4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License version 2 for more details (a copy is included
14 * in the LICENSE file that accompanied this code).
16 * You should have received a copy of the GNU General Public License
17 * version 2 along with this program; If not, see
18 * http://www.sun.com/software/products/lustre/docs/GPLv2.pdf
20 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
21 * CA 95054 USA or visit www.sun.com if you need additional information or
27 * Copyright (c) 2002, 2010, Oracle and/or its affiliates. All rights reserved.
28 * Use is subject to license terms.
30 * Copyright (c) 2011, 2012, Intel Corporation.
33 * This file is part of Lustre, http://www.lustre.org/
34 * Lustre is a trademark of Sun Microsystems, Inc.
38 * Author: Peter Braam <braam@clusterfs.com>
39 * Author: Phil Schwan <phil@clusterfs.com>
40 * Author: Andreas Dilger <adilger@clusterfs.com>
43 #define DEBUG_SUBSYSTEM S_LLITE
44 #include <lustre_dlm.h>
45 #include <lustre_lite.h>
46 #include <linux/pagemap.h>
47 #include <linux/file.h>
48 #include "llite_internal.h"
49 #include <lustre/ll_fiemap.h>
51 #include "cl_object.h"
53 struct ll_file_data *ll_file_data_get(void)
55 struct ll_file_data *fd;
57 OBD_SLAB_ALLOC_PTR_GFP(fd, ll_file_data_slab, CFS_ALLOC_IO);
58 fd->fd_write_failed = false;
62 static void ll_file_data_put(struct ll_file_data *fd)
65 OBD_SLAB_FREE_PTR(fd, ll_file_data_slab);
68 void ll_pack_inode2opdata(struct inode *inode, struct md_op_data *op_data,
69 struct lustre_handle *fh)
71 op_data->op_fid1 = ll_i2info(inode)->lli_fid;
72 op_data->op_attr.ia_mode = inode->i_mode;
73 op_data->op_attr.ia_atime = inode->i_atime;
74 op_data->op_attr.ia_mtime = inode->i_mtime;
75 op_data->op_attr.ia_ctime = inode->i_ctime;
76 op_data->op_attr.ia_size = i_size_read(inode);
77 op_data->op_attr_blocks = inode->i_blocks;
78 ((struct ll_iattr *)&op_data->op_attr)->ia_attr_flags =
79 ll_inode_to_ext_flags(inode->i_flags);
80 op_data->op_ioepoch = ll_i2info(inode)->lli_ioepoch;
82 op_data->op_handle = *fh;
83 op_data->op_capa1 = ll_mdscapa_get(inode);
85 if (LLIF_DATA_MODIFIED & ll_i2info(inode)->lli_flags)
86 op_data->op_bias |= MDS_DATA_MODIFIED;
90 * Closes the IO epoch and packs all the attributes into @op_data for
93 static void ll_prepare_close(struct inode *inode, struct md_op_data *op_data,
94 struct obd_client_handle *och)
98 op_data->op_attr.ia_valid = ATTR_MODE | ATTR_ATIME_SET |
99 ATTR_MTIME_SET | ATTR_CTIME_SET;
101 if (!(och->och_flags & FMODE_WRITE))
104 if (!exp_connect_som(ll_i2mdexp(inode)) || !S_ISREG(inode->i_mode))
105 op_data->op_attr.ia_valid |= ATTR_SIZE | ATTR_BLOCKS;
107 ll_ioepoch_close(inode, op_data, &och, 0);
110 ll_pack_inode2opdata(inode, op_data, &och->och_fh);
111 ll_prep_md_op_data(op_data, inode, NULL, NULL,
112 0, 0, LUSTRE_OPC_ANY, NULL);
116 static int ll_close_inode_openhandle(struct obd_export *md_exp,
118 struct obd_client_handle *och)
120 struct obd_export *exp = ll_i2mdexp(inode);
121 struct md_op_data *op_data;
122 struct ptlrpc_request *req = NULL;
123 struct obd_device *obd = class_exp2obd(exp);
130 * XXX: in case of LMV, is this correct to access
133 CERROR("Invalid MDC connection handle "LPX64"\n",
134 ll_i2mdexp(inode)->exp_handle.h_cookie);
138 OBD_ALLOC_PTR(op_data);
140 GOTO(out, rc = -ENOMEM); // XXX We leak openhandle and request here.
142 ll_prepare_close(inode, op_data, och);
143 epoch_close = (op_data->op_flags & MF_EPOCH_CLOSE);
144 rc = md_close(md_exp, op_data, och->och_mod, &req);
146 /* This close must have the epoch closed. */
147 LASSERT(epoch_close);
148 /* MDS has instructed us to obtain Size-on-MDS attribute from
149 * OSTs and send setattr to back to MDS. */
150 rc = ll_som_update(inode, op_data);
152 CERROR("inode %lu mdc Size-on-MDS update failed: "
153 "rc = %d\n", inode->i_ino, rc);
157 CERROR("inode %lu mdc close failed: rc = %d\n",
161 /* DATA_MODIFIED flag was successfully sent on close, cancel data
162 * modification flag. */
163 if (rc == 0 && (op_data->op_bias & MDS_DATA_MODIFIED)) {
164 struct ll_inode_info *lli = ll_i2info(inode);
166 spin_lock(&lli->lli_lock);
167 lli->lli_flags &= ~LLIF_DATA_MODIFIED;
168 spin_unlock(&lli->lli_lock);
171 ll_finish_md_op_data(op_data);
174 rc = ll_objects_destroy(req, inode);
176 CERROR("inode %lu ll_objects destroy: rc = %d\n",
183 if (exp_connect_som(exp) && !epoch_close &&
184 S_ISREG(inode->i_mode) && (och->och_flags & FMODE_WRITE)) {
185 ll_queue_done_writing(inode, LLIF_DONE_WRITING);
187 md_clear_open_replay_data(md_exp, och);
188 /* Free @och if it is not waiting for DONE_WRITING. */
189 och->och_fh.cookie = DEAD_HANDLE_MAGIC;
192 if (req) /* This is close request */
193 ptlrpc_req_finished(req);
197 int ll_md_real_close(struct inode *inode, int flags)
199 struct ll_inode_info *lli = ll_i2info(inode);
200 struct obd_client_handle **och_p;
201 struct obd_client_handle *och;
206 if (flags & FMODE_WRITE) {
207 och_p = &lli->lli_mds_write_och;
208 och_usecount = &lli->lli_open_fd_write_count;
209 } else if (flags & FMODE_EXEC) {
210 och_p = &lli->lli_mds_exec_och;
211 och_usecount = &lli->lli_open_fd_exec_count;
213 LASSERT(flags & FMODE_READ);
214 och_p = &lli->lli_mds_read_och;
215 och_usecount = &lli->lli_open_fd_read_count;
218 mutex_lock(&lli->lli_och_mutex);
219 if (*och_usecount) { /* There are still users of this handle, so
221 mutex_unlock(&lli->lli_och_mutex);
226 mutex_unlock(&lli->lli_och_mutex);
228 if (och) { /* There might be a race and somebody have freed this och
230 rc = ll_close_inode_openhandle(ll_i2sbi(inode)->ll_md_exp,
237 int ll_md_close(struct obd_export *md_exp, struct inode *inode,
240 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
241 struct ll_inode_info *lli = ll_i2info(inode);
245 /* clear group lock, if present */
246 if (unlikely(fd->fd_flags & LL_FILE_GROUP_LOCKED))
247 ll_put_grouplock(inode, file, fd->fd_grouplock.cg_gid);
249 /* Let's see if we have good enough OPEN lock on the file and if
250 we can skip talking to MDS */
251 if (file->f_dentry->d_inode) { /* Can this ever be false? */
253 int flags = LDLM_FL_BLOCK_GRANTED | LDLM_FL_TEST_LOCK;
254 struct lustre_handle lockh;
255 struct inode *inode = file->f_dentry->d_inode;
256 ldlm_policy_data_t policy = {.l_inodebits={MDS_INODELOCK_OPEN}};
258 mutex_lock(&lli->lli_och_mutex);
259 if (fd->fd_omode & FMODE_WRITE) {
261 LASSERT(lli->lli_open_fd_write_count);
262 lli->lli_open_fd_write_count--;
263 } else if (fd->fd_omode & FMODE_EXEC) {
265 LASSERT(lli->lli_open_fd_exec_count);
266 lli->lli_open_fd_exec_count--;
269 LASSERT(lli->lli_open_fd_read_count);
270 lli->lli_open_fd_read_count--;
272 mutex_unlock(&lli->lli_och_mutex);
274 if (!md_lock_match(md_exp, flags, ll_inode2fid(inode),
275 LDLM_IBITS, &policy, lockmode,
277 rc = ll_md_real_close(file->f_dentry->d_inode,
281 CERROR("Releasing a file %p with negative dentry %p. Name %s",
282 file, file->f_dentry, file->f_dentry->d_name.name);
285 LUSTRE_FPRIVATE(file) = NULL;
286 ll_file_data_put(fd);
287 ll_capa_close(inode);
292 /* While this returns an error code, fput() the caller does not, so we need
293 * to make every effort to clean up all of our state here. Also, applications
294 * rarely check close errors and even if an error is returned they will not
295 * re-try the close call.
297 int ll_file_release(struct inode *inode, struct file *file)
299 struct ll_file_data *fd;
300 struct ll_sb_info *sbi = ll_i2sbi(inode);
301 struct ll_inode_info *lli = ll_i2info(inode);
305 CDEBUG(D_VFSTRACE, "VFS Op:inode=%lu/%u(%p)\n", inode->i_ino,
306 inode->i_generation, inode);
308 #ifdef CONFIG_FS_POSIX_ACL
309 if (sbi->ll_flags & LL_SBI_RMT_CLIENT &&
310 inode == inode->i_sb->s_root->d_inode) {
311 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
314 if (unlikely(fd->fd_flags & LL_FILE_RMTACL)) {
315 fd->fd_flags &= ~LL_FILE_RMTACL;
316 rct_del(&sbi->ll_rct, cfs_curproc_pid());
317 et_search_free(&sbi->ll_et, cfs_curproc_pid());
322 if (inode->i_sb->s_root != file->f_dentry)
323 ll_stats_ops_tally(sbi, LPROC_LL_RELEASE, 1);
324 fd = LUSTRE_FPRIVATE(file);
327 /* The last ref on @file, maybe not the the owner pid of statahead.
328 * Different processes can open the same dir, "ll_opendir_key" means:
329 * it is me that should stop the statahead thread. */
330 if (S_ISDIR(inode->i_mode) && lli->lli_opendir_key == fd &&
331 lli->lli_opendir_pid != 0)
332 ll_stop_statahead(inode, lli->lli_opendir_key);
334 if (inode->i_sb->s_root == file->f_dentry) {
335 LUSTRE_FPRIVATE(file) = NULL;
336 ll_file_data_put(fd);
340 if (!S_ISDIR(inode->i_mode)) {
341 lov_read_and_clear_async_rc(lli->lli_clob);
342 lli->lli_async_rc = 0;
345 rc = ll_md_close(sbi->ll_md_exp, inode, file);
347 if (CFS_FAIL_TIMEOUT_MS(OBD_FAIL_PTLRPC_DUMP_LOG, cfs_fail_val))
348 libcfs_debug_dumplog();
353 static int ll_intent_file_open(struct file *file, void *lmm,
354 int lmmsize, struct lookup_intent *itp)
356 struct ll_sb_info *sbi = ll_i2sbi(file->f_dentry->d_inode);
357 struct dentry *parent = file->f_dentry->d_parent;
358 const char *name = file->f_dentry->d_name.name;
359 const int len = file->f_dentry->d_name.len;
360 struct md_op_data *op_data;
361 struct ptlrpc_request *req;
362 __u32 opc = LUSTRE_OPC_ANY;
369 /* Usually we come here only for NFSD, and we want open lock.
370 But we can also get here with pre 2.6.15 patchless kernels, and in
371 that case that lock is also ok */
372 /* We can also get here if there was cached open handle in revalidate_it
373 * but it disappeared while we were getting from there to ll_file_open.
374 * But this means this file was closed and immediatelly opened which
375 * makes a good candidate for using OPEN lock */
376 /* If lmmsize & lmm are not 0, we are just setting stripe info
377 * parameters. No need for the open lock */
378 if (lmm == NULL && lmmsize == 0) {
379 itp->it_flags |= MDS_OPEN_LOCK;
380 if (itp->it_flags & FMODE_WRITE)
381 opc = LUSTRE_OPC_CREATE;
384 op_data = ll_prep_md_op_data(NULL, parent->d_inode,
385 file->f_dentry->d_inode, name, len,
388 RETURN(PTR_ERR(op_data));
390 itp->it_flags |= MDS_OPEN_BY_FID;
391 rc = md_intent_lock(sbi->ll_md_exp, op_data, lmm, lmmsize, itp,
392 0 /*unused */, &req, ll_md_blocking_ast, 0);
393 ll_finish_md_op_data(op_data);
395 /* reason for keep own exit path - don`t flood log
396 * with messages with -ESTALE errors.
398 if (!it_disposition(itp, DISP_OPEN_OPEN) ||
399 it_open_error(DISP_OPEN_OPEN, itp))
401 ll_release_openhandle(file->f_dentry, itp);
405 if (it_disposition(itp, DISP_LOOKUP_NEG))
406 GOTO(out, rc = -ENOENT);
408 if (rc != 0 || it_open_error(DISP_OPEN_OPEN, itp)) {
409 rc = rc ? rc : it_open_error(DISP_OPEN_OPEN, itp);
410 CDEBUG(D_VFSTRACE, "lock enqueue: err: %d\n", rc);
414 rc = ll_prep_inode(&file->f_dentry->d_inode, req, NULL, itp);
415 if (!rc && itp->d.lustre.it_lock_mode)
416 ll_set_lock_data(sbi->ll_md_exp, file->f_dentry->d_inode,
420 ptlrpc_req_finished(itp->d.lustre.it_data);
421 it_clear_disposition(itp, DISP_ENQ_COMPLETE);
422 ll_intent_drop_lock(itp);
428 * Assign an obtained @ioepoch to client's inode. No lock is needed, MDS does
429 * not believe attributes if a few ioepoch holders exist. Attributes for
430 * previous ioepoch if new one is opened are also skipped by MDS.
432 void ll_ioepoch_open(struct ll_inode_info *lli, __u64 ioepoch)
434 if (ioepoch && lli->lli_ioepoch != ioepoch) {
435 lli->lli_ioepoch = ioepoch;
436 CDEBUG(D_INODE, "Epoch "LPU64" opened on "DFID"\n",
437 ioepoch, PFID(&lli->lli_fid));
441 static int ll_och_fill(struct obd_export *md_exp, struct ll_inode_info *lli,
442 struct lookup_intent *it, struct obd_client_handle *och)
444 struct ptlrpc_request *req = it->d.lustre.it_data;
445 struct mdt_body *body;
449 body = req_capsule_server_get(&req->rq_pill, &RMF_MDT_BODY);
450 LASSERT(body != NULL); /* reply already checked out */
452 memcpy(&och->och_fh, &body->handle, sizeof(body->handle));
453 och->och_magic = OBD_CLIENT_HANDLE_MAGIC;
454 och->och_fid = lli->lli_fid;
455 och->och_flags = it->it_flags;
456 ll_ioepoch_open(lli, body->ioepoch);
458 return md_set_open_replay_data(md_exp, och, req);
461 int ll_local_open(struct file *file, struct lookup_intent *it,
462 struct ll_file_data *fd, struct obd_client_handle *och)
464 struct inode *inode = file->f_dentry->d_inode;
465 struct ll_inode_info *lli = ll_i2info(inode);
468 LASSERT(!LUSTRE_FPRIVATE(file));
473 struct ptlrpc_request *req = it->d.lustre.it_data;
474 struct mdt_body *body;
477 rc = ll_och_fill(ll_i2sbi(inode)->ll_md_exp, lli, it, och);
481 body = req_capsule_server_get(&req->rq_pill, &RMF_MDT_BODY);
482 if ((it->it_flags & FMODE_WRITE) &&
483 (body->valid & OBD_MD_FLSIZE))
484 CDEBUG(D_INODE, "Epoch "LPU64" opened on "DFID"\n",
485 lli->lli_ioepoch, PFID(&lli->lli_fid));
488 LUSTRE_FPRIVATE(file) = fd;
489 ll_readahead_init(inode, &fd->fd_ras);
490 fd->fd_omode = it->it_flags;
494 /* Open a file, and (for the very first open) create objects on the OSTs at
495 * this time. If opened with O_LOV_DELAY_CREATE, then we don't do the object
496 * creation or open until ll_lov_setstripe() ioctl is called.
498 * If we already have the stripe MD locally then we don't request it in
499 * md_open(), by passing a lmm_size = 0.
501 * It is up to the application to ensure no other processes open this file
502 * in the O_LOV_DELAY_CREATE case, or the default striping pattern will be
503 * used. We might be able to avoid races of that sort by getting lli_open_sem
504 * before returning in the O_LOV_DELAY_CREATE case and dropping it here
505 * or in ll_file_release(), but I'm not sure that is desirable/necessary.
507 int ll_file_open(struct inode *inode, struct file *file)
509 struct ll_inode_info *lli = ll_i2info(inode);
510 struct lookup_intent *it, oit = { .it_op = IT_OPEN,
511 .it_flags = file->f_flags };
512 struct obd_client_handle **och_p = NULL;
513 __u64 *och_usecount = NULL;
514 struct ll_file_data *fd;
515 int rc = 0, opendir_set = 0;
518 CDEBUG(D_VFSTRACE, "VFS Op:inode=%lu/%u(%p), flags %o\n", inode->i_ino,
519 inode->i_generation, inode, file->f_flags);
521 it = file->private_data; /* XXX: compat macro */
522 file->private_data = NULL; /* prevent ll_local_open assertion */
524 fd = ll_file_data_get();
526 GOTO(out_och_free, rc = -ENOMEM);
529 if (S_ISDIR(inode->i_mode)) {
530 spin_lock(&lli->lli_sa_lock);
531 if (lli->lli_opendir_key == NULL && lli->lli_sai == NULL &&
532 lli->lli_opendir_pid == 0) {
533 lli->lli_opendir_key = fd;
534 lli->lli_opendir_pid = cfs_curproc_pid();
537 spin_unlock(&lli->lli_sa_lock);
540 if (inode->i_sb->s_root == file->f_dentry) {
541 LUSTRE_FPRIVATE(file) = fd;
545 if (!it || !it->d.lustre.it_disposition) {
546 /* Convert f_flags into access mode. We cannot use file->f_mode,
547 * because everything but O_ACCMODE mask was stripped from
549 if ((oit.it_flags + 1) & O_ACCMODE)
551 if (file->f_flags & O_TRUNC)
552 oit.it_flags |= FMODE_WRITE;
554 /* kernel only call f_op->open in dentry_open. filp_open calls
555 * dentry_open after call to open_namei that checks permissions.
556 * Only nfsd_open call dentry_open directly without checking
557 * permissions and because of that this code below is safe. */
558 if (oit.it_flags & (FMODE_WRITE | FMODE_READ))
559 oit.it_flags |= MDS_OPEN_OWNEROVERRIDE;
561 /* We do not want O_EXCL here, presumably we opened the file
562 * already? XXX - NFS implications? */
563 oit.it_flags &= ~O_EXCL;
565 /* bug20584, if "it_flags" contains O_CREAT, the file will be
566 * created if necessary, then "IT_CREAT" should be set to keep
567 * consistent with it */
568 if (oit.it_flags & O_CREAT)
569 oit.it_op |= IT_CREAT;
575 /* Let's see if we have file open on MDS already. */
576 if (it->it_flags & FMODE_WRITE) {
577 och_p = &lli->lli_mds_write_och;
578 och_usecount = &lli->lli_open_fd_write_count;
579 } else if (it->it_flags & FMODE_EXEC) {
580 och_p = &lli->lli_mds_exec_och;
581 och_usecount = &lli->lli_open_fd_exec_count;
583 och_p = &lli->lli_mds_read_och;
584 och_usecount = &lli->lli_open_fd_read_count;
587 mutex_lock(&lli->lli_och_mutex);
588 if (*och_p) { /* Open handle is present */
589 if (it_disposition(it, DISP_OPEN_OPEN)) {
590 /* Well, there's extra open request that we do not need,
591 let's close it somehow. This will decref request. */
592 rc = it_open_error(DISP_OPEN_OPEN, it);
594 mutex_unlock(&lli->lli_och_mutex);
595 GOTO(out_openerr, rc);
598 ll_release_openhandle(file->f_dentry, it);
602 rc = ll_local_open(file, it, fd, NULL);
605 mutex_unlock(&lli->lli_och_mutex);
606 GOTO(out_openerr, rc);
609 LASSERT(*och_usecount == 0);
610 if (!it->d.lustre.it_disposition) {
611 /* We cannot just request lock handle now, new ELC code
612 means that one of other OPEN locks for this file
613 could be cancelled, and since blocking ast handler
614 would attempt to grab och_mutex as well, that would
615 result in a deadlock */
616 mutex_unlock(&lli->lli_och_mutex);
617 it->it_create_mode |= M_CHECK_STALE;
618 rc = ll_intent_file_open(file, NULL, 0, it);
619 it->it_create_mode &= ~M_CHECK_STALE;
621 GOTO(out_openerr, rc);
625 OBD_ALLOC(*och_p, sizeof (struct obd_client_handle));
627 GOTO(out_och_free, rc = -ENOMEM);
631 /* md_intent_lock() didn't get a request ref if there was an
632 * open error, so don't do cleanup on the request here
634 /* XXX (green): Should not we bail out on any error here, not
635 * just open error? */
636 rc = it_open_error(DISP_OPEN_OPEN, it);
638 GOTO(out_och_free, rc);
640 LASSERT(it_disposition(it, DISP_ENQ_OPEN_REF));
642 rc = ll_local_open(file, it, fd, *och_p);
644 GOTO(out_och_free, rc);
646 mutex_unlock(&lli->lli_och_mutex);
649 /* Must do this outside lli_och_mutex lock to prevent deadlock where
650 different kind of OPEN lock for this same inode gets cancelled
651 by ldlm_cancel_lru */
652 if (!S_ISREG(inode->i_mode))
653 GOTO(out_och_free, rc);
657 if (!lli->lli_has_smd) {
658 if (file->f_flags & O_LOV_DELAY_CREATE ||
659 !(file->f_mode & FMODE_WRITE)) {
660 CDEBUG(D_INODE, "object creation was delayed\n");
661 GOTO(out_och_free, rc);
664 file->f_flags &= ~O_LOV_DELAY_CREATE;
665 GOTO(out_och_free, rc);
669 if (och_p && *och_p) {
670 OBD_FREE(*och_p, sizeof (struct obd_client_handle));
671 *och_p = NULL; /* OBD_FREE writes some magic there */
674 mutex_unlock(&lli->lli_och_mutex);
677 if (opendir_set != 0)
678 ll_stop_statahead(inode, lli->lli_opendir_key);
680 ll_file_data_put(fd);
682 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_OPEN, 1);
685 if (it && it_disposition(it, DISP_ENQ_OPEN_REF)) {
686 ptlrpc_req_finished(it->d.lustre.it_data);
687 it_clear_disposition(it, DISP_ENQ_OPEN_REF);
693 /* Fills the obdo with the attributes for the lsm */
694 static int ll_lsm_getattr(struct lov_stripe_md *lsm, struct obd_export *exp,
695 struct obd_capa *capa, struct obdo *obdo,
696 __u64 ioepoch, int sync)
698 struct ptlrpc_request_set *set;
699 struct obd_info oinfo = { { { 0 } } };
704 LASSERT(lsm != NULL);
708 oinfo.oi_oa->o_id = lsm->lsm_object_id;
709 oinfo.oi_oa->o_seq = lsm->lsm_object_seq;
710 oinfo.oi_oa->o_mode = S_IFREG;
711 oinfo.oi_oa->o_ioepoch = ioepoch;
712 oinfo.oi_oa->o_valid = OBD_MD_FLID | OBD_MD_FLTYPE |
713 OBD_MD_FLSIZE | OBD_MD_FLBLOCKS |
714 OBD_MD_FLBLKSZ | OBD_MD_FLATIME |
715 OBD_MD_FLMTIME | OBD_MD_FLCTIME |
716 OBD_MD_FLGROUP | OBD_MD_FLEPOCH |
717 OBD_MD_FLDATAVERSION;
718 oinfo.oi_capa = capa;
720 oinfo.oi_oa->o_valid |= OBD_MD_FLFLAGS;
721 oinfo.oi_oa->o_flags |= OBD_FL_SRVLOCK;
724 set = ptlrpc_prep_set();
726 CERROR("can't allocate ptlrpc set\n");
729 rc = obd_getattr_async(exp, &oinfo, set);
731 rc = ptlrpc_set_wait(set);
732 ptlrpc_set_destroy(set);
735 oinfo.oi_oa->o_valid &= (OBD_MD_FLBLOCKS | OBD_MD_FLBLKSZ |
736 OBD_MD_FLATIME | OBD_MD_FLMTIME |
737 OBD_MD_FLCTIME | OBD_MD_FLSIZE |
738 OBD_MD_FLDATAVERSION);
743 * Performs the getattr on the inode and updates its fields.
744 * If @sync != 0, perform the getattr under the server-side lock.
746 int ll_inode_getattr(struct inode *inode, struct obdo *obdo,
747 __u64 ioepoch, int sync)
749 struct obd_capa *capa = ll_mdscapa_get(inode);
750 struct lov_stripe_md *lsm;
754 lsm = ccc_inode_lsm_get(inode);
755 rc = ll_lsm_getattr(lsm, ll_i2dtexp(inode),
756 capa, obdo, ioepoch, sync);
759 obdo_refresh_inode(inode, obdo, obdo->o_valid);
761 "objid "LPX64" size %llu, blocks %llu, blksize %lu\n",
762 lsm ? lsm->lsm_object_id : 0, i_size_read(inode),
763 (unsigned long long)inode->i_blocks,
764 (unsigned long)ll_inode_blksize(inode));
766 ccc_inode_lsm_put(inode, lsm);
770 int ll_merge_lvb(struct inode *inode)
772 struct ll_inode_info *lli = ll_i2info(inode);
773 struct ll_sb_info *sbi = ll_i2sbi(inode);
774 struct lov_stripe_md *lsm;
780 lsm = ccc_inode_lsm_get(inode);
781 ll_inode_size_lock(inode);
782 inode_init_lvb(inode, &lvb);
784 /* merge timestamps the most resently obtained from mds with
785 timestamps obtained from osts */
786 lvb.lvb_atime = lli->lli_lvb.lvb_atime;
787 lvb.lvb_mtime = lli->lli_lvb.lvb_mtime;
788 lvb.lvb_ctime = lli->lli_lvb.lvb_ctime;
790 rc = obd_merge_lvb(sbi->ll_dt_exp, lsm, &lvb, 0);
791 cl_isize_write_nolock(inode, lvb.lvb_size);
793 CDEBUG(D_VFSTRACE, DFID" updating i_size "LPU64"\n",
794 PFID(&lli->lli_fid), lvb.lvb_size);
795 inode->i_blocks = lvb.lvb_blocks;
797 LTIME_S(inode->i_mtime) = lvb.lvb_mtime;
798 LTIME_S(inode->i_atime) = lvb.lvb_atime;
799 LTIME_S(inode->i_ctime) = lvb.lvb_ctime;
800 ll_inode_size_unlock(inode);
801 ccc_inode_lsm_put(inode, lsm);
806 int ll_glimpse_ioctl(struct ll_sb_info *sbi, struct lov_stripe_md *lsm,
809 struct obdo obdo = { 0 };
812 rc = ll_lsm_getattr(lsm, sbi->ll_dt_exp, NULL, &obdo, 0, 0);
814 st->st_size = obdo.o_size;
815 st->st_blocks = obdo.o_blocks;
816 st->st_mtime = obdo.o_mtime;
817 st->st_atime = obdo.o_atime;
818 st->st_ctime = obdo.o_ctime;
823 void ll_io_init(struct cl_io *io, const struct file *file, int write)
825 struct inode *inode = file->f_dentry->d_inode;
827 io->u.ci_rw.crw_nonblock = file->f_flags & O_NONBLOCK;
829 io->u.ci_wr.wr_append = !!(file->f_flags & O_APPEND);
830 io->u.ci_wr.wr_sync = file->f_flags & O_SYNC || IS_SYNC(inode);
832 io->ci_obj = ll_i2info(inode)->lli_clob;
833 io->ci_lockreq = CILR_MAYBE;
834 if (ll_file_nolock(file)) {
835 io->ci_lockreq = CILR_NEVER;
836 io->ci_no_srvlock = 1;
837 } else if (file->f_flags & O_APPEND) {
838 io->ci_lockreq = CILR_MANDATORY;
843 ll_file_io_generic(const struct lu_env *env, struct vvp_io_args *args,
844 struct file *file, enum cl_io_type iot,
845 loff_t *ppos, size_t count)
847 struct ll_inode_info *lli = ll_i2info(file->f_dentry->d_inode);
848 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
853 io = ccc_env_thread_io(env);
854 ll_io_init(io, file, iot == CIT_WRITE);
856 if (cl_io_rw_init(env, io, iot, *ppos, count) == 0) {
857 struct vvp_io *vio = vvp_env_io(env);
858 struct ccc_io *cio = ccc_env_io(env);
859 int write_mutex_locked = 0;
861 cio->cui_fd = LUSTRE_FPRIVATE(file);
862 vio->cui_io_subtype = args->via_io_subtype;
864 switch (vio->cui_io_subtype) {
866 cio->cui_iov = args->u.normal.via_iov;
867 cio->cui_nrsegs = args->u.normal.via_nrsegs;
868 cio->cui_tot_nrsegs = cio->cui_nrsegs;
869 #ifndef HAVE_FILE_WRITEV
870 cio->cui_iocb = args->u.normal.via_iocb;
872 if ((iot == CIT_WRITE) &&
873 !(cio->cui_fd->fd_flags & LL_FILE_GROUP_LOCKED)) {
874 if (mutex_lock_interruptible(&lli->
876 GOTO(out, result = -ERESTARTSYS);
877 write_mutex_locked = 1;
878 } else if (iot == CIT_READ) {
879 down_read(&lli->lli_trunc_sem);
883 vio->u.sendfile.cui_actor = args->u.sendfile.via_actor;
884 vio->u.sendfile.cui_target = args->u.sendfile.via_target;
887 vio->u.splice.cui_pipe = args->u.splice.via_pipe;
888 vio->u.splice.cui_flags = args->u.splice.via_flags;
891 CERROR("Unknow IO type - %u\n", vio->cui_io_subtype);
894 result = cl_io_loop(env, io);
895 if (write_mutex_locked)
896 mutex_unlock(&lli->lli_write_mutex);
897 else if (args->via_io_subtype == IO_NORMAL && iot == CIT_READ)
898 up_read(&lli->lli_trunc_sem);
900 /* cl_io_rw_init() handled IO */
901 result = io->ci_result;
904 if (io->ci_nob > 0) {
906 *ppos = io->u.ci_wr.wr.crw_pos;
912 if (iot == CIT_READ) {
914 ll_stats_ops_tally(ll_i2sbi(file->f_dentry->d_inode),
915 LPROC_LL_READ_BYTES, result);
916 } else if (iot == CIT_WRITE) {
918 ll_stats_ops_tally(ll_i2sbi(file->f_dentry->d_inode),
919 LPROC_LL_WRITE_BYTES, result);
920 fd->fd_write_failed = false;
922 fd->fd_write_failed = true;
931 * XXX: exact copy from kernel code (__generic_file_aio_write_nolock)
933 static int ll_file_get_iov_count(const struct iovec *iov,
934 unsigned long *nr_segs, size_t *count)
939 for (seg = 0; seg < *nr_segs; seg++) {
940 const struct iovec *iv = &iov[seg];
943 * If any segment has a negative length, or the cumulative
944 * length ever wraps negative then return -EINVAL.
947 if (unlikely((ssize_t)(cnt|iv->iov_len) < 0))
949 if (access_ok(VERIFY_READ, iv->iov_base, iv->iov_len))
954 cnt -= iv->iov_len; /* This segment is no good */
961 #ifdef HAVE_FILE_READV
962 static ssize_t ll_file_readv(struct file *file, const struct iovec *iov,
963 unsigned long nr_segs, loff_t *ppos)
966 struct vvp_io_args *args;
972 result = ll_file_get_iov_count(iov, &nr_segs, &count);
976 env = cl_env_get(&refcheck);
978 RETURN(PTR_ERR(env));
980 args = vvp_env_args(env, IO_NORMAL);
981 args->u.normal.via_iov = (struct iovec *)iov;
982 args->u.normal.via_nrsegs = nr_segs;
984 result = ll_file_io_generic(env, args, file, CIT_READ, ppos, count);
985 cl_env_put(env, &refcheck);
989 static ssize_t ll_file_read(struct file *file, char *buf, size_t count,
993 struct iovec *local_iov;
998 env = cl_env_get(&refcheck);
1000 RETURN(PTR_ERR(env));
1002 local_iov = &vvp_env_info(env)->vti_local_iov;
1003 local_iov->iov_base = (void __user *)buf;
1004 local_iov->iov_len = count;
1005 result = ll_file_readv(file, local_iov, 1, ppos);
1006 cl_env_put(env, &refcheck);
1011 static ssize_t ll_file_aio_read(struct kiocb *iocb, const struct iovec *iov,
1012 unsigned long nr_segs, loff_t pos)
1015 struct vvp_io_args *args;
1021 result = ll_file_get_iov_count(iov, &nr_segs, &count);
1025 env = cl_env_get(&refcheck);
1027 RETURN(PTR_ERR(env));
1029 args = vvp_env_args(env, IO_NORMAL);
1030 args->u.normal.via_iov = (struct iovec *)iov;
1031 args->u.normal.via_nrsegs = nr_segs;
1032 args->u.normal.via_iocb = iocb;
1034 result = ll_file_io_generic(env, args, iocb->ki_filp, CIT_READ,
1035 &iocb->ki_pos, count);
1036 cl_env_put(env, &refcheck);
1040 static ssize_t ll_file_read(struct file *file, char *buf, size_t count,
1044 struct iovec *local_iov;
1045 struct kiocb *kiocb;
1050 env = cl_env_get(&refcheck);
1052 RETURN(PTR_ERR(env));
1054 local_iov = &vvp_env_info(env)->vti_local_iov;
1055 kiocb = &vvp_env_info(env)->vti_kiocb;
1056 local_iov->iov_base = (void __user *)buf;
1057 local_iov->iov_len = count;
1058 init_sync_kiocb(kiocb, file);
1059 kiocb->ki_pos = *ppos;
1060 kiocb->ki_left = count;
1062 result = ll_file_aio_read(kiocb, local_iov, 1, kiocb->ki_pos);
1063 *ppos = kiocb->ki_pos;
1065 cl_env_put(env, &refcheck);
1071 * Write to a file (through the page cache).
1073 #ifdef HAVE_FILE_WRITEV
1074 static ssize_t ll_file_writev(struct file *file, const struct iovec *iov,
1075 unsigned long nr_segs, loff_t *ppos)
1078 struct vvp_io_args *args;
1084 result = ll_file_get_iov_count(iov, &nr_segs, &count);
1088 env = cl_env_get(&refcheck);
1090 RETURN(PTR_ERR(env));
1092 args = vvp_env_args(env, IO_NORMAL);
1093 args->u.normal.via_iov = (struct iovec *)iov;
1094 args->u.normal.via_nrsegs = nr_segs;
1096 result = ll_file_io_generic(env, args, file, CIT_WRITE, ppos, count);
1097 cl_env_put(env, &refcheck);
1101 static ssize_t ll_file_write(struct file *file, const char *buf, size_t count,
1105 struct iovec *local_iov;
1110 env = cl_env_get(&refcheck);
1112 RETURN(PTR_ERR(env));
1114 local_iov = &vvp_env_info(env)->vti_local_iov;
1115 local_iov->iov_base = (void __user *)buf;
1116 local_iov->iov_len = count;
1118 result = ll_file_writev(file, local_iov, 1, ppos);
1119 cl_env_put(env, &refcheck);
1123 #else /* AIO stuff */
1124 static ssize_t ll_file_aio_write(struct kiocb *iocb, const struct iovec *iov,
1125 unsigned long nr_segs, loff_t pos)
1128 struct vvp_io_args *args;
1134 result = ll_file_get_iov_count(iov, &nr_segs, &count);
1138 env = cl_env_get(&refcheck);
1140 RETURN(PTR_ERR(env));
1142 args = vvp_env_args(env, IO_NORMAL);
1143 args->u.normal.via_iov = (struct iovec *)iov;
1144 args->u.normal.via_nrsegs = nr_segs;
1145 args->u.normal.via_iocb = iocb;
1147 result = ll_file_io_generic(env, args, iocb->ki_filp, CIT_WRITE,
1148 &iocb->ki_pos, count);
1149 cl_env_put(env, &refcheck);
1153 static ssize_t ll_file_write(struct file *file, const char *buf, size_t count,
1157 struct iovec *local_iov;
1158 struct kiocb *kiocb;
1163 env = cl_env_get(&refcheck);
1165 RETURN(PTR_ERR(env));
1167 local_iov = &vvp_env_info(env)->vti_local_iov;
1168 kiocb = &vvp_env_info(env)->vti_kiocb;
1169 local_iov->iov_base = (void __user *)buf;
1170 local_iov->iov_len = count;
1171 init_sync_kiocb(kiocb, file);
1172 kiocb->ki_pos = *ppos;
1173 kiocb->ki_left = count;
1175 result = ll_file_aio_write(kiocb, local_iov, 1, kiocb->ki_pos);
1176 *ppos = kiocb->ki_pos;
1178 cl_env_put(env, &refcheck);
1184 #ifdef HAVE_KERNEL_SENDFILE
1186 * Send file content (through pagecache) somewhere with helper
1188 static ssize_t ll_file_sendfile(struct file *in_file, loff_t *ppos,size_t count,
1189 read_actor_t actor, void *target)
1192 struct vvp_io_args *args;
1197 env = cl_env_get(&refcheck);
1199 RETURN(PTR_ERR(env));
1201 args = vvp_env_args(env, IO_SENDFILE);
1202 args->u.sendfile.via_target = target;
1203 args->u.sendfile.via_actor = actor;
1205 result = ll_file_io_generic(env, args, in_file, CIT_READ, ppos, count);
1206 cl_env_put(env, &refcheck);
1211 #ifdef HAVE_KERNEL_SPLICE_READ
1213 * Send file content (through pagecache) somewhere with helper
1215 static ssize_t ll_file_splice_read(struct file *in_file, loff_t *ppos,
1216 struct pipe_inode_info *pipe, size_t count,
1220 struct vvp_io_args *args;
1225 env = cl_env_get(&refcheck);
1227 RETURN(PTR_ERR(env));
1229 args = vvp_env_args(env, IO_SPLICE);
1230 args->u.splice.via_pipe = pipe;
1231 args->u.splice.via_flags = flags;
1233 result = ll_file_io_generic(env, args, in_file, CIT_READ, ppos, count);
1234 cl_env_put(env, &refcheck);
1239 static int ll_lov_recreate(struct inode *inode, obd_id id, obd_seq seq,
1242 struct obd_export *exp = ll_i2dtexp(inode);
1243 struct obd_trans_info oti = { 0 };
1244 struct obdo *oa = NULL;
1247 struct lov_stripe_md *lsm = NULL, *lsm2;
1254 lsm = ccc_inode_lsm_get(inode);
1256 GOTO(out, rc = -ENOENT);
1258 lsm_size = sizeof(*lsm) + (sizeof(struct lov_oinfo) *
1259 (lsm->lsm_stripe_count));
1261 OBD_ALLOC_LARGE(lsm2, lsm_size);
1263 GOTO(out, rc = -ENOMEM);
1267 oa->o_nlink = ost_idx;
1268 oa->o_flags |= OBD_FL_RECREATE_OBJS;
1269 oa->o_valid = OBD_MD_FLID | OBD_MD_FLFLAGS | OBD_MD_FLGROUP;
1270 obdo_from_inode(oa, inode, OBD_MD_FLTYPE | OBD_MD_FLATIME |
1271 OBD_MD_FLMTIME | OBD_MD_FLCTIME);
1272 obdo_set_parent_fid(oa, &ll_i2info(inode)->lli_fid);
1273 memcpy(lsm2, lsm, lsm_size);
1274 ll_inode_size_lock(inode);
1275 rc = obd_create(NULL, exp, oa, &lsm2, &oti);
1276 ll_inode_size_unlock(inode);
1278 OBD_FREE_LARGE(lsm2, lsm_size);
1281 ccc_inode_lsm_put(inode, lsm);
1286 static int ll_lov_recreate_obj(struct inode *inode, unsigned long arg)
1288 struct ll_recreate_obj ucreat;
1291 if (!cfs_capable(CFS_CAP_SYS_ADMIN))
1294 if (cfs_copy_from_user(&ucreat, (struct ll_recreate_obj *)arg,
1295 sizeof(struct ll_recreate_obj)))
1298 RETURN(ll_lov_recreate(inode, ucreat.lrc_id, 0,
1299 ucreat.lrc_ost_idx));
1302 static int ll_lov_recreate_fid(struct inode *inode, unsigned long arg)
1309 if (!cfs_capable(CFS_CAP_SYS_ADMIN))
1312 if (cfs_copy_from_user(&fid, (struct lu_fid *)arg,
1313 sizeof(struct lu_fid)))
1316 id = fid_oid(&fid) | ((fid_seq(&fid) & 0xffff) << 32);
1317 ost_idx = (fid_seq(&fid) >> 16) & 0xffff;
1318 RETURN(ll_lov_recreate(inode, id, 0, ost_idx));
1321 int ll_lov_setstripe_ea_info(struct inode *inode, struct file *file,
1322 int flags, struct lov_user_md *lum, int lum_size)
1324 struct lov_stripe_md *lsm = NULL;
1325 struct lookup_intent oit = {.it_op = IT_OPEN, .it_flags = flags};
1329 lsm = ccc_inode_lsm_get(inode);
1331 ccc_inode_lsm_put(inode, lsm);
1332 CDEBUG(D_IOCTL, "stripe already exists for ino %lu\n",
1337 ll_inode_size_lock(inode);
1338 rc = ll_intent_file_open(file, lum, lum_size, &oit);
1341 rc = oit.d.lustre.it_status;
1343 GOTO(out_req_free, rc);
1345 ll_release_openhandle(file->f_dentry, &oit);
1348 ll_inode_size_unlock(inode);
1349 ll_intent_release(&oit);
1350 ccc_inode_lsm_put(inode, lsm);
1353 ptlrpc_req_finished((struct ptlrpc_request *) oit.d.lustre.it_data);
1357 int ll_lov_getstripe_ea_info(struct inode *inode, const char *filename,
1358 struct lov_mds_md **lmmp, int *lmm_size,
1359 struct ptlrpc_request **request)
1361 struct ll_sb_info *sbi = ll_i2sbi(inode);
1362 struct mdt_body *body;
1363 struct lov_mds_md *lmm = NULL;
1364 struct ptlrpc_request *req = NULL;
1365 struct md_op_data *op_data;
1368 rc = ll_get_max_mdsize(sbi, &lmmsize);
1372 op_data = ll_prep_md_op_data(NULL, inode, NULL, filename,
1373 strlen(filename), lmmsize,
1374 LUSTRE_OPC_ANY, NULL);
1375 if (IS_ERR(op_data))
1376 RETURN(PTR_ERR(op_data));
1378 op_data->op_valid = OBD_MD_FLEASIZE | OBD_MD_FLDIREA;
1379 rc = md_getattr_name(sbi->ll_md_exp, op_data, &req);
1380 ll_finish_md_op_data(op_data);
1382 CDEBUG(D_INFO, "md_getattr_name failed "
1383 "on %s: rc %d\n", filename, rc);
1387 body = req_capsule_server_get(&req->rq_pill, &RMF_MDT_BODY);
1388 LASSERT(body != NULL); /* checked by mdc_getattr_name */
1390 lmmsize = body->eadatasize;
1392 if (!(body->valid & (OBD_MD_FLEASIZE | OBD_MD_FLDIREA)) ||
1394 GOTO(out, rc = -ENODATA);
1397 lmm = req_capsule_server_sized_get(&req->rq_pill, &RMF_MDT_MD, lmmsize);
1398 LASSERT(lmm != NULL);
1400 if ((lmm->lmm_magic != cpu_to_le32(LOV_MAGIC_V1)) &&
1401 (lmm->lmm_magic != cpu_to_le32(LOV_MAGIC_V3))) {
1402 GOTO(out, rc = -EPROTO);
1406 * This is coming from the MDS, so is probably in
1407 * little endian. We convert it to host endian before
1408 * passing it to userspace.
1410 if (LOV_MAGIC != cpu_to_le32(LOV_MAGIC)) {
1411 /* if function called for directory - we should
1412 * avoid swab not existent lsm objects */
1413 if (lmm->lmm_magic == cpu_to_le32(LOV_MAGIC_V1)) {
1414 lustre_swab_lov_user_md_v1((struct lov_user_md_v1 *)lmm);
1415 if (S_ISREG(body->mode))
1416 lustre_swab_lov_user_md_objects(
1417 ((struct lov_user_md_v1 *)lmm)->lmm_objects,
1418 ((struct lov_user_md_v1 *)lmm)->lmm_stripe_count);
1419 } else if (lmm->lmm_magic == cpu_to_le32(LOV_MAGIC_V3)) {
1420 lustre_swab_lov_user_md_v3((struct lov_user_md_v3 *)lmm);
1421 if (S_ISREG(body->mode))
1422 lustre_swab_lov_user_md_objects(
1423 ((struct lov_user_md_v3 *)lmm)->lmm_objects,
1424 ((struct lov_user_md_v3 *)lmm)->lmm_stripe_count);
1430 *lmm_size = lmmsize;
1435 static int ll_lov_setea(struct inode *inode, struct file *file,
1438 int flags = MDS_OPEN_HAS_OBJS | FMODE_WRITE;
1439 struct lov_user_md *lump;
1440 int lum_size = sizeof(struct lov_user_md) +
1441 sizeof(struct lov_user_ost_data);
1445 if (!cfs_capable(CFS_CAP_SYS_ADMIN))
1448 OBD_ALLOC_LARGE(lump, lum_size);
1452 if (cfs_copy_from_user(lump, (struct lov_user_md *)arg, lum_size)) {
1453 OBD_FREE_LARGE(lump, lum_size);
1457 rc = ll_lov_setstripe_ea_info(inode, file, flags, lump, lum_size);
1459 OBD_FREE_LARGE(lump, lum_size);
1463 static int ll_lov_setstripe(struct inode *inode, struct file *file,
1466 struct lov_user_md_v3 lumv3;
1467 struct lov_user_md_v1 *lumv1 = (struct lov_user_md_v1 *)&lumv3;
1468 struct lov_user_md_v1 *lumv1p = (struct lov_user_md_v1 *)arg;
1469 struct lov_user_md_v3 *lumv3p = (struct lov_user_md_v3 *)arg;
1472 int flags = FMODE_WRITE;
1475 /* first try with v1 which is smaller than v3 */
1476 lum_size = sizeof(struct lov_user_md_v1);
1477 if (cfs_copy_from_user(lumv1, lumv1p, lum_size))
1480 if (lumv1->lmm_magic == LOV_USER_MAGIC_V3) {
1481 lum_size = sizeof(struct lov_user_md_v3);
1482 if (cfs_copy_from_user(&lumv3, lumv3p, lum_size))
1486 rc = ll_lov_setstripe_ea_info(inode, file, flags, lumv1, lum_size);
1488 struct lov_stripe_md *lsm;
1491 put_user(0, &lumv1p->lmm_stripe_count);
1493 ll_layout_refresh(inode, &gen);
1494 lsm = ccc_inode_lsm_get(inode);
1495 rc = obd_iocontrol(LL_IOC_LOV_GETSTRIPE, ll_i2dtexp(inode),
1496 0, lsm, (void *)arg);
1497 ccc_inode_lsm_put(inode, lsm);
1502 static int ll_lov_getstripe(struct inode *inode, unsigned long arg)
1504 struct lov_stripe_md *lsm;
1508 lsm = ccc_inode_lsm_get(inode);
1510 rc = obd_iocontrol(LL_IOC_LOV_GETSTRIPE, ll_i2dtexp(inode), 0,
1512 ccc_inode_lsm_put(inode, lsm);
1516 int ll_get_grouplock(struct inode *inode, struct file *file, unsigned long arg)
1518 struct ll_inode_info *lli = ll_i2info(inode);
1519 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
1520 struct ccc_grouplock grouplock;
1524 if (ll_file_nolock(file))
1525 RETURN(-EOPNOTSUPP);
1527 spin_lock(&lli->lli_lock);
1528 if (fd->fd_flags & LL_FILE_GROUP_LOCKED) {
1529 CWARN("group lock already existed with gid %lu\n",
1530 fd->fd_grouplock.cg_gid);
1531 spin_unlock(&lli->lli_lock);
1534 LASSERT(fd->fd_grouplock.cg_lock == NULL);
1535 spin_unlock(&lli->lli_lock);
1537 rc = cl_get_grouplock(cl_i2info(inode)->lli_clob,
1538 arg, (file->f_flags & O_NONBLOCK), &grouplock);
1542 spin_lock(&lli->lli_lock);
1543 if (fd->fd_flags & LL_FILE_GROUP_LOCKED) {
1544 spin_unlock(&lli->lli_lock);
1545 CERROR("another thread just won the race\n");
1546 cl_put_grouplock(&grouplock);
1550 fd->fd_flags |= LL_FILE_GROUP_LOCKED;
1551 fd->fd_grouplock = grouplock;
1552 spin_unlock(&lli->lli_lock);
1554 CDEBUG(D_INFO, "group lock %lu obtained\n", arg);
1558 int ll_put_grouplock(struct inode *inode, struct file *file, unsigned long arg)
1560 struct ll_inode_info *lli = ll_i2info(inode);
1561 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
1562 struct ccc_grouplock grouplock;
1565 spin_lock(&lli->lli_lock);
1566 if (!(fd->fd_flags & LL_FILE_GROUP_LOCKED)) {
1567 spin_unlock(&lli->lli_lock);
1568 CWARN("no group lock held\n");
1571 LASSERT(fd->fd_grouplock.cg_lock != NULL);
1573 if (fd->fd_grouplock.cg_gid != arg) {
1574 CWARN("group lock %lu doesn't match current id %lu\n",
1575 arg, fd->fd_grouplock.cg_gid);
1576 spin_unlock(&lli->lli_lock);
1580 grouplock = fd->fd_grouplock;
1581 memset(&fd->fd_grouplock, 0, sizeof(fd->fd_grouplock));
1582 fd->fd_flags &= ~LL_FILE_GROUP_LOCKED;
1583 spin_unlock(&lli->lli_lock);
1585 cl_put_grouplock(&grouplock);
1586 CDEBUG(D_INFO, "group lock %lu released\n", arg);
1591 * Close inode open handle
1593 * \param dentry [in] dentry which contains the inode
1594 * \param it [in,out] intent which contains open info and result
1597 * \retval <0 failure
1599 int ll_release_openhandle(struct dentry *dentry, struct lookup_intent *it)
1601 struct inode *inode = dentry->d_inode;
1602 struct obd_client_handle *och;
1608 /* Root ? Do nothing. */
1609 if (dentry->d_inode->i_sb->s_root == dentry)
1612 /* No open handle to close? Move away */
1613 if (!it_disposition(it, DISP_OPEN_OPEN))
1616 LASSERT(it_open_error(DISP_OPEN_OPEN, it) == 0);
1618 OBD_ALLOC(och, sizeof(*och));
1620 GOTO(out, rc = -ENOMEM);
1622 ll_och_fill(ll_i2sbi(inode)->ll_md_exp,
1623 ll_i2info(inode), it, och);
1625 rc = ll_close_inode_openhandle(ll_i2sbi(inode)->ll_md_exp,
1628 /* this one is in place of ll_file_open */
1629 if (it_disposition(it, DISP_ENQ_OPEN_REF)) {
1630 ptlrpc_req_finished(it->d.lustre.it_data);
1631 it_clear_disposition(it, DISP_ENQ_OPEN_REF);
1637 * Get size for inode for which FIEMAP mapping is requested.
1638 * Make the FIEMAP get_info call and returns the result.
1640 int ll_do_fiemap(struct inode *inode, struct ll_user_fiemap *fiemap,
1643 struct obd_export *exp = ll_i2dtexp(inode);
1644 struct lov_stripe_md *lsm = NULL;
1645 struct ll_fiemap_info_key fm_key = { .name = KEY_FIEMAP, };
1646 int vallen = num_bytes;
1650 /* Checks for fiemap flags */
1651 if (fiemap->fm_flags & ~LUSTRE_FIEMAP_FLAGS_COMPAT) {
1652 fiemap->fm_flags &= ~LUSTRE_FIEMAP_FLAGS_COMPAT;
1656 /* Check for FIEMAP_FLAG_SYNC */
1657 if (fiemap->fm_flags & FIEMAP_FLAG_SYNC) {
1658 rc = filemap_fdatawrite(inode->i_mapping);
1663 lsm = ccc_inode_lsm_get(inode);
1667 /* If the stripe_count > 1 and the application does not understand
1668 * DEVICE_ORDER flag, then it cannot interpret the extents correctly.
1670 if (lsm->lsm_stripe_count > 1 &&
1671 !(fiemap->fm_flags & FIEMAP_FLAG_DEVICE_ORDER))
1672 GOTO(out, rc = -EOPNOTSUPP);
1674 fm_key.oa.o_id = lsm->lsm_object_id;
1675 fm_key.oa.o_seq = lsm->lsm_object_seq;
1676 fm_key.oa.o_valid = OBD_MD_FLID | OBD_MD_FLGROUP;
1678 obdo_from_inode(&fm_key.oa, inode, OBD_MD_FLSIZE);
1679 obdo_set_parent_fid(&fm_key.oa, &ll_i2info(inode)->lli_fid);
1680 /* If filesize is 0, then there would be no objects for mapping */
1681 if (fm_key.oa.o_size == 0) {
1682 fiemap->fm_mapped_extents = 0;
1686 memcpy(&fm_key.fiemap, fiemap, sizeof(*fiemap));
1688 rc = obd_get_info(NULL, exp, sizeof(fm_key), &fm_key, &vallen,
1691 CERROR("obd_get_info failed: rc = %d\n", rc);
1694 ccc_inode_lsm_put(inode, lsm);
1698 int ll_fid2path(struct inode *inode, void *arg)
1700 struct obd_export *exp = ll_i2mdexp(inode);
1701 struct getinfo_fid2path *gfout, *gfin;
1705 if (!cfs_capable(CFS_CAP_DAC_READ_SEARCH) &&
1706 !(ll_i2sbi(inode)->ll_flags & LL_SBI_USER_FID2PATH))
1709 /* Need to get the buflen */
1710 OBD_ALLOC_PTR(gfin);
1713 if (cfs_copy_from_user(gfin, arg, sizeof(*gfin))) {
1718 outsize = sizeof(*gfout) + gfin->gf_pathlen;
1719 OBD_ALLOC(gfout, outsize);
1720 if (gfout == NULL) {
1724 memcpy(gfout, gfin, sizeof(*gfout));
1727 /* Call mdc_iocontrol */
1728 rc = obd_iocontrol(OBD_IOC_FID2PATH, exp, outsize, gfout, NULL);
1731 if (cfs_copy_to_user(arg, gfout, outsize))
1735 OBD_FREE(gfout, outsize);
1739 static int ll_ioctl_fiemap(struct inode *inode, unsigned long arg)
1741 struct ll_user_fiemap *fiemap_s;
1742 size_t num_bytes, ret_bytes;
1743 unsigned int extent_count;
1746 /* Get the extent count so we can calculate the size of
1747 * required fiemap buffer */
1748 if (get_user(extent_count,
1749 &((struct ll_user_fiemap __user *)arg)->fm_extent_count))
1751 num_bytes = sizeof(*fiemap_s) + (extent_count *
1752 sizeof(struct ll_fiemap_extent));
1754 OBD_ALLOC_LARGE(fiemap_s, num_bytes);
1755 if (fiemap_s == NULL)
1758 /* get the fiemap value */
1759 if (copy_from_user(fiemap_s,(struct ll_user_fiemap __user *)arg,
1761 GOTO(error, rc = -EFAULT);
1763 /* If fm_extent_count is non-zero, read the first extent since
1764 * it is used to calculate end_offset and device from previous
1767 if (copy_from_user(&fiemap_s->fm_extents[0],
1768 (char __user *)arg + sizeof(*fiemap_s),
1769 sizeof(struct ll_fiemap_extent)))
1770 GOTO(error, rc = -EFAULT);
1773 rc = ll_do_fiemap(inode, fiemap_s, num_bytes);
1777 ret_bytes = sizeof(struct ll_user_fiemap);
1779 if (extent_count != 0)
1780 ret_bytes += (fiemap_s->fm_mapped_extents *
1781 sizeof(struct ll_fiemap_extent));
1783 if (copy_to_user((void *)arg, fiemap_s, ret_bytes))
1787 OBD_FREE_LARGE(fiemap_s, num_bytes);
1792 * Read the data_version for inode.
1794 * This value is computed using stripe object version on OST.
1795 * Version is computed using server side locking.
1797 * @param extent_lock Take extent lock. Not needed if a process is already
1798 * holding the OST object group locks.
1800 static int ll_data_version(struct inode *inode, __u64 *data_version,
1803 struct lov_stripe_md *lsm = NULL;
1804 struct ll_sb_info *sbi = ll_i2sbi(inode);
1805 struct obdo *obdo = NULL;
1809 /* If no stripe, we consider version is 0. */
1810 lsm = ccc_inode_lsm_get(inode);
1813 CDEBUG(D_INODE, "No object for inode\n");
1817 OBD_ALLOC_PTR(obdo);
1819 ccc_inode_lsm_put(inode, lsm);
1823 rc = ll_lsm_getattr(lsm, sbi->ll_dt_exp, NULL, obdo, 0, extent_lock);
1825 if (!(obdo->o_valid & OBD_MD_FLDATAVERSION))
1828 *data_version = obdo->o_data_version;
1832 ccc_inode_lsm_put(inode, lsm);
1837 long ll_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1839 struct inode *inode = file->f_dentry->d_inode;
1840 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
1845 CDEBUG(D_VFSTRACE, "VFS Op:inode=%lu/%u(%p),cmd=%x\n", inode->i_ino,
1846 inode->i_generation, inode, cmd);
1847 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_IOCTL, 1);
1849 /* asm-ppc{,64} declares TCGETS, et. al. as type 't' not 'T' */
1850 if (_IOC_TYPE(cmd) == 'T' || _IOC_TYPE(cmd) == 't') /* tty ioctls */
1854 case LL_IOC_GETFLAGS:
1855 /* Get the current value of the file flags */
1856 return put_user(fd->fd_flags, (int *)arg);
1857 case LL_IOC_SETFLAGS:
1858 case LL_IOC_CLRFLAGS:
1859 /* Set or clear specific file flags */
1860 /* XXX This probably needs checks to ensure the flags are
1861 * not abused, and to handle any flag side effects.
1863 if (get_user(flags, (int *) arg))
1866 if (cmd == LL_IOC_SETFLAGS) {
1867 if ((flags & LL_FILE_IGNORE_LOCK) &&
1868 !(file->f_flags & O_DIRECT)) {
1869 CERROR("%s: unable to disable locking on "
1870 "non-O_DIRECT file\n", current->comm);
1874 fd->fd_flags |= flags;
1876 fd->fd_flags &= ~flags;
1879 case LL_IOC_LOV_SETSTRIPE:
1880 RETURN(ll_lov_setstripe(inode, file, arg));
1881 case LL_IOC_LOV_SETEA:
1882 RETURN(ll_lov_setea(inode, file, arg));
1883 case LL_IOC_LOV_GETSTRIPE:
1884 RETURN(ll_lov_getstripe(inode, arg));
1885 case LL_IOC_RECREATE_OBJ:
1886 RETURN(ll_lov_recreate_obj(inode, arg));
1887 case LL_IOC_RECREATE_FID:
1888 RETURN(ll_lov_recreate_fid(inode, arg));
1889 case FSFILT_IOC_FIEMAP:
1890 RETURN(ll_ioctl_fiemap(inode, arg));
1891 case FSFILT_IOC_GETFLAGS:
1892 case FSFILT_IOC_SETFLAGS:
1893 RETURN(ll_iocontrol(inode, file, cmd, arg));
1894 case FSFILT_IOC_GETVERSION_OLD:
1895 case FSFILT_IOC_GETVERSION:
1896 RETURN(put_user(inode->i_generation, (int *)arg));
1897 case LL_IOC_GROUP_LOCK:
1898 RETURN(ll_get_grouplock(inode, file, arg));
1899 case LL_IOC_GROUP_UNLOCK:
1900 RETURN(ll_put_grouplock(inode, file, arg));
1901 case IOC_OBD_STATFS:
1902 RETURN(ll_obd_statfs(inode, (void *)arg));
1904 /* We need to special case any other ioctls we want to handle,
1905 * to send them to the MDS/OST as appropriate and to properly
1906 * network encode the arg field.
1907 case FSFILT_IOC_SETVERSION_OLD:
1908 case FSFILT_IOC_SETVERSION:
1910 case LL_IOC_FLUSHCTX:
1911 RETURN(ll_flush_ctx(inode));
1912 case LL_IOC_PATH2FID: {
1913 if (cfs_copy_to_user((void *)arg, ll_inode2fid(inode),
1914 sizeof(struct lu_fid)))
1919 case OBD_IOC_FID2PATH:
1920 RETURN(ll_fid2path(inode, (void *)arg));
1921 case LL_IOC_DATA_VERSION: {
1922 struct ioc_data_version idv;
1925 if (cfs_copy_from_user(&idv, (char *)arg, sizeof(idv)))
1928 rc = ll_data_version(inode, &idv.idv_version,
1929 !(idv.idv_flags & LL_DV_NOFLUSH));
1932 cfs_copy_to_user((char *) arg, &idv, sizeof(idv)))
1938 case LL_IOC_GET_MDTIDX: {
1941 mdtidx = ll_get_mdt_idx(inode);
1945 if (put_user((int)mdtidx, (int*)arg))
1950 case OBD_IOC_GETDTNAME:
1951 case OBD_IOC_GETMDNAME:
1952 RETURN(ll_get_obd_name(inode, cmd, arg));
1957 ll_iocontrol_call(inode, file, cmd, arg, &err))
1960 RETURN(obd_iocontrol(cmd, ll_i2dtexp(inode), 0, NULL,
1966 #ifndef HAVE_FILE_LLSEEK_SIZE
1967 static inline loff_t
1968 llseek_execute(struct file *file, loff_t offset, loff_t maxsize)
1970 if (offset < 0 && !(file->f_mode & FMODE_UNSIGNED_OFFSET))
1972 if (offset > maxsize)
1975 if (offset != file->f_pos) {
1976 file->f_pos = offset;
1977 file->f_version = 0;
1983 generic_file_llseek_size(struct file *file, loff_t offset, int origin,
1984 loff_t maxsize, loff_t eof)
1986 struct inode *inode = file->f_dentry->d_inode;
1994 * Here we special-case the lseek(fd, 0, SEEK_CUR)
1995 * position-querying operation. Avoid rewriting the "same"
1996 * f_pos value back to the file because a concurrent read(),
1997 * write() or lseek() might have altered it
2002 * f_lock protects against read/modify/write race with other
2003 * SEEK_CURs. Note that parallel writes and reads behave
2006 mutex_lock(&inode->i_mutex);
2007 offset = llseek_execute(file, file->f_pos + offset, maxsize);
2008 mutex_unlock(&inode->i_mutex);
2012 * In the generic case the entire file is data, so as long as
2013 * offset isn't at the end of the file then the offset is data.
2020 * There is a virtual hole at the end of the file, so as long as
2021 * offset isn't i_size or larger, return i_size.
2029 return llseek_execute(file, offset, maxsize);
2033 loff_t ll_file_seek(struct file *file, loff_t offset, int origin)
2035 struct inode *inode = file->f_dentry->d_inode;
2036 loff_t retval, eof = 0;
2039 retval = offset + ((origin == SEEK_END) ? i_size_read(inode) :
2040 (origin == SEEK_CUR) ? file->f_pos : 0);
2041 CDEBUG(D_VFSTRACE, "VFS Op:inode=%lu/%u(%p), to=%llu=%#llx(%d)\n",
2042 inode->i_ino, inode->i_generation, inode, retval, retval,
2044 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_LLSEEK, 1);
2046 if (origin == SEEK_END || origin == SEEK_HOLE || origin == SEEK_DATA) {
2047 retval = ll_glimpse_size(inode);
2050 eof = i_size_read(inode);
2053 retval = generic_file_llseek_size(file, offset, origin,
2054 ll_file_maxbytes(inode), eof);
2058 int ll_flush(struct file *file, fl_owner_t id)
2060 struct inode *inode = file->f_dentry->d_inode;
2061 struct ll_inode_info *lli = ll_i2info(inode);
2062 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
2065 LASSERT(!S_ISDIR(inode->i_mode));
2067 /* catch async errors that were recorded back when async writeback
2068 * failed for pages in this mapping. */
2069 rc = lli->lli_async_rc;
2070 lli->lli_async_rc = 0;
2071 err = lov_read_and_clear_async_rc(lli->lli_clob);
2075 /* The application has been told write failure already.
2076 * Do not report failure again. */
2077 if (fd->fd_write_failed)
2079 return rc ? -EIO : 0;
2083 * Called to make sure a portion of file has been written out.
2084 * if @local_only is not true, it will send OST_SYNC RPCs to ost.
2086 * Return how many pages have been written.
2088 int cl_sync_file_range(struct inode *inode, loff_t start, loff_t end,
2089 enum cl_fsync_mode mode)
2091 struct cl_env_nest nest;
2094 struct obd_capa *capa = NULL;
2095 struct cl_fsync_io *fio;
2099 if (mode != CL_FSYNC_NONE && mode != CL_FSYNC_LOCAL &&
2100 mode != CL_FSYNC_DISCARD && mode != CL_FSYNC_ALL)
2103 env = cl_env_nested_get(&nest);
2105 RETURN(PTR_ERR(env));
2107 capa = ll_osscapa_get(inode, CAPA_OPC_OSS_WRITE);
2109 io = ccc_env_thread_io(env);
2110 io->ci_obj = cl_i2info(inode)->lli_clob;
2111 io->ci_ignore_layout = 1;
2113 /* initialize parameters for sync */
2114 fio = &io->u.ci_fsync;
2115 fio->fi_capa = capa;
2116 fio->fi_start = start;
2118 fio->fi_fid = ll_inode2fid(inode);
2119 fio->fi_mode = mode;
2120 fio->fi_nr_written = 0;
2122 if (cl_io_init(env, io, CIT_FSYNC, io->ci_obj) == 0)
2123 result = cl_io_loop(env, io);
2125 result = io->ci_result;
2127 result = fio->fi_nr_written;
2128 cl_io_fini(env, io);
2129 cl_env_nested_put(&nest, env);
2136 #ifdef HAVE_FILE_FSYNC_4ARGS
2137 int ll_fsync(struct file *file, loff_t start, loff_t end, int data)
2138 #elif defined(HAVE_FILE_FSYNC_2ARGS)
2139 int ll_fsync(struct file *file, int data)
2141 int ll_fsync(struct file *file, struct dentry *dentry, int data)
2144 struct inode *inode = file->f_dentry->d_inode;
2145 struct ll_inode_info *lli = ll_i2info(inode);
2146 struct ptlrpc_request *req;
2147 struct obd_capa *oc;
2151 CDEBUG(D_VFSTRACE, "VFS Op:inode=%lu/%u(%p)\n", inode->i_ino,
2152 inode->i_generation, inode);
2153 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_FSYNC, 1);
2155 #ifdef HAVE_FILE_FSYNC_4ARGS
2156 rc = filemap_write_and_wait_range(inode->i_mapping, start, end);
2157 mutex_lock(&inode->i_mutex);
2159 /* fsync's caller has already called _fdata{sync,write}, we want
2160 * that IO to finish before calling the osc and mdc sync methods */
2161 rc = filemap_fdatawait(inode->i_mapping);
2164 /* catch async errors that were recorded back when async writeback
2165 * failed for pages in this mapping. */
2166 if (!S_ISDIR(inode->i_mode)) {
2167 err = lli->lli_async_rc;
2168 lli->lli_async_rc = 0;
2171 err = lov_read_and_clear_async_rc(lli->lli_clob);
2176 oc = ll_mdscapa_get(inode);
2177 err = md_sync(ll_i2sbi(inode)->ll_md_exp, ll_inode2fid(inode), oc,
2183 ptlrpc_req_finished(req);
2186 struct ll_file_data *fd = LUSTRE_FPRIVATE(file);
2188 err = cl_sync_file_range(inode, 0, OBD_OBJECT_EOF,
2190 if (rc == 0 && err < 0)
2193 fd->fd_write_failed = true;
2195 fd->fd_write_failed = false;
2198 #ifdef HAVE_FILE_FSYNC_4ARGS
2199 mutex_unlock(&inode->i_mutex);
2204 int ll_file_flock(struct file *file, int cmd, struct file_lock *file_lock)
2206 struct inode *inode = file->f_dentry->d_inode;
2207 struct ll_sb_info *sbi = ll_i2sbi(inode);
2208 struct ldlm_enqueue_info einfo = { .ei_type = LDLM_FLOCK,
2209 .ei_cb_cp =ldlm_flock_completion_ast,
2210 .ei_cbdata = file_lock };
2211 struct md_op_data *op_data;
2212 struct lustre_handle lockh = {0};
2213 ldlm_policy_data_t flock = {{0}};
2218 CDEBUG(D_VFSTRACE, "VFS Op:inode=%lu file_lock=%p\n",
2219 inode->i_ino, file_lock);
2221 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_FLOCK, 1);
2223 if (file_lock->fl_flags & FL_FLOCK) {
2224 LASSERT((cmd == F_SETLKW) || (cmd == F_SETLK));
2225 /* flocks are whole-file locks */
2226 flock.l_flock.end = OFFSET_MAX;
2227 /* For flocks owner is determined by the local file desctiptor*/
2228 flock.l_flock.owner = (unsigned long)file_lock->fl_file;
2229 } else if (file_lock->fl_flags & FL_POSIX) {
2230 flock.l_flock.owner = (unsigned long)file_lock->fl_owner;
2231 flock.l_flock.start = file_lock->fl_start;
2232 flock.l_flock.end = file_lock->fl_end;
2236 flock.l_flock.pid = file_lock->fl_pid;
2238 /* Somewhat ugly workaround for svc lockd.
2239 * lockd installs custom fl_lmops->lm_compare_owner that checks
2240 * for the fl_owner to be the same (which it always is on local node
2241 * I guess between lockd processes) and then compares pid.
2242 * As such we assign pid to the owner field to make it all work,
2243 * conflict with normal locks is unlikely since pid space and
2244 * pointer space for current->files are not intersecting */
2245 if (file_lock->fl_lmops && file_lock->fl_lmops->lm_compare_owner)
2246 flock.l_flock.owner = (unsigned long)file_lock->fl_pid;
2248 switch (file_lock->fl_type) {
2250 einfo.ei_mode = LCK_PR;
2253 /* An unlock request may or may not have any relation to
2254 * existing locks so we may not be able to pass a lock handle
2255 * via a normal ldlm_lock_cancel() request. The request may even
2256 * unlock a byte range in the middle of an existing lock. In
2257 * order to process an unlock request we need all of the same
2258 * information that is given with a normal read or write record
2259 * lock request. To avoid creating another ldlm unlock (cancel)
2260 * message we'll treat a LCK_NL flock request as an unlock. */
2261 einfo.ei_mode = LCK_NL;
2264 einfo.ei_mode = LCK_PW;
2267 CDEBUG(D_INFO, "Unknown fcntl lock type: %d\n",
2268 file_lock->fl_type);
2283 flags = LDLM_FL_BLOCK_NOWAIT;
2289 flags = LDLM_FL_TEST_LOCK;
2290 /* Save the old mode so that if the mode in the lock changes we
2291 * can decrement the appropriate reader or writer refcount. */
2292 file_lock->fl_type = einfo.ei_mode;
2295 CERROR("unknown fcntl lock command: %d\n", cmd);
2299 op_data = ll_prep_md_op_data(NULL, inode, NULL, NULL, 0, 0,
2300 LUSTRE_OPC_ANY, NULL);
2301 if (IS_ERR(op_data))
2302 RETURN(PTR_ERR(op_data));
2304 CDEBUG(D_DLMTRACE, "inode=%lu, pid=%u, flags=%#x, mode=%u, "
2305 "start="LPU64", end="LPU64"\n", inode->i_ino, flock.l_flock.pid,
2306 flags, einfo.ei_mode, flock.l_flock.start, flock.l_flock.end);
2308 rc = md_enqueue(sbi->ll_md_exp, &einfo, NULL,
2309 op_data, &lockh, &flock, 0, NULL /* req */, flags);
2311 ll_finish_md_op_data(op_data);
2313 if ((file_lock->fl_flags & FL_FLOCK) &&
2314 (rc == 0 || file_lock->fl_type == F_UNLCK))
2315 flock_lock_file_wait(file, file_lock);
2316 if ((file_lock->fl_flags & FL_POSIX) &&
2317 (rc == 0 || file_lock->fl_type == F_UNLCK) &&
2318 !(flags & LDLM_FL_TEST_LOCK))
2319 posix_lock_file_wait(file, file_lock);
2324 int ll_file_noflock(struct file *file, int cmd, struct file_lock *file_lock)
2332 * test if some locks matching bits and l_req_mode are acquired
2333 * - bits can be in different locks
2334 * - if found clear the common lock bits in *bits
2335 * - the bits not found, are kept in *bits
2337 * \param bits [IN] searched lock bits [IN]
2338 * \param l_req_mode [IN] searched lock mode
2339 * \retval boolean, true iff all bits are found
2341 int ll_have_md_lock(struct inode *inode, __u64 *bits, ldlm_mode_t l_req_mode)
2343 struct lustre_handle lockh;
2344 ldlm_policy_data_t policy;
2345 ldlm_mode_t mode = (l_req_mode == LCK_MINMODE) ?
2346 (LCK_CR|LCK_CW|LCK_PR|LCK_PW) : l_req_mode;
2355 fid = &ll_i2info(inode)->lli_fid;
2356 CDEBUG(D_INFO, "trying to match res "DFID" mode %s\n", PFID(fid),
2357 ldlm_lockname[mode]);
2359 flags = LDLM_FL_BLOCK_GRANTED | LDLM_FL_CBPENDING | LDLM_FL_TEST_LOCK;
2360 for (i = 0; i < MDS_INODELOCK_MAXSHIFT && *bits != 0; i++) {
2361 policy.l_inodebits.bits = *bits & (1 << i);
2362 if (policy.l_inodebits.bits == 0)
2365 if (md_lock_match(ll_i2mdexp(inode), flags, fid, LDLM_IBITS,
2366 &policy, mode, &lockh)) {
2367 struct ldlm_lock *lock;
2369 lock = ldlm_handle2lock(&lockh);
2372 ~(lock->l_policy_data.l_inodebits.bits);
2373 LDLM_LOCK_PUT(lock);
2375 *bits &= ~policy.l_inodebits.bits;
2382 ldlm_mode_t ll_take_md_lock(struct inode *inode, __u64 bits,
2383 struct lustre_handle *lockh, __u64 flags)
2385 ldlm_policy_data_t policy = { .l_inodebits = {bits}};
2390 fid = &ll_i2info(inode)->lli_fid;
2391 CDEBUG(D_INFO, "trying to match res "DFID"\n", PFID(fid));
2393 rc = md_lock_match(ll_i2mdexp(inode), LDLM_FL_BLOCK_GRANTED|flags,
2394 fid, LDLM_IBITS, &policy,
2395 LCK_CR|LCK_CW|LCK_PR|LCK_PW, lockh);
2399 static int ll_inode_revalidate_fini(struct inode *inode, int rc)
2401 /* Already unlinked. Just update nlink and return success */
2402 if (rc == -ENOENT) {
2404 /* This path cannot be hit for regular files unless in
2405 * case of obscure races, so no need to to validate
2407 if (!S_ISREG(inode->i_mode) && !S_ISDIR(inode->i_mode))
2409 } else if (rc != 0) {
2410 CERROR("%s: revalidate FID "DFID" error: rc = %d\n",
2411 ll_get_fsname(inode->i_sb, NULL, 0),
2412 PFID(ll_inode2fid(inode)), rc);
2418 int __ll_inode_revalidate_it(struct dentry *dentry, struct lookup_intent *it,
2421 struct inode *inode = dentry->d_inode;
2422 struct ptlrpc_request *req = NULL;
2423 struct obd_export *exp;
2427 LASSERT(inode != NULL);
2429 CDEBUG(D_VFSTRACE, "VFS Op:inode=%lu/%u(%p),name=%s\n",
2430 inode->i_ino, inode->i_generation, inode, dentry->d_name.name);
2432 exp = ll_i2mdexp(inode);
2434 /* XXX: Enable OBD_CONNECT_ATTRFID to reduce unnecessary getattr RPC.
2435 * But under CMD case, it caused some lock issues, should be fixed
2436 * with new CMD ibits lock. See bug 12718 */
2437 if (exp->exp_connect_flags & OBD_CONNECT_ATTRFID) {
2438 struct lookup_intent oit = { .it_op = IT_GETATTR };
2439 struct md_op_data *op_data;
2441 if (ibits == MDS_INODELOCK_LOOKUP)
2442 oit.it_op = IT_LOOKUP;
2444 /* Call getattr by fid, so do not provide name at all. */
2445 op_data = ll_prep_md_op_data(NULL, dentry->d_parent->d_inode,
2446 dentry->d_inode, NULL, 0, 0,
2447 LUSTRE_OPC_ANY, NULL);
2448 if (IS_ERR(op_data))
2449 RETURN(PTR_ERR(op_data));
2451 oit.it_create_mode |= M_CHECK_STALE;
2452 rc = md_intent_lock(exp, op_data, NULL, 0,
2453 /* we are not interested in name
2456 ll_md_blocking_ast, 0);
2457 ll_finish_md_op_data(op_data);
2458 oit.it_create_mode &= ~M_CHECK_STALE;
2460 rc = ll_inode_revalidate_fini(inode, rc);
2464 rc = ll_revalidate_it_finish(req, &oit, dentry);
2466 ll_intent_release(&oit);
2470 /* Unlinked? Unhash dentry, so it is not picked up later by
2471 do_lookup() -> ll_revalidate_it(). We cannot use d_drop
2472 here to preserve get_cwd functionality on 2.6.
2474 if (!dentry->d_inode->i_nlink)
2475 d_lustre_invalidate(dentry);
2477 ll_lookup_finish_locks(&oit, dentry);
2478 } else if (!ll_have_md_lock(dentry->d_inode, &ibits, LCK_MINMODE)) {
2479 struct ll_sb_info *sbi = ll_i2sbi(dentry->d_inode);
2480 obd_valid valid = OBD_MD_FLGETATTR;
2481 struct md_op_data *op_data;
2484 if (S_ISREG(inode->i_mode)) {
2485 rc = ll_get_max_mdsize(sbi, &ealen);
2488 valid |= OBD_MD_FLEASIZE | OBD_MD_FLMODEASIZE;
2491 op_data = ll_prep_md_op_data(NULL, inode, NULL, NULL,
2492 0, ealen, LUSTRE_OPC_ANY,
2494 if (IS_ERR(op_data))
2495 RETURN(PTR_ERR(op_data));
2497 op_data->op_valid = valid;
2498 /* Once OBD_CONNECT_ATTRFID is not supported, we can't find one
2499 * capa for this inode. Because we only keep capas of dirs
2501 rc = md_getattr(sbi->ll_md_exp, op_data, &req);
2502 ll_finish_md_op_data(op_data);
2504 rc = ll_inode_revalidate_fini(inode, rc);
2508 rc = ll_prep_inode(&inode, req, NULL, NULL);
2511 ptlrpc_req_finished(req);
2515 int ll_inode_revalidate_it(struct dentry *dentry, struct lookup_intent *it,
2518 struct inode *inode = dentry->d_inode;
2522 rc = __ll_inode_revalidate_it(dentry, it, ibits);
2526 /* if object isn't regular file, don't validate size */
2527 if (!S_ISREG(inode->i_mode)) {
2528 LTIME_S(inode->i_atime) = ll_i2info(inode)->lli_lvb.lvb_atime;
2529 LTIME_S(inode->i_mtime) = ll_i2info(inode)->lli_lvb.lvb_mtime;
2530 LTIME_S(inode->i_ctime) = ll_i2info(inode)->lli_lvb.lvb_ctime;
2532 rc = ll_glimpse_size(inode);
2537 int ll_getattr_it(struct vfsmount *mnt, struct dentry *de,
2538 struct lookup_intent *it, struct kstat *stat)
2540 struct inode *inode = de->d_inode;
2541 struct ll_sb_info *sbi = ll_i2sbi(inode);
2542 struct ll_inode_info *lli = ll_i2info(inode);
2545 res = ll_inode_revalidate_it(de, it, MDS_INODELOCK_UPDATE |
2546 MDS_INODELOCK_LOOKUP);
2547 ll_stats_ops_tally(sbi, LPROC_LL_GETATTR, 1);
2552 stat->dev = inode->i_sb->s_dev;
2553 if (ll_need_32bit_api(sbi))
2554 stat->ino = cl_fid_build_ino(&lli->lli_fid, 1);
2556 stat->ino = inode->i_ino;
2557 stat->mode = inode->i_mode;
2558 stat->nlink = inode->i_nlink;
2559 stat->uid = inode->i_uid;
2560 stat->gid = inode->i_gid;
2561 stat->rdev = inode->i_rdev;
2562 stat->atime = inode->i_atime;
2563 stat->mtime = inode->i_mtime;
2564 stat->ctime = inode->i_ctime;
2565 stat->blksize = 1 << inode->i_blkbits;
2567 stat->size = i_size_read(inode);
2568 stat->blocks = inode->i_blocks;
2572 int ll_getattr(struct vfsmount *mnt, struct dentry *de, struct kstat *stat)
2574 struct lookup_intent it = { .it_op = IT_GETATTR };
2576 return ll_getattr_it(mnt, de, &it, stat);
2579 #ifdef HAVE_LINUX_FIEMAP_H
2580 int ll_fiemap(struct inode *inode, struct fiemap_extent_info *fieinfo,
2581 __u64 start, __u64 len)
2585 struct ll_user_fiemap *fiemap;
2586 unsigned int extent_count = fieinfo->fi_extents_max;
2588 num_bytes = sizeof(*fiemap) + (extent_count *
2589 sizeof(struct ll_fiemap_extent));
2590 OBD_ALLOC_LARGE(fiemap, num_bytes);
2595 fiemap->fm_flags = fieinfo->fi_flags;
2596 fiemap->fm_extent_count = fieinfo->fi_extents_max;
2597 fiemap->fm_start = start;
2598 fiemap->fm_length = len;
2599 memcpy(&fiemap->fm_extents[0], fieinfo->fi_extents_start,
2600 sizeof(struct ll_fiemap_extent));
2602 rc = ll_do_fiemap(inode, fiemap, num_bytes);
2604 fieinfo->fi_flags = fiemap->fm_flags;
2605 fieinfo->fi_extents_mapped = fiemap->fm_mapped_extents;
2606 memcpy(fieinfo->fi_extents_start, &fiemap->fm_extents[0],
2607 fiemap->fm_mapped_extents * sizeof(struct ll_fiemap_extent));
2609 OBD_FREE_LARGE(fiemap, num_bytes);
2614 struct posix_acl * ll_get_acl(struct inode *inode, int type)
2616 struct ll_inode_info *lli = ll_i2info(inode);
2617 struct posix_acl *acl = NULL;
2620 spin_lock(&lli->lli_lock);
2621 /* VFS' acl_permission_check->check_acl will release the refcount */
2622 acl = posix_acl_dup(lli->lli_posix_acl);
2623 spin_unlock(&lli->lli_lock);
2628 #ifndef HAVE_GENERIC_PERMISSION_2ARGS
2630 # ifdef HAVE_GENERIC_PERMISSION_4ARGS
2631 ll_check_acl(struct inode *inode, int mask, unsigned int flags)
2633 ll_check_acl(struct inode *inode, int mask)
2636 # ifdef CONFIG_FS_POSIX_ACL
2637 struct posix_acl *acl;
2641 # ifdef HAVE_GENERIC_PERMISSION_4ARGS
2642 if (flags & IPERM_FLAG_RCU)
2645 acl = ll_get_acl(inode, ACL_TYPE_ACCESS);
2650 rc = posix_acl_permission(inode, acl, mask);
2651 posix_acl_release(acl);
2654 # else /* !CONFIG_FS_POSIX_ACL */
2656 # endif /* CONFIG_FS_POSIX_ACL */
2658 #endif /* HAVE_GENERIC_PERMISSION_2ARGS */
2660 #ifdef HAVE_GENERIC_PERMISSION_4ARGS
2661 int ll_inode_permission(struct inode *inode, int mask, unsigned int flags)
2663 # ifdef HAVE_INODE_PERMISION_2ARGS
2664 int ll_inode_permission(struct inode *inode, int mask)
2666 int ll_inode_permission(struct inode *inode, int mask, struct nameidata *nd)
2673 #ifdef MAY_NOT_BLOCK
2674 if (mask & MAY_NOT_BLOCK)
2676 #elif defined(HAVE_GENERIC_PERMISSION_4ARGS)
2677 if (flags & IPERM_FLAG_RCU)
2681 /* as root inode are NOT getting validated in lookup operation,
2682 * need to do it before permission check. */
2684 if (inode == inode->i_sb->s_root->d_inode) {
2685 struct lookup_intent it = { .it_op = IT_LOOKUP };
2687 rc = __ll_inode_revalidate_it(inode->i_sb->s_root, &it,
2688 MDS_INODELOCK_LOOKUP);
2693 CDEBUG(D_VFSTRACE, "VFS Op:inode=%lu/%u(%p), inode mode %x mask %o\n",
2694 inode->i_ino, inode->i_generation, inode, inode->i_mode, mask);
2696 if (ll_i2sbi(inode)->ll_flags & LL_SBI_RMT_CLIENT)
2697 return lustre_check_remote_perm(inode, mask);
2699 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_INODE_PERM, 1);
2700 rc = ll_generic_permission(inode, mask, flags, ll_check_acl);
2705 #ifdef HAVE_FILE_READV
2706 #define READ_METHOD readv
2707 #define READ_FUNCTION ll_file_readv
2708 #define WRITE_METHOD writev
2709 #define WRITE_FUNCTION ll_file_writev
2711 #define READ_METHOD aio_read
2712 #define READ_FUNCTION ll_file_aio_read
2713 #define WRITE_METHOD aio_write
2714 #define WRITE_FUNCTION ll_file_aio_write
2717 /* -o localflock - only provides locally consistent flock locks */
2718 struct file_operations ll_file_operations = {
2719 .read = ll_file_read,
2720 .READ_METHOD = READ_FUNCTION,
2721 .write = ll_file_write,
2722 .WRITE_METHOD = WRITE_FUNCTION,
2723 .unlocked_ioctl = ll_file_ioctl,
2724 .open = ll_file_open,
2725 .release = ll_file_release,
2726 .mmap = ll_file_mmap,
2727 .llseek = ll_file_seek,
2728 #ifdef HAVE_KERNEL_SENDFILE
2729 .sendfile = ll_file_sendfile,
2731 #ifdef HAVE_KERNEL_SPLICE_READ
2732 .splice_read = ll_file_splice_read,
2738 struct file_operations ll_file_operations_flock = {
2739 .read = ll_file_read,
2740 .READ_METHOD = READ_FUNCTION,
2741 .write = ll_file_write,
2742 .WRITE_METHOD = WRITE_FUNCTION,
2743 .unlocked_ioctl = ll_file_ioctl,
2744 .open = ll_file_open,
2745 .release = ll_file_release,
2746 .mmap = ll_file_mmap,
2747 .llseek = ll_file_seek,
2748 #ifdef HAVE_KERNEL_SENDFILE
2749 .sendfile = ll_file_sendfile,
2751 #ifdef HAVE_KERNEL_SPLICE_READ
2752 .splice_read = ll_file_splice_read,
2756 .flock = ll_file_flock,
2757 .lock = ll_file_flock
2760 /* These are for -o noflock - to return ENOSYS on flock calls */
2761 struct file_operations ll_file_operations_noflock = {
2762 .read = ll_file_read,
2763 .READ_METHOD = READ_FUNCTION,
2764 .write = ll_file_write,
2765 .WRITE_METHOD = WRITE_FUNCTION,
2766 .unlocked_ioctl = ll_file_ioctl,
2767 .open = ll_file_open,
2768 .release = ll_file_release,
2769 .mmap = ll_file_mmap,
2770 .llseek = ll_file_seek,
2771 #ifdef HAVE_KERNEL_SENDFILE
2772 .sendfile = ll_file_sendfile,
2774 #ifdef HAVE_KERNEL_SPLICE_READ
2775 .splice_read = ll_file_splice_read,
2779 .flock = ll_file_noflock,
2780 .lock = ll_file_noflock
2783 struct inode_operations ll_file_inode_operations = {
2784 .setattr = ll_setattr,
2785 .getattr = ll_getattr,
2786 .permission = ll_inode_permission,
2787 .setxattr = ll_setxattr,
2788 .getxattr = ll_getxattr,
2789 .listxattr = ll_listxattr,
2790 .removexattr = ll_removexattr,
2791 #ifdef HAVE_LINUX_FIEMAP_H
2792 .fiemap = ll_fiemap,
2794 #ifdef HAVE_IOP_GET_ACL
2795 .get_acl = ll_get_acl,
2799 /* dynamic ioctl number support routins */
2800 static struct llioc_ctl_data {
2801 struct rw_semaphore ioc_sem;
2802 cfs_list_t ioc_head;
2804 __RWSEM_INITIALIZER(llioc.ioc_sem),
2805 CFS_LIST_HEAD_INIT(llioc.ioc_head)
2810 cfs_list_t iocd_list;
2811 unsigned int iocd_size;
2812 llioc_callback_t iocd_cb;
2813 unsigned int iocd_count;
2814 unsigned int iocd_cmd[0];
2817 void *ll_iocontrol_register(llioc_callback_t cb, int count, unsigned int *cmd)
2820 struct llioc_data *in_data = NULL;
2823 if (cb == NULL || cmd == NULL ||
2824 count > LLIOC_MAX_CMD || count < 0)
2827 size = sizeof(*in_data) + count * sizeof(unsigned int);
2828 OBD_ALLOC(in_data, size);
2829 if (in_data == NULL)
2832 memset(in_data, 0, sizeof(*in_data));
2833 in_data->iocd_size = size;
2834 in_data->iocd_cb = cb;
2835 in_data->iocd_count = count;
2836 memcpy(in_data->iocd_cmd, cmd, sizeof(unsigned int) * count);
2838 down_write(&llioc.ioc_sem);
2839 cfs_list_add_tail(&in_data->iocd_list, &llioc.ioc_head);
2840 up_write(&llioc.ioc_sem);
2845 void ll_iocontrol_unregister(void *magic)
2847 struct llioc_data *tmp;
2852 down_write(&llioc.ioc_sem);
2853 cfs_list_for_each_entry(tmp, &llioc.ioc_head, iocd_list) {
2855 unsigned int size = tmp->iocd_size;
2857 cfs_list_del(&tmp->iocd_list);
2858 up_write(&llioc.ioc_sem);
2860 OBD_FREE(tmp, size);
2864 up_write(&llioc.ioc_sem);
2866 CWARN("didn't find iocontrol register block with magic: %p\n", magic);
2869 EXPORT_SYMBOL(ll_iocontrol_register);
2870 EXPORT_SYMBOL(ll_iocontrol_unregister);
2872 enum llioc_iter ll_iocontrol_call(struct inode *inode, struct file *file,
2873 unsigned int cmd, unsigned long arg, int *rcp)
2875 enum llioc_iter ret = LLIOC_CONT;
2876 struct llioc_data *data;
2877 int rc = -EINVAL, i;
2879 down_read(&llioc.ioc_sem);
2880 cfs_list_for_each_entry(data, &llioc.ioc_head, iocd_list) {
2881 for (i = 0; i < data->iocd_count; i++) {
2882 if (cmd != data->iocd_cmd[i])
2885 ret = data->iocd_cb(inode, file, cmd, arg, data, &rc);
2889 if (ret == LLIOC_STOP)
2892 up_read(&llioc.ioc_sem);
2899 int ll_layout_conf(struct inode *inode, const struct cl_object_conf *conf)
2901 struct ll_inode_info *lli = ll_i2info(inode);
2902 struct cl_env_nest nest;
2907 if (lli->lli_clob == NULL)
2910 env = cl_env_nested_get(&nest);
2912 RETURN(PTR_ERR(env));
2914 result = cl_conf_set(env, lli->lli_clob, conf);
2915 cl_env_nested_put(&nest, env);
2917 if (conf->coc_opc == OBJECT_CONF_SET) {
2918 struct ldlm_lock *lock = conf->coc_lock;
2920 LASSERT(lock != NULL);
2921 LASSERT(ldlm_has_layout(lock));
2923 /* it can only be allowed to match after layout is
2924 * applied to inode otherwise false layout would be
2925 * seen. Applying layout shoud happen before dropping
2926 * the intent lock. */
2927 ldlm_lock_allow_match(lock);
2934 * Apply the layout to the inode. Layout lock is held and will be released
2937 static int ll_layout_lock_set(struct lustre_handle *lockh, ldlm_mode_t mode,
2938 struct inode *inode, __u32 *gen, bool reconf)
2940 struct ll_inode_info *lli = ll_i2info(inode);
2941 struct ll_sb_info *sbi = ll_i2sbi(inode);
2942 struct ldlm_lock *lock;
2943 struct lustre_md md = { NULL };
2944 struct cl_object_conf conf;
2949 LASSERT(lustre_handle_is_used(lockh));
2951 lock = ldlm_handle2lock(lockh);
2952 LASSERT(lock != NULL);
2953 LASSERT(ldlm_has_layout(lock));
2955 LDLM_DEBUG(lock, "File %p/"DFID" being reconfigured: %d.\n",
2956 inode, PFID(&lli->lli_fid), reconf);
2958 lock_res_and_lock(lock);
2959 lvb_ready = !!(lock->l_flags & LDLM_FL_LVB_READY);
2960 unlock_res_and_lock(lock);
2961 /* checking lvb_ready is racy but this is okay. The worst case is
2962 * that multi processes may configure the file on the same time. */
2963 if (lvb_ready || !reconf) {
2964 LDLM_LOCK_PUT(lock);
2968 /* layout_gen must be valid if layout lock is not
2969 * cancelled and stripe has already set */
2970 *gen = lli->lli_layout_gen;
2973 ldlm_lock_decref(lockh, mode);
2977 /* for layout lock, lmm is returned in lock's lvb.
2978 * lvb_data is immutable if the lock is held so it's safe to access it
2979 * without res lock. See the description in ldlm_lock_decref_internal()
2980 * for the condition to free lvb_data of layout lock */
2981 if (lock->l_lvb_data != NULL) {
2982 rc = obd_unpackmd(sbi->ll_dt_exp, &md.lsm,
2983 lock->l_lvb_data, lock->l_lvb_len);
2986 *gen = md.lsm->lsm_layout_gen;
2989 CERROR("%s: file "DFID" unpackmd error: %d\n",
2990 ll_get_fsname(inode->i_sb, NULL, 0),
2991 PFID(&lli->lli_fid), rc);
2995 LDLM_LOCK_PUT(lock);
2996 ldlm_lock_decref(lockh, mode);
3000 /* set layout to file. Unlikely this will fail as old layout was
3001 * surely eliminated */
3002 memset(&conf, 0, sizeof conf);
3003 conf.coc_opc = OBJECT_CONF_SET;
3004 conf.coc_inode = inode;
3005 conf.coc_lock = lock;
3006 conf.u.coc_md = &md;
3007 rc = ll_layout_conf(inode, &conf);
3008 LDLM_LOCK_PUT(lock);
3010 ldlm_lock_decref(lockh, mode);
3013 obd_free_memmd(sbi->ll_dt_exp, &md.lsm);
3015 /* wait for IO to complete if it's still being used. */
3017 CDEBUG(D_INODE, "%s: %p/"DFID" wait for layout reconf.\n",
3018 ll_get_fsname(inode->i_sb, NULL, 0),
3019 inode, PFID(&lli->lli_fid));
3021 memset(&conf, 0, sizeof conf);
3022 conf.coc_opc = OBJECT_CONF_WAIT;
3023 conf.coc_inode = inode;
3024 rc = ll_layout_conf(inode, &conf);
3028 CDEBUG(D_INODE, "file: "DFID" waiting layout return: %d.\n",
3029 PFID(&lli->lli_fid), rc);
3036 * This function checks if there exists a LAYOUT lock on the client side,
3037 * or enqueues it if it doesn't have one in cache.
3039 * This function will not hold layout lock so it may be revoked any time after
3040 * this function returns. Any operations depend on layout should be redone
3043 * This function should be called before lov_io_init() to get an uptodate
3044 * layout version, the caller should save the version number and after IO
3045 * is finished, this function should be called again to verify that layout
3046 * is not changed during IO time.
3048 int ll_layout_refresh(struct inode *inode, __u32 *gen)
3050 struct ll_inode_info *lli = ll_i2info(inode);
3051 struct ll_sb_info *sbi = ll_i2sbi(inode);
3052 struct md_op_data *op_data;
3053 struct lookup_intent it;
3054 struct lustre_handle lockh;
3056 struct ldlm_enqueue_info einfo = { .ei_type = LDLM_IBITS,
3058 .ei_cb_bl = ll_md_blocking_ast,
3059 .ei_cb_cp = ldlm_completion_ast,
3060 .ei_cbdata = inode };
3064 *gen = LL_LAYOUT_GEN_ZERO;
3065 if (!(sbi->ll_flags & LL_SBI_LAYOUT_LOCK))
3069 LASSERT(fid_is_sane(ll_inode2fid(inode)));
3070 LASSERT(S_ISREG(inode->i_mode));
3072 /* mostly layout lock is caching on the local side, so try to match
3073 * it before grabbing layout lock mutex. */
3074 mode = ll_take_md_lock(inode, MDS_INODELOCK_LAYOUT, &lockh, 0);
3075 if (mode != 0) { /* hit cached lock */
3076 rc = ll_layout_lock_set(&lockh, mode, inode, gen, false);
3080 /* better hold lli_layout_mutex to try again otherwise
3081 * it will have starvation problem. */
3084 /* take layout lock mutex to enqueue layout lock exclusively. */
3085 mutex_lock(&lli->lli_layout_mutex);
3088 /* try again. Maybe somebody else has done this. */
3089 mode = ll_take_md_lock(inode, MDS_INODELOCK_LAYOUT, &lockh, 0);
3090 if (mode != 0) { /* hit cached lock */
3091 rc = ll_layout_lock_set(&lockh, mode, inode, gen, true);
3095 mutex_unlock(&lli->lli_layout_mutex);
3099 op_data = ll_prep_md_op_data(NULL, inode, inode, NULL,
3100 0, 0, LUSTRE_OPC_ANY, NULL);
3101 if (IS_ERR(op_data)) {
3102 mutex_unlock(&lli->lli_layout_mutex);
3103 RETURN(PTR_ERR(op_data));
3106 /* have to enqueue one */
3107 memset(&it, 0, sizeof(it));
3108 it.it_op = IT_LAYOUT;
3109 lockh.cookie = 0ULL;
3111 LDLM_DEBUG_NOLOCK("%s: requeue layout lock for file %p/"DFID".\n",
3112 ll_get_fsname(inode->i_sb, NULL, 0), inode,
3113 PFID(&lli->lli_fid));
3115 rc = md_enqueue(sbi->ll_md_exp, &einfo, &it, op_data, &lockh,
3117 if (it.d.lustre.it_data != NULL)
3118 ptlrpc_req_finished(it.d.lustre.it_data);
3119 it.d.lustre.it_data = NULL;
3121 ll_finish_md_op_data(op_data);
3123 mode = it.d.lustre.it_lock_mode;
3124 it.d.lustre.it_lock_mode = 0;
3125 ll_intent_drop_lock(&it);
3128 /* set lock data in case this is a new lock */
3129 ll_set_lock_data(sbi->ll_md_exp, inode, &it, NULL);
3130 rc = ll_layout_lock_set(&lockh, mode, inode, gen, true);
3134 mutex_unlock(&lli->lli_layout_mutex);