X-Git-Url: https://git.whamcloud.com/gitweb?a=blobdiff_plain;f=lustre%2Flfsck%2Flfsck_internal.h;h=a4aa737b40262124d91e21e52658933538ffbfdd;hb=2b294992edce5af7b79d4300ed3aa1ea6a8db850;hp=e24acd3983f0c5851be2c3ef49ccf285fa63843e;hpb=d35997e6e100acca3effb75ca402c9df7f6252ef;p=fs%2Flustre-release.git diff --git a/lustre/lfsck/lfsck_internal.h b/lustre/lfsck/lfsck_internal.h index e24acd3..a4aa737 100644 --- a/lustre/lfsck/lfsck_internal.h +++ b/lustre/lfsck/lfsck_internal.h @@ -20,7 +20,7 @@ * GPL HEADER END */ /* - * Copyright (c) 2013, Intel Corporation. + * Copyright (c) 2013, 2014, Intel Corporation. */ /* * lustre/lfsck/lfsck_internal.h @@ -47,7 +47,7 @@ #include #include -#define HALF_SEC (HZ >> 1) +#define HALF_SEC msecs_to_jiffies(MSEC_PER_SEC >> 1) #define LFSCK_CHECKPOINT_INTERVAL 60 enum lfsck_flags { @@ -111,6 +111,10 @@ struct lfsck_bookmark { enum lfsck_namespace_trace_flags { LNTF_CHECK_LINKEA = 0x01, LNTF_CHECK_PARENT = 0x02, + LNTF_SKIP_NLINK = 0x04, + LNTF_CHECK_ORPHAN = 0x08, + LNTF_UNCERTAIN_LMV = 0x10, + LNTF_RECHECK_NAME_HASH = 0x20, LNTF_ALL = 0xff }; @@ -118,6 +122,10 @@ enum lfsck_namespace_inconsistency_type { LNIT_NONE = 0, LNIT_BAD_LINKEA = 1, LNIT_UNMATCHED_PAIRS = 2, + LNIT_DANGLING = 3, + LNIT_MUL_REF = 4, + LNIT_BAD_TYPE = 5, + LNIT_BAD_DIRENT = 6, }; struct lfsck_namespace { @@ -181,9 +189,6 @@ struct lfsck_namespace { /* How many objects with nlink fixed. */ __u64 ln_objs_nlink_repaired; - /* How many objects were lost before, but found back now. */ - __u64 ln_objs_lost_found; - /* The latest object has been processed (failed) during double scan. */ struct lu_fid ln_fid_latest_scanned_phase2; @@ -205,8 +210,73 @@ struct lfsck_namespace { /* How many unmatched pairs have been repaired. */ __u64 ln_unmatched_pairs_repaired; + /* How many dangling name entries have been found/repaired. */ + __u64 ln_dangling_repaired; + + /* How many multiple referenced name entries have been + * found/repaired. */ + __u64 ln_mul_ref_repaired; + + /* How many name entries with bad file type have been repaired. */ + __u64 ln_bad_type_repaired; + + /* How many lost name entries have been re-inserted. */ + __u64 ln_lost_dirent_repaired; + + /* How many objects under /lost+found have been scanned. */ + __u64 ln_local_lpf_scanned; + + /* How many objects under /lost+found have been moved to + * namespace visible directory. */ + __u64 ln_local_lpf_moved; + + /* How many objects under /lost+found have been skipped. */ + __u64 ln_local_lpf_skipped; + + /* How many objects under /lost+found failed to be processed. */ + __u64 ln_local_lpf_failed; + + /* How many striped directories (master) have been scanned. */ + __u64 ln_striped_dirs_scanned; + + /* How many striped directories (master) have been repaired. */ + __u64 ln_striped_dirs_repaired; + + /* How many striped directories (master) failed verification. */ + __u64 ln_striped_dirs_failed; + + /* How many striped directories (master) has been disabled. */ + __u64 ln_striped_dirs_disabled; + + /* How many striped directory's (master) have been skipped + * (for shards verification) because of lost master LMV EA. */ + __u64 ln_striped_dirs_skipped; + + /* How many striped directory's shards (slave) have been scanned. */ + __u64 ln_striped_shards_scanned; + + /* How many striped directory's shards (slave) have been repaired. */ + __u64 ln_striped_shards_repaired; + + /* How many striped directory's shards (slave) failed verification. */ + __u64 ln_striped_shards_failed; + + /* How many striped directory's shards (slave) have been skipped + * (for name hash verification) because do not know whether the slave + * LMV EA is valid or not. */ + __u64 ln_striped_shards_skipped; + + /* How many name entries under striped directory with bad name + * hash have been repaired. */ + __u64 ln_name_hash_repaired; + + /* The size of MDT targets bitmap with nbits. Such bitmap records + * the MDTs that contain non-verified MDT-objects. */ + __u32 ln_bitmap_size; + + __u32 ln_reserved_1; /* For further using. 256-bytes aligned now. */ - __u64 ln_reserved[29]; + __u64 ln_reserved[15]; }; enum lfsck_layout_inconsistency_type { @@ -303,6 +373,12 @@ struct lfsck_operations { struct lfsck_component *com, bool new_checked); + void (*lfsck_close_dir)(const struct lu_env *env, + struct lfsck_component *com); + + int (*lfsck_open_dir)(const struct lu_env *env, + struct lfsck_component *com); + int (*lfsck_checkpoint)(const struct lu_env *env, struct lfsck_component *com, bool init); @@ -340,7 +416,8 @@ struct lfsck_operations { int (*lfsck_in_notify)(const struct lu_env *env, struct lfsck_component *com, - struct lfsck_request *lr); + struct lfsck_request *lr, + struct thandle *th); int (*lfsck_query)(const struct lu_env *env, struct lfsck_component *com); @@ -368,7 +445,8 @@ struct lfsck_tgt_desc { __u32 ltd_namespace_gen; unsigned int ltd_dead:1, ltd_layout_done:1, - ltd_namespace_done:1; + ltd_namespace_done:1, + ltd_namespace_failed:1; }; struct lfsck_tgt_desc_idx { @@ -438,6 +516,75 @@ struct lfsck_component { __u16 lc_type; }; +#define LFSCK_LMV_MAX_STRIPES LMV_MAX_STRIPE_COUNT +#define LFSCK_LMV_DEF_STRIPES 4 + +/* Warning: NOT change the lfsck_slave_lmv_flags members order, + * otherwise the lfsck_record_lmv() may be wrong. */ +enum lfsck_slave_lmv_flags { + LSLF_NONE = 0, + LSLF_BAD_INDEX2 = 1, + LSLF_NO_LMVEA = 2, + LSLF_DANGLING = 3, + LSLF_BAD_INDEX1 = 4, +}; + +/* When the namespace LFSCK scans a striped directory, it will record all + * the known shards' information in the structure "lfsck_slave_lmv_rec", + * including the shard's FID, index, slave LMV EA, and so on. Each shard + * will take one lfsck_slave_lmv_rec slot. After the 1st cycle scanning + * the striped directory, the LFSCK will get all the information about + * whether there are some inconsistency, and then it can repair them in + * the 2nd cycle scanning. */ +struct lfsck_slave_lmv_rec { + struct lu_fid lslr_fid; + __u32 lslr_stripe_count; + __u32 lslr_index; /* the index in name or in slave lmv */ + __u32 lslr_hash_type; + __u32 lslr_flags; +}; + +struct lfsck_lmv { + struct lmv_mds_md_v1 ll_lmv; + atomic_t ll_ref; + int ll_stripes_allocated; + int ll_stripes_filled; + int ll_exit_value; + __u32 ll_max_stripe_count; + __u32 ll_max_filled_off; + __u32 ll_hash_type; + unsigned int ll_lmv_master:1, + ll_lmv_slave:1, + ll_lmv_verified:1, + ll_lmv_updated:1, + ll_inline:1, + ll_failed:1, + ll_ignore:1; + struct lfsck_slave_lmv_rec *ll_lslr; +}; + +/* If the namespace LFSCK finds that the master MDT-object of a striped + * directory lost its master LMV EA, it will re-generate the master LMV + * EA and notify the LFSCK instance on the MDT on which the striped dir + * master MDT-object resides to rescan the striped directory. To do that, + * the notify handler will insert a "lfsck_lmv_unit" structure into the + * lfsck::li_list_lmv. The LFSCK instance will scan such list from time + * to time to check whether needs to rescan some stirped directories. */ +struct lfsck_lmv_unit { + struct list_head llu_link; + struct lfsck_lmv llu_lmv; + struct dt_object *llu_obj; + struct lfsck_instance *llu_lfsck; +}; + +struct lfsck_rec_lmv_save { + struct lu_fid lrls_fid; + struct lmv_mds_md_v1 lrls_lmv; +}; + +/* Allow lfsck_record_lmv() to be called recursively at most three times. */ +#define LFSCK_REC_LMV_MAX_DEPTH 3 + struct lfsck_instance { struct mutex li_mutex; spinlock_t li_lock; @@ -459,6 +606,9 @@ struct lfsck_instance { /* For the components those are not scanning now. */ struct list_head li_list_idle; + /* For the lfsck_lmv_unit to be handled. */ + struct list_head li_list_lmv; + atomic_t li_ref; atomic_t li_double_scan_count; struct ptlrpc_thread li_thread; @@ -486,6 +636,8 @@ struct lfsck_instance { struct lfsck_position li_pos_current; struct lfsck_position li_pos_checkpoint; + struct lfsck_lmv *li_lmv; + /* Obj for otable-based iteration */ struct dt_object *li_obj_oit; @@ -533,6 +685,7 @@ struct lfsck_instance { li_master:1, /* Master instance or not. */ li_current_oit_processed:1, li_start_unplug:1; + struct lfsck_rec_lmv_save li_rec_lmv_save[LFSCK_REC_LMV_MAX_DEPTH]; }; struct lfsck_async_interpret_args { @@ -556,6 +709,20 @@ struct lfsck_assistant_req { struct list_head lar_list; }; +struct lfsck_namespace_req { + struct lfsck_assistant_req lnr_lar; + struct dt_object *lnr_obj; + struct lfsck_lmv *lnr_lmv; + struct lu_fid lnr_fid; + __u64 lnr_oit_cookie; + __u64 lnr_dir_cookie; + __u32 lnr_attr; + __u32 lnr_size; + __u16 lnr_type; + __u16 lnr_namelen; + char lnr_name[0]; +}; + struct lfsck_assistant_operations { int (*la_handler_p1)(const struct lu_env *env, struct lfsck_component *com, @@ -625,6 +792,7 @@ struct lfsck_assistant_data { struct lfsck_thread_info { struct lu_name lti_name_const; struct lu_name lti_name; + struct lu_name lti_name2; struct lu_buf lti_buf; struct lu_buf lti_linkea_buf; struct lu_buf lti_linkea_buf2; @@ -633,6 +801,7 @@ struct lfsck_thread_info { struct lu_fid lti_fid2; struct lu_fid lti_fid3; struct lu_fid lti_fid4; + struct lu_fid lti_fid5; struct lu_attr lti_la; struct lu_attr lti_la2; struct lu_attr lti_la3; @@ -646,12 +815,14 @@ struct lfsck_thread_info { /* There will be '\0' at the end of the name. */ char lti_key[sizeof(struct lu_dirent) + NAME_MAX + 1]; char lti_tmpbuf[LFSCK_TMPBUF_LEN]; + char lti_tmpbuf2[LFSCK_TMPBUF_LEN]; struct lfsck_request lti_lr; struct lfsck_async_interpret_args lti_laia; struct lfsck_async_interpret_args lti_laia2; struct lfsck_start lti_start; struct lfsck_stop lti_stop; ldlm_policy_data_t lti_policy; + struct ldlm_enqueue_info lti_einfo; struct ldlm_res_id lti_resid; union { struct filter_fid_old lti_old_pfid; @@ -663,6 +834,10 @@ struct lfsck_thread_info { struct dt_insert_rec lti_dt_rec; struct lu_object_conf lti_conf; struct lu_seq_range lti_range; + struct lmv_mds_md_v1 lti_lmv; + struct lmv_mds_md_v1 lti_lmv2; + struct lmv_mds_md_v1 lti_lmv3; + struct lmv_mds_md_v1 lti_lmv4; }; /* lfsck_lib.c */ @@ -720,6 +895,11 @@ void lfsck_quit_generic(const struct lu_env *env, struct lfsck_component *com); /* lfsck_engine.c */ +int lfsck_unpack_ent(struct lu_dirent *ent, __u64 *cookie, __u16 *type); +void lfsck_close_dir(const struct lu_env *env, + struct lfsck_instance *lfsck, int result); +int lfsck_open_dir(const struct lu_env *env, + struct lfsck_instance *lfsck, __u64 cookie); int lfsck_master_engine(void *args); int lfsck_assistant_engine(void *args); @@ -738,12 +918,25 @@ int lfsck_namespace_trace_update(const struct lu_env *env, struct lfsck_component *com, const struct lu_fid *fid, const __u8 flags, bool add); +int lfsck_namespace_check_exist(const struct lu_env *env, + struct dt_object *dir, + struct dt_object *obj, const char *name); int __lfsck_links_read(const struct lu_env *env, struct dt_object *obj, struct linkea_data *ldata); int lfsck_namespace_rebuild_linkea(const struct lu_env *env, struct lfsck_component *com, struct dt_object *obj, struct linkea_data *ldata); +int lfsck_namespace_repair_dangling(const struct lu_env *env, + struct lfsck_component *com, + struct dt_object *child, + struct lfsck_namespace_req *lnr); +int lfsck_namespace_repair_dirent(const struct lu_env *env, + struct lfsck_component *com, + struct dt_object *parent, + struct dt_object *child, + const char *name, const char *name2, + __u16 type, bool update, bool dec); int lfsck_verify_linkea(const struct lu_env *env, struct dt_device *dev, struct dt_object *obj, const struct lu_name *cname, const struct lu_fid *pfid); @@ -760,6 +953,46 @@ int lfsck_update_name_entry(const struct lu_env *env, int lfsck_namespace_setup(const struct lu_env *env, struct lfsck_instance *lfsck); +/* lfsck_striped_dir.c */ +void lfsck_lmv_put(const struct lu_env *env, struct lfsck_lmv *llmv); +int lfsck_read_stripe_lmv(const struct lu_env *env, struct dt_object *obj, + struct lmv_mds_md_v1 *lmv); +int lfsck_shard_name_to_index(const struct lu_env *env, const char *name, + int namelen, __u16 type, + const struct lu_fid *fid); +bool lfsck_is_valid_slave_name_entry(const struct lu_env *env, + struct lfsck_lmv *llmv, + const char *name, int namelen); +int lfsck_namespace_check_name(const struct lu_env *env, + struct dt_object *parent, + struct dt_object *child, + const struct lu_name *cname); +int lfsck_namespace_update_lmv(const struct lu_env *env, + struct lfsck_component *com, + struct dt_object *obj, + struct lmv_mds_md_v1 *lmv, bool locked); +int lfsck_namespace_verify_stripe_slave(const struct lu_env *env, + struct lfsck_component *com, + struct dt_object *obj, + struct lfsck_lmv *llmv); +int lfsck_namespace_scan_shard(const struct lu_env *env, + struct lfsck_component *com, + struct dt_object *child); +int lfsck_namespace_notify_lmv_master_local(const struct lu_env *env, + struct lfsck_component *com, + struct dt_object *obj); +int lfsck_namespace_repair_bad_name_hash(const struct lu_env *env, + struct lfsck_component *com, + struct dt_object *shard, + struct lfsck_lmv *llmv, + const char *name); +int lfsck_namespace_striped_dir_rescan(const struct lu_env *env, + struct lfsck_component *com, + struct lfsck_namespace_req *lnr); +int lfsck_namespace_handle_striped_master(const struct lu_env *env, + struct lfsck_component *com, + struct lfsck_namespace_req *lnr); + /* lfsck_layout.c */ int lfsck_layout_setup(const struct lu_env *env, struct lfsck_instance *lfsck); @@ -769,6 +1002,12 @@ extern const char *lfsck_flags_names[]; extern const char *lfsck_param_names[]; extern struct lu_context_key lfsck_thread_key; +static inline bool name_is_dot_or_dotdot(const char *name, int namelen) +{ + return name[0] == '.' && + (namelen == 1 || (namelen == 2 && name[1] == '.')); +} + static inline struct dt_device *lfsck_obj2dt_dev(struct dt_object *obj) { return container_of0(obj->do_lu.lo_dev, struct dt_device, dd_lu_dev); @@ -926,27 +1165,16 @@ lfsck_object_find_by_dev_nowait(const struct lu_env *env, struct dt_device *dev, const struct lu_fid *fid) { struct lu_object_conf *conf = &lfsck_env_info(env)->lti_conf; - struct dt_object *obj; conf->loc_flags = LOC_F_NOWAIT; - obj = lu2dt(lu_object_find_slice(env, dt2lu_dev(dev), fid, conf)); - if (unlikely(obj == NULL)) - return ERR_PTR(-ENOENT); - - return obj; + return lu2dt(lu_object_find_slice(env, dt2lu_dev(dev), fid, conf)); } static inline struct dt_object * lfsck_object_find_by_dev(const struct lu_env *env, struct dt_device *dev, const struct lu_fid *fid) { - struct dt_object *obj; - - obj = lu2dt(lu_object_find_slice(env, dt2lu_dev(dev), fid, NULL)); - if (unlikely(obj == NULL)) - return ERR_PTR(-ENOENT); - - return obj; + return lu2dt(lu_object_find_slice(env, dt2lu_dev(dev), fid, NULL)); } static inline struct dt_object *lfsck_object_find(const struct lu_env *env, @@ -956,9 +1184,9 @@ static inline struct dt_object *lfsck_object_find(const struct lu_env *env, return lfsck_object_find_by_dev(env, lfsck->li_next, fid); } -static inline struct dt_object * -lfsck_object_find_bottom(const struct lu_env *env, struct lfsck_instance *lfsck, - const struct lu_fid *fid) +static inline struct dt_device * +lfsck_find_dev_by_fid(const struct lu_env *env, struct lfsck_instance *lfsck, + const struct lu_fid *fid) { struct dt_device *dev; int idx; @@ -979,9 +1207,36 @@ lfsck_object_find_bottom(const struct lu_env *env, struct lfsck_instance *lfsck, dev = ltd->ltd_tgt; } + return dev; +} + +static inline struct dt_object * +lfsck_object_find_bottom(const struct lu_env *env, struct lfsck_instance *lfsck, + const struct lu_fid *fid) +{ + struct dt_device *dev; + + dev = lfsck_find_dev_by_fid(env, lfsck, fid); + if (IS_ERR(dev)) + return (struct dt_object *)dev; + return lfsck_object_find_by_dev(env, dev, fid); } +static inline struct dt_object * +lfsck_object_find_bottom_nowait(const struct lu_env *env, + struct lfsck_instance *lfsck, + const struct lu_fid *fid) +{ + struct dt_device *dev; + + dev = lfsck_find_dev_by_fid(env, lfsck, fid); + if (IS_ERR(dev)) + return (struct dt_object *)dev; + + return lfsck_object_find_by_dev_nowait(env, dev, fid); +} + static inline struct lfsck_tgt_desc *lfsck_tgt_get(struct lfsck_tgt_descs *ltds, __u32 index) { @@ -1059,11 +1314,15 @@ static inline void lfsck_lad_set_bitmap(const struct lu_env *env, LASSERT(com->lc_lfsck->li_master); LASSERT(bitmap != NULL); - LASSERTF(bitmap->size > index, "invalid index: nbits %d, index %u\n", - bitmap->size, index); - cfs_bitmap_set(bitmap, index); - lad->lad_incomplete = 1; + if (likely(bitmap->size > index)) { + cfs_bitmap_set(bitmap, index); + lad->lad_incomplete = 1; + } else if (com->lc_type == LFSCK_TYPE_NAMESPACE) { + struct lfsck_namespace *ns = com->lc_file_ram; + + ns->ln_flags |= LF_INCOMPLETE; + } } static inline int lfsck_links_read(const struct lu_env *env, @@ -1088,4 +1347,31 @@ static inline int lfsck_links_read2(const struct lu_env *env, return __lfsck_links_read(env, obj, ldata); } +static inline struct lfsck_lmv *lfsck_lmv_get(struct lfsck_lmv *llmv) +{ + if (llmv != NULL) + atomic_inc(&llmv->ll_ref); + + return llmv; +} + +static inline void lfsck_lmv_header_le_to_cpu(struct lmv_mds_md_v1 *dst, + const struct lmv_mds_md_v1 *src) +{ + dst->lmv_magic = le32_to_cpu(src->lmv_magic); + dst->lmv_stripe_count = le32_to_cpu(src->lmv_stripe_count); + dst->lmv_master_mdt_index = le32_to_cpu(src->lmv_master_mdt_index); + dst->lmv_hash_type = le32_to_cpu(src->lmv_hash_type); + dst->lmv_layout_version = le32_to_cpu(src->lmv_layout_version); +} + +static inline void lfsck_lmv_header_cpu_to_le(struct lmv_mds_md_v1 *dst, + const struct lmv_mds_md_v1 *src) +{ + dst->lmv_magic = cpu_to_le32(src->lmv_magic); + dst->lmv_stripe_count = cpu_to_le32(src->lmv_stripe_count); + dst->lmv_master_mdt_index = cpu_to_le32(src->lmv_master_mdt_index); + dst->lmv_hash_type = cpu_to_le32(src->lmv_hash_type); + dst->lmv_layout_version = cpu_to_le32(src->lmv_layout_version); +} #endif /* _LFSCK_INTERNAL_H */