4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License version 2 for more details (a copy is included
14 * in the LICENSE file that accompanied this code).
16 * You should have received a copy of the GNU General Public License
17 * version 2 along with this program; If not, see
18 * http://www.gnu.org/licenses/gpl-2.0.html
23 * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
24 * Use is subject to license terms.
26 * Copyright (c) 2011, 2016, Intel Corporation.
29 * This file is part of Lustre, http://www.lustre.org/
30 * Lustre is a trademark of Sun Microsystems, Inc.
32 * lustre/mdt/mdt_reint.c
34 * Lustre Metadata Target (mdt) reintegration routines
36 * Author: Peter Braam <braam@clusterfs.com>
37 * Author: Andreas Dilger <adilger@clusterfs.com>
38 * Author: Phil Schwan <phil@clusterfs.com>
39 * Author: Huang Hua <huanghua@clusterfs.com>
40 * Author: Yury Umanets <umka@clusterfs.com>
43 #define DEBUG_SUBSYSTEM S_MDS
45 #include <lprocfs_status.h>
46 #include "mdt_internal.h"
47 #include <lustre_lmv.h>
49 static inline void mdt_reint_init_ma(struct mdt_thread_info *info,
52 ma->ma_need = MA_INODE;
57 * Get version of object by fid.
59 * Return real version or ENOENT_VERSION if object doesn't exist
61 static void mdt_obj_version_get(struct mdt_thread_info *info,
62 struct mdt_object *o, __u64 *version)
66 if (mdt_object_exists(o) && !mdt_object_remote(o) &&
67 !fid_is_obf(mdt_object_fid(o)))
68 *version = dt_version_get(info->mti_env, mdt_obj2dt(o));
70 *version = ENOENT_VERSION;
71 CDEBUG(D_INODE, "FID "DFID" version is %#llx\n",
72 PFID(mdt_object_fid(o)), *version);
76 * Check version is correct.
78 * Should be called only during replay.
80 static int mdt_version_check(struct ptlrpc_request *req,
81 __u64 version, int idx)
83 __u64 *pre_ver = lustre_msg_get_versions(req->rq_reqmsg);
86 if (!exp_connect_vbr(req->rq_export))
89 LASSERT(req_is_replay(req));
90 /** VBR: version is checked always because costs nothing */
91 LASSERT(idx < PTLRPC_NUM_VERSIONS);
92 /** Sanity check for malformed buffers */
93 if (pre_ver == NULL) {
94 CERROR("No versions in request buffer\n");
95 spin_lock(&req->rq_export->exp_lock);
96 req->rq_export->exp_vbr_failed = 1;
97 spin_unlock(&req->rq_export->exp_lock);
99 } else if (pre_ver[idx] != version) {
100 CDEBUG(D_INODE, "Version mismatch %#llx != %#llx\n",
101 pre_ver[idx], version);
102 spin_lock(&req->rq_export->exp_lock);
103 req->rq_export->exp_vbr_failed = 1;
104 spin_unlock(&req->rq_export->exp_lock);
111 * Save pre-versions in reply.
113 static void mdt_version_save(struct ptlrpc_request *req, __u64 version,
118 if (!exp_connect_vbr(req->rq_export))
121 LASSERT(!req_is_replay(req));
122 LASSERT(req->rq_repmsg != NULL);
123 reply_ver = lustre_msg_get_versions(req->rq_repmsg);
125 reply_ver[idx] = version;
129 * Save enoent version, it is needed when it is obvious that object doesn't
130 * exist, e.g. child during create.
132 static void mdt_enoent_version_save(struct mdt_thread_info *info, int idx)
134 /* save version of file name for replay, it must be ENOENT here */
135 if (!req_is_replay(mdt_info_req(info))) {
136 info->mti_ver[idx] = ENOENT_VERSION;
137 mdt_version_save(mdt_info_req(info), info->mti_ver[idx], idx);
142 * Get version from disk and save in reply buffer.
144 * Versions are saved in reply only during normal operations not replays.
146 void mdt_version_get_save(struct mdt_thread_info *info,
147 struct mdt_object *mto, int idx)
149 /* don't save versions during replay */
150 if (!req_is_replay(mdt_info_req(info))) {
151 mdt_obj_version_get(info, mto, &info->mti_ver[idx]);
152 mdt_version_save(mdt_info_req(info), info->mti_ver[idx], idx);
157 * Get version from disk and check it, no save in reply.
159 int mdt_version_get_check(struct mdt_thread_info *info,
160 struct mdt_object *mto, int idx)
162 /* only check versions during replay */
163 if (!req_is_replay(mdt_info_req(info)))
166 mdt_obj_version_get(info, mto, &info->mti_ver[idx]);
167 return mdt_version_check(mdt_info_req(info), info->mti_ver[idx], idx);
171 * Get version from disk and check if recovery or just save.
173 int mdt_version_get_check_save(struct mdt_thread_info *info,
174 struct mdt_object *mto, int idx)
178 mdt_obj_version_get(info, mto, &info->mti_ver[idx]);
179 if (req_is_replay(mdt_info_req(info)))
180 rc = mdt_version_check(mdt_info_req(info), info->mti_ver[idx],
183 mdt_version_save(mdt_info_req(info), info->mti_ver[idx], idx);
188 * Lookup with version checking.
190 * This checks version of 'name'. Many reint functions uses 'name' for child not
191 * FID, therefore we need to get object by name and check its version.
193 static int mdt_lookup_version_check(struct mdt_thread_info *info,
194 struct mdt_object *p,
195 const struct lu_name *lname,
196 struct lu_fid *fid, int idx)
200 rc = mdo_lookup(info->mti_env, mdt_object_child(p), lname, fid,
202 /* Check version only during replay */
203 if (!req_is_replay(mdt_info_req(info)))
206 info->mti_ver[idx] = ENOENT_VERSION;
208 struct mdt_object *child;
209 child = mdt_object_find(info->mti_env, info->mti_mdt, fid);
210 if (likely(!IS_ERR(child))) {
211 mdt_obj_version_get(info, child, &info->mti_ver[idx]);
212 mdt_object_put(info->mti_env, child);
215 vbrc = mdt_version_check(mdt_info_req(info), info->mti_ver[idx], idx);
216 return vbrc ? vbrc : rc;
220 static inline int mdt_remote_permission_check(struct mdt_thread_info *info)
222 struct lu_ucred *uc = mdt_ucred(info);
223 struct mdt_device *mdt = info->mti_mdt;
225 if (!md_capable(uc, CFS_CAP_SYS_ADMIN)) {
226 if (uc->uc_gid != mdt->mdt_enable_remote_dir_gid &&
227 mdt->mdt_enable_remote_dir_gid != -1)
235 * mdt_remote_permission: Check whether the remote operation is permitted,
237 * Only sysadmin can create remote directory / striped directory,
238 * migrate directory and set default stripedEA on directory, unless
240 * lctl set_param mdt.*.enable_remote_dir_gid=allow_gid.
242 * param[in] info: mdt_thread_info.
244 * retval = 0 remote operation is allowed.
245 * < 0 remote operation is denied.
247 static int mdt_remote_permission(struct mdt_thread_info *info)
249 struct md_op_spec *spec = &info->mti_spec;
250 struct lu_attr *attr = &info->mti_attr.ma_attr;
251 struct obd_export *exp = mdt_info_req(info)->rq_export;
254 if (info->mti_rr.rr_opcode == REINT_MIGRATE) {
255 rc = mdt_remote_permission_check(info);
260 if (info->mti_rr.rr_opcode == REINT_CREATE &&
261 (S_ISDIR(attr->la_mode) && spec->u.sp_ea.eadata != NULL &&
262 spec->u.sp_ea.eadatalen != 0)) {
263 const struct lmv_user_md *lum = spec->u.sp_ea.eadata;
265 /* Only new clients can create remote dir( >= 2.4) and
266 * striped dir(>= 2.6), old client will return -ENOTSUPP */
267 if (!mdt_is_dne_client(exp))
270 if (le32_to_cpu(lum->lum_stripe_count) > 1 &&
271 !mdt_is_striped_client(exp))
274 rc = mdt_remote_permission_check(info);
279 if (info->mti_rr.rr_opcode == REINT_SETATTR) {
280 struct md_attr *ma = &info->mti_attr;
282 if ((ma->ma_valid & MA_LMV)) {
283 rc = mdt_remote_permission_check(info);
292 static int mdt_unlock_slaves(struct mdt_thread_info *mti,
293 struct mdt_object *obj, __u64 ibits,
294 struct mdt_lock_handle *s0_lh,
295 struct mdt_object *s0_obj,
296 struct ldlm_enqueue_info *einfo,
299 union ldlm_policy_data *policy = &mti->mti_policy;
300 struct lustre_handle_array *slave_locks = einfo->ei_cbdata;
305 if (!S_ISDIR(obj->mot_header.loh_attr))
308 /* Unlock stripe 0 */
309 if (s0_lh != NULL && lustre_handle_is_used(&s0_lh->mlh_reg_lh)) {
310 LASSERT(s0_obj != NULL);
311 mdt_object_unlock_put(mti, s0_obj, s0_lh, decref);
314 memset(policy, 0, sizeof(*policy));
315 policy->l_inodebits.bits = ibits;
317 if (slave_locks != NULL) {
318 LASSERT(s0_lh != NULL);
319 for (i = 1; i < slave_locks->count; i++) {
320 /* borrow s0_lh temporarily to do mdt unlock */
321 mdt_lock_reg_init(s0_lh, einfo->ei_mode);
322 s0_lh->mlh_rreg_lh = slave_locks->handles[i];
323 mdt_object_unlock(mti, NULL, s0_lh, decref);
324 slave_locks->handles[i].cookie = 0ull;
328 rc = mo_object_unlock(mti->mti_env, mdt_object_child(obj), einfo,
333 static int mdt_init_slaves(struct mdt_thread_info *mti, struct mdt_object *obj,
336 struct lu_buf *buf = &mti->mti_buf;
337 struct lmv_mds_md_v1 *lmv;
341 if (!S_ISDIR(obj->mot_header.loh_attr))
344 buf->lb_buf = mti->mti_xattr_buf;
345 buf->lb_len = sizeof(mti->mti_xattr_buf);
346 rc = mo_xattr_get(mti->mti_env, mdt_object_child(obj), buf,
349 rc = mdt_big_xattr_get(mti, obj, XATTR_NAME_LMV);
351 buf->lb_buf = mti->mti_big_lmm;
352 buf->lb_len = mti->mti_big_lmmsize;
356 if (rc == -ENODATA || rc == -ENOENT)
363 if (le32_to_cpu(lmv->lmv_magic) != LMV_MAGIC_V1)
366 fid_le_to_cpu(fid, &lmv->lmv_stripe_fids[0]);
372 * Lock slave stripes if necessary, the lock handles of slave stripes
373 * will be stored in einfo->ei_cbdata.
375 static int mdt_lock_slaves(struct mdt_thread_info *mti, struct mdt_object *obj,
376 enum ldlm_mode mode, __u64 ibits,
377 struct lu_fid *s0_fid,
378 struct mdt_lock_handle *s0_lh,
379 struct mdt_object **s0_objp,
380 struct ldlm_enqueue_info *einfo)
382 union ldlm_policy_data *policy = &mti->mti_policy;
386 memset(einfo, 0, sizeof(*einfo));
388 rc = mdt_init_slaves(mti, obj, s0_fid);
392 LASSERT(S_ISDIR(obj->mot_header.loh_attr));
394 if (!lu_fid_eq(s0_fid, mdt_object_fid(obj))) {
395 /* Except migrating object, whose 0_stripe and master
396 * object are the same object, 0_stripe and master
397 * object are different, though they are in the same
398 * MDT, to avoid adding osd_object_lock here, so we
399 * will enqueue the stripe0 lock in MDT0 for now */
400 *s0_objp = mdt_object_find(mti->mti_env, mti->mti_mdt, s0_fid);
401 if (IS_ERR(*s0_objp))
402 RETURN(PTR_ERR(*s0_objp));
404 rc = mdt_reint_object_lock(mti, *s0_objp, s0_lh, ibits, true);
406 mdt_object_put(mti->mti_env, *s0_objp);
411 einfo->ei_type = LDLM_IBITS;
412 einfo->ei_mode = mode;
413 einfo->ei_cb_bl = mdt_remote_blocking_ast;
414 einfo->ei_cb_local_bl = mdt_blocking_ast;
415 einfo->ei_cb_cp = ldlm_completion_ast;
416 einfo->ei_enq_slave = 1;
417 einfo->ei_namespace = mti->mti_mdt->mdt_namespace;
418 memset(policy, 0, sizeof(*policy));
419 policy->l_inodebits.bits = ibits;
421 rc = mo_object_lock(mti->mti_env, mdt_object_child(obj), NULL, einfo,
427 * VBR: we save three versions in reply:
428 * 0 - parent. Check that parent version is the same during replay.
429 * 1 - name. Version of 'name' if file exists with the same name or
430 * ENOENT_VERSION, it is needed because file may appear due to missed replays.
431 * 2 - child. Version of child by FID. Must be ENOENT. It is mostly sanity
434 static int mdt_create(struct mdt_thread_info *info)
436 struct mdt_device *mdt = info->mti_mdt;
437 struct mdt_object *parent;
438 struct mdt_object *child;
439 struct mdt_lock_handle *lh;
440 struct mdt_body *repbody;
441 struct md_attr *ma = &info->mti_attr;
442 struct mdt_reint_record *rr = &info->mti_rr;
446 DEBUG_REQ(D_INODE, mdt_info_req(info), "Create ("DNAME"->"DFID") "
448 PNAME(&rr->rr_name), PFID(rr->rr_fid2), PFID(rr->rr_fid1));
450 if (!fid_is_md_operative(rr->rr_fid1))
453 repbody = req_capsule_server_get(info->mti_pill, &RMF_MDT_BODY);
455 parent = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid1);
457 RETURN(PTR_ERR(parent));
459 if (!mdt_object_exists(parent))
460 GOTO(put_parent, rc = -ENOENT);
462 lh = &info->mti_lh[MDT_LH_PARENT];
463 mdt_lock_pdo_init(lh, LCK_PW, &rr->rr_name);
464 rc = mdt_object_lock(info, parent, lh, MDS_INODELOCK_UPDATE);
466 GOTO(put_parent, rc);
468 if (!mdt_object_remote(parent)) {
469 rc = mdt_version_get_check_save(info, parent, 0);
471 GOTO(unlock_parent, rc);
475 * Check child name version during replay.
476 * During create replay a file may exist with same name.
478 rc = mdt_lookup_version_check(info, parent, &rr->rr_name,
479 &info->mti_tmp_fid1, 1);
481 GOTO(unlock_parent, rc = -EEXIST);
483 /* -ENOENT is expected here */
485 GOTO(unlock_parent, rc);
487 /* save version of file name for replay, it must be ENOENT here */
488 mdt_enoent_version_save(info, 1);
490 child = mdt_object_new(info->mti_env, mdt, rr->rr_fid2);
491 if (unlikely(IS_ERR(child)))
492 GOTO(unlock_parent, rc = PTR_ERR(child));
494 rc = mdt_remote_permission(info);
498 ma->ma_need = MA_INODE;
501 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
502 OBD_FAIL_MDS_REINT_CREATE_WRITE);
504 /* Version of child will be updated on disk. */
505 tgt_vbr_obj_set(info->mti_env, mdt_obj2dt(child));
506 rc = mdt_version_get_check_save(info, child, 2);
510 /* Let lower layer know current lock mode. */
511 info->mti_spec.sp_cr_mode = mdt_dlm_mode2mdl_mode(lh->mlh_pdo_mode);
514 * Do not perform lookup sanity check. We know that name does
517 info->mti_spec.sp_cr_lookup = 0;
518 info->mti_spec.sp_feat = &dt_directory_features;
520 rc = mdo_create(info->mti_env, mdt_object_child(parent), &rr->rr_name,
521 mdt_object_child(child), &info->mti_spec, ma);
523 rc = mdt_attr_get_complex(info, child, ma);
529 * On DNE, we need to eliminate dependey between 'mkdir a' and
530 * 'mkdir a/b' if b is a striped directory, to achieve this, two
531 * things are done below:
532 * 1. save child and slaves lock.
533 * 2. if the child is a striped directory, relock parent so to
534 * compare against with COS locks to ensure parent was
537 if (mdt_slc_is_enabled(mdt) && S_ISDIR(ma->ma_attr.la_mode)) {
538 struct mdt_lock_handle *lhc;
539 struct mdt_lock_handle *s0_lh;
540 struct mdt_object *s0_obj = NULL;
541 struct ldlm_enqueue_info *einfo;
542 struct lu_fid *s0_fid = &info->mti_tmp_fid1;
543 bool cos_incompat = false;
545 rc = mdt_init_slaves(info, child, s0_fid);
548 if (!mdt_object_remote(parent)) {
549 mdt_object_unlock(info, parent, lh, 1);
550 mdt_lock_pdo_init(lh, LCK_PW, &rr->rr_name);
551 rc = mdt_reint_object_lock(info, parent, lh,
552 MDS_INODELOCK_UPDATE,
559 einfo = &info->mti_einfo;
560 lhc = &info->mti_lh[MDT_LH_CHILD];
561 mdt_lock_handle_init(lhc);
562 mdt_lock_reg_init(lhc, LCK_PW);
563 rc = mdt_reint_object_lock(info, child, lhc,
564 MDS_INODELOCK_UPDATE,
568 mdt_object_unlock(info, child, lhc, rc);
570 s0_lh = &info->mti_lh[MDT_LH_LOCAL];
571 mdt_lock_handle_init(s0_lh);
572 mdt_lock_reg_init(s0_lh, LCK_PW);
573 rc = mdt_lock_slaves(info, child, LCK_PW, MDS_INODELOCK_UPDATE,
574 s0_fid, s0_lh, &s0_obj, einfo);
575 mdt_unlock_slaves(info, child, MDS_INODELOCK_UPDATE, s0_lh,
577 if (OBD_FAIL_CHECK(OBD_FAIL_LFSCK_BAD_SLAVE_NAME) && rc == -EIO)
581 /* Return fid & attr to client. */
582 if (ma->ma_valid & MA_INODE)
583 mdt_pack_attr2body(info, repbody, &ma->ma_attr,
584 mdt_object_fid(child));
586 mdt_object_put(info->mti_env, child);
588 mdt_object_unlock(info, parent, lh, rc);
590 mdt_object_put(info->mti_env, parent);
594 static int mdt_attr_set(struct mdt_thread_info *info, struct mdt_object *mo,
597 struct mdt_lock_handle *lh;
598 int do_vbr = ma->ma_attr.la_valid &
599 (LA_MODE | LA_UID | LA_GID | LA_PROJID | LA_FLAGS);
600 __u64 lockpart = MDS_INODELOCK_UPDATE;
601 struct ldlm_enqueue_info *einfo = &info->mti_einfo;
602 struct lu_fid *s0_fid = &info->mti_tmp_fid1;
603 struct mdt_lock_handle *s0_lh = NULL;
604 struct mdt_object *s0_obj = NULL;
605 bool cos_incompat = false;
609 rc = mdt_init_slaves(info, mo, s0_fid);
613 lh = &info->mti_lh[MDT_LH_PARENT];
614 mdt_lock_reg_init(lh, LCK_PW);
616 /* Even though the new MDT will grant PERM lock to the old
617 * client, but the old client will almost ignore that during
618 * So it needs to revoke both LOOKUP and PERM lock here, so
619 * both new and old client can cancel the dcache */
620 if (ma->ma_attr.la_valid & (LA_MODE|LA_UID|LA_GID))
621 lockpart |= MDS_INODELOCK_LOOKUP | MDS_INODELOCK_PERM;
623 rc = mdt_reint_object_lock(info, mo, lh, lockpart, cos_incompat);
627 s0_lh = &info->mti_lh[MDT_LH_LOCAL];
628 mdt_lock_reg_init(s0_lh, LCK_PW);
629 rc = mdt_lock_slaves(info, mo, LCK_PW, lockpart, s0_fid, s0_lh, &s0_obj,
632 GOTO(out_unlock, rc);
634 /* all attrs are packed into mti_attr in unpack_setattr */
635 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
636 OBD_FAIL_MDS_REINT_SETATTR_WRITE);
638 /* This is only for set ctime when rename's source is on remote MDS. */
639 if (unlikely(ma->ma_attr.la_valid == LA_CTIME))
640 ma->ma_attr_flags |= MDS_VTX_BYPASS;
642 /* VBR: update version if attr changed are important for recovery */
644 /* update on-disk version of changed object */
645 tgt_vbr_obj_set(info->mti_env, mdt_obj2dt(mo));
646 rc = mdt_version_get_check_save(info, mo, 0);
648 GOTO(out_unlock, rc);
651 /* Ensure constant striping during chown(). See LU-2789. */
652 if (ma->ma_attr.la_valid & (LA_UID|LA_GID|LA_PROJID))
653 mutex_lock(&mo->mot_lov_mutex);
655 /* all attrs are packed into mti_attr in unpack_setattr */
656 rc = mo_attr_set(info->mti_env, mdt_object_child(mo), ma);
658 if (ma->ma_attr.la_valid & (LA_UID|LA_GID|LA_PROJID))
659 mutex_unlock(&mo->mot_lov_mutex);
662 GOTO(out_unlock, rc);
666 mdt_unlock_slaves(info, mo, lockpart, s0_lh, s0_obj, einfo, rc);
667 mdt_object_unlock(info, mo, lh, rc);
672 * Check HSM flags and add HS_DIRTY flag if relevant.
674 * A file could be set dirty only if it has a copy in the backend (HS_EXISTS)
675 * and is not RELEASED.
677 int mdt_add_dirty_flag(struct mdt_thread_info *info, struct mdt_object *mo,
683 /* If the file was modified, add the dirty flag */
684 ma->ma_need = MA_HSM;
685 rc = mdt_attr_get_complex(info, mo, ma);
687 CERROR("file attribute read error for "DFID": %d.\n",
688 PFID(mdt_object_fid(mo)), rc);
692 /* If an up2date copy exists in the backend, add dirty flag */
693 if ((ma->ma_valid & MA_HSM) && (ma->ma_hsm.mh_flags & HS_EXISTS)
694 && !(ma->ma_hsm.mh_flags & (HS_DIRTY|HS_RELEASED))) {
695 ma->ma_hsm.mh_flags |= HS_DIRTY;
697 rc = mdt_hsm_attr_set(info, mo, &ma->ma_hsm);
699 CERROR("file attribute change error for "DFID": %d\n",
700 PFID(mdt_object_fid(mo)), rc);
706 static int mdt_reint_setattr(struct mdt_thread_info *info,
707 struct mdt_lock_handle *lhc)
709 struct md_attr *ma = &info->mti_attr;
710 struct mdt_reint_record *rr = &info->mti_rr;
711 struct ptlrpc_request *req = mdt_info_req(info);
712 struct mdt_object *mo;
713 struct mdt_body *repbody;
717 DEBUG_REQ(D_INODE, req, "setattr "DFID" %x", PFID(rr->rr_fid1),
718 (unsigned int)ma->ma_attr.la_valid);
720 if (info->mti_dlm_req)
721 ldlm_request_cancel(req, info->mti_dlm_req, 0, LATF_SKIP);
723 repbody = req_capsule_server_get(info->mti_pill, &RMF_MDT_BODY);
724 mo = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid1);
726 GOTO(out, rc = PTR_ERR(mo));
728 if (!mdt_object_exists(mo))
729 GOTO(out_put, rc = -ENOENT);
731 if (mdt_object_remote(mo))
732 GOTO(out_put, rc = -EREMOTE);
734 if ((ma->ma_attr.la_valid & LA_SIZE) ||
735 (rr->rr_flags & MRF_OPEN_TRUNC)) {
736 /* Check write access for the O_TRUNC case */
737 if (mdt_write_read(mo) < 0)
738 GOTO(out_put, rc = -ETXTBSY);
741 if ((ma->ma_valid & MA_INODE) && ma->ma_attr.la_valid) {
742 if (ma->ma_valid & MA_LOV)
743 GOTO(out_put, rc = -EPROTO);
745 rc = mdt_attr_set(info, mo, ma);
748 } else if ((ma->ma_valid & (MA_LOV | MA_LMV)) &&
749 (ma->ma_valid & MA_INODE)) {
750 struct lu_buf *buf = &info->mti_buf;
751 struct mdt_lock_handle *lh;
753 rc = mdt_remote_permission(info);
757 if (ma->ma_attr.la_valid != 0)
758 GOTO(out_put, rc = -EPROTO);
760 lh = &info->mti_lh[MDT_LH_PARENT];
761 mdt_lock_reg_init(lh, LCK_PW);
763 rc = mdt_object_lock(info, mo, lh, MDS_INODELOCK_XATTR);
767 if (ma->ma_valid & MA_LOV) {
768 buf->lb_buf = ma->ma_lmm;
769 buf->lb_len = ma->ma_lmm_size;
771 buf->lb_buf = ma->ma_lmv;
772 buf->lb_len = ma->ma_lmv_size;
774 rc = mo_xattr_set(info->mti_env, mdt_object_child(mo), buf,
775 (ma->ma_valid & MA_LOV) ?
776 XATTR_NAME_LOV : XATTR_NAME_DEFAULT_LMV,
779 mdt_object_unlock(info, mo, lh, rc);
783 GOTO(out_put, rc = -EPROTO);
786 /* If file data is modified, add the dirty flag */
787 if (ma->ma_attr_flags & MDS_DATA_MODIFIED)
788 rc = mdt_add_dirty_flag(info, mo, ma);
790 ma->ma_need = MA_INODE;
792 rc = mdt_attr_get_complex(info, mo, ma);
796 mdt_pack_attr2body(info, repbody, &ma->ma_attr, mdt_object_fid(mo));
800 mdt_object_put(info->mti_env, mo);
803 mdt_counter_incr(req, LPROC_MDT_SETATTR);
805 mdt_client_compatibility(info);
806 rc2 = mdt_fix_reply(info);
812 static int mdt_reint_create(struct mdt_thread_info *info,
813 struct mdt_lock_handle *lhc)
815 struct ptlrpc_request *req = mdt_info_req(info);
819 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_REINT_CREATE))
820 RETURN(err_serious(-ESTALE));
822 if (info->mti_dlm_req)
823 ldlm_request_cancel(mdt_info_req(info),
824 info->mti_dlm_req, 0, LATF_SKIP);
826 if (!lu_name_is_valid(&info->mti_rr.rr_name))
829 switch (info->mti_attr.ma_attr.la_mode & S_IFMT) {
831 mdt_counter_incr(req, LPROC_MDT_MKDIR);
839 /* Special file should stay on the same node as parent. */
840 mdt_counter_incr(req, LPROC_MDT_MKNOD);
843 CERROR("%s: Unsupported mode %o\n",
844 mdt_obd_name(info->mti_mdt),
845 info->mti_attr.ma_attr.la_mode);
846 RETURN(err_serious(-EOPNOTSUPP));
849 rc = mdt_create(info);
854 * VBR: save parent version in reply and child version getting by its name.
855 * Version of child is getting and checking during its lookup. If
857 static int mdt_reint_unlink(struct mdt_thread_info *info,
858 struct mdt_lock_handle *lhc)
860 struct mdt_reint_record *rr = &info->mti_rr;
861 struct ptlrpc_request *req = mdt_info_req(info);
862 struct md_attr *ma = &info->mti_attr;
863 struct lu_fid *child_fid = &info->mti_tmp_fid1;
864 struct mdt_object *mp;
865 struct mdt_object *mc;
866 struct mdt_lock_handle *parent_lh;
867 struct mdt_lock_handle *child_lh;
868 struct ldlm_enqueue_info *einfo = &info->mti_einfo;
869 struct lu_fid *s0_fid = &info->mti_tmp_fid2;
870 struct mdt_lock_handle *s0_lh = NULL;
871 struct mdt_object *s0_obj = NULL;
873 bool cos_incompat = false;
878 DEBUG_REQ(D_INODE, req, "unlink "DFID"/"DNAME"", PFID(rr->rr_fid1),
879 PNAME(&rr->rr_name));
881 if (info->mti_dlm_req)
882 ldlm_request_cancel(req, info->mti_dlm_req, 0, LATF_SKIP);
884 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_REINT_UNLINK))
885 RETURN(err_serious(-ENOENT));
887 if (!fid_is_md_operative(rr->rr_fid1))
890 mp = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid1);
894 if (mdt_object_remote(mp)) {
897 rc = mdt_version_get_check_save(info, mp, 0);
899 GOTO(put_parent, rc);
903 parent_lh = &info->mti_lh[MDT_LH_PARENT];
904 mdt_lock_pdo_init(parent_lh, LCK_PW, &rr->rr_name);
905 rc = mdt_reint_object_lock(info, mp, parent_lh, MDS_INODELOCK_UPDATE,
908 GOTO(put_parent, rc);
910 /* lookup child object along with version checking */
912 rc = mdt_lookup_version_check(info, mp, &rr->rr_name, child_fid, 1);
914 /* Name might not be able to find during resend of
915 * remote unlink, considering following case.
916 * dir_A is a remote directory, the name entry of
917 * dir_A is on MDT0, the directory is on MDT1,
919 * 1. client sends unlink req to MDT1.
920 * 2. MDT1 sends name delete update to MDT0.
921 * 3. name entry is being deleted in MDT0 synchronously.
922 * 4. MDT1 is restarted.
923 * 5. client resends unlink req to MDT1. So it can not
924 * find the name entry on MDT0 anymore.
925 * In this case, MDT1 only needs to destory the local
928 if (mdt_object_remote(mp) && rc == -ENOENT &&
929 !fid_is_zero(rr->rr_fid2) &&
930 lustre_msg_get_flags(req->rq_reqmsg) & MSG_RESENT) {
932 *child_fid = *rr->rr_fid2;
934 GOTO(unlock_parent, rc);
938 if (!fid_is_md_operative(child_fid))
939 GOTO(unlock_parent, rc = -EPERM);
941 /* We will lock the child regardless it is local or remote. No harm. */
942 mc = mdt_object_find(info->mti_env, info->mti_mdt, child_fid);
944 GOTO(unlock_parent, rc = PTR_ERR(mc));
946 if (!cos_incompat && mdt_init_slaves(info, mc, s0_fid) > 0) {
948 mdt_object_put(info->mti_env, mc);
949 mdt_object_unlock(info, mp, parent_lh, -EAGAIN);
953 child_lh = &info->mti_lh[MDT_LH_CHILD];
954 mdt_lock_reg_init(child_lh, LCK_EX);
955 if (info->mti_spec.sp_rm_entry) {
956 struct lu_ucred *uc = mdt_ucred(info);
958 if (!mdt_is_dne_client(req->rq_export))
959 /* Return -ENOTSUPP for old client */
960 GOTO(put_child, rc = -ENOTSUPP);
962 if (!md_capable(uc, CFS_CAP_SYS_ADMIN))
963 GOTO(put_child, rc = -EPERM);
965 ma->ma_need = MA_INODE;
967 rc = mdo_unlink(info->mti_env, mdt_object_child(mp),
968 NULL, &rr->rr_name, ma, no_name);
972 if (mdt_object_remote(mc)) {
973 struct mdt_body *repbody;
975 if (!fid_is_zero(rr->rr_fid2)) {
976 CDEBUG(D_INFO, "%s: name "DNAME" cannot find "DFID"\n",
977 mdt_obd_name(info->mti_mdt),
978 PNAME(&rr->rr_name), PFID(mdt_object_fid(mc)));
979 GOTO(put_child, rc = -ENOENT);
981 CDEBUG(D_INFO, "%s: name "DNAME": "DFID" is on another MDT\n",
982 mdt_obd_name(info->mti_mdt),
983 PNAME(&rr->rr_name), PFID(mdt_object_fid(mc)));
985 if (!mdt_is_dne_client(req->rq_export))
986 /* Return -ENOTSUPP for old client */
987 GOTO(put_child, rc = -ENOTSUPP);
989 /* Revoke the LOOKUP lock of the remote object granted by
990 * this MDT. Since the unlink will happen on another MDT,
991 * it will release the LOOKUP lock right away. Then What
992 * would happen if another client try to grab the LOOKUP
993 * lock at the same time with unlink XXX */
994 mdt_object_lock(info, mc, child_lh, MDS_INODELOCK_LOOKUP);
995 repbody = req_capsule_server_get(info->mti_pill, &RMF_MDT_BODY);
996 LASSERT(repbody != NULL);
997 repbody->mbo_fid1 = *mdt_object_fid(mc);
998 repbody->mbo_valid |= (OBD_MD_FLID | OBD_MD_MDS);
999 GOTO(unlock_child, rc = -EREMOTE);
1001 /* We used to acquire MDS_INODELOCK_FULL here but we can't do
1002 * this now because a running HSM restore on the child (unlink
1003 * victim) will hold the layout lock. See LU-4002. */
1004 lock_ibits = MDS_INODELOCK_LOOKUP | MDS_INODELOCK_UPDATE;
1005 if (mdt_object_remote(mp)) {
1006 /* Enqueue lookup lock from parent MDT */
1007 rc = mdt_remote_object_lock(info, mp, mdt_object_fid(mc),
1008 &child_lh->mlh_rreg_lh,
1009 child_lh->mlh_rreg_mode,
1010 MDS_INODELOCK_LOOKUP, false);
1012 GOTO(put_child, rc);
1014 lock_ibits &= ~MDS_INODELOCK_LOOKUP;
1017 rc = mdt_reint_object_lock(info, mc, child_lh, lock_ibits,
1020 GOTO(unlock_child, rc);
1023 * Now we can only make sure we need MA_INODE, in mdd layer, will check
1024 * whether need MA_LOV and MA_COOKIE.
1026 ma->ma_need = MA_INODE;
1029 s0_lh = &info->mti_lh[MDT_LH_LOCAL];
1030 mdt_lock_reg_init(s0_lh, LCK_EX);
1031 rc = mdt_lock_slaves(info, mc, LCK_EX, MDS_INODELOCK_UPDATE, s0_fid,
1032 s0_lh, &s0_obj, einfo);
1034 GOTO(unlock_child, rc);
1036 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
1037 OBD_FAIL_MDS_REINT_UNLINK_WRITE);
1038 /* save version when object is locked */
1039 mdt_version_get_save(info, mc, 1);
1041 mutex_lock(&mc->mot_lov_mutex);
1043 rc = mdo_unlink(info->mti_env, mdt_object_child(mp),
1044 mdt_object_child(mc), &rr->rr_name, ma, no_name);
1046 mutex_unlock(&mc->mot_lov_mutex);
1048 if (rc == 0 && !lu_object_is_dying(&mc->mot_header))
1049 rc = mdt_attr_get_complex(info, mc, ma);
1051 mdt_handle_last_unlink(info, mc, ma);
1053 if (ma->ma_valid & MA_INODE) {
1054 switch (ma->ma_attr.la_mode & S_IFMT) {
1056 mdt_counter_incr(req, LPROC_MDT_RMDIR);
1064 mdt_counter_incr(req, LPROC_MDT_UNLINK);
1067 LASSERTF(0, "bad file type %o unlinking\n",
1068 ma->ma_attr.la_mode);
1075 mdt_unlock_slaves(info, mc, MDS_INODELOCK_UPDATE, s0_lh, s0_obj, einfo,
1077 mdt_object_unlock(info, mc, child_lh, rc);
1079 mdt_object_put(info->mti_env, mc);
1081 mdt_object_unlock(info, mp, parent_lh, rc);
1083 mdt_object_put(info->mti_env, mp);
1088 * VBR: save versions in reply: 0 - parent; 1 - child by fid; 2 - target by
1091 static int mdt_reint_link(struct mdt_thread_info *info,
1092 struct mdt_lock_handle *lhc)
1094 struct mdt_reint_record *rr = &info->mti_rr;
1095 struct ptlrpc_request *req = mdt_info_req(info);
1096 struct md_attr *ma = &info->mti_attr;
1097 struct mdt_object *ms;
1098 struct mdt_object *mp;
1099 struct mdt_lock_handle *lhs;
1100 struct mdt_lock_handle *lhp;
1105 DEBUG_REQ(D_INODE, req, "link "DFID" to "DFID"/"DNAME,
1106 PFID(rr->rr_fid1), PFID(rr->rr_fid2), PNAME(&rr->rr_name));
1108 if (OBD_FAIL_CHECK(OBD_FAIL_MDS_REINT_LINK))
1109 RETURN(err_serious(-ENOENT));
1111 if (info->mti_dlm_req)
1112 ldlm_request_cancel(req, info->mti_dlm_req, 0, LATF_SKIP);
1114 /* Invalid case so return error immediately instead of
1116 if (lu_fid_eq(rr->rr_fid1, rr->rr_fid2))
1119 if (!fid_is_md_operative(rr->rr_fid1) ||
1120 !fid_is_md_operative(rr->rr_fid2))
1123 /* step 1: find target parent dir */
1124 mp = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid2);
1126 RETURN(PTR_ERR(mp));
1128 rc = mdt_version_get_check_save(info, mp, 0);
1130 GOTO(put_parent, rc);
1132 /* step 2: find source */
1133 ms = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid1);
1135 GOTO(put_parent, rc = PTR_ERR(ms));
1137 if (!mdt_object_exists(ms)) {
1138 CDEBUG(D_INFO, "%s: "DFID" does not exist.\n",
1139 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1));
1140 GOTO(put_source, rc = -ENOENT);
1143 cos_incompat = (mdt_object_remote(mp) || mdt_object_remote(ms));
1145 lhp = &info->mti_lh[MDT_LH_PARENT];
1146 mdt_lock_pdo_init(lhp, LCK_PW, &rr->rr_name);
1147 rc = mdt_reint_object_lock(info, mp, lhp, MDS_INODELOCK_UPDATE,
1150 GOTO(put_source, rc);
1152 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME3, 5);
1154 lhs = &info->mti_lh[MDT_LH_CHILD];
1155 mdt_lock_reg_init(lhs, LCK_EX);
1156 rc = mdt_reint_object_lock(info, ms, lhs,
1157 MDS_INODELOCK_UPDATE | MDS_INODELOCK_XATTR,
1160 GOTO(unlock_parent, rc);
1162 /* step 3: link it */
1163 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
1164 OBD_FAIL_MDS_REINT_LINK_WRITE);
1166 tgt_vbr_obj_set(info->mti_env, mdt_obj2dt(ms));
1167 rc = mdt_version_get_check_save(info, ms, 1);
1169 GOTO(unlock_source, rc);
1171 /** check target version by name during replay */
1172 rc = mdt_lookup_version_check(info, mp, &rr->rr_name,
1173 &info->mti_tmp_fid1, 2);
1174 if (rc != 0 && rc != -ENOENT)
1175 GOTO(unlock_source, rc);
1176 /* save version of file name for replay, it must be ENOENT here */
1177 if (!req_is_replay(mdt_info_req(info))) {
1178 if (rc != -ENOENT) {
1179 CDEBUG(D_INFO, "link target "DNAME" existed!\n",
1180 PNAME(&rr->rr_name));
1181 GOTO(unlock_source, rc = -EEXIST);
1183 info->mti_ver[2] = ENOENT_VERSION;
1184 mdt_version_save(mdt_info_req(info), info->mti_ver[2], 2);
1187 rc = mdo_link(info->mti_env, mdt_object_child(mp),
1188 mdt_object_child(ms), &rr->rr_name, ma);
1191 mdt_counter_incr(req, LPROC_MDT_LINK);
1195 mdt_object_unlock(info, ms, lhs, rc);
1197 mdt_object_unlock(info, mp, lhp, rc);
1199 mdt_object_put(info->mti_env, ms);
1201 mdt_object_put(info->mti_env, mp);
1205 * lock the part of the directory according to the hash of the name
1206 * (lh->mlh_pdo_hash) in parallel directory lock.
1208 static int mdt_pdir_hash_lock(struct mdt_thread_info *info,
1209 struct mdt_lock_handle *lh,
1210 struct mdt_object *obj, __u64 ibits,
1213 struct ldlm_res_id *res = &info->mti_res_id;
1214 struct ldlm_namespace *ns = info->mti_mdt->mdt_namespace;
1215 union ldlm_policy_data *policy = &info->mti_policy;
1216 __u64 dlmflags = LDLM_FL_LOCAL_ONLY | LDLM_FL_ATOMIC_CB;
1220 * Finish res_id initializing by name hash marking part of
1221 * directory which is taking modification.
1223 LASSERT(lh->mlh_pdo_hash != 0);
1224 fid_build_pdo_res_name(mdt_object_fid(obj), lh->mlh_pdo_hash, res);
1225 memset(policy, 0, sizeof(*policy));
1226 policy->l_inodebits.bits = ibits;
1228 (lh->mlh_reg_mode == LCK_PW || lh->mlh_reg_mode == LCK_EX))
1229 dlmflags |= LDLM_FL_COS_INCOMPAT;
1231 * Use LDLM_FL_LOCAL_ONLY for this lock. We do not know yet if it is
1232 * going to be sent to client. If it is - mdt_intent_policy() path will
1233 * fix it up and turn FL_LOCAL flag off.
1235 rc = mdt_fid_lock(ns, &lh->mlh_reg_lh, lh->mlh_reg_mode, policy,
1236 res, dlmflags, &info->mti_exp->exp_handle.h_cookie);
1241 * Get BFL lock for rename or migrate process.
1243 static int mdt_rename_lock(struct mdt_thread_info *info,
1244 struct lustre_handle *lh)
1249 if (mdt_seq_site(info->mti_mdt)->ss_node_id != 0) {
1250 struct lu_fid *fid = &info->mti_tmp_fid1;
1251 struct mdt_object *obj;
1253 /* XXX, right now, it has to use object API to
1254 * enqueue lock cross MDT, so it will enqueue
1255 * rename lock(with LUSTRE_BFL_FID) by root object */
1257 obj = mdt_object_find(info->mti_env, info->mti_mdt, fid);
1259 RETURN(PTR_ERR(obj));
1261 rc = mdt_remote_object_lock(info, obj,
1262 &LUSTRE_BFL_FID, lh,
1264 MDS_INODELOCK_UPDATE, false);
1265 mdt_object_put(info->mti_env, obj);
1267 struct ldlm_namespace *ns = info->mti_mdt->mdt_namespace;
1268 union ldlm_policy_data *policy = &info->mti_policy;
1269 struct ldlm_res_id *res_id = &info->mti_res_id;
1272 fid_build_reg_res_name(&LUSTRE_BFL_FID, res_id);
1273 memset(policy, 0, sizeof *policy);
1274 policy->l_inodebits.bits = MDS_INODELOCK_UPDATE;
1275 flags = LDLM_FL_LOCAL_ONLY | LDLM_FL_ATOMIC_CB;
1276 rc = ldlm_cli_enqueue_local(ns, res_id, LDLM_IBITS, policy,
1277 LCK_EX, &flags, ldlm_blocking_ast,
1278 ldlm_completion_ast, NULL, NULL, 0,
1280 &info->mti_exp->exp_handle.h_cookie,
1287 static void mdt_rename_unlock(struct lustre_handle *lh)
1290 LASSERT(lustre_handle_is_used(lh));
1291 /* Cancel the single rename lock right away */
1292 ldlm_lock_decref_and_cancel(lh, LCK_EX);
1297 * This is is_subdir() variant, it is CMD if cmm forwards it to correct
1298 * target. Source should not be ancestor of target dir. May be other rename
1299 * checks can be moved here later.
1301 static int mdt_is_subdir(struct mdt_thread_info *info,
1302 struct mdt_object *dir,
1303 const struct lu_fid *fid)
1305 struct lu_fid dir_fid = dir->mot_header.loh_fid;
1309 /* If the source and target are in the same directory, they can not
1310 * be parent/child relationship, so subdir check is not needed */
1311 if (lu_fid_eq(&dir_fid, fid))
1314 if (!mdt_object_exists(dir))
1317 rc = mdo_is_subdir(info->mti_env, mdt_object_child(dir),
1320 CERROR("%s: failed subdir check in "DFID" for "DFID
1321 ": rc = %d\n", mdt_obd_name(info->mti_mdt),
1322 PFID(&dir_fid), PFID(fid), rc);
1323 /* Return EINVAL only if a parent is the @fid */
1327 /* check the found fid */
1328 if (lu_fid_eq(&dir_fid, fid))
1335 /* Update object linkEA */
1336 struct mdt_lock_list {
1337 struct mdt_object *mll_obj;
1338 struct mdt_lock_handle mll_lh;
1339 struct list_head mll_list;
1342 static void mdt_unlock_list(struct mdt_thread_info *info,
1343 struct list_head *list, int rc)
1345 struct mdt_lock_list *mll;
1346 struct mdt_lock_list *mll2;
1348 list_for_each_entry_safe(mll, mll2, list, mll_list) {
1349 mdt_object_unlock_put(info, mll->mll_obj, &mll->mll_lh, rc);
1350 list_del(&mll->mll_list);
1355 static int mdt_lock_objects_in_linkea(struct mdt_thread_info *info,
1356 struct mdt_object *obj,
1357 struct mdt_object *pobj,
1358 struct list_head *lock_list)
1360 struct lu_buf *buf = &info->mti_big_buf;
1361 struct linkea_data ldata = { NULL };
1367 if (S_ISDIR(lu_object_attr(&obj->mot_obj)))
1370 buf = lu_buf_check_and_alloc(buf, PATH_MAX);
1371 if (buf->lb_buf == NULL)
1375 rc = mdt_links_read(info, obj, &ldata);
1377 if (rc == -ENOENT || rc == -ENODATA)
1382 /* ignore the migrating parent(@pobj) */
1383 retry_count = ldata.ld_leh->leh_reccount - 1;
1386 LASSERT(ldata.ld_leh != NULL);
1387 ldata.ld_lee = (struct link_ea_entry *)(ldata.ld_leh + 1);
1388 for (count = 0; count < ldata.ld_leh->leh_reccount; count++) {
1389 struct mdt_device *mdt = info->mti_mdt;
1390 struct mdt_object *mdt_pobj;
1391 struct mdt_lock_list *mll;
1392 struct lu_name name;
1396 linkea_entry_unpack(ldata.ld_lee, &ldata.ld_reclen,
1398 mdt_pobj = mdt_object_find(info->mti_env, mdt, &fid);
1399 if (IS_ERR(mdt_pobj)) {
1400 CWARN("%s: cannot find obj "DFID": rc = %ld\n",
1401 mdt_obd_name(mdt), PFID(&fid), PTR_ERR(mdt_pobj));
1405 if (!mdt_object_exists(mdt_pobj)) {
1406 CDEBUG(D_INFO, "%s: obj "DFID" does not exist\n",
1407 mdt_obd_name(mdt), PFID(&fid));
1408 mdt_object_put(info->mti_env, mdt_pobj);
1412 /* Check if the object already exists in the list */
1413 list_for_each_entry(mll, lock_list, mll_list) {
1414 if (mll->mll_obj == mdt_pobj) {
1415 mdt_object_put(info->mti_env, mdt_pobj);
1420 if (mdt_pobj == pobj) {
1421 CDEBUG(D_INFO, "%s: skipping parent obj "DFID"\n",
1422 mdt_obd_name(mdt), PFID(&fid));
1423 mdt_object_put(info->mti_env, mdt_pobj);
1429 mdt_object_put(info->mti_env, mdt_pobj);
1430 GOTO(out, rc = -ENOMEM);
1433 /* Since this needs to lock all of objects in linkea, to avoid
1434 * deadlocks, because it does not follow parent-child order as
1435 * other MDT operation, let's use try_lock here and if the lock
1436 * cannot be gotten because of conflicting locks, then drop all
1437 * current locks, send an AST to the client, and start again. */
1438 mdt_lock_pdo_init(&mll->mll_lh, LCK_PW, &name);
1440 rc = mdt_object_lock_try(info, mdt_pobj, &mll->mll_lh, &ibits,
1441 MDS_INODELOCK_UPDATE, true);
1442 if (!(ibits & MDS_INODELOCK_UPDATE)) {
1443 mdt_unlock_list(info, lock_list, rc);
1445 CDEBUG(D_INFO, "%s: busy lock on "DFID" %s retry %d\n",
1446 mdt_obd_name(mdt), PFID(&fid), name.ln_name,
1449 if (retry_count == 0) {
1450 mdt_object_put(info->mti_env, mdt_pobj);
1452 GOTO(out, rc = -EBUSY);
1455 rc = mdt_object_lock(info, mdt_pobj, &mll->mll_lh,
1456 MDS_INODELOCK_UPDATE);
1458 mdt_object_put(info->mti_env, mdt_pobj);
1463 if (mdt_object_remote(mdt_pobj)) {
1464 struct ldlm_lock *lock;
1466 /* For remote object, Set lock to cb_atomic,
1467 * so lock can be released in blocking_ast()
1468 * immediately, then the next try_lock will
1469 * have better chance to succeds */
1471 ldlm_handle2lock(&mll->mll_lh.mlh_rreg_lh);
1472 LASSERT(lock != NULL);
1473 lock_res_and_lock(lock);
1474 ldlm_set_atomic_cb(lock);
1475 unlock_res_and_lock(lock);
1476 LDLM_LOCK_PUT(lock);
1478 mdt_object_unlock_put(info, mdt_pobj, &mll->mll_lh, rc);
1484 INIT_LIST_HEAD(&mll->mll_list);
1485 mll->mll_obj = mdt_pobj;
1486 list_add_tail(&mll->mll_list, lock_list);
1488 ldata.ld_lee = (struct link_ea_entry *)((char *)ldata.ld_lee +
1493 mdt_unlock_list(info, lock_list, rc);
1497 /* migrate files from one MDT to another MDT */
1498 static int mdt_reint_migrate_internal(struct mdt_thread_info *info,
1499 struct mdt_lock_handle *lhc)
1501 struct mdt_reint_record *rr = &info->mti_rr;
1502 struct md_attr *ma = &info->mti_attr;
1503 struct mdt_object *msrcdir;
1504 struct mdt_object *mold;
1505 struct mdt_object *mnew = NULL;
1506 struct mdt_lock_handle *lh_dirp;
1507 struct mdt_lock_handle *lh_childp;
1508 struct mdt_lock_handle *lh_tgtp = NULL;
1509 struct lu_fid *old_fid = &info->mti_tmp_fid1;
1510 struct list_head lock_list;
1512 struct ldlm_lock *lease = NULL;
1513 bool lock_open_sem = false;
1517 CDEBUG(D_INODE, "migrate "DFID"/"DNAME" to "DFID"\n", PFID(rr->rr_fid1),
1518 PNAME(&rr->rr_name), PFID(rr->rr_fid2));
1520 /* 1: lock the source dir. */
1521 msrcdir = mdt_object_find(info->mti_env, info->mti_mdt, rr->rr_fid1);
1522 if (IS_ERR(msrcdir)) {
1523 CDEBUG(D_OTHER, "%s: cannot find source dir "DFID" : rc = %d\n",
1524 mdt_obd_name(info->mti_mdt), PFID(rr->rr_fid1),
1525 (int)PTR_ERR(msrcdir));
1526 RETURN(PTR_ERR(msrcdir));
1529 lh_dirp = &info->mti_lh[MDT_LH_PARENT];
1530 mdt_lock_pdo_init(lh_dirp, LCK_PW, &rr->rr_name);
1531 rc = mdt_reint_object_lock(info, msrcdir, lh_dirp, MDS_INODELOCK_UPDATE,
1534 GOTO(out_put_parent, rc);
1536 if (!mdt_object_remote(msrcdir)) {
1537 rc = mdt_version_get_check_save(info, msrcdir, 0);
1539 GOTO(out_unlock_parent, rc);
1542 /* 2: sanity check and find the object to be migrated. */
1544 rc = mdt_lookup_version_check(info, msrcdir, &rr->rr_name, old_fid, 2);
1546 GOTO(out_unlock_parent, rc);
1548 if (lu_fid_eq(old_fid, rr->rr_fid1) || lu_fid_eq(old_fid, rr->rr_fid2))
1549 GOTO(out_unlock_parent, rc = -EINVAL);
1551 if (!fid_is_md_operative(old_fid))
1552 GOTO(out_unlock_parent, rc = -EPERM);
1554 if (lu_fid_eq(old_fid, &info->mti_mdt->mdt_md_root_fid))
1555 GOTO(out_unlock_parent, rc = -EPERM);
1557 mold = mdt_object_find(info->mti_env, info->mti_mdt, old_fid);
1559 GOTO(out_unlock_parent, rc = PTR_ERR(mold));
1561 if (mdt_object_remote(mold)) {
1562 CDEBUG(D_OTHER, "%s: source "DFID" is on the remote MDT\n",
1563 mdt_obd_name(info->mti_mdt), PFID(old_fid));
1564 GOTO(out_put_child, rc = -EREMOTE);
1567 if (S_ISREG(lu_object_attr(&mold->mot_obj)) &&
1568 !mdt_object_remote(msrcdir)) {
1569 CDEBUG(D_OTHER, "%s: parent "DFID" is still on the same"
1570 " MDT, which should be migrated first:"
1571 " rc = %d\n", mdt_obd_name(info->mti_mdt),
1572 PFID(mdt_object_fid(msrcdir)), -EPERM);
1573 GOTO(out_put_child, rc = -EPERM);
1576 rc = mdt_remote_permission(info);
1578 GOTO(out_put_child, rc);
1580 /* 3: iterate the linkea of the object and lock all of the objects */
1581 INIT_LIST_HEAD(&lock_list);
1582 rc = mdt_lock_objects_in_linkea(info, mold, msrcdir, &lock_list);
1584 GOTO(out_put_child, rc);
1586 if (info->mti_spec.sp_migrate_close) {
1587 struct close_data *data;
1588 struct mdt_body *repbody;
1589 bool lease_broken = false;
1591 if (!req_capsule_field_present(info->mti_pill, &RMF_MDT_EPOCH,
1593 !req_capsule_field_present(info->mti_pill, &RMF_CLOSE_DATA,
1595 GOTO(out_lease, rc = -EPROTO);
1597 data = req_capsule_client_get(info->mti_pill, &RMF_CLOSE_DATA);
1599 GOTO(out_lease, rc = -EPROTO);
1601 lease = ldlm_handle2lock(&data->cd_handle);
1603 GOTO(out_lease, rc = -ESTALE);
1605 /* try to hold open_sem so that nobody else can open the file */
1606 if (!down_write_trylock(&mold->mot_open_sem)) {
1607 ldlm_lock_cancel(lease);
1608 GOTO(out_lease, rc = -EBUSY);
1611 lock_open_sem = true;
1612 /* Check if the lease open lease has already canceled */
1613 lock_res_and_lock(lease);
1614 lease_broken = ldlm_is_cancel(lease);
1615 unlock_res_and_lock(lease);
1617 LDLM_DEBUG(lease, DFID " lease broken? %d",
1618 PFID(mdt_object_fid(mold)), lease_broken);
1620 /* Cancel server side lease. Client side counterpart should
1621 * have been cancelled. It's okay to cancel it now as we've
1622 * held mot_open_sem. */
1623 ldlm_lock_cancel(lease);
1626 GOTO(out_lease, rc = -EAGAIN);
1628 rc = mdt_close_internal(info, mdt_info_req(info), NULL);
1629 repbody = req_capsule_server_get(info->mti_pill, &RMF_MDT_BODY);
1630 repbody->mbo_valid |= OBD_MD_CLOSE_INTENT_EXECED;
1632 GOTO(out_unlock_list, rc);
1635 /* 4: lock of the object migrated object */
1636 lh_childp = &info->mti_lh[MDT_LH_OLD];
1637 mdt_lock_reg_init(lh_childp, LCK_EX);
1638 lock_ibits = MDS_INODELOCK_LOOKUP | MDS_INODELOCK_UPDATE |
1639 MDS_INODELOCK_LAYOUT;
1640 if (mdt_object_remote(msrcdir)) {
1641 /* Enqueue lookup lock from the parent MDT */
1642 rc = mdt_remote_object_lock(info, msrcdir, mdt_object_fid(mold),
1643 &lh_childp->mlh_rreg_lh,
1644 lh_childp->mlh_rreg_mode,
1645 MDS_INODELOCK_LOOKUP, false);
1647 GOTO(out_unlock_list, rc);
1649 lock_ibits &= ~MDS_INODELOCK_LOOKUP;
1652 rc = mdt_reint_object_lock(info, mold, lh_childp, lock_ibits, true);
1654 GOTO(out_unlock_child, rc);
1656 /* Migration is incompatible with HSM. */
1657 ma->ma_need = MA_HSM;
1659 rc = mdt_attr_get_complex(info, mold, ma);
1661 GOTO(out_unlock_child, rc);
1663 if ((ma->ma_valid & MA_HSM) && ma->ma_hsm.mh_flags != 0) {
1666 "%s: cannot migrate HSM archived file "DFID": rc = %d\n",
1667 mdt_obd_name(info->mti_mdt), PFID(old_fid), rc);
1668 GOTO(out_unlock_child, rc);
1671 ma->ma_need = MA_LMV;
1673 ma->ma_lmv = (union lmv_mds_md *)info->mti_xattr_buf;
1674 ma->ma_lmv_size = sizeof(info->mti_xattr_buf);
1675 rc = mdt_stripe_get(info, mold, ma, XATTR_NAME_LMV);
1677 GOTO(out_unlock_child, rc);
1679 if ((ma->ma_valid & MA_LMV)) {
1680 struct lmv_mds_md_v1 *lmm1;
1682 lmv_le_to_cpu(ma->ma_lmv, ma->ma_lmv);
1683 lmm1 = &ma->ma_lmv->lmv_md_v1;
1684 if (!(lmm1->lmv_hash_type & LMV_HASH_FLAG_MIGRATION)) {
1685 CDEBUG(D_OTHER, "%s: can not migrate striped dir "DFID
1686 ": rc = %d\n", mdt_obd_name(info->mti_mdt),
1687 PFID(mdt_object_fid(mold)), -EPERM);
1688 GOTO(out_unlock_child, rc = -EPERM);
1691 if (!fid_is_sane(&lmm1->lmv_stripe_fids[1]))
1692 GOTO(out_unlock_child, rc = -EINVAL);
1694 mnew = mdt_object_find(info->mti_env, info->mti_mdt,
1695 &lmm1->lmv_stripe_fids[1]);
1697 GOTO(out_unlock_child, rc = PTR_ERR(mnew));
1699 if (!mdt_object_remote(mnew)) {
1701 "%s: "DFID" being migrated is on this MDT:"
1702 " rc = %d\n", mdt_obd_name(info->mti_mdt),
1703 PFID(rr->rr_fid2), -EPERM);
1704 GOTO(out_put_new, rc = -EPERM);
1707 lh_tgtp = &info->mti_lh[MDT_LH_CHILD];
1708 mdt_lock_reg_init(lh_tgtp, LCK_EX);
1709 rc = mdt_remote_object_lock(info, mnew,
1710 mdt_object_fid(mnew),
1711 &lh_tgtp->mlh_rreg_lh,
1712 lh_tgtp->mlh_rreg_mode,
1713 MDS_INODELOCK_UPDATE, false);
1716 GOTO(out_put_new, rc);
1719 mnew = mdt_object_find(info->mti_env, info->mti_mdt,
1722 GOTO(out_unlock_child, rc = PTR_ERR(mnew));
1723 if (!mdt_object_remote(mnew)) {
1724 CDEBUG(D_OTHER, "%s: Migration "DFID" is on this MDT:"
1725 " rc = %d\n", mdt_obd_name(info->mti_mdt),
1726 PFID(rr->rr_fid2), -EXDEV);
1727 GOTO(out_put_new, rc = -EXDEV);
1732 mdt_reint_init_ma(info, ma);
1734 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
1735 OBD_FAIL_MDS_REINT_RENAME_WRITE);
1737 rc = mdo_migrate(info->mti_env, mdt_object_child(msrcdir),
1738 mdt_object_child(mold), &rr->rr_name,
1739 mdt_object_child(mnew), ma);
1741 GOTO(out_unlock_new, rc);
1744 if (lh_tgtp != NULL)
1745 mdt_object_unlock(info, mnew, lh_tgtp, rc);
1748 mdt_object_put(info->mti_env, mnew);
1750 mdt_object_unlock(info, mold, lh_childp, rc);
1752 /* we don't really modify linkea objects, so we can safely decref these
1753 * locks, and this can avoid saving them as COS locks, which may prevent
1754 * subsequent migrate. */
1755 mdt_unlock_list(info, &lock_list, 1);
1756 if (lease != NULL) {
1757 ldlm_reprocess_all(lease->l_resource);
1758 LDLM_LOCK_PUT(lease);
1762 up_write(&mold->mot_open_sem);
1764 mdt_object_put(info->mti_env, mold);
1766 mdt_object_unlock(info, msrcdir, lh_dirp, rc);
1768 mdt_object_put(info->mti_env, msrcdir);
1773 static struct mdt_object *mdt_object_find_check(struct mdt_thread_info *info,
1774 const struct lu_fid *fid,
1777 struct mdt_object *dir;
1781 dir = mdt_object_find(info->mti_env, info->mti_mdt, fid);
1785 /* check early, the real version will be saved after locking */
1786 rc = mdt_version_get_check(info, dir, idx);
1792 mdt_object_put(info->mti_env, dir);
1796 static int mdt_object_lock_save(struct mdt_thread_info *info,
1797 struct mdt_object *dir,
1798 struct mdt_lock_handle *lh,
1799 int idx, bool cos_incompat)
1803 /* we lock the target dir if it is local */
1804 rc = mdt_reint_object_lock(info, dir, lh, MDS_INODELOCK_UPDATE,
1809 /* get and save correct version after locking */
1810 mdt_version_get_save(info, dir, idx);
1815 * VBR: rename versions in reply: 0 - srcdir parent; 1 - tgtdir parent;
1816 * 2 - srcdir child; 3 - tgtdir child.
1817 * Update on disk version of srcdir child.
1820 * For DNE phase I, only these renames are allowed
1821 * mv src_p/src_c tgt_p/tgt_c
1822 * 1. src_p/src_c/tgt_p/tgt_c are in the same MDT.
1823 * 2. src_p and tgt_p are same directory, and tgt_c does not
1824 * exists. In this case, all of modification will happen
1825 * in the MDT where ithesource parent is, only one remote
1826 * update is needed, i.e. set c_time/m_time on the child.
1827 * And tgt_c will be still in the same MDT as the original
1830 static int mdt_reint_rename_internal(struct mdt_thread_info *info,
1831 struct mdt_lock_handle *lhc)
1833 struct mdt_reint_record *rr = &info->mti_rr;
1834 struct md_attr *ma = &info->mti_attr;
1835 struct ptlrpc_request *req = mdt_info_req(info);
1836 struct mdt_object *msrcdir = NULL;
1837 struct mdt_object *mtgtdir = NULL;
1838 struct mdt_object *mold;
1839 struct mdt_object *mnew = NULL;
1840 struct mdt_lock_handle *lh_srcdirp;
1841 struct mdt_lock_handle *lh_tgtdirp;
1842 struct mdt_lock_handle *lh_oldp = NULL;
1843 struct mdt_lock_handle *lh_newp = NULL;
1844 struct lu_fid *old_fid = &info->mti_tmp_fid1;
1845 struct lu_fid *new_fid = &info->mti_tmp_fid2;
1847 bool reverse = false;
1852 DEBUG_REQ(D_INODE, req, "rename "DFID"/"DNAME" to "DFID"/"DNAME,
1853 PFID(rr->rr_fid1), PNAME(&rr->rr_name),
1854 PFID(rr->rr_fid2), PNAME(&rr->rr_tgt_name));
1856 /* find both parents. */
1857 msrcdir = mdt_object_find_check(info, rr->rr_fid1, 0);
1858 if (IS_ERR(msrcdir))
1859 RETURN(PTR_ERR(msrcdir));
1861 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME3, 5);
1863 if (lu_fid_eq(rr->rr_fid1, rr->rr_fid2)) {
1865 mdt_object_get(info->mti_env, mtgtdir);
1867 /* Check if the @msrcdir is not a child of the @mtgtdir,
1868 * otherwise a reverse locking must take place. */
1869 rc = mdt_is_subdir(info, msrcdir, rr->rr_fid2);
1873 GOTO(out_put_srcdir, rc);
1875 mtgtdir = mdt_object_find_check(info, rr->rr_fid2, 1);
1876 if (IS_ERR(mtgtdir))
1877 GOTO(out_put_srcdir, rc = PTR_ERR(mtgtdir));
1880 /* source needs to be looked up after locking source parent, otherwise
1881 * this rename may race with unlink source, and cause rename hang, see
1882 * sanityn.sh 55b, so check parents first, if later we found source is
1883 * remote, relock parents. */
1884 cos_incompat = (mdt_object_remote(msrcdir) ||
1885 mdt_object_remote(mtgtdir));
1887 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME4, 5);
1889 /* lock parents in the proper order. */
1890 lh_srcdirp = &info->mti_lh[MDT_LH_PARENT];
1891 lh_tgtdirp = &info->mti_lh[MDT_LH_CHILD];
1894 mdt_lock_pdo_init(lh_srcdirp, LCK_PW, &rr->rr_name);
1895 mdt_lock_pdo_init(lh_tgtdirp, LCK_PW, &rr->rr_tgt_name);
1898 rc = mdt_object_lock_save(info, mtgtdir, lh_tgtdirp, 1,
1901 GOTO(out_put_tgtdir, rc);
1903 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME, 5);
1905 rc = mdt_object_lock_save(info, msrcdir, lh_srcdirp, 0,
1908 mdt_object_unlock(info, mtgtdir, lh_tgtdirp, rc);
1909 GOTO(out_put_tgtdir, rc);
1912 rc = mdt_object_lock_save(info, msrcdir, lh_srcdirp, 0,
1915 GOTO(out_put_tgtdir, rc);
1917 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME, 5);
1919 if (mtgtdir != msrcdir) {
1920 rc = mdt_object_lock_save(info, mtgtdir, lh_tgtdirp, 1,
1922 } else if (lh_srcdirp->mlh_pdo_hash !=
1923 lh_tgtdirp->mlh_pdo_hash) {
1924 rc = mdt_pdir_hash_lock(info, lh_tgtdirp, mtgtdir,
1925 MDS_INODELOCK_UPDATE,
1927 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_PDO_LOCK2, 10);
1930 mdt_object_unlock(info, msrcdir, lh_srcdirp, rc);
1931 GOTO(out_put_tgtdir, rc);
1935 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME4, 5);
1936 OBD_FAIL_TIMEOUT(OBD_FAIL_MDS_RENAME2, 5);
1938 /* find mold object. */
1940 rc = mdt_lookup_version_check(info, msrcdir, &rr->rr_name, old_fid, 2);
1942 GOTO(out_unlock_parents, rc);
1944 if (lu_fid_eq(old_fid, rr->rr_fid1) || lu_fid_eq(old_fid, rr->rr_fid2))
1945 GOTO(out_unlock_parents, rc = -EINVAL);
1947 if (!fid_is_md_operative(old_fid))
1948 GOTO(out_unlock_parents, rc = -EPERM);
1950 mold = mdt_object_find(info->mti_env, info->mti_mdt, old_fid);
1952 GOTO(out_unlock_parents, rc = PTR_ERR(mold));
1954 /* Check if @mtgtdir is subdir of @mold, before locking child
1955 * to avoid reverse locking. */
1956 if (mtgtdir != msrcdir) {
1957 rc = mdt_is_subdir(info, mtgtdir, old_fid);
1959 GOTO(out_put_old, rc);
1962 tgt_vbr_obj_set(info->mti_env, mdt_obj2dt(mold));
1963 /* save version after locking */
1964 mdt_version_get_save(info, mold, 2);
1966 if (!cos_incompat && mdt_object_remote(mold)) {
1967 cos_incompat = true;
1968 mdt_object_put(info->mti_env, mold);
1969 mdt_object_unlock(info, mtgtdir, lh_tgtdirp, -EAGAIN);
1970 mdt_object_unlock(info, msrcdir, lh_srcdirp, -EAGAIN);
1974 /* find mnew object:
1975 * mnew target object may not exist now
1976 * lookup with version checking */
1978 rc = mdt_lookup_version_check(info, mtgtdir, &rr->rr_tgt_name, new_fid,
1981 /* the new_fid should have been filled at this moment */
1982 if (lu_fid_eq(old_fid, new_fid))
1983 GOTO(out_put_old, rc);
1985 if (lu_fid_eq(new_fid, rr->rr_fid1) ||
1986 lu_fid_eq(new_fid, rr->rr_fid2))
1987 GOTO(out_put_old, rc = -EINVAL);
1989 if (!fid_is_md_operative(new_fid))
1990 GOTO(out_put_old, rc = -EPERM);
1992 mnew = mdt_object_find(info->mti_env, info->mti_mdt, new_fid);
1994 GOTO(out_put_old, rc = PTR_ERR(mnew));
1996 if (mdt_object_remote(mnew)) {
1997 struct mdt_body *repbody;
1999 /* Always send rename req to the target child MDT */
2000 repbody = req_capsule_server_get(info->mti_pill,
2002 LASSERT(repbody != NULL);
2003 repbody->mbo_fid1 = *new_fid;
2004 repbody->mbo_valid |= (OBD_MD_FLID | OBD_MD_MDS);
2005 GOTO(out_put_new, rc = -EXDEV);
2007 /* Before locking the target dir, check we do not replace
2008 * a dir with a non-dir, otherwise it may deadlock with
2009 * link op which tries to create a link in this dir
2010 * back to this non-dir. */
2011 if (S_ISDIR(lu_object_attr(&mnew->mot_obj)) &&
2012 !S_ISDIR(lu_object_attr(&mold->mot_obj)))
2013 GOTO(out_put_new, rc = -EISDIR);
2015 lh_oldp = &info->mti_lh[MDT_LH_OLD];
2016 mdt_lock_reg_init(lh_oldp, LCK_EX);
2017 lock_ibits = MDS_INODELOCK_LOOKUP | MDS_INODELOCK_XATTR;
2018 if (mdt_object_remote(msrcdir)) {
2019 /* Enqueue lookup lock from the parent MDT */
2020 rc = mdt_remote_object_lock(info, msrcdir,
2021 mdt_object_fid(mold),
2022 &lh_oldp->mlh_rreg_lh,
2023 lh_oldp->mlh_rreg_mode,
2024 MDS_INODELOCK_LOOKUP,
2027 GOTO(out_put_new, rc);
2029 lock_ibits &= ~MDS_INODELOCK_LOOKUP;
2032 rc = mdt_reint_object_lock(info, mold, lh_oldp, lock_ibits,
2035 GOTO(out_unlock_old, rc);
2037 /* Check if @msrcdir is subdir of @mnew, before locking child
2038 * to avoid reverse locking. */
2039 if (mtgtdir != msrcdir) {
2040 rc = mdt_is_subdir(info, msrcdir, new_fid);
2042 GOTO(out_unlock_old, rc);
2045 /* We used to acquire MDS_INODELOCK_FULL here but we
2046 * can't do this now because a running HSM restore on
2047 * the rename onto victim will hold the layout
2048 * lock. See LU-4002. */
2050 lh_newp = &info->mti_lh[MDT_LH_NEW];
2051 mdt_lock_reg_init(lh_newp, LCK_EX);
2052 rc = mdt_reint_object_lock(info, mnew, lh_newp,
2053 MDS_INODELOCK_LOOKUP |
2054 MDS_INODELOCK_UPDATE,
2057 GOTO(out_unlock_old, rc);
2059 /* get and save version after locking */
2060 mdt_version_get_save(info, mnew, 3);
2061 } else if (rc != -EREMOTE && rc != -ENOENT) {
2062 GOTO(out_put_old, rc);
2064 lh_oldp = &info->mti_lh[MDT_LH_OLD];
2065 mdt_lock_reg_init(lh_oldp, LCK_EX);
2066 lock_ibits = MDS_INODELOCK_LOOKUP | MDS_INODELOCK_XATTR;
2067 if (mdt_object_remote(msrcdir)) {
2068 /* Enqueue lookup lock from the parent MDT */
2069 rc = mdt_remote_object_lock(info, msrcdir,
2070 mdt_object_fid(mold),
2071 &lh_oldp->mlh_rreg_lh,
2072 lh_oldp->mlh_rreg_mode,
2073 MDS_INODELOCK_LOOKUP,
2076 GOTO(out_put_old, rc);
2078 lock_ibits &= ~MDS_INODELOCK_LOOKUP;
2081 rc = mdt_reint_object_lock(info, mold, lh_oldp, lock_ibits,
2084 GOTO(out_unlock_old, rc);
2086 mdt_enoent_version_save(info, 3);
2089 /* step 5: rename it */
2090 mdt_reint_init_ma(info, ma);
2092 mdt_fail_write(info->mti_env, info->mti_mdt->mdt_bottom,
2093 OBD_FAIL_MDS_REINT_RENAME_WRITE);
2096 mutex_lock(&mnew->mot_lov_mutex);
2098 rc = mdo_rename(info->mti_env, mdt_object_child(msrcdir),
2099 mdt_object_child(mtgtdir), old_fid, &rr->rr_name,
2100 mnew != NULL ? mdt_object_child(mnew) : NULL,
2101 &rr->rr_tgt_name, ma);
2104 mutex_unlock(&mnew->mot_lov_mutex);
2106 /* handle last link of tgt object */
2108 mdt_counter_incr(req, LPROC_MDT_RENAME);
2110 mdt_handle_last_unlink(info, mnew, ma);
2112 mdt_rename_counter_tally(info, info->mti_mdt, req,
2118 mdt_object_unlock(info, mnew, lh_newp, rc);
2120 mdt_object_unlock(info, mold, lh_oldp, rc);
2123 mdt_object_put(info->mti_env, mnew);
2125 mdt_object_put(info->mti_env, mold);
2127 mdt_object_unlock(info, mtgtdir, lh_tgtdirp, rc);
2128 mdt_object_unlock(info, msrcdir, lh_srcdirp, rc);
2130 mdt_object_put(info->mti_env, mtgtdir);
2132 mdt_object_put(info->mti_env, msrcdir);
2136 static int mdt_reint_rename_or_migrate(struct mdt_thread_info *info,
2137 struct mdt_lock_handle *lhc, bool rename)
2139 struct mdt_reint_record *rr = &info->mti_rr;
2140 struct ptlrpc_request *req = mdt_info_req(info);
2141 struct lustre_handle rename_lh = { 0 };
2145 if (info->mti_dlm_req)
2146 ldlm_request_cancel(req, info->mti_dlm_req, 0, LATF_SKIP);
2148 if (!fid_is_md_operative(rr->rr_fid1) ||
2149 !fid_is_md_operative(rr->rr_fid2))
2152 /* Note: do not enqueue rename lock for replay request, because
2153 * if other MDT holds rename lock, but being blocked to wait for
2154 * this MDT to finish its recovery, and the failover MDT can not
2155 * get rename lock, which will cause deadlock. */
2156 if (!req_is_replay(req)) {
2157 rc = mdt_rename_lock(info, &rename_lh);
2159 CERROR("%s: can't lock FS for rename: rc = %d\n",
2160 mdt_obd_name(info->mti_mdt), rc);
2166 rc = mdt_reint_rename_internal(info, lhc);
2168 rc = mdt_reint_migrate_internal(info, lhc);
2170 if (lustre_handle_is_used(&rename_lh))
2171 mdt_rename_unlock(&rename_lh);
2176 static int mdt_reint_rename(struct mdt_thread_info *info,
2177 struct mdt_lock_handle *lhc)
2179 return mdt_reint_rename_or_migrate(info, lhc, true);
2182 static int mdt_reint_migrate(struct mdt_thread_info *info,
2183 struct mdt_lock_handle *lhc)
2185 return mdt_reint_rename_or_migrate(info, lhc, false);
2188 struct mdt_reinter {
2189 int (*mr_handler)(struct mdt_thread_info *, struct mdt_lock_handle *);
2190 enum lprocfs_extra_opc mr_extra_opc;
2193 static const struct mdt_reinter mdt_reinters[] = {
2195 .mr_handler = &mdt_reint_setattr,
2196 .mr_extra_opc = MDS_REINT_SETATTR,
2199 .mr_handler = &mdt_reint_create,
2200 .mr_extra_opc = MDS_REINT_CREATE,
2203 .mr_handler = &mdt_reint_link,
2204 .mr_extra_opc = MDS_REINT_LINK,
2207 .mr_handler = &mdt_reint_unlink,
2208 .mr_extra_opc = MDS_REINT_UNLINK,
2211 .mr_handler = &mdt_reint_rename,
2212 .mr_extra_opc = MDS_REINT_RENAME,
2215 .mr_handler = &mdt_reint_open,
2216 .mr_extra_opc = MDS_REINT_OPEN,
2218 [REINT_SETXATTR] = {
2219 .mr_handler = &mdt_reint_setxattr,
2220 .mr_extra_opc = MDS_REINT_SETXATTR,
2223 .mr_handler = &mdt_reint_unlink,
2224 .mr_extra_opc = MDS_REINT_UNLINK,
2227 .mr_handler = &mdt_reint_migrate,
2228 .mr_extra_opc = MDS_REINT_RENAME,
2232 int mdt_reint_rec(struct mdt_thread_info *info,
2233 struct mdt_lock_handle *lhc)
2235 const struct mdt_reinter *mr;
2239 if (!(info->mti_rr.rr_opcode < ARRAY_SIZE(mdt_reinters)))
2242 mr = &mdt_reinters[info->mti_rr.rr_opcode];
2243 if (mr->mr_handler == NULL)
2246 rc = (*mr->mr_handler)(info, lhc);
2248 lprocfs_counter_incr(ptlrpc_req2svc(mdt_info_req(info))->srv_stats,
2249 PTLRPC_LAST_CNTR + mr->mr_extra_opc);