]>
Commit | Line | Data |
---|---|---|
4d05a28d | 1 | /****************************************************************************** |
4d05a28d KRW |
2 | * |
3 | * Back-end of the driver for virtual block devices. This portion of the | |
4 | * driver exports a 'unified' block-device interface that can be accessed | |
5 | * by any operating system that implements a compatible front end. A | |
6 | * reference front-end implementation can be found in: | |
a1397fa3 | 7 | * drivers/block/xen-blkfront.c |
4d05a28d KRW |
8 | * |
9 | * Copyright (c) 2003-2004, Keir Fraser & Steve Hand | |
10 | * Copyright (c) 2005, Christopher Clark | |
11 | * | |
12 | * This program is free software; you can redistribute it and/or | |
13 | * modify it under the terms of the GNU General Public License version 2 | |
14 | * as published by the Free Software Foundation; or, when distributed | |
15 | * separately from the Linux kernel or incorporated into other | |
16 | * software packages, subject to the following license: | |
17 | * | |
18 | * Permission is hereby granted, free of charge, to any person obtaining a copy | |
19 | * of this source file (the "Software"), to deal in the Software without | |
20 | * restriction, including without limitation the rights to use, copy, modify, | |
21 | * merge, publish, distribute, sublicense, and/or sell copies of the Software, | |
22 | * and to permit persons to whom the Software is furnished to do so, subject to | |
23 | * the following conditions: | |
24 | * | |
25 | * The above copyright notice and this permission notice shall be included in | |
26 | * all copies or substantial portions of the Software. | |
27 | * | |
28 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | |
29 | * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | |
30 | * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | |
31 | * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | |
32 | * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING | |
33 | * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS | |
34 | * IN THE SOFTWARE. | |
35 | */ | |
36 | ||
77387b82 TC |
37 | #define pr_fmt(fmt) "xen-blkback: " fmt |
38 | ||
4d05a28d KRW |
39 | #include <linux/spinlock.h> |
40 | #include <linux/kthread.h> | |
41 | #include <linux/list.h> | |
42 | #include <linux/delay.h> | |
88122933 | 43 | #include <linux/freezer.h> |
0a8704a5 | 44 | #include <linux/bitmap.h> |
afd91d07 | 45 | |
88122933 JF |
46 | #include <xen/events.h> |
47 | #include <xen/page.h> | |
e79affc3 | 48 | #include <xen/xen.h> |
88122933 JF |
49 | #include <asm/xen/hypervisor.h> |
50 | #include <asm/xen/hypercall.h> | |
087ffecd | 51 | #include <xen/balloon.h> |
c43cf3ea | 52 | #include <xen/grant_table.h> |
4d05a28d KRW |
53 | #include "common.h" |
54 | ||
c6cc142d RPM |
55 | /* |
56 | * Maximum number of unused free pages to keep in the internal buffer. | |
57 | * Setting this to a value too low will reduce memory used in each backend, | |
58 | * but can have a performance penalty. | |
59 | * | |
60 | * A sane value is xen_blkif_reqs * BLKIF_MAX_SEGMENTS_PER_REQUEST, but can | |
61 | * be set to a lower value that might degrade performance on some intensive | |
62 | * IO workloads. | |
63 | */ | |
64 | ||
402b27f9 | 65 | static int xen_blkif_max_buffer_pages = 1024; |
c6cc142d RPM |
66 | module_param_named(max_buffer_pages, xen_blkif_max_buffer_pages, int, 0644); |
67 | MODULE_PARM_DESC(max_buffer_pages, | |
68 | "Maximum number of free pages to keep in each block backend buffer"); | |
69 | ||
3f3aad5e RPM |
70 | /* |
71 | * Maximum number of grants to map persistently in blkback. For maximum | |
72 | * performance this should be the total numbers of grants that can be used | |
73 | * to fill the ring, but since this might become too high, specially with | |
74 | * the use of indirect descriptors, we set it to a value that provides good | |
75 | * performance without using too much memory. | |
76 | * | |
77 | * When the list of persistent grants is full we clean it up using a LRU | |
78 | * algorithm. | |
79 | */ | |
80 | ||
402b27f9 | 81 | static int xen_blkif_max_pgrants = 1056; |
3f3aad5e RPM |
82 | module_param_named(max_persistent_grants, xen_blkif_max_pgrants, int, 0644); |
83 | MODULE_PARM_DESC(max_persistent_grants, | |
84 | "Maximum number of grants to map persistently"); | |
85 | ||
86839c56 BL |
86 | /* |
87 | * Maximum order of pages to be used for the shared ring between front and | |
88 | * backend, 4KB page granularity is used. | |
89 | */ | |
90 | unsigned int xen_blkif_max_ring_order = XENBUS_MAX_RING_PAGE_ORDER; | |
91 | module_param_named(max_ring_page_order, xen_blkif_max_ring_order, int, S_IRUGO); | |
92 | MODULE_PARM_DESC(max_ring_page_order, "Maximum order of pages to be used for the shared ring"); | |
3f3aad5e RPM |
93 | /* |
94 | * The LRU mechanism to clean the lists of persistent grants needs to | |
95 | * be executed periodically. The time interval between consecutive executions | |
96 | * of the purge mechanism is set in ms. | |
97 | */ | |
98 | #define LRU_INTERVAL 100 | |
99 | ||
100 | /* | |
101 | * When the persistent grants list is full we will remove unused grants | |
102 | * from the list. The percent number of grants to be removed at each LRU | |
103 | * execution. | |
104 | */ | |
105 | #define LRU_PERCENT_CLEAN 5 | |
106 | ||
4d05a28d | 107 | /* Run-time switchable: /sys/module/blkback/parameters/ */ |
2e9977c2 | 108 | static unsigned int log_stats; |
4d05a28d | 109 | module_param(log_stats, int, 0644); |
4d05a28d | 110 | |
4d05a28d KRW |
111 | #define BLKBACK_INVALID_HANDLE (~0) |
112 | ||
ff4b156f | 113 | /* Number of free pages to remove on each call to gnttab_free_pages */ |
c6cc142d RPM |
114 | #define NUM_BATCH_FREE_PAGES 10 |
115 | ||
c6cc142d RPM |
116 | static inline int get_free_page(struct xen_blkif *blkif, struct page **page) |
117 | { | |
118 | unsigned long flags; | |
119 | ||
120 | spin_lock_irqsave(&blkif->free_pages_lock, flags); | |
121 | if (list_empty(&blkif->free_pages)) { | |
122 | BUG_ON(blkif->free_pages_num != 0); | |
123 | spin_unlock_irqrestore(&blkif->free_pages_lock, flags); | |
ff4b156f | 124 | return gnttab_alloc_pages(1, page); |
c6cc142d RPM |
125 | } |
126 | BUG_ON(blkif->free_pages_num == 0); | |
127 | page[0] = list_first_entry(&blkif->free_pages, struct page, lru); | |
128 | list_del(&page[0]->lru); | |
129 | blkif->free_pages_num--; | |
130 | spin_unlock_irqrestore(&blkif->free_pages_lock, flags); | |
efe08a3e | 131 | |
c6cc142d RPM |
132 | return 0; |
133 | } | |
134 | ||
135 | static inline void put_free_pages(struct xen_blkif *blkif, struct page **page, | |
136 | int num) | |
4d05a28d | 137 | { |
c6cc142d RPM |
138 | unsigned long flags; |
139 | int i; | |
140 | ||
141 | spin_lock_irqsave(&blkif->free_pages_lock, flags); | |
142 | for (i = 0; i < num; i++) | |
143 | list_add(&page[i]->lru, &blkif->free_pages); | |
144 | blkif->free_pages_num += num; | |
145 | spin_unlock_irqrestore(&blkif->free_pages_lock, flags); | |
146 | } | |
147 | ||
148 | static inline void shrink_free_pagepool(struct xen_blkif *blkif, int num) | |
149 | { | |
150 | /* Remove requested pages in batches of NUM_BATCH_FREE_PAGES */ | |
151 | struct page *page[NUM_BATCH_FREE_PAGES]; | |
152 | unsigned int num_pages = 0; | |
153 | unsigned long flags; | |
154 | ||
155 | spin_lock_irqsave(&blkif->free_pages_lock, flags); | |
156 | while (blkif->free_pages_num > num) { | |
157 | BUG_ON(list_empty(&blkif->free_pages)); | |
158 | page[num_pages] = list_first_entry(&blkif->free_pages, | |
159 | struct page, lru); | |
160 | list_del(&page[num_pages]->lru); | |
161 | blkif->free_pages_num--; | |
162 | if (++num_pages == NUM_BATCH_FREE_PAGES) { | |
163 | spin_unlock_irqrestore(&blkif->free_pages_lock, flags); | |
ff4b156f | 164 | gnttab_free_pages(num_pages, page); |
c6cc142d RPM |
165 | spin_lock_irqsave(&blkif->free_pages_lock, flags); |
166 | num_pages = 0; | |
167 | } | |
168 | } | |
169 | spin_unlock_irqrestore(&blkif->free_pages_lock, flags); | |
170 | if (num_pages != 0) | |
ff4b156f | 171 | gnttab_free_pages(num_pages, page); |
4d05a28d KRW |
172 | } |
173 | ||
c6cc142d RPM |
174 | #define vaddr(page) ((unsigned long)pfn_to_kaddr(page_to_pfn(page))) |
175 | ||
30fd1502 KRW |
176 | static int do_block_io_op(struct xen_blkif *blkif); |
177 | static int dispatch_rw_block_io(struct xen_blkif *blkif, | |
fc53bf75 KRW |
178 | struct blkif_request *req, |
179 | struct pending_req *pending_req); | |
30fd1502 | 180 | static void make_response(struct xen_blkif *blkif, u64 id, |
4d05a28d KRW |
181 | unsigned short op, int st); |
182 | ||
7dc34117 RPM |
183 | #define foreach_grant_safe(pos, n, rbtree, node) \ |
184 | for ((pos) = container_of(rb_first((rbtree)), typeof(*(pos)), node), \ | |
217fd5e7 | 185 | (n) = (&(pos)->node != NULL) ? rb_next(&(pos)->node) : NULL; \ |
0a8704a5 | 186 | &(pos)->node != NULL; \ |
7dc34117 RPM |
187 | (pos) = container_of(n, typeof(*(pos)), node), \ |
188 | (n) = (&(pos)->node != NULL) ? rb_next(&(pos)->node) : NULL) | |
0a8704a5 RPM |
189 | |
190 | ||
3f3aad5e RPM |
191 | /* |
192 | * We don't need locking around the persistent grant helpers | |
193 | * because blkback uses a single-thread for each backed, so we | |
194 | * can be sure that this functions will never be called recursively. | |
195 | * | |
196 | * The only exception to that is put_persistent_grant, that can be called | |
197 | * from interrupt context (by xen_blkbk_unmap), so we have to use atomic | |
198 | * bit operations to modify the flags of a persistent grant and to count | |
199 | * the number of used grants. | |
200 | */ | |
201 | static int add_persistent_gnt(struct xen_blkif *blkif, | |
0a8704a5 RPM |
202 | struct persistent_gnt *persistent_gnt) |
203 | { | |
3f3aad5e | 204 | struct rb_node **new = NULL, *parent = NULL; |
0a8704a5 RPM |
205 | struct persistent_gnt *this; |
206 | ||
3f3aad5e RPM |
207 | if (blkif->persistent_gnt_c >= xen_blkif_max_pgrants) { |
208 | if (!blkif->vbd.overflow_max_grants) | |
209 | blkif->vbd.overflow_max_grants = 1; | |
210 | return -EBUSY; | |
211 | } | |
0a8704a5 | 212 | /* Figure out where to put new node */ |
3f3aad5e | 213 | new = &blkif->persistent_gnts.rb_node; |
0a8704a5 RPM |
214 | while (*new) { |
215 | this = container_of(*new, struct persistent_gnt, node); | |
216 | ||
217 | parent = *new; | |
218 | if (persistent_gnt->gnt < this->gnt) | |
219 | new = &((*new)->rb_left); | |
220 | else if (persistent_gnt->gnt > this->gnt) | |
221 | new = &((*new)->rb_right); | |
222 | else { | |
77387b82 | 223 | pr_alert_ratelimited("trying to add a gref that's already in the tree\n"); |
c6cc142d | 224 | return -EINVAL; |
0a8704a5 RPM |
225 | } |
226 | } | |
227 | ||
3f3aad5e RPM |
228 | bitmap_zero(persistent_gnt->flags, PERSISTENT_GNT_FLAGS_SIZE); |
229 | set_bit(PERSISTENT_GNT_ACTIVE, persistent_gnt->flags); | |
0a8704a5 RPM |
230 | /* Add new node and rebalance tree. */ |
231 | rb_link_node(&(persistent_gnt->node), parent, new); | |
3f3aad5e RPM |
232 | rb_insert_color(&(persistent_gnt->node), &blkif->persistent_gnts); |
233 | blkif->persistent_gnt_c++; | |
234 | atomic_inc(&blkif->persistent_gnt_in_use); | |
c6cc142d | 235 | return 0; |
0a8704a5 RPM |
236 | } |
237 | ||
3f3aad5e | 238 | static struct persistent_gnt *get_persistent_gnt(struct xen_blkif *blkif, |
0a8704a5 RPM |
239 | grant_ref_t gref) |
240 | { | |
241 | struct persistent_gnt *data; | |
3f3aad5e | 242 | struct rb_node *node = NULL; |
0a8704a5 | 243 | |
3f3aad5e | 244 | node = blkif->persistent_gnts.rb_node; |
0a8704a5 RPM |
245 | while (node) { |
246 | data = container_of(node, struct persistent_gnt, node); | |
247 | ||
248 | if (gref < data->gnt) | |
249 | node = node->rb_left; | |
250 | else if (gref > data->gnt) | |
251 | node = node->rb_right; | |
3f3aad5e RPM |
252 | else { |
253 | if(test_bit(PERSISTENT_GNT_ACTIVE, data->flags)) { | |
77387b82 | 254 | pr_alert_ratelimited("requesting a grant already in use\n"); |
3f3aad5e RPM |
255 | return NULL; |
256 | } | |
257 | set_bit(PERSISTENT_GNT_ACTIVE, data->flags); | |
258 | atomic_inc(&blkif->persistent_gnt_in_use); | |
0a8704a5 | 259 | return data; |
3f3aad5e | 260 | } |
0a8704a5 RPM |
261 | } |
262 | return NULL; | |
263 | } | |
264 | ||
3f3aad5e RPM |
265 | static void put_persistent_gnt(struct xen_blkif *blkif, |
266 | struct persistent_gnt *persistent_gnt) | |
267 | { | |
268 | if(!test_bit(PERSISTENT_GNT_ACTIVE, persistent_gnt->flags)) | |
77387b82 | 269 | pr_alert_ratelimited("freeing a grant already unused\n"); |
3f3aad5e RPM |
270 | set_bit(PERSISTENT_GNT_WAS_ACTIVE, persistent_gnt->flags); |
271 | clear_bit(PERSISTENT_GNT_ACTIVE, persistent_gnt->flags); | |
272 | atomic_dec(&blkif->persistent_gnt_in_use); | |
273 | } | |
274 | ||
c6cc142d RPM |
275 | static void free_persistent_gnts(struct xen_blkif *blkif, struct rb_root *root, |
276 | unsigned int num) | |
4d4f270f RPM |
277 | { |
278 | struct gnttab_unmap_grant_ref unmap[BLKIF_MAX_SEGMENTS_PER_REQUEST]; | |
279 | struct page *pages[BLKIF_MAX_SEGMENTS_PER_REQUEST]; | |
280 | struct persistent_gnt *persistent_gnt; | |
7dc34117 | 281 | struct rb_node *n; |
4d4f270f | 282 | int segs_to_unmap = 0; |
c43cf3ea | 283 | struct gntab_unmap_queue_data unmap_data; |
c43cf3ea | 284 | |
c43cf3ea JH |
285 | unmap_data.pages = pages; |
286 | unmap_data.unmap_ops = unmap; | |
287 | unmap_data.kunmap_ops = NULL; | |
4d4f270f | 288 | |
7dc34117 | 289 | foreach_grant_safe(persistent_gnt, n, root, node) { |
4d4f270f RPM |
290 | BUG_ON(persistent_gnt->handle == |
291 | BLKBACK_INVALID_HANDLE); | |
292 | gnttab_set_unmap_op(&unmap[segs_to_unmap], | |
293 | (unsigned long) pfn_to_kaddr(page_to_pfn( | |
294 | persistent_gnt->page)), | |
295 | GNTMAP_host_map, | |
296 | persistent_gnt->handle); | |
297 | ||
298 | pages[segs_to_unmap] = persistent_gnt->page; | |
4d4f270f RPM |
299 | |
300 | if (++segs_to_unmap == BLKIF_MAX_SEGMENTS_PER_REQUEST || | |
301 | !rb_next(&persistent_gnt->node)) { | |
c43cf3ea JH |
302 | |
303 | unmap_data.count = segs_to_unmap; | |
b44166cd | 304 | BUG_ON(gnttab_unmap_refs_sync(&unmap_data)); |
c43cf3ea | 305 | |
c6cc142d | 306 | put_free_pages(blkif, pages, segs_to_unmap); |
4d4f270f RPM |
307 | segs_to_unmap = 0; |
308 | } | |
7dc34117 RPM |
309 | |
310 | rb_erase(&persistent_gnt->node, root); | |
311 | kfree(persistent_gnt); | |
312 | num--; | |
4d4f270f RPM |
313 | } |
314 | BUG_ON(num != 0); | |
315 | } | |
316 | ||
abb97b8c | 317 | void xen_blkbk_unmap_purged_grants(struct work_struct *work) |
3f3aad5e RPM |
318 | { |
319 | struct gnttab_unmap_grant_ref unmap[BLKIF_MAX_SEGMENTS_PER_REQUEST]; | |
320 | struct page *pages[BLKIF_MAX_SEGMENTS_PER_REQUEST]; | |
321 | struct persistent_gnt *persistent_gnt; | |
325d73bf | 322 | int segs_to_unmap = 0; |
3f3aad5e | 323 | struct xen_blkif *blkif = container_of(work, typeof(*blkif), persistent_purge_work); |
325d73bf | 324 | struct gntab_unmap_queue_data unmap_data; |
325d73bf | 325 | |
325d73bf BL |
326 | unmap_data.pages = pages; |
327 | unmap_data.unmap_ops = unmap; | |
328 | unmap_data.kunmap_ops = NULL; | |
3f3aad5e RPM |
329 | |
330 | while(!list_empty(&blkif->persistent_purge_list)) { | |
331 | persistent_gnt = list_first_entry(&blkif->persistent_purge_list, | |
332 | struct persistent_gnt, | |
333 | remove_node); | |
334 | list_del(&persistent_gnt->remove_node); | |
335 | ||
336 | gnttab_set_unmap_op(&unmap[segs_to_unmap], | |
337 | vaddr(persistent_gnt->page), | |
338 | GNTMAP_host_map, | |
339 | persistent_gnt->handle); | |
340 | ||
341 | pages[segs_to_unmap] = persistent_gnt->page; | |
342 | ||
343 | if (++segs_to_unmap == BLKIF_MAX_SEGMENTS_PER_REQUEST) { | |
325d73bf | 344 | unmap_data.count = segs_to_unmap; |
b44166cd | 345 | BUG_ON(gnttab_unmap_refs_sync(&unmap_data)); |
3f3aad5e RPM |
346 | put_free_pages(blkif, pages, segs_to_unmap); |
347 | segs_to_unmap = 0; | |
348 | } | |
349 | kfree(persistent_gnt); | |
350 | } | |
351 | if (segs_to_unmap > 0) { | |
325d73bf | 352 | unmap_data.count = segs_to_unmap; |
b44166cd | 353 | BUG_ON(gnttab_unmap_refs_sync(&unmap_data)); |
3f3aad5e RPM |
354 | put_free_pages(blkif, pages, segs_to_unmap); |
355 | } | |
356 | } | |
357 | ||
358 | static void purge_persistent_gnt(struct xen_blkif *blkif) | |
359 | { | |
360 | struct persistent_gnt *persistent_gnt; | |
361 | struct rb_node *n; | |
362 | unsigned int num_clean, total; | |
2d910543 | 363 | bool scan_used = false, clean_used = false; |
3f3aad5e RPM |
364 | struct rb_root *root; |
365 | ||
366 | if (blkif->persistent_gnt_c < xen_blkif_max_pgrants || | |
367 | (blkif->persistent_gnt_c == xen_blkif_max_pgrants && | |
368 | !blkif->vbd.overflow_max_grants)) { | |
369 | return; | |
370 | } | |
371 | ||
53bc7dc0 BL |
372 | if (work_busy(&blkif->persistent_purge_work)) { |
373 | pr_alert_ratelimited("Scheduled work from previous purge is still busy, cannot purge list\n"); | |
3f3aad5e RPM |
374 | return; |
375 | } | |
376 | ||
377 | num_clean = (xen_blkif_max_pgrants / 100) * LRU_PERCENT_CLEAN; | |
378 | num_clean = blkif->persistent_gnt_c - xen_blkif_max_pgrants + num_clean; | |
379 | num_clean = min(blkif->persistent_gnt_c, num_clean); | |
2d910543 RPM |
380 | if ((num_clean == 0) || |
381 | (num_clean > (blkif->persistent_gnt_c - atomic_read(&blkif->persistent_gnt_in_use)))) | |
3f3aad5e RPM |
382 | return; |
383 | ||
384 | /* | |
385 | * At this point, we can assure that there will be no calls | |
386 | * to get_persistent_grant (because we are executing this code from | |
387 | * xen_blkif_schedule), there can only be calls to put_persistent_gnt, | |
388 | * which means that the number of currently used grants will go down, | |
389 | * but never up, so we will always be able to remove the requested | |
390 | * number of grants. | |
391 | */ | |
392 | ||
393 | total = num_clean; | |
394 | ||
77387b82 | 395 | pr_debug("Going to purge %u persistent grants\n", num_clean); |
3f3aad5e | 396 | |
ef753411 | 397 | BUG_ON(!list_empty(&blkif->persistent_purge_list)); |
3f3aad5e RPM |
398 | root = &blkif->persistent_gnts; |
399 | purge_list: | |
400 | foreach_grant_safe(persistent_gnt, n, root, node) { | |
401 | BUG_ON(persistent_gnt->handle == | |
402 | BLKBACK_INVALID_HANDLE); | |
403 | ||
2d910543 RPM |
404 | if (clean_used) { |
405 | clear_bit(PERSISTENT_GNT_WAS_ACTIVE, persistent_gnt->flags); | |
406 | continue; | |
407 | } | |
408 | ||
3f3aad5e RPM |
409 | if (test_bit(PERSISTENT_GNT_ACTIVE, persistent_gnt->flags)) |
410 | continue; | |
411 | if (!scan_used && | |
412 | (test_bit(PERSISTENT_GNT_WAS_ACTIVE, persistent_gnt->flags))) | |
413 | continue; | |
414 | ||
415 | rb_erase(&persistent_gnt->node, root); | |
416 | list_add(&persistent_gnt->remove_node, | |
417 | &blkif->persistent_purge_list); | |
418 | if (--num_clean == 0) | |
419 | goto finished; | |
420 | } | |
421 | /* | |
422 | * If we get here it means we also need to start cleaning | |
423 | * grants that were used since last purge in order to cope | |
424 | * with the requested num | |
425 | */ | |
2d910543 | 426 | if (!scan_used && !clean_used) { |
77387b82 | 427 | pr_debug("Still missing %u purged frames\n", num_clean); |
3f3aad5e RPM |
428 | scan_used = true; |
429 | goto purge_list; | |
430 | } | |
431 | finished: | |
2d910543 | 432 | if (!clean_used) { |
77387b82 | 433 | pr_debug("Finished scanning for grants to clean, removing used flag\n"); |
2d910543 RPM |
434 | clean_used = true; |
435 | goto purge_list; | |
3f3aad5e | 436 | } |
2d910543 | 437 | |
3f3aad5e RPM |
438 | blkif->persistent_gnt_c -= (total - num_clean); |
439 | blkif->vbd.overflow_max_grants = 0; | |
440 | ||
441 | /* We can defer this work */ | |
3f3aad5e | 442 | schedule_work(&blkif->persistent_purge_work); |
77387b82 | 443 | pr_debug("Purged %u/%u\n", (total - num_clean), total); |
3f3aad5e RPM |
444 | return; |
445 | } | |
446 | ||
a1397fa3 KRW |
447 | /* |
448 | * Retrieve from the 'pending_reqs' a free pending_req structure to be used. | |
4d05a28d | 449 | */ |
bf0720c4 | 450 | static struct pending_req *alloc_req(struct xen_blkif *blkif) |
4d05a28d | 451 | { |
2e9977c2 | 452 | struct pending_req *req = NULL; |
4d05a28d KRW |
453 | unsigned long flags; |
454 | ||
bf0720c4 RPM |
455 | spin_lock_irqsave(&blkif->pending_free_lock, flags); |
456 | if (!list_empty(&blkif->pending_free)) { | |
457 | req = list_entry(blkif->pending_free.next, struct pending_req, | |
2e9977c2 | 458 | free_list); |
4d05a28d KRW |
459 | list_del(&req->free_list); |
460 | } | |
bf0720c4 | 461 | spin_unlock_irqrestore(&blkif->pending_free_lock, flags); |
4d05a28d KRW |
462 | return req; |
463 | } | |
464 | ||
a1397fa3 KRW |
465 | /* |
466 | * Return the 'pending_req' structure back to the freepool. We also | |
467 | * wake up the thread if it was waiting for a free page. | |
468 | */ | |
bf0720c4 | 469 | static void free_req(struct xen_blkif *blkif, struct pending_req *req) |
4d05a28d KRW |
470 | { |
471 | unsigned long flags; | |
472 | int was_empty; | |
473 | ||
bf0720c4 RPM |
474 | spin_lock_irqsave(&blkif->pending_free_lock, flags); |
475 | was_empty = list_empty(&blkif->pending_free); | |
476 | list_add(&req->free_list, &blkif->pending_free); | |
477 | spin_unlock_irqrestore(&blkif->pending_free_lock, flags); | |
4d05a28d | 478 | if (was_empty) |
bf0720c4 | 479 | wake_up(&blkif->pending_free_wq); |
4d05a28d KRW |
480 | } |
481 | ||
ee9ff853 KRW |
482 | /* |
483 | * Routines for managing virtual block devices (vbds). | |
484 | */ | |
3d814731 KRW |
485 | static int xen_vbd_translate(struct phys_req *req, struct xen_blkif *blkif, |
486 | int operation) | |
ee9ff853 | 487 | { |
3d814731 | 488 | struct xen_vbd *vbd = &blkif->vbd; |
ee9ff853 KRW |
489 | int rc = -EACCES; |
490 | ||
491 | if ((operation != READ) && vbd->readonly) | |
492 | goto out; | |
493 | ||
8ab52150 JB |
494 | if (likely(req->nr_sects)) { |
495 | blkif_sector_t end = req->sector_number + req->nr_sects; | |
496 | ||
497 | if (unlikely(end < req->sector_number)) | |
498 | goto out; | |
499 | if (unlikely(end > vbd_sz(vbd))) | |
500 | goto out; | |
501 | } | |
ee9ff853 KRW |
502 | |
503 | req->dev = vbd->pdevice; | |
504 | req->bdev = vbd->bdev; | |
505 | rc = 0; | |
506 | ||
507 | out: | |
508 | return rc; | |
509 | } | |
510 | ||
3d814731 | 511 | static void xen_vbd_resize(struct xen_blkif *blkif) |
ee9ff853 | 512 | { |
3d814731 | 513 | struct xen_vbd *vbd = &blkif->vbd; |
ee9ff853 KRW |
514 | struct xenbus_transaction xbt; |
515 | int err; | |
8b6bf747 | 516 | struct xenbus_device *dev = xen_blkbk_xenbus(blkif->be); |
42c7841d | 517 | unsigned long long new_size = vbd_sz(vbd); |
ee9ff853 | 518 | |
77387b82 | 519 | pr_info("VBD Resize: Domid: %d, Device: (%d, %d)\n", |
ee9ff853 | 520 | blkif->domid, MAJOR(vbd->pdevice), MINOR(vbd->pdevice)); |
77387b82 | 521 | pr_info("VBD Resize: new size %llu\n", new_size); |
ee9ff853 KRW |
522 | vbd->size = new_size; |
523 | again: | |
524 | err = xenbus_transaction_start(&xbt); | |
525 | if (err) { | |
77387b82 | 526 | pr_warn("Error starting transaction\n"); |
ee9ff853 KRW |
527 | return; |
528 | } | |
529 | err = xenbus_printf(xbt, dev->nodename, "sectors", "%llu", | |
42c7841d | 530 | (unsigned long long)vbd_sz(vbd)); |
ee9ff853 | 531 | if (err) { |
77387b82 | 532 | pr_warn("Error writing new size\n"); |
ee9ff853 KRW |
533 | goto abort; |
534 | } | |
535 | /* | |
536 | * Write the current state; we will use this to synchronize | |
537 | * the front-end. If the current state is "connected" the | |
538 | * front-end will get the new size information online. | |
539 | */ | |
540 | err = xenbus_printf(xbt, dev->nodename, "state", "%d", dev->state); | |
541 | if (err) { | |
77387b82 | 542 | pr_warn("Error writing the state\n"); |
ee9ff853 KRW |
543 | goto abort; |
544 | } | |
545 | ||
546 | err = xenbus_transaction_end(xbt, 0); | |
547 | if (err == -EAGAIN) | |
548 | goto again; | |
549 | if (err) | |
77387b82 | 550 | pr_warn("Error ending transaction\n"); |
496b318e | 551 | return; |
ee9ff853 KRW |
552 | abort: |
553 | xenbus_transaction_end(xbt, 1); | |
554 | } | |
555 | ||
a1397fa3 | 556 | /* |
b0aef179 KRW |
557 | * Notification from the guest OS. |
558 | */ | |
30fd1502 | 559 | static void blkif_notify_work(struct xen_blkif *blkif) |
4d05a28d | 560 | { |
b0aef179 KRW |
561 | blkif->waiting_reqs = 1; |
562 | wake_up(&blkif->wq); | |
563 | } | |
4d05a28d | 564 | |
8b6bf747 | 565 | irqreturn_t xen_blkif_be_int(int irq, void *dev_id) |
b0aef179 KRW |
566 | { |
567 | blkif_notify_work(dev_id); | |
568 | return IRQ_HANDLED; | |
4d05a28d KRW |
569 | } |
570 | ||
2e9977c2 | 571 | /* |
4d05a28d KRW |
572 | * SCHEDULER FUNCTIONS |
573 | */ | |
574 | ||
30fd1502 | 575 | static void print_stats(struct xen_blkif *blkif) |
4d05a28d | 576 | { |
77387b82 | 577 | pr_info("(%s): oo %3llu | rd %4llu | wr %4llu | f %4llu" |
3f3aad5e | 578 | " | ds %4llu | pg: %4u/%4d\n", |
ebe81906 | 579 | current->comm, blkif->st_oo_req, |
b3cb0d6a | 580 | blkif->st_rd_req, blkif->st_wr_req, |
c1a15d08 RPM |
581 | blkif->st_f_req, blkif->st_ds_req, |
582 | blkif->persistent_gnt_c, | |
3f3aad5e | 583 | xen_blkif_max_pgrants); |
4d05a28d KRW |
584 | blkif->st_print = jiffies + msecs_to_jiffies(10 * 1000); |
585 | blkif->st_rd_req = 0; | |
586 | blkif->st_wr_req = 0; | |
587 | blkif->st_oo_req = 0; | |
b3cb0d6a | 588 | blkif->st_ds_req = 0; |
4d05a28d KRW |
589 | } |
590 | ||
8b6bf747 | 591 | int xen_blkif_schedule(void *arg) |
4d05a28d | 592 | { |
30fd1502 | 593 | struct xen_blkif *blkif = arg; |
3d814731 | 594 | struct xen_vbd *vbd = &blkif->vbd; |
3f3aad5e | 595 | unsigned long timeout; |
8e3f8755 | 596 | int ret; |
4d05a28d | 597 | |
8b6bf747 | 598 | xen_blkif_get(blkif); |
4d05a28d | 599 | |
4d05a28d KRW |
600 | while (!kthread_should_stop()) { |
601 | if (try_to_freeze()) | |
602 | continue; | |
42c7841d | 603 | if (unlikely(vbd->size != vbd_sz(vbd))) |
3d814731 | 604 | xen_vbd_resize(blkif); |
4d05a28d | 605 | |
3f3aad5e RPM |
606 | timeout = msecs_to_jiffies(LRU_INTERVAL); |
607 | ||
608 | timeout = wait_event_interruptible_timeout( | |
4d05a28d | 609 | blkif->wq, |
3f3aad5e RPM |
610 | blkif->waiting_reqs || kthread_should_stop(), |
611 | timeout); | |
612 | if (timeout == 0) | |
613 | goto purge_gnt_list; | |
614 | timeout = wait_event_interruptible_timeout( | |
bf0720c4 RPM |
615 | blkif->pending_free_wq, |
616 | !list_empty(&blkif->pending_free) || | |
3f3aad5e RPM |
617 | kthread_should_stop(), |
618 | timeout); | |
619 | if (timeout == 0) | |
620 | goto purge_gnt_list; | |
4d05a28d KRW |
621 | |
622 | blkif->waiting_reqs = 0; | |
623 | smp_mb(); /* clear flag *before* checking for work */ | |
624 | ||
8e3f8755 KRW |
625 | ret = do_block_io_op(blkif); |
626 | if (ret > 0) | |
4d05a28d | 627 | blkif->waiting_reqs = 1; |
8e3f8755 KRW |
628 | if (ret == -EACCES) |
629 | wait_event_interruptible(blkif->shutdown_wq, | |
630 | kthread_should_stop()); | |
4d05a28d | 631 | |
3f3aad5e RPM |
632 | purge_gnt_list: |
633 | if (blkif->vbd.feature_gnt_persistent && | |
634 | time_after(jiffies, blkif->next_lru)) { | |
635 | purge_persistent_gnt(blkif); | |
636 | blkif->next_lru = jiffies + msecs_to_jiffies(LRU_INTERVAL); | |
637 | } | |
638 | ||
c6cc142d RPM |
639 | /* Shrink if we have more than xen_blkif_max_buffer_pages */ |
640 | shrink_free_pagepool(blkif, xen_blkif_max_buffer_pages); | |
641 | ||
4d05a28d KRW |
642 | if (log_stats && time_after(jiffies, blkif->st_print)) |
643 | print_stats(blkif); | |
644 | } | |
645 | ||
ef753411 RPM |
646 | /* Drain pending purge work */ |
647 | flush_work(&blkif->persistent_purge_work); | |
c6cc142d | 648 | |
ef753411 RPM |
649 | if (log_stats) |
650 | print_stats(blkif); | |
651 | ||
652 | blkif->xenblkd = NULL; | |
653 | xen_blkif_put(blkif); | |
654 | ||
655 | return 0; | |
656 | } | |
657 | ||
658 | /* | |
659 | * Remove persistent grants and empty the pool of free pages | |
660 | */ | |
661 | void xen_blkbk_free_caches(struct xen_blkif *blkif) | |
662 | { | |
0a8704a5 | 663 | /* Free all persistent grant pages */ |
4d4f270f | 664 | if (!RB_EMPTY_ROOT(&blkif->persistent_gnts)) |
c6cc142d | 665 | free_persistent_gnts(blkif, &blkif->persistent_gnts, |
4d4f270f | 666 | blkif->persistent_gnt_c); |
0a8704a5 | 667 | |
0a8704a5 | 668 | BUG_ON(!RB_EMPTY_ROOT(&blkif->persistent_gnts)); |
4d4f270f | 669 | blkif->persistent_gnt_c = 0; |
0a8704a5 | 670 | |
2ed22e3c MR |
671 | /* Since we are shutting down remove all pages from the buffer */ |
672 | shrink_free_pagepool(blkif, 0 /* All */); | |
4d05a28d KRW |
673 | } |
674 | ||
c43cf3ea JH |
675 | static unsigned int xen_blkbk_unmap_prepare( |
676 | struct xen_blkif *blkif, | |
677 | struct grant_page **pages, | |
678 | unsigned int num, | |
679 | struct gnttab_unmap_grant_ref *unmap_ops, | |
680 | struct page **unmap_pages) | |
b0aef179 | 681 | { |
b0aef179 | 682 | unsigned int i, invcount = 0; |
b0aef179 | 683 | |
31552ee3 | 684 | for (i = 0; i < num; i++) { |
bb642e83 RPM |
685 | if (pages[i]->persistent_gnt != NULL) { |
686 | put_persistent_gnt(blkif, pages[i]->persistent_gnt); | |
0a8704a5 | 687 | continue; |
3f3aad5e | 688 | } |
bb642e83 | 689 | if (pages[i]->handle == BLKBACK_INVALID_HANDLE) |
b0aef179 | 690 | continue; |
bb642e83 | 691 | unmap_pages[invcount] = pages[i]->page; |
c43cf3ea | 692 | gnttab_set_unmap_op(&unmap_ops[invcount], vaddr(pages[i]->page), |
bb642e83 RPM |
693 | GNTMAP_host_map, pages[i]->handle); |
694 | pages[i]->handle = BLKBACK_INVALID_HANDLE; | |
c43cf3ea JH |
695 | invcount++; |
696 | } | |
697 | ||
698 | return invcount; | |
699 | } | |
700 | ||
701 | static void xen_blkbk_unmap_and_respond_callback(int result, struct gntab_unmap_queue_data *data) | |
702 | { | |
703 | struct pending_req* pending_req = (struct pending_req*) (data->data); | |
704 | struct xen_blkif *blkif = pending_req->blkif; | |
705 | ||
706 | /* BUG_ON used to reproduce existing behaviour, | |
707 | but is this the best way to deal with this? */ | |
708 | BUG_ON(result); | |
709 | ||
710 | put_free_pages(blkif, data->pages, data->count); | |
711 | make_response(blkif, pending_req->id, | |
712 | pending_req->operation, pending_req->status); | |
713 | free_req(blkif, pending_req); | |
714 | /* | |
715 | * Make sure the request is freed before releasing blkif, | |
716 | * or there could be a race between free_req and the | |
717 | * cleanup done in xen_blkif_free during shutdown. | |
718 | * | |
719 | * NB: The fact that we might try to wake up pending_free_wq | |
720 | * before drain_complete (in case there's a drain going on) | |
721 | * it's not a problem with our current implementation | |
722 | * because we can assure there's no thread waiting on | |
723 | * pending_free_wq if there's a drain going on, but it has | |
724 | * to be taken into account if the current model is changed. | |
725 | */ | |
726 | if (atomic_dec_and_test(&blkif->inflight) && atomic_read(&blkif->drain)) { | |
727 | complete(&blkif->drain_complete); | |
728 | } | |
729 | xen_blkif_put(blkif); | |
730 | } | |
731 | ||
732 | static void xen_blkbk_unmap_and_respond(struct pending_req *req) | |
733 | { | |
734 | struct gntab_unmap_queue_data* work = &req->gnttab_unmap_data; | |
735 | struct xen_blkif *blkif = req->blkif; | |
736 | struct grant_page **pages = req->segments; | |
737 | unsigned int invcount; | |
738 | ||
6684fa1c | 739 | invcount = xen_blkbk_unmap_prepare(blkif, pages, req->nr_segs, |
c43cf3ea JH |
740 | req->unmap, req->unmap_pages); |
741 | ||
742 | work->data = req; | |
743 | work->done = xen_blkbk_unmap_and_respond_callback; | |
744 | work->unmap_ops = req->unmap; | |
745 | work->kunmap_ops = NULL; | |
746 | work->pages = req->unmap_pages; | |
747 | work->count = invcount; | |
748 | ||
749 | gnttab_unmap_refs_async(&req->gnttab_unmap_data); | |
750 | } | |
751 | ||
752 | ||
753 | /* | |
754 | * Unmap the grant references. | |
755 | * | |
756 | * This could accumulate ops up to the batch size to reduce the number | |
757 | * of hypercalls, but since this is only used in error paths there's | |
758 | * no real need. | |
759 | */ | |
760 | static void xen_blkbk_unmap(struct xen_blkif *blkif, | |
761 | struct grant_page *pages[], | |
762 | int num) | |
763 | { | |
764 | struct gnttab_unmap_grant_ref unmap[BLKIF_MAX_SEGMENTS_PER_REQUEST]; | |
765 | struct page *unmap_pages[BLKIF_MAX_SEGMENTS_PER_REQUEST]; | |
766 | unsigned int invcount = 0; | |
767 | int ret; | |
768 | ||
769 | while (num) { | |
770 | unsigned int batch = min(num, BLKIF_MAX_SEGMENTS_PER_REQUEST); | |
771 | ||
772 | invcount = xen_blkbk_unmap_prepare(blkif, pages, batch, | |
773 | unmap, unmap_pages); | |
774 | if (invcount) { | |
775 | ret = gnttab_unmap_refs(unmap, NULL, unmap_pages, invcount); | |
31552ee3 RPM |
776 | BUG_ON(ret); |
777 | put_free_pages(blkif, unmap_pages, invcount); | |
31552ee3 | 778 | } |
c43cf3ea JH |
779 | pages += batch; |
780 | num -= batch; | |
b0aef179 | 781 | } |
b0aef179 | 782 | } |
01f37f2d | 783 | |
bb642e83 RPM |
784 | static int xen_blkbk_map(struct xen_blkif *blkif, |
785 | struct grant_page *pages[], | |
31552ee3 | 786 | int num, bool ro) |
1a95fe6e KRW |
787 | { |
788 | struct gnttab_map_grant_ref map[BLKIF_MAX_SEGMENTS_PER_REQUEST]; | |
0a8704a5 RPM |
789 | struct page *pages_to_gnt[BLKIF_MAX_SEGMENTS_PER_REQUEST]; |
790 | struct persistent_gnt *persistent_gnt = NULL; | |
0a8704a5 | 791 | phys_addr_t addr = 0; |
c6cc142d | 792 | int i, seg_idx, new_map_idx; |
0a8704a5 | 793 | int segs_to_map = 0; |
1a95fe6e | 794 | int ret = 0; |
31552ee3 | 795 | int last_map = 0, map_until = 0; |
0a8704a5 RPM |
796 | int use_persistent_gnts; |
797 | ||
798 | use_persistent_gnts = (blkif->vbd.feature_gnt_persistent); | |
799 | ||
01f37f2d KRW |
800 | /* |
801 | * Fill out preq.nr_sects with proper amount of sectors, and setup | |
1a95fe6e KRW |
802 | * assign map[..] with the PFN of the page in our domain with the |
803 | * corresponding grant reference for each page. | |
804 | */ | |
31552ee3 RPM |
805 | again: |
806 | for (i = map_until; i < num; i++) { | |
1a95fe6e KRW |
807 | uint32_t flags; |
808 | ||
0a8704a5 RPM |
809 | if (use_persistent_gnts) |
810 | persistent_gnt = get_persistent_gnt( | |
3f3aad5e | 811 | blkif, |
bb642e83 | 812 | pages[i]->gref); |
0a8704a5 RPM |
813 | |
814 | if (persistent_gnt) { | |
815 | /* | |
816 | * We are using persistent grants and | |
817 | * the grant is already mapped | |
818 | */ | |
bb642e83 RPM |
819 | pages[i]->page = persistent_gnt->page; |
820 | pages[i]->persistent_gnt = persistent_gnt; | |
0a8704a5 | 821 | } else { |
bb642e83 | 822 | if (get_free_page(blkif, &pages[i]->page)) |
c6cc142d | 823 | goto out_of_memory; |
bb642e83 RPM |
824 | addr = vaddr(pages[i]->page); |
825 | pages_to_gnt[segs_to_map] = pages[i]->page; | |
826 | pages[i]->persistent_gnt = NULL; | |
0a8704a5 | 827 | flags = GNTMAP_host_map; |
31552ee3 | 828 | if (!use_persistent_gnts && ro) |
0a8704a5 RPM |
829 | flags |= GNTMAP_readonly; |
830 | gnttab_set_map_op(&map[segs_to_map++], addr, | |
bb642e83 | 831 | flags, pages[i]->gref, |
0a8704a5 RPM |
832 | blkif->domid); |
833 | } | |
31552ee3 RPM |
834 | map_until = i + 1; |
835 | if (segs_to_map == BLKIF_MAX_SEGMENTS_PER_REQUEST) | |
836 | break; | |
1a95fe6e KRW |
837 | } |
838 | ||
0a8704a5 RPM |
839 | if (segs_to_map) { |
840 | ret = gnttab_map_refs(map, NULL, pages_to_gnt, segs_to_map); | |
841 | BUG_ON(ret); | |
842 | } | |
1a95fe6e | 843 | |
01f37f2d KRW |
844 | /* |
845 | * Now swizzle the MFN in our domain with the MFN from the other domain | |
1a95fe6e KRW |
846 | * so that when we access vaddr(pending_req,i) it has the contents of |
847 | * the page from the other domain. | |
848 | */ | |
31552ee3 | 849 | for (seg_idx = last_map, new_map_idx = 0; seg_idx < map_until; seg_idx++) { |
bb642e83 | 850 | if (!pages[seg_idx]->persistent_gnt) { |
0a8704a5 | 851 | /* This is a newly mapped grant */ |
c6cc142d RPM |
852 | BUG_ON(new_map_idx >= segs_to_map); |
853 | if (unlikely(map[new_map_idx].status != 0)) { | |
77387b82 | 854 | pr_debug("invalid buffer -- could not remap it\n"); |
61cecca8 | 855 | put_free_pages(blkif, &pages[seg_idx]->page, 1); |
bb642e83 | 856 | pages[seg_idx]->handle = BLKBACK_INVALID_HANDLE; |
0a8704a5 | 857 | ret |= 1; |
31552ee3 | 858 | goto next; |
0a8704a5 | 859 | } |
bb642e83 | 860 | pages[seg_idx]->handle = map[new_map_idx].handle; |
c6cc142d | 861 | } else { |
31552ee3 | 862 | continue; |
0a8704a5 | 863 | } |
c6cc142d | 864 | if (use_persistent_gnts && |
3f3aad5e | 865 | blkif->persistent_gnt_c < xen_blkif_max_pgrants) { |
c6cc142d RPM |
866 | /* |
867 | * We are using persistent grants, the grant is | |
3f3aad5e | 868 | * not mapped but we might have room for it. |
c6cc142d RPM |
869 | */ |
870 | persistent_gnt = kmalloc(sizeof(struct persistent_gnt), | |
871 | GFP_KERNEL); | |
872 | if (!persistent_gnt) { | |
0a8704a5 | 873 | /* |
c6cc142d RPM |
874 | * If we don't have enough memory to |
875 | * allocate the persistent_gnt struct | |
876 | * map this grant non-persistenly | |
0a8704a5 | 877 | */ |
31552ee3 | 878 | goto next; |
0a8704a5 | 879 | } |
c6cc142d RPM |
880 | persistent_gnt->gnt = map[new_map_idx].ref; |
881 | persistent_gnt->handle = map[new_map_idx].handle; | |
bb642e83 | 882 | persistent_gnt->page = pages[seg_idx]->page; |
3f3aad5e | 883 | if (add_persistent_gnt(blkif, |
c6cc142d RPM |
884 | persistent_gnt)) { |
885 | kfree(persistent_gnt); | |
886 | persistent_gnt = NULL; | |
31552ee3 | 887 | goto next; |
c6cc142d | 888 | } |
bb642e83 | 889 | pages[seg_idx]->persistent_gnt = persistent_gnt; |
77387b82 | 890 | pr_debug("grant %u added to the tree of persistent grants, using %u/%u\n", |
c6cc142d | 891 | persistent_gnt->gnt, blkif->persistent_gnt_c, |
3f3aad5e | 892 | xen_blkif_max_pgrants); |
c6cc142d RPM |
893 | goto next; |
894 | } | |
895 | if (use_persistent_gnts && !blkif->vbd.overflow_max_grants) { | |
896 | blkif->vbd.overflow_max_grants = 1; | |
77387b82 | 897 | pr_debug("domain %u, device %#x is using maximum number of persistent grants\n", |
c6cc142d | 898 | blkif->domid, blkif->vbd.handle); |
1a95fe6e | 899 | } |
c6cc142d RPM |
900 | /* |
901 | * We could not map this grant persistently, so use it as | |
902 | * a non-persistent grant. | |
903 | */ | |
c6cc142d | 904 | next: |
31552ee3 | 905 | new_map_idx++; |
1a95fe6e | 906 | } |
31552ee3 RPM |
907 | segs_to_map = 0; |
908 | last_map = map_until; | |
909 | if (map_until != num) | |
910 | goto again; | |
911 | ||
1a95fe6e | 912 | return ret; |
c6cc142d RPM |
913 | |
914 | out_of_memory: | |
77387b82 | 915 | pr_alert("%s: out of memory\n", __func__); |
c6cc142d RPM |
916 | put_free_pages(blkif, pages_to_gnt, segs_to_map); |
917 | return -ENOMEM; | |
1a95fe6e KRW |
918 | } |
919 | ||
bb642e83 | 920 | static int xen_blkbk_map_seg(struct pending_req *pending_req) |
31552ee3 | 921 | { |
402b27f9 | 922 | int rc; |
31552ee3 | 923 | |
bb642e83 | 924 | rc = xen_blkbk_map(pending_req->blkif, pending_req->segments, |
6684fa1c | 925 | pending_req->nr_segs, |
31552ee3 | 926 | (pending_req->operation != BLKIF_OP_READ)); |
31552ee3 | 927 | |
402b27f9 RPM |
928 | return rc; |
929 | } | |
31552ee3 | 930 | |
402b27f9 RPM |
931 | static int xen_blkbk_parse_indirect(struct blkif_request *req, |
932 | struct pending_req *pending_req, | |
933 | struct seg_buf seg[], | |
934 | struct phys_req *preq) | |
935 | { | |
bb642e83 | 936 | struct grant_page **pages = pending_req->indirect_pages; |
402b27f9 RPM |
937 | struct xen_blkif *blkif = pending_req->blkif; |
938 | int indirect_grefs, rc, n, nseg, i; | |
80bfa2f6 | 939 | struct blkif_request_segment *segments = NULL; |
402b27f9 | 940 | |
6684fa1c | 941 | nseg = pending_req->nr_segs; |
402b27f9 RPM |
942 | indirect_grefs = INDIRECT_PAGES(nseg); |
943 | BUG_ON(indirect_grefs > BLKIF_MAX_INDIRECT_PAGES_PER_REQUEST); | |
944 | ||
bb642e83 RPM |
945 | for (i = 0; i < indirect_grefs; i++) |
946 | pages[i]->gref = req->u.indirect.indirect_grefs[i]; | |
947 | ||
948 | rc = xen_blkbk_map(blkif, pages, indirect_grefs, true); | |
402b27f9 RPM |
949 | if (rc) |
950 | goto unmap; | |
951 | ||
952 | for (n = 0, i = 0; n < nseg; n++) { | |
953 | if ((n % SEGS_PER_INDIRECT_FRAME) == 0) { | |
954 | /* Map indirect segments */ | |
955 | if (segments) | |
956 | kunmap_atomic(segments); | |
bb642e83 | 957 | segments = kmap_atomic(pages[n/SEGS_PER_INDIRECT_FRAME]->page); |
402b27f9 RPM |
958 | } |
959 | i = n % SEGS_PER_INDIRECT_FRAME; | |
bb642e83 | 960 | pending_req->segments[n]->gref = segments[i].gref; |
402b27f9 RPM |
961 | seg[n].nsec = segments[i].last_sect - |
962 | segments[i].first_sect + 1; | |
963 | seg[n].offset = (segments[i].first_sect << 9); | |
964 | if ((segments[i].last_sect >= (PAGE_SIZE >> 9)) || | |
965 | (segments[i].last_sect < segments[i].first_sect)) { | |
966 | rc = -EINVAL; | |
967 | goto unmap; | |
968 | } | |
969 | preq->nr_sects += seg[n].nsec; | |
970 | } | |
971 | ||
972 | unmap: | |
973 | if (segments) | |
974 | kunmap_atomic(segments); | |
bb642e83 | 975 | xen_blkbk_unmap(blkif, pages, indirect_grefs); |
402b27f9 | 976 | return rc; |
31552ee3 RPM |
977 | } |
978 | ||
42146352 KRW |
979 | static int dispatch_discard_io(struct xen_blkif *blkif, |
980 | struct blkif_request *req) | |
b3cb0d6a LD |
981 | { |
982 | int err = 0; | |
983 | int status = BLKIF_RSP_OKAY; | |
984 | struct block_device *bdev = blkif->vbd.bdev; | |
4dae7670 | 985 | unsigned long secure; |
604c499c | 986 | struct phys_req preq; |
b3cb0d6a | 987 | |
ea5ec76d VN |
988 | xen_blkif_get(blkif); |
989 | ||
604c499c KRW |
990 | preq.sector_number = req->u.discard.sector_number; |
991 | preq.nr_sects = req->u.discard.nr_sectors; | |
992 | ||
993 | err = xen_vbd_translate(&preq, blkif, WRITE); | |
994 | if (err) { | |
77387b82 | 995 | pr_warn("access denied: DISCARD [%llu->%llu] on dev=%04x\n", |
604c499c KRW |
996 | preq.sector_number, |
997 | preq.sector_number + preq.nr_sects, blkif->vbd.pdevice); | |
998 | goto fail_response; | |
999 | } | |
42146352 KRW |
1000 | blkif->st_ds_req++; |
1001 | ||
4dae7670 KRW |
1002 | secure = (blkif->vbd.discard_secure && |
1003 | (req->u.discard.flag & BLKIF_DISCARD_SECURE)) ? | |
1004 | BLKDEV_DISCARD_SECURE : 0; | |
1005 | ||
1006 | err = blkdev_issue_discard(bdev, req->u.discard.sector_number, | |
1007 | req->u.discard.nr_sectors, | |
1008 | GFP_KERNEL, secure); | |
604c499c | 1009 | fail_response: |
b3cb0d6a | 1010 | if (err == -EOPNOTSUPP) { |
77387b82 | 1011 | pr_debug("discard op failed, not supported\n"); |
b3cb0d6a LD |
1012 | status = BLKIF_RSP_EOPNOTSUPP; |
1013 | } else if (err) | |
1014 | status = BLKIF_RSP_ERROR; | |
1015 | ||
97e36834 | 1016 | make_response(blkif, req->u.discard.id, req->operation, status); |
42146352 KRW |
1017 | xen_blkif_put(blkif); |
1018 | return err; | |
b3cb0d6a LD |
1019 | } |
1020 | ||
0e367ae4 DV |
1021 | static int dispatch_other_io(struct xen_blkif *blkif, |
1022 | struct blkif_request *req, | |
1023 | struct pending_req *pending_req) | |
1024 | { | |
bf0720c4 | 1025 | free_req(blkif, pending_req); |
0e367ae4 DV |
1026 | make_response(blkif, req->u.other.id, req->operation, |
1027 | BLKIF_RSP_EOPNOTSUPP); | |
1028 | return -EIO; | |
1029 | } | |
1030 | ||
29bde093 KRW |
1031 | static void xen_blk_drain_io(struct xen_blkif *blkif) |
1032 | { | |
1033 | atomic_set(&blkif->drain, 1); | |
1034 | do { | |
c05f3e3c | 1035 | if (atomic_read(&blkif->inflight) == 0) |
6927d920 | 1036 | break; |
29bde093 KRW |
1037 | wait_for_completion_interruptible_timeout( |
1038 | &blkif->drain_complete, HZ); | |
1039 | ||
1040 | if (!atomic_read(&blkif->drain)) | |
1041 | break; | |
29bde093 KRW |
1042 | } while (!kthread_should_stop()); |
1043 | atomic_set(&blkif->drain, 0); | |
1044 | } | |
1045 | ||
a1397fa3 KRW |
1046 | /* |
1047 | * Completion callback on the bio's. Called as bh->b_end_io() | |
4d05a28d KRW |
1048 | */ |
1049 | ||
2e9977c2 | 1050 | static void __end_block_io_op(struct pending_req *pending_req, int error) |
4d05a28d KRW |
1051 | { |
1052 | /* An error fails the entire request. */ | |
24f567f9 | 1053 | if ((pending_req->operation == BLKIF_OP_FLUSH_DISKCACHE) && |
4d05a28d | 1054 | (error == -EOPNOTSUPP)) { |
77387b82 | 1055 | pr_debug("flush diskcache op failed, not supported\n"); |
24f567f9 | 1056 | xen_blkbk_flush_diskcache(XBT_NIL, pending_req->blkif->be, 0); |
4d05a28d | 1057 | pending_req->status = BLKIF_RSP_EOPNOTSUPP; |
29bde093 KRW |
1058 | } else if ((pending_req->operation == BLKIF_OP_WRITE_BARRIER) && |
1059 | (error == -EOPNOTSUPP)) { | |
77387b82 | 1060 | pr_debug("write barrier op failed, not supported\n"); |
29bde093 KRW |
1061 | xen_blkbk_barrier(XBT_NIL, pending_req->blkif->be, 0); |
1062 | pending_req->status = BLKIF_RSP_EOPNOTSUPP; | |
4d05a28d | 1063 | } else if (error) { |
77387b82 | 1064 | pr_debug("Buffer not up-to-date at end of operation," |
ebe81906 | 1065 | " error=%d\n", error); |
4d05a28d KRW |
1066 | pending_req->status = BLKIF_RSP_ERROR; |
1067 | } | |
1068 | ||
01f37f2d KRW |
1069 | /* |
1070 | * If all of the bio's have completed it is time to unmap | |
a1397fa3 | 1071 | * the grant references associated with 'request' and provide |
2e9977c2 KRW |
1072 | * the proper response on the ring. |
1073 | */ | |
c43cf3ea JH |
1074 | if (atomic_dec_and_test(&pending_req->pendcnt)) |
1075 | xen_blkbk_unmap_and_respond(pending_req); | |
4d05a28d KRW |
1076 | } |
1077 | ||
a1397fa3 KRW |
1078 | /* |
1079 | * bio callback. | |
1080 | */ | |
88122933 | 1081 | static void end_block_io_op(struct bio *bio, int error) |
4d05a28d | 1082 | { |
4d05a28d KRW |
1083 | __end_block_io_op(bio->bi_private, error); |
1084 | bio_put(bio); | |
4d05a28d KRW |
1085 | } |
1086 | ||
1087 | ||
4d05a28d | 1088 | |
a1397fa3 KRW |
1089 | /* |
1090 | * Function to copy the from the ring buffer the 'struct blkif_request' | |
1091 | * (which has the sectors we want, number of them, grant references, etc), | |
1092 | * and transmute it to the block API to hand it over to the proper block disk. | |
4d05a28d | 1093 | */ |
b4726a9d DS |
1094 | static int |
1095 | __do_block_io_op(struct xen_blkif *blkif) | |
4d05a28d | 1096 | { |
88122933 JF |
1097 | union blkif_back_rings *blk_rings = &blkif->blk_rings; |
1098 | struct blkif_request req; | |
2e9977c2 | 1099 | struct pending_req *pending_req; |
4d05a28d KRW |
1100 | RING_IDX rc, rp; |
1101 | int more_to_do = 0; | |
1102 | ||
1103 | rc = blk_rings->common.req_cons; | |
1104 | rp = blk_rings->common.sring->req_prod; | |
1105 | rmb(); /* Ensure we see queued requests up to 'rp'. */ | |
1106 | ||
8e3f8755 KRW |
1107 | if (RING_REQUEST_PROD_OVERFLOW(&blk_rings->common, rp)) { |
1108 | rc = blk_rings->common.rsp_prod_pvt; | |
77387b82 | 1109 | pr_warn("Frontend provided bogus ring requests (%d - %d = %d). Halting ring processing on dev=%04x\n", |
8e3f8755 KRW |
1110 | rp, rc, rp - rc, blkif->vbd.pdevice); |
1111 | return -EACCES; | |
1112 | } | |
4d05a28d KRW |
1113 | while (rc != rp) { |
1114 | ||
1115 | if (RING_REQUEST_CONS_OVERFLOW(&blk_rings->common, rc)) | |
1116 | break; | |
1117 | ||
8270b45b | 1118 | if (kthread_should_stop()) { |
4d05a28d KRW |
1119 | more_to_do = 1; |
1120 | break; | |
1121 | } | |
1122 | ||
bf0720c4 | 1123 | pending_req = alloc_req(blkif); |
8270b45b KF |
1124 | if (NULL == pending_req) { |
1125 | blkif->st_oo_req++; | |
4d05a28d KRW |
1126 | more_to_do = 1; |
1127 | break; | |
1128 | } | |
1129 | ||
1130 | switch (blkif->blk_protocol) { | |
1131 | case BLKIF_PROTOCOL_NATIVE: | |
1132 | memcpy(&req, RING_GET_REQUEST(&blk_rings->native, rc), sizeof(req)); | |
1133 | break; | |
1134 | case BLKIF_PROTOCOL_X86_32: | |
1135 | blkif_get_x86_32_req(&req, RING_GET_REQUEST(&blk_rings->x86_32, rc)); | |
1136 | break; | |
1137 | case BLKIF_PROTOCOL_X86_64: | |
1138 | blkif_get_x86_64_req(&req, RING_GET_REQUEST(&blk_rings->x86_64, rc)); | |
1139 | break; | |
1140 | default: | |
1141 | BUG(); | |
1142 | } | |
1143 | blk_rings->common.req_cons = ++rc; /* before make_response() */ | |
1144 | ||
1145 | /* Apply all sanity checks to /private copy/ of request. */ | |
1146 | barrier(); | |
0e367ae4 DV |
1147 | |
1148 | switch (req.operation) { | |
1149 | case BLKIF_OP_READ: | |
1150 | case BLKIF_OP_WRITE: | |
1151 | case BLKIF_OP_WRITE_BARRIER: | |
1152 | case BLKIF_OP_FLUSH_DISKCACHE: | |
402b27f9 | 1153 | case BLKIF_OP_INDIRECT: |
0e367ae4 DV |
1154 | if (dispatch_rw_block_io(blkif, &req, pending_req)) |
1155 | goto done; | |
1156 | break; | |
1157 | case BLKIF_OP_DISCARD: | |
bf0720c4 | 1158 | free_req(blkif, pending_req); |
42146352 | 1159 | if (dispatch_discard_io(blkif, &req)) |
0e367ae4 | 1160 | goto done; |
4d05a28d | 1161 | break; |
0e367ae4 DV |
1162 | default: |
1163 | if (dispatch_other_io(blkif, &req, pending_req)) | |
1164 | goto done; | |
1165 | break; | |
1166 | } | |
4d05a28d KRW |
1167 | |
1168 | /* Yield point for this unbounded loop. */ | |
1169 | cond_resched(); | |
1170 | } | |
0e367ae4 | 1171 | done: |
4d05a28d KRW |
1172 | return more_to_do; |
1173 | } | |
1174 | ||
b4726a9d DS |
1175 | static int |
1176 | do_block_io_op(struct xen_blkif *blkif) | |
1177 | { | |
1178 | union blkif_back_rings *blk_rings = &blkif->blk_rings; | |
1179 | int more_to_do; | |
1180 | ||
1181 | do { | |
1182 | more_to_do = __do_block_io_op(blkif); | |
1183 | if (more_to_do) | |
1184 | break; | |
1185 | ||
1186 | RING_FINAL_CHECK_FOR_REQUESTS(&blk_rings->common, more_to_do); | |
1187 | } while (more_to_do); | |
1188 | ||
1189 | return more_to_do; | |
1190 | } | |
a1397fa3 | 1191 | /* |
01f37f2d KRW |
1192 | * Transmutation of the 'struct blkif_request' to a proper 'struct bio' |
1193 | * and call the 'submit_bio' to pass it to the underlying storage. | |
a1397fa3 | 1194 | */ |
30fd1502 KRW |
1195 | static int dispatch_rw_block_io(struct xen_blkif *blkif, |
1196 | struct blkif_request *req, | |
1197 | struct pending_req *pending_req) | |
4d05a28d | 1198 | { |
4d05a28d | 1199 | struct phys_req preq; |
402b27f9 | 1200 | struct seg_buf *seg = pending_req->seg; |
4d05a28d KRW |
1201 | unsigned int nseg; |
1202 | struct bio *bio = NULL; | |
402b27f9 | 1203 | struct bio **biolist = pending_req->biolist; |
1a95fe6e | 1204 | int i, nbio = 0; |
4d05a28d | 1205 | int operation; |
a19be5f0 | 1206 | struct blk_plug plug; |
29bde093 | 1207 | bool drain = false; |
bb642e83 | 1208 | struct grant_page **pages = pending_req->segments; |
402b27f9 RPM |
1209 | unsigned short req_operation; |
1210 | ||
1211 | req_operation = req->operation == BLKIF_OP_INDIRECT ? | |
1212 | req->u.indirect.indirect_op : req->operation; | |
1213 | if ((req->operation == BLKIF_OP_INDIRECT) && | |
1214 | (req_operation != BLKIF_OP_READ) && | |
1215 | (req_operation != BLKIF_OP_WRITE)) { | |
77387b82 | 1216 | pr_debug("Invalid indirect operation (%u)\n", req_operation); |
402b27f9 RPM |
1217 | goto fail_response; |
1218 | } | |
4d05a28d | 1219 | |
402b27f9 | 1220 | switch (req_operation) { |
4d05a28d | 1221 | case BLKIF_OP_READ: |
fc53bf75 | 1222 | blkif->st_rd_req++; |
4d05a28d KRW |
1223 | operation = READ; |
1224 | break; | |
1225 | case BLKIF_OP_WRITE: | |
fc53bf75 | 1226 | blkif->st_wr_req++; |
013c3ca1 | 1227 | operation = WRITE_ODIRECT; |
4d05a28d | 1228 | break; |
29bde093 KRW |
1229 | case BLKIF_OP_WRITE_BARRIER: |
1230 | drain = true; | |
24f567f9 | 1231 | case BLKIF_OP_FLUSH_DISKCACHE: |
fc53bf75 | 1232 | blkif->st_f_req++; |
24f567f9 | 1233 | operation = WRITE_FLUSH; |
4d05a28d KRW |
1234 | break; |
1235 | default: | |
1236 | operation = 0; /* make gcc happy */ | |
fc53bf75 KRW |
1237 | goto fail_response; |
1238 | break; | |
4d05a28d KRW |
1239 | } |
1240 | ||
42146352 | 1241 | /* Check that the number of segments is sane. */ |
402b27f9 RPM |
1242 | nseg = req->operation == BLKIF_OP_INDIRECT ? |
1243 | req->u.indirect.nr_segments : req->u.rw.nr_segments; | |
97e36834 | 1244 | |
42146352 | 1245 | if (unlikely(nseg == 0 && operation != WRITE_FLUSH) || |
402b27f9 RPM |
1246 | unlikely((req->operation != BLKIF_OP_INDIRECT) && |
1247 | (nseg > BLKIF_MAX_SEGMENTS_PER_REQUEST)) || | |
1248 | unlikely((req->operation == BLKIF_OP_INDIRECT) && | |
1249 | (nseg > MAX_INDIRECT_SEGMENTS))) { | |
77387b82 | 1250 | pr_debug("Bad number of segments in request (%d)\n", nseg); |
1a95fe6e | 1251 | /* Haven't submitted any bio's yet. */ |
4d05a28d KRW |
1252 | goto fail_response; |
1253 | } | |
1254 | ||
4d05a28d KRW |
1255 | preq.nr_sects = 0; |
1256 | ||
1257 | pending_req->blkif = blkif; | |
97e36834 | 1258 | pending_req->id = req->u.rw.id; |
402b27f9 | 1259 | pending_req->operation = req_operation; |
4d05a28d | 1260 | pending_req->status = BLKIF_RSP_OKAY; |
6684fa1c | 1261 | pending_req->nr_segs = nseg; |
e9350493 | 1262 | |
402b27f9 RPM |
1263 | if (req->operation != BLKIF_OP_INDIRECT) { |
1264 | preq.dev = req->u.rw.handle; | |
1265 | preq.sector_number = req->u.rw.sector_number; | |
1266 | for (i = 0; i < nseg; i++) { | |
bb642e83 | 1267 | pages[i]->gref = req->u.rw.seg[i].gref; |
402b27f9 RPM |
1268 | seg[i].nsec = req->u.rw.seg[i].last_sect - |
1269 | req->u.rw.seg[i].first_sect + 1; | |
1270 | seg[i].offset = (req->u.rw.seg[i].first_sect << 9); | |
1271 | if ((req->u.rw.seg[i].last_sect >= (PAGE_SIZE >> 9)) || | |
1272 | (req->u.rw.seg[i].last_sect < | |
1273 | req->u.rw.seg[i].first_sect)) | |
1274 | goto fail_response; | |
1275 | preq.nr_sects += seg[i].nsec; | |
1276 | } | |
1277 | } else { | |
1278 | preq.dev = req->u.indirect.handle; | |
1279 | preq.sector_number = req->u.indirect.sector_number; | |
1280 | if (xen_blkbk_parse_indirect(req, pending_req, seg, &preq)) | |
4d05a28d | 1281 | goto fail_response; |
4d05a28d KRW |
1282 | } |
1283 | ||
3d814731 | 1284 | if (xen_vbd_translate(&preq, blkif, operation) != 0) { |
77387b82 | 1285 | pr_debug("access denied: %s of [%llu,%llu] on dev=%04x\n", |
ebe81906 KRW |
1286 | operation == READ ? "read" : "write", |
1287 | preq.sector_number, | |
a72d9002 CG |
1288 | preq.sector_number + preq.nr_sects, |
1289 | blkif->vbd.pdevice); | |
1a95fe6e | 1290 | goto fail_response; |
4d05a28d | 1291 | } |
01f37f2d KRW |
1292 | |
1293 | /* | |
3d814731 | 1294 | * This check _MUST_ be done after xen_vbd_translate as the preq.bdev |
01f37f2d KRW |
1295 | * is set there. |
1296 | */ | |
e9350493 KRW |
1297 | for (i = 0; i < nseg; i++) { |
1298 | if (((int)preq.sector_number|(int)seg[i].nsec) & | |
1299 | ((bdev_logical_block_size(preq.bdev) >> 9) - 1)) { | |
77387b82 | 1300 | pr_debug("Misaligned I/O request from domain %d\n", |
ebe81906 | 1301 | blkif->domid); |
e9350493 KRW |
1302 | goto fail_response; |
1303 | } | |
1304 | } | |
01f37f2d | 1305 | |
29bde093 KRW |
1306 | /* Wait on all outstanding I/O's and once that has been completed |
1307 | * issue the WRITE_FLUSH. | |
1308 | */ | |
1309 | if (drain) | |
1310 | xen_blk_drain_io(pending_req->blkif); | |
1311 | ||
01f37f2d KRW |
1312 | /* |
1313 | * If we have failed at this point, we need to undo the M2P override, | |
2e9977c2 KRW |
1314 | * set gnttab_set_unmap_op on all of the grant references and perform |
1315 | * the hypercall to unmap the grants - that is all done in | |
9f3aedf5 | 1316 | * xen_blkbk_unmap. |
2e9977c2 | 1317 | */ |
bb642e83 | 1318 | if (xen_blkbk_map_seg(pending_req)) |
4d05a28d KRW |
1319 | goto fail_flush; |
1320 | ||
b3cb0d6a LD |
1321 | /* |
1322 | * This corresponding xen_blkif_put is done in __end_block_io_op, or | |
1323 | * below (in "!bio") if we are handling a BLKIF_OP_DISCARD. | |
1324 | */ | |
8b6bf747 | 1325 | xen_blkif_get(blkif); |
c05f3e3c | 1326 | atomic_inc(&blkif->inflight); |
4d05a28d KRW |
1327 | |
1328 | for (i = 0; i < nseg; i++) { | |
4d05a28d KRW |
1329 | while ((bio == NULL) || |
1330 | (bio_add_page(bio, | |
bb642e83 | 1331 | pages[i]->page, |
4d05a28d | 1332 | seg[i].nsec << 9, |
ffb1dabd | 1333 | seg[i].offset) == 0)) { |
2e9977c2 | 1334 | |
1e0f7a21 RPM |
1335 | int nr_iovecs = min_t(int, (nseg-i), BIO_MAX_PAGES); |
1336 | bio = bio_alloc(GFP_KERNEL, nr_iovecs); | |
4d05a28d KRW |
1337 | if (unlikely(bio == NULL)) |
1338 | goto fail_put_bio; | |
1339 | ||
03e0edf9 | 1340 | biolist[nbio++] = bio; |
4d05a28d KRW |
1341 | bio->bi_bdev = preq.bdev; |
1342 | bio->bi_private = pending_req; | |
1343 | bio->bi_end_io = end_block_io_op; | |
4f024f37 | 1344 | bio->bi_iter.bi_sector = preq.sector_number; |
4d05a28d KRW |
1345 | } |
1346 | ||
1347 | preq.sector_number += seg[i].nsec; | |
1348 | } | |
1349 | ||
b3cb0d6a | 1350 | /* This will be hit if the operation was a flush or discard. */ |
4d05a28d | 1351 | if (!bio) { |
42146352 | 1352 | BUG_ON(operation != WRITE_FLUSH); |
b0f80127 | 1353 | |
42146352 KRW |
1354 | bio = bio_alloc(GFP_KERNEL, 0); |
1355 | if (unlikely(bio == NULL)) | |
1356 | goto fail_put_bio; | |
4d05a28d | 1357 | |
42146352 KRW |
1358 | biolist[nbio++] = bio; |
1359 | bio->bi_bdev = preq.bdev; | |
1360 | bio->bi_private = pending_req; | |
1361 | bio->bi_end_io = end_block_io_op; | |
4d05a28d KRW |
1362 | } |
1363 | ||
77089926 | 1364 | atomic_set(&pending_req->pendcnt, nbio); |
a19be5f0 KRW |
1365 | blk_start_plug(&plug); |
1366 | ||
77089926 KRW |
1367 | for (i = 0; i < nbio; i++) |
1368 | submit_bio(operation, biolist[i]); | |
1369 | ||
a19be5f0 | 1370 | /* Let the I/Os go.. */ |
3d68b399 | 1371 | blk_finish_plug(&plug); |
a19be5f0 | 1372 | |
4d05a28d KRW |
1373 | if (operation == READ) |
1374 | blkif->st_rd_sect += preq.nr_sects; | |
5c62cb48 | 1375 | else if (operation & WRITE) |
4d05a28d KRW |
1376 | blkif->st_wr_sect += preq.nr_sects; |
1377 | ||
fc53bf75 | 1378 | return 0; |
4d05a28d KRW |
1379 | |
1380 | fail_flush: | |
bb642e83 | 1381 | xen_blkbk_unmap(blkif, pending_req->segments, |
6684fa1c | 1382 | pending_req->nr_segs); |
4d05a28d | 1383 | fail_response: |
0faa8cca | 1384 | /* Haven't submitted any bio's yet. */ |
402b27f9 | 1385 | make_response(blkif, req->u.rw.id, req_operation, BLKIF_RSP_ERROR); |
bf0720c4 | 1386 | free_req(blkif, pending_req); |
4d05a28d | 1387 | msleep(1); /* back off a bit */ |
fc53bf75 | 1388 | return -EIO; |
4d05a28d KRW |
1389 | |
1390 | fail_put_bio: | |
03e0edf9 | 1391 | for (i = 0; i < nbio; i++) |
77089926 | 1392 | bio_put(biolist[i]); |
0e5e098a | 1393 | atomic_set(&pending_req->pendcnt, 1); |
4d05a28d | 1394 | __end_block_io_op(pending_req, -EINVAL); |
4d05a28d | 1395 | msleep(1); /* back off a bit */ |
fc53bf75 | 1396 | return -EIO; |
4d05a28d KRW |
1397 | } |
1398 | ||
1399 | ||
1400 | ||
a1397fa3 KRW |
1401 | /* |
1402 | * Put a response on the ring on how the operation fared. | |
4d05a28d | 1403 | */ |
30fd1502 | 1404 | static void make_response(struct xen_blkif *blkif, u64 id, |
4d05a28d KRW |
1405 | unsigned short op, int st) |
1406 | { | |
88122933 | 1407 | struct blkif_response resp; |
4d05a28d | 1408 | unsigned long flags; |
88122933 | 1409 | union blkif_back_rings *blk_rings = &blkif->blk_rings; |
4d05a28d KRW |
1410 | int notify; |
1411 | ||
1412 | resp.id = id; | |
1413 | resp.operation = op; | |
1414 | resp.status = st; | |
1415 | ||
1416 | spin_lock_irqsave(&blkif->blk_ring_lock, flags); | |
1417 | /* Place on the response ring for the relevant domain. */ | |
1418 | switch (blkif->blk_protocol) { | |
1419 | case BLKIF_PROTOCOL_NATIVE: | |
1420 | memcpy(RING_GET_RESPONSE(&blk_rings->native, blk_rings->native.rsp_prod_pvt), | |
1421 | &resp, sizeof(resp)); | |
1422 | break; | |
1423 | case BLKIF_PROTOCOL_X86_32: | |
1424 | memcpy(RING_GET_RESPONSE(&blk_rings->x86_32, blk_rings->x86_32.rsp_prod_pvt), | |
1425 | &resp, sizeof(resp)); | |
1426 | break; | |
1427 | case BLKIF_PROTOCOL_X86_64: | |
1428 | memcpy(RING_GET_RESPONSE(&blk_rings->x86_64, blk_rings->x86_64.rsp_prod_pvt), | |
1429 | &resp, sizeof(resp)); | |
1430 | break; | |
1431 | default: | |
1432 | BUG(); | |
1433 | } | |
1434 | blk_rings->common.rsp_prod_pvt++; | |
1435 | RING_PUSH_RESPONSES_AND_CHECK_NOTIFY(&blk_rings->common, notify); | |
4d05a28d | 1436 | spin_unlock_irqrestore(&blkif->blk_ring_lock, flags); |
4d05a28d KRW |
1437 | if (notify) |
1438 | notify_remote_via_irq(blkif->irq); | |
1439 | } | |
1440 | ||
8b6bf747 | 1441 | static int __init xen_blkif_init(void) |
4d05a28d | 1442 | { |
8770b268 | 1443 | int rc = 0; |
4d05a28d | 1444 | |
b2167ba6 | 1445 | if (!xen_domain()) |
4d05a28d KRW |
1446 | return -ENODEV; |
1447 | ||
86839c56 BL |
1448 | if (xen_blkif_max_ring_order > XENBUS_MAX_RING_PAGE_ORDER) { |
1449 | pr_info("Invalid max_ring_order (%d), will use default max: %d.\n", | |
1450 | xen_blkif_max_ring_order, XENBUS_MAX_RING_PAGE_ORDER); | |
1451 | xen_blkif_max_ring_order = XENBUS_MAX_RING_PAGE_ORDER; | |
1452 | } | |
1453 | ||
8b6bf747 | 1454 | rc = xen_blkif_interface_init(); |
8770b268 KRW |
1455 | if (rc) |
1456 | goto failed_init; | |
4d05a28d | 1457 | |
8b6bf747 | 1458 | rc = xen_blkif_xenbus_init(); |
8770b268 KRW |
1459 | if (rc) |
1460 | goto failed_init; | |
4d05a28d | 1461 | |
8770b268 | 1462 | failed_init: |
8770b268 | 1463 | return rc; |
4d05a28d KRW |
1464 | } |
1465 | ||
8b6bf747 | 1466 | module_init(xen_blkif_init); |
4d05a28d KRW |
1467 | |
1468 | MODULE_LICENSE("Dual BSD/GPL"); | |
a7e9357f | 1469 | MODULE_ALIAS("xen-backend:vbd"); |