bcache: Convert to bdev_open_by_path()
[linux-block.git] / drivers / md / dm.c
CommitLineData
3bd94003 1// SPDX-License-Identifier: GPL-2.0-only
1da177e4
LT
2/*
3 * Copyright (C) 2001, 2002 Sistina Software (UK) Limited.
784aae73 4 * Copyright (C) 2004-2008 Red Hat, Inc. All rights reserved.
1da177e4
LT
5 *
6 * This file is released under the GPL.
7 */
8
4cc96131
MS
9#include "dm-core.h"
10#include "dm-rq.h"
51e5b2bd 11#include "dm-uevent.h"
91ccbbac 12#include "dm-ima.h"
1da177e4
LT
13
14#include <linux/init.h>
15#include <linux/module.h>
48c9c27b 16#include <linux/mutex.h>
6958c1c6 17#include <linux/sched/mm.h>
174cd4b1 18#include <linux/sched/signal.h>
1da177e4
LT
19#include <linux/blkpg.h>
20#include <linux/bio.h>
1da177e4 21#include <linux/mempool.h>
f26c5719 22#include <linux/dax.h>
1da177e4
LT
23#include <linux/slab.h>
24#include <linux/idr.h>
7e026c8c 25#include <linux/uio.h>
3ac51e74 26#include <linux/hdreg.h>
3f77316d 27#include <linux/delay.h>
ffcc3936 28#include <linux/wait.h>
71cdb697 29#include <linux/pr.h>
b0b4d7c6 30#include <linux/refcount.h>
c6a564ff 31#include <linux/part_stat.h>
a892c8d5 32#include <linux/blk-crypto.h>
1e8d44bd 33#include <linux/blk-crypto-profile.h>
55782138 34
72d94861
AK
35#define DM_MSG_PREFIX "core"
36
60935eb2
MB
37/*
38 * Cookies are numeric values sent with CHANGE and REMOVE
39 * uevents while resuming, removing or renaming the device.
40 */
41#define DM_COOKIE_ENV_VAR_NAME "DM_COOKIE"
42#define DM_COOKIE_LENGTH 24
43
b99fdcdc
ML
44/*
45 * For REQ_POLLED fs bio, this flag is set if we link mapped underlying
46 * dm_io into one list, and reuse bio->bi_private as the list head. Before
47 * ending this fs bio, we will recover its ->bi_private.
48 */
49#define REQ_DM_POLL_LIST REQ_DRV
50
1da177e4
LT
51static const char *_name = DM_NAME;
52
2f06cd12
HM
53static unsigned int major;
54static unsigned int _major;
1da177e4 55
d15b774c
AK
56static DEFINE_IDR(_minor_idr);
57
f32c10b0 58static DEFINE_SPINLOCK(_minor_lock);
2c140a24
MP
59
60static void do_deferred_remove(struct work_struct *w);
61
62static DECLARE_WORK(deferred_remove_work, do_deferred_remove);
63
acfe0ad7
MP
64static struct workqueue_struct *deferred_remove_workqueue;
65
93e6442c
MP
66atomic_t dm_global_event_nr = ATOMIC_INIT(0);
67DECLARE_WAIT_QUEUE_HEAD(dm_global_eventq);
68
62e08243
MP
69void dm_issue_global_event(void)
70{
71 atomic_inc(&dm_global_event_nr);
72 wake_up(&dm_global_eventq);
73}
74
442761fd
MS
75DEFINE_STATIC_KEY_FALSE(stats_enabled);
76DEFINE_STATIC_KEY_FALSE(swap_bios_enabled);
77DEFINE_STATIC_KEY_FALSE(zoned_enabled);
78
1da177e4 79/*
64f52b0e 80 * One of these is allocated (on-stack) per original bio.
1da177e4 81 */
64f52b0e 82struct clone_info {
64f52b0e
MS
83 struct dm_table *map;
84 struct bio *bio;
85 struct dm_io *io;
86 sector_t sector;
86a3238c 87 unsigned int sector_count;
4edadf6d
MS
88 bool is_abnormal_io:1;
89 bool submit_as_polled:1;
64f52b0e
MS
90};
91
6c23f0bd
CH
92static inline struct dm_target_io *clone_to_tio(struct bio *clone)
93{
94 return container_of(clone, struct dm_target_io, clone);
95}
96
64f52b0e
MS
97void *dm_per_bio_data(struct bio *bio, size_t data_size)
98{
655f3aad 99 if (!dm_tio_flagged(clone_to_tio(bio), DM_TIO_INSIDE_DM_IO))
62f26317
JX
100 return (char *)bio - DM_TARGET_IO_BIO_OFFSET - data_size;
101 return (char *)bio - DM_IO_BIO_OFFSET - data_size;
64f52b0e
MS
102}
103EXPORT_SYMBOL_GPL(dm_per_bio_data);
104
105struct bio *dm_bio_from_per_bio_data(void *data, size_t data_size)
106{
107 struct dm_io *io = (struct dm_io *)((char *)data + data_size);
b30f1607 108
64f52b0e 109 if (io->magic == DM_IO_MAGIC)
62f26317 110 return (struct bio *)((char *)io + DM_IO_BIO_OFFSET);
64f52b0e 111 BUG_ON(io->magic != DM_TIO_MAGIC);
62f26317 112 return (struct bio *)((char *)io + DM_TARGET_IO_BIO_OFFSET);
64f52b0e
MS
113}
114EXPORT_SYMBOL_GPL(dm_bio_from_per_bio_data);
115
86a3238c 116unsigned int dm_bio_get_target_bio_nr(const struct bio *bio)
64f52b0e
MS
117{
118 return container_of(bio, struct dm_target_io, clone)->target_bio_nr;
119}
120EXPORT_SYMBOL_GPL(dm_bio_get_target_bio_nr);
121
ba61fdd1
JM
122#define MINOR_ALLOCED ((void *)-1)
123
115485e8 124#define DM_NUMA_NODE NUMA_NO_NODE
115485e8 125static int dm_numa_node = DM_NUMA_NODE;
faad87df 126
a666e5c0
MP
127#define DEFAULT_SWAP_BIOS (8 * 1048576 / PAGE_SIZE)
128static int swap_bios = DEFAULT_SWAP_BIOS;
129static int get_swap_bios(void)
130{
131 int latch = READ_ONCE(swap_bios);
b30f1607 132
a666e5c0
MP
133 if (unlikely(latch <= 0))
134 latch = DEFAULT_SWAP_BIOS;
135 return latch;
136}
137
86f1152b
BM
138struct table_device {
139 struct list_head list;
b0b4d7c6 140 refcount_t count;
86f1152b
BM
141 struct dm_dev dm_dev;
142};
143
e8603136
MS
144/*
145 * Bio-based DM's mempools' reserved IOs set by the user.
146 */
4cc96131 147#define RESERVED_BIO_BASED_IOS 16
86a3238c 148static unsigned int reserved_bio_based_ios = RESERVED_BIO_BASED_IOS;
e8603136 149
115485e8
MS
150static int __dm_get_module_param_int(int *module_param, int min, int max)
151{
6aa7de05 152 int param = READ_ONCE(*module_param);
115485e8
MS
153 int modified_param = 0;
154 bool modified = true;
155
156 if (param < min)
157 modified_param = min;
158 else if (param > max)
159 modified_param = max;
160 else
161 modified = false;
162
163 if (modified) {
164 (void)cmpxchg(module_param, param, modified_param);
165 param = modified_param;
166 }
167
168 return param;
169}
170
86a3238c 171unsigned int __dm_get_module_param(unsigned int *module_param, unsigned int def, unsigned int max)
f4790826 172{
86a3238c
HM
173 unsigned int param = READ_ONCE(*module_param);
174 unsigned int modified_param = 0;
f4790826 175
09c2d531
MS
176 if (!param)
177 modified_param = def;
178 else if (param > max)
179 modified_param = max;
f4790826 180
09c2d531
MS
181 if (modified_param) {
182 (void)cmpxchg(module_param, param, modified_param);
183 param = modified_param;
f4790826
MS
184 }
185
09c2d531 186 return param;
f4790826
MS
187}
188
86a3238c 189unsigned int dm_get_reserved_bio_based_ios(void)
e8603136 190{
09c2d531 191 return __dm_get_module_param(&reserved_bio_based_ios,
4cc96131 192 RESERVED_BIO_BASED_IOS, DM_RESERVED_MAX_IOS);
e8603136
MS
193}
194EXPORT_SYMBOL_GPL(dm_get_reserved_bio_based_ios);
195
86a3238c 196static unsigned int dm_get_numa_node(void)
115485e8
MS
197{
198 return __dm_get_module_param_int(&dm_numa_node,
199 DM_NUMA_NODE, num_online_nodes() - 1);
200}
201
1da177e4
LT
202static int __init local_init(void)
203{
e689fbab 204 int r;
1ae49ea2 205
51e5b2bd 206 r = dm_uevent_init();
51157b4a 207 if (r)
e689fbab 208 return r;
51e5b2bd 209
57bbf99c 210 deferred_remove_workqueue = alloc_ordered_workqueue("kdmremove", 0);
acfe0ad7
MP
211 if (!deferred_remove_workqueue) {
212 r = -ENOMEM;
213 goto out_uevent_exit;
214 }
215
1da177e4
LT
216 _major = major;
217 r = register_blkdev(_major, _name);
51157b4a 218 if (r < 0)
acfe0ad7 219 goto out_free_workqueue;
1da177e4
LT
220
221 if (!_major)
222 _major = r;
223
224 return 0;
51157b4a 225
acfe0ad7
MP
226out_free_workqueue:
227 destroy_workqueue(deferred_remove_workqueue);
51157b4a
KU
228out_uevent_exit:
229 dm_uevent_exit();
51157b4a
KU
230
231 return r;
1da177e4
LT
232}
233
234static void local_exit(void)
235{
acfe0ad7 236 destroy_workqueue(deferred_remove_workqueue);
2c140a24 237
00d59405 238 unregister_blkdev(_major, _name);
51e5b2bd 239 dm_uevent_exit();
1da177e4
LT
240
241 _major = 0;
242
243 DMINFO("cleaned up");
244}
245
b9249e55 246static int (*_inits[])(void) __initdata = {
1da177e4
LT
247 local_init,
248 dm_target_init,
249 dm_linear_init,
250 dm_stripe_init,
952b3557 251 dm_io_init,
945fa4d2 252 dm_kcopyd_init,
1da177e4 253 dm_interface_init,
fd2ed4d2 254 dm_statistics_init,
1da177e4
LT
255};
256
b9249e55 257static void (*_exits[])(void) = {
1da177e4
LT
258 local_exit,
259 dm_target_exit,
260 dm_linear_exit,
261 dm_stripe_exit,
952b3557 262 dm_io_exit,
945fa4d2 263 dm_kcopyd_exit,
1da177e4 264 dm_interface_exit,
fd2ed4d2 265 dm_statistics_exit,
1da177e4
LT
266};
267
268static int __init dm_init(void)
269{
270 const int count = ARRAY_SIZE(_inits);
1da177e4
LT
271 int r, i;
272
f1cd6cb2
TS
273#if (IS_ENABLED(CONFIG_IMA) && !IS_ENABLED(CONFIG_IMA_DISABLE_HTABLE))
274 DMWARN("CONFIG_IMA_DISABLE_HTABLE is disabled."
275 " Duplicate IMA measurements will not be recorded in the IMA log.");
276#endif
277
1da177e4
LT
278 for (i = 0; i < count; i++) {
279 r = _inits[i]();
280 if (r)
281 goto bad;
282 }
283
284 return 0;
f1cd6cb2 285bad:
1da177e4
LT
286 while (i--)
287 _exits[i]();
288
289 return r;
290}
291
292static void __exit dm_exit(void)
293{
294 int i = ARRAY_SIZE(_exits);
295
296 while (i--)
297 _exits[i]();
d15b774c
AK
298
299 /*
300 * Should be empty by this point.
301 */
d15b774c 302 idr_destroy(&_minor_idr);
1da177e4
LT
303}
304
305/*
306 * Block device functions
307 */
432a212c
MA
308int dm_deleting_md(struct mapped_device *md)
309{
310 return test_bit(DMF_DELETING, &md->flags);
311}
312
05bdb996 313static int dm_blk_open(struct gendisk *disk, blk_mode_t mode)
1da177e4
LT
314{
315 struct mapped_device *md;
316
fba9f90e
JM
317 spin_lock(&_minor_lock);
318
d32e2bf8 319 md = disk->private_data;
fba9f90e
JM
320 if (!md)
321 goto out;
322
5c6bd75d 323 if (test_bit(DMF_FREEING, &md->flags) ||
432a212c 324 dm_deleting_md(md)) {
fba9f90e
JM
325 md = NULL;
326 goto out;
327 }
328
1da177e4 329 dm_get(md);
5c6bd75d 330 atomic_inc(&md->open_count);
fba9f90e
JM
331out:
332 spin_unlock(&_minor_lock);
333
334 return md ? 0 : -ENXIO;
1da177e4
LT
335}
336
ae220766 337static void dm_blk_close(struct gendisk *disk)
1da177e4 338{
63a4f065 339 struct mapped_device *md;
6e9624b8 340
4a1aeb98
MB
341 spin_lock(&_minor_lock);
342
63a4f065
MS
343 md = disk->private_data;
344 if (WARN_ON(!md))
345 goto out;
346
2c140a24
MP
347 if (atomic_dec_and_test(&md->open_count) &&
348 (test_bit(DMF_DEFERRED_REMOVE, &md->flags)))
acfe0ad7 349 queue_work(deferred_remove_workqueue, &deferred_remove_work);
2c140a24 350
1da177e4 351 dm_put(md);
63a4f065 352out:
4a1aeb98 353 spin_unlock(&_minor_lock);
1da177e4
LT
354}
355
5c6bd75d
AK
356int dm_open_count(struct mapped_device *md)
357{
358 return atomic_read(&md->open_count);
359}
360
361/*
362 * Guarantees nothing is using the device before it's deleted.
363 */
2c140a24 364int dm_lock_for_deletion(struct mapped_device *md, bool mark_deferred, bool only_deferred)
5c6bd75d
AK
365{
366 int r = 0;
367
368 spin_lock(&_minor_lock);
369
2c140a24 370 if (dm_open_count(md)) {
5c6bd75d 371 r = -EBUSY;
2c140a24
MP
372 if (mark_deferred)
373 set_bit(DMF_DEFERRED_REMOVE, &md->flags);
374 } else if (only_deferred && !test_bit(DMF_DEFERRED_REMOVE, &md->flags))
375 r = -EEXIST;
5c6bd75d
AK
376 else
377 set_bit(DMF_DELETING, &md->flags);
378
379 spin_unlock(&_minor_lock);
380
381 return r;
382}
383
2c140a24
MP
384int dm_cancel_deferred_remove(struct mapped_device *md)
385{
386 int r = 0;
387
388 spin_lock(&_minor_lock);
389
390 if (test_bit(DMF_DELETING, &md->flags))
391 r = -EBUSY;
392 else
393 clear_bit(DMF_DEFERRED_REMOVE, &md->flags);
394
395 spin_unlock(&_minor_lock);
396
397 return r;
398}
399
400static void do_deferred_remove(struct work_struct *w)
401{
402 dm_deferred_remove();
403}
404
3ac51e74
DW
405static int dm_blk_getgeo(struct block_device *bdev, struct hd_geometry *geo)
406{
407 struct mapped_device *md = bdev->bd_disk->private_data;
408
409 return dm_get_geometry(md, geo);
410}
411
971888c4 412static int dm_prepare_ioctl(struct mapped_device *md, int *srcu_idx,
5bd5e8d8 413 struct block_device **bdev)
aa129a22 414{
564b5c54 415 struct dm_target *ti;
6c182cd8 416 struct dm_table *map;
971888c4 417 int r;
aa129a22 418
6c182cd8 419retry:
e56f81e0 420 r = -ENOTTY;
971888c4 421 map = dm_get_live_table(md, srcu_idx);
aa129a22 422 if (!map || !dm_table_get_size(map))
971888c4 423 return r;
aa129a22
MB
424
425 /* We only support devices that have a single target */
2aec377a 426 if (map->num_targets != 1)
971888c4 427 return r;
aa129a22 428
564b5c54
MS
429 ti = dm_table_get_target(map, 0);
430 if (!ti->type->prepare_ioctl)
971888c4 431 return r;
519049af 432
971888c4
MS
433 if (dm_suspended_md(md))
434 return -EAGAIN;
aa129a22 435
564b5c54 436 r = ti->type->prepare_ioctl(ti, bdev);
5bbbfdf6 437 if (r == -ENOTCONN && !fatal_signal_pending(current)) {
971888c4 438 dm_put_live_table(md, *srcu_idx);
238d991f 439 fsleep(10000);
6c182cd8
HR
440 goto retry;
441 }
971888c4 442
e56f81e0
CH
443 return r;
444}
445
971888c4 446static void dm_unprepare_ioctl(struct mapped_device *md, int srcu_idx)
971888c4
MS
447{
448 dm_put_live_table(md, srcu_idx);
449}
450
05bdb996 451static int dm_blk_ioctl(struct block_device *bdev, blk_mode_t mode,
e56f81e0
CH
452 unsigned int cmd, unsigned long arg)
453{
454 struct mapped_device *md = bdev->bd_disk->private_data;
971888c4 455 int r, srcu_idx;
e56f81e0 456
5bd5e8d8 457 r = dm_prepare_ioctl(md, &srcu_idx, &bdev);
e56f81e0 458 if (r < 0)
971888c4 459 goto out;
6c182cd8 460
e56f81e0
CH
461 if (r > 0) {
462 /*
e980f623
CH
463 * Target determined this ioctl is being issued against a
464 * subset of the parent bdev; require extra privileges.
e56f81e0 465 */
e980f623 466 if (!capable(CAP_SYS_RAWIO)) {
0378c625 467 DMDEBUG_LIMIT(
e980f623
CH
468 "%s: sending ioctl %x to DM device without required privilege.",
469 current->comm, cmd);
470 r = -ENOIOCTLCMD;
e56f81e0 471 goto out;
e980f623 472 }
e56f81e0 473 }
6c182cd8 474
a7cb3d2f
CH
475 if (!bdev->bd_disk->fops->ioctl)
476 r = -ENOTTY;
477 else
478 r = bdev->bd_disk->fops->ioctl(bdev, mode, cmd, arg);
e56f81e0 479out:
971888c4 480 dm_unprepare_ioctl(md, srcu_idx);
aa129a22
MB
481 return r;
482}
483
7465d7ac
MS
484u64 dm_start_time_ns_from_clone(struct bio *bio)
485{
6c23f0bd 486 return jiffies_to_nsecs(clone_to_tio(bio)->io->start_time);
7465d7ac
MS
487}
488EXPORT_SYMBOL_GPL(dm_start_time_ns_from_clone);
489
06eed768 490static inline bool bio_is_flush_with_data(struct bio *bio)
7465d7ac 491{
8d394bc4
MS
492 return ((bio->bi_opf & REQ_PREFLUSH) && bio->bi_iter.bi_size);
493}
494
06eed768 495static inline unsigned int dm_io_sectors(struct dm_io *io, struct bio *bio)
8d394bc4 496{
d3de6d12
ML
497 /*
498 * If REQ_PREFLUSH set, don't account payload, it will be
499 * submitted (and accounted) after this flush completes.
500 */
501 if (bio_is_flush_with_data(bio))
06eed768
MS
502 return 0;
503 if (unlikely(dm_io_flagged(io, DM_IO_WAS_SPLIT)))
504 return io->sectors;
505 return bio_sectors(bio);
506}
8d394bc4 507
06eed768
MS
508static void dm_io_acct(struct dm_io *io, bool end)
509{
510 struct bio *bio = io->orig_bio;
8d394bc4 511
526d1006
LN
512 if (dm_io_flagged(io, DM_IO_BLK_STAT)) {
513 if (!end)
514 bdev_start_io_acct(bio->bi_bdev, bio_op(bio),
06eed768 515 io->start_time);
526d1006
LN
516 else
517 bdev_end_io_acct(bio->bi_bdev, bio_op(bio),
06eed768
MS
518 dm_io_sectors(io, bio),
519 io->start_time);
526d1006 520 }
7465d7ac 521
442761fd 522 if (static_branch_unlikely(&stats_enabled) &&
06eed768 523 unlikely(dm_stats_used(&io->md->stats))) {
7dd76d1f
ML
524 sector_t sector;
525
06eed768 526 if (unlikely(dm_io_flagged(io, DM_IO_WAS_SPLIT)))
7dd76d1f 527 sector = bio_end_sector(bio) - io->sector_offset;
06eed768
MS
528 else
529 sector = bio->bi_iter.bi_sector;
7dd76d1f 530
06eed768
MS
531 dm_stats_account_io(&io->md->stats, bio_data_dir(bio),
532 sector, dm_io_sectors(io, bio),
533 end, io->start_time, &io->stats_aux);
7dd76d1f 534 }
8d394bc4
MS
535}
536
b992b40d 537static void __dm_start_io_acct(struct dm_io *io)
8d394bc4 538{
e6926ad0 539 dm_io_acct(io, false);
7465d7ac
MS
540}
541
0fbb4d93 542static void dm_start_io_acct(struct dm_io *io, struct bio *clone)
7465d7ac 543{
0fbb4d93
MS
544 /*
545 * Ensure IO accounting is only ever started once.
0fbb4d93 546 */
3b03f7c1
MS
547 if (dm_io_flagged(io, DM_IO_ACCOUNTED))
548 return;
549
550 /* Expect no possibility for race unless DM_TIO_IS_DUPLICATE_BIO. */
551 if (!clone || likely(dm_tio_is_normal(clone_to_tio(clone)))) {
82f6cdcc
MS
552 dm_io_set_flag(io, DM_IO_ACCOUNTED);
553 } else {
554 unsigned long flags;
655f3aad 555 /* Can afford locking given DM_TIO_IS_DUPLICATE_BIO */
4d7bca13 556 spin_lock_irqsave(&io->lock, flags);
10eb3a0d
BM
557 if (dm_io_flagged(io, DM_IO_ACCOUNTED)) {
558 spin_unlock_irqrestore(&io->lock, flags);
559 return;
560 }
82f6cdcc 561 dm_io_set_flag(io, DM_IO_ACCOUNTED);
4d7bca13 562 spin_unlock_irqrestore(&io->lock, flags);
82f6cdcc 563 }
7465d7ac 564
b992b40d 565 __dm_start_io_acct(io);
0fbb4d93 566}
7465d7ac 567
b992b40d 568static void dm_end_io_acct(struct dm_io *io)
0fbb4d93 569{
e6926ad0 570 dm_io_acct(io, true);
7465d7ac 571}
978e51ba
MS
572
573static struct dm_io *alloc_io(struct mapped_device *md, struct bio *bio)
1da177e4 574{
64f52b0e
MS
575 struct dm_io *io;
576 struct dm_target_io *tio;
577 struct bio *clone;
578
29dec90a 579 clone = bio_alloc_clone(NULL, bio, GFP_NOIO, &md->mempools->io_bs);
6c23f0bd 580 tio = clone_to_tio(clone);
655f3aad
MS
581 tio->flags = 0;
582 dm_tio_set_flag(tio, DM_TIO_INSIDE_DM_IO);
64f52b0e
MS
583 tio->io = NULL;
584
585 io = container_of(tio, struct dm_io, tio);
586 io->magic = DM_IO_MAGIC;
84b98f4c 587 io->status = BLK_STS_OK;
0f14d60a
ML
588
589 /* one ref is for submission, the other is for completion */
590 atomic_set(&io->io_count, 2);
9f6dc633 591 this_cpu_inc(*md->pending_io);
7dd76d1f 592 io->orig_bio = bio;
978e51ba 593 io->md = md;
4d7bca13 594 spin_lock_init(&io->lock);
b879f915 595 io->start_time = jiffies;
82f6cdcc 596 io->flags = 0;
526d1006
LN
597 if (blk_queue_io_stat(md->queue))
598 dm_io_set_flag(io, DM_IO_BLK_STAT);
64f52b0e 599
c4f512d2
MS
600 if (static_branch_unlikely(&stats_enabled) &&
601 unlikely(dm_stats_used(&md->stats)))
442761fd 602 dm_stats_record_start(&md->stats, &io->stats_aux);
64f52b0e
MS
603
604 return io;
1da177e4
LT
605}
606
0119ab14 607static void free_io(struct dm_io *io)
1da177e4 608{
64f52b0e
MS
609 bio_put(&io->tio.clone);
610}
611
1d1068ce 612static struct bio *alloc_tio(struct clone_info *ci, struct dm_target *ti,
86a3238c 613 unsigned int target_bio_nr, unsigned int *len, gfp_t gfp_mask)
64f52b0e 614{
9dd1cd32 615 struct mapped_device *md = ci->io->md;
64f52b0e 616 struct dm_target_io *tio;
018b05eb 617 struct bio *clone;
64f52b0e
MS
618
619 if (!ci->io->tio.io) {
620 /* the dm_target_io embedded in ci->io is available */
621 tio = &ci->io->tio;
018b05eb
MS
622 /* alloc_io() already initialized embedded clone */
623 clone = &tio->clone;
64f52b0e 624 } else {
29dec90a
CH
625 clone = bio_alloc_clone(NULL, ci->bio, gfp_mask,
626 &md->mempools->bs);
64f52b0e
MS
627 if (!clone)
628 return NULL;
629
b99fdcdc
ML
630 /* REQ_DM_POLL_LIST shouldn't be inherited */
631 clone->bi_opf &= ~REQ_DM_POLL_LIST;
632
6c23f0bd 633 tio = clone_to_tio(clone);
655f3aad 634 tio->flags = 0; /* also clears DM_TIO_INSIDE_DM_IO */
64f52b0e
MS
635 }
636
637 tio->magic = DM_TIO_MAGIC;
638 tio->io = ci->io;
639 tio->ti = ti;
640 tio->target_bio_nr = target_bio_nr;
dc8e2021 641 tio->len_ptr = len;
743598f0 642 tio->old_sector = 0;
64f52b0e 643
9dd1cd32
MS
644 /* Set default bdev, but target must bio_set_dev() before issuing IO */
645 clone->bi_bdev = md->disk->part0;
646 if (unlikely(ti->needs_bio_set_dev))
647 bio_set_dev(clone, md->disk->part0);
648
018b05eb
MS
649 if (len) {
650 clone->bi_iter.bi_size = to_bytes(*len);
651 if (bio_integrity(clone))
652 bio_integrity_trim(clone);
653 }
64f52b0e 654
018b05eb 655 return clone;
1da177e4
LT
656}
657
1d1068ce 658static void free_tio(struct bio *clone)
1da177e4 659{
655f3aad 660 if (dm_tio_flagged(clone_to_tio(clone), DM_TIO_INSIDE_DM_IO))
64f52b0e 661 return;
1d1068ce 662 bio_put(clone);
1da177e4
LT
663}
664
665/*
666 * Add the bio to the list of deferred io.
667 */
92c63902 668static void queue_io(struct mapped_device *md, struct bio *bio)
1da177e4 669{
05447420 670 unsigned long flags;
1da177e4 671
05447420 672 spin_lock_irqsave(&md->deferred_lock, flags);
1da177e4 673 bio_list_add(&md->deferred, bio);
05447420 674 spin_unlock_irqrestore(&md->deferred_lock, flags);
6a8736d1 675 queue_work(md->wq, &md->work);
1da177e4
LT
676}
677
678/*
679 * Everyone (including functions in this file), should use this
680 * function to access the md->map field, and make sure they call
83d5e5b0 681 * dm_put_live_table() when finished.
1da177e4 682 */
563a225c
MS
683struct dm_table *dm_get_live_table(struct mapped_device *md,
684 int *srcu_idx) __acquires(md->io_barrier)
1da177e4 685{
83d5e5b0
MP
686 *srcu_idx = srcu_read_lock(&md->io_barrier);
687
688 return srcu_dereference(md->map, &md->io_barrier);
689}
1da177e4 690
563a225c
MS
691void dm_put_live_table(struct mapped_device *md,
692 int srcu_idx) __releases(md->io_barrier)
83d5e5b0
MP
693{
694 srcu_read_unlock(&md->io_barrier, srcu_idx);
695}
696
697void dm_sync_table(struct mapped_device *md)
698{
699 synchronize_srcu(&md->io_barrier);
700 synchronize_rcu_expedited();
701}
702
703/*
704 * A fast alternative to dm_get_live_table/dm_put_live_table.
705 * The caller must not block between these two functions.
706 */
707static struct dm_table *dm_get_live_table_fast(struct mapped_device *md) __acquires(RCU)
708{
709 rcu_read_lock();
710 return rcu_dereference(md->map);
711}
1da177e4 712
83d5e5b0
MP
713static void dm_put_live_table_fast(struct mapped_device *md) __releases(RCU)
714{
715 rcu_read_unlock();
1da177e4
LT
716}
717
971888c4
MS
718static char *_dm_claim_ptr = "I belong to device-mapper";
719
86f1152b
BM
720/*
721 * Open a table device so we can use it as a map destination.
722 */
b9a785d2 723static struct table_device *open_table_device(struct mapped_device *md,
05bdb996 724 dev_t dev, blk_mode_t mode)
86f1152b 725{
b9a785d2 726 struct table_device *td;
86f1152b 727 struct block_device *bdev;
cd913c76 728 u64 part_off;
86f1152b
BM
729 int r;
730
b9a785d2
CH
731 td = kmalloc_node(sizeof(*td), GFP_KERNEL, md->numa_node_id);
732 if (!td)
733 return ERR_PTR(-ENOMEM);
734 refcount_set(&td->count, 1);
86f1152b 735
2736e8ee 736 bdev = blkdev_get_by_dev(dev, mode, _dm_claim_ptr, NULL);
b9a785d2
CH
737 if (IS_ERR(bdev)) {
738 r = PTR_ERR(bdev);
739 goto out_free_td;
740 }
86f1152b 741
1a581b72
CH
742 /*
743 * We can be called before the dm disk is added. In that case we can't
744 * register the holder relation here. It will be done once add_disk was
745 * called.
746 */
747 if (md->disk->slave_dir) {
748 r = bd_link_disk_holder(bdev, md->disk);
749 if (r)
750 goto out_blkdev_put;
751 }
86f1152b 752
b9a785d2 753 td->dm_dev.mode = mode;
86f1152b 754 td->dm_dev.bdev = bdev;
8012b866 755 td->dm_dev.dax_dev = fs_dax_get_by_bdev(bdev, &part_off, NULL, NULL);
b9a785d2
CH
756 format_dev_t(td->dm_dev.name, dev);
757 list_add(&td->list, &md->table_devices);
758 return td;
759
760out_blkdev_put:
2736e8ee 761 blkdev_put(bdev, _dm_claim_ptr);
b9a785d2
CH
762out_free_td:
763 kfree(td);
764 return ERR_PTR(r);
86f1152b
BM
765}
766
767/*
768 * Close a table device that we've been using.
769 */
770static void close_table_device(struct table_device *td, struct mapped_device *md)
771{
1a581b72
CH
772 if (md->disk->slave_dir)
773 bd_unlink_disk_holder(td->dm_dev.bdev, md->disk);
2736e8ee 774 blkdev_put(td->dm_dev.bdev, _dm_claim_ptr);
817bf402 775 put_dax(td->dm_dev.dax_dev);
7b586583
CH
776 list_del(&td->list);
777 kfree(td);
86f1152b
BM
778}
779
780static struct table_device *find_table_device(struct list_head *l, dev_t dev,
05bdb996 781 blk_mode_t mode)
8454fca4 782{
86f1152b
BM
783 struct table_device *td;
784
785 list_for_each_entry(td, l, list)
786 if (td->dm_dev.bdev->bd_dev == dev && td->dm_dev.mode == mode)
787 return td;
788
789 return NULL;
790}
791
05bdb996 792int dm_get_table_device(struct mapped_device *md, dev_t dev, blk_mode_t mode,
8454fca4
SS
793 struct dm_dev **result)
794{
86f1152b
BM
795 struct table_device *td;
796
797 mutex_lock(&md->table_devices_lock);
798 td = find_table_device(&md->table_devices, dev, mode);
799 if (!td) {
b9a785d2
CH
800 td = open_table_device(md, dev, mode);
801 if (IS_ERR(td)) {
86f1152b 802 mutex_unlock(&md->table_devices_lock);
b9a785d2 803 return PTR_ERR(td);
86f1152b 804 }
b0b4d7c6
ER
805 } else {
806 refcount_inc(&td->count);
86f1152b 807 }
86f1152b
BM
808 mutex_unlock(&md->table_devices_lock);
809
810 *result = &td->dm_dev;
811 return 0;
812}
86f1152b
BM
813
814void dm_put_table_device(struct mapped_device *md, struct dm_dev *d)
815{
816 struct table_device *td = container_of(d, struct table_device, dm_dev);
817
818 mutex_lock(&md->table_devices_lock);
7b586583 819 if (refcount_dec_and_test(&td->count))
86f1152b 820 close_table_device(td, md);
86f1152b
BM
821 mutex_unlock(&md->table_devices_lock);
822}
86f1152b 823
3ac51e74
DW
824/*
825 * Get the geometry associated with a dm device
826 */
827int dm_get_geometry(struct mapped_device *md, struct hd_geometry *geo)
828{
829 *geo = md->geometry;
830
831 return 0;
832}
833
834/*
835 * Set the geometry of a device.
836 */
837int dm_set_geometry(struct mapped_device *md, struct hd_geometry *geo)
838{
839 sector_t sz = (sector_t)geo->cylinders * geo->heads * geo->sectors;
840
841 if (geo->start > sz) {
43e6c111 842 DMERR("Start sector is beyond the geometry limits.");
3ac51e74
DW
843 return -EINVAL;
844 }
845
846 md->geometry = *geo;
847
848 return 0;
849}
850
2e93ccc1
KU
851static int __noflush_suspending(struct mapped_device *md)
852{
853 return test_bit(DMF_NOFLUSH_SUSPENDING, &md->flags);
854}
855
8b211aac 856static void dm_requeue_add_io(struct dm_io *io, bool first_stage)
1da177e4 857{
b35f8caa 858 struct mapped_device *md = io->md;
1da177e4 859
8b211aac
ML
860 if (first_stage) {
861 struct dm_io *next = md->requeue_list;
862
863 md->requeue_list = io;
864 io->next = next;
865 } else {
866 bio_list_add_head(&md->deferred, io->orig_bio);
867 }
868}
869
870static void dm_kick_requeue(struct mapped_device *md, bool first_stage)
871{
872 if (first_stage)
873 queue_work(md->wq, &md->requeue_work);
874 else
875 queue_work(md->wq, &md->work);
876}
877
444fe04f
ML
878/*
879 * Return true if the dm_io's original bio is requeued.
880 * io->status is updated with error if requeue disallowed.
881 */
8b211aac 882static bool dm_handle_requeue(struct dm_io *io, bool first_stage)
1da177e4 883{
8b211aac 884 struct bio *bio = io->orig_bio;
444fe04f
ML
885 bool handle_requeue = (io->status == BLK_STS_DM_REQUEUE);
886 bool handle_polled_eagain = ((io->status == BLK_STS_AGAIN) &&
887 (bio->bi_opf & REQ_POLLED));
888 struct mapped_device *md = io->md;
889 bool requeued = false;
1da177e4 890
444fe04f 891 if (handle_requeue || handle_polled_eagain) {
e2736347 892 unsigned long flags;
444fe04f
ML
893
894 if (bio->bi_opf & REQ_POLLED) {
895 /*
896 * Upper layer won't help us poll split bio
897 * (io->orig_bio may only reflect a subset of the
898 * pre-split original) so clear REQ_POLLED.
899 */
900 bio_clear_polled(bio);
901 }
902
e2736347 903 /*
444fe04f
ML
904 * Target requested pushing back the I/O or
905 * polled IO hit BLK_STS_AGAIN.
e2736347
MS
906 */
907 spin_lock_irqsave(&md->deferred_lock, flags);
444fe04f
ML
908 if ((__noflush_suspending(md) &&
909 !WARN_ON_ONCE(dm_is_zone_write(md, bio))) ||
8b211aac
ML
910 handle_polled_eagain || first_stage) {
911 dm_requeue_add_io(io, first_stage);
444fe04f 912 requeued = true;
e2736347 913 } else {
2e93ccc1 914 /*
e2736347
MS
915 * noflush suspend was interrupted or this is
916 * a write to a zoned target.
2e93ccc1 917 */
e2736347 918 io->status = BLK_STS_IOERR;
2e93ccc1 919 }
e2736347
MS
920 spin_unlock_irqrestore(&md->deferred_lock, flags);
921 }
2e93ccc1 922
444fe04f 923 if (requeued)
8b211aac 924 dm_kick_requeue(md, first_stage);
444fe04f
ML
925
926 return requeued;
927}
928
8b211aac 929static void __dm_io_complete(struct dm_io *io, bool first_stage)
444fe04f 930{
8b211aac 931 struct bio *bio = io->orig_bio;
444fe04f
ML
932 struct mapped_device *md = io->md;
933 blk_status_t io_error;
934 bool requeued;
935
8b211aac
ML
936 requeued = dm_handle_requeue(io, first_stage);
937 if (requeued && first_stage)
938 return;
444fe04f 939
e2736347 940 io_error = io->status;
82f6cdcc 941 if (dm_io_flagged(io, DM_IO_ACCOUNTED))
b992b40d 942 dm_end_io_acct(io);
e2736347
MS
943 else if (!io_error) {
944 /*
945 * Must handle target that DM_MAPIO_SUBMITTED only to
946 * then bio_endio() rather than dm_submit_bio_remap()
947 */
b992b40d
ML
948 __dm_start_io_acct(io);
949 dm_end_io_acct(io);
e2736347
MS
950 }
951 free_io(io);
952 smp_wmb();
953 this_cpu_dec(*md->pending_io);
6a8736d1 954
e2736347
MS
955 /* nudge anyone waiting on suspend queue */
956 if (unlikely(wq_has_sleeper(&md->wait)))
957 wake_up(&md->wait);
2e93ccc1 958
444fe04f
ML
959 /* Return early if the original bio was requeued */
960 if (requeued)
961 return;
e2736347
MS
962
963 if (bio_is_flush_with_data(bio)) {
964 /*
965 * Preflush done for flush with data, reissue
966 * without REQ_PREFLUSH.
967 */
968 bio->bi_opf &= ~REQ_PREFLUSH;
969 queue_io(md, bio);
970 } else {
971 /* done with normal IO or empty flush */
972 if (io_error)
973 bio->bi_status = io_error;
974 bio_endio(bio);
975 }
976}
977
8b211aac
ML
978static void dm_wq_requeue_work(struct work_struct *work)
979{
980 struct mapped_device *md = container_of(work, struct mapped_device,
981 requeue_work);
982 unsigned long flags;
983 struct dm_io *io;
984
985 /* reuse deferred lock to simplify dm_handle_requeue */
986 spin_lock_irqsave(&md->deferred_lock, flags);
987 io = md->requeue_list;
988 md->requeue_list = NULL;
989 spin_unlock_irqrestore(&md->deferred_lock, flags);
990
991 while (io) {
992 struct dm_io *next = io->next;
993
46754bd0 994 dm_io_rewind(io, &md->disk->bio_split);
8b211aac
ML
995
996 io->next = NULL;
997 __dm_io_complete(io, false);
998 io = next;
f77692d6 999 cond_resched();
8b211aac
ML
1000 }
1001}
1002
1003/*
1004 * Two staged requeue:
1005 *
1006 * 1) io->orig_bio points to the real original bio, and the part mapped to
1007 * this io must be requeued, instead of other parts of the original bio.
1008 *
1009 * 2) io->orig_bio points to new cloned bio which matches the requeued dm_io.
1010 */
1011static void dm_io_complete(struct dm_io *io)
1012{
1013 bool first_requeue;
1014
1015 /*
1016 * Only dm_io that has been split needs two stage requeue, otherwise
1017 * we may run into long bio clone chain during suspend and OOM could
1018 * be triggered.
1019 *
1020 * Also flush data dm_io won't be marked as DM_IO_WAS_SPLIT, so they
1021 * also aren't handled via the first stage requeue.
1022 */
1023 if (dm_io_flagged(io, DM_IO_WAS_SPLIT))
1024 first_requeue = true;
1025 else
1026 first_requeue = false;
1027
1028 __dm_io_complete(io, first_requeue);
1029}
1030
1da177e4
LT
1031/*
1032 * Decrements the number of outstanding ios that a bio has been
1033 * cloned into, completing the original io if necc.
1034 */
84b98f4c
MS
1035static inline void __dm_io_dec_pending(struct dm_io *io)
1036{
1037 if (atomic_dec_and_test(&io->io_count))
1038 dm_io_complete(io);
1039}
1040
1041static void dm_io_set_error(struct dm_io *io, blk_status_t error)
1da177e4 1042{
84b98f4c
MS
1043 unsigned long flags;
1044
2e93ccc1 1045 /* Push-back supersedes any I/O errors */
84b98f4c
MS
1046 spin_lock_irqsave(&io->lock, flags);
1047 if (!(io->status == BLK_STS_DM_REQUEUE &&
1048 __noflush_suspending(io->md))) {
1049 io->status = error;
1da177e4 1050 }
84b98f4c
MS
1051 spin_unlock_irqrestore(&io->lock, flags);
1052}
1da177e4 1053
2e803cd9 1054static void dm_io_dec_pending(struct dm_io *io, blk_status_t error)
84b98f4c
MS
1055{
1056 if (unlikely(error))
1057 dm_io_set_error(io, error);
1058
1059 __dm_io_dec_pending(io);
1da177e4
LT
1060}
1061
f7995089
MS
1062/*
1063 * The queue_limits are only valid as long as you have a reference
1064 * count on 'md'. But _not_ imposing verification to avoid atomic_read(),
1065 */
1066static inline struct queue_limits *dm_get_queue_limits(struct mapped_device *md)
1067{
1068 return &md->queue->limits;
1069}
1070
bcb44433
MS
1071void disable_discard(struct mapped_device *md)
1072{
1073 struct queue_limits *limits = dm_get_queue_limits(md);
1074
1075 /* device doesn't really support DISCARD, disable it */
1076 limits->max_discard_sectors = 0;
bcb44433
MS
1077}
1078
ac62d620
CH
1079void disable_write_zeroes(struct mapped_device *md)
1080{
1081 struct queue_limits *limits = dm_get_queue_limits(md);
1082
1083 /* device doesn't really support WRITE ZEROES, disable it */
1084 limits->max_write_zeroes_sectors = 0;
1085}
1086
a666e5c0
MP
1087static bool swap_bios_limit(struct dm_target *ti, struct bio *bio)
1088{
1089 return unlikely((bio->bi_opf & REQ_SWAP) != 0) && unlikely(ti->limit_swap_bios);
1090}
1091
4246a0b6 1092static void clone_endio(struct bio *bio)
1da177e4 1093{
4e4cbee9 1094 blk_status_t error = bio->bi_status;
6c23f0bd 1095 struct dm_target_io *tio = clone_to_tio(bio);
6cbce280
MS
1096 struct dm_target *ti = tio->ti;
1097 dm_endio_fn endio = ti->type->end_io;
b35f8caa 1098 struct dm_io *io = tio->io;
6cbce280 1099 struct mapped_device *md = io->md;
1da177e4 1100
dddf3056
MS
1101 if (unlikely(error == BLK_STS_TARGET)) {
1102 if (bio_op(bio) == REQ_OP_DISCARD &&
1103 !bdev_max_discard_sectors(bio->bi_bdev))
1104 disable_discard(md);
1105 else if (bio_op(bio) == REQ_OP_WRITE_ZEROES &&
1106 !bdev_write_zeroes_sectors(bio->bi_bdev))
1107 disable_write_zeroes(md);
ca522482 1108 }
415c79e1 1109
dddf3056 1110 if (static_branch_unlikely(&zoned_enabled) &&
edd1dbc8 1111 unlikely(bdev_is_zoned(bio->bi_bdev)))
dddf3056
MS
1112 dm_zone_endio(io, bio);
1113
1be56909 1114 if (endio) {
6cbce280 1115 int r = endio(ti, bio, &error);
b30f1607 1116
1be56909
CH
1117 switch (r) {
1118 case DM_ENDIO_REQUEUE:
442761fd
MS
1119 if (static_branch_unlikely(&zoned_enabled)) {
1120 /*
1121 * Requeuing writes to a sequential zone of a zoned
1122 * target will break the sequential write pattern:
1123 * fail such IO.
1124 */
1125 if (WARN_ON_ONCE(dm_is_zone_write(md, bio)))
1126 error = BLK_STS_IOERR;
1127 else
1128 error = BLK_STS_DM_REQUEUE;
1129 } else
bf14e2b2 1130 error = BLK_STS_DM_REQUEUE;
df561f66 1131 fallthrough;
1be56909
CH
1132 case DM_ENDIO_DONE:
1133 break;
1134 case DM_ENDIO_INCOMPLETE:
1135 /* The target will handle the io */
1136 return;
1137 default:
43e6c111 1138 DMCRIT("unimplemented target endio return value: %d", r);
1be56909
CH
1139 BUG();
1140 }
1141 }
1142
442761fd
MS
1143 if (static_branch_unlikely(&swap_bios_enabled) &&
1144 unlikely(swap_bios_limit(ti, bio)))
a666e5c0 1145 up(&md->swap_bios_semaphore);
a666e5c0 1146
1d1068ce 1147 free_tio(bio);
e2118b3c 1148 dm_io_dec_pending(io, error);
1da177e4
LT
1149}
1150
56a67df7
MS
1151/*
1152 * Return maximum size of I/O possible at the supplied sector up to the current
1153 * target boundary.
1154 */
3720281d
MS
1155static inline sector_t max_io_len_target_boundary(struct dm_target *ti,
1156 sector_t target_offset)
56a67df7 1157{
56a67df7
MS
1158 return ti->len - target_offset;
1159}
1160
06961c48 1161static sector_t __max_io_len(struct dm_target *ti, sector_t sector,
be04c14a
MS
1162 unsigned int max_granularity,
1163 unsigned int max_sectors)
1da177e4 1164{
3720281d
MS
1165 sector_t target_offset = dm_target_offset(ti, sector);
1166 sector_t len = max_io_len_target_boundary(ti, target_offset);
1da177e4
LT
1167
1168 /*
3ee16db3
MS
1169 * Does the target need to split IO even further?
1170 * - varied (per target) IO splitting is a tenet of DM; this
1171 * explains why stacked chunk_sectors based splitting via
5a97806f 1172 * bio_split_to_limits() isn't possible here.
1da177e4 1173 */
06961c48 1174 if (!max_granularity)
c3949322
CH
1175 return len;
1176 return min_t(sector_t, len,
be04c14a 1177 min(max_sectors ? : queue_max_sectors(ti->table->md->queue),
06961c48
MS
1178 blk_chunk_sectors_left(target_offset, max_granularity)));
1179}
1180
1181static inline sector_t max_io_len(struct dm_target *ti, sector_t sector)
1182{
be04c14a 1183 return __max_io_len(ti, sector, ti->max_io_len, 0);
1da177e4
LT
1184}
1185
542f9038
MS
1186int dm_set_target_max_io_len(struct dm_target *ti, sector_t len)
1187{
1188 if (len > UINT_MAX) {
1189 DMERR("Specified maximum size of target IO (%llu) exceeds limit (%u)",
1190 (unsigned long long)len, UINT_MAX);
1191 ti->error = "Maximum size of target IO is too large";
1192 return -EINVAL;
1193 }
1194
75ae1936 1195 ti->max_io_len = (uint32_t) len;
542f9038
MS
1196
1197 return 0;
1198}
1199EXPORT_SYMBOL_GPL(dm_set_target_max_io_len);
1200
f26c5719 1201static struct dm_target *dm_dax_get_live_target(struct mapped_device *md,
3d97c829
MS
1202 sector_t sector, int *srcu_idx)
1203 __acquires(md->io_barrier)
545ed20e 1204{
545ed20e
TK
1205 struct dm_table *map;
1206 struct dm_target *ti;
545ed20e 1207
f26c5719 1208 map = dm_get_live_table(md, srcu_idx);
545ed20e 1209 if (!map)
f26c5719 1210 return NULL;
545ed20e
TK
1211
1212 ti = dm_table_find_target(map, sector);
123d87d5 1213 if (!ti)
f26c5719 1214 return NULL;
545ed20e 1215
f26c5719
DW
1216 return ti;
1217}
545ed20e 1218
f26c5719 1219static long dm_dax_direct_access(struct dax_device *dax_dev, pgoff_t pgoff,
e511c4a3
JC
1220 long nr_pages, enum dax_access_mode mode, void **kaddr,
1221 pfn_t *pfn)
f26c5719
DW
1222{
1223 struct mapped_device *md = dax_get_private(dax_dev);
1224 sector_t sector = pgoff * PAGE_SECTORS;
1225 struct dm_target *ti;
1226 long len, ret = -EIO;
1227 int srcu_idx;
545ed20e 1228
f26c5719 1229 ti = dm_dax_get_live_target(md, sector, &srcu_idx);
545ed20e 1230
f26c5719
DW
1231 if (!ti)
1232 goto out;
1233 if (!ti->type->direct_access)
1234 goto out;
3720281d 1235 len = max_io_len(ti, sector) / PAGE_SECTORS;
f26c5719
DW
1236 if (len < 1)
1237 goto out;
1238 nr_pages = min(len, nr_pages);
e511c4a3 1239 ret = ti->type->direct_access(ti, pgoff, nr_pages, mode, kaddr, pfn);
817bf402 1240
f26c5719 1241 out:
545ed20e 1242 dm_put_live_table(md, srcu_idx);
f26c5719
DW
1243
1244 return ret;
545ed20e
TK
1245}
1246
cdf6cdcd
VG
1247static int dm_dax_zero_page_range(struct dax_device *dax_dev, pgoff_t pgoff,
1248 size_t nr_pages)
1249{
1250 struct mapped_device *md = dax_get_private(dax_dev);
1251 sector_t sector = pgoff * PAGE_SECTORS;
1252 struct dm_target *ti;
1253 int ret = -EIO;
1254 int srcu_idx;
1255
1256 ti = dm_dax_get_live_target(md, sector, &srcu_idx);
1257
1258 if (!ti)
1259 goto out;
1260 if (WARN_ON(!ti->type->dax_zero_page_range)) {
1261 /*
1262 * ->zero_page_range() is mandatory dax operation. If we are
1263 * here, something is wrong.
1264 */
cdf6cdcd
VG
1265 goto out;
1266 }
1267 ret = ti->type->dax_zero_page_range(ti, pgoff, nr_pages);
cdf6cdcd
VG
1268 out:
1269 dm_put_live_table(md, srcu_idx);
1270
1271 return ret;
1272}
1273
047218ec
JC
1274static size_t dm_dax_recovery_write(struct dax_device *dax_dev, pgoff_t pgoff,
1275 void *addr, size_t bytes, struct iov_iter *i)
1276{
1277 struct mapped_device *md = dax_get_private(dax_dev);
1278 sector_t sector = pgoff * PAGE_SECTORS;
1279 struct dm_target *ti;
1280 int srcu_idx;
1281 long ret = 0;
1282
1283 ti = dm_dax_get_live_target(md, sector, &srcu_idx);
1284 if (!ti || !ti->type->dax_recovery_write)
1285 goto out;
1286
1287 ret = ti->type->dax_recovery_write(ti, pgoff, addr, bytes, i);
1288out:
1289 dm_put_live_table(md, srcu_idx);
1290 return ret;
1291}
1292
1dd40c3e
MP
1293/*
1294 * A target may call dm_accept_partial_bio only from the map routine. It is
6842d264 1295 * allowed for all bio types except REQ_PREFLUSH, REQ_OP_ZONE_* zone management
e6fc9f62
MS
1296 * operations, REQ_OP_ZONE_APPEND (zone append writes) and any bio serviced by
1297 * __send_duplicate_bios().
1dd40c3e
MP
1298 *
1299 * dm_accept_partial_bio informs the dm that the target only wants to process
1300 * additional n_sectors sectors of the bio and the rest of the data should be
1301 * sent in a next bio.
1302 *
1303 * A diagram that explains the arithmetics:
1304 * +--------------------+---------------+-------+
1305 * | 1 | 2 | 3 |
1306 * +--------------------+---------------+-------+
1307 *
1308 * <-------------- *tio->len_ptr --------------->
bdb34759 1309 * <----- bio_sectors ----->
1dd40c3e
MP
1310 * <-- n_sectors -->
1311 *
1312 * Region 1 was already iterated over with bio_advance or similar function.
1313 * (it may be empty if the target doesn't use bio_advance)
1314 * Region 2 is the remaining bio size that the target wants to process.
1315 * (it may be empty if region 1 is non-empty, although there is no reason
1316 * to make it empty)
1317 * The target requires that region 3 is to be sent in the next bio.
1318 *
1319 * If the target wants to receive multiple copies of the bio (via num_*bios, etc),
1320 * the partially processed part (the sum of regions 1+2) must be the same for all
1321 * copies of the bio.
1322 */
86a3238c 1323void dm_accept_partial_bio(struct bio *bio, unsigned int n_sectors)
1dd40c3e 1324{
6c23f0bd 1325 struct dm_target_io *tio = clone_to_tio(bio);
8b211aac 1326 struct dm_io *io = tio->io;
86a3238c 1327 unsigned int bio_sectors = bio_sectors(bio);
6842d264 1328
655f3aad 1329 BUG_ON(dm_tio_flagged(tio, DM_TIO_IS_DUPLICATE_BIO));
6842d264
DLM
1330 BUG_ON(op_is_zone_mgmt(bio_op(bio)));
1331 BUG_ON(bio_op(bio) == REQ_OP_ZONE_APPEND);
bdb34759
MS
1332 BUG_ON(bio_sectors > *tio->len_ptr);
1333 BUG_ON(n_sectors > bio_sectors);
6842d264 1334
bdb34759 1335 *tio->len_ptr -= bio_sectors - n_sectors;
1dd40c3e 1336 bio->bi_iter.bi_size = n_sectors << SECTOR_SHIFT;
7dd76d1f
ML
1337
1338 /*
1339 * __split_and_process_bio() may have already saved mapped part
1340 * for accounting but it is being reduced so update accordingly.
1341 */
8b211aac
ML
1342 dm_io_set_flag(io, DM_IO_WAS_SPLIT);
1343 io->sectors = n_sectors;
1344 io->sector_offset = bio_sectors(io->orig_bio);
1dd40c3e
MP
1345}
1346EXPORT_SYMBOL_GPL(dm_accept_partial_bio);
1347
0fbb4d93
MS
1348/*
1349 * @clone: clone bio that DM core passed to target's .map function
1350 * @tgt_clone: clone of @clone bio that target needs submitted
0fbb4d93
MS
1351 *
1352 * Targets should use this interface to submit bios they take
1353 * ownership of when returning DM_MAPIO_SUBMITTED.
1354 *
1355 * Target should also enable ti->accounts_remapped_io
1356 */
b7f8dff0 1357void dm_submit_bio_remap(struct bio *clone, struct bio *tgt_clone)
0fbb4d93
MS
1358{
1359 struct dm_target_io *tio = clone_to_tio(clone);
1360 struct dm_io *io = tio->io;
1361
1362 /* establish bio that will get submitted */
1363 if (!tgt_clone)
1364 tgt_clone = clone;
1365
1366 /*
1367 * Account io->origin_bio to DM dev on behalf of target
1368 * that took ownership of IO with DM_MAPIO_SUBMITTED.
1369 */
9d20653f 1370 dm_start_io_acct(io, clone);
0fbb4d93 1371
9d20653f 1372 trace_block_bio_remap(tgt_clone, disk_devt(io->md->disk),
0fbb4d93 1373 tio->old_sector);
9d20653f 1374 submit_bio_noacct(tgt_clone);
0fbb4d93
MS
1375}
1376EXPORT_SYMBOL_GPL(dm_submit_bio_remap);
1377
a666e5c0
MP
1378static noinline void __set_swap_bios_limit(struct mapped_device *md, int latch)
1379{
1380 mutex_lock(&md->swap_bios_lock);
1381 while (latch < md->swap_bios) {
1382 cond_resched();
1383 down(&md->swap_bios_semaphore);
1384 md->swap_bios--;
1385 }
1386 while (latch > md->swap_bios) {
1387 cond_resched();
1388 up(&md->swap_bios_semaphore);
1389 md->swap_bios++;
1390 }
1391 mutex_unlock(&md->swap_bios_lock);
1392}
1393
1561b396 1394static void __map_bio(struct bio *clone)
1da177e4 1395{
1561b396 1396 struct dm_target_io *tio = clone_to_tio(clone);
bd2a49b8 1397 struct dm_target *ti = tio->ti;
6cbce280
MS
1398 struct dm_io *io = tio->io;
1399 struct mapped_device *md = io->md;
1400 int r;
1da177e4 1401
1da177e4 1402 clone->bi_end_io = clone_endio;
1da177e4
LT
1403
1404 /*
0fbb4d93 1405 * Map the clone.
1da177e4 1406 */
743598f0 1407 tio->old_sector = clone->bi_iter.bi_sector;
d67a5f4b 1408
442761fd
MS
1409 if (static_branch_unlikely(&swap_bios_enabled) &&
1410 unlikely(swap_bios_limit(ti, clone))) {
a666e5c0 1411 int latch = get_swap_bios();
b30f1607 1412
a666e5c0
MP
1413 if (unlikely(latch != md->swap_bios))
1414 __set_swap_bios_limit(md, latch);
1415 down(&md->swap_bios_semaphore);
1416 }
1417
442761fd
MS
1418 if (static_branch_unlikely(&zoned_enabled)) {
1419 /*
1420 * Check if the IO needs a special mapping due to zone append
1421 * emulation on zoned target. In this case, dm_zone_map_bio()
1422 * calls the target map operation.
1423 */
1424 if (unlikely(dm_emulate_zone_append(md)))
1425 r = dm_zone_map_bio(tio);
1426 else
1427 r = ti->type->map(ti, clone);
1428 } else
bb37d772
DLM
1429 r = ti->type->map(ti, clone);
1430
846785e6
CH
1431 switch (r) {
1432 case DM_MAPIO_SUBMITTED:
0fbb4d93
MS
1433 /* target has assumed ownership of this io */
1434 if (!ti->accounts_remapped_io)
9d20653f 1435 dm_start_io_acct(io, clone);
846785e6
CH
1436 break;
1437 case DM_MAPIO_REMAPPED:
9d20653f 1438 dm_submit_bio_remap(clone, NULL);
846785e6
CH
1439 break;
1440 case DM_MAPIO_KILL:
846785e6 1441 case DM_MAPIO_REQUEUE:
442761fd
MS
1442 if (static_branch_unlikely(&swap_bios_enabled) &&
1443 unlikely(swap_bios_limit(ti, clone)))
6cbce280 1444 up(&md->swap_bios_semaphore);
1d1068ce 1445 free_tio(clone);
90a2326e
MS
1446 if (r == DM_MAPIO_KILL)
1447 dm_io_dec_pending(io, BLK_STS_IOERR);
1448 else
1449 dm_io_dec_pending(io, BLK_STS_DM_REQUEUE);
846785e6
CH
1450 break;
1451 default:
43e6c111 1452 DMCRIT("unimplemented target map return value: %d", r);
45cbcd79 1453 BUG();
1da177e4
LT
1454 }
1455}
1da177e4 1456
86a3238c 1457static void setup_split_accounting(struct clone_info *ci, unsigned int len)
7dd76d1f
ML
1458{
1459 struct dm_io *io = ci->io;
1460
1461 if (ci->sector_count > len) {
1462 /*
1463 * Split needed, save the mapped part for accounting.
1464 * NOTE: dm_accept_partial_bio() will update accordingly.
1465 */
1466 dm_io_set_flag(io, DM_IO_WAS_SPLIT);
1467 io->sectors = len;
8b211aac 1468 io->sector_offset = bio_sectors(ci->bio);
7dd76d1f
ML
1469 }
1470}
1471
318716dd 1472static void alloc_multiple_bios(struct bio_list *blist, struct clone_info *ci,
f7b58a69
MS
1473 struct dm_target *ti, unsigned int num_bios,
1474 unsigned *len)
f9ab94ce 1475{
1d1068ce 1476 struct bio *bio;
318716dd 1477 int try;
dba14160 1478
318716dd
MS
1479 for (try = 0; try < 2; try++) {
1480 int bio_nr;
318716dd
MS
1481
1482 if (try)
bc02cdbe 1483 mutex_lock(&ci->io->md->table_devices_lock);
318716dd 1484 for (bio_nr = 0; bio_nr < num_bios; bio_nr++) {
f7b58a69 1485 bio = alloc_tio(ci, ti, bio_nr, len,
dc8e2021 1486 try ? GFP_NOIO : GFP_NOWAIT);
1d1068ce 1487 if (!bio)
318716dd
MS
1488 break;
1489
1d1068ce 1490 bio_list_add(blist, bio);
318716dd
MS
1491 }
1492 if (try)
bc02cdbe 1493 mutex_unlock(&ci->io->md->table_devices_lock);
318716dd
MS
1494 if (bio_nr == num_bios)
1495 return;
1496
6c23f0bd 1497 while ((bio = bio_list_pop(blist)))
1d1068ce 1498 free_tio(bio);
318716dd 1499 }
9015df24
AK
1500}
1501
0f14d60a 1502static int __send_duplicate_bios(struct clone_info *ci, struct dm_target *ti,
86a3238c 1503 unsigned int num_bios, unsigned int *len)
06a426ce 1504{
318716dd 1505 struct bio_list blist = BIO_EMPTY_LIST;
8eabf5d0 1506 struct bio *clone;
564b5c54 1507 unsigned int ret = 0;
06a426ce 1508
891fced6
CH
1509 switch (num_bios) {
1510 case 0:
1511 break;
1512 case 1:
7dd76d1f
ML
1513 if (len)
1514 setup_split_accounting(ci, *len);
891fced6 1515 clone = alloc_tio(ci, ti, 0, len, GFP_NOIO);
1561b396 1516 __map_bio(clone);
0f14d60a 1517 ret = 1;
891fced6
CH
1518 break;
1519 default:
666eed46
MS
1520 if (len)
1521 setup_split_accounting(ci, *len);
7dd06a25 1522 /* dm_accept_partial_bio() is not supported with shared tio->len_ptr */
f7b58a69 1523 alloc_multiple_bios(&blist, ci, ti, num_bios, len);
891fced6 1524 while ((clone = bio_list_pop(&blist))) {
655f3aad 1525 dm_tio_set_flag(clone_to_tio(clone), DM_TIO_IS_DUPLICATE_BIO);
891fced6 1526 __map_bio(clone);
0f14d60a 1527 ret += 1;
891fced6
CH
1528 }
1529 break;
318716dd 1530 }
0f14d60a
ML
1531
1532 return ret;
06a426ce
MS
1533}
1534
332f2b1e 1535static void __send_empty_flush(struct clone_info *ci)
f9ab94ce 1536{
564b5c54 1537 struct dm_table *t = ci->map;
828678b8
MS
1538 struct bio flush_bio;
1539
1540 /*
1541 * Use an on-stack bio for this, it's safe since we don't
1542 * need to reference it after submit. It's just used as
1543 * the basis for the clone(s).
1544 */
49add496
CH
1545 bio_init(&flush_bio, ci->io->md->disk->part0, NULL, 0,
1546 REQ_OP_WRITE | REQ_PREFLUSH | REQ_SYNC);
47d95102 1547
828678b8
MS
1548 ci->bio = &flush_bio;
1549 ci->sector_count = 0;
92b914e2 1550 ci->io->tio.clone.bi_iter.bi_size = 0;
f9ab94ce 1551
564b5c54
MS
1552 for (unsigned int i = 0; i < t->num_targets; i++) {
1553 unsigned int bios;
1554 struct dm_target *ti = dm_table_get_target(t, i);
0f14d60a
ML
1555
1556 atomic_add(ti->num_flush_bios, &ci->io->io_count);
1557 bios = __send_duplicate_bios(ci, ti, ti->num_flush_bios, NULL);
1558 atomic_sub(ti->num_flush_bios - bios, &ci->io->io_count);
1559 }
1560
1561 /*
1562 * alloc_io() takes one extra reference for submission, so the
1563 * reference won't reach 0 without the following subtraction
1564 */
1565 atomic_sub(1, &ci->io->io_count);
828678b8
MS
1566
1567 bio_uninit(ci->bio);
f9ab94ce
MP
1568}
1569
e6fc9f62 1570static void __send_changing_extent_only(struct clone_info *ci, struct dm_target *ti,
06961c48 1571 unsigned int num_bios,
be04c14a
MS
1572 unsigned int max_granularity,
1573 unsigned int max_sectors)
ba1cbad9 1574{
86a3238c 1575 unsigned int len, bios;
ba1cbad9 1576
3720281d 1577 len = min_t(sector_t, ci->sector_count,
be04c14a 1578 __max_io_len(ti, ci->sector, max_granularity, max_sectors));
51b86f9a 1579
0f14d60a
ML
1580 atomic_add(num_bios, &ci->io->io_count);
1581 bios = __send_duplicate_bios(ci, ti, num_bios, &len);
1582 /*
1583 * alloc_io() takes one extra reference for submission, so the
1584 * reference won't reach 0 without the following (+1) subtraction
1585 */
1586 atomic_sub(num_bios - bios + 1, &ci->io->io_count);
7dd06a25 1587
3d7f4562
MS
1588 ci->sector += len;
1589 ci->sector_count -= len;
ba1cbad9
MS
1590}
1591
568c73a3
MS
1592static bool is_abnormal_io(struct bio *bio)
1593{
a3282b43 1594 enum req_op op = bio_op(bio);
568c73a3 1595
4edadf6d
MS
1596 if (op != REQ_OP_READ && op != REQ_OP_WRITE && op != REQ_OP_FLUSH) {
1597 switch (op) {
1598 case REQ_OP_DISCARD:
1599 case REQ_OP_SECURE_ERASE:
1600 case REQ_OP_WRITE_ZEROES:
1601 return true;
1602 default:
1603 break;
1604 }
568c73a3
MS
1605 }
1606
4edadf6d 1607 return false;
568c73a3
MS
1608}
1609
4edadf6d
MS
1610static blk_status_t __process_abnormal_io(struct clone_info *ci,
1611 struct dm_target *ti)
0519c71e 1612{
86a3238c 1613 unsigned int num_bios = 0;
06961c48 1614 unsigned int max_granularity = 0;
be04c14a 1615 unsigned int max_sectors = 0;
13f6facf 1616 struct queue_limits *limits = dm_get_queue_limits(ti->table->md);
0519c71e 1617
e6fc9f62 1618 switch (bio_op(ci->bio)) {
9679b5a7
MS
1619 case REQ_OP_DISCARD:
1620 num_bios = ti->num_discard_bios;
be04c14a 1621 max_sectors = limits->max_discard_sectors;
13f6facf 1622 if (ti->max_discard_granularity)
be04c14a 1623 max_granularity = max_sectors;
9679b5a7
MS
1624 break;
1625 case REQ_OP_SECURE_ERASE:
1626 num_bios = ti->num_secure_erase_bios;
be04c14a 1627 max_sectors = limits->max_secure_erase_sectors;
13f6facf 1628 if (ti->max_secure_erase_granularity)
be04c14a 1629 max_granularity = max_sectors;
9679b5a7 1630 break;
9679b5a7
MS
1631 case REQ_OP_WRITE_ZEROES:
1632 num_bios = ti->num_write_zeroes_bios;
be04c14a 1633 max_sectors = limits->max_write_zeroes_sectors;
13f6facf 1634 if (ti->max_write_zeroes_granularity)
be04c14a 1635 max_granularity = max_sectors;
9679b5a7 1636 break;
2d9b02be
BVA
1637 default:
1638 break;
9679b5a7 1639 }
0519c71e 1640
e6fc9f62
MS
1641 /*
1642 * Even though the device advertised support for this type of
1643 * request, that does not mean every target supports it, and
1644 * reconfiguration might also have changed that since the
1645 * check was performed.
1646 */
84b98f4c 1647 if (unlikely(!num_bios))
4edadf6d
MS
1648 return BLK_STS_NOTSUPP;
1649
be04c14a
MS
1650 __send_changing_extent_only(ci, ti, num_bios,
1651 max_granularity, max_sectors);
4edadf6d 1652 return BLK_STS_OK;
0519c71e
MS
1653}
1654
b99fdcdc 1655/*
ec211631 1656 * Reuse ->bi_private as dm_io list head for storing all dm_io instances
b99fdcdc
ML
1657 * associated with this bio, and this bio's bi_private needs to be
1658 * stored in dm_io->data before the reuse.
1659 *
1660 * bio->bi_private is owned by fs or upper layer, so block layer won't
1661 * touch it after splitting. Meantime it won't be changed by anyone after
1662 * bio is submitted. So this reuse is safe.
1663 */
ec211631 1664static inline struct dm_io **dm_poll_list_head(struct bio *bio)
b99fdcdc 1665{
ec211631 1666 return (struct dm_io **)&bio->bi_private;
b99fdcdc
ML
1667}
1668
1669static void dm_queue_poll_io(struct bio *bio, struct dm_io *io)
1670{
ec211631 1671 struct dm_io **head = dm_poll_list_head(bio);
b99fdcdc
ML
1672
1673 if (!(bio->bi_opf & REQ_DM_POLL_LIST)) {
1674 bio->bi_opf |= REQ_DM_POLL_LIST;
1675 /*
1676 * Save .bi_private into dm_io, so that we can reuse
ec211631 1677 * .bi_private as dm_io list head for storing dm_io list
b99fdcdc
ML
1678 */
1679 io->data = bio->bi_private;
1680
b99fdcdc
ML
1681 /* tell block layer to poll for completion */
1682 bio->bi_cookie = ~BLK_QC_T_NONE;
ec211631
ML
1683
1684 io->next = NULL;
b99fdcdc
ML
1685 } else {
1686 /*
1687 * bio recursed due to split, reuse original poll list,
1688 * and save bio->bi_private too.
1689 */
ec211631
ML
1690 io->data = (*head)->data;
1691 io->next = *head;
b99fdcdc
ML
1692 }
1693
ec211631 1694 *head = io;
b99fdcdc
ML
1695}
1696
e4c93811
AK
1697/*
1698 * Select the correct strategy for processing a non-flush bio.
1699 */
84b98f4c 1700static blk_status_t __split_and_process_bio(struct clone_info *ci)
0ce65797 1701{
66bdaa43 1702 struct bio *clone;
512875bd 1703 struct dm_target *ti;
86a3238c 1704 unsigned int len;
0ce65797 1705
512875bd 1706 ti = dm_table_find_target(ci->map, ci->sector);
4edadf6d
MS
1707 if (unlikely(!ti))
1708 return BLK_STS_IOERR;
1ee88de3
MP
1709
1710 if (unlikely((ci->bio->bi_opf & REQ_NOWAIT) != 0) &&
1711 unlikely(!dm_target_supports_nowait(ti->type)))
1712 return BLK_STS_NOTSUPP;
1713
1714 if (unlikely(ci->is_abnormal_io))
4edadf6d 1715 return __process_abnormal_io(ci, ti);
3d7f4562 1716
b99fdcdc
ML
1717 /*
1718 * Only support bio polling for normal IO, and the target io is
1719 * exactly inside the dm_io instance (verified in dm_poll_dm_io)
1720 */
a3282b43 1721 ci->submit_as_polled = !!(ci->bio->bi_opf & REQ_POLLED);
0ce65797 1722
3720281d 1723 len = min_t(sector_t, max_io_len(ti, ci->sector), ci->sector_count);
7dd76d1f 1724 setup_split_accounting(ci, len);
66bdaa43 1725 clone = alloc_tio(ci, ti, 0, &len, GFP_NOIO);
66bdaa43 1726 __map_bio(clone);
0ce65797 1727
1c3b13e6
KO
1728 ci->sector += len;
1729 ci->sector_count -= len;
0ce65797 1730
84b98f4c 1731 return BLK_STS_OK;
0ce65797
MS
1732}
1733
978e51ba 1734static void init_clone_info(struct clone_info *ci, struct mapped_device *md,
4edadf6d 1735 struct dm_table *map, struct bio *bio, bool is_abnormal)
978e51ba
MS
1736{
1737 ci->map = map;
1738 ci->io = alloc_io(md, bio);
d41e077a 1739 ci->bio = bio;
4edadf6d 1740 ci->is_abnormal_io = is_abnormal;
b99fdcdc 1741 ci->submit_as_polled = false;
978e51ba 1742 ci->sector = bio->bi_iter.bi_sector;
d41e077a
MS
1743 ci->sector_count = bio_sectors(bio);
1744
1745 /* Shouldn't happen but sector_count was being set to 0 so... */
442761fd
MS
1746 if (static_branch_unlikely(&zoned_enabled) &&
1747 WARN_ON_ONCE(op_is_zone_mgmt(bio_op(bio)) && ci->sector_count))
d41e077a 1748 ci->sector_count = 0;
978e51ba
MS
1749}
1750
1da177e4 1751/*
14fe594d 1752 * Entry point to split a bio into clones and submit them to the targets.
1da177e4 1753 */
96c9865c
MS
1754static void dm_split_and_process_bio(struct mapped_device *md,
1755 struct dm_table *map, struct bio *bio)
0ce65797 1756{
1da177e4 1757 struct clone_info ci;
4857abf6 1758 struct dm_io *io;
84b98f4c 1759 blk_status_t error = BLK_STS_OK;
4edadf6d
MS
1760 bool is_abnormal;
1761
1762 is_abnormal = is_abnormal_io(bio);
1763 if (unlikely(is_abnormal)) {
1764 /*
5a97806f 1765 * Use bio_split_to_limits() for abnormal IO (e.g. discard, etc)
4edadf6d
MS
1766 * otherwise associated queue_limits won't be imposed.
1767 */
5a97806f 1768 bio = bio_split_to_limits(bio);
613b1488
JA
1769 if (!bio)
1770 return;
4edadf6d 1771 }
1da177e4 1772
4edadf6d 1773 init_clone_info(&ci, md, map, bio, is_abnormal);
4857abf6 1774 io = ci.io;
0ce65797 1775
1eff9d32 1776 if (bio->bi_opf & REQ_PREFLUSH) {
332f2b1e 1777 __send_empty_flush(&ci);
e2736347 1778 /* dm_io_complete submits any data associated with flush */
d41e077a 1779 goto out;
d87f4c14 1780 }
0ce65797 1781
d41e077a
MS
1782 error = __split_and_process_bio(&ci);
1783 if (error || !ci.sector_count)
1784 goto out;
d41e077a
MS
1785 /*
1786 * Remainder must be passed to submit_bio_noacct() so it gets handled
1787 * *after* bios already submitted have been completely processed.
d41e077a 1788 */
8b211aac
ML
1789 bio_trim(bio, io->sectors, ci.sector_count);
1790 trace_block_split(bio, bio->bi_iter.bi_sector);
1791 bio_inc_remaining(bio);
d41e077a
MS
1792 submit_bio_noacct(bio);
1793out:
b99fdcdc
ML
1794 /*
1795 * Drop the extra reference count for non-POLLED bio, and hold one
1796 * reference for POLLED bio, which will be released in dm_poll_bio
1797 *
ec211631
ML
1798 * Add every dm_io instance into the dm_io list head which is stored
1799 * in bio->bi_private, so that dm_poll_bio can poll them all.
b99fdcdc 1800 */
0f14d60a
ML
1801 if (error || !ci.submit_as_polled) {
1802 /*
1803 * In case of submission failure, the extra reference for
1804 * submitting io isn't consumed yet
1805 */
1806 if (error)
1807 atomic_dec(&io->io_count);
1808 dm_io_dec_pending(io, error);
1809 } else
4857abf6 1810 dm_queue_poll_io(bio, io);
0ce65797
MS
1811}
1812
3e08773c 1813static void dm_submit_bio(struct bio *bio)
cec47e3d 1814{
309dca30 1815 struct mapped_device *md = bio->bi_bdev->bd_disk->private_data;
83d5e5b0
MP
1816 int srcu_idx;
1817 struct dm_table *map;
cec47e3d 1818
a9ce3853 1819 map = dm_get_live_table(md, &srcu_idx);
29e4013d 1820
fa247089
MS
1821 /* If suspended, or map not yet available, queue this IO for later */
1822 if (unlikely(test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags)) ||
1823 unlikely(!map)) {
6abc4946
KK
1824 if (bio->bi_opf & REQ_NOWAIT)
1825 bio_wouldblock_error(bio);
b2abdb1b 1826 else if (bio->bi_opf & REQ_RAHEAD)
54d9a1b4 1827 bio_io_error(bio);
b2abdb1b
MS
1828 else
1829 queue_io(md, bio);
1830 goto out;
cec47e3d 1831 }
1da177e4 1832
96c9865c 1833 dm_split_and_process_bio(md, map, bio);
b2abdb1b 1834out:
a9ce3853 1835 dm_put_live_table(md, srcu_idx);
978e51ba
MS
1836}
1837
b99fdcdc
ML
1838static bool dm_poll_dm_io(struct dm_io *io, struct io_comp_batch *iob,
1839 unsigned int flags)
1840{
655f3aad 1841 WARN_ON_ONCE(!dm_tio_is_normal(&io->tio));
b99fdcdc
ML
1842
1843 /* don't poll if the mapped io is done */
1844 if (atomic_read(&io->io_count) > 1)
1845 bio_poll(&io->tio.clone, iob, flags);
1846
1847 /* bio_poll holds the last reference */
1848 return atomic_read(&io->io_count) == 1;
1849}
1850
1851static int dm_poll_bio(struct bio *bio, struct io_comp_batch *iob,
1852 unsigned int flags)
1853{
ec211631
ML
1854 struct dm_io **head = dm_poll_list_head(bio);
1855 struct dm_io *list = *head;
1856 struct dm_io *tmp = NULL;
1857 struct dm_io *curr, *next;
b99fdcdc
ML
1858
1859 /* Only poll normal bio which was marked as REQ_DM_POLL_LIST */
1860 if (!(bio->bi_opf & REQ_DM_POLL_LIST))
1861 return 0;
1862
ec211631 1863 WARN_ON_ONCE(!list);
b99fdcdc
ML
1864
1865 /*
1866 * Restore .bi_private before possibly completing dm_io.
1867 *
1868 * bio_poll() is only possible once @bio has been completely
1869 * submitted via submit_bio_noacct()'s depth-first submission.
1870 * So there is no dm_queue_poll_io() race associated with
1871 * clearing REQ_DM_POLL_LIST here.
1872 */
1873 bio->bi_opf &= ~REQ_DM_POLL_LIST;
ec211631 1874 bio->bi_private = list->data;
b99fdcdc 1875
ec211631
ML
1876 for (curr = list, next = curr->next; curr; curr = next, next =
1877 curr ? curr->next : NULL) {
1878 if (dm_poll_dm_io(curr, iob, flags)) {
b99fdcdc 1879 /*
84b98f4c
MS
1880 * clone_endio() has already occurred, so no
1881 * error handling is needed here.
b99fdcdc 1882 */
ec211631
ML
1883 __dm_io_dec_pending(curr);
1884 } else {
1885 curr->next = tmp;
1886 tmp = curr;
b99fdcdc
ML
1887 }
1888 }
1889
1890 /* Not done? */
ec211631 1891 if (tmp) {
b99fdcdc
ML
1892 bio->bi_opf |= REQ_DM_POLL_LIST;
1893 /* Reset bio->bi_private to dm_io list head */
ec211631 1894 *head = tmp;
b99fdcdc
ML
1895 return 0;
1896 }
1897 return 1;
1898}
1899
a4a82ce3
HM
1900/*
1901 *---------------------------------------------------------------
1da177e4 1902 * An IDR is used to keep track of allocated minor numbers.
a4a82ce3
HM
1903 *---------------------------------------------------------------
1904 */
2b06cfff 1905static void free_minor(int minor)
1da177e4 1906{
f32c10b0 1907 spin_lock(&_minor_lock);
1da177e4 1908 idr_remove(&_minor_idr, minor);
f32c10b0 1909 spin_unlock(&_minor_lock);
1da177e4
LT
1910}
1911
1912/*
1913 * See if the device with a specific minor # is free.
1914 */
cf13ab8e 1915static int specific_minor(int minor)
1da177e4 1916{
c9d76be6 1917 int r;
1da177e4
LT
1918
1919 if (minor >= (1 << MINORBITS))
1920 return -EINVAL;
1921
c9d76be6 1922 idr_preload(GFP_KERNEL);
f32c10b0 1923 spin_lock(&_minor_lock);
1da177e4 1924
c9d76be6 1925 r = idr_alloc(&_minor_idr, MINOR_ALLOCED, minor, minor + 1, GFP_NOWAIT);
1da177e4 1926
f32c10b0 1927 spin_unlock(&_minor_lock);
c9d76be6
TH
1928 idr_preload_end();
1929 if (r < 0)
1930 return r == -ENOSPC ? -EBUSY : r;
1931 return 0;
1da177e4
LT
1932}
1933
cf13ab8e 1934static int next_free_minor(int *minor)
1da177e4 1935{
c9d76be6 1936 int r;
62f75c2f 1937
c9d76be6 1938 idr_preload(GFP_KERNEL);
f32c10b0 1939 spin_lock(&_minor_lock);
1da177e4 1940
c9d76be6 1941 r = idr_alloc(&_minor_idr, MINOR_ALLOCED, 0, 1 << MINORBITS, GFP_NOWAIT);
1da177e4 1942
f32c10b0 1943 spin_unlock(&_minor_lock);
c9d76be6
TH
1944 idr_preload_end();
1945 if (r < 0)
1946 return r;
1947 *minor = r;
1948 return 0;
1da177e4
LT
1949}
1950
83d5cde4 1951static const struct block_device_operations dm_blk_dops;
681cc5e8 1952static const struct block_device_operations dm_rq_blk_dops;
f26c5719 1953static const struct dax_operations dm_dax_ops;
1da177e4 1954
53d5914f
MP
1955static void dm_wq_work(struct work_struct *work);
1956
aa6ce87a 1957#ifdef CONFIG_BLK_INLINE_ENCRYPTION
cb77cb5a 1958static void dm_queue_destroy_crypto_profile(struct request_queue *q)
aa6ce87a 1959{
cb77cb5a 1960 dm_destroy_crypto_profile(q->crypto_profile);
aa6ce87a
ST
1961}
1962
1963#else /* CONFIG_BLK_INLINE_ENCRYPTION */
1964
cb77cb5a 1965static inline void dm_queue_destroy_crypto_profile(struct request_queue *q)
aa6ce87a
ST
1966{
1967}
1968#endif /* !CONFIG_BLK_INLINE_ENCRYPTION */
1969
0f20972f
MS
1970static void cleanup_mapped_device(struct mapped_device *md)
1971{
0f20972f
MS
1972 if (md->wq)
1973 destroy_workqueue(md->wq);
29dec90a 1974 dm_free_md_mempools(md->mempools);
0f20972f 1975
f26c5719 1976 if (md->dax_dev) {
fb08a190 1977 dax_remove_host(md->disk);
f26c5719
DW
1978 kill_dax(md->dax_dev);
1979 put_dax(md->dax_dev);
1980 md->dax_dev = NULL;
1981 }
1982
588b7f5d 1983 dm_cleanup_zoned_dev(md);
0f20972f
MS
1984 if (md->disk) {
1985 spin_lock(&_minor_lock);
1986 md->disk->private_data = NULL;
1987 spin_unlock(&_minor_lock);
89f871af 1988 if (dm_get_md_type(md) != DM_TYPE_NONE) {
1a581b72
CH
1989 struct table_device *td;
1990
89f871af 1991 dm_sysfs_exit(md);
1a581b72
CH
1992 list_for_each_entry(td, &md->table_devices, list) {
1993 bd_unlink_disk_holder(td->dm_dev.bdev,
1994 md->disk);
1995 }
d563792c
YK
1996
1997 /*
1998 * Hold lock to make sure del_gendisk() won't concurrent
1999 * with open/close_table_device().
2000 */
2001 mutex_lock(&md->table_devices_lock);
89f871af 2002 del_gendisk(md->disk);
d563792c 2003 mutex_unlock(&md->table_devices_lock);
89f871af 2004 }
cb77cb5a 2005 dm_queue_destroy_crypto_profile(md->queue);
8b9ab626 2006 put_disk(md->disk);
74a2b6ec 2007 }
0f20972f 2008
9f6dc633
MS
2009 if (md->pending_io) {
2010 free_percpu(md->pending_io);
2011 md->pending_io = NULL;
2012 }
2013
d09960b0
TE
2014 cleanup_srcu_struct(&md->io_barrier);
2015
d5ffebdd
MS
2016 mutex_destroy(&md->suspend_lock);
2017 mutex_destroy(&md->type_lock);
2018 mutex_destroy(&md->table_devices_lock);
a666e5c0 2019 mutex_destroy(&md->swap_bios_lock);
d5ffebdd 2020
4cc96131 2021 dm_mq_cleanup_mapped_device(md);
0f20972f
MS
2022}
2023
1da177e4
LT
2024/*
2025 * Allocate and initialise a blank device with a given minor.
2026 */
2b06cfff 2027static struct mapped_device *alloc_dev(int minor)
1da177e4 2028{
115485e8
MS
2029 int r, numa_node_id = dm_get_numa_node();
2030 struct mapped_device *md;
ba61fdd1 2031 void *old_md;
1da177e4 2032
856eb091 2033 md = kvzalloc_node(sizeof(*md), GFP_KERNEL, numa_node_id);
1da177e4 2034 if (!md) {
43e6c111 2035 DMERR("unable to allocate device, out of memory.");
1da177e4
LT
2036 return NULL;
2037 }
2038
10da4f79 2039 if (!try_module_get(THIS_MODULE))
6ed7ade8 2040 goto bad_module_get;
10da4f79 2041
1da177e4 2042 /* get a minor number for the dev */
2b06cfff 2043 if (minor == DM_ANY_MINOR)
cf13ab8e 2044 r = next_free_minor(&minor);
2b06cfff 2045 else
cf13ab8e 2046 r = specific_minor(minor);
1da177e4 2047 if (r < 0)
6ed7ade8 2048 goto bad_minor;
1da177e4 2049
83d5e5b0
MP
2050 r = init_srcu_struct(&md->io_barrier);
2051 if (r < 0)
2052 goto bad_io_barrier;
2053
115485e8 2054 md->numa_node_id = numa_node_id;
591ddcfc 2055 md->init_tio_pdu = false;
a5664dad 2056 md->type = DM_TYPE_NONE;
e61290a4 2057 mutex_init(&md->suspend_lock);
a5664dad 2058 mutex_init(&md->type_lock);
86f1152b 2059 mutex_init(&md->table_devices_lock);
022c2611 2060 spin_lock_init(&md->deferred_lock);
1da177e4 2061 atomic_set(&md->holders, 1);
5c6bd75d 2062 atomic_set(&md->open_count, 0);
1da177e4 2063 atomic_set(&md->event_nr, 0);
7a8c3d3b
MA
2064 atomic_set(&md->uevent_seq, 0);
2065 INIT_LIST_HEAD(&md->uevent_list);
86f1152b 2066 INIT_LIST_HEAD(&md->table_devices);
7a8c3d3b 2067 spin_lock_init(&md->uevent_lock);
1da177e4 2068
47ace7e0 2069 /*
c62b37d9
CH
2070 * default to bio-based until DM table is loaded and md->type
2071 * established. If request-based table is loaded: blk-mq will
2072 * override accordingly.
47ace7e0 2073 */
74fe6ba9 2074 md->disk = blk_alloc_disk(md->numa_node_id);
1da177e4 2075 if (!md->disk)
0f20972f 2076 goto bad;
74fe6ba9 2077 md->queue = md->disk->queue;
1da177e4 2078
f0b04115 2079 init_waitqueue_head(&md->wait);
53d5914f 2080 INIT_WORK(&md->work, dm_wq_work);
8b211aac 2081 INIT_WORK(&md->requeue_work, dm_wq_requeue_work);
f0b04115 2082 init_waitqueue_head(&md->eventq);
2995fa78 2083 init_completion(&md->kobj_holder.completion);
f0b04115 2084
8b211aac 2085 md->requeue_list = NULL;
a666e5c0
MP
2086 md->swap_bios = get_swap_bios();
2087 sema_init(&md->swap_bios_semaphore, md->swap_bios);
2088 mutex_init(&md->swap_bios_lock);
2089
1da177e4
LT
2090 md->disk->major = _major;
2091 md->disk->first_minor = minor;
74fe6ba9 2092 md->disk->minors = 1;
1ebe2e5f 2093 md->disk->flags |= GENHD_FL_NO_PART;
1da177e4 2094 md->disk->fops = &dm_blk_dops;
1da177e4
LT
2095 md->disk->private_data = md;
2096 sprintf(md->disk->disk_name, "dm-%d", minor);
f26c5719 2097
5d2a228b 2098 if (IS_ENABLED(CONFIG_FS_DAX)) {
30c6828a 2099 md->dax_dev = alloc_dax(md, &dm_dax_ops);
d7519392
CH
2100 if (IS_ERR(md->dax_dev)) {
2101 md->dax_dev = NULL;
976431b0 2102 goto bad;
d7519392 2103 }
7ac5360c
CH
2104 set_dax_nocache(md->dax_dev);
2105 set_dax_nomc(md->dax_dev);
fb08a190 2106 if (dax_add_host(md->dax_dev, md->disk))
976431b0
DW
2107 goto bad;
2108 }
f26c5719 2109
7e51f257 2110 format_dev_t(md->name, MKDEV(_major, minor));
1da177e4 2111
c7c879ee 2112 md->wq = alloc_workqueue("kdmflush/%s", WQ_MEM_RECLAIM, 0, md->name);
304f3f6a 2113 if (!md->wq)
0f20972f 2114 goto bad;
304f3f6a 2115
9f6dc633
MS
2116 md->pending_io = alloc_percpu(unsigned long);
2117 if (!md->pending_io)
2118 goto bad;
2119
d3aa3e06
JJ
2120 r = dm_stats_init(&md->stats);
2121 if (r < 0)
2122 goto bad;
fd2ed4d2 2123
ba61fdd1 2124 /* Populate the mapping, nobody knows we exist yet */
f32c10b0 2125 spin_lock(&_minor_lock);
ba61fdd1 2126 old_md = idr_replace(&_minor_idr, md, minor);
f32c10b0 2127 spin_unlock(&_minor_lock);
ba61fdd1
JM
2128
2129 BUG_ON(old_md != MINOR_ALLOCED);
2130
1da177e4
LT
2131 return md;
2132
0f20972f
MS
2133bad:
2134 cleanup_mapped_device(md);
83d5e5b0 2135bad_io_barrier:
1da177e4 2136 free_minor(minor);
6ed7ade8 2137bad_minor:
10da4f79 2138 module_put(THIS_MODULE);
6ed7ade8 2139bad_module_get:
856eb091 2140 kvfree(md);
1da177e4
LT
2141 return NULL;
2142}
2143
ae9da83f
JN
2144static void unlock_fs(struct mapped_device *md);
2145
1da177e4
LT
2146static void free_dev(struct mapped_device *md)
2147{
f331c029 2148 int minor = MINOR(disk_devt(md->disk));
63d94e48 2149
32a926da 2150 unlock_fs(md);
2eb6e1e3 2151
0f20972f 2152 cleanup_mapped_device(md);
63a4f065 2153
992ec6a9 2154 WARN_ON_ONCE(!list_empty(&md->table_devices));
63a4f065 2155 dm_stats_cleanup(&md->stats);
63a4f065
MS
2156 free_minor(minor);
2157
10da4f79 2158 module_put(THIS_MODULE);
856eb091 2159 kvfree(md);
1da177e4
LT
2160}
2161
2162/*
2163 * Bind a table to the device.
2164 */
2165static void event_callback(void *context)
2166{
7a8c3d3b
MA
2167 unsigned long flags;
2168 LIST_HEAD(uevents);
d695e441 2169 struct mapped_device *md = context;
1da177e4 2170
7a8c3d3b
MA
2171 spin_lock_irqsave(&md->uevent_lock, flags);
2172 list_splice_init(&md->uevent_list, &uevents);
2173 spin_unlock_irqrestore(&md->uevent_lock, flags);
2174
ed9e1982 2175 dm_send_uevents(&uevents, &disk_to_dev(md->disk)->kobj);
7a8c3d3b 2176
1da177e4
LT
2177 atomic_inc(&md->event_nr);
2178 wake_up(&md->eventq);
62e08243 2179 dm_issue_global_event();
1da177e4
LT
2180}
2181
042d2a9b
AK
2182/*
2183 * Returns old map, which caller must destroy.
2184 */
2185static struct dm_table *__bind(struct mapped_device *md, struct dm_table *t,
2186 struct queue_limits *limits)
1da177e4 2187{
042d2a9b 2188 struct dm_table *old_map;
1da177e4 2189 sector_t size;
2a2a4c51 2190 int ret;
1da177e4 2191
5a8f1f80
BVA
2192 lockdep_assert_held(&md->suspend_lock);
2193
1da177e4 2194 size = dm_table_get_size(t);
3ac51e74
DW
2195
2196 /*
2197 * Wipe any geometry if the size of the table changed.
2198 */
fd2ed4d2 2199 if (size != dm_get_size(md))
3ac51e74
DW
2200 memset(&md->geometry, 0, sizeof(md->geometry));
2201
7533afa1 2202 set_capacity(md->disk, size);
d5816876 2203
2ca3310e
AK
2204 dm_table_event_callback(t, event_callback, md);
2205
f5b4aee1 2206 if (dm_table_request_based(t)) {
16f12266 2207 /*
9c37de29
MS
2208 * Leverage the fact that request-based DM targets are
2209 * immutable singletons - used to optimize dm_mq_queue_rq.
16f12266
MS
2210 */
2211 md->immutable_target = dm_table_get_immutable_target(t);
e6ee8c0b 2212
29dec90a
CH
2213 /*
2214 * There is no need to reload with request-based dm because the
2215 * size of front_pad doesn't change.
2216 *
2217 * Note for future: If you are to reload bioset, prep-ed
2218 * requests in the queue may refer to bio from the old bioset,
2219 * so you must walk through the queue to unprep.
2220 */
2221 if (!md->mempools) {
2222 md->mempools = t->mempools;
2223 t->mempools = NULL;
2224 }
2225 } else {
2226 /*
2227 * The md may already have mempools that need changing.
2228 * If so, reload bioset because front_pad may have changed
2229 * because a different table was loaded.
2230 */
2231 dm_free_md_mempools(md->mempools);
2232 md->mempools = t->mempools;
2233 t->mempools = NULL;
2a2a4c51 2234 }
e6ee8c0b 2235
f5b4aee1 2236 ret = dm_table_set_restrictions(t, md->queue, limits);
bb37d772
DLM
2237 if (ret) {
2238 old_map = ERR_PTR(ret);
2239 goto out;
2240 }
2241
a12f5d48 2242 old_map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock));
1d3aa6f6 2243 rcu_assign_pointer(md->map, (void *)t);
36a0456f
AK
2244 md->immutable_target_type = dm_table_get_immutable_target_type(t);
2245
41abc4e1
HR
2246 if (old_map)
2247 dm_sync_table(md);
2a2a4c51 2248out:
042d2a9b 2249 return old_map;
1da177e4
LT
2250}
2251
a7940155
AK
2252/*
2253 * Returns unbound table for the caller to free.
2254 */
2255static struct dm_table *__unbind(struct mapped_device *md)
1da177e4 2256{
a12f5d48 2257 struct dm_table *map = rcu_dereference_protected(md->map, 1);
1da177e4
LT
2258
2259 if (!map)
a7940155 2260 return NULL;
1da177e4
LT
2261
2262 dm_table_event_callback(map, NULL, NULL);
9cdb8520 2263 RCU_INIT_POINTER(md->map, NULL);
83d5e5b0 2264 dm_sync_table(md);
a7940155
AK
2265
2266 return map;
1da177e4
LT
2267}
2268
2269/*
2270 * Constructor for a new device.
2271 */
2b06cfff 2272int dm_create(int minor, struct mapped_device **result)
1da177e4
LT
2273{
2274 struct mapped_device *md;
2275
2b06cfff 2276 md = alloc_dev(minor);
1da177e4
LT
2277 if (!md)
2278 return -ENXIO;
2279
91ccbbac
TS
2280 dm_ima_reset_data(md);
2281
1da177e4
LT
2282 *result = md;
2283 return 0;
2284}
2285
a5664dad
MS
2286/*
2287 * Functions to manage md->type.
2288 * All are required to hold md->type_lock.
2289 */
2290void dm_lock_md_type(struct mapped_device *md)
2291{
2292 mutex_lock(&md->type_lock);
2293}
2294
2295void dm_unlock_md_type(struct mapped_device *md)
2296{
2297 mutex_unlock(&md->type_lock);
2298}
2299
7e0d574f 2300void dm_set_md_type(struct mapped_device *md, enum dm_queue_mode type)
a5664dad 2301{
00c4fc3b 2302 BUG_ON(!mutex_is_locked(&md->type_lock));
a5664dad
MS
2303 md->type = type;
2304}
2305
7e0d574f 2306enum dm_queue_mode dm_get_md_type(struct mapped_device *md)
a5664dad
MS
2307{
2308 return md->type;
2309}
2310
36a0456f
AK
2311struct target_type *dm_get_immutable_target_type(struct mapped_device *md)
2312{
2313 return md->immutable_target_type;
2314}
2315
4a0b4ddf
MS
2316/*
2317 * Setup the DM device's queue based on md's type
2318 */
591ddcfc 2319int dm_setup_md_queue(struct mapped_device *md, struct dm_table *t)
4a0b4ddf 2320{
ba305859 2321 enum dm_queue_mode type = dm_table_get_type(t);
c100ec49 2322 struct queue_limits limits;
1a581b72 2323 struct table_device *td;
ba305859 2324 int r;
bfebd1cd 2325
545ed20e 2326 switch (type) {
bfebd1cd 2327 case DM_TYPE_REQUEST_BASED:
681cc5e8 2328 md->disk->fops = &dm_rq_blk_dops;
e83068a5 2329 r = dm_mq_init_request_queue(md, t);
bfebd1cd 2330 if (r) {
681cc5e8 2331 DMERR("Cannot initialize queue for request-based dm mapped device");
bfebd1cd
MS
2332 return r;
2333 }
2334 break;
2335 case DM_TYPE_BIO_BASED:
545ed20e 2336 case DM_TYPE_DAX_BIO_BASED:
526d1006 2337 blk_queue_flag_set(QUEUE_FLAG_IO_STAT, md->queue);
bfebd1cd 2338 break;
7e0d574f
BVA
2339 case DM_TYPE_NONE:
2340 WARN_ON_ONCE(true);
2341 break;
4a0b4ddf
MS
2342 }
2343
c100ec49
MS
2344 r = dm_calculate_queue_limits(t, &limits);
2345 if (r) {
2346 DMERR("Cannot calculate initial queue limits");
2347 return r;
2348 }
bb37d772
DLM
2349 r = dm_table_set_restrictions(t, md->queue, &limits);
2350 if (r)
2351 return r;
2352
d563792c
YK
2353 /*
2354 * Hold lock to make sure add_disk() and del_gendisk() won't concurrent
2355 * with open_table_device() and close_table_device().
2356 */
2357 mutex_lock(&md->table_devices_lock);
e7089f65 2358 r = add_disk(md->disk);
d563792c 2359 mutex_unlock(&md->table_devices_lock);
e7089f65
LC
2360 if (r)
2361 return r;
c100ec49 2362
1a581b72
CH
2363 /*
2364 * Register the holder relationship for devices added before the disk
2365 * was live.
2366 */
2367 list_for_each_entry(td, &md->table_devices, list) {
2368 r = bd_link_disk_holder(td->dm_dev.bdev, md->disk);
2369 if (r)
2370 goto out_undo_holders;
89f871af 2371 }
d563792c 2372
1a581b72
CH
2373 r = dm_sysfs_init(md);
2374 if (r)
2375 goto out_undo_holders;
2376
89f871af 2377 md->type = type;
4a0b4ddf 2378 return 0;
1a581b72
CH
2379
2380out_undo_holders:
2381 list_for_each_entry_continue_reverse(td, &md->table_devices, list)
2382 bd_unlink_disk_holder(td->dm_dev.bdev, md->disk);
2383 mutex_lock(&md->table_devices_lock);
2384 del_gendisk(md->disk);
2385 mutex_unlock(&md->table_devices_lock);
2386 return r;
4a0b4ddf
MS
2387}
2388
2bec1f4a 2389struct mapped_device *dm_get_md(dev_t dev)
1da177e4
LT
2390{
2391 struct mapped_device *md;
86a3238c 2392 unsigned int minor = MINOR(dev);
1da177e4
LT
2393
2394 if (MAJOR(dev) != _major || minor >= (1 << MINORBITS))
2395 return NULL;
2396
f32c10b0 2397 spin_lock(&_minor_lock);
1da177e4
LT
2398
2399 md = idr_find(&_minor_idr, minor);
49de5769
MS
2400 if (!md || md == MINOR_ALLOCED || (MINOR(disk_devt(dm_disk(md))) != minor) ||
2401 test_bit(DMF_FREEING, &md->flags) || dm_deleting_md(md)) {
2402 md = NULL;
2403 goto out;
fba9f90e 2404 }
49de5769 2405 dm_get(md);
fba9f90e 2406out:
f32c10b0 2407 spin_unlock(&_minor_lock);
1da177e4 2408
637842cf
DT
2409 return md;
2410}
3cf2e4ba 2411EXPORT_SYMBOL_GPL(dm_get_md);
d229a958 2412
9ade92a9 2413void *dm_get_mdptr(struct mapped_device *md)
637842cf 2414{
9ade92a9 2415 return md->interface_ptr;
1da177e4
LT
2416}
2417
2418void dm_set_mdptr(struct mapped_device *md, void *ptr)
2419{
2420 md->interface_ptr = ptr;
2421}
2422
2423void dm_get(struct mapped_device *md)
2424{
2425 atomic_inc(&md->holders);
3f77316d 2426 BUG_ON(test_bit(DMF_FREEING, &md->flags));
1da177e4
LT
2427}
2428
09ee96b2
MP
2429int dm_hold(struct mapped_device *md)
2430{
2431 spin_lock(&_minor_lock);
2432 if (test_bit(DMF_FREEING, &md->flags)) {
2433 spin_unlock(&_minor_lock);
2434 return -EBUSY;
2435 }
2436 dm_get(md);
2437 spin_unlock(&_minor_lock);
2438 return 0;
2439}
2440EXPORT_SYMBOL_GPL(dm_hold);
2441
72d94861
AK
2442const char *dm_device_name(struct mapped_device *md)
2443{
2444 return md->name;
2445}
2446EXPORT_SYMBOL_GPL(dm_device_name);
2447
3f77316d 2448static void __dm_destroy(struct mapped_device *md, bool wait)
1da177e4 2449{
1134e5ae 2450 struct dm_table *map;
83d5e5b0 2451 int srcu_idx;
1da177e4 2452
3f77316d 2453 might_sleep();
fba9f90e 2454
63a4f065 2455 spin_lock(&_minor_lock);
3f77316d
KU
2456 idr_replace(&_minor_idr, MINOR_ALLOCED, MINOR(disk_devt(dm_disk(md))));
2457 set_bit(DMF_FREEING, &md->flags);
2458 spin_unlock(&_minor_lock);
3b785fbc 2459
7a5428dc 2460 blk_mark_disk_dead(md->disk);
3f77316d 2461
ab7c7bb6
MP
2462 /*
2463 * Take suspend_lock so that presuspend and postsuspend methods
2464 * do not race with internal suspend.
2465 */
2466 mutex_lock(&md->suspend_lock);
2a708cff 2467 map = dm_get_live_table(md, &srcu_idx);
3f77316d
KU
2468 if (!dm_suspended_md(md)) {
2469 dm_table_presuspend_targets(map);
adc0daad 2470 set_bit(DMF_SUSPENDED, &md->flags);
5df96f2b 2471 set_bit(DMF_POST_SUSPENDING, &md->flags);
3f77316d 2472 dm_table_postsuspend_targets(map);
1da177e4 2473 }
238d991f 2474 /* dm_put_live_table must be before fsleep, otherwise deadlock is possible */
83d5e5b0 2475 dm_put_live_table(md, srcu_idx);
2a708cff 2476 mutex_unlock(&md->suspend_lock);
83d5e5b0 2477
3f77316d
KU
2478 /*
2479 * Rare, but there may be I/O requests still going to complete,
2480 * for example. Wait for all references to disappear.
2481 * No one should increment the reference count of the mapped_device,
2482 * after the mapped_device state becomes DMF_FREEING.
2483 */
2484 if (wait)
2485 while (atomic_read(&md->holders))
238d991f 2486 fsleep(1000);
3f77316d
KU
2487 else if (atomic_read(&md->holders))
2488 DMWARN("%s: Forcibly removing mapped_device still in use! (%d users)",
2489 dm_device_name(md), atomic_read(&md->holders));
2490
3f77316d
KU
2491 dm_table_destroy(__unbind(md));
2492 free_dev(md);
2493}
2494
2495void dm_destroy(struct mapped_device *md)
2496{
2497 __dm_destroy(md, true);
2498}
2499
2500void dm_destroy_immediate(struct mapped_device *md)
2501{
2502 __dm_destroy(md, false);
2503}
2504
2505void dm_put(struct mapped_device *md)
2506{
2507 atomic_dec(&md->holders);
1da177e4 2508}
79eb885c 2509EXPORT_SYMBOL_GPL(dm_put);
1da177e4 2510
9f6dc633 2511static bool dm_in_flight_bios(struct mapped_device *md)
85067747
ML
2512{
2513 int cpu;
9f6dc633 2514 unsigned long sum = 0;
85067747 2515
9f6dc633
MS
2516 for_each_possible_cpu(cpu)
2517 sum += *per_cpu_ptr(md->pending_io, cpu);
85067747
ML
2518
2519 return sum != 0;
2520}
2521
2f064a59 2522static int dm_wait_for_bios_completion(struct mapped_device *md, unsigned int task_state)
46125c1c
MB
2523{
2524 int r = 0;
9f4c3f87 2525 DEFINE_WAIT(wait);
46125c1c 2526
85067747 2527 while (true) {
9f4c3f87 2528 prepare_to_wait(&md->wait, &wait, task_state);
46125c1c 2529
9f6dc633 2530 if (!dm_in_flight_bios(md))
46125c1c
MB
2531 break;
2532
e3fabdfd 2533 if (signal_pending_state(task_state, current)) {
46125c1c
MB
2534 r = -EINTR;
2535 break;
2536 }
2537
2538 io_schedule();
2539 }
9f4c3f87 2540 finish_wait(&md->wait, &wait);
b44ebeb0 2541
9f6dc633
MS
2542 smp_rmb();
2543
46125c1c
MB
2544 return r;
2545}
2546
2f064a59 2547static int dm_wait_for_completion(struct mapped_device *md, unsigned int task_state)
85067747
ML
2548{
2549 int r = 0;
2550
2551 if (!queue_is_mq(md->queue))
2552 return dm_wait_for_bios_completion(md, task_state);
2553
2554 while (true) {
2555 if (!blk_mq_queue_inflight(md->queue))
2556 break;
2557
2558 if (signal_pending_state(task_state, current)) {
2559 r = -EINTR;
2560 break;
2561 }
2562
238d991f 2563 fsleep(5000);
85067747
ML
2564 }
2565
2566 return r;
2567}
2568
1da177e4
LT
2569/*
2570 * Process the deferred bios
2571 */
ef208587 2572static void dm_wq_work(struct work_struct *work)
1da177e4 2573{
0c2915b8
MS
2574 struct mapped_device *md = container_of(work, struct mapped_device, work);
2575 struct bio *bio;
ef208587 2576
3b00b203 2577 while (!test_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags)) {
df12ee99 2578 spin_lock_irq(&md->deferred_lock);
0c2915b8 2579 bio = bio_list_pop(&md->deferred);
df12ee99
AK
2580 spin_unlock_irq(&md->deferred_lock);
2581
0c2915b8 2582 if (!bio)
df12ee99 2583 break;
022c2611 2584
0c2915b8 2585 submit_bio_noacct(bio);
0ca44fce 2586 cond_resched();
022c2611 2587 }
1da177e4
LT
2588}
2589
9a1fb464 2590static void dm_queue_flush(struct mapped_device *md)
304f3f6a 2591{
3b00b203 2592 clear_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags);
4e857c58 2593 smp_mb__after_atomic();
53d5914f 2594 queue_work(md->wq, &md->work);
304f3f6a
MB
2595}
2596
1da177e4 2597/*
042d2a9b 2598 * Swap in a new table, returning the old one for the caller to destroy.
1da177e4 2599 */
042d2a9b 2600struct dm_table *dm_swap_table(struct mapped_device *md, struct dm_table *table)
1da177e4 2601{
87eb5b21 2602 struct dm_table *live_map = NULL, *map = ERR_PTR(-EINVAL);
754c5fc7 2603 struct queue_limits limits;
042d2a9b 2604 int r;
1da177e4 2605
e61290a4 2606 mutex_lock(&md->suspend_lock);
1da177e4
LT
2607
2608 /* device must be suspended */
4f186f8b 2609 if (!dm_suspended_md(md))
93c534ae 2610 goto out;
1da177e4 2611
3ae70656
MS
2612 /*
2613 * If the new table has no data devices, retain the existing limits.
2614 * This helps multipath with queue_if_no_path if all paths disappear,
2615 * then new I/O is queued based on these limits, and then some paths
2616 * reappear.
2617 */
2618 if (dm_table_has_no_data_devices(table)) {
83d5e5b0 2619 live_map = dm_get_live_table_fast(md);
3ae70656
MS
2620 if (live_map)
2621 limits = md->queue->limits;
83d5e5b0 2622 dm_put_live_table_fast(md);
3ae70656
MS
2623 }
2624
87eb5b21
MC
2625 if (!live_map) {
2626 r = dm_calculate_queue_limits(table, &limits);
2627 if (r) {
2628 map = ERR_PTR(r);
2629 goto out;
2630 }
042d2a9b 2631 }
754c5fc7 2632
042d2a9b 2633 map = __bind(md, table, &limits);
62e08243 2634 dm_issue_global_event();
1da177e4 2635
93c534ae 2636out:
e61290a4 2637 mutex_unlock(&md->suspend_lock);
042d2a9b 2638 return map;
1da177e4
LT
2639}
2640
2641/*
2642 * Functions to lock and unlock any filesystem running on the
2643 * device.
2644 */
2ca3310e 2645static int lock_fs(struct mapped_device *md)
1da177e4 2646{
e39e2e95 2647 int r;
1da177e4 2648
040f04bd 2649 WARN_ON(test_bit(DMF_FROZEN, &md->flags));
aa8d7c2f 2650
977115c0 2651 r = freeze_bdev(md->disk->part0);
040f04bd
CH
2652 if (!r)
2653 set_bit(DMF_FROZEN, &md->flags);
2654 return r;
1da177e4
LT
2655}
2656
2ca3310e 2657static void unlock_fs(struct mapped_device *md)
1da177e4 2658{
aa8d7c2f
AK
2659 if (!test_bit(DMF_FROZEN, &md->flags))
2660 return;
977115c0 2661 thaw_bdev(md->disk->part0);
aa8d7c2f 2662 clear_bit(DMF_FROZEN, &md->flags);
1da177e4
LT
2663}
2664
2665/*
b48633f8
BVA
2666 * @suspend_flags: DM_SUSPEND_LOCKFS_FLAG and/or DM_SUSPEND_NOFLUSH_FLAG
2667 * @task_state: e.g. TASK_INTERRUPTIBLE or TASK_UNINTERRUPTIBLE
2668 * @dmf_suspended_flag: DMF_SUSPENDED or DMF_SUSPENDED_INTERNALLY
2669 *
ffcc3936
MS
2670 * If __dm_suspend returns 0, the device is completely quiescent
2671 * now. There is no request-processing activity. All new requests
2672 * are being added to md->deferred list.
cec47e3d 2673 */
ffcc3936 2674static int __dm_suspend(struct mapped_device *md, struct dm_table *map,
86a3238c 2675 unsigned int suspend_flags, unsigned int task_state,
eaf9a736 2676 int dmf_suspended_flag)
1da177e4 2677{
ffcc3936
MS
2678 bool do_lockfs = suspend_flags & DM_SUSPEND_LOCKFS_FLAG;
2679 bool noflush = suspend_flags & DM_SUSPEND_NOFLUSH_FLAG;
2680 int r;
1da177e4 2681
5a8f1f80
BVA
2682 lockdep_assert_held(&md->suspend_lock);
2683
2e93ccc1
KU
2684 /*
2685 * DMF_NOFLUSH_SUSPENDING must be set before presuspend.
2686 * This flag is cleared before dm_suspend returns.
2687 */
2688 if (noflush)
2689 set_bit(DMF_NOFLUSH_SUSPENDING, &md->flags);
86331f39 2690 else
ac75b09f 2691 DMDEBUG("%s: suspending with flush", dm_device_name(md));
2e93ccc1 2692
d67ee213
MS
2693 /*
2694 * This gets reverted if there's an error later and the targets
2695 * provide the .presuspend_undo hook.
2696 */
cf222b37
AK
2697 dm_table_presuspend_targets(map);
2698
32a926da 2699 /*
9f518b27
KU
2700 * Flush I/O to the device.
2701 * Any I/O submitted after lock_fs() may not be flushed.
2702 * noflush takes precedence over do_lockfs.
2703 * (lock_fs() flushes I/Os and waits for them to complete.)
32a926da
MP
2704 */
2705 if (!noflush && do_lockfs) {
2706 r = lock_fs(md);
d67ee213
MS
2707 if (r) {
2708 dm_table_presuspend_undo_targets(map);
ffcc3936 2709 return r;
d67ee213 2710 }
aa8d7c2f 2711 }
1da177e4
LT
2712
2713 /*
3b00b203
MP
2714 * Here we must make sure that no processes are submitting requests
2715 * to target drivers i.e. no one may be executing
96c9865c 2716 * dm_split_and_process_bio from dm_submit_bio.
3b00b203 2717 *
96c9865c 2718 * To get all processes out of dm_split_and_process_bio in dm_submit_bio,
3b00b203 2719 * we take the write lock. To prevent any process from reentering
96c9865c 2720 * dm_split_and_process_bio from dm_submit_bio and quiesce the thread
0cede372 2721 * (dm_wq_work), we set DMF_BLOCK_IO_FOR_SUSPEND and call
6a8736d1 2722 * flush_workqueue(md->wq).
1da177e4 2723 */
1eb787ec 2724 set_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags);
41abc4e1
HR
2725 if (map)
2726 synchronize_srcu(&md->io_barrier);
1da177e4 2727
d0bcb878 2728 /*
29e4013d
TH
2729 * Stop md->queue before flushing md->wq in case request-based
2730 * dm defers requests to md->wq from md->queue.
d0bcb878 2731 */
6a23e05c 2732 if (dm_request_based(md))
eca7ee6d 2733 dm_stop_queue(md->queue);
cec47e3d 2734
d0bcb878
KU
2735 flush_workqueue(md->wq);
2736
1da177e4 2737 /*
3b00b203
MP
2738 * At this point no more requests are entering target request routines.
2739 * We call dm_wait_for_completion to wait for all existing requests
2740 * to finish.
1da177e4 2741 */
b48633f8 2742 r = dm_wait_for_completion(md, task_state);
eaf9a736
MS
2743 if (!r)
2744 set_bit(dmf_suspended_flag, &md->flags);
1da177e4 2745
6d6f10df 2746 if (noflush)
022c2611 2747 clear_bit(DMF_NOFLUSH_SUSPENDING, &md->flags);
41abc4e1
HR
2748 if (map)
2749 synchronize_srcu(&md->io_barrier);
2e93ccc1 2750
1da177e4 2751 /* were we interrupted ? */
46125c1c 2752 if (r < 0) {
9a1fb464 2753 dm_queue_flush(md);
73d410c0 2754
cec47e3d 2755 if (dm_request_based(md))
eca7ee6d 2756 dm_start_queue(md->queue);
cec47e3d 2757
2ca3310e 2758 unlock_fs(md);
d67ee213 2759 dm_table_presuspend_undo_targets(map);
ffcc3936 2760 /* pushback list is already flushed, so skip flush */
2ca3310e 2761 }
1da177e4 2762
ffcc3936
MS
2763 return r;
2764}
2765
2766/*
2767 * We need to be able to change a mapping table under a mounted
2768 * filesystem. For example we might want to move some data in
2769 * the background. Before the table can be swapped with
2770 * dm_bind_table, dm_suspend must be called to flush any in
2771 * flight bios and ensure that any further io gets deferred.
2772 */
2773/*
2774 * Suspend mechanism in request-based dm.
2775 *
2776 * 1. Flush all I/Os by lock_fs() if needed.
2777 * 2. Stop dispatching any I/O by stopping the request_queue.
2778 * 3. Wait for all in-flight I/Os to be completed or requeued.
2779 *
2780 * To abort suspend, start the request_queue.
2781 */
86a3238c 2782int dm_suspend(struct mapped_device *md, unsigned int suspend_flags)
ffcc3936
MS
2783{
2784 struct dm_table *map = NULL;
2785 int r = 0;
2786
2787retry:
2788 mutex_lock_nested(&md->suspend_lock, SINGLE_DEPTH_NESTING);
2789
2790 if (dm_suspended_md(md)) {
2791 r = -EINVAL;
2792 goto out_unlock;
2793 }
2794
2795 if (dm_suspended_internally_md(md)) {
2796 /* already internally suspended, wait for internal resume */
2797 mutex_unlock(&md->suspend_lock);
2798 r = wait_on_bit(&md->flags, DMF_SUSPENDED_INTERNALLY, TASK_INTERRUPTIBLE);
2799 if (r)
2800 return r;
2801 goto retry;
2802 }
2803
a12f5d48 2804 map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock));
2760904d
LL
2805 if (!map) {
2806 /* avoid deadlock with fs/namespace.c:do_mount() */
2807 suspend_flags &= ~DM_SUSPEND_LOCKFS_FLAG;
2808 }
ffcc3936 2809
eaf9a736 2810 r = __dm_suspend(md, map, suspend_flags, TASK_INTERRUPTIBLE, DMF_SUSPENDED);
ffcc3936
MS
2811 if (r)
2812 goto out_unlock;
3b00b203 2813
5df96f2b 2814 set_bit(DMF_POST_SUSPENDING, &md->flags);
4d4471cb 2815 dm_table_postsuspend_targets(map);
5df96f2b 2816 clear_bit(DMF_POST_SUSPENDING, &md->flags);
4d4471cb 2817
d287483d 2818out_unlock:
e61290a4 2819 mutex_unlock(&md->suspend_lock);
cf222b37 2820 return r;
1da177e4
LT
2821}
2822
ffcc3936
MS
2823static int __dm_resume(struct mapped_device *md, struct dm_table *map)
2824{
2825 if (map) {
2826 int r = dm_table_resume_targets(map);
b30f1607 2827
ffcc3936
MS
2828 if (r)
2829 return r;
2830 }
2831
2832 dm_queue_flush(md);
2833
2834 /*
2835 * Flushing deferred I/Os must be done after targets are resumed
2836 * so that mapping of targets can work correctly.
2837 * Request-based dm is queueing the deferred I/Os in its request_queue.
2838 */
2839 if (dm_request_based(md))
eca7ee6d 2840 dm_start_queue(md->queue);
ffcc3936
MS
2841
2842 unlock_fs(md);
2843
2844 return 0;
2845}
2846
1da177e4
LT
2847int dm_resume(struct mapped_device *md)
2848{
8dc23658 2849 int r;
cf222b37 2850 struct dm_table *map = NULL;
1da177e4 2851
ffcc3936 2852retry:
8dc23658 2853 r = -EINVAL;
ffcc3936
MS
2854 mutex_lock_nested(&md->suspend_lock, SINGLE_DEPTH_NESTING);
2855
4f186f8b 2856 if (!dm_suspended_md(md))
cf222b37 2857 goto out;
cf222b37 2858
ffcc3936
MS
2859 if (dm_suspended_internally_md(md)) {
2860 /* already internally suspended, wait for internal resume */
2861 mutex_unlock(&md->suspend_lock);
2862 r = wait_on_bit(&md->flags, DMF_SUSPENDED_INTERNALLY, TASK_INTERRUPTIBLE);
2863 if (r)
2864 return r;
2865 goto retry;
2866 }
2867
a12f5d48 2868 map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock));
2ca3310e 2869 if (!map || !dm_table_get_size(map))
cf222b37 2870 goto out;
1da177e4 2871
ffcc3936 2872 r = __dm_resume(md, map);
8757b776
MB
2873 if (r)
2874 goto out;
2ca3310e 2875
2ca3310e 2876 clear_bit(DMF_SUSPENDED, &md->flags);
cf222b37 2877out:
e61290a4 2878 mutex_unlock(&md->suspend_lock);
2ca3310e 2879
cf222b37 2880 return r;
1da177e4
LT
2881}
2882
fd2ed4d2
MP
2883/*
2884 * Internal suspend/resume works like userspace-driven suspend. It waits
2885 * until all bios finish and prevents issuing new bios to the target drivers.
2886 * It may be used only from the kernel.
fd2ed4d2
MP
2887 */
2888
86a3238c 2889static void __dm_internal_suspend(struct mapped_device *md, unsigned int suspend_flags)
fd2ed4d2 2890{
ffcc3936
MS
2891 struct dm_table *map = NULL;
2892
1ea0654e
BVA
2893 lockdep_assert_held(&md->suspend_lock);
2894
96b26c8c 2895 if (md->internal_suspend_count++)
ffcc3936
MS
2896 return; /* nested internal suspend */
2897
2898 if (dm_suspended_md(md)) {
2899 set_bit(DMF_SUSPENDED_INTERNALLY, &md->flags);
2900 return; /* nest suspend */
2901 }
2902
a12f5d48 2903 map = rcu_dereference_protected(md->map, lockdep_is_held(&md->suspend_lock));
ffcc3936
MS
2904
2905 /*
2906 * Using TASK_UNINTERRUPTIBLE because only NOFLUSH internal suspend is
2907 * supported. Properly supporting a TASK_INTERRUPTIBLE internal suspend
2908 * would require changing .presuspend to return an error -- avoid this
2909 * until there is a need for more elaborate variants of internal suspend.
2910 */
eaf9a736
MS
2911 (void) __dm_suspend(md, map, suspend_flags, TASK_UNINTERRUPTIBLE,
2912 DMF_SUSPENDED_INTERNALLY);
ffcc3936 2913
5df96f2b 2914 set_bit(DMF_POST_SUSPENDING, &md->flags);
ffcc3936 2915 dm_table_postsuspend_targets(map);
5df96f2b 2916 clear_bit(DMF_POST_SUSPENDING, &md->flags);
ffcc3936
MS
2917}
2918
2919static void __dm_internal_resume(struct mapped_device *md)
2920{
96b26c8c
MP
2921 BUG_ON(!md->internal_suspend_count);
2922
2923 if (--md->internal_suspend_count)
ffcc3936
MS
2924 return; /* resume from nested internal suspend */
2925
fd2ed4d2 2926 if (dm_suspended_md(md))
ffcc3936
MS
2927 goto done; /* resume from nested suspend */
2928
2929 /*
2930 * NOTE: existing callers don't need to call dm_table_resume_targets
2931 * (which may fail -- so best to avoid it for now by passing NULL map)
2932 */
2933 (void) __dm_resume(md, NULL);
2934
2935done:
2936 clear_bit(DMF_SUSPENDED_INTERNALLY, &md->flags);
2937 smp_mb__after_atomic();
2938 wake_up_bit(&md->flags, DMF_SUSPENDED_INTERNALLY);
2939}
2940
2941void dm_internal_suspend_noflush(struct mapped_device *md)
2942{
2943 mutex_lock(&md->suspend_lock);
2944 __dm_internal_suspend(md, DM_SUSPEND_NOFLUSH_FLAG);
2945 mutex_unlock(&md->suspend_lock);
2946}
2947EXPORT_SYMBOL_GPL(dm_internal_suspend_noflush);
2948
2949void dm_internal_resume(struct mapped_device *md)
2950{
2951 mutex_lock(&md->suspend_lock);
2952 __dm_internal_resume(md);
2953 mutex_unlock(&md->suspend_lock);
2954}
2955EXPORT_SYMBOL_GPL(dm_internal_resume);
2956
2957/*
2958 * Fast variants of internal suspend/resume hold md->suspend_lock,
2959 * which prevents interaction with userspace-driven suspend.
2960 */
2961
2962void dm_internal_suspend_fast(struct mapped_device *md)
2963{
2964 mutex_lock(&md->suspend_lock);
2965 if (dm_suspended_md(md) || dm_suspended_internally_md(md))
fd2ed4d2
MP
2966 return;
2967
2968 set_bit(DMF_BLOCK_IO_FOR_SUSPEND, &md->flags);
2969 synchronize_srcu(&md->io_barrier);
2970 flush_workqueue(md->wq);
2971 dm_wait_for_completion(md, TASK_UNINTERRUPTIBLE);
2972}
b735fede 2973EXPORT_SYMBOL_GPL(dm_internal_suspend_fast);
fd2ed4d2 2974
ffcc3936 2975void dm_internal_resume_fast(struct mapped_device *md)
fd2ed4d2 2976{
ffcc3936 2977 if (dm_suspended_md(md) || dm_suspended_internally_md(md))
fd2ed4d2
MP
2978 goto done;
2979
2980 dm_queue_flush(md);
2981
2982done:
2983 mutex_unlock(&md->suspend_lock);
2984}
b735fede 2985EXPORT_SYMBOL_GPL(dm_internal_resume_fast);
fd2ed4d2 2986
a4a82ce3
HM
2987/*
2988 *---------------------------------------------------------------
1da177e4 2989 * Event notification.
a4a82ce3
HM
2990 *---------------------------------------------------------------
2991 */
3abf85b5 2992int dm_kobject_uevent(struct mapped_device *md, enum kobject_action action,
86a3238c 2993 unsigned int cookie, bool need_resize_uevent)
69267a30 2994{
6958c1c6 2995 int r;
86a3238c 2996 unsigned int noio_flag;
60935eb2 2997 char udev_cookie[DM_COOKIE_LENGTH];
7533afa1
MP
2998 char *envp[3] = { NULL, NULL, NULL };
2999 char **envpp = envp;
3000 if (cookie) {
60935eb2
MB
3001 snprintf(udev_cookie, DM_COOKIE_LENGTH, "%s=%u",
3002 DM_COOKIE_ENV_VAR_NAME, cookie);
7533afa1 3003 *envpp++ = udev_cookie;
60935eb2 3004 }
7533afa1
MP
3005 if (need_resize_uevent) {
3006 *envpp++ = "RESIZE=1";
3007 }
3008
3009 noio_flag = memalloc_noio_save();
3010
3011 r = kobject_uevent_env(&disk_to_dev(md->disk)->kobj, action, envp);
6958c1c6
MP
3012
3013 memalloc_noio_restore(noio_flag);
3014
3015 return r;
69267a30
AK
3016}
3017
7a8c3d3b
MA
3018uint32_t dm_next_uevent_seq(struct mapped_device *md)
3019{
3020 return atomic_add_return(1, &md->uevent_seq);
3021}
3022
1da177e4
LT
3023uint32_t dm_get_event_nr(struct mapped_device *md)
3024{
3025 return atomic_read(&md->event_nr);
3026}
3027
3028int dm_wait_event(struct mapped_device *md, int event_nr)
3029{
3030 return wait_event_interruptible(md->eventq,
3031 (event_nr != atomic_read(&md->event_nr)));
3032}
3033
7a8c3d3b
MA
3034void dm_uevent_add(struct mapped_device *md, struct list_head *elist)
3035{
3036 unsigned long flags;
3037
3038 spin_lock_irqsave(&md->uevent_lock, flags);
3039 list_add(elist, &md->uevent_list);
3040 spin_unlock_irqrestore(&md->uevent_lock, flags);
3041}
3042
1da177e4
LT
3043/*
3044 * The gendisk is only valid as long as you have a reference
3045 * count on 'md'.
3046 */
3047struct gendisk *dm_disk(struct mapped_device *md)
3048{
3049 return md->disk;
3050}
65ff5b7d 3051EXPORT_SYMBOL_GPL(dm_disk);
1da177e4 3052
784aae73
MB
3053struct kobject *dm_kobject(struct mapped_device *md)
3054{
2995fa78 3055 return &md->kobj_holder.kobj;
784aae73
MB
3056}
3057
784aae73
MB
3058struct mapped_device *dm_get_from_kobject(struct kobject *kobj)
3059{
3060 struct mapped_device *md;
3061
2995fa78 3062 md = container_of(kobj, struct mapped_device, kobj_holder.kobj);
784aae73 3063
b9a41d21
HT
3064 spin_lock(&_minor_lock);
3065 if (test_bit(DMF_FREEING, &md->flags) || dm_deleting_md(md)) {
3066 md = NULL;
3067 goto out;
3068 }
784aae73 3069 dm_get(md);
b9a41d21
HT
3070out:
3071 spin_unlock(&_minor_lock);
3072
784aae73
MB
3073 return md;
3074}
3075
4f186f8b 3076int dm_suspended_md(struct mapped_device *md)
1da177e4
LT
3077{
3078 return test_bit(DMF_SUSPENDED, &md->flags);
3079}
3080
5df96f2b
MP
3081static int dm_post_suspending_md(struct mapped_device *md)
3082{
3083 return test_bit(DMF_POST_SUSPENDING, &md->flags);
3084}
3085
ffcc3936
MS
3086int dm_suspended_internally_md(struct mapped_device *md)
3087{
3088 return test_bit(DMF_SUSPENDED_INTERNALLY, &md->flags);
3089}
3090
2c140a24
MP
3091int dm_test_deferred_remove_flag(struct mapped_device *md)
3092{
3093 return test_bit(DMF_DEFERRED_REMOVE, &md->flags);
3094}
3095
64dbce58
KU
3096int dm_suspended(struct dm_target *ti)
3097{
33bd6f06 3098 return dm_suspended_md(ti->table->md);
64dbce58
KU
3099}
3100EXPORT_SYMBOL_GPL(dm_suspended);
3101
5df96f2b
MP
3102int dm_post_suspending(struct dm_target *ti)
3103{
33bd6f06 3104 return dm_post_suspending_md(ti->table->md);
5df96f2b
MP
3105}
3106EXPORT_SYMBOL_GPL(dm_post_suspending);
3107
2e93ccc1
KU
3108int dm_noflush_suspending(struct dm_target *ti)
3109{
33bd6f06 3110 return __noflush_suspending(ti->table->md);
2e93ccc1
KU
3111}
3112EXPORT_SYMBOL_GPL(dm_noflush_suspending);
3113
e6ee8c0b
KU
3114void dm_free_md_mempools(struct dm_md_mempools *pools)
3115{
3116 if (!pools)
3117 return;
3118
6f1c819c
KO
3119 bioset_exit(&pools->bs);
3120 bioset_exit(&pools->io_bs);
e6ee8c0b
KU
3121
3122 kfree(pools);
3123}
3124
9c72bad1
CH
3125struct dm_pr {
3126 u64 old_key;
3127 u64 new_key;
3128 u32 flags;
c6adada5 3129 bool abort;
9c72bad1 3130 bool fail_early;
8dd87f3c 3131 int ret;
70151087 3132 enum pr_type type;
8a8da082
MC
3133 struct pr_keys *read_keys;
3134 struct pr_held_reservation *rsv;
9c72bad1
CH
3135};
3136
3137static int dm_call_pr(struct block_device *bdev, iterate_devices_callout_fn fn,
8dd87f3c 3138 struct dm_pr *pr)
71cdb697
CH
3139{
3140 struct mapped_device *md = bdev->bd_disk->private_data;
9c72bad1
CH
3141 struct dm_table *table;
3142 struct dm_target *ti;
3143 int ret = -ENOTTY, srcu_idx;
71cdb697 3144
9c72bad1
CH
3145 table = dm_get_live_table(md, &srcu_idx);
3146 if (!table || !dm_table_get_size(table))
3147 goto out;
71cdb697 3148
9c72bad1 3149 /* We only support devices that have a single target */
2aec377a 3150 if (table->num_targets != 1)
9c72bad1
CH
3151 goto out;
3152 ti = dm_table_get_target(table, 0);
71cdb697 3153
e120a5f1
MS
3154 if (dm_suspended_md(md)) {
3155 ret = -EAGAIN;
3156 goto out;
3157 }
3158
9c72bad1
CH
3159 ret = -EINVAL;
3160 if (!ti->type->iterate_devices)
3161 goto out;
3162
8dd87f3c
MC
3163 ti->type->iterate_devices(ti, fn, pr);
3164 ret = 0;
9c72bad1
CH
3165out:
3166 dm_put_live_table(md, srcu_idx);
3167 return ret;
3168}
3169
3170/*
3171 * For register / unregister we need to manually call out to every path.
3172 */
3173static int __dm_pr_register(struct dm_target *ti, struct dm_dev *dev,
3174 sector_t start, sector_t len, void *data)
3175{
3176 struct dm_pr *pr = data;
3177 const struct pr_ops *ops = dev->bdev->bd_disk->fops->pr_ops;
8dd87f3c
MC
3178 int ret;
3179
3180 if (!ops || !ops->pr_register) {
3181 pr->ret = -EOPNOTSUPP;
3182 return -1;
3183 }
9c72bad1 3184
8dd87f3c
MC
3185 ret = ops->pr_register(dev->bdev, pr->old_key, pr->new_key, pr->flags);
3186 if (!ret)
3187 return 0;
3188
3189 if (!pr->ret)
3190 pr->ret = ret;
9c72bad1 3191
8dd87f3c
MC
3192 if (pr->fail_early)
3193 return -1;
3194
3195 return 0;
9c72bad1
CH
3196}
3197
3198static int dm_pr_register(struct block_device *bdev, u64 old_key, u64 new_key,
3199 u32 flags)
3200{
3201 struct dm_pr pr = {
3202 .old_key = old_key,
3203 .new_key = new_key,
3204 .flags = flags,
3205 .fail_early = true,
8dd87f3c 3206 .ret = 0,
9c72bad1
CH
3207 };
3208 int ret;
3209
3210 ret = dm_call_pr(bdev, __dm_pr_register, &pr);
8dd87f3c
MC
3211 if (ret) {
3212 /* Didn't even get to register a path */
3213 return ret;
9c72bad1
CH
3214 }
3215
8dd87f3c
MC
3216 if (!pr.ret)
3217 return 0;
3218 ret = pr.ret;
3219
3220 if (!new_key)
3221 return ret;
3222
3223 /* unregister all paths if we failed to register any path */
3224 pr.old_key = new_key;
3225 pr.new_key = 0;
3226 pr.flags = 0;
3227 pr.fail_early = false;
3228 (void) dm_call_pr(bdev, __dm_pr_register, &pr);
9c72bad1 3229 return ret;
71cdb697
CH
3230}
3231
70151087
MC
3232
3233static int __dm_pr_reserve(struct dm_target *ti, struct dm_dev *dev,
3234 sector_t start, sector_t len, void *data)
3235{
3236 struct dm_pr *pr = data;
3237 const struct pr_ops *ops = dev->bdev->bd_disk->fops->pr_ops;
3238
3239 if (!ops || !ops->pr_reserve) {
3240 pr->ret = -EOPNOTSUPP;
3241 return -1;
3242 }
3243
3244 pr->ret = ops->pr_reserve(dev->bdev, pr->old_key, pr->type, pr->flags);
3245 if (!pr->ret)
3246 return -1;
3247
3248 return 0;
3249}
3250
71cdb697 3251static int dm_pr_reserve(struct block_device *bdev, u64 key, enum pr_type type,
956a4025 3252 u32 flags)
71cdb697 3253{
70151087
MC
3254 struct dm_pr pr = {
3255 .old_key = key,
3256 .flags = flags,
3257 .type = type,
3258 .fail_early = false,
3259 .ret = 0,
3260 };
3261 int ret;
71cdb697 3262
70151087
MC
3263 ret = dm_call_pr(bdev, __dm_pr_reserve, &pr);
3264 if (ret)
3265 return ret;
71cdb697 3266
70151087 3267 return pr.ret;
71cdb697
CH
3268}
3269
08a3c338
MC
3270/*
3271 * If there is a non-All Registrants type of reservation, the release must be
3272 * sent down the holding path. For the cases where there is no reservation or
3273 * the path is not the holder the device will also return success, so we must
3274 * try each path to make sure we got the correct path.
3275 */
3276static int __dm_pr_release(struct dm_target *ti, struct dm_dev *dev,
3277 sector_t start, sector_t len, void *data)
3278{
3279 struct dm_pr *pr = data;
3280 const struct pr_ops *ops = dev->bdev->bd_disk->fops->pr_ops;
3281
3282 if (!ops || !ops->pr_release) {
3283 pr->ret = -EOPNOTSUPP;
3284 return -1;
3285 }
3286
3287 pr->ret = ops->pr_release(dev->bdev, pr->old_key, pr->type);
3288 if (pr->ret)
3289 return -1;
3290
3291 return 0;
71cdb697
CH
3292}
3293
3294static int dm_pr_release(struct block_device *bdev, u64 key, enum pr_type type)
3295{
08a3c338
MC
3296 struct dm_pr pr = {
3297 .old_key = key,
3298 .type = type,
3299 .fail_early = false,
3300 };
3301 int ret;
71cdb697 3302
08a3c338
MC
3303 ret = dm_call_pr(bdev, __dm_pr_release, &pr);
3304 if (ret)
3305 return ret;
71cdb697 3306
08a3c338 3307 return pr.ret;
71cdb697
CH
3308}
3309
c6adada5
MC
3310static int __dm_pr_preempt(struct dm_target *ti, struct dm_dev *dev,
3311 sector_t start, sector_t len, void *data)
3312{
3313 struct dm_pr *pr = data;
3314 const struct pr_ops *ops = dev->bdev->bd_disk->fops->pr_ops;
3315
3316 if (!ops || !ops->pr_preempt) {
3317 pr->ret = -EOPNOTSUPP;
3318 return -1;
3319 }
3320
3321 pr->ret = ops->pr_preempt(dev->bdev, pr->old_key, pr->new_key, pr->type,
3322 pr->abort);
3323 if (!pr->ret)
3324 return -1;
3325
3326 return 0;
71cdb697
CH
3327}
3328
3329static int dm_pr_preempt(struct block_device *bdev, u64 old_key, u64 new_key,
956a4025 3330 enum pr_type type, bool abort)
71cdb697 3331{
c6adada5
MC
3332 struct dm_pr pr = {
3333 .new_key = new_key,
3334 .old_key = old_key,
3335 .type = type,
3336 .fail_early = false,
3337 };
3338 int ret;
71cdb697 3339
c6adada5
MC
3340 ret = dm_call_pr(bdev, __dm_pr_preempt, &pr);
3341 if (ret)
3342 return ret;
71cdb697 3343
c6adada5 3344 return pr.ret;
71cdb697
CH
3345}
3346
3347static int dm_pr_clear(struct block_device *bdev, u64 key)
3348{
3349 struct mapped_device *md = bdev->bd_disk->private_data;
3350 const struct pr_ops *ops;
971888c4 3351 int r, srcu_idx;
71cdb697 3352
5bd5e8d8 3353 r = dm_prepare_ioctl(md, &srcu_idx, &bdev);
71cdb697 3354 if (r < 0)
971888c4 3355 goto out;
71cdb697
CH
3356
3357 ops = bdev->bd_disk->fops->pr_ops;
3358 if (ops && ops->pr_clear)
3359 r = ops->pr_clear(bdev, key);
3360 else
3361 r = -EOPNOTSUPP;
971888c4
MS
3362out:
3363 dm_unprepare_ioctl(md, srcu_idx);
71cdb697
CH
3364 return r;
3365}
3366
8a8da082
MC
3367static int __dm_pr_read_keys(struct dm_target *ti, struct dm_dev *dev,
3368 sector_t start, sector_t len, void *data)
3369{
3370 struct dm_pr *pr = data;
3371 const struct pr_ops *ops = dev->bdev->bd_disk->fops->pr_ops;
3372
3373 if (!ops || !ops->pr_read_keys) {
3374 pr->ret = -EOPNOTSUPP;
3375 return -1;
3376 }
3377
3378 pr->ret = ops->pr_read_keys(dev->bdev, pr->read_keys);
3379 if (!pr->ret)
3380 return -1;
3381
3382 return 0;
3383}
3384
3385static int dm_pr_read_keys(struct block_device *bdev, struct pr_keys *keys)
3386{
3387 struct dm_pr pr = {
3388 .read_keys = keys,
3389 };
3390 int ret;
3391
3392 ret = dm_call_pr(bdev, __dm_pr_read_keys, &pr);
3393 if (ret)
3394 return ret;
3395
3396 return pr.ret;
3397}
3398
3399static int __dm_pr_read_reservation(struct dm_target *ti, struct dm_dev *dev,
3400 sector_t start, sector_t len, void *data)
3401{
3402 struct dm_pr *pr = data;
3403 const struct pr_ops *ops = dev->bdev->bd_disk->fops->pr_ops;
3404
3405 if (!ops || !ops->pr_read_reservation) {
3406 pr->ret = -EOPNOTSUPP;
3407 return -1;
3408 }
3409
3410 pr->ret = ops->pr_read_reservation(dev->bdev, pr->rsv);
3411 if (!pr->ret)
3412 return -1;
3413
3414 return 0;
3415}
3416
3417static int dm_pr_read_reservation(struct block_device *bdev,
3418 struct pr_held_reservation *rsv)
3419{
3420 struct dm_pr pr = {
3421 .rsv = rsv,
3422 };
3423 int ret;
3424
3425 ret = dm_call_pr(bdev, __dm_pr_read_reservation, &pr);
3426 if (ret)
3427 return ret;
3428
3429 return pr.ret;
3430}
3431
71cdb697
CH
3432static const struct pr_ops dm_pr_ops = {
3433 .pr_register = dm_pr_register,
3434 .pr_reserve = dm_pr_reserve,
3435 .pr_release = dm_pr_release,
3436 .pr_preempt = dm_pr_preempt,
3437 .pr_clear = dm_pr_clear,
8a8da082
MC
3438 .pr_read_keys = dm_pr_read_keys,
3439 .pr_read_reservation = dm_pr_read_reservation,
71cdb697
CH
3440};
3441
83d5cde4 3442static const struct block_device_operations dm_blk_dops = {
c62b37d9 3443 .submit_bio = dm_submit_bio,
b99fdcdc 3444 .poll_bio = dm_poll_bio,
1da177e4
LT
3445 .open = dm_blk_open,
3446 .release = dm_blk_close,
aa129a22 3447 .ioctl = dm_blk_ioctl,
3ac51e74 3448 .getgeo = dm_blk_getgeo,
e76239a3 3449 .report_zones = dm_blk_report_zones,
71cdb697 3450 .pr_ops = &dm_pr_ops,
1da177e4
LT
3451 .owner = THIS_MODULE
3452};
3453
681cc5e8
MS
3454static const struct block_device_operations dm_rq_blk_dops = {
3455 .open = dm_blk_open,
3456 .release = dm_blk_close,
3457 .ioctl = dm_blk_ioctl,
3458 .getgeo = dm_blk_getgeo,
3459 .pr_ops = &dm_pr_ops,
3460 .owner = THIS_MODULE
3461};
3462
f26c5719
DW
3463static const struct dax_operations dm_dax_ops = {
3464 .direct_access = dm_dax_direct_access,
cdf6cdcd 3465 .zero_page_range = dm_dax_zero_page_range,
047218ec 3466 .recovery_write = dm_dax_recovery_write,
f26c5719
DW
3467};
3468
1da177e4
LT
3469/*
3470 * module hooks
3471 */
3472module_init(dm_init);
3473module_exit(dm_exit);
3474
3475module_param(major, uint, 0);
3476MODULE_PARM_DESC(major, "The major number of the device mapper");
f4790826 3477
6a808034 3478module_param(reserved_bio_based_ios, uint, 0644);
e8603136
MS
3479MODULE_PARM_DESC(reserved_bio_based_ios, "Reserved IOs in bio-based mempools");
3480
6a808034 3481module_param(dm_numa_node, int, 0644);
115485e8
MS
3482MODULE_PARM_DESC(dm_numa_node, "NUMA node for DM device memory allocations");
3483
6a808034 3484module_param(swap_bios, int, 0644);
a666e5c0
MP
3485MODULE_PARM_DESC(swap_bios, "Maximum allowed inflight swap IOs");
3486
1da177e4
LT
3487MODULE_DESCRIPTION(DM_NAME " driver");
3488MODULE_AUTHOR("Joe Thornber <dm-devel@redhat.com>");
3489MODULE_LICENSE("GPL");