]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/md/dm-cache-metadata.c
Merge tag 'nfs-for-4.11-1' of git://git.linux-nfs.org/projects/anna/linux-nfs
[mirror_ubuntu-artful-kernel.git] / drivers / md / dm-cache-metadata.c
CommitLineData
c6b4fcba
JT
1/*
2 * Copyright (C) 2012 Red Hat, Inc.
3 *
4 * This file is released under the GPL.
5 */
6
7#include "dm-cache-metadata.h"
8
9#include "persistent-data/dm-array.h"
10#include "persistent-data/dm-bitset.h"
11#include "persistent-data/dm-space-map.h"
12#include "persistent-data/dm-space-map-disk.h"
13#include "persistent-data/dm-transaction-manager.h"
14
15#include <linux/device-mapper.h>
16
17/*----------------------------------------------------------------*/
18
19#define DM_MSG_PREFIX "cache metadata"
20
21#define CACHE_SUPERBLOCK_MAGIC 06142003
22#define CACHE_SUPERBLOCK_LOCATION 0
53d49819
JT
23
24/*
25 * defines a range of metadata versions that this module can handle.
26 */
27#define MIN_CACHE_VERSION 1
629d0a8a 28#define MAX_CACHE_VERSION 2
53d49819 29
c6b4fcba
JT
30#define CACHE_METADATA_CACHE_SIZE 64
31
32/*
33 * 3 for btree insert +
34 * 2 for btree lookup used within space map
35 */
36#define CACHE_MAX_CONCURRENT_LOCKS 5
37#define SPACE_MAP_ROOT_SIZE 128
38
39enum superblock_flag_bits {
40 /* for spotting crashes that would invalidate the dirty bitset */
41 CLEAN_SHUTDOWN,
028ae9f7
JT
42 /* metadata must be checked using the tools */
43 NEEDS_CHECK,
c6b4fcba
JT
44};
45
46/*
47 * Each mapping from cache block -> origin block carries a set of flags.
48 */
49enum mapping_bits {
50 /*
51 * A valid mapping. Because we're using an array we clear this
52 * flag for an non existant mapping.
53 */
54 M_VALID = 1,
55
56 /*
57 * The data on the cache is different from that on the origin.
629d0a8a 58 * This flag is only used by metadata format 1.
c6b4fcba
JT
59 */
60 M_DIRTY = 2
61};
62
63struct cache_disk_superblock {
64 __le32 csum;
65 __le32 flags;
66 __le64 blocknr;
67
68 __u8 uuid[16];
69 __le64 magic;
70 __le32 version;
71
72 __u8 policy_name[CACHE_POLICY_NAME_SIZE];
73 __le32 policy_hint_size;
74
75 __u8 metadata_space_map_root[SPACE_MAP_ROOT_SIZE];
76 __le64 mapping_root;
77 __le64 hint_root;
78
79 __le64 discard_root;
80 __le64 discard_block_size;
81 __le64 discard_nr_blocks;
82
83 __le32 data_block_size;
84 __le32 metadata_block_size;
85 __le32 cache_blocks;
86
87 __le32 compat_flags;
88 __le32 compat_ro_flags;
89 __le32 incompat_flags;
90
91 __le32 read_hits;
92 __le32 read_misses;
93 __le32 write_hits;
94 __le32 write_misses;
4e7f506f
MS
95
96 __le32 policy_version[CACHE_POLICY_VERSION_SIZE];
629d0a8a
JT
97
98 /*
99 * Metadata format 2 fields.
100 */
101 __le64 dirty_root;
c6b4fcba
JT
102} __packed;
103
104struct dm_cache_metadata {
9b1cc9f2
JT
105 atomic_t ref_count;
106 struct list_head list;
107
629d0a8a 108 unsigned version;
c6b4fcba
JT
109 struct block_device *bdev;
110 struct dm_block_manager *bm;
111 struct dm_space_map *metadata_sm;
112 struct dm_transaction_manager *tm;
113
114 struct dm_array_info info;
115 struct dm_array_info hint_info;
116 struct dm_disk_bitset discard_info;
117
118 struct rw_semaphore root_lock;
028ae9f7 119 unsigned long flags;
c6b4fcba
JT
120 dm_block_t root;
121 dm_block_t hint_root;
122 dm_block_t discard_root;
123
124 sector_t discard_block_size;
1bad9bc4 125 dm_dblock_t discard_nr_blocks;
c6b4fcba
JT
126
127 sector_t data_block_size;
128 dm_cblock_t cache_blocks;
129 bool changed:1;
130 bool clean_when_opened:1;
131
132 char policy_name[CACHE_POLICY_NAME_SIZE];
4e7f506f 133 unsigned policy_version[CACHE_POLICY_VERSION_SIZE];
c6b4fcba
JT
134 size_t policy_hint_size;
135 struct dm_cache_statistics stats;
5a32083d
JT
136
137 /*
138 * Reading the space map root can fail, so we read it into this
139 * buffer before the superblock is locked and updated.
140 */
141 __u8 metadata_space_map_root[SPACE_MAP_ROOT_SIZE];
028ae9f7
JT
142
143 /*
144 * Set if a transaction has to be aborted but the attempt to roll
145 * back to the previous (good) transaction failed. The only
146 * metadata operation permissible in this state is the closing of
147 * the device.
148 */
149 bool fail_io:1;
f177940a 150
629d0a8a
JT
151 /*
152 * Metadata format 2 fields.
153 */
154 dm_block_t dirty_root;
155 struct dm_disk_bitset dirty_info;
156
f177940a
JT
157 /*
158 * These structures are used when loading metadata. They're too
159 * big to put on the stack.
160 */
161 struct dm_array_cursor mapping_cursor;
162 struct dm_array_cursor hint_cursor;
629d0a8a 163 struct dm_bitset_cursor dirty_cursor;
c6b4fcba
JT
164};
165
166/*-------------------------------------------------------------------
167 * superblock validator
168 *-----------------------------------------------------------------*/
169
170#define SUPERBLOCK_CSUM_XOR 9031977
171
172static void sb_prepare_for_write(struct dm_block_validator *v,
173 struct dm_block *b,
174 size_t sb_block_size)
175{
176 struct cache_disk_superblock *disk_super = dm_block_data(b);
177
178 disk_super->blocknr = cpu_to_le64(dm_block_location(b));
179 disk_super->csum = cpu_to_le32(dm_bm_checksum(&disk_super->flags,
180 sb_block_size - sizeof(__le32),
181 SUPERBLOCK_CSUM_XOR));
182}
183
53d49819
JT
184static int check_metadata_version(struct cache_disk_superblock *disk_super)
185{
186 uint32_t metadata_version = le32_to_cpu(disk_super->version);
629d0a8a 187
53d49819
JT
188 if (metadata_version < MIN_CACHE_VERSION || metadata_version > MAX_CACHE_VERSION) {
189 DMERR("Cache metadata version %u found, but only versions between %u and %u supported.",
190 metadata_version, MIN_CACHE_VERSION, MAX_CACHE_VERSION);
191 return -EINVAL;
192 }
193
194 return 0;
195}
196
c6b4fcba
JT
197static int sb_check(struct dm_block_validator *v,
198 struct dm_block *b,
199 size_t sb_block_size)
200{
201 struct cache_disk_superblock *disk_super = dm_block_data(b);
202 __le32 csum_le;
203
204 if (dm_block_location(b) != le64_to_cpu(disk_super->blocknr)) {
205 DMERR("sb_check failed: blocknr %llu: wanted %llu",
206 le64_to_cpu(disk_super->blocknr),
207 (unsigned long long)dm_block_location(b));
208 return -ENOTBLK;
209 }
210
211 if (le64_to_cpu(disk_super->magic) != CACHE_SUPERBLOCK_MAGIC) {
212 DMERR("sb_check failed: magic %llu: wanted %llu",
213 le64_to_cpu(disk_super->magic),
214 (unsigned long long)CACHE_SUPERBLOCK_MAGIC);
215 return -EILSEQ;
216 }
217
218 csum_le = cpu_to_le32(dm_bm_checksum(&disk_super->flags,
219 sb_block_size - sizeof(__le32),
220 SUPERBLOCK_CSUM_XOR));
221 if (csum_le != disk_super->csum) {
222 DMERR("sb_check failed: csum %u: wanted %u",
223 le32_to_cpu(csum_le), le32_to_cpu(disk_super->csum));
224 return -EILSEQ;
225 }
226
53d49819 227 return check_metadata_version(disk_super);
c6b4fcba
JT
228}
229
230static struct dm_block_validator sb_validator = {
231 .name = "superblock",
232 .prepare_for_write = sb_prepare_for_write,
233 .check = sb_check
234};
235
236/*----------------------------------------------------------------*/
237
238static int superblock_read_lock(struct dm_cache_metadata *cmd,
239 struct dm_block **sblock)
240{
241 return dm_bm_read_lock(cmd->bm, CACHE_SUPERBLOCK_LOCATION,
242 &sb_validator, sblock);
243}
244
245static int superblock_lock_zero(struct dm_cache_metadata *cmd,
246 struct dm_block **sblock)
247{
248 return dm_bm_write_lock_zero(cmd->bm, CACHE_SUPERBLOCK_LOCATION,
249 &sb_validator, sblock);
250}
251
252static int superblock_lock(struct dm_cache_metadata *cmd,
253 struct dm_block **sblock)
254{
255 return dm_bm_write_lock(cmd->bm, CACHE_SUPERBLOCK_LOCATION,
256 &sb_validator, sblock);
257}
258
259/*----------------------------------------------------------------*/
260
dd8b0c20 261static int __superblock_all_zeroes(struct dm_block_manager *bm, bool *result)
c6b4fcba
JT
262{
263 int r;
264 unsigned i;
265 struct dm_block *b;
266 __le64 *data_le, zero = cpu_to_le64(0);
267 unsigned sb_block_size = dm_bm_block_size(bm) / sizeof(__le64);
268
269 /*
270 * We can't use a validator here - it may be all zeroes.
271 */
272 r = dm_bm_read_lock(bm, CACHE_SUPERBLOCK_LOCATION, NULL, &b);
273 if (r)
274 return r;
275
276 data_le = dm_block_data(b);
dd8b0c20 277 *result = true;
c6b4fcba
JT
278 for (i = 0; i < sb_block_size; i++) {
279 if (data_le[i] != zero) {
dd8b0c20 280 *result = false;
c6b4fcba
JT
281 break;
282 }
283 }
284
4c7da06f
MP
285 dm_bm_unlock(b);
286
287 return 0;
c6b4fcba
JT
288}
289
290static void __setup_mapping_info(struct dm_cache_metadata *cmd)
291{
292 struct dm_btree_value_type vt;
293
294 vt.context = NULL;
295 vt.size = sizeof(__le64);
296 vt.inc = NULL;
297 vt.dec = NULL;
298 vt.equal = NULL;
299 dm_array_info_init(&cmd->info, cmd->tm, &vt);
300
301 if (cmd->policy_hint_size) {
302 vt.size = sizeof(__le32);
303 dm_array_info_init(&cmd->hint_info, cmd->tm, &vt);
304 }
305}
306
5a32083d
JT
307static int __save_sm_root(struct dm_cache_metadata *cmd)
308{
309 int r;
310 size_t metadata_len;
311
312 r = dm_sm_root_size(cmd->metadata_sm, &metadata_len);
313 if (r < 0)
314 return r;
315
316 return dm_sm_copy_root(cmd->metadata_sm, &cmd->metadata_space_map_root,
317 metadata_len);
318}
319
320static void __copy_sm_root(struct dm_cache_metadata *cmd,
321 struct cache_disk_superblock *disk_super)
322{
323 memcpy(&disk_super->metadata_space_map_root,
324 &cmd->metadata_space_map_root,
325 sizeof(cmd->metadata_space_map_root));
326}
327
629d0a8a
JT
328static bool separate_dirty_bits(struct dm_cache_metadata *cmd)
329{
330 return cmd->version >= 2;
331}
332
c6b4fcba
JT
333static int __write_initial_superblock(struct dm_cache_metadata *cmd)
334{
335 int r;
336 struct dm_block *sblock;
c6b4fcba
JT
337 struct cache_disk_superblock *disk_super;
338 sector_t bdev_size = i_size_read(cmd->bdev->bd_inode) >> SECTOR_SHIFT;
339
340 /* FIXME: see if we can lose the max sectors limit */
341 if (bdev_size > DM_CACHE_METADATA_MAX_SECTORS)
342 bdev_size = DM_CACHE_METADATA_MAX_SECTORS;
343
5a32083d 344 r = dm_tm_pre_commit(cmd->tm);
c6b4fcba
JT
345 if (r < 0)
346 return r;
347
5a32083d
JT
348 /*
349 * dm_sm_copy_root() can fail. So we need to do it before we start
350 * updating the superblock.
351 */
352 r = __save_sm_root(cmd);
353 if (r)
c6b4fcba
JT
354 return r;
355
356 r = superblock_lock_zero(cmd, &sblock);
357 if (r)
358 return r;
359
360 disk_super = dm_block_data(sblock);
361 disk_super->flags = 0;
362 memset(disk_super->uuid, 0, sizeof(disk_super->uuid));
363 disk_super->magic = cpu_to_le64(CACHE_SUPERBLOCK_MAGIC);
629d0a8a 364 disk_super->version = cpu_to_le32(cmd->version);
4e7f506f
MS
365 memset(disk_super->policy_name, 0, sizeof(disk_super->policy_name));
366 memset(disk_super->policy_version, 0, sizeof(disk_super->policy_version));
c6b4fcba
JT
367 disk_super->policy_hint_size = 0;
368
5a32083d 369 __copy_sm_root(cmd, disk_super);
c6b4fcba
JT
370
371 disk_super->mapping_root = cpu_to_le64(cmd->root);
372 disk_super->hint_root = cpu_to_le64(cmd->hint_root);
373 disk_super->discard_root = cpu_to_le64(cmd->discard_root);
374 disk_super->discard_block_size = cpu_to_le64(cmd->discard_block_size);
1bad9bc4 375 disk_super->discard_nr_blocks = cpu_to_le64(from_dblock(cmd->discard_nr_blocks));
895b47d7 376 disk_super->metadata_block_size = cpu_to_le32(DM_CACHE_METADATA_BLOCK_SIZE);
c6b4fcba
JT
377 disk_super->data_block_size = cpu_to_le32(cmd->data_block_size);
378 disk_super->cache_blocks = cpu_to_le32(0);
c6b4fcba
JT
379
380 disk_super->read_hits = cpu_to_le32(0);
381 disk_super->read_misses = cpu_to_le32(0);
382 disk_super->write_hits = cpu_to_le32(0);
383 disk_super->write_misses = cpu_to_le32(0);
384
629d0a8a
JT
385 if (separate_dirty_bits(cmd))
386 disk_super->dirty_root = cpu_to_le64(cmd->dirty_root);
387
c6b4fcba 388 return dm_tm_commit(cmd->tm, sblock);
c6b4fcba
JT
389}
390
391static int __format_metadata(struct dm_cache_metadata *cmd)
392{
393 int r;
394
395 r = dm_tm_create_with_sm(cmd->bm, CACHE_SUPERBLOCK_LOCATION,
396 &cmd->tm, &cmd->metadata_sm);
397 if (r < 0) {
398 DMERR("tm_create_with_sm failed");
399 return r;
400 }
401
402 __setup_mapping_info(cmd);
403
404 r = dm_array_empty(&cmd->info, &cmd->root);
405 if (r < 0)
406 goto bad;
407
629d0a8a
JT
408 if (separate_dirty_bits(cmd)) {
409 dm_disk_bitset_init(cmd->tm, &cmd->dirty_info);
410 r = dm_bitset_empty(&cmd->dirty_info, &cmd->dirty_root);
411 if (r < 0)
412 goto bad;
413 }
414
c6b4fcba 415 dm_disk_bitset_init(cmd->tm, &cmd->discard_info);
c6b4fcba
JT
416 r = dm_bitset_empty(&cmd->discard_info, &cmd->discard_root);
417 if (r < 0)
418 goto bad;
419
420 cmd->discard_block_size = 0;
421 cmd->discard_nr_blocks = 0;
422
423 r = __write_initial_superblock(cmd);
424 if (r)
425 goto bad;
426
427 cmd->clean_when_opened = true;
428 return 0;
429
430bad:
431 dm_tm_destroy(cmd->tm);
432 dm_sm_destroy(cmd->metadata_sm);
433
434 return r;
435}
436
437static int __check_incompat_features(struct cache_disk_superblock *disk_super,
438 struct dm_cache_metadata *cmd)
439{
629d0a8a 440 uint32_t incompat_flags, features;
c6b4fcba 441
629d0a8a
JT
442 incompat_flags = le32_to_cpu(disk_super->incompat_flags);
443 features = incompat_flags & ~DM_CACHE_FEATURE_INCOMPAT_SUPP;
c6b4fcba
JT
444 if (features) {
445 DMERR("could not access metadata due to unsupported optional features (%lx).",
446 (unsigned long)features);
447 return -EINVAL;
448 }
449
450 /*
451 * Check for read-only metadata to skip the following RDWR checks.
452 */
453 if (get_disk_ro(cmd->bdev->bd_disk))
454 return 0;
455
456 features = le32_to_cpu(disk_super->compat_ro_flags) & ~DM_CACHE_FEATURE_COMPAT_RO_SUPP;
457 if (features) {
458 DMERR("could not access metadata RDWR due to unsupported optional features (%lx).",
459 (unsigned long)features);
460 return -EINVAL;
461 }
462
463 return 0;
464}
465
466static int __open_metadata(struct dm_cache_metadata *cmd)
467{
468 int r;
469 struct dm_block *sblock;
470 struct cache_disk_superblock *disk_super;
471 unsigned long sb_flags;
472
473 r = superblock_read_lock(cmd, &sblock);
474 if (r < 0) {
475 DMERR("couldn't read lock superblock");
476 return r;
477 }
478
479 disk_super = dm_block_data(sblock);
480
048e5a07
MS
481 /* Verify the data block size hasn't changed */
482 if (le32_to_cpu(disk_super->data_block_size) != cmd->data_block_size) {
483 DMERR("changing the data block size (from %u to %llu) is not supported",
484 le32_to_cpu(disk_super->data_block_size),
485 (unsigned long long)cmd->data_block_size);
486 r = -EINVAL;
487 goto bad;
488 }
489
c6b4fcba
JT
490 r = __check_incompat_features(disk_super, cmd);
491 if (r < 0)
492 goto bad;
493
494 r = dm_tm_open_with_sm(cmd->bm, CACHE_SUPERBLOCK_LOCATION,
495 disk_super->metadata_space_map_root,
496 sizeof(disk_super->metadata_space_map_root),
497 &cmd->tm, &cmd->metadata_sm);
498 if (r < 0) {
499 DMERR("tm_open_with_sm failed");
500 goto bad;
501 }
502
503 __setup_mapping_info(cmd);
629d0a8a 504 dm_disk_bitset_init(cmd->tm, &cmd->dirty_info);
c6b4fcba
JT
505 dm_disk_bitset_init(cmd->tm, &cmd->discard_info);
506 sb_flags = le32_to_cpu(disk_super->flags);
507 cmd->clean_when_opened = test_bit(CLEAN_SHUTDOWN, &sb_flags);
4c7da06f
MP
508 dm_bm_unlock(sblock);
509
510 return 0;
c6b4fcba
JT
511
512bad:
513 dm_bm_unlock(sblock);
514 return r;
515}
516
517static int __open_or_format_metadata(struct dm_cache_metadata *cmd,
518 bool format_device)
519{
dd8b0c20
JT
520 int r;
521 bool unformatted = false;
c6b4fcba
JT
522
523 r = __superblock_all_zeroes(cmd->bm, &unformatted);
524 if (r)
525 return r;
526
527 if (unformatted)
528 return format_device ? __format_metadata(cmd) : -EPERM;
529
530 return __open_metadata(cmd);
531}
532
533static int __create_persistent_data_objects(struct dm_cache_metadata *cmd,
534 bool may_format_device)
535{
536 int r;
895b47d7 537 cmd->bm = dm_block_manager_create(cmd->bdev, DM_CACHE_METADATA_BLOCK_SIZE << SECTOR_SHIFT,
c6b4fcba
JT
538 CACHE_METADATA_CACHE_SIZE,
539 CACHE_MAX_CONCURRENT_LOCKS);
540 if (IS_ERR(cmd->bm)) {
541 DMERR("could not create block manager");
542 return PTR_ERR(cmd->bm);
543 }
544
545 r = __open_or_format_metadata(cmd, may_format_device);
546 if (r)
547 dm_block_manager_destroy(cmd->bm);
548
549 return r;
550}
551
552static void __destroy_persistent_data_objects(struct dm_cache_metadata *cmd)
553{
554 dm_sm_destroy(cmd->metadata_sm);
555 dm_tm_destroy(cmd->tm);
556 dm_block_manager_destroy(cmd->bm);
557}
558
559typedef unsigned long (*flags_mutator)(unsigned long);
560
561static void update_flags(struct cache_disk_superblock *disk_super,
562 flags_mutator mutator)
563{
564 uint32_t sb_flags = mutator(le32_to_cpu(disk_super->flags));
565 disk_super->flags = cpu_to_le32(sb_flags);
566}
567
568static unsigned long set_clean_shutdown(unsigned long flags)
569{
570 set_bit(CLEAN_SHUTDOWN, &flags);
571 return flags;
572}
573
574static unsigned long clear_clean_shutdown(unsigned long flags)
575{
576 clear_bit(CLEAN_SHUTDOWN, &flags);
577 return flags;
578}
579
580static void read_superblock_fields(struct dm_cache_metadata *cmd,
581 struct cache_disk_superblock *disk_super)
582{
629d0a8a 583 cmd->version = le32_to_cpu(disk_super->version);
028ae9f7 584 cmd->flags = le32_to_cpu(disk_super->flags);
c6b4fcba
JT
585 cmd->root = le64_to_cpu(disk_super->mapping_root);
586 cmd->hint_root = le64_to_cpu(disk_super->hint_root);
587 cmd->discard_root = le64_to_cpu(disk_super->discard_root);
588 cmd->discard_block_size = le64_to_cpu(disk_super->discard_block_size);
1bad9bc4 589 cmd->discard_nr_blocks = to_dblock(le64_to_cpu(disk_super->discard_nr_blocks));
c6b4fcba
JT
590 cmd->data_block_size = le32_to_cpu(disk_super->data_block_size);
591 cmd->cache_blocks = to_cblock(le32_to_cpu(disk_super->cache_blocks));
592 strncpy(cmd->policy_name, disk_super->policy_name, sizeof(cmd->policy_name));
4e7f506f
MS
593 cmd->policy_version[0] = le32_to_cpu(disk_super->policy_version[0]);
594 cmd->policy_version[1] = le32_to_cpu(disk_super->policy_version[1]);
595 cmd->policy_version[2] = le32_to_cpu(disk_super->policy_version[2]);
c6b4fcba
JT
596 cmd->policy_hint_size = le32_to_cpu(disk_super->policy_hint_size);
597
598 cmd->stats.read_hits = le32_to_cpu(disk_super->read_hits);
599 cmd->stats.read_misses = le32_to_cpu(disk_super->read_misses);
600 cmd->stats.write_hits = le32_to_cpu(disk_super->write_hits);
601 cmd->stats.write_misses = le32_to_cpu(disk_super->write_misses);
602
629d0a8a
JT
603 if (separate_dirty_bits(cmd))
604 cmd->dirty_root = le64_to_cpu(disk_super->dirty_root);
605
c6b4fcba
JT
606 cmd->changed = false;
607}
608
609/*
610 * The mutator updates the superblock flags.
611 */
612static int __begin_transaction_flags(struct dm_cache_metadata *cmd,
613 flags_mutator mutator)
614{
615 int r;
616 struct cache_disk_superblock *disk_super;
617 struct dm_block *sblock;
618
619 r = superblock_lock(cmd, &sblock);
620 if (r)
621 return r;
622
623 disk_super = dm_block_data(sblock);
624 update_flags(disk_super, mutator);
625 read_superblock_fields(cmd, disk_super);
a9d45396 626 dm_bm_unlock(sblock);
c6b4fcba 627
a9d45396 628 return dm_bm_flush(cmd->bm);
c6b4fcba
JT
629}
630
631static int __begin_transaction(struct dm_cache_metadata *cmd)
632{
633 int r;
634 struct cache_disk_superblock *disk_super;
635 struct dm_block *sblock;
636
637 /*
638 * We re-read the superblock every time. Shouldn't need to do this
639 * really.
640 */
641 r = superblock_read_lock(cmd, &sblock);
642 if (r)
643 return r;
644
645 disk_super = dm_block_data(sblock);
646 read_superblock_fields(cmd, disk_super);
647 dm_bm_unlock(sblock);
648
649 return 0;
650}
651
652static int __commit_transaction(struct dm_cache_metadata *cmd,
653 flags_mutator mutator)
654{
655 int r;
c6b4fcba
JT
656 struct cache_disk_superblock *disk_super;
657 struct dm_block *sblock;
658
659 /*
660 * We need to know if the cache_disk_superblock exceeds a 512-byte sector.
661 */
662 BUILD_BUG_ON(sizeof(struct cache_disk_superblock) > 512);
663
629d0a8a
JT
664 if (separate_dirty_bits(cmd)) {
665 r = dm_bitset_flush(&cmd->dirty_info, cmd->dirty_root,
666 &cmd->dirty_root);
667 if (r)
668 return r;
669 }
670
c6b4fcba
JT
671 r = dm_bitset_flush(&cmd->discard_info, cmd->discard_root,
672 &cmd->discard_root);
673 if (r)
674 return r;
675
676 r = dm_tm_pre_commit(cmd->tm);
677 if (r < 0)
678 return r;
679
5a32083d
JT
680 r = __save_sm_root(cmd);
681 if (r)
c6b4fcba
JT
682 return r;
683
684 r = superblock_lock(cmd, &sblock);
685 if (r)
686 return r;
687
688 disk_super = dm_block_data(sblock);
689
3201ac45 690 disk_super->flags = cpu_to_le32(cmd->flags);
c6b4fcba
JT
691 if (mutator)
692 update_flags(disk_super, mutator);
693
694 disk_super->mapping_root = cpu_to_le64(cmd->root);
629d0a8a
JT
695 if (separate_dirty_bits(cmd))
696 disk_super->dirty_root = cpu_to_le64(cmd->dirty_root);
c6b4fcba
JT
697 disk_super->hint_root = cpu_to_le64(cmd->hint_root);
698 disk_super->discard_root = cpu_to_le64(cmd->discard_root);
699 disk_super->discard_block_size = cpu_to_le64(cmd->discard_block_size);
1bad9bc4 700 disk_super->discard_nr_blocks = cpu_to_le64(from_dblock(cmd->discard_nr_blocks));
c6b4fcba
JT
701 disk_super->cache_blocks = cpu_to_le32(from_cblock(cmd->cache_blocks));
702 strncpy(disk_super->policy_name, cmd->policy_name, sizeof(disk_super->policy_name));
4e7f506f
MS
703 disk_super->policy_version[0] = cpu_to_le32(cmd->policy_version[0]);
704 disk_super->policy_version[1] = cpu_to_le32(cmd->policy_version[1]);
705 disk_super->policy_version[2] = cpu_to_le32(cmd->policy_version[2]);
c6b4fcba
JT
706
707 disk_super->read_hits = cpu_to_le32(cmd->stats.read_hits);
708 disk_super->read_misses = cpu_to_le32(cmd->stats.read_misses);
709 disk_super->write_hits = cpu_to_le32(cmd->stats.write_hits);
710 disk_super->write_misses = cpu_to_le32(cmd->stats.write_misses);
5a32083d 711 __copy_sm_root(cmd, disk_super);
c6b4fcba
JT
712
713 return dm_tm_commit(cmd->tm, sblock);
714}
715
716/*----------------------------------------------------------------*/
717
718/*
719 * The mappings are held in a dm-array that has 64-bit values stored in
720 * little-endian format. The index is the cblock, the high 48bits of the
721 * value are the oblock and the low 16 bit the flags.
722 */
723#define FLAGS_MASK ((1 << 16) - 1)
724
725static __le64 pack_value(dm_oblock_t block, unsigned flags)
726{
727 uint64_t value = from_oblock(block);
728 value <<= 16;
729 value = value | (flags & FLAGS_MASK);
730 return cpu_to_le64(value);
731}
732
733static void unpack_value(__le64 value_le, dm_oblock_t *block, unsigned *flags)
734{
735 uint64_t value = le64_to_cpu(value_le);
736 uint64_t b = value >> 16;
737 *block = to_oblock(b);
738 *flags = value & FLAGS_MASK;
739}
740
741/*----------------------------------------------------------------*/
742
9b1cc9f2
JT
743static struct dm_cache_metadata *metadata_open(struct block_device *bdev,
744 sector_t data_block_size,
745 bool may_format_device,
629d0a8a
JT
746 size_t policy_hint_size,
747 unsigned metadata_version)
c6b4fcba
JT
748{
749 int r;
750 struct dm_cache_metadata *cmd;
751
752 cmd = kzalloc(sizeof(*cmd), GFP_KERNEL);
753 if (!cmd) {
754 DMERR("could not allocate metadata struct");
766a7888 755 return ERR_PTR(-ENOMEM);
c6b4fcba
JT
756 }
757
629d0a8a 758 cmd->version = metadata_version;
9b1cc9f2 759 atomic_set(&cmd->ref_count, 1);
c6b4fcba
JT
760 init_rwsem(&cmd->root_lock);
761 cmd->bdev = bdev;
762 cmd->data_block_size = data_block_size;
763 cmd->cache_blocks = 0;
764 cmd->policy_hint_size = policy_hint_size;
765 cmd->changed = true;
028ae9f7 766 cmd->fail_io = false;
c6b4fcba
JT
767
768 r = __create_persistent_data_objects(cmd, may_format_device);
769 if (r) {
770 kfree(cmd);
771 return ERR_PTR(r);
772 }
773
774 r = __begin_transaction_flags(cmd, clear_clean_shutdown);
775 if (r < 0) {
776 dm_cache_metadata_close(cmd);
777 return ERR_PTR(r);
778 }
779
780 return cmd;
781}
782
9b1cc9f2
JT
783/*
784 * We keep a little list of ref counted metadata objects to prevent two
785 * different target instances creating separate bufio instances. This is
786 * an issue if a table is reloaded before the suspend.
787 */
788static DEFINE_MUTEX(table_lock);
789static LIST_HEAD(table);
790
791static struct dm_cache_metadata *lookup(struct block_device *bdev)
792{
793 struct dm_cache_metadata *cmd;
794
795 list_for_each_entry(cmd, &table, list)
796 if (cmd->bdev == bdev) {
797 atomic_inc(&cmd->ref_count);
798 return cmd;
799 }
800
801 return NULL;
802}
803
804static struct dm_cache_metadata *lookup_or_open(struct block_device *bdev,
805 sector_t data_block_size,
806 bool may_format_device,
629d0a8a
JT
807 size_t policy_hint_size,
808 unsigned metadata_version)
9b1cc9f2
JT
809{
810 struct dm_cache_metadata *cmd, *cmd2;
811
812 mutex_lock(&table_lock);
813 cmd = lookup(bdev);
814 mutex_unlock(&table_lock);
815
816 if (cmd)
817 return cmd;
818
629d0a8a
JT
819 cmd = metadata_open(bdev, data_block_size, may_format_device,
820 policy_hint_size, metadata_version);
766a7888 821 if (!IS_ERR(cmd)) {
9b1cc9f2
JT
822 mutex_lock(&table_lock);
823 cmd2 = lookup(bdev);
824 if (cmd2) {
825 mutex_unlock(&table_lock);
826 __destroy_persistent_data_objects(cmd);
827 kfree(cmd);
828 return cmd2;
829 }
830 list_add(&cmd->list, &table);
831 mutex_unlock(&table_lock);
832 }
833
834 return cmd;
835}
836
837static bool same_params(struct dm_cache_metadata *cmd, sector_t data_block_size)
838{
839 if (cmd->data_block_size != data_block_size) {
07d93882 840 DMERR("data_block_size (%llu) different from that in metadata (%llu)",
9b1cc9f2
JT
841 (unsigned long long) data_block_size,
842 (unsigned long long) cmd->data_block_size);
843 return false;
844 }
845
846 return true;
847}
848
849struct dm_cache_metadata *dm_cache_metadata_open(struct block_device *bdev,
850 sector_t data_block_size,
851 bool may_format_device,
629d0a8a
JT
852 size_t policy_hint_size,
853 unsigned metadata_version)
9b1cc9f2 854{
629d0a8a
JT
855 struct dm_cache_metadata *cmd = lookup_or_open(bdev, data_block_size, may_format_device,
856 policy_hint_size, metadata_version);
766a7888
JT
857
858 if (!IS_ERR(cmd) && !same_params(cmd, data_block_size)) {
9b1cc9f2 859 dm_cache_metadata_close(cmd);
766a7888 860 return ERR_PTR(-EINVAL);
9b1cc9f2
JT
861 }
862
863 return cmd;
864}
865
c6b4fcba
JT
866void dm_cache_metadata_close(struct dm_cache_metadata *cmd)
867{
9b1cc9f2
JT
868 if (atomic_dec_and_test(&cmd->ref_count)) {
869 mutex_lock(&table_lock);
870 list_del(&cmd->list);
871 mutex_unlock(&table_lock);
872
028ae9f7
JT
873 if (!cmd->fail_io)
874 __destroy_persistent_data_objects(cmd);
9b1cc9f2
JT
875 kfree(cmd);
876 }
c6b4fcba
JT
877}
878
f494a9c6
JT
879/*
880 * Checks that the given cache block is either unmapped or clean.
881 */
629d0a8a
JT
882static int block_clean_combined_dirty(struct dm_cache_metadata *cmd, dm_cblock_t b,
883 bool *result)
f494a9c6
JT
884{
885 int r;
886 __le64 value;
887 dm_oblock_t ob;
888 unsigned flags;
889
890 r = dm_array_get_value(&cmd->info, cmd->root, from_cblock(b), &value);
629d0a8a 891 if (r)
f494a9c6 892 return r;
f494a9c6
JT
893
894 unpack_value(value, &ob, &flags);
895 *result = !((flags & M_VALID) && (flags & M_DIRTY));
896
897 return 0;
898}
899
629d0a8a
JT
900static int blocks_are_clean_combined_dirty(struct dm_cache_metadata *cmd,
901 dm_cblock_t begin, dm_cblock_t end,
902 bool *result)
f494a9c6
JT
903{
904 int r;
905 *result = true;
906
907 while (begin != end) {
629d0a8a
JT
908 r = block_clean_combined_dirty(cmd, begin, result);
909 if (r) {
910 DMERR("block_clean_combined_dirty failed");
f494a9c6 911 return r;
629d0a8a 912 }
f494a9c6
JT
913
914 if (!*result) {
915 DMERR("cache block %llu is dirty",
916 (unsigned long long) from_cblock(begin));
917 return 0;
918 }
919
920 begin = to_cblock(from_cblock(begin) + 1);
921 }
922
923 return 0;
924}
925
629d0a8a
JT
926static int blocks_are_clean_separate_dirty(struct dm_cache_metadata *cmd,
927 dm_cblock_t begin, dm_cblock_t end,
928 bool *result)
929{
930 int r;
931 bool dirty_flag;
932 *result = true;
933
7f1b2159
MS
934 r = dm_bitset_cursor_begin(&cmd->dirty_info, cmd->dirty_root,
935 from_cblock(begin), &cmd->dirty_cursor);
936 if (r) {
937 DMERR("%s: dm_bitset_cursor_begin for dirty failed", __func__);
938 return r;
939 }
940
941 r = dm_bitset_cursor_skip(&cmd->dirty_cursor, from_cblock(begin));
942 if (r) {
943 DMERR("%s: dm_bitset_cursor_skip for dirty failed", __func__);
944 dm_bitset_cursor_end(&cmd->dirty_cursor);
945 return r;
946 }
947
629d0a8a
JT
948 while (begin != end) {
949 /*
950 * We assume that unmapped blocks have their dirty bit
951 * cleared.
952 */
7f1b2159 953 dirty_flag = dm_bitset_cursor_get_value(&cmd->dirty_cursor);
629d0a8a 954 if (dirty_flag) {
7f1b2159 955 DMERR("%s: cache block %llu is dirty", __func__,
629d0a8a 956 (unsigned long long) from_cblock(begin));
7f1b2159 957 dm_bitset_cursor_end(&cmd->dirty_cursor);
629d0a8a
JT
958 *result = false;
959 return 0;
960 }
961
7f1b2159
MS
962 r = dm_bitset_cursor_next(&cmd->dirty_cursor);
963 if (r) {
964 DMERR("%s: dm_bitset_cursor_next for dirty failed", __func__);
965 dm_bitset_cursor_end(&cmd->dirty_cursor);
966 return r;
967 }
968
629d0a8a
JT
969 begin = to_cblock(from_cblock(begin) + 1);
970 }
971
7f1b2159
MS
972 dm_bitset_cursor_end(&cmd->dirty_cursor);
973
629d0a8a
JT
974 return 0;
975}
976
977static int blocks_are_unmapped_or_clean(struct dm_cache_metadata *cmd,
978 dm_cblock_t begin, dm_cblock_t end,
979 bool *result)
980{
981 if (separate_dirty_bits(cmd))
982 return blocks_are_clean_separate_dirty(cmd, begin, end, result);
983 else
984 return blocks_are_clean_combined_dirty(cmd, begin, end, result);
985}
986
9567366f
MS
987static bool cmd_write_lock(struct dm_cache_metadata *cmd)
988{
989 down_write(&cmd->root_lock);
990 if (cmd->fail_io || dm_bm_is_read_only(cmd->bm)) {
991 up_write(&cmd->root_lock);
992 return false;
d14fcf3d 993 }
9567366f
MS
994 return true;
995}
028ae9f7 996
9567366f
MS
997#define WRITE_LOCK(cmd) \
998 do { \
999 if (!cmd_write_lock((cmd))) \
1000 return -EINVAL; \
1001 } while(0)
1002
1003#define WRITE_LOCK_VOID(cmd) \
1004 do { \
1005 if (!cmd_write_lock((cmd))) \
1006 return; \
1007 } while(0)
028ae9f7
JT
1008
1009#define WRITE_UNLOCK(cmd) \
9567366f 1010 up_write(&(cmd)->root_lock)
028ae9f7 1011
9567366f
MS
1012static bool cmd_read_lock(struct dm_cache_metadata *cmd)
1013{
6545b60b 1014 down_read(&cmd->root_lock);
9567366f 1015 if (cmd->fail_io) {
6545b60b 1016 up_read(&cmd->root_lock);
9567366f 1017 return false;
d14fcf3d 1018 }
9567366f
MS
1019 return true;
1020}
d14fcf3d 1021
9567366f
MS
1022#define READ_LOCK(cmd) \
1023 do { \
1024 if (!cmd_read_lock((cmd))) \
1025 return -EINVAL; \
1026 } while(0)
1027
1028#define READ_LOCK_VOID(cmd) \
1029 do { \
1030 if (!cmd_read_lock((cmd))) \
1031 return; \
1032 } while(0)
d14fcf3d
JT
1033
1034#define READ_UNLOCK(cmd) \
9567366f 1035 up_read(&(cmd)->root_lock)
d14fcf3d 1036
c6b4fcba
JT
1037int dm_cache_resize(struct dm_cache_metadata *cmd, dm_cblock_t new_cache_size)
1038{
1039 int r;
f494a9c6 1040 bool clean;
c6b4fcba
JT
1041 __le64 null_mapping = pack_value(0, 0);
1042
028ae9f7 1043 WRITE_LOCK(cmd);
c6b4fcba 1044 __dm_bless_for_disk(&null_mapping);
f494a9c6
JT
1045
1046 if (from_cblock(new_cache_size) < from_cblock(cmd->cache_blocks)) {
1047 r = blocks_are_unmapped_or_clean(cmd, new_cache_size, cmd->cache_blocks, &clean);
1048 if (r) {
1049 __dm_unbless_for_disk(&null_mapping);
1050 goto out;
1051 }
1052
1053 if (!clean) {
1054 DMERR("unable to shrink cache due to dirty blocks");
1055 r = -EINVAL;
1056 __dm_unbless_for_disk(&null_mapping);
1057 goto out;
1058 }
1059 }
1060
c6b4fcba
JT
1061 r = dm_array_resize(&cmd->info, cmd->root, from_cblock(cmd->cache_blocks),
1062 from_cblock(new_cache_size),
1063 &null_mapping, &cmd->root);
629d0a8a
JT
1064 if (r)
1065 goto out;
1066
1067 if (separate_dirty_bits(cmd)) {
1068 r = dm_bitset_resize(&cmd->dirty_info, cmd->dirty_root,
1069 from_cblock(cmd->cache_blocks), from_cblock(new_cache_size),
1070 false, &cmd->dirty_root);
1071 if (r)
1072 goto out;
1073 }
1074
1075 cmd->cache_blocks = new_cache_size;
c6b4fcba 1076 cmd->changed = true;
f494a9c6
JT
1077
1078out:
028ae9f7 1079 WRITE_UNLOCK(cmd);
c6b4fcba
JT
1080
1081 return r;
1082}
1083
1084int dm_cache_discard_bitset_resize(struct dm_cache_metadata *cmd,
1085 sector_t discard_block_size,
1bad9bc4 1086 dm_dblock_t new_nr_entries)
c6b4fcba
JT
1087{
1088 int r;
1089
028ae9f7 1090 WRITE_LOCK(cmd);
c6b4fcba
JT
1091 r = dm_bitset_resize(&cmd->discard_info,
1092 cmd->discard_root,
1bad9bc4
JT
1093 from_dblock(cmd->discard_nr_blocks),
1094 from_dblock(new_nr_entries),
c6b4fcba
JT
1095 false, &cmd->discard_root);
1096 if (!r) {
1097 cmd->discard_block_size = discard_block_size;
1098 cmd->discard_nr_blocks = new_nr_entries;
1099 }
1100
1101 cmd->changed = true;
028ae9f7 1102 WRITE_UNLOCK(cmd);
c6b4fcba
JT
1103
1104 return r;
1105}
1106
1bad9bc4 1107static int __set_discard(struct dm_cache_metadata *cmd, dm_dblock_t b)
c6b4fcba
JT
1108{
1109 return dm_bitset_set_bit(&cmd->discard_info, cmd->discard_root,
1bad9bc4 1110 from_dblock(b), &cmd->discard_root);
c6b4fcba
JT
1111}
1112
1bad9bc4 1113static int __clear_discard(struct dm_cache_metadata *cmd, dm_dblock_t b)
c6b4fcba
JT
1114{
1115 return dm_bitset_clear_bit(&cmd->discard_info, cmd->discard_root,
1bad9bc4 1116 from_dblock(b), &cmd->discard_root);
c6b4fcba
JT
1117}
1118
c6b4fcba 1119static int __discard(struct dm_cache_metadata *cmd,
1bad9bc4 1120 dm_dblock_t dblock, bool discard)
c6b4fcba
JT
1121{
1122 int r;
1123
1124 r = (discard ? __set_discard : __clear_discard)(cmd, dblock);
1125 if (r)
1126 return r;
1127
1128 cmd->changed = true;
1129 return 0;
1130}
1131
1132int dm_cache_set_discard(struct dm_cache_metadata *cmd,
1bad9bc4 1133 dm_dblock_t dblock, bool discard)
c6b4fcba
JT
1134{
1135 int r;
1136
028ae9f7 1137 WRITE_LOCK(cmd);
c6b4fcba 1138 r = __discard(cmd, dblock, discard);
028ae9f7 1139 WRITE_UNLOCK(cmd);
c6b4fcba
JT
1140
1141 return r;
1142}
1143
1144static int __load_discards(struct dm_cache_metadata *cmd,
1145 load_discard_fn fn, void *context)
1146{
1147 int r = 0;
ae4a46a1
JT
1148 uint32_t b;
1149 struct dm_bitset_cursor c;
c6b4fcba 1150
ae4a46a1
JT
1151 if (from_dblock(cmd->discard_nr_blocks) == 0)
1152 /* nothing to do */
1153 return 0;
c6b4fcba 1154
ae4a46a1
JT
1155 if (cmd->clean_when_opened) {
1156 r = dm_bitset_flush(&cmd->discard_info, cmd->discard_root, &cmd->discard_root);
1157 if (r)
1158 return r;
c6b4fcba 1159
ae4a46a1
JT
1160 r = dm_bitset_cursor_begin(&cmd->discard_info, cmd->discard_root,
1161 from_dblock(cmd->discard_nr_blocks), &c);
c6b4fcba 1162 if (r)
ae4a46a1
JT
1163 return r;
1164
1165 for (b = 0; b < from_dblock(cmd->discard_nr_blocks); b++) {
1166 r = fn(context, cmd->discard_block_size, to_dblock(b),
1167 dm_bitset_cursor_get_value(&c));
1168 if (r)
1169 break;
1170 }
1171
1172 dm_bitset_cursor_end(&c);
1173
1174 } else {
1175 for (b = 0; b < from_dblock(cmd->discard_nr_blocks); b++) {
1176 r = fn(context, cmd->discard_block_size, to_dblock(b), false);
1177 if (r)
1178 return r;
1179 }
c6b4fcba
JT
1180 }
1181
1182 return r;
1183}
1184
1185int dm_cache_load_discards(struct dm_cache_metadata *cmd,
1186 load_discard_fn fn, void *context)
1187{
1188 int r;
1189
d14fcf3d 1190 READ_LOCK(cmd);
c6b4fcba 1191 r = __load_discards(cmd, fn, context);
d14fcf3d 1192 READ_UNLOCK(cmd);
c6b4fcba
JT
1193
1194 return r;
1195}
1196
d14fcf3d 1197int dm_cache_size(struct dm_cache_metadata *cmd, dm_cblock_t *result)
c6b4fcba 1198{
d14fcf3d
JT
1199 READ_LOCK(cmd);
1200 *result = cmd->cache_blocks;
1201 READ_UNLOCK(cmd);
c6b4fcba 1202
d14fcf3d 1203 return 0;
c6b4fcba
JT
1204}
1205
1206static int __remove(struct dm_cache_metadata *cmd, dm_cblock_t cblock)
1207{
1208 int r;
1209 __le64 value = pack_value(0, 0);
1210
1211 __dm_bless_for_disk(&value);
1212 r = dm_array_set_value(&cmd->info, cmd->root, from_cblock(cblock),
1213 &value, &cmd->root);
1214 if (r)
1215 return r;
1216
1217 cmd->changed = true;
1218 return 0;
1219}
1220
1221int dm_cache_remove_mapping(struct dm_cache_metadata *cmd, dm_cblock_t cblock)
1222{
1223 int r;
1224
028ae9f7 1225 WRITE_LOCK(cmd);
c6b4fcba 1226 r = __remove(cmd, cblock);
028ae9f7 1227 WRITE_UNLOCK(cmd);
c6b4fcba
JT
1228
1229 return r;
1230}
1231
1232static int __insert(struct dm_cache_metadata *cmd,
1233 dm_cblock_t cblock, dm_oblock_t oblock)
1234{
1235 int r;
1236 __le64 value = pack_value(oblock, M_VALID);
1237 __dm_bless_for_disk(&value);
1238
1239 r = dm_array_set_value(&cmd->info, cmd->root, from_cblock(cblock),
1240 &value, &cmd->root);
1241 if (r)
1242 return r;
1243
1244 cmd->changed = true;
1245 return 0;
1246}
1247
1248int dm_cache_insert_mapping(struct dm_cache_metadata *cmd,
1249 dm_cblock_t cblock, dm_oblock_t oblock)
1250{
1251 int r;
1252
028ae9f7 1253 WRITE_LOCK(cmd);
c6b4fcba 1254 r = __insert(cmd, cblock, oblock);
028ae9f7 1255 WRITE_UNLOCK(cmd);
c6b4fcba
JT
1256
1257 return r;
1258}
1259
1260struct thunk {
1261 load_mapping_fn fn;
1262 void *context;
1263
1264 struct dm_cache_metadata *cmd;
1265 bool respect_dirty_flags;
1266 bool hints_valid;
1267};
1268
ea2dd8c1
MS
1269static bool policy_unchanged(struct dm_cache_metadata *cmd,
1270 struct dm_cache_policy *policy)
1271{
1272 const char *policy_name = dm_cache_policy_get_name(policy);
1273 const unsigned *policy_version = dm_cache_policy_get_version(policy);
1274 size_t policy_hint_size = dm_cache_policy_get_hint_size(policy);
1275
1276 /*
1277 * Ensure policy names match.
1278 */
1279 if (strncmp(cmd->policy_name, policy_name, sizeof(cmd->policy_name)))
1280 return false;
1281
1282 /*
1283 * Ensure policy major versions match.
1284 */
1285 if (cmd->policy_version[0] != policy_version[0])
1286 return false;
1287
1288 /*
1289 * Ensure policy hint sizes match.
1290 */
1291 if (cmd->policy_hint_size != policy_hint_size)
1292 return false;
1293
1294 return true;
1295}
1296
c6b4fcba
JT
1297static bool hints_array_initialized(struct dm_cache_metadata *cmd)
1298{
1299 return cmd->hint_root && cmd->policy_hint_size;
1300}
1301
1302static bool hints_array_available(struct dm_cache_metadata *cmd,
ea2dd8c1 1303 struct dm_cache_policy *policy)
c6b4fcba 1304{
ea2dd8c1 1305 return cmd->clean_when_opened && policy_unchanged(cmd, policy) &&
c6b4fcba
JT
1306 hints_array_initialized(cmd);
1307}
1308
629d0a8a
JT
1309static int __load_mapping_v1(struct dm_cache_metadata *cmd,
1310 uint64_t cb, bool hints_valid,
1311 struct dm_array_cursor *mapping_cursor,
1312 struct dm_array_cursor *hint_cursor,
1313 load_mapping_fn fn, void *context)
c6b4fcba
JT
1314{
1315 int r = 0;
f177940a
JT
1316
1317 __le64 mapping;
1318 __le32 hint = 0;
1319
1320 __le64 *mapping_value_le;
1321 __le32 *hint_value_le;
1322
c6b4fcba
JT
1323 dm_oblock_t oblock;
1324 unsigned flags;
c6b4fcba 1325
f177940a
JT
1326 dm_array_cursor_get_value(mapping_cursor, (void **) &mapping_value_le);
1327 memcpy(&mapping, mapping_value_le, sizeof(mapping));
1328 unpack_value(mapping, &oblock, &flags);
c6b4fcba
JT
1329
1330 if (flags & M_VALID) {
f177940a
JT
1331 if (hints_valid) {
1332 dm_array_cursor_get_value(hint_cursor, (void **) &hint_value_le);
1333 memcpy(&hint, hint_value_le, sizeof(hint));
c6b4fcba
JT
1334 }
1335
f177940a
JT
1336 r = fn(context, oblock, to_cblock(cb), flags & M_DIRTY,
1337 le32_to_cpu(hint), hints_valid);
48551054
MS
1338 if (r) {
1339 DMERR("policy couldn't load cache block %llu",
1340 (unsigned long long) from_cblock(to_cblock(cb)));
1341 }
c6b4fcba
JT
1342 }
1343
1344 return r;
1345}
1346
629d0a8a
JT
1347static int __load_mapping_v2(struct dm_cache_metadata *cmd,
1348 uint64_t cb, bool hints_valid,
1349 struct dm_array_cursor *mapping_cursor,
1350 struct dm_array_cursor *hint_cursor,
1351 struct dm_bitset_cursor *dirty_cursor,
1352 load_mapping_fn fn, void *context)
1353{
1354 int r = 0;
1355
1356 __le64 mapping;
1357 __le32 hint = 0;
1358
1359 __le64 *mapping_value_le;
1360 __le32 *hint_value_le;
1361
1362 dm_oblock_t oblock;
1363 unsigned flags;
1364 bool dirty;
1365
1366 dm_array_cursor_get_value(mapping_cursor, (void **) &mapping_value_le);
1367 memcpy(&mapping, mapping_value_le, sizeof(mapping));
1368 unpack_value(mapping, &oblock, &flags);
1369
1370 if (flags & M_VALID) {
1371 if (hints_valid) {
1372 dm_array_cursor_get_value(hint_cursor, (void **) &hint_value_le);
1373 memcpy(&hint, hint_value_le, sizeof(hint));
1374 }
1375
1376 dirty = dm_bitset_cursor_get_value(dirty_cursor);
1377 r = fn(context, oblock, to_cblock(cb), dirty,
1378 le32_to_cpu(hint), hints_valid);
48551054
MS
1379 if (r) {
1380 DMERR("policy couldn't load cache block %llu",
1381 (unsigned long long) from_cblock(to_cblock(cb)));
1382 }
629d0a8a
JT
1383 }
1384
1385 return r;
1386}
1387
ea2dd8c1
MS
1388static int __load_mappings(struct dm_cache_metadata *cmd,
1389 struct dm_cache_policy *policy,
c6b4fcba
JT
1390 load_mapping_fn fn, void *context)
1391{
f177940a
JT
1392 int r;
1393 uint64_t cb;
c6b4fcba 1394
f177940a 1395 bool hints_valid = hints_array_available(cmd, policy);
c6b4fcba 1396
f177940a
JT
1397 if (from_cblock(cmd->cache_blocks) == 0)
1398 /* Nothing to do */
1399 return 0;
c6b4fcba 1400
f177940a
JT
1401 r = dm_array_cursor_begin(&cmd->info, cmd->root, &cmd->mapping_cursor);
1402 if (r)
1403 return r;
1404
1405 if (hints_valid) {
1406 r = dm_array_cursor_begin(&cmd->hint_info, cmd->hint_root, &cmd->hint_cursor);
1407 if (r) {
1408 dm_array_cursor_end(&cmd->mapping_cursor);
1409 return r;
1410 }
1411 }
1412
629d0a8a
JT
1413 if (separate_dirty_bits(cmd)) {
1414 r = dm_bitset_cursor_begin(&cmd->dirty_info, cmd->dirty_root,
1415 from_cblock(cmd->cache_blocks),
1416 &cmd->dirty_cursor);
1417 if (r) {
1418 dm_array_cursor_end(&cmd->hint_cursor);
1419 dm_array_cursor_end(&cmd->mapping_cursor);
1420 return r;
1421 }
1422 }
1423
f177940a 1424 for (cb = 0; ; cb++) {
629d0a8a
JT
1425 if (separate_dirty_bits(cmd))
1426 r = __load_mapping_v2(cmd, cb, hints_valid,
1427 &cmd->mapping_cursor,
1428 &cmd->hint_cursor,
1429 &cmd->dirty_cursor,
1430 fn, context);
1431 else
1432 r = __load_mapping_v1(cmd, cb, hints_valid,
1433 &cmd->mapping_cursor, &cmd->hint_cursor,
1434 fn, context);
f177940a
JT
1435 if (r)
1436 goto out;
1437
1438 /*
1439 * We need to break out before we move the cursors.
1440 */
1441 if (cb >= (from_cblock(cmd->cache_blocks) - 1))
1442 break;
1443
1444 r = dm_array_cursor_next(&cmd->mapping_cursor);
1445 if (r) {
1446 DMERR("dm_array_cursor_next for mapping failed");
1447 goto out;
1448 }
1449
1450 if (hints_valid) {
1451 r = dm_array_cursor_next(&cmd->hint_cursor);
1452 if (r) {
1453 DMERR("dm_array_cursor_next for hint failed");
1454 goto out;
1455 }
1456 }
629d0a8a
JT
1457
1458 if (separate_dirty_bits(cmd)) {
1459 r = dm_bitset_cursor_next(&cmd->dirty_cursor);
1460 if (r) {
1461 DMERR("dm_bitset_cursor_next for dirty failed");
1462 goto out;
1463 }
1464 }
f177940a
JT
1465 }
1466out:
1467 dm_array_cursor_end(&cmd->mapping_cursor);
1468 if (hints_valid)
1469 dm_array_cursor_end(&cmd->hint_cursor);
1470
629d0a8a
JT
1471 if (separate_dirty_bits(cmd))
1472 dm_bitset_cursor_end(&cmd->dirty_cursor);
1473
f177940a 1474 return r;
c6b4fcba
JT
1475}
1476
ea2dd8c1
MS
1477int dm_cache_load_mappings(struct dm_cache_metadata *cmd,
1478 struct dm_cache_policy *policy,
c6b4fcba
JT
1479 load_mapping_fn fn, void *context)
1480{
1481 int r;
1482
d14fcf3d 1483 READ_LOCK(cmd);
ea2dd8c1 1484 r = __load_mappings(cmd, policy, fn, context);
d14fcf3d 1485 READ_UNLOCK(cmd);
c6b4fcba
JT
1486
1487 return r;
1488}
1489
1490static int __dump_mapping(void *context, uint64_t cblock, void *leaf)
1491{
1492 int r = 0;
1493 __le64 value;
1494 dm_oblock_t oblock;
1495 unsigned flags;
1496
1497 memcpy(&value, leaf, sizeof(value));
1498 unpack_value(value, &oblock, &flags);
1499
1500 return r;
1501}
1502
1503static int __dump_mappings(struct dm_cache_metadata *cmd)
1504{
1505 return dm_array_walk(&cmd->info, cmd->root, __dump_mapping, NULL);
1506}
1507
1508void dm_cache_dump(struct dm_cache_metadata *cmd)
1509{
d14fcf3d 1510 READ_LOCK_VOID(cmd);
c6b4fcba 1511 __dump_mappings(cmd);
d14fcf3d 1512 READ_UNLOCK(cmd);
c6b4fcba
JT
1513}
1514
1515int dm_cache_changed_this_transaction(struct dm_cache_metadata *cmd)
1516{
1517 int r;
1518
d14fcf3d 1519 READ_LOCK(cmd);
c6b4fcba 1520 r = cmd->changed;
d14fcf3d 1521 READ_UNLOCK(cmd);
c6b4fcba
JT
1522
1523 return r;
1524}
1525
1526static int __dirty(struct dm_cache_metadata *cmd, dm_cblock_t cblock, bool dirty)
1527{
1528 int r;
1529 unsigned flags;
1530 dm_oblock_t oblock;
1531 __le64 value;
1532
1533 r = dm_array_get_value(&cmd->info, cmd->root, from_cblock(cblock), &value);
1534 if (r)
1535 return r;
1536
1537 unpack_value(value, &oblock, &flags);
1538
1539 if (((flags & M_DIRTY) && dirty) || (!(flags & M_DIRTY) && !dirty))
1540 /* nothing to be done */
1541 return 0;
1542
79ed9caf 1543 value = pack_value(oblock, (flags & ~M_DIRTY) | (dirty ? M_DIRTY : 0));
c6b4fcba
JT
1544 __dm_bless_for_disk(&value);
1545
1546 r = dm_array_set_value(&cmd->info, cmd->root, from_cblock(cblock),
1547 &value, &cmd->root);
1548 if (r)
1549 return r;
1550
1551 cmd->changed = true;
1552 return 0;
1553
1554}
1555
629d0a8a
JT
1556static int __set_dirty_bits_v1(struct dm_cache_metadata *cmd, unsigned nr_bits, unsigned long *bits)
1557{
1558 int r;
1559 unsigned i;
1560 for (i = 0; i < nr_bits; i++) {
1561 r = __dirty(cmd, to_cblock(i), test_bit(i, bits));
1562 if (r)
1563 return r;
1564 }
1565
1566 return 0;
1567}
1568
683bb1a3
JT
1569static int is_dirty_callback(uint32_t index, bool *value, void *context)
1570{
1571 unsigned long *bits = context;
1572 *value = test_bit(index, bits);
1573 return 0;
1574}
1575
629d0a8a
JT
1576static int __set_dirty_bits_v2(struct dm_cache_metadata *cmd, unsigned nr_bits, unsigned long *bits)
1577{
1578 int r = 0;
629d0a8a
JT
1579
1580 /* nr_bits is really just a sanity check */
1581 if (nr_bits != from_cblock(cmd->cache_blocks)) {
1582 DMERR("dirty bitset is wrong size");
1583 return -EINVAL;
1584 }
1585
683bb1a3
JT
1586 r = dm_bitset_del(&cmd->dirty_info, cmd->dirty_root);
1587 if (r)
1588 return r;
629d0a8a
JT
1589
1590 cmd->changed = true;
683bb1a3 1591 return dm_bitset_new(&cmd->dirty_info, &cmd->dirty_root, nr_bits, is_dirty_callback, bits);
629d0a8a
JT
1592}
1593
1594int dm_cache_set_dirty_bits(struct dm_cache_metadata *cmd,
1595 unsigned nr_bits,
1596 unsigned long *bits)
c6b4fcba
JT
1597{
1598 int r;
1599
028ae9f7 1600 WRITE_LOCK(cmd);
629d0a8a
JT
1601 if (separate_dirty_bits(cmd))
1602 r = __set_dirty_bits_v2(cmd, nr_bits, bits);
1603 else
1604 r = __set_dirty_bits_v1(cmd, nr_bits, bits);
028ae9f7 1605 WRITE_UNLOCK(cmd);
c6b4fcba
JT
1606
1607 return r;
1608}
1609
1610void dm_cache_metadata_get_stats(struct dm_cache_metadata *cmd,
1611 struct dm_cache_statistics *stats)
1612{
d14fcf3d 1613 READ_LOCK_VOID(cmd);
8c5008fa 1614 *stats = cmd->stats;
d14fcf3d 1615 READ_UNLOCK(cmd);
c6b4fcba
JT
1616}
1617
1618void dm_cache_metadata_set_stats(struct dm_cache_metadata *cmd,
1619 struct dm_cache_statistics *stats)
1620{
028ae9f7 1621 WRITE_LOCK_VOID(cmd);
8c5008fa 1622 cmd->stats = *stats;
028ae9f7 1623 WRITE_UNLOCK(cmd);
c6b4fcba
JT
1624}
1625
1626int dm_cache_commit(struct dm_cache_metadata *cmd, bool clean_shutdown)
1627{
1628 int r;
1629 flags_mutator mutator = (clean_shutdown ? set_clean_shutdown :
1630 clear_clean_shutdown);
1631
028ae9f7 1632 WRITE_LOCK(cmd);
c6b4fcba
JT
1633 r = __commit_transaction(cmd, mutator);
1634 if (r)
1635 goto out;
1636
1637 r = __begin_transaction(cmd);
1638
1639out:
028ae9f7 1640 WRITE_UNLOCK(cmd);
c6b4fcba
JT
1641 return r;
1642}
1643
1644int dm_cache_get_free_metadata_block_count(struct dm_cache_metadata *cmd,
1645 dm_block_t *result)
1646{
1647 int r = -EINVAL;
1648
d14fcf3d 1649 READ_LOCK(cmd);
c6b4fcba 1650 r = dm_sm_get_nr_free(cmd->metadata_sm, result);
d14fcf3d 1651 READ_UNLOCK(cmd);
c6b4fcba
JT
1652
1653 return r;
1654}
1655
1656int dm_cache_get_metadata_dev_size(struct dm_cache_metadata *cmd,
1657 dm_block_t *result)
1658{
1659 int r = -EINVAL;
1660
d14fcf3d 1661 READ_LOCK(cmd);
c6b4fcba 1662 r = dm_sm_get_nr_blocks(cmd->metadata_sm, result);
d14fcf3d 1663 READ_UNLOCK(cmd);
c6b4fcba
JT
1664
1665 return r;
1666}
1667
1668/*----------------------------------------------------------------*/
1669
4e781b49
JT
1670static int get_hint(uint32_t index, void *value_le, void *context)
1671{
1672 uint32_t value;
1673 struct dm_cache_policy *policy = context;
1674
1675 value = policy_get_hint(policy, to_cblock(index));
1676 *((__le32 *) value_le) = cpu_to_le32(value);
1677
1678 return 0;
1679}
1680
1681/*
1682 * It's quicker to always delete the hint array, and recreate with
1683 * dm_array_new().
1684 */
1685static int write_hints(struct dm_cache_metadata *cmd, struct dm_cache_policy *policy)
c6b4fcba
JT
1686{
1687 int r;
c6b4fcba
JT
1688 size_t hint_size;
1689 const char *policy_name = dm_cache_policy_get_name(policy);
4e7f506f 1690 const unsigned *policy_version = dm_cache_policy_get_version(policy);
c6b4fcba
JT
1691
1692 if (!policy_name[0] ||
1693 (strlen(policy_name) > sizeof(cmd->policy_name) - 1))
1694 return -EINVAL;
1695
4e781b49
JT
1696 strncpy(cmd->policy_name, policy_name, sizeof(cmd->policy_name));
1697 memcpy(cmd->policy_version, policy_version, sizeof(cmd->policy_version));
c6b4fcba 1698
4e781b49
JT
1699 hint_size = dm_cache_policy_get_hint_size(policy);
1700 if (!hint_size)
1701 return 0; /* short-circuit hints initialization */
1702 cmd->policy_hint_size = hint_size;
c6b4fcba 1703
4e781b49
JT
1704 if (cmd->hint_root) {
1705 r = dm_array_del(&cmd->hint_info, cmd->hint_root);
c6b4fcba
JT
1706 if (r)
1707 return r;
0596661f
JT
1708 }
1709
4e781b49
JT
1710 return dm_array_new(&cmd->hint_info, &cmd->hint_root,
1711 from_cblock(cmd->cache_blocks),
1712 get_hint, policy);
0596661f
JT
1713}
1714
1715int dm_cache_write_hints(struct dm_cache_metadata *cmd, struct dm_cache_policy *policy)
1716{
1717 int r;
c6b4fcba 1718
028ae9f7 1719 WRITE_LOCK(cmd);
0596661f 1720 r = write_hints(cmd, policy);
028ae9f7 1721 WRITE_UNLOCK(cmd);
c6b4fcba
JT
1722
1723 return r;
1724}
2ee57d58
JT
1725
1726int dm_cache_metadata_all_clean(struct dm_cache_metadata *cmd, bool *result)
1727{
d14fcf3d
JT
1728 int r;
1729
1730 READ_LOCK(cmd);
1731 r = blocks_are_unmapped_or_clean(cmd, 0, cmd->cache_blocks, result);
1732 READ_UNLOCK(cmd);
1733
1734 return r;
2ee57d58 1735}
028ae9f7
JT
1736
1737void dm_cache_metadata_set_read_only(struct dm_cache_metadata *cmd)
1738{
1739 WRITE_LOCK_VOID(cmd);
1740 dm_bm_set_read_only(cmd->bm);
1741 WRITE_UNLOCK(cmd);
1742}
1743
1744void dm_cache_metadata_set_read_write(struct dm_cache_metadata *cmd)
1745{
1746 WRITE_LOCK_VOID(cmd);
1747 dm_bm_set_read_write(cmd->bm);
1748 WRITE_UNLOCK(cmd);
1749}
1750
1751int dm_cache_metadata_set_needs_check(struct dm_cache_metadata *cmd)
1752{
1753 int r;
1754 struct dm_block *sblock;
1755 struct cache_disk_superblock *disk_super;
1756
d14fcf3d 1757 WRITE_LOCK(cmd);
028ae9f7
JT
1758 set_bit(NEEDS_CHECK, &cmd->flags);
1759
1760 r = superblock_lock(cmd, &sblock);
1761 if (r) {
1762 DMERR("couldn't read superblock");
1763 goto out;
1764 }
1765
1766 disk_super = dm_block_data(sblock);
1767 disk_super->flags = cpu_to_le32(cmd->flags);
1768
1769 dm_bm_unlock(sblock);
1770
1771out:
d14fcf3d 1772 WRITE_UNLOCK(cmd);
028ae9f7
JT
1773 return r;
1774}
1775
d14fcf3d 1776int dm_cache_metadata_needs_check(struct dm_cache_metadata *cmd, bool *result)
028ae9f7 1777{
d14fcf3d
JT
1778 READ_LOCK(cmd);
1779 *result = !!test_bit(NEEDS_CHECK, &cmd->flags);
1780 READ_UNLOCK(cmd);
028ae9f7 1781
d14fcf3d 1782 return 0;
028ae9f7
JT
1783}
1784
1785int dm_cache_metadata_abort(struct dm_cache_metadata *cmd)
1786{
1787 int r;
1788
1789 WRITE_LOCK(cmd);
1790 __destroy_persistent_data_objects(cmd);
1791 r = __create_persistent_data_objects(cmd, false);
1792 if (r)
1793 cmd->fail_io = true;
1794 WRITE_UNLOCK(cmd);
1795
1796 return r;
1797}