4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License version 2 for more details (a copy is included
14 * in the LICENSE file that accompanied this code).
16 * You should have received a copy of the GNU General Public License
17 * version 2 along with this program; If not, see
18 * http://www.gnu.org/licenses/gpl-2.0.html
23 * Copyright (c) 2017, Intel Corporation.
28 * Author: Mikhail Pershin <mike.pershin@intel.com>
31 #define DEBUG_SUBSYSTEM S_FILTER
33 #include <dt_object.h>
34 #include <linux/falloc.h>
35 #include <lustre_nodemap.h>
37 #include "mdt_internal.h"
39 /* functions below are stubs for now, they will be implemented with
40 * grant support on MDT */
41 static inline void mdt_dom_read_lock(struct mdt_object *mo)
43 down_read(&mo->mot_dom_sem);
46 static inline void mdt_dom_read_unlock(struct mdt_object *mo)
48 up_read(&mo->mot_dom_sem);
51 static inline void mdt_dom_write_lock(struct mdt_object *mo)
53 down_write(&mo->mot_dom_sem);
56 static inline void mdt_dom_write_unlock(struct mdt_object *mo)
58 up_write(&mo->mot_dom_sem);
61 static void mdt_dom_resource_prolong(struct ldlm_prolong_args *arg)
63 struct ldlm_resource *res;
64 struct ldlm_lock *lock;
68 res = ldlm_resource_get(arg->lpa_export->exp_obd->obd_namespace, NULL,
69 &arg->lpa_resid, LDLM_IBITS, 0);
72 "Failed to get resource for resid %llu/%llu\n",
73 arg->lpa_resid.name[0], arg->lpa_resid.name[1]);
78 list_for_each_entry(lock, &res->lr_granted, l_res_link) {
79 if (ldlm_has_dom(lock)) {
80 LDLM_DEBUG(lock, "DOM lock to prolong ");
81 ldlm_lock_prolong_one(lock, arg);
82 /* only one PW or EX lock can be granted,
83 * no need to continue search
85 if (lock->l_granted_mode & (LCK_PW | LCK_EX))
90 ldlm_resource_putref(res);
95 static void mdt_prolong_dom_lock(struct tgt_session_info *tsi,
96 struct ldlm_prolong_args *data)
98 struct obdo *oa = &tsi->tsi_ost_body->oa;
99 struct ldlm_lock *lock;
103 data->lpa_timeout = prolong_timeout(tgt_ses_req(tsi));
104 data->lpa_export = tsi->tsi_exp;
105 data->lpa_resid = tsi->tsi_resid;
107 CDEBUG(D_RPCTRACE, "Prolong DOM lock for req %p with x%llu\n",
108 tgt_ses_req(tsi), tgt_ses_req(tsi)->rq_xid);
110 if (oa->o_valid & OBD_MD_FLHANDLE) {
111 /* mostly a request should be covered by only one lock, try
113 lock = ldlm_handle2lock(&oa->o_handle);
115 LASSERT(lock->l_export == data->lpa_export);
116 ldlm_lock_prolong_one(lock, data);
117 lock->l_last_used = ktime_get();
119 if (data->lpa_locks_cnt > 0)
123 mdt_dom_resource_prolong(data);
127 static int mdt_rw_hpreq_lock_match(struct ptlrpc_request *req,
128 struct ldlm_lock *lock)
130 struct obd_ioobj *ioo;
132 __u32 opc = lustre_msg_get_opc(req->rq_reqmsg);
136 if (!(lock->l_policy_data.l_inodebits.bits & MDS_INODELOCK_DOM))
139 ioo = req_capsule_client_get(&req->rq_pill, &RMF_OBD_IOOBJ);
140 LASSERT(ioo != NULL);
142 LASSERT(lock->l_resource != NULL);
143 if (!fid_res_name_eq(&ioo->ioo_oid.oi_fid, &lock->l_resource->lr_name))
146 /* a bulk write can only hold a reference on a PW extent lock. */
147 mode = LCK_PW | LCK_GROUP;
149 /* whereas a bulk read can be protected by either a PR or PW
153 if (!(lock->l_granted_mode & mode))
159 static int mdt_rw_hpreq_check(struct ptlrpc_request *req)
161 struct tgt_session_info *tsi;
162 struct obd_ioobj *ioo;
163 struct niobuf_remote *rnb;
165 struct ldlm_prolong_args pa = { 0 };
169 /* Don't use tgt_ses_info() to get session info, because lock_match()
170 * can be called while request has no processing thread yet. */
171 tsi = lu_context_key_get(&req->rq_session, &tgt_session_key);
174 * Use LASSERT below because malformed RPCs should have
175 * been filtered out in tgt_hpreq_handler().
177 opc = lustre_msg_get_opc(req->rq_reqmsg);
178 LASSERT(opc == OST_READ || opc == OST_WRITE);
180 ioo = req_capsule_client_get(&req->rq_pill, &RMF_OBD_IOOBJ);
181 LASSERT(ioo != NULL);
183 rnb = req_capsule_client_get(&req->rq_pill, &RMF_NIOBUF_REMOTE);
184 LASSERT(rnb != NULL);
185 LASSERT(!(rnb->rnb_flags & OBD_BRW_SRVLOCK));
187 pa.lpa_mode = LCK_PW | LCK_GROUP;
189 pa.lpa_mode |= LCK_PR;
191 DEBUG_REQ(D_RPCTRACE, req, "%s %s: refresh rw locks for " DFID,
192 tgt_name(tsi->tsi_tgt), current->comm, PFID(&tsi->tsi_fid));
194 mdt_prolong_dom_lock(tsi, &pa);
196 if (pa.lpa_blocks_cnt > 0) {
198 "%s: refreshed %u locks timeout for req %p\n",
199 tgt_name(tsi->tsi_tgt), pa.lpa_blocks_cnt, req);
203 RETURN(pa.lpa_locks_cnt > 0 ? 0 : -ESTALE);
206 static void mdt_rw_hpreq_fini(struct ptlrpc_request *req)
208 mdt_rw_hpreq_check(req);
211 static struct ptlrpc_hpreq_ops mdt_hpreq_rw = {
212 .hpreq_lock_match = mdt_rw_hpreq_lock_match,
213 .hpreq_check = mdt_rw_hpreq_check,
214 .hpreq_fini = mdt_rw_hpreq_fini
218 * Assign high priority operations to an IO request.
220 * Check if the incoming request is a candidate for
221 * high-priority processing. If it is, assign it a high
222 * priority operations table.
224 * \param[in] tsi target session environment for this request
226 void mdt_hp_brw(struct tgt_session_info *tsi)
228 struct niobuf_remote *rnb;
229 struct obd_ioobj *ioo;
233 ioo = req_capsule_client_get(tsi->tsi_pill, &RMF_OBD_IOOBJ);
234 LASSERT(ioo != NULL); /* must exist after request preprocessing */
235 if (ioo->ioo_bufcnt > 0) {
236 rnb = req_capsule_client_get(tsi->tsi_pill, &RMF_NIOBUF_REMOTE);
237 LASSERT(rnb != NULL); /* must exist after preprocessing */
239 /* no high priority if server lock is needed */
240 if (rnb->rnb_flags & OBD_BRW_SRVLOCK ||
241 (lustre_msg_get_flags(tgt_ses_req(tsi)->rq_reqmsg) &
245 tgt_ses_req(tsi)->rq_ops = &mdt_hpreq_rw;
248 static int mdt_punch_hpreq_lock_match(struct ptlrpc_request *req,
249 struct ldlm_lock *lock)
251 struct tgt_session_info *tsi;
256 /* Don't use tgt_ses_info() to get session info, because lock_match()
257 * can be called while request has no processing thread yet. */
258 tsi = lu_context_key_get(&req->rq_session, &tgt_session_key);
261 * Use LASSERT below because malformed RPCs should have
262 * been filtered out in tgt_hpreq_handler().
264 LASSERT(tsi->tsi_ost_body != NULL);
265 if (tsi->tsi_ost_body->oa.o_valid & OBD_MD_FLHANDLE &&
266 tsi->tsi_ost_body->oa.o_handle.cookie == lock->l_handle.h_cookie)
269 oa = &tsi->tsi_ost_body->oa;
271 LASSERT(lock->l_resource != NULL);
272 if (!fid_res_name_eq(&oa->o_oi.oi_fid, &lock->l_resource->lr_name))
275 if (!(lock->l_granted_mode & (LCK_PW | LCK_GROUP)))
282 * Implementation of ptlrpc_hpreq_ops::hpreq_lock_check for OST_PUNCH request.
284 * High-priority queue request check for whether the given punch request
285 * (\a req) is blocking an LDLM lock cancel. Also checks whether the request is
286 * covered by an LDLM lock.
290 * \param[in] req the incoming request
292 * \retval 1 if \a req is blocking an LDLM lock cancel
293 * \retval 0 if it is not
294 * \retval -ESTALE if lock is not found
296 static int mdt_punch_hpreq_check(struct ptlrpc_request *req)
298 struct tgt_session_info *tsi;
300 struct ldlm_prolong_args pa = { 0 };
304 /* Don't use tgt_ses_info() to get session info, because lock_match()
305 * can be called while request has no processing thread yet. */
306 tsi = lu_context_key_get(&req->rq_session, &tgt_session_key);
307 LASSERT(tsi != NULL);
308 oa = &tsi->tsi_ost_body->oa;
310 LASSERT(!(oa->o_valid & OBD_MD_FLFLAGS &&
311 oa->o_flags & OBD_FL_SRVLOCK));
313 pa.lpa_mode = LCK_PW | LCK_GROUP;
315 CDEBUG(D_DLMTRACE, "%s: refresh DOM lock for "DFID"\n",
316 tgt_name(tsi->tsi_tgt), PFID(&tsi->tsi_fid));
318 mdt_prolong_dom_lock(tsi, &pa);
320 if (pa.lpa_blocks_cnt > 0) {
322 "%s: refreshed %u locks timeout for req %p.\n",
323 tgt_name(tsi->tsi_tgt), pa.lpa_blocks_cnt, req);
327 RETURN(pa.lpa_locks_cnt > 0 ? 0 : -ESTALE);
331 * Implementation of ptlrpc_hpreq_ops::hpreq_lock_fini for OST_PUNCH request.
333 * Called after the request has been handled. It refreshes lock timeout again
334 * so that client has more time to send lock cancel RPC.
336 * \param[in] req request which is being processed.
338 static void mdt_punch_hpreq_fini(struct ptlrpc_request *req)
340 mdt_punch_hpreq_check(req);
343 static struct ptlrpc_hpreq_ops mdt_hpreq_punch = {
344 .hpreq_lock_match = mdt_punch_hpreq_lock_match,
345 .hpreq_check = mdt_punch_hpreq_check,
346 .hpreq_fini = mdt_punch_hpreq_fini
349 void mdt_hp_punch(struct tgt_session_info *tsi)
351 LASSERT(tsi->tsi_ost_body != NULL); /* must exists if we are here */
352 /* no high-priority if server lock is needed */
353 if ((tsi->tsi_ost_body->oa.o_valid & OBD_MD_FLFLAGS &&
354 tsi->tsi_ost_body->oa.o_flags & OBD_FL_SRVLOCK) ||
355 tgt_conn_flags(tsi) & OBD_CONNECT_MDS ||
356 lustre_msg_get_flags(tgt_ses_req(tsi)->rq_reqmsg) & MSG_REPLAY)
358 tgt_ses_req(tsi)->rq_ops = &mdt_hpreq_punch;
361 static int mdt_preprw_read(const struct lu_env *env, struct obd_export *exp,
362 struct mdt_device *mdt, struct mdt_object *mo,
363 struct lu_attr *la, int niocount,
364 struct niobuf_remote *rnb, int *nr_local,
365 struct niobuf_local *lnb)
367 struct dt_object *dob;
368 int i, j, rc, tot_bytes = 0;
369 int maxlnb = *nr_local;
374 mdt_dom_read_lock(mo);
376 /* the only valid case when READ can find object is missing or stale
377 * when export is just evicted and open files are closed forcefully
378 * on server while client's READ can be in progress.
379 * This should not happen on healthy export, object can't be missing
380 * or dying because both states means it was finally destroyed.
382 level = exp->exp_failed ? D_INFO : D_ERROR;
383 if (!mdt_object_exists(mo)) {
385 "%s: READ IO to missing obj "DFID": rc = %d\n",
386 exp->exp_obd->obd_name, PFID(mdt_object_fid(mo)),
388 /* return 0 and continue with empty commit to skip such READ
389 * without more BRW errors.
393 if (lu_object_is_dying(&mo->mot_header)) {
395 "%s: READ IO to stale obj "DFID": rc = %d\n",
396 exp->exp_obd->obd_name, PFID(mdt_object_fid(mo)),
398 /* return 0 and continue with empty commit to skip such READ
399 * without more BRW errors.
404 dob = mdt_obj2dt(mo);
405 /* parse remote buffers to local buffers and prepare the latter */
406 for (i = 0, j = 0; i < niocount; i++) {
407 rc = dt_bufs_get(env, dob, rnb + i, lnb + j, maxlnb, 0);
408 if (unlikely(rc < 0))
410 /* correct index for local buffers to continue with */
414 tot_bytes += rnb[i].rnb_len;
417 rc = dt_attr_get(env, dob, la);
421 rc = dt_read_prep(env, dob, lnb, *nr_local);
427 dt_bufs_put(env, dob, lnb, *nr_local);
428 mdt_dom_read_unlock(mo);
432 static int mdt_preprw_write(const struct lu_env *env, struct obd_export *exp,
433 struct mdt_device *mdt, struct mdt_object *mo,
434 struct lu_attr *la, struct obdo *oa,
435 int objcount, struct obd_ioobj *obj,
436 struct niobuf_remote *rnb, int *nr_local,
437 struct niobuf_local *lnb)
439 struct dt_object *dob;
440 int i, j, k, rc = 0, tot_bytes = 0;
441 int maxlnb = *nr_local;
445 /* Process incoming grant info, set OBD_BRW_GRANTED flag and grant some
446 * space back if possible */
447 tgt_grant_prepare_write(env, exp, oa, rnb, obj->ioo_bufcnt);
449 mdt_dom_read_lock(mo);
451 /* don't report error in cases with failed export */
452 if (!mdt_object_exists(mo)) {
453 int level = exp->exp_failed ? D_INFO : D_ERROR;
457 "%s: WRITE IO to missing obj "DFID": rc = %d\n",
458 exp->exp_obd->obd_name, PFID(mdt_object_fid(mo)),
460 /* exit with no data written, note nr_local = 0 above */
463 if (lu_object_is_dying(&mo->mot_header)) {
464 /* This is possible race between object destroy followed by
465 * discard BL AST and client cache flushing. Object is
466 * referenced until discard finish.
468 CDEBUG(D_INODE, "WRITE IO to stale object "DFID"\n",
469 PFID(mdt_object_fid(mo)));
470 /* Note: continue with no error here to don't cause BRW errors
471 * but skip transaction in commitrw silently so no data is
476 dob = mdt_obj2dt(mo);
477 /* parse remote buffers to local buffers and prepare the latter */
478 for (i = 0, j = 0; i < obj->ioo_bufcnt; i++) {
479 rc = dt_bufs_get(env, dob, rnb + i, lnb + j, maxlnb, 1);
480 if (unlikely(rc < 0))
482 /* correct index for local buffers to continue with */
483 for (k = 0; k < rc; k++) {
484 lnb[j + k].lnb_flags = rnb[i].rnb_flags;
485 if (!(rnb[i].rnb_flags & OBD_BRW_GRANTED))
486 lnb[j + k].lnb_rc = -ENOSPC;
491 tot_bytes += rnb[i].rnb_len;
494 rc = dt_write_prep(env, dob, lnb, *nr_local);
500 dt_bufs_put(env, dob, lnb, *nr_local);
502 mdt_dom_read_unlock(mo);
503 /* tgt_grant_prepare_write() was called, so we must commit */
504 tgt_grant_commit(exp, oa->o_grant_used, rc);
505 /* let's still process incoming grant information packed in the oa,
506 * but without enforcing grant since we won't proceed with the write.
507 * Just like a read request actually. */
508 tgt_grant_prepare_read(env, exp, oa);
512 int mdt_obd_preprw(const struct lu_env *env, int cmd, struct obd_export *exp,
513 struct obdo *oa, int objcount, struct obd_ioobj *obj,
514 struct niobuf_remote *rnb, int *nr_local,
515 struct niobuf_local *lnb)
517 struct tgt_session_info *tsi = tgt_ses_info(env);
518 struct mdt_thread_info *info = tsi2mdt_info(tsi);
519 struct lu_attr *la = &info->mti_attr.ma_attr;
520 struct mdt_device *mdt = mdt_dev(exp->exp_obd->obd_lu_dev);
521 struct mdt_object *mo;
524 /* The default value PTLRPC_MAX_BRW_PAGES is set in tgt_brw_write()
525 * but for MDT it is different, correct it here. */
526 if (*nr_local > MD_MAX_BRW_PAGES)
527 *nr_local = MD_MAX_BRW_PAGES;
529 if (!oa || objcount != 1 || obj->ioo_bufcnt == 0) {
530 CERROR("%s: bad parameters %p/%i/%i\n",
531 exp->exp_obd->obd_name, oa, objcount, obj->ioo_bufcnt);
535 mo = mdt_object_find(env, mdt, &tsi->tsi_fid);
537 GOTO(out, rc = PTR_ERR(mo));
539 LASSERT(info->mti_object == NULL);
540 info->mti_object = mo;
542 if (cmd == OBD_BRW_WRITE) {
543 la_from_obdo(la, oa, OBD_MD_FLGETATTR);
544 rc = mdt_preprw_write(env, exp, mdt, mo, la, oa,
545 objcount, obj, rnb, nr_local, lnb);
546 } else if (cmd == OBD_BRW_READ) {
547 tgt_grant_prepare_read(env, exp, oa);
548 rc = mdt_preprw_read(env, exp, mdt, mo, la,
549 obj->ioo_bufcnt, rnb, nr_local, lnb);
550 obdo_from_la(oa, la, LA_ATIME);
552 CERROR("%s: wrong cmd %d received!\n",
553 exp->exp_obd->obd_name, cmd);
557 lu_object_put(env, &mo->mot_obj);
558 info->mti_object = NULL;
564 static int mdt_commitrw_read(const struct lu_env *env, struct mdt_device *mdt,
565 struct mdt_object *mo, int objcount, int niocount,
566 struct niobuf_local *lnb)
568 struct dt_object *dob;
573 dob = mdt_obj2dt(mo);
576 dt_bufs_put(env, dob, lnb, niocount);
578 mdt_dom_read_unlock(mo);
582 static int mdt_commitrw_write(const struct lu_env *env, struct obd_export *exp,
583 struct mdt_device *mdt, struct mdt_object *mo,
584 struct lu_attr *la, struct obdo *oa, int objcount,
585 int niocount, struct niobuf_local *lnb,
586 unsigned long granted, int old_rc)
588 struct dt_device *dt = mdt->mdt_bottom;
589 struct dt_object *dob;
597 dob = mdt_obj2dt(mo);
600 GOTO(out, rc = old_rc);
602 la->la_valid &= LA_ATIME | LA_MTIME | LA_CTIME;
604 if (!dt_object_exists(dob))
605 GOTO(out, rc = -ENOENT);
609 DEBUG_REQ(D_WARNING, tgt_ses_req(tgt_ses_info(env)),
610 "%s: commit with no pages for "DFID": rc = %d\n",
611 exp->exp_obd->obd_name, PFID(mdt_object_fid(mo)), rc);
615 CFS_FAIL_TIMEOUT(OBD_FAIL_MDS_COMMITRW_DELAY, cfs_fail_val);
617 th = dt_trans_create(env, dt);
619 GOTO(out, rc = PTR_ERR(th));
621 for (i = 0; i < niocount; i++) {
622 if (!(lnb[i].lnb_flags & OBD_BRW_ASYNC)) {
628 if (OBD_FAIL_CHECK(OBD_FAIL_OST_DQACQ_NET))
629 GOTO(out_stop, rc = -EINPROGRESS);
631 rc = dt_declare_write_commit(env, dob, lnb, niocount, th);
636 /* update [mac]time if needed */
637 rc = dt_declare_attr_set(env, dob, la, th);
642 tgt_vbr_obj_set(env, dob);
643 rc = dt_trans_start(env, dt, th);
647 dt_write_lock(env, dob, 0);
648 if (lu_object_is_dying(&mo->mot_header)) {
649 /* Commit to stale object can be just skipped silently. */
650 CDEBUG(D_INODE, "skip commit to stale object "DFID"\n",
651 PFID(mdt_object_fid(mo)));
652 GOTO(unlock, rc = 0);
654 rc = dt_write_commit(env, dob, lnb, niocount, th, oa->o_size);
656 restart = th->th_restart_tran;
661 rc = dt_attr_set(env, dob, la, th);
665 /* get attr to return */
666 rc = dt_attr_get(env, dob, la);
668 dt_write_unlock(env, dob);
671 /* Force commit to make the just-deleted blocks
672 * reusable. LU-456 */
677 if (rc == 0 && granted > 0) {
678 if (tgt_grant_commit_cb_add(th, exp, granted) == 0)
682 th->th_result = restart ? 0 : rc;
683 dt_trans_stop(env, dt, th);
684 if (rc == -ENOSPC && retries++ < 3) {
685 CDEBUG(D_INODE, "retry after force commit, retries:%d\n",
692 if (retries % 10000 == 0)
693 CERROR("%s: restart IO write too many times: %d\n",
694 exp->exp_obd->obd_name, retries);
695 CDEBUG(D_INODE, "retry transaction, retries:%d\n",
701 dt_bufs_put(env, dob, lnb, niocount);
702 mdt_dom_read_unlock(mo);
704 tgt_grant_commit(exp, granted, old_rc);
708 void mdt_dom_obj_lvb_update(const struct lu_env *env, struct mdt_object *mo,
709 struct obdo *oa, bool increase_only)
711 struct mdt_device *mdt = mdt_dev(mo->mot_obj.lo_dev);
712 struct ldlm_res_id resid;
713 struct ldlm_resource *res;
715 fid_build_reg_res_name(mdt_object_fid(mo), &resid);
716 res = ldlm_resource_get(mdt->mdt_namespace, NULL, &resid,
721 /* Update lvbo data if exists. */
722 if (mdt_dom_lvb_is_valid(res)) {
723 mdt_dom_disk_lvbo_update(env, mo, res, increase_only);
725 struct ost_lvb *res_lvb = res->lr_lvb_data;
728 oa->o_valid |= OBD_MD_FLBLOCKS | OBD_MD_FLSIZE |
729 OBD_MD_FLMTIME | OBD_MD_FLATIME |
731 oa->o_blocks = res_lvb->lvb_blocks;
732 oa->o_size = res_lvb->lvb_size;
733 oa->o_atime = res_lvb->lvb_atime;
734 oa->o_mtime = res_lvb->lvb_mtime;
735 oa->o_ctime = res_lvb->lvb_ctime;
739 ldlm_resource_putref(res);
742 int mdt_obd_commitrw(const struct lu_env *env, int cmd, struct obd_export *exp,
743 struct obdo *oa, int objcount, struct obd_ioobj *obj,
744 struct niobuf_remote *rnb, int npages,
745 struct niobuf_local *lnb, int old_rc, int nob,
748 struct tgt_session_info *tsi = tgt_ses_info(env);
749 struct ptlrpc_request *req = tgt_ses_req(tsi);
750 struct mdt_thread_info *info = mdt_th_info(env);
751 struct mdt_device *mdt = mdt_dev(exp->exp_obd->obd_lu_dev);
752 struct mdt_object *mo = info->mti_object;
753 struct lu_attr *la = &info->mti_attr.ma_attr;
760 if (cmd == OBD_BRW_WRITE) {
761 struct lu_nodemap *nodemap;
762 __u32 mapped_uid, mapped_gid, mapped_projid;
764 nodemap = nodemap_get_from_exp(exp);
766 RETURN(PTR_ERR(nodemap));
767 mapped_uid = nodemap_map_id(nodemap, NODEMAP_UID,
768 NODEMAP_FS_TO_CLIENT,
770 mapped_gid = nodemap_map_id(nodemap, NODEMAP_GID,
771 NODEMAP_FS_TO_CLIENT,
773 mapped_projid = nodemap_map_id(nodemap, NODEMAP_PROJID,
774 NODEMAP_FS_TO_CLIENT,
776 if (!IS_ERR_OR_NULL(nodemap)) {
777 /* do not bypass quota enforcement if squashed uid */
778 if (unlikely(mapped_uid == nodemap->nm_squash_uid)) {
781 for (idx = 0; idx < npages; idx++)
782 lnb[idx].lnb_flags &=
783 ~OBD_BRW_SYS_RESOURCE;
786 nodemap_putref(nodemap);
788 /* Don't update timestamps if this write is older than a
789 * setattr which modifies the timestamps. b=10150 */
791 /* XXX when we start having persistent reservations this needs
792 * to be changed to ofd_fmd_get() to create the fmd if it
793 * doesn't already exist so we can store the reservation handle
795 valid = OBD_MD_FLUID | OBD_MD_FLGID;
796 if (tgt_fmd_check(exp, mdt_object_fid(mo),
797 mdt_info_req(info)->rq_xid))
798 valid |= OBD_MD_FLATIME | OBD_MD_FLMTIME |
801 la_from_obdo(la, oa, valid);
803 mdt_counter_incr(req, LPROC_MDT_IO_WRITE_BYTES, nob);
804 mdt_counter_incr(req, LPROC_MDT_IO_WRITE,
805 ktime_us_delta(ktime_get(), kstart));
807 rc = mdt_commitrw_write(env, exp, mdt, mo, la, oa, objcount,
808 npages, lnb, oa->o_grant_used, old_rc);
810 obdo_from_la(oa, la, VALID_FLAGS | LA_GID | LA_UID);
812 obdo_from_la(oa, la, LA_GID | LA_UID);
814 mdt_dom_obj_lvb_update(env, mo, NULL, false);
815 /* don't report overquota flag if we failed before reaching
817 if (old_rc == 0 && (rc == 0 || rc == -EDQUOT)) {
818 /* return the overquota flags to client */
819 if (lnb[0].lnb_flags & OBD_BRW_OVER_USRQUOTA) {
820 if (oa->o_valid & OBD_MD_FLFLAGS)
821 oa->o_flags |= OBD_FL_NO_USRQUOTA;
823 oa->o_flags = OBD_FL_NO_USRQUOTA;
826 if (lnb[0].lnb_flags & OBD_BRW_OVER_GRPQUOTA) {
827 if (oa->o_valid & OBD_MD_FLFLAGS)
828 oa->o_flags |= OBD_FL_NO_GRPQUOTA;
830 oa->o_flags = OBD_FL_NO_GRPQUOTA;
833 if (lnb[0].lnb_flags & OBD_BRW_OVER_PRJQUOTA) {
834 if (oa->o_valid & OBD_MD_FLFLAGS)
835 oa->o_flags |= OBD_FL_NO_PRJQUOTA;
837 oa->o_flags = OBD_FL_NO_PRJQUOTA;
841 oa->o_flags |= OBD_FL_ROOT_SQUASH;
843 oa->o_valid |= OBD_MD_FLFLAGS | OBD_MD_FLUSRQUOTA |
844 OBD_MD_FLGRPQUOTA | OBD_MD_FLPRJQUOTA;
846 /* Convert back to client IDs. LU-9671.
847 * nodemap_get_from_exp() may fail due to nodemap deactivated,
848 * server ID will be returned back to client in that case.
850 oa->o_uid = mapped_uid;
851 oa->o_gid = mapped_gid;
852 oa->o_projid = mapped_projid;
853 } else if (cmd == OBD_BRW_READ) {
854 /* If oa != NULL then mdt_preprw_read updated the inode
855 * atime and we should update the lvb so that other glimpses
856 * will also get the updated value. bug 5972 */
858 mdt_dom_obj_lvb_update(env, mo, NULL, true);
860 mdt_counter_incr(req, LPROC_MDT_IO_READ_BYTES, nob);
861 mdt_counter_incr(req, LPROC_MDT_IO_READ,
862 ktime_us_delta(ktime_get(), kstart));
864 rc = mdt_commitrw_read(env, mdt, mo, objcount, npages, lnb);
870 mdt_thread_info_fini(info);
874 int mdt_object_fallocate(const struct lu_env *env, struct dt_device *dt,
875 struct dt_object *dob, __u64 start, __u64 end,
876 int mode, struct lu_attr *la)
883 if (!dt_object_exists(dob))
886 th = dt_trans_create(env, dt);
890 rc = dt_declare_attr_set(env, dob, la, th);
894 rc = dt_declare_fallocate(env, dob, start, end, mode, th);
898 tgt_vbr_obj_set(env, dob);
899 rc = dt_trans_start(env, dt, th);
903 dt_write_lock(env, dob, 0);
904 rc = dt_falloc(env, dob, start, end, mode, th);
907 rc = dt_attr_set(env, dob, la, th);
911 dt_write_unlock(env, dob);
914 dt_trans_stop(env, dt, th);
919 * MDT request handler for OST_FALLOCATE RPC.
921 * This is part of request processing. Validate request fields,
922 * preallocate the given MDT object and pack reply.
924 * \param[in] tsi target session environment for this request
926 * \retval 0 if successful
927 * \retval negative value on error
929 int mdt_fallocate_hdl(struct tgt_session_info *tsi)
931 struct obdo *oa = &tsi->tsi_ost_body->oa;
932 struct ptlrpc_request *req = tgt_ses_req(tsi);
933 struct ost_body *repbody;
934 struct mdt_thread_info *info;
935 struct ldlm_namespace *ns = tsi->tsi_tgt->lut_obd->obd_namespace;
936 struct obd_export *exp = tsi->tsi_exp;
937 struct mdt_device *mdt = mdt_dev(exp->exp_obd->obd_lu_dev);
938 struct mdt_object *mo;
939 struct dt_object *dob;
942 struct lustre_handle lh = { 0, };
946 ktime_t kstart = ktime_get();
948 repbody = req_capsule_server_get(tsi->tsi_pill, &RMF_OST_BODY);
950 RETURN(err_serious(-ENOMEM));
953 * fallocate() start and end are passed in o_size and o_blocks
954 * on the wire. Clients 2.15.0 and newer should always set
955 * the OBD_MD_FLSIZE and OBD_MD_FLBLOCKS valid flags, but some
956 * older client versions did not. We permit older clients to
957 * not set these flags, checking their version by proxy using
958 * the lack of OBD_CONNECT_TRUNCLOCK to imply 2.14.0 and older.
960 * Return -EOPNOTSUPP to also work with older clients not
961 * supporting newer server modes.
963 * fallocate start and end are passed in o_size, o_blocks
966 if ((oa->o_valid & (OBD_MD_FLSIZE | OBD_MD_FLBLOCKS)) !=
967 (OBD_MD_FLSIZE | OBD_MD_FLBLOCKS)
968 #if LUSTRE_VERSION_CODE < OBD_OCD_VERSION(2, 21, 53, 0)
969 && (tgt_conn_flags(tsi) & OBD_CONNECT_OLD_FALLOC)
976 /* client should already limit len >= 0 */
980 mode = oa->o_falloc_mode;
983 "fallocate: "DFID", mode = %#x, start = %lld, end = %lld\n",
984 PFID(&tsi->tsi_fid), mode, start, end);
987 * mode == 0 (which is standard prealloc) and PUNCH is supported
988 * Rest of mode options are not supported yet.
990 if (mode & ~(FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE))
993 if (mode & FALLOC_FL_PUNCH_HOLE && !(mode & FALLOC_FL_KEEP_SIZE)) {
994 CWARN("%s: PUNCH mode misses KEEP_SIZE flag, setting it\n",
995 tsi->tsi_tgt->lut_obd->obd_name);
996 mode |= FALLOC_FL_KEEP_SIZE;
999 info = tsi2mdt_info(tsi);
1000 la = &info->mti_attr.ma_attr;
1002 repbody->oa.o_oi = oa->o_oi;
1003 repbody->oa.o_valid = OBD_MD_FLID;
1005 srvlock = oa->o_valid & OBD_MD_FLFLAGS &&
1006 oa->o_flags & OBD_FL_SRVLOCK;
1009 rc = tgt_mdt_data_lock(ns, &tsi->tsi_resid, &lh, LCK_PW,
1015 mo = mdt_object_find(tsi->tsi_env, mdt, &tsi->tsi_fid);
1017 GOTO(out_unlock, rc = PTR_ERR(mo));
1019 if (!mdt_object_exists(mo))
1020 GOTO(out_put, rc = -ENOENT);
1022 /* Shouldn't happen on dirs */
1023 if (S_ISDIR(lu_object_attr(&mo->mot_obj))) {
1025 CERROR("%s: fallocate on dir "DFID": rc = %d\n",
1026 exp->exp_obd->obd_name, PFID(&tsi->tsi_fid), rc);
1030 la_from_obdo(la, oa, OBD_MD_FLMTIME | OBD_MD_FLATIME | OBD_MD_FLCTIME);
1032 mdt_dom_write_lock(mo);
1033 dob = mdt_obj2dt(mo);
1035 if (la->la_valid & (LA_ATIME | LA_MTIME | LA_CTIME))
1036 tgt_fmd_update(tsi->tsi_exp, &tsi->tsi_fid,
1037 tgt_ses_req(tsi)->rq_xid);
1039 rc = mdt_object_fallocate(tsi->tsi_env, mdt->mdt_bottom, dob, start,
1041 mdt_dom_write_unlock(mo);
1045 mdt_dom_obj_lvb_update(tsi->tsi_env, mo, &repbody->oa, false);
1047 mdt_counter_incr(req, LPROC_MDT_FALLOCATE,
1048 ktime_us_delta(ktime_get(), kstart));
1052 lu_object_put(tsi->tsi_env, &mo->mot_obj);
1055 tgt_data_unlock(&lh, LCK_PW);
1057 mdt_thread_info_fini(info);
1061 int mdt_object_punch(const struct lu_env *env, struct dt_device *dt,
1062 struct dt_object *dob, __u64 start, __u64 end,
1070 /* we support truncate, not punch yet */
1071 LASSERT(end == OBD_OBJECT_EOF);
1073 if (!dt_object_exists(dob))
1076 th = dt_trans_create(env, dt);
1078 RETURN(PTR_ERR(th));
1080 rc = dt_declare_attr_set(env, dob, la, th);
1084 rc = dt_declare_punch(env, dob, start, OBD_OBJECT_EOF, th);
1088 tgt_vbr_obj_set(env, dob);
1089 rc = dt_trans_start(env, dt, th);
1093 dt_write_lock(env, dob, 0);
1094 rc = dt_punch(env, dob, start, OBD_OBJECT_EOF, th);
1097 rc = dt_attr_set(env, dob, la, th);
1101 dt_write_unlock(env, dob);
1104 dt_trans_stop(env, dt, th);
1108 int mdt_punch_hdl(struct tgt_session_info *tsi)
1110 const struct obdo *oa = &tsi->tsi_ost_body->oa;
1111 struct ptlrpc_request *req = tgt_ses_req(tsi);
1112 struct ost_body *repbody;
1113 struct mdt_thread_info *info;
1115 struct ldlm_namespace *ns = tsi->tsi_tgt->lut_obd->obd_namespace;
1116 struct obd_export *exp = tsi->tsi_exp;
1117 struct mdt_device *mdt = mdt_dev(exp->exp_obd->obd_lu_dev);
1118 struct mdt_object *mo;
1119 struct dt_object *dob;
1121 struct lustre_handle lh = { 0, };
1122 ktime_t kstart = ktime_get();
1129 if ((oa->o_valid & (OBD_MD_FLSIZE | OBD_MD_FLBLOCKS)) !=
1130 (OBD_MD_FLSIZE | OBD_MD_FLBLOCKS))
1131 RETURN(err_serious(-EPROTO));
1133 repbody = req_capsule_server_get(tsi->tsi_pill, &RMF_OST_BODY);
1134 if (repbody == NULL)
1135 RETURN(err_serious(-ENOMEM));
1137 /* punch start,end are passed in o_size,o_blocks throught wire */
1141 if (end != OBD_OBJECT_EOF) /* Only truncate is supported */
1144 info = tsi2mdt_info(tsi);
1145 la = &info->mti_attr.ma_attr;
1146 /* standard truncate optimization: if file body is completely
1147 * destroyed, don't send data back to the server. */
1149 flags |= LDLM_FL_AST_DISCARD_DATA;
1151 repbody->oa.o_oi = oa->o_oi;
1152 repbody->oa.o_valid = OBD_MD_FLID;
1154 srvlock = (exp_connect_flags(exp) & OBD_CONNECT_SRVLOCK) &&
1155 oa->o_valid & OBD_MD_FLFLAGS &&
1156 oa->o_flags & OBD_FL_SRVLOCK;
1159 rc = tgt_mdt_data_lock(ns, &tsi->tsi_resid, &lh, LCK_PW,
1165 CDEBUG(D_INODE, "calling punch for object "DFID", valid = %#llx"
1166 ", start = %lld, end = %lld\n", PFID(&tsi->tsi_fid),
1167 oa->o_valid, start, end);
1169 mo = mdt_object_find(tsi->tsi_env, mdt, &tsi->tsi_fid);
1171 GOTO(out_unlock, rc = PTR_ERR(mo));
1173 if (!mdt_object_exists(mo))
1174 GOTO(out_put, rc = -ENOENT);
1176 /* Shouldn't happen on dirs */
1177 if (S_ISDIR(lu_object_attr(&mo->mot_obj))) {
1179 CERROR("%s: Truncate on dir "DFID": rc = %d\n",
1180 exp->exp_obd->obd_name, PFID(&tsi->tsi_fid), rc);
1184 mdt_dom_write_lock(mo);
1185 dob = mdt_obj2dt(mo);
1187 la_from_obdo(la, oa, OBD_MD_FLMTIME | OBD_MD_FLATIME | OBD_MD_FLCTIME);
1188 la->la_size = start;
1189 la->la_valid |= LA_SIZE;
1191 /* MDT supports FMD for Data-on-MDT needs */
1192 if (la->la_valid & (LA_ATIME | LA_MTIME | LA_CTIME))
1193 tgt_fmd_update(tsi->tsi_exp, &tsi->tsi_fid,
1194 tgt_ses_req(tsi)->rq_xid);
1196 rc = mdt_object_punch(tsi->tsi_env, mdt->mdt_bottom, dob,
1198 mdt_dom_write_unlock(mo);
1202 mdt_dom_obj_lvb_update(tsi->tsi_env, mo, &repbody->oa, false);
1204 mdt_counter_incr(req, LPROC_MDT_IO_PUNCH,
1205 ktime_us_delta(ktime_get(), kstart));
1208 lu_object_put(tsi->tsi_env, &mo->mot_obj);
1211 tgt_data_unlock(&lh, LCK_PW);
1213 mdt_thread_info_fini(info);
1218 * MDT glimpse for Data-on-MDT
1220 * If there is write lock on client then function issues glimpse_ast to get
1221 * an actual size from that client.
1224 int mdt_do_glimpse(const struct lu_env *env, struct ldlm_namespace *ns,
1225 struct ldlm_resource *res)
1227 union ldlm_policy_data policy;
1228 struct lustre_handle lockh;
1229 enum ldlm_mode mode;
1230 struct ldlm_lock *lock;
1231 struct ldlm_glimpse_work *gl_work;
1237 /* There can be only one write lock covering data, try to match it. */
1238 policy.l_inodebits.bits = MDS_INODELOCK_DOM;
1239 mode = ldlm_lock_match(ns, LDLM_FL_TEST_LOCK,
1240 &res->lr_name, LDLM_IBITS, &policy,
1243 /* There is no PW lock on this object; finished. */
1247 lock = ldlm_handle2lock(&lockh);
1252 * This check is for lock taken in mdt_reint_unlink() that does
1253 * not have l_glimpse_ast set. So the logic is: if there is a lock
1254 * with no l_glimpse_ast set, this object is being destroyed already.
1255 * Hence, if you are grabbing DLM locks on the server, always set
1256 * non-NULL glimpse_ast (e.g., ldlm_request.c::ldlm_glimpse_ast()).
1258 if (lock->l_glimpse_ast == NULL) {
1259 LDLM_DEBUG(lock, "no l_glimpse_ast");
1260 GOTO(out, rc = -ENOENT);
1263 OBD_SLAB_ALLOC_PTR_GFP(gl_work, ldlm_glimpse_work_kmem, GFP_ATOMIC);
1265 GOTO(out, rc = -ENOMEM);
1267 /* Populate the gl_work structure.
1268 * Grab additional reference on the lock which will be released in
1269 * ldlm_work_gl_ast_lock() */
1270 gl_work->gl_lock = LDLM_LOCK_GET(lock);
1271 /* The glimpse callback is sent to one single IO lock. As a result,
1272 * the gl_work list is just composed of one element */
1273 list_add_tail(&gl_work->gl_list, &gl_list);
1274 /* There is actually no need for a glimpse descriptor when glimpsing
1276 gl_work->gl_desc = NULL;
1277 /* the ldlm_glimpse_work structure is allocated on the stack */
1278 gl_work->gl_flags = LDLM_GL_WORK_SLAB_ALLOCATED;
1280 ldlm_glimpse_locks(res, &gl_list); /* this will update the LVB */
1282 /* If the list is not empty, we failed to glimpse a lock and
1283 * must clean it up. Usually due to a race with unlink.*/
1284 if (!list_empty(&gl_list)) {
1285 LDLM_LOCK_RELEASE(lock);
1286 OBD_SLAB_FREE_PTR(gl_work, ldlm_glimpse_work_kmem);
1291 LDLM_LOCK_PUT(lock);
1295 static void mdt_lvb2reply(struct ldlm_resource *res, struct mdt_body *mb,
1296 struct ost_lvb *lvb)
1298 struct ost_lvb *res_lvb;
1301 res_lvb = res->lr_lvb_data;
1307 mb->mbo_dom_size = res_lvb->lvb_size;
1308 mb->mbo_dom_blocks = res_lvb->lvb_blocks;
1309 mb->mbo_mtime = res_lvb->lvb_mtime;
1310 mb->mbo_ctime = res_lvb->lvb_ctime;
1311 mb->mbo_atime = res_lvb->lvb_atime;
1312 mb->mbo_valid |= OBD_MD_FLATIME | OBD_MD_FLCTIME |
1313 OBD_MD_FLMTIME | OBD_MD_DOM_SIZE;
1315 CDEBUG(D_DLMTRACE, "size %llu\n", res_lvb->lvb_size);
1321 * MDT glimpse for Data-on-MDT
1323 * This function is called when MDT get attributes for the DoM object.
1324 * If there is write lock on client then function issues glimpse_ast to get
1325 * an actual size from that client.
1327 int mdt_dom_object_size(const struct lu_env *env, struct mdt_device *mdt,
1328 const struct lu_fid *fid, struct mdt_body *mb,
1331 struct ldlm_res_id resid;
1332 struct ldlm_resource *res;
1337 fid_build_reg_res_name(fid, &resid);
1338 res = ldlm_resource_get(mdt->mdt_namespace, NULL, &resid,
1343 /* Update lvbo data if DoM lock returned or if LVB is not yet valid. */
1344 if (dom_lock || !mdt_dom_lvb_is_valid(res))
1345 mdt_dom_lvbo_update(res, NULL, NULL, false);
1347 mdt_lvb2reply(res, mb, NULL);
1348 ldlm_resource_putref(res);
1353 * MDT DoM lock intent policy (glimpse)
1355 * Intent policy is called when lock has an intent, for DoM file that
1356 * means glimpse lock and policy fills Lock Value Block (LVB).
1358 * If already granted lock is found it will be placed in \a lockp and
1359 * returned back to caller function.
1361 * \param[in] tsi session info
1362 * \param[in,out] lockp pointer to the lock
1363 * \param[in] flags LDLM flags
1365 * \retval ELDLM_LOCK_REPLACED if already granted lock was found
1366 * and placed in \a lockp
1367 * \retval ELDLM_LOCK_ABORTED in other cases except error
1368 * \retval negative value on error
1370 int mdt_glimpse_enqueue(struct mdt_thread_info *mti, struct ldlm_namespace *ns,
1371 struct ldlm_lock **lockp, __u64 flags)
1373 struct ldlm_lock *lock = *lockp;
1374 struct ldlm_resource *res = lock->l_resource;
1375 ldlm_processing_policy policy;
1376 struct ldlm_reply *rep;
1377 struct mdt_body *mbo;
1378 struct ost_lvb *lvb;
1379 bool old_client = !exp_connect_dom_lvb(mti->mti_exp);
1384 policy = ldlm_get_processing_policy(res);
1385 LASSERT(policy != NULL);
1387 if (unlikely(old_client)) {
1388 req_capsule_set_size(mti->mti_pill, &RMF_MDT_MD, RCL_SERVER, 0);
1389 req_capsule_set_size(mti->mti_pill, &RMF_ACL, RCL_SERVER, 0);
1391 req_capsule_set_size(mti->mti_pill, &RMF_DLM_LVB, RCL_SERVER,
1394 rc = req_capsule_server_pack(mti->mti_pill);
1396 RETURN(err_serious(rc));
1398 rep = req_capsule_server_get(mti->mti_pill, &RMF_DLM_REP);
1400 if (unlikely(old_client)) {
1401 mbo = req_capsule_server_get(mti->mti_pill, &RMF_MDT_BODY);
1405 lvb = req_capsule_server_get(mti->mti_pill, &RMF_DLM_LVB);
1411 /* Check if this is a resend case (MSG_RESENT is set on RPC) and a
1412 * lock was found by ldlm_handle_enqueue(); if so no need to grant
1414 if (flags & LDLM_FL_RESENT) {
1415 rc = LDLM_ITER_CONTINUE;
1417 __u64 tmpflags = LDLM_FL_BLOCK_NOWAIT;
1418 enum ldlm_error err;
1420 rc = policy(lock, &tmpflags, LDLM_PROCESS_RESCAN, &err, NULL);
1421 check_res_locked(res);
1425 /* The lock met with no resistance; we're finished. */
1426 if (rc == LDLM_ITER_CONTINUE) {
1427 GOTO(fill_mbo, rc = ELDLM_LOCK_REPLACED);
1428 } else if (flags & LDLM_FL_BLOCK_NOWAIT) {
1429 /* LDLM_FL_BLOCK_NOWAIT means it is for AGL. Do not send glimpse
1430 * callback for glimpse size. The real size user will trigger
1431 * the glimpse callback when necessary. */
1432 GOTO(fill_mbo, rc = ELDLM_LOCK_ABORTED);
1435 rc = mdt_do_glimpse(mti->mti_env, ns, res);
1436 if (rc == -ENOENT) {
1437 /* We are racing with unlink(); just return -ENOENT */
1438 rep->lock_policy_res2 = ptlrpc_status_hton(-ENOENT);
1439 } else if (rc == -EINVAL) {
1440 /* this is possible is client lock has been cancelled but
1441 * still exists on server. If that lock was found on server
1442 * as only conflicting lock then the client has already
1443 * size authority and glimpse is not needed. */
1444 CDEBUG(D_DLMTRACE, "Glimpse from the client owning lock\n");
1445 } else if (rc < 0) {
1448 rc = ELDLM_LOCK_ABORTED;
1450 /* LVB can be without valid data in case of DOM */
1451 if (!mdt_dom_lvb_is_valid(res))
1452 mdt_dom_lvbo_update(res, lock, NULL, false);
1453 mdt_lvb2reply(res, mbo, lvb);
1458 int mdt_brw_enqueue(struct mdt_thread_info *mti, struct ldlm_namespace *ns,
1459 struct ldlm_lock **lockp, __u64 flags)
1461 struct tgt_session_info *tsi = tgt_ses_info(mti->mti_env);
1462 struct lu_fid *fid = &tsi->tsi_fid;
1463 struct ldlm_lock *lock = *lockp;
1464 struct ldlm_resource *res = lock->l_resource;
1465 struct ldlm_reply *rep;
1466 struct mdt_body *mbo;
1467 struct mdt_lock_handle *lhc = &mti->mti_lh[MDT_LH_RMT];
1468 struct mdt_object *mo;
1473 req_capsule_set_size(mti->mti_pill, &RMF_MDT_MD, RCL_SERVER, 0);
1474 req_capsule_set_size(mti->mti_pill, &RMF_ACL, RCL_SERVER, 0);
1475 rc = req_capsule_server_pack(mti->mti_pill);
1477 RETURN(err_serious(rc));
1479 rep = req_capsule_server_get(mti->mti_pill, &RMF_DLM_REP);
1483 mbo = req_capsule_server_get(mti->mti_pill, &RMF_MDT_BODY);
1487 fid_extract_from_res_name(fid, &res->lr_name);
1488 mo = mdt_object_find(mti->mti_env, mti->mti_mdt, fid);
1489 if (unlikely(IS_ERR(mo)))
1490 RETURN(PTR_ERR(mo));
1492 if (!mdt_object_exists(mo))
1493 GOTO(out, rc = -ENOENT);
1495 if (mdt_object_remote(mo))
1496 GOTO(out, rc = -EPROTO);
1498 /* Get lock from request for possible resent case. */
1499 mdt_intent_fixup_resent(mti, *lockp, lhc, flags);
1501 if (!lustre_handle_is_used(&lhc->mlh_reg_lh)) {
1502 mdt_lock_handle_init(lhc);
1503 mdt_lh_reg_init(lhc, *lockp);
1505 /* This will block MDT thread but it should be fine until
1506 * client caches small amount of data for DoM, which should be
1507 * smaller than one BRW RPC and should be able to be
1508 * piggybacked by lock cancel RPC.
1509 * If the client could hold the lock too long, this code can be
1510 * revised to call mdt_object_lock_try(). And if fails, it will
1511 * return ELDLM_OK here and fall back into normal lock enqueue
1514 rc = mdt_object_lock(mti, mo, lhc, MDS_INODELOCK_DOM);
1519 if (!mdt_dom_lvb_is_valid(res)) {
1520 rc = mdt_dom_lvb_alloc(res);
1523 mdt_dom_disk_lvbo_update(mti->mti_env, mo, res, false);
1525 mdt_lvb2reply(res, mbo, NULL);
1527 rep->lock_policy_res2 = clear_serious(rc);
1528 if (rep->lock_policy_res2) {
1529 lhc->mlh_reg_lh.cookie = 0ull;
1530 GOTO(out, rc = ELDLM_LOCK_ABORTED);
1533 rc = mdt_intent_lock_replace(mti, lockp, lhc, flags, rc);
1536 lhc->mlh_reg_lh.cookie = 0ull;
1537 mdt_object_put(mti->mti_env, mo);
1541 /* check if client has already DoM lock for given resource */
1542 bool mdt_dom_client_has_lock(struct mdt_thread_info *info,
1543 const struct lu_fid *fid)
1545 struct mdt_device *mdt = info->mti_mdt;
1546 union ldlm_policy_data *policy = &info->mti_policy;
1547 struct ldlm_res_id *res_id = &info->mti_res_id;
1548 __u64 open_flags = info->mti_spec.sp_cr_flags;
1549 struct lustre_handle lockh;
1550 enum ldlm_mode mode;
1551 struct ldlm_lock *lock;
1555 policy->l_inodebits.bits = MDS_INODELOCK_DOM;
1556 fid_build_reg_res_name(fid, res_id);
1559 lm = (open_flags & MDS_FMODE_WRITE) ? LCK_PW : LCK_PR | LCK_PW;
1560 mode = ldlm_lock_match(mdt->mdt_namespace, LDLM_FL_BLOCK_GRANTED |
1561 LDLM_FL_TEST_LOCK, res_id, LDLM_IBITS, policy,
1564 /* There is no other PW lock on this object; finished. */
1568 lock = ldlm_handle2lock(&lockh);
1572 /* check if lock from the same client */
1573 rc = (lock->l_export->exp_handle.h_cookie ==
1574 info->mti_exp->exp_handle.h_cookie);
1575 LDLM_LOCK_PUT(lock);
1580 * MDT request handler for OST_GETATTR RPC.
1582 * This is data-specific request to get object and layout versions under
1583 * IO lock. It is reliable only for Data-on-MDT files.
1585 * \param[in] tsi target session environment for this request
1587 * \retval 0 if successful
1588 * \retval negative value on error
1590 int mdt_data_version_get(struct tgt_session_info *tsi)
1592 struct mdt_thread_info *mti = mdt_th_info(tsi->tsi_env);
1593 struct mdt_device *mdt = mti->mti_mdt;
1594 struct mdt_body *repbody;
1595 struct mdt_object *mo = mti->mti_object;
1596 struct lov_comp_md_v1 *comp;
1597 struct lustre_handle lh = { 0 };
1600 enum ldlm_mode lock_mode = LCK_PR;
1606 req_capsule_set_size(tsi->tsi_pill, &RMF_MDT_MD, RCL_SERVER, 0);
1607 req_capsule_set_size(tsi->tsi_pill, &RMF_ACL, RCL_SERVER, 0);
1608 req_capsule_set_size(tsi->tsi_pill, &RMF_FILE_ENCCTX, RCL_SERVER, 0);
1609 rc = req_capsule_server_pack(tsi->tsi_pill);
1610 if (unlikely(rc != 0))
1611 RETURN(err_serious(rc));
1613 repbody = req_capsule_server_get(tsi->tsi_pill, &RMF_MDT_BODY);
1614 if (repbody == NULL)
1617 srvlock = tsi->tsi_mdt_body->mbo_valid & OBD_MD_FLFLAGS &&
1618 tsi->tsi_mdt_body->mbo_flags & OBD_FL_SRVLOCK;
1621 if (unlikely(tsi->tsi_mdt_body->mbo_flags & OBD_FL_FLUSH))
1624 fid_build_reg_res_name(&tsi->tsi_fid, &tsi->tsi_resid);
1625 rc = tgt_mdt_data_lock(mdt->mdt_namespace, &tsi->tsi_resid,
1626 &lh, lock_mode, &flags);
1631 if (!mdt_object_exists(mo))
1632 GOTO(out, rc = -ENOENT);
1633 if (mdt_object_remote(mo))
1634 GOTO(out, rc = -EREMOTE);
1635 if (!S_ISREG(lu_object_attr(&mo->mot_obj)))
1636 GOTO(out, rc = -EBADF);
1638 /* Get version first */
1639 version = dt_version_get(tsi->tsi_env, mdt_obj2dt(mo));
1640 if (version && version != -EOPNOTSUPP) {
1641 repbody->mbo_valid |= OBD_MD_FLDATAVERSION;
1642 /* re-use mbo_ioepoch to transfer version */
1643 repbody->mbo_version = version;
1646 /* Read layout to get its version */
1647 rc = mdt_big_xattr_get(mti, mo, XATTR_NAME_LOV);
1648 if (rc == -ENODATA) /* File has no layout yet */
1653 comp = mti->mti_buf.lb_buf;
1654 if (le32_to_cpu(comp->lcm_magic) != LOV_MAGIC_COMP_V1) {
1655 CDEBUG(D_INFO, DFID" has no composite layout",
1656 PFID(&tsi->tsi_fid));
1657 GOTO(out, rc = -ESTALE);
1660 CDEBUG(D_INODE, DFID": layout version: %u\n",
1661 PFID(&tsi->tsi_fid), le32_to_cpu(comp->lcm_layout_gen));
1663 repbody->mbo_valid |= OBD_MD_LAYOUT_VERSION;
1664 /* re-use mbo_rdev for that */
1665 repbody->mbo_layout_gen = le32_to_cpu(comp->lcm_layout_gen);
1669 tgt_data_unlock(&lh, lock_mode);
1671 repbody->mbo_valid |= OBD_MD_FLFLAGS;
1672 repbody->mbo_flags = OBD_FL_FLUSH;
1676 /* read file data to the buffer */
1677 int mdt_dom_read_on_open(struct mdt_thread_info *mti, struct mdt_device *mdt,
1678 struct lustre_handle *lh)
1680 const struct lu_env *env = mti->mti_env;
1681 struct tgt_session_info *tsi = tgt_ses_info(env);
1682 struct req_capsule *pill = tsi->tsi_pill;
1683 const struct lu_fid *fid;
1684 struct ptlrpc_request *req = tgt_ses_req(tsi);
1685 struct mdt_body *mbo;
1686 struct dt_device *dt = mdt->mdt_bottom;
1687 struct dt_object *mo;
1689 struct niobuf_remote *rnb = NULL;
1690 struct niobuf_local *lnb;
1693 unsigned int len, copied = 0;
1694 __u64 real_dom_size;
1695 int lnbs, nr_local, i;
1696 bool dom_lock = false;
1700 if (!req_capsule_field_present(pill, &RMF_NIOBUF_INLINE, RCL_SERVER)) {
1701 /* There is no reply buffers for this field, this means that
1702 * client has no support for data in reply.
1707 mbo = req_capsule_server_get(pill, &RMF_MDT_BODY);
1708 if (!(mbo->mbo_valid & OBD_MD_DOM_SIZE))
1711 if (!mbo->mbo_dom_size)
1714 if (lustre_handle_is_used(lh)) {
1715 struct ldlm_lock *lock;
1717 lock = ldlm_handle2lock(lh);
1719 dom_lock = ldlm_has_dom(lock) && ldlm_has_layout(lock);
1720 LDLM_LOCK_PUT(lock);
1724 /* return data along with open only along with DoM lock */
1725 if (!dom_lock || !mdt->mdt_opts.mo_dom_read_open)
1728 /* if DoM object holds encrypted content, we need to make sure we
1729 * send whole encryption units, or client will read corrupted content
1731 if (mbo->mbo_valid & LA_FLAGS && mbo->mbo_flags & LUSTRE_ENCRYPT_FL &&
1732 mbo->mbo_dom_size & ~LUSTRE_ENCRYPTION_MASK)
1733 real_dom_size = (mbo->mbo_dom_size & LUSTRE_ENCRYPTION_MASK) +
1734 LUSTRE_ENCRYPTION_UNIT_SIZE;
1736 real_dom_size = mbo->mbo_dom_size;
1738 CDEBUG(D_INFO, "File size %llu, reply sizes %d/%d\n",
1739 real_dom_size, req->rq_reqmsg->lm_repsize, req->rq_replen);
1740 len = req->rq_reqmsg->lm_repsize - req->rq_replen;
1742 /* NB: at this moment we have the following sizes:
1743 * - req->rq_replen: used data in reply
1744 * - req->rq_reqmsg->lm_repsize: total allocated reply buffer at client
1746 * Ideal case when file size fits in allocated reply buffer,
1747 * that mean we can return whole data in reply. We can also fit more
1748 * data up to max_reply_size in total reply size, but this will cause
1749 * re-allocation on client and resend with larger buffer. This is still
1750 * faster than separate READ IO.
1751 * Third case if file is too big to fit even in maximum size, in that
1752 * case we return just tail to optimize possible append.
1754 * At the moment the following strategy is used:
1755 * 1) try to fit into the buffer we have
1756 * 2) return just file tail otherwise.
1758 if (real_dom_size <= len) {
1759 /* can fit whole data */
1760 len = real_dom_size;
1762 } else if (real_dom_size <
1763 mdt_lmm_dom_stripesize(mti->mti_attr.ma_lmm)) {
1766 /* File tail offset must be aligned with larger page size
1767 * between client and server, so the maximum page size is
1768 * used here to align offset.
1770 * NB: DOM feature was introduced when server supports pagebits
1771 * already, so it should be always non-zero value. Report error
1772 * if it is not for some reason.
1774 if (!req->rq_export->exp_target_data.ted_pagebits) {
1775 CERROR("%s: client page bits are not saved on server\n",
1779 pgbits = max_t(int, PAGE_SHIFT,
1780 req->rq_export->exp_target_data.ted_pagebits);
1781 tail = real_dom_size % (1 << pgbits);
1783 /* no partial tail or tail can't fit in reply */
1784 if (tail == 0 || len < tail)
1788 offset = real_dom_size - len;
1790 /* DOM stripe is fully written, so don't expect its tail
1791 * will be used by append.
1796 LASSERT((offset & ~PAGE_MASK) == 0);
1797 rc = req_capsule_server_grow(pill, &RMF_NIOBUF_INLINE,
1798 sizeof(*rnb) + len);
1800 /* failed to grow data buffer, just exit */
1801 GOTO(out, rc = -E2BIG);
1804 /* re-take MDT_BODY and NIOBUF_INLINE buffers after the buffer grow */
1805 mbo = req_capsule_server_get(pill, &RMF_MDT_BODY);
1806 fid = &mbo->mbo_fid1;
1807 if (!fid_is_sane(fid))
1808 GOTO(out, rc = -EINVAL);
1810 rnb = req_capsule_server_get(tsi->tsi_pill, &RMF_NIOBUF_INLINE);
1812 GOTO(out, rc = -EPROTO);
1814 buf = (char *)rnb + sizeof(*rnb);
1816 rnb->rnb_offset = offset;
1818 mo = dt_locate(env, dt, fid);
1820 GOTO(out_rnb, rc = PTR_ERR(mo));
1821 LASSERT(mo != NULL);
1823 dt_read_lock(env, mo, 0);
1824 if (!dt_object_exists(mo))
1825 GOTO(unlock, rc = -ENOENT);
1827 /* parse remote buffers to local buffers and prepare the latter */
1828 lnbs = (len >> PAGE_SHIFT) + 1;
1829 OBD_ALLOC_PTR_ARRAY(lnb, lnbs);
1831 GOTO(unlock, rc = -ENOMEM);
1833 rc = dt_bufs_get(env, mo, rnb, lnb, lnbs, 0);
1834 if (unlikely(rc < 0))
1836 LASSERT(rc <= lnbs);
1838 rc = dt_read_prep(env, mo, lnb, nr_local);
1841 /* copy data to the buffer finally */
1842 for (i = 0; i < nr_local; i++) {
1843 char *p = kmap(lnb[i].lnb_page);
1846 LASSERT(lnb[i].lnb_page_offset == 0);
1847 off = lnb[i].lnb_len & ~PAGE_MASK;
1849 memset(p + off, 0, PAGE_SIZE - off);
1851 memcpy(buf + (i << PAGE_SHIFT), p, lnb[i].lnb_len);
1852 kunmap(lnb[i].lnb_page);
1853 copied += lnb[i].lnb_len;
1856 CDEBUG(D_INFO, "Read %i (wanted %u) bytes from %llu\n", copied,
1859 CWARN("%s: read %i bytes for "DFID
1860 " but wanted %u, is size wrong?\n",
1861 tsi->tsi_exp->exp_obd->obd_name, copied,
1862 PFID(&tsi->tsi_fid), len);
1863 /* Ignore partially copied data */
1868 dt_bufs_put(env, mo, lnb, nr_local);
1870 OBD_FREE_PTR_ARRAY(lnb, lnbs);
1872 dt_read_unlock(env, mo);
1873 lu_object_put(env, &mo->do_lu);
1875 rnb->rnb_len = copied;
1877 /* Don't fail OPEN request if read-on-open is failed, but drop
1878 * a message in log about the error.
1881 CDEBUG(D_INFO, "Read-on-open is failed, rc = %d", rc);
1887 * Completion AST for DOM discard locks:
1889 * CP AST an DOM discard lock is called always right after enqueue or from
1890 * reprocess if lock was blocked, in the latest case l_ast_data is set to
1891 * the mdt_object which is kept while there are pending locks on it.
1893 int ldlm_dom_discard_cp_ast(struct ldlm_lock *lock, __u64 flags, void *data)
1895 struct mdt_object *mo;
1896 struct lustre_handle dom_lh;
1901 /* l_ast_data is set when lock was not granted immediately
1902 * in mdt_dom_discard_data() below but put into waiting list,
1903 * so this CP callback means we are finished and corresponding
1904 * MDT object should be released finally as well as lock itself.
1906 lock_res_and_lock(lock);
1907 if (!lock->l_ast_data) {
1908 unlock_res_and_lock(lock);
1912 mo = lock->l_ast_data;
1913 lock->l_ast_data = NULL;
1914 unlock_res_and_lock(lock);
1916 ldlm_lock2handle(lock, &dom_lh);
1917 ldlm_lock_decref(&dom_lh, LCK_PW);
1919 env = lu_env_find();
1921 mdt_object_put(env, mo);
1926 void mdt_dom_discard_data(struct mdt_thread_info *info,
1927 struct mdt_object *mo)
1929 struct ptlrpc_request *req = mdt_info_req(info);
1930 struct mdt_device *mdt = mdt_dev(mo->mot_obj.lo_dev);
1931 union ldlm_policy_data policy;
1932 struct ldlm_res_id res_id;
1933 struct lustre_handle dom_lh;
1934 struct ldlm_lock *lock;
1935 __u64 flags = LDLM_FL_AST_DISCARD_DATA;
1941 if (req && req_is_replay(req))
1944 policy.l_inodebits.bits = MDS_INODELOCK_DOM;
1945 policy.l_inodebits.try_bits = 0;
1946 fid_build_reg_res_name(mdt_object_fid(mo), &res_id);
1948 /* Keep blocking version of discard for an old client to avoid
1949 * crashes on non-patched clients. LU-11359.
1951 old_client = req && !(exp_connect_flags2(req->rq_export) &
1952 OBD_CONNECT2_ASYNC_DISCARD);
1954 /* Tell the clients that the object is gone now and that they should
1955 * throw away any cached pages. */
1956 rc = ldlm_cli_enqueue_local(info->mti_env, mdt->mdt_namespace, &res_id,
1957 LDLM_IBITS, &policy, LCK_PW, &flags,
1958 ldlm_blocking_ast, old_client ?
1959 ldlm_completion_ast :
1960 ldlm_dom_discard_cp_ast,
1961 NULL, NULL, 0, LVB_T_NONE, NULL, &dom_lh);
1962 if (rc != ELDLM_OK) {
1964 "Failed to issue discard lock, rc = %d\n", rc);
1968 lock = ldlm_handle2lock(&dom_lh);
1969 lock_res_and_lock(lock);
1970 /* if lock is not granted then there are BL ASTs in progress and
1971 * lock will be granted in result of reprocessing with CP callback
1972 * notifying about that. The mdt object has to be kept until that and
1973 * it is saved in l_ast_data of the lock. Lock reference is kept too
1974 * until that to prevent it from canceling.
1976 if (!is_granted_or_cancelled_nolock(lock)) {
1977 mdt_object_get(info->mti_env, mo);
1978 lock->l_ast_data = mo;
1979 unlock_res_and_lock(lock);
1981 unlock_res_and_lock(lock);
1982 ldlm_lock_decref_and_cancel(&dom_lh, LCK_PW);
1984 LDLM_LOCK_PUT(lock);