blob: 3e8b43d792c252b198c9289c9d7ad39fab1f84c2 [file] [log] [blame]
Alex Eldere2a58ee2013-04-30 00:44:33 -05001
Yehuda Sadeh602adf42010-08-12 16:11:25 -07002/*
3 rbd.c -- Export ceph rados objects as a Linux block device
4
5
6 based on drivers/block/osdblk.c:
7
8 Copyright 2009 Red Hat, Inc.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program; see the file COPYING. If not, write to
21 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
22
23
24
Yehuda Sadehdfc56062010-11-19 14:51:04 -080025 For usage instructions, please refer to:
Yehuda Sadeh602adf42010-08-12 16:11:25 -070026
Yehuda Sadehdfc56062010-11-19 14:51:04 -080027 Documentation/ABI/testing/sysfs-bus-rbd
Yehuda Sadeh602adf42010-08-12 16:11:25 -070028
29 */
30
31#include <linux/ceph/libceph.h>
32#include <linux/ceph/osd_client.h>
33#include <linux/ceph/mon_client.h>
Ilya Dryomoved95b212016-08-12 16:40:02 +020034#include <linux/ceph/cls_lock_client.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070035#include <linux/ceph/decode.h>
Yehuda Sadeh59c2be12011-03-21 15:10:11 -070036#include <linux/parser.h>
Alex Elder30d1cff2013-05-01 12:43:03 -050037#include <linux/bsearch.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070038
39#include <linux/kernel.h>
40#include <linux/device.h>
41#include <linux/module.h>
Christoph Hellwig7ad18af2015-01-13 17:20:04 +010042#include <linux/blk-mq.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070043#include <linux/fs.h>
44#include <linux/blkdev.h>
Alex Elder1c2a9df2013-05-01 12:43:03 -050045#include <linux/slab.h>
Ilya Dryomovf8a22fc2013-12-13 15:28:57 +020046#include <linux/idr.h>
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +040047#include <linux/workqueue.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070048
49#include "rbd_types.h"
50
Alex Elderaafb2302012-09-06 16:00:54 -050051#define RBD_DEBUG /* Activate rbd_assert() calls */
52
Alex Elder593a9e72012-02-07 12:03:37 -060053/*
54 * The basic unit of block I/O is a sector. It is interpreted in a
55 * number of contexts in Linux (blk, bio, genhd), but the default is
56 * universally 512 bytes. These symbols are just slightly more
57 * meaningful than the bare numbers they represent.
58 */
59#define SECTOR_SHIFT 9
60#define SECTOR_SIZE (1ULL << SECTOR_SHIFT)
61
Alex Eldera2acd002013-05-08 22:50:04 -050062/*
63 * Increment the given counter and return its updated value.
64 * If the counter is already 0 it will not be incremented.
65 * If the counter is already at its maximum value returns
66 * -EINVAL without updating it.
67 */
68static int atomic_inc_return_safe(atomic_t *v)
69{
70 unsigned int counter;
71
72 counter = (unsigned int)__atomic_add_unless(v, 1, 0);
73 if (counter <= (unsigned int)INT_MAX)
74 return (int)counter;
75
76 atomic_dec(v);
77
78 return -EINVAL;
79}
80
81/* Decrement the counter. Return the resulting value, or -EINVAL */
82static int atomic_dec_return_safe(atomic_t *v)
83{
84 int counter;
85
86 counter = atomic_dec_return(v);
87 if (counter >= 0)
88 return counter;
89
90 atomic_inc(v);
91
92 return -EINVAL;
93}
94
Alex Elderf0f8cef2012-01-29 13:57:44 -060095#define RBD_DRV_NAME "rbd"
Yehuda Sadeh602adf42010-08-12 16:11:25 -070096
Ilya Dryomov7e513d42013-12-16 19:26:32 +020097#define RBD_MINORS_PER_MAJOR 256
98#define RBD_SINGLE_MAJOR_PART_SHIFT 4
Yehuda Sadeh602adf42010-08-12 16:11:25 -070099
Ilya Dryomov6d69bb532015-10-11 19:38:00 +0200100#define RBD_MAX_PARENT_CHAIN_LEN 16
101
Alex Elderd4b125e2012-07-03 16:01:19 -0500102#define RBD_SNAP_DEV_NAME_PREFIX "snap_"
103#define RBD_MAX_SNAP_NAME_LEN \
104 (NAME_MAX - (sizeof (RBD_SNAP_DEV_NAME_PREFIX) - 1))
105
Alex Elder35d489f2012-07-03 16:01:19 -0500106#define RBD_MAX_SNAP_COUNT 510 /* allows max snapc to fit in 4KB */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700107
108#define RBD_SNAP_HEAD_NAME "-"
109
Alex Elder9682fc62013-04-30 00:44:33 -0500110#define BAD_SNAP_INDEX U32_MAX /* invalid index into snap array */
111
Alex Elder9e15b772012-10-30 19:40:33 -0500112/* This allows a single page to hold an image name sent by OSD */
113#define RBD_IMAGE_NAME_LEN_MAX (PAGE_SIZE - sizeof (__le32) - 1)
Alex Elder1e130192012-07-03 16:01:19 -0500114#define RBD_IMAGE_ID_LEN_MAX 64
Alex Elder9e15b772012-10-30 19:40:33 -0500115
Alex Elder1e130192012-07-03 16:01:19 -0500116#define RBD_OBJ_PREFIX_LEN_MAX 64
Alex Elder589d30e2012-07-10 20:30:11 -0500117
Ilya Dryomoved95b212016-08-12 16:40:02 +0200118#define RBD_NOTIFY_TIMEOUT 5 /* seconds */
Ilya Dryomov99d16942016-08-12 16:11:41 +0200119#define RBD_RETRY_DELAY msecs_to_jiffies(1000)
120
Alex Elderd8891402012-10-09 13:50:17 -0700121/* Feature bits */
122
Ilya Dryomov8767b292017-03-02 19:56:57 +0100123#define RBD_FEATURE_LAYERING (1ULL<<0)
124#define RBD_FEATURE_STRIPINGV2 (1ULL<<1)
125#define RBD_FEATURE_EXCLUSIVE_LOCK (1ULL<<2)
126#define RBD_FEATURE_DATA_POOL (1ULL<<7)
127
Ilya Dryomoved95b212016-08-12 16:40:02 +0200128#define RBD_FEATURES_ALL (RBD_FEATURE_LAYERING | \
129 RBD_FEATURE_STRIPINGV2 | \
Ilya Dryomov7e973322017-01-25 18:16:22 +0100130 RBD_FEATURE_EXCLUSIVE_LOCK | \
131 RBD_FEATURE_DATA_POOL)
Alex Elderd8891402012-10-09 13:50:17 -0700132
133/* Features supported by this (client software) implementation. */
134
Alex Elder770eba62012-10-25 23:34:40 -0500135#define RBD_FEATURES_SUPPORTED (RBD_FEATURES_ALL)
Alex Elderd8891402012-10-09 13:50:17 -0700136
Alex Elder81a89792012-02-02 08:13:30 -0600137/*
138 * An RBD device name will be "rbd#", where the "rbd" comes from
139 * RBD_DRV_NAME above, and # is a unique integer identifier.
Alex Elder81a89792012-02-02 08:13:30 -0600140 */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700141#define DEV_NAME_LEN 32
142
143/*
144 * block device image metadata (in-memory version)
145 */
146struct rbd_image_header {
Alex Elderf35a4de2013-05-06 09:51:29 -0500147 /* These six fields never change for a given rbd image */
Alex Elder849b4262012-07-09 21:04:24 -0500148 char *object_prefix;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700149 __u8 obj_order;
Alex Elderf35a4de2013-05-06 09:51:29 -0500150 u64 stripe_unit;
151 u64 stripe_count;
Ilya Dryomov7e973322017-01-25 18:16:22 +0100152 s64 data_pool_id;
Alex Elderf35a4de2013-05-06 09:51:29 -0500153 u64 features; /* Might be changeable someday? */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700154
Alex Elderf84344f2012-08-31 17:29:51 -0500155 /* The remaining fields need to be updated occasionally */
156 u64 image_size;
157 struct ceph_snap_context *snapc;
Alex Elderf35a4de2013-05-06 09:51:29 -0500158 char *snap_names; /* format 1 only */
159 u64 *snap_sizes; /* format 1 only */
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700160};
161
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500162/*
163 * An rbd image specification.
164 *
165 * The tuple (pool_id, image_id, snap_id) is sufficient to uniquely
Alex Elderc66c6e02012-11-01 08:39:26 -0500166 * identify an image. Each rbd_dev structure includes a pointer to
167 * an rbd_spec structure that encapsulates this identity.
168 *
169 * Each of the id's in an rbd_spec has an associated name. For a
170 * user-mapped image, the names are supplied and the id's associated
171 * with them are looked up. For a layered image, a parent image is
172 * defined by the tuple, and the names are looked up.
173 *
174 * An rbd_dev structure contains a parent_spec pointer which is
175 * non-null if the image it represents is a child in a layered
176 * image. This pointer will refer to the rbd_spec structure used
177 * by the parent rbd_dev for its own identity (i.e., the structure
178 * is shared between the parent and child).
179 *
180 * Since these structures are populated once, during the discovery
181 * phase of image construction, they are effectively immutable so
182 * we make no effort to synchronize access to them.
183 *
184 * Note that code herein does not assume the image name is known (it
185 * could be a null pointer).
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500186 */
187struct rbd_spec {
188 u64 pool_id;
Alex Elderecb4dc22013-04-26 09:43:47 -0500189 const char *pool_name;
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500190
Alex Elderecb4dc22013-04-26 09:43:47 -0500191 const char *image_id;
192 const char *image_name;
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500193
194 u64 snap_id;
Alex Elderecb4dc22013-04-26 09:43:47 -0500195 const char *snap_name;
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500196
197 struct kref kref;
198};
199
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700200/*
Alex Elderf0f8cef2012-01-29 13:57:44 -0600201 * an instance of the client. multiple devices may share an rbd client.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700202 */
203struct rbd_client {
204 struct ceph_client *client;
205 struct kref kref;
206 struct list_head node;
207};
208
Alex Elderbf0d5f502012-11-22 00:00:08 -0600209struct rbd_img_request;
210typedef void (*rbd_img_callback_t)(struct rbd_img_request *);
211
212#define BAD_WHICH U32_MAX /* Good which or bad which, which? */
213
214struct rbd_obj_request;
215typedef void (*rbd_obj_callback_t)(struct rbd_obj_request *);
216
Alex Elder9969ebc2013-01-18 12:31:10 -0600217enum obj_request_type {
218 OBJ_REQUEST_NODATA, OBJ_REQUEST_BIO, OBJ_REQUEST_PAGES
219};
Alex Elderbf0d5f502012-11-22 00:00:08 -0600220
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800221enum obj_operation_type {
222 OBJ_OP_WRITE,
223 OBJ_OP_READ,
Guangliang Zhao90e98c52014-04-01 22:22:16 +0800224 OBJ_OP_DISCARD,
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800225};
226
Alex Elder926f9b32013-02-11 12:33:24 -0600227enum obj_req_flags {
228 OBJ_REQ_DONE, /* completion flag: not done = 0, done = 1 */
Alex Elder6365d332013-02-11 12:33:24 -0600229 OBJ_REQ_IMG_DATA, /* object usage: standalone = 0, image = 1 */
Alex Elder5679c592013-02-11 12:33:24 -0600230 OBJ_REQ_KNOWN, /* EXISTS flag valid: no = 0, yes = 1 */
231 OBJ_REQ_EXISTS, /* target exists: no = 0, yes = 1 */
Alex Elder926f9b32013-02-11 12:33:24 -0600232};
233
Alex Elderbf0d5f502012-11-22 00:00:08 -0600234struct rbd_obj_request {
Ilya Dryomova90bb0c2017-01-25 18:16:23 +0100235 u64 object_no;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600236 u64 offset; /* object start byte */
237 u64 length; /* bytes from offset */
Alex Elder926f9b32013-02-11 12:33:24 -0600238 unsigned long flags;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600239
Alex Elderc5b5ef62013-02-11 12:33:24 -0600240 /*
241 * An object request associated with an image will have its
242 * img_data flag set; a standalone object request will not.
243 *
244 * A standalone object request will have which == BAD_WHICH
245 * and a null obj_request pointer.
246 *
247 * An object request initiated in support of a layered image
248 * object (to check for its existence before a write) will
249 * have which == BAD_WHICH and a non-null obj_request pointer.
250 *
251 * Finally, an object request for rbd image data will have
252 * which != BAD_WHICH, and will have a non-null img_request
253 * pointer. The value of which will be in the range
254 * 0..(img_request->obj_request_count-1).
255 */
256 union {
257 struct rbd_obj_request *obj_request; /* STAT op */
258 struct {
259 struct rbd_img_request *img_request;
260 u64 img_offset;
261 /* links for img_request->obj_requests list */
262 struct list_head links;
263 };
264 };
Alex Elderbf0d5f502012-11-22 00:00:08 -0600265 u32 which; /* posn image request list */
266
267 enum obj_request_type type;
Alex Elder788e2df2013-01-17 12:25:27 -0600268 union {
269 struct bio *bio_list;
270 struct {
271 struct page **pages;
272 u32 page_count;
273 };
274 };
Alex Elder0eefd472013-04-19 15:34:50 -0500275 struct page **copyup_pages;
Alex Elderebda6402013-05-10 16:29:22 -0500276 u32 copyup_page_count;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600277
278 struct ceph_osd_request *osd_req;
279
280 u64 xferred; /* bytes transferred */
Sage Weil1b83bef2013-02-25 16:11:12 -0800281 int result;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600282
283 rbd_obj_callback_t callback;
Alex Elder788e2df2013-01-17 12:25:27 -0600284 struct completion completion;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600285
286 struct kref kref;
287};
288
Alex Elder0c425242013-02-08 09:55:49 -0600289enum img_req_flags {
Alex Elder9849e982013-01-24 16:13:36 -0600290 IMG_REQ_WRITE, /* I/O direction: read = 0, write = 1 */
291 IMG_REQ_CHILD, /* initiator: block = 0, child image = 1 */
Alex Elderd0b2e942013-01-24 16:13:36 -0600292 IMG_REQ_LAYERED, /* ENOENT handling: normal = 0, layered = 1 */
Guangliang Zhao90e98c52014-04-01 22:22:16 +0800293 IMG_REQ_DISCARD, /* discard: normal = 0, discard request = 1 */
Alex Elder0c425242013-02-08 09:55:49 -0600294};
295
Alex Elderbf0d5f502012-11-22 00:00:08 -0600296struct rbd_img_request {
Alex Elderbf0d5f502012-11-22 00:00:08 -0600297 struct rbd_device *rbd_dev;
298 u64 offset; /* starting image byte offset */
299 u64 length; /* byte count from offset */
Alex Elder0c425242013-02-08 09:55:49 -0600300 unsigned long flags;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600301 union {
Alex Elder9849e982013-01-24 16:13:36 -0600302 u64 snap_id; /* for reads */
Alex Elderbf0d5f502012-11-22 00:00:08 -0600303 struct ceph_snap_context *snapc; /* for writes */
Alex Elder9849e982013-01-24 16:13:36 -0600304 };
305 union {
306 struct request *rq; /* block request */
307 struct rbd_obj_request *obj_request; /* obj req initiator */
Alex Elderbf0d5f502012-11-22 00:00:08 -0600308 };
Alex Elder3d7efd12013-04-19 15:34:50 -0500309 struct page **copyup_pages;
Alex Elderebda6402013-05-10 16:29:22 -0500310 u32 copyup_page_count;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600311 spinlock_t completion_lock;/* protects next_completion */
312 u32 next_completion;
313 rbd_img_callback_t callback;
Alex Elder55f27e02013-04-10 12:34:25 -0500314 u64 xferred;/* aggregate bytes transferred */
Alex Eldera5a337d2013-01-24 16:13:36 -0600315 int result; /* first nonzero obj_request result */
Alex Elderbf0d5f502012-11-22 00:00:08 -0600316
317 u32 obj_request_count;
318 struct list_head obj_requests; /* rbd_obj_request structs */
319
320 struct kref kref;
321};
322
323#define for_each_obj_request(ireq, oreq) \
Alex Elderef06f4d32013-02-08 09:55:48 -0600324 list_for_each_entry(oreq, &(ireq)->obj_requests, links)
Alex Elderbf0d5f502012-11-22 00:00:08 -0600325#define for_each_obj_request_from(ireq, oreq) \
Alex Elderef06f4d32013-02-08 09:55:48 -0600326 list_for_each_entry_from(oreq, &(ireq)->obj_requests, links)
Alex Elderbf0d5f502012-11-22 00:00:08 -0600327#define for_each_obj_request_safe(ireq, oreq, n) \
Alex Elderef06f4d32013-02-08 09:55:48 -0600328 list_for_each_entry_safe_reverse(oreq, n, &(ireq)->obj_requests, links)
Alex Elderbf0d5f502012-11-22 00:00:08 -0600329
Ilya Dryomov99d16942016-08-12 16:11:41 +0200330enum rbd_watch_state {
331 RBD_WATCH_STATE_UNREGISTERED,
332 RBD_WATCH_STATE_REGISTERED,
333 RBD_WATCH_STATE_ERROR,
334};
335
Ilya Dryomoved95b212016-08-12 16:40:02 +0200336enum rbd_lock_state {
337 RBD_LOCK_STATE_UNLOCKED,
338 RBD_LOCK_STATE_LOCKED,
339 RBD_LOCK_STATE_RELEASING,
340};
341
342/* WatchNotify::ClientId */
343struct rbd_client_id {
344 u64 gid;
345 u64 handle;
346};
347
Alex Elderf84344f2012-08-31 17:29:51 -0500348struct rbd_mapping {
Alex Elder99c1f082012-08-30 14:42:15 -0500349 u64 size;
Alex Elder34b13182012-07-13 20:35:12 -0500350 u64 features;
Alex Elderf84344f2012-08-31 17:29:51 -0500351 bool read_only;
352};
353
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700354/*
355 * a single device
356 */
357struct rbd_device {
Alex Elderde71a292012-07-03 16:01:19 -0500358 int dev_id; /* blkdev unique id */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700359
360 int major; /* blkdev assigned major */
Ilya Dryomovdd82fff2013-12-13 15:28:57 +0200361 int minor;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700362 struct gendisk *disk; /* blkdev's gendisk and rq */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700363
Alex Eldera30b71b2012-07-10 20:30:11 -0500364 u32 image_format; /* Either 1 or 2 */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700365 struct rbd_client *rbd_client;
366
367 char name[DEV_NAME_LEN]; /* blkdev name, e.g. rbd3 */
368
Alex Elderb82d1672013-01-14 12:43:31 -0600369 spinlock_t lock; /* queue, flags, open_count */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700370
371 struct rbd_image_header header;
Alex Elderb82d1672013-01-14 12:43:31 -0600372 unsigned long flags; /* possibly lock protected */
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500373 struct rbd_spec *spec;
Ilya Dryomovd1475432015-06-22 13:24:48 +0300374 struct rbd_options *opts;
Mike Christie0d6d1e9c2016-08-18 18:38:45 +0200375 char *config_info; /* add{,_single_major} string */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700376
Ilya Dryomovc41d13a2016-04-29 20:01:25 +0200377 struct ceph_object_id header_oid;
Ilya Dryomov922dab62016-05-26 01:15:02 +0200378 struct ceph_object_locator header_oloc;
Alex Elder971f8392012-10-25 23:34:41 -0500379
Ilya Dryomov1643dfa2016-08-12 15:45:52 +0200380 struct ceph_file_layout layout; /* used for all rbd requests */
Alex Elder0903e872012-11-14 12:25:19 -0600381
Ilya Dryomov99d16942016-08-12 16:11:41 +0200382 struct mutex watch_mutex;
383 enum rbd_watch_state watch_state;
Ilya Dryomov922dab62016-05-26 01:15:02 +0200384 struct ceph_osd_linger_request *watch_handle;
Ilya Dryomov99d16942016-08-12 16:11:41 +0200385 u64 watch_cookie;
386 struct delayed_work watch_dwork;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700387
Ilya Dryomoved95b212016-08-12 16:40:02 +0200388 struct rw_semaphore lock_rwsem;
389 enum rbd_lock_state lock_state;
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +0200390 char lock_cookie[32];
Ilya Dryomoved95b212016-08-12 16:40:02 +0200391 struct rbd_client_id owner_cid;
392 struct work_struct acquired_lock_work;
393 struct work_struct released_lock_work;
394 struct delayed_work lock_dwork;
395 struct work_struct unlock_work;
396 wait_queue_head_t lock_waitq;
397
Ilya Dryomov1643dfa2016-08-12 15:45:52 +0200398 struct workqueue_struct *task_wq;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700399
Alex Elder86b00e02012-10-25 23:34:42 -0500400 struct rbd_spec *parent_spec;
401 u64 parent_overlap;
Alex Eldera2acd002013-05-08 22:50:04 -0500402 atomic_t parent_ref;
Alex Elder2f82ee52012-10-30 19:40:33 -0500403 struct rbd_device *parent;
Alex Elder86b00e02012-10-25 23:34:42 -0500404
Christoph Hellwig7ad18af2015-01-13 17:20:04 +0100405 /* Block layer tags. */
406 struct blk_mq_tag_set tag_set;
407
Josh Durginc6666012011-11-21 17:11:12 -0800408 /* protects updating the header */
409 struct rw_semaphore header_rwsem;
Alex Elderf84344f2012-08-31 17:29:51 -0500410
411 struct rbd_mapping mapping;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700412
413 struct list_head node;
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800414
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800415 /* sysfs related */
416 struct device dev;
Alex Elderb82d1672013-01-14 12:43:31 -0600417 unsigned long open_count; /* protected by lock */
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800418};
419
Alex Elderb82d1672013-01-14 12:43:31 -0600420/*
Ilya Dryomov87c0fde2016-09-29 13:41:05 +0200421 * Flag bits for rbd_dev->flags:
422 * - REMOVING (which is coupled with rbd_dev->open_count) is protected
423 * by rbd_dev->lock
424 * - BLACKLISTED is protected by rbd_dev->lock_rwsem
Alex Elderb82d1672013-01-14 12:43:31 -0600425 */
Alex Elder6d292902013-01-14 12:43:31 -0600426enum rbd_dev_flags {
427 RBD_DEV_FLAG_EXISTS, /* mapped snapshot has not been deleted */
Alex Elderb82d1672013-01-14 12:43:31 -0600428 RBD_DEV_FLAG_REMOVING, /* this mapping is being removed */
Ilya Dryomov87c0fde2016-09-29 13:41:05 +0200429 RBD_DEV_FLAG_BLACKLISTED, /* our ceph_client is blacklisted */
Alex Elder6d292902013-01-14 12:43:31 -0600430};
431
Alex Eldercfbf6372013-05-31 17:40:45 -0500432static DEFINE_MUTEX(client_mutex); /* Serialize client creation */
Alex Eldere124a82f2012-01-29 13:57:44 -0600433
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700434static LIST_HEAD(rbd_dev_list); /* devices */
Alex Eldere124a82f2012-01-29 13:57:44 -0600435static DEFINE_SPINLOCK(rbd_dev_list_lock);
436
Alex Elder432b8582012-01-29 13:57:44 -0600437static LIST_HEAD(rbd_client_list); /* clients */
438static DEFINE_SPINLOCK(rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700439
Alex Elder78c2a442013-05-01 12:43:04 -0500440/* Slab caches for frequently-allocated structures */
441
Alex Elder1c2a9df2013-05-01 12:43:03 -0500442static struct kmem_cache *rbd_img_request_cache;
Alex Elder868311b2013-05-01 12:43:03 -0500443static struct kmem_cache *rbd_obj_request_cache;
Alex Elder1c2a9df2013-05-01 12:43:03 -0500444
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200445static int rbd_major;
Ilya Dryomovf8a22fc2013-12-13 15:28:57 +0200446static DEFINE_IDA(rbd_dev_id_ida);
447
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +0400448static struct workqueue_struct *rbd_wq;
449
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200450/*
451 * Default to false for now, as single-major requires >= 0.75 version of
452 * userspace rbd utility.
453 */
454static bool single_major = false;
455module_param(single_major, bool, S_IRUGO);
456MODULE_PARM_DESC(single_major, "Use a single major number for all rbd devices (default: false)");
457
Alex Elder3d7efd12013-04-19 15:34:50 -0500458static int rbd_img_request_submit(struct rbd_img_request *img_request);
459
Alex Elderf0f8cef2012-01-29 13:57:44 -0600460static ssize_t rbd_add(struct bus_type *bus, const char *buf,
461 size_t count);
462static ssize_t rbd_remove(struct bus_type *bus, const char *buf,
463 size_t count);
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200464static ssize_t rbd_add_single_major(struct bus_type *bus, const char *buf,
465 size_t count);
466static ssize_t rbd_remove_single_major(struct bus_type *bus, const char *buf,
467 size_t count);
Ilya Dryomov6d69bb532015-10-11 19:38:00 +0200468static int rbd_dev_image_probe(struct rbd_device *rbd_dev, int depth);
Alex Eldera2acd002013-05-08 22:50:04 -0500469static void rbd_spec_put(struct rbd_spec *spec);
Alex Elderf0f8cef2012-01-29 13:57:44 -0600470
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200471static int rbd_dev_id_to_minor(int dev_id)
472{
Ilya Dryomov7e513d42013-12-16 19:26:32 +0200473 return dev_id << RBD_SINGLE_MAJOR_PART_SHIFT;
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200474}
475
476static int minor_to_rbd_dev_id(int minor)
477{
Ilya Dryomov7e513d42013-12-16 19:26:32 +0200478 return minor >> RBD_SINGLE_MAJOR_PART_SHIFT;
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200479}
480
Ilya Dryomoved95b212016-08-12 16:40:02 +0200481static bool __rbd_is_lock_owner(struct rbd_device *rbd_dev)
482{
483 return rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED ||
484 rbd_dev->lock_state == RBD_LOCK_STATE_RELEASING;
485}
486
487static bool rbd_is_lock_owner(struct rbd_device *rbd_dev)
488{
489 bool is_lock_owner;
490
491 down_read(&rbd_dev->lock_rwsem);
492 is_lock_owner = __rbd_is_lock_owner(rbd_dev);
493 up_read(&rbd_dev->lock_rwsem);
494 return is_lock_owner;
495}
496
Ilya Dryomov8767b292017-03-02 19:56:57 +0100497static ssize_t rbd_supported_features_show(struct bus_type *bus, char *buf)
498{
499 return sprintf(buf, "0x%llx\n", RBD_FEATURES_SUPPORTED);
500}
501
Greg Kroah-Hartmanb15a21d2013-08-23 14:24:28 -0700502static BUS_ATTR(add, S_IWUSR, NULL, rbd_add);
503static BUS_ATTR(remove, S_IWUSR, NULL, rbd_remove);
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200504static BUS_ATTR(add_single_major, S_IWUSR, NULL, rbd_add_single_major);
505static BUS_ATTR(remove_single_major, S_IWUSR, NULL, rbd_remove_single_major);
Ilya Dryomov8767b292017-03-02 19:56:57 +0100506static BUS_ATTR(supported_features, S_IRUGO, rbd_supported_features_show, NULL);
Greg Kroah-Hartmanb15a21d2013-08-23 14:24:28 -0700507
508static struct attribute *rbd_bus_attrs[] = {
509 &bus_attr_add.attr,
510 &bus_attr_remove.attr,
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200511 &bus_attr_add_single_major.attr,
512 &bus_attr_remove_single_major.attr,
Ilya Dryomov8767b292017-03-02 19:56:57 +0100513 &bus_attr_supported_features.attr,
Greg Kroah-Hartmanb15a21d2013-08-23 14:24:28 -0700514 NULL,
Alex Elderf0f8cef2012-01-29 13:57:44 -0600515};
Ilya Dryomov92c76dc2013-12-13 15:28:57 +0200516
517static umode_t rbd_bus_is_visible(struct kobject *kobj,
518 struct attribute *attr, int index)
519{
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200520 if (!single_major &&
521 (attr == &bus_attr_add_single_major.attr ||
522 attr == &bus_attr_remove_single_major.attr))
523 return 0;
524
Ilya Dryomov92c76dc2013-12-13 15:28:57 +0200525 return attr->mode;
526}
527
528static const struct attribute_group rbd_bus_group = {
529 .attrs = rbd_bus_attrs,
530 .is_visible = rbd_bus_is_visible,
531};
532__ATTRIBUTE_GROUPS(rbd_bus);
Alex Elderf0f8cef2012-01-29 13:57:44 -0600533
534static struct bus_type rbd_bus_type = {
535 .name = "rbd",
Greg Kroah-Hartmanb15a21d2013-08-23 14:24:28 -0700536 .bus_groups = rbd_bus_groups,
Alex Elderf0f8cef2012-01-29 13:57:44 -0600537};
538
539static void rbd_root_dev_release(struct device *dev)
540{
541}
542
543static struct device rbd_root_dev = {
544 .init_name = "rbd",
545 .release = rbd_root_dev_release,
546};
547
Alex Elder06ecc6c2012-11-01 10:17:15 -0500548static __printf(2, 3)
549void rbd_warn(struct rbd_device *rbd_dev, const char *fmt, ...)
550{
551 struct va_format vaf;
552 va_list args;
553
554 va_start(args, fmt);
555 vaf.fmt = fmt;
556 vaf.va = &args;
557
558 if (!rbd_dev)
559 printk(KERN_WARNING "%s: %pV\n", RBD_DRV_NAME, &vaf);
560 else if (rbd_dev->disk)
561 printk(KERN_WARNING "%s: %s: %pV\n",
562 RBD_DRV_NAME, rbd_dev->disk->disk_name, &vaf);
563 else if (rbd_dev->spec && rbd_dev->spec->image_name)
564 printk(KERN_WARNING "%s: image %s: %pV\n",
565 RBD_DRV_NAME, rbd_dev->spec->image_name, &vaf);
566 else if (rbd_dev->spec && rbd_dev->spec->image_id)
567 printk(KERN_WARNING "%s: id %s: %pV\n",
568 RBD_DRV_NAME, rbd_dev->spec->image_id, &vaf);
569 else /* punt */
570 printk(KERN_WARNING "%s: rbd_dev %p: %pV\n",
571 RBD_DRV_NAME, rbd_dev, &vaf);
572 va_end(args);
573}
574
Alex Elderaafb2302012-09-06 16:00:54 -0500575#ifdef RBD_DEBUG
576#define rbd_assert(expr) \
577 if (unlikely(!(expr))) { \
578 printk(KERN_ERR "\nAssertion failure in %s() " \
579 "at line %d:\n\n" \
580 "\trbd_assert(%s);\n\n", \
581 __func__, __LINE__, #expr); \
582 BUG(); \
583 }
584#else /* !RBD_DEBUG */
585# define rbd_assert(expr) ((void) 0)
586#endif /* !RBD_DEBUG */
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800587
Ilya Dryomov27617132015-07-16 17:36:11 +0300588static void rbd_osd_copyup_callback(struct rbd_obj_request *obj_request);
Alex Elderb454e362013-04-19 15:34:50 -0500589static int rbd_img_obj_request_submit(struct rbd_obj_request *obj_request);
Alex Elder05a46af2013-04-26 15:44:36 -0500590static void rbd_img_parent_read(struct rbd_obj_request *obj_request);
591static void rbd_dev_remove_parent(struct rbd_device *rbd_dev);
Alex Elder8b3e1a52013-01-24 16:13:36 -0600592
Alex Eldercc4a38bd2013-04-30 00:44:33 -0500593static int rbd_dev_refresh(struct rbd_device *rbd_dev);
Alex Elder2df3fac2013-05-06 09:51:30 -0500594static int rbd_dev_v2_header_onetime(struct rbd_device *rbd_dev);
Ilya Dryomova720ae02014-07-23 17:11:19 +0400595static int rbd_dev_header_info(struct rbd_device *rbd_dev);
Ilya Dryomove8f59b52014-07-24 10:42:13 +0400596static int rbd_dev_v2_parent_info(struct rbd_device *rbd_dev);
Alex Elder54cac612013-04-30 00:44:33 -0500597static const char *rbd_dev_v2_snap_name(struct rbd_device *rbd_dev,
598 u64 snap_id);
Alex Elder2ad3d712013-04-30 00:44:33 -0500599static int _rbd_dev_v2_snap_size(struct rbd_device *rbd_dev, u64 snap_id,
600 u8 *order, u64 *snap_size);
601static int _rbd_dev_v2_snap_features(struct rbd_device *rbd_dev, u64 snap_id,
602 u64 *snap_features);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700603
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700604static int rbd_open(struct block_device *bdev, fmode_t mode)
605{
Alex Elderf0f8cef2012-01-29 13:57:44 -0600606 struct rbd_device *rbd_dev = bdev->bd_disk->private_data;
Alex Elderb82d1672013-01-14 12:43:31 -0600607 bool removing = false;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700608
Alex Elderf84344f2012-08-31 17:29:51 -0500609 if ((mode & FMODE_WRITE) && rbd_dev->mapping.read_only)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700610 return -EROFS;
611
Alex Eldera14ea262013-02-05 13:23:12 -0600612 spin_lock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600613 if (test_bit(RBD_DEV_FLAG_REMOVING, &rbd_dev->flags))
614 removing = true;
615 else
616 rbd_dev->open_count++;
Alex Eldera14ea262013-02-05 13:23:12 -0600617 spin_unlock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600618 if (removing)
619 return -ENOENT;
620
Alex Elderc3e946c2012-11-16 09:29:16 -0600621 (void) get_device(&rbd_dev->dev);
Alex Elder340c7a22012-08-10 13:12:07 -0700622
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700623 return 0;
624}
625
Al Virodb2a1442013-05-05 21:52:57 -0400626static void rbd_release(struct gendisk *disk, fmode_t mode)
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800627{
628 struct rbd_device *rbd_dev = disk->private_data;
Alex Elderb82d1672013-01-14 12:43:31 -0600629 unsigned long open_count_before;
630
Alex Eldera14ea262013-02-05 13:23:12 -0600631 spin_lock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600632 open_count_before = rbd_dev->open_count--;
Alex Eldera14ea262013-02-05 13:23:12 -0600633 spin_unlock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600634 rbd_assert(open_count_before > 0);
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800635
Alex Elderc3e946c2012-11-16 09:29:16 -0600636 put_device(&rbd_dev->dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800637}
638
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800639static int rbd_ioctl_set_ro(struct rbd_device *rbd_dev, unsigned long arg)
640{
Josh Durgin77f33c02013-09-30 17:09:54 -0700641 int ret = 0;
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800642 int val;
643 bool ro;
Josh Durgin77f33c02013-09-30 17:09:54 -0700644 bool ro_changed = false;
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800645
Josh Durgin77f33c02013-09-30 17:09:54 -0700646 /* get_user() may sleep, so call it before taking rbd_dev->lock */
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800647 if (get_user(val, (int __user *)(arg)))
648 return -EFAULT;
649
650 ro = val ? true : false;
651 /* Snapshot doesn't allow to write*/
652 if (rbd_dev->spec->snap_id != CEPH_NOSNAP && !ro)
653 return -EROFS;
654
Josh Durgin77f33c02013-09-30 17:09:54 -0700655 spin_lock_irq(&rbd_dev->lock);
656 /* prevent others open this device */
657 if (rbd_dev->open_count > 1) {
658 ret = -EBUSY;
659 goto out;
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800660 }
661
Josh Durgin77f33c02013-09-30 17:09:54 -0700662 if (rbd_dev->mapping.read_only != ro) {
663 rbd_dev->mapping.read_only = ro;
664 ro_changed = true;
665 }
666
667out:
668 spin_unlock_irq(&rbd_dev->lock);
669 /* set_disk_ro() may sleep, so call it after releasing rbd_dev->lock */
670 if (ret == 0 && ro_changed)
671 set_disk_ro(rbd_dev->disk, ro ? 1 : 0);
672
673 return ret;
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800674}
675
676static int rbd_ioctl(struct block_device *bdev, fmode_t mode,
677 unsigned int cmd, unsigned long arg)
678{
679 struct rbd_device *rbd_dev = bdev->bd_disk->private_data;
680 int ret = 0;
681
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800682 switch (cmd) {
683 case BLKROSET:
684 ret = rbd_ioctl_set_ro(rbd_dev, arg);
685 break;
686 default:
687 ret = -ENOTTY;
688 }
689
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800690 return ret;
691}
692
693#ifdef CONFIG_COMPAT
694static int rbd_compat_ioctl(struct block_device *bdev, fmode_t mode,
695 unsigned int cmd, unsigned long arg)
696{
697 return rbd_ioctl(bdev, mode, cmd, arg);
698}
699#endif /* CONFIG_COMPAT */
700
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700701static const struct block_device_operations rbd_bd_ops = {
702 .owner = THIS_MODULE,
703 .open = rbd_open,
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800704 .release = rbd_release,
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800705 .ioctl = rbd_ioctl,
706#ifdef CONFIG_COMPAT
707 .compat_ioctl = rbd_compat_ioctl,
708#endif
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700709};
710
711/*
Alex Elder7262cfc2013-05-16 15:04:20 -0500712 * Initialize an rbd client instance. Success or not, this function
Alex Eldercfbf6372013-05-31 17:40:45 -0500713 * consumes ceph_opts. Caller holds client_mutex.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700714 */
Alex Elderf8c38922012-08-10 13:12:07 -0700715static struct rbd_client *rbd_client_create(struct ceph_options *ceph_opts)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700716{
717 struct rbd_client *rbdc;
718 int ret = -ENOMEM;
719
Alex Elder37206ee2013-02-20 17:32:08 -0600720 dout("%s:\n", __func__);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700721 rbdc = kmalloc(sizeof(struct rbd_client), GFP_KERNEL);
722 if (!rbdc)
723 goto out_opt;
724
725 kref_init(&rbdc->kref);
726 INIT_LIST_HEAD(&rbdc->node);
727
Ilya Dryomov74da4a0f2017-03-03 18:16:07 +0100728 rbdc->client = ceph_create_client(ceph_opts, rbdc);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700729 if (IS_ERR(rbdc->client))
Alex Elder08f75462013-05-29 11:19:00 -0500730 goto out_rbdc;
Alex Elder43ae4702012-07-03 16:01:18 -0500731 ceph_opts = NULL; /* Now rbdc->client is responsible for ceph_opts */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700732
733 ret = ceph_open_session(rbdc->client);
734 if (ret < 0)
Alex Elder08f75462013-05-29 11:19:00 -0500735 goto out_client;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700736
Alex Elder432b8582012-01-29 13:57:44 -0600737 spin_lock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700738 list_add_tail(&rbdc->node, &rbd_client_list);
Alex Elder432b8582012-01-29 13:57:44 -0600739 spin_unlock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700740
Alex Elder37206ee2013-02-20 17:32:08 -0600741 dout("%s: rbdc %p\n", __func__, rbdc);
Alex Elderbc534d82012-01-29 13:57:44 -0600742
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700743 return rbdc;
Alex Elder08f75462013-05-29 11:19:00 -0500744out_client:
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700745 ceph_destroy_client(rbdc->client);
Alex Elder08f75462013-05-29 11:19:00 -0500746out_rbdc:
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700747 kfree(rbdc);
748out_opt:
Alex Elder43ae4702012-07-03 16:01:18 -0500749 if (ceph_opts)
750 ceph_destroy_options(ceph_opts);
Alex Elder37206ee2013-02-20 17:32:08 -0600751 dout("%s: error %d\n", __func__, ret);
752
Vasiliy Kulikov28f259b2010-09-26 12:59:37 +0400753 return ERR_PTR(ret);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700754}
755
Alex Elder2f82ee52012-10-30 19:40:33 -0500756static struct rbd_client *__rbd_get_client(struct rbd_client *rbdc)
757{
758 kref_get(&rbdc->kref);
759
760 return rbdc;
761}
762
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700763/*
Alex Elder1f7ba332012-08-10 13:12:07 -0700764 * Find a ceph client with specific addr and configuration. If
765 * found, bump its reference count.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700766 */
Alex Elder1f7ba332012-08-10 13:12:07 -0700767static struct rbd_client *rbd_client_find(struct ceph_options *ceph_opts)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700768{
769 struct rbd_client *client_node;
Alex Elder1f7ba332012-08-10 13:12:07 -0700770 bool found = false;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700771
Alex Elder43ae4702012-07-03 16:01:18 -0500772 if (ceph_opts->flags & CEPH_OPT_NOSHARE)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700773 return NULL;
774
Alex Elder1f7ba332012-08-10 13:12:07 -0700775 spin_lock(&rbd_client_list_lock);
776 list_for_each_entry(client_node, &rbd_client_list, node) {
777 if (!ceph_compare_options(ceph_opts, client_node->client)) {
Alex Elder2f82ee52012-10-30 19:40:33 -0500778 __rbd_get_client(client_node);
779
Alex Elder1f7ba332012-08-10 13:12:07 -0700780 found = true;
781 break;
782 }
783 }
784 spin_unlock(&rbd_client_list_lock);
785
786 return found ? client_node : NULL;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700787}
788
789/*
Ilya Dryomov210c1042015-06-22 13:24:48 +0300790 * (Per device) rbd map options
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700791 */
792enum {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300793 Opt_queue_depth,
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700794 Opt_last_int,
795 /* int args above */
796 Opt_last_string,
797 /* string args above */
Alex Eldercc0538b2012-08-10 13:12:07 -0700798 Opt_read_only,
799 Opt_read_write,
Ilya Dryomov80de1912016-09-20 14:23:17 +0200800 Opt_lock_on_read,
Ilya Dryomove010dd02017-04-13 12:17:39 +0200801 Opt_exclusive,
Ilya Dryomov210c1042015-06-22 13:24:48 +0300802 Opt_err
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700803};
804
Alex Elder43ae4702012-07-03 16:01:18 -0500805static match_table_t rbd_opts_tokens = {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300806 {Opt_queue_depth, "queue_depth=%d"},
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700807 /* int args above */
808 /* string args above */
Alex Elderbe466c12012-10-22 11:31:26 -0500809 {Opt_read_only, "read_only"},
Alex Eldercc0538b2012-08-10 13:12:07 -0700810 {Opt_read_only, "ro"}, /* Alternate spelling */
811 {Opt_read_write, "read_write"},
812 {Opt_read_write, "rw"}, /* Alternate spelling */
Ilya Dryomov80de1912016-09-20 14:23:17 +0200813 {Opt_lock_on_read, "lock_on_read"},
Ilya Dryomove010dd02017-04-13 12:17:39 +0200814 {Opt_exclusive, "exclusive"},
Ilya Dryomov210c1042015-06-22 13:24:48 +0300815 {Opt_err, NULL}
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700816};
817
Alex Elder98571b52013-01-20 14:44:42 -0600818struct rbd_options {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300819 int queue_depth;
Alex Elder98571b52013-01-20 14:44:42 -0600820 bool read_only;
Ilya Dryomov80de1912016-09-20 14:23:17 +0200821 bool lock_on_read;
Ilya Dryomove010dd02017-04-13 12:17:39 +0200822 bool exclusive;
Alex Elder98571b52013-01-20 14:44:42 -0600823};
824
Ilya Dryomovb5584182015-06-23 16:21:19 +0300825#define RBD_QUEUE_DEPTH_DEFAULT BLKDEV_MAX_RQ
Alex Elder98571b52013-01-20 14:44:42 -0600826#define RBD_READ_ONLY_DEFAULT false
Ilya Dryomov80de1912016-09-20 14:23:17 +0200827#define RBD_LOCK_ON_READ_DEFAULT false
Ilya Dryomove010dd02017-04-13 12:17:39 +0200828#define RBD_EXCLUSIVE_DEFAULT false
Alex Elder98571b52013-01-20 14:44:42 -0600829
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700830static int parse_rbd_opts_token(char *c, void *private)
831{
Alex Elder43ae4702012-07-03 16:01:18 -0500832 struct rbd_options *rbd_opts = private;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700833 substring_t argstr[MAX_OPT_ARGS];
834 int token, intval, ret;
835
Alex Elder43ae4702012-07-03 16:01:18 -0500836 token = match_token(c, rbd_opts_tokens, argstr);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700837 if (token < Opt_last_int) {
838 ret = match_int(&argstr[0], &intval);
839 if (ret < 0) {
Ilya Dryomov210c1042015-06-22 13:24:48 +0300840 pr_err("bad mount option arg (not int) at '%s'\n", c);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700841 return ret;
842 }
843 dout("got int token %d val %d\n", token, intval);
844 } else if (token > Opt_last_int && token < Opt_last_string) {
Ilya Dryomov210c1042015-06-22 13:24:48 +0300845 dout("got string token %d val %s\n", token, argstr[0].from);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700846 } else {
847 dout("got token %d\n", token);
848 }
849
850 switch (token) {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300851 case Opt_queue_depth:
852 if (intval < 1) {
853 pr_err("queue_depth out of range\n");
854 return -EINVAL;
855 }
856 rbd_opts->queue_depth = intval;
857 break;
Alex Eldercc0538b2012-08-10 13:12:07 -0700858 case Opt_read_only:
859 rbd_opts->read_only = true;
860 break;
861 case Opt_read_write:
862 rbd_opts->read_only = false;
863 break;
Ilya Dryomov80de1912016-09-20 14:23:17 +0200864 case Opt_lock_on_read:
865 rbd_opts->lock_on_read = true;
866 break;
Ilya Dryomove010dd02017-04-13 12:17:39 +0200867 case Opt_exclusive:
868 rbd_opts->exclusive = true;
869 break;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700870 default:
Ilya Dryomov210c1042015-06-22 13:24:48 +0300871 /* libceph prints "bad option" msg */
872 return -EINVAL;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700873 }
Ilya Dryomov210c1042015-06-22 13:24:48 +0300874
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700875 return 0;
876}
877
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800878static char* obj_op_name(enum obj_operation_type op_type)
879{
880 switch (op_type) {
881 case OBJ_OP_READ:
882 return "read";
883 case OBJ_OP_WRITE:
884 return "write";
Guangliang Zhao90e98c52014-04-01 22:22:16 +0800885 case OBJ_OP_DISCARD:
886 return "discard";
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800887 default:
888 return "???";
889 }
890}
891
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700892/*
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700893 * Get a ceph client with specific addr and configuration, if one does
Alex Elder7262cfc2013-05-16 15:04:20 -0500894 * not exist create it. Either way, ceph_opts is consumed by this
895 * function.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700896 */
Alex Elder9d3997f2012-10-25 23:34:42 -0500897static struct rbd_client *rbd_get_client(struct ceph_options *ceph_opts)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700898{
Alex Elderf8c38922012-08-10 13:12:07 -0700899 struct rbd_client *rbdc;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700900
Alex Eldercfbf6372013-05-31 17:40:45 -0500901 mutex_lock_nested(&client_mutex, SINGLE_DEPTH_NESTING);
Alex Elder1f7ba332012-08-10 13:12:07 -0700902 rbdc = rbd_client_find(ceph_opts);
Alex Elder9d3997f2012-10-25 23:34:42 -0500903 if (rbdc) /* using an existing client */
Alex Elder43ae4702012-07-03 16:01:18 -0500904 ceph_destroy_options(ceph_opts);
Alex Elder9d3997f2012-10-25 23:34:42 -0500905 else
Alex Elderf8c38922012-08-10 13:12:07 -0700906 rbdc = rbd_client_create(ceph_opts);
Alex Eldercfbf6372013-05-31 17:40:45 -0500907 mutex_unlock(&client_mutex);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700908
Alex Elder9d3997f2012-10-25 23:34:42 -0500909 return rbdc;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700910}
911
912/*
913 * Destroy ceph client
Alex Elderd23a4b32012-01-29 13:57:43 -0600914 *
Alex Elder432b8582012-01-29 13:57:44 -0600915 * Caller must hold rbd_client_list_lock.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700916 */
917static void rbd_client_release(struct kref *kref)
918{
919 struct rbd_client *rbdc = container_of(kref, struct rbd_client, kref);
920
Alex Elder37206ee2013-02-20 17:32:08 -0600921 dout("%s: rbdc %p\n", __func__, rbdc);
Alex Eldercd9d9f52012-04-04 13:35:44 -0500922 spin_lock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700923 list_del(&rbdc->node);
Alex Eldercd9d9f52012-04-04 13:35:44 -0500924 spin_unlock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700925
926 ceph_destroy_client(rbdc->client);
927 kfree(rbdc);
928}
929
930/*
931 * Drop reference to ceph client node. If it's not referenced anymore, release
932 * it.
933 */
Alex Elder9d3997f2012-10-25 23:34:42 -0500934static void rbd_put_client(struct rbd_client *rbdc)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700935{
Alex Elderc53d5892012-10-25 23:34:42 -0500936 if (rbdc)
937 kref_put(&rbdc->kref, rbd_client_release);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700938}
939
Alex Eldera30b71b2012-07-10 20:30:11 -0500940static bool rbd_image_format_valid(u32 image_format)
941{
942 return image_format == 1 || image_format == 2;
943}
944
Alex Elder8e94af82012-07-25 09:32:40 -0500945static bool rbd_dev_ondisk_valid(struct rbd_image_header_ondisk *ondisk)
946{
Alex Elder103a1502012-08-02 11:29:45 -0500947 size_t size;
948 u32 snap_count;
949
950 /* The header has to start with the magic rbd header text */
951 if (memcmp(&ondisk->text, RBD_HEADER_TEXT, sizeof (RBD_HEADER_TEXT)))
952 return false;
953
Alex Elderdb2388b2012-10-20 22:17:27 -0500954 /* The bio layer requires at least sector-sized I/O */
955
956 if (ondisk->options.order < SECTOR_SHIFT)
957 return false;
958
959 /* If we use u64 in a few spots we may be able to loosen this */
960
961 if (ondisk->options.order > 8 * sizeof (int) - 1)
962 return false;
963
Alex Elder103a1502012-08-02 11:29:45 -0500964 /*
965 * The size of a snapshot header has to fit in a size_t, and
966 * that limits the number of snapshots.
967 */
968 snap_count = le32_to_cpu(ondisk->snap_count);
969 size = SIZE_MAX - sizeof (struct ceph_snap_context);
970 if (snap_count > size / sizeof (__le64))
971 return false;
972
973 /*
974 * Not only that, but the size of the entire the snapshot
975 * header must also be representable in a size_t.
976 */
977 size -= snap_count * sizeof (__le64);
978 if ((u64) size < le64_to_cpu(ondisk->snap_names_len))
979 return false;
980
981 return true;
Alex Elder8e94af82012-07-25 09:32:40 -0500982}
983
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700984/*
Ilya Dryomov5bc3fb12017-01-25 18:16:22 +0100985 * returns the size of an object in the image
986 */
987static u32 rbd_obj_bytes(struct rbd_image_header *header)
988{
989 return 1U << header->obj_order;
990}
991
Ilya Dryomov263423f2017-01-25 18:16:22 +0100992static void rbd_init_layout(struct rbd_device *rbd_dev)
993{
994 if (rbd_dev->header.stripe_unit == 0 ||
995 rbd_dev->header.stripe_count == 0) {
996 rbd_dev->header.stripe_unit = rbd_obj_bytes(&rbd_dev->header);
997 rbd_dev->header.stripe_count = 1;
998 }
999
1000 rbd_dev->layout.stripe_unit = rbd_dev->header.stripe_unit;
1001 rbd_dev->layout.stripe_count = rbd_dev->header.stripe_count;
1002 rbd_dev->layout.object_size = rbd_obj_bytes(&rbd_dev->header);
Ilya Dryomov7e973322017-01-25 18:16:22 +01001003 rbd_dev->layout.pool_id = rbd_dev->header.data_pool_id == CEPH_NOPOOL ?
1004 rbd_dev->spec->pool_id : rbd_dev->header.data_pool_id;
Ilya Dryomov263423f2017-01-25 18:16:22 +01001005 RCU_INIT_POINTER(rbd_dev->layout.pool_ns, NULL);
1006}
1007
Ilya Dryomov5bc3fb12017-01-25 18:16:22 +01001008/*
Alex Elderbb23e372013-05-06 09:51:29 -05001009 * Fill an rbd image header with information from the given format 1
1010 * on-disk header.
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001011 */
Alex Elder662518b2013-05-06 09:51:29 -05001012static int rbd_header_from_disk(struct rbd_device *rbd_dev,
Alex Elder4156d992012-08-02 11:29:46 -05001013 struct rbd_image_header_ondisk *ondisk)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001014{
Alex Elder662518b2013-05-06 09:51:29 -05001015 struct rbd_image_header *header = &rbd_dev->header;
Alex Elderbb23e372013-05-06 09:51:29 -05001016 bool first_time = header->object_prefix == NULL;
1017 struct ceph_snap_context *snapc;
1018 char *object_prefix = NULL;
1019 char *snap_names = NULL;
1020 u64 *snap_sizes = NULL;
Alex Elderccece232012-07-10 20:30:10 -05001021 u32 snap_count;
Alex Elderbb23e372013-05-06 09:51:29 -05001022 int ret = -ENOMEM;
Alex Elder621901d2012-08-23 23:22:06 -05001023 u32 i;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001024
Alex Elderbb23e372013-05-06 09:51:29 -05001025 /* Allocate this now to avoid having to handle failure below */
1026
1027 if (first_time) {
Ilya Dryomov848d7962017-01-25 18:16:21 +01001028 object_prefix = kstrndup(ondisk->object_prefix,
1029 sizeof(ondisk->object_prefix),
1030 GFP_KERNEL);
Alex Elderbb23e372013-05-06 09:51:29 -05001031 if (!object_prefix)
1032 return -ENOMEM;
Alex Elderbb23e372013-05-06 09:51:29 -05001033 }
1034
1035 /* Allocate the snapshot context and fill it in */
Alex Elder6a523252012-07-19 17:12:59 -05001036
Alex Elder103a1502012-08-02 11:29:45 -05001037 snap_count = le32_to_cpu(ondisk->snap_count);
Alex Elderbb23e372013-05-06 09:51:29 -05001038 snapc = ceph_create_snap_context(snap_count, GFP_KERNEL);
1039 if (!snapc)
1040 goto out_err;
1041 snapc->seq = le64_to_cpu(ondisk->snap_seq);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001042 if (snap_count) {
Alex Elderbb23e372013-05-06 09:51:29 -05001043 struct rbd_image_snap_ondisk *snaps;
Alex Elderf785cc12012-08-23 23:22:06 -05001044 u64 snap_names_len = le64_to_cpu(ondisk->snap_names_len);
1045
Alex Elderbb23e372013-05-06 09:51:29 -05001046 /* We'll keep a copy of the snapshot names... */
Alex Elder621901d2012-08-23 23:22:06 -05001047
Alex Elderbb23e372013-05-06 09:51:29 -05001048 if (snap_names_len > (u64)SIZE_MAX)
1049 goto out_2big;
1050 snap_names = kmalloc(snap_names_len, GFP_KERNEL);
1051 if (!snap_names)
Alex Elder6a523252012-07-19 17:12:59 -05001052 goto out_err;
Alex Elderbb23e372013-05-06 09:51:29 -05001053
1054 /* ...as well as the array of their sizes. */
Markus Elfring88a25a52016-09-11 12:21:25 +02001055 snap_sizes = kmalloc_array(snap_count,
1056 sizeof(*header->snap_sizes),
1057 GFP_KERNEL);
Alex Elderbb23e372013-05-06 09:51:29 -05001058 if (!snap_sizes)
1059 goto out_err;
1060
Alex Elderf785cc12012-08-23 23:22:06 -05001061 /*
Alex Elderbb23e372013-05-06 09:51:29 -05001062 * Copy the names, and fill in each snapshot's id
1063 * and size.
1064 *
Alex Elder99a41eb2013-05-06 09:51:30 -05001065 * Note that rbd_dev_v1_header_info() guarantees the
Alex Elderbb23e372013-05-06 09:51:29 -05001066 * ondisk buffer we're working with has
Alex Elderf785cc12012-08-23 23:22:06 -05001067 * snap_names_len bytes beyond the end of the
1068 * snapshot id array, this memcpy() is safe.
1069 */
Alex Elderbb23e372013-05-06 09:51:29 -05001070 memcpy(snap_names, &ondisk->snaps[snap_count], snap_names_len);
1071 snaps = ondisk->snaps;
1072 for (i = 0; i < snap_count; i++) {
1073 snapc->snaps[i] = le64_to_cpu(snaps[i].id);
1074 snap_sizes[i] = le64_to_cpu(snaps[i].image_size);
1075 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001076 }
Alex Elder849b4262012-07-09 21:04:24 -05001077
Alex Elderbb23e372013-05-06 09:51:29 -05001078 /* We won't fail any more, fill in the header */
Alex Elder6a523252012-07-19 17:12:59 -05001079
Alex Elderbb23e372013-05-06 09:51:29 -05001080 if (first_time) {
1081 header->object_prefix = object_prefix;
1082 header->obj_order = ondisk->options.order;
Ilya Dryomov263423f2017-01-25 18:16:22 +01001083 rbd_init_layout(rbd_dev);
Alex Elder662518b2013-05-06 09:51:29 -05001084 } else {
1085 ceph_put_snap_context(header->snapc);
1086 kfree(header->snap_names);
1087 kfree(header->snap_sizes);
Alex Elderbb23e372013-05-06 09:51:29 -05001088 }
1089
1090 /* The remaining fields always get updated (when we refresh) */
Alex Elder621901d2012-08-23 23:22:06 -05001091
Alex Elderf84344f2012-08-31 17:29:51 -05001092 header->image_size = le64_to_cpu(ondisk->image_size);
Alex Elderbb23e372013-05-06 09:51:29 -05001093 header->snapc = snapc;
1094 header->snap_names = snap_names;
1095 header->snap_sizes = snap_sizes;
Alex Elder468521c2013-04-26 09:43:47 -05001096
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001097 return 0;
Alex Elderbb23e372013-05-06 09:51:29 -05001098out_2big:
1099 ret = -EIO;
Alex Elder6a523252012-07-19 17:12:59 -05001100out_err:
Alex Elderbb23e372013-05-06 09:51:29 -05001101 kfree(snap_sizes);
1102 kfree(snap_names);
1103 ceph_put_snap_context(snapc);
1104 kfree(object_prefix);
Alex Elderccece232012-07-10 20:30:10 -05001105
Alex Elderbb23e372013-05-06 09:51:29 -05001106 return ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001107}
1108
Alex Elder9682fc62013-04-30 00:44:33 -05001109static const char *_rbd_dev_v1_snap_name(struct rbd_device *rbd_dev, u32 which)
1110{
1111 const char *snap_name;
1112
1113 rbd_assert(which < rbd_dev->header.snapc->num_snaps);
1114
1115 /* Skip over names until we find the one we are looking for */
1116
1117 snap_name = rbd_dev->header.snap_names;
1118 while (which--)
1119 snap_name += strlen(snap_name) + 1;
1120
1121 return kstrdup(snap_name, GFP_KERNEL);
1122}
1123
Alex Elder30d1cff2013-05-01 12:43:03 -05001124/*
1125 * Snapshot id comparison function for use with qsort()/bsearch().
1126 * Note that result is for snapshots in *descending* order.
1127 */
1128static int snapid_compare_reverse(const void *s1, const void *s2)
1129{
1130 u64 snap_id1 = *(u64 *)s1;
1131 u64 snap_id2 = *(u64 *)s2;
1132
1133 if (snap_id1 < snap_id2)
1134 return 1;
1135 return snap_id1 == snap_id2 ? 0 : -1;
1136}
1137
1138/*
1139 * Search a snapshot context to see if the given snapshot id is
1140 * present.
1141 *
1142 * Returns the position of the snapshot id in the array if it's found,
1143 * or BAD_SNAP_INDEX otherwise.
1144 *
1145 * Note: The snapshot array is in kept sorted (by the osd) in
1146 * reverse order, highest snapshot id first.
1147 */
Alex Elder9682fc62013-04-30 00:44:33 -05001148static u32 rbd_dev_snap_index(struct rbd_device *rbd_dev, u64 snap_id)
1149{
1150 struct ceph_snap_context *snapc = rbd_dev->header.snapc;
Alex Elder30d1cff2013-05-01 12:43:03 -05001151 u64 *found;
Alex Elder9682fc62013-04-30 00:44:33 -05001152
Alex Elder30d1cff2013-05-01 12:43:03 -05001153 found = bsearch(&snap_id, &snapc->snaps, snapc->num_snaps,
1154 sizeof (snap_id), snapid_compare_reverse);
Alex Elder9682fc62013-04-30 00:44:33 -05001155
Alex Elder30d1cff2013-05-01 12:43:03 -05001156 return found ? (u32)(found - &snapc->snaps[0]) : BAD_SNAP_INDEX;
Alex Elder9682fc62013-04-30 00:44:33 -05001157}
1158
Alex Elder2ad3d712013-04-30 00:44:33 -05001159static const char *rbd_dev_v1_snap_name(struct rbd_device *rbd_dev,
1160 u64 snap_id)
Alex Elder54cac612013-04-30 00:44:33 -05001161{
1162 u32 which;
Josh Durginda6a6b62013-09-04 17:57:31 -07001163 const char *snap_name;
Alex Elder54cac612013-04-30 00:44:33 -05001164
1165 which = rbd_dev_snap_index(rbd_dev, snap_id);
1166 if (which == BAD_SNAP_INDEX)
Josh Durginda6a6b62013-09-04 17:57:31 -07001167 return ERR_PTR(-ENOENT);
Alex Elder54cac612013-04-30 00:44:33 -05001168
Josh Durginda6a6b62013-09-04 17:57:31 -07001169 snap_name = _rbd_dev_v1_snap_name(rbd_dev, which);
1170 return snap_name ? snap_name : ERR_PTR(-ENOMEM);
Alex Elder54cac612013-04-30 00:44:33 -05001171}
1172
Alex Elder9e15b772012-10-30 19:40:33 -05001173static const char *rbd_snap_name(struct rbd_device *rbd_dev, u64 snap_id)
1174{
Alex Elder9e15b772012-10-30 19:40:33 -05001175 if (snap_id == CEPH_NOSNAP)
1176 return RBD_SNAP_HEAD_NAME;
1177
Alex Elder54cac612013-04-30 00:44:33 -05001178 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
1179 if (rbd_dev->image_format == 1)
1180 return rbd_dev_v1_snap_name(rbd_dev, snap_id);
Alex Elder9e15b772012-10-30 19:40:33 -05001181
Alex Elder54cac612013-04-30 00:44:33 -05001182 return rbd_dev_v2_snap_name(rbd_dev, snap_id);
Alex Elder9e15b772012-10-30 19:40:33 -05001183}
1184
Alex Elder2ad3d712013-04-30 00:44:33 -05001185static int rbd_snap_size(struct rbd_device *rbd_dev, u64 snap_id,
1186 u64 *snap_size)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001187{
Alex Elder2ad3d712013-04-30 00:44:33 -05001188 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
1189 if (snap_id == CEPH_NOSNAP) {
1190 *snap_size = rbd_dev->header.image_size;
1191 } else if (rbd_dev->image_format == 1) {
1192 u32 which;
Alex Elder00f1f362012-02-07 12:03:36 -06001193
Alex Elder2ad3d712013-04-30 00:44:33 -05001194 which = rbd_dev_snap_index(rbd_dev, snap_id);
1195 if (which == BAD_SNAP_INDEX)
1196 return -ENOENT;
Alex Elder00f1f362012-02-07 12:03:36 -06001197
Alex Elder2ad3d712013-04-30 00:44:33 -05001198 *snap_size = rbd_dev->header.snap_sizes[which];
1199 } else {
1200 u64 size = 0;
1201 int ret;
1202
1203 ret = _rbd_dev_v2_snap_size(rbd_dev, snap_id, NULL, &size);
1204 if (ret)
1205 return ret;
1206
1207 *snap_size = size;
1208 }
1209 return 0;
1210}
1211
1212static int rbd_snap_features(struct rbd_device *rbd_dev, u64 snap_id,
1213 u64 *snap_features)
1214{
1215 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
1216 if (snap_id == CEPH_NOSNAP) {
1217 *snap_features = rbd_dev->header.features;
1218 } else if (rbd_dev->image_format == 1) {
1219 *snap_features = 0; /* No features for format 1 */
1220 } else {
1221 u64 features = 0;
1222 int ret;
1223
1224 ret = _rbd_dev_v2_snap_features(rbd_dev, snap_id, &features);
1225 if (ret)
1226 return ret;
1227
1228 *snap_features = features;
1229 }
1230 return 0;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001231}
1232
Alex Elderd1cf5782013-04-27 09:59:30 -05001233static int rbd_dev_mapping_set(struct rbd_device *rbd_dev)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001234{
Alex Elder8f4b7d92013-05-06 07:40:30 -05001235 u64 snap_id = rbd_dev->spec->snap_id;
Alex Elder2ad3d712013-04-30 00:44:33 -05001236 u64 size = 0;
1237 u64 features = 0;
1238 int ret;
Alex Elder8b0241f2013-04-25 23:15:08 -05001239
Alex Elder2ad3d712013-04-30 00:44:33 -05001240 ret = rbd_snap_size(rbd_dev, snap_id, &size);
1241 if (ret)
1242 return ret;
1243 ret = rbd_snap_features(rbd_dev, snap_id, &features);
1244 if (ret)
1245 return ret;
1246
1247 rbd_dev->mapping.size = size;
1248 rbd_dev->mapping.features = features;
1249
Alex Elder8b0241f2013-04-25 23:15:08 -05001250 return 0;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001251}
1252
Alex Elderd1cf5782013-04-27 09:59:30 -05001253static void rbd_dev_mapping_clear(struct rbd_device *rbd_dev)
1254{
1255 rbd_dev->mapping.size = 0;
1256 rbd_dev->mapping.features = 0;
Alex Elder200a6a82013-04-28 23:32:34 -05001257}
1258
Alex Elder65ccfe22012-08-09 10:33:26 -07001259static u64 rbd_segment_offset(struct rbd_device *rbd_dev, u64 offset)
1260{
Ilya Dryomov5bc3fb12017-01-25 18:16:22 +01001261 u64 segment_size = rbd_obj_bytes(&rbd_dev->header);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001262
Alex Elder65ccfe22012-08-09 10:33:26 -07001263 return offset & (segment_size - 1);
1264}
1265
1266static u64 rbd_segment_length(struct rbd_device *rbd_dev,
1267 u64 offset, u64 length)
1268{
Ilya Dryomov5bc3fb12017-01-25 18:16:22 +01001269 u64 segment_size = rbd_obj_bytes(&rbd_dev->header);
Alex Elder65ccfe22012-08-09 10:33:26 -07001270
1271 offset &= segment_size - 1;
1272
Alex Elderaafb2302012-09-06 16:00:54 -05001273 rbd_assert(length <= U64_MAX - offset);
Alex Elder65ccfe22012-08-09 10:33:26 -07001274 if (offset + length > segment_size)
1275 length = segment_size - offset;
1276
1277 return length;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001278}
1279
1280/*
1281 * bio helpers
1282 */
1283
1284static void bio_chain_put(struct bio *chain)
1285{
1286 struct bio *tmp;
1287
1288 while (chain) {
1289 tmp = chain;
1290 chain = chain->bi_next;
1291 bio_put(tmp);
1292 }
1293}
1294
1295/*
1296 * zeros a bio chain, starting at specific offset
1297 */
1298static void zero_bio_chain(struct bio *chain, int start_ofs)
1299{
Kent Overstreet79886132013-11-23 17:19:00 -08001300 struct bio_vec bv;
1301 struct bvec_iter iter;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001302 unsigned long flags;
1303 void *buf;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001304 int pos = 0;
1305
1306 while (chain) {
Kent Overstreet79886132013-11-23 17:19:00 -08001307 bio_for_each_segment(bv, chain, iter) {
1308 if (pos + bv.bv_len > start_ofs) {
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001309 int remainder = max(start_ofs - pos, 0);
Kent Overstreet79886132013-11-23 17:19:00 -08001310 buf = bvec_kmap_irq(&bv, &flags);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001311 memset(buf + remainder, 0,
Kent Overstreet79886132013-11-23 17:19:00 -08001312 bv.bv_len - remainder);
1313 flush_dcache_page(bv.bv_page);
Dan Carpenter85b5aaa2010-10-11 21:15:11 +02001314 bvec_kunmap_irq(buf, &flags);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001315 }
Kent Overstreet79886132013-11-23 17:19:00 -08001316 pos += bv.bv_len;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001317 }
1318
1319 chain = chain->bi_next;
1320 }
1321}
1322
1323/*
Alex Elderb9434c52013-04-19 15:34:50 -05001324 * similar to zero_bio_chain(), zeros data defined by a page array,
1325 * starting at the given byte offset from the start of the array and
1326 * continuing up to the given end offset. The pages array is
1327 * assumed to be big enough to hold all bytes up to the end.
1328 */
1329static void zero_pages(struct page **pages, u64 offset, u64 end)
1330{
1331 struct page **page = &pages[offset >> PAGE_SHIFT];
1332
1333 rbd_assert(end > offset);
1334 rbd_assert(end - offset <= (u64)SIZE_MAX);
1335 while (offset < end) {
1336 size_t page_offset;
1337 size_t length;
1338 unsigned long flags;
1339 void *kaddr;
1340
Geert Uytterhoeven491205a2013-05-13 20:35:37 -05001341 page_offset = offset & ~PAGE_MASK;
1342 length = min_t(size_t, PAGE_SIZE - page_offset, end - offset);
Alex Elderb9434c52013-04-19 15:34:50 -05001343 local_irq_save(flags);
1344 kaddr = kmap_atomic(*page);
1345 memset(kaddr + page_offset, 0, length);
Alex Eldere2156052013-05-22 20:54:25 -05001346 flush_dcache_page(*page);
Alex Elderb9434c52013-04-19 15:34:50 -05001347 kunmap_atomic(kaddr);
1348 local_irq_restore(flags);
1349
1350 offset += length;
1351 page++;
1352 }
1353}
1354
1355/*
Alex Elderf7760da2012-10-20 22:17:27 -05001356 * Clone a portion of a bio, starting at the given byte offset
1357 * and continuing for the number of bytes indicated.
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001358 */
Alex Elderf7760da2012-10-20 22:17:27 -05001359static struct bio *bio_clone_range(struct bio *bio_src,
1360 unsigned int offset,
1361 unsigned int len,
1362 gfp_t gfpmask)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001363{
Alex Elderf7760da2012-10-20 22:17:27 -05001364 struct bio *bio;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001365
Kent Overstreet5341a622013-08-07 14:31:11 -07001366 bio = bio_clone(bio_src, gfpmask);
Alex Elderf7760da2012-10-20 22:17:27 -05001367 if (!bio)
1368 return NULL; /* ENOMEM */
1369
Kent Overstreet5341a622013-08-07 14:31:11 -07001370 bio_advance(bio, offset);
Kent Overstreet4f024f32013-10-11 15:44:27 -07001371 bio->bi_iter.bi_size = len;
Alex Elder542582f2012-08-09 10:33:25 -07001372
Alex Elderf7760da2012-10-20 22:17:27 -05001373 return bio;
1374}
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001375
Alex Elderf7760da2012-10-20 22:17:27 -05001376/*
1377 * Clone a portion of a bio chain, starting at the given byte offset
1378 * into the first bio in the source chain and continuing for the
1379 * number of bytes indicated. The result is another bio chain of
1380 * exactly the given length, or a null pointer on error.
1381 *
1382 * The bio_src and offset parameters are both in-out. On entry they
1383 * refer to the first source bio and the offset into that bio where
1384 * the start of data to be cloned is located.
1385 *
1386 * On return, bio_src is updated to refer to the bio in the source
1387 * chain that contains first un-cloned byte, and *offset will
1388 * contain the offset of that byte within that bio.
1389 */
1390static struct bio *bio_chain_clone_range(struct bio **bio_src,
1391 unsigned int *offset,
1392 unsigned int len,
1393 gfp_t gfpmask)
1394{
1395 struct bio *bi = *bio_src;
1396 unsigned int off = *offset;
1397 struct bio *chain = NULL;
1398 struct bio **end;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001399
Alex Elderf7760da2012-10-20 22:17:27 -05001400 /* Build up a chain of clone bios up to the limit */
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001401
Kent Overstreet4f024f32013-10-11 15:44:27 -07001402 if (!bi || off >= bi->bi_iter.bi_size || !len)
Alex Elderf7760da2012-10-20 22:17:27 -05001403 return NULL; /* Nothing to clone */
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001404
Alex Elderf7760da2012-10-20 22:17:27 -05001405 end = &chain;
1406 while (len) {
1407 unsigned int bi_size;
1408 struct bio *bio;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001409
Alex Elderf5400b72012-11-01 10:17:15 -05001410 if (!bi) {
1411 rbd_warn(NULL, "bio_chain exhausted with %u left", len);
Alex Elderf7760da2012-10-20 22:17:27 -05001412 goto out_err; /* EINVAL; ran out of bio's */
Alex Elderf5400b72012-11-01 10:17:15 -05001413 }
Kent Overstreet4f024f32013-10-11 15:44:27 -07001414 bi_size = min_t(unsigned int, bi->bi_iter.bi_size - off, len);
Alex Elderf7760da2012-10-20 22:17:27 -05001415 bio = bio_clone_range(bi, off, bi_size, gfpmask);
1416 if (!bio)
1417 goto out_err; /* ENOMEM */
1418
1419 *end = bio;
1420 end = &bio->bi_next;
1421
1422 off += bi_size;
Kent Overstreet4f024f32013-10-11 15:44:27 -07001423 if (off == bi->bi_iter.bi_size) {
Alex Elderf7760da2012-10-20 22:17:27 -05001424 bi = bi->bi_next;
1425 off = 0;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001426 }
Alex Elderf7760da2012-10-20 22:17:27 -05001427 len -= bi_size;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001428 }
Alex Elderf7760da2012-10-20 22:17:27 -05001429 *bio_src = bi;
1430 *offset = off;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001431
Alex Elderf7760da2012-10-20 22:17:27 -05001432 return chain;
1433out_err:
1434 bio_chain_put(chain);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001435
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001436 return NULL;
1437}
1438
Alex Elder926f9b32013-02-11 12:33:24 -06001439/*
1440 * The default/initial value for all object request flags is 0. For
1441 * each flag, once its value is set to 1 it is never reset to 0
1442 * again.
1443 */
Alex Elder6365d332013-02-11 12:33:24 -06001444static void obj_request_img_data_set(struct rbd_obj_request *obj_request)
1445{
1446 if (test_and_set_bit(OBJ_REQ_IMG_DATA, &obj_request->flags)) {
Alex Elder6365d332013-02-11 12:33:24 -06001447 struct rbd_device *rbd_dev;
1448
Alex Elder57acbaa2013-02-11 12:33:24 -06001449 rbd_dev = obj_request->img_request->rbd_dev;
Ilya Dryomov9584d502014-07-11 12:11:20 +04001450 rbd_warn(rbd_dev, "obj_request %p already marked img_data",
Alex Elder6365d332013-02-11 12:33:24 -06001451 obj_request);
1452 }
1453}
1454
1455static bool obj_request_img_data_test(struct rbd_obj_request *obj_request)
1456{
1457 smp_mb();
1458 return test_bit(OBJ_REQ_IMG_DATA, &obj_request->flags) != 0;
1459}
1460
Alex Elder57acbaa2013-02-11 12:33:24 -06001461static void obj_request_done_set(struct rbd_obj_request *obj_request)
1462{
1463 if (test_and_set_bit(OBJ_REQ_DONE, &obj_request->flags)) {
1464 struct rbd_device *rbd_dev = NULL;
1465
1466 if (obj_request_img_data_test(obj_request))
1467 rbd_dev = obj_request->img_request->rbd_dev;
Ilya Dryomov9584d502014-07-11 12:11:20 +04001468 rbd_warn(rbd_dev, "obj_request %p already marked done",
Alex Elder57acbaa2013-02-11 12:33:24 -06001469 obj_request);
1470 }
1471}
1472
1473static bool obj_request_done_test(struct rbd_obj_request *obj_request)
1474{
1475 smp_mb();
1476 return test_bit(OBJ_REQ_DONE, &obj_request->flags) != 0;
1477}
1478
Alex Elder5679c592013-02-11 12:33:24 -06001479/*
1480 * This sets the KNOWN flag after (possibly) setting the EXISTS
1481 * flag. The latter is set based on the "exists" value provided.
1482 *
1483 * Note that for our purposes once an object exists it never goes
1484 * away again. It's possible that the response from two existence
1485 * checks are separated by the creation of the target object, and
1486 * the first ("doesn't exist") response arrives *after* the second
1487 * ("does exist"). In that case we ignore the second one.
1488 */
1489static void obj_request_existence_set(struct rbd_obj_request *obj_request,
1490 bool exists)
1491{
1492 if (exists)
1493 set_bit(OBJ_REQ_EXISTS, &obj_request->flags);
1494 set_bit(OBJ_REQ_KNOWN, &obj_request->flags);
1495 smp_mb();
1496}
1497
1498static bool obj_request_known_test(struct rbd_obj_request *obj_request)
1499{
1500 smp_mb();
1501 return test_bit(OBJ_REQ_KNOWN, &obj_request->flags) != 0;
1502}
1503
1504static bool obj_request_exists_test(struct rbd_obj_request *obj_request)
1505{
1506 smp_mb();
1507 return test_bit(OBJ_REQ_EXISTS, &obj_request->flags) != 0;
1508}
1509
Ilya Dryomov96385562014-06-10 13:53:29 +04001510static bool obj_request_overlaps_parent(struct rbd_obj_request *obj_request)
1511{
1512 struct rbd_device *rbd_dev = obj_request->img_request->rbd_dev;
1513
1514 return obj_request->img_offset <
1515 round_up(rbd_dev->parent_overlap, rbd_obj_bytes(&rbd_dev->header));
1516}
1517
Alex Elderbf0d5f502012-11-22 00:00:08 -06001518static void rbd_obj_request_get(struct rbd_obj_request *obj_request)
1519{
Alex Elder37206ee2013-02-20 17:32:08 -06001520 dout("%s: obj %p (was %d)\n", __func__, obj_request,
Peter Zijlstra2c935bc2016-11-14 17:29:48 +01001521 kref_read(&obj_request->kref));
Alex Elderbf0d5f502012-11-22 00:00:08 -06001522 kref_get(&obj_request->kref);
1523}
1524
1525static void rbd_obj_request_destroy(struct kref *kref);
1526static void rbd_obj_request_put(struct rbd_obj_request *obj_request)
1527{
1528 rbd_assert(obj_request != NULL);
Alex Elder37206ee2013-02-20 17:32:08 -06001529 dout("%s: obj %p (was %d)\n", __func__, obj_request,
Peter Zijlstra2c935bc2016-11-14 17:29:48 +01001530 kref_read(&obj_request->kref));
Alex Elderbf0d5f502012-11-22 00:00:08 -06001531 kref_put(&obj_request->kref, rbd_obj_request_destroy);
1532}
1533
Alex Elder0f2d5be2014-04-26 14:21:44 +04001534static void rbd_img_request_get(struct rbd_img_request *img_request)
1535{
1536 dout("%s: img %p (was %d)\n", __func__, img_request,
Peter Zijlstra2c935bc2016-11-14 17:29:48 +01001537 kref_read(&img_request->kref));
Alex Elder0f2d5be2014-04-26 14:21:44 +04001538 kref_get(&img_request->kref);
1539}
1540
Alex Eldere93f3152013-05-08 22:50:04 -05001541static bool img_request_child_test(struct rbd_img_request *img_request);
1542static void rbd_parent_request_destroy(struct kref *kref);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001543static void rbd_img_request_destroy(struct kref *kref);
1544static void rbd_img_request_put(struct rbd_img_request *img_request)
1545{
1546 rbd_assert(img_request != NULL);
Alex Elder37206ee2013-02-20 17:32:08 -06001547 dout("%s: img %p (was %d)\n", __func__, img_request,
Peter Zijlstra2c935bc2016-11-14 17:29:48 +01001548 kref_read(&img_request->kref));
Alex Eldere93f3152013-05-08 22:50:04 -05001549 if (img_request_child_test(img_request))
1550 kref_put(&img_request->kref, rbd_parent_request_destroy);
1551 else
1552 kref_put(&img_request->kref, rbd_img_request_destroy);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001553}
1554
1555static inline void rbd_img_obj_request_add(struct rbd_img_request *img_request,
1556 struct rbd_obj_request *obj_request)
1557{
Alex Elder25dcf952013-01-25 17:08:55 -06001558 rbd_assert(obj_request->img_request == NULL);
1559
Alex Elderb155e862013-04-15 14:50:37 -05001560 /* Image request now owns object's original reference */
Alex Elderbf0d5f502012-11-22 00:00:08 -06001561 obj_request->img_request = img_request;
Alex Elder25dcf952013-01-25 17:08:55 -06001562 obj_request->which = img_request->obj_request_count;
Alex Elder6365d332013-02-11 12:33:24 -06001563 rbd_assert(!obj_request_img_data_test(obj_request));
1564 obj_request_img_data_set(obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001565 rbd_assert(obj_request->which != BAD_WHICH);
Alex Elder25dcf952013-01-25 17:08:55 -06001566 img_request->obj_request_count++;
1567 list_add_tail(&obj_request->links, &img_request->obj_requests);
Alex Elder37206ee2013-02-20 17:32:08 -06001568 dout("%s: img %p obj %p w=%u\n", __func__, img_request, obj_request,
1569 obj_request->which);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001570}
1571
1572static inline void rbd_img_obj_request_del(struct rbd_img_request *img_request,
1573 struct rbd_obj_request *obj_request)
1574{
1575 rbd_assert(obj_request->which != BAD_WHICH);
Alex Elder25dcf952013-01-25 17:08:55 -06001576
Alex Elder37206ee2013-02-20 17:32:08 -06001577 dout("%s: img %p obj %p w=%u\n", __func__, img_request, obj_request,
1578 obj_request->which);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001579 list_del(&obj_request->links);
Alex Elder25dcf952013-01-25 17:08:55 -06001580 rbd_assert(img_request->obj_request_count > 0);
1581 img_request->obj_request_count--;
1582 rbd_assert(obj_request->which == img_request->obj_request_count);
1583 obj_request->which = BAD_WHICH;
Alex Elder6365d332013-02-11 12:33:24 -06001584 rbd_assert(obj_request_img_data_test(obj_request));
Alex Elderbf0d5f502012-11-22 00:00:08 -06001585 rbd_assert(obj_request->img_request == img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001586 obj_request->img_request = NULL;
Alex Elder25dcf952013-01-25 17:08:55 -06001587 obj_request->callback = NULL;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001588 rbd_obj_request_put(obj_request);
1589}
1590
1591static bool obj_request_type_valid(enum obj_request_type type)
1592{
1593 switch (type) {
Alex Elder9969ebc2013-01-18 12:31:10 -06001594 case OBJ_REQUEST_NODATA:
Alex Elderbf0d5f502012-11-22 00:00:08 -06001595 case OBJ_REQUEST_BIO:
Alex Elder788e2df2013-01-17 12:25:27 -06001596 case OBJ_REQUEST_PAGES:
Alex Elderbf0d5f502012-11-22 00:00:08 -06001597 return true;
1598 default:
1599 return false;
1600 }
1601}
1602
Ilya Dryomov4a17dad2016-09-13 21:08:10 +02001603static void rbd_img_obj_callback(struct rbd_obj_request *obj_request);
1604
Ilya Dryomov980917f2016-09-12 18:59:42 +02001605static void rbd_obj_request_submit(struct rbd_obj_request *obj_request)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001606{
Ilya Dryomov980917f2016-09-12 18:59:42 +02001607 struct ceph_osd_request *osd_req = obj_request->osd_req;
1608
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001609 dout("%s %p object_no %016llx %llu~%llu osd_req %p\n", __func__,
1610 obj_request, obj_request->object_no, obj_request->offset,
Ilya Dryomov67e2b652017-01-25 18:16:22 +01001611 obj_request->length, osd_req);
Ilya Dryomov4a17dad2016-09-13 21:08:10 +02001612 if (obj_request_img_data_test(obj_request)) {
1613 WARN_ON(obj_request->callback != rbd_img_obj_callback);
1614 rbd_img_request_get(obj_request->img_request);
1615 }
Ilya Dryomov980917f2016-09-12 18:59:42 +02001616 ceph_osdc_start_request(osd_req->r_osdc, osd_req, false);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001617}
1618
1619static void rbd_img_request_complete(struct rbd_img_request *img_request)
1620{
Alex Elder55f27e02013-04-10 12:34:25 -05001621
Alex Elder37206ee2013-02-20 17:32:08 -06001622 dout("%s: img %p\n", __func__, img_request);
Alex Elder55f27e02013-04-10 12:34:25 -05001623
1624 /*
1625 * If no error occurred, compute the aggregate transfer
1626 * count for the image request. We could instead use
1627 * atomic64_cmpxchg() to update it as each object request
1628 * completes; not clear which way is better off hand.
1629 */
1630 if (!img_request->result) {
1631 struct rbd_obj_request *obj_request;
1632 u64 xferred = 0;
1633
1634 for_each_obj_request(img_request, obj_request)
1635 xferred += obj_request->xferred;
1636 img_request->xferred = xferred;
1637 }
1638
Alex Elderbf0d5f502012-11-22 00:00:08 -06001639 if (img_request->callback)
1640 img_request->callback(img_request);
1641 else
1642 rbd_img_request_put(img_request);
1643}
1644
Alex Elder0c425242013-02-08 09:55:49 -06001645/*
1646 * The default/initial value for all image request flags is 0. Each
1647 * is conditionally set to 1 at image request initialization time
1648 * and currently never change thereafter.
1649 */
1650static void img_request_write_set(struct rbd_img_request *img_request)
1651{
1652 set_bit(IMG_REQ_WRITE, &img_request->flags);
1653 smp_mb();
1654}
1655
1656static bool img_request_write_test(struct rbd_img_request *img_request)
1657{
1658 smp_mb();
1659 return test_bit(IMG_REQ_WRITE, &img_request->flags) != 0;
1660}
1661
Guangliang Zhao90e98c52014-04-01 22:22:16 +08001662/*
1663 * Set the discard flag when the img_request is an discard request
1664 */
1665static void img_request_discard_set(struct rbd_img_request *img_request)
1666{
1667 set_bit(IMG_REQ_DISCARD, &img_request->flags);
1668 smp_mb();
1669}
1670
1671static bool img_request_discard_test(struct rbd_img_request *img_request)
1672{
1673 smp_mb();
1674 return test_bit(IMG_REQ_DISCARD, &img_request->flags) != 0;
1675}
1676
Alex Elder9849e982013-01-24 16:13:36 -06001677static void img_request_child_set(struct rbd_img_request *img_request)
1678{
1679 set_bit(IMG_REQ_CHILD, &img_request->flags);
1680 smp_mb();
1681}
1682
Alex Eldere93f3152013-05-08 22:50:04 -05001683static void img_request_child_clear(struct rbd_img_request *img_request)
1684{
1685 clear_bit(IMG_REQ_CHILD, &img_request->flags);
1686 smp_mb();
1687}
1688
Alex Elder9849e982013-01-24 16:13:36 -06001689static bool img_request_child_test(struct rbd_img_request *img_request)
1690{
1691 smp_mb();
1692 return test_bit(IMG_REQ_CHILD, &img_request->flags) != 0;
1693}
1694
Alex Elderd0b2e942013-01-24 16:13:36 -06001695static void img_request_layered_set(struct rbd_img_request *img_request)
1696{
1697 set_bit(IMG_REQ_LAYERED, &img_request->flags);
1698 smp_mb();
1699}
1700
Alex Eldera2acd002013-05-08 22:50:04 -05001701static void img_request_layered_clear(struct rbd_img_request *img_request)
1702{
1703 clear_bit(IMG_REQ_LAYERED, &img_request->flags);
1704 smp_mb();
1705}
1706
Alex Elderd0b2e942013-01-24 16:13:36 -06001707static bool img_request_layered_test(struct rbd_img_request *img_request)
1708{
1709 smp_mb();
1710 return test_bit(IMG_REQ_LAYERED, &img_request->flags) != 0;
1711}
1712
Josh Durgin3b434a2a2014-04-04 17:32:15 -07001713static enum obj_operation_type
1714rbd_img_request_op_type(struct rbd_img_request *img_request)
1715{
1716 if (img_request_write_test(img_request))
1717 return OBJ_OP_WRITE;
1718 else if (img_request_discard_test(img_request))
1719 return OBJ_OP_DISCARD;
1720 else
1721 return OBJ_OP_READ;
1722}
1723
Alex Elder6e2a4502013-03-27 09:16:30 -05001724static void
1725rbd_img_obj_request_read_callback(struct rbd_obj_request *obj_request)
1726{
Alex Elderb9434c52013-04-19 15:34:50 -05001727 u64 xferred = obj_request->xferred;
1728 u64 length = obj_request->length;
1729
Alex Elder6e2a4502013-03-27 09:16:30 -05001730 dout("%s: obj %p img %p result %d %llu/%llu\n", __func__,
1731 obj_request, obj_request->img_request, obj_request->result,
Alex Elderb9434c52013-04-19 15:34:50 -05001732 xferred, length);
Alex Elder6e2a4502013-03-27 09:16:30 -05001733 /*
Josh Durgin17c1cc12013-08-26 17:55:38 -07001734 * ENOENT means a hole in the image. We zero-fill the entire
1735 * length of the request. A short read also implies zero-fill
1736 * to the end of the request. An error requires the whole
1737 * length of the request to be reported finished with an error
1738 * to the block layer. In each case we update the xferred
1739 * count to indicate the whole request was satisfied.
Alex Elder6e2a4502013-03-27 09:16:30 -05001740 */
Alex Elderb9434c52013-04-19 15:34:50 -05001741 rbd_assert(obj_request->type != OBJ_REQUEST_NODATA);
Alex Elder6e2a4502013-03-27 09:16:30 -05001742 if (obj_request->result == -ENOENT) {
Alex Elderb9434c52013-04-19 15:34:50 -05001743 if (obj_request->type == OBJ_REQUEST_BIO)
1744 zero_bio_chain(obj_request->bio_list, 0);
1745 else
1746 zero_pages(obj_request->pages, 0, length);
Alex Elder6e2a4502013-03-27 09:16:30 -05001747 obj_request->result = 0;
Alex Elderb9434c52013-04-19 15:34:50 -05001748 } else if (xferred < length && !obj_request->result) {
1749 if (obj_request->type == OBJ_REQUEST_BIO)
1750 zero_bio_chain(obj_request->bio_list, xferred);
1751 else
1752 zero_pages(obj_request->pages, xferred, length);
Alex Elder6e2a4502013-03-27 09:16:30 -05001753 }
Josh Durgin17c1cc12013-08-26 17:55:38 -07001754 obj_request->xferred = length;
Alex Elder6e2a4502013-03-27 09:16:30 -05001755 obj_request_done_set(obj_request);
1756}
1757
Alex Elderbf0d5f502012-11-22 00:00:08 -06001758static void rbd_obj_request_complete(struct rbd_obj_request *obj_request)
1759{
Alex Elder37206ee2013-02-20 17:32:08 -06001760 dout("%s: obj %p cb %p\n", __func__, obj_request,
1761 obj_request->callback);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001762 if (obj_request->callback)
1763 obj_request->callback(obj_request);
Alex Elder788e2df2013-01-17 12:25:27 -06001764 else
1765 complete_all(&obj_request->completion);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001766}
1767
Ilya Dryomov0dcc6852016-09-26 15:43:52 +02001768static void rbd_obj_request_error(struct rbd_obj_request *obj_request, int err)
1769{
1770 obj_request->result = err;
1771 obj_request->xferred = 0;
1772 /*
1773 * kludge - mirror rbd_obj_request_submit() to match a put in
1774 * rbd_img_obj_callback()
1775 */
1776 if (obj_request_img_data_test(obj_request)) {
1777 WARN_ON(obj_request->callback != rbd_img_obj_callback);
1778 rbd_img_request_get(obj_request->img_request);
1779 }
1780 obj_request_done_set(obj_request);
1781 rbd_obj_request_complete(obj_request);
1782}
1783
Alex Elderc47f9372013-02-26 14:23:07 -06001784static void rbd_osd_read_callback(struct rbd_obj_request *obj_request)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001785{
Alex Elder57acbaa2013-02-11 12:33:24 -06001786 struct rbd_img_request *img_request = NULL;
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05001787 struct rbd_device *rbd_dev = NULL;
Alex Elder57acbaa2013-02-11 12:33:24 -06001788 bool layered = false;
1789
1790 if (obj_request_img_data_test(obj_request)) {
1791 img_request = obj_request->img_request;
1792 layered = img_request && img_request_layered_test(img_request);
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05001793 rbd_dev = img_request->rbd_dev;
Alex Elder57acbaa2013-02-11 12:33:24 -06001794 }
Alex Elder8b3e1a52013-01-24 16:13:36 -06001795
1796 dout("%s: obj %p img %p result %d %llu/%llu\n", __func__,
1797 obj_request, img_request, obj_request->result,
1798 obj_request->xferred, obj_request->length);
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05001799 if (layered && obj_request->result == -ENOENT &&
1800 obj_request->img_offset < rbd_dev->parent_overlap)
Alex Elder8b3e1a52013-01-24 16:13:36 -06001801 rbd_img_parent_read(obj_request);
1802 else if (img_request)
Alex Elder6e2a4502013-03-27 09:16:30 -05001803 rbd_img_obj_request_read_callback(obj_request);
1804 else
1805 obj_request_done_set(obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001806}
1807
Alex Elderc47f9372013-02-26 14:23:07 -06001808static void rbd_osd_write_callback(struct rbd_obj_request *obj_request)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001809{
Sage Weil1b83bef2013-02-25 16:11:12 -08001810 dout("%s: obj %p result %d %llu\n", __func__, obj_request,
1811 obj_request->result, obj_request->length);
1812 /*
Alex Elder8b3e1a52013-01-24 16:13:36 -06001813 * There is no such thing as a successful short write. Set
1814 * it to our originally-requested length.
Sage Weil1b83bef2013-02-25 16:11:12 -08001815 */
1816 obj_request->xferred = obj_request->length;
Alex Elder07741302013-02-05 23:41:50 -06001817 obj_request_done_set(obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001818}
1819
Guangliang Zhao90e98c52014-04-01 22:22:16 +08001820static void rbd_osd_discard_callback(struct rbd_obj_request *obj_request)
1821{
1822 dout("%s: obj %p result %d %llu\n", __func__, obj_request,
1823 obj_request->result, obj_request->length);
1824 /*
1825 * There is no such thing as a successful short discard. Set
1826 * it to our originally-requested length.
1827 */
1828 obj_request->xferred = obj_request->length;
Josh Durgind0265de2014-04-07 16:54:10 -07001829 /* discarding a non-existent object is not a problem */
1830 if (obj_request->result == -ENOENT)
1831 obj_request->result = 0;
Guangliang Zhao90e98c52014-04-01 22:22:16 +08001832 obj_request_done_set(obj_request);
1833}
1834
Alex Elderfbfab532013-02-08 09:55:48 -06001835/*
1836 * For a simple stat call there's nothing to do. We'll do more if
1837 * this is part of a write sequence for a layered image.
1838 */
Alex Elderc47f9372013-02-26 14:23:07 -06001839static void rbd_osd_stat_callback(struct rbd_obj_request *obj_request)
Alex Elderfbfab532013-02-08 09:55:48 -06001840{
Alex Elder37206ee2013-02-20 17:32:08 -06001841 dout("%s: obj %p\n", __func__, obj_request);
Alex Elderfbfab532013-02-08 09:55:48 -06001842 obj_request_done_set(obj_request);
1843}
1844
Ilya Dryomov27617132015-07-16 17:36:11 +03001845static void rbd_osd_call_callback(struct rbd_obj_request *obj_request)
1846{
1847 dout("%s: obj %p\n", __func__, obj_request);
1848
1849 if (obj_request_img_data_test(obj_request))
1850 rbd_osd_copyup_callback(obj_request);
1851 else
1852 obj_request_done_set(obj_request);
1853}
1854
Ilya Dryomov85e084f2016-04-28 16:07:24 +02001855static void rbd_osd_req_callback(struct ceph_osd_request *osd_req)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001856{
1857 struct rbd_obj_request *obj_request = osd_req->r_priv;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001858 u16 opcode;
1859
Ilya Dryomov85e084f2016-04-28 16:07:24 +02001860 dout("%s: osd_req %p\n", __func__, osd_req);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001861 rbd_assert(osd_req == obj_request->osd_req);
Alex Elder57acbaa2013-02-11 12:33:24 -06001862 if (obj_request_img_data_test(obj_request)) {
1863 rbd_assert(obj_request->img_request);
1864 rbd_assert(obj_request->which != BAD_WHICH);
1865 } else {
1866 rbd_assert(obj_request->which == BAD_WHICH);
1867 }
Alex Elderbf0d5f502012-11-22 00:00:08 -06001868
Sage Weil1b83bef2013-02-25 16:11:12 -08001869 if (osd_req->r_result < 0)
1870 obj_request->result = osd_req->r_result;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001871
Alex Elderc47f9372013-02-26 14:23:07 -06001872 /*
1873 * We support a 64-bit length, but ultimately it has to be
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01001874 * passed to the block layer, which just supports a 32-bit
1875 * length field.
Alex Elderc47f9372013-02-26 14:23:07 -06001876 */
Yan, Zheng7665d852016-01-07 16:48:57 +08001877 obj_request->xferred = osd_req->r_ops[0].outdata_len;
Alex Elder8b3e1a52013-01-24 16:13:36 -06001878 rbd_assert(obj_request->xferred < (u64)UINT_MAX);
Ilya Dryomov0ccd5922014-02-25 16:22:28 +02001879
Alex Elder79528732013-04-03 21:32:51 -05001880 opcode = osd_req->r_ops[0].op;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001881 switch (opcode) {
1882 case CEPH_OSD_OP_READ:
Alex Elderc47f9372013-02-26 14:23:07 -06001883 rbd_osd_read_callback(obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001884 break;
Ilya Dryomov0ccd5922014-02-25 16:22:28 +02001885 case CEPH_OSD_OP_SETALLOCHINT:
Ilya Dryomove30b7572015-10-07 17:27:17 +02001886 rbd_assert(osd_req->r_ops[1].op == CEPH_OSD_OP_WRITE ||
1887 osd_req->r_ops[1].op == CEPH_OSD_OP_WRITEFULL);
Ilya Dryomov0ccd5922014-02-25 16:22:28 +02001888 /* fall through */
Alex Elderbf0d5f502012-11-22 00:00:08 -06001889 case CEPH_OSD_OP_WRITE:
Ilya Dryomove30b7572015-10-07 17:27:17 +02001890 case CEPH_OSD_OP_WRITEFULL:
Alex Elderc47f9372013-02-26 14:23:07 -06001891 rbd_osd_write_callback(obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001892 break;
Alex Elderfbfab532013-02-08 09:55:48 -06001893 case CEPH_OSD_OP_STAT:
Alex Elderc47f9372013-02-26 14:23:07 -06001894 rbd_osd_stat_callback(obj_request);
Alex Elderfbfab532013-02-08 09:55:48 -06001895 break;
Guangliang Zhao90e98c52014-04-01 22:22:16 +08001896 case CEPH_OSD_OP_DELETE:
1897 case CEPH_OSD_OP_TRUNCATE:
1898 case CEPH_OSD_OP_ZERO:
1899 rbd_osd_discard_callback(obj_request);
1900 break;
Alex Elder36be9a72013-01-19 00:30:28 -06001901 case CEPH_OSD_OP_CALL:
Ilya Dryomov27617132015-07-16 17:36:11 +03001902 rbd_osd_call_callback(obj_request);
1903 break;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001904 default:
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001905 rbd_warn(NULL, "unexpected OSD op: object_no %016llx opcode %d",
1906 obj_request->object_no, opcode);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001907 break;
1908 }
1909
Alex Elder07741302013-02-05 23:41:50 -06001910 if (obj_request_done_test(obj_request))
Alex Elderbf0d5f502012-11-22 00:00:08 -06001911 rbd_obj_request_complete(obj_request);
1912}
1913
Alex Elder9d4df012013-04-19 15:34:50 -05001914static void rbd_osd_req_format_read(struct rbd_obj_request *obj_request)
Alex Elder430c28c2013-04-03 21:32:51 -05001915{
Alex Elder8c042b02013-04-03 01:28:58 -05001916 struct ceph_osd_request *osd_req = obj_request->osd_req;
Alex Elder430c28c2013-04-03 21:32:51 -05001917
Ilya Dryomov7c848832016-09-15 17:56:39 +02001918 rbd_assert(obj_request_img_data_test(obj_request));
1919 osd_req->r_snapid = obj_request->img_request->snap_id;
Alex Elder9d4df012013-04-19 15:34:50 -05001920}
1921
1922static void rbd_osd_req_format_write(struct rbd_obj_request *obj_request)
1923{
Alex Elder9d4df012013-04-19 15:34:50 -05001924 struct ceph_osd_request *osd_req = obj_request->osd_req;
Alex Elder9d4df012013-04-19 15:34:50 -05001925
Deepa Dinamani1134e092017-05-08 15:59:19 -07001926 ktime_get_real_ts(&osd_req->r_mtime);
Ilya Dryomovbb873b5392016-05-26 00:29:52 +02001927 osd_req->r_data_offset = obj_request->offset;
Alex Elder430c28c2013-04-03 21:32:51 -05001928}
1929
Ilya Dryomovbc812072017-01-25 18:16:23 +01001930static struct ceph_osd_request *
1931__rbd_osd_req_create(struct rbd_device *rbd_dev,
1932 struct ceph_snap_context *snapc,
1933 int num_ops, unsigned int flags,
1934 struct rbd_obj_request *obj_request)
1935{
1936 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
1937 struct ceph_osd_request *req;
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001938 const char *name_format = rbd_dev->image_format == 1 ?
1939 RBD_V1_DATA_FORMAT : RBD_V2_DATA_FORMAT;
Ilya Dryomovbc812072017-01-25 18:16:23 +01001940
1941 req = ceph_osdc_alloc_request(osdc, snapc, num_ops, false, GFP_NOIO);
1942 if (!req)
1943 return NULL;
1944
1945 req->r_flags = flags;
1946 req->r_callback = rbd_osd_req_callback;
1947 req->r_priv = obj_request;
1948
1949 req->r_base_oloc.pool = rbd_dev->layout.pool_id;
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001950 if (ceph_oid_aprintf(&req->r_base_oid, GFP_NOIO, name_format,
1951 rbd_dev->header.object_prefix, obj_request->object_no))
Ilya Dryomovbc812072017-01-25 18:16:23 +01001952 goto err_req;
1953
1954 if (ceph_osdc_alloc_messages(req, GFP_NOIO))
1955 goto err_req;
1956
1957 return req;
1958
1959err_req:
1960 ceph_osdc_put_request(req);
1961 return NULL;
1962}
1963
Ilya Dryomov0ccd5922014-02-25 16:22:28 +02001964/*
1965 * Create an osd request. A read request has one osd op (read).
1966 * A write request has either one (watch) or two (hint+write) osd ops.
1967 * (All rbd data writes are prefixed with an allocation hint op, but
1968 * technically osd watch is a write request, hence this distinction.)
1969 */
Alex Elderbf0d5f502012-11-22 00:00:08 -06001970static struct ceph_osd_request *rbd_osd_req_create(
1971 struct rbd_device *rbd_dev,
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08001972 enum obj_operation_type op_type,
Ilya Dryomovdeb236b2014-02-25 16:22:27 +02001973 unsigned int num_ops,
Alex Elder430c28c2013-04-03 21:32:51 -05001974 struct rbd_obj_request *obj_request)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001975{
Alex Elderbf0d5f502012-11-22 00:00:08 -06001976 struct ceph_snap_context *snapc = NULL;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001977
Guangliang Zhao90e98c52014-04-01 22:22:16 +08001978 if (obj_request_img_data_test(obj_request) &&
1979 (op_type == OBJ_OP_DISCARD || op_type == OBJ_OP_WRITE)) {
Alex Elder6365d332013-02-11 12:33:24 -06001980 struct rbd_img_request *img_request = obj_request->img_request;
Guangliang Zhao90e98c52014-04-01 22:22:16 +08001981 if (op_type == OBJ_OP_WRITE) {
1982 rbd_assert(img_request_write_test(img_request));
1983 } else {
1984 rbd_assert(img_request_discard_test(img_request));
1985 }
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08001986 snapc = img_request->snapc;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001987 }
1988
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08001989 rbd_assert(num_ops == 1 || ((op_type == OBJ_OP_WRITE) && num_ops == 2));
Ilya Dryomovdeb236b2014-02-25 16:22:27 +02001990
Ilya Dryomovbc812072017-01-25 18:16:23 +01001991 return __rbd_osd_req_create(rbd_dev, snapc, num_ops,
1992 (op_type == OBJ_OP_WRITE || op_type == OBJ_OP_DISCARD) ?
Ilya Dryomov54ea0042017-02-11 18:48:41 +01001993 CEPH_OSD_FLAG_WRITE : CEPH_OSD_FLAG_READ, obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001994}
1995
Alex Elder0eefd472013-04-19 15:34:50 -05001996/*
Josh Durgind3246fb2014-04-07 16:49:21 -07001997 * Create a copyup osd request based on the information in the object
1998 * request supplied. A copyup request has two or three osd ops, a
1999 * copyup method call, potentially a hint op, and a write or truncate
2000 * or zero op.
Alex Elder0eefd472013-04-19 15:34:50 -05002001 */
2002static struct ceph_osd_request *
2003rbd_osd_req_create_copyup(struct rbd_obj_request *obj_request)
2004{
2005 struct rbd_img_request *img_request;
Josh Durgind3246fb2014-04-07 16:49:21 -07002006 int num_osd_ops = 3;
Alex Elder0eefd472013-04-19 15:34:50 -05002007
2008 rbd_assert(obj_request_img_data_test(obj_request));
2009 img_request = obj_request->img_request;
2010 rbd_assert(img_request);
Josh Durgind3246fb2014-04-07 16:49:21 -07002011 rbd_assert(img_request_write_test(img_request) ||
2012 img_request_discard_test(img_request));
Alex Elder0eefd472013-04-19 15:34:50 -05002013
Josh Durgind3246fb2014-04-07 16:49:21 -07002014 if (img_request_discard_test(img_request))
2015 num_osd_ops = 2;
2016
Ilya Dryomovbc812072017-01-25 18:16:23 +01002017 return __rbd_osd_req_create(img_request->rbd_dev,
2018 img_request->snapc, num_osd_ops,
Ilya Dryomov54ea0042017-02-11 18:48:41 +01002019 CEPH_OSD_FLAG_WRITE, obj_request);
Alex Elder0eefd472013-04-19 15:34:50 -05002020}
2021
Alex Elderbf0d5f502012-11-22 00:00:08 -06002022static void rbd_osd_req_destroy(struct ceph_osd_request *osd_req)
2023{
2024 ceph_osdc_put_request(osd_req);
2025}
2026
Ilya Dryomov6c696d82017-01-25 18:16:23 +01002027static struct rbd_obj_request *
2028rbd_obj_request_create(enum obj_request_type type)
Alex Elderbf0d5f502012-11-22 00:00:08 -06002029{
2030 struct rbd_obj_request *obj_request;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002031
2032 rbd_assert(obj_request_type_valid(type));
2033
Ilya Dryomov5a60e872015-06-24 17:24:33 +03002034 obj_request = kmem_cache_zalloc(rbd_obj_request_cache, GFP_NOIO);
Ilya Dryomov6c696d82017-01-25 18:16:23 +01002035 if (!obj_request)
Alex Elderf907ad52013-05-01 12:43:03 -05002036 return NULL;
Alex Elderf907ad52013-05-01 12:43:03 -05002037
Alex Elderbf0d5f502012-11-22 00:00:08 -06002038 obj_request->which = BAD_WHICH;
2039 obj_request->type = type;
2040 INIT_LIST_HEAD(&obj_request->links);
Alex Elder788e2df2013-01-17 12:25:27 -06002041 init_completion(&obj_request->completion);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002042 kref_init(&obj_request->kref);
2043
Ilya Dryomov67e2b652017-01-25 18:16:22 +01002044 dout("%s %p\n", __func__, obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002045 return obj_request;
2046}
2047
2048static void rbd_obj_request_destroy(struct kref *kref)
2049{
2050 struct rbd_obj_request *obj_request;
2051
2052 obj_request = container_of(kref, struct rbd_obj_request, kref);
2053
Alex Elder37206ee2013-02-20 17:32:08 -06002054 dout("%s: obj %p\n", __func__, obj_request);
2055
Alex Elderbf0d5f502012-11-22 00:00:08 -06002056 rbd_assert(obj_request->img_request == NULL);
2057 rbd_assert(obj_request->which == BAD_WHICH);
2058
2059 if (obj_request->osd_req)
2060 rbd_osd_req_destroy(obj_request->osd_req);
2061
2062 rbd_assert(obj_request_type_valid(obj_request->type));
2063 switch (obj_request->type) {
Alex Elder9969ebc2013-01-18 12:31:10 -06002064 case OBJ_REQUEST_NODATA:
2065 break; /* Nothing to do */
Alex Elderbf0d5f502012-11-22 00:00:08 -06002066 case OBJ_REQUEST_BIO:
2067 if (obj_request->bio_list)
2068 bio_chain_put(obj_request->bio_list);
2069 break;
Alex Elder788e2df2013-01-17 12:25:27 -06002070 case OBJ_REQUEST_PAGES:
Ilya Dryomov04dc9232016-09-15 18:05:16 +02002071 /* img_data requests don't own their page array */
2072 if (obj_request->pages &&
2073 !obj_request_img_data_test(obj_request))
Alex Elder788e2df2013-01-17 12:25:27 -06002074 ceph_release_page_vector(obj_request->pages,
2075 obj_request->page_count);
2076 break;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002077 }
2078
Alex Elder868311b2013-05-01 12:43:03 -05002079 kmem_cache_free(rbd_obj_request_cache, obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002080}
2081
Alex Elderfb65d2282013-05-08 22:50:04 -05002082/* It's OK to call this for a device with no parent */
2083
2084static void rbd_spec_put(struct rbd_spec *spec);
2085static void rbd_dev_unparent(struct rbd_device *rbd_dev)
2086{
2087 rbd_dev_remove_parent(rbd_dev);
2088 rbd_spec_put(rbd_dev->parent_spec);
2089 rbd_dev->parent_spec = NULL;
2090 rbd_dev->parent_overlap = 0;
2091}
2092
Alex Elderbf0d5f502012-11-22 00:00:08 -06002093/*
Alex Eldera2acd002013-05-08 22:50:04 -05002094 * Parent image reference counting is used to determine when an
2095 * image's parent fields can be safely torn down--after there are no
2096 * more in-flight requests to the parent image. When the last
2097 * reference is dropped, cleaning them up is safe.
2098 */
2099static void rbd_dev_parent_put(struct rbd_device *rbd_dev)
2100{
2101 int counter;
2102
2103 if (!rbd_dev->parent_spec)
2104 return;
2105
2106 counter = atomic_dec_return_safe(&rbd_dev->parent_ref);
2107 if (counter > 0)
2108 return;
2109
2110 /* Last reference; clean up parent data structures */
2111
2112 if (!counter)
2113 rbd_dev_unparent(rbd_dev);
2114 else
Ilya Dryomov9584d502014-07-11 12:11:20 +04002115 rbd_warn(rbd_dev, "parent reference underflow");
Alex Eldera2acd002013-05-08 22:50:04 -05002116}
2117
2118/*
2119 * If an image has a non-zero parent overlap, get a reference to its
2120 * parent.
2121 *
2122 * Returns true if the rbd device has a parent with a non-zero
2123 * overlap and a reference for it was successfully taken, or
2124 * false otherwise.
2125 */
2126static bool rbd_dev_parent_get(struct rbd_device *rbd_dev)
2127{
Ilya Dryomovae43e9d2015-01-19 18:13:43 +03002128 int counter = 0;
Alex Eldera2acd002013-05-08 22:50:04 -05002129
2130 if (!rbd_dev->parent_spec)
2131 return false;
2132
Ilya Dryomovae43e9d2015-01-19 18:13:43 +03002133 down_read(&rbd_dev->header_rwsem);
2134 if (rbd_dev->parent_overlap)
2135 counter = atomic_inc_return_safe(&rbd_dev->parent_ref);
2136 up_read(&rbd_dev->header_rwsem);
Alex Eldera2acd002013-05-08 22:50:04 -05002137
2138 if (counter < 0)
Ilya Dryomov9584d502014-07-11 12:11:20 +04002139 rbd_warn(rbd_dev, "parent reference overflow");
Alex Eldera2acd002013-05-08 22:50:04 -05002140
Ilya Dryomovae43e9d2015-01-19 18:13:43 +03002141 return counter > 0;
Alex Eldera2acd002013-05-08 22:50:04 -05002142}
2143
Alex Elderbf0d5f502012-11-22 00:00:08 -06002144/*
2145 * Caller is responsible for filling in the list of object requests
2146 * that comprises the image request, and the Linux request pointer
2147 * (if there is one).
2148 */
Alex Eldercc344fa2013-02-19 12:25:56 -06002149static struct rbd_img_request *rbd_img_request_create(
2150 struct rbd_device *rbd_dev,
Alex Elderbf0d5f502012-11-22 00:00:08 -06002151 u64 offset, u64 length,
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08002152 enum obj_operation_type op_type,
Josh Durgin4e752f02014-04-08 11:12:11 -07002153 struct ceph_snap_context *snapc)
Alex Elderbf0d5f502012-11-22 00:00:08 -06002154{
2155 struct rbd_img_request *img_request;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002156
Ilya Dryomov7a716aa2014-08-05 11:25:54 +04002157 img_request = kmem_cache_alloc(rbd_img_request_cache, GFP_NOIO);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002158 if (!img_request)
2159 return NULL;
2160
Alex Elderbf0d5f502012-11-22 00:00:08 -06002161 img_request->rq = NULL;
2162 img_request->rbd_dev = rbd_dev;
2163 img_request->offset = offset;
2164 img_request->length = length;
Alex Elder0c425242013-02-08 09:55:49 -06002165 img_request->flags = 0;
Guangliang Zhao90e98c52014-04-01 22:22:16 +08002166 if (op_type == OBJ_OP_DISCARD) {
2167 img_request_discard_set(img_request);
2168 img_request->snapc = snapc;
2169 } else if (op_type == OBJ_OP_WRITE) {
Alex Elder0c425242013-02-08 09:55:49 -06002170 img_request_write_set(img_request);
Josh Durgin4e752f02014-04-08 11:12:11 -07002171 img_request->snapc = snapc;
Alex Elder0c425242013-02-08 09:55:49 -06002172 } else {
Alex Elderbf0d5f502012-11-22 00:00:08 -06002173 img_request->snap_id = rbd_dev->spec->snap_id;
Alex Elder0c425242013-02-08 09:55:49 -06002174 }
Alex Eldera2acd002013-05-08 22:50:04 -05002175 if (rbd_dev_parent_get(rbd_dev))
Alex Elderd0b2e942013-01-24 16:13:36 -06002176 img_request_layered_set(img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002177 spin_lock_init(&img_request->completion_lock);
2178 img_request->next_completion = 0;
2179 img_request->callback = NULL;
Alex Eldera5a337d2013-01-24 16:13:36 -06002180 img_request->result = 0;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002181 img_request->obj_request_count = 0;
2182 INIT_LIST_HEAD(&img_request->obj_requests);
2183 kref_init(&img_request->kref);
2184
Alex Elder37206ee2013-02-20 17:32:08 -06002185 dout("%s: rbd_dev %p %s %llu/%llu -> img %p\n", __func__, rbd_dev,
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08002186 obj_op_name(op_type), offset, length, img_request);
Alex Elder37206ee2013-02-20 17:32:08 -06002187
Alex Elderbf0d5f502012-11-22 00:00:08 -06002188 return img_request;
2189}
2190
2191static void rbd_img_request_destroy(struct kref *kref)
2192{
2193 struct rbd_img_request *img_request;
2194 struct rbd_obj_request *obj_request;
2195 struct rbd_obj_request *next_obj_request;
2196
2197 img_request = container_of(kref, struct rbd_img_request, kref);
2198
Alex Elder37206ee2013-02-20 17:32:08 -06002199 dout("%s: img %p\n", __func__, img_request);
2200
Alex Elderbf0d5f502012-11-22 00:00:08 -06002201 for_each_obj_request_safe(img_request, obj_request, next_obj_request)
2202 rbd_img_obj_request_del(img_request, obj_request);
Alex Elder25dcf952013-01-25 17:08:55 -06002203 rbd_assert(img_request->obj_request_count == 0);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002204
Alex Eldera2acd002013-05-08 22:50:04 -05002205 if (img_request_layered_test(img_request)) {
2206 img_request_layered_clear(img_request);
2207 rbd_dev_parent_put(img_request->rbd_dev);
2208 }
2209
Josh Durginbef95452014-04-04 17:47:52 -07002210 if (img_request_write_test(img_request) ||
2211 img_request_discard_test(img_request))
Alex Elder812164f82013-04-30 00:44:32 -05002212 ceph_put_snap_context(img_request->snapc);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002213
Alex Elder1c2a9df2013-05-01 12:43:03 -05002214 kmem_cache_free(rbd_img_request_cache, img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002215}
2216
Alex Eldere93f3152013-05-08 22:50:04 -05002217static struct rbd_img_request *rbd_parent_request_create(
2218 struct rbd_obj_request *obj_request,
2219 u64 img_offset, u64 length)
2220{
2221 struct rbd_img_request *parent_request;
2222 struct rbd_device *rbd_dev;
2223
2224 rbd_assert(obj_request->img_request);
2225 rbd_dev = obj_request->img_request->rbd_dev;
2226
Josh Durgin4e752f02014-04-08 11:12:11 -07002227 parent_request = rbd_img_request_create(rbd_dev->parent, img_offset,
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08002228 length, OBJ_OP_READ, NULL);
Alex Eldere93f3152013-05-08 22:50:04 -05002229 if (!parent_request)
2230 return NULL;
2231
2232 img_request_child_set(parent_request);
2233 rbd_obj_request_get(obj_request);
2234 parent_request->obj_request = obj_request;
2235
2236 return parent_request;
2237}
2238
2239static void rbd_parent_request_destroy(struct kref *kref)
2240{
2241 struct rbd_img_request *parent_request;
2242 struct rbd_obj_request *orig_request;
2243
2244 parent_request = container_of(kref, struct rbd_img_request, kref);
2245 orig_request = parent_request->obj_request;
2246
2247 parent_request->obj_request = NULL;
2248 rbd_obj_request_put(orig_request);
2249 img_request_child_clear(parent_request);
2250
2251 rbd_img_request_destroy(kref);
2252}
2253
Alex Elder12178572013-02-08 09:55:49 -06002254static bool rbd_img_obj_end_request(struct rbd_obj_request *obj_request)
2255{
Alex Elder6365d332013-02-11 12:33:24 -06002256 struct rbd_img_request *img_request;
Alex Elder12178572013-02-08 09:55:49 -06002257 unsigned int xferred;
2258 int result;
Alex Elder8b3e1a52013-01-24 16:13:36 -06002259 bool more;
Alex Elder12178572013-02-08 09:55:49 -06002260
Alex Elder6365d332013-02-11 12:33:24 -06002261 rbd_assert(obj_request_img_data_test(obj_request));
2262 img_request = obj_request->img_request;
2263
Alex Elder12178572013-02-08 09:55:49 -06002264 rbd_assert(obj_request->xferred <= (u64)UINT_MAX);
2265 xferred = (unsigned int)obj_request->xferred;
2266 result = obj_request->result;
2267 if (result) {
2268 struct rbd_device *rbd_dev = img_request->rbd_dev;
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08002269 enum obj_operation_type op_type;
2270
Guangliang Zhao90e98c52014-04-01 22:22:16 +08002271 if (img_request_discard_test(img_request))
2272 op_type = OBJ_OP_DISCARD;
2273 else if (img_request_write_test(img_request))
2274 op_type = OBJ_OP_WRITE;
2275 else
2276 op_type = OBJ_OP_READ;
Alex Elder12178572013-02-08 09:55:49 -06002277
Ilya Dryomov9584d502014-07-11 12:11:20 +04002278 rbd_warn(rbd_dev, "%s %llx at %llx (%llx)",
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08002279 obj_op_name(op_type), obj_request->length,
2280 obj_request->img_offset, obj_request->offset);
Ilya Dryomov9584d502014-07-11 12:11:20 +04002281 rbd_warn(rbd_dev, " result %d xferred %x",
Alex Elder12178572013-02-08 09:55:49 -06002282 result, xferred);
2283 if (!img_request->result)
2284 img_request->result = result;
Ilya Dryomov082a75d2015-04-25 15:56:15 +03002285 /*
2286 * Need to end I/O on the entire obj_request worth of
2287 * bytes in case of error.
2288 */
2289 xferred = obj_request->length;
Alex Elder12178572013-02-08 09:55:49 -06002290 }
2291
Alex Elder8b3e1a52013-01-24 16:13:36 -06002292 if (img_request_child_test(img_request)) {
2293 rbd_assert(img_request->obj_request != NULL);
2294 more = obj_request->which < img_request->obj_request_count - 1;
2295 } else {
Christoph Hellwig2a842ac2017-06-03 09:38:04 +02002296 blk_status_t status = errno_to_blk_status(result);
2297
Alex Elder8b3e1a52013-01-24 16:13:36 -06002298 rbd_assert(img_request->rq != NULL);
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01002299
Christoph Hellwig2a842ac2017-06-03 09:38:04 +02002300 more = blk_update_request(img_request->rq, status, xferred);
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01002301 if (!more)
Christoph Hellwig2a842ac2017-06-03 09:38:04 +02002302 __blk_mq_end_request(img_request->rq, status);
Alex Elder8b3e1a52013-01-24 16:13:36 -06002303 }
2304
2305 return more;
Alex Elder12178572013-02-08 09:55:49 -06002306}
2307
Alex Elder21692382013-04-05 01:27:12 -05002308static void rbd_img_obj_callback(struct rbd_obj_request *obj_request)
2309{
2310 struct rbd_img_request *img_request;
2311 u32 which = obj_request->which;
2312 bool more = true;
2313
Alex Elder6365d332013-02-11 12:33:24 -06002314 rbd_assert(obj_request_img_data_test(obj_request));
Alex Elder21692382013-04-05 01:27:12 -05002315 img_request = obj_request->img_request;
2316
2317 dout("%s: img %p obj %p\n", __func__, img_request, obj_request);
2318 rbd_assert(img_request != NULL);
Alex Elder21692382013-04-05 01:27:12 -05002319 rbd_assert(img_request->obj_request_count > 0);
2320 rbd_assert(which != BAD_WHICH);
2321 rbd_assert(which < img_request->obj_request_count);
Alex Elder21692382013-04-05 01:27:12 -05002322
2323 spin_lock_irq(&img_request->completion_lock);
2324 if (which != img_request->next_completion)
2325 goto out;
2326
2327 for_each_obj_request_from(img_request, obj_request) {
Alex Elder21692382013-04-05 01:27:12 -05002328 rbd_assert(more);
2329 rbd_assert(which < img_request->obj_request_count);
2330
2331 if (!obj_request_done_test(obj_request))
2332 break;
Alex Elder12178572013-02-08 09:55:49 -06002333 more = rbd_img_obj_end_request(obj_request);
Alex Elder21692382013-04-05 01:27:12 -05002334 which++;
2335 }
2336
2337 rbd_assert(more ^ (which == img_request->obj_request_count));
2338 img_request->next_completion = which;
2339out:
2340 spin_unlock_irq(&img_request->completion_lock);
Alex Elder0f2d5be2014-04-26 14:21:44 +04002341 rbd_img_request_put(img_request);
Alex Elder21692382013-04-05 01:27:12 -05002342
2343 if (!more)
2344 rbd_img_request_complete(img_request);
2345}
2346
Alex Elderf1a47392013-04-19 15:34:50 -05002347/*
Josh Durgin3b434a2a2014-04-04 17:32:15 -07002348 * Add individual osd ops to the given ceph_osd_request and prepare
2349 * them for submission. num_ops is the current number of
2350 * osd operations already to the object request.
2351 */
2352static void rbd_img_obj_request_fill(struct rbd_obj_request *obj_request,
2353 struct ceph_osd_request *osd_request,
2354 enum obj_operation_type op_type,
2355 unsigned int num_ops)
2356{
2357 struct rbd_img_request *img_request = obj_request->img_request;
2358 struct rbd_device *rbd_dev = img_request->rbd_dev;
2359 u64 object_size = rbd_obj_bytes(&rbd_dev->header);
2360 u64 offset = obj_request->offset;
2361 u64 length = obj_request->length;
2362 u64 img_end;
2363 u16 opcode;
2364
2365 if (op_type == OBJ_OP_DISCARD) {
Josh Durgind3246fb2014-04-07 16:49:21 -07002366 if (!offset && length == object_size &&
2367 (!img_request_layered_test(img_request) ||
2368 !obj_request_overlaps_parent(obj_request))) {
Josh Durgin3b434a2a2014-04-04 17:32:15 -07002369 opcode = CEPH_OSD_OP_DELETE;
2370 } else if ((offset + length == object_size)) {
2371 opcode = CEPH_OSD_OP_TRUNCATE;
2372 } else {
2373 down_read(&rbd_dev->header_rwsem);
2374 img_end = rbd_dev->header.image_size;
2375 up_read(&rbd_dev->header_rwsem);
2376
2377 if (obj_request->img_offset + length == img_end)
2378 opcode = CEPH_OSD_OP_TRUNCATE;
2379 else
2380 opcode = CEPH_OSD_OP_ZERO;
2381 }
2382 } else if (op_type == OBJ_OP_WRITE) {
Ilya Dryomove30b7572015-10-07 17:27:17 +02002383 if (!offset && length == object_size)
2384 opcode = CEPH_OSD_OP_WRITEFULL;
2385 else
2386 opcode = CEPH_OSD_OP_WRITE;
Josh Durgin3b434a2a2014-04-04 17:32:15 -07002387 osd_req_op_alloc_hint_init(osd_request, num_ops,
2388 object_size, object_size);
2389 num_ops++;
2390 } else {
2391 opcode = CEPH_OSD_OP_READ;
2392 }
2393
Ilya Dryomov7e868b62014-11-21 22:16:43 +03002394 if (opcode == CEPH_OSD_OP_DELETE)
Yan, Zheng144cba12015-04-27 11:09:54 +08002395 osd_req_op_init(osd_request, num_ops, opcode, 0);
Ilya Dryomov7e868b62014-11-21 22:16:43 +03002396 else
2397 osd_req_op_extent_init(osd_request, num_ops, opcode,
2398 offset, length, 0, 0);
2399
Josh Durgin3b434a2a2014-04-04 17:32:15 -07002400 if (obj_request->type == OBJ_REQUEST_BIO)
2401 osd_req_op_extent_osd_data_bio(osd_request, num_ops,
2402 obj_request->bio_list, length);
2403 else if (obj_request->type == OBJ_REQUEST_PAGES)
2404 osd_req_op_extent_osd_data_pages(osd_request, num_ops,
2405 obj_request->pages, length,
2406 offset & ~PAGE_MASK, false, false);
2407
2408 /* Discards are also writes */
2409 if (op_type == OBJ_OP_WRITE || op_type == OBJ_OP_DISCARD)
2410 rbd_osd_req_format_write(obj_request);
2411 else
2412 rbd_osd_req_format_read(obj_request);
2413}
2414
2415/*
Alex Elderf1a47392013-04-19 15:34:50 -05002416 * Split up an image request into one or more object requests, each
2417 * to a different object. The "type" parameter indicates whether
2418 * "data_desc" is the pointer to the head of a list of bio
2419 * structures, or the base of a page array. In either case this
2420 * function assumes data_desc describes memory sufficient to hold
2421 * all data described by the image request.
2422 */
2423static int rbd_img_request_fill(struct rbd_img_request *img_request,
2424 enum obj_request_type type,
2425 void *data_desc)
Alex Elderbf0d5f502012-11-22 00:00:08 -06002426{
2427 struct rbd_device *rbd_dev = img_request->rbd_dev;
2428 struct rbd_obj_request *obj_request = NULL;
2429 struct rbd_obj_request *next_obj_request;
Jingoo Hana1580732013-08-09 13:04:35 +09002430 struct bio *bio_list = NULL;
Alex Elderf1a47392013-04-19 15:34:50 -05002431 unsigned int bio_offset = 0;
Jingoo Hana1580732013-08-09 13:04:35 +09002432 struct page **pages = NULL;
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08002433 enum obj_operation_type op_type;
Alex Elder7da22d22013-01-24 16:13:36 -06002434 u64 img_offset;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002435 u64 resid;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002436
Alex Elderf1a47392013-04-19 15:34:50 -05002437 dout("%s: img %p type %d data_desc %p\n", __func__, img_request,
2438 (int)type, data_desc);
Alex Elder37206ee2013-02-20 17:32:08 -06002439
Alex Elder7da22d22013-01-24 16:13:36 -06002440 img_offset = img_request->offset;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002441 resid = img_request->length;
Alex Elder4dda41d2013-02-20 21:59:33 -06002442 rbd_assert(resid > 0);
Josh Durgin3b434a2a2014-04-04 17:32:15 -07002443 op_type = rbd_img_request_op_type(img_request);
Alex Elderf1a47392013-04-19 15:34:50 -05002444
2445 if (type == OBJ_REQUEST_BIO) {
2446 bio_list = data_desc;
Kent Overstreet4f024f32013-10-11 15:44:27 -07002447 rbd_assert(img_offset ==
2448 bio_list->bi_iter.bi_sector << SECTOR_SHIFT);
Guangliang Zhao90e98c52014-04-01 22:22:16 +08002449 } else if (type == OBJ_REQUEST_PAGES) {
Alex Elderf1a47392013-04-19 15:34:50 -05002450 pages = data_desc;
2451 }
2452
Alex Elderbf0d5f502012-11-22 00:00:08 -06002453 while (resid) {
Alex Elder2fa12322013-04-05 01:27:12 -05002454 struct ceph_osd_request *osd_req;
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01002455 u64 object_no = img_offset >> rbd_dev->header.obj_order;
Ilya Dryomov67e2b652017-01-25 18:16:22 +01002456 u64 offset = rbd_segment_offset(rbd_dev, img_offset);
2457 u64 length = rbd_segment_length(rbd_dev, img_offset, resid);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002458
Ilya Dryomov6c696d82017-01-25 18:16:23 +01002459 obj_request = rbd_obj_request_create(type);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002460 if (!obj_request)
2461 goto out_unwind;
Ilya Dryomov62054da2014-03-04 11:57:17 +02002462
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01002463 obj_request->object_no = object_no;
Ilya Dryomov67e2b652017-01-25 18:16:22 +01002464 obj_request->offset = offset;
2465 obj_request->length = length;
2466
Josh Durgin03507db2013-08-27 14:45:46 -07002467 /*
2468 * set obj_request->img_request before creating the
2469 * osd_request so that it gets the right snapc
2470 */
2471 rbd_img_obj_request_add(img_request, obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002472
Alex Elderf1a47392013-04-19 15:34:50 -05002473 if (type == OBJ_REQUEST_BIO) {
2474 unsigned int clone_size;
2475
2476 rbd_assert(length <= (u64)UINT_MAX);
2477 clone_size = (unsigned int)length;
2478 obj_request->bio_list =
2479 bio_chain_clone_range(&bio_list,
2480 &bio_offset,
2481 clone_size,
David Disseldorp2224d872016-04-05 11:13:39 +02002482 GFP_NOIO);
Alex Elderf1a47392013-04-19 15:34:50 -05002483 if (!obj_request->bio_list)
Ilya Dryomov62054da2014-03-04 11:57:17 +02002484 goto out_unwind;
Guangliang Zhao90e98c52014-04-01 22:22:16 +08002485 } else if (type == OBJ_REQUEST_PAGES) {
Alex Elderf1a47392013-04-19 15:34:50 -05002486 unsigned int page_count;
2487
2488 obj_request->pages = pages;
2489 page_count = (u32)calc_pages_for(offset, length);
2490 obj_request->page_count = page_count;
2491 if ((offset + length) & ~PAGE_MASK)
2492 page_count--; /* more on last page */
2493 pages += page_count;
2494 }
Alex Elderbf0d5f502012-11-22 00:00:08 -06002495
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08002496 osd_req = rbd_osd_req_create(rbd_dev, op_type,
2497 (op_type == OBJ_OP_WRITE) ? 2 : 1,
2498 obj_request);
Alex Elder2fa12322013-04-05 01:27:12 -05002499 if (!osd_req)
Ilya Dryomov62054da2014-03-04 11:57:17 +02002500 goto out_unwind;
Josh Durgin3b434a2a2014-04-04 17:32:15 -07002501
Alex Elder2fa12322013-04-05 01:27:12 -05002502 obj_request->osd_req = osd_req;
Alex Elder21692382013-04-05 01:27:12 -05002503 obj_request->callback = rbd_img_obj_callback;
Alex Elder7da22d22013-01-24 16:13:36 -06002504 obj_request->img_offset = img_offset;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002505
Josh Durgin3b434a2a2014-04-04 17:32:15 -07002506 rbd_img_obj_request_fill(obj_request, osd_req, op_type, 0);
2507
Alex Elder7da22d22013-01-24 16:13:36 -06002508 img_offset += length;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002509 resid -= length;
2510 }
2511
2512 return 0;
2513
Alex Elderbf0d5f502012-11-22 00:00:08 -06002514out_unwind:
2515 for_each_obj_request_safe(img_request, obj_request, next_obj_request)
Ilya Dryomov42dd0372014-03-04 11:57:17 +02002516 rbd_img_obj_request_del(img_request, obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002517
2518 return -ENOMEM;
2519}
2520
Alex Elder3d7efd12013-04-19 15:34:50 -05002521static void
Ilya Dryomov27617132015-07-16 17:36:11 +03002522rbd_osd_copyup_callback(struct rbd_obj_request *obj_request)
Alex Elder0eefd472013-04-19 15:34:50 -05002523{
2524 struct rbd_img_request *img_request;
2525 struct rbd_device *rbd_dev;
Alex Elderebda6402013-05-10 16:29:22 -05002526 struct page **pages;
Alex Elder0eefd472013-04-19 15:34:50 -05002527 u32 page_count;
2528
Ilya Dryomov27617132015-07-16 17:36:11 +03002529 dout("%s: obj %p\n", __func__, obj_request);
2530
Josh Durgind3246fb2014-04-07 16:49:21 -07002531 rbd_assert(obj_request->type == OBJ_REQUEST_BIO ||
2532 obj_request->type == OBJ_REQUEST_NODATA);
Alex Elder0eefd472013-04-19 15:34:50 -05002533 rbd_assert(obj_request_img_data_test(obj_request));
2534 img_request = obj_request->img_request;
2535 rbd_assert(img_request);
2536
2537 rbd_dev = img_request->rbd_dev;
2538 rbd_assert(rbd_dev);
Alex Elder0eefd472013-04-19 15:34:50 -05002539
Alex Elderebda6402013-05-10 16:29:22 -05002540 pages = obj_request->copyup_pages;
2541 rbd_assert(pages != NULL);
Alex Elder0eefd472013-04-19 15:34:50 -05002542 obj_request->copyup_pages = NULL;
Alex Elderebda6402013-05-10 16:29:22 -05002543 page_count = obj_request->copyup_page_count;
2544 rbd_assert(page_count);
2545 obj_request->copyup_page_count = 0;
2546 ceph_release_page_vector(pages, page_count);
Alex Elder0eefd472013-04-19 15:34:50 -05002547
2548 /*
2549 * We want the transfer count to reflect the size of the
2550 * original write request. There is no such thing as a
2551 * successful short write, so if the request was successful
2552 * we can just set it to the originally-requested length.
2553 */
2554 if (!obj_request->result)
2555 obj_request->xferred = obj_request->length;
2556
Ilya Dryomov27617132015-07-16 17:36:11 +03002557 obj_request_done_set(obj_request);
Alex Elder0eefd472013-04-19 15:34:50 -05002558}
2559
2560static void
Alex Elder3d7efd12013-04-19 15:34:50 -05002561rbd_img_obj_parent_read_full_callback(struct rbd_img_request *img_request)
2562{
2563 struct rbd_obj_request *orig_request;
Alex Elder0eefd472013-04-19 15:34:50 -05002564 struct ceph_osd_request *osd_req;
Alex Elder0eefd472013-04-19 15:34:50 -05002565 struct rbd_device *rbd_dev;
Alex Elder3d7efd12013-04-19 15:34:50 -05002566 struct page **pages;
Josh Durgind3246fb2014-04-07 16:49:21 -07002567 enum obj_operation_type op_type;
Alex Elderebda6402013-05-10 16:29:22 -05002568 u32 page_count;
Alex Elderbbea1c12013-05-06 17:40:33 -05002569 int img_result;
Alex Elderebda6402013-05-10 16:29:22 -05002570 u64 parent_length;
Alex Elder3d7efd12013-04-19 15:34:50 -05002571
2572 rbd_assert(img_request_child_test(img_request));
2573
2574 /* First get what we need from the image request */
2575
2576 pages = img_request->copyup_pages;
2577 rbd_assert(pages != NULL);
2578 img_request->copyup_pages = NULL;
Alex Elderebda6402013-05-10 16:29:22 -05002579 page_count = img_request->copyup_page_count;
2580 rbd_assert(page_count);
2581 img_request->copyup_page_count = 0;
Alex Elder3d7efd12013-04-19 15:34:50 -05002582
2583 orig_request = img_request->obj_request;
2584 rbd_assert(orig_request != NULL);
Alex Elderb91f09f2013-05-10 16:29:22 -05002585 rbd_assert(obj_request_type_valid(orig_request->type));
Alex Elderbbea1c12013-05-06 17:40:33 -05002586 img_result = img_request->result;
Alex Elderebda6402013-05-10 16:29:22 -05002587 parent_length = img_request->length;
Ilya Dryomovfa355112016-09-16 15:20:42 +02002588 rbd_assert(img_result || parent_length == img_request->xferred);
Alex Elder3d7efd12013-04-19 15:34:50 -05002589 rbd_img_request_put(img_request);
2590
Alex Elder91c6feb2013-05-06 17:40:32 -05002591 rbd_assert(orig_request->img_request);
2592 rbd_dev = orig_request->img_request->rbd_dev;
Alex Elder3d7efd12013-04-19 15:34:50 -05002593 rbd_assert(rbd_dev);
Alex Elder3d7efd12013-04-19 15:34:50 -05002594
Alex Elderbbea1c12013-05-06 17:40:33 -05002595 /*
2596 * If the overlap has become 0 (most likely because the
2597 * image has been flattened) we need to free the pages
2598 * and re-submit the original write request.
2599 */
2600 if (!rbd_dev->parent_overlap) {
Alex Elderbbea1c12013-05-06 17:40:33 -05002601 ceph_release_page_vector(pages, page_count);
Ilya Dryomov980917f2016-09-12 18:59:42 +02002602 rbd_obj_request_submit(orig_request);
2603 return;
Alex Elderbbea1c12013-05-06 17:40:33 -05002604 }
2605
2606 if (img_result)
Alex Elder0eefd472013-04-19 15:34:50 -05002607 goto out_err;
Alex Elder3d7efd12013-04-19 15:34:50 -05002608
Alex Elder8785b1d2013-05-09 10:08:49 -05002609 /*
2610 * The original osd request is of no use to use any more.
Ilya Dryomov0ccd5922014-02-25 16:22:28 +02002611 * We need a new one that can hold the three ops in a copyup
Alex Elder8785b1d2013-05-09 10:08:49 -05002612 * request. Allocate the new copyup osd request for the
2613 * original request, and release the old one.
2614 */
Alex Elderbbea1c12013-05-06 17:40:33 -05002615 img_result = -ENOMEM;
Alex Elder0eefd472013-04-19 15:34:50 -05002616 osd_req = rbd_osd_req_create_copyup(orig_request);
2617 if (!osd_req)
2618 goto out_err;
Alex Elder8785b1d2013-05-09 10:08:49 -05002619 rbd_osd_req_destroy(orig_request->osd_req);
Alex Elder0eefd472013-04-19 15:34:50 -05002620 orig_request->osd_req = osd_req;
2621 orig_request->copyup_pages = pages;
Alex Elderebda6402013-05-10 16:29:22 -05002622 orig_request->copyup_page_count = page_count;
Alex Elder3d7efd12013-04-19 15:34:50 -05002623
Alex Elder0eefd472013-04-19 15:34:50 -05002624 /* Initialize the copyup op */
2625
2626 osd_req_op_cls_init(osd_req, 0, CEPH_OSD_OP_CALL, "rbd", "copyup");
Alex Elderebda6402013-05-10 16:29:22 -05002627 osd_req_op_cls_request_data_pages(osd_req, 0, pages, parent_length, 0,
Alex Elder0eefd472013-04-19 15:34:50 -05002628 false, false);
2629
Josh Durgind3246fb2014-04-07 16:49:21 -07002630 /* Add the other op(s) */
Ilya Dryomov0ccd5922014-02-25 16:22:28 +02002631
Josh Durgind3246fb2014-04-07 16:49:21 -07002632 op_type = rbd_img_request_op_type(orig_request->img_request);
2633 rbd_img_obj_request_fill(orig_request, osd_req, op_type, 1);
Alex Elder0eefd472013-04-19 15:34:50 -05002634
2635 /* All set, send it off. */
2636
Ilya Dryomov980917f2016-09-12 18:59:42 +02002637 rbd_obj_request_submit(orig_request);
2638 return;
Alex Elder0eefd472013-04-19 15:34:50 -05002639
Alex Elder0eefd472013-04-19 15:34:50 -05002640out_err:
Ilya Dryomovfa355112016-09-16 15:20:42 +02002641 ceph_release_page_vector(pages, page_count);
Ilya Dryomov0dcc6852016-09-26 15:43:52 +02002642 rbd_obj_request_error(orig_request, img_result);
Alex Elder3d7efd12013-04-19 15:34:50 -05002643}
2644
2645/*
2646 * Read from the parent image the range of data that covers the
2647 * entire target of the given object request. This is used for
2648 * satisfying a layered image write request when the target of an
2649 * object request from the image request does not exist.
2650 *
2651 * A page array big enough to hold the returned data is allocated
2652 * and supplied to rbd_img_request_fill() as the "data descriptor."
2653 * When the read completes, this page array will be transferred to
2654 * the original object request for the copyup operation.
2655 *
Ilya Dryomovc2e82412016-09-13 20:18:01 +02002656 * If an error occurs, it is recorded as the result of the original
2657 * object request in rbd_img_obj_exists_callback().
Alex Elder3d7efd12013-04-19 15:34:50 -05002658 */
2659static int rbd_img_obj_parent_read_full(struct rbd_obj_request *obj_request)
2660{
Ilya Dryomov058aa992016-09-12 14:44:45 +02002661 struct rbd_device *rbd_dev = obj_request->img_request->rbd_dev;
Alex Elder3d7efd12013-04-19 15:34:50 -05002662 struct rbd_img_request *parent_request = NULL;
Alex Elder3d7efd12013-04-19 15:34:50 -05002663 u64 img_offset;
2664 u64 length;
2665 struct page **pages = NULL;
2666 u32 page_count;
2667 int result;
2668
Alex Elder3d7efd12013-04-19 15:34:50 -05002669 rbd_assert(rbd_dev->parent != NULL);
2670
2671 /*
2672 * Determine the byte range covered by the object in the
2673 * child image to which the original request was to be sent.
2674 */
2675 img_offset = obj_request->img_offset - obj_request->offset;
Ilya Dryomov5bc3fb12017-01-25 18:16:22 +01002676 length = rbd_obj_bytes(&rbd_dev->header);
Alex Elder3d7efd12013-04-19 15:34:50 -05002677
2678 /*
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05002679 * There is no defined parent data beyond the parent
2680 * overlap, so limit what we read at that boundary if
2681 * necessary.
2682 */
2683 if (img_offset + length > rbd_dev->parent_overlap) {
2684 rbd_assert(img_offset < rbd_dev->parent_overlap);
2685 length = rbd_dev->parent_overlap - img_offset;
2686 }
2687
2688 /*
Alex Elder3d7efd12013-04-19 15:34:50 -05002689 * Allocate a page array big enough to receive the data read
2690 * from the parent.
2691 */
2692 page_count = (u32)calc_pages_for(0, length);
2693 pages = ceph_alloc_page_vector(page_count, GFP_KERNEL);
2694 if (IS_ERR(pages)) {
2695 result = PTR_ERR(pages);
2696 pages = NULL;
2697 goto out_err;
2698 }
2699
2700 result = -ENOMEM;
Alex Eldere93f3152013-05-08 22:50:04 -05002701 parent_request = rbd_parent_request_create(obj_request,
2702 img_offset, length);
Alex Elder3d7efd12013-04-19 15:34:50 -05002703 if (!parent_request)
2704 goto out_err;
Alex Elder3d7efd12013-04-19 15:34:50 -05002705
2706 result = rbd_img_request_fill(parent_request, OBJ_REQUEST_PAGES, pages);
2707 if (result)
2708 goto out_err;
Ilya Dryomov058aa992016-09-12 14:44:45 +02002709
Alex Elder3d7efd12013-04-19 15:34:50 -05002710 parent_request->copyup_pages = pages;
Alex Elderebda6402013-05-10 16:29:22 -05002711 parent_request->copyup_page_count = page_count;
Alex Elder3d7efd12013-04-19 15:34:50 -05002712 parent_request->callback = rbd_img_obj_parent_read_full_callback;
Ilya Dryomov058aa992016-09-12 14:44:45 +02002713
Alex Elder3d7efd12013-04-19 15:34:50 -05002714 result = rbd_img_request_submit(parent_request);
2715 if (!result)
2716 return 0;
2717
2718 parent_request->copyup_pages = NULL;
Alex Elderebda6402013-05-10 16:29:22 -05002719 parent_request->copyup_page_count = 0;
Alex Elder3d7efd12013-04-19 15:34:50 -05002720 parent_request->obj_request = NULL;
2721 rbd_obj_request_put(obj_request);
2722out_err:
2723 if (pages)
2724 ceph_release_page_vector(pages, page_count);
2725 if (parent_request)
2726 rbd_img_request_put(parent_request);
Alex Elder3d7efd12013-04-19 15:34:50 -05002727 return result;
2728}
2729
Alex Elderc5b5ef62013-02-11 12:33:24 -06002730static void rbd_img_obj_exists_callback(struct rbd_obj_request *obj_request)
2731{
Alex Elderc5b5ef62013-02-11 12:33:24 -06002732 struct rbd_obj_request *orig_request;
Alex Elder638f5ab2013-05-06 17:40:33 -05002733 struct rbd_device *rbd_dev;
Alex Elderc5b5ef62013-02-11 12:33:24 -06002734 int result;
2735
2736 rbd_assert(!obj_request_img_data_test(obj_request));
2737
2738 /*
2739 * All we need from the object request is the original
2740 * request and the result of the STAT op. Grab those, then
2741 * we're done with the request.
2742 */
2743 orig_request = obj_request->obj_request;
2744 obj_request->obj_request = NULL;
Alex Elder912c3172013-05-13 20:35:38 -05002745 rbd_obj_request_put(orig_request);
Alex Elderc5b5ef62013-02-11 12:33:24 -06002746 rbd_assert(orig_request);
2747 rbd_assert(orig_request->img_request);
2748
2749 result = obj_request->result;
2750 obj_request->result = 0;
2751
2752 dout("%s: obj %p for obj %p result %d %llu/%llu\n", __func__,
2753 obj_request, orig_request, result,
2754 obj_request->xferred, obj_request->length);
2755 rbd_obj_request_put(obj_request);
2756
Alex Elder638f5ab2013-05-06 17:40:33 -05002757 /*
2758 * If the overlap has become 0 (most likely because the
Ilya Dryomov980917f2016-09-12 18:59:42 +02002759 * image has been flattened) we need to re-submit the
2760 * original request.
Alex Elder638f5ab2013-05-06 17:40:33 -05002761 */
2762 rbd_dev = orig_request->img_request->rbd_dev;
2763 if (!rbd_dev->parent_overlap) {
Ilya Dryomov980917f2016-09-12 18:59:42 +02002764 rbd_obj_request_submit(orig_request);
2765 return;
Alex Elder638f5ab2013-05-06 17:40:33 -05002766 }
Alex Elderc5b5ef62013-02-11 12:33:24 -06002767
2768 /*
2769 * Our only purpose here is to determine whether the object
2770 * exists, and we don't want to treat the non-existence as
2771 * an error. If something else comes back, transfer the
2772 * error to the original request and complete it now.
2773 */
2774 if (!result) {
2775 obj_request_existence_set(orig_request, true);
2776 } else if (result == -ENOENT) {
2777 obj_request_existence_set(orig_request, false);
Ilya Dryomovc2e82412016-09-13 20:18:01 +02002778 } else {
2779 goto fail_orig_request;
Alex Elderc5b5ef62013-02-11 12:33:24 -06002780 }
2781
2782 /*
2783 * Resubmit the original request now that we have recorded
2784 * whether the target object exists.
2785 */
Ilya Dryomovc2e82412016-09-13 20:18:01 +02002786 result = rbd_img_obj_request_submit(orig_request);
2787 if (result)
2788 goto fail_orig_request;
2789
2790 return;
2791
2792fail_orig_request:
Ilya Dryomov0dcc6852016-09-26 15:43:52 +02002793 rbd_obj_request_error(orig_request, result);
Alex Elderc5b5ef62013-02-11 12:33:24 -06002794}
2795
2796static int rbd_img_obj_exists_submit(struct rbd_obj_request *obj_request)
2797{
Ilya Dryomov058aa992016-09-12 14:44:45 +02002798 struct rbd_device *rbd_dev = obj_request->img_request->rbd_dev;
Alex Elderc5b5ef62013-02-11 12:33:24 -06002799 struct rbd_obj_request *stat_request;
Ilya Dryomov710214e2016-09-15 17:53:32 +02002800 struct page **pages;
Alex Elderc5b5ef62013-02-11 12:33:24 -06002801 u32 page_count;
2802 size_t size;
2803 int ret;
2804
Ilya Dryomov6c696d82017-01-25 18:16:23 +01002805 stat_request = rbd_obj_request_create(OBJ_REQUEST_PAGES);
Ilya Dryomov710214e2016-09-15 17:53:32 +02002806 if (!stat_request)
2807 return -ENOMEM;
2808
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01002809 stat_request->object_no = obj_request->object_no;
2810
Ilya Dryomov710214e2016-09-15 17:53:32 +02002811 stat_request->osd_req = rbd_osd_req_create(rbd_dev, OBJ_OP_READ, 1,
2812 stat_request);
2813 if (!stat_request->osd_req) {
2814 ret = -ENOMEM;
2815 goto fail_stat_request;
2816 }
2817
Alex Elderc5b5ef62013-02-11 12:33:24 -06002818 /*
2819 * The response data for a STAT call consists of:
2820 * le64 length;
2821 * struct {
2822 * le32 tv_sec;
2823 * le32 tv_nsec;
2824 * } mtime;
2825 */
2826 size = sizeof (__le64) + sizeof (__le32) + sizeof (__le32);
2827 page_count = (u32)calc_pages_for(0, size);
2828 pages = ceph_alloc_page_vector(page_count, GFP_KERNEL);
Ilya Dryomov710214e2016-09-15 17:53:32 +02002829 if (IS_ERR(pages)) {
2830 ret = PTR_ERR(pages);
2831 goto fail_stat_request;
2832 }
Alex Elderc5b5ef62013-02-11 12:33:24 -06002833
Ilya Dryomov710214e2016-09-15 17:53:32 +02002834 osd_req_op_init(stat_request->osd_req, 0, CEPH_OSD_OP_STAT, 0);
2835 osd_req_op_raw_data_in_pages(stat_request->osd_req, 0, pages, size, 0,
2836 false, false);
Alex Elderc5b5ef62013-02-11 12:33:24 -06002837
2838 rbd_obj_request_get(obj_request);
2839 stat_request->obj_request = obj_request;
2840 stat_request->pages = pages;
2841 stat_request->page_count = page_count;
Alex Elderc5b5ef62013-02-11 12:33:24 -06002842 stat_request->callback = rbd_img_obj_exists_callback;
2843
Ilya Dryomov980917f2016-09-12 18:59:42 +02002844 rbd_obj_request_submit(stat_request);
2845 return 0;
Alex Elderc5b5ef62013-02-11 12:33:24 -06002846
Ilya Dryomov710214e2016-09-15 17:53:32 +02002847fail_stat_request:
2848 rbd_obj_request_put(stat_request);
Alex Elderc5b5ef62013-02-11 12:33:24 -06002849 return ret;
2850}
2851
Ilya Dryomov70d045f2014-09-12 16:02:01 +04002852static bool img_obj_request_simple(struct rbd_obj_request *obj_request)
Alex Elderb454e362013-04-19 15:34:50 -05002853{
Ilya Dryomov058aa992016-09-12 14:44:45 +02002854 struct rbd_img_request *img_request = obj_request->img_request;
2855 struct rbd_device *rbd_dev = img_request->rbd_dev;
Alex Elderb454e362013-04-19 15:34:50 -05002856
Ilya Dryomov70d045f2014-09-12 16:02:01 +04002857 /* Reads */
Josh Durgin1c220882014-04-04 17:49:12 -07002858 if (!img_request_write_test(img_request) &&
2859 !img_request_discard_test(img_request))
Ilya Dryomov70d045f2014-09-12 16:02:01 +04002860 return true;
Alex Elderb454e362013-04-19 15:34:50 -05002861
Ilya Dryomov70d045f2014-09-12 16:02:01 +04002862 /* Non-layered writes */
2863 if (!img_request_layered_test(img_request))
2864 return true;
2865
2866 /*
2867 * Layered writes outside of the parent overlap range don't
2868 * share any data with the parent.
2869 */
2870 if (!obj_request_overlaps_parent(obj_request))
2871 return true;
2872
2873 /*
Guangliang Zhaoc622d222014-04-01 22:22:15 +08002874 * Entire-object layered writes - we will overwrite whatever
2875 * parent data there is anyway.
2876 */
2877 if (!obj_request->offset &&
2878 obj_request->length == rbd_obj_bytes(&rbd_dev->header))
2879 return true;
2880
2881 /*
Ilya Dryomov70d045f2014-09-12 16:02:01 +04002882 * If the object is known to already exist, its parent data has
2883 * already been copied.
2884 */
2885 if (obj_request_known_test(obj_request) &&
2886 obj_request_exists_test(obj_request))
2887 return true;
2888
2889 return false;
2890}
2891
2892static int rbd_img_obj_request_submit(struct rbd_obj_request *obj_request)
2893{
Ilya Dryomov058aa992016-09-12 14:44:45 +02002894 rbd_assert(obj_request_img_data_test(obj_request));
2895 rbd_assert(obj_request_type_valid(obj_request->type));
2896 rbd_assert(obj_request->img_request);
2897
Ilya Dryomov70d045f2014-09-12 16:02:01 +04002898 if (img_obj_request_simple(obj_request)) {
Ilya Dryomov980917f2016-09-12 18:59:42 +02002899 rbd_obj_request_submit(obj_request);
2900 return 0;
Alex Elderb454e362013-04-19 15:34:50 -05002901 }
2902
2903 /*
Alex Elder3d7efd12013-04-19 15:34:50 -05002904 * It's a layered write. The target object might exist but
2905 * we may not know that yet. If we know it doesn't exist,
2906 * start by reading the data for the full target object from
2907 * the parent so we can use it for a copyup to the target.
Alex Elderb454e362013-04-19 15:34:50 -05002908 */
Ilya Dryomov70d045f2014-09-12 16:02:01 +04002909 if (obj_request_known_test(obj_request))
Alex Elder3d7efd12013-04-19 15:34:50 -05002910 return rbd_img_obj_parent_read_full(obj_request);
2911
2912 /* We don't know whether the target exists. Go find out. */
Alex Elderb454e362013-04-19 15:34:50 -05002913
2914 return rbd_img_obj_exists_submit(obj_request);
2915}
2916
Alex Elderbf0d5f502012-11-22 00:00:08 -06002917static int rbd_img_request_submit(struct rbd_img_request *img_request)
2918{
Alex Elderbf0d5f502012-11-22 00:00:08 -06002919 struct rbd_obj_request *obj_request;
Alex Elder46faeed2013-04-10 17:47:46 -05002920 struct rbd_obj_request *next_obj_request;
Ilya Dryomov663ae2c2016-05-16 13:18:57 +02002921 int ret = 0;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002922
Alex Elder37206ee2013-02-20 17:32:08 -06002923 dout("%s: img %p\n", __func__, img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002924
Ilya Dryomov663ae2c2016-05-16 13:18:57 +02002925 rbd_img_request_get(img_request);
2926 for_each_obj_request_safe(img_request, obj_request, next_obj_request) {
Alex Elderb454e362013-04-19 15:34:50 -05002927 ret = rbd_img_obj_request_submit(obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002928 if (ret)
Ilya Dryomov663ae2c2016-05-16 13:18:57 +02002929 goto out_put_ireq;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002930 }
2931
Ilya Dryomov663ae2c2016-05-16 13:18:57 +02002932out_put_ireq:
2933 rbd_img_request_put(img_request);
2934 return ret;
Alex Elderbf0d5f502012-11-22 00:00:08 -06002935}
2936
Alex Elder8b3e1a52013-01-24 16:13:36 -06002937static void rbd_img_parent_read_callback(struct rbd_img_request *img_request)
2938{
2939 struct rbd_obj_request *obj_request;
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05002940 struct rbd_device *rbd_dev;
2941 u64 obj_end;
Alex Elder02c74fb2013-05-06 17:40:33 -05002942 u64 img_xferred;
2943 int img_result;
Alex Elder8b3e1a52013-01-24 16:13:36 -06002944
2945 rbd_assert(img_request_child_test(img_request));
2946
Alex Elder02c74fb2013-05-06 17:40:33 -05002947 /* First get what we need from the image request and release it */
2948
Alex Elder8b3e1a52013-01-24 16:13:36 -06002949 obj_request = img_request->obj_request;
Alex Elder02c74fb2013-05-06 17:40:33 -05002950 img_xferred = img_request->xferred;
2951 img_result = img_request->result;
2952 rbd_img_request_put(img_request);
2953
2954 /*
2955 * If the overlap has become 0 (most likely because the
2956 * image has been flattened) we need to re-submit the
2957 * original request.
2958 */
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05002959 rbd_assert(obj_request);
2960 rbd_assert(obj_request->img_request);
Alex Elder02c74fb2013-05-06 17:40:33 -05002961 rbd_dev = obj_request->img_request->rbd_dev;
2962 if (!rbd_dev->parent_overlap) {
Ilya Dryomov980917f2016-09-12 18:59:42 +02002963 rbd_obj_request_submit(obj_request);
2964 return;
Alex Elder02c74fb2013-05-06 17:40:33 -05002965 }
2966
2967 obj_request->result = img_result;
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05002968 if (obj_request->result)
2969 goto out;
2970
2971 /*
2972 * We need to zero anything beyond the parent overlap
2973 * boundary. Since rbd_img_obj_request_read_callback()
2974 * will zero anything beyond the end of a short read, an
2975 * easy way to do this is to pretend the data from the
2976 * parent came up short--ending at the overlap boundary.
2977 */
2978 rbd_assert(obj_request->img_offset < U64_MAX - obj_request->length);
2979 obj_end = obj_request->img_offset + obj_request->length;
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05002980 if (obj_end > rbd_dev->parent_overlap) {
2981 u64 xferred = 0;
2982
2983 if (obj_request->img_offset < rbd_dev->parent_overlap)
2984 xferred = rbd_dev->parent_overlap -
2985 obj_request->img_offset;
2986
Alex Elder02c74fb2013-05-06 17:40:33 -05002987 obj_request->xferred = min(img_xferred, xferred);
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05002988 } else {
Alex Elder02c74fb2013-05-06 17:40:33 -05002989 obj_request->xferred = img_xferred;
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05002990 }
2991out:
Alex Elder8b3e1a52013-01-24 16:13:36 -06002992 rbd_img_obj_request_read_callback(obj_request);
2993 rbd_obj_request_complete(obj_request);
2994}
2995
2996static void rbd_img_parent_read(struct rbd_obj_request *obj_request)
2997{
Alex Elder8b3e1a52013-01-24 16:13:36 -06002998 struct rbd_img_request *img_request;
2999 int result;
3000
3001 rbd_assert(obj_request_img_data_test(obj_request));
3002 rbd_assert(obj_request->img_request != NULL);
3003 rbd_assert(obj_request->result == (s32) -ENOENT);
Alex Elder5b2ab722013-05-06 17:40:33 -05003004 rbd_assert(obj_request_type_valid(obj_request->type));
Alex Elder8b3e1a52013-01-24 16:13:36 -06003005
Alex Elder8b3e1a52013-01-24 16:13:36 -06003006 /* rbd_read_finish(obj_request, obj_request->length); */
Alex Eldere93f3152013-05-08 22:50:04 -05003007 img_request = rbd_parent_request_create(obj_request,
Alex Elder8b3e1a52013-01-24 16:13:36 -06003008 obj_request->img_offset,
Alex Eldere93f3152013-05-08 22:50:04 -05003009 obj_request->length);
Alex Elder8b3e1a52013-01-24 16:13:36 -06003010 result = -ENOMEM;
3011 if (!img_request)
3012 goto out_err;
3013
Alex Elder5b2ab722013-05-06 17:40:33 -05003014 if (obj_request->type == OBJ_REQUEST_BIO)
3015 result = rbd_img_request_fill(img_request, OBJ_REQUEST_BIO,
3016 obj_request->bio_list);
3017 else
3018 result = rbd_img_request_fill(img_request, OBJ_REQUEST_PAGES,
3019 obj_request->pages);
Alex Elder8b3e1a52013-01-24 16:13:36 -06003020 if (result)
3021 goto out_err;
3022
3023 img_request->callback = rbd_img_parent_read_callback;
3024 result = rbd_img_request_submit(img_request);
3025 if (result)
3026 goto out_err;
3027
3028 return;
3029out_err:
3030 if (img_request)
3031 rbd_img_request_put(img_request);
3032 obj_request->result = result;
3033 obj_request->xferred = 0;
3034 obj_request_done_set(obj_request);
3035}
3036
Ilya Dryomoved95b212016-08-12 16:40:02 +02003037static const struct rbd_client_id rbd_empty_cid;
3038
3039static bool rbd_cid_equal(const struct rbd_client_id *lhs,
3040 const struct rbd_client_id *rhs)
3041{
3042 return lhs->gid == rhs->gid && lhs->handle == rhs->handle;
3043}
3044
3045static struct rbd_client_id rbd_get_cid(struct rbd_device *rbd_dev)
3046{
3047 struct rbd_client_id cid;
3048
3049 mutex_lock(&rbd_dev->watch_mutex);
3050 cid.gid = ceph_client_gid(rbd_dev->rbd_client->client);
3051 cid.handle = rbd_dev->watch_cookie;
3052 mutex_unlock(&rbd_dev->watch_mutex);
3053 return cid;
3054}
3055
3056/*
3057 * lock_rwsem must be held for write
3058 */
3059static void rbd_set_owner_cid(struct rbd_device *rbd_dev,
3060 const struct rbd_client_id *cid)
3061{
3062 dout("%s rbd_dev %p %llu-%llu -> %llu-%llu\n", __func__, rbd_dev,
3063 rbd_dev->owner_cid.gid, rbd_dev->owner_cid.handle,
3064 cid->gid, cid->handle);
3065 rbd_dev->owner_cid = *cid; /* struct */
3066}
3067
3068static void format_lock_cookie(struct rbd_device *rbd_dev, char *buf)
3069{
3070 mutex_lock(&rbd_dev->watch_mutex);
3071 sprintf(buf, "%s %llu", RBD_LOCK_COOKIE_PREFIX, rbd_dev->watch_cookie);
3072 mutex_unlock(&rbd_dev->watch_mutex);
3073}
3074
3075/*
3076 * lock_rwsem must be held for write
3077 */
3078static int rbd_lock(struct rbd_device *rbd_dev)
3079{
3080 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3081 struct rbd_client_id cid = rbd_get_cid(rbd_dev);
3082 char cookie[32];
3083 int ret;
3084
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02003085 WARN_ON(__rbd_is_lock_owner(rbd_dev) ||
3086 rbd_dev->lock_cookie[0] != '\0');
Ilya Dryomoved95b212016-08-12 16:40:02 +02003087
3088 format_lock_cookie(rbd_dev, cookie);
3089 ret = ceph_cls_lock(osdc, &rbd_dev->header_oid, &rbd_dev->header_oloc,
3090 RBD_LOCK_NAME, CEPH_CLS_LOCK_EXCLUSIVE, cookie,
3091 RBD_LOCK_TAG, "", 0);
3092 if (ret)
3093 return ret;
3094
3095 rbd_dev->lock_state = RBD_LOCK_STATE_LOCKED;
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02003096 strcpy(rbd_dev->lock_cookie, cookie);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003097 rbd_set_owner_cid(rbd_dev, &cid);
3098 queue_work(rbd_dev->task_wq, &rbd_dev->acquired_lock_work);
3099 return 0;
3100}
3101
3102/*
3103 * lock_rwsem must be held for write
3104 */
Ilya Dryomovbbead742017-04-13 12:17:38 +02003105static void rbd_unlock(struct rbd_device *rbd_dev)
Ilya Dryomoved95b212016-08-12 16:40:02 +02003106{
3107 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003108 int ret;
3109
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02003110 WARN_ON(!__rbd_is_lock_owner(rbd_dev) ||
3111 rbd_dev->lock_cookie[0] == '\0');
Ilya Dryomoved95b212016-08-12 16:40:02 +02003112
Ilya Dryomoved95b212016-08-12 16:40:02 +02003113 ret = ceph_cls_unlock(osdc, &rbd_dev->header_oid, &rbd_dev->header_oloc,
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02003114 RBD_LOCK_NAME, rbd_dev->lock_cookie);
Ilya Dryomovbbead742017-04-13 12:17:38 +02003115 if (ret && ret != -ENOENT)
3116 rbd_warn(rbd_dev, "failed to unlock: %d", ret);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003117
Ilya Dryomovbbead742017-04-13 12:17:38 +02003118 /* treat errors as the image is unlocked */
3119 rbd_dev->lock_state = RBD_LOCK_STATE_UNLOCKED;
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02003120 rbd_dev->lock_cookie[0] = '\0';
Ilya Dryomoved95b212016-08-12 16:40:02 +02003121 rbd_set_owner_cid(rbd_dev, &rbd_empty_cid);
3122 queue_work(rbd_dev->task_wq, &rbd_dev->released_lock_work);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003123}
3124
3125static int __rbd_notify_op_lock(struct rbd_device *rbd_dev,
3126 enum rbd_notify_op notify_op,
3127 struct page ***preply_pages,
3128 size_t *preply_len)
3129{
3130 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3131 struct rbd_client_id cid = rbd_get_cid(rbd_dev);
3132 int buf_size = 4 + 8 + 8 + CEPH_ENCODING_START_BLK_LEN;
3133 char buf[buf_size];
3134 void *p = buf;
3135
3136 dout("%s rbd_dev %p notify_op %d\n", __func__, rbd_dev, notify_op);
3137
3138 /* encode *LockPayload NotifyMessage (op + ClientId) */
3139 ceph_start_encoding(&p, 2, 1, buf_size - CEPH_ENCODING_START_BLK_LEN);
3140 ceph_encode_32(&p, notify_op);
3141 ceph_encode_64(&p, cid.gid);
3142 ceph_encode_64(&p, cid.handle);
3143
3144 return ceph_osdc_notify(osdc, &rbd_dev->header_oid,
3145 &rbd_dev->header_oloc, buf, buf_size,
3146 RBD_NOTIFY_TIMEOUT, preply_pages, preply_len);
3147}
3148
3149static void rbd_notify_op_lock(struct rbd_device *rbd_dev,
3150 enum rbd_notify_op notify_op)
3151{
3152 struct page **reply_pages;
3153 size_t reply_len;
3154
3155 __rbd_notify_op_lock(rbd_dev, notify_op, &reply_pages, &reply_len);
3156 ceph_release_page_vector(reply_pages, calc_pages_for(0, reply_len));
3157}
3158
3159static void rbd_notify_acquired_lock(struct work_struct *work)
3160{
3161 struct rbd_device *rbd_dev = container_of(work, struct rbd_device,
3162 acquired_lock_work);
3163
3164 rbd_notify_op_lock(rbd_dev, RBD_NOTIFY_OP_ACQUIRED_LOCK);
3165}
3166
3167static void rbd_notify_released_lock(struct work_struct *work)
3168{
3169 struct rbd_device *rbd_dev = container_of(work, struct rbd_device,
3170 released_lock_work);
3171
3172 rbd_notify_op_lock(rbd_dev, RBD_NOTIFY_OP_RELEASED_LOCK);
3173}
3174
3175static int rbd_request_lock(struct rbd_device *rbd_dev)
3176{
3177 struct page **reply_pages;
3178 size_t reply_len;
3179 bool lock_owner_responded = false;
3180 int ret;
3181
3182 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3183
3184 ret = __rbd_notify_op_lock(rbd_dev, RBD_NOTIFY_OP_REQUEST_LOCK,
3185 &reply_pages, &reply_len);
3186 if (ret && ret != -ETIMEDOUT) {
3187 rbd_warn(rbd_dev, "failed to request lock: %d", ret);
3188 goto out;
3189 }
3190
3191 if (reply_len > 0 && reply_len <= PAGE_SIZE) {
3192 void *p = page_address(reply_pages[0]);
3193 void *const end = p + reply_len;
3194 u32 n;
3195
3196 ceph_decode_32_safe(&p, end, n, e_inval); /* num_acks */
3197 while (n--) {
3198 u8 struct_v;
3199 u32 len;
3200
3201 ceph_decode_need(&p, end, 8 + 8, e_inval);
3202 p += 8 + 8; /* skip gid and cookie */
3203
3204 ceph_decode_32_safe(&p, end, len, e_inval);
3205 if (!len)
3206 continue;
3207
3208 if (lock_owner_responded) {
3209 rbd_warn(rbd_dev,
3210 "duplicate lock owners detected");
3211 ret = -EIO;
3212 goto out;
3213 }
3214
3215 lock_owner_responded = true;
3216 ret = ceph_start_decoding(&p, end, 1, "ResponseMessage",
3217 &struct_v, &len);
3218 if (ret) {
3219 rbd_warn(rbd_dev,
3220 "failed to decode ResponseMessage: %d",
3221 ret);
3222 goto e_inval;
3223 }
3224
3225 ret = ceph_decode_32(&p);
3226 }
3227 }
3228
3229 if (!lock_owner_responded) {
3230 rbd_warn(rbd_dev, "no lock owners detected");
3231 ret = -ETIMEDOUT;
3232 }
3233
3234out:
3235 ceph_release_page_vector(reply_pages, calc_pages_for(0, reply_len));
3236 return ret;
3237
3238e_inval:
3239 ret = -EINVAL;
3240 goto out;
3241}
3242
3243static void wake_requests(struct rbd_device *rbd_dev, bool wake_all)
3244{
3245 dout("%s rbd_dev %p wake_all %d\n", __func__, rbd_dev, wake_all);
3246
3247 cancel_delayed_work(&rbd_dev->lock_dwork);
3248 if (wake_all)
3249 wake_up_all(&rbd_dev->lock_waitq);
3250 else
3251 wake_up(&rbd_dev->lock_waitq);
3252}
3253
3254static int get_lock_owner_info(struct rbd_device *rbd_dev,
3255 struct ceph_locker **lockers, u32 *num_lockers)
3256{
3257 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3258 u8 lock_type;
3259 char *lock_tag;
3260 int ret;
3261
3262 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3263
3264 ret = ceph_cls_lock_info(osdc, &rbd_dev->header_oid,
3265 &rbd_dev->header_oloc, RBD_LOCK_NAME,
3266 &lock_type, &lock_tag, lockers, num_lockers);
3267 if (ret)
3268 return ret;
3269
3270 if (*num_lockers == 0) {
3271 dout("%s rbd_dev %p no lockers detected\n", __func__, rbd_dev);
3272 goto out;
3273 }
3274
3275 if (strcmp(lock_tag, RBD_LOCK_TAG)) {
3276 rbd_warn(rbd_dev, "locked by external mechanism, tag %s",
3277 lock_tag);
3278 ret = -EBUSY;
3279 goto out;
3280 }
3281
3282 if (lock_type == CEPH_CLS_LOCK_SHARED) {
3283 rbd_warn(rbd_dev, "shared lock type detected");
3284 ret = -EBUSY;
3285 goto out;
3286 }
3287
3288 if (strncmp((*lockers)[0].id.cookie, RBD_LOCK_COOKIE_PREFIX,
3289 strlen(RBD_LOCK_COOKIE_PREFIX))) {
3290 rbd_warn(rbd_dev, "locked by external mechanism, cookie %s",
3291 (*lockers)[0].id.cookie);
3292 ret = -EBUSY;
3293 goto out;
3294 }
3295
3296out:
3297 kfree(lock_tag);
3298 return ret;
3299}
3300
3301static int find_watcher(struct rbd_device *rbd_dev,
3302 const struct ceph_locker *locker)
3303{
3304 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3305 struct ceph_watch_item *watchers;
3306 u32 num_watchers;
3307 u64 cookie;
3308 int i;
3309 int ret;
3310
3311 ret = ceph_osdc_list_watchers(osdc, &rbd_dev->header_oid,
3312 &rbd_dev->header_oloc, &watchers,
3313 &num_watchers);
3314 if (ret)
3315 return ret;
3316
3317 sscanf(locker->id.cookie, RBD_LOCK_COOKIE_PREFIX " %llu", &cookie);
3318 for (i = 0; i < num_watchers; i++) {
3319 if (!memcmp(&watchers[i].addr, &locker->info.addr,
3320 sizeof(locker->info.addr)) &&
3321 watchers[i].cookie == cookie) {
3322 struct rbd_client_id cid = {
3323 .gid = le64_to_cpu(watchers[i].name.num),
3324 .handle = cookie,
3325 };
3326
3327 dout("%s rbd_dev %p found cid %llu-%llu\n", __func__,
3328 rbd_dev, cid.gid, cid.handle);
3329 rbd_set_owner_cid(rbd_dev, &cid);
3330 ret = 1;
3331 goto out;
3332 }
3333 }
3334
3335 dout("%s rbd_dev %p no watchers\n", __func__, rbd_dev);
3336 ret = 0;
3337out:
3338 kfree(watchers);
3339 return ret;
3340}
3341
3342/*
3343 * lock_rwsem must be held for write
3344 */
3345static int rbd_try_lock(struct rbd_device *rbd_dev)
3346{
3347 struct ceph_client *client = rbd_dev->rbd_client->client;
3348 struct ceph_locker *lockers;
3349 u32 num_lockers;
3350 int ret;
3351
3352 for (;;) {
3353 ret = rbd_lock(rbd_dev);
3354 if (ret != -EBUSY)
3355 return ret;
3356
3357 /* determine if the current lock holder is still alive */
3358 ret = get_lock_owner_info(rbd_dev, &lockers, &num_lockers);
3359 if (ret)
3360 return ret;
3361
3362 if (num_lockers == 0)
3363 goto again;
3364
3365 ret = find_watcher(rbd_dev, lockers);
3366 if (ret) {
3367 if (ret > 0)
3368 ret = 0; /* have to request lock */
3369 goto out;
3370 }
3371
3372 rbd_warn(rbd_dev, "%s%llu seems dead, breaking lock",
3373 ENTITY_NAME(lockers[0].id.name));
3374
3375 ret = ceph_monc_blacklist_add(&client->monc,
3376 &lockers[0].info.addr);
3377 if (ret) {
3378 rbd_warn(rbd_dev, "blacklist of %s%llu failed: %d",
3379 ENTITY_NAME(lockers[0].id.name), ret);
3380 goto out;
3381 }
3382
3383 ret = ceph_cls_break_lock(&client->osdc, &rbd_dev->header_oid,
3384 &rbd_dev->header_oloc, RBD_LOCK_NAME,
3385 lockers[0].id.cookie,
3386 &lockers[0].id.name);
3387 if (ret && ret != -ENOENT)
3388 goto out;
3389
3390again:
3391 ceph_free_lockers(lockers, num_lockers);
3392 }
3393
3394out:
3395 ceph_free_lockers(lockers, num_lockers);
3396 return ret;
3397}
3398
3399/*
3400 * ret is set only if lock_state is RBD_LOCK_STATE_UNLOCKED
3401 */
3402static enum rbd_lock_state rbd_try_acquire_lock(struct rbd_device *rbd_dev,
3403 int *pret)
3404{
3405 enum rbd_lock_state lock_state;
3406
3407 down_read(&rbd_dev->lock_rwsem);
3408 dout("%s rbd_dev %p read lock_state %d\n", __func__, rbd_dev,
3409 rbd_dev->lock_state);
3410 if (__rbd_is_lock_owner(rbd_dev)) {
3411 lock_state = rbd_dev->lock_state;
3412 up_read(&rbd_dev->lock_rwsem);
3413 return lock_state;
3414 }
3415
3416 up_read(&rbd_dev->lock_rwsem);
3417 down_write(&rbd_dev->lock_rwsem);
3418 dout("%s rbd_dev %p write lock_state %d\n", __func__, rbd_dev,
3419 rbd_dev->lock_state);
3420 if (!__rbd_is_lock_owner(rbd_dev)) {
3421 *pret = rbd_try_lock(rbd_dev);
3422 if (*pret)
3423 rbd_warn(rbd_dev, "failed to acquire lock: %d", *pret);
3424 }
3425
3426 lock_state = rbd_dev->lock_state;
3427 up_write(&rbd_dev->lock_rwsem);
3428 return lock_state;
3429}
3430
3431static void rbd_acquire_lock(struct work_struct *work)
3432{
3433 struct rbd_device *rbd_dev = container_of(to_delayed_work(work),
3434 struct rbd_device, lock_dwork);
3435 enum rbd_lock_state lock_state;
3436 int ret;
3437
3438 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3439again:
3440 lock_state = rbd_try_acquire_lock(rbd_dev, &ret);
3441 if (lock_state != RBD_LOCK_STATE_UNLOCKED || ret == -EBLACKLISTED) {
3442 if (lock_state == RBD_LOCK_STATE_LOCKED)
3443 wake_requests(rbd_dev, true);
3444 dout("%s rbd_dev %p lock_state %d ret %d - done\n", __func__,
3445 rbd_dev, lock_state, ret);
3446 return;
3447 }
3448
3449 ret = rbd_request_lock(rbd_dev);
3450 if (ret == -ETIMEDOUT) {
3451 goto again; /* treat this as a dead client */
Ilya Dryomove010dd02017-04-13 12:17:39 +02003452 } else if (ret == -EROFS) {
3453 rbd_warn(rbd_dev, "peer will not release lock");
3454 /*
3455 * If this is rbd_add_acquire_lock(), we want to fail
3456 * immediately -- reuse BLACKLISTED flag. Otherwise we
3457 * want to block.
3458 */
3459 if (!(rbd_dev->disk->flags & GENHD_FL_UP)) {
3460 set_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags);
3461 /* wake "rbd map --exclusive" process */
3462 wake_requests(rbd_dev, false);
3463 }
Ilya Dryomoved95b212016-08-12 16:40:02 +02003464 } else if (ret < 0) {
3465 rbd_warn(rbd_dev, "error requesting lock: %d", ret);
3466 mod_delayed_work(rbd_dev->task_wq, &rbd_dev->lock_dwork,
3467 RBD_RETRY_DELAY);
3468 } else {
3469 /*
3470 * lock owner acked, but resend if we don't see them
3471 * release the lock
3472 */
3473 dout("%s rbd_dev %p requeueing lock_dwork\n", __func__,
3474 rbd_dev);
3475 mod_delayed_work(rbd_dev->task_wq, &rbd_dev->lock_dwork,
3476 msecs_to_jiffies(2 * RBD_NOTIFY_TIMEOUT * MSEC_PER_SEC));
3477 }
3478}
3479
3480/*
3481 * lock_rwsem must be held for write
3482 */
3483static bool rbd_release_lock(struct rbd_device *rbd_dev)
3484{
3485 dout("%s rbd_dev %p read lock_state %d\n", __func__, rbd_dev,
3486 rbd_dev->lock_state);
3487 if (rbd_dev->lock_state != RBD_LOCK_STATE_LOCKED)
3488 return false;
3489
3490 rbd_dev->lock_state = RBD_LOCK_STATE_RELEASING;
3491 downgrade_write(&rbd_dev->lock_rwsem);
3492 /*
3493 * Ensure that all in-flight IO is flushed.
3494 *
3495 * FIXME: ceph_osdc_sync() flushes the entire OSD client, which
3496 * may be shared with other devices.
3497 */
3498 ceph_osdc_sync(&rbd_dev->rbd_client->client->osdc);
3499 up_read(&rbd_dev->lock_rwsem);
3500
3501 down_write(&rbd_dev->lock_rwsem);
3502 dout("%s rbd_dev %p write lock_state %d\n", __func__, rbd_dev,
3503 rbd_dev->lock_state);
3504 if (rbd_dev->lock_state != RBD_LOCK_STATE_RELEASING)
3505 return false;
3506
Ilya Dryomovbbead742017-04-13 12:17:38 +02003507 rbd_unlock(rbd_dev);
3508 /*
3509 * Give others a chance to grab the lock - we would re-acquire
3510 * almost immediately if we got new IO during ceph_osdc_sync()
3511 * otherwise. We need to ack our own notifications, so this
3512 * lock_dwork will be requeued from rbd_wait_state_locked()
3513 * after wake_requests() in rbd_handle_released_lock().
3514 */
3515 cancel_delayed_work(&rbd_dev->lock_dwork);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003516 return true;
3517}
3518
3519static void rbd_release_lock_work(struct work_struct *work)
3520{
3521 struct rbd_device *rbd_dev = container_of(work, struct rbd_device,
3522 unlock_work);
3523
3524 down_write(&rbd_dev->lock_rwsem);
3525 rbd_release_lock(rbd_dev);
3526 up_write(&rbd_dev->lock_rwsem);
3527}
3528
3529static void rbd_handle_acquired_lock(struct rbd_device *rbd_dev, u8 struct_v,
3530 void **p)
3531{
3532 struct rbd_client_id cid = { 0 };
3533
3534 if (struct_v >= 2) {
3535 cid.gid = ceph_decode_64(p);
3536 cid.handle = ceph_decode_64(p);
3537 }
3538
3539 dout("%s rbd_dev %p cid %llu-%llu\n", __func__, rbd_dev, cid.gid,
3540 cid.handle);
3541 if (!rbd_cid_equal(&cid, &rbd_empty_cid)) {
3542 down_write(&rbd_dev->lock_rwsem);
3543 if (rbd_cid_equal(&cid, &rbd_dev->owner_cid)) {
3544 /*
3545 * we already know that the remote client is
3546 * the owner
3547 */
3548 up_write(&rbd_dev->lock_rwsem);
3549 return;
3550 }
3551
3552 rbd_set_owner_cid(rbd_dev, &cid);
3553 downgrade_write(&rbd_dev->lock_rwsem);
3554 } else {
3555 down_read(&rbd_dev->lock_rwsem);
3556 }
3557
3558 if (!__rbd_is_lock_owner(rbd_dev))
3559 wake_requests(rbd_dev, false);
3560 up_read(&rbd_dev->lock_rwsem);
3561}
3562
3563static void rbd_handle_released_lock(struct rbd_device *rbd_dev, u8 struct_v,
3564 void **p)
3565{
3566 struct rbd_client_id cid = { 0 };
3567
3568 if (struct_v >= 2) {
3569 cid.gid = ceph_decode_64(p);
3570 cid.handle = ceph_decode_64(p);
3571 }
3572
3573 dout("%s rbd_dev %p cid %llu-%llu\n", __func__, rbd_dev, cid.gid,
3574 cid.handle);
3575 if (!rbd_cid_equal(&cid, &rbd_empty_cid)) {
3576 down_write(&rbd_dev->lock_rwsem);
3577 if (!rbd_cid_equal(&cid, &rbd_dev->owner_cid)) {
3578 dout("%s rbd_dev %p unexpected owner, cid %llu-%llu != owner_cid %llu-%llu\n",
3579 __func__, rbd_dev, cid.gid, cid.handle,
3580 rbd_dev->owner_cid.gid, rbd_dev->owner_cid.handle);
3581 up_write(&rbd_dev->lock_rwsem);
3582 return;
3583 }
3584
3585 rbd_set_owner_cid(rbd_dev, &rbd_empty_cid);
3586 downgrade_write(&rbd_dev->lock_rwsem);
3587 } else {
3588 down_read(&rbd_dev->lock_rwsem);
3589 }
3590
3591 if (!__rbd_is_lock_owner(rbd_dev))
3592 wake_requests(rbd_dev, false);
3593 up_read(&rbd_dev->lock_rwsem);
3594}
3595
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003596/*
3597 * Returns result for ResponseMessage to be encoded (<= 0), or 1 if no
3598 * ResponseMessage is needed.
3599 */
3600static int rbd_handle_request_lock(struct rbd_device *rbd_dev, u8 struct_v,
3601 void **p)
Ilya Dryomoved95b212016-08-12 16:40:02 +02003602{
3603 struct rbd_client_id my_cid = rbd_get_cid(rbd_dev);
3604 struct rbd_client_id cid = { 0 };
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003605 int result = 1;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003606
3607 if (struct_v >= 2) {
3608 cid.gid = ceph_decode_64(p);
3609 cid.handle = ceph_decode_64(p);
3610 }
3611
3612 dout("%s rbd_dev %p cid %llu-%llu\n", __func__, rbd_dev, cid.gid,
3613 cid.handle);
3614 if (rbd_cid_equal(&cid, &my_cid))
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003615 return result;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003616
3617 down_read(&rbd_dev->lock_rwsem);
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003618 if (__rbd_is_lock_owner(rbd_dev)) {
3619 if (rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED &&
3620 rbd_cid_equal(&rbd_dev->owner_cid, &rbd_empty_cid))
3621 goto out_unlock;
3622
3623 /*
3624 * encode ResponseMessage(0) so the peer can detect
3625 * a missing owner
3626 */
3627 result = 0;
3628
3629 if (rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED) {
Ilya Dryomove010dd02017-04-13 12:17:39 +02003630 if (!rbd_dev->opts->exclusive) {
3631 dout("%s rbd_dev %p queueing unlock_work\n",
3632 __func__, rbd_dev);
3633 queue_work(rbd_dev->task_wq,
3634 &rbd_dev->unlock_work);
3635 } else {
3636 /* refuse to release the lock */
3637 result = -EROFS;
3638 }
Ilya Dryomoved95b212016-08-12 16:40:02 +02003639 }
3640 }
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003641
3642out_unlock:
Ilya Dryomoved95b212016-08-12 16:40:02 +02003643 up_read(&rbd_dev->lock_rwsem);
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003644 return result;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003645}
3646
3647static void __rbd_acknowledge_notify(struct rbd_device *rbd_dev,
3648 u64 notify_id, u64 cookie, s32 *result)
3649{
3650 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3651 int buf_size = 4 + CEPH_ENCODING_START_BLK_LEN;
3652 char buf[buf_size];
3653 int ret;
3654
3655 if (result) {
3656 void *p = buf;
3657
3658 /* encode ResponseMessage */
3659 ceph_start_encoding(&p, 1, 1,
3660 buf_size - CEPH_ENCODING_START_BLK_LEN);
3661 ceph_encode_32(&p, *result);
3662 } else {
3663 buf_size = 0;
3664 }
3665
3666 ret = ceph_osdc_notify_ack(osdc, &rbd_dev->header_oid,
3667 &rbd_dev->header_oloc, notify_id, cookie,
3668 buf, buf_size);
3669 if (ret)
3670 rbd_warn(rbd_dev, "acknowledge_notify failed: %d", ret);
3671}
3672
3673static void rbd_acknowledge_notify(struct rbd_device *rbd_dev, u64 notify_id,
3674 u64 cookie)
3675{
3676 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3677 __rbd_acknowledge_notify(rbd_dev, notify_id, cookie, NULL);
3678}
3679
3680static void rbd_acknowledge_notify_result(struct rbd_device *rbd_dev,
3681 u64 notify_id, u64 cookie, s32 result)
3682{
3683 dout("%s rbd_dev %p result %d\n", __func__, rbd_dev, result);
3684 __rbd_acknowledge_notify(rbd_dev, notify_id, cookie, &result);
3685}
Ilya Dryomov922dab62016-05-26 01:15:02 +02003686
3687static void rbd_watch_cb(void *arg, u64 notify_id, u64 cookie,
3688 u64 notifier_id, void *data, size_t data_len)
Alex Elderb8d70032012-11-30 17:53:04 -06003689{
Ilya Dryomov922dab62016-05-26 01:15:02 +02003690 struct rbd_device *rbd_dev = arg;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003691 void *p = data;
3692 void *const end = p + data_len;
Ilya Dryomovd4c22692016-09-06 11:15:48 +02003693 u8 struct_v = 0;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003694 u32 len;
3695 u32 notify_op;
Alex Elderb8d70032012-11-30 17:53:04 -06003696 int ret;
3697
Ilya Dryomoved95b212016-08-12 16:40:02 +02003698 dout("%s rbd_dev %p cookie %llu notify_id %llu data_len %zu\n",
3699 __func__, rbd_dev, cookie, notify_id, data_len);
3700 if (data_len) {
3701 ret = ceph_start_decoding(&p, end, 1, "NotifyMessage",
3702 &struct_v, &len);
3703 if (ret) {
3704 rbd_warn(rbd_dev, "failed to decode NotifyMessage: %d",
3705 ret);
3706 return;
3707 }
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04003708
Ilya Dryomoved95b212016-08-12 16:40:02 +02003709 notify_op = ceph_decode_32(&p);
3710 } else {
3711 /* legacy notification for header updates */
3712 notify_op = RBD_NOTIFY_OP_HEADER_UPDATE;
3713 len = 0;
3714 }
Alex Elderb8d70032012-11-30 17:53:04 -06003715
Ilya Dryomoved95b212016-08-12 16:40:02 +02003716 dout("%s rbd_dev %p notify_op %u\n", __func__, rbd_dev, notify_op);
3717 switch (notify_op) {
3718 case RBD_NOTIFY_OP_ACQUIRED_LOCK:
3719 rbd_handle_acquired_lock(rbd_dev, struct_v, &p);
3720 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3721 break;
3722 case RBD_NOTIFY_OP_RELEASED_LOCK:
3723 rbd_handle_released_lock(rbd_dev, struct_v, &p);
3724 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3725 break;
3726 case RBD_NOTIFY_OP_REQUEST_LOCK:
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003727 ret = rbd_handle_request_lock(rbd_dev, struct_v, &p);
3728 if (ret <= 0)
Ilya Dryomoved95b212016-08-12 16:40:02 +02003729 rbd_acknowledge_notify_result(rbd_dev, notify_id,
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003730 cookie, ret);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003731 else
3732 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3733 break;
3734 case RBD_NOTIFY_OP_HEADER_UPDATE:
3735 ret = rbd_dev_refresh(rbd_dev);
3736 if (ret)
3737 rbd_warn(rbd_dev, "refresh failed: %d", ret);
3738
3739 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3740 break;
3741 default:
3742 if (rbd_is_lock_owner(rbd_dev))
3743 rbd_acknowledge_notify_result(rbd_dev, notify_id,
3744 cookie, -EOPNOTSUPP);
3745 else
3746 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3747 break;
3748 }
Alex Elderb8d70032012-11-30 17:53:04 -06003749}
3750
Ilya Dryomov99d16942016-08-12 16:11:41 +02003751static void __rbd_unregister_watch(struct rbd_device *rbd_dev);
3752
Ilya Dryomov922dab62016-05-26 01:15:02 +02003753static void rbd_watch_errcb(void *arg, u64 cookie, int err)
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003754{
Ilya Dryomov922dab62016-05-26 01:15:02 +02003755 struct rbd_device *rbd_dev = arg;
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003756
Ilya Dryomov922dab62016-05-26 01:15:02 +02003757 rbd_warn(rbd_dev, "encountered watch error: %d", err);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003758
Ilya Dryomoved95b212016-08-12 16:40:02 +02003759 down_write(&rbd_dev->lock_rwsem);
3760 rbd_set_owner_cid(rbd_dev, &rbd_empty_cid);
3761 up_write(&rbd_dev->lock_rwsem);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003762
Ilya Dryomov99d16942016-08-12 16:11:41 +02003763 mutex_lock(&rbd_dev->watch_mutex);
3764 if (rbd_dev->watch_state == RBD_WATCH_STATE_REGISTERED) {
3765 __rbd_unregister_watch(rbd_dev);
3766 rbd_dev->watch_state = RBD_WATCH_STATE_ERROR;
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003767
Ilya Dryomov99d16942016-08-12 16:11:41 +02003768 queue_delayed_work(rbd_dev->task_wq, &rbd_dev->watch_dwork, 0);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003769 }
Ilya Dryomov99d16942016-08-12 16:11:41 +02003770 mutex_unlock(&rbd_dev->watch_mutex);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003771}
3772
3773/*
Ilya Dryomov99d16942016-08-12 16:11:41 +02003774 * watch_mutex must be locked
Alex Elder9969ebc2013-01-18 12:31:10 -06003775 */
Ilya Dryomov99d16942016-08-12 16:11:41 +02003776static int __rbd_register_watch(struct rbd_device *rbd_dev)
Alex Elder9969ebc2013-01-18 12:31:10 -06003777{
3778 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
Ilya Dryomov922dab62016-05-26 01:15:02 +02003779 struct ceph_osd_linger_request *handle;
Alex Elder9969ebc2013-01-18 12:31:10 -06003780
Ilya Dryomov922dab62016-05-26 01:15:02 +02003781 rbd_assert(!rbd_dev->watch_handle);
Ilya Dryomov99d16942016-08-12 16:11:41 +02003782 dout("%s rbd_dev %p\n", __func__, rbd_dev);
Alex Elder9969ebc2013-01-18 12:31:10 -06003783
Ilya Dryomov922dab62016-05-26 01:15:02 +02003784 handle = ceph_osdc_watch(osdc, &rbd_dev->header_oid,
3785 &rbd_dev->header_oloc, rbd_watch_cb,
3786 rbd_watch_errcb, rbd_dev);
3787 if (IS_ERR(handle))
3788 return PTR_ERR(handle);
Alex Elder9969ebc2013-01-18 12:31:10 -06003789
Ilya Dryomov922dab62016-05-26 01:15:02 +02003790 rbd_dev->watch_handle = handle;
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003791 return 0;
Alex Elder9969ebc2013-01-18 12:31:10 -06003792}
3793
Ilya Dryomov99d16942016-08-12 16:11:41 +02003794/*
3795 * watch_mutex must be locked
3796 */
3797static void __rbd_unregister_watch(struct rbd_device *rbd_dev)
Ilya Dryomovfca27062013-12-16 18:02:40 +02003798{
Ilya Dryomov922dab62016-05-26 01:15:02 +02003799 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3800 int ret;
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003801
Ilya Dryomov99d16942016-08-12 16:11:41 +02003802 rbd_assert(rbd_dev->watch_handle);
3803 dout("%s rbd_dev %p\n", __func__, rbd_dev);
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003804
Ilya Dryomov922dab62016-05-26 01:15:02 +02003805 ret = ceph_osdc_unwatch(osdc, rbd_dev->watch_handle);
3806 if (ret)
3807 rbd_warn(rbd_dev, "failed to unwatch: %d", ret);
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003808
Ilya Dryomov922dab62016-05-26 01:15:02 +02003809 rbd_dev->watch_handle = NULL;
Ilya Dryomovc525f032016-04-28 16:07:26 +02003810}
3811
Ilya Dryomov99d16942016-08-12 16:11:41 +02003812static int rbd_register_watch(struct rbd_device *rbd_dev)
Ilya Dryomovc525f032016-04-28 16:07:26 +02003813{
Ilya Dryomov99d16942016-08-12 16:11:41 +02003814 int ret;
Ilya Dryomov811c6682016-04-15 16:22:16 +02003815
Ilya Dryomov99d16942016-08-12 16:11:41 +02003816 mutex_lock(&rbd_dev->watch_mutex);
3817 rbd_assert(rbd_dev->watch_state == RBD_WATCH_STATE_UNREGISTERED);
3818 ret = __rbd_register_watch(rbd_dev);
3819 if (ret)
3820 goto out;
3821
3822 rbd_dev->watch_state = RBD_WATCH_STATE_REGISTERED;
3823 rbd_dev->watch_cookie = rbd_dev->watch_handle->linger_id;
3824
3825out:
3826 mutex_unlock(&rbd_dev->watch_mutex);
3827 return ret;
3828}
3829
3830static void cancel_tasks_sync(struct rbd_device *rbd_dev)
3831{
3832 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3833
3834 cancel_delayed_work_sync(&rbd_dev->watch_dwork);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003835 cancel_work_sync(&rbd_dev->acquired_lock_work);
3836 cancel_work_sync(&rbd_dev->released_lock_work);
3837 cancel_delayed_work_sync(&rbd_dev->lock_dwork);
3838 cancel_work_sync(&rbd_dev->unlock_work);
Ilya Dryomov99d16942016-08-12 16:11:41 +02003839}
3840
3841static void rbd_unregister_watch(struct rbd_device *rbd_dev)
3842{
Ilya Dryomoved95b212016-08-12 16:40:02 +02003843 WARN_ON(waitqueue_active(&rbd_dev->lock_waitq));
Ilya Dryomov99d16942016-08-12 16:11:41 +02003844 cancel_tasks_sync(rbd_dev);
3845
3846 mutex_lock(&rbd_dev->watch_mutex);
3847 if (rbd_dev->watch_state == RBD_WATCH_STATE_REGISTERED)
3848 __rbd_unregister_watch(rbd_dev);
3849 rbd_dev->watch_state = RBD_WATCH_STATE_UNREGISTERED;
3850 mutex_unlock(&rbd_dev->watch_mutex);
3851
Ilya Dryomov811c6682016-04-15 16:22:16 +02003852 ceph_osdc_flush_notifies(&rbd_dev->rbd_client->client->osdc);
Ilya Dryomovfca27062013-12-16 18:02:40 +02003853}
3854
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003855/*
3856 * lock_rwsem must be held for write
3857 */
3858static void rbd_reacquire_lock(struct rbd_device *rbd_dev)
3859{
3860 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3861 char cookie[32];
3862 int ret;
3863
3864 WARN_ON(rbd_dev->lock_state != RBD_LOCK_STATE_LOCKED);
3865
3866 format_lock_cookie(rbd_dev, cookie);
3867 ret = ceph_cls_set_cookie(osdc, &rbd_dev->header_oid,
3868 &rbd_dev->header_oloc, RBD_LOCK_NAME,
3869 CEPH_CLS_LOCK_EXCLUSIVE, rbd_dev->lock_cookie,
3870 RBD_LOCK_TAG, cookie);
3871 if (ret) {
3872 if (ret != -EOPNOTSUPP)
3873 rbd_warn(rbd_dev, "failed to update lock cookie: %d",
3874 ret);
3875
3876 /*
3877 * Lock cookie cannot be updated on older OSDs, so do
3878 * a manual release and queue an acquire.
3879 */
3880 if (rbd_release_lock(rbd_dev))
3881 queue_delayed_work(rbd_dev->task_wq,
3882 &rbd_dev->lock_dwork, 0);
3883 } else {
3884 strcpy(rbd_dev->lock_cookie, cookie);
3885 }
3886}
3887
Ilya Dryomov99d16942016-08-12 16:11:41 +02003888static void rbd_reregister_watch(struct work_struct *work)
3889{
3890 struct rbd_device *rbd_dev = container_of(to_delayed_work(work),
3891 struct rbd_device, watch_dwork);
3892 int ret;
3893
3894 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3895
3896 mutex_lock(&rbd_dev->watch_mutex);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003897 if (rbd_dev->watch_state != RBD_WATCH_STATE_ERROR) {
3898 mutex_unlock(&rbd_dev->watch_mutex);
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003899 return;
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003900 }
Ilya Dryomov99d16942016-08-12 16:11:41 +02003901
3902 ret = __rbd_register_watch(rbd_dev);
3903 if (ret) {
3904 rbd_warn(rbd_dev, "failed to reregister watch: %d", ret);
Ilya Dryomov4d736442016-09-29 14:23:12 +02003905 if (ret == -EBLACKLISTED || ret == -ENOENT) {
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003906 set_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags);
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003907 wake_requests(rbd_dev, true);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003908 } else {
Ilya Dryomov99d16942016-08-12 16:11:41 +02003909 queue_delayed_work(rbd_dev->task_wq,
3910 &rbd_dev->watch_dwork,
3911 RBD_RETRY_DELAY);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003912 }
3913 mutex_unlock(&rbd_dev->watch_mutex);
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003914 return;
Ilya Dryomov99d16942016-08-12 16:11:41 +02003915 }
3916
3917 rbd_dev->watch_state = RBD_WATCH_STATE_REGISTERED;
3918 rbd_dev->watch_cookie = rbd_dev->watch_handle->linger_id;
3919 mutex_unlock(&rbd_dev->watch_mutex);
3920
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003921 down_write(&rbd_dev->lock_rwsem);
3922 if (rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED)
3923 rbd_reacquire_lock(rbd_dev);
3924 up_write(&rbd_dev->lock_rwsem);
3925
Ilya Dryomov99d16942016-08-12 16:11:41 +02003926 ret = rbd_dev_refresh(rbd_dev);
3927 if (ret)
3928 rbd_warn(rbd_dev, "reregisteration refresh failed: %d", ret);
Ilya Dryomov99d16942016-08-12 16:11:41 +02003929}
3930
Alex Elder36be9a72013-01-19 00:30:28 -06003931/*
Alex Elderf40eb342013-04-25 15:09:42 -05003932 * Synchronous osd object method call. Returns the number of bytes
3933 * returned in the outbound buffer, or a negative error code.
Alex Elder36be9a72013-01-19 00:30:28 -06003934 */
3935static int rbd_obj_method_sync(struct rbd_device *rbd_dev,
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003936 struct ceph_object_id *oid,
3937 struct ceph_object_locator *oloc,
Alex Elder36be9a72013-01-19 00:30:28 -06003938 const char *method_name,
Alex Elder41579762013-04-21 12:14:45 -05003939 const void *outbound,
Alex Elder36be9a72013-01-19 00:30:28 -06003940 size_t outbound_size,
Alex Elder41579762013-04-21 12:14:45 -05003941 void *inbound,
Alex Eldere2a58ee2013-04-30 00:44:33 -05003942 size_t inbound_size)
Alex Elder36be9a72013-01-19 00:30:28 -06003943{
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003944 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3945 struct page *req_page = NULL;
3946 struct page *reply_page;
Alex Elder36be9a72013-01-19 00:30:28 -06003947 int ret;
3948
3949 /*
Alex Elder6010a452013-04-05 01:27:11 -05003950 * Method calls are ultimately read operations. The result
3951 * should placed into the inbound buffer provided. They
3952 * also supply outbound data--parameters for the object
3953 * method. Currently if this is present it will be a
3954 * snapshot id.
Alex Elder36be9a72013-01-19 00:30:28 -06003955 */
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003956 if (outbound) {
3957 if (outbound_size > PAGE_SIZE)
3958 return -E2BIG;
Alex Elder36be9a72013-01-19 00:30:28 -06003959
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003960 req_page = alloc_page(GFP_KERNEL);
3961 if (!req_page)
3962 return -ENOMEM;
Alex Elder36be9a72013-01-19 00:30:28 -06003963
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003964 memcpy(page_address(req_page), outbound, outbound_size);
Alex Elder04017e22013-04-05 14:46:02 -05003965 }
Alex Elder430c28c2013-04-03 21:32:51 -05003966
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003967 reply_page = alloc_page(GFP_KERNEL);
3968 if (!reply_page) {
3969 if (req_page)
3970 __free_page(req_page);
3971 return -ENOMEM;
3972 }
Alex Elder36be9a72013-01-19 00:30:28 -06003973
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003974 ret = ceph_osdc_call(osdc, oid, oloc, RBD_DRV_NAME, method_name,
3975 CEPH_OSD_FLAG_READ, req_page, outbound_size,
3976 reply_page, &inbound_size);
3977 if (!ret) {
3978 memcpy(inbound, page_address(reply_page), inbound_size);
3979 ret = inbound_size;
3980 }
Alex Elder57385b52013-04-21 12:14:45 -05003981
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003982 if (req_page)
3983 __free_page(req_page);
3984 __free_page(reply_page);
Alex Elder36be9a72013-01-19 00:30:28 -06003985 return ret;
3986}
3987
Ilya Dryomoved95b212016-08-12 16:40:02 +02003988/*
3989 * lock_rwsem must be held for read
3990 */
3991static void rbd_wait_state_locked(struct rbd_device *rbd_dev)
3992{
3993 DEFINE_WAIT(wait);
3994
3995 do {
3996 /*
3997 * Note the use of mod_delayed_work() in rbd_acquire_lock()
3998 * and cancel_delayed_work() in wake_requests().
3999 */
4000 dout("%s rbd_dev %p queueing lock_dwork\n", __func__, rbd_dev);
4001 queue_delayed_work(rbd_dev->task_wq, &rbd_dev->lock_dwork, 0);
4002 prepare_to_wait_exclusive(&rbd_dev->lock_waitq, &wait,
4003 TASK_UNINTERRUPTIBLE);
4004 up_read(&rbd_dev->lock_rwsem);
4005 schedule();
4006 down_read(&rbd_dev->lock_rwsem);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02004007 } while (rbd_dev->lock_state != RBD_LOCK_STATE_LOCKED &&
4008 !test_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags));
4009
Ilya Dryomoved95b212016-08-12 16:40:02 +02004010 finish_wait(&rbd_dev->lock_waitq, &wait);
4011}
4012
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004013static void rbd_queue_workfn(struct work_struct *work)
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004014{
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004015 struct request *rq = blk_mq_rq_from_pdu(work);
4016 struct rbd_device *rbd_dev = rq->q->queuedata;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004017 struct rbd_img_request *img_request;
Josh Durgin4e752f02014-04-08 11:12:11 -07004018 struct ceph_snap_context *snapc = NULL;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004019 u64 offset = (u64)blk_rq_pos(rq) << SECTOR_SHIFT;
4020 u64 length = blk_rq_bytes(rq);
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08004021 enum obj_operation_type op_type;
Josh Durgin4e752f02014-04-08 11:12:11 -07004022 u64 mapping_size;
Ilya Dryomov80de1912016-09-20 14:23:17 +02004023 bool must_be_locked;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004024 int result;
4025
Christoph Hellwigaebf5262017-01-31 16:57:31 +01004026 switch (req_op(rq)) {
4027 case REQ_OP_DISCARD:
4028 op_type = OBJ_OP_DISCARD;
4029 break;
4030 case REQ_OP_WRITE:
4031 op_type = OBJ_OP_WRITE;
4032 break;
4033 case REQ_OP_READ:
4034 op_type = OBJ_OP_READ;
4035 break;
4036 default:
4037 dout("%s: non-fs request type %d\n", __func__, req_op(rq));
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004038 result = -EIO;
4039 goto err;
4040 }
4041
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004042 /* Ignore/skip any zero-length requests */
4043
4044 if (!length) {
4045 dout("%s: zero-length request\n", __func__);
4046 result = 0;
4047 goto err_rq;
4048 }
4049
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08004050 /* Only reads are allowed to a read-only device */
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004051
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08004052 if (op_type != OBJ_OP_READ) {
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004053 if (rbd_dev->mapping.read_only) {
4054 result = -EROFS;
4055 goto err_rq;
4056 }
4057 rbd_assert(rbd_dev->spec->snap_id == CEPH_NOSNAP);
4058 }
4059
4060 /*
4061 * Quit early if the mapped snapshot no longer exists. It's
4062 * still possible the snapshot will have disappeared by the
4063 * time our request arrives at the osd, but there's no sense in
4064 * sending it if we already know.
4065 */
4066 if (!test_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags)) {
4067 dout("request for non-existent snapshot");
4068 rbd_assert(rbd_dev->spec->snap_id != CEPH_NOSNAP);
4069 result = -ENXIO;
4070 goto err_rq;
4071 }
4072
4073 if (offset && length > U64_MAX - offset + 1) {
4074 rbd_warn(rbd_dev, "bad request range (%llu~%llu)", offset,
4075 length);
4076 result = -EINVAL;
4077 goto err_rq; /* Shouldn't happen */
4078 }
4079
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004080 blk_mq_start_request(rq);
4081
Josh Durgin4e752f02014-04-08 11:12:11 -07004082 down_read(&rbd_dev->header_rwsem);
4083 mapping_size = rbd_dev->mapping.size;
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08004084 if (op_type != OBJ_OP_READ) {
Josh Durgin4e752f02014-04-08 11:12:11 -07004085 snapc = rbd_dev->header.snapc;
4086 ceph_get_snap_context(snapc);
4087 }
4088 up_read(&rbd_dev->header_rwsem);
4089
4090 if (offset + length > mapping_size) {
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004091 rbd_warn(rbd_dev, "beyond EOD (%llu~%llu > %llu)", offset,
Josh Durgin4e752f02014-04-08 11:12:11 -07004092 length, mapping_size);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004093 result = -EIO;
4094 goto err_rq;
4095 }
4096
Ilya Dryomovf9bebd52017-04-13 12:17:39 +02004097 must_be_locked =
4098 (rbd_dev->header.features & RBD_FEATURE_EXCLUSIVE_LOCK) &&
4099 (op_type != OBJ_OP_READ || rbd_dev->opts->lock_on_read);
Ilya Dryomoved95b212016-08-12 16:40:02 +02004100 if (must_be_locked) {
4101 down_read(&rbd_dev->lock_rwsem);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02004102 if (rbd_dev->lock_state != RBD_LOCK_STATE_LOCKED &&
Ilya Dryomove010dd02017-04-13 12:17:39 +02004103 !test_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags)) {
4104 if (rbd_dev->opts->exclusive) {
4105 rbd_warn(rbd_dev, "exclusive lock required");
4106 result = -EROFS;
4107 goto err_unlock;
4108 }
Ilya Dryomoved95b212016-08-12 16:40:02 +02004109 rbd_wait_state_locked(rbd_dev);
Ilya Dryomove010dd02017-04-13 12:17:39 +02004110 }
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02004111 if (test_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags)) {
4112 result = -EBLACKLISTED;
4113 goto err_unlock;
4114 }
Ilya Dryomoved95b212016-08-12 16:40:02 +02004115 }
4116
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08004117 img_request = rbd_img_request_create(rbd_dev, offset, length, op_type,
Josh Durgin4e752f02014-04-08 11:12:11 -07004118 snapc);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004119 if (!img_request) {
4120 result = -ENOMEM;
Ilya Dryomoved95b212016-08-12 16:40:02 +02004121 goto err_unlock;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004122 }
4123 img_request->rq = rq;
Ilya Dryomov70b16db2015-11-27 19:23:24 +01004124 snapc = NULL; /* img_request consumes a ref */
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004125
Guangliang Zhao90e98c52014-04-01 22:22:16 +08004126 if (op_type == OBJ_OP_DISCARD)
4127 result = rbd_img_request_fill(img_request, OBJ_REQUEST_NODATA,
4128 NULL);
4129 else
4130 result = rbd_img_request_fill(img_request, OBJ_REQUEST_BIO,
4131 rq->bio);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004132 if (result)
4133 goto err_img_request;
4134
4135 result = rbd_img_request_submit(img_request);
4136 if (result)
4137 goto err_img_request;
4138
Ilya Dryomoved95b212016-08-12 16:40:02 +02004139 if (must_be_locked)
4140 up_read(&rbd_dev->lock_rwsem);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004141 return;
4142
4143err_img_request:
4144 rbd_img_request_put(img_request);
Ilya Dryomoved95b212016-08-12 16:40:02 +02004145err_unlock:
4146 if (must_be_locked)
4147 up_read(&rbd_dev->lock_rwsem);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004148err_rq:
4149 if (result)
4150 rbd_warn(rbd_dev, "%s %llx at %llx result %d",
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08004151 obj_op_name(op_type), length, offset, result);
SF Markus Elfringe96a6502014-11-02 15:20:59 +01004152 ceph_put_snap_context(snapc);
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004153err:
Christoph Hellwig2a842ac2017-06-03 09:38:04 +02004154 blk_mq_end_request(rq, errno_to_blk_status(result));
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004155}
4156
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004157static int rbd_queue_rq(struct blk_mq_hw_ctx *hctx,
4158 const struct blk_mq_queue_data *bd)
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004159{
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004160 struct request *rq = bd->rq;
4161 struct work_struct *work = blk_mq_rq_to_pdu(rq);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04004162
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004163 queue_work(rbd_wq, work);
4164 return BLK_MQ_RQ_QUEUE_OK;
Alex Elderbf0d5f502012-11-22 00:00:08 -06004165}
4166
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004167static void rbd_free_disk(struct rbd_device *rbd_dev)
4168{
Ilya Dryomov5769ed02017-04-13 12:17:38 +02004169 blk_cleanup_queue(rbd_dev->disk->queue);
4170 blk_mq_free_tag_set(&rbd_dev->tag_set);
4171 put_disk(rbd_dev->disk);
Alex Eldera0cab922013-04-25 23:15:08 -05004172 rbd_dev->disk = NULL;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004173}
4174
Alex Elder788e2df2013-01-17 12:25:27 -06004175static int rbd_obj_read_sync(struct rbd_device *rbd_dev,
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01004176 struct ceph_object_id *oid,
4177 struct ceph_object_locator *oloc,
4178 void *buf, int buf_len)
Alex Elder788e2df2013-01-17 12:25:27 -06004179
4180{
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01004181 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
4182 struct ceph_osd_request *req;
4183 struct page **pages;
4184 int num_pages = calc_pages_for(0, buf_len);
Alex Elder788e2df2013-01-17 12:25:27 -06004185 int ret;
4186
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01004187 req = ceph_osdc_alloc_request(osdc, NULL, 1, false, GFP_KERNEL);
4188 if (!req)
4189 return -ENOMEM;
Alex Elder788e2df2013-01-17 12:25:27 -06004190
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01004191 ceph_oid_copy(&req->r_base_oid, oid);
4192 ceph_oloc_copy(&req->r_base_oloc, oloc);
4193 req->r_flags = CEPH_OSD_FLAG_READ;
Alex Elder788e2df2013-01-17 12:25:27 -06004194
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01004195 ret = ceph_osdc_alloc_messages(req, GFP_KERNEL);
Alex Elder788e2df2013-01-17 12:25:27 -06004196 if (ret)
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01004197 goto out_req;
Alex Elder788e2df2013-01-17 12:25:27 -06004198
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01004199 pages = ceph_alloc_page_vector(num_pages, GFP_KERNEL);
4200 if (IS_ERR(pages)) {
4201 ret = PTR_ERR(pages);
4202 goto out_req;
4203 }
Alex Elder1ceae7e2013-02-06 13:11:38 -06004204
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01004205 osd_req_op_extent_init(req, 0, CEPH_OSD_OP_READ, 0, buf_len, 0, 0);
4206 osd_req_op_extent_osd_data_pages(req, 0, pages, buf_len, 0, false,
4207 true);
Alex Elder788e2df2013-01-17 12:25:27 -06004208
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01004209 ceph_osdc_start_request(osdc, req, false);
4210 ret = ceph_osdc_wait_request(osdc, req);
4211 if (ret >= 0)
4212 ceph_copy_from_page_vector(pages, buf, 0, ret);
4213
4214out_req:
4215 ceph_osdc_put_request(req);
Alex Elder788e2df2013-01-17 12:25:27 -06004216 return ret;
4217}
4218
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004219/*
Alex Elder662518b2013-05-06 09:51:29 -05004220 * Read the complete header for the given rbd device. On successful
4221 * return, the rbd_dev->header field will contain up-to-date
4222 * information about the image.
Alex Elder4156d992012-08-02 11:29:46 -05004223 */
Alex Elder99a41eb2013-05-06 09:51:30 -05004224static int rbd_dev_v1_header_info(struct rbd_device *rbd_dev)
Alex Elder4156d992012-08-02 11:29:46 -05004225{
4226 struct rbd_image_header_ondisk *ondisk = NULL;
4227 u32 snap_count = 0;
4228 u64 names_size = 0;
4229 u32 want_count;
4230 int ret;
4231
4232 /*
4233 * The complete header will include an array of its 64-bit
4234 * snapshot ids, followed by the names of those snapshots as
4235 * a contiguous block of NUL-terminated strings. Note that
4236 * the number of snapshots could change by the time we read
4237 * it in, in which case we re-read it.
4238 */
4239 do {
4240 size_t size;
4241
4242 kfree(ondisk);
4243
4244 size = sizeof (*ondisk);
4245 size += snap_count * sizeof (struct rbd_image_snap_ondisk);
4246 size += names_size;
4247 ondisk = kmalloc(size, GFP_KERNEL);
4248 if (!ondisk)
Alex Elder662518b2013-05-06 09:51:29 -05004249 return -ENOMEM;
Alex Elder4156d992012-08-02 11:29:46 -05004250
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01004251 ret = rbd_obj_read_sync(rbd_dev, &rbd_dev->header_oid,
4252 &rbd_dev->header_oloc, ondisk, size);
Alex Elder4156d992012-08-02 11:29:46 -05004253 if (ret < 0)
Alex Elder662518b2013-05-06 09:51:29 -05004254 goto out;
Alex Elderc0cd10db2013-04-26 09:43:47 -05004255 if ((size_t)ret < size) {
Alex Elder4156d992012-08-02 11:29:46 -05004256 ret = -ENXIO;
Alex Elder06ecc6c2012-11-01 10:17:15 -05004257 rbd_warn(rbd_dev, "short header read (want %zd got %d)",
4258 size, ret);
Alex Elder662518b2013-05-06 09:51:29 -05004259 goto out;
Alex Elder4156d992012-08-02 11:29:46 -05004260 }
4261 if (!rbd_dev_ondisk_valid(ondisk)) {
4262 ret = -ENXIO;
Alex Elder06ecc6c2012-11-01 10:17:15 -05004263 rbd_warn(rbd_dev, "invalid header");
Alex Elder662518b2013-05-06 09:51:29 -05004264 goto out;
Alex Elder4156d992012-08-02 11:29:46 -05004265 }
4266
4267 names_size = le64_to_cpu(ondisk->snap_names_len);
4268 want_count = snap_count;
4269 snap_count = le32_to_cpu(ondisk->snap_count);
4270 } while (snap_count != want_count);
4271
Alex Elder662518b2013-05-06 09:51:29 -05004272 ret = rbd_header_from_disk(rbd_dev, ondisk);
4273out:
Alex Elder4156d992012-08-02 11:29:46 -05004274 kfree(ondisk);
4275
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004276 return ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004277}
4278
Alex Elder15228ed2013-05-01 12:43:03 -05004279/*
4280 * Clear the rbd device's EXISTS flag if the snapshot it's mapped to
4281 * has disappeared from the (just updated) snapshot context.
4282 */
4283static void rbd_exists_validate(struct rbd_device *rbd_dev)
4284{
4285 u64 snap_id;
4286
4287 if (!test_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags))
4288 return;
4289
4290 snap_id = rbd_dev->spec->snap_id;
4291 if (snap_id == CEPH_NOSNAP)
4292 return;
4293
4294 if (rbd_dev_snap_index(rbd_dev, snap_id) == BAD_SNAP_INDEX)
4295 clear_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags);
4296}
4297
Josh Durgin98752012013-08-29 17:26:31 -07004298static void rbd_dev_update_size(struct rbd_device *rbd_dev)
4299{
4300 sector_t size;
Josh Durgin98752012013-08-29 17:26:31 -07004301
4302 /*
Ilya Dryomov811c6682016-04-15 16:22:16 +02004303 * If EXISTS is not set, rbd_dev->disk may be NULL, so don't
4304 * try to update its size. If REMOVING is set, updating size
4305 * is just useless work since the device can't be opened.
Josh Durgin98752012013-08-29 17:26:31 -07004306 */
Ilya Dryomov811c6682016-04-15 16:22:16 +02004307 if (test_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags) &&
4308 !test_bit(RBD_DEV_FLAG_REMOVING, &rbd_dev->flags)) {
Josh Durgin98752012013-08-29 17:26:31 -07004309 size = (sector_t)rbd_dev->mapping.size / SECTOR_SIZE;
4310 dout("setting size to %llu sectors", (unsigned long long)size);
4311 set_capacity(rbd_dev->disk, size);
4312 revalidate_disk(rbd_dev->disk);
4313 }
4314}
4315
Alex Eldercc4a38bd2013-04-30 00:44:33 -05004316static int rbd_dev_refresh(struct rbd_device *rbd_dev)
Alex Elder1fe5e992012-07-25 09:32:41 -05004317{
Alex Eldere627db02013-05-06 07:40:30 -05004318 u64 mapping_size;
Alex Elder1fe5e992012-07-25 09:32:41 -05004319 int ret;
4320
Alex Eldercfbf6372013-05-31 17:40:45 -05004321 down_write(&rbd_dev->header_rwsem);
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004322 mapping_size = rbd_dev->mapping.size;
Ilya Dryomova720ae02014-07-23 17:11:19 +04004323
4324 ret = rbd_dev_header_info(rbd_dev);
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04004325 if (ret)
Ilya Dryomov73e39e42015-01-08 20:18:22 +03004326 goto out;
Alex Elder15228ed2013-05-01 12:43:03 -05004327
Ilya Dryomove8f59b52014-07-24 10:42:13 +04004328 /*
4329 * If there is a parent, see if it has disappeared due to the
4330 * mapped image getting flattened.
4331 */
4332 if (rbd_dev->parent) {
4333 ret = rbd_dev_v2_parent_info(rbd_dev);
4334 if (ret)
Ilya Dryomov73e39e42015-01-08 20:18:22 +03004335 goto out;
Ilya Dryomove8f59b52014-07-24 10:42:13 +04004336 }
4337
Ilya Dryomov5ff11082014-07-23 17:11:21 +04004338 if (rbd_dev->spec->snap_id == CEPH_NOSNAP) {
Ilya Dryomov73e39e42015-01-08 20:18:22 +03004339 rbd_dev->mapping.size = rbd_dev->header.image_size;
Ilya Dryomov5ff11082014-07-23 17:11:21 +04004340 } else {
4341 /* validate mapped snapshot's EXISTS flag */
4342 rbd_exists_validate(rbd_dev);
4343 }
Alex Elder15228ed2013-05-01 12:43:03 -05004344
Ilya Dryomov73e39e42015-01-08 20:18:22 +03004345out:
Alex Eldercfbf6372013-05-31 17:40:45 -05004346 up_write(&rbd_dev->header_rwsem);
Ilya Dryomov73e39e42015-01-08 20:18:22 +03004347 if (!ret && mapping_size != rbd_dev->mapping.size)
Josh Durgin98752012013-08-29 17:26:31 -07004348 rbd_dev_update_size(rbd_dev);
Alex Elder1fe5e992012-07-25 09:32:41 -05004349
Ilya Dryomov73e39e42015-01-08 20:18:22 +03004350 return ret;
Alex Elder1fe5e992012-07-25 09:32:41 -05004351}
4352
Christoph Hellwigd6296d392017-05-01 10:19:08 -06004353static int rbd_init_request(struct blk_mq_tag_set *set, struct request *rq,
4354 unsigned int hctx_idx, unsigned int numa_node)
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004355{
4356 struct work_struct *work = blk_mq_rq_to_pdu(rq);
4357
4358 INIT_WORK(work, rbd_queue_workfn);
4359 return 0;
4360}
4361
Eric Biggersf363b082017-03-30 13:39:16 -07004362static const struct blk_mq_ops rbd_mq_ops = {
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004363 .queue_rq = rbd_queue_rq,
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004364 .init_request = rbd_init_request,
4365};
4366
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004367static int rbd_init_disk(struct rbd_device *rbd_dev)
4368{
4369 struct gendisk *disk;
4370 struct request_queue *q;
Alex Elder593a9e72012-02-07 12:03:37 -06004371 u64 segment_size;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004372 int err;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004373
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004374 /* create gendisk info */
Ilya Dryomov7e513d42013-12-16 19:26:32 +02004375 disk = alloc_disk(single_major ?
4376 (1 << RBD_SINGLE_MAJOR_PART_SHIFT) :
4377 RBD_MINORS_PER_MAJOR);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004378 if (!disk)
Alex Elder1fcdb8a2012-08-29 17:11:06 -05004379 return -ENOMEM;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004380
Alex Elderf0f8cef2012-01-29 13:57:44 -06004381 snprintf(disk->disk_name, sizeof(disk->disk_name), RBD_DRV_NAME "%d",
Alex Elderde71a292012-07-03 16:01:19 -05004382 rbd_dev->dev_id);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004383 disk->major = rbd_dev->major;
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004384 disk->first_minor = rbd_dev->minor;
Ilya Dryomov7e513d42013-12-16 19:26:32 +02004385 if (single_major)
4386 disk->flags |= GENHD_FL_EXT_DEVT;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004387 disk->fops = &rbd_bd_ops;
4388 disk->private_data = rbd_dev;
4389
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004390 memset(&rbd_dev->tag_set, 0, sizeof(rbd_dev->tag_set));
4391 rbd_dev->tag_set.ops = &rbd_mq_ops;
Ilya Dryomovb5584182015-06-23 16:21:19 +03004392 rbd_dev->tag_set.queue_depth = rbd_dev->opts->queue_depth;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004393 rbd_dev->tag_set.numa_node = NUMA_NO_NODE;
Ilya Dryomovb5584182015-06-23 16:21:19 +03004394 rbd_dev->tag_set.flags = BLK_MQ_F_SHOULD_MERGE | BLK_MQ_F_SG_MERGE;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004395 rbd_dev->tag_set.nr_hw_queues = 1;
4396 rbd_dev->tag_set.cmd_size = sizeof(struct work_struct);
4397
4398 err = blk_mq_alloc_tag_set(&rbd_dev->tag_set);
4399 if (err)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004400 goto out_disk;
Josh Durgin029bcbd2011-07-22 11:35:23 -07004401
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004402 q = blk_mq_init_queue(&rbd_dev->tag_set);
4403 if (IS_ERR(q)) {
4404 err = PTR_ERR(q);
4405 goto out_tag_set;
4406 }
4407
Ilya Dryomovd8a2c892015-03-24 16:15:17 +03004408 queue_flag_set_unlocked(QUEUE_FLAG_NONROT, q);
4409 /* QUEUE_FLAG_ADD_RANDOM is off by default for blk-mq */
Alex Elder593a9e72012-02-07 12:03:37 -06004410
Josh Durgin029bcbd2011-07-22 11:35:23 -07004411 /* set io sizes to object size */
Alex Elder593a9e72012-02-07 12:03:37 -06004412 segment_size = rbd_obj_bytes(&rbd_dev->header);
4413 blk_queue_max_hw_sectors(q, segment_size / SECTOR_SIZE);
Ilya Dryomov0d9fde42015-10-07 16:09:35 +02004414 q->limits.max_sectors = queue_max_hw_sectors(q);
Ilya Dryomovd3834fe2015-06-12 19:19:02 +03004415 blk_queue_max_segments(q, segment_size / SECTOR_SIZE);
Alex Elder593a9e72012-02-07 12:03:37 -06004416 blk_queue_max_segment_size(q, segment_size);
4417 blk_queue_io_min(q, segment_size);
4418 blk_queue_io_opt(q, segment_size);
Josh Durgin029bcbd2011-07-22 11:35:23 -07004419
Guangliang Zhao90e98c52014-04-01 22:22:16 +08004420 /* enable the discard support */
4421 queue_flag_set_unlocked(QUEUE_FLAG_DISCARD, q);
4422 q->limits.discard_granularity = segment_size;
4423 q->limits.discard_alignment = segment_size;
Jens Axboe2bb4cd52015-07-14 08:15:12 -06004424 blk_queue_max_discard_sectors(q, segment_size / SECTOR_SIZE);
Guangliang Zhao90e98c52014-04-01 22:22:16 +08004425
Ronny Hegewaldbae818e2015-10-15 18:50:46 +00004426 if (!ceph_test_opt(rbd_dev->rbd_client->client, NOCRC))
Jan Karadc3b17c2017-02-02 15:56:50 +01004427 q->backing_dev_info->capabilities |= BDI_CAP_STABLE_WRITES;
Ronny Hegewaldbae818e2015-10-15 18:50:46 +00004428
Ilya Dryomov5769ed02017-04-13 12:17:38 +02004429 /*
4430 * disk_release() expects a queue ref from add_disk() and will
4431 * put it. Hold an extra ref until add_disk() is called.
4432 */
4433 WARN_ON(!blk_get_queue(q));
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004434 disk->queue = q;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004435 q->queuedata = rbd_dev;
4436
4437 rbd_dev->disk = disk;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004438
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004439 return 0;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004440out_tag_set:
4441 blk_mq_free_tag_set(&rbd_dev->tag_set);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004442out_disk:
4443 put_disk(disk);
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004444 return err;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004445}
4446
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004447/*
4448 sysfs
4449*/
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004450
Alex Elder593a9e72012-02-07 12:03:37 -06004451static struct rbd_device *dev_to_rbd_dev(struct device *dev)
4452{
4453 return container_of(dev, struct rbd_device, dev);
4454}
4455
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004456static ssize_t rbd_size_show(struct device *dev,
4457 struct device_attribute *attr, char *buf)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004458{
Alex Elder593a9e72012-02-07 12:03:37 -06004459 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004460
Alex Elderfc71d832013-04-26 15:44:36 -05004461 return sprintf(buf, "%llu\n",
4462 (unsigned long long)rbd_dev->mapping.size);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004463}
4464
Alex Elder34b13182012-07-13 20:35:12 -05004465/*
4466 * Note this shows the features for whatever's mapped, which is not
4467 * necessarily the base image.
4468 */
4469static ssize_t rbd_features_show(struct device *dev,
4470 struct device_attribute *attr, char *buf)
4471{
4472 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4473
4474 return sprintf(buf, "0x%016llx\n",
Alex Elderfc71d832013-04-26 15:44:36 -05004475 (unsigned long long)rbd_dev->mapping.features);
Alex Elder34b13182012-07-13 20:35:12 -05004476}
4477
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004478static ssize_t rbd_major_show(struct device *dev,
4479 struct device_attribute *attr, char *buf)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004480{
Alex Elder593a9e72012-02-07 12:03:37 -06004481 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004482
Alex Elderfc71d832013-04-26 15:44:36 -05004483 if (rbd_dev->major)
4484 return sprintf(buf, "%d\n", rbd_dev->major);
4485
4486 return sprintf(buf, "(none)\n");
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004487}
Alex Elderfc71d832013-04-26 15:44:36 -05004488
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004489static ssize_t rbd_minor_show(struct device *dev,
4490 struct device_attribute *attr, char *buf)
4491{
4492 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4493
4494 return sprintf(buf, "%d\n", rbd_dev->minor);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004495}
4496
Ilya Dryomov005a07bf2016-08-18 18:38:43 +02004497static ssize_t rbd_client_addr_show(struct device *dev,
4498 struct device_attribute *attr, char *buf)
4499{
4500 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4501 struct ceph_entity_addr *client_addr =
4502 ceph_client_addr(rbd_dev->rbd_client->client);
4503
4504 return sprintf(buf, "%pISpc/%u\n", &client_addr->in_addr,
4505 le32_to_cpu(client_addr->nonce));
4506}
4507
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004508static ssize_t rbd_client_id_show(struct device *dev,
4509 struct device_attribute *attr, char *buf)
4510{
Alex Elder593a9e72012-02-07 12:03:37 -06004511 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004512
Alex Elder1dbb4392012-01-24 10:08:37 -06004513 return sprintf(buf, "client%lld\n",
Ilya Dryomov033268a2016-08-12 14:59:58 +02004514 ceph_client_gid(rbd_dev->rbd_client->client));
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004515}
4516
Mike Christie267fb902016-08-18 18:38:43 +02004517static ssize_t rbd_cluster_fsid_show(struct device *dev,
4518 struct device_attribute *attr, char *buf)
4519{
4520 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4521
4522 return sprintf(buf, "%pU\n", &rbd_dev->rbd_client->client->fsid);
4523}
4524
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02004525static ssize_t rbd_config_info_show(struct device *dev,
4526 struct device_attribute *attr, char *buf)
4527{
4528 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4529
4530 return sprintf(buf, "%s\n", rbd_dev->config_info);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004531}
4532
4533static ssize_t rbd_pool_show(struct device *dev,
4534 struct device_attribute *attr, char *buf)
4535{
Alex Elder593a9e72012-02-07 12:03:37 -06004536 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004537
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004538 return sprintf(buf, "%s\n", rbd_dev->spec->pool_name);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004539}
4540
Alex Elder9bb2f332012-07-12 10:46:35 -05004541static ssize_t rbd_pool_id_show(struct device *dev,
4542 struct device_attribute *attr, char *buf)
4543{
4544 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4545
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004546 return sprintf(buf, "%llu\n",
Alex Elderfc71d832013-04-26 15:44:36 -05004547 (unsigned long long) rbd_dev->spec->pool_id);
Alex Elder9bb2f332012-07-12 10:46:35 -05004548}
4549
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004550static ssize_t rbd_name_show(struct device *dev,
4551 struct device_attribute *attr, char *buf)
4552{
Alex Elder593a9e72012-02-07 12:03:37 -06004553 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004554
Alex Eldera92ffdf2012-10-30 19:40:33 -05004555 if (rbd_dev->spec->image_name)
4556 return sprintf(buf, "%s\n", rbd_dev->spec->image_name);
4557
4558 return sprintf(buf, "(unknown)\n");
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004559}
4560
Alex Elder589d30e2012-07-10 20:30:11 -05004561static ssize_t rbd_image_id_show(struct device *dev,
4562 struct device_attribute *attr, char *buf)
4563{
4564 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4565
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004566 return sprintf(buf, "%s\n", rbd_dev->spec->image_id);
Alex Elder589d30e2012-07-10 20:30:11 -05004567}
4568
Alex Elder34b13182012-07-13 20:35:12 -05004569/*
4570 * Shows the name of the currently-mapped snapshot (or
4571 * RBD_SNAP_HEAD_NAME for the base image).
4572 */
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004573static ssize_t rbd_snap_show(struct device *dev,
4574 struct device_attribute *attr,
4575 char *buf)
4576{
Alex Elder593a9e72012-02-07 12:03:37 -06004577 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004578
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004579 return sprintf(buf, "%s\n", rbd_dev->spec->snap_name);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004580}
4581
Mike Christie92a58672016-08-18 18:38:44 +02004582static ssize_t rbd_snap_id_show(struct device *dev,
4583 struct device_attribute *attr, char *buf)
4584{
4585 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4586
4587 return sprintf(buf, "%llu\n", rbd_dev->spec->snap_id);
4588}
4589
Alex Elder86b00e02012-10-25 23:34:42 -05004590/*
Ilya Dryomovff961282014-07-22 21:53:07 +04004591 * For a v2 image, shows the chain of parent images, separated by empty
4592 * lines. For v1 images or if there is no parent, shows "(no parent
4593 * image)".
Alex Elder86b00e02012-10-25 23:34:42 -05004594 */
4595static ssize_t rbd_parent_show(struct device *dev,
Ilya Dryomovff961282014-07-22 21:53:07 +04004596 struct device_attribute *attr,
4597 char *buf)
Alex Elder86b00e02012-10-25 23:34:42 -05004598{
4599 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Ilya Dryomovff961282014-07-22 21:53:07 +04004600 ssize_t count = 0;
Alex Elder86b00e02012-10-25 23:34:42 -05004601
Ilya Dryomovff961282014-07-22 21:53:07 +04004602 if (!rbd_dev->parent)
Alex Elder86b00e02012-10-25 23:34:42 -05004603 return sprintf(buf, "(no parent image)\n");
4604
Ilya Dryomovff961282014-07-22 21:53:07 +04004605 for ( ; rbd_dev->parent; rbd_dev = rbd_dev->parent) {
4606 struct rbd_spec *spec = rbd_dev->parent_spec;
Alex Elder86b00e02012-10-25 23:34:42 -05004607
Ilya Dryomovff961282014-07-22 21:53:07 +04004608 count += sprintf(&buf[count], "%s"
4609 "pool_id %llu\npool_name %s\n"
4610 "image_id %s\nimage_name %s\n"
4611 "snap_id %llu\nsnap_name %s\n"
4612 "overlap %llu\n",
4613 !count ? "" : "\n", /* first? */
4614 spec->pool_id, spec->pool_name,
4615 spec->image_id, spec->image_name ?: "(unknown)",
4616 spec->snap_id, spec->snap_name,
4617 rbd_dev->parent_overlap);
4618 }
Alex Elder86b00e02012-10-25 23:34:42 -05004619
Ilya Dryomovff961282014-07-22 21:53:07 +04004620 return count;
Alex Elder86b00e02012-10-25 23:34:42 -05004621}
4622
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004623static ssize_t rbd_image_refresh(struct device *dev,
4624 struct device_attribute *attr,
4625 const char *buf,
4626 size_t size)
4627{
Alex Elder593a9e72012-02-07 12:03:37 -06004628 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Alex Elderb8136232012-07-25 09:32:41 -05004629 int ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004630
Alex Eldercc4a38bd2013-04-30 00:44:33 -05004631 ret = rbd_dev_refresh(rbd_dev);
Alex Eldere627db02013-05-06 07:40:30 -05004632 if (ret)
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04004633 return ret;
Alex Elderb8136232012-07-25 09:32:41 -05004634
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04004635 return size;
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004636}
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004637
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004638static DEVICE_ATTR(size, S_IRUGO, rbd_size_show, NULL);
Alex Elder34b13182012-07-13 20:35:12 -05004639static DEVICE_ATTR(features, S_IRUGO, rbd_features_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004640static DEVICE_ATTR(major, S_IRUGO, rbd_major_show, NULL);
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004641static DEVICE_ATTR(minor, S_IRUGO, rbd_minor_show, NULL);
Ilya Dryomov005a07bf2016-08-18 18:38:43 +02004642static DEVICE_ATTR(client_addr, S_IRUGO, rbd_client_addr_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004643static DEVICE_ATTR(client_id, S_IRUGO, rbd_client_id_show, NULL);
Mike Christie267fb902016-08-18 18:38:43 +02004644static DEVICE_ATTR(cluster_fsid, S_IRUGO, rbd_cluster_fsid_show, NULL);
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02004645static DEVICE_ATTR(config_info, S_IRUSR, rbd_config_info_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004646static DEVICE_ATTR(pool, S_IRUGO, rbd_pool_show, NULL);
Alex Elder9bb2f332012-07-12 10:46:35 -05004647static DEVICE_ATTR(pool_id, S_IRUGO, rbd_pool_id_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004648static DEVICE_ATTR(name, S_IRUGO, rbd_name_show, NULL);
Alex Elder589d30e2012-07-10 20:30:11 -05004649static DEVICE_ATTR(image_id, S_IRUGO, rbd_image_id_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004650static DEVICE_ATTR(refresh, S_IWUSR, NULL, rbd_image_refresh);
4651static DEVICE_ATTR(current_snap, S_IRUGO, rbd_snap_show, NULL);
Mike Christie92a58672016-08-18 18:38:44 +02004652static DEVICE_ATTR(snap_id, S_IRUGO, rbd_snap_id_show, NULL);
Alex Elder86b00e02012-10-25 23:34:42 -05004653static DEVICE_ATTR(parent, S_IRUGO, rbd_parent_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004654
4655static struct attribute *rbd_attrs[] = {
4656 &dev_attr_size.attr,
Alex Elder34b13182012-07-13 20:35:12 -05004657 &dev_attr_features.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004658 &dev_attr_major.attr,
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004659 &dev_attr_minor.attr,
Ilya Dryomov005a07bf2016-08-18 18:38:43 +02004660 &dev_attr_client_addr.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004661 &dev_attr_client_id.attr,
Mike Christie267fb902016-08-18 18:38:43 +02004662 &dev_attr_cluster_fsid.attr,
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02004663 &dev_attr_config_info.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004664 &dev_attr_pool.attr,
Alex Elder9bb2f332012-07-12 10:46:35 -05004665 &dev_attr_pool_id.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004666 &dev_attr_name.attr,
Alex Elder589d30e2012-07-10 20:30:11 -05004667 &dev_attr_image_id.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004668 &dev_attr_current_snap.attr,
Mike Christie92a58672016-08-18 18:38:44 +02004669 &dev_attr_snap_id.attr,
Alex Elder86b00e02012-10-25 23:34:42 -05004670 &dev_attr_parent.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004671 &dev_attr_refresh.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004672 NULL
4673};
4674
4675static struct attribute_group rbd_attr_group = {
4676 .attrs = rbd_attrs,
4677};
4678
4679static const struct attribute_group *rbd_attr_groups[] = {
4680 &rbd_attr_group,
4681 NULL
4682};
4683
Ilya Dryomov6cac4692015-10-16 20:11:25 +02004684static void rbd_dev_release(struct device *dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004685
Bhumika Goyalb9942bc2017-02-11 12:14:38 +05304686static const struct device_type rbd_device_type = {
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004687 .name = "rbd",
4688 .groups = rbd_attr_groups,
Ilya Dryomov6cac4692015-10-16 20:11:25 +02004689 .release = rbd_dev_release,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004690};
4691
Alex Elder8b8fb992012-10-26 17:25:24 -05004692static struct rbd_spec *rbd_spec_get(struct rbd_spec *spec)
4693{
4694 kref_get(&spec->kref);
4695
4696 return spec;
4697}
4698
4699static void rbd_spec_free(struct kref *kref);
4700static void rbd_spec_put(struct rbd_spec *spec)
4701{
4702 if (spec)
4703 kref_put(&spec->kref, rbd_spec_free);
4704}
4705
4706static struct rbd_spec *rbd_spec_alloc(void)
4707{
4708 struct rbd_spec *spec;
4709
4710 spec = kzalloc(sizeof (*spec), GFP_KERNEL);
4711 if (!spec)
4712 return NULL;
Ilya Dryomov04077592014-07-23 17:11:20 +04004713
4714 spec->pool_id = CEPH_NOPOOL;
4715 spec->snap_id = CEPH_NOSNAP;
Alex Elder8b8fb992012-10-26 17:25:24 -05004716 kref_init(&spec->kref);
4717
Alex Elder8b8fb992012-10-26 17:25:24 -05004718 return spec;
4719}
4720
4721static void rbd_spec_free(struct kref *kref)
4722{
4723 struct rbd_spec *spec = container_of(kref, struct rbd_spec, kref);
4724
4725 kfree(spec->pool_name);
4726 kfree(spec->image_id);
4727 kfree(spec->image_name);
4728 kfree(spec->snap_name);
4729 kfree(spec);
4730}
4731
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004732static void rbd_dev_free(struct rbd_device *rbd_dev)
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004733{
Ilya Dryomov99d16942016-08-12 16:11:41 +02004734 WARN_ON(rbd_dev->watch_state != RBD_WATCH_STATE_UNREGISTERED);
Ilya Dryomoved95b212016-08-12 16:40:02 +02004735 WARN_ON(rbd_dev->lock_state != RBD_LOCK_STATE_UNLOCKED);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004736
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004737 ceph_oid_destroy(&rbd_dev->header_oid);
Ilya Dryomov6b6dddb2016-08-05 16:15:38 +02004738 ceph_oloc_destroy(&rbd_dev->header_oloc);
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02004739 kfree(rbd_dev->config_info);
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004740
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004741 rbd_put_client(rbd_dev->rbd_client);
4742 rbd_spec_put(rbd_dev->spec);
4743 kfree(rbd_dev->opts);
4744 kfree(rbd_dev);
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004745}
4746
4747static void rbd_dev_release(struct device *dev)
4748{
4749 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4750 bool need_put = !!rbd_dev->opts;
4751
4752 if (need_put) {
4753 destroy_workqueue(rbd_dev->task_wq);
4754 ida_simple_remove(&rbd_dev_id_ida, rbd_dev->dev_id);
4755 }
4756
4757 rbd_dev_free(rbd_dev);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004758
4759 /*
4760 * This is racy, but way better than putting module outside of
4761 * the release callback. The race window is pretty small, so
4762 * doing something similar to dm (dm-builtin.c) is overkill.
4763 */
4764 if (need_put)
4765 module_put(THIS_MODULE);
4766}
4767
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004768static struct rbd_device *__rbd_dev_create(struct rbd_client *rbdc,
4769 struct rbd_spec *spec)
Alex Elderc53d5892012-10-25 23:34:42 -05004770{
4771 struct rbd_device *rbd_dev;
4772
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004773 rbd_dev = kzalloc(sizeof(*rbd_dev), GFP_KERNEL);
Alex Elderc53d5892012-10-25 23:34:42 -05004774 if (!rbd_dev)
4775 return NULL;
4776
4777 spin_lock_init(&rbd_dev->lock);
4778 INIT_LIST_HEAD(&rbd_dev->node);
Alex Elderc53d5892012-10-25 23:34:42 -05004779 init_rwsem(&rbd_dev->header_rwsem);
4780
Ilya Dryomov7e973322017-01-25 18:16:22 +01004781 rbd_dev->header.data_pool_id = CEPH_NOPOOL;
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004782 ceph_oid_init(&rbd_dev->header_oid);
Ilya Dryomov431a02c2017-01-25 18:16:21 +01004783 rbd_dev->header_oloc.pool = spec->pool_id;
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004784
Ilya Dryomov99d16942016-08-12 16:11:41 +02004785 mutex_init(&rbd_dev->watch_mutex);
4786 rbd_dev->watch_state = RBD_WATCH_STATE_UNREGISTERED;
4787 INIT_DELAYED_WORK(&rbd_dev->watch_dwork, rbd_reregister_watch);
4788
Ilya Dryomoved95b212016-08-12 16:40:02 +02004789 init_rwsem(&rbd_dev->lock_rwsem);
4790 rbd_dev->lock_state = RBD_LOCK_STATE_UNLOCKED;
4791 INIT_WORK(&rbd_dev->acquired_lock_work, rbd_notify_acquired_lock);
4792 INIT_WORK(&rbd_dev->released_lock_work, rbd_notify_released_lock);
4793 INIT_DELAYED_WORK(&rbd_dev->lock_dwork, rbd_acquire_lock);
4794 INIT_WORK(&rbd_dev->unlock_work, rbd_release_lock_work);
4795 init_waitqueue_head(&rbd_dev->lock_waitq);
4796
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004797 rbd_dev->dev.bus = &rbd_bus_type;
4798 rbd_dev->dev.type = &rbd_device_type;
4799 rbd_dev->dev.parent = &rbd_root_dev;
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004800 device_initialize(&rbd_dev->dev);
4801
Alex Elderc53d5892012-10-25 23:34:42 -05004802 rbd_dev->rbd_client = rbdc;
Ilya Dryomovd1475432015-06-22 13:24:48 +03004803 rbd_dev->spec = spec;
Alex Elder0903e872012-11-14 12:25:19 -06004804
Alex Elderc53d5892012-10-25 23:34:42 -05004805 return rbd_dev;
4806}
4807
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004808/*
4809 * Create a mapping rbd_dev.
4810 */
4811static struct rbd_device *rbd_dev_create(struct rbd_client *rbdc,
4812 struct rbd_spec *spec,
4813 struct rbd_options *opts)
4814{
4815 struct rbd_device *rbd_dev;
4816
4817 rbd_dev = __rbd_dev_create(rbdc, spec);
4818 if (!rbd_dev)
4819 return NULL;
4820
4821 rbd_dev->opts = opts;
4822
4823 /* get an id and fill in device name */
4824 rbd_dev->dev_id = ida_simple_get(&rbd_dev_id_ida, 0,
4825 minor_to_rbd_dev_id(1 << MINORBITS),
4826 GFP_KERNEL);
4827 if (rbd_dev->dev_id < 0)
4828 goto fail_rbd_dev;
4829
4830 sprintf(rbd_dev->name, RBD_DRV_NAME "%d", rbd_dev->dev_id);
4831 rbd_dev->task_wq = alloc_ordered_workqueue("%s-tasks", WQ_MEM_RECLAIM,
4832 rbd_dev->name);
4833 if (!rbd_dev->task_wq)
4834 goto fail_dev_id;
4835
4836 /* we have a ref from do_rbd_add() */
4837 __module_get(THIS_MODULE);
4838
4839 dout("%s rbd_dev %p dev_id %d\n", __func__, rbd_dev, rbd_dev->dev_id);
4840 return rbd_dev;
4841
4842fail_dev_id:
4843 ida_simple_remove(&rbd_dev_id_ida, rbd_dev->dev_id);
4844fail_rbd_dev:
4845 rbd_dev_free(rbd_dev);
4846 return NULL;
4847}
4848
Alex Elderc53d5892012-10-25 23:34:42 -05004849static void rbd_dev_destroy(struct rbd_device *rbd_dev)
4850{
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004851 if (rbd_dev)
4852 put_device(&rbd_dev->dev);
Alex Elderc53d5892012-10-25 23:34:42 -05004853}
4854
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004855/*
Alex Elder9d475de2012-07-03 16:01:19 -05004856 * Get the size and object order for an image snapshot, or if
4857 * snap_id is CEPH_NOSNAP, gets this information for the base
4858 * image.
4859 */
4860static int _rbd_dev_v2_snap_size(struct rbd_device *rbd_dev, u64 snap_id,
4861 u8 *order, u64 *snap_size)
4862{
4863 __le64 snapid = cpu_to_le64(snap_id);
4864 int ret;
4865 struct {
4866 u8 order;
4867 __le64 size;
4868 } __attribute__ ((packed)) size_buf = { 0 };
4869
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004870 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4871 &rbd_dev->header_oloc, "get_size",
4872 &snapid, sizeof(snapid),
4873 &size_buf, sizeof(size_buf));
Alex Elder36be9a72013-01-19 00:30:28 -06004874 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder9d475de2012-07-03 16:01:19 -05004875 if (ret < 0)
4876 return ret;
Alex Elder57385b52013-04-21 12:14:45 -05004877 if (ret < sizeof (size_buf))
4878 return -ERANGE;
Alex Elder9d475de2012-07-03 16:01:19 -05004879
Josh Durginc3545572013-08-28 17:08:10 -07004880 if (order) {
Alex Elderc86f86e2013-04-25 15:09:41 -05004881 *order = size_buf.order;
Josh Durginc3545572013-08-28 17:08:10 -07004882 dout(" order %u", (unsigned int)*order);
4883 }
Alex Elder9d475de2012-07-03 16:01:19 -05004884 *snap_size = le64_to_cpu(size_buf.size);
4885
Josh Durginc3545572013-08-28 17:08:10 -07004886 dout(" snap_id 0x%016llx snap_size = %llu\n",
4887 (unsigned long long)snap_id,
Alex Elder57385b52013-04-21 12:14:45 -05004888 (unsigned long long)*snap_size);
Alex Elder9d475de2012-07-03 16:01:19 -05004889
4890 return 0;
4891}
4892
4893static int rbd_dev_v2_image_size(struct rbd_device *rbd_dev)
4894{
4895 return _rbd_dev_v2_snap_size(rbd_dev, CEPH_NOSNAP,
4896 &rbd_dev->header.obj_order,
4897 &rbd_dev->header.image_size);
4898}
4899
Alex Elder1e130192012-07-03 16:01:19 -05004900static int rbd_dev_v2_object_prefix(struct rbd_device *rbd_dev)
4901{
4902 void *reply_buf;
4903 int ret;
4904 void *p;
4905
4906 reply_buf = kzalloc(RBD_OBJ_PREFIX_LEN_MAX, GFP_KERNEL);
4907 if (!reply_buf)
4908 return -ENOMEM;
4909
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004910 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4911 &rbd_dev->header_oloc, "get_object_prefix",
4912 NULL, 0, reply_buf, RBD_OBJ_PREFIX_LEN_MAX);
Alex Elder36be9a72013-01-19 00:30:28 -06004913 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder1e130192012-07-03 16:01:19 -05004914 if (ret < 0)
4915 goto out;
4916
4917 p = reply_buf;
4918 rbd_dev->header.object_prefix = ceph_extract_encoded_string(&p,
Alex Elder57385b52013-04-21 12:14:45 -05004919 p + ret, NULL, GFP_NOIO);
4920 ret = 0;
Alex Elder1e130192012-07-03 16:01:19 -05004921
4922 if (IS_ERR(rbd_dev->header.object_prefix)) {
4923 ret = PTR_ERR(rbd_dev->header.object_prefix);
4924 rbd_dev->header.object_prefix = NULL;
4925 } else {
4926 dout(" object_prefix = %s\n", rbd_dev->header.object_prefix);
4927 }
Alex Elder1e130192012-07-03 16:01:19 -05004928out:
4929 kfree(reply_buf);
4930
4931 return ret;
4932}
4933
Alex Elderb1b54022012-07-03 16:01:19 -05004934static int _rbd_dev_v2_snap_features(struct rbd_device *rbd_dev, u64 snap_id,
4935 u64 *snap_features)
4936{
4937 __le64 snapid = cpu_to_le64(snap_id);
4938 struct {
4939 __le64 features;
4940 __le64 incompat;
Alex Elder41579762013-04-21 12:14:45 -05004941 } __attribute__ ((packed)) features_buf = { 0 };
Ilya Dryomovd3767f02016-04-13 14:15:50 +02004942 u64 unsup;
Alex Elderb1b54022012-07-03 16:01:19 -05004943 int ret;
4944
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004945 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4946 &rbd_dev->header_oloc, "get_features",
4947 &snapid, sizeof(snapid),
4948 &features_buf, sizeof(features_buf));
Alex Elder36be9a72013-01-19 00:30:28 -06004949 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elderb1b54022012-07-03 16:01:19 -05004950 if (ret < 0)
4951 return ret;
Alex Elder57385b52013-04-21 12:14:45 -05004952 if (ret < sizeof (features_buf))
4953 return -ERANGE;
Alex Elderd8891402012-10-09 13:50:17 -07004954
Ilya Dryomovd3767f02016-04-13 14:15:50 +02004955 unsup = le64_to_cpu(features_buf.incompat) & ~RBD_FEATURES_SUPPORTED;
4956 if (unsup) {
4957 rbd_warn(rbd_dev, "image uses unsupported features: 0x%llx",
4958 unsup);
Alex Elderb8f5c6e2012-11-01 08:39:26 -05004959 return -ENXIO;
Ilya Dryomovd3767f02016-04-13 14:15:50 +02004960 }
Alex Elderd8891402012-10-09 13:50:17 -07004961
Alex Elderb1b54022012-07-03 16:01:19 -05004962 *snap_features = le64_to_cpu(features_buf.features);
4963
4964 dout(" snap_id 0x%016llx features = 0x%016llx incompat = 0x%016llx\n",
Alex Elder57385b52013-04-21 12:14:45 -05004965 (unsigned long long)snap_id,
4966 (unsigned long long)*snap_features,
4967 (unsigned long long)le64_to_cpu(features_buf.incompat));
Alex Elderb1b54022012-07-03 16:01:19 -05004968
4969 return 0;
4970}
4971
4972static int rbd_dev_v2_features(struct rbd_device *rbd_dev)
4973{
4974 return _rbd_dev_v2_snap_features(rbd_dev, CEPH_NOSNAP,
4975 &rbd_dev->header.features);
4976}
4977
Alex Elder86b00e02012-10-25 23:34:42 -05004978static int rbd_dev_v2_parent_info(struct rbd_device *rbd_dev)
4979{
4980 struct rbd_spec *parent_spec;
4981 size_t size;
4982 void *reply_buf = NULL;
4983 __le64 snapid;
4984 void *p;
4985 void *end;
Alex Elder642a2532013-05-06 17:40:33 -05004986 u64 pool_id;
Alex Elder86b00e02012-10-25 23:34:42 -05004987 char *image_id;
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004988 u64 snap_id;
Alex Elder86b00e02012-10-25 23:34:42 -05004989 u64 overlap;
Alex Elder86b00e02012-10-25 23:34:42 -05004990 int ret;
4991
4992 parent_spec = rbd_spec_alloc();
4993 if (!parent_spec)
4994 return -ENOMEM;
4995
4996 size = sizeof (__le64) + /* pool_id */
4997 sizeof (__le32) + RBD_IMAGE_ID_LEN_MAX + /* image_id */
4998 sizeof (__le64) + /* snap_id */
4999 sizeof (__le64); /* overlap */
5000 reply_buf = kmalloc(size, GFP_KERNEL);
5001 if (!reply_buf) {
5002 ret = -ENOMEM;
5003 goto out_err;
5004 }
5005
Ilya Dryomov4d9b67c2014-07-24 10:42:13 +04005006 snapid = cpu_to_le64(rbd_dev->spec->snap_id);
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005007 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
5008 &rbd_dev->header_oloc, "get_parent",
5009 &snapid, sizeof(snapid), reply_buf, size);
Alex Elder36be9a72013-01-19 00:30:28 -06005010 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder86b00e02012-10-25 23:34:42 -05005011 if (ret < 0)
5012 goto out_err;
5013
Alex Elder86b00e02012-10-25 23:34:42 -05005014 p = reply_buf;
Alex Elder57385b52013-04-21 12:14:45 -05005015 end = reply_buf + ret;
5016 ret = -ERANGE;
Alex Elder642a2532013-05-06 17:40:33 -05005017 ceph_decode_64_safe(&p, end, pool_id, out_err);
Alex Elder392a9da2013-05-06 17:40:33 -05005018 if (pool_id == CEPH_NOPOOL) {
5019 /*
5020 * Either the parent never existed, or we have
5021 * record of it but the image got flattened so it no
5022 * longer has a parent. When the parent of a
5023 * layered image disappears we immediately set the
5024 * overlap to 0. The effect of this is that all new
5025 * requests will be treated as if the image had no
5026 * parent.
5027 */
5028 if (rbd_dev->parent_overlap) {
5029 rbd_dev->parent_overlap = 0;
Alex Elder392a9da2013-05-06 17:40:33 -05005030 rbd_dev_parent_put(rbd_dev);
5031 pr_info("%s: clone image has been flattened\n",
5032 rbd_dev->disk->disk_name);
5033 }
5034
Alex Elder86b00e02012-10-25 23:34:42 -05005035 goto out; /* No parent? No problem. */
Alex Elder392a9da2013-05-06 17:40:33 -05005036 }
Alex Elder86b00e02012-10-25 23:34:42 -05005037
Alex Elder0903e872012-11-14 12:25:19 -06005038 /* The ceph file layout needs to fit pool id in 32 bits */
5039
5040 ret = -EIO;
Alex Elder642a2532013-05-06 17:40:33 -05005041 if (pool_id > (u64)U32_MAX) {
Ilya Dryomov9584d502014-07-11 12:11:20 +04005042 rbd_warn(NULL, "parent pool id too large (%llu > %u)",
Alex Elder642a2532013-05-06 17:40:33 -05005043 (unsigned long long)pool_id, U32_MAX);
Alex Elder57385b52013-04-21 12:14:45 -05005044 goto out_err;
Alex Elderc0cd10db2013-04-26 09:43:47 -05005045 }
Alex Elder0903e872012-11-14 12:25:19 -06005046
Alex Elder979ed482012-11-01 08:39:26 -05005047 image_id = ceph_extract_encoded_string(&p, end, NULL, GFP_KERNEL);
Alex Elder86b00e02012-10-25 23:34:42 -05005048 if (IS_ERR(image_id)) {
5049 ret = PTR_ERR(image_id);
5050 goto out_err;
5051 }
Alex Elder3b5cf2a2013-05-29 11:18:59 -05005052 ceph_decode_64_safe(&p, end, snap_id, out_err);
Alex Elder86b00e02012-10-25 23:34:42 -05005053 ceph_decode_64_safe(&p, end, overlap, out_err);
5054
Alex Elder3b5cf2a2013-05-29 11:18:59 -05005055 /*
5056 * The parent won't change (except when the clone is
5057 * flattened, already handled that). So we only need to
5058 * record the parent spec we have not already done so.
5059 */
5060 if (!rbd_dev->parent_spec) {
5061 parent_spec->pool_id = pool_id;
5062 parent_spec->image_id = image_id;
5063 parent_spec->snap_id = snap_id;
Alex Elder70cf49c2013-05-06 17:40:33 -05005064 rbd_dev->parent_spec = parent_spec;
5065 parent_spec = NULL; /* rbd_dev now owns this */
Ilya Dryomovfbba11b2014-06-27 21:46:33 +04005066 } else {
5067 kfree(image_id);
Alex Elder3b5cf2a2013-05-29 11:18:59 -05005068 }
5069
5070 /*
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03005071 * We always update the parent overlap. If it's zero we issue
5072 * a warning, as we will proceed as if there was no parent.
Alex Elder3b5cf2a2013-05-29 11:18:59 -05005073 */
Alex Elder3b5cf2a2013-05-29 11:18:59 -05005074 if (!overlap) {
Alex Elder3b5cf2a2013-05-29 11:18:59 -05005075 if (parent_spec) {
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03005076 /* refresh, careful to warn just once */
5077 if (rbd_dev->parent_overlap)
5078 rbd_warn(rbd_dev,
5079 "clone now standalone (overlap became 0)");
Alex Elder3b5cf2a2013-05-29 11:18:59 -05005080 } else {
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03005081 /* initial probe */
5082 rbd_warn(rbd_dev, "clone is standalone (overlap 0)");
Alex Elder3b5cf2a2013-05-29 11:18:59 -05005083 }
Alex Elder70cf49c2013-05-06 17:40:33 -05005084 }
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03005085 rbd_dev->parent_overlap = overlap;
5086
Alex Elder86b00e02012-10-25 23:34:42 -05005087out:
5088 ret = 0;
5089out_err:
5090 kfree(reply_buf);
5091 rbd_spec_put(parent_spec);
5092
5093 return ret;
5094}
5095
Alex Eldercc070d52013-04-21 12:14:45 -05005096static int rbd_dev_v2_striping_info(struct rbd_device *rbd_dev)
5097{
5098 struct {
5099 __le64 stripe_unit;
5100 __le64 stripe_count;
5101 } __attribute__ ((packed)) striping_info_buf = { 0 };
5102 size_t size = sizeof (striping_info_buf);
5103 void *p;
5104 u64 obj_size;
5105 u64 stripe_unit;
5106 u64 stripe_count;
5107 int ret;
5108
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005109 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
5110 &rbd_dev->header_oloc, "get_stripe_unit_count",
5111 NULL, 0, &striping_info_buf, size);
Alex Eldercc070d52013-04-21 12:14:45 -05005112 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
5113 if (ret < 0)
5114 return ret;
5115 if (ret < size)
5116 return -ERANGE;
5117
5118 /*
5119 * We don't actually support the "fancy striping" feature
5120 * (STRIPINGV2) yet, but if the striping sizes are the
5121 * defaults the behavior is the same as before. So find
5122 * out, and only fail if the image has non-default values.
5123 */
5124 ret = -EINVAL;
Ilya Dryomov5bc3fb12017-01-25 18:16:22 +01005125 obj_size = rbd_obj_bytes(&rbd_dev->header);
Alex Eldercc070d52013-04-21 12:14:45 -05005126 p = &striping_info_buf;
5127 stripe_unit = ceph_decode_64(&p);
5128 if (stripe_unit != obj_size) {
5129 rbd_warn(rbd_dev, "unsupported stripe unit "
5130 "(got %llu want %llu)",
5131 stripe_unit, obj_size);
5132 return -EINVAL;
5133 }
5134 stripe_count = ceph_decode_64(&p);
5135 if (stripe_count != 1) {
5136 rbd_warn(rbd_dev, "unsupported stripe count "
5137 "(got %llu want 1)", stripe_count);
5138 return -EINVAL;
5139 }
Alex Elder500d0c02013-04-26 09:43:47 -05005140 rbd_dev->header.stripe_unit = stripe_unit;
5141 rbd_dev->header.stripe_count = stripe_count;
Alex Eldercc070d52013-04-21 12:14:45 -05005142
5143 return 0;
5144}
5145
Ilya Dryomov7e973322017-01-25 18:16:22 +01005146static int rbd_dev_v2_data_pool(struct rbd_device *rbd_dev)
5147{
5148 __le64 data_pool_id;
5149 int ret;
5150
5151 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
5152 &rbd_dev->header_oloc, "get_data_pool",
5153 NULL, 0, &data_pool_id, sizeof(data_pool_id));
5154 if (ret < 0)
5155 return ret;
5156 if (ret < sizeof(data_pool_id))
5157 return -EBADMSG;
5158
5159 rbd_dev->header.data_pool_id = le64_to_cpu(data_pool_id);
5160 WARN_ON(rbd_dev->header.data_pool_id == CEPH_NOPOOL);
5161 return 0;
5162}
5163
Alex Elder9e15b772012-10-30 19:40:33 -05005164static char *rbd_dev_image_name(struct rbd_device *rbd_dev)
5165{
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005166 CEPH_DEFINE_OID_ONSTACK(oid);
Alex Elder9e15b772012-10-30 19:40:33 -05005167 size_t image_id_size;
5168 char *image_id;
5169 void *p;
5170 void *end;
5171 size_t size;
5172 void *reply_buf = NULL;
5173 size_t len = 0;
5174 char *image_name = NULL;
5175 int ret;
5176
5177 rbd_assert(!rbd_dev->spec->image_name);
5178
Alex Elder69e7a022012-11-01 08:39:26 -05005179 len = strlen(rbd_dev->spec->image_id);
5180 image_id_size = sizeof (__le32) + len;
Alex Elder9e15b772012-10-30 19:40:33 -05005181 image_id = kmalloc(image_id_size, GFP_KERNEL);
5182 if (!image_id)
5183 return NULL;
5184
5185 p = image_id;
Alex Elder41579762013-04-21 12:14:45 -05005186 end = image_id + image_id_size;
Alex Elder57385b52013-04-21 12:14:45 -05005187 ceph_encode_string(&p, end, rbd_dev->spec->image_id, (u32)len);
Alex Elder9e15b772012-10-30 19:40:33 -05005188
5189 size = sizeof (__le32) + RBD_IMAGE_NAME_LEN_MAX;
5190 reply_buf = kmalloc(size, GFP_KERNEL);
5191 if (!reply_buf)
5192 goto out;
5193
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005194 ceph_oid_printf(&oid, "%s", RBD_DIRECTORY);
5195 ret = rbd_obj_method_sync(rbd_dev, &oid, &rbd_dev->header_oloc,
5196 "dir_get_name", image_id, image_id_size,
5197 reply_buf, size);
Alex Elder9e15b772012-10-30 19:40:33 -05005198 if (ret < 0)
5199 goto out;
5200 p = reply_buf;
Alex Elderf40eb342013-04-25 15:09:42 -05005201 end = reply_buf + ret;
5202
Alex Elder9e15b772012-10-30 19:40:33 -05005203 image_name = ceph_extract_encoded_string(&p, end, &len, GFP_KERNEL);
5204 if (IS_ERR(image_name))
5205 image_name = NULL;
5206 else
5207 dout("%s: name is %s len is %zd\n", __func__, image_name, len);
5208out:
5209 kfree(reply_buf);
5210 kfree(image_id);
5211
5212 return image_name;
5213}
5214
Alex Elder2ad3d712013-04-30 00:44:33 -05005215static u64 rbd_v1_snap_id_by_name(struct rbd_device *rbd_dev, const char *name)
5216{
5217 struct ceph_snap_context *snapc = rbd_dev->header.snapc;
5218 const char *snap_name;
5219 u32 which = 0;
5220
5221 /* Skip over names until we find the one we are looking for */
5222
5223 snap_name = rbd_dev->header.snap_names;
5224 while (which < snapc->num_snaps) {
5225 if (!strcmp(name, snap_name))
5226 return snapc->snaps[which];
5227 snap_name += strlen(snap_name) + 1;
5228 which++;
5229 }
5230 return CEPH_NOSNAP;
5231}
5232
5233static u64 rbd_v2_snap_id_by_name(struct rbd_device *rbd_dev, const char *name)
5234{
5235 struct ceph_snap_context *snapc = rbd_dev->header.snapc;
5236 u32 which;
5237 bool found = false;
5238 u64 snap_id;
5239
5240 for (which = 0; !found && which < snapc->num_snaps; which++) {
5241 const char *snap_name;
5242
5243 snap_id = snapc->snaps[which];
5244 snap_name = rbd_dev_v2_snap_name(rbd_dev, snap_id);
Josh Durginefadc982013-08-29 19:16:42 -07005245 if (IS_ERR(snap_name)) {
5246 /* ignore no-longer existing snapshots */
5247 if (PTR_ERR(snap_name) == -ENOENT)
5248 continue;
5249 else
5250 break;
5251 }
Alex Elder2ad3d712013-04-30 00:44:33 -05005252 found = !strcmp(name, snap_name);
5253 kfree(snap_name);
5254 }
5255 return found ? snap_id : CEPH_NOSNAP;
5256}
5257
5258/*
5259 * Assumes name is never RBD_SNAP_HEAD_NAME; returns CEPH_NOSNAP if
5260 * no snapshot by that name is found, or if an error occurs.
5261 */
5262static u64 rbd_snap_id_by_name(struct rbd_device *rbd_dev, const char *name)
5263{
5264 if (rbd_dev->image_format == 1)
5265 return rbd_v1_snap_id_by_name(rbd_dev, name);
5266
5267 return rbd_v2_snap_id_by_name(rbd_dev, name);
5268}
5269
Alex Elder9e15b772012-10-30 19:40:33 -05005270/*
Ilya Dryomov04077592014-07-23 17:11:20 +04005271 * An image being mapped will have everything but the snap id.
Alex Elder9e15b772012-10-30 19:40:33 -05005272 */
Ilya Dryomov04077592014-07-23 17:11:20 +04005273static int rbd_spec_fill_snap_id(struct rbd_device *rbd_dev)
5274{
5275 struct rbd_spec *spec = rbd_dev->spec;
5276
5277 rbd_assert(spec->pool_id != CEPH_NOPOOL && spec->pool_name);
5278 rbd_assert(spec->image_id && spec->image_name);
5279 rbd_assert(spec->snap_name);
5280
5281 if (strcmp(spec->snap_name, RBD_SNAP_HEAD_NAME)) {
5282 u64 snap_id;
5283
5284 snap_id = rbd_snap_id_by_name(rbd_dev, spec->snap_name);
5285 if (snap_id == CEPH_NOSNAP)
5286 return -ENOENT;
5287
5288 spec->snap_id = snap_id;
5289 } else {
5290 spec->snap_id = CEPH_NOSNAP;
5291 }
5292
5293 return 0;
5294}
5295
5296/*
5297 * A parent image will have all ids but none of the names.
5298 *
5299 * All names in an rbd spec are dynamically allocated. It's OK if we
5300 * can't figure out the name for an image id.
5301 */
5302static int rbd_spec_fill_names(struct rbd_device *rbd_dev)
Alex Elder9e15b772012-10-30 19:40:33 -05005303{
Alex Elder2e9f7f12013-04-26 09:43:48 -05005304 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
5305 struct rbd_spec *spec = rbd_dev->spec;
5306 const char *pool_name;
5307 const char *image_name;
5308 const char *snap_name;
Alex Elder9e15b772012-10-30 19:40:33 -05005309 int ret;
5310
Ilya Dryomov04077592014-07-23 17:11:20 +04005311 rbd_assert(spec->pool_id != CEPH_NOPOOL);
5312 rbd_assert(spec->image_id);
5313 rbd_assert(spec->snap_id != CEPH_NOSNAP);
Alex Elder9e15b772012-10-30 19:40:33 -05005314
Alex Elder2e9f7f12013-04-26 09:43:48 -05005315 /* Get the pool name; we have to make our own copy of this */
Alex Elder9e15b772012-10-30 19:40:33 -05005316
Alex Elder2e9f7f12013-04-26 09:43:48 -05005317 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, spec->pool_id);
5318 if (!pool_name) {
5319 rbd_warn(rbd_dev, "no pool with id %llu", spec->pool_id);
Alex Elder935dc892012-11-01 10:17:15 -05005320 return -EIO;
5321 }
Alex Elder2e9f7f12013-04-26 09:43:48 -05005322 pool_name = kstrdup(pool_name, GFP_KERNEL);
5323 if (!pool_name)
Alex Elder9e15b772012-10-30 19:40:33 -05005324 return -ENOMEM;
5325
5326 /* Fetch the image name; tolerate failure here */
5327
Alex Elder2e9f7f12013-04-26 09:43:48 -05005328 image_name = rbd_dev_image_name(rbd_dev);
5329 if (!image_name)
Alex Elder06ecc6c2012-11-01 10:17:15 -05005330 rbd_warn(rbd_dev, "unable to get image name");
Alex Elder9e15b772012-10-30 19:40:33 -05005331
Ilya Dryomov04077592014-07-23 17:11:20 +04005332 /* Fetch the snapshot name */
Alex Elder9e15b772012-10-30 19:40:33 -05005333
Alex Elder2e9f7f12013-04-26 09:43:48 -05005334 snap_name = rbd_snap_name(rbd_dev, spec->snap_id);
Josh Durginda6a6b62013-09-04 17:57:31 -07005335 if (IS_ERR(snap_name)) {
5336 ret = PTR_ERR(snap_name);
Alex Elder9e15b772012-10-30 19:40:33 -05005337 goto out_err;
Alex Elder2e9f7f12013-04-26 09:43:48 -05005338 }
5339
5340 spec->pool_name = pool_name;
5341 spec->image_name = image_name;
5342 spec->snap_name = snap_name;
Alex Elder9e15b772012-10-30 19:40:33 -05005343
5344 return 0;
Ilya Dryomov04077592014-07-23 17:11:20 +04005345
Alex Elder9e15b772012-10-30 19:40:33 -05005346out_err:
Alex Elder2e9f7f12013-04-26 09:43:48 -05005347 kfree(image_name);
5348 kfree(pool_name);
Alex Elder9e15b772012-10-30 19:40:33 -05005349 return ret;
5350}
5351
Alex Eldercc4a38bd2013-04-30 00:44:33 -05005352static int rbd_dev_v2_snap_context(struct rbd_device *rbd_dev)
Alex Elder35d489f2012-07-03 16:01:19 -05005353{
5354 size_t size;
5355 int ret;
5356 void *reply_buf;
5357 void *p;
5358 void *end;
5359 u64 seq;
5360 u32 snap_count;
5361 struct ceph_snap_context *snapc;
5362 u32 i;
5363
5364 /*
5365 * We'll need room for the seq value (maximum snapshot id),
5366 * snapshot count, and array of that many snapshot ids.
5367 * For now we have a fixed upper limit on the number we're
5368 * prepared to receive.
5369 */
5370 size = sizeof (__le64) + sizeof (__le32) +
5371 RBD_MAX_SNAP_COUNT * sizeof (__le64);
5372 reply_buf = kzalloc(size, GFP_KERNEL);
5373 if (!reply_buf)
5374 return -ENOMEM;
5375
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005376 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
5377 &rbd_dev->header_oloc, "get_snapcontext",
5378 NULL, 0, reply_buf, size);
Alex Elder36be9a72013-01-19 00:30:28 -06005379 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder35d489f2012-07-03 16:01:19 -05005380 if (ret < 0)
5381 goto out;
5382
Alex Elder35d489f2012-07-03 16:01:19 -05005383 p = reply_buf;
Alex Elder57385b52013-04-21 12:14:45 -05005384 end = reply_buf + ret;
5385 ret = -ERANGE;
Alex Elder35d489f2012-07-03 16:01:19 -05005386 ceph_decode_64_safe(&p, end, seq, out);
5387 ceph_decode_32_safe(&p, end, snap_count, out);
5388
5389 /*
5390 * Make sure the reported number of snapshot ids wouldn't go
5391 * beyond the end of our buffer. But before checking that,
5392 * make sure the computed size of the snapshot context we
5393 * allocate is representable in a size_t.
5394 */
5395 if (snap_count > (SIZE_MAX - sizeof (struct ceph_snap_context))
5396 / sizeof (u64)) {
5397 ret = -EINVAL;
5398 goto out;
5399 }
5400 if (!ceph_has_room(&p, end, snap_count * sizeof (__le64)))
5401 goto out;
Alex Elder468521c2013-04-26 09:43:47 -05005402 ret = 0;
Alex Elder35d489f2012-07-03 16:01:19 -05005403
Alex Elder812164f82013-04-30 00:44:32 -05005404 snapc = ceph_create_snap_context(snap_count, GFP_KERNEL);
Alex Elder35d489f2012-07-03 16:01:19 -05005405 if (!snapc) {
5406 ret = -ENOMEM;
5407 goto out;
5408 }
Alex Elder35d489f2012-07-03 16:01:19 -05005409 snapc->seq = seq;
Alex Elder35d489f2012-07-03 16:01:19 -05005410 for (i = 0; i < snap_count; i++)
5411 snapc->snaps[i] = ceph_decode_64(&p);
5412
Alex Elder49ece552013-05-06 08:37:00 -05005413 ceph_put_snap_context(rbd_dev->header.snapc);
Alex Elder35d489f2012-07-03 16:01:19 -05005414 rbd_dev->header.snapc = snapc;
5415
5416 dout(" snap context seq = %llu, snap_count = %u\n",
Alex Elder57385b52013-04-21 12:14:45 -05005417 (unsigned long long)seq, (unsigned int)snap_count);
Alex Elder35d489f2012-07-03 16:01:19 -05005418out:
5419 kfree(reply_buf);
5420
Alex Elder57385b52013-04-21 12:14:45 -05005421 return ret;
Alex Elder35d489f2012-07-03 16:01:19 -05005422}
5423
Alex Elder54cac612013-04-30 00:44:33 -05005424static const char *rbd_dev_v2_snap_name(struct rbd_device *rbd_dev,
5425 u64 snap_id)
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005426{
5427 size_t size;
5428 void *reply_buf;
Alex Elder54cac612013-04-30 00:44:33 -05005429 __le64 snapid;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005430 int ret;
5431 void *p;
5432 void *end;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005433 char *snap_name;
5434
5435 size = sizeof (__le32) + RBD_MAX_SNAP_NAME_LEN;
5436 reply_buf = kmalloc(size, GFP_KERNEL);
5437 if (!reply_buf)
5438 return ERR_PTR(-ENOMEM);
5439
Alex Elder54cac612013-04-30 00:44:33 -05005440 snapid = cpu_to_le64(snap_id);
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005441 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
5442 &rbd_dev->header_oloc, "get_snapshot_name",
5443 &snapid, sizeof(snapid), reply_buf, size);
Alex Elder36be9a72013-01-19 00:30:28 -06005444 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elderf40eb342013-04-25 15:09:42 -05005445 if (ret < 0) {
5446 snap_name = ERR_PTR(ret);
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005447 goto out;
Alex Elderf40eb342013-04-25 15:09:42 -05005448 }
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005449
5450 p = reply_buf;
Alex Elderf40eb342013-04-25 15:09:42 -05005451 end = reply_buf + ret;
Alex Eldere5c35532012-10-25 23:34:41 -05005452 snap_name = ceph_extract_encoded_string(&p, end, NULL, GFP_KERNEL);
Alex Elderf40eb342013-04-25 15:09:42 -05005453 if (IS_ERR(snap_name))
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005454 goto out;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005455
Alex Elderf40eb342013-04-25 15:09:42 -05005456 dout(" snap_id 0x%016llx snap_name = %s\n",
Alex Elder54cac612013-04-30 00:44:33 -05005457 (unsigned long long)snap_id, snap_name);
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005458out:
5459 kfree(reply_buf);
5460
Alex Elderf40eb342013-04-25 15:09:42 -05005461 return snap_name;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005462}
5463
Alex Elder2df3fac2013-05-06 09:51:30 -05005464static int rbd_dev_v2_header_info(struct rbd_device *rbd_dev)
Alex Elder117973f2012-08-31 17:29:55 -05005465{
Alex Elder2df3fac2013-05-06 09:51:30 -05005466 bool first_time = rbd_dev->header.object_prefix == NULL;
Alex Elder117973f2012-08-31 17:29:55 -05005467 int ret;
Alex Elder117973f2012-08-31 17:29:55 -05005468
Josh Durgin1617e402013-06-12 14:43:10 -07005469 ret = rbd_dev_v2_image_size(rbd_dev);
5470 if (ret)
Alex Eldercfbf6372013-05-31 17:40:45 -05005471 return ret;
Josh Durgin1617e402013-06-12 14:43:10 -07005472
Alex Elder2df3fac2013-05-06 09:51:30 -05005473 if (first_time) {
5474 ret = rbd_dev_v2_header_onetime(rbd_dev);
5475 if (ret)
Alex Eldercfbf6372013-05-31 17:40:45 -05005476 return ret;
Alex Elder2df3fac2013-05-06 09:51:30 -05005477 }
5478
Alex Eldercc4a38bd2013-04-30 00:44:33 -05005479 ret = rbd_dev_v2_snap_context(rbd_dev);
Ilya Dryomovd194cd12015-08-31 18:22:10 +03005480 if (ret && first_time) {
5481 kfree(rbd_dev->header.object_prefix);
5482 rbd_dev->header.object_prefix = NULL;
5483 }
Alex Elder117973f2012-08-31 17:29:55 -05005484
5485 return ret;
5486}
5487
Ilya Dryomova720ae02014-07-23 17:11:19 +04005488static int rbd_dev_header_info(struct rbd_device *rbd_dev)
5489{
5490 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
5491
5492 if (rbd_dev->image_format == 1)
5493 return rbd_dev_v1_header_info(rbd_dev);
5494
5495 return rbd_dev_v2_header_info(rbd_dev);
5496}
5497
Alex Elder1ddbe942012-01-29 13:57:44 -06005498/*
Alex Eldere28fff262012-02-02 08:13:30 -06005499 * Skips over white space at *buf, and updates *buf to point to the
5500 * first found non-space character (if any). Returns the length of
Alex Elder593a9e72012-02-07 12:03:37 -06005501 * the token (string of non-white space characters) found. Note
5502 * that *buf must be terminated with '\0'.
Alex Eldere28fff262012-02-02 08:13:30 -06005503 */
5504static inline size_t next_token(const char **buf)
5505{
5506 /*
5507 * These are the characters that produce nonzero for
5508 * isspace() in the "C" and "POSIX" locales.
5509 */
5510 const char *spaces = " \f\n\r\t\v";
5511
5512 *buf += strspn(*buf, spaces); /* Find start of token */
5513
5514 return strcspn(*buf, spaces); /* Return token length */
5515}
5516
5517/*
Alex Elderea3352f2012-07-09 21:04:23 -05005518 * Finds the next token in *buf, dynamically allocates a buffer big
5519 * enough to hold a copy of it, and copies the token into the new
5520 * buffer. The copy is guaranteed to be terminated with '\0'. Note
5521 * that a duplicate buffer is created even for a zero-length token.
5522 *
5523 * Returns a pointer to the newly-allocated duplicate, or a null
5524 * pointer if memory for the duplicate was not available. If
5525 * the lenp argument is a non-null pointer, the length of the token
5526 * (not including the '\0') is returned in *lenp.
5527 *
5528 * If successful, the *buf pointer will be updated to point beyond
5529 * the end of the found token.
5530 *
5531 * Note: uses GFP_KERNEL for allocation.
5532 */
5533static inline char *dup_token(const char **buf, size_t *lenp)
5534{
5535 char *dup;
5536 size_t len;
5537
5538 len = next_token(buf);
Alex Elder4caf35f2012-11-01 08:39:27 -05005539 dup = kmemdup(*buf, len + 1, GFP_KERNEL);
Alex Elderea3352f2012-07-09 21:04:23 -05005540 if (!dup)
5541 return NULL;
Alex Elderea3352f2012-07-09 21:04:23 -05005542 *(dup + len) = '\0';
5543 *buf += len;
5544
5545 if (lenp)
5546 *lenp = len;
5547
5548 return dup;
5549}
5550
5551/*
Alex Elder859c31d2012-10-25 23:34:42 -05005552 * Parse the options provided for an "rbd add" (i.e., rbd image
5553 * mapping) request. These arrive via a write to /sys/bus/rbd/add,
5554 * and the data written is passed here via a NUL-terminated buffer.
5555 * Returns 0 if successful or an error code otherwise.
Alex Elderd22f76e2012-07-12 10:46:35 -05005556 *
Alex Elder859c31d2012-10-25 23:34:42 -05005557 * The information extracted from these options is recorded in
5558 * the other parameters which return dynamically-allocated
5559 * structures:
5560 * ceph_opts
5561 * The address of a pointer that will refer to a ceph options
5562 * structure. Caller must release the returned pointer using
5563 * ceph_destroy_options() when it is no longer needed.
5564 * rbd_opts
5565 * Address of an rbd options pointer. Fully initialized by
5566 * this function; caller must release with kfree().
5567 * spec
5568 * Address of an rbd image specification pointer. Fully
5569 * initialized by this function based on parsed options.
5570 * Caller must release with rbd_spec_put().
5571 *
5572 * The options passed take this form:
5573 * <mon_addrs> <options> <pool_name> <image_name> [<snap_id>]
5574 * where:
5575 * <mon_addrs>
5576 * A comma-separated list of one or more monitor addresses.
5577 * A monitor address is an ip address, optionally followed
5578 * by a port number (separated by a colon).
5579 * I.e.: ip1[:port1][,ip2[:port2]...]
5580 * <options>
5581 * A comma-separated list of ceph and/or rbd options.
5582 * <pool_name>
5583 * The name of the rados pool containing the rbd image.
5584 * <image_name>
5585 * The name of the image in that pool to map.
5586 * <snap_id>
5587 * An optional snapshot id. If provided, the mapping will
5588 * present data from the image at the time that snapshot was
5589 * created. The image head is used if no snapshot id is
5590 * provided. Snapshot mappings are always read-only.
Alex Eldera725f65e2012-02-02 08:13:30 -06005591 */
Alex Elder859c31d2012-10-25 23:34:42 -05005592static int rbd_add_parse_args(const char *buf,
Alex Elderdc79b112012-10-25 23:34:41 -05005593 struct ceph_options **ceph_opts,
Alex Elder859c31d2012-10-25 23:34:42 -05005594 struct rbd_options **opts,
5595 struct rbd_spec **rbd_spec)
Alex Eldera725f65e2012-02-02 08:13:30 -06005596{
Alex Elderd22f76e2012-07-12 10:46:35 -05005597 size_t len;
Alex Elder859c31d2012-10-25 23:34:42 -05005598 char *options;
Alex Elder0ddebc02012-10-25 23:34:41 -05005599 const char *mon_addrs;
Alex Elderecb4dc22013-04-26 09:43:47 -05005600 char *snap_name;
Alex Elder0ddebc02012-10-25 23:34:41 -05005601 size_t mon_addrs_size;
Alex Elder859c31d2012-10-25 23:34:42 -05005602 struct rbd_spec *spec = NULL;
Alex Elder4e9afeb2012-10-25 23:34:41 -05005603 struct rbd_options *rbd_opts = NULL;
Alex Elder859c31d2012-10-25 23:34:42 -05005604 struct ceph_options *copts;
Alex Elderdc79b112012-10-25 23:34:41 -05005605 int ret;
Alex Eldere28fff262012-02-02 08:13:30 -06005606
5607 /* The first four tokens are required */
5608
Alex Elder7ef32142012-02-02 08:13:30 -06005609 len = next_token(&buf);
Alex Elder4fb5d6712012-11-01 10:17:15 -05005610 if (!len) {
5611 rbd_warn(NULL, "no monitor address(es) provided");
5612 return -EINVAL;
5613 }
Alex Elder0ddebc02012-10-25 23:34:41 -05005614 mon_addrs = buf;
Alex Elderf28e5652012-10-25 23:34:41 -05005615 mon_addrs_size = len + 1;
Alex Elder7ef32142012-02-02 08:13:30 -06005616 buf += len;
Alex Eldera725f65e2012-02-02 08:13:30 -06005617
Alex Elderdc79b112012-10-25 23:34:41 -05005618 ret = -EINVAL;
Alex Elderf28e5652012-10-25 23:34:41 -05005619 options = dup_token(&buf, NULL);
5620 if (!options)
Alex Elderdc79b112012-10-25 23:34:41 -05005621 return -ENOMEM;
Alex Elder4fb5d6712012-11-01 10:17:15 -05005622 if (!*options) {
5623 rbd_warn(NULL, "no options provided");
5624 goto out_err;
5625 }
Alex Eldera725f65e2012-02-02 08:13:30 -06005626
Alex Elder859c31d2012-10-25 23:34:42 -05005627 spec = rbd_spec_alloc();
5628 if (!spec)
Alex Elderf28e5652012-10-25 23:34:41 -05005629 goto out_mem;
Alex Elder859c31d2012-10-25 23:34:42 -05005630
5631 spec->pool_name = dup_token(&buf, NULL);
5632 if (!spec->pool_name)
5633 goto out_mem;
Alex Elder4fb5d6712012-11-01 10:17:15 -05005634 if (!*spec->pool_name) {
5635 rbd_warn(NULL, "no pool name provided");
5636 goto out_err;
5637 }
Alex Eldere28fff262012-02-02 08:13:30 -06005638
Alex Elder69e7a022012-11-01 08:39:26 -05005639 spec->image_name = dup_token(&buf, NULL);
Alex Elder859c31d2012-10-25 23:34:42 -05005640 if (!spec->image_name)
Alex Elderf28e5652012-10-25 23:34:41 -05005641 goto out_mem;
Alex Elder4fb5d6712012-11-01 10:17:15 -05005642 if (!*spec->image_name) {
5643 rbd_warn(NULL, "no image name provided");
5644 goto out_err;
5645 }
Alex Eldere28fff262012-02-02 08:13:30 -06005646
Alex Elderf28e5652012-10-25 23:34:41 -05005647 /*
5648 * Snapshot name is optional; default is to use "-"
5649 * (indicating the head/no snapshot).
5650 */
Alex Elder3feeb8942012-08-31 17:29:52 -05005651 len = next_token(&buf);
Alex Elder820a5f32012-07-09 21:04:24 -05005652 if (!len) {
Alex Elder3feeb8942012-08-31 17:29:52 -05005653 buf = RBD_SNAP_HEAD_NAME; /* No snapshot supplied */
5654 len = sizeof (RBD_SNAP_HEAD_NAME) - 1;
Alex Elderf28e5652012-10-25 23:34:41 -05005655 } else if (len > RBD_MAX_SNAP_NAME_LEN) {
Alex Elderdc79b112012-10-25 23:34:41 -05005656 ret = -ENAMETOOLONG;
Alex Elderf28e5652012-10-25 23:34:41 -05005657 goto out_err;
Alex Elder849b4262012-07-09 21:04:24 -05005658 }
Alex Elderecb4dc22013-04-26 09:43:47 -05005659 snap_name = kmemdup(buf, len + 1, GFP_KERNEL);
5660 if (!snap_name)
Alex Elderf28e5652012-10-25 23:34:41 -05005661 goto out_mem;
Alex Elderecb4dc22013-04-26 09:43:47 -05005662 *(snap_name + len) = '\0';
5663 spec->snap_name = snap_name;
Alex Eldere5c35532012-10-25 23:34:41 -05005664
Alex Elder0ddebc02012-10-25 23:34:41 -05005665 /* Initialize all rbd options to the defaults */
Alex Eldere28fff262012-02-02 08:13:30 -06005666
Alex Elder4e9afeb2012-10-25 23:34:41 -05005667 rbd_opts = kzalloc(sizeof (*rbd_opts), GFP_KERNEL);
5668 if (!rbd_opts)
5669 goto out_mem;
5670
5671 rbd_opts->read_only = RBD_READ_ONLY_DEFAULT;
Ilya Dryomovb5584182015-06-23 16:21:19 +03005672 rbd_opts->queue_depth = RBD_QUEUE_DEPTH_DEFAULT;
Ilya Dryomov80de1912016-09-20 14:23:17 +02005673 rbd_opts->lock_on_read = RBD_LOCK_ON_READ_DEFAULT;
Ilya Dryomove010dd02017-04-13 12:17:39 +02005674 rbd_opts->exclusive = RBD_EXCLUSIVE_DEFAULT;
Alex Elderd22f76e2012-07-12 10:46:35 -05005675
Alex Elder859c31d2012-10-25 23:34:42 -05005676 copts = ceph_parse_options(options, mon_addrs,
Alex Elder0ddebc02012-10-25 23:34:41 -05005677 mon_addrs + mon_addrs_size - 1,
Alex Elder4e9afeb2012-10-25 23:34:41 -05005678 parse_rbd_opts_token, rbd_opts);
Alex Elder859c31d2012-10-25 23:34:42 -05005679 if (IS_ERR(copts)) {
5680 ret = PTR_ERR(copts);
Alex Elderdc79b112012-10-25 23:34:41 -05005681 goto out_err;
5682 }
Alex Elder859c31d2012-10-25 23:34:42 -05005683 kfree(options);
5684
5685 *ceph_opts = copts;
Alex Elder4e9afeb2012-10-25 23:34:41 -05005686 *opts = rbd_opts;
Alex Elder859c31d2012-10-25 23:34:42 -05005687 *rbd_spec = spec;
Alex Elder0ddebc02012-10-25 23:34:41 -05005688
Alex Elderdc79b112012-10-25 23:34:41 -05005689 return 0;
Alex Elderf28e5652012-10-25 23:34:41 -05005690out_mem:
Alex Elderdc79b112012-10-25 23:34:41 -05005691 ret = -ENOMEM;
Alex Elderd22f76e2012-07-12 10:46:35 -05005692out_err:
Alex Elder859c31d2012-10-25 23:34:42 -05005693 kfree(rbd_opts);
5694 rbd_spec_put(spec);
Alex Elderf28e5652012-10-25 23:34:41 -05005695 kfree(options);
Alex Elderd22f76e2012-07-12 10:46:35 -05005696
Alex Elderdc79b112012-10-25 23:34:41 -05005697 return ret;
Alex Eldera725f65e2012-02-02 08:13:30 -06005698}
5699
Alex Elder589d30e2012-07-10 20:30:11 -05005700/*
Ilya Dryomov30ba1f02014-05-13 11:19:27 +04005701 * Return pool id (>= 0) or a negative error code.
5702 */
5703static int rbd_add_get_pool_id(struct rbd_client *rbdc, const char *pool_name)
5704{
Ilya Dryomova319bf52015-05-15 12:02:17 +03005705 struct ceph_options *opts = rbdc->client->options;
Ilya Dryomov30ba1f02014-05-13 11:19:27 +04005706 u64 newest_epoch;
Ilya Dryomov30ba1f02014-05-13 11:19:27 +04005707 int tries = 0;
5708 int ret;
5709
5710again:
5711 ret = ceph_pg_poolid_by_name(rbdc->client->osdc.osdmap, pool_name);
5712 if (ret == -ENOENT && tries++ < 1) {
Ilya Dryomovd0b19702016-04-28 16:07:27 +02005713 ret = ceph_monc_get_version(&rbdc->client->monc, "osdmap",
5714 &newest_epoch);
Ilya Dryomov30ba1f02014-05-13 11:19:27 +04005715 if (ret < 0)
5716 return ret;
5717
5718 if (rbdc->client->osdc.osdmap->epoch < newest_epoch) {
Ilya Dryomov7cca78c2016-04-28 16:07:28 +02005719 ceph_osdc_maybe_request_map(&rbdc->client->osdc);
Ilya Dryomov30ba1f02014-05-13 11:19:27 +04005720 (void) ceph_monc_wait_osdmap(&rbdc->client->monc,
Ilya Dryomova319bf52015-05-15 12:02:17 +03005721 newest_epoch,
5722 opts->mount_timeout);
Ilya Dryomov30ba1f02014-05-13 11:19:27 +04005723 goto again;
5724 } else {
5725 /* the osdmap we have is new enough */
5726 return -ENOENT;
5727 }
5728 }
5729
5730 return ret;
5731}
5732
Ilya Dryomove010dd02017-04-13 12:17:39 +02005733static void rbd_dev_image_unlock(struct rbd_device *rbd_dev)
5734{
5735 down_write(&rbd_dev->lock_rwsem);
5736 if (__rbd_is_lock_owner(rbd_dev))
5737 rbd_unlock(rbd_dev);
5738 up_write(&rbd_dev->lock_rwsem);
5739}
5740
5741static int rbd_add_acquire_lock(struct rbd_device *rbd_dev)
5742{
5743 if (!(rbd_dev->header.features & RBD_FEATURE_EXCLUSIVE_LOCK)) {
5744 rbd_warn(rbd_dev, "exclusive-lock feature is not enabled");
5745 return -EINVAL;
5746 }
5747
5748 /* FIXME: "rbd map --exclusive" should be in interruptible */
5749 down_read(&rbd_dev->lock_rwsem);
5750 rbd_wait_state_locked(rbd_dev);
5751 up_read(&rbd_dev->lock_rwsem);
5752 if (test_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags)) {
5753 rbd_warn(rbd_dev, "failed to acquire exclusive lock");
5754 return -EROFS;
5755 }
5756
5757 return 0;
5758}
5759
Ilya Dryomov30ba1f02014-05-13 11:19:27 +04005760/*
Alex Elder589d30e2012-07-10 20:30:11 -05005761 * An rbd format 2 image has a unique identifier, distinct from the
5762 * name given to it by the user. Internally, that identifier is
5763 * what's used to specify the names of objects related to the image.
5764 *
5765 * A special "rbd id" object is used to map an rbd image name to its
5766 * id. If that object doesn't exist, then there is no v2 rbd image
5767 * with the supplied name.
5768 *
5769 * This function will record the given rbd_dev's image_id field if
5770 * it can be determined, and in that case will return 0. If any
5771 * errors occur a negative errno will be returned and the rbd_dev's
5772 * image_id field will be unchanged (and should be NULL).
5773 */
5774static int rbd_dev_image_id(struct rbd_device *rbd_dev)
5775{
5776 int ret;
5777 size_t size;
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005778 CEPH_DEFINE_OID_ONSTACK(oid);
Alex Elder589d30e2012-07-10 20:30:11 -05005779 void *response;
Alex Elderc0fba362013-04-25 23:15:08 -05005780 char *image_id;
Alex Elder2f82ee52012-10-30 19:40:33 -05005781
Alex Elder589d30e2012-07-10 20:30:11 -05005782 /*
Alex Elder2c0d0a12012-10-30 19:40:33 -05005783 * When probing a parent image, the image id is already
5784 * known (and the image name likely is not). There's no
Alex Elderc0fba362013-04-25 23:15:08 -05005785 * need to fetch the image id again in this case. We
5786 * do still need to set the image format though.
Alex Elder2c0d0a12012-10-30 19:40:33 -05005787 */
Alex Elderc0fba362013-04-25 23:15:08 -05005788 if (rbd_dev->spec->image_id) {
5789 rbd_dev->image_format = *rbd_dev->spec->image_id ? 2 : 1;
5790
Alex Elder2c0d0a12012-10-30 19:40:33 -05005791 return 0;
Alex Elderc0fba362013-04-25 23:15:08 -05005792 }
Alex Elder2c0d0a12012-10-30 19:40:33 -05005793
5794 /*
Alex Elder589d30e2012-07-10 20:30:11 -05005795 * First, see if the format 2 image id file exists, and if
5796 * so, get the image's persistent id from it.
5797 */
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005798 ret = ceph_oid_aprintf(&oid, GFP_KERNEL, "%s%s", RBD_ID_PREFIX,
5799 rbd_dev->spec->image_name);
5800 if (ret)
5801 return ret;
5802
5803 dout("rbd id object name is %s\n", oid.name);
Alex Elder589d30e2012-07-10 20:30:11 -05005804
5805 /* Response will be an encoded string, which includes a length */
5806
5807 size = sizeof (__le32) + RBD_IMAGE_ID_LEN_MAX;
5808 response = kzalloc(size, GFP_NOIO);
5809 if (!response) {
5810 ret = -ENOMEM;
5811 goto out;
5812 }
5813
Alex Elderc0fba362013-04-25 23:15:08 -05005814 /* If it doesn't exist we'll assume it's a format 1 image */
5815
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005816 ret = rbd_obj_method_sync(rbd_dev, &oid, &rbd_dev->header_oloc,
5817 "get_id", NULL, 0,
5818 response, RBD_IMAGE_ID_LEN_MAX);
Alex Elder36be9a72013-01-19 00:30:28 -06005819 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elderc0fba362013-04-25 23:15:08 -05005820 if (ret == -ENOENT) {
5821 image_id = kstrdup("", GFP_KERNEL);
5822 ret = image_id ? 0 : -ENOMEM;
5823 if (!ret)
5824 rbd_dev->image_format = 1;
Ilya Dryomov7dd440c2014-09-11 18:49:18 +04005825 } else if (ret >= 0) {
Alex Elderc0fba362013-04-25 23:15:08 -05005826 void *p = response;
Alex Elder589d30e2012-07-10 20:30:11 -05005827
Alex Elderc0fba362013-04-25 23:15:08 -05005828 image_id = ceph_extract_encoded_string(&p, p + ret,
Alex Elder979ed482012-11-01 08:39:26 -05005829 NULL, GFP_NOIO);
Duan Jiong461f7582014-04-11 16:38:12 +08005830 ret = PTR_ERR_OR_ZERO(image_id);
Alex Elderc0fba362013-04-25 23:15:08 -05005831 if (!ret)
5832 rbd_dev->image_format = 2;
Alex Elderc0fba362013-04-25 23:15:08 -05005833 }
5834
5835 if (!ret) {
5836 rbd_dev->spec->image_id = image_id;
5837 dout("image_id is %s\n", image_id);
Alex Elder589d30e2012-07-10 20:30:11 -05005838 }
5839out:
5840 kfree(response);
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005841 ceph_oid_destroy(&oid);
Alex Elder589d30e2012-07-10 20:30:11 -05005842 return ret;
5843}
5844
Alex Elder3abef3b2013-05-13 20:35:37 -05005845/*
5846 * Undo whatever state changes are made by v1 or v2 header info
5847 * call.
5848 */
Alex Elder6fd48b32013-04-28 23:32:34 -05005849static void rbd_dev_unprobe(struct rbd_device *rbd_dev)
5850{
5851 struct rbd_image_header *header;
5852
Ilya Dryomove69b8d42015-01-19 12:06:14 +03005853 rbd_dev_parent_put(rbd_dev);
Alex Elder6fd48b32013-04-28 23:32:34 -05005854
5855 /* Free dynamic fields from the header, then zero it out */
5856
5857 header = &rbd_dev->header;
Alex Elder812164f82013-04-30 00:44:32 -05005858 ceph_put_snap_context(header->snapc);
Alex Elder6fd48b32013-04-28 23:32:34 -05005859 kfree(header->snap_sizes);
5860 kfree(header->snap_names);
5861 kfree(header->object_prefix);
5862 memset(header, 0, sizeof (*header));
5863}
5864
Alex Elder2df3fac2013-05-06 09:51:30 -05005865static int rbd_dev_v2_header_onetime(struct rbd_device *rbd_dev)
Alex Eldera30b71b2012-07-10 20:30:11 -05005866{
5867 int ret;
Alex Eldera30b71b2012-07-10 20:30:11 -05005868
Alex Elder1e130192012-07-03 16:01:19 -05005869 ret = rbd_dev_v2_object_prefix(rbd_dev);
Alex Elder57385b52013-04-21 12:14:45 -05005870 if (ret)
Alex Elder1e130192012-07-03 16:01:19 -05005871 goto out_err;
Alex Elderb1b54022012-07-03 16:01:19 -05005872
Alex Elder2df3fac2013-05-06 09:51:30 -05005873 /*
5874 * Get the and check features for the image. Currently the
5875 * features are assumed to never change.
5876 */
Alex Elderb1b54022012-07-03 16:01:19 -05005877 ret = rbd_dev_v2_features(rbd_dev);
Alex Elder57385b52013-04-21 12:14:45 -05005878 if (ret)
Alex Elderb1b54022012-07-03 16:01:19 -05005879 goto out_err;
Alex Elder35d489f2012-07-03 16:01:19 -05005880
Alex Eldercc070d52013-04-21 12:14:45 -05005881 /* If the image supports fancy striping, get its parameters */
5882
5883 if (rbd_dev->header.features & RBD_FEATURE_STRIPINGV2) {
5884 ret = rbd_dev_v2_striping_info(rbd_dev);
5885 if (ret < 0)
5886 goto out_err;
5887 }
Alex Eldera30b71b2012-07-10 20:30:11 -05005888
Ilya Dryomov7e973322017-01-25 18:16:22 +01005889 if (rbd_dev->header.features & RBD_FEATURE_DATA_POOL) {
5890 ret = rbd_dev_v2_data_pool(rbd_dev);
5891 if (ret)
5892 goto out_err;
5893 }
5894
Ilya Dryomov263423f2017-01-25 18:16:22 +01005895 rbd_init_layout(rbd_dev);
Alex Elder35152972012-08-31 17:29:55 -05005896 return 0;
Ilya Dryomov263423f2017-01-25 18:16:22 +01005897
Alex Elder9d475de2012-07-03 16:01:19 -05005898out_err:
Alex Elder642a2532013-05-06 17:40:33 -05005899 rbd_dev->header.features = 0;
Alex Elder1e130192012-07-03 16:01:19 -05005900 kfree(rbd_dev->header.object_prefix);
5901 rbd_dev->header.object_prefix = NULL;
Alex Elder9d475de2012-07-03 16:01:19 -05005902 return ret;
Alex Eldera30b71b2012-07-10 20:30:11 -05005903}
5904
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005905/*
5906 * @depth is rbd_dev_image_probe() -> rbd_dev_probe_parent() ->
5907 * rbd_dev_image_probe() recursion depth, which means it's also the
5908 * length of the already discovered part of the parent chain.
5909 */
5910static int rbd_dev_probe_parent(struct rbd_device *rbd_dev, int depth)
Alex Elder83a06262012-10-30 15:47:17 -05005911{
Alex Elder2f82ee52012-10-30 19:40:33 -05005912 struct rbd_device *parent = NULL;
Alex Elder124afba2013-04-26 15:44:36 -05005913 int ret;
5914
5915 if (!rbd_dev->parent_spec)
5916 return 0;
Alex Elder124afba2013-04-26 15:44:36 -05005917
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005918 if (++depth > RBD_MAX_PARENT_CHAIN_LEN) {
5919 pr_info("parent chain is too long (%d)\n", depth);
5920 ret = -EINVAL;
5921 goto out_err;
5922 }
5923
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02005924 parent = __rbd_dev_create(rbd_dev->rbd_client, rbd_dev->parent_spec);
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005925 if (!parent) {
5926 ret = -ENOMEM;
Alex Elder124afba2013-04-26 15:44:36 -05005927 goto out_err;
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005928 }
5929
5930 /*
5931 * Images related by parent/child relationships always share
5932 * rbd_client and spec/parent_spec, so bump their refcounts.
5933 */
5934 __rbd_get_client(rbd_dev->rbd_client);
5935 rbd_spec_get(rbd_dev->parent_spec);
Alex Elder124afba2013-04-26 15:44:36 -05005936
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005937 ret = rbd_dev_image_probe(parent, depth);
Alex Elder124afba2013-04-26 15:44:36 -05005938 if (ret < 0)
5939 goto out_err;
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005940
Alex Elder124afba2013-04-26 15:44:36 -05005941 rbd_dev->parent = parent;
Alex Eldera2acd002013-05-08 22:50:04 -05005942 atomic_set(&rbd_dev->parent_ref, 1);
Alex Elder124afba2013-04-26 15:44:36 -05005943 return 0;
Alex Elder124afba2013-04-26 15:44:36 -05005944
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005945out_err:
5946 rbd_dev_unparent(rbd_dev);
Markus Elfring1761b222015-11-23 20:16:45 +01005947 rbd_dev_destroy(parent);
Alex Elder124afba2013-04-26 15:44:36 -05005948 return ret;
5949}
5950
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005951static void rbd_dev_device_release(struct rbd_device *rbd_dev)
5952{
5953 clear_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags);
5954 rbd_dev_mapping_clear(rbd_dev);
5955 rbd_free_disk(rbd_dev);
5956 if (!single_major)
5957 unregister_blkdev(rbd_dev->major, rbd_dev->name);
5958}
5959
Ilya Dryomov811c6682016-04-15 16:22:16 +02005960/*
5961 * rbd_dev->header_rwsem must be locked for write and will be unlocked
5962 * upon return.
5963 */
Alex Elder200a6a82013-04-28 23:32:34 -05005964static int rbd_dev_device_setup(struct rbd_device *rbd_dev)
Alex Elder124afba2013-04-26 15:44:36 -05005965{
Alex Elder83a06262012-10-30 15:47:17 -05005966 int ret;
Alex Elder83a06262012-10-30 15:47:17 -05005967
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005968 /* Record our major and minor device numbers. */
Alex Elder83a06262012-10-30 15:47:17 -05005969
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005970 if (!single_major) {
5971 ret = register_blkdev(0, rbd_dev->name);
5972 if (ret < 0)
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02005973 goto err_out_unlock;
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005974
5975 rbd_dev->major = ret;
5976 rbd_dev->minor = 0;
5977 } else {
5978 rbd_dev->major = rbd_major;
5979 rbd_dev->minor = rbd_dev_id_to_minor(rbd_dev->dev_id);
5980 }
Alex Elder83a06262012-10-30 15:47:17 -05005981
5982 /* Set up the blkdev mapping. */
5983
5984 ret = rbd_init_disk(rbd_dev);
5985 if (ret)
5986 goto err_out_blkdev;
5987
Alex Elderf35a4de2013-05-06 09:51:29 -05005988 ret = rbd_dev_mapping_set(rbd_dev);
Alex Elder83a06262012-10-30 15:47:17 -05005989 if (ret)
5990 goto err_out_disk;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04005991
Alex Elderf35a4de2013-05-06 09:51:29 -05005992 set_capacity(rbd_dev->disk, rbd_dev->mapping.size / SECTOR_SIZE);
Josh Durgin22001f62013-09-30 20:10:04 -07005993 set_disk_ro(rbd_dev->disk, rbd_dev->mapping.read_only);
Alex Elderf35a4de2013-05-06 09:51:29 -05005994
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005995 ret = dev_set_name(&rbd_dev->dev, "%d", rbd_dev->dev_id);
Alex Elderf35a4de2013-05-06 09:51:29 -05005996 if (ret)
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005997 goto err_out_mapping;
Alex Elder83a06262012-10-30 15:47:17 -05005998
Alex Elder129b79d2013-04-26 15:44:36 -05005999 set_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags);
Ilya Dryomov811c6682016-04-15 16:22:16 +02006000 up_write(&rbd_dev->header_rwsem);
Ilya Dryomov5769ed02017-04-13 12:17:38 +02006001 return 0;
Alex Elder2f82ee52012-10-30 19:40:33 -05006002
Alex Elderf35a4de2013-05-06 09:51:29 -05006003err_out_mapping:
6004 rbd_dev_mapping_clear(rbd_dev);
Alex Elder83a06262012-10-30 15:47:17 -05006005err_out_disk:
6006 rbd_free_disk(rbd_dev);
6007err_out_blkdev:
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006008 if (!single_major)
6009 unregister_blkdev(rbd_dev->major, rbd_dev->name);
Ilya Dryomov811c6682016-04-15 16:22:16 +02006010err_out_unlock:
6011 up_write(&rbd_dev->header_rwsem);
Alex Elder83a06262012-10-30 15:47:17 -05006012 return ret;
6013}
6014
Alex Elder332bb122013-04-27 09:59:30 -05006015static int rbd_dev_header_name(struct rbd_device *rbd_dev)
6016{
6017 struct rbd_spec *spec = rbd_dev->spec;
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02006018 int ret;
Alex Elder332bb122013-04-27 09:59:30 -05006019
6020 /* Record the header object name for this rbd image. */
6021
6022 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
Alex Elder332bb122013-04-27 09:59:30 -05006023 if (rbd_dev->image_format == 1)
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02006024 ret = ceph_oid_aprintf(&rbd_dev->header_oid, GFP_KERNEL, "%s%s",
6025 spec->image_name, RBD_SUFFIX);
Alex Elder332bb122013-04-27 09:59:30 -05006026 else
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02006027 ret = ceph_oid_aprintf(&rbd_dev->header_oid, GFP_KERNEL, "%s%s",
6028 RBD_HEADER_PREFIX, spec->image_id);
Alex Elder332bb122013-04-27 09:59:30 -05006029
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02006030 return ret;
Alex Elder332bb122013-04-27 09:59:30 -05006031}
6032
Alex Elder200a6a82013-04-28 23:32:34 -05006033static void rbd_dev_image_release(struct rbd_device *rbd_dev)
6034{
Alex Elder6fd48b32013-04-28 23:32:34 -05006035 rbd_dev_unprobe(rbd_dev);
Ilya Dryomovfd22aef2017-04-13 12:17:37 +02006036 if (rbd_dev->opts)
6037 rbd_unregister_watch(rbd_dev);
Alex Elder6fd48b32013-04-28 23:32:34 -05006038 rbd_dev->image_format = 0;
6039 kfree(rbd_dev->spec->image_id);
6040 rbd_dev->spec->image_id = NULL;
Alex Elder200a6a82013-04-28 23:32:34 -05006041}
6042
Alex Eldera30b71b2012-07-10 20:30:11 -05006043/*
6044 * Probe for the existence of the header object for the given rbd
Alex Elder1f3ef782013-05-06 17:40:33 -05006045 * device. If this image is the one being mapped (i.e., not a
6046 * parent), initiate a watch on its header object before using that
6047 * object to get detailed information about the rbd image.
Alex Eldera30b71b2012-07-10 20:30:11 -05006048 */
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02006049static int rbd_dev_image_probe(struct rbd_device *rbd_dev, int depth)
Alex Eldera30b71b2012-07-10 20:30:11 -05006050{
6051 int ret;
6052
6053 /*
Alex Elder3abef3b2013-05-13 20:35:37 -05006054 * Get the id from the image id object. Unless there's an
6055 * error, rbd_dev->spec->image_id will be filled in with
6056 * a dynamically-allocated string, and rbd_dev->image_format
6057 * will be set to either 1 or 2.
Alex Eldera30b71b2012-07-10 20:30:11 -05006058 */
6059 ret = rbd_dev_image_id(rbd_dev);
6060 if (ret)
Alex Elderc0fba362013-04-25 23:15:08 -05006061 return ret;
Alex Elderc0fba362013-04-25 23:15:08 -05006062
Alex Elder332bb122013-04-27 09:59:30 -05006063 ret = rbd_dev_header_name(rbd_dev);
6064 if (ret)
6065 goto err_out_format;
6066
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02006067 if (!depth) {
Ilya Dryomov99d16942016-08-12 16:11:41 +02006068 ret = rbd_register_watch(rbd_dev);
Ilya Dryomov1fe48022015-03-05 10:47:22 +03006069 if (ret) {
6070 if (ret == -ENOENT)
6071 pr_info("image %s/%s does not exist\n",
6072 rbd_dev->spec->pool_name,
6073 rbd_dev->spec->image_name);
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02006074 goto err_out_format;
Ilya Dryomov1fe48022015-03-05 10:47:22 +03006075 }
Alex Elder1f3ef782013-05-06 17:40:33 -05006076 }
Alex Elderb644de22013-04-27 09:59:31 -05006077
Ilya Dryomova720ae02014-07-23 17:11:19 +04006078 ret = rbd_dev_header_info(rbd_dev);
Alex Elder5655c4d2013-04-25 23:15:08 -05006079 if (ret)
Alex Elderb644de22013-04-27 09:59:31 -05006080 goto err_out_watch;
Alex Elder83a06262012-10-30 15:47:17 -05006081
Ilya Dryomov04077592014-07-23 17:11:20 +04006082 /*
6083 * If this image is the one being mapped, we have pool name and
6084 * id, image name and id, and snap name - need to fill snap id.
6085 * Otherwise this is a parent image, identified by pool, image
6086 * and snap ids - need to fill in names for those ids.
6087 */
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02006088 if (!depth)
Ilya Dryomov04077592014-07-23 17:11:20 +04006089 ret = rbd_spec_fill_snap_id(rbd_dev);
6090 else
6091 ret = rbd_spec_fill_names(rbd_dev);
Ilya Dryomov1fe48022015-03-05 10:47:22 +03006092 if (ret) {
6093 if (ret == -ENOENT)
6094 pr_info("snap %s/%s@%s does not exist\n",
6095 rbd_dev->spec->pool_name,
6096 rbd_dev->spec->image_name,
6097 rbd_dev->spec->snap_name);
Alex Elder33dca392013-04-30 00:44:33 -05006098 goto err_out_probe;
Ilya Dryomov1fe48022015-03-05 10:47:22 +03006099 }
Alex Elder9bb81c92013-04-27 09:59:30 -05006100
Ilya Dryomove8f59b52014-07-24 10:42:13 +04006101 if (rbd_dev->header.features & RBD_FEATURE_LAYERING) {
6102 ret = rbd_dev_v2_parent_info(rbd_dev);
6103 if (ret)
6104 goto err_out_probe;
6105
6106 /*
6107 * Need to warn users if this image is the one being
6108 * mapped and has a parent.
6109 */
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02006110 if (!depth && rbd_dev->parent_spec)
Ilya Dryomove8f59b52014-07-24 10:42:13 +04006111 rbd_warn(rbd_dev,
6112 "WARNING: kernel layering is EXPERIMENTAL!");
6113 }
6114
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02006115 ret = rbd_dev_probe_parent(rbd_dev, depth);
Alex Elder30d60ba2013-05-06 09:51:30 -05006116 if (ret)
6117 goto err_out_probe;
Alex Elder83a06262012-10-30 15:47:17 -05006118
Alex Elder30d60ba2013-05-06 09:51:30 -05006119 dout("discovered format %u image, header name is %s\n",
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02006120 rbd_dev->image_format, rbd_dev->header_oid.name);
Alex Elder30d60ba2013-05-06 09:51:30 -05006121 return 0;
Ilya Dryomove8f59b52014-07-24 10:42:13 +04006122
Alex Elder6fd48b32013-04-28 23:32:34 -05006123err_out_probe:
6124 rbd_dev_unprobe(rbd_dev);
Alex Elderb644de22013-04-27 09:59:31 -05006125err_out_watch:
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02006126 if (!depth)
Ilya Dryomov99d16942016-08-12 16:11:41 +02006127 rbd_unregister_watch(rbd_dev);
Alex Elder332bb122013-04-27 09:59:30 -05006128err_out_format:
6129 rbd_dev->image_format = 0;
Alex Elder5655c4d2013-04-25 23:15:08 -05006130 kfree(rbd_dev->spec->image_id);
6131 rbd_dev->spec->image_id = NULL;
Alex Elder5655c4d2013-04-25 23:15:08 -05006132 return ret;
Alex Eldera30b71b2012-07-10 20:30:11 -05006133}
6134
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006135static ssize_t do_rbd_add(struct bus_type *bus,
6136 const char *buf,
6137 size_t count)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006138{
Alex Eldercb8627c2012-07-09 21:04:23 -05006139 struct rbd_device *rbd_dev = NULL;
Alex Elderdc79b112012-10-25 23:34:41 -05006140 struct ceph_options *ceph_opts = NULL;
Alex Elder4e9afeb2012-10-25 23:34:41 -05006141 struct rbd_options *rbd_opts = NULL;
Alex Elder859c31d2012-10-25 23:34:42 -05006142 struct rbd_spec *spec = NULL;
Alex Elder9d3997f2012-10-25 23:34:42 -05006143 struct rbd_client *rbdc;
Alex Elder51344a32013-05-06 07:40:30 -05006144 bool read_only;
Ilya Dryomovb51c83c2015-10-15 15:38:57 +02006145 int rc;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006146
6147 if (!try_module_get(THIS_MODULE))
6148 return -ENODEV;
6149
Alex Eldera725f65e2012-02-02 08:13:30 -06006150 /* parse add command */
Alex Elder859c31d2012-10-25 23:34:42 -05006151 rc = rbd_add_parse_args(buf, &ceph_opts, &rbd_opts, &spec);
Alex Elderdc79b112012-10-25 23:34:41 -05006152 if (rc < 0)
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02006153 goto out;
Alex Eldera725f65e2012-02-02 08:13:30 -06006154
Alex Elder9d3997f2012-10-25 23:34:42 -05006155 rbdc = rbd_get_client(ceph_opts);
6156 if (IS_ERR(rbdc)) {
6157 rc = PTR_ERR(rbdc);
Alex Elder0ddebc02012-10-25 23:34:41 -05006158 goto err_out_args;
Alex Elder9d3997f2012-10-25 23:34:42 -05006159 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006160
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006161 /* pick the pool */
Ilya Dryomov30ba1f02014-05-13 11:19:27 +04006162 rc = rbd_add_get_pool_id(rbdc, spec->pool_name);
Ilya Dryomov1fe48022015-03-05 10:47:22 +03006163 if (rc < 0) {
6164 if (rc == -ENOENT)
6165 pr_info("pool %s does not exist\n", spec->pool_name);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006166 goto err_out_client;
Ilya Dryomov1fe48022015-03-05 10:47:22 +03006167 }
Alex Elderc0cd10db2013-04-26 09:43:47 -05006168 spec->pool_id = (u64)rc;
Alex Elder859c31d2012-10-25 23:34:42 -05006169
Ilya Dryomovd1475432015-06-22 13:24:48 +03006170 rbd_dev = rbd_dev_create(rbdc, spec, rbd_opts);
Ilya Dryomovb51c83c2015-10-15 15:38:57 +02006171 if (!rbd_dev) {
6172 rc = -ENOMEM;
Alex Elderbd4ba652012-10-25 23:34:42 -05006173 goto err_out_client;
Ilya Dryomovb51c83c2015-10-15 15:38:57 +02006174 }
Alex Elderc53d5892012-10-25 23:34:42 -05006175 rbdc = NULL; /* rbd_dev now owns this */
6176 spec = NULL; /* rbd_dev now owns this */
Ilya Dryomovd1475432015-06-22 13:24:48 +03006177 rbd_opts = NULL; /* rbd_dev now owns this */
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006178
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02006179 rbd_dev->config_info = kstrdup(buf, GFP_KERNEL);
6180 if (!rbd_dev->config_info) {
6181 rc = -ENOMEM;
6182 goto err_out_rbd_dev;
6183 }
6184
Ilya Dryomov811c6682016-04-15 16:22:16 +02006185 down_write(&rbd_dev->header_rwsem);
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02006186 rc = rbd_dev_image_probe(rbd_dev, 0);
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02006187 if (rc < 0) {
6188 up_write(&rbd_dev->header_rwsem);
Alex Elderc53d5892012-10-25 23:34:42 -05006189 goto err_out_rbd_dev;
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02006190 }
Alex Elder05fd6f62012-08-29 17:11:07 -05006191
Alex Elder7ce4eef2013-05-06 17:40:33 -05006192 /* If we are mapping a snapshot it must be marked read-only */
6193
Ilya Dryomovd1475432015-06-22 13:24:48 +03006194 read_only = rbd_dev->opts->read_only;
Alex Elder7ce4eef2013-05-06 17:40:33 -05006195 if (rbd_dev->spec->snap_id != CEPH_NOSNAP)
6196 read_only = true;
6197 rbd_dev->mapping.read_only = read_only;
6198
Alex Elderb536f692013-04-28 23:32:34 -05006199 rc = rbd_dev_device_setup(rbd_dev);
Ilya Dryomovfd22aef2017-04-13 12:17:37 +02006200 if (rc)
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02006201 goto err_out_image_probe;
Alex Elderb536f692013-04-28 23:32:34 -05006202
Ilya Dryomove010dd02017-04-13 12:17:39 +02006203 if (rbd_dev->opts->exclusive) {
6204 rc = rbd_add_acquire_lock(rbd_dev);
6205 if (rc)
6206 goto err_out_device_setup;
Alex Elderb536f692013-04-28 23:32:34 -05006207 }
6208
Ilya Dryomov5769ed02017-04-13 12:17:38 +02006209 /* Everything's ready. Announce the disk to the world. */
6210
6211 rc = device_add(&rbd_dev->dev);
6212 if (rc)
Ilya Dryomove010dd02017-04-13 12:17:39 +02006213 goto err_out_image_lock;
Ilya Dryomov5769ed02017-04-13 12:17:38 +02006214
6215 add_disk(rbd_dev->disk);
6216 /* see rbd_init_disk() */
6217 blk_put_queue(rbd_dev->disk->queue);
6218
6219 spin_lock(&rbd_dev_list_lock);
6220 list_add_tail(&rbd_dev->node, &rbd_dev_list);
6221 spin_unlock(&rbd_dev_list_lock);
6222
6223 pr_info("%s: capacity %llu features 0x%llx\n", rbd_dev->disk->disk_name,
6224 (unsigned long long)get_capacity(rbd_dev->disk) << SECTOR_SHIFT,
6225 rbd_dev->header.features);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02006226 rc = count;
6227out:
6228 module_put(THIS_MODULE);
6229 return rc;
Alex Elder3abef3b2013-05-13 20:35:37 -05006230
Ilya Dryomove010dd02017-04-13 12:17:39 +02006231err_out_image_lock:
6232 rbd_dev_image_unlock(rbd_dev);
Ilya Dryomov5769ed02017-04-13 12:17:38 +02006233err_out_device_setup:
6234 rbd_dev_device_release(rbd_dev);
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02006235err_out_image_probe:
6236 rbd_dev_image_release(rbd_dev);
Alex Elderc53d5892012-10-25 23:34:42 -05006237err_out_rbd_dev:
6238 rbd_dev_destroy(rbd_dev);
Alex Elderbd4ba652012-10-25 23:34:42 -05006239err_out_client:
Alex Elder9d3997f2012-10-25 23:34:42 -05006240 rbd_put_client(rbdc);
Alex Elder0ddebc02012-10-25 23:34:41 -05006241err_out_args:
Alex Elder859c31d2012-10-25 23:34:42 -05006242 rbd_spec_put(spec);
Ilya Dryomovd1475432015-06-22 13:24:48 +03006243 kfree(rbd_opts);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02006244 goto out;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006245}
6246
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006247static ssize_t rbd_add(struct bus_type *bus,
6248 const char *buf,
6249 size_t count)
6250{
6251 if (single_major)
6252 return -EINVAL;
6253
6254 return do_rbd_add(bus, buf, count);
6255}
6256
6257static ssize_t rbd_add_single_major(struct bus_type *bus,
6258 const char *buf,
6259 size_t count)
6260{
6261 return do_rbd_add(bus, buf, count);
6262}
6263
Alex Elder05a46af2013-04-26 15:44:36 -05006264static void rbd_dev_remove_parent(struct rbd_device *rbd_dev)
6265{
Alex Elderad945fc2013-04-26 15:44:36 -05006266 while (rbd_dev->parent) {
Alex Elder05a46af2013-04-26 15:44:36 -05006267 struct rbd_device *first = rbd_dev;
6268 struct rbd_device *second = first->parent;
6269 struct rbd_device *third;
6270
6271 /*
6272 * Follow to the parent with no grandparent and
6273 * remove it.
6274 */
6275 while (second && (third = second->parent)) {
6276 first = second;
6277 second = third;
6278 }
Alex Elderad945fc2013-04-26 15:44:36 -05006279 rbd_assert(second);
Alex Elder8ad42cd2013-04-28 23:32:34 -05006280 rbd_dev_image_release(second);
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02006281 rbd_dev_destroy(second);
Alex Elderad945fc2013-04-26 15:44:36 -05006282 first->parent = NULL;
6283 first->parent_overlap = 0;
6284
6285 rbd_assert(first->parent_spec);
Alex Elder05a46af2013-04-26 15:44:36 -05006286 rbd_spec_put(first->parent_spec);
6287 first->parent_spec = NULL;
Alex Elder05a46af2013-04-26 15:44:36 -05006288 }
6289}
6290
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006291static ssize_t do_rbd_remove(struct bus_type *bus,
6292 const char *buf,
6293 size_t count)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006294{
6295 struct rbd_device *rbd_dev = NULL;
Alex Elder751cc0e2013-05-31 15:17:01 -05006296 struct list_head *tmp;
6297 int dev_id;
Mike Christie0276dca2016-08-18 18:38:45 +02006298 char opt_buf[6];
Alex Elder82a442d2013-05-31 17:40:44 -05006299 bool already = false;
Mike Christie0276dca2016-08-18 18:38:45 +02006300 bool force = false;
Alex Elder0d8189e2013-04-27 09:59:30 -05006301 int ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006302
Mike Christie0276dca2016-08-18 18:38:45 +02006303 dev_id = -1;
6304 opt_buf[0] = '\0';
6305 sscanf(buf, "%d %5s", &dev_id, opt_buf);
6306 if (dev_id < 0) {
6307 pr_err("dev_id out of range\n");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006308 return -EINVAL;
Mike Christie0276dca2016-08-18 18:38:45 +02006309 }
6310 if (opt_buf[0] != '\0') {
6311 if (!strcmp(opt_buf, "force")) {
6312 force = true;
6313 } else {
6314 pr_err("bad remove option at '%s'\n", opt_buf);
6315 return -EINVAL;
6316 }
6317 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006318
Alex Elder751cc0e2013-05-31 15:17:01 -05006319 ret = -ENOENT;
6320 spin_lock(&rbd_dev_list_lock);
6321 list_for_each(tmp, &rbd_dev_list) {
6322 rbd_dev = list_entry(tmp, struct rbd_device, node);
6323 if (rbd_dev->dev_id == dev_id) {
6324 ret = 0;
6325 break;
6326 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006327 }
Alex Elder751cc0e2013-05-31 15:17:01 -05006328 if (!ret) {
6329 spin_lock_irq(&rbd_dev->lock);
Mike Christie0276dca2016-08-18 18:38:45 +02006330 if (rbd_dev->open_count && !force)
Alex Elder751cc0e2013-05-31 15:17:01 -05006331 ret = -EBUSY;
6332 else
Alex Elder82a442d2013-05-31 17:40:44 -05006333 already = test_and_set_bit(RBD_DEV_FLAG_REMOVING,
6334 &rbd_dev->flags);
Alex Elder751cc0e2013-05-31 15:17:01 -05006335 spin_unlock_irq(&rbd_dev->lock);
6336 }
6337 spin_unlock(&rbd_dev_list_lock);
Alex Elder82a442d2013-05-31 17:40:44 -05006338 if (ret < 0 || already)
Alex Elder1ba0f1e2013-05-31 15:17:01 -05006339 return ret;
Alex Elder751cc0e2013-05-31 15:17:01 -05006340
Mike Christie0276dca2016-08-18 18:38:45 +02006341 if (force) {
6342 /*
6343 * Prevent new IO from being queued and wait for existing
6344 * IO to complete/fail.
6345 */
6346 blk_mq_freeze_queue(rbd_dev->disk->queue);
6347 blk_set_queue_dying(rbd_dev->disk->queue);
6348 }
6349
Ilya Dryomov5769ed02017-04-13 12:17:38 +02006350 del_gendisk(rbd_dev->disk);
6351 spin_lock(&rbd_dev_list_lock);
6352 list_del_init(&rbd_dev->node);
6353 spin_unlock(&rbd_dev_list_lock);
6354 device_del(&rbd_dev->dev);
Ilya Dryomovfca27062013-12-16 18:02:40 +02006355
Ilya Dryomove010dd02017-04-13 12:17:39 +02006356 rbd_dev_image_unlock(rbd_dev);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02006357 rbd_dev_device_release(rbd_dev);
Alex Elder8ad42cd2013-04-28 23:32:34 -05006358 rbd_dev_image_release(rbd_dev);
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02006359 rbd_dev_destroy(rbd_dev);
Alex Elder1ba0f1e2013-05-31 15:17:01 -05006360 return count;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006361}
6362
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006363static ssize_t rbd_remove(struct bus_type *bus,
6364 const char *buf,
6365 size_t count)
6366{
6367 if (single_major)
6368 return -EINVAL;
6369
6370 return do_rbd_remove(bus, buf, count);
6371}
6372
6373static ssize_t rbd_remove_single_major(struct bus_type *bus,
6374 const char *buf,
6375 size_t count)
6376{
6377 return do_rbd_remove(bus, buf, count);
6378}
6379
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006380/*
6381 * create control files in sysfs
Yehuda Sadehdfc56062010-11-19 14:51:04 -08006382 * /sys/bus/rbd/...
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006383 */
6384static int rbd_sysfs_init(void)
6385{
Yehuda Sadehdfc56062010-11-19 14:51:04 -08006386 int ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006387
Alex Elderfed4c142012-02-07 12:03:36 -06006388 ret = device_register(&rbd_root_dev);
Alex Elder21079782012-01-24 10:08:36 -06006389 if (ret < 0)
Yehuda Sadehdfc56062010-11-19 14:51:04 -08006390 return ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006391
Alex Elderfed4c142012-02-07 12:03:36 -06006392 ret = bus_register(&rbd_bus_type);
6393 if (ret < 0)
6394 device_unregister(&rbd_root_dev);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006395
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006396 return ret;
6397}
6398
6399static void rbd_sysfs_cleanup(void)
6400{
Yehuda Sadehdfc56062010-11-19 14:51:04 -08006401 bus_unregister(&rbd_bus_type);
Alex Elderfed4c142012-02-07 12:03:36 -06006402 device_unregister(&rbd_root_dev);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006403}
6404
Alex Elder1c2a9df2013-05-01 12:43:03 -05006405static int rbd_slab_init(void)
6406{
6407 rbd_assert(!rbd_img_request_cache);
Geliang Tang03d94402016-03-13 15:17:32 +08006408 rbd_img_request_cache = KMEM_CACHE(rbd_img_request, 0);
Alex Elder868311b2013-05-01 12:43:03 -05006409 if (!rbd_img_request_cache)
6410 return -ENOMEM;
6411
6412 rbd_assert(!rbd_obj_request_cache);
Geliang Tang03d94402016-03-13 15:17:32 +08006413 rbd_obj_request_cache = KMEM_CACHE(rbd_obj_request, 0);
Alex Elder78c2a442013-05-01 12:43:04 -05006414 if (!rbd_obj_request_cache)
6415 goto out_err;
6416
Ilya Dryomov6c696d82017-01-25 18:16:23 +01006417 return 0;
Alex Elder1c2a9df2013-05-01 12:43:03 -05006418
Ilya Dryomov6c696d82017-01-25 18:16:23 +01006419out_err:
Alex Elder868311b2013-05-01 12:43:03 -05006420 kmem_cache_destroy(rbd_img_request_cache);
6421 rbd_img_request_cache = NULL;
Alex Elder1c2a9df2013-05-01 12:43:03 -05006422 return -ENOMEM;
6423}
6424
6425static void rbd_slab_exit(void)
6426{
Alex Elder868311b2013-05-01 12:43:03 -05006427 rbd_assert(rbd_obj_request_cache);
6428 kmem_cache_destroy(rbd_obj_request_cache);
6429 rbd_obj_request_cache = NULL;
6430
Alex Elder1c2a9df2013-05-01 12:43:03 -05006431 rbd_assert(rbd_img_request_cache);
6432 kmem_cache_destroy(rbd_img_request_cache);
6433 rbd_img_request_cache = NULL;
6434}
6435
Alex Eldercc344fa2013-02-19 12:25:56 -06006436static int __init rbd_init(void)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006437{
6438 int rc;
6439
Alex Elder1e32d342013-01-30 11:13:33 -06006440 if (!libceph_compatible(NULL)) {
6441 rbd_warn(NULL, "libceph incompatibility (quitting)");
Alex Elder1e32d342013-01-30 11:13:33 -06006442 return -EINVAL;
6443 }
Ilya Dryomove1b4d962013-12-13 15:28:57 +02006444
Alex Elder1c2a9df2013-05-01 12:43:03 -05006445 rc = rbd_slab_init();
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006446 if (rc)
6447 return rc;
Ilya Dryomove1b4d962013-12-13 15:28:57 +02006448
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04006449 /*
6450 * The number of active work items is limited by the number of
Ilya Dryomovf77303b2015-04-22 18:28:13 +03006451 * rbd devices * queue depth, so leave @max_active at default.
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04006452 */
6453 rbd_wq = alloc_workqueue(RBD_DRV_NAME, WQ_MEM_RECLAIM, 0);
6454 if (!rbd_wq) {
6455 rc = -ENOMEM;
6456 goto err_out_slab;
6457 }
6458
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006459 if (single_major) {
6460 rbd_major = register_blkdev(0, RBD_DRV_NAME);
6461 if (rbd_major < 0) {
6462 rc = rbd_major;
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04006463 goto err_out_wq;
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006464 }
6465 }
6466
Alex Elder1c2a9df2013-05-01 12:43:03 -05006467 rc = rbd_sysfs_init();
6468 if (rc)
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006469 goto err_out_blkdev;
Alex Elder1c2a9df2013-05-01 12:43:03 -05006470
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006471 if (single_major)
6472 pr_info("loaded (major %d)\n", rbd_major);
6473 else
6474 pr_info("loaded\n");
6475
Ilya Dryomove1b4d962013-12-13 15:28:57 +02006476 return 0;
6477
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006478err_out_blkdev:
6479 if (single_major)
6480 unregister_blkdev(rbd_major, RBD_DRV_NAME);
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04006481err_out_wq:
6482 destroy_workqueue(rbd_wq);
Ilya Dryomove1b4d962013-12-13 15:28:57 +02006483err_out_slab:
6484 rbd_slab_exit();
Alex Elder1c2a9df2013-05-01 12:43:03 -05006485 return rc;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006486}
6487
Alex Eldercc344fa2013-02-19 12:25:56 -06006488static void __exit rbd_exit(void)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006489{
Ilya Dryomovffe312c2014-05-20 15:46:04 +04006490 ida_destroy(&rbd_dev_id_ida);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006491 rbd_sysfs_cleanup();
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006492 if (single_major)
6493 unregister_blkdev(rbd_major, RBD_DRV_NAME);
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04006494 destroy_workqueue(rbd_wq);
Alex Elder1c2a9df2013-05-01 12:43:03 -05006495 rbd_slab_exit();
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006496}
6497
6498module_init(rbd_init);
6499module_exit(rbd_exit);
6500
Alex Elderd552c612013-05-31 20:13:09 -05006501MODULE_AUTHOR("Alex Elder <elder@inktank.com>");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006502MODULE_AUTHOR("Sage Weil <sage@newdream.net>");
6503MODULE_AUTHOR("Yehuda Sadeh <yehuda@hq.newdream.net>");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006504/* following authorship retained from original osdblk.c */
6505MODULE_AUTHOR("Jeff Garzik <jeff@garzik.org>");
6506
Ilya Dryomov90da2582013-12-13 15:28:56 +02006507MODULE_DESCRIPTION("RADOS Block Device (RBD) driver");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006508MODULE_LICENSE("GPL");