4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License version 2 for more details. A copy is
14 * included in the COPYING file that accompanied this code.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 * Copyright (c) 2011, 2012 Commissariat a l'energie atomique et aux energies
26 * Copyright (c) 2012, 2014, Intel Corporation.
27 * Use is subject to license terms.
30 * lustre/mdt/mdt_hsm.c
32 * Lustre Metadata Target (mdt) request handler
34 * Author: Aurelien Degremont <aurelien.degremont@cea.fr>
35 * Author: JC Lafoucriere <jacques-charles.lafoucriere@cea.fr>
38 #define DEBUG_SUBSYSTEM S_MDS
40 #include "mdt_internal.h"
42 /* Max allocation to satisfy single HSM RPC. */
43 #define MDT_HSM_ALLOC_MAX (1 << 20)
45 #define MDT_HSM_ALLOC(ptr, size) \
47 if ((size) <= MDT_HSM_ALLOC_MAX) \
48 OBD_ALLOC_LARGE((ptr), (size)); \
53 #define MDT_HSM_FREE(ptr, size) OBD_FREE_LARGE((ptr), (size))
56 * Update on-disk HSM attributes.
58 int mdt_hsm_attr_set(struct mdt_thread_info *info, struct mdt_object *obj,
59 const struct md_hsm *mh)
61 struct md_object *next = mdt_object_child(obj);
62 struct lu_buf *buf = &info->mti_buf;
63 struct hsm_attrs *attrs;
67 attrs = (struct hsm_attrs *)info->mti_xattr_buf;
68 CLASSERT(sizeof(info->mti_xattr_buf) >= sizeof(*attrs));
70 /* pack HSM attributes */
71 lustre_hsm2buf(info->mti_xattr_buf, mh);
73 /* update SOM attributes */
75 buf->lb_len = sizeof(*attrs);
76 rc = mo_xattr_set(info->mti_env, next, buf, XATTR_NAME_HSM, 0);
81 static inline bool mdt_hsm_is_admin(struct mdt_thread_info *info)
86 if (info->mti_body == NULL)
89 rc = mdt_init_ucred(info, (struct mdt_body *)info->mti_body);
93 is_admin = md_capable(mdt_ucred(info), CFS_CAP_SYS_ADMIN);
101 * Extract information coming from a copytool and asks coordinator to update
102 * a request status depending on the update content.
104 * Copytools could use this to report failure in their process.
106 * This is HSM_PROGRESS RPC handler.
108 int mdt_hsm_progress(struct tgt_session_info *tsi)
110 struct mdt_thread_info *info;
111 struct hsm_progress_kernel *hpk;
115 if (tsi->tsi_mdt_body == NULL)
118 hpk = req_capsule_client_get(tsi->tsi_pill, &RMF_MDS_HSM_PROGRESS);
120 RETURN(err_serious(-EPROTO));
122 hpk->hpk_errval = lustre_errno_ntoh(hpk->hpk_errval);
124 CDEBUG(D_HSM, "Progress on "DFID": len="LPU64" err=%d\n",
125 PFID(&hpk->hpk_fid), hpk->hpk_extent.length, hpk->hpk_errval);
128 CDEBUG(D_HSM, "Copytool progress on "DFID" failed (%d); %s.\n",
129 PFID(&hpk->hpk_fid), hpk->hpk_errval,
130 hpk->hpk_flags & HP_FLAG_RETRY ? "will retry" : "fatal");
132 if (hpk->hpk_flags & HP_FLAG_COMPLETED)
133 CDEBUG(D_HSM, "Finished "DFID" (%d) cancel cookie="LPX64"\n",
134 PFID(&hpk->hpk_fid), hpk->hpk_errval, hpk->hpk_cookie);
136 info = tsi2mdt_info(tsi);
137 if (!mdt_hsm_is_admin(info))
138 GOTO(out, rc = -EPERM);
140 rc = mdt_hsm_coordinator_update(info, hpk);
142 mdt_thread_info_fini(info);
146 int mdt_hsm_ct_register(struct tgt_session_info *tsi)
148 struct mdt_thread_info *info;
153 archives = req_capsule_client_get(tsi->tsi_pill, &RMF_MDS_HSM_ARCHIVE);
154 if (archives == NULL)
155 RETURN(err_serious(-EPROTO));
157 info = tsi2mdt_info(tsi);
158 if (!mdt_hsm_is_admin(info))
159 GOTO(out, rc = -EPERM);
161 /* XXX: directly include this function here? */
162 rc = mdt_hsm_agent_register_mask(info, &tsi->tsi_exp->exp_client_uuid,
165 mdt_thread_info_fini(info);
169 int mdt_hsm_ct_unregister(struct tgt_session_info *tsi)
171 struct mdt_thread_info *info;
175 if (tsi->tsi_mdt_body == NULL)
178 info = tsi2mdt_info(tsi);
179 if (!mdt_hsm_is_admin(info))
180 GOTO(out, rc = -EPERM);
182 /* XXX: directly include this function here? */
183 rc = mdt_hsm_agent_unregister(info, &tsi->tsi_exp->exp_client_uuid);
185 mdt_thread_info_fini(info);
190 * Retrieve the current HSM flags, archive id and undergoing HSM requests for
191 * the fid provided in RPC body.
193 * Current requests are read from coordinator states.
195 * This is MDS_HSM_STATE_GET RPC handler.
197 int mdt_hsm_state_get(struct tgt_session_info *tsi)
199 struct mdt_thread_info *info = tsi2mdt_info(tsi);
200 struct mdt_object *obj = info->mti_object;
201 struct md_attr *ma = &info->mti_attr;
202 struct hsm_user_state *hus;
203 struct mdt_lock_handle *lh;
207 if (info->mti_body == NULL || obj == NULL)
208 GOTO(out, rc = -EPROTO);
210 /* Only valid if client is remote */
211 rc = mdt_init_ucred(info, (struct mdt_body *)info->mti_body);
213 GOTO(out, rc = err_serious(rc));
215 lh = &info->mti_lh[MDT_LH_CHILD];
216 mdt_lock_reg_init(lh, LCK_PR);
217 rc = mdt_object_lock(info, obj, lh, MDS_INODELOCK_LOOKUP,
223 ma->ma_need = MA_HSM;
224 rc = mdt_attr_get_complex(info, obj, ma);
226 GOTO(out_unlock, rc);
228 if (req_capsule_get_size(info->mti_pill, &RMF_CAPA1, RCL_CLIENT))
229 mdt_set_capainfo(info, 0, &info->mti_body->mbo_fid1,
230 req_capsule_client_get(info->mti_pill,
233 hus = req_capsule_server_get(tsi->tsi_pill, &RMF_HSM_USER_STATE);
235 GOTO(out_unlock, rc = -EPROTO);
237 /* Current HSM flags */
238 hus->hus_states = ma->ma_hsm.mh_flags;
239 hus->hus_archive_id = ma->ma_hsm.mh_arch_id;
243 mdt_object_unlock(info, obj, lh, 1);
245 mdt_exit_ucred(info);
247 mdt_thread_info_fini(info);
252 * Change HSM state and archive number of a file.
254 * Archive number is changed iif the value is not 0.
255 * The new flagset that will be computed should result in a coherent state.
256 * This function checks that are flags are compatible.
258 * This is MDS_HSM_STATE_SET RPC handler.
260 int mdt_hsm_state_set(struct tgt_session_info *tsi)
262 struct mdt_thread_info *info = tsi2mdt_info(tsi);
263 struct mdt_object *obj = info->mti_object;
264 struct md_attr *ma = &info->mti_attr;
265 struct hsm_state_set *hss;
266 struct mdt_lock_handle *lh;
271 hss = req_capsule_client_get(info->mti_pill, &RMF_HSM_STATE_SET);
273 if (info->mti_body == NULL || obj == NULL || hss == NULL)
274 GOTO(out, rc = -EPROTO);
276 /* Only valid if client is remote */
277 rc = mdt_init_ucred(info, (struct mdt_body *)info->mti_body);
279 GOTO(out, rc = err_serious(rc));
281 lh = &info->mti_lh[MDT_LH_CHILD];
282 mdt_lock_reg_init(lh, LCK_PW);
283 rc = mdt_object_lock(info, obj, lh, MDS_INODELOCK_LOOKUP |
284 MDS_INODELOCK_XATTR, MDT_LOCAL_LOCK);
288 if (req_capsule_get_size(info->mti_pill, &RMF_CAPA1, RCL_CLIENT))
289 mdt_set_capainfo(info, 0, &info->mti_body->mbo_fid1,
290 req_capsule_client_get(info->mti_pill, &RMF_CAPA1));
292 /* Non-root users are forbidden to set or clear flags which are
293 * NOT defined in HSM_USER_MASK. */
294 if (((hss->hss_setmask | hss->hss_clearmask) & ~HSM_USER_MASK) &&
295 !md_capable(mdt_ucred(info), CFS_CAP_SYS_ADMIN))
296 GOTO(out_unlock, rc = -EPERM);
298 /* Read current HSM info */
300 ma->ma_need = MA_HSM;
301 rc = mdt_attr_get_complex(info, obj, ma);
303 GOTO(out_unlock, rc);
305 /* Change HSM flags depending on provided masks */
306 if (hss->hss_valid & HSS_SETMASK)
307 ma->ma_hsm.mh_flags |= hss->hss_setmask;
308 if (hss->hss_valid & HSS_CLEARMASK)
309 ma->ma_hsm.mh_flags &= ~hss->hss_clearmask;
311 /* Change archive_id if provided. */
312 if (hss->hss_valid & HSS_ARCHIVE_ID) {
313 if (!(ma->ma_hsm.mh_flags & HS_EXISTS)) {
314 CDEBUG(D_HSM, "Could not set an archive number for "
315 DFID "if HSM EXISTS flag is not set.\n",
316 PFID(&info->mti_body->mbo_fid1));
317 GOTO(out_unlock, rc);
319 ma->ma_hsm.mh_arch_id = hss->hss_archive_id;
322 /* Check for inconsistant HSM flagset.
323 * DIRTY without EXISTS: no dirty if no archive was created.
324 * DIRTY and RELEASED: a dirty file could not be released.
325 * RELEASED without ARCHIVED: do not release a non-archived file.
326 * LOST without ARCHIVED: cannot lost a non-archived file.
328 flags = ma->ma_hsm.mh_flags;
329 if ((flags & HS_DIRTY && !(flags & HS_EXISTS)) ||
330 (flags & HS_RELEASED && flags & HS_DIRTY) ||
331 (flags & HS_RELEASED && !(flags & HS_ARCHIVED)) ||
332 (flags & HS_LOST && !(flags & HS_ARCHIVED))) {
333 CDEBUG(D_HSM, "Incompatible flag change on "DFID
335 PFID(&info->mti_body->mbo_fid1), flags);
336 GOTO(out_unlock, rc = -EINVAL);
339 /* Save the modified flags */
340 rc = mdt_hsm_attr_set(info, obj, &ma->ma_hsm);
342 GOTO(out_unlock, rc);
347 mdt_object_unlock(info, obj, lh, 1);
349 mdt_exit_ucred(info);
351 mdt_thread_info_fini(info);
356 * Retrieve undergoing HSM requests for the fid provided in RPC body.
357 * Current requests are read from coordinator states.
359 * This is MDS_HSM_ACTION RPC handler.
361 int mdt_hsm_action(struct tgt_session_info *tsi)
363 struct mdt_thread_info *info;
364 struct hsm_current_action *hca;
365 struct hsm_action_list *hal = NULL;
366 struct hsm_action_item *hai;
371 hca = req_capsule_server_get(tsi->tsi_pill,
372 &RMF_MDS_HSM_CURRENT_ACTION);
374 RETURN(err_serious(-EPROTO));
376 if (tsi->tsi_mdt_body == NULL)
379 info = tsi2mdt_info(tsi);
380 /* Only valid if client is remote */
381 rc = mdt_init_ucred(info, (struct mdt_body *)info->mti_body);
383 GOTO(out, rc = err_serious(rc));
385 if (req_capsule_get_size(tsi->tsi_pill, &RMF_CAPA1, RCL_CLIENT))
386 mdt_set_capainfo(info, 0, &info->mti_body->mbo_fid1,
387 req_capsule_client_get(info->mti_pill,
390 /* Coordinator information */
391 hal_size = sizeof(*hal) +
392 cfs_size_round(MTI_NAME_MAXLEN) /* fsname */ +
393 cfs_size_round(sizeof(*hai));
395 MDT_HSM_ALLOC(hal, hal_size);
397 GOTO(out_ucred, rc = -ENOMEM);
399 hal->hal_version = HAL_VERSION;
400 hal->hal_archive_id = 0;
402 obd_uuid2fsname(hal->hal_fsname, mdt_obd_name(info->mti_mdt),
405 hai = hai_first(hal);
406 hai->hai_action = HSMA_NONE;
409 hai->hai_fid = info->mti_body->mbo_fid1;
410 hai->hai_len = sizeof(*hai);
412 rc = mdt_hsm_get_actions(info, hal);
416 /* cookie is used to give back request status */
417 if (hai->hai_cookie == 0)
418 hca->hca_state = HPS_WAITING;
420 hca->hca_state = HPS_RUNNING;
422 switch (hai->hai_action) {
424 hca->hca_action = HUA_NONE;
427 hca->hca_action = HUA_ARCHIVE;
430 hca->hca_action = HUA_RESTORE;
433 hca->hca_action = HUA_REMOVE;
436 hca->hca_action = HUA_CANCEL;
439 hca->hca_action = HUA_NONE;
440 CERROR("%s: Unknown hsm action: %d on "DFID"\n",
441 mdt_obd_name(info->mti_mdt),
442 hai->hai_action, PFID(&hai->hai_fid));
446 hca->hca_location = hai->hai_extent;
450 MDT_HSM_FREE(hal, hal_size);
452 mdt_exit_ucred(info);
454 mdt_thread_info_fini(info);
459 * Process the HSM actions described in a struct hsm_user_request.
461 * The action described in hur will be send to coordinator to be saved and
462 * processed later or either handled directly if hur.hur_action is HUA_RELEASE.
464 * This is MDS_HSM_REQUEST RPC handler.
466 int mdt_hsm_request(struct tgt_session_info *tsi)
468 struct mdt_thread_info *info;
469 struct req_capsule *pill = tsi->tsi_pill;
470 struct hsm_request *hr;
471 struct hsm_user_item *hui;
472 struct hsm_action_list *hal;
473 struct hsm_action_item *hai;
477 enum hsm_copytool_action action = HSMA_NONE;
482 hr = req_capsule_client_get(pill, &RMF_MDS_HSM_REQUEST);
483 hui = req_capsule_client_get(pill, &RMF_MDS_HSM_USER_ITEM);
484 data = req_capsule_client_get(pill, &RMF_GENERIC_DATA);
486 if (tsi->tsi_mdt_body == NULL || hr == NULL || hui == NULL || data == NULL)
489 /* Sanity check. Nothing to do with an empty list */
490 if (hr->hr_itemcount == 0)
493 hui_list_size = req_capsule_get_size(pill, &RMF_MDS_HSM_USER_ITEM,
495 if (hui_list_size < hr->hr_itemcount * sizeof(*hui))
498 data_size = req_capsule_get_size(pill, &RMF_GENERIC_DATA, RCL_CLIENT);
499 if (data_size != hr->hr_data_len)
502 info = tsi2mdt_info(tsi);
503 /* Only valid if client is remote */
504 rc = mdt_init_ucred(info, (struct mdt_body *)info->mti_body);
508 switch (hr->hr_action) {
509 /* code to be removed in hsm1_merge and final patch */
511 CERROR("Release action is not working in hsm1_coord\n");
512 GOTO(out_ucred, rc = -EINVAL);
514 /* end of code to be removed */
516 action = HSMA_ARCHIVE;
519 action = HSMA_RESTORE;
522 action = HSMA_REMOVE;
525 action = HSMA_CANCEL;
528 CERROR("Unknown hsm action: %d\n", hr->hr_action);
529 GOTO(out_ucred, rc = -EINVAL);
532 hal_size = sizeof(*hal) + cfs_size_round(MTI_NAME_MAXLEN) /* fsname */ +
533 (sizeof(*hai) + cfs_size_round(hr->hr_data_len)) *
536 MDT_HSM_ALLOC(hal, hal_size);
538 GOTO(out_ucred, rc = -ENOMEM);
540 hal->hal_version = HAL_VERSION;
541 hal->hal_archive_id = hr->hr_archive_id;
542 hal->hal_flags = hr->hr_flags;
543 obd_uuid2fsname(hal->hal_fsname, mdt_obd_name(info->mti_mdt),
546 hal->hal_count = hr->hr_itemcount;
547 hai = hai_first(hal);
548 for (i = 0; i < hr->hr_itemcount; i++, hai = hai_next(hai)) {
549 hai->hai_action = action;
552 hai->hai_fid = hui[i].hui_fid;
553 hai->hai_extent = hui[i].hui_extent;
554 memcpy(hai->hai_data, data, hr->hr_data_len);
555 hai->hai_len = sizeof(*hai) + hr->hr_data_len;
558 rc = mdt_hsm_add_actions(info, hal, &compound_id);
560 MDT_HSM_FREE(hal, hal_size);
565 mdt_exit_ucred(info);
567 mdt_thread_info_fini(info);