blob: d5a51493e8b58099dc5d374a5bf4ce7e24f73adf [file] [log] [blame]
Alex Eldere2a58ee2013-04-30 00:44:33 -05001
Yehuda Sadeh602adf42010-08-12 16:11:25 -07002/*
3 rbd.c -- Export ceph rados objects as a Linux block device
4
5
6 based on drivers/block/osdblk.c:
7
8 Copyright 2009 Red Hat, Inc.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program; see the file COPYING. If not, write to
21 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
22
23
24
Yehuda Sadehdfc56062010-11-19 14:51:04 -080025 For usage instructions, please refer to:
Yehuda Sadeh602adf42010-08-12 16:11:25 -070026
Yehuda Sadehdfc56062010-11-19 14:51:04 -080027 Documentation/ABI/testing/sysfs-bus-rbd
Yehuda Sadeh602adf42010-08-12 16:11:25 -070028
29 */
30
31#include <linux/ceph/libceph.h>
32#include <linux/ceph/osd_client.h>
33#include <linux/ceph/mon_client.h>
Ilya Dryomoved95b212016-08-12 16:40:02 +020034#include <linux/ceph/cls_lock_client.h>
Ilya Dryomov43df3d32018-02-02 15:23:22 +010035#include <linux/ceph/striper.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070036#include <linux/ceph/decode.h>
Yehuda Sadeh59c2be12011-03-21 15:10:11 -070037#include <linux/parser.h>
Alex Elder30d1cff2013-05-01 12:43:03 -050038#include <linux/bsearch.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070039
40#include <linux/kernel.h>
41#include <linux/device.h>
42#include <linux/module.h>
Christoph Hellwig7ad18af2015-01-13 17:20:04 +010043#include <linux/blk-mq.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070044#include <linux/fs.h>
45#include <linux/blkdev.h>
Alex Elder1c2a9df2013-05-01 12:43:03 -050046#include <linux/slab.h>
Ilya Dryomovf8a22fc2013-12-13 15:28:57 +020047#include <linux/idr.h>
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +040048#include <linux/workqueue.h>
Yehuda Sadeh602adf42010-08-12 16:11:25 -070049
50#include "rbd_types.h"
51
Alex Elderaafb2302012-09-06 16:00:54 -050052#define RBD_DEBUG /* Activate rbd_assert() calls */
53
Alex Elder593a9e72012-02-07 12:03:37 -060054/*
Alex Eldera2acd002013-05-08 22:50:04 -050055 * Increment the given counter and return its updated value.
56 * If the counter is already 0 it will not be incremented.
57 * If the counter is already at its maximum value returns
58 * -EINVAL without updating it.
59 */
60static int atomic_inc_return_safe(atomic_t *v)
61{
62 unsigned int counter;
63
64 counter = (unsigned int)__atomic_add_unless(v, 1, 0);
65 if (counter <= (unsigned int)INT_MAX)
66 return (int)counter;
67
68 atomic_dec(v);
69
70 return -EINVAL;
71}
72
73/* Decrement the counter. Return the resulting value, or -EINVAL */
74static int atomic_dec_return_safe(atomic_t *v)
75{
76 int counter;
77
78 counter = atomic_dec_return(v);
79 if (counter >= 0)
80 return counter;
81
82 atomic_inc(v);
83
84 return -EINVAL;
85}
86
Alex Elderf0f8cef2012-01-29 13:57:44 -060087#define RBD_DRV_NAME "rbd"
Yehuda Sadeh602adf42010-08-12 16:11:25 -070088
Ilya Dryomov7e513d42013-12-16 19:26:32 +020089#define RBD_MINORS_PER_MAJOR 256
90#define RBD_SINGLE_MAJOR_PART_SHIFT 4
Yehuda Sadeh602adf42010-08-12 16:11:25 -070091
Ilya Dryomov6d69bb532015-10-11 19:38:00 +020092#define RBD_MAX_PARENT_CHAIN_LEN 16
93
Alex Elderd4b125e2012-07-03 16:01:19 -050094#define RBD_SNAP_DEV_NAME_PREFIX "snap_"
95#define RBD_MAX_SNAP_NAME_LEN \
96 (NAME_MAX - (sizeof (RBD_SNAP_DEV_NAME_PREFIX) - 1))
97
Alex Elder35d489f2012-07-03 16:01:19 -050098#define RBD_MAX_SNAP_COUNT 510 /* allows max snapc to fit in 4KB */
Yehuda Sadeh602adf42010-08-12 16:11:25 -070099
100#define RBD_SNAP_HEAD_NAME "-"
101
Alex Elder9682fc62013-04-30 00:44:33 -0500102#define BAD_SNAP_INDEX U32_MAX /* invalid index into snap array */
103
Alex Elder9e15b772012-10-30 19:40:33 -0500104/* This allows a single page to hold an image name sent by OSD */
105#define RBD_IMAGE_NAME_LEN_MAX (PAGE_SIZE - sizeof (__le32) - 1)
Alex Elder1e130192012-07-03 16:01:19 -0500106#define RBD_IMAGE_ID_LEN_MAX 64
Alex Elder9e15b772012-10-30 19:40:33 -0500107
Alex Elder1e130192012-07-03 16:01:19 -0500108#define RBD_OBJ_PREFIX_LEN_MAX 64
Alex Elder589d30e2012-07-10 20:30:11 -0500109
Ilya Dryomoved95b212016-08-12 16:40:02 +0200110#define RBD_NOTIFY_TIMEOUT 5 /* seconds */
Ilya Dryomov99d16942016-08-12 16:11:41 +0200111#define RBD_RETRY_DELAY msecs_to_jiffies(1000)
112
Alex Elderd8891402012-10-09 13:50:17 -0700113/* Feature bits */
114
Ilya Dryomov8767b292017-03-02 19:56:57 +0100115#define RBD_FEATURE_LAYERING (1ULL<<0)
116#define RBD_FEATURE_STRIPINGV2 (1ULL<<1)
117#define RBD_FEATURE_EXCLUSIVE_LOCK (1ULL<<2)
118#define RBD_FEATURE_DATA_POOL (1ULL<<7)
Ilya Dryomove5734272018-01-16 15:41:54 +0100119#define RBD_FEATURE_OPERATIONS (1ULL<<8)
Ilya Dryomov8767b292017-03-02 19:56:57 +0100120
Ilya Dryomoved95b212016-08-12 16:40:02 +0200121#define RBD_FEATURES_ALL (RBD_FEATURE_LAYERING | \
122 RBD_FEATURE_STRIPINGV2 | \
Ilya Dryomov7e973322017-01-25 18:16:22 +0100123 RBD_FEATURE_EXCLUSIVE_LOCK | \
Ilya Dryomove5734272018-01-16 15:41:54 +0100124 RBD_FEATURE_DATA_POOL | \
125 RBD_FEATURE_OPERATIONS)
Alex Elderd8891402012-10-09 13:50:17 -0700126
127/* Features supported by this (client software) implementation. */
128
Alex Elder770eba62012-10-25 23:34:40 -0500129#define RBD_FEATURES_SUPPORTED (RBD_FEATURES_ALL)
Alex Elderd8891402012-10-09 13:50:17 -0700130
Alex Elder81a89792012-02-02 08:13:30 -0600131/*
132 * An RBD device name will be "rbd#", where the "rbd" comes from
133 * RBD_DRV_NAME above, and # is a unique integer identifier.
Alex Elder81a89792012-02-02 08:13:30 -0600134 */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700135#define DEV_NAME_LEN 32
136
137/*
138 * block device image metadata (in-memory version)
139 */
140struct rbd_image_header {
Alex Elderf35a4de2013-05-06 09:51:29 -0500141 /* These six fields never change for a given rbd image */
Alex Elder849b4262012-07-09 21:04:24 -0500142 char *object_prefix;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700143 __u8 obj_order;
Alex Elderf35a4de2013-05-06 09:51:29 -0500144 u64 stripe_unit;
145 u64 stripe_count;
Ilya Dryomov7e973322017-01-25 18:16:22 +0100146 s64 data_pool_id;
Alex Elderf35a4de2013-05-06 09:51:29 -0500147 u64 features; /* Might be changeable someday? */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700148
Alex Elderf84344f2012-08-31 17:29:51 -0500149 /* The remaining fields need to be updated occasionally */
150 u64 image_size;
151 struct ceph_snap_context *snapc;
Alex Elderf35a4de2013-05-06 09:51:29 -0500152 char *snap_names; /* format 1 only */
153 u64 *snap_sizes; /* format 1 only */
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700154};
155
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500156/*
157 * An rbd image specification.
158 *
159 * The tuple (pool_id, image_id, snap_id) is sufficient to uniquely
Alex Elderc66c6e02012-11-01 08:39:26 -0500160 * identify an image. Each rbd_dev structure includes a pointer to
161 * an rbd_spec structure that encapsulates this identity.
162 *
163 * Each of the id's in an rbd_spec has an associated name. For a
164 * user-mapped image, the names are supplied and the id's associated
165 * with them are looked up. For a layered image, a parent image is
166 * defined by the tuple, and the names are looked up.
167 *
168 * An rbd_dev structure contains a parent_spec pointer which is
169 * non-null if the image it represents is a child in a layered
170 * image. This pointer will refer to the rbd_spec structure used
171 * by the parent rbd_dev for its own identity (i.e., the structure
172 * is shared between the parent and child).
173 *
174 * Since these structures are populated once, during the discovery
175 * phase of image construction, they are effectively immutable so
176 * we make no effort to synchronize access to them.
177 *
178 * Note that code herein does not assume the image name is known (it
179 * could be a null pointer).
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500180 */
181struct rbd_spec {
182 u64 pool_id;
Alex Elderecb4dc22013-04-26 09:43:47 -0500183 const char *pool_name;
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500184
Alex Elderecb4dc22013-04-26 09:43:47 -0500185 const char *image_id;
186 const char *image_name;
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500187
188 u64 snap_id;
Alex Elderecb4dc22013-04-26 09:43:47 -0500189 const char *snap_name;
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500190
191 struct kref kref;
192};
193
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700194/*
Alex Elderf0f8cef2012-01-29 13:57:44 -0600195 * an instance of the client. multiple devices may share an rbd client.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700196 */
197struct rbd_client {
198 struct ceph_client *client;
199 struct kref kref;
200 struct list_head node;
201};
202
Alex Elderbf0d5f502012-11-22 00:00:08 -0600203struct rbd_img_request;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600204
Alex Elder9969ebc2013-01-18 12:31:10 -0600205enum obj_request_type {
Ilya Dryomova1fbb5e2018-01-16 12:15:02 +0100206 OBJ_REQUEST_NODATA = 1,
Ilya Dryomov5359a172018-01-20 10:30:10 +0100207 OBJ_REQUEST_BIO, /* pointer into provided bio (list) */
Ilya Dryomov7e07efb2018-01-20 10:30:11 +0100208 OBJ_REQUEST_BVECS, /* pointer into provided bio_vec array */
Ilya Dryomovafb97882018-02-06 19:26:35 +0100209 OBJ_REQUEST_OWN_BVECS, /* private bio_vec array, doesn't own pages */
Alex Elder9969ebc2013-01-18 12:31:10 -0600210};
Alex Elderbf0d5f502012-11-22 00:00:08 -0600211
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800212enum obj_operation_type {
Ilya Dryomova1fbb5e2018-01-16 12:15:02 +0100213 OBJ_OP_READ = 1,
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800214 OBJ_OP_WRITE,
Guangliang Zhao90e98c52014-04-01 22:22:16 +0800215 OBJ_OP_DISCARD,
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800216};
217
Ilya Dryomov3da691b2018-01-29 14:04:08 +0100218/*
219 * Writes go through the following state machine to deal with
220 * layering:
221 *
222 * need copyup
223 * RBD_OBJ_WRITE_GUARD ---------------> RBD_OBJ_WRITE_COPYUP
224 * | ^ |
225 * v \------------------------------/
226 * done
227 * ^
228 * |
229 * RBD_OBJ_WRITE_FLAT
230 *
231 * Writes start in RBD_OBJ_WRITE_GUARD or _FLAT, depending on whether
232 * there is a parent or not.
233 */
234enum rbd_obj_write_state {
235 RBD_OBJ_WRITE_FLAT = 1,
236 RBD_OBJ_WRITE_GUARD,
237 RBD_OBJ_WRITE_COPYUP,
Alex Elder926f9b32013-02-11 12:33:24 -0600238};
239
Alex Elderbf0d5f502012-11-22 00:00:08 -0600240struct rbd_obj_request {
Ilya Dryomov43df3d32018-02-02 15:23:22 +0100241 struct ceph_object_extent ex;
Alex Elderc5b5ef62013-02-11 12:33:24 -0600242 union {
Ilya Dryomov3da691b2018-01-29 14:04:08 +0100243 bool tried_parent; /* for reads */
244 enum rbd_obj_write_state write_state; /* for writes */
245 };
Alex Elderbf0d5f502012-11-22 00:00:08 -0600246
Ilya Dryomov51c35092018-01-29 14:04:08 +0100247 struct rbd_img_request *img_request;
Ilya Dryomov86bd7992018-02-06 19:26:33 +0100248 struct ceph_file_extent *img_extents;
249 u32 num_img_extents;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600250
Alex Elder788e2df2013-01-17 12:25:27 -0600251 union {
Ilya Dryomov5359a172018-01-20 10:30:10 +0100252 struct ceph_bio_iter bio_pos;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600253 struct {
Ilya Dryomov7e07efb2018-01-20 10:30:11 +0100254 struct ceph_bvec_iter bvec_pos;
255 u32 bvec_count;
Ilya Dryomovafb97882018-02-06 19:26:35 +0100256 u32 bvec_idx;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600257 };
258 };
Ilya Dryomov7e07efb2018-01-20 10:30:11 +0100259 struct bio_vec *copyup_bvecs;
260 u32 copyup_bvec_count;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600261
262 struct ceph_osd_request *osd_req;
263
264 u64 xferred; /* bytes transferred */
Sage Weil1b83bef2013-02-25 16:11:12 -0800265 int result;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600266
Alex Elderbf0d5f502012-11-22 00:00:08 -0600267 struct kref kref;
268};
269
Alex Elder0c425242013-02-08 09:55:49 -0600270enum img_req_flags {
Alex Elder9849e982013-01-24 16:13:36 -0600271 IMG_REQ_CHILD, /* initiator: block = 0, child image = 1 */
Alex Elderd0b2e942013-01-24 16:13:36 -0600272 IMG_REQ_LAYERED, /* ENOENT handling: normal = 0, layered = 1 */
Alex Elder0c425242013-02-08 09:55:49 -0600273};
274
Alex Elderbf0d5f502012-11-22 00:00:08 -0600275struct rbd_img_request {
Alex Elderbf0d5f502012-11-22 00:00:08 -0600276 struct rbd_device *rbd_dev;
Ilya Dryomov9bb02482018-01-30 17:52:10 +0100277 enum obj_operation_type op_type;
Ilya Dryomovecc633c2018-02-01 11:50:47 +0100278 enum obj_request_type data_type;
Alex Elder0c425242013-02-08 09:55:49 -0600279 unsigned long flags;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600280 union {
Alex Elder9849e982013-01-24 16:13:36 -0600281 u64 snap_id; /* for reads */
Alex Elderbf0d5f502012-11-22 00:00:08 -0600282 struct ceph_snap_context *snapc; /* for writes */
Alex Elder9849e982013-01-24 16:13:36 -0600283 };
284 union {
285 struct request *rq; /* block request */
286 struct rbd_obj_request *obj_request; /* obj req initiator */
Alex Elderbf0d5f502012-11-22 00:00:08 -0600287 };
Ilya Dryomov15961b42018-02-01 11:50:47 +0100288 spinlock_t completion_lock;
Alex Elder55f27e02013-04-10 12:34:25 -0500289 u64 xferred;/* aggregate bytes transferred */
Alex Eldera5a337d2013-01-24 16:13:36 -0600290 int result; /* first nonzero obj_request result */
Alex Elderbf0d5f502012-11-22 00:00:08 -0600291
Ilya Dryomov43df3d32018-02-02 15:23:22 +0100292 struct list_head object_extents; /* obj_req.ex structs */
Alex Elderbf0d5f502012-11-22 00:00:08 -0600293 u32 obj_request_count;
Ilya Dryomov7114eda2018-02-01 11:50:47 +0100294 u32 pending_count;
Alex Elderbf0d5f502012-11-22 00:00:08 -0600295
296 struct kref kref;
297};
298
299#define for_each_obj_request(ireq, oreq) \
Ilya Dryomov43df3d32018-02-02 15:23:22 +0100300 list_for_each_entry(oreq, &(ireq)->object_extents, ex.oe_item)
Alex Elderbf0d5f502012-11-22 00:00:08 -0600301#define for_each_obj_request_safe(ireq, oreq, n) \
Ilya Dryomov43df3d32018-02-02 15:23:22 +0100302 list_for_each_entry_safe(oreq, n, &(ireq)->object_extents, ex.oe_item)
Alex Elderbf0d5f502012-11-22 00:00:08 -0600303
Ilya Dryomov99d16942016-08-12 16:11:41 +0200304enum rbd_watch_state {
305 RBD_WATCH_STATE_UNREGISTERED,
306 RBD_WATCH_STATE_REGISTERED,
307 RBD_WATCH_STATE_ERROR,
308};
309
Ilya Dryomoved95b212016-08-12 16:40:02 +0200310enum rbd_lock_state {
311 RBD_LOCK_STATE_UNLOCKED,
312 RBD_LOCK_STATE_LOCKED,
313 RBD_LOCK_STATE_RELEASING,
314};
315
316/* WatchNotify::ClientId */
317struct rbd_client_id {
318 u64 gid;
319 u64 handle;
320};
321
Alex Elderf84344f2012-08-31 17:29:51 -0500322struct rbd_mapping {
Alex Elder99c1f082012-08-30 14:42:15 -0500323 u64 size;
Alex Elder34b13182012-07-13 20:35:12 -0500324 u64 features;
Alex Elderf84344f2012-08-31 17:29:51 -0500325};
326
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700327/*
328 * a single device
329 */
330struct rbd_device {
Alex Elderde71a292012-07-03 16:01:19 -0500331 int dev_id; /* blkdev unique id */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700332
333 int major; /* blkdev assigned major */
Ilya Dryomovdd82fff2013-12-13 15:28:57 +0200334 int minor;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700335 struct gendisk *disk; /* blkdev's gendisk and rq */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700336
Alex Eldera30b71b2012-07-10 20:30:11 -0500337 u32 image_format; /* Either 1 or 2 */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700338 struct rbd_client *rbd_client;
339
340 char name[DEV_NAME_LEN]; /* blkdev name, e.g. rbd3 */
341
Alex Elderb82d1672013-01-14 12:43:31 -0600342 spinlock_t lock; /* queue, flags, open_count */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700343
344 struct rbd_image_header header;
Alex Elderb82d1672013-01-14 12:43:31 -0600345 unsigned long flags; /* possibly lock protected */
Alex Elder0d7dbfc2012-10-25 23:34:41 -0500346 struct rbd_spec *spec;
Ilya Dryomovd1475432015-06-22 13:24:48 +0300347 struct rbd_options *opts;
Mike Christie0d6d1e9c2016-08-18 18:38:45 +0200348 char *config_info; /* add{,_single_major} string */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700349
Ilya Dryomovc41d13a2016-04-29 20:01:25 +0200350 struct ceph_object_id header_oid;
Ilya Dryomov922dab62016-05-26 01:15:02 +0200351 struct ceph_object_locator header_oloc;
Alex Elder971f8392012-10-25 23:34:41 -0500352
Ilya Dryomov1643dfa2016-08-12 15:45:52 +0200353 struct ceph_file_layout layout; /* used for all rbd requests */
Alex Elder0903e872012-11-14 12:25:19 -0600354
Ilya Dryomov99d16942016-08-12 16:11:41 +0200355 struct mutex watch_mutex;
356 enum rbd_watch_state watch_state;
Ilya Dryomov922dab62016-05-26 01:15:02 +0200357 struct ceph_osd_linger_request *watch_handle;
Ilya Dryomov99d16942016-08-12 16:11:41 +0200358 u64 watch_cookie;
359 struct delayed_work watch_dwork;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700360
Ilya Dryomoved95b212016-08-12 16:40:02 +0200361 struct rw_semaphore lock_rwsem;
362 enum rbd_lock_state lock_state;
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +0200363 char lock_cookie[32];
Ilya Dryomoved95b212016-08-12 16:40:02 +0200364 struct rbd_client_id owner_cid;
365 struct work_struct acquired_lock_work;
366 struct work_struct released_lock_work;
367 struct delayed_work lock_dwork;
368 struct work_struct unlock_work;
369 wait_queue_head_t lock_waitq;
370
Ilya Dryomov1643dfa2016-08-12 15:45:52 +0200371 struct workqueue_struct *task_wq;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700372
Alex Elder86b00e02012-10-25 23:34:42 -0500373 struct rbd_spec *parent_spec;
374 u64 parent_overlap;
Alex Eldera2acd002013-05-08 22:50:04 -0500375 atomic_t parent_ref;
Alex Elder2f82ee52012-10-30 19:40:33 -0500376 struct rbd_device *parent;
Alex Elder86b00e02012-10-25 23:34:42 -0500377
Christoph Hellwig7ad18af2015-01-13 17:20:04 +0100378 /* Block layer tags. */
379 struct blk_mq_tag_set tag_set;
380
Josh Durginc6666012011-11-21 17:11:12 -0800381 /* protects updating the header */
382 struct rw_semaphore header_rwsem;
Alex Elderf84344f2012-08-31 17:29:51 -0500383
384 struct rbd_mapping mapping;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700385
386 struct list_head node;
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800387
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800388 /* sysfs related */
389 struct device dev;
Alex Elderb82d1672013-01-14 12:43:31 -0600390 unsigned long open_count; /* protected by lock */
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800391};
392
Alex Elderb82d1672013-01-14 12:43:31 -0600393/*
Ilya Dryomov87c0fde2016-09-29 13:41:05 +0200394 * Flag bits for rbd_dev->flags:
395 * - REMOVING (which is coupled with rbd_dev->open_count) is protected
396 * by rbd_dev->lock
397 * - BLACKLISTED is protected by rbd_dev->lock_rwsem
Alex Elderb82d1672013-01-14 12:43:31 -0600398 */
Alex Elder6d292902013-01-14 12:43:31 -0600399enum rbd_dev_flags {
400 RBD_DEV_FLAG_EXISTS, /* mapped snapshot has not been deleted */
Alex Elderb82d1672013-01-14 12:43:31 -0600401 RBD_DEV_FLAG_REMOVING, /* this mapping is being removed */
Ilya Dryomov87c0fde2016-09-29 13:41:05 +0200402 RBD_DEV_FLAG_BLACKLISTED, /* our ceph_client is blacklisted */
Alex Elder6d292902013-01-14 12:43:31 -0600403};
404
Alex Eldercfbf6372013-05-31 17:40:45 -0500405static DEFINE_MUTEX(client_mutex); /* Serialize client creation */
Alex Eldere124a82f2012-01-29 13:57:44 -0600406
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700407static LIST_HEAD(rbd_dev_list); /* devices */
Alex Eldere124a82f2012-01-29 13:57:44 -0600408static DEFINE_SPINLOCK(rbd_dev_list_lock);
409
Alex Elder432b8582012-01-29 13:57:44 -0600410static LIST_HEAD(rbd_client_list); /* clients */
411static DEFINE_SPINLOCK(rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700412
Alex Elder78c2a442013-05-01 12:43:04 -0500413/* Slab caches for frequently-allocated structures */
414
Alex Elder1c2a9df2013-05-01 12:43:03 -0500415static struct kmem_cache *rbd_img_request_cache;
Alex Elder868311b2013-05-01 12:43:03 -0500416static struct kmem_cache *rbd_obj_request_cache;
Alex Elder1c2a9df2013-05-01 12:43:03 -0500417
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200418static int rbd_major;
Ilya Dryomovf8a22fc2013-12-13 15:28:57 +0200419static DEFINE_IDA(rbd_dev_id_ida);
420
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +0400421static struct workqueue_struct *rbd_wq;
422
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200423/*
Ilya Dryomov3cfa3b12017-11-13 10:35:40 +0100424 * single-major requires >= 0.75 version of userspace rbd utility.
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200425 */
Ilya Dryomov3cfa3b12017-11-13 10:35:40 +0100426static bool single_major = true;
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200427module_param(single_major, bool, S_IRUGO);
Ilya Dryomov3cfa3b12017-11-13 10:35:40 +0100428MODULE_PARM_DESC(single_major, "Use a single major number for all rbd devices (default: true)");
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200429
Alex Elderf0f8cef2012-01-29 13:57:44 -0600430static ssize_t rbd_add(struct bus_type *bus, const char *buf,
431 size_t count);
432static ssize_t rbd_remove(struct bus_type *bus, const char *buf,
433 size_t count);
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200434static ssize_t rbd_add_single_major(struct bus_type *bus, const char *buf,
435 size_t count);
436static ssize_t rbd_remove_single_major(struct bus_type *bus, const char *buf,
437 size_t count);
Ilya Dryomov6d69bb532015-10-11 19:38:00 +0200438static int rbd_dev_image_probe(struct rbd_device *rbd_dev, int depth);
Alex Elderf0f8cef2012-01-29 13:57:44 -0600439
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200440static int rbd_dev_id_to_minor(int dev_id)
441{
Ilya Dryomov7e513d42013-12-16 19:26:32 +0200442 return dev_id << RBD_SINGLE_MAJOR_PART_SHIFT;
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200443}
444
445static int minor_to_rbd_dev_id(int minor)
446{
Ilya Dryomov7e513d42013-12-16 19:26:32 +0200447 return minor >> RBD_SINGLE_MAJOR_PART_SHIFT;
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200448}
449
Ilya Dryomoved95b212016-08-12 16:40:02 +0200450static bool __rbd_is_lock_owner(struct rbd_device *rbd_dev)
451{
452 return rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED ||
453 rbd_dev->lock_state == RBD_LOCK_STATE_RELEASING;
454}
455
456static bool rbd_is_lock_owner(struct rbd_device *rbd_dev)
457{
458 bool is_lock_owner;
459
460 down_read(&rbd_dev->lock_rwsem);
461 is_lock_owner = __rbd_is_lock_owner(rbd_dev);
462 up_read(&rbd_dev->lock_rwsem);
463 return is_lock_owner;
464}
465
Ilya Dryomov8767b292017-03-02 19:56:57 +0100466static ssize_t rbd_supported_features_show(struct bus_type *bus, char *buf)
467{
468 return sprintf(buf, "0x%llx\n", RBD_FEATURES_SUPPORTED);
469}
470
Greg Kroah-Hartmanb15a21d2013-08-23 14:24:28 -0700471static BUS_ATTR(add, S_IWUSR, NULL, rbd_add);
472static BUS_ATTR(remove, S_IWUSR, NULL, rbd_remove);
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200473static BUS_ATTR(add_single_major, S_IWUSR, NULL, rbd_add_single_major);
474static BUS_ATTR(remove_single_major, S_IWUSR, NULL, rbd_remove_single_major);
Ilya Dryomov8767b292017-03-02 19:56:57 +0100475static BUS_ATTR(supported_features, S_IRUGO, rbd_supported_features_show, NULL);
Greg Kroah-Hartmanb15a21d2013-08-23 14:24:28 -0700476
477static struct attribute *rbd_bus_attrs[] = {
478 &bus_attr_add.attr,
479 &bus_attr_remove.attr,
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200480 &bus_attr_add_single_major.attr,
481 &bus_attr_remove_single_major.attr,
Ilya Dryomov8767b292017-03-02 19:56:57 +0100482 &bus_attr_supported_features.attr,
Greg Kroah-Hartmanb15a21d2013-08-23 14:24:28 -0700483 NULL,
Alex Elderf0f8cef2012-01-29 13:57:44 -0600484};
Ilya Dryomov92c76dc2013-12-13 15:28:57 +0200485
486static umode_t rbd_bus_is_visible(struct kobject *kobj,
487 struct attribute *attr, int index)
488{
Ilya Dryomov9b60e702013-12-13 15:28:57 +0200489 if (!single_major &&
490 (attr == &bus_attr_add_single_major.attr ||
491 attr == &bus_attr_remove_single_major.attr))
492 return 0;
493
Ilya Dryomov92c76dc2013-12-13 15:28:57 +0200494 return attr->mode;
495}
496
497static const struct attribute_group rbd_bus_group = {
498 .attrs = rbd_bus_attrs,
499 .is_visible = rbd_bus_is_visible,
500};
501__ATTRIBUTE_GROUPS(rbd_bus);
Alex Elderf0f8cef2012-01-29 13:57:44 -0600502
503static struct bus_type rbd_bus_type = {
504 .name = "rbd",
Greg Kroah-Hartmanb15a21d2013-08-23 14:24:28 -0700505 .bus_groups = rbd_bus_groups,
Alex Elderf0f8cef2012-01-29 13:57:44 -0600506};
507
508static void rbd_root_dev_release(struct device *dev)
509{
510}
511
512static struct device rbd_root_dev = {
513 .init_name = "rbd",
514 .release = rbd_root_dev_release,
515};
516
Alex Elder06ecc6c2012-11-01 10:17:15 -0500517static __printf(2, 3)
518void rbd_warn(struct rbd_device *rbd_dev, const char *fmt, ...)
519{
520 struct va_format vaf;
521 va_list args;
522
523 va_start(args, fmt);
524 vaf.fmt = fmt;
525 vaf.va = &args;
526
527 if (!rbd_dev)
528 printk(KERN_WARNING "%s: %pV\n", RBD_DRV_NAME, &vaf);
529 else if (rbd_dev->disk)
530 printk(KERN_WARNING "%s: %s: %pV\n",
531 RBD_DRV_NAME, rbd_dev->disk->disk_name, &vaf);
532 else if (rbd_dev->spec && rbd_dev->spec->image_name)
533 printk(KERN_WARNING "%s: image %s: %pV\n",
534 RBD_DRV_NAME, rbd_dev->spec->image_name, &vaf);
535 else if (rbd_dev->spec && rbd_dev->spec->image_id)
536 printk(KERN_WARNING "%s: id %s: %pV\n",
537 RBD_DRV_NAME, rbd_dev->spec->image_id, &vaf);
538 else /* punt */
539 printk(KERN_WARNING "%s: rbd_dev %p: %pV\n",
540 RBD_DRV_NAME, rbd_dev, &vaf);
541 va_end(args);
542}
543
Alex Elderaafb2302012-09-06 16:00:54 -0500544#ifdef RBD_DEBUG
545#define rbd_assert(expr) \
546 if (unlikely(!(expr))) { \
547 printk(KERN_ERR "\nAssertion failure in %s() " \
548 "at line %d:\n\n" \
549 "\trbd_assert(%s);\n\n", \
550 __func__, __LINE__, #expr); \
551 BUG(); \
552 }
553#else /* !RBD_DEBUG */
554# define rbd_assert(expr) ((void) 0)
555#endif /* !RBD_DEBUG */
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800556
Alex Elder05a46af2013-04-26 15:44:36 -0500557static void rbd_dev_remove_parent(struct rbd_device *rbd_dev);
Alex Elder8b3e1a52013-01-24 16:13:36 -0600558
Alex Eldercc4a38bd2013-04-30 00:44:33 -0500559static int rbd_dev_refresh(struct rbd_device *rbd_dev);
Alex Elder2df3fac2013-05-06 09:51:30 -0500560static int rbd_dev_v2_header_onetime(struct rbd_device *rbd_dev);
Ilya Dryomova720ae02014-07-23 17:11:19 +0400561static int rbd_dev_header_info(struct rbd_device *rbd_dev);
Ilya Dryomove8f59b52014-07-24 10:42:13 +0400562static int rbd_dev_v2_parent_info(struct rbd_device *rbd_dev);
Alex Elder54cac612013-04-30 00:44:33 -0500563static const char *rbd_dev_v2_snap_name(struct rbd_device *rbd_dev,
564 u64 snap_id);
Alex Elder2ad3d712013-04-30 00:44:33 -0500565static int _rbd_dev_v2_snap_size(struct rbd_device *rbd_dev, u64 snap_id,
566 u8 *order, u64 *snap_size);
567static int _rbd_dev_v2_snap_features(struct rbd_device *rbd_dev, u64 snap_id,
568 u64 *snap_features);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700569
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700570static int rbd_open(struct block_device *bdev, fmode_t mode)
571{
Alex Elderf0f8cef2012-01-29 13:57:44 -0600572 struct rbd_device *rbd_dev = bdev->bd_disk->private_data;
Alex Elderb82d1672013-01-14 12:43:31 -0600573 bool removing = false;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700574
Alex Eldera14ea262013-02-05 13:23:12 -0600575 spin_lock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600576 if (test_bit(RBD_DEV_FLAG_REMOVING, &rbd_dev->flags))
577 removing = true;
578 else
579 rbd_dev->open_count++;
Alex Eldera14ea262013-02-05 13:23:12 -0600580 spin_unlock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600581 if (removing)
582 return -ENOENT;
583
Alex Elderc3e946c2012-11-16 09:29:16 -0600584 (void) get_device(&rbd_dev->dev);
Alex Elder340c7a22012-08-10 13:12:07 -0700585
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700586 return 0;
587}
588
Al Virodb2a1442013-05-05 21:52:57 -0400589static void rbd_release(struct gendisk *disk, fmode_t mode)
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800590{
591 struct rbd_device *rbd_dev = disk->private_data;
Alex Elderb82d1672013-01-14 12:43:31 -0600592 unsigned long open_count_before;
593
Alex Eldera14ea262013-02-05 13:23:12 -0600594 spin_lock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600595 open_count_before = rbd_dev->open_count--;
Alex Eldera14ea262013-02-05 13:23:12 -0600596 spin_unlock_irq(&rbd_dev->lock);
Alex Elderb82d1672013-01-14 12:43:31 -0600597 rbd_assert(open_count_before > 0);
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800598
Alex Elderc3e946c2012-11-16 09:29:16 -0600599 put_device(&rbd_dev->dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800600}
601
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800602static int rbd_ioctl_set_ro(struct rbd_device *rbd_dev, unsigned long arg)
603{
Ilya Dryomov1de797b2017-10-12 12:35:19 +0200604 int ro;
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800605
Ilya Dryomov1de797b2017-10-12 12:35:19 +0200606 if (get_user(ro, (int __user *)arg))
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800607 return -EFAULT;
608
Ilya Dryomov1de797b2017-10-12 12:35:19 +0200609 /* Snapshots can't be marked read-write */
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800610 if (rbd_dev->spec->snap_id != CEPH_NOSNAP && !ro)
611 return -EROFS;
612
Ilya Dryomov1de797b2017-10-12 12:35:19 +0200613 /* Let blkdev_roset() handle it */
614 return -ENOTTY;
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800615}
616
617static int rbd_ioctl(struct block_device *bdev, fmode_t mode,
618 unsigned int cmd, unsigned long arg)
619{
620 struct rbd_device *rbd_dev = bdev->bd_disk->private_data;
Ilya Dryomov1de797b2017-10-12 12:35:19 +0200621 int ret;
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800622
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800623 switch (cmd) {
624 case BLKROSET:
625 ret = rbd_ioctl_set_ro(rbd_dev, arg);
626 break;
627 default:
628 ret = -ENOTTY;
629 }
630
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800631 return ret;
632}
633
634#ifdef CONFIG_COMPAT
635static int rbd_compat_ioctl(struct block_device *bdev, fmode_t mode,
636 unsigned int cmd, unsigned long arg)
637{
638 return rbd_ioctl(bdev, mode, cmd, arg);
639}
640#endif /* CONFIG_COMPAT */
641
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700642static const struct block_device_operations rbd_bd_ops = {
643 .owner = THIS_MODULE,
644 .open = rbd_open,
Yehuda Sadehdfc56062010-11-19 14:51:04 -0800645 .release = rbd_release,
Guangliang Zhao131fd9f2013-09-24 11:25:36 +0800646 .ioctl = rbd_ioctl,
647#ifdef CONFIG_COMPAT
648 .compat_ioctl = rbd_compat_ioctl,
649#endif
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700650};
651
652/*
Alex Elder7262cfc2013-05-16 15:04:20 -0500653 * Initialize an rbd client instance. Success or not, this function
Alex Eldercfbf6372013-05-31 17:40:45 -0500654 * consumes ceph_opts. Caller holds client_mutex.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700655 */
Alex Elderf8c38922012-08-10 13:12:07 -0700656static struct rbd_client *rbd_client_create(struct ceph_options *ceph_opts)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700657{
658 struct rbd_client *rbdc;
659 int ret = -ENOMEM;
660
Alex Elder37206ee2013-02-20 17:32:08 -0600661 dout("%s:\n", __func__);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700662 rbdc = kmalloc(sizeof(struct rbd_client), GFP_KERNEL);
663 if (!rbdc)
664 goto out_opt;
665
666 kref_init(&rbdc->kref);
667 INIT_LIST_HEAD(&rbdc->node);
668
Ilya Dryomov74da4a0f2017-03-03 18:16:07 +0100669 rbdc->client = ceph_create_client(ceph_opts, rbdc);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700670 if (IS_ERR(rbdc->client))
Alex Elder08f75462013-05-29 11:19:00 -0500671 goto out_rbdc;
Alex Elder43ae4702012-07-03 16:01:18 -0500672 ceph_opts = NULL; /* Now rbdc->client is responsible for ceph_opts */
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700673
674 ret = ceph_open_session(rbdc->client);
675 if (ret < 0)
Alex Elder08f75462013-05-29 11:19:00 -0500676 goto out_client;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700677
Alex Elder432b8582012-01-29 13:57:44 -0600678 spin_lock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700679 list_add_tail(&rbdc->node, &rbd_client_list);
Alex Elder432b8582012-01-29 13:57:44 -0600680 spin_unlock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700681
Alex Elder37206ee2013-02-20 17:32:08 -0600682 dout("%s: rbdc %p\n", __func__, rbdc);
Alex Elderbc534d82012-01-29 13:57:44 -0600683
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700684 return rbdc;
Alex Elder08f75462013-05-29 11:19:00 -0500685out_client:
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700686 ceph_destroy_client(rbdc->client);
Alex Elder08f75462013-05-29 11:19:00 -0500687out_rbdc:
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700688 kfree(rbdc);
689out_opt:
Alex Elder43ae4702012-07-03 16:01:18 -0500690 if (ceph_opts)
691 ceph_destroy_options(ceph_opts);
Alex Elder37206ee2013-02-20 17:32:08 -0600692 dout("%s: error %d\n", __func__, ret);
693
Vasiliy Kulikov28f259b2010-09-26 12:59:37 +0400694 return ERR_PTR(ret);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700695}
696
Alex Elder2f82ee52012-10-30 19:40:33 -0500697static struct rbd_client *__rbd_get_client(struct rbd_client *rbdc)
698{
699 kref_get(&rbdc->kref);
700
701 return rbdc;
702}
703
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700704/*
Alex Elder1f7ba332012-08-10 13:12:07 -0700705 * Find a ceph client with specific addr and configuration. If
706 * found, bump its reference count.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700707 */
Alex Elder1f7ba332012-08-10 13:12:07 -0700708static struct rbd_client *rbd_client_find(struct ceph_options *ceph_opts)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700709{
710 struct rbd_client *client_node;
Alex Elder1f7ba332012-08-10 13:12:07 -0700711 bool found = false;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700712
Alex Elder43ae4702012-07-03 16:01:18 -0500713 if (ceph_opts->flags & CEPH_OPT_NOSHARE)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700714 return NULL;
715
Alex Elder1f7ba332012-08-10 13:12:07 -0700716 spin_lock(&rbd_client_list_lock);
717 list_for_each_entry(client_node, &rbd_client_list, node) {
718 if (!ceph_compare_options(ceph_opts, client_node->client)) {
Alex Elder2f82ee52012-10-30 19:40:33 -0500719 __rbd_get_client(client_node);
720
Alex Elder1f7ba332012-08-10 13:12:07 -0700721 found = true;
722 break;
723 }
724 }
725 spin_unlock(&rbd_client_list_lock);
726
727 return found ? client_node : NULL;
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700728}
729
730/*
Ilya Dryomov210c1042015-06-22 13:24:48 +0300731 * (Per device) rbd map options
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700732 */
733enum {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300734 Opt_queue_depth,
Dongsheng Yang34f55d02018-03-26 10:22:55 -0400735 Opt_lock_timeout,
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700736 Opt_last_int,
737 /* int args above */
738 Opt_last_string,
739 /* string args above */
Alex Eldercc0538b2012-08-10 13:12:07 -0700740 Opt_read_only,
741 Opt_read_write,
Ilya Dryomov80de1912016-09-20 14:23:17 +0200742 Opt_lock_on_read,
Ilya Dryomove010dd02017-04-13 12:17:39 +0200743 Opt_exclusive,
Ilya Dryomov210c1042015-06-22 13:24:48 +0300744 Opt_err
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700745};
746
Alex Elder43ae4702012-07-03 16:01:18 -0500747static match_table_t rbd_opts_tokens = {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300748 {Opt_queue_depth, "queue_depth=%d"},
Dongsheng Yang34f55d02018-03-26 10:22:55 -0400749 {Opt_lock_timeout, "lock_timeout=%d"},
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700750 /* int args above */
751 /* string args above */
Alex Elderbe466c12012-10-22 11:31:26 -0500752 {Opt_read_only, "read_only"},
Alex Eldercc0538b2012-08-10 13:12:07 -0700753 {Opt_read_only, "ro"}, /* Alternate spelling */
754 {Opt_read_write, "read_write"},
755 {Opt_read_write, "rw"}, /* Alternate spelling */
Ilya Dryomov80de1912016-09-20 14:23:17 +0200756 {Opt_lock_on_read, "lock_on_read"},
Ilya Dryomove010dd02017-04-13 12:17:39 +0200757 {Opt_exclusive, "exclusive"},
Ilya Dryomov210c1042015-06-22 13:24:48 +0300758 {Opt_err, NULL}
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700759};
760
Alex Elder98571b52013-01-20 14:44:42 -0600761struct rbd_options {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300762 int queue_depth;
Dongsheng Yang34f55d02018-03-26 10:22:55 -0400763 unsigned long lock_timeout;
Alex Elder98571b52013-01-20 14:44:42 -0600764 bool read_only;
Ilya Dryomov80de1912016-09-20 14:23:17 +0200765 bool lock_on_read;
Ilya Dryomove010dd02017-04-13 12:17:39 +0200766 bool exclusive;
Alex Elder98571b52013-01-20 14:44:42 -0600767};
768
Ilya Dryomovb5584182015-06-23 16:21:19 +0300769#define RBD_QUEUE_DEPTH_DEFAULT BLKDEV_MAX_RQ
Dongsheng Yang34f55d02018-03-26 10:22:55 -0400770#define RBD_LOCK_TIMEOUT_DEFAULT 0 /* no timeout */
Alex Elder98571b52013-01-20 14:44:42 -0600771#define RBD_READ_ONLY_DEFAULT false
Ilya Dryomov80de1912016-09-20 14:23:17 +0200772#define RBD_LOCK_ON_READ_DEFAULT false
Ilya Dryomove010dd02017-04-13 12:17:39 +0200773#define RBD_EXCLUSIVE_DEFAULT false
Alex Elder98571b52013-01-20 14:44:42 -0600774
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700775static int parse_rbd_opts_token(char *c, void *private)
776{
Alex Elder43ae4702012-07-03 16:01:18 -0500777 struct rbd_options *rbd_opts = private;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700778 substring_t argstr[MAX_OPT_ARGS];
779 int token, intval, ret;
780
Alex Elder43ae4702012-07-03 16:01:18 -0500781 token = match_token(c, rbd_opts_tokens, argstr);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700782 if (token < Opt_last_int) {
783 ret = match_int(&argstr[0], &intval);
784 if (ret < 0) {
Ilya Dryomov210c1042015-06-22 13:24:48 +0300785 pr_err("bad mount option arg (not int) at '%s'\n", c);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700786 return ret;
787 }
788 dout("got int token %d val %d\n", token, intval);
789 } else if (token > Opt_last_int && token < Opt_last_string) {
Ilya Dryomov210c1042015-06-22 13:24:48 +0300790 dout("got string token %d val %s\n", token, argstr[0].from);
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700791 } else {
792 dout("got token %d\n", token);
793 }
794
795 switch (token) {
Ilya Dryomovb5584182015-06-23 16:21:19 +0300796 case Opt_queue_depth:
797 if (intval < 1) {
798 pr_err("queue_depth out of range\n");
799 return -EINVAL;
800 }
801 rbd_opts->queue_depth = intval;
802 break;
Dongsheng Yang34f55d02018-03-26 10:22:55 -0400803 case Opt_lock_timeout:
804 /* 0 is "wait forever" (i.e. infinite timeout) */
805 if (intval < 0 || intval > INT_MAX / 1000) {
806 pr_err("lock_timeout out of range\n");
807 return -EINVAL;
808 }
809 rbd_opts->lock_timeout = msecs_to_jiffies(intval * 1000);
810 break;
Alex Eldercc0538b2012-08-10 13:12:07 -0700811 case Opt_read_only:
812 rbd_opts->read_only = true;
813 break;
814 case Opt_read_write:
815 rbd_opts->read_only = false;
816 break;
Ilya Dryomov80de1912016-09-20 14:23:17 +0200817 case Opt_lock_on_read:
818 rbd_opts->lock_on_read = true;
819 break;
Ilya Dryomove010dd02017-04-13 12:17:39 +0200820 case Opt_exclusive:
821 rbd_opts->exclusive = true;
822 break;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700823 default:
Ilya Dryomov210c1042015-06-22 13:24:48 +0300824 /* libceph prints "bad option" msg */
825 return -EINVAL;
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700826 }
Ilya Dryomov210c1042015-06-22 13:24:48 +0300827
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700828 return 0;
829}
830
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800831static char* obj_op_name(enum obj_operation_type op_type)
832{
833 switch (op_type) {
834 case OBJ_OP_READ:
835 return "read";
836 case OBJ_OP_WRITE:
837 return "write";
Guangliang Zhao90e98c52014-04-01 22:22:16 +0800838 case OBJ_OP_DISCARD:
839 return "discard";
Guangliang Zhao6d2940c2014-03-13 11:21:35 +0800840 default:
841 return "???";
842 }
843}
844
Yehuda Sadeh59c2be12011-03-21 15:10:11 -0700845/*
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700846 * Destroy ceph client
Alex Elderd23a4b32012-01-29 13:57:43 -0600847 *
Alex Elder432b8582012-01-29 13:57:44 -0600848 * Caller must hold rbd_client_list_lock.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700849 */
850static void rbd_client_release(struct kref *kref)
851{
852 struct rbd_client *rbdc = container_of(kref, struct rbd_client, kref);
853
Alex Elder37206ee2013-02-20 17:32:08 -0600854 dout("%s: rbdc %p\n", __func__, rbdc);
Alex Eldercd9d9f52012-04-04 13:35:44 -0500855 spin_lock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700856 list_del(&rbdc->node);
Alex Eldercd9d9f52012-04-04 13:35:44 -0500857 spin_unlock(&rbd_client_list_lock);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700858
859 ceph_destroy_client(rbdc->client);
860 kfree(rbdc);
861}
862
863/*
864 * Drop reference to ceph client node. If it's not referenced anymore, release
865 * it.
866 */
Alex Elder9d3997f2012-10-25 23:34:42 -0500867static void rbd_put_client(struct rbd_client *rbdc)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700868{
Alex Elderc53d5892012-10-25 23:34:42 -0500869 if (rbdc)
870 kref_put(&rbdc->kref, rbd_client_release);
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700871}
872
Ilya Dryomovdd435852018-02-22 13:43:24 +0100873static int wait_for_latest_osdmap(struct ceph_client *client)
874{
875 u64 newest_epoch;
876 int ret;
877
878 ret = ceph_monc_get_version(&client->monc, "osdmap", &newest_epoch);
879 if (ret)
880 return ret;
881
882 if (client->osdc.osdmap->epoch >= newest_epoch)
883 return 0;
884
885 ceph_osdc_maybe_request_map(&client->osdc);
886 return ceph_monc_wait_osdmap(&client->monc, newest_epoch,
887 client->options->mount_timeout);
888}
889
Ilya Dryomov5feb0d8d2018-02-22 13:19:04 +0100890/*
891 * Get a ceph client with specific addr and configuration, if one does
892 * not exist create it. Either way, ceph_opts is consumed by this
893 * function.
894 */
895static struct rbd_client *rbd_get_client(struct ceph_options *ceph_opts)
896{
897 struct rbd_client *rbdc;
Ilya Dryomovdd435852018-02-22 13:43:24 +0100898 int ret;
Ilya Dryomov5feb0d8d2018-02-22 13:19:04 +0100899
900 mutex_lock_nested(&client_mutex, SINGLE_DEPTH_NESTING);
901 rbdc = rbd_client_find(ceph_opts);
Ilya Dryomovdd435852018-02-22 13:43:24 +0100902 if (rbdc) {
Ilya Dryomov5feb0d8d2018-02-22 13:19:04 +0100903 ceph_destroy_options(ceph_opts);
Ilya Dryomovdd435852018-02-22 13:43:24 +0100904
905 /*
906 * Using an existing client. Make sure ->pg_pools is up to
907 * date before we look up the pool id in do_rbd_add().
908 */
909 ret = wait_for_latest_osdmap(rbdc->client);
910 if (ret) {
911 rbd_warn(NULL, "failed to get latest osdmap: %d", ret);
912 rbd_put_client(rbdc);
913 rbdc = ERR_PTR(ret);
914 }
915 } else {
Ilya Dryomov5feb0d8d2018-02-22 13:19:04 +0100916 rbdc = rbd_client_create(ceph_opts);
Ilya Dryomovdd435852018-02-22 13:43:24 +0100917 }
Ilya Dryomov5feb0d8d2018-02-22 13:19:04 +0100918 mutex_unlock(&client_mutex);
919
920 return rbdc;
921}
922
Alex Eldera30b71b2012-07-10 20:30:11 -0500923static bool rbd_image_format_valid(u32 image_format)
924{
925 return image_format == 1 || image_format == 2;
926}
927
Alex Elder8e94af82012-07-25 09:32:40 -0500928static bool rbd_dev_ondisk_valid(struct rbd_image_header_ondisk *ondisk)
929{
Alex Elder103a1502012-08-02 11:29:45 -0500930 size_t size;
931 u32 snap_count;
932
933 /* The header has to start with the magic rbd header text */
934 if (memcmp(&ondisk->text, RBD_HEADER_TEXT, sizeof (RBD_HEADER_TEXT)))
935 return false;
936
Alex Elderdb2388b2012-10-20 22:17:27 -0500937 /* The bio layer requires at least sector-sized I/O */
938
939 if (ondisk->options.order < SECTOR_SHIFT)
940 return false;
941
942 /* If we use u64 in a few spots we may be able to loosen this */
943
944 if (ondisk->options.order > 8 * sizeof (int) - 1)
945 return false;
946
Alex Elder103a1502012-08-02 11:29:45 -0500947 /*
948 * The size of a snapshot header has to fit in a size_t, and
949 * that limits the number of snapshots.
950 */
951 snap_count = le32_to_cpu(ondisk->snap_count);
952 size = SIZE_MAX - sizeof (struct ceph_snap_context);
953 if (snap_count > size / sizeof (__le64))
954 return false;
955
956 /*
957 * Not only that, but the size of the entire the snapshot
958 * header must also be representable in a size_t.
959 */
960 size -= snap_count * sizeof (__le64);
961 if ((u64) size < le64_to_cpu(ondisk->snap_names_len))
962 return false;
963
964 return true;
Alex Elder8e94af82012-07-25 09:32:40 -0500965}
966
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700967/*
Ilya Dryomov5bc3fb12017-01-25 18:16:22 +0100968 * returns the size of an object in the image
969 */
970static u32 rbd_obj_bytes(struct rbd_image_header *header)
971{
972 return 1U << header->obj_order;
973}
974
Ilya Dryomov263423f2017-01-25 18:16:22 +0100975static void rbd_init_layout(struct rbd_device *rbd_dev)
976{
977 if (rbd_dev->header.stripe_unit == 0 ||
978 rbd_dev->header.stripe_count == 0) {
979 rbd_dev->header.stripe_unit = rbd_obj_bytes(&rbd_dev->header);
980 rbd_dev->header.stripe_count = 1;
981 }
982
983 rbd_dev->layout.stripe_unit = rbd_dev->header.stripe_unit;
984 rbd_dev->layout.stripe_count = rbd_dev->header.stripe_count;
985 rbd_dev->layout.object_size = rbd_obj_bytes(&rbd_dev->header);
Ilya Dryomov7e973322017-01-25 18:16:22 +0100986 rbd_dev->layout.pool_id = rbd_dev->header.data_pool_id == CEPH_NOPOOL ?
987 rbd_dev->spec->pool_id : rbd_dev->header.data_pool_id;
Ilya Dryomov263423f2017-01-25 18:16:22 +0100988 RCU_INIT_POINTER(rbd_dev->layout.pool_ns, NULL);
989}
990
Ilya Dryomov5bc3fb12017-01-25 18:16:22 +0100991/*
Alex Elderbb23e372013-05-06 09:51:29 -0500992 * Fill an rbd image header with information from the given format 1
993 * on-disk header.
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700994 */
Alex Elder662518b2013-05-06 09:51:29 -0500995static int rbd_header_from_disk(struct rbd_device *rbd_dev,
Alex Elder4156d992012-08-02 11:29:46 -0500996 struct rbd_image_header_ondisk *ondisk)
Yehuda Sadeh602adf42010-08-12 16:11:25 -0700997{
Alex Elder662518b2013-05-06 09:51:29 -0500998 struct rbd_image_header *header = &rbd_dev->header;
Alex Elderbb23e372013-05-06 09:51:29 -0500999 bool first_time = header->object_prefix == NULL;
1000 struct ceph_snap_context *snapc;
1001 char *object_prefix = NULL;
1002 char *snap_names = NULL;
1003 u64 *snap_sizes = NULL;
Alex Elderccece232012-07-10 20:30:10 -05001004 u32 snap_count;
Alex Elderbb23e372013-05-06 09:51:29 -05001005 int ret = -ENOMEM;
Alex Elder621901d2012-08-23 23:22:06 -05001006 u32 i;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001007
Alex Elderbb23e372013-05-06 09:51:29 -05001008 /* Allocate this now to avoid having to handle failure below */
1009
1010 if (first_time) {
Ilya Dryomov848d7962017-01-25 18:16:21 +01001011 object_prefix = kstrndup(ondisk->object_prefix,
1012 sizeof(ondisk->object_prefix),
1013 GFP_KERNEL);
Alex Elderbb23e372013-05-06 09:51:29 -05001014 if (!object_prefix)
1015 return -ENOMEM;
Alex Elderbb23e372013-05-06 09:51:29 -05001016 }
1017
1018 /* Allocate the snapshot context and fill it in */
Alex Elder6a523252012-07-19 17:12:59 -05001019
Alex Elder103a1502012-08-02 11:29:45 -05001020 snap_count = le32_to_cpu(ondisk->snap_count);
Alex Elderbb23e372013-05-06 09:51:29 -05001021 snapc = ceph_create_snap_context(snap_count, GFP_KERNEL);
1022 if (!snapc)
1023 goto out_err;
1024 snapc->seq = le64_to_cpu(ondisk->snap_seq);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001025 if (snap_count) {
Alex Elderbb23e372013-05-06 09:51:29 -05001026 struct rbd_image_snap_ondisk *snaps;
Alex Elderf785cc12012-08-23 23:22:06 -05001027 u64 snap_names_len = le64_to_cpu(ondisk->snap_names_len);
1028
Alex Elderbb23e372013-05-06 09:51:29 -05001029 /* We'll keep a copy of the snapshot names... */
Alex Elder621901d2012-08-23 23:22:06 -05001030
Alex Elderbb23e372013-05-06 09:51:29 -05001031 if (snap_names_len > (u64)SIZE_MAX)
1032 goto out_2big;
1033 snap_names = kmalloc(snap_names_len, GFP_KERNEL);
1034 if (!snap_names)
Alex Elder6a523252012-07-19 17:12:59 -05001035 goto out_err;
Alex Elderbb23e372013-05-06 09:51:29 -05001036
1037 /* ...as well as the array of their sizes. */
Markus Elfring88a25a52016-09-11 12:21:25 +02001038 snap_sizes = kmalloc_array(snap_count,
1039 sizeof(*header->snap_sizes),
1040 GFP_KERNEL);
Alex Elderbb23e372013-05-06 09:51:29 -05001041 if (!snap_sizes)
1042 goto out_err;
1043
Alex Elderf785cc12012-08-23 23:22:06 -05001044 /*
Alex Elderbb23e372013-05-06 09:51:29 -05001045 * Copy the names, and fill in each snapshot's id
1046 * and size.
1047 *
Alex Elder99a41eb2013-05-06 09:51:30 -05001048 * Note that rbd_dev_v1_header_info() guarantees the
Alex Elderbb23e372013-05-06 09:51:29 -05001049 * ondisk buffer we're working with has
Alex Elderf785cc12012-08-23 23:22:06 -05001050 * snap_names_len bytes beyond the end of the
1051 * snapshot id array, this memcpy() is safe.
1052 */
Alex Elderbb23e372013-05-06 09:51:29 -05001053 memcpy(snap_names, &ondisk->snaps[snap_count], snap_names_len);
1054 snaps = ondisk->snaps;
1055 for (i = 0; i < snap_count; i++) {
1056 snapc->snaps[i] = le64_to_cpu(snaps[i].id);
1057 snap_sizes[i] = le64_to_cpu(snaps[i].image_size);
1058 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001059 }
Alex Elder849b4262012-07-09 21:04:24 -05001060
Alex Elderbb23e372013-05-06 09:51:29 -05001061 /* We won't fail any more, fill in the header */
Alex Elder6a523252012-07-19 17:12:59 -05001062
Alex Elderbb23e372013-05-06 09:51:29 -05001063 if (first_time) {
1064 header->object_prefix = object_prefix;
1065 header->obj_order = ondisk->options.order;
Ilya Dryomov263423f2017-01-25 18:16:22 +01001066 rbd_init_layout(rbd_dev);
Alex Elder662518b2013-05-06 09:51:29 -05001067 } else {
1068 ceph_put_snap_context(header->snapc);
1069 kfree(header->snap_names);
1070 kfree(header->snap_sizes);
Alex Elderbb23e372013-05-06 09:51:29 -05001071 }
1072
1073 /* The remaining fields always get updated (when we refresh) */
Alex Elder621901d2012-08-23 23:22:06 -05001074
Alex Elderf84344f2012-08-31 17:29:51 -05001075 header->image_size = le64_to_cpu(ondisk->image_size);
Alex Elderbb23e372013-05-06 09:51:29 -05001076 header->snapc = snapc;
1077 header->snap_names = snap_names;
1078 header->snap_sizes = snap_sizes;
Alex Elder468521c2013-04-26 09:43:47 -05001079
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001080 return 0;
Alex Elderbb23e372013-05-06 09:51:29 -05001081out_2big:
1082 ret = -EIO;
Alex Elder6a523252012-07-19 17:12:59 -05001083out_err:
Alex Elderbb23e372013-05-06 09:51:29 -05001084 kfree(snap_sizes);
1085 kfree(snap_names);
1086 ceph_put_snap_context(snapc);
1087 kfree(object_prefix);
Alex Elderccece232012-07-10 20:30:10 -05001088
Alex Elderbb23e372013-05-06 09:51:29 -05001089 return ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001090}
1091
Alex Elder9682fc62013-04-30 00:44:33 -05001092static const char *_rbd_dev_v1_snap_name(struct rbd_device *rbd_dev, u32 which)
1093{
1094 const char *snap_name;
1095
1096 rbd_assert(which < rbd_dev->header.snapc->num_snaps);
1097
1098 /* Skip over names until we find the one we are looking for */
1099
1100 snap_name = rbd_dev->header.snap_names;
1101 while (which--)
1102 snap_name += strlen(snap_name) + 1;
1103
1104 return kstrdup(snap_name, GFP_KERNEL);
1105}
1106
Alex Elder30d1cff2013-05-01 12:43:03 -05001107/*
1108 * Snapshot id comparison function for use with qsort()/bsearch().
1109 * Note that result is for snapshots in *descending* order.
1110 */
1111static int snapid_compare_reverse(const void *s1, const void *s2)
1112{
1113 u64 snap_id1 = *(u64 *)s1;
1114 u64 snap_id2 = *(u64 *)s2;
1115
1116 if (snap_id1 < snap_id2)
1117 return 1;
1118 return snap_id1 == snap_id2 ? 0 : -1;
1119}
1120
1121/*
1122 * Search a snapshot context to see if the given snapshot id is
1123 * present.
1124 *
1125 * Returns the position of the snapshot id in the array if it's found,
1126 * or BAD_SNAP_INDEX otherwise.
1127 *
1128 * Note: The snapshot array is in kept sorted (by the osd) in
1129 * reverse order, highest snapshot id first.
1130 */
Alex Elder9682fc62013-04-30 00:44:33 -05001131static u32 rbd_dev_snap_index(struct rbd_device *rbd_dev, u64 snap_id)
1132{
1133 struct ceph_snap_context *snapc = rbd_dev->header.snapc;
Alex Elder30d1cff2013-05-01 12:43:03 -05001134 u64 *found;
Alex Elder9682fc62013-04-30 00:44:33 -05001135
Alex Elder30d1cff2013-05-01 12:43:03 -05001136 found = bsearch(&snap_id, &snapc->snaps, snapc->num_snaps,
1137 sizeof (snap_id), snapid_compare_reverse);
Alex Elder9682fc62013-04-30 00:44:33 -05001138
Alex Elder30d1cff2013-05-01 12:43:03 -05001139 return found ? (u32)(found - &snapc->snaps[0]) : BAD_SNAP_INDEX;
Alex Elder9682fc62013-04-30 00:44:33 -05001140}
1141
Alex Elder2ad3d712013-04-30 00:44:33 -05001142static const char *rbd_dev_v1_snap_name(struct rbd_device *rbd_dev,
1143 u64 snap_id)
Alex Elder54cac612013-04-30 00:44:33 -05001144{
1145 u32 which;
Josh Durginda6a6b62013-09-04 17:57:31 -07001146 const char *snap_name;
Alex Elder54cac612013-04-30 00:44:33 -05001147
1148 which = rbd_dev_snap_index(rbd_dev, snap_id);
1149 if (which == BAD_SNAP_INDEX)
Josh Durginda6a6b62013-09-04 17:57:31 -07001150 return ERR_PTR(-ENOENT);
Alex Elder54cac612013-04-30 00:44:33 -05001151
Josh Durginda6a6b62013-09-04 17:57:31 -07001152 snap_name = _rbd_dev_v1_snap_name(rbd_dev, which);
1153 return snap_name ? snap_name : ERR_PTR(-ENOMEM);
Alex Elder54cac612013-04-30 00:44:33 -05001154}
1155
Alex Elder9e15b772012-10-30 19:40:33 -05001156static const char *rbd_snap_name(struct rbd_device *rbd_dev, u64 snap_id)
1157{
Alex Elder9e15b772012-10-30 19:40:33 -05001158 if (snap_id == CEPH_NOSNAP)
1159 return RBD_SNAP_HEAD_NAME;
1160
Alex Elder54cac612013-04-30 00:44:33 -05001161 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
1162 if (rbd_dev->image_format == 1)
1163 return rbd_dev_v1_snap_name(rbd_dev, snap_id);
Alex Elder9e15b772012-10-30 19:40:33 -05001164
Alex Elder54cac612013-04-30 00:44:33 -05001165 return rbd_dev_v2_snap_name(rbd_dev, snap_id);
Alex Elder9e15b772012-10-30 19:40:33 -05001166}
1167
Alex Elder2ad3d712013-04-30 00:44:33 -05001168static int rbd_snap_size(struct rbd_device *rbd_dev, u64 snap_id,
1169 u64 *snap_size)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001170{
Alex Elder2ad3d712013-04-30 00:44:33 -05001171 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
1172 if (snap_id == CEPH_NOSNAP) {
1173 *snap_size = rbd_dev->header.image_size;
1174 } else if (rbd_dev->image_format == 1) {
1175 u32 which;
Alex Elder00f1f362012-02-07 12:03:36 -06001176
Alex Elder2ad3d712013-04-30 00:44:33 -05001177 which = rbd_dev_snap_index(rbd_dev, snap_id);
1178 if (which == BAD_SNAP_INDEX)
1179 return -ENOENT;
Alex Elder00f1f362012-02-07 12:03:36 -06001180
Alex Elder2ad3d712013-04-30 00:44:33 -05001181 *snap_size = rbd_dev->header.snap_sizes[which];
1182 } else {
1183 u64 size = 0;
1184 int ret;
1185
1186 ret = _rbd_dev_v2_snap_size(rbd_dev, snap_id, NULL, &size);
1187 if (ret)
1188 return ret;
1189
1190 *snap_size = size;
1191 }
1192 return 0;
1193}
1194
1195static int rbd_snap_features(struct rbd_device *rbd_dev, u64 snap_id,
1196 u64 *snap_features)
1197{
1198 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
1199 if (snap_id == CEPH_NOSNAP) {
1200 *snap_features = rbd_dev->header.features;
1201 } else if (rbd_dev->image_format == 1) {
1202 *snap_features = 0; /* No features for format 1 */
1203 } else {
1204 u64 features = 0;
1205 int ret;
1206
1207 ret = _rbd_dev_v2_snap_features(rbd_dev, snap_id, &features);
1208 if (ret)
1209 return ret;
1210
1211 *snap_features = features;
1212 }
1213 return 0;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001214}
1215
Alex Elderd1cf5782013-04-27 09:59:30 -05001216static int rbd_dev_mapping_set(struct rbd_device *rbd_dev)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001217{
Alex Elder8f4b7d92013-05-06 07:40:30 -05001218 u64 snap_id = rbd_dev->spec->snap_id;
Alex Elder2ad3d712013-04-30 00:44:33 -05001219 u64 size = 0;
1220 u64 features = 0;
1221 int ret;
Alex Elder8b0241f2013-04-25 23:15:08 -05001222
Alex Elder2ad3d712013-04-30 00:44:33 -05001223 ret = rbd_snap_size(rbd_dev, snap_id, &size);
1224 if (ret)
1225 return ret;
1226 ret = rbd_snap_features(rbd_dev, snap_id, &features);
1227 if (ret)
1228 return ret;
1229
1230 rbd_dev->mapping.size = size;
1231 rbd_dev->mapping.features = features;
1232
Alex Elder8b0241f2013-04-25 23:15:08 -05001233 return 0;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001234}
1235
Alex Elderd1cf5782013-04-27 09:59:30 -05001236static void rbd_dev_mapping_clear(struct rbd_device *rbd_dev)
1237{
1238 rbd_dev->mapping.size = 0;
1239 rbd_dev->mapping.features = 0;
Alex Elder200a6a82013-04-28 23:32:34 -05001240}
1241
Ilya Dryomov5359a172018-01-20 10:30:10 +01001242static void zero_bvec(struct bio_vec *bv)
Alex Elder65ccfe22012-08-09 10:33:26 -07001243{
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001244 void *buf;
Ilya Dryomov5359a172018-01-20 10:30:10 +01001245 unsigned long flags;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001246
Ilya Dryomov5359a172018-01-20 10:30:10 +01001247 buf = bvec_kmap_irq(bv, &flags);
1248 memset(buf, 0, bv->bv_len);
1249 flush_dcache_page(bv->bv_page);
1250 bvec_kunmap_irq(buf, &flags);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001251}
1252
Ilya Dryomov5359a172018-01-20 10:30:10 +01001253static void zero_bios(struct ceph_bio_iter *bio_pos, u32 off, u32 bytes)
Alex Elderb9434c52013-04-19 15:34:50 -05001254{
Ilya Dryomov5359a172018-01-20 10:30:10 +01001255 struct ceph_bio_iter it = *bio_pos;
Alex Elderb9434c52013-04-19 15:34:50 -05001256
Ilya Dryomov5359a172018-01-20 10:30:10 +01001257 ceph_bio_iter_advance(&it, off);
1258 ceph_bio_iter_advance_step(&it, bytes, ({
1259 zero_bvec(&bv);
1260 }));
Alex Elderb9434c52013-04-19 15:34:50 -05001261}
1262
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001263static void zero_bvecs(struct ceph_bvec_iter *bvec_pos, u32 off, u32 bytes)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001264{
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001265 struct ceph_bvec_iter it = *bvec_pos;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001266
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001267 ceph_bvec_iter_advance(&it, off);
1268 ceph_bvec_iter_advance_step(&it, bytes, ({
1269 zero_bvec(&bv);
1270 }));
Alex Elderf7760da2012-10-20 22:17:27 -05001271}
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001272
Alex Elderf7760da2012-10-20 22:17:27 -05001273/*
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001274 * Zero a range in @obj_req data buffer defined by a bio (list) or
Ilya Dryomovafb97882018-02-06 19:26:35 +01001275 * (private) bio_vec array.
Alex Elderf7760da2012-10-20 22:17:27 -05001276 *
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001277 * @off is relative to the start of the data buffer.
Alex Elderf7760da2012-10-20 22:17:27 -05001278 */
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001279static void rbd_obj_zero_range(struct rbd_obj_request *obj_req, u32 off,
1280 u32 bytes)
Alex Elderf7760da2012-10-20 22:17:27 -05001281{
Ilya Dryomovecc633c2018-02-01 11:50:47 +01001282 switch (obj_req->img_request->data_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001283 case OBJ_REQUEST_BIO:
1284 zero_bios(&obj_req->bio_pos, off, bytes);
1285 break;
1286 case OBJ_REQUEST_BVECS:
Ilya Dryomovafb97882018-02-06 19:26:35 +01001287 case OBJ_REQUEST_OWN_BVECS:
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001288 zero_bvecs(&obj_req->bvec_pos, off, bytes);
1289 break;
1290 default:
1291 rbd_assert(0);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07001292 }
Alex Elderbf0d5f502012-11-22 00:00:08 -06001293}
1294
1295static void rbd_obj_request_destroy(struct kref *kref);
1296static void rbd_obj_request_put(struct rbd_obj_request *obj_request)
1297{
1298 rbd_assert(obj_request != NULL);
Alex Elder37206ee2013-02-20 17:32:08 -06001299 dout("%s: obj %p (was %d)\n", __func__, obj_request,
Peter Zijlstra2c935bc2016-11-14 17:29:48 +01001300 kref_read(&obj_request->kref));
Alex Elderbf0d5f502012-11-22 00:00:08 -06001301 kref_put(&obj_request->kref, rbd_obj_request_destroy);
1302}
1303
Alex Elder0f2d5be2014-04-26 14:21:44 +04001304static void rbd_img_request_get(struct rbd_img_request *img_request)
1305{
1306 dout("%s: img %p (was %d)\n", __func__, img_request,
Peter Zijlstra2c935bc2016-11-14 17:29:48 +01001307 kref_read(&img_request->kref));
Alex Elder0f2d5be2014-04-26 14:21:44 +04001308 kref_get(&img_request->kref);
1309}
1310
Alex Elderbf0d5f502012-11-22 00:00:08 -06001311static void rbd_img_request_destroy(struct kref *kref);
1312static void rbd_img_request_put(struct rbd_img_request *img_request)
1313{
1314 rbd_assert(img_request != NULL);
Alex Elder37206ee2013-02-20 17:32:08 -06001315 dout("%s: img %p (was %d)\n", __func__, img_request,
Peter Zijlstra2c935bc2016-11-14 17:29:48 +01001316 kref_read(&img_request->kref));
Ilya Dryomove93aca02018-02-06 19:26:35 +01001317 kref_put(&img_request->kref, rbd_img_request_destroy);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001318}
1319
1320static inline void rbd_img_obj_request_add(struct rbd_img_request *img_request,
1321 struct rbd_obj_request *obj_request)
1322{
Alex Elder25dcf952013-01-25 17:08:55 -06001323 rbd_assert(obj_request->img_request == NULL);
1324
Alex Elderb155e862013-04-15 14:50:37 -05001325 /* Image request now owns object's original reference */
Alex Elderbf0d5f502012-11-22 00:00:08 -06001326 obj_request->img_request = img_request;
Alex Elder25dcf952013-01-25 17:08:55 -06001327 img_request->obj_request_count++;
Ilya Dryomov7114eda2018-02-01 11:50:47 +01001328 img_request->pending_count++;
Ilya Dryomov15961b42018-02-01 11:50:47 +01001329 dout("%s: img %p obj %p\n", __func__, img_request, obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001330}
1331
1332static inline void rbd_img_obj_request_del(struct rbd_img_request *img_request,
1333 struct rbd_obj_request *obj_request)
1334{
Ilya Dryomov15961b42018-02-01 11:50:47 +01001335 dout("%s: img %p obj %p\n", __func__, img_request, obj_request);
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001336 list_del(&obj_request->ex.oe_item);
Alex Elder25dcf952013-01-25 17:08:55 -06001337 rbd_assert(img_request->obj_request_count > 0);
1338 img_request->obj_request_count--;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001339 rbd_assert(obj_request->img_request == img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001340 rbd_obj_request_put(obj_request);
1341}
1342
Ilya Dryomov980917f2016-09-12 18:59:42 +02001343static void rbd_obj_request_submit(struct rbd_obj_request *obj_request)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001344{
Ilya Dryomov980917f2016-09-12 18:59:42 +02001345 struct ceph_osd_request *osd_req = obj_request->osd_req;
1346
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001347 dout("%s %p object_no %016llx %llu~%llu osd_req %p\n", __func__,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001348 obj_request, obj_request->ex.oe_objno, obj_request->ex.oe_off,
1349 obj_request->ex.oe_len, osd_req);
Ilya Dryomov980917f2016-09-12 18:59:42 +02001350 ceph_osdc_start_request(osd_req->r_osdc, osd_req, false);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001351}
1352
Alex Elder0c425242013-02-08 09:55:49 -06001353/*
1354 * The default/initial value for all image request flags is 0. Each
1355 * is conditionally set to 1 at image request initialization time
1356 * and currently never change thereafter.
1357 */
Alex Elderd0b2e942013-01-24 16:13:36 -06001358static void img_request_layered_set(struct rbd_img_request *img_request)
1359{
1360 set_bit(IMG_REQ_LAYERED, &img_request->flags);
1361 smp_mb();
1362}
1363
Alex Eldera2acd002013-05-08 22:50:04 -05001364static void img_request_layered_clear(struct rbd_img_request *img_request)
1365{
1366 clear_bit(IMG_REQ_LAYERED, &img_request->flags);
1367 smp_mb();
1368}
1369
Alex Elderd0b2e942013-01-24 16:13:36 -06001370static bool img_request_layered_test(struct rbd_img_request *img_request)
1371{
1372 smp_mb();
1373 return test_bit(IMG_REQ_LAYERED, &img_request->flags) != 0;
1374}
1375
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001376static bool rbd_obj_is_entire(struct rbd_obj_request *obj_req)
Josh Durgin3b434a2a2014-04-04 17:32:15 -07001377{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001378 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
1379
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001380 return !obj_req->ex.oe_off &&
1381 obj_req->ex.oe_len == rbd_dev->layout.object_size;
Josh Durgin3b434a2a2014-04-04 17:32:15 -07001382}
1383
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001384static bool rbd_obj_is_tail(struct rbd_obj_request *obj_req)
Alex Elder6e2a4502013-03-27 09:16:30 -05001385{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001386 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
Alex Elderb9434c52013-04-19 15:34:50 -05001387
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001388 return obj_req->ex.oe_off + obj_req->ex.oe_len ==
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001389 rbd_dev->layout.object_size;
1390}
1391
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001392static u64 rbd_obj_img_extents_bytes(struct rbd_obj_request *obj_req)
1393{
1394 return ceph_file_extents_bytes(obj_req->img_extents,
1395 obj_req->num_img_extents);
1396}
1397
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001398static bool rbd_img_is_write(struct rbd_img_request *img_req)
1399{
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001400 switch (img_req->op_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001401 case OBJ_OP_READ:
1402 return false;
1403 case OBJ_OP_WRITE:
1404 case OBJ_OP_DISCARD:
1405 return true;
1406 default:
1407 rbd_assert(0);
Alex Elder6e2a4502013-03-27 09:16:30 -05001408 }
Alex Elder6e2a4502013-03-27 09:16:30 -05001409}
1410
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001411static void rbd_obj_handle_request(struct rbd_obj_request *obj_req);
Ilya Dryomov27617132015-07-16 17:36:11 +03001412
Ilya Dryomov85e084f2016-04-28 16:07:24 +02001413static void rbd_osd_req_callback(struct ceph_osd_request *osd_req)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001414{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001415 struct rbd_obj_request *obj_req = osd_req->r_priv;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001416
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001417 dout("%s osd_req %p result %d for obj_req %p\n", __func__, osd_req,
1418 osd_req->r_result, obj_req);
1419 rbd_assert(osd_req == obj_req->osd_req);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001420
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001421 obj_req->result = osd_req->r_result < 0 ? osd_req->r_result : 0;
1422 if (!obj_req->result && !rbd_img_is_write(obj_req->img_request))
1423 obj_req->xferred = osd_req->r_result;
1424 else
1425 /*
1426 * Writes aren't allowed to return a data payload. In some
1427 * guarded write cases (e.g. stat + zero on an empty object)
1428 * a stat response makes it through, but we don't care.
1429 */
1430 obj_req->xferred = 0;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001431
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001432 rbd_obj_handle_request(obj_req);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001433}
1434
Alex Elder9d4df012013-04-19 15:34:50 -05001435static void rbd_osd_req_format_read(struct rbd_obj_request *obj_request)
Alex Elder430c28c2013-04-03 21:32:51 -05001436{
Alex Elder8c042b02013-04-03 01:28:58 -05001437 struct ceph_osd_request *osd_req = obj_request->osd_req;
Alex Elder430c28c2013-04-03 21:32:51 -05001438
Ilya Dryomova162b302018-01-30 17:52:10 +01001439 osd_req->r_flags = CEPH_OSD_FLAG_READ;
Ilya Dryomov7c848832016-09-15 17:56:39 +02001440 osd_req->r_snapid = obj_request->img_request->snap_id;
Alex Elder9d4df012013-04-19 15:34:50 -05001441}
1442
1443static void rbd_osd_req_format_write(struct rbd_obj_request *obj_request)
1444{
Alex Elder9d4df012013-04-19 15:34:50 -05001445 struct ceph_osd_request *osd_req = obj_request->osd_req;
Alex Elder9d4df012013-04-19 15:34:50 -05001446
Ilya Dryomova162b302018-01-30 17:52:10 +01001447 osd_req->r_flags = CEPH_OSD_FLAG_WRITE;
Deepa Dinamani1134e092017-05-08 15:59:19 -07001448 ktime_get_real_ts(&osd_req->r_mtime);
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001449 osd_req->r_data_offset = obj_request->ex.oe_off;
Alex Elder430c28c2013-04-03 21:32:51 -05001450}
1451
Ilya Dryomovbc812072017-01-25 18:16:23 +01001452static struct ceph_osd_request *
Ilya Dryomova162b302018-01-30 17:52:10 +01001453rbd_osd_req_create(struct rbd_obj_request *obj_req, unsigned int num_ops)
Ilya Dryomovbc812072017-01-25 18:16:23 +01001454{
Ilya Dryomova162b302018-01-30 17:52:10 +01001455 struct rbd_img_request *img_req = obj_req->img_request;
1456 struct rbd_device *rbd_dev = img_req->rbd_dev;
Ilya Dryomovbc812072017-01-25 18:16:23 +01001457 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
1458 struct ceph_osd_request *req;
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001459 const char *name_format = rbd_dev->image_format == 1 ?
1460 RBD_V1_DATA_FORMAT : RBD_V2_DATA_FORMAT;
Ilya Dryomovbc812072017-01-25 18:16:23 +01001461
Ilya Dryomova162b302018-01-30 17:52:10 +01001462 req = ceph_osdc_alloc_request(osdc,
1463 (rbd_img_is_write(img_req) ? img_req->snapc : NULL),
1464 num_ops, false, GFP_NOIO);
Ilya Dryomovbc812072017-01-25 18:16:23 +01001465 if (!req)
1466 return NULL;
1467
Ilya Dryomovbc812072017-01-25 18:16:23 +01001468 req->r_callback = rbd_osd_req_callback;
Ilya Dryomova162b302018-01-30 17:52:10 +01001469 req->r_priv = obj_req;
Ilya Dryomovbc812072017-01-25 18:16:23 +01001470
1471 req->r_base_oloc.pool = rbd_dev->layout.pool_id;
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001472 if (ceph_oid_aprintf(&req->r_base_oid, GFP_NOIO, name_format,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001473 rbd_dev->header.object_prefix, obj_req->ex.oe_objno))
Ilya Dryomovbc812072017-01-25 18:16:23 +01001474 goto err_req;
1475
1476 if (ceph_osdc_alloc_messages(req, GFP_NOIO))
1477 goto err_req;
1478
1479 return req;
1480
1481err_req:
1482 ceph_osdc_put_request(req);
1483 return NULL;
1484}
1485
Alex Elderbf0d5f502012-11-22 00:00:08 -06001486static void rbd_osd_req_destroy(struct ceph_osd_request *osd_req)
1487{
1488 ceph_osdc_put_request(osd_req);
1489}
1490
Ilya Dryomovecc633c2018-02-01 11:50:47 +01001491static struct rbd_obj_request *rbd_obj_request_create(void)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001492{
1493 struct rbd_obj_request *obj_request;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001494
Ilya Dryomov5a60e872015-06-24 17:24:33 +03001495 obj_request = kmem_cache_zalloc(rbd_obj_request_cache, GFP_NOIO);
Ilya Dryomov6c696d82017-01-25 18:16:23 +01001496 if (!obj_request)
Alex Elderf907ad52013-05-01 12:43:03 -05001497 return NULL;
Alex Elderf907ad52013-05-01 12:43:03 -05001498
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001499 ceph_object_extent_init(&obj_request->ex);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001500 kref_init(&obj_request->kref);
1501
Ilya Dryomov67e2b652017-01-25 18:16:22 +01001502 dout("%s %p\n", __func__, obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001503 return obj_request;
1504}
1505
1506static void rbd_obj_request_destroy(struct kref *kref)
1507{
1508 struct rbd_obj_request *obj_request;
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001509 u32 i;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001510
1511 obj_request = container_of(kref, struct rbd_obj_request, kref);
1512
Alex Elder37206ee2013-02-20 17:32:08 -06001513 dout("%s: obj %p\n", __func__, obj_request);
1514
Alex Elderbf0d5f502012-11-22 00:00:08 -06001515 if (obj_request->osd_req)
1516 rbd_osd_req_destroy(obj_request->osd_req);
1517
Ilya Dryomovecc633c2018-02-01 11:50:47 +01001518 switch (obj_request->img_request->data_type) {
Alex Elder9969ebc2013-01-18 12:31:10 -06001519 case OBJ_REQUEST_NODATA:
Alex Elderbf0d5f502012-11-22 00:00:08 -06001520 case OBJ_REQUEST_BIO:
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001521 case OBJ_REQUEST_BVECS:
Ilya Dryomov5359a172018-01-20 10:30:10 +01001522 break; /* Nothing to do */
Ilya Dryomovafb97882018-02-06 19:26:35 +01001523 case OBJ_REQUEST_OWN_BVECS:
1524 kfree(obj_request->bvec_pos.bvecs);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001525 break;
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001526 default:
1527 rbd_assert(0);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001528 }
1529
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001530 kfree(obj_request->img_extents);
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01001531 if (obj_request->copyup_bvecs) {
1532 for (i = 0; i < obj_request->copyup_bvec_count; i++) {
1533 if (obj_request->copyup_bvecs[i].bv_page)
1534 __free_page(obj_request->copyup_bvecs[i].bv_page);
1535 }
1536 kfree(obj_request->copyup_bvecs);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001537 }
1538
Alex Elder868311b2013-05-01 12:43:03 -05001539 kmem_cache_free(rbd_obj_request_cache, obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001540}
1541
Alex Elderfb65d2282013-05-08 22:50:04 -05001542/* It's OK to call this for a device with no parent */
1543
1544static void rbd_spec_put(struct rbd_spec *spec);
1545static void rbd_dev_unparent(struct rbd_device *rbd_dev)
1546{
1547 rbd_dev_remove_parent(rbd_dev);
1548 rbd_spec_put(rbd_dev->parent_spec);
1549 rbd_dev->parent_spec = NULL;
1550 rbd_dev->parent_overlap = 0;
1551}
1552
Alex Elderbf0d5f502012-11-22 00:00:08 -06001553/*
Alex Eldera2acd002013-05-08 22:50:04 -05001554 * Parent image reference counting is used to determine when an
1555 * image's parent fields can be safely torn down--after there are no
1556 * more in-flight requests to the parent image. When the last
1557 * reference is dropped, cleaning them up is safe.
1558 */
1559static void rbd_dev_parent_put(struct rbd_device *rbd_dev)
1560{
1561 int counter;
1562
1563 if (!rbd_dev->parent_spec)
1564 return;
1565
1566 counter = atomic_dec_return_safe(&rbd_dev->parent_ref);
1567 if (counter > 0)
1568 return;
1569
1570 /* Last reference; clean up parent data structures */
1571
1572 if (!counter)
1573 rbd_dev_unparent(rbd_dev);
1574 else
Ilya Dryomov9584d502014-07-11 12:11:20 +04001575 rbd_warn(rbd_dev, "parent reference underflow");
Alex Eldera2acd002013-05-08 22:50:04 -05001576}
1577
1578/*
1579 * If an image has a non-zero parent overlap, get a reference to its
1580 * parent.
1581 *
1582 * Returns true if the rbd device has a parent with a non-zero
1583 * overlap and a reference for it was successfully taken, or
1584 * false otherwise.
1585 */
1586static bool rbd_dev_parent_get(struct rbd_device *rbd_dev)
1587{
Ilya Dryomovae43e9d2015-01-19 18:13:43 +03001588 int counter = 0;
Alex Eldera2acd002013-05-08 22:50:04 -05001589
1590 if (!rbd_dev->parent_spec)
1591 return false;
1592
Ilya Dryomovae43e9d2015-01-19 18:13:43 +03001593 down_read(&rbd_dev->header_rwsem);
1594 if (rbd_dev->parent_overlap)
1595 counter = atomic_inc_return_safe(&rbd_dev->parent_ref);
1596 up_read(&rbd_dev->header_rwsem);
Alex Eldera2acd002013-05-08 22:50:04 -05001597
1598 if (counter < 0)
Ilya Dryomov9584d502014-07-11 12:11:20 +04001599 rbd_warn(rbd_dev, "parent reference overflow");
Alex Eldera2acd002013-05-08 22:50:04 -05001600
Ilya Dryomovae43e9d2015-01-19 18:13:43 +03001601 return counter > 0;
Alex Eldera2acd002013-05-08 22:50:04 -05001602}
1603
Alex Elderbf0d5f502012-11-22 00:00:08 -06001604/*
1605 * Caller is responsible for filling in the list of object requests
1606 * that comprises the image request, and the Linux request pointer
1607 * (if there is one).
1608 */
Alex Eldercc344fa2013-02-19 12:25:56 -06001609static struct rbd_img_request *rbd_img_request_create(
1610 struct rbd_device *rbd_dev,
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08001611 enum obj_operation_type op_type,
Josh Durgin4e752f02014-04-08 11:12:11 -07001612 struct ceph_snap_context *snapc)
Alex Elderbf0d5f502012-11-22 00:00:08 -06001613{
1614 struct rbd_img_request *img_request;
Alex Elderbf0d5f502012-11-22 00:00:08 -06001615
Ilya Dryomova0c58952018-01-22 16:03:06 +01001616 img_request = kmem_cache_zalloc(rbd_img_request_cache, GFP_NOIO);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001617 if (!img_request)
1618 return NULL;
1619
Alex Elderbf0d5f502012-11-22 00:00:08 -06001620 img_request->rbd_dev = rbd_dev;
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001621 img_request->op_type = op_type;
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001622 if (!rbd_img_is_write(img_request))
Alex Elderbf0d5f502012-11-22 00:00:08 -06001623 img_request->snap_id = rbd_dev->spec->snap_id;
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001624 else
1625 img_request->snapc = snapc;
1626
Alex Eldera2acd002013-05-08 22:50:04 -05001627 if (rbd_dev_parent_get(rbd_dev))
Alex Elderd0b2e942013-01-24 16:13:36 -06001628 img_request_layered_set(img_request);
Ilya Dryomova0c58952018-01-22 16:03:06 +01001629
Alex Elderbf0d5f502012-11-22 00:00:08 -06001630 spin_lock_init(&img_request->completion_lock);
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001631 INIT_LIST_HEAD(&img_request->object_extents);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001632 kref_init(&img_request->kref);
1633
Ilya Dryomovdfd98752018-02-06 19:26:35 +01001634 dout("%s: rbd_dev %p %s -> img %p\n", __func__, rbd_dev,
1635 obj_op_name(op_type), img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001636 return img_request;
1637}
1638
1639static void rbd_img_request_destroy(struct kref *kref)
1640{
1641 struct rbd_img_request *img_request;
1642 struct rbd_obj_request *obj_request;
1643 struct rbd_obj_request *next_obj_request;
1644
1645 img_request = container_of(kref, struct rbd_img_request, kref);
1646
Alex Elder37206ee2013-02-20 17:32:08 -06001647 dout("%s: img %p\n", __func__, img_request);
1648
Alex Elderbf0d5f502012-11-22 00:00:08 -06001649 for_each_obj_request_safe(img_request, obj_request, next_obj_request)
1650 rbd_img_obj_request_del(img_request, obj_request);
Alex Elder25dcf952013-01-25 17:08:55 -06001651 rbd_assert(img_request->obj_request_count == 0);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001652
Alex Eldera2acd002013-05-08 22:50:04 -05001653 if (img_request_layered_test(img_request)) {
1654 img_request_layered_clear(img_request);
1655 rbd_dev_parent_put(img_request->rbd_dev);
1656 }
1657
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001658 if (rbd_img_is_write(img_request))
Alex Elder812164f82013-04-30 00:44:32 -05001659 ceph_put_snap_context(img_request->snapc);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001660
Alex Elder1c2a9df2013-05-01 12:43:03 -05001661 kmem_cache_free(rbd_img_request_cache, img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06001662}
1663
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001664static void prune_extents(struct ceph_file_extent *img_extents,
1665 u32 *num_img_extents, u64 overlap)
Alex Eldere93f3152013-05-08 22:50:04 -05001666{
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001667 u32 cnt = *num_img_extents;
Alex Eldere93f3152013-05-08 22:50:04 -05001668
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001669 /* drop extents completely beyond the overlap */
1670 while (cnt && img_extents[cnt - 1].fe_off >= overlap)
1671 cnt--;
Alex Eldere93f3152013-05-08 22:50:04 -05001672
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001673 if (cnt) {
1674 struct ceph_file_extent *ex = &img_extents[cnt - 1];
Alex Eldere93f3152013-05-08 22:50:04 -05001675
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001676 /* trim final overlapping extent */
1677 if (ex->fe_off + ex->fe_len > overlap)
1678 ex->fe_len = overlap - ex->fe_off;
Alex Elder12178572013-02-08 09:55:49 -06001679 }
1680
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001681 *num_img_extents = cnt;
Alex Elder21692382013-04-05 01:27:12 -05001682}
1683
Alex Elderf1a47392013-04-19 15:34:50 -05001684/*
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001685 * Determine the byte range(s) covered by either just the object extent
1686 * or the entire object in the parent image.
Josh Durgin3b434a2a2014-04-04 17:32:15 -07001687 */
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001688static int rbd_obj_calc_img_extents(struct rbd_obj_request *obj_req,
1689 bool entire)
Josh Durgin3b434a2a2014-04-04 17:32:15 -07001690{
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001691 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
Alex Elderc5b5ef62013-02-11 12:33:24 -06001692 int ret;
1693
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001694 if (!rbd_dev->parent_overlap)
1695 return 0;
1696
1697 ret = ceph_extent_to_file(&rbd_dev->layout, obj_req->ex.oe_objno,
1698 entire ? 0 : obj_req->ex.oe_off,
1699 entire ? rbd_dev->layout.object_size :
1700 obj_req->ex.oe_len,
1701 &obj_req->img_extents,
1702 &obj_req->num_img_extents);
1703 if (ret)
1704 return ret;
1705
1706 prune_extents(obj_req->img_extents, &obj_req->num_img_extents,
1707 rbd_dev->parent_overlap);
1708 return 0;
1709}
1710
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001711static void rbd_osd_req_setup_data(struct rbd_obj_request *obj_req, u32 which)
1712{
Ilya Dryomovecc633c2018-02-01 11:50:47 +01001713 switch (obj_req->img_request->data_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001714 case OBJ_REQUEST_BIO:
1715 osd_req_op_extent_osd_data_bio(obj_req->osd_req, which,
1716 &obj_req->bio_pos,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001717 obj_req->ex.oe_len);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001718 break;
1719 case OBJ_REQUEST_BVECS:
Ilya Dryomovafb97882018-02-06 19:26:35 +01001720 case OBJ_REQUEST_OWN_BVECS:
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001721 rbd_assert(obj_req->bvec_pos.iter.bi_size ==
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001722 obj_req->ex.oe_len);
Ilya Dryomovafb97882018-02-06 19:26:35 +01001723 rbd_assert(obj_req->bvec_idx == obj_req->bvec_count);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001724 osd_req_op_extent_osd_data_bvec_pos(obj_req->osd_req, which,
1725 &obj_req->bvec_pos);
1726 break;
1727 default:
1728 rbd_assert(0);
1729 }
1730}
1731
1732static int rbd_obj_setup_read(struct rbd_obj_request *obj_req)
1733{
Ilya Dryomova162b302018-01-30 17:52:10 +01001734 obj_req->osd_req = rbd_osd_req_create(obj_req, 1);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001735 if (!obj_req->osd_req)
Ilya Dryomov710214e2016-09-15 17:53:32 +02001736 return -ENOMEM;
1737
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001738 osd_req_op_extent_init(obj_req->osd_req, 0, CEPH_OSD_OP_READ,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001739 obj_req->ex.oe_off, obj_req->ex.oe_len, 0, 0);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001740 rbd_osd_req_setup_data(obj_req, 0);
Ilya Dryomova90bb0c2017-01-25 18:16:23 +01001741
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001742 rbd_osd_req_format_read(obj_req);
1743 return 0;
1744}
1745
1746static int __rbd_obj_setup_stat(struct rbd_obj_request *obj_req,
1747 unsigned int which)
1748{
1749 struct page **pages;
Ilya Dryomov710214e2016-09-15 17:53:32 +02001750
Alex Elderc5b5ef62013-02-11 12:33:24 -06001751 /*
1752 * The response data for a STAT call consists of:
1753 * le64 length;
1754 * struct {
1755 * le32 tv_sec;
1756 * le32 tv_nsec;
1757 * } mtime;
1758 */
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001759 pages = ceph_alloc_page_vector(1, GFP_NOIO);
1760 if (IS_ERR(pages))
1761 return PTR_ERR(pages);
Alex Elderc5b5ef62013-02-11 12:33:24 -06001762
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001763 osd_req_op_init(obj_req->osd_req, which, CEPH_OSD_OP_STAT, 0);
1764 osd_req_op_raw_data_in_pages(obj_req->osd_req, which, pages,
1765 8 + sizeof(struct ceph_timespec),
1766 0, false, true);
Ilya Dryomov980917f2016-09-12 18:59:42 +02001767 return 0;
Alex Elderc5b5ef62013-02-11 12:33:24 -06001768}
1769
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001770static void __rbd_obj_setup_write(struct rbd_obj_request *obj_req,
1771 unsigned int which)
Alex Elderb454e362013-04-19 15:34:50 -05001772{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001773 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
1774 u16 opcode;
Alex Elderb454e362013-04-19 15:34:50 -05001775
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001776 osd_req_op_alloc_hint_init(obj_req->osd_req, which++,
1777 rbd_dev->layout.object_size,
1778 rbd_dev->layout.object_size);
Alex Elderb454e362013-04-19 15:34:50 -05001779
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001780 if (rbd_obj_is_entire(obj_req))
1781 opcode = CEPH_OSD_OP_WRITEFULL;
1782 else
1783 opcode = CEPH_OSD_OP_WRITE;
Ilya Dryomov70d045f2014-09-12 16:02:01 +04001784
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001785 osd_req_op_extent_init(obj_req->osd_req, which, opcode,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001786 obj_req->ex.oe_off, obj_req->ex.oe_len, 0, 0);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001787 rbd_osd_req_setup_data(obj_req, which++);
Ilya Dryomov70d045f2014-09-12 16:02:01 +04001788
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001789 rbd_assert(which == obj_req->osd_req->r_num_ops);
1790 rbd_osd_req_format_write(obj_req);
Ilya Dryomov70d045f2014-09-12 16:02:01 +04001791}
1792
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001793static int rbd_obj_setup_write(struct rbd_obj_request *obj_req)
Ilya Dryomov70d045f2014-09-12 16:02:01 +04001794{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001795 unsigned int num_osd_ops, which = 0;
1796 int ret;
Ilya Dryomov058aa992016-09-12 14:44:45 +02001797
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001798 /* reverse map the entire object onto the parent */
1799 ret = rbd_obj_calc_img_extents(obj_req, true);
1800 if (ret)
1801 return ret;
1802
1803 if (obj_req->num_img_extents) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001804 obj_req->write_state = RBD_OBJ_WRITE_GUARD;
1805 num_osd_ops = 3; /* stat + setallochint + write/writefull */
1806 } else {
1807 obj_req->write_state = RBD_OBJ_WRITE_FLAT;
1808 num_osd_ops = 2; /* setallochint + write/writefull */
1809 }
1810
Ilya Dryomova162b302018-01-30 17:52:10 +01001811 obj_req->osd_req = rbd_osd_req_create(obj_req, num_osd_ops);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001812 if (!obj_req->osd_req)
1813 return -ENOMEM;
1814
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001815 if (obj_req->num_img_extents) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001816 ret = __rbd_obj_setup_stat(obj_req, which++);
1817 if (ret)
1818 return ret;
1819 }
1820
1821 __rbd_obj_setup_write(obj_req, which);
1822 return 0;
1823}
1824
1825static void __rbd_obj_setup_discard(struct rbd_obj_request *obj_req,
1826 unsigned int which)
1827{
1828 u16 opcode;
1829
1830 if (rbd_obj_is_entire(obj_req)) {
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001831 if (obj_req->num_img_extents) {
Ilya Dryomov2bb1e562018-02-06 19:26:34 +01001832 osd_req_op_init(obj_req->osd_req, which++,
1833 CEPH_OSD_OP_CREATE, 0);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001834 opcode = CEPH_OSD_OP_TRUNCATE;
1835 } else {
1836 osd_req_op_init(obj_req->osd_req, which++,
1837 CEPH_OSD_OP_DELETE, 0);
1838 opcode = 0;
1839 }
1840 } else if (rbd_obj_is_tail(obj_req)) {
1841 opcode = CEPH_OSD_OP_TRUNCATE;
1842 } else {
1843 opcode = CEPH_OSD_OP_ZERO;
1844 }
1845
1846 if (opcode)
1847 osd_req_op_extent_init(obj_req->osd_req, which++, opcode,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01001848 obj_req->ex.oe_off, obj_req->ex.oe_len,
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001849 0, 0);
1850
1851 rbd_assert(which == obj_req->osd_req->r_num_ops);
1852 rbd_osd_req_format_write(obj_req);
1853}
1854
1855static int rbd_obj_setup_discard(struct rbd_obj_request *obj_req)
1856{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001857 unsigned int num_osd_ops, which = 0;
1858 int ret;
1859
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001860 /* reverse map the entire object onto the parent */
1861 ret = rbd_obj_calc_img_extents(obj_req, true);
1862 if (ret)
1863 return ret;
1864
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001865 if (rbd_obj_is_entire(obj_req)) {
1866 obj_req->write_state = RBD_OBJ_WRITE_FLAT;
Ilya Dryomov2bb1e562018-02-06 19:26:34 +01001867 if (obj_req->num_img_extents)
1868 num_osd_ops = 2; /* create + truncate */
1869 else
1870 num_osd_ops = 1; /* delete */
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001871 } else {
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001872 if (obj_req->num_img_extents) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001873 obj_req->write_state = RBD_OBJ_WRITE_GUARD;
1874 num_osd_ops = 2; /* stat + truncate/zero */
1875 } else {
1876 obj_req->write_state = RBD_OBJ_WRITE_FLAT;
1877 num_osd_ops = 1; /* truncate/zero */
1878 }
1879 }
1880
Ilya Dryomova162b302018-01-30 17:52:10 +01001881 obj_req->osd_req = rbd_osd_req_create(obj_req, num_osd_ops);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001882 if (!obj_req->osd_req)
1883 return -ENOMEM;
1884
Ilya Dryomov86bd7992018-02-06 19:26:33 +01001885 if (!rbd_obj_is_entire(obj_req) && obj_req->num_img_extents) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001886 ret = __rbd_obj_setup_stat(obj_req, which++);
1887 if (ret)
1888 return ret;
1889 }
1890
1891 __rbd_obj_setup_discard(obj_req, which);
1892 return 0;
1893}
1894
1895/*
1896 * For each object request in @img_req, allocate an OSD request, add
1897 * individual OSD ops and prepare them for submission. The number of
1898 * OSD ops depends on op_type and the overlap point (if any).
1899 */
1900static int __rbd_img_fill_request(struct rbd_img_request *img_req)
1901{
1902 struct rbd_obj_request *obj_req;
1903 int ret;
1904
1905 for_each_obj_request(img_req, obj_req) {
Ilya Dryomov9bb02482018-01-30 17:52:10 +01001906 switch (img_req->op_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01001907 case OBJ_OP_READ:
1908 ret = rbd_obj_setup_read(obj_req);
1909 break;
1910 case OBJ_OP_WRITE:
1911 ret = rbd_obj_setup_write(obj_req);
1912 break;
1913 case OBJ_OP_DISCARD:
1914 ret = rbd_obj_setup_discard(obj_req);
1915 break;
1916 default:
1917 rbd_assert(0);
1918 }
1919 if (ret)
1920 return ret;
1921 }
1922
1923 return 0;
1924}
1925
Ilya Dryomov5a237812018-02-06 19:26:34 +01001926union rbd_img_fill_iter {
1927 struct ceph_bio_iter bio_iter;
1928 struct ceph_bvec_iter bvec_iter;
1929};
1930
1931struct rbd_img_fill_ctx {
1932 enum obj_request_type pos_type;
1933 union rbd_img_fill_iter *pos;
1934 union rbd_img_fill_iter iter;
1935 ceph_object_extent_fn_t set_pos_fn;
Ilya Dryomovafb97882018-02-06 19:26:35 +01001936 ceph_object_extent_fn_t count_fn;
1937 ceph_object_extent_fn_t copy_fn;
Ilya Dryomov5a237812018-02-06 19:26:34 +01001938};
1939
1940static struct ceph_object_extent *alloc_object_extent(void *arg)
1941{
1942 struct rbd_img_request *img_req = arg;
1943 struct rbd_obj_request *obj_req;
1944
1945 obj_req = rbd_obj_request_create();
1946 if (!obj_req)
1947 return NULL;
1948
1949 rbd_img_obj_request_add(img_req, obj_req);
1950 return &obj_req->ex;
1951}
1952
1953/*
Ilya Dryomovafb97882018-02-06 19:26:35 +01001954 * While su != os && sc == 1 is technically not fancy (it's the same
1955 * layout as su == os && sc == 1), we can't use the nocopy path for it
1956 * because ->set_pos_fn() should be called only once per object.
1957 * ceph_file_to_extents() invokes action_fn once per stripe unit, so
1958 * treat su != os && sc == 1 as fancy.
Ilya Dryomov5a237812018-02-06 19:26:34 +01001959 */
Ilya Dryomovafb97882018-02-06 19:26:35 +01001960static bool rbd_layout_is_fancy(struct ceph_file_layout *l)
1961{
1962 return l->stripe_unit != l->object_size;
1963}
1964
1965static int rbd_img_fill_request_nocopy(struct rbd_img_request *img_req,
1966 struct ceph_file_extent *img_extents,
1967 u32 num_img_extents,
1968 struct rbd_img_fill_ctx *fctx)
Ilya Dryomov5a237812018-02-06 19:26:34 +01001969{
1970 u32 i;
1971 int ret;
1972
1973 img_req->data_type = fctx->pos_type;
1974
1975 /*
1976 * Create object requests and set each object request's starting
1977 * position in the provided bio (list) or bio_vec array.
1978 */
1979 fctx->iter = *fctx->pos;
1980 for (i = 0; i < num_img_extents; i++) {
1981 ret = ceph_file_to_extents(&img_req->rbd_dev->layout,
1982 img_extents[i].fe_off,
1983 img_extents[i].fe_len,
1984 &img_req->object_extents,
1985 alloc_object_extent, img_req,
1986 fctx->set_pos_fn, &fctx->iter);
1987 if (ret)
1988 return ret;
1989 }
1990
1991 return __rbd_img_fill_request(img_req);
1992}
1993
Ilya Dryomovafb97882018-02-06 19:26:35 +01001994/*
1995 * Map a list of image extents to a list of object extents, create the
1996 * corresponding object requests (normally each to a different object,
1997 * but not always) and add them to @img_req. For each object request,
1998 * set up its data descriptor to point to the corresponding chunk(s) of
1999 * @fctx->pos data buffer.
2000 *
2001 * Because ceph_file_to_extents() will merge adjacent object extents
2002 * together, each object request's data descriptor may point to multiple
2003 * different chunks of @fctx->pos data buffer.
2004 *
2005 * @fctx->pos data buffer is assumed to be large enough.
2006 */
2007static int rbd_img_fill_request(struct rbd_img_request *img_req,
2008 struct ceph_file_extent *img_extents,
2009 u32 num_img_extents,
2010 struct rbd_img_fill_ctx *fctx)
2011{
2012 struct rbd_device *rbd_dev = img_req->rbd_dev;
2013 struct rbd_obj_request *obj_req;
2014 u32 i;
2015 int ret;
2016
2017 if (fctx->pos_type == OBJ_REQUEST_NODATA ||
2018 !rbd_layout_is_fancy(&rbd_dev->layout))
2019 return rbd_img_fill_request_nocopy(img_req, img_extents,
2020 num_img_extents, fctx);
2021
2022 img_req->data_type = OBJ_REQUEST_OWN_BVECS;
2023
2024 /*
2025 * Create object requests and determine ->bvec_count for each object
2026 * request. Note that ->bvec_count sum over all object requests may
2027 * be greater than the number of bio_vecs in the provided bio (list)
2028 * or bio_vec array because when mapped, those bio_vecs can straddle
2029 * stripe unit boundaries.
2030 */
2031 fctx->iter = *fctx->pos;
2032 for (i = 0; i < num_img_extents; i++) {
2033 ret = ceph_file_to_extents(&rbd_dev->layout,
2034 img_extents[i].fe_off,
2035 img_extents[i].fe_len,
2036 &img_req->object_extents,
2037 alloc_object_extent, img_req,
2038 fctx->count_fn, &fctx->iter);
2039 if (ret)
2040 return ret;
2041 }
2042
2043 for_each_obj_request(img_req, obj_req) {
2044 obj_req->bvec_pos.bvecs = kmalloc_array(obj_req->bvec_count,
2045 sizeof(*obj_req->bvec_pos.bvecs),
2046 GFP_NOIO);
2047 if (!obj_req->bvec_pos.bvecs)
2048 return -ENOMEM;
Alex Elderb454e362013-04-19 15:34:50 -05002049 }
2050
2051 /*
Ilya Dryomovafb97882018-02-06 19:26:35 +01002052 * Fill in each object request's private bio_vec array, splitting and
2053 * rearranging the provided bio_vecs in stripe unit chunks as needed.
Alex Elderb454e362013-04-19 15:34:50 -05002054 */
Ilya Dryomovafb97882018-02-06 19:26:35 +01002055 fctx->iter = *fctx->pos;
2056 for (i = 0; i < num_img_extents; i++) {
2057 ret = ceph_iterate_extents(&rbd_dev->layout,
2058 img_extents[i].fe_off,
2059 img_extents[i].fe_len,
2060 &img_req->object_extents,
2061 fctx->copy_fn, &fctx->iter);
2062 if (ret)
2063 return ret;
2064 }
Alex Elder3d7efd12013-04-19 15:34:50 -05002065
Ilya Dryomovafb97882018-02-06 19:26:35 +01002066 return __rbd_img_fill_request(img_req);
Alex Elderb454e362013-04-19 15:34:50 -05002067}
2068
Ilya Dryomov5a237812018-02-06 19:26:34 +01002069static int rbd_img_fill_nodata(struct rbd_img_request *img_req,
2070 u64 off, u64 len)
2071{
2072 struct ceph_file_extent ex = { off, len };
2073 union rbd_img_fill_iter dummy;
2074 struct rbd_img_fill_ctx fctx = {
2075 .pos_type = OBJ_REQUEST_NODATA,
2076 .pos = &dummy,
2077 };
2078
2079 return rbd_img_fill_request(img_req, &ex, 1, &fctx);
2080}
2081
2082static void set_bio_pos(struct ceph_object_extent *ex, u32 bytes, void *arg)
2083{
2084 struct rbd_obj_request *obj_req =
2085 container_of(ex, struct rbd_obj_request, ex);
2086 struct ceph_bio_iter *it = arg;
2087
2088 dout("%s objno %llu bytes %u\n", __func__, ex->oe_objno, bytes);
2089 obj_req->bio_pos = *it;
2090 ceph_bio_iter_advance(it, bytes);
2091}
2092
Ilya Dryomovafb97882018-02-06 19:26:35 +01002093static void count_bio_bvecs(struct ceph_object_extent *ex, u32 bytes, void *arg)
2094{
2095 struct rbd_obj_request *obj_req =
2096 container_of(ex, struct rbd_obj_request, ex);
2097 struct ceph_bio_iter *it = arg;
2098
2099 dout("%s objno %llu bytes %u\n", __func__, ex->oe_objno, bytes);
2100 ceph_bio_iter_advance_step(it, bytes, ({
2101 obj_req->bvec_count++;
2102 }));
2103
2104}
2105
2106static void copy_bio_bvecs(struct ceph_object_extent *ex, u32 bytes, void *arg)
2107{
2108 struct rbd_obj_request *obj_req =
2109 container_of(ex, struct rbd_obj_request, ex);
2110 struct ceph_bio_iter *it = arg;
2111
2112 dout("%s objno %llu bytes %u\n", __func__, ex->oe_objno, bytes);
2113 ceph_bio_iter_advance_step(it, bytes, ({
2114 obj_req->bvec_pos.bvecs[obj_req->bvec_idx++] = bv;
2115 obj_req->bvec_pos.iter.bi_size += bv.bv_len;
2116 }));
2117}
2118
Ilya Dryomov5a237812018-02-06 19:26:34 +01002119static int __rbd_img_fill_from_bio(struct rbd_img_request *img_req,
2120 struct ceph_file_extent *img_extents,
2121 u32 num_img_extents,
2122 struct ceph_bio_iter *bio_pos)
2123{
2124 struct rbd_img_fill_ctx fctx = {
2125 .pos_type = OBJ_REQUEST_BIO,
2126 .pos = (union rbd_img_fill_iter *)bio_pos,
2127 .set_pos_fn = set_bio_pos,
Ilya Dryomovafb97882018-02-06 19:26:35 +01002128 .count_fn = count_bio_bvecs,
2129 .copy_fn = copy_bio_bvecs,
Ilya Dryomov5a237812018-02-06 19:26:34 +01002130 };
2131
2132 return rbd_img_fill_request(img_req, img_extents, num_img_extents,
2133 &fctx);
2134}
2135
2136static int rbd_img_fill_from_bio(struct rbd_img_request *img_req,
2137 u64 off, u64 len, struct bio *bio)
2138{
2139 struct ceph_file_extent ex = { off, len };
2140 struct ceph_bio_iter it = { .bio = bio, .iter = bio->bi_iter };
2141
2142 return __rbd_img_fill_from_bio(img_req, &ex, 1, &it);
2143}
2144
2145static void set_bvec_pos(struct ceph_object_extent *ex, u32 bytes, void *arg)
2146{
2147 struct rbd_obj_request *obj_req =
2148 container_of(ex, struct rbd_obj_request, ex);
2149 struct ceph_bvec_iter *it = arg;
2150
2151 obj_req->bvec_pos = *it;
2152 ceph_bvec_iter_shorten(&obj_req->bvec_pos, bytes);
2153 ceph_bvec_iter_advance(it, bytes);
2154}
2155
Ilya Dryomovafb97882018-02-06 19:26:35 +01002156static void count_bvecs(struct ceph_object_extent *ex, u32 bytes, void *arg)
2157{
2158 struct rbd_obj_request *obj_req =
2159 container_of(ex, struct rbd_obj_request, ex);
2160 struct ceph_bvec_iter *it = arg;
2161
2162 ceph_bvec_iter_advance_step(it, bytes, ({
2163 obj_req->bvec_count++;
2164 }));
2165}
2166
2167static void copy_bvecs(struct ceph_object_extent *ex, u32 bytes, void *arg)
2168{
2169 struct rbd_obj_request *obj_req =
2170 container_of(ex, struct rbd_obj_request, ex);
2171 struct ceph_bvec_iter *it = arg;
2172
2173 ceph_bvec_iter_advance_step(it, bytes, ({
2174 obj_req->bvec_pos.bvecs[obj_req->bvec_idx++] = bv;
2175 obj_req->bvec_pos.iter.bi_size += bv.bv_len;
2176 }));
2177}
2178
Ilya Dryomov5a237812018-02-06 19:26:34 +01002179static int __rbd_img_fill_from_bvecs(struct rbd_img_request *img_req,
2180 struct ceph_file_extent *img_extents,
2181 u32 num_img_extents,
2182 struct ceph_bvec_iter *bvec_pos)
2183{
2184 struct rbd_img_fill_ctx fctx = {
2185 .pos_type = OBJ_REQUEST_BVECS,
2186 .pos = (union rbd_img_fill_iter *)bvec_pos,
2187 .set_pos_fn = set_bvec_pos,
Ilya Dryomovafb97882018-02-06 19:26:35 +01002188 .count_fn = count_bvecs,
2189 .copy_fn = copy_bvecs,
Ilya Dryomov5a237812018-02-06 19:26:34 +01002190 };
2191
2192 return rbd_img_fill_request(img_req, img_extents, num_img_extents,
2193 &fctx);
2194}
2195
2196static int rbd_img_fill_from_bvecs(struct rbd_img_request *img_req,
2197 struct ceph_file_extent *img_extents,
2198 u32 num_img_extents,
2199 struct bio_vec *bvecs)
2200{
2201 struct ceph_bvec_iter it = {
2202 .bvecs = bvecs,
2203 .iter = { .bi_size = ceph_file_extents_bytes(img_extents,
2204 num_img_extents) },
2205 };
2206
2207 return __rbd_img_fill_from_bvecs(img_req, img_extents, num_img_extents,
2208 &it);
2209}
2210
Ilya Dryomovefbd1a12018-01-30 17:52:11 +01002211static void rbd_img_request_submit(struct rbd_img_request *img_request)
Alex Elderbf0d5f502012-11-22 00:00:08 -06002212{
Alex Elderbf0d5f502012-11-22 00:00:08 -06002213 struct rbd_obj_request *obj_request;
2214
Alex Elder37206ee2013-02-20 17:32:08 -06002215 dout("%s: img %p\n", __func__, img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002216
Ilya Dryomov663ae2c2016-05-16 13:18:57 +02002217 rbd_img_request_get(img_request);
Ilya Dryomovefbd1a12018-01-30 17:52:11 +01002218 for_each_obj_request(img_request, obj_request)
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002219 rbd_obj_request_submit(obj_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002220
Ilya Dryomov663ae2c2016-05-16 13:18:57 +02002221 rbd_img_request_put(img_request);
Alex Elderbf0d5f502012-11-22 00:00:08 -06002222}
2223
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002224static int rbd_obj_read_from_parent(struct rbd_obj_request *obj_req)
Alex Elder8b3e1a52013-01-24 16:13:36 -06002225{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002226 struct rbd_img_request *img_req = obj_req->img_request;
2227 struct rbd_img_request *child_img_req;
2228 int ret;
Alex Elder8b3e1a52013-01-24 16:13:36 -06002229
Ilya Dryomove93aca02018-02-06 19:26:35 +01002230 child_img_req = rbd_img_request_create(img_req->rbd_dev->parent,
2231 OBJ_OP_READ, NULL);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002232 if (!child_img_req)
2233 return -ENOMEM;
Alex Elder8b3e1a52013-01-24 16:13:36 -06002234
Ilya Dryomove93aca02018-02-06 19:26:35 +01002235 __set_bit(IMG_REQ_CHILD, &child_img_req->flags);
2236 child_img_req->obj_request = obj_req;
Alex Elder02c74fb2013-05-06 17:40:33 -05002237
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002238 if (!rbd_img_is_write(img_req)) {
Ilya Dryomovecc633c2018-02-01 11:50:47 +01002239 switch (img_req->data_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002240 case OBJ_REQUEST_BIO:
Ilya Dryomov5a237812018-02-06 19:26:34 +01002241 ret = __rbd_img_fill_from_bio(child_img_req,
2242 obj_req->img_extents,
2243 obj_req->num_img_extents,
2244 &obj_req->bio_pos);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002245 break;
2246 case OBJ_REQUEST_BVECS:
Ilya Dryomovafb97882018-02-06 19:26:35 +01002247 case OBJ_REQUEST_OWN_BVECS:
Ilya Dryomov5a237812018-02-06 19:26:34 +01002248 ret = __rbd_img_fill_from_bvecs(child_img_req,
2249 obj_req->img_extents,
2250 obj_req->num_img_extents,
2251 &obj_req->bvec_pos);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002252 break;
2253 default:
2254 rbd_assert(0);
2255 }
2256 } else {
Ilya Dryomov5a237812018-02-06 19:26:34 +01002257 ret = rbd_img_fill_from_bvecs(child_img_req,
2258 obj_req->img_extents,
2259 obj_req->num_img_extents,
2260 obj_req->copyup_bvecs);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002261 }
2262 if (ret) {
2263 rbd_img_request_put(child_img_req);
2264 return ret;
2265 }
2266
2267 rbd_img_request_submit(child_img_req);
2268 return 0;
2269}
2270
2271static bool rbd_obj_handle_read(struct rbd_obj_request *obj_req)
2272{
2273 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
2274 int ret;
2275
2276 if (obj_req->result == -ENOENT &&
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002277 rbd_dev->parent_overlap && !obj_req->tried_parent) {
2278 /* reverse map this object extent onto the parent */
2279 ret = rbd_obj_calc_img_extents(obj_req, false);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002280 if (ret) {
2281 obj_req->result = ret;
2282 return true;
2283 }
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002284
2285 if (obj_req->num_img_extents) {
2286 obj_req->tried_parent = true;
2287 ret = rbd_obj_read_from_parent(obj_req);
2288 if (ret) {
2289 obj_req->result = ret;
2290 return true;
2291 }
2292 return false;
2293 }
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002294 }
Alex Elder02c74fb2013-05-06 17:40:33 -05002295
2296 /*
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002297 * -ENOENT means a hole in the image -- zero-fill the entire
2298 * length of the request. A short read also implies zero-fill
2299 * to the end of the request. In both cases we update xferred
2300 * count to indicate the whole request was satisfied.
Alex Elder02c74fb2013-05-06 17:40:33 -05002301 */
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002302 if (obj_req->result == -ENOENT ||
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002303 (!obj_req->result && obj_req->xferred < obj_req->ex.oe_len)) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002304 rbd_assert(!obj_req->xferred || !obj_req->result);
2305 rbd_obj_zero_range(obj_req, obj_req->xferred,
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002306 obj_req->ex.oe_len - obj_req->xferred);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002307 obj_req->result = 0;
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002308 obj_req->xferred = obj_req->ex.oe_len;
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002309 }
2310
2311 return true;
2312}
2313
2314/*
2315 * copyup_bvecs pages are never highmem pages
2316 */
2317static bool is_zero_bvecs(struct bio_vec *bvecs, u32 bytes)
2318{
2319 struct ceph_bvec_iter it = {
2320 .bvecs = bvecs,
2321 .iter = { .bi_size = bytes },
2322 };
2323
2324 ceph_bvec_iter_advance_step(&it, bytes, ({
2325 if (memchr_inv(page_address(bv.bv_page) + bv.bv_offset, 0,
2326 bv.bv_len))
2327 return false;
2328 }));
2329 return true;
2330}
2331
2332static int rbd_obj_issue_copyup(struct rbd_obj_request *obj_req, u32 bytes)
2333{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002334 unsigned int num_osd_ops = obj_req->osd_req->r_num_ops;
2335
2336 dout("%s obj_req %p bytes %u\n", __func__, obj_req, bytes);
2337 rbd_assert(obj_req->osd_req->r_ops[0].op == CEPH_OSD_OP_STAT);
2338 rbd_osd_req_destroy(obj_req->osd_req);
2339
2340 /*
2341 * Create a copyup request with the same number of OSD ops as
2342 * the original request. The original request was stat + op(s),
2343 * the new copyup request will be copyup + the same op(s).
2344 */
Ilya Dryomova162b302018-01-30 17:52:10 +01002345 obj_req->osd_req = rbd_osd_req_create(obj_req, num_osd_ops);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002346 if (!obj_req->osd_req)
2347 return -ENOMEM;
2348
2349 /*
2350 * Only send non-zero copyup data to save some I/O and network
2351 * bandwidth -- zero copyup data is equivalent to the object not
2352 * existing.
2353 */
2354 if (is_zero_bvecs(obj_req->copyup_bvecs, bytes)) {
2355 dout("%s obj_req %p detected zeroes\n", __func__, obj_req);
2356 bytes = 0;
2357 }
2358
2359 osd_req_op_cls_init(obj_req->osd_req, 0, CEPH_OSD_OP_CALL, "rbd",
2360 "copyup");
2361 osd_req_op_cls_request_data_bvecs(obj_req->osd_req, 0,
2362 obj_req->copyup_bvecs, bytes);
2363
Ilya Dryomov9bb02482018-01-30 17:52:10 +01002364 switch (obj_req->img_request->op_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002365 case OBJ_OP_WRITE:
2366 __rbd_obj_setup_write(obj_req, 1);
2367 break;
2368 case OBJ_OP_DISCARD:
2369 rbd_assert(!rbd_obj_is_entire(obj_req));
2370 __rbd_obj_setup_discard(obj_req, 1);
2371 break;
2372 default:
2373 rbd_assert(0);
2374 }
2375
2376 rbd_obj_request_submit(obj_req);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002377 return 0;
2378}
2379
Ilya Dryomov7e07efb2018-01-20 10:30:11 +01002380static int setup_copyup_bvecs(struct rbd_obj_request *obj_req, u64 obj_overlap)
2381{
2382 u32 i;
2383
2384 rbd_assert(!obj_req->copyup_bvecs);
2385 obj_req->copyup_bvec_count = calc_pages_for(0, obj_overlap);
2386 obj_req->copyup_bvecs = kcalloc(obj_req->copyup_bvec_count,
2387 sizeof(*obj_req->copyup_bvecs),
2388 GFP_NOIO);
2389 if (!obj_req->copyup_bvecs)
2390 return -ENOMEM;
2391
2392 for (i = 0; i < obj_req->copyup_bvec_count; i++) {
2393 unsigned int len = min(obj_overlap, (u64)PAGE_SIZE);
2394
2395 obj_req->copyup_bvecs[i].bv_page = alloc_page(GFP_NOIO);
2396 if (!obj_req->copyup_bvecs[i].bv_page)
2397 return -ENOMEM;
2398
2399 obj_req->copyup_bvecs[i].bv_offset = 0;
2400 obj_req->copyup_bvecs[i].bv_len = len;
2401 obj_overlap -= len;
2402 }
2403
2404 rbd_assert(!obj_overlap);
2405 return 0;
2406}
2407
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002408static int rbd_obj_handle_write_guard(struct rbd_obj_request *obj_req)
2409{
2410 struct rbd_device *rbd_dev = obj_req->img_request->rbd_dev;
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002411 int ret;
2412
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002413 rbd_assert(obj_req->num_img_extents);
2414 prune_extents(obj_req->img_extents, &obj_req->num_img_extents,
2415 rbd_dev->parent_overlap);
2416 if (!obj_req->num_img_extents) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002417 /*
2418 * The overlap has become 0 (most likely because the
2419 * image has been flattened). Use rbd_obj_issue_copyup()
2420 * to re-submit the original write request -- the copyup
2421 * operation itself will be a no-op, since someone must
2422 * have populated the child object while we weren't
2423 * looking. Move to WRITE_FLAT state as we'll be done
2424 * with the operation once the null copyup completes.
2425 */
2426 obj_req->write_state = RBD_OBJ_WRITE_FLAT;
2427 return rbd_obj_issue_copyup(obj_req, 0);
2428 }
2429
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002430 ret = setup_copyup_bvecs(obj_req, rbd_obj_img_extents_bytes(obj_req));
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002431 if (ret)
2432 return ret;
2433
2434 obj_req->write_state = RBD_OBJ_WRITE_COPYUP;
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002435 return rbd_obj_read_from_parent(obj_req);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002436}
2437
2438static bool rbd_obj_handle_write(struct rbd_obj_request *obj_req)
2439{
2440 int ret;
2441
2442again:
2443 switch (obj_req->write_state) {
2444 case RBD_OBJ_WRITE_GUARD:
2445 rbd_assert(!obj_req->xferred);
2446 if (obj_req->result == -ENOENT) {
2447 /*
2448 * The target object doesn't exist. Read the data for
2449 * the entire target object up to the overlap point (if
2450 * any) from the parent, so we can use it for a copyup.
2451 */
2452 ret = rbd_obj_handle_write_guard(obj_req);
2453 if (ret) {
2454 obj_req->result = ret;
2455 return true;
2456 }
2457 return false;
2458 }
2459 /* fall through */
2460 case RBD_OBJ_WRITE_FLAT:
2461 if (!obj_req->result)
2462 /*
2463 * There is no such thing as a successful short
2464 * write -- indicate the whole request was satisfied.
2465 */
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002466 obj_req->xferred = obj_req->ex.oe_len;
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002467 return true;
2468 case RBD_OBJ_WRITE_COPYUP:
2469 obj_req->write_state = RBD_OBJ_WRITE_GUARD;
2470 if (obj_req->result)
2471 goto again;
2472
2473 rbd_assert(obj_req->xferred);
2474 ret = rbd_obj_issue_copyup(obj_req, obj_req->xferred);
2475 if (ret) {
2476 obj_req->result = ret;
2477 return true;
2478 }
2479 return false;
2480 default:
2481 rbd_assert(0);
2482 }
2483}
2484
2485/*
2486 * Returns true if @obj_req is completed, or false otherwise.
2487 */
2488static bool __rbd_obj_handle_request(struct rbd_obj_request *obj_req)
2489{
Ilya Dryomov9bb02482018-01-30 17:52:10 +01002490 switch (obj_req->img_request->op_type) {
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002491 case OBJ_OP_READ:
2492 return rbd_obj_handle_read(obj_req);
2493 case OBJ_OP_WRITE:
2494 return rbd_obj_handle_write(obj_req);
2495 case OBJ_OP_DISCARD:
2496 if (rbd_obj_handle_write(obj_req)) {
2497 /*
2498 * Hide -ENOENT from delete/truncate/zero -- discarding
2499 * a non-existent object is not a problem.
2500 */
2501 if (obj_req->result == -ENOENT) {
2502 obj_req->result = 0;
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002503 obj_req->xferred = obj_req->ex.oe_len;
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002504 }
2505 return true;
2506 }
2507 return false;
2508 default:
2509 rbd_assert(0);
2510 }
2511}
2512
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002513static void rbd_obj_end_request(struct rbd_obj_request *obj_req)
2514{
2515 struct rbd_img_request *img_req = obj_req->img_request;
2516
2517 rbd_assert((!obj_req->result &&
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002518 obj_req->xferred == obj_req->ex.oe_len) ||
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002519 (obj_req->result < 0 && !obj_req->xferred));
2520 if (!obj_req->result) {
2521 img_req->xferred += obj_req->xferred;
Ilya Dryomov980917f2016-09-12 18:59:42 +02002522 return;
Alex Elder02c74fb2013-05-06 17:40:33 -05002523 }
2524
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002525 rbd_warn(img_req->rbd_dev,
2526 "%s at objno %llu %llu~%llu result %d xferred %llu",
Ilya Dryomov43df3d32018-02-02 15:23:22 +01002527 obj_op_name(img_req->op_type), obj_req->ex.oe_objno,
2528 obj_req->ex.oe_off, obj_req->ex.oe_len, obj_req->result,
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002529 obj_req->xferred);
2530 if (!img_req->result) {
2531 img_req->result = obj_req->result;
2532 img_req->xferred = 0;
Alex Eldera9e8ba2c2013-04-21 00:32:07 -05002533 }
Alex Elder8b3e1a52013-01-24 16:13:36 -06002534}
2535
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002536static void rbd_img_end_child_request(struct rbd_img_request *img_req)
Alex Elder8b3e1a52013-01-24 16:13:36 -06002537{
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002538 struct rbd_obj_request *obj_req = img_req->obj_request;
Alex Elder8b3e1a52013-01-24 16:13:36 -06002539
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002540 rbd_assert(test_bit(IMG_REQ_CHILD, &img_req->flags));
Ilya Dryomov86bd7992018-02-06 19:26:33 +01002541 rbd_assert((!img_req->result &&
2542 img_req->xferred == rbd_obj_img_extents_bytes(obj_req)) ||
2543 (img_req->result < 0 && !img_req->xferred));
Alex Elder8b3e1a52013-01-24 16:13:36 -06002544
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002545 obj_req->result = img_req->result;
2546 obj_req->xferred = img_req->xferred;
2547 rbd_img_request_put(img_req);
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002548}
Alex Elder8b3e1a52013-01-24 16:13:36 -06002549
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002550static void rbd_img_end_request(struct rbd_img_request *img_req)
2551{
2552 rbd_assert(!test_bit(IMG_REQ_CHILD, &img_req->flags));
2553 rbd_assert((!img_req->result &&
2554 img_req->xferred == blk_rq_bytes(img_req->rq)) ||
2555 (img_req->result < 0 && !img_req->xferred));
Alex Elder8b3e1a52013-01-24 16:13:36 -06002556
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002557 blk_mq_end_request(img_req->rq,
2558 errno_to_blk_status(img_req->result));
2559 rbd_img_request_put(img_req);
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002560}
Alex Elder8b3e1a52013-01-24 16:13:36 -06002561
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002562static void rbd_obj_handle_request(struct rbd_obj_request *obj_req)
2563{
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002564 struct rbd_img_request *img_req;
2565
2566again:
Ilya Dryomov3da691b2018-01-29 14:04:08 +01002567 if (!__rbd_obj_handle_request(obj_req))
2568 return;
2569
Ilya Dryomov7114eda2018-02-01 11:50:47 +01002570 img_req = obj_req->img_request;
2571 spin_lock(&img_req->completion_lock);
2572 rbd_obj_end_request(obj_req);
2573 rbd_assert(img_req->pending_count);
2574 if (--img_req->pending_count) {
2575 spin_unlock(&img_req->completion_lock);
2576 return;
2577 }
2578
2579 spin_unlock(&img_req->completion_lock);
2580 if (test_bit(IMG_REQ_CHILD, &img_req->flags)) {
2581 obj_req = img_req->obj_request;
2582 rbd_img_end_child_request(img_req);
2583 goto again;
2584 }
2585 rbd_img_end_request(img_req);
Alex Elder8b3e1a52013-01-24 16:13:36 -06002586}
2587
Ilya Dryomoved95b212016-08-12 16:40:02 +02002588static const struct rbd_client_id rbd_empty_cid;
2589
2590static bool rbd_cid_equal(const struct rbd_client_id *lhs,
2591 const struct rbd_client_id *rhs)
2592{
2593 return lhs->gid == rhs->gid && lhs->handle == rhs->handle;
2594}
2595
2596static struct rbd_client_id rbd_get_cid(struct rbd_device *rbd_dev)
2597{
2598 struct rbd_client_id cid;
2599
2600 mutex_lock(&rbd_dev->watch_mutex);
2601 cid.gid = ceph_client_gid(rbd_dev->rbd_client->client);
2602 cid.handle = rbd_dev->watch_cookie;
2603 mutex_unlock(&rbd_dev->watch_mutex);
2604 return cid;
2605}
2606
2607/*
2608 * lock_rwsem must be held for write
2609 */
2610static void rbd_set_owner_cid(struct rbd_device *rbd_dev,
2611 const struct rbd_client_id *cid)
2612{
2613 dout("%s rbd_dev %p %llu-%llu -> %llu-%llu\n", __func__, rbd_dev,
2614 rbd_dev->owner_cid.gid, rbd_dev->owner_cid.handle,
2615 cid->gid, cid->handle);
2616 rbd_dev->owner_cid = *cid; /* struct */
2617}
2618
2619static void format_lock_cookie(struct rbd_device *rbd_dev, char *buf)
2620{
2621 mutex_lock(&rbd_dev->watch_mutex);
2622 sprintf(buf, "%s %llu", RBD_LOCK_COOKIE_PREFIX, rbd_dev->watch_cookie);
2623 mutex_unlock(&rbd_dev->watch_mutex);
2624}
2625
Florian Margaineedd8ca82017-12-13 16:43:59 +01002626static void __rbd_lock(struct rbd_device *rbd_dev, const char *cookie)
2627{
2628 struct rbd_client_id cid = rbd_get_cid(rbd_dev);
2629
2630 strcpy(rbd_dev->lock_cookie, cookie);
2631 rbd_set_owner_cid(rbd_dev, &cid);
2632 queue_work(rbd_dev->task_wq, &rbd_dev->acquired_lock_work);
2633}
2634
Ilya Dryomoved95b212016-08-12 16:40:02 +02002635/*
2636 * lock_rwsem must be held for write
2637 */
2638static int rbd_lock(struct rbd_device *rbd_dev)
2639{
2640 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
Ilya Dryomoved95b212016-08-12 16:40:02 +02002641 char cookie[32];
2642 int ret;
2643
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02002644 WARN_ON(__rbd_is_lock_owner(rbd_dev) ||
2645 rbd_dev->lock_cookie[0] != '\0');
Ilya Dryomoved95b212016-08-12 16:40:02 +02002646
2647 format_lock_cookie(rbd_dev, cookie);
2648 ret = ceph_cls_lock(osdc, &rbd_dev->header_oid, &rbd_dev->header_oloc,
2649 RBD_LOCK_NAME, CEPH_CLS_LOCK_EXCLUSIVE, cookie,
2650 RBD_LOCK_TAG, "", 0);
2651 if (ret)
2652 return ret;
2653
2654 rbd_dev->lock_state = RBD_LOCK_STATE_LOCKED;
Florian Margaineedd8ca82017-12-13 16:43:59 +01002655 __rbd_lock(rbd_dev, cookie);
Ilya Dryomoved95b212016-08-12 16:40:02 +02002656 return 0;
2657}
2658
2659/*
2660 * lock_rwsem must be held for write
2661 */
Ilya Dryomovbbead742017-04-13 12:17:38 +02002662static void rbd_unlock(struct rbd_device *rbd_dev)
Ilya Dryomoved95b212016-08-12 16:40:02 +02002663{
2664 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
Ilya Dryomoved95b212016-08-12 16:40:02 +02002665 int ret;
2666
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02002667 WARN_ON(!__rbd_is_lock_owner(rbd_dev) ||
2668 rbd_dev->lock_cookie[0] == '\0');
Ilya Dryomoved95b212016-08-12 16:40:02 +02002669
Ilya Dryomoved95b212016-08-12 16:40:02 +02002670 ret = ceph_cls_unlock(osdc, &rbd_dev->header_oid, &rbd_dev->header_oloc,
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02002671 RBD_LOCK_NAME, rbd_dev->lock_cookie);
Ilya Dryomovbbead742017-04-13 12:17:38 +02002672 if (ret && ret != -ENOENT)
2673 rbd_warn(rbd_dev, "failed to unlock: %d", ret);
Ilya Dryomoved95b212016-08-12 16:40:02 +02002674
Ilya Dryomovbbead742017-04-13 12:17:38 +02002675 /* treat errors as the image is unlocked */
2676 rbd_dev->lock_state = RBD_LOCK_STATE_UNLOCKED;
Ilya Dryomovcbbfb0f2017-04-13 12:17:38 +02002677 rbd_dev->lock_cookie[0] = '\0';
Ilya Dryomoved95b212016-08-12 16:40:02 +02002678 rbd_set_owner_cid(rbd_dev, &rbd_empty_cid);
2679 queue_work(rbd_dev->task_wq, &rbd_dev->released_lock_work);
Ilya Dryomoved95b212016-08-12 16:40:02 +02002680}
2681
2682static int __rbd_notify_op_lock(struct rbd_device *rbd_dev,
2683 enum rbd_notify_op notify_op,
2684 struct page ***preply_pages,
2685 size_t *preply_len)
2686{
2687 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
2688 struct rbd_client_id cid = rbd_get_cid(rbd_dev);
Kyle Spiers08a79102018-03-17 09:44:01 -07002689 char buf[4 + 8 + 8 + CEPH_ENCODING_START_BLK_LEN];
2690 int buf_size = sizeof(buf);
Ilya Dryomoved95b212016-08-12 16:40:02 +02002691 void *p = buf;
2692
2693 dout("%s rbd_dev %p notify_op %d\n", __func__, rbd_dev, notify_op);
2694
2695 /* encode *LockPayload NotifyMessage (op + ClientId) */
2696 ceph_start_encoding(&p, 2, 1, buf_size - CEPH_ENCODING_START_BLK_LEN);
2697 ceph_encode_32(&p, notify_op);
2698 ceph_encode_64(&p, cid.gid);
2699 ceph_encode_64(&p, cid.handle);
2700
2701 return ceph_osdc_notify(osdc, &rbd_dev->header_oid,
2702 &rbd_dev->header_oloc, buf, buf_size,
2703 RBD_NOTIFY_TIMEOUT, preply_pages, preply_len);
2704}
2705
2706static void rbd_notify_op_lock(struct rbd_device *rbd_dev,
2707 enum rbd_notify_op notify_op)
2708{
2709 struct page **reply_pages;
2710 size_t reply_len;
2711
2712 __rbd_notify_op_lock(rbd_dev, notify_op, &reply_pages, &reply_len);
2713 ceph_release_page_vector(reply_pages, calc_pages_for(0, reply_len));
2714}
2715
2716static void rbd_notify_acquired_lock(struct work_struct *work)
2717{
2718 struct rbd_device *rbd_dev = container_of(work, struct rbd_device,
2719 acquired_lock_work);
2720
2721 rbd_notify_op_lock(rbd_dev, RBD_NOTIFY_OP_ACQUIRED_LOCK);
2722}
2723
2724static void rbd_notify_released_lock(struct work_struct *work)
2725{
2726 struct rbd_device *rbd_dev = container_of(work, struct rbd_device,
2727 released_lock_work);
2728
2729 rbd_notify_op_lock(rbd_dev, RBD_NOTIFY_OP_RELEASED_LOCK);
2730}
2731
2732static int rbd_request_lock(struct rbd_device *rbd_dev)
2733{
2734 struct page **reply_pages;
2735 size_t reply_len;
2736 bool lock_owner_responded = false;
2737 int ret;
2738
2739 dout("%s rbd_dev %p\n", __func__, rbd_dev);
2740
2741 ret = __rbd_notify_op_lock(rbd_dev, RBD_NOTIFY_OP_REQUEST_LOCK,
2742 &reply_pages, &reply_len);
2743 if (ret && ret != -ETIMEDOUT) {
2744 rbd_warn(rbd_dev, "failed to request lock: %d", ret);
2745 goto out;
2746 }
2747
2748 if (reply_len > 0 && reply_len <= PAGE_SIZE) {
2749 void *p = page_address(reply_pages[0]);
2750 void *const end = p + reply_len;
2751 u32 n;
2752
2753 ceph_decode_32_safe(&p, end, n, e_inval); /* num_acks */
2754 while (n--) {
2755 u8 struct_v;
2756 u32 len;
2757
2758 ceph_decode_need(&p, end, 8 + 8, e_inval);
2759 p += 8 + 8; /* skip gid and cookie */
2760
2761 ceph_decode_32_safe(&p, end, len, e_inval);
2762 if (!len)
2763 continue;
2764
2765 if (lock_owner_responded) {
2766 rbd_warn(rbd_dev,
2767 "duplicate lock owners detected");
2768 ret = -EIO;
2769 goto out;
2770 }
2771
2772 lock_owner_responded = true;
2773 ret = ceph_start_decoding(&p, end, 1, "ResponseMessage",
2774 &struct_v, &len);
2775 if (ret) {
2776 rbd_warn(rbd_dev,
2777 "failed to decode ResponseMessage: %d",
2778 ret);
2779 goto e_inval;
2780 }
2781
2782 ret = ceph_decode_32(&p);
2783 }
2784 }
2785
2786 if (!lock_owner_responded) {
2787 rbd_warn(rbd_dev, "no lock owners detected");
2788 ret = -ETIMEDOUT;
2789 }
2790
2791out:
2792 ceph_release_page_vector(reply_pages, calc_pages_for(0, reply_len));
2793 return ret;
2794
2795e_inval:
2796 ret = -EINVAL;
2797 goto out;
2798}
2799
2800static void wake_requests(struct rbd_device *rbd_dev, bool wake_all)
2801{
2802 dout("%s rbd_dev %p wake_all %d\n", __func__, rbd_dev, wake_all);
2803
2804 cancel_delayed_work(&rbd_dev->lock_dwork);
2805 if (wake_all)
2806 wake_up_all(&rbd_dev->lock_waitq);
2807 else
2808 wake_up(&rbd_dev->lock_waitq);
2809}
2810
2811static int get_lock_owner_info(struct rbd_device *rbd_dev,
2812 struct ceph_locker **lockers, u32 *num_lockers)
2813{
2814 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
2815 u8 lock_type;
2816 char *lock_tag;
2817 int ret;
2818
2819 dout("%s rbd_dev %p\n", __func__, rbd_dev);
2820
2821 ret = ceph_cls_lock_info(osdc, &rbd_dev->header_oid,
2822 &rbd_dev->header_oloc, RBD_LOCK_NAME,
2823 &lock_type, &lock_tag, lockers, num_lockers);
2824 if (ret)
2825 return ret;
2826
2827 if (*num_lockers == 0) {
2828 dout("%s rbd_dev %p no lockers detected\n", __func__, rbd_dev);
2829 goto out;
2830 }
2831
2832 if (strcmp(lock_tag, RBD_LOCK_TAG)) {
2833 rbd_warn(rbd_dev, "locked by external mechanism, tag %s",
2834 lock_tag);
2835 ret = -EBUSY;
2836 goto out;
2837 }
2838
2839 if (lock_type == CEPH_CLS_LOCK_SHARED) {
2840 rbd_warn(rbd_dev, "shared lock type detected");
2841 ret = -EBUSY;
2842 goto out;
2843 }
2844
2845 if (strncmp((*lockers)[0].id.cookie, RBD_LOCK_COOKIE_PREFIX,
2846 strlen(RBD_LOCK_COOKIE_PREFIX))) {
2847 rbd_warn(rbd_dev, "locked by external mechanism, cookie %s",
2848 (*lockers)[0].id.cookie);
2849 ret = -EBUSY;
2850 goto out;
2851 }
2852
2853out:
2854 kfree(lock_tag);
2855 return ret;
2856}
2857
2858static int find_watcher(struct rbd_device *rbd_dev,
2859 const struct ceph_locker *locker)
2860{
2861 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
2862 struct ceph_watch_item *watchers;
2863 u32 num_watchers;
2864 u64 cookie;
2865 int i;
2866 int ret;
2867
2868 ret = ceph_osdc_list_watchers(osdc, &rbd_dev->header_oid,
2869 &rbd_dev->header_oloc, &watchers,
2870 &num_watchers);
2871 if (ret)
2872 return ret;
2873
2874 sscanf(locker->id.cookie, RBD_LOCK_COOKIE_PREFIX " %llu", &cookie);
2875 for (i = 0; i < num_watchers; i++) {
2876 if (!memcmp(&watchers[i].addr, &locker->info.addr,
2877 sizeof(locker->info.addr)) &&
2878 watchers[i].cookie == cookie) {
2879 struct rbd_client_id cid = {
2880 .gid = le64_to_cpu(watchers[i].name.num),
2881 .handle = cookie,
2882 };
2883
2884 dout("%s rbd_dev %p found cid %llu-%llu\n", __func__,
2885 rbd_dev, cid.gid, cid.handle);
2886 rbd_set_owner_cid(rbd_dev, &cid);
2887 ret = 1;
2888 goto out;
2889 }
2890 }
2891
2892 dout("%s rbd_dev %p no watchers\n", __func__, rbd_dev);
2893 ret = 0;
2894out:
2895 kfree(watchers);
2896 return ret;
2897}
2898
2899/*
2900 * lock_rwsem must be held for write
2901 */
2902static int rbd_try_lock(struct rbd_device *rbd_dev)
2903{
2904 struct ceph_client *client = rbd_dev->rbd_client->client;
2905 struct ceph_locker *lockers;
2906 u32 num_lockers;
2907 int ret;
2908
2909 for (;;) {
2910 ret = rbd_lock(rbd_dev);
2911 if (ret != -EBUSY)
2912 return ret;
2913
2914 /* determine if the current lock holder is still alive */
2915 ret = get_lock_owner_info(rbd_dev, &lockers, &num_lockers);
2916 if (ret)
2917 return ret;
2918
2919 if (num_lockers == 0)
2920 goto again;
2921
2922 ret = find_watcher(rbd_dev, lockers);
2923 if (ret) {
2924 if (ret > 0)
2925 ret = 0; /* have to request lock */
2926 goto out;
2927 }
2928
2929 rbd_warn(rbd_dev, "%s%llu seems dead, breaking lock",
2930 ENTITY_NAME(lockers[0].id.name));
2931
2932 ret = ceph_monc_blacklist_add(&client->monc,
2933 &lockers[0].info.addr);
2934 if (ret) {
2935 rbd_warn(rbd_dev, "blacklist of %s%llu failed: %d",
2936 ENTITY_NAME(lockers[0].id.name), ret);
2937 goto out;
2938 }
2939
2940 ret = ceph_cls_break_lock(&client->osdc, &rbd_dev->header_oid,
2941 &rbd_dev->header_oloc, RBD_LOCK_NAME,
2942 lockers[0].id.cookie,
2943 &lockers[0].id.name);
2944 if (ret && ret != -ENOENT)
2945 goto out;
2946
2947again:
2948 ceph_free_lockers(lockers, num_lockers);
2949 }
2950
2951out:
2952 ceph_free_lockers(lockers, num_lockers);
2953 return ret;
2954}
2955
2956/*
2957 * ret is set only if lock_state is RBD_LOCK_STATE_UNLOCKED
2958 */
2959static enum rbd_lock_state rbd_try_acquire_lock(struct rbd_device *rbd_dev,
2960 int *pret)
2961{
2962 enum rbd_lock_state lock_state;
2963
2964 down_read(&rbd_dev->lock_rwsem);
2965 dout("%s rbd_dev %p read lock_state %d\n", __func__, rbd_dev,
2966 rbd_dev->lock_state);
2967 if (__rbd_is_lock_owner(rbd_dev)) {
2968 lock_state = rbd_dev->lock_state;
2969 up_read(&rbd_dev->lock_rwsem);
2970 return lock_state;
2971 }
2972
2973 up_read(&rbd_dev->lock_rwsem);
2974 down_write(&rbd_dev->lock_rwsem);
2975 dout("%s rbd_dev %p write lock_state %d\n", __func__, rbd_dev,
2976 rbd_dev->lock_state);
2977 if (!__rbd_is_lock_owner(rbd_dev)) {
2978 *pret = rbd_try_lock(rbd_dev);
2979 if (*pret)
2980 rbd_warn(rbd_dev, "failed to acquire lock: %d", *pret);
2981 }
2982
2983 lock_state = rbd_dev->lock_state;
2984 up_write(&rbd_dev->lock_rwsem);
2985 return lock_state;
2986}
2987
2988static void rbd_acquire_lock(struct work_struct *work)
2989{
2990 struct rbd_device *rbd_dev = container_of(to_delayed_work(work),
2991 struct rbd_device, lock_dwork);
2992 enum rbd_lock_state lock_state;
Kefeng Wang37f13252017-07-13 15:46:35 +08002993 int ret = 0;
Ilya Dryomoved95b212016-08-12 16:40:02 +02002994
2995 dout("%s rbd_dev %p\n", __func__, rbd_dev);
2996again:
2997 lock_state = rbd_try_acquire_lock(rbd_dev, &ret);
2998 if (lock_state != RBD_LOCK_STATE_UNLOCKED || ret == -EBLACKLISTED) {
2999 if (lock_state == RBD_LOCK_STATE_LOCKED)
3000 wake_requests(rbd_dev, true);
3001 dout("%s rbd_dev %p lock_state %d ret %d - done\n", __func__,
3002 rbd_dev, lock_state, ret);
3003 return;
3004 }
3005
3006 ret = rbd_request_lock(rbd_dev);
3007 if (ret == -ETIMEDOUT) {
3008 goto again; /* treat this as a dead client */
Ilya Dryomove010dd02017-04-13 12:17:39 +02003009 } else if (ret == -EROFS) {
3010 rbd_warn(rbd_dev, "peer will not release lock");
3011 /*
3012 * If this is rbd_add_acquire_lock(), we want to fail
3013 * immediately -- reuse BLACKLISTED flag. Otherwise we
3014 * want to block.
3015 */
3016 if (!(rbd_dev->disk->flags & GENHD_FL_UP)) {
3017 set_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags);
3018 /* wake "rbd map --exclusive" process */
3019 wake_requests(rbd_dev, false);
3020 }
Ilya Dryomoved95b212016-08-12 16:40:02 +02003021 } else if (ret < 0) {
3022 rbd_warn(rbd_dev, "error requesting lock: %d", ret);
3023 mod_delayed_work(rbd_dev->task_wq, &rbd_dev->lock_dwork,
3024 RBD_RETRY_DELAY);
3025 } else {
3026 /*
3027 * lock owner acked, but resend if we don't see them
3028 * release the lock
3029 */
3030 dout("%s rbd_dev %p requeueing lock_dwork\n", __func__,
3031 rbd_dev);
3032 mod_delayed_work(rbd_dev->task_wq, &rbd_dev->lock_dwork,
3033 msecs_to_jiffies(2 * RBD_NOTIFY_TIMEOUT * MSEC_PER_SEC));
3034 }
3035}
3036
3037/*
3038 * lock_rwsem must be held for write
3039 */
3040static bool rbd_release_lock(struct rbd_device *rbd_dev)
3041{
3042 dout("%s rbd_dev %p read lock_state %d\n", __func__, rbd_dev,
3043 rbd_dev->lock_state);
3044 if (rbd_dev->lock_state != RBD_LOCK_STATE_LOCKED)
3045 return false;
3046
3047 rbd_dev->lock_state = RBD_LOCK_STATE_RELEASING;
3048 downgrade_write(&rbd_dev->lock_rwsem);
3049 /*
3050 * Ensure that all in-flight IO is flushed.
3051 *
3052 * FIXME: ceph_osdc_sync() flushes the entire OSD client, which
3053 * may be shared with other devices.
3054 */
3055 ceph_osdc_sync(&rbd_dev->rbd_client->client->osdc);
3056 up_read(&rbd_dev->lock_rwsem);
3057
3058 down_write(&rbd_dev->lock_rwsem);
3059 dout("%s rbd_dev %p write lock_state %d\n", __func__, rbd_dev,
3060 rbd_dev->lock_state);
3061 if (rbd_dev->lock_state != RBD_LOCK_STATE_RELEASING)
3062 return false;
3063
Ilya Dryomovbbead742017-04-13 12:17:38 +02003064 rbd_unlock(rbd_dev);
3065 /*
3066 * Give others a chance to grab the lock - we would re-acquire
3067 * almost immediately if we got new IO during ceph_osdc_sync()
3068 * otherwise. We need to ack our own notifications, so this
3069 * lock_dwork will be requeued from rbd_wait_state_locked()
3070 * after wake_requests() in rbd_handle_released_lock().
3071 */
3072 cancel_delayed_work(&rbd_dev->lock_dwork);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003073 return true;
3074}
3075
3076static void rbd_release_lock_work(struct work_struct *work)
3077{
3078 struct rbd_device *rbd_dev = container_of(work, struct rbd_device,
3079 unlock_work);
3080
3081 down_write(&rbd_dev->lock_rwsem);
3082 rbd_release_lock(rbd_dev);
3083 up_write(&rbd_dev->lock_rwsem);
3084}
3085
3086static void rbd_handle_acquired_lock(struct rbd_device *rbd_dev, u8 struct_v,
3087 void **p)
3088{
3089 struct rbd_client_id cid = { 0 };
3090
3091 if (struct_v >= 2) {
3092 cid.gid = ceph_decode_64(p);
3093 cid.handle = ceph_decode_64(p);
3094 }
3095
3096 dout("%s rbd_dev %p cid %llu-%llu\n", __func__, rbd_dev, cid.gid,
3097 cid.handle);
3098 if (!rbd_cid_equal(&cid, &rbd_empty_cid)) {
3099 down_write(&rbd_dev->lock_rwsem);
3100 if (rbd_cid_equal(&cid, &rbd_dev->owner_cid)) {
3101 /*
3102 * we already know that the remote client is
3103 * the owner
3104 */
3105 up_write(&rbd_dev->lock_rwsem);
3106 return;
3107 }
3108
3109 rbd_set_owner_cid(rbd_dev, &cid);
3110 downgrade_write(&rbd_dev->lock_rwsem);
3111 } else {
3112 down_read(&rbd_dev->lock_rwsem);
3113 }
3114
3115 if (!__rbd_is_lock_owner(rbd_dev))
3116 wake_requests(rbd_dev, false);
3117 up_read(&rbd_dev->lock_rwsem);
3118}
3119
3120static void rbd_handle_released_lock(struct rbd_device *rbd_dev, u8 struct_v,
3121 void **p)
3122{
3123 struct rbd_client_id cid = { 0 };
3124
3125 if (struct_v >= 2) {
3126 cid.gid = ceph_decode_64(p);
3127 cid.handle = ceph_decode_64(p);
3128 }
3129
3130 dout("%s rbd_dev %p cid %llu-%llu\n", __func__, rbd_dev, cid.gid,
3131 cid.handle);
3132 if (!rbd_cid_equal(&cid, &rbd_empty_cid)) {
3133 down_write(&rbd_dev->lock_rwsem);
3134 if (!rbd_cid_equal(&cid, &rbd_dev->owner_cid)) {
3135 dout("%s rbd_dev %p unexpected owner, cid %llu-%llu != owner_cid %llu-%llu\n",
3136 __func__, rbd_dev, cid.gid, cid.handle,
3137 rbd_dev->owner_cid.gid, rbd_dev->owner_cid.handle);
3138 up_write(&rbd_dev->lock_rwsem);
3139 return;
3140 }
3141
3142 rbd_set_owner_cid(rbd_dev, &rbd_empty_cid);
3143 downgrade_write(&rbd_dev->lock_rwsem);
3144 } else {
3145 down_read(&rbd_dev->lock_rwsem);
3146 }
3147
3148 if (!__rbd_is_lock_owner(rbd_dev))
3149 wake_requests(rbd_dev, false);
3150 up_read(&rbd_dev->lock_rwsem);
3151}
3152
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003153/*
3154 * Returns result for ResponseMessage to be encoded (<= 0), or 1 if no
3155 * ResponseMessage is needed.
3156 */
3157static int rbd_handle_request_lock(struct rbd_device *rbd_dev, u8 struct_v,
3158 void **p)
Ilya Dryomoved95b212016-08-12 16:40:02 +02003159{
3160 struct rbd_client_id my_cid = rbd_get_cid(rbd_dev);
3161 struct rbd_client_id cid = { 0 };
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003162 int result = 1;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003163
3164 if (struct_v >= 2) {
3165 cid.gid = ceph_decode_64(p);
3166 cid.handle = ceph_decode_64(p);
3167 }
3168
3169 dout("%s rbd_dev %p cid %llu-%llu\n", __func__, rbd_dev, cid.gid,
3170 cid.handle);
3171 if (rbd_cid_equal(&cid, &my_cid))
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003172 return result;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003173
3174 down_read(&rbd_dev->lock_rwsem);
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003175 if (__rbd_is_lock_owner(rbd_dev)) {
3176 if (rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED &&
3177 rbd_cid_equal(&rbd_dev->owner_cid, &rbd_empty_cid))
3178 goto out_unlock;
3179
3180 /*
3181 * encode ResponseMessage(0) so the peer can detect
3182 * a missing owner
3183 */
3184 result = 0;
3185
3186 if (rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED) {
Ilya Dryomove010dd02017-04-13 12:17:39 +02003187 if (!rbd_dev->opts->exclusive) {
3188 dout("%s rbd_dev %p queueing unlock_work\n",
3189 __func__, rbd_dev);
3190 queue_work(rbd_dev->task_wq,
3191 &rbd_dev->unlock_work);
3192 } else {
3193 /* refuse to release the lock */
3194 result = -EROFS;
3195 }
Ilya Dryomoved95b212016-08-12 16:40:02 +02003196 }
3197 }
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003198
3199out_unlock:
Ilya Dryomoved95b212016-08-12 16:40:02 +02003200 up_read(&rbd_dev->lock_rwsem);
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003201 return result;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003202}
3203
3204static void __rbd_acknowledge_notify(struct rbd_device *rbd_dev,
3205 u64 notify_id, u64 cookie, s32 *result)
3206{
3207 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
Kyle Spiers08a79102018-03-17 09:44:01 -07003208 char buf[4 + CEPH_ENCODING_START_BLK_LEN];
3209 int buf_size = sizeof(buf);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003210 int ret;
3211
3212 if (result) {
3213 void *p = buf;
3214
3215 /* encode ResponseMessage */
3216 ceph_start_encoding(&p, 1, 1,
3217 buf_size - CEPH_ENCODING_START_BLK_LEN);
3218 ceph_encode_32(&p, *result);
3219 } else {
3220 buf_size = 0;
3221 }
3222
3223 ret = ceph_osdc_notify_ack(osdc, &rbd_dev->header_oid,
3224 &rbd_dev->header_oloc, notify_id, cookie,
3225 buf, buf_size);
3226 if (ret)
3227 rbd_warn(rbd_dev, "acknowledge_notify failed: %d", ret);
3228}
3229
3230static void rbd_acknowledge_notify(struct rbd_device *rbd_dev, u64 notify_id,
3231 u64 cookie)
3232{
3233 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3234 __rbd_acknowledge_notify(rbd_dev, notify_id, cookie, NULL);
3235}
3236
3237static void rbd_acknowledge_notify_result(struct rbd_device *rbd_dev,
3238 u64 notify_id, u64 cookie, s32 result)
3239{
3240 dout("%s rbd_dev %p result %d\n", __func__, rbd_dev, result);
3241 __rbd_acknowledge_notify(rbd_dev, notify_id, cookie, &result);
3242}
Ilya Dryomov922dab62016-05-26 01:15:02 +02003243
3244static void rbd_watch_cb(void *arg, u64 notify_id, u64 cookie,
3245 u64 notifier_id, void *data, size_t data_len)
Alex Elderb8d70032012-11-30 17:53:04 -06003246{
Ilya Dryomov922dab62016-05-26 01:15:02 +02003247 struct rbd_device *rbd_dev = arg;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003248 void *p = data;
3249 void *const end = p + data_len;
Ilya Dryomovd4c22692016-09-06 11:15:48 +02003250 u8 struct_v = 0;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003251 u32 len;
3252 u32 notify_op;
Alex Elderb8d70032012-11-30 17:53:04 -06003253 int ret;
3254
Ilya Dryomoved95b212016-08-12 16:40:02 +02003255 dout("%s rbd_dev %p cookie %llu notify_id %llu data_len %zu\n",
3256 __func__, rbd_dev, cookie, notify_id, data_len);
3257 if (data_len) {
3258 ret = ceph_start_decoding(&p, end, 1, "NotifyMessage",
3259 &struct_v, &len);
3260 if (ret) {
3261 rbd_warn(rbd_dev, "failed to decode NotifyMessage: %d",
3262 ret);
3263 return;
3264 }
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04003265
Ilya Dryomoved95b212016-08-12 16:40:02 +02003266 notify_op = ceph_decode_32(&p);
3267 } else {
3268 /* legacy notification for header updates */
3269 notify_op = RBD_NOTIFY_OP_HEADER_UPDATE;
3270 len = 0;
3271 }
Alex Elderb8d70032012-11-30 17:53:04 -06003272
Ilya Dryomoved95b212016-08-12 16:40:02 +02003273 dout("%s rbd_dev %p notify_op %u\n", __func__, rbd_dev, notify_op);
3274 switch (notify_op) {
3275 case RBD_NOTIFY_OP_ACQUIRED_LOCK:
3276 rbd_handle_acquired_lock(rbd_dev, struct_v, &p);
3277 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3278 break;
3279 case RBD_NOTIFY_OP_RELEASED_LOCK:
3280 rbd_handle_released_lock(rbd_dev, struct_v, &p);
3281 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3282 break;
3283 case RBD_NOTIFY_OP_REQUEST_LOCK:
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003284 ret = rbd_handle_request_lock(rbd_dev, struct_v, &p);
3285 if (ret <= 0)
Ilya Dryomoved95b212016-08-12 16:40:02 +02003286 rbd_acknowledge_notify_result(rbd_dev, notify_id,
Ilya Dryomov3b77faa2017-04-13 12:17:39 +02003287 cookie, ret);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003288 else
3289 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3290 break;
3291 case RBD_NOTIFY_OP_HEADER_UPDATE:
3292 ret = rbd_dev_refresh(rbd_dev);
3293 if (ret)
3294 rbd_warn(rbd_dev, "refresh failed: %d", ret);
3295
3296 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3297 break;
3298 default:
3299 if (rbd_is_lock_owner(rbd_dev))
3300 rbd_acknowledge_notify_result(rbd_dev, notify_id,
3301 cookie, -EOPNOTSUPP);
3302 else
3303 rbd_acknowledge_notify(rbd_dev, notify_id, cookie);
3304 break;
3305 }
Alex Elderb8d70032012-11-30 17:53:04 -06003306}
3307
Ilya Dryomov99d16942016-08-12 16:11:41 +02003308static void __rbd_unregister_watch(struct rbd_device *rbd_dev);
3309
Ilya Dryomov922dab62016-05-26 01:15:02 +02003310static void rbd_watch_errcb(void *arg, u64 cookie, int err)
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003311{
Ilya Dryomov922dab62016-05-26 01:15:02 +02003312 struct rbd_device *rbd_dev = arg;
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003313
Ilya Dryomov922dab62016-05-26 01:15:02 +02003314 rbd_warn(rbd_dev, "encountered watch error: %d", err);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003315
Ilya Dryomoved95b212016-08-12 16:40:02 +02003316 down_write(&rbd_dev->lock_rwsem);
3317 rbd_set_owner_cid(rbd_dev, &rbd_empty_cid);
3318 up_write(&rbd_dev->lock_rwsem);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003319
Ilya Dryomov99d16942016-08-12 16:11:41 +02003320 mutex_lock(&rbd_dev->watch_mutex);
3321 if (rbd_dev->watch_state == RBD_WATCH_STATE_REGISTERED) {
3322 __rbd_unregister_watch(rbd_dev);
3323 rbd_dev->watch_state = RBD_WATCH_STATE_ERROR;
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003324
Ilya Dryomov99d16942016-08-12 16:11:41 +02003325 queue_delayed_work(rbd_dev->task_wq, &rbd_dev->watch_dwork, 0);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003326 }
Ilya Dryomov99d16942016-08-12 16:11:41 +02003327 mutex_unlock(&rbd_dev->watch_mutex);
Ilya Dryomovbb040aa2014-06-19 11:38:14 +04003328}
3329
3330/*
Ilya Dryomov99d16942016-08-12 16:11:41 +02003331 * watch_mutex must be locked
Alex Elder9969ebc2013-01-18 12:31:10 -06003332 */
Ilya Dryomov99d16942016-08-12 16:11:41 +02003333static int __rbd_register_watch(struct rbd_device *rbd_dev)
Alex Elder9969ebc2013-01-18 12:31:10 -06003334{
3335 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
Ilya Dryomov922dab62016-05-26 01:15:02 +02003336 struct ceph_osd_linger_request *handle;
Alex Elder9969ebc2013-01-18 12:31:10 -06003337
Ilya Dryomov922dab62016-05-26 01:15:02 +02003338 rbd_assert(!rbd_dev->watch_handle);
Ilya Dryomov99d16942016-08-12 16:11:41 +02003339 dout("%s rbd_dev %p\n", __func__, rbd_dev);
Alex Elder9969ebc2013-01-18 12:31:10 -06003340
Ilya Dryomov922dab62016-05-26 01:15:02 +02003341 handle = ceph_osdc_watch(osdc, &rbd_dev->header_oid,
3342 &rbd_dev->header_oloc, rbd_watch_cb,
3343 rbd_watch_errcb, rbd_dev);
3344 if (IS_ERR(handle))
3345 return PTR_ERR(handle);
Alex Elder9969ebc2013-01-18 12:31:10 -06003346
Ilya Dryomov922dab62016-05-26 01:15:02 +02003347 rbd_dev->watch_handle = handle;
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003348 return 0;
Alex Elder9969ebc2013-01-18 12:31:10 -06003349}
3350
Ilya Dryomov99d16942016-08-12 16:11:41 +02003351/*
3352 * watch_mutex must be locked
3353 */
3354static void __rbd_unregister_watch(struct rbd_device *rbd_dev)
Ilya Dryomovfca27062013-12-16 18:02:40 +02003355{
Ilya Dryomov922dab62016-05-26 01:15:02 +02003356 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3357 int ret;
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003358
Ilya Dryomov99d16942016-08-12 16:11:41 +02003359 rbd_assert(rbd_dev->watch_handle);
3360 dout("%s rbd_dev %p\n", __func__, rbd_dev);
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003361
Ilya Dryomov922dab62016-05-26 01:15:02 +02003362 ret = ceph_osdc_unwatch(osdc, rbd_dev->watch_handle);
3363 if (ret)
3364 rbd_warn(rbd_dev, "failed to unwatch: %d", ret);
Ilya Dryomovb30a01f2014-05-22 19:28:52 +04003365
Ilya Dryomov922dab62016-05-26 01:15:02 +02003366 rbd_dev->watch_handle = NULL;
Ilya Dryomovc525f032016-04-28 16:07:26 +02003367}
3368
Ilya Dryomov99d16942016-08-12 16:11:41 +02003369static int rbd_register_watch(struct rbd_device *rbd_dev)
Ilya Dryomovc525f032016-04-28 16:07:26 +02003370{
Ilya Dryomov99d16942016-08-12 16:11:41 +02003371 int ret;
Ilya Dryomov811c6682016-04-15 16:22:16 +02003372
Ilya Dryomov99d16942016-08-12 16:11:41 +02003373 mutex_lock(&rbd_dev->watch_mutex);
3374 rbd_assert(rbd_dev->watch_state == RBD_WATCH_STATE_UNREGISTERED);
3375 ret = __rbd_register_watch(rbd_dev);
3376 if (ret)
3377 goto out;
3378
3379 rbd_dev->watch_state = RBD_WATCH_STATE_REGISTERED;
3380 rbd_dev->watch_cookie = rbd_dev->watch_handle->linger_id;
3381
3382out:
3383 mutex_unlock(&rbd_dev->watch_mutex);
3384 return ret;
3385}
3386
3387static void cancel_tasks_sync(struct rbd_device *rbd_dev)
3388{
3389 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3390
3391 cancel_delayed_work_sync(&rbd_dev->watch_dwork);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003392 cancel_work_sync(&rbd_dev->acquired_lock_work);
3393 cancel_work_sync(&rbd_dev->released_lock_work);
3394 cancel_delayed_work_sync(&rbd_dev->lock_dwork);
3395 cancel_work_sync(&rbd_dev->unlock_work);
Ilya Dryomov99d16942016-08-12 16:11:41 +02003396}
3397
3398static void rbd_unregister_watch(struct rbd_device *rbd_dev)
3399{
Ilya Dryomoved95b212016-08-12 16:40:02 +02003400 WARN_ON(waitqueue_active(&rbd_dev->lock_waitq));
Ilya Dryomov99d16942016-08-12 16:11:41 +02003401 cancel_tasks_sync(rbd_dev);
3402
3403 mutex_lock(&rbd_dev->watch_mutex);
3404 if (rbd_dev->watch_state == RBD_WATCH_STATE_REGISTERED)
3405 __rbd_unregister_watch(rbd_dev);
3406 rbd_dev->watch_state = RBD_WATCH_STATE_UNREGISTERED;
3407 mutex_unlock(&rbd_dev->watch_mutex);
3408
Ilya Dryomov811c6682016-04-15 16:22:16 +02003409 ceph_osdc_flush_notifies(&rbd_dev->rbd_client->client->osdc);
Ilya Dryomovfca27062013-12-16 18:02:40 +02003410}
3411
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003412/*
3413 * lock_rwsem must be held for write
3414 */
3415static void rbd_reacquire_lock(struct rbd_device *rbd_dev)
3416{
3417 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3418 char cookie[32];
3419 int ret;
3420
3421 WARN_ON(rbd_dev->lock_state != RBD_LOCK_STATE_LOCKED);
3422
3423 format_lock_cookie(rbd_dev, cookie);
3424 ret = ceph_cls_set_cookie(osdc, &rbd_dev->header_oid,
3425 &rbd_dev->header_oloc, RBD_LOCK_NAME,
3426 CEPH_CLS_LOCK_EXCLUSIVE, rbd_dev->lock_cookie,
3427 RBD_LOCK_TAG, cookie);
3428 if (ret) {
3429 if (ret != -EOPNOTSUPP)
3430 rbd_warn(rbd_dev, "failed to update lock cookie: %d",
3431 ret);
3432
3433 /*
3434 * Lock cookie cannot be updated on older OSDs, so do
3435 * a manual release and queue an acquire.
3436 */
3437 if (rbd_release_lock(rbd_dev))
3438 queue_delayed_work(rbd_dev->task_wq,
3439 &rbd_dev->lock_dwork, 0);
3440 } else {
Florian Margaineedd8ca82017-12-13 16:43:59 +01003441 __rbd_lock(rbd_dev, cookie);
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003442 }
3443}
3444
Ilya Dryomov99d16942016-08-12 16:11:41 +02003445static void rbd_reregister_watch(struct work_struct *work)
3446{
3447 struct rbd_device *rbd_dev = container_of(to_delayed_work(work),
3448 struct rbd_device, watch_dwork);
3449 int ret;
3450
3451 dout("%s rbd_dev %p\n", __func__, rbd_dev);
3452
3453 mutex_lock(&rbd_dev->watch_mutex);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003454 if (rbd_dev->watch_state != RBD_WATCH_STATE_ERROR) {
3455 mutex_unlock(&rbd_dev->watch_mutex);
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003456 return;
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003457 }
Ilya Dryomov99d16942016-08-12 16:11:41 +02003458
3459 ret = __rbd_register_watch(rbd_dev);
3460 if (ret) {
3461 rbd_warn(rbd_dev, "failed to reregister watch: %d", ret);
Ilya Dryomov4d736442016-09-29 14:23:12 +02003462 if (ret == -EBLACKLISTED || ret == -ENOENT) {
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003463 set_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags);
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003464 wake_requests(rbd_dev, true);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003465 } else {
Ilya Dryomov99d16942016-08-12 16:11:41 +02003466 queue_delayed_work(rbd_dev->task_wq,
3467 &rbd_dev->watch_dwork,
3468 RBD_RETRY_DELAY);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003469 }
3470 mutex_unlock(&rbd_dev->watch_mutex);
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003471 return;
Ilya Dryomov99d16942016-08-12 16:11:41 +02003472 }
3473
3474 rbd_dev->watch_state = RBD_WATCH_STATE_REGISTERED;
3475 rbd_dev->watch_cookie = rbd_dev->watch_handle->linger_id;
3476 mutex_unlock(&rbd_dev->watch_mutex);
3477
Ilya Dryomov14bb2112017-04-13 12:17:38 +02003478 down_write(&rbd_dev->lock_rwsem);
3479 if (rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED)
3480 rbd_reacquire_lock(rbd_dev);
3481 up_write(&rbd_dev->lock_rwsem);
3482
Ilya Dryomov99d16942016-08-12 16:11:41 +02003483 ret = rbd_dev_refresh(rbd_dev);
3484 if (ret)
Colin Ian Kingf6870cc2018-03-19 13:33:10 +00003485 rbd_warn(rbd_dev, "reregistration refresh failed: %d", ret);
Ilya Dryomov99d16942016-08-12 16:11:41 +02003486}
3487
Alex Elder36be9a72013-01-19 00:30:28 -06003488/*
Alex Elderf40eb342013-04-25 15:09:42 -05003489 * Synchronous osd object method call. Returns the number of bytes
3490 * returned in the outbound buffer, or a negative error code.
Alex Elder36be9a72013-01-19 00:30:28 -06003491 */
3492static int rbd_obj_method_sync(struct rbd_device *rbd_dev,
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003493 struct ceph_object_id *oid,
3494 struct ceph_object_locator *oloc,
Alex Elder36be9a72013-01-19 00:30:28 -06003495 const char *method_name,
Alex Elder41579762013-04-21 12:14:45 -05003496 const void *outbound,
Alex Elder36be9a72013-01-19 00:30:28 -06003497 size_t outbound_size,
Alex Elder41579762013-04-21 12:14:45 -05003498 void *inbound,
Alex Eldere2a58ee2013-04-30 00:44:33 -05003499 size_t inbound_size)
Alex Elder36be9a72013-01-19 00:30:28 -06003500{
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003501 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3502 struct page *req_page = NULL;
3503 struct page *reply_page;
Alex Elder36be9a72013-01-19 00:30:28 -06003504 int ret;
3505
3506 /*
Alex Elder6010a452013-04-05 01:27:11 -05003507 * Method calls are ultimately read operations. The result
3508 * should placed into the inbound buffer provided. They
3509 * also supply outbound data--parameters for the object
3510 * method. Currently if this is present it will be a
3511 * snapshot id.
Alex Elder36be9a72013-01-19 00:30:28 -06003512 */
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003513 if (outbound) {
3514 if (outbound_size > PAGE_SIZE)
3515 return -E2BIG;
Alex Elder36be9a72013-01-19 00:30:28 -06003516
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003517 req_page = alloc_page(GFP_KERNEL);
3518 if (!req_page)
3519 return -ENOMEM;
Alex Elder36be9a72013-01-19 00:30:28 -06003520
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003521 memcpy(page_address(req_page), outbound, outbound_size);
Alex Elder04017e22013-04-05 14:46:02 -05003522 }
Alex Elder430c28c2013-04-03 21:32:51 -05003523
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003524 reply_page = alloc_page(GFP_KERNEL);
3525 if (!reply_page) {
3526 if (req_page)
3527 __free_page(req_page);
3528 return -ENOMEM;
3529 }
Alex Elder36be9a72013-01-19 00:30:28 -06003530
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003531 ret = ceph_osdc_call(osdc, oid, oloc, RBD_DRV_NAME, method_name,
3532 CEPH_OSD_FLAG_READ, req_page, outbound_size,
3533 reply_page, &inbound_size);
3534 if (!ret) {
3535 memcpy(inbound, page_address(reply_page), inbound_size);
3536 ret = inbound_size;
3537 }
Alex Elder57385b52013-04-21 12:14:45 -05003538
Ilya Dryomovecd4a682017-01-25 18:16:21 +01003539 if (req_page)
3540 __free_page(req_page);
3541 __free_page(reply_page);
Alex Elder36be9a72013-01-19 00:30:28 -06003542 return ret;
3543}
3544
Ilya Dryomoved95b212016-08-12 16:40:02 +02003545/*
3546 * lock_rwsem must be held for read
3547 */
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003548static int rbd_wait_state_locked(struct rbd_device *rbd_dev, bool may_acquire)
Ilya Dryomoved95b212016-08-12 16:40:02 +02003549{
3550 DEFINE_WAIT(wait);
Dongsheng Yang34f55d02018-03-26 10:22:55 -04003551 unsigned long timeout;
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003552 int ret = 0;
3553
3554 if (test_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags))
3555 return -EBLACKLISTED;
3556
3557 if (rbd_dev->lock_state == RBD_LOCK_STATE_LOCKED)
3558 return 0;
3559
3560 if (!may_acquire) {
3561 rbd_warn(rbd_dev, "exclusive lock required");
3562 return -EROFS;
3563 }
Ilya Dryomoved95b212016-08-12 16:40:02 +02003564
3565 do {
3566 /*
3567 * Note the use of mod_delayed_work() in rbd_acquire_lock()
3568 * and cancel_delayed_work() in wake_requests().
3569 */
3570 dout("%s rbd_dev %p queueing lock_dwork\n", __func__, rbd_dev);
3571 queue_delayed_work(rbd_dev->task_wq, &rbd_dev->lock_dwork, 0);
3572 prepare_to_wait_exclusive(&rbd_dev->lock_waitq, &wait,
3573 TASK_UNINTERRUPTIBLE);
3574 up_read(&rbd_dev->lock_rwsem);
Dongsheng Yang34f55d02018-03-26 10:22:55 -04003575 timeout = schedule_timeout(ceph_timeout_jiffies(
3576 rbd_dev->opts->lock_timeout));
Ilya Dryomoved95b212016-08-12 16:40:02 +02003577 down_read(&rbd_dev->lock_rwsem);
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003578 if (test_bit(RBD_DEV_FLAG_BLACKLISTED, &rbd_dev->flags)) {
3579 ret = -EBLACKLISTED;
3580 break;
3581 }
Dongsheng Yang34f55d02018-03-26 10:22:55 -04003582 if (!timeout) {
3583 rbd_warn(rbd_dev, "timed out waiting for lock");
3584 ret = -ETIMEDOUT;
3585 break;
3586 }
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003587 } while (rbd_dev->lock_state != RBD_LOCK_STATE_LOCKED);
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003588
Ilya Dryomoved95b212016-08-12 16:40:02 +02003589 finish_wait(&rbd_dev->lock_waitq, &wait);
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003590 return ret;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003591}
3592
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003593static void rbd_queue_workfn(struct work_struct *work)
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003594{
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003595 struct request *rq = blk_mq_rq_from_pdu(work);
3596 struct rbd_device *rbd_dev = rq->q->queuedata;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003597 struct rbd_img_request *img_request;
Josh Durgin4e752f02014-04-08 11:12:11 -07003598 struct ceph_snap_context *snapc = NULL;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003599 u64 offset = (u64)blk_rq_pos(rq) << SECTOR_SHIFT;
3600 u64 length = blk_rq_bytes(rq);
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08003601 enum obj_operation_type op_type;
Josh Durgin4e752f02014-04-08 11:12:11 -07003602 u64 mapping_size;
Ilya Dryomov80de1912016-09-20 14:23:17 +02003603 bool must_be_locked;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003604 int result;
3605
Christoph Hellwigaebf5262017-01-31 16:57:31 +01003606 switch (req_op(rq)) {
3607 case REQ_OP_DISCARD:
Ilya Dryomov6ac56952017-05-22 19:59:24 +02003608 case REQ_OP_WRITE_ZEROES:
Christoph Hellwigaebf5262017-01-31 16:57:31 +01003609 op_type = OBJ_OP_DISCARD;
3610 break;
3611 case REQ_OP_WRITE:
3612 op_type = OBJ_OP_WRITE;
3613 break;
3614 case REQ_OP_READ:
3615 op_type = OBJ_OP_READ;
3616 break;
3617 default:
3618 dout("%s: non-fs request type %d\n", __func__, req_op(rq));
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003619 result = -EIO;
3620 goto err;
3621 }
3622
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003623 /* Ignore/skip any zero-length requests */
3624
3625 if (!length) {
3626 dout("%s: zero-length request\n", __func__);
3627 result = 0;
3628 goto err_rq;
3629 }
3630
Ilya Dryomov9568c932017-10-12 12:35:19 +02003631 rbd_assert(op_type == OBJ_OP_READ ||
3632 rbd_dev->spec->snap_id == CEPH_NOSNAP);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003633
3634 /*
3635 * Quit early if the mapped snapshot no longer exists. It's
3636 * still possible the snapshot will have disappeared by the
3637 * time our request arrives at the osd, but there's no sense in
3638 * sending it if we already know.
3639 */
3640 if (!test_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags)) {
3641 dout("request for non-existent snapshot");
3642 rbd_assert(rbd_dev->spec->snap_id != CEPH_NOSNAP);
3643 result = -ENXIO;
3644 goto err_rq;
3645 }
3646
3647 if (offset && length > U64_MAX - offset + 1) {
3648 rbd_warn(rbd_dev, "bad request range (%llu~%llu)", offset,
3649 length);
3650 result = -EINVAL;
3651 goto err_rq; /* Shouldn't happen */
3652 }
3653
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003654 blk_mq_start_request(rq);
3655
Josh Durgin4e752f02014-04-08 11:12:11 -07003656 down_read(&rbd_dev->header_rwsem);
3657 mapping_size = rbd_dev->mapping.size;
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08003658 if (op_type != OBJ_OP_READ) {
Josh Durgin4e752f02014-04-08 11:12:11 -07003659 snapc = rbd_dev->header.snapc;
3660 ceph_get_snap_context(snapc);
3661 }
3662 up_read(&rbd_dev->header_rwsem);
3663
3664 if (offset + length > mapping_size) {
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003665 rbd_warn(rbd_dev, "beyond EOD (%llu~%llu > %llu)", offset,
Josh Durgin4e752f02014-04-08 11:12:11 -07003666 length, mapping_size);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003667 result = -EIO;
3668 goto err_rq;
3669 }
3670
Ilya Dryomovf9bebd52017-04-13 12:17:39 +02003671 must_be_locked =
3672 (rbd_dev->header.features & RBD_FEATURE_EXCLUSIVE_LOCK) &&
3673 (op_type != OBJ_OP_READ || rbd_dev->opts->lock_on_read);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003674 if (must_be_locked) {
3675 down_read(&rbd_dev->lock_rwsem);
Ilya Dryomov2f18d462018-04-04 10:15:38 +02003676 result = rbd_wait_state_locked(rbd_dev,
3677 !rbd_dev->opts->exclusive);
3678 if (result)
Ilya Dryomov87c0fde2016-09-29 13:41:05 +02003679 goto err_unlock;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003680 }
3681
Ilya Dryomovdfd98752018-02-06 19:26:35 +01003682 img_request = rbd_img_request_create(rbd_dev, op_type, snapc);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003683 if (!img_request) {
3684 result = -ENOMEM;
Ilya Dryomoved95b212016-08-12 16:40:02 +02003685 goto err_unlock;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003686 }
3687 img_request->rq = rq;
Ilya Dryomov70b16db2015-11-27 19:23:24 +01003688 snapc = NULL; /* img_request consumes a ref */
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003689
Guangliang Zhao90e98c52014-04-01 22:22:16 +08003690 if (op_type == OBJ_OP_DISCARD)
Ilya Dryomov5a237812018-02-06 19:26:34 +01003691 result = rbd_img_fill_nodata(img_request, offset, length);
Guangliang Zhao90e98c52014-04-01 22:22:16 +08003692 else
Ilya Dryomov5a237812018-02-06 19:26:34 +01003693 result = rbd_img_fill_from_bio(img_request, offset, length,
3694 rq->bio);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003695 if (result)
3696 goto err_img_request;
3697
Ilya Dryomovefbd1a12018-01-30 17:52:11 +01003698 rbd_img_request_submit(img_request);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003699 if (must_be_locked)
3700 up_read(&rbd_dev->lock_rwsem);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003701 return;
3702
3703err_img_request:
3704 rbd_img_request_put(img_request);
Ilya Dryomoved95b212016-08-12 16:40:02 +02003705err_unlock:
3706 if (must_be_locked)
3707 up_read(&rbd_dev->lock_rwsem);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003708err_rq:
3709 if (result)
3710 rbd_warn(rbd_dev, "%s %llx at %llx result %d",
Guangliang Zhao6d2940c2014-03-13 11:21:35 +08003711 obj_op_name(op_type), length, offset, result);
SF Markus Elfringe96a6502014-11-02 15:20:59 +01003712 ceph_put_snap_context(snapc);
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003713err:
Christoph Hellwig2a842ac2017-06-03 09:38:04 +02003714 blk_mq_end_request(rq, errno_to_blk_status(result));
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003715}
3716
Christoph Hellwigfc17b652017-06-03 09:38:05 +02003717static blk_status_t rbd_queue_rq(struct blk_mq_hw_ctx *hctx,
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003718 const struct blk_mq_queue_data *bd)
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003719{
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003720 struct request *rq = bd->rq;
3721 struct work_struct *work = blk_mq_rq_to_pdu(rq);
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04003722
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003723 queue_work(rbd_wq, work);
Christoph Hellwigfc17b652017-06-03 09:38:05 +02003724 return BLK_STS_OK;
Alex Elderbf0d5f502012-11-22 00:00:08 -06003725}
3726
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003727static void rbd_free_disk(struct rbd_device *rbd_dev)
3728{
Ilya Dryomov5769ed02017-04-13 12:17:38 +02003729 blk_cleanup_queue(rbd_dev->disk->queue);
3730 blk_mq_free_tag_set(&rbd_dev->tag_set);
3731 put_disk(rbd_dev->disk);
Alex Eldera0cab922013-04-25 23:15:08 -05003732 rbd_dev->disk = NULL;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003733}
3734
Alex Elder788e2df2013-01-17 12:25:27 -06003735static int rbd_obj_read_sync(struct rbd_device *rbd_dev,
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003736 struct ceph_object_id *oid,
3737 struct ceph_object_locator *oloc,
3738 void *buf, int buf_len)
Alex Elder788e2df2013-01-17 12:25:27 -06003739
3740{
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003741 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
3742 struct ceph_osd_request *req;
3743 struct page **pages;
3744 int num_pages = calc_pages_for(0, buf_len);
Alex Elder788e2df2013-01-17 12:25:27 -06003745 int ret;
3746
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003747 req = ceph_osdc_alloc_request(osdc, NULL, 1, false, GFP_KERNEL);
3748 if (!req)
3749 return -ENOMEM;
Alex Elder788e2df2013-01-17 12:25:27 -06003750
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003751 ceph_oid_copy(&req->r_base_oid, oid);
3752 ceph_oloc_copy(&req->r_base_oloc, oloc);
3753 req->r_flags = CEPH_OSD_FLAG_READ;
Alex Elder788e2df2013-01-17 12:25:27 -06003754
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003755 ret = ceph_osdc_alloc_messages(req, GFP_KERNEL);
Alex Elder788e2df2013-01-17 12:25:27 -06003756 if (ret)
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003757 goto out_req;
Alex Elder788e2df2013-01-17 12:25:27 -06003758
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003759 pages = ceph_alloc_page_vector(num_pages, GFP_KERNEL);
3760 if (IS_ERR(pages)) {
3761 ret = PTR_ERR(pages);
3762 goto out_req;
3763 }
Alex Elder1ceae7e2013-02-06 13:11:38 -06003764
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003765 osd_req_op_extent_init(req, 0, CEPH_OSD_OP_READ, 0, buf_len, 0, 0);
3766 osd_req_op_extent_osd_data_pages(req, 0, pages, buf_len, 0, false,
3767 true);
Alex Elder788e2df2013-01-17 12:25:27 -06003768
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003769 ceph_osdc_start_request(osdc, req, false);
3770 ret = ceph_osdc_wait_request(osdc, req);
3771 if (ret >= 0)
3772 ceph_copy_from_page_vector(pages, buf, 0, ret);
3773
3774out_req:
3775 ceph_osdc_put_request(req);
Alex Elder788e2df2013-01-17 12:25:27 -06003776 return ret;
3777}
3778
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003779/*
Alex Elder662518b2013-05-06 09:51:29 -05003780 * Read the complete header for the given rbd device. On successful
3781 * return, the rbd_dev->header field will contain up-to-date
3782 * information about the image.
Alex Elder4156d992012-08-02 11:29:46 -05003783 */
Alex Elder99a41eb2013-05-06 09:51:30 -05003784static int rbd_dev_v1_header_info(struct rbd_device *rbd_dev)
Alex Elder4156d992012-08-02 11:29:46 -05003785{
3786 struct rbd_image_header_ondisk *ondisk = NULL;
3787 u32 snap_count = 0;
3788 u64 names_size = 0;
3789 u32 want_count;
3790 int ret;
3791
3792 /*
3793 * The complete header will include an array of its 64-bit
3794 * snapshot ids, followed by the names of those snapshots as
3795 * a contiguous block of NUL-terminated strings. Note that
3796 * the number of snapshots could change by the time we read
3797 * it in, in which case we re-read it.
3798 */
3799 do {
3800 size_t size;
3801
3802 kfree(ondisk);
3803
3804 size = sizeof (*ondisk);
3805 size += snap_count * sizeof (struct rbd_image_snap_ondisk);
3806 size += names_size;
3807 ondisk = kmalloc(size, GFP_KERNEL);
3808 if (!ondisk)
Alex Elder662518b2013-05-06 09:51:29 -05003809 return -ENOMEM;
Alex Elder4156d992012-08-02 11:29:46 -05003810
Ilya Dryomovfe5478e2017-01-25 18:16:21 +01003811 ret = rbd_obj_read_sync(rbd_dev, &rbd_dev->header_oid,
3812 &rbd_dev->header_oloc, ondisk, size);
Alex Elder4156d992012-08-02 11:29:46 -05003813 if (ret < 0)
Alex Elder662518b2013-05-06 09:51:29 -05003814 goto out;
Alex Elderc0cd10db2013-04-26 09:43:47 -05003815 if ((size_t)ret < size) {
Alex Elder4156d992012-08-02 11:29:46 -05003816 ret = -ENXIO;
Alex Elder06ecc6c2012-11-01 10:17:15 -05003817 rbd_warn(rbd_dev, "short header read (want %zd got %d)",
3818 size, ret);
Alex Elder662518b2013-05-06 09:51:29 -05003819 goto out;
Alex Elder4156d992012-08-02 11:29:46 -05003820 }
3821 if (!rbd_dev_ondisk_valid(ondisk)) {
3822 ret = -ENXIO;
Alex Elder06ecc6c2012-11-01 10:17:15 -05003823 rbd_warn(rbd_dev, "invalid header");
Alex Elder662518b2013-05-06 09:51:29 -05003824 goto out;
Alex Elder4156d992012-08-02 11:29:46 -05003825 }
3826
3827 names_size = le64_to_cpu(ondisk->snap_names_len);
3828 want_count = snap_count;
3829 snap_count = le32_to_cpu(ondisk->snap_count);
3830 } while (snap_count != want_count);
3831
Alex Elder662518b2013-05-06 09:51:29 -05003832 ret = rbd_header_from_disk(rbd_dev, ondisk);
3833out:
Alex Elder4156d992012-08-02 11:29:46 -05003834 kfree(ondisk);
3835
Yehuda Sadehdfc56062010-11-19 14:51:04 -08003836 return ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003837}
3838
Alex Elder15228ed2013-05-01 12:43:03 -05003839/*
3840 * Clear the rbd device's EXISTS flag if the snapshot it's mapped to
3841 * has disappeared from the (just updated) snapshot context.
3842 */
3843static void rbd_exists_validate(struct rbd_device *rbd_dev)
3844{
3845 u64 snap_id;
3846
3847 if (!test_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags))
3848 return;
3849
3850 snap_id = rbd_dev->spec->snap_id;
3851 if (snap_id == CEPH_NOSNAP)
3852 return;
3853
3854 if (rbd_dev_snap_index(rbd_dev, snap_id) == BAD_SNAP_INDEX)
3855 clear_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags);
3856}
3857
Josh Durgin98752012013-08-29 17:26:31 -07003858static void rbd_dev_update_size(struct rbd_device *rbd_dev)
3859{
3860 sector_t size;
Josh Durgin98752012013-08-29 17:26:31 -07003861
3862 /*
Ilya Dryomov811c6682016-04-15 16:22:16 +02003863 * If EXISTS is not set, rbd_dev->disk may be NULL, so don't
3864 * try to update its size. If REMOVING is set, updating size
3865 * is just useless work since the device can't be opened.
Josh Durgin98752012013-08-29 17:26:31 -07003866 */
Ilya Dryomov811c6682016-04-15 16:22:16 +02003867 if (test_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags) &&
3868 !test_bit(RBD_DEV_FLAG_REMOVING, &rbd_dev->flags)) {
Josh Durgin98752012013-08-29 17:26:31 -07003869 size = (sector_t)rbd_dev->mapping.size / SECTOR_SIZE;
3870 dout("setting size to %llu sectors", (unsigned long long)size);
3871 set_capacity(rbd_dev->disk, size);
3872 revalidate_disk(rbd_dev->disk);
3873 }
3874}
3875
Alex Eldercc4a38bd2013-04-30 00:44:33 -05003876static int rbd_dev_refresh(struct rbd_device *rbd_dev)
Alex Elder1fe5e992012-07-25 09:32:41 -05003877{
Alex Eldere627db02013-05-06 07:40:30 -05003878 u64 mapping_size;
Alex Elder1fe5e992012-07-25 09:32:41 -05003879 int ret;
3880
Alex Eldercfbf6372013-05-31 17:40:45 -05003881 down_write(&rbd_dev->header_rwsem);
Alex Elder3b5cf2a2013-05-29 11:18:59 -05003882 mapping_size = rbd_dev->mapping.size;
Ilya Dryomova720ae02014-07-23 17:11:19 +04003883
3884 ret = rbd_dev_header_info(rbd_dev);
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04003885 if (ret)
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003886 goto out;
Alex Elder15228ed2013-05-01 12:43:03 -05003887
Ilya Dryomove8f59b52014-07-24 10:42:13 +04003888 /*
3889 * If there is a parent, see if it has disappeared due to the
3890 * mapped image getting flattened.
3891 */
3892 if (rbd_dev->parent) {
3893 ret = rbd_dev_v2_parent_info(rbd_dev);
3894 if (ret)
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003895 goto out;
Ilya Dryomove8f59b52014-07-24 10:42:13 +04003896 }
3897
Ilya Dryomov5ff11082014-07-23 17:11:21 +04003898 if (rbd_dev->spec->snap_id == CEPH_NOSNAP) {
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003899 rbd_dev->mapping.size = rbd_dev->header.image_size;
Ilya Dryomov5ff11082014-07-23 17:11:21 +04003900 } else {
3901 /* validate mapped snapshot's EXISTS flag */
3902 rbd_exists_validate(rbd_dev);
3903 }
Alex Elder15228ed2013-05-01 12:43:03 -05003904
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003905out:
Alex Eldercfbf6372013-05-31 17:40:45 -05003906 up_write(&rbd_dev->header_rwsem);
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003907 if (!ret && mapping_size != rbd_dev->mapping.size)
Josh Durgin98752012013-08-29 17:26:31 -07003908 rbd_dev_update_size(rbd_dev);
Alex Elder1fe5e992012-07-25 09:32:41 -05003909
Ilya Dryomov73e39e42015-01-08 20:18:22 +03003910 return ret;
Alex Elder1fe5e992012-07-25 09:32:41 -05003911}
3912
Christoph Hellwigd6296d32017-05-01 10:19:08 -06003913static int rbd_init_request(struct blk_mq_tag_set *set, struct request *rq,
3914 unsigned int hctx_idx, unsigned int numa_node)
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003915{
3916 struct work_struct *work = blk_mq_rq_to_pdu(rq);
3917
3918 INIT_WORK(work, rbd_queue_workfn);
3919 return 0;
3920}
3921
Eric Biggersf363b082017-03-30 13:39:16 -07003922static const struct blk_mq_ops rbd_mq_ops = {
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003923 .queue_rq = rbd_queue_rq,
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003924 .init_request = rbd_init_request,
3925};
3926
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003927static int rbd_init_disk(struct rbd_device *rbd_dev)
3928{
3929 struct gendisk *disk;
3930 struct request_queue *q;
Alex Elder593a9e72012-02-07 12:03:37 -06003931 u64 segment_size;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003932 int err;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003933
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003934 /* create gendisk info */
Ilya Dryomov7e513d42013-12-16 19:26:32 +02003935 disk = alloc_disk(single_major ?
3936 (1 << RBD_SINGLE_MAJOR_PART_SHIFT) :
3937 RBD_MINORS_PER_MAJOR);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003938 if (!disk)
Alex Elder1fcdb8a2012-08-29 17:11:06 -05003939 return -ENOMEM;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003940
Alex Elderf0f8cef2012-01-29 13:57:44 -06003941 snprintf(disk->disk_name, sizeof(disk->disk_name), RBD_DRV_NAME "%d",
Alex Elderde71a292012-07-03 16:01:19 -05003942 rbd_dev->dev_id);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003943 disk->major = rbd_dev->major;
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02003944 disk->first_minor = rbd_dev->minor;
Ilya Dryomov7e513d42013-12-16 19:26:32 +02003945 if (single_major)
3946 disk->flags |= GENHD_FL_EXT_DEVT;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003947 disk->fops = &rbd_bd_ops;
3948 disk->private_data = rbd_dev;
3949
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003950 memset(&rbd_dev->tag_set, 0, sizeof(rbd_dev->tag_set));
3951 rbd_dev->tag_set.ops = &rbd_mq_ops;
Ilya Dryomovb5584182015-06-23 16:21:19 +03003952 rbd_dev->tag_set.queue_depth = rbd_dev->opts->queue_depth;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003953 rbd_dev->tag_set.numa_node = NUMA_NO_NODE;
Ilya Dryomovb5584182015-06-23 16:21:19 +03003954 rbd_dev->tag_set.flags = BLK_MQ_F_SHOULD_MERGE | BLK_MQ_F_SG_MERGE;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003955 rbd_dev->tag_set.nr_hw_queues = 1;
3956 rbd_dev->tag_set.cmd_size = sizeof(struct work_struct);
3957
3958 err = blk_mq_alloc_tag_set(&rbd_dev->tag_set);
3959 if (err)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003960 goto out_disk;
Josh Durgin029bcbd2011-07-22 11:35:23 -07003961
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01003962 q = blk_mq_init_queue(&rbd_dev->tag_set);
3963 if (IS_ERR(q)) {
3964 err = PTR_ERR(q);
3965 goto out_tag_set;
3966 }
3967
Bart Van Assche8b904b52018-03-07 17:10:10 -08003968 blk_queue_flag_set(QUEUE_FLAG_NONROT, q);
Ilya Dryomovd8a2c892015-03-24 16:15:17 +03003969 /* QUEUE_FLAG_ADD_RANDOM is off by default for blk-mq */
Alex Elder593a9e72012-02-07 12:03:37 -06003970
Josh Durgin029bcbd2011-07-22 11:35:23 -07003971 /* set io sizes to object size */
Alex Elder593a9e72012-02-07 12:03:37 -06003972 segment_size = rbd_obj_bytes(&rbd_dev->header);
3973 blk_queue_max_hw_sectors(q, segment_size / SECTOR_SIZE);
Ilya Dryomov0d9fde42015-10-07 16:09:35 +02003974 q->limits.max_sectors = queue_max_hw_sectors(q);
Ilya Dryomov21acdf42017-12-21 15:35:11 +01003975 blk_queue_max_segments(q, USHRT_MAX);
Ilya Dryomov24f1df62018-01-12 17:22:10 +01003976 blk_queue_max_segment_size(q, UINT_MAX);
Alex Elder593a9e72012-02-07 12:03:37 -06003977 blk_queue_io_min(q, segment_size);
3978 blk_queue_io_opt(q, segment_size);
Josh Durgin029bcbd2011-07-22 11:35:23 -07003979
Guangliang Zhao90e98c52014-04-01 22:22:16 +08003980 /* enable the discard support */
Bart Van Assche8b904b52018-03-07 17:10:10 -08003981 blk_queue_flag_set(QUEUE_FLAG_DISCARD, q);
Guangliang Zhao90e98c52014-04-01 22:22:16 +08003982 q->limits.discard_granularity = segment_size;
Jens Axboe2bb4cd52015-07-14 08:15:12 -06003983 blk_queue_max_discard_sectors(q, segment_size / SECTOR_SIZE);
Ilya Dryomov6ac56952017-05-22 19:59:24 +02003984 blk_queue_max_write_zeroes_sectors(q, segment_size / SECTOR_SIZE);
Guangliang Zhao90e98c52014-04-01 22:22:16 +08003985
Ronny Hegewaldbae818e2015-10-15 18:50:46 +00003986 if (!ceph_test_opt(rbd_dev->rbd_client->client, NOCRC))
Jan Karadc3b17c2017-02-02 15:56:50 +01003987 q->backing_dev_info->capabilities |= BDI_CAP_STABLE_WRITES;
Ronny Hegewaldbae818e2015-10-15 18:50:46 +00003988
Ilya Dryomov5769ed02017-04-13 12:17:38 +02003989 /*
3990 * disk_release() expects a queue ref from add_disk() and will
3991 * put it. Hold an extra ref until add_disk() is called.
3992 */
3993 WARN_ON(!blk_get_queue(q));
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003994 disk->queue = q;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003995 q->queuedata = rbd_dev;
3996
3997 rbd_dev->disk = disk;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003998
Yehuda Sadeh602adf42010-08-12 16:11:25 -07003999 return 0;
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004000out_tag_set:
4001 blk_mq_free_tag_set(&rbd_dev->tag_set);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004002out_disk:
4003 put_disk(disk);
Christoph Hellwig7ad18af2015-01-13 17:20:04 +01004004 return err;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004005}
4006
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004007/*
4008 sysfs
4009*/
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004010
Alex Elder593a9e72012-02-07 12:03:37 -06004011static struct rbd_device *dev_to_rbd_dev(struct device *dev)
4012{
4013 return container_of(dev, struct rbd_device, dev);
4014}
4015
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004016static ssize_t rbd_size_show(struct device *dev,
4017 struct device_attribute *attr, char *buf)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004018{
Alex Elder593a9e72012-02-07 12:03:37 -06004019 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004020
Alex Elderfc71d832013-04-26 15:44:36 -05004021 return sprintf(buf, "%llu\n",
4022 (unsigned long long)rbd_dev->mapping.size);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004023}
4024
Alex Elder34b13182012-07-13 20:35:12 -05004025/*
4026 * Note this shows the features for whatever's mapped, which is not
4027 * necessarily the base image.
4028 */
4029static ssize_t rbd_features_show(struct device *dev,
4030 struct device_attribute *attr, char *buf)
4031{
4032 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4033
4034 return sprintf(buf, "0x%016llx\n",
Alex Elderfc71d832013-04-26 15:44:36 -05004035 (unsigned long long)rbd_dev->mapping.features);
Alex Elder34b13182012-07-13 20:35:12 -05004036}
4037
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004038static ssize_t rbd_major_show(struct device *dev,
4039 struct device_attribute *attr, char *buf)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004040{
Alex Elder593a9e72012-02-07 12:03:37 -06004041 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004042
Alex Elderfc71d832013-04-26 15:44:36 -05004043 if (rbd_dev->major)
4044 return sprintf(buf, "%d\n", rbd_dev->major);
4045
4046 return sprintf(buf, "(none)\n");
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004047}
Alex Elderfc71d832013-04-26 15:44:36 -05004048
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004049static ssize_t rbd_minor_show(struct device *dev,
4050 struct device_attribute *attr, char *buf)
4051{
4052 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4053
4054 return sprintf(buf, "%d\n", rbd_dev->minor);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004055}
4056
Ilya Dryomov005a07bf2016-08-18 18:38:43 +02004057static ssize_t rbd_client_addr_show(struct device *dev,
4058 struct device_attribute *attr, char *buf)
4059{
4060 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4061 struct ceph_entity_addr *client_addr =
4062 ceph_client_addr(rbd_dev->rbd_client->client);
4063
4064 return sprintf(buf, "%pISpc/%u\n", &client_addr->in_addr,
4065 le32_to_cpu(client_addr->nonce));
4066}
4067
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004068static ssize_t rbd_client_id_show(struct device *dev,
4069 struct device_attribute *attr, char *buf)
4070{
Alex Elder593a9e72012-02-07 12:03:37 -06004071 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004072
Alex Elder1dbb4392012-01-24 10:08:37 -06004073 return sprintf(buf, "client%lld\n",
Ilya Dryomov033268a2016-08-12 14:59:58 +02004074 ceph_client_gid(rbd_dev->rbd_client->client));
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004075}
4076
Mike Christie267fb902016-08-18 18:38:43 +02004077static ssize_t rbd_cluster_fsid_show(struct device *dev,
4078 struct device_attribute *attr, char *buf)
4079{
4080 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4081
4082 return sprintf(buf, "%pU\n", &rbd_dev->rbd_client->client->fsid);
4083}
4084
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02004085static ssize_t rbd_config_info_show(struct device *dev,
4086 struct device_attribute *attr, char *buf)
4087{
4088 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4089
4090 return sprintf(buf, "%s\n", rbd_dev->config_info);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004091}
4092
4093static ssize_t rbd_pool_show(struct device *dev,
4094 struct device_attribute *attr, char *buf)
4095{
Alex Elder593a9e72012-02-07 12:03:37 -06004096 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004097
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004098 return sprintf(buf, "%s\n", rbd_dev->spec->pool_name);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004099}
4100
Alex Elder9bb2f332012-07-12 10:46:35 -05004101static ssize_t rbd_pool_id_show(struct device *dev,
4102 struct device_attribute *attr, char *buf)
4103{
4104 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4105
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004106 return sprintf(buf, "%llu\n",
Alex Elderfc71d832013-04-26 15:44:36 -05004107 (unsigned long long) rbd_dev->spec->pool_id);
Alex Elder9bb2f332012-07-12 10:46:35 -05004108}
4109
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004110static ssize_t rbd_name_show(struct device *dev,
4111 struct device_attribute *attr, char *buf)
4112{
Alex Elder593a9e72012-02-07 12:03:37 -06004113 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004114
Alex Eldera92ffdf2012-10-30 19:40:33 -05004115 if (rbd_dev->spec->image_name)
4116 return sprintf(buf, "%s\n", rbd_dev->spec->image_name);
4117
4118 return sprintf(buf, "(unknown)\n");
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004119}
4120
Alex Elder589d30e2012-07-10 20:30:11 -05004121static ssize_t rbd_image_id_show(struct device *dev,
4122 struct device_attribute *attr, char *buf)
4123{
4124 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4125
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004126 return sprintf(buf, "%s\n", rbd_dev->spec->image_id);
Alex Elder589d30e2012-07-10 20:30:11 -05004127}
4128
Alex Elder34b13182012-07-13 20:35:12 -05004129/*
4130 * Shows the name of the currently-mapped snapshot (or
4131 * RBD_SNAP_HEAD_NAME for the base image).
4132 */
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004133static ssize_t rbd_snap_show(struct device *dev,
4134 struct device_attribute *attr,
4135 char *buf)
4136{
Alex Elder593a9e72012-02-07 12:03:37 -06004137 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004138
Alex Elder0d7dbfc2012-10-25 23:34:41 -05004139 return sprintf(buf, "%s\n", rbd_dev->spec->snap_name);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004140}
4141
Mike Christie92a58672016-08-18 18:38:44 +02004142static ssize_t rbd_snap_id_show(struct device *dev,
4143 struct device_attribute *attr, char *buf)
4144{
4145 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4146
4147 return sprintf(buf, "%llu\n", rbd_dev->spec->snap_id);
4148}
4149
Alex Elder86b00e02012-10-25 23:34:42 -05004150/*
Ilya Dryomovff961282014-07-22 21:53:07 +04004151 * For a v2 image, shows the chain of parent images, separated by empty
4152 * lines. For v1 images or if there is no parent, shows "(no parent
4153 * image)".
Alex Elder86b00e02012-10-25 23:34:42 -05004154 */
4155static ssize_t rbd_parent_show(struct device *dev,
Ilya Dryomovff961282014-07-22 21:53:07 +04004156 struct device_attribute *attr,
4157 char *buf)
Alex Elder86b00e02012-10-25 23:34:42 -05004158{
4159 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Ilya Dryomovff961282014-07-22 21:53:07 +04004160 ssize_t count = 0;
Alex Elder86b00e02012-10-25 23:34:42 -05004161
Ilya Dryomovff961282014-07-22 21:53:07 +04004162 if (!rbd_dev->parent)
Alex Elder86b00e02012-10-25 23:34:42 -05004163 return sprintf(buf, "(no parent image)\n");
4164
Ilya Dryomovff961282014-07-22 21:53:07 +04004165 for ( ; rbd_dev->parent; rbd_dev = rbd_dev->parent) {
4166 struct rbd_spec *spec = rbd_dev->parent_spec;
Alex Elder86b00e02012-10-25 23:34:42 -05004167
Ilya Dryomovff961282014-07-22 21:53:07 +04004168 count += sprintf(&buf[count], "%s"
4169 "pool_id %llu\npool_name %s\n"
4170 "image_id %s\nimage_name %s\n"
4171 "snap_id %llu\nsnap_name %s\n"
4172 "overlap %llu\n",
4173 !count ? "" : "\n", /* first? */
4174 spec->pool_id, spec->pool_name,
4175 spec->image_id, spec->image_name ?: "(unknown)",
4176 spec->snap_id, spec->snap_name,
4177 rbd_dev->parent_overlap);
4178 }
Alex Elder86b00e02012-10-25 23:34:42 -05004179
Ilya Dryomovff961282014-07-22 21:53:07 +04004180 return count;
Alex Elder86b00e02012-10-25 23:34:42 -05004181}
4182
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004183static ssize_t rbd_image_refresh(struct device *dev,
4184 struct device_attribute *attr,
4185 const char *buf,
4186 size_t size)
4187{
Alex Elder593a9e72012-02-07 12:03:37 -06004188 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
Alex Elderb8136232012-07-25 09:32:41 -05004189 int ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004190
Alex Eldercc4a38bd2013-04-30 00:44:33 -05004191 ret = rbd_dev_refresh(rbd_dev);
Alex Eldere627db02013-05-06 07:40:30 -05004192 if (ret)
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04004193 return ret;
Alex Elderb8136232012-07-25 09:32:41 -05004194
Ilya Dryomov52bb1f92014-07-23 17:11:20 +04004195 return size;
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004196}
Yehuda Sadeh602adf42010-08-12 16:11:25 -07004197
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004198static DEVICE_ATTR(size, S_IRUGO, rbd_size_show, NULL);
Alex Elder34b13182012-07-13 20:35:12 -05004199static DEVICE_ATTR(features, S_IRUGO, rbd_features_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004200static DEVICE_ATTR(major, S_IRUGO, rbd_major_show, NULL);
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004201static DEVICE_ATTR(minor, S_IRUGO, rbd_minor_show, NULL);
Ilya Dryomov005a07bf2016-08-18 18:38:43 +02004202static DEVICE_ATTR(client_addr, S_IRUGO, rbd_client_addr_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004203static DEVICE_ATTR(client_id, S_IRUGO, rbd_client_id_show, NULL);
Mike Christie267fb902016-08-18 18:38:43 +02004204static DEVICE_ATTR(cluster_fsid, S_IRUGO, rbd_cluster_fsid_show, NULL);
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02004205static DEVICE_ATTR(config_info, S_IRUSR, rbd_config_info_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004206static DEVICE_ATTR(pool, S_IRUGO, rbd_pool_show, NULL);
Alex Elder9bb2f332012-07-12 10:46:35 -05004207static DEVICE_ATTR(pool_id, S_IRUGO, rbd_pool_id_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004208static DEVICE_ATTR(name, S_IRUGO, rbd_name_show, NULL);
Alex Elder589d30e2012-07-10 20:30:11 -05004209static DEVICE_ATTR(image_id, S_IRUGO, rbd_image_id_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004210static DEVICE_ATTR(refresh, S_IWUSR, NULL, rbd_image_refresh);
4211static DEVICE_ATTR(current_snap, S_IRUGO, rbd_snap_show, NULL);
Mike Christie92a58672016-08-18 18:38:44 +02004212static DEVICE_ATTR(snap_id, S_IRUGO, rbd_snap_id_show, NULL);
Alex Elder86b00e02012-10-25 23:34:42 -05004213static DEVICE_ATTR(parent, S_IRUGO, rbd_parent_show, NULL);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004214
4215static struct attribute *rbd_attrs[] = {
4216 &dev_attr_size.attr,
Alex Elder34b13182012-07-13 20:35:12 -05004217 &dev_attr_features.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004218 &dev_attr_major.attr,
Ilya Dryomovdd82fff2013-12-13 15:28:57 +02004219 &dev_attr_minor.attr,
Ilya Dryomov005a07bf2016-08-18 18:38:43 +02004220 &dev_attr_client_addr.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004221 &dev_attr_client_id.attr,
Mike Christie267fb902016-08-18 18:38:43 +02004222 &dev_attr_cluster_fsid.attr,
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02004223 &dev_attr_config_info.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004224 &dev_attr_pool.attr,
Alex Elder9bb2f332012-07-12 10:46:35 -05004225 &dev_attr_pool_id.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004226 &dev_attr_name.attr,
Alex Elder589d30e2012-07-10 20:30:11 -05004227 &dev_attr_image_id.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004228 &dev_attr_current_snap.attr,
Mike Christie92a58672016-08-18 18:38:44 +02004229 &dev_attr_snap_id.attr,
Alex Elder86b00e02012-10-25 23:34:42 -05004230 &dev_attr_parent.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004231 &dev_attr_refresh.attr,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004232 NULL
4233};
4234
4235static struct attribute_group rbd_attr_group = {
4236 .attrs = rbd_attrs,
4237};
4238
4239static const struct attribute_group *rbd_attr_groups[] = {
4240 &rbd_attr_group,
4241 NULL
4242};
4243
Ilya Dryomov6cac4692015-10-16 20:11:25 +02004244static void rbd_dev_release(struct device *dev);
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004245
Bhumika Goyalb9942bc2017-02-11 12:14:38 +05304246static const struct device_type rbd_device_type = {
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004247 .name = "rbd",
4248 .groups = rbd_attr_groups,
Ilya Dryomov6cac4692015-10-16 20:11:25 +02004249 .release = rbd_dev_release,
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004250};
4251
Alex Elder8b8fb992012-10-26 17:25:24 -05004252static struct rbd_spec *rbd_spec_get(struct rbd_spec *spec)
4253{
4254 kref_get(&spec->kref);
4255
4256 return spec;
4257}
4258
4259static void rbd_spec_free(struct kref *kref);
4260static void rbd_spec_put(struct rbd_spec *spec)
4261{
4262 if (spec)
4263 kref_put(&spec->kref, rbd_spec_free);
4264}
4265
4266static struct rbd_spec *rbd_spec_alloc(void)
4267{
4268 struct rbd_spec *spec;
4269
4270 spec = kzalloc(sizeof (*spec), GFP_KERNEL);
4271 if (!spec)
4272 return NULL;
Ilya Dryomov04077592014-07-23 17:11:20 +04004273
4274 spec->pool_id = CEPH_NOPOOL;
4275 spec->snap_id = CEPH_NOSNAP;
Alex Elder8b8fb992012-10-26 17:25:24 -05004276 kref_init(&spec->kref);
4277
Alex Elder8b8fb992012-10-26 17:25:24 -05004278 return spec;
4279}
4280
4281static void rbd_spec_free(struct kref *kref)
4282{
4283 struct rbd_spec *spec = container_of(kref, struct rbd_spec, kref);
4284
4285 kfree(spec->pool_name);
4286 kfree(spec->image_id);
4287 kfree(spec->image_name);
4288 kfree(spec->snap_name);
4289 kfree(spec);
4290}
4291
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004292static void rbd_dev_free(struct rbd_device *rbd_dev)
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004293{
Ilya Dryomov99d16942016-08-12 16:11:41 +02004294 WARN_ON(rbd_dev->watch_state != RBD_WATCH_STATE_UNREGISTERED);
Ilya Dryomoved95b212016-08-12 16:40:02 +02004295 WARN_ON(rbd_dev->lock_state != RBD_LOCK_STATE_UNLOCKED);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004296
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004297 ceph_oid_destroy(&rbd_dev->header_oid);
Ilya Dryomov6b6dddb2016-08-05 16:15:38 +02004298 ceph_oloc_destroy(&rbd_dev->header_oloc);
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02004299 kfree(rbd_dev->config_info);
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004300
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004301 rbd_put_client(rbd_dev->rbd_client);
4302 rbd_spec_put(rbd_dev->spec);
4303 kfree(rbd_dev->opts);
4304 kfree(rbd_dev);
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004305}
4306
4307static void rbd_dev_release(struct device *dev)
4308{
4309 struct rbd_device *rbd_dev = dev_to_rbd_dev(dev);
4310 bool need_put = !!rbd_dev->opts;
4311
4312 if (need_put) {
4313 destroy_workqueue(rbd_dev->task_wq);
4314 ida_simple_remove(&rbd_dev_id_ida, rbd_dev->dev_id);
4315 }
4316
4317 rbd_dev_free(rbd_dev);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004318
4319 /*
4320 * This is racy, but way better than putting module outside of
4321 * the release callback. The race window is pretty small, so
4322 * doing something similar to dm (dm-builtin.c) is overkill.
4323 */
4324 if (need_put)
4325 module_put(THIS_MODULE);
4326}
4327
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004328static struct rbd_device *__rbd_dev_create(struct rbd_client *rbdc,
4329 struct rbd_spec *spec)
Alex Elderc53d5892012-10-25 23:34:42 -05004330{
4331 struct rbd_device *rbd_dev;
4332
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004333 rbd_dev = kzalloc(sizeof(*rbd_dev), GFP_KERNEL);
Alex Elderc53d5892012-10-25 23:34:42 -05004334 if (!rbd_dev)
4335 return NULL;
4336
4337 spin_lock_init(&rbd_dev->lock);
4338 INIT_LIST_HEAD(&rbd_dev->node);
Alex Elderc53d5892012-10-25 23:34:42 -05004339 init_rwsem(&rbd_dev->header_rwsem);
4340
Ilya Dryomov7e973322017-01-25 18:16:22 +01004341 rbd_dev->header.data_pool_id = CEPH_NOPOOL;
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004342 ceph_oid_init(&rbd_dev->header_oid);
Ilya Dryomov431a02c2017-01-25 18:16:21 +01004343 rbd_dev->header_oloc.pool = spec->pool_id;
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02004344
Ilya Dryomov99d16942016-08-12 16:11:41 +02004345 mutex_init(&rbd_dev->watch_mutex);
4346 rbd_dev->watch_state = RBD_WATCH_STATE_UNREGISTERED;
4347 INIT_DELAYED_WORK(&rbd_dev->watch_dwork, rbd_reregister_watch);
4348
Ilya Dryomoved95b212016-08-12 16:40:02 +02004349 init_rwsem(&rbd_dev->lock_rwsem);
4350 rbd_dev->lock_state = RBD_LOCK_STATE_UNLOCKED;
4351 INIT_WORK(&rbd_dev->acquired_lock_work, rbd_notify_acquired_lock);
4352 INIT_WORK(&rbd_dev->released_lock_work, rbd_notify_released_lock);
4353 INIT_DELAYED_WORK(&rbd_dev->lock_dwork, rbd_acquire_lock);
4354 INIT_WORK(&rbd_dev->unlock_work, rbd_release_lock_work);
4355 init_waitqueue_head(&rbd_dev->lock_waitq);
4356
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004357 rbd_dev->dev.bus = &rbd_bus_type;
4358 rbd_dev->dev.type = &rbd_device_type;
4359 rbd_dev->dev.parent = &rbd_root_dev;
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004360 device_initialize(&rbd_dev->dev);
4361
Alex Elderc53d5892012-10-25 23:34:42 -05004362 rbd_dev->rbd_client = rbdc;
Ilya Dryomovd1475432015-06-22 13:24:48 +03004363 rbd_dev->spec = spec;
Alex Elder0903e872012-11-14 12:25:19 -06004364
Alex Elderc53d5892012-10-25 23:34:42 -05004365 return rbd_dev;
4366}
4367
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02004368/*
4369 * Create a mapping rbd_dev.
4370 */
4371static struct rbd_device *rbd_dev_create(struct rbd_client *rbdc,
4372 struct rbd_spec *spec,
4373 struct rbd_options *opts)
4374{
4375 struct rbd_device *rbd_dev;
4376
4377 rbd_dev = __rbd_dev_create(rbdc, spec);
4378 if (!rbd_dev)
4379 return NULL;
4380
4381 rbd_dev->opts = opts;
4382
4383 /* get an id and fill in device name */
4384 rbd_dev->dev_id = ida_simple_get(&rbd_dev_id_ida, 0,
4385 minor_to_rbd_dev_id(1 << MINORBITS),
4386 GFP_KERNEL);
4387 if (rbd_dev->dev_id < 0)
4388 goto fail_rbd_dev;
4389
4390 sprintf(rbd_dev->name, RBD_DRV_NAME "%d", rbd_dev->dev_id);
4391 rbd_dev->task_wq = alloc_ordered_workqueue("%s-tasks", WQ_MEM_RECLAIM,
4392 rbd_dev->name);
4393 if (!rbd_dev->task_wq)
4394 goto fail_dev_id;
4395
4396 /* we have a ref from do_rbd_add() */
4397 __module_get(THIS_MODULE);
4398
4399 dout("%s rbd_dev %p dev_id %d\n", __func__, rbd_dev, rbd_dev->dev_id);
4400 return rbd_dev;
4401
4402fail_dev_id:
4403 ida_simple_remove(&rbd_dev_id_ida, rbd_dev->dev_id);
4404fail_rbd_dev:
4405 rbd_dev_free(rbd_dev);
4406 return NULL;
4407}
4408
Alex Elderc53d5892012-10-25 23:34:42 -05004409static void rbd_dev_destroy(struct rbd_device *rbd_dev)
4410{
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02004411 if (rbd_dev)
4412 put_device(&rbd_dev->dev);
Alex Elderc53d5892012-10-25 23:34:42 -05004413}
4414
Yehuda Sadehdfc56062010-11-19 14:51:04 -08004415/*
Alex Elder9d475de2012-07-03 16:01:19 -05004416 * Get the size and object order for an image snapshot, or if
4417 * snap_id is CEPH_NOSNAP, gets this information for the base
4418 * image.
4419 */
4420static int _rbd_dev_v2_snap_size(struct rbd_device *rbd_dev, u64 snap_id,
4421 u8 *order, u64 *snap_size)
4422{
4423 __le64 snapid = cpu_to_le64(snap_id);
4424 int ret;
4425 struct {
4426 u8 order;
4427 __le64 size;
4428 } __attribute__ ((packed)) size_buf = { 0 };
4429
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004430 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4431 &rbd_dev->header_oloc, "get_size",
4432 &snapid, sizeof(snapid),
4433 &size_buf, sizeof(size_buf));
Alex Elder36be9a72013-01-19 00:30:28 -06004434 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder9d475de2012-07-03 16:01:19 -05004435 if (ret < 0)
4436 return ret;
Alex Elder57385b52013-04-21 12:14:45 -05004437 if (ret < sizeof (size_buf))
4438 return -ERANGE;
Alex Elder9d475de2012-07-03 16:01:19 -05004439
Josh Durginc3545572013-08-28 17:08:10 -07004440 if (order) {
Alex Elderc86f86e2013-04-25 15:09:41 -05004441 *order = size_buf.order;
Josh Durginc3545572013-08-28 17:08:10 -07004442 dout(" order %u", (unsigned int)*order);
4443 }
Alex Elder9d475de2012-07-03 16:01:19 -05004444 *snap_size = le64_to_cpu(size_buf.size);
4445
Josh Durginc3545572013-08-28 17:08:10 -07004446 dout(" snap_id 0x%016llx snap_size = %llu\n",
4447 (unsigned long long)snap_id,
Alex Elder57385b52013-04-21 12:14:45 -05004448 (unsigned long long)*snap_size);
Alex Elder9d475de2012-07-03 16:01:19 -05004449
4450 return 0;
4451}
4452
4453static int rbd_dev_v2_image_size(struct rbd_device *rbd_dev)
4454{
4455 return _rbd_dev_v2_snap_size(rbd_dev, CEPH_NOSNAP,
4456 &rbd_dev->header.obj_order,
4457 &rbd_dev->header.image_size);
4458}
4459
Alex Elder1e130192012-07-03 16:01:19 -05004460static int rbd_dev_v2_object_prefix(struct rbd_device *rbd_dev)
4461{
4462 void *reply_buf;
4463 int ret;
4464 void *p;
4465
4466 reply_buf = kzalloc(RBD_OBJ_PREFIX_LEN_MAX, GFP_KERNEL);
4467 if (!reply_buf)
4468 return -ENOMEM;
4469
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004470 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4471 &rbd_dev->header_oloc, "get_object_prefix",
4472 NULL, 0, reply_buf, RBD_OBJ_PREFIX_LEN_MAX);
Alex Elder36be9a72013-01-19 00:30:28 -06004473 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder1e130192012-07-03 16:01:19 -05004474 if (ret < 0)
4475 goto out;
4476
4477 p = reply_buf;
4478 rbd_dev->header.object_prefix = ceph_extract_encoded_string(&p,
Alex Elder57385b52013-04-21 12:14:45 -05004479 p + ret, NULL, GFP_NOIO);
4480 ret = 0;
Alex Elder1e130192012-07-03 16:01:19 -05004481
4482 if (IS_ERR(rbd_dev->header.object_prefix)) {
4483 ret = PTR_ERR(rbd_dev->header.object_prefix);
4484 rbd_dev->header.object_prefix = NULL;
4485 } else {
4486 dout(" object_prefix = %s\n", rbd_dev->header.object_prefix);
4487 }
Alex Elder1e130192012-07-03 16:01:19 -05004488out:
4489 kfree(reply_buf);
4490
4491 return ret;
4492}
4493
Alex Elderb1b54022012-07-03 16:01:19 -05004494static int _rbd_dev_v2_snap_features(struct rbd_device *rbd_dev, u64 snap_id,
4495 u64 *snap_features)
4496{
4497 __le64 snapid = cpu_to_le64(snap_id);
4498 struct {
4499 __le64 features;
4500 __le64 incompat;
Alex Elder41579762013-04-21 12:14:45 -05004501 } __attribute__ ((packed)) features_buf = { 0 };
Ilya Dryomovd3767f02016-04-13 14:15:50 +02004502 u64 unsup;
Alex Elderb1b54022012-07-03 16:01:19 -05004503 int ret;
4504
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004505 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4506 &rbd_dev->header_oloc, "get_features",
4507 &snapid, sizeof(snapid),
4508 &features_buf, sizeof(features_buf));
Alex Elder36be9a72013-01-19 00:30:28 -06004509 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elderb1b54022012-07-03 16:01:19 -05004510 if (ret < 0)
4511 return ret;
Alex Elder57385b52013-04-21 12:14:45 -05004512 if (ret < sizeof (features_buf))
4513 return -ERANGE;
Alex Elderd8891402012-10-09 13:50:17 -07004514
Ilya Dryomovd3767f02016-04-13 14:15:50 +02004515 unsup = le64_to_cpu(features_buf.incompat) & ~RBD_FEATURES_SUPPORTED;
4516 if (unsup) {
4517 rbd_warn(rbd_dev, "image uses unsupported features: 0x%llx",
4518 unsup);
Alex Elderb8f5c6e2012-11-01 08:39:26 -05004519 return -ENXIO;
Ilya Dryomovd3767f02016-04-13 14:15:50 +02004520 }
Alex Elderd8891402012-10-09 13:50:17 -07004521
Alex Elderb1b54022012-07-03 16:01:19 -05004522 *snap_features = le64_to_cpu(features_buf.features);
4523
4524 dout(" snap_id 0x%016llx features = 0x%016llx incompat = 0x%016llx\n",
Alex Elder57385b52013-04-21 12:14:45 -05004525 (unsigned long long)snap_id,
4526 (unsigned long long)*snap_features,
4527 (unsigned long long)le64_to_cpu(features_buf.incompat));
Alex Elderb1b54022012-07-03 16:01:19 -05004528
4529 return 0;
4530}
4531
4532static int rbd_dev_v2_features(struct rbd_device *rbd_dev)
4533{
4534 return _rbd_dev_v2_snap_features(rbd_dev, CEPH_NOSNAP,
4535 &rbd_dev->header.features);
4536}
4537
Alex Elder86b00e02012-10-25 23:34:42 -05004538static int rbd_dev_v2_parent_info(struct rbd_device *rbd_dev)
4539{
4540 struct rbd_spec *parent_spec;
4541 size_t size;
4542 void *reply_buf = NULL;
4543 __le64 snapid;
4544 void *p;
4545 void *end;
Alex Elder642a2532013-05-06 17:40:33 -05004546 u64 pool_id;
Alex Elder86b00e02012-10-25 23:34:42 -05004547 char *image_id;
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004548 u64 snap_id;
Alex Elder86b00e02012-10-25 23:34:42 -05004549 u64 overlap;
Alex Elder86b00e02012-10-25 23:34:42 -05004550 int ret;
4551
4552 parent_spec = rbd_spec_alloc();
4553 if (!parent_spec)
4554 return -ENOMEM;
4555
4556 size = sizeof (__le64) + /* pool_id */
4557 sizeof (__le32) + RBD_IMAGE_ID_LEN_MAX + /* image_id */
4558 sizeof (__le64) + /* snap_id */
4559 sizeof (__le64); /* overlap */
4560 reply_buf = kmalloc(size, GFP_KERNEL);
4561 if (!reply_buf) {
4562 ret = -ENOMEM;
4563 goto out_err;
4564 }
4565
Ilya Dryomov4d9b67c2014-07-24 10:42:13 +04004566 snapid = cpu_to_le64(rbd_dev->spec->snap_id);
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004567 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4568 &rbd_dev->header_oloc, "get_parent",
4569 &snapid, sizeof(snapid), reply_buf, size);
Alex Elder36be9a72013-01-19 00:30:28 -06004570 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder86b00e02012-10-25 23:34:42 -05004571 if (ret < 0)
4572 goto out_err;
4573
Alex Elder86b00e02012-10-25 23:34:42 -05004574 p = reply_buf;
Alex Elder57385b52013-04-21 12:14:45 -05004575 end = reply_buf + ret;
4576 ret = -ERANGE;
Alex Elder642a2532013-05-06 17:40:33 -05004577 ceph_decode_64_safe(&p, end, pool_id, out_err);
Alex Elder392a9da2013-05-06 17:40:33 -05004578 if (pool_id == CEPH_NOPOOL) {
4579 /*
4580 * Either the parent never existed, or we have
4581 * record of it but the image got flattened so it no
4582 * longer has a parent. When the parent of a
4583 * layered image disappears we immediately set the
4584 * overlap to 0. The effect of this is that all new
4585 * requests will be treated as if the image had no
4586 * parent.
4587 */
4588 if (rbd_dev->parent_overlap) {
4589 rbd_dev->parent_overlap = 0;
Alex Elder392a9da2013-05-06 17:40:33 -05004590 rbd_dev_parent_put(rbd_dev);
4591 pr_info("%s: clone image has been flattened\n",
4592 rbd_dev->disk->disk_name);
4593 }
4594
Alex Elder86b00e02012-10-25 23:34:42 -05004595 goto out; /* No parent? No problem. */
Alex Elder392a9da2013-05-06 17:40:33 -05004596 }
Alex Elder86b00e02012-10-25 23:34:42 -05004597
Alex Elder0903e872012-11-14 12:25:19 -06004598 /* The ceph file layout needs to fit pool id in 32 bits */
4599
4600 ret = -EIO;
Alex Elder642a2532013-05-06 17:40:33 -05004601 if (pool_id > (u64)U32_MAX) {
Ilya Dryomov9584d502014-07-11 12:11:20 +04004602 rbd_warn(NULL, "parent pool id too large (%llu > %u)",
Alex Elder642a2532013-05-06 17:40:33 -05004603 (unsigned long long)pool_id, U32_MAX);
Alex Elder57385b52013-04-21 12:14:45 -05004604 goto out_err;
Alex Elderc0cd10db2013-04-26 09:43:47 -05004605 }
Alex Elder0903e872012-11-14 12:25:19 -06004606
Alex Elder979ed482012-11-01 08:39:26 -05004607 image_id = ceph_extract_encoded_string(&p, end, NULL, GFP_KERNEL);
Alex Elder86b00e02012-10-25 23:34:42 -05004608 if (IS_ERR(image_id)) {
4609 ret = PTR_ERR(image_id);
4610 goto out_err;
4611 }
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004612 ceph_decode_64_safe(&p, end, snap_id, out_err);
Alex Elder86b00e02012-10-25 23:34:42 -05004613 ceph_decode_64_safe(&p, end, overlap, out_err);
4614
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004615 /*
4616 * The parent won't change (except when the clone is
4617 * flattened, already handled that). So we only need to
4618 * record the parent spec we have not already done so.
4619 */
4620 if (!rbd_dev->parent_spec) {
4621 parent_spec->pool_id = pool_id;
4622 parent_spec->image_id = image_id;
4623 parent_spec->snap_id = snap_id;
Alex Elder70cf49c2013-05-06 17:40:33 -05004624 rbd_dev->parent_spec = parent_spec;
4625 parent_spec = NULL; /* rbd_dev now owns this */
Ilya Dryomovfbba11b2014-06-27 21:46:33 +04004626 } else {
4627 kfree(image_id);
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004628 }
4629
4630 /*
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03004631 * We always update the parent overlap. If it's zero we issue
4632 * a warning, as we will proceed as if there was no parent.
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004633 */
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004634 if (!overlap) {
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004635 if (parent_spec) {
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03004636 /* refresh, careful to warn just once */
4637 if (rbd_dev->parent_overlap)
4638 rbd_warn(rbd_dev,
4639 "clone now standalone (overlap became 0)");
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004640 } else {
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03004641 /* initial probe */
4642 rbd_warn(rbd_dev, "clone is standalone (overlap 0)");
Alex Elder3b5cf2a2013-05-29 11:18:59 -05004643 }
Alex Elder70cf49c2013-05-06 17:40:33 -05004644 }
Ilya Dryomovcf32bd92015-01-19 22:57:39 +03004645 rbd_dev->parent_overlap = overlap;
4646
Alex Elder86b00e02012-10-25 23:34:42 -05004647out:
4648 ret = 0;
4649out_err:
4650 kfree(reply_buf);
4651 rbd_spec_put(parent_spec);
4652
4653 return ret;
4654}
4655
Alex Eldercc070d52013-04-21 12:14:45 -05004656static int rbd_dev_v2_striping_info(struct rbd_device *rbd_dev)
4657{
4658 struct {
4659 __le64 stripe_unit;
4660 __le64 stripe_count;
4661 } __attribute__ ((packed)) striping_info_buf = { 0 };
4662 size_t size = sizeof (striping_info_buf);
4663 void *p;
Alex Eldercc070d52013-04-21 12:14:45 -05004664 int ret;
4665
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004666 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4667 &rbd_dev->header_oloc, "get_stripe_unit_count",
4668 NULL, 0, &striping_info_buf, size);
Alex Eldercc070d52013-04-21 12:14:45 -05004669 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
4670 if (ret < 0)
4671 return ret;
4672 if (ret < size)
4673 return -ERANGE;
4674
Alex Eldercc070d52013-04-21 12:14:45 -05004675 p = &striping_info_buf;
Ilya Dryomovb1331852018-02-07 12:09:12 +01004676 rbd_dev->header.stripe_unit = ceph_decode_64(&p);
4677 rbd_dev->header.stripe_count = ceph_decode_64(&p);
Alex Eldercc070d52013-04-21 12:14:45 -05004678 return 0;
4679}
4680
Ilya Dryomov7e973322017-01-25 18:16:22 +01004681static int rbd_dev_v2_data_pool(struct rbd_device *rbd_dev)
4682{
4683 __le64 data_pool_id;
4684 int ret;
4685
4686 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4687 &rbd_dev->header_oloc, "get_data_pool",
4688 NULL, 0, &data_pool_id, sizeof(data_pool_id));
4689 if (ret < 0)
4690 return ret;
4691 if (ret < sizeof(data_pool_id))
4692 return -EBADMSG;
4693
4694 rbd_dev->header.data_pool_id = le64_to_cpu(data_pool_id);
4695 WARN_ON(rbd_dev->header.data_pool_id == CEPH_NOPOOL);
4696 return 0;
4697}
4698
Alex Elder9e15b772012-10-30 19:40:33 -05004699static char *rbd_dev_image_name(struct rbd_device *rbd_dev)
4700{
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004701 CEPH_DEFINE_OID_ONSTACK(oid);
Alex Elder9e15b772012-10-30 19:40:33 -05004702 size_t image_id_size;
4703 char *image_id;
4704 void *p;
4705 void *end;
4706 size_t size;
4707 void *reply_buf = NULL;
4708 size_t len = 0;
4709 char *image_name = NULL;
4710 int ret;
4711
4712 rbd_assert(!rbd_dev->spec->image_name);
4713
Alex Elder69e7a022012-11-01 08:39:26 -05004714 len = strlen(rbd_dev->spec->image_id);
4715 image_id_size = sizeof (__le32) + len;
Alex Elder9e15b772012-10-30 19:40:33 -05004716 image_id = kmalloc(image_id_size, GFP_KERNEL);
4717 if (!image_id)
4718 return NULL;
4719
4720 p = image_id;
Alex Elder41579762013-04-21 12:14:45 -05004721 end = image_id + image_id_size;
Alex Elder57385b52013-04-21 12:14:45 -05004722 ceph_encode_string(&p, end, rbd_dev->spec->image_id, (u32)len);
Alex Elder9e15b772012-10-30 19:40:33 -05004723
4724 size = sizeof (__le32) + RBD_IMAGE_NAME_LEN_MAX;
4725 reply_buf = kmalloc(size, GFP_KERNEL);
4726 if (!reply_buf)
4727 goto out;
4728
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004729 ceph_oid_printf(&oid, "%s", RBD_DIRECTORY);
4730 ret = rbd_obj_method_sync(rbd_dev, &oid, &rbd_dev->header_oloc,
4731 "dir_get_name", image_id, image_id_size,
4732 reply_buf, size);
Alex Elder9e15b772012-10-30 19:40:33 -05004733 if (ret < 0)
4734 goto out;
4735 p = reply_buf;
Alex Elderf40eb342013-04-25 15:09:42 -05004736 end = reply_buf + ret;
4737
Alex Elder9e15b772012-10-30 19:40:33 -05004738 image_name = ceph_extract_encoded_string(&p, end, &len, GFP_KERNEL);
4739 if (IS_ERR(image_name))
4740 image_name = NULL;
4741 else
4742 dout("%s: name is %s len is %zd\n", __func__, image_name, len);
4743out:
4744 kfree(reply_buf);
4745 kfree(image_id);
4746
4747 return image_name;
4748}
4749
Alex Elder2ad3d712013-04-30 00:44:33 -05004750static u64 rbd_v1_snap_id_by_name(struct rbd_device *rbd_dev, const char *name)
4751{
4752 struct ceph_snap_context *snapc = rbd_dev->header.snapc;
4753 const char *snap_name;
4754 u32 which = 0;
4755
4756 /* Skip over names until we find the one we are looking for */
4757
4758 snap_name = rbd_dev->header.snap_names;
4759 while (which < snapc->num_snaps) {
4760 if (!strcmp(name, snap_name))
4761 return snapc->snaps[which];
4762 snap_name += strlen(snap_name) + 1;
4763 which++;
4764 }
4765 return CEPH_NOSNAP;
4766}
4767
4768static u64 rbd_v2_snap_id_by_name(struct rbd_device *rbd_dev, const char *name)
4769{
4770 struct ceph_snap_context *snapc = rbd_dev->header.snapc;
4771 u32 which;
4772 bool found = false;
4773 u64 snap_id;
4774
4775 for (which = 0; !found && which < snapc->num_snaps; which++) {
4776 const char *snap_name;
4777
4778 snap_id = snapc->snaps[which];
4779 snap_name = rbd_dev_v2_snap_name(rbd_dev, snap_id);
Josh Durginefadc982013-08-29 19:16:42 -07004780 if (IS_ERR(snap_name)) {
4781 /* ignore no-longer existing snapshots */
4782 if (PTR_ERR(snap_name) == -ENOENT)
4783 continue;
4784 else
4785 break;
4786 }
Alex Elder2ad3d712013-04-30 00:44:33 -05004787 found = !strcmp(name, snap_name);
4788 kfree(snap_name);
4789 }
4790 return found ? snap_id : CEPH_NOSNAP;
4791}
4792
4793/*
4794 * Assumes name is never RBD_SNAP_HEAD_NAME; returns CEPH_NOSNAP if
4795 * no snapshot by that name is found, or if an error occurs.
4796 */
4797static u64 rbd_snap_id_by_name(struct rbd_device *rbd_dev, const char *name)
4798{
4799 if (rbd_dev->image_format == 1)
4800 return rbd_v1_snap_id_by_name(rbd_dev, name);
4801
4802 return rbd_v2_snap_id_by_name(rbd_dev, name);
4803}
4804
Alex Elder9e15b772012-10-30 19:40:33 -05004805/*
Ilya Dryomov04077592014-07-23 17:11:20 +04004806 * An image being mapped will have everything but the snap id.
Alex Elder9e15b772012-10-30 19:40:33 -05004807 */
Ilya Dryomov04077592014-07-23 17:11:20 +04004808static int rbd_spec_fill_snap_id(struct rbd_device *rbd_dev)
4809{
4810 struct rbd_spec *spec = rbd_dev->spec;
4811
4812 rbd_assert(spec->pool_id != CEPH_NOPOOL && spec->pool_name);
4813 rbd_assert(spec->image_id && spec->image_name);
4814 rbd_assert(spec->snap_name);
4815
4816 if (strcmp(spec->snap_name, RBD_SNAP_HEAD_NAME)) {
4817 u64 snap_id;
4818
4819 snap_id = rbd_snap_id_by_name(rbd_dev, spec->snap_name);
4820 if (snap_id == CEPH_NOSNAP)
4821 return -ENOENT;
4822
4823 spec->snap_id = snap_id;
4824 } else {
4825 spec->snap_id = CEPH_NOSNAP;
4826 }
4827
4828 return 0;
4829}
4830
4831/*
4832 * A parent image will have all ids but none of the names.
4833 *
4834 * All names in an rbd spec are dynamically allocated. It's OK if we
4835 * can't figure out the name for an image id.
4836 */
4837static int rbd_spec_fill_names(struct rbd_device *rbd_dev)
Alex Elder9e15b772012-10-30 19:40:33 -05004838{
Alex Elder2e9f7f12013-04-26 09:43:48 -05004839 struct ceph_osd_client *osdc = &rbd_dev->rbd_client->client->osdc;
4840 struct rbd_spec *spec = rbd_dev->spec;
4841 const char *pool_name;
4842 const char *image_name;
4843 const char *snap_name;
Alex Elder9e15b772012-10-30 19:40:33 -05004844 int ret;
4845
Ilya Dryomov04077592014-07-23 17:11:20 +04004846 rbd_assert(spec->pool_id != CEPH_NOPOOL);
4847 rbd_assert(spec->image_id);
4848 rbd_assert(spec->snap_id != CEPH_NOSNAP);
Alex Elder9e15b772012-10-30 19:40:33 -05004849
Alex Elder2e9f7f12013-04-26 09:43:48 -05004850 /* Get the pool name; we have to make our own copy of this */
Alex Elder9e15b772012-10-30 19:40:33 -05004851
Alex Elder2e9f7f12013-04-26 09:43:48 -05004852 pool_name = ceph_pg_pool_name_by_id(osdc->osdmap, spec->pool_id);
4853 if (!pool_name) {
4854 rbd_warn(rbd_dev, "no pool with id %llu", spec->pool_id);
Alex Elder935dc892012-11-01 10:17:15 -05004855 return -EIO;
4856 }
Alex Elder2e9f7f12013-04-26 09:43:48 -05004857 pool_name = kstrdup(pool_name, GFP_KERNEL);
4858 if (!pool_name)
Alex Elder9e15b772012-10-30 19:40:33 -05004859 return -ENOMEM;
4860
4861 /* Fetch the image name; tolerate failure here */
4862
Alex Elder2e9f7f12013-04-26 09:43:48 -05004863 image_name = rbd_dev_image_name(rbd_dev);
4864 if (!image_name)
Alex Elder06ecc6c2012-11-01 10:17:15 -05004865 rbd_warn(rbd_dev, "unable to get image name");
Alex Elder9e15b772012-10-30 19:40:33 -05004866
Ilya Dryomov04077592014-07-23 17:11:20 +04004867 /* Fetch the snapshot name */
Alex Elder9e15b772012-10-30 19:40:33 -05004868
Alex Elder2e9f7f12013-04-26 09:43:48 -05004869 snap_name = rbd_snap_name(rbd_dev, spec->snap_id);
Josh Durginda6a6b62013-09-04 17:57:31 -07004870 if (IS_ERR(snap_name)) {
4871 ret = PTR_ERR(snap_name);
Alex Elder9e15b772012-10-30 19:40:33 -05004872 goto out_err;
Alex Elder2e9f7f12013-04-26 09:43:48 -05004873 }
4874
4875 spec->pool_name = pool_name;
4876 spec->image_name = image_name;
4877 spec->snap_name = snap_name;
Alex Elder9e15b772012-10-30 19:40:33 -05004878
4879 return 0;
Ilya Dryomov04077592014-07-23 17:11:20 +04004880
Alex Elder9e15b772012-10-30 19:40:33 -05004881out_err:
Alex Elder2e9f7f12013-04-26 09:43:48 -05004882 kfree(image_name);
4883 kfree(pool_name);
Alex Elder9e15b772012-10-30 19:40:33 -05004884 return ret;
4885}
4886
Alex Eldercc4a38bd2013-04-30 00:44:33 -05004887static int rbd_dev_v2_snap_context(struct rbd_device *rbd_dev)
Alex Elder35d489f2012-07-03 16:01:19 -05004888{
4889 size_t size;
4890 int ret;
4891 void *reply_buf;
4892 void *p;
4893 void *end;
4894 u64 seq;
4895 u32 snap_count;
4896 struct ceph_snap_context *snapc;
4897 u32 i;
4898
4899 /*
4900 * We'll need room for the seq value (maximum snapshot id),
4901 * snapshot count, and array of that many snapshot ids.
4902 * For now we have a fixed upper limit on the number we're
4903 * prepared to receive.
4904 */
4905 size = sizeof (__le64) + sizeof (__le32) +
4906 RBD_MAX_SNAP_COUNT * sizeof (__le64);
4907 reply_buf = kzalloc(size, GFP_KERNEL);
4908 if (!reply_buf)
4909 return -ENOMEM;
4910
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004911 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4912 &rbd_dev->header_oloc, "get_snapcontext",
4913 NULL, 0, reply_buf, size);
Alex Elder36be9a72013-01-19 00:30:28 -06004914 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elder35d489f2012-07-03 16:01:19 -05004915 if (ret < 0)
4916 goto out;
4917
Alex Elder35d489f2012-07-03 16:01:19 -05004918 p = reply_buf;
Alex Elder57385b52013-04-21 12:14:45 -05004919 end = reply_buf + ret;
4920 ret = -ERANGE;
Alex Elder35d489f2012-07-03 16:01:19 -05004921 ceph_decode_64_safe(&p, end, seq, out);
4922 ceph_decode_32_safe(&p, end, snap_count, out);
4923
4924 /*
4925 * Make sure the reported number of snapshot ids wouldn't go
4926 * beyond the end of our buffer. But before checking that,
4927 * make sure the computed size of the snapshot context we
4928 * allocate is representable in a size_t.
4929 */
4930 if (snap_count > (SIZE_MAX - sizeof (struct ceph_snap_context))
4931 / sizeof (u64)) {
4932 ret = -EINVAL;
4933 goto out;
4934 }
4935 if (!ceph_has_room(&p, end, snap_count * sizeof (__le64)))
4936 goto out;
Alex Elder468521c2013-04-26 09:43:47 -05004937 ret = 0;
Alex Elder35d489f2012-07-03 16:01:19 -05004938
Alex Elder812164f82013-04-30 00:44:32 -05004939 snapc = ceph_create_snap_context(snap_count, GFP_KERNEL);
Alex Elder35d489f2012-07-03 16:01:19 -05004940 if (!snapc) {
4941 ret = -ENOMEM;
4942 goto out;
4943 }
Alex Elder35d489f2012-07-03 16:01:19 -05004944 snapc->seq = seq;
Alex Elder35d489f2012-07-03 16:01:19 -05004945 for (i = 0; i < snap_count; i++)
4946 snapc->snaps[i] = ceph_decode_64(&p);
4947
Alex Elder49ece552013-05-06 08:37:00 -05004948 ceph_put_snap_context(rbd_dev->header.snapc);
Alex Elder35d489f2012-07-03 16:01:19 -05004949 rbd_dev->header.snapc = snapc;
4950
4951 dout(" snap context seq = %llu, snap_count = %u\n",
Alex Elder57385b52013-04-21 12:14:45 -05004952 (unsigned long long)seq, (unsigned int)snap_count);
Alex Elder35d489f2012-07-03 16:01:19 -05004953out:
4954 kfree(reply_buf);
4955
Alex Elder57385b52013-04-21 12:14:45 -05004956 return ret;
Alex Elder35d489f2012-07-03 16:01:19 -05004957}
4958
Alex Elder54cac612013-04-30 00:44:33 -05004959static const char *rbd_dev_v2_snap_name(struct rbd_device *rbd_dev,
4960 u64 snap_id)
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004961{
4962 size_t size;
4963 void *reply_buf;
Alex Elder54cac612013-04-30 00:44:33 -05004964 __le64 snapid;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004965 int ret;
4966 void *p;
4967 void *end;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004968 char *snap_name;
4969
4970 size = sizeof (__le32) + RBD_MAX_SNAP_NAME_LEN;
4971 reply_buf = kmalloc(size, GFP_KERNEL);
4972 if (!reply_buf)
4973 return ERR_PTR(-ENOMEM);
4974
Alex Elder54cac612013-04-30 00:44:33 -05004975 snapid = cpu_to_le64(snap_id);
Ilya Dryomovecd4a682017-01-25 18:16:21 +01004976 ret = rbd_obj_method_sync(rbd_dev, &rbd_dev->header_oid,
4977 &rbd_dev->header_oloc, "get_snapshot_name",
4978 &snapid, sizeof(snapid), reply_buf, size);
Alex Elder36be9a72013-01-19 00:30:28 -06004979 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elderf40eb342013-04-25 15:09:42 -05004980 if (ret < 0) {
4981 snap_name = ERR_PTR(ret);
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004982 goto out;
Alex Elderf40eb342013-04-25 15:09:42 -05004983 }
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004984
4985 p = reply_buf;
Alex Elderf40eb342013-04-25 15:09:42 -05004986 end = reply_buf + ret;
Alex Eldere5c35532012-10-25 23:34:41 -05004987 snap_name = ceph_extract_encoded_string(&p, end, NULL, GFP_KERNEL);
Alex Elderf40eb342013-04-25 15:09:42 -05004988 if (IS_ERR(snap_name))
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004989 goto out;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004990
Alex Elderf40eb342013-04-25 15:09:42 -05004991 dout(" snap_id 0x%016llx snap_name = %s\n",
Alex Elder54cac612013-04-30 00:44:33 -05004992 (unsigned long long)snap_id, snap_name);
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004993out:
4994 kfree(reply_buf);
4995
Alex Elderf40eb342013-04-25 15:09:42 -05004996 return snap_name;
Alex Elderb8b1e2d2012-07-03 16:01:19 -05004997}
4998
Alex Elder2df3fac2013-05-06 09:51:30 -05004999static int rbd_dev_v2_header_info(struct rbd_device *rbd_dev)
Alex Elder117973f2012-08-31 17:29:55 -05005000{
Alex Elder2df3fac2013-05-06 09:51:30 -05005001 bool first_time = rbd_dev->header.object_prefix == NULL;
Alex Elder117973f2012-08-31 17:29:55 -05005002 int ret;
Alex Elder117973f2012-08-31 17:29:55 -05005003
Josh Durgin1617e402013-06-12 14:43:10 -07005004 ret = rbd_dev_v2_image_size(rbd_dev);
5005 if (ret)
Alex Eldercfbf6372013-05-31 17:40:45 -05005006 return ret;
Josh Durgin1617e402013-06-12 14:43:10 -07005007
Alex Elder2df3fac2013-05-06 09:51:30 -05005008 if (first_time) {
5009 ret = rbd_dev_v2_header_onetime(rbd_dev);
5010 if (ret)
Alex Eldercfbf6372013-05-31 17:40:45 -05005011 return ret;
Alex Elder2df3fac2013-05-06 09:51:30 -05005012 }
5013
Alex Eldercc4a38bd2013-04-30 00:44:33 -05005014 ret = rbd_dev_v2_snap_context(rbd_dev);
Ilya Dryomovd194cd12015-08-31 18:22:10 +03005015 if (ret && first_time) {
5016 kfree(rbd_dev->header.object_prefix);
5017 rbd_dev->header.object_prefix = NULL;
5018 }
Alex Elder117973f2012-08-31 17:29:55 -05005019
5020 return ret;
5021}
5022
Ilya Dryomova720ae02014-07-23 17:11:19 +04005023static int rbd_dev_header_info(struct rbd_device *rbd_dev)
5024{
5025 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
5026
5027 if (rbd_dev->image_format == 1)
5028 return rbd_dev_v1_header_info(rbd_dev);
5029
5030 return rbd_dev_v2_header_info(rbd_dev);
5031}
5032
Alex Elder1ddbe942012-01-29 13:57:44 -06005033/*
Alex Eldere28fff262012-02-02 08:13:30 -06005034 * Skips over white space at *buf, and updates *buf to point to the
5035 * first found non-space character (if any). Returns the length of
Alex Elder593a9e72012-02-07 12:03:37 -06005036 * the token (string of non-white space characters) found. Note
5037 * that *buf must be terminated with '\0'.
Alex Eldere28fff262012-02-02 08:13:30 -06005038 */
5039static inline size_t next_token(const char **buf)
5040{
5041 /*
5042 * These are the characters that produce nonzero for
5043 * isspace() in the "C" and "POSIX" locales.
5044 */
5045 const char *spaces = " \f\n\r\t\v";
5046
5047 *buf += strspn(*buf, spaces); /* Find start of token */
5048
5049 return strcspn(*buf, spaces); /* Return token length */
5050}
5051
5052/*
Alex Elderea3352f2012-07-09 21:04:23 -05005053 * Finds the next token in *buf, dynamically allocates a buffer big
5054 * enough to hold a copy of it, and copies the token into the new
5055 * buffer. The copy is guaranteed to be terminated with '\0'. Note
5056 * that a duplicate buffer is created even for a zero-length token.
5057 *
5058 * Returns a pointer to the newly-allocated duplicate, or a null
5059 * pointer if memory for the duplicate was not available. If
5060 * the lenp argument is a non-null pointer, the length of the token
5061 * (not including the '\0') is returned in *lenp.
5062 *
5063 * If successful, the *buf pointer will be updated to point beyond
5064 * the end of the found token.
5065 *
5066 * Note: uses GFP_KERNEL for allocation.
5067 */
5068static inline char *dup_token(const char **buf, size_t *lenp)
5069{
5070 char *dup;
5071 size_t len;
5072
5073 len = next_token(buf);
Alex Elder4caf35f2012-11-01 08:39:27 -05005074 dup = kmemdup(*buf, len + 1, GFP_KERNEL);
Alex Elderea3352f2012-07-09 21:04:23 -05005075 if (!dup)
5076 return NULL;
Alex Elderea3352f2012-07-09 21:04:23 -05005077 *(dup + len) = '\0';
5078 *buf += len;
5079
5080 if (lenp)
5081 *lenp = len;
5082
5083 return dup;
5084}
5085
5086/*
Alex Elder859c31d2012-10-25 23:34:42 -05005087 * Parse the options provided for an "rbd add" (i.e., rbd image
5088 * mapping) request. These arrive via a write to /sys/bus/rbd/add,
5089 * and the data written is passed here via a NUL-terminated buffer.
5090 * Returns 0 if successful or an error code otherwise.
Alex Elderd22f76e2012-07-12 10:46:35 -05005091 *
Alex Elder859c31d2012-10-25 23:34:42 -05005092 * The information extracted from these options is recorded in
5093 * the other parameters which return dynamically-allocated
5094 * structures:
5095 * ceph_opts
5096 * The address of a pointer that will refer to a ceph options
5097 * structure. Caller must release the returned pointer using
5098 * ceph_destroy_options() when it is no longer needed.
5099 * rbd_opts
5100 * Address of an rbd options pointer. Fully initialized by
5101 * this function; caller must release with kfree().
5102 * spec
5103 * Address of an rbd image specification pointer. Fully
5104 * initialized by this function based on parsed options.
5105 * Caller must release with rbd_spec_put().
5106 *
5107 * The options passed take this form:
5108 * <mon_addrs> <options> <pool_name> <image_name> [<snap_id>]
5109 * where:
5110 * <mon_addrs>
5111 * A comma-separated list of one or more monitor addresses.
5112 * A monitor address is an ip address, optionally followed
5113 * by a port number (separated by a colon).
5114 * I.e.: ip1[:port1][,ip2[:port2]...]
5115 * <options>
5116 * A comma-separated list of ceph and/or rbd options.
5117 * <pool_name>
5118 * The name of the rados pool containing the rbd image.
5119 * <image_name>
5120 * The name of the image in that pool to map.
5121 * <snap_id>
5122 * An optional snapshot id. If provided, the mapping will
5123 * present data from the image at the time that snapshot was
5124 * created. The image head is used if no snapshot id is
5125 * provided. Snapshot mappings are always read-only.
Alex Eldera725f65e2012-02-02 08:13:30 -06005126 */
Alex Elder859c31d2012-10-25 23:34:42 -05005127static int rbd_add_parse_args(const char *buf,
Alex Elderdc79b112012-10-25 23:34:41 -05005128 struct ceph_options **ceph_opts,
Alex Elder859c31d2012-10-25 23:34:42 -05005129 struct rbd_options **opts,
5130 struct rbd_spec **rbd_spec)
Alex Eldera725f65e2012-02-02 08:13:30 -06005131{
Alex Elderd22f76e2012-07-12 10:46:35 -05005132 size_t len;
Alex Elder859c31d2012-10-25 23:34:42 -05005133 char *options;
Alex Elder0ddebc02012-10-25 23:34:41 -05005134 const char *mon_addrs;
Alex Elderecb4dc22013-04-26 09:43:47 -05005135 char *snap_name;
Alex Elder0ddebc02012-10-25 23:34:41 -05005136 size_t mon_addrs_size;
Alex Elder859c31d2012-10-25 23:34:42 -05005137 struct rbd_spec *spec = NULL;
Alex Elder4e9afeb2012-10-25 23:34:41 -05005138 struct rbd_options *rbd_opts = NULL;
Alex Elder859c31d2012-10-25 23:34:42 -05005139 struct ceph_options *copts;
Alex Elderdc79b112012-10-25 23:34:41 -05005140 int ret;
Alex Eldere28fff262012-02-02 08:13:30 -06005141
5142 /* The first four tokens are required */
5143
Alex Elder7ef32142012-02-02 08:13:30 -06005144 len = next_token(&buf);
Alex Elder4fb5d6712012-11-01 10:17:15 -05005145 if (!len) {
5146 rbd_warn(NULL, "no monitor address(es) provided");
5147 return -EINVAL;
5148 }
Alex Elder0ddebc02012-10-25 23:34:41 -05005149 mon_addrs = buf;
Alex Elderf28e5652012-10-25 23:34:41 -05005150 mon_addrs_size = len + 1;
Alex Elder7ef32142012-02-02 08:13:30 -06005151 buf += len;
Alex Eldera725f65e2012-02-02 08:13:30 -06005152
Alex Elderdc79b112012-10-25 23:34:41 -05005153 ret = -EINVAL;
Alex Elderf28e5652012-10-25 23:34:41 -05005154 options = dup_token(&buf, NULL);
5155 if (!options)
Alex Elderdc79b112012-10-25 23:34:41 -05005156 return -ENOMEM;
Alex Elder4fb5d6712012-11-01 10:17:15 -05005157 if (!*options) {
5158 rbd_warn(NULL, "no options provided");
5159 goto out_err;
5160 }
Alex Eldera725f65e2012-02-02 08:13:30 -06005161
Alex Elder859c31d2012-10-25 23:34:42 -05005162 spec = rbd_spec_alloc();
5163 if (!spec)
Alex Elderf28e5652012-10-25 23:34:41 -05005164 goto out_mem;
Alex Elder859c31d2012-10-25 23:34:42 -05005165
5166 spec->pool_name = dup_token(&buf, NULL);
5167 if (!spec->pool_name)
5168 goto out_mem;
Alex Elder4fb5d6712012-11-01 10:17:15 -05005169 if (!*spec->pool_name) {
5170 rbd_warn(NULL, "no pool name provided");
5171 goto out_err;
5172 }
Alex Eldere28fff262012-02-02 08:13:30 -06005173
Alex Elder69e7a022012-11-01 08:39:26 -05005174 spec->image_name = dup_token(&buf, NULL);
Alex Elder859c31d2012-10-25 23:34:42 -05005175 if (!spec->image_name)
Alex Elderf28e5652012-10-25 23:34:41 -05005176 goto out_mem;
Alex Elder4fb5d6712012-11-01 10:17:15 -05005177 if (!*spec->image_name) {
5178 rbd_warn(NULL, "no image name provided");
5179 goto out_err;
5180 }
Alex Eldere28fff262012-02-02 08:13:30 -06005181
Alex Elderf28e5652012-10-25 23:34:41 -05005182 /*
5183 * Snapshot name is optional; default is to use "-"
5184 * (indicating the head/no snapshot).
5185 */
Alex Elder3feeb8942012-08-31 17:29:52 -05005186 len = next_token(&buf);
Alex Elder820a5f32012-07-09 21:04:24 -05005187 if (!len) {
Alex Elder3feeb8942012-08-31 17:29:52 -05005188 buf = RBD_SNAP_HEAD_NAME; /* No snapshot supplied */
5189 len = sizeof (RBD_SNAP_HEAD_NAME) - 1;
Alex Elderf28e5652012-10-25 23:34:41 -05005190 } else if (len > RBD_MAX_SNAP_NAME_LEN) {
Alex Elderdc79b112012-10-25 23:34:41 -05005191 ret = -ENAMETOOLONG;
Alex Elderf28e5652012-10-25 23:34:41 -05005192 goto out_err;
Alex Elder849b4262012-07-09 21:04:24 -05005193 }
Alex Elderecb4dc22013-04-26 09:43:47 -05005194 snap_name = kmemdup(buf, len + 1, GFP_KERNEL);
5195 if (!snap_name)
Alex Elderf28e5652012-10-25 23:34:41 -05005196 goto out_mem;
Alex Elderecb4dc22013-04-26 09:43:47 -05005197 *(snap_name + len) = '\0';
5198 spec->snap_name = snap_name;
Alex Eldere5c35532012-10-25 23:34:41 -05005199
Alex Elder0ddebc02012-10-25 23:34:41 -05005200 /* Initialize all rbd options to the defaults */
Alex Eldere28fff262012-02-02 08:13:30 -06005201
Alex Elder4e9afeb2012-10-25 23:34:41 -05005202 rbd_opts = kzalloc(sizeof (*rbd_opts), GFP_KERNEL);
5203 if (!rbd_opts)
5204 goto out_mem;
5205
5206 rbd_opts->read_only = RBD_READ_ONLY_DEFAULT;
Ilya Dryomovb5584182015-06-23 16:21:19 +03005207 rbd_opts->queue_depth = RBD_QUEUE_DEPTH_DEFAULT;
Dongsheng Yang34f55d02018-03-26 10:22:55 -04005208 rbd_opts->lock_timeout = RBD_LOCK_TIMEOUT_DEFAULT;
Ilya Dryomov80de1912016-09-20 14:23:17 +02005209 rbd_opts->lock_on_read = RBD_LOCK_ON_READ_DEFAULT;
Ilya Dryomove010dd02017-04-13 12:17:39 +02005210 rbd_opts->exclusive = RBD_EXCLUSIVE_DEFAULT;
Alex Elderd22f76e2012-07-12 10:46:35 -05005211
Alex Elder859c31d2012-10-25 23:34:42 -05005212 copts = ceph_parse_options(options, mon_addrs,
Alex Elder0ddebc02012-10-25 23:34:41 -05005213 mon_addrs + mon_addrs_size - 1,
Alex Elder4e9afeb2012-10-25 23:34:41 -05005214 parse_rbd_opts_token, rbd_opts);
Alex Elder859c31d2012-10-25 23:34:42 -05005215 if (IS_ERR(copts)) {
5216 ret = PTR_ERR(copts);
Alex Elderdc79b112012-10-25 23:34:41 -05005217 goto out_err;
5218 }
Alex Elder859c31d2012-10-25 23:34:42 -05005219 kfree(options);
5220
5221 *ceph_opts = copts;
Alex Elder4e9afeb2012-10-25 23:34:41 -05005222 *opts = rbd_opts;
Alex Elder859c31d2012-10-25 23:34:42 -05005223 *rbd_spec = spec;
Alex Elder0ddebc02012-10-25 23:34:41 -05005224
Alex Elderdc79b112012-10-25 23:34:41 -05005225 return 0;
Alex Elderf28e5652012-10-25 23:34:41 -05005226out_mem:
Alex Elderdc79b112012-10-25 23:34:41 -05005227 ret = -ENOMEM;
Alex Elderd22f76e2012-07-12 10:46:35 -05005228out_err:
Alex Elder859c31d2012-10-25 23:34:42 -05005229 kfree(rbd_opts);
5230 rbd_spec_put(spec);
Alex Elderf28e5652012-10-25 23:34:41 -05005231 kfree(options);
Alex Elderd22f76e2012-07-12 10:46:35 -05005232
Alex Elderdc79b112012-10-25 23:34:41 -05005233 return ret;
Alex Eldera725f65e2012-02-02 08:13:30 -06005234}
5235
Ilya Dryomove010dd02017-04-13 12:17:39 +02005236static void rbd_dev_image_unlock(struct rbd_device *rbd_dev)
5237{
5238 down_write(&rbd_dev->lock_rwsem);
5239 if (__rbd_is_lock_owner(rbd_dev))
5240 rbd_unlock(rbd_dev);
5241 up_write(&rbd_dev->lock_rwsem);
5242}
5243
5244static int rbd_add_acquire_lock(struct rbd_device *rbd_dev)
5245{
Ilya Dryomov2f18d462018-04-04 10:15:38 +02005246 int ret;
5247
Ilya Dryomove010dd02017-04-13 12:17:39 +02005248 if (!(rbd_dev->header.features & RBD_FEATURE_EXCLUSIVE_LOCK)) {
5249 rbd_warn(rbd_dev, "exclusive-lock feature is not enabled");
5250 return -EINVAL;
5251 }
5252
5253 /* FIXME: "rbd map --exclusive" should be in interruptible */
5254 down_read(&rbd_dev->lock_rwsem);
Ilya Dryomov2f18d462018-04-04 10:15:38 +02005255 ret = rbd_wait_state_locked(rbd_dev, true);
Ilya Dryomove010dd02017-04-13 12:17:39 +02005256 up_read(&rbd_dev->lock_rwsem);
Ilya Dryomov2f18d462018-04-04 10:15:38 +02005257 if (ret) {
Ilya Dryomove010dd02017-04-13 12:17:39 +02005258 rbd_warn(rbd_dev, "failed to acquire exclusive lock");
5259 return -EROFS;
5260 }
5261
5262 return 0;
5263}
5264
Ilya Dryomov30ba1f02014-05-13 11:19:27 +04005265/*
Alex Elder589d30e2012-07-10 20:30:11 -05005266 * An rbd format 2 image has a unique identifier, distinct from the
5267 * name given to it by the user. Internally, that identifier is
5268 * what's used to specify the names of objects related to the image.
5269 *
5270 * A special "rbd id" object is used to map an rbd image name to its
5271 * id. If that object doesn't exist, then there is no v2 rbd image
5272 * with the supplied name.
5273 *
5274 * This function will record the given rbd_dev's image_id field if
5275 * it can be determined, and in that case will return 0. If any
5276 * errors occur a negative errno will be returned and the rbd_dev's
5277 * image_id field will be unchanged (and should be NULL).
5278 */
5279static int rbd_dev_image_id(struct rbd_device *rbd_dev)
5280{
5281 int ret;
5282 size_t size;
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005283 CEPH_DEFINE_OID_ONSTACK(oid);
Alex Elder589d30e2012-07-10 20:30:11 -05005284 void *response;
Alex Elderc0fba362013-04-25 23:15:08 -05005285 char *image_id;
Alex Elder2f82ee52012-10-30 19:40:33 -05005286
Alex Elder589d30e2012-07-10 20:30:11 -05005287 /*
Alex Elder2c0d0a12012-10-30 19:40:33 -05005288 * When probing a parent image, the image id is already
5289 * known (and the image name likely is not). There's no
Alex Elderc0fba362013-04-25 23:15:08 -05005290 * need to fetch the image id again in this case. We
5291 * do still need to set the image format though.
Alex Elder2c0d0a12012-10-30 19:40:33 -05005292 */
Alex Elderc0fba362013-04-25 23:15:08 -05005293 if (rbd_dev->spec->image_id) {
5294 rbd_dev->image_format = *rbd_dev->spec->image_id ? 2 : 1;
5295
Alex Elder2c0d0a12012-10-30 19:40:33 -05005296 return 0;
Alex Elderc0fba362013-04-25 23:15:08 -05005297 }
Alex Elder2c0d0a12012-10-30 19:40:33 -05005298
5299 /*
Alex Elder589d30e2012-07-10 20:30:11 -05005300 * First, see if the format 2 image id file exists, and if
5301 * so, get the image's persistent id from it.
5302 */
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005303 ret = ceph_oid_aprintf(&oid, GFP_KERNEL, "%s%s", RBD_ID_PREFIX,
5304 rbd_dev->spec->image_name);
5305 if (ret)
5306 return ret;
5307
5308 dout("rbd id object name is %s\n", oid.name);
Alex Elder589d30e2012-07-10 20:30:11 -05005309
5310 /* Response will be an encoded string, which includes a length */
5311
5312 size = sizeof (__le32) + RBD_IMAGE_ID_LEN_MAX;
5313 response = kzalloc(size, GFP_NOIO);
5314 if (!response) {
5315 ret = -ENOMEM;
5316 goto out;
5317 }
5318
Alex Elderc0fba362013-04-25 23:15:08 -05005319 /* If it doesn't exist we'll assume it's a format 1 image */
5320
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005321 ret = rbd_obj_method_sync(rbd_dev, &oid, &rbd_dev->header_oloc,
5322 "get_id", NULL, 0,
5323 response, RBD_IMAGE_ID_LEN_MAX);
Alex Elder36be9a72013-01-19 00:30:28 -06005324 dout("%s: rbd_obj_method_sync returned %d\n", __func__, ret);
Alex Elderc0fba362013-04-25 23:15:08 -05005325 if (ret == -ENOENT) {
5326 image_id = kstrdup("", GFP_KERNEL);
5327 ret = image_id ? 0 : -ENOMEM;
5328 if (!ret)
5329 rbd_dev->image_format = 1;
Ilya Dryomov7dd440c2014-09-11 18:49:18 +04005330 } else if (ret >= 0) {
Alex Elderc0fba362013-04-25 23:15:08 -05005331 void *p = response;
Alex Elder589d30e2012-07-10 20:30:11 -05005332
Alex Elderc0fba362013-04-25 23:15:08 -05005333 image_id = ceph_extract_encoded_string(&p, p + ret,
Alex Elder979ed482012-11-01 08:39:26 -05005334 NULL, GFP_NOIO);
Duan Jiong461f7582014-04-11 16:38:12 +08005335 ret = PTR_ERR_OR_ZERO(image_id);
Alex Elderc0fba362013-04-25 23:15:08 -05005336 if (!ret)
5337 rbd_dev->image_format = 2;
Alex Elderc0fba362013-04-25 23:15:08 -05005338 }
5339
5340 if (!ret) {
5341 rbd_dev->spec->image_id = image_id;
5342 dout("image_id is %s\n", image_id);
Alex Elder589d30e2012-07-10 20:30:11 -05005343 }
5344out:
5345 kfree(response);
Ilya Dryomovecd4a682017-01-25 18:16:21 +01005346 ceph_oid_destroy(&oid);
Alex Elder589d30e2012-07-10 20:30:11 -05005347 return ret;
5348}
5349
Alex Elder3abef3b2013-05-13 20:35:37 -05005350/*
5351 * Undo whatever state changes are made by v1 or v2 header info
5352 * call.
5353 */
Alex Elder6fd48b32013-04-28 23:32:34 -05005354static void rbd_dev_unprobe(struct rbd_device *rbd_dev)
5355{
5356 struct rbd_image_header *header;
5357
Ilya Dryomove69b8d42015-01-19 12:06:14 +03005358 rbd_dev_parent_put(rbd_dev);
Alex Elder6fd48b32013-04-28 23:32:34 -05005359
5360 /* Free dynamic fields from the header, then zero it out */
5361
5362 header = &rbd_dev->header;
Alex Elder812164f82013-04-30 00:44:32 -05005363 ceph_put_snap_context(header->snapc);
Alex Elder6fd48b32013-04-28 23:32:34 -05005364 kfree(header->snap_sizes);
5365 kfree(header->snap_names);
5366 kfree(header->object_prefix);
5367 memset(header, 0, sizeof (*header));
5368}
5369
Alex Elder2df3fac2013-05-06 09:51:30 -05005370static int rbd_dev_v2_header_onetime(struct rbd_device *rbd_dev)
Alex Eldera30b71b2012-07-10 20:30:11 -05005371{
5372 int ret;
Alex Eldera30b71b2012-07-10 20:30:11 -05005373
Alex Elder1e130192012-07-03 16:01:19 -05005374 ret = rbd_dev_v2_object_prefix(rbd_dev);
Alex Elder57385b52013-04-21 12:14:45 -05005375 if (ret)
Alex Elder1e130192012-07-03 16:01:19 -05005376 goto out_err;
Alex Elderb1b54022012-07-03 16:01:19 -05005377
Alex Elder2df3fac2013-05-06 09:51:30 -05005378 /*
5379 * Get the and check features for the image. Currently the
5380 * features are assumed to never change.
5381 */
Alex Elderb1b54022012-07-03 16:01:19 -05005382 ret = rbd_dev_v2_features(rbd_dev);
Alex Elder57385b52013-04-21 12:14:45 -05005383 if (ret)
Alex Elderb1b54022012-07-03 16:01:19 -05005384 goto out_err;
Alex Elder35d489f2012-07-03 16:01:19 -05005385
Alex Eldercc070d52013-04-21 12:14:45 -05005386 /* If the image supports fancy striping, get its parameters */
5387
5388 if (rbd_dev->header.features & RBD_FEATURE_STRIPINGV2) {
5389 ret = rbd_dev_v2_striping_info(rbd_dev);
5390 if (ret < 0)
5391 goto out_err;
5392 }
Alex Eldera30b71b2012-07-10 20:30:11 -05005393
Ilya Dryomov7e973322017-01-25 18:16:22 +01005394 if (rbd_dev->header.features & RBD_FEATURE_DATA_POOL) {
5395 ret = rbd_dev_v2_data_pool(rbd_dev);
5396 if (ret)
5397 goto out_err;
5398 }
5399
Ilya Dryomov263423f2017-01-25 18:16:22 +01005400 rbd_init_layout(rbd_dev);
Alex Elder35152972012-08-31 17:29:55 -05005401 return 0;
Ilya Dryomov263423f2017-01-25 18:16:22 +01005402
Alex Elder9d475de2012-07-03 16:01:19 -05005403out_err:
Alex Elder642a2532013-05-06 17:40:33 -05005404 rbd_dev->header.features = 0;
Alex Elder1e130192012-07-03 16:01:19 -05005405 kfree(rbd_dev->header.object_prefix);
5406 rbd_dev->header.object_prefix = NULL;
Alex Elder9d475de2012-07-03 16:01:19 -05005407 return ret;
Alex Eldera30b71b2012-07-10 20:30:11 -05005408}
5409
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005410/*
5411 * @depth is rbd_dev_image_probe() -> rbd_dev_probe_parent() ->
5412 * rbd_dev_image_probe() recursion depth, which means it's also the
5413 * length of the already discovered part of the parent chain.
5414 */
5415static int rbd_dev_probe_parent(struct rbd_device *rbd_dev, int depth)
Alex Elder83a06262012-10-30 15:47:17 -05005416{
Alex Elder2f82ee52012-10-30 19:40:33 -05005417 struct rbd_device *parent = NULL;
Alex Elder124afba2013-04-26 15:44:36 -05005418 int ret;
5419
5420 if (!rbd_dev->parent_spec)
5421 return 0;
Alex Elder124afba2013-04-26 15:44:36 -05005422
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005423 if (++depth > RBD_MAX_PARENT_CHAIN_LEN) {
5424 pr_info("parent chain is too long (%d)\n", depth);
5425 ret = -EINVAL;
5426 goto out_err;
5427 }
5428
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02005429 parent = __rbd_dev_create(rbd_dev->rbd_client, rbd_dev->parent_spec);
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005430 if (!parent) {
5431 ret = -ENOMEM;
Alex Elder124afba2013-04-26 15:44:36 -05005432 goto out_err;
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005433 }
5434
5435 /*
5436 * Images related by parent/child relationships always share
5437 * rbd_client and spec/parent_spec, so bump their refcounts.
5438 */
5439 __rbd_get_client(rbd_dev->rbd_client);
5440 rbd_spec_get(rbd_dev->parent_spec);
Alex Elder124afba2013-04-26 15:44:36 -05005441
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005442 ret = rbd_dev_image_probe(parent, depth);
Alex Elder124afba2013-04-26 15:44:36 -05005443 if (ret < 0)
5444 goto out_err;
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005445
Alex Elder124afba2013-04-26 15:44:36 -05005446 rbd_dev->parent = parent;
Alex Eldera2acd002013-05-08 22:50:04 -05005447 atomic_set(&rbd_dev->parent_ref, 1);
Alex Elder124afba2013-04-26 15:44:36 -05005448 return 0;
Alex Elder124afba2013-04-26 15:44:36 -05005449
Ilya Dryomov1f2c6652015-10-11 19:38:00 +02005450out_err:
5451 rbd_dev_unparent(rbd_dev);
Markus Elfring1761b222015-11-23 20:16:45 +01005452 rbd_dev_destroy(parent);
Alex Elder124afba2013-04-26 15:44:36 -05005453 return ret;
5454}
5455
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005456static void rbd_dev_device_release(struct rbd_device *rbd_dev)
5457{
5458 clear_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags);
5459 rbd_dev_mapping_clear(rbd_dev);
5460 rbd_free_disk(rbd_dev);
5461 if (!single_major)
5462 unregister_blkdev(rbd_dev->major, rbd_dev->name);
5463}
5464
Ilya Dryomov811c6682016-04-15 16:22:16 +02005465/*
5466 * rbd_dev->header_rwsem must be locked for write and will be unlocked
5467 * upon return.
5468 */
Alex Elder200a6a82013-04-28 23:32:34 -05005469static int rbd_dev_device_setup(struct rbd_device *rbd_dev)
Alex Elder124afba2013-04-26 15:44:36 -05005470{
Alex Elder83a06262012-10-30 15:47:17 -05005471 int ret;
Alex Elder83a06262012-10-30 15:47:17 -05005472
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005473 /* Record our major and minor device numbers. */
Alex Elder83a06262012-10-30 15:47:17 -05005474
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005475 if (!single_major) {
5476 ret = register_blkdev(0, rbd_dev->name);
5477 if (ret < 0)
Ilya Dryomov1643dfa2016-08-12 15:45:52 +02005478 goto err_out_unlock;
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005479
5480 rbd_dev->major = ret;
5481 rbd_dev->minor = 0;
5482 } else {
5483 rbd_dev->major = rbd_major;
5484 rbd_dev->minor = rbd_dev_id_to_minor(rbd_dev->dev_id);
5485 }
Alex Elder83a06262012-10-30 15:47:17 -05005486
5487 /* Set up the blkdev mapping. */
5488
5489 ret = rbd_init_disk(rbd_dev);
5490 if (ret)
5491 goto err_out_blkdev;
5492
Alex Elderf35a4de2013-05-06 09:51:29 -05005493 ret = rbd_dev_mapping_set(rbd_dev);
Alex Elder83a06262012-10-30 15:47:17 -05005494 if (ret)
5495 goto err_out_disk;
Ilya Dryomovbc1ecc62014-08-04 18:04:39 +04005496
Alex Elderf35a4de2013-05-06 09:51:29 -05005497 set_capacity(rbd_dev->disk, rbd_dev->mapping.size / SECTOR_SIZE);
Ilya Dryomov9568c932017-10-12 12:35:19 +02005498 set_disk_ro(rbd_dev->disk, rbd_dev->opts->read_only);
Alex Elderf35a4de2013-05-06 09:51:29 -05005499
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005500 ret = dev_set_name(&rbd_dev->dev, "%d", rbd_dev->dev_id);
Alex Elderf35a4de2013-05-06 09:51:29 -05005501 if (ret)
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005502 goto err_out_mapping;
Alex Elder83a06262012-10-30 15:47:17 -05005503
Alex Elder129b79d2013-04-26 15:44:36 -05005504 set_bit(RBD_DEV_FLAG_EXISTS, &rbd_dev->flags);
Ilya Dryomov811c6682016-04-15 16:22:16 +02005505 up_write(&rbd_dev->header_rwsem);
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005506 return 0;
Alex Elder2f82ee52012-10-30 19:40:33 -05005507
Alex Elderf35a4de2013-05-06 09:51:29 -05005508err_out_mapping:
5509 rbd_dev_mapping_clear(rbd_dev);
Alex Elder83a06262012-10-30 15:47:17 -05005510err_out_disk:
5511 rbd_free_disk(rbd_dev);
5512err_out_blkdev:
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005513 if (!single_major)
5514 unregister_blkdev(rbd_dev->major, rbd_dev->name);
Ilya Dryomov811c6682016-04-15 16:22:16 +02005515err_out_unlock:
5516 up_write(&rbd_dev->header_rwsem);
Alex Elder83a06262012-10-30 15:47:17 -05005517 return ret;
5518}
5519
Alex Elder332bb122013-04-27 09:59:30 -05005520static int rbd_dev_header_name(struct rbd_device *rbd_dev)
5521{
5522 struct rbd_spec *spec = rbd_dev->spec;
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005523 int ret;
Alex Elder332bb122013-04-27 09:59:30 -05005524
5525 /* Record the header object name for this rbd image. */
5526
5527 rbd_assert(rbd_image_format_valid(rbd_dev->image_format));
Alex Elder332bb122013-04-27 09:59:30 -05005528 if (rbd_dev->image_format == 1)
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005529 ret = ceph_oid_aprintf(&rbd_dev->header_oid, GFP_KERNEL, "%s%s",
5530 spec->image_name, RBD_SUFFIX);
Alex Elder332bb122013-04-27 09:59:30 -05005531 else
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005532 ret = ceph_oid_aprintf(&rbd_dev->header_oid, GFP_KERNEL, "%s%s",
5533 RBD_HEADER_PREFIX, spec->image_id);
Alex Elder332bb122013-04-27 09:59:30 -05005534
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005535 return ret;
Alex Elder332bb122013-04-27 09:59:30 -05005536}
5537
Alex Elder200a6a82013-04-28 23:32:34 -05005538static void rbd_dev_image_release(struct rbd_device *rbd_dev)
5539{
Alex Elder6fd48b32013-04-28 23:32:34 -05005540 rbd_dev_unprobe(rbd_dev);
Ilya Dryomovfd22aef2017-04-13 12:17:37 +02005541 if (rbd_dev->opts)
5542 rbd_unregister_watch(rbd_dev);
Alex Elder6fd48b32013-04-28 23:32:34 -05005543 rbd_dev->image_format = 0;
5544 kfree(rbd_dev->spec->image_id);
5545 rbd_dev->spec->image_id = NULL;
Alex Elder200a6a82013-04-28 23:32:34 -05005546}
5547
Alex Eldera30b71b2012-07-10 20:30:11 -05005548/*
5549 * Probe for the existence of the header object for the given rbd
Alex Elder1f3ef782013-05-06 17:40:33 -05005550 * device. If this image is the one being mapped (i.e., not a
5551 * parent), initiate a watch on its header object before using that
5552 * object to get detailed information about the rbd image.
Alex Eldera30b71b2012-07-10 20:30:11 -05005553 */
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005554static int rbd_dev_image_probe(struct rbd_device *rbd_dev, int depth)
Alex Eldera30b71b2012-07-10 20:30:11 -05005555{
5556 int ret;
5557
5558 /*
Alex Elder3abef3b2013-05-13 20:35:37 -05005559 * Get the id from the image id object. Unless there's an
5560 * error, rbd_dev->spec->image_id will be filled in with
5561 * a dynamically-allocated string, and rbd_dev->image_format
5562 * will be set to either 1 or 2.
Alex Eldera30b71b2012-07-10 20:30:11 -05005563 */
5564 ret = rbd_dev_image_id(rbd_dev);
5565 if (ret)
Alex Elderc0fba362013-04-25 23:15:08 -05005566 return ret;
Alex Elderc0fba362013-04-25 23:15:08 -05005567
Alex Elder332bb122013-04-27 09:59:30 -05005568 ret = rbd_dev_header_name(rbd_dev);
5569 if (ret)
5570 goto err_out_format;
5571
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005572 if (!depth) {
Ilya Dryomov99d16942016-08-12 16:11:41 +02005573 ret = rbd_register_watch(rbd_dev);
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005574 if (ret) {
5575 if (ret == -ENOENT)
5576 pr_info("image %s/%s does not exist\n",
5577 rbd_dev->spec->pool_name,
5578 rbd_dev->spec->image_name);
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005579 goto err_out_format;
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005580 }
Alex Elder1f3ef782013-05-06 17:40:33 -05005581 }
Alex Elderb644de22013-04-27 09:59:31 -05005582
Ilya Dryomova720ae02014-07-23 17:11:19 +04005583 ret = rbd_dev_header_info(rbd_dev);
Alex Elder5655c4d2013-04-25 23:15:08 -05005584 if (ret)
Alex Elderb644de22013-04-27 09:59:31 -05005585 goto err_out_watch;
Alex Elder83a06262012-10-30 15:47:17 -05005586
Ilya Dryomov04077592014-07-23 17:11:20 +04005587 /*
5588 * If this image is the one being mapped, we have pool name and
5589 * id, image name and id, and snap name - need to fill snap id.
5590 * Otherwise this is a parent image, identified by pool, image
5591 * and snap ids - need to fill in names for those ids.
5592 */
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005593 if (!depth)
Ilya Dryomov04077592014-07-23 17:11:20 +04005594 ret = rbd_spec_fill_snap_id(rbd_dev);
5595 else
5596 ret = rbd_spec_fill_names(rbd_dev);
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005597 if (ret) {
5598 if (ret == -ENOENT)
5599 pr_info("snap %s/%s@%s does not exist\n",
5600 rbd_dev->spec->pool_name,
5601 rbd_dev->spec->image_name,
5602 rbd_dev->spec->snap_name);
Alex Elder33dca392013-04-30 00:44:33 -05005603 goto err_out_probe;
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005604 }
Alex Elder9bb81c92013-04-27 09:59:30 -05005605
Ilya Dryomove8f59b52014-07-24 10:42:13 +04005606 if (rbd_dev->header.features & RBD_FEATURE_LAYERING) {
5607 ret = rbd_dev_v2_parent_info(rbd_dev);
5608 if (ret)
5609 goto err_out_probe;
5610
5611 /*
5612 * Need to warn users if this image is the one being
5613 * mapped and has a parent.
5614 */
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005615 if (!depth && rbd_dev->parent_spec)
Ilya Dryomove8f59b52014-07-24 10:42:13 +04005616 rbd_warn(rbd_dev,
5617 "WARNING: kernel layering is EXPERIMENTAL!");
5618 }
5619
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005620 ret = rbd_dev_probe_parent(rbd_dev, depth);
Alex Elder30d60ba2013-05-06 09:51:30 -05005621 if (ret)
5622 goto err_out_probe;
Alex Elder83a06262012-10-30 15:47:17 -05005623
Alex Elder30d60ba2013-05-06 09:51:30 -05005624 dout("discovered format %u image, header name is %s\n",
Ilya Dryomovc41d13a2016-04-29 20:01:25 +02005625 rbd_dev->image_format, rbd_dev->header_oid.name);
Alex Elder30d60ba2013-05-06 09:51:30 -05005626 return 0;
Ilya Dryomove8f59b52014-07-24 10:42:13 +04005627
Alex Elder6fd48b32013-04-28 23:32:34 -05005628err_out_probe:
5629 rbd_dev_unprobe(rbd_dev);
Alex Elderb644de22013-04-27 09:59:31 -05005630err_out_watch:
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005631 if (!depth)
Ilya Dryomov99d16942016-08-12 16:11:41 +02005632 rbd_unregister_watch(rbd_dev);
Alex Elder332bb122013-04-27 09:59:30 -05005633err_out_format:
5634 rbd_dev->image_format = 0;
Alex Elder5655c4d2013-04-25 23:15:08 -05005635 kfree(rbd_dev->spec->image_id);
5636 rbd_dev->spec->image_id = NULL;
Alex Elder5655c4d2013-04-25 23:15:08 -05005637 return ret;
Alex Eldera30b71b2012-07-10 20:30:11 -05005638}
5639
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005640static ssize_t do_rbd_add(struct bus_type *bus,
5641 const char *buf,
5642 size_t count)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005643{
Alex Eldercb8627c2012-07-09 21:04:23 -05005644 struct rbd_device *rbd_dev = NULL;
Alex Elderdc79b112012-10-25 23:34:41 -05005645 struct ceph_options *ceph_opts = NULL;
Alex Elder4e9afeb2012-10-25 23:34:41 -05005646 struct rbd_options *rbd_opts = NULL;
Alex Elder859c31d2012-10-25 23:34:42 -05005647 struct rbd_spec *spec = NULL;
Alex Elder9d3997f2012-10-25 23:34:42 -05005648 struct rbd_client *rbdc;
Ilya Dryomovb51c83c2015-10-15 15:38:57 +02005649 int rc;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005650
5651 if (!try_module_get(THIS_MODULE))
5652 return -ENODEV;
5653
Alex Eldera725f65e2012-02-02 08:13:30 -06005654 /* parse add command */
Alex Elder859c31d2012-10-25 23:34:42 -05005655 rc = rbd_add_parse_args(buf, &ceph_opts, &rbd_opts, &spec);
Alex Elderdc79b112012-10-25 23:34:41 -05005656 if (rc < 0)
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02005657 goto out;
Alex Eldera725f65e2012-02-02 08:13:30 -06005658
Alex Elder9d3997f2012-10-25 23:34:42 -05005659 rbdc = rbd_get_client(ceph_opts);
5660 if (IS_ERR(rbdc)) {
5661 rc = PTR_ERR(rbdc);
Alex Elder0ddebc02012-10-25 23:34:41 -05005662 goto err_out_args;
Alex Elder9d3997f2012-10-25 23:34:42 -05005663 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005664
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005665 /* pick the pool */
Ilya Dryomovdd435852018-02-22 13:43:24 +01005666 rc = ceph_pg_poolid_by_name(rbdc->client->osdc.osdmap, spec->pool_name);
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005667 if (rc < 0) {
5668 if (rc == -ENOENT)
5669 pr_info("pool %s does not exist\n", spec->pool_name);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005670 goto err_out_client;
Ilya Dryomov1fe48022015-03-05 10:47:22 +03005671 }
Alex Elderc0cd10db2013-04-26 09:43:47 -05005672 spec->pool_id = (u64)rc;
Alex Elder859c31d2012-10-25 23:34:42 -05005673
Ilya Dryomovd1475432015-06-22 13:24:48 +03005674 rbd_dev = rbd_dev_create(rbdc, spec, rbd_opts);
Ilya Dryomovb51c83c2015-10-15 15:38:57 +02005675 if (!rbd_dev) {
5676 rc = -ENOMEM;
Alex Elderbd4ba652012-10-25 23:34:42 -05005677 goto err_out_client;
Ilya Dryomovb51c83c2015-10-15 15:38:57 +02005678 }
Alex Elderc53d5892012-10-25 23:34:42 -05005679 rbdc = NULL; /* rbd_dev now owns this */
5680 spec = NULL; /* rbd_dev now owns this */
Ilya Dryomovd1475432015-06-22 13:24:48 +03005681 rbd_opts = NULL; /* rbd_dev now owns this */
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005682
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02005683 rbd_dev->config_info = kstrdup(buf, GFP_KERNEL);
5684 if (!rbd_dev->config_info) {
5685 rc = -ENOMEM;
5686 goto err_out_rbd_dev;
5687 }
5688
Ilya Dryomov811c6682016-04-15 16:22:16 +02005689 down_write(&rbd_dev->header_rwsem);
Ilya Dryomov6d69bb532015-10-11 19:38:00 +02005690 rc = rbd_dev_image_probe(rbd_dev, 0);
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02005691 if (rc < 0) {
5692 up_write(&rbd_dev->header_rwsem);
Alex Elderc53d5892012-10-25 23:34:42 -05005693 goto err_out_rbd_dev;
Mike Christie0d6d1e9c2016-08-18 18:38:45 +02005694 }
Alex Elder05fd6f62012-08-29 17:11:07 -05005695
Alex Elder7ce4eef2013-05-06 17:40:33 -05005696 /* If we are mapping a snapshot it must be marked read-only */
Alex Elder7ce4eef2013-05-06 17:40:33 -05005697 if (rbd_dev->spec->snap_id != CEPH_NOSNAP)
Ilya Dryomov9568c932017-10-12 12:35:19 +02005698 rbd_dev->opts->read_only = true;
Alex Elder7ce4eef2013-05-06 17:40:33 -05005699
Alex Elderb536f692013-04-28 23:32:34 -05005700 rc = rbd_dev_device_setup(rbd_dev);
Ilya Dryomovfd22aef2017-04-13 12:17:37 +02005701 if (rc)
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02005702 goto err_out_image_probe;
Alex Elderb536f692013-04-28 23:32:34 -05005703
Ilya Dryomove010dd02017-04-13 12:17:39 +02005704 if (rbd_dev->opts->exclusive) {
5705 rc = rbd_add_acquire_lock(rbd_dev);
5706 if (rc)
5707 goto err_out_device_setup;
Alex Elderb536f692013-04-28 23:32:34 -05005708 }
5709
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005710 /* Everything's ready. Announce the disk to the world. */
5711
5712 rc = device_add(&rbd_dev->dev);
5713 if (rc)
Ilya Dryomove010dd02017-04-13 12:17:39 +02005714 goto err_out_image_lock;
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005715
5716 add_disk(rbd_dev->disk);
5717 /* see rbd_init_disk() */
5718 blk_put_queue(rbd_dev->disk->queue);
5719
5720 spin_lock(&rbd_dev_list_lock);
5721 list_add_tail(&rbd_dev->node, &rbd_dev_list);
5722 spin_unlock(&rbd_dev_list_lock);
5723
5724 pr_info("%s: capacity %llu features 0x%llx\n", rbd_dev->disk->disk_name,
5725 (unsigned long long)get_capacity(rbd_dev->disk) << SECTOR_SHIFT,
5726 rbd_dev->header.features);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02005727 rc = count;
5728out:
5729 module_put(THIS_MODULE);
5730 return rc;
Alex Elder3abef3b2013-05-13 20:35:37 -05005731
Ilya Dryomove010dd02017-04-13 12:17:39 +02005732err_out_image_lock:
5733 rbd_dev_image_unlock(rbd_dev);
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005734err_out_device_setup:
5735 rbd_dev_device_release(rbd_dev);
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02005736err_out_image_probe:
5737 rbd_dev_image_release(rbd_dev);
Alex Elderc53d5892012-10-25 23:34:42 -05005738err_out_rbd_dev:
5739 rbd_dev_destroy(rbd_dev);
Alex Elderbd4ba652012-10-25 23:34:42 -05005740err_out_client:
Alex Elder9d3997f2012-10-25 23:34:42 -05005741 rbd_put_client(rbdc);
Alex Elder0ddebc02012-10-25 23:34:41 -05005742err_out_args:
Alex Elder859c31d2012-10-25 23:34:42 -05005743 rbd_spec_put(spec);
Ilya Dryomovd1475432015-06-22 13:24:48 +03005744 kfree(rbd_opts);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02005745 goto out;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005746}
5747
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005748static ssize_t rbd_add(struct bus_type *bus,
5749 const char *buf,
5750 size_t count)
5751{
5752 if (single_major)
5753 return -EINVAL;
5754
5755 return do_rbd_add(bus, buf, count);
5756}
5757
5758static ssize_t rbd_add_single_major(struct bus_type *bus,
5759 const char *buf,
5760 size_t count)
5761{
5762 return do_rbd_add(bus, buf, count);
5763}
5764
Alex Elder05a46af2013-04-26 15:44:36 -05005765static void rbd_dev_remove_parent(struct rbd_device *rbd_dev)
5766{
Alex Elderad945fc2013-04-26 15:44:36 -05005767 while (rbd_dev->parent) {
Alex Elder05a46af2013-04-26 15:44:36 -05005768 struct rbd_device *first = rbd_dev;
5769 struct rbd_device *second = first->parent;
5770 struct rbd_device *third;
5771
5772 /*
5773 * Follow to the parent with no grandparent and
5774 * remove it.
5775 */
5776 while (second && (third = second->parent)) {
5777 first = second;
5778 second = third;
5779 }
Alex Elderad945fc2013-04-26 15:44:36 -05005780 rbd_assert(second);
Alex Elder8ad42cd2013-04-28 23:32:34 -05005781 rbd_dev_image_release(second);
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02005782 rbd_dev_destroy(second);
Alex Elderad945fc2013-04-26 15:44:36 -05005783 first->parent = NULL;
5784 first->parent_overlap = 0;
5785
5786 rbd_assert(first->parent_spec);
Alex Elder05a46af2013-04-26 15:44:36 -05005787 rbd_spec_put(first->parent_spec);
5788 first->parent_spec = NULL;
Alex Elder05a46af2013-04-26 15:44:36 -05005789 }
5790}
5791
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005792static ssize_t do_rbd_remove(struct bus_type *bus,
5793 const char *buf,
5794 size_t count)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005795{
5796 struct rbd_device *rbd_dev = NULL;
Alex Elder751cc0e2013-05-31 15:17:01 -05005797 struct list_head *tmp;
5798 int dev_id;
Mike Christie0276dca2016-08-18 18:38:45 +02005799 char opt_buf[6];
Alex Elder82a442d2013-05-31 17:40:44 -05005800 bool already = false;
Mike Christie0276dca2016-08-18 18:38:45 +02005801 bool force = false;
Alex Elder0d8189e2013-04-27 09:59:30 -05005802 int ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005803
Mike Christie0276dca2016-08-18 18:38:45 +02005804 dev_id = -1;
5805 opt_buf[0] = '\0';
5806 sscanf(buf, "%d %5s", &dev_id, opt_buf);
5807 if (dev_id < 0) {
5808 pr_err("dev_id out of range\n");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005809 return -EINVAL;
Mike Christie0276dca2016-08-18 18:38:45 +02005810 }
5811 if (opt_buf[0] != '\0') {
5812 if (!strcmp(opt_buf, "force")) {
5813 force = true;
5814 } else {
5815 pr_err("bad remove option at '%s'\n", opt_buf);
5816 return -EINVAL;
5817 }
5818 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005819
Alex Elder751cc0e2013-05-31 15:17:01 -05005820 ret = -ENOENT;
5821 spin_lock(&rbd_dev_list_lock);
5822 list_for_each(tmp, &rbd_dev_list) {
5823 rbd_dev = list_entry(tmp, struct rbd_device, node);
5824 if (rbd_dev->dev_id == dev_id) {
5825 ret = 0;
5826 break;
5827 }
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005828 }
Alex Elder751cc0e2013-05-31 15:17:01 -05005829 if (!ret) {
5830 spin_lock_irq(&rbd_dev->lock);
Mike Christie0276dca2016-08-18 18:38:45 +02005831 if (rbd_dev->open_count && !force)
Alex Elder751cc0e2013-05-31 15:17:01 -05005832 ret = -EBUSY;
5833 else
Alex Elder82a442d2013-05-31 17:40:44 -05005834 already = test_and_set_bit(RBD_DEV_FLAG_REMOVING,
5835 &rbd_dev->flags);
Alex Elder751cc0e2013-05-31 15:17:01 -05005836 spin_unlock_irq(&rbd_dev->lock);
5837 }
5838 spin_unlock(&rbd_dev_list_lock);
Alex Elder82a442d2013-05-31 17:40:44 -05005839 if (ret < 0 || already)
Alex Elder1ba0f1e2013-05-31 15:17:01 -05005840 return ret;
Alex Elder751cc0e2013-05-31 15:17:01 -05005841
Mike Christie0276dca2016-08-18 18:38:45 +02005842 if (force) {
5843 /*
5844 * Prevent new IO from being queued and wait for existing
5845 * IO to complete/fail.
5846 */
5847 blk_mq_freeze_queue(rbd_dev->disk->queue);
5848 blk_set_queue_dying(rbd_dev->disk->queue);
5849 }
5850
Ilya Dryomov5769ed02017-04-13 12:17:38 +02005851 del_gendisk(rbd_dev->disk);
5852 spin_lock(&rbd_dev_list_lock);
5853 list_del_init(&rbd_dev->node);
5854 spin_unlock(&rbd_dev_list_lock);
5855 device_del(&rbd_dev->dev);
Ilya Dryomovfca27062013-12-16 18:02:40 +02005856
Ilya Dryomove010dd02017-04-13 12:17:39 +02005857 rbd_dev_image_unlock(rbd_dev);
Ilya Dryomovdd5ac322015-10-16 17:09:24 +02005858 rbd_dev_device_release(rbd_dev);
Alex Elder8ad42cd2013-04-28 23:32:34 -05005859 rbd_dev_image_release(rbd_dev);
Ilya Dryomov8b679ec2017-04-13 12:17:37 +02005860 rbd_dev_destroy(rbd_dev);
Alex Elder1ba0f1e2013-05-31 15:17:01 -05005861 return count;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005862}
5863
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005864static ssize_t rbd_remove(struct bus_type *bus,
5865 const char *buf,
5866 size_t count)
5867{
5868 if (single_major)
5869 return -EINVAL;
5870
5871 return do_rbd_remove(bus, buf, count);
5872}
5873
5874static ssize_t rbd_remove_single_major(struct bus_type *bus,
5875 const char *buf,
5876 size_t count)
5877{
5878 return do_rbd_remove(bus, buf, count);
5879}
5880
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005881/*
5882 * create control files in sysfs
Yehuda Sadehdfc56062010-11-19 14:51:04 -08005883 * /sys/bus/rbd/...
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005884 */
5885static int rbd_sysfs_init(void)
5886{
Yehuda Sadehdfc56062010-11-19 14:51:04 -08005887 int ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005888
Alex Elderfed4c142012-02-07 12:03:36 -06005889 ret = device_register(&rbd_root_dev);
Alex Elder21079782012-01-24 10:08:36 -06005890 if (ret < 0)
Yehuda Sadehdfc56062010-11-19 14:51:04 -08005891 return ret;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005892
Alex Elderfed4c142012-02-07 12:03:36 -06005893 ret = bus_register(&rbd_bus_type);
5894 if (ret < 0)
5895 device_unregister(&rbd_root_dev);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005896
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005897 return ret;
5898}
5899
5900static void rbd_sysfs_cleanup(void)
5901{
Yehuda Sadehdfc56062010-11-19 14:51:04 -08005902 bus_unregister(&rbd_bus_type);
Alex Elderfed4c142012-02-07 12:03:36 -06005903 device_unregister(&rbd_root_dev);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005904}
5905
Alex Elder1c2a9df2013-05-01 12:43:03 -05005906static int rbd_slab_init(void)
5907{
5908 rbd_assert(!rbd_img_request_cache);
Geliang Tang03d94402016-03-13 15:17:32 +08005909 rbd_img_request_cache = KMEM_CACHE(rbd_img_request, 0);
Alex Elder868311b2013-05-01 12:43:03 -05005910 if (!rbd_img_request_cache)
5911 return -ENOMEM;
5912
5913 rbd_assert(!rbd_obj_request_cache);
Geliang Tang03d94402016-03-13 15:17:32 +08005914 rbd_obj_request_cache = KMEM_CACHE(rbd_obj_request, 0);
Alex Elder78c2a442013-05-01 12:43:04 -05005915 if (!rbd_obj_request_cache)
5916 goto out_err;
5917
Ilya Dryomov6c696d82017-01-25 18:16:23 +01005918 return 0;
Alex Elder1c2a9df2013-05-01 12:43:03 -05005919
Ilya Dryomov6c696d82017-01-25 18:16:23 +01005920out_err:
Alex Elder868311b2013-05-01 12:43:03 -05005921 kmem_cache_destroy(rbd_img_request_cache);
5922 rbd_img_request_cache = NULL;
Alex Elder1c2a9df2013-05-01 12:43:03 -05005923 return -ENOMEM;
5924}
5925
5926static void rbd_slab_exit(void)
5927{
Alex Elder868311b2013-05-01 12:43:03 -05005928 rbd_assert(rbd_obj_request_cache);
5929 kmem_cache_destroy(rbd_obj_request_cache);
5930 rbd_obj_request_cache = NULL;
5931
Alex Elder1c2a9df2013-05-01 12:43:03 -05005932 rbd_assert(rbd_img_request_cache);
5933 kmem_cache_destroy(rbd_img_request_cache);
5934 rbd_img_request_cache = NULL;
5935}
5936
Alex Eldercc344fa2013-02-19 12:25:56 -06005937static int __init rbd_init(void)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005938{
5939 int rc;
5940
Alex Elder1e32d342013-01-30 11:13:33 -06005941 if (!libceph_compatible(NULL)) {
5942 rbd_warn(NULL, "libceph incompatibility (quitting)");
Alex Elder1e32d342013-01-30 11:13:33 -06005943 return -EINVAL;
5944 }
Ilya Dryomove1b4d962013-12-13 15:28:57 +02005945
Alex Elder1c2a9df2013-05-01 12:43:03 -05005946 rc = rbd_slab_init();
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005947 if (rc)
5948 return rc;
Ilya Dryomove1b4d962013-12-13 15:28:57 +02005949
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005950 /*
5951 * The number of active work items is limited by the number of
Ilya Dryomovf77303b2015-04-22 18:28:13 +03005952 * rbd devices * queue depth, so leave @max_active at default.
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005953 */
5954 rbd_wq = alloc_workqueue(RBD_DRV_NAME, WQ_MEM_RECLAIM, 0);
5955 if (!rbd_wq) {
5956 rc = -ENOMEM;
5957 goto err_out_slab;
5958 }
5959
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005960 if (single_major) {
5961 rbd_major = register_blkdev(0, RBD_DRV_NAME);
5962 if (rbd_major < 0) {
5963 rc = rbd_major;
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005964 goto err_out_wq;
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005965 }
5966 }
5967
Alex Elder1c2a9df2013-05-01 12:43:03 -05005968 rc = rbd_sysfs_init();
5969 if (rc)
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005970 goto err_out_blkdev;
Alex Elder1c2a9df2013-05-01 12:43:03 -05005971
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005972 if (single_major)
5973 pr_info("loaded (major %d)\n", rbd_major);
5974 else
5975 pr_info("loaded\n");
5976
Ilya Dryomove1b4d962013-12-13 15:28:57 +02005977 return 0;
5978
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005979err_out_blkdev:
5980 if (single_major)
5981 unregister_blkdev(rbd_major, RBD_DRV_NAME);
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005982err_out_wq:
5983 destroy_workqueue(rbd_wq);
Ilya Dryomove1b4d962013-12-13 15:28:57 +02005984err_out_slab:
5985 rbd_slab_exit();
Alex Elder1c2a9df2013-05-01 12:43:03 -05005986 return rc;
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005987}
5988
Alex Eldercc344fa2013-02-19 12:25:56 -06005989static void __exit rbd_exit(void)
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005990{
Ilya Dryomovffe312c2014-05-20 15:46:04 +04005991 ida_destroy(&rbd_dev_id_ida);
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005992 rbd_sysfs_cleanup();
Ilya Dryomov9b60e702013-12-13 15:28:57 +02005993 if (single_major)
5994 unregister_blkdev(rbd_major, RBD_DRV_NAME);
Ilya Dryomovf5ee37b2014-10-09 17:06:01 +04005995 destroy_workqueue(rbd_wq);
Alex Elder1c2a9df2013-05-01 12:43:03 -05005996 rbd_slab_exit();
Yehuda Sadeh602adf42010-08-12 16:11:25 -07005997}
5998
5999module_init(rbd_init);
6000module_exit(rbd_exit);
6001
Alex Elderd552c612013-05-31 20:13:09 -05006002MODULE_AUTHOR("Alex Elder <elder@inktank.com>");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006003MODULE_AUTHOR("Sage Weil <sage@newdream.net>");
6004MODULE_AUTHOR("Yehuda Sadeh <yehuda@hq.newdream.net>");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006005/* following authorship retained from original osdblk.c */
6006MODULE_AUTHOR("Jeff Garzik <jeff@garzik.org>");
6007
Ilya Dryomov90da2582013-12-13 15:28:56 +02006008MODULE_DESCRIPTION("RADOS Block Device (RBD) driver");
Yehuda Sadeh602adf42010-08-12 16:11:25 -07006009MODULE_LICENSE("GPL");