blob: bd2b3bbbb22cf6fb1157845eafc3b2230375a4e3 [file] [log] [blame]
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001/******************************************************************************
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04002 *
3 * Back-end of the driver for virtual block devices. This portion of the
4 * driver exports a 'unified' block-device interface that can be accessed
5 * by any operating system that implements a compatible front end. A
6 * reference front-end implementation can be found in:
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -04007 * drivers/block/xen-blkfront.c
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04008 *
9 * Copyright (c) 2003-2004, Keir Fraser & Steve Hand
10 * Copyright (c) 2005, Christopher Clark
11 *
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License version 2
14 * as published by the Free Software Foundation; or, when distributed
15 * separately from the Linux kernel or incorporated into other
16 * software packages, subject to the following license:
17 *
18 * Permission is hereby granted, free of charge, to any person obtaining a copy
19 * of this source file (the "Software"), to deal in the Software without
20 * restriction, including without limitation the rights to use, copy, modify,
21 * merge, publish, distribute, sublicense, and/or sell copies of the Software,
22 * and to permit persons to whom the Software is furnished to do so, subject to
23 * the following conditions:
24 *
25 * The above copyright notice and this permission notice shall be included in
26 * all copies or substantial portions of the Software.
27 *
28 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
29 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
30 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
31 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
32 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
33 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
34 * IN THE SOFTWARE.
35 */
36
Tao Chen77387b82015-04-01 15:04:22 +000037#define pr_fmt(fmt) "xen-blkback: " fmt
38
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -040039#include <linux/spinlock.h>
40#include <linux/kthread.h>
41#include <linux/list.h>
42#include <linux/delay.h>
Jeremy Fitzhardinge88122932009-02-09 12:05:51 -080043#include <linux/freezer.h>
Roger Pau Monne0a8704a2012-10-24 18:58:45 +020044#include <linux/bitmap.h>
Jeremy Fitzhardingeafd91d02009-09-15 14:12:37 -070045
Jeremy Fitzhardinge88122932009-02-09 12:05:51 -080046#include <xen/events.h>
47#include <xen/page.h>
Stefano Stabellinie79affc2012-08-08 17:21:14 +000048#include <xen/xen.h>
Jeremy Fitzhardinge88122932009-02-09 12:05:51 -080049#include <asm/xen/hypervisor.h>
50#include <asm/xen/hypercall.h>
Roger Pau Monne087ffec2013-02-14 11:12:09 +010051#include <xen/balloon.h>
Jennifer Herbertc43cf3e2015-01-05 16:49:22 +000052#include <xen/grant_table.h>
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -040053#include "common.h"
54
55/*
Roger Pau Monnec6cc1422013-04-17 20:18:56 +020056 * Maximum number of unused free pages to keep in the internal buffer.
57 * Setting this to a value too low will reduce memory used in each backend,
58 * but can have a performance penalty.
59 *
60 * A sane value is xen_blkif_reqs * BLKIF_MAX_SEGMENTS_PER_REQUEST, but can
61 * be set to a lower value that might degrade performance on some intensive
62 * IO workloads.
63 */
64
Roger Pau Monne402b27f2013-04-18 16:06:54 +020065static int xen_blkif_max_buffer_pages = 1024;
Roger Pau Monnec6cc1422013-04-17 20:18:56 +020066module_param_named(max_buffer_pages, xen_blkif_max_buffer_pages, int, 0644);
67MODULE_PARM_DESC(max_buffer_pages,
68"Maximum number of free pages to keep in each block backend buffer");
69
Roger Pau Monne3f3aad52013-04-17 20:18:57 +020070/*
71 * Maximum number of grants to map persistently in blkback. For maximum
72 * performance this should be the total numbers of grants that can be used
73 * to fill the ring, but since this might become too high, specially with
74 * the use of indirect descriptors, we set it to a value that provides good
75 * performance without using too much memory.
76 *
77 * When the list of persistent grants is full we clean it up using a LRU
78 * algorithm.
79 */
80
Roger Pau Monne402b27f2013-04-18 16:06:54 +020081static int xen_blkif_max_pgrants = 1056;
Roger Pau Monne3f3aad52013-04-17 20:18:57 +020082module_param_named(max_persistent_grants, xen_blkif_max_pgrants, int, 0644);
83MODULE_PARM_DESC(max_persistent_grants,
84 "Maximum number of grants to map persistently");
85
86/*
87 * The LRU mechanism to clean the lists of persistent grants needs to
88 * be executed periodically. The time interval between consecutive executions
89 * of the purge mechanism is set in ms.
90 */
91#define LRU_INTERVAL 100
92
93/*
94 * When the persistent grants list is full we will remove unused grants
95 * from the list. The percent number of grants to be removed at each LRU
96 * execution.
97 */
98#define LRU_PERCENT_CLEAN 5
99
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400100/* Run-time switchable: /sys/module/blkback/parameters/ */
Konrad Rzeszutek Wilk2e9977c2011-04-14 17:42:07 -0400101static unsigned int log_stats;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400102module_param(log_stats, int, 0644);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400103
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400104#define BLKBACK_INVALID_HANDLE (~0)
105
David Vrabelff4b1562015-01-08 18:06:01 +0000106/* Number of free pages to remove on each call to gnttab_free_pages */
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200107#define NUM_BATCH_FREE_PAGES 10
108
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200109static inline int get_free_page(struct xen_blkif *blkif, struct page **page)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400110{
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200111 unsigned long flags;
112
113 spin_lock_irqsave(&blkif->free_pages_lock, flags);
114 if (list_empty(&blkif->free_pages)) {
115 BUG_ON(blkif->free_pages_num != 0);
116 spin_unlock_irqrestore(&blkif->free_pages_lock, flags);
David Vrabelff4b1562015-01-08 18:06:01 +0000117 return gnttab_alloc_pages(1, page);
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200118 }
119 BUG_ON(blkif->free_pages_num == 0);
120 page[0] = list_first_entry(&blkif->free_pages, struct page, lru);
121 list_del(&page[0]->lru);
122 blkif->free_pages_num--;
123 spin_unlock_irqrestore(&blkif->free_pages_lock, flags);
124
125 return 0;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400126}
127
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200128static inline void put_free_pages(struct xen_blkif *blkif, struct page **page,
129 int num)
130{
131 unsigned long flags;
132 int i;
133
134 spin_lock_irqsave(&blkif->free_pages_lock, flags);
135 for (i = 0; i < num; i++)
136 list_add(&page[i]->lru, &blkif->free_pages);
137 blkif->free_pages_num += num;
138 spin_unlock_irqrestore(&blkif->free_pages_lock, flags);
139}
140
141static inline void shrink_free_pagepool(struct xen_blkif *blkif, int num)
142{
143 /* Remove requested pages in batches of NUM_BATCH_FREE_PAGES */
144 struct page *page[NUM_BATCH_FREE_PAGES];
145 unsigned int num_pages = 0;
146 unsigned long flags;
147
148 spin_lock_irqsave(&blkif->free_pages_lock, flags);
149 while (blkif->free_pages_num > num) {
150 BUG_ON(list_empty(&blkif->free_pages));
151 page[num_pages] = list_first_entry(&blkif->free_pages,
152 struct page, lru);
153 list_del(&page[num_pages]->lru);
154 blkif->free_pages_num--;
155 if (++num_pages == NUM_BATCH_FREE_PAGES) {
156 spin_unlock_irqrestore(&blkif->free_pages_lock, flags);
David Vrabelff4b1562015-01-08 18:06:01 +0000157 gnttab_free_pages(num_pages, page);
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200158 spin_lock_irqsave(&blkif->free_pages_lock, flags);
159 num_pages = 0;
160 }
161 }
162 spin_unlock_irqrestore(&blkif->free_pages_lock, flags);
163 if (num_pages != 0)
David Vrabelff4b1562015-01-08 18:06:01 +0000164 gnttab_free_pages(num_pages, page);
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200165}
166
167#define vaddr(page) ((unsigned long)pfn_to_kaddr(page_to_pfn(page)))
168
Konrad Rzeszutek Wilk30fd1502011-05-12 16:47:48 -0400169static int do_block_io_op(struct xen_blkif *blkif);
170static int dispatch_rw_block_io(struct xen_blkif *blkif,
Konrad Rzeszutek Wilkfc53bf72011-05-05 13:37:23 -0400171 struct blkif_request *req,
172 struct pending_req *pending_req);
Konrad Rzeszutek Wilk30fd1502011-05-12 16:47:48 -0400173static void make_response(struct xen_blkif *blkif, u64 id,
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400174 unsigned short op, int st);
175
Roger Pau Monne7dc34112012-12-04 15:21:52 +0100176#define foreach_grant_safe(pos, n, rbtree, node) \
177 for ((pos) = container_of(rb_first((rbtree)), typeof(*(pos)), node), \
Roger Pau Monne217fd5e2013-03-18 17:49:33 +0100178 (n) = (&(pos)->node != NULL) ? rb_next(&(pos)->node) : NULL; \
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200179 &(pos)->node != NULL; \
Roger Pau Monne7dc34112012-12-04 15:21:52 +0100180 (pos) = container_of(n, typeof(*(pos)), node), \
181 (n) = (&(pos)->node != NULL) ? rb_next(&(pos)->node) : NULL)
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200182
183
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200184/*
185 * We don't need locking around the persistent grant helpers
186 * because blkback uses a single-thread for each backed, so we
187 * can be sure that this functions will never be called recursively.
188 *
189 * The only exception to that is put_persistent_grant, that can be called
190 * from interrupt context (by xen_blkbk_unmap), so we have to use atomic
191 * bit operations to modify the flags of a persistent grant and to count
192 * the number of used grants.
193 */
194static int add_persistent_gnt(struct xen_blkif *blkif,
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200195 struct persistent_gnt *persistent_gnt)
196{
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200197 struct rb_node **new = NULL, *parent = NULL;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200198 struct persistent_gnt *this;
199
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200200 if (blkif->persistent_gnt_c >= xen_blkif_max_pgrants) {
201 if (!blkif->vbd.overflow_max_grants)
202 blkif->vbd.overflow_max_grants = 1;
203 return -EBUSY;
204 }
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200205 /* Figure out where to put new node */
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200206 new = &blkif->persistent_gnts.rb_node;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200207 while (*new) {
208 this = container_of(*new, struct persistent_gnt, node);
209
210 parent = *new;
211 if (persistent_gnt->gnt < this->gnt)
212 new = &((*new)->rb_left);
213 else if (persistent_gnt->gnt > this->gnt)
214 new = &((*new)->rb_right);
215 else {
Tao Chen77387b82015-04-01 15:04:22 +0000216 pr_alert_ratelimited("trying to add a gref that's already in the tree\n");
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200217 return -EINVAL;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200218 }
219 }
220
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200221 bitmap_zero(persistent_gnt->flags, PERSISTENT_GNT_FLAGS_SIZE);
222 set_bit(PERSISTENT_GNT_ACTIVE, persistent_gnt->flags);
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200223 /* Add new node and rebalance tree. */
224 rb_link_node(&(persistent_gnt->node), parent, new);
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200225 rb_insert_color(&(persistent_gnt->node), &blkif->persistent_gnts);
226 blkif->persistent_gnt_c++;
227 atomic_inc(&blkif->persistent_gnt_in_use);
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200228 return 0;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200229}
230
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200231static struct persistent_gnt *get_persistent_gnt(struct xen_blkif *blkif,
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200232 grant_ref_t gref)
233{
234 struct persistent_gnt *data;
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200235 struct rb_node *node = NULL;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200236
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200237 node = blkif->persistent_gnts.rb_node;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200238 while (node) {
239 data = container_of(node, struct persistent_gnt, node);
240
241 if (gref < data->gnt)
242 node = node->rb_left;
243 else if (gref > data->gnt)
244 node = node->rb_right;
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200245 else {
246 if(test_bit(PERSISTENT_GNT_ACTIVE, data->flags)) {
Tao Chen77387b82015-04-01 15:04:22 +0000247 pr_alert_ratelimited("requesting a grant already in use\n");
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200248 return NULL;
249 }
250 set_bit(PERSISTENT_GNT_ACTIVE, data->flags);
251 atomic_inc(&blkif->persistent_gnt_in_use);
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200252 return data;
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200253 }
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200254 }
255 return NULL;
256}
257
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200258static void put_persistent_gnt(struct xen_blkif *blkif,
259 struct persistent_gnt *persistent_gnt)
260{
261 if(!test_bit(PERSISTENT_GNT_ACTIVE, persistent_gnt->flags))
Tao Chen77387b82015-04-01 15:04:22 +0000262 pr_alert_ratelimited("freeing a grant already unused\n");
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200263 set_bit(PERSISTENT_GNT_WAS_ACTIVE, persistent_gnt->flags);
264 clear_bit(PERSISTENT_GNT_ACTIVE, persistent_gnt->flags);
265 atomic_dec(&blkif->persistent_gnt_in_use);
266}
267
Jennifer Herbertc43cf3e2015-01-05 16:49:22 +0000268static void free_persistent_gnts_unmap_callback(int result,
269 struct gntab_unmap_queue_data *data)
270{
271 struct completion *c = data->data;
272
273 /* BUG_ON used to reproduce existing behaviour,
274 but is this the best way to deal with this? */
275 BUG_ON(result);
276 complete(c);
277}
278
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200279static void free_persistent_gnts(struct xen_blkif *blkif, struct rb_root *root,
280 unsigned int num)
Roger Pau Monne4d4f2702012-11-16 19:26:48 +0100281{
282 struct gnttab_unmap_grant_ref unmap[BLKIF_MAX_SEGMENTS_PER_REQUEST];
283 struct page *pages[BLKIF_MAX_SEGMENTS_PER_REQUEST];
284 struct persistent_gnt *persistent_gnt;
Roger Pau Monne7dc34112012-12-04 15:21:52 +0100285 struct rb_node *n;
Roger Pau Monne4d4f2702012-11-16 19:26:48 +0100286 int segs_to_unmap = 0;
Jennifer Herbertc43cf3e2015-01-05 16:49:22 +0000287 struct gntab_unmap_queue_data unmap_data;
288 struct completion unmap_completion;
289
290 init_completion(&unmap_completion);
291
292 unmap_data.data = &unmap_completion;
293 unmap_data.done = &free_persistent_gnts_unmap_callback;
294 unmap_data.pages = pages;
295 unmap_data.unmap_ops = unmap;
296 unmap_data.kunmap_ops = NULL;
Roger Pau Monne4d4f2702012-11-16 19:26:48 +0100297
Roger Pau Monne7dc34112012-12-04 15:21:52 +0100298 foreach_grant_safe(persistent_gnt, n, root, node) {
Roger Pau Monne4d4f2702012-11-16 19:26:48 +0100299 BUG_ON(persistent_gnt->handle ==
300 BLKBACK_INVALID_HANDLE);
301 gnttab_set_unmap_op(&unmap[segs_to_unmap],
302 (unsigned long) pfn_to_kaddr(page_to_pfn(
303 persistent_gnt->page)),
304 GNTMAP_host_map,
305 persistent_gnt->handle);
306
307 pages[segs_to_unmap] = persistent_gnt->page;
Roger Pau Monne4d4f2702012-11-16 19:26:48 +0100308
309 if (++segs_to_unmap == BLKIF_MAX_SEGMENTS_PER_REQUEST ||
310 !rb_next(&persistent_gnt->node)) {
Jennifer Herbertc43cf3e2015-01-05 16:49:22 +0000311
312 unmap_data.count = segs_to_unmap;
313 gnttab_unmap_refs_async(&unmap_data);
314 wait_for_completion(&unmap_completion);
315
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200316 put_free_pages(blkif, pages, segs_to_unmap);
Roger Pau Monne4d4f2702012-11-16 19:26:48 +0100317 segs_to_unmap = 0;
318 }
Roger Pau Monne7dc34112012-12-04 15:21:52 +0100319
320 rb_erase(&persistent_gnt->node, root);
321 kfree(persistent_gnt);
322 num--;
Roger Pau Monne4d4f2702012-11-16 19:26:48 +0100323 }
324 BUG_ON(num != 0);
325}
326
Roger Pau Monneabb97b82014-02-11 20:34:03 -0700327void xen_blkbk_unmap_purged_grants(struct work_struct *work)
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200328{
329 struct gnttab_unmap_grant_ref unmap[BLKIF_MAX_SEGMENTS_PER_REQUEST];
330 struct page *pages[BLKIF_MAX_SEGMENTS_PER_REQUEST];
331 struct persistent_gnt *persistent_gnt;
332 int ret, segs_to_unmap = 0;
333 struct xen_blkif *blkif = container_of(work, typeof(*blkif), persistent_purge_work);
334
335 while(!list_empty(&blkif->persistent_purge_list)) {
336 persistent_gnt = list_first_entry(&blkif->persistent_purge_list,
337 struct persistent_gnt,
338 remove_node);
339 list_del(&persistent_gnt->remove_node);
340
341 gnttab_set_unmap_op(&unmap[segs_to_unmap],
342 vaddr(persistent_gnt->page),
343 GNTMAP_host_map,
344 persistent_gnt->handle);
345
346 pages[segs_to_unmap] = persistent_gnt->page;
347
348 if (++segs_to_unmap == BLKIF_MAX_SEGMENTS_PER_REQUEST) {
349 ret = gnttab_unmap_refs(unmap, NULL, pages,
350 segs_to_unmap);
351 BUG_ON(ret);
352 put_free_pages(blkif, pages, segs_to_unmap);
353 segs_to_unmap = 0;
354 }
355 kfree(persistent_gnt);
356 }
357 if (segs_to_unmap > 0) {
358 ret = gnttab_unmap_refs(unmap, NULL, pages, segs_to_unmap);
359 BUG_ON(ret);
360 put_free_pages(blkif, pages, segs_to_unmap);
361 }
362}
363
364static void purge_persistent_gnt(struct xen_blkif *blkif)
365{
366 struct persistent_gnt *persistent_gnt;
367 struct rb_node *n;
368 unsigned int num_clean, total;
Roger Pau Monne2d910542013-06-21 12:56:53 +0200369 bool scan_used = false, clean_used = false;
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200370 struct rb_root *root;
371
372 if (blkif->persistent_gnt_c < xen_blkif_max_pgrants ||
373 (blkif->persistent_gnt_c == xen_blkif_max_pgrants &&
374 !blkif->vbd.overflow_max_grants)) {
375 return;
376 }
377
378 if (work_pending(&blkif->persistent_purge_work)) {
Tao Chen77387b82015-04-01 15:04:22 +0000379 pr_alert_ratelimited("Scheduled work from previous purge is still pending, cannot purge list\n");
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200380 return;
381 }
382
383 num_clean = (xen_blkif_max_pgrants / 100) * LRU_PERCENT_CLEAN;
384 num_clean = blkif->persistent_gnt_c - xen_blkif_max_pgrants + num_clean;
385 num_clean = min(blkif->persistent_gnt_c, num_clean);
Roger Pau Monne2d910542013-06-21 12:56:53 +0200386 if ((num_clean == 0) ||
387 (num_clean > (blkif->persistent_gnt_c - atomic_read(&blkif->persistent_gnt_in_use))))
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200388 return;
389
390 /*
391 * At this point, we can assure that there will be no calls
392 * to get_persistent_grant (because we are executing this code from
393 * xen_blkif_schedule), there can only be calls to put_persistent_gnt,
394 * which means that the number of currently used grants will go down,
395 * but never up, so we will always be able to remove the requested
396 * number of grants.
397 */
398
399 total = num_clean;
400
Tao Chen77387b82015-04-01 15:04:22 +0000401 pr_debug("Going to purge %u persistent grants\n", num_clean);
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200402
Roger Pau Monneef753412014-02-04 11:26:13 +0100403 BUG_ON(!list_empty(&blkif->persistent_purge_list));
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200404 root = &blkif->persistent_gnts;
405purge_list:
406 foreach_grant_safe(persistent_gnt, n, root, node) {
407 BUG_ON(persistent_gnt->handle ==
408 BLKBACK_INVALID_HANDLE);
409
Roger Pau Monne2d910542013-06-21 12:56:53 +0200410 if (clean_used) {
411 clear_bit(PERSISTENT_GNT_WAS_ACTIVE, persistent_gnt->flags);
412 continue;
413 }
414
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200415 if (test_bit(PERSISTENT_GNT_ACTIVE, persistent_gnt->flags))
416 continue;
417 if (!scan_used &&
418 (test_bit(PERSISTENT_GNT_WAS_ACTIVE, persistent_gnt->flags)))
419 continue;
420
421 rb_erase(&persistent_gnt->node, root);
422 list_add(&persistent_gnt->remove_node,
423 &blkif->persistent_purge_list);
424 if (--num_clean == 0)
425 goto finished;
426 }
427 /*
428 * If we get here it means we also need to start cleaning
429 * grants that were used since last purge in order to cope
430 * with the requested num
431 */
Roger Pau Monne2d910542013-06-21 12:56:53 +0200432 if (!scan_used && !clean_used) {
Tao Chen77387b82015-04-01 15:04:22 +0000433 pr_debug("Still missing %u purged frames\n", num_clean);
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200434 scan_used = true;
435 goto purge_list;
436 }
437finished:
Roger Pau Monne2d910542013-06-21 12:56:53 +0200438 if (!clean_used) {
Tao Chen77387b82015-04-01 15:04:22 +0000439 pr_debug("Finished scanning for grants to clean, removing used flag\n");
Roger Pau Monne2d910542013-06-21 12:56:53 +0200440 clean_used = true;
441 goto purge_list;
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200442 }
Roger Pau Monne2d910542013-06-21 12:56:53 +0200443
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200444 blkif->persistent_gnt_c -= (total - num_clean);
445 blkif->vbd.overflow_max_grants = 0;
446
447 /* We can defer this work */
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200448 schedule_work(&blkif->persistent_purge_work);
Tao Chen77387b82015-04-01 15:04:22 +0000449 pr_debug("Purged %u/%u\n", (total - num_clean), total);
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200450 return;
451}
452
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -0400453/*
454 * Retrieve from the 'pending_reqs' a free pending_req structure to be used.
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400455 */
Roger Pau Monnebf0720c2013-04-17 20:18:59 +0200456static struct pending_req *alloc_req(struct xen_blkif *blkif)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400457{
Konrad Rzeszutek Wilk2e9977c2011-04-14 17:42:07 -0400458 struct pending_req *req = NULL;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400459 unsigned long flags;
460
Roger Pau Monnebf0720c2013-04-17 20:18:59 +0200461 spin_lock_irqsave(&blkif->pending_free_lock, flags);
462 if (!list_empty(&blkif->pending_free)) {
463 req = list_entry(blkif->pending_free.next, struct pending_req,
Konrad Rzeszutek Wilk2e9977c2011-04-14 17:42:07 -0400464 free_list);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400465 list_del(&req->free_list);
466 }
Roger Pau Monnebf0720c2013-04-17 20:18:59 +0200467 spin_unlock_irqrestore(&blkif->pending_free_lock, flags);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400468 return req;
469}
470
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -0400471/*
472 * Return the 'pending_req' structure back to the freepool. We also
473 * wake up the thread if it was waiting for a free page.
474 */
Roger Pau Monnebf0720c2013-04-17 20:18:59 +0200475static void free_req(struct xen_blkif *blkif, struct pending_req *req)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400476{
477 unsigned long flags;
478 int was_empty;
479
Roger Pau Monnebf0720c2013-04-17 20:18:59 +0200480 spin_lock_irqsave(&blkif->pending_free_lock, flags);
481 was_empty = list_empty(&blkif->pending_free);
482 list_add(&req->free_list, &blkif->pending_free);
483 spin_unlock_irqrestore(&blkif->pending_free_lock, flags);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400484 if (was_empty)
Roger Pau Monnebf0720c2013-04-17 20:18:59 +0200485 wake_up(&blkif->pending_free_wq);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400486}
487
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -0400488/*
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400489 * Routines for managing virtual block devices (vbds).
490 */
Konrad Rzeszutek Wilk3d814732011-05-12 16:53:56 -0400491static int xen_vbd_translate(struct phys_req *req, struct xen_blkif *blkif,
492 int operation)
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400493{
Konrad Rzeszutek Wilk3d814732011-05-12 16:53:56 -0400494 struct xen_vbd *vbd = &blkif->vbd;
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400495 int rc = -EACCES;
496
497 if ((operation != READ) && vbd->readonly)
498 goto out;
499
Jan Beulich8ab52152011-05-17 11:07:05 +0100500 if (likely(req->nr_sects)) {
501 blkif_sector_t end = req->sector_number + req->nr_sects;
502
503 if (unlikely(end < req->sector_number))
504 goto out;
505 if (unlikely(end > vbd_sz(vbd)))
506 goto out;
507 }
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400508
509 req->dev = vbd->pdevice;
510 req->bdev = vbd->bdev;
511 rc = 0;
512
513 out:
514 return rc;
515}
516
Konrad Rzeszutek Wilk3d814732011-05-12 16:53:56 -0400517static void xen_vbd_resize(struct xen_blkif *blkif)
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400518{
Konrad Rzeszutek Wilk3d814732011-05-12 16:53:56 -0400519 struct xen_vbd *vbd = &blkif->vbd;
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400520 struct xenbus_transaction xbt;
521 int err;
Konrad Rzeszutek Wilk8b6bf742011-04-20 11:50:43 -0400522 struct xenbus_device *dev = xen_blkbk_xenbus(blkif->be);
Konrad Rzeszutek Wilk42c78412011-04-20 11:21:43 -0400523 unsigned long long new_size = vbd_sz(vbd);
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400524
Tao Chen77387b82015-04-01 15:04:22 +0000525 pr_info("VBD Resize: Domid: %d, Device: (%d, %d)\n",
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400526 blkif->domid, MAJOR(vbd->pdevice), MINOR(vbd->pdevice));
Tao Chen77387b82015-04-01 15:04:22 +0000527 pr_info("VBD Resize: new size %llu\n", new_size);
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400528 vbd->size = new_size;
529again:
530 err = xenbus_transaction_start(&xbt);
531 if (err) {
Tao Chen77387b82015-04-01 15:04:22 +0000532 pr_warn("Error starting transaction\n");
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400533 return;
534 }
535 err = xenbus_printf(xbt, dev->nodename, "sectors", "%llu",
Konrad Rzeszutek Wilk42c78412011-04-20 11:21:43 -0400536 (unsigned long long)vbd_sz(vbd));
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400537 if (err) {
Tao Chen77387b82015-04-01 15:04:22 +0000538 pr_warn("Error writing new size\n");
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400539 goto abort;
540 }
541 /*
542 * Write the current state; we will use this to synchronize
543 * the front-end. If the current state is "connected" the
544 * front-end will get the new size information online.
545 */
546 err = xenbus_printf(xbt, dev->nodename, "state", "%d", dev->state);
547 if (err) {
Tao Chen77387b82015-04-01 15:04:22 +0000548 pr_warn("Error writing the state\n");
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400549 goto abort;
550 }
551
552 err = xenbus_transaction_end(xbt, 0);
553 if (err == -EAGAIN)
554 goto again;
555 if (err)
Tao Chen77387b82015-04-01 15:04:22 +0000556 pr_warn("Error ending transaction\n");
Laszlo Ersek496b3182011-05-13 09:45:40 -0400557 return;
Konrad Rzeszutek Wilkee9ff852011-04-20 10:57:29 -0400558abort:
559 xenbus_transaction_end(xbt, 1);
560}
561
562/*
Konrad Rzeszutek Wilkb0aef172011-04-15 10:58:05 -0400563 * Notification from the guest OS.
564 */
Konrad Rzeszutek Wilk30fd1502011-05-12 16:47:48 -0400565static void blkif_notify_work(struct xen_blkif *blkif)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400566{
Konrad Rzeszutek Wilkb0aef172011-04-15 10:58:05 -0400567 blkif->waiting_reqs = 1;
568 wake_up(&blkif->wq);
569}
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400570
Konrad Rzeszutek Wilk8b6bf742011-04-20 11:50:43 -0400571irqreturn_t xen_blkif_be_int(int irq, void *dev_id)
Konrad Rzeszutek Wilkb0aef172011-04-15 10:58:05 -0400572{
573 blkif_notify_work(dev_id);
574 return IRQ_HANDLED;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400575}
576
Konrad Rzeszutek Wilk2e9977c2011-04-14 17:42:07 -0400577/*
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400578 * SCHEDULER FUNCTIONS
579 */
580
Konrad Rzeszutek Wilk30fd1502011-05-12 16:47:48 -0400581static void print_stats(struct xen_blkif *blkif)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400582{
Tao Chen77387b82015-04-01 15:04:22 +0000583 pr_info("(%s): oo %3llu | rd %4llu | wr %4llu | f %4llu"
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200584 " | ds %4llu | pg: %4u/%4d\n",
Konrad Rzeszutek Wilkebe81902011-05-12 16:42:31 -0400585 current->comm, blkif->st_oo_req,
Li Dongyangb3cb0d62011-09-01 18:39:10 +0800586 blkif->st_rd_req, blkif->st_wr_req,
Roger Pau Monnec1a15d02013-04-17 20:18:55 +0200587 blkif->st_f_req, blkif->st_ds_req,
588 blkif->persistent_gnt_c,
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200589 xen_blkif_max_pgrants);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400590 blkif->st_print = jiffies + msecs_to_jiffies(10 * 1000);
591 blkif->st_rd_req = 0;
592 blkif->st_wr_req = 0;
593 blkif->st_oo_req = 0;
Li Dongyangb3cb0d62011-09-01 18:39:10 +0800594 blkif->st_ds_req = 0;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400595}
596
Konrad Rzeszutek Wilk8b6bf742011-04-20 11:50:43 -0400597int xen_blkif_schedule(void *arg)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400598{
Konrad Rzeszutek Wilk30fd1502011-05-12 16:47:48 -0400599 struct xen_blkif *blkif = arg;
Konrad Rzeszutek Wilk3d814732011-05-12 16:53:56 -0400600 struct xen_vbd *vbd = &blkif->vbd;
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200601 unsigned long timeout;
Konrad Rzeszutek Wilk8e3f8752013-01-23 16:54:32 -0500602 int ret;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400603
Konrad Rzeszutek Wilk8b6bf742011-04-20 11:50:43 -0400604 xen_blkif_get(blkif);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400605
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400606 while (!kthread_should_stop()) {
607 if (try_to_freeze())
608 continue;
Konrad Rzeszutek Wilk42c78412011-04-20 11:21:43 -0400609 if (unlikely(vbd->size != vbd_sz(vbd)))
Konrad Rzeszutek Wilk3d814732011-05-12 16:53:56 -0400610 xen_vbd_resize(blkif);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400611
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200612 timeout = msecs_to_jiffies(LRU_INTERVAL);
613
614 timeout = wait_event_interruptible_timeout(
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400615 blkif->wq,
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200616 blkif->waiting_reqs || kthread_should_stop(),
617 timeout);
618 if (timeout == 0)
619 goto purge_gnt_list;
620 timeout = wait_event_interruptible_timeout(
Roger Pau Monnebf0720c2013-04-17 20:18:59 +0200621 blkif->pending_free_wq,
622 !list_empty(&blkif->pending_free) ||
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200623 kthread_should_stop(),
624 timeout);
625 if (timeout == 0)
626 goto purge_gnt_list;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400627
628 blkif->waiting_reqs = 0;
629 smp_mb(); /* clear flag *before* checking for work */
630
Konrad Rzeszutek Wilk8e3f8752013-01-23 16:54:32 -0500631 ret = do_block_io_op(blkif);
632 if (ret > 0)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400633 blkif->waiting_reqs = 1;
Konrad Rzeszutek Wilk8e3f8752013-01-23 16:54:32 -0500634 if (ret == -EACCES)
635 wait_event_interruptible(blkif->shutdown_wq,
636 kthread_should_stop());
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400637
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200638purge_gnt_list:
639 if (blkif->vbd.feature_gnt_persistent &&
640 time_after(jiffies, blkif->next_lru)) {
641 purge_persistent_gnt(blkif);
642 blkif->next_lru = jiffies + msecs_to_jiffies(LRU_INTERVAL);
643 }
644
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200645 /* Shrink if we have more than xen_blkif_max_buffer_pages */
646 shrink_free_pagepool(blkif, xen_blkif_max_buffer_pages);
647
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400648 if (log_stats && time_after(jiffies, blkif->st_print))
649 print_stats(blkif);
650 }
651
Roger Pau Monneef753412014-02-04 11:26:13 +0100652 /* Drain pending purge work */
653 flush_work(&blkif->persistent_purge_work);
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200654
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400655 if (log_stats)
656 print_stats(blkif);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400657
658 blkif->xenblkd = NULL;
Konrad Rzeszutek Wilk8b6bf742011-04-20 11:50:43 -0400659 xen_blkif_put(blkif);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400660
661 return 0;
662}
663
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -0400664/*
Roger Pau Monneef753412014-02-04 11:26:13 +0100665 * Remove persistent grants and empty the pool of free pages
666 */
667void xen_blkbk_free_caches(struct xen_blkif *blkif)
668{
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400669 /* Free all persistent grant pages */
670 if (!RB_EMPTY_ROOT(&blkif->persistent_gnts))
671 free_persistent_gnts(blkif, &blkif->persistent_gnts,
672 blkif->persistent_gnt_c);
673
674 BUG_ON(!RB_EMPTY_ROOT(&blkif->persistent_gnts));
675 blkif->persistent_gnt_c = 0;
676
Matt Rushton2ed22e32014-02-04 11:26:12 +0100677 /* Since we are shutting down remove all pages from the buffer */
678 shrink_free_pagepool(blkif, 0 /* All */);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -0400679}
680
Jennifer Herbertc43cf3e2015-01-05 16:49:22 +0000681static unsigned int xen_blkbk_unmap_prepare(
682 struct xen_blkif *blkif,
683 struct grant_page **pages,
684 unsigned int num,
685 struct gnttab_unmap_grant_ref *unmap_ops,
686 struct page **unmap_pages)
Konrad Rzeszutek Wilkb0aef172011-04-15 10:58:05 -0400687{
Konrad Rzeszutek Wilkb0aef172011-04-15 10:58:05 -0400688 unsigned int i, invcount = 0;
Konrad Rzeszutek Wilkb0aef172011-04-15 10:58:05 -0400689
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200690 for (i = 0; i < num; i++) {
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200691 if (pages[i]->persistent_gnt != NULL) {
692 put_persistent_gnt(blkif, pages[i]->persistent_gnt);
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200693 continue;
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200694 }
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200695 if (pages[i]->handle == BLKBACK_INVALID_HANDLE)
Konrad Rzeszutek Wilkb0aef172011-04-15 10:58:05 -0400696 continue;
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200697 unmap_pages[invcount] = pages[i]->page;
Jennifer Herbertc43cf3e2015-01-05 16:49:22 +0000698 gnttab_set_unmap_op(&unmap_ops[invcount], vaddr(pages[i]->page),
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200699 GNTMAP_host_map, pages[i]->handle);
700 pages[i]->handle = BLKBACK_INVALID_HANDLE;
Jennifer Herbertc43cf3e2015-01-05 16:49:22 +0000701 invcount++;
702 }
703
704 return invcount;
705}
706
707static void xen_blkbk_unmap_and_respond_callback(int result, struct gntab_unmap_queue_data *data)
708{
709 struct pending_req* pending_req = (struct pending_req*) (data->data);
710 struct xen_blkif *blkif = pending_req->blkif;
711
712 /* BUG_ON used to reproduce existing behaviour,
713 but is this the best way to deal with this? */
714 BUG_ON(result);
715
716 put_free_pages(blkif, data->pages, data->count);
717 make_response(blkif, pending_req->id,
718 pending_req->operation, pending_req->status);
719 free_req(blkif, pending_req);
720 /*
721 * Make sure the request is freed before releasing blkif,
722 * or there could be a race between free_req and the
723 * cleanup done in xen_blkif_free during shutdown.
724 *
725 * NB: The fact that we might try to wake up pending_free_wq
726 * before drain_complete (in case there's a drain going on)
727 * it's not a problem with our current implementation
728 * because we can assure there's no thread waiting on
729 * pending_free_wq if there's a drain going on, but it has
730 * to be taken into account if the current model is changed.
731 */
732 if (atomic_dec_and_test(&blkif->inflight) && atomic_read(&blkif->drain)) {
733 complete(&blkif->drain_complete);
734 }
735 xen_blkif_put(blkif);
736}
737
738static void xen_blkbk_unmap_and_respond(struct pending_req *req)
739{
740 struct gntab_unmap_queue_data* work = &req->gnttab_unmap_data;
741 struct xen_blkif *blkif = req->blkif;
742 struct grant_page **pages = req->segments;
743 unsigned int invcount;
744
745 invcount = xen_blkbk_unmap_prepare(blkif, pages, req->nr_pages,
746 req->unmap, req->unmap_pages);
747
748 work->data = req;
749 work->done = xen_blkbk_unmap_and_respond_callback;
750 work->unmap_ops = req->unmap;
751 work->kunmap_ops = NULL;
752 work->pages = req->unmap_pages;
753 work->count = invcount;
754
755 gnttab_unmap_refs_async(&req->gnttab_unmap_data);
756}
757
758
759/*
760 * Unmap the grant references.
761 *
762 * This could accumulate ops up to the batch size to reduce the number
763 * of hypercalls, but since this is only used in error paths there's
764 * no real need.
765 */
766static void xen_blkbk_unmap(struct xen_blkif *blkif,
767 struct grant_page *pages[],
768 int num)
769{
770 struct gnttab_unmap_grant_ref unmap[BLKIF_MAX_SEGMENTS_PER_REQUEST];
771 struct page *unmap_pages[BLKIF_MAX_SEGMENTS_PER_REQUEST];
772 unsigned int invcount = 0;
773 int ret;
774
775 while (num) {
776 unsigned int batch = min(num, BLKIF_MAX_SEGMENTS_PER_REQUEST);
777
778 invcount = xen_blkbk_unmap_prepare(blkif, pages, batch,
779 unmap, unmap_pages);
780 if (invcount) {
781 ret = gnttab_unmap_refs(unmap, NULL, unmap_pages, invcount);
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200782 BUG_ON(ret);
783 put_free_pages(blkif, unmap_pages, invcount);
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200784 }
Jennifer Herbertc43cf3e2015-01-05 16:49:22 +0000785 pages += batch;
786 num -= batch;
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200787 }
Konrad Rzeszutek Wilkb0aef172011-04-15 10:58:05 -0400788}
Konrad Rzeszutek Wilk01f37f22011-05-11 15:57:09 -0400789
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200790static int xen_blkbk_map(struct xen_blkif *blkif,
791 struct grant_page *pages[],
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200792 int num, bool ro)
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -0400793{
794 struct gnttab_map_grant_ref map[BLKIF_MAX_SEGMENTS_PER_REQUEST];
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200795 struct page *pages_to_gnt[BLKIF_MAX_SEGMENTS_PER_REQUEST];
796 struct persistent_gnt *persistent_gnt = NULL;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200797 phys_addr_t addr = 0;
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200798 int i, seg_idx, new_map_idx;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200799 int segs_to_map = 0;
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -0400800 int ret = 0;
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200801 int last_map = 0, map_until = 0;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200802 int use_persistent_gnts;
803
804 use_persistent_gnts = (blkif->vbd.feature_gnt_persistent);
805
Konrad Rzeszutek Wilk01f37f22011-05-11 15:57:09 -0400806 /*
807 * Fill out preq.nr_sects with proper amount of sectors, and setup
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -0400808 * assign map[..] with the PFN of the page in our domain with the
809 * corresponding grant reference for each page.
810 */
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200811again:
812 for (i = map_until; i < num; i++) {
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -0400813 uint32_t flags;
814
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200815 if (use_persistent_gnts)
816 persistent_gnt = get_persistent_gnt(
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200817 blkif,
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200818 pages[i]->gref);
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200819
820 if (persistent_gnt) {
821 /*
822 * We are using persistent grants and
823 * the grant is already mapped
824 */
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200825 pages[i]->page = persistent_gnt->page;
826 pages[i]->persistent_gnt = persistent_gnt;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200827 } else {
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200828 if (get_free_page(blkif, &pages[i]->page))
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200829 goto out_of_memory;
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200830 addr = vaddr(pages[i]->page);
831 pages_to_gnt[segs_to_map] = pages[i]->page;
832 pages[i]->persistent_gnt = NULL;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200833 flags = GNTMAP_host_map;
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200834 if (!use_persistent_gnts && ro)
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200835 flags |= GNTMAP_readonly;
836 gnttab_set_map_op(&map[segs_to_map++], addr,
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200837 flags, pages[i]->gref,
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200838 blkif->domid);
839 }
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200840 map_until = i + 1;
841 if (segs_to_map == BLKIF_MAX_SEGMENTS_PER_REQUEST)
842 break;
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -0400843 }
844
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200845 if (segs_to_map) {
846 ret = gnttab_map_refs(map, NULL, pages_to_gnt, segs_to_map);
847 BUG_ON(ret);
848 }
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -0400849
Konrad Rzeszutek Wilk01f37f22011-05-11 15:57:09 -0400850 /*
851 * Now swizzle the MFN in our domain with the MFN from the other domain
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -0400852 * so that when we access vaddr(pending_req,i) it has the contents of
853 * the page from the other domain.
854 */
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200855 for (seg_idx = last_map, new_map_idx = 0; seg_idx < map_until; seg_idx++) {
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200856 if (!pages[seg_idx]->persistent_gnt) {
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200857 /* This is a newly mapped grant */
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200858 BUG_ON(new_map_idx >= segs_to_map);
859 if (unlikely(map[new_map_idx].status != 0)) {
Tao Chen77387b82015-04-01 15:04:22 +0000860 pr_debug("invalid buffer -- could not remap it\n");
Roger Pau Monné61cecca2014-09-15 11:55:27 +0200861 put_free_pages(blkif, &pages[seg_idx]->page, 1);
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200862 pages[seg_idx]->handle = BLKBACK_INVALID_HANDLE;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200863 ret |= 1;
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200864 goto next;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200865 }
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200866 pages[seg_idx]->handle = map[new_map_idx].handle;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200867 } else {
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200868 continue;
Roger Pau Monne0a8704a2012-10-24 18:58:45 +0200869 }
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200870 if (use_persistent_gnts &&
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200871 blkif->persistent_gnt_c < xen_blkif_max_pgrants) {
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200872 /*
873 * We are using persistent grants, the grant is
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200874 * not mapped but we might have room for it.
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200875 */
876 persistent_gnt = kmalloc(sizeof(struct persistent_gnt),
877 GFP_KERNEL);
878 if (!persistent_gnt) {
879 /*
880 * If we don't have enough memory to
881 * allocate the persistent_gnt struct
882 * map this grant non-persistenly
883 */
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200884 goto next;
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200885 }
886 persistent_gnt->gnt = map[new_map_idx].ref;
887 persistent_gnt->handle = map[new_map_idx].handle;
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200888 persistent_gnt->page = pages[seg_idx]->page;
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200889 if (add_persistent_gnt(blkif,
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200890 persistent_gnt)) {
891 kfree(persistent_gnt);
892 persistent_gnt = NULL;
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200893 goto next;
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200894 }
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200895 pages[seg_idx]->persistent_gnt = persistent_gnt;
Tao Chen77387b82015-04-01 15:04:22 +0000896 pr_debug("grant %u added to the tree of persistent grants, using %u/%u\n",
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200897 persistent_gnt->gnt, blkif->persistent_gnt_c,
Roger Pau Monne3f3aad52013-04-17 20:18:57 +0200898 xen_blkif_max_pgrants);
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200899 goto next;
900 }
901 if (use_persistent_gnts && !blkif->vbd.overflow_max_grants) {
902 blkif->vbd.overflow_max_grants = 1;
Tao Chen77387b82015-04-01 15:04:22 +0000903 pr_debug("domain %u, device %#x is using maximum number of persistent grants\n",
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200904 blkif->domid, blkif->vbd.handle);
905 }
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200906 /*
907 * We could not map this grant persistently, so use it as
908 * a non-persistent grant.
909 */
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200910next:
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200911 new_map_idx++;
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -0400912 }
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200913 segs_to_map = 0;
914 last_map = map_until;
915 if (map_until != num)
916 goto again;
917
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -0400918 return ret;
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200919
920out_of_memory:
Tao Chen77387b82015-04-01 15:04:22 +0000921 pr_alert("%s: out of memory\n", __func__);
Roger Pau Monnec6cc1422013-04-17 20:18:56 +0200922 put_free_pages(blkif, pages_to_gnt, segs_to_map);
923 return -ENOMEM;
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -0400924}
925
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200926static int xen_blkbk_map_seg(struct pending_req *pending_req)
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200927{
Roger Pau Monne402b27f2013-04-18 16:06:54 +0200928 int rc;
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200929
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200930 rc = xen_blkbk_map(pending_req->blkif, pending_req->segments,
Roger Pau Monne402b27f2013-04-18 16:06:54 +0200931 pending_req->nr_pages,
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200932 (pending_req->operation != BLKIF_OP_READ));
Roger Pau Monne402b27f2013-04-18 16:06:54 +0200933
934 return rc;
935}
936
937static int xen_blkbk_parse_indirect(struct blkif_request *req,
938 struct pending_req *pending_req,
939 struct seg_buf seg[],
940 struct phys_req *preq)
941{
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200942 struct grant_page **pages = pending_req->indirect_pages;
Roger Pau Monne402b27f2013-04-18 16:06:54 +0200943 struct xen_blkif *blkif = pending_req->blkif;
944 int indirect_grefs, rc, n, nseg, i;
Roger Pau Monne80bfa2f2014-02-04 11:26:15 +0100945 struct blkif_request_segment *segments = NULL;
Roger Pau Monne402b27f2013-04-18 16:06:54 +0200946
947 nseg = pending_req->nr_pages;
948 indirect_grefs = INDIRECT_PAGES(nseg);
949 BUG_ON(indirect_grefs > BLKIF_MAX_INDIRECT_PAGES_PER_REQUEST);
950
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200951 for (i = 0; i < indirect_grefs; i++)
952 pages[i]->gref = req->u.indirect.indirect_grefs[i];
953
954 rc = xen_blkbk_map(blkif, pages, indirect_grefs, true);
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200955 if (rc)
Roger Pau Monne402b27f2013-04-18 16:06:54 +0200956 goto unmap;
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200957
Roger Pau Monne402b27f2013-04-18 16:06:54 +0200958 for (n = 0, i = 0; n < nseg; n++) {
959 if ((n % SEGS_PER_INDIRECT_FRAME) == 0) {
960 /* Map indirect segments */
961 if (segments)
962 kunmap_atomic(segments);
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200963 segments = kmap_atomic(pages[n/SEGS_PER_INDIRECT_FRAME]->page);
Roger Pau Monne402b27f2013-04-18 16:06:54 +0200964 }
965 i = n % SEGS_PER_INDIRECT_FRAME;
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200966 pending_req->segments[n]->gref = segments[i].gref;
Roger Pau Monne402b27f2013-04-18 16:06:54 +0200967 seg[n].nsec = segments[i].last_sect -
968 segments[i].first_sect + 1;
969 seg[n].offset = (segments[i].first_sect << 9);
970 if ((segments[i].last_sect >= (PAGE_SIZE >> 9)) ||
971 (segments[i].last_sect < segments[i].first_sect)) {
972 rc = -EINVAL;
973 goto unmap;
974 }
975 preq->nr_sects += seg[n].nsec;
976 }
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200977
Roger Pau Monne402b27f2013-04-18 16:06:54 +0200978unmap:
979 if (segments)
980 kunmap_atomic(segments);
Roger Pau Monnebb642e82013-05-02 10:21:17 +0200981 xen_blkbk_unmap(blkif, pages, indirect_grefs);
Roger Pau Monne402b27f2013-04-18 16:06:54 +0200982 return rc;
Roger Pau Monne31552ee2013-04-17 20:19:00 +0200983}
984
Konrad Rzeszutek Wilk42146352011-10-12 17:26:47 -0400985static int dispatch_discard_io(struct xen_blkif *blkif,
986 struct blkif_request *req)
Li Dongyangb3cb0d62011-09-01 18:39:10 +0800987{
988 int err = 0;
989 int status = BLKIF_RSP_OKAY;
990 struct block_device *bdev = blkif->vbd.bdev;
Konrad Rzeszutek Wilk4dae7672012-03-13 18:43:23 -0400991 unsigned long secure;
Konrad Rzeszutek Wilk604c4992013-01-16 11:33:52 -0500992 struct phys_req preq;
Li Dongyangb3cb0d62011-09-01 18:39:10 +0800993
Vegard Nossumea5ec762013-09-05 13:00:14 +0200994 xen_blkif_get(blkif);
995
Konrad Rzeszutek Wilk604c4992013-01-16 11:33:52 -0500996 preq.sector_number = req->u.discard.sector_number;
997 preq.nr_sects = req->u.discard.nr_sectors;
998
999 err = xen_vbd_translate(&preq, blkif, WRITE);
1000 if (err) {
Tao Chen77387b82015-04-01 15:04:22 +00001001 pr_warn("access denied: DISCARD [%llu->%llu] on dev=%04x\n",
Konrad Rzeszutek Wilk604c4992013-01-16 11:33:52 -05001002 preq.sector_number,
1003 preq.sector_number + preq.nr_sects, blkif->vbd.pdevice);
1004 goto fail_response;
1005 }
Konrad Rzeszutek Wilk42146352011-10-12 17:26:47 -04001006 blkif->st_ds_req++;
1007
Konrad Rzeszutek Wilk4dae7672012-03-13 18:43:23 -04001008 secure = (blkif->vbd.discard_secure &&
1009 (req->u.discard.flag & BLKIF_DISCARD_SECURE)) ?
1010 BLKDEV_DISCARD_SECURE : 0;
1011
1012 err = blkdev_issue_discard(bdev, req->u.discard.sector_number,
1013 req->u.discard.nr_sectors,
1014 GFP_KERNEL, secure);
Konrad Rzeszutek Wilk604c4992013-01-16 11:33:52 -05001015fail_response:
Li Dongyangb3cb0d62011-09-01 18:39:10 +08001016 if (err == -EOPNOTSUPP) {
Tao Chen77387b82015-04-01 15:04:22 +00001017 pr_debug("discard op failed, not supported\n");
Li Dongyangb3cb0d62011-09-01 18:39:10 +08001018 status = BLKIF_RSP_EOPNOTSUPP;
1019 } else if (err)
1020 status = BLKIF_RSP_ERROR;
1021
Konrad Rzeszutek Wilk97e36832011-10-12 12:12:36 -04001022 make_response(blkif, req->u.discard.id, req->operation, status);
Konrad Rzeszutek Wilk42146352011-10-12 17:26:47 -04001023 xen_blkif_put(blkif);
1024 return err;
Li Dongyangb3cb0d62011-09-01 18:39:10 +08001025}
1026
David Vrabel0e367ae2013-03-07 17:32:01 +00001027static int dispatch_other_io(struct xen_blkif *blkif,
1028 struct blkif_request *req,
1029 struct pending_req *pending_req)
1030{
Roger Pau Monnebf0720c2013-04-17 20:18:59 +02001031 free_req(blkif, pending_req);
David Vrabel0e367ae2013-03-07 17:32:01 +00001032 make_response(blkif, req->u.other.id, req->operation,
1033 BLKIF_RSP_EOPNOTSUPP);
1034 return -EIO;
1035}
1036
Konrad Rzeszutek Wilk29bde092011-10-10 00:42:22 -04001037static void xen_blk_drain_io(struct xen_blkif *blkif)
1038{
1039 atomic_set(&blkif->drain, 1);
1040 do {
Roger Pau Monnec05f3e32014-02-04 11:26:14 +01001041 if (atomic_read(&blkif->inflight) == 0)
Konrad Rzeszutek Wilk6927d922011-10-17 14:27:48 -04001042 break;
Konrad Rzeszutek Wilk29bde092011-10-10 00:42:22 -04001043 wait_for_completion_interruptible_timeout(
1044 &blkif->drain_complete, HZ);
1045
1046 if (!atomic_read(&blkif->drain))
1047 break;
Konrad Rzeszutek Wilk29bde092011-10-10 00:42:22 -04001048 } while (!kthread_should_stop());
1049 atomic_set(&blkif->drain, 0);
1050}
1051
Konrad Rzeszutek Wilkb0aef172011-04-15 10:58:05 -04001052/*
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -04001053 * Completion callback on the bio's. Called as bh->b_end_io()
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001054 */
1055
Konrad Rzeszutek Wilk2e9977c2011-04-14 17:42:07 -04001056static void __end_block_io_op(struct pending_req *pending_req, int error)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001057{
1058 /* An error fails the entire request. */
Konrad Rzeszutek Wilk24f567f2011-05-04 17:07:27 -04001059 if ((pending_req->operation == BLKIF_OP_FLUSH_DISKCACHE) &&
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001060 (error == -EOPNOTSUPP)) {
Tao Chen77387b82015-04-01 15:04:22 +00001061 pr_debug("flush diskcache op failed, not supported\n");
Konrad Rzeszutek Wilk24f567f2011-05-04 17:07:27 -04001062 xen_blkbk_flush_diskcache(XBT_NIL, pending_req->blkif->be, 0);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001063 pending_req->status = BLKIF_RSP_EOPNOTSUPP;
Konrad Rzeszutek Wilk29bde092011-10-10 00:42:22 -04001064 } else if ((pending_req->operation == BLKIF_OP_WRITE_BARRIER) &&
1065 (error == -EOPNOTSUPP)) {
Tao Chen77387b82015-04-01 15:04:22 +00001066 pr_debug("write barrier op failed, not supported\n");
Konrad Rzeszutek Wilk29bde092011-10-10 00:42:22 -04001067 xen_blkbk_barrier(XBT_NIL, pending_req->blkif->be, 0);
1068 pending_req->status = BLKIF_RSP_EOPNOTSUPP;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001069 } else if (error) {
Tao Chen77387b82015-04-01 15:04:22 +00001070 pr_debug("Buffer not up-to-date at end of operation,"
Konrad Rzeszutek Wilkebe81902011-05-12 16:42:31 -04001071 " error=%d\n", error);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001072 pending_req->status = BLKIF_RSP_ERROR;
1073 }
1074
Konrad Rzeszutek Wilk01f37f22011-05-11 15:57:09 -04001075 /*
1076 * If all of the bio's have completed it is time to unmap
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -04001077 * the grant references associated with 'request' and provide
Konrad Rzeszutek Wilk2e9977c2011-04-14 17:42:07 -04001078 * the proper response on the ring.
1079 */
Jennifer Herbertc43cf3e2015-01-05 16:49:22 +00001080 if (atomic_dec_and_test(&pending_req->pendcnt))
1081 xen_blkbk_unmap_and_respond(pending_req);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001082}
1083
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -04001084/*
1085 * bio callback.
1086 */
Jeremy Fitzhardinge88122932009-02-09 12:05:51 -08001087static void end_block_io_op(struct bio *bio, int error)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001088{
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001089 __end_block_io_op(bio->bi_private, error);
1090 bio_put(bio);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001091}
1092
1093
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001094
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -04001095/*
1096 * Function to copy the from the ring buffer the 'struct blkif_request'
1097 * (which has the sectors we want, number of them, grant references, etc),
1098 * and transmute it to the block API to hand it over to the proper block disk.
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001099 */
Daniel Stoddenb4726a92011-05-28 13:21:10 -07001100static int
1101__do_block_io_op(struct xen_blkif *blkif)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001102{
Jeremy Fitzhardinge88122932009-02-09 12:05:51 -08001103 union blkif_back_rings *blk_rings = &blkif->blk_rings;
1104 struct blkif_request req;
Konrad Rzeszutek Wilk2e9977c2011-04-14 17:42:07 -04001105 struct pending_req *pending_req;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001106 RING_IDX rc, rp;
1107 int more_to_do = 0;
1108
1109 rc = blk_rings->common.req_cons;
1110 rp = blk_rings->common.sring->req_prod;
1111 rmb(); /* Ensure we see queued requests up to 'rp'. */
1112
Konrad Rzeszutek Wilk8e3f8752013-01-23 16:54:32 -05001113 if (RING_REQUEST_PROD_OVERFLOW(&blk_rings->common, rp)) {
1114 rc = blk_rings->common.rsp_prod_pvt;
Tao Chen77387b82015-04-01 15:04:22 +00001115 pr_warn("Frontend provided bogus ring requests (%d - %d = %d). Halting ring processing on dev=%04x\n",
Konrad Rzeszutek Wilk8e3f8752013-01-23 16:54:32 -05001116 rp, rc, rp - rc, blkif->vbd.pdevice);
1117 return -EACCES;
1118 }
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001119 while (rc != rp) {
1120
1121 if (RING_REQUEST_CONS_OVERFLOW(&blk_rings->common, rc))
1122 break;
1123
Keir Fraser8270b452009-03-06 08:29:15 +00001124 if (kthread_should_stop()) {
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001125 more_to_do = 1;
1126 break;
1127 }
1128
Roger Pau Monnebf0720c2013-04-17 20:18:59 +02001129 pending_req = alloc_req(blkif);
Keir Fraser8270b452009-03-06 08:29:15 +00001130 if (NULL == pending_req) {
1131 blkif->st_oo_req++;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001132 more_to_do = 1;
1133 break;
1134 }
1135
1136 switch (blkif->blk_protocol) {
1137 case BLKIF_PROTOCOL_NATIVE:
1138 memcpy(&req, RING_GET_REQUEST(&blk_rings->native, rc), sizeof(req));
1139 break;
1140 case BLKIF_PROTOCOL_X86_32:
1141 blkif_get_x86_32_req(&req, RING_GET_REQUEST(&blk_rings->x86_32, rc));
1142 break;
1143 case BLKIF_PROTOCOL_X86_64:
1144 blkif_get_x86_64_req(&req, RING_GET_REQUEST(&blk_rings->x86_64, rc));
1145 break;
1146 default:
1147 BUG();
1148 }
1149 blk_rings->common.req_cons = ++rc; /* before make_response() */
1150
1151 /* Apply all sanity checks to /private copy/ of request. */
1152 barrier();
David Vrabel0e367ae2013-03-07 17:32:01 +00001153
1154 switch (req.operation) {
1155 case BLKIF_OP_READ:
1156 case BLKIF_OP_WRITE:
1157 case BLKIF_OP_WRITE_BARRIER:
1158 case BLKIF_OP_FLUSH_DISKCACHE:
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001159 case BLKIF_OP_INDIRECT:
David Vrabel0e367ae2013-03-07 17:32:01 +00001160 if (dispatch_rw_block_io(blkif, &req, pending_req))
1161 goto done;
1162 break;
1163 case BLKIF_OP_DISCARD:
Roger Pau Monnebf0720c2013-04-17 20:18:59 +02001164 free_req(blkif, pending_req);
Konrad Rzeszutek Wilk42146352011-10-12 17:26:47 -04001165 if (dispatch_discard_io(blkif, &req))
David Vrabel0e367ae2013-03-07 17:32:01 +00001166 goto done;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001167 break;
David Vrabel0e367ae2013-03-07 17:32:01 +00001168 default:
1169 if (dispatch_other_io(blkif, &req, pending_req))
1170 goto done;
1171 break;
1172 }
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001173
1174 /* Yield point for this unbounded loop. */
1175 cond_resched();
1176 }
David Vrabel0e367ae2013-03-07 17:32:01 +00001177done:
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001178 return more_to_do;
1179}
1180
Daniel Stoddenb4726a92011-05-28 13:21:10 -07001181static int
1182do_block_io_op(struct xen_blkif *blkif)
1183{
1184 union blkif_back_rings *blk_rings = &blkif->blk_rings;
1185 int more_to_do;
1186
1187 do {
1188 more_to_do = __do_block_io_op(blkif);
1189 if (more_to_do)
1190 break;
1191
1192 RING_FINAL_CHECK_FOR_REQUESTS(&blk_rings->common, more_to_do);
1193 } while (more_to_do);
1194
1195 return more_to_do;
1196}
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -04001197/*
Konrad Rzeszutek Wilk01f37f22011-05-11 15:57:09 -04001198 * Transmutation of the 'struct blkif_request' to a proper 'struct bio'
1199 * and call the 'submit_bio' to pass it to the underlying storage.
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -04001200 */
Konrad Rzeszutek Wilk30fd1502011-05-12 16:47:48 -04001201static int dispatch_rw_block_io(struct xen_blkif *blkif,
1202 struct blkif_request *req,
1203 struct pending_req *pending_req)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001204{
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001205 struct phys_req preq;
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001206 struct seg_buf *seg = pending_req->seg;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001207 unsigned int nseg;
1208 struct bio *bio = NULL;
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001209 struct bio **biolist = pending_req->biolist;
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -04001210 int i, nbio = 0;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001211 int operation;
Konrad Rzeszutek Wilka19be5f2011-04-27 12:40:11 -04001212 struct blk_plug plug;
Konrad Rzeszutek Wilk29bde092011-10-10 00:42:22 -04001213 bool drain = false;
Roger Pau Monnebb642e82013-05-02 10:21:17 +02001214 struct grant_page **pages = pending_req->segments;
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001215 unsigned short req_operation;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001216
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001217 req_operation = req->operation == BLKIF_OP_INDIRECT ?
1218 req->u.indirect.indirect_op : req->operation;
1219 if ((req->operation == BLKIF_OP_INDIRECT) &&
1220 (req_operation != BLKIF_OP_READ) &&
1221 (req_operation != BLKIF_OP_WRITE)) {
Tao Chen77387b82015-04-01 15:04:22 +00001222 pr_debug("Invalid indirect operation (%u)\n", req_operation);
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001223 goto fail_response;
1224 }
1225
1226 switch (req_operation) {
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001227 case BLKIF_OP_READ:
Konrad Rzeszutek Wilkfc53bf72011-05-05 13:37:23 -04001228 blkif->st_rd_req++;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001229 operation = READ;
1230 break;
1231 case BLKIF_OP_WRITE:
Konrad Rzeszutek Wilkfc53bf72011-05-05 13:37:23 -04001232 blkif->st_wr_req++;
Konrad Rzeszutek Wilk013c3ca2011-04-26 16:24:18 -04001233 operation = WRITE_ODIRECT;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001234 break;
Konrad Rzeszutek Wilk29bde092011-10-10 00:42:22 -04001235 case BLKIF_OP_WRITE_BARRIER:
1236 drain = true;
Konrad Rzeszutek Wilk24f567f2011-05-04 17:07:27 -04001237 case BLKIF_OP_FLUSH_DISKCACHE:
Konrad Rzeszutek Wilkfc53bf72011-05-05 13:37:23 -04001238 blkif->st_f_req++;
Konrad Rzeszutek Wilk24f567f2011-05-04 17:07:27 -04001239 operation = WRITE_FLUSH;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001240 break;
1241 default:
1242 operation = 0; /* make gcc happy */
Konrad Rzeszutek Wilkfc53bf72011-05-05 13:37:23 -04001243 goto fail_response;
1244 break;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001245 }
1246
Konrad Rzeszutek Wilk42146352011-10-12 17:26:47 -04001247 /* Check that the number of segments is sane. */
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001248 nseg = req->operation == BLKIF_OP_INDIRECT ?
1249 req->u.indirect.nr_segments : req->u.rw.nr_segments;
Konrad Rzeszutek Wilk97e36832011-10-12 12:12:36 -04001250
Konrad Rzeszutek Wilk42146352011-10-12 17:26:47 -04001251 if (unlikely(nseg == 0 && operation != WRITE_FLUSH) ||
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001252 unlikely((req->operation != BLKIF_OP_INDIRECT) &&
1253 (nseg > BLKIF_MAX_SEGMENTS_PER_REQUEST)) ||
1254 unlikely((req->operation == BLKIF_OP_INDIRECT) &&
1255 (nseg > MAX_INDIRECT_SEGMENTS))) {
Tao Chen77387b82015-04-01 15:04:22 +00001256 pr_debug("Bad number of segments in request (%d)\n", nseg);
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -04001257 /* Haven't submitted any bio's yet. */
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001258 goto fail_response;
1259 }
1260
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001261 preq.nr_sects = 0;
1262
1263 pending_req->blkif = blkif;
Konrad Rzeszutek Wilk97e36832011-10-12 12:12:36 -04001264 pending_req->id = req->u.rw.id;
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001265 pending_req->operation = req_operation;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001266 pending_req->status = BLKIF_RSP_OKAY;
1267 pending_req->nr_pages = nseg;
Konrad Rzeszutek Wilke9350492011-04-18 11:34:55 -04001268
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001269 if (req->operation != BLKIF_OP_INDIRECT) {
1270 preq.dev = req->u.rw.handle;
1271 preq.sector_number = req->u.rw.sector_number;
1272 for (i = 0; i < nseg; i++) {
Roger Pau Monnebb642e82013-05-02 10:21:17 +02001273 pages[i]->gref = req->u.rw.seg[i].gref;
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001274 seg[i].nsec = req->u.rw.seg[i].last_sect -
1275 req->u.rw.seg[i].first_sect + 1;
1276 seg[i].offset = (req->u.rw.seg[i].first_sect << 9);
1277 if ((req->u.rw.seg[i].last_sect >= (PAGE_SIZE >> 9)) ||
1278 (req->u.rw.seg[i].last_sect <
1279 req->u.rw.seg[i].first_sect))
1280 goto fail_response;
1281 preq.nr_sects += seg[i].nsec;
1282 }
1283 } else {
1284 preq.dev = req->u.indirect.handle;
1285 preq.sector_number = req->u.indirect.sector_number;
1286 if (xen_blkbk_parse_indirect(req, pending_req, seg, &preq))
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001287 goto fail_response;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001288 }
1289
Konrad Rzeszutek Wilk3d814732011-05-12 16:53:56 -04001290 if (xen_vbd_translate(&preq, blkif, operation) != 0) {
Tao Chen77387b82015-04-01 15:04:22 +00001291 pr_debug("access denied: %s of [%llu,%llu] on dev=%04x\n",
Konrad Rzeszutek Wilkebe81902011-05-12 16:42:31 -04001292 operation == READ ? "read" : "write",
1293 preq.sector_number,
Chen Ganga72d9002013-02-28 10:34:23 +08001294 preq.sector_number + preq.nr_sects,
1295 blkif->vbd.pdevice);
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -04001296 goto fail_response;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001297 }
Konrad Rzeszutek Wilk01f37f22011-05-11 15:57:09 -04001298
1299 /*
Konrad Rzeszutek Wilk3d814732011-05-12 16:53:56 -04001300 * This check _MUST_ be done after xen_vbd_translate as the preq.bdev
Konrad Rzeszutek Wilk01f37f22011-05-11 15:57:09 -04001301 * is set there.
1302 */
Konrad Rzeszutek Wilke9350492011-04-18 11:34:55 -04001303 for (i = 0; i < nseg; i++) {
1304 if (((int)preq.sector_number|(int)seg[i].nsec) &
1305 ((bdev_logical_block_size(preq.bdev) >> 9) - 1)) {
Tao Chen77387b82015-04-01 15:04:22 +00001306 pr_debug("Misaligned I/O request from domain %d\n",
Konrad Rzeszutek Wilkebe81902011-05-12 16:42:31 -04001307 blkif->domid);
Konrad Rzeszutek Wilke9350492011-04-18 11:34:55 -04001308 goto fail_response;
1309 }
1310 }
Konrad Rzeszutek Wilk01f37f22011-05-11 15:57:09 -04001311
Konrad Rzeszutek Wilk29bde092011-10-10 00:42:22 -04001312 /* Wait on all outstanding I/O's and once that has been completed
1313 * issue the WRITE_FLUSH.
1314 */
1315 if (drain)
1316 xen_blk_drain_io(pending_req->blkif);
1317
Konrad Rzeszutek Wilk01f37f22011-05-11 15:57:09 -04001318 /*
1319 * If we have failed at this point, we need to undo the M2P override,
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -04001320 * set gnttab_set_unmap_op on all of the grant references and perform
1321 * the hypercall to unmap the grants - that is all done in
Konrad Rzeszutek Wilk9f3aedf2011-04-15 11:50:34 -04001322 * xen_blkbk_unmap.
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -04001323 */
Roger Pau Monnebb642e82013-05-02 10:21:17 +02001324 if (xen_blkbk_map_seg(pending_req))
Konrad Rzeszutek Wilk1a95fe62011-04-15 11:35:13 -04001325 goto fail_flush;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001326
Li Dongyangb3cb0d62011-09-01 18:39:10 +08001327 /*
1328 * This corresponding xen_blkif_put is done in __end_block_io_op, or
1329 * below (in "!bio") if we are handling a BLKIF_OP_DISCARD.
1330 */
Konrad Rzeszutek Wilk8b6bf742011-04-20 11:50:43 -04001331 xen_blkif_get(blkif);
Roger Pau Monnec05f3e32014-02-04 11:26:14 +01001332 atomic_inc(&blkif->inflight);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001333
1334 for (i = 0; i < nseg; i++) {
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001335 while ((bio == NULL) ||
1336 (bio_add_page(bio,
Roger Pau Monnebb642e82013-05-02 10:21:17 +02001337 pages[i]->page,
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001338 seg[i].nsec << 9,
Roger Pau Monneffb1dab2013-03-18 17:49:32 +01001339 seg[i].offset) == 0)) {
Konrad Rzeszutek Wilk2e9977c2011-04-14 17:42:07 -04001340
Roger Pau Monne1e0f7a22013-06-22 09:59:17 +02001341 int nr_iovecs = min_t(int, (nseg-i), BIO_MAX_PAGES);
1342 bio = bio_alloc(GFP_KERNEL, nr_iovecs);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001343 if (unlikely(bio == NULL))
1344 goto fail_put_bio;
1345
Konrad Rzeszutek Wilk03e0edf2011-05-12 16:19:23 -04001346 biolist[nbio++] = bio;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001347 bio->bi_bdev = preq.bdev;
1348 bio->bi_private = pending_req;
1349 bio->bi_end_io = end_block_io_op;
Kent Overstreet4f024f32013-10-11 15:44:27 -07001350 bio->bi_iter.bi_sector = preq.sector_number;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001351 }
1352
1353 preq.sector_number += seg[i].nsec;
1354 }
1355
Li Dongyangb3cb0d62011-09-01 18:39:10 +08001356 /* This will be hit if the operation was a flush or discard. */
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001357 if (!bio) {
Konrad Rzeszutek Wilk42146352011-10-12 17:26:47 -04001358 BUG_ON(operation != WRITE_FLUSH);
Konrad Rzeszutek Wilkb0f80122011-05-12 16:23:06 -04001359
Konrad Rzeszutek Wilk42146352011-10-12 17:26:47 -04001360 bio = bio_alloc(GFP_KERNEL, 0);
1361 if (unlikely(bio == NULL))
1362 goto fail_put_bio;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001363
Konrad Rzeszutek Wilk42146352011-10-12 17:26:47 -04001364 biolist[nbio++] = bio;
1365 bio->bi_bdev = preq.bdev;
1366 bio->bi_private = pending_req;
1367 bio->bi_end_io = end_block_io_op;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001368 }
1369
Konrad Rzeszutek Wilk77089922011-04-15 10:51:27 -04001370 atomic_set(&pending_req->pendcnt, nbio);
Konrad Rzeszutek Wilka19be5f2011-04-27 12:40:11 -04001371 blk_start_plug(&plug);
1372
Konrad Rzeszutek Wilk77089922011-04-15 10:51:27 -04001373 for (i = 0; i < nbio; i++)
1374 submit_bio(operation, biolist[i]);
1375
Konrad Rzeszutek Wilka19be5f2011-04-27 12:40:11 -04001376 /* Let the I/Os go.. */
Konrad Rzeszutek Wilk3d68b392011-05-05 13:42:10 -04001377 blk_finish_plug(&plug);
Konrad Rzeszutek Wilka19be5f2011-04-27 12:40:11 -04001378
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001379 if (operation == READ)
1380 blkif->st_rd_sect += preq.nr_sects;
Konrad Rzeszutek Wilk5c62cb42011-10-10 12:33:21 -04001381 else if (operation & WRITE)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001382 blkif->st_wr_sect += preq.nr_sects;
1383
Konrad Rzeszutek Wilkfc53bf72011-05-05 13:37:23 -04001384 return 0;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001385
1386 fail_flush:
Roger Pau Monnebb642e82013-05-02 10:21:17 +02001387 xen_blkbk_unmap(blkif, pending_req->segments,
Roger Pau Monne31552ee2013-04-17 20:19:00 +02001388 pending_req->nr_pages);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001389 fail_response:
Konrad Rzeszutek Wilk0faa8cc2011-04-14 17:58:19 -04001390 /* Haven't submitted any bio's yet. */
Roger Pau Monne402b27f2013-04-18 16:06:54 +02001391 make_response(blkif, req->u.rw.id, req_operation, BLKIF_RSP_ERROR);
Roger Pau Monnebf0720c2013-04-17 20:18:59 +02001392 free_req(blkif, pending_req);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001393 msleep(1); /* back off a bit */
Konrad Rzeszutek Wilkfc53bf72011-05-05 13:37:23 -04001394 return -EIO;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001395
1396 fail_put_bio:
Konrad Rzeszutek Wilk03e0edf2011-05-12 16:19:23 -04001397 for (i = 0; i < nbio; i++)
Konrad Rzeszutek Wilk77089922011-04-15 10:51:27 -04001398 bio_put(biolist[i]);
Jan Beulich0e5e0982013-03-11 09:39:55 +00001399 atomic_set(&pending_req->pendcnt, 1);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001400 __end_block_io_op(pending_req, -EINVAL);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001401 msleep(1); /* back off a bit */
Konrad Rzeszutek Wilkfc53bf72011-05-05 13:37:23 -04001402 return -EIO;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001403}
1404
1405
1406
Konrad Rzeszutek Wilka1397fa2011-04-14 17:05:23 -04001407/*
1408 * Put a response on the ring on how the operation fared.
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001409 */
Konrad Rzeszutek Wilk30fd1502011-05-12 16:47:48 -04001410static void make_response(struct xen_blkif *blkif, u64 id,
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001411 unsigned short op, int st)
1412{
Jeremy Fitzhardinge88122932009-02-09 12:05:51 -08001413 struct blkif_response resp;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001414 unsigned long flags;
Jeremy Fitzhardinge88122932009-02-09 12:05:51 -08001415 union blkif_back_rings *blk_rings = &blkif->blk_rings;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001416 int notify;
1417
1418 resp.id = id;
1419 resp.operation = op;
1420 resp.status = st;
1421
1422 spin_lock_irqsave(&blkif->blk_ring_lock, flags);
1423 /* Place on the response ring for the relevant domain. */
1424 switch (blkif->blk_protocol) {
1425 case BLKIF_PROTOCOL_NATIVE:
1426 memcpy(RING_GET_RESPONSE(&blk_rings->native, blk_rings->native.rsp_prod_pvt),
1427 &resp, sizeof(resp));
1428 break;
1429 case BLKIF_PROTOCOL_X86_32:
1430 memcpy(RING_GET_RESPONSE(&blk_rings->x86_32, blk_rings->x86_32.rsp_prod_pvt),
1431 &resp, sizeof(resp));
1432 break;
1433 case BLKIF_PROTOCOL_X86_64:
1434 memcpy(RING_GET_RESPONSE(&blk_rings->x86_64, blk_rings->x86_64.rsp_prod_pvt),
1435 &resp, sizeof(resp));
1436 break;
1437 default:
1438 BUG();
1439 }
1440 blk_rings->common.rsp_prod_pvt++;
1441 RING_PUSH_RESPONSES_AND_CHECK_NOTIFY(&blk_rings->common, notify);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001442 spin_unlock_irqrestore(&blkif->blk_ring_lock, flags);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001443 if (notify)
1444 notify_remote_via_irq(blkif->irq);
1445}
1446
Konrad Rzeszutek Wilk8b6bf742011-04-20 11:50:43 -04001447static int __init xen_blkif_init(void)
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001448{
Konrad Rzeszutek Wilk8770b262009-10-08 13:23:09 -04001449 int rc = 0;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001450
Daniel De Graafb2167ba2011-11-28 11:49:05 -05001451 if (!xen_domain())
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001452 return -ENODEV;
1453
Konrad Rzeszutek Wilk8b6bf742011-04-20 11:50:43 -04001454 rc = xen_blkif_interface_init();
Konrad Rzeszutek Wilk8770b262009-10-08 13:23:09 -04001455 if (rc)
1456 goto failed_init;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001457
Konrad Rzeszutek Wilk8b6bf742011-04-20 11:50:43 -04001458 rc = xen_blkif_xenbus_init();
Konrad Rzeszutek Wilk8770b262009-10-08 13:23:09 -04001459 if (rc)
1460 goto failed_init;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001461
Konrad Rzeszutek Wilk8770b262009-10-08 13:23:09 -04001462 failed_init:
Konrad Rzeszutek Wilk8770b262009-10-08 13:23:09 -04001463 return rc;
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001464}
1465
Konrad Rzeszutek Wilk8b6bf742011-04-20 11:50:43 -04001466module_init(xen_blkif_init);
Konrad Rzeszutek Wilk4d05a282011-04-14 18:25:47 -04001467
1468MODULE_LICENSE("Dual BSD/GPL");
Bastian Blanka7e93572011-06-29 14:40:50 +02001469MODULE_ALIAS("xen-backend:vbd");