Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp4627165ybc; Tue, 26 Nov 2019 11:56:50 -0800 (PST) X-Google-Smtp-Source: APXvYqyHqZtSbC14YT0xPUNa6nUhhFK7ZClpQqvJsbFDH/QrNOxcOpO53TsBu6XUZRQYDAuwaoqe X-Received: by 2002:aa7:c74e:: with SMTP id c14mr27921814eds.260.1574798210044; Tue, 26 Nov 2019 11:56:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574798210; cv=none; d=google.com; s=arc-20160816; b=IRTeOZs+O1kfpZ1h9H9yn2jgDlT7v/EE9FxGzQ1AXEVJ0cHBFCfY8l9qnwCVbL78Hx BURfgD8PyGXuxLuzZbJcpcDmyMtUTOTqFir4v+nqsZ6mlgF168MyBLDxe3E2feVyv4Yi zrzMdHo8VnUbMP8b5S9zqwWs5ciVThbFdVzQAC0BgLLcXW4LGEq7m+d46ghUDKRnkW+j vD9sgc/G35mIi0JqcHVfc+f9cETN/qZu+DaHDZImHKX9HPDYb/e5a3Gwmq9LC9k3rlkC uEPlmGTijnfL0d70BzBdNBkBU5Hen5rpdc/cVFZhEnqKi47bloj33dfb87wfrP8vzIEH Aixw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=7IeFS7uzKx8kelhTdXB2/JmUFYp27lddtdSpI2m5pRQ=; b=UsApnb4s5ALdFv4VVZYlrfqcW5zoRSrDx7GeAqQu9axmMbDsbbHMAkSYvL66nBi59y yXqIWn1/BgOqzb9josjTSqFukqFETlFj0aY9+a6w52Q1fr6KjQ81YW9KI3+ts9hxLsnq A0NfO00tdb/VPGYEHWAvHPnLOatqbqWY4bCj88h92LamOEJ+wngshKQ7BqA3yTqEXHEJ O/seKLZ8xlUYJIaIzXwu+kwhvjfauep0GjyDZQf5jh77bDeUSWlG2N1sKByH+oS4uUIb Jo8IoXqbFhMa+TrtQIztU2kEPYWNApDY18PawseMA3v89bxGi+717BlYUyiyLWXeGY83 40/A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z41si8377790edb.166.2019.11.26.11.56.26; Tue, 26 Nov 2019 11:56:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727262AbfKZTzJ (ORCPT + 99 others); Tue, 26 Nov 2019 14:55:09 -0500 Received: from mx2.suse.de ([195.135.220.15]:40240 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727091AbfKZTys (ORCPT ); Tue, 26 Nov 2019 14:54:48 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 5F567B0BD; Tue, 26 Nov 2019 19:54:45 +0000 (UTC) From: Michal Suchanek To: linux-scsi@vger.kernel.org, linux-block@vger.kernel.org Cc: Michal Suchanek , Jonathan Corbet , Jens Axboe , "James E.J. Bottomley" , "Martin K. Petersen" , Alexander Viro , Eric Biggers , "J. Bruce Fields" , Mauro Carvalho Chehab , Benjamin Coddington , Ming Lei , Chaitanya Kulkarni , Bart Van Assche , Damien Le Moal , Hou Tao , Pavel Begunkov , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Jan Kara , Hannes Reinecke , "Ewan D. Milne" , Christoph Hellwig , Matthew Wilcox Subject: [PATCH v4 rebase 08/10] bdev: add open_finish Date: Tue, 26 Nov 2019 20:54:27 +0100 Message-Id: <6f59e6a45b8e8a9117abfe00ecf88c27958d3391.1574797504.git.msuchanek@suse.de> X-Mailer: git-send-email 2.23.0 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Opening a block device may require a long operation such as waiting for the cdrom tray to close or disk to spin up. Performing this operation with locks held locks out other attempts to open the device from processes that donn't care about the medium state. To avoid this issue and still be able to perform time-consuming checks at open() the block device driver can provide open_finish(). If it does opening the device proceeds even when an error is returned from open(), bd_mutex is released and open_finish() is called. If open_finish() succeeds the device is now open, if it fails release() is called. When -ERESTARTSYS is returned from open() blkdev_get may loop without calling open_finish(). On -ERESTARTSYS open_finish() is not called. When -ENXIO is returned there is no device to retry opening so this error needs to be honored and open_finish() not called. Move a ret = 0 assignment up in the if/else branching to avoid returning -ENXIO. Previously the return value was ignored on the unhandled branch. Signed-off-by: Michal Suchanek --- v2: new patch v4: - fix crash on ENXIO - initialize capacity and partitions after open_finish --- Documentation/filesystems/locking.rst | 2 ++ fs/block_dev.c | 27 +++++++++++++++++++++++---- include/linux/blkdev.h | 1 + 3 files changed, 26 insertions(+), 4 deletions(-) diff --git a/Documentation/filesystems/locking.rst b/Documentation/filesystems/locking.rst index fc3a0704553c..2471ced5a8cf 100644 --- a/Documentation/filesystems/locking.rst +++ b/Documentation/filesystems/locking.rst @@ -456,6 +456,7 @@ block_device_operations prototypes:: int (*open) (struct block_device *, fmode_t); + int (*open_finish) (struct block_device *, fmode_t, int); int (*release) (struct gendisk *, fmode_t); int (*ioctl) (struct block_device *, fmode_t, unsigned, unsigned long); int (*compat_ioctl) (struct block_device *, fmode_t, unsigned, unsigned long); @@ -473,6 +474,7 @@ locking rules: ops bd_mutex ======================= =================== open: yes +open_finish: no release: yes ioctl: no compat_ioctl: no diff --git a/fs/block_dev.c b/fs/block_dev.c index a386ebd997fb..787b204467f9 100644 --- a/fs/block_dev.c +++ b/fs/block_dev.c @@ -1579,6 +1579,7 @@ static int __blkdev_get(struct block_device *bdev, fmode_t mode, int for_part) int partno; int perm = 0; bool first_open; + bool need_finish = false; if (mode & FMODE_READ) perm |= MAY_READ; @@ -1635,13 +1636,16 @@ static int __blkdev_get(struct block_device *bdev, fmode_t mode, int for_part) put_disk_and_module(disk); goto restart; } + if ((ret != -ENXIO) && + bdev->bd_disk->fops->open_finish) + need_finish = true; } if (!ret) blkdev_init_size(bdev); blkdev_do_partitions(bdev, ret); - if (ret) + if (ret && !need_finish) goto out_clear; } else { struct block_device *whole; @@ -1667,14 +1671,18 @@ static int __blkdev_get(struct block_device *bdev, fmode_t mode, int for_part) if (bdev->bd_bdi == &noop_backing_dev_info) bdev->bd_bdi = bdi_get(disk->queue->backing_dev_info); } else { + ret = 0; if (bdev->bd_contains == bdev) { - ret = 0; - if (bdev->bd_disk->fops->open) + if (bdev->bd_disk->fops->open) { ret = bdev->bd_disk->fops->open(bdev, mode); + if ((ret != -ERESTARTSYS) && (ret != -ENXIO) && + bdev->bd_disk->fops->open_finish) + need_finish = true; + } blkdev_do_partitions(bdev, ret); - if (ret) + if (ret && !need_finish) goto out_unlock_bdev; } } @@ -1686,6 +1694,17 @@ static int __blkdev_get(struct block_device *bdev, fmode_t mode, int for_part) /* only one opener holds refs to the module and disk */ if (!first_open) put_disk_and_module(disk); + if (ret && need_finish) { + ret = bdev->bd_disk->fops->open_finish(bdev, mode, ret); + + if (!ret && first_open) + blkdev_init_size(bdev); + blkdev_do_partitions(bdev, ret); + } + if (ret) { + __blkdev_put(bdev, mode, for_part); + return ret; + } return 0; out_clear: diff --git a/include/linux/blkdev.h b/include/linux/blkdev.h index 397bb9bc230b..d26264f5da39 100644 --- a/include/linux/blkdev.h +++ b/include/linux/blkdev.h @@ -1694,6 +1694,7 @@ static inline struct bio_vec *rq_integrity_vec(struct request *rq) struct block_device_operations { int (*open) (struct block_device *, fmode_t); + int (*open_finish)(struct block_device *bdev, fmode_t mode, int ret); void (*release) (struct gendisk *, fmode_t); int (*rw_page)(struct block_device *, sector_t, struct page *, unsigned int); int (*ioctl) (struct block_device *, fmode_t, unsigned, unsigned long); -- 2.23.0