Merge tag 'phy-fixes-6.4-1' of git://git.kernel.org/pub/scm/linux/kernel/git/phy...
[linux-block.git] / drivers / md / dm.c
CommitLineData
3bd94003 1// SPDX-License-Identifier: GPL-2.0-only
1da177e4
LT
2/*
3 * Copyright (C) 2001, 2002 Sistina Software (UK) Limited.
784aae73 4 * Copyright (C) 2004-2008 Red Hat, Inc. All rights reserved.
1da177e4
LT
5 *
6 * This file is released under the GPL.
7 */
8
4cc96131
MS
9#include "dm-core.h"
10#include "dm-rq.h"
51e5b2bd 11#include "dm-uevent.h"
91ccbbac 12#include "dm-ima.h"
1da177e4
LT
13
14#include <linux/init.h>
15#include <linux/module.h>
48c9c27b 16#include <linux/mutex.h>
6958c1c6 17#include <linux/sched/mm.h>
174cd4b1 18#include <linux/sched/signal.h>
1da177e4
LT
19#include <linux/blkpg.h>
20#include <linux/bio.h>
1da177e4 21#include <linux/mempool.h>
f26c5719 22#include <linux/dax.h>
1da177e4
LT
23#include <linux/slab.h>
24#include <linux/idr.h>
7e026c8c 25#include <linux/uio.h>
3ac51e74 26#include <linux/hdreg.h>
3f77316d 27#include <linux/delay.h>
ffcc3936 28#include <linux/wait.h>
71cdb697 29#include <linux/pr.h>
b0b4d7c6 30#include <linux/refcount.h>
c6a564ff 31#include <linux/part_stat.h>
a892c8d5 32#include <linux/blk-crypto.h>
1e8d44bd 33#include <linux/blk-crypto-profile.h>
55782138 34
72d94861
AK
35#define DM_MSG_PREFIX "core"
36
60935eb2
MB
37/*
38 * Cookies are numeric values sent with CHANGE and REMOVE
39 * uevents while resuming, removing or renaming the device.
40 */
41#define DM_COOKIE_ENV_VAR_NAME "DM_COOKIE"
42#define DM_COOKIE_LENGTH 24
43
b99fdcdc
ML
44/*
45 * For REQ_POLLED fs bio, this flag is set if we link mapped underlying
46 * dm_io into one list, and reuse bio->bi_private as the list head. Before
47 * ending this fs bio, we will recover its ->bi_private.
48 */
49#define REQ_DM_POLL_LIST REQ_DRV
50
1da177e4
LT
51static const char *_name = DM_NAME;
52
2f06cd12
HM
53static unsigned int major;
54static unsigned int _major;
1da177e4 55
d15b774c
AK
56static DEFINE_IDR(_minor_idr);
57
f32c10b0 58static DEFINE_SPINLOCK(_minor_lock);
2c140a24
MP
59
60static void do_deferred_remove(struct work_struct *w);
61
62static DECLARE_WORK(deferred_remove_work, do_deferred_remove);
63
acfe0ad7
MP
64static struct workqueue_struct *deferred_remove_workqueue;
65
93e6442c
MP
66atomic_t dm_global_event_nr = ATOMIC_INIT(0);
67DECLARE_WAIT_QUEUE_HEAD(dm_global_eventq);
68
62e08243
MP
69void dm_issue_global_event(void)
70{
71 atomic_inc(&dm_global_event_nr);
72 wake_up(&dm_global_eventq);
73}
74
442761fd
MS
75DEFINE_STATIC_KEY_FALSE(stats_enabled);
76DEFINE_STATIC_KEY_FALSE(swap_bios_enabled);
77DEFINE_STATIC_KEY_FALSE(zoned_enabled);
78
1da177e4 79/*
64f52b0e 80 * One of these is allocated (on-stack) per original bio.
1da177e4 81 */
64f52b0e 82struct clone_info {
64f52b0e
MS
83 struct dm_table *map;
84 struct bio *bio;
85 struct dm_io *io;
86 sector_t sector;
86a3238c 87 unsigned int sector_count;
4edadf6d
MS
88 bool is_abnormal_io:1;
89 bool submit_as_polled:1;
64f52b0e
MS
90};
91
6c23f0bd
CH
92static inline struct dm_target_io *clone_to_tio(struct bio *clone)
93{
94 return container_of(clone, struct dm_target_io, clone);
95}
96
64f52b0e
MS
97void *dm_per_bio_data(struct bio *bio, size_t data_size)
98{
655f3aad 99 if (!dm_tio_flagged(clone_to_tio(bio), DM_TIO_INSIDE_DM_IO))
62f26317
JX
100 return (char *)bio - DM_TARGET_IO_BIO_OFFSET - data_size;
101 return (char *)bio - DM_IO_BIO_OFFSET - data_size;
64f52b0e
MS
102}
103EXPORT_SYMBOL_GPL(dm_per_bio_data);
104
105struct bio *dm_bio_from_per_bio_data(void *data, size_t data_size)
106{
107 struct dm_io *io = (struct dm_io *)((char *)data + data_size);
b30f1607 108
64f52b0e 109 if (io->magic == DM_IO_MAGIC)
62f26317 110 return (struct bio *)((char *)io + DM_IO_BIO_OFFSET);
64f52b0e 111 BUG_ON(io->magic != DM_TIO_MAGIC);
62f26317 112 return (struct bio *)((char *)io + DM_TARGET_IO_BIO_OFFSET);
64f52b0e
MS
113}
114EXPORT_SYMBOL_GPL(dm_bio_from_per_bio_data);
115
86a3238c 116unsigned int dm_bio_get_target_bio_nr(const struct bio *bio)
64f52b0e
MS
117{
118 return container_of(bio, struct dm_target_io, clone)->target_bio_nr;
119}
120EXPORT_SYMBOL_GPL(dm_bio_get_target_bio_nr);
121
ba61fdd1
JM
122#define MINOR_ALLOCED ((void *)-1)
123
115485e8 124#define DM_NUMA_NODE NUMA_NO_NODE
115485e8 125static int dm_numa_node = DM_NUMA_NODE;
faad87df 126
a666e5c0
MP
127#define DEFAULT_SWAP_BIOS (8 * 1048576 / PAGE_SIZE)
128static int swap_bios = DEFAULT_SWAP_BIOS;
129static int get_swap_bios(void)
130{
131 int latch = READ_ONCE(swap_bios);
b30f1607 132
a666e5c0
MP
133 if (unlikely(latch <= 0))
134 latch = DEFAULT_SWAP_BIOS;
135 return latch;
136}
137
86f1152b
BM
138struct table_device {
139 struct list_head list;
b0b4d7c6 140 refcount_t count;
86f1152b
BM
141 struct dm_dev dm_dev;
142};
143
e8603136
MS
144/*
145 * Bio-based DM's mempools' reserved IOs set by the user.
146 */
4cc96131 147#define RESERVED_BIO_BASED_IOS 16
86a3238c 148static unsigned int reserved_bio_based_ios = RESERVED_BIO_BASED_IOS;
e8603136 149
115485e8
MS
150static int __dm_get_module_param_int(int *module_param, int min, int max)
151{
6aa7de05 152 int param = READ_ONCE(*module_param);
115485e8
MS
153 int modified_param = 0;
154 bool modified = true;
155
156 if (param < min)
157 modified_param = min;
158 else if (param > max)
159 modified_param = max;
160 else
161 modified = false;
162
163 if (modified) {
164 (void)cmpxchg(module_param, param, modified_param);
165 param = modified_param;
166 }
167
168 return param;
169}
170
86a3238c 171unsigned int __dm_get_module_param(unsigned int *module_param, unsigned int def, unsigned int max)
f4790826 172{
86a3238c
HM
173 unsigned int param = READ_ONCE(*module_param);
174 unsigned int modified_param = 0;
f4790826 175
09c2d531
MS
176 if (!param)
177 modified_param = def;
178 else if (param > max)
179 modified_param = max;
f4790826 180
09c2d531
MS
181 if (modified_param) {
182 (void)cmpxchg(module_param, param, modified_param);
183 param = modified_param;
f4790826
MS
184 }
185
09c2d531 186 return param;
f4790826
MS
187}
188
86a3238c 189unsigned int dm_get_reserved_bio_based_ios(void)
e8603136 190{
09c2d531 191 return __dm_get_module_param(&reserved_bio_based_ios,
4cc96131 192 RESERVED_BIO_BASED_IOS, DM_RESERVED_MAX_IOS);
e8603136
MS
193}
194EXPORT_SYMBOL_GPL(dm_get_reserved_bio_based_ios);
195
86a3238c 196static unsigned int dm_get_numa_node(void)
115485e8
MS
197{
198 return __dm_get_module_param_int(&dm_numa_node,
199 DM_NUMA_NODE, num_online_nodes() - 1);
200}
201
1da177e4
LT
202static int __init local_init(void)
203{
e689fbab 204 int r;
1ae49ea2 205
51e5b2bd 206 r = dm_uevent_init();
51157b4a 207 if (r)
e689fbab 208 return r;
51e5b2bd 209
acfe0ad7
MP
210 deferred_remove_workqueue = alloc_workqueue("kdmremove", WQ_UNBOUND, 1);
211 if (!deferred_remove_workqueue) {
212 r = -ENOMEM;
213 goto out_uevent_exit;
214 }
215
1da177e4
LT
216 _major = major;
217 r = register_blkdev(_major, _name);
51157b4a 218 if (r < 0)
acfe0ad7 219 goto out_free_workqueue;
1da177e4
LT
220
221 if (!_major)
222 _major = r;
223
224 return 0;
51157b4a 225
acfe0ad7
MP
226out_free_workqueue:
227 destroy_workqueue(deferred_remove_workqueue);
51157b4a
KU
228out_uevent_exit:
229 dm_uevent_exit();
51157b4a
KU
230
231 return r;
1da177e4
LT
232}
233
234static void local_exit(void)
235{
acfe0ad7 236 destroy_workqueue(deferred_remove_workqueue);
2c140a24 237
00d59405 238 unregister_blkdev(_major, _name);
51e5b2bd 239 dm_uevent_exit();
1da177e4
LT
240
241 _major = 0;
242
243 DMINFO("cleaned up");
244}
245
b9249e55 246static int (*_inits[])(void) __initdata = {
1da177e4
LT
247 local_init,
248 dm_target_init,
249 dm_linear_init,
250 dm_stripe_init,
952b3557 251 dm_io_init,
945fa4d2 252 dm_kcopyd_init,
1da177e4 253 dm_interface_init,
fd2ed4d2 254 dm_statistics_init,
1da177e4
LT
255};
256
b9249e55 257static void (*_exits[])(void) = {
1da177e4
LT
258 local_exit,
259 dm_target_exit,
260 dm_linear_exit,
261 dm_stripe_exit,
952b3557 262 dm_io_exit,
945fa4d2 263 dm_kcopyd_exit,
1da177e4 264 dm_interface_exit,
fd2ed4d2 265 dm_statistics_exit,
1da177e4
LT
266};
267
268static int __init dm_init(void)
269{
270 const int count = ARRAY_SIZE(_inits);
1da177e4
LT
271 int r, i;
272
f1cd6cb2
TS
273#if (IS_ENABLED(CONFIG_IMA) && !IS_ENABLED(CONFIG_IMA_DISABLE_HTABLE))
274 DMWARN("CONFIG_IMA_DISABLE_HTABLE is disabled."
275 " Duplicate IMA measurements will not be recorded in the IMA log.");
276#endif
277
1da177e4
LT
278 for (i = 0; i < count; i++) {
279 r = _inits[i]();
280 if (r)
281 goto bad;
282 }
283
284 return 0;
f1cd6cb2 285bad:
1da177e4
LT
286 while (i--)
287 _exits[i]();
288
289 return r;
290}
291
292static void __exit dm_exit(void)
293{
294 int i = ARRAY_SIZE(_exits);
295
296 while (i--)
297 _exits[i]();
d15b774c
AK
298
299 /*
300 * Should be empty by this point.
301 */
d15b774c 302 idr_destroy(&_minor_idr);
1da177e4
LT
303}
304
305/*
306 * Block device functions
307 */
432a212c
MA
308int dm_deleting_md(struct mapped_device *md)
309{
310 return test_bit(DMF_DELETING, &md->flags);
311}
312
fe5f9f2c 313static int dm_blk_open(struct block_device *bdev, fmode_t mode)
1da177e4
LT
314{
315 struct mapped_device *md;
316
fba9f90e
JM
317 spin_lock(&_minor_lock);
318
fe5f9f2c 319 md = bdev->bd_disk->private_data;
fba9f90e
JM
320 if (!md)
321 goto out;
322
5c6bd75d 323 if (test_bit(DMF_FREEING, &md->flags) ||
432a212c 324 dm_deleting_md(md)) {
fba9f90e
JM
325 md = NULL;
326 goto out;
327 }
328
1da177e4 329 dm_get(md);
5c6bd75d 330 atomic_inc(&md->open_count);
fba9f90e
JM
331out:
332 spin_unlock(&_minor_lock);
333
334 return md ? 0 : -ENXIO;
1da177e4
LT
335}
336
db2a144b 337static void dm_blk_close(struct gendisk *disk, fmode_t mode)
1da177e4 338{
63a4f065 339 struct mapped_device *md;
6e9624b8 340
4a1aeb98
MB
341 spin_lock(&_minor_lock);
342
63a4f065
MS
343 md = disk->private_data;
344 if (WARN_ON(!md))
345 goto out;
346
2c140a24
MP
347 if (atomic_dec_and_test(&md->open_count) &&
348 (test_bit(DMF_DEFERRED_REMOVE, &md->flags)))
acfe0ad7 349 queue_work(deferred_remove_workqueue, &deferred_remove_work);
2c140a24 350
1da177e4 351 dm_put(md);
63a4f065 352out:
4a1aeb98 353 spin_unlock(&_minor_lock);
1da177e4
LT
354}
355
5c6bd75d
AK
356int dm_open_count(struct mapped_device *md)
357{
358 return atomic_read(&md->open_count);
359}
360
361/*
362 * Guarantees nothing is using the device before it's deleted.
363 */
2c140a24 364int dm_lock_for_deletion(struct mapped_device *md, bool mark_deferred, bool only_deferred)
5c6bd75d
AK
365{
366 int r = 0;
367
368 spin_lock(&_minor_lock);
369
2c140a24 370 if (dm_open_count(md)) {
5c6bd75d 371 r = -EBUSY;
2c140a24
MP
372 if (mark_deferred)
373 set_bit(DMF_DEFERRED_REMOVE, &md->flags);
374 } else if (only_deferred && !test_bit(DMF_DEFERRED_REMOVE, &md->flags))
375 r = -EEXIST;
5c6bd75d
AK
376 else
377 set_bit(DMF_DELETING, &md->flags);
378
379 spin_unlock(&_minor_lock);
380
381 return r;
382}
383
2c140a24
MP
384int dm_cancel_deferred_remove(struct mapped_device *md)
385{
386 int r = 0;
387
388 spin_lock(&_minor_lock);
389
390 if (test_bit(DMF_DELETING, &md->flags))
391 r = -EBUSY;
392 else
393 clear_bit(DMF_DEFERRED_REMOVE, &md->flags);
394
395 spin_unlock(&_minor_lock);
396
397 return r;
398}
399
400static void do_deferred_remove(struct work_struct *w)
401{
402 dm_deferred_remove();
403}
404
3ac51e74
DW
405static int dm_blk_getgeo(struct block_device *bdev, struct hd_geometry *geo)
406{
407 struct mapped_device *md = bdev->bd_disk->private_data;
408
409 return dm_get_geometry(md, geo);
410}
411
971888c4 412static int dm_prepare_ioctl(struct mapped_device *md, int *srcu_idx,
5bd5e8d8 413 struct block_device **bdev)
aa129a22 414{
564b5c54 415 struct dm_target *ti;
6c182cd8 416 struct dm_table *map;
971888c4 417 int r;
aa129a22 418
6c182cd8 419retry:
e56f81e0 420 r = -ENOTTY;
971888c4 421 map = dm_get_live_table(md, srcu_idx);
aa129a22 422 if (!map || !dm_table_get_size(map))
971888c4 423 return r;
aa129a22
MB
424
425 /* We only support devices that have a single target */
2aec377a 426 if (map->num_targets != 1)
971888c4 427 return r;
aa129a22 428
564b5c54
MS
429 ti = dm_table_get_target(map, 0);
430 if (!ti->type->prepare_ioctl)
971888c4 431 return r;
519049af 432
971888c4
MS
433 if (dm_suspended_md(md))
434 return -EAGAIN;
aa129a22 435
564b5c54 436 r = ti->type->prepare_ioctl(ti, bdev);
5bbbfdf6 437 if (r == -ENOTCONN && !fatal_signal_pending(current)) {
971888c4 438 dm_put_live_table(md, *srcu_idx);
238d991f 439 fsleep(10000);
6c182cd8
HR
440 goto retry;
441 }
971888c4 442
e56f81e0
CH
443 return r;
444}
445
971888c4 446static void dm_unprepare_ioctl(struct mapped_device *md, int srcu_idx)
971888c4
MS
447{
448 dm_put_live_table(md, srcu_idx);
449}
450
e56f81e0
CH
451static int dm_blk_ioctl(struct block_device *bdev, fmode_t mode,
452 unsigned int cmd, unsigned long arg)
453{
454 struct mapped_device *md = bdev->bd_disk->private_data;
971888c4 455 int r, srcu_idx;
e56f81e0 456
5bd5e8d8 457 r = dm_prepare_ioctl(md, &srcu_idx, &bdev);
e56f81e0 458 if (r < 0)
971888c4 459 goto out;
6c182cd8 460
e56f81e0
CH
461 if (r > 0) {
462 /*
e980f623
CH
463 * Target determined this ioctl is being issued against a
464 * subset of the parent bdev; require extra privileges.
e56f81e0 465 */
e980f623 466 if (!capable(CAP_SYS_RAWIO)) {
0378c625 467 DMDEBUG_LIMIT(
e980f623
CH
468 "%s: sending ioctl %x to DM device without required privilege.",
469 current->comm, cmd);
470 r = -ENOIOCTLCMD;
e56f81e0 471 goto out;
e980f623 472 }
e56f81e0 473 }
6c182cd8 474
a7cb3d2f
CH
475 if (!bdev->bd_disk->fops->ioctl)
476 r = -ENOTTY;
477 else
478 r = bdev->bd_disk->fops->ioctl(bdev, mode, cmd, arg);
e56f81e0 479out:
971888c4 480 dm_unprepare_ioctl(md, srcu_idx);
aa129a22
MB
481 return r;
482}
483
7465d7ac
MS
484u64 dm_start_time_ns_from_clone(struct bio *bio)
485{
6c23f0bd 486 return jiffies_to_nsecs(clone_to_tio(bio)->io->start_time);
7465d7ac
MS
487}
488EXPORT_SYMBOL_GPL(dm_start_time_ns_from_clone);
489
8d394bc4 490static bool bio_is_flush_with_data(struct bio *bio)
7465d7ac 491{
8d394bc4
MS
492 return ((bio->bi_opf & REQ_PREFLUSH) && bio->bi_iter.bi_size);
493}
494
e6926ad0 495static void dm_io_acct(struct dm_io *io, bool end)
8d394bc4 496{
e6926ad0
ML
497 struct dm_stats_aux *stats_aux = &io->stats_aux;
498 unsigned long start_time = io->start_time;
499 struct mapped_device *md = io->md;
500 struct bio *bio = io->orig_bio;
d3de6d12
ML
501 unsigned int sectors;
502
503 /*
504 * If REQ_PREFLUSH set, don't account payload, it will be
505 * submitted (and accounted) after this flush completes.
506 */
507 if (bio_is_flush_with_data(bio))
508 sectors = 0;
7dd76d1f 509 else if (likely(!(dm_io_flagged(io, DM_IO_WAS_SPLIT))))
d3de6d12 510 sectors = bio_sectors(bio);
7dd76d1f
ML
511 else
512 sectors = io->sectors;
8d394bc4
MS
513
514 if (!end)
5f275713 515 bdev_start_io_acct(bio->bi_bdev, bio_op(bio), start_time);
8d394bc4 516 else
5f275713
YK
517 bdev_end_io_acct(bio->bi_bdev, bio_op(bio), sectors,
518 start_time);
7465d7ac 519
442761fd 520 if (static_branch_unlikely(&stats_enabled) &&
7dd76d1f
ML
521 unlikely(dm_stats_used(&md->stats))) {
522 sector_t sector;
523
524 if (likely(!dm_io_flagged(io, DM_IO_WAS_SPLIT)))
525 sector = bio->bi_iter.bi_sector;
526 else
527 sector = bio_end_sector(bio) - io->sector_offset;
528
7465d7ac 529 dm_stats_account_io(&md->stats, bio_data_dir(bio),
7dd76d1f 530 sector, sectors,
8d394bc4 531 end, start_time, stats_aux);
7dd76d1f 532 }
8d394bc4
MS
533}
534
b992b40d 535static void __dm_start_io_acct(struct dm_io *io)
8d394bc4 536{
e6926ad0 537 dm_io_acct(io, false);
7465d7ac
MS
538}
539
0fbb4d93 540static void dm_start_io_acct(struct dm_io *io, struct bio *clone)
7465d7ac 541{
0fbb4d93
MS
542 /*
543 * Ensure IO accounting is only ever started once.
0fbb4d93 544 */
3b03f7c1
MS
545 if (dm_io_flagged(io, DM_IO_ACCOUNTED))
546 return;
547
548 /* Expect no possibility for race unless DM_TIO_IS_DUPLICATE_BIO. */
549 if (!clone || likely(dm_tio_is_normal(clone_to_tio(clone)))) {
82f6cdcc
MS
550 dm_io_set_flag(io, DM_IO_ACCOUNTED);
551 } else {
552 unsigned long flags;
655f3aad 553 /* Can afford locking given DM_TIO_IS_DUPLICATE_BIO */
4d7bca13 554 spin_lock_irqsave(&io->lock, flags);
10eb3a0d
BM
555 if (dm_io_flagged(io, DM_IO_ACCOUNTED)) {
556 spin_unlock_irqrestore(&io->lock, flags);
557 return;
558 }
82f6cdcc 559 dm_io_set_flag(io, DM_IO_ACCOUNTED);
4d7bca13 560 spin_unlock_irqrestore(&io->lock, flags);
82f6cdcc 561 }
7465d7ac 562
b992b40d 563 __dm_start_io_acct(io);
0fbb4d93 564}
7465d7ac 565
b992b40d 566static void dm_end_io_acct(struct dm_io *io)
0fbb4d93 567{
e6926ad0 568 dm_io_acct(io, true);
7465d7ac 569}
978e51ba
MS
570
571static struct dm_io *alloc_io(struct mapped_device *md, struct bio *bio)
1da177e4 572{
64f52b0e
MS
573 struct dm_io *io;
574 struct dm_target_io *tio;
575 struct bio *clone;
576
29dec90a 577 clone = bio_alloc_clone(NULL, bio, GFP_NOIO, &md->mempools->io_bs);
6c23f0bd 578 tio = clone_to_tio(clone);
655f3aad
MS
579 tio->flags = 0;
580 dm_tio_set_flag(tio, DM_TIO_INSIDE_DM_IO);
64f52b0e
MS
581 tio->io = NULL;
582
583 io = container_of(tio, struct dm_io, tio);
584 io->magic = DM_IO_MAGIC;
84b98f4c 585 io->status = BLK_STS_OK;
0f14d60a
ML
586
587 /* one ref is for submission, the other is for completion */
588 atomic_set(&io->io_count, 2);
9f6dc633 589 this_cpu_inc(*md->pending_io);
7dd76d1f 590 io->orig_bio = bio;
978e51ba 591 io->md = md;
4d7bca13 592 spin_lock_init(&io->lock);
b879f915 593 io->start_time = jiffies;
82f6cdcc 594 io->flags = 0;
64f52b0e 595
442761fd
MS
596 if (static_branch_unlikely(&stats_enabled))
597 dm_stats_record_start(&md->stats, &io->stats_aux);
64f52b0e
MS
598
599 return io;
1da177e4
LT
600}
601
0119ab14 602static void free_io(struct dm_io *io)
1da177e4 603{
64f52b0e
MS
604 bio_put(&io->tio.clone);
605}
606
1d1068ce 607static struct bio *alloc_tio(struct clone_info *ci, struct dm_target *ti,
86a3238c 608 unsigned int target_bio_nr, unsigned int *len, gfp_t gfp_mask)
64f52b0e 609{
9dd1cd32 610 struct mapped_device *md = ci->io->md;
64f52b0e 611 struct dm_target_io *tio;
018b05eb 612 struct bio *clone;
64f52b0e
MS
613
614 if (!ci->io->tio.io) {
615 /* the dm_target_io embedded in ci->io is available */
616 tio = &ci->io->tio;
018b05eb
MS
617 /* alloc_io() already initialized embedded clone */
618 clone = &tio->clone;
64f52b0e 619 } else {
29dec90a
CH
620 clone = bio_alloc_clone(NULL, ci->bio, gfp_mask,
621 &md->mempools->bs);
64f52b0e
MS
622 if (!clone)
623 return NULL;
624
b99fdcdc
ML
625 /* REQ_DM_POLL_LIST shouldn't be inherited */
626 clone->bi_opf &= ~REQ_DM_POLL_LIST;
627
6c23f0bd 628 tio = clone_to_tio(clone);
655f3aad 629 tio->flags = 0; /* also clears DM_TIO_INSIDE_DM_IO */
64f52b0e
MS
630 }
631
632 tio->magic = DM_TIO_MAGIC;
633 tio->io = ci->io;
634 tio->ti = ti;
635 tio->target_bio_nr = target_bio_nr;
dc8e2021 636 tio->len_ptr = len;
743598f0 637 tio->old_sector = 0;
64f52b0e 638
9dd1cd32
MS
639 /* Set default bdev, but target must bio_set_dev() before issuing IO */
640 clone->bi_bdev = md->disk->part0;
641 if (unlikely(ti->needs_bio_set_dev))
642 bio_set_dev(clone, md->disk->part0);
643
018b05eb
MS
644 if (len) {
645 clone->bi_iter.bi_size = to_bytes(*len);
646 if (bio_integrity(clone))
647 bio_integrity_trim(clone);
648 }
64f52b0e 649
018b05eb 650 return clone;
1da177e4
LT
651}
652
1d1068ce 653static void free_tio(struct bio *clone)
1da177e4 654{
655f3aad 655 if (dm_tio_flagged(clone_to_tio(clone), DM_TIO_INSIDE_DM_IO))
64f52b0e 656 return;
1d1068ce 657 bio_put(clone);
1da177e4
LT
658}
659
660/*
661 * Add the bio to the list of deferred io.
662 */
92c63902 663static void queue_io(struct mapped_device *md, struct bio *bio)
1da177e4 664{
05447420 665 unsigned long flags;
1da177e4 666
05447420 667 spin_lock_irqsave(&md->deferred_lock, flags);
1da177e4 668 bio_list_add(&md->deferred, bio);
05447420 669 spin_unlock_irqrestore(&md->deferred_lock, flags);
6a8736d1 670 queue_work(md->wq, &md->work);
1da177e4
LT
671}
672
673/*
674 * Everyone (including functions in this file), should use this
675 * function to access the md->map field, and make sure they call
83d5e5b0 676 * dm_put_live_table() when finished.
1da177e4 677 */
563a225c
MS
678struct dm_table *dm_get_live_table(struct mapped_device *md,
679 int *srcu_idx) __acquires(md->io_barrier)
1da177e4 680{
83d5e5b0
MP
681 *srcu_idx = srcu_read_lock(&md->io_barrier);
682
683 return srcu_dereference(md->map, &md->io_barrier);
684}
1da177e4 685
563a225c
MS
686void dm_put_live_table(struct mapped_device *md,
687 int srcu_idx) __releases(md->io_barrier)
83d5e5b0
MP
688{
689 srcu_read_unlock(&md->io_barrier, srcu_idx);
690}
691
692void dm_sync_table(struct mapped_device *md)
693{
694 synchronize_srcu(&md->io_barrier);
695 synchronize_rcu_expedited();
696}
697
698/*
699 * A fast alternative to dm_get_live_table/dm_put_live_table.
700 * The caller must not block between these two functions.
701 */
702static struct dm_table *dm_get_live_table_fast(struct mapped_device *md) __acquires(RCU)
703{
704 rcu_read_lock();
705 return rcu_dereference(md->map);
706}
1da177e4 707
83d5e5b0
MP
708static void dm_put_live_table_fast(struct mapped_device *md) __releases(RCU)
709{
710 rcu_read_unlock();
1da177e4
LT
711}
712
563a225c 713static inline struct dm_table *dm_get_live_table_bio(struct mapped_device *md,
a3282b43 714 int *srcu_idx, blk_opf_t bio_opf)
563a225c 715{
5d7362d0 716 if (bio_opf & REQ_NOWAIT)
563a225c
MS
717 return dm_get_live_table_fast(md);
718 else
719 return dm_get_live_table(md, srcu_idx);
720}
721
722static inline void dm_put_live_table_bio(struct mapped_device *md, int srcu_idx,
a3282b43 723 blk_opf_t bio_opf)
563a225c 724{
5d7362d0 725 if (bio_opf & REQ_NOWAIT)
563a225c
MS
726 dm_put_live_table_fast(md);
727 else
728 dm_put_live_table(md, srcu_idx);
729}
730
971888c4
MS
731static char *_dm_claim_ptr = "I belong to device-mapper";
732
86f1152b
BM
733/*
734 * Open a table device so we can use it as a map destination.
735 */
b9a785d2
CH
736static struct table_device *open_table_device(struct mapped_device *md,
737 dev_t dev, fmode_t mode)
86f1152b 738{
b9a785d2 739 struct table_device *td;
86f1152b 740 struct block_device *bdev;
cd913c76 741 u64 part_off;
86f1152b
BM
742 int r;
743
b9a785d2
CH
744 td = kmalloc_node(sizeof(*td), GFP_KERNEL, md->numa_node_id);
745 if (!td)
746 return ERR_PTR(-ENOMEM);
747 refcount_set(&td->count, 1);
86f1152b 748
b9a785d2
CH
749 bdev = blkdev_get_by_dev(dev, mode | FMODE_EXCL, _dm_claim_ptr);
750 if (IS_ERR(bdev)) {
751 r = PTR_ERR(bdev);
752 goto out_free_td;
753 }
86f1152b 754
1a581b72
CH
755 /*
756 * We can be called before the dm disk is added. In that case we can't
757 * register the holder relation here. It will be done once add_disk was
758 * called.
759 */
760 if (md->disk->slave_dir) {
761 r = bd_link_disk_holder(bdev, md->disk);
762 if (r)
763 goto out_blkdev_put;
764 }
86f1152b 765
b9a785d2 766 td->dm_dev.mode = mode;
86f1152b 767 td->dm_dev.bdev = bdev;
8012b866 768 td->dm_dev.dax_dev = fs_dax_get_by_bdev(bdev, &part_off, NULL, NULL);
b9a785d2
CH
769 format_dev_t(td->dm_dev.name, dev);
770 list_add(&td->list, &md->table_devices);
771 return td;
772
773out_blkdev_put:
774 blkdev_put(bdev, mode | FMODE_EXCL);
775out_free_td:
776 kfree(td);
777 return ERR_PTR(r);
86f1152b
BM
778}
779
780/*
781 * Close a table device that we've been using.
782 */
783static void close_table_device(struct table_device *td, struct mapped_device *md)
784{
1a581b72
CH
785 if (md->disk->slave_dir)
786 bd_unlink_disk_holder(td->dm_dev.bdev, md->disk);
86f1152b 787 blkdev_put(td->dm_dev.bdev, td->dm_dev.mode | FMODE_EXCL);
817bf402 788 put_dax(td->dm_dev.dax_dev);
7b586583
CH
789 list_del(&td->list);
790 kfree(td);
86f1152b
BM
791}
792
793static struct table_device *find_table_device(struct list_head *l, dev_t dev,
8454fca4
SS
794 fmode_t mode)
795{
86f1152b
BM
796 struct table_device *td;
797
798 list_for_each_entry(td, l, list)
799 if (td->dm_dev.bdev->bd_dev == dev && td->dm_dev.mode == mode)
800 return td;
801
802 return NULL;
803}
804
805int dm_get_table_device(struct mapped_device *md, dev_t dev, fmode_t mode,
8454fca4
SS
806 struct dm_dev **result)
807{
86f1152b
BM
808 struct table_device *td;
809
810 mutex_lock(&md->table_devices_lock);
811 td = find_table_device(&md->table_devices, dev, mode);
812 if (!td) {
b9a785d2
CH
813 td = open_table_device(md, dev, mode);
814 if (IS_ERR(td)) {
86f1152b 815 mutex_unlock(&md->table_devices_lock);
b9a785d2 816 return PTR_ERR(td);
86f1152b 817 }
b0b4d7c6
ER
818 } else {
819 refcount_inc(&td->count);
86f1152b 820 }
86f1152b
BM
821 mutex_unlock(&md->table_devices_lock);
822
823 *result = &td->dm_dev;
824 return 0;
825}
86f1152b
BM
826
827void dm_put_table_device(struct mapped_device *md, struct dm_dev *d)
828{
829 struct table_device *td = container_of(d, struct table_device, dm_dev);
830
831 mutex_lock(&md->table_devices_lock);
7b586583 832 if (refcount_dec_and_test(&td->count))
86f1152b 833 close_table_device(td, md);
86f1152b
BM
834 mutex_unlock(&md->table_devices_lock);
835}
86f1152b 836
3ac51e74
DW
837/*
838 * Get the geometry associated with a dm device
839 */
840int dm_get_geometry(struct mapped_device *md, struct hd_geometry *geo)
841{
842 *geo = md->geometry;
843
844 return 0;
845}
846
847/*
848 * Set the geometry of a device.
849 */
850int dm_set_geometry(struct mapped_device *md, struct hd_geometry *geo)
851{
852 sector_t sz = (sector_t)geo->cylinders * geo->heads * geo->sectors;
853
854 if (geo->start > sz) {
43e6c111 855 DMERR("Start sector is beyond the geometry limits.");
3ac51e74
DW
856 return -EINVAL;
857 }
858
859 md->geometry = *geo;
860
861 return 0;
862}
863
2e93ccc1
KU
864static int __noflush_suspending(struct mapped_device *md)
865{
866 return test_bit(DMF_NOFLUSH_SUSPENDING, &md->flags);
867}
868
8b211aac 869static void dm_requeue_add_io(struct dm_io *io, bool first_stage)
1da177e4 870{
b35f8caa 871 struct mapped_device *md = io->md;
1da177e4 872
8b211aac
ML
873 if (first_stage) {
874 struct dm_io *next = md->requeue_list;
875
876 md->requeue_list = io;
877 io->next = next;
878 } else {
879 bio_list_add_head(&md->deferred, io->orig_bio);
880 }
881}
882
883static void dm_kick_requeue(struct mapped_device *md, bool first_stage)
884{
885 if (first_stage)
886 queue_work(md->wq, &md->requeue_work);
887 else
888 queue_work(md->wq, &md->work);
889}
890
444fe04f
ML
891/*
892 * Return true if the dm_io's original bio is requeued.
893 * io->status is updated with error if requeue disallowed.
894 */
8b211aac 895static bool dm_handle_requeue(struct dm_io *io, bool first_stage)
1da177e4 896{
8b211aac 897 struct bio *bio = io->orig_bio;
444fe04f
ML
898 bool handle_requeue = (io->status == BLK_STS_DM_REQUEUE);
899 bool handle_polled_eagain = ((io->status == BLK_STS_AGAIN) &&
900 (bio->bi_opf & REQ_POLLED));
901 struct mapped_device *md = io->md;
902 bool requeued = false;
1da177e4 903
444fe04f 904 if (handle_requeue || handle_polled_eagain) {
e2736347 905 unsigned long flags;
444fe04f
ML
906
907 if (bio->bi_opf & REQ_POLLED) {
908 /*
909 * Upper layer won't help us poll split bio
910 * (io->orig_bio may only reflect a subset of the
911 * pre-split original) so clear REQ_POLLED.
912 */
913 bio_clear_polled(bio);
914 }
915
e2736347 916 /*
444fe04f
ML
917 * Target requested pushing back the I/O or
918 * polled IO hit BLK_STS_AGAIN.
e2736347
MS
919 */
920 spin_lock_irqsave(&md->deferred_lock, flags);
444fe04f
ML
921 if ((__noflush_suspending(md) &&
922 !WARN_ON_ONCE(dm_is_zone_write(md, bio))) ||
8b211aac
ML
923 handle_polled_eagain || first_stage) {
924 dm_requeue_add_io(io, first_stage);
444fe04f 925 requeued = true;
e2736347 926 } else {
2e93ccc1 927 /*
e2736347
MS
928 * noflush suspend was interrupted or this is
929 * a write to a zoned target.
2e93ccc1 930 */
e2736347 931 io->status = BLK_STS_IOERR;
2e93ccc1 932 }
e2736347
MS
933 spin_unlock_irqrestore(&md->deferred_lock, flags);
934 }
2e93ccc1 935
444fe04f 936 if (requeued)
8b211aac 937 dm_kick_requeue(md, first_stage);
444fe04f
ML
938
939 return requeued;
940}
941
8b211aac 942static void __dm_io_complete(struct dm_io *io, bool first_stage)
444fe04f 943{
8b211aac 944 struct bio *bio = io->orig_bio;
444fe04f
ML
945 struct mapped_device *md = io->md;
946 blk_status_t io_error;
947 bool requeued;
948
8b211aac
ML
949 requeued = dm_handle_requeue(io, first_stage);
950 if (requeued && first_stage)
951 return;
444fe04f 952
e2736347 953 io_error = io->status;
82f6cdcc 954 if (dm_io_flagged(io, DM_IO_ACCOUNTED))
b992b40d 955 dm_end_io_acct(io);
e2736347
MS
956 else if (!io_error) {
957 /*
958 * Must handle target that DM_MAPIO_SUBMITTED only to
959 * then bio_endio() rather than dm_submit_bio_remap()
960 */
b992b40d
ML
961 __dm_start_io_acct(io);
962 dm_end_io_acct(io);
e2736347
MS
963 }
964 free_io(io);
965 smp_wmb();
966 this_cpu_dec(*md->pending_io);
6a8736d1 967
e2736347
MS
968 /* nudge anyone waiting on suspend queue */
969 if (unlikely(wq_has_sleeper(&md->wait)))
970 wake_up(&md->wait);
2e93ccc1 971
444fe04f
ML
972 /* Return early if the original bio was requeued */
973 if (requeued)
974 return;
e2736347
MS
975
976 if (bio_is_flush_with_data(bio)) {
977 /*
978 * Preflush done for flush with data, reissue
979 * without REQ_PREFLUSH.
980 */
981 bio->bi_opf &= ~REQ_PREFLUSH;
982 queue_io(md, bio);
983 } else {
984 /* done with normal IO or empty flush */
985 if (io_error)
986 bio->bi_status = io_error;
987 bio_endio(bio);
988 }
989}
990
8b211aac
ML
991static void dm_wq_requeue_work(struct work_struct *work)
992{
993 struct mapped_device *md = container_of(work, struct mapped_device,
994 requeue_work);
995 unsigned long flags;
996 struct dm_io *io;
997
998 /* reuse deferred lock to simplify dm_handle_requeue */
999 spin_lock_irqsave(&md->deferred_lock, flags);
1000 io = md->requeue_list;
1001 md->requeue_list = NULL;
1002 spin_unlock_irqrestore(&md->deferred_lock, flags);
1003
1004 while (io) {
1005 struct dm_io *next = io->next;
1006
46754bd0 1007 dm_io_rewind(io, &md->disk->bio_split);
8b211aac
ML
1008
1009 io->next = NULL;
1010 __dm_io_complete(io, false);
1011 io = next;
f77692d6 1012 cond_resched();
8b211aac
ML
1013 }
1014}
1015
1016/*
1017 * Two staged requeue:
1018 *
1019 * 1) io->orig_bio points to the real original bio, and the part mapped to
1020 * this io must be requeued, instead of other parts of the original bio.
1021 *
1022 * 2) io->orig_bio points to new cloned bio which matches the requeued dm_io.
1023 */
1024static void dm_io_complete(struct dm_io *io)
1025{
1026 bool first_requeue;
1027
1028 /*
1029 * Only dm_io that has been split needs two stage requeue, otherwise
1030 * we may run into long bio clone chain during suspend and OOM could
1031 * be triggered.
1032 *
1033 * Also flush data dm_io won't be marked as DM_IO_WAS_SPLIT, so they
1034 * also aren't handled via the first stage requeue.
1035 */
1036 if (dm_io_flagged(io, DM_IO_WAS_SPLIT))
1037 first_requeue = true;
1038 else
1039 first_requeue = false;
1040
1041 __dm_io_complete(io, first_requeue);
1042}
1043
1da177e4
LT
1044/*
1045 * Decrements the number of outstanding ios that a bio has been
1046 * cloned into, completing the original io if necc.
1047 */
84b98f4c
MS
1048static inline void __dm_io_dec_pending(struct dm_io *io)
1049{
1050 if (atomic_dec_and_test(&io->io_count))
1051 dm_io_complete(io);
1052}
1053
1054static void dm_io_set_error(struct dm_io *io, blk_status_t error)
1da177e4 1055{
84b98f4c
MS
1056 unsigned long flags;
1057
2e93ccc1 1058 /* Push-back supersedes any I/O errors */
84b98f4c
MS
1059 spin_lock_irqsave(&io->lock, flags);
1060 if (!(io->status == BLK_STS_DM_REQUEUE &&
1061 __noflush_suspending(io->md))) {
1062 io->status = error;
1da177e4 1063 }
84b98f4c
MS
1064 spin_unlock_irqrestore(&io->lock, flags);
1065}
1da177e4 1066
2e803cd9 1067static void dm_io_dec_pending(struct dm_io *io, blk_status_t error)
84b98f4c
MS
1068{
1069 if (unlikely(error))
1070 dm_io_set_error(io, error);
1071
1072 __dm_io_dec_pending(io);
1da177e4
LT
1073}
1074
f7995089
MS
1075/*
1076 * The queue_limits are only valid as long as you have a reference
1077 * count on 'md'. But _not_ imposing verification to avoid atomic_read(),
1078 */
1079static inline struct queue_limits *dm_get_queue_limits(struct mapped_device *md)
1080{
1081 return &md->queue->limits;
1082}
1083
bcb44433
MS
1084void disable_discard(struct mapped_device *md)
1085{
1086 struct queue_limits *limits = dm_get_queue_limits(md);
1087
1088 /* device doesn't really support DISCARD, disable it */
1089 limits->max_discard_sectors = 0;
bcb44433
MS
1090}
1091
ac62d620
CH
1092void disable_write_zeroes(struct mapped_device *md)
1093{
1094 struct queue_limits *limits = dm_get_queue_limits(md);
1095
1096 /* device doesn't really support WRITE ZEROES, disable it */
1097 limits->max_write_zeroes_sectors = 0;
1098}
1099
a666e5c0
MP
1100static bool swap_bios_limit(struct dm_target *ti, struct bio *bio)
1101{
1102 return unlikely((bio->bi_opf & REQ_SWAP) != 0) && unlikely(ti->limit_swap_bios);
1103}
1104
4246a0b6 1105static void clone_endio(struct bio *bio)
1da177e4 1106{
4e4cbee9 1107 blk_status_t error = bio->bi_status;
6c23f0bd 1108 struct dm_target_io *tio = clone_to_tio(bio);
6cbce280
MS
1109 struct dm_target *ti = tio->ti;
1110 dm_endio_fn endio = ti->type->end_io;
b35f8caa 1111 struct dm_io *io = tio->io;
6cbce280 1112 struct mapped_device *md = io->md;
1da177e4 1113
dddf3056
MS
1114 if (unlikely(error == BLK_STS_TARGET)) {
1115 if (bio_op(bio) == REQ_OP_DISCARD &&
1116 !bdev_max_discard_sectors(bio->bi_bdev))
1117 disable_discard(md);
1118 else if (bio_op(bio) == REQ_OP_WRITE_ZEROES &&
1119 !bdev_write_zeroes_sectors(bio->bi_bdev))
1120 disable_write_zeroes(md);
ca522482 1121 }
415c79e1 1122
dddf3056 1123 if (static_branch_unlikely(&zoned_enabled) &&
edd1dbc8 1124 unlikely(bdev_is_zoned(bio->bi_bdev)))
dddf3056
MS
1125 dm_zone_endio(io, bio);
1126
1be56909 1127 if (endio) {
6cbce280 1128 int r = endio(ti, bio, &error);
b30f1607 1129
1be56909
CH
1130 switch (r) {
1131 case DM_ENDIO_REQUEUE:
442761fd
MS
1132 if (static_branch_unlikely(&zoned_enabled)) {
1133 /*
1134 * Requeuing writes to a sequential zone of a zoned
1135 * target will break the sequential write pattern:
1136 * fail such IO.
1137 */
1138 if (WARN_ON_ONCE(dm_is_zone_write(md, bio)))
1139 error = BLK_STS_IOERR;
1140 else
1141 error = BLK_STS_DM_REQUEUE;
1142 } else
bf14e2b2 1143 error = BLK_STS_DM_REQUEUE;
df561f66 1144 fallthrough;
1be56909
CH
1145 case DM_ENDIO_DONE:
1146 break;
1147 case DM_ENDIO_INCOMPLETE:
1148 /* The target will handle the io */
1149 return;
1150 default:
43e6c111 1151 DMCRIT("unimplemented target endio return value: %d", r);
1be56909
CH
1152 BUG();
1153 }
1154 }
1155
442761fd
MS
1156 if (static_branch_unlikely(&swap_bios_enabled) &&
1157 unlikely(swap_bios_limit(ti, bio)))
a666e5c0 1158 up(&md->swap_bios_semaphore);
a666e5c0 1159
1d1068ce 1160 free_tio(bio);
e2118b3c 1161 dm_io_dec_pending(io, error);
1da177e4
LT
1162}
1163
56a67df7
MS
1164/*
1165 * Return maximum size of I/O possible at the supplied sector up to the current
1166 * target boundary.
1167 */
3720281d
MS
1168static inline sector_t max_io_len_target_boundary(struct dm_target *ti,
1169 sector_t target_offset)
56a67df7 1170{
56a67df7
MS
1171 return ti->len - target_offset;
1172}
1173
06961c48
MS
1174static sector_t __max_io_len(struct dm_target *ti, sector_t sector,
1175 unsigned int max_granularity)
1da177e4 1176{
3720281d
MS
1177 sector_t target_offset = dm_target_offset(ti, sector);
1178 sector_t len = max_io_len_target_boundary(ti, target_offset);
1da177e4
LT
1179
1180 /*
3ee16db3
MS
1181 * Does the target need to split IO even further?
1182 * - varied (per target) IO splitting is a tenet of DM; this
1183 * explains why stacked chunk_sectors based splitting via
5a97806f 1184 * bio_split_to_limits() isn't possible here.
1da177e4 1185 */
06961c48 1186 if (!max_granularity)
c3949322
CH
1187 return len;
1188 return min_t(sector_t, len,
1189 min(queue_max_sectors(ti->table->md->queue),
06961c48
MS
1190 blk_chunk_sectors_left(target_offset, max_granularity)));
1191}
1192
1193static inline sector_t max_io_len(struct dm_target *ti, sector_t sector)
1194{
1195 return __max_io_len(ti, sector, ti->max_io_len);
1da177e4
LT
1196}
1197
542f9038
MS
1198int dm_set_target_max_io_len(struct dm_target *ti, sector_t len)
1199{
1200 if (len > UINT_MAX) {
1201 DMERR("Specified maximum size of target IO (%llu) exceeds limit (%u)",
1202 (unsigned long long)len, UINT_MAX);
1203 ti->error = "Maximum size of target IO is too large";
1204 return -EINVAL;
1205 }
1206
75ae1936 1207 ti->max_io_len = (uint32_t) len;
542f9038
MS
1208
1209 return 0;
1210}
1211EXPORT_SYMBOL_GPL(dm_set_target_max_io_len);
1212
f26c5719 1213static struct dm_target *dm_dax_get_live_target(struct mapped_device *md,
3d97c829
MS
1214 sector_t sector, int *srcu_idx)
1215 __acquires(md->io_barrier)
545ed20e 1216{
545ed20e
TK
1217 struct dm_table *map;
1218 struct dm_target *ti;
545ed20e 1219
f26c5719 1220 map = dm_get_live_table(md, srcu_idx);
545ed20e 1221 if (!map)
f26c5719 1222 return NULL;
545ed20e
TK
1223
1224 ti = dm_table_find_target(map, sector);
123d87d5 1225 if (!ti)
f26c5719 1226 return NULL;
545ed20e 1227
f26c5719
DW
1228 return ti;
1229}
545ed20e 1230
f26c5719 1231static long dm_dax_direct_access(struct dax_device *dax_dev, pgoff_t pgoff,
e511c4a3
JC
1232 long nr_pages, enum dax_access_mode mode, void **kaddr,
1233 pfn_t *pfn)
f26c5719
DW
1234{
1235 struct mapped_device *md = dax_get_private(dax_dev);
1236 sector_t sector = pgoff * PAGE_SECTORS;
1237 struct dm_target *ti;
1238 long len, ret = -EIO;
1239 int srcu_idx;
545ed20e 1240
f26c5719 1241 ti = dm_dax_get_live_target(md, sector, &srcu_idx);
545ed20e 1242
f26c5719
DW
1243 if (!ti)
1244 goto out;
1245 if (!ti->type->direct_access)
1246 goto out;
3720281d 1247 len = max_io_len(ti, sector) / PAGE_SECTORS;
f26c5719
DW
1248 if (len < 1)
1249 goto out;
1250 nr_pages = min(len, nr_pages);
e511c4a3 1251 ret = ti->type->direct_access(ti, pgoff, nr_pages, mode, kaddr, pfn);
817bf402 1252
f26c5719 1253 out:
545ed20e 1254 dm_put_live_table(md, srcu_idx);
f26c5719
DW
1255
1256 return ret;
545ed20e
TK
1257}
1258
cdf6cdcd
VG
1259static int dm_dax_zero_page_range(struct dax_device *dax_dev, pgoff_t pgoff,
1260 size_t nr_pages)
1261{
1262 struct mapped_device *md = dax_get_private(dax_dev);
1263 sector_t sector = pgoff * PAGE_SECTORS;
1264 struct dm_target *ti;
1265 int ret = -EIO;
1266 int srcu_idx;
1267
1268 ti = dm_dax_get_live_target(md, sector, &srcu_idx);
1269
1270 if (!ti)
1271 goto out;
1272 if (WARN_ON(!ti->type->dax_zero_page_range)) {
1273 /*
1274 * ->zero_page_range() is mandatory dax operation. If we are
1275 * here, something is wrong.
1276 */
cdf6cdcd
VG
1277 goto out;
1278 }
1279 ret = ti->type->dax_zero_page_range(ti, pgoff, nr_pages);
cdf6cdcd
VG
1280 out:
1281 dm_put_live_table(md, srcu_idx);
1282
1283 return ret;
1284}
1285
047218ec
JC
1286static size_t dm_dax_recovery_write(struct dax_device *dax_dev, pgoff_t pgoff,
1287 void *addr, size_t bytes, struct iov_iter *i)
1288{
1289 struct mapped_device *md = dax_get_private(dax_dev);
1290 sector_t sector = pgoff * PAGE_SECTORS;
1291 struct dm_target *ti;
1292 int srcu_idx;
1293 long ret = 0;
1294
1295 ti = dm_dax_get_live_target(md, sector, &srcu_idx);
1296 if (!ti || !ti->type->dax_recovery_write)
1297 goto out;
1298
1299 ret = ti->type->dax_recovery_write(ti, pgoff, addr, bytes, i);
1300out:
1301 dm_put_live_table(md, srcu_idx);
1302 return ret;
1303}
1304
1dd40c3e
MP
1305/*
1306 * A target may call dm_accept_partial_bio only from the map routine. It is
6842d264 1307 * allowed for all bio types except REQ_PREFLUSH, REQ_OP_ZONE_* zone management
e6fc9f62
MS
1308 * operations, REQ_OP_ZONE_APPEND (zone append writes) and any bio serviced by
1309 * __send_duplicate_bios().
1dd40c3e
MP
1310 *
1311 * dm_accept_partial_bio informs the dm that the target only wants to process
1312 * additional n_sectors sectors of the bio and the rest of the data should be
1313 * sent in a next bio.
1314 *
1315 * A diagram that explains the arithmetics:
1316 * +--------------------+---------------+-------+
1317 * | 1 | 2 | 3 |
1318 * +--------------------+---------------+-------+
1319 *
1320 * <-------------- *tio->len_ptr --------------->
bdb34759 1321 * <----- bio_sectors ----->
1dd40c3e
MP
1322 * <-- n_sectors -->
1323 *
1324 * Region 1 was already iterated over with bio_advance or similar function.
1325 * (it may be empty if the target doesn't use bio_advance)
1326 * Region 2 is the remaining bio size that the target wants to process.
1327 * (it may be empty if region 1 is non-empty, although there is no reason
1328 * to make it empty)
1329 * The target requires that region 3 is to be sent in the next bio.
1330 *
1331 * If the target wants to receive multiple copies of the bio (via num_*bios, etc),
1332 * the partially processed part (the sum of regions 1+2) must be the same for all
1333 * copies of the bio.
1334 */
86a3238c 1335void dm_accept_partial_bio(struct bio *bio, unsigned int n_sectors)
1dd40c3e 1336{
6c23f0bd 1337 struct dm_target_io *tio = clone_to_tio(bio);
8b211aac 1338 struct dm_io *io = tio->io;
86a3238c 1339 unsigned int bio_sectors = bio_sectors(bio);
6842d264 1340
655f3aad 1341 BUG_ON(dm_tio_flagged(tio, DM_TIO_IS_DUPLICATE_BIO));
6842d264
DLM
1342 BUG_ON(op_is_zone_mgmt(bio_op(bio)));
1343 BUG_ON(bio_op(bio) == REQ_OP_ZONE_APPEND);
bdb34759
MS
1344 BUG_ON(bio_sectors > *tio->len_ptr);
1345 BUG_ON(n_sectors > bio_sectors);
6842d264 1346
bdb34759 1347 *tio->len_ptr -= bio_sectors - n_sectors;
1dd40c3e 1348 bio->bi_iter.bi_size = n_sectors << SECTOR_SHIFT;
7dd76d1f
ML
1349
1350 /*
1351 * __split_and_process_bio() may have already saved mapped part
1352 * for accounting but it is being reduced so update accordingly.
1353 */
8b211aac
ML
1354 dm_io_set_flag(io, DM_IO_WAS_SPLIT);
1355 io->sectors = n_sectors;
1356 io->sector_offset = bio_sectors(io->orig_bio);
1dd40c3e
MP
1357}
1358EXPORT_SYMBOL_GPL(dm_accept_partial_bio);
1359
0fbb4d93
MS
1360/*
1361 * @clone: clone bio that DM core passed to target's .map function
1362 * @tgt_clone: clone of @clone bio that target needs submitted
0fbb4d93
MS
1363 *
1364 * Targets should use this interface to submit bios they take
1365 * ownership of when returning DM_MAPIO_SUBMITTED.
1366 *
1367 * Target should also enable ti->accounts_remapped_io
1368 */
b7f8dff0 1369void dm_submit_bio_remap(struct bio *clone, struct bio *tgt_clone)
0fbb4d93
MS
1370{
1371 struct dm_target_io *tio = clone_to_tio(clone);
1372 struct dm_io *io = tio->io;
1373
1374 /* establish bio that will get submitted */
1375 if (!tgt_clone)
1376 tgt_clone = clone;
1377
1378 /*
1379 * Account io->origin_bio to DM dev on behalf of target
1380 * that took ownership of IO with DM_MAPIO_SUBMITTED.
1381 */
9d20653f 1382 dm_start_io_acct(io, clone);
0fbb4d93 1383
9d20653f 1384 trace_block_bio_remap(tgt_clone, disk_devt(io->md->disk),
0fbb4d93 1385 tio->old_sector);
9d20653f 1386 submit_bio_noacct(tgt_clone);
0fbb4d93
MS
1387}
1388EXPORT_SYMBOL_GPL(dm_submit_bio_remap);
1389
a666e5c0
MP
1390static noinline void __set_swap_bios_limit(struct mapped_device *md, int latch)
1391{
1392 mutex_lock(&md->swap_bios_lock);
1393 while (latch < md->swap_bios) {
1394 cond_resched();
1395 down(&md->swap_bios_semaphore);
1396 md->swap_bios--;
1397 }
1398 while (latch > md->swap_bios) {
1399 cond_resched();
1400 up(&md->swap_bios_semaphore);
1401 md->swap_bios++;
1402 }
1403 mutex_unlock(&md->swap_bios_lock);
1404}
1405
1561b396 1406static void __map_bio(struct bio *clone)
1da177e4 1407{
1561b396 1408 struct dm_target_io *tio = clone_to_tio(clone);
bd2a49b8 1409 struct dm_target *ti = tio->ti;
6cbce280
MS
1410 struct dm_io *io = tio->io;
1411 struct mapped_device *md = io->md;
1412 int r;
1da177e4 1413
1da177e4 1414 clone->bi_end_io = clone_endio;
1da177e4
LT
1415
1416 /*
0fbb4d93 1417 * Map the clone.
1da177e4 1418 */
743598f0 1419 tio->old_sector = clone->bi_iter.bi_sector;
d67a5f4b 1420
442761fd
MS
1421 if (static_branch_unlikely(&swap_bios_enabled) &&
1422 unlikely(swap_bios_limit(ti, clone))) {
a666e5c0 1423 int latch = get_swap_bios();
b30f1607 1424
a666e5c0
MP
1425 if (unlikely(latch != md->swap_bios))
1426 __set_swap_bios_limit(md, latch);
1427 down(&md->swap_bios_semaphore);
1428 }
1429
442761fd
MS
1430 if (static_branch_unlikely(&zoned_enabled)) {
1431 /*
1432 * Check if the IO needs a special mapping due to zone append
1433 * emulation on zoned target. In this case, dm_zone_map_bio()
1434 * calls the target map operation.
1435 */
1436 if (unlikely(dm_emulate_zone_append(md)))
1437 r = dm_zone_map_bio(tio);
1438 else
1439 r = ti->type->map(ti, clone);
1440 } else
bb37d772
DLM
1441 r = ti->type->map(ti, clone);
1442
846785e6
CH
1443 switch (r) {
1444 case DM_MAPIO_SUBMITTED:
0fbb4d93
MS
1445 /* target has assumed ownership of this io */
1446 if (!ti->accounts_remapped_io)
9d20653f 1447 dm_start_io_acct(io, clone);
846785e6
CH
1448 break;
1449 case DM_MAPIO_REMAPPED:
9d20653f 1450 dm_submit_bio_remap(clone, NULL);
846785e6
CH
1451 break;
1452 case DM_MAPIO_KILL:
846785e6 1453 case DM_MAPIO_REQUEUE:
442761fd
MS
1454 if (static_branch_unlikely(&swap_bios_enabled) &&
1455 unlikely(swap_bios_limit(ti, clone)))
6cbce280 1456 up(&md->swap_bios_semaphore);
1d1068ce 1457 free_tio(clone);
90a2326e
MS
1458 if (r == DM_MAPIO_KILL)
1459 dm_io_dec_pending(io, BLK_STS_IOERR);
1460 else
1461 dm_io_dec_pending(io, BLK_STS_DM_REQUEUE);
846785e6
CH
1462 break;
1463 default:
43e6c111 1464 DMCRIT("unimplemented target map return value: %d", r);
45cbcd79 1465 BUG();
1da177e4
LT
1466 }
1467}
1da177e4 1468
86a3238c 1469static void setup_split_accounting(struct clone_info *ci, unsigned int len)
7dd76d1f
ML
1470{
1471 struct dm_io *io = ci->io;
1472
1473 if (ci->sector_count > len) {
1474 /*
1475 * Split needed, save the mapped part for accounting.
1476 * NOTE: dm_accept_partial_bio() will update accordingly.
1477 */
1478 dm_io_set_flag(io, DM_IO_WAS_SPLIT);
1479 io->sectors = len;
8b211aac 1480 io->sector_offset = bio_sectors(ci->bio);
7dd76d1f
ML
1481 }
1482}
1483
318716dd 1484static void alloc_multiple_bios(struct bio_list *blist, struct clone_info *ci,
f7b58a69
MS
1485 struct dm_target *ti, unsigned int num_bios,
1486 unsigned *len)
f9ab94ce 1487{
1d1068ce 1488 struct bio *bio;
318716dd 1489 int try;
dba14160 1490
318716dd
MS
1491 for (try = 0; try < 2; try++) {
1492 int bio_nr;
318716dd
MS
1493
1494 if (try)
bc02cdbe 1495 mutex_lock(&ci->io->md->table_devices_lock);
318716dd 1496 for (bio_nr = 0; bio_nr < num_bios; bio_nr++) {
f7b58a69 1497 bio = alloc_tio(ci, ti, bio_nr, len,
dc8e2021 1498 try ? GFP_NOIO : GFP_NOWAIT);
1d1068ce 1499 if (!bio)
318716dd
MS
1500 break;
1501
1d1068ce 1502 bio_list_add(blist, bio);
318716dd
MS
1503 }
1504 if (try)
bc02cdbe 1505 mutex_unlock(&ci->io->md->table_devices_lock);
318716dd
MS
1506 if (bio_nr == num_bios)
1507 return;
1508
6c23f0bd 1509 while ((bio = bio_list_pop(blist)))
1d1068ce 1510 free_tio(bio);
318716dd 1511 }
9015df24
AK
1512}
1513
0f14d60a 1514static int __send_duplicate_bios(struct clone_info *ci, struct dm_target *ti,
86a3238c 1515 unsigned int num_bios, unsigned int *len)
06a426ce 1516{
318716dd 1517 struct bio_list blist = BIO_EMPTY_LIST;
8eabf5d0 1518 struct bio *clone;
564b5c54 1519 unsigned int ret = 0;
06a426ce 1520
891fced6
CH
1521 switch (num_bios) {
1522 case 0:
1523 break;
1524 case 1:
7dd76d1f
ML
1525 if (len)
1526 setup_split_accounting(ci, *len);
891fced6 1527 clone = alloc_tio(ci, ti, 0, len, GFP_NOIO);
1561b396 1528 __map_bio(clone);
0f14d60a 1529 ret = 1;
891fced6
CH
1530 break;
1531 default:
666eed46
MS
1532 if (len)
1533 setup_split_accounting(ci, *len);
7dd06a25 1534 /* dm_accept_partial_bio() is not supported with shared tio->len_ptr */
f7b58a69 1535 alloc_multiple_bios(&blist, ci, ti, num_bios, len);
891fced6 1536 while ((clone = bio_list_pop(&blist))) {
655f3aad 1537 dm_tio_set_flag(clone_to_tio(clone), DM_TIO_IS_DUPLICATE_BIO);
891fced6 1538 __map_bio(clone);
0f14d60a 1539 ret += 1;
891fced6
CH
1540 }
1541 break;
318716dd 1542 }
0f14d60a
ML
1543
1544 return ret;
06a426ce
MS
1545}
1546
332f2b1e 1547static void __send_empty_flush(struct clone_info *ci)
f9ab94ce 1548{
564b5c54 1549 struct dm_table *t = ci->map;
828678b8
MS
1550 struct bio flush_bio;
1551
1552 /*
1553 * Use an on-stack bio for this, it's safe since we don't
1554 * need to reference it after submit. It's just used as
1555 * the basis for the clone(s).
1556 */
49add496
CH
1557 bio_init(&flush_bio, ci->io->md->disk->part0, NULL, 0,
1558 REQ_OP_WRITE | REQ_PREFLUSH | REQ_SYNC);
47d95102 1559
828678b8
MS
1560 ci->bio = &flush_bio;
1561 ci->sector_count = 0;
92b914e2 1562 ci->io->tio.clone.bi_iter.bi_size = 0;
f9ab94ce 1563
564b5c54
MS
1564 for (unsigned int i = 0; i < t->num_targets; i++) {
1565 unsigned int bios;
1566 struct dm_target *ti = dm_table_get_target(t, i);
0f14d60a
ML
1567
1568 atomic_add(ti->num_flush_bios, &ci->io->io_count);
1569 bios = __send_duplicate_bios(ci, ti, ti->num_flush_bios, NULL);
1570 atomic_sub(ti->num_flush_bios - bios, &ci->io->io_count);
1571 }
1572
1573 /*
1574 * alloc_io() takes one extra reference for submission, so the
1575 * reference won't reach 0 without the following subtraction
1576 */
1577 atomic_sub(1, &ci->io->io_count);
828678b8
MS
1578
1579 bio_uninit(ci->bio);
f9ab94ce
MP
1580}
1581
e6fc9f62 1582static void __send_changing_extent_only(struct clone_info *ci, struct dm_target *ti,
06961c48
MS
1583 unsigned int num_bios,
1584 unsigned int max_granularity)
ba1cbad9 1585{
86a3238c 1586 unsigned int len, bios;
ba1cbad9 1587
3720281d 1588 len = min_t(sector_t, ci->sector_count,
06961c48 1589 __max_io_len(ti, ci->sector, max_granularity));
51b86f9a 1590
0f14d60a
ML
1591 atomic_add(num_bios, &ci->io->io_count);
1592 bios = __send_duplicate_bios(ci, ti, num_bios, &len);
1593 /*
1594 * alloc_io() takes one extra reference for submission, so the
1595 * reference won't reach 0 without the following (+1) subtraction
1596 */
1597 atomic_sub(num_bios - bios + 1, &ci->io->io_count);
7dd06a25 1598
3d7f4562
MS
1599 ci->sector += len;
1600 ci->sector_count -= len;
ba1cbad9
MS
1601}
1602
568c73a3
MS
1603static bool is_abnormal_io(struct bio *bio)
1604{
a3282b43 1605 enum req_op op = bio_op(bio);
568c73a3 1606
4edadf6d
MS
1607 if (op != REQ_OP_READ && op != REQ_OP_WRITE && op != REQ_OP_FLUSH) {
1608 switch (op) {
1609 case REQ_OP_DISCARD:
1610 case REQ_OP_SECURE_ERASE:
1611 case REQ_OP_WRITE_ZEROES:
1612 return true;
1613 default:
1614 break;
1615 }
568c73a3
MS
1616 }
1617
4edadf6d 1618 return false;
568c73a3
MS
1619}
1620
4edadf6d
MS
1621static blk_status_t __process_abnormal_io(struct clone_info *ci,
1622 struct dm_target *ti)
0519c71e 1623{
86a3238c 1624 unsigned int num_bios = 0;
06961c48 1625 unsigned int max_granularity = 0;
13f6facf 1626 struct queue_limits *limits = dm_get_queue_limits(ti->table->md);
0519c71e 1627
e6fc9f62 1628 switch (bio_op(ci->bio)) {
9679b5a7
MS
1629 case REQ_OP_DISCARD:
1630 num_bios = ti->num_discard_bios;
13f6facf 1631 if (ti->max_discard_granularity)
06961c48 1632 max_granularity = limits->max_discard_sectors;
9679b5a7
MS
1633 break;
1634 case REQ_OP_SECURE_ERASE:
1635 num_bios = ti->num_secure_erase_bios;
13f6facf
MS
1636 if (ti->max_secure_erase_granularity)
1637 max_granularity = limits->max_secure_erase_sectors;
9679b5a7 1638 break;
9679b5a7
MS
1639 case REQ_OP_WRITE_ZEROES:
1640 num_bios = ti->num_write_zeroes_bios;
13f6facf
MS
1641 if (ti->max_write_zeroes_granularity)
1642 max_granularity = limits->max_write_zeroes_sectors;
9679b5a7 1643 break;
2d9b02be
BVA
1644 default:
1645 break;
9679b5a7 1646 }
0519c71e 1647
e6fc9f62
MS
1648 /*
1649 * Even though the device advertised support for this type of
1650 * request, that does not mean every target supports it, and
1651 * reconfiguration might also have changed that since the
1652 * check was performed.
1653 */
84b98f4c 1654 if (unlikely(!num_bios))
4edadf6d
MS
1655 return BLK_STS_NOTSUPP;
1656
06961c48 1657 __send_changing_extent_only(ci, ti, num_bios, max_granularity);
4edadf6d 1658 return BLK_STS_OK;
0519c71e
MS
1659}
1660
b99fdcdc 1661/*
ec211631 1662 * Reuse ->bi_private as dm_io list head for storing all dm_io instances
b99fdcdc
ML
1663 * associated with this bio, and this bio's bi_private needs to be
1664 * stored in dm_io->data before the reuse.
1665 *
1666 * bio->bi_private is owned by fs or upper layer, so block layer won't
1667 * touch it after splitting. Meantime it won't be changed by anyone after
1668 * bio is submitted. So this reuse is safe.
1669 */
ec211631 1670static inline struct dm_io **dm_poll_list_head(struct bio *bio)
b99fdcdc 1671{
ec211631 1672 return (struct dm_io **)&bio->bi_private;
b99fdcdc
ML
1673}
1674
1675static void dm_queue_poll_io(struct bio *bio, struct dm_io *io)
1676{
ec211631 1677 struct dm_io **head = dm_poll_list_head(bio);
b99fdcdc
ML
1678
1679 if (!(bio->bi_opf & REQ_DM_POLL_LIST)) {
1680 bio->bi_opf |= REQ_DM_POLL_LIST;
1681 /*
1682 * Save .bi_private into dm_io, so that we can reuse
ec211631 1683 * .bi_private as dm_io list head for storing dm_io list
b99fdcdc
ML
1684 */
1685 io->data = bio->bi_private;
1686
b99fdcdc
ML
1687 /* tell block layer to poll for completion */
1688 bio->bi_cookie = ~BLK_QC_T_NONE;
ec211631
ML
1689
1690 io->next = NULL;
b99fdcdc
ML
1691 } else {
1692 /*
1693 * bio recursed due to split, reuse original poll list,
1694 * and save bio->bi_private too.
1695 */
ec211631
ML
1696 io->data = (*head)->data;
1697 io->next = *head;
b99fdcdc
ML
1698 }
1699
ec211631 1700 *head = io;
b99fdcdc
ML
1701}
1702
e4c93811
AK
1703/*
1704 * Select the correct strategy for processing a non-flush bio.
1705 */
84b98f4c 1706static blk_status_t __split_and_process_bio(struct clone_info *ci)
0ce65797 1707{
66bdaa43 1708 struct bio *clone;
512875bd 1709 struct dm_target *ti;
86a3238c 1710 unsigned int len;
0ce65797 1711
512875bd 1712 ti = dm_table_find_target(ci->map, ci->sector);
4edadf6d
MS
1713 if (unlikely(!ti))
1714 return BLK_STS_IOERR;
1ee88de3
MP
1715
1716 if (unlikely((ci->bio->bi_opf & REQ_NOWAIT) != 0) &&
1717 unlikely(!dm_target_supports_nowait(ti->type)))
1718 return BLK_STS_NOTSUPP;
1719
1720 if (unlikely(ci->is_abnormal_io))
4edadf6d 1721 return __process_abnormal_io(ci, ti);
3d7f4562 1722
b99fdcdc
ML
1723 /*
1724 * Only support bio polling for normal IO, and the target io is
1725 * exactly inside the dm_io instance (verified in dm_poll_dm_io)
1726 */
a3282b43 1727 ci->submit_as_polled = !!(ci->bio->bi_opf & REQ_POLLED);
0ce65797 1728
3720281d 1729 len = min_t(sector_t, max_io_len(ti, ci->sector), ci->sector_count);
7dd76d1f 1730 setup_split_accounting(ci, len);
66bdaa43 1731 clone = alloc_tio(ci, ti, 0, &len, GFP_NOIO);
66bdaa43 1732 __map_bio(clone);
0ce65797 1733
1c3b13e6
KO
1734 ci->sector += len;
1735 ci->sector_count -= len;
0ce65797 1736
84b98f4c 1737 return BLK_STS_OK;
0ce65797
MS
1738}
1739
978e51ba 1740static void init_clone_info(struct clone_info *ci, struct mapped_device *md,
4edadf6d 1741 struct dm_table *map, struct bio *bio, bool is_abnormal)
978e51ba
MS
1742{
1743 ci->map = map;
1744 ci->io = alloc_io(md, bio);
d41e077a 1745 ci->bio = bio;
4edadf6d 1746 ci->is_abnormal_io = is_abnormal;
b99fdcdc 1747 ci->submit_as_polled = false;
978e51ba 1748 ci->sector = bio->bi_iter.bi_sector;
d41e077a
MS
1749 ci->sector_count = bio_sectors(bio);
1750
1751 /* Shouldn't happen but sector_count was being set to 0 so... */
442761fd
MS
1752 if (static_branch_unlikely(&zoned_enabled) &&
1753 WARN_ON_ONCE(op_is_zone_mgmt(bio_op(bio)) && ci->sector_count))
d41e077a 1754 ci->sector_count = 0;
978e51ba
MS
1755}
1756
1da177e4 1757/*
14fe594d 1758 * Entry point to split a bio into clones and submit them to the targets.
1da177e4 1759 */
96c9865c
MS
1760static void dm_split_and_process_bio(struct mapped_device *md,
1761 struct dm_table *map, struct bio *bio)
0ce65797 1762{
1da177e4 1763 struct clone_info ci;
4857abf6 1764 struct dm_io *io;
84b98f4c 1765 blk_status_t error = BLK_STS_OK;
4edadf6d
MS
1766 bool is_abnormal;
1767
1768 is_abnormal = is_abnormal_io(bio);
1769 if (unlikely(is_abnormal)) {
1770 /*
5a97806f 1771 * Use bio_split_to_limits() for abnormal IO (e.g. discard, etc)
4edadf6d
MS
1772 * otherwise associated queue_limits won't be imposed.
1773 */
5a97806f 1774 bio = bio_split_to_limits(bio);
613b1488
JA
1775 if (!bio)
1776 return;
4edadf6d 1777 }
1da177e4 1778
4edadf6d 1779 init_clone_info(&ci, md, map, bio, is_abnormal);
4857abf6 1780 io = ci.io;
0ce65797 1781
1eff9d32 1782 if (bio->bi_opf & REQ_PREFLUSH) {
332f2b1e 1783 __send_empty_flush(&ci);
e2736347 1784 /* dm_io_complete submits any data associated with flush */
d41e077a 1785 goto out;
d87f4c14 1786 }
0ce65797 1787
d41e077a
MS
1788 error = __split_and_process_bio(&ci);
1789 if (error || !ci.sector_count)
1790 goto out;
d41e077a
MS
1791 /*
1792 * Remainder must be passed to submit_bio_noacct() so it gets handled
1793 * *after* bios already submitted have been completely processed.
d41e077a 1794 */
8b211aac
ML
1795 bio_trim(bio, io->sectors, ci.sector_count);
1796 trace_block_split(bio, bio->bi_iter.bi_sector);
1797 bio_inc_remaining(bio);
d41e077a
MS
1798 submit_bio_noacct(bio);
1799out:
b99fdcdc
ML
1800 /*
1801 * Drop the extra reference count for non-POLLED bio, and hold one
1802 * reference for POLLED bio, which will be released in dm_poll_bio
1803 *
ec211631
ML
1804 * Add every dm_io instance into the dm_io list head which is stored
1805 * in bio->bi_private, so that dm_poll_bio can poll them all.
b99fdcdc 1806 */
0f14d60a
ML
1807 if (error || !ci.submit_as_polled) {
1808 /*
1809 * In case of submission failure, the extra reference for
1810 * submitting io isn't consumed yet
1811 */
1812 if (error)
1813 atomic_dec(&io->io_count);
1814 dm_io_dec_pending(io, error);
1815 } else
4857abf6 1816 dm_queue_poll_io(bio, io);
0ce65797
MS
1817}
1818
3e08773c 1819static void dm_submit_bio(struct bio *bio)
cec47e3d 1820{
309dca30 1821 struct mapped_device *md = bio->bi_bdev->bd_disk->private_data;
83d5e5b0
MP
1822 int srcu_idx;
1823 struct dm_table *map;
a3282b43 1824 blk_opf_t bio_opf = bio->bi_opf;
cec47e3d 1825
5d7362d0 1826 map = dm_get_live_table_bio(md, &srcu_idx, bio_opf);
29e4013d 1827
fa247089
MS
1828 /* If suspended, or map not yet available, queue this IO for later */
1829 if (unlikely(test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags)) ||
1830 unlikely(!map)) {
6abc4946
KK
1831 if (bio->bi_opf & REQ_NOWAIT)
1832 bio_wouldblock_error(bio);
b2abdb1b 1833 else if (bio->bi_opf & REQ_RAHEAD)
54d9a1b4 1834 bio_io_error(bio);
b2abdb1b
MS
1835 else
1836 queue_io(md, bio);
1837 goto out;
cec47e3d 1838 }
1da177e4 1839
96c9865c 1840 dm_split_and_process_bio(md, map, bio);
b2abdb1b 1841out:
5d7362d0 1842 dm_put_live_table_bio(md, srcu_idx, bio_opf);
978e51ba
MS
1843}
1844
b99fdcdc
ML
1845static bool dm_poll_dm_io(struct dm_io *io, struct io_comp_batch *iob,
1846 unsigned int flags)
1847{
655f3aad 1848 WARN_ON_ONCE(!dm_tio_is_normal(&io->tio));
b99fdcdc
ML
1849
1850 /* don't poll if the mapped io is done */
1851 if (atomic_read(&io->io_count) > 1)
1852 bio_poll(&io->tio.clone, iob, flags);
1853
1854 /* bio_poll holds the last reference */
1855 return atomic_read(&io->io_count) == 1;
1856}
1857
1858static int dm_poll_bio(struct bio *bio, struct io_comp_batch *iob,
1859 unsigned int flags)
1860{
ec211631
ML
1861 struct dm_io **head = dm_poll_list_head(bio);
1862 struct dm_io *list = *head;
1863 struct dm_io *tmp = NULL;
1864 struct dm_io *curr, *next;
b99fdcdc
ML
1865
1866 /* Only poll normal bio which was marked as REQ_DM_POLL_LIST */
1867 if (!(bio->bi_opf & REQ_DM_POLL_LIST))
1868 return 0;
1869
ec211631 1870 WARN_ON_ONCE(!list);
b99fdcdc
ML
1871
1872 /*
1873 * Restore .bi_private before possibly completing dm_io.
1874 *
1875 * bio_poll() is only possible once @bio has been completely
1876 * submitted via submit_bio_noacct()'s depth-first submission.
1877 * So there is no dm_queue_poll_io() race associated with
1878 * clearing REQ_DM_POLL_LIST here.
1879 */
1880 bio->bi_opf &= ~REQ_DM_POLL_LIST;
ec211631 1881 bio->bi_private = list->data;
b99fdcdc 1882
ec211631
ML
1883 for (curr = list, next = curr->next; curr; curr = next, next =
1884 curr ? curr->next : NULL) {
1885 if (dm_poll_dm_io(curr, iob, flags)) {
b99fdcdc 1886 /*
84b98f4c
MS
1887 * clone_endio() has already occurred, so no
1888 * error handling is needed here.
b99fdcdc 1889 */
ec211631
ML
1890 __dm_io_dec_pending(curr);
1891 } else {
1892 curr->next = tmp;
1893 tmp = curr;
b99fdcdc
ML
1894 }
1895 }
1896
1897 /* Not done? */
ec211631 1898 if (tmp) {
b99fdcdc
ML
1899 bio->bi_opf |= REQ_DM_POLL_LIST;
1900 /* Reset bio->bi_private to dm_io list head */
ec211631 1901 *head = tmp;
b99fdcdc
ML
1902 return 0;
1903 }
1904 return 1;
1905}
1906
a4a82ce3
HM
1907/*
1908 *---------------------------------------------------------------
1da177e4 1909 * An IDR is used to keep track of allocated minor numbers.
a4a82ce3
HM
1910 *---------------------------------------------------------------
1911 */
2b06cfff 1912static void free_minor(int minor)
1da177e4 1913{
f32c10b0 1914 spin_lock(&_minor_lock);
1da177e4 1915 idr_remove(&_minor_idr, minor);
f32c10b0 1916 spin_unlock(&_minor_lock);
1da177e4
LT
1917}
1918
1919/*
1920 * See if the device with a specific minor # is free.
1921 */
cf13ab8e 1922static int specific_minor(int minor)
1da177e4 1923{
c9d76be6 1924 int r;
1da177e4
LT
1925
1926 if (minor >= (1 << MINORBITS))
1927 return -EINVAL;
1928
c9d76be6 1929 idr_preload(GFP_KERNEL);
f32c10b0 1930 spin_lock(&_minor_lock);
1da177e4 1931
c9d76be6 1932 r = idr_alloc(&_minor_idr, MINOR_ALLOCED, minor, minor + 1, GFP_NOWAIT);
1da177e4 1933
f32c10b0 1934 spin_unlock(&_minor_lock);
c9d76be6
TH
1935 idr_preload_end();
1936 if (r < 0)
1937 return r == -ENOSPC ? -EBUSY : r;
1938 return 0;
1da177e4
LT
1939}
1940
cf13ab8e 1941static int next_free_minor(int *minor)
1da177e4 1942{
c9d76be6 1943 int r;
62f75c2f 1944
c9d76be6 1945 idr_preload(GFP_KERNEL);
f32c10b0 1946 spin_lock(&_minor_lock);
1da177e4 1947
c9d76be6 1948 r = idr_alloc(&_minor_idr, MINOR_ALLOCED, 0, 1 << MINORBITS, GFP_NOWAIT);
1da177e4 1949
f32c10b0 1950 spin_unlock(&_minor_lock);
c9d76be6
TH
1951 idr_preload_end();
1952 if (r < 0)
1953 return r;
1954 *minor = r;
1955 return 0;
1da177e4
LT
1956}
1957
83d5cde4 1958static const struct block_device_operations dm_blk_dops;
681cc5e8 1959static const struct block_device_operations dm_rq_blk_dops;
f26c5719 1960static const struct dax_operations dm_dax_ops;
1da177e4 1961
53d5914f
MP
1962static void dm_wq_work(struct work_struct *work);
1963
aa6ce87a 1964#ifdef CONFIG_BLK_INLINE_ENCRYPTION
cb77cb5a 1965static void dm_queue_destroy_crypto_profile(struct request_queue *q)
aa6ce87a 1966{
cb77cb5a 1967 dm_destroy_crypto_profile(q->crypto_profile);
aa6ce87a
ST
1968}
1969
1970#else /* CONFIG_BLK_INLINE_ENCRYPTION */
1971
cb77cb5a 1972static inline void dm_queue_destroy_crypto_profile(struct request_queue *q)
aa6ce87a
ST
1973{
1974}
1975#endif /* !CONFIG_BLK_INLINE_ENCRYPTION */
1976
0f20972f
MS
1977static void cleanup_mapped_device(struct mapped_device *md)
1978{
0f20972f
MS
1979 if (md->wq)
1980 destroy_workqueue(md->wq);
29dec90a 1981 dm_free_md_mempools(md->mempools);
0f20972f 1982
f26c5719 1983 if (md->dax_dev) {
fb08a190 1984 dax_remove_host(md->disk);
f26c5719
DW
1985 kill_dax(md->dax_dev);
1986 put_dax(md->dax_dev);
1987 md->dax_dev = NULL;
1988 }
1989
588b7f5d 1990 dm_cleanup_zoned_dev(md);
0f20972f
MS
1991 if (md->disk) {
1992 spin_lock(&_minor_lock);
1993 md->disk->private_data = NULL;
1994 spin_unlock(&_minor_lock);
89f871af 1995 if (dm_get_md_type(md) != DM_TYPE_NONE) {
1a581b72
CH
1996 struct table_device *td;
1997
89f871af 1998 dm_sysfs_exit(md);
1a581b72
CH
1999 list_for_each_entry(td, &md->table_devices, list) {
2000 bd_unlink_disk_holder(td->dm_dev.bdev,
2001 md->disk);
2002 }
d563792c
YK
2003
2004 /*
2005 * Hold lock to make sure del_gendisk() won't concurrent
2006 * with open/close_table_device().
2007 */
2008 mutex_lock(&md->table_devices_lock);
89f871af 2009 del_gendisk(md->disk);
d563792c 2010 mutex_unlock(&md->table_devices_lock);
89f871af 2011 }
cb77cb5a 2012 dm_queue_destroy_crypto_profile(md->queue);
8b9ab626 2013 put_disk(md->disk);
74a2b6ec 2014 }
0f20972f 2015
9f6dc633
MS
2016 if (md->pending_io) {
2017 free_percpu(md->pending_io);
2018 md->pending_io = NULL;
2019 }
2020
d09960b0
TE
2021 cleanup_srcu_struct(&md->io_barrier);
2022
d5ffebdd
MS
2023 mutex_destroy(&md->suspend_lock);
2024 mutex_destroy(&md->type_lock);
2025 mutex_destroy(&md->table_devices_lock);
a666e5c0 2026 mutex_destroy(&md->swap_bios_lock);
d5ffebdd 2027
4cc96131 2028 dm_mq_cleanup_mapped_device(md);
0f20972f
MS
2029}
2030
1da177e4
LT
2031/*
2032 * Allocate and initialise a blank device with a given minor.
2033 */
2b06cfff 2034static struct mapped_device *alloc_dev(int minor)
1da177e4 2035{
115485e8
MS
2036 int r, numa_node_id = dm_get_numa_node();
2037 struct mapped_device *md;
ba61fdd1 2038 void *old_md;
1da177e4 2039
856eb091 2040 md = kvzalloc_node(sizeof(*md), GFP_KERNEL, numa_node_id);
1da177e4 2041 if (!md) {
43e6c111 2042 DMERR("unable to allocate device, out of memory.");
1da177e4
LT
2043 return NULL;
2044 }
2045
10da4f79 2046 if (!try_module_get(THIS_MODULE))
6ed7ade8 2047 goto bad_module_get;
10da4f79 2048
1da177e4 2049 /* get a minor number for the dev */
2b06cfff 2050 if (minor == DM_ANY_MINOR)
cf13ab8e 2051 r = next_free_minor(&minor);
2b06cfff 2052 else
cf13ab8e 2053 r = specific_minor(minor);
1da177e4 2054 if (r < 0)
6ed7ade8 2055 goto bad_minor;
1da177e4 2056
83d5e5b0
MP
2057 r = init_srcu_struct(&md->io_barrier);
2058 if (r < 0)
2059 goto bad_io_barrier;
2060
115485e8 2061 md->numa_node_id = numa_node_id;
591ddcfc 2062 md->init_tio_pdu = false;
a5664dad 2063 md->type = DM_TYPE_NONE;
e61290a4 2064 mutex_init(&md->suspend_lock);
a5664dad 2065 mutex_init(&md->type_lock);
86f1152b 2066 mutex_init(&md->table_devices_lock);
022c2611 2067 spin_lock_init(&md->deferred_lock);
1da177e4 2068 atomic_set(&md->holders, 1);
5c6bd75d 2069 atomic_set(&md->open_count, 0);
1da177e4 2070 atomic_set(&md->event_nr, 0);
7a8c3d3b
MA
2071 atomic_set(&md->uevent_seq, 0);
2072 INIT_LIST_HEAD(&md->uevent_list);
86f1152b 2073 INIT_LIST_HEAD(&md->table_devices);
7a8c3d3b 2074 spin_lock_init(&md->uevent_lock);
1da177e4 2075
47ace7e0 2076 /*
c62b37d9
CH
2077 * default to bio-based until DM table is loaded and md->type
2078 * established. If request-based table is loaded: blk-mq will
2079 * override accordingly.
47ace7e0 2080 */
74fe6ba9 2081 md->disk = blk_alloc_disk(md->numa_node_id);
1da177e4 2082 if (!md->disk)
0f20972f 2083 goto bad;
74fe6ba9 2084 md->queue = md->disk->queue;
1da177e4 2085
f0b04115 2086 init_waitqueue_head(&md->wait);
53d5914f 2087 INIT_WORK(&md->work, dm_wq_work);
8b211aac 2088 INIT_WORK(&md->requeue_work, dm_wq_requeue_work);
f0b04115 2089 init_waitqueue_head(&md->eventq);
2995fa78 2090 init_completion(&md->kobj_holder.completion);
f0b04115 2091
8b211aac 2092 md->requeue_list = NULL;
a666e5c0
MP
2093 md->swap_bios = get_swap_bios();
2094 sema_init(&md->swap_bios_semaphore, md->swap_bios);
2095 mutex_init(&md->swap_bios_lock);
2096
1da177e4
LT
2097 md->disk->major = _major;
2098 md->disk->first_minor = minor;
74fe6ba9 2099 md->disk->minors = 1;
1ebe2e5f 2100 md->disk->flags |= GENHD_FL_NO_PART;
1da177e4 2101 md->disk->fops = &dm_blk_dops;
1da177e4
LT
2102 md->disk->private_data = md;
2103 sprintf(md->disk->disk_name, "dm-%d", minor);
f26c5719 2104
5d2a228b 2105 if (IS_ENABLED(CONFIG_FS_DAX)) {
30c6828a 2106 md->dax_dev = alloc_dax(md, &dm_dax_ops);
d7519392
CH
2107 if (IS_ERR(md->dax_dev)) {
2108 md->dax_dev = NULL;
976431b0 2109 goto bad;
d7519392 2110 }
7ac5360c
CH
2111 set_dax_nocache(md->dax_dev);
2112 set_dax_nomc(md->dax_dev);
fb08a190 2113 if (dax_add_host(md->dax_dev, md->disk))
976431b0
DW
2114 goto bad;
2115 }
f26c5719 2116
7e51f257 2117 format_dev_t(md->name, MKDEV(_major, minor));
1da177e4 2118
c7c879ee 2119 md->wq = alloc_workqueue("kdmflush/%s", WQ_MEM_RECLAIM, 0, md->name);
304f3f6a 2120 if (!md->wq)
0f20972f 2121 goto bad;
304f3f6a 2122
9f6dc633
MS
2123 md->pending_io = alloc_percpu(unsigned long);
2124 if (!md->pending_io)
2125 goto bad;
2126
d3aa3e06
JJ
2127 r = dm_stats_init(&md->stats);
2128 if (r < 0)
2129 goto bad;
fd2ed4d2 2130
ba61fdd1 2131 /* Populate the mapping, nobody knows we exist yet */
f32c10b0 2132 spin_lock(&_minor_lock);
ba61fdd1 2133 old_md = idr_replace(&_minor_idr, md, minor);
f32c10b0 2134 spin_unlock(&_minor_lock);
ba61fdd1
JM
2135
2136 BUG_ON(old_md != MINOR_ALLOCED);
2137
1da177e4
LT
2138 return md;
2139
0f20972f
MS
2140bad:
2141 cleanup_mapped_device(md);
83d5e5b0 2142bad_io_barrier:
1da177e4 2143 free_minor(minor);
6ed7ade8 2144bad_minor:
10da4f79 2145 module_put(THIS_MODULE);
6ed7ade8 2146bad_module_get:
856eb091 2147 kvfree(md);
1da177e4
LT
2148 return NULL;
2149}
2150
ae9da83f
JN
2151static void unlock_fs(struct mapped_device *md);
2152
1da177e4
LT
2153static void free_dev(struct mapped_device *md)
2154{
f331c029 2155 int minor = MINOR(disk_devt(md->disk));
63d94e48 2156
32a926da 2157 unlock_fs(md);
2eb6e1e3 2158
0f20972f 2159 cleanup_mapped_device(md);
63a4f065 2160
992ec6a9 2161 WARN_ON_ONCE(!list_empty(&md->table_devices));
63a4f065 2162 dm_stats_cleanup(&md->stats);
63a4f065
MS
2163 free_minor(minor);
2164
10da4f79 2165 module_put(THIS_MODULE);
856eb091 2166 kvfree(md);
1da177e4
LT
2167}
2168
2169/*
2170 * Bind a table to the device.
2171 */
2172static void event_callback(void *context)
2173{
7a8c3d3b
MA
2174 unsigned long flags;
2175 LIST_HEAD(uevents);
d695e441 2176 struct mapped_device *md = context;
1da177e4 2177
7a8c3d3b
MA
2178 spin_lock_irqsave(&md->uevent_lock, flags);
2179 list_splice_init(&md->uevent_list, &uevents);
2180 spin_unlock_irqrestore(&md->uevent_lock, flags);
2181
ed9e1982 2182 dm_send_uevents(&uevents, &disk_to_dev(md->disk)->kobj);
7a8c3d3b 2183
1da177e4
LT
2184 atomic_inc(&md->event_nr);
2185 wake_up(&md->eventq);
62e08243 2186 dm_issue_global_event();
1da177e4
LT
2187}
2188
042d2a9b
AK
2189/*
2190 * Returns old map, which caller must destroy.
2191 */
2192static struct dm_table *__bind(struct mapped_device *md, struct dm_table *t,
2193 struct queue_limits *limits)
1da177e4 2194{
042d2a9b 2195 struct dm_table *old_map;
1da177e4 2196 sector_t size;
2a2a4c51 2197 int ret;
1da177e4 2198
5a8f1f80
BVA
2199 lockdep_assert_held(&md->suspend_lock);
2200
1da177e4 2201 size = dm_table_get_size(t);
3ac51e74
DW
2202
2203 /*
2204 * Wipe any geometry if the size of the table changed.
2205 */
fd2ed4d2 2206 if (size != dm_get_size(md))
3ac51e74
DW
2207 memset(&md->geometry, 0, sizeof(md->geometry));
2208
7533afa1 2209 set_capacity(md->disk, size);
d5816876 2210
2ca3310e
AK
2211 dm_table_event_callback(t, event_callback, md);
2212
f5b4aee1 2213 if (dm_table_request_based(t)) {
16f12266 2214 /*
9c37de29
MS
2215 * Leverage the fact that request-based DM targets are
2216 * immutable singletons - used to optimize dm_mq_queue_rq.
16f12266
MS
2217 */
2218 md->immutable_target = dm_table_get_immutable_target(t);
e6ee8c0b 2219
29dec90a
CH
2220 /*
2221 * There is no need to reload with request-based dm because the
2222 * size of front_pad doesn't change.
2223 *
2224 * Note for future: If you are to reload bioset, prep-ed
2225 * requests in the queue may refer to bio from the old bioset,
2226 * so you must walk through the queue to unprep.
2227 */
2228 if (!md->mempools) {
2229 md->mempools = t->mempools;
2230 t->mempools = NULL;
2231 }
2232 } else {
2233 /*
2234 * The md may already have mempools that need changing.
2235 * If so, reload bioset because front_pad may have changed
2236 * because a different table was loaded.
2237 */
2238 dm_free_md_mempools(md->mempools);
2239 md->mempools = t->mempools;
2240 t->mempools = NULL;
2a2a4c51 2241 }
e6ee8c0b 2242
f5b4aee1 2243 ret = dm_table_set_restrictions(t, md->queue, limits);
bb37d772
DLM
2244 if (ret) {
2245 old_map = ERR_PTR(ret);
2246 goto out;
2247 }
2248
a12f5d48 2249 old_map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock));
1d3aa6f6 2250 rcu_assign_pointer(md->map, (void *)t);
36a0456f
AK
2251 md->immutable_target_type = dm_table_get_immutable_target_type(t);
2252
41abc4e1
HR
2253 if (old_map)
2254 dm_sync_table(md);
2a2a4c51 2255out:
042d2a9b 2256 return old_map;
1da177e4
LT
2257}
2258
a7940155
AK
2259/*
2260 * Returns unbound table for the caller to free.
2261 */
2262static struct dm_table *__unbind(struct mapped_device *md)
1da177e4 2263{
a12f5d48 2264 struct dm_table *map = rcu_dereference_protected(md->map, 1);
1da177e4
LT
2265
2266 if (!map)
a7940155 2267 return NULL;
1da177e4
LT
2268
2269 dm_table_event_callback(map, NULL, NULL);
9cdb8520 2270 RCU_INIT_POINTER(md->map, NULL);
83d5e5b0 2271 dm_sync_table(md);
a7940155
AK
2272
2273 return map;
1da177e4
LT
2274}
2275
2276/*
2277 * Constructor for a new device.
2278 */
2b06cfff 2279int dm_create(int minor, struct mapped_device **result)
1da177e4
LT
2280{
2281 struct mapped_device *md;
2282
2b06cfff 2283 md = alloc_dev(minor);
1da177e4
LT
2284 if (!md)
2285 return -ENXIO;
2286
91ccbbac
TS
2287 dm_ima_reset_data(md);
2288
1da177e4
LT
2289 *result = md;
2290 return 0;
2291}
2292
a5664dad
MS
2293/*
2294 * Functions to manage md->type.
2295 * All are required to hold md->type_lock.
2296 */
2297void dm_lock_md_type(struct mapped_device *md)
2298{
2299 mutex_lock(&md->type_lock);
2300}
2301
2302void dm_unlock_md_type(struct mapped_device *md)
2303{
2304 mutex_unlock(&md->type_lock);
2305}
2306
7e0d574f 2307void dm_set_md_type(struct mapped_device *md, enum dm_queue_mode type)
a5664dad 2308{
00c4fc3b 2309 BUG_ON(!mutex_is_locked(&md->type_lock));
a5664dad
MS
2310 md->type = type;
2311}
2312
7e0d574f 2313enum dm_queue_mode dm_get_md_type(struct mapped_device *md)
a5664dad
MS
2314{
2315 return md->type;
2316}
2317
36a0456f
AK
2318struct target_type *dm_get_immutable_target_type(struct mapped_device *md)
2319{
2320 return md->immutable_target_type;
2321}
2322
4a0b4ddf
MS
2323/*
2324 * Setup the DM device's queue based on md's type
2325 */
591ddcfc 2326int dm_setup_md_queue(struct mapped_device *md, struct dm_table *t)
4a0b4ddf 2327{
ba305859 2328 enum dm_queue_mode type = dm_table_get_type(t);
c100ec49 2329 struct queue_limits limits;
1a581b72 2330 struct table_device *td;
ba305859 2331 int r;
bfebd1cd 2332
545ed20e 2333 switch (type) {
bfebd1cd 2334 case DM_TYPE_REQUEST_BASED:
681cc5e8 2335 md->disk->fops = &dm_rq_blk_dops;
e83068a5 2336 r = dm_mq_init_request_queue(md, t);
bfebd1cd 2337 if (r) {
681cc5e8 2338 DMERR("Cannot initialize queue for request-based dm mapped device");
bfebd1cd
MS
2339 return r;
2340 }
2341 break;
2342 case DM_TYPE_BIO_BASED:
545ed20e 2343 case DM_TYPE_DAX_BIO_BASED:
bfebd1cd 2344 break;
7e0d574f
BVA
2345 case DM_TYPE_NONE:
2346 WARN_ON_ONCE(true);
2347 break;
4a0b4ddf
MS
2348 }
2349
c100ec49
MS
2350 r = dm_calculate_queue_limits(t, &limits);
2351 if (r) {
2352 DMERR("Cannot calculate initial queue limits");
2353 return r;
2354 }
bb37d772
DLM
2355 r = dm_table_set_restrictions(t, md->queue, &limits);
2356 if (r)
2357 return r;
2358
d563792c
YK
2359 /*
2360 * Hold lock to make sure add_disk() and del_gendisk() won't concurrent
2361 * with open_table_device() and close_table_device().
2362 */
2363 mutex_lock(&md->table_devices_lock);
e7089f65 2364 r = add_disk(md->disk);
d563792c 2365 mutex_unlock(&md->table_devices_lock);
e7089f65
LC
2366 if (r)
2367 return r;
c100ec49 2368
1a581b72
CH
2369 /*
2370 * Register the holder relationship for devices added before the disk
2371 * was live.
2372 */
2373 list_for_each_entry(td, &md->table_devices, list) {
2374 r = bd_link_disk_holder(td->dm_dev.bdev, md->disk);
2375 if (r)
2376 goto out_undo_holders;
89f871af 2377 }
d563792c 2378
1a581b72
CH
2379 r = dm_sysfs_init(md);
2380 if (r)
2381 goto out_undo_holders;
2382
89f871af 2383 md->type = type;
4a0b4ddf 2384 return 0;
1a581b72
CH
2385
2386out_undo_holders:
2387 list_for_each_entry_continue_reverse(td, &md->table_devices, list)
2388 bd_unlink_disk_holder(td->dm_dev.bdev, md->disk);
2389 mutex_lock(&md->table_devices_lock);
2390 del_gendisk(md->disk);
2391 mutex_unlock(&md->table_devices_lock);
2392 return r;
4a0b4ddf
MS
2393}
2394
2bec1f4a 2395struct mapped_device *dm_get_md(dev_t dev)
1da177e4
LT
2396{
2397 struct mapped_device *md;
86a3238c 2398 unsigned int minor = MINOR(dev);
1da177e4
LT
2399
2400 if (MAJOR(dev) != _major || minor >= (1 << MINORBITS))
2401 return NULL;
2402
f32c10b0 2403 spin_lock(&_minor_lock);
1da177e4
LT
2404
2405 md = idr_find(&_minor_idr, minor);
49de5769
MS
2406 if (!md || md == MINOR_ALLOCED || (MINOR(disk_devt(dm_disk(md))) != minor) ||
2407 test_bit(DMF_FREEING, &md->flags) || dm_deleting_md(md)) {
2408 md = NULL;
2409 goto out;
fba9f90e 2410 }
49de5769 2411 dm_get(md);
fba9f90e 2412out:
f32c10b0 2413 spin_unlock(&_minor_lock);
1da177e4 2414
637842cf
DT
2415 return md;
2416}
3cf2e4ba 2417EXPORT_SYMBOL_GPL(dm_get_md);
d229a958 2418
9ade92a9 2419void *dm_get_mdptr(struct mapped_device *md)
637842cf 2420{
9ade92a9 2421 return md->interface_ptr;
1da177e4
LT
2422}
2423
2424void dm_set_mdptr(struct mapped_device *md, void *ptr)
2425{
2426 md->interface_ptr = ptr;
2427}
2428
2429void dm_get(struct mapped_device *md)
2430{
2431 atomic_inc(&md->holders);
3f77316d 2432 BUG_ON(test_bit(DMF_FREEING, &md->flags));
1da177e4
LT
2433}
2434
09ee96b2
MP
2435int dm_hold(struct mapped_device *md)
2436{
2437 spin_lock(&_minor_lock);
2438 if (test_bit(DMF_FREEING, &md->flags)) {
2439 spin_unlock(&_minor_lock);
2440 return -EBUSY;
2441 }
2442 dm_get(md);
2443 spin_unlock(&_minor_lock);
2444 return 0;
2445}
2446EXPORT_SYMBOL_GPL(dm_hold);
2447
72d94861
AK
2448const char *dm_device_name(struct mapped_device *md)
2449{
2450 return md->name;
2451}
2452EXPORT_SYMBOL_GPL(dm_device_name);
2453
3f77316d 2454static void __dm_destroy(struct mapped_device *md, bool wait)
1da177e4 2455{
1134e5ae 2456 struct dm_table *map;
83d5e5b0 2457 int srcu_idx;
1da177e4 2458
3f77316d 2459 might_sleep();
fba9f90e 2460
63a4f065 2461 spin_lock(&_minor_lock);
3f77316d
KU
2462 idr_replace(&_minor_idr, MINOR_ALLOCED, MINOR(disk_devt(dm_disk(md))));
2463 set_bit(DMF_FREEING, &md->flags);
2464 spin_unlock(&_minor_lock);
3b785fbc 2465
7a5428dc 2466 blk_mark_disk_dead(md->disk);
3f77316d 2467
ab7c7bb6
MP
2468 /*
2469 * Take suspend_lock so that presuspend and postsuspend methods
2470 * do not race with internal suspend.
2471 */
2472 mutex_lock(&md->suspend_lock);
2a708cff 2473 map = dm_get_live_table(md, &srcu_idx);
3f77316d
KU
2474 if (!dm_suspended_md(md)) {
2475 dm_table_presuspend_targets(map);
adc0daad 2476 set_bit(DMF_SUSPENDED, &md->flags);
5df96f2b 2477 set_bit(DMF_POST_SUSPENDING, &md->flags);
3f77316d 2478 dm_table_postsuspend_targets(map);
1da177e4 2479 }
238d991f 2480 /* dm_put_live_table must be before fsleep, otherwise deadlock is possible */
83d5e5b0 2481 dm_put_live_table(md, srcu_idx);
2a708cff 2482 mutex_unlock(&md->suspend_lock);
83d5e5b0 2483
3f77316d
KU
2484 /*
2485 * Rare, but there may be I/O requests still going to complete,
2486 * for example. Wait for all references to disappear.
2487 * No one should increment the reference count of the mapped_device,
2488 * after the mapped_device state becomes DMF_FREEING.
2489 */
2490 if (wait)
2491 while (atomic_read(&md->holders))
238d991f 2492 fsleep(1000);
3f77316d
KU
2493 else if (atomic_read(&md->holders))
2494 DMWARN("%s: Forcibly removing mapped_device still in use! (%d users)",
2495 dm_device_name(md), atomic_read(&md->holders));
2496
3f77316d
KU
2497 dm_table_destroy(__unbind(md));
2498 free_dev(md);
2499}
2500
2501void dm_destroy(struct mapped_device *md)
2502{
2503 __dm_destroy(md, true);
2504}
2505
2506void dm_destroy_immediate(struct mapped_device *md)
2507{
2508 __dm_destroy(md, false);
2509}
2510
2511void dm_put(struct mapped_device *md)
2512{
2513 atomic_dec(&md->holders);
1da177e4 2514}
79eb885c 2515EXPORT_SYMBOL_GPL(dm_put);
1da177e4 2516
9f6dc633 2517static bool dm_in_flight_bios(struct mapped_device *md)
85067747
ML
2518{
2519 int cpu;
9f6dc633 2520 unsigned long sum = 0;
85067747 2521
9f6dc633
MS
2522 for_each_possible_cpu(cpu)
2523 sum += *per_cpu_ptr(md->pending_io, cpu);
85067747
ML
2524
2525 return sum != 0;
2526}
2527
2f064a59 2528static int dm_wait_for_bios_completion(struct mapped_device *md, unsigned int task_state)
46125c1c
MB
2529{
2530 int r = 0;
9f4c3f87 2531 DEFINE_WAIT(wait);
46125c1c 2532
85067747 2533 while (true) {
9f4c3f87 2534 prepare_to_wait(&md->wait, &wait, task_state);
46125c1c 2535
9f6dc633 2536 if (!dm_in_flight_bios(md))
46125c1c
MB
2537 break;
2538
e3fabdfd 2539 if (signal_pending_state(task_state, current)) {
46125c1c
MB
2540 r = -EINTR;
2541 break;
2542 }
2543
2544 io_schedule();
2545 }
9f4c3f87 2546 finish_wait(&md->wait, &wait);
b44ebeb0 2547
9f6dc633
MS
2548 smp_rmb();
2549
46125c1c
MB
2550 return r;
2551}
2552
2f064a59 2553static int dm_wait_for_completion(struct mapped_device *md, unsigned int task_state)
85067747
ML
2554{
2555 int r = 0;
2556
2557 if (!queue_is_mq(md->queue))
2558 return dm_wait_for_bios_completion(md, task_state);
2559
2560 while (true) {
2561 if (!blk_mq_queue_inflight(md->queue))
2562 break;
2563
2564 if (signal_pending_state(task_state, current)) {
2565 r = -EINTR;
2566 break;
2567 }
2568
238d991f 2569 fsleep(5000);
85067747
ML
2570 }
2571
2572 return r;
2573}
2574
1da177e4
LT
2575/*
2576 * Process the deferred bios
2577 */
ef208587 2578static void dm_wq_work(struct work_struct *work)
1da177e4 2579{
0c2915b8
MS
2580 struct mapped_device *md = container_of(work, struct mapped_device, work);
2581 struct bio *bio;
ef208587 2582
3b00b203 2583 while (!test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags)) {
df12ee99 2584 spin_lock_irq(&md->deferred_lock);
0c2915b8 2585 bio = bio_list_pop(&md->deferred);
df12ee99
AK
2586 spin_unlock_irq(&md->deferred_lock);
2587
0c2915b8 2588 if (!bio)
df12ee99 2589 break;
022c2611 2590
0c2915b8 2591 submit_bio_noacct(bio);
0ca44fce 2592 cond_resched();
022c2611 2593 }
1da177e4
LT
2594}
2595
9a1fb464 2596static void dm_queue_flush(struct mapped_device *md)
304f3f6a 2597{
3b00b203 2598 clear_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags);
4e857c58 2599 smp_mb__after_atomic();
53d5914f 2600 queue_work(md->wq, &md->work);
304f3f6a
MB
2601}
2602
1da177e4 2603/*
042d2a9b 2604 * Swap in a new table, returning the old one for the caller to destroy.
1da177e4 2605 */
042d2a9b 2606struct dm_table *dm_swap_table(struct mapped_device *md, struct dm_table *table)
1da177e4 2607{
87eb5b21 2608 struct dm_table *live_map = NULL, *map = ERR_PTR(-EINVAL);
754c5fc7 2609 struct queue_limits limits;
042d2a9b 2610 int r;
1da177e4 2611
e61290a4 2612 mutex_lock(&md->suspend_lock);
1da177e4
LT
2613
2614 /* device must be suspended */
4f186f8b 2615 if (!dm_suspended_md(md))
93c534ae 2616 goto out;
1da177e4 2617
3ae70656
MS
2618 /*
2619 * If the new table has no data devices, retain the existing limits.
2620 * This helps multipath with queue_if_no_path if all paths disappear,
2621 * then new I/O is queued based on these limits, and then some paths
2622 * reappear.
2623 */
2624 if (dm_table_has_no_data_devices(table)) {
83d5e5b0 2625 live_map = dm_get_live_table_fast(md);
3ae70656
MS
2626 if (live_map)
2627 limits = md->queue->limits;
83d5e5b0 2628 dm_put_live_table_fast(md);
3ae70656
MS
2629 }
2630
87eb5b21
MC
2631 if (!live_map) {
2632 r = dm_calculate_queue_limits(table, &limits);
2633 if (r) {
2634 map = ERR_PTR(r);
2635 goto out;
2636 }
042d2a9b 2637 }
754c5fc7 2638
042d2a9b 2639 map = __bind(md, table, &limits);
62e08243 2640 dm_issue_global_event();
1da177e4 2641
93c534ae 2642out:
e61290a4 2643 mutex_unlock(&md->suspend_lock);
042d2a9b 2644 return map;
1da177e4
LT
2645}
2646
2647/*
2648 * Functions to lock and unlock any filesystem running on the
2649 * device.
2650 */
2ca3310e 2651static int lock_fs(struct mapped_device *md)
1da177e4 2652{
e39e2e95 2653 int r;
1da177e4 2654
040f04bd 2655 WARN_ON(test_bit(DMF_FROZEN, &md->flags));
aa8d7c2f 2656
977115c0 2657 r = freeze_bdev(md->disk->part0);
040f04bd
CH
2658 if (!r)
2659 set_bit(DMF_FROZEN, &md->flags);
2660 return r;
1da177e4
LT
2661}
2662
2ca3310e 2663static void unlock_fs(struct mapped_device *md)
1da177e4 2664{
aa8d7c2f
AK
2665 if (!test_bit(DMF_FROZEN, &md->flags))
2666 return;
977115c0 2667 thaw_bdev(md->disk->part0);
aa8d7c2f 2668 clear_bit(DMF_FROZEN, &md->flags);
1da177e4
LT
2669}
2670
2671/*
b48633f8
BVA
2672 * @suspend_flags: DM_SUSPEND_LOCKFS_FLAG and/or DM_SUSPEND_NOFLUSH_FLAG
2673 * @task_state: e.g. TASK_INTERRUPTIBLE or TASK_UNINTERRUPTIBLE
2674 * @dmf_suspended_flag: DMF_SUSPENDED or DMF_SUSPENDED_INTERNALLY
2675 *
ffcc3936
MS
2676 * If __dm_suspend returns 0, the device is completely quiescent
2677 * now. There is no request-processing activity. All new requests
2678 * are being added to md->deferred list.
cec47e3d 2679 */
ffcc3936 2680static int __dm_suspend(struct mapped_device *md, struct dm_table *map,
86a3238c 2681 unsigned int suspend_flags, unsigned int task_state,
eaf9a736 2682 int dmf_suspended_flag)
1da177e4 2683{
ffcc3936
MS
2684 bool do_lockfs = suspend_flags & DM_SUSPEND_LOCKFS_FLAG;
2685 bool noflush = suspend_flags & DM_SUSPEND_NOFLUSH_FLAG;
2686 int r;
1da177e4 2687
5a8f1f80
BVA
2688 lockdep_assert_held(&md->suspend_lock);
2689
2e93ccc1
KU
2690 /*
2691 * DMF_NOFLUSH_SUSPENDING must be set before presuspend.
2692 * This flag is cleared before dm_suspend returns.
2693 */
2694 if (noflush)
2695 set_bit(DMF_NOFLUSH_SUSPENDING, &md->flags);
86331f39 2696 else
ac75b09f 2697 DMDEBUG("%s: suspending with flush", dm_device_name(md));
2e93ccc1 2698
d67ee213
MS
2699 /*
2700 * This gets reverted if there's an error later and the targets
2701 * provide the .presuspend_undo hook.
2702 */
cf222b37
AK
2703 dm_table_presuspend_targets(map);
2704
32a926da 2705 /*
9f518b27
KU
2706 * Flush I/O to the device.
2707 * Any I/O submitted after lock_fs() may not be flushed.
2708 * noflush takes precedence over do_lockfs.
2709 * (lock_fs() flushes I/Os and waits for them to complete.)
32a926da
MP
2710 */
2711 if (!noflush && do_lockfs) {
2712 r = lock_fs(md);
d67ee213
MS
2713 if (r) {
2714 dm_table_presuspend_undo_targets(map);
ffcc3936 2715 return r;
d67ee213 2716 }
aa8d7c2f 2717 }
1da177e4
LT
2718
2719 /*
3b00b203
MP
2720 * Here we must make sure that no processes are submitting requests
2721 * to target drivers i.e. no one may be executing
96c9865c 2722 * dm_split_and_process_bio from dm_submit_bio.
3b00b203 2723 *
96c9865c 2724 * To get all processes out of dm_split_and_process_bio in dm_submit_bio,
3b00b203 2725 * we take the write lock. To prevent any process from reentering
96c9865c 2726 * dm_split_and_process_bio from dm_submit_bio and quiesce the thread
0cede372 2727 * (dm_wq_work), we set DMF_BLOCK_IO_FOR_SUSPEND and call
6a8736d1 2728 * flush_workqueue(md->wq).
1da177e4 2729 */
1eb787ec 2730 set_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags);
41abc4e1
HR
2731 if (map)
2732 synchronize_srcu(&md->io_barrier);
1da177e4 2733
d0bcb878 2734 /*
29e4013d
TH
2735 * Stop md->queue before flushing md->wq in case request-based
2736 * dm defers requests to md->wq from md->queue.
d0bcb878 2737 */
6a23e05c 2738 if (dm_request_based(md))
eca7ee6d 2739 dm_stop_queue(md->queue);
cec47e3d 2740
d0bcb878
KU
2741 flush_workqueue(md->wq);
2742
1da177e4 2743 /*
3b00b203
MP
2744 * At this point no more requests are entering target request routines.
2745 * We call dm_wait_for_completion to wait for all existing requests
2746 * to finish.
1da177e4 2747 */
b48633f8 2748 r = dm_wait_for_completion(md, task_state);
eaf9a736
MS
2749 if (!r)
2750 set_bit(dmf_suspended_flag, &md->flags);
1da177e4 2751
6d6f10df 2752 if (noflush)
022c2611 2753 clear_bit(DMF_NOFLUSH_SUSPENDING, &md->flags);
41abc4e1
HR
2754 if (map)
2755 synchronize_srcu(&md->io_barrier);
2e93ccc1 2756
1da177e4 2757 /* were we interrupted ? */
46125c1c 2758 if (r < 0) {
9a1fb464 2759 dm_queue_flush(md);
73d410c0 2760
cec47e3d 2761 if (dm_request_based(md))
eca7ee6d 2762 dm_start_queue(md->queue);
cec47e3d 2763
2ca3310e 2764 unlock_fs(md);
d67ee213 2765 dm_table_presuspend_undo_targets(map);
ffcc3936 2766 /* pushback list is already flushed, so skip flush */
2ca3310e 2767 }
1da177e4 2768
ffcc3936
MS
2769 return r;
2770}
2771
2772/*
2773 * We need to be able to change a mapping table under a mounted
2774 * filesystem. For example we might want to move some data in
2775 * the background. Before the table can be swapped with
2776 * dm_bind_table, dm_suspend must be called to flush any in
2777 * flight bios and ensure that any further io gets deferred.
2778 */
2779/*
2780 * Suspend mechanism in request-based dm.
2781 *
2782 * 1. Flush all I/Os by lock_fs() if needed.
2783 * 2. Stop dispatching any I/O by stopping the request_queue.
2784 * 3. Wait for all in-flight I/Os to be completed or requeued.
2785 *
2786 * To abort suspend, start the request_queue.
2787 */
86a3238c 2788int dm_suspend(struct mapped_device *md, unsigned int suspend_flags)
ffcc3936
MS
2789{
2790 struct dm_table *map = NULL;
2791 int r = 0;
2792
2793retry:
2794 mutex_lock_nested(&md->suspend_lock, SINGLE_DEPTH_NESTING);
2795
2796 if (dm_suspended_md(md)) {
2797 r = -EINVAL;
2798 goto out_unlock;
2799 }
2800
2801 if (dm_suspended_internally_md(md)) {
2802 /* already internally suspended, wait for internal resume */
2803 mutex_unlock(&md->suspend_lock);
2804 r = wait_on_bit(&md->flags, DMF_SUSPENDED_INTERNALLY, TASK_INTERRUPTIBLE);
2805 if (r)
2806 return r;
2807 goto retry;
2808 }
2809
a12f5d48 2810 map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock));
ffcc3936 2811
eaf9a736 2812 r = __dm_suspend(md, map, suspend_flags, TASK_INTERRUPTIBLE, DMF_SUSPENDED);
ffcc3936
MS
2813 if (r)
2814 goto out_unlock;
3b00b203 2815
5df96f2b 2816 set_bit(DMF_POST_SUSPENDING, &md->flags);
4d4471cb 2817 dm_table_postsuspend_targets(map);
5df96f2b 2818 clear_bit(DMF_POST_SUSPENDING, &md->flags);
4d4471cb 2819
d287483d 2820out_unlock:
e61290a4 2821 mutex_unlock(&md->suspend_lock);
cf222b37 2822 return r;
1da177e4
LT
2823}
2824
ffcc3936
MS
2825static int __dm_resume(struct mapped_device *md, struct dm_table *map)
2826{
2827 if (map) {
2828 int r = dm_table_resume_targets(map);
b30f1607 2829
ffcc3936
MS
2830 if (r)
2831 return r;
2832 }
2833
2834 dm_queue_flush(md);
2835
2836 /*
2837 * Flushing deferred I/Os must be done after targets are resumed
2838 * so that mapping of targets can work correctly.
2839 * Request-based dm is queueing the deferred I/Os in its request_queue.
2840 */
2841 if (dm_request_based(md))
eca7ee6d 2842 dm_start_queue(md->queue);
ffcc3936
MS
2843
2844 unlock_fs(md);
2845
2846 return 0;
2847}
2848
1da177e4
LT
2849int dm_resume(struct mapped_device *md)
2850{
8dc23658 2851 int r;
cf222b37 2852 struct dm_table *map = NULL;
1da177e4 2853
ffcc3936 2854retry:
8dc23658 2855 r = -EINVAL;
ffcc3936
MS
2856 mutex_lock_nested(&md->suspend_lock, SINGLE_DEPTH_NESTING);
2857
4f186f8b 2858 if (!dm_suspended_md(md))
cf222b37 2859 goto out;
cf222b37 2860
ffcc3936
MS
2861 if (dm_suspended_internally_md(md)) {
2862 /* already internally suspended, wait for internal resume */
2863 mutex_unlock(&md->suspend_lock);
2864 r = wait_on_bit(&md->flags, DMF_SUSPENDED_INTERNALLY, TASK_INTERRUPTIBLE);
2865 if (r)
2866 return r;
2867 goto retry;
2868 }
2869
a12f5d48 2870 map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock));
2ca3310e 2871 if (!map || !dm_table_get_size(map))
cf222b37 2872 goto out;
1da177e4 2873
ffcc3936 2874 r = __dm_resume(md, map);
8757b776
MB
2875 if (r)
2876 goto out;
2ca3310e 2877
2ca3310e 2878 clear_bit(DMF_SUSPENDED, &md->flags);
cf222b37 2879out:
e61290a4 2880 mutex_unlock(&md->suspend_lock);
2ca3310e 2881
cf222b37 2882 return r;
1da177e4
LT
2883}
2884
fd2ed4d2
MP
2885/*
2886 * Internal suspend/resume works like userspace-driven suspend. It waits
2887 * until all bios finish and prevents issuing new bios to the target drivers.
2888 * It may be used only from the kernel.
fd2ed4d2
MP
2889 */
2890
86a3238c 2891static void __dm_internal_suspend(struct mapped_device *md, unsigned int suspend_flags)
fd2ed4d2 2892{
ffcc3936
MS
2893 struct dm_table *map = NULL;
2894
1ea0654e
BVA
2895 lockdep_assert_held(&md->suspend_lock);
2896
96b26c8c 2897 if (md->internal_suspend_count++)
ffcc3936
MS
2898 return; /* nested internal suspend */
2899
2900 if (dm_suspended_md(md)) {
2901 set_bit(DMF_SUSPENDED_INTERNALLY, &md->flags);
2902 return; /* nest suspend */
2903 }
2904
a12f5d48 2905 map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock));
ffcc3936
MS
2906
2907 /*
2908 * Using TASK_UNINTERRUPTIBLE because only NOFLUSH internal suspend is
2909 * supported. Properly supporting a TASK_INTERRUPTIBLE internal suspend
2910 * would require changing .presuspend to return an error -- avoid this
2911 * until there is a need for more elaborate variants of internal suspend.
2912 */
eaf9a736
MS
2913 (void) __dm_suspend(md, map, suspend_flags, TASK_UNINTERRUPTIBLE,
2914 DMF_SUSPENDED_INTERNALLY);
ffcc3936 2915
5df96f2b 2916 set_bit(DMF_POST_SUSPENDING, &md->flags);
ffcc3936 2917 dm_table_postsuspend_targets(map);
5df96f2b 2918 clear_bit(DMF_POST_SUSPENDING, &md->flags);
ffcc3936
MS
2919}
2920
2921static void __dm_internal_resume(struct mapped_device *md)
2922{
96b26c8c
MP
2923 BUG_ON(!md->internal_suspend_count);
2924
2925 if (--md->internal_suspend_count)
ffcc3936
MS
2926 return; /* resume from nested internal suspend */
2927
fd2ed4d2 2928 if (dm_suspended_md(md))
ffcc3936
MS
2929 goto done; /* resume from nested suspend */
2930
2931 /*
2932 * NOTE: existing callers don't need to call dm_table_resume_targets
2933 * (which may fail -- so best to avoid it for now by passing NULL map)
2934 */
2935 (void) __dm_resume(md, NULL);
2936
2937done:
2938 clear_bit(DMF_SUSPENDED_INTERNALLY, &md->flags);
2939 smp_mb__after_atomic();
2940 wake_up_bit(&md->flags, DMF_SUSPENDED_INTERNALLY);
2941}
2942
2943void dm_internal_suspend_noflush(struct mapped_device *md)
2944{
2945 mutex_lock(&md->suspend_lock);
2946 __dm_internal_suspend(md, DM_SUSPEND_NOFLUSH_FLAG);
2947 mutex_unlock(&md->suspend_lock);
2948}
2949EXPORT_SYMBOL_GPL(dm_internal_suspend_noflush);
2950
2951void dm_internal_resume(struct mapped_device *md)
2952{
2953 mutex_lock(&md->suspend_lock);
2954 __dm_internal_resume(md);
2955 mutex_unlock(&md->suspend_lock);
2956}
2957EXPORT_SYMBOL_GPL(dm_internal_resume);
2958
2959/*
2960 * Fast variants of internal suspend/resume hold md->suspend_lock,
2961 * which prevents interaction with userspace-driven suspend.
2962 */
2963
2964void dm_internal_suspend_fast(struct mapped_device *md)
2965{
2966 mutex_lock(&md->suspend_lock);
2967 if (dm_suspended_md(md) || dm_suspended_internally_md(md))
fd2ed4d2
MP
2968 return;
2969
2970 set_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags);
2971 synchronize_srcu(&md->io_barrier);
2972 flush_workqueue(md->wq);
2973 dm_wait_for_completion(md, TASK_UNINTERRUPTIBLE);
2974}
b735fede 2975EXPORT_SYMBOL_GPL(dm_internal_suspend_fast);
fd2ed4d2 2976
ffcc3936 2977void dm_internal_resume_fast(struct mapped_device *md)
fd2ed4d2 2978{
ffcc3936 2979 if (dm_suspended_md(md) || dm_suspended_internally_md(md))
fd2ed4d2
MP
2980 goto done;
2981
2982 dm_queue_flush(md);
2983
2984done:
2985 mutex_unlock(&md->suspend_lock);
2986}
b735fede 2987EXPORT_SYMBOL_GPL(dm_internal_resume_fast);
fd2ed4d2 2988
a4a82ce3
HM
2989/*
2990 *---------------------------------------------------------------
1da177e4 2991 * Event notification.
a4a82ce3
HM
2992 *---------------------------------------------------------------
2993 */
3abf85b5 2994int dm_kobject_uevent(struct mapped_device *md, enum kobject_action action,
86a3238c 2995 unsigned int cookie, bool need_resize_uevent)
69267a30 2996{
6958c1c6 2997 int r;
86a3238c 2998 unsigned int noio_flag;
60935eb2 2999 char udev_cookie[DM_COOKIE_LENGTH];
7533afa1
MP
3000 char *envp[3] = { NULL, NULL, NULL };
3001 char **envpp = envp;
3002 if (cookie) {
60935eb2
MB
3003 snprintf(udev_cookie, DM_COOKIE_LENGTH, "%s=%u",
3004 DM_COOKIE_ENV_VAR_NAME, cookie);
7533afa1 3005 *envpp++ = udev_cookie;
60935eb2 3006 }
7533afa1
MP
3007 if (need_resize_uevent) {
3008 *envpp++ = "RESIZE=1";
3009 }
3010
3011 noio_flag = memalloc_noio_save();
3012
3013 r = kobject_uevent_env(&disk_to_dev(md->disk)->kobj, action, envp);
6958c1c6
MP
3014
3015 memalloc_noio_restore(noio_flag);
3016
3017 return r;
69267a30
AK
3018}
3019
7a8c3d3b
MA
3020uint32_t dm_next_uevent_seq(struct mapped_device *md)
3021{
3022 return atomic_add_return(1, &md->uevent_seq);
3023}
3024
1da177e4
LT
3025uint32_t dm_get_event_nr(struct mapped_device *md)
3026{
3027 return atomic_read(&md->event_nr);
3028}
3029
3030int dm_wait_event(struct mapped_device *md, int event_nr)
3031{
3032 return wait_event_interruptible(md->eventq,
3033 (event_nr != atomic_read(&md->event_nr)));
3034}
3035
7a8c3d3b
MA
3036void dm_uevent_add(struct mapped_device *md, struct list_head *elist)
3037{
3038 unsigned long flags;
3039
3040 spin_lock_irqsave(&md->uevent_lock, flags);
3041 list_add(elist, &md->uevent_list);
3042 spin_unlock_irqrestore(&md->uevent_lock, flags);
3043}
3044
1da177e4
LT
3045/*
3046 * The gendisk is only valid as long as you have a reference
3047 * count on 'md'.
3048 */
3049struct gendisk *dm_disk(struct mapped_device *md)
3050{
3051 return md->disk;
3052}
65ff5b7d 3053EXPORT_SYMBOL_GPL(dm_disk);
1da177e4 3054
784aae73
MB
3055struct kobject *dm_kobject(struct mapped_device *md)
3056{
2995fa78 3057 return &md->kobj_holder.kobj;
784aae73
MB
3058}
3059
784aae73
MB
3060struct mapped_device *dm_get_from_kobject(struct kobject *kobj)
3061{
3062 struct mapped_device *md;
3063
2995fa78 3064 md = container_of(kobj, struct mapped_device, kobj_holder.kobj);
784aae73 3065
b9a41d21
HT
3066 spin_lock(&_minor_lock);
3067 if (test_bit(DMF_FREEING, &md->flags) || dm_deleting_md(md)) {
3068 md = NULL;
3069 goto out;
3070 }
784aae73 3071 dm_get(md);
b9a41d21
HT
3072out:
3073 spin_unlock(&_minor_lock);
3074
784aae73
MB
3075 return md;
3076}
3077
4f186f8b 3078int dm_suspended_md(struct mapped_device *md)
1da177e4
LT
3079{
3080 return test_bit(DMF_SUSPENDED, &md->flags);
3081}
3082
5df96f2b
MP
3083static int dm_post_suspending_md(struct mapped_device *md)
3084{
3085 return test_bit(DMF_POST_SUSPENDING, &md->flags);
3086}
3087
ffcc3936
MS
3088int dm_suspended_internally_md(struct mapped_device *md)
3089{
3090 return test_bit(DMF_SUSPENDED_INTERNALLY, &md->flags);
3091}
3092
2c140a24
MP
3093int dm_test_deferred_remove_flag(struct mapped_device *md)
3094{
3095 return test_bit(DMF_DEFERRED_REMOVE, &md->flags);
3096}
3097
64dbce58
KU
3098int dm_suspended(struct dm_target *ti)
3099{
33bd6f06 3100 return dm_suspended_md(ti->table->md);
64dbce58
KU
3101}
3102EXPORT_SYMBOL_GPL(dm_suspended);
3103
5df96f2b
MP
3104int dm_post_suspending(struct dm_target *ti)
3105{
33bd6f06 3106 return dm_post_suspending_md(ti->table->md);
5df96f2b
MP
3107}
3108EXPORT_SYMBOL_GPL(dm_post_suspending);
3109
2e93ccc1
KU
3110int dm_noflush_suspending(struct dm_target *ti)
3111{
33bd6f06 3112 return __noflush_suspending(ti->table->md);
2e93ccc1
KU
3113}
3114EXPORT_SYMBOL_GPL(dm_noflush_suspending);
3115
e6ee8c0b
KU
3116void dm_free_md_mempools(struct dm_md_mempools *pools)
3117{
3118 if (!pools)
3119 return;
3120
6f1c819c
KO
3121 bioset_exit(&pools->bs);
3122 bioset_exit(&pools->io_bs);
e6ee8c0b
KU
3123
3124 kfree(pools);
3125}
3126
9c72bad1
CH
3127struct dm_pr {
3128 u64 old_key;
3129 u64 new_key;
3130 u32 flags;
c6adada5 3131 bool abort;
9c72bad1 3132 bool fail_early;
8dd87f3c 3133 int ret;
70151087 3134 enum pr_type type;
9c72bad1
CH
3135};
3136
3137static int dm_call_pr(struct block_device *bdev, iterate_devices_callout_fn fn,
8dd87f3c 3138 struct dm_pr *pr)
71cdb697
CH
3139{
3140 struct mapped_device *md = bdev->bd_disk->private_data;
9c72bad1
CH
3141 struct dm_table *table;
3142 struct dm_target *ti;
3143 int ret = -ENOTTY, srcu_idx;
71cdb697 3144
9c72bad1
CH
3145 table = dm_get_live_table(md, &srcu_idx);
3146 if (!table || !dm_table_get_size(table))
3147 goto out;
71cdb697 3148
9c72bad1 3149 /* We only support devices that have a single target */
2aec377a 3150 if (table->num_targets != 1)
9c72bad1
CH
3151 goto out;
3152 ti = dm_table_get_target(table, 0);
71cdb697 3153
e120a5f1
MS
3154 if (dm_suspended_md(md)) {
3155 ret = -EAGAIN;
3156 goto out;
3157 }
3158
9c72bad1
CH
3159 ret = -EINVAL;
3160 if (!ti->type->iterate_devices)
3161 goto out;
3162
8dd87f3c
MC
3163 ti->type->iterate_devices(ti, fn, pr);
3164 ret = 0;
9c72bad1
CH
3165out:
3166 dm_put_live_table(md, srcu_idx);
3167 return ret;
3168}
3169
3170/*
3171 * For register / unregister we need to manually call out to every path.
3172 */
3173static int __dm_pr_register(struct dm_target *ti, struct dm_dev *dev,
3174 sector_t start, sector_t len, void *data)
3175{
3176 struct dm_pr *pr = data;
3177 const struct pr_ops *ops = dev->bdev->bd_disk->fops->pr_ops;
8dd87f3c
MC
3178 int ret;
3179
3180 if (!ops || !ops->pr_register) {
3181 pr->ret = -EOPNOTSUPP;
3182 return -1;
3183 }
9c72bad1 3184
8dd87f3c
MC
3185 ret = ops->pr_register(dev->bdev, pr->old_key, pr->new_key, pr->flags);
3186 if (!ret)
3187 return 0;
3188
3189 if (!pr->ret)
3190 pr->ret = ret;
9c72bad1 3191
8dd87f3c
MC
3192 if (pr->fail_early)
3193 return -1;
3194
3195 return 0;
9c72bad1
CH
3196}
3197
3198static int dm_pr_register(struct block_device *bdev, u64 old_key, u64 new_key,
3199 u32 flags)
3200{
3201 struct dm_pr pr = {
3202 .old_key = old_key,
3203 .new_key = new_key,
3204 .flags = flags,
3205 .fail_early = true,
8dd87f3c 3206 .ret = 0,
9c72bad1
CH
3207 };
3208 int ret;
3209
3210 ret = dm_call_pr(bdev, __dm_pr_register, &pr);
8dd87f3c
MC
3211 if (ret) {
3212 /* Didn't even get to register a path */
3213 return ret;
9c72bad1
CH
3214 }
3215
8dd87f3c
MC
3216 if (!pr.ret)
3217 return 0;
3218 ret = pr.ret;
3219
3220 if (!new_key)
3221 return ret;
3222
3223 /* unregister all paths if we failed to register any path */
3224 pr.old_key = new_key;
3225 pr.new_key = 0;
3226 pr.flags = 0;
3227 pr.fail_early = false;
3228 (void) dm_call_pr(bdev, __dm_pr_register, &pr);
9c72bad1 3229 return ret;
71cdb697
CH
3230}
3231
70151087
MC
3232
3233static int __dm_pr_reserve(struct dm_target *ti, struct dm_dev *dev,
3234 sector_t start, sector_t len, void *data)
3235{
3236 struct dm_pr *pr = data;
3237 const struct pr_ops *ops = dev->bdev->bd_disk->fops->pr_ops;
3238
3239 if (!ops || !ops->pr_reserve) {
3240 pr->ret = -EOPNOTSUPP;
3241 return -1;
3242 }
3243
3244 pr->ret = ops->pr_reserve(dev->bdev, pr->old_key, pr->type, pr->flags);
3245 if (!pr->ret)
3246 return -1;
3247
3248 return 0;
3249}
3250
71cdb697 3251static int dm_pr_reserve(struct block_device *bdev, u64 key, enum pr_type type,
956a4025 3252 u32 flags)
71cdb697 3253{
70151087
MC
3254 struct dm_pr pr = {
3255 .old_key = key,
3256 .flags = flags,
3257 .type = type,
3258 .fail_early = false,
3259 .ret = 0,
3260 };
3261 int ret;
71cdb697 3262
70151087
MC
3263 ret = dm_call_pr(bdev, __dm_pr_reserve, &pr);
3264 if (ret)
3265 return ret;
71cdb697 3266
70151087 3267 return pr.ret;
71cdb697
CH
3268}
3269
08a3c338
MC
3270/*
3271 * If there is a non-All Registrants type of reservation, the release must be
3272 * sent down the holding path. For the cases where there is no reservation or
3273 * the path is not the holder the device will also return success, so we must
3274 * try each path to make sure we got the correct path.
3275 */
3276static int __dm_pr_release(struct dm_target *ti, struct dm_dev *dev,
3277 sector_t start, sector_t len, void *data)
3278{
3279 struct dm_pr *pr = data;
3280 const struct pr_ops *ops = dev->bdev->bd_disk->fops->pr_ops;
3281
3282 if (!ops || !ops->pr_release) {
3283 pr->ret = -EOPNOTSUPP;
3284 return -1;
3285 }
3286
3287 pr->ret = ops->pr_release(dev->bdev, pr->old_key, pr->type);
3288 if (pr->ret)
3289 return -1;
3290
3291 return 0;
71cdb697
CH
3292}
3293
3294static int dm_pr_release(struct block_device *bdev, u64 key, enum pr_type type)
3295{
08a3c338
MC
3296 struct dm_pr pr = {
3297 .old_key = key,
3298 .type = type,
3299 .fail_early = false,
3300 };
3301 int ret;
71cdb697 3302
08a3c338
MC
3303 ret = dm_call_pr(bdev, __dm_pr_release, &pr);
3304 if (ret)
3305 return ret;
71cdb697 3306
08a3c338 3307 return pr.ret;
71cdb697
CH
3308}
3309
c6adada5
MC
3310static int __dm_pr_preempt(struct dm_target *ti, struct dm_dev *dev,
3311 sector_t start, sector_t len, void *data)
3312{
3313 struct dm_pr *pr = data;
3314 const struct pr_ops *ops = dev->bdev->bd_disk->fops->pr_ops;
3315
3316 if (!ops || !ops->pr_preempt) {
3317 pr->ret = -EOPNOTSUPP;
3318 return -1;
3319 }
3320
3321 pr->ret = ops->pr_preempt(dev->bdev, pr->old_key, pr->new_key, pr->type,
3322 pr->abort);
3323 if (!pr->ret)
3324 return -1;
3325
3326 return 0;
71cdb697
CH
3327}
3328
3329static int dm_pr_preempt(struct block_device *bdev, u64 old_key, u64 new_key,
956a4025 3330 enum pr_type type, bool abort)
71cdb697 3331{
c6adada5
MC
3332 struct dm_pr pr = {
3333 .new_key = new_key,
3334 .old_key = old_key,
3335 .type = type,
3336 .fail_early = false,
3337 };
3338 int ret;
71cdb697 3339
c6adada5
MC
3340 ret = dm_call_pr(bdev, __dm_pr_preempt, &pr);
3341 if (ret)
3342 return ret;
71cdb697 3343
c6adada5 3344 return pr.ret;
71cdb697
CH
3345}
3346
3347static int dm_pr_clear(struct block_device *bdev, u64 key)
3348{
3349 struct mapped_device *md = bdev->bd_disk->private_data;
3350 const struct pr_ops *ops;
971888c4 3351 int r, srcu_idx;
71cdb697 3352
5bd5e8d8 3353 r = dm_prepare_ioctl(md, &srcu_idx, &bdev);
71cdb697 3354 if (r < 0)
971888c4 3355 goto out;
71cdb697
CH
3356
3357 ops = bdev->bd_disk->fops->pr_ops;
3358 if (ops && ops->pr_clear)
3359 r = ops->pr_clear(bdev, key);
3360 else
3361 r = -EOPNOTSUPP;
971888c4
MS
3362out:
3363 dm_unprepare_ioctl(md, srcu_idx);
71cdb697
CH
3364 return r;
3365}
3366
3367static const struct pr_ops dm_pr_ops = {
3368 .pr_register = dm_pr_register,
3369 .pr_reserve = dm_pr_reserve,
3370 .pr_release = dm_pr_release,
3371 .pr_preempt = dm_pr_preempt,
3372 .pr_clear = dm_pr_clear,
3373};
3374
83d5cde4 3375static const struct block_device_operations dm_blk_dops = {
c62b37d9 3376 .submit_bio = dm_submit_bio,
b99fdcdc 3377 .poll_bio = dm_poll_bio,
1da177e4
LT
3378 .open = dm_blk_open,
3379 .release = dm_blk_close,
aa129a22 3380 .ioctl = dm_blk_ioctl,
3ac51e74 3381 .getgeo = dm_blk_getgeo,
e76239a3 3382 .report_zones = dm_blk_report_zones,
71cdb697 3383 .pr_ops = &dm_pr_ops,
1da177e4
LT
3384 .owner = THIS_MODULE
3385};
3386
681cc5e8
MS
3387static const struct block_device_operations dm_rq_blk_dops = {
3388 .open = dm_blk_open,
3389 .release = dm_blk_close,
3390 .ioctl = dm_blk_ioctl,
3391 .getgeo = dm_blk_getgeo,
3392 .pr_ops = &dm_pr_ops,
3393 .owner = THIS_MODULE
3394};
3395
f26c5719
DW
3396static const struct dax_operations dm_dax_ops = {
3397 .direct_access = dm_dax_direct_access,
cdf6cdcd 3398 .zero_page_range = dm_dax_zero_page_range,
047218ec 3399 .recovery_write = dm_dax_recovery_write,
f26c5719
DW
3400};
3401
1da177e4
LT
3402/*
3403 * module hooks
3404 */
3405module_init(dm_init);
3406module_exit(dm_exit);
3407
3408module_param(major, uint, 0);
3409MODULE_PARM_DESC(major, "The major number of the device mapper");
f4790826 3410
6a808034 3411module_param(reserved_bio_based_ios, uint, 0644);
e8603136
MS
3412MODULE_PARM_DESC(reserved_bio_based_ios, "Reserved IOs in bio-based mempools");
3413
6a808034 3414module_param(dm_numa_node, int, 0644);
115485e8
MS
3415MODULE_PARM_DESC(dm_numa_node, "NUMA node for DM device memory allocations");
3416
6a808034 3417module_param(swap_bios, int, 0644);
a666e5c0
MP
3418MODULE_PARM_DESC(swap_bios, "Maximum allowed inflight swap IOs");
3419
1da177e4
LT
3420MODULE_DESCRIPTION(DM_NAME " driver");
3421MODULE_AUTHOR("Joe Thornber <dm-devel@redhat.com>");
3422MODULE_LICENSE("GPL");