Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp3908143pxb; Mon, 8 Feb 2021 03:16:07 -0800 (PST) X-Google-Smtp-Source: ABdhPJxmy6UJrex2K8f5Es3XW2Ml/KycvctPKaNqb3ZV2cSZ9wp6/9wPqbg34dpzGQU9gBZaeLay X-Received: by 2002:a17:906:f0c4:: with SMTP id dk4mr16062546ejb.6.1612782967737; Mon, 08 Feb 2021 03:16:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612782967; cv=none; d=google.com; s=arc-20160816; b=YKfh4TpKlrmtwET0s4kyNTlwBxQp/fNYyxwcRdm2TSsEi2m7zThxBbG/fBIdh5XXVg 11iwOx3yTv8+rNdLV0EWxKsPFwHNhWuUzLCTYzs5WJZwbQnVdtkmOw3R+ydKca7Gzox2 oZyRA1rWF3FjmC/yk3RG9zdejRXvCq47G3B5Shgfo7T0aANez/Iu3mDxroJTDPY4yu1F nQmcx6PDLWJ3COQLItGy2R6IjIMRsa3bt+kiXW+45jUbZb6B6hwXT/CV1KhBzv3/XNtU 8wxzhehVqfl6WeBC7U6AktPq5eOR1BUIHpc23muKl+ZWakj1T0mMuWTKX5eLAFleHcEb ZHUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=+uhjoSnG0N0orGRyEpbzkW+SBDpLB7LZy8RXxUT4vnY=; b=T/NRJHxy6ajCkx7+dDvbjdIYWW98xm+yD6FbvKfivm3T2uZ0DpvPbnSQ4tkXAg/pvw UeWuG9t73ecn75ys6l0L6PnmAwqR02s0QY6Ydgb4GrGguJY7U6nfwY8P2x0GGYRHX6ca DnHmKnvnmibagWESz5MBObw/Tww2nFFddtd1J9i+trXXXz1wYOgM66293ynjHL5WVcnI doADzw8rPcJmhLHbUpmdzaw16eiaZsL+zVnk2ZNRQMJE6CEWXSs+CiWkQQlDaIQlTpMe HCDxxeHzv3WKQarFNXe8PcsP1bhwcxSbmIxNIuZ1s8idhnZmu7UjV5hudssZhU788i4H zHyA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j17si5564735edw.10.2021.02.08.03.15.42; Mon, 08 Feb 2021 03:16:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232932AbhBHLM1 (ORCPT + 99 others); Mon, 8 Feb 2021 06:12:27 -0500 Received: from mail.cn.fujitsu.com ([183.91.158.132]:37633 "EHLO heian.cn.fujitsu.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S233034AbhBHLEC (ORCPT ); Mon, 8 Feb 2021 06:04:02 -0500 X-IronPort-AV: E=Sophos;i="5.81,161,1610380800"; d="scan'208";a="104328064" Received: from unknown (HELO cn.fujitsu.com) ([10.167.33.5]) by heian.cn.fujitsu.com with ESMTP; 08 Feb 2021 18:55:40 +0800 Received: from G08CNEXMBPEKD05.g08.fujitsu.local (unknown [10.167.33.204]) by cn.fujitsu.com (Postfix) with ESMTP id 58EDC4CE6F82; Mon, 8 Feb 2021 18:55:37 +0800 (CST) Received: from G08CNEXCHPEKD04.g08.fujitsu.local (10.167.33.200) by G08CNEXMBPEKD05.g08.fujitsu.local (10.167.33.204) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 8 Feb 2021 18:55:40 +0800 Received: from irides.mr.mr.mr (10.167.225.141) by G08CNEXCHPEKD04.g08.fujitsu.local (10.167.33.209) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Mon, 8 Feb 2021 18:55:39 +0800 From: Shiyang Ruan To: , , , , , CC: , , , , , , , , Subject: [PATCH v3 04/11] block_dev: Introduce bd_corrupted_range() for block device Date: Mon, 8 Feb 2021 18:55:23 +0800 Message-ID: <20210208105530.3072869-5-ruansy.fnst@cn.fujitsu.com> X-Mailer: git-send-email 2.30.0 In-Reply-To: <20210208105530.3072869-1-ruansy.fnst@cn.fujitsu.com> References: <20210208105530.3072869-1-ruansy.fnst@cn.fujitsu.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-yoursite-MailScanner-ID: 58EDC4CE6F82.A0C98 X-yoursite-MailScanner: Found to be clean X-yoursite-MailScanner-From: ruansy.fnst@cn.fujitsu.com X-Spam-Status: No Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As is show in the call tree: ... pgmap->ops->memory_failure() gendisk->fops->corrupted_range() sb->s_ops->currupted_range() ... currupted_range() is called from disk(pmem) to superblock(filesystem). Thus, we need to introduce a helper function to obtain the superblock from a given disk. Normally, a filesystem can be created by mkfs directly on a block device or a parted disk. We can obtain the superblock by calling get_super(). But get_super() is not suitable for mapped device, such as LVM. To obtain MD's superblock, we can iterate bd_holder_disks of a block device to find out the MD that contains it. By this way, MD is able to call corrupted_range() from its target block device. Signed-off-by: Shiyang Ruan --- fs/block_dev.c | 47 ++++++++++++++++++++++++++++++++++++++++++- include/linux/genhd.h | 2 ++ 2 files changed, 48 insertions(+), 1 deletion(-) diff --git a/fs/block_dev.c b/fs/block_dev.c index 3b8963e228a1..755b0d351479 100644 --- a/fs/block_dev.c +++ b/fs/block_dev.c @@ -1079,6 +1079,28 @@ struct bd_holder_disk { int refcnt; }; +static int bd_disk_holder_corrupted_range(struct block_device *bdev, loff_t off, + size_t len, void *data) +{ + struct bd_holder_disk *holder; + struct gendisk *disk; + int rc = 0; + + if (list_empty(&(bdev->bd_holder_disks))) + return -ENODEV; + + list_for_each_entry(holder, &bdev->bd_holder_disks, list) { + disk = holder->disk; + if (disk->fops->corrupted_range) { + rc = disk->fops->corrupted_range(disk, bdev, off, + len, data); + if (rc != -ENODEV) + break; + } + } + return rc; +} + static struct bd_holder_disk *bd_find_holder_disk(struct block_device *bdev, struct gendisk *disk) { @@ -1212,7 +1234,30 @@ void bd_unlink_disk_holder(struct block_device *bdev, struct gendisk *disk) mutex_unlock(&bdev->bd_mutex); } EXPORT_SYMBOL_GPL(bd_unlink_disk_holder); -#endif +#else +static inline int bd_disk_holder_corrupted_range(struct block_device *bdev, + loff_t off, size_t len, void *data) +{ + return -EOPNOTSUPP; +} +#endif /* CONFIG_SYSFS */ + +int bd_corrupted_range(struct block_device *bdev, loff_t disk_off, + loff_t bdev_off, size_t len, void *data) +{ + struct super_block *sb = get_super(bdev); + int rc = -EOPNOTSUPP; + + if (!sb) { + rc = bd_disk_holder_corrupted_range(bdev, disk_off, len, data); + return rc; + } else if (sb->s_op->corrupted_range) + rc = sb->s_op->corrupted_range(sb, bdev, bdev_off, len, data); + drop_super(sb); + + return rc; +} +EXPORT_SYMBOL(bd_corrupted_range); static void __blkdev_put(struct block_device *bdev, fmode_t mode, int for_part); diff --git a/include/linux/genhd.h b/include/linux/genhd.h index 809aaa32d53c..751cbd559bba 100644 --- a/include/linux/genhd.h +++ b/include/linux/genhd.h @@ -314,6 +314,8 @@ void unregister_blkdev(unsigned int major, const char *name); bool bdev_check_media_change(struct block_device *bdev); int __invalidate_device(struct block_device *bdev, bool kill_dirty); void set_capacity(struct gendisk *disk, sector_t size); +int bd_corrupted_range(struct block_device *bdev, loff_t disk_off, + loff_t bdev_off, size_t len, void *data); /* for drivers/char/raw.c: */ int blkdev_ioctl(struct block_device *, fmode_t, unsigned, unsigned long); -- 2.30.0