4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License version 2 for more details (a copy is included
14 * in the LICENSE file that accompanied this code).
16 * You should have received a copy of the GNU General Public License
17 * version 2 along with this program; If not, see
18 * http://www.sun.com/software/products/lustre/docs/GPLv2.pdf
20 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
21 * CA 95054 USA or visit www.sun.com if you need additional information or
27 * Copyright (c) 2008, 2010, Oracle and/or its affiliates. All rights reserved.
28 * Use is subject to license terms.
30 * Copyright (c) 2011, 2014, Intel Corporation.
33 * This file is part of Lustre, http://www.lustre.org/
34 * Lustre is a trademark of Sun Microsystems, Inc.
36 * cl code shared between vvp and liblustre (and other Lustre clients in the
39 * Author: Nikita Danilov <nikita.danilov@sun.com>
42 #define DEBUG_SUBSYSTEM S_LLITE
44 #include <libcfs/libcfs.h>
46 #include <linux/sched.h>
48 #include <linux/quotaops.h>
49 #include <linux/highmem.h>
50 #include <linux/pagemap.h>
51 #include <linux/rbtree.h>
54 #include <obd_support.h>
55 #include <lustre_fid.h>
56 #include <lustre_dlm.h>
57 #include <lustre_ver.h>
58 #include <lustre_mdc.h>
59 #include <cl_object.h>
61 #include "llite_internal.h"
63 static const struct cl_req_operations ccc_req_ops;
66 * ccc_ prefix stands for "Common Client Code".
69 static struct kmem_cache *ccc_lock_kmem;
70 static struct kmem_cache *ccc_thread_kmem;
71 static struct kmem_cache *ccc_session_kmem;
72 static struct kmem_cache *ccc_req_kmem;
74 static struct lu_kmem_descr ccc_caches[] = {
76 .ckd_cache = &ccc_lock_kmem,
77 .ckd_name = "ccc_lock_kmem",
78 .ckd_size = sizeof (struct ccc_lock)
81 .ckd_cache = &ccc_thread_kmem,
82 .ckd_name = "ccc_thread_kmem",
83 .ckd_size = sizeof (struct ccc_thread_info),
86 .ckd_cache = &ccc_session_kmem,
87 .ckd_name = "ccc_session_kmem",
88 .ckd_size = sizeof (struct ccc_session)
91 .ckd_cache = &ccc_req_kmem,
92 .ckd_name = "ccc_req_kmem",
93 .ckd_size = sizeof (struct ccc_req)
100 /*****************************************************************************
102 * Vvp device and device type functions.
106 void *ccc_key_init(const struct lu_context *ctx, struct lu_context_key *key)
108 struct ccc_thread_info *info;
110 OBD_SLAB_ALLOC_PTR_GFP(info, ccc_thread_kmem, GFP_NOFS);
112 info = ERR_PTR(-ENOMEM);
116 void ccc_key_fini(const struct lu_context *ctx,
117 struct lu_context_key *key, void *data)
119 struct ccc_thread_info *info = data;
120 OBD_SLAB_FREE_PTR(info, ccc_thread_kmem);
123 void *ccc_session_key_init(const struct lu_context *ctx,
124 struct lu_context_key *key)
126 struct ccc_session *session;
128 OBD_SLAB_ALLOC_PTR_GFP(session, ccc_session_kmem, GFP_NOFS);
130 session = ERR_PTR(-ENOMEM);
134 void ccc_session_key_fini(const struct lu_context *ctx,
135 struct lu_context_key *key, void *data)
137 struct ccc_session *session = data;
138 OBD_SLAB_FREE_PTR(session, ccc_session_kmem);
141 struct lu_context_key ccc_key = {
142 .lct_tags = LCT_CL_THREAD,
143 .lct_init = ccc_key_init,
144 .lct_fini = ccc_key_fini
147 struct lu_context_key ccc_session_key = {
148 .lct_tags = LCT_SESSION,
149 .lct_init = ccc_session_key_init,
150 .lct_fini = ccc_session_key_fini
153 int ccc_req_init(const struct lu_env *env, struct cl_device *dev,
159 OBD_SLAB_ALLOC_PTR_GFP(vrq, ccc_req_kmem, GFP_NOFS);
161 cl_req_slice_add(req, &vrq->crq_cl, dev, &ccc_req_ops);
169 * An `emergency' environment used by ccc_inode_fini() when cl_env_get()
170 * fails. Access to this environment is serialized by ccc_inode_fini_guard
173 static struct lu_env *ccc_inode_fini_env = NULL;
176 * A mutex serializing calls to slp_inode_fini() under extreme memory
177 * pressure, when environments cannot be allocated.
179 static DEFINE_MUTEX(ccc_inode_fini_guard);
180 static int dummy_refcheck;
182 int ccc_global_init(struct lu_device_type *device_type)
186 result = lu_kmem_init(ccc_caches);
190 result = lu_device_type_init(device_type);
194 ccc_inode_fini_env = cl_env_alloc(&dummy_refcheck,
195 LCT_REMEMBER|LCT_NOREF);
196 if (IS_ERR(ccc_inode_fini_env)) {
197 result = PTR_ERR(ccc_inode_fini_env);
201 ccc_inode_fini_env->le_ctx.lc_cookie = 0x4;
204 lu_device_type_fini(device_type);
206 lu_kmem_fini(ccc_caches);
210 void ccc_global_fini(struct lu_device_type *device_type)
212 if (ccc_inode_fini_env != NULL) {
213 cl_env_put(ccc_inode_fini_env, &dummy_refcheck);
214 ccc_inode_fini_env = NULL;
216 lu_device_type_fini(device_type);
217 lu_kmem_fini(ccc_caches);
220 int ccc_lock_init(const struct lu_env *env,
221 struct cl_object *obj, struct cl_lock *lock,
222 const struct cl_io *unused,
223 const struct cl_lock_operations *lkops)
225 struct ccc_lock *clk;
228 CLOBINVRNT(env, obj, vvp_object_invariant(obj));
230 OBD_SLAB_ALLOC_PTR_GFP(clk, ccc_lock_kmem, GFP_NOFS);
232 cl_lock_slice_add(lock, &clk->clk_cl, obj, lkops);
239 static void vvp_object_size_lock(struct cl_object *obj)
241 struct inode *inode = vvp_object_inode(obj);
243 ll_inode_size_lock(inode);
244 cl_object_attr_lock(obj);
247 static void vvp_object_size_unlock(struct cl_object *obj)
249 struct inode *inode = vvp_object_inode(obj);
251 cl_object_attr_unlock(obj);
252 ll_inode_size_unlock(inode);
255 /*****************************************************************************
261 int ccc_fail(const struct lu_env *env, const struct cl_page_slice *slice)
270 void ccc_transient_page_verify(const struct cl_page *page)
274 int ccc_transient_page_own(const struct lu_env *env,
275 const struct cl_page_slice *slice,
276 struct cl_io *unused,
279 ccc_transient_page_verify(slice->cpl_page);
283 void ccc_transient_page_assume(const struct lu_env *env,
284 const struct cl_page_slice *slice,
285 struct cl_io *unused)
287 ccc_transient_page_verify(slice->cpl_page);
290 void ccc_transient_page_unassume(const struct lu_env *env,
291 const struct cl_page_slice *slice,
292 struct cl_io *unused)
294 ccc_transient_page_verify(slice->cpl_page);
297 void ccc_transient_page_disown(const struct lu_env *env,
298 const struct cl_page_slice *slice,
299 struct cl_io *unused)
301 ccc_transient_page_verify(slice->cpl_page);
304 void ccc_transient_page_discard(const struct lu_env *env,
305 const struct cl_page_slice *slice,
306 struct cl_io *unused)
308 struct cl_page *page = slice->cpl_page;
310 ccc_transient_page_verify(slice->cpl_page);
313 * For transient pages, remove it from the radix tree.
315 cl_page_delete(env, page);
318 int ccc_transient_page_prep(const struct lu_env *env,
319 const struct cl_page_slice *slice,
320 struct cl_io *unused)
323 /* transient page should always be sent. */
327 /*****************************************************************************
333 void ccc_lock_fini(const struct lu_env *env, struct cl_lock_slice *slice)
335 struct ccc_lock *clk = cl2ccc_lock(slice);
336 OBD_SLAB_FREE_PTR(clk, ccc_lock_kmem);
339 int ccc_lock_enqueue(const struct lu_env *env,
340 const struct cl_lock_slice *slice,
341 struct cl_io *unused, struct cl_sync_io *anchor)
343 CLOBINVRNT(env, slice->cls_obj, vvp_object_invariant(slice->cls_obj));
347 /*****************************************************************************
353 void ccc_io_fini(const struct lu_env *env, const struct cl_io_slice *ios)
355 struct cl_io *io = ios->cis_io;
357 CLOBINVRNT(env, io->ci_obj, vvp_object_invariant(io->ci_obj));
360 int ccc_io_one_lock_index(const struct lu_env *env, struct cl_io *io,
361 __u32 enqflags, enum cl_lock_mode mode,
362 pgoff_t start, pgoff_t end)
364 struct ccc_io *cio = ccc_env_io(env);
365 struct cl_lock_descr *descr = &cio->cui_link.cill_descr;
366 struct cl_object *obj = io->ci_obj;
368 CLOBINVRNT(env, obj, vvp_object_invariant(obj));
371 CDEBUG(D_VFSTRACE, "lock: %d [%lu, %lu]\n", mode, start, end);
373 memset(&cio->cui_link, 0, sizeof cio->cui_link);
375 if (cio->cui_fd && (cio->cui_fd->fd_flags & LL_FILE_GROUP_LOCKED)) {
376 descr->cld_mode = CLM_GROUP;
377 descr->cld_gid = cio->cui_fd->fd_grouplock.cg_gid;
379 descr->cld_mode = mode;
381 descr->cld_obj = obj;
382 descr->cld_start = start;
383 descr->cld_end = end;
384 descr->cld_enq_flags = enqflags;
386 cl_io_lock_add(env, io, &cio->cui_link);
390 void ccc_io_update_iov(const struct lu_env *env,
391 struct ccc_io *cio, struct cl_io *io)
394 size_t size = io->u.ci_rw.crw_count;
396 cio->cui_iov_olen = 0;
397 if (!cl_is_normalio(env, io) || cio->cui_tot_nrsegs == 0)
400 for (i = 0; i < cio->cui_tot_nrsegs; i++) {
401 struct iovec *iv = &cio->cui_iov[i];
403 if (iv->iov_len < size)
406 if (iv->iov_len > size) {
407 cio->cui_iov_olen = iv->iov_len;
414 cio->cui_nrsegs = i + 1;
415 LASSERTF(cio->cui_tot_nrsegs >= cio->cui_nrsegs,
416 "tot_nrsegs: %lu, nrsegs: %lu\n",
417 cio->cui_tot_nrsegs, cio->cui_nrsegs);
420 int ccc_io_one_lock(const struct lu_env *env, struct cl_io *io,
421 __u32 enqflags, enum cl_lock_mode mode,
422 loff_t start, loff_t end)
424 struct cl_object *obj = io->ci_obj;
425 return ccc_io_one_lock_index(env, io, enqflags, mode,
426 cl_index(obj, start), cl_index(obj, end));
429 void ccc_io_end(const struct lu_env *env, const struct cl_io_slice *ios)
431 CLOBINVRNT(env, ios->cis_io->ci_obj,
432 vvp_object_invariant(ios->cis_io->ci_obj));
435 void ccc_io_advance(const struct lu_env *env,
436 const struct cl_io_slice *ios,
439 struct ccc_io *cio = cl2ccc_io(env, ios);
440 struct cl_io *io = ios->cis_io;
441 struct cl_object *obj = ios->cis_io->ci_obj;
443 CLOBINVRNT(env, obj, vvp_object_invariant(obj));
445 if (!cl_is_normalio(env, io))
448 LASSERT(cio->cui_tot_nrsegs >= cio->cui_nrsegs);
449 LASSERT(cio->cui_tot_count >= nob);
451 cio->cui_iov += cio->cui_nrsegs;
452 cio->cui_tot_nrsegs -= cio->cui_nrsegs;
453 cio->cui_tot_count -= nob;
456 if (cio->cui_iov_olen > 0) {
460 cio->cui_tot_nrsegs++;
461 iv = &cio->cui_iov[0];
462 if (io->ci_continue) {
463 iv->iov_base += iv->iov_len;
464 LASSERT(cio->cui_iov_olen > iv->iov_len);
465 iv->iov_len = cio->cui_iov_olen - iv->iov_len;
467 /* restore the iov_len, in case of restart io. */
468 iv->iov_len = cio->cui_iov_olen;
470 cio->cui_iov_olen = 0;
475 * Helper function that if necessary adjusts file size (inode->i_size), when
476 * position at the offset \a pos is accessed. File size can be arbitrary stale
477 * on a Lustre client, but client at least knows KMS. If accessed area is
478 * inside [0, KMS], set file size to KMS, otherwise glimpse file size.
480 * Locking: cl_isize_lock is used to serialize changes to inode size and to
481 * protect consistency between inode size and cl_object
482 * attributes. cl_object_size_lock() protects consistency between cl_attr's of
483 * top-object and sub-objects.
485 int ccc_prep_size(const struct lu_env *env, struct cl_object *obj,
486 struct cl_io *io, loff_t start, size_t count, int *exceed)
488 struct cl_attr *attr = ccc_env_thread_attr(env);
489 struct inode *inode = vvp_object_inode(obj);
490 loff_t pos = start + count - 1;
495 * Consistency guarantees: following possibilities exist for the
496 * relation between region being accessed and real file size at this
499 * (A): the region is completely inside of the file;
501 * (B-x): x bytes of region are inside of the file, the rest is
504 * (C): the region is completely outside of the file.
506 * This classification is stable under DLM lock already acquired by
507 * the caller, because to change the class, other client has to take
508 * DLM lock conflicting with our lock. Also, any updates to ->i_size
509 * by other threads on this client are serialized by
510 * ll_inode_size_lock(). This guarantees that short reads are handled
511 * correctly in the face of concurrent writes and truncates.
513 vvp_object_size_lock(obj);
514 result = cl_object_attr_get(env, obj, attr);
519 * A glimpse is necessary to determine whether we
520 * return a short read (B) or some zeroes at the end
523 vvp_object_size_unlock(obj);
524 result = cl_glimpse_lock(env, io, inode, obj, 0);
525 if (result == 0 && exceed != NULL) {
526 /* If objective page index exceed end-of-file
527 * page index, return directly. Do not expect
528 * kernel will check such case correctly.
529 * linux-2.6.18-128.1.1 miss to do that.
531 loff_t size = i_size_read(inode);
532 unsigned long cur_index = start >>
535 if ((size == 0 && cur_index != 0) ||
536 (((size - 1) >> PAGE_CACHE_SHIFT) <
543 * region is within kms and, hence, within real file
544 * size (A). We need to increase i_size to cover the
545 * read region so that generic_file_read() will do its
546 * job, but that doesn't mean the kms size is
547 * _correct_, it is only the _minimum_ size. If
548 * someone does a stat they will get the correct size
549 * which will always be >= the kms value here.
552 if (i_size_read(inode) < kms) {
553 i_size_write(inode, kms);
555 DFID" updating i_size "LPU64"\n",
556 PFID(lu_object_fid(&obj->co_lu)),
557 (__u64)i_size_read(inode));
563 vvp_object_size_unlock(obj);
568 /*****************************************************************************
570 * Transfer operations.
574 void ccc_req_completion(const struct lu_env *env,
575 const struct cl_req_slice *slice, int ioret)
580 cl_stats_tally(slice->crs_dev, slice->crs_req->crq_type, ioret);
582 vrq = cl2ccc_req(slice);
583 OBD_SLAB_FREE_PTR(vrq, ccc_req_kmem);
587 * Implementation of struct cl_req_operations::cro_attr_set() for ccc
588 * layer. ccc is responsible for
606 void ccc_req_attr_set(const struct lu_env *env,
607 const struct cl_req_slice *slice,
608 const struct cl_object *obj,
609 struct cl_req_attr *attr, obd_valid flags)
613 obd_flag valid_flags;
616 inode = vvp_object_inode(obj);
617 valid_flags = OBD_MD_FLTYPE;
619 if ((flags & OBD_MD_FLOSSCAPA) != 0) {
620 LASSERT(attr->cra_capa == NULL);
621 attr->cra_capa = cl_capa_lookup(inode,
622 slice->crs_req->crq_type);
625 if (slice->crs_req->crq_type == CRT_WRITE) {
626 if (flags & OBD_MD_FLEPOCH) {
627 oa->o_valid |= OBD_MD_FLEPOCH;
628 oa->o_ioepoch = ll_i2info(inode)->lli_ioepoch;
629 valid_flags |= OBD_MD_FLMTIME | OBD_MD_FLCTIME |
630 OBD_MD_FLUID | OBD_MD_FLGID;
633 obdo_from_inode(oa, inode, valid_flags & flags);
634 obdo_set_parent_fid(oa, &ll_i2info(inode)->lli_fid);
635 if (OBD_FAIL_CHECK(OBD_FAIL_LFSCK_INVALID_PFID))
637 memcpy(attr->cra_jobid, ll_i2info(inode)->lli_jobid,
641 static const struct cl_req_operations ccc_req_ops = {
642 .cro_attr_set = ccc_req_attr_set,
643 .cro_completion = ccc_req_completion
646 int cl_setattr_ost(struct inode *inode, const struct iattr *attr,
647 struct obd_capa *capa)
656 env = cl_env_get(&refcheck);
658 RETURN(PTR_ERR(env));
660 io = ccc_env_thread_io(env);
661 io->ci_obj = ll_i2info(inode)->lli_clob;
663 io->u.ci_setattr.sa_attr.lvb_atime = LTIME_S(attr->ia_atime);
664 io->u.ci_setattr.sa_attr.lvb_mtime = LTIME_S(attr->ia_mtime);
665 io->u.ci_setattr.sa_attr.lvb_ctime = LTIME_S(attr->ia_ctime);
666 io->u.ci_setattr.sa_attr.lvb_size = attr->ia_size;
667 io->u.ci_setattr.sa_valid = attr->ia_valid;
668 io->u.ci_setattr.sa_capa = capa;
671 if (cl_io_init(env, io, CIT_SETATTR, io->ci_obj) == 0) {
672 struct ccc_io *cio = ccc_env_io(env);
674 if (attr->ia_valid & ATTR_FILE)
675 /* populate the file descriptor for ftruncate to honor
676 * group lock - see LU-787 */
677 cio->cui_fd = LUSTRE_FPRIVATE(attr->ia_file);
679 result = cl_io_loop(env, io);
681 result = io->ci_result;
684 if (unlikely(io->ci_need_restart))
686 /* HSM import case: file is released, cannot be restored
687 * no need to fail except if restore registration failed
689 if (result == -ENODATA && io->ci_restore_needed &&
690 io->ci_result != -ENODATA)
692 cl_env_put(env, &refcheck);
696 /*****************************************************************************
702 struct ccc_lock *cl2ccc_lock(const struct cl_lock_slice *slice)
704 return container_of(slice, struct ccc_lock, clk_cl);
707 struct ccc_io *cl2ccc_io(const struct lu_env *env,
708 const struct cl_io_slice *slice)
712 cio = container_of(slice, struct ccc_io, cui_cl);
713 LASSERT(cio == ccc_env_io(env));
717 struct ccc_req *cl2ccc_req(const struct cl_req_slice *slice)
719 return container_of0(slice, struct ccc_req, crq_cl);
722 struct page *cl2vm_page(const struct cl_page_slice *slice)
724 return cl2ccc_page(slice)->cpg_page;
728 * Returns a pointer to cl_page associated with \a vmpage, without acquiring
729 * additional reference to the resulting page. This is an unsafe version of
730 * cl_vmpage_page() that can only be used under vmpage lock.
732 struct cl_page *ccc_vmpage_page_transient(struct page *vmpage)
734 KLASSERT(PageLocked(vmpage));
735 return (struct cl_page *)vmpage->private;
739 * Initialize or update CLIO structures for regular files when new
740 * meta-data arrives from the server.
742 * \param inode regular file inode
743 * \param md new file metadata from MDS
744 * - allocates cl_object if necessary,
745 * - updated layout, if object was already here.
747 int cl_file_inode_init(struct inode *inode, struct lustre_md *md)
750 struct ll_inode_info *lli;
751 struct cl_object *clob;
752 struct lu_site *site;
754 struct cl_object_conf conf = {
763 LASSERT(md->body->mbo_valid & OBD_MD_FLID);
764 LASSERT(S_ISREG(inode->i_mode));
766 env = cl_env_get(&refcheck);
770 site = ll_i2sbi(inode)->ll_site;
771 lli = ll_i2info(inode);
773 LASSERT(fid_is_sane(fid));
775 if (lli->lli_clob == NULL) {
776 /* clob is slave of inode, empty lli_clob means for new inode,
777 * there is no clob in cache with the given fid, so it is
778 * unnecessary to perform lookup-alloc-lookup-insert, just
779 * alloc and insert directly. */
780 LASSERT(inode->i_state & I_NEW);
781 conf.coc_lu.loc_flags = LOC_F_NEW;
782 clob = cl_object_find(env, lu2cl_dev(site->ls_top_dev),
786 * No locking is necessary, as new inode is
787 * locked by I_NEW bit.
789 lli->lli_clob = clob;
790 lli->lli_has_smd = lsm_has_objects(md->lsm);
791 lu_object_ref_add(&clob->co_lu, "inode", inode);
793 result = PTR_ERR(clob);
795 result = cl_conf_set(env, lli->lli_clob, &conf);
798 cl_env_put(env, &refcheck);
801 CERROR("Failure to initialize cl object "DFID": %d\n",
807 * Wait for others drop their references of the object at first, then we drop
808 * the last one, which will lead to the object be destroyed immediately.
809 * Must be called after cl_object_kill() against this object.
811 * The reason we want to do this is: destroying top object will wait for sub
812 * objects being destroyed first, so we can't let bottom layer (e.g. from ASTs)
813 * to initiate top object destroying which may deadlock. See bz22520.
815 static void cl_object_put_last(struct lu_env *env, struct cl_object *obj)
817 struct lu_object_header *header = obj->co_lu.lo_header;
820 if (unlikely(atomic_read(&header->loh_ref) != 1)) {
821 struct lu_site *site = obj->co_lu.lo_dev->ld_site;
822 struct lu_site_bkt_data *bkt;
824 bkt = lu_site_bkt_from_fid(site, &header->loh_fid);
826 init_waitqueue_entry_current(&waiter);
827 add_wait_queue(&bkt->lsb_marche_funebre, &waiter);
830 set_current_state(TASK_UNINTERRUPTIBLE);
831 if (atomic_read(&header->loh_ref) == 1)
833 waitq_wait(&waiter, TASK_UNINTERRUPTIBLE);
836 set_current_state(TASK_RUNNING);
837 remove_wait_queue(&bkt->lsb_marche_funebre, &waiter);
840 cl_object_put(env, obj);
843 void cl_inode_fini(struct inode *inode)
846 struct ll_inode_info *lli = ll_i2info(inode);
847 struct cl_object *clob = lli->lli_clob;
854 cookie = cl_env_reenter();
855 env = cl_env_get(&refcheck);
856 emergency = IS_ERR(env);
858 mutex_lock(&ccc_inode_fini_guard);
859 LASSERT(ccc_inode_fini_env != NULL);
860 cl_env_implant(ccc_inode_fini_env, &refcheck);
861 env = ccc_inode_fini_env;
864 * cl_object cache is a slave to inode cache (which, in turn
865 * is a slave to dentry cache), don't keep cl_object in memory
866 * when its master is evicted.
868 cl_object_kill(env, clob);
869 lu_object_ref_del(&clob->co_lu, "inode", inode);
870 cl_object_put_last(env, clob);
871 lli->lli_clob = NULL;
873 cl_env_unplant(ccc_inode_fini_env, &refcheck);
874 mutex_unlock(&ccc_inode_fini_guard);
876 cl_env_put(env, &refcheck);
877 cl_env_reexit(cookie);
882 * return IF_* type for given lu_dirent entry.
883 * IF_* flag shld be converted to particular OS file type in
884 * platform llite module.
886 __u16 ll_dirent_type_get(struct lu_dirent *ent)
889 struct luda_type *lt;
892 if (le32_to_cpu(ent->lde_attrs) & LUDA_TYPE) {
893 const unsigned align = sizeof(struct luda_type) - 1;
895 len = le16_to_cpu(ent->lde_namelen);
896 len = (len + align) & ~align;
897 lt = (void *)ent->lde_name + len;
898 type = IFTODT(le16_to_cpu(lt->lt_type));
904 * build inode number from passed @fid */
905 __u64 cl_fid_build_ino(const struct lu_fid *fid, int api32)
907 if (BITS_PER_LONG == 32 || api32)
908 RETURN(fid_flatten32(fid));
910 RETURN(fid_flatten(fid));
914 * build inode generation from passed @fid. If our FID overflows the 32-bit
915 * inode number then return a non-zero generation to distinguish them. */
916 __u32 cl_fid_build_gen(const struct lu_fid *fid)
921 if (fid_is_igif(fid)) {
922 gen = lu_igif_gen(fid);
926 gen = (fid_flatten(fid) >> 32);
930 /* lsm is unreliable after hsm implementation as layout can be changed at
931 * any time. This is only to support old, non-clio-ized interfaces. It will
932 * cause deadlock if clio operations are called with this extra layout refcount
933 * because in case the layout changed during the IO, ll_layout_refresh() will
934 * have to wait for the refcount to become zero to destroy the older layout.
936 * Notice that the lsm returned by this function may not be valid unless called
937 * inside layout lock - MDS_INODELOCK_LAYOUT. */
938 struct lov_stripe_md *ccc_inode_lsm_get(struct inode *inode)
940 return lov_lsm_get(ll_i2info(inode)->lli_clob);
943 void inline ccc_inode_lsm_put(struct inode *inode, struct lov_stripe_md *lsm)
945 lov_lsm_put(ll_i2info(inode)->lli_clob, lsm);