deviceset.go 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260
  1. // +build linux
  2. package devmapper
  3. import (
  4. "encoding/json"
  5. "errors"
  6. "fmt"
  7. "io"
  8. "io/ioutil"
  9. "os"
  10. "os/exec"
  11. "path"
  12. "path/filepath"
  13. "strconv"
  14. "strings"
  15. "sync"
  16. "syscall"
  17. "time"
  18. log "github.com/Sirupsen/logrus"
  19. "github.com/docker/docker/daemon/graphdriver"
  20. "github.com/docker/docker/pkg/devicemapper"
  21. "github.com/docker/docker/pkg/parsers"
  22. "github.com/docker/docker/pkg/units"
  23. "github.com/docker/libcontainer/label"
  24. )
  25. var (
  26. DefaultDataLoopbackSize int64 = 100 * 1024 * 1024 * 1024
  27. DefaultMetaDataLoopbackSize int64 = 2 * 1024 * 1024 * 1024
  28. DefaultBaseFsSize uint64 = 10 * 1024 * 1024 * 1024
  29. DefaultThinpBlockSize uint32 = 128 // 64K = 128 512b sectors
  30. )
  31. type DevInfo struct {
  32. Hash string `json:"-"`
  33. DeviceId int `json:"device_id"`
  34. Size uint64 `json:"size"`
  35. TransactionId uint64 `json:"transaction_id"`
  36. Initialized bool `json:"initialized"`
  37. devices *DeviceSet `json:"-"`
  38. mountCount int `json:"-"`
  39. mountPath string `json:"-"`
  40. // The global DeviceSet lock guarantees that we serialize all
  41. // the calls to libdevmapper (which is not threadsafe), but we
  42. // sometimes release that lock while sleeping. In that case
  43. // this per-device lock is still held, protecting against
  44. // other accesses to the device that we're doing the wait on.
  45. //
  46. // WARNING: In order to avoid AB-BA deadlocks when releasing
  47. // the global lock while holding the per-device locks all
  48. // device locks must be aquired *before* the device lock, and
  49. // multiple device locks should be aquired parent before child.
  50. lock sync.Mutex `json:"-"`
  51. }
  52. type MetaData struct {
  53. Devices map[string]*DevInfo `json:"Devices"`
  54. devicesLock sync.Mutex `json:"-"` // Protects all read/writes to Devices map
  55. }
  56. type DeviceSet struct {
  57. MetaData
  58. sync.Mutex // Protects Devices map and serializes calls into libdevmapper
  59. root string
  60. devicePrefix string
  61. TransactionId uint64
  62. NewTransactionId uint64
  63. nextDeviceId int
  64. // Options
  65. dataLoopbackSize int64
  66. metaDataLoopbackSize int64
  67. baseFsSize uint64
  68. filesystem string
  69. mountOptions string
  70. mkfsArgs []string
  71. dataDevice string
  72. metadataDevice string
  73. doBlkDiscard bool
  74. thinpBlockSize uint32
  75. }
  76. type DiskUsage struct {
  77. Used uint64
  78. Total uint64
  79. }
  80. type Status struct {
  81. PoolName string
  82. DataLoopback string
  83. MetadataLoopback string
  84. Data DiskUsage
  85. Metadata DiskUsage
  86. SectorSize uint64
  87. }
  88. type DevStatus struct {
  89. DeviceId int
  90. Size uint64
  91. TransactionId uint64
  92. SizeInSectors uint64
  93. MappedSectors uint64
  94. HighestMappedSector uint64
  95. }
  96. func getDevName(name string) string {
  97. return "/dev/mapper/" + name
  98. }
  99. func (info *DevInfo) Name() string {
  100. hash := info.Hash
  101. if hash == "" {
  102. hash = "base"
  103. }
  104. return fmt.Sprintf("%s-%s", info.devices.devicePrefix, hash)
  105. }
  106. func (info *DevInfo) DevName() string {
  107. return getDevName(info.Name())
  108. }
  109. func (devices *DeviceSet) loopbackDir() string {
  110. return path.Join(devices.root, "devicemapper")
  111. }
  112. func (devices *DeviceSet) metadataDir() string {
  113. return path.Join(devices.root, "metadata")
  114. }
  115. func (devices *DeviceSet) metadataFile(info *DevInfo) string {
  116. file := info.Hash
  117. if file == "" {
  118. file = "base"
  119. }
  120. return path.Join(devices.metadataDir(), file)
  121. }
  122. func (devices *DeviceSet) oldMetadataFile() string {
  123. return path.Join(devices.loopbackDir(), "json")
  124. }
  125. func (devices *DeviceSet) getPoolName() string {
  126. return devices.devicePrefix + "-pool"
  127. }
  128. func (devices *DeviceSet) getPoolDevName() string {
  129. return getDevName(devices.getPoolName())
  130. }
  131. func (devices *DeviceSet) hasImage(name string) bool {
  132. dirname := devices.loopbackDir()
  133. filename := path.Join(dirname, name)
  134. _, err := os.Stat(filename)
  135. return err == nil
  136. }
  137. // ensureImage creates a sparse file of <size> bytes at the path
  138. // <root>/devicemapper/<name>.
  139. // If the file already exists, it does nothing.
  140. // Either way it returns the full path.
  141. func (devices *DeviceSet) ensureImage(name string, size int64) (string, error) {
  142. dirname := devices.loopbackDir()
  143. filename := path.Join(dirname, name)
  144. if err := os.MkdirAll(dirname, 0700); err != nil && !os.IsExist(err) {
  145. return "", err
  146. }
  147. if _, err := os.Stat(filename); err != nil {
  148. if !os.IsNotExist(err) {
  149. return "", err
  150. }
  151. log.Debugf("Creating loopback file %s for device-manage use", filename)
  152. file, err := os.OpenFile(filename, os.O_RDWR|os.O_CREATE, 0600)
  153. if err != nil {
  154. return "", err
  155. }
  156. defer file.Close()
  157. if err = file.Truncate(size); err != nil {
  158. return "", err
  159. }
  160. }
  161. return filename, nil
  162. }
  163. func (devices *DeviceSet) allocateTransactionId() uint64 {
  164. devices.NewTransactionId = devices.NewTransactionId + 1
  165. return devices.NewTransactionId
  166. }
  167. func (devices *DeviceSet) removeMetadata(info *DevInfo) error {
  168. if err := os.RemoveAll(devices.metadataFile(info)); err != nil {
  169. return fmt.Errorf("Error removing metadata file %s: %s", devices.metadataFile(info), err)
  170. }
  171. return nil
  172. }
  173. func (devices *DeviceSet) saveMetadata(info *DevInfo) error {
  174. jsonData, err := json.Marshal(info)
  175. if err != nil {
  176. return fmt.Errorf("Error encoding metadata to json: %s", err)
  177. }
  178. tmpFile, err := ioutil.TempFile(devices.metadataDir(), ".tmp")
  179. if err != nil {
  180. return fmt.Errorf("Error creating metadata file: %s", err)
  181. }
  182. n, err := tmpFile.Write(jsonData)
  183. if err != nil {
  184. return fmt.Errorf("Error writing metadata to %s: %s", tmpFile.Name(), err)
  185. }
  186. if n < len(jsonData) {
  187. return io.ErrShortWrite
  188. }
  189. if err := tmpFile.Sync(); err != nil {
  190. return fmt.Errorf("Error syncing metadata file %s: %s", tmpFile.Name(), err)
  191. }
  192. if err := tmpFile.Close(); err != nil {
  193. return fmt.Errorf("Error closing metadata file %s: %s", tmpFile.Name(), err)
  194. }
  195. if err := os.Rename(tmpFile.Name(), devices.metadataFile(info)); err != nil {
  196. return fmt.Errorf("Error committing metadata file %s: %s", tmpFile.Name(), err)
  197. }
  198. if devices.NewTransactionId != devices.TransactionId {
  199. if err = devicemapper.SetTransactionId(devices.getPoolDevName(), devices.TransactionId, devices.NewTransactionId); err != nil {
  200. return fmt.Errorf("Error setting devmapper transition ID: %s", err)
  201. }
  202. devices.TransactionId = devices.NewTransactionId
  203. }
  204. return nil
  205. }
  206. func (devices *DeviceSet) lookupDevice(hash string) (*DevInfo, error) {
  207. devices.devicesLock.Lock()
  208. defer devices.devicesLock.Unlock()
  209. info := devices.Devices[hash]
  210. if info == nil {
  211. info = devices.loadMetadata(hash)
  212. if info == nil {
  213. return nil, fmt.Errorf("Unknown device %s", hash)
  214. }
  215. devices.Devices[hash] = info
  216. }
  217. return info, nil
  218. }
  219. func (devices *DeviceSet) registerDevice(id int, hash string, size uint64) (*DevInfo, error) {
  220. log.Debugf("registerDevice(%v, %v)", id, hash)
  221. info := &DevInfo{
  222. Hash: hash,
  223. DeviceId: id,
  224. Size: size,
  225. TransactionId: devices.allocateTransactionId(),
  226. Initialized: false,
  227. devices: devices,
  228. }
  229. devices.devicesLock.Lock()
  230. devices.Devices[hash] = info
  231. devices.devicesLock.Unlock()
  232. if err := devices.saveMetadata(info); err != nil {
  233. // Try to remove unused device
  234. devices.devicesLock.Lock()
  235. delete(devices.Devices, hash)
  236. devices.devicesLock.Unlock()
  237. return nil, err
  238. }
  239. return info, nil
  240. }
  241. func (devices *DeviceSet) activateDeviceIfNeeded(info *DevInfo) error {
  242. log.Debugf("activateDeviceIfNeeded(%v)", info.Hash)
  243. if devinfo, _ := devicemapper.GetInfo(info.Name()); devinfo != nil && devinfo.Exists != 0 {
  244. return nil
  245. }
  246. return devicemapper.ActivateDevice(devices.getPoolDevName(), info.Name(), info.DeviceId, info.Size)
  247. }
  248. func (devices *DeviceSet) createFilesystem(info *DevInfo) error {
  249. devname := info.DevName()
  250. args := []string{}
  251. for _, arg := range devices.mkfsArgs {
  252. args = append(args, arg)
  253. }
  254. args = append(args, devname)
  255. var err error
  256. switch devices.filesystem {
  257. case "xfs":
  258. err = exec.Command("mkfs.xfs", args...).Run()
  259. case "ext4":
  260. err = exec.Command("mkfs.ext4", append([]string{"-E", "nodiscard,lazy_itable_init=0,lazy_journal_init=0"}, args...)...).Run()
  261. if err != nil {
  262. err = exec.Command("mkfs.ext4", append([]string{"-E", "nodiscard,lazy_itable_init=0"}, args...)...).Run()
  263. }
  264. if err != nil {
  265. return err
  266. }
  267. err = exec.Command("tune2fs", append([]string{"-c", "-1", "-i", "0"}, devname)...).Run()
  268. default:
  269. err = fmt.Errorf("Unsupported filesystem type %s", devices.filesystem)
  270. }
  271. if err != nil {
  272. return err
  273. }
  274. return nil
  275. }
  276. func (devices *DeviceSet) initMetaData() error {
  277. _, _, _, params, err := devicemapper.GetStatus(devices.getPoolName())
  278. if err != nil {
  279. return err
  280. }
  281. if _, err := fmt.Sscanf(params, "%d", &devices.TransactionId); err != nil {
  282. return err
  283. }
  284. devices.NewTransactionId = devices.TransactionId
  285. // Migrate old metadatafile
  286. jsonData, err := ioutil.ReadFile(devices.oldMetadataFile())
  287. if err != nil && !os.IsNotExist(err) {
  288. return err
  289. }
  290. if jsonData != nil {
  291. m := MetaData{Devices: make(map[string]*DevInfo)}
  292. if err := json.Unmarshal(jsonData, &m); err != nil {
  293. return err
  294. }
  295. for hash, info := range m.Devices {
  296. info.Hash = hash
  297. // If the transaction id is larger than the actual one we lost the device due to some crash
  298. if info.TransactionId <= devices.TransactionId {
  299. devices.saveMetadata(info)
  300. }
  301. }
  302. if err := os.Rename(devices.oldMetadataFile(), devices.oldMetadataFile()+".migrated"); err != nil {
  303. return err
  304. }
  305. }
  306. return nil
  307. }
  308. func (devices *DeviceSet) loadMetadata(hash string) *DevInfo {
  309. info := &DevInfo{Hash: hash, devices: devices}
  310. jsonData, err := ioutil.ReadFile(devices.metadataFile(info))
  311. if err != nil {
  312. return nil
  313. }
  314. if err := json.Unmarshal(jsonData, &info); err != nil {
  315. return nil
  316. }
  317. // If the transaction id is larger than the actual one we lost the device due to some crash
  318. if info.TransactionId > devices.TransactionId {
  319. return nil
  320. }
  321. return info
  322. }
  323. func (devices *DeviceSet) setupBaseImage() error {
  324. oldInfo, _ := devices.lookupDevice("")
  325. if oldInfo != nil && oldInfo.Initialized {
  326. return nil
  327. }
  328. if oldInfo != nil && !oldInfo.Initialized {
  329. log.Debugf("Removing uninitialized base image")
  330. if err := devices.deleteDevice(oldInfo); err != nil {
  331. return err
  332. }
  333. }
  334. log.Debugf("Initializing base device-manager snapshot")
  335. id := devices.nextDeviceId
  336. // Create initial device
  337. if err := devicemapper.CreateDevice(devices.getPoolDevName(), &id); err != nil {
  338. return err
  339. }
  340. // Ids are 24bit, so wrap around
  341. devices.nextDeviceId = (id + 1) & 0xffffff
  342. log.Debugf("Registering base device (id %v) with FS size %v", id, devices.baseFsSize)
  343. info, err := devices.registerDevice(id, "", devices.baseFsSize)
  344. if err != nil {
  345. _ = devicemapper.DeleteDevice(devices.getPoolDevName(), id)
  346. return err
  347. }
  348. log.Debugf("Creating filesystem on base device-manager snapshot")
  349. if err = devices.activateDeviceIfNeeded(info); err != nil {
  350. return err
  351. }
  352. if err := devices.createFilesystem(info); err != nil {
  353. return err
  354. }
  355. info.Initialized = true
  356. if err = devices.saveMetadata(info); err != nil {
  357. info.Initialized = false
  358. return err
  359. }
  360. return nil
  361. }
  362. func setCloseOnExec(name string) {
  363. if fileInfos, _ := ioutil.ReadDir("/proc/self/fd"); fileInfos != nil {
  364. for _, i := range fileInfos {
  365. link, _ := os.Readlink(filepath.Join("/proc/self/fd", i.Name()))
  366. if link == name {
  367. fd, err := strconv.Atoi(i.Name())
  368. if err == nil {
  369. syscall.CloseOnExec(fd)
  370. }
  371. }
  372. }
  373. }
  374. }
  375. func (devices *DeviceSet) DMLog(level int, file string, line int, dmError int, message string) {
  376. if level >= 7 {
  377. return // Ignore _LOG_DEBUG
  378. }
  379. // FIXME(vbatts) push this back into ./pkg/devicemapper/
  380. log.Debugf("libdevmapper(%d): %s:%d (%d) %s", level, file, line, dmError, message)
  381. }
  382. func major(device uint64) uint64 {
  383. return (device >> 8) & 0xfff
  384. }
  385. func minor(device uint64) uint64 {
  386. return (device & 0xff) | ((device >> 12) & 0xfff00)
  387. }
  388. func (devices *DeviceSet) ResizePool(size int64) error {
  389. dirname := devices.loopbackDir()
  390. datafilename := path.Join(dirname, "data")
  391. if len(devices.dataDevice) > 0 {
  392. datafilename = devices.dataDevice
  393. }
  394. metadatafilename := path.Join(dirname, "metadata")
  395. if len(devices.metadataDevice) > 0 {
  396. metadatafilename = devices.metadataDevice
  397. }
  398. datafile, err := os.OpenFile(datafilename, os.O_RDWR, 0)
  399. if datafile == nil {
  400. return err
  401. }
  402. defer datafile.Close()
  403. fi, err := datafile.Stat()
  404. if fi == nil {
  405. return err
  406. }
  407. if fi.Size() > size {
  408. return fmt.Errorf("Can't shrink file")
  409. }
  410. dataloopback := devicemapper.FindLoopDeviceFor(datafile)
  411. if dataloopback == nil {
  412. return fmt.Errorf("Unable to find loopback mount for: %s", datafilename)
  413. }
  414. defer dataloopback.Close()
  415. metadatafile, err := os.OpenFile(metadatafilename, os.O_RDWR, 0)
  416. if metadatafile == nil {
  417. return err
  418. }
  419. defer metadatafile.Close()
  420. metadataloopback := devicemapper.FindLoopDeviceFor(metadatafile)
  421. if metadataloopback == nil {
  422. return fmt.Errorf("Unable to find loopback mount for: %s", metadatafilename)
  423. }
  424. defer metadataloopback.Close()
  425. // Grow loopback file
  426. if err := datafile.Truncate(size); err != nil {
  427. return fmt.Errorf("Unable to grow loopback file: %s", err)
  428. }
  429. // Reload size for loopback device
  430. if err := devicemapper.LoopbackSetCapacity(dataloopback); err != nil {
  431. return fmt.Errorf("Unable to update loopback capacity: %s", err)
  432. }
  433. // Suspend the pool
  434. if err := devicemapper.SuspendDevice(devices.getPoolName()); err != nil {
  435. return fmt.Errorf("Unable to suspend pool: %s", err)
  436. }
  437. // Reload with the new block sizes
  438. if err := devicemapper.ReloadPool(devices.getPoolName(), dataloopback, metadataloopback, devices.thinpBlockSize); err != nil {
  439. return fmt.Errorf("Unable to reload pool: %s", err)
  440. }
  441. // Resume the pool
  442. if err := devicemapper.ResumeDevice(devices.getPoolName()); err != nil {
  443. return fmt.Errorf("Unable to resume pool: %s", err)
  444. }
  445. return nil
  446. }
  447. func (devices *DeviceSet) initDevmapper(doInit bool) error {
  448. // give ourselves to libdm as a log handler
  449. devicemapper.LogInit(devices)
  450. _, err := devicemapper.GetDriverVersion()
  451. if err != nil {
  452. // Can't even get driver version, assume not supported
  453. return graphdriver.ErrNotSupported
  454. }
  455. if err := os.MkdirAll(devices.metadataDir(), 0700); err != nil && !os.IsExist(err) {
  456. return err
  457. }
  458. // Set the device prefix from the device id and inode of the docker root dir
  459. st, err := os.Stat(devices.root)
  460. if err != nil {
  461. return fmt.Errorf("Error looking up dir %s: %s", devices.root, err)
  462. }
  463. sysSt := st.Sys().(*syscall.Stat_t)
  464. // "reg-" stands for "regular file".
  465. // In the future we might use "dev-" for "device file", etc.
  466. // docker-maj,min[-inode] stands for:
  467. // - Managed by docker
  468. // - The target of this device is at major <maj> and minor <min>
  469. // - If <inode> is defined, use that file inside the device as a loopback image. Otherwise use the device itself.
  470. devices.devicePrefix = fmt.Sprintf("docker-%d:%d-%d", major(sysSt.Dev), minor(sysSt.Dev), sysSt.Ino)
  471. log.Debugf("Generated prefix: %s", devices.devicePrefix)
  472. // Check for the existence of the device <prefix>-pool
  473. log.Debugf("Checking for existence of the pool '%s'", devices.getPoolName())
  474. info, err := devicemapper.GetInfo(devices.getPoolName())
  475. if info == nil {
  476. log.Debugf("Error device devicemapper.GetInfo: %s", err)
  477. return err
  478. }
  479. // It seems libdevmapper opens this without O_CLOEXEC, and go exec will not close files
  480. // that are not Close-on-exec, and lxc-start will die if it inherits any unexpected files,
  481. // so we add this badhack to make sure it closes itself
  482. setCloseOnExec("/dev/mapper/control")
  483. // Make sure the sparse images exist in <root>/devicemapper/data and
  484. // <root>/devicemapper/metadata
  485. createdLoopback := false
  486. // If the pool doesn't exist, create it
  487. if info.Exists == 0 {
  488. log.Debugf("Pool doesn't exist. Creating it.")
  489. var (
  490. dataFile *os.File
  491. metadataFile *os.File
  492. )
  493. if devices.dataDevice == "" {
  494. // Make sure the sparse images exist in <root>/devicemapper/data
  495. hasData := devices.hasImage("data")
  496. if !doInit && !hasData {
  497. return errors.New("Loopback data file not found")
  498. }
  499. if !hasData {
  500. createdLoopback = true
  501. }
  502. data, err := devices.ensureImage("data", devices.dataLoopbackSize)
  503. if err != nil {
  504. log.Debugf("Error device ensureImage (data): %s", err)
  505. return err
  506. }
  507. dataFile, err = devicemapper.AttachLoopDevice(data)
  508. if err != nil {
  509. return err
  510. }
  511. } else {
  512. dataFile, err = os.OpenFile(devices.dataDevice, os.O_RDWR, 0600)
  513. if err != nil {
  514. return err
  515. }
  516. }
  517. defer dataFile.Close()
  518. if devices.metadataDevice == "" {
  519. // Make sure the sparse images exist in <root>/devicemapper/metadata
  520. hasMetadata := devices.hasImage("metadata")
  521. if !doInit && !hasMetadata {
  522. return errors.New("Loopback metadata file not found")
  523. }
  524. if !hasMetadata {
  525. createdLoopback = true
  526. }
  527. metadata, err := devices.ensureImage("metadata", devices.metaDataLoopbackSize)
  528. if err != nil {
  529. log.Debugf("Error device ensureImage (metadata): %s", err)
  530. return err
  531. }
  532. metadataFile, err = devicemapper.AttachLoopDevice(metadata)
  533. if err != nil {
  534. return err
  535. }
  536. } else {
  537. metadataFile, err = os.OpenFile(devices.metadataDevice, os.O_RDWR, 0600)
  538. if err != nil {
  539. return err
  540. }
  541. }
  542. defer metadataFile.Close()
  543. if err := devicemapper.CreatePool(devices.getPoolName(), dataFile, metadataFile, devices.thinpBlockSize); err != nil {
  544. return err
  545. }
  546. }
  547. // If we didn't just create the data or metadata image, we need to
  548. // load the transaction id and migrate old metadata
  549. if !createdLoopback {
  550. if err = devices.initMetaData(); err != nil {
  551. return err
  552. }
  553. }
  554. // Setup the base image
  555. if doInit {
  556. if err := devices.setupBaseImage(); err != nil {
  557. log.Debugf("Error device setupBaseImage: %s", err)
  558. return err
  559. }
  560. }
  561. return nil
  562. }
  563. func (devices *DeviceSet) AddDevice(hash, baseHash string) error {
  564. baseInfo, err := devices.lookupDevice(baseHash)
  565. if err != nil {
  566. return err
  567. }
  568. baseInfo.lock.Lock()
  569. defer baseInfo.lock.Unlock()
  570. devices.Lock()
  571. defer devices.Unlock()
  572. if info, _ := devices.lookupDevice(hash); info != nil {
  573. return fmt.Errorf("device %s already exists", hash)
  574. }
  575. deviceId := devices.nextDeviceId
  576. if err := devicemapper.CreateSnapDevice(devices.getPoolDevName(), &deviceId, baseInfo.Name(), baseInfo.DeviceId); err != nil {
  577. log.Debugf("Error creating snap device: %s", err)
  578. return err
  579. }
  580. // Ids are 24bit, so wrap around
  581. devices.nextDeviceId = (deviceId + 1) & 0xffffff
  582. if _, err := devices.registerDevice(deviceId, hash, baseInfo.Size); err != nil {
  583. devicemapper.DeleteDevice(devices.getPoolDevName(), deviceId)
  584. log.Debugf("Error registering device: %s", err)
  585. return err
  586. }
  587. return nil
  588. }
  589. func (devices *DeviceSet) deleteDevice(info *DevInfo) error {
  590. if devices.doBlkDiscard {
  591. // This is a workaround for the kernel not discarding block so
  592. // on the thin pool when we remove a thinp device, so we do it
  593. // manually
  594. if err := devices.activateDeviceIfNeeded(info); err == nil {
  595. if err := devicemapper.BlockDeviceDiscard(info.DevName()); err != nil {
  596. log.Debugf("Error discarding block on device: %s (ignoring)", err)
  597. }
  598. }
  599. }
  600. devinfo, _ := devicemapper.GetInfo(info.Name())
  601. if devinfo != nil && devinfo.Exists != 0 {
  602. if err := devices.removeDeviceAndWait(info.Name()); err != nil {
  603. log.Debugf("Error removing device: %s", err)
  604. return err
  605. }
  606. }
  607. if err := devicemapper.DeleteDevice(devices.getPoolDevName(), info.DeviceId); err != nil {
  608. log.Debugf("Error deleting device: %s", err)
  609. return err
  610. }
  611. devices.allocateTransactionId()
  612. devices.devicesLock.Lock()
  613. delete(devices.Devices, info.Hash)
  614. devices.devicesLock.Unlock()
  615. if err := devices.removeMetadata(info); err != nil {
  616. devices.devicesLock.Lock()
  617. devices.Devices[info.Hash] = info
  618. devices.devicesLock.Unlock()
  619. log.Debugf("Error removing meta data: %s", err)
  620. return err
  621. }
  622. return nil
  623. }
  624. func (devices *DeviceSet) DeleteDevice(hash string) error {
  625. info, err := devices.lookupDevice(hash)
  626. if err != nil {
  627. return err
  628. }
  629. info.lock.Lock()
  630. defer info.lock.Unlock()
  631. devices.Lock()
  632. defer devices.Unlock()
  633. return devices.deleteDevice(info)
  634. }
  635. func (devices *DeviceSet) deactivatePool() error {
  636. log.Debugf("[devmapper] deactivatePool()")
  637. defer log.Debugf("[devmapper] deactivatePool END")
  638. devname := devices.getPoolDevName()
  639. devinfo, err := devicemapper.GetInfo(devname)
  640. if err != nil {
  641. return err
  642. }
  643. if d, err := devicemapper.GetDeps(devname); err == nil {
  644. // Access to more Debug output
  645. log.Debugf("[devmapper] devicemapper.GetDeps() %s: %#v", devname, d)
  646. }
  647. if devinfo.Exists != 0 {
  648. return devicemapper.RemoveDevice(devname)
  649. }
  650. return nil
  651. }
  652. func (devices *DeviceSet) deactivateDevice(info *DevInfo) error {
  653. log.Debugf("[devmapper] deactivateDevice(%s)", info.Hash)
  654. defer log.Debugf("[devmapper] deactivateDevice END")
  655. // Wait for the unmount to be effective,
  656. // by watching the value of Info.OpenCount for the device
  657. if err := devices.waitClose(info); err != nil {
  658. log.Errorf("Warning: error waiting for device %s to close: %s", info.Hash, err)
  659. }
  660. devinfo, err := devicemapper.GetInfo(info.Name())
  661. if err != nil {
  662. return err
  663. }
  664. if devinfo.Exists != 0 {
  665. if err := devices.removeDeviceAndWait(info.Name()); err != nil {
  666. return err
  667. }
  668. }
  669. return nil
  670. }
  671. // Issues the underlying dm remove operation and then waits
  672. // for it to finish.
  673. func (devices *DeviceSet) removeDeviceAndWait(devname string) error {
  674. var err error
  675. for i := 0; i < 1000; i++ {
  676. err = devicemapper.RemoveDevice(devname)
  677. if err == nil {
  678. break
  679. }
  680. if err != devicemapper.ErrBusy {
  681. return err
  682. }
  683. // If we see EBUSY it may be a transient error,
  684. // sleep a bit a retry a few times.
  685. devices.Unlock()
  686. time.Sleep(10 * time.Millisecond)
  687. devices.Lock()
  688. }
  689. if err != nil {
  690. return err
  691. }
  692. if err := devices.waitRemove(devname); err != nil {
  693. return err
  694. }
  695. return nil
  696. }
  697. // waitRemove blocks until either:
  698. // a) the device registered at <device_set_prefix>-<hash> is removed,
  699. // or b) the 10 second timeout expires.
  700. func (devices *DeviceSet) waitRemove(devname string) error {
  701. log.Debugf("[deviceset %s] waitRemove(%s)", devices.devicePrefix, devname)
  702. defer log.Debugf("[deviceset %s] waitRemove(%s) END", devices.devicePrefix, devname)
  703. i := 0
  704. for ; i < 1000; i++ {
  705. devinfo, err := devicemapper.GetInfo(devname)
  706. if err != nil {
  707. // If there is an error we assume the device doesn't exist.
  708. // The error might actually be something else, but we can't differentiate.
  709. return nil
  710. }
  711. if i%100 == 0 {
  712. log.Debugf("Waiting for removal of %s: exists=%d", devname, devinfo.Exists)
  713. }
  714. if devinfo.Exists == 0 {
  715. break
  716. }
  717. devices.Unlock()
  718. time.Sleep(10 * time.Millisecond)
  719. devices.Lock()
  720. }
  721. if i == 1000 {
  722. return fmt.Errorf("Timeout while waiting for device %s to be removed", devname)
  723. }
  724. return nil
  725. }
  726. // waitClose blocks until either:
  727. // a) the device registered at <device_set_prefix>-<hash> is closed,
  728. // or b) the 10 second timeout expires.
  729. func (devices *DeviceSet) waitClose(info *DevInfo) error {
  730. i := 0
  731. for ; i < 1000; i++ {
  732. devinfo, err := devicemapper.GetInfo(info.Name())
  733. if err != nil {
  734. return err
  735. }
  736. if i%100 == 0 {
  737. log.Debugf("Waiting for unmount of %s: opencount=%d", info.Hash, devinfo.OpenCount)
  738. }
  739. if devinfo.OpenCount == 0 {
  740. break
  741. }
  742. devices.Unlock()
  743. time.Sleep(10 * time.Millisecond)
  744. devices.Lock()
  745. }
  746. if i == 1000 {
  747. return fmt.Errorf("Timeout while waiting for device %s to close", info.Hash)
  748. }
  749. return nil
  750. }
  751. func (devices *DeviceSet) Shutdown() error {
  752. log.Debugf("[deviceset %s] shutdown()", devices.devicePrefix)
  753. log.Debugf("[devmapper] Shutting down DeviceSet: %s", devices.root)
  754. defer log.Debugf("[deviceset %s] shutdown END", devices.devicePrefix)
  755. var devs []*DevInfo
  756. devices.devicesLock.Lock()
  757. for _, info := range devices.Devices {
  758. devs = append(devs, info)
  759. }
  760. devices.devicesLock.Unlock()
  761. for _, info := range devs {
  762. info.lock.Lock()
  763. if info.mountCount > 0 {
  764. // We use MNT_DETACH here in case it is still busy in some running
  765. // container. This means it'll go away from the global scope directly,
  766. // and the device will be released when that container dies.
  767. if err := syscall.Unmount(info.mountPath, syscall.MNT_DETACH); err != nil {
  768. log.Debugf("Shutdown unmounting %s, error: %s", info.mountPath, err)
  769. }
  770. devices.Lock()
  771. if err := devices.deactivateDevice(info); err != nil {
  772. log.Debugf("Shutdown deactivate %s , error: %s", info.Hash, err)
  773. }
  774. devices.Unlock()
  775. }
  776. info.lock.Unlock()
  777. }
  778. info, _ := devices.lookupDevice("")
  779. if info != nil {
  780. info.lock.Lock()
  781. devices.Lock()
  782. if err := devices.deactivateDevice(info); err != nil {
  783. log.Debugf("Shutdown deactivate base , error: %s", err)
  784. }
  785. devices.Unlock()
  786. info.lock.Unlock()
  787. }
  788. devices.Lock()
  789. if err := devices.deactivatePool(); err != nil {
  790. log.Debugf("Shutdown deactivate pool , error: %s", err)
  791. }
  792. devices.Unlock()
  793. return nil
  794. }
  795. func (devices *DeviceSet) MountDevice(hash, path, mountLabel string) error {
  796. info, err := devices.lookupDevice(hash)
  797. if err != nil {
  798. return err
  799. }
  800. info.lock.Lock()
  801. defer info.lock.Unlock()
  802. devices.Lock()
  803. defer devices.Unlock()
  804. if info.mountCount > 0 {
  805. if path != info.mountPath {
  806. return fmt.Errorf("Trying to mount devmapper device in multple places (%s, %s)", info.mountPath, path)
  807. }
  808. info.mountCount++
  809. return nil
  810. }
  811. if err := devices.activateDeviceIfNeeded(info); err != nil {
  812. return fmt.Errorf("Error activating devmapper device for '%s': %s", hash, err)
  813. }
  814. var flags uintptr = syscall.MS_MGC_VAL
  815. fstype, err := ProbeFsType(info.DevName())
  816. if err != nil {
  817. return err
  818. }
  819. options := ""
  820. if fstype == "xfs" {
  821. // XFS needs nouuid or it can't mount filesystems with the same fs
  822. options = joinMountOptions(options, "nouuid")
  823. }
  824. options = joinMountOptions(options, devices.mountOptions)
  825. options = joinMountOptions(options, label.FormatMountLabel("", mountLabel))
  826. err = syscall.Mount(info.DevName(), path, fstype, flags, joinMountOptions("discard", options))
  827. if err != nil && err == syscall.EINVAL {
  828. err = syscall.Mount(info.DevName(), path, fstype, flags, options)
  829. }
  830. if err != nil {
  831. return fmt.Errorf("Error mounting '%s' on '%s': %s", info.DevName(), path, err)
  832. }
  833. info.mountCount = 1
  834. info.mountPath = path
  835. return nil
  836. }
  837. func (devices *DeviceSet) UnmountDevice(hash string) error {
  838. log.Debugf("[devmapper] UnmountDevice(hash=%s)", hash)
  839. defer log.Debugf("[devmapper] UnmountDevice END")
  840. info, err := devices.lookupDevice(hash)
  841. if err != nil {
  842. return err
  843. }
  844. info.lock.Lock()
  845. defer info.lock.Unlock()
  846. devices.Lock()
  847. defer devices.Unlock()
  848. if info.mountCount == 0 {
  849. return fmt.Errorf("UnmountDevice: device not-mounted id %s\n", hash)
  850. }
  851. info.mountCount--
  852. if info.mountCount > 0 {
  853. return nil
  854. }
  855. log.Debugf("[devmapper] Unmount(%s)", info.mountPath)
  856. if err := syscall.Unmount(info.mountPath, 0); err != nil {
  857. return err
  858. }
  859. log.Debugf("[devmapper] Unmount done")
  860. if err := devices.deactivateDevice(info); err != nil {
  861. return err
  862. }
  863. info.mountPath = ""
  864. return nil
  865. }
  866. func (devices *DeviceSet) HasDevice(hash string) bool {
  867. devices.Lock()
  868. defer devices.Unlock()
  869. info, _ := devices.lookupDevice(hash)
  870. return info != nil
  871. }
  872. func (devices *DeviceSet) HasActivatedDevice(hash string) bool {
  873. info, _ := devices.lookupDevice(hash)
  874. if info == nil {
  875. return false
  876. }
  877. info.lock.Lock()
  878. defer info.lock.Unlock()
  879. devices.Lock()
  880. defer devices.Unlock()
  881. devinfo, _ := devicemapper.GetInfo(info.Name())
  882. return devinfo != nil && devinfo.Exists != 0
  883. }
  884. func (devices *DeviceSet) List() []string {
  885. devices.Lock()
  886. defer devices.Unlock()
  887. devices.devicesLock.Lock()
  888. ids := make([]string, len(devices.Devices))
  889. i := 0
  890. for k := range devices.Devices {
  891. ids[i] = k
  892. i++
  893. }
  894. devices.devicesLock.Unlock()
  895. return ids
  896. }
  897. func (devices *DeviceSet) deviceStatus(devName string) (sizeInSectors, mappedSectors, highestMappedSector uint64, err error) {
  898. var params string
  899. _, sizeInSectors, _, params, err = devicemapper.GetStatus(devName)
  900. if err != nil {
  901. return
  902. }
  903. if _, err = fmt.Sscanf(params, "%d %d", &mappedSectors, &highestMappedSector); err == nil {
  904. return
  905. }
  906. return
  907. }
  908. func (devices *DeviceSet) GetDeviceStatus(hash string) (*DevStatus, error) {
  909. info, err := devices.lookupDevice(hash)
  910. if err != nil {
  911. return nil, err
  912. }
  913. info.lock.Lock()
  914. defer info.lock.Unlock()
  915. devices.Lock()
  916. defer devices.Unlock()
  917. status := &DevStatus{
  918. DeviceId: info.DeviceId,
  919. Size: info.Size,
  920. TransactionId: info.TransactionId,
  921. }
  922. if err := devices.activateDeviceIfNeeded(info); err != nil {
  923. return nil, fmt.Errorf("Error activating devmapper device for '%s': %s", hash, err)
  924. }
  925. if sizeInSectors, mappedSectors, highestMappedSector, err := devices.deviceStatus(info.DevName()); err != nil {
  926. return nil, err
  927. } else {
  928. status.SizeInSectors = sizeInSectors
  929. status.MappedSectors = mappedSectors
  930. status.HighestMappedSector = highestMappedSector
  931. }
  932. return status, nil
  933. }
  934. func (devices *DeviceSet) poolStatus() (totalSizeInSectors, transactionId, dataUsed, dataTotal, metadataUsed, metadataTotal uint64, err error) {
  935. var params string
  936. if _, totalSizeInSectors, _, params, err = devicemapper.GetStatus(devices.getPoolName()); err == nil {
  937. _, err = fmt.Sscanf(params, "%d %d/%d %d/%d", &transactionId, &metadataUsed, &metadataTotal, &dataUsed, &dataTotal)
  938. }
  939. return
  940. }
  941. func (devices *DeviceSet) Status() *Status {
  942. devices.Lock()
  943. defer devices.Unlock()
  944. status := &Status{}
  945. status.PoolName = devices.getPoolName()
  946. if len(devices.dataDevice) > 0 {
  947. status.DataLoopback = devices.dataDevice
  948. } else {
  949. status.DataLoopback = path.Join(devices.loopbackDir(), "data")
  950. }
  951. if len(devices.metadataDevice) > 0 {
  952. status.MetadataLoopback = devices.metadataDevice
  953. } else {
  954. status.MetadataLoopback = path.Join(devices.loopbackDir(), "metadata")
  955. }
  956. totalSizeInSectors, _, dataUsed, dataTotal, metadataUsed, metadataTotal, err := devices.poolStatus()
  957. if err == nil {
  958. // Convert from blocks to bytes
  959. blockSizeInSectors := totalSizeInSectors / dataTotal
  960. status.Data.Used = dataUsed * blockSizeInSectors * 512
  961. status.Data.Total = dataTotal * blockSizeInSectors * 512
  962. // metadata blocks are always 4k
  963. status.Metadata.Used = metadataUsed * 4096
  964. status.Metadata.Total = metadataTotal * 4096
  965. status.SectorSize = blockSizeInSectors * 512
  966. }
  967. return status
  968. }
  969. func NewDeviceSet(root string, doInit bool, options []string) (*DeviceSet, error) {
  970. devicemapper.SetDevDir("/dev")
  971. devices := &DeviceSet{
  972. root: root,
  973. MetaData: MetaData{Devices: make(map[string]*DevInfo)},
  974. dataLoopbackSize: DefaultDataLoopbackSize,
  975. metaDataLoopbackSize: DefaultMetaDataLoopbackSize,
  976. baseFsSize: DefaultBaseFsSize,
  977. filesystem: "ext4",
  978. doBlkDiscard: true,
  979. thinpBlockSize: DefaultThinpBlockSize,
  980. }
  981. foundBlkDiscard := false
  982. for _, option := range options {
  983. key, val, err := parsers.ParseKeyValueOpt(option)
  984. if err != nil {
  985. return nil, err
  986. }
  987. key = strings.ToLower(key)
  988. switch key {
  989. case "dm.basesize":
  990. size, err := units.RAMInBytes(val)
  991. if err != nil {
  992. return nil, err
  993. }
  994. devices.baseFsSize = uint64(size)
  995. case "dm.loopdatasize":
  996. size, err := units.RAMInBytes(val)
  997. if err != nil {
  998. return nil, err
  999. }
  1000. devices.dataLoopbackSize = size
  1001. case "dm.loopmetadatasize":
  1002. size, err := units.RAMInBytes(val)
  1003. if err != nil {
  1004. return nil, err
  1005. }
  1006. devices.metaDataLoopbackSize = size
  1007. case "dm.fs":
  1008. if val != "ext4" && val != "xfs" {
  1009. return nil, fmt.Errorf("Unsupported filesystem %s\n", val)
  1010. }
  1011. devices.filesystem = val
  1012. case "dm.mkfsarg":
  1013. devices.mkfsArgs = append(devices.mkfsArgs, val)
  1014. case "dm.mountopt":
  1015. devices.mountOptions = joinMountOptions(devices.mountOptions, val)
  1016. case "dm.metadatadev":
  1017. devices.metadataDevice = val
  1018. case "dm.datadev":
  1019. devices.dataDevice = val
  1020. case "dm.blkdiscard":
  1021. foundBlkDiscard = true
  1022. devices.doBlkDiscard, err = strconv.ParseBool(val)
  1023. if err != nil {
  1024. return nil, err
  1025. }
  1026. case "dm.blocksize":
  1027. size, err := units.RAMInBytes(val)
  1028. if err != nil {
  1029. return nil, err
  1030. }
  1031. // convert to 512b sectors
  1032. devices.thinpBlockSize = uint32(size) >> 9
  1033. default:
  1034. return nil, fmt.Errorf("Unknown option %s\n", key)
  1035. }
  1036. }
  1037. // By default, don't do blk discard hack on raw devices, its rarely useful and is expensive
  1038. if !foundBlkDiscard && devices.dataDevice != "" {
  1039. devices.doBlkDiscard = false
  1040. }
  1041. if err := devices.initDevmapper(doInit); err != nil {
  1042. return nil, err
  1043. }
  1044. return devices, nil
  1045. }