Home php教程 PHP开发 Device Mapper mechanism in Linux system kernel (1) (5)

Device Mapper mechanism in Linux system kernel (1) (5)

Dec 23, 2016 pm 02:11 PM

The user space part of the device mapper is optional for developers to implement their own storage management tools. In fact, many of our common logical volume managers, such as LVM2, dmraid and other tools, use the device provided by the device mapper The mapper user space library establishes an independent set of management tools based on its own management needs, but does not use the dmsetup tool it provides. Even IBM's open source project enterprise-level logical volume management system-EVMS does not use device in its implementation. The user space library of mapper implements its own function library completely based on the ioctl definition in the kernel.

Target Driver

Device mapper provides a unified architecture that allows users to specify their own IO processing rules according to actual needs through the target driver plug-in. Therefore, the target driver fully embodies the flexibility of the device mapper. In the above, we have mentioned the target driver more than once and described the functions of the target driver. Here we will introduce the implementation of the target driver in detail with the simplest linear target driver.

Target driver mainly defines the processing rules for IO requests. In the device mapper, a unified interface has been defined for the operation of the target driver. In the implementation, the interface is defined by the target_type structure we mentioned above, which defines The following target driver methods:

1. Method of building target device;

2. Method of deleting target device;

3. Target’s method of mapping IO requests;

4. Target’s method of ending IO requests;

5. Method to pause target device reading and writing;

6. Restore target device reading and writing access;

7. Access to obtain current target device status;

8. Target's method to process user messages;

Users can The above methods can be selectively implemented according to specific needs, but generally at least the first three methods must be implemented, otherwise it will not work properly under the device mapper. The linear target driver only implements the first three methods and method 7. It completes the linear mapping from the logical address space to the physical address space, and can form a logical device by linearly connecting multiple physical devices, as described in Figure 4. As in, the three continuous spaces of /dev/sda, /dev/sdb, and /dev/sdc are formed into a large logical block device through the linear target driver. The implementation of Linear target is very simple. Its creation and deletion methods mainly complete the application and release of memory resources describing the structure used by linear target device; the implementation of IO mapping processing method is even simpler, as shown in the following code:

static int linear_map(struct dm_target *ti, struct bio *bio,

        union map_info *map_context)

{

 struct linear_c *lc = (struct linear_c *) ti->private;

 bio->bi_bdev = lc->dev->bdev;

 bio->bi_sector = lc->start + (bio->bi_sector - ti->begin);

 return 1;

}
Copy after login

The mapping method is The bio request sent to the logical device mapped device is redirected in a linear manner to the corresponding location of the physical device represented by the linear target device according to the mapping relationship. As shown in the code, the specific implementation method is to modify the bi_bdev device pointer of bio to correspond to the target device. The device pointer, and changes the sector number bi_sector where the IO request starts based on the starting address of the target device and the offset value of the bio request on the mapped device device, thereby completing the redirection of the IO request. The implementation of other target drivers is also similar. You can implement it according to the interface specifications defined by the device mapper and combine the functions you need. I will not introduce them one by one here. Interested readers can see the specific target driver code in the kernel.

(T114)

The above is the content of Device Mapper mechanism (1) (5) in the Linux system kernel. For more related content, please pay attention to the PHP Chinese website (www.php.cn)!


Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Using Task Manager in Linux Using Task Manager in Linux Aug 15, 2024 am 07:30 AM

There are many questions that Linux beginners often ask, "Does Linux have a Task Manager?", "How to open the Task Manager on Linux?" Users from Windows know that the Task Manager is very useful. You can open the Task Manager by pressing Ctrl+Alt+Del in Windows. This task manager shows you all the running processes and the memory they consume, and you can select and kill a process from the task manager program. When you first use Linux, you will also look for something that is equivalent to a task manager in Linux. A Linux expert prefers to use the command line to find processes, memory consumption, etc., but you don't have to

Solve the problem of garbled display of graphs and charts on Zabbix Chinese monitoring server Solve the problem of garbled display of graphs and charts on Zabbix Chinese monitoring server Jul 31, 2024 pm 02:10 PM

Zabbix's support for Chinese is not very good, but sometimes we still choose Chinese for management purposes. In the web interface monitored by Zabbix, the Chinese under the graphic icon will display small squares. This is incorrect and requires downloading fonts. For example, "Microsoft Yahei", "Microsoft Yahei.ttf" is named "msyh.ttf", upload the downloaded font to /zabbix/fonts/fonts and modify the two characters in the /zabbix/include/defines.inc.php file at define('ZBX_GRAPH_FONT_NAME','DejaVuSans');define('ZBX_FONT_NAME'

7 ways to help you check the registration date of Linux users 7 ways to help you check the registration date of Linux users Aug 24, 2024 am 07:31 AM

Did you know, how to check the creation date of an account on a Linux system? If you know, what can you do? Did you succeed? If yes, how to do it? Basically Linux systems don't track this information, so what are the alternative ways to get this information? You may ask why am I checking this? Yes, there are situations where you may need to review this information and it will be helpful to you at that time. You can use the following 7 methods to verify. Use /var/log/secure Use aureport tool Use .bash_logout Use chage command Use useradd command Use passwd command Use last command Method 1: Use /var/l

What should I do if the WPS missing fonts under the Linux system causes the file to be garbled? What should I do if the WPS missing fonts under the Linux system causes the file to be garbled? Jul 31, 2024 am 12:41 AM

1. Find the fonts wingdings, wingdings2, wingdings3, Webdings, and MTExtra from the Internet. 2. Enter the main folder, press Ctrl+h (show hidden files), and check if there is a .fonts folder. If not, create one. 3. Copy the downloaded fonts such as wingdings, wingdings2, wingdings3, Webdings, and MTExtra to the .fonts folder in the main folder. Then start wps to see if there is still a "System missing font..." reminder dialog box. If not, just Success! Notes: wingdings, wingdin

Teach you how to add fonts to Fedora in 5 minutes Teach you how to add fonts to Fedora in 5 minutes Jul 23, 2024 am 09:45 AM

System-wide installation If you install a font system-wide, it will be available to all users. The best way to do this is to use RPM packages from the official software repositories. Before starting, open the "Software" tool in Fedora Workstation, or other tools using the official repository. Select the "Add-ons" category in the selection bar. Then select "Fonts" within the category. You'll see the available fonts similar to the ones in the screenshot below: When you select a font, some details will appear. Depending on several scenarios, you may be able to preview some sample text for the font. Click the "Install" button to add it to your system. Depending on system speed and network bandwidth, this process may take some time to complete

toss! Running DOS on Raspberry Pi toss! Running DOS on Raspberry Pi Jul 19, 2024 pm 05:23 PM

Different CPU architectures mean that running DOS on the Raspberry Pi is not easy, but it is not much trouble. FreeDOS may be familiar to everyone. It is a complete, free and well-compatible operating system for DOS. It can run some older DOS games or commercial software, and can also develop embedded applications. As long as the program can run on MS-DOS, it can run on FreeDOS. As the initiator and project coordinator of FreeDOS, many users will ask me questions as an insider. The question I get asked most often is: "Can FreeDOS run on a Raspberry Pi?" This question is not surprising. After all, Linux runs very well on the Raspberry Pi

How to connect two Ubuntu hosts to the Internet using one network cable How to connect two Ubuntu hosts to the Internet using one network cable Aug 07, 2024 pm 01:39 PM

How to use one network cable to connect two ubuntu hosts to the Internet 1. Prepare host A: ubuntu16.04 and host B: ubuntu16.042. Host A has two network cards, one is connected to the external network and the other is connected to host B. Use the iwconfig command to view all network cards on the host. As shown above, the network cards on the author's A host (laptop) are: wlp2s0: This is a wireless network card. enp1s0: Wired network card, the network card connected to host B. The rest has nothing to do with us, no need to care. 3. Configure the static IP of A. Edit the file #vim/etc/network/interfaces to configure a static IP address for interface enp1s0, as shown below (where #==========

How to hide your Linux command line history How to hide your Linux command line history Aug 17, 2024 am 07:34 AM

If you are a Linux command line user, sometimes you may not want certain commands to be recorded in your command line history. There could be many reasons, for example, you hold a certain position in a company and you have certain privileges that you don't want others to abuse. Or maybe there are some particularly important commands that you don't want to execute by mistake while browsing the history list. However, is there a way to control which commands go into the history list and which don't? Or in other words, can we enable incognito mode like a browser in a Linux terminal? The answer is yes, and depending on the specific goals you want, there are many ways to achieve it. In this article, we’ll discuss some proven methods. Note: All commands appearing in this article have been tested under Ubuntu. different

See all articles