* [RFC PATCH] dm: allow a dm-fs-style device to be shared via dm-ioctl @ 2010-05-14 1:39 Will Drewry 2010-05-14 3:53 ` Mike Snitzer 0 siblings, 1 reply; 12+ messages in thread From: Will Drewry @ 2010-05-14 1:39 UTC (permalink / raw) To: dm-devel; +Cc: agk Following on the discussion of booting directly to a device-mapper device, two things were made clear: 1. The ioctl interface's name and uuid are mandatory for udev to work 2. There is a functional gap between the dm(-fs) and dm-ioctl This change adds one function which is used for binding a given mapped device to a name+uuid in the dm-ioctl hash table. In addition, it ensures that public functions are available that allow mapped devices and tables to be created and associated with shared code paths in dm-ioctl: - suspend flags and block integrity registration are now exposed - dm_table_complete() now prepares a table for use completely (builds the btree; sets the type; allocates md pools) Ideally, this lays the groundwork for any kernel code to create fully functional mapped devices, but I'd appreciate feedback on if this approach makes sense/is safe, preferred function names, and if it integrates with the current direction. (I can also pair this with the init code patch if it makes sense to show consumer code.) Signed-off-by: Will Drewry <wad@chromium.org> --- drivers/md/dm-ioctl.c | 66 ++++++++++++++++++++++++----------------- drivers/md/dm-table.c | 44 ++++++++++++++++++++++++++- include/linux/device-mapper.h | 17 ++++++++++ 3 files changed, 99 insertions(+), 28 deletions(-) diff --git a/drivers/md/dm-ioctl.c b/drivers/md/dm-ioctl.c index d7500e1..8dc5fd8 100644 --- a/drivers/md/dm-ioctl.c +++ b/drivers/md/dm-ioctl.c @@ -1112,28 +1112,9 @@ static int populate_table(struct dm_table *table, next = spec->next; } - r = dm_table_set_type(table); - if (r) { - DMWARN("unable to set table type"); - return r; - } - return dm_table_complete(table); } -static int table_prealloc_integrity(struct dm_table *t, - struct mapped_device *md) -{ - struct list_head *devices = dm_table_get_devices(t); - struct dm_dev_internal *dd; - - list_for_each_entry(dd, devices, list) - if (bdev_get_integrity(dd->dm_dev.bdev)) - return blk_integrity_register(dm_disk(md), NULL); - - return 0; -} - static int table_load(struct dm_ioctl *param, size_t param_size) { int r; @@ -1155,7 +1136,7 @@ static int table_load(struct dm_ioctl *param, size_t param_size) goto out; } - r = table_prealloc_integrity(t, md); + r = dm_table_prealloc_integrity(t, md); if (r) { DMERR("%s: could not register integrity profile.", dm_device_name(md)); @@ -1163,13 +1144,6 @@ static int table_load(struct dm_ioctl *param, size_t param_size) goto out; } - r = dm_table_alloc_md_mempools(t); - if (r) { - DMWARN("unable to allocate mempools for this table"); - dm_table_destroy(t); - goto out; - } - down_write(&_hash_lock); hc = dm_get_mdptr(md); if (!hc || hc->md != md) { @@ -1637,6 +1611,44 @@ void dm_interface_exit(void) dm_hash_exit(); } + +/** + * dm_ioctl_export - Permanently export a mapped device via the ioctl interface + * @md: Pointer to mapped_device + * @name: Buffer (size DM_NAME_LEN) for name + * @uuid: Buffer (size DM_UUID_LEN) for uuid or NULL if not desired + */ +int dm_ioctl_export(struct mapped_device *md, const char *name, const char *uuid) +{ + int r = 0; + struct hash_cell *hc; + + if (!md) { + r = -ENXIO; + goto out; + } + + /* The name and uuid can only be set once. */ + mutex_lock(&dm_hash_cells_mutex); + hc = dm_get_mdptr(md); + mutex_unlock(&dm_hash_cells_mutex); + if (hc) { + DMERR("%s: already exported", dm_device_name(md)); + r = -ENXIO; + goto out; + } + + r = dm_hash_insert(name, uuid, md); + if (r) { + DMERR("%s: could not export as '%s'", dm_device_name(md), name); + goto out; + } + + /* Let udev know we've changed. */ + dm_kobject_uevent(md, KOBJ_CHANGE, dm_get_event_nr(md)); +out: + return r; +} /** * dm_copy_name_and_uuid - Copy mapped device name & uuid into supplied buffers * @md: Pointer to mapped_device diff --git a/drivers/md/dm-table.c b/drivers/md/dm-table.c index 9924ea2..66726d1 100644 --- a/drivers/md/dm-table.c +++ b/drivers/md/dm-table.c @@ -900,7 +900,7 @@ static int setup_indexes(struct dm_table *t) /* * Builds the btree to index the map. */ -int dm_table_complete(struct dm_table *t) +int dm_table_build_index(struct dm_table *t) { int r = 0; unsigned int leaf_nodes; @@ -919,6 +919,48 @@ int dm_table_complete(struct dm_table *t) return r; } + +/* + * Prepares the table for use by building the indices, + * setting the type, and allocating mempools. + */ +int dm_table_complete(struct dm_table *t) +{ + int r = 0; + + r = dm_table_build_index(t); + if (r) { + DMWARN("unable to build btrees"); + return r; + } + r = dm_table_set_type(t); + if (r) { + DMWARN("unable to set table type"); + return r; + } + r = dm_table_alloc_md_mempools(t); + if (r) + DMWARN("unable to allocate mempools"); + + return r; +} + +/* + * Register the mapped device for blk_integrity support if + * the underlying devices support it. + */ +int dm_table_prealloc_integrity(struct dm_table *t, struct mapped_device *md) +{ + struct list_head *devices = dm_table_get_devices(t); + struct dm_dev_internal *dd; + + list_for_each_entry(dd, devices, list) + if (bdev_get_integrity(dd->dm_dev.bdev)) + return blk_integrity_register(dm_disk(md), NULL); + + return 0; +} + static DEFINE_MUTEX(_event_lock); void dm_table_event_callback(struct dm_table *t, void (*fn)(void *), void *context) diff --git a/include/linux/device-mapper.h b/include/linux/device-mapper.h index 1381cd9..95fea4c 100644 --- a/include/linux/device-mapper.h +++ b/include/linux/device-mapper.h @@ -215,6 +215,18 @@ void dm_set_mdptr(struct mapped_device *md, void *ptr); void *dm_get_mdptr(struct mapped_device *md); /* + * Export the device via the ioctl interface + */ +int dm_ioctl_export(struct mapped_device *md, const char *name, + const char *uuid); + +/* + * Suspend feature flags + */ +#define DM_SUSPEND_LOCKFS_FLAG (1 << 0) +#define DM_SUSPEND_NOFLUSH_FLAG (1 << 1) + +/* * A device can still be used while suspended, but I/O is deferred. */ int dm_suspend(struct mapped_device *md, unsigned suspend_flags); @@ -268,6 +280,11 @@ int dm_table_add_target(struct dm_table *t, const char *type, int dm_table_complete(struct dm_table *t); /* + * Optionally add support for block integrity. + */ +int dm_table_prealloc_integrity(struct dm_table *t, struct mapped_device *md); + +/* * Unplug all devices in a table. */ void dm_table_unplug_all(struct dm_table *t); -- 1.6.6.1 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* Re: [RFC PATCH] dm: allow a dm-fs-style device to be shared via dm-ioctl 2010-05-14 1:39 [RFC PATCH] dm: allow a dm-fs-style device to be shared via dm-ioctl Will Drewry @ 2010-05-14 3:53 ` Mike Snitzer 2010-05-14 14:32 ` Will Drewry ` (2 more replies) 0 siblings, 3 replies; 12+ messages in thread From: Mike Snitzer @ 2010-05-14 3:53 UTC (permalink / raw) To: Will Drewry; +Cc: device-mapper development Hi Will, On Thu, May 13 2010 at 9:39pm -0400, Will Drewry <wad@chromium.org> wrote: > Following on the discussion of booting directly to a device-mapper > device, two things were made clear: > 1. The ioctl interface's name and uuid are mandatory for udev to work > 2. There is a functional gap between the dm(-fs) and dm-ioctl > > This change adds one function which is used for binding a given mapped > device to a name+uuid in the dm-ioctl hash table. In addition, it > ensures that public functions are available that allow mapped devices > and tables to be created and associated with shared code paths in > dm-ioctl: > - suspend flags and block integrity registration are now exposed > - dm_table_complete() now prepares a table for use completely > (builds the btree; sets the type; allocates md pools) I have done a preliminary review and have some comments inlined below. > Ideally, this lays the groundwork for any kernel code to create fully > functional mapped devices, but I'd appreciate feedback on if this > approach makes sense/is safe, preferred function names, and if it > integrates with the current direction. > > (I can also pair this with the init code patch if it makes sense to show > consumer code.) It would certainly help follow-on reviews as we take a closer look. For the next version of your work I'd recommend sharing all related code in a series (e.g.: core DM patch 1/2, init patch 2/2). > diff --git a/drivers/md/dm-table.c b/drivers/md/dm-table.c > index 9924ea2..66726d1 100644 > --- a/drivers/md/dm-table.c > +++ b/drivers/md/dm-table.c > @@ -900,7 +900,7 @@ static int setup_indexes(struct dm_table *t) > /* > * Builds the btree to index the map. > */ > -int dm_table_complete(struct dm_table *t) > +int dm_table_build_index(struct dm_table *t) > { > int r = 0; > unsigned int leaf_nodes; > @@ -919,6 +919,48 @@ int dm_table_complete(struct dm_table *t) > return r; > } > > + > +/* > + * Prepares the table for use by building the indices, > + * setting the type, and allocating mempools. > + */ > +int dm_table_complete(struct dm_table *t) > +{ > + int r = 0; > + > + r = dm_table_build_index(t); > + if (r) { > + DMWARN("unable to build btrees"); > + return r; > + } > + r = dm_table_set_type(t); > + if (r) { > + DMWARN("unable to set table type"); > + return r; > + } > + r = dm_table_alloc_md_mempools(t); > + if (r) > + DMWARN("unable to allocate mempools"); > + > + return r; > +} Please have dm_table_set_type() come before dm_table_build_index() to preserve the existing call sequence. It is better to check the type related constraints before going on to build the indices. > + > +/* > + * Register the mapped device for blk_integrity support if > + * the underlying devices support it. > + */ > +int dm_table_prealloc_integrity(struct dm_table *t, struct mapped_device *md) > +{ > + struct list_head *devices = dm_table_get_devices(t); > + struct dm_dev_internal *dd; > + > + list_for_each_entry(dd, devices, list) > + if (bdev_get_integrity(dd->dm_dev.bdev)) > + return blk_integrity_register(dm_disk(md), NULL); > + > + return 0; > +} I think we need more justification for why you'd want to expose dm_table_prealloc_integrity() as a public interface. Makes DM a bit more brittle with unknown gain at the moment. Why not just move the dm_table_prealloc_integrity() call to dm_table_complete() -- just before dm_table_alloc_md_mempools()? > static DEFINE_MUTEX(_event_lock); > void dm_table_event_callback(struct dm_table *t, > void (*fn)(void *), void *context) > diff --git a/include/linux/device-mapper.h b/include/linux/device-mapper.h > index 1381cd9..95fea4c 100644 > --- a/include/linux/device-mapper.h > +++ b/include/linux/device-mapper.h > @@ -215,6 +215,18 @@ void dm_set_mdptr(struct mapped_device *md, void *ptr); > void *dm_get_mdptr(struct mapped_device *md); > > /* > + * Export the device via the ioctl interface > + */ > +int dm_ioctl_export(struct mapped_device *md, const char *name, > + const char *uuid); > + > +/* > + * Suspend feature flags > + */ > +#define DM_SUSPEND_LOCKFS_FLAG (1 << 0) > +#define DM_SUSPEND_NOFLUSH_FLAG (1 << 1) You're missing the matching removal of these flags from drivers/md/dm.h Regards, Mike ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [RFC PATCH] dm: allow a dm-fs-style device to be shared via dm-ioctl 2010-05-14 3:53 ` Mike Snitzer @ 2010-05-14 14:32 ` Will Drewry 2010-05-15 1:41 ` [RFC PATCH v2 1/2] " Will Drewry 2010-05-15 1:41 ` [RFC PATCH v2 2/2] init: boot to device-mapper targets without an initr* Will Drewry 2 siblings, 0 replies; 12+ messages in thread From: Will Drewry @ 2010-05-14 14:32 UTC (permalink / raw) To: device-mapper development; +Cc: snitzer Hi Mike, On Thu, May 13, 2010 at 10:53 PM, Mike Snitzer <snitzer@redhat.com> wrote: > Hi Will, > > On Thu, May 13 2010 at 9:39pm -0400, > Will Drewry <wad@chromium.org> wrote: > >> Following on the discussion of booting directly to a device-mapper >> device, two things were made clear: >> 1. The ioctl interface's name and uuid are mandatory for udev to work >> 2. There is a functional gap between the dm(-fs) and dm-ioctl >> >> This change adds one function which is used for binding a given mapped >> device to a name+uuid in the dm-ioctl hash table. In addition, it >> ensures that public functions are available that allow mapped devices >> and tables to be created and associated with shared code paths in >> dm-ioctl: >> - suspend flags and block integrity registration are now exposed >> - dm_table_complete() now prepares a table for use completely >> (builds the btree; sets the type; allocates md pools) > > I have done a preliminary review and have some comments inlined below. Thanks for the review and comments! >> Ideally, this lays the groundwork for any kernel code to create fully >> functional mapped devices, but I'd appreciate feedback on if this >> approach makes sense/is safe, preferred function names, and if it >> integrates with the current direction. >> >> (I can also pair this with the init code patch if it makes sense to show >> consumer code.) > > It would certainly help follow-on reviews as we take a closer look. For > the next version of your work I'd recommend sharing all related code in > a series (e.g.: core DM patch 1/2, init patch 2/2). Will do - just finishing up integrating comments from Alasdair and wanted to see if the direction for core DM changes would be reasonable. >> diff --git a/drivers/md/dm-table.c b/drivers/md/dm-table.c >> index 9924ea2..66726d1 100644 >> --- a/drivers/md/dm-table.c >> +++ b/drivers/md/dm-table.c >> @@ -900,7 +900,7 @@ static int setup_indexes(struct dm_table *t) >> /* >> * Builds the btree to index the map. >> */ >> -int dm_table_complete(struct dm_table *t) >> +int dm_table_build_index(struct dm_table *t) >> { >> int r = 0; >> unsigned int leaf_nodes; >> @@ -919,6 +919,48 @@ int dm_table_complete(struct dm_table *t) >> return r; >> } >> >> + >> +/* >> + * Prepares the table for use by building the indices, >> + * setting the type, and allocating mempools. >> + */ >> +int dm_table_complete(struct dm_table *t) >> +{ >> + int r = 0; >> + >> + r = dm_table_build_index(t); >> + if (r) { >> + DMWARN("unable to build btrees"); >> + return r; >> + } >> + r = dm_table_set_type(t); >> + if (r) { >> + DMWARN("unable to set table type"); >> + return r; >> + } >> + r = dm_table_alloc_md_mempools(t); >> + if (r) >> + DMWARN("unable to allocate mempools"); >> + >> + return r; >> +} > > Please have dm_table_set_type() come before dm_table_build_index() to > preserve the existing call sequence. It is better to check the type > related constraints before going on to build the indices. Nice catch! I had meant to preserve the order. >> + >> +/* >> + * Register the mapped device for blk_integrity support if >> + * the underlying devices support it. >> + */ >> +int dm_table_prealloc_integrity(struct dm_table *t, struct mapped_device *md) >> +{ >> + struct list_head *devices = dm_table_get_devices(t); >> + struct dm_dev_internal *dd; >> + >> + list_for_each_entry(dd, devices, list) >> + if (bdev_get_integrity(dd->dm_dev.bdev)) >> + return blk_integrity_register(dm_disk(md), NULL); >> + >> + return 0; >> +} > > I think we need more justification for why you'd want to expose > dm_table_prealloc_integrity() as a public interface. Makes DM a bit > more brittle with unknown gain at the moment. Why not just move the > dm_table_prealloc_integrity() call to dm_table_complete() -- just before > dm_table_alloc_md_mempools()? For some reason I special cased it, but I have no idea why. I'll fold it in to dm_table_complete(). > >> static DEFINE_MUTEX(_event_lock); >> void dm_table_event_callback(struct dm_table *t, >> void (*fn)(void *), void *context) >> diff --git a/include/linux/device-mapper.h b/include/linux/device-mapper.h >> index 1381cd9..95fea4c 100644 >> --- a/include/linux/device-mapper.h >> +++ b/include/linux/device-mapper.h >> @@ -215,6 +215,18 @@ void dm_set_mdptr(struct mapped_device *md, void *ptr); >> void *dm_get_mdptr(struct mapped_device *md); >> >> /* >> + * Export the device via the ioctl interface >> + */ >> +int dm_ioctl_export(struct mapped_device *md, const char *name, >> + const char *uuid); >> + >> +/* >> + * Suspend feature flags >> + */ >> +#define DM_SUSPEND_LOCKFS_FLAG (1 << 0) >> +#define DM_SUSPEND_NOFLUSH_FLAG (1 << 1) > > You're missing the matching removal of these flags from drivers/md/dm.h I'll pull that into the next mail as well once I get the init changes in better shape. Thanks again! will ^ permalink raw reply [flat|nested] 12+ messages in thread
* [RFC PATCH v2 1/2] dm: allow a dm-fs-style device to be shared via dm-ioctl 2010-05-14 3:53 ` Mike Snitzer 2010-05-14 14:32 ` Will Drewry @ 2010-05-15 1:41 ` Will Drewry 2010-05-18 2:36 ` [dm-devel] " Kiyoshi Ueda 2010-05-15 1:41 ` [RFC PATCH v2 2/2] init: boot to device-mapper targets without an initr* Will Drewry 2 siblings, 1 reply; 12+ messages in thread From: Will Drewry @ 2010-05-15 1:41 UTC (permalink / raw) To: dm-devel, linux-kernel; +Cc: agk, snitzer, Will Drewry This change adds one function which is used for binding a given mapped device to a name+uuid in the dm-ioctl hash table. In addition, it ensures that public functions are available that allow mapped devices and tables to be created and associated with the shared code paths with dm-ioctl: - suspend flags are available - dm_table_complete() now prepares a table for use completely Signed-off-by: Will Drewry <wad@chromium.org> --- drivers/md/dm-ioctl.c | 72 +++++++++++++++++++++------------------- drivers/md/dm-table.c | 50 ++++++++++++++++++++++++++++- drivers/md/dm.h | 6 --- include/linux/device-mapper.h | 12 +++++++ 4 files changed, 99 insertions(+), 41 deletions(-) diff --git a/drivers/md/dm-ioctl.c b/drivers/md/dm-ioctl.c index d7500e1..006be9d 100644 --- a/drivers/md/dm-ioctl.c +++ b/drivers/md/dm-ioctl.c @@ -1112,28 +1112,9 @@ static int populate_table(struct dm_table *table, next = spec->next; } - r = dm_table_set_type(table); - if (r) { - DMWARN("unable to set table type"); - return r; - } - return dm_table_complete(table); } -static int table_prealloc_integrity(struct dm_table *t, - struct mapped_device *md) -{ - struct list_head *devices = dm_table_get_devices(t); - struct dm_dev_internal *dd; - - list_for_each_entry(dd, devices, list) - if (bdev_get_integrity(dd->dm_dev.bdev)) - return blk_integrity_register(dm_disk(md), NULL); - - return 0; -} - static int table_load(struct dm_ioctl *param, size_t param_size) { int r; @@ -1155,21 +1136,6 @@ static int table_load(struct dm_ioctl *param, size_t param_size) goto out; } - r = table_prealloc_integrity(t, md); - if (r) { - DMERR("%s: could not register integrity profile.", - dm_device_name(md)); - dm_table_destroy(t); - goto out; - } - - r = dm_table_alloc_md_mempools(t); - if (r) { - DMWARN("unable to allocate mempools for this table"); - dm_table_destroy(t); - goto out; - } - down_write(&_hash_lock); hc = dm_get_mdptr(md); if (!hc || hc->md != md) { @@ -1637,6 +1603,44 @@ void dm_interface_exit(void) dm_hash_exit(); } + +/** + * dm_ioctl_export - Permanently export a mapped device via the ioctl interface + * @md: Pointer to mapped_device + * @name: Buffer (size DM_NAME_LEN) for name + * @uuid: Buffer (size DM_UUID_LEN) for uuid or NULL if not desired + */ +int dm_ioctl_export(struct mapped_device *md, const char *name, const char *uuid) +{ + int r = 0; + struct hash_cell *hc; + + if (!md) { + r = -ENXIO; + goto out; + } + + /* The name and uuid can only be set once. */ + mutex_lock(&dm_hash_cells_mutex); + hc = dm_get_mdptr(md); + mutex_unlock(&dm_hash_cells_mutex); + if (hc) { + DMERR("%s: already exported", dm_device_name(md)); + r = -ENXIO; + goto out; + } + + r = dm_hash_insert(name, uuid, md); + if (r) { + DMERR("%s: could not bind to '%s'", dm_device_name(md), name); + goto out; + } + + /* Let udev know we've changed. */ + dm_kobject_uevent(md, KOBJ_CHANGE, dm_get_event_nr(md)); +out: + return r; +} /** * dm_copy_name_and_uuid - Copy mapped device name & uuid into supplied buffers * @md: Pointer to mapped_device diff --git a/drivers/md/dm-table.c b/drivers/md/dm-table.c index 9924ea2..ef6a3ab 100644 --- a/drivers/md/dm-table.c +++ b/drivers/md/dm-table.c @@ -900,7 +900,7 @@ static int setup_indexes(struct dm_table *t) /* * Builds the btree to index the map. */ -int dm_table_complete(struct dm_table *t) +int dm_table_build_index(struct dm_table *t) { int r = 0; unsigned int leaf_nodes; @@ -919,6 +919,54 @@ int dm_table_complete(struct dm_table *t) return r; } +/* + * Register the mapped device for blk_integrity support if + * the underlying devices support it. + */ +static int dm_table_prealloc_integrity(struct dm_table *t, struct mapped_device *md) +{ + struct list_head *devices = dm_table_get_devices(t); + struct dm_dev_internal *dd; + + list_for_each_entry(dd, devices, list) + if (bdev_get_integrity(dd->dm_dev.bdev)) + return blk_integrity_register(dm_disk(md), NULL); + + return 0; +} + +/* + * Prepares the table for use by building the indices, + * setting the type, and allocating mempools. + */ +int dm_table_complete(struct dm_table *t) +{ + int r = 0; + r = dm_table_set_type(t); + if (r) { + DMERR("unable to set table type"); + return r; + } + + r = dm_table_build_index(t); + if (r) { + DMERR("unable to build btrees"); + return r; + } + + r = dm_table_prealloc_integrity(t, t->md); + if (r) { + DMERR("could not register integrity profile."); + return r; + } + + r = dm_table_alloc_md_mempools(t); + if (r) { + DMERR("unable to allocate mempools"); + } + return r; +} + static DEFINE_MUTEX(_event_lock); void dm_table_event_callback(struct dm_table *t, void (*fn)(void *), void *context) diff --git a/drivers/md/dm.h b/drivers/md/dm.h index bad1724..782d867 100644 --- a/drivers/md/dm.h +++ b/drivers/md/dm.h @@ -17,12 +17,6 @@ #include <linux/hdreg.h> /* - * Suspend feature flags - */ -#define DM_SUSPEND_LOCKFS_FLAG (1 << 0) -#define DM_SUSPEND_NOFLUSH_FLAG (1 << 1) - -/* * Type of table and mapped_device's mempool */ #define DM_TYPE_NONE 0 diff --git a/include/linux/device-mapper.h b/include/linux/device-mapper.h index 1381cd9..6c1c230 100644 --- a/include/linux/device-mapper.h +++ b/include/linux/device-mapper.h @@ -215,6 +215,18 @@ void dm_set_mdptr(struct mapped_device *md, void *ptr); void *dm_get_mdptr(struct mapped_device *md); /* + * Export the device via the ioctl interface (uses mdptr). + */ +int dm_ioctl_export(struct mapped_device *md, const char *name, + const char *uuid); + +/* + * Suspend feature flags + */ +#define DM_SUSPEND_LOCKFS_FLAG (1 << 0) +#define DM_SUSPEND_NOFLUSH_FLAG (1 << 1) + +/* * A device can still be used while suspended, but I/O is deferred. */ int dm_suspend(struct mapped_device *md, unsigned suspend_flags); -- 1.7.0.4 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* Re: [dm-devel] [RFC PATCH v2 1/2] dm: allow a dm-fs-style device to be shared via dm-ioctl 2010-05-15 1:41 ` [RFC PATCH v2 1/2] " Will Drewry @ 2010-05-18 2:36 ` Kiyoshi Ueda 2010-05-18 3:11 ` Will Drewry 0 siblings, 1 reply; 12+ messages in thread From: Kiyoshi Ueda @ 2010-05-18 2:36 UTC (permalink / raw) To: Will Drewry; +Cc: device-mapper development, linux-kernel, snitzer, agk Hi Will, n 05/15/2010 10:41 AM +0900, Will Drewry wrote: > In addition, it ensures that public functions are available that > allow mapped devices and tables to be created and associated > with the shared code paths with dm-ioctl: > - suspend flags are available snip > diff --git a/drivers/md/dm.h b/drivers/md/dm.h > index bad1724..782d867 100644 > --- a/drivers/md/dm.h > +++ b/drivers/md/dm.h > @@ -17,12 +17,6 @@ > #include <linux/hdreg.h> > > /* > - * Suspend feature flags > - */ > -#define DM_SUSPEND_LOCKFS_FLAG (1 << 0) > -#define DM_SUSPEND_NOFLUSH_FLAG (1 << 1) > - > -/* > * Type of table and mapped_device's mempool > */ > #define DM_TYPE_NONE 0 > diff --git a/include/linux/device-mapper.h b/include/linux/device-mapper.h > index 1381cd9..6c1c230 100644 > --- a/include/linux/device-mapper.h > +++ b/include/linux/device-mapper.h > @@ -215,6 +215,18 @@ void dm_set_mdptr(struct mapped_device *md, void *ptr); > void *dm_get_mdptr(struct mapped_device *md); > > /* > + * Export the device via the ioctl interface (uses mdptr). > + */ > +int dm_ioctl_export(struct mapped_device *md, const char *name, > + const char *uuid); > + > +/* > + * Suspend feature flags > + */ > +#define DM_SUSPEND_LOCKFS_FLAG (1 << 0) > +#define DM_SUSPEND_NOFLUSH_FLAG (1 << 1) > + > +/* > * A device can still be used while suspended, but I/O is deferred. > */ > int dm_suspend(struct mapped_device *md, unsigned suspend_flags); Why do you need suspend feature flags? I think no feature is needed (specifying '0' is enough) to make/suspend a dm device at boot time (although I have looked at only this flag part). Am I missing something? Thanks, Kiyoshi Ueda ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [dm-devel] [RFC PATCH v2 1/2] dm: allow a dm-fs-style device to be shared via dm-ioctl 2010-05-18 2:36 ` [dm-devel] " Kiyoshi Ueda @ 2010-05-18 3:11 ` Will Drewry 0 siblings, 0 replies; 12+ messages in thread From: Will Drewry @ 2010-05-18 3:11 UTC (permalink / raw) To: Kiyoshi Ueda; +Cc: device-mapper development, linux-kernel, snitzer, agk On Mon, May 17, 2010 at 9:36 PM, Kiyoshi Ueda <k-ueda@ct.jp.nec.com> wrote: > Hi Will, > > n 05/15/2010 10:41 AM +0900, Will Drewry wrote: >> In addition, it ensures that public functions are available that >> allow mapped devices and tables to be created and associated >> with the shared code paths with dm-ioctl: >> - suspend flags are available > snip >> diff --git a/drivers/md/dm.h b/drivers/md/dm.h >> index bad1724..782d867 100644 >> --- a/drivers/md/dm.h >> +++ b/drivers/md/dm.h >> @@ -17,12 +17,6 @@ >> #include <linux/hdreg.h> >> >> /* >> - * Suspend feature flags >> - */ >> -#define DM_SUSPEND_LOCKFS_FLAG (1 << 0) >> -#define DM_SUSPEND_NOFLUSH_FLAG (1 << 1) >> - >> -/* >> * Type of table and mapped_device's mempool >> */ >> #define DM_TYPE_NONE 0 >> diff --git a/include/linux/device-mapper.h b/include/linux/device-mapper.h >> index 1381cd9..6c1c230 100644 >> --- a/include/linux/device-mapper.h >> +++ b/include/linux/device-mapper.h >> @@ -215,6 +215,18 @@ void dm_set_mdptr(struct mapped_device *md, void *ptr); >> void *dm_get_mdptr(struct mapped_device *md); >> >> /* >> + * Export the device via the ioctl interface (uses mdptr). >> + */ >> +int dm_ioctl_export(struct mapped_device *md, const char *name, >> + const char *uuid); >> + >> +/* >> + * Suspend feature flags >> + */ >> +#define DM_SUSPEND_LOCKFS_FLAG (1 << 0) >> +#define DM_SUSPEND_NOFLUSH_FLAG (1 << 1) >> + >> +/* >> * A device can still be used while suspended, but I/O is deferred. >> */ >> int dm_suspend(struct mapped_device *md, unsigned suspend_flags); > > Why do you need suspend feature flags? > I think no feature is needed (specifying '0' is enough) to make/suspend > a dm device at boot time (although I have looked at only this flag part). > Am I missing something? Not at all! I hadn't thoroughly reviewed the code path for flush/noflush and was hoping to avoid additional code paths. However, looking at effect, I don't see any tangible benefit to doing so with a brand new device. I'll switch it over to 0, and I can take exposing the flags out of this patch. Any additional comments are appreciated - thanks! will ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [dm-devel] [RFC PATCH v2 1/2] dm: allow a dm-fs-style device to be shared via dm-ioctl @ 2010-05-18 3:11 ` Will Drewry 0 siblings, 0 replies; 12+ messages in thread From: Will Drewry @ 2010-05-18 3:11 UTC (permalink / raw) To: Kiyoshi Ueda; +Cc: device-mapper development, linux-kernel, snitzer, agk On Mon, May 17, 2010 at 9:36 PM, Kiyoshi Ueda <k-ueda@ct.jp.nec.com> wrote: > Hi Will, > > n 05/15/2010 10:41 AM +0900, Will Drewry wrote: >> In addition, it ensures that public functions are available that >> allow mapped devices and tables to be created and associated >> with the shared code paths with dm-ioctl: >> - suspend flags are available > snip >> diff --git a/drivers/md/dm.h b/drivers/md/dm.h >> index bad1724..782d867 100644 >> --- a/drivers/md/dm.h >> +++ b/drivers/md/dm.h >> @@ -17,12 +17,6 @@ >> #include <linux/hdreg.h> >> >> /* >> - * Suspend feature flags >> - */ >> -#define DM_SUSPEND_LOCKFS_FLAG (1 << 0) >> -#define DM_SUSPEND_NOFLUSH_FLAG (1 << 1) >> - >> -/* >> * Type of table and mapped_device's mempool >> */ >> #define DM_TYPE_NONE 0 >> diff --git a/include/linux/device-mapper.h b/include/linux/device-mapper.h >> index 1381cd9..6c1c230 100644 >> --- a/include/linux/device-mapper.h >> +++ b/include/linux/device-mapper.h >> @@ -215,6 +215,18 @@ void dm_set_mdptr(struct mapped_device *md, void *ptr); >> void *dm_get_mdptr(struct mapped_device *md); >> >> /* >> + * Export the device via the ioctl interface (uses mdptr). >> + */ >> +int dm_ioctl_export(struct mapped_device *md, const char *name, >> + const char *uuid); >> + >> +/* >> + * Suspend feature flags >> + */ >> +#define DM_SUSPEND_LOCKFS_FLAG (1 << 0) >> +#define DM_SUSPEND_NOFLUSH_FLAG (1 << 1) >> + >> +/* >> * A device can still be used while suspended, but I/O is deferred. >> */ >> int dm_suspend(struct mapped_device *md, unsigned suspend_flags); > > Why do you need suspend feature flags? > I think no feature is needed (specifying '0' is enough) to make/suspend > a dm device at boot time (although I have looked at only this flag part). > Am I missing something? Not at all! I hadn't thoroughly reviewed the code path for flush/noflush and was hoping to avoid additional code paths. However, looking at effect, I don't see any tangible benefit to doing so with a brand new device. I'll switch it over to 0, and I can take exposing the flags out of this patch. Any additional comments are appreciated - thanks! will ^ permalink raw reply [flat|nested] 12+ messages in thread
* [RFC PATCH v2 2/2] init: boot to device-mapper targets without an initr* 2010-05-14 3:53 ` Mike Snitzer 2010-05-14 14:32 ` Will Drewry 2010-05-15 1:41 ` [RFC PATCH v2 1/2] " Will Drewry @ 2010-05-15 1:41 ` Will Drewry 2010-05-17 16:47 ` Randy Dunlap 2 siblings, 1 reply; 12+ messages in thread From: Will Drewry @ 2010-05-15 1:41 UTC (permalink / raw) To: dm-devel, linux-kernel; +Cc: agk, snitzer, Will Drewry Add a dm= kernel parameter modeled after the md= parameter from do_mounts_md. It allows for device-mapper targets to be configured at boot time for use early in the boot process (as the root device or otherwise). The format is dm="name uuid ro,table line 1,table line 2,...". The parser expects the comma to be safe to use as a newline substitute but, otherwise, uses the normal separator of space. Some attempt has been made to make it forgiving of additional spaces (using skip_spaces()). A mapped device created during boot will be assigned a minor of 0 and may be access via /dev/dm-0. An example dm-linear root with no uuid may look like: root=/dev/dm-0 dm="lroot none 0, 0 4096 linear 98:16 0, 4096 4096 linear 98:32 0" Once udev is started, /dev/dm-0 will become /dev/mapper/lroot. Signed-off-by: Will Drewry <wad@chromium.org> --- init/Makefile | 1 + init/do_mounts.c | 1 + init/do_mounts.h | 10 ++ init/do_mounts_dm.c | 353 +++++++++++++++++++++++++++++++++++++++++++++++++++ 4 files changed, 365 insertions(+), 0 deletions(-) create mode 100644 init/do_mounts_dm.c diff --git a/init/Makefile b/init/Makefile index 0bf677a..1677baa 100644 --- a/init/Makefile +++ b/init/Makefile @@ -14,6 +14,7 @@ mounts-y := do_mounts.o mounts-$(CONFIG_BLK_DEV_RAM) += do_mounts_rd.o mounts-$(CONFIG_BLK_DEV_INITRD) += do_mounts_initrd.o mounts-$(CONFIG_BLK_DEV_MD) += do_mounts_md.o +mounts-$(CONFIG_BLK_DEV_DM) += do_mounts_dm.o # dependencies on generated files need to be listed explicitly $(obj)/version.o: include/generated/compile.h diff --git a/init/do_mounts.c b/init/do_mounts.c index 02e3ca4..0848a5b 100644 --- a/init/do_mounts.c +++ b/init/do_mounts.c @@ -383,6 +383,7 @@ void __init prepare_namespace(void) wait_for_device_probe(); md_run_setup(); + dm_run_setup(); if (saved_root_name[0]) { root_device_name = saved_root_name; diff --git a/init/do_mounts.h b/init/do_mounts.h index f5b978a..09d2286 100644 --- a/init/do_mounts.h +++ b/init/do_mounts.h @@ -74,3 +74,13 @@ void md_run_setup(void); static inline void md_run_setup(void) {} #endif + +#ifdef CONFIG_BLK_DEV_DM + +void dm_run_setup(void); + +#else + +static inline void dm_run_setup(void) {} + +#endif diff --git a/init/do_mounts_dm.c b/init/do_mounts_dm.c new file mode 100644 index 0000000..7b188e2 --- /dev/null +++ b/init/do_mounts_dm.c @@ -0,0 +1,353 @@ +/* do_mounts_dm.c + * Copyright (C) 2010 The Chromium OS Authors <chromium-os-dev@chromium.org> + * All Rights Reserved. + * Based on do_mounts_md.c + * + * This file is released under the GPL. + */ +#include <linux/device-mapper.h> +#include <linux/fs.h> +#include <linux/string.h> + +#include "do_mounts.h" + +#define DM_MAX_NAME 32 +#define DM_MAX_UUID 129 +#define DM_NO_UUID "none" + +#define DM_MSG_PREFIX "init" + +/* Separators used for parsing the dm= argument. */ +#define DM_FIELD_SEP ' ' +#define DM_LINE_SEP ',' + +/* + * When the device-mapper and any targets are compiled into the kernel + * (not a module), one target may be created and used as the root device at + * boot time with the parameters given with the boot line dm=... + * The code for that is here. + */ + +struct dm_setup_target { + sector_t begin; + sector_t length; + char *type; + char *params; + /* simple singly linked list */ + struct dm_setup_target *next; +}; + +static struct { + int minor; + int ro; + char name[DM_MAX_NAME]; + char uuid[DM_MAX_UUID]; + char *targets; + struct dm_setup_target *target; + int target_count; +} dm_setup_args __initdata; + +static __initdata int dm_early_setup = 0; + +static size_t __init get_dm_option(char *str, char **next, char sep) +{ + size_t len = 0; + char *endp = NULL; + + if (!str) + return 0; + + endp = strchr(str, sep); + if (!endp) { /* act like strchrnul */ + len = strlen(str); + endp = str + len; + } else { + len = endp - str; + } + + if (endp == str) + return 0; + + if (!next) + return len; + + if (*endp == 0) { + /* Don't advance past the nul. */ + *next = endp; + } else { + *next = endp + 1; + } + return len; +} + +static int __init dm_setup_args_init(void) +{ + dm_setup_args.minor = 0; + dm_setup_args.ro = 0; + dm_setup_args.target = NULL; + dm_setup_args.target_count = 0; + return 0; +} + +static int __init dm_setup_cleanup(void) +{ + struct dm_setup_target *target = dm_setup_args.target; + struct dm_setup_target *old_target = NULL; + while (target) { + if (target->type) + kfree(target->type); + if (target->params) + kfree(target->params); + old_target = target; + target = target->next; + kfree(old_target); + dm_setup_args.target_count--; + } + BUG_ON(dm_setup_args.target_count); + return 0; +} + +static char * __init dm_setup_parse_device_args(char *str) +{ + char *next = NULL; + size_t len = 0; + + /* Grab the logical name of the device to be exported to udev */ + len = get_dm_option(str, &next, DM_FIELD_SEP); + if (!len) { + DMERR("failed to parse device name"); + goto parse_fail; + } + len = min(len + 1, sizeof(dm_setup_args.name)); + strlcpy(dm_setup_args.name, str, len + 1); /* includes nul */ + str = skip_spaces(next); + + /* Grab the UUID value or "none" */ + len = get_dm_option(str, &next, DM_FIELD_SEP); + if (!len) { + DMERR("failed to parse device uuid"); + goto parse_fail; + } + len = min(len + 1, sizeof(dm_setup_args.uuid)); + strlcpy(dm_setup_args.uuid, str, len); + str = skip_spaces(next); + + /* If ro is non-zero, the table will be create FMODE_READ. */ + if (*str++ != '0') + dm_setup_args.ro = 1; + if (*str++ != ',') { + DMERR("failed to parse table mode"); + goto parse_fail; + } + str = skip_spaces(str); + + return str; + +parse_fail: + return NULL; +} + +static int __init dm_setup_parse_targets(char *str) +{ + char *next = NULL; + size_t len = 0; + struct dm_setup_target **target = NULL; + + /* Targets are defined as per the table format but with a + * comma as a newline separator. */ + target = &dm_setup_args.target; + while (str && *str) { + *target = kzalloc(sizeof(struct dm_setup_target), GFP_KERNEL); + if (!*target) { + DMERR("failed to allocate memory for target %d", + dm_setup_args.target_count); + goto parse_fail; + } + dm_setup_args.target_count++; + + (*target)->begin = simple_strtoull(str, &next, 10); + if (!next || *next != DM_FIELD_SEP) { + DMERR("failed to parse starting sector for target %d", + dm_setup_args.target_count - 1); + goto parse_fail; + } + str = skip_spaces(next + 1); + + (*target)->length = simple_strtoull(str, &next, 10); + if (!next || *next != DM_FIELD_SEP) { + DMERR("failed to parse length for target %d", + dm_setup_args.target_count - 1); + goto parse_fail; + } + str = skip_spaces(next + 1); + + len = get_dm_option(str, &next, DM_FIELD_SEP); + if (!len || + !((*target)->type = kstrndup(str, len, GFP_KERNEL))) { + DMERR("failed to parse type for target %d", + dm_setup_args.target_count - 1); + goto parse_fail; + } + str = skip_spaces(next); + + len = get_dm_option(str, &next, DM_LINE_SEP); + if (!len || + !((*target)->params = kstrndup(str, len, GFP_KERNEL))) { + DMERR("failed to parse params for target %d", + dm_setup_args.target_count - 1); + goto parse_fail; + } + str = skip_spaces(next); + + target = &((*target)->next); + } + DMDEBUG("parsed %d targets", dm_setup_args.target_count); + + return 0; + +parse_fail: + return 1; +} + +/* + * Parse the command-line parameters given our kernel, but do not + * actually try to invoke the DM device now; that is handled by + * dm_setup_drive after the low-level disk drivers have initialised. + * dm format is as follows: + * dm="name uuid fmode,[table line 1],[table line 2],..." + * May be used with root=/dev/dm-0 as it always uses the first dm minor. + */ + +static int __init dm_setup(char *str) +{ + dm_setup_args_init(); + + str = dm_setup_parse_device_args(str); + if (!str) { + DMDEBUG("str is NULL"); + goto parse_fail; + } + + /* Target parsing is delayed until we have dynamic memory */ + dm_setup_args.targets = str; + + printk(KERN_INFO "dm: will configure '%s' on dm-%d\n", + dm_setup_args.name, dm_setup_args.minor); + + dm_early_setup = 1; + return 1; + +parse_fail: + printk(KERN_WARNING "dm: Invalid arguments supplied to dm=.\n"); + return 0; +} + + +static void __init dm_setup_drive(void) +{ + struct mapped_device *md = NULL; + struct dm_table *table = NULL; + struct dm_setup_target *target; + char *uuid = dm_setup_args.uuid; + fmode_t fmode = FMODE_READ; + + /* Finish parsing the targets. */ + if (dm_setup_parse_targets(dm_setup_args.targets)) { + goto parse_fail; + } + + if (dm_create(dm_setup_args.minor, &md)) { + DMDEBUG("failed to create the device"); + goto dm_create_fail; + } + DMDEBUG("created device '%s'", dm_device_name(md)); + + /* In addition to flagging the table below, the disk must be + * set explicitly ro/rw. */ + if (dm_setup_args.ro) { + set_disk_ro(dm_disk(md), 1); + } else { + set_disk_ro(dm_disk(md), 0); + } + + fmode |= (dm_setup_args.ro ? 0 : FMODE_WRITE); + if (dm_table_create(&table, fmode, dm_setup_args.target_count, md)) { + DMDEBUG("failed to create the table"); + goto dm_table_create_fail; + } + + target = dm_setup_args.target; + while (target) { + DMINFO("adding target '%llu %llu %s %s'", + (unsigned long long) target->begin, + (unsigned long long) target->length, target->type, + target->params); + if (dm_table_add_target(table, target->type, target->begin, + target->length, target->params)) { + DMDEBUG("failed to add the target to the table"); + goto add_target_fail; + } + target = target->next; + } + + if (dm_table_complete(table)) { + DMDEBUG("failed to complete the table"); + goto table_complete_fail; + } + + /* Suspend the device so that we can bind it to the table. */ + if (dm_suspend(md, DM_SUSPEND_NOFLUSH_FLAG)) { + DMDEBUG("failed to suspend the device pre-bind"); + goto suspend_fail; + } + + /* Bind the table to the device. This is the only way to associate + * md->map with the table and set the disk capacity directly. */ + if (dm_swap_table(md, table)) { /* should return NULL. */ + DMDEBUG("failed to bind the device to the table"); + goto table_bind_fail; + } + + /* Finally, resume and the device should be ready. */ + if (dm_resume(md)) { + DMDEBUG("failed to resume the device"); + goto resume_fail; + } + + /* Export the dm device via the ioctl interface */ + if (!strcmp(DM_NO_UUID, dm_setup_args.uuid)) + uuid = NULL; + if (dm_ioctl_export(md, dm_setup_args.name, uuid)) { + DMDEBUG("failed to export device with given name and uuid"); + goto export_fail; + } + printk(KERN_INFO "dm: dm-%d is ready\n", dm_setup_args.minor); + + dm_setup_cleanup(); + return; + +export_fail: +resume_fail: +table_bind_fail: +suspend_fail: +table_complete_fail: +add_target_fail: + dm_table_put(table); +dm_table_create_fail: + dm_put(md); +dm_create_fail: + dm_setup_cleanup(); +parse_fail: + printk(KERN_WARNING "dm: starting dm-%d (%s) failed\n", + dm_setup_args.minor, dm_setup_args.name); +} + +__setup("dm=", dm_setup); + +void __init dm_run_setup(void) +{ + if (!dm_early_setup) + return; + printk(KERN_INFO "dm: attempting early device configuration.\n"); + dm_setup_drive(); +} -- 1.7.0.4 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* Re: [RFC PATCH v2 2/2] init: boot to device-mapper targets without an initr* 2010-05-15 1:41 ` [RFC PATCH v2 2/2] init: boot to device-mapper targets without an initr* Will Drewry @ 2010-05-17 16:47 ` Randy Dunlap 2010-05-17 18:13 ` Will Drewry 0 siblings, 1 reply; 12+ messages in thread From: Randy Dunlap @ 2010-05-17 16:47 UTC (permalink / raw) To: Will Drewry; +Cc: dm-devel, linux-kernel, agk, snitzer On Fri, 14 May 2010 20:41:41 -0500 Will Drewry wrote: > Add a dm= kernel parameter modeled after the md= parameter from > do_mounts_md. It allows for device-mapper targets to be configured at > boot time for use early in the boot process (as the root device or > otherwise). dm=<blah> documentation needs to be added to Documentation/kernel-parameters.txt and/or Documentation/md.txt. > The format is dm="name uuid ro,table line 1,table line 2,...". The > parser expects the comma to be safe to use as a newline substitute but, > otherwise, uses the normal separator of space. Some attempt has been > made to make it forgiving of additional spaces (using skip_spaces()). This "space in the arg string" has been tested, right? It seems a bit odd to me. Most kernel parameter strings that I am familiar with use punctuation for separating parameter parts. > A mapped device created during boot will be assigned a minor of 0 and > may be access via /dev/dm-0. > > An example dm-linear root with no uuid may look like: > > root=/dev/dm-0 dm="lroot none 0, 0 4096 linear 98:16 0, 4096 4096 linear 98:32 0" > > Once udev is started, /dev/dm-0 will become /dev/mapper/lroot. > > Signed-off-by: Will Drewry <wad@chromium.org> > --- > init/Makefile | 1 + > init/do_mounts.c | 1 + > init/do_mounts.h | 10 ++ > init/do_mounts_dm.c | 353 +++++++++++++++++++++++++++++++++++++++++++++++++++ > 4 files changed, 365 insertions(+), 0 deletions(-) > create mode 100644 init/do_mounts_dm.c --- ~Randy *** Remember to use Documentation/SubmitChecklist when testing your code *** ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [RFC PATCH v2 2/2] init: boot to device-mapper targets without an initr* 2010-05-17 16:47 ` Randy Dunlap @ 2010-05-17 18:13 ` Will Drewry 0 siblings, 0 replies; 12+ messages in thread From: Will Drewry @ 2010-05-17 18:13 UTC (permalink / raw) To: Randy Dunlap; +Cc: dm-devel, linux-kernel, agk, snitzer On Mon, May 17, 2010 at 11:47 AM, Randy Dunlap <randy.dunlap@oracle.com> wrote: > On Fri, 14 May 2010 20:41:41 -0500 Will Drewry wrote: > >> Add a dm= kernel parameter modeled after the md= parameter from >> do_mounts_md. It allows for device-mapper targets to be configured at >> boot time for use early in the boot process (as the root device or >> otherwise). > > dm=<blah> > documentation needs to be added to Documentation/kernel-parameters.txt and/or > Documentation/md.txt. Absolutely -- I've appended a proposed version below which I'll include in the next round. I'm not a lkml veteran, so if it makes sense to resend the full patchset again with it, I can. Otherwise, I'll wait for comments on the code too. >> The format is dm="name uuid ro,table line 1,table line 2,...". The >> parser expects the comma to be safe to use as a newline substitute but, >> otherwise, uses the normal separator of space. Some attempt has been >> made to make it forgiving of additional spaces (using skip_spaces()). > > This "space in the arg string" has been tested, right? Works for me so far. I've tested this on a user mode linux instance and a real x86 machine with the dm-linear target and a custom dm target (which I'll be mailing to dm-devel@ for feedback later this week). > It seems a bit odd to me. Most kernel parameter strings that I am familiar with > use punctuation for separating parameter parts. Yup - I agree. My first cut I used commas with an empty ,, delimiter as a new line. Then I ran across this in the source: kernel/params.c 76 /* You can use " around spaces, but can't escape ". */ 77 /* Hyphens and underscores equivalent in parameter names. */ 78 static char *next_arg(char *args, char **param, char **val) I will need to cross-check all the known dm targets to make sure that they don't expect quoted internal strings. In my first look, I didn't see any. However, I'm perfectly content with either approach so if there's a preference, I'll rework it to make it happen. This approach just maps more cleanly to the existing experience of configuring a mapped device. thanks! will documentation: dm= parameter documentation Add documentation for early mapped device creation without an initial rd. Signed-off-by: Will Drewry <wad@chromium.org> --- Documentation/device-mapper/boot.txt | 36 ++++++++++++++++++++++++++++++++++ Documentation/kernel-parameters.txt | 4 +++ 2 files changed, 40 insertions(+), 0 deletions(-) create mode 100644 Documentation/device-mapper/boot.txt diff --git a/Documentation/device-mapper/boot.txt b/Documentation/device-mapper/boot.txt new file mode 100644 index 0000000..00fb557 --- /dev/null +++ b/Documentation/device-mapper/boot.txt @@ -0,0 +1,36 @@ +Boot time creation of mapped devices +=================================== + +You can boot directly to a dm device using the following kernel command +line: + +dm="<name> <uuid> <ro>,table line 1,...,table line n" + +name = the name to associated with the device + after boot, udev, if used, will use that name to label + the device node. +uuid = may be 'none' or the UUID desired for the device. +ro = may be 0 or 1. If non-zero, the device and device table will be + marked read-only. + +Each table line may be as normal when using the dmsetup tool except for +two variations: +1. Any use of commas will be interpreted as a newline +2. Quotation marks cannot be escaped and cannot be used without + terminating the dm= argument. + +Unless renamed by udev, the device node created will be dm-0 as the +first minor number for the device-mapper is used during early creation. + +Example +======= + +- Booting to a linear array made up of user-mode linux block devices: + + dm="lroot none 0, 0 4096 linear 98:16 0, 4096 4096 linear 98:32 0" \ + root=/dev/dm-0 + +Will boot to a rw dm-linear target of 8192 sectors split across two +block devices identified by their major:minor numbers. After boot, udev +will rename this target to /dev/mapper/lroot (depending on the rules). +No uuid was assigned. diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt index 839b21b..9e22f8e 100644 --- a/Documentation/kernel-parameters.txt +++ b/Documentation/kernel-parameters.txt @@ -43,6 +43,7 @@ parameter is applicable: AVR32 AVR32 architecture is enabled. AX25 Appropriate AX.25 support is enabled. BLACKFIN Blackfin architecture is enabled. + DM Device mapper support is enabled. DRM Direct Rendering Management support is enabled. EDD BIOS Enhanced Disk Drive Services (EDD) is enabled EFI EFI Partitioning (GPT) is enabled @@ -654,6 +655,9 @@ and is between 256 and 4096 characters. It is defined in the file Disable PIN 1 of APIC timer Can be useful to work around chipset bugs. + dm= [DM] Allows early creation of a device-mapper device. + See Documentation/device-mapper/boot.txt. + dmasound= [HW,OSS] Sound subsystem buffers dma_debug=off If the kernel is compiled with DMA_API_DEBUG support, -- 1.7.0.4 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* Re: [RFC PATCH v2 2/2] init: boot to device-mapper targets without an initr* @ 2010-05-17 18:13 ` Will Drewry 0 siblings, 0 replies; 12+ messages in thread From: Will Drewry @ 2010-05-17 18:13 UTC (permalink / raw) To: Randy Dunlap; +Cc: dm-devel, linux-kernel, agk, snitzer On Mon, May 17, 2010 at 11:47 AM, Randy Dunlap <randy.dunlap@oracle.com> wrote: > On Fri, 14 May 2010 20:41:41 -0500 Will Drewry wrote: > >> Add a dm= kernel parameter modeled after the md= parameter from >> do_mounts_md. It allows for device-mapper targets to be configured at >> boot time for use early in the boot process (as the root device or >> otherwise). > > dm=<blah> > documentation needs to be added to Documentation/kernel-parameters.txt and/or > Documentation/md.txt. Absolutely -- I've appended a proposed version below which I'll include in the next round. I'm not a lkml veteran, so if it makes sense to resend the full patchset again with it, I can. Otherwise, I'll wait for comments on the code too. >> The format is dm="name uuid ro,table line 1,table line 2,...". The >> parser expects the comma to be safe to use as a newline substitute but, >> otherwise, uses the normal separator of space. Some attempt has been >> made to make it forgiving of additional spaces (using skip_spaces()). > > This "space in the arg string" has been tested, right? Works for me so far. I've tested this on a user mode linux instance and a real x86 machine with the dm-linear target and a custom dm target (which I'll be mailing to dm-devel@ for feedback later this week). > It seems a bit odd to me. Most kernel parameter strings that I am familiar with > use punctuation for separating parameter parts. Yup - I agree. My first cut I used commas with an empty ,, delimiter as a new line. Then I ran across this in the source: kernel/params.c 76 /* You can use " around spaces, but can't escape ". */ 77 /* Hyphens and underscores equivalent in parameter names. */ 78 static char *next_arg(char *args, char **param, char **val) I will need to cross-check all the known dm targets to make sure that they don't expect quoted internal strings. In my first look, I didn't see any. However, I'm perfectly content with either approach so if there's a preference, I'll rework it to make it happen. This approach just maps more cleanly to the existing experience of configuring a mapped device. thanks! will documentation: dm= parameter documentation Add documentation for early mapped device creation without an initial rd. Signed-off-by: Will Drewry <wad@chromium.org> --- Documentation/device-mapper/boot.txt | 36 ++++++++++++++++++++++++++++++++++ Documentation/kernel-parameters.txt | 4 +++ 2 files changed, 40 insertions(+), 0 deletions(-) create mode 100644 Documentation/device-mapper/boot.txt diff --git a/Documentation/device-mapper/boot.txt b/Documentation/device-mapper/boot.txt new file mode 100644 index 0000000..00fb557 --- /dev/null +++ b/Documentation/device-mapper/boot.txt @@ -0,0 +1,36 @@ +Boot time creation of mapped devices +=================================== + +You can boot directly to a dm device using the following kernel command +line: + +dm="<name> <uuid> <ro>,table line 1,...,table line n" + +name = the name to associated with the device + after boot, udev, if used, will use that name to label + the device node. +uuid = may be 'none' or the UUID desired for the device. +ro = may be 0 or 1. If non-zero, the device and device table will be + marked read-only. + +Each table line may be as normal when using the dmsetup tool except for +two variations: +1. Any use of commas will be interpreted as a newline +2. Quotation marks cannot be escaped and cannot be used without + terminating the dm= argument. + +Unless renamed by udev, the device node created will be dm-0 as the +first minor number for the device-mapper is used during early creation. + +Example +======= + +- Booting to a linear array made up of user-mode linux block devices: + + dm="lroot none 0, 0 4096 linear 98:16 0, 4096 4096 linear 98:32 0" \ + root=/dev/dm-0 + +Will boot to a rw dm-linear target of 8192 sectors split across two +block devices identified by their major:minor numbers. After boot, udev +will rename this target to /dev/mapper/lroot (depending on the rules). +No uuid was assigned. diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt index 839b21b..9e22f8e 100644 --- a/Documentation/kernel-parameters.txt +++ b/Documentation/kernel-parameters.txt @@ -43,6 +43,7 @@ parameter is applicable: AVR32 AVR32 architecture is enabled. AX25 Appropriate AX.25 support is enabled. BLACKFIN Blackfin architecture is enabled. + DM Device mapper support is enabled. DRM Direct Rendering Management support is enabled. EDD BIOS Enhanced Disk Drive Services (EDD) is enabled EFI EFI Partitioning (GPT) is enabled @@ -654,6 +655,9 @@ and is between 256 and 4096 characters. It is defined in the file Disable PIN 1 of APIC timer Can be useful to work around chipset bugs. + dm= [DM] Allows early creation of a device-mapper device. + See Documentation/device-mapper/boot.txt. + dmasound= [HW,OSS] Sound subsystem buffers dma_debug=off If the kernel is compiled with DMA_API_DEBUG support, -- 1.7.0.4 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* Re: [RFC PATCH v2 2/2] init: boot to device-mapper targets without an initr* 2010-05-17 18:13 ` Will Drewry (?) @ 2010-05-17 18:21 ` Randy Dunlap -1 siblings, 0 replies; 12+ messages in thread From: Randy Dunlap @ 2010-05-17 18:21 UTC (permalink / raw) To: Will Drewry; +Cc: dm-devel, linux-kernel, agk, snitzer On Mon, 17 May 2010 13:13:48 -0500 Will Drewry wrote: > On Mon, May 17, 2010 at 11:47 AM, Randy Dunlap <randy.dunlap@oracle.com> wrote: > > On Fri, 14 May 2010 20:41:41 -0500 Will Drewry wrote: > > > >> Add a dm= kernel parameter modeled after the md= parameter from > >> do_mounts_md. It allows for device-mapper targets to be configured at > >> boot time for use early in the boot process (as the root device or > >> otherwise). > > > > dm=<blah> > > documentation needs to be added to Documentation/kernel-parameters.txt and/or > > Documentation/md.txt. > > Absolutely -- I've appended a proposed version below which I'll include in the > next round. I'm not a lkml veteran, so if it makes sense to resend > the full patchset > again with it, I can. Otherwise, I'll wait for comments on the code too. OK, thanks for the doc update. One typo noted below. > >> The format is dm="name uuid ro,table line 1,table line 2,...". The > >> parser expects the comma to be safe to use as a newline substitute but, > >> otherwise, uses the normal separator of space. Some attempt has been > >> made to make it forgiving of additional spaces (using skip_spaces()). > > > > This "space in the arg string" has been tested, right? > > Works for me so far. I've tested this on a user mode linux instance and > a real x86 machine with the dm-linear target and a custom dm target > (which I'll be > mailing to dm-devel@ for feedback later this week). > > > It seems a bit odd to me. Most kernel parameter strings that I am familiar with > > use punctuation for separating parameter parts. > > Yup - I agree. My first cut I used commas with an empty ,, delimiter as a new > line. Then I ran across this in the source: > > kernel/params.c > 76 /* You can use " around spaces, but can't escape ". */ > 77 /* Hyphens and underscores equivalent in parameter names. */ > 78 static char *next_arg(char *args, char **param, char **val) > > I will need to cross-check all the known dm targets to make sure that > they don't expect quoted internal strings. In my first look, I didn't see any. > > However, I'm perfectly content with either approach so if there's a preference, > I'll rework it to make it happen. This approach just maps more cleanly to the > existing experience of configuring a mapped device. > > thanks! > will > > > documentation: dm= parameter documentation > > Add documentation for early mapped device creation without an initial rd. > > Signed-off-by: Will Drewry <wad@chromium.org> > --- > Documentation/device-mapper/boot.txt | 36 ++++++++++++++++++++++++++++++++++ > Documentation/kernel-parameters.txt | 4 +++ > 2 files changed, 40 insertions(+), 0 deletions(-) > create mode 100644 Documentation/device-mapper/boot.txt > > diff --git a/Documentation/device-mapper/boot.txt > b/Documentation/device-mapper/boot.txt > new file mode 100644 > index 0000000..00fb557 > --- /dev/null > +++ b/Documentation/device-mapper/boot.txt > @@ -0,0 +1,36 @@ > +Boot time creation of mapped devices > +=================================== > + > +You can boot directly to a dm device using the following kernel command > +line: > + > +dm="<name> <uuid> <ro>,table line 1,...,table line n" > + > +name = the name to associated with the device associate > + after boot, udev, if used, will use that name to label > + the device node. > +uuid = may be 'none' or the UUID desired for the device. > +ro = may be 0 or 1. If non-zero, the device and device table will be > + marked read-only. > + > +Each table line may be as normal when using the dmsetup tool except for > +two variations: > +1. Any use of commas will be interpreted as a newline > +2. Quotation marks cannot be escaped and cannot be used without > + terminating the dm= argument. > + > +Unless renamed by udev, the device node created will be dm-0 as the > +first minor number for the device-mapper is used during early creation. > + > +Example > +======= > + > +- Booting to a linear array made up of user-mode linux block devices: > + > + dm="lroot none 0, 0 4096 linear 98:16 0, 4096 4096 linear 98:32 0" \ > + root=/dev/dm-0 > + > +Will boot to a rw dm-linear target of 8192 sectors split across two > +block devices identified by their major:minor numbers. After boot, udev > +will rename this target to /dev/mapper/lroot (depending on the rules). > +No uuid was assigned. --- ~Randy *** Remember to use Documentation/SubmitChecklist when testing your code *** ^ permalink raw reply [flat|nested] 12+ messages in thread
end of thread, other threads:[~2010-05-18 3:12 UTC | newest] Thread overview: 12+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2010-05-14 1:39 [RFC PATCH] dm: allow a dm-fs-style device to be shared via dm-ioctl Will Drewry 2010-05-14 3:53 ` Mike Snitzer 2010-05-14 14:32 ` Will Drewry 2010-05-15 1:41 ` [RFC PATCH v2 1/2] " Will Drewry 2010-05-18 2:36 ` [dm-devel] " Kiyoshi Ueda 2010-05-18 3:11 ` Will Drewry 2010-05-18 3:11 ` Will Drewry 2010-05-15 1:41 ` [RFC PATCH v2 2/2] init: boot to device-mapper targets without an initr* Will Drewry 2010-05-17 16:47 ` Randy Dunlap 2010-05-17 18:13 ` Will Drewry 2010-05-17 18:13 ` Will Drewry 2010-05-17 18:21 ` Randy Dunlap
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.