4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License version 2 for more details (a copy is included
14 * in the LICENSE file that accompanied this code).
16 * You should have received a copy of the GNU General Public License
17 * version 2 along with this program; If not, see
18 * http://www.sun.com/software/products/lustre/docs/GPLv2.pdf
20 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
21 * CA 95054 USA or visit www.sun.com if you need additional information or
27 * Copyright (c) 2008, 2010, Oracle and/or its affiliates. All rights reserved.
28 * Use is subject to license terms.
30 * Copyright (c) 2011, 2012, Whamcloud, Inc.
33 * This file is part of Lustre, http://www.lustre.org/
34 * Lustre is a trademark of Sun Microsystems, Inc.
36 * cl code shared between vvp and liblustre (and other Lustre clients in the
39 * Author: Nikita Danilov <nikita.danilov@sun.com>
42 #define DEBUG_SUBSYSTEM S_LLITE
45 # include <libcfs/libcfs.h>
46 # include <linux/fs.h>
47 # include <linux/sched.h>
48 # include <linux/mm.h>
49 # include <linux/smp_lock.h>
50 # include <linux/quotaops.h>
51 # include <linux/highmem.h>
52 # include <linux/pagemap.h>
53 # include <linux/rbtree.h>
54 #else /* __KERNEL__ */
59 #include <sys/types.h>
61 #include <sys/queue.h>
63 # include <liblustre.h>
67 #include <obd_support.h>
68 #include <lustre_fid.h>
69 #include <lustre_lite.h>
70 #include <lustre_dlm.h>
71 #include <lustre_ver.h>
72 #include <lustre_mdc.h>
73 #include <cl_object.h>
78 #include "../llite/llite_internal.h"
80 #include "../liblustre/llite_lib.h"
83 const struct cl_req_operations ccc_req_ops;
86 * ccc_ prefix stands for "Common Client Code".
89 static cfs_mem_cache_t *ccc_lock_kmem;
90 static cfs_mem_cache_t *ccc_object_kmem;
91 static cfs_mem_cache_t *ccc_thread_kmem;
92 static cfs_mem_cache_t *ccc_session_kmem;
93 static cfs_mem_cache_t *ccc_req_kmem;
95 static struct lu_kmem_descr ccc_caches[] = {
97 .ckd_cache = &ccc_lock_kmem,
98 .ckd_name = "ccc_lock_kmem",
99 .ckd_size = sizeof (struct ccc_lock)
102 .ckd_cache = &ccc_object_kmem,
103 .ckd_name = "ccc_object_kmem",
104 .ckd_size = sizeof (struct ccc_object)
107 .ckd_cache = &ccc_thread_kmem,
108 .ckd_name = "ccc_thread_kmem",
109 .ckd_size = sizeof (struct ccc_thread_info),
112 .ckd_cache = &ccc_session_kmem,
113 .ckd_name = "ccc_session_kmem",
114 .ckd_size = sizeof (struct ccc_session)
117 .ckd_cache = &ccc_req_kmem,
118 .ckd_name = "ccc_req_kmem",
119 .ckd_size = sizeof (struct ccc_req)
126 /*****************************************************************************
128 * Vvp device and device type functions.
132 void *ccc_key_init(const struct lu_context *ctx,
133 struct lu_context_key *key)
135 struct ccc_thread_info *info;
137 OBD_SLAB_ALLOC_PTR_GFP(info, ccc_thread_kmem, CFS_ALLOC_IO);
139 info = ERR_PTR(-ENOMEM);
143 void ccc_key_fini(const struct lu_context *ctx,
144 struct lu_context_key *key, void *data)
146 struct ccc_thread_info *info = data;
147 OBD_SLAB_FREE_PTR(info, ccc_thread_kmem);
150 void *ccc_session_key_init(const struct lu_context *ctx,
151 struct lu_context_key *key)
153 struct ccc_session *session;
155 OBD_SLAB_ALLOC_PTR_GFP(session, ccc_session_kmem, CFS_ALLOC_IO);
157 session = ERR_PTR(-ENOMEM);
161 void ccc_session_key_fini(const struct lu_context *ctx,
162 struct lu_context_key *key, void *data)
164 struct ccc_session *session = data;
165 OBD_SLAB_FREE_PTR(session, ccc_session_kmem);
168 struct lu_context_key ccc_key = {
169 .lct_tags = LCT_CL_THREAD,
170 .lct_init = ccc_key_init,
171 .lct_fini = ccc_key_fini
174 struct lu_context_key ccc_session_key = {
175 .lct_tags = LCT_SESSION,
176 .lct_init = ccc_session_key_init,
177 .lct_fini = ccc_session_key_fini
181 /* type constructor/destructor: ccc_type_{init,fini,start,stop}(). */
182 // LU_TYPE_INIT_FINI(ccc, &ccc_key, &ccc_session_key);
184 int ccc_device_init(const struct lu_env *env, struct lu_device *d,
185 const char *name, struct lu_device *next)
187 struct ccc_device *vdv;
192 vdv->cdv_next = lu2cl_dev(next);
194 LASSERT(d->ld_site != NULL && next->ld_type != NULL);
195 next->ld_site = d->ld_site;
196 rc = next->ld_type->ldt_ops->ldto_device_init(
197 env, next, next->ld_type->ldt_name, NULL);
200 lu_ref_add(&next->ld_reference, "lu-stack", &lu_site_init);
205 struct lu_device *ccc_device_fini(const struct lu_env *env,
208 return cl2lu_dev(lu2ccc_dev(d)->cdv_next);
211 struct lu_device *ccc_device_alloc(const struct lu_env *env,
212 struct lu_device_type *t,
213 struct lustre_cfg *cfg,
214 const struct lu_device_operations *luops,
215 const struct cl_device_operations *clops)
217 struct ccc_device *vdv;
218 struct lu_device *lud;
219 struct cl_site *site;
225 RETURN(ERR_PTR(-ENOMEM));
227 lud = &vdv->cdv_cl.cd_lu_dev;
228 cl_device_init(&vdv->cdv_cl, t);
229 ccc2lu_dev(vdv)->ld_ops = luops;
230 vdv->cdv_cl.cd_ops = clops;
234 rc = cl_site_init(site, &vdv->cdv_cl);
236 rc = lu_site_init_finish(&site->cs_lu);
238 LASSERT(lud->ld_site == NULL);
239 CERROR("Cannot init lu_site, rc %d.\n", rc);
245 ccc_device_free(env, lud);
251 struct lu_device *ccc_device_free(const struct lu_env *env,
254 struct ccc_device *vdv = lu2ccc_dev(d);
255 struct cl_site *site = lu2cl_site(d->ld_site);
256 struct lu_device *next = cl2lu_dev(vdv->cdv_next);
258 if (d->ld_site != NULL) {
262 cl_device_fini(lu2cl_dev(d));
267 int ccc_req_init(const struct lu_env *env, struct cl_device *dev,
273 OBD_SLAB_ALLOC_PTR_GFP(vrq, ccc_req_kmem, CFS_ALLOC_IO);
275 cl_req_slice_add(req, &vrq->crq_cl, dev, &ccc_req_ops);
283 * An `emergency' environment used by ccc_inode_fini() when cl_env_get()
284 * fails. Access to this environment is serialized by ccc_inode_fini_guard
287 static struct lu_env *ccc_inode_fini_env = NULL;
290 * A mutex serializing calls to slp_inode_fini() under extreme memory
291 * pressure, when environments cannot be allocated.
293 static CFS_DEFINE_MUTEX(ccc_inode_fini_guard);
294 static int dummy_refcheck;
296 int ccc_global_init(struct lu_device_type *device_type)
300 result = lu_kmem_init(ccc_caches);
304 result = lu_device_type_init(device_type);
308 ccc_inode_fini_env = cl_env_alloc(&dummy_refcheck,
309 LCT_REMEMBER|LCT_NOREF);
310 if (IS_ERR(ccc_inode_fini_env)) {
311 result = PTR_ERR(ccc_inode_fini_env);
315 ccc_inode_fini_env->le_ctx.lc_cookie = 0x4;
318 lu_device_type_fini(device_type);
320 lu_kmem_fini(ccc_caches);
324 void ccc_global_fini(struct lu_device_type *device_type)
326 if (ccc_inode_fini_env != NULL) {
327 cl_env_put(ccc_inode_fini_env, &dummy_refcheck);
328 ccc_inode_fini_env = NULL;
330 lu_device_type_fini(device_type);
331 lu_kmem_fini(ccc_caches);
334 /*****************************************************************************
340 struct lu_object *ccc_object_alloc(const struct lu_env *env,
341 const struct lu_object_header *unused,
342 struct lu_device *dev,
343 const struct cl_object_operations *clops,
344 const struct lu_object_operations *luops)
346 struct ccc_object *vob;
347 struct lu_object *obj;
349 OBD_SLAB_ALLOC_PTR_GFP(vob, ccc_object_kmem, CFS_ALLOC_IO);
351 struct cl_object_header *hdr;
354 hdr = &vob->cob_header;
355 cl_object_header_init(hdr);
356 lu_object_init(obj, &hdr->coh_lu, dev);
357 lu_object_add_top(&hdr->coh_lu, obj);
359 vob->cob_cl.co_ops = clops;
366 int ccc_object_init0(const struct lu_env *env,
367 struct ccc_object *vob,
368 const struct cl_object_conf *conf)
370 vob->cob_inode = conf->coc_inode;
371 vob->cob_transient_pages = 0;
375 int ccc_object_init(const struct lu_env *env, struct lu_object *obj,
376 const struct lu_object_conf *conf)
378 struct ccc_device *dev = lu2ccc_dev(obj->lo_dev);
379 struct ccc_object *vob = lu2ccc(obj);
380 struct lu_object *below;
381 struct lu_device *under;
384 under = &dev->cdv_next->cd_lu_dev;
385 below = under->ld_ops->ldo_object_alloc(env, obj->lo_header, under);
387 const struct cl_object_conf *cconf;
389 cconf = lu2cl_conf(conf);
390 CFS_INIT_LIST_HEAD(&vob->cob_pending_list);
391 lu_object_add(obj, below);
392 result = ccc_object_init0(env, vob, cconf);
398 void ccc_object_free(const struct lu_env *env, struct lu_object *obj)
400 struct ccc_object *vob = lu2ccc(obj);
403 lu_object_header_fini(obj->lo_header);
404 OBD_SLAB_FREE_PTR(vob, ccc_object_kmem);
407 int ccc_lock_init(const struct lu_env *env,
408 struct cl_object *obj, struct cl_lock *lock,
409 const struct cl_io *unused,
410 const struct cl_lock_operations *lkops)
412 struct ccc_lock *clk;
415 CLOBINVRNT(env, obj, ccc_object_invariant(obj));
417 OBD_SLAB_ALLOC_PTR_GFP(clk, ccc_lock_kmem, CFS_ALLOC_IO);
419 cl_lock_slice_add(lock, &clk->clk_cl, obj, lkops);
426 int ccc_attr_set(const struct lu_env *env, struct cl_object *obj,
427 const struct cl_attr *attr, unsigned valid)
432 int ccc_object_glimpse(const struct lu_env *env,
433 const struct cl_object *obj, struct ost_lvb *lvb)
435 struct inode *inode = ccc_object_inode(obj);
438 lvb->lvb_mtime = cl_inode_mtime(inode);
439 lvb->lvb_atime = cl_inode_atime(inode);
440 lvb->lvb_ctime = cl_inode_ctime(inode);
442 * LU-417: Add dirty pages block count lest i_blocks reports 0, some
443 * "cp" or "tar" on remote node may think it's a completely sparse file
446 if (lvb->lvb_size > 0 && lvb->lvb_blocks == 0)
447 lvb->lvb_blocks = dirty_cnt(inode);
453 int ccc_conf_set(const struct lu_env *env, struct cl_object *obj,
454 const struct cl_object_conf *conf)
456 /* TODO: destroy all pages attached to this object. */
460 static void ccc_object_size_lock(struct cl_object *obj)
462 struct inode *inode = ccc_object_inode(obj);
464 cl_isize_lock(inode);
465 cl_object_attr_lock(obj);
468 static void ccc_object_size_unlock(struct cl_object *obj)
470 struct inode *inode = ccc_object_inode(obj);
472 cl_object_attr_unlock(obj);
473 cl_isize_unlock(inode);
476 /*****************************************************************************
482 cfs_page_t *ccc_page_vmpage(const struct lu_env *env,
483 const struct cl_page_slice *slice)
485 return cl2vm_page(slice);
488 int ccc_page_is_under_lock(const struct lu_env *env,
489 const struct cl_page_slice *slice,
492 struct ccc_io *cio = ccc_env_io(env);
493 struct cl_lock_descr *desc = &ccc_env_info(env)->cti_descr;
494 struct cl_page *page = slice->cpl_page;
500 if (io->ci_type == CIT_READ || io->ci_type == CIT_WRITE ||
501 io->ci_type == CIT_FAULT) {
502 if (cio->cui_fd->fd_flags & LL_FILE_GROUP_LOCKED)
505 desc->cld_start = page->cp_index;
506 desc->cld_end = page->cp_index;
507 desc->cld_obj = page->cp_obj;
508 desc->cld_mode = CLM_READ;
509 result = cl_queue_match(&io->ci_lockset.cls_done,
517 int ccc_fail(const struct lu_env *env, const struct cl_page_slice *slice)
526 void ccc_transient_page_verify(const struct cl_page *page)
530 int ccc_transient_page_own(const struct lu_env *env,
531 const struct cl_page_slice *slice,
532 struct cl_io *unused,
535 ccc_transient_page_verify(slice->cpl_page);
539 void ccc_transient_page_assume(const struct lu_env *env,
540 const struct cl_page_slice *slice,
541 struct cl_io *unused)
543 ccc_transient_page_verify(slice->cpl_page);
546 void ccc_transient_page_unassume(const struct lu_env *env,
547 const struct cl_page_slice *slice,
548 struct cl_io *unused)
550 ccc_transient_page_verify(slice->cpl_page);
553 void ccc_transient_page_disown(const struct lu_env *env,
554 const struct cl_page_slice *slice,
555 struct cl_io *unused)
557 ccc_transient_page_verify(slice->cpl_page);
560 void ccc_transient_page_discard(const struct lu_env *env,
561 const struct cl_page_slice *slice,
562 struct cl_io *unused)
564 struct cl_page *page = slice->cpl_page;
566 ccc_transient_page_verify(slice->cpl_page);
569 * For transient pages, remove it from the radix tree.
571 cl_page_delete(env, page);
574 int ccc_transient_page_prep(const struct lu_env *env,
575 const struct cl_page_slice *slice,
576 struct cl_io *unused)
579 /* transient page should always be sent. */
583 /*****************************************************************************
589 void ccc_lock_delete(const struct lu_env *env,
590 const struct cl_lock_slice *slice)
592 CLOBINVRNT(env, slice->cls_obj, ccc_object_invariant(slice->cls_obj));
595 void ccc_lock_fini(const struct lu_env *env, struct cl_lock_slice *slice)
597 struct ccc_lock *clk = cl2ccc_lock(slice);
598 OBD_SLAB_FREE_PTR(clk, ccc_lock_kmem);
601 int ccc_lock_enqueue(const struct lu_env *env,
602 const struct cl_lock_slice *slice,
603 struct cl_io *unused, __u32 enqflags)
605 CLOBINVRNT(env, slice->cls_obj, ccc_object_invariant(slice->cls_obj));
609 int ccc_lock_unuse(const struct lu_env *env, const struct cl_lock_slice *slice)
611 CLOBINVRNT(env, slice->cls_obj, ccc_object_invariant(slice->cls_obj));
615 int ccc_lock_wait(const struct lu_env *env, const struct cl_lock_slice *slice)
617 CLOBINVRNT(env, slice->cls_obj, ccc_object_invariant(slice->cls_obj));
622 * Implementation of cl_lock_operations::clo_fits_into() methods for ccc
623 * layer. This function is executed every time io finds an existing lock in
624 * the lock cache while creating new lock. This function has to decide whether
625 * cached lock "fits" into io.
627 * \param slice lock to be checked
628 * \param io IO that wants a lock.
630 * \see lov_lock_fits_into().
632 int ccc_lock_fits_into(const struct lu_env *env,
633 const struct cl_lock_slice *slice,
634 const struct cl_lock_descr *need,
635 const struct cl_io *io)
637 const struct cl_lock *lock = slice->cls_lock;
638 const struct cl_lock_descr *descr = &lock->cll_descr;
639 const struct ccc_io *cio = ccc_env_io(env);
644 * Work around DLM peculiarity: it assumes that glimpse
645 * (LDLM_FL_HAS_INTENT) lock is always LCK_PR, and returns reads lock
646 * when asked for LCK_PW lock with LDLM_FL_HAS_INTENT flag set. Make
647 * sure that glimpse doesn't get CLM_WRITE top-lock, so that it
648 * doesn't enqueue CLM_WRITE sub-locks.
650 if (cio->cui_glimpse)
651 result = descr->cld_mode != CLM_WRITE;
654 * Also, don't match incomplete write locks for read, otherwise read
655 * would enqueue missing sub-locks in the write mode.
657 else if (need->cld_mode != descr->cld_mode)
658 result = lock->cll_state >= CLS_ENQUEUED;
665 * Implements cl_lock_operations::clo_state() method for ccc layer, invoked
666 * whenever lock state changes. Transfers object attributes, that might be
667 * updated as a result of lock acquiring into inode.
669 void ccc_lock_state(const struct lu_env *env,
670 const struct cl_lock_slice *slice,
671 enum cl_lock_state state)
673 struct cl_lock *lock;
674 struct cl_object *obj;
676 struct cl_attr *attr;
679 lock = slice->cls_lock;
682 * Refresh inode attributes when the lock is moving into CLS_HELD
683 * state, and only when this is a result of real enqueue, rather than
684 * of finding lock in the cache.
686 if (state == CLS_HELD && lock->cll_state < CLS_HELD) {
689 obj = slice->cls_obj;
690 inode = ccc_object_inode(obj);
691 attr = ccc_env_thread_attr(env);
693 /* vmtruncate()->ll_truncate() first sets the i_size and then
694 * the kms under both a DLM lock and the
695 * ll_inode_size_lock(). If we don't get the
696 * ll_inode_size_lock() here we can match the DLM lock and
697 * reset i_size from the kms before the truncating path has
698 * updated the kms. generic_file_write can then trust the
699 * stale i_size when doing appending writes and effectively
700 * cancel the result of the truncate. Getting the
701 * ll_inode_size_lock() after the enqueue maintains the DLM
702 * -> ll_inode_size_lock() acquiring order. */
703 ccc_object_size_lock(obj);
704 rc = cl_object_attr_get(env, obj, attr);
706 if (lock->cll_descr.cld_start == 0 &&
707 lock->cll_descr.cld_end == CL_PAGE_EOF) {
708 cl_isize_write_nolock(inode, attr->cat_kms);
709 CDEBUG(D_INODE|D_VFSTRACE,
710 DFID" updating i_size "LPU64"\n",
711 PFID(lu_object_fid(&obj->co_lu)),
712 (__u64)cl_isize_read(inode));
714 cl_inode_mtime(inode) = attr->cat_mtime;
715 cl_inode_atime(inode) = attr->cat_atime;
716 cl_inode_ctime(inode) = attr->cat_ctime;
718 CL_LOCK_DEBUG(D_INFO, env, lock, "attr_get: %d\n", rc);
720 ccc_object_size_unlock(obj);
725 /*****************************************************************************
731 void ccc_io_fini(const struct lu_env *env, const struct cl_io_slice *ios)
733 struct cl_io *io = ios->cis_io;
735 CLOBINVRNT(env, io->ci_obj, ccc_object_invariant(io->ci_obj));
738 int ccc_io_one_lock_index(const struct lu_env *env, struct cl_io *io,
739 __u32 enqflags, enum cl_lock_mode mode,
740 pgoff_t start, pgoff_t end)
742 struct ccc_io *cio = ccc_env_io(env);
743 struct cl_lock_descr *descr = &cio->cui_link.cill_descr;
744 struct cl_object *obj = io->ci_obj;
746 CLOBINVRNT(env, obj, ccc_object_invariant(obj));
749 CDEBUG(D_VFSTRACE, "lock: %d [%lu, %lu]\n", mode, start, end);
751 memset(&cio->cui_link, 0, sizeof cio->cui_link);
753 if (cio->cui_fd && (cio->cui_fd->fd_flags & LL_FILE_GROUP_LOCKED)) {
754 descr->cld_mode = CLM_GROUP;
755 descr->cld_gid = cio->cui_fd->fd_grouplock.cg_gid;
757 descr->cld_mode = mode;
759 descr->cld_obj = obj;
760 descr->cld_start = start;
761 descr->cld_end = end;
762 descr->cld_enq_flags = enqflags;
764 cl_io_lock_add(env, io, &cio->cui_link);
768 void ccc_io_update_iov(const struct lu_env *env,
769 struct ccc_io *cio, struct cl_io *io)
772 size_t size = io->u.ci_rw.crw_count;
774 cio->cui_iov_olen = 0;
775 if (!cl_is_normalio(env, io))
778 for (i = 0; i < cio->cui_tot_nrsegs; i++) {
779 struct iovec *iv = &cio->cui_iov[i];
781 if (iv->iov_len < size)
784 if (iv->iov_len > size) {
785 cio->cui_iov_olen = iv->iov_len;
792 cio->cui_nrsegs = i + 1;
795 int ccc_io_one_lock(const struct lu_env *env, struct cl_io *io,
796 __u32 enqflags, enum cl_lock_mode mode,
797 loff_t start, loff_t end)
799 struct cl_object *obj = io->ci_obj;
800 return ccc_io_one_lock_index(env, io, enqflags, mode,
801 cl_index(obj, start), cl_index(obj, end));
804 void ccc_io_end(const struct lu_env *env, const struct cl_io_slice *ios)
806 CLOBINVRNT(env, ios->cis_io->ci_obj,
807 ccc_object_invariant(ios->cis_io->ci_obj));
810 void ccc_io_advance(const struct lu_env *env,
811 const struct cl_io_slice *ios,
814 struct ccc_io *cio = cl2ccc_io(env, ios);
815 struct cl_io *io = ios->cis_io;
816 struct cl_object *obj = ios->cis_io->ci_obj;
818 CLOBINVRNT(env, obj, ccc_object_invariant(obj));
820 if (cl_is_normalio(env, io) && io->ci_continue) {
822 LASSERT(cio->cui_tot_nrsegs >= cio->cui_nrsegs);
823 LASSERT(cio->cui_tot_count >= nob);
825 cio->cui_iov += cio->cui_nrsegs;
826 cio->cui_tot_nrsegs -= cio->cui_nrsegs;
827 cio->cui_tot_count -= nob;
829 if (cio->cui_iov_olen) {
833 cio->cui_tot_nrsegs++;
834 iv = &cio->cui_iov[0];
835 iv->iov_base += iv->iov_len;
836 LASSERT(cio->cui_iov_olen > iv->iov_len);
837 iv->iov_len = cio->cui_iov_olen - iv->iov_len;
843 * Helper function that if necessary adjusts file size (inode->i_size), when
844 * position at the offset \a pos is accessed. File size can be arbitrary stale
845 * on a Lustre client, but client at least knows KMS. If accessed area is
846 * inside [0, KMS], set file size to KMS, otherwise glimpse file size.
848 * Locking: cl_isize_lock is used to serialize changes to inode size and to
849 * protect consistency between inode size and cl_object
850 * attributes. cl_object_size_lock() protects consistency between cl_attr's of
851 * top-object and sub-objects.
853 int ccc_prep_size(const struct lu_env *env, struct cl_object *obj,
854 struct cl_io *io, loff_t start, size_t count, int *exceed)
856 struct cl_attr *attr = ccc_env_thread_attr(env);
857 struct inode *inode = ccc_object_inode(obj);
858 loff_t pos = start + count - 1;
863 * Consistency guarantees: following possibilities exist for the
864 * relation between region being accessed and real file size at this
867 * (A): the region is completely inside of the file;
869 * (B-x): x bytes of region are inside of the file, the rest is
872 * (C): the region is completely outside of the file.
874 * This classification is stable under DLM lock already acquired by
875 * the caller, because to change the class, other client has to take
876 * DLM lock conflicting with our lock. Also, any updates to ->i_size
877 * by other threads on this client are serialized by
878 * ll_inode_size_lock(). This guarantees that short reads are handled
879 * correctly in the face of concurrent writes and truncates.
881 ccc_object_size_lock(obj);
882 result = cl_object_attr_get(env, obj, attr);
887 * A glimpse is necessary to determine whether we
888 * return a short read (B) or some zeroes at the end
891 ccc_object_size_unlock(obj);
892 result = cl_glimpse_lock(env, io, inode, obj, 0);
893 if (result == 0 && exceed != NULL) {
894 /* If objective page index exceed end-of-file
895 * page index, return directly. Do not expect
896 * kernel will check such case correctly.
897 * linux-2.6.18-128.1.1 miss to do that.
899 loff_t size = cl_isize_read(inode);
900 unsigned long cur_index = start >> CFS_PAGE_SHIFT;
902 if ((size == 0 && cur_index != 0) ||
903 (((size - 1) >> CFS_PAGE_SHIFT) < cur_index))
909 * region is within kms and, hence, within real file
910 * size (A). We need to increase i_size to cover the
911 * read region so that generic_file_read() will do its
912 * job, but that doesn't mean the kms size is
913 * _correct_, it is only the _minimum_ size. If
914 * someone does a stat they will get the correct size
915 * which will always be >= the kms value here.
918 if (cl_isize_read(inode) < kms) {
919 cl_isize_write_nolock(inode, kms);
921 DFID" updating i_size "LPU64"\n",
922 PFID(lu_object_fid(&obj->co_lu)),
923 (__u64)cl_isize_read(inode));
928 ccc_object_size_unlock(obj);
932 /*****************************************************************************
934 * Transfer operations.
938 void ccc_req_completion(const struct lu_env *env,
939 const struct cl_req_slice *slice, int ioret)
944 cl_stats_tally(slice->crs_dev, slice->crs_req->crq_type, ioret);
946 vrq = cl2ccc_req(slice);
947 OBD_SLAB_FREE_PTR(vrq, ccc_req_kmem);
951 * Implementation of struct cl_req_operations::cro_attr_set() for ccc
952 * layer. ccc is responsible for
970 void ccc_req_attr_set(const struct lu_env *env,
971 const struct cl_req_slice *slice,
972 const struct cl_object *obj,
973 struct cl_req_attr *attr, obd_valid flags)
977 obd_flag valid_flags;
980 inode = ccc_object_inode(obj);
981 valid_flags = OBD_MD_FLTYPE;
983 if ((flags & OBD_MD_FLOSSCAPA) != 0) {
984 LASSERT(attr->cra_capa == NULL);
985 attr->cra_capa = cl_capa_lookup(inode,
986 slice->crs_req->crq_type);
989 if (slice->crs_req->crq_type == CRT_WRITE) {
990 if (flags & OBD_MD_FLEPOCH) {
991 oa->o_valid |= OBD_MD_FLEPOCH;
992 oa->o_ioepoch = cl_i2info(inode)->lli_ioepoch;
993 valid_flags |= OBD_MD_FLMTIME | OBD_MD_FLCTIME |
994 OBD_MD_FLUID | OBD_MD_FLGID;
997 obdo_from_inode(oa, inode, valid_flags & flags);
998 obdo_set_parent_fid(oa, &cl_i2info(inode)->lli_fid);
1000 memcpy(attr->cra_jobid, cl_i2info(inode)->lli_jobid,
1001 JOBSTATS_JOBID_SIZE);
1005 const struct cl_req_operations ccc_req_ops = {
1006 .cro_attr_set = ccc_req_attr_set,
1007 .cro_completion = ccc_req_completion
1010 int cl_setattr_ost(struct inode *inode, const struct iattr *attr,
1011 struct obd_capa *capa)
1020 env = cl_env_get(&refcheck);
1022 RETURN(PTR_ERR(env));
1024 io = ccc_env_thread_io(env);
1025 io->ci_obj = cl_i2info(inode)->lli_clob;
1027 io->u.ci_setattr.sa_attr.lvb_atime = LTIME_S(attr->ia_atime);
1028 io->u.ci_setattr.sa_attr.lvb_mtime = LTIME_S(attr->ia_mtime);
1029 io->u.ci_setattr.sa_attr.lvb_ctime = LTIME_S(attr->ia_ctime);
1030 io->u.ci_setattr.sa_attr.lvb_size = attr->ia_size;
1031 io->u.ci_setattr.sa_valid = attr->ia_valid;
1032 io->u.ci_setattr.sa_capa = capa;
1034 if (cl_io_init(env, io, CIT_SETATTR, io->ci_obj) == 0) {
1035 struct ccc_io *cio = ccc_env_io(env);
1037 if (attr->ia_valid & ATTR_FILE)
1038 /* populate the file descriptor for ftruncate to honor
1039 * group lock - see LU-787 */
1040 cio->cui_fd = cl_iattr2fd(inode, attr);
1042 result = cl_io_loop(env, io);
1044 result = io->ci_result;
1046 cl_io_fini(env, io);
1047 cl_env_put(env, &refcheck);
1051 /*****************************************************************************
1057 struct lu_device *ccc2lu_dev(struct ccc_device *vdv)
1059 return &vdv->cdv_cl.cd_lu_dev;
1062 struct ccc_device *lu2ccc_dev(const struct lu_device *d)
1064 return container_of0(d, struct ccc_device, cdv_cl.cd_lu_dev);
1067 struct ccc_device *cl2ccc_dev(const struct cl_device *d)
1069 return container_of0(d, struct ccc_device, cdv_cl);
1072 struct lu_object *ccc2lu(struct ccc_object *vob)
1074 return &vob->cob_cl.co_lu;
1077 struct ccc_object *lu2ccc(const struct lu_object *obj)
1079 return container_of0(obj, struct ccc_object, cob_cl.co_lu);
1082 struct ccc_object *cl2ccc(const struct cl_object *obj)
1084 return container_of0(obj, struct ccc_object, cob_cl);
1087 struct ccc_lock *cl2ccc_lock(const struct cl_lock_slice *slice)
1089 return container_of(slice, struct ccc_lock, clk_cl);
1092 struct ccc_io *cl2ccc_io(const struct lu_env *env,
1093 const struct cl_io_slice *slice)
1097 cio = container_of(slice, struct ccc_io, cui_cl);
1098 LASSERT(cio == ccc_env_io(env));
1102 struct ccc_req *cl2ccc_req(const struct cl_req_slice *slice)
1104 return container_of0(slice, struct ccc_req, crq_cl);
1107 cfs_page_t *cl2vm_page(const struct cl_page_slice *slice)
1109 return cl2ccc_page(slice)->cpg_page;
1112 /*****************************************************************************
1117 int ccc_object_invariant(const struct cl_object *obj)
1119 struct inode *inode = ccc_object_inode(obj);
1120 struct cl_inode_info *lli = cl_i2info(inode);
1122 return (S_ISREG(cl_inode_mode(inode)) ||
1123 /* i_mode of unlinked inode is zeroed. */
1124 cl_inode_mode(inode) == 0) && lli->lli_clob == obj;
1127 struct inode *ccc_object_inode(const struct cl_object *obj)
1129 return cl2ccc(obj)->cob_inode;
1133 * Returns a pointer to cl_page associated with \a vmpage, without acquiring
1134 * additional reference to the resulting page. This is an unsafe version of
1135 * cl_vmpage_page() that can only be used under vmpage lock.
1137 struct cl_page *ccc_vmpage_page_transient(cfs_page_t *vmpage)
1139 KLASSERT(PageLocked(vmpage));
1140 return (struct cl_page *)vmpage->private;
1144 * Initialize or update CLIO structures for regular files when new
1145 * meta-data arrives from the server.
1147 * \param inode regular file inode
1148 * \param md new file metadata from MDS
1149 * - allocates cl_object if necessary,
1150 * - updated layout, if object was already here.
1152 int cl_file_inode_init(struct inode *inode, struct lustre_md *md)
1155 struct cl_inode_info *lli;
1156 struct cl_object *clob;
1157 struct lu_site *site;
1159 struct cl_object_conf conf = {
1168 LASSERT(md->body->valid & OBD_MD_FLID);
1169 LASSERT(S_ISREG(cl_inode_mode(inode)));
1171 env = cl_env_get(&refcheck);
1173 return PTR_ERR(env);
1175 site = cl_i2sbi(inode)->ll_site;
1176 lli = cl_i2info(inode);
1177 fid = &lli->lli_fid;
1178 LASSERT(fid_is_sane(fid));
1180 if (lli->lli_clob == NULL) {
1181 /* clob is slave of inode, empty lli_clob means for new inode,
1182 * there is no clob in cache with the given fid, so it is
1183 * unnecessary to perform lookup-alloc-lookup-insert, just
1184 * alloc and insert directly. */
1186 LASSERT(inode->i_state & I_NEW);
1188 conf.coc_lu.loc_flags = LOC_F_NEW;
1189 clob = cl_object_find(env, lu2cl_dev(site->ls_top_dev),
1191 if (!IS_ERR(clob)) {
1193 * No locking is necessary, as new inode is
1194 * locked by I_NEW bit.
1196 * XXX not true for call from ll_update_inode().
1198 lli->lli_clob = clob;
1199 lu_object_ref_add(&clob->co_lu, "inode", inode);
1201 result = PTR_ERR(clob);
1203 result = cl_conf_set(env, lli->lli_clob, &conf);
1204 cl_env_put(env, &refcheck);
1207 CERROR("Failure to initialize cl object "DFID": %d\n",
1213 * Wait for others drop their references of the object at first, then we drop
1214 * the last one, which will lead to the object be destroyed immediately.
1215 * Must be called after cl_object_kill() against this object.
1217 * The reason we want to do this is: destroying top object will wait for sub
1218 * objects being destroyed first, so we can't let bottom layer (e.g. from ASTs)
1219 * to initiate top object destroying which may deadlock. See bz22520.
1221 static void cl_object_put_last(struct lu_env *env, struct cl_object *obj)
1223 struct lu_object_header *header = obj->co_lu.lo_header;
1224 cfs_waitlink_t waiter;
1226 if (unlikely(cfs_atomic_read(&header->loh_ref) != 1)) {
1227 struct lu_site *site = obj->co_lu.lo_dev->ld_site;
1228 struct lu_site_bkt_data *bkt;
1230 bkt = lu_site_bkt_from_fid(site, &header->loh_fid);
1232 cfs_waitlink_init(&waiter);
1233 cfs_waitq_add(&bkt->lsb_marche_funebre, &waiter);
1236 cfs_set_current_state(CFS_TASK_UNINT);
1237 if (cfs_atomic_read(&header->loh_ref) == 1)
1239 cfs_waitq_wait(&waiter, CFS_TASK_UNINT);
1242 cfs_set_current_state(CFS_TASK_RUNNING);
1243 cfs_waitq_del(&bkt->lsb_marche_funebre, &waiter);
1246 cl_object_put(env, obj);
1249 void cl_inode_fini(struct inode *inode)
1252 struct cl_inode_info *lli = cl_i2info(inode);
1253 struct cl_object *clob = lli->lli_clob;
1260 cookie = cl_env_reenter();
1261 env = cl_env_get(&refcheck);
1262 emergency = IS_ERR(env);
1264 cfs_mutex_lock(&ccc_inode_fini_guard);
1265 LASSERT(ccc_inode_fini_env != NULL);
1266 cl_env_implant(ccc_inode_fini_env, &refcheck);
1267 env = ccc_inode_fini_env;
1270 * cl_object cache is a slave to inode cache (which, in turn
1271 * is a slave to dentry cache), don't keep cl_object in memory
1272 * when its master is evicted.
1274 cl_object_kill(env, clob);
1275 lu_object_ref_del(&clob->co_lu, "inode", inode);
1276 cl_object_put_last(env, clob);
1277 lli->lli_clob = NULL;
1279 cl_env_unplant(ccc_inode_fini_env, &refcheck);
1280 cfs_mutex_unlock(&ccc_inode_fini_guard);
1282 cl_env_put(env, &refcheck);
1283 cl_env_reexit(cookie);
1288 * return IF_* type for given lu_dirent entry.
1289 * IF_* flag shld be converted to particular OS file type in
1290 * platform llite module.
1292 __u16 ll_dirent_type_get(struct lu_dirent *ent)
1295 struct luda_type *lt;
1298 if (le32_to_cpu(ent->lde_attrs) & LUDA_TYPE) {
1299 const unsigned align = sizeof(struct luda_type) - 1;
1301 len = le16_to_cpu(ent->lde_namelen);
1302 len = (len + align) & ~align;
1303 lt = (void *) ent->lde_name + len;
1304 type = CFS_IFTODT(le16_to_cpu(lt->lt_type));
1310 * build inode number from passed @fid */
1311 __u64 cl_fid_build_ino(const struct lu_fid *fid, int api32)
1313 if (BITS_PER_LONG == 32 || api32)
1314 RETURN(fid_flatten32(fid));
1316 RETURN(fid_flatten(fid));
1320 * build inode generation from passed @fid. If our FID overflows the 32-bit
1321 * inode number then return a non-zero generation to distinguish them. */
1322 __u32 cl_fid_build_gen(const struct lu_fid *fid)
1327 if (fid_is_igif(fid)) {
1328 gen = lu_igif_gen(fid);
1332 gen = (fid_flatten(fid) >> 32);
1336 struct lov_stripe_md *ccc_inode_lsm_get(struct inode *inode)
1338 return lov_lsm_get(cl_i2info(inode)->lli_clob);
1341 void inline ccc_inode_lsm_put(struct inode *inode, struct lov_stripe_md *lsm)
1343 lov_lsm_put(cl_i2info(inode)->lli_clob, lsm);