4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License version 2 for more details (a copy is included
14 * in the LICENSE file that accompanied this code).
16 * You should have received a copy of the GNU General Public License
17 * version 2 along with this program; If not, see
18 * http://www.gnu.org/licenses/gpl-2.0.html
23 * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
24 * Use is subject to license terms.
26 * Copyright (c) 2011, 2016, Intel Corporation.
29 * This file is part of Lustre, http://www.lustre.org/
30 * Lustre is a trademark of Sun Microsystems, Inc.
32 * lustre/mdt/mdt_reint.c
34 * Lustre Metadata Target (mdt) reintegration routines
36 * Author: Peter Braam <braam@clusterfs.com>
37 * Author: Andreas Dilger <adilger@clusterfs.com>
38 * Author: Phil Schwan <phil@clusterfs.com>
39 * Author: Huang Hua <huanghua@clusterfs.com>
40 * Author: Yury Umanets <umka@clusterfs.com>
43 #define DEBUG_SUBSYSTEM S_MDS
45 #include <lprocfs_status.h>
46 #include "mdt_internal.h"
47 #include <lustre_lmv.h>
49 static inline void mdt_reint_init_ma(struct mdt_thread_info *info,
52 ma->ma_need = MA_INODE;
57 * Get version of object by fid.
59 * Return real version or ENOENT_VERSION if object doesn't exist
61 static void mdt_obj_version_get(struct mdt_thread_info *info,
62 struct mdt_object *o, __u64 *version)
66 if (mdt_object_exists(o) && !mdt_object_remote(o) &&
67 !fid_is_obf(mdt_object_fid(o)))
68 *version = dt_version_get(info->mti_env, mdt_obj2dt(o));
70 *version = ENOENT_VERSION;
71 CDEBUG(D_INODE, "FID "DFID" version is %#llx\n",
72 PFID(mdt_object_fid(o)), *version);
76 * Check version is correct.
78 * Should be called only during replay.
80 static int mdt_version_check(struct ptlrpc_request *req,
81 __u64 version, int idx)
83 __u64 *pre_ver = lustre_msg_get_versions(req->rq_reqmsg);
86 if (!exp_connect_vbr(req->rq_export))
89 LASSERT(req_is_replay(req));
90 /** VBR: version is checked always because costs nothing */
91 LASSERT(idx < PTLRPC_NUM_VERSIONS);
92 /** Sanity check for malformed buffers */
93 if (pre_ver == NULL) {
94 CERROR("No versions in request buffer\n");
95 spin_lock(&req->rq_export->exp_lock);
96 req->rq_export->exp_vbr_failed = 1;
97 spin_unlock(&req->rq_export->exp_lock);
99 } else if (pre_ver[idx] != version) {
100 CDEBUG(D_INODE, "Version mismatch %#llx != %#llx\n",
101 pre_ver[idx], version);
102 spin_lock(&req->rq_export->exp_lock);
103 req->rq_export->exp_vbr_failed = 1;
104 spin_unlock(&req->rq_export->exp_lock);
111 * Save pre-versions in reply.
113 static void mdt_version_save(struct ptlrpc_request *req, __u64 version,
118 if (!exp_connect_vbr(req->rq_export))
121 LASSERT(!req_is_replay(req));
122 LASSERT(req->rq_repmsg != NULL);
123 reply_ver = lustre_msg_get_versions(req->rq_repmsg);
125 reply_ver[idx] = version;
129 * Save enoent version, it is needed when it is obvious that object doesn't
130 * exist, e.g. child during create.
132 static void mdt_enoent_version_save(struct mdt_thread_info *info, int idx)
134 /* save version of file name for replay, it must be ENOENT here */
135 if (!req_is_replay(mdt_info_req(info))) {
136 info->mti_ver[idx] = ENOENT_VERSION;
137 mdt_version_save(mdt_info_req(info), info->mti_ver[idx], idx);
142 * Get version from disk and save in reply buffer.
144 * Versions are saved in reply only during normal operations not replays.
146 void mdt_version_get_save(struct mdt_thread_info *info,
147 struct mdt_object *mto, int idx)
149 /* don't save versions during replay */
150 if (!req_is_replay(mdt_info_req(info))) {
151 mdt_obj_version_get(info, mto, &info->mti_ver[idx]);
152 mdt_version_save(mdt_info_req(info), info->mti_ver[idx], idx);
157 * Get version from disk and check it, no save in reply.
159 int mdt_version_get_check(struct mdt_thread_info *info,
160 struct mdt_object *mto, int idx)
162 /* only check versions during replay */
163 if (!req_is_replay(mdt_info_req(info)))
166 mdt_obj_version_get(info, mto, &info->mti_ver[idx]);
167 return mdt_version_check(mdt_info_req(info), info->mti_ver[idx], idx);
171 * Get version from disk and check if recovery or just save.
173 int mdt_version_get_check_save(struct mdt_thread_info *info,
174 struct mdt_object *mto, int idx)
178 mdt_obj_version_get(info, mto, &info->mti_ver[idx]);
179 if (req_is_replay(mdt_info_req(info)))
180 rc = mdt_version_check(mdt_info_req(info), info->mti_ver[idx],
183 mdt_version_save(mdt_info_req(info), info->mti_ver[idx], idx);
188 * Lookup with version checking.
190 * This checks version of 'name'. Many reint functions uses 'name' for child not
191 * FID, therefore we need to get object by name and check its version.
193 static int mdt_lookup_version_check(struct mdt_thread_info *info,
194 struct mdt_object *p,
195 const struct lu_name *lname,
196 struct lu_fid *fid, int idx)
200 rc = mdo_lookup(info->mti_env, mdt_object_child(p), lname, fid,
202 /* Check version only during replay */
203 if (!req_is_replay(mdt_info_req(info)))
206 info->mti_ver[idx] = ENOENT_VERSION;
208 struct mdt_object *child;
209 child = mdt_object_find(info->mti_env, info->mti_mdt, fid);
210 if (likely(!IS_ERR(child))) {
211 mdt_obj_version_get(info, child, &info->mti_ver[idx]);
212 mdt_object_put(info->mti_env, child);
215 vbrc = mdt_version_check(mdt_info_req(info), info->mti_ver[idx], idx);
216 return vbrc ? vbrc : rc;
220 static inline int mdt_remote_permission_check(struct mdt_thread_info *info)
222 struct lu_ucred *uc = mdt_ucred(info);
223 struct mdt_device *mdt = info->mti_mdt;
225 if (!md_capable(uc, CFS_CAP_SYS_ADMIN)) {
226 if (uc->uc_gid != mdt->mdt_enable_remote_dir_gid &&
227 mdt->mdt_enable_remote_dir_gid != -1)
235 * mdt_remote_permission: Check whether the remote operation is permitted,
237 * Only sysadmin can create remote directory / striped directory,
238 * migrate directory and set default stripedEA on directory, unless
240 * lctl set_param mdt.*.enable_remote_dir_gid=allow_gid.
242 * param[in] info: mdt_thread_info.
244 * retval = 0 remote operation is allowed.
245 * < 0 remote operation is denied.
247 static int mdt_remote_permission(struct mdt_thread_info *info)
249 struct md_op_spec *spec = &info->mti_spec;
250 struct lu_attr *attr = &info->mti_attr.ma_attr;
251 struct obd_export *exp = mdt_info_req(info)->rq_export;
254 if (info->mti_rr.rr_opcode == REINT_MIGRATE) {
255 rc = mdt_remote_permission_check(info);
260 if (info->mti_rr.rr_opcode == REINT_CREATE &&
261 (S_ISDIR(attr->la_mode) && spec->u.sp_ea.eadata != NULL &&
262 spec->u.sp_ea.eadatalen != 0)) {
263 const struct lmv_user_md *lum = spec->u.sp_ea.eadata;
265 /* Only new clients can create remote dir( >= 2.4) and
266 * striped dir(>= 2.6), old client will return -ENOTSUPP */
267 if (!mdt_is_dne_client(exp))
270 if (le32_to_cpu(lum->lum_stripe_count) > 1 &&
271 !mdt_is_striped_client(exp))
274 rc = mdt_remote_permission_check(info);
279 if (info->mti_rr.rr_opcode == REINT_SETATTR) {
280 struct md_attr *ma = &info->mti_attr;
282 if ((ma->ma_valid & MA_LMV)) {
283 rc = mdt_remote_permission_check(info);
292 static int mdt_unlock_slaves(struct mdt_thread_info *mti,
293 struct mdt_object *obj, __u64 ibits,
294 struct mdt_lock_handle *s0_lh,
295 struct mdt_object *s0_obj,
296 struct ldlm_enqueue_info *einfo,
299 union ldlm_policy_data *policy = &mti->mti_policy;
300 struct lustre_handle_array *slave_locks = einfo->ei_cbdata;
305 if (!S_ISDIR(obj->mot_header.loh_attr))
308 /* Unlock stripe 0 */
309 if (s0_lh != NULL && lustre_handle_is_used(&s0_lh->mlh_reg_lh)) {
310 LASSERT(s0_obj != NULL);
311 mdt_object_unlock_put(mti, s0_obj, s0_lh, decref);
314 memset(policy, 0, sizeof(*policy));
315 policy->l_inodebits.bits = ibits;
317 if (slave_locks != NULL) {
318 LASSERT(s0_lh != NULL);
319 for (i = 1; i < slave_locks->count; i++) {
320 /* borrow s0_lh temporarily to do mdt unlock */
321 mdt_lock_reg_init(s0_lh, einfo->ei_mode);
322 s0_lh->mlh_rreg_lh = slave_locks->handles[i];
323 mdt_object_unlock(mti, NULL, s0_lh, decref);
324 slave_locks->handles[i].cookie = 0ull;
328 rc = mo_object_unlock(mti->mti_env, mdt_object_child(obj), einfo,
333 static int mdt_init_slaves(struct mdt_thread_info *mti, struct mdt_object *obj,
336 struct lu_buf *buf = &mti->mti_buf;
337 struct lmv_mds_md_v1 *lmv;
341 if (!S_ISDIR(obj->mot_header.loh_attr))
344 buf->lb_buf = mti->mti_xattr_buf;
345 buf->lb_len = sizeof(mti->mti_xattr_buf);
346 rc = mo_xattr_get(mti->mti_env, mdt_object_child(obj), buf,
349 rc = mdt_big_xattr_get(mti, obj, XATTR_NAME_LMV);
351 buf->lb_buf = mti->mti_big_lmm;
352 buf->lb_len = mti->mti_big_lmmsize;
356 if (rc == -ENODATA || rc == -ENOENT)
363 if (le32_to_cpu(lmv->lmv_magic) != LMV_MAGIC_V1)
366 fid_le_to_cpu(fid, &lmv->lmv_stripe_fids[0]);
372 * Lock slave stripes if necessary, the lock handles of slave stripes
373 * will be stored in einfo->ei_cbdata.
375 static int mdt_lock_slaves(struct mdt_thread_info *mti, struct mdt_object *obj,
376 enum ldlm_mode mode, __u64 ibits,
377 struct lu_fid *s0_fid,
378 struct mdt_lock_handle *s0_lh,
379 struct mdt_object **s0_objp,
380 struct ldlm_enqueue_info *einfo)
382 union ldlm_policy_data *policy = &mti->mti_policy;
386 memset(einfo, 0, sizeof(*einfo));
388 rc = mdt_init_slaves(mti, obj, s0_fid);
392 LASSERT(S_ISDIR(obj->mot_header.loh_attr));
394 if (!lu_fid_eq(s0_fid, mdt_object_fid(obj))) {
395 /* Except migrating object, whose 0_stripe and master
396 * object are the same object, 0_stripe and master
397 * object are different, though they are in the same
398 * MDT, to avoid adding osd_object_lock here, so we
399 * will enqueue the stripe0 lock in MDT0 for now */
400 *s0_objp = mdt_object_find(mti->mti_env, mti->mti_mdt, s0_fid);
401 if (IS_ERR(*s0_objp))
402 RETURN(PTR_ERR(*s0_objp));
404 rc = mdt_reint_object_lock(mti, *s0_objp, s0_lh, ibits, true);
406 mdt_object_put(mti->mti_env, *s0_objp);
411 einfo->ei_type = LDLM_IBITS;
412 einfo->ei_mode = mode;
413 einfo->ei_cb_bl = mdt_remote_blocking_ast;
414 einfo->ei_cb_local_bl = mdt_blocking_ast;
415 einfo->ei_cb_cp = ldlm_completion_ast;
416 einfo->ei_enq_slave = 1;
417 einfo->ei_namespace = mti->mti_mdt->mdt_namespace;
418 memset(policy, 0, sizeof(*policy));
419 policy->l_inodebits.bits = ibits;
421 rc = mo_object_lock(mti->mti_env, mdt_object_child(obj), NULL, einfo,
427 * VBR: we save three versions in reply:
428 * 0 - parent. Check that parent version is the same during replay.
429 * 1 - name. Version of 'name' if file exists with the same name or
430 * ENOENT_VERSION, it is needed because file may appear due to missed replays.
431 * 2 - child. Version of child by FID. Must be ENOENT. It is mostly sanity
434 static int mdt_create(struct mdt_thread_info *info)
436 struct mdt_device *mdt = info->mti_mdt;
437 struct mdt_object *parent;
438 struct mdt_object *child;
439 struct mdt_lock_handle *lh;
440 struct mdt_body *repbody;
441 struct md_attr *ma = &info->mti_attr;
442 struct mdt_reint_record *rr = &info->mti_rr;
446 DEBUG_REQ(D_INODE, mdt_info_req(info), "Create ("DNAME"->"DFID") "
448 PNAME(&rr->rr_name), PFID(rr->rr_fid2), PFID(rr->rr_fid1));
450 if (!fid_is_md_operative(rr->rr_fid1))
453 repbody = req_capsule_server_get(info->mti_pill, &RMF_MDT_BODY);
455 parent = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid1);
457 RETURN(PTR_ERR(parent));
459 if (!mdt_object_exists(parent))
460 GOTO(put_parent, rc = -ENOENT);
462 lh = &info->mti_lh[MDT_LH_PARENT];
463 mdt_lock_pdo_init(lh, LCK_PW, &rr->rr_name);
464 rc = mdt_object_lock(info, parent, lh, MDS_INODELOCK_UPDATE);
466 GOTO(put_parent, rc);
468 if (!mdt_object_remote(parent)) {
469 rc = mdt_version_get_check_save(info, parent, 0);
471 GOTO(unlock_parent, rc);
475 * Check child name version during replay.
476 * During create replay a file may exist with same name.
478 rc = mdt_lookup_version_check(info, parent, &rr->rr_name,
479 &info->mti_tmp_fid1, 1);
481 GOTO(unlock_parent, rc = -EEXIST);
483 /* -ENOENT is expected here */
485 GOTO(unlock_parent, rc);
487 /* save version of file name for replay, it must be ENOENT here */
488 mdt_enoent_version_save(info, 1);
490 child = mdt_object_new(info->mti_env, mdt, rr->rr_fid2);
491 if (unlikely(IS_ERR(child)))
492 GOTO(unlock_parent, rc = PTR_ERR(child));
494 rc = mdt_remote_permission(info);
498 ma->ma_need = MA_INODE;
501 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
502 OBD_FAIL_MDS_REINT_CREATE_WRITE);
504 /* Version of child will be updated on disk. */
505 tgt_vbr_obj_set(info->mti_env, mdt_obj2dt(child));
506 rc = mdt_version_get_check_save(info, child, 2);
510 /* Let lower layer know current lock mode. */
511 info->mti_spec.sp_cr_mode = mdt_dlm_mode2mdl_mode(lh->mlh_pdo_mode);
514 * Do not perform lookup sanity check. We know that name does
517 info->mti_spec.sp_cr_lookup = 0;
518 info->mti_spec.sp_feat = &dt_directory_features;
520 rc = mdo_create(info->mti_env, mdt_object_child(parent), &rr->rr_name,
521 mdt_object_child(child), &info->mti_spec, ma);
523 rc = mdt_attr_get_complex(info, child, ma);
529 * On DNE, we need to eliminate dependey between 'mkdir a' and
530 * 'mkdir a/b' if b is a striped directory, to achieve this, two
531 * things are done below:
532 * 1. save child and slaves lock.
533 * 2. if the child is a striped directory, relock parent so to
534 * compare against with COS locks to ensure parent was
537 if (mdt_slc_is_enabled(mdt) && S_ISDIR(ma->ma_attr.la_mode)) {
538 struct mdt_lock_handle *lhc;
539 struct mdt_lock_handle *s0_lh;
540 struct mdt_object *s0_obj = NULL;
541 struct ldlm_enqueue_info *einfo;
542 struct lu_fid *s0_fid = &info->mti_tmp_fid1;
543 bool cos_incompat = false;
545 rc = mdt_init_slaves(info, child, s0_fid);
548 if (!mdt_object_remote(parent)) {
549 mdt_object_unlock(info, parent, lh, 1);
550 mdt_lock_pdo_init(lh, LCK_PW, &rr->rr_name);
551 rc = mdt_reint_object_lock(info, parent, lh,
552 MDS_INODELOCK_UPDATE,
559 einfo = &info->mti_einfo;
560 lhc = &info->mti_lh[MDT_LH_CHILD];
561 mdt_lock_handle_init(lhc);
562 mdt_lock_reg_init(lhc, LCK_PW);
563 rc = mdt_reint_object_lock(info, child, lhc,
564 MDS_INODELOCK_UPDATE,
568 mdt_object_unlock(info, child, lhc, rc);
570 s0_lh = &info->mti_lh[MDT_LH_LOCAL];
571 mdt_lock_handle_init(s0_lh);
572 mdt_lock_reg_init(s0_lh, LCK_PW);
573 rc = mdt_lock_slaves(info, child, LCK_PW, MDS_INODELOCK_UPDATE,
574 s0_fid, s0_lh, &s0_obj, einfo);
575 mdt_unlock_slaves(info, child, MDS_INODELOCK_UPDATE, s0_lh,
577 if (OBD_FAIL_CHECK(OBD_FAIL_LFSCK_BAD_SLAVE_NAME) && rc == -EIO)
581 /* Return fid & attr to client. */
582 if (ma->ma_valid & MA_INODE)
583 mdt_pack_attr2body(info, repbody, &ma->ma_attr,
584 mdt_object_fid(child));
586 mdt_object_put(info->mti_env, child);
588 mdt_object_unlock(info, parent, lh, rc);
590 mdt_object_put(info->mti_env, parent);
594 static int mdt_attr_set(struct mdt_thread_info *info, struct mdt_object *mo,
597 struct mdt_lock_handle *lh;
598 int do_vbr = ma->ma_attr.la_valid &
599 (LA_MODE | LA_UID | LA_GID | LA_PROJID | LA_FLAGS);
600 __u64 lockpart = MDS_INODELOCK_UPDATE;
601 struct ldlm_enqueue_info *einfo = &info->mti_einfo;
602 struct lu_fid *s0_fid = &info->mti_tmp_fid1;
603 struct mdt_lock_handle *s0_lh = NULL;
604 struct mdt_object *s0_obj = NULL;
605 bool cos_incompat = false;
609 rc = mdt_init_slaves(info, mo, s0_fid);
613 lh = &info->mti_lh[MDT_LH_PARENT];
614 mdt_lock_reg_init(lh, LCK_PW);
616 /* Even though the new MDT will grant PERM lock to the old
617 * client, but the old client will almost ignore that during
618 * So it needs to revoke both LOOKUP and PERM lock here, so
619 * both new and old client can cancel the dcache */
620 if (ma->ma_attr.la_valid & (LA_MODE|LA_UID|LA_GID))
621 lockpart |= MDS_INODELOCK_LOOKUP | MDS_INODELOCK_PERM;
623 rc = mdt_reint_object_lock(info, mo, lh, lockpart, cos_incompat);
627 s0_lh = &info->mti_lh[MDT_LH_LOCAL];
628 mdt_lock_reg_init(s0_lh, LCK_PW);
629 rc = mdt_lock_slaves(info, mo, LCK_PW, lockpart, s0_fid, s0_lh, &s0_obj,
632 GOTO(out_unlock, rc);
634 /* all attrs are packed into mti_attr in unpack_setattr */
635 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
636 OBD_FAIL_MDS_REINT_SETATTR_WRITE);
638 /* This is only for set ctime when rename's source is on remote MDS. */
639 if (unlikely(ma->ma_attr.la_valid == LA_CTIME))
640 ma->ma_attr_flags |= MDS_VTX_BYPASS;
642 /* VBR: update version if attr changed are important for recovery */
644 /* update on-disk version of changed object */
645 tgt_vbr_obj_set(info->mti_env, mdt_obj2dt(mo));
646 rc = mdt_version_get_check_save(info, mo, 0);
648 GOTO(out_unlock, rc);
651 /* Ensure constant striping during chown(). See LU-2789. */
652 if (ma->ma_attr.la_valid & (LA_UID|LA_GID|LA_PROJID))
653 mutex_lock(&mo->mot_lov_mutex);
655 /* all attrs are packed into mti_attr in unpack_setattr */
656 rc = mo_attr_set(info->mti_env, mdt_object_child(mo), ma);
658 if (ma->ma_attr.la_valid & (LA_UID|LA_GID|LA_PROJID))
659 mutex_unlock(&mo->mot_lov_mutex);
662 GOTO(out_unlock, rc);
666 mdt_unlock_slaves(info, mo, lockpart, s0_lh, s0_obj, einfo, rc);
667 mdt_object_unlock(info, mo, lh, rc);
672 * Check HSM flags and add HS_DIRTY flag if relevant.
674 * A file could be set dirty only if it has a copy in the backend (HS_EXISTS)
675 * and is not RELEASED.
677 int mdt_add_dirty_flag(struct mdt_thread_info *info, struct mdt_object *mo,
683 /* If the file was modified, add the dirty flag */
684 ma->ma_need = MA_HSM;
685 rc = mdt_attr_get_complex(info, mo, ma);
687 CERROR("file attribute read error for "DFID": %d.\n",
688 PFID(mdt_object_fid(mo)), rc);
692 /* If an up2date copy exists in the backend, add dirty flag */
693 if ((ma->ma_valid & MA_HSM) && (ma->ma_hsm.mh_flags & HS_EXISTS)
694 && !(ma->ma_hsm.mh_flags & (HS_DIRTY|HS_RELEASED))) {
695 ma->ma_hsm.mh_flags |= HS_DIRTY;
697 rc = mdt_hsm_attr_set(info, mo, &ma->ma_hsm);
699 CERROR("file attribute change error for "DFID": %d\n",
700 PFID(mdt_object_fid(mo)), rc);
706 static int mdt_reint_setattr(struct mdt_thread_info *info,
707 struct mdt_lock_handle *lhc)
709 struct md_attr *ma = &info->mti_attr;
710 struct mdt_reint_record *rr = &info->mti_rr;
711 struct ptlrpc_request *req = mdt_info_req(info);
712 struct mdt_object *mo;
713 struct mdt_body *repbody;
717 DEBUG_REQ(D_INODE, req, "setattr "DFID" %x", PFID(rr->rr_fid1),
718 (unsigned int)ma->ma_attr.la_valid);
720 if (info->mti_dlm_req)
721 ldlm_request_cancel(req, info->mti_dlm_req, 0, LATF_SKIP);
723 repbody = req_capsule_server_get(info->mti_pill, &RMF_MDT_BODY);
724 mo = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid1);
726 GOTO(out, rc = PTR_ERR(mo));
728 if (!mdt_object_exists(mo))
729 GOTO(out_put, rc = -ENOENT);
731 if (mdt_object_remote(mo))
732 GOTO(out_put, rc = -EREMOTE);
734 if ((ma->ma_attr.la_valid & LA_SIZE) ||
735 (rr->rr_flags & MRF_OPEN_TRUNC)) {
736 /* Check write access for the O_TRUNC case */
737 if (mdt_write_read(mo) < 0)
738 GOTO(out_put, rc = -ETXTBSY);
741 if ((ma->ma_valid & MA_INODE) && ma->ma_attr.la_valid) {
742 if (ma->ma_valid & MA_LOV)
743 GOTO(out_put, rc = -EPROTO);
745 rc = mdt_attr_set(info, mo, ma);
748 } else if ((ma->ma_valid & (MA_LOV | MA_LMV)) &&
749 (ma->ma_valid & MA_INODE)) {
750 struct lu_buf *buf = &info->mti_buf;
751 struct mdt_lock_handle *lh;
753 rc = mdt_remote_permission(info);
757 if (ma->ma_attr.la_valid != 0)
758 GOTO(out_put, rc = -EPROTO);
760 lh = &info->mti_lh[MDT_LH_PARENT];
761 mdt_lock_reg_init(lh, LCK_PW);
763 rc = mdt_object_lock(info, mo, lh, MDS_INODELOCK_XATTR);
767 if (ma->ma_valid & MA_LOV) {
768 buf->lb_buf = ma->ma_lmm;
769 buf->lb_len = ma->ma_lmm_size;
771 buf->lb_buf = ma->ma_lmv;
772 buf->lb_len = ma->ma_lmv_size;
774 rc = mo_xattr_set(info->mti_env, mdt_object_child(mo), buf,
775 (ma->ma_valid & MA_LOV) ?
776 XATTR_NAME_LOV : XATTR_NAME_DEFAULT_LMV,
779 mdt_object_unlock(info, mo, lh, rc);
783 GOTO(out_put, rc = -EPROTO);
786 /* If file data is modified, add the dirty flag */
787 if (ma->ma_attr_flags & MDS_DATA_MODIFIED)
788 rc = mdt_add_dirty_flag(info, mo, ma);
790 ma->ma_need = MA_INODE;
792 rc = mdt_attr_get_complex(info, mo, ma);
796 mdt_pack_attr2body(info, repbody, &ma->ma_attr, mdt_object_fid(mo));
800 mdt_object_put(info->mti_env, mo);
803 mdt_counter_incr(req, LPROC_MDT_SETATTR);
805 mdt_client_compatibility(info);
806 rc2 = mdt_fix_reply(info);
812 static int mdt_reint_create(struct mdt_thread_info *info,
813 struct mdt_lock_handle *lhc)
815 struct ptlrpc_request *req = mdt_info_req(info);
819 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_REINT_CREATE))
820 RETURN(err_serious(-ESTALE));
822 if (info->mti_dlm_req)
823 ldlm_request_cancel(mdt_info_req(info),
824 info->mti_dlm_req, 0, LATF_SKIP);
826 if (!lu_name_is_valid(&info->mti_rr.rr_name))
829 switch (info->mti_attr.ma_attr.la_mode & S_IFMT) {
831 mdt_counter_incr(req, LPROC_MDT_MKDIR);
839 /* Special file should stay on the same node as parent. */
840 mdt_counter_incr(req, LPROC_MDT_MKNOD);
843 CERROR("%s: Unsupported mode %o\n",
844 mdt_obd_name(info->mti_mdt),
845 info->mti_attr.ma_attr.la_mode);
846 RETURN(err_serious(-EOPNOTSUPP));
849 rc = mdt_create(info);
854 * VBR: save parent version in reply and child version getting by its name.
855 * Version of child is getting and checking during its lookup. If
857 static int mdt_reint_unlink(struct mdt_thread_info *info,
858 struct mdt_lock_handle *lhc)
860 struct mdt_reint_record *rr = &info->mti_rr;
861 struct ptlrpc_request *req = mdt_info_req(info);
862 struct md_attr *ma = &info->mti_attr;
863 struct lu_fid *child_fid = &info->mti_tmp_fid1;
864 struct mdt_object *mp;
865 struct mdt_object *mc;
866 struct mdt_lock_handle *parent_lh;
867 struct mdt_lock_handle *child_lh;
868 struct ldlm_enqueue_info *einfo = &info->mti_einfo;
869 struct lu_fid *s0_fid = &info->mti_tmp_fid2;
870 struct mdt_lock_handle *s0_lh = NULL;
871 struct mdt_object *s0_obj = NULL;
873 bool cos_incompat = false;
878 DEBUG_REQ(D_INODE, req, "unlink "DFID"/"DNAME"", PFID(rr->rr_fid1),
879 PNAME(&rr->rr_name));
881 if (info->mti_dlm_req)
882 ldlm_request_cancel(req, info->mti_dlm_req, 0, LATF_SKIP);
884 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_REINT_UNLINK))
885 RETURN(err_serious(-ENOENT));
887 if (!fid_is_md_operative(rr->rr_fid1))
890 mp = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid1);
894 if (mdt_object_remote(mp)) {
897 rc = mdt_version_get_check_save(info, mp, 0);
899 GOTO(put_parent, rc);
903 parent_lh = &info->mti_lh[MDT_LH_PARENT];
904 mdt_lock_pdo_init(parent_lh, LCK_PW, &rr->rr_name);
905 rc = mdt_reint_object_lock(info, mp, parent_lh, MDS_INODELOCK_UPDATE,
908 GOTO(put_parent, rc);
910 /* lookup child object along with version checking */
912 rc = mdt_lookup_version_check(info, mp, &rr->rr_name, child_fid, 1);
914 /* Name might not be able to find during resend of
915 * remote unlink, considering following case.
916 * dir_A is a remote directory, the name entry of
917 * dir_A is on MDT0, the directory is on MDT1,
919 * 1. client sends unlink req to MDT1.
920 * 2. MDT1 sends name delete update to MDT0.
921 * 3. name entry is being deleted in MDT0 synchronously.
922 * 4. MDT1 is restarted.
923 * 5. client resends unlink req to MDT1. So it can not
924 * find the name entry on MDT0 anymore.
925 * In this case, MDT1 only needs to destory the local
928 if (mdt_object_remote(mp) && rc == -ENOENT &&
929 !fid_is_zero(rr->rr_fid2) &&
930 lustre_msg_get_flags(req->rq_reqmsg) & MSG_RESENT) {
932 *child_fid = *rr->rr_fid2;
934 GOTO(unlock_parent, rc);
938 if (!fid_is_md_operative(child_fid))
939 GOTO(unlock_parent, rc = -EPERM);
941 /* We will lock the child regardless it is local or remote. No harm. */
942 mc = mdt_object_find(info->mti_env, info->mti_mdt, child_fid);
944 GOTO(unlock_parent, rc = PTR_ERR(mc));
946 if (!cos_incompat && mdt_init_slaves(info, mc, s0_fid) > 0) {
948 mdt_object_put(info->mti_env, mc);
949 mdt_object_unlock(info, mp, parent_lh, -EAGAIN);
953 child_lh = &info->mti_lh[MDT_LH_CHILD];
954 mdt_lock_reg_init(child_lh, LCK_EX);
955 if (info->mti_spec.sp_rm_entry) {
956 struct lu_ucred *uc = mdt_ucred(info);
958 if (!mdt_is_dne_client(req->rq_export))
959 /* Return -ENOTSUPP for old client */
960 GOTO(put_child, rc = -ENOTSUPP);
962 if (!md_capable(uc, CFS_CAP_SYS_ADMIN))
963 GOTO(put_child, rc = -EPERM);
965 ma->ma_need = MA_INODE;
967 rc = mdo_unlink(info->mti_env, mdt_object_child(mp),
968 NULL, &rr->rr_name, ma, no_name);
972 if (mdt_object_remote(mc)) {
973 struct mdt_body *repbody;
975 if (!fid_is_zero(rr->rr_fid2)) {
976 CDEBUG(D_INFO, "%s: name "DNAME" cannot find "DFID"\n",
977 mdt_obd_name(info->mti_mdt),
978 PNAME(&rr->rr_name), PFID(mdt_object_fid(mc)));
979 GOTO(put_child, rc = -ENOENT);
981 CDEBUG(D_INFO, "%s: name "DNAME": "DFID" is on another MDT\n",
982 mdt_obd_name(info->mti_mdt),
983 PNAME(&rr->rr_name), PFID(mdt_object_fid(mc)));
985 if (!mdt_is_dne_client(req->rq_export))
986 /* Return -ENOTSUPP for old client */
987 GOTO(put_child, rc = -ENOTSUPP);
989 /* Revoke the LOOKUP lock of the remote object granted by
990 * this MDT. Since the unlink will happen on another MDT,
991 * it will release the LOOKUP lock right away. Then What
992 * would happen if another client try to grab the LOOKUP
993 * lock at the same time with unlink XXX */
994 mdt_object_lock(info, mc, child_lh, MDS_INODELOCK_LOOKUP);
995 repbody = req_capsule_server_get(info->mti_pill, &RMF_MDT_BODY);
996 LASSERT(repbody != NULL);
997 repbody->mbo_fid1 = *mdt_object_fid(mc);
998 repbody->mbo_valid |= (OBD_MD_FLID | OBD_MD_MDS);
999 GOTO(unlock_child, rc = -EREMOTE);
1001 /* We used to acquire MDS_INODELOCK_FULL here but we can't do
1002 * this now because a running HSM restore on the child (unlink
1003 * victim) will hold the layout lock. See LU-4002. */
1004 lock_ibits = MDS_INODELOCK_LOOKUP | MDS_INODELOCK_UPDATE;
1005 if (mdt_object_remote(mp)) {
1006 /* Enqueue lookup lock from parent MDT */
1007 rc = mdt_remote_object_lock(info, mp, mdt_object_fid(mc),
1008 &child_lh->mlh_rreg_lh,
1009 child_lh->mlh_rreg_mode,
1010 MDS_INODELOCK_LOOKUP, false, false);
1012 GOTO(put_child, rc);
1014 lock_ibits &= ~MDS_INODELOCK_LOOKUP;
1017 rc = mdt_reint_object_lock(info, mc, child_lh, lock_ibits,
1020 GOTO(unlock_child, rc);
1023 * Now we can only make sure we need MA_INODE, in mdd layer, will check
1024 * whether need MA_LOV and MA_COOKIE.
1026 ma->ma_need = MA_INODE;
1029 s0_lh = &info->mti_lh[MDT_LH_LOCAL];
1030 mdt_lock_reg_init(s0_lh, LCK_EX);
1031 rc = mdt_lock_slaves(info, mc, LCK_EX, MDS_INODELOCK_UPDATE, s0_fid,
1032 s0_lh, &s0_obj, einfo);
1034 GOTO(unlock_child, rc);
1036 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
1037 OBD_FAIL_MDS_REINT_UNLINK_WRITE);
1038 /* save version when object is locked */
1039 mdt_version_get_save(info, mc, 1);
1041 mutex_lock(&mc->mot_lov_mutex);
1043 rc = mdo_unlink(info->mti_env, mdt_object_child(mp),
1044 mdt_object_child(mc), &rr->rr_name, ma, no_name);
1046 mutex_unlock(&mc->mot_lov_mutex);
1048 if (rc == 0 && !lu_object_is_dying(&mc->mot_header))
1049 rc = mdt_attr_get_complex(info, mc, ma);
1051 mdt_handle_last_unlink(info, mc, ma);
1053 if (ma->ma_valid & MA_INODE) {
1054 switch (ma->ma_attr.la_mode & S_IFMT) {
1056 mdt_counter_incr(req, LPROC_MDT_RMDIR);
1064 mdt_counter_incr(req, LPROC_MDT_UNLINK);
1067 LASSERTF(0, "bad file type %o unlinking\n",
1068 ma->ma_attr.la_mode);
1075 mdt_unlock_slaves(info, mc, MDS_INODELOCK_UPDATE, s0_lh, s0_obj, einfo,
1077 mdt_object_unlock(info, mc, child_lh, rc);
1079 mdt_object_put(info->mti_env, mc);
1081 mdt_object_unlock(info, mp, parent_lh, rc);
1083 mdt_object_put(info->mti_env, mp);
1088 * VBR: save versions in reply: 0 - parent; 1 - child by fid; 2 - target by
1091 static int mdt_reint_link(struct mdt_thread_info *info,
1092 struct mdt_lock_handle *lhc)
1094 struct mdt_reint_record *rr = &info->mti_rr;
1095 struct ptlrpc_request *req = mdt_info_req(info);
1096 struct md_attr *ma = &info->mti_attr;
1097 struct mdt_object *ms;
1098 struct mdt_object *mp;
1099 struct mdt_lock_handle *lhs;
1100 struct mdt_lock_handle *lhp;
1105 DEBUG_REQ(D_INODE, req, "link "DFID" to "DFID"/"DNAME,
1106 PFID(rr->rr_fid1), PFID(rr->rr_fid2), PNAME(&rr->rr_name));
1108 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_REINT_LINK))
1109 RETURN(err_serious(-ENOENT));
1111 if (info->mti_dlm_req)
1112 ldlm_request_cancel(req, info->mti_dlm_req, 0, LATF_SKIP);
1114 /* Invalid case so return error immediately instead of
1116 if (lu_fid_eq(rr->rr_fid1, rr->rr_fid2))
1119 if (!fid_is_md_operative(rr->rr_fid1) ||
1120 !fid_is_md_operative(rr->rr_fid2))
1123 /* step 1: find target parent dir */
1124 mp = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid2);
1126 RETURN(PTR_ERR(mp));
1128 rc = mdt_version_get_check_save(info, mp, 0);
1130 GOTO(put_parent, rc);
1132 /* step 2: find source */
1133 ms = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid1);
1135 GOTO(put_parent, rc = PTR_ERR(ms));
1137 if (!mdt_object_exists(ms)) {
1138 CDEBUG(D_INFO, "%s: "DFID" does not exist.\n",
1139 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1));
1140 GOTO(put_source, rc = -ENOENT);
1143 cos_incompat = (mdt_object_remote(mp) || mdt_object_remote(ms));
1145 lhp = &info->mti_lh[MDT_LH_PARENT];
1146 mdt_lock_pdo_init(lhp, LCK_PW, &rr->rr_name);
1147 rc = mdt_reint_object_lock(info, mp, lhp, MDS_INODELOCK_UPDATE,
1150 GOTO(put_source, rc);
1152 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME3, 5);
1154 lhs = &info->mti_lh[MDT_LH_CHILD];
1155 mdt_lock_reg_init(lhs, LCK_EX);
1156 rc = mdt_reint_object_lock(info, ms, lhs,
1157 MDS_INODELOCK_UPDATE | MDS_INODELOCK_XATTR,
1160 GOTO(unlock_parent, rc);
1162 /* step 3: link it */
1163 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
1164 OBD_FAIL_MDS_REINT_LINK_WRITE);
1166 tgt_vbr_obj_set(info->mti_env, mdt_obj2dt(ms));
1167 rc = mdt_version_get_check_save(info, ms, 1);
1169 GOTO(unlock_source, rc);
1171 /** check target version by name during replay */
1172 rc = mdt_lookup_version_check(info, mp, &rr->rr_name,
1173 &info->mti_tmp_fid1, 2);
1174 if (rc != 0 && rc != -ENOENT)
1175 GOTO(unlock_source, rc);
1176 /* save version of file name for replay, it must be ENOENT here */
1177 if (!req_is_replay(mdt_info_req(info))) {
1178 if (rc != -ENOENT) {
1179 CDEBUG(D_INFO, "link target "DNAME" existed!\n",
1180 PNAME(&rr->rr_name));
1181 GOTO(unlock_source, rc = -EEXIST);
1183 info->mti_ver[2] = ENOENT_VERSION;
1184 mdt_version_save(mdt_info_req(info), info->mti_ver[2], 2);
1187 rc = mdo_link(info->mti_env, mdt_object_child(mp),
1188 mdt_object_child(ms), &rr->rr_name, ma);
1191 mdt_counter_incr(req, LPROC_MDT_LINK);
1195 mdt_object_unlock(info, ms, lhs, rc);
1197 mdt_object_unlock(info, mp, lhp, rc);
1199 mdt_object_put(info->mti_env, ms);
1201 mdt_object_put(info->mti_env, mp);
1205 * lock the part of the directory according to the hash of the name
1206 * (lh->mlh_pdo_hash) in parallel directory lock.
1208 static int mdt_pdir_hash_lock(struct mdt_thread_info *info,
1209 struct mdt_lock_handle *lh,
1210 struct mdt_object *obj, __u64 ibits,
1213 struct ldlm_res_id *res = &info->mti_res_id;
1214 struct ldlm_namespace *ns = info->mti_mdt->mdt_namespace;
1215 union ldlm_policy_data *policy = &info->mti_policy;
1216 __u64 dlmflags = LDLM_FL_LOCAL_ONLY | LDLM_FL_ATOMIC_CB;
1220 * Finish res_id initializing by name hash marking part of
1221 * directory which is taking modification.
1223 LASSERT(lh->mlh_pdo_hash != 0);
1224 fid_build_pdo_res_name(mdt_object_fid(obj), lh->mlh_pdo_hash, res);
1225 memset(policy, 0, sizeof(*policy));
1226 policy->l_inodebits.bits = ibits;
1228 (lh->mlh_reg_mode == LCK_PW || lh->mlh_reg_mode == LCK_EX))
1229 dlmflags |= LDLM_FL_COS_INCOMPAT;
1231 * Use LDLM_FL_LOCAL_ONLY for this lock. We do not know yet if it is
1232 * going to be sent to client. If it is - mdt_intent_policy() path will
1233 * fix it up and turn FL_LOCAL flag off.
1235 rc = mdt_fid_lock(ns, &lh->mlh_reg_lh, lh->mlh_reg_mode, policy,
1236 res, dlmflags, &info->mti_exp->exp_handle.h_cookie);
1241 * Get BFL lock for rename or migrate process.
1243 static int mdt_rename_lock(struct mdt_thread_info *info,
1244 struct lustre_handle *lh)
1249 if (mdt_seq_site(info->mti_mdt)->ss_node_id != 0) {
1250 struct lu_fid *fid = &info->mti_tmp_fid1;
1251 struct mdt_object *obj;
1253 /* XXX, right now, it has to use object API to
1254 * enqueue lock cross MDT, so it will enqueue
1255 * rename lock(with LUSTRE_BFL_FID) by root object */
1257 obj = mdt_object_find(info->mti_env, info->mti_mdt, fid);
1259 RETURN(PTR_ERR(obj));
1261 rc = mdt_remote_object_lock(info, obj,
1262 &LUSTRE_BFL_FID, lh,
1264 MDS_INODELOCK_UPDATE, false, false);
1265 mdt_object_put(info->mti_env, obj);
1267 struct ldlm_namespace *ns = info->mti_mdt->mdt_namespace;
1268 union ldlm_policy_data *policy = &info->mti_policy;
1269 struct ldlm_res_id *res_id = &info->mti_res_id;
1272 fid_build_reg_res_name(&LUSTRE_BFL_FID, res_id);
1273 memset(policy, 0, sizeof *policy);
1274 policy->l_inodebits.bits = MDS_INODELOCK_UPDATE;
1275 flags = LDLM_FL_LOCAL_ONLY | LDLM_FL_ATOMIC_CB;
1276 rc = ldlm_cli_enqueue_local(ns, res_id, LDLM_IBITS, policy,
1277 LCK_EX, &flags, ldlm_blocking_ast,
1278 ldlm_completion_ast, NULL, NULL, 0,
1280 &info->mti_exp->exp_handle.h_cookie,
1287 static void mdt_rename_unlock(struct lustre_handle *lh)
1290 LASSERT(lustre_handle_is_used(lh));
1291 /* Cancel the single rename lock right away */
1292 ldlm_lock_decref_and_cancel(lh, LCK_EX);
1297 * This is is_subdir() variant, it is CMD if cmm forwards it to correct
1298 * target. Source should not be ancestor of target dir. May be other rename
1299 * checks can be moved here later.
1301 static int mdt_is_subdir(struct mdt_thread_info *info,
1302 struct mdt_object *dir,
1303 const struct lu_fid *fid)
1305 struct lu_fid dir_fid = dir->mot_header.loh_fid;
1309 /* If the source and target are in the same directory, they can not
1310 * be parent/child relationship, so subdir check is not needed */
1311 if (lu_fid_eq(&dir_fid, fid))
1314 if (!mdt_object_exists(dir))
1317 rc = mdo_is_subdir(info->mti_env, mdt_object_child(dir),
1320 CERROR("%s: failed subdir check in "DFID" for "DFID
1321 ": rc = %d\n", mdt_obd_name(info->mti_mdt),
1322 PFID(&dir_fid), PFID(fid), rc);
1323 /* Return EINVAL only if a parent is the @fid */
1327 /* check the found fid */
1328 if (lu_fid_eq(&dir_fid, fid))
1335 /* Update object linkEA */
1336 struct mdt_lock_list {
1337 struct mdt_object *mll_obj;
1338 struct mdt_lock_handle mll_lh;
1339 struct list_head mll_list;
1342 static void mdt_unlock_list(struct mdt_thread_info *info,
1343 struct list_head *list, int rc)
1345 struct mdt_lock_list *mll;
1346 struct mdt_lock_list *mll2;
1348 list_for_each_entry_safe(mll, mll2, list, mll_list) {
1349 mdt_object_unlock_put(info, mll->mll_obj, &mll->mll_lh, rc);
1350 list_del(&mll->mll_list);
1355 static int mdt_lock_objects_in_linkea(struct mdt_thread_info *info,
1356 struct mdt_object *obj,
1357 struct mdt_object *pobj,
1358 struct list_head *lock_list)
1360 struct lu_buf *buf = &info->mti_big_buf;
1361 struct linkea_data ldata = { NULL };
1367 if (S_ISDIR(lu_object_attr(&obj->mot_obj)))
1370 buf = lu_buf_check_and_alloc(buf, PATH_MAX);
1371 if (buf->lb_buf == NULL)
1375 rc = mdt_links_read(info, obj, &ldata);
1377 if (rc == -ENOENT || rc == -ENODATA)
1382 /* ignore the migrating parent(@pobj) */
1383 retry_count = ldata.ld_leh->leh_reccount - 1;
1386 LASSERT(ldata.ld_leh != NULL);
1387 ldata.ld_lee = (struct link_ea_entry *)(ldata.ld_leh + 1);
1388 for (count = 0; count < ldata.ld_leh->leh_reccount; count++) {
1389 struct mdt_device *mdt = info->mti_mdt;
1390 struct mdt_object *mdt_pobj;
1391 struct mdt_lock_list *mll;
1392 struct lu_name name;
1395 linkea_entry_unpack(ldata.ld_lee, &ldata.ld_reclen,
1397 mdt_pobj = mdt_object_find(info->mti_env, mdt, &fid);
1398 if (IS_ERR(mdt_pobj)) {
1399 CWARN("%s: cannot find obj "DFID": rc = %ld\n",
1400 mdt_obd_name(mdt), PFID(&fid), PTR_ERR(mdt_pobj));
1404 if (!mdt_object_exists(mdt_pobj)) {
1405 CDEBUG(D_INFO, "%s: obj "DFID" does not exist\n",
1406 mdt_obd_name(mdt), PFID(&fid));
1407 mdt_object_put(info->mti_env, mdt_pobj);
1411 /* Check if the object already exists in the list */
1412 list_for_each_entry(mll, lock_list, mll_list) {
1413 if (mll->mll_obj == mdt_pobj) {
1414 mdt_object_put(info->mti_env, mdt_pobj);
1419 if (mdt_pobj == pobj) {
1420 CDEBUG(D_INFO, "%s: skipping parent obj "DFID"\n",
1421 mdt_obd_name(mdt), PFID(&fid));
1422 mdt_object_put(info->mti_env, mdt_pobj);
1428 mdt_object_put(info->mti_env, mdt_pobj);
1429 GOTO(out, rc = -ENOMEM);
1432 /* Since this needs to lock all of objects in linkea, to avoid
1433 * deadlocks, because it does not follow parent-child order as
1434 * other MDT operation, let's use try_lock here and if the lock
1435 * cannot be gotten because of conflicting locks, then drop all
1436 * current locks, send an AST to the client, and start again. */
1437 mdt_lock_pdo_init(&mll->mll_lh, LCK_PW, &name);
1438 rc = mdt_reint_object_lock_try(info, mdt_pobj, &mll->mll_lh,
1439 MDS_INODELOCK_UPDATE, true);
1441 mdt_unlock_list(info, lock_list, rc);
1443 CDEBUG(D_INFO, "%s: busy lock on "DFID" %s retry %d\n",
1444 mdt_obd_name(mdt), PFID(&fid), name.ln_name,
1447 if (retry_count == 0) {
1448 mdt_object_put(info->mti_env, mdt_pobj);
1450 GOTO(out, rc = -EBUSY);
1453 rc = mdt_object_lock(info, mdt_pobj, &mll->mll_lh,
1454 MDS_INODELOCK_UPDATE);
1456 mdt_object_put(info->mti_env, mdt_pobj);
1461 if (mdt_object_remote(mdt_pobj)) {
1462 struct ldlm_lock *lock;
1464 /* For remote object, Set lock to cb_atomic,
1465 * so lock can be released in blocking_ast()
1466 * immediately, then the next try_lock will
1467 * have better chance to succeds */
1469 ldlm_handle2lock(&mll->mll_lh.mlh_rreg_lh);
1470 LASSERT(lock != NULL);
1471 lock_res_and_lock(lock);
1472 ldlm_set_atomic_cb(lock);
1473 unlock_res_and_lock(lock);
1474 LDLM_LOCK_PUT(lock);
1476 mdt_object_unlock_put(info, mdt_pobj, &mll->mll_lh, rc);
1482 INIT_LIST_HEAD(&mll->mll_list);
1483 mll->mll_obj = mdt_pobj;
1484 list_add_tail(&mll->mll_list, lock_list);
1486 ldata.ld_lee = (struct link_ea_entry *)((char *)ldata.ld_lee +
1491 mdt_unlock_list(info, lock_list, rc);
1495 /* migrate files from one MDT to another MDT */
1496 static int mdt_reint_migrate_internal(struct mdt_thread_info *info,
1497 struct mdt_lock_handle *lhc)
1499 struct mdt_reint_record *rr = &info->mti_rr;
1500 struct md_attr *ma = &info->mti_attr;
1501 struct mdt_object *msrcdir;
1502 struct mdt_object *mold;
1503 struct mdt_object *mnew = NULL;
1504 struct mdt_lock_handle *lh_dirp;
1505 struct mdt_lock_handle *lh_childp;
1506 struct mdt_lock_handle *lh_tgtp = NULL;
1507 struct lu_fid *old_fid = &info->mti_tmp_fid1;
1508 struct list_head lock_list;
1510 struct ldlm_lock *lease = NULL;
1511 bool lock_open_sem = false;
1515 CDEBUG(D_INODE, "migrate "DFID"/"DNAME" to "DFID"\n", PFID(rr->rr_fid1),
1516 PNAME(&rr->rr_name), PFID(rr->rr_fid2));
1518 /* 1: lock the source dir. */
1519 msrcdir = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid1);
1520 if (IS_ERR(msrcdir)) {
1521 CDEBUG(D_OTHER, "%s: cannot find source dir "DFID" : rc = %d\n",
1522 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1),
1523 (int)PTR_ERR(msrcdir));
1524 RETURN(PTR_ERR(msrcdir));
1527 lh_dirp = &info->mti_lh[MDT_LH_PARENT];
1528 mdt_lock_pdo_init(lh_dirp, LCK_PW, &rr->rr_name);
1529 rc = mdt_reint_object_lock(info, msrcdir, lh_dirp, MDS_INODELOCK_UPDATE,
1532 GOTO(out_put_parent, rc);
1534 if (!mdt_object_remote(msrcdir)) {
1535 rc = mdt_version_get_check_save(info, msrcdir, 0);
1537 GOTO(out_unlock_parent, rc);
1540 /* 2: sanity check and find the object to be migrated. */
1542 rc = mdt_lookup_version_check(info, msrcdir, &rr->rr_name, old_fid, 2);
1544 GOTO(out_unlock_parent, rc);
1546 if (lu_fid_eq(old_fid, rr->rr_fid1) || lu_fid_eq(old_fid, rr->rr_fid2))
1547 GOTO(out_unlock_parent, rc = -EINVAL);
1549 if (!fid_is_md_operative(old_fid))
1550 GOTO(out_unlock_parent, rc = -EPERM);
1552 if (lu_fid_eq(old_fid, &info->mti_mdt->mdt_md_root_fid))
1553 GOTO(out_unlock_parent, rc = -EPERM);
1555 mold = mdt_object_find(info->mti_env, info->mti_mdt, old_fid);
1557 GOTO(out_unlock_parent, rc = PTR_ERR(mold));
1559 if (mdt_object_remote(mold)) {
1560 CDEBUG(D_OTHER, "%s: source "DFID" is on the remote MDT\n",
1561 mdt_obd_name(info->mti_mdt), PFID(old_fid));
1562 GOTO(out_put_child, rc = -EREMOTE);
1565 if (S_ISREG(lu_object_attr(&mold->mot_obj)) &&
1566 !mdt_object_remote(msrcdir)) {
1567 CDEBUG(D_OTHER, "%s: parent "DFID" is still on the same"
1568 " MDT, which should be migrated first:"
1569 " rc = %d\n", mdt_obd_name(info->mti_mdt),
1570 PFID(mdt_object_fid(msrcdir)), -EPERM);
1571 GOTO(out_put_child, rc = -EPERM);
1574 rc = mdt_remote_permission(info);
1576 GOTO(out_put_child, rc);
1578 /* 3: iterate the linkea of the object and lock all of the objects */
1579 INIT_LIST_HEAD(&lock_list);
1580 rc = mdt_lock_objects_in_linkea(info, mold, msrcdir, &lock_list);
1582 GOTO(out_put_child, rc);
1584 if (info->mti_spec.sp_migrate_close) {
1585 struct close_data *data;
1586 struct mdt_body *repbody;
1587 bool lease_broken = false;
1589 if (!req_capsule_field_present(info->mti_pill, &RMF_MDT_EPOCH,
1591 !req_capsule_field_present(info->mti_pill, &RMF_CLOSE_DATA,
1593 GOTO(out_lease, rc = -EPROTO);
1595 data = req_capsule_client_get(info->mti_pill, &RMF_CLOSE_DATA);
1597 GOTO(out_lease, rc = -EPROTO);
1599 lease = ldlm_handle2lock(&data->cd_handle);
1601 GOTO(out_lease, rc = -ESTALE);
1603 /* try to hold open_sem so that nobody else can open the file */
1604 if (!down_write_trylock(&mold->mot_open_sem)) {
1605 ldlm_lock_cancel(lease);
1606 GOTO(out_lease, rc = -EBUSY);
1609 lock_open_sem = true;
1610 /* Check if the lease open lease has already canceled */
1611 lock_res_and_lock(lease);
1612 lease_broken = ldlm_is_cancel(lease);
1613 unlock_res_and_lock(lease);
1615 LDLM_DEBUG(lease, DFID " lease broken? %d",
1616 PFID(mdt_object_fid(mold)), lease_broken);
1618 /* Cancel server side lease. Client side counterpart should
1619 * have been cancelled. It's okay to cancel it now as we've
1620 * held mot_open_sem. */
1621 ldlm_lock_cancel(lease);
1624 GOTO(out_lease, rc = -EAGAIN);
1626 rc = mdt_close_internal(info, mdt_info_req(info), NULL);
1627 repbody = req_capsule_server_get(info->mti_pill, &RMF_MDT_BODY);
1628 repbody->mbo_valid |= OBD_MD_CLOSE_INTENT_EXECED;
1630 GOTO(out_unlock_list, rc);
1633 /* 4: lock of the object migrated object */
1634 lh_childp = &info->mti_lh[MDT_LH_OLD];
1635 mdt_lock_reg_init(lh_childp, LCK_EX);
1636 lock_ibits = MDS_INODELOCK_LOOKUP | MDS_INODELOCK_UPDATE |
1637 MDS_INODELOCK_LAYOUT;
1638 if (mdt_object_remote(msrcdir)) {
1639 /* Enqueue lookup lock from the parent MDT */
1640 rc = mdt_remote_object_lock(info, msrcdir, mdt_object_fid(mold),
1641 &lh_childp->mlh_rreg_lh,
1642 lh_childp->mlh_rreg_mode,
1643 MDS_INODELOCK_LOOKUP, false, false);
1645 GOTO(out_unlock_list, rc);
1647 lock_ibits &= ~MDS_INODELOCK_LOOKUP;
1650 rc = mdt_reint_object_lock(info, mold, lh_childp, lock_ibits, true);
1652 GOTO(out_unlock_child, rc);
1654 /* Migration is incompatible with HSM. */
1655 ma->ma_need = MA_HSM;
1657 rc = mdt_attr_get_complex(info, mold, ma);
1659 GOTO(out_unlock_child, rc);
1661 if ((ma->ma_valid & MA_HSM) && ma->ma_hsm.mh_flags != 0) {
1664 "%s: cannot migrate HSM archived file "DFID": rc = %d\n",
1665 mdt_obd_name(info->mti_mdt), PFID(old_fid), rc);
1666 GOTO(out_unlock_child, rc);
1669 ma->ma_need = MA_LMV;
1671 ma->ma_lmv = (union lmv_mds_md *)info->mti_xattr_buf;
1672 ma->ma_lmv_size = sizeof(info->mti_xattr_buf);
1673 rc = mdt_stripe_get(info, mold, ma, XATTR_NAME_LMV);
1675 GOTO(out_unlock_child, rc);
1677 if ((ma->ma_valid & MA_LMV)) {
1678 struct lmv_mds_md_v1 *lmm1;
1680 lmv_le_to_cpu(ma->ma_lmv, ma->ma_lmv);
1681 lmm1 = &ma->ma_lmv->lmv_md_v1;
1682 if (!(lmm1->lmv_hash_type & LMV_HASH_FLAG_MIGRATION)) {
1683 CDEBUG(D_OTHER, "%s: can not migrate striped dir "DFID
1684 ": rc = %d\n", mdt_obd_name(info->mti_mdt),
1685 PFID(mdt_object_fid(mold)), -EPERM);
1686 GOTO(out_unlock_child, rc = -EPERM);
1689 if (!fid_is_sane(&lmm1->lmv_stripe_fids[1]))
1690 GOTO(out_unlock_child, rc = -EINVAL);
1692 mnew = mdt_object_find(info->mti_env, info->mti_mdt,
1693 &lmm1->lmv_stripe_fids[1]);
1695 GOTO(out_unlock_child, rc = PTR_ERR(mnew));
1697 if (!mdt_object_remote(mnew)) {
1699 "%s: "DFID" being migrated is on this MDT:"
1700 " rc = %d\n", mdt_obd_name(info->mti_mdt),
1701 PFID(rr->rr_fid2), -EPERM);
1702 GOTO(out_put_new, rc = -EPERM);
1705 lh_tgtp = &info->mti_lh[MDT_LH_CHILD];
1706 mdt_lock_reg_init(lh_tgtp, LCK_EX);
1707 rc = mdt_remote_object_lock(info, mnew,
1708 mdt_object_fid(mnew),
1709 &lh_tgtp->mlh_rreg_lh,
1710 lh_tgtp->mlh_rreg_mode,
1711 MDS_INODELOCK_UPDATE, false, false);
1714 GOTO(out_put_new, rc);
1717 mnew = mdt_object_find(info->mti_env, info->mti_mdt,
1720 GOTO(out_unlock_child, rc = PTR_ERR(mnew));
1721 if (!mdt_object_remote(mnew)) {
1722 CDEBUG(D_OTHER, "%s: Migration "DFID" is on this MDT:"
1723 " rc = %d\n", mdt_obd_name(info->mti_mdt),
1724 PFID(rr->rr_fid2), -EXDEV);
1725 GOTO(out_put_new, rc = -EXDEV);
1730 mdt_reint_init_ma(info, ma);
1732 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
1733 OBD_FAIL_MDS_REINT_RENAME_WRITE);
1735 rc = mdo_migrate(info->mti_env, mdt_object_child(msrcdir),
1736 mdt_object_child(mold), &rr->rr_name,
1737 mdt_object_child(mnew), ma);
1739 GOTO(out_unlock_new, rc);
1742 if (lh_tgtp != NULL)
1743 mdt_object_unlock(info, mnew, lh_tgtp, rc);
1746 mdt_object_put(info->mti_env, mnew);
1748 mdt_object_unlock(info, mold, lh_childp, rc);
1750 /* we don't really modify linkea objects, so we can safely decref these
1751 * locks, and this can avoid saving them as COS locks, which may prevent
1752 * subsequent migrate. */
1753 mdt_unlock_list(info, &lock_list, 1);
1754 if (lease != NULL) {
1755 ldlm_reprocess_all(lease->l_resource);
1756 LDLM_LOCK_PUT(lease);
1760 up_write(&mold->mot_open_sem);
1762 mdt_object_put(info->mti_env, mold);
1764 mdt_object_unlock(info, msrcdir, lh_dirp, rc);
1766 mdt_object_put(info->mti_env, msrcdir);
1771 static struct mdt_object *mdt_object_find_check(struct mdt_thread_info *info,
1772 const struct lu_fid *fid,
1775 struct mdt_object *dir;
1779 dir = mdt_object_find(info->mti_env, info->mti_mdt, fid);
1783 /* check early, the real version will be saved after locking */
1784 rc = mdt_version_get_check(info, dir, idx);
1790 mdt_object_put(info->mti_env, dir);
1794 static int mdt_object_lock_save(struct mdt_thread_info *info,
1795 struct mdt_object *dir,
1796 struct mdt_lock_handle *lh,
1797 int idx, bool cos_incompat)
1801 /* we lock the target dir if it is local */
1802 rc = mdt_reint_object_lock(info, dir, lh, MDS_INODELOCK_UPDATE,
1807 /* get and save correct version after locking */
1808 mdt_version_get_save(info, dir, idx);
1813 * VBR: rename versions in reply: 0 - srcdir parent; 1 - tgtdir parent;
1814 * 2 - srcdir child; 3 - tgtdir child.
1815 * Update on disk version of srcdir child.
1818 * For DNE phase I, only these renames are allowed
1819 * mv src_p/src_c tgt_p/tgt_c
1820 * 1. src_p/src_c/tgt_p/tgt_c are in the same MDT.
1821 * 2. src_p and tgt_p are same directory, and tgt_c does not
1822 * exists. In this case, all of modification will happen
1823 * in the MDT where ithesource parent is, only one remote
1824 * update is needed, i.e. set c_time/m_time on the child.
1825 * And tgt_c will be still in the same MDT as the original
1828 static int mdt_reint_rename_internal(struct mdt_thread_info *info,
1829 struct mdt_lock_handle *lhc)
1831 struct mdt_reint_record *rr = &info->mti_rr;
1832 struct md_attr *ma = &info->mti_attr;
1833 struct ptlrpc_request *req = mdt_info_req(info);
1834 struct mdt_object *msrcdir = NULL;
1835 struct mdt_object *mtgtdir = NULL;
1836 struct mdt_object *mold;
1837 struct mdt_object *mnew = NULL;
1838 struct mdt_lock_handle *lh_srcdirp;
1839 struct mdt_lock_handle *lh_tgtdirp;
1840 struct mdt_lock_handle *lh_oldp = NULL;
1841 struct mdt_lock_handle *lh_newp = NULL;
1842 struct lu_fid *old_fid = &info->mti_tmp_fid1;
1843 struct lu_fid *new_fid = &info->mti_tmp_fid2;
1845 bool reverse = false;
1850 DEBUG_REQ(D_INODE, req, "rename "DFID"/"DNAME" to "DFID"/"DNAME,
1851 PFID(rr->rr_fid1), PNAME(&rr->rr_name),
1852 PFID(rr->rr_fid2), PNAME(&rr->rr_tgt_name));
1854 /* find both parents. */
1855 msrcdir = mdt_object_find_check(info, rr->rr_fid1, 0);
1856 if (IS_ERR(msrcdir))
1857 RETURN(PTR_ERR(msrcdir));
1859 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME3, 5);
1861 if (lu_fid_eq(rr->rr_fid1, rr->rr_fid2)) {
1863 mdt_object_get(info->mti_env, mtgtdir);
1865 /* Check if the @msrcdir is not a child of the @mtgtdir,
1866 * otherwise a reverse locking must take place. */
1867 rc = mdt_is_subdir(info, msrcdir, rr->rr_fid2);
1871 GOTO(out_put_srcdir, rc);
1873 mtgtdir = mdt_object_find_check(info, rr->rr_fid2, 1);
1874 if (IS_ERR(mtgtdir))
1875 GOTO(out_put_srcdir, rc = PTR_ERR(mtgtdir));
1878 /* source needs to be looked up after locking source parent, otherwise
1879 * this rename may race with unlink source, and cause rename hang, see
1880 * sanityn.sh 55b, so check parents first, if later we found source is
1881 * remote, relock parents. */
1882 cos_incompat = (mdt_object_remote(msrcdir) ||
1883 mdt_object_remote(mtgtdir));
1885 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME4, 5);
1887 /* lock parents in the proper order. */
1888 lh_srcdirp = &info->mti_lh[MDT_LH_PARENT];
1889 lh_tgtdirp = &info->mti_lh[MDT_LH_CHILD];
1892 mdt_lock_pdo_init(lh_srcdirp, LCK_PW, &rr->rr_name);
1893 mdt_lock_pdo_init(lh_tgtdirp, LCK_PW, &rr->rr_tgt_name);
1896 rc = mdt_object_lock_save(info, mtgtdir, lh_tgtdirp, 1,
1899 GOTO(out_put_tgtdir, rc);
1901 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME, 5);
1903 rc = mdt_object_lock_save(info, msrcdir, lh_srcdirp, 0,
1906 mdt_object_unlock(info, mtgtdir, lh_tgtdirp, rc);
1907 GOTO(out_put_tgtdir, rc);
1910 rc = mdt_object_lock_save(info, msrcdir, lh_srcdirp, 0,
1913 GOTO(out_put_tgtdir, rc);
1915 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME, 5);
1917 if (mtgtdir != msrcdir) {
1918 rc = mdt_object_lock_save(info, mtgtdir, lh_tgtdirp, 1,
1920 } else if (lh_srcdirp->mlh_pdo_hash !=
1921 lh_tgtdirp->mlh_pdo_hash) {
1922 rc = mdt_pdir_hash_lock(info, lh_tgtdirp, mtgtdir,
1923 MDS_INODELOCK_UPDATE,
1925 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_PDO_LOCK2, 10);
1928 mdt_object_unlock(info, msrcdir, lh_srcdirp, rc);
1929 GOTO(out_put_tgtdir, rc);
1933 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME4, 5);
1934 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME2, 5);
1936 /* find mold object. */
1938 rc = mdt_lookup_version_check(info, msrcdir, &rr->rr_name, old_fid, 2);
1940 GOTO(out_unlock_parents, rc);
1942 if (lu_fid_eq(old_fid, rr->rr_fid1) || lu_fid_eq(old_fid, rr->rr_fid2))
1943 GOTO(out_unlock_parents, rc = -EINVAL);
1945 if (!fid_is_md_operative(old_fid))
1946 GOTO(out_unlock_parents, rc = -EPERM);
1948 mold = mdt_object_find(info->mti_env, info->mti_mdt, old_fid);
1950 GOTO(out_unlock_parents, rc = PTR_ERR(mold));
1952 /* Check if @mtgtdir is subdir of @mold, before locking child
1953 * to avoid reverse locking. */
1954 if (mtgtdir != msrcdir) {
1955 rc = mdt_is_subdir(info, mtgtdir, old_fid);
1957 GOTO(out_put_old, rc);
1960 tgt_vbr_obj_set(info->mti_env, mdt_obj2dt(mold));
1961 /* save version after locking */
1962 mdt_version_get_save(info, mold, 2);
1964 if (!cos_incompat && mdt_object_remote(mold)) {
1965 cos_incompat = true;
1966 mdt_object_put(info->mti_env, mold);
1967 mdt_object_unlock(info, mtgtdir, lh_tgtdirp, -EAGAIN);
1968 mdt_object_unlock(info, msrcdir, lh_srcdirp, -EAGAIN);
1972 /* find mnew object:
1973 * mnew target object may not exist now
1974 * lookup with version checking */
1976 rc = mdt_lookup_version_check(info, mtgtdir, &rr->rr_tgt_name, new_fid,
1979 /* the new_fid should have been filled at this moment */
1980 if (lu_fid_eq(old_fid, new_fid))
1981 GOTO(out_put_old, rc);
1983 if (lu_fid_eq(new_fid, rr->rr_fid1) ||
1984 lu_fid_eq(new_fid, rr->rr_fid2))
1985 GOTO(out_put_old, rc = -EINVAL);
1987 if (!fid_is_md_operative(new_fid))
1988 GOTO(out_put_old, rc = -EPERM);
1990 mnew = mdt_object_find(info->mti_env, info->mti_mdt, new_fid);
1992 GOTO(out_put_old, rc = PTR_ERR(mnew));
1994 if (mdt_object_remote(mnew)) {
1995 struct mdt_body *repbody;
1997 /* Always send rename req to the target child MDT */
1998 repbody = req_capsule_server_get(info->mti_pill,
2000 LASSERT(repbody != NULL);
2001 repbody->mbo_fid1 = *new_fid;
2002 repbody->mbo_valid |= (OBD_MD_FLID | OBD_MD_MDS);
2003 GOTO(out_put_new, rc = -EXDEV);
2005 /* Before locking the target dir, check we do not replace
2006 * a dir with a non-dir, otherwise it may deadlock with
2007 * link op which tries to create a link in this dir
2008 * back to this non-dir. */
2009 if (S_ISDIR(lu_object_attr(&mnew->mot_obj)) &&
2010 !S_ISDIR(lu_object_attr(&mold->mot_obj)))
2011 GOTO(out_put_new, rc = -EISDIR);
2013 lh_oldp = &info->mti_lh[MDT_LH_OLD];
2014 mdt_lock_reg_init(lh_oldp, LCK_EX);
2015 lock_ibits = MDS_INODELOCK_LOOKUP | MDS_INODELOCK_XATTR;
2016 if (mdt_object_remote(msrcdir)) {
2017 /* Enqueue lookup lock from the parent MDT */
2018 rc = mdt_remote_object_lock(info, msrcdir,
2019 mdt_object_fid(mold),
2020 &lh_oldp->mlh_rreg_lh,
2021 lh_oldp->mlh_rreg_mode,
2022 MDS_INODELOCK_LOOKUP,
2025 GOTO(out_put_new, rc);
2027 lock_ibits &= ~MDS_INODELOCK_LOOKUP;
2030 rc = mdt_reint_object_lock(info, mold, lh_oldp, lock_ibits,
2033 GOTO(out_unlock_old, rc);
2035 /* Check if @msrcdir is subdir of @mnew, before locking child
2036 * to avoid reverse locking. */
2037 if (mtgtdir != msrcdir) {
2038 rc = mdt_is_subdir(info, msrcdir, new_fid);
2040 GOTO(out_unlock_old, rc);
2043 /* We used to acquire MDS_INODELOCK_FULL here but we
2044 * can't do this now because a running HSM restore on
2045 * the rename onto victim will hold the layout
2046 * lock. See LU-4002. */
2048 lh_newp = &info->mti_lh[MDT_LH_NEW];
2049 mdt_lock_reg_init(lh_newp, LCK_EX);
2050 rc = mdt_reint_object_lock(info, mnew, lh_newp,
2051 MDS_INODELOCK_LOOKUP |
2052 MDS_INODELOCK_UPDATE,
2055 GOTO(out_unlock_old, rc);
2057 /* get and save version after locking */
2058 mdt_version_get_save(info, mnew, 3);
2059 } else if (rc != -EREMOTE && rc != -ENOENT) {
2060 GOTO(out_put_old, rc);
2062 lh_oldp = &info->mti_lh[MDT_LH_OLD];
2063 mdt_lock_reg_init(lh_oldp, LCK_EX);
2064 lock_ibits = MDS_INODELOCK_LOOKUP | MDS_INODELOCK_XATTR;
2065 if (mdt_object_remote(msrcdir)) {
2066 /* Enqueue lookup lock from the parent MDT */
2067 rc = mdt_remote_object_lock(info, msrcdir,
2068 mdt_object_fid(mold),
2069 &lh_oldp->mlh_rreg_lh,
2070 lh_oldp->mlh_rreg_mode,
2071 MDS_INODELOCK_LOOKUP,
2074 GOTO(out_put_old, rc);
2076 lock_ibits &= ~MDS_INODELOCK_LOOKUP;
2079 rc = mdt_reint_object_lock(info, mold, lh_oldp, lock_ibits,
2082 GOTO(out_unlock_old, rc);
2084 mdt_enoent_version_save(info, 3);
2087 /* step 5: rename it */
2088 mdt_reint_init_ma(info, ma);
2090 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
2091 OBD_FAIL_MDS_REINT_RENAME_WRITE);
2094 mutex_lock(&mnew->mot_lov_mutex);
2096 rc = mdo_rename(info->mti_env, mdt_object_child(msrcdir),
2097 mdt_object_child(mtgtdir), old_fid, &rr->rr_name,
2098 mnew != NULL ? mdt_object_child(mnew) : NULL,
2099 &rr->rr_tgt_name, ma);
2102 mutex_unlock(&mnew->mot_lov_mutex);
2104 /* handle last link of tgt object */
2106 mdt_counter_incr(req, LPROC_MDT_RENAME);
2108 mdt_handle_last_unlink(info, mnew, ma);
2110 mdt_rename_counter_tally(info, info->mti_mdt, req,
2116 mdt_object_unlock(info, mnew, lh_newp, rc);
2118 mdt_object_unlock(info, mold, lh_oldp, rc);
2121 mdt_object_put(info->mti_env, mnew);
2123 mdt_object_put(info->mti_env, mold);
2125 mdt_object_unlock(info, mtgtdir, lh_tgtdirp, rc);
2126 mdt_object_unlock(info, msrcdir, lh_srcdirp, rc);
2128 mdt_object_put(info->mti_env, mtgtdir);
2130 mdt_object_put(info->mti_env, msrcdir);
2134 static int mdt_reint_rename_or_migrate(struct mdt_thread_info *info,
2135 struct mdt_lock_handle *lhc, bool rename)
2137 struct mdt_reint_record *rr = &info->mti_rr;
2138 struct ptlrpc_request *req = mdt_info_req(info);
2139 struct lustre_handle rename_lh = { 0 };
2143 if (info->mti_dlm_req)
2144 ldlm_request_cancel(req, info->mti_dlm_req, 0, LATF_SKIP);
2146 if (!fid_is_md_operative(rr->rr_fid1) ||
2147 !fid_is_md_operative(rr->rr_fid2))
2150 /* Note: do not enqueue rename lock for replay request, because
2151 * if other MDT holds rename lock, but being blocked to wait for
2152 * this MDT to finish its recovery, and the failover MDT can not
2153 * get rename lock, which will cause deadlock. */
2154 if (!req_is_replay(req)) {
2155 rc = mdt_rename_lock(info, &rename_lh);
2157 CERROR("%s: can't lock FS for rename: rc = %d\n",
2158 mdt_obd_name(info->mti_mdt), rc);
2164 rc = mdt_reint_rename_internal(info, lhc);
2166 rc = mdt_reint_migrate_internal(info, lhc);
2168 if (lustre_handle_is_used(&rename_lh))
2169 mdt_rename_unlock(&rename_lh);
2174 static int mdt_reint_rename(struct mdt_thread_info *info,
2175 struct mdt_lock_handle *lhc)
2177 return mdt_reint_rename_or_migrate(info, lhc, true);
2180 static int mdt_reint_migrate(struct mdt_thread_info *info,
2181 struct mdt_lock_handle *lhc)
2183 return mdt_reint_rename_or_migrate(info, lhc, false);
2186 struct mdt_reinter {
2187 int (*mr_handler)(struct mdt_thread_info *, struct mdt_lock_handle *);
2188 enum lprocfs_extra_opc mr_extra_opc;
2191 static const struct mdt_reinter mdt_reinters[] = {
2193 .mr_handler = &mdt_reint_setattr,
2194 .mr_extra_opc = MDS_REINT_SETATTR,
2197 .mr_handler = &mdt_reint_create,
2198 .mr_extra_opc = MDS_REINT_CREATE,
2201 .mr_handler = &mdt_reint_link,
2202 .mr_extra_opc = MDS_REINT_LINK,
2205 .mr_handler = &mdt_reint_unlink,
2206 .mr_extra_opc = MDS_REINT_UNLINK,
2209 .mr_handler = &mdt_reint_rename,
2210 .mr_extra_opc = MDS_REINT_RENAME,
2213 .mr_handler = &mdt_reint_open,
2214 .mr_extra_opc = MDS_REINT_OPEN,
2216 [REINT_SETXATTR] = {
2217 .mr_handler = &mdt_reint_setxattr,
2218 .mr_extra_opc = MDS_REINT_SETXATTR,
2221 .mr_handler = &mdt_reint_unlink,
2222 .mr_extra_opc = MDS_REINT_UNLINK,
2225 .mr_handler = &mdt_reint_migrate,
2226 .mr_extra_opc = MDS_REINT_RENAME,
2230 int mdt_reint_rec(struct mdt_thread_info *info,
2231 struct mdt_lock_handle *lhc)
2233 const struct mdt_reinter *mr;
2237 if (!(info->mti_rr.rr_opcode < ARRAY_SIZE(mdt_reinters)))
2240 mr = &mdt_reinters[info->mti_rr.rr_opcode];
2241 if (mr->mr_handler == NULL)
2244 rc = (*mr->mr_handler)(info, lhc);
2246 lprocfs_counter_incr(ptlrpc_req2svc(mdt_info_req(info))->srv_stats,
2247 PTLRPC_LAST_CNTR + mr->mr_extra_opc);