4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License version 2 for more details (a copy is included
14 * in the LICENSE file that accompanied this code).
16 * You should have received a copy of the GNU General Public License
17 * version 2 along with this program; If not, see
18 * http://www.gnu.org/licenses/gpl-2.0.html
23 * Copyright (c) 2002, 2010, Oracle and/or its affiliates. All rights reserved.
24 * Use is subject to license terms.
26 * Copyright (c) 2011, 2017, Intel Corporation.
29 * This file is part of Lustre, http://www.lustre.org/
30 * Lustre is a trademark of Sun Microsystems, Inc.
34 * Author: Peter Braam <braam@clusterfs.com>
35 * Author: Phil Schwan <phil@clusterfs.com>
36 * Author: Andreas Dilger <adilger@clusterfs.com>
39 #define DEBUG_SUBSYSTEM S_LLITE
40 #include <lustre_dlm.h>
41 #include <linux/pagemap.h>
42 #include <linux/file.h>
43 #include <linux/sched.h>
44 #include <linux/user_namespace.h>
45 #ifdef HAVE_UIDGID_HEADER
46 # include <linux/uidgid.h>
49 #include <uapi/linux/lustre/lustre_ioctl.h>
50 #include <lustre_swab.h>
52 #include "cl_object.h"
53 #include "llite_internal.h"
54 #include "vvp_internal.h"
57 struct inode *sp_inode;
62 ll_put_grouplock(struct inode *inode, struct file *file, unsigned long arg);
64 static int ll_lease_close(struct obd_client_handle *och, struct inode *inode,
67 static struct ll_file_data *ll_file_data_get(void)
69 struct ll_file_data *fd;
71 OBD_SLAB_ALLOC_PTR_GFP(fd, ll_file_data_slab, GFP_NOFS);
75 fd->fd_write_failed = false;
80 static void ll_file_data_put(struct ll_file_data *fd)
83 OBD_SLAB_FREE_PTR(fd, ll_file_data_slab);
87 * Packs all the attributes into @op_data for the CLOSE rpc.
89 static void ll_prepare_close(struct inode *inode, struct md_op_data *op_data,
90 struct obd_client_handle *och)
94 ll_prep_md_op_data(op_data, inode, NULL, NULL,
95 0, 0, LUSTRE_OPC_ANY, NULL);
97 op_data->op_attr.ia_mode = inode->i_mode;
98 op_data->op_attr.ia_atime = inode->i_atime;
99 op_data->op_attr.ia_mtime = inode->i_mtime;
100 op_data->op_attr.ia_ctime = inode->i_ctime;
101 op_data->op_attr.ia_size = i_size_read(inode);
102 op_data->op_attr.ia_valid |= ATTR_MODE | ATTR_ATIME | ATTR_ATIME_SET |
103 ATTR_MTIME | ATTR_MTIME_SET |
104 ATTR_CTIME | ATTR_CTIME_SET;
105 op_data->op_attr_blocks = inode->i_blocks;
106 op_data->op_attr_flags = ll_inode_to_ext_flags(inode->i_flags);
107 if (ll_file_test_flag(ll_i2info(inode), LLIF_PROJECT_INHERIT))
108 op_data->op_attr_flags |= LUSTRE_PROJINHERIT_FL;
109 op_data->op_handle = och->och_fh;
111 if (och->och_flags & FMODE_WRITE &&
112 ll_file_test_and_clear_flag(ll_i2info(inode), LLIF_DATA_MODIFIED))
113 /* For HSM: if inode data has been modified, pack it so that
114 * MDT can set data dirty flag in the archive. */
115 op_data->op_bias |= MDS_DATA_MODIFIED;
121 * Perform a close, possibly with a bias.
122 * The meaning of "data" depends on the value of "bias".
124 * If \a bias is MDS_HSM_RELEASE then \a data is a pointer to the data version.
125 * If \a bias is MDS_CLOSE_LAYOUT_SWAP then \a data is a pointer to the inode to
128 static int ll_close_inode_openhandle(struct inode *inode,
129 struct obd_client_handle *och,
130 enum mds_op_bias bias, void *data)
132 struct obd_export *md_exp = ll_i2mdexp(inode);
133 const struct ll_inode_info *lli = ll_i2info(inode);
134 struct md_op_data *op_data;
135 struct ptlrpc_request *req = NULL;
139 if (class_exp2obd(md_exp) == NULL) {
140 CERROR("%s: invalid MDC connection handle closing "DFID"\n",
141 ll_get_fsname(inode->i_sb, NULL, 0),
142 PFID(&lli->lli_fid));
146 OBD_ALLOC_PTR(op_data);
147 /* We leak openhandle and request here on error, but not much to be
148 * done in OOM case since app won't retry close on error either. */
150 GOTO(out, rc = -ENOMEM);
152 ll_prepare_close(inode, op_data, och);
154 case MDS_CLOSE_LAYOUT_MERGE:
155 /* merge blocks from the victim inode */
156 op_data->op_attr_blocks += ((struct inode *)data)->i_blocks;
157 op_data->op_attr.ia_valid |= ATTR_SIZE | ATTR_BLOCKS;
158 case MDS_CLOSE_LAYOUT_SPLIT:
159 case MDS_CLOSE_LAYOUT_SWAP: {
160 struct split_param *sp = data;
162 LASSERT(data != NULL);
163 op_data->op_bias |= bias;
164 op_data->op_data_version = 0;
165 op_data->op_lease_handle = och->och_lease_handle;
166 if (bias == MDS_CLOSE_LAYOUT_SPLIT) {
167 op_data->op_fid2 = *ll_inode2fid(sp->sp_inode);
168 op_data->op_mirror_id = sp->sp_mirror_id;
170 op_data->op_fid2 = *ll_inode2fid(data);
175 case MDS_CLOSE_RESYNC_DONE: {
176 struct ll_ioc_lease *ioc = data;
178 LASSERT(data != NULL);
179 op_data->op_attr_blocks +=
180 ioc->lil_count * op_data->op_attr_blocks;
181 op_data->op_attr.ia_valid |= ATTR_SIZE | ATTR_BLOCKS;
182 op_data->op_bias |= MDS_CLOSE_RESYNC_DONE;
184 op_data->op_lease_handle = och->och_lease_handle;
185 op_data->op_data = &ioc->lil_ids[0];
186 op_data->op_data_size =
187 ioc->lil_count * sizeof(ioc->lil_ids[0]);
191 case MDS_HSM_RELEASE:
192 LASSERT(data != NULL);
193 op_data->op_bias |= MDS_HSM_RELEASE;
194 op_data->op_data_version = *(__u64 *)data;
195 op_data->op_lease_handle = och->och_lease_handle;
196 op_data->op_attr.ia_valid |= ATTR_SIZE | ATTR_BLOCKS;
200 LASSERT(data == NULL);
204 if (!(op_data->op_attr.ia_valid & ATTR_SIZE))
205 op_data->op_attr.ia_valid |= MDS_ATTR_LSIZE;
206 if (!(op_data->op_attr.ia_valid & ATTR_BLOCKS))
207 op_data->op_attr.ia_valid |= MDS_ATTR_LBLOCKS;
209 rc = md_close(md_exp, op_data, och->och_mod, &req);
210 if (rc != 0 && rc != -EINTR)
211 CERROR("%s: inode "DFID" mdc close failed: rc = %d\n",
212 md_exp->exp_obd->obd_name, PFID(&lli->lli_fid), rc);
214 if (rc == 0 && op_data->op_bias & bias) {
215 struct mdt_body *body;
217 body = req_capsule_server_get(&req->rq_pill, &RMF_MDT_BODY);
218 if (!(body->mbo_valid & OBD_MD_CLOSE_INTENT_EXECED))
222 ll_finish_md_op_data(op_data);
226 md_clear_open_replay_data(md_exp, och);
227 och->och_fh.cookie = DEAD_HANDLE_MAGIC;
230 ptlrpc_req_finished(req); /* This is close request */
234 int ll_md_real_close(struct inode *inode, fmode_t fmode)
236 struct ll_inode_info *lli = ll_i2info(inode);
237 struct obd_client_handle **och_p;
238 struct obd_client_handle *och;
243 if (fmode & FMODE_WRITE) {
244 och_p = &lli->lli_mds_write_och;
245 och_usecount = &lli->lli_open_fd_write_count;
246 } else if (fmode & FMODE_EXEC) {
247 och_p = &lli->lli_mds_exec_och;
248 och_usecount = &lli->lli_open_fd_exec_count;
250 LASSERT(fmode & FMODE_READ);
251 och_p = &lli->lli_mds_read_och;
252 och_usecount = &lli->lli_open_fd_read_count;
255 mutex_lock(&lli->lli_och_mutex);
256 if (*och_usecount > 0) {
257 /* There are still users of this handle, so skip
259 mutex_unlock(&lli->lli_och_mutex);
265 mutex_unlock(&lli->lli_och_mutex);
268 /* There might be a race and this handle may already
270 rc = ll_close_inode_openhandle(inode, och, 0, NULL);
276 static int ll_md_close(struct inode *inode, struct file *file)
278 union ldlm_policy_data policy = {
279 .l_inodebits = { MDS_INODELOCK_OPEN },
281 __u64 flags = LDLM_FL_BLOCK_GRANTED | LDLM_FL_TEST_LOCK;
282 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
283 struct ll_inode_info *lli = ll_i2info(inode);
284 struct lustre_handle lockh;
285 enum ldlm_mode lockmode;
289 /* clear group lock, if present */
290 if (unlikely(fd->fd_flags & LL_FILE_GROUP_LOCKED))
291 ll_put_grouplock(inode, file, fd->fd_grouplock.lg_gid);
293 if (fd->fd_lease_och != NULL) {
296 /* Usually the lease is not released when the
297 * application crashed, we need to release here. */
298 rc = ll_lease_close(fd->fd_lease_och, inode, &lease_broken);
299 CDEBUG(rc ? D_ERROR : D_INODE, "Clean up lease "DFID" %d/%d\n",
300 PFID(&lli->lli_fid), rc, lease_broken);
302 fd->fd_lease_och = NULL;
305 if (fd->fd_och != NULL) {
306 rc = ll_close_inode_openhandle(inode, fd->fd_och, 0, NULL);
311 /* Let's see if we have good enough OPEN lock on the file and if
312 we can skip talking to MDS */
313 mutex_lock(&lli->lli_och_mutex);
314 if (fd->fd_omode & FMODE_WRITE) {
316 LASSERT(lli->lli_open_fd_write_count);
317 lli->lli_open_fd_write_count--;
318 } else if (fd->fd_omode & FMODE_EXEC) {
320 LASSERT(lli->lli_open_fd_exec_count);
321 lli->lli_open_fd_exec_count--;
324 LASSERT(lli->lli_open_fd_read_count);
325 lli->lli_open_fd_read_count--;
327 mutex_unlock(&lli->lli_och_mutex);
329 if (!md_lock_match(ll_i2mdexp(inode), flags, ll_inode2fid(inode),
330 LDLM_IBITS, &policy, lockmode, &lockh))
331 rc = ll_md_real_close(inode, fd->fd_omode);
334 LUSTRE_FPRIVATE(file) = NULL;
335 ll_file_data_put(fd);
340 /* While this returns an error code, fput() the caller does not, so we need
341 * to make every effort to clean up all of our state here. Also, applications
342 * rarely check close errors and even if an error is returned they will not
343 * re-try the close call.
345 int ll_file_release(struct inode *inode, struct file *file)
347 struct ll_file_data *fd;
348 struct ll_sb_info *sbi = ll_i2sbi(inode);
349 struct ll_inode_info *lli = ll_i2info(inode);
353 CDEBUG(D_VFSTRACE, "VFS Op:inode="DFID"(%p)\n",
354 PFID(ll_inode2fid(inode)), inode);
356 if (inode->i_sb->s_root != file_dentry(file))
357 ll_stats_ops_tally(sbi, LPROC_LL_RELEASE, 1);
358 fd = LUSTRE_FPRIVATE(file);
361 /* The last ref on @file, maybe not the the owner pid of statahead,
362 * because parent and child process can share the same file handle. */
363 if (S_ISDIR(inode->i_mode) && lli->lli_opendir_key == fd)
364 ll_deauthorize_statahead(inode, fd);
366 if (inode->i_sb->s_root == file_dentry(file)) {
367 LUSTRE_FPRIVATE(file) = NULL;
368 ll_file_data_put(fd);
372 if (!S_ISDIR(inode->i_mode)) {
373 if (lli->lli_clob != NULL)
374 lov_read_and_clear_async_rc(lli->lli_clob);
375 lli->lli_async_rc = 0;
378 rc = ll_md_close(inode, file);
380 if (CFS_FAIL_TIMEOUT_MS(OBD_FAIL_PTLRPC_DUMP_LOG, cfs_fail_val))
381 libcfs_debug_dumplog();
386 static inline int ll_dom_readpage(void *data, struct page *page)
388 struct niobuf_local *lnb = data;
391 kaddr = ll_kmap_atomic(page, KM_USER0);
392 memcpy(kaddr, lnb->lnb_data, lnb->lnb_len);
393 if (lnb->lnb_len < PAGE_SIZE)
394 memset(kaddr + lnb->lnb_len, 0,
395 PAGE_SIZE - lnb->lnb_len);
396 flush_dcache_page(page);
397 SetPageUptodate(page);
398 ll_kunmap_atomic(kaddr, KM_USER0);
404 void ll_dom_finish_open(struct inode *inode, struct ptlrpc_request *req,
405 struct lookup_intent *it)
407 struct ll_inode_info *lli = ll_i2info(inode);
408 struct cl_object *obj = lli->lli_clob;
409 struct address_space *mapping = inode->i_mapping;
411 struct niobuf_remote *rnb;
416 struct lustre_handle lockh;
417 struct ldlm_lock *lock;
418 unsigned long index, start;
419 struct niobuf_local lnb;
421 bool dom_lock = false;
428 if (it->it_lock_mode != 0) {
429 lockh.cookie = it->it_lock_handle;
430 lock = ldlm_handle2lock(&lockh);
432 dom_lock = ldlm_has_dom(lock);
439 env = cl_env_get(&refcheck);
443 if (!req_capsule_has_field(&req->rq_pill, &RMF_NIOBUF_INLINE,
445 GOTO(out_env, rc = -ENODATA);
447 rnb = req_capsule_server_get(&req->rq_pill, &RMF_NIOBUF_INLINE);
448 data = (char *)rnb + sizeof(*rnb);
450 if (rnb == NULL || rnb->rnb_len == 0)
451 GOTO(out_env, rc = 0);
453 CDEBUG(D_INFO, "Get data buffer along with open, len %i, i_size %llu\n",
454 rnb->rnb_len, i_size_read(inode));
456 io = vvp_env_thread_io(env);
458 io->ci_ignore_layout = 1;
459 rc = cl_io_init(env, io, CIT_MISC, obj);
463 lnb.lnb_file_offset = rnb->rnb_offset;
464 start = lnb.lnb_file_offset / PAGE_SIZE;
466 LASSERT(lnb.lnb_file_offset % PAGE_SIZE == 0);
467 lnb.lnb_page_offset = 0;
471 lnb.lnb_data = data + (index << PAGE_SHIFT);
472 lnb.lnb_len = rnb->rnb_len - (index << PAGE_SHIFT);
473 if (lnb.lnb_len > PAGE_SIZE)
474 lnb.lnb_len = PAGE_SIZE;
476 vmpage = read_cache_page(mapping, index + start,
477 ll_dom_readpage, &lnb);
478 if (IS_ERR(vmpage)) {
479 CWARN("%s: cannot fill page %lu for "DFID
480 " with data: rc = %li\n",
481 ll_get_fsname(inode->i_sb, NULL, 0),
482 index + start, PFID(lu_object_fid(&obj->co_lu)),
487 clp = cl_page_find(env, obj, vmpage->index, vmpage,
492 GOTO(out_io, rc = PTR_ERR(clp));
496 cl_page_export(env, clp, 1);
497 cl_page_put(env, clp);
501 } while (rnb->rnb_len > (index << PAGE_SHIFT));
507 cl_env_put(env, &refcheck);
510 static int ll_intent_file_open(struct dentry *de, void *lmm, int lmmsize,
511 struct lookup_intent *itp)
513 struct ll_sb_info *sbi = ll_i2sbi(de->d_inode);
514 struct dentry *parent = de->d_parent;
515 const char *name = NULL;
517 struct md_op_data *op_data;
518 struct ptlrpc_request *req = NULL;
522 LASSERT(parent != NULL);
523 LASSERT(itp->it_flags & MDS_OPEN_BY_FID);
525 /* if server supports open-by-fid, or file name is invalid, don't pack
526 * name in open request */
527 if (!(exp_connect_flags(sbi->ll_md_exp) & OBD_CONNECT_OPEN_BY_FID) &&
528 lu_name_is_valid_2(de->d_name.name, de->d_name.len)) {
529 name = de->d_name.name;
530 len = de->d_name.len;
533 op_data = ll_prep_md_op_data(NULL, parent->d_inode, de->d_inode,
534 name, len, 0, LUSTRE_OPC_ANY, NULL);
536 RETURN(PTR_ERR(op_data));
537 op_data->op_data = lmm;
538 op_data->op_data_size = lmmsize;
540 rc = md_intent_lock(sbi->ll_md_exp, op_data, itp, &req,
541 &ll_md_blocking_ast, 0);
542 ll_finish_md_op_data(op_data);
544 /* reason for keep own exit path - don`t flood log
545 * with messages with -ESTALE errors.
547 if (!it_disposition(itp, DISP_OPEN_OPEN) ||
548 it_open_error(DISP_OPEN_OPEN, itp))
550 ll_release_openhandle(de, itp);
554 if (it_disposition(itp, DISP_LOOKUP_NEG))
555 GOTO(out, rc = -ENOENT);
557 if (rc != 0 || it_open_error(DISP_OPEN_OPEN, itp)) {
558 rc = rc ? rc : it_open_error(DISP_OPEN_OPEN, itp);
559 CDEBUG(D_VFSTRACE, "lock enqueue: err: %d\n", rc);
563 rc = ll_prep_inode(&de->d_inode, req, NULL, itp);
565 if (!rc && itp->it_lock_mode) {
566 ll_dom_finish_open(de->d_inode, req, itp);
567 ll_set_lock_data(sbi->ll_md_exp, de->d_inode, itp, NULL);
571 ptlrpc_req_finished(req);
572 ll_intent_drop_lock(itp);
574 /* We did open by fid, but by the time we got to the server,
575 * the object disappeared. If this is a create, we cannot really
576 * tell the userspace that the file it was trying to create
577 * does not exist. Instead let's return -ESTALE, and the VFS will
578 * retry the create with LOOKUP_REVAL that we are going to catch
579 * in ll_revalidate_dentry() and use lookup then.
581 if (rc == -ENOENT && itp->it_op & IT_CREAT)
587 static int ll_och_fill(struct obd_export *md_exp, struct lookup_intent *it,
588 struct obd_client_handle *och)
590 struct mdt_body *body;
592 body = req_capsule_server_get(&it->it_request->rq_pill, &RMF_MDT_BODY);
593 och->och_fh = body->mbo_handle;
594 och->och_fid = body->mbo_fid1;
595 och->och_lease_handle.cookie = it->it_lock_handle;
596 och->och_magic = OBD_CLIENT_HANDLE_MAGIC;
597 och->och_flags = it->it_flags;
599 return md_set_open_replay_data(md_exp, och, it);
602 static int ll_local_open(struct file *file, struct lookup_intent *it,
603 struct ll_file_data *fd, struct obd_client_handle *och)
605 struct inode *inode = file_inode(file);
608 LASSERT(!LUSTRE_FPRIVATE(file));
615 rc = ll_och_fill(ll_i2sbi(inode)->ll_md_exp, it, och);
620 LUSTRE_FPRIVATE(file) = fd;
621 ll_readahead_init(inode, &fd->fd_ras);
622 fd->fd_omode = it->it_flags & (FMODE_READ | FMODE_WRITE | FMODE_EXEC);
624 /* ll_cl_context initialize */
625 rwlock_init(&fd->fd_lock);
626 INIT_LIST_HEAD(&fd->fd_lccs);
631 /* Open a file, and (for the very first open) create objects on the OSTs at
632 * this time. If opened with O_LOV_DELAY_CREATE, then we don't do the object
633 * creation or open until ll_lov_setstripe() ioctl is called.
635 * If we already have the stripe MD locally then we don't request it in
636 * md_open(), by passing a lmm_size = 0.
638 * It is up to the application to ensure no other processes open this file
639 * in the O_LOV_DELAY_CREATE case, or the default striping pattern will be
640 * used. We might be able to avoid races of that sort by getting lli_open_sem
641 * before returning in the O_LOV_DELAY_CREATE case and dropping it here
642 * or in ll_file_release(), but I'm not sure that is desirable/necessary.
644 int ll_file_open(struct inode *inode, struct file *file)
646 struct ll_inode_info *lli = ll_i2info(inode);
647 struct lookup_intent *it, oit = { .it_op = IT_OPEN,
648 .it_flags = file->f_flags };
649 struct obd_client_handle **och_p = NULL;
650 __u64 *och_usecount = NULL;
651 struct ll_file_data *fd;
655 CDEBUG(D_VFSTRACE, "VFS Op:inode="DFID"(%p), flags %o\n",
656 PFID(ll_inode2fid(inode)), inode, file->f_flags);
658 it = file->private_data; /* XXX: compat macro */
659 file->private_data = NULL; /* prevent ll_local_open assertion */
661 fd = ll_file_data_get();
663 GOTO(out_nofiledata, rc = -ENOMEM);
666 if (S_ISDIR(inode->i_mode))
667 ll_authorize_statahead(inode, fd);
669 if (inode->i_sb->s_root == file_dentry(file)) {
670 LUSTRE_FPRIVATE(file) = fd;
674 if (!it || !it->it_disposition) {
675 /* Convert f_flags into access mode. We cannot use file->f_mode,
676 * because everything but O_ACCMODE mask was stripped from
678 if ((oit.it_flags + 1) & O_ACCMODE)
680 if (file->f_flags & O_TRUNC)
681 oit.it_flags |= FMODE_WRITE;
683 /* kernel only call f_op->open in dentry_open. filp_open calls
684 * dentry_open after call to open_namei that checks permissions.
685 * Only nfsd_open call dentry_open directly without checking
686 * permissions and because of that this code below is safe. */
687 if (oit.it_flags & (FMODE_WRITE | FMODE_READ))
688 oit.it_flags |= MDS_OPEN_OWNEROVERRIDE;
690 /* We do not want O_EXCL here, presumably we opened the file
691 * already? XXX - NFS implications? */
692 oit.it_flags &= ~O_EXCL;
694 /* bug20584, if "it_flags" contains O_CREAT, the file will be
695 * created if necessary, then "IT_CREAT" should be set to keep
696 * consistent with it */
697 if (oit.it_flags & O_CREAT)
698 oit.it_op |= IT_CREAT;
704 /* Let's see if we have file open on MDS already. */
705 if (it->it_flags & FMODE_WRITE) {
706 och_p = &lli->lli_mds_write_och;
707 och_usecount = &lli->lli_open_fd_write_count;
708 } else if (it->it_flags & FMODE_EXEC) {
709 och_p = &lli->lli_mds_exec_och;
710 och_usecount = &lli->lli_open_fd_exec_count;
712 och_p = &lli->lli_mds_read_och;
713 och_usecount = &lli->lli_open_fd_read_count;
716 mutex_lock(&lli->lli_och_mutex);
717 if (*och_p) { /* Open handle is present */
718 if (it_disposition(it, DISP_OPEN_OPEN)) {
719 /* Well, there's extra open request that we do not need,
720 let's close it somehow. This will decref request. */
721 rc = it_open_error(DISP_OPEN_OPEN, it);
723 mutex_unlock(&lli->lli_och_mutex);
724 GOTO(out_openerr, rc);
727 ll_release_openhandle(file_dentry(file), it);
731 rc = ll_local_open(file, it, fd, NULL);
734 mutex_unlock(&lli->lli_och_mutex);
735 GOTO(out_openerr, rc);
738 LASSERT(*och_usecount == 0);
739 if (!it->it_disposition) {
740 struct ll_dentry_data *ldd = ll_d2d(file->f_path.dentry);
741 /* We cannot just request lock handle now, new ELC code
742 means that one of other OPEN locks for this file
743 could be cancelled, and since blocking ast handler
744 would attempt to grab och_mutex as well, that would
745 result in a deadlock */
746 mutex_unlock(&lli->lli_och_mutex);
748 * Normally called under two situations:
750 * 2. A race/condition on MDS resulting in no open
751 * handle to be returned from LOOKUP|OPEN request,
752 * for example if the target entry was a symlink.
754 * Only fetch MDS_OPEN_LOCK if this is in NFS path,
755 * marked by a bit set in ll_iget_for_nfs. Clear the
756 * bit so that it's not confusing later callers.
758 * NB; when ldd is NULL, it must have come via normal
759 * lookup path only, since ll_iget_for_nfs always calls
762 if (ldd && ldd->lld_nfs_dentry) {
763 ldd->lld_nfs_dentry = 0;
764 it->it_flags |= MDS_OPEN_LOCK;
768 * Always specify MDS_OPEN_BY_FID because we don't want
769 * to get file with different fid.
771 it->it_flags |= MDS_OPEN_BY_FID;
772 rc = ll_intent_file_open(file_dentry(file), NULL, 0,
775 GOTO(out_openerr, rc);
779 OBD_ALLOC(*och_p, sizeof (struct obd_client_handle));
781 GOTO(out_och_free, rc = -ENOMEM);
785 /* md_intent_lock() didn't get a request ref if there was an
786 * open error, so don't do cleanup on the request here
788 /* XXX (green): Should not we bail out on any error here, not
789 * just open error? */
790 rc = it_open_error(DISP_OPEN_OPEN, it);
792 GOTO(out_och_free, rc);
794 LASSERTF(it_disposition(it, DISP_ENQ_OPEN_REF),
795 "inode %p: disposition %x, status %d\n", inode,
796 it_disposition(it, ~0), it->it_status);
798 rc = ll_local_open(file, it, fd, *och_p);
800 GOTO(out_och_free, rc);
802 mutex_unlock(&lli->lli_och_mutex);
805 /* Must do this outside lli_och_mutex lock to prevent deadlock where
806 different kind of OPEN lock for this same inode gets cancelled
807 by ldlm_cancel_lru */
808 if (!S_ISREG(inode->i_mode))
809 GOTO(out_och_free, rc);
811 cl_lov_delay_create_clear(&file->f_flags);
812 GOTO(out_och_free, rc);
816 if (och_p && *och_p) {
817 OBD_FREE(*och_p, sizeof (struct obd_client_handle));
818 *och_p = NULL; /* OBD_FREE writes some magic there */
821 mutex_unlock(&lli->lli_och_mutex);
824 if (lli->lli_opendir_key == fd)
825 ll_deauthorize_statahead(inode, fd);
827 ll_file_data_put(fd);
829 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_OPEN, 1);
833 if (it && it_disposition(it, DISP_ENQ_OPEN_REF)) {
834 ptlrpc_req_finished(it->it_request);
835 it_clear_disposition(it, DISP_ENQ_OPEN_REF);
841 static int ll_md_blocking_lease_ast(struct ldlm_lock *lock,
842 struct ldlm_lock_desc *desc, void *data, int flag)
845 struct lustre_handle lockh;
849 case LDLM_CB_BLOCKING:
850 ldlm_lock2handle(lock, &lockh);
851 rc = ldlm_cli_cancel(&lockh, LCF_ASYNC);
853 CDEBUG(D_INODE, "ldlm_cli_cancel: %d\n", rc);
857 case LDLM_CB_CANCELING:
865 * When setting a lease on a file, we take ownership of the lli_mds_*_och
866 * and save it as fd->fd_och so as to force client to reopen the file even
867 * if it has an open lock in cache already.
869 static int ll_lease_och_acquire(struct inode *inode, struct file *file,
870 struct lustre_handle *old_handle)
872 struct ll_inode_info *lli = ll_i2info(inode);
873 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
874 struct obd_client_handle **och_p;
879 /* Get the openhandle of the file */
880 mutex_lock(&lli->lli_och_mutex);
881 if (fd->fd_lease_och != NULL)
882 GOTO(out_unlock, rc = -EBUSY);
884 if (fd->fd_och == NULL) {
885 if (file->f_mode & FMODE_WRITE) {
886 LASSERT(lli->lli_mds_write_och != NULL);
887 och_p = &lli->lli_mds_write_och;
888 och_usecount = &lli->lli_open_fd_write_count;
890 LASSERT(lli->lli_mds_read_och != NULL);
891 och_p = &lli->lli_mds_read_och;
892 och_usecount = &lli->lli_open_fd_read_count;
895 if (*och_usecount > 1)
896 GOTO(out_unlock, rc = -EBUSY);
903 *old_handle = fd->fd_och->och_fh;
907 mutex_unlock(&lli->lli_och_mutex);
912 * Release ownership on lli_mds_*_och when putting back a file lease.
914 static int ll_lease_och_release(struct inode *inode, struct file *file)
916 struct ll_inode_info *lli = ll_i2info(inode);
917 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
918 struct obd_client_handle **och_p;
919 struct obd_client_handle *old_och = NULL;
924 mutex_lock(&lli->lli_och_mutex);
925 if (file->f_mode & FMODE_WRITE) {
926 och_p = &lli->lli_mds_write_och;
927 och_usecount = &lli->lli_open_fd_write_count;
929 och_p = &lli->lli_mds_read_och;
930 och_usecount = &lli->lli_open_fd_read_count;
933 /* The file may have been open by another process (broken lease) so
934 * *och_p is not NULL. In this case we should simply increase usecount
937 if (*och_p != NULL) {
938 old_och = fd->fd_och;
945 mutex_unlock(&lli->lli_och_mutex);
948 rc = ll_close_inode_openhandle(inode, old_och, 0, NULL);
954 * Acquire a lease and open the file.
956 static struct obd_client_handle *
957 ll_lease_open(struct inode *inode, struct file *file, fmode_t fmode,
960 struct lookup_intent it = { .it_op = IT_OPEN };
961 struct ll_sb_info *sbi = ll_i2sbi(inode);
962 struct md_op_data *op_data;
963 struct ptlrpc_request *req = NULL;
964 struct lustre_handle old_handle = { 0 };
965 struct obd_client_handle *och = NULL;
970 if (fmode != FMODE_WRITE && fmode != FMODE_READ)
971 RETURN(ERR_PTR(-EINVAL));
974 if (!(fmode & file->f_mode) || (file->f_mode & FMODE_EXEC))
975 RETURN(ERR_PTR(-EPERM));
977 rc = ll_lease_och_acquire(inode, file, &old_handle);
984 RETURN(ERR_PTR(-ENOMEM));
986 op_data = ll_prep_md_op_data(NULL, inode, inode, NULL, 0, 0,
987 LUSTRE_OPC_ANY, NULL);
989 GOTO(out, rc = PTR_ERR(op_data));
991 /* To tell the MDT this openhandle is from the same owner */
992 op_data->op_handle = old_handle;
994 it.it_flags = fmode | open_flags;
995 it.it_flags |= MDS_OPEN_LOCK | MDS_OPEN_BY_FID | MDS_OPEN_LEASE;
996 rc = md_intent_lock(sbi->ll_md_exp, op_data, &it, &req,
997 &ll_md_blocking_lease_ast,
998 /* LDLM_FL_NO_LRU: To not put the lease lock into LRU list, otherwise
999 * it can be cancelled which may mislead applications that the lease is
1001 * LDLM_FL_EXCL: Set this flag so that it won't be matched by normal
1002 * open in ll_md_blocking_ast(). Otherwise as ll_md_blocking_lease_ast
1003 * doesn't deal with openhandle, so normal openhandle will be leaked. */
1004 LDLM_FL_NO_LRU | LDLM_FL_EXCL);
1005 ll_finish_md_op_data(op_data);
1006 ptlrpc_req_finished(req);
1008 GOTO(out_release_it, rc);
1010 if (it_disposition(&it, DISP_LOOKUP_NEG))
1011 GOTO(out_release_it, rc = -ENOENT);
1013 rc = it_open_error(DISP_OPEN_OPEN, &it);
1015 GOTO(out_release_it, rc);
1017 LASSERT(it_disposition(&it, DISP_ENQ_OPEN_REF));
1018 ll_och_fill(sbi->ll_md_exp, &it, och);
1020 if (!it_disposition(&it, DISP_OPEN_LEASE)) /* old server? */
1021 GOTO(out_close, rc = -EOPNOTSUPP);
1023 /* already get lease, handle lease lock */
1024 ll_set_lock_data(sbi->ll_md_exp, inode, &it, NULL);
1025 if (it.it_lock_mode == 0 ||
1026 it.it_lock_bits != MDS_INODELOCK_OPEN) {
1027 /* open lock must return for lease */
1028 CERROR(DFID "lease granted but no open lock, %d/%llu.\n",
1029 PFID(ll_inode2fid(inode)), it.it_lock_mode,
1031 GOTO(out_close, rc = -EPROTO);
1034 ll_intent_release(&it);
1038 /* Cancel open lock */
1039 if (it.it_lock_mode != 0) {
1040 ldlm_lock_decref_and_cancel(&och->och_lease_handle,
1042 it.it_lock_mode = 0;
1043 och->och_lease_handle.cookie = 0ULL;
1045 rc2 = ll_close_inode_openhandle(inode, och, 0, NULL);
1047 CERROR("%s: error closing file "DFID": %d\n",
1048 ll_get_fsname(inode->i_sb, NULL, 0),
1049 PFID(&ll_i2info(inode)->lli_fid), rc2);
1050 och = NULL; /* och has been freed in ll_close_inode_openhandle() */
1052 ll_intent_release(&it);
1056 RETURN(ERR_PTR(rc));
1060 * Check whether a layout swap can be done between two inodes.
1062 * \param[in] inode1 First inode to check
1063 * \param[in] inode2 Second inode to check
1065 * \retval 0 on success, layout swap can be performed between both inodes
1066 * \retval negative error code if requirements are not met
1068 static int ll_check_swap_layouts_validity(struct inode *inode1,
1069 struct inode *inode2)
1071 if (!S_ISREG(inode1->i_mode) || !S_ISREG(inode2->i_mode))
1074 if (inode_permission(inode1, MAY_WRITE) ||
1075 inode_permission(inode2, MAY_WRITE))
1078 if (inode1->i_sb != inode2->i_sb)
1084 static int ll_swap_layouts_close(struct obd_client_handle *och,
1085 struct inode *inode, struct inode *inode2)
1087 const struct lu_fid *fid1 = ll_inode2fid(inode);
1088 const struct lu_fid *fid2;
1092 CDEBUG(D_INODE, "%s: biased close of file "DFID"\n",
1093 ll_get_fsname(inode->i_sb, NULL, 0), PFID(fid1));
1095 rc = ll_check_swap_layouts_validity(inode, inode2);
1097 GOTO(out_free_och, rc);
1099 /* We now know that inode2 is a lustre inode */
1100 fid2 = ll_inode2fid(inode2);
1102 rc = lu_fid_cmp(fid1, fid2);
1104 GOTO(out_free_och, rc = -EINVAL);
1106 /* Close the file and {swap,merge} layouts between inode & inode2.
1107 * NB: lease lock handle is released in mdc_close_layout_swap_pack()
1108 * because we still need it to pack l_remote_handle to MDT. */
1109 rc = ll_close_inode_openhandle(inode, och, MDS_CLOSE_LAYOUT_SWAP,
1112 och = NULL; /* freed in ll_close_inode_openhandle() */
1122 * Release lease and close the file.
1123 * It will check if the lease has ever broken.
1125 static int ll_lease_close_intent(struct obd_client_handle *och,
1126 struct inode *inode,
1127 bool *lease_broken, enum mds_op_bias bias,
1130 struct ldlm_lock *lock;
1131 bool cancelled = true;
1135 lock = ldlm_handle2lock(&och->och_lease_handle);
1137 lock_res_and_lock(lock);
1138 cancelled = ldlm_is_cancel(lock);
1139 unlock_res_and_lock(lock);
1140 LDLM_LOCK_PUT(lock);
1143 CDEBUG(D_INODE, "lease for "DFID" broken? %d, bias: %x\n",
1144 PFID(&ll_i2info(inode)->lli_fid), cancelled, bias);
1146 if (lease_broken != NULL)
1147 *lease_broken = cancelled;
1149 if (!cancelled && !bias)
1150 ldlm_cli_cancel(&och->och_lease_handle, 0);
1152 if (cancelled) { /* no need to excute intent */
1157 rc = ll_close_inode_openhandle(inode, och, bias, data);
1161 static int ll_lease_close(struct obd_client_handle *och, struct inode *inode,
1164 return ll_lease_close_intent(och, inode, lease_broken, 0, NULL);
1168 * After lease is taken, send the RPC MDS_REINT_RESYNC to the MDT
1170 static int ll_lease_file_resync(struct obd_client_handle *och,
1171 struct inode *inode)
1173 struct ll_sb_info *sbi = ll_i2sbi(inode);
1174 struct md_op_data *op_data;
1175 __u64 data_version_unused;
1179 op_data = ll_prep_md_op_data(NULL, inode, NULL, NULL, 0, 0,
1180 LUSTRE_OPC_ANY, NULL);
1181 if (IS_ERR(op_data))
1182 RETURN(PTR_ERR(op_data));
1184 /* before starting file resync, it's necessary to clean up page cache
1185 * in client memory, otherwise once the layout version is increased,
1186 * writing back cached data will be denied the OSTs. */
1187 rc = ll_data_version(inode, &data_version_unused, LL_DV_WR_FLUSH);
1191 op_data->op_handle = och->och_lease_handle;
1192 rc = md_file_resync(sbi->ll_md_exp, op_data);
1198 ll_finish_md_op_data(op_data);
1202 int ll_merge_attr(const struct lu_env *env, struct inode *inode)
1204 struct ll_inode_info *lli = ll_i2info(inode);
1205 struct cl_object *obj = lli->lli_clob;
1206 struct cl_attr *attr = vvp_env_thread_attr(env);
1214 ll_inode_size_lock(inode);
1216 /* Merge timestamps the most recently obtained from MDS with
1217 * timestamps obtained from OSTs.
1219 * Do not overwrite atime of inode because it may be refreshed
1220 * by file_accessed() function. If the read was served by cache
1221 * data, there is no RPC to be sent so that atime may not be
1222 * transferred to OSTs at all. MDT only updates atime at close time
1223 * if it's at least 'mdd.*.atime_diff' older.
1224 * All in all, the atime in Lustre does not strictly comply with
1225 * POSIX. Solving this problem needs to send an RPC to MDT for each
1226 * read, this will hurt performance. */
1227 if (LTIME_S(inode->i_atime) < lli->lli_atime || lli->lli_update_atime) {
1228 LTIME_S(inode->i_atime) = lli->lli_atime;
1229 lli->lli_update_atime = 0;
1231 LTIME_S(inode->i_mtime) = lli->lli_mtime;
1232 LTIME_S(inode->i_ctime) = lli->lli_ctime;
1234 atime = LTIME_S(inode->i_atime);
1235 mtime = LTIME_S(inode->i_mtime);
1236 ctime = LTIME_S(inode->i_ctime);
1238 cl_object_attr_lock(obj);
1239 if (OBD_FAIL_CHECK(OBD_FAIL_MDC_MERGE))
1242 rc = cl_object_attr_get(env, obj, attr);
1243 cl_object_attr_unlock(obj);
1246 GOTO(out_size_unlock, rc = (rc == -ENODATA ? 0 : rc));
1248 if (atime < attr->cat_atime)
1249 atime = attr->cat_atime;
1251 if (ctime < attr->cat_ctime)
1252 ctime = attr->cat_ctime;
1254 if (mtime < attr->cat_mtime)
1255 mtime = attr->cat_mtime;
1257 CDEBUG(D_VFSTRACE, DFID" updating i_size %llu\n",
1258 PFID(&lli->lli_fid), attr->cat_size);
1260 i_size_write(inode, attr->cat_size);
1261 inode->i_blocks = attr->cat_blocks;
1263 LTIME_S(inode->i_atime) = atime;
1264 LTIME_S(inode->i_mtime) = mtime;
1265 LTIME_S(inode->i_ctime) = ctime;
1268 ll_inode_size_unlock(inode);
1274 * Set designated mirror for I/O.
1276 * So far only read, write, and truncated can support to issue I/O to
1277 * designated mirror.
1279 void ll_io_set_mirror(struct cl_io *io, const struct file *file)
1281 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
1283 /* clear layout version for generic(non-resync) I/O in case it carries
1284 * stale layout version due to I/O restart */
1285 io->ci_layout_version = 0;
1287 /* FLR: disable non-delay for designated mirror I/O because obviously
1288 * only one mirror is available */
1289 if (fd->fd_designated_mirror > 0) {
1291 io->ci_designated_mirror = fd->fd_designated_mirror;
1292 io->ci_layout_version = fd->fd_layout_version;
1293 io->ci_pio = 0; /* doesn't have a mechanism to pass mirror
1297 CDEBUG(D_VFSTRACE, "%s: desiginated mirror: %d\n",
1298 file->f_path.dentry->d_name.name, io->ci_designated_mirror);
1301 static bool file_is_noatime(const struct file *file)
1303 const struct vfsmount *mnt = file->f_path.mnt;
1304 const struct inode *inode = file_inode((struct file *)file);
1306 /* Adapted from file_accessed() and touch_atime().*/
1307 if (file->f_flags & O_NOATIME)
1310 if (inode->i_flags & S_NOATIME)
1313 if (IS_NOATIME(inode))
1316 if (mnt->mnt_flags & (MNT_NOATIME | MNT_READONLY))
1319 if ((mnt->mnt_flags & MNT_NODIRATIME) && S_ISDIR(inode->i_mode))
1322 if ((inode->i_sb->s_flags & MS_NODIRATIME) && S_ISDIR(inode->i_mode))
1328 static int ll_file_io_ptask(struct cfs_ptask *ptask);
1330 static void ll_io_init(struct cl_io *io, struct file *file, enum cl_io_type iot)
1332 struct inode *inode = file_inode(file);
1333 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
1335 memset(&io->u.ci_rw.rw_iter, 0, sizeof(io->u.ci_rw.rw_iter));
1336 init_sync_kiocb(&io->u.ci_rw.rw_iocb, file);
1337 io->u.ci_rw.rw_file = file;
1338 io->u.ci_rw.rw_ptask = ll_file_io_ptask;
1339 io->u.ci_rw.rw_nonblock = !!(file->f_flags & O_NONBLOCK);
1340 io->ci_lock_no_expand = fd->ll_lock_no_expand;
1342 if (iot == CIT_WRITE) {
1343 io->u.ci_rw.rw_append = !!(file->f_flags & O_APPEND);
1344 io->u.ci_rw.rw_sync = !!(file->f_flags & O_SYNC ||
1345 file->f_flags & O_DIRECT ||
1348 io->ci_obj = ll_i2info(inode)->lli_clob;
1349 io->ci_lockreq = CILR_MAYBE;
1350 if (ll_file_nolock(file)) {
1351 io->ci_lockreq = CILR_NEVER;
1352 io->ci_no_srvlock = 1;
1353 } else if (file->f_flags & O_APPEND) {
1354 io->ci_lockreq = CILR_MANDATORY;
1356 io->ci_noatime = file_is_noatime(file);
1357 if (ll_i2sbi(inode)->ll_flags & LL_SBI_PIO)
1358 io->ci_pio = !io->u.ci_rw.rw_append;
1362 /* FLR: only use non-delay I/O for read as there is only one
1363 * avaliable mirror for write. */
1364 io->ci_ndelay = !(iot == CIT_WRITE);
1366 ll_io_set_mirror(io, file);
1369 static int ll_file_io_ptask(struct cfs_ptask *ptask)
1371 struct cl_io_pt *pt = ptask->pt_cbdata;
1372 struct file *file = pt->cip_file;
1375 loff_t pos = pt->cip_pos;
1380 CDEBUG(D_VFSTRACE, "%s: %s range: [%llu, %llu)\n",
1381 file_dentry(file)->d_name.name,
1382 pt->cip_iot == CIT_READ ? "read" : "write",
1383 pos, pos + pt->cip_count);
1385 env = cl_env_get(&refcheck);
1387 RETURN(PTR_ERR(env));
1389 io = vvp_env_thread_io(env);
1390 ll_io_init(io, file, pt->cip_iot);
1391 io->u.ci_rw.rw_iter = pt->cip_iter;
1392 io->u.ci_rw.rw_iocb = pt->cip_iocb;
1393 io->ci_pio = 0; /* It's already in parallel task */
1395 rc = cl_io_rw_init(env, io, pt->cip_iot, pos,
1396 pt->cip_count - pt->cip_result);
1398 struct vvp_io *vio = vvp_env_io(env);
1400 vio->vui_io_subtype = IO_NORMAL;
1401 vio->vui_fd = LUSTRE_FPRIVATE(file);
1403 ll_cl_add(file, env, io, LCC_RW);
1404 rc = cl_io_loop(env, io);
1405 ll_cl_remove(file, env);
1407 /* cl_io_rw_init() handled IO */
1411 if (OBD_FAIL_CHECK_RESET(OBD_FAIL_LLITE_PTASK_IO_FAIL, 0)) {
1417 if (io->ci_nob > 0) {
1418 pt->cip_result += io->ci_nob;
1419 iov_iter_advance(&pt->cip_iter, io->ci_nob);
1421 pt->cip_iocb.ki_pos = pos;
1422 #ifdef HAVE_KIOCB_KI_LEFT
1423 pt->cip_iocb.ki_left = pt->cip_count - pt->cip_result;
1424 #elif defined(HAVE_KI_NBYTES)
1425 pt->cip_iocb.ki_nbytes = pt->cip_count - pt->cip_result;
1429 cl_io_fini(env, io);
1430 cl_env_put(env, &refcheck);
1432 pt->cip_need_restart = io->ci_need_restart;
1434 CDEBUG(D_VFSTRACE, "%s: %s ret: %zd, rc: %d\n",
1435 file_dentry(file)->d_name.name,
1436 pt->cip_iot == CIT_READ ? "read" : "write",
1437 pt->cip_result, rc);
1439 RETURN(pt->cip_result > 0 ? 0 : rc);
1443 ll_file_io_generic(const struct lu_env *env, struct vvp_io_args *args,
1444 struct file *file, enum cl_io_type iot,
1445 loff_t *ppos, size_t count)
1447 struct range_lock range;
1448 struct vvp_io *vio = vvp_env_io(env);
1449 struct inode *inode = file_inode(file);
1450 struct ll_inode_info *lli = ll_i2info(inode);
1451 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
1456 unsigned retried = 0;
1457 bool restarted = false;
1461 CDEBUG(D_VFSTRACE, "%s: %s range: [%llu, %llu)\n",
1462 file_dentry(file)->d_name.name,
1463 iot == CIT_READ ? "read" : "write", pos, pos + count);
1466 io = vvp_env_thread_io(env);
1467 ll_io_init(io, file, iot);
1468 if (args->via_io_subtype == IO_NORMAL) {
1469 io->u.ci_rw.rw_iter = *args->u.normal.via_iter;
1470 io->u.ci_rw.rw_iocb = *args->u.normal.via_iocb;
1472 if (args->via_io_subtype != IO_NORMAL || restarted)
1474 io->ci_ndelay_tried = retried;
1476 if (cl_io_rw_init(env, io, iot, pos, count) == 0) {
1477 bool range_locked = false;
1479 if (file->f_flags & O_APPEND)
1480 range_lock_init(&range, 0, LUSTRE_EOF);
1482 range_lock_init(&range, pos, pos + count - 1);
1484 vio->vui_fd = LUSTRE_FPRIVATE(file);
1485 vio->vui_io_subtype = args->via_io_subtype;
1487 switch (vio->vui_io_subtype) {
1489 /* Direct IO reads must also take range lock,
1490 * or multiple reads will try to work on the same pages
1491 * See LU-6227 for details. */
1492 if (((iot == CIT_WRITE) ||
1493 (iot == CIT_READ && (file->f_flags & O_DIRECT))) &&
1494 !(vio->vui_fd->fd_flags & LL_FILE_GROUP_LOCKED)) {
1495 CDEBUG(D_VFSTRACE, "Range lock "RL_FMT"\n",
1497 rc = range_lock(&lli->lli_write_tree, &range);
1501 range_locked = true;
1505 vio->u.splice.vui_pipe = args->u.splice.via_pipe;
1506 vio->u.splice.vui_flags = args->u.splice.via_flags;
1509 CERROR("unknown IO subtype %u\n", vio->vui_io_subtype);
1513 ll_cl_add(file, env, io, LCC_RW);
1514 if (io->ci_pio && iot == CIT_WRITE && !IS_NOSEC(inode) &&
1515 !lli->lli_inode_locked) {
1517 lli->lli_inode_locked = 1;
1519 rc = cl_io_loop(env, io);
1520 if (lli->lli_inode_locked) {
1521 lli->lli_inode_locked = 0;
1522 inode_unlock(inode);
1524 ll_cl_remove(file, env);
1527 CDEBUG(D_VFSTRACE, "Range unlock "RL_FMT"\n",
1529 range_unlock(&lli->lli_write_tree, &range);
1532 /* cl_io_rw_init() handled IO */
1536 if (io->ci_nob > 0) {
1537 result += io->ci_nob;
1538 count -= io->ci_nob;
1540 if (args->via_io_subtype == IO_NORMAL) {
1541 iov_iter_advance(args->u.normal.via_iter, io->ci_nob);
1543 /* CLIO is too complicated. See LU-11069. */
1544 if (cl_io_is_append(io))
1545 pos = io->u.ci_rw.rw_iocb.ki_pos;
1549 args->u.normal.via_iocb->ki_pos = pos;
1550 #ifdef HAVE_KIOCB_KI_LEFT
1551 args->u.normal.via_iocb->ki_left = count;
1552 #elif defined(HAVE_KI_NBYTES)
1553 args->u.normal.via_iocb->ki_nbytes = count;
1557 pos = io->u.ci_rw.rw_range.cir_pos;
1561 cl_io_fini(env, io);
1564 "%s: %d io complete with rc: %d, result: %zd, restart: %d\n",
1565 file->f_path.dentry->d_name.name,
1566 iot, rc, result, io->ci_need_restart);
1568 if ((rc == 0 || rc == -ENODATA) && count > 0 && io->ci_need_restart) {
1570 "%s: restart %s range: [%llu, %llu) ret: %zd, rc: %d\n",
1571 file_dentry(file)->d_name.name,
1572 iot == CIT_READ ? "read" : "write",
1573 pos, pos + count, result, rc);
1574 /* preserve the tried count for FLR */
1575 retried = io->ci_ndelay_tried;
1580 if (iot == CIT_READ) {
1582 ll_stats_ops_tally(ll_i2sbi(inode),
1583 LPROC_LL_READ_BYTES, result);
1584 } else if (iot == CIT_WRITE) {
1586 ll_stats_ops_tally(ll_i2sbi(inode),
1587 LPROC_LL_WRITE_BYTES, result);
1588 fd->fd_write_failed = false;
1589 } else if (result == 0 && rc == 0) {
1592 fd->fd_write_failed = true;
1594 fd->fd_write_failed = false;
1595 } else if (rc != -ERESTARTSYS) {
1596 fd->fd_write_failed = true;
1600 CDEBUG(D_VFSTRACE, "%s: %s *ppos: %llu, pos: %llu, ret: %zd, rc: %d\n",
1601 file_dentry(file)->d_name.name,
1602 iot == CIT_READ ? "read" : "write", *ppos, pos, result, rc);
1606 RETURN(result > 0 ? result : rc);
1610 * The purpose of fast read is to overcome per I/O overhead and improve IOPS
1611 * especially for small I/O.
1613 * To serve a read request, CLIO has to create and initialize a cl_io and
1614 * then request DLM lock. This has turned out to have siginificant overhead
1615 * and affects the performance of small I/O dramatically.
1617 * It's not necessary to create a cl_io for each I/O. Under the help of read
1618 * ahead, most of the pages being read are already in memory cache and we can
1619 * read those pages directly because if the pages exist, the corresponding DLM
1620 * lock must exist so that page content must be valid.
1622 * In fast read implementation, the llite speculatively finds and reads pages
1623 * in memory cache. There are three scenarios for fast read:
1624 * - If the page exists and is uptodate, kernel VM will provide the data and
1625 * CLIO won't be intervened;
1626 * - If the page was brought into memory by read ahead, it will be exported
1627 * and read ahead parameters will be updated;
1628 * - Otherwise the page is not in memory, we can't do fast read. Therefore,
1629 * it will go back and invoke normal read, i.e., a cl_io will be created
1630 * and DLM lock will be requested.
1632 * POSIX compliance: posix standard states that read is intended to be atomic.
1633 * Lustre read implementation is in line with Linux kernel read implementation
1634 * and neither of them complies with POSIX standard in this matter. Fast read
1635 * doesn't make the situation worse on single node but it may interleave write
1636 * results from multiple nodes due to short read handling in ll_file_aio_read().
1638 * \param env - lu_env
1639 * \param iocb - kiocb from kernel
1640 * \param iter - user space buffers where the data will be copied
1642 * \retval - number of bytes have been read, or error code if error occurred.
1645 ll_do_fast_read(struct kiocb *iocb, struct iov_iter *iter)
1649 if (!ll_sbi_has_fast_read(ll_i2sbi(file_inode(iocb->ki_filp))))
1652 /* NB: we can't do direct IO for fast read because it will need a lock
1653 * to make IO engine happy. */
1654 if (iocb->ki_filp->f_flags & O_DIRECT)
1657 result = generic_file_read_iter(iocb, iter);
1659 /* If the first page is not in cache, generic_file_aio_read() will be
1660 * returned with -ENODATA.
1661 * See corresponding code in ll_readpage(). */
1662 if (result == -ENODATA)
1666 ll_stats_ops_tally(ll_i2sbi(file_inode(iocb->ki_filp)),
1667 LPROC_LL_READ_BYTES, result);
1673 * Read from a file (through the page cache).
1675 static ssize_t ll_file_read_iter(struct kiocb *iocb, struct iov_iter *to)
1678 struct vvp_io_args *args;
1683 result = ll_do_fast_read(iocb, to);
1684 if (result < 0 || iov_iter_count(to) == 0)
1687 env = cl_env_get(&refcheck);
1689 return PTR_ERR(env);
1691 args = ll_env_args(env, IO_NORMAL);
1692 args->u.normal.via_iter = to;
1693 args->u.normal.via_iocb = iocb;
1695 rc2 = ll_file_io_generic(env, args, iocb->ki_filp, CIT_READ,
1696 &iocb->ki_pos, iov_iter_count(to));
1699 else if (result == 0)
1702 cl_env_put(env, &refcheck);
1708 * Similar trick to ll_do_fast_read, this improves write speed for tiny writes.
1709 * If a page is already in the page cache and dirty (and some other things -
1710 * See ll_tiny_write_begin for the instantiation of these rules), then we can
1711 * write to it without doing a full I/O, because Lustre already knows about it
1712 * and will write it out. This saves a lot of processing time.
1714 * All writes here are within one page, so exclusion is handled by the page
1715 * lock on the vm page. We do not do tiny writes for writes which touch
1716 * multiple pages because it's very unlikely multiple sequential pages are
1717 * are already dirty.
1719 * We limit these to < PAGE_SIZE because PAGE_SIZE writes are relatively common
1720 * and are unlikely to be to already dirty pages.
1722 * Attribute updates are important here, we do them in ll_tiny_write_end.
1724 static ssize_t ll_do_tiny_write(struct kiocb *iocb, struct iov_iter *iter)
1726 ssize_t count = iov_iter_count(iter);
1727 struct file *file = iocb->ki_filp;
1728 struct inode *inode = file_inode(file);
1733 /* Restrict writes to single page and < PAGE_SIZE. See comment at top
1734 * of function for why.
1736 if (count >= PAGE_SIZE ||
1737 (iocb->ki_pos & (PAGE_SIZE-1)) + count > PAGE_SIZE)
1740 result = __generic_file_write_iter(iocb, iter);
1742 /* If the page is not already dirty, ll_tiny_write_begin returns
1743 * -ENODATA. We continue on to normal write.
1745 if (result == -ENODATA)
1749 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_WRITE_BYTES,
1751 ll_file_set_flag(ll_i2info(inode), LLIF_DATA_MODIFIED);
1754 CDEBUG(D_VFSTRACE, "result: %zu, original count %zu\n", result, count);
1760 * Write to a file (through the page cache).
1762 static ssize_t ll_file_write_iter(struct kiocb *iocb, struct iov_iter *from)
1764 struct vvp_io_args *args;
1766 ssize_t rc_tiny = 0, rc_normal;
1771 /* NB: we can't do direct IO for tiny writes because they use the page
1772 * cache, we can't do sync writes because tiny writes can't flush
1773 * pages, and we can't do append writes because we can't guarantee the
1774 * required DLM locks are held to protect file size.
1776 if (ll_sbi_has_tiny_write(ll_i2sbi(file_inode(iocb->ki_filp))) &&
1777 !(iocb->ki_filp->f_flags & (O_DIRECT | O_SYNC | O_APPEND)))
1778 rc_tiny = ll_do_tiny_write(iocb, from);
1780 /* In case of error, go on and try normal write - Only stop if tiny
1781 * write completed I/O.
1783 if (iov_iter_count(from) == 0)
1784 GOTO(out, rc_normal = rc_tiny);
1786 env = cl_env_get(&refcheck);
1788 return PTR_ERR(env);
1790 args = ll_env_args(env, IO_NORMAL);
1791 args->u.normal.via_iter = from;
1792 args->u.normal.via_iocb = iocb;
1794 rc_normal = ll_file_io_generic(env, args, iocb->ki_filp, CIT_WRITE,
1795 &iocb->ki_pos, iov_iter_count(from));
1797 /* On success, combine bytes written. */
1798 if (rc_tiny >= 0 && rc_normal > 0)
1799 rc_normal += rc_tiny;
1800 /* On error, only return error from normal write if tiny write did not
1801 * write any bytes. Otherwise return bytes written by tiny write.
1803 else if (rc_tiny > 0)
1804 rc_normal = rc_tiny;
1806 cl_env_put(env, &refcheck);
1811 #ifndef HAVE_FILE_OPERATIONS_READ_WRITE_ITER
1813 * XXX: exact copy from kernel code (__generic_file_aio_write_nolock)
1815 static int ll_file_get_iov_count(const struct iovec *iov,
1816 unsigned long *nr_segs, size_t *count)
1821 for (seg = 0; seg < *nr_segs; seg++) {
1822 const struct iovec *iv = &iov[seg];
1825 * If any segment has a negative length, or the cumulative
1826 * length ever wraps negative then return -EINVAL.
1829 if (unlikely((ssize_t)(cnt|iv->iov_len) < 0))
1831 if (access_ok(VERIFY_READ, iv->iov_base, iv->iov_len))
1836 cnt -= iv->iov_len; /* This segment is no good */
1843 static ssize_t ll_file_aio_read(struct kiocb *iocb, const struct iovec *iov,
1844 unsigned long nr_segs, loff_t pos)
1851 result = ll_file_get_iov_count(iov, &nr_segs, &iov_count);
1855 # ifdef HAVE_IOV_ITER_INIT_DIRECTION
1856 iov_iter_init(&to, READ, iov, nr_segs, iov_count);
1857 # else /* !HAVE_IOV_ITER_INIT_DIRECTION */
1858 iov_iter_init(&to, iov, nr_segs, iov_count, 0);
1859 # endif /* HAVE_IOV_ITER_INIT_DIRECTION */
1861 result = ll_file_read_iter(iocb, &to);
1866 static ssize_t ll_file_read(struct file *file, char __user *buf, size_t count,
1869 struct iovec iov = { .iov_base = buf, .iov_len = count };
1874 init_sync_kiocb(&kiocb, file);
1875 kiocb.ki_pos = *ppos;
1876 #ifdef HAVE_KIOCB_KI_LEFT
1877 kiocb.ki_left = count;
1878 #elif defined(HAVE_KI_NBYTES)
1879 kiocb.i_nbytes = count;
1882 result = ll_file_aio_read(&kiocb, &iov, 1, kiocb.ki_pos);
1883 *ppos = kiocb.ki_pos;
1889 * Write to a file (through the page cache).
1892 static ssize_t ll_file_aio_write(struct kiocb *iocb, const struct iovec *iov,
1893 unsigned long nr_segs, loff_t pos)
1895 struct iov_iter from;
1900 result = ll_file_get_iov_count(iov, &nr_segs, &iov_count);
1904 # ifdef HAVE_IOV_ITER_INIT_DIRECTION
1905 iov_iter_init(&from, WRITE, iov, nr_segs, iov_count);
1906 # else /* !HAVE_IOV_ITER_INIT_DIRECTION */
1907 iov_iter_init(&from, iov, nr_segs, iov_count, 0);
1908 # endif /* HAVE_IOV_ITER_INIT_DIRECTION */
1910 result = ll_file_write_iter(iocb, &from);
1915 static ssize_t ll_file_write(struct file *file, const char __user *buf,
1916 size_t count, loff_t *ppos)
1918 struct iovec iov = { .iov_base = (void __user *)buf,
1925 init_sync_kiocb(&kiocb, file);
1926 kiocb.ki_pos = *ppos;
1927 #ifdef HAVE_KIOCB_KI_LEFT
1928 kiocb.ki_left = count;
1929 #elif defined(HAVE_KI_NBYTES)
1930 kiocb.ki_nbytes = count;
1933 result = ll_file_aio_write(&kiocb, &iov, 1, kiocb.ki_pos);
1934 *ppos = kiocb.ki_pos;
1938 #endif /* !HAVE_FILE_OPERATIONS_READ_WRITE_ITER */
1941 * Send file content (through pagecache) somewhere with helper
1943 static ssize_t ll_file_splice_read(struct file *in_file, loff_t *ppos,
1944 struct pipe_inode_info *pipe, size_t count,
1948 struct vvp_io_args *args;
1953 env = cl_env_get(&refcheck);
1955 RETURN(PTR_ERR(env));
1957 args = ll_env_args(env, IO_SPLICE);
1958 args->u.splice.via_pipe = pipe;
1959 args->u.splice.via_flags = flags;
1961 result = ll_file_io_generic(env, args, in_file, CIT_READ, ppos, count);
1962 cl_env_put(env, &refcheck);
1966 int ll_lov_setstripe_ea_info(struct inode *inode, struct dentry *dentry,
1967 __u64 flags, struct lov_user_md *lum, int lum_size)
1969 struct lookup_intent oit = {
1971 .it_flags = flags | MDS_OPEN_BY_FID,
1976 ll_inode_size_lock(inode);
1977 rc = ll_intent_file_open(dentry, lum, lum_size, &oit);
1979 GOTO(out_unlock, rc);
1981 ll_release_openhandle(dentry, &oit);
1984 ll_inode_size_unlock(inode);
1985 ll_intent_release(&oit);
1990 int ll_lov_getstripe_ea_info(struct inode *inode, const char *filename,
1991 struct lov_mds_md **lmmp, int *lmm_size,
1992 struct ptlrpc_request **request)
1994 struct ll_sb_info *sbi = ll_i2sbi(inode);
1995 struct mdt_body *body;
1996 struct lov_mds_md *lmm = NULL;
1997 struct ptlrpc_request *req = NULL;
1998 struct md_op_data *op_data;
2001 rc = ll_get_default_mdsize(sbi, &lmmsize);
2005 op_data = ll_prep_md_op_data(NULL, inode, NULL, filename,
2006 strlen(filename), lmmsize,
2007 LUSTRE_OPC_ANY, NULL);
2008 if (IS_ERR(op_data))
2009 RETURN(PTR_ERR(op_data));
2011 op_data->op_valid = OBD_MD_FLEASIZE | OBD_MD_FLDIREA;
2012 rc = md_getattr_name(sbi->ll_md_exp, op_data, &req);
2013 ll_finish_md_op_data(op_data);
2015 CDEBUG(D_INFO, "md_getattr_name failed "
2016 "on %s: rc %d\n", filename, rc);
2020 body = req_capsule_server_get(&req->rq_pill, &RMF_MDT_BODY);
2021 LASSERT(body != NULL); /* checked by mdc_getattr_name */
2023 lmmsize = body->mbo_eadatasize;
2025 if (!(body->mbo_valid & (OBD_MD_FLEASIZE | OBD_MD_FLDIREA)) ||
2027 GOTO(out, rc = -ENODATA);
2030 lmm = req_capsule_server_sized_get(&req->rq_pill, &RMF_MDT_MD, lmmsize);
2031 LASSERT(lmm != NULL);
2033 if (lmm->lmm_magic != cpu_to_le32(LOV_MAGIC_V1) &&
2034 lmm->lmm_magic != cpu_to_le32(LOV_MAGIC_V3) &&
2035 lmm->lmm_magic != cpu_to_le32(LOV_MAGIC_COMP_V1))
2036 GOTO(out, rc = -EPROTO);
2039 * This is coming from the MDS, so is probably in
2040 * little endian. We convert it to host endian before
2041 * passing it to userspace.
2043 if (LOV_MAGIC != cpu_to_le32(LOV_MAGIC)) {
2046 if (lmm->lmm_magic == cpu_to_le32(LOV_MAGIC_V1) ||
2047 lmm->lmm_magic == cpu_to_le32(LOV_MAGIC_V3)) {
2048 stripe_count = le16_to_cpu(lmm->lmm_stripe_count);
2049 if (le32_to_cpu(lmm->lmm_pattern) &
2050 LOV_PATTERN_F_RELEASED)
2054 /* if function called for directory - we should
2055 * avoid swab not existent lsm objects */
2056 if (lmm->lmm_magic == cpu_to_le32(LOV_MAGIC_V1)) {
2057 lustre_swab_lov_user_md_v1(
2058 (struct lov_user_md_v1 *)lmm);
2059 if (S_ISREG(body->mbo_mode))
2060 lustre_swab_lov_user_md_objects(
2061 ((struct lov_user_md_v1 *)lmm)->lmm_objects,
2063 } else if (lmm->lmm_magic == cpu_to_le32(LOV_MAGIC_V3)) {
2064 lustre_swab_lov_user_md_v3(
2065 (struct lov_user_md_v3 *)lmm);
2066 if (S_ISREG(body->mbo_mode))
2067 lustre_swab_lov_user_md_objects(
2068 ((struct lov_user_md_v3 *)lmm)->lmm_objects,
2070 } else if (lmm->lmm_magic ==
2071 cpu_to_le32(LOV_MAGIC_COMP_V1)) {
2072 lustre_swab_lov_comp_md_v1(
2073 (struct lov_comp_md_v1 *)lmm);
2079 *lmm_size = lmmsize;
2084 static int ll_lov_setea(struct inode *inode, struct file *file,
2087 __u64 flags = MDS_OPEN_HAS_OBJS | FMODE_WRITE;
2088 struct lov_user_md *lump;
2089 int lum_size = sizeof(struct lov_user_md) +
2090 sizeof(struct lov_user_ost_data);
2094 if (!cfs_capable(CFS_CAP_SYS_ADMIN))
2097 OBD_ALLOC_LARGE(lump, lum_size);
2101 if (copy_from_user(lump, arg, lum_size))
2102 GOTO(out_lump, rc = -EFAULT);
2104 rc = ll_lov_setstripe_ea_info(inode, file_dentry(file), flags, lump,
2106 cl_lov_delay_create_clear(&file->f_flags);
2109 OBD_FREE_LARGE(lump, lum_size);
2113 static int ll_file_getstripe(struct inode *inode, void __user *lum, size_t size)
2120 env = cl_env_get(&refcheck);
2122 RETURN(PTR_ERR(env));
2124 rc = cl_object_getstripe(env, ll_i2info(inode)->lli_clob, lum, size);
2125 cl_env_put(env, &refcheck);
2129 static int ll_lov_setstripe(struct inode *inode, struct file *file,
2132 struct lov_user_md __user *lum = (struct lov_user_md __user *)arg;
2133 struct lov_user_md *klum;
2135 __u64 flags = FMODE_WRITE;
2138 rc = ll_copy_user_md(lum, &klum);
2143 rc = ll_lov_setstripe_ea_info(inode, file_dentry(file), flags, klum,
2148 rc = put_user(0, &lum->lmm_stripe_count);
2152 rc = ll_layout_refresh(inode, &gen);
2156 rc = ll_file_getstripe(inode, arg, lum_size);
2158 cl_lov_delay_create_clear(&file->f_flags);
2161 OBD_FREE(klum, lum_size);
2166 ll_get_grouplock(struct inode *inode, struct file *file, unsigned long arg)
2168 struct ll_inode_info *lli = ll_i2info(inode);
2169 struct cl_object *obj = lli->lli_clob;
2170 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
2171 struct ll_grouplock grouplock;
2176 CWARN("group id for group lock must not be 0\n");
2180 if (ll_file_nolock(file))
2181 RETURN(-EOPNOTSUPP);
2183 spin_lock(&lli->lli_lock);
2184 if (fd->fd_flags & LL_FILE_GROUP_LOCKED) {
2185 CWARN("group lock already existed with gid %lu\n",
2186 fd->fd_grouplock.lg_gid);
2187 spin_unlock(&lli->lli_lock);
2190 LASSERT(fd->fd_grouplock.lg_lock == NULL);
2191 spin_unlock(&lli->lli_lock);
2194 * XXX: group lock needs to protect all OST objects while PFL
2195 * can add new OST objects during the IO, so we'd instantiate
2196 * all OST objects before getting its group lock.
2201 struct cl_layout cl = {
2202 .cl_is_composite = false,
2204 struct lu_extent ext = {
2206 .e_end = OBD_OBJECT_EOF,
2209 env = cl_env_get(&refcheck);
2211 RETURN(PTR_ERR(env));
2213 rc = cl_object_layout_get(env, obj, &cl);
2214 if (!rc && cl.cl_is_composite)
2215 rc = ll_layout_write_intent(inode, LAYOUT_INTENT_WRITE,
2218 cl_env_put(env, &refcheck);
2223 rc = cl_get_grouplock(ll_i2info(inode)->lli_clob,
2224 arg, (file->f_flags & O_NONBLOCK), &grouplock);
2228 spin_lock(&lli->lli_lock);
2229 if (fd->fd_flags & LL_FILE_GROUP_LOCKED) {
2230 spin_unlock(&lli->lli_lock);
2231 CERROR("another thread just won the race\n");
2232 cl_put_grouplock(&grouplock);
2236 fd->fd_flags |= LL_FILE_GROUP_LOCKED;
2237 fd->fd_grouplock = grouplock;
2238 spin_unlock(&lli->lli_lock);
2240 CDEBUG(D_INFO, "group lock %lu obtained\n", arg);
2244 static int ll_put_grouplock(struct inode *inode, struct file *file,
2247 struct ll_inode_info *lli = ll_i2info(inode);
2248 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
2249 struct ll_grouplock grouplock;
2252 spin_lock(&lli->lli_lock);
2253 if (!(fd->fd_flags & LL_FILE_GROUP_LOCKED)) {
2254 spin_unlock(&lli->lli_lock);
2255 CWARN("no group lock held\n");
2259 LASSERT(fd->fd_grouplock.lg_lock != NULL);
2261 if (fd->fd_grouplock.lg_gid != arg) {
2262 CWARN("group lock %lu doesn't match current id %lu\n",
2263 arg, fd->fd_grouplock.lg_gid);
2264 spin_unlock(&lli->lli_lock);
2268 grouplock = fd->fd_grouplock;
2269 memset(&fd->fd_grouplock, 0, sizeof(fd->fd_grouplock));
2270 fd->fd_flags &= ~LL_FILE_GROUP_LOCKED;
2271 spin_unlock(&lli->lli_lock);
2273 cl_put_grouplock(&grouplock);
2274 CDEBUG(D_INFO, "group lock %lu released\n", arg);
2279 * Close inode open handle
2281 * \param dentry [in] dentry which contains the inode
2282 * \param it [in,out] intent which contains open info and result
2285 * \retval <0 failure
2287 int ll_release_openhandle(struct dentry *dentry, struct lookup_intent *it)
2289 struct inode *inode = dentry->d_inode;
2290 struct obd_client_handle *och;
2296 /* Root ? Do nothing. */
2297 if (dentry->d_inode->i_sb->s_root == dentry)
2300 /* No open handle to close? Move away */
2301 if (!it_disposition(it, DISP_OPEN_OPEN))
2304 LASSERT(it_open_error(DISP_OPEN_OPEN, it) == 0);
2306 OBD_ALLOC(och, sizeof(*och));
2308 GOTO(out, rc = -ENOMEM);
2310 ll_och_fill(ll_i2sbi(inode)->ll_md_exp, it, och);
2312 rc = ll_close_inode_openhandle(inode, och, 0, NULL);
2314 /* this one is in place of ll_file_open */
2315 if (it_disposition(it, DISP_ENQ_OPEN_REF)) {
2316 ptlrpc_req_finished(it->it_request);
2317 it_clear_disposition(it, DISP_ENQ_OPEN_REF);
2323 * Get size for inode for which FIEMAP mapping is requested.
2324 * Make the FIEMAP get_info call and returns the result.
2325 * \param fiemap kernel buffer to hold extens
2326 * \param num_bytes kernel buffer size
2328 static int ll_do_fiemap(struct inode *inode, struct fiemap *fiemap,
2334 struct ll_fiemap_info_key fmkey = { .lfik_name = KEY_FIEMAP, };
2337 /* Checks for fiemap flags */
2338 if (fiemap->fm_flags & ~LUSTRE_FIEMAP_FLAGS_COMPAT) {
2339 fiemap->fm_flags &= ~LUSTRE_FIEMAP_FLAGS_COMPAT;
2343 /* Check for FIEMAP_FLAG_SYNC */
2344 if (fiemap->fm_flags & FIEMAP_FLAG_SYNC) {
2345 rc = filemap_fdatawrite(inode->i_mapping);
2350 env = cl_env_get(&refcheck);
2352 RETURN(PTR_ERR(env));
2354 if (i_size_read(inode) == 0) {
2355 rc = ll_glimpse_size(inode);
2360 fmkey.lfik_oa.o_valid = OBD_MD_FLID | OBD_MD_FLGROUP;
2361 obdo_from_inode(&fmkey.lfik_oa, inode, OBD_MD_FLSIZE);
2362 obdo_set_parent_fid(&fmkey.lfik_oa, &ll_i2info(inode)->lli_fid);
2364 /* If filesize is 0, then there would be no objects for mapping */
2365 if (fmkey.lfik_oa.o_size == 0) {
2366 fiemap->fm_mapped_extents = 0;
2370 fmkey.lfik_fiemap = *fiemap;
2372 rc = cl_object_fiemap(env, ll_i2info(inode)->lli_clob,
2373 &fmkey, fiemap, &num_bytes);
2375 cl_env_put(env, &refcheck);
2379 int ll_fid2path(struct inode *inode, void __user *arg)
2381 struct obd_export *exp = ll_i2mdexp(inode);
2382 const struct getinfo_fid2path __user *gfin = arg;
2384 struct getinfo_fid2path *gfout;
2390 if (!cfs_capable(CFS_CAP_DAC_READ_SEARCH) &&
2391 !(ll_i2sbi(inode)->ll_flags & LL_SBI_USER_FID2PATH))
2394 /* Only need to get the buflen */
2395 if (get_user(pathlen, &gfin->gf_pathlen))
2398 if (pathlen > PATH_MAX)
2401 outsize = sizeof(*gfout) + pathlen;
2402 OBD_ALLOC(gfout, outsize);
2406 if (copy_from_user(gfout, arg, sizeof(*gfout)))
2407 GOTO(gf_free, rc = -EFAULT);
2408 /* append root FID after gfout to let MDT know the root FID so that it
2409 * can lookup the correct path, this is mainly for fileset.
2410 * old server without fileset mount support will ignore this. */
2411 *gfout->gf_u.gf_root_fid = *ll_inode2fid(inode);
2413 /* Call mdc_iocontrol */
2414 rc = obd_iocontrol(OBD_IOC_FID2PATH, exp, outsize, gfout, NULL);
2418 if (copy_to_user(arg, gfout, outsize))
2422 OBD_FREE(gfout, outsize);
2427 ll_ioc_data_version(struct inode *inode, struct ioc_data_version *ioc)
2429 struct cl_object *obj = ll_i2info(inode)->lli_clob;
2437 ioc->idv_version = 0;
2438 ioc->idv_layout_version = UINT_MAX;
2440 /* If no file object initialized, we consider its version is 0. */
2444 env = cl_env_get(&refcheck);
2446 RETURN(PTR_ERR(env));
2448 io = vvp_env_thread_io(env);
2450 io->u.ci_data_version.dv_data_version = 0;
2451 io->u.ci_data_version.dv_layout_version = UINT_MAX;
2452 io->u.ci_data_version.dv_flags = ioc->idv_flags;
2455 if (cl_io_init(env, io, CIT_DATA_VERSION, io->ci_obj) == 0)
2456 result = cl_io_loop(env, io);
2458 result = io->ci_result;
2460 ioc->idv_version = io->u.ci_data_version.dv_data_version;
2461 ioc->idv_layout_version = io->u.ci_data_version.dv_layout_version;
2463 cl_io_fini(env, io);
2465 if (unlikely(io->ci_need_restart))
2468 cl_env_put(env, &refcheck);
2474 * Read the data_version for inode.
2476 * This value is computed using stripe object version on OST.
2477 * Version is computed using server side locking.
2479 * @param flags if do sync on the OST side;
2481 * LL_DV_RD_FLUSH: flush dirty pages, LCK_PR on OSTs
2482 * LL_DV_WR_FLUSH: drop all caching pages, LCK_PW on OSTs
2484 int ll_data_version(struct inode *inode, __u64 *data_version, int flags)
2486 struct ioc_data_version ioc = { .idv_flags = flags };
2489 rc = ll_ioc_data_version(inode, &ioc);
2491 *data_version = ioc.idv_version;
2497 * Trigger a HSM release request for the provided inode.
2499 int ll_hsm_release(struct inode *inode)
2502 struct obd_client_handle *och = NULL;
2503 __u64 data_version = 0;
2508 CDEBUG(D_INODE, "%s: Releasing file "DFID".\n",
2509 ll_get_fsname(inode->i_sb, NULL, 0),
2510 PFID(&ll_i2info(inode)->lli_fid));
2512 och = ll_lease_open(inode, NULL, FMODE_WRITE, MDS_OPEN_RELEASE);
2514 GOTO(out, rc = PTR_ERR(och));
2516 /* Grab latest data_version and [am]time values */
2517 rc = ll_data_version(inode, &data_version, LL_DV_WR_FLUSH);
2521 env = cl_env_get(&refcheck);
2523 GOTO(out, rc = PTR_ERR(env));
2525 rc = ll_merge_attr(env, inode);
2526 cl_env_put(env, &refcheck);
2528 /* If error happen, we have the wrong size for a file.
2534 /* Release the file.
2535 * NB: lease lock handle is released in mdc_hsm_release_pack() because
2536 * we still need it to pack l_remote_handle to MDT. */
2537 rc = ll_close_inode_openhandle(inode, och, MDS_HSM_RELEASE,
2543 if (och != NULL && !IS_ERR(och)) /* close the file */
2544 ll_lease_close(och, inode, NULL);
2549 struct ll_swap_stack {
2552 struct inode *inode1;
2553 struct inode *inode2;
2558 static int ll_swap_layouts(struct file *file1, struct file *file2,
2559 struct lustre_swap_layouts *lsl)
2561 struct mdc_swap_layouts msl;
2562 struct md_op_data *op_data;
2565 struct ll_swap_stack *llss = NULL;
2568 OBD_ALLOC_PTR(llss);
2572 llss->inode1 = file_inode(file1);
2573 llss->inode2 = file_inode(file2);
2575 rc = ll_check_swap_layouts_validity(llss->inode1, llss->inode2);
2579 /* we use 2 bool because it is easier to swap than 2 bits */
2580 if (lsl->sl_flags & SWAP_LAYOUTS_CHECK_DV1)
2581 llss->check_dv1 = true;
2583 if (lsl->sl_flags & SWAP_LAYOUTS_CHECK_DV2)
2584 llss->check_dv2 = true;
2586 /* we cannot use lsl->sl_dvX directly because we may swap them */
2587 llss->dv1 = lsl->sl_dv1;
2588 llss->dv2 = lsl->sl_dv2;
2590 rc = lu_fid_cmp(ll_inode2fid(llss->inode1), ll_inode2fid(llss->inode2));
2591 if (rc == 0) /* same file, done! */
2594 if (rc < 0) { /* sequentialize it */
2595 swap(llss->inode1, llss->inode2);
2597 swap(llss->dv1, llss->dv2);
2598 swap(llss->check_dv1, llss->check_dv2);
2602 if (gid != 0) { /* application asks to flush dirty cache */
2603 rc = ll_get_grouplock(llss->inode1, file1, gid);
2607 rc = ll_get_grouplock(llss->inode2, file2, gid);
2609 ll_put_grouplock(llss->inode1, file1, gid);
2614 /* ultimate check, before swaping the layouts we check if
2615 * dataversion has changed (if requested) */
2616 if (llss->check_dv1) {
2617 rc = ll_data_version(llss->inode1, &dv, 0);
2620 if (dv != llss->dv1)
2621 GOTO(putgl, rc = -EAGAIN);
2624 if (llss->check_dv2) {
2625 rc = ll_data_version(llss->inode2, &dv, 0);
2628 if (dv != llss->dv2)
2629 GOTO(putgl, rc = -EAGAIN);
2632 /* struct md_op_data is used to send the swap args to the mdt
2633 * only flags is missing, so we use struct mdc_swap_layouts
2634 * through the md_op_data->op_data */
2635 /* flags from user space have to be converted before they are send to
2636 * server, no flag is sent today, they are only used on the client */
2639 op_data = ll_prep_md_op_data(NULL, llss->inode1, llss->inode2, NULL, 0,
2640 0, LUSTRE_OPC_ANY, &msl);
2641 if (IS_ERR(op_data))
2642 GOTO(free, rc = PTR_ERR(op_data));
2644 rc = obd_iocontrol(LL_IOC_LOV_SWAP_LAYOUTS, ll_i2mdexp(llss->inode1),
2645 sizeof(*op_data), op_data, NULL);
2646 ll_finish_md_op_data(op_data);
2653 ll_put_grouplock(llss->inode2, file2, gid);
2654 ll_put_grouplock(llss->inode1, file1, gid);
2664 int ll_hsm_state_set(struct inode *inode, struct hsm_state_set *hss)
2666 struct md_op_data *op_data;
2670 /* Detect out-of range masks */
2671 if ((hss->hss_setmask | hss->hss_clearmask) & ~HSM_FLAGS_MASK)
2674 /* Non-root users are forbidden to set or clear flags which are
2675 * NOT defined in HSM_USER_MASK. */
2676 if (((hss->hss_setmask | hss->hss_clearmask) & ~HSM_USER_MASK) &&
2677 !cfs_capable(CFS_CAP_SYS_ADMIN))
2680 /* Detect out-of range archive id */
2681 if ((hss->hss_valid & HSS_ARCHIVE_ID) &&
2682 (hss->hss_archive_id > LL_HSM_MAX_ARCHIVE))
2685 op_data = ll_prep_md_op_data(NULL, inode, NULL, NULL, 0, 0,
2686 LUSTRE_OPC_ANY, hss);
2687 if (IS_ERR(op_data))
2688 RETURN(PTR_ERR(op_data));
2690 rc = obd_iocontrol(LL_IOC_HSM_STATE_SET, ll_i2mdexp(inode),
2691 sizeof(*op_data), op_data, NULL);
2693 ll_finish_md_op_data(op_data);
2698 static int ll_hsm_import(struct inode *inode, struct file *file,
2699 struct hsm_user_import *hui)
2701 struct hsm_state_set *hss = NULL;
2702 struct iattr *attr = NULL;
2706 if (!S_ISREG(inode->i_mode))
2712 GOTO(out, rc = -ENOMEM);
2714 hss->hss_valid = HSS_SETMASK | HSS_ARCHIVE_ID;
2715 hss->hss_archive_id = hui->hui_archive_id;
2716 hss->hss_setmask = HS_ARCHIVED | HS_EXISTS | HS_RELEASED;
2717 rc = ll_hsm_state_set(inode, hss);
2721 OBD_ALLOC_PTR(attr);
2723 GOTO(out, rc = -ENOMEM);
2725 attr->ia_mode = hui->hui_mode & (S_IRWXU | S_IRWXG | S_IRWXO);
2726 attr->ia_mode |= S_IFREG;
2727 attr->ia_uid = make_kuid(&init_user_ns, hui->hui_uid);
2728 attr->ia_gid = make_kgid(&init_user_ns, hui->hui_gid);
2729 attr->ia_size = hui->hui_size;
2730 attr->ia_mtime.tv_sec = hui->hui_mtime;
2731 attr->ia_mtime.tv_nsec = hui->hui_mtime_ns;
2732 attr->ia_atime.tv_sec = hui->hui_atime;
2733 attr->ia_atime.tv_nsec = hui->hui_atime_ns;
2735 attr->ia_valid = ATTR_SIZE | ATTR_MODE | ATTR_FORCE |
2736 ATTR_UID | ATTR_GID |
2737 ATTR_MTIME | ATTR_MTIME_SET |
2738 ATTR_ATIME | ATTR_ATIME_SET;
2742 rc = ll_setattr_raw(file_dentry(file), attr, true);
2746 inode_unlock(inode);
2758 static inline long ll_lease_type_from_fmode(fmode_t fmode)
2760 return ((fmode & FMODE_READ) ? LL_LEASE_RDLCK : 0) |
2761 ((fmode & FMODE_WRITE) ? LL_LEASE_WRLCK : 0);
2764 static int ll_file_futimes_3(struct file *file, const struct ll_futimes_3 *lfu)
2766 struct inode *inode = file_inode(file);
2768 .ia_valid = ATTR_ATIME | ATTR_ATIME_SET |
2769 ATTR_MTIME | ATTR_MTIME_SET |
2770 ATTR_CTIME | ATTR_CTIME_SET,
2772 .tv_sec = lfu->lfu_atime_sec,
2773 .tv_nsec = lfu->lfu_atime_nsec,
2776 .tv_sec = lfu->lfu_mtime_sec,
2777 .tv_nsec = lfu->lfu_mtime_nsec,
2780 .tv_sec = lfu->lfu_ctime_sec,
2781 .tv_nsec = lfu->lfu_ctime_nsec,
2787 if (!capable(CAP_SYS_ADMIN))
2790 if (!S_ISREG(inode->i_mode))
2794 rc = ll_setattr_raw(file_dentry(file), &ia, false);
2795 inode_unlock(inode);
2800 static enum cl_lock_mode cl_mode_user_to_kernel(enum lock_mode_user mode)
2803 case MODE_READ_USER:
2805 case MODE_WRITE_USER:
2812 static const char *const user_lockname[] = LOCK_MODE_NAMES;
2814 /* Used to allow the upper layers of the client to request an LDLM lock
2815 * without doing an actual read or write.
2817 * Used for ladvise lockahead to manually request specific locks.
2819 * \param[in] file file this ladvise lock request is on
2820 * \param[in] ladvise ladvise struct describing this lock request
2822 * \retval 0 success, no detailed result available (sync requests
2823 * and requests sent to the server [not handled locally]
2824 * cannot return detailed results)
2825 * \retval LLA_RESULT_{SAME,DIFFERENT} - detailed result of the lock request,
2826 * see definitions for details.
2827 * \retval negative negative errno on error
2829 int ll_file_lock_ahead(struct file *file, struct llapi_lu_ladvise *ladvise)
2831 struct lu_env *env = NULL;
2832 struct cl_io *io = NULL;
2833 struct cl_lock *lock = NULL;
2834 struct cl_lock_descr *descr = NULL;
2835 struct dentry *dentry = file->f_path.dentry;
2836 struct inode *inode = dentry->d_inode;
2837 enum cl_lock_mode cl_mode;
2838 off_t start = ladvise->lla_start;
2839 off_t end = ladvise->lla_end;
2845 CDEBUG(D_VFSTRACE, "Lock request: file=%.*s, inode=%p, mode=%s "
2846 "start=%llu, end=%llu\n", dentry->d_name.len,
2847 dentry->d_name.name, dentry->d_inode,
2848 user_lockname[ladvise->lla_lockahead_mode], (__u64) start,
2851 cl_mode = cl_mode_user_to_kernel(ladvise->lla_lockahead_mode);
2853 GOTO(out, result = cl_mode);
2855 /* Get IO environment */
2856 result = cl_io_get(inode, &env, &io, &refcheck);
2860 result = cl_io_init(env, io, CIT_MISC, io->ci_obj);
2863 * nothing to do for this io. This currently happens when
2864 * stripe sub-object's are not yet created.
2866 result = io->ci_result;
2867 } else if (result == 0) {
2868 lock = vvp_env_lock(env);
2869 descr = &lock->cll_descr;
2871 descr->cld_obj = io->ci_obj;
2872 /* Convert byte offsets to pages */
2873 descr->cld_start = cl_index(io->ci_obj, start);
2874 descr->cld_end = cl_index(io->ci_obj, end);
2875 descr->cld_mode = cl_mode;
2876 /* CEF_MUST is used because we do not want to convert a
2877 * lockahead request to a lockless lock */
2878 descr->cld_enq_flags = CEF_MUST | CEF_LOCK_NO_EXPAND |
2881 if (ladvise->lla_peradvice_flags & LF_ASYNC)
2882 descr->cld_enq_flags |= CEF_SPECULATIVE;
2884 result = cl_lock_request(env, io, lock);
2886 /* On success, we need to release the lock */
2888 cl_lock_release(env, lock);
2890 cl_io_fini(env, io);
2891 cl_env_put(env, &refcheck);
2893 /* -ECANCELED indicates a matching lock with a different extent
2894 * was already present, and -EEXIST indicates a matching lock
2895 * on exactly the same extent was already present.
2896 * We convert them to positive values for userspace to make
2897 * recognizing true errors easier.
2898 * Note we can only return these detailed results on async requests,
2899 * as sync requests look the same as i/o requests for locking. */
2900 if (result == -ECANCELED)
2901 result = LLA_RESULT_DIFFERENT;
2902 else if (result == -EEXIST)
2903 result = LLA_RESULT_SAME;
2908 static const char *const ladvise_names[] = LU_LADVISE_NAMES;
2910 static int ll_ladvise_sanity(struct inode *inode,
2911 struct llapi_lu_ladvise *ladvise)
2913 enum lu_ladvise_type advice = ladvise->lla_advice;
2914 /* Note the peradvice flags is a 32 bit field, so per advice flags must
2915 * be in the first 32 bits of enum ladvise_flags */
2916 __u32 flags = ladvise->lla_peradvice_flags;
2917 /* 3 lines at 80 characters per line, should be plenty */
2920 if (advice > LU_LADVISE_MAX || advice == LU_LADVISE_INVALID) {
2922 CDEBUG(D_VFSTRACE, "%s: advice with value '%d' not recognized,"
2923 "last supported advice is %s (value '%d'): rc = %d\n",
2924 ll_get_fsname(inode->i_sb, NULL, 0), advice,
2925 ladvise_names[LU_LADVISE_MAX-1], LU_LADVISE_MAX-1, rc);
2929 /* Per-advice checks */
2931 case LU_LADVISE_LOCKNOEXPAND:
2932 if (flags & ~LF_LOCKNOEXPAND_MASK) {
2934 CDEBUG(D_VFSTRACE, "%s: Invalid flags (%x) for %s: "
2936 ll_get_fsname(inode->i_sb, NULL, 0), flags,
2937 ladvise_names[advice], rc);
2941 case LU_LADVISE_LOCKAHEAD:
2942 /* Currently only READ and WRITE modes can be requested */
2943 if (ladvise->lla_lockahead_mode >= MODE_MAX_USER ||
2944 ladvise->lla_lockahead_mode == 0) {
2946 CDEBUG(D_VFSTRACE, "%s: Invalid mode (%d) for %s: "
2948 ll_get_fsname(inode->i_sb, NULL, 0),
2949 ladvise->lla_lockahead_mode,
2950 ladvise_names[advice], rc);
2953 case LU_LADVISE_WILLREAD:
2954 case LU_LADVISE_DONTNEED:
2956 /* Note fall through above - These checks apply to all advices
2957 * except LOCKNOEXPAND */
2958 if (flags & ~LF_DEFAULT_MASK) {
2960 CDEBUG(D_VFSTRACE, "%s: Invalid flags (%x) for %s: "
2962 ll_get_fsname(inode->i_sb, NULL, 0), flags,
2963 ladvise_names[advice], rc);
2966 if (ladvise->lla_start >= ladvise->lla_end) {
2968 CDEBUG(D_VFSTRACE, "%s: Invalid range (%llu to %llu) "
2969 "for %s: rc = %d\n",
2970 ll_get_fsname(inode->i_sb, NULL, 0),
2971 ladvise->lla_start, ladvise->lla_end,
2972 ladvise_names[advice], rc);
2984 * Give file access advices
2986 * The ladvise interface is similar to Linux fadvise() system call, except it
2987 * forwards the advices directly from Lustre client to server. The server side
2988 * codes will apply appropriate read-ahead and caching techniques for the
2989 * corresponding files.
2991 * A typical workload for ladvise is e.g. a bunch of different clients are
2992 * doing small random reads of a file, so prefetching pages into OSS cache
2993 * with big linear reads before the random IO is a net benefit. Fetching
2994 * all that data into each client cache with fadvise() may not be, due to
2995 * much more data being sent to the client.
2997 static int ll_ladvise(struct inode *inode, struct file *file, __u64 flags,
2998 struct llapi_lu_ladvise *ladvise)
3002 struct cl_ladvise_io *lio;
3007 env = cl_env_get(&refcheck);
3009 RETURN(PTR_ERR(env));
3011 io = vvp_env_thread_io(env);
3012 io->ci_obj = ll_i2info(inode)->lli_clob;
3014 /* initialize parameters for ladvise */
3015 lio = &io->u.ci_ladvise;
3016 lio->li_start = ladvise->lla_start;
3017 lio->li_end = ladvise->lla_end;
3018 lio->li_fid = ll_inode2fid(inode);
3019 lio->li_advice = ladvise->lla_advice;
3020 lio->li_flags = flags;
3022 if (cl_io_init(env, io, CIT_LADVISE, io->ci_obj) == 0)
3023 rc = cl_io_loop(env, io);
3027 cl_io_fini(env, io);
3028 cl_env_put(env, &refcheck);
3032 static int ll_lock_noexpand(struct file *file, int flags)
3034 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
3036 fd->ll_lock_no_expand = !(flags & LF_UNSET);
3041 int ll_ioctl_fsgetxattr(struct inode *inode, unsigned int cmd,
3044 struct fsxattr fsxattr;
3046 if (copy_from_user(&fsxattr,
3047 (const struct fsxattr __user *)arg,
3051 fsxattr.fsx_xflags = ll_inode_flags_to_xflags(inode->i_flags);
3052 if (ll_file_test_flag(ll_i2info(inode), LLIF_PROJECT_INHERIT))
3053 fsxattr.fsx_xflags |= FS_XFLAG_PROJINHERIT;
3054 fsxattr.fsx_projid = ll_i2info(inode)->lli_projid;
3055 if (copy_to_user((struct fsxattr __user *)arg,
3056 &fsxattr, sizeof(fsxattr)))
3062 int ll_ioctl_fssetxattr(struct inode *inode, unsigned int cmd,
3066 struct md_op_data *op_data;
3067 struct ptlrpc_request *req = NULL;
3069 struct fsxattr fsxattr;
3070 struct cl_object *obj;
3073 /* only root could change project ID */
3074 if (!cfs_capable(CFS_CAP_SYS_ADMIN))
3077 op_data = ll_prep_md_op_data(NULL, inode, NULL, NULL, 0, 0,
3078 LUSTRE_OPC_ANY, NULL);
3079 if (IS_ERR(op_data))
3080 RETURN(PTR_ERR(op_data));
3082 if (copy_from_user(&fsxattr,
3083 (const struct fsxattr __user *)arg,
3085 GOTO(out_fsxattr1, rc = -EFAULT);
3087 flags = ll_xflags_to_inode_flags(fsxattr.fsx_xflags);
3088 op_data->op_attr_flags = ll_inode_to_ext_flags(flags);
3089 if (fsxattr.fsx_xflags & FS_XFLAG_PROJINHERIT)
3090 op_data->op_attr_flags |= LUSTRE_PROJINHERIT_FL;
3091 op_data->op_projid = fsxattr.fsx_projid;
3092 op_data->op_attr.ia_valid |= (MDS_ATTR_PROJID | ATTR_ATTR_FLAG);
3093 rc = md_setattr(ll_i2sbi(inode)->ll_md_exp, op_data, NULL,
3095 ptlrpc_req_finished(req);
3097 obj = ll_i2info(inode)->lli_clob;
3101 ll_update_inode_flags(inode, op_data->op_attr_flags);
3102 OBD_ALLOC_PTR(attr);
3104 GOTO(out_fsxattr1, rc = -ENOMEM);
3105 attr->ia_valid = ATTR_ATTR_FLAG;
3106 rc = cl_setattr_ost(obj, attr, fsxattr.fsx_xflags);
3111 ll_finish_md_op_data(op_data);
3115 static long ll_file_unlock_lease(struct file *file, struct ll_ioc_lease *ioc,
3118 struct inode *inode = file_inode(file);
3119 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
3120 struct ll_inode_info *lli = ll_i2info(inode);
3121 struct obd_client_handle *och = NULL;
3122 struct split_param sp;
3125 enum mds_op_bias bias = 0;
3126 struct file *layout_file = NULL;
3128 size_t data_size = 0;
3132 mutex_lock(&lli->lli_och_mutex);
3133 if (fd->fd_lease_och != NULL) {
3134 och = fd->fd_lease_och;
3135 fd->fd_lease_och = NULL;
3137 mutex_unlock(&lli->lli_och_mutex);
3140 GOTO(out, rc = -ENOLCK);
3142 fmode = och->och_flags;
3144 switch (ioc->lil_flags) {
3145 case LL_LEASE_RESYNC_DONE:
3146 if (ioc->lil_count > IOC_IDS_MAX)
3147 GOTO(out, rc = -EINVAL);
3149 data_size = offsetof(typeof(*ioc), lil_ids[ioc->lil_count]);
3150 OBD_ALLOC(data, data_size);
3152 GOTO(out, rc = -ENOMEM);
3154 if (copy_from_user(data, (void __user *)arg, data_size))
3155 GOTO(out, rc = -EFAULT);
3157 bias = MDS_CLOSE_RESYNC_DONE;
3159 case LL_LEASE_LAYOUT_MERGE: {
3162 if (ioc->lil_count != 1)
3163 GOTO(out, rc = -EINVAL);
3165 arg += sizeof(*ioc);
3166 if (copy_from_user(&fd, (void __user *)arg, sizeof(__u32)))
3167 GOTO(out, rc = -EFAULT);
3169 layout_file = fget(fd);
3171 GOTO(out, rc = -EBADF);
3173 if ((file->f_flags & O_ACCMODE) == O_RDONLY ||
3174 (layout_file->f_flags & O_ACCMODE) == O_RDONLY)
3175 GOTO(out, rc = -EPERM);
3177 data = file_inode(layout_file);
3178 bias = MDS_CLOSE_LAYOUT_MERGE;
3181 case LL_LEASE_LAYOUT_SPLIT: {
3185 if (ioc->lil_count != 2)
3186 GOTO(out, rc = -EINVAL);
3188 arg += sizeof(*ioc);
3189 if (copy_from_user(&fdv, (void __user *)arg, sizeof(__u32)))
3190 GOTO(out, rc = -EFAULT);
3192 arg += sizeof(__u32);
3193 if (copy_from_user(&mirror_id, (void __user *)arg,
3195 GOTO(out, rc = -EFAULT);
3197 layout_file = fget(fdv);
3199 GOTO(out, rc = -EBADF);
3201 sp.sp_inode = file_inode(layout_file);
3202 sp.sp_mirror_id = (__u16)mirror_id;
3204 bias = MDS_CLOSE_LAYOUT_SPLIT;
3208 /* without close intent */
3212 rc = ll_lease_close_intent(och, inode, &lease_broken, bias, data);
3216 rc = ll_lease_och_release(inode, file);
3225 switch (ioc->lil_flags) {
3226 case LL_LEASE_RESYNC_DONE:
3228 OBD_FREE(data, data_size);
3230 case LL_LEASE_LAYOUT_MERGE:
3231 case LL_LEASE_LAYOUT_SPLIT:
3238 rc = ll_lease_type_from_fmode(fmode);
3242 static long ll_file_set_lease(struct file *file, struct ll_ioc_lease *ioc,
3245 struct inode *inode = file_inode(file);
3246 struct ll_inode_info *lli = ll_i2info(inode);
3247 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
3248 struct obd_client_handle *och = NULL;
3249 __u64 open_flags = 0;
3255 switch (ioc->lil_mode) {
3256 case LL_LEASE_WRLCK:
3257 if (!(file->f_mode & FMODE_WRITE))
3259 fmode = FMODE_WRITE;
3261 case LL_LEASE_RDLCK:
3262 if (!(file->f_mode & FMODE_READ))
3266 case LL_LEASE_UNLCK:
3267 RETURN(ll_file_unlock_lease(file, ioc, arg));
3272 CDEBUG(D_INODE, "Set lease with mode %u\n", fmode);
3274 /* apply for lease */
3275 if (ioc->lil_flags & LL_LEASE_RESYNC)
3276 open_flags = MDS_OPEN_RESYNC;
3277 och = ll_lease_open(inode, file, fmode, open_flags);
3279 RETURN(PTR_ERR(och));
3281 if (ioc->lil_flags & LL_LEASE_RESYNC) {
3282 rc = ll_lease_file_resync(och, inode);
3284 ll_lease_close(och, inode, NULL);
3287 rc = ll_layout_refresh(inode, &fd->fd_layout_version);
3289 ll_lease_close(och, inode, NULL);
3295 mutex_lock(&lli->lli_och_mutex);
3296 if (fd->fd_lease_och == NULL) {
3297 fd->fd_lease_och = och;
3300 mutex_unlock(&lli->lli_och_mutex);
3302 /* impossible now that only excl is supported for now */
3303 ll_lease_close(och, inode, &lease_broken);
3310 ll_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
3312 struct inode *inode = file_inode(file);
3313 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
3317 CDEBUG(D_VFSTRACE, "VFS Op:inode="DFID"(%p), cmd=%x\n",
3318 PFID(ll_inode2fid(inode)), inode, cmd);
3319 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_IOCTL, 1);
3321 /* asm-ppc{,64} declares TCGETS, et. al. as type 't' not 'T' */
3322 if (_IOC_TYPE(cmd) == 'T' || _IOC_TYPE(cmd) == 't') /* tty ioctls */
3326 case LL_IOC_GETFLAGS:
3327 /* Get the current value of the file flags */
3328 return put_user(fd->fd_flags, (int __user *)arg);
3329 case LL_IOC_SETFLAGS:
3330 case LL_IOC_CLRFLAGS:
3331 /* Set or clear specific file flags */
3332 /* XXX This probably needs checks to ensure the flags are
3333 * not abused, and to handle any flag side effects.
3335 if (get_user(flags, (int __user *) arg))
3338 if (cmd == LL_IOC_SETFLAGS) {
3339 if ((flags & LL_FILE_IGNORE_LOCK) &&
3340 !(file->f_flags & O_DIRECT)) {
3341 CERROR("%s: unable to disable locking on "
3342 "non-O_DIRECT file\n", current->comm);
3346 fd->fd_flags |= flags;
3348 fd->fd_flags &= ~flags;
3351 case LL_IOC_LOV_SETSTRIPE:
3352 case LL_IOC_LOV_SETSTRIPE_NEW: