4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License version 2 for more details. A copy is
14 * included in the COPYING file that accompanied this code.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 * Copyright (c) 2012, 2013, Intel Corporation.
24 * Use is subject to license terms.
25 * Copyright (c) 2011, 2012 Commissariat a l'energie atomique et aux energies
29 * lustre/mdt/mdt_hsm.c
31 * Lustre Metadata Target (mdt) request handler
33 * Author: Aurelien Degremont <aurelien.degremont@cea.fr>
34 * Author: JC Lafoucriere <jacques-charles.lafoucriere@cea.fr>
37 #define DEBUG_SUBSYSTEM S_MDS
39 #include "mdt_internal.h"
41 /* Max allocation to satisfy single HSM RPC. */
42 #define MDT_HSM_ALLOC_MAX (1 << 20)
44 #define MDT_HSM_ALLOC(ptr, size) \
46 if ((size) <= MDT_HSM_ALLOC_MAX) \
47 OBD_ALLOC_LARGE((ptr), (size)); \
52 #define MDT_HSM_FREE(ptr, size) OBD_FREE_LARGE((ptr), (size))
55 * Update on-disk HSM attributes.
57 int mdt_hsm_attr_set(struct mdt_thread_info *info, struct mdt_object *obj,
58 const struct md_hsm *mh)
60 struct md_object *next = mdt_object_child(obj);
61 struct lu_buf *buf = &info->mti_buf;
62 struct hsm_attrs *attrs;
66 attrs = (struct hsm_attrs *)info->mti_xattr_buf;
67 CLASSERT(sizeof(info->mti_xattr_buf) >= sizeof(*attrs));
69 /* pack HSM attributes */
70 lustre_hsm2buf(info->mti_xattr_buf, mh);
72 /* update SOM attributes */
74 buf->lb_len = sizeof(*attrs);
75 rc = mo_xattr_set(info->mti_env, next, buf, XATTR_NAME_HSM, 0);
81 * Extract information coming from a copytool and asks coordinator to update
82 * a request status depending on the update content.
84 * Copytools could use this to report failure in their process.
86 * This is HSM_PROGRESS RPC handler.
88 int mdt_hsm_progress(struct mdt_thread_info *info)
90 struct mdt_body *body;
91 struct hsm_progress_kernel *hpk;
95 body = req_capsule_client_get(info->mti_pill, &RMF_MDT_BODY);
99 hpk = req_capsule_client_get(info->mti_pill, &RMF_MDS_HSM_PROGRESS);
103 hpk->hpk_errval = lustre_errno_ntoh(hpk->hpk_errval);
105 CDEBUG(D_HSM, "Progress on "DFID": len="LPU64" err=%d\n",
106 PFID(&hpk->hpk_fid), hpk->hpk_extent.length, hpk->hpk_errval);
109 CDEBUG(D_HSM, "Copytool progress on "DFID" failed (%d); %s.\n",
110 PFID(&hpk->hpk_fid), hpk->hpk_errval,
111 hpk->hpk_flags & HP_FLAG_RETRY ? "will retry" : "fatal");
113 if (hpk->hpk_flags & HP_FLAG_COMPLETED)
114 CDEBUG(D_HSM, "Finished "DFID" (%d) cancel cookie="LPX64"\n",
115 PFID(&hpk->hpk_fid), hpk->hpk_errval, hpk->hpk_cookie);
117 rc = mdt_hsm_coordinator_update(info, hpk);
122 int mdt_hsm_ct_register(struct mdt_thread_info *info)
124 struct mdt_body *body;
125 struct ptlrpc_request *req = mdt_info_req(info);
130 body = req_capsule_client_get(info->mti_pill, &RMF_MDT_BODY);
134 archives = req_capsule_client_get(info->mti_pill, &RMF_MDS_HSM_ARCHIVE);
135 if (archives == NULL)
138 /* XXX: directly include this function here? */
139 rc = mdt_hsm_agent_register_mask(info, &req->rq_export->exp_client_uuid,
145 int mdt_hsm_ct_unregister(struct mdt_thread_info *info)
147 struct mdt_body *body;
148 struct ptlrpc_request *req = mdt_info_req(info);
152 body = req_capsule_client_get(info->mti_pill, &RMF_MDT_BODY);
156 /* XXX: directly include this function here? */
157 rc = mdt_hsm_agent_unregister(info, &req->rq_export->exp_client_uuid);
163 * Retrieve the current HSM flags, archive id and undergoing HSM requests for
164 * the fid provided in RPC body.
166 * Current requests are read from coordinator states.
168 * This is MDS_HSM_STATE_GET RPC handler.
170 int mdt_hsm_state_get(struct mdt_thread_info *info)
172 struct mdt_object *obj = info->mti_object;
173 struct md_attr *ma = &info->mti_attr;
174 struct hsm_user_state *hus;
175 struct mdt_lock_handle *lh;
179 lh = &info->mti_lh[MDT_LH_CHILD];
180 mdt_lock_reg_init(lh, LCK_PR);
181 rc = mdt_object_lock(info, obj, lh, MDS_INODELOCK_LOOKUP,
186 /* Only valid if client is remote */
187 rc = mdt_init_ucred(info, (struct mdt_body *)info->mti_body);
189 GOTO(out_unlock, rc = err_serious(rc));
192 ma->ma_need = MA_HSM;
193 rc = mdt_attr_get_complex(info, obj, ma);
197 if (req_capsule_get_size(info->mti_pill, &RMF_CAPA1, RCL_CLIENT))
198 mdt_set_capainfo(info, 0, &info->mti_body->fid1,
199 req_capsule_client_get(info->mti_pill, &RMF_CAPA1));
201 hus = req_capsule_server_get(info->mti_pill, &RMF_HSM_USER_STATE);
203 GOTO(out_ucred, rc = -EPROTO);
205 /* Current HSM flags */
206 hus->hus_states = ma->ma_hsm.mh_flags;
207 hus->hus_archive_id = ma->ma_hsm.mh_arch_id;
211 mdt_exit_ucred(info);
213 mdt_object_unlock(info, obj, lh, 1);
218 * Change HSM state and archive number of a file.
220 * Archive number is changed iif the value is not 0.
221 * The new flagset that will be computed should result in a coherent state.
222 * This function checks that are flags are compatible.
224 * This is MDS_HSM_STATE_SET RPC handler.
226 int mdt_hsm_state_set(struct mdt_thread_info *info)
228 struct mdt_object *obj = info->mti_object;
229 struct md_attr *ma = &info->mti_attr;
230 struct hsm_state_set *hss;
231 struct mdt_lock_handle *lh;
236 lh = &info->mti_lh[MDT_LH_CHILD];
237 mdt_lock_reg_init(lh, LCK_PW);
238 rc = mdt_object_lock(info, obj, lh, MDS_INODELOCK_LOOKUP |
239 MDS_INODELOCK_XATTR, MDT_LOCAL_LOCK);
243 /* Only valid if client is remote */
244 rc = mdt_init_ucred(info, (struct mdt_body *)info->mti_body);
246 GOTO(out_obj, rc = err_serious(rc));
248 /* Read current HSM info */
250 ma->ma_need = MA_HSM;
251 rc = mdt_attr_get_complex(info, obj, ma);
255 hss = req_capsule_client_get(info->mti_pill, &RMF_HSM_STATE_SET);
257 GOTO(out_ucred, rc = -EPROTO);
259 if (req_capsule_get_size(info->mti_pill, &RMF_CAPA1, RCL_CLIENT))
260 mdt_set_capainfo(info, 0, &info->mti_body->fid1,
261 req_capsule_client_get(info->mti_pill, &RMF_CAPA1));
263 /* Change HSM flags depending on provided masks */
264 if (hss->hss_valid & HSS_SETMASK)
265 ma->ma_hsm.mh_flags |= hss->hss_setmask;
266 if (hss->hss_valid & HSS_CLEARMASK)
267 ma->ma_hsm.mh_flags &= ~hss->hss_clearmask;
269 /* Change archive_id if provided. */
270 if (hss->hss_valid & HSS_ARCHIVE_ID) {
271 if (!(ma->ma_hsm.mh_flags & HS_EXISTS)) {
272 CDEBUG(D_HSM, "Could not set an archive number for "
273 DFID "if HSM EXISTS flag is not set.\n",
274 PFID(&info->mti_body->fid1));
277 ma->ma_hsm.mh_arch_id = hss->hss_archive_id;
280 /* Check for inconsistant HSM flagset.
281 * DIRTY without EXISTS: no dirty if no archive was created.
282 * DIRTY and RELEASED: a dirty file could not be released.
283 * RELEASED without ARCHIVED: do not release a non-archived file.
284 * LOST without ARCHIVED: cannot lost a non-archived file.
286 flags = ma->ma_hsm.mh_flags;
287 if ((flags & HS_DIRTY && !(flags & HS_EXISTS)) ||
288 (flags & HS_RELEASED && flags & HS_DIRTY) ||
289 (flags & HS_RELEASED && !(flags & HS_ARCHIVED)) ||
290 (flags & HS_LOST && !(flags & HS_ARCHIVED))) {
291 CDEBUG(D_HSM, "Incompatible flag change on "DFID
293 PFID(&info->mti_body->fid1), flags);
294 GOTO(out_ucred, rc = -EINVAL);
297 /* Save the modified flags */
298 rc = mdt_hsm_attr_set(info, obj, &ma->ma_hsm);
305 mdt_exit_ucred(info);
307 mdt_object_unlock(info, obj, lh, 1);
312 * Retrieve undergoing HSM requests for the fid provided in RPC body.
313 * Current requests are read from coordinator states.
315 * This is MDS_HSM_ACTION RPC handler.
317 int mdt_hsm_action(struct mdt_thread_info *info)
319 struct hsm_current_action *hca;
320 struct hsm_action_list *hal = NULL;
321 struct hsm_action_item *hai;
326 /* Only valid if client is remote */
327 rc = mdt_init_ucred(info, (struct mdt_body *)info->mti_body);
329 RETURN(rc = err_serious(rc));
331 if (req_capsule_get_size(info->mti_pill, &RMF_CAPA1, RCL_CLIENT))
332 mdt_set_capainfo(info, 0, &info->mti_body->fid1,
333 req_capsule_client_get(info->mti_pill,
336 hca = req_capsule_server_get(info->mti_pill,
337 &RMF_MDS_HSM_CURRENT_ACTION);
339 GOTO(out_ucred, rc = -EPROTO);
341 /* Coordinator information */
342 hal_size = sizeof(*hal) +
343 cfs_size_round(MTI_NAME_MAXLEN) /* fsname */ +
344 cfs_size_round(sizeof(*hai));
346 MDT_HSM_ALLOC(hal, hal_size);
348 GOTO(out_ucred, rc = -ENOMEM);
350 hal->hal_version = HAL_VERSION;
351 hal->hal_archive_id = 0;
353 obd_uuid2fsname(hal->hal_fsname, mdt_obd_name(info->mti_mdt),
356 hai = hai_first(hal);
357 hai->hai_action = HSMA_NONE;
360 hai->hai_fid = info->mti_body->fid1;
361 hai->hai_len = sizeof(*hai);
363 rc = mdt_hsm_get_actions(info, hal);
367 /* cookie is used to give back request status */
368 if (hai->hai_cookie == 0)
369 hca->hca_state = HPS_WAITING;
371 hca->hca_state = HPS_RUNNING;
373 switch (hai->hai_action) {
375 hca->hca_action = HUA_NONE;
378 hca->hca_action = HUA_ARCHIVE;
381 hca->hca_action = HUA_RESTORE;
384 hca->hca_action = HUA_REMOVE;
387 hca->hca_action = HUA_CANCEL;
390 hca->hca_action = HUA_NONE;
391 CERROR("%s: Unknown hsm action: %d on "DFID"\n",
392 mdt_obd_name(info->mti_mdt),
393 hai->hai_action, PFID(&hai->hai_fid));
397 hca->hca_location = hai->hai_extent;
401 MDT_HSM_FREE(hal, hal_size);
403 mdt_exit_ucred(info);
408 * Process the HSM actions described in a struct hsm_user_request.
410 * The action described in hur will be send to coordinator to be saved and
411 * processed later or either handled directly if hur.hur_action is HUA_RELEASE.
413 * This is MDS_HSM_REQUEST RPC handler.
415 int mdt_hsm_request(struct mdt_thread_info *info)
417 struct req_capsule *pill = info->mti_pill;
418 struct mdt_body *body;
419 struct hsm_request *hr;
420 struct hsm_user_item *hui;
421 struct hsm_action_list *hal;
422 struct hsm_action_item *hai;
426 enum hsm_copytool_action action = HSMA_NONE;
431 body = req_capsule_client_get(pill, &RMF_MDT_BODY);
432 hr = req_capsule_client_get(pill, &RMF_MDS_HSM_REQUEST);
433 hui = req_capsule_client_get(pill, &RMF_MDS_HSM_USER_ITEM);
434 data = req_capsule_client_get(pill, &RMF_GENERIC_DATA);
436 if (body == NULL || hr == NULL || hui == NULL || data == NULL)
439 /* Sanity check. Nothing to do with an empty list */
440 if (hr->hr_itemcount == 0)
443 hui_list_size = req_capsule_get_size(pill, &RMF_MDS_HSM_USER_ITEM,
445 if (hui_list_size < hr->hr_itemcount * sizeof(*hui))
448 data_size = req_capsule_get_size(pill, &RMF_GENERIC_DATA, RCL_CLIENT);
449 if (data_size != hr->hr_data_len)
452 /* Only valid if client is remote */
453 rc = mdt_init_ucred(info, body);
455 RETURN(err_serious(rc));
457 switch (hr->hr_action) {
458 /* code to be removed in hsm1_merge and final patch */
460 CERROR("Release action is not working in hsm1_coord\n");
461 GOTO(out_ucred, rc = -EINVAL);
463 /* end of code to be removed */
465 action = HSMA_ARCHIVE;
468 action = HSMA_RESTORE;
471 action = HSMA_REMOVE;
474 action = HSMA_CANCEL;
477 CERROR("Unknown hsm action: %d\n", hr->hr_action);
478 GOTO(out_ucred, rc = -EINVAL);
481 hal_size = sizeof(*hal) + cfs_size_round(MTI_NAME_MAXLEN) /* fsname */ +
482 (sizeof(*hai) + cfs_size_round(hr->hr_data_len)) *
485 MDT_HSM_ALLOC(hal, hal_size);
487 GOTO(out_ucred, rc = -ENOMEM);
489 hal->hal_version = HAL_VERSION;
490 hal->hal_archive_id = hr->hr_archive_id;
491 hal->hal_flags = hr->hr_flags;
492 obd_uuid2fsname(hal->hal_fsname, mdt_obd_name(info->mti_mdt),
495 hal->hal_count = hr->hr_itemcount;
496 hai = hai_first(hal);
497 for (i = 0; i < hr->hr_itemcount; i++, hai = hai_next(hai)) {
498 hai->hai_action = action;
501 hai->hai_fid = hui[i].hui_fid;
502 hai->hai_extent = hui[i].hui_extent;
503 memcpy(hai->hai_data, data, hr->hr_data_len);
504 hai->hai_len = sizeof(*hai) + hr->hr_data_len;
507 rc = mdt_hsm_add_actions(info, hal, &compound_id);
509 MDT_HSM_FREE(hal, hal_size);
514 mdt_exit_ucred(info);