1 /* -*- mode: c; c-basic-offset: 8; indent-tabs-mode: nil; -*-
2 * vim:expandtab:shiftwidth=8:tabstop=8:
6 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 only,
10 * as published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License version 2 for more details (a copy is included
16 * in the LICENSE file that accompanied this code).
18 * You should have received a copy of the GNU General Public License
19 * version 2 along with this program; If not, see
20 * http://www.sun.com/software/products/lustre/docs/GPLv2.pdf
22 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
23 * CA 95054 USA or visit www.sun.com if you need additional information or
29 * Copyright (c) 2001, 2010, Oracle and/or its affiliates. All rights reserved.
30 * Use is subject to license terms.
33 * This file is part of Lustre, http://www.lustre.org/
34 * Lustre is a trademark of Sun Microsystems, Inc.
36 * lustre/ost/ost_handler.c
38 * Author: Peter J. Braam <braam@clusterfs.com>
39 * Author: Phil Schwan <phil@clusterfs.com>
43 # define EXPORT_SYMTAB
45 #define DEBUG_SUBSYSTEM S_OST
47 #include <linux/module.h>
48 #include <obd_cksum.h>
50 #include <lustre_net.h>
51 #include <lustre_dlm.h>
52 #include <lustre_export.h>
53 #include <lustre_debug.h>
54 #include <linux/init.h>
55 #include <lprocfs_status.h>
56 #include <libcfs/list.h>
57 #include <lustre_quota.h>
58 #include "ost_internal.h"
60 static int oss_num_threads;
61 CFS_MODULE_PARM(oss_num_threads, "i", int, 0444,
62 "number of OSS service threads to start");
64 static int ost_num_threads;
65 CFS_MODULE_PARM(ost_num_threads, "i", int, 0444,
66 "number of OST service threads to start (deprecated)");
68 static int oss_num_create_threads;
69 CFS_MODULE_PARM(oss_num_create_threads, "i", int, 0444,
70 "number of OSS create threads to start");
73 * Do not return server-side uid/gid to remote client
75 static void ost_drop_id(struct obd_export *exp, struct obdo *oa)
77 if (exp_connect_rmtclient(exp)) {
80 oa->o_valid &= ~(OBD_MD_FLUID | OBD_MD_FLGID);
85 * Validate oa from client.
86 * 1. If the request comes from 1.8 clients, it will reset o_seq with MDT0.
87 * 2. If the request comes from 2.0 clients, currently only RSVD seq and IDIF
89 * a. for single MDS seq = FID_SEQ_OST_MDT0,
90 * b. for CMD, seq = FID_SEQ_OST_MDT0, FID_SEQ_OST_MDT1 - FID_SEQ_OST_MAX
92 static int ost_validate_obdo(struct obd_export *exp, struct obdo *oa,
93 struct obd_ioobj *ioobj)
95 if (oa != NULL && (!(oa->o_valid & OBD_MD_FLGROUP) ||
96 !(exp->exp_connect_flags & OBD_CONNECT_FULL20))) {
97 oa->o_seq = FID_SEQ_OST_MDT0;
99 ioobj->ioo_seq = FID_SEQ_OST_MDT0;
100 /* remove fid_seq_is_rsvd() after FID-on-OST allows SEQ > 9 */
101 } else if (oa == NULL ||
102 !(fid_seq_is_rsvd(oa->o_seq) || fid_seq_is_idif(oa->o_seq))) {
103 CERROR("%s: client %s sent invalid object "POSTID"\n",
104 exp->exp_obd->obd_name, obd_export_nid2str(exp),
105 oa ? oa->o_id : -1, oa ? oa->o_seq : -1);
108 obdo_from_ostid(oa, &oa->o_oi);
110 ioobj_from_obdo(ioobj, oa);
114 void oti_to_request(struct obd_trans_info *oti, struct ptlrpc_request *req)
116 struct oti_req_ack_lock *ack_lock;
122 if (req->rq_repmsg) {
123 __u64 versions[PTLRPC_NUM_VERSIONS] = { 0 };
124 lustre_msg_set_transno(req->rq_repmsg, oti->oti_transno);
125 versions[0] = oti->oti_pre_version;
126 lustre_msg_set_versions(req->rq_repmsg, versions);
128 req->rq_transno = oti->oti_transno;
130 /* XXX 4 == entries in oti_ack_locks??? */
131 for (ack_lock = oti->oti_ack_locks, i = 0; i < 4; i++, ack_lock++) {
134 /* XXX not even calling target_send_reply in some cases... */
135 ptlrpc_save_lock (req, &ack_lock->lock, ack_lock->mode, 0);
139 static int ost_destroy(struct obd_export *exp, struct ptlrpc_request *req,
140 struct obd_trans_info *oti)
142 struct ost_body *body, *repbody;
143 struct lustre_capa *capa = NULL;
147 /* Get the request body */
148 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
152 if (body->oa.o_id == 0)
155 rc = ost_validate_obdo(exp, &body->oa, NULL);
159 /* If there's a DLM request, cancel the locks mentioned in it*/
160 if (req_capsule_field_present(&req->rq_pill, &RMF_DLM_REQ, RCL_CLIENT)) {
161 struct ldlm_request *dlm;
163 dlm = req_capsule_client_get(&req->rq_pill, &RMF_DLM_REQ);
166 ldlm_request_cancel(req, dlm, 0);
169 /* If there's a capability, get it */
170 if (body->oa.o_valid & OBD_MD_FLOSSCAPA) {
171 capa = req_capsule_client_get(&req->rq_pill, &RMF_CAPA1);
173 CERROR("Missing capability for OST DESTROY");
178 /* Prepare the reply */
179 rc = req_capsule_server_pack(&req->rq_pill);
183 /* Get the log cancellation cookie */
184 if (body->oa.o_valid & OBD_MD_FLCOOKIE)
185 oti->oti_logcookies = &body->oa.o_lcookie;
187 /* Finish the reply */
188 repbody = req_capsule_server_get(&req->rq_pill, &RMF_OST_BODY);
189 memcpy(&repbody->oa, &body->oa, sizeof(body->oa));
191 /* Do the destroy and set the reply status accordingly */
192 req->rq_status = obd_destroy(exp, &body->oa, NULL, oti, NULL, capa);
197 * Helper function for getting server side [start, start+count] DLM lock
198 * if asked by client.
200 static int ost_lock_get(struct obd_export *exp, struct obdo *oa,
201 __u64 start, __u64 count, struct lustre_handle *lh,
204 struct ldlm_res_id res_id;
205 ldlm_policy_data_t policy;
206 __u64 end = start + count;
210 LASSERT(!lustre_handle_is_used(lh));
211 /* o_id and o_gr are used for localizing resource, if client miss to set
212 * them, do not trigger ASSERTION. */
213 if (unlikely((oa->o_valid & (OBD_MD_FLID | OBD_MD_FLGROUP)) !=
214 (OBD_MD_FLID | OBD_MD_FLGROUP)))
217 if (!(oa->o_valid & OBD_MD_FLFLAGS) ||
218 !(oa->o_flags & OBD_FL_SRVLOCK))
221 osc_build_res_name(oa->o_id, oa->o_seq, &res_id);
222 CDEBUG(D_INODE, "OST-side extent lock.\n");
224 policy.l_extent.start = start & CFS_PAGE_MASK;
226 /* If ->o_blocks is EOF it means "lock till the end of the
227 * file". Otherwise, it's size of a hole being punched (in bytes) */
228 if (count == OBD_OBJECT_EOF || end < start)
229 policy.l_extent.end = OBD_OBJECT_EOF;
231 policy.l_extent.end = end | ~CFS_PAGE_MASK;
233 RETURN(ldlm_cli_enqueue_local(exp->exp_obd->obd_namespace, &res_id,
234 LDLM_EXTENT, &policy, mode, &flags,
235 ldlm_blocking_ast, ldlm_completion_ast,
236 ldlm_glimpse_ast, NULL, 0, NULL, lh));
239 /* Helper function: release lock, if any. */
240 static void ost_lock_put(struct obd_export *exp,
241 struct lustre_handle *lh, int mode)
244 if (lustre_handle_is_used(lh))
245 ldlm_lock_decref(lh, mode);
249 static int ost_getattr(struct obd_export *exp, struct ptlrpc_request *req)
251 struct ost_body *body, *repbody;
252 struct obd_info oinfo = { { { 0 } } };
253 struct lustre_handle lh = { 0 };
257 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
261 rc = ost_validate_obdo(exp, &body->oa, NULL);
265 rc = req_capsule_server_pack(&req->rq_pill);
269 repbody = req_capsule_server_get(&req->rq_pill, &RMF_OST_BODY);
270 repbody->oa = body->oa;
272 rc = ost_lock_get(exp, &body->oa, 0, OBD_OBJECT_EOF, &lh, LCK_PR, 0);
276 oinfo.oi_oa = &repbody->oa;
277 if (oinfo.oi_oa->o_valid & OBD_MD_FLOSSCAPA) {
278 oinfo.oi_capa = req_capsule_client_get(&req->rq_pill,
280 if (oinfo.oi_capa == NULL) {
281 CERROR("Missing capability for OST GETATTR");
286 req->rq_status = obd_getattr(exp, &oinfo);
287 ost_lock_put(exp, &lh, LCK_PR);
289 ost_drop_id(exp, &repbody->oa);
293 static int ost_statfs(struct ptlrpc_request *req)
295 struct obd_statfs *osfs;
299 rc = req_capsule_server_pack(&req->rq_pill);
303 osfs = req_capsule_server_get(&req->rq_pill, &RMF_OBD_STATFS);
305 req->rq_status = obd_statfs(req->rq_export->exp_obd, osfs,
306 cfs_time_shift_64(-OBD_STATFS_CACHE_SECONDS),
308 if (req->rq_status != 0)
309 CERROR("ost: statfs failed: rc %d\n", req->rq_status);
314 static int ost_create(struct obd_export *exp, struct ptlrpc_request *req,
315 struct obd_trans_info *oti)
317 struct ost_body *body, *repbody;
321 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
325 rc = ost_validate_obdo(req->rq_export, &body->oa, NULL);
329 rc = req_capsule_server_pack(&req->rq_pill);
333 repbody = req_capsule_server_get(&req->rq_pill, &RMF_OST_BODY);
334 memcpy(&repbody->oa, &body->oa, sizeof(body->oa));
335 oti->oti_logcookies = &repbody->oa.o_lcookie;
337 req->rq_status = obd_create(exp, &repbody->oa, NULL, oti);
338 //obd_log_cancel(conn, NULL, 1, oti->oti_logcookies, 0);
342 static int ost_punch(struct obd_export *exp, struct ptlrpc_request *req,
343 struct obd_trans_info *oti)
345 struct obd_info oinfo = { { { 0 } } };
346 struct ost_body *body, *repbody;
348 struct lustre_handle lh = {0,};
351 /* check that we do support OBD_CONNECT_TRUNCLOCK. */
352 CLASSERT(OST_CONNECT_SUPPORTED & OBD_CONNECT_TRUNCLOCK);
354 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
358 rc = ost_validate_obdo(exp, &body->oa, NULL);
362 oinfo.oi_oa = &body->oa;
363 oinfo.oi_policy.l_extent.start = oinfo.oi_oa->o_size;
364 oinfo.oi_policy.l_extent.end = oinfo.oi_oa->o_blocks;
366 if ((oinfo.oi_oa->o_valid & (OBD_MD_FLSIZE | OBD_MD_FLBLOCKS)) !=
367 (OBD_MD_FLSIZE | OBD_MD_FLBLOCKS))
370 rc = req_capsule_server_pack(&req->rq_pill);
374 /* standard truncate optimization: if file body is completely
375 * destroyed, don't send data back to the server. */
376 if (oinfo.oi_oa->o_size == 0)
377 flags |= LDLM_AST_DISCARD_DATA;
379 repbody = req_capsule_server_get(&req->rq_pill, &RMF_OST_BODY);
380 rc = ost_lock_get(exp, oinfo.oi_oa, oinfo.oi_oa->o_size,
381 oinfo.oi_oa->o_blocks, &lh, LCK_PW, flags);
383 if (oinfo.oi_oa->o_valid & OBD_MD_FLFLAGS &&
384 oinfo.oi_oa->o_flags == OBD_FL_SRVLOCK)
386 * If OBD_FL_SRVLOCK is the only bit set in
387 * ->o_flags, clear OBD_MD_FLFLAGS to avoid falling
388 * through filter_setattr() to filter_iocontrol().
390 oinfo.oi_oa->o_valid &= ~OBD_MD_FLFLAGS;
392 if (oinfo.oi_oa->o_valid & OBD_MD_FLOSSCAPA) {
393 oinfo.oi_capa = req_capsule_client_get(&req->rq_pill,
395 if (oinfo.oi_capa == NULL) {
396 CERROR("Missing capability for OST PUNCH");
400 req->rq_status = obd_punch(exp, &oinfo, oti, NULL);
401 ost_lock_put(exp, &lh, LCK_PW);
403 repbody->oa = *oinfo.oi_oa;
404 ost_drop_id(exp, &repbody->oa);
408 static int ost_sync(struct obd_export *exp, struct ptlrpc_request *req)
410 struct ost_body *body, *repbody;
411 struct lustre_capa *capa = NULL;
415 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
419 rc = ost_validate_obdo(exp, &body->oa, NULL);
423 if (body->oa.o_valid & OBD_MD_FLOSSCAPA) {
424 capa = req_capsule_client_get(&req->rq_pill, &RMF_CAPA1);
426 CERROR("Missing capability for OST SYNC");
431 rc = req_capsule_server_pack(&req->rq_pill);
435 repbody = req_capsule_server_get(&req->rq_pill, &RMF_OST_BODY);
436 memcpy(&repbody->oa, &body->oa, sizeof(body->oa));
437 req->rq_status = obd_sync(exp, &repbody->oa, NULL, repbody->oa.o_size,
438 repbody->oa.o_blocks, capa);
439 ost_drop_id(exp, &repbody->oa);
443 static int ost_setattr(struct obd_export *exp, struct ptlrpc_request *req,
444 struct obd_trans_info *oti)
446 struct ost_body *body, *repbody;
448 struct obd_info oinfo = { { { 0 } } };
451 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
455 rc = ost_validate_obdo(req->rq_export, &body->oa, NULL);
459 rc = req_capsule_server_pack(&req->rq_pill);
463 repbody = req_capsule_server_get(&req->rq_pill, &RMF_OST_BODY);
464 repbody->oa = body->oa;
466 oinfo.oi_oa = &repbody->oa;
467 if (oinfo.oi_oa->o_valid & OBD_MD_FLOSSCAPA) {
468 oinfo.oi_capa = req_capsule_client_get(&req->rq_pill,
470 if (oinfo.oi_capa == NULL) {
471 CERROR("Missing capability for OST SETATTR");
475 req->rq_status = obd_setattr(exp, &oinfo, oti);
476 ost_drop_id(exp, &repbody->oa);
480 static int ost_bulk_timeout(void *data)
483 /* We don't fail the connection here, because having the export
484 * killed makes the (vital) call to commitrw very sad.
489 static __u32 ost_checksum_bulk(struct ptlrpc_bulk_desc *desc, int opc,
490 cksum_type_t cksum_type)
495 cksum = init_checksum(cksum_type);
496 for (i = 0; i < desc->bd_iov_count; i++) {
497 struct page *page = desc->bd_iov[i].kiov_page;
498 int off = desc->bd_iov[i].kiov_offset & ~CFS_PAGE_MASK;
499 char *ptr = kmap(page) + off;
500 int len = desc->bd_iov[i].kiov_len;
502 /* corrupt the data before we compute the checksum, to
503 * simulate a client->OST data error */
504 if (i == 0 && opc == OST_WRITE &&
505 OBD_FAIL_CHECK(OBD_FAIL_OST_CHECKSUM_RECEIVE))
506 memcpy(ptr, "bad3", min(4, len));
507 cksum = compute_checksum(cksum, ptr, len, cksum_type);
508 /* corrupt the data after we compute the checksum, to
509 * simulate an OST->client data error */
510 if (i == 0 && opc == OST_READ &&
511 OBD_FAIL_CHECK(OBD_FAIL_OST_CHECKSUM_SEND)) {
512 memcpy(ptr, "bad4", min(4, len));
513 /* nobody should use corrupted page again */
514 ClearPageUptodate(page);
522 static int ost_brw_lock_get(int mode, struct obd_export *exp,
523 struct obd_ioobj *obj, struct niobuf_remote *nb,
524 struct lustre_handle *lh)
527 int nrbufs = obj->ioo_bufcnt;
528 struct ldlm_res_id res_id;
529 ldlm_policy_data_t policy;
533 osc_build_res_name(obj->ioo_id, obj->ioo_seq, &res_id);
534 LASSERT(mode == LCK_PR || mode == LCK_PW);
535 LASSERT(!lustre_handle_is_used(lh));
537 if (nrbufs == 0 || !(nb[0].flags & OBD_BRW_SRVLOCK))
540 for (i = 1; i < nrbufs; i ++)
541 if ((nb[0].flags & OBD_BRW_SRVLOCK) !=
542 (nb[i].flags & OBD_BRW_SRVLOCK))
545 policy.l_extent.start = nb[0].offset & CFS_PAGE_MASK;
546 policy.l_extent.end = (nb[nrbufs - 1].offset +
547 nb[nrbufs - 1].len - 1) | ~CFS_PAGE_MASK;
549 RETURN(ldlm_cli_enqueue_local(exp->exp_obd->obd_namespace, &res_id,
550 LDLM_EXTENT, &policy, mode, &flags,
551 ldlm_blocking_ast, ldlm_completion_ast,
552 ldlm_glimpse_ast, NULL, 0, NULL, lh));
555 static void ost_brw_lock_put(int mode,
556 struct obd_ioobj *obj, struct niobuf_remote *niob,
557 struct lustre_handle *lh)
560 LASSERT(mode == LCK_PR || mode == LCK_PW);
561 LASSERT((obj->ioo_bufcnt > 0 && (niob[0].flags & OBD_BRW_SRVLOCK)) ==
562 lustre_handle_is_used(lh));
563 if (lustre_handle_is_used(lh))
564 ldlm_lock_decref(lh, mode);
568 struct ost_prolong_data {
569 struct obd_export *opd_exp;
570 ldlm_policy_data_t opd_policy;
572 ldlm_mode_t opd_mode;
577 static int ost_prolong_locks_iter(struct ldlm_lock *lock, void *data)
579 struct ost_prolong_data *opd = data;
581 LASSERT(lock->l_resource->lr_type == LDLM_EXTENT);
583 if (lock->l_req_mode != lock->l_granted_mode) {
584 /* scan granted locks only */
585 return LDLM_ITER_STOP;
588 if (lock->l_export != opd->opd_exp) {
589 /* prolong locks only for given client */
590 return LDLM_ITER_CONTINUE;
593 if (!(lock->l_granted_mode & opd->opd_mode)) {
594 /* we aren't interesting in all type of locks */
595 return LDLM_ITER_CONTINUE;
598 if (lock->l_policy_data.l_extent.end < opd->opd_policy.l_extent.start ||
599 lock->l_policy_data.l_extent.start > opd->opd_policy.l_extent.end) {
600 /* the request doesn't cross the lock, skip it */
601 return LDLM_ITER_CONTINUE;
604 /* Fill the obdo with the matched lock handle.
605 * XXX: it is possible in some cases the IO RPC is covered by several
606 * locks, even for the write case, so it may need to be a lock list. */
607 if (opd->opd_oa && !(opd->opd_oa->o_valid & OBD_MD_FLHANDLE)) {
608 opd->opd_oa->o_handle.cookie = lock->l_handle.h_cookie;
609 opd->opd_oa->o_valid |= OBD_MD_FLHANDLE;
612 if (!(lock->l_flags & LDLM_FL_AST_SENT)) {
613 /* ignore locks not being cancelled */
614 return LDLM_ITER_CONTINUE;
617 CDEBUG(D_DLMTRACE,"refresh lock: "LPU64"/"LPU64" ("LPU64"->"LPU64")\n",
618 lock->l_resource->lr_name.name[0],
619 lock->l_resource->lr_name.name[1],
620 opd->opd_policy.l_extent.start, opd->opd_policy.l_extent.end);
621 /* OK. this is a possible lock the user holds doing I/O
622 * let's refresh eviction timer for it */
623 ldlm_refresh_waiting_lock(lock, opd->opd_timeout);
624 opd->opd_lock_match = 1;
626 return LDLM_ITER_CONTINUE;
629 static int ost_rw_prolong_locks(struct ptlrpc_request *req, struct obd_ioobj *obj,
630 struct niobuf_remote *nb, struct obdo *oa,
633 struct ldlm_res_id res_id;
634 int nrbufs = obj->ioo_bufcnt;
635 struct ost_prolong_data opd = { 0 };
638 osc_build_res_name(obj->ioo_id, obj->ioo_seq, &res_id);
641 opd.opd_exp = req->rq_export;
642 opd.opd_policy.l_extent.start = nb[0].offset & CFS_PAGE_MASK;
643 opd.opd_policy.l_extent.end = (nb[nrbufs - 1].offset +
644 nb[nrbufs - 1].len - 1) | ~CFS_PAGE_MASK;
646 /* prolong locks for the current service time of the corresponding
647 * portal (= OST_IO_PORTAL) */
648 opd.opd_timeout = AT_OFF ? obd_timeout / 2:
649 max(at_est2timeout(at_get(&req->rq_rqbd->
650 rqbd_service->srv_at_estimate)), ldlm_timeout);
652 CDEBUG(D_INFO,"refresh locks: "LPU64"/"LPU64" ("LPU64"->"LPU64")\n",
653 res_id.name[0], res_id.name[1], opd.opd_policy.l_extent.start,
654 opd.opd_policy.l_extent.end);
656 if (oa->o_valid & OBD_MD_FLHANDLE) {
657 struct ldlm_lock *lock;
659 lock = ldlm_handle2lock(&oa->o_handle);
661 ost_prolong_locks_iter(lock, &opd);
662 if (opd.opd_lock_match) {
667 /* Check if the lock covers the whole IO region,
668 * otherwise iterate through the resource. */
669 if (lock->l_policy_data.l_extent.end >=
670 opd.opd_policy.l_extent.end &&
671 lock->l_policy_data.l_extent.start <=
672 opd.opd_policy.l_extent.start) {
681 ldlm_resource_iterate(req->rq_export->exp_obd->obd_namespace, &res_id,
682 ost_prolong_locks_iter, &opd);
683 RETURN(opd.opd_lock_match);
686 /* Allocate thread local buffers if needed */
687 static struct ost_thread_local_cache *ost_tls_get(struct ptlrpc_request *r)
689 struct ost_thread_local_cache *tls =
690 (struct ost_thread_local_cache *)(r->rq_svc_thread->t_data);
692 /* In normal mode of operation an I/O request is serviced only
693 * by ll_ost_io threads each of them has own tls buffers allocated by
695 * During recovery, an I/O request may be queued until any of the ost
696 * service threads process it. Not necessary it should be one of
697 * ll_ost_io threads. In that case we dynamically allocating tls
698 * buffers for the request service time. */
699 if (unlikely(tls == NULL)) {
700 LASSERT(r->rq_export->exp_in_recovery);
704 r->rq_svc_thread->t_data = tls;
710 /* Free thread local buffers if they were allocated only for servicing
711 * this one request */
712 static void ost_tls_put(struct ptlrpc_request *r)
714 struct ost_thread_local_cache *tls =
715 (struct ost_thread_local_cache *)(r->rq_svc_thread->t_data);
717 if (unlikely(tls->temporary)) {
719 r->rq_svc_thread->t_data = NULL;
723 static int ost_brw_read(struct ptlrpc_request *req, struct obd_trans_info *oti)
725 struct ptlrpc_bulk_desc *desc = NULL;
726 struct obd_export *exp = req->rq_export;
727 struct niobuf_remote *remote_nb;
728 struct niobuf_local *local_nb;
729 struct obd_ioobj *ioo;
730 struct ost_body *body, *repbody;
731 struct lustre_capa *capa = NULL;
732 struct l_wait_info lwi;
733 struct lustre_handle lockh = { 0 };
734 int niocount, npages, nob = 0, rc, i;
736 struct ost_thread_local_cache *tls;
739 req->rq_bulk_read = 1;
741 if (OBD_FAIL_CHECK(OBD_FAIL_OST_BRW_READ_BULK))
742 GOTO(out, rc = -EIO);
744 OBD_FAIL_TIMEOUT(OBD_FAIL_OST_BRW_PAUSE_BULK, (obd_timeout + 1) / 4);
746 /* Check if there is eviction in progress, and if so, wait for it to
748 if (unlikely(cfs_atomic_read(&exp->exp_obd->obd_evict_inprogress))) {
749 lwi = LWI_INTR(NULL, NULL); // We do not care how long it takes
750 rc = l_wait_event(exp->exp_obd->obd_evict_inprogress_waitq,
751 !cfs_atomic_read(&exp->exp_obd->obd_evict_inprogress),
755 GOTO(out, rc = -ENOTCONN);
757 /* ost_body, ioobj & noibuf_remote are verified and swabbed in
758 * ost_rw_hpreq_check(). */
759 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
761 GOTO(out, rc = -EFAULT);
764 * A req_capsule_X_get_array(pill, field, ptr_to_element_count) function
765 * would be useful here and wherever we get &RMF_OBD_IOOBJ and
766 * &RMF_NIOBUF_REMOTE.
768 ioo = req_capsule_client_get(&req->rq_pill, &RMF_OBD_IOOBJ);
770 GOTO(out, rc = -EFAULT);
772 rc = ost_validate_obdo(exp, &body->oa, ioo);
776 niocount = ioo->ioo_bufcnt;
777 remote_nb = req_capsule_client_get(&req->rq_pill, &RMF_NIOBUF_REMOTE);
778 if (remote_nb == NULL)
779 GOTO(out, rc = -EFAULT);
781 if (body->oa.o_valid & OBD_MD_FLOSSCAPA) {
782 capa = req_capsule_client_get(&req->rq_pill, &RMF_CAPA1);
784 CERROR("Missing capability for OST BRW READ");
785 GOTO(out, rc = -EFAULT);
789 rc = req_capsule_server_pack(&req->rq_pill);
793 tls = ost_tls_get(req);
795 GOTO(out_bulk, rc = -ENOMEM);
796 local_nb = tls->local;
798 rc = ost_brw_lock_get(LCK_PR, exp, ioo, remote_nb, &lockh);
803 * If getting the lock took more time than
804 * client was willing to wait, drop it. b=11330
806 if (cfs_time_current_sec() > req->rq_deadline ||
807 OBD_FAIL_CHECK(OBD_FAIL_OST_DROP_REQ)) {
809 CERROR("Dropping timed-out read from %s because locking"
810 "object "LPX64" took %ld seconds (limit was %ld).\n",
811 libcfs_id2str(req->rq_peer), ioo->ioo_id,
812 cfs_time_current_sec() - req->rq_arrival_time.tv_sec,
813 req->rq_deadline - req->rq_arrival_time.tv_sec);
814 GOTO(out_lock, rc = -ETIMEDOUT);
817 npages = OST_THREAD_POOL_SIZE;
818 rc = obd_preprw(OBD_BRW_READ, exp, &body->oa, 1, ioo,
819 remote_nb, &npages, local_nb, oti, capa);
823 desc = ptlrpc_prep_bulk_exp(req, npages,
824 BULK_PUT_SOURCE, OST_BULK_PORTAL);
826 GOTO(out_lock, rc = -ENOMEM);
828 if (!lustre_handle_is_used(&lockh))
829 /* no needs to try to prolong lock if server is asked
830 * to handle locking (= OBD_BRW_SRVLOCK) */
831 ost_rw_prolong_locks(req, ioo, remote_nb, &body->oa,
835 for (i = 0; i < npages; i++) {
836 int page_rc = local_nb[i].rc;
838 if (page_rc < 0) { /* error */
844 if (page_rc != 0) { /* some data! */
845 LASSERT (local_nb[i].page != NULL);
846 ptlrpc_prep_bulk_page(desc, local_nb[i].page,
847 local_nb[i].offset & ~CFS_PAGE_MASK,
851 if (page_rc != local_nb[i].len) { /* short read */
852 /* All subsequent pages should be 0 */
854 LASSERT(local_nb[i].rc == 0);
859 if (body->oa.o_valid & OBD_MD_FLCKSUM) {
860 cksum_type_t cksum_type = OBD_CKSUM_CRC32;
862 if (body->oa.o_valid & OBD_MD_FLFLAGS)
863 cksum_type = cksum_type_unpack(body->oa.o_flags);
864 body->oa.o_flags = cksum_type_pack(cksum_type);
865 body->oa.o_valid = OBD_MD_FLCKSUM | OBD_MD_FLFLAGS;
866 body->oa.o_cksum = ost_checksum_bulk(desc, OST_READ, cksum_type);
867 CDEBUG(D_PAGE,"checksum at read origin: %x\n",body->oa.o_cksum);
869 body->oa.o_valid = 0;
871 /* We're finishing using body->oa as an input variable */
873 /* Check if client was evicted while we were doing i/o before touching
876 /* Check if there is eviction in progress, and if so, wait for
878 if (unlikely(cfs_atomic_read(&exp->exp_obd->
879 obd_evict_inprogress))) {
880 lwi = LWI_INTR(NULL, NULL);
881 rc = l_wait_event(exp->exp_obd->
882 obd_evict_inprogress_waitq,
883 !cfs_atomic_read(&exp->exp_obd->
884 obd_evict_inprogress),
887 /* Check if client was evicted or tried to reconnect already */
888 if (exp->exp_failed || exp->exp_abort_active_req)
891 rc = sptlrpc_svc_wrap_bulk(req, desc);
893 rc = ptlrpc_start_bulk_transfer(desc);
897 time_t start = cfs_time_current_sec();
899 long timeoutl = req->rq_deadline -
900 cfs_time_current_sec();
901 cfs_duration_t timeout = timeoutl <= 0 ?
902 CFS_TICK : cfs_time_seconds(timeoutl);
903 lwi = LWI_TIMEOUT_INTERVAL(timeout,
907 rc = l_wait_event(desc->bd_waitq,
908 !ptlrpc_server_bulk_active(desc) ||
910 exp->exp_abort_active_req,
912 LASSERT(rc == 0 || rc == -ETIMEDOUT);
913 /* Wait again if we changed deadline */
914 } while ((rc == -ETIMEDOUT) &&
915 (req->rq_deadline > cfs_time_current_sec()));
917 if (rc == -ETIMEDOUT) {
918 DEBUG_REQ(D_ERROR, req,
919 "timeout on bulk PUT after %ld%+lds",
920 req->rq_deadline - start,
921 cfs_time_current_sec() -
923 ptlrpc_abort_bulk(desc);
924 } else if (exp->exp_failed) {
925 DEBUG_REQ(D_ERROR, req, "Eviction on bulk PUT");
927 ptlrpc_abort_bulk(desc);
928 } else if (exp->exp_abort_active_req) {
929 DEBUG_REQ(D_ERROR, req, "Reconnect on bulk PUT");
930 /* we don't reply anyway */
932 ptlrpc_abort_bulk(desc);
933 } else if (!desc->bd_success ||
934 desc->bd_nob_transferred != desc->bd_nob) {
935 DEBUG_REQ(D_ERROR, req, "%s bulk PUT %d(%d)",
937 "truncated" : "network error on",
938 desc->bd_nob_transferred,
940 /* XXX should this be a different errno? */
944 DEBUG_REQ(D_ERROR, req, "bulk PUT failed: rc %d", rc);
949 /* Must commit after prep above in all cases */
950 rc = obd_commitrw(OBD_BRW_READ, exp, &body->oa, 1, ioo,
951 remote_nb, npages, local_nb, oti, rc);
954 repbody = req_capsule_server_get(&req->rq_pill, &RMF_OST_BODY);
955 memcpy(&repbody->oa, &body->oa, sizeof(repbody->oa));
956 ost_drop_id(exp, &repbody->oa);
960 ost_brw_lock_put(LCK_PR, ioo, remote_nb, &lockh);
965 ptlrpc_free_bulk(desc);
969 req->rq_status = nob;
970 ptlrpc_lprocfs_brw(req, nob);
971 target_committed_to_req(req);
973 } else if (!no_reply) {
974 /* Only reply if there was no comms problem with bulk */
975 target_committed_to_req(req);
979 /* reply out callback would free */
980 ptlrpc_req_drop_rs(req);
981 CWARN("%s: ignoring bulk IO comm error with %s@%s id %s - "
982 "client will retry\n",
983 exp->exp_obd->obd_name,
984 exp->exp_client_uuid.uuid,
985 exp->exp_connection->c_remote_uuid.uuid,
986 libcfs_id2str(req->rq_peer));
992 static int ost_brw_write(struct ptlrpc_request *req, struct obd_trans_info *oti)
994 struct ptlrpc_bulk_desc *desc = NULL;
995 struct obd_export *exp = req->rq_export;
996 struct niobuf_remote *remote_nb;
997 struct niobuf_local *local_nb;
998 struct obd_ioobj *ioo;
999 struct ost_body *body, *repbody;
1000 struct l_wait_info lwi;
1001 struct lustre_handle lockh = {0};
1002 struct lustre_capa *capa = NULL;
1004 int objcount, niocount, npages;
1006 obd_count client_cksum = 0, server_cksum = 0;
1007 cksum_type_t cksum_type = OBD_CKSUM_CRC32;
1008 int no_reply = 0, mmap = 0;
1009 __u32 o_uid = 0, o_gid = 0;
1010 struct ost_thread_local_cache *tls;
1013 req->rq_bulk_write = 1;
1015 if (OBD_FAIL_CHECK(OBD_FAIL_OST_BRW_WRITE_BULK))
1016 GOTO(out, rc = -EIO);
1017 if (OBD_FAIL_CHECK(OBD_FAIL_OST_BRW_WRITE_BULK2))
1018 GOTO(out, rc = -EFAULT);
1020 /* pause before transaction has been started */
1021 OBD_FAIL_TIMEOUT(OBD_FAIL_OST_BRW_PAUSE_BULK, (obd_timeout + 1) / 4);
1023 /* Check if there is eviction in progress, and if so, wait for it to
1025 if (unlikely(cfs_atomic_read(&exp->exp_obd->obd_evict_inprogress))) {
1026 lwi = LWI_INTR(NULL, NULL); // We do not care how long it takes
1027 rc = l_wait_event(exp->exp_obd->obd_evict_inprogress_waitq,
1028 !cfs_atomic_read(&exp->exp_obd->obd_evict_inprogress),
1031 if (exp->exp_failed)
1032 GOTO(out, rc = -ENOTCONN);
1034 /* ost_body, ioobj & noibuf_remote are verified and swabbed in
1035 * ost_rw_hpreq_check(). */
1036 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
1038 GOTO(out, rc = -EFAULT);
1040 if ((body->oa.o_flags & OBD_BRW_MEMALLOC) &&
1041 (exp->exp_connection->c_peer.nid == exp->exp_connection->c_self))
1042 cfs_memory_pressure_set();
1044 objcount = req_capsule_get_size(&req->rq_pill, &RMF_OBD_IOOBJ,
1045 RCL_CLIENT) / sizeof(*ioo);
1046 ioo = req_capsule_client_get(&req->rq_pill, &RMF_OBD_IOOBJ);
1048 GOTO(out, rc = -EFAULT);
1050 rc = ost_validate_obdo(exp, &body->oa, ioo);
1054 for (niocount = i = 0; i < objcount; i++)
1055 niocount += ioo[i].ioo_bufcnt;
1058 * It'd be nice to have a capsule function to indicate how many elements
1059 * there were in a buffer for an RMF that's declared to be an array.
1060 * It's easy enough to compute the number of elements here though.
1062 remote_nb = req_capsule_client_get(&req->rq_pill, &RMF_NIOBUF_REMOTE);
1063 if (remote_nb == NULL || niocount != (req_capsule_get_size(&req->rq_pill,
1064 &RMF_NIOBUF_REMOTE, RCL_CLIENT) / sizeof(*remote_nb)))
1065 GOTO(out, rc = -EFAULT);
1067 if (body->oa.o_valid & OBD_MD_FLOSSCAPA) {
1068 capa = req_capsule_client_get(&req->rq_pill, &RMF_CAPA1);
1070 CERROR("Missing capability for OST BRW WRITE");
1071 GOTO(out, rc = -EFAULT);
1075 req_capsule_set_size(&req->rq_pill, &RMF_RCS, RCL_SERVER,
1076 niocount * sizeof(*rcs));
1077 rc = req_capsule_server_pack(&req->rq_pill);
1080 OBD_FAIL_TIMEOUT(OBD_FAIL_OST_BRW_PAUSE_PACK, obd_fail_val);
1081 rcs = req_capsule_server_get(&req->rq_pill, &RMF_RCS);
1083 tls = ost_tls_get(req);
1085 GOTO(out_bulk, rc = -ENOMEM);
1086 local_nb = tls->local;
1088 rc = ost_brw_lock_get(LCK_PW, exp, ioo, remote_nb, &lockh);
1093 * If getting the lock took more time than
1094 * client was willing to wait, drop it. b=11330
1096 if (cfs_time_current_sec() > req->rq_deadline ||
1097 OBD_FAIL_CHECK(OBD_FAIL_OST_DROP_REQ)) {
1099 CERROR("Dropping timed-out write from %s because locking "
1100 "object "LPX64" took %ld seconds (limit was %ld).\n",
1101 libcfs_id2str(req->rq_peer), ioo->ioo_id,
1102 cfs_time_current_sec() - req->rq_arrival_time.tv_sec,
1103 req->rq_deadline - req->rq_arrival_time.tv_sec);
1104 GOTO(out_lock, rc = -ETIMEDOUT);
1107 if (!lustre_handle_is_used(&lockh))
1108 /* no needs to try to prolong lock if server is asked
1109 * to handle locking (= OBD_BRW_SRVLOCK) */
1110 ost_rw_prolong_locks(req, ioo, remote_nb,&body->oa, LCK_PW);
1112 /* obd_preprw clobbers oa->valid, so save what we need */
1113 if (body->oa.o_valid & OBD_MD_FLCKSUM) {
1114 client_cksum = body->oa.o_cksum;
1115 if (body->oa.o_valid & OBD_MD_FLFLAGS)
1116 cksum_type = cksum_type_unpack(body->oa.o_flags);
1118 if (body->oa.o_valid & OBD_MD_FLFLAGS && body->oa.o_flags & OBD_FL_MMAP)
1121 /* Because we already sync grant info with client when reconnect,
1122 * grant info will be cleared for resent req, then fed_grant and
1123 * total_grant will not be modified in following preprw_write */
1124 if (lustre_msg_get_flags(req->rq_reqmsg) & (MSG_RESENT | MSG_REPLAY)) {
1125 DEBUG_REQ(D_CACHE, req, "clear resent/replay req grant info");
1126 body->oa.o_valid &= ~OBD_MD_FLGRANT;
1129 if (exp_connect_rmtclient(exp)) {
1130 o_uid = body->oa.o_uid;
1131 o_gid = body->oa.o_gid;
1133 npages = OST_THREAD_POOL_SIZE;
1134 rc = obd_preprw(OBD_BRW_WRITE, exp, &body->oa, objcount,
1135 ioo, remote_nb, &npages, local_nb, oti, capa);
1139 desc = ptlrpc_prep_bulk_exp(req, npages,
1140 BULK_GET_SINK, OST_BULK_PORTAL);
1142 GOTO(out_lock, rc = -ENOMEM);
1144 /* NB Having prepped, we must commit... */
1146 for (i = 0; i < npages; i++)
1147 ptlrpc_prep_bulk_page(desc, local_nb[i].page,
1148 local_nb[i].offset & ~CFS_PAGE_MASK,
1151 rc = sptlrpc_svc_prep_bulk(req, desc);
1155 /* Check if client was evicted or tried to reconnect while we
1156 * were doing i/o before touching network */
1157 if (desc->bd_export->exp_failed ||
1158 desc->bd_export->exp_abort_active_req)
1161 rc = ptlrpc_start_bulk_transfer(desc);
1163 time_t start = cfs_time_current_sec();
1165 long timeoutl = req->rq_deadline -
1166 cfs_time_current_sec();
1167 cfs_duration_t timeout = timeoutl <= 0 ?
1168 CFS_TICK : cfs_time_seconds(timeoutl);
1169 lwi = LWI_TIMEOUT_INTERVAL(timeout, cfs_time_seconds(1),
1170 ost_bulk_timeout, desc);
1171 rc = l_wait_event(desc->bd_waitq,
1172 !ptlrpc_server_bulk_active(desc) ||
1173 desc->bd_export->exp_failed ||
1174 desc->bd_export->exp_abort_active_req,
1176 LASSERT(rc == 0 || rc == -ETIMEDOUT);
1177 /* Wait again if we changed deadline */
1178 } while ((rc == -ETIMEDOUT) &&
1179 (req->rq_deadline > cfs_time_current_sec()));
1181 if (rc == -ETIMEDOUT) {
1182 DEBUG_REQ(D_ERROR, req,
1183 "timeout on bulk GET after %ld%+lds",
1184 req->rq_deadline - start,
1185 cfs_time_current_sec() -
1187 ptlrpc_abort_bulk(desc);
1188 } else if (desc->bd_export->exp_failed) {
1189 DEBUG_REQ(D_ERROR, req, "Eviction on bulk GET");
1191 ptlrpc_abort_bulk(desc);
1192 } else if (desc->bd_export->exp_abort_active_req) {
1193 DEBUG_REQ(D_ERROR, req, "Reconnect on bulk GET");
1194 /* we don't reply anyway */
1196 ptlrpc_abort_bulk(desc);
1197 } else if (!desc->bd_success) {
1198 DEBUG_REQ(D_ERROR, req, "network error on bulk GET");
1199 /* XXX should this be a different errno? */
1202 rc = sptlrpc_svc_unwrap_bulk(req, desc);
1205 DEBUG_REQ(D_ERROR, req, "ptlrpc_bulk_get failed: rc %d", rc);
1209 repbody = req_capsule_server_get(&req->rq_pill, &RMF_OST_BODY);
1210 memcpy(&repbody->oa, &body->oa, sizeof(repbody->oa));
1212 if (unlikely(client_cksum != 0 && rc == 0)) {
1213 static int cksum_counter;
1214 repbody->oa.o_valid |= OBD_MD_FLCKSUM | OBD_MD_FLFLAGS;
1215 repbody->oa.o_flags &= ~OBD_FL_CKSUM_ALL;
1216 repbody->oa.o_flags |= cksum_type_pack(cksum_type);
1217 server_cksum = ost_checksum_bulk(desc, OST_WRITE, cksum_type);
1218 repbody->oa.o_cksum = server_cksum;
1220 if (unlikely(client_cksum != server_cksum)) {
1221 CDEBUG_LIMIT(mmap ? D_INFO : D_ERROR,
1222 "client csum %x, server csum %x\n",
1223 client_cksum, server_cksum);
1225 } else if ((cksum_counter & (-cksum_counter)) == cksum_counter){
1226 CDEBUG(D_INFO, "Checksum %u from %s OK: %x\n",
1227 cksum_counter, libcfs_id2str(req->rq_peer),
1232 /* Must commit after prep above in all cases */
1233 rc = obd_commitrw(OBD_BRW_WRITE, exp, &repbody->oa, objcount, ioo,
1234 remote_nb, npages, local_nb, oti, rc);
1235 if (rc == -ENOTCONN)
1236 /* quota acquire process has been given up because
1237 * either the client has been evicted or the client
1238 * has timed out the request already */
1241 if (exp_connect_rmtclient(exp)) {
1242 repbody->oa.o_uid = o_uid;
1243 repbody->oa.o_gid = o_gid;
1247 * Disable sending mtime back to the client. If the client locked the
1248 * whole object, then it has already updated the mtime on its side,
1249 * otherwise it will have to glimpse anyway (see bug 21489, comment 32)
1251 repbody->oa.o_valid &= ~(OBD_MD_FLMTIME | OBD_MD_FLATIME);
1253 if (unlikely(client_cksum != server_cksum && rc == 0 && !mmap)) {
1254 int new_cksum = ost_checksum_bulk(desc, OST_WRITE, cksum_type);
1259 if (new_cksum == server_cksum)
1260 msg = "changed in transit before arrival at OST";
1261 else if (new_cksum == client_cksum)
1262 msg = "initial checksum before message complete";
1264 msg = "changed in transit AND after initial checksum";
1266 if (req->rq_peer.nid == desc->bd_sender) {
1270 router = libcfs_nid2str(desc->bd_sender);
1273 LCONSOLE_ERROR_MSG(0x168, "%s: BAD WRITE CHECKSUM: %s from "
1274 "%s%s%s inode "DFID" object "
1275 LPU64"/"LPU64" extent ["LPU64"-"LPU64"]\n",
1276 exp->exp_obd->obd_name, msg,
1277 libcfs_id2str(req->rq_peer),
1279 body->oa.o_valid & OBD_MD_FLFID ?
1280 body->oa.o_parent_seq : (__u64)0,
1281 body->oa.o_valid & OBD_MD_FLFID ?
1282 body->oa.o_parent_oid : 0,
1283 body->oa.o_valid & OBD_MD_FLFID ?
1284 body->oa.o_parent_ver : 0,
1286 body->oa.o_valid & OBD_MD_FLGROUP ?
1287 body->oa.o_seq : (__u64)0,
1289 local_nb[npages-1].offset +
1290 local_nb[npages-1].len - 1 );
1291 CERROR("client csum %x, original server csum %x, "
1292 "server csum now %x\n",
1293 client_cksum, server_cksum, new_cksum);
1299 /* set per-requested niobuf return codes */
1300 for (i = j = 0; i < niocount; i++) {
1301 int len = remote_nb[i].len;
1306 LASSERT(j < npages);
1307 if (local_nb[j].rc < 0)
1308 rcs[i] = local_nb[j].rc;
1309 len -= local_nb[j].len;
1314 LASSERT(j == npages);
1315 ptlrpc_lprocfs_brw(req, nob);
1319 ost_brw_lock_put(LCK_PW, ioo, remote_nb, &lockh);
1324 ptlrpc_free_bulk(desc);
1326 /* XXX: don't send reply if obd rdonly mode, this can cause data loss
1327 * on client, see bug 22190. Remove this when async bulk will be done.
1328 * Meanwhile, if this is umount then don't reply anything. */
1329 if (req->rq_export->exp_obd->obd_no_transno) {
1330 no_reply = req->rq_export->exp_obd->obd_stopping;
1335 oti_to_request(oti, req);
1336 target_committed_to_req(req);
1337 rc = ptlrpc_reply(req);
1338 } else if (!no_reply) {
1339 /* Only reply if there was no comms problem with bulk */
1340 target_committed_to_req(req);
1341 req->rq_status = rc;
1344 /* reply out callback would free */
1345 ptlrpc_req_drop_rs(req);
1346 CWARN("%s: ignoring bulk IO comm error with %s@%s id %s - "
1347 "client will retry\n",
1348 exp->exp_obd->obd_name,
1349 exp->exp_client_uuid.uuid,
1350 exp->exp_connection->c_remote_uuid.uuid,
1351 libcfs_id2str(req->rq_peer));
1353 cfs_memory_pressure_clr();
1358 * Implementation of OST_SET_INFO.
1360 * OST_SET_INFO is like ioctl(): heavily overloaded. Specifically, it takes a
1361 * "key" and a value RPC buffers as arguments, with the value's contents
1362 * interpreted according to the key.
1364 * Value types that need swabbing have swabbing done explicitly, either here or
1365 * in functions called from here. This should be corrected: all swabbing should
1366 * be done in the capsule abstraction, as that will then allow us to move
1367 * swabbing exclusively to the client without having to modify server code
1368 * outside the capsule abstraction's implementation itself. To correct this
1369 * will require minor changes to the capsule abstraction; see the comments for
1370 * req_capsule_extend() in layout.c.
1372 static int ost_set_info(struct obd_export *exp, struct ptlrpc_request *req)
1374 struct ost_body *body = NULL, *repbody;
1375 char *key, *val = NULL;
1376 int keylen, vallen, rc = 0;
1377 int is_grant_shrink = 0;
1380 key = req_capsule_client_get(&req->rq_pill, &RMF_SETINFO_KEY);
1382 DEBUG_REQ(D_HA, req, "no set_info key");
1385 keylen = req_capsule_get_size(&req->rq_pill, &RMF_SETINFO_KEY,
1388 vallen = req_capsule_get_size(&req->rq_pill, &RMF_SETINFO_VAL,
1391 if ((is_grant_shrink = KEY_IS(KEY_GRANT_SHRINK)))
1392 /* In this case the value is actually an RMF_OST_BODY, so we
1393 * transmutate the type of this PTLRPC */
1394 req_capsule_extend(&req->rq_pill, &RQF_OST_SET_GRANT_INFO);
1396 rc = req_capsule_server_pack(&req->rq_pill);
1401 if (is_grant_shrink) {
1402 body = req_capsule_client_get(&req->rq_pill,
1407 repbody = req_capsule_server_get(&req->rq_pill,
1409 memcpy(repbody, body, sizeof(*body));
1410 val = (char*)repbody;
1412 val = req_capsule_client_get(&req->rq_pill,
1417 if (KEY_IS(KEY_EVICT_BY_NID)) {
1419 obd_export_evict_by_nid(exp->exp_obd, val);
1421 } else if (KEY_IS(KEY_MDS_CONN) && ptlrpc_req_need_swab(req)) {
1422 if (vallen < sizeof(__u32))
1424 __swab32s((__u32 *)val);
1427 /* OBD will also check if KEY_IS(KEY_GRANT_SHRINK), and will cast val to
1428 * a struct ost_body * value */
1429 rc = obd_set_info_async(exp, keylen, key, vallen, val, NULL);
1431 lustre_msg_set_status(req->rq_repmsg, 0);
1435 static int ost_get_info(struct obd_export *exp, struct ptlrpc_request *req)
1438 int keylen, replylen, rc = 0;
1439 struct req_capsule *pill = &req->rq_pill;
1442 /* this common part for get_info rpc */
1443 key = req_capsule_client_get(pill, &RMF_SETINFO_KEY);
1445 DEBUG_REQ(D_HA, req, "no get_info key");
1448 keylen = req_capsule_get_size(pill, &RMF_SETINFO_KEY, RCL_CLIENT);
1450 if (KEY_IS(KEY_FIEMAP)) {
1451 struct ll_fiemap_info_key *fm_key = key;
1454 rc = ost_validate_obdo(exp, &fm_key->oa, NULL);
1459 rc = obd_get_info(exp, keylen, key, &replylen, NULL, NULL);
1463 req_capsule_set_size(pill, &RMF_GENERIC_DATA,
1464 RCL_SERVER, replylen);
1466 rc = req_capsule_server_pack(pill);
1470 reply = req_capsule_server_get(pill, &RMF_GENERIC_DATA);
1474 /* call again to fill in the reply buffer */
1475 rc = obd_get_info(exp, keylen, key, &replylen, reply, NULL);
1477 lustre_msg_set_status(req->rq_repmsg, 0);
1481 #ifdef HAVE_QUOTA_SUPPORT
1482 static int ost_handle_quotactl(struct ptlrpc_request *req)
1484 struct obd_quotactl *oqctl, *repoqc;
1488 oqctl = req_capsule_client_get(&req->rq_pill, &RMF_OBD_QUOTACTL);
1490 GOTO(out, rc = -EPROTO);
1492 rc = req_capsule_server_pack(&req->rq_pill);
1496 repoqc = req_capsule_server_get(&req->rq_pill, &RMF_OBD_QUOTACTL);
1497 req->rq_status = obd_quotactl(req->rq_export, oqctl);
1504 static int ost_handle_quotacheck(struct ptlrpc_request *req)
1506 struct obd_quotactl *oqctl;
1510 oqctl = req_capsule_client_get(&req->rq_pill, &RMF_OBD_QUOTACTL);
1514 rc = req_capsule_server_pack(&req->rq_pill);
1518 req->rq_status = obd_quotacheck(req->rq_export, oqctl);
1522 static int ost_handle_quota_adjust_qunit(struct ptlrpc_request *req)
1524 struct quota_adjust_qunit *oqaq, *repoqa;
1525 struct lustre_quota_ctxt *qctxt;
1529 qctxt = &req->rq_export->exp_obd->u.obt.obt_qctxt;
1530 oqaq = req_capsule_client_get(&req->rq_pill, &RMF_QUOTA_ADJUST_QUNIT);
1532 GOTO(out, rc = -EPROTO);
1534 rc = req_capsule_server_pack(&req->rq_pill);
1538 repoqa = req_capsule_server_get(&req->rq_pill, &RMF_QUOTA_ADJUST_QUNIT);
1539 req->rq_status = obd_quota_adjust_qunit(req->rq_export, oqaq, qctxt);
1547 static int ost_llog_handle_connect(struct obd_export *exp,
1548 struct ptlrpc_request *req)
1550 struct llogd_conn_body *body;
1554 body = req_capsule_client_get(&req->rq_pill, &RMF_LLOGD_CONN_BODY);
1555 rc = obd_llog_connect(exp, body);
1559 #define ost_init_sec_none(reply, exp) \
1561 reply->ocd_connect_flags &= ~(OBD_CONNECT_RMT_CLIENT | \
1562 OBD_CONNECT_RMT_CLIENT_FORCE | \
1563 OBD_CONNECT_OSS_CAPA); \
1564 cfs_spin_lock(&exp->exp_lock); \
1565 exp->exp_connect_flags = reply->ocd_connect_flags; \
1566 cfs_spin_unlock(&exp->exp_lock); \
1569 static int ost_init_sec_level(struct ptlrpc_request *req)
1571 struct obd_export *exp = req->rq_export;
1572 struct req_capsule *pill = &req->rq_pill;
1573 struct obd_device *obd = exp->exp_obd;
1574 struct filter_obd *filter = &obd->u.filter;
1575 char *client = libcfs_nid2str(req->rq_peer.nid);
1576 struct obd_connect_data *data, *reply;
1580 data = req_capsule_client_get(pill, &RMF_CONNECT_DATA);
1581 reply = req_capsule_server_get(pill, &RMF_CONNECT_DATA);
1582 if (data == NULL || reply == NULL)
1585 /* connection from MDT is always trusted */
1586 if (req->rq_auth_usr_mdt) {
1587 ost_init_sec_none(reply, exp);
1591 /* no GSS support case */
1592 if (!req->rq_auth_gss) {
1593 if (filter->fo_sec_level > LUSTRE_SEC_NONE) {
1594 CWARN("client %s -> target %s does not user GSS, "
1595 "can not run under security level %d.\n",
1596 client, obd->obd_name, filter->fo_sec_level);
1599 ost_init_sec_none(reply, exp);
1604 /* old version case */
1605 if (unlikely(!(data->ocd_connect_flags & OBD_CONNECT_RMT_CLIENT) ||
1606 !(data->ocd_connect_flags & OBD_CONNECT_OSS_CAPA))) {
1607 if (filter->fo_sec_level > LUSTRE_SEC_NONE) {
1608 CWARN("client %s -> target %s uses old version, "
1609 "can not run under security level %d.\n",
1610 client, obd->obd_name, filter->fo_sec_level);
1613 CWARN("client %s -> target %s uses old version, "
1614 "run under security level %d.\n",
1615 client, obd->obd_name, filter->fo_sec_level);
1616 ost_init_sec_none(reply, exp);
1621 remote = data->ocd_connect_flags & OBD_CONNECT_RMT_CLIENT_FORCE;
1623 if (!req->rq_auth_remote)
1624 CDEBUG(D_SEC, "client (local realm) %s -> target %s "
1625 "asked to be remote.\n", client, obd->obd_name);
1626 } else if (req->rq_auth_remote) {
1628 CDEBUG(D_SEC, "client (remote realm) %s -> target %s is set "
1629 "as remote by default.\n", client, obd->obd_name);
1633 if (!filter->fo_fl_oss_capa) {
1634 CDEBUG(D_SEC, "client %s -> target %s is set as remote,"
1635 " but OSS capabilities are not enabled: %d.\n",
1636 client, obd->obd_name, filter->fo_fl_oss_capa);
1641 switch (filter->fo_sec_level) {
1642 case LUSTRE_SEC_NONE:
1644 ost_init_sec_none(reply, exp);
1647 CDEBUG(D_SEC, "client %s -> target %s is set as remote, "
1648 "can not run under security level %d.\n",
1649 client, obd->obd_name, filter->fo_sec_level);
1652 case LUSTRE_SEC_REMOTE:
1654 ost_init_sec_none(reply, exp);
1656 case LUSTRE_SEC_ALL:
1658 reply->ocd_connect_flags &= ~(OBD_CONNECT_RMT_CLIENT |
1659 OBD_CONNECT_RMT_CLIENT_FORCE);
1660 if (!filter->fo_fl_oss_capa)
1661 reply->ocd_connect_flags &= ~OBD_CONNECT_OSS_CAPA;
1663 cfs_spin_lock(&exp->exp_lock);
1664 exp->exp_connect_flags = reply->ocd_connect_flags;
1665 cfs_spin_unlock(&exp->exp_lock);
1677 * this should be done in filter_connect()/filter_reconnect(), but
1678 * we can't obtain information like NID, which stored in incoming
1679 * request, thus can't decide what flavor to use. so we do it here.
1681 * This hack should be removed after the OST stack be rewritten, just
1682 * like what we are doing in mdt_obd_connect()/mdt_obd_reconnect().
1684 static int ost_connect_check_sptlrpc(struct ptlrpc_request *req)
1686 struct obd_export *exp = req->rq_export;
1687 struct filter_obd *filter = &exp->exp_obd->u.filter;
1688 struct sptlrpc_flavor flvr;
1691 if (unlikely(strcmp(exp->exp_obd->obd_type->typ_name,
1692 LUSTRE_ECHO_NAME) == 0)) {
1693 exp->exp_flvr.sf_rpc = SPTLRPC_FLVR_ANY;
1697 if (exp->exp_flvr.sf_rpc == SPTLRPC_FLVR_INVALID) {
1698 cfs_read_lock(&filter->fo_sptlrpc_lock);
1699 sptlrpc_target_choose_flavor(&filter->fo_sptlrpc_rset,
1703 cfs_read_unlock(&filter->fo_sptlrpc_lock);
1705 cfs_spin_lock(&exp->exp_lock);
1707 exp->exp_sp_peer = req->rq_sp_from;
1708 exp->exp_flvr = flvr;
1710 if (exp->exp_flvr.sf_rpc != SPTLRPC_FLVR_ANY &&
1711 exp->exp_flvr.sf_rpc != req->rq_flvr.sf_rpc) {
1712 CERROR("unauthorized rpc flavor %x from %s, "
1713 "expect %x\n", req->rq_flvr.sf_rpc,
1714 libcfs_nid2str(req->rq_peer.nid),
1715 exp->exp_flvr.sf_rpc);
1719 cfs_spin_unlock(&exp->exp_lock);
1721 if (exp->exp_sp_peer != req->rq_sp_from) {
1722 CERROR("RPC source %s doesn't match %s\n",
1723 sptlrpc_part2name(req->rq_sp_from),
1724 sptlrpc_part2name(exp->exp_sp_peer));
1727 rc = sptlrpc_target_export_check(exp, req);
1734 static int ost_filter_recovery_request(struct ptlrpc_request *req,
1735 struct obd_device *obd, int *process)
1737 switch (lustre_msg_get_opc(req->rq_reqmsg)) {
1738 case OST_CONNECT: /* This will never get here, but for completeness. */
1739 case OST_DISCONNECT:
1750 case OBD_LOG_CANCEL:
1752 *process = target_queue_recovery_request(req, obd);
1756 DEBUG_REQ(D_ERROR, req, "not permitted during recovery");
1762 int ost_msg_check_version(struct lustre_msg *msg)
1766 switch(lustre_msg_get_opc(msg)) {
1768 case OST_DISCONNECT:
1771 case SEC_CTX_INIT_CONT:
1773 rc = lustre_msg_check_version(msg, LUSTRE_OBD_VERSION);
1775 CERROR("bad opc %u version %08x, expecting %08x\n",
1776 lustre_msg_get_opc(msg),
1777 lustre_msg_get_version(msg),
1778 LUSTRE_OBD_VERSION);
1791 #ifdef HAVE_QUOTA_SUPPORT
1792 case OST_QUOTACHECK:
1794 case OST_QUOTA_ADJUST_QUNIT:
1796 rc = lustre_msg_check_version(msg, LUSTRE_OST_VERSION);
1798 CERROR("bad opc %u version %08x, expecting %08x\n",
1799 lustre_msg_get_opc(msg),
1800 lustre_msg_get_version(msg),
1801 LUSTRE_OST_VERSION);
1806 case LDLM_BL_CALLBACK:
1807 case LDLM_CP_CALLBACK:
1808 rc = lustre_msg_check_version(msg, LUSTRE_DLM_VERSION);
1810 CERROR("bad opc %u version %08x, expecting %08x\n",
1811 lustre_msg_get_opc(msg),
1812 lustre_msg_get_version(msg),
1813 LUSTRE_DLM_VERSION);
1815 case LLOG_ORIGIN_CONNECT:
1816 case OBD_LOG_CANCEL:
1817 rc = lustre_msg_check_version(msg, LUSTRE_LOG_VERSION);
1819 CERROR("bad opc %u version %08x, expecting %08x\n",
1820 lustre_msg_get_opc(msg),
1821 lustre_msg_get_version(msg),
1822 LUSTRE_LOG_VERSION);
1825 CERROR("Unexpected opcode %d\n", lustre_msg_get_opc(msg));
1832 * Returns 1 if the given PTLRPC matches the given LDLM locks, or 0 if it does
1835 static int ost_rw_hpreq_lock_match(struct ptlrpc_request *req,
1836 struct ldlm_lock *lock)
1838 struct niobuf_remote *nb;
1839 struct obd_ioobj *ioo;
1840 struct ost_body *body;
1841 int objcount, niocount;
1842 int mode, opc, i, rc;
1846 opc = lustre_msg_get_opc(req->rq_reqmsg);
1847 LASSERT(opc == OST_READ || opc == OST_WRITE);
1849 /* As the request may be covered by several locks, do not look at
1850 * o_handle, look at the RPC IO region. */
1851 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
1855 objcount = req_capsule_get_size(&req->rq_pill, &RMF_OBD_IOOBJ,
1856 RCL_CLIENT) / sizeof(*ioo);
1857 ioo = req_capsule_client_get(&req->rq_pill, &RMF_OBD_IOOBJ);
1861 rc = ost_validate_obdo(req->rq_export, &body->oa, ioo);
1865 for (niocount = i = 0; i < objcount; i++)
1866 niocount += ioo[i].ioo_bufcnt;
1868 nb = req_capsule_client_get(&req->rq_pill, &RMF_NIOBUF_REMOTE);
1870 niocount != (req_capsule_get_size(&req->rq_pill, &RMF_NIOBUF_REMOTE,
1871 RCL_CLIENT) / sizeof(*nb)))
1875 if (opc == OST_READ)
1878 start = nb[0].offset & CFS_PAGE_MASK;
1879 end = (nb[ioo->ioo_bufcnt - 1].offset +
1880 nb[ioo->ioo_bufcnt - 1].len - 1) | ~CFS_PAGE_MASK;
1882 LASSERT(lock->l_resource != NULL);
1883 if (!osc_res_name_eq(ioo->ioo_id, ioo->ioo_seq,
1884 &lock->l_resource->lr_name))
1887 if (!(lock->l_granted_mode & mode))
1890 if (lock->l_policy_data.l_extent.end < start ||
1891 lock->l_policy_data.l_extent.start > end)
1898 * High-priority queue request check for whether the given PTLRPC request (\a
1899 * req) is blocking an LDLM lock cancel.
1901 * Returns 1 if the given given PTLRPC request (\a req) is blocking an LDLM lock
1902 * cancel, 0 if it is not, and -EFAULT if the request is malformed.
1904 * Only OST_READs, OST_WRITEs and OST_PUNCHes go on the h-p RPC queue. This
1905 * function looks only at OST_READs and OST_WRITEs.
1907 static int ost_rw_hpreq_check(struct ptlrpc_request *req)
1909 struct niobuf_remote *nb;
1910 struct obd_ioobj *ioo;
1911 struct ost_body *body;
1912 int objcount, niocount;
1913 int mode, opc, i, rc;
1916 opc = lustre_msg_get_opc(req->rq_reqmsg);
1917 LASSERT(opc == OST_READ || opc == OST_WRITE);
1919 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
1923 objcount = req_capsule_get_size(&req->rq_pill, &RMF_OBD_IOOBJ,
1924 RCL_CLIENT) / sizeof(*ioo);
1925 ioo = req_capsule_client_get(&req->rq_pill, &RMF_OBD_IOOBJ);
1929 rc = ost_validate_obdo(req->rq_export, &body->oa, ioo);
1933 for (niocount = i = 0; i < objcount; i++)
1934 niocount += ioo[i].ioo_bufcnt;
1935 nb = req_capsule_client_get(&req->rq_pill, &RMF_NIOBUF_REMOTE);
1937 niocount != (req_capsule_get_size(&req->rq_pill, &RMF_NIOBUF_REMOTE,
1938 RCL_CLIENT) / sizeof(*nb)))
1940 if (niocount != 0 && (nb[0].flags & OBD_BRW_SRVLOCK))
1944 if (opc == OST_READ)
1946 RETURN(ost_rw_prolong_locks(req, ioo, nb, &body->oa, mode));
1949 static int ost_punch_prolong_locks(struct ptlrpc_request *req, struct obdo *oa)
1951 struct ldlm_res_id res_id = { .name = { oa->o_id } };
1952 struct ost_prolong_data opd = { 0 };
1957 end = start + oa->o_blocks;
1959 opd.opd_mode = LCK_PW;
1960 opd.opd_exp = req->rq_export;
1961 opd.opd_policy.l_extent.start = start & CFS_PAGE_MASK;
1962 if (oa->o_blocks == OBD_OBJECT_EOF || end < start)
1963 opd.opd_policy.l_extent.end = OBD_OBJECT_EOF;
1965 opd.opd_policy.l_extent.end = end | ~CFS_PAGE_MASK;
1967 /* prolong locks for the current service time of the corresponding
1968 * portal (= OST_IO_PORTAL) */
1969 opd.opd_timeout = AT_OFF ? obd_timeout / 2:
1970 max(at_est2timeout(at_get(&req->rq_rqbd->
1971 rqbd_service->srv_at_estimate)), ldlm_timeout);
1973 CDEBUG(D_DLMTRACE,"refresh locks: "LPU64"/"LPU64" ("LPU64"->"LPU64")\n",
1974 res_id.name[0], res_id.name[1], opd.opd_policy.l_extent.start,
1975 opd.opd_policy.l_extent.end);
1978 ldlm_resource_iterate(req->rq_export->exp_obd->obd_namespace, &res_id,
1979 ost_prolong_locks_iter, &opd);
1980 RETURN(opd.opd_lock_match);
1984 * Like ost_rw_hpreq_lock_match(), but for OST_PUNCH RPCs.
1986 static int ost_punch_hpreq_lock_match(struct ptlrpc_request *req,
1987 struct ldlm_lock *lock)
1989 struct ost_body *body;
1993 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
1995 RETURN(0); /* can't return -EFAULT here */
1997 rc = ost_validate_obdo(req->rq_export, &body->oa, NULL);
2001 if (body->oa.o_valid & OBD_MD_FLHANDLE &&
2002 body->oa.o_handle.cookie == lock->l_handle.h_cookie)
2008 * Like ost_rw_hpreq_check(), but for OST_PUNCH RPCs.
2010 static int ost_punch_hpreq_check(struct ptlrpc_request *req)
2012 struct ost_body *body;
2015 body = req_capsule_client_get(&req->rq_pill, &RMF_OST_BODY);
2019 rc = ost_validate_obdo(req->rq_export, &body->oa, NULL);
2023 LASSERT(!(body->oa.o_valid & OBD_MD_FLFLAGS) ||
2024 !(body->oa.o_flags & OBD_FL_SRVLOCK));
2026 RETURN(ost_punch_prolong_locks(req, &body->oa));
2029 struct ptlrpc_hpreq_ops ost_hpreq_rw = {
2030 .hpreq_lock_match = ost_rw_hpreq_lock_match,
2031 .hpreq_check = ost_rw_hpreq_check,
2034 struct ptlrpc_hpreq_ops ost_hpreq_punch = {
2035 .hpreq_lock_match = ost_punch_hpreq_lock_match,
2036 .hpreq_check = ost_punch_hpreq_check,
2039 /** Assign high priority operations to the request if needed. */
2040 static int ost_hpreq_handler(struct ptlrpc_request *req)
2043 if (req->rq_export) {
2044 int opc = lustre_msg_get_opc(req->rq_reqmsg);
2045 struct ost_body *body;
2047 if (opc == OST_READ || opc == OST_WRITE) {
2048 struct niobuf_remote *nb;
2049 struct obd_ioobj *ioo;
2050 int objcount, niocount;
2053 /* RPCs on the H-P queue can be inspected before
2054 * ost_handler() initializes their pills, so we
2055 * initialize that here. Capsule initialization is
2056 * idempotent, as is setting the pill's format (provided
2057 * it doesn't change).
2059 req_capsule_init(&req->rq_pill, req, RCL_SERVER);
2060 if (opc == OST_READ)
2061 req_capsule_set(&req->rq_pill,
2064 req_capsule_set(&req->rq_pill,
2065 &RQF_OST_BRW_WRITE);
2067 body = req_capsule_client_get(&req->rq_pill,
2070 CERROR("Missing/short ost_body\n");
2074 objcount = req_capsule_get_size(&req->rq_pill,
2078 if (objcount == 0) {
2079 CERROR("Missing/short ioobj\n");
2083 CERROR("too many ioobjs (%d)\n", objcount);
2087 ioo = req_capsule_client_get(&req->rq_pill,
2090 CERROR("Missing/short ioobj\n");
2094 for (niocount = i = 0; i < objcount; i++) {
2095 if (ioo[i].ioo_bufcnt == 0) {
2096 CERROR("ioo[%d] has zero bufcnt\n", i);
2099 niocount += ioo[i].ioo_bufcnt;
2101 if (niocount > PTLRPC_MAX_BRW_PAGES) {
2102 DEBUG_REQ(D_RPCTRACE, req,
2103 "bulk has too many pages (%d)",
2108 nb = req_capsule_client_get(&req->rq_pill,
2109 &RMF_NIOBUF_REMOTE);
2111 CERROR("Missing/short niobuf\n");
2115 if (niocount == 0 || !(nb[0].flags & OBD_BRW_SRVLOCK))
2116 req->rq_ops = &ost_hpreq_rw;
2117 } else if (opc == OST_PUNCH) {
2118 req_capsule_init(&req->rq_pill, req, RCL_SERVER);
2119 req_capsule_set(&req->rq_pill, &RQF_OST_PUNCH);
2121 body = req_capsule_client_get(&req->rq_pill,
2124 CERROR("Missing/short ost_body\n");
2128 if (!(body->oa.o_valid & OBD_MD_FLFLAGS) ||
2129 !(body->oa.o_flags & OBD_FL_SRVLOCK))
2130 req->rq_ops = &ost_hpreq_punch;
2136 /* TODO: handle requests in a similar way as MDT: see mdt_handle_common() */
2137 int ost_handle(struct ptlrpc_request *req)
2139 struct obd_trans_info trans_info = { 0, };
2140 struct obd_trans_info *oti = &trans_info;
2141 int should_process, fail = OBD_FAIL_OST_ALL_REPLY_NET, rc = 0;
2142 struct obd_device *obd = NULL;
2145 LASSERT(current->journal_info == NULL);
2147 /* primordial rpcs don't affect server recovery */
2148 switch (lustre_msg_get_opc(req->rq_reqmsg)) {
2150 case SEC_CTX_INIT_CONT:
2155 req_capsule_init(&req->rq_pill, req, RCL_SERVER);
2157 if (lustre_msg_get_opc(req->rq_reqmsg) != OST_CONNECT) {
2158 if (!class_connected_export(req->rq_export)) {
2159 CDEBUG(D_HA,"operation %d on unconnected OST from %s\n",
2160 lustre_msg_get_opc(req->rq_reqmsg),
2161 libcfs_id2str(req->rq_peer));
2162 req->rq_status = -ENOTCONN;
2163 GOTO(out, rc = -ENOTCONN);
2166 obd = req->rq_export->exp_obd;
2168 /* Check for aborted recovery. */
2169 if (obd->obd_recovering) {
2170 rc = ost_filter_recovery_request(req, obd,
2172 if (rc || !should_process)
2174 else if (should_process < 0) {
2175 req->rq_status = should_process;
2176 rc = ptlrpc_error(req);
2184 rc = ost_msg_check_version(req->rq_reqmsg);
2188 switch (lustre_msg_get_opc(req->rq_reqmsg)) {
2190 CDEBUG(D_INODE, "connect\n");
2191 req_capsule_set(&req->rq_pill, &RQF_OST_CONNECT);
2192 if (OBD_FAIL_CHECK(OBD_FAIL_OST_CONNECT_NET))
2194 rc = target_handle_connect(req);
2195 if (OBD_FAIL_CHECK(OBD_FAIL_OST_CONNECT_NET2))
2198 rc = ost_init_sec_level(req);
2200 rc = ost_connect_check_sptlrpc(req);
2204 case OST_DISCONNECT:
2205 CDEBUG(D_INODE, "disconnect\n");
2206 req_capsule_set(&req->rq_pill, &RQF_OST_DISCONNECT);
2207 if (OBD_FAIL_CHECK(OBD_FAIL_OST_DISCONNECT_NET))
2209 rc = target_handle_disconnect(req);
2212 CDEBUG(D_INODE, "create\n");
2213 req_capsule_set(&req->rq_pill, &RQF_OST_CREATE);
2214 if (OBD_FAIL_CHECK(OBD_FAIL_OST_CREATE_NET))
2216 if (OBD_FAIL_CHECK(OBD_FAIL_OST_EROFS))
2217 GOTO(out, rc = -EROFS);
2218 rc = ost_create(req->rq_export, req, oti);
2221 CDEBUG(D_INODE, "destroy\n");
2222 req_capsule_set(&req->rq_pill, &RQF_OST_DESTROY);
2223 if (OBD_FAIL_CHECK(OBD_FAIL_OST_DESTROY_NET))
2225 if (OBD_FAIL_CHECK(OBD_FAIL_OST_EROFS))
2226 GOTO(out, rc = -EROFS);
2227 rc = ost_destroy(req->rq_export, req, oti);
2230 CDEBUG(D_INODE, "getattr\n");
2231 req_capsule_set(&req->rq_pill, &RQF_OST_GETATTR);
2232 if (OBD_FAIL_CHECK(OBD_FAIL_OST_GETATTR_NET))
2234 rc = ost_getattr(req->rq_export, req);
2237 CDEBUG(D_INODE, "setattr\n");
2238 req_capsule_set(&req->rq_pill, &RQF_OST_SETATTR);
2239 if (OBD_FAIL_CHECK(OBD_FAIL_OST_SETATTR_NET))
2241 rc = ost_setattr(req->rq_export, req, oti);
2244 req_capsule_set(&req->rq_pill, &RQF_OST_BRW_WRITE);
2245 CDEBUG(D_INODE, "write\n");
2246 /* req->rq_request_portal would be nice, if it was set */
2247 if (req->rq_rqbd->rqbd_service->srv_req_portal !=OST_IO_PORTAL){
2248 CERROR("%s: deny write request from %s to portal %u\n",
2249 req->rq_export->exp_obd->obd_name,
2250 obd_export_nid2str(req->rq_export),
2251 req->rq_rqbd->rqbd_service->srv_req_portal);
2252 GOTO(out, rc = -EPROTO);
2254 if (OBD_FAIL_CHECK(OBD_FAIL_OST_BRW_NET))
2256 if (OBD_FAIL_CHECK(OBD_FAIL_OST_ENOSPC))
2257 GOTO(out, rc = -ENOSPC);
2258 if (OBD_FAIL_CHECK(OBD_FAIL_OST_EROFS))
2259 GOTO(out, rc = -EROFS);
2260 rc = ost_brw_write(req, oti);
2261 LASSERT(current->journal_info == NULL);
2262 /* ost_brw_write sends its own replies */
2265 req_capsule_set(&req->rq_pill, &RQF_OST_BRW_READ);
2266 CDEBUG(D_INODE, "read\n");
2267 /* req->rq_request_portal would be nice, if it was set */
2268 if (req->rq_rqbd->rqbd_service->srv_req_portal !=OST_IO_PORTAL){
2269 CERROR("%s: deny read request from %s to portal %u\n",
2270 req->rq_export->exp_obd->obd_name,
2271 obd_export_nid2str(req->rq_export),
2272 req->rq_rqbd->rqbd_service->srv_req_portal);
2273 GOTO(out, rc = -EPROTO);
2275 if (OBD_FAIL_CHECK(OBD_FAIL_OST_BRW_NET))
2277 rc = ost_brw_read(req, oti);
2278 LASSERT(current->journal_info == NULL);
2279 /* ost_brw_read sends its own replies */
2282 CDEBUG(D_INODE, "punch\n");
2283 req_capsule_set(&req->rq_pill, &RQF_OST_PUNCH);
2284 if (OBD_FAIL_CHECK(OBD_FAIL_OST_PUNCH_NET))
2286 if (OBD_FAIL_CHECK(OBD_FAIL_OST_EROFS))
2287 GOTO(out, rc = -EROFS);
2288 rc = ost_punch(req->rq_export, req, oti);
2291 CDEBUG(D_INODE, "statfs\n");
2292 req_capsule_set(&req->rq_pill, &RQF_OST_STATFS);
2293 if (OBD_FAIL_CHECK(OBD_FAIL_OST_STATFS_NET))
2295 rc = ost_statfs(req);
2298 CDEBUG(D_INODE, "sync\n");
2299 req_capsule_set(&req->rq_pill, &RQF_OST_SYNC);
2300 if (OBD_FAIL_CHECK(OBD_FAIL_OST_SYNC_NET))
2302 rc = ost_sync(req->rq_export, req);
2305 DEBUG_REQ(D_INODE, req, "set_info");
2306 req_capsule_set(&req->rq_pill, &RQF_OBD_SET_INFO);
2307 rc = ost_set_info(req->rq_export, req);
2310 DEBUG_REQ(D_INODE, req, "get_info");
2311 req_capsule_set(&req->rq_pill, &RQF_OST_GET_INFO_GENERIC);
2312 rc = ost_get_info(req->rq_export, req);
2314 #ifdef HAVE_QUOTA_SUPPORT
2315 case OST_QUOTACHECK:
2316 CDEBUG(D_INODE, "quotacheck\n");
2317 req_capsule_set(&req->rq_pill, &RQF_OST_QUOTACHECK);
2318 if (OBD_FAIL_CHECK(OBD_FAIL_OST_QUOTACHECK_NET))
2320 rc = ost_handle_quotacheck(req);
2323 CDEBUG(D_INODE, "quotactl\n");
2324 req_capsule_set(&req->rq_pill, &RQF_OST_QUOTACTL);
2325 if (OBD_FAIL_CHECK(OBD_FAIL_OST_QUOTACTL_NET))
2327 rc = ost_handle_quotactl(req);
2329 case OST_QUOTA_ADJUST_QUNIT:
2330 CDEBUG(D_INODE, "quota_adjust_qunit\n");
2331 req_capsule_set(&req->rq_pill, &RQF_OST_QUOTA_ADJUST_QUNIT);
2332 rc = ost_handle_quota_adjust_qunit(req);
2336 DEBUG_REQ(D_INODE, req, "ping");
2337 req_capsule_set(&req->rq_pill, &RQF_OBD_PING);
2338 rc = target_handle_ping(req);
2340 /* FIXME - just reply status */
2341 case LLOG_ORIGIN_CONNECT:
2342 DEBUG_REQ(D_INODE, req, "log connect");
2343 req_capsule_set(&req->rq_pill, &RQF_LLOG_ORIGIN_CONNECT);
2344 rc = ost_llog_handle_connect(req->rq_export, req);
2345 req->rq_status = rc;
2346 rc = req_capsule_server_pack(&req->rq_pill);
2349 RETURN(ptlrpc_reply(req));
2350 case OBD_LOG_CANCEL:
2351 CDEBUG(D_INODE, "log cancel\n");
2352 req_capsule_set(&req->rq_pill, &RQF_LOG_CANCEL);
2353 if (OBD_FAIL_CHECK(OBD_FAIL_OBD_LOG_CANCEL_NET))
2355 rc = llog_origin_handle_cancel(req);
2356 if (OBD_FAIL_CHECK(OBD_FAIL_OBD_LOG_CANCEL_REP))
2358 req->rq_status = rc;
2359 rc = req_capsule_server_pack(&req->rq_pill);
2362 RETURN(ptlrpc_reply(req));
2364 CDEBUG(D_INODE, "enqueue\n");
2365 req_capsule_set(&req->rq_pill, &RQF_LDLM_ENQUEUE);
2366 if (OBD_FAIL_CHECK(OBD_FAIL_LDLM_ENQUEUE))
2368 rc = ldlm_handle_enqueue(req, ldlm_server_completion_ast,
2369 ldlm_server_blocking_ast,
2370 ldlm_server_glimpse_ast);
2371 fail = OBD_FAIL_OST_LDLM_REPLY_NET;
2374 CDEBUG(D_INODE, "convert\n");
2375 req_capsule_set(&req->rq_pill, &RQF_LDLM_CONVERT);
2376 if (OBD_FAIL_CHECK(OBD_FAIL_LDLM_CONVERT))
2378 rc = ldlm_handle_convert(req);
2381 CDEBUG(D_INODE, "cancel\n");
2382 req_capsule_set(&req->rq_pill, &RQF_LDLM_CANCEL);
2383 if (OBD_FAIL_CHECK(OBD_FAIL_LDLM_CANCEL))
2385 rc = ldlm_handle_cancel(req);
2387 case LDLM_BL_CALLBACK:
2388 case LDLM_CP_CALLBACK:
2389 CDEBUG(D_INODE, "callback\n");
2390 CERROR("callbacks should not happen on OST\n");
2393 CERROR("Unexpected opcode %d\n",
2394 lustre_msg_get_opc(req->rq_reqmsg));
2395 req->rq_status = -ENOTSUPP;
2396 rc = ptlrpc_error(req);
2400 LASSERT(current->journal_info == NULL);
2403 /* If we're DISCONNECTing, the export_data is already freed */
2404 if (!rc && lustre_msg_get_opc(req->rq_reqmsg) != OST_DISCONNECT)
2405 target_committed_to_req(req);
2409 oti_to_request(oti, req);
2411 target_send_reply(req, rc, fail);
2414 EXPORT_SYMBOL(ost_handle);
2416 * free per-thread pool created by ost_thread_init().
2418 static void ost_thread_done(struct ptlrpc_thread *thread)
2420 struct ost_thread_local_cache *tls; /* TLS stands for Thread-Local
2425 LASSERT(thread != NULL);
2428 * be prepared to handle partially-initialized pools (because this is
2429 * called from ost_thread_init() for cleanup.
2431 tls = thread->t_data;
2434 thread->t_data = NULL;
2440 * initialize per-thread page pool (bug 5137).
2442 static int ost_thread_init(struct ptlrpc_thread *thread)
2444 struct ost_thread_local_cache *tls;
2448 LASSERT(thread != NULL);
2449 LASSERT(thread->t_data == NULL);
2450 LASSERTF(thread->t_id <= OSS_THREADS_MAX, "%u\n", thread->t_id);
2455 thread->t_data = tls;
2459 #define OST_WATCHDOG_TIMEOUT (obd_timeout * 1000)
2461 /* Sigh - really, this is an OSS, the _server_, not the _target_ */
2462 static int ost_setup(struct obd_device *obd, struct lustre_cfg* lcfg)
2464 struct ost_obd *ost = &obd->u.ost;
2465 struct lprocfs_static_vars lvars;
2466 int oss_min_threads;
2467 int oss_max_threads;
2468 int oss_min_create_threads;
2469 int oss_max_create_threads;
2473 rc = cfs_cleanup_group_info();
2477 lprocfs_ost_init_vars(&lvars);
2478 lprocfs_obd_setup(obd, lvars.obd_vars);
2480 cfs_sema_init(&ost->ost_health_sem, 1);
2482 if (oss_num_threads) {
2483 /* If oss_num_threads is set, it is the min and the max. */
2484 if (oss_num_threads > OSS_THREADS_MAX)
2485 oss_num_threads = OSS_THREADS_MAX;
2486 if (oss_num_threads < OSS_THREADS_MIN)
2487 oss_num_threads = OSS_THREADS_MIN;
2488 oss_max_threads = oss_min_threads = oss_num_threads;
2490 /* Base min threads on memory and cpus */
2492 cfs_num_possible_cpus() * CFS_NUM_CACHEPAGES >>
2493 (27 - CFS_PAGE_SHIFT);
2494 if (oss_min_threads < OSS_THREADS_MIN)
2495 oss_min_threads = OSS_THREADS_MIN;
2496 /* Insure a 4x range for dynamic threads */
2497 if (oss_min_threads > OSS_THREADS_MAX / 4)
2498 oss_min_threads = OSS_THREADS_MAX / 4;
2499 oss_max_threads = min(OSS_THREADS_MAX, oss_min_threads * 4 + 1);
2503 ptlrpc_init_svc(OST_NBUFS, OST_BUFSIZE, OST_MAXREQSIZE,
2504 OST_MAXREPSIZE, OST_REQUEST_PORTAL,
2505 OSC_REPLY_PORTAL, OSS_SERVICE_WATCHDOG_FACTOR,
2506 ost_handle, LUSTRE_OSS_NAME,
2507 obd->obd_proc_entry, target_print_req,
2508 oss_min_threads, oss_max_threads,
2509 "ll_ost", LCT_DT_THREAD, NULL);
2510 if (ost->ost_service == NULL) {
2511 CERROR("failed to start service\n");
2512 GOTO(out_lprocfs, rc = -ENOMEM);
2515 rc = ptlrpc_start_threads(obd, ost->ost_service);
2517 GOTO(out_service, rc = -EINVAL);
2519 if (oss_num_create_threads) {
2520 if (oss_num_create_threads > OSS_MAX_CREATE_THREADS)
2521 oss_num_create_threads = OSS_MAX_CREATE_THREADS;
2522 if (oss_num_create_threads < OSS_MIN_CREATE_THREADS)
2523 oss_num_create_threads = OSS_MIN_CREATE_THREADS;
2524 oss_min_create_threads = oss_max_create_threads =
2525 oss_num_create_threads;
2527 oss_min_create_threads = OSS_MIN_CREATE_THREADS;
2528 oss_max_create_threads = OSS_MAX_CREATE_THREADS;
2531 ost->ost_create_service =
2532 ptlrpc_init_svc(OST_NBUFS, OST_BUFSIZE, OST_MAXREQSIZE,
2533 OST_MAXREPSIZE, OST_CREATE_PORTAL,
2534 OSC_REPLY_PORTAL, OSS_SERVICE_WATCHDOG_FACTOR,
2535 ost_handle, "ost_create",
2536 obd->obd_proc_entry, target_print_req,
2537 oss_min_create_threads, oss_max_create_threads,
2538 "ll_ost_creat", LCT_DT_THREAD, NULL);
2539 if (ost->ost_create_service == NULL) {
2540 CERROR("failed to start OST create service\n");
2541 GOTO(out_service, rc = -ENOMEM);
2544 rc = ptlrpc_start_threads(obd, ost->ost_create_service);
2546 GOTO(out_create, rc = -EINVAL);
2548 ost->ost_io_service =
2549 ptlrpc_init_svc(OST_NBUFS, OST_BUFSIZE, OST_MAXREQSIZE,
2550 OST_MAXREPSIZE, OST_IO_PORTAL,
2551 OSC_REPLY_PORTAL, OSS_SERVICE_WATCHDOG_FACTOR,
2552 ost_handle, "ost_io",
2553 obd->obd_proc_entry, target_print_req,
2554 oss_min_threads, oss_max_threads,
2555 "ll_ost_io", LCT_DT_THREAD, ost_hpreq_handler);
2556 if (ost->ost_io_service == NULL) {
2557 CERROR("failed to start OST I/O service\n");
2558 GOTO(out_create, rc = -ENOMEM);
2561 ost->ost_io_service->srv_init = ost_thread_init;
2562 ost->ost_io_service->srv_done = ost_thread_done;
2563 ost->ost_io_service->srv_cpu_affinity = 1;
2564 rc = ptlrpc_start_threads(obd, ost->ost_io_service);
2566 GOTO(out_io, rc = -EINVAL);
2568 ping_evictor_start();
2573 ptlrpc_unregister_service(ost->ost_io_service);
2574 ost->ost_io_service = NULL;
2576 ptlrpc_unregister_service(ost->ost_create_service);
2577 ost->ost_create_service = NULL;
2579 ptlrpc_unregister_service(ost->ost_service);
2580 ost->ost_service = NULL;
2582 lprocfs_obd_cleanup(obd);
2586 static int ost_cleanup(struct obd_device *obd)
2588 struct ost_obd *ost = &obd->u.ost;
2592 ping_evictor_stop();
2594 cfs_spin_lock_bh(&obd->obd_processing_task_lock);
2595 if (obd->obd_recovering) {
2596 target_cancel_recovery_timer(obd);
2597 obd->obd_recovering = 0;
2599 cfs_spin_unlock_bh(&obd->obd_processing_task_lock);
2601 cfs_down(&ost->ost_health_sem);
2602 ptlrpc_unregister_service(ost->ost_service);
2603 ptlrpc_unregister_service(ost->ost_create_service);
2604 ptlrpc_unregister_service(ost->ost_io_service);
2605 ost->ost_service = NULL;
2606 ost->ost_create_service = NULL;
2607 cfs_up(&ost->ost_health_sem);
2609 lprocfs_obd_cleanup(obd);
2614 static int ost_health_check(struct obd_device *obd)
2616 struct ost_obd *ost = &obd->u.ost;
2619 cfs_down(&ost->ost_health_sem);
2620 rc |= ptlrpc_service_health_check(ost->ost_service);
2621 rc |= ptlrpc_service_health_check(ost->ost_create_service);
2622 rc |= ptlrpc_service_health_check(ost->ost_io_service);
2623 cfs_up(&ost->ost_health_sem);
2626 * health_check to return 0 on healthy
2627 * and 1 on unhealthy.
2635 struct ost_thread_local_cache *ost_tls(struct ptlrpc_request *r)
2637 return (struct ost_thread_local_cache *)(r->rq_svc_thread->t_data);
2640 /* use obd ops to offer management infrastructure */
2641 static struct obd_ops ost_obd_ops = {
2642 .o_owner = THIS_MODULE,
2643 .o_setup = ost_setup,
2644 .o_cleanup = ost_cleanup,
2645 .o_health_check = ost_health_check,
2649 static int __init ost_init(void)
2651 struct lprocfs_static_vars lvars;
2655 lprocfs_ost_init_vars(&lvars);
2656 rc = class_register_type(&ost_obd_ops, NULL, lvars.module_vars,
2657 LUSTRE_OSS_NAME, NULL);
2659 if (ost_num_threads != 0 && oss_num_threads == 0) {
2660 LCONSOLE_INFO("ost_num_threads module parameter is deprecated, "
2661 "use oss_num_threads instead or unset both for "
2662 "dynamic thread startup\n");
2663 oss_num_threads = ost_num_threads;
2669 static void /*__exit*/ ost_exit(void)
2671 class_unregister_type(LUSTRE_OSS_NAME);
2674 MODULE_AUTHOR("Sun Microsystems, Inc. <http://www.lustre.org/>");
2675 MODULE_DESCRIPTION("Lustre Object Storage Target (OST) v0.01");
2676 MODULE_LICENSE("GPL");
2678 module_init(ost_init);
2679 module_exit(ost_exit);