2011-12-16 00:04:31 +05:30
|
|
|
// Copyright (C) 2011 Red Hat, Inc. All rights reserved.
|
2011-12-06 19:23:05 +05:30
|
|
|
//
|
2011-12-06 19:13:56 +05:30
|
|
|
// This file is part of the thin-provisioning-tools source.
|
|
|
|
//
|
|
|
|
// thin-provisioning-tools is free software: you can redistribute it
|
|
|
|
// and/or modify it under the terms of the GNU General Public License
|
|
|
|
// as published by the Free Software Foundation, either version 3 of
|
|
|
|
// the License, or (at your option) any later version.
|
|
|
|
//
|
|
|
|
// thin-provisioning-tools is distributed in the hope that it will be
|
|
|
|
// useful, but WITHOUT ANY WARRANTY; without even the implied warranty
|
|
|
|
// of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU General Public License along
|
|
|
|
// with thin-provisioning-tools. If not, see
|
|
|
|
// <http://www.gnu.org/licenses/>.
|
|
|
|
|
2011-10-28 16:43:03 +05:30
|
|
|
#include "metadata_dumper.h"
|
2013-05-20 22:07:46 +05:30
|
|
|
#include "thin-provisioning/mapping_tree.h"
|
2011-10-10 18:40:30 +05:30
|
|
|
|
|
|
|
using namespace persistent_data;
|
|
|
|
using namespace thin_provisioning;
|
|
|
|
|
|
|
|
//----------------------------------------------------------------
|
|
|
|
|
|
|
|
namespace {
|
2013-05-20 22:07:46 +05:30
|
|
|
class mappings_extractor : public mapping_tree::visitor {
|
2011-10-10 18:40:30 +05:30
|
|
|
public:
|
|
|
|
typedef boost::shared_ptr<mappings_extractor> ptr;
|
2013-05-01 20:46:23 +05:30
|
|
|
typedef btree_detail::node_location node_location;
|
2013-05-20 22:07:46 +05:30
|
|
|
typedef btree_checker<2, mapping_tree_detail::block_traits> checker;
|
2011-10-10 18:40:30 +05:30
|
|
|
|
|
|
|
mappings_extractor(uint64_t dev_id, emitter::ptr e,
|
|
|
|
space_map::ptr md_sm, space_map::ptr data_sm)
|
2012-03-02 15:30:31 +05:30
|
|
|
: counter_(),
|
2012-05-17 16:58:23 +05:30
|
|
|
checker_(counter_, false),
|
2012-03-02 15:30:31 +05:30
|
|
|
dev_id_(dev_id),
|
2011-10-10 18:40:30 +05:30
|
|
|
e_(e),
|
|
|
|
md_sm_(md_sm),
|
|
|
|
data_sm_(data_sm),
|
2012-03-02 15:30:31 +05:30
|
|
|
in_range_(false),
|
|
|
|
found_errors_(false) {
|
2011-10-10 18:40:30 +05:30
|
|
|
}
|
|
|
|
|
2013-05-01 20:46:23 +05:30
|
|
|
bool visit_internal(node_location const &loc,
|
2013-06-20 18:57:40 +05:30
|
|
|
btree_detail::node_ref<block_traits> const &n) {
|
2012-03-02 15:30:31 +05:30
|
|
|
|
2013-05-01 20:46:23 +05:30
|
|
|
if (!checker_.visit_internal(loc, n)) {
|
2012-03-02 15:30:31 +05:30
|
|
|
found_errors_ = true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2013-06-28 18:54:39 +05:30
|
|
|
return (loc.is_sub_root() && loc.path.size()) ? (loc.path[0] == dev_id_) : true;
|
2011-10-10 18:40:30 +05:30
|
|
|
}
|
|
|
|
|
2013-05-01 20:46:23 +05:30
|
|
|
bool visit_internal_leaf(node_location const &loc,
|
2013-06-20 18:57:40 +05:30
|
|
|
btree_detail::node_ref<block_traits> const &n) {
|
2013-05-01 20:46:23 +05:30
|
|
|
if (!checker_.visit_internal_leaf(loc, n)) {
|
2012-03-02 15:30:31 +05:30
|
|
|
found_errors_ = true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2011-10-10 18:40:30 +05:30
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-05-01 20:46:23 +05:30
|
|
|
bool visit_leaf(node_location const &loc,
|
2013-05-20 22:07:46 +05:30
|
|
|
btree_detail::node_ref<mapping_tree_detail::block_traits> const &n) {
|
2013-05-01 20:46:23 +05:30
|
|
|
if (!checker_.visit_leaf(loc, n)) {
|
2012-03-02 15:30:31 +05:30
|
|
|
found_errors_ = true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2013-07-09 17:58:36 +05:30
|
|
|
if (loc.path[0] == dev_id_)
|
|
|
|
for (unsigned i = 0; i < n.get_nr_entries(); i++) {
|
|
|
|
mapping_tree_detail::block_time bt = n.value_at(i);
|
|
|
|
add_mapping(n.key_at(i), bt.block_, bt.time_);
|
|
|
|
}
|
2011-10-10 18:40:30 +05:30
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void visit_complete() {
|
|
|
|
end_mapping();
|
|
|
|
}
|
|
|
|
|
2012-03-02 15:30:31 +05:30
|
|
|
bool corruption() const {
|
|
|
|
return !checker_.get_errors()->empty();
|
|
|
|
}
|
|
|
|
|
2011-10-10 18:40:30 +05:30
|
|
|
private:
|
2011-10-28 18:23:15 +05:30
|
|
|
void start_mapping(uint64_t origin_block, uint64_t dest_block, uint32_t time) {
|
2011-10-10 18:40:30 +05:30
|
|
|
origin_start_ = origin_block;
|
|
|
|
dest_start_ = dest_block;
|
2011-10-28 18:23:15 +05:30
|
|
|
time_ = time;
|
2011-10-10 18:40:30 +05:30
|
|
|
len_ = 1;
|
|
|
|
in_range_ = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void end_mapping() {
|
|
|
|
if (in_range_) {
|
|
|
|
if (len_ == 1)
|
2011-10-28 18:23:15 +05:30
|
|
|
e_->single_map(origin_start_, dest_start_, time_);
|
2011-10-10 18:40:30 +05:30
|
|
|
else
|
2011-10-28 18:23:15 +05:30
|
|
|
e_->range_map(origin_start_, dest_start_, time_, len_);
|
2011-10-10 18:40:30 +05:30
|
|
|
|
|
|
|
in_range_ = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-10-28 18:23:15 +05:30
|
|
|
void add_mapping(uint64_t origin_block, uint64_t dest_block, uint32_t time) {
|
2011-10-10 18:40:30 +05:30
|
|
|
if (!in_range_)
|
2011-10-28 18:23:15 +05:30
|
|
|
start_mapping(origin_block, dest_block, time);
|
2011-10-10 18:40:30 +05:30
|
|
|
|
|
|
|
else if (origin_block == origin_start_ + len_ &&
|
2011-10-28 18:23:15 +05:30
|
|
|
dest_block == dest_start_ + len_ &&
|
|
|
|
time == time_)
|
2011-10-10 18:40:30 +05:30
|
|
|
len_++;
|
|
|
|
|
|
|
|
else {
|
|
|
|
end_mapping();
|
2011-10-28 18:23:15 +05:30
|
|
|
start_mapping(origin_block, dest_block, time);
|
2011-10-10 18:40:30 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-03-02 15:30:31 +05:30
|
|
|
// Declaration order of counter_ and checker_ is important.
|
|
|
|
block_counter counter_;
|
|
|
|
checker checker_;
|
2011-10-10 18:40:30 +05:30
|
|
|
uint64_t dev_id_;
|
|
|
|
emitter::ptr e_;
|
|
|
|
space_map::ptr md_sm_;
|
|
|
|
space_map::ptr data_sm_;
|
|
|
|
|
|
|
|
bool in_range_;
|
|
|
|
uint64_t origin_start_, dest_start_, len_;
|
2011-10-28 18:23:15 +05:30
|
|
|
uint32_t time_;
|
2012-03-02 15:30:31 +05:30
|
|
|
bool found_errors_;
|
2011-10-10 18:40:30 +05:30
|
|
|
};
|
|
|
|
|
2013-05-20 21:05:26 +05:30
|
|
|
class details_extractor : public btree<1, device_tree_detail::device_details_traits>::visitor {
|
2011-10-10 18:40:30 +05:30
|
|
|
public:
|
2013-05-20 21:05:26 +05:30
|
|
|
typedef typename btree<1, device_tree_detail::device_details_traits>::visitor::node_location node_location;
|
2011-10-10 18:40:30 +05:30
|
|
|
typedef boost::shared_ptr<details_extractor> ptr;
|
2013-05-20 21:05:26 +05:30
|
|
|
typedef btree_checker<1, device_tree_detail::device_details_traits> checker;
|
2011-10-10 18:40:30 +05:30
|
|
|
|
2012-03-02 15:30:31 +05:30
|
|
|
details_extractor()
|
|
|
|
: counter_(),
|
|
|
|
checker_(counter_, false) {
|
2011-10-10 18:40:30 +05:30
|
|
|
}
|
|
|
|
|
2013-05-01 20:46:23 +05:30
|
|
|
bool visit_internal(node_location const &loc,
|
2013-06-20 18:57:40 +05:30
|
|
|
btree_detail::node_ref<block_traits> const &n) {
|
2013-05-01 20:46:23 +05:30
|
|
|
return checker_.visit_internal(loc, n);
|
2011-10-10 18:40:30 +05:30
|
|
|
}
|
|
|
|
|
2013-05-01 20:46:23 +05:30
|
|
|
bool visit_internal_leaf(node_location const &loc,
|
2013-06-20 18:57:40 +05:30
|
|
|
btree_detail::node_ref<block_traits> const &n) {
|
2013-05-01 20:46:23 +05:30
|
|
|
return checker_.visit_internal_leaf(loc, n);
|
2011-10-10 18:40:30 +05:30
|
|
|
}
|
|
|
|
|
2013-05-01 20:46:23 +05:30
|
|
|
bool visit_leaf(node_location const &loc,
|
2013-05-20 21:05:26 +05:30
|
|
|
btree_detail::node_ref<device_tree_detail::device_details_traits> const &n) {
|
2013-05-01 20:46:23 +05:30
|
|
|
if (!checker_.visit_leaf(loc, n))
|
2012-03-02 15:30:31 +05:30
|
|
|
return false;
|
|
|
|
|
2011-10-10 18:40:30 +05:30
|
|
|
for (unsigned i = 0; i < n.get_nr_entries(); i++)
|
|
|
|
devices_.insert(make_pair(n.key_at(i), n.value_at(i)));
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-05-20 21:05:26 +05:30
|
|
|
map<uint64_t, device_tree_detail::device_details> const &get_devices() const {
|
2011-10-10 18:40:30 +05:30
|
|
|
return devices_;
|
|
|
|
}
|
|
|
|
|
2012-03-02 15:30:31 +05:30
|
|
|
bool corruption() const {
|
|
|
|
return !checker_.get_errors()->empty();
|
|
|
|
}
|
|
|
|
|
2011-10-10 18:40:30 +05:30
|
|
|
private:
|
2012-03-02 15:30:31 +05:30
|
|
|
// Declaration order of counter_ and checker_ is important.
|
|
|
|
block_counter counter_;
|
|
|
|
checker checker_;
|
2013-05-20 21:05:26 +05:30
|
|
|
map<uint64_t, device_tree_detail::device_details> devices_;
|
2011-10-10 18:40:30 +05:30
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2011-10-28 16:43:03 +05:30
|
|
|
//----------------------------------------------------------------
|
|
|
|
|
2011-10-10 18:40:30 +05:30
|
|
|
void
|
2012-03-02 15:30:31 +05:30
|
|
|
thin_provisioning::metadata_dump(metadata::ptr md, emitter::ptr e, bool repair)
|
2011-10-10 18:40:30 +05:30
|
|
|
{
|
2013-06-25 18:18:02 +05:30
|
|
|
boost::optional<uint64_t> md_snap = md->sb_.metadata_snap_ ?
|
|
|
|
boost::optional<uint64_t>(md->sb_.metadata_snap_) :
|
|
|
|
boost::optional<uint64_t>();
|
2012-05-17 17:35:26 +05:30
|
|
|
|
2012-03-02 18:31:07 +05:30
|
|
|
e->begin_superblock("", md->sb_.time_,
|
|
|
|
md->sb_.trans_id_,
|
|
|
|
md->sb_.data_block_size_,
|
2012-05-17 17:35:26 +05:30
|
|
|
md->data_sm_->get_nr_blocks(),
|
|
|
|
md_snap);
|
2011-10-10 20:44:36 +05:30
|
|
|
|
2013-05-02 17:01:33 +05:30
|
|
|
details_extractor de;
|
2013-05-01 20:46:23 +05:30
|
|
|
md->details_->visit_depth_first(de);
|
2013-05-02 17:01:33 +05:30
|
|
|
if (de.corruption() && !repair)
|
2012-03-02 15:30:31 +05:30
|
|
|
throw runtime_error("corruption in device details tree");
|
|
|
|
|
2013-05-20 21:05:26 +05:30
|
|
|
map<uint64_t, device_tree_detail::device_details> const &devs = de.get_devices();
|
2011-10-10 18:40:30 +05:30
|
|
|
|
2013-05-20 21:05:26 +05:30
|
|
|
map<uint64_t, device_tree_detail::device_details>::const_iterator it, end = devs.end();
|
2011-10-10 18:40:30 +05:30
|
|
|
for (it = devs.begin(); it != end; ++it) {
|
|
|
|
uint64_t dev_id = it->first;
|
2013-05-20 21:05:26 +05:30
|
|
|
device_tree_detail::device_details const &dd = it->second;
|
2011-10-10 18:40:30 +05:30
|
|
|
|
|
|
|
e->begin_device(dev_id,
|
|
|
|
dd.mapped_blocks_,
|
|
|
|
dd.transaction_id_,
|
|
|
|
dd.creation_time_,
|
|
|
|
dd.snapshotted_time_);
|
|
|
|
|
2013-05-02 17:01:33 +05:30
|
|
|
mappings_extractor me(dev_id, e, md->metadata_sm_, md->data_sm_);
|
2013-05-01 20:46:23 +05:30
|
|
|
md->mappings_->visit_depth_first(me);
|
2011-10-10 18:40:30 +05:30
|
|
|
|
2013-05-02 17:01:33 +05:30
|
|
|
if (me.corruption() && !repair) {
|
2012-03-02 15:30:31 +05:30
|
|
|
ostringstream out;
|
|
|
|
out << "corruption in mappings for device " << dev_id;
|
|
|
|
throw runtime_error(out.str());
|
|
|
|
}
|
|
|
|
|
2011-10-10 18:40:30 +05:30
|
|
|
e->end_device();
|
|
|
|
}
|
2011-10-10 20:44:36 +05:30
|
|
|
|
|
|
|
e->end_superblock();
|
2011-10-10 18:40:30 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
//----------------------------------------------------------------
|