blob: 4e8949b88b053f0e31efeb410fdc68f77b4475c1 [file] [log] [blame]
Alex Eldere2a58ee2013-04-30 00:44:33 -05001
Yehuda Sadeh602adf42010-08-12 16:11:25 -07002/*
3 rbd.c -- Export ceph rados objects as a Linux block device
4
5
6 based on drivers/block/osdblk.c:
7
8 Copyright 2009 Red Hat, Inc.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program; see the file COPYING. If not, write to
21 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
22
23
24
Yehuda Sadehdfc56062010-11-19 14:51:04 -080025 For usage instructions, please refer to:
Yehuda Sadeh602adf42010-08-12 16:11:25 -070026
Yehuda Sadehdfc56062010-11-19 14:51:04 -080027 Documentation/ABI/testing/sysfs-bus-rbd
Yehuda Sadeh602adf42010-08-12 16:11:25 -070028
29 */
30
31#include <linux/ceph/libceph.h>
32#include <linux/ceph/osd_client.h>
33#include <linux/ceph/mon_client.h>
Ilya Dryomoved95b212016-08-12 16:40:02 +020034#include <linux/ceph/cls_lock_client.h>
Ilya Dryomov43df3d32018-02-02 15:23:22 +010035#include <linux/ceph/striper.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070036#include <linux/ceph/decode.h>
Yehuda Sadeh59c2be12011-03-21 15:10:11 -070037#include <linux/parser.h>
Alex Elder30d1cff2013-05-01 12:43:03 -050038#include <linux/bsearch.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070039
40#include <linux/kernel.h>
41#include <linux/device.h>
42#include <linux/module.h>
Christoph Hellwig7ad18af2015-01-13 17:20:04 +010043#include <linux/blk-mq.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070044#include <linux/fs.h>
45#include <linux/blkdev.h>
Alex Elder1c2a9df2013-05-01 12:43:03 -050046#include <linux/slab.h>
Ilya Dryomovf8a22fc2013-12-13 15:28:57 +020047#include <linux/idr.h>
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +040048#include <linux/workqueue.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070049
50#include "rbd_types.h"
51
Alex Elderaafb2302012-09-06 16:00:54 -050052#define RBD_DEBUG /* Activate rbd_assert() calls */
53
Alex Elder593a9e72012-02-07 12:03:37 -060054/*
Alex Eldera2acd002013-05-08 22:50:04 -050055 * Increment the given counter and return its updated value.
56 * If the counter is already 0 it will not be incremented.
57 * If the counter is already at its maximum value returns
58 * -EINVAL without updating it.
59 */
60static int atomic_inc_return_safe(atomic_t *v)
61{
62 unsigned int counter;
63
64 counter = (unsigned int)__atomic_add_unless(v, 1, 0);
65 if (counter <= (unsigned int)INT_MAX)
66 return (int)counter;
67
68 atomic_dec(v);
69
70 return -EINVAL;
71}
72
73/* Decrement the counter. Return the resulting value, or -EINVAL */
74static int atomic_dec_return_safe(atomic_t *v)
75{
76 int counter;
77
78 counter = atomic_dec_return(v);
79 if (counter >= 0)
80 return counter;
81
82 atomic_inc(v);
83
84 return -EINVAL;
85}
86
Alex Elderf0f8cef2012-01-29 13:57:44 -060087#define RBD_DRV_NAME "rbd"
Yehuda Sadeh602adf42010-08-12 16:11:25 -070088
Ilya Dryomov7e513d42013-12-16 19:26:32 +020089#define RBD_MINORS_PER_MAJOR 256
90#define RBD_SINGLE_MAJOR_PART_SHIFT 4
Yehuda Sadeh602adf42010-08-12 16:11:25 -070091
Ilya Dryomov6d69bb532015-10-11 19:38:00 +020092#define RBD_MAX_PARENT_CHAIN_LEN 16
93
Alex Elderd4b125e2012-07-03 16:01:19 -050094#define RBD_SNAP_DEV_NAME_PREFIX "snap_"
95#define RBD_MAX_SNAP_NAME_LEN \
96 (NAME_MAX - (sizeof (RBD_SNAP_DEV_NAME_PREFIX) - 1))
97
Alex Elder35d489f2012-07-03 16:01:19 -050098#define RBD_MAX_SNAP_COUNT 510 /* allows max snapc to fit in 4KB */
Yehuda Sadeh602adf42010-08-12 16:11:25 -070099
100#define RBD_SNAP_HEAD_NAME "-"
101
Alex Elder9682fc62013-04-30 00:44:33 -0500102#define BAD_SNAP_INDEX U32_MAX /* invalid index into snap array */
103
Alex Elder9e15b772012-10-30 19:40:33 -0500104/* This allows a single page to hold an image name sent by OSD */
105#define RBD_IMAGE_NAME_LEN_MAX (PAGE_SIZE - sizeof (__le32) - 1)
Alex Elder1e130192012-07-03 16:01:19 -0500106#define RBD_IMAGE_ID_LEN_MAX 64
Alex Elder9e15b772012-10-30 19:40:33 -0500107
Alex Elder1e130192012-07-03 16:01:19 -0500108#define RBD_OBJ_PREFIX_LEN_MAX 64
Alex Elder589d30e2012-07-10 20:30:11 -0500109
Ilya Dryomoved95b212016-08-12 16:40:02 +0200110#define RBD_NOTIFY_TIMEOUT 5 /* seconds */
Ilya Dryomov99d16942016-08-12 16:11:41 +0200111#define RBD_RETRY_DELAY msecs_to_jiffies(1000)
112
Alex Elderd8891402012-10-09 13:50:17 -0700113/* Feature bits */
114
Ilya Dryomov8767b292017-03-02 19:56:57 +0100115#define RBD_FEATURE_LAYERING (1ULL<<0)
116#define RBD_FEATURE_STRIPINGV2 (1ULL<<1)
117#define RBD_FEATURE_EXCLUSIVE_LOCK (1ULL<<2)
118#define RBD_FEATURE_DATA_POOL (1ULL<<7)
Ilya Dryomove5734272018-01-16 15:41:54 +0100119#define RBD_FEATURE_OPERATIONS (1ULL<<8)
Ilya Dryomov8767b292017-03-02 19:56:57 +0100120
Ilya Dryomoved95b212016-08-12 16:40:02 +0200121#define RBD_FEATURES_ALL (RBD_FEATURE_LAYERING | \
122 RBD_FEATURE_STRIPINGV2 | \
Ilya Dryomov7e973322017-01-25 18:16:22 +0100123 RBD_FEATURE_EXCLUSIVE_LOCK | \
Ilya Dryomove5734272018-01-16 15:41:54 +0100124 RBD_FEATURE_DATA_POOL | \
125 RBD_FEATURE_OPERATIONS)
Alex Elderd8891402012-10-09 13:50:17 -0700126
127/* Features supported by this (client software) implementation. */
128
Alex Elder770eba62012-10-25 23:34:40 -0500129#define RBD_FEATURES_SUPPORTED (RBD_FEATURES_ALL)
Alex Elderd8891402012-10-09 13:50:17 -0700130
Alex Elder81a89792012-02-02 08:13:30 -0600131/*
132 * An RBD device name will be "rbd#", where the "rbd" comes from
133 * RBD_DRV_NAME above, and # is a unique integer identifier.
Alex Elder81a89792012-02-02 08:13:30 -0600134 */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700135#define DEV_NAME_LEN 32
136
137/*
138 * block device image metadata (in-memory version)
139 */
140struct rbd_image_header {
Alex Elderf35a4de2013-05-06 09:51:29 -0500141 /* These six fields never change for a given rbd image */
Alex Elder849b4262012-07-09 21:04:24 -0500142 char *object_prefix;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700143 __u8 obj_order;
Alex Elderf35a4de2013-05-06 09:51:29 -0500144 u64 stripe_unit;
145 u64 stripe_count;
Ilya Dryomov7e973322017-01-25 18:16:22 +0100146 s64 data_pool_id;
Alex Elderf35a4de2013-05-06 09:51:29 -0500147 u64 features; /* Might be changeable someday? */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700148
Alex Elderf84344f2012-08-31 17:29:51 -0500149 /* The remaining fields need to be updated occasionally */
150 u64 image_size;
151 struct ceph_snap_context *snapc;
Alex Elderf35a4de2013-05-06 09:51:29 -0500152 char *snap_names; /* format 1 only */
153 u64 *snap_sizes; /* format 1 only */
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700154};
155
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500156/*
157 * An rbd image specification.
158 *
159 * The tuple (pool_id, image_id, snap_id) is sufficient to uniquely
Alex Elderc66c6e02012-11-01 08:39:26 -0500160 * identify an image. Each rbd_dev structure includes a pointer to
161 * an rbd_spec structure that encapsulates this identity.
162 *
163 * Each of the id's in an rbd_spec has an associated name. For a
164 * user-mapped image, the names are supplied and the id's associated
165 * with them are looked up. For a layered image, a parent image is
166 * defined by the tuple, and the names are looked up.
167 *
168 * An rbd_dev structure contains a parent_spec pointer which is
169 * non-null if the image it represents is a child in a layered
170 * image. This pointer will refer to the rbd_spec structure used
171 * by the parent rbd_dev for its own identity (i.e., the structure
172 * is shared between the parent and child).
173 *
174 * Since these structures are populated once, during the discovery
175 * phase of image construction, they are effectively immutable so
176 * we make no effort to synchronize access to them.
177 *
178 * Note that code herein does not assume the image name is known (it
179 * could be a null pointer).
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500180 */
181struct rbd_spec {
182 u64 pool_id;
Alex Elderecb4dc22013-04-26 09:43:47 -0500183 const char *pool_name;
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500184
Alex Elderecb4dc22013-04-26 09:43:47 -0500185 const char *image_id;
186 const char *image_name;
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500187
188 u64 snap_id;
Alex Elderecb4dc22013-04-26 09:43:47 -0500189 const char *snap_name;
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500190
191 struct kref kref;
192};
193
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700194/*
Alex Elderf0f8cef2012-01-29 13:57:44 -0600195 * an instance of the client. multiple devices may share an rbd client.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700196 */
197struct rbd_client {
198 struct ceph_client *client;
199 struct kref kref;
200 struct list_head node;
201};
202
Alex Elderbf0d5f502012-11-22 00:00:08 -0600203struct rbd_img_request;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600204
Alex Elder9969ebc2013-01-18 12:31:10 -0600205enum obj_request_type {
Ilya Dryomova1fbb5e2018-01-16 12:15:02 +0100206 OBJ_REQUEST_NODATA = 1,
Ilya Dryomov5359a172018-01-20 10:30:10 +0100207 OBJ_REQUEST_BIO, /* pointer into provided bio (list) */
Ilya Dryomov7e07efb2018-01-20 10:30:11 +0100208 OBJ_REQUEST_BVECS, /* pointer into provided bio_vec array */
Ilya Dryomovafb97882018-02-06 19:26:35 +0100209 OBJ_REQUEST_OWN_BVECS, /* private bio_vec array, doesn't own pages */
Alex Elder9969ebc2013-01-18 12:31:10 -0600210};
Alex Elderbf0d5f502012-11-22 00:00:08 -0600211
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800212enum obj_operation_type {
Ilya Dryomova1fbb5e2018-01-16 12:15:02 +0100213 OBJ_OP_READ = 1,
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800214 OBJ_OP_WRITE,
Guangliang Zhao90e98c52014-04-01 22:22:16 +0800215 OBJ_OP_DISCARD,
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800216};
217
Ilya Dryomov3da691b2018-01-29 14:04:08 +0100218/*
219 * Writes go through the following state machine to deal with
220 * layering:
221 *
222 * need copyup
223 * RBD_OBJ_WRITE_GUARD ---------------> RBD_OBJ_WRITE_COPYUP
224 * | ^ |
225 * v \------------------------------/
226 * done
227 * ^
228 * |
229 * RBD_OBJ_WRITE_FLAT
230 *
231 * Writes start in RBD_OBJ_WRITE_GUARD or _FLAT, depending on whether
232 * there is a parent or not.
233 */
234enum rbd_obj_write_state {
235 RBD_OBJ_WRITE_FLAT = 1,
236 RBD_OBJ_WRITE_GUARD,
237 RBD_OBJ_WRITE_COPYUP,
Alex Elder926f9b32013-02-11 12:33:24 -0600238};
239
Alex Elderbf0d5f502012-11-22 00:00:08 -0600240struct rbd_obj_request {
Ilya Dryomov43df3d32018-02-02 15:23:22 +0100241 struct ceph_object_extent ex;
Alex Elderc5b5ef62013-02-11 12:33:24 -0600242 union {
Ilya Dryomov3da691b2018-01-29 14:04:08 +0100243 bool tried_parent; /* for reads */
244 enum rbd_obj_write_state write_state; /* for writes */
245 };
Alex Elderbf0d5f502012-11-22 00:00:08 -0600246
Ilya Dryomov51c35092018-01-29 14:04:08 +0100247 struct rbd_img_request *img_request;
Ilya Dryomov86bd7992018-02-06 19:26:33 +0100248 struct ceph_file_extent *img_extents;
249 u32 num_img_extents;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600250
Alex Elder788e2df2013-01-17 12:25:27 -0600251 union {
Ilya Dryomov5359a172018-01-20 10:30:10 +0100252 struct ceph_bio_iter bio_pos;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600253 struct {
Ilya Dryomov7e07efb2018-01-20 10:30:11 +0100254 struct ceph_bvec_iter bvec_pos;
255 u32 bvec_count;
Ilya Dryomovafb97882018-02-06 19:26:35 +0100256 u32 bvec_idx;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600257 };
258 };
Ilya Dryomov7e07efb2018-01-20 10:30:11 +0100259 struct bio_vec *copyup_bvecs;
260 u32 copyup_bvec_count;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600261
262 struct ceph_osd_request *osd_req;
263
264 u64 xferred; /* bytes transferred */
Sage Weil1b83bef2013-02-25 16:11:12 -0800265 int result;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600266
Alex Elderbf0d5f502012-11-22 00:00:08 -0600267 struct kref kref;
268};
269
Alex Elder0c425242013-02-08 09:55:49 -0600270enum img_req_flags {
Alex Elder9849e982013-01-24 16:13:36 -0600271 IMG_REQ_CHILD, /* initiator: block = 0, child image = 1 */
Alex Elderd0b2e942013-01-24 16:13:36 -0600272 IMG_REQ_LAYERED, /* ENOENT handling: normal = 0, layered = 1 */
Alex Elder0c425242013-02-08 09:55:49 -0600273};
274
Alex Elderbf0d5f502012-11-22 00:00:08 -0600275struct rbd_img_request {
Alex Elderbf0d5f502012-11-22 00:00:08 -0600276 struct rbd_device *rbd_dev;
Ilya Dryomov9bb02482018-01-30 17:52:10 +0100277 enum obj_operation_type op_type;
Ilya Dryomovecc633c2018-02-01 11:50:47 +0100278 enum obj_request_type data_type;
Alex Elder0c425242013-02-08 09:55:49 -0600279 unsigned long flags;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600280 union {
Alex Elder9849e982013-01-24 16:13:36 -0600281 u64 snap_id; /* for reads */
Alex Elderbf0d5f502012-11-22 00:00:08 -0600282 struct ceph_snap_context *snapc; /* for writes */
Alex Elder9849e982013-01-24 16:13:36 -0600283 };
284 union {
285 struct request *rq; /* block request */
286 struct rbd_obj_request *obj_request; /* obj req initiator */
Alex Elderbf0d5f502012-11-22 00:00:08 -0600287 };
Ilya Dryomov15961b42018-02-01 11:50:47 +0100288 spinlock_t completion_lock;
Alex Elder55f27e02013-04-10 12:34:25 -0500289 u64 xferred;/* aggregate bytes transferred */
Alex Eldera5a337d2013-01-24 16:13:36 -0600290 int result; /* first nonzero obj_request result */
Alex Elderbf0d5f502012-11-22 00:00:08 -0600291
Ilya Dryomov43df3d32018-02-02 15:23:22 +0100292 struct list_head object_extents; /* obj_req.ex structs */
Alex Elderbf0d5f502012-11-22 00:00:08 -0600293 u32 obj_request_count;
Ilya Dryomov7114eda2018-02-01 11:50:47 +0100294 u32 pending_count;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600295
296 struct kref kref;
297};
298
299#define for_each_obj_request(ireq, oreq) \
Ilya Dryomov43df3d32018-02-02 15:23:22 +0100300 list_for_each_entry(oreq, &(ireq)->object_extents, ex.oe_item)
Alex Elderbf0d5f502012-11-22 00:00:08 -0600301#define for_each_obj_request_safe(ireq, oreq, n) \
Ilya Dryomov43df3d32018-02-02 15:23:22 +0100302 list_for_each_entry_safe(oreq, n, &(ireq)->object_extents, ex.oe_item)
Alex Elderbf0d5f502012-11-22 00:00:08 -0600303
Ilya Dryomov99d16942016-08-12 16:11:41 +0200304enum rbd_watch_state {
305 RBD_WATCH_STATE_UNREGISTERED,
306 RBD_WATCH_STATE_REGISTERED,
307 RBD_WATCH_STATE_ERROR,
308};
309
Ilya Dryomoved95b212016-08-12 16:40:02 +0200310enum rbd_lock_state {
311 RBD_LOCK_STATE_UNLOCKED,
312 RBD_LOCK_STATE_LOCKED,
313 RBD_LOCK_STATE_RELEASING,
314};
315
316/* WatchNotify::ClientId */
317struct rbd_client_id {
318 u64 gid;
319 u64 handle;
320};
321
Alex Elderf84344f2012-08-31 17:29:51 -0500322struct rbd_mapping {
Alex Elder99c1f082012-08-30 14:42:15 -0500323 u64 size;
Alex Elder34b13182012-07-13 20:35:12 -0500324 u64 features;
Alex Elderf84344f2012-08-31 17:29:51 -0500325};
326
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700327/*
328 * a single device
329 */
330struct rbd_device {
Alex Elderde71a292012-07-03 16:01:19 -0500331 int dev_id; /* blkdev unique id */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700332
333 int major; /* blkdev assigned major */
Ilya Dryomovdd82fff2013-12-13 15:28:57 +0200334 int minor;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700335 struct gendisk *disk; /* blkdev's gendisk and rq */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700336
Alex Eldera30b71b2012-07-10 20:30:11 -0500337 u32 image_format; /* Either 1 or 2 */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700338 struct rbd_client *rbd_client;
339
340 char name[DEV_NAME_LEN]; /* blkdev name, e.g. rbd3 */
341
Alex Elderb82d1672013-01-14 12:43:31 -0600342 spinlock_t lock; /* queue, flags, open_count */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700343
344 struct rbd_image_header header;
Alex Elderb82d1672013-01-14 12:43:31 -0600345 unsigned long flags; /* possibly lock protected */
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500346 struct rbd_spec *spec;
Ilya Dryomovd1475432015-06-22 13:24:48 +0300347 struct rbd_options *opts;
Mike Christie0d6d1e9c2016-08-18 18:38:45 +0200348 char *config_info; /* add{,_single_major} string */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700349
Ilya Dryomovc41d13a2016-04-29 20:01:25 +0200350 struct ceph_object_id header_oid;
Ilya Dryomov922dab62016-05-26 01:15:02 +0200351 struct ceph_object_locator header_oloc;
Alex Elder971f8392012-10-25 23:34:41 -0500352
Ilya Dryomov1643dfa2016-08-12 15:45:52 +0200353 struct ceph_file_layout layout; /* used for all rbd requests */
Alex Elder0903e872012-11-14 12:25:19 -0600354
Ilya Dryomov99d16942016-08-12 16:11:41 +0200355 struct mutex watch_mutex;
356 enum rbd_watch_state watch_state;
Ilya Dryomov922dab62016-05-26 01:15:02 +0200357 struct ceph_osd_linger_request *watch_handle;
Ilya Dryomov99d16942016-08-12 16:11:41 +0200358 u64 watch_cookie;
359 struct delayed_work watch_dwork;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700360
Ilya Dryomoved95b212016-08-12 16:40:02 +0200361 struct rw_semaphore lock_rwsem;
362 enum rbd_lock_state lock_state;
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +0200363 char lock_cookie[32];
Ilya Dryomoved95b212016-08-12 16:40:02 +0200364 struct rbd_client_id owner_cid;
365 struct work_struct acquired_lock_work;
366 struct work_struct released_lock_work;
367 struct delayed_work lock_dwork;
368 struct work_struct unlock_work;
369 wait_queue_head_t lock_waitq;
370
Ilya Dryomov1643dfa2016-08-12 15:45:52 +0200371 struct workqueue_struct *task_wq;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700372
Alex Elder86b00e02012-10-25 23:34:42 -0500373 struct rbd_spec *parent_spec;
374 u64 parent_overlap;
Alex Eldera2acd002013-05-08 22:50:04 -0500375 atomic_t parent_ref;
Alex Elder2f82ee52012-10-30 19:40:33 -0500376 struct rbd_device *parent;
Alex Elder86b00e02012-10-25 23:34:42 -0500377
Christoph Hellwig7ad18af2015-01-13 17:20:04 +0100378 /* Block layer tags. */
379 struct blk_mq_tag_set tag_set;
380
Josh Durginc6666012011-11-21 17:11:12 -0800381 /* protects updating the header */
382 struct rw_semaphore header_rwsem;
Alex Elderf84344f2012-08-31 17:29:51 -0500383
384 struct rbd_mapping mapping;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700385
386 struct list_head node;
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800387
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800388 /* sysfs related */
389 struct device dev;
Alex Elderb82d1672013-01-14 12:43:31 -0600390 unsigned long open_count; /* protected by lock */
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800391};
392
Alex Elderb82d1672013-01-14 12:43:31 -0600393/*
Ilya Dryomov87c0fde2016-09-29 13:41:05 +0200394 * Flag bits for rbd_dev->flags:
395 * - REMOVING (which is coupled with rbd_dev->open_count) is protected
396 * by rbd_dev->lock
397 * - BLACKLISTED is protected by rbd_dev->lock_rwsem
Alex Elderb82d1672013-01-14 12:43:31 -0600398 */
Alex Elder6d292902013-01-14 12:43:31 -0600399enum rbd_dev_flags {
400 RBD_DEV_FLAG_EXISTS, /* mapped snapshot has not been deleted */
Alex Elderb82d1672013-01-14 12:43:31 -0600401 RBD_DEV_FLAG_REMOVING, /* this mapping is being removed */
Ilya Dryomov87c0fde2016-09-29 13:41:05 +0200402 RBD_DEV_FLAG_BLACKLISTED, /* our ceph_client is blacklisted */
Alex Elder6d292902013-01-14 12:43:31 -0600403};
404
Alex Eldercfbf6372013-05-31 17:40:45 -0500405static DEFINE_MUTEX(client_mutex); /* Serialize client creation */
Alex Eldere124a82f2012-01-29 13:57:44 -0600406
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700407static LIST_HEAD(rbd_dev_list); /* devices */
Alex Eldere124a82f2012-01-29 13:57:44 -0600408static DEFINE_SPINLOCK(rbd_dev_list_lock);
409
Alex Elder432b8582012-01-29 13:57:44 -0600410static LIST_HEAD(rbd_client_list); /* clients */
411static DEFINE_SPINLOCK(rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700412
Alex Elder78c2a442013-05-01 12:43:04 -0500413/* Slab caches for frequently-allocated structures */
414
Alex Elder1c2a9df2013-05-01 12:43:03 -0500415static struct kmem_cache *rbd_img_request_cache;
Alex Elder868311b2013-05-01 12:43:03 -0500416static struct kmem_cache *rbd_obj_request_cache;
Alex Elder1c2a9df2013-05-01 12:43:03 -0500417
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200418static int rbd_major;
Ilya Dryomovf8a22fc2013-12-13 15:28:57 +0200419static DEFINE_IDA(rbd_dev_id_ida);
420
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +0400421static struct workqueue_struct *rbd_wq;
422
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200423/*
Ilya Dryomov3cfa3b12017-11-13 10:35:40 +0100424 * single-major requires >= 0.75 version of userspace rbd utility.
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200425 */
Ilya Dryomov3cfa3b12017-11-13 10:35:40 +0100426static bool single_major = true;
Joe Perches5657a812018-05-24 13:38:59 -0600427module_param(single_major, bool, 0444);
Ilya Dryomov3cfa3b12017-11-13 10:35:40 +0100428MODULE_PARM_DESC(single_major, "Use a single major number for all rbd devices (default: true)");
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200429
Alex Elderf0f8cef2012-01-29 13:57:44 -0600430static ssize_t rbd_add(struct bus_type *bus, const char *buf,
431 size_t count);
432static ssize_t rbd_remove(struct bus_type *bus, const char *buf,
433 size_t count);
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200434static ssize_t rbd_add_single_major(struct bus_type *bus, const char *buf,
435 size_t count);
436static ssize_t rbd_remove_single_major(struct bus_type *bus, const char *buf,
437 size_t count);
Ilya Dryomov6d69bb532015-10-11 19:38:00 +0200438static int rbd_dev_image_probe(struct rbd_device *rbd_dev, int depth);
Alex Elderf0f8cef2012-01-29 13:57:44 -0600439
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200440static int rbd_dev_id_to_minor(int dev_id)
441{
Ilya Dryomov7e513d42013-12-16 19:26:32 +0200442 return dev_id << RBD_SINGLE_MAJOR_PART_SHIFT;
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200443}
444
445static int minor_to_rbd_dev_id(int minor)
446{
Ilya Dryomov7e513d42013-12-16 19:26:32 +0200447 return minor >> RBD_SINGLE_MAJOR_PART_SHIFT;
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200448}
449
Ilya Dryomoved95b212016-08-12 16:40:02 +0200450static bool __rbd_is_lock_owner(struct rbd_device *rbd_dev)
451{
452 return rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED ||
453 rbd_dev->lock_state == RBD_LOCK_STATE_RELEASING;
454}
455
456static bool rbd_is_lock_owner(struct rbd_device *rbd_dev)
457{
458 bool is_lock_owner;
459
460 down_read(&rbd_dev->lock_rwsem);
461 is_lock_owner = __rbd_is_lock_owner(rbd_dev);
462 up_read(&rbd_dev->lock_rwsem);
463 return is_lock_owner;
464}
465
Ilya Dryomov8767b292017-03-02 19:56:57 +0100466static ssize_t rbd_supported_features_show(struct bus_type *bus, char *buf)
467{
468 return sprintf(buf, "0x%llx\n", RBD_FEATURES_SUPPORTED);
469}
470
Joe Perches5657a812018-05-24 13:38:59 -0600471static BUS_ATTR(add, 0200, NULL, rbd_add);
472static BUS_ATTR(remove, 0200, NULL, rbd_remove);
473static BUS_ATTR(add_single_major, 0200, NULL, rbd_add_single_major);
474static BUS_ATTR(remove_single_major, 0200, NULL, rbd_remove_single_major);
475static BUS_ATTR(supported_features, 0444, rbd_supported_features_show, NULL);
Greg Kroah-Hartmanb15a21d2013-08-23 14:24:28 -0700476
477static struct attribute *rbd_bus_attrs[] = {
478 &bus_attr_add.attr,
479 &bus_attr_remove.attr,
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200480 &bus_attr_add_single_major.attr,
481 &bus_attr_remove_single_major.attr,
Ilya Dryomov8767b292017-03-02 19:56:57 +0100482 &bus_attr_supported_features.attr,
Greg Kroah-Hartmanb15a21d2013-08-23 14:24:28 -0700483 NULL,
Alex Elderf0f8cef2012-01-29 13:57:44 -0600484};
Ilya Dryomov92c76dc2013-12-13 15:28:57 +0200485
486static umode_t rbd_bus_is_visible(struct kobject *kobj,
487 struct attribute *attr, int index)
488{
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200489 if (!single_major &&
490 (attr == &bus_attr_add_single_major.attr ||
491 attr == &bus_attr_remove_single_major.attr))
492 return 0;
493
Ilya Dryomov92c76dc2013-12-13 15:28:57 +0200494 return attr->mode;
495}
496
497static const struct attribute_group rbd_bus_group = {
498 .attrs = rbd_bus_attrs,
499 .is_visible = rbd_bus_is_visible,
500};
501__ATTRIBUTE_GROUPS(rbd_bus);
Alex Elderf0f8cef2012-01-29 13:57:44 -0600502
503static struct bus_type rbd_bus_type = {
504 .name = "rbd",
Greg Kroah-Hartmanb15a21d2013-08-23 14:24:28 -0700505 .bus_groups = rbd_bus_groups,
Alex Elderf0f8cef2012-01-29 13:57:44 -0600506};
507
508static void rbd_root_dev_release(struct device *dev)
509{
510}
511
512static struct device rbd_root_dev = {
513 .init_name = "rbd",
514 .release = rbd_root_dev_release,
515};
516
Alex Elder06ecc6c2012-11-01 10:17:15 -0500517static __printf(2, 3)
518void rbd_warn(struct rbd_device *rbd_dev, const char *fmt, ...)
519{
520 struct va_format vaf;
521 va_list args;
522
523 va_start(args, fmt);
524 vaf.fmt = fmt;
525 vaf.va = &args;
526
527 if (!rbd_dev)
528 printk(KERN_WARNING "%s: %pV\n", RBD_DRV_NAME, &vaf);
529 else if (rbd_dev->disk)
530 printk(KERN_WARNING "%s: %s: %pV\n",
531 RBD_DRV_NAME, rbd_dev->disk->disk_name, &vaf);
532 else if (rbd_dev->spec && rbd_dev->spec->image_name)
533 printk(KERN_WARNING "%s: image %s: %pV\n",
534 RBD_DRV_NAME, rbd_dev->spec->image_name, &vaf);
535 else if (rbd_dev->spec && rbd_dev->spec->image_id)
536 printk(KERN_WARNING "%s: id %s: %pV\n",
537 RBD_DRV_NAME, rbd_dev->spec->image_id, &vaf);
538 else /* punt */
539 printk(KERN_WARNING "%s: rbd_dev %p: %pV\n",
540 RBD_DRV_NAME, rbd_dev, &vaf);
541 va_end(args);
542}
543
Alex Elderaafb2302012-09-06 16:00:54 -0500544#ifdef RBD_DEBUG
545#define rbd_assert(expr) \
546 if (unlikely(!(expr))) { \
547 printk(KERN_ERR "\nAssertion failure in %s() " \
548 "at line %d:\n\n" \
549 "\trbd_assert(%s);\n\n", \
550 __func__, __LINE__, #expr); \
551 BUG(); \
552 }
553#else /* !RBD_DEBUG */
554# define rbd_assert(expr) ((void) 0)
555#endif /* !RBD_DEBUG */
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800556
Alex Elder05a46af2013-04-26 15:44:36 -0500557static void rbd_dev_remove_parent(struct rbd_device *rbd_dev);
Alex Elder8b3e1a52013-01-24 16:13:36 -0600558
Alex Eldercc4a38bd2013-04-30 00:44:33 -0500559static int rbd_dev_refresh(struct rbd_device *rbd_dev);
Alex Elder2df3fac2013-05-06 09:51:30 -0500560static int rbd_dev_v2_header_onetime(struct rbd_device *rbd_dev);
Ilya Dryomova720ae02014-07-23 17:11:19 +0400561static int rbd_dev_header_info(struct rbd_device *rbd_dev);
Ilya Dryomove8f59b52014-07-24 10:42:13 +0400562static int rbd_dev_v2_parent_info(struct rbd_device *rbd_dev);
Alex Elder54cac612013-04-30 00:44:33 -0500563static const char *rbd_dev_v2_snap_name(struct rbd_device *rbd_dev,
564 u64 snap_id);
Alex Elder2ad3d712013-04-30 00:44:33 -0500565static int _rbd_dev_v2_snap_size(struct rbd_device *rbd_dev, u64 snap_id,
566 u8 *order, u64 *snap_size);
567static int _rbd_dev_v2_snap_features(struct rbd_device *rbd_dev, u64 snap_id,
568 u64 *snap_features);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700569
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700570static int rbd_open(struct block_device *bdev, fmode_t mode)
571{
Alex Elderf0f8cef2012-01-29 13:57:44 -0600572 struct rbd_device *rbd_dev = bdev->bd_disk->private_data;
Alex Elderb82d1672013-01-14 12:43:31 -0600573 bool removing = false;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700574
Alex Eldera14ea262013-02-05 13:23:12 -0600575 spin_lock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600576 if (test_bit(RBD_DEV_FLAG_REMOVING, &rbd_dev->flags))
577 removing = true;
578 else
579 rbd_dev->open_count++;
Alex Eldera14ea262013-02-05 13:23:12 -0600580 spin_unlock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600581 if (removing)
582 return -ENOENT;
583
Alex Elderc3e946c2012-11-16 09:29:16 -0600584 (void) get_device(&rbd_dev->dev);
Alex Elder340c7a22012-08-10 13:12:07 -0700585
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700586 return 0;
587}
588
Al Virodb2a1442013-05-05 21:52:57 -0400589static void rbd_release(struct gendisk *disk, fmode_t mode)
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800590{
591 struct rbd_device *rbd_dev = disk->private_data;
Alex Elderb82d1672013-01-14 12:43:31 -0600592 unsigned long open_count_before;
593
Alex Eldera14ea262013-02-05 13:23:12 -0600594 spin_lock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600595 open_count_before = rbd_dev->open_count--;
Alex Eldera14ea262013-02-05 13:23:12 -0600596 spin_unlock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600597 rbd_assert(open_count_before > 0);
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800598
Alex Elderc3e946c2012-11-16 09:29:16 -0600599 put_device(&rbd_dev->dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800600}
601
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800602static int rbd_ioctl_set_ro(struct rbd_device *rbd_dev, unsigned long arg)
603{
Ilya Dryomov1de797b2017-10-12 12:35:19 +0200604 int ro;
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800605
Ilya Dryomov1de797b2017-10-12 12:35:19 +0200606 if (get_user(ro, (int __user *)arg))
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800607 return -EFAULT;
608
Ilya Dryomov1de797b2017-10-12 12:35:19 +0200609 /* Snapshots can't be marked read-write */
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800610 if (rbd_dev->spec->snap_id != CEPH_NOSNAP && !ro)
611 return -EROFS;
612
Ilya Dryomov1de797b2017-10-12 12:35:19 +0200613 /* Let blkdev_roset() handle it */
614 return -ENOTTY;
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800615}
616
617static int rbd_ioctl(struct block_device *bdev, fmode_t mode,
618 unsigned int cmd, unsigned long arg)
619{
620 struct rbd_device *rbd_dev = bdev->bd_disk->private_data;
Ilya Dryomov1de797b2017-10-12 12:35:19 +0200621 int ret;
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800622
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800623 switch (cmd) {
624 case BLKROSET:
625 ret = rbd_ioctl_set_ro(rbd_dev, arg);
626 break;
627 default:
628 ret = -ENOTTY;
629 }
630
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800631 return ret;
632}
633
634#ifdef CONFIG_COMPAT
635static int rbd_compat_ioctl(struct block_device *bdev, fmode_t mode,
636 unsigned int cmd, unsigned long arg)
637{
638 return rbd_ioctl(bdev, mode, cmd, arg);
639}
640#endif /* CONFIG_COMPAT */
641
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700642static const struct block_device_operations rbd_bd_ops = {
643 .owner = THIS_MODULE,
644 .open = rbd_open,
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800645 .release = rbd_release,
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800646 .ioctl = rbd_ioctl,
647#ifdef CONFIG_COMPAT
648 .compat_ioctl = rbd_compat_ioctl,
649#endif
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700650};
651
652/*
Alex Elder7262cfc2013-05-16 15:04:20 -0500653 * Initialize an rbd client instance. Success or not, this function
Alex Eldercfbf6372013-05-31 17:40:45 -0500654 * consumes ceph_opts. Caller holds client_mutex.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700655 */
Alex Elderf8c38922012-08-10 13:12:07 -0700656static struct rbd_client *rbd_client_create(struct ceph_options *ceph_opts)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700657{
658 struct rbd_client *rbdc;
659 int ret = -ENOMEM;
660
Alex Elder37206ee2013-02-20 17:32:08 -0600661 dout("%s:\n", __func__);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700662 rbdc = kmalloc(sizeof(struct rbd_client), GFP_KERNEL);
663 if (!rbdc)
664 goto out_opt;
665
666 kref_init(&rbdc->kref);
667 INIT_LIST_HEAD(&rbdc->node);
668
Ilya Dryomov74da4a0f2017-03-03 18:16:07 +0100669 rbdc->client = ceph_create_client(ceph_opts, rbdc);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700670 if (IS_ERR(rbdc->client))
Alex Elder08f75462013-05-29 11:19:00 -0500671 goto out_rbdc;
Alex Elder43ae4702012-07-03 16:01:18 -0500672 ceph_opts = NULL; /* Now rbdc->client is responsible for ceph_opts */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700673
674 ret = ceph_open_session(rbdc->client);
675 if (ret < 0)
Alex Elder08f75462013-05-29 11:19:00 -0500676 goto out_client;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700677
Alex Elder432b8582012-01-29 13:57:44 -0600678 spin_lock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700679 list_add_tail(&rbdc->node, &rbd_client_list);
Alex Elder432b8582012-01-29 13:57:44 -0600680 spin_unlock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700681
Alex Elder37206ee2013-02-20 17:32:08 -0600682 dout("%s: rbdc %p\n", __func__, rbdc);
Alex Elderbc534d82012-01-29 13:57:44 -0600683
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700684 return rbdc;
Alex Elder08f75462013-05-29 11:19:00 -0500685out_client:
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700686 ceph_destroy_client(rbdc->client);
Alex Elder08f75462013-05-29 11:19:00 -0500687out_rbdc:
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700688 kfree(rbdc);
689out_opt:
Alex Elder43ae4702012-07-03 16:01:18 -0500690 if (ceph_opts)
691 ceph_destroy_options(ceph_opts);
Alex Elder37206ee2013-02-20 17:32:08 -0600692 dout("%s: error %d\n", __func__, ret);
693
Vasiliy Kulikov28f259b2010-09-26 12:59:37 +0400694 return ERR_PTR(ret);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700695}
696
Alex Elder2f82ee52012-10-30 19:40:33 -0500697static struct rbd_client *__rbd_get_client(struct rbd_client *rbdc)
698{
699 kref_get(&rbdc->kref);
700
701 return rbdc;
702}
703
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700704/*
Alex Elder1f7ba332012-08-10 13:12:07 -0700705 * Find a ceph client with specific addr and configuration. If
706 * found, bump its reference count.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700707 */
Alex Elder1f7ba332012-08-10 13:12:07 -0700708static struct rbd_client *rbd_client_find(struct ceph_options *ceph_opts)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700709{
710 struct rbd_client *client_node;
Alex Elder1f7ba332012-08-10 13:12:07 -0700711 bool found = false;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700712
Alex Elder43ae4702012-07-03 16:01:18 -0500713 if (ceph_opts->flags & CEPH_OPT_NOSHARE)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700714 return NULL;
715
Alex Elder1f7ba332012-08-10 13:12:07 -0700716 spin_lock(&rbd_client_list_lock);
717 list_for_each_entry(client_node, &rbd_client_list, node) {
718 if (!ceph_compare_options(ceph_opts, client_node->client)) {
Alex Elder2f82ee52012-10-30 19:40:33 -0500719 __rbd_get_client(client_node);
720
Alex Elder1f7ba332012-08-10 13:12:07 -0700721 found = true;
722 break;
723 }
724 }
725 spin_unlock(&rbd_client_list_lock);
726
727 return found ? client_node : NULL;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700728}
729
730/*
Ilya Dryomov210c1042015-06-22 13:24:48 +0300731 * (Per device) rbd map options
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700732 */
733enum {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300734 Opt_queue_depth,
Dongsheng Yang34f55d02018-03-26 10:22:55 -0400735 Opt_lock_timeout,
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700736 Opt_last_int,
737 /* int args above */
738 Opt_last_string,
739 /* string args above */
Alex Eldercc0538b2012-08-10 13:12:07 -0700740 Opt_read_only,
741 Opt_read_write,
Ilya Dryomov80de1912016-09-20 14:23:17 +0200742 Opt_lock_on_read,
Ilya Dryomove010dd02017-04-13 12:17:39 +0200743 Opt_exclusive,
Ilya Dryomovd9360542018-03-23 06:14:47 +0100744 Opt_notrim,
Ilya Dryomov210c1042015-06-22 13:24:48 +0300745 Opt_err
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700746};
747
Alex Elder43ae4702012-07-03 16:01:18 -0500748static match_table_t rbd_opts_tokens = {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300749 {Opt_queue_depth, "queue_depth=%d"},
Dongsheng Yang34f55d02018-03-26 10:22:55 -0400750 {Opt_lock_timeout, "lock_timeout=%d"},
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700751 /* int args above */
752 /* string args above */
Alex Elderbe466c12012-10-22 11:31:26 -0500753 {Opt_read_only, "read_only"},
Alex Eldercc0538b2012-08-10 13:12:07 -0700754 {Opt_read_only, "ro"}, /* Alternate spelling */
755 {Opt_read_write, "read_write"},
756 {Opt_read_write, "rw"}, /* Alternate spelling */
Ilya Dryomov80de1912016-09-20 14:23:17 +0200757 {Opt_lock_on_read, "lock_on_read"},
Ilya Dryomove010dd02017-04-13 12:17:39 +0200758 {Opt_exclusive, "exclusive"},
Ilya Dryomovd9360542018-03-23 06:14:47 +0100759 {Opt_notrim, "notrim"},
Ilya Dryomov210c1042015-06-22 13:24:48 +0300760 {Opt_err, NULL}
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700761};
762
Alex Elder98571b52013-01-20 14:44:42 -0600763struct rbd_options {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300764 int queue_depth;
Dongsheng Yang34f55d02018-03-26 10:22:55 -0400765 unsigned long lock_timeout;
Alex Elder98571b52013-01-20 14:44:42 -0600766 bool read_only;
Ilya Dryomov80de1912016-09-20 14:23:17 +0200767 bool lock_on_read;
Ilya Dryomove010dd02017-04-13 12:17:39 +0200768 bool exclusive;
Ilya Dryomovd9360542018-03-23 06:14:47 +0100769 bool trim;
Alex Elder98571b52013-01-20 14:44:42 -0600770};
771
Ilya Dryomovb5584182015-06-23 16:21:19 +0300772#define RBD_QUEUE_DEPTH_DEFAULT BLKDEV_MAX_RQ
Dongsheng Yang34f55d02018-03-26 10:22:55 -0400773#define RBD_LOCK_TIMEOUT_DEFAULT 0 /* no timeout */
Alex Elder98571b52013-01-20 14:44:42 -0600774#define RBD_READ_ONLY_DEFAULT false
Ilya Dryomov80de1912016-09-20 14:23:17 +0200775#define RBD_LOCK_ON_READ_DEFAULT false
Ilya Dryomove010dd02017-04-13 12:17:39 +0200776#define RBD_EXCLUSIVE_DEFAULT false
Ilya Dryomovd9360542018-03-23 06:14:47 +0100777#define RBD_TRIM_DEFAULT true
Alex Elder98571b52013-01-20 14:44:42 -0600778
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700779static int parse_rbd_opts_token(char *c, void *private)
780{
Alex Elder43ae4702012-07-03 16:01:18 -0500781 struct rbd_options *rbd_opts = private;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700782 substring_t argstr[MAX_OPT_ARGS];
783 int token, intval, ret;
784
Alex Elder43ae4702012-07-03 16:01:18 -0500785 token = match_token(c, rbd_opts_tokens, argstr);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700786 if (token < Opt_last_int) {
787 ret = match_int(&argstr[0], &intval);
788 if (ret < 0) {
Ilya Dryomov2f56b6b2018-06-27 16:38:13 +0200789 pr_err("bad option arg (not int) at '%s'\n", c);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700790 return ret;
791 }
792 dout("got int token %d val %d\n", token, intval);
793 } else if (token > Opt_last_int && token < Opt_last_string) {
Ilya Dryomov210c1042015-06-22 13:24:48 +0300794 dout("got string token %d val %s\n", token, argstr[0].from);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700795 } else {
796 dout("got token %d\n", token);
797 }
798
799 switch (token) {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300800 case Opt_queue_depth:
801 if (intval < 1) {
802 pr_err("queue_depth out of range\n");
803 return -EINVAL;
804 }
805 rbd_opts->queue_depth = intval;
806 break;
Dongsheng Yang34f55d02018-03-26 10:22:55 -0400807 case Opt_lock_timeout:
808 /* 0 is "wait forever" (i.e. infinite timeout) */
809 if (intval < 0 || intval > INT_MAX / 1000) {
810 pr_err("lock_timeout out of range\n");
811 return -EINVAL;
812 }
813 rbd_opts->lock_timeout = msecs_to_jiffies(intval * 1000);
814 break;
Alex Eldercc0538b2012-08-10 13:12:07 -0700815 case Opt_read_only:
816 rbd_opts->read_only = true;
817 break;
818 case Opt_read_write:
819 rbd_opts->read_only = false;
820 break;
Ilya Dryomov80de1912016-09-20 14:23:17 +0200821 case Opt_lock_on_read:
822 rbd_opts->lock_on_read = true;
823 break;
Ilya Dryomove010dd02017-04-13 12:17:39 +0200824 case Opt_exclusive:
825 rbd_opts->exclusive = true;
826 break;
Ilya Dryomovd9360542018-03-23 06:14:47 +0100827 case Opt_notrim:
828 rbd_opts->trim = false;
829 break;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700830 default:
Ilya Dryomov210c1042015-06-22 13:24:48 +0300831 /* libceph prints "bad option" msg */
832 return -EINVAL;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700833 }
Ilya Dryomov210c1042015-06-22 13:24:48 +0300834
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700835 return 0;
836}
837
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800838static char* obj_op_name(enum obj_operation_type op_type)
839{
840 switch (op_type) {
841 case OBJ_OP_READ:
842 return "read";
843 case OBJ_OP_WRITE:
844 return "write";
Guangliang Zhao90e98c52014-04-01 22:22:16 +0800845 case OBJ_OP_DISCARD:
846 return "discard";
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800847 default:
848 return "???";
849 }
850}
851
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700852/*
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700853 * Destroy ceph client
Alex Elderd23a4b32012-01-29 13:57:43 -0600854 *
Alex Elder432b8582012-01-29 13:57:44 -0600855 * Caller must hold rbd_client_list_lock.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700856 */
857static void rbd_client_release(struct kref *kref)
858{
859 struct rbd_client *rbdc = container_of(kref, struct rbd_client, kref);
860
Alex Elder37206ee2013-02-20 17:32:08 -0600861 dout("%s: rbdc %p\n", __func__, rbdc);
Alex Eldercd9d9f52012-04-04 13:35:44 -0500862 spin_lock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700863 list_del(&rbdc->node);
Alex Eldercd9d9f52012-04-04 13:35:44 -0500864 spin_unlock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700865
866 ceph_destroy_client(rbdc->client);
867 kfree(rbdc);
868}
869
870/*
871 * Drop reference to ceph client node. If it's not referenced anymore, release
872 * it.
873 */
Alex Elder9d3997f2012-10-25 23:34:42 -0500874static void rbd_put_client(struct rbd_client *rbdc)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700875{
Alex Elderc53d5892012-10-25 23:34:42 -0500876 if (rbdc)
877 kref_put(&rbdc->kref, rbd_client_release);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700878}
879
Ilya Dryomovdd435852018-02-22 13:43:24 +0100880static int wait_for_latest_osdmap(struct ceph_client *client)
881{
882 u64 newest_epoch;
883 int ret;
884
885 ret = ceph_monc_get_version(&client->monc, "osdmap", &newest_epoch);
886 if (ret)
887 return ret;
888
889 if (client->osdc.osdmap->epoch >= newest_epoch)
890 return 0;
891
892 ceph_osdc_maybe_request_map(&client->osdc);
893 return ceph_monc_wait_osdmap(&client->monc, newest_epoch,
894 client->options->mount_timeout);
895}
896
Ilya Dryomov5feb0d8d2018-02-22 13:19:04 +0100897/*
898 * Get a ceph client with specific addr and configuration, if one does
899 * not exist create it. Either way, ceph_opts is consumed by this
900 * function.
901 */
902static struct rbd_client *rbd_get_client(struct ceph_options *ceph_opts)
903{
904 struct rbd_client *rbdc;
Ilya Dryomovdd435852018-02-22 13:43:24 +0100905 int ret;
Ilya Dryomov5feb0d8d2018-02-22 13:19:04 +0100906
907 mutex_lock_nested(&client_mutex, SINGLE_DEPTH_NESTING);
908 rbdc = rbd_client_find(ceph_opts);
Ilya Dryomovdd435852018-02-22 13:43:24 +0100909 if (rbdc) {
Ilya Dryomov5feb0d8d2018-02-22 13:19:04 +0100910 ceph_destroy_options(ceph_opts);
Ilya Dryomovdd435852018-02-22 13:43:24 +0100911
912 /*
913 * Using an existing client. Make sure ->pg_pools is up to
914 * date before we look up the pool id in do_rbd_add().
915 */
916 ret = wait_for_latest_osdmap(rbdc->client);
917 if (ret) {
918 rbd_warn(NULL, "failed to get latest osdmap: %d", ret);
919 rbd_put_client(rbdc);
920 rbdc = ERR_PTR(ret);
921 }
922 } else {
Ilya Dryomov5feb0d8d2018-02-22 13:19:04 +0100923 rbdc = rbd_client_create(ceph_opts);
Ilya Dryomovdd435852018-02-22 13:43:24 +0100924 }
Ilya Dryomov5feb0d8d2018-02-22 13:19:04 +0100925 mutex_unlock(&client_mutex);
926
927 return rbdc;
928}
929
Alex Eldera30b71b2012-07-10 20:30:11 -0500930static bool rbd_image_format_valid(u32 image_format)
931{
932 return image_format == 1 || image_format == 2;
933}
934
Alex Elder8e94af82012-07-25 09:32:40 -0500935static bool rbd_dev_ondisk_valid(struct rbd_image_header_ondisk *ondisk)
936{
Alex Elder103a1502012-08-02 11:29:45 -0500937 size_t size;
938 u32 snap_count;
939
940 /* The header has to start with the magic rbd header text */
941 if (memcmp(&ondisk->text, RBD_HEADER_TEXT, sizeof (RBD_HEADER_TEXT)))
942 return false;
943
Alex Elderdb2388b2012-10-20 22:17:27 -0500944 /* The bio layer requires at least sector-sized I/O */
945
946 if (ondisk->options.order < SECTOR_SHIFT)
947 return false;
948
949 /* If we use u64 in a few spots we may be able to loosen this */
950
951 if (ondisk->options.order > 8 * sizeof (int) - 1)
952 return false;
953
Alex Elder103a1502012-08-02 11:29:45 -0500954 /*
955 * The size of a snapshot header has to fit in a size_t, and
956 * that limits the number of snapshots.
957 */
958 snap_count = le32_to_cpu(ondisk->snap_count);
959 size = SIZE_MAX - sizeof (struct ceph_snap_context);
960 if (snap_count > size / sizeof (__le64))
961 return false;
962
963 /*
964 * Not only that, but the size of the entire the snapshot
965 * header must also be representable in a size_t.
966 */
967 size -= snap_count * sizeof (__le64);
968 if ((u64) size < le64_to_cpu(ondisk->snap_names_len))
969 return false;
970
971 return true;
Alex Elder8e94af82012-07-25 09:32:40 -0500972}
973
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700974/*
Ilya Dryomov5bc3fb12017-01-25 18:16:22 +0100975 * returns the size of an object in the image
976 */
977static u32 rbd_obj_bytes(struct rbd_image_header *header)
978{
979 return 1U << header->obj_order;
980}
981
Ilya Dryomov263423f2017-01-25 18:16:22 +0100982static void rbd_init_layout(struct rbd_device *rbd_dev)
983{
984 if (rbd_dev->header.stripe_unit == 0 ||
985 rbd_dev->header.stripe_count == 0) {
986 rbd_dev->header.stripe_unit = rbd_obj_bytes(&rbd_dev->header);
987 rbd_dev->header.stripe_count = 1;
988 }
989
990 rbd_dev->layout.stripe_unit = rbd_dev->header.stripe_unit;
991 rbd_dev->layout.stripe_count = rbd_dev->header.stripe_count;
992 rbd_dev->layout.object_size = rbd_obj_bytes(&rbd_dev->header);
Ilya Dryomov7e973322017-01-25 18:16:22 +0100993 rbd_dev->layout.pool_id = rbd_dev->header.data_pool_id == CEPH_NOPOOL ?
994 rbd_dev->spec->pool_id : rbd_dev->header.data_pool_id;
Ilya Dryomov263423f2017-01-25 18:16:22 +0100995 RCU_INIT_POINTER(rbd_dev->layout.pool_ns, NULL);
996}
997
Ilya Dryomov5bc3fb12017-01-25 18:16:22 +0100998/*
Alex Elderbb23e372013-05-06 09:51:29 -0500999 * Fill an rbd image header with information from the given format 1
1000 * on-disk header.
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001001 */
Alex Elder662518b2013-05-06 09:51:29 -05001002static int rbd_header_from_disk(struct rbd_device *rbd_dev,
Alex Elder4156d992012-08-02 11:29:46 -05001003 struct rbd_image_header_ondisk *ondisk)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001004{
Alex Elder662518b2013-05-06 09:51:29 -05001005 struct rbd_image_header *header = &rbd_dev->header;
Alex Elderbb23e372013-05-06 09:51:29 -05001006 bool first_time = header->object_prefix == NULL;
1007 struct ceph_snap_context *snapc;
1008 char *object_prefix = NULL;
1009 char *snap_names = NULL;
1010 u64 *snap_sizes = NULL;
Alex Elderccece232012-07-10 20:30:10 -05001011 u32 snap_count;
Alex Elderbb23e372013-05-06 09:51:29 -05001012 int ret = -ENOMEM;
Alex Elder621901d2012-08-23 23:22:06 -05001013 u32 i;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001014
Alex Elderbb23e372013-05-06 09:51:29 -05001015 /* Allocate this now to avoid having to handle failure below */
1016
1017 if (first_time) {
Ilya Dryomov848d7962017-01-25 18:16:21 +01001018 object_prefix = kstrndup(ondisk->object_prefix,
1019 sizeof(ondisk->object_prefix),
1020 GFP_KERNEL);
Alex Elderbb23e372013-05-06 09:51:29 -05001021 if (!object_prefix)
1022 return -ENOMEM;
Alex Elderbb23e372013-05-06 09:51:29 -05001023 }
1024
1025 /* Allocate the snapshot context and fill it in */
Alex Elder6a523252012-07-19 17:12:59 -05001026
Alex Elder103a1502012-08-02 11:29:45 -05001027 snap_count = le32_to_cpu(ondisk->snap_count);
Alex Elderbb23e372013-05-06 09:51:29 -05001028 snapc = ceph_create_snap_context(snap_count, GFP_KERNEL);
1029 if (!snapc)
1030 goto out_err;
1031 snapc->seq = le64_to_cpu(ondisk->snap_seq);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001032 if (snap_count) {
Alex Elderbb23e372013-05-06 09:51:29 -05001033 struct rbd_image_snap_ondisk *snaps;
Alex Elderf785cc12012-08-23 23:22:06 -05001034 u64 snap_names_len = le64_to_cpu(ondisk->snap_names_len);
1035
Alex Elderbb23e372013-05-06 09:51:29 -05001036 /* We'll keep a copy of the snapshot names... */
Alex Elder621901d2012-08-23 23:22:06 -05001037
Alex Elderbb23e372013-05-06 09:51:29 -05001038 if (snap_names_len > (u64)SIZE_MAX)
1039 goto out_2big;
1040 snap_names = kmalloc(snap_names_len, GFP_KERNEL);
1041 if (!snap_names)
Alex Elder6a523252012-07-19 17:12:59 -05001042 goto out_err;
Alex Elderbb23e372013-05-06 09:51:29 -05001043
1044 /* ...as well as the array of their sizes. */
Markus Elfring88a25a52016-09-11 12:21:25 +02001045 snap_sizes = kmalloc_array(snap_count,
1046 sizeof(*header->snap_sizes),
1047 GFP_KERNEL);
Alex Elderbb23e372013-05-06 09:51:29 -05001048 if (!snap_sizes)
1049 goto out_err;
1050
Alex Elderf785cc12012-08-23 23:22:06 -05001051 /*
Alex Elderbb23e372013-05-06 09:51:29 -05001052 * Copy the names, and fill in each snapshot's id
1053 * and size.
1054 *
Alex Elder99a41eb2013-05-06 09:51:30 -05001055 * Note that rbd_dev_v1_header_info() guarantees the
Alex Elderbb23e372013-05-06 09:51:29 -05001056 * ondisk buffer we're working with has
Alex Elderf785cc12012-08-23 23:22:06 -05001057 * snap_names_len bytes beyond the end of the
1058 * snapshot id array, this memcpy() is safe.
1059 */
Alex Elderbb23e372013-05-06 09:51:29 -05001060 memcpy(snap_names, &ondisk->snaps[snap_count], snap_names_len);
1061 snaps = ondisk->snaps;
1062 for (i = 0; i < snap_count; i++) {
1063 snapc->snaps[i] = le64_to_cpu(snaps[i].id);
1064 snap_sizes[i] = le64_to_cpu(snaps[i].image_size);
1065 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001066 }
Alex Elder849b4262012-07-09 21:04:24 -05001067
Alex Elderbb23e372013-05-06 09:51:29 -05001068 /* We won't fail any more, fill in the header */
Alex Elder6a523252012-07-19 17:12:59 -05001069
Alex Elderbb23e372013-05-06 09:51:29 -05001070 if (first_time) {
1071 header->object_prefix = object_prefix;
1072 header->obj_order = ondisk->options.order;
Ilya Dryomov263423f2017-01-25 18:16:22 +01001073 rbd_init_layout(rbd_dev);
Alex Elder662518b2013-05-06 09:51:29 -05001074 } else {
1075 ceph_put_snap_context(header->snapc);
1076 kfree(header->snap_names);
1077 kfree(header->snap_sizes);
Alex Elderbb23e372013-05-06 09:51:29 -05001078 }
1079
1080 /* The remaining fields always get updated (when we refresh) */
Alex Elder621901d2012-08-23 23:22:06 -05001081
Alex Elderf84344f2012-08-31 17:29:51 -05001082 header->image_size = le64_to_cpu(ondisk->image_size);
Alex Elderbb23e372013-05-06 09:51:29 -05001083 header->snapc = snapc;
1084 header->snap_names = snap_names;
1085 header->snap_sizes = snap_sizes;
Alex Elder468521c2013-04-26 09:43:47 -05001086
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001087 return 0;
Alex Elderbb23e372013-05-06 09:51:29 -05001088out_2big:
1089 ret = -EIO;
Alex Elder6a523252012-07-19 17:12:59 -05001090out_err:
Alex Elderbb23e372013-05-06 09:51:29 -05001091 kfree(snap_sizes);
1092 kfree(snap_names);
1093 ceph_put_snap_context(snapc);
1094 kfree(object_prefix);
Alex Elderccece232012-07-10 20:30:10 -05001095
Alex Elderbb23e372013-05-06 09:51:29 -05001096 return ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001097}
1098
Alex Elder9682fc62013-04-30 00:44:33 -05001099static const char *_rbd_dev_v1_snap_name(struct rbd_device *rbd_dev, u32 which)
1100{
1101 const char *snap_name;
1102
1103 rbd_assert(which < rbd_dev->header.snapc->num_snaps);
1104
1105 /* Skip over names until we find the one we are looking for */
1106
1107 snap_name = rbd_dev->header.snap_names;
1108 while (which--)
1109 snap_name += strlen(snap_name) + 1;
1110
1111 return kstrdup(snap_name, GFP_KERNEL);
1112}
1113
Alex Elder30d1cff2013-05-01 12:43:03 -05001114/*
1115 * Snapshot id comparison function for use with qsort()/bsearch().
1116 * Note that result is for snapshots in *descending* order.
1117 */
1118static int snapid_compare_reverse(const void *s1, const void *s2)
1119{
1120 u64 snap_id1 = *(u64 *)s1;
1121 u64 snap_id2 = *(u64 *)s2;
1122
1123 if (snap_id1 < snap_id2)
1124 return 1;
1125 return snap_id1 == snap_id2 ? 0 : -1;
1126}
1127
1128/*
1129 * Search a snapshot context to see if the given snapshot id is
1130 * present.
1131 *
1132 * Returns the position of the snapshot id in the array if it's found,
1133 * or BAD_SNAP_INDEX otherwise.
1134 *
1135 * Note: The snapshot array is in kept sorted (by the osd) in
1136 * reverse order, highest snapshot id first.
1137 */
Alex Elder9682fc62013-04-30 00:44:33 -05001138static u32 rbd_dev_snap_index(struct rbd_device *rbd_dev, u64 snap_id)
1139{
1140 struct ceph_snap_context *snapc = rbd_dev->header.snapc;
Alex Elder30d1cff2013-05-01 12:43:03 -05001141 u64 *found;
Alex Elder9682fc62013-04-30 00:44:33 -05001142
Alex Elder30d1cff2013-05-01 12:43:03 -05001143 found = bsearch(&snap_id, &snapc->snaps, snapc->num_snaps,
1144 sizeof (snap_id), snapid_compare_reverse);
Alex Elder9682fc62013-04-30 00:44:33 -05001145
Alex Elder30d1cff2013-05-01 12:43:03 -05001146 return found ? (u32)(found - &snapc->snaps[0]) : BAD_SNAP_INDEX;
Alex Elder9682fc62013-04-30 00:44:33 -05001147}
1148
Alex Elder2ad3d712013-04-30 00:44:33 -05001149static const char *rbd_dev_v1_snap_name(struct rbd_device *rbd_dev,
1150 u64 snap_id)
Alex Elder54cac612013-04-30 00:44:33 -05001151{
1152 u32 which;
Josh Durginda6a6b62013-09-04 17:57:31 -07001153 const char *snap_name;
Alex Elder54cac612013-04-30 00:44:33 -05001154
1155 which = rbd_dev_snap_index(rbd_dev, snap_id);
1156 if (which == BAD_SNAP_INDEX)
Josh Durginda6a6b62013-09-04 17:57:31 -07001157 return ERR_PTR(-ENOENT);
Alex Elder54cac612013-04-30 00:44:33 -05001158
Josh Durginda6a6b62013-09-04 17:57:31 -07001159 snap_name = _rbd_dev_v1_snap_name(rbd_dev, which);
1160 return snap_name ? snap_name : ERR_PTR(-ENOMEM);
Alex Elder54cac612013-04-30 00:44:33 -05001161}
1162
Alex Elder9e15b772012-10-30 19:40:33 -05001163static const char *rbd_snap_name(struct rbd_device *rbd_dev, u64 snap_id)
1164{
Alex Elder9e15b772012-10-30 19:40:33 -05001165 if (snap_id == CEPH_NOSNAP)
1166 return RBD_SNAP_HEAD_NAME;
1167
Alex Elder54cac612013-04-30 00:44:33 -05001168 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
1169 if (rbd_dev->image_format == 1)
1170 return rbd_dev_v1_snap_name(rbd_dev, snap_id);
Alex Elder9e15b772012-10-30 19:40:33 -05001171
Alex Elder54cac612013-04-30 00:44:33 -05001172 return rbd_dev_v2_snap_name(rbd_dev, snap_id);
Alex Elder9e15b772012-10-30 19:40:33 -05001173}
1174
Alex Elder2ad3d712013-04-30 00:44:33 -05001175static int rbd_snap_size(struct rbd_device *rbd_dev, u64 snap_id,
1176 u64 *snap_size)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001177{
Alex Elder2ad3d712013-04-30 00:44:33 -05001178 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
1179 if (snap_id == CEPH_NOSNAP) {
1180 *snap_size = rbd_dev->header.image_size;
1181 } else if (rbd_dev->image_format == 1) {
1182 u32 which;
Alex Elder00f1f362012-02-07 12:03:36 -06001183
Alex Elder2ad3d712013-04-30 00:44:33 -05001184 which = rbd_dev_snap_index(rbd_dev, snap_id);
1185 if (which == BAD_SNAP_INDEX)
1186 return -ENOENT;
Alex Elder00f1f362012-02-07 12:03:36 -06001187
Alex Elder2ad3d712013-04-30 00:44:33 -05001188 *snap_size = rbd_dev->header.snap_sizes[which];
1189 } else {
1190 u64 size = 0;
1191 int ret;
1192
1193 ret = _rbd_dev_v2_snap_size(rbd_dev, snap_id, NULL, &size);
1194 if (ret)
1195 return ret;
1196
1197 *snap_size = size;
1198 }
1199 return 0;
1200}
1201
1202static int rbd_snap_features(struct rbd_device *rbd_dev, u64 snap_id,
1203 u64 *snap_features)
1204{
1205 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
1206 if (snap_id == CEPH_NOSNAP) {
1207 *snap_features = rbd_dev->header.features;
1208 } else if (rbd_dev->image_format == 1) {
1209 *snap_features = 0; /* No features for format 1 */
1210 } else {
1211 u64 features = 0;
1212 int ret;
1213
1214 ret = _rbd_dev_v2_snap_features(rbd_dev, snap_id, &features);
1215 if (ret)
1216 return ret;
1217
1218 *snap_features = features;
1219 }
1220 return 0;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001221}
1222
Alex Elderd1cf5782013-04-27 09:59:30 -05001223static int rbd_dev_mapping_set(struct rbd_device *rbd_dev)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001224{
Alex Elder8f4b7d92013-05-06 07:40:30 -05001225 u64 snap_id = rbd_dev->spec->snap_id;
Alex Elder2ad3d712013-04-30 00:44:33 -05001226 u64 size = 0;
1227 u64 features = 0;
1228 int ret;
Alex Elder8b0241f2013-04-25 23:15:08 -05001229
Alex Elder2ad3d712013-04-30 00:44:33 -05001230 ret = rbd_snap_size(rbd_dev, snap_id, &size);
1231 if (ret)
1232 return ret;
1233 ret = rbd_snap_features(rbd_dev, snap_id, &features);
1234 if (ret)
1235 return ret;
1236
1237 rbd_dev->mapping.size = size;
1238 rbd_dev->mapping.features = features;
1239
Alex Elder8b0241f2013-04-25 23:15:08 -05001240 return 0;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001241}
1242
Alex Elderd1cf5782013-04-27 09:59:30 -05001243static void rbd_dev_mapping_clear(struct rbd_device *rbd_dev)
1244{
1245 rbd_dev->mapping.size = 0;
1246 rbd_dev->mapping.features = 0;
Alex Elder200a6a82013-04-28 23:32:34 -05001247}
1248
Ilya Dryomov5359a172018-01-20 10:30:10 +01001249static void zero_bvec(struct bio_vec *bv)
Alex Elder65ccfe22012-08-09 10:33:26 -07001250{
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001251 void *buf;
Ilya Dryomov5359a172018-01-20 10:30:10 +01001252 unsigned long flags;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001253
Ilya Dryomov5359a172018-01-20 10:30:10 +01001254 buf = bvec_kmap_irq(bv, &flags);
1255 memset(buf, 0, bv->bv_len);
1256 flush_dcache_page(bv->bv_page);
1257 bvec_kunmap_irq(buf, &flags);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001258}
1259
Ilya Dryomov5359a172018-01-20 10:30:10 +01001260static void zero_bios(struct ceph_bio_iter *bio_pos, u32 off, u32 bytes)
Alex Elderb9434c52013-04-19 15:34:50 -05001261{
Ilya Dryomov5359a172018-01-20 10:30:10 +01001262 struct ceph_bio_iter it = *bio_pos;
Alex Elderb9434c52013-04-19 15:34:50 -05001263
Ilya Dryomov5359a172018-01-20 10:30:10 +01001264 ceph_bio_iter_advance(&it, off);
1265 ceph_bio_iter_advance_step(&it, bytes, ({
1266 zero_bvec(&bv);
1267 }));
Alex Elderb9434c52013-04-19 15:34:50 -05001268}
1269
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001270static void zero_bvecs(struct ceph_bvec_iter *bvec_pos, u32 off, u32 bytes)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001271{
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001272 struct ceph_bvec_iter it = *bvec_pos;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001273
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001274 ceph_bvec_iter_advance(&it, off);
1275 ceph_bvec_iter_advance_step(&it, bytes, ({
1276 zero_bvec(&bv);
1277 }));
Alex Elderf7760da2012-10-20 22:17:27 -05001278}
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001279
Alex Elderf7760da2012-10-20 22:17:27 -05001280/*
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001281 * Zero a range in @obj_req data buffer defined by a bio (list) or
Ilya Dryomovafb97882018-02-06 19:26:35 +01001282 * (private) bio_vec array.
Alex Elderf7760da2012-10-20 22:17:27 -05001283 *
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001284 * @off is relative to the start of the data buffer.
Alex Elderf7760da2012-10-20 22:17:27 -05001285 */
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001286static void rbd_obj_zero_range(struct rbd_obj_request *obj_req, u32 off,
1287 u32 bytes)
Alex Elderf7760da2012-10-20 22:17:27 -05001288{
Ilya Dryomovecc633c2018-02-01 11:50:47 +01001289 switch (obj_req->img_request->data_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001290 case OBJ_REQUEST_BIO:
1291 zero_bios(&obj_req->bio_pos, off, bytes);
1292 break;
1293 case OBJ_REQUEST_BVECS:
Ilya Dryomovafb97882018-02-06 19:26:35 +01001294 case OBJ_REQUEST_OWN_BVECS:
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001295 zero_bvecs(&obj_req->bvec_pos, off, bytes);
1296 break;
1297 default:
1298 rbd_assert(0);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001299 }
Alex Elderbf0d5f502012-11-22 00:00:08 -06001300}
1301
1302static void rbd_obj_request_destroy(struct kref *kref);
1303static void rbd_obj_request_put(struct rbd_obj_request *obj_request)
1304{
1305 rbd_assert(obj_request != NULL);
Alex Elder37206ee2013-02-20 17:32:08 -06001306 dout("%s: obj %p (was %d)\n", __func__, obj_request,
Peter Zijlstra2c935bc2016-11-14 17:29:48 +01001307 kref_read(&obj_request->kref));
Alex Elderbf0d5f502012-11-22 00:00:08 -06001308 kref_put(&obj_request->kref, rbd_obj_request_destroy);
1309}
1310
Alex Elder0f2d5be2014-04-26 14:21:44 +04001311static void rbd_img_request_get(struct rbd_img_request *img_request)
1312{
1313 dout("%s: img %p (was %d)\n", __func__, img_request,
Peter Zijlstra2c935bc2016-11-14 17:29:48 +01001314 kref_read(&img_request->kref));
Alex Elder0f2d5be2014-04-26 14:21:44 +04001315 kref_get(&img_request->kref);
1316}
1317
Alex Elderbf0d5f502012-11-22 00:00:08 -06001318static void rbd_img_request_destroy(struct kref *kref);
1319static void rbd_img_request_put(struct rbd_img_request *img_request)
1320{
1321 rbd_assert(img_request != NULL);
Alex Elder37206ee2013-02-20 17:32:08 -06001322 dout("%s: img %p (was %d)\n", __func__, img_request,
Peter Zijlstra2c935bc2016-11-14 17:29:48 +01001323 kref_read(&img_request->kref));
Ilya Dryomove93aca02018-02-06 19:26:35 +01001324 kref_put(&img_request->kref, rbd_img_request_destroy);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001325}
1326
1327static inline void rbd_img_obj_request_add(struct rbd_img_request *img_request,
1328 struct rbd_obj_request *obj_request)
1329{
Alex Elder25dcf952013-01-25 17:08:55 -06001330 rbd_assert(obj_request->img_request == NULL);
1331
Alex Elderb155e862013-04-15 14:50:37 -05001332 /* Image request now owns object's original reference */
Alex Elderbf0d5f502012-11-22 00:00:08 -06001333 obj_request->img_request = img_request;
Alex Elder25dcf952013-01-25 17:08:55 -06001334 img_request->obj_request_count++;
Ilya Dryomov7114eda2018-02-01 11:50:47 +01001335 img_request->pending_count++;
Ilya Dryomov15961b42018-02-01 11:50:47 +01001336 dout("%s: img %p obj %p\n", __func__, img_request, obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001337}
1338
1339static inline void rbd_img_obj_request_del(struct rbd_img_request *img_request,
1340 struct rbd_obj_request *obj_request)
1341{
Ilya Dryomov15961b42018-02-01 11:50:47 +01001342 dout("%s: img %p obj %p\n", __func__, img_request, obj_request);
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001343 list_del(&obj_request->ex.oe_item);
Alex Elder25dcf952013-01-25 17:08:55 -06001344 rbd_assert(img_request->obj_request_count > 0);
1345 img_request->obj_request_count--;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001346 rbd_assert(obj_request->img_request == img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001347 rbd_obj_request_put(obj_request);
1348}
1349
Ilya Dryomov980917f2016-09-12 18:59:42 +02001350static void rbd_obj_request_submit(struct rbd_obj_request *obj_request)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001351{
Ilya Dryomov980917f2016-09-12 18:59:42 +02001352 struct ceph_osd_request *osd_req = obj_request->osd_req;
1353
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001354 dout("%s %p object_no %016llx %llu~%llu osd_req %p\n", __func__,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001355 obj_request, obj_request->ex.oe_objno, obj_request->ex.oe_off,
1356 obj_request->ex.oe_len, osd_req);
Ilya Dryomov980917f2016-09-12 18:59:42 +02001357 ceph_osdc_start_request(osd_req->r_osdc, osd_req, false);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001358}
1359
Alex Elder0c425242013-02-08 09:55:49 -06001360/*
1361 * The default/initial value for all image request flags is 0. Each
1362 * is conditionally set to 1 at image request initialization time
1363 * and currently never change thereafter.
1364 */
Alex Elderd0b2e942013-01-24 16:13:36 -06001365static void img_request_layered_set(struct rbd_img_request *img_request)
1366{
1367 set_bit(IMG_REQ_LAYERED, &img_request->flags);
1368 smp_mb();
1369}
1370
Alex Eldera2acd002013-05-08 22:50:04 -05001371static void img_request_layered_clear(struct rbd_img_request *img_request)
1372{
1373 clear_bit(IMG_REQ_LAYERED, &img_request->flags);
1374 smp_mb();
1375}
1376
Alex Elderd0b2e942013-01-24 16:13:36 -06001377static bool img_request_layered_test(struct rbd_img_request *img_request)
1378{
1379 smp_mb();
1380 return test_bit(IMG_REQ_LAYERED, &img_request->flags) != 0;
1381}
1382
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001383static bool rbd_obj_is_entire(struct rbd_obj_request *obj_req)
Josh Durgin3b434a2a2014-04-04 17:32:15 -07001384{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001385 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
1386
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001387 return !obj_req->ex.oe_off &&
1388 obj_req->ex.oe_len == rbd_dev->layout.object_size;
Josh Durgin3b434a2a2014-04-04 17:32:15 -07001389}
1390
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001391static bool rbd_obj_is_tail(struct rbd_obj_request *obj_req)
Alex Elder6e2a4502013-03-27 09:16:30 -05001392{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001393 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
Alex Elderb9434c52013-04-19 15:34:50 -05001394
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001395 return obj_req->ex.oe_off + obj_req->ex.oe_len ==
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001396 rbd_dev->layout.object_size;
1397}
1398
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001399static u64 rbd_obj_img_extents_bytes(struct rbd_obj_request *obj_req)
1400{
1401 return ceph_file_extents_bytes(obj_req->img_extents,
1402 obj_req->num_img_extents);
1403}
1404
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001405static bool rbd_img_is_write(struct rbd_img_request *img_req)
1406{
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001407 switch (img_req->op_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001408 case OBJ_OP_READ:
1409 return false;
1410 case OBJ_OP_WRITE:
1411 case OBJ_OP_DISCARD:
1412 return true;
1413 default:
Arnd Bergmannc6244b32018-04-04 14:53:39 +02001414 BUG();
Alex Elder6e2a4502013-03-27 09:16:30 -05001415 }
Alex Elder6e2a4502013-03-27 09:16:30 -05001416}
1417
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001418static void rbd_obj_handle_request(struct rbd_obj_request *obj_req);
Ilya Dryomov27617132015-07-16 17:36:11 +03001419
Ilya Dryomov85e084f2016-04-28 16:07:24 +02001420static void rbd_osd_req_callback(struct ceph_osd_request *osd_req)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001421{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001422 struct rbd_obj_request *obj_req = osd_req->r_priv;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001423
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001424 dout("%s osd_req %p result %d for obj_req %p\n", __func__, osd_req,
1425 osd_req->r_result, obj_req);
1426 rbd_assert(osd_req == obj_req->osd_req);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001427
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001428 obj_req->result = osd_req->r_result < 0 ? osd_req->r_result : 0;
1429 if (!obj_req->result && !rbd_img_is_write(obj_req->img_request))
1430 obj_req->xferred = osd_req->r_result;
1431 else
1432 /*
1433 * Writes aren't allowed to return a data payload. In some
1434 * guarded write cases (e.g. stat + zero on an empty object)
1435 * a stat response makes it through, but we don't care.
1436 */
1437 obj_req->xferred = 0;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001438
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001439 rbd_obj_handle_request(obj_req);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001440}
1441
Alex Elder9d4df012013-04-19 15:34:50 -05001442static void rbd_osd_req_format_read(struct rbd_obj_request *obj_request)
Alex Elder430c28c2013-04-03 21:32:51 -05001443{
Alex Elder8c042b02013-04-03 01:28:58 -05001444 struct ceph_osd_request *osd_req = obj_request->osd_req;
Alex Elder430c28c2013-04-03 21:32:51 -05001445
Ilya Dryomova162b302018-01-30 17:52:10 +01001446 osd_req->r_flags = CEPH_OSD_FLAG_READ;
Ilya Dryomov7c848832016-09-15 17:56:39 +02001447 osd_req->r_snapid = obj_request->img_request->snap_id;
Alex Elder9d4df012013-04-19 15:34:50 -05001448}
1449
1450static void rbd_osd_req_format_write(struct rbd_obj_request *obj_request)
1451{
Alex Elder9d4df012013-04-19 15:34:50 -05001452 struct ceph_osd_request *osd_req = obj_request->osd_req;
Alex Elder9d4df012013-04-19 15:34:50 -05001453
Ilya Dryomova162b302018-01-30 17:52:10 +01001454 osd_req->r_flags = CEPH_OSD_FLAG_WRITE;
Deepa Dinamani1134e092017-05-08 15:59:19 -07001455 ktime_get_real_ts(&osd_req->r_mtime);
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001456 osd_req->r_data_offset = obj_request->ex.oe_off;
Alex Elder430c28c2013-04-03 21:32:51 -05001457}
1458
Ilya Dryomovbc812072017-01-25 18:16:23 +01001459static struct ceph_osd_request *
Ilya Dryomova162b302018-01-30 17:52:10 +01001460rbd_osd_req_create(struct rbd_obj_request *obj_req, unsigned int num_ops)
Ilya Dryomovbc812072017-01-25 18:16:23 +01001461{
Ilya Dryomova162b302018-01-30 17:52:10 +01001462 struct rbd_img_request *img_req = obj_req->img_request;
1463 struct rbd_device *rbd_dev = img_req->rbd_dev;
Ilya Dryomovbc812072017-01-25 18:16:23 +01001464 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
1465 struct ceph_osd_request *req;
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001466 const char *name_format = rbd_dev->image_format == 1 ?
1467 RBD_V1_DATA_FORMAT : RBD_V2_DATA_FORMAT;
Ilya Dryomovbc812072017-01-25 18:16:23 +01001468
Ilya Dryomova162b302018-01-30 17:52:10 +01001469 req = ceph_osdc_alloc_request(osdc,
1470 (rbd_img_is_write(img_req) ? img_req->snapc : NULL),
1471 num_ops, false, GFP_NOIO);
Ilya Dryomovbc812072017-01-25 18:16:23 +01001472 if (!req)
1473 return NULL;
1474
Ilya Dryomovbc812072017-01-25 18:16:23 +01001475 req->r_callback = rbd_osd_req_callback;
Ilya Dryomova162b302018-01-30 17:52:10 +01001476 req->r_priv = obj_req;
Ilya Dryomovbc812072017-01-25 18:16:23 +01001477
1478 req->r_base_oloc.pool = rbd_dev->layout.pool_id;
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001479 if (ceph_oid_aprintf(&req->r_base_oid, GFP_NOIO, name_format,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001480 rbd_dev->header.object_prefix, obj_req->ex.oe_objno))
Ilya Dryomovbc812072017-01-25 18:16:23 +01001481 goto err_req;
1482
1483 if (ceph_osdc_alloc_messages(req, GFP_NOIO))
1484 goto err_req;
1485
1486 return req;
1487
1488err_req:
1489 ceph_osdc_put_request(req);
1490 return NULL;
1491}
1492
Alex Elderbf0d5f502012-11-22 00:00:08 -06001493static void rbd_osd_req_destroy(struct ceph_osd_request *osd_req)
1494{
1495 ceph_osdc_put_request(osd_req);
1496}
1497
Ilya Dryomovecc633c2018-02-01 11:50:47 +01001498static struct rbd_obj_request *rbd_obj_request_create(void)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001499{
1500 struct rbd_obj_request *obj_request;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001501
Ilya Dryomov5a60e872015-06-24 17:24:33 +03001502 obj_request = kmem_cache_zalloc(rbd_obj_request_cache, GFP_NOIO);
Ilya Dryomov6c696d82017-01-25 18:16:23 +01001503 if (!obj_request)
Alex Elderf907ad52013-05-01 12:43:03 -05001504 return NULL;
Alex Elderf907ad52013-05-01 12:43:03 -05001505
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001506 ceph_object_extent_init(&obj_request->ex);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001507 kref_init(&obj_request->kref);
1508
Ilya Dryomov67e2b652017-01-25 18:16:22 +01001509 dout("%s %p\n", __func__, obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001510 return obj_request;
1511}
1512
1513static void rbd_obj_request_destroy(struct kref *kref)
1514{
1515 struct rbd_obj_request *obj_request;
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001516 u32 i;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001517
1518 obj_request = container_of(kref, struct rbd_obj_request, kref);
1519
Alex Elder37206ee2013-02-20 17:32:08 -06001520 dout("%s: obj %p\n", __func__, obj_request);
1521
Alex Elderbf0d5f502012-11-22 00:00:08 -06001522 if (obj_request->osd_req)
1523 rbd_osd_req_destroy(obj_request->osd_req);
1524
Ilya Dryomovecc633c2018-02-01 11:50:47 +01001525 switch (obj_request->img_request->data_type) {
Alex Elder9969ebc2013-01-18 12:31:10 -06001526 case OBJ_REQUEST_NODATA:
Alex Elderbf0d5f502012-11-22 00:00:08 -06001527 case OBJ_REQUEST_BIO:
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001528 case OBJ_REQUEST_BVECS:
Ilya Dryomov5359a172018-01-20 10:30:10 +01001529 break; /* Nothing to do */
Ilya Dryomovafb97882018-02-06 19:26:35 +01001530 case OBJ_REQUEST_OWN_BVECS:
1531 kfree(obj_request->bvec_pos.bvecs);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001532 break;
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001533 default:
1534 rbd_assert(0);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001535 }
1536
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001537 kfree(obj_request->img_extents);
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001538 if (obj_request->copyup_bvecs) {
1539 for (i = 0; i < obj_request->copyup_bvec_count; i++) {
1540 if (obj_request->copyup_bvecs[i].bv_page)
1541 __free_page(obj_request->copyup_bvecs[i].bv_page);
1542 }
1543 kfree(obj_request->copyup_bvecs);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001544 }
1545
Alex Elder868311b2013-05-01 12:43:03 -05001546 kmem_cache_free(rbd_obj_request_cache, obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001547}
1548
Alex Elderfb65d2282013-05-08 22:50:04 -05001549/* It's OK to call this for a device with no parent */
1550
1551static void rbd_spec_put(struct rbd_spec *spec);
1552static void rbd_dev_unparent(struct rbd_device *rbd_dev)
1553{
1554 rbd_dev_remove_parent(rbd_dev);
1555 rbd_spec_put(rbd_dev->parent_spec);
1556 rbd_dev->parent_spec = NULL;
1557 rbd_dev->parent_overlap = 0;
1558}
1559
Alex Elderbf0d5f502012-11-22 00:00:08 -06001560/*
Alex Eldera2acd002013-05-08 22:50:04 -05001561 * Parent image reference counting is used to determine when an
1562 * image's parent fields can be safely torn down--after there are no
1563 * more in-flight requests to the parent image. When the last
1564 * reference is dropped, cleaning them up is safe.
1565 */
1566static void rbd_dev_parent_put(struct rbd_device *rbd_dev)
1567{
1568 int counter;
1569
1570 if (!rbd_dev->parent_spec)
1571 return;
1572
1573 counter = atomic_dec_return_safe(&rbd_dev->parent_ref);
1574 if (counter > 0)
1575 return;
1576
1577 /* Last reference; clean up parent data structures */
1578
1579 if (!counter)
1580 rbd_dev_unparent(rbd_dev);
1581 else
Ilya Dryomov9584d502014-07-11 12:11:20 +04001582 rbd_warn(rbd_dev, "parent reference underflow");
Alex Eldera2acd002013-05-08 22:50:04 -05001583}
1584
1585/*
1586 * If an image has a non-zero parent overlap, get a reference to its
1587 * parent.
1588 *
1589 * Returns true if the rbd device has a parent with a non-zero
1590 * overlap and a reference for it was successfully taken, or
1591 * false otherwise.
1592 */
1593static bool rbd_dev_parent_get(struct rbd_device *rbd_dev)
1594{
Ilya Dryomovae43e9d2015-01-19 18:13:43 +03001595 int counter = 0;
Alex Eldera2acd002013-05-08 22:50:04 -05001596
1597 if (!rbd_dev->parent_spec)
1598 return false;
1599
Ilya Dryomovae43e9d2015-01-19 18:13:43 +03001600 down_read(&rbd_dev->header_rwsem);
1601 if (rbd_dev->parent_overlap)
1602 counter = atomic_inc_return_safe(&rbd_dev->parent_ref);
1603 up_read(&rbd_dev->header_rwsem);
Alex Eldera2acd002013-05-08 22:50:04 -05001604
1605 if (counter < 0)
Ilya Dryomov9584d502014-07-11 12:11:20 +04001606 rbd_warn(rbd_dev, "parent reference overflow");
Alex Eldera2acd002013-05-08 22:50:04 -05001607
Ilya Dryomovae43e9d2015-01-19 18:13:43 +03001608 return counter > 0;
Alex Eldera2acd002013-05-08 22:50:04 -05001609}
1610
Alex Elderbf0d5f502012-11-22 00:00:08 -06001611/*
1612 * Caller is responsible for filling in the list of object requests
1613 * that comprises the image request, and the Linux request pointer
1614 * (if there is one).
1615 */
Alex Eldercc344fa2013-02-19 12:25:56 -06001616static struct rbd_img_request *rbd_img_request_create(
1617 struct rbd_device *rbd_dev,
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08001618 enum obj_operation_type op_type,
Josh Durgin4e752f02014-04-08 11:12:11 -07001619 struct ceph_snap_context *snapc)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001620{
1621 struct rbd_img_request *img_request;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001622
Ilya Dryomova0c58952018-01-22 16:03:06 +01001623 img_request = kmem_cache_zalloc(rbd_img_request_cache, GFP_NOIO);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001624 if (!img_request)
1625 return NULL;
1626
Alex Elderbf0d5f502012-11-22 00:00:08 -06001627 img_request->rbd_dev = rbd_dev;
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001628 img_request->op_type = op_type;
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001629 if (!rbd_img_is_write(img_request))
Alex Elderbf0d5f502012-11-22 00:00:08 -06001630 img_request->snap_id = rbd_dev->spec->snap_id;
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001631 else
1632 img_request->snapc = snapc;
1633
Alex Eldera2acd002013-05-08 22:50:04 -05001634 if (rbd_dev_parent_get(rbd_dev))
Alex Elderd0b2e942013-01-24 16:13:36 -06001635 img_request_layered_set(img_request);
Ilya Dryomova0c58952018-01-22 16:03:06 +01001636
Alex Elderbf0d5f502012-11-22 00:00:08 -06001637 spin_lock_init(&img_request->completion_lock);
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001638 INIT_LIST_HEAD(&img_request->object_extents);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001639 kref_init(&img_request->kref);
1640
Ilya Dryomovdfd98752018-02-06 19:26:35 +01001641 dout("%s: rbd_dev %p %s -> img %p\n", __func__, rbd_dev,
1642 obj_op_name(op_type), img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001643 return img_request;
1644}
1645
1646static void rbd_img_request_destroy(struct kref *kref)
1647{
1648 struct rbd_img_request *img_request;
1649 struct rbd_obj_request *obj_request;
1650 struct rbd_obj_request *next_obj_request;
1651
1652 img_request = container_of(kref, struct rbd_img_request, kref);
1653
Alex Elder37206ee2013-02-20 17:32:08 -06001654 dout("%s: img %p\n", __func__, img_request);
1655
Alex Elderbf0d5f502012-11-22 00:00:08 -06001656 for_each_obj_request_safe(img_request, obj_request, next_obj_request)
1657 rbd_img_obj_request_del(img_request, obj_request);
Alex Elder25dcf952013-01-25 17:08:55 -06001658 rbd_assert(img_request->obj_request_count == 0);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001659
Alex Eldera2acd002013-05-08 22:50:04 -05001660 if (img_request_layered_test(img_request)) {
1661 img_request_layered_clear(img_request);
1662 rbd_dev_parent_put(img_request->rbd_dev);
1663 }
1664
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001665 if (rbd_img_is_write(img_request))
Alex Elder812164f82013-04-30 00:44:32 -05001666 ceph_put_snap_context(img_request->snapc);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001667
Alex Elder1c2a9df2013-05-01 12:43:03 -05001668 kmem_cache_free(rbd_img_request_cache, img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001669}
1670
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001671static void prune_extents(struct ceph_file_extent *img_extents,
1672 u32 *num_img_extents, u64 overlap)
Alex Eldere93f3152013-05-08 22:50:04 -05001673{
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001674 u32 cnt = *num_img_extents;
Alex Eldere93f3152013-05-08 22:50:04 -05001675
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001676 /* drop extents completely beyond the overlap */
1677 while (cnt && img_extents[cnt - 1].fe_off >= overlap)
1678 cnt--;
Alex Eldere93f3152013-05-08 22:50:04 -05001679
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001680 if (cnt) {
1681 struct ceph_file_extent *ex = &img_extents[cnt - 1];
Alex Eldere93f3152013-05-08 22:50:04 -05001682
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001683 /* trim final overlapping extent */
1684 if (ex->fe_off + ex->fe_len > overlap)
1685 ex->fe_len = overlap - ex->fe_off;
Alex Elder12178572013-02-08 09:55:49 -06001686 }
1687
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001688 *num_img_extents = cnt;
Alex Elder21692382013-04-05 01:27:12 -05001689}
1690
Alex Elderf1a47392013-04-19 15:34:50 -05001691/*
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001692 * Determine the byte range(s) covered by either just the object extent
1693 * or the entire object in the parent image.
Josh Durgin3b434a2a2014-04-04 17:32:15 -07001694 */
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001695static int rbd_obj_calc_img_extents(struct rbd_obj_request *obj_req,
1696 bool entire)
Josh Durgin3b434a2a2014-04-04 17:32:15 -07001697{
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001698 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
Alex Elderc5b5ef62013-02-11 12:33:24 -06001699 int ret;
1700
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001701 if (!rbd_dev->parent_overlap)
1702 return 0;
1703
1704 ret = ceph_extent_to_file(&rbd_dev->layout, obj_req->ex.oe_objno,
1705 entire ? 0 : obj_req->ex.oe_off,
1706 entire ? rbd_dev->layout.object_size :
1707 obj_req->ex.oe_len,
1708 &obj_req->img_extents,
1709 &obj_req->num_img_extents);
1710 if (ret)
1711 return ret;
1712
1713 prune_extents(obj_req->img_extents, &obj_req->num_img_extents,
1714 rbd_dev->parent_overlap);
1715 return 0;
1716}
1717
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001718static void rbd_osd_req_setup_data(struct rbd_obj_request *obj_req, u32 which)
1719{
Ilya Dryomovecc633c2018-02-01 11:50:47 +01001720 switch (obj_req->img_request->data_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001721 case OBJ_REQUEST_BIO:
1722 osd_req_op_extent_osd_data_bio(obj_req->osd_req, which,
1723 &obj_req->bio_pos,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001724 obj_req->ex.oe_len);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001725 break;
1726 case OBJ_REQUEST_BVECS:
Ilya Dryomovafb97882018-02-06 19:26:35 +01001727 case OBJ_REQUEST_OWN_BVECS:
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001728 rbd_assert(obj_req->bvec_pos.iter.bi_size ==
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001729 obj_req->ex.oe_len);
Ilya Dryomovafb97882018-02-06 19:26:35 +01001730 rbd_assert(obj_req->bvec_idx == obj_req->bvec_count);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001731 osd_req_op_extent_osd_data_bvec_pos(obj_req->osd_req, which,
1732 &obj_req->bvec_pos);
1733 break;
1734 default:
1735 rbd_assert(0);
1736 }
1737}
1738
1739static int rbd_obj_setup_read(struct rbd_obj_request *obj_req)
1740{
Ilya Dryomova162b302018-01-30 17:52:10 +01001741 obj_req->osd_req = rbd_osd_req_create(obj_req, 1);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001742 if (!obj_req->osd_req)
Ilya Dryomov710214e2016-09-15 17:53:32 +02001743 return -ENOMEM;
1744
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001745 osd_req_op_extent_init(obj_req->osd_req, 0, CEPH_OSD_OP_READ,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001746 obj_req->ex.oe_off, obj_req->ex.oe_len, 0, 0);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001747 rbd_osd_req_setup_data(obj_req, 0);
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001748
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001749 rbd_osd_req_format_read(obj_req);
1750 return 0;
1751}
1752
1753static int __rbd_obj_setup_stat(struct rbd_obj_request *obj_req,
1754 unsigned int which)
1755{
1756 struct page **pages;
Ilya Dryomov710214e2016-09-15 17:53:32 +02001757
Alex Elderc5b5ef62013-02-11 12:33:24 -06001758 /*
1759 * The response data for a STAT call consists of:
1760 * le64 length;
1761 * struct {
1762 * le32 tv_sec;
1763 * le32 tv_nsec;
1764 * } mtime;
1765 */
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001766 pages = ceph_alloc_page_vector(1, GFP_NOIO);
1767 if (IS_ERR(pages))
1768 return PTR_ERR(pages);
Alex Elderc5b5ef62013-02-11 12:33:24 -06001769
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001770 osd_req_op_init(obj_req->osd_req, which, CEPH_OSD_OP_STAT, 0);
1771 osd_req_op_raw_data_in_pages(obj_req->osd_req, which, pages,
1772 8 + sizeof(struct ceph_timespec),
1773 0, false, true);
Ilya Dryomov980917f2016-09-12 18:59:42 +02001774 return 0;
Alex Elderc5b5ef62013-02-11 12:33:24 -06001775}
1776
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001777static void __rbd_obj_setup_write(struct rbd_obj_request *obj_req,
1778 unsigned int which)
Alex Elderb454e362013-04-19 15:34:50 -05001779{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001780 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
1781 u16 opcode;
Alex Elderb454e362013-04-19 15:34:50 -05001782
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001783 osd_req_op_alloc_hint_init(obj_req->osd_req, which++,
1784 rbd_dev->layout.object_size,
1785 rbd_dev->layout.object_size);
Alex Elderb454e362013-04-19 15:34:50 -05001786
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001787 if (rbd_obj_is_entire(obj_req))
1788 opcode = CEPH_OSD_OP_WRITEFULL;
1789 else
1790 opcode = CEPH_OSD_OP_WRITE;
Ilya Dryomov70d045f2014-09-12 16:02:01 +04001791
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001792 osd_req_op_extent_init(obj_req->osd_req, which, opcode,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001793 obj_req->ex.oe_off, obj_req->ex.oe_len, 0, 0);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001794 rbd_osd_req_setup_data(obj_req, which++);
Ilya Dryomov70d045f2014-09-12 16:02:01 +04001795
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001796 rbd_assert(which == obj_req->osd_req->r_num_ops);
1797 rbd_osd_req_format_write(obj_req);
Ilya Dryomov70d045f2014-09-12 16:02:01 +04001798}
1799
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001800static int rbd_obj_setup_write(struct rbd_obj_request *obj_req)
Ilya Dryomov70d045f2014-09-12 16:02:01 +04001801{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001802 unsigned int num_osd_ops, which = 0;
1803 int ret;
Ilya Dryomov058aa992016-09-12 14:44:45 +02001804
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001805 /* reverse map the entire object onto the parent */
1806 ret = rbd_obj_calc_img_extents(obj_req, true);
1807 if (ret)
1808 return ret;
1809
1810 if (obj_req->num_img_extents) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001811 obj_req->write_state = RBD_OBJ_WRITE_GUARD;
1812 num_osd_ops = 3; /* stat + setallochint + write/writefull */
1813 } else {
1814 obj_req->write_state = RBD_OBJ_WRITE_FLAT;
1815 num_osd_ops = 2; /* setallochint + write/writefull */
1816 }
1817
Ilya Dryomova162b302018-01-30 17:52:10 +01001818 obj_req->osd_req = rbd_osd_req_create(obj_req, num_osd_ops);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001819 if (!obj_req->osd_req)
1820 return -ENOMEM;
1821
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001822 if (obj_req->num_img_extents) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001823 ret = __rbd_obj_setup_stat(obj_req, which++);
1824 if (ret)
1825 return ret;
1826 }
1827
1828 __rbd_obj_setup_write(obj_req, which);
1829 return 0;
1830}
1831
1832static void __rbd_obj_setup_discard(struct rbd_obj_request *obj_req,
1833 unsigned int which)
1834{
1835 u16 opcode;
1836
1837 if (rbd_obj_is_entire(obj_req)) {
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001838 if (obj_req->num_img_extents) {
Ilya Dryomov2bb1e562018-02-06 19:26:34 +01001839 osd_req_op_init(obj_req->osd_req, which++,
1840 CEPH_OSD_OP_CREATE, 0);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001841 opcode = CEPH_OSD_OP_TRUNCATE;
1842 } else {
1843 osd_req_op_init(obj_req->osd_req, which++,
1844 CEPH_OSD_OP_DELETE, 0);
1845 opcode = 0;
1846 }
1847 } else if (rbd_obj_is_tail(obj_req)) {
1848 opcode = CEPH_OSD_OP_TRUNCATE;
1849 } else {
1850 opcode = CEPH_OSD_OP_ZERO;
1851 }
1852
1853 if (opcode)
1854 osd_req_op_extent_init(obj_req->osd_req, which++, opcode,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001855 obj_req->ex.oe_off, obj_req->ex.oe_len,
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001856 0, 0);
1857
1858 rbd_assert(which == obj_req->osd_req->r_num_ops);
1859 rbd_osd_req_format_write(obj_req);
1860}
1861
1862static int rbd_obj_setup_discard(struct rbd_obj_request *obj_req)
1863{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001864 unsigned int num_osd_ops, which = 0;
1865 int ret;
1866
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001867 /* reverse map the entire object onto the parent */
1868 ret = rbd_obj_calc_img_extents(obj_req, true);
1869 if (ret)
1870 return ret;
1871
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001872 if (rbd_obj_is_entire(obj_req)) {
1873 obj_req->write_state = RBD_OBJ_WRITE_FLAT;
Ilya Dryomov2bb1e562018-02-06 19:26:34 +01001874 if (obj_req->num_img_extents)
1875 num_osd_ops = 2; /* create + truncate */
1876 else
1877 num_osd_ops = 1; /* delete */
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001878 } else {
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001879 if (obj_req->num_img_extents) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001880 obj_req->write_state = RBD_OBJ_WRITE_GUARD;
1881 num_osd_ops = 2; /* stat + truncate/zero */
1882 } else {
1883 obj_req->write_state = RBD_OBJ_WRITE_FLAT;
1884 num_osd_ops = 1; /* truncate/zero */
1885 }
1886 }
1887
Ilya Dryomova162b302018-01-30 17:52:10 +01001888 obj_req->osd_req = rbd_osd_req_create(obj_req, num_osd_ops);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001889 if (!obj_req->osd_req)
1890 return -ENOMEM;
1891
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001892 if (!rbd_obj_is_entire(obj_req) && obj_req->num_img_extents) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001893 ret = __rbd_obj_setup_stat(obj_req, which++);
1894 if (ret)
1895 return ret;
1896 }
1897
1898 __rbd_obj_setup_discard(obj_req, which);
1899 return 0;
1900}
1901
1902/*
1903 * For each object request in @img_req, allocate an OSD request, add
1904 * individual OSD ops and prepare them for submission. The number of
1905 * OSD ops depends on op_type and the overlap point (if any).
1906 */
1907static int __rbd_img_fill_request(struct rbd_img_request *img_req)
1908{
1909 struct rbd_obj_request *obj_req;
1910 int ret;
1911
1912 for_each_obj_request(img_req, obj_req) {
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001913 switch (img_req->op_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001914 case OBJ_OP_READ:
1915 ret = rbd_obj_setup_read(obj_req);
1916 break;
1917 case OBJ_OP_WRITE:
1918 ret = rbd_obj_setup_write(obj_req);
1919 break;
1920 case OBJ_OP_DISCARD:
1921 ret = rbd_obj_setup_discard(obj_req);
1922 break;
1923 default:
1924 rbd_assert(0);
1925 }
1926 if (ret)
1927 return ret;
1928 }
1929
1930 return 0;
1931}
1932
Ilya Dryomov5a237812018-02-06 19:26:34 +01001933union rbd_img_fill_iter {
1934 struct ceph_bio_iter bio_iter;
1935 struct ceph_bvec_iter bvec_iter;
1936};
1937
1938struct rbd_img_fill_ctx {
1939 enum obj_request_type pos_type;
1940 union rbd_img_fill_iter *pos;
1941 union rbd_img_fill_iter iter;
1942 ceph_object_extent_fn_t set_pos_fn;
Ilya Dryomovafb97882018-02-06 19:26:35 +01001943 ceph_object_extent_fn_t count_fn;
1944 ceph_object_extent_fn_t copy_fn;
Ilya Dryomov5a237812018-02-06 19:26:34 +01001945};
1946
1947static struct ceph_object_extent *alloc_object_extent(void *arg)
1948{
1949 struct rbd_img_request *img_req = arg;
1950 struct rbd_obj_request *obj_req;
1951
1952 obj_req = rbd_obj_request_create();
1953 if (!obj_req)
1954 return NULL;
1955
1956 rbd_img_obj_request_add(img_req, obj_req);
1957 return &obj_req->ex;
1958}
1959
1960/*
Ilya Dryomovafb97882018-02-06 19:26:35 +01001961 * While su != os && sc == 1 is technically not fancy (it's the same
1962 * layout as su == os && sc == 1), we can't use the nocopy path for it
1963 * because ->set_pos_fn() should be called only once per object.
1964 * ceph_file_to_extents() invokes action_fn once per stripe unit, so
1965 * treat su != os && sc == 1 as fancy.
Ilya Dryomov5a237812018-02-06 19:26:34 +01001966 */
Ilya Dryomovafb97882018-02-06 19:26:35 +01001967static bool rbd_layout_is_fancy(struct ceph_file_layout *l)
1968{
1969 return l->stripe_unit != l->object_size;
1970}
1971
1972static int rbd_img_fill_request_nocopy(struct rbd_img_request *img_req,
1973 struct ceph_file_extent *img_extents,
1974 u32 num_img_extents,
1975 struct rbd_img_fill_ctx *fctx)
Ilya Dryomov5a237812018-02-06 19:26:34 +01001976{
1977 u32 i;
1978 int ret;
1979
1980 img_req->data_type = fctx->pos_type;
1981
1982 /*
1983 * Create object requests and set each object request's starting
1984 * position in the provided bio (list) or bio_vec array.
1985 */
1986 fctx->iter = *fctx->pos;
1987 for (i = 0; i < num_img_extents; i++) {
1988 ret = ceph_file_to_extents(&img_req->rbd_dev->layout,
1989 img_extents[i].fe_off,
1990 img_extents[i].fe_len,
1991 &img_req->object_extents,
1992 alloc_object_extent, img_req,
1993 fctx->set_pos_fn, &fctx->iter);
1994 if (ret)
1995 return ret;
1996 }
1997
1998 return __rbd_img_fill_request(img_req);
1999}
2000
Ilya Dryomovafb97882018-02-06 19:26:35 +01002001/*
2002 * Map a list of image extents to a list of object extents, create the
2003 * corresponding object requests (normally each to a different object,
2004 * but not always) and add them to @img_req. For each object request,
2005 * set up its data descriptor to point to the corresponding chunk(s) of
2006 * @fctx->pos data buffer.
2007 *
2008 * Because ceph_file_to_extents() will merge adjacent object extents
2009 * together, each object request's data descriptor may point to multiple
2010 * different chunks of @fctx->pos data buffer.
2011 *
2012 * @fctx->pos data buffer is assumed to be large enough.
2013 */
2014static int rbd_img_fill_request(struct rbd_img_request *img_req,
2015 struct ceph_file_extent *img_extents,
2016 u32 num_img_extents,
2017 struct rbd_img_fill_ctx *fctx)
2018{
2019 struct rbd_device *rbd_dev = img_req->rbd_dev;
2020 struct rbd_obj_request *obj_req;
2021 u32 i;
2022 int ret;
2023
2024 if (fctx->pos_type == OBJ_REQUEST_NODATA ||
2025 !rbd_layout_is_fancy(&rbd_dev->layout))
2026 return rbd_img_fill_request_nocopy(img_req, img_extents,
2027 num_img_extents, fctx);
2028
2029 img_req->data_type = OBJ_REQUEST_OWN_BVECS;
2030
2031 /*
2032 * Create object requests and determine ->bvec_count for each object
2033 * request. Note that ->bvec_count sum over all object requests may
2034 * be greater than the number of bio_vecs in the provided bio (list)
2035 * or bio_vec array because when mapped, those bio_vecs can straddle
2036 * stripe unit boundaries.
2037 */
2038 fctx->iter = *fctx->pos;
2039 for (i = 0; i < num_img_extents; i++) {
2040 ret = ceph_file_to_extents(&rbd_dev->layout,
2041 img_extents[i].fe_off,
2042 img_extents[i].fe_len,
2043 &img_req->object_extents,
2044 alloc_object_extent, img_req,
2045 fctx->count_fn, &fctx->iter);
2046 if (ret)
2047 return ret;
2048 }
2049
2050 for_each_obj_request(img_req, obj_req) {
2051 obj_req->bvec_pos.bvecs = kmalloc_array(obj_req->bvec_count,
2052 sizeof(*obj_req->bvec_pos.bvecs),
2053 GFP_NOIO);
2054 if (!obj_req->bvec_pos.bvecs)
2055 return -ENOMEM;
Alex Elderb454e362013-04-19 15:34:50 -05002056 }
2057
2058 /*
Ilya Dryomovafb97882018-02-06 19:26:35 +01002059 * Fill in each object request's private bio_vec array, splitting and
2060 * rearranging the provided bio_vecs in stripe unit chunks as needed.
Alex Elderb454e362013-04-19 15:34:50 -05002061 */
Ilya Dryomovafb97882018-02-06 19:26:35 +01002062 fctx->iter = *fctx->pos;
2063 for (i = 0; i < num_img_extents; i++) {
2064 ret = ceph_iterate_extents(&rbd_dev->layout,
2065 img_extents[i].fe_off,
2066 img_extents[i].fe_len,
2067 &img_req->object_extents,
2068 fctx->copy_fn, &fctx->iter);
2069 if (ret)
2070 return ret;
2071 }
Alex Elder3d7efd12013-04-19 15:34:50 -05002072
Ilya Dryomovafb97882018-02-06 19:26:35 +01002073 return __rbd_img_fill_request(img_req);
Alex Elderb454e362013-04-19 15:34:50 -05002074}
2075
Ilya Dryomov5a237812018-02-06 19:26:34 +01002076static int rbd_img_fill_nodata(struct rbd_img_request *img_req,
2077 u64 off, u64 len)
2078{
2079 struct ceph_file_extent ex = { off, len };
2080 union rbd_img_fill_iter dummy;
2081 struct rbd_img_fill_ctx fctx = {
2082 .pos_type = OBJ_REQUEST_NODATA,
2083 .pos = &dummy,
2084 };
2085
2086 return rbd_img_fill_request(img_req, &ex, 1, &fctx);
2087}
2088
2089static void set_bio_pos(struct ceph_object_extent *ex, u32 bytes, void *arg)
2090{
2091 struct rbd_obj_request *obj_req =
2092 container_of(ex, struct rbd_obj_request, ex);
2093 struct ceph_bio_iter *it = arg;
2094
2095 dout("%s objno %llu bytes %u\n", __func__, ex->oe_objno, bytes);
2096 obj_req->bio_pos = *it;
2097 ceph_bio_iter_advance(it, bytes);
2098}
2099
Ilya Dryomovafb97882018-02-06 19:26:35 +01002100static void count_bio_bvecs(struct ceph_object_extent *ex, u32 bytes, void *arg)
2101{
2102 struct rbd_obj_request *obj_req =
2103 container_of(ex, struct rbd_obj_request, ex);
2104 struct ceph_bio_iter *it = arg;
2105
2106 dout("%s objno %llu bytes %u\n", __func__, ex->oe_objno, bytes);
2107 ceph_bio_iter_advance_step(it, bytes, ({
2108 obj_req->bvec_count++;
2109 }));
2110
2111}
2112
2113static void copy_bio_bvecs(struct ceph_object_extent *ex, u32 bytes, void *arg)
2114{
2115 struct rbd_obj_request *obj_req =
2116 container_of(ex, struct rbd_obj_request, ex);
2117 struct ceph_bio_iter *it = arg;
2118
2119 dout("%s objno %llu bytes %u\n", __func__, ex->oe_objno, bytes);
2120 ceph_bio_iter_advance_step(it, bytes, ({
2121 obj_req->bvec_pos.bvecs[obj_req->bvec_idx++] = bv;
2122 obj_req->bvec_pos.iter.bi_size += bv.bv_len;
2123 }));
2124}
2125
Ilya Dryomov5a237812018-02-06 19:26:34 +01002126static int __rbd_img_fill_from_bio(struct rbd_img_request *img_req,
2127 struct ceph_file_extent *img_extents,
2128 u32 num_img_extents,
2129 struct ceph_bio_iter *bio_pos)
2130{
2131 struct rbd_img_fill_ctx fctx = {
2132 .pos_type = OBJ_REQUEST_BIO,
2133 .pos = (union rbd_img_fill_iter *)bio_pos,
2134 .set_pos_fn = set_bio_pos,
Ilya Dryomovafb97882018-02-06 19:26:35 +01002135 .count_fn = count_bio_bvecs,
2136 .copy_fn = copy_bio_bvecs,
Ilya Dryomov5a237812018-02-06 19:26:34 +01002137 };
2138
2139 return rbd_img_fill_request(img_req, img_extents, num_img_extents,
2140 &fctx);
2141}
2142
2143static int rbd_img_fill_from_bio(struct rbd_img_request *img_req,
2144 u64 off, u64 len, struct bio *bio)
2145{
2146 struct ceph_file_extent ex = { off, len };
2147 struct ceph_bio_iter it = { .bio = bio, .iter = bio->bi_iter };
2148
2149 return __rbd_img_fill_from_bio(img_req, &ex, 1, &it);
2150}
2151
2152static void set_bvec_pos(struct ceph_object_extent *ex, u32 bytes, void *arg)
2153{
2154 struct rbd_obj_request *obj_req =
2155 container_of(ex, struct rbd_obj_request, ex);
2156 struct ceph_bvec_iter *it = arg;
2157
2158 obj_req->bvec_pos = *it;
2159 ceph_bvec_iter_shorten(&obj_req->bvec_pos, bytes);
2160 ceph_bvec_iter_advance(it, bytes);
2161}
2162
Ilya Dryomovafb97882018-02-06 19:26:35 +01002163static void count_bvecs(struct ceph_object_extent *ex, u32 bytes, void *arg)
2164{
2165 struct rbd_obj_request *obj_req =
2166 container_of(ex, struct rbd_obj_request, ex);
2167 struct ceph_bvec_iter *it = arg;
2168
2169 ceph_bvec_iter_advance_step(it, bytes, ({
2170 obj_req->bvec_count++;
2171 }));
2172}
2173
2174static void copy_bvecs(struct ceph_object_extent *ex, u32 bytes, void *arg)
2175{
2176 struct rbd_obj_request *obj_req =
2177 container_of(ex, struct rbd_obj_request, ex);
2178 struct ceph_bvec_iter *it = arg;
2179
2180 ceph_bvec_iter_advance_step(it, bytes, ({
2181 obj_req->bvec_pos.bvecs[obj_req->bvec_idx++] = bv;
2182 obj_req->bvec_pos.iter.bi_size += bv.bv_len;
2183 }));
2184}
2185
Ilya Dryomov5a237812018-02-06 19:26:34 +01002186static int __rbd_img_fill_from_bvecs(struct rbd_img_request *img_req,
2187 struct ceph_file_extent *img_extents,
2188 u32 num_img_extents,
2189 struct ceph_bvec_iter *bvec_pos)
2190{
2191 struct rbd_img_fill_ctx fctx = {
2192 .pos_type = OBJ_REQUEST_BVECS,
2193 .pos = (union rbd_img_fill_iter *)bvec_pos,
2194 .set_pos_fn = set_bvec_pos,
Ilya Dryomovafb97882018-02-06 19:26:35 +01002195 .count_fn = count_bvecs,
2196 .copy_fn = copy_bvecs,
Ilya Dryomov5a237812018-02-06 19:26:34 +01002197 };
2198
2199 return rbd_img_fill_request(img_req, img_extents, num_img_extents,
2200 &fctx);
2201}
2202
2203static int rbd_img_fill_from_bvecs(struct rbd_img_request *img_req,
2204 struct ceph_file_extent *img_extents,
2205 u32 num_img_extents,
2206 struct bio_vec *bvecs)
2207{
2208 struct ceph_bvec_iter it = {
2209 .bvecs = bvecs,
2210 .iter = { .bi_size = ceph_file_extents_bytes(img_extents,
2211 num_img_extents) },
2212 };
2213
2214 return __rbd_img_fill_from_bvecs(img_req, img_extents, num_img_extents,
2215 &it);
2216}
2217
Ilya Dryomovefbd1a12018-01-30 17:52:11 +01002218static void rbd_img_request_submit(struct rbd_img_request *img_request)
Alex Elderbf0d5f502012-11-22 00:00:08 -06002219{
Alex Elderbf0d5f502012-11-22 00:00:08 -06002220 struct rbd_obj_request *obj_request;
2221
Alex Elder37206ee2013-02-20 17:32:08 -06002222 dout("%s: img %p\n", __func__, img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002223
Ilya Dryomov663ae2c2016-05-16 13:18:57 +02002224 rbd_img_request_get(img_request);
Ilya Dryomovefbd1a12018-01-30 17:52:11 +01002225 for_each_obj_request(img_request, obj_request)
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002226 rbd_obj_request_submit(obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002227
Ilya Dryomov663ae2c2016-05-16 13:18:57 +02002228 rbd_img_request_put(img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002229}
2230
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002231static int rbd_obj_read_from_parent(struct rbd_obj_request *obj_req)
Alex Elder8b3e1a52013-01-24 16:13:36 -06002232{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002233 struct rbd_img_request *img_req = obj_req->img_request;
2234 struct rbd_img_request *child_img_req;
2235 int ret;
Alex Elder8b3e1a52013-01-24 16:13:36 -06002236
Ilya Dryomove93aca02018-02-06 19:26:35 +01002237 child_img_req = rbd_img_request_create(img_req->rbd_dev->parent,
2238 OBJ_OP_READ, NULL);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002239 if (!child_img_req)
2240 return -ENOMEM;
Alex Elder8b3e1a52013-01-24 16:13:36 -06002241
Ilya Dryomove93aca02018-02-06 19:26:35 +01002242 __set_bit(IMG_REQ_CHILD, &child_img_req->flags);
2243 child_img_req->obj_request = obj_req;
Alex Elder02c74fb2013-05-06 17:40:33 -05002244
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002245 if (!rbd_img_is_write(img_req)) {
Ilya Dryomovecc633c2018-02-01 11:50:47 +01002246 switch (img_req->data_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002247 case OBJ_REQUEST_BIO:
Ilya Dryomov5a237812018-02-06 19:26:34 +01002248 ret = __rbd_img_fill_from_bio(child_img_req,
2249 obj_req->img_extents,
2250 obj_req->num_img_extents,
2251 &obj_req->bio_pos);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002252 break;
2253 case OBJ_REQUEST_BVECS:
Ilya Dryomovafb97882018-02-06 19:26:35 +01002254 case OBJ_REQUEST_OWN_BVECS:
Ilya Dryomov5a237812018-02-06 19:26:34 +01002255 ret = __rbd_img_fill_from_bvecs(child_img_req,
2256 obj_req->img_extents,
2257 obj_req->num_img_extents,
2258 &obj_req->bvec_pos);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002259 break;
2260 default:
2261 rbd_assert(0);
2262 }
2263 } else {
Ilya Dryomov5a237812018-02-06 19:26:34 +01002264 ret = rbd_img_fill_from_bvecs(child_img_req,
2265 obj_req->img_extents,
2266 obj_req->num_img_extents,
2267 obj_req->copyup_bvecs);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002268 }
2269 if (ret) {
2270 rbd_img_request_put(child_img_req);
2271 return ret;
2272 }
2273
2274 rbd_img_request_submit(child_img_req);
2275 return 0;
2276}
2277
2278static bool rbd_obj_handle_read(struct rbd_obj_request *obj_req)
2279{
2280 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
2281 int ret;
2282
2283 if (obj_req->result == -ENOENT &&
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002284 rbd_dev->parent_overlap && !obj_req->tried_parent) {
2285 /* reverse map this object extent onto the parent */
2286 ret = rbd_obj_calc_img_extents(obj_req, false);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002287 if (ret) {
2288 obj_req->result = ret;
2289 return true;
2290 }
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002291
2292 if (obj_req->num_img_extents) {
2293 obj_req->tried_parent = true;
2294 ret = rbd_obj_read_from_parent(obj_req);
2295 if (ret) {
2296 obj_req->result = ret;
2297 return true;
2298 }
2299 return false;
2300 }
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002301 }
Alex Elder02c74fb2013-05-06 17:40:33 -05002302
2303 /*
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002304 * -ENOENT means a hole in the image -- zero-fill the entire
2305 * length of the request. A short read also implies zero-fill
2306 * to the end of the request. In both cases we update xferred
2307 * count to indicate the whole request was satisfied.
Alex Elder02c74fb2013-05-06 17:40:33 -05002308 */
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002309 if (obj_req->result == -ENOENT ||
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002310 (!obj_req->result && obj_req->xferred < obj_req->ex.oe_len)) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002311 rbd_assert(!obj_req->xferred || !obj_req->result);
2312 rbd_obj_zero_range(obj_req, obj_req->xferred,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002313 obj_req->ex.oe_len - obj_req->xferred);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002314 obj_req->result = 0;
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002315 obj_req->xferred = obj_req->ex.oe_len;
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002316 }
2317
2318 return true;
2319}
2320
2321/*
2322 * copyup_bvecs pages are never highmem pages
2323 */
2324static bool is_zero_bvecs(struct bio_vec *bvecs, u32 bytes)
2325{
2326 struct ceph_bvec_iter it = {
2327 .bvecs = bvecs,
2328 .iter = { .bi_size = bytes },
2329 };
2330
2331 ceph_bvec_iter_advance_step(&it, bytes, ({
2332 if (memchr_inv(page_address(bv.bv_page) + bv.bv_offset, 0,
2333 bv.bv_len))
2334 return false;
2335 }));
2336 return true;
2337}
2338
2339static int rbd_obj_issue_copyup(struct rbd_obj_request *obj_req, u32 bytes)
2340{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002341 unsigned int num_osd_ops = obj_req->osd_req->r_num_ops;
Chengguang Xufe943d52018-04-12 12:04:55 +08002342 int ret;
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002343
2344 dout("%s obj_req %p bytes %u\n", __func__, obj_req, bytes);
2345 rbd_assert(obj_req->osd_req->r_ops[0].op == CEPH_OSD_OP_STAT);
2346 rbd_osd_req_destroy(obj_req->osd_req);
2347
2348 /*
2349 * Create a copyup request with the same number of OSD ops as
2350 * the original request. The original request was stat + op(s),
2351 * the new copyup request will be copyup + the same op(s).
2352 */
Ilya Dryomova162b302018-01-30 17:52:10 +01002353 obj_req->osd_req = rbd_osd_req_create(obj_req, num_osd_ops);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002354 if (!obj_req->osd_req)
2355 return -ENOMEM;
2356
Chengguang Xufe943d52018-04-12 12:04:55 +08002357 ret = osd_req_op_cls_init(obj_req->osd_req, 0, CEPH_OSD_OP_CALL, "rbd",
2358 "copyup");
2359 if (ret)
2360 return ret;
2361
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002362 /*
2363 * Only send non-zero copyup data to save some I/O and network
2364 * bandwidth -- zero copyup data is equivalent to the object not
2365 * existing.
2366 */
2367 if (is_zero_bvecs(obj_req->copyup_bvecs, bytes)) {
2368 dout("%s obj_req %p detected zeroes\n", __func__, obj_req);
2369 bytes = 0;
2370 }
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002371 osd_req_op_cls_request_data_bvecs(obj_req->osd_req, 0,
Ilya Dryomov0010f702018-05-04 16:57:30 +02002372 obj_req->copyup_bvecs,
2373 obj_req->copyup_bvec_count,
2374 bytes);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002375
Ilya Dryomov9bb02482018-01-30 17:52:10 +01002376 switch (obj_req->img_request->op_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002377 case OBJ_OP_WRITE:
2378 __rbd_obj_setup_write(obj_req, 1);
2379 break;
2380 case OBJ_OP_DISCARD:
2381 rbd_assert(!rbd_obj_is_entire(obj_req));
2382 __rbd_obj_setup_discard(obj_req, 1);
2383 break;
2384 default:
2385 rbd_assert(0);
2386 }
2387
2388 rbd_obj_request_submit(obj_req);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002389 return 0;
2390}
2391
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01002392static int setup_copyup_bvecs(struct rbd_obj_request *obj_req, u64 obj_overlap)
2393{
2394 u32 i;
2395
2396 rbd_assert(!obj_req->copyup_bvecs);
2397 obj_req->copyup_bvec_count = calc_pages_for(0, obj_overlap);
2398 obj_req->copyup_bvecs = kcalloc(obj_req->copyup_bvec_count,
2399 sizeof(*obj_req->copyup_bvecs),
2400 GFP_NOIO);
2401 if (!obj_req->copyup_bvecs)
2402 return -ENOMEM;
2403
2404 for (i = 0; i < obj_req->copyup_bvec_count; i++) {
2405 unsigned int len = min(obj_overlap, (u64)PAGE_SIZE);
2406
2407 obj_req->copyup_bvecs[i].bv_page = alloc_page(GFP_NOIO);
2408 if (!obj_req->copyup_bvecs[i].bv_page)
2409 return -ENOMEM;
2410
2411 obj_req->copyup_bvecs[i].bv_offset = 0;
2412 obj_req->copyup_bvecs[i].bv_len = len;
2413 obj_overlap -= len;
2414 }
2415
2416 rbd_assert(!obj_overlap);
2417 return 0;
2418}
2419
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002420static int rbd_obj_handle_write_guard(struct rbd_obj_request *obj_req)
2421{
2422 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002423 int ret;
2424
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002425 rbd_assert(obj_req->num_img_extents);
2426 prune_extents(obj_req->img_extents, &obj_req->num_img_extents,
2427 rbd_dev->parent_overlap);
2428 if (!obj_req->num_img_extents) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002429 /*
2430 * The overlap has become 0 (most likely because the
2431 * image has been flattened). Use rbd_obj_issue_copyup()
2432 * to re-submit the original write request -- the copyup
2433 * operation itself will be a no-op, since someone must
2434 * have populated the child object while we weren't
2435 * looking. Move to WRITE_FLAT state as we'll be done
2436 * with the operation once the null copyup completes.
2437 */
2438 obj_req->write_state = RBD_OBJ_WRITE_FLAT;
2439 return rbd_obj_issue_copyup(obj_req, 0);
2440 }
2441
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002442 ret = setup_copyup_bvecs(obj_req, rbd_obj_img_extents_bytes(obj_req));
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002443 if (ret)
2444 return ret;
2445
2446 obj_req->write_state = RBD_OBJ_WRITE_COPYUP;
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002447 return rbd_obj_read_from_parent(obj_req);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002448}
2449
2450static bool rbd_obj_handle_write(struct rbd_obj_request *obj_req)
2451{
2452 int ret;
2453
2454again:
2455 switch (obj_req->write_state) {
2456 case RBD_OBJ_WRITE_GUARD:
2457 rbd_assert(!obj_req->xferred);
2458 if (obj_req->result == -ENOENT) {
2459 /*
2460 * The target object doesn't exist. Read the data for
2461 * the entire target object up to the overlap point (if
2462 * any) from the parent, so we can use it for a copyup.
2463 */
2464 ret = rbd_obj_handle_write_guard(obj_req);
2465 if (ret) {
2466 obj_req->result = ret;
2467 return true;
2468 }
2469 return false;
2470 }
2471 /* fall through */
2472 case RBD_OBJ_WRITE_FLAT:
2473 if (!obj_req->result)
2474 /*
2475 * There is no such thing as a successful short
2476 * write -- indicate the whole request was satisfied.
2477 */
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002478 obj_req->xferred = obj_req->ex.oe_len;
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002479 return true;
2480 case RBD_OBJ_WRITE_COPYUP:
2481 obj_req->write_state = RBD_OBJ_WRITE_GUARD;
2482 if (obj_req->result)
2483 goto again;
2484
2485 rbd_assert(obj_req->xferred);
2486 ret = rbd_obj_issue_copyup(obj_req, obj_req->xferred);
2487 if (ret) {
2488 obj_req->result = ret;
2489 return true;
2490 }
2491 return false;
2492 default:
Arnd Bergmannc6244b32018-04-04 14:53:39 +02002493 BUG();
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002494 }
2495}
2496
2497/*
2498 * Returns true if @obj_req is completed, or false otherwise.
2499 */
2500static bool __rbd_obj_handle_request(struct rbd_obj_request *obj_req)
2501{
Ilya Dryomov9bb02482018-01-30 17:52:10 +01002502 switch (obj_req->img_request->op_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002503 case OBJ_OP_READ:
2504 return rbd_obj_handle_read(obj_req);
2505 case OBJ_OP_WRITE:
2506 return rbd_obj_handle_write(obj_req);
2507 case OBJ_OP_DISCARD:
2508 if (rbd_obj_handle_write(obj_req)) {
2509 /*
2510 * Hide -ENOENT from delete/truncate/zero -- discarding
2511 * a non-existent object is not a problem.
2512 */
2513 if (obj_req->result == -ENOENT) {
2514 obj_req->result = 0;
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002515 obj_req->xferred = obj_req->ex.oe_len;
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002516 }
2517 return true;
2518 }
2519 return false;
2520 default:
Arnd Bergmannc6244b32018-04-04 14:53:39 +02002521 BUG();
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002522 }
2523}
2524
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002525static void rbd_obj_end_request(struct rbd_obj_request *obj_req)
2526{
2527 struct rbd_img_request *img_req = obj_req->img_request;
2528
2529 rbd_assert((!obj_req->result &&
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002530 obj_req->xferred == obj_req->ex.oe_len) ||
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002531 (obj_req->result < 0 && !obj_req->xferred));
2532 if (!obj_req->result) {
2533 img_req->xferred += obj_req->xferred;
Ilya Dryomov980917f2016-09-12 18:59:42 +02002534 return;
Alex Elder02c74fb2013-05-06 17:40:33 -05002535 }
2536
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002537 rbd_warn(img_req->rbd_dev,
2538 "%s at objno %llu %llu~%llu result %d xferred %llu",
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002539 obj_op_name(img_req->op_type), obj_req->ex.oe_objno,
2540 obj_req->ex.oe_off, obj_req->ex.oe_len, obj_req->result,
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002541 obj_req->xferred);
2542 if (!img_req->result) {
2543 img_req->result = obj_req->result;
2544 img_req->xferred = 0;
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05002545 }
Alex Elder8b3e1a52013-01-24 16:13:36 -06002546}
2547
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002548static void rbd_img_end_child_request(struct rbd_img_request *img_req)
Alex Elder8b3e1a52013-01-24 16:13:36 -06002549{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002550 struct rbd_obj_request *obj_req = img_req->obj_request;
Alex Elder8b3e1a52013-01-24 16:13:36 -06002551
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002552 rbd_assert(test_bit(IMG_REQ_CHILD, &img_req->flags));
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002553 rbd_assert((!img_req->result &&
2554 img_req->xferred == rbd_obj_img_extents_bytes(obj_req)) ||
2555 (img_req->result < 0 && !img_req->xferred));
Alex Elder8b3e1a52013-01-24 16:13:36 -06002556
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002557 obj_req->result = img_req->result;
2558 obj_req->xferred = img_req->xferred;
2559 rbd_img_request_put(img_req);
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002560}
Alex Elder8b3e1a52013-01-24 16:13:36 -06002561
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002562static void rbd_img_end_request(struct rbd_img_request *img_req)
2563{
2564 rbd_assert(!test_bit(IMG_REQ_CHILD, &img_req->flags));
2565 rbd_assert((!img_req->result &&
2566 img_req->xferred == blk_rq_bytes(img_req->rq)) ||
2567 (img_req->result < 0 && !img_req->xferred));
Alex Elder8b3e1a52013-01-24 16:13:36 -06002568
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002569 blk_mq_end_request(img_req->rq,
2570 errno_to_blk_status(img_req->result));
2571 rbd_img_request_put(img_req);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002572}
Alex Elder8b3e1a52013-01-24 16:13:36 -06002573
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002574static void rbd_obj_handle_request(struct rbd_obj_request *obj_req)
2575{
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002576 struct rbd_img_request *img_req;
2577
2578again:
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002579 if (!__rbd_obj_handle_request(obj_req))
2580 return;
2581
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002582 img_req = obj_req->img_request;
2583 spin_lock(&img_req->completion_lock);
2584 rbd_obj_end_request(obj_req);
2585 rbd_assert(img_req->pending_count);
2586 if (--img_req->pending_count) {
2587 spin_unlock(&img_req->completion_lock);
2588 return;
2589 }
2590
2591 spin_unlock(&img_req->completion_lock);
2592 if (test_bit(IMG_REQ_CHILD, &img_req->flags)) {
2593 obj_req = img_req->obj_request;
2594 rbd_img_end_child_request(img_req);
2595 goto again;
2596 }
2597 rbd_img_end_request(img_req);
Alex Elder8b3e1a52013-01-24 16:13:36 -06002598}
2599
Ilya Dryomoved95b212016-08-12 16:40:02 +02002600static const struct rbd_client_id rbd_empty_cid;
2601
2602static bool rbd_cid_equal(const struct rbd_client_id *lhs,
2603 const struct rbd_client_id *rhs)
2604{
2605 return lhs->gid == rhs->gid && lhs->handle == rhs->handle;
2606}
2607
2608static struct rbd_client_id rbd_get_cid(struct rbd_device *rbd_dev)
2609{
2610 struct rbd_client_id cid;
2611
2612 mutex_lock(&rbd_dev->watch_mutex);
2613 cid.gid = ceph_client_gid(rbd_dev->rbd_client->client);
2614 cid.handle = rbd_dev->watch_cookie;
2615 mutex_unlock(&rbd_dev->watch_mutex);
2616 return cid;
2617}
2618
2619/*
2620 * lock_rwsem must be held for write
2621 */
2622static void rbd_set_owner_cid(struct rbd_device *rbd_dev,
2623 const struct rbd_client_id *cid)
2624{
2625 dout("%s rbd_dev %p %llu-%llu -> %llu-%llu\n", __func__, rbd_dev,
2626 rbd_dev->owner_cid.gid, rbd_dev->owner_cid.handle,
2627 cid->gid, cid->handle);
2628 rbd_dev->owner_cid = *cid; /* struct */
2629}
2630
2631static void format_lock_cookie(struct rbd_device *rbd_dev, char *buf)
2632{
2633 mutex_lock(&rbd_dev->watch_mutex);
2634 sprintf(buf, "%s %llu", RBD_LOCK_COOKIE_PREFIX, rbd_dev->watch_cookie);
2635 mutex_unlock(&rbd_dev->watch_mutex);
2636}
2637
Florian Margaineedd8ca82017-12-13 16:43:59 +01002638static void __rbd_lock(struct rbd_device *rbd_dev, const char *cookie)
2639{
2640 struct rbd_client_id cid = rbd_get_cid(rbd_dev);
2641
2642 strcpy(rbd_dev->lock_cookie, cookie);
2643 rbd_set_owner_cid(rbd_dev, &cid);
2644 queue_work(rbd_dev->task_wq, &rbd_dev->acquired_lock_work);
2645}
2646
Ilya Dryomoved95b212016-08-12 16:40:02 +02002647/*
2648 * lock_rwsem must be held for write
2649 */
2650static int rbd_lock(struct rbd_device *rbd_dev)
2651{
2652 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
Ilya Dryomoved95b212016-08-12 16:40:02 +02002653 char cookie[32];
2654 int ret;
2655
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02002656 WARN_ON(__rbd_is_lock_owner(rbd_dev) ||
2657 rbd_dev->lock_cookie[0] != '\0');
Ilya Dryomoved95b212016-08-12 16:40:02 +02002658
2659 format_lock_cookie(rbd_dev, cookie);
2660 ret = ceph_cls_lock(osdc, &rbd_dev->header_oid, &rbd_dev->header_oloc,
2661 RBD_LOCK_NAME, CEPH_CLS_LOCK_EXCLUSIVE, cookie,
2662 RBD_LOCK_TAG, "", 0);
2663 if (ret)
2664 return ret;
2665
2666 rbd_dev->lock_state = RBD_LOCK_STATE_LOCKED;
Florian Margaineedd8ca82017-12-13 16:43:59 +01002667 __rbd_lock(rbd_dev, cookie);
Ilya Dryomoved95b212016-08-12 16:40:02 +02002668 return 0;
2669}
2670
2671/*
2672 * lock_rwsem must be held for write
2673 */
Ilya Dryomovbbead742017-04-13 12:17:38 +02002674static void rbd_unlock(struct rbd_device *rbd_dev)
Ilya Dryomoved95b212016-08-12 16:40:02 +02002675{
2676 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
Ilya Dryomoved95b212016-08-12 16:40:02 +02002677 int ret;
2678
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02002679 WARN_ON(!__rbd_is_lock_owner(rbd_dev) ||
2680 rbd_dev->lock_cookie[0] == '\0');
Ilya Dryomoved95b212016-08-12 16:40:02 +02002681
Ilya Dryomoved95b212016-08-12 16:40:02 +02002682 ret = ceph_cls_unlock(osdc, &rbd_dev->header_oid, &rbd_dev->header_oloc,
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02002683 RBD_LOCK_NAME, rbd_dev->lock_cookie);
Ilya Dryomovbbead742017-04-13 12:17:38 +02002684 if (ret && ret != -ENOENT)
2685 rbd_warn(rbd_dev, "failed to unlock: %d", ret);
Ilya Dryomoved95b212016-08-12 16:40:02 +02002686
Ilya Dryomovbbead742017-04-13 12:17:38 +02002687 /* treat errors as the image is unlocked */
2688 rbd_dev->lock_state = RBD_LOCK_STATE_UNLOCKED;
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02002689 rbd_dev->lock_cookie[0] = '\0';
Ilya Dryomoved95b212016-08-12 16:40:02 +02002690 rbd_set_owner_cid(rbd_dev, &rbd_empty_cid);
2691 queue_work(rbd_dev->task_wq, &rbd_dev->released_lock_work);
Ilya Dryomoved95b212016-08-12 16:40:02 +02002692}
2693
2694static int __rbd_notify_op_lock(struct rbd_device *rbd_dev,
2695 enum rbd_notify_op notify_op,
2696 struct page ***preply_pages,
2697 size_t *preply_len)
2698{
2699 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
2700 struct rbd_client_id cid = rbd_get_cid(rbd_dev);
Kyle Spiers08a79102018-03-17 09:44:01 -07002701 char buf[4 + 8 + 8 + CEPH_ENCODING_START_BLK_LEN];
2702 int buf_size = sizeof(buf);
Ilya Dryomoved95b212016-08-12 16:40:02 +02002703 void *p = buf;
2704
2705 dout("%s rbd_dev %p notify_op %d\n", __func__, rbd_dev, notify_op);
2706
2707 /* encode *LockPayload NotifyMessage (op + ClientId) */
2708 ceph_start_encoding(&p, 2, 1, buf_size - CEPH_ENCODING_START_BLK_LEN);
2709 ceph_encode_32(&p, notify_op);
2710 ceph_encode_64(&p, cid.gid);
2711 ceph_encode_64(&p, cid.handle);
2712
2713 return ceph_osdc_notify(osdc, &rbd_dev->header_oid,
2714 &rbd_dev->header_oloc, buf, buf_size,
2715 RBD_NOTIFY_TIMEOUT, preply_pages, preply_len);
2716}
2717
2718static void rbd_notify_op_lock(struct rbd_device *rbd_dev,
2719 enum rbd_notify_op notify_op)
2720{
2721 struct page **reply_pages;
2722 size_t reply_len;
2723
2724 __rbd_notify_op_lock(rbd_dev, notify_op, &reply_pages, &reply_len);
2725 ceph_release_page_vector(reply_pages, calc_pages_for(0, reply_len));
2726}
2727
2728static void rbd_notify_acquired_lock(struct work_struct *work)
2729{
2730 struct rbd_device *rbd_dev = container_of(work, struct rbd_device,
2731 acquired_lock_work);
2732
2733 rbd_notify_op_lock(rbd_dev, RBD_NOTIFY_OP_ACQUIRED_LOCK);
2734}
2735
2736static void rbd_notify_released_lock(struct work_struct *work)
2737{
2738 struct rbd_device *rbd_dev = container_of(work, struct rbd_device,
2739 released_lock_work);
2740
2741 rbd_notify_op_lock(rbd_dev, RBD_NOTIFY_OP_RELEASED_LOCK);
2742}
2743
2744static int rbd_request_lock(struct rbd_device *rbd_dev)
2745{
2746 struct page **reply_pages;
2747 size_t reply_len;
2748 bool lock_owner_responded = false;
2749 int ret;
2750
2751 dout("%s rbd_dev %p\n", __func__, rbd_dev);
2752
2753 ret = __rbd_notify_op_lock(rbd_dev, RBD_NOTIFY_OP_REQUEST_LOCK,
2754 &reply_pages, &reply_len);
2755 if (ret && ret != -ETIMEDOUT) {
2756 rbd_warn(rbd_dev, "failed to request lock: %d", ret);
2757 goto out;
2758 }
2759
2760 if (reply_len > 0 && reply_len <= PAGE_SIZE) {
2761 void *p = page_address(reply_pages[0]);
2762 void *const end = p + reply_len;
2763 u32 n;
2764
2765 ceph_decode_32_safe(&p, end, n, e_inval); /* num_acks */
2766 while (n--) {
2767 u8 struct_v;
2768 u32 len;
2769
2770 ceph_decode_need(&p, end, 8 + 8, e_inval);
2771 p += 8 + 8; /* skip gid and cookie */
2772
2773 ceph_decode_32_safe(&p, end, len, e_inval);
2774 if (!len)
2775 continue;
2776
2777 if (lock_owner_responded) {
2778 rbd_warn(rbd_dev,
2779 "duplicate lock owners detected");
2780 ret = -EIO;
2781 goto out;
2782 }
2783
2784 lock_owner_responded = true;
2785 ret = ceph_start_decoding(&p, end, 1, "ResponseMessage",
2786 &struct_v, &len);
2787 if (ret) {
2788 rbd_warn(rbd_dev,
2789 "failed to decode ResponseMessage: %d",
2790 ret);
2791 goto e_inval;
2792 }
2793
2794 ret = ceph_decode_32(&p);
2795 }
2796 }
2797
2798 if (!lock_owner_responded) {
2799 rbd_warn(rbd_dev, "no lock owners detected");
2800 ret = -ETIMEDOUT;
2801 }
2802
2803out:
2804 ceph_release_page_vector(reply_pages, calc_pages_for(0, reply_len));
2805 return ret;
2806
2807e_inval:
2808 ret = -EINVAL;
2809 goto out;
2810}
2811
2812static void wake_requests(struct rbd_device *rbd_dev, bool wake_all)
2813{
2814 dout("%s rbd_dev %p wake_all %d\n", __func__, rbd_dev, wake_all);
2815
2816 cancel_delayed_work(&rbd_dev->lock_dwork);
2817 if (wake_all)
2818 wake_up_all(&rbd_dev->lock_waitq);
2819 else
2820 wake_up(&rbd_dev->lock_waitq);
2821}
2822
2823static int get_lock_owner_info(struct rbd_device *rbd_dev,
2824 struct ceph_locker **lockers, u32 *num_lockers)
2825{
2826 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
2827 u8 lock_type;
2828 char *lock_tag;
2829 int ret;
2830
2831 dout("%s rbd_dev %p\n", __func__, rbd_dev);
2832
2833 ret = ceph_cls_lock_info(osdc, &rbd_dev->header_oid,
2834 &rbd_dev->header_oloc, RBD_LOCK_NAME,
2835 &lock_type, &lock_tag, lockers, num_lockers);
2836 if (ret)
2837 return ret;
2838
2839 if (*num_lockers == 0) {
2840 dout("%s rbd_dev %p no lockers detected\n", __func__, rbd_dev);
2841 goto out;
2842 }
2843
2844 if (strcmp(lock_tag, RBD_LOCK_TAG)) {
2845 rbd_warn(rbd_dev, "locked by external mechanism, tag %s",
2846 lock_tag);
2847 ret = -EBUSY;
2848 goto out;
2849 }
2850
2851 if (lock_type == CEPH_CLS_LOCK_SHARED) {
2852 rbd_warn(rbd_dev, "shared lock type detected");
2853 ret = -EBUSY;
2854 goto out;
2855 }
2856
2857 if (strncmp((*lockers)[0].id.cookie, RBD_LOCK_COOKIE_PREFIX,
2858 strlen(RBD_LOCK_COOKIE_PREFIX))) {
2859 rbd_warn(rbd_dev, "locked by external mechanism, cookie %s",
2860 (*lockers)[0].id.cookie);
2861 ret = -EBUSY;
2862 goto out;
2863 }
2864
2865out:
2866 kfree(lock_tag);
2867 return ret;
2868}
2869
2870static int find_watcher(struct rbd_device *rbd_dev,
2871 const struct ceph_locker *locker)
2872{
2873 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
2874 struct ceph_watch_item *watchers;
2875 u32 num_watchers;
2876 u64 cookie;
2877 int i;
2878 int ret;
2879
2880 ret = ceph_osdc_list_watchers(osdc, &rbd_dev->header_oid,
2881 &rbd_dev->header_oloc, &watchers,
2882 &num_watchers);
2883 if (ret)
2884 return ret;
2885
2886 sscanf(locker->id.cookie, RBD_LOCK_COOKIE_PREFIX " %llu", &cookie);
2887 for (i = 0; i < num_watchers; i++) {
2888 if (!memcmp(&watchers[i].addr, &locker->info.addr,
2889 sizeof(locker->info.addr)) &&
2890 watchers[i].cookie == cookie) {
2891 struct rbd_client_id cid = {
2892 .gid = le64_to_cpu(watchers[i].name.num),
2893 .handle = cookie,
2894 };
2895
2896 dout("%s rbd_dev %p found cid %llu-%llu\n", __func__,
2897 rbd_dev, cid.gid, cid.handle);
2898 rbd_set_owner_cid(rbd_dev, &cid);
2899 ret = 1;
2900 goto out;
2901 }
2902 }
2903
2904 dout("%s rbd_dev %p no watchers\n", __func__, rbd_dev);
2905 ret = 0;
2906out:
2907 kfree(watchers);
2908 return ret;
2909}
2910
2911/*
2912 * lock_rwsem must be held for write
2913 */
2914static int rbd_try_lock(struct rbd_device *rbd_dev)
2915{
2916 struct ceph_client *client = rbd_dev->rbd_client->client;
2917 struct ceph_locker *lockers;
2918 u32 num_lockers;
2919 int ret;
2920
2921 for (;;) {
2922 ret = rbd_lock(rbd_dev);
2923 if (ret != -EBUSY)
2924 return ret;
2925
2926 /* determine if the current lock holder is still alive */
2927 ret = get_lock_owner_info(rbd_dev, &lockers, &num_lockers);
2928 if (ret)
2929 return ret;
2930
2931 if (num_lockers == 0)
2932 goto again;
2933
2934 ret = find_watcher(rbd_dev, lockers);
2935 if (ret) {
2936 if (ret > 0)
2937 ret = 0; /* have to request lock */
2938 goto out;
2939 }
2940
2941 rbd_warn(rbd_dev, "%s%llu seems dead, breaking lock",
2942 ENTITY_NAME(lockers[0].id.name));
2943
2944 ret = ceph_monc_blacklist_add(&client->monc,
2945 &lockers[0].info.addr);
2946 if (ret) {
2947 rbd_warn(rbd_dev, "blacklist of %s%llu failed: %d",
2948 ENTITY_NAME(lockers[0].id.name), ret);
2949 goto out;
2950 }
2951
2952 ret = ceph_cls_break_lock(&client->osdc, &rbd_dev->header_oid,
2953 &rbd_dev->header_oloc, RBD_LOCK_NAME,
2954 lockers[0].id.cookie,
2955 &lockers[0].id.name);
2956 if (ret && ret != -ENOENT)
2957 goto out;
2958
2959again:
2960 ceph_free_lockers(lockers, num_lockers);
2961 }
2962
2963out:
2964 ceph_free_lockers(lockers, num_lockers);
2965 return ret;
2966}
2967
2968/*
2969 * ret is set only if lock_state is RBD_LOCK_STATE_UNLOCKED
2970 */
2971static enum rbd_lock_state rbd_try_acquire_lock(struct rbd_device *rbd_dev,
2972 int *pret)
2973{
2974 enum rbd_lock_state lock_state;
2975
2976 down_read(&rbd_dev->lock_rwsem);
2977 dout("%s rbd_dev %p read lock_state %d\n", __func__, rbd_dev,
2978 rbd_dev->lock_state);
2979 if (__rbd_is_lock_owner(rbd_dev)) {
2980 lock_state = rbd_dev->lock_state;
2981 up_read(&rbd_dev->lock_rwsem);
2982 return lock_state;
2983 }
2984
2985 up_read(&rbd_dev->lock_rwsem);
2986 down_write(&rbd_dev->lock_rwsem);
2987 dout("%s rbd_dev %p write lock_state %d\n", __func__, rbd_dev,
2988 rbd_dev->lock_state);
2989 if (!__rbd_is_lock_owner(rbd_dev)) {
2990 *pret = rbd_try_lock(rbd_dev);
2991 if (*pret)
2992 rbd_warn(rbd_dev, "failed to acquire lock: %d", *pret);
2993 }
2994
2995 lock_state = rbd_dev->lock_state;
2996 up_write(&rbd_dev->lock_rwsem);
2997 return lock_state;
2998}
2999
3000static void rbd_acquire_lock(struct work_struct *work)
3001{
3002 struct rbd_device *rbd_dev = container_of(to_delayed_work(work),
3003 struct rbd_device, lock_dwork);
3004 enum rbd_lock_state lock_state;
Kefeng Wang37f13252017-07-13 15:46:35 +08003005 int ret = 0;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003006
3007 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3008again:
3009 lock_state = rbd_try_acquire_lock(rbd_dev, &ret);
3010 if (lock_state != RBD_LOCK_STATE_UNLOCKED || ret == -EBLACKLISTED) {
3011 if (lock_state == RBD_LOCK_STATE_LOCKED)
3012 wake_requests(rbd_dev, true);
3013 dout("%s rbd_dev %p lock_state %d ret %d - done\n", __func__,
3014 rbd_dev, lock_state, ret);
3015 return;
3016 }
3017
3018 ret = rbd_request_lock(rbd_dev);
3019 if (ret == -ETIMEDOUT) {
3020 goto again; /* treat this as a dead client */
Ilya Dryomove010dd02017-04-13 12:17:39 +02003021 } else if (ret == -EROFS) {
3022 rbd_warn(rbd_dev, "peer will not release lock");
3023 /*
3024 * If this is rbd_add_acquire_lock(), we want to fail
3025 * immediately -- reuse BLACKLISTED flag. Otherwise we
3026 * want to block.
3027 */
3028 if (!(rbd_dev->disk->flags & GENHD_FL_UP)) {
3029 set_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags);
3030 /* wake "rbd map --exclusive" process */
3031 wake_requests(rbd_dev, false);
3032 }
Ilya Dryomoved95b212016-08-12 16:40:02 +02003033 } else if (ret < 0) {
3034 rbd_warn(rbd_dev, "error requesting lock: %d", ret);
3035 mod_delayed_work(rbd_dev->task_wq, &rbd_dev->lock_dwork,
3036 RBD_RETRY_DELAY);
3037 } else {
3038 /*
3039 * lock owner acked, but resend if we don't see them
3040 * release the lock
3041 */
3042 dout("%s rbd_dev %p requeueing lock_dwork\n", __func__,
3043 rbd_dev);
3044 mod_delayed_work(rbd_dev->task_wq, &rbd_dev->lock_dwork,
3045 msecs_to_jiffies(2 * RBD_NOTIFY_TIMEOUT * MSEC_PER_SEC));
3046 }
3047}
3048
3049/*
3050 * lock_rwsem must be held for write
3051 */
3052static bool rbd_release_lock(struct rbd_device *rbd_dev)
3053{
3054 dout("%s rbd_dev %p read lock_state %d\n", __func__, rbd_dev,
3055 rbd_dev->lock_state);
3056 if (rbd_dev->lock_state != RBD_LOCK_STATE_LOCKED)
3057 return false;
3058
3059 rbd_dev->lock_state = RBD_LOCK_STATE_RELEASING;
3060 downgrade_write(&rbd_dev->lock_rwsem);
3061 /*
3062 * Ensure that all in-flight IO is flushed.
3063 *
3064 * FIXME: ceph_osdc_sync() flushes the entire OSD client, which
3065 * may be shared with other devices.
3066 */
3067 ceph_osdc_sync(&rbd_dev->rbd_client->client->osdc);
3068 up_read(&rbd_dev->lock_rwsem);
3069
3070 down_write(&rbd_dev->lock_rwsem);
3071 dout("%s rbd_dev %p write lock_state %d\n", __func__, rbd_dev,
3072 rbd_dev->lock_state);
3073 if (rbd_dev->lock_state != RBD_LOCK_STATE_RELEASING)
3074 return false;
3075
Ilya Dryomovbbead742017-04-13 12:17:38 +02003076 rbd_unlock(rbd_dev);
3077 /*
3078 * Give others a chance to grab the lock - we would re-acquire
3079 * almost immediately if we got new IO during ceph_osdc_sync()
3080 * otherwise. We need to ack our own notifications, so this
3081 * lock_dwork will be requeued from rbd_wait_state_locked()
3082 * after wake_requests() in rbd_handle_released_lock().
3083 */
3084 cancel_delayed_work(&rbd_dev->lock_dwork);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003085 return true;
3086}
3087
3088static void rbd_release_lock_work(struct work_struct *work)
3089{
3090 struct rbd_device *rbd_dev = container_of(work, struct rbd_device,
3091 unlock_work);
3092
3093 down_write(&rbd_dev->lock_rwsem);
3094 rbd_release_lock(rbd_dev);
3095 up_write(&rbd_dev->lock_rwsem);
3096}
3097
3098static void rbd_handle_acquired_lock(struct rbd_device *rbd_dev, u8 struct_v,
3099 void **p)
3100{
3101 struct rbd_client_id cid = { 0 };
3102
3103 if (struct_v >= 2) {
3104 cid.gid = ceph_decode_64(p);
3105 cid.handle = ceph_decode_64(p);
3106 }
3107
3108 dout("%s rbd_dev %p cid %llu-%llu\n", __func__, rbd_dev, cid.gid,
3109 cid.handle);
3110 if (!rbd_cid_equal(&cid, &rbd_empty_cid)) {
3111 down_write(&rbd_dev->lock_rwsem);
3112 if (rbd_cid_equal(&cid, &rbd_dev->owner_cid)) {
3113 /*
3114 * we already know that the remote client is
3115 * the owner
3116 */
3117 up_write(&rbd_dev->lock_rwsem);
3118 return;
3119 }
3120
3121 rbd_set_owner_cid(rbd_dev, &cid);
3122 downgrade_write(&rbd_dev->lock_rwsem);
3123 } else {
3124 down_read(&rbd_dev->lock_rwsem);
3125 }
3126
3127 if (!__rbd_is_lock_owner(rbd_dev))
3128 wake_requests(rbd_dev, false);
3129 up_read(&rbd_dev->lock_rwsem);
3130}
3131
3132static void rbd_handle_released_lock(struct rbd_device *rbd_dev, u8 struct_v,
3133 void **p)
3134{
3135 struct rbd_client_id cid = { 0 };
3136
3137 if (struct_v >= 2) {
3138 cid.gid = ceph_decode_64(p);
3139 cid.handle = ceph_decode_64(p);
3140 }
3141
3142 dout("%s rbd_dev %p cid %llu-%llu\n", __func__, rbd_dev, cid.gid,
3143 cid.handle);
3144 if (!rbd_cid_equal(&cid, &rbd_empty_cid)) {
3145 down_write(&rbd_dev->lock_rwsem);
3146 if (!rbd_cid_equal(&cid, &rbd_dev->owner_cid)) {
3147 dout("%s rbd_dev %p unexpected owner, cid %llu-%llu != owner_cid %llu-%llu\n",
3148 __func__, rbd_dev, cid.gid, cid.handle,
3149 rbd_dev->owner_cid.gid, rbd_dev->owner_cid.handle);
3150 up_write(&rbd_dev->lock_rwsem);
3151 return;
3152 }
3153
3154 rbd_set_owner_cid(rbd_dev, &rbd_empty_cid);
3155 downgrade_write(&rbd_dev->lock_rwsem);
3156 } else {
3157 down_read(&rbd_dev->lock_rwsem);
3158 }
3159
3160 if (!__rbd_is_lock_owner(rbd_dev))
3161 wake_requests(rbd_dev, false);
3162 up_read(&rbd_dev->lock_rwsem);
3163}
3164
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003165/*
3166 * Returns result for ResponseMessage to be encoded (<= 0), or 1 if no
3167 * ResponseMessage is needed.
3168 */
3169static int rbd_handle_request_lock(struct rbd_device *rbd_dev, u8 struct_v,
3170 void **p)
Ilya Dryomoved95b212016-08-12 16:40:02 +02003171{
3172 struct rbd_client_id my_cid = rbd_get_cid(rbd_dev);
3173 struct rbd_client_id cid = { 0 };
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003174 int result = 1;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003175
3176 if (struct_v >= 2) {
3177 cid.gid = ceph_decode_64(p);
3178 cid.handle = ceph_decode_64(p);
3179 }
3180
3181 dout("%s rbd_dev %p cid %llu-%llu\n", __func__, rbd_dev, cid.gid,
3182 cid.handle);
3183 if (rbd_cid_equal(&cid, &my_cid))
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003184 return result;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003185
3186 down_read(&rbd_dev->lock_rwsem);
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003187 if (__rbd_is_lock_owner(rbd_dev)) {
3188 if (rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED &&
3189 rbd_cid_equal(&rbd_dev->owner_cid, &rbd_empty_cid))
3190 goto out_unlock;
3191
3192 /*
3193 * encode ResponseMessage(0) so the peer can detect
3194 * a missing owner
3195 */
3196 result = 0;
3197
3198 if (rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED) {
Ilya Dryomove010dd02017-04-13 12:17:39 +02003199 if (!rbd_dev->opts->exclusive) {
3200 dout("%s rbd_dev %p queueing unlock_work\n",
3201 __func__, rbd_dev);
3202 queue_work(rbd_dev->task_wq,
3203 &rbd_dev->unlock_work);
3204 } else {
3205 /* refuse to release the lock */
3206 result = -EROFS;
3207 }
Ilya Dryomoved95b212016-08-12 16:40:02 +02003208 }
3209 }
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003210
3211out_unlock:
Ilya Dryomoved95b212016-08-12 16:40:02 +02003212 up_read(&rbd_dev->lock_rwsem);
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003213 return result;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003214}
3215
3216static void __rbd_acknowledge_notify(struct rbd_device *rbd_dev,
3217 u64 notify_id, u64 cookie, s32 *result)
3218{
3219 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
Kyle Spiers08a79102018-03-17 09:44:01 -07003220 char buf[4 + CEPH_ENCODING_START_BLK_LEN];
3221 int buf_size = sizeof(buf);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003222 int ret;
3223
3224 if (result) {
3225 void *p = buf;
3226
3227 /* encode ResponseMessage */
3228 ceph_start_encoding(&p, 1, 1,
3229 buf_size - CEPH_ENCODING_START_BLK_LEN);
3230 ceph_encode_32(&p, *result);
3231 } else {
3232 buf_size = 0;
3233 }
3234
3235 ret = ceph_osdc_notify_ack(osdc, &rbd_dev->header_oid,
3236 &rbd_dev->header_oloc, notify_id, cookie,
3237 buf, buf_size);
3238 if (ret)
3239 rbd_warn(rbd_dev, "acknowledge_notify failed: %d", ret);
3240}
3241
3242static void rbd_acknowledge_notify(struct rbd_device *rbd_dev, u64 notify_id,
3243 u64 cookie)
3244{
3245 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3246 __rbd_acknowledge_notify(rbd_dev, notify_id, cookie, NULL);
3247}
3248
3249static void rbd_acknowledge_notify_result(struct rbd_device *rbd_dev,
3250 u64 notify_id, u64 cookie, s32 result)
3251{
3252 dout("%s rbd_dev %p result %d\n", __func__, rbd_dev, result);
3253 __rbd_acknowledge_notify(rbd_dev, notify_id, cookie, &result);
3254}
Ilya Dryomov922dab62016-05-26 01:15:02 +02003255
3256static void rbd_watch_cb(void *arg, u64 notify_id, u64 cookie,
3257 u64 notifier_id, void *data, size_t data_len)
Alex Elderb8d70032012-11-30 17:53:04 -06003258{
Ilya Dryomov922dab62016-05-26 01:15:02 +02003259 struct rbd_device *rbd_dev = arg;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003260 void *p = data;
3261 void *const end = p + data_len;
Ilya Dryomovd4c22692016-09-06 11:15:48 +02003262 u8 struct_v = 0;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003263 u32 len;
3264 u32 notify_op;
Alex Elderb8d70032012-11-30 17:53:04 -06003265 int ret;
3266
Ilya Dryomoved95b212016-08-12 16:40:02 +02003267 dout("%s rbd_dev %p cookie %llu notify_id %llu data_len %zu\n",
3268 __func__, rbd_dev, cookie, notify_id, data_len);
3269 if (data_len) {
3270 ret = ceph_start_decoding(&p, end, 1, "NotifyMessage",
3271 &struct_v, &len);
3272 if (ret) {
3273 rbd_warn(rbd_dev, "failed to decode NotifyMessage: %d",
3274 ret);
3275 return;
3276 }
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04003277
Ilya Dryomoved95b212016-08-12 16:40:02 +02003278 notify_op = ceph_decode_32(&p);
3279 } else {
3280 /* legacy notification for header updates */
3281 notify_op = RBD_NOTIFY_OP_HEADER_UPDATE;
3282 len = 0;
3283 }
Alex Elderb8d70032012-11-30 17:53:04 -06003284
Ilya Dryomoved95b212016-08-12 16:40:02 +02003285 dout("%s rbd_dev %p notify_op %u\n", __func__, rbd_dev, notify_op);
3286 switch (notify_op) {
3287 case RBD_NOTIFY_OP_ACQUIRED_LOCK:
3288 rbd_handle_acquired_lock(rbd_dev, struct_v, &p);
3289 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3290 break;
3291 case RBD_NOTIFY_OP_RELEASED_LOCK:
3292 rbd_handle_released_lock(rbd_dev, struct_v, &p);
3293 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3294 break;
3295 case RBD_NOTIFY_OP_REQUEST_LOCK:
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003296 ret = rbd_handle_request_lock(rbd_dev, struct_v, &p);
3297 if (ret <= 0)
Ilya Dryomoved95b212016-08-12 16:40:02 +02003298 rbd_acknowledge_notify_result(rbd_dev, notify_id,
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003299 cookie, ret);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003300 else
3301 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3302 break;
3303 case RBD_NOTIFY_OP_HEADER_UPDATE:
3304 ret = rbd_dev_refresh(rbd_dev);
3305 if (ret)
3306 rbd_warn(rbd_dev, "refresh failed: %d", ret);
3307
3308 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3309 break;
3310 default:
3311 if (rbd_is_lock_owner(rbd_dev))
3312 rbd_acknowledge_notify_result(rbd_dev, notify_id,
3313 cookie, -EOPNOTSUPP);
3314 else
3315 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3316 break;
3317 }
Alex Elderb8d70032012-11-30 17:53:04 -06003318}
3319
Ilya Dryomov99d16942016-08-12 16:11:41 +02003320static void __rbd_unregister_watch(struct rbd_device *rbd_dev);
3321
Ilya Dryomov922dab62016-05-26 01:15:02 +02003322static void rbd_watch_errcb(void *arg, u64 cookie, int err)
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003323{
Ilya Dryomov922dab62016-05-26 01:15:02 +02003324 struct rbd_device *rbd_dev = arg;
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003325
Ilya Dryomov922dab62016-05-26 01:15:02 +02003326 rbd_warn(rbd_dev, "encountered watch error: %d", err);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003327
Ilya Dryomoved95b212016-08-12 16:40:02 +02003328 down_write(&rbd_dev->lock_rwsem);
3329 rbd_set_owner_cid(rbd_dev, &rbd_empty_cid);
3330 up_write(&rbd_dev->lock_rwsem);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003331
Ilya Dryomov99d16942016-08-12 16:11:41 +02003332 mutex_lock(&rbd_dev->watch_mutex);
3333 if (rbd_dev->watch_state == RBD_WATCH_STATE_REGISTERED) {
3334 __rbd_unregister_watch(rbd_dev);
3335 rbd_dev->watch_state = RBD_WATCH_STATE_ERROR;
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003336
Ilya Dryomov99d16942016-08-12 16:11:41 +02003337 queue_delayed_work(rbd_dev->task_wq, &rbd_dev->watch_dwork, 0);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003338 }
Ilya Dryomov99d16942016-08-12 16:11:41 +02003339 mutex_unlock(&rbd_dev->watch_mutex);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003340}
3341
3342/*
Ilya Dryomov99d16942016-08-12 16:11:41 +02003343 * watch_mutex must be locked
Alex Elder9969ebc2013-01-18 12:31:10 -06003344 */
Ilya Dryomov99d16942016-08-12 16:11:41 +02003345static int __rbd_register_watch(struct rbd_device *rbd_dev)
Alex Elder9969ebc2013-01-18 12:31:10 -06003346{
3347 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
Ilya Dryomov922dab62016-05-26 01:15:02 +02003348 struct ceph_osd_linger_request *handle;
Alex Elder9969ebc2013-01-18 12:31:10 -06003349
Ilya Dryomov922dab62016-05-26 01:15:02 +02003350 rbd_assert(!rbd_dev->watch_handle);
Ilya Dryomov99d16942016-08-12 16:11:41 +02003351 dout("%s rbd_dev %p\n", __func__, rbd_dev);
Alex Elder9969ebc2013-01-18 12:31:10 -06003352
Ilya Dryomov922dab62016-05-26 01:15:02 +02003353 handle = ceph_osdc_watch(osdc, &rbd_dev->header_oid,
3354 &rbd_dev->header_oloc, rbd_watch_cb,
3355 rbd_watch_errcb, rbd_dev);
3356 if (IS_ERR(handle))
3357 return PTR_ERR(handle);
Alex Elder9969ebc2013-01-18 12:31:10 -06003358
Ilya Dryomov922dab62016-05-26 01:15:02 +02003359 rbd_dev->watch_handle = handle;
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003360 return 0;
Alex Elder9969ebc2013-01-18 12:31:10 -06003361}
3362
Ilya Dryomov99d16942016-08-12 16:11:41 +02003363/*
3364 * watch_mutex must be locked
3365 */
3366static void __rbd_unregister_watch(struct rbd_device *rbd_dev)
Ilya Dryomovfca27062013-12-16 18:02:40 +02003367{
Ilya Dryomov922dab62016-05-26 01:15:02 +02003368 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3369 int ret;
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003370
Ilya Dryomov99d16942016-08-12 16:11:41 +02003371 rbd_assert(rbd_dev->watch_handle);
3372 dout("%s rbd_dev %p\n", __func__, rbd_dev);
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003373
Ilya Dryomov922dab62016-05-26 01:15:02 +02003374 ret = ceph_osdc_unwatch(osdc, rbd_dev->watch_handle);
3375 if (ret)
3376 rbd_warn(rbd_dev, "failed to unwatch: %d", ret);
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003377
Ilya Dryomov922dab62016-05-26 01:15:02 +02003378 rbd_dev->watch_handle = NULL;
Ilya Dryomovc525f032016-04-28 16:07:26 +02003379}
3380
Ilya Dryomov99d16942016-08-12 16:11:41 +02003381static int rbd_register_watch(struct rbd_device *rbd_dev)
Ilya Dryomovc525f032016-04-28 16:07:26 +02003382{
Ilya Dryomov99d16942016-08-12 16:11:41 +02003383 int ret;
Ilya Dryomov811c6682016-04-15 16:22:16 +02003384
Ilya Dryomov99d16942016-08-12 16:11:41 +02003385 mutex_lock(&rbd_dev->watch_mutex);
3386 rbd_assert(rbd_dev->watch_state == RBD_WATCH_STATE_UNREGISTERED);
3387 ret = __rbd_register_watch(rbd_dev);
3388 if (ret)
3389 goto out;
3390
3391 rbd_dev->watch_state = RBD_WATCH_STATE_REGISTERED;
3392 rbd_dev->watch_cookie = rbd_dev->watch_handle->linger_id;
3393
3394out:
3395 mutex_unlock(&rbd_dev->watch_mutex);
3396 return ret;
3397}
3398
3399static void cancel_tasks_sync(struct rbd_device *rbd_dev)
3400{
3401 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3402
Ilya Dryomoved95b212016-08-12 16:40:02 +02003403 cancel_work_sync(&rbd_dev->acquired_lock_work);
3404 cancel_work_sync(&rbd_dev->released_lock_work);
3405 cancel_delayed_work_sync(&rbd_dev->lock_dwork);
3406 cancel_work_sync(&rbd_dev->unlock_work);
Ilya Dryomov99d16942016-08-12 16:11:41 +02003407}
3408
3409static void rbd_unregister_watch(struct rbd_device *rbd_dev)
3410{
Ilya Dryomoved95b212016-08-12 16:40:02 +02003411 WARN_ON(waitqueue_active(&rbd_dev->lock_waitq));
Ilya Dryomov99d16942016-08-12 16:11:41 +02003412 cancel_tasks_sync(rbd_dev);
3413
3414 mutex_lock(&rbd_dev->watch_mutex);
3415 if (rbd_dev->watch_state == RBD_WATCH_STATE_REGISTERED)
3416 __rbd_unregister_watch(rbd_dev);
3417 rbd_dev->watch_state = RBD_WATCH_STATE_UNREGISTERED;
3418 mutex_unlock(&rbd_dev->watch_mutex);
3419
Dongsheng Yang23edca82018-06-04 06:24:37 -04003420 cancel_delayed_work_sync(&rbd_dev->watch_dwork);
Ilya Dryomov811c6682016-04-15 16:22:16 +02003421 ceph_osdc_flush_notifies(&rbd_dev->rbd_client->client->osdc);
Ilya Dryomovfca27062013-12-16 18:02:40 +02003422}
3423
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003424/*
3425 * lock_rwsem must be held for write
3426 */
3427static void rbd_reacquire_lock(struct rbd_device *rbd_dev)
3428{
3429 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3430 char cookie[32];
3431 int ret;
3432
3433 WARN_ON(rbd_dev->lock_state != RBD_LOCK_STATE_LOCKED);
3434
3435 format_lock_cookie(rbd_dev, cookie);
3436 ret = ceph_cls_set_cookie(osdc, &rbd_dev->header_oid,
3437 &rbd_dev->header_oloc, RBD_LOCK_NAME,
3438 CEPH_CLS_LOCK_EXCLUSIVE, rbd_dev->lock_cookie,
3439 RBD_LOCK_TAG, cookie);
3440 if (ret) {
3441 if (ret != -EOPNOTSUPP)
3442 rbd_warn(rbd_dev, "failed to update lock cookie: %d",
3443 ret);
3444
3445 /*
3446 * Lock cookie cannot be updated on older OSDs, so do
3447 * a manual release and queue an acquire.
3448 */
3449 if (rbd_release_lock(rbd_dev))
3450 queue_delayed_work(rbd_dev->task_wq,
3451 &rbd_dev->lock_dwork, 0);
3452 } else {
Florian Margaineedd8ca82017-12-13 16:43:59 +01003453 __rbd_lock(rbd_dev, cookie);
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003454 }
3455}
3456
Ilya Dryomov99d16942016-08-12 16:11:41 +02003457static void rbd_reregister_watch(struct work_struct *work)
3458{
3459 struct rbd_device *rbd_dev = container_of(to_delayed_work(work),
3460 struct rbd_device, watch_dwork);
3461 int ret;
3462
3463 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3464
3465 mutex_lock(&rbd_dev->watch_mutex);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003466 if (rbd_dev->watch_state != RBD_WATCH_STATE_ERROR) {
3467 mutex_unlock(&rbd_dev->watch_mutex);
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003468 return;
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003469 }
Ilya Dryomov99d16942016-08-12 16:11:41 +02003470
3471 ret = __rbd_register_watch(rbd_dev);
3472 if (ret) {
3473 rbd_warn(rbd_dev, "failed to reregister watch: %d", ret);
Ilya Dryomov4d736442016-09-29 14:23:12 +02003474 if (ret == -EBLACKLISTED || ret == -ENOENT) {
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003475 set_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags);
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003476 wake_requests(rbd_dev, true);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003477 } else {
Ilya Dryomov99d16942016-08-12 16:11:41 +02003478 queue_delayed_work(rbd_dev->task_wq,
3479 &rbd_dev->watch_dwork,
3480 RBD_RETRY_DELAY);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003481 }
3482 mutex_unlock(&rbd_dev->watch_mutex);
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003483 return;
Ilya Dryomov99d16942016-08-12 16:11:41 +02003484 }
3485
3486 rbd_dev->watch_state = RBD_WATCH_STATE_REGISTERED;
3487 rbd_dev->watch_cookie = rbd_dev->watch_handle->linger_id;
3488 mutex_unlock(&rbd_dev->watch_mutex);
3489
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003490 down_write(&rbd_dev->lock_rwsem);
3491 if (rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED)
3492 rbd_reacquire_lock(rbd_dev);
3493 up_write(&rbd_dev->lock_rwsem);
3494
Ilya Dryomov99d16942016-08-12 16:11:41 +02003495 ret = rbd_dev_refresh(rbd_dev);
3496 if (ret)
Colin Ian Kingf6870cc2018-03-19 13:33:10 +00003497 rbd_warn(rbd_dev, "reregistration refresh failed: %d", ret);
Ilya Dryomov99d16942016-08-12 16:11:41 +02003498}
3499
Alex Elder36be9a72013-01-19 00:30:28 -06003500/*
Alex Elderf40eb342013-04-25 15:09:42 -05003501 * Synchronous osd object method call. Returns the number of bytes
3502 * returned in the outbound buffer, or a negative error code.
Alex Elder36be9a72013-01-19 00:30:28 -06003503 */
3504static int rbd_obj_method_sync(struct rbd_device *rbd_dev,
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003505 struct ceph_object_id *oid,
3506 struct ceph_object_locator *oloc,
Alex Elder36be9a72013-01-19 00:30:28 -06003507 const char *method_name,
Alex Elder41579762013-04-21 12:14:45 -05003508 const void *outbound,
Alex Elder36be9a72013-01-19 00:30:28 -06003509 size_t outbound_size,
Alex Elder41579762013-04-21 12:14:45 -05003510 void *inbound,
Alex Eldere2a58ee2013-04-30 00:44:33 -05003511 size_t inbound_size)
Alex Elder36be9a72013-01-19 00:30:28 -06003512{
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003513 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3514 struct page *req_page = NULL;
3515 struct page *reply_page;
Alex Elder36be9a72013-01-19 00:30:28 -06003516 int ret;
3517
3518 /*
Alex Elder6010a452013-04-05 01:27:11 -05003519 * Method calls are ultimately read operations. The result
3520 * should placed into the inbound buffer provided. They
3521 * also supply outbound data--parameters for the object
3522 * method. Currently if this is present it will be a
3523 * snapshot id.
Alex Elder36be9a72013-01-19 00:30:28 -06003524 */
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003525 if (outbound) {
3526 if (outbound_size > PAGE_SIZE)
3527 return -E2BIG;
Alex Elder36be9a72013-01-19 00:30:28 -06003528
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003529 req_page = alloc_page(GFP_KERNEL);
3530 if (!req_page)
3531 return -ENOMEM;
Alex Elder36be9a72013-01-19 00:30:28 -06003532
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003533 memcpy(page_address(req_page), outbound, outbound_size);
Alex Elder04017e22013-04-05 14:46:02 -05003534 }
Alex Elder430c28c2013-04-03 21:32:51 -05003535
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003536 reply_page = alloc_page(GFP_KERNEL);
3537 if (!reply_page) {
3538 if (req_page)
3539 __free_page(req_page);
3540 return -ENOMEM;
3541 }
Alex Elder36be9a72013-01-19 00:30:28 -06003542
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003543 ret = ceph_osdc_call(osdc, oid, oloc, RBD_DRV_NAME, method_name,
3544 CEPH_OSD_FLAG_READ, req_page, outbound_size,
3545 reply_page, &inbound_size);
3546 if (!ret) {
3547 memcpy(inbound, page_address(reply_page), inbound_size);
3548 ret = inbound_size;
3549 }
Alex Elder57385b52013-04-21 12:14:45 -05003550
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003551 if (req_page)
3552 __free_page(req_page);
3553 __free_page(reply_page);
Alex Elder36be9a72013-01-19 00:30:28 -06003554 return ret;
3555}
3556
Ilya Dryomoved95b212016-08-12 16:40:02 +02003557/*
3558 * lock_rwsem must be held for read
3559 */
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003560static int rbd_wait_state_locked(struct rbd_device *rbd_dev, bool may_acquire)
Ilya Dryomoved95b212016-08-12 16:40:02 +02003561{
3562 DEFINE_WAIT(wait);
Dongsheng Yang34f55d02018-03-26 10:22:55 -04003563 unsigned long timeout;
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003564 int ret = 0;
3565
3566 if (test_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags))
3567 return -EBLACKLISTED;
3568
3569 if (rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED)
3570 return 0;
3571
3572 if (!may_acquire) {
3573 rbd_warn(rbd_dev, "exclusive lock required");
3574 return -EROFS;
3575 }
Ilya Dryomoved95b212016-08-12 16:40:02 +02003576
3577 do {
3578 /*
3579 * Note the use of mod_delayed_work() in rbd_acquire_lock()
3580 * and cancel_delayed_work() in wake_requests().
3581 */
3582 dout("%s rbd_dev %p queueing lock_dwork\n", __func__, rbd_dev);
3583 queue_delayed_work(rbd_dev->task_wq, &rbd_dev->lock_dwork, 0);
3584 prepare_to_wait_exclusive(&rbd_dev->lock_waitq, &wait,
3585 TASK_UNINTERRUPTIBLE);
3586 up_read(&rbd_dev->lock_rwsem);
Dongsheng Yang34f55d02018-03-26 10:22:55 -04003587 timeout = schedule_timeout(ceph_timeout_jiffies(
3588 rbd_dev->opts->lock_timeout));
Ilya Dryomoved95b212016-08-12 16:40:02 +02003589 down_read(&rbd_dev->lock_rwsem);
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003590 if (test_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags)) {
3591 ret = -EBLACKLISTED;
3592 break;
3593 }
Dongsheng Yang34f55d02018-03-26 10:22:55 -04003594 if (!timeout) {
3595 rbd_warn(rbd_dev, "timed out waiting for lock");
3596 ret = -ETIMEDOUT;
3597 break;
3598 }
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003599 } while (rbd_dev->lock_state != RBD_LOCK_STATE_LOCKED);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003600
Ilya Dryomoved95b212016-08-12 16:40:02 +02003601 finish_wait(&rbd_dev->lock_waitq, &wait);
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003602 return ret;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003603}
3604
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003605static void rbd_queue_workfn(struct work_struct *work)
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003606{
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003607 struct request *rq = blk_mq_rq_from_pdu(work);
3608 struct rbd_device *rbd_dev = rq->q->queuedata;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003609 struct rbd_img_request *img_request;
Josh Durgin4e752f02014-04-08 11:12:11 -07003610 struct ceph_snap_context *snapc = NULL;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003611 u64 offset = (u64)blk_rq_pos(rq) << SECTOR_SHIFT;
3612 u64 length = blk_rq_bytes(rq);
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08003613 enum obj_operation_type op_type;
Josh Durgin4e752f02014-04-08 11:12:11 -07003614 u64 mapping_size;
Ilya Dryomov80de1912016-09-20 14:23:17 +02003615 bool must_be_locked;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003616 int result;
3617
Christoph Hellwigaebf5262017-01-31 16:57:31 +01003618 switch (req_op(rq)) {
3619 case REQ_OP_DISCARD:
Ilya Dryomov6ac56952017-05-22 19:59:24 +02003620 case REQ_OP_WRITE_ZEROES:
Christoph Hellwigaebf5262017-01-31 16:57:31 +01003621 op_type = OBJ_OP_DISCARD;
3622 break;
3623 case REQ_OP_WRITE:
3624 op_type = OBJ_OP_WRITE;
3625 break;
3626 case REQ_OP_READ:
3627 op_type = OBJ_OP_READ;
3628 break;
3629 default:
3630 dout("%s: non-fs request type %d\n", __func__, req_op(rq));
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003631 result = -EIO;
3632 goto err;
3633 }
3634
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003635 /* Ignore/skip any zero-length requests */
3636
3637 if (!length) {
3638 dout("%s: zero-length request\n", __func__);
3639 result = 0;
3640 goto err_rq;
3641 }
3642
Ilya Dryomov9568c932017-10-12 12:35:19 +02003643 rbd_assert(op_type == OBJ_OP_READ ||
3644 rbd_dev->spec->snap_id == CEPH_NOSNAP);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003645
3646 /*
3647 * Quit early if the mapped snapshot no longer exists. It's
3648 * still possible the snapshot will have disappeared by the
3649 * time our request arrives at the osd, but there's no sense in
3650 * sending it if we already know.
3651 */
3652 if (!test_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags)) {
3653 dout("request for non-existent snapshot");
3654 rbd_assert(rbd_dev->spec->snap_id != CEPH_NOSNAP);
3655 result = -ENXIO;
3656 goto err_rq;
3657 }
3658
3659 if (offset && length > U64_MAX - offset + 1) {
3660 rbd_warn(rbd_dev, "bad request range (%llu~%llu)", offset,
3661 length);
3662 result = -EINVAL;
3663 goto err_rq; /* Shouldn't happen */
3664 }
3665
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003666 blk_mq_start_request(rq);
3667
Josh Durgin4e752f02014-04-08 11:12:11 -07003668 down_read(&rbd_dev->header_rwsem);
3669 mapping_size = rbd_dev->mapping.size;
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08003670 if (op_type != OBJ_OP_READ) {
Josh Durgin4e752f02014-04-08 11:12:11 -07003671 snapc = rbd_dev->header.snapc;
3672 ceph_get_snap_context(snapc);
3673 }
3674 up_read(&rbd_dev->header_rwsem);
3675
3676 if (offset + length > mapping_size) {
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003677 rbd_warn(rbd_dev, "beyond EOD (%llu~%llu > %llu)", offset,
Josh Durgin4e752f02014-04-08 11:12:11 -07003678 length, mapping_size);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003679 result = -EIO;
3680 goto err_rq;
3681 }
3682
Ilya Dryomovf9bebd52017-04-13 12:17:39 +02003683 must_be_locked =
3684 (rbd_dev->header.features & RBD_FEATURE_EXCLUSIVE_LOCK) &&
3685 (op_type != OBJ_OP_READ || rbd_dev->opts->lock_on_read);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003686 if (must_be_locked) {
3687 down_read(&rbd_dev->lock_rwsem);
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003688 result = rbd_wait_state_locked(rbd_dev,
3689 !rbd_dev->opts->exclusive);
3690 if (result)
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003691 goto err_unlock;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003692 }
3693
Ilya Dryomovdfd98752018-02-06 19:26:35 +01003694 img_request = rbd_img_request_create(rbd_dev, op_type, snapc);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003695 if (!img_request) {
3696 result = -ENOMEM;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003697 goto err_unlock;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003698 }
3699 img_request->rq = rq;
Ilya Dryomov70b16db2015-11-27 19:23:24 +01003700 snapc = NULL; /* img_request consumes a ref */
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003701
Guangliang Zhao90e98c52014-04-01 22:22:16 +08003702 if (op_type == OBJ_OP_DISCARD)
Ilya Dryomov5a237812018-02-06 19:26:34 +01003703 result = rbd_img_fill_nodata(img_request, offset, length);
Guangliang Zhao90e98c52014-04-01 22:22:16 +08003704 else
Ilya Dryomov5a237812018-02-06 19:26:34 +01003705 result = rbd_img_fill_from_bio(img_request, offset, length,
3706 rq->bio);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003707 if (result)
3708 goto err_img_request;
3709
Ilya Dryomovefbd1a12018-01-30 17:52:11 +01003710 rbd_img_request_submit(img_request);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003711 if (must_be_locked)
3712 up_read(&rbd_dev->lock_rwsem);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003713 return;
3714
3715err_img_request:
3716 rbd_img_request_put(img_request);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003717err_unlock:
3718 if (must_be_locked)
3719 up_read(&rbd_dev->lock_rwsem);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003720err_rq:
3721 if (result)
3722 rbd_warn(rbd_dev, "%s %llx at %llx result %d",
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08003723 obj_op_name(op_type), length, offset, result);
SF Markus Elfringe96a6502014-11-02 15:20:59 +01003724 ceph_put_snap_context(snapc);
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003725err:
Christoph Hellwig2a842ac2017-06-03 09:38:04 +02003726 blk_mq_end_request(rq, errno_to_blk_status(result));
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003727}
3728
Christoph Hellwigfc17b652017-06-03 09:38:05 +02003729static blk_status_t rbd_queue_rq(struct blk_mq_hw_ctx *hctx,
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003730 const struct blk_mq_queue_data *bd)
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003731{
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003732 struct request *rq = bd->rq;
3733 struct work_struct *work = blk_mq_rq_to_pdu(rq);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003734
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003735 queue_work(rbd_wq, work);
Christoph Hellwigfc17b652017-06-03 09:38:05 +02003736 return BLK_STS_OK;
Alex Elderbf0d5f502012-11-22 00:00:08 -06003737}
3738
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003739static void rbd_free_disk(struct rbd_device *rbd_dev)
3740{
Ilya Dryomov5769ed02017-04-13 12:17:38 +02003741 blk_cleanup_queue(rbd_dev->disk->queue);
3742 blk_mq_free_tag_set(&rbd_dev->tag_set);
3743 put_disk(rbd_dev->disk);
Alex Eldera0cab922013-04-25 23:15:08 -05003744 rbd_dev->disk = NULL;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003745}
3746
Alex Elder788e2df2013-01-17 12:25:27 -06003747static int rbd_obj_read_sync(struct rbd_device *rbd_dev,
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003748 struct ceph_object_id *oid,
3749 struct ceph_object_locator *oloc,
3750 void *buf, int buf_len)
Alex Elder788e2df2013-01-17 12:25:27 -06003751
3752{
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003753 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3754 struct ceph_osd_request *req;
3755 struct page **pages;
3756 int num_pages = calc_pages_for(0, buf_len);
Alex Elder788e2df2013-01-17 12:25:27 -06003757 int ret;
3758
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003759 req = ceph_osdc_alloc_request(osdc, NULL, 1, false, GFP_KERNEL);
3760 if (!req)
3761 return -ENOMEM;
Alex Elder788e2df2013-01-17 12:25:27 -06003762
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003763 ceph_oid_copy(&req->r_base_oid, oid);
3764 ceph_oloc_copy(&req->r_base_oloc, oloc);
3765 req->r_flags = CEPH_OSD_FLAG_READ;
Alex Elder788e2df2013-01-17 12:25:27 -06003766
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003767 ret = ceph_osdc_alloc_messages(req, GFP_KERNEL);
Alex Elder788e2df2013-01-17 12:25:27 -06003768 if (ret)
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003769 goto out_req;
Alex Elder788e2df2013-01-17 12:25:27 -06003770
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003771 pages = ceph_alloc_page_vector(num_pages, GFP_KERNEL);
3772 if (IS_ERR(pages)) {
3773 ret = PTR_ERR(pages);
3774 goto out_req;
3775 }
Alex Elder1ceae7e2013-02-06 13:11:38 -06003776
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003777 osd_req_op_extent_init(req, 0, CEPH_OSD_OP_READ, 0, buf_len, 0, 0);
3778 osd_req_op_extent_osd_data_pages(req, 0, pages, buf_len, 0, false,
3779 true);
Alex Elder788e2df2013-01-17 12:25:27 -06003780
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003781 ceph_osdc_start_request(osdc, req, false);
3782 ret = ceph_osdc_wait_request(osdc, req);
3783 if (ret >= 0)
3784 ceph_copy_from_page_vector(pages, buf, 0, ret);
3785
3786out_req:
3787 ceph_osdc_put_request(req);
Alex Elder788e2df2013-01-17 12:25:27 -06003788 return ret;
3789}
3790
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003791/*
Alex Elder662518b2013-05-06 09:51:29 -05003792 * Read the complete header for the given rbd device. On successful
3793 * return, the rbd_dev->header field will contain up-to-date
3794 * information about the image.
Alex Elder4156d992012-08-02 11:29:46 -05003795 */
Alex Elder99a41eb2013-05-06 09:51:30 -05003796static int rbd_dev_v1_header_info(struct rbd_device *rbd_dev)
Alex Elder4156d992012-08-02 11:29:46 -05003797{
3798 struct rbd_image_header_ondisk *ondisk = NULL;
3799 u32 snap_count = 0;
3800 u64 names_size = 0;
3801 u32 want_count;
3802 int ret;
3803
3804 /*
3805 * The complete header will include an array of its 64-bit
3806 * snapshot ids, followed by the names of those snapshots as
3807 * a contiguous block of NUL-terminated strings. Note that
3808 * the number of snapshots could change by the time we read
3809 * it in, in which case we re-read it.
3810 */
3811 do {
3812 size_t size;
3813
3814 kfree(ondisk);
3815
3816 size = sizeof (*ondisk);
3817 size += snap_count * sizeof (struct rbd_image_snap_ondisk);
3818 size += names_size;
3819 ondisk = kmalloc(size, GFP_KERNEL);
3820 if (!ondisk)
Alex Elder662518b2013-05-06 09:51:29 -05003821 return -ENOMEM;
Alex Elder4156d992012-08-02 11:29:46 -05003822
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003823 ret = rbd_obj_read_sync(rbd_dev, &rbd_dev->header_oid,
3824 &rbd_dev->header_oloc, ondisk, size);
Alex Elder4156d992012-08-02 11:29:46 -05003825 if (ret < 0)
Alex Elder662518b2013-05-06 09:51:29 -05003826 goto out;
Alex Elderc0cd10db2013-04-26 09:43:47 -05003827 if ((size_t)ret < size) {
Alex Elder4156d992012-08-02 11:29:46 -05003828 ret = -ENXIO;
Alex Elder06ecc6c2012-11-01 10:17:15 -05003829 rbd_warn(rbd_dev, "short header read (want %zd got %d)",
3830 size, ret);
Alex Elder662518b2013-05-06 09:51:29 -05003831 goto out;
Alex Elder4156d992012-08-02 11:29:46 -05003832 }
3833 if (!rbd_dev_ondisk_valid(ondisk)) {
3834 ret = -ENXIO;
Alex Elder06ecc6c2012-11-01 10:17:15 -05003835 rbd_warn(rbd_dev, "invalid header");
Alex Elder662518b2013-05-06 09:51:29 -05003836 goto out;
Alex Elder4156d992012-08-02 11:29:46 -05003837 }
3838
3839 names_size = le64_to_cpu(ondisk->snap_names_len);
3840 want_count = snap_count;
3841 snap_count = le32_to_cpu(ondisk->snap_count);
3842 } while (snap_count != want_count);
3843
Alex Elder662518b2013-05-06 09:51:29 -05003844 ret = rbd_header_from_disk(rbd_dev, ondisk);
3845out:
Alex Elder4156d992012-08-02 11:29:46 -05003846 kfree(ondisk);
3847
Yehuda Sadehdfc56062010-11-19 14:51:04 -08003848 return ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003849}
3850
Alex Elder15228ed2013-05-01 12:43:03 -05003851/*
3852 * Clear the rbd device's EXISTS flag if the snapshot it's mapped to
3853 * has disappeared from the (just updated) snapshot context.
3854 */
3855static void rbd_exists_validate(struct rbd_device *rbd_dev)
3856{
3857 u64 snap_id;
3858
3859 if (!test_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags))
3860 return;
3861
3862 snap_id = rbd_dev->spec->snap_id;
3863 if (snap_id == CEPH_NOSNAP)
3864 return;
3865
3866 if (rbd_dev_snap_index(rbd_dev, snap_id) == BAD_SNAP_INDEX)
3867 clear_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags);
3868}
3869
Josh Durgin98752012013-08-29 17:26:31 -07003870static void rbd_dev_update_size(struct rbd_device *rbd_dev)
3871{
3872 sector_t size;
Josh Durgin98752012013-08-29 17:26:31 -07003873
3874 /*
Ilya Dryomov811c6682016-04-15 16:22:16 +02003875 * If EXISTS is not set, rbd_dev->disk may be NULL, so don't
3876 * try to update its size. If REMOVING is set, updating size
3877 * is just useless work since the device can't be opened.
Josh Durgin98752012013-08-29 17:26:31 -07003878 */
Ilya Dryomov811c6682016-04-15 16:22:16 +02003879 if (test_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags) &&
3880 !test_bit(RBD_DEV_FLAG_REMOVING, &rbd_dev->flags)) {
Josh Durgin98752012013-08-29 17:26:31 -07003881 size = (sector_t)rbd_dev->mapping.size / SECTOR_SIZE;
3882 dout("setting size to %llu sectors", (unsigned long long)size);
3883 set_capacity(rbd_dev->disk, size);
3884 revalidate_disk(rbd_dev->disk);
3885 }
3886}
3887
Alex Eldercc4a38bd2013-04-30 00:44:33 -05003888static int rbd_dev_refresh(struct rbd_device *rbd_dev)
Alex Elder1fe5e992012-07-25 09:32:41 -05003889{
Alex Eldere627db02013-05-06 07:40:30 -05003890 u64 mapping_size;
Alex Elder1fe5e992012-07-25 09:32:41 -05003891 int ret;
3892
Alex Eldercfbf6372013-05-31 17:40:45 -05003893 down_write(&rbd_dev->header_rwsem);
Alex Elder3b5cf2a2013-05-29 11:18:59 -05003894 mapping_size = rbd_dev->mapping.size;
Ilya Dryomova720ae02014-07-23 17:11:19 +04003895
3896 ret = rbd_dev_header_info(rbd_dev);
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04003897 if (ret)
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003898 goto out;
Alex Elder15228ed2013-05-01 12:43:03 -05003899
Ilya Dryomove8f59b52014-07-24 10:42:13 +04003900 /*
3901 * If there is a parent, see if it has disappeared due to the
3902 * mapped image getting flattened.
3903 */
3904 if (rbd_dev->parent) {
3905 ret = rbd_dev_v2_parent_info(rbd_dev);
3906 if (ret)
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003907 goto out;
Ilya Dryomove8f59b52014-07-24 10:42:13 +04003908 }
3909
Ilya Dryomov5ff11082014-07-23 17:11:21 +04003910 if (rbd_dev->spec->snap_id == CEPH_NOSNAP) {
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003911 rbd_dev->mapping.size = rbd_dev->header.image_size;
Ilya Dryomov5ff11082014-07-23 17:11:21 +04003912 } else {
3913 /* validate mapped snapshot's EXISTS flag */
3914 rbd_exists_validate(rbd_dev);
3915 }
Alex Elder15228ed2013-05-01 12:43:03 -05003916
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003917out:
Alex Eldercfbf6372013-05-31 17:40:45 -05003918 up_write(&rbd_dev->header_rwsem);
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003919 if (!ret && mapping_size != rbd_dev->mapping.size)
Josh Durgin98752012013-08-29 17:26:31 -07003920 rbd_dev_update_size(rbd_dev);
Alex Elder1fe5e992012-07-25 09:32:41 -05003921
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003922 return ret;
Alex Elder1fe5e992012-07-25 09:32:41 -05003923}
3924
Christoph Hellwigd6296d32017-05-01 10:19:08 -06003925static int rbd_init_request(struct blk_mq_tag_set *set, struct request *rq,
3926 unsigned int hctx_idx, unsigned int numa_node)
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003927{
3928 struct work_struct *work = blk_mq_rq_to_pdu(rq);
3929
3930 INIT_WORK(work, rbd_queue_workfn);
3931 return 0;
3932}
3933
Eric Biggersf363b082017-03-30 13:39:16 -07003934static const struct blk_mq_ops rbd_mq_ops = {
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003935 .queue_rq = rbd_queue_rq,
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003936 .init_request = rbd_init_request,
3937};
3938
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003939static int rbd_init_disk(struct rbd_device *rbd_dev)
3940{
3941 struct gendisk *disk;
3942 struct request_queue *q;
Ilya Dryomov420efbd2018-04-16 09:32:18 +02003943 unsigned int objset_bytes =
3944 rbd_dev->layout.object_size * rbd_dev->layout.stripe_count;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003945 int err;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003946
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003947 /* create gendisk info */
Ilya Dryomov7e513d42013-12-16 19:26:32 +02003948 disk = alloc_disk(single_major ?
3949 (1 << RBD_SINGLE_MAJOR_PART_SHIFT) :
3950 RBD_MINORS_PER_MAJOR);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003951 if (!disk)
Alex Elder1fcdb8a2012-08-29 17:11:06 -05003952 return -ENOMEM;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003953
Alex Elderf0f8cef2012-01-29 13:57:44 -06003954 snprintf(disk->disk_name, sizeof(disk->disk_name), RBD_DRV_NAME "%d",
Alex Elderde71a292012-07-03 16:01:19 -05003955 rbd_dev->dev_id);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003956 disk->major = rbd_dev->major;
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02003957 disk->first_minor = rbd_dev->minor;
Ilya Dryomov7e513d42013-12-16 19:26:32 +02003958 if (single_major)
3959 disk->flags |= GENHD_FL_EXT_DEVT;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003960 disk->fops = &rbd_bd_ops;
3961 disk->private_data = rbd_dev;
3962
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003963 memset(&rbd_dev->tag_set, 0, sizeof(rbd_dev->tag_set));
3964 rbd_dev->tag_set.ops = &rbd_mq_ops;
Ilya Dryomovb5584182015-06-23 16:21:19 +03003965 rbd_dev->tag_set.queue_depth = rbd_dev->opts->queue_depth;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003966 rbd_dev->tag_set.numa_node = NUMA_NO_NODE;
Ilya Dryomovb5584182015-06-23 16:21:19 +03003967 rbd_dev->tag_set.flags = BLK_MQ_F_SHOULD_MERGE | BLK_MQ_F_SG_MERGE;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003968 rbd_dev->tag_set.nr_hw_queues = 1;
3969 rbd_dev->tag_set.cmd_size = sizeof(struct work_struct);
3970
3971 err = blk_mq_alloc_tag_set(&rbd_dev->tag_set);
3972 if (err)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003973 goto out_disk;
Josh Durgin029bcbd2011-07-22 11:35:23 -07003974
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003975 q = blk_mq_init_queue(&rbd_dev->tag_set);
3976 if (IS_ERR(q)) {
3977 err = PTR_ERR(q);
3978 goto out_tag_set;
3979 }
3980
Bart Van Assche8b904b52018-03-07 17:10:10 -08003981 blk_queue_flag_set(QUEUE_FLAG_NONROT, q);
Ilya Dryomovd8a2c892015-03-24 16:15:17 +03003982 /* QUEUE_FLAG_ADD_RANDOM is off by default for blk-mq */
Alex Elder593a9e72012-02-07 12:03:37 -06003983
Ilya Dryomov420efbd2018-04-16 09:32:18 +02003984 blk_queue_max_hw_sectors(q, objset_bytes >> SECTOR_SHIFT);
Ilya Dryomov0d9fde42015-10-07 16:09:35 +02003985 q->limits.max_sectors = queue_max_hw_sectors(q);
Ilya Dryomov21acdf42017-12-21 15:35:11 +01003986 blk_queue_max_segments(q, USHRT_MAX);
Ilya Dryomov24f1df62018-01-12 17:22:10 +01003987 blk_queue_max_segment_size(q, UINT_MAX);
Ilya Dryomov420efbd2018-04-16 09:32:18 +02003988 blk_queue_io_min(q, objset_bytes);
3989 blk_queue_io_opt(q, objset_bytes);
Josh Durgin029bcbd2011-07-22 11:35:23 -07003990
Ilya Dryomovd9360542018-03-23 06:14:47 +01003991 if (rbd_dev->opts->trim) {
3992 blk_queue_flag_set(QUEUE_FLAG_DISCARD, q);
3993 q->limits.discard_granularity = objset_bytes;
3994 blk_queue_max_discard_sectors(q, objset_bytes >> SECTOR_SHIFT);
3995 blk_queue_max_write_zeroes_sectors(q, objset_bytes >> SECTOR_SHIFT);
3996 }
Guangliang Zhao90e98c52014-04-01 22:22:16 +08003997
Ronny Hegewaldbae818e2015-10-15 18:50:46 +00003998 if (!ceph_test_opt(rbd_dev->rbd_client->client, NOCRC))
Jan Karadc3b17c2017-02-02 15:56:50 +01003999 q->backing_dev_info->capabilities |= BDI_CAP_STABLE_WRITES;
Ronny Hegewaldbae818e2015-10-15 18:50:46 +00004000
Ilya Dryomov5769ed02017-04-13 12:17:38 +02004001 /*
4002 * disk_release() expects a queue ref from add_disk() and will
4003 * put it. Hold an extra ref until add_disk() is called.
4004 */
4005 WARN_ON(!blk_get_queue(q));
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004006 disk->queue = q;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004007 q->queuedata = rbd_dev;
4008
4009 rbd_dev->disk = disk;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004010
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004011 return 0;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004012out_tag_set:
4013 blk_mq_free_tag_set(&rbd_dev->tag_set);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004014out_disk:
4015 put_disk(disk);
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004016 return err;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004017}
4018
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004019/*
4020 sysfs
4021*/
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004022
Alex Elder593a9e72012-02-07 12:03:37 -06004023static struct rbd_device *dev_to_rbd_dev(struct device *dev)
4024{
4025 return container_of(dev, struct rbd_device, dev);
4026}
4027
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004028static ssize_t rbd_size_show(struct device *dev,
4029 struct device_attribute *attr, char *buf)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004030{
Alex Elder593a9e72012-02-07 12:03:37 -06004031 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004032
Alex Elderfc71d832013-04-26 15:44:36 -05004033 return sprintf(buf, "%llu\n",
4034 (unsigned long long)rbd_dev->mapping.size);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004035}
4036
Alex Elder34b13182012-07-13 20:35:12 -05004037/*
4038 * Note this shows the features for whatever's mapped, which is not
4039 * necessarily the base image.
4040 */
4041static ssize_t rbd_features_show(struct device *dev,
4042 struct device_attribute *attr, char *buf)
4043{
4044 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4045
4046 return sprintf(buf, "0x%016llx\n",
Alex Elderfc71d832013-04-26 15:44:36 -05004047 (unsigned long long)rbd_dev->mapping.features);
Alex Elder34b13182012-07-13 20:35:12 -05004048}
4049
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004050static ssize_t rbd_major_show(struct device *dev,
4051 struct device_attribute *attr, char *buf)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004052{
Alex Elder593a9e72012-02-07 12:03:37 -06004053 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004054
Alex Elderfc71d832013-04-26 15:44:36 -05004055 if (rbd_dev->major)
4056 return sprintf(buf, "%d\n", rbd_dev->major);
4057
4058 return sprintf(buf, "(none)\n");
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004059}
Alex Elderfc71d832013-04-26 15:44:36 -05004060
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004061static ssize_t rbd_minor_show(struct device *dev,
4062 struct device_attribute *attr, char *buf)
4063{
4064 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4065
4066 return sprintf(buf, "%d\n", rbd_dev->minor);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004067}
4068
Ilya Dryomov005a07bf2016-08-18 18:38:43 +02004069static ssize_t rbd_client_addr_show(struct device *dev,
4070 struct device_attribute *attr, char *buf)
4071{
4072 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4073 struct ceph_entity_addr *client_addr =
4074 ceph_client_addr(rbd_dev->rbd_client->client);
4075
4076 return sprintf(buf, "%pISpc/%u\n", &client_addr->in_addr,
4077 le32_to_cpu(client_addr->nonce));
4078}
4079
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004080static ssize_t rbd_client_id_show(struct device *dev,
4081 struct device_attribute *attr, char *buf)
4082{
Alex Elder593a9e72012-02-07 12:03:37 -06004083 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004084
Alex Elder1dbb4392012-01-24 10:08:37 -06004085 return sprintf(buf, "client%lld\n",
Ilya Dryomov033268a2016-08-12 14:59:58 +02004086 ceph_client_gid(rbd_dev->rbd_client->client));
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004087}
4088
Mike Christie267fb902016-08-18 18:38:43 +02004089static ssize_t rbd_cluster_fsid_show(struct device *dev,
4090 struct device_attribute *attr, char *buf)
4091{
4092 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4093
4094 return sprintf(buf, "%pU\n", &rbd_dev->rbd_client->client->fsid);
4095}
4096
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02004097static ssize_t rbd_config_info_show(struct device *dev,
4098 struct device_attribute *attr, char *buf)
4099{
4100 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4101
4102 return sprintf(buf, "%s\n", rbd_dev->config_info);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004103}
4104
4105static ssize_t rbd_pool_show(struct device *dev,
4106 struct device_attribute *attr, char *buf)
4107{
Alex Elder593a9e72012-02-07 12:03:37 -06004108 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004109
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004110 return sprintf(buf, "%s\n", rbd_dev->spec->pool_name);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004111}
4112
Alex Elder9bb2f332012-07-12 10:46:35 -05004113static ssize_t rbd_pool_id_show(struct device *dev,
4114 struct device_attribute *attr, char *buf)
4115{
4116 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4117
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004118 return sprintf(buf, "%llu\n",
Alex Elderfc71d832013-04-26 15:44:36 -05004119 (unsigned long long) rbd_dev->spec->pool_id);
Alex Elder9bb2f332012-07-12 10:46:35 -05004120}
4121
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004122static ssize_t rbd_name_show(struct device *dev,
4123 struct device_attribute *attr, char *buf)
4124{
Alex Elder593a9e72012-02-07 12:03:37 -06004125 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004126
Alex Eldera92ffdf2012-10-30 19:40:33 -05004127 if (rbd_dev->spec->image_name)
4128 return sprintf(buf, "%s\n", rbd_dev->spec->image_name);
4129
4130 return sprintf(buf, "(unknown)\n");
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004131}
4132
Alex Elder589d30e2012-07-10 20:30:11 -05004133static ssize_t rbd_image_id_show(struct device *dev,
4134 struct device_attribute *attr, char *buf)
4135{
4136 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4137
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004138 return sprintf(buf, "%s\n", rbd_dev->spec->image_id);
Alex Elder589d30e2012-07-10 20:30:11 -05004139}
4140
Alex Elder34b13182012-07-13 20:35:12 -05004141/*
4142 * Shows the name of the currently-mapped snapshot (or
4143 * RBD_SNAP_HEAD_NAME for the base image).
4144 */
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004145static ssize_t rbd_snap_show(struct device *dev,
4146 struct device_attribute *attr,
4147 char *buf)
4148{
Alex Elder593a9e72012-02-07 12:03:37 -06004149 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004150
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004151 return sprintf(buf, "%s\n", rbd_dev->spec->snap_name);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004152}
4153
Mike Christie92a58672016-08-18 18:38:44 +02004154static ssize_t rbd_snap_id_show(struct device *dev,
4155 struct device_attribute *attr, char *buf)
4156{
4157 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4158
4159 return sprintf(buf, "%llu\n", rbd_dev->spec->snap_id);
4160}
4161
Alex Elder86b00e02012-10-25 23:34:42 -05004162/*
Ilya Dryomovff961282014-07-22 21:53:07 +04004163 * For a v2 image, shows the chain of parent images, separated by empty
4164 * lines. For v1 images or if there is no parent, shows "(no parent
4165 * image)".
Alex Elder86b00e02012-10-25 23:34:42 -05004166 */
4167static ssize_t rbd_parent_show(struct device *dev,
Ilya Dryomovff961282014-07-22 21:53:07 +04004168 struct device_attribute *attr,
4169 char *buf)
Alex Elder86b00e02012-10-25 23:34:42 -05004170{
4171 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Ilya Dryomovff961282014-07-22 21:53:07 +04004172 ssize_t count = 0;
Alex Elder86b00e02012-10-25 23:34:42 -05004173
Ilya Dryomovff961282014-07-22 21:53:07 +04004174 if (!rbd_dev->parent)
Alex Elder86b00e02012-10-25 23:34:42 -05004175 return sprintf(buf, "(no parent image)\n");
4176
Ilya Dryomovff961282014-07-22 21:53:07 +04004177 for ( ; rbd_dev->parent; rbd_dev = rbd_dev->parent) {
4178 struct rbd_spec *spec = rbd_dev->parent_spec;
Alex Elder86b00e02012-10-25 23:34:42 -05004179
Ilya Dryomovff961282014-07-22 21:53:07 +04004180 count += sprintf(&buf[count], "%s"
4181 "pool_id %llu\npool_name %s\n"
4182 "image_id %s\nimage_name %s\n"
4183 "snap_id %llu\nsnap_name %s\n"
4184 "overlap %llu\n",
4185 !count ? "" : "\n", /* first? */
4186 spec->pool_id, spec->pool_name,
4187 spec->image_id, spec->image_name ?: "(unknown)",
4188 spec->snap_id, spec->snap_name,
4189 rbd_dev->parent_overlap);
4190 }
Alex Elder86b00e02012-10-25 23:34:42 -05004191
Ilya Dryomovff961282014-07-22 21:53:07 +04004192 return count;
Alex Elder86b00e02012-10-25 23:34:42 -05004193}
4194
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004195static ssize_t rbd_image_refresh(struct device *dev,
4196 struct device_attribute *attr,
4197 const char *buf,
4198 size_t size)
4199{
Alex Elder593a9e72012-02-07 12:03:37 -06004200 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Alex Elderb8136232012-07-25 09:32:41 -05004201 int ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004202
Alex Eldercc4a38bd2013-04-30 00:44:33 -05004203 ret = rbd_dev_refresh(rbd_dev);
Alex Eldere627db02013-05-06 07:40:30 -05004204 if (ret)
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04004205 return ret;
Alex Elderb8136232012-07-25 09:32:41 -05004206
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04004207 return size;
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004208}
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004209
Joe Perches5657a812018-05-24 13:38:59 -06004210static DEVICE_ATTR(size, 0444, rbd_size_show, NULL);
4211static DEVICE_ATTR(features, 0444, rbd_features_show, NULL);
4212static DEVICE_ATTR(major, 0444, rbd_major_show, NULL);
4213static DEVICE_ATTR(minor, 0444, rbd_minor_show, NULL);
4214static DEVICE_ATTR(client_addr, 0444, rbd_client_addr_show, NULL);
4215static DEVICE_ATTR(client_id, 0444, rbd_client_id_show, NULL);
4216static DEVICE_ATTR(cluster_fsid, 0444, rbd_cluster_fsid_show, NULL);
4217static DEVICE_ATTR(config_info, 0400, rbd_config_info_show, NULL);
4218static DEVICE_ATTR(pool, 0444, rbd_pool_show, NULL);
4219static DEVICE_ATTR(pool_id, 0444, rbd_pool_id_show, NULL);
4220static DEVICE_ATTR(name, 0444, rbd_name_show, NULL);
4221static DEVICE_ATTR(image_id, 0444, rbd_image_id_show, NULL);
4222static DEVICE_ATTR(refresh, 0200, NULL, rbd_image_refresh);
4223static DEVICE_ATTR(current_snap, 0444, rbd_snap_show, NULL);
4224static DEVICE_ATTR(snap_id, 0444, rbd_snap_id_show, NULL);
4225static DEVICE_ATTR(parent, 0444, rbd_parent_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004226
4227static struct attribute *rbd_attrs[] = {
4228 &dev_attr_size.attr,
Alex Elder34b13182012-07-13 20:35:12 -05004229 &dev_attr_features.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004230 &dev_attr_major.attr,
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004231 &dev_attr_minor.attr,
Ilya Dryomov005a07bf2016-08-18 18:38:43 +02004232 &dev_attr_client_addr.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004233 &dev_attr_client_id.attr,
Mike Christie267fb902016-08-18 18:38:43 +02004234 &dev_attr_cluster_fsid.attr,
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02004235 &dev_attr_config_info.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004236 &dev_attr_pool.attr,
Alex Elder9bb2f332012-07-12 10:46:35 -05004237 &dev_attr_pool_id.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004238 &dev_attr_name.attr,
Alex Elder589d30e2012-07-10 20:30:11 -05004239 &dev_attr_image_id.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004240 &dev_attr_current_snap.attr,
Mike Christie92a58672016-08-18 18:38:44 +02004241 &dev_attr_snap_id.attr,
Alex Elder86b00e02012-10-25 23:34:42 -05004242 &dev_attr_parent.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004243 &dev_attr_refresh.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004244 NULL
4245};
4246
4247static struct attribute_group rbd_attr_group = {
4248 .attrs = rbd_attrs,
4249};
4250
4251static const struct attribute_group *rbd_attr_groups[] = {
4252 &rbd_attr_group,
4253 NULL
4254};
4255
Ilya Dryomov6cac4692015-10-16 20:11:25 +02004256static void rbd_dev_release(struct device *dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004257
Bhumika Goyalb9942bc2017-02-11 12:14:38 +05304258static const struct device_type rbd_device_type = {
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004259 .name = "rbd",
4260 .groups = rbd_attr_groups,
Ilya Dryomov6cac4692015-10-16 20:11:25 +02004261 .release = rbd_dev_release,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004262};
4263
Alex Elder8b8fb992012-10-26 17:25:24 -05004264static struct rbd_spec *rbd_spec_get(struct rbd_spec *spec)
4265{
4266 kref_get(&spec->kref);
4267
4268 return spec;
4269}
4270
4271static void rbd_spec_free(struct kref *kref);
4272static void rbd_spec_put(struct rbd_spec *spec)
4273{
4274 if (spec)
4275 kref_put(&spec->kref, rbd_spec_free);
4276}
4277
4278static struct rbd_spec *rbd_spec_alloc(void)
4279{
4280 struct rbd_spec *spec;
4281
4282 spec = kzalloc(sizeof (*spec), GFP_KERNEL);
4283 if (!spec)
4284 return NULL;
Ilya Dryomov04077592014-07-23 17:11:20 +04004285
4286 spec->pool_id = CEPH_NOPOOL;
4287 spec->snap_id = CEPH_NOSNAP;
Alex Elder8b8fb992012-10-26 17:25:24 -05004288 kref_init(&spec->kref);
4289
Alex Elder8b8fb992012-10-26 17:25:24 -05004290 return spec;
4291}
4292
4293static void rbd_spec_free(struct kref *kref)
4294{
4295 struct rbd_spec *spec = container_of(kref, struct rbd_spec, kref);
4296
4297 kfree(spec->pool_name);
4298 kfree(spec->image_id);
4299 kfree(spec->image_name);
4300 kfree(spec->snap_name);
4301 kfree(spec);
4302}
4303
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004304static void rbd_dev_free(struct rbd_device *rbd_dev)
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004305{
Ilya Dryomov99d16942016-08-12 16:11:41 +02004306 WARN_ON(rbd_dev->watch_state != RBD_WATCH_STATE_UNREGISTERED);
Ilya Dryomoved95b212016-08-12 16:40:02 +02004307 WARN_ON(rbd_dev->lock_state != RBD_LOCK_STATE_UNLOCKED);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004308
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004309 ceph_oid_destroy(&rbd_dev->header_oid);
Ilya Dryomov6b6dddb2016-08-05 16:15:38 +02004310 ceph_oloc_destroy(&rbd_dev->header_oloc);
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02004311 kfree(rbd_dev->config_info);
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004312
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004313 rbd_put_client(rbd_dev->rbd_client);
4314 rbd_spec_put(rbd_dev->spec);
4315 kfree(rbd_dev->opts);
4316 kfree(rbd_dev);
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004317}
4318
4319static void rbd_dev_release(struct device *dev)
4320{
4321 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4322 bool need_put = !!rbd_dev->opts;
4323
4324 if (need_put) {
4325 destroy_workqueue(rbd_dev->task_wq);
4326 ida_simple_remove(&rbd_dev_id_ida, rbd_dev->dev_id);
4327 }
4328
4329 rbd_dev_free(rbd_dev);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004330
4331 /*
4332 * This is racy, but way better than putting module outside of
4333 * the release callback. The race window is pretty small, so
4334 * doing something similar to dm (dm-builtin.c) is overkill.
4335 */
4336 if (need_put)
4337 module_put(THIS_MODULE);
4338}
4339
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004340static struct rbd_device *__rbd_dev_create(struct rbd_client *rbdc,
4341 struct rbd_spec *spec)
Alex Elderc53d5892012-10-25 23:34:42 -05004342{
4343 struct rbd_device *rbd_dev;
4344
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004345 rbd_dev = kzalloc(sizeof(*rbd_dev), GFP_KERNEL);
Alex Elderc53d5892012-10-25 23:34:42 -05004346 if (!rbd_dev)
4347 return NULL;
4348
4349 spin_lock_init(&rbd_dev->lock);
4350 INIT_LIST_HEAD(&rbd_dev->node);
Alex Elderc53d5892012-10-25 23:34:42 -05004351 init_rwsem(&rbd_dev->header_rwsem);
4352
Ilya Dryomov7e973322017-01-25 18:16:22 +01004353 rbd_dev->header.data_pool_id = CEPH_NOPOOL;
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004354 ceph_oid_init(&rbd_dev->header_oid);
Ilya Dryomov431a02c2017-01-25 18:16:21 +01004355 rbd_dev->header_oloc.pool = spec->pool_id;
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004356
Ilya Dryomov99d16942016-08-12 16:11:41 +02004357 mutex_init(&rbd_dev->watch_mutex);
4358 rbd_dev->watch_state = RBD_WATCH_STATE_UNREGISTERED;
4359 INIT_DELAYED_WORK(&rbd_dev->watch_dwork, rbd_reregister_watch);
4360
Ilya Dryomoved95b212016-08-12 16:40:02 +02004361 init_rwsem(&rbd_dev->lock_rwsem);
4362 rbd_dev->lock_state = RBD_LOCK_STATE_UNLOCKED;
4363 INIT_WORK(&rbd_dev->acquired_lock_work, rbd_notify_acquired_lock);
4364 INIT_WORK(&rbd_dev->released_lock_work, rbd_notify_released_lock);
4365 INIT_DELAYED_WORK(&rbd_dev->lock_dwork, rbd_acquire_lock);
4366 INIT_WORK(&rbd_dev->unlock_work, rbd_release_lock_work);
4367 init_waitqueue_head(&rbd_dev->lock_waitq);
4368
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004369 rbd_dev->dev.bus = &rbd_bus_type;
4370 rbd_dev->dev.type = &rbd_device_type;
4371 rbd_dev->dev.parent = &rbd_root_dev;
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004372 device_initialize(&rbd_dev->dev);
4373
Alex Elderc53d5892012-10-25 23:34:42 -05004374 rbd_dev->rbd_client = rbdc;
Ilya Dryomovd1475432015-06-22 13:24:48 +03004375 rbd_dev->spec = spec;
Alex Elder0903e872012-11-14 12:25:19 -06004376
Alex Elderc53d5892012-10-25 23:34:42 -05004377 return rbd_dev;
4378}
4379
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004380/*
4381 * Create a mapping rbd_dev.
4382 */
4383static struct rbd_device *rbd_dev_create(struct rbd_client *rbdc,
4384 struct rbd_spec *spec,
4385 struct rbd_options *opts)
4386{
4387 struct rbd_device *rbd_dev;
4388
4389 rbd_dev = __rbd_dev_create(rbdc, spec);
4390 if (!rbd_dev)
4391 return NULL;
4392
4393 rbd_dev->opts = opts;
4394
4395 /* get an id and fill in device name */
4396 rbd_dev->dev_id = ida_simple_get(&rbd_dev_id_ida, 0,
4397 minor_to_rbd_dev_id(1 << MINORBITS),
4398 GFP_KERNEL);
4399 if (rbd_dev->dev_id < 0)
4400 goto fail_rbd_dev;
4401
4402 sprintf(rbd_dev->name, RBD_DRV_NAME "%d", rbd_dev->dev_id);
4403 rbd_dev->task_wq = alloc_ordered_workqueue("%s-tasks", WQ_MEM_RECLAIM,
4404 rbd_dev->name);
4405 if (!rbd_dev->task_wq)
4406 goto fail_dev_id;
4407
4408 /* we have a ref from do_rbd_add() */
4409 __module_get(THIS_MODULE);
4410
4411 dout("%s rbd_dev %p dev_id %d\n", __func__, rbd_dev, rbd_dev->dev_id);
4412 return rbd_dev;
4413
4414fail_dev_id:
4415 ida_simple_remove(&rbd_dev_id_ida, rbd_dev->dev_id);
4416fail_rbd_dev:
4417 rbd_dev_free(rbd_dev);
4418 return NULL;
4419}
4420
Alex Elderc53d5892012-10-25 23:34:42 -05004421static void rbd_dev_destroy(struct rbd_device *rbd_dev)
4422{
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004423 if (rbd_dev)
4424 put_device(&rbd_dev->dev);
Alex Elderc53d5892012-10-25 23:34:42 -05004425}
4426
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004427/*
Alex Elder9d475de2012-07-03 16:01:19 -05004428 * Get the size and object order for an image snapshot, or if
4429 * snap_id is CEPH_NOSNAP, gets this information for the base
4430 * image.
4431 */
4432static int _rbd_dev_v2_snap_size(struct rbd_device *rbd_dev, u64 snap_id,
4433 u8 *order, u64 *snap_size)
4434{
4435 __le64 snapid = cpu_to_le64(snap_id);
4436 int ret;
4437 struct {
4438 u8 order;
4439 __le64 size;
4440 } __attribute__ ((packed)) size_buf = { 0 };
4441
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004442 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4443 &rbd_dev->header_oloc, "get_size",
4444 &snapid, sizeof(snapid),
4445 &size_buf, sizeof(size_buf));
Alex Elder36be9a72013-01-19 00:30:28 -06004446 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder9d475de2012-07-03 16:01:19 -05004447 if (ret < 0)
4448 return ret;
Alex Elder57385b52013-04-21 12:14:45 -05004449 if (ret < sizeof (size_buf))
4450 return -ERANGE;
Alex Elder9d475de2012-07-03 16:01:19 -05004451
Josh Durginc3545572013-08-28 17:08:10 -07004452 if (order) {
Alex Elderc86f86e2013-04-25 15:09:41 -05004453 *order = size_buf.order;
Josh Durginc3545572013-08-28 17:08:10 -07004454 dout(" order %u", (unsigned int)*order);
4455 }
Alex Elder9d475de2012-07-03 16:01:19 -05004456 *snap_size = le64_to_cpu(size_buf.size);
4457
Josh Durginc3545572013-08-28 17:08:10 -07004458 dout(" snap_id 0x%016llx snap_size = %llu\n",
4459 (unsigned long long)snap_id,
Alex Elder57385b52013-04-21 12:14:45 -05004460 (unsigned long long)*snap_size);
Alex Elder9d475de2012-07-03 16:01:19 -05004461
4462 return 0;
4463}
4464
4465static int rbd_dev_v2_image_size(struct rbd_device *rbd_dev)
4466{
4467 return _rbd_dev_v2_snap_size(rbd_dev, CEPH_NOSNAP,
4468 &rbd_dev->header.obj_order,
4469 &rbd_dev->header.image_size);
4470}
4471
Alex Elder1e130192012-07-03 16:01:19 -05004472static int rbd_dev_v2_object_prefix(struct rbd_device *rbd_dev)
4473{
4474 void *reply_buf;
4475 int ret;
4476 void *p;
4477
4478 reply_buf = kzalloc(RBD_OBJ_PREFIX_LEN_MAX, GFP_KERNEL);
4479 if (!reply_buf)
4480 return -ENOMEM;
4481
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004482 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4483 &rbd_dev->header_oloc, "get_object_prefix",
4484 NULL, 0, reply_buf, RBD_OBJ_PREFIX_LEN_MAX);
Alex Elder36be9a72013-01-19 00:30:28 -06004485 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder1e130192012-07-03 16:01:19 -05004486 if (ret < 0)
4487 goto out;
4488
4489 p = reply_buf;
4490 rbd_dev->header.object_prefix = ceph_extract_encoded_string(&p,
Alex Elder57385b52013-04-21 12:14:45 -05004491 p + ret, NULL, GFP_NOIO);
4492 ret = 0;
Alex Elder1e130192012-07-03 16:01:19 -05004493
4494 if (IS_ERR(rbd_dev->header.object_prefix)) {
4495 ret = PTR_ERR(rbd_dev->header.object_prefix);
4496 rbd_dev->header.object_prefix = NULL;
4497 } else {
4498 dout(" object_prefix = %s\n", rbd_dev->header.object_prefix);
4499 }
Alex Elder1e130192012-07-03 16:01:19 -05004500out:
4501 kfree(reply_buf);
4502
4503 return ret;
4504}
4505
Alex Elderb1b54022012-07-03 16:01:19 -05004506static int _rbd_dev_v2_snap_features(struct rbd_device *rbd_dev, u64 snap_id,
4507 u64 *snap_features)
4508{
4509 __le64 snapid = cpu_to_le64(snap_id);
4510 struct {
4511 __le64 features;
4512 __le64 incompat;
Alex Elder41579762013-04-21 12:14:45 -05004513 } __attribute__ ((packed)) features_buf = { 0 };
Ilya Dryomovd3767f02016-04-13 14:15:50 +02004514 u64 unsup;
Alex Elderb1b54022012-07-03 16:01:19 -05004515 int ret;
4516
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004517 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4518 &rbd_dev->header_oloc, "get_features",
4519 &snapid, sizeof(snapid),
4520 &features_buf, sizeof(features_buf));
Alex Elder36be9a72013-01-19 00:30:28 -06004521 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elderb1b54022012-07-03 16:01:19 -05004522 if (ret < 0)
4523 return ret;
Alex Elder57385b52013-04-21 12:14:45 -05004524 if (ret < sizeof (features_buf))
4525 return -ERANGE;
Alex Elderd8891402012-10-09 13:50:17 -07004526
Ilya Dryomovd3767f02016-04-13 14:15:50 +02004527 unsup = le64_to_cpu(features_buf.incompat) & ~RBD_FEATURES_SUPPORTED;
4528 if (unsup) {
4529 rbd_warn(rbd_dev, "image uses unsupported features: 0x%llx",
4530 unsup);
Alex Elderb8f5c6e2012-11-01 08:39:26 -05004531 return -ENXIO;
Ilya Dryomovd3767f02016-04-13 14:15:50 +02004532 }
Alex Elderd8891402012-10-09 13:50:17 -07004533
Alex Elderb1b54022012-07-03 16:01:19 -05004534 *snap_features = le64_to_cpu(features_buf.features);
4535
4536 dout(" snap_id 0x%016llx features = 0x%016llx incompat = 0x%016llx\n",
Alex Elder57385b52013-04-21 12:14:45 -05004537 (unsigned long long)snap_id,
4538 (unsigned long long)*snap_features,
4539 (unsigned long long)le64_to_cpu(features_buf.incompat));
Alex Elderb1b54022012-07-03 16:01:19 -05004540
4541 return 0;
4542}
4543
4544static int rbd_dev_v2_features(struct rbd_device *rbd_dev)
4545{
4546 return _rbd_dev_v2_snap_features(rbd_dev, CEPH_NOSNAP,
4547 &rbd_dev->header.features);
4548}
4549
Alex Elder86b00e02012-10-25 23:34:42 -05004550static int rbd_dev_v2_parent_info(struct rbd_device *rbd_dev)
4551{
4552 struct rbd_spec *parent_spec;
4553 size_t size;
4554 void *reply_buf = NULL;
4555 __le64 snapid;
4556 void *p;
4557 void *end;
Alex Elder642a2532013-05-06 17:40:33 -05004558 u64 pool_id;
Alex Elder86b00e02012-10-25 23:34:42 -05004559 char *image_id;
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004560 u64 snap_id;
Alex Elder86b00e02012-10-25 23:34:42 -05004561 u64 overlap;
Alex Elder86b00e02012-10-25 23:34:42 -05004562 int ret;
4563
4564 parent_spec = rbd_spec_alloc();
4565 if (!parent_spec)
4566 return -ENOMEM;
4567
4568 size = sizeof (__le64) + /* pool_id */
4569 sizeof (__le32) + RBD_IMAGE_ID_LEN_MAX + /* image_id */
4570 sizeof (__le64) + /* snap_id */
4571 sizeof (__le64); /* overlap */
4572 reply_buf = kmalloc(size, GFP_KERNEL);
4573 if (!reply_buf) {
4574 ret = -ENOMEM;
4575 goto out_err;
4576 }
4577
Ilya Dryomov4d9b67c2014-07-24 10:42:13 +04004578 snapid = cpu_to_le64(rbd_dev->spec->snap_id);
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004579 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4580 &rbd_dev->header_oloc, "get_parent",
4581 &snapid, sizeof(snapid), reply_buf, size);
Alex Elder36be9a72013-01-19 00:30:28 -06004582 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder86b00e02012-10-25 23:34:42 -05004583 if (ret < 0)
4584 goto out_err;
4585
Alex Elder86b00e02012-10-25 23:34:42 -05004586 p = reply_buf;
Alex Elder57385b52013-04-21 12:14:45 -05004587 end = reply_buf + ret;
4588 ret = -ERANGE;
Alex Elder642a2532013-05-06 17:40:33 -05004589 ceph_decode_64_safe(&p, end, pool_id, out_err);
Alex Elder392a9da2013-05-06 17:40:33 -05004590 if (pool_id == CEPH_NOPOOL) {
4591 /*
4592 * Either the parent never existed, or we have
4593 * record of it but the image got flattened so it no
4594 * longer has a parent. When the parent of a
4595 * layered image disappears we immediately set the
4596 * overlap to 0. The effect of this is that all new
4597 * requests will be treated as if the image had no
4598 * parent.
4599 */
4600 if (rbd_dev->parent_overlap) {
4601 rbd_dev->parent_overlap = 0;
Alex Elder392a9da2013-05-06 17:40:33 -05004602 rbd_dev_parent_put(rbd_dev);
4603 pr_info("%s: clone image has been flattened\n",
4604 rbd_dev->disk->disk_name);
4605 }
4606
Alex Elder86b00e02012-10-25 23:34:42 -05004607 goto out; /* No parent? No problem. */
Alex Elder392a9da2013-05-06 17:40:33 -05004608 }
Alex Elder86b00e02012-10-25 23:34:42 -05004609
Alex Elder0903e872012-11-14 12:25:19 -06004610 /* The ceph file layout needs to fit pool id in 32 bits */
4611
4612 ret = -EIO;
Alex Elder642a2532013-05-06 17:40:33 -05004613 if (pool_id > (u64)U32_MAX) {
Ilya Dryomov9584d502014-07-11 12:11:20 +04004614 rbd_warn(NULL, "parent pool id too large (%llu > %u)",
Alex Elder642a2532013-05-06 17:40:33 -05004615 (unsigned long long)pool_id, U32_MAX);
Alex Elder57385b52013-04-21 12:14:45 -05004616 goto out_err;
Alex Elderc0cd10db2013-04-26 09:43:47 -05004617 }
Alex Elder0903e872012-11-14 12:25:19 -06004618
Alex Elder979ed482012-11-01 08:39:26 -05004619 image_id = ceph_extract_encoded_string(&p, end, NULL, GFP_KERNEL);
Alex Elder86b00e02012-10-25 23:34:42 -05004620 if (IS_ERR(image_id)) {
4621 ret = PTR_ERR(image_id);
4622 goto out_err;
4623 }
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004624 ceph_decode_64_safe(&p, end, snap_id, out_err);
Alex Elder86b00e02012-10-25 23:34:42 -05004625 ceph_decode_64_safe(&p, end, overlap, out_err);
4626
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004627 /*
4628 * The parent won't change (except when the clone is
4629 * flattened, already handled that). So we only need to
4630 * record the parent spec we have not already done so.
4631 */
4632 if (!rbd_dev->parent_spec) {
4633 parent_spec->pool_id = pool_id;
4634 parent_spec->image_id = image_id;
4635 parent_spec->snap_id = snap_id;
Alex Elder70cf49c2013-05-06 17:40:33 -05004636 rbd_dev->parent_spec = parent_spec;
4637 parent_spec = NULL; /* rbd_dev now owns this */
Ilya Dryomovfbba11b2014-06-27 21:46:33 +04004638 } else {
4639 kfree(image_id);
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004640 }
4641
4642 /*
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03004643 * We always update the parent overlap. If it's zero we issue
4644 * a warning, as we will proceed as if there was no parent.
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004645 */
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004646 if (!overlap) {
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004647 if (parent_spec) {
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03004648 /* refresh, careful to warn just once */
4649 if (rbd_dev->parent_overlap)
4650 rbd_warn(rbd_dev,
4651 "clone now standalone (overlap became 0)");
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004652 } else {
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03004653 /* initial probe */
4654 rbd_warn(rbd_dev, "clone is standalone (overlap 0)");
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004655 }
Alex Elder70cf49c2013-05-06 17:40:33 -05004656 }
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03004657 rbd_dev->parent_overlap = overlap;
4658
Alex Elder86b00e02012-10-25 23:34:42 -05004659out:
4660 ret = 0;
4661out_err:
4662 kfree(reply_buf);
4663 rbd_spec_put(parent_spec);
4664
4665 return ret;
4666}
4667
Alex Eldercc070d52013-04-21 12:14:45 -05004668static int rbd_dev_v2_striping_info(struct rbd_device *rbd_dev)
4669{
4670 struct {
4671 __le64 stripe_unit;
4672 __le64 stripe_count;
4673 } __attribute__ ((packed)) striping_info_buf = { 0 };
4674 size_t size = sizeof (striping_info_buf);
4675 void *p;
Alex Eldercc070d52013-04-21 12:14:45 -05004676 int ret;
4677
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004678 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4679 &rbd_dev->header_oloc, "get_stripe_unit_count",
4680 NULL, 0, &striping_info_buf, size);
Alex Eldercc070d52013-04-21 12:14:45 -05004681 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
4682 if (ret < 0)
4683 return ret;
4684 if (ret < size)
4685 return -ERANGE;
4686
Alex Eldercc070d52013-04-21 12:14:45 -05004687 p = &striping_info_buf;
Ilya Dryomovb1331852018-02-07 12:09:12 +01004688 rbd_dev->header.stripe_unit = ceph_decode_64(&p);
4689 rbd_dev->header.stripe_count = ceph_decode_64(&p);
Alex Eldercc070d52013-04-21 12:14:45 -05004690 return 0;
4691}
4692
Ilya Dryomov7e973322017-01-25 18:16:22 +01004693static int rbd_dev_v2_data_pool(struct rbd_device *rbd_dev)
4694{
4695 __le64 data_pool_id;
4696 int ret;
4697
4698 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4699 &rbd_dev->header_oloc, "get_data_pool",
4700 NULL, 0, &data_pool_id, sizeof(data_pool_id));
4701 if (ret < 0)
4702 return ret;
4703 if (ret < sizeof(data_pool_id))
4704 return -EBADMSG;
4705
4706 rbd_dev->header.data_pool_id = le64_to_cpu(data_pool_id);
4707 WARN_ON(rbd_dev->header.data_pool_id == CEPH_NOPOOL);
4708 return 0;
4709}
4710
Alex Elder9e15b772012-10-30 19:40:33 -05004711static char *rbd_dev_image_name(struct rbd_device *rbd_dev)
4712{
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004713 CEPH_DEFINE_OID_ONSTACK(oid);
Alex Elder9e15b772012-10-30 19:40:33 -05004714 size_t image_id_size;
4715 char *image_id;
4716 void *p;
4717 void *end;
4718 size_t size;
4719 void *reply_buf = NULL;
4720 size_t len = 0;
4721 char *image_name = NULL;
4722 int ret;
4723
4724 rbd_assert(!rbd_dev->spec->image_name);
4725
Alex Elder69e7a022012-11-01 08:39:26 -05004726 len = strlen(rbd_dev->spec->image_id);
4727 image_id_size = sizeof (__le32) + len;
Alex Elder9e15b772012-10-30 19:40:33 -05004728 image_id = kmalloc(image_id_size, GFP_KERNEL);
4729 if (!image_id)
4730 return NULL;
4731
4732 p = image_id;
Alex Elder41579762013-04-21 12:14:45 -05004733 end = image_id + image_id_size;
Alex Elder57385b52013-04-21 12:14:45 -05004734 ceph_encode_string(&p, end, rbd_dev->spec->image_id, (u32)len);
Alex Elder9e15b772012-10-30 19:40:33 -05004735
4736 size = sizeof (__le32) + RBD_IMAGE_NAME_LEN_MAX;
4737 reply_buf = kmalloc(size, GFP_KERNEL);
4738 if (!reply_buf)
4739 goto out;
4740
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004741 ceph_oid_printf(&oid, "%s", RBD_DIRECTORY);
4742 ret = rbd_obj_method_sync(rbd_dev, &oid, &rbd_dev->header_oloc,
4743 "dir_get_name", image_id, image_id_size,
4744 reply_buf, size);
Alex Elder9e15b772012-10-30 19:40:33 -05004745 if (ret < 0)
4746 goto out;
4747 p = reply_buf;
Alex Elderf40eb342013-04-25 15:09:42 -05004748 end = reply_buf + ret;
4749
Alex Elder9e15b772012-10-30 19:40:33 -05004750 image_name = ceph_extract_encoded_string(&p, end, &len, GFP_KERNEL);
4751 if (IS_ERR(image_name))
4752 image_name = NULL;
4753 else
4754 dout("%s: name is %s len is %zd\n", __func__, image_name, len);
4755out:
4756 kfree(reply_buf);
4757 kfree(image_id);
4758
4759 return image_name;
4760}
4761
Alex Elder2ad3d712013-04-30 00:44:33 -05004762static u64 rbd_v1_snap_id_by_name(struct rbd_device *rbd_dev, const char *name)
4763{
4764 struct ceph_snap_context *snapc = rbd_dev->header.snapc;
4765 const char *snap_name;
4766 u32 which = 0;
4767
4768 /* Skip over names until we find the one we are looking for */
4769
4770 snap_name = rbd_dev->header.snap_names;
4771 while (which < snapc->num_snaps) {
4772 if (!strcmp(name, snap_name))
4773 return snapc->snaps[which];
4774 snap_name += strlen(snap_name) + 1;
4775 which++;
4776 }
4777 return CEPH_NOSNAP;
4778}
4779
4780static u64 rbd_v2_snap_id_by_name(struct rbd_device *rbd_dev, const char *name)
4781{
4782 struct ceph_snap_context *snapc = rbd_dev->header.snapc;
4783 u32 which;
4784 bool found = false;
4785 u64 snap_id;
4786
4787 for (which = 0; !found && which < snapc->num_snaps; which++) {
4788 const char *snap_name;
4789
4790 snap_id = snapc->snaps[which];
4791 snap_name = rbd_dev_v2_snap_name(rbd_dev, snap_id);
Josh Durginefadc982013-08-29 19:16:42 -07004792 if (IS_ERR(snap_name)) {
4793 /* ignore no-longer existing snapshots */
4794 if (PTR_ERR(snap_name) == -ENOENT)
4795 continue;
4796 else
4797 break;
4798 }
Alex Elder2ad3d712013-04-30 00:44:33 -05004799 found = !strcmp(name, snap_name);
4800 kfree(snap_name);
4801 }
4802 return found ? snap_id : CEPH_NOSNAP;
4803}
4804
4805/*
4806 * Assumes name is never RBD_SNAP_HEAD_NAME; returns CEPH_NOSNAP if
4807 * no snapshot by that name is found, or if an error occurs.
4808 */
4809static u64 rbd_snap_id_by_name(struct rbd_device *rbd_dev, const char *name)
4810{
4811 if (rbd_dev->image_format == 1)
4812 return rbd_v1_snap_id_by_name(rbd_dev, name);
4813
4814 return rbd_v2_snap_id_by_name(rbd_dev, name);
4815}
4816
Alex Elder9e15b772012-10-30 19:40:33 -05004817/*
Ilya Dryomov04077592014-07-23 17:11:20 +04004818 * An image being mapped will have everything but the snap id.
Alex Elder9e15b772012-10-30 19:40:33 -05004819 */
Ilya Dryomov04077592014-07-23 17:11:20 +04004820static int rbd_spec_fill_snap_id(struct rbd_device *rbd_dev)
4821{
4822 struct rbd_spec *spec = rbd_dev->spec;
4823
4824 rbd_assert(spec->pool_id != CEPH_NOPOOL && spec->pool_name);
4825 rbd_assert(spec->image_id && spec->image_name);
4826 rbd_assert(spec->snap_name);
4827
4828 if (strcmp(spec->snap_name, RBD_SNAP_HEAD_NAME)) {
4829 u64 snap_id;
4830
4831 snap_id = rbd_snap_id_by_name(rbd_dev, spec->snap_name);
4832 if (snap_id == CEPH_NOSNAP)
4833 return -ENOENT;
4834
4835 spec->snap_id = snap_id;
4836 } else {
4837 spec->snap_id = CEPH_NOSNAP;
4838 }
4839
4840 return 0;
4841}
4842
4843/*
4844 * A parent image will have all ids but none of the names.
4845 *
4846 * All names in an rbd spec are dynamically allocated. It's OK if we
4847 * can't figure out the name for an image id.
4848 */
4849static int rbd_spec_fill_names(struct rbd_device *rbd_dev)
Alex Elder9e15b772012-10-30 19:40:33 -05004850{
Alex Elder2e9f7f12013-04-26 09:43:48 -05004851 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
4852 struct rbd_spec *spec = rbd_dev->spec;
4853 const char *pool_name;
4854 const char *image_name;
4855 const char *snap_name;
Alex Elder9e15b772012-10-30 19:40:33 -05004856 int ret;
4857
Ilya Dryomov04077592014-07-23 17:11:20 +04004858 rbd_assert(spec->pool_id != CEPH_NOPOOL);
4859 rbd_assert(spec->image_id);
4860 rbd_assert(spec->snap_id != CEPH_NOSNAP);
Alex Elder9e15b772012-10-30 19:40:33 -05004861
Alex Elder2e9f7f12013-04-26 09:43:48 -05004862 /* Get the pool name; we have to make our own copy of this */
Alex Elder9e15b772012-10-30 19:40:33 -05004863
Alex Elder2e9f7f12013-04-26 09:43:48 -05004864 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, spec->pool_id);
4865 if (!pool_name) {
4866 rbd_warn(rbd_dev, "no pool with id %llu", spec->pool_id);
Alex Elder935dc892012-11-01 10:17:15 -05004867 return -EIO;
4868 }
Alex Elder2e9f7f12013-04-26 09:43:48 -05004869 pool_name = kstrdup(pool_name, GFP_KERNEL);
4870 if (!pool_name)
Alex Elder9e15b772012-10-30 19:40:33 -05004871 return -ENOMEM;
4872
4873 /* Fetch the image name; tolerate failure here */
4874
Alex Elder2e9f7f12013-04-26 09:43:48 -05004875 image_name = rbd_dev_image_name(rbd_dev);
4876 if (!image_name)
Alex Elder06ecc6c2012-11-01 10:17:15 -05004877 rbd_warn(rbd_dev, "unable to get image name");
Alex Elder9e15b772012-10-30 19:40:33 -05004878
Ilya Dryomov04077592014-07-23 17:11:20 +04004879 /* Fetch the snapshot name */
Alex Elder9e15b772012-10-30 19:40:33 -05004880
Alex Elder2e9f7f12013-04-26 09:43:48 -05004881 snap_name = rbd_snap_name(rbd_dev, spec->snap_id);
Josh Durginda6a6b62013-09-04 17:57:31 -07004882 if (IS_ERR(snap_name)) {
4883 ret = PTR_ERR(snap_name);
Alex Elder9e15b772012-10-30 19:40:33 -05004884 goto out_err;
Alex Elder2e9f7f12013-04-26 09:43:48 -05004885 }
4886
4887 spec->pool_name = pool_name;
4888 spec->image_name = image_name;
4889 spec->snap_name = snap_name;
Alex Elder9e15b772012-10-30 19:40:33 -05004890
4891 return 0;
Ilya Dryomov04077592014-07-23 17:11:20 +04004892
Alex Elder9e15b772012-10-30 19:40:33 -05004893out_err:
Alex Elder2e9f7f12013-04-26 09:43:48 -05004894 kfree(image_name);
4895 kfree(pool_name);
Alex Elder9e15b772012-10-30 19:40:33 -05004896 return ret;
4897}
4898
Alex Eldercc4a38bd2013-04-30 00:44:33 -05004899static int rbd_dev_v2_snap_context(struct rbd_device *rbd_dev)
Alex Elder35d489f2012-07-03 16:01:19 -05004900{
4901 size_t size;
4902 int ret;
4903 void *reply_buf;
4904 void *p;
4905 void *end;
4906 u64 seq;
4907 u32 snap_count;
4908 struct ceph_snap_context *snapc;
4909 u32 i;
4910
4911 /*
4912 * We'll need room for the seq value (maximum snapshot id),
4913 * snapshot count, and array of that many snapshot ids.
4914 * For now we have a fixed upper limit on the number we're
4915 * prepared to receive.
4916 */
4917 size = sizeof (__le64) + sizeof (__le32) +
4918 RBD_MAX_SNAP_COUNT * sizeof (__le64);
4919 reply_buf = kzalloc(size, GFP_KERNEL);
4920 if (!reply_buf)
4921 return -ENOMEM;
4922
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004923 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4924 &rbd_dev->header_oloc, "get_snapcontext",
4925 NULL, 0, reply_buf, size);
Alex Elder36be9a72013-01-19 00:30:28 -06004926 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder35d489f2012-07-03 16:01:19 -05004927 if (ret < 0)
4928 goto out;
4929
Alex Elder35d489f2012-07-03 16:01:19 -05004930 p = reply_buf;
Alex Elder57385b52013-04-21 12:14:45 -05004931 end = reply_buf + ret;
4932 ret = -ERANGE;
Alex Elder35d489f2012-07-03 16:01:19 -05004933 ceph_decode_64_safe(&p, end, seq, out);
4934 ceph_decode_32_safe(&p, end, snap_count, out);
4935
4936 /*
4937 * Make sure the reported number of snapshot ids wouldn't go
4938 * beyond the end of our buffer. But before checking that,
4939 * make sure the computed size of the snapshot context we
4940 * allocate is representable in a size_t.
4941 */
4942 if (snap_count > (SIZE_MAX - sizeof (struct ceph_snap_context))
4943 / sizeof (u64)) {
4944 ret = -EINVAL;
4945 goto out;
4946 }
4947 if (!ceph_has_room(&p, end, snap_count * sizeof (__le64)))
4948 goto out;
Alex Elder468521c2013-04-26 09:43:47 -05004949 ret = 0;
Alex Elder35d489f2012-07-03 16:01:19 -05004950
Alex Elder812164f82013-04-30 00:44:32 -05004951 snapc = ceph_create_snap_context(snap_count, GFP_KERNEL);
Alex Elder35d489f2012-07-03 16:01:19 -05004952 if (!snapc) {
4953 ret = -ENOMEM;
4954 goto out;
4955 }
Alex Elder35d489f2012-07-03 16:01:19 -05004956 snapc->seq = seq;
Alex Elder35d489f2012-07-03 16:01:19 -05004957 for (i = 0; i < snap_count; i++)
4958 snapc->snaps[i] = ceph_decode_64(&p);
4959
Alex Elder49ece552013-05-06 08:37:00 -05004960 ceph_put_snap_context(rbd_dev->header.snapc);
Alex Elder35d489f2012-07-03 16:01:19 -05004961 rbd_dev->header.snapc = snapc;
4962
4963 dout(" snap context seq = %llu, snap_count = %u\n",
Alex Elder57385b52013-04-21 12:14:45 -05004964 (unsigned long long)seq, (unsigned int)snap_count);
Alex Elder35d489f2012-07-03 16:01:19 -05004965out:
4966 kfree(reply_buf);
4967
Alex Elder57385b52013-04-21 12:14:45 -05004968 return ret;
Alex Elder35d489f2012-07-03 16:01:19 -05004969}
4970
Alex Elder54cac612013-04-30 00:44:33 -05004971static const char *rbd_dev_v2_snap_name(struct rbd_device *rbd_dev,
4972 u64 snap_id)
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004973{
4974 size_t size;
4975 void *reply_buf;
Alex Elder54cac612013-04-30 00:44:33 -05004976 __le64 snapid;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004977 int ret;
4978 void *p;
4979 void *end;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004980 char *snap_name;
4981
4982 size = sizeof (__le32) + RBD_MAX_SNAP_NAME_LEN;
4983 reply_buf = kmalloc(size, GFP_KERNEL);
4984 if (!reply_buf)
4985 return ERR_PTR(-ENOMEM);
4986
Alex Elder54cac612013-04-30 00:44:33 -05004987 snapid = cpu_to_le64(snap_id);
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004988 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4989 &rbd_dev->header_oloc, "get_snapshot_name",
4990 &snapid, sizeof(snapid), reply_buf, size);
Alex Elder36be9a72013-01-19 00:30:28 -06004991 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elderf40eb342013-04-25 15:09:42 -05004992 if (ret < 0) {
4993 snap_name = ERR_PTR(ret);
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004994 goto out;
Alex Elderf40eb342013-04-25 15:09:42 -05004995 }
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004996
4997 p = reply_buf;
Alex Elderf40eb342013-04-25 15:09:42 -05004998 end = reply_buf + ret;
Alex Eldere5c35532012-10-25 23:34:41 -05004999 snap_name = ceph_extract_encoded_string(&p, end, NULL, GFP_KERNEL);
Alex Elderf40eb342013-04-25 15:09:42 -05005000 if (IS_ERR(snap_name))
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005001 goto out;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005002
Alex Elderf40eb342013-04-25 15:09:42 -05005003 dout(" snap_id 0x%016llx snap_name = %s\n",
Alex Elder54cac612013-04-30 00:44:33 -05005004 (unsigned long long)snap_id, snap_name);
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005005out:
5006 kfree(reply_buf);
5007
Alex Elderf40eb342013-04-25 15:09:42 -05005008 return snap_name;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05005009}
5010
Alex Elder2df3fac2013-05-06 09:51:30 -05005011static int rbd_dev_v2_header_info(struct rbd_device *rbd_dev)
Alex Elder117973f2012-08-31 17:29:55 -05005012{
Alex Elder2df3fac2013-05-06 09:51:30 -05005013 bool first_time = rbd_dev->header.object_prefix == NULL;
Alex Elder117973f2012-08-31 17:29:55 -05005014 int ret;
Alex Elder117973f2012-08-31 17:29:55 -05005015
Josh Durgin1617e402013-06-12 14:43:10 -07005016 ret = rbd_dev_v2_image_size(rbd_dev);
5017 if (ret)
Alex Eldercfbf6372013-05-31 17:40:45 -05005018 return ret;
Josh Durgin1617e402013-06-12 14:43:10 -07005019
Alex Elder2df3fac2013-05-06 09:51:30 -05005020 if (first_time) {
5021 ret = rbd_dev_v2_header_onetime(rbd_dev);
5022 if (ret)
Alex Eldercfbf6372013-05-31 17:40:45 -05005023 return ret;
Alex Elder2df3fac2013-05-06 09:51:30 -05005024 }
5025
Alex Eldercc4a38bd2013-04-30 00:44:33 -05005026 ret = rbd_dev_v2_snap_context(rbd_dev);
Ilya Dryomovd194cd12015-08-31 18:22:10 +03005027 if (ret && first_time) {
5028 kfree(rbd_dev->header.object_prefix);
5029 rbd_dev->header.object_prefix = NULL;
5030 }
Alex Elder117973f2012-08-31 17:29:55 -05005031
5032 return ret;
5033}
5034
Ilya Dryomova720ae02014-07-23 17:11:19 +04005035static int rbd_dev_header_info(struct rbd_device *rbd_dev)
5036{
5037 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
5038
5039 if (rbd_dev->image_format == 1)
5040 return rbd_dev_v1_header_info(rbd_dev);
5041
5042 return rbd_dev_v2_header_info(rbd_dev);
5043}
5044
Alex Elder1ddbe942012-01-29 13:57:44 -06005045/*
Alex Eldere28fff262012-02-02 08:13:30 -06005046 * Skips over white space at *buf, and updates *buf to point to the
5047 * first found non-space character (if any). Returns the length of
Alex Elder593a9e72012-02-07 12:03:37 -06005048 * the token (string of non-white space characters) found. Note
5049 * that *buf must be terminated with '\0'.
Alex Eldere28fff262012-02-02 08:13:30 -06005050 */
5051static inline size_t next_token(const char **buf)
5052{
5053 /*
5054 * These are the characters that produce nonzero for
5055 * isspace() in the "C" and "POSIX" locales.
5056 */
5057 const char *spaces = " \f\n\r\t\v";
5058
5059 *buf += strspn(*buf, spaces); /* Find start of token */
5060
5061 return strcspn(*buf, spaces); /* Return token length */
5062}
5063
5064/*
Alex Elderea3352f2012-07-09 21:04:23 -05005065 * Finds the next token in *buf, dynamically allocates a buffer big
5066 * enough to hold a copy of it, and copies the token into the new
5067 * buffer. The copy is guaranteed to be terminated with '\0'. Note
5068 * that a duplicate buffer is created even for a zero-length token.
5069 *
5070 * Returns a pointer to the newly-allocated duplicate, or a null
5071 * pointer if memory for the duplicate was not available. If
5072 * the lenp argument is a non-null pointer, the length of the token
5073 * (not including the '\0') is returned in *lenp.
5074 *
5075 * If successful, the *buf pointer will be updated to point beyond
5076 * the end of the found token.
5077 *
5078 * Note: uses GFP_KERNEL for allocation.
5079 */
5080static inline char *dup_token(const char **buf, size_t *lenp)
5081{
5082 char *dup;
5083 size_t len;
5084
5085 len = next_token(buf);
Alex Elder4caf35f2012-11-01 08:39:27 -05005086 dup = kmemdup(*buf, len + 1, GFP_KERNEL);
Alex Elderea3352f2012-07-09 21:04:23 -05005087 if (!dup)
5088 return NULL;
Alex Elderea3352f2012-07-09 21:04:23 -05005089 *(dup + len) = '\0';
5090 *buf += len;
5091
5092 if (lenp)
5093 *lenp = len;
5094
5095 return dup;
5096}
5097
5098/*
Alex Elder859c31d2012-10-25 23:34:42 -05005099 * Parse the options provided for an "rbd add" (i.e., rbd image
5100 * mapping) request. These arrive via a write to /sys/bus/rbd/add,
5101 * and the data written is passed here via a NUL-terminated buffer.
5102 * Returns 0 if successful or an error code otherwise.
Alex Elderd22f76e2012-07-12 10:46:35 -05005103 *
Alex Elder859c31d2012-10-25 23:34:42 -05005104 * The information extracted from these options is recorded in
5105 * the other parameters which return dynamically-allocated
5106 * structures:
5107 * ceph_opts
5108 * The address of a pointer that will refer to a ceph options
5109 * structure. Caller must release the returned pointer using
5110 * ceph_destroy_options() when it is no longer needed.
5111 * rbd_opts
5112 * Address of an rbd options pointer. Fully initialized by
5113 * this function; caller must release with kfree().
5114 * spec
5115 * Address of an rbd image specification pointer. Fully
5116 * initialized by this function based on parsed options.
5117 * Caller must release with rbd_spec_put().
5118 *
5119 * The options passed take this form:
5120 * <mon_addrs> <options> <pool_name> <image_name> [<snap_id>]
5121 * where:
5122 * <mon_addrs>
5123 * A comma-separated list of one or more monitor addresses.
5124 * A monitor address is an ip address, optionally followed
5125 * by a port number (separated by a colon).
5126 * I.e.: ip1[:port1][,ip2[:port2]...]
5127 * <options>
5128 * A comma-separated list of ceph and/or rbd options.
5129 * <pool_name>
5130 * The name of the rados pool containing the rbd image.
5131 * <image_name>
5132 * The name of the image in that pool to map.
5133 * <snap_id>
5134 * An optional snapshot id. If provided, the mapping will
5135 * present data from the image at the time that snapshot was
5136 * created. The image head is used if no snapshot id is
5137 * provided. Snapshot mappings are always read-only.
Alex Eldera725f65e2012-02-02 08:13:30 -06005138 */
Alex Elder859c31d2012-10-25 23:34:42 -05005139static int rbd_add_parse_args(const char *buf,
Alex Elderdc79b112012-10-25 23:34:41 -05005140 struct ceph_options **ceph_opts,
Alex Elder859c31d2012-10-25 23:34:42 -05005141 struct rbd_options **opts,
5142 struct rbd_spec **rbd_spec)
Alex Eldera725f65e2012-02-02 08:13:30 -06005143{
Alex Elderd22f76e2012-07-12 10:46:35 -05005144 size_t len;
Alex Elder859c31d2012-10-25 23:34:42 -05005145 char *options;
Alex Elder0ddebc02012-10-25 23:34:41 -05005146 const char *mon_addrs;
Alex Elderecb4dc22013-04-26 09:43:47 -05005147 char *snap_name;
Alex Elder0ddebc02012-10-25 23:34:41 -05005148 size_t mon_addrs_size;
Alex Elder859c31d2012-10-25 23:34:42 -05005149 struct rbd_spec *spec = NULL;
Alex Elder4e9afeb2012-10-25 23:34:41 -05005150 struct rbd_options *rbd_opts = NULL;
Alex Elder859c31d2012-10-25 23:34:42 -05005151 struct ceph_options *copts;
Alex Elderdc79b112012-10-25 23:34:41 -05005152 int ret;
Alex Eldere28fff262012-02-02 08:13:30 -06005153
5154 /* The first four tokens are required */
5155
Alex Elder7ef32142012-02-02 08:13:30 -06005156 len = next_token(&buf);
Alex Elder4fb5d6712012-11-01 10:17:15 -05005157 if (!len) {
5158 rbd_warn(NULL, "no monitor address(es) provided");
5159 return -EINVAL;
5160 }
Alex Elder0ddebc02012-10-25 23:34:41 -05005161 mon_addrs = buf;
Alex Elderf28e5652012-10-25 23:34:41 -05005162 mon_addrs_size = len + 1;
Alex Elder7ef32142012-02-02 08:13:30 -06005163 buf += len;
Alex Eldera725f65e2012-02-02 08:13:30 -06005164
Alex Elderdc79b112012-10-25 23:34:41 -05005165 ret = -EINVAL;
Alex Elderf28e5652012-10-25 23:34:41 -05005166 options = dup_token(&buf, NULL);
5167 if (!options)
Alex Elderdc79b112012-10-25 23:34:41 -05005168 return -ENOMEM;
Alex Elder4fb5d6712012-11-01 10:17:15 -05005169 if (!*options) {
5170 rbd_warn(NULL, "no options provided");
5171 goto out_err;
5172 }
Alex Eldera725f65e2012-02-02 08:13:30 -06005173
Alex Elder859c31d2012-10-25 23:34:42 -05005174 spec = rbd_spec_alloc();
5175 if (!spec)
Alex Elderf28e5652012-10-25 23:34:41 -05005176 goto out_mem;
Alex Elder859c31d2012-10-25 23:34:42 -05005177
5178 spec->pool_name = dup_token(&buf, NULL);
5179 if (!spec->pool_name)
5180 goto out_mem;
Alex Elder4fb5d6712012-11-01 10:17:15 -05005181 if (!*spec->pool_name) {
5182 rbd_warn(NULL, "no pool name provided");
5183 goto out_err;
5184 }
Alex Eldere28fff262012-02-02 08:13:30 -06005185
Alex Elder69e7a022012-11-01 08:39:26 -05005186 spec->image_name = dup_token(&buf, NULL);
Alex Elder859c31d2012-10-25 23:34:42 -05005187 if (!spec->image_name)
Alex Elderf28e5652012-10-25 23:34:41 -05005188 goto out_mem;
Alex Elder4fb5d6712012-11-01 10:17:15 -05005189 if (!*spec->image_name) {
5190 rbd_warn(NULL, "no image name provided");
5191 goto out_err;
5192 }
Alex Eldere28fff262012-02-02 08:13:30 -06005193
Alex Elderf28e5652012-10-25 23:34:41 -05005194 /*
5195 * Snapshot name is optional; default is to use "-"
5196 * (indicating the head/no snapshot).
5197 */
Alex Elder3feeb8942012-08-31 17:29:52 -05005198 len = next_token(&buf);
Alex Elder820a5f32012-07-09 21:04:24 -05005199 if (!len) {
Alex Elder3feeb8942012-08-31 17:29:52 -05005200 buf = RBD_SNAP_HEAD_NAME; /* No snapshot supplied */
5201 len = sizeof (RBD_SNAP_HEAD_NAME) - 1;
Alex Elderf28e5652012-10-25 23:34:41 -05005202 } else if (len > RBD_MAX_SNAP_NAME_LEN) {
Alex Elderdc79b112012-10-25 23:34:41 -05005203 ret = -ENAMETOOLONG;
Alex Elderf28e5652012-10-25 23:34:41 -05005204 goto out_err;
Alex Elder849b4262012-07-09 21:04:24 -05005205 }
Alex Elderecb4dc22013-04-26 09:43:47 -05005206 snap_name = kmemdup(buf, len + 1, GFP_KERNEL);
5207 if (!snap_name)
Alex Elderf28e5652012-10-25 23:34:41 -05005208 goto out_mem;
Alex Elderecb4dc22013-04-26 09:43:47 -05005209 *(snap_name + len) = '\0';
5210 spec->snap_name = snap_name;
Alex Eldere5c35532012-10-25 23:34:41 -05005211
Alex Elder0ddebc02012-10-25 23:34:41 -05005212 /* Initialize all rbd options to the defaults */
Alex Eldere28fff262012-02-02 08:13:30 -06005213
Alex Elder4e9afeb2012-10-25 23:34:41 -05005214 rbd_opts = kzalloc(sizeof (*rbd_opts), GFP_KERNEL);
5215 if (!rbd_opts)
5216 goto out_mem;
5217
5218 rbd_opts->read_only = RBD_READ_ONLY_DEFAULT;
Ilya Dryomovb5584182015-06-23 16:21:19 +03005219 rbd_opts->queue_depth = RBD_QUEUE_DEPTH_DEFAULT;
Dongsheng Yang34f55d02018-03-26 10:22:55 -04005220 rbd_opts->lock_timeout = RBD_LOCK_TIMEOUT_DEFAULT;
Ilya Dryomov80de1912016-09-20 14:23:17 +02005221 rbd_opts->lock_on_read = RBD_LOCK_ON_READ_DEFAULT;
Ilya Dryomove010dd02017-04-13 12:17:39 +02005222 rbd_opts->exclusive = RBD_EXCLUSIVE_DEFAULT;
Ilya Dryomovd9360542018-03-23 06:14:47 +01005223 rbd_opts->trim = RBD_TRIM_DEFAULT;
Alex Elderd22f76e2012-07-12 10:46:35 -05005224
Alex Elder859c31d2012-10-25 23:34:42 -05005225 copts = ceph_parse_options(options, mon_addrs,
Alex Elder0ddebc02012-10-25 23:34:41 -05005226 mon_addrs + mon_addrs_size - 1,
Alex Elder4e9afeb2012-10-25 23:34:41 -05005227 parse_rbd_opts_token, rbd_opts);
Alex Elder859c31d2012-10-25 23:34:42 -05005228 if (IS_ERR(copts)) {
5229 ret = PTR_ERR(copts);
Alex Elderdc79b112012-10-25 23:34:41 -05005230 goto out_err;
5231 }
Alex Elder859c31d2012-10-25 23:34:42 -05005232 kfree(options);
5233
5234 *ceph_opts = copts;
Alex Elder4e9afeb2012-10-25 23:34:41 -05005235 *opts = rbd_opts;
Alex Elder859c31d2012-10-25 23:34:42 -05005236 *rbd_spec = spec;
Alex Elder0ddebc02012-10-25 23:34:41 -05005237
Alex Elderdc79b112012-10-25 23:34:41 -05005238 return 0;
Alex Elderf28e5652012-10-25 23:34:41 -05005239out_mem:
Alex Elderdc79b112012-10-25 23:34:41 -05005240 ret = -ENOMEM;
Alex Elderd22f76e2012-07-12 10:46:35 -05005241out_err:
Alex Elder859c31d2012-10-25 23:34:42 -05005242 kfree(rbd_opts);
5243 rbd_spec_put(spec);
Alex Elderf28e5652012-10-25 23:34:41 -05005244 kfree(options);
Alex Elderd22f76e2012-07-12 10:46:35 -05005245
Alex Elderdc79b112012-10-25 23:34:41 -05005246 return ret;
Alex Eldera725f65e2012-02-02 08:13:30 -06005247}
5248
Ilya Dryomove010dd02017-04-13 12:17:39 +02005249static void rbd_dev_image_unlock(struct rbd_device *rbd_dev)
5250{
5251 down_write(&rbd_dev->lock_rwsem);
5252 if (__rbd_is_lock_owner(rbd_dev))
5253 rbd_unlock(rbd_dev);
5254 up_write(&rbd_dev->lock_rwsem);
5255}
5256
5257static int rbd_add_acquire_lock(struct rbd_device *rbd_dev)
5258{
Ilya Dryomov2f18d462018-04-04 10:15:38 +02005259 int ret;
5260
Ilya Dryomove010dd02017-04-13 12:17:39 +02005261 if (!(rbd_dev->header.features & RBD_FEATURE_EXCLUSIVE_LOCK)) {
5262 rbd_warn(rbd_dev, "exclusive-lock feature is not enabled");
5263 return -EINVAL;
5264 }
5265
5266 /* FIXME: "rbd map --exclusive" should be in interruptible */
5267 down_read(&rbd_dev->lock_rwsem);
Ilya Dryomov2f18d462018-04-04 10:15:38 +02005268 ret = rbd_wait_state_locked(rbd_dev, true);
Ilya Dryomove010dd02017-04-13 12:17:39 +02005269 up_read(&rbd_dev->lock_rwsem);
Ilya Dryomov2f18d462018-04-04 10:15:38 +02005270 if (ret) {
Ilya Dryomove010dd02017-04-13 12:17:39 +02005271 rbd_warn(rbd_dev, "failed to acquire exclusive lock");
5272 return -EROFS;
5273 }
5274
5275 return 0;
5276}
5277
Ilya Dryomov30ba1f02014-05-13 11:19:27 +04005278/*
Alex Elder589d30e2012-07-10 20:30:11 -05005279 * An rbd format 2 image has a unique identifier, distinct from the
5280 * name given to it by the user. Internally, that identifier is
5281 * what's used to specify the names of objects related to the image.
5282 *
5283 * A special "rbd id" object is used to map an rbd image name to its
5284 * id. If that object doesn't exist, then there is no v2 rbd image
5285 * with the supplied name.
5286 *
5287 * This function will record the given rbd_dev's image_id field if
5288 * it can be determined, and in that case will return 0. If any
5289 * errors occur a negative errno will be returned and the rbd_dev's
5290 * image_id field will be unchanged (and should be NULL).
5291 */
5292static int rbd_dev_image_id(struct rbd_device *rbd_dev)
5293{
5294 int ret;
5295 size_t size;
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005296 CEPH_DEFINE_OID_ONSTACK(oid);
Alex Elder589d30e2012-07-10 20:30:11 -05005297 void *response;
Alex Elderc0fba362013-04-25 23:15:08 -05005298 char *image_id;
Alex Elder2f82ee52012-10-30 19:40:33 -05005299
Alex Elder589d30e2012-07-10 20:30:11 -05005300 /*
Alex Elder2c0d0a12012-10-30 19:40:33 -05005301 * When probing a parent image, the image id is already
5302 * known (and the image name likely is not). There's no
Alex Elderc0fba362013-04-25 23:15:08 -05005303 * need to fetch the image id again in this case. We
5304 * do still need to set the image format though.
Alex Elder2c0d0a12012-10-30 19:40:33 -05005305 */
Alex Elderc0fba362013-04-25 23:15:08 -05005306 if (rbd_dev->spec->image_id) {
5307 rbd_dev->image_format = *rbd_dev->spec->image_id ? 2 : 1;
5308
Alex Elder2c0d0a12012-10-30 19:40:33 -05005309 return 0;
Alex Elderc0fba362013-04-25 23:15:08 -05005310 }
Alex Elder2c0d0a12012-10-30 19:40:33 -05005311
5312 /*
Alex Elder589d30e2012-07-10 20:30:11 -05005313 * First, see if the format 2 image id file exists, and if
5314 * so, get the image's persistent id from it.
5315 */
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005316 ret = ceph_oid_aprintf(&oid, GFP_KERNEL, "%s%s", RBD_ID_PREFIX,
5317 rbd_dev->spec->image_name);
5318 if (ret)
5319 return ret;
5320
5321 dout("rbd id object name is %s\n", oid.name);
Alex Elder589d30e2012-07-10 20:30:11 -05005322
5323 /* Response will be an encoded string, which includes a length */
5324
5325 size = sizeof (__le32) + RBD_IMAGE_ID_LEN_MAX;
5326 response = kzalloc(size, GFP_NOIO);
5327 if (!response) {
5328 ret = -ENOMEM;
5329 goto out;
5330 }
5331
Alex Elderc0fba362013-04-25 23:15:08 -05005332 /* If it doesn't exist we'll assume it's a format 1 image */
5333
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005334 ret = rbd_obj_method_sync(rbd_dev, &oid, &rbd_dev->header_oloc,
5335 "get_id", NULL, 0,
5336 response, RBD_IMAGE_ID_LEN_MAX);
Alex Elder36be9a72013-01-19 00:30:28 -06005337 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elderc0fba362013-04-25 23:15:08 -05005338 if (ret == -ENOENT) {
5339 image_id = kstrdup("", GFP_KERNEL);
5340 ret = image_id ? 0 : -ENOMEM;
5341 if (!ret)
5342 rbd_dev->image_format = 1;
Ilya Dryomov7dd440c2014-09-11 18:49:18 +04005343 } else if (ret >= 0) {
Alex Elderc0fba362013-04-25 23:15:08 -05005344 void *p = response;
Alex Elder589d30e2012-07-10 20:30:11 -05005345
Alex Elderc0fba362013-04-25 23:15:08 -05005346 image_id = ceph_extract_encoded_string(&p, p + ret,
Alex Elder979ed482012-11-01 08:39:26 -05005347 NULL, GFP_NOIO);
Duan Jiong461f7582014-04-11 16:38:12 +08005348 ret = PTR_ERR_OR_ZERO(image_id);
Alex Elderc0fba362013-04-25 23:15:08 -05005349 if (!ret)
5350 rbd_dev->image_format = 2;
Alex Elderc0fba362013-04-25 23:15:08 -05005351 }
5352
5353 if (!ret) {
5354 rbd_dev->spec->image_id = image_id;
5355 dout("image_id is %s\n", image_id);
Alex Elder589d30e2012-07-10 20:30:11 -05005356 }
5357out:
5358 kfree(response);
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005359 ceph_oid_destroy(&oid);
Alex Elder589d30e2012-07-10 20:30:11 -05005360 return ret;
5361}
5362
Alex Elder3abef3b2013-05-13 20:35:37 -05005363/*
5364 * Undo whatever state changes are made by v1 or v2 header info
5365 * call.
5366 */
Alex Elder6fd48b32013-04-28 23:32:34 -05005367static void rbd_dev_unprobe(struct rbd_device *rbd_dev)
5368{
5369 struct rbd_image_header *header;
5370
Ilya Dryomove69b8d42015-01-19 12:06:14 +03005371 rbd_dev_parent_put(rbd_dev);
Alex Elder6fd48b32013-04-28 23:32:34 -05005372
5373 /* Free dynamic fields from the header, then zero it out */
5374
5375 header = &rbd_dev->header;
Alex Elder812164f82013-04-30 00:44:32 -05005376 ceph_put_snap_context(header->snapc);
Alex Elder6fd48b32013-04-28 23:32:34 -05005377 kfree(header->snap_sizes);
5378 kfree(header->snap_names);
5379 kfree(header->object_prefix);
5380 memset(header, 0, sizeof (*header));
5381}
5382
Alex Elder2df3fac2013-05-06 09:51:30 -05005383static int rbd_dev_v2_header_onetime(struct rbd_device *rbd_dev)
Alex Eldera30b71b2012-07-10 20:30:11 -05005384{
5385 int ret;
Alex Eldera30b71b2012-07-10 20:30:11 -05005386
Alex Elder1e130192012-07-03 16:01:19 -05005387 ret = rbd_dev_v2_object_prefix(rbd_dev);
Alex Elder57385b52013-04-21 12:14:45 -05005388 if (ret)
Alex Elder1e130192012-07-03 16:01:19 -05005389 goto out_err;
Alex Elderb1b54022012-07-03 16:01:19 -05005390
Alex Elder2df3fac2013-05-06 09:51:30 -05005391 /*
5392 * Get the and check features for the image. Currently the
5393 * features are assumed to never change.
5394 */
Alex Elderb1b54022012-07-03 16:01:19 -05005395 ret = rbd_dev_v2_features(rbd_dev);
Alex Elder57385b52013-04-21 12:14:45 -05005396 if (ret)
Alex Elderb1b54022012-07-03 16:01:19 -05005397 goto out_err;
Alex Elder35d489f2012-07-03 16:01:19 -05005398
Alex Eldercc070d52013-04-21 12:14:45 -05005399 /* If the image supports fancy striping, get its parameters */
5400
5401 if (rbd_dev->header.features & RBD_FEATURE_STRIPINGV2) {
5402 ret = rbd_dev_v2_striping_info(rbd_dev);
5403 if (ret < 0)
5404 goto out_err;
5405 }
Alex Eldera30b71b2012-07-10 20:30:11 -05005406
Ilya Dryomov7e973322017-01-25 18:16:22 +01005407 if (rbd_dev->header.features & RBD_FEATURE_DATA_POOL) {
5408 ret = rbd_dev_v2_data_pool(rbd_dev);
5409 if (ret)
5410 goto out_err;
5411 }
5412
Ilya Dryomov263423f2017-01-25 18:16:22 +01005413 rbd_init_layout(rbd_dev);
Alex Elder35152972012-08-31 17:29:55 -05005414 return 0;
Ilya Dryomov263423f2017-01-25 18:16:22 +01005415
Alex Elder9d475de2012-07-03 16:01:19 -05005416out_err:
Alex Elder642a2532013-05-06 17:40:33 -05005417 rbd_dev->header.features = 0;
Alex Elder1e130192012-07-03 16:01:19 -05005418 kfree(rbd_dev->header.object_prefix);
5419 rbd_dev->header.object_prefix = NULL;
Alex Elder9d475de2012-07-03 16:01:19 -05005420 return ret;
Alex Eldera30b71b2012-07-10 20:30:11 -05005421}
5422
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005423/*
5424 * @depth is rbd_dev_image_probe() -> rbd_dev_probe_parent() ->
5425 * rbd_dev_image_probe() recursion depth, which means it's also the
5426 * length of the already discovered part of the parent chain.
5427 */
5428static int rbd_dev_probe_parent(struct rbd_device *rbd_dev, int depth)
Alex Elder83a06262012-10-30 15:47:17 -05005429{
Alex Elder2f82ee52012-10-30 19:40:33 -05005430 struct rbd_device *parent = NULL;
Alex Elder124afba2013-04-26 15:44:36 -05005431 int ret;
5432
5433 if (!rbd_dev->parent_spec)
5434 return 0;
Alex Elder124afba2013-04-26 15:44:36 -05005435
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005436 if (++depth > RBD_MAX_PARENT_CHAIN_LEN) {
5437 pr_info("parent chain is too long (%d)\n", depth);
5438 ret = -EINVAL;
5439 goto out_err;
5440 }
5441
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02005442 parent = __rbd_dev_create(rbd_dev->rbd_client, rbd_dev->parent_spec);
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005443 if (!parent) {
5444 ret = -ENOMEM;
Alex Elder124afba2013-04-26 15:44:36 -05005445 goto out_err;
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005446 }
5447
5448 /*
5449 * Images related by parent/child relationships always share
5450 * rbd_client and spec/parent_spec, so bump their refcounts.
5451 */
5452 __rbd_get_client(rbd_dev->rbd_client);
5453 rbd_spec_get(rbd_dev->parent_spec);
Alex Elder124afba2013-04-26 15:44:36 -05005454
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005455 ret = rbd_dev_image_probe(parent, depth);
Alex Elder124afba2013-04-26 15:44:36 -05005456 if (ret < 0)
5457 goto out_err;
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005458
Alex Elder124afba2013-04-26 15:44:36 -05005459 rbd_dev->parent = parent;
Alex Eldera2acd002013-05-08 22:50:04 -05005460 atomic_set(&rbd_dev->parent_ref, 1);
Alex Elder124afba2013-04-26 15:44:36 -05005461 return 0;
Alex Elder124afba2013-04-26 15:44:36 -05005462
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005463out_err:
5464 rbd_dev_unparent(rbd_dev);
Markus Elfring1761b222015-11-23 20:16:45 +01005465 rbd_dev_destroy(parent);
Alex Elder124afba2013-04-26 15:44:36 -05005466 return ret;
5467}
5468
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005469static void rbd_dev_device_release(struct rbd_device *rbd_dev)
5470{
5471 clear_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags);
5472 rbd_dev_mapping_clear(rbd_dev);
5473 rbd_free_disk(rbd_dev);
5474 if (!single_major)
5475 unregister_blkdev(rbd_dev->major, rbd_dev->name);
5476}
5477
Ilya Dryomov811c6682016-04-15 16:22:16 +02005478/*
5479 * rbd_dev->header_rwsem must be locked for write and will be unlocked
5480 * upon return.
5481 */
Alex Elder200a6a82013-04-28 23:32:34 -05005482static int rbd_dev_device_setup(struct rbd_device *rbd_dev)
Alex Elder124afba2013-04-26 15:44:36 -05005483{
Alex Elder83a06262012-10-30 15:47:17 -05005484 int ret;
Alex Elder83a06262012-10-30 15:47:17 -05005485
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005486 /* Record our major and minor device numbers. */
Alex Elder83a06262012-10-30 15:47:17 -05005487
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005488 if (!single_major) {
5489 ret = register_blkdev(0, rbd_dev->name);
5490 if (ret < 0)
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02005491 goto err_out_unlock;
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005492
5493 rbd_dev->major = ret;
5494 rbd_dev->minor = 0;
5495 } else {
5496 rbd_dev->major = rbd_major;
5497 rbd_dev->minor = rbd_dev_id_to_minor(rbd_dev->dev_id);
5498 }
Alex Elder83a06262012-10-30 15:47:17 -05005499
5500 /* Set up the blkdev mapping. */
5501
5502 ret = rbd_init_disk(rbd_dev);
5503 if (ret)
5504 goto err_out_blkdev;
5505
Alex Elderf35a4de2013-05-06 09:51:29 -05005506 ret = rbd_dev_mapping_set(rbd_dev);
Alex Elder83a06262012-10-30 15:47:17 -05005507 if (ret)
5508 goto err_out_disk;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04005509
Alex Elderf35a4de2013-05-06 09:51:29 -05005510 set_capacity(rbd_dev->disk, rbd_dev->mapping.size / SECTOR_SIZE);
Ilya Dryomov9568c932017-10-12 12:35:19 +02005511 set_disk_ro(rbd_dev->disk, rbd_dev->opts->read_only);
Alex Elderf35a4de2013-05-06 09:51:29 -05005512
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005513 ret = dev_set_name(&rbd_dev->dev, "%d", rbd_dev->dev_id);
Alex Elderf35a4de2013-05-06 09:51:29 -05005514 if (ret)
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005515 goto err_out_mapping;
Alex Elder83a06262012-10-30 15:47:17 -05005516
Alex Elder129b79d2013-04-26 15:44:36 -05005517 set_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags);
Ilya Dryomov811c6682016-04-15 16:22:16 +02005518 up_write(&rbd_dev->header_rwsem);
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005519 return 0;
Alex Elder2f82ee52012-10-30 19:40:33 -05005520
Alex Elderf35a4de2013-05-06 09:51:29 -05005521err_out_mapping:
5522 rbd_dev_mapping_clear(rbd_dev);
Alex Elder83a06262012-10-30 15:47:17 -05005523err_out_disk:
5524 rbd_free_disk(rbd_dev);
5525err_out_blkdev:
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005526 if (!single_major)
5527 unregister_blkdev(rbd_dev->major, rbd_dev->name);
Ilya Dryomov811c6682016-04-15 16:22:16 +02005528err_out_unlock:
5529 up_write(&rbd_dev->header_rwsem);
Alex Elder83a06262012-10-30 15:47:17 -05005530 return ret;
5531}
5532
Alex Elder332bb122013-04-27 09:59:30 -05005533static int rbd_dev_header_name(struct rbd_device *rbd_dev)
5534{
5535 struct rbd_spec *spec = rbd_dev->spec;
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005536 int ret;
Alex Elder332bb122013-04-27 09:59:30 -05005537
5538 /* Record the header object name for this rbd image. */
5539
5540 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
Alex Elder332bb122013-04-27 09:59:30 -05005541 if (rbd_dev->image_format == 1)
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005542 ret = ceph_oid_aprintf(&rbd_dev->header_oid, GFP_KERNEL, "%s%s",
5543 spec->image_name, RBD_SUFFIX);
Alex Elder332bb122013-04-27 09:59:30 -05005544 else
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005545 ret = ceph_oid_aprintf(&rbd_dev->header_oid, GFP_KERNEL, "%s%s",
5546 RBD_HEADER_PREFIX, spec->image_id);
Alex Elder332bb122013-04-27 09:59:30 -05005547
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005548 return ret;
Alex Elder332bb122013-04-27 09:59:30 -05005549}
5550
Alex Elder200a6a82013-04-28 23:32:34 -05005551static void rbd_dev_image_release(struct rbd_device *rbd_dev)
5552{
Alex Elder6fd48b32013-04-28 23:32:34 -05005553 rbd_dev_unprobe(rbd_dev);
Ilya Dryomovfd22aef2017-04-13 12:17:37 +02005554 if (rbd_dev->opts)
5555 rbd_unregister_watch(rbd_dev);
Alex Elder6fd48b32013-04-28 23:32:34 -05005556 rbd_dev->image_format = 0;
5557 kfree(rbd_dev->spec->image_id);
5558 rbd_dev->spec->image_id = NULL;
Alex Elder200a6a82013-04-28 23:32:34 -05005559}
5560
Alex Eldera30b71b2012-07-10 20:30:11 -05005561/*
5562 * Probe for the existence of the header object for the given rbd
Alex Elder1f3ef782013-05-06 17:40:33 -05005563 * device. If this image is the one being mapped (i.e., not a
5564 * parent), initiate a watch on its header object before using that
5565 * object to get detailed information about the rbd image.
Alex Eldera30b71b2012-07-10 20:30:11 -05005566 */
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005567static int rbd_dev_image_probe(struct rbd_device *rbd_dev, int depth)
Alex Eldera30b71b2012-07-10 20:30:11 -05005568{
5569 int ret;
5570
5571 /*
Alex Elder3abef3b2013-05-13 20:35:37 -05005572 * Get the id from the image id object. Unless there's an
5573 * error, rbd_dev->spec->image_id will be filled in with
5574 * a dynamically-allocated string, and rbd_dev->image_format
5575 * will be set to either 1 or 2.
Alex Eldera30b71b2012-07-10 20:30:11 -05005576 */
5577 ret = rbd_dev_image_id(rbd_dev);
5578 if (ret)
Alex Elderc0fba362013-04-25 23:15:08 -05005579 return ret;
Alex Elderc0fba362013-04-25 23:15:08 -05005580
Alex Elder332bb122013-04-27 09:59:30 -05005581 ret = rbd_dev_header_name(rbd_dev);
5582 if (ret)
5583 goto err_out_format;
5584
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005585 if (!depth) {
Ilya Dryomov99d16942016-08-12 16:11:41 +02005586 ret = rbd_register_watch(rbd_dev);
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005587 if (ret) {
5588 if (ret == -ENOENT)
5589 pr_info("image %s/%s does not exist\n",
5590 rbd_dev->spec->pool_name,
5591 rbd_dev->spec->image_name);
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005592 goto err_out_format;
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005593 }
Alex Elder1f3ef782013-05-06 17:40:33 -05005594 }
Alex Elderb644de22013-04-27 09:59:31 -05005595
Ilya Dryomova720ae02014-07-23 17:11:19 +04005596 ret = rbd_dev_header_info(rbd_dev);
Alex Elder5655c4d2013-04-25 23:15:08 -05005597 if (ret)
Alex Elderb644de22013-04-27 09:59:31 -05005598 goto err_out_watch;
Alex Elder83a06262012-10-30 15:47:17 -05005599
Ilya Dryomov04077592014-07-23 17:11:20 +04005600 /*
5601 * If this image is the one being mapped, we have pool name and
5602 * id, image name and id, and snap name - need to fill snap id.
5603 * Otherwise this is a parent image, identified by pool, image
5604 * and snap ids - need to fill in names for those ids.
5605 */
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005606 if (!depth)
Ilya Dryomov04077592014-07-23 17:11:20 +04005607 ret = rbd_spec_fill_snap_id(rbd_dev);
5608 else
5609 ret = rbd_spec_fill_names(rbd_dev);
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005610 if (ret) {
5611 if (ret == -ENOENT)
5612 pr_info("snap %s/%s@%s does not exist\n",
5613 rbd_dev->spec->pool_name,
5614 rbd_dev->spec->image_name,
5615 rbd_dev->spec->snap_name);
Alex Elder33dca392013-04-30 00:44:33 -05005616 goto err_out_probe;
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005617 }
Alex Elder9bb81c92013-04-27 09:59:30 -05005618
Ilya Dryomove8f59b52014-07-24 10:42:13 +04005619 if (rbd_dev->header.features & RBD_FEATURE_LAYERING) {
5620 ret = rbd_dev_v2_parent_info(rbd_dev);
5621 if (ret)
5622 goto err_out_probe;
5623
5624 /*
5625 * Need to warn users if this image is the one being
5626 * mapped and has a parent.
5627 */
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005628 if (!depth && rbd_dev->parent_spec)
Ilya Dryomove8f59b52014-07-24 10:42:13 +04005629 rbd_warn(rbd_dev,
5630 "WARNING: kernel layering is EXPERIMENTAL!");
5631 }
5632
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005633 ret = rbd_dev_probe_parent(rbd_dev, depth);
Alex Elder30d60ba2013-05-06 09:51:30 -05005634 if (ret)
5635 goto err_out_probe;
Alex Elder83a06262012-10-30 15:47:17 -05005636
Alex Elder30d60ba2013-05-06 09:51:30 -05005637 dout("discovered format %u image, header name is %s\n",
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005638 rbd_dev->image_format, rbd_dev->header_oid.name);
Alex Elder30d60ba2013-05-06 09:51:30 -05005639 return 0;
Ilya Dryomove8f59b52014-07-24 10:42:13 +04005640
Alex Elder6fd48b32013-04-28 23:32:34 -05005641err_out_probe:
5642 rbd_dev_unprobe(rbd_dev);
Alex Elderb644de22013-04-27 09:59:31 -05005643err_out_watch:
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005644 if (!depth)
Ilya Dryomov99d16942016-08-12 16:11:41 +02005645 rbd_unregister_watch(rbd_dev);
Alex Elder332bb122013-04-27 09:59:30 -05005646err_out_format:
5647 rbd_dev->image_format = 0;
Alex Elder5655c4d2013-04-25 23:15:08 -05005648 kfree(rbd_dev->spec->image_id);
5649 rbd_dev->spec->image_id = NULL;
Alex Elder5655c4d2013-04-25 23:15:08 -05005650 return ret;
Alex Eldera30b71b2012-07-10 20:30:11 -05005651}
5652
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005653static ssize_t do_rbd_add(struct bus_type *bus,
5654 const char *buf,
5655 size_t count)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005656{
Alex Eldercb8627c2012-07-09 21:04:23 -05005657 struct rbd_device *rbd_dev = NULL;
Alex Elderdc79b112012-10-25 23:34:41 -05005658 struct ceph_options *ceph_opts = NULL;
Alex Elder4e9afeb2012-10-25 23:34:41 -05005659 struct rbd_options *rbd_opts = NULL;
Alex Elder859c31d2012-10-25 23:34:42 -05005660 struct rbd_spec *spec = NULL;
Alex Elder9d3997f2012-10-25 23:34:42 -05005661 struct rbd_client *rbdc;
Ilya Dryomovb51c83c2015-10-15 15:38:57 +02005662 int rc;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005663
5664 if (!try_module_get(THIS_MODULE))
5665 return -ENODEV;
5666
Alex Eldera725f65e2012-02-02 08:13:30 -06005667 /* parse add command */
Alex Elder859c31d2012-10-25 23:34:42 -05005668 rc = rbd_add_parse_args(buf, &ceph_opts, &rbd_opts, &spec);
Alex Elderdc79b112012-10-25 23:34:41 -05005669 if (rc < 0)
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02005670 goto out;
Alex Eldera725f65e2012-02-02 08:13:30 -06005671
Alex Elder9d3997f2012-10-25 23:34:42 -05005672 rbdc = rbd_get_client(ceph_opts);
5673 if (IS_ERR(rbdc)) {
5674 rc = PTR_ERR(rbdc);
Alex Elder0ddebc02012-10-25 23:34:41 -05005675 goto err_out_args;
Alex Elder9d3997f2012-10-25 23:34:42 -05005676 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005677
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005678 /* pick the pool */
Ilya Dryomovdd435852018-02-22 13:43:24 +01005679 rc = ceph_pg_poolid_by_name(rbdc->client->osdc.osdmap, spec->pool_name);
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005680 if (rc < 0) {
5681 if (rc == -ENOENT)
5682 pr_info("pool %s does not exist\n", spec->pool_name);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005683 goto err_out_client;
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005684 }
Alex Elderc0cd10db2013-04-26 09:43:47 -05005685 spec->pool_id = (u64)rc;
Alex Elder859c31d2012-10-25 23:34:42 -05005686
Ilya Dryomovd1475432015-06-22 13:24:48 +03005687 rbd_dev = rbd_dev_create(rbdc, spec, rbd_opts);
Ilya Dryomovb51c83c2015-10-15 15:38:57 +02005688 if (!rbd_dev) {
5689 rc = -ENOMEM;
Alex Elderbd4ba652012-10-25 23:34:42 -05005690 goto err_out_client;
Ilya Dryomovb51c83c2015-10-15 15:38:57 +02005691 }
Alex Elderc53d5892012-10-25 23:34:42 -05005692 rbdc = NULL; /* rbd_dev now owns this */
5693 spec = NULL; /* rbd_dev now owns this */
Ilya Dryomovd1475432015-06-22 13:24:48 +03005694 rbd_opts = NULL; /* rbd_dev now owns this */
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005695
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02005696 rbd_dev->config_info = kstrdup(buf, GFP_KERNEL);
5697 if (!rbd_dev->config_info) {
5698 rc = -ENOMEM;
5699 goto err_out_rbd_dev;
5700 }
5701
Ilya Dryomov811c6682016-04-15 16:22:16 +02005702 down_write(&rbd_dev->header_rwsem);
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005703 rc = rbd_dev_image_probe(rbd_dev, 0);
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02005704 if (rc < 0) {
5705 up_write(&rbd_dev->header_rwsem);
Alex Elderc53d5892012-10-25 23:34:42 -05005706 goto err_out_rbd_dev;
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02005707 }
Alex Elder05fd6f62012-08-29 17:11:07 -05005708
Alex Elder7ce4eef2013-05-06 17:40:33 -05005709 /* If we are mapping a snapshot it must be marked read-only */
Alex Elder7ce4eef2013-05-06 17:40:33 -05005710 if (rbd_dev->spec->snap_id != CEPH_NOSNAP)
Ilya Dryomov9568c932017-10-12 12:35:19 +02005711 rbd_dev->opts->read_only = true;
Alex Elder7ce4eef2013-05-06 17:40:33 -05005712
Alex Elderb536f692013-04-28 23:32:34 -05005713 rc = rbd_dev_device_setup(rbd_dev);
Ilya Dryomovfd22aef2017-04-13 12:17:37 +02005714 if (rc)
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02005715 goto err_out_image_probe;
Alex Elderb536f692013-04-28 23:32:34 -05005716
Ilya Dryomove010dd02017-04-13 12:17:39 +02005717 if (rbd_dev->opts->exclusive) {
5718 rc = rbd_add_acquire_lock(rbd_dev);
5719 if (rc)
5720 goto err_out_device_setup;
Alex Elderb536f692013-04-28 23:32:34 -05005721 }
5722
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005723 /* Everything's ready. Announce the disk to the world. */
5724
5725 rc = device_add(&rbd_dev->dev);
5726 if (rc)
Ilya Dryomove010dd02017-04-13 12:17:39 +02005727 goto err_out_image_lock;
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005728
5729 add_disk(rbd_dev->disk);
5730 /* see rbd_init_disk() */
5731 blk_put_queue(rbd_dev->disk->queue);
5732
5733 spin_lock(&rbd_dev_list_lock);
5734 list_add_tail(&rbd_dev->node, &rbd_dev_list);
5735 spin_unlock(&rbd_dev_list_lock);
5736
5737 pr_info("%s: capacity %llu features 0x%llx\n", rbd_dev->disk->disk_name,
5738 (unsigned long long)get_capacity(rbd_dev->disk) << SECTOR_SHIFT,
5739 rbd_dev->header.features);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02005740 rc = count;
5741out:
5742 module_put(THIS_MODULE);
5743 return rc;
Alex Elder3abef3b2013-05-13 20:35:37 -05005744
Ilya Dryomove010dd02017-04-13 12:17:39 +02005745err_out_image_lock:
5746 rbd_dev_image_unlock(rbd_dev);
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005747err_out_device_setup:
5748 rbd_dev_device_release(rbd_dev);
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02005749err_out_image_probe:
5750 rbd_dev_image_release(rbd_dev);
Alex Elderc53d5892012-10-25 23:34:42 -05005751err_out_rbd_dev:
5752 rbd_dev_destroy(rbd_dev);
Alex Elderbd4ba652012-10-25 23:34:42 -05005753err_out_client:
Alex Elder9d3997f2012-10-25 23:34:42 -05005754 rbd_put_client(rbdc);
Alex Elder0ddebc02012-10-25 23:34:41 -05005755err_out_args:
Alex Elder859c31d2012-10-25 23:34:42 -05005756 rbd_spec_put(spec);
Ilya Dryomovd1475432015-06-22 13:24:48 +03005757 kfree(rbd_opts);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02005758 goto out;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005759}
5760
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005761static ssize_t rbd_add(struct bus_type *bus,
5762 const char *buf,
5763 size_t count)
5764{
5765 if (single_major)
5766 return -EINVAL;
5767
5768 return do_rbd_add(bus, buf, count);
5769}
5770
5771static ssize_t rbd_add_single_major(struct bus_type *bus,
5772 const char *buf,
5773 size_t count)
5774{
5775 return do_rbd_add(bus, buf, count);
5776}
5777
Alex Elder05a46af2013-04-26 15:44:36 -05005778static void rbd_dev_remove_parent(struct rbd_device *rbd_dev)
5779{
Alex Elderad945fc2013-04-26 15:44:36 -05005780 while (rbd_dev->parent) {
Alex Elder05a46af2013-04-26 15:44:36 -05005781 struct rbd_device *first = rbd_dev;
5782 struct rbd_device *second = first->parent;
5783 struct rbd_device *third;
5784
5785 /*
5786 * Follow to the parent with no grandparent and
5787 * remove it.
5788 */
5789 while (second && (third = second->parent)) {
5790 first = second;
5791 second = third;
5792 }
Alex Elderad945fc2013-04-26 15:44:36 -05005793 rbd_assert(second);
Alex Elder8ad42cd2013-04-28 23:32:34 -05005794 rbd_dev_image_release(second);
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02005795 rbd_dev_destroy(second);
Alex Elderad945fc2013-04-26 15:44:36 -05005796 first->parent = NULL;
5797 first->parent_overlap = 0;
5798
5799 rbd_assert(first->parent_spec);
Alex Elder05a46af2013-04-26 15:44:36 -05005800 rbd_spec_put(first->parent_spec);
5801 first->parent_spec = NULL;
Alex Elder05a46af2013-04-26 15:44:36 -05005802 }
5803}
5804
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005805static ssize_t do_rbd_remove(struct bus_type *bus,
5806 const char *buf,
5807 size_t count)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005808{
5809 struct rbd_device *rbd_dev = NULL;
Alex Elder751cc0e2013-05-31 15:17:01 -05005810 struct list_head *tmp;
5811 int dev_id;
Mike Christie0276dca2016-08-18 18:38:45 +02005812 char opt_buf[6];
Alex Elder82a442d2013-05-31 17:40:44 -05005813 bool already = false;
Mike Christie0276dca2016-08-18 18:38:45 +02005814 bool force = false;
Alex Elder0d8189e2013-04-27 09:59:30 -05005815 int ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005816
Mike Christie0276dca2016-08-18 18:38:45 +02005817 dev_id = -1;
5818 opt_buf[0] = '\0';
5819 sscanf(buf, "%d %5s", &dev_id, opt_buf);
5820 if (dev_id < 0) {
5821 pr_err("dev_id out of range\n");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005822 return -EINVAL;
Mike Christie0276dca2016-08-18 18:38:45 +02005823 }
5824 if (opt_buf[0] != '\0') {
5825 if (!strcmp(opt_buf, "force")) {
5826 force = true;
5827 } else {
5828 pr_err("bad remove option at '%s'\n", opt_buf);
5829 return -EINVAL;
5830 }
5831 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005832
Alex Elder751cc0e2013-05-31 15:17:01 -05005833 ret = -ENOENT;
5834 spin_lock(&rbd_dev_list_lock);
5835 list_for_each(tmp, &rbd_dev_list) {
5836 rbd_dev = list_entry(tmp, struct rbd_device, node);
5837 if (rbd_dev->dev_id == dev_id) {
5838 ret = 0;
5839 break;
5840 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005841 }
Alex Elder751cc0e2013-05-31 15:17:01 -05005842 if (!ret) {
5843 spin_lock_irq(&rbd_dev->lock);
Mike Christie0276dca2016-08-18 18:38:45 +02005844 if (rbd_dev->open_count && !force)
Alex Elder751cc0e2013-05-31 15:17:01 -05005845 ret = -EBUSY;
5846 else
Alex Elder82a442d2013-05-31 17:40:44 -05005847 already = test_and_set_bit(RBD_DEV_FLAG_REMOVING,
5848 &rbd_dev->flags);
Alex Elder751cc0e2013-05-31 15:17:01 -05005849 spin_unlock_irq(&rbd_dev->lock);
5850 }
5851 spin_unlock(&rbd_dev_list_lock);
Alex Elder82a442d2013-05-31 17:40:44 -05005852 if (ret < 0 || already)
Alex Elder1ba0f1e2013-05-31 15:17:01 -05005853 return ret;
Alex Elder751cc0e2013-05-31 15:17:01 -05005854
Mike Christie0276dca2016-08-18 18:38:45 +02005855 if (force) {
5856 /*
5857 * Prevent new IO from being queued and wait for existing
5858 * IO to complete/fail.
5859 */
5860 blk_mq_freeze_queue(rbd_dev->disk->queue);
5861 blk_set_queue_dying(rbd_dev->disk->queue);
5862 }
5863
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005864 del_gendisk(rbd_dev->disk);
5865 spin_lock(&rbd_dev_list_lock);
5866 list_del_init(&rbd_dev->node);
5867 spin_unlock(&rbd_dev_list_lock);
5868 device_del(&rbd_dev->dev);
Ilya Dryomovfca27062013-12-16 18:02:40 +02005869
Ilya Dryomove010dd02017-04-13 12:17:39 +02005870 rbd_dev_image_unlock(rbd_dev);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02005871 rbd_dev_device_release(rbd_dev);
Alex Elder8ad42cd2013-04-28 23:32:34 -05005872 rbd_dev_image_release(rbd_dev);
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02005873 rbd_dev_destroy(rbd_dev);
Alex Elder1ba0f1e2013-05-31 15:17:01 -05005874 return count;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005875}
5876
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005877static ssize_t rbd_remove(struct bus_type *bus,
5878 const char *buf,
5879 size_t count)
5880{
5881 if (single_major)
5882 return -EINVAL;
5883
5884 return do_rbd_remove(bus, buf, count);
5885}
5886
5887static ssize_t rbd_remove_single_major(struct bus_type *bus,
5888 const char *buf,
5889 size_t count)
5890{
5891 return do_rbd_remove(bus, buf, count);
5892}
5893
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005894/*
5895 * create control files in sysfs
Yehuda Sadehdfc56062010-11-19 14:51:04 -08005896 * /sys/bus/rbd/...
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005897 */
5898static int rbd_sysfs_init(void)
5899{
Yehuda Sadehdfc56062010-11-19 14:51:04 -08005900 int ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005901
Alex Elderfed4c142012-02-07 12:03:36 -06005902 ret = device_register(&rbd_root_dev);
Alex Elder21079782012-01-24 10:08:36 -06005903 if (ret < 0)
Yehuda Sadehdfc56062010-11-19 14:51:04 -08005904 return ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005905
Alex Elderfed4c142012-02-07 12:03:36 -06005906 ret = bus_register(&rbd_bus_type);
5907 if (ret < 0)
5908 device_unregister(&rbd_root_dev);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005909
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005910 return ret;
5911}
5912
5913static void rbd_sysfs_cleanup(void)
5914{
Yehuda Sadehdfc56062010-11-19 14:51:04 -08005915 bus_unregister(&rbd_bus_type);
Alex Elderfed4c142012-02-07 12:03:36 -06005916 device_unregister(&rbd_root_dev);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005917}
5918
Alex Elder1c2a9df2013-05-01 12:43:03 -05005919static int rbd_slab_init(void)
5920{
5921 rbd_assert(!rbd_img_request_cache);
Geliang Tang03d94402016-03-13 15:17:32 +08005922 rbd_img_request_cache = KMEM_CACHE(rbd_img_request, 0);
Alex Elder868311b2013-05-01 12:43:03 -05005923 if (!rbd_img_request_cache)
5924 return -ENOMEM;
5925
5926 rbd_assert(!rbd_obj_request_cache);
Geliang Tang03d94402016-03-13 15:17:32 +08005927 rbd_obj_request_cache = KMEM_CACHE(rbd_obj_request, 0);
Alex Elder78c2a442013-05-01 12:43:04 -05005928 if (!rbd_obj_request_cache)
5929 goto out_err;
5930
Ilya Dryomov6c696d82017-01-25 18:16:23 +01005931 return 0;
Alex Elder1c2a9df2013-05-01 12:43:03 -05005932
Ilya Dryomov6c696d82017-01-25 18:16:23 +01005933out_err:
Alex Elder868311b2013-05-01 12:43:03 -05005934 kmem_cache_destroy(rbd_img_request_cache);
5935 rbd_img_request_cache = NULL;
Alex Elder1c2a9df2013-05-01 12:43:03 -05005936 return -ENOMEM;
5937}
5938
5939static void rbd_slab_exit(void)
5940{
Alex Elder868311b2013-05-01 12:43:03 -05005941 rbd_assert(rbd_obj_request_cache);
5942 kmem_cache_destroy(rbd_obj_request_cache);
5943 rbd_obj_request_cache = NULL;
5944
Alex Elder1c2a9df2013-05-01 12:43:03 -05005945 rbd_assert(rbd_img_request_cache);
5946 kmem_cache_destroy(rbd_img_request_cache);
5947 rbd_img_request_cache = NULL;
5948}
5949
Alex Eldercc344fa2013-02-19 12:25:56 -06005950static int __init rbd_init(void)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005951{
5952 int rc;
5953
Alex Elder1e32d342013-01-30 11:13:33 -06005954 if (!libceph_compatible(NULL)) {
5955 rbd_warn(NULL, "libceph incompatibility (quitting)");
Alex Elder1e32d342013-01-30 11:13:33 -06005956 return -EINVAL;
5957 }
Ilya Dryomove1b4d962013-12-13 15:28:57 +02005958
Alex Elder1c2a9df2013-05-01 12:43:03 -05005959 rc = rbd_slab_init();
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005960 if (rc)
5961 return rc;
Ilya Dryomove1b4d962013-12-13 15:28:57 +02005962
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005963 /*
5964 * The number of active work items is limited by the number of
Ilya Dryomovf77303b2015-04-22 18:28:13 +03005965 * rbd devices * queue depth, so leave @max_active at default.
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005966 */
5967 rbd_wq = alloc_workqueue(RBD_DRV_NAME, WQ_MEM_RECLAIM, 0);
5968 if (!rbd_wq) {
5969 rc = -ENOMEM;
5970 goto err_out_slab;
5971 }
5972
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005973 if (single_major) {
5974 rbd_major = register_blkdev(0, RBD_DRV_NAME);
5975 if (rbd_major < 0) {
5976 rc = rbd_major;
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005977 goto err_out_wq;
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005978 }
5979 }
5980
Alex Elder1c2a9df2013-05-01 12:43:03 -05005981 rc = rbd_sysfs_init();
5982 if (rc)
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005983 goto err_out_blkdev;
Alex Elder1c2a9df2013-05-01 12:43:03 -05005984
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005985 if (single_major)
5986 pr_info("loaded (major %d)\n", rbd_major);
5987 else
5988 pr_info("loaded\n");
5989
Ilya Dryomove1b4d962013-12-13 15:28:57 +02005990 return 0;
5991
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005992err_out_blkdev:
5993 if (single_major)
5994 unregister_blkdev(rbd_major, RBD_DRV_NAME);
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005995err_out_wq:
5996 destroy_workqueue(rbd_wq);
Ilya Dryomove1b4d962013-12-13 15:28:57 +02005997err_out_slab:
5998 rbd_slab_exit();
Alex Elder1c2a9df2013-05-01 12:43:03 -05005999 return rc;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006000}
6001
Alex Eldercc344fa2013-02-19 12:25:56 -06006002static void __exit rbd_exit(void)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006003{
Ilya Dryomovffe312c2014-05-20 15:46:04 +04006004 ida_destroy(&rbd_dev_id_ida);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006005 rbd_sysfs_cleanup();
Ilya Dryomov9b60e702013-12-13 15:28:57 +02006006 if (single_major)
6007 unregister_blkdev(rbd_major, RBD_DRV_NAME);
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04006008 destroy_workqueue(rbd_wq);
Alex Elder1c2a9df2013-05-01 12:43:03 -05006009 rbd_slab_exit();
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006010}
6011
6012module_init(rbd_init);
6013module_exit(rbd_exit);
6014
Alex Elderd552c612013-05-31 20:13:09 -05006015MODULE_AUTHOR("Alex Elder <elder@inktank.com>");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006016MODULE_AUTHOR("Sage Weil <sage@newdream.net>");
6017MODULE_AUTHOR("Yehuda Sadeh <yehuda@hq.newdream.net>");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006018/* following authorship retained from original osdblk.c */
6019MODULE_AUTHOR("Jeff Garzik <jeff@garzik.org>");
6020
Ilya Dryomov90da2582013-12-13 15:28:56 +02006021MODULE_DESCRIPTION("RADOS Block Device (RBD) driver");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006022MODULE_LICENSE("GPL");