Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp596308pxb; Tue, 15 Feb 2022 23:15:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJzFikCSxpMPnLpnhHZqMLwxYUsOTkzwdRigvuvSGtp6/FfHBhJVN3g1rN8oBDplqOuq3gOL X-Received: by 2002:a17:90b:3148:b0:1b8:c28a:25e7 with SMTP id ip8-20020a17090b314800b001b8c28a25e7mr251887pjb.234.1644995712571; Tue, 15 Feb 2022 23:15:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644995712; cv=none; d=google.com; s=arc-20160816; b=EmN/8CiUmGAjr4jfCs9SbzPpqIlVK70HtQKXpl01aZWre4jDsWfNvcKcG6isXw45Ns LmHmtg3He4E+F8c/HleH8oOlGcWsSF+06FOKSLHRxc/8hGYRtpkv7Enree5h4cX7esuX IT0uTBevC2pKTTyY54lcyuwOQMT6wfQ721c2/CTw7F7MBkPxsgiZN14AeM3Xlydoi8XQ wMPo7JFJHhx89Mb03945hev6z/cVy0HxI7rL6fv7NCXScKzaHviRdaLUvuS6MA4+PYOg VtsJj1mt0yXXDmxLyY9ixab2hFwf3c8JH8tKeWj9+Vtp0T3zBY9zS33KN/WLuuh+g0rK wiFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=VVrjCQk0e2bEXbKTkyebIDZYiYKF0U8p5xUNgx6nAe0=; b=RR2y6GtI5rhQFMfjX2wTYDk5ucJYvQtpjB/wasDaXOdSAPtm5hgxw8S/bvXVIEaLnU BZeWXWfgkdx4tCywda2mwNMGJoi5wAcQSqkpEfu3i3cs1RWTgC8aUs8mOSruB6X3DsNt P3IMWdlT/pF2bW1hvxmo6bYxDg/jbLadi9ISE8wFQMuYaxzPqKv8zq9qSU4bYmJq8/r7 bM6IU1kMHJyRA8arYr+jCJvZ40G7sNO8Iweli8RtWUFaIn+4GsB8gnAWCpKiQaFNfsbm 4oqGjtr3Lw2qbBdWUyqNlq0qokRx8xFnb/JxB6/uVEGXK1wLulIsc4GFpBewnAqdN6Qw Lc7w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel-com.20210112.gappssmtp.com header.s=20210112 header.b=nE35RWa6; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id 207si4932667pgb.834.2022.02.15.23.15.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 15 Feb 2022 23:15:12 -0800 (PST) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@intel-com.20210112.gappssmtp.com header.s=20210112 header.b=nE35RWa6; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1F98623D3D6; Tue, 15 Feb 2022 22:47:13 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240079AbiBOWGr (ORCPT + 99 others); Tue, 15 Feb 2022 17:06:47 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:40350 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235480AbiBOWGq (ORCPT ); Tue, 15 Feb 2022 17:06:46 -0500 Received: from mail-pj1-x1035.google.com (mail-pj1-x1035.google.com [IPv6:2607:f8b0:4864:20::1035]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1189FE01A for ; Tue, 15 Feb 2022 14:06:35 -0800 (PST) Received: by mail-pj1-x1035.google.com with SMTP id v8-20020a17090a634800b001bb78857ccdso2175265pjs.1 for ; Tue, 15 Feb 2022 14:06:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=VVrjCQk0e2bEXbKTkyebIDZYiYKF0U8p5xUNgx6nAe0=; b=nE35RWa6oDgBalrevFEPRO4+2X1WpWNqXc18NzpTgKw5LYA/qcTsaEbTbUcF5+1vny yinI0tL2Ot6PPN326SGxQFjZJw7wM6Ak/gPKz3EexZH9k6ekyuItMdahLbM5M328yY9f IB1FQymUIQ5G+Q/15li4O96F2jwU1xjrnmCkkyUVXlCXvgjP8jBgYvFO/miqvK26On6U guLecixg3/nlWPYYO9/Fy4Rc2CSSKsXpjLwSBwBiGyY/V86ic7L+kpL/cbjgLb+mrNnU Dj4LsAPhCboWHCBb7jVbBlNPYixLLKaDYizQHgOchXufz+VZR2/rExv3NHWvYNjoqIKV +DUw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=VVrjCQk0e2bEXbKTkyebIDZYiYKF0U8p5xUNgx6nAe0=; b=6n2wsDqxLbEsqnVjsKFvm35fkvL8Z/EV0ByilF5aZjynYxSLmoF90QDpaIK9lqyKFz q3fmQEw3E3GaE8o9QZQKczOS6ntL+p8+ayRfstVpxDP+oJqYh7/QR0OdEFXEfICVGJSc JnBDXmhUSIaAZxykmzdua5/TEzAqoeIZPqbjtSBcwySKiMtgtSLLMACWpSXSUmsT/MiR 7WEO8lsZZeI5EYHyCgDPW2ayB0PBqPNmiFHriWKO5rDBHbVuuknX77ri/nW+vZpOj5oE oRxueEI1sQ7k8Q6Iuz4Hp0unMKCb5TQInw3DJDxWs4apXYdvJUCmV4EvRW2OswfsxlXO QuBA== X-Gm-Message-State: AOAM533HLqKo5An1bQyORAdkn+1Y+x50wYE8C/SAEgBXakRbusJy/wgW WcfYXZJZUyS5WecirkpJmogZkoQmzuNxSyhPhwy8Cw== X-Received: by 2002:a17:90a:e7cb:: with SMTP id kb11mr1025329pjb.220.1644962794472; Tue, 15 Feb 2022 14:06:34 -0800 (PST) MIME-Version: 1.0 References: <20220213125832.2722009-1-ruansy.fnst@fujitsu.com> In-Reply-To: <20220213125832.2722009-1-ruansy.fnst@fujitsu.com> From: Dan Williams Date: Tue, 15 Feb 2022 14:06:26 -0800 Message-ID: Subject: Re: [PATCH v10.1 1/9] dax: Introduce holder for dax_device To: Shiyang Ruan Cc: Christoph Hellwig , Linux Kernel Mailing List , linux-xfs , Linux NVDIMM , Linux MM , linux-fsdevel , "Darrick J. Wong" , david , Jane Chu Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Feb 13, 2022 at 4:58 AM Shiyang Ruan wrote: > > v10.1 update: > - Fix build error reported by kernel test robot > - Add return code to dax_register_holder() > - Add write lock to prevent concurrent registrations > - Rename dax_get_holder() to dax_holder() > - Add kernel doc for new added functions > > To easily track filesystem from a pmem device, we introduce a holder for > dax_device structure, and also its operation. This holder is used to > remember who is using this dax_device: > - When it is the backend of a filesystem, the holder will be the > instance of this filesystem. > - When this pmem device is one of the targets in a mapped device, the > holder will be this mapped device. In this case, the mapped device > has its own dax_device and it will follow the first rule. So that we > can finally track to the filesystem we needed. > > The holder and holder_ops will be set when filesystem is being mounted, > or an target device is being activated. > > Signed-off-by: Shiyang Ruan > --- > drivers/dax/super.c | 95 +++++++++++++++++++++++++++++++++++++++++++++ > include/linux/dax.h | 30 ++++++++++++++ > 2 files changed, 125 insertions(+) > > diff --git a/drivers/dax/super.c b/drivers/dax/super.c > index e3029389d809..d7fb4c36bf16 100644 > --- a/drivers/dax/super.c > +++ b/drivers/dax/super.c > @@ -21,6 +21,9 @@ > * @cdev: optional character interface for "device dax" > * @private: dax driver private data > * @flags: state and boolean properties > + * @ops: operations for dax_device > + * @holder_data: holder of a dax_device: could be filesystem or mapped device > + * @holder_ops: operations for the inner holder > */ > struct dax_device { > struct inode inode; > @@ -28,6 +31,9 @@ struct dax_device { > void *private; > unsigned long flags; > const struct dax_operations *ops; > + void *holder_data; > + struct percpu_rw_semaphore holder_rwsem; This lock is not necessary, see below... > + const struct dax_holder_operations *holder_ops; > }; > > static dev_t dax_devt; > @@ -193,6 +199,29 @@ int dax_zero_page_range(struct dax_device *dax_dev, pgoff_t pgoff, > } > EXPORT_SYMBOL_GPL(dax_zero_page_range); > > +int dax_holder_notify_failure(struct dax_device *dax_dev, u64 off, > + u64 len, int mf_flags) > +{ > + int rc, id; > + > + id = dax_read_lock(); > + if (!dax_alive(dax_dev)) { > + rc = -ENXIO; > + goto out; > + } > + > + if (!dax_dev->holder_ops) { > + rc = -EOPNOTSUPP; > + goto out; > + } > + > + rc = dax_dev->holder_ops->notify_failure(dax_dev, off, len, mf_flags); > +out: > + dax_read_unlock(id); > + return rc; > +} > +EXPORT_SYMBOL_GPL(dax_holder_notify_failure); > + > #ifdef CONFIG_ARCH_HAS_PMEM_API > void arch_wb_cache_pmem(void *addr, size_t size); > void dax_flush(struct dax_device *dax_dev, void *addr, size_t size) > @@ -268,6 +297,13 @@ void kill_dax(struct dax_device *dax_dev) > > clear_bit(DAXDEV_ALIVE, &dax_dev->flags); > synchronize_srcu(&dax_srcu); > + > + /* Lock to prevent concurrent registrations. */ > + percpu_down_write(&dax_dev->holder_rwsem); > + /* clear holder data */ > + dax_dev->holder_ops = NULL; > + dax_dev->holder_data = NULL; > + percpu_up_write(&dax_dev->holder_rwsem); > } > EXPORT_SYMBOL_GPL(kill_dax); > > @@ -393,6 +429,7 @@ struct dax_device *alloc_dax(void *private, const struct dax_operations *ops) > > dax_dev->ops = ops; > dax_dev->private = private; > + percpu_init_rwsem(&dax_dev->holder_rwsem); > return dax_dev; > > err_dev: > @@ -409,6 +446,64 @@ void put_dax(struct dax_device *dax_dev) > } > EXPORT_SYMBOL_GPL(put_dax); > > +/** > + * dax_holder() - obtain the holder of a dax device > + * @dax_dev: a dax_device instance > + > + * Return: the holder's data which represents the holder if registered, > + * otherwize NULL. > + */ > +void *dax_holder(struct dax_device *dax_dev) > +{ > + if (!dax_alive(dax_dev)) > + return NULL; > + > + return dax_dev->holder_data; > +} > +EXPORT_SYMBOL_GPL(dax_holder); > + > +/** > + * dax_register_holder() - register a holder to a dax device > + * @dax_dev: a dax_device instance > + * @holder: a pointer to a holder's data which represents the holder > + * @ops: operations of this holder > + > + * Return: negative errno if an error occurs, otherwise 0. > + */ > +int dax_register_holder(struct dax_device *dax_dev, void *holder, > + const struct dax_holder_operations *ops) > +{ > + if (!dax_alive(dax_dev)) > + return -ENXIO; > + > + /* Already registered */ > + if (dax_holder(dax_dev)) > + return -EBUSY; Delete this... > + > + /* Lock to prevent concurrent registrations. */ > + percpu_down_write(&dax_dev->holder_rwsem); ...and just use cmpxchg: if (cmpxchg(&dax_dev->holder_data, NULL, holder)) return -EBUSY; dax_dev->holder_ops = ops; ...and then on the release side you can require that the caller specify @holder before clearing to make the unregistration symmetric: if (cmpxchg(&dax_dev->holder_data, holder, NULL) != holder)) return -EBUSY; dax_dev->holder_ops = NULL; > + dax_dev->holder_data = holder; > + dax_dev->holder_ops = ops; > + percpu_up_write(&dax_dev->holder_rwsem); > + > + return 0; > +} > +EXPORT_SYMBOL_GPL(dax_register_holder); > + > +/** > + * dax_unregister_holder() - unregister the holder for a dax device > + * @dax_dev: a dax_device instance > + */ > +void dax_unregister_holder(struct dax_device *dax_dev) Per above, require the holder to pass in their holder_data again. > +{ > + if (!dax_alive(dax_dev)) > + return; > + > + dax_dev->holder_data = NULL; > + dax_dev->holder_ops = NULL; > +} > +EXPORT_SYMBOL_GPL(dax_unregister_holder); > + > /** > * inode_dax: convert a public inode into its dax_dev > * @inode: An inode with i_cdev pointing to a dax_dev > diff --git a/include/linux/dax.h b/include/linux/dax.h > index 9fc5f99a0ae2..9800d84e5b7d 100644 > --- a/include/linux/dax.h > +++ b/include/linux/dax.h > @@ -32,8 +32,24 @@ struct dax_operations { > int (*zero_page_range)(struct dax_device *, pgoff_t, size_t); > }; > > +struct dax_holder_operations { > + /* > + * notify_failure - notify memory failure into inner holder device > + * @dax_dev: the dax device which contains the holder > + * @offset: offset on this dax device where memory failure occurs > + * @len: length of this memory failure event > + * @flags: action flags for memory failure handler > + */ > + int (*notify_failure)(struct dax_device *dax_dev, u64 offset, > + u64 len, int mf_flags); > +}; > + > #if IS_ENABLED(CONFIG_DAX) > struct dax_device *alloc_dax(void *private, const struct dax_operations *ops); > +int dax_register_holder(struct dax_device *dax_dev, void *holder, > + const struct dax_holder_operations *ops); > +void dax_unregister_holder(struct dax_device *dax_dev); > +void *dax_holder(struct dax_device *dax_dev); > void put_dax(struct dax_device *dax_dev); > void kill_dax(struct dax_device *dax_dev); > void dax_write_cache(struct dax_device *dax_dev, bool wc); > @@ -53,6 +69,18 @@ static inline bool daxdev_mapping_supported(struct vm_area_struct *vma, > return dax_synchronous(dax_dev); > } > #else > +static inline int dax_register_holder(struct dax_device *dax_dev, void *holder, > + const struct dax_holder_operations *ops) > +{ > + return 0; > +} > +static inline void dax_unregister_holder(struct dax_device *dax_dev) > +{ > +} > +static inline void *dax_holder(struct dax_device *dax_dev) > +{ > + return NULL; > +} > static inline struct dax_device *alloc_dax(void *private, > const struct dax_operations *ops) > { > @@ -185,6 +213,8 @@ size_t dax_copy_to_iter(struct dax_device *dax_dev, pgoff_t pgoff, void *addr, > size_t bytes, struct iov_iter *i); > int dax_zero_page_range(struct dax_device *dax_dev, pgoff_t pgoff, > size_t nr_pages); > +int dax_holder_notify_failure(struct dax_device *dax_dev, u64 off, u64 len, > + int mf_flags); > void dax_flush(struct dax_device *dax_dev, void *addr, size_t size); > > ssize_t dax_iomap_rw(struct kiocb *iocb, struct iov_iter *iter, > -- > 2.34.1 > > >