deviceset.go 48 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821
  1. // +build linux
  2. package devmapper
  3. import (
  4. "encoding/json"
  5. "errors"
  6. "fmt"
  7. "io"
  8. "io/ioutil"
  9. "os"
  10. "os/exec"
  11. "path"
  12. "path/filepath"
  13. "strconv"
  14. "strings"
  15. "sync"
  16. "syscall"
  17. "time"
  18. "github.com/Sirupsen/logrus"
  19. "github.com/docker/docker/daemon/graphdriver"
  20. "github.com/docker/docker/pkg/devicemapper"
  21. "github.com/docker/docker/pkg/parsers"
  22. "github.com/docker/docker/pkg/units"
  23. "github.com/docker/libcontainer/label"
  24. )
  25. var (
  26. DefaultDataLoopbackSize int64 = 100 * 1024 * 1024 * 1024
  27. DefaultMetaDataLoopbackSize int64 = 2 * 1024 * 1024 * 1024
  28. DefaultBaseFsSize uint64 = 10 * 1024 * 1024 * 1024
  29. DefaultThinpBlockSize uint32 = 128 // 64K = 128 512b sectors
  30. DefaultUdevSyncOverride bool = false
  31. MaxDeviceId int = 0xffffff // 24 bit, pool limit
  32. DeviceIdMapSz int = (MaxDeviceId + 1) / 8
  33. // We retry device removal so many a times that even error messages
  34. // will fill up console during normal operation. So only log Fatal
  35. // messages by default.
  36. DMLogLevel int = devicemapper.LogLevelFatal
  37. DriverDeferredRemovalSupport bool = false
  38. EnableDeferredRemoval bool = false
  39. )
  40. const deviceSetMetaFile string = "deviceset-metadata"
  41. const transactionMetaFile string = "transaction-metadata"
  42. type Transaction struct {
  43. OpenTransactionId uint64 `json:"open_transaction_id"`
  44. DeviceIdHash string `json:"device_hash"`
  45. DeviceId int `json:"device_id"`
  46. }
  47. type DevInfo struct {
  48. Hash string `json:"-"`
  49. DeviceId int `json:"device_id"`
  50. Size uint64 `json:"size"`
  51. TransactionId uint64 `json:"transaction_id"`
  52. Initialized bool `json:"initialized"`
  53. devices *DeviceSet
  54. mountCount int
  55. mountPath string
  56. // The global DeviceSet lock guarantees that we serialize all
  57. // the calls to libdevmapper (which is not threadsafe), but we
  58. // sometimes release that lock while sleeping. In that case
  59. // this per-device lock is still held, protecting against
  60. // other accesses to the device that we're doing the wait on.
  61. //
  62. // WARNING: In order to avoid AB-BA deadlocks when releasing
  63. // the global lock while holding the per-device locks all
  64. // device locks must be aquired *before* the device lock, and
  65. // multiple device locks should be aquired parent before child.
  66. lock sync.Mutex
  67. }
  68. type MetaData struct {
  69. Devices map[string]*DevInfo `json:"Devices"`
  70. devicesLock sync.Mutex // Protects all read/writes to Devices map
  71. }
  72. type DeviceSet struct {
  73. MetaData `json:"-"`
  74. sync.Mutex `json:"-"` // Protects Devices map and serializes calls into libdevmapper
  75. root string
  76. devicePrefix string
  77. TransactionId uint64 `json:"-"`
  78. NextDeviceId int `json:"next_device_id"`
  79. deviceIdMap []byte
  80. // Options
  81. dataLoopbackSize int64
  82. metaDataLoopbackSize int64
  83. baseFsSize uint64
  84. filesystem string
  85. mountOptions string
  86. mkfsArgs []string
  87. dataDevice string // block or loop dev
  88. dataLoopFile string // loopback file, if used
  89. metadataDevice string // block or loop dev
  90. metadataLoopFile string // loopback file, if used
  91. doBlkDiscard bool
  92. thinpBlockSize uint32
  93. thinPoolDevice string
  94. Transaction `json:"-"`
  95. overrideUdevSyncCheck bool
  96. deferredRemove bool // use deferred removal
  97. }
  98. type DiskUsage struct {
  99. Used uint64
  100. Total uint64
  101. Available uint64
  102. }
  103. type Status struct {
  104. PoolName string
  105. DataFile string // actual block device for data
  106. DataLoopback string // loopback file, if used
  107. MetadataFile string // actual block device for metadata
  108. MetadataLoopback string // loopback file, if used
  109. Data DiskUsage
  110. Metadata DiskUsage
  111. SectorSize uint64
  112. UdevSyncSupported bool
  113. DeferredRemoveEnabled bool
  114. }
  115. // Structure used to export image/container metadata in docker inspect.
  116. type DeviceMetadata struct {
  117. deviceId int
  118. deviceSize uint64 // size in bytes
  119. deviceName string // Device name as used during activation
  120. }
  121. type DevStatus struct {
  122. DeviceId int
  123. Size uint64
  124. TransactionId uint64
  125. SizeInSectors uint64
  126. MappedSectors uint64
  127. HighestMappedSector uint64
  128. }
  129. func getDevName(name string) string {
  130. return "/dev/mapper/" + name
  131. }
  132. func (info *DevInfo) Name() string {
  133. hash := info.Hash
  134. if hash == "" {
  135. hash = "base"
  136. }
  137. return fmt.Sprintf("%s-%s", info.devices.devicePrefix, hash)
  138. }
  139. func (info *DevInfo) DevName() string {
  140. return getDevName(info.Name())
  141. }
  142. func (devices *DeviceSet) loopbackDir() string {
  143. return path.Join(devices.root, "devicemapper")
  144. }
  145. func (devices *DeviceSet) metadataDir() string {
  146. return path.Join(devices.root, "metadata")
  147. }
  148. func (devices *DeviceSet) metadataFile(info *DevInfo) string {
  149. file := info.Hash
  150. if file == "" {
  151. file = "base"
  152. }
  153. return path.Join(devices.metadataDir(), file)
  154. }
  155. func (devices *DeviceSet) transactionMetaFile() string {
  156. return path.Join(devices.metadataDir(), transactionMetaFile)
  157. }
  158. func (devices *DeviceSet) deviceSetMetaFile() string {
  159. return path.Join(devices.metadataDir(), deviceSetMetaFile)
  160. }
  161. func (devices *DeviceSet) oldMetadataFile() string {
  162. return path.Join(devices.loopbackDir(), "json")
  163. }
  164. func (devices *DeviceSet) getPoolName() string {
  165. if devices.thinPoolDevice == "" {
  166. return devices.devicePrefix + "-pool"
  167. }
  168. return devices.thinPoolDevice
  169. }
  170. func (devices *DeviceSet) getPoolDevName() string {
  171. return getDevName(devices.getPoolName())
  172. }
  173. func (devices *DeviceSet) hasImage(name string) bool {
  174. dirname := devices.loopbackDir()
  175. filename := path.Join(dirname, name)
  176. _, err := os.Stat(filename)
  177. return err == nil
  178. }
  179. // ensureImage creates a sparse file of <size> bytes at the path
  180. // <root>/devicemapper/<name>.
  181. // If the file already exists, it does nothing.
  182. // Either way it returns the full path.
  183. func (devices *DeviceSet) ensureImage(name string, size int64) (string, error) {
  184. dirname := devices.loopbackDir()
  185. filename := path.Join(dirname, name)
  186. if err := os.MkdirAll(dirname, 0700); err != nil && !os.IsExist(err) {
  187. return "", err
  188. }
  189. if _, err := os.Stat(filename); err != nil {
  190. if !os.IsNotExist(err) {
  191. return "", err
  192. }
  193. logrus.Debugf("Creating loopback file %s for device-manage use", filename)
  194. file, err := os.OpenFile(filename, os.O_RDWR|os.O_CREATE, 0600)
  195. if err != nil {
  196. return "", err
  197. }
  198. defer file.Close()
  199. if err := file.Truncate(size); err != nil {
  200. return "", err
  201. }
  202. }
  203. return filename, nil
  204. }
  205. func (devices *DeviceSet) allocateTransactionId() uint64 {
  206. devices.OpenTransactionId = devices.TransactionId + 1
  207. return devices.OpenTransactionId
  208. }
  209. func (devices *DeviceSet) updatePoolTransactionId() error {
  210. if err := devicemapper.SetTransactionId(devices.getPoolDevName(), devices.TransactionId, devices.OpenTransactionId); err != nil {
  211. return fmt.Errorf("Error setting devmapper transaction ID: %s", err)
  212. }
  213. devices.TransactionId = devices.OpenTransactionId
  214. return nil
  215. }
  216. func (devices *DeviceSet) removeMetadata(info *DevInfo) error {
  217. if err := os.RemoveAll(devices.metadataFile(info)); err != nil {
  218. return fmt.Errorf("Error removing metadata file %s: %s", devices.metadataFile(info), err)
  219. }
  220. return nil
  221. }
  222. // Given json data and file path, write it to disk
  223. func (devices *DeviceSet) writeMetaFile(jsonData []byte, filePath string) error {
  224. tmpFile, err := ioutil.TempFile(devices.metadataDir(), ".tmp")
  225. if err != nil {
  226. return fmt.Errorf("Error creating metadata file: %s", err)
  227. }
  228. n, err := tmpFile.Write(jsonData)
  229. if err != nil {
  230. return fmt.Errorf("Error writing metadata to %s: %s", tmpFile.Name(), err)
  231. }
  232. if n < len(jsonData) {
  233. return io.ErrShortWrite
  234. }
  235. if err := tmpFile.Sync(); err != nil {
  236. return fmt.Errorf("Error syncing metadata file %s: %s", tmpFile.Name(), err)
  237. }
  238. if err := tmpFile.Close(); err != nil {
  239. return fmt.Errorf("Error closing metadata file %s: %s", tmpFile.Name(), err)
  240. }
  241. if err := os.Rename(tmpFile.Name(), filePath); err != nil {
  242. return fmt.Errorf("Error committing metadata file %s: %s", tmpFile.Name(), err)
  243. }
  244. return nil
  245. }
  246. func (devices *DeviceSet) saveMetadata(info *DevInfo) error {
  247. jsonData, err := json.Marshal(info)
  248. if err != nil {
  249. return fmt.Errorf("Error encoding metadata to json: %s", err)
  250. }
  251. if err := devices.writeMetaFile(jsonData, devices.metadataFile(info)); err != nil {
  252. return err
  253. }
  254. return nil
  255. }
  256. func (devices *DeviceSet) markDeviceIdUsed(deviceId int) {
  257. var mask byte
  258. i := deviceId % 8
  259. mask = 1 << uint(i)
  260. devices.deviceIdMap[deviceId/8] = devices.deviceIdMap[deviceId/8] | mask
  261. }
  262. func (devices *DeviceSet) markDeviceIdFree(deviceId int) {
  263. var mask byte
  264. i := deviceId % 8
  265. mask = ^(1 << uint(i))
  266. devices.deviceIdMap[deviceId/8] = devices.deviceIdMap[deviceId/8] & mask
  267. }
  268. func (devices *DeviceSet) isDeviceIdFree(deviceId int) bool {
  269. var mask byte
  270. i := deviceId % 8
  271. mask = (1 << uint(i))
  272. if (devices.deviceIdMap[deviceId/8] & mask) != 0 {
  273. return false
  274. }
  275. return true
  276. }
  277. func (devices *DeviceSet) lookupDevice(hash string) (*DevInfo, error) {
  278. devices.devicesLock.Lock()
  279. defer devices.devicesLock.Unlock()
  280. info := devices.Devices[hash]
  281. if info == nil {
  282. info = devices.loadMetadata(hash)
  283. if info == nil {
  284. return nil, fmt.Errorf("Unknown device %s", hash)
  285. }
  286. devices.Devices[hash] = info
  287. }
  288. return info, nil
  289. }
  290. func (devices *DeviceSet) deviceFileWalkFunction(path string, finfo os.FileInfo) error {
  291. // Skip some of the meta files which are not device files.
  292. if strings.HasSuffix(finfo.Name(), ".migrated") {
  293. logrus.Debugf("Skipping file %s", path)
  294. return nil
  295. }
  296. if strings.HasPrefix(finfo.Name(), ".") {
  297. logrus.Debugf("Skipping file %s", path)
  298. return nil
  299. }
  300. if finfo.Name() == deviceSetMetaFile {
  301. logrus.Debugf("Skipping file %s", path)
  302. return nil
  303. }
  304. logrus.Debugf("Loading data for file %s", path)
  305. hash := finfo.Name()
  306. if hash == "base" {
  307. hash = ""
  308. }
  309. dinfo := devices.loadMetadata(hash)
  310. if dinfo == nil {
  311. return fmt.Errorf("Error loading device metadata file %s", hash)
  312. }
  313. if dinfo.DeviceId > MaxDeviceId {
  314. logrus.Errorf("Ignoring Invalid DeviceId=%d", dinfo.DeviceId)
  315. return nil
  316. }
  317. devices.Lock()
  318. devices.markDeviceIdUsed(dinfo.DeviceId)
  319. devices.Unlock()
  320. logrus.Debugf("Added deviceId=%d to DeviceIdMap", dinfo.DeviceId)
  321. return nil
  322. }
  323. func (devices *DeviceSet) constructDeviceIdMap() error {
  324. logrus.Debugf("[deviceset] constructDeviceIdMap()")
  325. defer logrus.Debugf("[deviceset] constructDeviceIdMap() END")
  326. var scan = func(path string, info os.FileInfo, err error) error {
  327. if err != nil {
  328. logrus.Debugf("Can't walk the file %s", path)
  329. return nil
  330. }
  331. // Skip any directories
  332. if info.IsDir() {
  333. return nil
  334. }
  335. return devices.deviceFileWalkFunction(path, info)
  336. }
  337. return filepath.Walk(devices.metadataDir(), scan)
  338. }
  339. func (devices *DeviceSet) unregisterDevice(id int, hash string) error {
  340. logrus.Debugf("unregisterDevice(%v, %v)", id, hash)
  341. info := &DevInfo{
  342. Hash: hash,
  343. DeviceId: id,
  344. }
  345. devices.devicesLock.Lock()
  346. delete(devices.Devices, hash)
  347. devices.devicesLock.Unlock()
  348. if err := devices.removeMetadata(info); err != nil {
  349. logrus.Debugf("Error removing metadata: %s", err)
  350. return err
  351. }
  352. return nil
  353. }
  354. func (devices *DeviceSet) registerDevice(id int, hash string, size uint64, transactionId uint64) (*DevInfo, error) {
  355. logrus.Debugf("registerDevice(%v, %v)", id, hash)
  356. info := &DevInfo{
  357. Hash: hash,
  358. DeviceId: id,
  359. Size: size,
  360. TransactionId: transactionId,
  361. Initialized: false,
  362. devices: devices,
  363. }
  364. devices.devicesLock.Lock()
  365. devices.Devices[hash] = info
  366. devices.devicesLock.Unlock()
  367. if err := devices.saveMetadata(info); err != nil {
  368. // Try to remove unused device
  369. devices.devicesLock.Lock()
  370. delete(devices.Devices, hash)
  371. devices.devicesLock.Unlock()
  372. return nil, err
  373. }
  374. return info, nil
  375. }
  376. func (devices *DeviceSet) activateDeviceIfNeeded(info *DevInfo) error {
  377. logrus.Debugf("activateDeviceIfNeeded(%v)", info.Hash)
  378. // Make sure deferred removal on device is canceled, if one was
  379. // scheduled.
  380. if err := devices.cancelDeferredRemoval(info); err != nil {
  381. return fmt.Errorf("Deivce Deferred Removal Cancellation Failed: %s", err)
  382. }
  383. if devinfo, _ := devicemapper.GetInfo(info.Name()); devinfo != nil && devinfo.Exists != 0 {
  384. return nil
  385. }
  386. return devicemapper.ActivateDevice(devices.getPoolDevName(), info.Name(), info.DeviceId, info.Size)
  387. }
  388. func (devices *DeviceSet) createFilesystem(info *DevInfo) error {
  389. devname := info.DevName()
  390. args := []string{}
  391. for _, arg := range devices.mkfsArgs {
  392. args = append(args, arg)
  393. }
  394. args = append(args, devname)
  395. var err error
  396. switch devices.filesystem {
  397. case "xfs":
  398. err = exec.Command("mkfs.xfs", args...).Run()
  399. case "ext4":
  400. err = exec.Command("mkfs.ext4", append([]string{"-E", "nodiscard,lazy_itable_init=0,lazy_journal_init=0"}, args...)...).Run()
  401. if err != nil {
  402. err = exec.Command("mkfs.ext4", append([]string{"-E", "nodiscard,lazy_itable_init=0"}, args...)...).Run()
  403. }
  404. if err != nil {
  405. return err
  406. }
  407. err = exec.Command("tune2fs", append([]string{"-c", "-1", "-i", "0"}, devname)...).Run()
  408. default:
  409. err = fmt.Errorf("Unsupported filesystem type %s", devices.filesystem)
  410. }
  411. if err != nil {
  412. return err
  413. }
  414. return nil
  415. }
  416. func (devices *DeviceSet) migrateOldMetaData() error {
  417. // Migrate old metadata file
  418. jsonData, err := ioutil.ReadFile(devices.oldMetadataFile())
  419. if err != nil && !os.IsNotExist(err) {
  420. return err
  421. }
  422. if jsonData != nil {
  423. m := MetaData{Devices: make(map[string]*DevInfo)}
  424. if err := json.Unmarshal(jsonData, &m); err != nil {
  425. return err
  426. }
  427. for hash, info := range m.Devices {
  428. info.Hash = hash
  429. devices.saveMetadata(info)
  430. }
  431. if err := os.Rename(devices.oldMetadataFile(), devices.oldMetadataFile()+".migrated"); err != nil {
  432. return err
  433. }
  434. }
  435. return nil
  436. }
  437. func (devices *DeviceSet) initMetaData() error {
  438. if err := devices.migrateOldMetaData(); err != nil {
  439. return err
  440. }
  441. _, transactionId, _, _, _, _, err := devices.poolStatus()
  442. if err != nil {
  443. return err
  444. }
  445. devices.TransactionId = transactionId
  446. if err := devices.constructDeviceIdMap(); err != nil {
  447. return err
  448. }
  449. if err := devices.processPendingTransaction(); err != nil {
  450. return err
  451. }
  452. return nil
  453. }
  454. func (devices *DeviceSet) incNextDeviceId() {
  455. // Ids are 24bit, so wrap around
  456. devices.NextDeviceId = (devices.NextDeviceId + 1) & MaxDeviceId
  457. }
  458. func (devices *DeviceSet) getNextFreeDeviceId() (int, error) {
  459. devices.incNextDeviceId()
  460. for i := 0; i <= MaxDeviceId; i++ {
  461. if devices.isDeviceIdFree(devices.NextDeviceId) {
  462. devices.markDeviceIdUsed(devices.NextDeviceId)
  463. return devices.NextDeviceId, nil
  464. }
  465. devices.incNextDeviceId()
  466. }
  467. return 0, fmt.Errorf("Unable to find a free device Id")
  468. }
  469. func (devices *DeviceSet) createRegisterDevice(hash string) (*DevInfo, error) {
  470. deviceId, err := devices.getNextFreeDeviceId()
  471. if err != nil {
  472. return nil, err
  473. }
  474. if err := devices.openTransaction(hash, deviceId); err != nil {
  475. logrus.Debugf("Error opening transaction hash = %s deviceId = %d", hash, deviceId)
  476. devices.markDeviceIdFree(deviceId)
  477. return nil, err
  478. }
  479. for {
  480. if err := devicemapper.CreateDevice(devices.getPoolDevName(), deviceId); err != nil {
  481. if devicemapper.DeviceIdExists(err) {
  482. // Device Id already exists. This should not
  483. // happen. Now we have a mechianism to find
  484. // a free device Id. So something is not right.
  485. // Give a warning and continue.
  486. logrus.Errorf("Device Id %d exists in pool but it is supposed to be unused", deviceId)
  487. deviceId, err = devices.getNextFreeDeviceId()
  488. if err != nil {
  489. return nil, err
  490. }
  491. // Save new device id into transaction
  492. devices.refreshTransaction(deviceId)
  493. continue
  494. }
  495. logrus.Debugf("Error creating device: %s", err)
  496. devices.markDeviceIdFree(deviceId)
  497. return nil, err
  498. }
  499. break
  500. }
  501. logrus.Debugf("Registering device (id %v) with FS size %v", deviceId, devices.baseFsSize)
  502. info, err := devices.registerDevice(deviceId, hash, devices.baseFsSize, devices.OpenTransactionId)
  503. if err != nil {
  504. _ = devicemapper.DeleteDevice(devices.getPoolDevName(), deviceId)
  505. devices.markDeviceIdFree(deviceId)
  506. return nil, err
  507. }
  508. if err := devices.closeTransaction(); err != nil {
  509. devices.unregisterDevice(deviceId, hash)
  510. devicemapper.DeleteDevice(devices.getPoolDevName(), deviceId)
  511. devices.markDeviceIdFree(deviceId)
  512. return nil, err
  513. }
  514. return info, nil
  515. }
  516. func (devices *DeviceSet) createRegisterSnapDevice(hash string, baseInfo *DevInfo) error {
  517. deviceId, err := devices.getNextFreeDeviceId()
  518. if err != nil {
  519. return err
  520. }
  521. if err := devices.openTransaction(hash, deviceId); err != nil {
  522. logrus.Debugf("Error opening transaction hash = %s deviceId = %d", hash, deviceId)
  523. devices.markDeviceIdFree(deviceId)
  524. return err
  525. }
  526. for {
  527. if err := devicemapper.CreateSnapDevice(devices.getPoolDevName(), deviceId, baseInfo.Name(), baseInfo.DeviceId); err != nil {
  528. if devicemapper.DeviceIdExists(err) {
  529. // Device Id already exists. This should not
  530. // happen. Now we have a mechianism to find
  531. // a free device Id. So something is not right.
  532. // Give a warning and continue.
  533. logrus.Errorf("Device Id %d exists in pool but it is supposed to be unused", deviceId)
  534. deviceId, err = devices.getNextFreeDeviceId()
  535. if err != nil {
  536. return err
  537. }
  538. // Save new device id into transaction
  539. devices.refreshTransaction(deviceId)
  540. continue
  541. }
  542. logrus.Debugf("Error creating snap device: %s", err)
  543. devices.markDeviceIdFree(deviceId)
  544. return err
  545. }
  546. break
  547. }
  548. if _, err := devices.registerDevice(deviceId, hash, baseInfo.Size, devices.OpenTransactionId); err != nil {
  549. devicemapper.DeleteDevice(devices.getPoolDevName(), deviceId)
  550. devices.markDeviceIdFree(deviceId)
  551. logrus.Debugf("Error registering device: %s", err)
  552. return err
  553. }
  554. if err := devices.closeTransaction(); err != nil {
  555. devices.unregisterDevice(deviceId, hash)
  556. devicemapper.DeleteDevice(devices.getPoolDevName(), deviceId)
  557. devices.markDeviceIdFree(deviceId)
  558. return err
  559. }
  560. return nil
  561. }
  562. func (devices *DeviceSet) loadMetadata(hash string) *DevInfo {
  563. info := &DevInfo{Hash: hash, devices: devices}
  564. jsonData, err := ioutil.ReadFile(devices.metadataFile(info))
  565. if err != nil {
  566. return nil
  567. }
  568. if err := json.Unmarshal(jsonData, &info); err != nil {
  569. return nil
  570. }
  571. return info
  572. }
  573. func (devices *DeviceSet) setupBaseImage() error {
  574. oldInfo, _ := devices.lookupDevice("")
  575. if oldInfo != nil && oldInfo.Initialized {
  576. return nil
  577. }
  578. if oldInfo != nil && !oldInfo.Initialized {
  579. logrus.Debugf("Removing uninitialized base image")
  580. if err := devices.DeleteDevice(""); err != nil {
  581. return err
  582. }
  583. }
  584. if devices.thinPoolDevice != "" && oldInfo == nil {
  585. _, transactionId, dataUsed, _, _, _, err := devices.poolStatus()
  586. if err != nil {
  587. return err
  588. }
  589. if dataUsed != 0 {
  590. return fmt.Errorf("Unable to take ownership of thin-pool (%s) that already has used data blocks",
  591. devices.thinPoolDevice)
  592. }
  593. if transactionId != 0 {
  594. return fmt.Errorf("Unable to take ownership of thin-pool (%s) with non-zero transaction Id",
  595. devices.thinPoolDevice)
  596. }
  597. }
  598. logrus.Debugf("Initializing base device-mapper thin volume")
  599. // Create initial device
  600. info, err := devices.createRegisterDevice("")
  601. if err != nil {
  602. return err
  603. }
  604. logrus.Debugf("Creating filesystem on base device-mapper thin volume")
  605. if err := devices.activateDeviceIfNeeded(info); err != nil {
  606. return err
  607. }
  608. if err := devices.createFilesystem(info); err != nil {
  609. return err
  610. }
  611. info.Initialized = true
  612. if err := devices.saveMetadata(info); err != nil {
  613. info.Initialized = false
  614. return err
  615. }
  616. return nil
  617. }
  618. func setCloseOnExec(name string) {
  619. if fileInfos, _ := ioutil.ReadDir("/proc/self/fd"); fileInfos != nil {
  620. for _, i := range fileInfos {
  621. link, _ := os.Readlink(filepath.Join("/proc/self/fd", i.Name()))
  622. if link == name {
  623. fd, err := strconv.Atoi(i.Name())
  624. if err == nil {
  625. syscall.CloseOnExec(fd)
  626. }
  627. }
  628. }
  629. }
  630. }
  631. func (devices *DeviceSet) DMLog(level int, file string, line int, dmError int, message string) {
  632. // By default libdm sends us all the messages including debug ones.
  633. // We need to filter out messages here and figure out which one
  634. // should be printed.
  635. if level > DMLogLevel {
  636. return
  637. }
  638. // FIXME(vbatts) push this back into ./pkg/devicemapper/
  639. if level <= devicemapper.LogLevelErr {
  640. logrus.Errorf("libdevmapper(%d): %s:%d (%d) %s", level, file, line, dmError, message)
  641. } else if level <= devicemapper.LogLevelInfo {
  642. logrus.Infof("libdevmapper(%d): %s:%d (%d) %s", level, file, line, dmError, message)
  643. } else {
  644. // FIXME(vbatts) push this back into ./pkg/devicemapper/
  645. logrus.Debugf("libdevmapper(%d): %s:%d (%d) %s", level, file, line, dmError, message)
  646. }
  647. }
  648. func major(device uint64) uint64 {
  649. return (device >> 8) & 0xfff
  650. }
  651. func minor(device uint64) uint64 {
  652. return (device & 0xff) | ((device >> 12) & 0xfff00)
  653. }
  654. func (devices *DeviceSet) ResizePool(size int64) error {
  655. dirname := devices.loopbackDir()
  656. datafilename := path.Join(dirname, "data")
  657. if len(devices.dataDevice) > 0 {
  658. datafilename = devices.dataDevice
  659. }
  660. metadatafilename := path.Join(dirname, "metadata")
  661. if len(devices.metadataDevice) > 0 {
  662. metadatafilename = devices.metadataDevice
  663. }
  664. datafile, err := os.OpenFile(datafilename, os.O_RDWR, 0)
  665. if datafile == nil {
  666. return err
  667. }
  668. defer datafile.Close()
  669. fi, err := datafile.Stat()
  670. if fi == nil {
  671. return err
  672. }
  673. if fi.Size() > size {
  674. return fmt.Errorf("Can't shrink file")
  675. }
  676. dataloopback := devicemapper.FindLoopDeviceFor(datafile)
  677. if dataloopback == nil {
  678. return fmt.Errorf("Unable to find loopback mount for: %s", datafilename)
  679. }
  680. defer dataloopback.Close()
  681. metadatafile, err := os.OpenFile(metadatafilename, os.O_RDWR, 0)
  682. if metadatafile == nil {
  683. return err
  684. }
  685. defer metadatafile.Close()
  686. metadataloopback := devicemapper.FindLoopDeviceFor(metadatafile)
  687. if metadataloopback == nil {
  688. return fmt.Errorf("Unable to find loopback mount for: %s", metadatafilename)
  689. }
  690. defer metadataloopback.Close()
  691. // Grow loopback file
  692. if err := datafile.Truncate(size); err != nil {
  693. return fmt.Errorf("Unable to grow loopback file: %s", err)
  694. }
  695. // Reload size for loopback device
  696. if err := devicemapper.LoopbackSetCapacity(dataloopback); err != nil {
  697. return fmt.Errorf("Unable to update loopback capacity: %s", err)
  698. }
  699. // Suspend the pool
  700. if err := devicemapper.SuspendDevice(devices.getPoolName()); err != nil {
  701. return fmt.Errorf("Unable to suspend pool: %s", err)
  702. }
  703. // Reload with the new block sizes
  704. if err := devicemapper.ReloadPool(devices.getPoolName(), dataloopback, metadataloopback, devices.thinpBlockSize); err != nil {
  705. return fmt.Errorf("Unable to reload pool: %s", err)
  706. }
  707. // Resume the pool
  708. if err := devicemapper.ResumeDevice(devices.getPoolName()); err != nil {
  709. return fmt.Errorf("Unable to resume pool: %s", err)
  710. }
  711. return nil
  712. }
  713. func (devices *DeviceSet) loadTransactionMetaData() error {
  714. jsonData, err := ioutil.ReadFile(devices.transactionMetaFile())
  715. if err != nil {
  716. // There is no active transaction. This will be the case
  717. // during upgrade.
  718. if os.IsNotExist(err) {
  719. devices.OpenTransactionId = devices.TransactionId
  720. return nil
  721. }
  722. return err
  723. }
  724. json.Unmarshal(jsonData, &devices.Transaction)
  725. return nil
  726. }
  727. func (devices *DeviceSet) saveTransactionMetaData() error {
  728. jsonData, err := json.Marshal(&devices.Transaction)
  729. if err != nil {
  730. return fmt.Errorf("Error encoding metadata to json: %s", err)
  731. }
  732. return devices.writeMetaFile(jsonData, devices.transactionMetaFile())
  733. }
  734. func (devices *DeviceSet) removeTransactionMetaData() error {
  735. if err := os.RemoveAll(devices.transactionMetaFile()); err != nil {
  736. return err
  737. }
  738. return nil
  739. }
  740. func (devices *DeviceSet) rollbackTransaction() error {
  741. logrus.Debugf("Rolling back open transaction: TransactionId=%d hash=%s device_id=%d", devices.OpenTransactionId, devices.DeviceIdHash, devices.DeviceId)
  742. // A device id might have already been deleted before transaction
  743. // closed. In that case this call will fail. Just leave a message
  744. // in case of failure.
  745. if err := devicemapper.DeleteDevice(devices.getPoolDevName(), devices.DeviceId); err != nil {
  746. logrus.Errorf("Unable to delete device: %s", err)
  747. }
  748. dinfo := &DevInfo{Hash: devices.DeviceIdHash}
  749. if err := devices.removeMetadata(dinfo); err != nil {
  750. logrus.Errorf("Unable to remove metadata: %s", err)
  751. } else {
  752. devices.markDeviceIdFree(devices.DeviceId)
  753. }
  754. if err := devices.removeTransactionMetaData(); err != nil {
  755. logrus.Errorf("Unable to remove transaction meta file %s: %s", devices.transactionMetaFile(), err)
  756. }
  757. return nil
  758. }
  759. func (devices *DeviceSet) processPendingTransaction() error {
  760. if err := devices.loadTransactionMetaData(); err != nil {
  761. return err
  762. }
  763. // If there was open transaction but pool transaction Id is same
  764. // as open transaction Id, nothing to roll back.
  765. if devices.TransactionId == devices.OpenTransactionId {
  766. return nil
  767. }
  768. // If open transaction Id is less than pool transaction Id, something
  769. // is wrong. Bail out.
  770. if devices.OpenTransactionId < devices.TransactionId {
  771. logrus.Errorf("Open Transaction id %d is less than pool transaction id %d", devices.OpenTransactionId, devices.TransactionId)
  772. return nil
  773. }
  774. // Pool transaction Id is not same as open transaction. There is
  775. // a transaction which was not completed.
  776. if err := devices.rollbackTransaction(); err != nil {
  777. return fmt.Errorf("Rolling back open transaction failed: %s", err)
  778. }
  779. devices.OpenTransactionId = devices.TransactionId
  780. return nil
  781. }
  782. func (devices *DeviceSet) loadDeviceSetMetaData() error {
  783. jsonData, err := ioutil.ReadFile(devices.deviceSetMetaFile())
  784. if err != nil {
  785. // For backward compatibility return success if file does
  786. // not exist.
  787. if os.IsNotExist(err) {
  788. return nil
  789. }
  790. return err
  791. }
  792. return json.Unmarshal(jsonData, devices)
  793. }
  794. func (devices *DeviceSet) saveDeviceSetMetaData() error {
  795. jsonData, err := json.Marshal(devices)
  796. if err != nil {
  797. return fmt.Errorf("Error encoding metadata to json: %s", err)
  798. }
  799. return devices.writeMetaFile(jsonData, devices.deviceSetMetaFile())
  800. }
  801. func (devices *DeviceSet) openTransaction(hash string, DeviceId int) error {
  802. devices.allocateTransactionId()
  803. devices.DeviceIdHash = hash
  804. devices.DeviceId = DeviceId
  805. if err := devices.saveTransactionMetaData(); err != nil {
  806. return fmt.Errorf("Error saving transaction metadata: %s", err)
  807. }
  808. return nil
  809. }
  810. func (devices *DeviceSet) refreshTransaction(DeviceId int) error {
  811. devices.DeviceId = DeviceId
  812. if err := devices.saveTransactionMetaData(); err != nil {
  813. return fmt.Errorf("Error saving transaction metadata: %s", err)
  814. }
  815. return nil
  816. }
  817. func (devices *DeviceSet) closeTransaction() error {
  818. if err := devices.updatePoolTransactionId(); err != nil {
  819. logrus.Debugf("Failed to close Transaction")
  820. return err
  821. }
  822. return nil
  823. }
  824. func determineDriverCapabilities(version string) error {
  825. /*
  826. * Driver version 4.27.0 and greater support deferred activation
  827. * feature.
  828. */
  829. logrus.Debugf("devicemapper: driver version is %s", version)
  830. versionSplit := strings.Split(version, ".")
  831. major, err := strconv.Atoi(versionSplit[0])
  832. if err != nil {
  833. return graphdriver.ErrNotSupported
  834. }
  835. if major > 4 {
  836. DriverDeferredRemovalSupport = true
  837. return nil
  838. }
  839. if major < 4 {
  840. return nil
  841. }
  842. minor, err := strconv.Atoi(versionSplit[1])
  843. if err != nil {
  844. return graphdriver.ErrNotSupported
  845. }
  846. /*
  847. * If major is 4 and minor is 27, then there is no need to
  848. * check for patch level as it can not be less than 0.
  849. */
  850. if minor >= 27 {
  851. DriverDeferredRemovalSupport = true
  852. return nil
  853. }
  854. return nil
  855. }
  856. func (devices *DeviceSet) initDevmapper(doInit bool) error {
  857. // give ourselves to libdm as a log handler
  858. devicemapper.LogInit(devices)
  859. version, err := devicemapper.GetDriverVersion()
  860. if err != nil {
  861. // Can't even get driver version, assume not supported
  862. return graphdriver.ErrNotSupported
  863. }
  864. if err := determineDriverCapabilities(version); err != nil {
  865. return graphdriver.ErrNotSupported
  866. }
  867. // If user asked for deferred removal and both library and driver
  868. // supports deferred removal use it.
  869. if EnableDeferredRemoval && DriverDeferredRemovalSupport && devicemapper.LibraryDeferredRemovalSupport == true {
  870. logrus.Debugf("devmapper: Deferred removal support enabled.")
  871. devices.deferredRemove = true
  872. }
  873. // https://github.com/docker/docker/issues/4036
  874. if supported := devicemapper.UdevSetSyncSupport(true); !supported {
  875. logrus.Errorf("Udev sync is not supported. This will lead to unexpected behavior, data loss and errors. For more information, see https://docs.docker.com/reference/commandline/cli/#daemon-storage-driver-option")
  876. if !devices.overrideUdevSyncCheck {
  877. return graphdriver.ErrNotSupported
  878. }
  879. }
  880. if err := os.MkdirAll(devices.metadataDir(), 0700); err != nil && !os.IsExist(err) {
  881. return err
  882. }
  883. // Set the device prefix from the device id and inode of the docker root dir
  884. st, err := os.Stat(devices.root)
  885. if err != nil {
  886. return fmt.Errorf("Error looking up dir %s: %s", devices.root, err)
  887. }
  888. sysSt := st.Sys().(*syscall.Stat_t)
  889. // "reg-" stands for "regular file".
  890. // In the future we might use "dev-" for "device file", etc.
  891. // docker-maj,min[-inode] stands for:
  892. // - Managed by docker
  893. // - The target of this device is at major <maj> and minor <min>
  894. // - If <inode> is defined, use that file inside the device as a loopback image. Otherwise use the device itself.
  895. devices.devicePrefix = fmt.Sprintf("docker-%d:%d-%d", major(sysSt.Dev), minor(sysSt.Dev), sysSt.Ino)
  896. logrus.Debugf("Generated prefix: %s", devices.devicePrefix)
  897. // Check for the existence of the thin-pool device
  898. logrus.Debugf("Checking for existence of the pool '%s'", devices.getPoolName())
  899. info, err := devicemapper.GetInfo(devices.getPoolName())
  900. if info == nil {
  901. logrus.Debugf("Error device devicemapper.GetInfo: %s", err)
  902. return err
  903. }
  904. // It seems libdevmapper opens this without O_CLOEXEC, and go exec will not close files
  905. // that are not Close-on-exec, and lxc-start will die if it inherits any unexpected files,
  906. // so we add this badhack to make sure it closes itself
  907. setCloseOnExec("/dev/mapper/control")
  908. // Make sure the sparse images exist in <root>/devicemapper/data and
  909. // <root>/devicemapper/metadata
  910. createdLoopback := false
  911. // If the pool doesn't exist, create it
  912. if info.Exists == 0 && devices.thinPoolDevice == "" {
  913. logrus.Debugf("Pool doesn't exist. Creating it.")
  914. var (
  915. dataFile *os.File
  916. metadataFile *os.File
  917. )
  918. if devices.dataDevice == "" {
  919. // Make sure the sparse images exist in <root>/devicemapper/data
  920. hasData := devices.hasImage("data")
  921. if !doInit && !hasData {
  922. return errors.New("Loopback data file not found")
  923. }
  924. if !hasData {
  925. createdLoopback = true
  926. }
  927. data, err := devices.ensureImage("data", devices.dataLoopbackSize)
  928. if err != nil {
  929. logrus.Debugf("Error device ensureImage (data): %s", err)
  930. return err
  931. }
  932. dataFile, err = devicemapper.AttachLoopDevice(data)
  933. if err != nil {
  934. return err
  935. }
  936. devices.dataLoopFile = data
  937. devices.dataDevice = dataFile.Name()
  938. } else {
  939. dataFile, err = os.OpenFile(devices.dataDevice, os.O_RDWR, 0600)
  940. if err != nil {
  941. return err
  942. }
  943. }
  944. defer dataFile.Close()
  945. if devices.metadataDevice == "" {
  946. // Make sure the sparse images exist in <root>/devicemapper/metadata
  947. hasMetadata := devices.hasImage("metadata")
  948. if !doInit && !hasMetadata {
  949. return errors.New("Loopback metadata file not found")
  950. }
  951. if !hasMetadata {
  952. createdLoopback = true
  953. }
  954. metadata, err := devices.ensureImage("metadata", devices.metaDataLoopbackSize)
  955. if err != nil {
  956. logrus.Debugf("Error device ensureImage (metadata): %s", err)
  957. return err
  958. }
  959. metadataFile, err = devicemapper.AttachLoopDevice(metadata)
  960. if err != nil {
  961. return err
  962. }
  963. devices.metadataLoopFile = metadata
  964. devices.metadataDevice = metadataFile.Name()
  965. } else {
  966. metadataFile, err = os.OpenFile(devices.metadataDevice, os.O_RDWR, 0600)
  967. if err != nil {
  968. return err
  969. }
  970. }
  971. defer metadataFile.Close()
  972. if err := devicemapper.CreatePool(devices.getPoolName(), dataFile, metadataFile, devices.thinpBlockSize); err != nil {
  973. return err
  974. }
  975. }
  976. // If we didn't just create the data or metadata image, we need to
  977. // load the transaction id and migrate old metadata
  978. if !createdLoopback {
  979. if err := devices.initMetaData(); err != nil {
  980. return err
  981. }
  982. }
  983. // Right now this loads only NextDeviceId. If there is more metadata
  984. // down the line, we might have to move it earlier.
  985. if err := devices.loadDeviceSetMetaData(); err != nil {
  986. return err
  987. }
  988. // Setup the base image
  989. if doInit {
  990. if err := devices.setupBaseImage(); err != nil {
  991. logrus.Debugf("Error device setupBaseImage: %s", err)
  992. return err
  993. }
  994. }
  995. return nil
  996. }
  997. func (devices *DeviceSet) AddDevice(hash, baseHash string) error {
  998. logrus.Debugf("[deviceset] AddDevice(hash=%s basehash=%s)", hash, baseHash)
  999. defer logrus.Debugf("[deviceset] AddDevice(hash=%s basehash=%s) END", hash, baseHash)
  1000. baseInfo, err := devices.lookupDevice(baseHash)
  1001. if err != nil {
  1002. return err
  1003. }
  1004. baseInfo.lock.Lock()
  1005. defer baseInfo.lock.Unlock()
  1006. devices.Lock()
  1007. defer devices.Unlock()
  1008. if info, _ := devices.lookupDevice(hash); info != nil {
  1009. return fmt.Errorf("device %s already exists", hash)
  1010. }
  1011. if err := devices.createRegisterSnapDevice(hash, baseInfo); err != nil {
  1012. return err
  1013. }
  1014. return nil
  1015. }
  1016. func (devices *DeviceSet) deleteDevice(info *DevInfo) error {
  1017. if devices.doBlkDiscard {
  1018. // This is a workaround for the kernel not discarding block so
  1019. // on the thin pool when we remove a thinp device, so we do it
  1020. // manually
  1021. if err := devices.activateDeviceIfNeeded(info); err == nil {
  1022. if err := devicemapper.BlockDeviceDiscard(info.DevName()); err != nil {
  1023. logrus.Debugf("Error discarding block on device: %s (ignoring)", err)
  1024. }
  1025. }
  1026. }
  1027. devinfo, _ := devicemapper.GetInfo(info.Name())
  1028. if devinfo != nil && devinfo.Exists != 0 {
  1029. if err := devices.removeDevice(info.Name()); err != nil {
  1030. logrus.Debugf("Error removing device: %s", err)
  1031. return err
  1032. }
  1033. }
  1034. if err := devices.openTransaction(info.Hash, info.DeviceId); err != nil {
  1035. logrus.Debugf("Error opening transaction hash = %s deviceId = %d", "", info.DeviceId)
  1036. return err
  1037. }
  1038. if err := devicemapper.DeleteDevice(devices.getPoolDevName(), info.DeviceId); err != nil {
  1039. logrus.Debugf("Error deleting device: %s", err)
  1040. return err
  1041. }
  1042. if err := devices.unregisterDevice(info.DeviceId, info.Hash); err != nil {
  1043. return err
  1044. }
  1045. if err := devices.closeTransaction(); err != nil {
  1046. return err
  1047. }
  1048. devices.markDeviceIdFree(info.DeviceId)
  1049. return nil
  1050. }
  1051. func (devices *DeviceSet) DeleteDevice(hash string) error {
  1052. info, err := devices.lookupDevice(hash)
  1053. if err != nil {
  1054. return err
  1055. }
  1056. info.lock.Lock()
  1057. defer info.lock.Unlock()
  1058. devices.Lock()
  1059. defer devices.Unlock()
  1060. return devices.deleteDevice(info)
  1061. }
  1062. func (devices *DeviceSet) deactivatePool() error {
  1063. logrus.Debugf("[devmapper] deactivatePool()")
  1064. defer logrus.Debugf("[devmapper] deactivatePool END")
  1065. devname := devices.getPoolDevName()
  1066. devinfo, err := devicemapper.GetInfo(devname)
  1067. if err != nil {
  1068. return err
  1069. }
  1070. if d, err := devicemapper.GetDeps(devname); err == nil {
  1071. // Access to more Debug output
  1072. logrus.Debugf("[devmapper] devicemapper.GetDeps() %s: %#v", devname, d)
  1073. }
  1074. if devinfo.Exists != 0 {
  1075. return devicemapper.RemoveDevice(devname)
  1076. }
  1077. return nil
  1078. }
  1079. func (devices *DeviceSet) deactivateDevice(info *DevInfo) error {
  1080. logrus.Debugf("[devmapper] deactivateDevice(%s)", info.Hash)
  1081. defer logrus.Debugf("[devmapper] deactivateDevice END(%s)", info.Hash)
  1082. devinfo, err := devicemapper.GetInfo(info.Name())
  1083. if err != nil {
  1084. return err
  1085. }
  1086. if devinfo.Exists == 0 {
  1087. return nil
  1088. }
  1089. if devices.deferredRemove {
  1090. if err := devicemapper.RemoveDeviceDeferred(info.Name()); err != nil {
  1091. return err
  1092. }
  1093. } else {
  1094. if err := devices.removeDevice(info.Name()); err != nil {
  1095. return err
  1096. }
  1097. }
  1098. return nil
  1099. }
  1100. // Issues the underlying dm remove operation.
  1101. func (devices *DeviceSet) removeDevice(devname string) error {
  1102. var err error
  1103. logrus.Debugf("[devmapper] removeDevice START(%s)", devname)
  1104. defer logrus.Debugf("[devmapper] removeDevice END(%s)", devname)
  1105. for i := 0; i < 200; i++ {
  1106. err = devicemapper.RemoveDevice(devname)
  1107. if err == nil {
  1108. break
  1109. }
  1110. if err != devicemapper.ErrBusy {
  1111. return err
  1112. }
  1113. // If we see EBUSY it may be a transient error,
  1114. // sleep a bit a retry a few times.
  1115. devices.Unlock()
  1116. time.Sleep(100 * time.Millisecond)
  1117. devices.Lock()
  1118. }
  1119. return err
  1120. }
  1121. func (devices *DeviceSet) cancelDeferredRemoval(info *DevInfo) error {
  1122. if !devices.deferredRemove {
  1123. return nil
  1124. }
  1125. logrus.Debugf("[devmapper] cancelDeferredRemoval START(%s)", info.Name())
  1126. defer logrus.Debugf("[devmapper] cancelDeferredRemoval END(%s)", info.Name)
  1127. devinfo, err := devicemapper.GetInfoWithDeferred(info.Name())
  1128. if devinfo != nil && devinfo.DeferredRemove == 0 {
  1129. return nil
  1130. }
  1131. // Cancel deferred remove
  1132. for i := 0; i < 100; i++ {
  1133. err = devicemapper.CancelDeferredRemove(info.Name())
  1134. if err == nil {
  1135. break
  1136. }
  1137. if err == devicemapper.ErrEnxio {
  1138. // Device is probably already gone. Return success.
  1139. return nil
  1140. }
  1141. if err != devicemapper.ErrBusy {
  1142. return err
  1143. }
  1144. // If we see EBUSY it may be a transient error,
  1145. // sleep a bit a retry a few times.
  1146. devices.Unlock()
  1147. time.Sleep(100 * time.Millisecond)
  1148. devices.Lock()
  1149. }
  1150. return err
  1151. }
  1152. func (devices *DeviceSet) Shutdown() error {
  1153. logrus.Debugf("[deviceset %s] Shutdown()", devices.devicePrefix)
  1154. logrus.Debugf("[devmapper] Shutting down DeviceSet: %s", devices.root)
  1155. defer logrus.Debugf("[deviceset %s] Shutdown() END", devices.devicePrefix)
  1156. var devs []*DevInfo
  1157. devices.devicesLock.Lock()
  1158. for _, info := range devices.Devices {
  1159. devs = append(devs, info)
  1160. }
  1161. devices.devicesLock.Unlock()
  1162. for _, info := range devs {
  1163. info.lock.Lock()
  1164. if info.mountCount > 0 {
  1165. // We use MNT_DETACH here in case it is still busy in some running
  1166. // container. This means it'll go away from the global scope directly,
  1167. // and the device will be released when that container dies.
  1168. if err := syscall.Unmount(info.mountPath, syscall.MNT_DETACH); err != nil {
  1169. logrus.Debugf("Shutdown unmounting %s, error: %s", info.mountPath, err)
  1170. }
  1171. devices.Lock()
  1172. if err := devices.deactivateDevice(info); err != nil {
  1173. logrus.Debugf("Shutdown deactivate %s , error: %s", info.Hash, err)
  1174. }
  1175. devices.Unlock()
  1176. }
  1177. info.lock.Unlock()
  1178. }
  1179. info, _ := devices.lookupDevice("")
  1180. if info != nil {
  1181. info.lock.Lock()
  1182. devices.Lock()
  1183. if err := devices.deactivateDevice(info); err != nil {
  1184. logrus.Debugf("Shutdown deactivate base , error: %s", err)
  1185. }
  1186. devices.Unlock()
  1187. info.lock.Unlock()
  1188. }
  1189. devices.Lock()
  1190. if devices.thinPoolDevice == "" {
  1191. if err := devices.deactivatePool(); err != nil {
  1192. logrus.Debugf("Shutdown deactivate pool , error: %s", err)
  1193. }
  1194. }
  1195. devices.saveDeviceSetMetaData()
  1196. devices.Unlock()
  1197. return nil
  1198. }
  1199. func (devices *DeviceSet) MountDevice(hash, path, mountLabel string) error {
  1200. info, err := devices.lookupDevice(hash)
  1201. if err != nil {
  1202. return err
  1203. }
  1204. info.lock.Lock()
  1205. defer info.lock.Unlock()
  1206. devices.Lock()
  1207. defer devices.Unlock()
  1208. if info.mountCount > 0 {
  1209. if path != info.mountPath {
  1210. return fmt.Errorf("Trying to mount devmapper device in multiple places (%s, %s)", info.mountPath, path)
  1211. }
  1212. info.mountCount++
  1213. return nil
  1214. }
  1215. if err := devices.activateDeviceIfNeeded(info); err != nil {
  1216. return fmt.Errorf("Error activating devmapper device for '%s': %s", hash, err)
  1217. }
  1218. var flags uintptr = syscall.MS_MGC_VAL
  1219. fstype, err := ProbeFsType(info.DevName())
  1220. if err != nil {
  1221. return err
  1222. }
  1223. options := ""
  1224. if fstype == "xfs" {
  1225. // XFS needs nouuid or it can't mount filesystems with the same fs
  1226. options = joinMountOptions(options, "nouuid")
  1227. }
  1228. options = joinMountOptions(options, devices.mountOptions)
  1229. options = joinMountOptions(options, label.FormatMountLabel("", mountLabel))
  1230. if err := syscall.Mount(info.DevName(), path, fstype, flags, options); err != nil {
  1231. return fmt.Errorf("Error mounting '%s' on '%s': %s", info.DevName(), path, err)
  1232. }
  1233. info.mountCount = 1
  1234. info.mountPath = path
  1235. return nil
  1236. }
  1237. func (devices *DeviceSet) UnmountDevice(hash string) error {
  1238. logrus.Debugf("[devmapper] UnmountDevice(hash=%s)", hash)
  1239. defer logrus.Debugf("[devmapper] UnmountDevice(hash=%s) END", hash)
  1240. info, err := devices.lookupDevice(hash)
  1241. if err != nil {
  1242. return err
  1243. }
  1244. info.lock.Lock()
  1245. defer info.lock.Unlock()
  1246. devices.Lock()
  1247. defer devices.Unlock()
  1248. if info.mountCount == 0 {
  1249. return fmt.Errorf("UnmountDevice: device not-mounted id %s", hash)
  1250. }
  1251. info.mountCount--
  1252. if info.mountCount > 0 {
  1253. return nil
  1254. }
  1255. logrus.Debugf("[devmapper] Unmount(%s)", info.mountPath)
  1256. if err := syscall.Unmount(info.mountPath, syscall.MNT_DETACH); err != nil {
  1257. return err
  1258. }
  1259. logrus.Debugf("[devmapper] Unmount done")
  1260. if err := devices.deactivateDevice(info); err != nil {
  1261. return err
  1262. }
  1263. info.mountPath = ""
  1264. return nil
  1265. }
  1266. func (devices *DeviceSet) HasDevice(hash string) bool {
  1267. devices.Lock()
  1268. defer devices.Unlock()
  1269. info, _ := devices.lookupDevice(hash)
  1270. return info != nil
  1271. }
  1272. func (devices *DeviceSet) HasActivatedDevice(hash string) bool {
  1273. info, _ := devices.lookupDevice(hash)
  1274. if info == nil {
  1275. return false
  1276. }
  1277. info.lock.Lock()
  1278. defer info.lock.Unlock()
  1279. devices.Lock()
  1280. defer devices.Unlock()
  1281. devinfo, _ := devicemapper.GetInfo(info.Name())
  1282. return devinfo != nil && devinfo.Exists != 0
  1283. }
  1284. func (devices *DeviceSet) List() []string {
  1285. devices.Lock()
  1286. defer devices.Unlock()
  1287. devices.devicesLock.Lock()
  1288. ids := make([]string, len(devices.Devices))
  1289. i := 0
  1290. for k := range devices.Devices {
  1291. ids[i] = k
  1292. i++
  1293. }
  1294. devices.devicesLock.Unlock()
  1295. return ids
  1296. }
  1297. func (devices *DeviceSet) deviceStatus(devName string) (sizeInSectors, mappedSectors, highestMappedSector uint64, err error) {
  1298. var params string
  1299. _, sizeInSectors, _, params, err = devicemapper.GetStatus(devName)
  1300. if err != nil {
  1301. return
  1302. }
  1303. if _, err = fmt.Sscanf(params, "%d %d", &mappedSectors, &highestMappedSector); err == nil {
  1304. return
  1305. }
  1306. return
  1307. }
  1308. func (devices *DeviceSet) GetDeviceStatus(hash string) (*DevStatus, error) {
  1309. info, err := devices.lookupDevice(hash)
  1310. if err != nil {
  1311. return nil, err
  1312. }
  1313. info.lock.Lock()
  1314. defer info.lock.Unlock()
  1315. devices.Lock()
  1316. defer devices.Unlock()
  1317. status := &DevStatus{
  1318. DeviceId: info.DeviceId,
  1319. Size: info.Size,
  1320. TransactionId: info.TransactionId,
  1321. }
  1322. if err := devices.activateDeviceIfNeeded(info); err != nil {
  1323. return nil, fmt.Errorf("Error activating devmapper device for '%s': %s", hash, err)
  1324. }
  1325. sizeInSectors, mappedSectors, highestMappedSector, err := devices.deviceStatus(info.DevName())
  1326. if err != nil {
  1327. return nil, err
  1328. }
  1329. status.SizeInSectors = sizeInSectors
  1330. status.MappedSectors = mappedSectors
  1331. status.HighestMappedSector = highestMappedSector
  1332. return status, nil
  1333. }
  1334. func (devices *DeviceSet) poolStatus() (totalSizeInSectors, transactionId, dataUsed, dataTotal, metadataUsed, metadataTotal uint64, err error) {
  1335. var params string
  1336. if _, totalSizeInSectors, _, params, err = devicemapper.GetStatus(devices.getPoolName()); err == nil {
  1337. _, err = fmt.Sscanf(params, "%d %d/%d %d/%d", &transactionId, &metadataUsed, &metadataTotal, &dataUsed, &dataTotal)
  1338. }
  1339. return
  1340. }
  1341. // DataDevicePath returns the path to the data storage for this deviceset,
  1342. // regardless of loopback or block device
  1343. func (devices *DeviceSet) DataDevicePath() string {
  1344. return devices.dataDevice
  1345. }
  1346. // MetadataDevicePath returns the path to the metadata storage for this deviceset,
  1347. // regardless of loopback or block device
  1348. func (devices *DeviceSet) MetadataDevicePath() string {
  1349. return devices.metadataDevice
  1350. }
  1351. func (devices *DeviceSet) getUnderlyingAvailableSpace(loopFile string) (uint64, error) {
  1352. buf := new(syscall.Statfs_t)
  1353. if err := syscall.Statfs(loopFile, buf); err != nil {
  1354. logrus.Warnf("Couldn't stat loopfile filesystem %v: %v", loopFile, err)
  1355. return 0, err
  1356. }
  1357. return buf.Bfree * uint64(buf.Bsize), nil
  1358. }
  1359. func (devices *DeviceSet) isRealFile(loopFile string) (bool, error) {
  1360. if loopFile != "" {
  1361. fi, err := os.Stat(loopFile)
  1362. if err != nil {
  1363. logrus.Warnf("Couldn't stat loopfile %v: %v", loopFile, err)
  1364. return false, err
  1365. }
  1366. return fi.Mode().IsRegular(), nil
  1367. }
  1368. return false, nil
  1369. }
  1370. // Status returns the current status of this deviceset
  1371. func (devices *DeviceSet) Status() *Status {
  1372. devices.Lock()
  1373. defer devices.Unlock()
  1374. status := &Status{}
  1375. status.PoolName = devices.getPoolName()
  1376. status.DataFile = devices.DataDevicePath()
  1377. status.DataLoopback = devices.dataLoopFile
  1378. status.MetadataFile = devices.MetadataDevicePath()
  1379. status.MetadataLoopback = devices.metadataLoopFile
  1380. status.UdevSyncSupported = devicemapper.UdevSyncSupported()
  1381. status.DeferredRemoveEnabled = devices.deferredRemove
  1382. totalSizeInSectors, _, dataUsed, dataTotal, metadataUsed, metadataTotal, err := devices.poolStatus()
  1383. if err == nil {
  1384. // Convert from blocks to bytes
  1385. blockSizeInSectors := totalSizeInSectors / dataTotal
  1386. status.Data.Used = dataUsed * blockSizeInSectors * 512
  1387. status.Data.Total = dataTotal * blockSizeInSectors * 512
  1388. status.Data.Available = status.Data.Total - status.Data.Used
  1389. // metadata blocks are always 4k
  1390. status.Metadata.Used = metadataUsed * 4096
  1391. status.Metadata.Total = metadataTotal * 4096
  1392. status.Metadata.Available = status.Metadata.Total - status.Metadata.Used
  1393. status.SectorSize = blockSizeInSectors * 512
  1394. if check, _ := devices.isRealFile(devices.dataLoopFile); check {
  1395. actualSpace, err := devices.getUnderlyingAvailableSpace(devices.dataLoopFile)
  1396. if err == nil && actualSpace < status.Data.Available {
  1397. status.Data.Available = actualSpace
  1398. }
  1399. }
  1400. if check, _ := devices.isRealFile(devices.metadataLoopFile); check {
  1401. actualSpace, err := devices.getUnderlyingAvailableSpace(devices.metadataLoopFile)
  1402. if err == nil && actualSpace < status.Metadata.Available {
  1403. status.Metadata.Available = actualSpace
  1404. }
  1405. }
  1406. }
  1407. return status
  1408. }
  1409. // Status returns the current status of this deviceset
  1410. func (devices *DeviceSet) ExportDeviceMetadata(hash string) (*DeviceMetadata, error) {
  1411. info, err := devices.lookupDevice(hash)
  1412. if err != nil {
  1413. return nil, err
  1414. }
  1415. info.lock.Lock()
  1416. defer info.lock.Unlock()
  1417. metadata := &DeviceMetadata{info.DeviceId, info.Size, info.Name()}
  1418. return metadata, nil
  1419. }
  1420. func NewDeviceSet(root string, doInit bool, options []string) (*DeviceSet, error) {
  1421. devicemapper.SetDevDir("/dev")
  1422. devices := &DeviceSet{
  1423. root: root,
  1424. MetaData: MetaData{Devices: make(map[string]*DevInfo)},
  1425. dataLoopbackSize: DefaultDataLoopbackSize,
  1426. metaDataLoopbackSize: DefaultMetaDataLoopbackSize,
  1427. baseFsSize: DefaultBaseFsSize,
  1428. overrideUdevSyncCheck: DefaultUdevSyncOverride,
  1429. filesystem: "ext4",
  1430. doBlkDiscard: true,
  1431. thinpBlockSize: DefaultThinpBlockSize,
  1432. deviceIdMap: make([]byte, DeviceIdMapSz),
  1433. }
  1434. foundBlkDiscard := false
  1435. for _, option := range options {
  1436. key, val, err := parsers.ParseKeyValueOpt(option)
  1437. if err != nil {
  1438. return nil, err
  1439. }
  1440. key = strings.ToLower(key)
  1441. switch key {
  1442. case "dm.basesize":
  1443. size, err := units.RAMInBytes(val)
  1444. if err != nil {
  1445. return nil, err
  1446. }
  1447. devices.baseFsSize = uint64(size)
  1448. case "dm.loopdatasize":
  1449. size, err := units.RAMInBytes(val)
  1450. if err != nil {
  1451. return nil, err
  1452. }
  1453. devices.dataLoopbackSize = size
  1454. case "dm.loopmetadatasize":
  1455. size, err := units.RAMInBytes(val)
  1456. if err != nil {
  1457. return nil, err
  1458. }
  1459. devices.metaDataLoopbackSize = size
  1460. case "dm.fs":
  1461. if val != "ext4" && val != "xfs" {
  1462. return nil, fmt.Errorf("Unsupported filesystem %s\n", val)
  1463. }
  1464. devices.filesystem = val
  1465. case "dm.mkfsarg":
  1466. devices.mkfsArgs = append(devices.mkfsArgs, val)
  1467. case "dm.mountopt":
  1468. devices.mountOptions = joinMountOptions(devices.mountOptions, val)
  1469. case "dm.metadatadev":
  1470. devices.metadataDevice = val
  1471. case "dm.datadev":
  1472. devices.dataDevice = val
  1473. case "dm.thinpooldev":
  1474. devices.thinPoolDevice = strings.TrimPrefix(val, "/dev/mapper/")
  1475. case "dm.blkdiscard":
  1476. foundBlkDiscard = true
  1477. devices.doBlkDiscard, err = strconv.ParseBool(val)
  1478. if err != nil {
  1479. return nil, err
  1480. }
  1481. case "dm.blocksize":
  1482. size, err := units.RAMInBytes(val)
  1483. if err != nil {
  1484. return nil, err
  1485. }
  1486. // convert to 512b sectors
  1487. devices.thinpBlockSize = uint32(size) >> 9
  1488. case "dm.override_udev_sync_check":
  1489. devices.overrideUdevSyncCheck, err = strconv.ParseBool(val)
  1490. if err != nil {
  1491. return nil, err
  1492. }
  1493. case "dm.use_deferred_removal":
  1494. EnableDeferredRemoval, err = strconv.ParseBool(val)
  1495. if err != nil {
  1496. return nil, err
  1497. }
  1498. default:
  1499. return nil, fmt.Errorf("Unknown option %s\n", key)
  1500. }
  1501. }
  1502. // By default, don't do blk discard hack on raw devices, its rarely useful and is expensive
  1503. if !foundBlkDiscard && (devices.dataDevice != "" || devices.thinPoolDevice != "") {
  1504. devices.doBlkDiscard = false
  1505. }
  1506. if err := devices.initDevmapper(doInit); err != nil {
  1507. return nil, err
  1508. }
  1509. return devices, nil
  1510. }