b13e6 KO |
1503 | bio_advance(clone, to_bytes(sector - clone->bi_iter.bi_sector)); |
1504 | clone->bi_iter.bi_size = to_bytes(len); | |
1505 | ||
1506 | if (bio_integrity(bio)) | |
1507 | bio_integrity_trim(clone, 0, len); | |
1da177e4 LT |
1508 | } |
1509 | ||
9015df24 | 1510 | static struct dm_target_io *alloc_tio(struct clone_info *ci, |
99778273 | 1511 | struct dm_target *ti, |
55a62eef | 1512 | unsigned target_bio_nr) |
f9ab94ce | 1513 | { |
dba14160 MP |
1514 | struct dm_target_io *tio; |
1515 | struct bio *clone; | |
1516 | ||
99778273 | 1517 | clone = bio_alloc_bioset(GFP_NOIO, 0, ci->md->bs); |
dba14160 | 1518 | tio = container_of(clone, struct dm_target_io, clone); |
f9ab94ce MP |
1519 | |
1520 | tio->io = ci->io; | |
1521 | tio->ti = ti; | |
55a62eef | 1522 | tio->target_bio_nr = target_bio_nr; |
9015df24 AK |
1523 | |
1524 | return tio; | |
1525 | } | |
1526 | ||
14fe594d AK |
1527 | static void __clone_and_map_simple_bio(struct clone_info *ci, |
1528 | struct dm_target *ti, | |
1dd40c3e | 1529 | unsigned target_bio_nr, unsigned *len) |
9015df24 | 1530 | { |
99778273 | 1531 | struct dm_target_io *tio = alloc_tio(ci, ti, target_bio_nr); |
dba14160 | 1532 | struct bio *clone = &tio->clone; |
9015df24 | 1533 | |
1dd40c3e MP |
1534 | tio->len_ptr = len; |
1535 | ||
99778273 | 1536 | __bio_clone_fast(clone, ci->bio); |
bd2a49b8 | 1537 | if (len) |
1dd40c3e | 1538 | bio_setup_sector(clone, ci->sector, *len); |
f9ab94ce | 1539 | |
bd2a49b8 | 1540 | __map_bio(tio); |
f9ab94ce MP |
1541 | } |
1542 | ||
14fe594d | 1543 | static void __send_duplicate_bios(struct clone_info *ci, struct dm_target *ti, |
1dd40c3e | 1544 | unsigned num_bios, unsigned *len) |
06a426ce | 1545 | { |
55a62eef | 1546 | unsigned target_bio_nr; |
06a426ce | 1547 | |
55a62eef | 1548 | for (target_bio_nr = 0; target_bio_nr < num_bios; target_bio_nr++) |
14fe594d | 1549 | __clone_and_map_simple_bio(ci, ti, target_bio_nr, len); |
06a426ce MS |
1550 | } |
1551 | ||
14fe594d | 1552 | static int __send_empty_flush(struct clone_info *ci) |
f9ab94ce | 1553 | { |
06a426ce | 1554 | unsigned target_nr = 0; |
f9ab94ce MP |
1555 | struct dm_target *ti; |
1556 | ||
b372d360 | 1557 | BUG_ON(bio_has_data(ci->bio)); |
f9ab94ce | 1558 | while ((ti = dm_table_get_target(ci->map, target_nr++))) |
1dd40c3e | 1559 | __send_duplicate_bios(ci, ti, ti->num_flush_bios, NULL); |
f9ab94ce | 1560 | |
f9ab94ce MP |
1561 | return 0; |
1562 | } | |
1563 | ||
e4c93811 | 1564 | static void __clone_and_map_data_bio(struct clone_info *ci, struct dm_target *ti, |
1dd40c3e | 1565 | sector_t sector, unsigned *len) |
5ae89a87 | 1566 | { |
dba14160 | 1567 | struct bio *bio = ci->bio; |
5ae89a87 | 1568 | struct dm_target_io *tio; |
b0d8ed4d AK |
1569 | unsigned target_bio_nr; |
1570 | unsigned num_target_bios = 1; | |
5ae89a87 | 1571 | |
b0d8ed4d AK |
1572 | /* |
1573 | * Does the target want to receive duplicate copies of the bio? | |
1574 | */ | |
1575 | if (bio_data_dir(bio) == WRITE && ti->num_write_bios) | |
1576 | num_target_bios = ti->num_write_bios(ti, bio); | |
e4c93811 | 1577 | |
b0d8ed4d | 1578 | for (target_bio_nr = 0; target_bio_nr < num_target_bios; target_bio_nr++) { |
99778273 | 1579 | tio = alloc_tio(ci, ti, target_bio_nr); |
1dd40c3e MP |
1580 | tio->len_ptr = len; |
1581 | clone_bio(tio, bio, sector, *len); | |
b0d8ed4d AK |
1582 | __map_bio(tio); |
1583 | } | |
5ae89a87 MS |
1584 | } |
1585 | ||
55a62eef | 1586 | typedef unsigned (*get_num_bios_fn)(struct dm_target *ti); |
23508a96 | 1587 | |
55a62eef | 1588 | static unsigned get_num_discard_bios(struct dm_target *ti) |
23508a96 | 1589 | { |
55a62eef | 1590 | return ti->num_discard_bios; |
23508a96 MS |
1591 | } |
1592 | ||
55a62eef | 1593 | static unsigned get_num_write_same_bios(struct dm_target *ti) |
23508a96 | 1594 | { |
55a62eef | 1595 | return ti->num_write_same_bios; |
23508a96 MS |
1596 | } |
1597 | ||
1598 | typedef bool (*is_split_required_fn)(struct dm_target *ti); | |
1599 | ||
1600 | static bool is_split_required_for_discard(struct dm_target *ti) | |
1601 | { | |
55a62eef | 1602 | return ti->split_discard_bios; |
23508a96 MS |
1603 | } |
1604 | ||
14fe594d AK |
1605 | static int __send_changing_extent_only(struct clone_info *ci, |
1606 | get_num_bios_fn get_num_bios, | |
1607 | is_split_required_fn is_split_required) | |
5ae89a87 MS |
1608 | { |
1609 | struct dm_target *ti; | |
e0d6609a | 1610 | unsigned len; |
55a62eef | 1611 | unsigned num_bios; |
5ae89a87 | 1612 | |
a79245b3 MS |
1613 | do { |
1614 | ti = dm_table_find_target(ci->map, ci->sector); | |
1615 | if (!dm_target_is_valid(ti)) | |
1616 | return -EIO; | |
5ae89a87 | 1617 | |
5ae89a87 | 1618 | /* |
23508a96 MS |
1619 | * Even though the device advertised support for this type of |
1620 | * request, that does not mean every target supports it, and | |
936688d7 | 1621 | * reconfiguration might also have changed that since the |
a79245b3 | 1622 | * check was performed. |
5ae89a87 | 1623 | */ |
55a62eef AK |
1624 | num_bios = get_num_bios ? get_num_bios(ti) : 0; |
1625 | if (!num_bios) | |
a79245b3 | 1626 | return -EOPNOTSUPP; |
5ae89a87 | 1627 | |
23508a96 | 1628 | if (is_split_required && !is_split_required(ti)) |
e0d6609a | 1629 | len = min((sector_t)ci->sector_count, max_io_len_target_boundary(ci->sector, ti)); |
7acf0277 | 1630 | else |
e0d6609a | 1631 | len = min((sector_t)ci->sector_count, max_io_len(ci->sector, ti)); |
06a426ce | 1632 | |
1dd40c3e | 1633 | __send_duplicate_bios(ci, ti, num_bios, &len); |
a79245b3 MS |
1634 | |
1635 | ci->sector += len; | |
1636 | } while (ci->sector_count -= len); | |
5ae89a87 MS |
1637 | |
1638 | return 0; | |
1639 | } | |
1640 | ||
14fe594d | 1641 | static int __send_discard(struct clone_info *ci) |
23508a96 | 1642 | { |
14fe594d AK |
1643 | return __send_changing_extent_only(ci, get_num_discard_bios, |
1644 | is_split_required_for_discard); | |
23508a96 MS |
1645 | } |
1646 | ||
14fe594d | 1647 | static int __send_write_same(struct clone_info *ci) |
23508a96 | 1648 | { |
14fe594d | 1649 | return __send_changing_extent_only(ci, get_num_write_same_bios, NULL); |
23508a96 MS |
1650 | } |
1651 | ||
e4c93811 AK |
1652 | /* |
1653 | * Select the correct strategy for processing a non-flush bio. | |
1654 | */ | |
14fe594d | 1655 | static int __split_and_process_non_flush(struct clone_info *ci) |
1da177e4 | 1656 | { |
dba14160 | 1657 | struct bio *bio = ci->bio; |
512875bd | 1658 | struct dm_target *ti; |
1c3b13e6 | 1659 | unsigned len; |
1da177e4 | 1660 | |
5ae89a87 | 1661 | if (unlikely(bio->bi_rw & REQ_DISCARD)) |
14fe594d | 1662 | return __send_discard(ci); |
23508a96 | 1663 | else if (unlikely(bio->bi_rw & REQ_WRITE_SAME)) |
14fe594d | 1664 | return __send_write_same(ci); |
5ae89a87 | 1665 | |
512875bd JN |
1666 | ti = dm_table_find_target(ci->map, ci->sector); |
1667 | if (!dm_target_is_valid(ti)) | |
1668 | return -EIO; | |
1669 | ||
1c3b13e6 | 1670 | len = min_t(sector_t, max_io_len(ci->sector, ti), ci->sector_count); |
1da177e4 | 1671 | |
1dd40c3e | 1672 | __clone_and_map_data_bio(ci, ti, ci->sector, &len); |
1da177e4 | 1673 | |
1c3b13e6 KO |
1674 | ci->sector += len; |
1675 | ci->sector_count -= len; | |
1da177e4 | 1676 | |
1c3b13e6 | 1677 | return 0; |
1da177e4 LT |
1678 | } |
1679 | ||
1680 | /* | |
14fe594d | 1681 | * Entry point to split a bio into clones and submit them to the targets. |
1da177e4 | 1682 | */ |
83d5e5b0 MP |
1683 | static void __split_and_process_bio(struct mapped_device *md, |
1684 | struct dm_table *map, struct bio *bio) | |
1da177e4 LT |
1685 | { |
1686 | struct clone_info ci; | |
512875bd | 1687 | int error = 0; |
1da177e4 | 1688 | |
83d5e5b0 | 1689 | if (unlikely(!map)) { |
6a8736d1 | 1690 | bio_io_error(bio); |
f0b9a450 MP |
1691 | return; |
1692 | } | |
692d0eb9 | 1693 | |
83d5e5b0 | 1694 | ci.map = map; |
1da177e4 | 1695 | ci.md = md; |
1da177e4 LT |
1696 | ci.io = alloc_io(md); |
1697 | ci.io->error = 0; | |
1698 | atomic_set(&ci.io->io_count, 1); | |
1699 | ci.io->bio = bio; | |
1700 | ci.io->md = md; | |
f88fb981 | 1701 | spin_lock_init(&ci.io->endio_lock); |
4f024f37 | 1702 | ci.sector = bio->bi_iter.bi_sector; |
1da177e4 | 1703 | |
3eaf840e | 1704 | start_io_acct(ci.io); |
bd2a49b8 | 1705 | |
b372d360 MS |
1706 | if (bio->bi_rw & REQ_FLUSH) { |
1707 | ci.bio = &ci.md->flush_bio; | |
1708 | ci.sector_count = 0; | |
14fe594d | 1709 | error = __send_empty_flush(&ci); |
b372d360 MS |
1710 | /* dec_pending submits any data associated with flush */ |
1711 | } else { | |
6a8736d1 | 1712 | ci.bio = bio; |
d87f4c14 | 1713 | ci.sector_count = bio_sectors(bio); |
b372d360 | 1714 | while (ci.sector_count && !error) |
14fe594d | 1715 | error = __split_and_process_non_flush(&ci); |
d87f4c14 | 1716 | } |
1da177e4 LT |
1717 | |
1718 | /* drop the extra reference count */ | |
512875bd | 1719 | dec_pending(ci.io, error); |
1da177e4 LT |
1720 | } |
1721 | /*----------------------------------------------------------------- | |
1722 | * CRUD END | |
1723 | *---------------------------------------------------------------*/ | |
1724 | ||
f6fccb12 MB |
1725 | static int dm_merge_bvec(struct request_queue *q, |
1726 | struct bvec_merge_data *bvm, | |
1727 | struct bio_vec *biovec) | |
1728 | { | |
1729 | struct mapped_device *md = q->queuedata; | |
83d5e5b0 | 1730 | struct dm_table *map = dm_get_live_table_fast(md); |
f6fccb12 | 1731 | struct dm_target *ti; |
bd4aaf8f MS |
1732 | sector_t max_sectors; |
1733 | int max_size = 0; | |
f6fccb12 MB |
1734 | |
1735 | if (unlikely(!map)) | |
5037108a | 1736 | goto out; |
f6fccb12 MB |
1737 | |
1738 | ti = dm_table_find_target(map, bvm->bi_sector); | |
b01cd5ac | 1739 | if (!dm_target_is_valid(ti)) |
83d5e5b0 | 1740 | goto out; |
f6fccb12 MB |
1741 | |
1742 | /* | |
1743 | * Find maximum amount of I/O that won't need splitting | |
1744 | */ | |
56a67df7 | 1745 | max_sectors = min(max_io_len(bvm->bi_sector, ti), |
bd4aaf8f | 1746 | (sector_t) BIO_MAX_SECTORS); |
f6fccb12 | 1747 | max_size = (max_sectors << SECTOR_SHIFT) - bvm->bi_size; |
bd4aaf8f MS |
1748 | if (max_size < 0) |
1749 | max_size = 0; | |
f6fccb12 MB |
1750 | |
1751 | /* | |
1752 | * merge_bvec_fn() returns number of bytes | |
1753 | * it can accept at this offset | |
1754 | * max is precomputed maximal io size | |
1755 | */ | |
1756 | if (max_size && ti->type->merge) | |
bd4aaf8f | 1757 | max_size = ti->type->merge(ti, bvm, biovec, max_size); |
8cbeb67a MP |
1758 | /* |
1759 | * If the target doesn't support merge method and some of the devices | |
bd4aaf8f MS |
1760 | * provided their merge_bvec method (we know this by looking at |
1761 | * queue_max_hw_sectors), then we can't allow bios with multiple vector | |
1762 | * entries. So always set max_size to 0, and the code below allows | |
1763 | * just one page. | |
8cbeb67a MP |
1764 | */ |
1765 | else if (queue_max_hw_sectors(q) <= PAGE_SIZE >> 9) | |
8cbeb67a | 1766 | max_size = 0; |
f6fccb12 | 1767 | |
5037108a | 1768 | out: |
83d5e5b0 | 1769 | dm_put_live_table_fast(md); |
f6fccb12 MB |
1770 | /* |
1771 | * Always allow an entire first page | |
1772 | */ | |
1773 | if (max_size <= biovec->bv_len && !(bvm->bi_size >> SECTOR_SHIFT)) | |
1774 | max_size = biovec->bv_len; | |
1775 | ||
f6fccb12 MB |
1776 | return max_size; |
1777 | } | |
1778 | ||
1da177e4 LT |
1779 | /* |
1780 | * The request function that just remaps the bio built up by | |
1781 | * dm_merge_bvec. | |
1782 | */ | |
ff36ab34 | 1783 | static void dm_make_request(struct request_queue *q, struct bio *bio) |
1da177e4 | 1784 | { |
12f03a49 | 1785 | int rw = bio_data_dir(bio); |
1da177e4 | 1786 | struct mapped_device *md = q->queuedata; |
83d5e5b0 MP |
1787 | int srcu_idx; |
1788 | struct dm_table *map; | |
1da177e4 | 1789 | |
83d5e5b0 | 1790 | map = dm_get_live_table(md, &srcu_idx); |
1da177e4 | 1791 | |
18c0b223 | 1792 | generic_start_io_acct(rw, bio_sectors(bio), &dm_disk(md)->part0); |
12f03a49 | 1793 | |
6a8736d1 TH |
1794 | /* if we're suspended, we have to queue this io for later */ |
1795 | if (unlikely(test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags))) { | |
83d5e5b0 | 1796 | dm_put_live_table(md, srcu_idx); |
1da177e4 | 1797 | |
6a8736d1 TH |
1798 | if (bio_rw(bio) != READA) |
1799 | queue_io(md, bio); | |
1800 | else | |
54d9a1b4 | 1801 | bio_io_error(bio); |
5a7bbad2 | 1802 | return; |
1da177e4 LT |
1803 | } |
1804 | ||
83d5e5b0 MP |
1805 | __split_and_process_bio(md, map, bio); |
1806 | dm_put_live_table(md, srcu_idx); | |
5a7bbad2 | 1807 | return; |
cec47e3d KU |
1808 | } |
1809 | ||
fd2ed4d2 | 1810 | int dm_request_based(struct mapped_device *md) |
cec47e3d KU |
1811 | { |
1812 | return blk_queue_stackable(md->queue); | |
1813 | } | |
1814 | ||
466d89a6 | 1815 | static void dm_dispatch_clone_request(struct request *clone, struct request *rq) |
cec47e3d KU |
1816 | { |
1817 | int r; | |
1818 | ||
466d89a6 KB |
1819 | if (blk_queue_io_stat(clone->q)) |
1820 | clone->cmd_flags |= REQ_IO_STAT; | |
cec47e3d | 1821 | |
466d89a6 KB |
1822 | clone->start_time = jiffies; |
1823 | r = blk_insert_cloned_request(clone->q, clone); | |
cec47e3d | 1824 | if (r) |
466d89a6 | 1825 | /* must complete clone in terms of original request */ |
cec47e3d KU |
1826 | dm_complete_request(rq, r); |
1827 | } | |
cec47e3d | 1828 | |
78d8e58a MS |
1829 | static int dm_rq_bio_constructor(struct bio *bio, struct bio *bio_orig, |
1830 | void *data) | |
cec47e3d | 1831 | { |
78d8e58a MS |
1832 | struct dm_rq_target_io *tio = data; |
1833 | struct dm_rq_clone_bio_info *info = | |
1834 | container_of(bio, struct dm_rq_clone_bio_info, clone); | |
1835 | ||
1836 | info->orig = bio_orig; | |
1837 | info->tio = tio; | |
1838 | bio->bi_end_io = end_clone_bio; | |
1839 | ||
1840 | return 0; | |
1841 | } | |
1842 | ||
1843 | static int setup_clone(struct request *clone, struct request *rq, | |
1844 | struct dm_rq_target_io *tio, gfp_t gfp_mask) | |
cec47e3d | 1845 | { |
78d8e58a MS |
1846 | int r; |
1847 | ||
1848 | r = blk_rq_prep_clone(clone, rq, tio->md->bs, gfp_mask, | |
1849 | dm_rq_bio_constructor, tio); | |
1850 | if (r) | |
1851 | return r; | |
1852 | ||
1853 | clone->cmd = rq->cmd; | |
1854 | clone->cmd_len = rq->cmd_len; | |
1855 | clone->sense = rq->sense; | |
cec47e3d KU |
1856 | clone->end_io = end_clone_request; |
1857 | clone->end_io_data = tio; | |
78d8e58a | 1858 | |
1ae49ea2 | 1859 | tio->clone = clone; |
78d8e58a MS |
1860 | |
1861 | return 0; | |
cec47e3d KU |
1862 | } |
1863 | ||
6facdaff | 1864 | static struct request *clone_rq(struct request *rq, struct mapped_device *md, |
466d89a6 | 1865 | struct dm_rq_target_io *tio, gfp_t gfp_mask) |
1ae49ea2 | 1866 | { |
02233342 MS |
1867 | /* |
1868 | * Do not allocate a clone if tio->clone was already set | |
1869 | * (see: dm_mq_queue_rq). | |
1870 | */ | |
1871 | bool alloc_clone = !tio->clone; | |
1872 | struct request *clone; | |
1ae49ea2 | 1873 | |
02233342 MS |
1874 | if (alloc_clone) { |
1875 | clone = alloc_clone_request(md, gfp_mask); | |
1876 | if (!clone) | |
1877 | return NULL; | |
1878 | } else | |
1879 | clone = tio->clone; | |
1ae49ea2 MS |
1880 | |
1881 | blk_rq_init(NULL, clone); | |
78d8e58a MS |
1882 | if (setup_clone(clone, rq, tio, gfp_mask)) { |
1883 | /* -ENOMEM */ | |
1884 | if (alloc_clone) | |
1885 | free_clone_request(md, clone); | |
1886 | return NULL; | |
1887 | } | |
1ae49ea2 MS |
1888 | |
1889 | return clone; | |
1890 | } | |
1891 | ||
2eb6e1e3 KB |
1892 | static void map_tio_request(struct kthread_work *work); |
1893 | ||
bfebd1cd MS |
1894 | static void init_tio(struct dm_rq_target_io *tio, struct request *rq, |
1895 | struct mapped_device *md) | |
1896 | { | |
1897 | tio->md = md; | |
1898 | tio->ti = NULL; | |
1899 | tio->clone = NULL; | |
1900 | tio->orig = rq; | |
1901 | tio->error = 0; | |
1902 | memset(&tio->info, 0, sizeof(tio->info)); | |
02233342 MS |
1903 | if (md->kworker_task) |
1904 | init_kthread_work(&tio->work, map_tio_request); | |
bfebd1cd MS |
1905 | } |
1906 | ||
466d89a6 KB |
1907 | static struct dm_rq_target_io *prep_tio(struct request *rq, |
1908 | struct mapped_device *md, gfp_t gfp_mask) | |
6facdaff | 1909 | { |
6facdaff | 1910 | struct dm_rq_target_io *tio; |
e5863d9a MS |
1911 | int srcu_idx; |
1912 | struct dm_table *table; | |
6facdaff KU |
1913 | |
1914 | tio = alloc_rq_tio(md, gfp_mask); | |
1915 | if (!tio) | |
1916 | return NULL; | |
1917 | ||
bfebd1cd | 1918 | init_tio(tio, rq, md); |
6facdaff | 1919 | |
e5863d9a MS |
1920 | table = dm_get_live_table(md, &srcu_idx); |
1921 | if (!dm_table_mq_request_based(table)) { | |
1922 | if (!clone_rq(rq, md, tio, gfp_mask)) { | |
1923 | dm_put_live_table(md, srcu_idx); | |
1924 | free_rq_tio(tio); | |
1925 | return NULL; | |
1926 | } | |
6facdaff | 1927 | } |
e5863d9a | 1928 | dm_put_live_table(md, srcu_idx); |
6facdaff | 1929 | |
466d89a6 | 1930 | return tio; |
6facdaff KU |
1931 | } |
1932 | ||
cec47e3d KU |
1933 | /* |
1934 | * Called with the queue lock held. | |
1935 | */ | |
1936 | static int dm_prep_fn(struct request_queue *q, struct request *rq) | |
1937 | { | |
1938 | struct mapped_device *md = q->queuedata; | |
466d89a6 | 1939 | struct dm_rq_target_io *tio; |
cec47e3d | 1940 | |
cec47e3d KU |
1941 | if (unlikely(rq->special)) { |
1942 | DMWARN("Already has something in rq->special."); | |
1943 | return BLKPREP_KILL; | |
1944 | } | |
1945 | ||
466d89a6 KB |
1946 | tio = prep_tio(rq, md, GFP_ATOMIC); |
1947 | if (!tio) | |
cec47e3d | 1948 | return BLKPREP_DEFER; |
cec47e3d | 1949 | |
466d89a6 | 1950 | rq->special = tio; |
cec47e3d KU |
1951 | rq->cmd_flags |= REQ_DONTPREP; |
1952 | ||
1953 | return BLKPREP_OK; | |
1954 | } | |
1955 | ||
9eef87da KU |
1956 | /* |
1957 | * Returns: | |
e5863d9a MS |
1958 | * 0 : the request has been processed |
1959 | * DM_MAPIO_REQUEUE : the original request needs to be requeued | |
1960 | * < 0 : the request was completed due to failure | |
9eef87da | 1961 | */ |
bfebd1cd | 1962 | static int map_request(struct dm_rq_target_io *tio, struct request *rq, |
9eef87da | 1963 | struct mapped_device *md) |
cec47e3d | 1964 | { |
e5863d9a | 1965 | int r; |
bfebd1cd | 1966 | struct dm_target *ti = tio->ti; |
e5863d9a MS |
1967 | struct request *clone = NULL; |
1968 | ||
1969 | if (tio->clone) { | |
1970 | clone = tio->clone; | |
1971 | r = ti->type->map_rq(ti, clone, &tio->info); | |
1972 | } else { | |
1973 | r = ti->type->clone_and_map_rq(ti, rq, &tio->info, &clone); | |
1974 | if (r < 0) { | |
1975 | /* The target wants to complete the I/O */ | |
1976 | dm_kill_unmapped_request(rq, r); | |
1977 | return r; | |
1978 | } | |
3a140755 JN |
1979 | if (r != DM_MAPIO_REMAPPED) |
1980 | return r; | |
78d8e58a MS |
1981 | if (setup_clone(clone, rq, tio, GFP_ATOMIC)) { |
1982 | /* -ENOMEM */ | |
1983 | ti->type->release_clone_rq(clone); | |
1984 | return DM_MAPIO_REQUEUE; | |
1985 | } | |
e5863d9a | 1986 | } |
cec47e3d | 1987 | |
cec47e3d KU |
1988 | switch (r) { |
1989 | case DM_MAPIO_SUBMITTED: | |
1990 | /* The target has taken the I/O to submit by itself later */ | |
1991 | break; | |
1992 | case DM_MAPIO_REMAPPED: | |
1993 | /* The target has remapped the I/O so dispatch it */ | |
6db4ccd6 | 1994 | trace_block_rq_remap(clone->q, clone, disk_devt(dm_disk(md)), |
466d89a6 KB |
1995 | blk_rq_pos(rq)); |
1996 | dm_dispatch_clone_request(clone, rq); | |
cec47e3d KU |
1997 | break; |
1998 | case DM_MAPIO_REQUEUE: | |
1999 | /* The target wants to requeue the I/O */ | |
2d76fff1 | 2000 | dm_requeue_original_request(md, tio->orig); |
cec47e3d KU |
2001 | break; |
2002 | default: | |
2003 | if (r > 0) { | |
2004 | DMWARN("unimplemented target map return value: %d", r); | |
2005 | BUG(); | |
2006 | } | |
2007 | ||
2008 | /* The target wants to complete the I/O */ | |
466d89a6 | 2009 | dm_kill_unmapped_request(rq, r); |
e5863d9a | 2010 | return r; |
cec47e3d | 2011 | } |
9eef87da | 2012 | |
e5863d9a | 2013 | return 0; |
cec47e3d KU |
2014 | } |
2015 | ||
2eb6e1e3 | 2016 | static void map_tio_request(struct kthread_work *work) |
ba1cbad9 | 2017 | { |
2eb6e1e3 | 2018 | struct dm_rq_target_io *tio = container_of(work, struct dm_rq_target_io, work); |
e5863d9a MS |
2019 | struct request *rq = tio->orig; |
2020 | struct mapped_device *md = tio->md; | |
ba1cbad9 | 2021 | |
bfebd1cd | 2022 | if (map_request(tio, rq, md) == DM_MAPIO_REQUEUE) |
2d76fff1 | 2023 | dm_requeue_original_request(md, rq); |
2eb6e1e3 KB |
2024 | } |
2025 | ||
466d89a6 | 2026 | static void dm_start_request(struct mapped_device *md, struct request *orig) |
ba1cbad9 | 2027 | { |
bfebd1cd MS |
2028 | if (!orig->q->mq_ops) |
2029 | blk_start_request(orig); | |
2030 | else | |
2031 | blk_mq_start_request(orig); | |
466d89a6 | 2032 | atomic_inc(&md->pending[rq_data_dir(orig)]); |
ba1cbad9 | 2033 | |
0ce65797 MS |
2034 | if (md->seq_rq_merge_deadline_usecs) { |
2035 | md->last_rq_pos = rq_end_sector(orig); | |
2036 | md->last_rq_rw = rq_data_dir(orig); | |
2037 | md->last_rq_start_time = ktime_get(); | |
2038 | } | |
de3ec86d | 2039 | |
e262f347 MP |
2040 | if (unlikely(dm_stats_used(&md->stats))) { |
2041 | struct dm_rq_target_io *tio = tio_from_request(orig); | |
2042 | tio->duration_jiffies = jiffies; | |
2043 | tio->n_sectors = blk_rq_sectors(orig); | |
2044 | dm_stats_account_io(&md->stats, orig->cmd_flags, blk_rq_pos(orig), | |
2045 | tio->n_sectors, false, 0, &tio->stats_aux); | |
2046 | } | |
2047 | ||
ba1cbad9 MS |
2048 | /* |
2049 | * Hold the md reference here for the in-flight I/O. | |
2050 | * We can't rely on the reference count by device opener, | |
2051 | * because the device may be closed during the request completion | |
2052 | * when all bios are completed. | |
2053 | * See the comment in rq_completed() too. | |
2054 | */ | |
2055 | dm_get(md); | |
ba1cbad9 MS |
2056 | } |
2057 | ||
0ce65797 MS |
2058 | #define MAX_SEQ_RQ_MERGE_DEADLINE_USECS 100000 |
2059 | ||
2060 | ssize_t dm_attr_rq_based_seq_io_merge_deadline_show(struct mapped_device *md, char *buf) | |
2061 | { | |
2062 | return sprintf(buf, "%u\n", md->seq_rq_merge_deadline_usecs); | |
2063 | } | |
2064 | ||
2065 | ssize_t dm_attr_rq_based_seq_io_merge_deadline_store(struct mapped_device *md, | |
2066 | const char *buf, size_t count) | |
2067 | { | |
2068 | unsigned deadline; | |
2069 | ||
17e149b8 | 2070 | if (!dm_request_based(md) || md->use_blk_mq) |
0ce65797 MS |
2071 | return count; |
2072 | ||
2073 | if (kstrtouint(buf, 10, &deadline)) | |
2074 | return -EINVAL; | |
2075 | ||
2076 | if (deadline > MAX_SEQ_RQ_MERGE_DEADLINE_USECS) | |
2077 | deadline = MAX_SEQ_RQ_MERGE_DEADLINE_USECS; | |
2078 | ||
2079 | md->seq_rq_merge_deadline_usecs = deadline; | |
2080 | ||
2081 | return count; | |
2082 | } | |
2083 | ||
2084 | static bool dm_request_peeked_before_merge_deadline(struct mapped_device *md) | |
2085 | { | |
2086 | ktime_t kt_deadline; | |
2087 | ||
2088 | if (!md->seq_rq_merge_deadline_usecs) | |
2089 | return false; | |
2090 | ||
2091 | kt_deadline = ns_to_ktime((u64)md->seq_rq_merge_deadline_usecs * NSEC_PER_USEC); | |
2092 | kt_deadline = ktime_add_safe(md->last_rq_start_time, kt_deadline); | |
2093 | ||
2094 | return !ktime_after(ktime_get(), kt_deadline); | |
2095 | } | |
2096 | ||
cec47e3d KU |
2097 | /* |
2098 | * q->request_fn for request-based dm. | |
2099 | * Called with the queue lock held. | |
2100 | */ | |
2101 | static void dm_request_fn(struct request_queue *q) | |
2102 | { | |
2103 | struct mapped_device *md = q->queuedata; | |
83d5e5b0 MP |
2104 | int srcu_idx; |
2105 | struct dm_table *map = dm_get_live_table(md, &srcu_idx); | |
cec47e3d | 2106 | struct dm_target *ti; |
466d89a6 | 2107 | struct request *rq; |
2eb6e1e3 | 2108 | struct dm_rq_target_io *tio; |
29e4013d | 2109 | sector_t pos; |
cec47e3d KU |
2110 | |
2111 | /* | |
b4324fee KU |
2112 | * For suspend, check blk_queue_stopped() and increment |
2113 | * ->pending within a single queue_lock not to increment the | |
2114 | * number of in-flight I/Os after the queue is stopped in | |
2115 | * dm_suspend(). | |
cec47e3d | 2116 | */ |
7eaceacc | 2117 | while (!blk_queue_stopped(q)) { |
cec47e3d KU |
2118 | rq = blk_peek_request(q); |
2119 | if (!rq) | |
9d1deb83 | 2120 | goto out; |
cec47e3d | 2121 | |
29e4013d TH |
2122 | /* always use block 0 to find the target for flushes for now */ |
2123 | pos = 0; | |
2124 | if (!(rq->cmd_flags & REQ_FLUSH)) | |
2125 | pos = blk_rq_pos(rq); | |
2126 | ||
2127 | ti = dm_table_find_target(map, pos); | |
ba1cbad9 MS |
2128 | if (!dm_target_is_valid(ti)) { |
2129 | /* | |
466d89a6 | 2130 | * Must perform setup, that rq_completed() requires, |
ba1cbad9 MS |
2131 | * before calling dm_kill_unmapped_request |
2132 | */ | |
2133 | DMERR_LIMIT("request attempted access beyond the end of device"); | |
466d89a6 KB |
2134 | dm_start_request(md, rq); |
2135 | dm_kill_unmapped_request(rq, -EIO); | |
ba1cbad9 MS |
2136 | continue; |
2137 | } | |
d0bcb878 | 2138 | |
0ce65797 MS |
2139 | if (dm_request_peeked_before_merge_deadline(md) && |
2140 | md_in_flight(md) && rq->bio && rq->bio->bi_vcnt == 1 && | |
de3ec86d MS |
2141 | md->last_rq_pos == pos && md->last_rq_rw == rq_data_dir(rq)) |
2142 | goto delay_and_out; | |
2143 | ||
cec47e3d | 2144 | if (ti->type->busy && ti->type->busy(ti)) |
7eaceacc | 2145 | goto delay_and_out; |
cec47e3d | 2146 | |
466d89a6 | 2147 | dm_start_request(md, rq); |
9eef87da | 2148 | |
bfebd1cd | 2149 | tio = tio_from_request(rq); |
2eb6e1e3 KB |
2150 | /* Establish tio->ti before queuing work (map_tio_request) */ |
2151 | tio->ti = ti; | |
2152 | queue_kthread_work(&md->kworker, &tio->work); | |
052189a2 | 2153 | BUG_ON(!irqs_disabled()); |
cec47e3d KU |
2154 | } |
2155 | ||
2156 | goto out; | |
2157 | ||
7eaceacc | 2158 | delay_and_out: |
d548b34b | 2159 | blk_delay_queue(q, HZ / 100); |
cec47e3d | 2160 | out: |
83d5e5b0 | 2161 | dm_put_live_table(md, srcu_idx); |
cec47e3d KU |
2162 | } |
2163 | ||
1da177e4 LT |
2164 | static int dm_any_congested(void *congested_data, int bdi_bits) |
2165 | { | |
8a57dfc6 CS |
2166 | int r = bdi_bits; |
2167 | struct mapped_device *md = congested_data; | |
2168 | struct dm_table *map; | |
1da177e4 | 2169 | |
1eb787ec | 2170 | if (!test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags)) { |
83d5e5b0 | 2171 | map = dm_get_live_table_fast(md); |
8a57dfc6 | 2172 | if (map) { |
cec47e3d KU |
2173 | /* |
2174 | * Request-based dm cares about only own queue for | |
2175 | * the query about congestion status of request_queue | |
2176 | */ | |
2177 | if (dm_request_based(md)) | |
4452226e | 2178 | r = md->queue->backing_dev_info.wb.state & |
cec47e3d KU |
2179 | bdi_bits; |
2180 | else | |
2181 | r = dm_table_any_congested(map, bdi_bits); | |
8a57dfc6 | 2182 | } |
83d5e5b0 | 2183 | dm_put_live_table_fast(md); |
8a57dfc6 CS |
2184 | } |
2185 | ||
1da177e4 LT |
2186 | return r; |
2187 | } | |
2188 | ||
2189 | /*----------------------------------------------------------------- | |
2190 | * An IDR is used to keep track of allocated minor numbers. | |
2191 | *---------------------------------------------------------------*/ | |
2b06cfff | 2192 | static void free_minor(int minor) |
1da177e4 | 2193 | { |
f32c10b0 | 2194 | spin_lock(&_minor_lock); |
1da177e4 | 2195 | idr_remove(&_minor_idr, minor); |
f32c10b0 | 2196 | spin_unlock(&_minor_lock); |
1da177e4 LT |
2197 | } |
2198 | ||
2199 | /* | |
2200 | * See if the device with a specific minor # is free. | |
2201 | */ | |
cf13ab8e | 2202 | static int specific_minor(int minor) |
1da177e4 | 2203 | { |
c9d76be6 | 2204 | int r; |
1da177e4 LT |
2205 | |
2206 | if (minor >= (1 << MINORBITS)) | |
2207 | return -EINVAL; | |
2208 | ||
c9d76be6 | 2209 | idr_preload(GFP_KERNEL); |
f32c10b0 | 2210 | spin_lock(&_minor_lock); |
1da177e4 | 2211 | |
c9d76be6 | 2212 | r = idr_alloc(&_minor_idr, MINOR_ALLOCED, minor, minor + 1, GFP_NOWAIT); |
1da177e4 | 2213 | |
f32c10b0 | 2214 | spin_unlock(&_minor_lock); |
c9d76be6 TH |
2215 | idr_preload_end(); |
2216 | if (r < 0) | |
2217 | return r == -ENOSPC ? -EBUSY : r; | |
2218 | return 0; | |
1da177e4 LT |
2219 | } |
2220 | ||
cf13ab8e | 2221 | static int next_free_minor(int *minor) |
1da177e4 | 2222 | { |
c9d76be6 | 2223 | int r; |
62f75c2f | 2224 | |
c9d76be6 | 2225 | idr_preload(GFP_KERNEL); |
f32c10b0 | 2226 | spin_lock(&_minor_lock); |
1da177e4 | 2227 | |
c9d76be6 | 2228 | r = idr_alloc(&_minor_idr, MINOR_ALLOCED, 0, 1 << MINORBITS, GFP_NOWAIT); |
1da177e4 | 2229 | |
f32c10b0 | 2230 | spin_unlock(&_minor_lock); |
c9d76be6 TH |
2231 | idr_preload_end(); |
2232 | if (r < 0) | |
2233 | return r; | |
2234 | *minor = r; | |
2235 | return 0; | |
1da177e4 LT |
2236 | } |
2237 | ||
83d5cde4 | 2238 | static const struct block_device_operations dm_blk_dops; |
1da177e4 | 2239 | |
53d5914f MP |
2240 | static void dm_wq_work(struct work_struct *work); |
2241 | ||
4a0b4ddf MS |
2242 | static void dm_init_md_queue(struct mapped_device *md) |
2243 | { | |
2244 | /* | |
2245 | * Request-based dm devices cannot be stacked on top of bio-based dm | |
bfebd1cd | 2246 | * devices. The type of this dm device may not have been decided yet. |
4a0b4ddf MS |
2247 | * The type is decided at the first table loading time. |
2248 | * To prevent problematic device stacking, clear the queue flag | |
2249 | * for request stacking support until then. | |
2250 | * | |
2251 | * This queue is new, so no concurrency on the queue_flags. | |
2252 | */ | |
2253 | queue_flag_clear_unlocked(QUEUE_FLAG_STACKABLE, md->queue); | |
bfebd1cd | 2254 | } |
4a0b4ddf | 2255 | |
bfebd1cd MS |
2256 | static void dm_init_old_md_queue(struct mapped_device *md) |
2257 | { | |
17e149b8 | 2258 | md->use_blk_mq = false; |
bfebd1cd MS |
2259 | dm_init_md_queue(md); |
2260 | ||
2261 | /* | |
2262 | * Initialize aspects of queue that aren't relevant for blk-mq | |
2263 | */ | |
4a0b4ddf MS |
2264 | md->queue->queuedata = md; |
2265 | md->queue->backing_dev_info.congested_fn = dm_any_congested; | |
2266 | md->queue->backing_dev_info.congested_data = md; | |
ff36ab34 | 2267 | |
4a0b4ddf | 2268 | blk_queue_bounce_limit(md->queue, BLK_BOUNCE_ANY); |
4a0b4ddf MS |
2269 | } |
2270 | ||
0f20972f MS |
2271 | static void cleanup_mapped_device(struct mapped_device *md) |
2272 | { | |
0f20972f MS |
2273 | if (md->wq) |
2274 | destroy_workqueue(md->wq); | |
2275 | if (md->kworker_task) | |
2276 | kthread_stop(md->kworker_task); | |
2277 | if (md->io_pool) | |
2278 | mempool_destroy(md->io_pool); | |
2279 | if (md->rq_pool) | |
2280 | mempool_destroy(md->rq_pool); | |
2281 | if (md->bs) | |
2282 | bioset_free(md->bs); | |
2283 | ||
b06075a9 MP |
2284 | cleanup_srcu_struct(&md->io_barrier); |
2285 | ||
0f20972f MS |
2286 | if (md->disk) { |
2287 | spin_lock(&_minor_lock); | |
2288 | md->disk->private_data = NULL; | |
2289 | spin_unlock(&_minor_lock); | |
2290 | if (blk_get_integrity(md->disk)) | |
2291 | blk_integrity_unregister(md->disk); | |
2292 | del_gendisk(md->disk); | |
2293 | put_disk(md->disk); | |
2294 | } | |
2295 | ||
2296 | if (md->queue) | |
2297 | blk_cleanup_queue(md->queue); | |
2298 | ||
2299 | if (md->bdev) { | |
2300 | bdput(md->bdev); | |
2301 | md->bdev = NULL; | |
2302 | } | |
2303 | } | |
2304 | ||
1da177e4 LT |
2305 | /* |
2306 | * Allocate and initialise a blank device with a given minor. | |
2307 | */ | |
2b06cfff | 2308 | static struct mapped_device *alloc_dev(int minor) |
1da177e4 LT |
2309 | { |
2310 | int r; | |
cf13ab8e | 2311 | struct mapped_device *md = kzalloc(sizeof(*md), GFP_KERNEL); |
ba61fdd1 | 2312 | void *old_md; |
1da177e4 LT |
2313 | |
2314 | if (!md) { | |
2315 | DMWARN("unable to allocate device, out of memory."); | |
2316 | return NULL; | |
2317 | } | |
2318 | ||
10da4f79 | 2319 | if (!try_module_get(THIS_MODULE)) |
6ed7ade8 | 2320 | goto bad_module_get; |
10da4f79 | 2321 | |
1da177e4 | 2322 | /* get a minor number for the dev */ |
2b06cfff | 2323 | if (minor == DM_ANY_MINOR) |
cf13ab8e | 2324 | r = next_free_minor(&minor); |
2b06cfff | 2325 | else |
cf13ab8e | 2326 | r = specific_minor(minor); |
1da177e4 | 2327 | if (r < 0) |
6ed7ade8 | 2328 | goto bad_minor; |
1da177e4 | 2329 | |
83d5e5b0 MP |
2330 | r = init_srcu_struct(&md->io_barrier); |
2331 | if (r < 0) | |
2332 | goto bad_io_barrier; | |
2333 | ||
17e149b8 | 2334 | md->use_blk_mq = use_blk_mq; |
a5664dad | 2335 | md->type = DM_TYPE_NONE; |
e61290a4 | 2336 | mutex_init(&md->suspend_lock); |
a5664dad | 2337 | mutex_init(&md->type_lock); |
86f1152b | 2338 | mutex_init(&md->table_devices_lock); |
022c2611 | 2339 | spin_lock_init(&md->deferred_lock); |
1da177e4 | 2340 | atomic_set(&md->holders, 1); |
5c6bd75d | 2341 | atomic_set(&md->open_count, 0); |
1da177e4 | 2342 | atomic_set(&md->event_nr, 0); |
7a8c3d3b MA |
2343 | atomic_set(&md->uevent_seq, 0); |
2344 | INIT_LIST_HEAD(&md->uevent_list); | |
86f1152b | 2345 | INIT_LIST_HEAD(&md->table_devices); |
7a8c3d3b | 2346 | spin_lock_init(&md->uevent_lock); |
1da177e4 | 2347 | |
4a0b4ddf | 2348 | md->queue = blk_alloc_queue(GFP_KERNEL); |
1da177e4 | 2349 | if (!md->queue) |
0f20972f | 2350 | goto bad; |
1da177e4 | 2351 | |
4a0b4ddf | 2352 | dm_init_md_queue(md); |
9faf400f | 2353 | |
1da177e4 LT |
2354 | md->disk = alloc_disk(1); |
2355 | if (!md->disk) | |
0f20972f | 2356 | goto bad; |
1da177e4 | 2357 | |
316d315b NK |
2358 | atomic_set(&md->pending[0], 0); |
2359 | atomic_set(&md->pending[1], 0); | |
f0b04115 | 2360 | init_waitqueue_head(&md->wait); |
53d5914f | 2361 | INIT_WORK(&md->work, dm_wq_work); |
f0b04115 | 2362 | init_waitqueue_head(&md->eventq); |
2995fa78 | 2363 | init_completion(&md->kobj_holder.completion); |
2eb6e1e3 | 2364 | md->kworker_task = NULL; |
f0b04115 | 2365 | |
1da177e4 LT |
2366 | md->disk->major = _major; |
2367 | md->disk->first_minor = minor; | |
2368 | md->disk->fops = &dm_blk_dops; | |
2369 | md->disk->queue = md->queue; | |
2370 | md->disk->private_data = md; | |
2371 | sprintf(md->disk->disk_name, "dm-%d", minor); | |
2372 | add_disk(md->disk); | |
7e51f257 | 2373 | format_dev_t(md->name, MKDEV(_major, minor)); |
1da177e4 | 2374 | |
670368a8 | 2375 | md->wq = alloc_workqueue("kdmflush", WQ_MEM_RECLAIM, 0); |
304f3f6a | 2376 | if (!md->wq) |
0f20972f | 2377 | goto bad; |
304f3f6a | 2378 | |
32a926da MP |
2379 | md->bdev = bdget_disk(md->disk, 0); |
2380 | if (!md->bdev) | |
0f20972f | 2381 | goto bad; |
32a926da | 2382 | |
6a8736d1 TH |
2383 | bio_init(&md->flush_bio); |
2384 | md->flush_bio.bi_bdev = md->bdev; | |
2385 | md->flush_bio.bi_rw = WRITE_FLUSH; | |
2386 | ||
fd2ed4d2 MP |
2387 | dm_stats_init(&md->stats); |
2388 | ||
ba61fdd1 | 2389 | /* Populate the mapping, nobody knows we exist yet */ |
f32c10b0 | 2390 | spin_lock(&_minor_lock); |
ba61fdd1 | 2391 | old_md = idr_replace(&_minor_idr, md, minor); |
f32c10b0 | 2392 | spin_unlock(&_minor_lock); |
ba61fdd1 JM |
2393 | |
2394 | BUG_ON(old_md != MINOR_ALLOCED); | |
2395 | ||
1da177e4 LT |
2396 | return md; |
2397 | ||
0f20972f MS |
2398 | bad: |
2399 | cleanup_mapped_device(md); | |
83d5e5b0 | 2400 | bad_io_barrier: |
1da177e4 | 2401 | free_minor(minor); |
6ed7ade8 | 2402 | bad_minor: |
10da4f79 | 2403 | module_put(THIS_MODULE); |
6ed7ade8 | 2404 | bad_module_get: |
1da177e4 LT |
2405 | kfree(md); |
2406 | return NULL; | |
2407 | } | |
2408 | ||
ae9da83f JN |
2409 | static void unlock_fs(struct mapped_device *md); |
2410 | ||
1da177e4 LT |
2411 | static void free_dev(struct mapped_device *md) |
2412 | { | |
f331c029 | 2413 | int minor = MINOR(disk_devt(md->disk)); |
63d94e48 | 2414 | |
32a926da | 2415 | unlock_fs(md); |
2eb6e1e3 | 2416 | |
0f20972f MS |
2417 | cleanup_mapped_device(md); |
2418 | if (md->use_blk_mq) | |
2419 | blk_mq_free_tag_set(&md->tag_set); | |
63a4f065 | 2420 | |
86f1152b | 2421 | free_table_devices(&md->table_devices); |
63a4f065 | 2422 | dm_stats_cleanup(&md->stats); |
63a4f065 MS |
2423 | free_minor(minor); |
2424 | ||
10da4f79 | 2425 | module_put(THIS_MODULE); |
1da177e4 LT |
2426 | kfree(md); |
2427 | } | |
2428 | ||
e6ee8c0b KU |
2429 | static void __bind_mempools(struct mapped_device *md, struct dm_table *t) |
2430 | { | |
c0820cf5 | 2431 | struct dm_md_mempools *p = dm_table_get_md_mempools(t); |
e6ee8c0b | 2432 | |
4e6e36c3 MS |
2433 | if (md->bs) { |
2434 | /* The md already has necessary mempools. */ | |
2435 | if (dm_table_get_type(t) == DM_TYPE_BIO_BASED) { | |
16245bdc JN |
2436 | /* |
2437 | * Reload bioset because front_pad may have changed | |
2438 | * because a different table was loaded. | |
2439 | */ | |
2440 | bioset_free(md->bs); | |
2441 | md->bs = p->bs; | |
2442 | p->bs = NULL; | |
16245bdc | 2443 | } |
4e6e36c3 MS |
2444 | /* |
2445 | * There's no need to reload with request-based dm | |
2446 | * because the size of front_pad doesn't change. | |
2447 | * Note for future: If you are to reload bioset, | |
2448 | * prep-ed requests in the queue may refer | |
2449 | * to bio from the old bioset, so you must walk | |
2450 | * through the queue to unprep. | |
2451 | */ | |
2452 | goto out; | |
c0820cf5 | 2453 | } |
e6ee8c0b | 2454 | |
cbc4e3c1 MS |
2455 | BUG_ON(!p || md->io_pool || md->rq_pool || md->bs); |
2456 | ||
e6ee8c0b KU |
2457 | md->io_pool = p->io_pool; |
2458 | p->io_pool = NULL; | |
1ae49ea2 MS |
2459 | md->rq_pool = p->rq_pool; |
2460 | p->rq_pool = NULL; | |
e6ee8c0b KU |
2461 | md->bs = p->bs; |
2462 | p->bs = NULL; | |
4e6e36c3 | 2463 | |
e6ee8c0b | 2464 | out: |
02233342 | 2465 | /* mempool bind completed, no longer need any mempools in the table */ |
e6ee8c0b KU |
2466 | dm_table_free_md_mempools(t); |
2467 | } | |
2468 | ||
1da177e4 LT |
2469 | /* |
2470 | * Bind a table to the device. | |
2471 | */ | |
2472 | static void event_callback(void *context) | |
2473 | { | |
7a8c3d3b MA |
2474 | unsigned long flags; |
2475 | LIST_HEAD(uevents); | |
1da177e4 LT |
2476 | struct mapped_device *md = (struct mapped_device *) context; |
2477 | ||
7a8c3d3b MA |
2478 | spin_lock_irqsave(&md->uevent_lock, flags); |
2479 | list_splice_init(&md->uevent_list, &uevents); | |
2480 | spin_unlock_irqrestore(&md->uevent_lock, flags); | |
2481 | ||
ed9e1982 | 2482 | dm_send_uevents(&uevents, &disk_to_dev(md->disk)->kobj); |
7a8c3d3b | 2483 | |
1da177e4 LT |
2484 | atomic_inc(&md->event_nr); |
2485 | wake_up(&md->eventq); | |
2486 | } | |
2487 | ||
c217649b MS |
2488 | /* |
2489 | * Protected by md->suspend_lock obtained by dm_swap_table(). | |
2490 | */ | |
4e90188b | 2491 | static void __set_size(struct mapped_device *md, sector_t size) |
1da177e4 | 2492 | { |
4e90188b | 2493 | set_capacity(md->disk, size); |
1da177e4 | 2494 | |
db8fef4f | 2495 | i_size_write(md->bdev->bd_inode, (loff_t)size << SECTOR_SHIFT); |
1da177e4 LT |
2496 | } |
2497 | ||
d5b9dd04 MP |
2498 | /* |
2499 | * Return 1 if the queue has a compulsory merge_bvec_fn function. | |
2500 | * | |
2501 | * If this function returns 0, then the device is either a non-dm | |
2502 | * device without a merge_bvec_fn, or it is a dm device that is | |
2503 | * able to split any bios it receives that are too big. | |
2504 | */ | |
2505 | int dm_queue_merge_is_compulsory(struct request_queue *q) | |
2506 | { | |
2507 | struct mapped_device *dev_md; | |
2508 | ||
2509 | if (!q->merge_bvec_fn) | |
2510 | return 0; | |
2511 | ||
ff36ab34 | 2512 | if (q->make_request_fn == dm_make_request) { |
d5b9dd04 MP |
2513 | dev_md = q->queuedata; |
2514 | if (test_bit(DMF_MERGE_IS_OPTIONAL, &dev_md->flags)) | |
2515 | return 0; | |
2516 | } | |
2517 | ||
2518 | return 1; | |
2519 | } | |
2520 | ||
2521 | static int dm_device_merge_is_compulsory(struct dm_target *ti, | |
2522 | struct dm_dev *dev, sector_t start, | |
2523 | sector_t len, void *data) | |
2524 | { | |
2525 | struct block_device *bdev = dev->bdev; | |
2526 | struct request_queue *q = bdev_get_queue(bdev); | |
2527 | ||
2528 | return dm_queue_merge_is_compulsory(q); | |
2529 | } | |
2530 | ||
2531 | /* | |
2532 | * Return 1 if it is acceptable to ignore merge_bvec_fn based | |
2533 | * on the properties of the underlying devices. | |
2534 | */ | |
2535 | static int dm_table_merge_is_optional(struct dm_table *table) | |
2536 | { | |
2537 | unsigned i = 0; | |
2538 | struct dm_target *ti; | |
2539 | ||
2540 | while (i < dm_table_get_num_targets(table)) { | |
2541 | ti = dm_table_get_target(table, i++); | |
2542 | ||
2543 | if (ti->type->iterate_devices && | |
2544 | ti->type->iterate_devices(ti, dm_device_merge_is_compulsory, NULL)) | |
2545 | return 0; | |
2546 | } | |
2547 | ||
2548 | return 1; | |
2549 | } | |
2550 | ||
042d2a9b AK |
2551 | /* |
2552 | * Returns old map, which caller must destroy. | |
2553 | */ | |
2554 | static struct dm_table *__bind(struct mapped_device *md, struct dm_table *t, | |
2555 | struct queue_limits *limits) | |
1da177e4 | 2556 | { |
042d2a9b | 2557 | struct dm_table *old_map; |
165125e1 | 2558 | struct request_queue *q = md->queue; |
1da177e4 | 2559 | sector_t size; |
d5b9dd04 | 2560 | int merge_is_optional; |
1da177e4 LT |
2561 | |
2562 | size = dm_table_get_size(t); | |
3ac51e74 DW |
2563 | |
2564 | /* | |
2565 | * Wipe any geometry if the size of the table changed. | |
2566 | */ | |
fd2ed4d2 | 2567 | if (size != dm_get_size(md)) |
3ac51e74 DW |
2568 | memset(&md->geometry, 0, sizeof(md->geometry)); |
2569 | ||
32a926da | 2570 | __set_size(md, size); |
d5816876 | 2571 | |
2ca3310e AK |
2572 | dm_table_event_callback(t, event_callback, md); |
2573 | ||
e6ee8c0b KU |
2574 | /* |
2575 | * The queue hasn't been stopped yet, if the old table type wasn't | |
2576 | * for request-based during suspension. So stop it to prevent | |
2577 | * I/O mapping before resume. | |
2578 | * This must be done before setting the queue restrictions, | |
2579 | * because request-based dm may be run just after the setting. | |
2580 | */ | |
bfebd1cd | 2581 | if (dm_table_request_based(t)) |
e6ee8c0b KU |
2582 | stop_queue(q); |
2583 | ||
2584 | __bind_mempools(md, t); | |
2585 | ||
d5b9dd04 MP |
2586 | merge_is_optional = dm_table_merge_is_optional(t); |
2587 | ||
a12f5d48 | 2588 | old_map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock)); |
83d5e5b0 | 2589 | rcu_assign_pointer(md->map, t); |
36a0456f AK |
2590 | md->immutable_target_type = dm_table_get_immutable_target_type(t); |
2591 | ||
754c5fc7 | 2592 | dm_table_set_restrictions(t, q, limits); |
d5b9dd04 MP |
2593 | if (merge_is_optional) |
2594 | set_bit(DMF_MERGE_IS_OPTIONAL, &md->flags); | |
2595 | else | |
2596 | clear_bit(DMF_MERGE_IS_OPTIONAL, &md->flags); | |
41abc4e1 HR |
2597 | if (old_map) |
2598 | dm_sync_table(md); | |
1da177e4 | 2599 | |
042d2a9b | 2600 | return old_map; |
1da177e4 LT |
2601 | } |
2602 | ||
a7940155 AK |
2603 | /* |
2604 | * Returns unbound table for the caller to free. | |
2605 | */ | |
2606 | static struct dm_table *__unbind(struct mapped_device *md) | |
1da177e4 | 2607 | { |
a12f5d48 | 2608 | struct dm_table *map = rcu_dereference_protected(md->map, 1); |
1da177e4 LT |
2609 | |
2610 | if (!map) | |
a7940155 | 2611 | return NULL; |
1da177e4 LT |
2612 | |
2613 | dm_table_event_callback(map, NULL, NULL); | |
9cdb8520 | 2614 | RCU_INIT_POINTER(md->map, NULL); |
83d5e5b0 | 2615 | dm_sync_table(md); |
a7940155 AK |
2616 | |
2617 | return map; | |
1da177e4 LT |
2618 | } |
2619 | ||
2620 | /* | |
2621 | * Constructor for a new device. | |
2622 | */ | |
2b06cfff | 2623 | int dm_create(int minor, struct mapped_device **result) |
1da177e4 LT |
2624 | { |
2625 | struct mapped_device *md; | |
2626 | ||
2b06cfff | 2627 | md = alloc_dev(minor); |
1da177e4 LT |
2628 | if (!md) |
2629 | return -ENXIO; | |
2630 | ||
784aae73 MB |
2631 | dm_sysfs_init(md); |
2632 | ||
1da177e4 LT |
2633 | *result = md; |
2634 | return 0; | |
2635 | } | |
2636 | ||
a5664dad MS |
2637 | /* |
2638 | * Functions to manage md->type. | |
2639 | * All are required to hold md->type_lock. | |
2640 | */ | |
2641 | void dm_lock_md_type(struct mapped_device *md) | |
2642 | { | |
2643 | mutex_lock(&md->type_lock); | |
2644 | } | |
2645 | ||
2646 | void dm_unlock_md_type(struct mapped_device *md) | |
2647 | { | |
2648 | mutex_unlock(&md->type_lock); | |
2649 | } | |
2650 | ||
2651 | void dm_set_md_type(struct mapped_device *md, unsigned type) | |
2652 | { | |
00c4fc3b | 2653 | BUG_ON(!mutex_is_locked(&md->type_lock)); |
a5664dad MS |
2654 | md->type = type; |
2655 | } | |
2656 | ||
2657 | unsigned dm_get_md_type(struct mapped_device *md) | |
2658 | { | |
00c4fc3b | 2659 | BUG_ON(!mutex_is_locked(&md->type_lock)); |
a5664dad MS |
2660 | return md->type; |
2661 | } | |
2662 | ||
36a0456f AK |
2663 | struct target_type *dm_get_immutable_target_type(struct mapped_device *md) |
2664 | { | |
2665 | return md->immutable_target_type; | |
2666 | } | |
2667 | ||
f84cb8a4 MS |
2668 | /* |
2669 | * The queue_limits are only valid as long as you have a reference | |
2670 | * count on 'md'. | |
2671 | */ | |
2672 | struct queue_limits *dm_get_queue_limits(struct mapped_device *md) | |
2673 | { | |
2674 | BUG_ON(!atomic_read(&md->holders)); | |
2675 | return &md->queue->limits; | |
2676 | } | |
2677 | EXPORT_SYMBOL_GPL(dm_get_queue_limits); | |
2678 | ||
bfebd1cd MS |
2679 | static void init_rq_based_worker_thread(struct mapped_device *md) |
2680 | { | |
2681 | /* Initialize the request-based DM worker thread */ | |
2682 | init_kthread_worker(&md->kworker); | |
2683 | md->kworker_task = kthread_run(kthread_worker_fn, &md->kworker, | |
2684 | "kdmwork-%s", dm_device_name(md)); | |
2685 | } | |
2686 | ||
4a0b4ddf MS |
2687 | /* |
2688 | * Fully initialize a request-based queue (->elevator, ->request_fn, etc). | |
2689 | */ | |
2690 | static int dm_init_request_based_queue(struct mapped_device *md) | |
2691 | { | |
2692 | struct request_queue *q = NULL; | |
2693 | ||
4a0b4ddf MS |
2694 | /* Fully initialize the queue */ |
2695 | q = blk_init_allocated_queue(md->queue, dm_request_fn, NULL); | |
2696 | if (!q) | |
bfebd1cd | 2697 | return -EINVAL; |
4a0b4ddf | 2698 | |
0ce65797 MS |
2699 | /* disable dm_request_fn's merge heuristic by default */ |
2700 | md->seq_rq_merge_deadline_usecs = 0; | |
2701 | ||
4a0b4ddf | 2702 | md->queue = q; |
bfebd1cd | 2703 | dm_init_old_md_queue(md); |
4a0b4ddf MS |
2704 | blk_queue_softirq_done(md->queue, dm_softirq_done); |
2705 | blk_queue_prep_rq(md->queue, dm_prep_fn); | |
4a0b4ddf | 2706 | |
bfebd1cd | 2707 | init_rq_based_worker_thread(md); |
2eb6e1e3 | 2708 | |
4a0b4ddf MS |
2709 | elv_register_queue(md->queue); |
2710 | ||
bfebd1cd MS |
2711 | return 0; |
2712 | } | |
2713 | ||
2714 | static int dm_mq_init_request(void *data, struct request *rq, | |
2715 | unsigned int hctx_idx, unsigned int request_idx, | |
2716 | unsigned int numa_node) | |
2717 | { | |
2718 | struct mapped_device *md = data; | |
2719 | struct dm_rq_target_io *tio = blk_mq_rq_to_pdu(rq); | |
2720 | ||
2721 | /* | |
2722 | * Must initialize md member of tio, otherwise it won't | |
2723 | * be available in dm_mq_queue_rq. | |
2724 | */ | |
2725 | tio->md = md; | |
2726 | ||
2727 | return 0; | |
2728 | } | |
2729 | ||
2730 | static int dm_mq_queue_rq(struct blk_mq_hw_ctx *hctx, | |
2731 | const struct blk_mq_queue_data *bd) | |
2732 | { | |
2733 | struct request *rq = bd->rq; | |
2734 | struct dm_rq_target_io *tio = blk_mq_rq_to_pdu(rq); | |
2735 | struct mapped_device *md = tio->md; | |
2736 | int srcu_idx; | |
2737 | struct dm_table *map = dm_get_live_table(md, &srcu_idx); | |
2738 | struct dm_target *ti; | |
2739 | sector_t pos; | |
2740 | ||
2741 | /* always use block 0 to find the target for flushes for now */ | |
2742 | pos = 0; | |
2743 | if (!(rq->cmd_flags & REQ_FLUSH)) | |
2744 | pos = blk_rq_pos(rq); | |
2745 | ||
2746 | ti = dm_table_find_target(map, pos); | |
2747 | if (!dm_target_is_valid(ti)) { | |
2748 | dm_put_live_table(md, srcu_idx); | |
2749 | DMERR_LIMIT("request attempted access beyond the end of device"); | |
2750 | /* | |
2751 | * Must perform setup, that rq_completed() requires, | |
2752 | * before returning BLK_MQ_RQ_QUEUE_ERROR | |
2753 | */ | |
2754 | dm_start_request(md, rq); | |
2755 | return BLK_MQ_RQ_QUEUE_ERROR; | |
2756 | } | |
2757 | dm_put_live_table(md, srcu_idx); | |
2758 | ||
2759 | if (ti->type->busy && ti->type->busy(ti)) | |
2760 | return BLK_MQ_RQ_QUEUE_BUSY; | |
2761 | ||
2762 | dm_start_request(md, rq); | |
2763 | ||
2764 | /* Init tio using md established in .init_request */ | |
2765 | init_tio(tio, rq, md); | |
2766 | ||
02233342 MS |
2767 | /* |
2768 | * Establish tio->ti before queuing work (map_tio_request) | |
2769 | * or making direct call to map_request(). | |
2770 | */ | |
bfebd1cd | 2771 | tio->ti = ti; |
02233342 MS |
2772 | |
2773 | /* Clone the request if underlying devices aren't blk-mq */ | |
2774 | if (dm_table_get_type(map) == DM_TYPE_REQUEST_BASED) { | |
2775 | /* clone request is allocated at the end of the pdu */ | |
2776 | tio->clone = (void *)blk_mq_rq_to_pdu(rq) + sizeof(struct dm_rq_target_io); | |
45714fbe | 2777 | (void) clone_rq(rq, md, tio, GFP_ATOMIC); |
02233342 MS |
2778 | queue_kthread_work(&md->kworker, &tio->work); |
2779 | } else { | |
2780 | /* Direct call is fine since .queue_rq allows allocations */ | |
45714fbe MS |
2781 | if (map_request(tio, rq, md) == DM_MAPIO_REQUEUE) { |
2782 | /* Undo dm_start_request() before requeuing */ | |
e262f347 | 2783 | rq_end_stats(md, rq); |
45714fbe MS |
2784 | rq_completed(md, rq_data_dir(rq), false); |
2785 | return BLK_MQ_RQ_QUEUE_BUSY; | |
2786 | } | |
02233342 | 2787 | } |
bfebd1cd MS |
2788 | |
2789 | return BLK_MQ_RQ_QUEUE_OK; | |
2790 | } | |
2791 | ||
2792 | static struct blk_mq_ops dm_mq_ops = { | |
2793 | .queue_rq = dm_mq_queue_rq, | |
2794 | .map_queue = blk_mq_map_queue, | |
2795 | .complete = dm_softirq_done, | |
2796 | .init_request = dm_mq_init_request, | |
2797 | }; | |
2798 | ||
2799 | static int dm_init_request_based_blk_mq_queue(struct mapped_device *md) | |
2800 | { | |
02233342 | 2801 | unsigned md_type = dm_get_md_type(md); |
bfebd1cd MS |
2802 | struct request_queue *q; |
2803 | int err; | |
2804 | ||
2805 | memset(&md->tag_set, 0, sizeof(md->tag_set)); | |
2806 | md->tag_set.ops = &dm_mq_ops; | |
2807 | md->tag_set.queue_depth = BLKDEV_MAX_RQ; | |
2808 | md->tag_set.numa_node = NUMA_NO_NODE; | |
2809 | md->tag_set.flags = BLK_MQ_F_SHOULD_MERGE | BLK_MQ_F_SG_MERGE; | |
2810 | md->tag_set.nr_hw_queues = 1; | |
02233342 MS |
2811 | if (md_type == DM_TYPE_REQUEST_BASED) { |
2812 | /* make the memory for non-blk-mq clone part of the pdu */ | |
2813 | md->tag_set.cmd_size = sizeof(struct dm_rq_target_io) + sizeof(struct request); | |
2814 | } else | |
2815 | md->tag_set.cmd_size = sizeof(struct dm_rq_target_io); | |
bfebd1cd MS |
2816 | md->tag_set.driver_data = md; |
2817 | ||
2818 | err = blk_mq_alloc_tag_set(&md->tag_set); | |
2819 | if (err) | |
2820 | return err; | |
2821 | ||
2822 | q = blk_mq_init_allocated_queue(&md->tag_set, md->queue); | |
2823 | if (IS_ERR(q)) { | |
2824 | err = PTR_ERR(q); | |
2825 | goto out_tag_set; | |
2826 | } | |
2827 | md->queue = q; | |
2828 | dm_init_md_queue(md); | |
2829 | ||
2830 | /* backfill 'mq' sysfs registration normally done in blk_register_queue */ | |
2831 | blk_mq_register_disk(md->disk); | |
2832 | ||
02233342 MS |
2833 | if (md_type == DM_TYPE_REQUEST_BASED) |
2834 | init_rq_based_worker_thread(md); | |
bfebd1cd MS |
2835 | |
2836 | return 0; | |
2837 | ||
2838 | out_tag_set: | |
2839 | blk_mq_free_tag_set(&md->tag_set); | |
2840 | return err; | |
4a0b4ddf MS |
2841 | } |
2842 | ||
4e6e36c3 MS |
2843 | static unsigned filter_md_type(unsigned type, struct mapped_device *md) |
2844 | { | |
2845 | if (type == DM_TYPE_BIO_BASED) | |
2846 | return type; | |
2847 | ||
2848 | return !md->use_blk_mq ? DM_TYPE_REQUEST_BASED : DM_TYPE_MQ_REQUEST_BASED; | |
2849 | } | |
2850 | ||
4a0b4ddf MS |
2851 | /* |
2852 | * Setup the DM device's queue based on md's type | |
2853 | */ | |
2854 | int dm_setup_md_queue(struct mapped_device *md) | |
2855 | { | |
bfebd1cd | 2856 | int r; |
17e149b8 | 2857 | unsigned md_type = filter_md_type(dm_get_md_type(md), md); |
bfebd1cd MS |
2858 | |
2859 | switch (md_type) { | |
2860 | case DM_TYPE_REQUEST_BASED: | |
2861 | r = dm_init_request_based_queue(md); | |
2862 | if (r) { | |
ff36ab34 | 2863 | DMWARN("Cannot initialize queue for request-based mapped device"); |
bfebd1cd | 2864 | return r; |
ff36ab34 | 2865 | } |
bfebd1cd MS |
2866 | break; |
2867 | case DM_TYPE_MQ_REQUEST_BASED: | |
2868 | r = dm_init_request_based_blk_mq_queue(md); | |
2869 | if (r) { | |
2870 | DMWARN("Cannot initialize queue for request-based blk-mq mapped device"); | |
2871 | return r; | |
2872 | } | |
2873 | break; | |
2874 | case DM_TYPE_BIO_BASED: | |
2875 | dm_init_old_md_queue(md); | |
ff36ab34 MS |
2876 | blk_queue_make_request(md->queue, dm_make_request); |
2877 | blk_queue_merge_bvec(md->queue, dm_merge_bvec); | |
bfebd1cd | 2878 | break; |
4a0b4ddf MS |
2879 | } |
2880 | ||
2881 | return 0; | |
2882 | } | |
2883 | ||
2bec1f4a | 2884 | struct mapped_device *dm_get_md(dev_t dev) |
1da177e4 LT |
2885 | { |
2886 | struct mapped_device *md; | |
1da177e4 LT |
2887 | unsigned minor = MINOR(dev); |
2888 | ||
2889 | if (MAJOR(dev) != _major || minor >= (1 << MINORBITS)) | |
2890 | return NULL; | |
2891 | ||
f32c10b0 | 2892 | spin_lock(&_minor_lock); |
1da177e4 LT |
2893 | |
2894 | md = idr_find(&_minor_idr, minor); | |
2bec1f4a MP |
2895 | if (md) { |
2896 | if ((md == MINOR_ALLOCED || | |
2897 | (MINOR(disk_devt(dm_disk(md))) != minor) || | |
2898 | dm_deleting_md(md) || | |
2899 | test_bit(DMF_FREEING, &md->flags))) { | |
2900 | md = NULL; | |
2901 | goto out; | |
2902 | } | |
2903 | dm_get(md); | |
fba9f90e | 2904 | } |
1da177e4 | 2905 | |
fba9f90e | 2906 | out: |
f32c10b0 | 2907 | spin_unlock(&_minor_lock); |
1da177e4 | 2908 | |
637842cf DT |
2909 | return md; |
2910 | } | |
3cf2e4ba | 2911 | EXPORT_SYMBOL_GPL(dm_get_md); |
d229a958 | 2912 | |
9ade92a9 | 2913 | void *dm_get_mdptr(struct mapped_device *md) |
637842cf | 2914 | { |
9ade92a9 | 2915 | return md->interface_ptr; |
1da177e4 LT |
2916 | } |
2917 | ||
2918 | void dm_set_mdptr(struct mapped_device *md, void *ptr) | |
2919 | { | |
2920 | md->interface_ptr = ptr; | |
2921 | } | |
2922 | ||
2923 | void dm_get(struct mapped_device *md) | |
2924 | { | |
2925 | atomic_inc(&md->holders); | |
3f77316d | 2926 | BUG_ON(test_bit(DMF_FREEING, &md->flags)); |
1da177e4 LT |
2927 | } |
2928 | ||
09ee96b2 MP |
2929 | int dm_hold(struct mapped_device *md) |
2930 | { | |
2931 | spin_lock(&_minor_lock); | |
2932 | if (test_bit(DMF_FREEING, &md->flags)) { | |
2933 | spin_unlock(&_minor_lock); | |
2934 | return -EBUSY; | |
2935 | } | |
2936 | dm_get(md); | |
2937 | spin_unlock(&_minor_lock); | |
2938 | return 0; | |
2939 | } | |
2940 | EXPORT_SYMBOL_GPL(dm_hold); | |
2941 | ||
72d94861 AK |
2942 | const char *dm_device_name(struct mapped_device *md) |
2943 | { | |
2944 | return md->name; | |
2945 | } | |
2946 | EXPORT_SYMBOL_GPL(dm_device_name); | |
2947 | ||
3f77316d | 2948 | static void __dm_destroy(struct mapped_device *md, bool wait) |
1da177e4 | 2949 | { |
1134e5ae | 2950 | struct dm_table *map; |
83d5e5b0 | 2951 | int srcu_idx; |
1da177e4 | 2952 | |
3f77316d | 2953 | might_sleep(); |
fba9f90e | 2954 | |
83d5e5b0 | 2955 | map = dm_get_live_table(md, &srcu_idx); |
63a4f065 MS |
2956 | |
2957 | spin_lock(&_minor_lock); | |
3f77316d KU |
2958 | idr_replace(&_minor_idr, MINOR_ALLOCED, MINOR(disk_devt(dm_disk(md)))); |
2959 | set_bit(DMF_FREEING, &md->flags); | |
2960 | spin_unlock(&_minor_lock); | |
2961 | ||
02233342 | 2962 | if (dm_request_based(md) && md->kworker_task) |
2eb6e1e3 KB |
2963 | flush_kthread_worker(&md->kworker); |
2964 | ||
ab7c7bb6 MP |
2965 | /* |
2966 | * Take suspend_lock so that presuspend and postsuspend methods | |
2967 | * do not race with internal suspend. | |
2968 | */ | |
2969 | mutex_lock(&md->suspend_lock); | |
3f77316d KU |
2970 | if (!dm_suspended_md(md)) { |
2971 | dm_table_presuspend_targets(map); | |
2972 | dm_table_postsuspend_targets(map); | |
1da177e4 | 2973 | } |
ab7c7bb6 | 2974 | mutex_unlock(&md->suspend_lock); |
3f77316d | 2975 | |
83d5e5b0 MP |
2976 | /* dm_put_live_table must be before msleep, otherwise deadlock is possible */ |
2977 | dm_put_live_table(md, srcu_idx); | |
2978 | ||
3f77316d KU |
2979 | /* |
2980 | * Rare, but there may be I/O requests still going to complete, | |
2981 | * for example. Wait for all references to disappear. | |
2982 | * No one should increment the reference count of the mapped_device, | |
2983 | * after the mapped_device state becomes DMF_FREEING. | |
2984 | */ | |
2985 | if (wait) | |
2986 | while (atomic_read(&md->holders)) | |
2987 | msleep(1); | |
2988 | else if (atomic_read(&md->holders)) | |
2989 | DMWARN("%s: Forcibly removing mapped_device still in use! (%d users)", | |
2990 | dm_device_name(md), atomic_read(&md->holders)); | |
2991 | ||
2992 | dm_sysfs_exit(md); | |
3f77316d KU |
2993 | dm_table_destroy(__unbind(md)); |
2994 | free_dev(md); | |
2995 | } | |
2996 | ||
2997 | void dm_destroy(struct mapped_device *md) | |
2998 | { | |
2999 | __dm_destroy(md, true); | |
3000 | } | |
3001 | ||
3002 | void dm_destroy_immediate(struct mapped_device *md) | |
3003 | { | |
3004 | __dm_destroy(md, false); | |
3005 | } | |
3006 | ||
3007 | void dm_put(struct mapped_device *md) | |
3008 | { | |
3009 | atomic_dec(&md->holders); | |
1da177e4 | 3010 | } |
79eb885c | 3011 | EXPORT_SYMBOL_GPL(dm_put); |
1da177e4 | 3012 | |
401600df | 3013 | static int dm_wait_for_completion(struct mapped_device *md, int interruptible) |
46125c1c MB |
3014 | { |
3015 | int r = 0; | |
b44ebeb0 MP |
3016 | DECLARE_WAITQUEUE(wait, current); |
3017 | ||
b44ebeb0 | 3018 | add_wait_queue(&md->wait, &wait); |
46125c1c MB |
3019 | |
3020 | while (1) { | |
401600df | 3021 | set_current_state(interruptible); |
46125c1c | 3022 | |
b4324fee | 3023 | if (!md_in_flight(md)) |
46125c1c MB |
3024 | break; |
3025 | ||
401600df MP |
3026 | if (interruptible == TASK_INTERRUPTIBLE && |
3027 | signal_pending(current)) { | |
46125c1c MB |
3028 | r = -EINTR; |
3029 | break; | |
3030 | } | |
3031 | ||
3032 | io_schedule(); | |
3033 | } | |
3034 | set_current_state(TASK_RUNNING); | |
3035 | ||
b44ebeb0 MP |
3036 | remove_wait_queue(&md->wait, &wait); |
3037 | ||
46125c1c MB |
3038 | return r; |
3039 | } | |
3040 | ||
1da177e4 LT |
3041 | /* |
3042 | * Process the deferred bios | |
3043 | */ | |
ef208587 | 3044 | static void dm_wq_work(struct work_struct *work) |
1da177e4 | 3045 | { |
ef208587 MP |
3046 | struct mapped_device *md = container_of(work, struct mapped_device, |
3047 | work); | |
6d6f10df | 3048 | struct bio *c; |
83d5e5b0 MP |
3049 | int srcu_idx; |
3050 | struct dm_table *map; | |
1da177e4 | 3051 | |
83d5e5b0 | 3052 | map = dm_get_live_table(md, &srcu_idx); |
ef208587 | 3053 | |
3b00b203 | 3054 | while (!test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags)) { |
df12ee99 AK |
3055 | spin_lock_irq(&md->deferred_lock); |
3056 | c = bio_list_pop(&md->deferred); | |
3057 | spin_unlock_irq(&md->deferred_lock); | |
3058 | ||
6a8736d1 | 3059 | if (!c) |
df12ee99 | 3060 | break; |
022c2611 | 3061 | |
e6ee8c0b KU |
3062 | if (dm_request_based(md)) |
3063 | generic_make_request(c); | |
6a8736d1 | 3064 | else |
83d5e5b0 | 3065 | __split_and_process_bio(md, map, c); |
022c2611 | 3066 | } |
73d410c0 | 3067 | |
83d5e5b0 | 3068 | dm_put_live_table(md, srcu_idx); |
1da177e4 LT |
3069 | } |
3070 | ||
9a1fb464 | 3071 | static void dm_queue_flush(struct mapped_device *md) |
304f3f6a | 3072 | { |
3b00b203 | 3073 | clear_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags); |
4e857c58 | 3074 | smp_mb__after_atomic(); |
53d5914f | 3075 | queue_work(md->wq, &md->work); |
304f3f6a MB |
3076 | } |
3077 | ||
1da177e4 | 3078 | /* |
042d2a9b | 3079 | * Swap in a new table, returning the old one for the caller to destroy. |
1da177e4 | 3080 | */ |
042d2a9b | 3081 | struct dm_table *dm_swap_table(struct mapped_device *md, struct dm_table *table) |
1da177e4 | 3082 | { |
87eb5b21 | 3083 | struct dm_table *live_map = NULL, *map = ERR_PTR(-EINVAL); |
754c5fc7 | 3084 | struct queue_limits limits; |
042d2a9b | 3085 | int r; |
1da177e4 | 3086 | |
e61290a4 | 3087 | mutex_lock(&md->suspend_lock); |
1da177e4 LT |
3088 | |
3089 | /* device must be suspended */ | |
4f186f8b | 3090 | if (!dm_suspended_md(md)) |
93c534ae | 3091 | goto out; |
1da177e4 | 3092 | |
3ae70656 MS |
3093 | /* |
3094 | * If the new table has no data devices, retain the existing limits. | |
3095 | * This helps multipath with queue_if_no_path if all paths disappear, | |
3096 | * then new I/O is queued based on these limits, and then some paths | |
3097 | * reappear. | |
3098 | */ | |
3099 | if (dm_table_has_no_data_devices(table)) { | |
83d5e5b0 | 3100 | live_map = dm_get_live_table_fast(md); |
3ae70656 MS |
3101 | if (live_map) |
3102 | limits = md->queue->limits; | |
83d5e5b0 | 3103 | dm_put_live_table_fast(md); |
3ae70656 MS |
3104 | } |
3105 | ||
87eb5b21 MC |
3106 | if (!live_map) { |
3107 | r = dm_calculate_queue_limits(table, &limits); | |
3108 | if (r) { | |
3109 | map = ERR_PTR(r); | |
3110 | goto out; | |
3111 | } | |
042d2a9b | 3112 | } |
754c5fc7 | 3113 | |
042d2a9b | 3114 | map = __bind(md, table, &limits); |
1da177e4 | 3115 | |
93c534ae | 3116 | out: |
e61290a4 | 3117 | mutex_unlock(&md->suspend_lock); |
042d2a9b | 3118 | return map; |
1da177e4 LT |
3119 | } |
3120 | ||
3121 | /* | |
3122 | * Functions to lock and unlock any filesystem running on the | |
3123 | * device. | |
3124 | */ | |
2ca3310e | 3125 | static int lock_fs(struct mapped_device *md) |
1da177e4 | 3126 | { |
e39e2e95 | 3127 | int r; |
1da177e4 LT |
3128 | |
3129 | WARN_ON(md->frozen_sb); | |
dfbe03f6 | 3130 | |
db8fef4f | 3131 | md->frozen_sb = freeze_bdev(md->bdev); |
dfbe03f6 | 3132 | if (IS_ERR(md->frozen_sb)) { |
cf222b37 | 3133 | r = PTR_ERR(md->frozen_sb); |
e39e2e95 AK |
3134 | md->frozen_sb = NULL; |
3135 | return r; | |
dfbe03f6 AK |
3136 | } |
3137 | ||
aa8d7c2f AK |
3138 | set_bit(DMF_FROZEN, &md->flags); |
3139 | ||
1da177e4 LT |
3140 | return 0; |
3141 | } | |
3142 | ||
2ca3310e | 3143 | static void unlock_fs(struct mapped_device *md) |
1da177e4 | 3144 | { |
aa8d7c2f AK |
3145 | if (!test_bit(DMF_FROZEN, &md->flags)) |
3146 | return; | |
3147 | ||
db8fef4f | 3148 | thaw_bdev(md->bdev, md->frozen_sb); |
1da177e4 | 3149 | md->frozen_sb = NULL; |
aa8d7c2f | 3150 | clear_bit(DMF_FROZEN, &md->flags); |
1da177e4 LT |
3151 | } |
3152 | ||
3153 | /* | |
ffcc3936 MS |
3154 | * If __dm_suspend returns 0, the device is completely quiescent |
3155 | * now. There is no request-processing activity. All new requests | |
3156 | * are being added to md->deferred list. | |
cec47e3d | 3157 | * |
ffcc3936 | 3158 | * Caller must hold md->suspend_lock |
cec47e3d | 3159 | */ |
ffcc3936 MS |
3160 | static int __dm_suspend(struct mapped_device *md, struct dm_table *map, |
3161 | unsigned suspend_flags, int interruptible) | |
1da177e4 | 3162 | { |
ffcc3936 MS |
3163 | bool do_lockfs = suspend_flags & DM_SUSPEND_LOCKFS_FLAG; |
3164 | bool noflush = suspend_flags & DM_SUSPEND_NOFLUSH_FLAG; | |
3165 | int r; | |
1da177e4 | 3166 | |
2e93ccc1 KU |
3167 | /* |
3168 | * DMF_NOFLUSH_SUSPENDING must be set before presuspend. | |
3169 | * This flag is cleared before dm_suspend returns. | |
3170 | */ | |
3171 | if (noflush) | |
3172 | set_bit(DMF_NOFLUSH_SUSPENDING, &md->flags); | |
3173 | ||
d67ee213 MS |
3174 | /* |
3175 | * This gets reverted if there's an error later and the targets | |
3176 | * provide the .presuspend_undo hook. | |
3177 | */ | |
cf222b37 AK |
3178 | dm_table_presuspend_targets(map); |
3179 | ||
32a926da | 3180 | /* |
9f518b27 KU |
3181 | * Flush I/O to the device. |
3182 | * Any I/O submitted after lock_fs() may not be flushed. | |
3183 | * noflush takes precedence over do_lockfs. | |
3184 | * (lock_fs() flushes I/Os and waits for them to complete.) | |
32a926da MP |
3185 | */ |
3186 | if (!noflush && do_lockfs) { | |
3187 | r = lock_fs(md); | |
d67ee213 MS |
3188 | if (r) { |
3189 | dm_table_presuspend_undo_targets(map); | |
ffcc3936 | 3190 | return r; |
d67ee213 | 3191 | } |
aa8d7c2f | 3192 | } |
1da177e4 LT |
3193 | |
3194 | /* | |
3b00b203 MP |
3195 | * Here we must make sure that no processes are submitting requests |
3196 | * to target drivers i.e. no one may be executing | |
3197 | * __split_and_process_bio. This is called from dm_request and | |
3198 | * dm_wq_work. | |
3199 | * | |
3200 | * To get all processes out of __split_and_process_bio in dm_request, | |
3201 | * we take the write lock. To prevent any process from reentering | |
6a8736d1 TH |
3202 | * __split_and_process_bio from dm_request and quiesce the thread |
3203 | * (dm_wq_work), we set BMF_BLOCK_IO_FOR_SUSPEND and call | |
3204 | * flush_workqueue(md->wq). | |
1da177e4 | 3205 | */ |
1eb787ec | 3206 | set_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags); |
41abc4e1 HR |
3207 | if (map) |
3208 | synchronize_srcu(&md->io_barrier); | |
1da177e4 | 3209 | |
d0bcb878 | 3210 | /* |
29e4013d TH |
3211 | * Stop md->queue before flushing md->wq in case request-based |
3212 | * dm defers requests to md->wq from md->queue. | |
d0bcb878 | 3213 | */ |
2eb6e1e3 | 3214 | if (dm_request_based(md)) { |
9f518b27 | 3215 | stop_queue(md->queue); |
02233342 MS |
3216 | if (md->kworker_task) |
3217 | flush_kthread_worker(&md->kworker); | |
2eb6e1e3 | 3218 | } |
cec47e3d | 3219 | |
d0bcb878 KU |
3220 | flush_workqueue(md->wq); |
3221 | ||
1da177e4 | 3222 | /* |
3b00b203 MP |
3223 | * At this point no more requests are entering target request routines. |
3224 | * We call dm_wait_for_completion to wait for all existing requests | |
3225 | * to finish. | |
1da177e4 | 3226 | */ |
ffcc3936 | 3227 | r = dm_wait_for_completion(md, interruptible); |
1da177e4 | 3228 | |
6d6f10df | 3229 | if (noflush) |
022c2611 | 3230 | clear_bit(DMF_NOFLUSH_SUSPENDING, &md->flags); |
41abc4e1 HR |
3231 | if (map) |
3232 | synchronize_srcu(&md->io_barrier); | |
2e93ccc1 | 3233 | |
1da177e4 | 3234 | /* were we interrupted ? */ |
46125c1c | 3235 | if (r < 0) { |
9a1fb464 | 3236 | dm_queue_flush(md); |
73d410c0 | 3237 | |
cec47e3d | 3238 | if (dm_request_based(md)) |
9f518b27 | 3239 | start_queue(md->queue); |
cec47e3d | 3240 | |
2ca3310e | 3241 | unlock_fs(md); |
d67ee213 | 3242 | dm_table_presuspend_undo_targets(map); |
ffcc3936 | 3243 | /* pushback list is already flushed, so skip flush */ |
2ca3310e | 3244 | } |
1da177e4 | 3245 | |
ffcc3936 MS |
3246 | return r; |
3247 | } | |
3248 | ||
3249 | /* | |
3250 | * We need to be able to change a mapping table under a mounted | |
3251 | * filesystem. For example we might want to move some data in | |
3252 | * the background. Before the table can be swapped with | |
3253 | * dm_bind_table, dm_suspend must be called to flush any in | |
3254 | * flight bios and ensure that any further io gets deferred. | |
3255 | */ | |
3256 | /* | |
3257 | * Suspend mechanism in request-based dm. | |
3258 | * | |
3259 | * 1. Flush all I/Os by lock_fs() if needed. | |
3260 | * 2. Stop dispatching any I/O by stopping the request_queue. | |
3261 | * 3. Wait for all in-flight I/Os to be completed or requeued. | |
3262 | * | |
3263 | * To abort suspend, start the request_queue. | |
3264 | */ | |
3265 | int dm_suspend(struct mapped_device *md, unsigned suspend_flags) | |
3266 | { | |
3267 | struct dm_table *map = NULL; | |
3268 | int r = 0; | |
3269 | ||
3270 | retry: | |
3271 | mutex_lock_nested(&md->suspend_lock, SINGLE_DEPTH_NESTING); | |
3272 | ||
3273 | if (dm_suspended_md(md)) { | |
3274 | r = -EINVAL; | |
3275 | goto out_unlock; | |
3276 | } | |
3277 | ||
3278 | if (dm_suspended_internally_md(md)) { | |
3279 | /* already internally suspended, wait for internal resume */ | |
3280 | mutex_unlock(&md->suspend_lock); | |
3281 | r = wait_on_bit(&md->flags, DMF_SUSPENDED_INTERNALLY, TASK_INTERRUPTIBLE); | |
3282 | if (r) | |
3283 | return r; | |
3284 | goto retry; | |
3285 | } | |
3286 | ||
a12f5d48 | 3287 | map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock)); |
ffcc3936 MS |
3288 | |
3289 | r = __dm_suspend(md, map, suspend_flags, TASK_INTERRUPTIBLE); | |
3290 | if (r) | |
3291 | goto out_unlock; | |
3b00b203 | 3292 | |
2ca3310e | 3293 | set_bit(DMF_SUSPENDED, &md->flags); |
b84b0287 | 3294 | |
4d4471cb KU |
3295 | dm_table_postsuspend_targets(map); |
3296 | ||
d287483d | 3297 | out_unlock: |
e61290a4 | 3298 | mutex_unlock(&md->suspend_lock); |
cf222b37 | 3299 | return r; |
1da177e4 LT |
3300 | } |
3301 | ||
ffcc3936 MS |
3302 | static int __dm_resume(struct mapped_device *md, struct dm_table *map) |
3303 | { | |
3304 | if (map) { | |
3305 | int r = dm_table_resume_targets(map); | |
3306 | if (r) | |
3307 | return r; | |
3308 | } | |
3309 | ||
3310 | dm_queue_flush(md); | |
3311 | ||
3312 | /* | |
3313 | * Flushing deferred I/Os must be done after targets are resumed | |
3314 | * so that mapping of targets can work correctly. | |
3315 | * Request-based dm is queueing the deferred I/Os in its request_queue. | |
3316 | */ | |
3317 | if (dm_request_based(md)) | |
3318 | start_queue(md->queue); | |
3319 | ||
3320 | unlock_fs(md); | |
3321 | ||
3322 | return 0; | |
3323 | } | |
3324 | ||
1da177e4 LT |
3325 | int dm_resume(struct mapped_device *md) |
3326 | { | |
cf222b37 | 3327 | int r = -EINVAL; |
cf222b37 | 3328 | struct dm_table *map = NULL; |
1da177e4 | 3329 | |
ffcc3936 MS |
3330 | retry: |
3331 | mutex_lock_nested(&md->suspend_lock, SINGLE_DEPTH_NESTING); | |
3332 | ||
4f186f8b | 3333 | if (!dm_suspended_md(md)) |
cf222b37 | 3334 | goto out; |
cf222b37 | 3335 | |
ffcc3936 MS |
3336 | if (dm_suspended_internally_md(md)) { |
3337 | /* already internally suspended, wait for internal resume */ | |
3338 | mutex_unlock(&md->suspend_lock); | |
3339 | r = wait_on_bit(&md->flags, DMF_SUSPENDED_INTERNALLY, TASK_INTERRUPTIBLE); | |
3340 | if (r) | |
3341 | return r; | |
3342 | goto retry; | |
3343 | } | |
3344 | ||
a12f5d48 | 3345 | map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock)); |
2ca3310e | 3346 | if (!map || !dm_table_get_size(map)) |
cf222b37 | 3347 | goto out; |
1da177e4 | 3348 | |
ffcc3936 | 3349 | r = __dm_resume(md, map); |
8757b776 MB |
3350 | if (r) |
3351 | goto out; | |
2ca3310e | 3352 | |
2ca3310e AK |
3353 | clear_bit(DMF_SUSPENDED, &md->flags); |
3354 | ||
cf222b37 AK |
3355 | r = 0; |
3356 | out: | |
e61290a4 | 3357 | mutex_unlock(&md->suspend_lock); |
2ca3310e | 3358 | |
cf222b37 | 3359 | return r; |
1da177e4 LT |
3360 | } |
3361 | ||
fd2ed4d2 MP |
3362 | /* |
3363 | * Internal suspend/resume works like userspace-driven suspend. It waits | |
3364 | * until all bios finish and prevents issuing new bios to the target drivers. | |
3365 | * It may be used only from the kernel. | |
fd2ed4d2 MP |
3366 | */ |
3367 | ||
ffcc3936 | 3368 | static void __dm_internal_suspend(struct mapped_device *md, unsigned suspend_flags) |
fd2ed4d2 | 3369 | { |
ffcc3936 MS |
3370 | struct dm_table *map = NULL; |
3371 | ||
96b26c8c | 3372 | if (md->internal_suspend_count++) |
ffcc3936 MS |
3373 | return; /* nested internal suspend */ |
3374 | ||
3375 | if (dm_suspended_md(md)) { | |
3376 | set_bit(DMF_SUSPENDED_INTERNALLY, &md->flags); | |
3377 | return; /* nest suspend */ | |
3378 | } | |
3379 | ||
a12f5d48 | 3380 | map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock)); |
ffcc3936 MS |
3381 | |
3382 | /* | |
3383 | * Using TASK_UNINTERRUPTIBLE because only NOFLUSH internal suspend is | |
3384 | * supported. Properly supporting a TASK_INTERRUPTIBLE internal suspend | |
3385 | * would require changing .presuspend to return an error -- avoid this | |
3386 | * until there is a need for more elaborate variants of internal suspend. | |
3387 | */ | |
3388 | (void) __dm_suspend(md, map, suspend_flags, TASK_UNINTERRUPTIBLE); | |
3389 | ||
3390 | set_bit(DMF_SUSPENDED_INTERNALLY, &md->flags); | |
3391 | ||
3392 | dm_table_postsuspend_targets(map); | |
3393 | } | |
3394 | ||
3395 | static void __dm_internal_resume(struct mapped_device *md) | |
3396 | { | |
96b26c8c MP |
3397 | BUG_ON(!md->internal_suspend_count); |
3398 | ||
3399 | if (--md->internal_suspend_count) | |
ffcc3936 MS |
3400 | return; /* resume from nested internal suspend */ |
3401 | ||
fd2ed4d2 | 3402 | if (dm_suspended_md(md)) |
ffcc3936 MS |
3403 | goto done; /* resume from nested suspend */ |
3404 | ||
3405 | /* | |
3406 | * NOTE: existing callers don't need to call dm_table_resume_targets | |
3407 | * (which may fail -- so best to avoid it for now by passing NULL map) | |
3408 | */ | |
3409 | (void) __dm_resume(md, NULL); | |
3410 | ||
3411 | done: | |
3412 | clear_bit(DMF_SUSPENDED_INTERNALLY, &md->flags); | |
3413 | smp_mb__after_atomic(); | |
3414 | wake_up_bit(&md->flags, DMF_SUSPENDED_INTERNALLY); | |
3415 | } | |
3416 | ||
3417 | void dm_internal_suspend_noflush(struct mapped_device *md) | |
3418 | { | |
3419 | mutex_lock(&md->suspend_lock); | |
3420 | __dm_internal_suspend(md, DM_SUSPEND_NOFLUSH_FLAG); | |
3421 | mutex_unlock(&md->suspend_lock); | |
3422 | } | |
3423 | EXPORT_SYMBOL_GPL(dm_internal_suspend_noflush); | |
3424 | ||
3425 | void dm_internal_resume(struct mapped_device *md) | |
3426 | { | |
3427 | mutex_lock(&md->suspend_lock); | |
3428 | __dm_internal_resume(md); | |
3429 | mutex_unlock(&md->suspend_lock); | |
3430 | } | |
3431 | EXPORT_SYMBOL_GPL(dm_internal_resume); | |
3432 | ||
3433 | /* | |
3434 | * Fast variants of internal suspend/resume hold md->suspend_lock, | |
3435 | * which prevents interaction with userspace-driven suspend. | |
3436 | */ | |
3437 | ||
3438 | void dm_internal_suspend_fast(struct mapped_device *md) | |
3439 | { | |
3440 | mutex_lock(&md->suspend_lock); | |
3441 | if (dm_suspended_md(md) || dm_suspended_internally_md(md)) | |
fd2ed4d2 MP |
3442 | return; |
3443 | ||
3444 | set_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags); | |
3445 | synchronize_srcu(&md->io_barrier); | |
3446 | flush_workqueue(md->wq); | |
3447 | dm_wait_for_completion(md, TASK_UNINTERRUPTIBLE); | |
3448 | } | |
b735fede | 3449 | EXPORT_SYMBOL_GPL(dm_internal_suspend_fast); |
fd2ed4d2 | 3450 | |
ffcc3936 | 3451 | void dm_internal_resume_fast(struct mapped_device *md) |
fd2ed4d2 | 3452 | { |
ffcc3936 | 3453 | if (dm_suspended_md(md) || dm_suspended_internally_md(md)) |
fd2ed4d2 MP |
3454 | goto done; |
3455 | ||
3456 | dm_queue_flush(md); | |
3457 | ||
3458 | done: | |
3459 | mutex_unlock(&md->suspend_lock); | |
3460 | } | |
b735fede | 3461 | EXPORT_SYMBOL_GPL(dm_internal_resume_fast); |
fd2ed4d2 | 3462 | |
1da177e4 LT |
3463 | /*----------------------------------------------------------------- |
3464 | * Event notification. | |
3465 | *---------------------------------------------------------------*/ | |
3abf85b5 | 3466 | int dm_kobject_uevent(struct mapped_device *md, enum kobject_action action, |
60935eb2 | 3467 | unsigned cookie) |
69267a30 | 3468 | { |
60935eb2 MB |
3469 | char udev_cookie[DM_COOKIE_LENGTH]; |
3470 | char *envp[] = { udev_cookie, NULL }; | |
3471 | ||
3472 | if (!cookie) | |
3abf85b5 | 3473 | return kobject_uevent(&disk_to_dev(md->disk)->kobj, action); |
60935eb2 MB |
3474 | else { |
3475 | snprintf(udev_cookie, DM_COOKIE_LENGTH, "%s=%u", | |
3476 | DM_COOKIE_ENV_VAR_NAME, cookie); | |
3abf85b5 PR |
3477 | return kobject_uevent_env(&disk_to_dev(md->disk)->kobj, |
3478 | action, envp); | |
60935eb2 | 3479 | } |
69267a30 AK |
3480 | } |
3481 | ||
7a8c3d3b MA |
3482 | uint32_t dm_next_uevent_seq(struct mapped_device *md) |
3483 | { | |
3484 | return atomic_add_return(1, &md->uevent_seq); | |
3485 | } | |
3486 | ||
1da177e4 LT |
3487 | uint32_t dm_get_event_nr(struct mapped_device *md) |
3488 | { | |
3489 | return atomic_read(&md->event_nr); | |
3490 | } | |
3491 | ||
3492 | int dm_wait_event(struct mapped_device *md, int event_nr) | |
3493 | { | |
3494 | return wait_event_interruptible(md->eventq, | |
3495 | (event_nr != atomic_read(&md->event_nr))); | |
3496 | } | |
3497 | ||
7a8c3d3b MA |
3498 | void dm_uevent_add(struct mapped_device *md, struct list_head *elist) |
3499 | { | |
3500 | unsigned long flags; | |
3501 | ||
3502 | spin_lock_irqsave(&md->uevent_lock, flags); | |
3503 | list_add(elist, &md->uevent_list); | |
3504 | spin_unlock_irqrestore(&md->uevent_lock, flags); | |
3505 | } | |
3506 | ||
1da177e4 LT |
3507 | /* |
3508 | * The gendisk is only valid as long as you have a reference | |
3509 | * count on 'md'. | |
3510 | */ | |
3511 | struct gendisk *dm_disk(struct mapped_device *md) | |
3512 | { | |
3513 | return md->disk; | |
3514 | } | |
65ff5b7d | 3515 | EXPORT_SYMBOL_GPL(dm_disk); |
1da177e4 | 3516 | |
784aae73 MB |
3517 | struct kobject *dm_kobject(struct mapped_device *md) |
3518 | { | |
2995fa78 | 3519 | return &md->kobj_holder.kobj; |
784aae73 MB |
3520 | } |
3521 | ||
784aae73 MB |
3522 | struct mapped_device *dm_get_from_kobject(struct kobject *kobj) |
3523 | { | |
3524 | struct mapped_device *md; | |
3525 | ||
2995fa78 | 3526 | md = container_of(kobj, struct mapped_device, kobj_holder.kobj); |
784aae73 | 3527 | |
4d89b7b4 | 3528 | if (test_bit(DMF_FREEING, &md->flags) || |
432a212c | 3529 | dm_deleting_md(md)) |
4d89b7b4 MB |
3530 | return NULL; |
3531 | ||
784aae73 MB |
3532 | dm_get(md); |
3533 | return md; | |
3534 | } | |
3535 | ||
4f186f8b | 3536 | int dm_suspended_md(struct mapped_device *md) |
1da177e4 LT |
3537 | { |
3538 | return test_bit(DMF_SUSPENDED, &md->flags); | |
3539 | } | |
3540 | ||
ffcc3936 MS |
3541 | int dm_suspended_internally_md(struct mapped_device *md) |
3542 | { | |
3543 | return test_bit(DMF_SUSPENDED_INTERNALLY, &md->flags); | |
3544 | } | |
3545 | ||
2c140a24 MP |
3546 | int dm_test_deferred_remove_flag(struct mapped_device *md) |
3547 | { | |
3548 | return test_bit(DMF_DEFERRED_REMOVE, &md->flags); | |
3549 | } | |
3550 | ||
64dbce58 KU |
3551 | int dm_suspended(struct dm_target *ti) |
3552 | { | |
ecdb2e25 | 3553 | return dm_suspended_md(dm_table_get_md(ti->table)); |
64dbce58 KU |
3554 | } |
3555 | EXPORT_SYMBOL_GPL(dm_suspended); | |
3556 | ||
2e93ccc1 KU |
3557 | int dm_noflush_suspending(struct dm_target *ti) |
3558 | { | |
ecdb2e25 | 3559 | return __noflush_suspending(dm_table_get_md(ti->table)); |
2e93ccc1 KU |
3560 | } |
3561 | EXPORT_SYMBOL_GPL(dm_noflush_suspending); | |
3562 | ||
78d8e58a MS |
3563 | struct dm_md_mempools *dm_alloc_md_mempools(struct mapped_device *md, unsigned type, |
3564 | unsigned integrity, unsigned per_bio_data_size) | |
e6ee8c0b | 3565 | { |
78d8e58a MS |
3566 | struct dm_md_mempools *pools = kzalloc(sizeof(*pools), GFP_KERNEL); |
3567 | struct kmem_cache *cachep = NULL; | |
3568 | unsigned int pool_size = 0; | |
5f015204 | 3569 | unsigned int front_pad; |
e6ee8c0b KU |
3570 | |
3571 | if (!pools) | |
4e6e36c3 | 3572 | return NULL; |
e6ee8c0b | 3573 | |
78d8e58a | 3574 | type = filter_md_type(type, md); |
17e149b8 | 3575 | |
78d8e58a MS |
3576 | switch (type) { |
3577 | case DM_TYPE_BIO_BASED: | |
3578 | cachep = _io_cache; | |
3579 | pool_size = dm_get_reserved_bio_based_ios(); | |
3580 | front_pad = roundup(per_bio_data_size, __alignof__(struct dm_target_io)) + offsetof(struct dm_target_io, clone); | |
3581 | break; | |
3582 | case DM_TYPE_REQUEST_BASED: | |
3583 | cachep = _rq_tio_cache; | |
3584 | pool_size = dm_get_reserved_rq_based_ios(); | |
3585 | pools->rq_pool = mempool_create_slab_pool(pool_size, _rq_cache); | |
3586 | if (!pools->rq_pool) | |
3587 | goto out; | |
3588 | /* fall through to setup remaining rq-based pools */ | |
3589 | case DM_TYPE_MQ_REQUEST_BASED: | |
3590 | if (!pool_size) | |
3591 | pool_size = dm_get_reserved_rq_based_ios(); | |
3592 | front_pad = offsetof(struct dm_rq_clone_bio_info, clone); | |
3593 | /* per_bio_data_size is not used. See __bind_mempools(). */ | |
3594 | WARN_ON(per_bio_data_size != 0); | |
3595 | break; | |
3596 | default: | |
3597 | BUG(); | |
3598 | } | |
3599 | ||
3600 | if (cachep) { | |
3601 | pools->io_pool = mempool_create_slab_pool(pool_size, cachep); | |
3602 | if (!pools->io_pool) | |
3603 | goto out; | |
3604 | } | |
e6ee8c0b | 3605 | |
3d8aab2d | 3606 | pools->bs = bioset_create_nobvec(pool_size, front_pad); |
e6ee8c0b | 3607 | if (!pools->bs) |
5f015204 | 3608 | goto out; |
e6ee8c0b | 3609 | |
a91a2785 | 3610 | if (integrity && bioset_integrity_create(pools->bs, pool_size)) |
5f015204 | 3611 | goto out; |
a91a2785 | 3612 | |
e6ee8c0b | 3613 | return pools; |
5f1b670d | 3614 | |
5f1b670d CH |
3615 | out: |
3616 | dm_free_md_mempools(pools); | |
78d8e58a | 3617 | |
4e6e36c3 | 3618 | return NULL; |
e6ee8c0b KU |
3619 | } |
3620 | ||
3621 | void dm_free_md_mempools(struct dm_md_mempools *pools) | |
3622 | { | |
3623 | if (!pools) | |
3624 | return; | |
3625 | ||
3626 | if (pools->io_pool) | |
3627 | mempool_destroy(pools->io_pool); | |
3628 | ||
1ae49ea2 MS |
3629 | if (pools->rq_pool) |
3630 | mempool_destroy(pools->rq_pool); | |
3631 | ||
e6ee8c0b KU |
3632 | if (pools->bs) |
3633 | bioset_free(pools->bs); | |
3634 | ||
3635 | kfree(pools); | |
3636 | } | |
3637 | ||
83d5cde4 | 3638 | static const struct block_device_operations dm_blk_dops = { |
1da177e4 LT |
3639 | .open = dm_blk_open, |
3640 | .release = dm_blk_close, | |
aa129a22 | 3641 | .ioctl = dm_blk_ioctl, |
3ac51e74 | 3642 | .getgeo = dm_blk_getgeo, |
1da177e4 LT |
3643 | .owner = THIS_MODULE |
3644 | }; | |
3645 | ||
1da177e4 LT |
3646 | /* |
3647 | * module hooks | |
3648 | */ | |
3649 | module_init(dm_init); | |
3650 | module_exit(dm_exit); | |
3651 | ||
3652 | module_param(major, uint, 0); | |
3653 | MODULE_PARM_DESC(major, "The major number of the device mapper"); | |
f4790826 | 3654 | |
e8603136 MS |
3655 | module_param(reserved_bio_based_ios, uint, S_IRUGO | S_IWUSR); |
3656 | MODULE_PARM_DESC(reserved_bio_based_ios, "Reserved IOs in bio-based mempools"); | |
3657 | ||
f4790826 MS |
3658 | module_param(reserved_rq_based_ios, uint, S_IRUGO | S_IWUSR); |
3659 | MODULE_PARM_DESC(reserved_rq_based_ios, "Reserved IOs in request-based mempools"); | |
3660 | ||
17e149b8 MS |
3661 | module_param(use_blk_mq, bool, S_IRUGO | S_IWUSR); |
3662 | MODULE_PARM_DESC(use_blk_mq, "Use block multiqueue for request-based DM devices"); | |
3663 | ||
1da177e4 LT |
3664 | MODULE_DESCRIPTION(DM_NAME " driver"); |
3665 | MODULE_AUTHOR("Joe Thornber <dm-devel@redhat.com>"); | |
3666 | MODULE_LICENSE("GPL"); |