4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 only,
8 * as published by the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License version 2 for more details (a copy is included
14 * in the LICENSE file that accompanied this code).
16 * You should have received a copy of the GNU General Public License
17 * version 2 along with this program; If not, see
18 * http://www.gnu.org/licenses/gpl-2.0.html
23 * Copyright (c) 2002, 2010, Oracle and/or its affiliates. All rights reserved.
24 * Use is subject to license terms.
26 * Copyright (c) 2011, 2017, Intel Corporation.
29 * This file is part of Lustre, http://www.lustre.org/
33 * Author: Peter Braam <braam@clusterfs.com>
34 * Author: Phil Schwan <phil@clusterfs.com>
35 * Author: Andreas Dilger <adilger@clusterfs.com>
38 #define DEBUG_SUBSYSTEM S_LLITE
39 #include <lustre_dlm.h>
40 #include <linux/pagemap.h>
41 #include <linux/file.h>
42 #include <linux/sched.h>
43 #include <linux/user_namespace.h>
44 #include <linux/uidgid.h>
45 #include <linux/falloc.h>
46 #include <linux/ktime.h>
48 #include <uapi/linux/lustre/lustre_ioctl.h>
49 #include <lustre_swab.h>
51 #include "cl_object.h"
52 #include "llite_internal.h"
53 #include "vvp_internal.h"
56 struct inode *sp_inode;
61 __u64 pa_data_version;
67 ll_put_grouplock(struct inode *inode, struct file *file, unsigned long arg);
69 static int ll_lease_close(struct obd_client_handle *och, struct inode *inode,
72 static struct ll_file_data *ll_file_data_get(void)
74 struct ll_file_data *fd;
76 OBD_SLAB_ALLOC_PTR_GFP(fd, ll_file_data_slab, GFP_NOFS);
80 fd->fd_write_failed = false;
81 pcc_file_init(&fd->fd_pcc_file);
86 static void ll_file_data_put(struct ll_file_data *fd)
89 OBD_SLAB_FREE_PTR(fd, ll_file_data_slab);
93 * Packs all the attributes into @op_data for the CLOSE rpc.
95 static void ll_prepare_close(struct inode *inode, struct md_op_data *op_data,
96 struct obd_client_handle *och)
100 ll_prep_md_op_data(op_data, inode, NULL, NULL,
101 0, 0, LUSTRE_OPC_ANY, NULL);
103 op_data->op_attr.ia_mode = inode->i_mode;
104 op_data->op_attr.ia_atime = inode->i_atime;
105 op_data->op_attr.ia_mtime = inode->i_mtime;
106 op_data->op_attr.ia_ctime = inode->i_ctime;
107 /* In case of encrypted file without the key, visible size was rounded
108 * up to next LUSTRE_ENCRYPTION_UNIT_SIZE, and clear text size was
109 * stored into lli_lazysize in ll_merge_attr(), so set proper file size
110 * now that we are closing.
112 if (llcrypt_require_key(inode) == -ENOKEY &&
113 ll_i2info(inode)->lli_attr_valid & OBD_MD_FLLAZYSIZE)
114 op_data->op_attr.ia_size = ll_i2info(inode)->lli_lazysize;
116 op_data->op_attr.ia_size = i_size_read(inode);
117 op_data->op_attr.ia_valid |= (ATTR_MODE | ATTR_ATIME | ATTR_ATIME_SET |
118 ATTR_MTIME | ATTR_MTIME_SET |
120 op_data->op_xvalid |= OP_XVALID_CTIME_SET;
121 op_data->op_attr_blocks = inode->i_blocks;
122 op_data->op_attr_flags = ll_inode_to_ext_flags(inode->i_flags);
123 if (test_bit(LLIF_PROJECT_INHERIT, &ll_i2info(inode)->lli_flags))
124 op_data->op_attr_flags |= LUSTRE_PROJINHERIT_FL;
125 op_data->op_open_handle = och->och_open_handle;
127 if (och->och_flags & FMODE_WRITE &&
128 test_and_clear_bit(LLIF_DATA_MODIFIED, &ll_i2info(inode)->lli_flags))
129 /* For HSM: if inode data has been modified, pack it so that
130 * MDT can set data dirty flag in the archive. */
131 op_data->op_bias |= MDS_DATA_MODIFIED;
137 * Perform a close, possibly with a bias.
138 * The meaning of "data" depends on the value of "bias".
140 * If \a bias is MDS_HSM_RELEASE then \a data is a pointer to the data version.
141 * If \a bias is MDS_CLOSE_LAYOUT_SWAP then \a data is a pointer to the inode to
144 static int ll_close_inode_openhandle(struct inode *inode,
145 struct obd_client_handle *och,
146 enum mds_op_bias bias, void *data)
148 struct obd_export *md_exp = ll_i2mdexp(inode);
149 const struct ll_inode_info *lli = ll_i2info(inode);
150 struct md_op_data *op_data;
151 struct ptlrpc_request *req = NULL;
155 if (class_exp2obd(md_exp) == NULL) {
156 CERROR("%s: invalid MDC connection handle closing "DFID"\n",
157 ll_i2sbi(inode)->ll_fsname, PFID(&lli->lli_fid));
161 OBD_ALLOC_PTR(op_data);
162 /* We leak openhandle and request here on error, but not much to be
163 * done in OOM case since app won't retry close on error either. */
165 GOTO(out, rc = -ENOMEM);
167 ll_prepare_close(inode, op_data, och);
169 case MDS_CLOSE_LAYOUT_MERGE:
170 /* merge blocks from the victim inode */
171 op_data->op_attr_blocks += ((struct inode *)data)->i_blocks;
172 op_data->op_attr.ia_valid |= ATTR_SIZE;
173 op_data->op_xvalid |= OP_XVALID_BLOCKS;
175 case MDS_CLOSE_LAYOUT_SPLIT:
176 case MDS_CLOSE_LAYOUT_SWAP: {
177 struct split_param *sp = data;
179 LASSERT(data != NULL);
180 op_data->op_bias |= bias;
181 op_data->op_data_version = 0;
182 op_data->op_lease_handle = och->och_lease_handle;
183 if (bias == MDS_CLOSE_LAYOUT_SPLIT) {
184 op_data->op_fid2 = *ll_inode2fid(sp->sp_inode);
185 op_data->op_mirror_id = sp->sp_mirror_id;
187 op_data->op_fid2 = *ll_inode2fid(data);
192 case MDS_CLOSE_RESYNC_DONE: {
193 struct ll_ioc_lease *ioc = data;
195 LASSERT(data != NULL);
196 op_data->op_attr_blocks +=
197 ioc->lil_count * op_data->op_attr_blocks;
198 op_data->op_attr.ia_valid |= ATTR_SIZE;
199 op_data->op_xvalid |= OP_XVALID_BLOCKS;
200 op_data->op_bias |= MDS_CLOSE_RESYNC_DONE;
202 op_data->op_lease_handle = och->och_lease_handle;
203 op_data->op_data = &ioc->lil_ids[0];
204 op_data->op_data_size =
205 ioc->lil_count * sizeof(ioc->lil_ids[0]);
209 case MDS_PCC_ATTACH: {
210 struct pcc_param *param = data;
212 LASSERT(data != NULL);
213 op_data->op_bias |= MDS_HSM_RELEASE | MDS_PCC_ATTACH;
214 op_data->op_archive_id = param->pa_archive_id;
215 op_data->op_data_version = param->pa_data_version;
216 op_data->op_lease_handle = och->och_lease_handle;
220 case MDS_HSM_RELEASE:
221 LASSERT(data != NULL);
222 op_data->op_bias |= MDS_HSM_RELEASE;
223 op_data->op_data_version = *(__u64 *)data;
224 op_data->op_lease_handle = och->och_lease_handle;
225 op_data->op_attr.ia_valid |= ATTR_SIZE;
226 op_data->op_xvalid |= OP_XVALID_BLOCKS;
230 LASSERT(data == NULL);
234 if (!(op_data->op_attr.ia_valid & ATTR_SIZE))
235 op_data->op_xvalid |= OP_XVALID_LAZYSIZE;
236 if (!(op_data->op_xvalid & OP_XVALID_BLOCKS))
237 op_data->op_xvalid |= OP_XVALID_LAZYBLOCKS;
239 rc = md_close(md_exp, op_data, och->och_mod, &req);
240 if (rc != 0 && rc != -EINTR)
241 CERROR("%s: inode "DFID" mdc close failed: rc = %d\n",
242 md_exp->exp_obd->obd_name, PFID(&lli->lli_fid), rc);
244 if (rc == 0 && op_data->op_bias & bias) {
245 struct mdt_body *body;
247 body = req_capsule_server_get(&req->rq_pill, &RMF_MDT_BODY);
248 if (!(body->mbo_valid & OBD_MD_CLOSE_INTENT_EXECED))
251 if (bias & MDS_PCC_ATTACH) {
252 struct pcc_param *param = data;
254 param->pa_layout_gen = body->mbo_layout_gen;
258 ll_finish_md_op_data(op_data);
262 md_clear_open_replay_data(md_exp, och);
263 och->och_open_handle.cookie = DEAD_HANDLE_MAGIC;
266 ptlrpc_req_finished(req); /* This is close request */
270 int ll_md_real_close(struct inode *inode, fmode_t fmode)
272 struct ll_inode_info *lli = ll_i2info(inode);
273 struct obd_client_handle **och_p;
274 struct obd_client_handle *och;
279 if (fmode & FMODE_WRITE) {
280 och_p = &lli->lli_mds_write_och;
281 och_usecount = &lli->lli_open_fd_write_count;
282 } else if (fmode & FMODE_EXEC) {
283 och_p = &lli->lli_mds_exec_och;
284 och_usecount = &lli->lli_open_fd_exec_count;
286 LASSERT(fmode & FMODE_READ);
287 och_p = &lli->lli_mds_read_och;
288 och_usecount = &lli->lli_open_fd_read_count;
291 mutex_lock(&lli->lli_och_mutex);
292 if (*och_usecount > 0) {
293 /* There are still users of this handle, so skip
295 mutex_unlock(&lli->lli_och_mutex);
301 mutex_unlock(&lli->lli_och_mutex);
304 /* There might be a race and this handle may already
306 rc = ll_close_inode_openhandle(inode, och, 0, NULL);
312 static int ll_md_close(struct inode *inode, struct file *file)
314 union ldlm_policy_data policy = {
315 .l_inodebits = { MDS_INODELOCK_OPEN },
317 __u64 flags = LDLM_FL_BLOCK_GRANTED | LDLM_FL_TEST_LOCK;
318 struct ll_file_data *fd = file->private_data;
319 struct ll_inode_info *lli = ll_i2info(inode);
320 struct lustre_handle lockh;
321 enum ldlm_mode lockmode;
325 /* clear group lock, if present */
326 if (unlikely(fd->fd_flags & LL_FILE_GROUP_LOCKED))
327 ll_put_grouplock(inode, file, fd->fd_grouplock.lg_gid);
329 mutex_lock(&lli->lli_och_mutex);
330 if (fd->fd_lease_och != NULL) {
332 struct obd_client_handle *lease_och;
334 lease_och = fd->fd_lease_och;
335 fd->fd_lease_och = NULL;
336 mutex_unlock(&lli->lli_och_mutex);
338 /* Usually the lease is not released when the
339 * application crashed, we need to release here. */
340 rc = ll_lease_close(lease_och, inode, &lease_broken);
342 mutex_lock(&lli->lli_och_mutex);
344 CDEBUG_LIMIT(rc ? D_ERROR : D_INODE,
345 "Clean up lease "DFID" %d/%d\n",
346 PFID(&lli->lli_fid), rc, lease_broken);
349 if (fd->fd_och != NULL) {
350 struct obd_client_handle *och;
354 mutex_unlock(&lli->lli_och_mutex);
356 rc = ll_close_inode_openhandle(inode, och, 0, NULL);
360 /* Let's see if we have good enough OPEN lock on the file and if
361 we can skip talking to MDS */
362 if (fd->fd_omode & FMODE_WRITE) {
364 LASSERT(lli->lli_open_fd_write_count);
365 lli->lli_open_fd_write_count--;
366 } else if (fd->fd_omode & FMODE_EXEC) {
368 LASSERT(lli->lli_open_fd_exec_count);
369 lli->lli_open_fd_exec_count--;
372 LASSERT(lli->lli_open_fd_read_count);
373 lli->lli_open_fd_read_count--;
375 mutex_unlock(&lli->lli_och_mutex);
377 /* LU-4398: do not cache write open lock if the file has exec bit */
378 if ((lockmode == LCK_CW && inode->i_mode & S_IXUGO) ||
379 !md_lock_match(ll_i2mdexp(inode), flags, ll_inode2fid(inode),
380 LDLM_IBITS, &policy, lockmode, &lockh))
381 rc = ll_md_real_close(inode, fd->fd_omode);
384 file->private_data = NULL;
385 ll_file_data_put(fd);
390 /* While this returns an error code, fput() the caller does not, so we need
391 * to make every effort to clean up all of our state here. Also, applications
392 * rarely check close errors and even if an error is returned they will not
393 * re-try the close call.
395 int ll_file_release(struct inode *inode, struct file *file)
397 struct ll_file_data *fd;
398 struct ll_sb_info *sbi = ll_i2sbi(inode);
399 struct ll_inode_info *lli = ll_i2info(inode);
400 ktime_t kstart = ktime_get();
405 CDEBUG(D_VFSTRACE, "VFS Op:inode="DFID"(%p)\n",
406 PFID(ll_inode2fid(inode)), inode);
408 fd = file->private_data;
411 /* The last ref on @file, maybe not the the owner pid of statahead,
412 * because parent and child process can share the same file handle. */
413 if (S_ISDIR(inode->i_mode) && lli->lli_opendir_key == fd)
414 ll_deauthorize_statahead(inode, fd);
416 if (is_root_inode(inode)) {
417 file->private_data = NULL;
418 ll_file_data_put(fd);
422 pcc_file_release(inode, file);
424 if (!S_ISDIR(inode->i_mode)) {
425 if (lli->lli_clob != NULL)
426 lov_read_and_clear_async_rc(lli->lli_clob);
427 lli->lli_async_rc = 0;
430 lli->lli_close_fd_time = ktime_get();
432 rc = ll_md_close(inode, file);
434 if (CFS_FAIL_TIMEOUT_MS(OBD_FAIL_PTLRPC_DUMP_LOG, cfs_fail_val))
435 libcfs_debug_dumplog();
438 if (!rc && !is_root_inode(inode))
439 ll_stats_ops_tally(sbi, LPROC_LL_RELEASE,
440 ktime_us_delta(ktime_get(), kstart));
444 static inline int ll_dom_readpage(void *data, struct page *page)
446 /* since ll_dom_readpage is a page cache helper, it is safe to assume
447 * mapping and host pointers are set here
450 struct niobuf_local *lnb = data;
454 inode = page2inode(page);
456 kaddr = kmap_atomic(page);
457 memcpy(kaddr, lnb->lnb_data, lnb->lnb_len);
458 if (lnb->lnb_len < PAGE_SIZE)
459 memset(kaddr + lnb->lnb_len, 0,
460 PAGE_SIZE - lnb->lnb_len);
461 flush_dcache_page(page);
462 SetPageUptodate(page);
463 kunmap_atomic(kaddr);
465 if (inode && IS_ENCRYPTED(inode) && S_ISREG(inode->i_mode)) {
466 if (!llcrypt_has_encryption_key(inode))
467 CDEBUG(D_SEC, "no enc key for "DFID"\n",
468 PFID(ll_inode2fid(inode)));
470 unsigned int offs = 0;
472 while (offs < PAGE_SIZE) {
473 /* decrypt only if page is not empty */
474 if (memcmp(page_address(page) + offs,
475 page_address(ZERO_PAGE(0)),
476 LUSTRE_ENCRYPTION_UNIT_SIZE) == 0)
479 rc = llcrypt_decrypt_pagecache_blocks(page,
480 LUSTRE_ENCRYPTION_UNIT_SIZE,
485 offs += LUSTRE_ENCRYPTION_UNIT_SIZE;
494 void ll_dom_finish_open(struct inode *inode, struct ptlrpc_request *req)
498 struct ll_inode_info *lli = ll_i2info(inode);
499 struct cl_object *obj = lli->lli_clob;
500 struct address_space *mapping = inode->i_mapping;
502 struct niobuf_remote *rnb;
503 struct mdt_body *body;
505 unsigned long index, start;
506 struct niobuf_local lnb;
515 if (!req_capsule_field_present(&req->rq_pill, &RMF_NIOBUF_INLINE,
519 rnb = req_capsule_server_get(&req->rq_pill, &RMF_NIOBUF_INLINE);
520 if (rnb == NULL || rnb->rnb_len == 0)
523 /* LU-11595: Server may return whole file and that is OK always or
524 * it may return just file tail and its offset must be aligned with
525 * client PAGE_SIZE to be used on that client, if server's PAGE_SIZE is
526 * smaller then offset may be not aligned and that data is just ignored.
528 if (rnb->rnb_offset & ~PAGE_MASK)
531 /* Server returns whole file or just file tail if it fills in reply
532 * buffer, in both cases total size should be equal to the file size.
534 body = req_capsule_server_get(&req->rq_pill, &RMF_MDT_BODY);
535 if (rnb->rnb_offset + rnb->rnb_len != body->mbo_dom_size &&
536 !(inode && IS_ENCRYPTED(inode))) {
537 CERROR("%s: server returns off/len %llu/%u but size %llu\n",
538 ll_i2sbi(inode)->ll_fsname, rnb->rnb_offset,
539 rnb->rnb_len, body->mbo_dom_size);
543 env = cl_env_get(&refcheck);
546 io = vvp_env_thread_io(env);
548 io->ci_ignore_layout = 1;
549 rc = cl_io_init(env, io, CIT_MISC, obj);
553 CDEBUG(D_INFO, "Get data along with open at %llu len %i, size %llu\n",
554 rnb->rnb_offset, rnb->rnb_len, body->mbo_dom_size);
556 data = (char *)rnb + sizeof(*rnb);
558 lnb.lnb_file_offset = rnb->rnb_offset;
559 start = lnb.lnb_file_offset >> PAGE_SHIFT;
561 LASSERT((lnb.lnb_file_offset & ~PAGE_MASK) == 0);
562 lnb.lnb_page_offset = 0;
564 struct cl_page *page;
566 lnb.lnb_data = data + (index << PAGE_SHIFT);
567 lnb.lnb_len = rnb->rnb_len - (index << PAGE_SHIFT);
568 if (lnb.lnb_len > PAGE_SIZE)
569 lnb.lnb_len = PAGE_SIZE;
571 vmpage = read_cache_page(mapping, index + start,
572 ll_dom_readpage, &lnb);
573 if (IS_ERR(vmpage)) {
574 CWARN("%s: cannot fill page %lu for "DFID
575 " with data: rc = %li\n",
576 ll_i2sbi(inode)->ll_fsname, index + start,
577 PFID(lu_object_fid(&obj->co_lu)),
582 if (vmpage->mapping == NULL) {
585 /* page was truncated */
588 /* attach VM page to CL page cache */
589 page = cl_page_find(env, obj, vmpage->index, vmpage,
592 ClearPageUptodate(vmpage);
597 SetPageUptodate(vmpage);
598 cl_page_put(env, page);
602 } while (rnb->rnb_len > (index << PAGE_SHIFT));
606 cl_env_put(env, &refcheck);
611 static int ll_intent_file_open(struct dentry *de, void *lmm, int lmmsize,
612 struct lookup_intent *itp)
614 struct ll_sb_info *sbi = ll_i2sbi(de->d_inode);
615 struct dentry *parent = de->d_parent;
618 struct md_op_data *op_data;
619 struct ptlrpc_request *req = NULL;
623 LASSERT(parent != NULL);
624 LASSERT(itp->it_flags & MDS_OPEN_BY_FID);
626 /* if server supports open-by-fid, or file name is invalid, don't pack
627 * name in open request */
628 if (OBD_FAIL_CHECK(OBD_FAIL_LLITE_OPEN_BY_NAME) ||
629 !(exp_connect_flags(sbi->ll_md_exp) & OBD_CONNECT_OPEN_BY_FID)) {
631 len = de->d_name.len;
632 name = kmalloc(len + 1, GFP_NOFS);
637 spin_lock(&de->d_lock);
638 if (len != de->d_name.len) {
639 spin_unlock(&de->d_lock);
643 memcpy(name, de->d_name.name, len);
645 spin_unlock(&de->d_lock);
647 if (!lu_name_is_valid_2(name, len)) {
653 op_data = ll_prep_md_op_data(NULL, parent->d_inode, de->d_inode,
654 name, len, 0, LUSTRE_OPC_OPEN, NULL);
655 if (IS_ERR(op_data)) {
657 RETURN(PTR_ERR(op_data));
659 op_data->op_data = lmm;
660 op_data->op_data_size = lmmsize;
662 OBD_FAIL_TIMEOUT(OBD_FAIL_LLITE_OPEN_DELAY, cfs_fail_val);
664 rc = md_intent_lock(sbi->ll_md_exp, op_data, itp, &req,
665 &ll_md_blocking_ast, 0);
667 ll_finish_md_op_data(op_data);
669 /* reason for keep own exit path - don`t flood log
670 * with messages with -ESTALE errors.
672 if (!it_disposition(itp, DISP_OPEN_OPEN) ||
673 it_open_error(DISP_OPEN_OPEN, itp))
675 ll_release_openhandle(de, itp);
679 if (it_disposition(itp, DISP_LOOKUP_NEG))
680 GOTO(out, rc = -ENOENT);
682 if (rc != 0 || it_open_error(DISP_OPEN_OPEN, itp)) {
683 rc = rc ? rc : it_open_error(DISP_OPEN_OPEN, itp);
684 CDEBUG(D_VFSTRACE, "lock enqueue: err: %d\n", rc);
688 rc = ll_prep_inode(&de->d_inode, &req->rq_pill, NULL, itp);
690 if (!rc && itp->it_lock_mode) {
693 /* If we got a lock back and it has a LOOKUP bit set,
694 * make sure the dentry is marked as valid so we can find it.
695 * We don't need to care about actual hashing since other bits
696 * of kernel will deal with that later.
698 ll_set_lock_data(sbi->ll_md_exp, de->d_inode, itp, &bits);
699 if (bits & MDS_INODELOCK_LOOKUP) {
700 d_lustre_revalidate(de);
701 ll_update_dir_depth(parent->d_inode, de->d_inode);
704 /* if DoM bit returned along with LAYOUT bit then there
705 * can be read-on-open data returned.
707 if (bits & MDS_INODELOCK_DOM && bits & MDS_INODELOCK_LAYOUT)
708 ll_dom_finish_open(de->d_inode, req);
712 ptlrpc_req_finished(req);
713 ll_intent_drop_lock(itp);
715 /* We did open by fid, but by the time we got to the server, the object
716 * disappeared. This is possible if the object was unlinked, but it's
717 * also possible if the object was unlinked by a rename. In the case
718 * of an object renamed over our existing one, we can't fail this open.
719 * O_CREAT also goes through this path if we had an existing dentry,
720 * and it's obviously wrong to return ENOENT for O_CREAT.
722 * Instead let's return -ESTALE, and the VFS will retry the open with
723 * LOOKUP_REVAL, which we catch in ll_revalidate_dentry and fail to
724 * revalidate, causing a lookup. This causes extra lookups in the case
725 * where we had a dentry in cache but the file is being unlinked and we
726 * lose the race with unlink, but this should be very rare.
734 static int ll_och_fill(struct obd_export *md_exp, struct lookup_intent *it,
735 struct obd_client_handle *och)
737 struct mdt_body *body;
739 body = req_capsule_server_get(&it->it_request->rq_pill, &RMF_MDT_BODY);
740 och->och_open_handle = body->mbo_open_handle;
741 och->och_fid = body->mbo_fid1;
742 och->och_lease_handle.cookie = it->it_lock_handle;
743 och->och_magic = OBD_CLIENT_HANDLE_MAGIC;
744 och->och_flags = it->it_flags;
746 return md_set_open_replay_data(md_exp, och, it);
749 static int ll_local_open(struct file *file, struct lookup_intent *it,
750 struct ll_file_data *fd, struct obd_client_handle *och)
752 struct inode *inode = file_inode(file);
755 LASSERT(!file->private_data);
762 rc = ll_och_fill(ll_i2sbi(inode)->ll_md_exp, it, och);
767 file->private_data = fd;
768 ll_readahead_init(inode, &fd->fd_ras);
769 fd->fd_omode = it->it_flags & (FMODE_READ | FMODE_WRITE | FMODE_EXEC);
774 void ll_track_file_opens(struct inode *inode)
776 struct ll_inode_info *lli = ll_i2info(inode);
777 struct ll_sb_info *sbi = ll_i2sbi(inode);
779 /* do not skew results with delays from never-opened inodes */
780 if (ktime_to_ns(lli->lli_close_fd_time))
781 ll_stats_ops_tally(sbi, LPROC_LL_INODE_OPCLTM,
782 ktime_us_delta(ktime_get(), lli->lli_close_fd_time));
784 if (ktime_after(ktime_get(),
785 ktime_add_ms(lli->lli_close_fd_time,
786 sbi->ll_oc_max_ms))) {
787 lli->lli_open_fd_count = 1;
788 lli->lli_close_fd_time = ns_to_ktime(0);
790 lli->lli_open_fd_count++;
793 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_INODE_OCOUNT,
794 lli->lli_open_fd_count);
797 /* Open a file, and (for the very first open) create objects on the OSTs at
798 * this time. If opened with O_LOV_DELAY_CREATE, then we don't do the object
799 * creation or open until ll_lov_setstripe() ioctl is called.
801 * If we already have the stripe MD locally then we don't request it in
802 * md_open(), by passing a lmm_size = 0.
804 * It is up to the application to ensure no other processes open this file
805 * in the O_LOV_DELAY_CREATE case, or the default striping pattern will be
806 * used. We might be able to avoid races of that sort by getting lli_open_sem
807 * before returning in the O_LOV_DELAY_CREATE case and dropping it here
808 * or in ll_file_release(), but I'm not sure that is desirable/necessary.
810 int ll_file_open(struct inode *inode, struct file *file)
812 struct ll_inode_info *lli = ll_i2info(inode);
813 struct lookup_intent *it, oit = { .it_op = IT_OPEN,
814 .it_flags = file->f_flags };
815 struct obd_client_handle **och_p = NULL;
816 __u64 *och_usecount = NULL;
817 struct ll_file_data *fd;
818 ktime_t kstart = ktime_get();
822 CDEBUG(D_VFSTRACE, "VFS Op:inode="DFID"(%p), flags %o\n",
823 PFID(ll_inode2fid(inode)), inode, file->f_flags);
825 it = file->private_data; /* XXX: compat macro */
826 file->private_data = NULL; /* prevent ll_local_open assertion */
828 if (S_ISREG(inode->i_mode)) {
829 rc = ll_file_open_encrypt(inode, file);
831 if (it && it->it_disposition)
832 ll_release_openhandle(file_dentry(file), it);
833 GOTO(out_nofiledata, rc);
837 fd = ll_file_data_get();
839 GOTO(out_nofiledata, rc = -ENOMEM);
842 if (S_ISDIR(inode->i_mode))
843 ll_authorize_statahead(inode, fd);
845 ll_track_file_opens(inode);
846 if (is_root_inode(inode)) {
847 file->private_data = fd;
851 if (!it || !it->it_disposition) {
852 /* Convert f_flags into access mode. We cannot use file->f_mode,
853 * because everything but O_ACCMODE mask was stripped from
855 if ((oit.it_flags + 1) & O_ACCMODE)
857 if (file->f_flags & O_TRUNC)
858 oit.it_flags |= FMODE_WRITE;
860 /* kernel only call f_op->open in dentry_open. filp_open calls
861 * dentry_open after call to open_namei that checks permissions.
862 * Only nfsd_open call dentry_open directly without checking
863 * permissions and because of that this code below is safe.
865 if (oit.it_flags & (FMODE_WRITE | FMODE_READ))
866 oit.it_flags |= MDS_OPEN_OWNEROVERRIDE;
868 /* We do not want O_EXCL here, presumably we opened the file
869 * already? XXX - NFS implications? */
870 oit.it_flags &= ~O_EXCL;
872 /* bug20584, if "it_flags" contains O_CREAT, the file will be
873 * created if necessary, then "IT_CREAT" should be set to keep
874 * consistent with it */
875 if (oit.it_flags & O_CREAT)
876 oit.it_op |= IT_CREAT;
882 /* Let's see if we have file open on MDS already. */
883 if (it->it_flags & FMODE_WRITE) {
884 och_p = &lli->lli_mds_write_och;
885 och_usecount = &lli->lli_open_fd_write_count;
886 } else if (it->it_flags & FMODE_EXEC) {
887 och_p = &lli->lli_mds_exec_och;
888 och_usecount = &lli->lli_open_fd_exec_count;
890 och_p = &lli->lli_mds_read_och;
891 och_usecount = &lli->lli_open_fd_read_count;
894 mutex_lock(&lli->lli_och_mutex);
895 if (*och_p) { /* Open handle is present */
896 if (it_disposition(it, DISP_OPEN_OPEN)) {
897 /* Well, there's extra open request that we do not need,
898 * let's close it somehow. This will decref request. */
899 rc = it_open_error(DISP_OPEN_OPEN, it);
901 mutex_unlock(&lli->lli_och_mutex);
902 GOTO(out_openerr, rc);
905 ll_release_openhandle(file_dentry(file), it);
909 rc = ll_local_open(file, it, fd, NULL);
912 mutex_unlock(&lli->lli_och_mutex);
913 GOTO(out_openerr, rc);
916 LASSERT(*och_usecount == 0);
917 if (!it->it_disposition) {
918 struct dentry *dentry = file_dentry(file);
919 struct ll_sb_info *sbi = ll_i2sbi(inode);
920 struct ll_dentry_data *ldd;
922 /* We cannot just request lock handle now, new ELC code
923 * means that one of other OPEN locks for this file
924 * could be cancelled, and since blocking ast handler
925 * would attempt to grab och_mutex as well, that would
926 * result in a deadlock
928 mutex_unlock(&lli->lli_och_mutex);
930 * Normally called under two situations:
932 * 2. A race/condition on MDS resulting in no open
933 * handle to be returned from LOOKUP|OPEN request,
934 * for example if the target entry was a symlink.
936 * In NFS path we know there's pathologic behavior
937 * so we always enable open lock caching when coming
938 * from there. It's detected by setting a flag in
941 * After reaching number of opens of this inode
942 * we always ask for an open lock on it to handle
943 * bad userspace actors that open and close files
944 * in a loop for absolutely no good reason
947 ldd = ll_d2d(dentry);
948 if (filename_is_volatile(dentry->d_name.name,
951 /* There really is nothing here, but this
952 * make this more readable I think.
953 * We do not want openlock for volatile
954 * files under any circumstances
956 } else if (ldd && ldd->lld_nfs_dentry) {
957 /* NFS path. This also happens to catch
958 * open by fh files I guess
960 it->it_flags |= MDS_OPEN_LOCK;
961 /* clear the flag for future lookups */
962 ldd->lld_nfs_dentry = 0;
963 } else if (sbi->ll_oc_thrsh_count > 0) {
964 /* Take MDS_OPEN_LOCK with many opens */
965 if (lli->lli_open_fd_count >=
966 sbi->ll_oc_thrsh_count)
967 it->it_flags |= MDS_OPEN_LOCK;
969 /* If this is open after we just closed */
970 else if (ktime_before(ktime_get(),
971 ktime_add_ms(lli->lli_close_fd_time,
972 sbi->ll_oc_thrsh_ms)))
973 it->it_flags |= MDS_OPEN_LOCK;
977 * Always specify MDS_OPEN_BY_FID because we don't want
978 * to get file with different fid.
980 it->it_flags |= MDS_OPEN_BY_FID;
981 rc = ll_intent_file_open(dentry, NULL, 0, it);
983 GOTO(out_openerr, rc);
987 OBD_ALLOC(*och_p, sizeof(struct obd_client_handle));
989 GOTO(out_och_free, rc = -ENOMEM);
993 /* md_intent_lock() didn't get a request ref if there was an
994 * open error, so don't do cleanup on the request here
996 /* XXX (green): Should not we bail out on any error here, not
997 * just open error? */
998 rc = it_open_error(DISP_OPEN_OPEN, it);
1000 GOTO(out_och_free, rc);
1002 LASSERTF(it_disposition(it, DISP_ENQ_OPEN_REF),
1003 "inode %p: disposition %x, status %d\n", inode,
1004 it_disposition(it, ~0), it->it_status);
1006 rc = ll_local_open(file, it, fd, *och_p);
1008 GOTO(out_och_free, rc);
1011 rc = pcc_file_open(inode, file);
1013 GOTO(out_och_free, rc);
1015 mutex_unlock(&lli->lli_och_mutex);
1019 /* Must do this outside lli_och_mutex lock to prevent deadlock where
1020 different kind of OPEN lock for this same inode gets cancelled
1021 by ldlm_cancel_lru */
1022 if (!S_ISREG(inode->i_mode))
1023 GOTO(out_och_free, rc);
1024 cl_lov_delay_create_clear(&file->f_flags);
1025 GOTO(out_och_free, rc);
1029 if (och_p && *och_p) {
1030 OBD_FREE(*och_p, sizeof(struct obd_client_handle));
1031 *och_p = NULL; /* OBD_FREE writes some magic there */
1034 mutex_unlock(&lli->lli_och_mutex);
1037 if (lli->lli_opendir_key == fd)
1038 ll_deauthorize_statahead(inode, fd);
1041 ll_file_data_put(fd);
1043 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_OPEN,
1044 ktime_us_delta(ktime_get(), kstart));
1048 if (it && it_disposition(it, DISP_ENQ_OPEN_REF)) {
1049 ptlrpc_req_finished(it->it_request);
1050 it_clear_disposition(it, DISP_ENQ_OPEN_REF);
1056 static int ll_md_blocking_lease_ast(struct ldlm_lock *lock,
1057 struct ldlm_lock_desc *desc, void *data, int flag)
1060 struct lustre_handle lockh;
1064 case LDLM_CB_BLOCKING:
1065 ldlm_lock2handle(lock, &lockh);
1066 rc = ldlm_cli_cancel(&lockh, LCF_ASYNC);
1068 CDEBUG(D_INODE, "ldlm_cli_cancel: %d\n", rc);
1072 case LDLM_CB_CANCELING:
1080 * When setting a lease on a file, we take ownership of the lli_mds_*_och
1081 * and save it as fd->fd_och so as to force client to reopen the file even
1082 * if it has an open lock in cache already.
1084 static int ll_lease_och_acquire(struct inode *inode, struct file *file,
1085 struct lustre_handle *old_open_handle)
1087 struct ll_inode_info *lli = ll_i2info(inode);
1088 struct ll_file_data *fd = file->private_data;
1089 struct obd_client_handle **och_p;
1090 __u64 *och_usecount;
1094 /* Get the openhandle of the file */
1095 mutex_lock(&lli->lli_och_mutex);
1096 if (fd->fd_lease_och != NULL)
1097 GOTO(out_unlock, rc = -EBUSY);
1099 if (fd->fd_och == NULL) {
1100 if (file->f_mode & FMODE_WRITE) {
1101 LASSERT(lli->lli_mds_write_och != NULL);
1102 och_p = &lli->lli_mds_write_och;
1103 och_usecount = &lli->lli_open_fd_write_count;
1105 LASSERT(lli->lli_mds_read_och != NULL);
1106 och_p = &lli->lli_mds_read_och;
1107 och_usecount = &lli->lli_open_fd_read_count;
1110 if (*och_usecount > 1)
1111 GOTO(out_unlock, rc = -EBUSY);
1113 fd->fd_och = *och_p;
1118 *old_open_handle = fd->fd_och->och_open_handle;
1122 mutex_unlock(&lli->lli_och_mutex);
1127 * Release ownership on lli_mds_*_och when putting back a file lease.
1129 static int ll_lease_och_release(struct inode *inode, struct file *file)
1131 struct ll_inode_info *lli = ll_i2info(inode);
1132 struct ll_file_data *fd = file->private_data;
1133 struct obd_client_handle **och_p;
1134 struct obd_client_handle *old_och = NULL;
1135 __u64 *och_usecount;
1139 mutex_lock(&lli->lli_och_mutex);
1140 if (file->f_mode & FMODE_WRITE) {
1141 och_p = &lli->lli_mds_write_och;
1142 och_usecount = &lli->lli_open_fd_write_count;
1144 och_p = &lli->lli_mds_read_och;
1145 och_usecount = &lli->lli_open_fd_read_count;
1148 /* The file may have been open by another process (broken lease) so
1149 * *och_p is not NULL. In this case we should simply increase usecount
1152 if (*och_p != NULL) {
1153 old_och = fd->fd_och;
1156 *och_p = fd->fd_och;
1160 mutex_unlock(&lli->lli_och_mutex);
1162 if (old_och != NULL)
1163 rc = ll_close_inode_openhandle(inode, old_och, 0, NULL);
1169 * Acquire a lease and open the file.
1171 static struct obd_client_handle *
1172 ll_lease_open(struct inode *inode, struct file *file, fmode_t fmode,
1175 struct lookup_intent it = { .it_op = IT_OPEN };
1176 struct ll_sb_info *sbi = ll_i2sbi(inode);
1177 struct md_op_data *op_data;
1178 struct ptlrpc_request *req = NULL;
1179 struct lustre_handle old_open_handle = { 0 };
1180 struct obd_client_handle *och = NULL;
1185 if (fmode != FMODE_WRITE && fmode != FMODE_READ)
1186 RETURN(ERR_PTR(-EINVAL));
1189 if (!(fmode & file->f_mode) || (file->f_mode & FMODE_EXEC))
1190 RETURN(ERR_PTR(-EPERM));
1192 rc = ll_lease_och_acquire(inode, file, &old_open_handle);
1194 RETURN(ERR_PTR(rc));
1199 RETURN(ERR_PTR(-ENOMEM));
1201 op_data = ll_prep_md_op_data(NULL, inode, inode, NULL, 0, 0,
1202 LUSTRE_OPC_ANY, NULL);
1203 if (IS_ERR(op_data))
1204 GOTO(out, rc = PTR_ERR(op_data));
1206 /* To tell the MDT this openhandle is from the same owner */
1207 op_data->op_open_handle = old_open_handle;
1209 it.it_flags = fmode | open_flags;
1210 it.it_flags |= MDS_OPEN_LOCK | MDS_OPEN_BY_FID | MDS_OPEN_LEASE;
1211 rc = md_intent_lock(sbi->ll_md_exp, op_data, &it, &req,
1212 &ll_md_blocking_lease_ast,
1213 /* LDLM_FL_NO_LRU: To not put the lease lock into LRU list, otherwise
1214 * it can be cancelled which may mislead applications that the lease is
1216 * LDLM_FL_EXCL: Set this flag so that it won't be matched by normal
1217 * open in ll_md_blocking_ast(). Otherwise as ll_md_blocking_lease_ast
1218 * doesn't deal with openhandle, so normal openhandle will be leaked. */
1219 LDLM_FL_NO_LRU | LDLM_FL_EXCL);
1220 ll_finish_md_op_data(op_data);
1221 ptlrpc_req_finished(req);
1223 GOTO(out_release_it, rc);
1225 if (it_disposition(&it, DISP_LOOKUP_NEG))
1226 GOTO(out_release_it, rc = -ENOENT);
1228 rc = it_open_error(DISP_OPEN_OPEN, &it);
1230 GOTO(out_release_it, rc);
1232 LASSERT(it_disposition(&it, DISP_ENQ_OPEN_REF));
1233 rc = ll_och_fill(sbi->ll_md_exp, &it, och);
1235 GOTO(out_release_it, rc);
1237 if (!it_disposition(&it, DISP_OPEN_LEASE)) /* old server? */
1238 GOTO(out_close, rc = -EOPNOTSUPP);
1240 /* already get lease, handle lease lock */
1241 ll_set_lock_data(sbi->ll_md_exp, inode, &it, NULL);
1242 if (!it.it_lock_mode ||
1243 !(it.it_lock_bits & MDS_INODELOCK_OPEN)) {
1244 /* open lock must return for lease */
1245 CERROR(DFID "lease granted but no open lock, %d/%llu.\n",
1246 PFID(ll_inode2fid(inode)), it.it_lock_mode,
1248 GOTO(out_close, rc = -EPROTO);
1251 ll_intent_release(&it);
1255 /* Cancel open lock */
1256 if (it.it_lock_mode != 0) {
1257 ldlm_lock_decref_and_cancel(&och->och_lease_handle,
1259 it.it_lock_mode = 0;
1260 och->och_lease_handle.cookie = 0ULL;
1262 rc2 = ll_close_inode_openhandle(inode, och, 0, NULL);
1264 CERROR("%s: error closing file "DFID": %d\n",
1265 sbi->ll_fsname, PFID(&ll_i2info(inode)->lli_fid), rc2);
1266 och = NULL; /* och has been freed in ll_close_inode_openhandle() */
1268 ll_intent_release(&it);
1272 RETURN(ERR_PTR(rc));
1276 * Check whether a layout swap can be done between two inodes.
1278 * \param[in] inode1 First inode to check
1279 * \param[in] inode2 Second inode to check
1281 * \retval 0 on success, layout swap can be performed between both inodes
1282 * \retval negative error code if requirements are not met
1284 static int ll_check_swap_layouts_validity(struct inode *inode1,
1285 struct inode *inode2)
1287 if (!S_ISREG(inode1->i_mode) || !S_ISREG(inode2->i_mode))
1290 if (inode_permission(&init_user_ns, inode1, MAY_WRITE) ||
1291 inode_permission(&init_user_ns, inode2, MAY_WRITE))
1294 if (inode1->i_sb != inode2->i_sb)
1300 static int ll_swap_layouts_close(struct obd_client_handle *och,
1301 struct inode *inode, struct inode *inode2)
1303 const struct lu_fid *fid1 = ll_inode2fid(inode);
1304 const struct lu_fid *fid2;
1308 CDEBUG(D_INODE, "%s: biased close of file "DFID"\n",
1309 ll_i2sbi(inode)->ll_fsname, PFID(fid1));
1311 rc = ll_check_swap_layouts_validity(inode, inode2);
1313 GOTO(out_free_och, rc);
1315 /* We now know that inode2 is a lustre inode */
1316 fid2 = ll_inode2fid(inode2);
1318 rc = lu_fid_cmp(fid1, fid2);
1320 GOTO(out_free_och, rc = -EINVAL);
1322 /* Close the file and {swap,merge} layouts between inode & inode2.
1323 * NB: lease lock handle is released in mdc_close_layout_swap_pack()
1324 * because we still need it to pack l_remote_handle to MDT. */
1325 rc = ll_close_inode_openhandle(inode, och, MDS_CLOSE_LAYOUT_SWAP,
1328 och = NULL; /* freed in ll_close_inode_openhandle() */
1338 * Release lease and close the file.
1339 * It will check if the lease has ever broken.
1341 static int ll_lease_close_intent(struct obd_client_handle *och,
1342 struct inode *inode,
1343 bool *lease_broken, enum mds_op_bias bias,
1346 struct ldlm_lock *lock;
1347 bool cancelled = true;
1351 lock = ldlm_handle2lock(&och->och_lease_handle);
1353 lock_res_and_lock(lock);
1354 cancelled = ldlm_is_cancel(lock);
1355 unlock_res_and_lock(lock);
1356 LDLM_LOCK_PUT(lock);
1359 CDEBUG(D_INODE, "lease for "DFID" broken? %d, bias: %x\n",
1360 PFID(&ll_i2info(inode)->lli_fid), cancelled, bias);
1362 if (lease_broken != NULL)
1363 *lease_broken = cancelled;
1365 if (!cancelled && !bias)
1366 ldlm_cli_cancel(&och->och_lease_handle, 0);
1368 if (cancelled) { /* no need to excute intent */
1373 rc = ll_close_inode_openhandle(inode, och, bias, data);
1377 static int ll_lease_close(struct obd_client_handle *och, struct inode *inode,
1380 return ll_lease_close_intent(och, inode, lease_broken, 0, NULL);
1384 * After lease is taken, send the RPC MDS_REINT_RESYNC to the MDT
1386 static int ll_lease_file_resync(struct obd_client_handle *och,
1387 struct inode *inode, unsigned long arg)
1389 struct ll_sb_info *sbi = ll_i2sbi(inode);
1390 struct md_op_data *op_data;
1391 struct ll_ioc_lease_id ioc;
1392 __u64 data_version_unused;
1396 op_data = ll_prep_md_op_data(NULL, inode, NULL, NULL, 0, 0,
1397 LUSTRE_OPC_ANY, NULL);
1398 if (IS_ERR(op_data))
1399 RETURN(PTR_ERR(op_data));
1401 if (copy_from_user(&ioc, (struct ll_ioc_lease_id __user *)arg,
1405 /* before starting file resync, it's necessary to clean up page cache
1406 * in client memory, otherwise once the layout version is increased,
1407 * writing back cached data will be denied the OSTs. */
1408 rc = ll_data_version(inode, &data_version_unused, LL_DV_WR_FLUSH);
1412 op_data->op_lease_handle = och->och_lease_handle;
1413 op_data->op_mirror_id = ioc.lil_mirror_id;
1414 rc = md_file_resync(sbi->ll_md_exp, op_data);
1420 ll_finish_md_op_data(op_data);
1424 int ll_merge_attr(const struct lu_env *env, struct inode *inode)
1426 struct ll_inode_info *lli = ll_i2info(inode);
1427 struct cl_object *obj = lli->lli_clob;
1428 struct cl_attr *attr = vvp_env_thread_attr(env);
1436 ll_inode_size_lock(inode);
1438 /* Merge timestamps the most recently obtained from MDS with
1439 * timestamps obtained from OSTs.
1441 * Do not overwrite atime of inode because it may be refreshed
1442 * by file_accessed() function. If the read was served by cache
1443 * data, there is no RPC to be sent so that atime may not be
1444 * transferred to OSTs at all. MDT only updates atime at close time
1445 * if it's at least 'mdd.*.atime_diff' older.
1446 * All in all, the atime in Lustre does not strictly comply with
1447 * POSIX. Solving this problem needs to send an RPC to MDT for each
1448 * read, this will hurt performance.
1450 if (test_and_clear_bit(LLIF_UPDATE_ATIME, &lli->lli_flags) ||
1451 inode->i_atime.tv_sec < lli->lli_atime)
1452 inode->i_atime.tv_sec = lli->lli_atime;
1454 inode->i_mtime.tv_sec = lli->lli_mtime;
1455 inode->i_ctime.tv_sec = lli->lli_ctime;
1457 mtime = inode->i_mtime.tv_sec;
1458 atime = inode->i_atime.tv_sec;
1459 ctime = inode->i_ctime.tv_sec;
1461 cl_object_attr_lock(obj);
1462 if (OBD_FAIL_CHECK(OBD_FAIL_MDC_MERGE))
1465 rc = cl_object_attr_get(env, obj, attr);
1466 cl_object_attr_unlock(obj);
1469 GOTO(out_size_unlock, rc = (rc == -ENODATA ? 0 : rc));
1471 if (atime < attr->cat_atime)
1472 atime = attr->cat_atime;
1474 if (ctime < attr->cat_ctime)
1475 ctime = attr->cat_ctime;
1477 if (mtime < attr->cat_mtime)
1478 mtime = attr->cat_mtime;
1480 CDEBUG(D_VFSTRACE, DFID" updating i_size %llu\n",
1481 PFID(&lli->lli_fid), attr->cat_size);
1483 if (llcrypt_require_key(inode) == -ENOKEY) {
1484 /* Without the key, round up encrypted file size to next
1485 * LUSTRE_ENCRYPTION_UNIT_SIZE. Clear text size is put in
1486 * lli_lazysize for proper file size setting at close time.
1488 lli->lli_attr_valid |= OBD_MD_FLLAZYSIZE;
1489 lli->lli_lazysize = attr->cat_size;
1490 attr->cat_size = round_up(attr->cat_size,
1491 LUSTRE_ENCRYPTION_UNIT_SIZE);
1493 i_size_write(inode, attr->cat_size);
1494 inode->i_blocks = attr->cat_blocks;
1496 inode->i_mtime.tv_sec = mtime;
1497 inode->i_atime.tv_sec = atime;
1498 inode->i_ctime.tv_sec = ctime;
1501 ll_inode_size_unlock(inode);
1507 * Set designated mirror for I/O.
1509 * So far only read, write, and truncated can support to issue I/O to
1510 * designated mirror.
1512 void ll_io_set_mirror(struct cl_io *io, const struct file *file)
1514 struct ll_file_data *fd = file->private_data;
1516 /* clear layout version for generic(non-resync) I/O in case it carries
1517 * stale layout version due to I/O restart */
1518 io->ci_layout_version = 0;
1520 /* FLR: disable non-delay for designated mirror I/O because obviously
1521 * only one mirror is available */
1522 if (fd->fd_designated_mirror > 0) {
1524 io->ci_designated_mirror = fd->fd_designated_mirror;
1525 io->ci_layout_version = fd->fd_layout_version;
1528 CDEBUG(D_VFSTRACE, "%s: desiginated mirror: %d\n",
1529 file->f_path.dentry->d_name.name, io->ci_designated_mirror);
1532 static bool file_is_noatime(const struct file *file)
1534 const struct vfsmount *mnt = file->f_path.mnt;
1535 const struct inode *inode = file_inode((struct file *)file);
1537 /* Adapted from file_accessed() and touch_atime().*/
1538 if (file->f_flags & O_NOATIME)
1541 if (inode->i_flags & S_NOATIME)
1544 if (IS_NOATIME(inode))
1547 if (mnt->mnt_flags & (MNT_NOATIME | MNT_READONLY))
1550 if ((mnt->mnt_flags & MNT_NODIRATIME) && S_ISDIR(inode->i_mode))
1553 if ((inode->i_sb->s_flags & SB_NODIRATIME) && S_ISDIR(inode->i_mode))
1559 void ll_io_init(struct cl_io *io, struct file *file, enum cl_io_type iot,
1560 struct vvp_io_args *args)
1562 struct inode *inode = file_inode(file);
1563 struct ll_file_data *fd = file->private_data;
1565 io->u.ci_rw.crw_nonblock = file->f_flags & O_NONBLOCK;
1566 io->ci_lock_no_expand = fd->ll_lock_no_expand;
1568 if (iot == CIT_WRITE) {
1569 io->u.ci_wr.wr_append = !!(file->f_flags & O_APPEND);
1570 io->u.ci_wr.wr_sync = !!(file->f_flags & O_SYNC ||
1571 file->f_flags & O_DIRECT ||
1573 #ifdef HAVE_GENERIC_WRITE_SYNC_2ARGS
1574 io->u.ci_wr.wr_sync |= !!(args &&
1575 (args->u.normal.via_iocb->ki_flags &
1581 io->ci_iocb_nowait = !!(args &&
1582 (args->u.normal.via_iocb->ki_flags &
1586 io->ci_obj = ll_i2info(inode)->lli_clob;
1587 io->ci_lockreq = CILR_MAYBE;
1588 if (ll_file_nolock(file)) {
1589 io->ci_lockreq = CILR_NEVER;
1590 io->ci_no_srvlock = 1;
1591 } else if (file->f_flags & O_APPEND) {
1592 io->ci_lockreq = CILR_MANDATORY;
1594 io->ci_noatime = file_is_noatime(file);
1595 io->ci_async_readahead = false;
1597 /* FLR: only use non-delay I/O for read as there is only one
1598 * avaliable mirror for write. */
1599 io->ci_ndelay = !(iot == CIT_WRITE);
1601 ll_io_set_mirror(io, file);
1604 static void ll_heat_add(struct inode *inode, enum cl_io_type iot,
1607 struct ll_inode_info *lli = ll_i2info(inode);
1608 struct ll_sb_info *sbi = ll_i2sbi(inode);
1609 enum obd_heat_type sample_type;
1610 enum obd_heat_type iobyte_type;
1611 __u64 now = ktime_get_real_seconds();
1613 if (!ll_sbi_has_file_heat(sbi) ||
1614 lli->lli_heat_flags & LU_HEAT_FLAG_OFF)
1617 if (iot == CIT_READ) {
1618 sample_type = OBD_HEAT_READSAMPLE;
1619 iobyte_type = OBD_HEAT_READBYTE;
1620 } else if (iot == CIT_WRITE) {
1621 sample_type = OBD_HEAT_WRITESAMPLE;
1622 iobyte_type = OBD_HEAT_WRITEBYTE;
1627 spin_lock(&lli->lli_heat_lock);
1628 obd_heat_add(&lli->lli_heat_instances[sample_type], now, 1,
1629 sbi->ll_heat_decay_weight, sbi->ll_heat_period_second);
1630 obd_heat_add(&lli->lli_heat_instances[iobyte_type], now, count,
1631 sbi->ll_heat_decay_weight, sbi->ll_heat_period_second);
1632 spin_unlock(&lli->lli_heat_lock);
1636 ll_file_io_generic(const struct lu_env *env, struct vvp_io_args *args,
1637 struct file *file, enum cl_io_type iot,
1638 loff_t *ppos, size_t count)
1640 struct vvp_io *vio = vvp_env_io(env);
1641 struct inode *inode = file_inode(file);
1642 struct ll_inode_info *lli = ll_i2info(inode);
1643 struct ll_sb_info *sbi = ll_i2sbi(inode);
1644 struct ll_file_data *fd = file->private_data;
1645 struct range_lock range;
1646 bool range_locked = false;
1651 unsigned int retried = 0, dio_lock = 0;
1652 bool is_aio = false;
1653 bool is_parallel_dio = false;
1654 struct cl_dio_aio *ci_dio_aio = NULL;
1656 bool partial_io = false;
1657 size_t max_io_pages, max_cached_pages;
1661 CDEBUG(D_VFSTRACE, "%s: %s ppos: %llu, count: %zu\n",
1662 file_dentry(file)->d_name.name,
1663 iot == CIT_READ ? "read" : "write", *ppos, count);
1665 max_io_pages = PTLRPC_MAX_BRW_PAGES * OBD_MAX_RIF_DEFAULT;
1666 max_cached_pages = sbi->ll_cache->ccc_lru_max;
1667 if (max_io_pages > (max_cached_pages >> 2))
1668 max_io_pages = max_cached_pages >> 2;
1670 io = vvp_env_thread_io(env);
1671 if (file->f_flags & O_DIRECT) {
1672 if (file->f_flags & O_APPEND)
1674 if (!is_sync_kiocb(args->u.normal.via_iocb))
1677 /* the kernel does not support AIO on pipes, and parallel DIO
1678 * uses part of the AIO path, so we must not do parallel dio
1681 is_parallel_dio = !iov_iter_is_pipe(args->u.normal.via_iter) &&
1684 if (!ll_sbi_has_parallel_dio(sbi))
1685 is_parallel_dio = false;
1687 ci_dio_aio = cl_dio_aio_alloc(args->u.normal.via_iocb,
1688 ll_i2info(inode)->lli_clob, is_aio);
1690 GOTO(out, rc = -ENOMEM);
1695 * IO block size need be aware of cached page limit, otherwise
1696 * if we have small max_cached_mb but large block IO issued, io
1697 * could not be finished and blocked whole client.
1699 if (file->f_flags & O_DIRECT)
1702 per_bytes = min(max_io_pages << PAGE_SHIFT, count);
1703 partial_io = per_bytes < count;
1704 io = vvp_env_thread_io(env);
1705 ll_io_init(io, file, iot, args);
1706 io->ci_dio_aio = ci_dio_aio;
1707 io->ci_dio_lock = dio_lock;
1708 io->ci_ndelay_tried = retried;
1709 io->ci_parallel_dio = is_parallel_dio;
1711 if (cl_io_rw_init(env, io, iot, *ppos, per_bytes) == 0) {
1712 if (file->f_flags & O_APPEND)
1713 range_lock_init(&range, 0, LUSTRE_EOF);
1715 range_lock_init(&range, *ppos, *ppos + per_bytes - 1);
1717 vio->vui_fd = file->private_data;
1718 vio->vui_iter = args->u.normal.via_iter;
1719 vio->vui_iocb = args->u.normal.via_iocb;
1720 /* Direct IO reads must also take range lock,
1721 * or multiple reads will try to work on the same pages
1722 * See LU-6227 for details.
1724 if (((iot == CIT_WRITE) ||
1725 (iot == CIT_READ && (file->f_flags & O_DIRECT))) &&
1726 !(vio->vui_fd->fd_flags & LL_FILE_GROUP_LOCKED)) {
1727 CDEBUG(D_VFSTRACE, "Range lock "RL_FMT"\n",
1729 rc = range_lock(&lli->lli_write_tree, &range);
1733 range_locked = true;
1736 ll_cl_add(inode, env, io, LCC_RW);
1737 rc = cl_io_loop(env, io);
1738 ll_cl_remove(inode, env);
1740 /* cl_io_rw_init() handled IO */
1744 if (io->ci_dio_aio && !is_aio) {
1745 struct cl_sync_io *anchor = &io->ci_dio_aio->cda_sync;
1747 /* for dio, EIOCBQUEUED is an implementation detail,
1748 * and we don't return it to userspace
1750 if (rc == -EIOCBQUEUED)
1753 /* N/B: parallel DIO may be disabled during i/o submission;
1754 * if that occurs, I/O shifts to sync, so it's all resolved
1755 * before we get here, and this wait call completes
1758 rc2 = cl_sync_io_wait_recycle(env, anchor, 0, 0);
1764 CDEBUG(D_VFSTRACE, "Range unlock "RL_FMT"\n",
1766 range_unlock(&lli->lli_write_tree, &range);
1767 range_locked = false;
1771 * In order to move forward AIO, ci_nob was increased,
1772 * but that doesn't mean io have been finished, it just
1773 * means io have been submited, we will always return
1774 * EIOCBQUEUED to the caller, So we could only return
1775 * number of bytes in non-AIO case.
1777 if (io->ci_nob > 0) {
1780 result += io->ci_nob;
1781 *ppos = io->u.ci_wr.wr.crw_pos; /* for splice */
1786 count -= io->ci_nob;
1788 /* prepare IO restart */
1790 args->u.normal.via_iter = vio->vui_iter;
1794 * Reexpand iov count because it was zero
1797 iov_iter_reexpand(vio->vui_iter, count);
1798 if (per_bytes == io->ci_nob)
1799 io->ci_need_restart = 1;
1803 cl_io_fini(env, io);
1806 "%s: %d io complete with rc: %d, result: %zd, restart: %d\n",
1807 file->f_path.dentry->d_name.name,
1808 iot, rc, result, io->ci_need_restart);
1810 if ((rc == 0 || rc == -ENODATA || rc == -ENOLCK) &&
1811 count > 0 && io->ci_need_restart) {
1813 "%s: restart %s from %lld, count: %zu, ret: %zd, rc: %d\n",
1814 file_dentry(file)->d_name.name,
1815 iot == CIT_READ ? "read" : "write",
1816 *ppos, count, result, rc);
1817 /* preserve the tried count for FLR */
1818 retried = io->ci_ndelay_tried;
1819 dio_lock = io->ci_dio_lock;
1823 if (io->ci_dio_aio) {
1825 * VFS will call aio_complete() if no -EIOCBQUEUED
1826 * is returned for AIO, so we can not call aio_complete()
1829 * NB: This is safe because the atomic_dec_and_lock in
1830 * cl_sync_io_init has implicit memory barriers, so this will
1831 * be seen by whichever thread completes the DIO/AIO, even if
1834 if (rc != -EIOCBQUEUED)
1835 io->ci_dio_aio->cda_no_aio_complete = 1;
1837 * Drop one extra reference so that end_io() could be
1838 * called for this IO context, we could call it after
1839 * we make sure all AIO requests have been proceed.
1841 cl_sync_io_note(env, &io->ci_dio_aio->cda_sync,
1842 rc == -EIOCBQUEUED ? 0 : rc);
1844 LASSERT(io->ci_dio_aio->cda_creator_free);
1845 cl_dio_aio_free(env, io->ci_dio_aio);
1846 io->ci_dio_aio = NULL;
1850 if (iot == CIT_READ) {
1852 ll_stats_ops_tally(ll_i2sbi(inode),
1853 LPROC_LL_READ_BYTES, result);
1854 } else if (iot == CIT_WRITE) {
1856 ll_stats_ops_tally(ll_i2sbi(inode),
1857 LPROC_LL_WRITE_BYTES, result);
1858 fd->fd_write_failed = false;
1859 } else if (result == 0 && rc == 0) {
1862 fd->fd_write_failed = true;
1864 fd->fd_write_failed = false;
1865 } else if (rc != -ERESTARTSYS) {
1866 fd->fd_write_failed = true;
1870 CDEBUG(D_VFSTRACE, "iot: %d, result: %zd\n", iot, result);
1872 ll_heat_add(inode, iot, result);
1874 RETURN(result > 0 ? result : rc);
1878 * The purpose of fast read is to overcome per I/O overhead and improve IOPS
1879 * especially for small I/O.
1881 * To serve a read request, CLIO has to create and initialize a cl_io and
1882 * then request DLM lock. This has turned out to have siginificant overhead
1883 * and affects the performance of small I/O dramatically.
1885 * It's not necessary to create a cl_io for each I/O. Under the help of read
1886 * ahead, most of the pages being read are already in memory cache and we can
1887 * read those pages directly because if the pages exist, the corresponding DLM
1888 * lock must exist so that page content must be valid.
1890 * In fast read implementation, the llite speculatively finds and reads pages
1891 * in memory cache. There are three scenarios for fast read:
1892 * - If the page exists and is uptodate, kernel VM will provide the data and
1893 * CLIO won't be intervened;
1894 * - If the page was brought into memory by read ahead, it will be exported
1895 * and read ahead parameters will be updated;
1896 * - Otherwise the page is not in memory, we can't do fast read. Therefore,
1897 * it will go back and invoke normal read, i.e., a cl_io will be created
1898 * and DLM lock will be requested.
1900 * POSIX compliance: posix standard states that read is intended to be atomic.
1901 * Lustre read implementation is in line with Linux kernel read implementation
1902 * and neither of them complies with POSIX standard in this matter. Fast read
1903 * doesn't make the situation worse on single node but it may interleave write
1904 * results from multiple nodes due to short read handling in ll_file_aio_read().
1906 * \param env - lu_env
1907 * \param iocb - kiocb from kernel
1908 * \param iter - user space buffers where the data will be copied
1910 * \retval - number of bytes have been read, or error code if error occurred.
1913 ll_do_fast_read(struct kiocb *iocb, struct iov_iter *iter)
1917 if (!ll_sbi_has_fast_read(ll_i2sbi(file_inode(iocb->ki_filp))))
1920 /* NB: we can't do direct IO for fast read because it will need a lock
1921 * to make IO engine happy. */
1922 if (iocb->ki_filp->f_flags & O_DIRECT)
1925 result = generic_file_read_iter(iocb, iter);
1927 /* If the first page is not in cache, generic_file_aio_read() will be
1928 * returned with -ENODATA.
1929 * See corresponding code in ll_readpage(). */
1930 if (result == -ENODATA)
1934 ll_heat_add(file_inode(iocb->ki_filp), CIT_READ, result);
1935 ll_stats_ops_tally(ll_i2sbi(file_inode(iocb->ki_filp)),
1936 LPROC_LL_READ_BYTES, result);
1943 * Read from a file (through the page cache).
1945 static ssize_t ll_file_read_iter(struct kiocb *iocb, struct iov_iter *to)
1948 struct vvp_io_args *args;
1949 struct file *file = iocb->ki_filp;
1953 ktime_t kstart = ktime_get();
1958 CDEBUG(D_VFSTRACE|D_IOTRACE, "file %s:"DFID", ppos: %lld, count: %zu\n",
1959 file_dentry(file)->d_name.name,
1960 PFID(ll_inode2fid(file_inode(file))), iocb->ki_pos,
1961 iov_iter_count(to));
1963 if (!iov_iter_count(to))
1967 * Currently when PCC read failed, we do not fall back to the
1968 * normal read path, just return the error.
1969 * The resaon is that: for RW-PCC, the file data may be modified
1970 * in the PCC and inconsistent with the data on OSTs (or file
1971 * data has been removed from the Lustre file system), at this
1972 * time, fallback to the normal read path may read the wrong
1974 * TODO: for RO-PCC (readonly PCC), fall back to normal read
1975 * path: read data from data copy on OSTs.
1977 result = pcc_file_read_iter(iocb, to, &cached);
1981 ll_ras_enter(file, iocb->ki_pos, iov_iter_count(to));
1983 result = ll_do_fast_read(iocb, to);
1984 if (result < 0 || iov_iter_count(to) == 0)
1987 env = cl_env_get(&refcheck);
1989 RETURN(PTR_ERR(env));
1991 args = ll_env_args(env);
1992 args->u.normal.via_iter = to;
1993 args->u.normal.via_iocb = iocb;
1995 rc2 = ll_file_io_generic(env, args, file, CIT_READ,
1996 &iocb->ki_pos, iov_iter_count(to));
1999 else if (result == 0)
2002 cl_env_put(env, &refcheck);
2005 ll_rw_stats_tally(ll_i2sbi(file_inode(file)), current->pid,
2006 file->private_data, iocb->ki_pos, result,
2008 ll_stats_ops_tally(ll_i2sbi(file_inode(file)), LPROC_LL_READ,
2009 ktime_us_delta(ktime_get(), kstart));
2013 "COMPLETED: file %s:"DFID", ppos: %lld, count: %zu\n",
2014 file_dentry(file)->d_name.name,
2015 PFID(ll_inode2fid(file_inode(file))), iocb->ki_pos,
2016 iov_iter_count(to));
2022 * Similar trick to ll_do_fast_read, this improves write speed for tiny writes.
2023 * If a page is already in the page cache and dirty (and some other things -
2024 * See ll_tiny_write_begin for the instantiation of these rules), then we can
2025 * write to it without doing a full I/O, because Lustre already knows about it
2026 * and will write it out. This saves a lot of processing time.
2028 * All writes here are within one page, so exclusion is handled by the page
2029 * lock on the vm page. We do not do tiny writes for writes which touch
2030 * multiple pages because it's very unlikely multiple sequential pages are
2031 * are already dirty.
2033 * We limit these to < PAGE_SIZE because PAGE_SIZE writes are relatively common
2034 * and are unlikely to be to already dirty pages.
2036 * Attribute updates are important here, we do them in ll_tiny_write_end.
2038 static ssize_t ll_do_tiny_write(struct kiocb *iocb, struct iov_iter *iter)
2040 ssize_t count = iov_iter_count(iter);
2041 struct file *file = iocb->ki_filp;
2042 struct inode *inode = file_inode(file);
2043 bool lock_inode = !IS_NOSEC(inode);
2048 /* Restrict writes to single page and < PAGE_SIZE. See comment at top
2049 * of function for why.
2051 if (count >= PAGE_SIZE ||
2052 (iocb->ki_pos & (PAGE_SIZE-1)) + count > PAGE_SIZE)
2055 if (unlikely(lock_inode))
2057 result = __generic_file_write_iter(iocb, iter);
2059 if (unlikely(lock_inode))
2060 inode_unlock(inode);
2062 /* If the page is not already dirty, ll_tiny_write_begin returns
2063 * -ENODATA. We continue on to normal write.
2065 if (result == -ENODATA)
2069 ll_heat_add(inode, CIT_WRITE, result);
2070 set_bit(LLIF_DATA_MODIFIED, &ll_i2info(inode)->lli_flags);
2073 CDEBUG(D_VFSTRACE, "result: %zu, original count %zu\n", result, count);
2079 * Write to a file (through the page cache).
2081 static ssize_t ll_file_write_iter(struct kiocb *iocb, struct iov_iter *from)
2083 struct vvp_io_args *args;
2085 ssize_t rc_tiny = 0, rc_normal;
2086 struct file *file = iocb->ki_filp;
2089 ktime_t kstart = ktime_get();
2094 CDEBUG(D_VFSTRACE|D_IOTRACE, "file %s:"DFID", ppos: %lld, count: %zu\n",
2095 file_dentry(file)->d_name.name,
2096 PFID(ll_inode2fid(file_inode(file))), iocb->ki_pos,
2097 iov_iter_count(from));
2099 if (!iov_iter_count(from))
2100 GOTO(out, rc_normal = 0);
2103 * When PCC write failed, we usually do not fall back to the normal
2104 * write path, just return the error. But there is a special case when
2105 * returned error code is -ENOSPC due to running out of space on PCC HSM
2106 * bakcend. At this time, it will fall back to normal I/O path and
2107 * retry the I/O. As the file is in HSM released state, it will restore
2108 * the file data to OSTs first and redo the write again. And the
2109 * restore process will revoke the layout lock and detach the file
2110 * from PCC cache automatically.
2112 result = pcc_file_write_iter(iocb, from, &cached);
2113 if (cached && result != -ENOSPC && result != -EDQUOT)
2114 GOTO(out, rc_normal = result);
2116 /* NB: we can't do direct IO for tiny writes because they use the page
2117 * cache, we can't do sync writes because tiny writes can't flush
2118 * pages, and we can't do append writes because we can't guarantee the
2119 * required DLM locks are held to protect file size.
2121 if (ll_sbi_has_tiny_write(ll_i2sbi(file_inode(file))) &&
2122 !(file->f_flags & (O_DIRECT | O_SYNC | O_APPEND)))
2123 rc_tiny = ll_do_tiny_write(iocb, from);
2125 /* In case of error, go on and try normal write - Only stop if tiny
2126 * write completed I/O.
2128 if (iov_iter_count(from) == 0)
2129 GOTO(out, rc_normal = rc_tiny);
2131 env = cl_env_get(&refcheck);
2133 RETURN(PTR_ERR(env));
2135 args = ll_env_args(env);
2136 args->u.normal.via_iter = from;
2137 args->u.normal.via_iocb = iocb;
2139 rc_normal = ll_file_io_generic(env, args, file, CIT_WRITE,
2140 &iocb->ki_pos, iov_iter_count(from));
2142 /* On success, combine bytes written. */
2143 if (rc_tiny >= 0 && rc_normal > 0)
2144 rc_normal += rc_tiny;
2145 /* On error, only return error from normal write if tiny write did not
2146 * write any bytes. Otherwise return bytes written by tiny write.
2148 else if (rc_tiny > 0)
2149 rc_normal = rc_tiny;
2151 cl_env_put(env, &refcheck);
2153 if (rc_normal > 0) {
2154 ll_rw_stats_tally(ll_i2sbi(file_inode(file)), current->pid,
2155 file->private_data, iocb->ki_pos,
2157 ll_stats_ops_tally(ll_i2sbi(file_inode(file)), LPROC_LL_WRITE,
2158 ktime_us_delta(ktime_get(), kstart));
2162 "COMPLETED: file %s:"DFID", ppos: %lld, count: %zu\n",
2163 file_dentry(file)->d_name.name,
2164 PFID(ll_inode2fid(file_inode(file))), iocb->ki_pos,
2165 iov_iter_count(from));
2170 #ifndef HAVE_FILE_OPERATIONS_READ_WRITE_ITER
2172 * XXX: exact copy from kernel code (__generic_file_aio_write_nolock)
2174 static int ll_file_get_iov_count(const struct iovec *iov,
2175 unsigned long *nr_segs, size_t *count,
2181 for (seg = 0; seg < *nr_segs; seg++) {
2182 const struct iovec *iv = &iov[seg];
2185 * If any segment has a negative length, or the cumulative
2186 * length ever wraps negative then return -EINVAL.
2189 if (unlikely((ssize_t)(cnt|iv->iov_len) < 0))
2191 if (access_ok(access_flags, iv->iov_base, iv->iov_len))
2196 cnt -= iv->iov_len; /* This segment is no good */
2203 static ssize_t ll_file_aio_read(struct kiocb *iocb, const struct iovec *iov,
2204 unsigned long nr_segs, loff_t pos)
2211 result = ll_file_get_iov_count(iov, &nr_segs, &iov_count, VERIFY_READ);
2218 # ifdef HAVE_IOV_ITER_INIT_DIRECTION
2219 iov_iter_init(&to, READ, iov, nr_segs, iov_count);
2220 # else /* !HAVE_IOV_ITER_INIT_DIRECTION */
2221 iov_iter_init(&to, iov, nr_segs, iov_count, 0);
2222 # endif /* HAVE_IOV_ITER_INIT_DIRECTION */
2224 result = ll_file_read_iter(iocb, &to);
2229 static ssize_t ll_file_read(struct file *file, char __user *buf, size_t count,
2232 struct iovec iov = { .iov_base = buf, .iov_len = count };
2241 init_sync_kiocb(&kiocb, file);
2242 kiocb.ki_pos = *ppos;
2243 #ifdef HAVE_KIOCB_KI_LEFT
2244 kiocb.ki_left = count;
2245 #elif defined(HAVE_KI_NBYTES)
2246 kiocb.i_nbytes = count;
2249 result = ll_file_aio_read(&kiocb, &iov, 1, kiocb.ki_pos);
2250 *ppos = kiocb.ki_pos;
2256 * Write to a file (through the page cache).
2259 static ssize_t ll_file_aio_write(struct kiocb *iocb, const struct iovec *iov,
2260 unsigned long nr_segs, loff_t pos)
2262 struct iov_iter from;
2267 result = ll_file_get_iov_count(iov, &nr_segs, &iov_count, VERIFY_WRITE);
2274 # ifdef HAVE_IOV_ITER_INIT_DIRECTION
2275 iov_iter_init(&from, WRITE, iov, nr_segs, iov_count);
2276 # else /* !HAVE_IOV_ITER_INIT_DIRECTION */
2277 iov_iter_init(&from, iov, nr_segs, iov_count, 0);
2278 # endif /* HAVE_IOV_ITER_INIT_DIRECTION */
2280 result = ll_file_write_iter(iocb, &from);
2285 static ssize_t ll_file_write(struct file *file, const char __user *buf,
2286 size_t count, loff_t *ppos)
2288 struct iovec iov = { .iov_base = (void __user *)buf,
2298 init_sync_kiocb(&kiocb, file);
2299 kiocb.ki_pos = *ppos;
2300 #ifdef HAVE_KIOCB_KI_LEFT
2301 kiocb.ki_left = count;
2302 #elif defined(HAVE_KI_NBYTES)
2303 kiocb.ki_nbytes = count;
2306 result = ll_file_aio_write(&kiocb, &iov, 1, kiocb.ki_pos);
2307 *ppos = kiocb.ki_pos;
2311 #endif /* !HAVE_FILE_OPERATIONS_READ_WRITE_ITER */
2313 int ll_lov_setstripe_ea_info(struct inode *inode, struct dentry *dentry,
2314 __u64 flags, struct lov_user_md *lum, int lum_size)
2316 struct lookup_intent oit = {
2318 .it_flags = flags | MDS_OPEN_BY_FID,
2323 if ((__swab32(lum->lmm_magic) & le32_to_cpu(LOV_MAGIC_MASK)) ==
2324 le32_to_cpu(LOV_MAGIC_MAGIC)) {
2325 /* this code will only exist for big-endian systems */
2326 lustre_swab_lov_user_md(lum, 0);
2329 ll_inode_size_lock(inode);
2330 rc = ll_intent_file_open(dentry, lum, lum_size, &oit);
2332 GOTO(out_unlock, rc);
2334 ll_release_openhandle(dentry, &oit);
2337 ll_inode_size_unlock(inode);
2338 ll_intent_release(&oit);
2343 int ll_lov_getstripe_ea_info(struct inode *inode, const char *filename,
2344 struct lov_mds_md **lmmp, int *lmm_size,
2345 struct ptlrpc_request **request)
2347 struct ll_sb_info *sbi = ll_i2sbi(inode);
2348 struct mdt_body *body;
2349 struct lov_mds_md *lmm = NULL;
2350 struct ptlrpc_request *req = NULL;
2351 struct md_op_data *op_data;
2356 rc = ll_get_default_mdsize(sbi, &lmmsize);
2360 op_data = ll_prep_md_op_data(NULL, inode, NULL, filename,
2361 strlen(filename), lmmsize,
2362 LUSTRE_OPC_ANY, NULL);
2363 if (IS_ERR(op_data))
2364 RETURN(PTR_ERR(op_data));
2366 op_data->op_valid = OBD_MD_FLEASIZE | OBD_MD_FLDIREA;
2367 rc = md_getattr_name(sbi->ll_md_exp, op_data, &req);
2368 ll_finish_md_op_data(op_data);
2370 CDEBUG(D_INFO, "md_getattr_name failed on %s: rc %d\n",
2375 body = req_capsule_server_get(&req->rq_pill, &RMF_MDT_BODY);
2376 LASSERT(body != NULL); /* checked by mdc_getattr_name */
2378 lmmsize = body->mbo_eadatasize;
2380 if (!(body->mbo_valid & (OBD_MD_FLEASIZE | OBD_MD_FLDIREA)) ||
2382 GOTO(out, rc = -ENODATA);
2384 lmm = req_capsule_server_sized_get(&req->rq_pill, &RMF_MDT_MD, lmmsize);
2385 LASSERT(lmm != NULL);
2387 if (lmm->lmm_magic != cpu_to_le32(LOV_MAGIC_V1) &&
2388 lmm->lmm_magic != cpu_to_le32(LOV_MAGIC_V3) &&
2389 lmm->lmm_magic != cpu_to_le32(LOV_MAGIC_COMP_V1) &&
2390 lmm->lmm_magic != cpu_to_le32(LOV_MAGIC_FOREIGN))
2391 GOTO(out, rc = -EPROTO);
2394 * This is coming from the MDS, so is probably in
2395 * little endian. We convert it to host endian before
2396 * passing it to userspace.
2398 if (cpu_to_le32(LOV_MAGIC) != LOV_MAGIC) {
2399 int stripe_count = 0;
2401 if (lmm->lmm_magic == cpu_to_le32(LOV_MAGIC_V1) ||
2402 lmm->lmm_magic == cpu_to_le32(LOV_MAGIC_V3)) {
2403 stripe_count = le16_to_cpu(lmm->lmm_stripe_count);
2404 if (le32_to_cpu(lmm->lmm_pattern) &
2405 LOV_PATTERN_F_RELEASED)
2407 lustre_swab_lov_user_md((struct lov_user_md *)lmm, 0);
2409 /* if function called for directory - we should
2410 * avoid swab not existent lsm objects
2412 if (lmm->lmm_magic == LOV_MAGIC_V1 &&
2413 S_ISREG(body->mbo_mode))
2414 lustre_swab_lov_user_md_objects(
2415 ((struct lov_user_md_v1 *)lmm)->lmm_objects,
2417 else if (lmm->lmm_magic == LOV_MAGIC_V3 &&
2418 S_ISREG(body->mbo_mode))
2419 lustre_swab_lov_user_md_objects(
2420 ((struct lov_user_md_v3 *)lmm)->lmm_objects,
2422 } else if (lmm->lmm_magic == cpu_to_le32(LOV_MAGIC_COMP_V1)) {
2423 lustre_swab_lov_comp_md_v1(
2424 (struct lov_comp_md_v1 *)lmm);
2428 if (lmm->lmm_magic == LOV_MAGIC_COMP_V1) {
2429 struct lov_comp_md_v1 *comp_v1 = NULL;
2430 struct lov_comp_md_entry_v1 *ent;
2431 struct lov_user_md_v1 *v1;
2435 comp_v1 = (struct lov_comp_md_v1 *)lmm;
2436 /* Dump the striping information */
2437 for (; i < comp_v1->lcm_entry_count; i++) {
2438 ent = &comp_v1->lcm_entries[i];
2439 off = ent->lcme_offset;
2440 v1 = (struct lov_user_md_v1 *)((char *)lmm + off);
2442 "comp[%d]: stripe_count=%u, stripe_size=%u\n",
2443 i, v1->lmm_stripe_count, v1->lmm_stripe_size);
2447 * Return valid stripe_count and stripe_size instead of 0 for
2448 * DoM files to avoid divide-by-zero for older userspace that
2449 * calls this ioctl, e.g. lustre ADIO driver.
2451 if (lmm->lmm_stripe_count == 0)
2452 lmm->lmm_stripe_count = 1;
2453 if (lmm->lmm_stripe_size == 0) {
2454 /* Since the first component of the file data is placed
2455 * on the MDT for faster access, the stripe_size of the
2456 * second one is always that applications which are
2459 if (lmm->lmm_pattern == LOV_PATTERN_MDT)
2460 i = comp_v1->lcm_entry_count > 1 ? 1 : 0;
2462 i = comp_v1->lcm_entry_count > 1 ?
2463 comp_v1->lcm_entry_count - 1 : 0;
2464 ent = &comp_v1->lcm_entries[i];
2465 off = ent->lcme_offset;
2466 v1 = (struct lov_user_md_v1 *)((char *)lmm + off);
2467 lmm->lmm_stripe_size = v1->lmm_stripe_size;
2472 *lmm_size = lmmsize;
2477 static int ll_lov_setea(struct inode *inode, struct file *file,
2480 __u64 flags = MDS_OPEN_HAS_OBJS | FMODE_WRITE;
2481 struct lov_user_md *lump;
2482 int lum_size = sizeof(struct lov_user_md) +
2483 sizeof(struct lov_user_ost_data);
2487 if (!capable(CAP_SYS_ADMIN))
2490 OBD_ALLOC_LARGE(lump, lum_size);
2494 if (copy_from_user(lump, arg, lum_size))
2495 GOTO(out_lump, rc = -EFAULT);
2497 rc = ll_lov_setstripe_ea_info(inode, file_dentry(file), flags, lump,
2499 cl_lov_delay_create_clear(&file->f_flags);
2502 OBD_FREE_LARGE(lump, lum_size);
2506 static int ll_file_getstripe(struct inode *inode, void __user *lum, size_t size)
2513 env = cl_env_get(&refcheck);
2515 RETURN(PTR_ERR(env));
2517 rc = cl_object_getstripe(env, ll_i2info(inode)->lli_clob, lum, size);
2518 cl_env_put(env, &refcheck);
2522 static int ll_lov_setstripe(struct inode *inode, struct file *file,
2525 struct lov_user_md __user *lum = (struct lov_user_md __user *)arg;
2526 struct lov_user_md *klum;
2528 __u64 flags = FMODE_WRITE;
2531 rc = ll_copy_user_md(lum, &klum);
2536 rc = ll_lov_setstripe_ea_info(inode, file_dentry(file), flags, klum,
2541 rc = put_user(0, &lum->lmm_stripe_count);
2545 rc = ll_layout_refresh(inode, &gen);
2549 rc = ll_file_getstripe(inode, arg, lum_size);
2550 if (S_ISREG(inode->i_mode) && IS_ENCRYPTED(inode) &&
2551 ll_i2info(inode)->lli_clob) {
2552 struct iattr attr = { 0 };
2554 rc = cl_setattr_ost(ll_i2info(inode)->lli_clob, &attr,
2555 OP_XVALID_FLAGS, LUSTRE_ENCRYPT_FL);
2558 cl_lov_delay_create_clear(&file->f_flags);
2561 OBD_FREE_LARGE(klum, lum_size);
2567 ll_get_grouplock(struct inode *inode, struct file *file, unsigned long arg)
2569 struct ll_inode_info *lli = ll_i2info(inode);
2570 struct cl_object *obj = lli->lli_clob;
2571 struct ll_file_data *fd = file->private_data;
2572 struct ll_grouplock grouplock;
2577 CWARN("group id for group lock must not be 0\n");
2581 if (ll_file_nolock(file))
2582 RETURN(-EOPNOTSUPP);
2584 if (file->f_flags & O_NONBLOCK) {
2585 if (!mutex_trylock(&lli->lli_group_mutex))
2588 mutex_lock(&lli->lli_group_mutex);
2590 if (fd->fd_flags & LL_FILE_GROUP_LOCKED) {
2591 CWARN("group lock already existed with gid %lu\n",
2592 fd->fd_grouplock.lg_gid);
2593 GOTO(out, rc = -EINVAL);
2595 if (arg != lli->lli_group_gid && lli->lli_group_users != 0) {
2596 if (file->f_flags & O_NONBLOCK)
2597 GOTO(out, rc = -EAGAIN);
2598 mutex_unlock(&lli->lli_group_mutex);
2599 wait_var_event(&lli->lli_group_users, !lli->lli_group_users);
2600 GOTO(retry, rc = 0);
2602 LASSERT(fd->fd_grouplock.lg_lock == NULL);
2605 * XXX: group lock needs to protect all OST objects while PFL
2606 * can add new OST objects during the IO, so we'd instantiate
2607 * all OST objects before getting its group lock.
2612 struct cl_layout cl = {
2613 .cl_is_composite = false,
2615 struct lu_extent ext = {
2617 .e_end = OBD_OBJECT_EOF,
2620 env = cl_env_get(&refcheck);
2622 GOTO(out, rc = PTR_ERR(env));
2624 rc = cl_object_layout_get(env, obj, &cl);
2625 if (rc >= 0 && cl.cl_is_composite)
2626 rc = ll_layout_write_intent(inode, LAYOUT_INTENT_WRITE,
2629 cl_env_put(env, &refcheck);
2634 rc = cl_get_grouplock(ll_i2info(inode)->lli_clob,
2635 arg, (file->f_flags & O_NONBLOCK), &grouplock);
2640 fd->fd_flags |= LL_FILE_GROUP_LOCKED;
2641 fd->fd_grouplock = grouplock;
2642 if (lli->lli_group_users == 0)
2643 lli->lli_group_gid = grouplock.lg_gid;
2644 lli->lli_group_users++;
2646 CDEBUG(D_INFO, "group lock %lu obtained\n", arg);
2648 mutex_unlock(&lli->lli_group_mutex);
2653 static int ll_put_grouplock(struct inode *inode, struct file *file,
2656 struct ll_inode_info *lli = ll_i2info(inode);
2657 struct ll_file_data *fd = file->private_data;
2658 struct ll_grouplock grouplock;
2662 mutex_lock(&lli->lli_group_mutex);
2663 if (!(fd->fd_flags & LL_FILE_GROUP_LOCKED)) {
2664 CWARN("no group lock held\n");
2665 GOTO(out, rc = -EINVAL);
2668 LASSERT(fd->fd_grouplock.lg_lock != NULL);
2670 if (fd->fd_grouplock.lg_gid != arg) {
2671 CWARN("group lock %lu doesn't match current id %lu\n",
2672 arg, fd->fd_grouplock.lg_gid);
2673 GOTO(out, rc = -EINVAL);
2676 grouplock = fd->fd_grouplock;
2677 memset(&fd->fd_grouplock, 0, sizeof(fd->fd_grouplock));
2678 fd->fd_flags &= ~LL_FILE_GROUP_LOCKED;
2680 cl_put_grouplock(&grouplock);
2682 lli->lli_group_users--;
2683 if (lli->lli_group_users == 0) {
2684 lli->lli_group_gid = 0;
2685 wake_up_var(&lli->lli_group_users);
2687 CDEBUG(D_INFO, "group lock %lu released\n", arg);
2690 mutex_unlock(&lli->lli_group_mutex);
2696 * Close inode open handle
2698 * \param dentry [in] dentry which contains the inode
2699 * \param it [in,out] intent which contains open info and result
2702 * \retval <0 failure
2704 int ll_release_openhandle(struct dentry *dentry, struct lookup_intent *it)
2706 struct inode *inode = dentry->d_inode;
2707 struct obd_client_handle *och;
2713 /* Root ? Do nothing. */
2714 if (is_root_inode(inode))
2717 /* No open handle to close? Move away */
2718 if (!it_disposition(it, DISP_OPEN_OPEN))
2721 LASSERT(it_open_error(DISP_OPEN_OPEN, it) == 0);
2723 OBD_ALLOC(och, sizeof(*och));
2725 GOTO(out, rc = -ENOMEM);
2727 rc = ll_och_fill(ll_i2sbi(inode)->ll_md_exp, it, och);
2731 rc = ll_close_inode_openhandle(inode, och, 0, NULL);
2733 /* this one is in place of ll_file_open */
2734 if (it_disposition(it, DISP_ENQ_OPEN_REF)) {
2735 ptlrpc_req_finished(it->it_request);
2736 it_clear_disposition(it, DISP_ENQ_OPEN_REF);
2742 * Get size for inode for which FIEMAP mapping is requested.
2743 * Make the FIEMAP get_info call and returns the result.
2744 * \param fiemap kernel buffer to hold extens
2745 * \param num_bytes kernel buffer size
2747 static int ll_do_fiemap(struct inode *inode, struct fiemap *fiemap,
2753 struct ll_fiemap_info_key fmkey = { .lfik_name = KEY_FIEMAP, };
2756 /* Checks for fiemap flags */
2757 if (fiemap->fm_flags & ~LUSTRE_FIEMAP_FLAGS_COMPAT) {
2758 fiemap->fm_flags &= ~LUSTRE_FIEMAP_FLAGS_COMPAT;
2762 /* Check for FIEMAP_FLAG_SYNC */
2763 if (fiemap->fm_flags & FIEMAP_FLAG_SYNC) {
2764 rc = filemap_fdatawrite(inode->i_mapping);
2769 env = cl_env_get(&refcheck);
2771 RETURN(PTR_ERR(env));
2773 if (i_size_read(inode) == 0) {
2774 rc = ll_glimpse_size(inode);
2779 fmkey.lfik_oa.o_valid = OBD_MD_FLID | OBD_MD_FLGROUP | OBD_MD_FLPROJID;
2780 obdo_from_inode(&fmkey.lfik_oa, inode, OBD_MD_FLSIZE);
2781 obdo_set_parent_fid(&fmkey.lfik_oa, &ll_i2info(inode)->lli_fid);
2783 /* If filesize is 0, then there would be no objects for mapping */
2784 if (fmkey.lfik_oa.o_size == 0) {
2785 fiemap->fm_mapped_extents = 0;
2789 fmkey.lfik_fiemap = *fiemap;
2791 rc = cl_object_fiemap(env, ll_i2info(inode)->lli_clob,
2792 &fmkey, fiemap, &num_bytes);
2794 cl_env_put(env, &refcheck);
2798 int ll_fid2path(struct inode *inode, void __user *arg)
2800 struct obd_export *exp = ll_i2mdexp(inode);
2801 const struct getinfo_fid2path __user *gfin = arg;
2803 struct getinfo_fid2path *gfout;
2809 if (!capable(CAP_DAC_READ_SEARCH) &&
2810 !test_bit(LL_SBI_USER_FID2PATH, ll_i2sbi(inode)->ll_flags))
2813 /* Only need to get the buflen */
2814 if (get_user(pathlen, &gfin->gf_pathlen))
2817 if (pathlen > PATH_MAX)
2820 outsize = sizeof(*gfout) + pathlen;
2821 OBD_ALLOC(gfout, outsize);
2825 if (copy_from_user(gfout, arg, sizeof(*gfout)))
2826 GOTO(gf_free, rc = -EFAULT);
2827 /* append root FID after gfout to let MDT know the root FID so that it
2828 * can lookup the correct path, this is mainly for fileset.
2829 * old server without fileset mount support will ignore this. */
2830 *gfout->gf_u.gf_root_fid = *ll_inode2fid(inode);
2832 /* Call mdc_iocontrol */
2833 rc = obd_iocontrol(OBD_IOC_FID2PATH, exp, outsize, gfout, NULL);
2837 if (copy_to_user(arg, gfout, outsize))
2841 OBD_FREE(gfout, outsize);
2846 ll_ioc_data_version(struct inode *inode, struct ioc_data_version *ioc)
2848 struct cl_object *obj = ll_i2info(inode)->lli_clob;
2856 ioc->idv_version = 0;
2857 ioc->idv_layout_version = UINT_MAX;
2859 /* If no file object initialized, we consider its version is 0. */
2863 env = cl_env_get(&refcheck);
2865 RETURN(PTR_ERR(env));
2867 io = vvp_env_thread_io(env);
2869 io->u.ci_data_version.dv_data_version = 0;
2870 io->u.ci_data_version.dv_layout_version = UINT_MAX;
2871 io->u.ci_data_version.dv_flags = ioc->idv_flags;
2874 if (cl_io_init(env, io, CIT_DATA_VERSION, io->ci_obj) == 0)
2875 result = cl_io_loop(env, io);
2877 result = io->ci_result;
2879 ioc->idv_version = io->u.ci_data_version.dv_data_version;
2880 ioc->idv_layout_version = io->u.ci_data_version.dv_layout_version;
2882 cl_io_fini(env, io);
2884 if (unlikely(io->ci_need_restart))
2887 cl_env_put(env, &refcheck);
2893 * Read the data_version for inode.
2895 * This value is computed using stripe object version on OST.
2896 * Version is computed using server side locking.
2898 * @param flags if do sync on the OST side;
2900 * LL_DV_RD_FLUSH: flush dirty pages, LCK_PR on OSTs
2901 * LL_DV_WR_FLUSH: drop all caching pages, LCK_PW on OSTs
2903 int ll_data_version(struct inode *inode, __u64 *data_version, int flags)
2905 struct ioc_data_version ioc = { .idv_flags = flags };
2908 rc = ll_ioc_data_version(inode, &ioc);
2910 *data_version = ioc.idv_version;
2916 * Trigger a HSM release request for the provided inode.
2918 int ll_hsm_release(struct inode *inode)
2921 struct obd_client_handle *och = NULL;
2922 __u64 data_version = 0;
2928 CDEBUG(D_INODE, "%s: Releasing file "DFID".\n",
2929 ll_i2sbi(inode)->ll_fsname,
2930 PFID(&ll_i2info(inode)->lli_fid));
2932 och = ll_lease_open(inode, NULL, FMODE_WRITE, MDS_OPEN_RELEASE);
2934 GOTO(out, rc = PTR_ERR(och));
2936 /* Grab latest data_version and [am]time values */
2937 rc = ll_data_version(inode, &data_version,
2938 LL_DV_WR_FLUSH | LL_DV_SZ_UPDATE);
2942 env = cl_env_get(&refcheck);
2944 GOTO(out, rc = PTR_ERR(env));
2946 rc = ll_merge_attr(env, inode);
2947 cl_env_put(env, &refcheck);
2949 /* If error happen, we have the wrong size for a file.
2955 /* Release the file.
2956 * NB: lease lock handle is released in mdc_hsm_release_pack() because
2957 * we still need it to pack l_remote_handle to MDT. */
2958 rc = ll_close_inode_openhandle(inode, och, MDS_HSM_RELEASE,
2964 if (och != NULL && !IS_ERR(och)) /* close the file */
2965 ll_lease_close(och, inode, NULL);
2970 struct ll_swap_stack {
2973 struct inode *inode1;
2974 struct inode *inode2;
2979 static int ll_swap_layouts(struct file *file1, struct file *file2,
2980 struct lustre_swap_layouts *lsl)
2982 struct mdc_swap_layouts msl;
2983 struct md_op_data *op_data;
2986 struct ll_swap_stack *llss = NULL;
2989 OBD_ALLOC_PTR(llss);
2993 llss->inode1 = file_inode(file1);
2994 llss->inode2 = file_inode(file2);
2996 rc = ll_check_swap_layouts_validity(llss->inode1, llss->inode2);
3000 /* we use 2 bool because it is easier to swap than 2 bits */
3001 if (lsl->sl_flags & SWAP_LAYOUTS_CHECK_DV1)
3002 llss->check_dv1 = true;
3004 if (lsl->sl_flags & SWAP_LAYOUTS_CHECK_DV2)
3005 llss->check_dv2 = true;
3007 /* we cannot use lsl->sl_dvX directly because we may swap them */
3008 llss->dv1 = lsl->sl_dv1;
3009 llss->dv2 = lsl->sl_dv2;
3011 rc = lu_fid_cmp(ll_inode2fid(llss->inode1), ll_inode2fid(llss->inode2));
3012 if (rc == 0) /* same file, done! */
3015 if (rc < 0) { /* sequentialize it */
3016 swap(llss->inode1, llss->inode2);
3018 swap(llss->dv1, llss->dv2);
3019 swap(llss->check_dv1, llss->check_dv2);
3023 if (gid != 0) { /* application asks to flush dirty cache */
3024 rc = ll_get_grouplock(llss->inode1, file1, gid);
3028 rc = ll_get_grouplock(llss->inode2, file2, gid);
3030 ll_put_grouplock(llss->inode1, file1, gid);
3035 /* ultimate check, before swaping the layouts we check if
3036 * dataversion has changed (if requested) */
3037 if (llss->check_dv1) {
3038 rc = ll_data_version(llss->inode1, &dv, 0);
3041 if (dv != llss->dv1)
3042 GOTO(putgl, rc = -EAGAIN);
3045 if (llss->check_dv2) {
3046 rc = ll_data_version(llss->inode2, &dv, 0);
3049 if (dv != llss->dv2)
3050 GOTO(putgl, rc = -EAGAIN);
3053 /* struct md_op_data is used to send the swap args to the mdt
3054 * only flags is missing, so we use struct mdc_swap_layouts
3055 * through the md_op_data->op_data */
3056 /* flags from user space have to be converted before they are send to
3057 * server, no flag is sent today, they are only used on the client */
3060 op_data = ll_prep_md_op_data(NULL, llss->inode1, llss->inode2, NULL, 0,
3061 0, LUSTRE_OPC_ANY, &msl);
3062 if (IS_ERR(op_data))
3063 GOTO(free, rc = PTR_ERR(op_data));
3065 rc = obd_iocontrol(LL_IOC_LOV_SWAP_LAYOUTS, ll_i2mdexp(llss->inode1),
3066 sizeof(*op_data), op_data, NULL);
3067 ll_finish_md_op_data(op_data);
3074 ll_put_grouplock(llss->inode2, file2, gid);
3075 ll_put_grouplock(llss->inode1, file1, gid);
3085 int ll_hsm_state_set(struct inode *inode, struct hsm_state_set *hss)
3087 struct obd_export *exp = ll_i2mdexp(inode);
3088 struct md_op_data *op_data;
3092 /* Detect out-of range masks */
3093 if ((hss->hss_setmask | hss->hss_clearmask) & ~HSM_FLAGS_MASK)
3096 /* Non-root users are forbidden to set or clear flags which are
3097 * NOT defined in HSM_USER_MASK. */
3098 if (((hss->hss_setmask | hss->hss_clearmask) & ~HSM_USER_MASK) &&
3099 !capable(CAP_SYS_ADMIN))
3102 if (!exp_connect_archive_id_array(exp)) {
3103 /* Detect out-of range archive id */
3104 if ((hss->hss_valid & HSS_ARCHIVE_ID) &&
3105 (hss->hss_archive_id > LL_HSM_ORIGIN_MAX_ARCHIVE))
3109 op_data = ll_prep_md_op_data(NULL, inode, NULL, NULL, 0, 0,
3110 LUSTRE_OPC_ANY, hss);
3111 if (IS_ERR(op_data))
3112 RETURN(PTR_ERR(op_data));
3114 rc = obd_iocontrol(LL_IOC_HSM_STATE_SET, exp, sizeof(*op_data),
3117 ll_finish_md_op_data(op_data);
3122 static int ll_hsm_import(struct inode *inode, struct file *file,
3123 struct hsm_user_import *hui)
3125 struct hsm_state_set *hss = NULL;
3126 struct iattr *attr = NULL;
3130 if (!S_ISREG(inode->i_mode))
3136 GOTO(out, rc = -ENOMEM);
3138 hss->hss_valid = HSS_SETMASK | HSS_ARCHIVE_ID;
3139 hss->hss_archive_id = hui->hui_archive_id;
3140 hss->hss_setmask = HS_ARCHIVED | HS_EXISTS | HS_RELEASED;
3141 rc = ll_hsm_state_set(inode, hss);
3145 OBD_ALLOC_PTR(attr);
3147 GOTO(out, rc = -ENOMEM);
3149 attr->ia_mode = hui->hui_mode & (S_IRWXU | S_IRWXG | S_IRWXO);
3150 attr->ia_mode |= S_IFREG;
3151 attr->ia_uid = make_kuid(&init_user_ns, hui->hui_uid);
3152 attr->ia_gid = make_kgid(&init_user_ns, hui->hui_gid);
3153 attr->ia_size = hui->hui_size;
3154 attr->ia_mtime.tv_sec = hui->hui_mtime;
3155 attr->ia_mtime.tv_nsec = hui->hui_mtime_ns;
3156 attr->ia_atime.tv_sec = hui->hui_atime;
3157 attr->ia_atime.tv_nsec = hui->hui_atime_ns;
3159 attr->ia_valid = ATTR_SIZE | ATTR_MODE | ATTR_FORCE |
3160 ATTR_UID | ATTR_GID |
3161 ATTR_MTIME | ATTR_MTIME_SET |
3162 ATTR_ATIME | ATTR_ATIME_SET;
3166 rc = ll_setattr_raw(file_dentry(file), attr, 0, true);
3170 inode_unlock(inode);
3182 static inline long ll_lease_type_from_fmode(fmode_t fmode)
3184 return ((fmode & FMODE_READ) ? LL_LEASE_RDLCK : 0) |
3185 ((fmode & FMODE_WRITE) ? LL_LEASE_WRLCK : 0);
3188 static int ll_file_futimes_3(struct file *file, const struct ll_futimes_3 *lfu)
3190 struct inode *inode = file_inode(file);
3192 .ia_valid = ATTR_ATIME | ATTR_ATIME_SET |
3193 ATTR_MTIME | ATTR_MTIME_SET |
3196 .tv_sec = lfu->lfu_atime_sec,
3197 .tv_nsec = lfu->lfu_atime_nsec,
3200 .tv_sec = lfu->lfu_mtime_sec,
3201 .tv_nsec = lfu->lfu_mtime_nsec,
3204 .tv_sec = lfu->lfu_ctime_sec,
3205 .tv_nsec = lfu->lfu_ctime_nsec,
3211 if (!capable(CAP_SYS_ADMIN))
3214 if (!S_ISREG(inode->i_mode))
3218 rc = ll_setattr_raw(file_dentry(file), &ia, OP_XVALID_CTIME_SET,
3220 inode_unlock(inode);
3225 static enum cl_lock_mode cl_mode_user_to_kernel(enum lock_mode_user mode)
3228 case MODE_READ_USER:
3230 case MODE_WRITE_USER:
3237 static const char *const user_lockname[] = LOCK_MODE_NAMES;
3239 /* Used to allow the upper layers of the client to request an LDLM lock
3240 * without doing an actual read or write.
3242 * Used for ladvise lockahead to manually request specific locks.
3244 * \param[in] file file this ladvise lock request is on
3245 * \param[in] ladvise ladvise struct describing this lock request
3247 * \retval 0 success, no detailed result available (sync requests
3248 * and requests sent to the server [not handled locally]
3249 * cannot return detailed results)
3250 * \retval LLA_RESULT_{SAME,DIFFERENT} - detailed result of the lock request,
3251 * see definitions for details.
3252 * \retval negative negative errno on error
3254 int ll_file_lock_ahead(struct file *file, struct llapi_lu_ladvise *ladvise)
3256 struct lu_env *env = NULL;
3257 struct cl_io *io = NULL;
3258 struct cl_lock *lock = NULL;
3259 struct cl_lock_descr *descr = NULL;
3260 struct dentry *dentry = file->f_path.dentry;
3261 struct inode *inode = dentry->d_inode;
3262 enum cl_lock_mode cl_mode;
3263 off_t start = ladvise->lla_start;
3264 off_t end = ladvise->lla_end;
3271 "Lock request: file=%pd, inode=%p, mode=%s start=%llu, end=%llu\n",
3272 dentry, dentry->d_inode,
3273 user_lockname[ladvise->lla_lockahead_mode], (__u64) start,
3276 cl_mode = cl_mode_user_to_kernel(ladvise->lla_lockahead_mode);
3278 GOTO(out, result = cl_mode);
3280 /* Get IO environment */
3281 result = cl_io_get(inode, &env, &io, &refcheck);
3285 result = cl_io_init(env, io, CIT_MISC, io->ci_obj);
3288 * nothing to do for this io. This currently happens when
3289 * stripe sub-object's are not yet created.
3291 result = io->ci_result;
3292 } else if (result == 0) {
3293 lock = vvp_env_lock(env);
3294 descr = &lock->cll_descr;
3296 descr->cld_obj = io->ci_obj;
3297 /* Convert byte offsets to pages */
3298 descr->cld_start = cl_index(io->ci_obj, start);
3299 descr->cld_end = cl_index(io->ci_obj, end);
3300 descr->cld_mode = cl_mode;
3301 /* CEF_MUST is used because we do not want to convert a
3302 * lockahead request to a lockless lock */
3303 descr->cld_enq_flags = CEF_MUST | CEF_LOCK_NO_EXPAND;
3305 if (ladvise->lla_peradvice_flags & LF_ASYNC)
3306 descr->cld_enq_flags |= CEF_SPECULATIVE;
3308 result = cl_lock_request(env, io, lock);
3310 /* On success, we need to release the lock */
3312 cl_lock_release(env, lock);
3314 cl_io_fini(env, io);
3315 cl_env_put(env, &refcheck);
3317 /* -ECANCELED indicates a matching lock with a different extent
3318 * was already present, and -EEXIST indicates a matching lock
3319 * on exactly the same extent was already present.
3320 * We convert them to positive values for userspace to make
3321 * recognizing true errors easier.
3322 * Note we can only return these detailed results on async requests,
3323 * as sync requests look the same as i/o requests for locking. */
3324 if (result == -ECANCELED)
3325 result = LLA_RESULT_DIFFERENT;
3326 else if (result == -EEXIST)
3327 result = LLA_RESULT_SAME;
3332 static const char *const ladvise_names[] = LU_LADVISE_NAMES;
3334 static int ll_ladvise_sanity(struct inode *inode,
3335 struct llapi_lu_ladvise *ladvise)
3337 struct ll_sb_info *sbi = ll_i2sbi(inode);
3338 enum lu_ladvise_type advice = ladvise->lla_advice;
3339 /* Note the peradvice flags is a 32 bit field, so per advice flags must
3340 * be in the first 32 bits of enum ladvise_flags */
3341 __u32 flags = ladvise->lla_peradvice_flags;
3342 /* 3 lines at 80 characters per line, should be plenty */
3345 if (advice > LU_LADVISE_MAX || advice == LU_LADVISE_INVALID) {
3348 "%s: advice with value '%d' not recognized, last supported advice is %s (value '%d'): rc = %d\n",
3349 sbi->ll_fsname, advice,
3350 ladvise_names[LU_LADVISE_MAX-1], LU_LADVISE_MAX-1, rc);
3354 /* Per-advice checks */
3356 case LU_LADVISE_LOCKNOEXPAND:
3357 if (flags & ~LF_LOCKNOEXPAND_MASK) {
3359 CDEBUG(D_VFSTRACE, "%s: Invalid flags (%x) for %s: "
3360 "rc = %d\n", sbi->ll_fsname, flags,
3361 ladvise_names[advice], rc);
3365 case LU_LADVISE_LOCKAHEAD:
3366 /* Currently only READ and WRITE modes can be requested */
3367 if (ladvise->lla_lockahead_mode >= MODE_MAX_USER ||
3368 ladvise->lla_lockahead_mode == 0) {
3370 CDEBUG(D_VFSTRACE, "%s: Invalid mode (%d) for %s: "
3371 "rc = %d\n", sbi->ll_fsname,
3372 ladvise->lla_lockahead_mode,
3373 ladvise_names[advice], rc);
3377 case LU_LADVISE_WILLREAD:
3378 case LU_LADVISE_DONTNEED:
3380 /* Note fall through above - These checks apply to all advices
3381 * except LOCKNOEXPAND */
3382 if (flags & ~LF_DEFAULT_MASK) {
3384 CDEBUG(D_VFSTRACE, "%s: Invalid flags (%x) for %s: "
3385 "rc = %d\n", sbi->ll_fsname, flags,
3386 ladvise_names[advice], rc);
3389 if (ladvise->lla_start >= ladvise->lla_end) {
3391 CDEBUG(D_VFSTRACE, "%s: Invalid range (%llu to %llu) "
3392 "for %s: rc = %d\n", sbi->ll_fsname,
3393 ladvise->lla_start, ladvise->lla_end,
3394 ladvise_names[advice], rc);
3406 * Give file access advices
3408 * The ladvise interface is similar to Linux fadvise() system call, except it
3409 * forwards the advices directly from Lustre client to server. The server side
3410 * codes will apply appropriate read-ahead and caching techniques for the
3411 * corresponding files.
3413 * A typical workload for ladvise is e.g. a bunch of different clients are
3414 * doing small random reads of a file, so prefetching pages into OSS cache
3415 * with big linear reads before the random IO is a net benefit. Fetching
3416 * all that data into each client cache with fadvise() may not be, due to
3417 * much more data being sent to the client.
3419 static int ll_ladvise(struct inode *inode, struct file *file, __u64 flags,
3420 struct llapi_lu_ladvise *ladvise)
3424 struct cl_ladvise_io *lio;
3429 env = cl_env_get(&refcheck);
3431 RETURN(PTR_ERR(env));
3433 io = vvp_env_thread_io(env);
3434 io->ci_obj = ll_i2info(inode)->lli_clob;
3436 /* initialize parameters for ladvise */
3437 lio = &io->u.ci_ladvise;
3438 lio->li_start = ladvise->lla_start;
3439 lio->li_end = ladvise->lla_end;
3440 lio->li_fid = ll_inode2fid(inode);
3441 lio->li_advice = ladvise->lla_advice;
3442 lio->li_flags = flags;
3444 if (cl_io_init(env, io, CIT_LADVISE, io->ci_obj) == 0)
3445 rc = cl_io_loop(env, io);
3449 cl_io_fini(env, io);
3450 cl_env_put(env, &refcheck);
3454 static int ll_lock_noexpand(struct file *file, int flags)
3456 struct ll_file_data *fd = file->private_data;
3458 fd->ll_lock_no_expand = !(flags & LF_UNSET);
3463 int ll_ioctl_fsgetxattr(struct inode *inode, unsigned int cmd,
3466 struct fsxattr fsxattr;
3468 if (copy_from_user(&fsxattr,
3469 (const struct fsxattr __user *)arg,
3473 fsxattr.fsx_xflags = ll_inode_flags_to_xflags(inode->i_flags);
3474 if (test_bit(LLIF_PROJECT_INHERIT, &ll_i2info(inode)->lli_flags))
3475 fsxattr.fsx_xflags |= FS_XFLAG_PROJINHERIT;
3476 fsxattr.fsx_projid = ll_i2info(inode)->lli_projid;
3477 if (copy_to_user((struct fsxattr __user *)arg,
3478 &fsxattr, sizeof(fsxattr)))
3484 int ll_ioctl_check_project(struct inode *inode, __u32 xflags,
3488 * Project Quota ID state is only allowed to change from within the init
3489 * namespace. Enforce that restriction only if we are trying to change
3490 * the quota ID state. Everything else is allowed in user namespaces.
3492 if (current_user_ns() == &init_user_ns) {
3494 * Caller is allowed to change the project ID. if it is being
3495 * changed, make sure that the new value is valid.
3497 if (ll_i2info(inode)->lli_projid != projid &&
3498 !projid_valid(make_kprojid(&init_user_ns, projid)))
3504 if (ll_i2info(inode)->lli_projid != projid)
3507 if (test_bit(LLIF_PROJECT_INHERIT, &ll_i2info(inode)->lli_flags)) {
3508 if (!(xflags & FS_XFLAG_PROJINHERIT))
3511 if (xflags & FS_XFLAG_PROJINHERIT)
3518 static int ll_set_project(struct inode *inode, __u32 xflags, __u32 projid)
3520 struct ptlrpc_request *req = NULL;
3521 struct md_op_data *op_data;
3522 struct cl_object *obj;
3523 unsigned int inode_flags;
3526 CDEBUG(D_QUOTA, DFID" xflags=%x projid=%u\n",
3527 PFID(ll_inode2fid(inode)), xflags, projid);
3528 rc = ll_ioctl_check_project(inode, xflags, projid);
3532 op_data = ll_prep_md_op_data(NULL, inode, NULL, NULL, 0, 0,
3533 LUSTRE_OPC_ANY, NULL);
3534 if (IS_ERR(op_data))
3535 RETURN(PTR_ERR(op_data));
3537 inode_flags = ll_xflags_to_inode_flags(xflags);
3538 op_data->op_attr_flags = ll_inode_to_ext_flags(inode_flags);
3539 if (xflags & FS_XFLAG_PROJINHERIT)
3540 op_data->op_attr_flags |= LUSTRE_PROJINHERIT_FL;
3542 /* pass projid to md_op_data */
3543 op_data->op_projid = projid;
3545 op_data->op_xvalid |= OP_XVALID_PROJID | OP_XVALID_FLAGS;
3546 rc = md_setattr(ll_i2sbi(inode)->ll_md_exp, op_data, NULL, 0, &req);
3547 ptlrpc_req_finished(req);
3549 GOTO(out_fsxattr, rc);
3550 ll_update_inode_flags(inode, op_data->op_attr_flags);
3552 /* Avoid OST RPC if this is only ioctl setting project inherit flag */
3553 if (xflags == 0 || xflags == FS_XFLAG_PROJINHERIT)
3554 GOTO(out_fsxattr, rc);
3556 obj = ll_i2info(inode)->lli_clob;
3558 struct iattr attr = { 0 };
3560 rc = cl_setattr_ost(obj, &attr, OP_XVALID_FLAGS, xflags);
3564 ll_finish_md_op_data(op_data);
3568 int ll_ioctl_fssetxattr(struct inode *inode, unsigned int cmd,
3571 struct fsxattr fsxattr;
3575 if (copy_from_user(&fsxattr,
3576 (const struct fsxattr __user *)arg,
3580 RETURN(ll_set_project(inode, fsxattr.fsx_xflags,
3581 fsxattr.fsx_projid));
3584 int ll_ioctl_project(struct file *file, unsigned int cmd,
3587 struct lu_project lu_project;
3588 struct dentry *dentry = file_dentry(file);
3589 struct inode *inode = file_inode(file);
3590 struct dentry *child_dentry = NULL;
3591 int rc = 0, name_len;
3593 if (copy_from_user(&lu_project,
3594 (const struct lu_project __user *)arg,
3595 sizeof(lu_project)))
3598 /* apply child dentry if name is valid */
3599 name_len = strnlen(lu_project.project_name, NAME_MAX);
3600 if (name_len > 0 && name_len <= NAME_MAX) {
3602 child_dentry = lookup_one_len(lu_project.project_name,
3604 inode_unlock(inode);
3605 if (IS_ERR(child_dentry)) {
3606 rc = PTR_ERR(child_dentry);
3609 inode = child_dentry->d_inode;
3614 } else if (name_len > NAME_MAX) {
3619 switch (lu_project.project_type) {
3620 case LU_PROJECT_SET:
3621 rc = ll_set_project(inode, lu_project.project_xflags,
3622 lu_project.project_id);
3624 case LU_PROJECT_GET:
3625 lu_project.project_xflags =
3626 ll_inode_flags_to_xflags(inode->i_flags);
3627 if (test_bit(LLIF_PROJECT_INHERIT,
3628 &ll_i2info(inode)->lli_flags))
3629 lu_project.project_xflags |= FS_XFLAG_PROJINHERIT;
3630 lu_project.project_id = ll_i2info(inode)->lli_projid;
3631 if (copy_to_user((struct lu_project __user *)arg,
3632 &lu_project, sizeof(lu_project))) {
3642 if (!IS_ERR_OR_NULL(child_dentry))
3647 static long ll_file_unlock_lease(struct file *file, struct ll_ioc_lease *ioc,
3650 struct inode *inode = file_inode(file);
3651 struct ll_file_data *fd = file->private_data;
3652 struct ll_inode_info *lli = ll_i2info(inode);
3653 struct obd_client_handle *och = NULL;
3654 struct split_param sp;
3655 struct pcc_param param;
3656 bool lease_broken = false;
3658 enum mds_op_bias bias = 0;
3660 struct file *layout_file = NULL;
3662 size_t data_size = 0;
3663 bool attached = false;
3668 mutex_lock(&lli->lli_och_mutex);
3669 if (fd->fd_lease_och != NULL) {
3670 och = fd->fd_lease_och;
3671 fd->fd_lease_och = NULL;
3673 mutex_unlock(&lli->lli_och_mutex);
3678 fmode = och->och_flags;
3680 switch (ioc->lil_flags) {
3681 case LL_LEASE_RESYNC_DONE:
3682 if (ioc->lil_count > IOC_IDS_MAX)
3683 GOTO(out_lease_close, rc = -EINVAL);
3685 data_size = offsetof(typeof(*ioc), lil_ids[ioc->lil_count]);
3686 OBD_ALLOC(data, data_size);
3688 GOTO(out_lease_close, rc = -ENOMEM);
3690 if (copy_from_user(data, (void __user *)arg, data_size))
3691 GOTO(out_lease_close, rc = -EFAULT);
3693 bias = MDS_CLOSE_RESYNC_DONE;
3695 case LL_LEASE_LAYOUT_MERGE: {
3697 if (ioc->lil_count != 1)
3698 GOTO(out_lease_close, rc = -EINVAL);
3700 arg += sizeof(*ioc);
3701 if (copy_from_user(&fdv, (void __user *)arg, sizeof(__u32)))
3702 GOTO(out_lease_close, rc = -EFAULT);
3704 layout_file = fget(fdv);
3706 GOTO(out_lease_close, rc = -EBADF);
3708 if ((file->f_flags & O_ACCMODE) == O_RDONLY ||
3709 (layout_file->f_flags & O_ACCMODE) == O_RDONLY)
3710 GOTO(out_lease_close, rc = -EPERM);
3712 data = file_inode(layout_file);
3713 bias = MDS_CLOSE_LAYOUT_MERGE;
3716 case LL_LEASE_LAYOUT_SPLIT: {
3719 if (ioc->lil_count != 2)
3720 GOTO(out_lease_close, rc = -EINVAL);
3722 arg += sizeof(*ioc);
3723 if (copy_from_user(&fdv, (void __user *)arg, sizeof(__u32)))
3724 GOTO(out_lease_close, rc = -EFAULT);
3726 arg += sizeof(__u32);
3727 if (copy_from_user(&mirror_id, (void __user *)arg,
3729 GOTO(out_lease_close, rc = -EFAULT);
3731 layout_file = fget(fdv);
3733 GOTO(out_lease_close, rc = -EBADF);
3735 /* if layout_file == file, it means to destroy the mirror */
3736 sp.sp_inode = file_inode(layout_file);
3737 sp.sp_mirror_id = (__u16)mirror_id;
3739 bias = MDS_CLOSE_LAYOUT_SPLIT;
3742 case LL_LEASE_PCC_ATTACH:
3743 if (ioc->lil_count != 1)
3746 if (IS_ENCRYPTED(inode))
3747 RETURN(-EOPNOTSUPP);
3749 arg += sizeof(*ioc);
3750 if (copy_from_user(¶m.pa_archive_id, (void __user *)arg,
3752 GOTO(out_lease_close, rc2 = -EFAULT);
3754 rc2 = pcc_readwrite_attach(file, inode, param.pa_archive_id);
3756 GOTO(out_lease_close, rc2);
3759 /* Grab latest data version */
3760 rc2 = ll_data_version(inode, ¶m.pa_data_version,
3763 GOTO(out_lease_close, rc2);
3766 bias = MDS_PCC_ATTACH;
3769 /* without close intent */
3774 rc = ll_lease_close_intent(och, inode, &lease_broken, bias, data);
3778 rc = ll_lease_och_release(inode, file);
3787 if (ioc->lil_flags == LL_LEASE_RESYNC_DONE && data)
3788 OBD_FREE(data, data_size);
3793 if (ioc->lil_flags == LL_LEASE_PCC_ATTACH) {
3796 rc = pcc_readwrite_attach_fini(file, inode,
3797 param.pa_layout_gen,
3802 ll_layout_refresh(inode, &fd->fd_layout_version);
3805 rc = ll_lease_type_from_fmode(fmode);
3809 static long ll_file_set_lease(struct file *file, struct ll_ioc_lease *ioc,
3812 struct inode *inode = file_inode(file);
3813 struct ll_inode_info *lli = ll_i2info(inode);
3814 struct ll_file_data *fd = file->private_data;
3815 struct obd_client_handle *och = NULL;
3816 __u64 open_flags = 0;
3822 switch (ioc->lil_mode) {
3823 case LL_LEASE_WRLCK:
3824 if (!(file->f_mode & FMODE_WRITE))
3826 fmode = FMODE_WRITE;
3828 case LL_LEASE_RDLCK:
3829 if (!(file->f_mode & FMODE_READ))
3833 case LL_LEASE_UNLCK:
3834 RETURN(ll_file_unlock_lease(file, ioc, arg));
3839 CDEBUG(D_INODE, "Set lease with mode %u\n", fmode);
3841 /* apply for lease */
3842 if (ioc->lil_flags & LL_LEASE_RESYNC)
3843 open_flags = MDS_OPEN_RESYNC;
3844 och = ll_lease_open(inode, file, fmode, open_flags);
3846 RETURN(PTR_ERR(och));
3848 if (ioc->lil_flags & LL_LEASE_RESYNC) {
3849 rc = ll_lease_file_resync(och, inode, arg);
3851 ll_lease_close(och, inode, NULL);
3854 rc = ll_layout_refresh(inode, &fd->fd_layout_version);
3856 ll_lease_close(och, inode, NULL);
3862 mutex_lock(&lli->lli_och_mutex);
3863 if (fd->fd_lease_och == NULL) {
3864 fd->fd_lease_och = och;
3867 mutex_unlock(&lli->lli_och_mutex);
3869 /* impossible now that only excl is supported for now */
3870 ll_lease_close(och, inode, &lease_broken);
3876 static void ll_heat_get(struct inode *inode, struct lu_heat *heat)
3878 struct ll_inode_info *lli = ll_i2info(inode);
3879 struct ll_sb_info *sbi = ll_i2sbi(inode);
3880 __u64 now = ktime_get_real_seconds();
3883 spin_lock(&lli->lli_heat_lock);
3884 heat->lh_flags = lli->lli_heat_flags;
3885 for (i = 0; i < heat->lh_count; i++)
3886 heat->lh_heat[i] = obd_heat_get(&lli->lli_heat_instances[i],
3887 now, sbi->ll_heat_decay_weight,
3888 sbi->ll_heat_period_second);
3889 spin_unlock(&lli->lli_heat_lock);
3892 static int ll_heat_set(struct inode *inode, enum lu_heat_flag flags)
3894 struct ll_inode_info *lli = ll_i2info(inode);
3897 spin_lock(&lli->lli_heat_lock);
3898 if (flags & LU_HEAT_FLAG_CLEAR)
3899 obd_heat_clear(lli->lli_heat_instances, OBD_HEAT_COUNT);
3901 if (flags & LU_HEAT_FLAG_OFF)
3902 lli->lli_heat_flags |= LU_HEAT_FLAG_OFF;
3904 lli->lli_heat_flags &= ~LU_HEAT_FLAG_OFF;
3906 spin_unlock(&lli->lli_heat_lock);
3912 ll_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
3914 struct inode *inode = file_inode(file);
3915 struct ll_file_data *fd = file->private_data;
3919 CDEBUG(D_VFSTRACE, "VFS Op:inode="DFID"(%p), cmd=%x\n",
3920 PFID(ll_inode2fid(inode)), inode, cmd);
3921 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_IOCTL, 1);
3923 /* asm-ppc{,64} declares TCGETS, et. al. as type 't' not 'T' */
3924 if (_IOC_TYPE(cmd) == 'T' || _IOC_TYPE(cmd) == 't') /* tty ioctls */
3928 case LL_IOC_GETFLAGS:
3929 /* Get the current value of the file flags */
3930 return put_user(fd->fd_flags, (int __user *)arg);
3931 case LL_IOC_SETFLAGS:
3932 case LL_IOC_CLRFLAGS:
3933 /* Set or clear specific file flags */
3934 /* XXX This probably needs checks to ensure the flags are
3935 * not abused, and to handle any flag side effects.
3937 if (get_user(flags, (int __user *) arg))
3940 if (cmd == LL_IOC_SETFLAGS) {
3941 if ((flags & LL_FILE_IGNORE_LOCK) &&
3942 !(file->f_flags & O_DIRECT)) {
3943 CERROR("%s: unable to disable locking on "
3944 "non-O_DIRECT file\n", current->comm);
3948 fd->fd_flags |= flags;
3950 fd->fd_flags &= ~flags;
3953 case LL_IOC_LOV_SETSTRIPE:
3954 case LL_IOC_LOV_SETSTRIPE_NEW:
3955 RETURN(ll_lov_setstripe(inode, file, (void __user *)arg));
3956 case LL_IOC_LOV_SETEA:
3957 RETURN(ll_lov_setea(inode, file, (void __user *)arg));
3958 case LL_IOC_LOV_SWAP_LAYOUTS: {
3960 struct lustre_swap_layouts lsl;
3962 if (copy_from_user(&lsl, (char __user *)arg,
3963 sizeof(struct lustre_swap_layouts)))
3966 if ((file->f_flags & O_ACCMODE) == O_RDONLY)
3969 file2 = fget(lsl.sl_fd);
3973 /* O_WRONLY or O_RDWR */
3974 if ((file2->f_flags & O_ACCMODE) == O_RDONLY)
3975 GOTO(out, rc = -EPERM);
3977 if (lsl.sl_flags & SWAP_LAYOUTS_CLOSE) {
3978 struct inode *inode2;
3979 struct ll_inode_info *lli;
3980 struct obd_client_handle *och = NULL;
3982 lli = ll_i2info(inode);
3983 mutex_lock(&lli->lli_och_mutex);
3984 if (fd->fd_lease_och != NULL) {
3985 och = fd->fd_lease_och;
3986 fd->fd_lease_och = NULL;
3988 mutex_unlock(&lli->lli_och_mutex);
3990 GOTO(out, rc = -ENOLCK);
3991 inode2 = file_inode(file2);
3992 rc = ll_swap_layouts_close(och, inode, inode2);
3994 rc = ll_swap_layouts(file, file2, &lsl);
4000 case LL_IOC_LOV_GETSTRIPE:
4001 case LL_IOC_LOV_GETSTRIPE_NEW:
4002 RETURN(ll_file_getstripe(inode, (void __user *)arg, 0));
4003 case FS_IOC_GETFLAGS:
4004 case FS_IOC_SETFLAGS:
4005 RETURN(ll_iocontrol(inode, file, cmd, arg));
4006 case FSFILT_IOC_GETVERSION:
4007 case FS_IOC_GETVERSION:
4008 RETURN(put_user(inode->i_generation, (int __user *)arg));
4009 /* We need to special case any other ioctls we want to handle,
4010 * to send them to the MDS/OST as appropriate and to properly
4011 * network encode the arg field. */
4012 case FS_IOC_SETVERSION:
4015 case LL_IOC_GROUP_LOCK:
4016 RETURN(ll_get_grouplock(inode, file, arg));
4017 case LL_IOC_GROUP_UNLOCK:
4018 RETURN(ll_put_grouplock(inode, file, arg));
4019 case IOC_OBD_STATFS:
4020 RETURN(ll_obd_statfs(inode, (void __user *)arg));
4022 case LL_IOC_FLUSHCTX:
4023 RETURN(ll_flush_ctx(inode));
4024 case LL_IOC_PATH2FID: {
4025 if (copy_to_user((void __user *)arg, ll_inode2fid(inode),
4026 sizeof(struct lu_fid)))
4031 case LL_IOC_GETPARENT:
4032 RETURN(ll_getparent(file, (struct getparent __user *)arg));
4034 case OBD_IOC_FID2PATH:
4035 RETURN(ll_fid2path(inode, (void __user *)arg));
4036 case LL_IOC_DATA_VERSION: {
4037 struct ioc_data_version idv;
4040 if (copy_from_user(&idv, (char __user *)arg, sizeof(idv)))
4043 idv.idv_flags &= LL_DV_RD_FLUSH | LL_DV_WR_FLUSH;
4044 rc = ll_ioc_data_version(inode, &idv);
4047 copy_to_user((char __user *)arg, &idv, sizeof(idv)))
4053 case LL_IOC_GET_MDTIDX: {
4056 mdtidx = ll_get_mdt_idx(inode);
4060 if (put_user((int)mdtidx, (int __user *)arg))
4065 case OBD_IOC_GETNAME_OLD:
4066 case OBD_IOC_GETDTNAME:
4067 case OBD_IOC_GETMDNAME:
4068 RETURN(ll_get_obd_name(inode, cmd, arg));
4069 case LL_IOC_HSM_STATE_GET: {
4070 struct md_op_data *op_data;
4071 struct hsm_user_state *hus;
4078 op_data = ll_prep_md_op_data(NULL, inode, NULL, NULL, 0, 0,
4079 LUSTRE_OPC_ANY, hus);
4080 if (IS_ERR(op_data)) {
4082 RETURN(PTR_ERR(op_data));
4085 rc = obd_iocontrol(cmd, ll_i2mdexp(inode), sizeof(*op_data),
4088 if (copy_to_user((void __user *)arg, hus, sizeof(*hus)))
4091 ll_finish_md_op_data(op_data);
4095 case LL_IOC_HSM_STATE_SET: {
4096 struct hsm_state_set *hss;
4103 if (copy_from_user(hss, (char __user *)arg, sizeof(*hss))) {
4108 rc = ll_hsm_state_set(inode, hss);
4113 case LL_IOC_HSM_ACTION: {
4114 struct md_op_data *op_data;
4115 struct hsm_current_action *hca;
4123 op_data = ll_prep_md_op_data(NULL, inode, NULL, NULL, 0, 0,
4124 LUSTRE_OPC_ANY, hca);
4125 if (IS_ERR(op_data)) {
4127 RETURN(PTR_ERR(op_data));
4130 rc = obd_iocontrol(cmd, ll_i2mdexp(inode), sizeof(*op_data),
4133 GOTO(skip_copy, rc);
4135 /* The hsm_current_action retreived from the server could
4136 * contain corrupt information. If it is incorrect data collect
4137 * debug information. We still send the data even if incorrect
4138 * to user land to handle.
4140 action = hsm_user_action2name(hca->hca_action);
4141 if (strcmp(action, "UNKNOWN") == 0 ||
4142 hca->hca_state > HPS_DONE) {
4144 "HSM current state %s action %s, offset = %llu, length %llu\n",
4145 hsm_progress_state2name(hca->hca_state), action,
4146 hca->hca_location.offset, hca->hca_location.length);
4149 if (copy_to_user((char __user *)arg, hca, sizeof(*hca)))
4152 ll_finish_md_op_data(op_data);
4156 case LL_IOC_SET_LEASE_OLD: {
4157 struct ll_ioc_lease ioc = { .lil_mode = (__u32)arg };
4159 RETURN(ll_file_set_lease(file, &ioc, 0));
4161 case LL_IOC_SET_LEASE: {
4162 struct ll_ioc_lease ioc;
4164 if (copy_from_user(&ioc, (void __user *)arg, sizeof(ioc)))
4167 RETURN(ll_file_set_lease(file, &ioc, arg));
4169 case LL_IOC_GET_LEASE: {
4170 struct ll_inode_info *lli = ll_i2info(inode);
4171 struct ldlm_lock *lock = NULL;
4174 mutex_lock(&lli->lli_och_mutex);
4175 if (fd->fd_lease_och != NULL) {
4176 struct obd_client_handle *och = fd->fd_lease_och;
4178 lock = ldlm_handle2lock(&och->och_lease_handle);
4180 lock_res_and_lock(lock);
4181 if (!ldlm_is_cancel(lock))
4182 fmode = och->och_flags;
4184 unlock_res_and_lock(lock);
4185 LDLM_LOCK_PUT(lock);
4188 mutex_unlock(&lli->lli_och_mutex);
4190 RETURN(ll_lease_type_from_fmode(fmode));
4192 case LL_IOC_HSM_IMPORT: {
4193 struct hsm_user_import *hui;
4199 if (copy_from_user(hui, (void __user *)arg, sizeof(*hui))) {
4204 rc = ll_hsm_import(inode, file, hui);
4209 case LL_IOC_FUTIMES_3: {
4210 struct ll_futimes_3 lfu;
4212 if (copy_from_user(&lfu,
4213 (const struct ll_futimes_3 __user *)arg,
4217 RETURN(ll_file_futimes_3(file, &lfu));
4219 case LL_IOC_LADVISE: {
4220 struct llapi_ladvise_hdr *k_ladvise_hdr;
4221 struct llapi_ladvise_hdr __user *u_ladvise_hdr;
4224 int alloc_size = sizeof(*k_ladvise_hdr);
4227 u_ladvise_hdr = (void __user *)arg;
4228 OBD_ALLOC_PTR(k_ladvise_hdr);
4229 if (k_ladvise_hdr == NULL)
4232 if (copy_from_user(k_ladvise_hdr, u_ladvise_hdr, alloc_size))
4233 GOTO(out_ladvise, rc = -EFAULT);
4235 if (k_ladvise_hdr->lah_magic != LADVISE_MAGIC ||
4236 k_ladvise_hdr->lah_count < 1)
4237 GOTO(out_ladvise, rc = -EINVAL);
4239 num_advise = k_ladvise_hdr->lah_count;
4240 if (num_advise >= LAH_COUNT_MAX)
4241 GOTO(out_ladvise, rc = -EFBIG);
4243 OBD_FREE_PTR(k_ladvise_hdr);
4244 alloc_size = offsetof(typeof(*k_ladvise_hdr),
4245 lah_advise[num_advise]);
4246 OBD_ALLOC(k_ladvise_hdr, alloc_size);
4247 if (k_ladvise_hdr == NULL)
4251 * TODO: submit multiple advices to one server in a single RPC
4253 if (copy_from_user(k_ladvise_hdr, u_ladvise_hdr, alloc_size))
4254 GOTO(out_ladvise, rc = -EFAULT);
4256 for (i = 0; i < num_advise; i++) {
4257 struct llapi_lu_ladvise *k_ladvise =
4258 &k_ladvise_hdr->lah_advise[i];
4259 struct llapi_lu_ladvise __user *u_ladvise =
4260 &u_ladvise_hdr->lah_advise[i];
4262 rc = ll_ladvise_sanity(inode, k_ladvise);
4264 GOTO(out_ladvise, rc);
4266 switch (k_ladvise->lla_advice) {
4267 case LU_LADVISE_LOCKNOEXPAND:
4268 rc = ll_lock_noexpand(file,
4269 k_ladvise->lla_peradvice_flags);
4270 GOTO(out_ladvise, rc);
4271 case LU_LADVISE_LOCKAHEAD:
4273 rc = ll_file_lock_ahead(file, k_ladvise);
4276 GOTO(out_ladvise, rc);
4279 &u_ladvise->lla_lockahead_result))
4280 GOTO(out_ladvise, rc = -EFAULT);
4283 rc = ll_ladvise(inode, file,
4284 k_ladvise_hdr->lah_flags,
4287 GOTO(out_ladvise, rc);
4294 OBD_FREE(k_ladvise_hdr, alloc_size);
4297 case LL_IOC_FLR_SET_MIRROR: {
4298 /* mirror I/O must be direct to avoid polluting page cache
4300 if (!(file->f_flags & O_DIRECT))
4303 fd->fd_designated_mirror = (__u32)arg;
4306 case FS_IOC_FSGETXATTR:
4307 RETURN(ll_ioctl_fsgetxattr(inode, cmd, arg));
4308 case FS_IOC_FSSETXATTR:
4309 RETURN(ll_ioctl_fssetxattr(inode, cmd, arg));
4310 case LL_IOC_PROJECT:
4311 RETURN(ll_ioctl_project(file, cmd, arg));
4313 RETURN(put_user(PAGE_SIZE, (int __user *)arg));
4314 case LL_IOC_HEAT_GET: {
4315 struct lu_heat uheat;
4316 struct lu_heat *heat;
4319 if (copy_from_user(&uheat, (void __user *)arg, sizeof(uheat)))
4322 if (uheat.lh_count > OBD_HEAT_COUNT)
4323 uheat.lh_count = OBD_HEAT_COUNT;
4325 size = offsetof(typeof(uheat), lh_heat[uheat.lh_count]);
4326 OBD_ALLOC(heat, size);
4330 heat->lh_count = uheat.lh_count;
4331 ll_heat_get(inode, heat);
4332 rc = copy_to_user((char __user *)arg, heat, size);
4333 OBD_FREE(heat, size);
4334 RETURN(rc ? -EFAULT : 0);
4336 case LL_IOC_HEAT_SET: {
4339 if (copy_from_user(&flags, (void __user *)arg, sizeof(flags)))
4342 rc = ll_heat_set(inode, flags);
4345 case LL_IOC_PCC_DETACH: {
4346 struct lu_pcc_detach *detach;
4348 OBD_ALLOC_PTR(detach);
4352 if (copy_from_user(detach,
4353 (const struct lu_pcc_detach __user *)arg,
4355 GOTO(out_detach_free, rc = -EFAULT);
4357 if (!S_ISREG(inode->i_mode))
4358 GOTO(out_detach_free, rc = -EINVAL);
4360 if (!inode_owner_or_capable(&init_user_ns, inode))
4361 GOTO(out_detach_free, rc = -EPERM);
4363 rc = pcc_ioctl_detach(inode, detach->pccd_opt);
4365 OBD_FREE_PTR(detach);
4368 case LL_IOC_PCC_STATE: {
4369 struct lu_pcc_state __user *ustate =
4370 (struct lu_pcc_state __user *)arg;
4371 struct lu_pcc_state *state;
4373 OBD_ALLOC_PTR(state);
4377 if (copy_from_user(state, ustate, sizeof(*state)))
4378 GOTO(out_state, rc = -EFAULT);
4380 rc = pcc_ioctl_state(file, inode, state);
4382 GOTO(out_state, rc);
4384 if (copy_to_user(ustate, state, sizeof(*state)))
4385 GOTO(out_state, rc = -EFAULT);
4388 OBD_FREE_PTR(state);
4391 #ifdef HAVE_LUSTRE_CRYPTO
4392 case LL_IOC_SET_ENCRYPTION_POLICY:
4393 if (!ll_sbi_has_encrypt(ll_i2sbi(inode)))
4395 return llcrypt_ioctl_set_policy(file, (const void __user *)arg);
4396 case LL_IOC_GET_ENCRYPTION_POLICY_EX:
4397 if (!ll_sbi_has_encrypt(ll_i2sbi(inode)))
4399 return llcrypt_ioctl_get_policy_ex(file, (void __user *)arg);
4400 case LL_IOC_ADD_ENCRYPTION_KEY:
4401 if (!ll_sbi_has_encrypt(ll_i2sbi(inode)))
4403 return llcrypt_ioctl_add_key(file, (void __user *)arg);
4404 case LL_IOC_REMOVE_ENCRYPTION_KEY:
4405 if (!ll_sbi_has_encrypt(ll_i2sbi(inode)))
4407 return llcrypt_ioctl_remove_key(file, (void __user *)arg);
4408 case LL_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS:
4409 if (!ll_sbi_has_encrypt(ll_i2sbi(inode)))
4411 return llcrypt_ioctl_remove_key_all_users(file,
4412 (void __user *)arg);
4413 case LL_IOC_GET_ENCRYPTION_KEY_STATUS:
4414 if (!ll_sbi_has_encrypt(ll_i2sbi(inode)))
4416 return llcrypt_ioctl_get_key_status(file, (void __user *)arg);
4419 case LL_IOC_UNLOCK_FOREIGN: {
4420 struct dentry *dentry = file_dentry(file);
4422 /* if not a foreign symlink do nothing */
4423 if (ll_foreign_is_removable(dentry, true)) {
4425 "prevent unlink of non-foreign file ("DFID")\n",
4426 PFID(ll_inode2fid(inode)));
4427 RETURN(-EOPNOTSUPP);
4433 RETURN(obd_iocontrol(cmd, ll_i2dtexp(inode), 0, NULL,
4434 (void __user *)arg));
4438 loff_t ll_lseek(struct file *file, loff_t offset, int whence)
4440 struct inode *inode = file_inode(file);
4443 struct cl_lseek_io *lsio;
4450 env = cl_env_get(&refcheck);
4452 RETURN(PTR_ERR(env));
4454 io = vvp_env_thread_io(env);
4455 io->ci_obj = ll_i2info(inode)->lli_clob;
4456 ll_io_set_mirror(io, file);
4458 lsio = &io->u.ci_lseek;
4459 lsio->ls_start = offset;
4460 lsio->ls_whence = whence;
4461 lsio->ls_result = -ENXIO;
4464 rc = cl_io_init(env, io, CIT_LSEEK, io->ci_obj);
4466 struct vvp_io *vio = vvp_env_io(env);
4468 vio->vui_fd = file->private_data;
4469 rc = cl_io_loop(env, io);
4473 retval = rc ? : lsio->ls_result;
4474 cl_io_fini(env, io);
4475 } while (unlikely(io->ci_need_restart));
4477 cl_env_put(env, &refcheck);
4479 /* Without the key, SEEK_HOLE return value has to be
4480 * rounded up to next LUSTRE_ENCRYPTION_UNIT_SIZE.
4482 if (llcrypt_require_key(inode) == -ENOKEY && whence == SEEK_HOLE)
4483 retval = round_up(retval, LUSTRE_ENCRYPTION_UNIT_SIZE);
4488 static loff_t ll_file_seek(struct file *file, loff_t offset, int origin)
4490 struct inode *inode = file_inode(file);
4491 loff_t retval = offset, eof = 0;
4492 ktime_t kstart = ktime_get();
4496 CDEBUG(D_VFSTRACE, "VFS Op:inode="DFID"(%p), to=%llu=%#llx(%d)\n",
4497 PFID(ll_inode2fid(inode)), inode, retval, retval,
4500 if (origin == SEEK_END) {
4501 retval = ll_glimpse_size(inode);
4504 eof = i_size_read(inode);
4507 if (origin == SEEK_HOLE || origin == SEEK_DATA) {
4511 /* flush local cache first if any */
4512 cl_sync_file_range(inode, offset, OBD_OBJECT_EOF,
4515 retval = ll_lseek(file, offset, origin);
4518 retval = vfs_setpos(file, retval, ll_file_maxbytes(inode));
4520 retval = generic_file_llseek_size(file, offset, origin,
4521 ll_file_maxbytes(inode), eof);
4524 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_LLSEEK,
4525 ktime_us_delta(ktime_get(), kstart));
4529 static int ll_flush(struct file *file, fl_owner_t id)
4531 struct inode *inode = file_inode(file);
4532 struct ll_inode_info *lli = ll_i2info(inode);
4533 struct ll_file_data *fd = file->private_data;
4536 LASSERT(!S_ISDIR(inode->i_mode));
4538 /* catch async errors that were recorded back when async writeback
4539 * failed for pages in this mapping. */
4540 rc = lli->lli_async_rc;
4541 lli->lli_async_rc = 0;
4542 if (lli->lli_clob != NULL) {
4543 err = lov_read_and_clear_async_rc(lli->lli_clob);
4548 /* The application has been told write failure already.
4549 * Do not report failure again. */
4550 if (fd->fd_write_failed)
4552 return rc ? -EIO : 0;
4556 * Called to make sure a portion of file has been written out.
4557 * if @mode is not CL_FSYNC_LOCAL, it will send OST_SYNC RPCs to OST.
4559 * Return how many pages have been written.
4561 int cl_sync_file_range(struct inode *inode, loff_t start, loff_t end,
4562 enum cl_fsync_mode mode, int ignore_layout)
4566 struct cl_fsync_io *fio;
4571 if (mode != CL_FSYNC_NONE && mode != CL_FSYNC_LOCAL &&
4572 mode != CL_FSYNC_DISCARD && mode != CL_FSYNC_ALL)
4575 env = cl_env_get(&refcheck);
4577 RETURN(PTR_ERR(env));
4579 io = vvp_env_thread_io(env);
4580 io->ci_obj = ll_i2info(inode)->lli_clob;
4581 io->ci_ignore_layout = ignore_layout;
4583 /* initialize parameters for sync */
4584 fio = &io->u.ci_fsync;
4585 fio->fi_start = start;
4587 fio->fi_fid = ll_inode2fid(inode);
4588 fio->fi_mode = mode;
4589 fio->fi_nr_written = 0;
4591 if (cl_io_init(env, io, CIT_FSYNC, io->ci_obj) == 0)
4592 result = cl_io_loop(env, io);
4594 result = io->ci_result;
4596 result = fio->fi_nr_written;
4597 cl_io_fini(env, io);
4598 cl_env_put(env, &refcheck);
4604 * When dentry is provided (the 'else' case), file_dentry() may be
4605 * null and dentry must be used directly rather than pulled from
4606 * file_dentry() as is done otherwise.
4609 int ll_fsync(struct file *file, loff_t start, loff_t end, int datasync)
4611 struct dentry *dentry = file_dentry(file);
4612 struct inode *inode = dentry->d_inode;
4613 struct ll_inode_info *lli = ll_i2info(inode);
4614 struct ptlrpc_request *req;
4615 ktime_t kstart = ktime_get();
4621 "VFS Op:inode="DFID"(%p), start %lld, end %lld, datasync %d\n",
4622 PFID(ll_inode2fid(inode)), inode, start, end, datasync);
4624 /* fsync's caller has already called _fdata{sync,write}, we want
4625 * that IO to finish before calling the osc and mdc sync methods */
4626 rc = filemap_write_and_wait_range(inode->i_mapping, start, end);
4628 /* catch async errors that were recorded back when async writeback
4629 * failed for pages in this mapping. */
4630 if (!S_ISDIR(inode->i_mode)) {
4631 err = lli->lli_async_rc;
4632 lli->lli_async_rc = 0;
4635 if (lli->lli_clob != NULL) {
4636 err = lov_read_and_clear_async_rc(lli->lli_clob);
4642 err = md_fsync(ll_i2sbi(inode)->ll_md_exp, ll_inode2fid(inode), &req);
4646 ptlrpc_req_finished(req);
4648 if (S_ISREG(inode->i_mode)) {
4649 struct ll_file_data *fd = file->private_data;
4652 /* Sync metadata on MDT first, and then sync the cached data
4655 err = pcc_fsync(file, start, end, datasync, &cached);
4657 err = cl_sync_file_range(inode, start, end,
4659 if (rc == 0 && err < 0)
4662 fd->fd_write_failed = true;
4664 fd->fd_write_failed = false;
4668 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_FSYNC,
4669 ktime_us_delta(ktime_get(), kstart));
4674 ll_file_flock(struct file *file, int cmd, struct file_lock *file_lock)
4676 struct inode *inode = file_inode(file);
4677 struct ll_sb_info *sbi = ll_i2sbi(inode);
4678 struct ldlm_enqueue_info einfo = {
4679 .ei_type = LDLM_FLOCK,
4680 .ei_cb_cp = ldlm_flock_completion_ast,
4681 .ei_cbdata = file_lock,
4683 struct md_op_data *op_data;
4684 struct lustre_handle lockh = { 0 };
4685 union ldlm_policy_data flock = { { 0 } };
4686 int fl_type = file_lock->fl_type;
4687 ktime_t kstart = ktime_get();
4693 CDEBUG(D_VFSTRACE, "VFS Op:inode="DFID" file_lock=%p\n",
4694 PFID(ll_inode2fid(inode)), file_lock);
4696 if (file_lock->fl_flags & FL_FLOCK) {
4697 LASSERT((cmd == F_SETLKW) || (cmd == F_SETLK));
4698 /* flocks are whole-file locks */
4699 flock.l_flock.end = OFFSET_MAX;
4700 /* For flocks owner is determined by the local file desctiptor*/
4701 flock.l_flock.owner = (unsigned long)file_lock->fl_file;
4702 } else if (file_lock->fl_flags & FL_POSIX) {
4703 flock.l_flock.owner = (unsigned long)file_lock->fl_owner;
4704 flock.l_flock.start = file_lock->fl_start;
4705 flock.l_flock.end = file_lock->fl_end;
4709 flock.l_flock.pid = file_lock->fl_pid;
4711 #if defined(HAVE_LM_COMPARE_OWNER) || defined(lm_compare_owner)
4712 /* Somewhat ugly workaround for svc lockd.
4713 * lockd installs custom fl_lmops->lm_compare_owner that checks
4714 * for the fl_owner to be the same (which it always is on local node
4715 * I guess between lockd processes) and then compares pid.
4716 * As such we assign pid to the owner field to make it all work,
4717 * conflict with normal locks is unlikely since pid space and
4718 * pointer space for current->files are not intersecting */
4719 if (file_lock->fl_lmops && file_lock->fl_lmops->lm_compare_owner)
4720 flock.l_flock.owner = (unsigned long)file_lock->fl_pid;
4725 einfo.ei_mode = LCK_PR;
4728 /* An unlock request may or may not have any relation to
4729 * existing locks so we may not be able to pass a lock handle
4730 * via a normal ldlm_lock_cancel() request. The request may even
4731 * unlock a byte range in the middle of an existing lock. In
4732 * order to process an unlock request we need all of the same
4733 * information that is given with a normal read or write record
4734 * lock request. To avoid creating another ldlm unlock (cancel)
4735 * message we'll treat a LCK_NL flock request as an unlock. */
4736 einfo.ei_mode = LCK_NL;
4739 einfo.ei_mode = LCK_PW;
4742 CDEBUG(D_INFO, "Unknown fcntl lock type: %d\n", fl_type);
4757 flags = LDLM_FL_BLOCK_NOWAIT;
4763 flags = LDLM_FL_TEST_LOCK;
4766 CERROR("unknown fcntl lock command: %d\n", cmd);
4770 /* Save the old mode so that if the mode in the lock changes we
4771 * can decrement the appropriate reader or writer refcount. */
4772 file_lock->fl_type = einfo.ei_mode;
4774 op_data = ll_prep_md_op_data(NULL, inode, NULL, NULL, 0, 0,
4775 LUSTRE_OPC_ANY, NULL);
4776 if (IS_ERR(op_data))
4777 RETURN(PTR_ERR(op_data));
4779 CDEBUG(D_DLMTRACE, "inode="DFID", pid=%u, flags=%#llx, mode=%u, "
4780 "start=%llu, end=%llu\n", PFID(ll_inode2fid(inode)),
4781 flock.l_flock.pid, flags, einfo.ei_mode,
4782 flock.l_flock.start, flock.l_flock.end);
4784 rc = md_enqueue(sbi->ll_md_exp, &einfo, &flock, op_data, &lockh,
4787 /* Restore the file lock type if not TEST lock. */
4788 if (!(flags & LDLM_FL_TEST_LOCK))
4789 file_lock->fl_type = fl_type;
4791 #ifdef HAVE_LOCKS_LOCK_FILE_WAIT
4792 if ((rc == 0 || file_lock->fl_type == F_UNLCK) &&
4793 !(flags & LDLM_FL_TEST_LOCK))
4794 rc2 = locks_lock_file_wait(file, file_lock);
4796 if ((file_lock->fl_flags & FL_FLOCK) &&
4797 (rc == 0 || file_lock->fl_type == F_UNLCK))
4798 rc2 = flock_lock_file_wait(file, file_lock);
4799 if ((file_lock->fl_flags & FL_POSIX) &&
4800 (rc == 0 || file_lock->fl_type == F_UNLCK) &&
4801 !(flags & LDLM_FL_TEST_LOCK))
4802 rc2 = posix_lock_file_wait(file, file_lock);
4803 #endif /* HAVE_LOCKS_LOCK_FILE_WAIT */
4805 if (rc2 && file_lock->fl_type != F_UNLCK) {
4806 einfo.ei_mode = LCK_NL;
4807 md_enqueue(sbi->ll_md_exp, &einfo, &flock, op_data,
4812 ll_finish_md_op_data(op_data);
4815 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_FLOCK,
4816 ktime_us_delta(ktime_get(), kstart));
4820 int ll_get_fid_by_name(struct inode *parent, const char *name,
4821 int namelen, struct lu_fid *fid,
4822 struct inode **inode)
4824 struct md_op_data *op_data = NULL;
4825 struct mdt_body *body;
4826 struct ptlrpc_request *req;
4830 op_data = ll_prep_md_op_data(NULL, parent, NULL, name, namelen, 0,
4831 LUSTRE_OPC_ANY, NULL);
4832 if (IS_ERR(op_data))
4833 RETURN(PTR_ERR(op_data));
4835 op_data->op_valid = OBD_MD_FLID | OBD_MD_FLTYPE;
4836 rc = md_getattr_name(ll_i2sbi(parent)->ll_md_exp, op_data, &req);
4837 ll_finish_md_op_data(op_data);
4841 body = req_capsule_server_get(&req->rq_pill, &RMF_MDT_BODY);
4843 GOTO(out_req, rc = -EFAULT);
4845 *fid = body->mbo_fid1;
4848 rc = ll_prep_inode(inode, &req->rq_pill, parent->i_sb, NULL);
4850 ptlrpc_req_finished(req);
4854 int ll_migrate(struct inode *parent, struct file *file, struct lmv_user_md *lum,
4855 const char *name, __u32 flags)
4857 struct dentry *dchild = NULL;
4858 struct inode *child_inode = NULL;
4859 struct md_op_data *op_data;
4860 struct ptlrpc_request *request = NULL;
4861 struct obd_client_handle *och = NULL;
4863 struct mdt_body *body;
4864 __u64 data_version = 0;
4865 size_t namelen = strlen(name);
4866 int lumlen = lmv_user_md_size(lum->lum_stripe_count, lum->lum_magic);
4870 CDEBUG(D_VFSTRACE, "migrate "DFID"/%s to MDT%04x stripe count %d\n",
4871 PFID(ll_inode2fid(parent)), name,
4872 lum->lum_stripe_offset, lum->lum_stripe_count);
4874 if (lum->lum_magic != cpu_to_le32(LMV_USER_MAGIC) &&
4875 lum->lum_magic != cpu_to_le32(LMV_USER_MAGIC_SPECIFIC))
4876 lustre_swab_lmv_user_md(lum);
4878 /* Get child FID first */
4879 qstr.hash = ll_full_name_hash(file_dentry(file), name, namelen);
4882 dchild = d_lookup(file_dentry(file), &qstr);
4884 if (dchild->d_inode)
4885 child_inode = igrab(dchild->d_inode);
4890 rc = ll_get_fid_by_name(parent, name, namelen, NULL,
4899 if (!(exp_connect_flags2(ll_i2sbi(parent)->ll_md_exp) &
4900 OBD_CONNECT2_DIR_MIGRATE)) {
4901 if (le32_to_cpu(lum->lum_stripe_count) > 1 ||
4902 ll_dir_striped(child_inode)) {
4903 CERROR("%s: MDT doesn't support stripe directory "
4904 "migration!\n", ll_i2sbi(parent)->ll_fsname);
4905 GOTO(out_iput, rc = -EOPNOTSUPP);
4910 * lfs migrate command needs to be blocked on the client
4911 * by checking the migrate FID against the FID of the
4914 if (is_root_inode(child_inode))
4915 GOTO(out_iput, rc = -EINVAL);
4917 op_data = ll_prep_md_op_data(NULL, parent, NULL, name, namelen,
4918 child_inode->i_mode, LUSTRE_OPC_ANY, NULL);
4919 if (IS_ERR(op_data))
4920 GOTO(out_iput, rc = PTR_ERR(op_data));
4922 inode_lock(child_inode);
4923 op_data->op_fid3 = *ll_inode2fid(child_inode);
4924 if (!fid_is_sane(&op_data->op_fid3)) {
4925 CERROR("%s: migrate %s, but FID "DFID" is insane\n",
4926 ll_i2sbi(parent)->ll_fsname, name,
4927 PFID(&op_data->op_fid3));
4928 GOTO(out_unlock, rc = -EINVAL);
4931 op_data->op_cli_flags |= CLI_MIGRATE | CLI_SET_MEA;
4932 op_data->op_data = lum;
4933 op_data->op_data_size = lumlen;
4935 /* migrate dirent only for subdirs if MDS_MIGRATE_NSONLY set */
4936 if (S_ISDIR(child_inode->i_mode) && (flags & MDS_MIGRATE_NSONLY) &&
4937 lmv_dir_layout_changing(ll_i2info(parent)->lli_lsm_md))
4938 op_data->op_bias |= MDS_MIGRATE_NSONLY;
4941 if (S_ISREG(child_inode->i_mode)) {
4942 och = ll_lease_open(child_inode, NULL, FMODE_WRITE, 0);
4946 GOTO(out_unlock, rc);
4949 rc = ll_data_version(child_inode, &data_version,
4952 GOTO(out_close, rc);
4954 op_data->op_open_handle = och->och_open_handle;
4955 op_data->op_data_version = data_version;
4956 op_data->op_lease_handle = och->och_lease_handle;
4957 op_data->op_bias |= MDS_CLOSE_MIGRATE;
4959 spin_lock(&och->och_mod->mod_open_req->rq_lock);
4960 och->och_mod->mod_open_req->rq_replay = 0;
4961 spin_unlock(&och->och_mod->mod_open_req->rq_lock);
4964 rc = md_rename(ll_i2sbi(parent)->ll_md_exp, op_data,
4965 op_data->op_name, op_data->op_namelen,
4966 op_data->op_name, op_data->op_namelen, &request);
4968 LASSERT(request != NULL);
4969 ll_update_times(request, parent);
4972 if (rc == 0 || rc == -EAGAIN) {
4973 body = req_capsule_server_get(&request->rq_pill, &RMF_MDT_BODY);
4974 LASSERT(body != NULL);
4976 /* If the server does release layout lock, then we cleanup
4977 * the client och here, otherwise release it in out_close: */
4978 if (och && body->mbo_valid & OBD_MD_CLOSE_INTENT_EXECED) {
4979 obd_mod_put(och->och_mod);
4980 md_clear_open_replay_data(ll_i2sbi(parent)->ll_md_exp,
4982 och->och_open_handle.cookie = DEAD_HANDLE_MAGIC;
4988 if (request != NULL) {
4989 ptlrpc_req_finished(request);
4993 /* Try again if the lease has cancelled. */
4994 if (rc == -EAGAIN && S_ISREG(child_inode->i_mode))
4999 ll_lease_close(och, child_inode, NULL);
5001 clear_nlink(child_inode);
5003 inode_unlock(child_inode);
5004 ll_finish_md_op_data(op_data);
5011 ll_file_noflock(struct file *file, int cmd, struct file_lock *file_lock)
5013 struct ll_file_data *fd = file->private_data;
5017 * In order to avoid flood of warning messages, only print one message
5018 * for one file. And the entire message rate on the client is limited
5019 * by CDEBUG_LIMIT too.
5021 if (!(fd->fd_flags & LL_FILE_FLOCK_WARNING)) {
5022 fd->fd_flags |= LL_FILE_FLOCK_WARNING;
5023 CDEBUG_LIMIT(D_CONSOLE,
5024 "flock disabled, mount with '-o [local]flock' to enable\r\n");
5030 * test if some locks matching bits and l_req_mode are acquired
5031 * - bits can be in different locks
5032 * - if found clear the common lock bits in *bits
5033 * - the bits not found, are kept in *bits
5035 * \param bits [IN] searched lock bits [IN]
5036 * \param l_req_mode [IN] searched lock mode
5037 * \retval boolean, true iff all bits are found
5039 int ll_have_md_lock(struct inode *inode, __u64 *bits, enum ldlm_mode l_req_mode)
5041 struct lustre_handle lockh;
5042 union ldlm_policy_data policy;
5043 enum ldlm_mode mode = (l_req_mode == LCK_MINMODE) ?
5044 (LCK_CR | LCK_CW | LCK_PR | LCK_PW) : l_req_mode;
5053 fid = &ll_i2info(inode)->lli_fid;
5054 CDEBUG(D_INFO, "trying to match res "DFID" mode %s\n", PFID(fid),
5055 ldlm_lockname[mode]);
5057 flags = LDLM_FL_BLOCK_GRANTED | LDLM_FL_CBPENDING | LDLM_FL_TEST_LOCK;
5058 for (i = 0; i < MDS_INODELOCK_NUMBITS && *bits != 0; i++) {
5059 policy.l_inodebits.bits = *bits & BIT(i);
5060 if (policy.l_inodebits.bits == 0)
5063 if (md_lock_match(ll_i2mdexp(inode), flags, fid, LDLM_IBITS,
5064 &policy, mode, &lockh)) {
5065 struct ldlm_lock *lock;
5067 lock = ldlm_handle2lock(&lockh);
5070 ~(lock->l_policy_data.l_inodebits.bits);
5071 LDLM_LOCK_PUT(lock);
5073 *bits &= ~policy.l_inodebits.bits;
5080 enum ldlm_mode ll_take_md_lock(struct inode *inode, __u64 bits,
5081 struct lustre_handle *lockh, __u64 flags,
5082 enum ldlm_mode mode)
5084 union ldlm_policy_data policy = { .l_inodebits = { bits } };
5089 fid = &ll_i2info(inode)->lli_fid;
5090 CDEBUG(D_INFO, "trying to match res "DFID"\n", PFID(fid));
5092 rc = md_lock_match(ll_i2mdexp(inode), LDLM_FL_BLOCK_GRANTED|flags,
5093 fid, LDLM_IBITS, &policy, mode, lockh);
5098 static int ll_inode_revalidate_fini(struct inode *inode, int rc)
5100 /* Already unlinked. Just update nlink and return success */
5101 if (rc == -ENOENT) {
5103 /* If it is striped directory, and there is bad stripe
5104 * Let's revalidate the dentry again, instead of returning
5106 if (ll_dir_striped(inode))
5109 /* This path cannot be hit for regular files unless in
5110 * case of obscure races, so no need to to validate
5112 if (!S_ISREG(inode->i_mode) && !S_ISDIR(inode->i_mode))
5114 } else if (rc != 0) {
5115 CDEBUG_LIMIT((rc == -EACCES || rc == -EIDRM) ? D_INFO : D_ERROR,
5116 "%s: revalidate FID "DFID" error: rc = %d\n",
5117 ll_i2sbi(inode)->ll_fsname,
5118 PFID(ll_inode2fid(inode)), rc);
5124 static int ll_inode_revalidate(struct dentry *dentry, enum ldlm_intent_flags op)
5126 struct inode *parent;
5127 struct inode *inode = dentry->d_inode;
5128 struct obd_export *exp = ll_i2mdexp(inode);
5129 struct lookup_intent oit = {
5132 struct ptlrpc_request *req = NULL;
5133 struct md_op_data *op_data;
5134 const char *name = NULL;
5139 CDEBUG(D_VFSTRACE, "VFS Op:inode="DFID"(%p),name=%s\n",
5140 PFID(ll_inode2fid(inode)), inode, dentry->d_name.name);
5142 if (exp_connect_flags2(exp) & OBD_CONNECT2_GETATTR_PFID) {
5143 parent = dentry->d_parent->d_inode;
5144 name = dentry->d_name.name;
5145 namelen = dentry->d_name.len;
5150 op_data = ll_prep_md_op_data(NULL, parent, inode, name, namelen, 0,
5151 LUSTRE_OPC_ANY, NULL);
5152 if (IS_ERR(op_data))
5153 RETURN(PTR_ERR(op_data));
5155 /* Call getattr by fid */
5156 if (exp_connect_flags2(exp) & OBD_CONNECT2_GETATTR_PFID)
5157 op_data->op_flags = MF_GETATTR_BY_FID;
5158 rc = md_intent_lock(exp, op_data, &oit, &req, &ll_md_blocking_ast, 0);
5159 ll_finish_md_op_data(op_data);
5161 rc = ll_inode_revalidate_fini(inode, rc);
5165 rc = ll_revalidate_it_finish(req, &oit, dentry);
5167 ll_intent_release(&oit);
5171 /* Unlinked? Unhash dentry, so it is not picked up later by
5172 * do_lookup() -> ll_revalidate_it(). We cannot use d_drop
5173 * here to preserve get_cwd functionality on 2.6.
5175 if (!dentry->d_inode->i_nlink)
5176 d_lustre_invalidate(dentry);
5178 ll_lookup_finish_locks(&oit, dentry);
5180 ptlrpc_req_finished(req);
5185 static int ll_merge_md_attr(struct inode *inode)
5187 struct ll_inode_info *lli = ll_i2info(inode);
5188 struct cl_attr attr = { 0 };
5191 if (!lli->lli_lsm_md)
5194 down_read(&lli->lli_lsm_sem);
5195 if (!lmv_dir_striped(lli->lli_lsm_md)) {
5196 up_read(&lli->lli_lsm_sem);
5199 rc = md_merge_attr(ll_i2mdexp(inode), ll_i2info(inode)->lli_lsm_md,
5200 &attr, ll_md_blocking_ast);
5201 up_read(&lli->lli_lsm_sem);
5205 spin_lock(&inode->i_lock);
5206 set_nlink(inode, attr.cat_nlink);
5207 spin_unlock(&inode->i_lock);
5209 inode->i_blocks = attr.cat_blocks;
5210 i_size_write(inode, attr.cat_size);
5212 ll_i2info(inode)->lli_atime = attr.cat_atime;
5213 ll_i2info(inode)->lli_mtime = attr.cat_mtime;
5214 ll_i2info(inode)->lli_ctime = attr.cat_ctime;
5219 int ll_getattr_dentry(struct dentry *de, struct kstat *stat, u32 request_mask,
5220 unsigned int flags, bool foreign)
5222 struct inode *inode = de->d_inode;
5223 struct ll_sb_info *sbi = ll_i2sbi(inode);
5224 struct ll_inode_info *lli = ll_i2info(inode);
5225 struct inode *dir = de->d_parent->d_inode;
5226 bool need_glimpse = true;
5227 ktime_t kstart = ktime_get();
5230 /* The OST object(s) determine the file size, blocks and mtime. */
5231 if (!(request_mask & STATX_SIZE || request_mask & STATX_BLOCKS ||
5232 request_mask & STATX_MTIME))
5233 need_glimpse = false;
5235 if (dentry_may_statahead(dir, de))
5236 ll_start_statahead(dir, de, need_glimpse &&
5237 !(flags & AT_STATX_DONT_SYNC));
5239 if (flags & AT_STATX_DONT_SYNC)
5240 GOTO(fill_attr, rc = 0);
5242 rc = ll_inode_revalidate(de, IT_GETATTR);
5246 /* foreign file/dir are always of zero length, so don't
5247 * need to validate size.
5249 if (S_ISREG(inode->i_mode) && !foreign) {
5253 GOTO(fill_attr, rc);
5255 rc = pcc_inode_getattr(inode, request_mask, flags, &cached);
5256 if (cached && rc < 0)
5260 GOTO(fill_attr, rc);
5263 * If the returned attr is masked with OBD_MD_FLSIZE &
5264 * OBD_MD_FLBLOCKS & OBD_MD_FLMTIME, it means that the file size
5265 * or blocks obtained from MDT is strictly correct, and the file
5266 * is usually not being modified by clients, and the [a|m|c]time
5267 * got from MDT is also strictly correct.
5268 * Under this circumstance, it does not need to send glimpse
5269 * RPCs to OSTs for file attributes such as the size and blocks.
5271 if (lli->lli_attr_valid & OBD_MD_FLSIZE &&
5272 lli->lli_attr_valid & OBD_MD_FLBLOCKS &&
5273 lli->lli_attr_valid & OBD_MD_FLMTIME) {
5274 inode->i_mtime.tv_sec = lli->lli_mtime;
5275 if (lli->lli_attr_valid & OBD_MD_FLATIME)
5276 inode->i_atime.tv_sec = lli->lli_atime;
5277 if (lli->lli_attr_valid & OBD_MD_FLCTIME)
5278 inode->i_ctime.tv_sec = lli->lli_ctime;
5279 GOTO(fill_attr, rc);
5282 /* In case of restore, the MDT has the right size and has
5283 * already send it back without granting the layout lock,
5284 * inode is up-to-date so glimpse is useless.
5285 * Also to glimpse we need the layout, in case of a running
5286 * restore the MDT holds the layout lock so the glimpse will
5287 * block up to the end of restore (getattr will block)
5289 if (!test_bit(LLIF_FILE_RESTORING, &lli->lli_flags)) {
5290 rc = ll_glimpse_size(inode);
5295 /* If object isn't regular a file then don't validate size. */
5296 /* foreign dir is not striped dir */
5297 if (ll_dir_striped(inode) && !foreign) {
5298 rc = ll_merge_md_attr(inode);
5303 if (lli->lli_attr_valid & OBD_MD_FLATIME)
5304 inode->i_atime.tv_sec = lli->lli_atime;
5305 if (lli->lli_attr_valid & OBD_MD_FLMTIME)
5306 inode->i_mtime.tv_sec = lli->lli_mtime;
5307 if (lli->lli_attr_valid & OBD_MD_FLCTIME)
5308 inode->i_ctime.tv_sec = lli->lli_ctime;
5312 OBD_FAIL_TIMEOUT(OBD_FAIL_GETATTR_DELAY, 30);
5314 if (ll_need_32bit_api(sbi)) {
5315 stat->ino = cl_fid_build_ino(&lli->lli_fid, 1);
5316 stat->dev = ll_compat_encode_dev(inode->i_sb->s_dev);
5317 stat->rdev = ll_compat_encode_dev(inode->i_rdev);
5319 stat->ino = inode->i_ino;
5320 stat->dev = inode->i_sb->s_dev;
5321 stat->rdev = inode->i_rdev;
5324 /* foreign symlink to be exposed as a real symlink */
5326 stat->mode = inode->i_mode;
5328 stat->mode = (inode->i_mode & ~S_IFMT) | S_IFLNK;
5330 stat->uid = inode->i_uid;
5331 stat->gid = inode->i_gid;
5332 stat->atime = inode->i_atime;
5333 stat->mtime = inode->i_mtime;
5334 stat->ctime = inode->i_ctime;
5335 /* stat->blksize is used to tell about preferred IO size */
5336 if (sbi->ll_stat_blksize)
5337 stat->blksize = sbi->ll_stat_blksize;
5338 else if (S_ISREG(inode->i_mode))
5339 stat->blksize = 1 << min(PTLRPC_MAX_BRW_BITS + 1,
5340 LL_MAX_BLKSIZE_BITS);
5342 stat->blksize = 1 << inode->i_sb->s_blocksize_bits;
5344 stat->nlink = inode->i_nlink;
5345 stat->size = i_size_read(inode);
5346 stat->blocks = inode->i_blocks;
5348 #if defined(HAVE_USER_NAMESPACE_ARG) || defined(HAVE_INODEOPS_ENHANCED_GETATTR)
5349 if (flags & AT_STATX_DONT_SYNC) {
5350 if (stat->size == 0 &&
5351 lli->lli_attr_valid & OBD_MD_FLLAZYSIZE)
5352 stat->size = lli->lli_lazysize;
5353 if (stat->blocks == 0 &&
5354 lli->lli_attr_valid & OBD_MD_FLLAZYBLOCKS)
5355 stat->blocks = lli->lli_lazyblocks;
5358 if (lli->lli_attr_valid & OBD_MD_FLBTIME) {
5359 stat->result_mask |= STATX_BTIME;
5360 stat->btime.tv_sec = lli->lli_btime;
5363 stat->attributes_mask = STATX_ATTR_IMMUTABLE | STATX_ATTR_APPEND;
5364 #ifdef HAVE_LUSTRE_CRYPTO
5365 stat->attributes_mask |= STATX_ATTR_ENCRYPTED;
5367 stat->attributes |= ll_inode_to_ext_flags(inode->i_flags);
5368 stat->result_mask &= request_mask;
5371 ll_stats_ops_tally(sbi, LPROC_LL_GETATTR,
5372 ktime_us_delta(ktime_get(), kstart));
5377 #if defined(HAVE_USER_NAMESPACE_ARG) || defined(HAVE_INODEOPS_ENHANCED_GETATTR)
5378 int ll_getattr(struct user_namespace *mnt_userns, const struct path *path,
5379 struct kstat *stat, u32 request_mask, unsigned int flags)
5381 return ll_getattr_dentry(path->dentry, stat, request_mask, flags,
5385 int ll_getattr(struct vfsmount *mnt, struct dentry *de, struct kstat *stat)
5387 return ll_getattr_dentry(de, stat, STATX_BASIC_STATS,
5388 AT_STATX_SYNC_AS_STAT, false);
5392 int cl_falloc(struct file *file, struct inode *inode, int mode, loff_t offset,
5395 loff_t size = i_size_read(inode);
5403 env = cl_env_get(&refcheck);
5405 RETURN(PTR_ERR(env));
5407 io = vvp_env_thread_io(env);
5408 io->ci_obj = ll_i2info(inode)->lli_clob;
5409 ll_io_set_mirror(io, file);
5411 io->ci_verify_layout = 1;
5412 io->u.ci_setattr.sa_parent_fid = lu_object_fid(&io->ci_obj->co_lu);
5413 io->u.ci_setattr.sa_falloc_mode = mode;
5414 io->u.ci_setattr.sa_falloc_offset = offset;
5415 io->u.ci_setattr.sa_falloc_end = offset + len;
5416 io->u.ci_setattr.sa_subtype = CL_SETATTR_FALLOCATE;
5418 CDEBUG(D_INODE, "UID %u GID %u PRJID %u\n",
5419 from_kuid(&init_user_ns, inode->i_uid),
5420 from_kgid(&init_user_ns, inode->i_gid),
5421 ll_i2info(inode)->lli_projid);
5423 io->u.ci_setattr.sa_falloc_uid = from_kuid(&init_user_ns, inode->i_uid);
5424 io->u.ci_setattr.sa_falloc_gid = from_kgid(&init_user_ns, inode->i_gid);
5425 io->u.ci_setattr.sa_falloc_projid = ll_i2info(inode)->lli_projid;
5427 if (io->u.ci_setattr.sa_falloc_end > size) {
5428 loff_t newsize = io->u.ci_setattr.sa_falloc_end;
5430 /* Check new size against VFS/VM file size limit and rlimit */
5431 rc = inode_newsize_ok(inode, newsize);
5434 if (newsize > ll_file_maxbytes(inode)) {
5435 CDEBUG(D_INODE, "file size too large %llu > %llu\n",
5436 (unsigned long long)newsize,
5437 ll_file_maxbytes(inode));
5444 rc = cl_io_init(env, io, CIT_SETATTR, io->ci_obj);
5446 rc = cl_io_loop(env, io);
5449 cl_io_fini(env, io);
5450 } while (unlikely(io->ci_need_restart));
5453 cl_env_put(env, &refcheck);
5457 long ll_fallocate(struct file *filp, int mode, loff_t offset, loff_t len)
5459 struct inode *inode = file_inode(filp);
5462 if (offset < 0 || len <= 0)
5465 * Encrypted inodes can't handle collapse range or zero range or insert
5466 * range since we would need to re-encrypt blocks with a different IV or
5467 * XTS tweak (which are based on the logical block number).
5468 * Similar to what ext4 does.
5470 if (IS_ENCRYPTED(inode) &&
5471 (mode & (FALLOC_FL_COLLAPSE_RANGE | FALLOC_FL_INSERT_RANGE |
5472 FALLOC_FL_ZERO_RANGE)))
5473 RETURN(-EOPNOTSUPP);
5476 * mode == 0 (which is standard prealloc) and PUNCH is supported
5477 * Rest of mode options are not supported yet.
5479 if (mode & ~(FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE))
5480 RETURN(-EOPNOTSUPP);
5482 ll_stats_ops_tally(ll_i2sbi(inode), LPROC_LL_FALLOCATE, 1);
5484 rc = cl_falloc(filp, inode, mode, offset, len);
5486 * ENOTSUPP (524) is an NFSv3 specific error code erroneously
5487 * used by Lustre in several places. Retuning it here would
5488 * confuse applications that explicity test for EOPNOTSUPP
5489 * (95) and fall back to ftruncate().
5491 if (rc == -ENOTSUPP)
5497 static int ll_fiemap(struct inode *inode, struct fiemap_extent_info *fieinfo,
5498 __u64 start, __u64 len)
5502 struct fiemap *fiemap;
5503 unsigned int extent_count = fieinfo->fi_extents_max;
5505 num_bytes = sizeof(*fiemap) + (extent_count *
5506 sizeof(struct fiemap_extent));
5507 OBD_ALLOC_LARGE(fiemap, num_bytes);
5512 fiemap->fm_flags = fieinfo->fi_flags;
5513 fiemap->fm_extent_count = fieinfo->fi_extents_max;
5514 fiemap->fm_start = start;
5515 fiemap->fm_length = len;
5516 if (extent_count > 0 &&
5517 copy_from_user(&fiemap->fm_extents[0], fieinfo->fi_extents_start,
5518 sizeof(struct fiemap_extent)) != 0)
5519 GOTO(out, rc = -EFAULT);
5521 rc = ll_do_fiemap(inode, fiemap, num_bytes);
5523 if (IS_ENCRYPTED(inode)) {
5526 for (i = 0; i < fiemap->fm_mapped_extents; i++)
5527 fiemap->fm_extents[i].fe_flags |=
5528 FIEMAP_EXTENT_DATA_ENCRYPTED |
5529 FIEMAP_EXTENT_ENCODED;
5532 fieinfo->fi_flags = fiemap->fm_flags;
5533 fieinfo->fi_extents_mapped = fiemap->fm_mapped_extents;
5534 if (extent_count > 0 &&
5535 copy_to_user(fieinfo->fi_extents_start, &fiemap->fm_extents[0],
5536 fiemap->fm_mapped_extents *
5537 sizeof(struct fiemap_extent)) != 0)
5538 GOTO(out, rc = -EFAULT);
5540 OBD_FREE_LARGE(fiemap, num_bytes);
5544 int ll_inode_permission(struct user_namespace *mnt_userns, struct inode *inode,
5548 struct ll_sb_info *sbi;
5549 struct root_squash_info *squash;
5550 struct cred *cred = NULL;
5551 const struct cred *old_cred = NULL;
5552 bool squash_id = false;
5553 ktime_t kstart = ktime_get();
5557 if (mask & MAY_NOT_BLOCK)
5561 * as root inode are NOT getting validated in lookup operation,
5562 * need to do it before permission check.
5565 if (is_root_inode(inode)) {
5566 rc = ll_inode_revalidate(inode->i_sb->s_root, IT_LOOKUP);
5571 CDEBUG(D_VFSTRACE, "VFS Op:inode="DFID"(%p), inode mode %x mask %o\n",
5572 PFID(ll_inode2fid(inode)), inode, inode->i_mode, mask);
5574 /* squash fsuid/fsgid if needed */
5575 sbi = ll_i2sbi(inode);
5576 squash = &sbi->ll_squash;
5577 if (unlikely(squash->rsi_uid != 0 &&
5578 uid_eq(current_fsuid(), GLOBAL_ROOT_UID) &&
5579 !test_bit(LL_SBI_NOROOTSQUASH, sbi->ll_flags))) {
5583 CDEBUG(D_OTHER, "squash creds (%d:%d)=>(%d:%d)\n",
5584 __kuid_val(current_fsuid()), __kgid_val(current_fsgid()),
5585 squash->rsi_uid, squash->rsi_gid);
5587 /* update current process's credentials
5588 * and FS capability */
5589 cred = prepare_creds();
5593 cred->fsuid = make_kuid(&init_user_ns, squash->rsi_uid);
5594 cred->fsgid = make_kgid(&init_user_ns, squash->rsi_gid);
5595 cred->cap_effective = cap_drop_nfsd_set(cred->cap_effective);
5596 cred->cap_effective = cap_drop_fs_set(cred->cap_effective);
5598 old_cred = override_creds(cred);
5601 rc = generic_permission(mnt_userns, inode, mask);
5602 /* restore current process's credentials and FS capability */
5604 revert_creds(old_cred);
5609 ll_stats_ops_tally(sbi, LPROC_LL_INODE_PERM,
5610 ktime_us_delta(ktime_get(), kstart));
5615 /* -o localflock - only provides locally consistent flock locks */
5616 static const struct file_operations ll_file_operations = {
5617 #ifdef HAVE_FILE_OPERATIONS_READ_WRITE_ITER
5618 # ifdef HAVE_SYNC_READ_WRITE
5619 .read = new_sync_read,
5620 .write = new_sync_write,
5622 .read_iter = ll_file_read_iter,
5623 .write_iter = ll_file_write_iter,
5624 #else /* !HAVE_FILE_OPERATIONS_READ_WRITE_ITER */
5625 .read = ll_file_read,
5626 .aio_read = ll_file_aio_read,
5627 .write = ll_file_write,
5628 .aio_write = ll_file_aio_write,
5629 #endif /* HAVE_FILE_OPERATIONS_READ_WRITE_ITER */
5630 .unlocked_ioctl = ll_file_ioctl,
5631 .open = ll_file_open,
5632 .release = ll_file_release,
5633 .mmap = ll_file_mmap,
5634 .llseek = ll_file_seek,
5635 #ifndef HAVE_DEFAULT_FILE_SPLICE_READ_EXPORT
5636 .splice_read = generic_file_splice_read,
5638 .splice_read = pcc_file_splice_read,
5642 .fallocate = ll_fallocate,
5645 static const struct file_operations ll_file_operations_flock = {
5646 #ifdef HAVE_FILE_OPERATIONS_READ_WRITE_ITER
5647 # ifdef HAVE_SYNC_READ_WRITE
5648 .read = new_sync_read,
5649 .write = new_sync_write,
5650 # endif /* HAVE_SYNC_READ_WRITE */
5651 .read_iter = ll_file_read_iter,
5652 .write_iter = ll_file_write_iter,
5653 #else /* !HAVE_FILE_OPERATIONS_READ_WRITE_ITER */
5654 .read = ll_file_read,
5655 .aio_read = ll_file_aio_read,
5656 .write = ll_file_write,
5657 .aio_write = ll_file_aio_write,
5658 #endif /* HAVE_FILE_OPERATIONS_READ_WRITE_ITER */
5659 .unlocked_ioctl = ll_file_ioctl,
5660 .open = ll_file_open,
5661 .release = ll_file_release,
5662 .mmap = ll_file_mmap,
5663 .llseek = ll_file_seek,
5664 #ifndef HAVE_DEFAULT_FILE_SPLICE_READ_EXPORT
5665 .splice_read = generic_file_splice_read,
5667 .splice_read = pcc_file_splice_read,
5671 .flock = ll_file_flock,
5672 .lock = ll_file_flock,
5673 .fallocate = ll_fallocate,
5676 /* These are for -o noflock - to return ENOSYS on flock calls */
5677 static const struct file_operations ll_file_operations_noflock = {
5678 #ifdef HAVE_FILE_OPERATIONS_READ_WRITE_ITER
5679 # ifdef HAVE_SYNC_READ_WRITE
5680 .read = new_sync_read,
5681 .write = new_sync_write,
5682 # endif /* HAVE_SYNC_READ_WRITE */
5683 .read_iter = ll_file_read_iter,
5684 .write_iter = ll_file_write_iter,
5685 #else /* !HAVE_FILE_OPERATIONS_READ_WRITE_ITER */
5686 .read = ll_file_read,
5687 .aio_read = ll_file_aio_read,
5688 .write = ll_file_write,
5689 .aio_write = ll_file_aio_write,
5690 #endif /* HAVE_FILE_OPERATIONS_READ_WRITE_ITER */
5691 .unlocked_ioctl = ll_file_ioctl,
5692 .open = ll_file_open,
5693 .release = ll_file_release,
5694 .mmap = ll_file_mmap,
5695 .llseek = ll_file_seek,
5696 #ifndef HAVE_DEFAULT_FILE_SPLICE_READ_EXPORT
5697 .splice_read = generic_file_splice_read,
5699 .splice_read = pcc_file_splice_read,
5703 .flock = ll_file_noflock,
5704 .lock = ll_file_noflock,
5705 .fallocate = ll_fallocate,
5708 const struct inode_operations ll_file_inode_operations = {
5709 .setattr = ll_setattr,
5710 .getattr = ll_getattr,
5711 .permission = ll_inode_permission,
5712 #ifdef HAVE_IOP_XATTR
5713 .setxattr = ll_setxattr,
5714 .getxattr = ll_getxattr,
5715 .removexattr = ll_removexattr,
5717 .listxattr = ll_listxattr,
5718 .fiemap = ll_fiemap,
5719 .get_acl = ll_get_acl,
5720 #ifdef HAVE_IOP_SET_ACL
5721 .set_acl = ll_set_acl,
5725 const struct file_operations *ll_select_file_operations(struct ll_sb_info *sbi)
5727 const struct file_operations *fops = &ll_file_operations_noflock;
5729 if (test_bit(LL_SBI_FLOCK, sbi->ll_flags))
5730 fops = &ll_file_operations_flock;
5731 else if (test_bit(LL_SBI_LOCALFLOCK, sbi->ll_flags))
5732 fops = &ll_file_operations;
5737 int ll_layout_conf(struct inode *inode, const struct cl_object_conf *conf)
5739 struct ll_inode_info *lli = ll_i2info(inode);
5740 struct cl_object *obj = lli->lli_clob;
5749 env = cl_env_get(&refcheck);
5751 RETURN(PTR_ERR(env));
5753 rc = cl_conf_set(env, lli->lli_clob, conf);
5757 if (conf->coc_opc == OBJECT_CONF_SET) {
5758 struct ldlm_lock *lock = conf->coc_lock;
5759 struct cl_layout cl = {
5763 LASSERT(lock != NULL);
5764 LASSERT(ldlm_has_layout(lock));
5766 /* it can only be allowed to match after layout is
5767 * applied to inode otherwise false layout would be
5768 * seen. Applying layout shoud happen before dropping
5769 * the intent lock. */
5770 ldlm_lock_allow_match(lock);
5772 rc = cl_object_layout_get(env, obj, &cl);
5777 DFID": layout version change: %u -> %u\n",
5778 PFID(&lli->lli_fid), ll_layout_version_get(lli),
5780 ll_layout_version_set(lli, cl.cl_layout_gen);
5784 cl_env_put(env, &refcheck);
5786 RETURN(rc < 0 ? rc : 0);
5789 /* Fetch layout from MDT with getxattr request, if it's not ready yet */
5790 static int ll_layout_fetch(struct inode *inode, struct ldlm_lock *lock)
5793 struct ll_sb_info *sbi = ll_i2sbi(inode);
5794 struct ptlrpc_request *req;
5801 CDEBUG(D_INODE, DFID" LVB_READY=%d l_lvb_data=%p l_lvb_len=%d\n",
5802 PFID(ll_inode2fid(inode)), ldlm_is_lvb_ready(lock),
5803 lock->l_lvb_data, lock->l_lvb_len);
5805 if (lock->l_lvb_data != NULL)
5808 /* if layout lock was granted right away, the layout is returned
5809 * within DLM_LVB of dlm reply; otherwise if the lock was ever
5810 * blocked and then granted via completion ast, we have to fetch
5811 * layout here. Please note that we can't use the LVB buffer in
5812 * completion AST because it doesn't have a large enough buffer */
5813 rc = ll_get_default_mdsize(sbi, &lmmsize);
5817 rc = md_getxattr(sbi->ll_md_exp, ll_inode2fid(inode), OBD_MD_FLXATTR,
5818 XATTR_NAME_LOV, lmmsize, &req);
5821 GOTO(out, rc = 0); /* empty layout */
5828 if (lmmsize == 0) /* empty layout */
5831 lmm = req_capsule_server_sized_get(&req->rq_pill, &RMF_EADATA, lmmsize);
5833 GOTO(out, rc = -EFAULT);
5835 OBD_ALLOC_LARGE(lvbdata, lmmsize);
5836 if (lvbdata == NULL)
5837 GOTO(out, rc = -ENOMEM);
5839 memcpy(lvbdata, lmm, lmmsize);
5840 lock_res_and_lock(lock);
5841 if (unlikely(lock->l_lvb_data == NULL)) {
5842 lock->l_lvb_type = LVB_T_LAYOUT;
5843 lock->l_lvb_data = lvbdata;
5844 lock->l_lvb_len = lmmsize;
5847 unlock_res_and_lock(lock);
5850 OBD_FREE_LARGE(lvbdata, lmmsize);
5855 ptlrpc_req_finished(req);
5860 * Apply the layout to the inode. Layout lock is held and will be released
5863 static int ll_layout_lock_set(struct lustre_handle *lockh, enum ldlm_mode mode,
5864 struct inode *inode)
5866 struct ll_inode_info *lli = ll_i2info(inode);
5867 struct ll_sb_info *sbi = ll_i2sbi(inode);
5868 struct ldlm_lock *lock;
5869 struct cl_object_conf conf;
5872 bool wait_layout = false;
5875 LASSERT(lustre_handle_is_used(lockh));
5877 lock = ldlm_handle2lock(lockh);
5878 LASSERT(lock != NULL);
5880 if (!ldlm_has_layout(lock))
5881 GOTO(out, rc = -EAGAIN);
5883 LDLM_DEBUG(lock, "file "DFID"(%p) being reconfigured",
5884 PFID(&lli->lli_fid), inode);
5886 /* in case this is a caching lock and reinstate with new inode */
5887 md_set_lock_data(sbi->ll_md_exp, lockh, inode, NULL);
5889 lock_res_and_lock(lock);
5890 lvb_ready = ldlm_is_lvb_ready(lock);
5891 unlock_res_and_lock(lock);
5893 /* checking lvb_ready is racy but this is okay. The worst case is
5894 * that multi processes may configure the file on the same time. */
5898 rc = ll_layout_fetch(inode, lock);
5902 /* for layout lock, lmm is stored in lock's lvb.
5903 * lvb_data is immutable if the lock is held so it's safe to access it
5906 * set layout to file. Unlikely this will fail as old layout was
5907 * surely eliminated */
5908 memset(&conf, 0, sizeof conf);
5909 conf.coc_opc = OBJECT_CONF_SET;
5910 conf.coc_inode = inode;
5911 conf.coc_lock = lock;
5912 conf.u.coc_layout.lb_buf = lock->l_lvb_data;
5913 conf.u.coc_layout.lb_len = lock->l_lvb_len;
5914 rc = ll_layout_conf(inode, &conf);
5916 /* refresh layout failed, need to wait */
5917 wait_layout = rc == -EBUSY;
5920 LDLM_LOCK_PUT(lock);
5921 ldlm_lock_decref(lockh, mode);
5923 /* wait for IO to complete if it's still being used. */
5925 CDEBUG(D_INODE, "%s: "DFID"(%p) wait for layout reconf\n",
5926 sbi->ll_fsname, PFID(&lli->lli_fid), inode);
5928 memset(&conf, 0, sizeof conf);
5929 conf.coc_opc = OBJECT_CONF_WAIT;
5930 conf.coc_inode = inode;
5931 rc = ll_layout_conf(inode, &conf);
5935 CDEBUG(D_INODE, "%s file="DFID" waiting layout return: %d\n",
5936 sbi->ll_fsname, PFID(&lli->lli_fid), rc);
5942 * Issue layout intent RPC to MDS.
5943 * \param inode [in] file inode
5944 * \param intent [in] layout intent
5946 * \retval 0 on success
5947 * \retval < 0 error code
5949 static int ll_layout_intent(struct inode *inode, struct layout_intent *intent)
5951 struct ll_inode_info *lli = ll_i2info(inode);
5952 struct ll_sb_info *sbi = ll_i2sbi(inode);
5953 struct md_op_data *op_data;
5954 struct lookup_intent it;
5955 struct ptlrpc_request *req;
5959 op_data = ll_prep_md_op_data(NULL, inode, inode, NULL,
5960 0, 0, LUSTRE_OPC_ANY, NULL);
5961 if (IS_ERR(op_data))
5962 RETURN(PTR_ERR(op_data));
5964 op_data->op_data = intent;
5965 op_data->op_data_size = sizeof(*intent);
5967 memset(&it, 0, sizeof(it));
5968 it.it_op = IT_LAYOUT;
5969 if (intent->li_opc == LAYOUT_INTENT_WRITE ||
5970 intent->li_opc == LAYOUT_INTENT_TRUNC)
5971 it.it_flags = FMODE_WRITE;
5973 LDLM_DEBUG_NOLOCK("%s: requeue layout lock for file "DFID"(%p)",
5974 sbi->ll_fsname, PFID(&lli->lli_fid), inode);
5976 rc = md_intent_lock(sbi->ll_md_exp, op_data, &it, &req,
5977 &ll_md_blocking_ast, 0);
5978 if (it.it_request != NULL)
5979 ptlrpc_req_finished(it.it_request);
5980 it.it_request = NULL;
5982 ll_finish_md_op_data(op_data);
5984 /* set lock data in case this is a new lock */
5986 ll_set_lock_data(sbi->ll_md_exp, inode, &it, NULL);
5988 ll_intent_drop_lock(&it);
5994 * This function checks if there exists a LAYOUT lock on the client side,
5995 * or enqueues it if it doesn't have one in cache.
5997 * This function will not hold layout lock so it may be revoked any time after
5998 * this function returns. Any operations depend on layout should be redone
6001 * This function should be called before lov_io_init() to get an uptodate
6002 * layout version, the caller should save the version number and after IO
6003 * is finished, this function should be called again to verify that layout
6004 * is not changed during IO time.
6006 int ll_layout_refresh(struct inode *inode, __u32 *gen)
6008 struct ll_inode_info *lli = ll_i2info(inode);
6009 struct ll_sb_info *sbi = ll_i2sbi(inode);
6010 struct lustre_handle lockh;
6011 struct layout_intent intent = {
6012 .li_opc = LAYOUT_INTENT_ACCESS,
6014 enum ldlm_mode mode;
6018 *gen = ll_layout_version_get(lli);
6019 if (!test_bit(LL_SBI_LAYOUT_LOCK, sbi->ll_flags) ||
6020 *gen != CL_LAYOUT_GEN_NONE)
6024 LASSERT(fid_is_sane(ll_inode2fid(inode)));
6025 LASSERT(S_ISREG(inode->i_mode));
6027 /* take layout lock mutex to enqueue layout lock exclusively. */
6028 mutex_lock(&lli->lli_layout_mutex);
6031 /* mostly layout lock is caching on the local side, so try to
6032 * match it before grabbing layout lock mutex. */
6033 mode = ll_take_md_lock(inode, MDS_INODELOCK_LAYOUT, &lockh, 0,
6034 LCK_CR | LCK_CW | LCK_PR |
6036 if (mode != 0) { /* hit cached lock */
6037 rc = ll_layout_lock_set(&lockh, mode, inode);
6043 rc = ll_layout_intent(inode, &intent);
6049 *gen = ll_layout_version_get(lli);
6050 mutex_unlock(&lli->lli_layout_mutex);
6056 * Issue layout intent RPC indicating where in a file an IO is about to write.
6058 * \param[in] inode file inode.
6059 * \param[in] ext write range with start offset of fille in bytes where
6060 * an IO is about to write, and exclusive end offset in
6063 * \retval 0 on success
6064 * \retval < 0 error code
6066 int ll_layout_write_intent(struct inode *inode, enum layout_intent_opc opc,
6067 struct lu_extent *ext)
6069 struct layout_intent intent = {
6071 .li_extent.e_start = ext->e_start,
6072 .li_extent.e_end = ext->e_end,
6077 rc = ll_layout_intent(inode, &intent);
6083 * This function send a restore request to the MDT
6085 int ll_layout_restore(struct inode *inode, loff_t offset, __u64 length)
6087 struct hsm_user_request *hur;
6091 len = sizeof(struct hsm_user_request) +
6092 sizeof(struct hsm_user_item);
6093 OBD_ALLOC(hur, len);
6097 hur->hur_request.hr_action = HUA_RESTORE;
6098 hur->hur_request.hr_archive_id = 0;
6099 hur->hur_request.hr_flags = 0;
6100 memcpy(&hur->hur_user_item[0].hui_fid, &ll_i2info(inode)->lli_fid,
6101 sizeof(hur->hur_user_item[0].hui_fid));
6102 hur->hur_user_item[0].hui_extent.offset = offset;
6103 hur->hur_user_item[0].hui_extent.length = length;
6104 hur->hur_request.hr_itemcount = 1;
6105 rc = obd_iocontrol(LL_IOC_HSM_REQUEST, ll_i2sbi(inode)->ll_md_exp,