From patchwork Tue Apr 24 23:33:07 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Dan Williams X-Patchwork-Id: 10361209 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id E57B560209 for ; Tue, 24 Apr 2018 23:43:07 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id D7DE228E7F for ; Tue, 24 Apr 2018 23:43:07 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id CC95D28E9A; Tue, 24 Apr 2018 23:43:07 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=BAYES_00, MAILING_LIST_MULTI, RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 Received: from ml01.01.org (ml01.01.org [198.145.21.10]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 0A84328E7F for ; Tue, 24 Apr 2018 23:43:06 +0000 (UTC) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id E788B22497F45; Tue, 24 Apr 2018 16:43:06 -0700 (PDT) X-Original-To: linux-nvdimm@lists.01.org Delivered-To: linux-nvdimm@lists.01.org Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=134.134.136.31; helo=mga06.intel.com; envelope-from=dan.j.williams@intel.com; receiver=linux-nvdimm@lists.01.org Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id F095F220E8E0E for ; Tue, 24 Apr 2018 16:43:04 -0700 (PDT) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 24 Apr 2018 16:43:04 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,324,1520924400"; d="scan'208";a="34392432" Received: from dwillia2-desk3.jf.intel.com (HELO dwillia2-desk3.amr.corp.intel.com) ([10.54.39.16]) by fmsmga007.fm.intel.com with ESMTP; 24 Apr 2018 16:43:03 -0700 Subject: [PATCH v9 1/9] dax, dm: introduce ->fs_{claim, release}() dax_device infrastructure From: Dan Williams To: linux-nvdimm@lists.01.org Date: Tue, 24 Apr 2018 16:33:07 -0700 Message-ID: <152461278783.17530.15159365432572689004.stgit@dwillia2-desk3.amr.corp.intel.com> In-Reply-To: <152461278149.17530.2867511144531572045.stgit@dwillia2-desk3.amr.corp.intel.com> References: <152461278149.17530.2867511144531572045.stgit@dwillia2-desk3.amr.corp.intel.com> User-Agent: StGit/0.18-2-gc94f MIME-Version: 1.0 X-BeenThere: linux-nvdimm@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: "Linux-nvdimm developer list." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: jack@suse.cz, Mike Snitzer , Matthew Wilcox , david@fromorbit.com, linux-xfs@vger.kernel.org, linux-mm@kvack.org, =?utf-8?b?SsOpcsO0bWU=?= Glisse , linux-fsdevel@vger.kernel.org, hch@lst.de, Alasdair Kergon Errors-To: linux-nvdimm-bounces@lists.01.org Sender: "Linux-nvdimm" X-Virus-Scanned: ClamAV using ClamSMTP In preparation for allowing filesystems to augment the dev_pagemap associated with a dax_device, add an ->fs_claim() callback. The ->fs_claim() callback is leveraged by the device-mapper dax implementation to iterate all member devices in the map and repeat the claim operation across the array. In order to resolve collisions between filesystem operations and DMA to DAX mapped pages we need a callback when DMA completes. With a callback we can hold off filesystem operations while DMA is in-flight and then resume those operations when the last put_page() occurs on a DMA page. The ->fs_claim() operation arranges for this callback to be registered, although that implementation is saved for a later patch. Cc: Alasdair Kergon Cc: Matthew Wilcox Cc: Ross Zwisler Cc: "Jérôme Glisse" Cc: Christoph Hellwig Cc: Jan Kara Acked-by: Mike Snitzer Signed-off-by: Dan Williams Reviewed-by: Jan Kara --- drivers/dax/super.c | 76 ++++++++++++++++++++++++++++++++++++++++++++++ drivers/md/dm.c | 57 +++++++++++++++++++++++++++++++++++ include/linux/dax.h | 48 +++++++++++++++++++++++++++++ include/linux/memremap.h | 8 +++++ 4 files changed, 189 insertions(+) diff --git a/drivers/dax/super.c b/drivers/dax/super.c index 2b2332b605e4..e62a64b9c9fb 100644 --- a/drivers/dax/super.c +++ b/drivers/dax/super.c @@ -29,6 +29,7 @@ static struct vfsmount *dax_mnt; static DEFINE_IDA(dax_minor_ida); static struct kmem_cache *dax_cache __read_mostly; static struct super_block *dax_superblock __read_mostly; +static DEFINE_MUTEX(devmap_lock); #define DAX_HASH_SIZE (PAGE_SIZE / sizeof(struct hlist_head)) static struct hlist_head dax_host_list[DAX_HASH_SIZE]; @@ -169,9 +170,84 @@ struct dax_device { const char *host; void *private; unsigned long flags; + struct dev_pagemap *pgmap; const struct dax_operations *ops; }; +#if IS_ENABLED(CONFIG_FS_DAX) +static void generic_dax_pagefree(struct page *page, void *data) +{ + /* TODO: wakeup page-idle waiters */ +} + +static struct dax_device *__fs_dax_claim(struct dax_device *dax_dev, + void *owner) +{ + struct dev_pagemap *pgmap; + + if (!dax_dev->pgmap) + return dax_dev; + pgmap = dax_dev->pgmap; + + mutex_lock(&devmap_lock); + if (pgmap->data && pgmap->data == owner) { + /* dm might try to claim the same device more than once... */ + mutex_unlock(&devmap_lock); + return dax_dev; + } else if (pgmap->page_free || pgmap->page_fault + || pgmap->type != MEMORY_DEVICE_HOST) { + put_dax(dax_dev); + mutex_unlock(&devmap_lock); + return NULL; + } + + pgmap->type = MEMORY_DEVICE_FS_DAX; + pgmap->page_free = generic_dax_pagefree; + pgmap->data = owner; + mutex_unlock(&devmap_lock); + + return dax_dev; +} + +struct dax_device *fs_dax_claim(struct dax_device *dax_dev, void *owner) +{ + if (dax_dev->ops->fs_claim) + return dax_dev->ops->fs_claim(dax_dev, owner); + else + return __fs_dax_claim(dax_dev, owner); +} +EXPORT_SYMBOL_GPL(fs_dax_claim); + +static void __fs_dax_release(struct dax_device *dax_dev, void *owner) +{ + struct dev_pagemap *pgmap = dax_dev->pgmap; + + put_dax(dax_dev); + if (!pgmap) + return; + if (!pgmap->data) + return; + + mutex_lock(&devmap_lock); + WARN_ON(pgmap->data != owner); + pgmap->type = MEMORY_DEVICE_HOST; + pgmap->page_free = NULL; + pgmap->data = NULL; + mutex_unlock(&devmap_lock); +} + +void fs_dax_release(struct dax_device *dax_dev, void *owner) +{ + if (!dax_dev) + return; + if (dax_dev->ops->fs_release) + dax_dev->ops->fs_release(dax_dev, owner); + else + __fs_dax_release(dax_dev, owner); +} +EXPORT_SYMBOL_GPL(fs_dax_release); +#endif + static ssize_t write_cache_show(struct device *dev, struct device_attribute *attr, char *buf) { diff --git a/drivers/md/dm.c b/drivers/md/dm.c index 4ea404dbcf0b..468aff8d9694 100644 --- a/drivers/md/dm.c +++ b/drivers/md/dm.c @@ -1088,6 +1088,61 @@ static size_t dm_dax_copy_from_iter(struct dax_device *dax_dev, pgoff_t pgoff, return ret; } +static int dm_dax_dev_claim(struct dm_target *ti, struct dm_dev *dev, + sector_t start, sector_t len, void *owner) +{ + if (fs_dax_claim(dev->dax_dev, owner)) + return 0; + /* + * Outside of a kernel bug there is no reason a dax_dev should + * fail a claim attempt. Device-mapper should have exclusive + * ownership of the dm_dev and the filesystem should have + * exclusive ownership of the dm_target. + */ + WARN_ON_ONCE(1); + return -ENXIO; +} + +static int dm_dax_dev_release(struct dm_target *ti, struct dm_dev *dev, + sector_t start, sector_t len, void *owner) +{ + fs_dax_release(dev->dax_dev, owner); + return 0; +} + +static void dm_dax_iterate_devices(struct dax_device *dax_dev, + iterate_devices_callout_fn fn, void *arg) +{ + struct mapped_device *md = dax_get_private(dax_dev); + struct dm_table *map; + struct dm_target *ti; + int i, srcu_idx; + + map = dm_get_live_table(md, &srcu_idx); + + for (i = 0; i < dm_table_get_num_targets(map); i++) { + ti = dm_table_get_target(map, i); + + if (ti->type->iterate_devices) + ti->type->iterate_devices(ti, fn, arg); + } + + dm_put_live_table(md, srcu_idx); +} + +static struct dax_device *dm_dax_fs_claim(struct dax_device *dax_dev, + void *owner) +{ + dm_dax_iterate_devices(dax_dev, dm_dax_dev_claim, owner); + /* see comment in dm_dax_dev_claim about this unconditional return */ + return dax_dev; +} + +static void dm_dax_fs_release(struct dax_device *dax_dev, void *owner) +{ + dm_dax_iterate_devices(dax_dev, dm_dax_dev_release, owner); +} + /* * A target may call dm_accept_partial_bio only from the map routine. It is * allowed for all bio types except REQ_PREFLUSH and REQ_OP_ZONE_RESET. @@ -3133,6 +3188,8 @@ static const struct block_device_operations dm_blk_dops = { static const struct dax_operations dm_dax_ops = { .direct_access = dm_dax_direct_access, .copy_from_iter = dm_dax_copy_from_iter, + .fs_claim = dm_dax_fs_claim, + .fs_release = dm_dax_fs_release, }; /* diff --git a/include/linux/dax.h b/include/linux/dax.h index f9eb22ad341e..af02f93c943a 100644 --- a/include/linux/dax.h +++ b/include/linux/dax.h @@ -4,6 +4,7 @@ #include #include +#include #include #include @@ -20,6 +21,10 @@ struct dax_operations { /* copy_from_iter: required operation for fs-dax direct-i/o */ size_t (*copy_from_iter)(struct dax_device *, pgoff_t, void *, size_t, struct iov_iter *); + /* fs_claim: setup filesytem parameters for the device's dev_pagemap */ + struct dax_device *(*fs_claim)(struct dax_device *, void *); + /* fs_release: restore device's dev_pagemap to its default state */ + void (*fs_release)(struct dax_device *, void *); }; extern struct attribute_group dax_attribute_group; @@ -83,6 +88,26 @@ static inline void fs_put_dax(struct dax_device *dax_dev) struct dax_device *fs_dax_get_by_bdev(struct block_device *bdev); int dax_writeback_mapping_range(struct address_space *mapping, struct block_device *bdev, struct writeback_control *wbc); +struct dax_device *fs_dax_claim(struct dax_device *dax_dev, void *owner); +#ifdef CONFIG_BLOCK +static inline struct dax_device *fs_dax_claim_bdev(struct block_device *bdev, + void *owner) +{ + struct dax_device *dax_dev; + + if (!blk_queue_dax(bdev->bd_queue)) + return NULL; + dax_dev = fs_dax_get_by_host(bdev->bd_disk->disk_name); + return fs_dax_claim(dax_dev, owner); +} +#else +static inline struct dax_device *fs_dax_claim_bdev(struct block_device *bdev, + void *owner) +{ + return NULL; +} +#endif +void fs_dax_release(struct dax_device *dax_dev, void *owner); #else static inline int bdev_dax_supported(struct super_block *sb, int blocksize) { @@ -108,6 +133,29 @@ static inline int dax_writeback_mapping_range(struct address_space *mapping, { return -EOPNOTSUPP; } + +static inline struct dax_device *fs_dax_claim(struct dax_device *dax_dev, + void *owner) +{ + return NULL; +} + +#ifdef CONFIG_BLOCK +static inline struct dax_device *fs_dax_claim_bdev(struct block_device *bdev, + void *owner) +{ + return fs_dax_get_by_host(bdev->bd_disk->disk_name); +} +#else +static inline struct dax_device *fs_dax_claim_bdev(struct block_device *bdev, + void *owner) +{ + return NULL; +} +#endif +static inline void fs_dax_release(struct dax_device *dax_dev, void *owner) +{ +} #endif int dax_read_lock(void); diff --git a/include/linux/memremap.h b/include/linux/memremap.h index 7b4899c06f49..02d6d042ee7f 100644 --- a/include/linux/memremap.h +++ b/include/linux/memremap.h @@ -53,11 +53,19 @@ struct vmem_altmap { * driver can hotplug the device memory using ZONE_DEVICE and with that memory * type. Any page of a process can be migrated to such memory. However no one * should be allow to pin such memory so that it can always be evicted. + * + * MEMORY_DEVICE_FS_DAX: + * When MEMORY_DEVICE_HOST memory is represented by a device that can + * host a filesystem, for example /dev/pmem0, that filesystem can + * register for a callback when a page is idled. For the filesystem-dax + * case page idle callbacks are used to coordinate DMA vs + * hole-punch/truncate. */ enum memory_type { MEMORY_DEVICE_HOST = 0, MEMORY_DEVICE_PRIVATE, MEMORY_DEVICE_PUBLIC, + MEMORY_DEVICE_FS_DAX, }; /*