blob: 6937ca42be8c42292f976c1791645b213cfb017d [file] [log] [blame]
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001/*
2 * Copyright (C) 2012 Red Hat, Inc.
3 *
4 * This file is released under the GPL.
5 */
6
7#include "dm-cache-metadata.h"
8
9#include "persistent-data/dm-array.h"
10#include "persistent-data/dm-bitset.h"
11#include "persistent-data/dm-space-map.h"
12#include "persistent-data/dm-space-map-disk.h"
13#include "persistent-data/dm-transaction-manager.h"
14
15#include <linux/device-mapper.h>
16
17/*----------------------------------------------------------------*/
18
19#define DM_MSG_PREFIX "cache metadata"
20
21#define CACHE_SUPERBLOCK_MAGIC 06142003
22#define CACHE_SUPERBLOCK_LOCATION 0
Joe Thornber53d49812013-10-16 10:59:26 +010023
24/*
25 * defines a range of metadata versions that this module can handle.
26 */
27#define MIN_CACHE_VERSION 1
28#define MAX_CACHE_VERSION 1
29
Joe Thornberc6b4fcb2013-03-01 22:45:51 +000030#define CACHE_METADATA_CACHE_SIZE 64
31
32/*
33 * 3 for btree insert +
34 * 2 for btree lookup used within space map
35 */
36#define CACHE_MAX_CONCURRENT_LOCKS 5
37#define SPACE_MAP_ROOT_SIZE 128
38
39enum superblock_flag_bits {
40 /* for spotting crashes that would invalidate the dirty bitset */
41 CLEAN_SHUTDOWN,
Joe Thornber028ae9f2015-04-22 16:42:35 -040042 /* metadata must be checked using the tools */
43 NEEDS_CHECK,
Joe Thornberc6b4fcb2013-03-01 22:45:51 +000044};
45
46/*
47 * Each mapping from cache block -> origin block carries a set of flags.
48 */
49enum mapping_bits {
50 /*
51 * A valid mapping. Because we're using an array we clear this
52 * flag for an non existant mapping.
53 */
54 M_VALID = 1,
55
56 /*
57 * The data on the cache is different from that on the origin.
58 */
59 M_DIRTY = 2
60};
61
62struct cache_disk_superblock {
63 __le32 csum;
64 __le32 flags;
65 __le64 blocknr;
66
67 __u8 uuid[16];
68 __le64 magic;
69 __le32 version;
70
71 __u8 policy_name[CACHE_POLICY_NAME_SIZE];
72 __le32 policy_hint_size;
73
74 __u8 metadata_space_map_root[SPACE_MAP_ROOT_SIZE];
75 __le64 mapping_root;
76 __le64 hint_root;
77
78 __le64 discard_root;
79 __le64 discard_block_size;
80 __le64 discard_nr_blocks;
81
82 __le32 data_block_size;
83 __le32 metadata_block_size;
84 __le32 cache_blocks;
85
86 __le32 compat_flags;
87 __le32 compat_ro_flags;
88 __le32 incompat_flags;
89
90 __le32 read_hits;
91 __le32 read_misses;
92 __le32 write_hits;
93 __le32 write_misses;
Mike Snitzer4e7f5062013-03-20 17:21:27 +000094
95 __le32 policy_version[CACHE_POLICY_VERSION_SIZE];
Joe Thornberc6b4fcb2013-03-01 22:45:51 +000096} __packed;
97
98struct dm_cache_metadata {
Joe Thornber9b1cc9f2015-01-23 10:00:07 +000099 atomic_t ref_count;
100 struct list_head list;
101
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000102 struct block_device *bdev;
103 struct dm_block_manager *bm;
104 struct dm_space_map *metadata_sm;
105 struct dm_transaction_manager *tm;
106
107 struct dm_array_info info;
108 struct dm_array_info hint_info;
109 struct dm_disk_bitset discard_info;
110
111 struct rw_semaphore root_lock;
Joe Thornber028ae9f2015-04-22 16:42:35 -0400112 unsigned long flags;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000113 dm_block_t root;
114 dm_block_t hint_root;
115 dm_block_t discard_root;
116
117 sector_t discard_block_size;
Joe Thornber1bad9bc2014-11-07 14:47:07 +0000118 dm_dblock_t discard_nr_blocks;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000119
120 sector_t data_block_size;
121 dm_cblock_t cache_blocks;
122 bool changed:1;
123 bool clean_when_opened:1;
124
125 char policy_name[CACHE_POLICY_NAME_SIZE];
Mike Snitzer4e7f5062013-03-20 17:21:27 +0000126 unsigned policy_version[CACHE_POLICY_VERSION_SIZE];
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000127 size_t policy_hint_size;
128 struct dm_cache_statistics stats;
Joe Thornber5a320832014-03-27 14:13:23 +0000129
130 /*
131 * Reading the space map root can fail, so we read it into this
132 * buffer before the superblock is locked and updated.
133 */
134 __u8 metadata_space_map_root[SPACE_MAP_ROOT_SIZE];
Joe Thornber028ae9f2015-04-22 16:42:35 -0400135
136 /*
137 * Set if a transaction has to be aborted but the attempt to roll
138 * back to the previous (good) transaction failed. The only
139 * metadata operation permissible in this state is the closing of
140 * the device.
141 */
142 bool fail_io:1;
Joe Thornberf1779402016-09-20 06:16:00 -0400143
144 /*
145 * These structures are used when loading metadata. They're too
146 * big to put on the stack.
147 */
148 struct dm_array_cursor mapping_cursor;
149 struct dm_array_cursor hint_cursor;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000150};
151
152/*-------------------------------------------------------------------
153 * superblock validator
154 *-----------------------------------------------------------------*/
155
156#define SUPERBLOCK_CSUM_XOR 9031977
157
158static void sb_prepare_for_write(struct dm_block_validator *v,
159 struct dm_block *b,
160 size_t sb_block_size)
161{
162 struct cache_disk_superblock *disk_super = dm_block_data(b);
163
164 disk_super->blocknr = cpu_to_le64(dm_block_location(b));
165 disk_super->csum = cpu_to_le32(dm_bm_checksum(&disk_super->flags,
166 sb_block_size - sizeof(__le32),
167 SUPERBLOCK_CSUM_XOR));
168}
169
Joe Thornber53d49812013-10-16 10:59:26 +0100170static int check_metadata_version(struct cache_disk_superblock *disk_super)
171{
172 uint32_t metadata_version = le32_to_cpu(disk_super->version);
173 if (metadata_version < MIN_CACHE_VERSION || metadata_version > MAX_CACHE_VERSION) {
174 DMERR("Cache metadata version %u found, but only versions between %u and %u supported.",
175 metadata_version, MIN_CACHE_VERSION, MAX_CACHE_VERSION);
176 return -EINVAL;
177 }
178
179 return 0;
180}
181
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000182static int sb_check(struct dm_block_validator *v,
183 struct dm_block *b,
184 size_t sb_block_size)
185{
186 struct cache_disk_superblock *disk_super = dm_block_data(b);
187 __le32 csum_le;
188
189 if (dm_block_location(b) != le64_to_cpu(disk_super->blocknr)) {
190 DMERR("sb_check failed: blocknr %llu: wanted %llu",
191 le64_to_cpu(disk_super->blocknr),
192 (unsigned long long)dm_block_location(b));
193 return -ENOTBLK;
194 }
195
196 if (le64_to_cpu(disk_super->magic) != CACHE_SUPERBLOCK_MAGIC) {
197 DMERR("sb_check failed: magic %llu: wanted %llu",
198 le64_to_cpu(disk_super->magic),
199 (unsigned long long)CACHE_SUPERBLOCK_MAGIC);
200 return -EILSEQ;
201 }
202
203 csum_le = cpu_to_le32(dm_bm_checksum(&disk_super->flags,
204 sb_block_size - sizeof(__le32),
205 SUPERBLOCK_CSUM_XOR));
206 if (csum_le != disk_super->csum) {
207 DMERR("sb_check failed: csum %u: wanted %u",
208 le32_to_cpu(csum_le), le32_to_cpu(disk_super->csum));
209 return -EILSEQ;
210 }
211
Joe Thornber53d49812013-10-16 10:59:26 +0100212 return check_metadata_version(disk_super);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000213}
214
215static struct dm_block_validator sb_validator = {
216 .name = "superblock",
217 .prepare_for_write = sb_prepare_for_write,
218 .check = sb_check
219};
220
221/*----------------------------------------------------------------*/
222
223static int superblock_read_lock(struct dm_cache_metadata *cmd,
224 struct dm_block **sblock)
225{
226 return dm_bm_read_lock(cmd->bm, CACHE_SUPERBLOCK_LOCATION,
227 &sb_validator, sblock);
228}
229
230static int superblock_lock_zero(struct dm_cache_metadata *cmd,
231 struct dm_block **sblock)
232{
233 return dm_bm_write_lock_zero(cmd->bm, CACHE_SUPERBLOCK_LOCATION,
234 &sb_validator, sblock);
235}
236
237static int superblock_lock(struct dm_cache_metadata *cmd,
238 struct dm_block **sblock)
239{
240 return dm_bm_write_lock(cmd->bm, CACHE_SUPERBLOCK_LOCATION,
241 &sb_validator, sblock);
242}
243
244/*----------------------------------------------------------------*/
245
Joe Thornberdd8b0c22013-10-24 14:10:28 -0400246static int __superblock_all_zeroes(struct dm_block_manager *bm, bool *result)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000247{
248 int r;
249 unsigned i;
250 struct dm_block *b;
251 __le64 *data_le, zero = cpu_to_le64(0);
252 unsigned sb_block_size = dm_bm_block_size(bm) / sizeof(__le64);
253
254 /*
255 * We can't use a validator here - it may be all zeroes.
256 */
257 r = dm_bm_read_lock(bm, CACHE_SUPERBLOCK_LOCATION, NULL, &b);
258 if (r)
259 return r;
260
261 data_le = dm_block_data(b);
Joe Thornberdd8b0c22013-10-24 14:10:28 -0400262 *result = true;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000263 for (i = 0; i < sb_block_size; i++) {
264 if (data_le[i] != zero) {
Joe Thornberdd8b0c22013-10-24 14:10:28 -0400265 *result = false;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000266 break;
267 }
268 }
269
Mikulas Patocka4c7da062015-10-22 16:46:59 -0400270 dm_bm_unlock(b);
271
272 return 0;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000273}
274
275static void __setup_mapping_info(struct dm_cache_metadata *cmd)
276{
277 struct dm_btree_value_type vt;
278
279 vt.context = NULL;
280 vt.size = sizeof(__le64);
281 vt.inc = NULL;
282 vt.dec = NULL;
283 vt.equal = NULL;
284 dm_array_info_init(&cmd->info, cmd->tm, &vt);
285
286 if (cmd->policy_hint_size) {
287 vt.size = sizeof(__le32);
288 dm_array_info_init(&cmd->hint_info, cmd->tm, &vt);
289 }
290}
291
Joe Thornber5a320832014-03-27 14:13:23 +0000292static int __save_sm_root(struct dm_cache_metadata *cmd)
293{
294 int r;
295 size_t metadata_len;
296
297 r = dm_sm_root_size(cmd->metadata_sm, &metadata_len);
298 if (r < 0)
299 return r;
300
301 return dm_sm_copy_root(cmd->metadata_sm, &cmd->metadata_space_map_root,
302 metadata_len);
303}
304
305static void __copy_sm_root(struct dm_cache_metadata *cmd,
306 struct cache_disk_superblock *disk_super)
307{
308 memcpy(&disk_super->metadata_space_map_root,
309 &cmd->metadata_space_map_root,
310 sizeof(cmd->metadata_space_map_root));
311}
312
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000313static int __write_initial_superblock(struct dm_cache_metadata *cmd)
314{
315 int r;
316 struct dm_block *sblock;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000317 struct cache_disk_superblock *disk_super;
318 sector_t bdev_size = i_size_read(cmd->bdev->bd_inode) >> SECTOR_SHIFT;
319
320 /* FIXME: see if we can lose the max sectors limit */
321 if (bdev_size > DM_CACHE_METADATA_MAX_SECTORS)
322 bdev_size = DM_CACHE_METADATA_MAX_SECTORS;
323
Joe Thornber5a320832014-03-27 14:13:23 +0000324 r = dm_tm_pre_commit(cmd->tm);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000325 if (r < 0)
326 return r;
327
Joe Thornber5a320832014-03-27 14:13:23 +0000328 /*
329 * dm_sm_copy_root() can fail. So we need to do it before we start
330 * updating the superblock.
331 */
332 r = __save_sm_root(cmd);
333 if (r)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000334 return r;
335
336 r = superblock_lock_zero(cmd, &sblock);
337 if (r)
338 return r;
339
340 disk_super = dm_block_data(sblock);
341 disk_super->flags = 0;
342 memset(disk_super->uuid, 0, sizeof(disk_super->uuid));
343 disk_super->magic = cpu_to_le64(CACHE_SUPERBLOCK_MAGIC);
Joe Thornber53d49812013-10-16 10:59:26 +0100344 disk_super->version = cpu_to_le32(MAX_CACHE_VERSION);
Mike Snitzer4e7f5062013-03-20 17:21:27 +0000345 memset(disk_super->policy_name, 0, sizeof(disk_super->policy_name));
346 memset(disk_super->policy_version, 0, sizeof(disk_super->policy_version));
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000347 disk_super->policy_hint_size = 0;
348
Joe Thornber5a320832014-03-27 14:13:23 +0000349 __copy_sm_root(cmd, disk_super);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000350
351 disk_super->mapping_root = cpu_to_le64(cmd->root);
352 disk_super->hint_root = cpu_to_le64(cmd->hint_root);
353 disk_super->discard_root = cpu_to_le64(cmd->discard_root);
354 disk_super->discard_block_size = cpu_to_le64(cmd->discard_block_size);
Joe Thornber1bad9bc2014-11-07 14:47:07 +0000355 disk_super->discard_nr_blocks = cpu_to_le64(from_dblock(cmd->discard_nr_blocks));
Mike Snitzer895b47d2014-07-14 15:37:18 -0400356 disk_super->metadata_block_size = cpu_to_le32(DM_CACHE_METADATA_BLOCK_SIZE);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000357 disk_super->data_block_size = cpu_to_le32(cmd->data_block_size);
358 disk_super->cache_blocks = cpu_to_le32(0);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000359
360 disk_super->read_hits = cpu_to_le32(0);
361 disk_super->read_misses = cpu_to_le32(0);
362 disk_super->write_hits = cpu_to_le32(0);
363 disk_super->write_misses = cpu_to_le32(0);
364
365 return dm_tm_commit(cmd->tm, sblock);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000366}
367
368static int __format_metadata(struct dm_cache_metadata *cmd)
369{
370 int r;
371
372 r = dm_tm_create_with_sm(cmd->bm, CACHE_SUPERBLOCK_LOCATION,
373 &cmd->tm, &cmd->metadata_sm);
374 if (r < 0) {
375 DMERR("tm_create_with_sm failed");
376 return r;
377 }
378
379 __setup_mapping_info(cmd);
380
381 r = dm_array_empty(&cmd->info, &cmd->root);
382 if (r < 0)
383 goto bad;
384
385 dm_disk_bitset_init(cmd->tm, &cmd->discard_info);
386
387 r = dm_bitset_empty(&cmd->discard_info, &cmd->discard_root);
388 if (r < 0)
389 goto bad;
390
391 cmd->discard_block_size = 0;
392 cmd->discard_nr_blocks = 0;
393
394 r = __write_initial_superblock(cmd);
395 if (r)
396 goto bad;
397
398 cmd->clean_when_opened = true;
399 return 0;
400
401bad:
402 dm_tm_destroy(cmd->tm);
403 dm_sm_destroy(cmd->metadata_sm);
404
405 return r;
406}
407
408static int __check_incompat_features(struct cache_disk_superblock *disk_super,
409 struct dm_cache_metadata *cmd)
410{
411 uint32_t features;
412
413 features = le32_to_cpu(disk_super->incompat_flags) & ~DM_CACHE_FEATURE_INCOMPAT_SUPP;
414 if (features) {
415 DMERR("could not access metadata due to unsupported optional features (%lx).",
416 (unsigned long)features);
417 return -EINVAL;
418 }
419
420 /*
421 * Check for read-only metadata to skip the following RDWR checks.
422 */
423 if (get_disk_ro(cmd->bdev->bd_disk))
424 return 0;
425
426 features = le32_to_cpu(disk_super->compat_ro_flags) & ~DM_CACHE_FEATURE_COMPAT_RO_SUPP;
427 if (features) {
428 DMERR("could not access metadata RDWR due to unsupported optional features (%lx).",
429 (unsigned long)features);
430 return -EINVAL;
431 }
432
433 return 0;
434}
435
436static int __open_metadata(struct dm_cache_metadata *cmd)
437{
438 int r;
439 struct dm_block *sblock;
440 struct cache_disk_superblock *disk_super;
441 unsigned long sb_flags;
442
443 r = superblock_read_lock(cmd, &sblock);
444 if (r < 0) {
445 DMERR("couldn't read lock superblock");
446 return r;
447 }
448
449 disk_super = dm_block_data(sblock);
450
Mike Snitzer048e5a02014-07-14 16:59:39 -0400451 /* Verify the data block size hasn't changed */
452 if (le32_to_cpu(disk_super->data_block_size) != cmd->data_block_size) {
453 DMERR("changing the data block size (from %u to %llu) is not supported",
454 le32_to_cpu(disk_super->data_block_size),
455 (unsigned long long)cmd->data_block_size);
456 r = -EINVAL;
457 goto bad;
458 }
459
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000460 r = __check_incompat_features(disk_super, cmd);
461 if (r < 0)
462 goto bad;
463
464 r = dm_tm_open_with_sm(cmd->bm, CACHE_SUPERBLOCK_LOCATION,
465 disk_super->metadata_space_map_root,
466 sizeof(disk_super->metadata_space_map_root),
467 &cmd->tm, &cmd->metadata_sm);
468 if (r < 0) {
469 DMERR("tm_open_with_sm failed");
470 goto bad;
471 }
472
473 __setup_mapping_info(cmd);
474 dm_disk_bitset_init(cmd->tm, &cmd->discard_info);
475 sb_flags = le32_to_cpu(disk_super->flags);
476 cmd->clean_when_opened = test_bit(CLEAN_SHUTDOWN, &sb_flags);
Mikulas Patocka4c7da062015-10-22 16:46:59 -0400477 dm_bm_unlock(sblock);
478
479 return 0;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000480
481bad:
482 dm_bm_unlock(sblock);
483 return r;
484}
485
486static int __open_or_format_metadata(struct dm_cache_metadata *cmd,
487 bool format_device)
488{
Joe Thornberdd8b0c22013-10-24 14:10:28 -0400489 int r;
490 bool unformatted = false;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000491
492 r = __superblock_all_zeroes(cmd->bm, &unformatted);
493 if (r)
494 return r;
495
496 if (unformatted)
497 return format_device ? __format_metadata(cmd) : -EPERM;
498
499 return __open_metadata(cmd);
500}
501
502static int __create_persistent_data_objects(struct dm_cache_metadata *cmd,
503 bool may_format_device)
504{
505 int r;
Mike Snitzer895b47d2014-07-14 15:37:18 -0400506 cmd->bm = dm_block_manager_create(cmd->bdev, DM_CACHE_METADATA_BLOCK_SIZE << SECTOR_SHIFT,
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000507 CACHE_METADATA_CACHE_SIZE,
508 CACHE_MAX_CONCURRENT_LOCKS);
509 if (IS_ERR(cmd->bm)) {
510 DMERR("could not create block manager");
511 return PTR_ERR(cmd->bm);
512 }
513
514 r = __open_or_format_metadata(cmd, may_format_device);
515 if (r)
516 dm_block_manager_destroy(cmd->bm);
517
518 return r;
519}
520
521static void __destroy_persistent_data_objects(struct dm_cache_metadata *cmd)
522{
523 dm_sm_destroy(cmd->metadata_sm);
524 dm_tm_destroy(cmd->tm);
525 dm_block_manager_destroy(cmd->bm);
526}
527
528typedef unsigned long (*flags_mutator)(unsigned long);
529
530static void update_flags(struct cache_disk_superblock *disk_super,
531 flags_mutator mutator)
532{
533 uint32_t sb_flags = mutator(le32_to_cpu(disk_super->flags));
534 disk_super->flags = cpu_to_le32(sb_flags);
535}
536
537static unsigned long set_clean_shutdown(unsigned long flags)
538{
539 set_bit(CLEAN_SHUTDOWN, &flags);
540 return flags;
541}
542
543static unsigned long clear_clean_shutdown(unsigned long flags)
544{
545 clear_bit(CLEAN_SHUTDOWN, &flags);
546 return flags;
547}
548
549static void read_superblock_fields(struct dm_cache_metadata *cmd,
550 struct cache_disk_superblock *disk_super)
551{
Joe Thornber028ae9f2015-04-22 16:42:35 -0400552 cmd->flags = le32_to_cpu(disk_super->flags);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000553 cmd->root = le64_to_cpu(disk_super->mapping_root);
554 cmd->hint_root = le64_to_cpu(disk_super->hint_root);
555 cmd->discard_root = le64_to_cpu(disk_super->discard_root);
556 cmd->discard_block_size = le64_to_cpu(disk_super->discard_block_size);
Joe Thornber1bad9bc2014-11-07 14:47:07 +0000557 cmd->discard_nr_blocks = to_dblock(le64_to_cpu(disk_super->discard_nr_blocks));
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000558 cmd->data_block_size = le32_to_cpu(disk_super->data_block_size);
559 cmd->cache_blocks = to_cblock(le32_to_cpu(disk_super->cache_blocks));
560 strncpy(cmd->policy_name, disk_super->policy_name, sizeof(cmd->policy_name));
Mike Snitzer4e7f5062013-03-20 17:21:27 +0000561 cmd->policy_version[0] = le32_to_cpu(disk_super->policy_version[0]);
562 cmd->policy_version[1] = le32_to_cpu(disk_super->policy_version[1]);
563 cmd->policy_version[2] = le32_to_cpu(disk_super->policy_version[2]);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000564 cmd->policy_hint_size = le32_to_cpu(disk_super->policy_hint_size);
565
566 cmd->stats.read_hits = le32_to_cpu(disk_super->read_hits);
567 cmd->stats.read_misses = le32_to_cpu(disk_super->read_misses);
568 cmd->stats.write_hits = le32_to_cpu(disk_super->write_hits);
569 cmd->stats.write_misses = le32_to_cpu(disk_super->write_misses);
570
571 cmd->changed = false;
572}
573
574/*
575 * The mutator updates the superblock flags.
576 */
577static int __begin_transaction_flags(struct dm_cache_metadata *cmd,
578 flags_mutator mutator)
579{
580 int r;
581 struct cache_disk_superblock *disk_super;
582 struct dm_block *sblock;
583
584 r = superblock_lock(cmd, &sblock);
585 if (r)
586 return r;
587
588 disk_super = dm_block_data(sblock);
589 update_flags(disk_super, mutator);
590 read_superblock_fields(cmd, disk_super);
Joe Thornbera9d45392014-03-27 14:13:20 +0000591 dm_bm_unlock(sblock);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000592
Joe Thornbera9d45392014-03-27 14:13:20 +0000593 return dm_bm_flush(cmd->bm);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000594}
595
596static int __begin_transaction(struct dm_cache_metadata *cmd)
597{
598 int r;
599 struct cache_disk_superblock *disk_super;
600 struct dm_block *sblock;
601
602 /*
603 * We re-read the superblock every time. Shouldn't need to do this
604 * really.
605 */
606 r = superblock_read_lock(cmd, &sblock);
607 if (r)
608 return r;
609
610 disk_super = dm_block_data(sblock);
611 read_superblock_fields(cmd, disk_super);
612 dm_bm_unlock(sblock);
613
614 return 0;
615}
616
617static int __commit_transaction(struct dm_cache_metadata *cmd,
618 flags_mutator mutator)
619{
620 int r;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000621 struct cache_disk_superblock *disk_super;
622 struct dm_block *sblock;
623
624 /*
625 * We need to know if the cache_disk_superblock exceeds a 512-byte sector.
626 */
627 BUILD_BUG_ON(sizeof(struct cache_disk_superblock) > 512);
628
629 r = dm_bitset_flush(&cmd->discard_info, cmd->discard_root,
630 &cmd->discard_root);
631 if (r)
632 return r;
633
634 r = dm_tm_pre_commit(cmd->tm);
635 if (r < 0)
636 return r;
637
Joe Thornber5a320832014-03-27 14:13:23 +0000638 r = __save_sm_root(cmd);
639 if (r)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000640 return r;
641
642 r = superblock_lock(cmd, &sblock);
643 if (r)
644 return r;
645
646 disk_super = dm_block_data(sblock);
647
Joe Thornber3201ac42015-10-22 18:10:55 +0100648 disk_super->flags = cpu_to_le32(cmd->flags);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000649 if (mutator)
650 update_flags(disk_super, mutator);
651
652 disk_super->mapping_root = cpu_to_le64(cmd->root);
653 disk_super->hint_root = cpu_to_le64(cmd->hint_root);
654 disk_super->discard_root = cpu_to_le64(cmd->discard_root);
655 disk_super->discard_block_size = cpu_to_le64(cmd->discard_block_size);
Joe Thornber1bad9bc2014-11-07 14:47:07 +0000656 disk_super->discard_nr_blocks = cpu_to_le64(from_dblock(cmd->discard_nr_blocks));
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000657 disk_super->cache_blocks = cpu_to_le32(from_cblock(cmd->cache_blocks));
658 strncpy(disk_super->policy_name, cmd->policy_name, sizeof(disk_super->policy_name));
Mike Snitzer4e7f5062013-03-20 17:21:27 +0000659 disk_super->policy_version[0] = cpu_to_le32(cmd->policy_version[0]);
660 disk_super->policy_version[1] = cpu_to_le32(cmd->policy_version[1]);
661 disk_super->policy_version[2] = cpu_to_le32(cmd->policy_version[2]);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000662
663 disk_super->read_hits = cpu_to_le32(cmd->stats.read_hits);
664 disk_super->read_misses = cpu_to_le32(cmd->stats.read_misses);
665 disk_super->write_hits = cpu_to_le32(cmd->stats.write_hits);
666 disk_super->write_misses = cpu_to_le32(cmd->stats.write_misses);
Joe Thornber5a320832014-03-27 14:13:23 +0000667 __copy_sm_root(cmd, disk_super);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000668
669 return dm_tm_commit(cmd->tm, sblock);
670}
671
672/*----------------------------------------------------------------*/
673
674/*
675 * The mappings are held in a dm-array that has 64-bit values stored in
676 * little-endian format. The index is the cblock, the high 48bits of the
677 * value are the oblock and the low 16 bit the flags.
678 */
679#define FLAGS_MASK ((1 << 16) - 1)
680
681static __le64 pack_value(dm_oblock_t block, unsigned flags)
682{
683 uint64_t value = from_oblock(block);
684 value <<= 16;
685 value = value | (flags & FLAGS_MASK);
686 return cpu_to_le64(value);
687}
688
689static void unpack_value(__le64 value_le, dm_oblock_t *block, unsigned *flags)
690{
691 uint64_t value = le64_to_cpu(value_le);
692 uint64_t b = value >> 16;
693 *block = to_oblock(b);
694 *flags = value & FLAGS_MASK;
695}
696
697/*----------------------------------------------------------------*/
698
Joe Thornber9b1cc9f2015-01-23 10:00:07 +0000699static struct dm_cache_metadata *metadata_open(struct block_device *bdev,
700 sector_t data_block_size,
701 bool may_format_device,
702 size_t policy_hint_size)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000703{
704 int r;
705 struct dm_cache_metadata *cmd;
706
707 cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
708 if (!cmd) {
709 DMERR("could not allocate metadata struct");
Joe Thornber766a7882015-01-28 12:07:46 +0000710 return ERR_PTR(-ENOMEM);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000711 }
712
Joe Thornber9b1cc9f2015-01-23 10:00:07 +0000713 atomic_set(&cmd->ref_count, 1);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000714 init_rwsem(&cmd->root_lock);
715 cmd->bdev = bdev;
716 cmd->data_block_size = data_block_size;
717 cmd->cache_blocks = 0;
718 cmd->policy_hint_size = policy_hint_size;
719 cmd->changed = true;
Joe Thornber028ae9f2015-04-22 16:42:35 -0400720 cmd->fail_io = false;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000721
722 r = __create_persistent_data_objects(cmd, may_format_device);
723 if (r) {
724 kfree(cmd);
725 return ERR_PTR(r);
726 }
727
728 r = __begin_transaction_flags(cmd, clear_clean_shutdown);
729 if (r < 0) {
730 dm_cache_metadata_close(cmd);
731 return ERR_PTR(r);
732 }
733
734 return cmd;
735}
736
Joe Thornber9b1cc9f2015-01-23 10:00:07 +0000737/*
738 * We keep a little list of ref counted metadata objects to prevent two
739 * different target instances creating separate bufio instances. This is
740 * an issue if a table is reloaded before the suspend.
741 */
742static DEFINE_MUTEX(table_lock);
743static LIST_HEAD(table);
744
745static struct dm_cache_metadata *lookup(struct block_device *bdev)
746{
747 struct dm_cache_metadata *cmd;
748
749 list_for_each_entry(cmd, &table, list)
750 if (cmd->bdev == bdev) {
751 atomic_inc(&cmd->ref_count);
752 return cmd;
753 }
754
755 return NULL;
756}
757
758static struct dm_cache_metadata *lookup_or_open(struct block_device *bdev,
759 sector_t data_block_size,
760 bool may_format_device,
761 size_t policy_hint_size)
762{
763 struct dm_cache_metadata *cmd, *cmd2;
764
765 mutex_lock(&table_lock);
766 cmd = lookup(bdev);
767 mutex_unlock(&table_lock);
768
769 if (cmd)
770 return cmd;
771
772 cmd = metadata_open(bdev, data_block_size, may_format_device, policy_hint_size);
Joe Thornber766a7882015-01-28 12:07:46 +0000773 if (!IS_ERR(cmd)) {
Joe Thornber9b1cc9f2015-01-23 10:00:07 +0000774 mutex_lock(&table_lock);
775 cmd2 = lookup(bdev);
776 if (cmd2) {
777 mutex_unlock(&table_lock);
778 __destroy_persistent_data_objects(cmd);
779 kfree(cmd);
780 return cmd2;
781 }
782 list_add(&cmd->list, &table);
783 mutex_unlock(&table_lock);
784 }
785
786 return cmd;
787}
788
789static bool same_params(struct dm_cache_metadata *cmd, sector_t data_block_size)
790{
791 if (cmd->data_block_size != data_block_size) {
792 DMERR("data_block_size (%llu) different from that in metadata (%llu)\n",
793 (unsigned long long) data_block_size,
794 (unsigned long long) cmd->data_block_size);
795 return false;
796 }
797
798 return true;
799}
800
801struct dm_cache_metadata *dm_cache_metadata_open(struct block_device *bdev,
802 sector_t data_block_size,
803 bool may_format_device,
804 size_t policy_hint_size)
805{
806 struct dm_cache_metadata *cmd = lookup_or_open(bdev, data_block_size,
807 may_format_device, policy_hint_size);
Joe Thornber766a7882015-01-28 12:07:46 +0000808
809 if (!IS_ERR(cmd) && !same_params(cmd, data_block_size)) {
Joe Thornber9b1cc9f2015-01-23 10:00:07 +0000810 dm_cache_metadata_close(cmd);
Joe Thornber766a7882015-01-28 12:07:46 +0000811 return ERR_PTR(-EINVAL);
Joe Thornber9b1cc9f2015-01-23 10:00:07 +0000812 }
813
814 return cmd;
815}
816
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000817void dm_cache_metadata_close(struct dm_cache_metadata *cmd)
818{
Joe Thornber9b1cc9f2015-01-23 10:00:07 +0000819 if (atomic_dec_and_test(&cmd->ref_count)) {
820 mutex_lock(&table_lock);
821 list_del(&cmd->list);
822 mutex_unlock(&table_lock);
823
Joe Thornber028ae9f2015-04-22 16:42:35 -0400824 if (!cmd->fail_io)
825 __destroy_persistent_data_objects(cmd);
Joe Thornber9b1cc9f2015-01-23 10:00:07 +0000826 kfree(cmd);
827 }
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000828}
829
Joe Thornberf494a9c2013-10-31 13:55:49 -0400830/*
831 * Checks that the given cache block is either unmapped or clean.
832 */
833static int block_unmapped_or_clean(struct dm_cache_metadata *cmd, dm_cblock_t b,
834 bool *result)
835{
836 int r;
837 __le64 value;
838 dm_oblock_t ob;
839 unsigned flags;
840
841 r = dm_array_get_value(&cmd->info, cmd->root, from_cblock(b), &value);
842 if (r) {
843 DMERR("block_unmapped_or_clean failed");
844 return r;
845 }
846
847 unpack_value(value, &ob, &flags);
848 *result = !((flags & M_VALID) && (flags & M_DIRTY));
849
850 return 0;
851}
852
853static int blocks_are_unmapped_or_clean(struct dm_cache_metadata *cmd,
854 dm_cblock_t begin, dm_cblock_t end,
855 bool *result)
856{
857 int r;
858 *result = true;
859
860 while (begin != end) {
861 r = block_unmapped_or_clean(cmd, begin, result);
862 if (r)
863 return r;
864
865 if (!*result) {
866 DMERR("cache block %llu is dirty",
867 (unsigned long long) from_cblock(begin));
868 return 0;
869 }
870
871 begin = to_cblock(from_cblock(begin) + 1);
872 }
873
874 return 0;
875}
876
Mike Snitzer95673662016-04-12 12:14:46 -0400877static bool cmd_write_lock(struct dm_cache_metadata *cmd)
878{
879 down_write(&cmd->root_lock);
880 if (cmd->fail_io || dm_bm_is_read_only(cmd->bm)) {
881 up_write(&cmd->root_lock);
882 return false;
Joe Thornberd14fcf32016-03-10 16:20:58 +0000883 }
Mike Snitzer95673662016-04-12 12:14:46 -0400884 return true;
885}
Joe Thornber028ae9f2015-04-22 16:42:35 -0400886
Mike Snitzer95673662016-04-12 12:14:46 -0400887#define WRITE_LOCK(cmd) \
888 do { \
889 if (!cmd_write_lock((cmd))) \
890 return -EINVAL; \
891 } while(0)
892
893#define WRITE_LOCK_VOID(cmd) \
894 do { \
895 if (!cmd_write_lock((cmd))) \
896 return; \
897 } while(0)
Joe Thornber028ae9f2015-04-22 16:42:35 -0400898
899#define WRITE_UNLOCK(cmd) \
Mike Snitzer95673662016-04-12 12:14:46 -0400900 up_write(&(cmd)->root_lock)
Joe Thornber028ae9f2015-04-22 16:42:35 -0400901
Mike Snitzer95673662016-04-12 12:14:46 -0400902static bool cmd_read_lock(struct dm_cache_metadata *cmd)
903{
Ahmed Samy6545b602016-04-17 05:37:09 +0000904 down_read(&cmd->root_lock);
Mike Snitzer95673662016-04-12 12:14:46 -0400905 if (cmd->fail_io) {
Ahmed Samy6545b602016-04-17 05:37:09 +0000906 up_read(&cmd->root_lock);
Mike Snitzer95673662016-04-12 12:14:46 -0400907 return false;
Joe Thornberd14fcf32016-03-10 16:20:58 +0000908 }
Mike Snitzer95673662016-04-12 12:14:46 -0400909 return true;
910}
Joe Thornberd14fcf32016-03-10 16:20:58 +0000911
Mike Snitzer95673662016-04-12 12:14:46 -0400912#define READ_LOCK(cmd) \
913 do { \
914 if (!cmd_read_lock((cmd))) \
915 return -EINVAL; \
916 } while(0)
917
918#define READ_LOCK_VOID(cmd) \
919 do { \
920 if (!cmd_read_lock((cmd))) \
921 return; \
922 } while(0)
Joe Thornberd14fcf32016-03-10 16:20:58 +0000923
924#define READ_UNLOCK(cmd) \
Mike Snitzer95673662016-04-12 12:14:46 -0400925 up_read(&(cmd)->root_lock)
Joe Thornberd14fcf32016-03-10 16:20:58 +0000926
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000927int dm_cache_resize(struct dm_cache_metadata *cmd, dm_cblock_t new_cache_size)
928{
929 int r;
Joe Thornberf494a9c2013-10-31 13:55:49 -0400930 bool clean;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000931 __le64 null_mapping = pack_value(0, 0);
932
Joe Thornber028ae9f2015-04-22 16:42:35 -0400933 WRITE_LOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000934 __dm_bless_for_disk(&null_mapping);
Joe Thornberf494a9c2013-10-31 13:55:49 -0400935
936 if (from_cblock(new_cache_size) < from_cblock(cmd->cache_blocks)) {
937 r = blocks_are_unmapped_or_clean(cmd, new_cache_size, cmd->cache_blocks, &clean);
938 if (r) {
939 __dm_unbless_for_disk(&null_mapping);
940 goto out;
941 }
942
943 if (!clean) {
944 DMERR("unable to shrink cache due to dirty blocks");
945 r = -EINVAL;
946 __dm_unbless_for_disk(&null_mapping);
947 goto out;
948 }
949 }
950
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000951 r = dm_array_resize(&cmd->info, cmd->root, from_cblock(cmd->cache_blocks),
952 from_cblock(new_cache_size),
953 &null_mapping, &cmd->root);
954 if (!r)
955 cmd->cache_blocks = new_cache_size;
956 cmd->changed = true;
Joe Thornberf494a9c2013-10-31 13:55:49 -0400957
958out:
Joe Thornber028ae9f2015-04-22 16:42:35 -0400959 WRITE_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000960
961 return r;
962}
963
964int dm_cache_discard_bitset_resize(struct dm_cache_metadata *cmd,
965 sector_t discard_block_size,
Joe Thornber1bad9bc2014-11-07 14:47:07 +0000966 dm_dblock_t new_nr_entries)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000967{
968 int r;
969
Joe Thornber028ae9f2015-04-22 16:42:35 -0400970 WRITE_LOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000971 r = dm_bitset_resize(&cmd->discard_info,
972 cmd->discard_root,
Joe Thornber1bad9bc2014-11-07 14:47:07 +0000973 from_dblock(cmd->discard_nr_blocks),
974 from_dblock(new_nr_entries),
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000975 false, &cmd->discard_root);
976 if (!r) {
977 cmd->discard_block_size = discard_block_size;
978 cmd->discard_nr_blocks = new_nr_entries;
979 }
980
981 cmd->changed = true;
Joe Thornber028ae9f2015-04-22 16:42:35 -0400982 WRITE_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000983
984 return r;
985}
986
Joe Thornber1bad9bc2014-11-07 14:47:07 +0000987static int __set_discard(struct dm_cache_metadata *cmd, dm_dblock_t b)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000988{
989 return dm_bitset_set_bit(&cmd->discard_info, cmd->discard_root,
Joe Thornber1bad9bc2014-11-07 14:47:07 +0000990 from_dblock(b), &cmd->discard_root);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000991}
992
Joe Thornber1bad9bc2014-11-07 14:47:07 +0000993static int __clear_discard(struct dm_cache_metadata *cmd, dm_dblock_t b)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000994{
995 return dm_bitset_clear_bit(&cmd->discard_info, cmd->discard_root,
Joe Thornber1bad9bc2014-11-07 14:47:07 +0000996 from_dblock(b), &cmd->discard_root);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +0000997}
998
Joe Thornber1bad9bc2014-11-07 14:47:07 +0000999static int __is_discarded(struct dm_cache_metadata *cmd, dm_dblock_t b,
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001000 bool *is_discarded)
1001{
1002 return dm_bitset_test_bit(&cmd->discard_info, cmd->discard_root,
Joe Thornber1bad9bc2014-11-07 14:47:07 +00001003 from_dblock(b), &cmd->discard_root,
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001004 is_discarded);
1005}
1006
1007static int __discard(struct dm_cache_metadata *cmd,
Joe Thornber1bad9bc2014-11-07 14:47:07 +00001008 dm_dblock_t dblock, bool discard)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001009{
1010 int r;
1011
1012 r = (discard ? __set_discard : __clear_discard)(cmd, dblock);
1013 if (r)
1014 return r;
1015
1016 cmd->changed = true;
1017 return 0;
1018}
1019
1020int dm_cache_set_discard(struct dm_cache_metadata *cmd,
Joe Thornber1bad9bc2014-11-07 14:47:07 +00001021 dm_dblock_t dblock, bool discard)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001022{
1023 int r;
1024
Joe Thornber028ae9f2015-04-22 16:42:35 -04001025 WRITE_LOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001026 r = __discard(cmd, dblock, discard);
Joe Thornber028ae9f2015-04-22 16:42:35 -04001027 WRITE_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001028
1029 return r;
1030}
1031
1032static int __load_discards(struct dm_cache_metadata *cmd,
1033 load_discard_fn fn, void *context)
1034{
1035 int r = 0;
1036 dm_block_t b;
1037 bool discard;
1038
Joe Thornber1bad9bc2014-11-07 14:47:07 +00001039 for (b = 0; b < from_dblock(cmd->discard_nr_blocks); b++) {
1040 dm_dblock_t dblock = to_dblock(b);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001041
1042 if (cmd->clean_when_opened) {
1043 r = __is_discarded(cmd, dblock, &discard);
1044 if (r)
1045 return r;
1046 } else
1047 discard = false;
1048
1049 r = fn(context, cmd->discard_block_size, dblock, discard);
1050 if (r)
1051 break;
1052 }
1053
1054 return r;
1055}
1056
1057int dm_cache_load_discards(struct dm_cache_metadata *cmd,
1058 load_discard_fn fn, void *context)
1059{
1060 int r;
1061
Joe Thornberd14fcf32016-03-10 16:20:58 +00001062 READ_LOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001063 r = __load_discards(cmd, fn, context);
Joe Thornberd14fcf32016-03-10 16:20:58 +00001064 READ_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001065
1066 return r;
1067}
1068
Joe Thornberd14fcf32016-03-10 16:20:58 +00001069int dm_cache_size(struct dm_cache_metadata *cmd, dm_cblock_t *result)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001070{
Joe Thornberd14fcf32016-03-10 16:20:58 +00001071 READ_LOCK(cmd);
1072 *result = cmd->cache_blocks;
1073 READ_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001074
Joe Thornberd14fcf32016-03-10 16:20:58 +00001075 return 0;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001076}
1077
1078static int __remove(struct dm_cache_metadata *cmd, dm_cblock_t cblock)
1079{
1080 int r;
1081 __le64 value = pack_value(0, 0);
1082
1083 __dm_bless_for_disk(&value);
1084 r = dm_array_set_value(&cmd->info, cmd->root, from_cblock(cblock),
1085 &value, &cmd->root);
1086 if (r)
1087 return r;
1088
1089 cmd->changed = true;
1090 return 0;
1091}
1092
1093int dm_cache_remove_mapping(struct dm_cache_metadata *cmd, dm_cblock_t cblock)
1094{
1095 int r;
1096
Joe Thornber028ae9f2015-04-22 16:42:35 -04001097 WRITE_LOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001098 r = __remove(cmd, cblock);
Joe Thornber028ae9f2015-04-22 16:42:35 -04001099 WRITE_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001100
1101 return r;
1102}
1103
1104static int __insert(struct dm_cache_metadata *cmd,
1105 dm_cblock_t cblock, dm_oblock_t oblock)
1106{
1107 int r;
1108 __le64 value = pack_value(oblock, M_VALID);
1109 __dm_bless_for_disk(&value);
1110
1111 r = dm_array_set_value(&cmd->info, cmd->root, from_cblock(cblock),
1112 &value, &cmd->root);
1113 if (r)
1114 return r;
1115
1116 cmd->changed = true;
1117 return 0;
1118}
1119
1120int dm_cache_insert_mapping(struct dm_cache_metadata *cmd,
1121 dm_cblock_t cblock, dm_oblock_t oblock)
1122{
1123 int r;
1124
Joe Thornber028ae9f2015-04-22 16:42:35 -04001125 WRITE_LOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001126 r = __insert(cmd, cblock, oblock);
Joe Thornber028ae9f2015-04-22 16:42:35 -04001127 WRITE_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001128
1129 return r;
1130}
1131
1132struct thunk {
1133 load_mapping_fn fn;
1134 void *context;
1135
1136 struct dm_cache_metadata *cmd;
1137 bool respect_dirty_flags;
1138 bool hints_valid;
1139};
1140
Mike Snitzerea2dd8c2013-03-20 17:21:28 +00001141static bool policy_unchanged(struct dm_cache_metadata *cmd,
1142 struct dm_cache_policy *policy)
1143{
1144 const char *policy_name = dm_cache_policy_get_name(policy);
1145 const unsigned *policy_version = dm_cache_policy_get_version(policy);
1146 size_t policy_hint_size = dm_cache_policy_get_hint_size(policy);
1147
1148 /*
1149 * Ensure policy names match.
1150 */
1151 if (strncmp(cmd->policy_name, policy_name, sizeof(cmd->policy_name)))
1152 return false;
1153
1154 /*
1155 * Ensure policy major versions match.
1156 */
1157 if (cmd->policy_version[0] != policy_version[0])
1158 return false;
1159
1160 /*
1161 * Ensure policy hint sizes match.
1162 */
1163 if (cmd->policy_hint_size != policy_hint_size)
1164 return false;
1165
1166 return true;
1167}
1168
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001169static bool hints_array_initialized(struct dm_cache_metadata *cmd)
1170{
1171 return cmd->hint_root && cmd->policy_hint_size;
1172}
1173
1174static bool hints_array_available(struct dm_cache_metadata *cmd,
Mike Snitzerea2dd8c2013-03-20 17:21:28 +00001175 struct dm_cache_policy *policy)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001176{
Mike Snitzerea2dd8c2013-03-20 17:21:28 +00001177 return cmd->clean_when_opened && policy_unchanged(cmd, policy) &&
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001178 hints_array_initialized(cmd);
1179}
1180
Joe Thornberf1779402016-09-20 06:16:00 -04001181static int __load_mapping(struct dm_cache_metadata *cmd,
1182 uint64_t cb, bool hints_valid,
1183 struct dm_array_cursor *mapping_cursor,
1184 struct dm_array_cursor *hint_cursor,
1185 load_mapping_fn fn, void *context)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001186{
1187 int r = 0;
Joe Thornberf1779402016-09-20 06:16:00 -04001188
1189 __le64 mapping;
1190 __le32 hint = 0;
1191
1192 __le64 *mapping_value_le;
1193 __le32 *hint_value_le;
1194
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001195 dm_oblock_t oblock;
1196 unsigned flags;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001197
Joe Thornberf1779402016-09-20 06:16:00 -04001198 dm_array_cursor_get_value(mapping_cursor, (void **) &mapping_value_le);
1199 memcpy(&mapping, mapping_value_le, sizeof(mapping));
1200 unpack_value(mapping, &oblock, &flags);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001201
1202 if (flags & M_VALID) {
Joe Thornberf1779402016-09-20 06:16:00 -04001203 if (hints_valid) {
1204 dm_array_cursor_get_value(hint_cursor, (void **) &hint_value_le);
1205 memcpy(&hint, hint_value_le, sizeof(hint));
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001206 }
1207
Joe Thornberf1779402016-09-20 06:16:00 -04001208 r = fn(context, oblock, to_cblock(cb), flags & M_DIRTY,
1209 le32_to_cpu(hint), hints_valid);
1210 if (r)
1211 DMERR("policy couldn't load cblock");
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001212 }
1213
1214 return r;
1215}
1216
Mike Snitzerea2dd8c2013-03-20 17:21:28 +00001217static int __load_mappings(struct dm_cache_metadata *cmd,
1218 struct dm_cache_policy *policy,
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001219 load_mapping_fn fn, void *context)
1220{
Joe Thornberf1779402016-09-20 06:16:00 -04001221 int r;
1222 uint64_t cb;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001223
Joe Thornberf1779402016-09-20 06:16:00 -04001224 bool hints_valid = hints_array_available(cmd, policy);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001225
Joe Thornberf1779402016-09-20 06:16:00 -04001226 if (from_cblock(cmd->cache_blocks) == 0)
1227 /* Nothing to do */
1228 return 0;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001229
Joe Thornberf1779402016-09-20 06:16:00 -04001230 r = dm_array_cursor_begin(&cmd->info, cmd->root, &cmd->mapping_cursor);
1231 if (r)
1232 return r;
1233
1234 if (hints_valid) {
1235 r = dm_array_cursor_begin(&cmd->hint_info, cmd->hint_root, &cmd->hint_cursor);
1236 if (r) {
1237 dm_array_cursor_end(&cmd->mapping_cursor);
1238 return r;
1239 }
1240 }
1241
1242 for (cb = 0; ; cb++) {
1243 r = __load_mapping(cmd, cb, hints_valid,
1244 &cmd->mapping_cursor, &cmd->hint_cursor,
1245 fn, context);
1246 if (r)
1247 goto out;
1248
1249 /*
1250 * We need to break out before we move the cursors.
1251 */
1252 if (cb >= (from_cblock(cmd->cache_blocks) - 1))
1253 break;
1254
1255 r = dm_array_cursor_next(&cmd->mapping_cursor);
1256 if (r) {
1257 DMERR("dm_array_cursor_next for mapping failed");
1258 goto out;
1259 }
1260
1261 if (hints_valid) {
1262 r = dm_array_cursor_next(&cmd->hint_cursor);
1263 if (r) {
1264 DMERR("dm_array_cursor_next for hint failed");
1265 goto out;
1266 }
1267 }
1268 }
1269out:
1270 dm_array_cursor_end(&cmd->mapping_cursor);
1271 if (hints_valid)
1272 dm_array_cursor_end(&cmd->hint_cursor);
1273
1274 return r;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001275}
1276
Mike Snitzerea2dd8c2013-03-20 17:21:28 +00001277int dm_cache_load_mappings(struct dm_cache_metadata *cmd,
1278 struct dm_cache_policy *policy,
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001279 load_mapping_fn fn, void *context)
1280{
1281 int r;
1282
Joe Thornberd14fcf32016-03-10 16:20:58 +00001283 READ_LOCK(cmd);
Mike Snitzerea2dd8c2013-03-20 17:21:28 +00001284 r = __load_mappings(cmd, policy, fn, context);
Joe Thornberd14fcf32016-03-10 16:20:58 +00001285 READ_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001286
1287 return r;
1288}
1289
1290static int __dump_mapping(void *context, uint64_t cblock, void *leaf)
1291{
1292 int r = 0;
1293 __le64 value;
1294 dm_oblock_t oblock;
1295 unsigned flags;
1296
1297 memcpy(&value, leaf, sizeof(value));
1298 unpack_value(value, &oblock, &flags);
1299
1300 return r;
1301}
1302
1303static int __dump_mappings(struct dm_cache_metadata *cmd)
1304{
1305 return dm_array_walk(&cmd->info, cmd->root, __dump_mapping, NULL);
1306}
1307
1308void dm_cache_dump(struct dm_cache_metadata *cmd)
1309{
Joe Thornberd14fcf32016-03-10 16:20:58 +00001310 READ_LOCK_VOID(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001311 __dump_mappings(cmd);
Joe Thornberd14fcf32016-03-10 16:20:58 +00001312 READ_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001313}
1314
1315int dm_cache_changed_this_transaction(struct dm_cache_metadata *cmd)
1316{
1317 int r;
1318
Joe Thornberd14fcf32016-03-10 16:20:58 +00001319 READ_LOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001320 r = cmd->changed;
Joe Thornberd14fcf32016-03-10 16:20:58 +00001321 READ_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001322
1323 return r;
1324}
1325
1326static int __dirty(struct dm_cache_metadata *cmd, dm_cblock_t cblock, bool dirty)
1327{
1328 int r;
1329 unsigned flags;
1330 dm_oblock_t oblock;
1331 __le64 value;
1332
1333 r = dm_array_get_value(&cmd->info, cmd->root, from_cblock(cblock), &value);
1334 if (r)
1335 return r;
1336
1337 unpack_value(value, &oblock, &flags);
1338
1339 if (((flags & M_DIRTY) && dirty) || (!(flags & M_DIRTY) && !dirty))
1340 /* nothing to be done */
1341 return 0;
1342
Joe Thornber79ed9ca2013-03-20 17:21:27 +00001343 value = pack_value(oblock, (flags & ~M_DIRTY) | (dirty ? M_DIRTY : 0));
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001344 __dm_bless_for_disk(&value);
1345
1346 r = dm_array_set_value(&cmd->info, cmd->root, from_cblock(cblock),
1347 &value, &cmd->root);
1348 if (r)
1349 return r;
1350
1351 cmd->changed = true;
1352 return 0;
1353
1354}
1355
1356int dm_cache_set_dirty(struct dm_cache_metadata *cmd,
1357 dm_cblock_t cblock, bool dirty)
1358{
1359 int r;
1360
Joe Thornber028ae9f2015-04-22 16:42:35 -04001361 WRITE_LOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001362 r = __dirty(cmd, cblock, dirty);
Joe Thornber028ae9f2015-04-22 16:42:35 -04001363 WRITE_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001364
1365 return r;
1366}
1367
1368void dm_cache_metadata_get_stats(struct dm_cache_metadata *cmd,
1369 struct dm_cache_statistics *stats)
1370{
Joe Thornberd14fcf32016-03-10 16:20:58 +00001371 READ_LOCK_VOID(cmd);
Joe Thornber8c5008f2013-05-10 14:37:18 +01001372 *stats = cmd->stats;
Joe Thornberd14fcf32016-03-10 16:20:58 +00001373 READ_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001374}
1375
1376void dm_cache_metadata_set_stats(struct dm_cache_metadata *cmd,
1377 struct dm_cache_statistics *stats)
1378{
Joe Thornber028ae9f2015-04-22 16:42:35 -04001379 WRITE_LOCK_VOID(cmd);
Joe Thornber8c5008f2013-05-10 14:37:18 +01001380 cmd->stats = *stats;
Joe Thornber028ae9f2015-04-22 16:42:35 -04001381 WRITE_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001382}
1383
1384int dm_cache_commit(struct dm_cache_metadata *cmd, bool clean_shutdown)
1385{
Mike Snitzere6924242017-05-05 14:40:13 -04001386 int r = -EINVAL;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001387 flags_mutator mutator = (clean_shutdown ? set_clean_shutdown :
1388 clear_clean_shutdown);
1389
Joe Thornber028ae9f2015-04-22 16:42:35 -04001390 WRITE_LOCK(cmd);
Mike Snitzere6924242017-05-05 14:40:13 -04001391 if (cmd->fail_io)
1392 goto out;
1393
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001394 r = __commit_transaction(cmd, mutator);
1395 if (r)
1396 goto out;
1397
1398 r = __begin_transaction(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001399out:
Joe Thornber028ae9f2015-04-22 16:42:35 -04001400 WRITE_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001401 return r;
1402}
1403
1404int dm_cache_get_free_metadata_block_count(struct dm_cache_metadata *cmd,
1405 dm_block_t *result)
1406{
1407 int r = -EINVAL;
1408
Joe Thornberd14fcf32016-03-10 16:20:58 +00001409 READ_LOCK(cmd);
Mike Snitzere6924242017-05-05 14:40:13 -04001410 if (!cmd->fail_io)
1411 r = dm_sm_get_nr_free(cmd->metadata_sm, result);
Joe Thornberd14fcf32016-03-10 16:20:58 +00001412 READ_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001413
1414 return r;
1415}
1416
1417int dm_cache_get_metadata_dev_size(struct dm_cache_metadata *cmd,
1418 dm_block_t *result)
1419{
1420 int r = -EINVAL;
1421
Joe Thornberd14fcf32016-03-10 16:20:58 +00001422 READ_LOCK(cmd);
Mike Snitzere6924242017-05-05 14:40:13 -04001423 if (!cmd->fail_io)
1424 r = dm_sm_get_nr_blocks(cmd->metadata_sm, result);
Joe Thornberd14fcf32016-03-10 16:20:58 +00001425 READ_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001426
1427 return r;
1428}
1429
1430/*----------------------------------------------------------------*/
1431
Joe Thornber4e781b42016-09-15 09:23:46 -04001432static int get_hint(uint32_t index, void *value_le, void *context)
1433{
1434 uint32_t value;
1435 struct dm_cache_policy *policy = context;
1436
1437 value = policy_get_hint(policy, to_cblock(index));
1438 *((__le32 *) value_le) = cpu_to_le32(value);
1439
1440 return 0;
1441}
1442
1443/*
1444 * It's quicker to always delete the hint array, and recreate with
1445 * dm_array_new().
1446 */
1447static int write_hints(struct dm_cache_metadata *cmd, struct dm_cache_policy *policy)
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001448{
1449 int r;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001450 size_t hint_size;
1451 const char *policy_name = dm_cache_policy_get_name(policy);
Mike Snitzer4e7f5062013-03-20 17:21:27 +00001452 const unsigned *policy_version = dm_cache_policy_get_version(policy);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001453
1454 if (!policy_name[0] ||
1455 (strlen(policy_name) > sizeof(cmd->policy_name) - 1))
1456 return -EINVAL;
1457
Joe Thornber4e781b42016-09-15 09:23:46 -04001458 strncpy(cmd->policy_name, policy_name, sizeof(cmd->policy_name));
1459 memcpy(cmd->policy_version, policy_version, sizeof(cmd->policy_version));
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001460
Joe Thornber4e781b42016-09-15 09:23:46 -04001461 hint_size = dm_cache_policy_get_hint_size(policy);
1462 if (!hint_size)
1463 return 0; /* short-circuit hints initialization */
1464 cmd->policy_hint_size = hint_size;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001465
Joe Thornber4e781b42016-09-15 09:23:46 -04001466 if (cmd->hint_root) {
1467 r = dm_array_del(&cmd->hint_info, cmd->hint_root);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001468 if (r)
1469 return r;
1470 }
1471
Joe Thornber4e781b42016-09-15 09:23:46 -04001472 return dm_array_new(&cmd->hint_info, &cmd->hint_root,
1473 from_cblock(cmd->cache_blocks),
1474 get_hint, policy);
Joe Thornber05966612014-04-03 16:16:44 +01001475}
1476
1477int dm_cache_write_hints(struct dm_cache_metadata *cmd, struct dm_cache_policy *policy)
1478{
1479 int r;
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001480
Joe Thornber028ae9f2015-04-22 16:42:35 -04001481 WRITE_LOCK(cmd);
Joe Thornber05966612014-04-03 16:16:44 +01001482 r = write_hints(cmd, policy);
Joe Thornber028ae9f2015-04-22 16:42:35 -04001483 WRITE_UNLOCK(cmd);
Joe Thornberc6b4fcb2013-03-01 22:45:51 +00001484
1485 return r;
1486}
Joe Thornber2ee57d52013-10-24 14:10:29 -04001487
1488int dm_cache_metadata_all_clean(struct dm_cache_metadata *cmd, bool *result)
1489{
Joe Thornberd14fcf32016-03-10 16:20:58 +00001490 int r;
1491
1492 READ_LOCK(cmd);
1493 r = blocks_are_unmapped_or_clean(cmd, 0, cmd->cache_blocks, result);
1494 READ_UNLOCK(cmd);
1495
1496 return r;
Joe Thornber2ee57d52013-10-24 14:10:29 -04001497}
Joe Thornber028ae9f2015-04-22 16:42:35 -04001498
1499void dm_cache_metadata_set_read_only(struct dm_cache_metadata *cmd)
1500{
1501 WRITE_LOCK_VOID(cmd);
1502 dm_bm_set_read_only(cmd->bm);
1503 WRITE_UNLOCK(cmd);
1504}
1505
1506void dm_cache_metadata_set_read_write(struct dm_cache_metadata *cmd)
1507{
1508 WRITE_LOCK_VOID(cmd);
1509 dm_bm_set_read_write(cmd->bm);
1510 WRITE_UNLOCK(cmd);
1511}
1512
1513int dm_cache_metadata_set_needs_check(struct dm_cache_metadata *cmd)
1514{
1515 int r;
1516 struct dm_block *sblock;
1517 struct cache_disk_superblock *disk_super;
1518
Joe Thornberd14fcf32016-03-10 16:20:58 +00001519 WRITE_LOCK(cmd);
Joe Thornber028ae9f2015-04-22 16:42:35 -04001520 set_bit(NEEDS_CHECK, &cmd->flags);
1521
1522 r = superblock_lock(cmd, &sblock);
1523 if (r) {
1524 DMERR("couldn't read superblock");
1525 goto out;
1526 }
1527
1528 disk_super = dm_block_data(sblock);
1529 disk_super->flags = cpu_to_le32(cmd->flags);
1530
1531 dm_bm_unlock(sblock);
1532
1533out:
Joe Thornberd14fcf32016-03-10 16:20:58 +00001534 WRITE_UNLOCK(cmd);
Joe Thornber028ae9f2015-04-22 16:42:35 -04001535 return r;
1536}
1537
Joe Thornberd14fcf32016-03-10 16:20:58 +00001538int dm_cache_metadata_needs_check(struct dm_cache_metadata *cmd, bool *result)
Joe Thornber028ae9f2015-04-22 16:42:35 -04001539{
Joe Thornberd14fcf32016-03-10 16:20:58 +00001540 READ_LOCK(cmd);
1541 *result = !!test_bit(NEEDS_CHECK, &cmd->flags);
1542 READ_UNLOCK(cmd);
Joe Thornber028ae9f2015-04-22 16:42:35 -04001543
Joe Thornberd14fcf32016-03-10 16:20:58 +00001544 return 0;
Joe Thornber028ae9f2015-04-22 16:42:35 -04001545}
1546
1547int dm_cache_metadata_abort(struct dm_cache_metadata *cmd)
1548{
1549 int r;
1550
1551 WRITE_LOCK(cmd);
1552 __destroy_persistent_data_objects(cmd);
1553 r = __create_persistent_data_objects(cmd, false);
1554 if (r)
1555 cmd->fail_io = true;
1556 WRITE_UNLOCK(cmd);
1557
1558 return r;
1559}