]> git.proxmox.com Git - mirror_ubuntu-eoan-kernel.git/blame - drivers/md/dm-snap.c
dm snapshot: fix invalidation deadlock
[mirror_ubuntu-eoan-kernel.git] / drivers / md / dm-snap.c
CommitLineData
1da177e4
LT
1/*
2 * dm-snapshot.c
3 *
4 * Copyright (C) 2001-2002 Sistina Software (UK) Limited.
5 *
6 * This file is released under the GPL.
7 */
8
9#include <linux/blkdev.h>
1da177e4
LT
10#include <linux/ctype.h>
11#include <linux/device-mapper.h>
12#include <linux/fs.h>
13#include <linux/init.h>
14#include <linux/kdev_t.h>
15#include <linux/list.h>
16#include <linux/mempool.h>
17#include <linux/module.h>
18#include <linux/slab.h>
19#include <linux/vmalloc.h>
20
21#include "dm-snap.h"
22#include "dm-bio-list.h"
23#include "kcopyd.h"
24
72d94861
AK
25#define DM_MSG_PREFIX "snapshots"
26
1da177e4
LT
27/*
28 * The percentage increment we will wake up users at
29 */
30#define WAKE_UP_PERCENT 5
31
32/*
33 * kcopyd priority of snapshot operations
34 */
35#define SNAPSHOT_COPY_PRIORITY 2
36
37/*
38 * Each snapshot reserves this many pages for io
39 */
40#define SNAPSHOT_PAGES 256
41
c642f9e0 42static struct workqueue_struct *ksnapd;
c4028958 43static void flush_queued_bios(struct work_struct *work);
ca3a931f 44
028867ac
AK
45struct dm_snap_pending_exception {
46 struct dm_snap_exception e;
1da177e4
LT
47
48 /*
49 * Origin buffers waiting for this to complete are held
50 * in a bio list
51 */
52 struct bio_list origin_bios;
53 struct bio_list snapshot_bios;
54
eccf0817
AK
55 /*
56 * Short-term queue of pending exceptions prior to submission.
57 */
58 struct list_head list;
59
1da177e4 60 /*
b4b610f6 61 * The primary pending_exception is the one that holds
4b832e8d 62 * the ref_count and the list of origin_bios for a
b4b610f6
AK
63 * group of pending_exceptions. It is always last to get freed.
64 * These fields get set up when writing to the origin.
1da177e4 65 */
028867ac 66 struct dm_snap_pending_exception *primary_pe;
b4b610f6
AK
67
68 /*
69 * Number of pending_exceptions processing this chunk.
70 * When this drops to zero we must complete the origin bios.
71 * If incrementing or decrementing this, hold pe->snap->lock for
72 * the sibling concerned and not pe->primary_pe->snap->lock unless
73 * they are the same.
74 */
4b832e8d 75 atomic_t ref_count;
1da177e4
LT
76
77 /* Pointer back to snapshot context */
78 struct dm_snapshot *snap;
79
80 /*
81 * 1 indicates the exception has already been sent to
82 * kcopyd.
83 */
84 int started;
85};
86
87/*
88 * Hash table mapping origin volumes to lists of snapshots and
89 * a lock to protect it
90 */
e18b890b
CL
91static struct kmem_cache *exception_cache;
92static struct kmem_cache *pending_cache;
1da177e4
LT
93static mempool_t *pending_pool;
94
95/*
96 * One of these per registered origin, held in the snapshot_origins hash
97 */
98struct origin {
99 /* The origin device */
100 struct block_device *bdev;
101
102 struct list_head hash_list;
103
104 /* List of snapshots for this origin */
105 struct list_head snapshots;
106};
107
108/*
109 * Size of the hash table for origin volumes. If we make this
110 * the size of the minors list then it should be nearly perfect
111 */
112#define ORIGIN_HASH_SIZE 256
113#define ORIGIN_MASK 0xFF
114static struct list_head *_origins;
115static struct rw_semaphore _origins_lock;
116
117static int init_origin_hash(void)
118{
119 int i;
120
121 _origins = kmalloc(ORIGIN_HASH_SIZE * sizeof(struct list_head),
122 GFP_KERNEL);
123 if (!_origins) {
72d94861 124 DMERR("unable to allocate memory");
1da177e4
LT
125 return -ENOMEM;
126 }
127
128 for (i = 0; i < ORIGIN_HASH_SIZE; i++)
129 INIT_LIST_HEAD(_origins + i);
130 init_rwsem(&_origins_lock);
131
132 return 0;
133}
134
135static void exit_origin_hash(void)
136{
137 kfree(_origins);
138}
139
028867ac 140static unsigned origin_hash(struct block_device *bdev)
1da177e4
LT
141{
142 return bdev->bd_dev & ORIGIN_MASK;
143}
144
145static struct origin *__lookup_origin(struct block_device *origin)
146{
147 struct list_head *ol;
148 struct origin *o;
149
150 ol = &_origins[origin_hash(origin)];
151 list_for_each_entry (o, ol, hash_list)
152 if (bdev_equal(o->bdev, origin))
153 return o;
154
155 return NULL;
156}
157
158static void __insert_origin(struct origin *o)
159{
160 struct list_head *sl = &_origins[origin_hash(o->bdev)];
161 list_add_tail(&o->hash_list, sl);
162}
163
164/*
165 * Make a note of the snapshot and its origin so we can look it
166 * up when the origin has a write on it.
167 */
168static int register_snapshot(struct dm_snapshot *snap)
169{
170 struct origin *o;
171 struct block_device *bdev = snap->origin->bdev;
172
173 down_write(&_origins_lock);
174 o = __lookup_origin(bdev);
175
176 if (!o) {
177 /* New origin */
178 o = kmalloc(sizeof(*o), GFP_KERNEL);
179 if (!o) {
180 up_write(&_origins_lock);
181 return -ENOMEM;
182 }
183
184 /* Initialise the struct */
185 INIT_LIST_HEAD(&o->snapshots);
186 o->bdev = bdev;
187
188 __insert_origin(o);
189 }
190
191 list_add_tail(&snap->list, &o->snapshots);
192
193 up_write(&_origins_lock);
194 return 0;
195}
196
197static void unregister_snapshot(struct dm_snapshot *s)
198{
199 struct origin *o;
200
201 down_write(&_origins_lock);
202 o = __lookup_origin(s->origin->bdev);
203
204 list_del(&s->list);
205 if (list_empty(&o->snapshots)) {
206 list_del(&o->hash_list);
207 kfree(o);
208 }
209
210 up_write(&_origins_lock);
211}
212
213/*
214 * Implementation of the exception hash tables.
215 */
216static int init_exception_table(struct exception_table *et, uint32_t size)
217{
218 unsigned int i;
219
220 et->hash_mask = size - 1;
221 et->table = dm_vcalloc(size, sizeof(struct list_head));
222 if (!et->table)
223 return -ENOMEM;
224
225 for (i = 0; i < size; i++)
226 INIT_LIST_HEAD(et->table + i);
227
228 return 0;
229}
230
e18b890b 231static void exit_exception_table(struct exception_table *et, struct kmem_cache *mem)
1da177e4
LT
232{
233 struct list_head *slot;
028867ac 234 struct dm_snap_exception *ex, *next;
1da177e4
LT
235 int i, size;
236
237 size = et->hash_mask + 1;
238 for (i = 0; i < size; i++) {
239 slot = et->table + i;
240
241 list_for_each_entry_safe (ex, next, slot, hash_list)
242 kmem_cache_free(mem, ex);
243 }
244
245 vfree(et->table);
246}
247
028867ac 248static uint32_t exception_hash(struct exception_table *et, chunk_t chunk)
1da177e4
LT
249{
250 return chunk & et->hash_mask;
251}
252
028867ac
AK
253static void insert_exception(struct exception_table *eh,
254 struct dm_snap_exception *e)
1da177e4
LT
255{
256 struct list_head *l = &eh->table[exception_hash(eh, e->old_chunk)];
257 list_add(&e->hash_list, l);
258}
259
028867ac 260static void remove_exception(struct dm_snap_exception *e)
1da177e4
LT
261{
262 list_del(&e->hash_list);
263}
264
265/*
266 * Return the exception data for a sector, or NULL if not
267 * remapped.
268 */
028867ac
AK
269static struct dm_snap_exception *lookup_exception(struct exception_table *et,
270 chunk_t chunk)
1da177e4
LT
271{
272 struct list_head *slot;
028867ac 273 struct dm_snap_exception *e;
1da177e4
LT
274
275 slot = &et->table[exception_hash(et, chunk)];
276 list_for_each_entry (e, slot, hash_list)
277 if (e->old_chunk == chunk)
278 return e;
279
280 return NULL;
281}
282
028867ac 283static struct dm_snap_exception *alloc_exception(void)
1da177e4 284{
028867ac 285 struct dm_snap_exception *e;
1da177e4
LT
286
287 e = kmem_cache_alloc(exception_cache, GFP_NOIO);
288 if (!e)
289 e = kmem_cache_alloc(exception_cache, GFP_ATOMIC);
290
291 return e;
292}
293
028867ac 294static void free_exception(struct dm_snap_exception *e)
1da177e4
LT
295{
296 kmem_cache_free(exception_cache, e);
297}
298
028867ac 299static struct dm_snap_pending_exception *alloc_pending_exception(void)
1da177e4
LT
300{
301 return mempool_alloc(pending_pool, GFP_NOIO);
302}
303
028867ac 304static void free_pending_exception(struct dm_snap_pending_exception *pe)
1da177e4
LT
305{
306 mempool_free(pe, pending_pool);
307}
308
309int dm_add_exception(struct dm_snapshot *s, chunk_t old, chunk_t new)
310{
028867ac 311 struct dm_snap_exception *e;
1da177e4
LT
312
313 e = alloc_exception();
314 if (!e)
315 return -ENOMEM;
316
317 e->old_chunk = old;
318 e->new_chunk = new;
319 insert_exception(&s->complete, e);
320 return 0;
321}
322
323/*
324 * Hard coded magic.
325 */
326static int calc_max_buckets(void)
327{
328 /* use a fixed size of 2MB */
329 unsigned long mem = 2 * 1024 * 1024;
330 mem /= sizeof(struct list_head);
331
332 return mem;
333}
334
335/*
336 * Rounds a number down to a power of 2.
337 */
028867ac 338static uint32_t round_down(uint32_t n)
1da177e4
LT
339{
340 while (n & (n - 1))
341 n &= (n - 1);
342 return n;
343}
344
345/*
346 * Allocate room for a suitable hash table.
347 */
348static int init_hash_tables(struct dm_snapshot *s)
349{
350 sector_t hash_size, cow_dev_size, origin_dev_size, max_buckets;
351
352 /*
353 * Calculate based on the size of the original volume or
354 * the COW volume...
355 */
356 cow_dev_size = get_dev_size(s->cow->bdev);
357 origin_dev_size = get_dev_size(s->origin->bdev);
358 max_buckets = calc_max_buckets();
359
360 hash_size = min(origin_dev_size, cow_dev_size) >> s->chunk_shift;
361 hash_size = min(hash_size, max_buckets);
362
363 /* Round it down to a power of 2 */
364 hash_size = round_down(hash_size);
365 if (init_exception_table(&s->complete, hash_size))
366 return -ENOMEM;
367
368 /*
369 * Allocate hash table for in-flight exceptions
370 * Make this smaller than the real hash table
371 */
372 hash_size >>= 3;
373 if (hash_size < 64)
374 hash_size = 64;
375
376 if (init_exception_table(&s->pending, hash_size)) {
377 exit_exception_table(&s->complete, exception_cache);
378 return -ENOMEM;
379 }
380
381 return 0;
382}
383
384/*
385 * Round a number up to the nearest 'size' boundary. size must
386 * be a power of 2.
387 */
028867ac 388static ulong round_up(ulong n, ulong size)
1da177e4
LT
389{
390 size--;
391 return (n + size) & ~size;
392}
393
4c7e3bf4
MM
394static int set_chunk_size(struct dm_snapshot *s, const char *chunk_size_arg,
395 char **error)
396{
397 unsigned long chunk_size;
398 char *value;
399
400 chunk_size = simple_strtoul(chunk_size_arg, &value, 10);
401 if (*chunk_size_arg == '\0' || *value != '\0') {
402 *error = "Invalid chunk size";
403 return -EINVAL;
404 }
405
406 if (!chunk_size) {
407 s->chunk_size = s->chunk_mask = s->chunk_shift = 0;
408 return 0;
409 }
410
411 /*
412 * Chunk size must be multiple of page size. Silently
413 * round up if it's not.
414 */
415 chunk_size = round_up(chunk_size, PAGE_SIZE >> 9);
416
417 /* Check chunk_size is a power of 2 */
418 if (chunk_size & (chunk_size - 1)) {
419 *error = "Chunk size is not a power of 2";
420 return -EINVAL;
421 }
422
423 /* Validate the chunk size against the device block size */
424 if (chunk_size % (bdev_hardsect_size(s->cow->bdev) >> 9)) {
425 *error = "Chunk size is not a multiple of device blocksize";
426 return -EINVAL;
427 }
428
429 s->chunk_size = chunk_size;
430 s->chunk_mask = chunk_size - 1;
431 s->chunk_shift = ffs(chunk_size) - 1;
432
433 return 0;
434}
435
1da177e4
LT
436/*
437 * Construct a snapshot mapping: <origin_dev> <COW-dev> <p/n> <chunk-size>
438 */
439static int snapshot_ctr(struct dm_target *ti, unsigned int argc, char **argv)
440{
441 struct dm_snapshot *s;
1da177e4
LT
442 int r = -EINVAL;
443 char persistent;
444 char *origin_path;
445 char *cow_path;
1da177e4 446
4c7e3bf4 447 if (argc != 4) {
72d94861 448 ti->error = "requires exactly 4 arguments";
1da177e4
LT
449 r = -EINVAL;
450 goto bad1;
451 }
452
453 origin_path = argv[0];
454 cow_path = argv[1];
455 persistent = toupper(*argv[2]);
456
457 if (persistent != 'P' && persistent != 'N') {
458 ti->error = "Persistent flag is not P or N";
459 r = -EINVAL;
460 goto bad1;
461 }
462
1da177e4
LT
463 s = kmalloc(sizeof(*s), GFP_KERNEL);
464 if (s == NULL) {
465 ti->error = "Cannot allocate snapshot context private "
466 "structure";
467 r = -ENOMEM;
468 goto bad1;
469 }
470
471 r = dm_get_device(ti, origin_path, 0, ti->len, FMODE_READ, &s->origin);
472 if (r) {
473 ti->error = "Cannot get origin device";
474 goto bad2;
475 }
476
477 r = dm_get_device(ti, cow_path, 0, 0,
478 FMODE_READ | FMODE_WRITE, &s->cow);
479 if (r) {
480 dm_put_device(ti, s->origin);
481 ti->error = "Cannot get COW device";
482 goto bad2;
483 }
484
4c7e3bf4
MM
485 r = set_chunk_size(s, argv[3], &ti->error);
486 if (r)
1da177e4 487 goto bad3;
1da177e4 488
1da177e4 489 s->type = persistent;
1da177e4
LT
490
491 s->valid = 1;
aa14edeb 492 s->active = 0;
1da177e4
LT
493 s->last_percent = 0;
494 init_rwsem(&s->lock);
ca3a931f 495 spin_lock_init(&s->pe_lock);
1da177e4
LT
496 s->table = ti->table;
497
498 /* Allocate hash table for COW data */
499 if (init_hash_tables(s)) {
500 ti->error = "Unable to allocate hash table space";
501 r = -ENOMEM;
502 goto bad3;
503 }
504
1da177e4
LT
505 s->store.snap = s;
506
507 if (persistent == 'P')
4c7e3bf4 508 r = dm_create_persistent(&s->store);
1da177e4 509 else
4c7e3bf4 510 r = dm_create_transient(&s->store);
1da177e4
LT
511
512 if (r) {
513 ti->error = "Couldn't create exception store";
514 r = -EINVAL;
515 goto bad4;
516 }
517
518 r = kcopyd_client_create(SNAPSHOT_PAGES, &s->kcopyd_client);
519 if (r) {
520 ti->error = "Could not create kcopyd client";
521 goto bad5;
522 }
523
aa14edeb 524 /* Metadata must only be loaded into one table at once */
f9cea4f7
MM
525 r = s->store.read_metadata(&s->store);
526 if (r) {
527 ti->error = "Failed to read snapshot metadata";
528 goto bad6;
529 }
aa14edeb 530
ca3a931f 531 bio_list_init(&s->queued_bios);
c4028958 532 INIT_WORK(&s->queued_bios_work, flush_queued_bios);
ca3a931f 533
1da177e4 534 /* Add snapshot to the list of snapshots for this origin */
aa14edeb 535 /* Exceptions aren't triggered till snapshot_resume() is called */
1da177e4
LT
536 if (register_snapshot(s)) {
537 r = -EINVAL;
538 ti->error = "Cannot register snapshot origin";
539 goto bad6;
540 }
541
542 ti->private = s;
c51c2752 543 ti->split_io = s->chunk_size;
1da177e4
LT
544
545 return 0;
546
547 bad6:
548 kcopyd_client_destroy(s->kcopyd_client);
549
550 bad5:
551 s->store.destroy(&s->store);
552
553 bad4:
554 exit_exception_table(&s->pending, pending_cache);
555 exit_exception_table(&s->complete, exception_cache);
556
557 bad3:
558 dm_put_device(ti, s->cow);
559 dm_put_device(ti, s->origin);
560
561 bad2:
562 kfree(s);
563
564 bad1:
565 return r;
566}
567
31c93a0c
MB
568static void __free_exceptions(struct dm_snapshot *s)
569{
570 kcopyd_client_destroy(s->kcopyd_client);
571 s->kcopyd_client = NULL;
572
573 exit_exception_table(&s->pending, pending_cache);
574 exit_exception_table(&s->complete, exception_cache);
575
576 s->store.destroy(&s->store);
577}
578
1da177e4
LT
579static void snapshot_dtr(struct dm_target *ti)
580{
028867ac 581 struct dm_snapshot *s = ti->private;
1da177e4 582
ca3a931f
AK
583 flush_workqueue(ksnapd);
584
138728dc
AK
585 /* Prevent further origin writes from using this snapshot. */
586 /* After this returns there can be no new kcopyd jobs. */
1da177e4
LT
587 unregister_snapshot(s);
588
31c93a0c 589 __free_exceptions(s);
1da177e4
LT
590
591 dm_put_device(ti, s->origin);
592 dm_put_device(ti, s->cow);
138728dc 593
1da177e4
LT
594 kfree(s);
595}
596
597/*
598 * Flush a list of buffers.
599 */
600static void flush_bios(struct bio *bio)
601{
602 struct bio *n;
603
604 while (bio) {
605 n = bio->bi_next;
606 bio->bi_next = NULL;
607 generic_make_request(bio);
608 bio = n;
609 }
610}
611
c4028958 612static void flush_queued_bios(struct work_struct *work)
ca3a931f 613{
c4028958
DH
614 struct dm_snapshot *s =
615 container_of(work, struct dm_snapshot, queued_bios_work);
ca3a931f
AK
616 struct bio *queued_bios;
617 unsigned long flags;
618
619 spin_lock_irqsave(&s->pe_lock, flags);
620 queued_bios = bio_list_get(&s->queued_bios);
621 spin_unlock_irqrestore(&s->pe_lock, flags);
622
623 flush_bios(queued_bios);
624}
625
1da177e4
LT
626/*
627 * Error a list of buffers.
628 */
629static void error_bios(struct bio *bio)
630{
631 struct bio *n;
632
633 while (bio) {
634 n = bio->bi_next;
635 bio->bi_next = NULL;
636 bio_io_error(bio, bio->bi_size);
637 bio = n;
638 }
639}
640
695368ac 641static void __invalidate_snapshot(struct dm_snapshot *s, int err)
76df1c65
AK
642{
643 if (!s->valid)
644 return;
645
646 if (err == -EIO)
647 DMERR("Invalidating snapshot: Error reading/writing.");
648 else if (err == -ENOMEM)
649 DMERR("Invalidating snapshot: Unable to allocate exception.");
650
76df1c65
AK
651 if (s->store.drop_snapshot)
652 s->store.drop_snapshot(&s->store);
653
654 s->valid = 0;
655
656 dm_table_event(s->table);
657}
658
028867ac 659static void get_pending_exception(struct dm_snap_pending_exception *pe)
4b832e8d
AK
660{
661 atomic_inc(&pe->ref_count);
662}
663
028867ac 664static struct bio *put_pending_exception(struct dm_snap_pending_exception *pe)
4b832e8d 665{
028867ac 666 struct dm_snap_pending_exception *primary_pe;
4b832e8d
AK
667 struct bio *origin_bios = NULL;
668
669 primary_pe = pe->primary_pe;
670
671 /*
672 * If this pe is involved in a write to the origin and
673 * it is the last sibling to complete then release
674 * the bios for the original write to the origin.
675 */
676 if (primary_pe &&
677 atomic_dec_and_test(&primary_pe->ref_count))
678 origin_bios = bio_list_get(&primary_pe->origin_bios);
679
680 /*
681 * Free the pe if it's not linked to an origin write or if
682 * it's not itself a primary pe.
683 */
684 if (!primary_pe || primary_pe != pe)
685 free_pending_exception(pe);
686
687 /*
688 * Free the primary pe if nothing references it.
689 */
690 if (primary_pe && !atomic_read(&primary_pe->ref_count))
691 free_pending_exception(primary_pe);
692
693 return origin_bios;
694}
695
028867ac 696static void pending_complete(struct dm_snap_pending_exception *pe, int success)
1da177e4 697{
028867ac 698 struct dm_snap_exception *e;
1da177e4 699 struct dm_snapshot *s = pe->snap;
9d493fa8
AK
700 struct bio *origin_bios = NULL;
701 struct bio *snapshot_bios = NULL;
702 int error = 0;
1da177e4 703
76df1c65
AK
704 if (!success) {
705 /* Read/write error - snapshot is unusable */
1da177e4 706 down_write(&s->lock);
695368ac 707 __invalidate_snapshot(s, -EIO);
9d493fa8 708 error = 1;
76df1c65
AK
709 goto out;
710 }
711
712 e = alloc_exception();
713 if (!e) {
1da177e4 714 down_write(&s->lock);
695368ac 715 __invalidate_snapshot(s, -ENOMEM);
9d493fa8 716 error = 1;
76df1c65
AK
717 goto out;
718 }
719 *e = pe->e;
1da177e4 720
76df1c65
AK
721 down_write(&s->lock);
722 if (!s->valid) {
76df1c65 723 free_exception(e);
9d493fa8 724 error = 1;
76df1c65 725 goto out;
1da177e4
LT
726 }
727
9d493fa8
AK
728 /*
729 * Add a proper exception, and remove the
730 * in-flight exception from the list.
731 */
76df1c65 732 insert_exception(&s->complete, e);
76df1c65 733
1da177e4 734 out:
695368ac 735 remove_exception(&pe->e);
9d493fa8 736 snapshot_bios = bio_list_get(&pe->snapshot_bios);
4b832e8d 737 origin_bios = put_pending_exception(pe);
1da177e4 738
9d493fa8
AK
739 up_write(&s->lock);
740
741 /* Submit any pending write bios */
742 if (error)
743 error_bios(snapshot_bios);
744 else
745 flush_bios(snapshot_bios);
746
747 flush_bios(origin_bios);
1da177e4
LT
748}
749
750static void commit_callback(void *context, int success)
751{
028867ac
AK
752 struct dm_snap_pending_exception *pe = context;
753
1da177e4
LT
754 pending_complete(pe, success);
755}
756
757/*
758 * Called when the copy I/O has finished. kcopyd actually runs
759 * this code so don't block.
760 */
761static void copy_callback(int read_err, unsigned int write_err, void *context)
762{
028867ac 763 struct dm_snap_pending_exception *pe = context;
1da177e4
LT
764 struct dm_snapshot *s = pe->snap;
765
766 if (read_err || write_err)
767 pending_complete(pe, 0);
768
769 else
770 /* Update the metadata if we are persistent */
771 s->store.commit_exception(&s->store, &pe->e, commit_callback,
772 pe);
773}
774
775/*
776 * Dispatches the copy operation to kcopyd.
777 */
028867ac 778static void start_copy(struct dm_snap_pending_exception *pe)
1da177e4
LT
779{
780 struct dm_snapshot *s = pe->snap;
781 struct io_region src, dest;
782 struct block_device *bdev = s->origin->bdev;
783 sector_t dev_size;
784
785 dev_size = get_dev_size(bdev);
786
787 src.bdev = bdev;
788 src.sector = chunk_to_sector(s, pe->e.old_chunk);
789 src.count = min(s->chunk_size, dev_size - src.sector);
790
791 dest.bdev = s->cow->bdev;
792 dest.sector = chunk_to_sector(s, pe->e.new_chunk);
793 dest.count = src.count;
794
795 /* Hand over to kcopyd */
796 kcopyd_copy(s->kcopyd_client,
797 &src, 1, &dest, 0, copy_callback, pe);
798}
799
800/*
801 * Looks to see if this snapshot already has a pending exception
802 * for this chunk, otherwise it allocates a new one and inserts
803 * it into the pending table.
804 *
805 * NOTE: a write lock must be held on snap->lock before calling
806 * this.
807 */
028867ac 808static struct dm_snap_pending_exception *
1da177e4
LT
809__find_pending_exception(struct dm_snapshot *s, struct bio *bio)
810{
028867ac
AK
811 struct dm_snap_exception *e;
812 struct dm_snap_pending_exception *pe;
1da177e4
LT
813 chunk_t chunk = sector_to_chunk(s, bio->bi_sector);
814
815 /*
816 * Is there a pending exception for this already ?
817 */
818 e = lookup_exception(&s->pending, chunk);
819 if (e) {
820 /* cast the exception to a pending exception */
028867ac 821 pe = container_of(e, struct dm_snap_pending_exception, e);
76df1c65
AK
822 goto out;
823 }
1da177e4 824
76df1c65
AK
825 /*
826 * Create a new pending exception, we don't want
827 * to hold the lock while we do this.
828 */
829 up_write(&s->lock);
830 pe = alloc_pending_exception();
831 down_write(&s->lock);
1da177e4 832
76df1c65
AK
833 if (!s->valid) {
834 free_pending_exception(pe);
835 return NULL;
836 }
1da177e4 837
76df1c65
AK
838 e = lookup_exception(&s->pending, chunk);
839 if (e) {
840 free_pending_exception(pe);
028867ac 841 pe = container_of(e, struct dm_snap_pending_exception, e);
76df1c65 842 goto out;
1da177e4
LT
843 }
844
76df1c65
AK
845 pe->e.old_chunk = chunk;
846 bio_list_init(&pe->origin_bios);
847 bio_list_init(&pe->snapshot_bios);
848 pe->primary_pe = NULL;
4b832e8d 849 atomic_set(&pe->ref_count, 0);
76df1c65
AK
850 pe->snap = s;
851 pe->started = 0;
852
853 if (s->store.prepare_exception(&s->store, &pe->e)) {
854 free_pending_exception(pe);
855 return NULL;
856 }
857
4b832e8d 858 get_pending_exception(pe);
76df1c65
AK
859 insert_exception(&s->pending, &pe->e);
860
861 out:
1da177e4
LT
862 return pe;
863}
864
028867ac
AK
865static void remap_exception(struct dm_snapshot *s, struct dm_snap_exception *e,
866 struct bio *bio)
1da177e4
LT
867{
868 bio->bi_bdev = s->cow->bdev;
869 bio->bi_sector = chunk_to_sector(s, e->new_chunk) +
870 (bio->bi_sector & s->chunk_mask);
871}
872
873static int snapshot_map(struct dm_target *ti, struct bio *bio,
874 union map_info *map_context)
875{
028867ac
AK
876 struct dm_snap_exception *e;
877 struct dm_snapshot *s = ti->private;
d2a7ad29 878 int r = DM_MAPIO_REMAPPED;
1da177e4 879 chunk_t chunk;
028867ac 880 struct dm_snap_pending_exception *pe = NULL;
1da177e4
LT
881
882 chunk = sector_to_chunk(s, bio->bi_sector);
883
884 /* Full snapshots are not usable */
76df1c65 885 /* To get here the table must be live so s->active is always set. */
1da177e4 886 if (!s->valid)
f6a80ea8 887 return -EIO;
1da177e4 888
4aac0a63
AK
889 if (unlikely(bio_barrier(bio)))
890 return -EOPNOTSUPP;
891
ba40a2aa
AK
892 /* FIXME: should only take write lock if we need
893 * to copy an exception */
894 down_write(&s->lock);
895
896 if (!s->valid) {
897 r = -EIO;
898 goto out_unlock;
899 }
900
901 /* If the block is already remapped - use that, else remap it */
902 e = lookup_exception(&s->complete, chunk);
903 if (e) {
904 remap_exception(s, e, bio);
905 goto out_unlock;
906 }
907
1da177e4
LT
908 /*
909 * Write to snapshot - higher level takes care of RW/RO
910 * flags so we should only get this if we are
911 * writeable.
912 */
913 if (bio_rw(bio) == WRITE) {
76df1c65
AK
914 pe = __find_pending_exception(s, bio);
915 if (!pe) {
695368ac 916 __invalidate_snapshot(s, -ENOMEM);
76df1c65
AK
917 r = -EIO;
918 goto out_unlock;
1da177e4
LT
919 }
920
76df1c65
AK
921 remap_exception(s, &pe->e, bio);
922 bio_list_add(&pe->snapshot_bios, bio);
923
d2a7ad29 924 r = DM_MAPIO_SUBMITTED;
ba40a2aa 925
76df1c65
AK
926 if (!pe->started) {
927 /* this is protected by snap->lock */
928 pe->started = 1;
ba40a2aa 929 up_write(&s->lock);
76df1c65 930 start_copy(pe);
ba40a2aa
AK
931 goto out;
932 }
933 } else
1da177e4
LT
934 /*
935 * FIXME: this read path scares me because we
936 * always use the origin when we have a pending
937 * exception. However I can't think of a
938 * situation where this is wrong - ejt.
939 */
ba40a2aa 940 bio->bi_bdev = s->origin->bdev;
1da177e4 941
ba40a2aa
AK
942 out_unlock:
943 up_write(&s->lock);
944 out:
1da177e4
LT
945 return r;
946}
947
948static void snapshot_resume(struct dm_target *ti)
949{
028867ac 950 struct dm_snapshot *s = ti->private;
1da177e4 951
aa14edeb
AK
952 down_write(&s->lock);
953 s->active = 1;
954 up_write(&s->lock);
1da177e4
LT
955}
956
957static int snapshot_status(struct dm_target *ti, status_type_t type,
958 char *result, unsigned int maxlen)
959{
028867ac 960 struct dm_snapshot *snap = ti->private;
1da177e4
LT
961
962 switch (type) {
963 case STATUSTYPE_INFO:
964 if (!snap->valid)
965 snprintf(result, maxlen, "Invalid");
966 else {
967 if (snap->store.fraction_full) {
968 sector_t numerator, denominator;
969 snap->store.fraction_full(&snap->store,
970 &numerator,
971 &denominator);
4ee218cd
AM
972 snprintf(result, maxlen, "%llu/%llu",
973 (unsigned long long)numerator,
974 (unsigned long long)denominator);
1da177e4
LT
975 }
976 else
977 snprintf(result, maxlen, "Unknown");
978 }
979 break;
980
981 case STATUSTYPE_TABLE:
982 /*
983 * kdevname returns a static pointer so we need
984 * to make private copies if the output is to
985 * make sense.
986 */
4ee218cd 987 snprintf(result, maxlen, "%s %s %c %llu",
1da177e4 988 snap->origin->name, snap->cow->name,
4ee218cd
AM
989 snap->type,
990 (unsigned long long)snap->chunk_size);
1da177e4
LT
991 break;
992 }
993
994 return 0;
995}
996
997/*-----------------------------------------------------------------
998 * Origin methods
999 *---------------------------------------------------------------*/
1da177e4
LT
1000static int __origin_write(struct list_head *snapshots, struct bio *bio)
1001{
d2a7ad29 1002 int r = DM_MAPIO_REMAPPED, first = 0;
1da177e4 1003 struct dm_snapshot *snap;
028867ac
AK
1004 struct dm_snap_exception *e;
1005 struct dm_snap_pending_exception *pe, *next_pe, *primary_pe = NULL;
1da177e4 1006 chunk_t chunk;
eccf0817 1007 LIST_HEAD(pe_queue);
1da177e4
LT
1008
1009 /* Do all the snapshots on this origin */
1010 list_for_each_entry (snap, snapshots, list) {
1011
76df1c65
AK
1012 down_write(&snap->lock);
1013
aa14edeb
AK
1014 /* Only deal with valid and active snapshots */
1015 if (!snap->valid || !snap->active)
76df1c65 1016 goto next_snapshot;
1da177e4 1017
d5e404c1
AK
1018 /* Nothing to do if writing beyond end of snapshot */
1019 if (bio->bi_sector >= dm_table_get_size(snap->table))
76df1c65 1020 goto next_snapshot;
1da177e4
LT
1021
1022 /*
1023 * Remember, different snapshots can have
1024 * different chunk sizes.
1025 */
1026 chunk = sector_to_chunk(snap, bio->bi_sector);
1027
1028 /*
1029 * Check exception table to see if block
1030 * is already remapped in this snapshot
1031 * and trigger an exception if not.
b4b610f6 1032 *
4b832e8d 1033 * ref_count is initialised to 1 so pending_complete()
b4b610f6 1034 * won't destroy the primary_pe while we're inside this loop.
1da177e4
LT
1035 */
1036 e = lookup_exception(&snap->complete, chunk);
76df1c65
AK
1037 if (e)
1038 goto next_snapshot;
1039
1040 pe = __find_pending_exception(snap, bio);
1041 if (!pe) {
695368ac 1042 __invalidate_snapshot(snap, -ENOMEM);
76df1c65
AK
1043 goto next_snapshot;
1044 }
1045
1046 if (!primary_pe) {
1047 /*
1048 * Either every pe here has same
1049 * primary_pe or none has one yet.
1050 */
1051 if (pe->primary_pe)
1052 primary_pe = pe->primary_pe;
1053 else {
1054 primary_pe = pe;
1055 first = 1;
1da177e4 1056 }
76df1c65
AK
1057
1058 bio_list_add(&primary_pe->origin_bios, bio);
1059
d2a7ad29 1060 r = DM_MAPIO_SUBMITTED;
76df1c65
AK
1061 }
1062
1063 if (!pe->primary_pe) {
76df1c65 1064 pe->primary_pe = primary_pe;
4b832e8d 1065 get_pending_exception(primary_pe);
76df1c65
AK
1066 }
1067
1068 if (!pe->started) {
1069 pe->started = 1;
1070 list_add_tail(&pe->list, &pe_queue);
1da177e4
LT
1071 }
1072
76df1c65 1073 next_snapshot:
1da177e4
LT
1074 up_write(&snap->lock);
1075 }
1076
b4b610f6 1077 if (!primary_pe)
4b832e8d 1078 return r;
b4b610f6
AK
1079
1080 /*
1081 * If this is the first time we're processing this chunk and
4b832e8d 1082 * ref_count is now 1 it means all the pending exceptions
b4b610f6
AK
1083 * got completed while we were in the loop above, so it falls to
1084 * us here to remove the primary_pe and submit any origin_bios.
1085 */
1086
4b832e8d 1087 if (first && atomic_dec_and_test(&primary_pe->ref_count)) {
b4b610f6
AK
1088 flush_bios(bio_list_get(&primary_pe->origin_bios));
1089 free_pending_exception(primary_pe);
1090 /* If we got here, pe_queue is necessarily empty. */
4b832e8d 1091 return r;
b4b610f6
AK
1092 }
1093
1da177e4
LT
1094 /*
1095 * Now that we have a complete pe list we can start the copying.
1096 */
eccf0817
AK
1097 list_for_each_entry_safe(pe, next_pe, &pe_queue, list)
1098 start_copy(pe);
1da177e4
LT
1099
1100 return r;
1101}
1102
1103/*
1104 * Called on a write from the origin driver.
1105 */
1106static int do_origin(struct dm_dev *origin, struct bio *bio)
1107{
1108 struct origin *o;
d2a7ad29 1109 int r = DM_MAPIO_REMAPPED;
1da177e4
LT
1110
1111 down_read(&_origins_lock);
1112 o = __lookup_origin(origin->bdev);
1113 if (o)
1114 r = __origin_write(&o->snapshots, bio);
1115 up_read(&_origins_lock);
1116
1117 return r;
1118}
1119
1120/*
1121 * Origin: maps a linear range of a device, with hooks for snapshotting.
1122 */
1123
1124/*
1125 * Construct an origin mapping: <dev_path>
1126 * The context for an origin is merely a 'struct dm_dev *'
1127 * pointing to the real device.
1128 */
1129static int origin_ctr(struct dm_target *ti, unsigned int argc, char **argv)
1130{
1131 int r;
1132 struct dm_dev *dev;
1133
1134 if (argc != 1) {
72d94861 1135 ti->error = "origin: incorrect number of arguments";
1da177e4
LT
1136 return -EINVAL;
1137 }
1138
1139 r = dm_get_device(ti, argv[0], 0, ti->len,
1140 dm_table_get_mode(ti->table), &dev);
1141 if (r) {
1142 ti->error = "Cannot get target device";
1143 return r;
1144 }
1145
1146 ti->private = dev;
1147 return 0;
1148}
1149
1150static void origin_dtr(struct dm_target *ti)
1151{
028867ac 1152 struct dm_dev *dev = ti->private;
1da177e4
LT
1153 dm_put_device(ti, dev);
1154}
1155
1156static int origin_map(struct dm_target *ti, struct bio *bio,
1157 union map_info *map_context)
1158{
028867ac 1159 struct dm_dev *dev = ti->private;
1da177e4
LT
1160 bio->bi_bdev = dev->bdev;
1161
4aac0a63
AK
1162 if (unlikely(bio_barrier(bio)))
1163 return -EOPNOTSUPP;
1164
1da177e4 1165 /* Only tell snapshots if this is a write */
d2a7ad29 1166 return (bio_rw(bio) == WRITE) ? do_origin(dev, bio) : DM_MAPIO_REMAPPED;
1da177e4
LT
1167}
1168
1169#define min_not_zero(l, r) (l == 0) ? r : ((r == 0) ? l : min(l, r))
1170
1171/*
1172 * Set the target "split_io" field to the minimum of all the snapshots'
1173 * chunk sizes.
1174 */
1175static void origin_resume(struct dm_target *ti)
1176{
028867ac 1177 struct dm_dev *dev = ti->private;
1da177e4
LT
1178 struct dm_snapshot *snap;
1179 struct origin *o;
1180 chunk_t chunk_size = 0;
1181
1182 down_read(&_origins_lock);
1183 o = __lookup_origin(dev->bdev);
1184 if (o)
1185 list_for_each_entry (snap, &o->snapshots, list)
1186 chunk_size = min_not_zero(chunk_size, snap->chunk_size);
1187 up_read(&_origins_lock);
1188
1189 ti->split_io = chunk_size;
1190}
1191
1192static int origin_status(struct dm_target *ti, status_type_t type, char *result,
1193 unsigned int maxlen)
1194{
028867ac 1195 struct dm_dev *dev = ti->private;
1da177e4
LT
1196
1197 switch (type) {
1198 case STATUSTYPE_INFO:
1199 result[0] = '\0';
1200 break;
1201
1202 case STATUSTYPE_TABLE:
1203 snprintf(result, maxlen, "%s", dev->name);
1204 break;
1205 }
1206
1207 return 0;
1208}
1209
1210static struct target_type origin_target = {
1211 .name = "snapshot-origin",
4c7e3bf4 1212 .version = {1, 5, 0},
1da177e4
LT
1213 .module = THIS_MODULE,
1214 .ctr = origin_ctr,
1215 .dtr = origin_dtr,
1216 .map = origin_map,
1217 .resume = origin_resume,
1218 .status = origin_status,
1219};
1220
1221static struct target_type snapshot_target = {
1222 .name = "snapshot",
4c7e3bf4 1223 .version = {1, 5, 0},
1da177e4
LT
1224 .module = THIS_MODULE,
1225 .ctr = snapshot_ctr,
1226 .dtr = snapshot_dtr,
1227 .map = snapshot_map,
1228 .resume = snapshot_resume,
1229 .status = snapshot_status,
1230};
1231
1232static int __init dm_snapshot_init(void)
1233{
1234 int r;
1235
1236 r = dm_register_target(&snapshot_target);
1237 if (r) {
1238 DMERR("snapshot target register failed %d", r);
1239 return r;
1240 }
1241
1242 r = dm_register_target(&origin_target);
1243 if (r < 0) {
72d94861 1244 DMERR("Origin target register failed %d", r);
1da177e4
LT
1245 goto bad1;
1246 }
1247
1248 r = init_origin_hash();
1249 if (r) {
1250 DMERR("init_origin_hash failed.");
1251 goto bad2;
1252 }
1253
028867ac 1254 exception_cache = KMEM_CACHE(dm_snap_exception, 0);
1da177e4
LT
1255 if (!exception_cache) {
1256 DMERR("Couldn't create exception cache.");
1257 r = -ENOMEM;
1258 goto bad3;
1259 }
1260
028867ac 1261 pending_cache = KMEM_CACHE(dm_snap_pending_exception, 0);
1da177e4
LT
1262 if (!pending_cache) {
1263 DMERR("Couldn't create pending cache.");
1264 r = -ENOMEM;
1265 goto bad4;
1266 }
1267
93d2341c 1268 pending_pool = mempool_create_slab_pool(128, pending_cache);
1da177e4
LT
1269 if (!pending_pool) {
1270 DMERR("Couldn't create pending pool.");
1271 r = -ENOMEM;
1272 goto bad5;
1273 }
1274
ca3a931f
AK
1275 ksnapd = create_singlethread_workqueue("ksnapd");
1276 if (!ksnapd) {
1277 DMERR("Failed to create ksnapd workqueue.");
1278 r = -ENOMEM;
1279 goto bad6;
1280 }
1281
1da177e4
LT
1282 return 0;
1283
ca3a931f
AK
1284 bad6:
1285 mempool_destroy(pending_pool);
1da177e4
LT
1286 bad5:
1287 kmem_cache_destroy(pending_cache);
1288 bad4:
1289 kmem_cache_destroy(exception_cache);
1290 bad3:
1291 exit_origin_hash();
1292 bad2:
1293 dm_unregister_target(&origin_target);
1294 bad1:
1295 dm_unregister_target(&snapshot_target);
1296 return r;
1297}
1298
1299static void __exit dm_snapshot_exit(void)
1300{
1301 int r;
1302
ca3a931f
AK
1303 destroy_workqueue(ksnapd);
1304
1da177e4
LT
1305 r = dm_unregister_target(&snapshot_target);
1306 if (r)
1307 DMERR("snapshot unregister failed %d", r);
1308
1309 r = dm_unregister_target(&origin_target);
1310 if (r)
1311 DMERR("origin unregister failed %d", r);
1312
1313 exit_origin_hash();
1314 mempool_destroy(pending_pool);
1315 kmem_cache_destroy(pending_cache);
1316 kmem_cache_destroy(exception_cache);
1317}
1318
1319/* Module hooks */
1320module_init(dm_snapshot_init);
1321module_exit(dm_snapshot_exit);
1322
1323MODULE_DESCRIPTION(DM_NAME " snapshot target");
1324MODULE_AUTHOR("Joe Thornber");
1325MODULE_LICENSE("GPL");