License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Many source files in the tree are missing licensing information, which
makes it harder for compliance tools to determine the correct license.
By default all files without license information are under the default
license of the kernel, which is GPL version 2.
Update the files which contain no license information with the 'GPL-2.0'
SPDX license identifier. The SPDX identifier is a legally binding
shorthand, which can be used instead of the full boiler plate text.
This patch is based on work done by Thomas Gleixner and Kate Stewart and
Philippe Ombredanne.
How this work was done:
Patches were generated and checked against linux-4.14-rc6 for a subset of
the use cases:
- file had no licensing information it it.
- file was a */uapi/* one with no licensing information in it,
- file was a */uapi/* one with existing licensing information,
Further patches will be generated in subsequent months to fix up cases
where non-standard license headers were used, and references to license
had to be inferred by heuristics based on keywords.
The analysis to determine which SPDX License Identifier to be applied to
a file was done in a spreadsheet of side by side results from of the
output of two independent scanners (ScanCode & Windriver) producing SPDX
tag:value files created by Philippe Ombredanne. Philippe prepared the
base worksheet, and did an initial spot review of a few 1000 files.
The 4.13 kernel was the starting point of the analysis with 60,537 files
assessed. Kate Stewart did a file by file comparison of the scanner
results in the spreadsheet to determine which SPDX license identifier(s)
to be applied to the file. She confirmed any determination that was not
immediately clear with lawyers working with the Linux Foundation.
Criteria used to select files for SPDX license identifier tagging was:
- Files considered eligible had to be source code files.
- Make and config files were included as candidates if they contained >5
lines of source
- File already had some variant of a license header in it (even if <5
lines).
All documentation files were explicitly excluded.
The following heuristics were used to determine which SPDX license
identifiers to apply.
- when both scanners couldn't find any license traces, file was
considered to have no license information in it, and the top level
COPYING file license applied.
For non */uapi/* files that summary was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 11139
and resulted in the first patch in this series.
If that file was a */uapi/* path one, it was "GPL-2.0 WITH
Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 WITH Linux-syscall-note 930
and resulted in the second patch in this series.
- if a file had some form of licensing information in it, and was one
of the */uapi/* ones, it was denoted with the Linux-syscall-note if
any GPL family license was found in the file or had no licensing in
it (per prior point). Results summary:
SPDX license identifier # files
---------------------------------------------------|------
GPL-2.0 WITH Linux-syscall-note 270
GPL-2.0+ WITH Linux-syscall-note 169
((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21
((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17
LGPL-2.1+ WITH Linux-syscall-note 15
GPL-1.0+ WITH Linux-syscall-note 14
((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5
LGPL-2.0+ WITH Linux-syscall-note 4
LGPL-2.1 WITH Linux-syscall-note 3
((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3
((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1
and that resulted in the third patch in this series.
- when the two scanners agreed on the detected license(s), that became
the concluded license(s).
- when there was disagreement between the two scanners (one detected a
license but the other didn't, or they both detected different
licenses) a manual inspection of the file occurred.
- In most cases a manual inspection of the information in the file
resulted in a clear resolution of the license that should apply (and
which scanner probably needed to revisit its heuristics).
- When it was not immediately clear, the license identifier was
confirmed with lawyers working with the Linux Foundation.
- If there was any question as to the appropriate license identifier,
the file was flagged for further research and to be revisited later
in time.
In total, over 70 hours of logged manual review was done on the
spreadsheet to determine the SPDX license identifiers to apply to the
source files by Kate, Philippe, Thomas and, in some cases, confirmation
by lawyers working with the Linux Foundation.
Kate also obtained a third independent scan of the 4.13 code base from
FOSSology, and compared selected files where the other two scanners
disagreed against that SPDX file, to see if there was new insights. The
Windriver scanner is based on an older version of FOSSology in part, so
they are related.
Thomas did random spot checks in about 500 files from the spreadsheets
for the uapi headers and agreed with SPDX license identifier in the
files he inspected. For the non-uapi files Thomas did random spot checks
in about 15000 files.
In initial set of patches against 4.14-rc6, 3 files were found to have
copy/paste license identifier errors, and have been fixed to reflect the
correct identifier.
Additionally Philippe spent 10 hours this week doing a detailed manual
inspection and review of the 12,461 patched files from the initial patch
version early this week with:
- a full scancode scan run, collecting the matched texts, detected
license ids and scores
- reviewing anything where there was a license detected (about 500+
files) to ensure that the applied SPDX license was correct
- reviewing anything where there was no detection but the patch license
was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied
SPDX license was correct
This produced a worksheet with 20 files needing minor correction. This
worksheet was then exported into 3 different .csv files for the
different types of files to be modified.
These .csv files were then reviewed by Greg. Thomas wrote a script to
parse the csv files and add the proper SPDX tag to the file, in the
format that the file expected. This script was further refined by Greg
based on the output to detect more types of files automatically and to
distinguish between header and source .c files (which need different
comment types.) Finally Greg ran the script using the .csv files to
generate the patches.
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 14:07:57 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
2010-04-06 22:14:15 +00:00
|
|
|
#include <linux/ceph/ceph_debug.h>
|
2018-10-15 15:45:59 +00:00
|
|
|
#include <linux/ceph/striper.h>
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2010-04-06 22:14:15 +00:00
|
|
|
#include <linux/module.h>
|
2009-10-06 18:31:08 +00:00
|
|
|
#include <linux/sched.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 08:04:11 +00:00
|
|
|
#include <linux/slab.h>
|
2009-10-06 18:31:08 +00:00
|
|
|
#include <linux/file.h>
|
2012-07-31 18:27:36 +00:00
|
|
|
#include <linux/mount.h>
|
2009-10-06 18:31:08 +00:00
|
|
|
#include <linux/namei.h>
|
|
|
|
#include <linux/writeback.h>
|
2013-08-15 03:51:44 +00:00
|
|
|
#include <linux/falloc.h>
|
2019-06-06 12:57:27 +00:00
|
|
|
#include <linux/iversion.h>
|
2020-03-20 03:45:01 +00:00
|
|
|
#include <linux/ktime.h>
|
2023-11-30 14:16:22 +00:00
|
|
|
#include <linux/splice.h>
|
2009-10-06 18:31:08 +00:00
|
|
|
|
|
|
|
#include "super.h"
|
|
|
|
#include "mds_client.h"
|
2013-08-21 21:29:54 +00:00
|
|
|
#include "cache.h"
|
ceph: add buffered/direct exclusionary locking for reads and writes
xfstest generic/451 intermittently fails. The test does O_DIRECT writes
to a file, and then reads back the result using buffered I/O, while
running a separate set of tasks that are also doing buffered reads.
The client will invalidate the cache prior to a direct write, but it's
easy for one of the other readers' replies to race in and reinstantiate
the invalidated range with stale data.
To fix this, we must to serialize direct I/O writes and buffered reads.
We could just sprinkle in some shared locks on the i_rwsem for reads,
and increase the exclusive footprint on the write side, but that would
cause O_DIRECT writes to end up serialized vs. other direct requests.
Instead, borrow the scheme used by nfs.ko. Buffered writes take the
i_rwsem exclusively, but buffered reads take a shared lock, allowing
them to run in parallel.
O_DIRECT requests also take a shared lock, but we need for them to not
run in parallel with buffered reads. A flag on the ceph_inode_info is
used to indicate whether it's in direct or buffered I/O mode. When a
conflicting request is submitted, it will block until the inode can be
flipped to the necessary mode.
Link: https://tracker.ceph.com/issues/40985
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: "Yan, Zheng" <zyan@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2019-08-02 17:15:39 +00:00
|
|
|
#include "io.h"
|
2020-03-20 03:45:01 +00:00
|
|
|
#include "metric.h"
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
static __le32 ceph_flags_sys2wire(struct ceph_mds_client *mdsc, u32 flags)
|
2017-04-27 16:34:00 +00:00
|
|
|
{
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = mdsc->fsc->client;
|
2017-04-27 16:34:00 +00:00
|
|
|
u32 wire_flags = 0;
|
|
|
|
|
|
|
|
switch (flags & O_ACCMODE) {
|
|
|
|
case O_RDONLY:
|
|
|
|
wire_flags |= CEPH_O_RDONLY;
|
|
|
|
break;
|
|
|
|
case O_WRONLY:
|
|
|
|
wire_flags |= CEPH_O_WRONLY;
|
|
|
|
break;
|
|
|
|
case O_RDWR:
|
|
|
|
wire_flags |= CEPH_O_RDWR;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2018-03-09 07:12:40 +00:00
|
|
|
flags &= ~O_ACCMODE;
|
|
|
|
|
2017-04-27 16:34:00 +00:00
|
|
|
#define ceph_sys2wire(a) if (flags & a) { wire_flags |= CEPH_##a; flags &= ~a; }
|
|
|
|
|
|
|
|
ceph_sys2wire(O_CREAT);
|
|
|
|
ceph_sys2wire(O_EXCL);
|
|
|
|
ceph_sys2wire(O_TRUNC);
|
|
|
|
ceph_sys2wire(O_DIRECTORY);
|
|
|
|
ceph_sys2wire(O_NOFOLLOW);
|
|
|
|
|
|
|
|
#undef ceph_sys2wire
|
|
|
|
|
|
|
|
if (flags)
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "unused open flags: %x\n", flags);
|
2017-04-27 16:34:00 +00:00
|
|
|
|
|
|
|
return cpu_to_le32(wire_flags);
|
|
|
|
}
|
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
/*
|
|
|
|
* Ceph file operations
|
|
|
|
*
|
|
|
|
* Implement basic open/close functionality, and implement
|
|
|
|
* read/write.
|
|
|
|
*
|
|
|
|
* We implement three modes of file I/O:
|
|
|
|
* - buffered uses the generic_file_aio_{read,write} helpers
|
|
|
|
*
|
|
|
|
* - synchronous is used when there is multi-client read/write
|
|
|
|
* sharing, avoids the page cache, and synchronously waits for an
|
|
|
|
* ack from the OSD.
|
|
|
|
*
|
|
|
|
* - direct io takes the variant of the sync path that references
|
|
|
|
* user pages directly.
|
|
|
|
*
|
|
|
|
* fsync() flushes and waits on dirty pages, but just queues metadata
|
|
|
|
* for writeback: since the MDS can recover size and mtime there is no
|
|
|
|
* need to wait for MDS acknowledgement.
|
|
|
|
*/
|
|
|
|
|
2015-10-08 07:26:15 +00:00
|
|
|
/*
|
2018-05-04 14:57:31 +00:00
|
|
|
* How many pages to get in one call to iov_iter_get_pages(). This
|
|
|
|
* determines the size of the on-stack array used as a buffer.
|
2015-10-08 07:26:15 +00:00
|
|
|
*/
|
2018-05-04 14:57:31 +00:00
|
|
|
#define ITER_GET_BVECS_PAGES 64
|
|
|
|
|
|
|
|
static ssize_t __iter_get_bvecs(struct iov_iter *iter, size_t maxsize,
|
|
|
|
struct bio_vec *bvecs)
|
2015-10-08 07:26:15 +00:00
|
|
|
{
|
2018-05-04 14:57:31 +00:00
|
|
|
size_t size = 0;
|
|
|
|
int bvec_idx = 0;
|
|
|
|
|
|
|
|
if (maxsize > iov_iter_count(iter))
|
|
|
|
maxsize = iov_iter_count(iter);
|
|
|
|
|
|
|
|
while (size < maxsize) {
|
|
|
|
struct page *pages[ITER_GET_BVECS_PAGES];
|
|
|
|
ssize_t bytes;
|
|
|
|
size_t start;
|
|
|
|
int idx = 0;
|
|
|
|
|
2022-06-09 14:28:36 +00:00
|
|
|
bytes = iov_iter_get_pages2(iter, pages, maxsize - size,
|
2018-05-04 14:57:31 +00:00
|
|
|
ITER_GET_BVECS_PAGES, &start);
|
|
|
|
if (bytes < 0)
|
|
|
|
return size ?: bytes;
|
|
|
|
|
|
|
|
size += bytes;
|
|
|
|
|
|
|
|
for ( ; bytes; idx++, bvec_idx++) {
|
2023-02-03 15:06:23 +00:00
|
|
|
int len = min_t(int, bytes, PAGE_SIZE - start);
|
|
|
|
|
|
|
|
bvec_set_page(&bvecs[bvec_idx], pages[idx], len, start);
|
|
|
|
bytes -= len;
|
2018-05-04 14:57:31 +00:00
|
|
|
start = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return size;
|
2015-10-08 07:26:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2018-05-04 14:57:31 +00:00
|
|
|
* iov_iter_get_pages() only considers one iov_iter segment, no matter
|
|
|
|
* what maxsize or maxpages are given. For ITER_BVEC that is a single
|
|
|
|
* page.
|
|
|
|
*
|
|
|
|
* Attempt to get up to @maxsize bytes worth of pages from @iter.
|
|
|
|
* Return the number of bytes in the created bio_vec array, or an error.
|
2015-10-08 07:26:15 +00:00
|
|
|
*/
|
2018-05-04 14:57:31 +00:00
|
|
|
static ssize_t iter_get_bvecs_alloc(struct iov_iter *iter, size_t maxsize,
|
|
|
|
struct bio_vec **bvecs, int *num_bvecs)
|
2015-10-08 07:26:15 +00:00
|
|
|
{
|
2018-05-04 14:57:31 +00:00
|
|
|
struct bio_vec *bv;
|
|
|
|
size_t orig_count = iov_iter_count(iter);
|
|
|
|
ssize_t bytes;
|
|
|
|
int npages;
|
2015-10-08 07:26:15 +00:00
|
|
|
|
2018-05-04 14:57:31 +00:00
|
|
|
iov_iter_truncate(iter, maxsize);
|
|
|
|
npages = iov_iter_npages(iter, INT_MAX);
|
|
|
|
iov_iter_reexpand(iter, orig_count);
|
2015-10-08 07:26:15 +00:00
|
|
|
|
2018-05-04 14:57:31 +00:00
|
|
|
/*
|
|
|
|
* __iter_get_bvecs() may populate only part of the array -- zero it
|
|
|
|
* out.
|
|
|
|
*/
|
|
|
|
bv = kvmalloc_array(npages, sizeof(*bv), GFP_KERNEL | __GFP_ZERO);
|
|
|
|
if (!bv)
|
|
|
|
return -ENOMEM;
|
2015-10-08 07:26:15 +00:00
|
|
|
|
2018-05-04 14:57:31 +00:00
|
|
|
bytes = __iter_get_bvecs(iter, maxsize, bv);
|
|
|
|
if (bytes < 0) {
|
|
|
|
/*
|
|
|
|
* No pages were pinned -- just free the array.
|
|
|
|
*/
|
|
|
|
kvfree(bv);
|
|
|
|
return bytes;
|
2015-10-08 07:26:15 +00:00
|
|
|
}
|
|
|
|
|
2018-05-04 14:57:31 +00:00
|
|
|
*bvecs = bv;
|
|
|
|
*num_bvecs = npages;
|
|
|
|
return bytes;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void put_bvecs(struct bio_vec *bvecs, int num_bvecs, bool should_dirty)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < num_bvecs; i++) {
|
|
|
|
if (bvecs[i].bv_page) {
|
|
|
|
if (should_dirty)
|
|
|
|
set_page_dirty_lock(bvecs[i].bv_page);
|
|
|
|
put_page(bvecs[i].bv_page);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
kvfree(bvecs);
|
2015-10-08 07:26:15 +00:00
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Prepare an open request. Preallocate ceph_cap to avoid an
|
|
|
|
* inopportune ENOMEM later.
|
|
|
|
*/
|
|
|
|
static struct ceph_mds_request *
|
|
|
|
prepare_open_request(struct super_block *sb, int flags, int create_mode)
|
|
|
|
{
|
2020-09-03 13:01:39 +00:00
|
|
|
struct ceph_mds_client *mdsc = ceph_sb_to_mdsc(sb);
|
2009-10-06 18:31:08 +00:00
|
|
|
struct ceph_mds_request *req;
|
|
|
|
int want_auth = USE_ANY_MDS;
|
|
|
|
int op = (flags & O_CREAT) ? CEPH_MDS_OP_CREATE : CEPH_MDS_OP_OPEN;
|
|
|
|
|
|
|
|
if (flags & (O_WRONLY|O_RDWR|O_CREAT|O_TRUNC))
|
|
|
|
want_auth = USE_AUTH_MDS;
|
|
|
|
|
|
|
|
req = ceph_mdsc_create_request(mdsc, op, want_auth);
|
|
|
|
if (IS_ERR(req))
|
|
|
|
goto out;
|
|
|
|
req->r_fmode = ceph_flags_to_mode(flags);
|
2023-06-12 01:04:07 +00:00
|
|
|
req->r_args.open.flags = ceph_flags_sys2wire(mdsc, flags);
|
2009-10-06 18:31:08 +00:00
|
|
|
req->r_args.open.mode = cpu_to_le32(create_mode);
|
|
|
|
out:
|
|
|
|
return req;
|
|
|
|
}
|
|
|
|
|
2018-03-13 02:42:44 +00:00
|
|
|
static int ceph_init_file_info(struct inode *inode, struct file *file,
|
|
|
|
int fmode, bool isdir)
|
|
|
|
{
|
2019-07-25 12:16:42 +00:00
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
2021-11-30 19:12:13 +00:00
|
|
|
struct ceph_mount_options *opt =
|
2023-06-12 02:50:38 +00:00
|
|
|
ceph_inode_to_fs_client(&ci->netfs.inode)->mount_options;
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = ceph_inode_to_client(inode);
|
2018-03-13 02:42:44 +00:00
|
|
|
struct ceph_file_info *fi;
|
2021-12-15 23:48:33 +00:00
|
|
|
int ret;
|
2018-03-13 02:42:44 +00:00
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx %p 0%o (%s)\n", inode, ceph_vinop(inode),
|
|
|
|
file, inode->i_mode, isdir ? "dir" : "regular");
|
2018-03-13 02:42:44 +00:00
|
|
|
BUG_ON(inode->i_fop->release != ceph_release);
|
|
|
|
|
|
|
|
if (isdir) {
|
|
|
|
struct ceph_dir_file_info *dfi =
|
|
|
|
kmem_cache_zalloc(ceph_dir_file_cachep, GFP_KERNEL);
|
2020-03-05 12:21:02 +00:00
|
|
|
if (!dfi)
|
2018-03-13 02:42:44 +00:00
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
file->private_data = dfi;
|
|
|
|
fi = &dfi->file_info;
|
|
|
|
dfi->next_offset = 2;
|
|
|
|
dfi->readdir_cache_idx = -1;
|
|
|
|
} else {
|
|
|
|
fi = kmem_cache_zalloc(ceph_file_cachep, GFP_KERNEL);
|
2020-03-05 12:21:02 +00:00
|
|
|
if (!fi)
|
2018-03-13 02:42:44 +00:00
|
|
|
return -ENOMEM;
|
|
|
|
|
2021-11-30 19:12:13 +00:00
|
|
|
if (opt->flags & CEPH_MOUNT_OPT_NOPAGECACHE)
|
|
|
|
fi->flags |= CEPH_F_SYNC;
|
|
|
|
|
2018-03-13 02:42:44 +00:00
|
|
|
file->private_data = fi;
|
|
|
|
}
|
|
|
|
|
2020-03-05 12:21:02 +00:00
|
|
|
ceph_get_fmode(ci, fmode, 1);
|
2018-03-13 02:42:44 +00:00
|
|
|
fi->fmode = fmode;
|
2020-03-05 12:21:02 +00:00
|
|
|
|
2018-03-13 02:42:44 +00:00
|
|
|
spin_lock_init(&fi->rw_contexts_lock);
|
|
|
|
INIT_LIST_HEAD(&fi->rw_contexts);
|
2023-06-12 02:50:38 +00:00
|
|
|
fi->filp_gen = READ_ONCE(ceph_inode_to_fs_client(inode)->filp_gen);
|
2018-03-13 02:42:44 +00:00
|
|
|
|
2022-06-07 02:13:53 +00:00
|
|
|
if ((file->f_mode & FMODE_WRITE) && ceph_has_inline_data(ci)) {
|
2021-12-15 23:48:33 +00:00
|
|
|
ret = ceph_uninline_data(file);
|
|
|
|
if (ret < 0)
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2018-03-13 02:42:44 +00:00
|
|
|
return 0;
|
2021-12-15 23:48:33 +00:00
|
|
|
|
|
|
|
error:
|
|
|
|
ceph_fscache_unuse_cookie(inode, file->f_mode & FMODE_WRITE);
|
|
|
|
ceph_put_fmode(ci, fi->fmode, 1);
|
|
|
|
kmem_cache_free(ceph_file_cachep, fi);
|
|
|
|
/* wake up anyone waiting for caps on this inode */
|
|
|
|
wake_up_all(&ci->i_cap_wq);
|
|
|
|
return ret;
|
2018-03-13 02:42:44 +00:00
|
|
|
}
|
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
/*
|
|
|
|
* initialize private struct file data.
|
|
|
|
* if we fail, clean up by dropping fmode reference on the ceph_inode
|
|
|
|
*/
|
|
|
|
static int ceph_init_file(struct inode *inode, struct file *file, int fmode)
|
|
|
|
{
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = ceph_inode_to_client(inode);
|
2009-10-06 18:31:08 +00:00
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
switch (inode->i_mode & S_IFMT) {
|
|
|
|
case S_IFREG:
|
2021-12-07 13:44:50 +00:00
|
|
|
ceph_fscache_use_cookie(inode, file->f_mode & FMODE_WRITE);
|
2020-08-23 22:36:59 +00:00
|
|
|
fallthrough;
|
2009-10-06 18:31:08 +00:00
|
|
|
case S_IFDIR:
|
2018-03-13 02:42:44 +00:00
|
|
|
ret = ceph_init_file_info(inode, file, fmode,
|
|
|
|
S_ISDIR(inode->i_mode));
|
2009-10-06 18:31:08 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case S_IFLNK:
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx %p 0%o (symlink)\n", inode,
|
|
|
|
ceph_vinop(inode), file, inode->i_mode);
|
2009-10-06 18:31:08 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx %p 0%o (special)\n", inode,
|
|
|
|
ceph_vinop(inode), file, inode->i_mode);
|
2009-10-06 18:31:08 +00:00
|
|
|
/*
|
|
|
|
* we need to drop the open ref now, since we don't
|
|
|
|
* have .release set to ceph_release.
|
|
|
|
*/
|
|
|
|
BUG_ON(inode->i_fop->release == ceph_release);
|
|
|
|
|
|
|
|
/* call the proper open fop */
|
|
|
|
ret = inode->i_fop->open(inode, file);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-04-08 07:27:16 +00:00
|
|
|
/*
|
|
|
|
* try renew caps after session gets killed.
|
|
|
|
*/
|
2020-03-05 12:21:00 +00:00
|
|
|
int ceph_renew_caps(struct inode *inode, int fmode)
|
2016-04-08 07:27:16 +00:00
|
|
|
{
|
2020-09-03 13:01:39 +00:00
|
|
|
struct ceph_mds_client *mdsc = ceph_sb_to_mdsc(inode->i_sb);
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = mdsc->fsc->client;
|
2016-04-08 07:27:16 +00:00
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
|
|
|
struct ceph_mds_request *req;
|
|
|
|
int err, flags, wanted;
|
|
|
|
|
|
|
|
spin_lock(&ci->i_ceph_lock);
|
2020-03-05 12:21:00 +00:00
|
|
|
__ceph_touch_fmode(ci, mdsc, fmode);
|
2016-04-08 07:27:16 +00:00
|
|
|
wanted = __ceph_caps_file_wanted(ci);
|
|
|
|
if (__ceph_is_any_real_caps(ci) &&
|
2017-03-25 09:28:10 +00:00
|
|
|
(!(wanted & CEPH_CAP_ANY_WR) || ci->i_auth_cap)) {
|
2016-04-08 07:27:16 +00:00
|
|
|
int issued = __ceph_caps_issued(ci, NULL);
|
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx want %s issued %s updating mds_wanted\n",
|
|
|
|
inode, ceph_vinop(inode), ceph_cap_string(wanted),
|
|
|
|
ceph_cap_string(issued));
|
2022-10-18 01:03:29 +00:00
|
|
|
ceph_check_caps(ci, 0);
|
2016-04-08 07:27:16 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
|
|
|
|
|
|
|
flags = 0;
|
|
|
|
if ((wanted & CEPH_CAP_FILE_RD) && (wanted & CEPH_CAP_FILE_WR))
|
|
|
|
flags = O_RDWR;
|
|
|
|
else if (wanted & CEPH_CAP_FILE_RD)
|
|
|
|
flags = O_RDONLY;
|
|
|
|
else if (wanted & CEPH_CAP_FILE_WR)
|
|
|
|
flags = O_WRONLY;
|
|
|
|
#ifdef O_LAZY
|
|
|
|
if (wanted & CEPH_CAP_FILE_LAZYIO)
|
|
|
|
flags |= O_LAZY;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
req = prepare_open_request(inode->i_sb, flags, 0);
|
|
|
|
if (IS_ERR(req)) {
|
|
|
|
err = PTR_ERR(req);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
req->r_inode = inode;
|
|
|
|
ihold(inode);
|
|
|
|
req->r_num_caps = 1;
|
|
|
|
|
|
|
|
err = ceph_mdsc_do_request(mdsc, NULL, req);
|
|
|
|
ceph_mdsc_put_request(req);
|
|
|
|
out:
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx open result=%d\n", inode, ceph_vinop(inode),
|
|
|
|
err);
|
2016-04-08 07:27:16 +00:00
|
|
|
return err < 0 ? err : 0;
|
|
|
|
}
|
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
/*
|
|
|
|
* If we already have the requisite capabilities, we can satisfy
|
|
|
|
* the open request locally (no need to request new caps from the
|
|
|
|
* MDS). We do, however, need to inform the MDS (asynchronously)
|
|
|
|
* if our wanted caps set expands.
|
|
|
|
*/
|
|
|
|
int ceph_open(struct inode *inode, struct file *file)
|
|
|
|
{
|
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
2023-06-12 02:50:38 +00:00
|
|
|
struct ceph_fs_client *fsc = ceph_sb_to_fs_client(inode->i_sb);
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = fsc->client;
|
2010-04-06 22:14:15 +00:00
|
|
|
struct ceph_mds_client *mdsc = fsc->mdsc;
|
2009-10-06 18:31:08 +00:00
|
|
|
struct ceph_mds_request *req;
|
2018-02-28 11:43:47 +00:00
|
|
|
struct ceph_file_info *fi = file->private_data;
|
2009-10-06 18:31:08 +00:00
|
|
|
int err;
|
|
|
|
int flags, fmode, wanted;
|
|
|
|
|
2018-02-28 11:43:47 +00:00
|
|
|
if (fi) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "file %p is already opened\n", file);
|
2009-10-06 18:31:08 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* filter out O_CREAT|O_EXCL; vfs did that already. yuck. */
|
|
|
|
flags = file->f_flags & ~(O_CREAT|O_EXCL);
|
2021-07-01 18:40:51 +00:00
|
|
|
if (S_ISDIR(inode->i_mode)) {
|
2009-10-06 18:31:08 +00:00
|
|
|
flags = O_DIRECTORY; /* mds likes to know */
|
2021-07-01 18:40:51 +00:00
|
|
|
} else if (S_ISREG(inode->i_mode)) {
|
|
|
|
err = fscrypt_file_open(inode, file);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx file %p flags %d (%d)\n", inode,
|
|
|
|
ceph_vinop(inode), file, flags, file->f_flags);
|
2009-10-06 18:31:08 +00:00
|
|
|
fmode = ceph_flags_to_mode(flags);
|
|
|
|
wanted = ceph_caps_for_mode(fmode);
|
|
|
|
|
|
|
|
/* snapped files are read-only */
|
|
|
|
if (ceph_snap(inode) != CEPH_NOSNAP && (file->f_mode & FMODE_WRITE))
|
|
|
|
return -EROFS;
|
|
|
|
|
|
|
|
/* trivially open snapdir */
|
|
|
|
if (ceph_snap(inode) == CEPH_SNAPDIR) {
|
|
|
|
return ceph_init_file(inode, file, fmode);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2010-11-07 17:07:15 +00:00
|
|
|
* No need to block if we have caps on the auth MDS (for
|
|
|
|
* write) or any MDS (for read). Update wanted set
|
2009-10-06 18:31:08 +00:00
|
|
|
* asynchronously.
|
|
|
|
*/
|
2011-11-30 17:47:09 +00:00
|
|
|
spin_lock(&ci->i_ceph_lock);
|
2010-11-07 17:07:15 +00:00
|
|
|
if (__ceph_is_any_real_caps(ci) &&
|
|
|
|
(((fmode & CEPH_FILE_MODE_WR) == 0) || ci->i_auth_cap)) {
|
2017-01-29 14:15:47 +00:00
|
|
|
int mds_wanted = __ceph_caps_mds_wanted(ci, true);
|
2009-10-06 18:31:08 +00:00
|
|
|
int issued = __ceph_caps_issued(ci, NULL);
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "open %p fmode %d want %s issued %s using existing\n",
|
|
|
|
inode, fmode, ceph_cap_string(wanted),
|
|
|
|
ceph_cap_string(issued));
|
2020-03-05 12:21:02 +00:00
|
|
|
__ceph_touch_fmode(ci, mdsc, fmode);
|
2011-11-30 17:47:09 +00:00
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
2009-10-06 18:31:08 +00:00
|
|
|
|
|
|
|
/* adjust wanted? */
|
|
|
|
if ((issued & wanted) != wanted &&
|
|
|
|
(mds_wanted & wanted) != wanted &&
|
|
|
|
ceph_snap(inode) != CEPH_SNAPDIR)
|
2022-10-18 01:03:29 +00:00
|
|
|
ceph_check_caps(ci, 0);
|
2009-10-06 18:31:08 +00:00
|
|
|
|
|
|
|
return ceph_init_file(inode, file, fmode);
|
|
|
|
} else if (ceph_snap(inode) != CEPH_NOSNAP &&
|
|
|
|
(ci->i_snap_caps & wanted) == wanted) {
|
2020-03-05 12:21:00 +00:00
|
|
|
__ceph_touch_fmode(ci, mdsc, fmode);
|
2011-11-30 17:47:09 +00:00
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
2009-10-06 18:31:08 +00:00
|
|
|
return ceph_init_file(inode, file, fmode);
|
|
|
|
}
|
2013-08-21 21:29:54 +00:00
|
|
|
|
2011-11-30 17:47:09 +00:00
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "open fmode %d wants %s\n", fmode, ceph_cap_string(wanted));
|
2009-10-06 18:31:08 +00:00
|
|
|
req = prepare_open_request(inode->i_sb, flags, 0);
|
|
|
|
if (IS_ERR(req)) {
|
|
|
|
err = PTR_ERR(req);
|
|
|
|
goto out;
|
|
|
|
}
|
2011-05-27 16:24:26 +00:00
|
|
|
req->r_inode = inode;
|
|
|
|
ihold(inode);
|
2013-08-21 21:29:54 +00:00
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
req->r_num_caps = 1;
|
2015-08-18 02:25:35 +00:00
|
|
|
err = ceph_mdsc_do_request(mdsc, NULL, req);
|
2009-10-06 18:31:08 +00:00
|
|
|
if (!err)
|
|
|
|
err = ceph_init_file(inode, file, req->r_fmode);
|
|
|
|
ceph_mdsc_put_request(req);
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "open result=%d on %llx.%llx\n", err, ceph_vinop(inode));
|
2009-10-06 18:31:08 +00:00
|
|
|
out:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-01-02 12:11:38 +00:00
|
|
|
/* Clone the layout from a synchronous create, if the dir now has Dc caps */
|
|
|
|
static void
|
|
|
|
cache_file_layout(struct inode *dst, struct inode *src)
|
|
|
|
{
|
|
|
|
struct ceph_inode_info *cdst = ceph_inode(dst);
|
|
|
|
struct ceph_inode_info *csrc = ceph_inode(src);
|
|
|
|
|
|
|
|
spin_lock(&cdst->i_ceph_lock);
|
|
|
|
if ((__ceph_caps_issued(cdst, NULL) & CEPH_CAP_DIR_CREATE) &&
|
|
|
|
!ceph_file_layout_is_valid(&cdst->i_cached_layout)) {
|
|
|
|
memcpy(&cdst->i_cached_layout, &csrc->i_layout,
|
|
|
|
sizeof(cdst->i_cached_layout));
|
|
|
|
rcu_assign_pointer(cdst->i_cached_layout.pool_ns,
|
|
|
|
ceph_try_get_string(csrc->i_layout.pool_ns));
|
|
|
|
}
|
|
|
|
spin_unlock(&cdst->i_ceph_lock);
|
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2019-11-27 17:06:14 +00:00
|
|
|
/*
|
|
|
|
* Try to set up an async create. We need caps, a file layout, and inode number,
|
|
|
|
* and either a lease on the dentry or complete dir info. If any of those
|
|
|
|
* criteria are not satisfied, then return false and the caller can go
|
|
|
|
* synchronous.
|
|
|
|
*/
|
|
|
|
static int try_prep_async_create(struct inode *dir, struct dentry *dentry,
|
|
|
|
struct ceph_file_layout *lo, u64 *pino)
|
|
|
|
{
|
|
|
|
struct ceph_inode_info *ci = ceph_inode(dir);
|
|
|
|
struct ceph_dentry_info *di = ceph_dentry(dentry);
|
|
|
|
int got = 0, want = CEPH_CAP_FILE_EXCL | CEPH_CAP_DIR_CREATE;
|
|
|
|
u64 ino;
|
|
|
|
|
|
|
|
spin_lock(&ci->i_ceph_lock);
|
|
|
|
/* No auth cap means no chance for Dc caps */
|
|
|
|
if (!ci->i_auth_cap)
|
|
|
|
goto no_async;
|
|
|
|
|
|
|
|
/* Any delegated inos? */
|
|
|
|
if (xa_empty(&ci->i_auth_cap->session->s_delegated_inos))
|
|
|
|
goto no_async;
|
|
|
|
|
|
|
|
if (!ceph_file_layout_is_valid(&ci->i_cached_layout))
|
|
|
|
goto no_async;
|
|
|
|
|
|
|
|
if ((__ceph_caps_issued(ci, NULL) & want) != want)
|
|
|
|
goto no_async;
|
|
|
|
|
|
|
|
if (d_in_lookup(dentry)) {
|
|
|
|
if (!__ceph_dir_is_complete(ci))
|
|
|
|
goto no_async;
|
2020-03-04 13:22:20 +00:00
|
|
|
spin_lock(&dentry->d_lock);
|
|
|
|
di->lease_shared_gen = atomic_read(&ci->i_shared_gen);
|
|
|
|
spin_unlock(&dentry->d_lock);
|
2019-11-27 17:06:14 +00:00
|
|
|
} else if (atomic_read(&ci->i_shared_gen) !=
|
|
|
|
READ_ONCE(di->lease_shared_gen)) {
|
|
|
|
goto no_async;
|
|
|
|
}
|
|
|
|
|
|
|
|
ino = ceph_get_deleg_ino(ci->i_auth_cap->session);
|
|
|
|
if (!ino)
|
|
|
|
goto no_async;
|
|
|
|
|
|
|
|
*pino = ino;
|
|
|
|
ceph_take_cap_refs(ci, want, false);
|
|
|
|
memcpy(lo, &ci->i_cached_layout, sizeof(*lo));
|
|
|
|
rcu_assign_pointer(lo->pool_ns,
|
|
|
|
ceph_try_get_string(ci->i_cached_layout.pool_ns));
|
|
|
|
got = want;
|
|
|
|
no_async:
|
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
|
|
|
return got;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void restore_deleg_ino(struct inode *dir, u64 ino)
|
|
|
|
{
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = ceph_inode_to_client(dir);
|
2019-11-27 17:06:14 +00:00
|
|
|
struct ceph_inode_info *ci = ceph_inode(dir);
|
|
|
|
struct ceph_mds_session *s = NULL;
|
|
|
|
|
|
|
|
spin_lock(&ci->i_ceph_lock);
|
|
|
|
if (ci->i_auth_cap)
|
|
|
|
s = ceph_get_mds_session(ci->i_auth_cap->session);
|
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
|
|
|
if (s) {
|
|
|
|
int err = ceph_restore_deleg_ino(s, ino);
|
|
|
|
if (err)
|
2023-06-12 01:04:07 +00:00
|
|
|
pr_warn_client(cl,
|
|
|
|
"unable to restore delegated ino 0x%llx to session: %d\n",
|
2019-11-27 17:06:14 +00:00
|
|
|
ino, err);
|
|
|
|
ceph_put_mds_session(s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-08 15:27:50 +00:00
|
|
|
static void wake_async_create_waiters(struct inode *inode,
|
|
|
|
struct ceph_mds_session *session)
|
|
|
|
{
|
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
2022-10-17 14:17:35 +00:00
|
|
|
bool check_cap = false;
|
2022-02-08 15:27:50 +00:00
|
|
|
|
|
|
|
spin_lock(&ci->i_ceph_lock);
|
|
|
|
if (ci->i_ceph_flags & CEPH_I_ASYNC_CREATE) {
|
|
|
|
ci->i_ceph_flags &= ~CEPH_I_ASYNC_CREATE;
|
|
|
|
wake_up_bit(&ci->i_ceph_flags, CEPH_ASYNC_CREATE_BIT);
|
2022-10-17 14:17:35 +00:00
|
|
|
|
|
|
|
if (ci->i_ceph_flags & CEPH_I_ASYNC_CHECK_CAPS) {
|
|
|
|
ci->i_ceph_flags &= ~CEPH_I_ASYNC_CHECK_CAPS;
|
|
|
|
check_cap = true;
|
|
|
|
}
|
2022-02-08 15:27:50 +00:00
|
|
|
}
|
|
|
|
ceph_kick_flushing_inode_caps(session, ci);
|
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
2022-10-17 14:17:35 +00:00
|
|
|
|
|
|
|
if (check_cap)
|
|
|
|
ceph_check_caps(ci, CHECK_CAPS_FLUSH);
|
2022-02-08 15:27:50 +00:00
|
|
|
}
|
|
|
|
|
2019-11-27 17:06:14 +00:00
|
|
|
static void ceph_async_create_cb(struct ceph_mds_client *mdsc,
|
|
|
|
struct ceph_mds_request *req)
|
|
|
|
{
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = mdsc->fsc->client;
|
2022-02-08 15:27:50 +00:00
|
|
|
struct dentry *dentry = req->r_dentry;
|
|
|
|
struct inode *dinode = d_inode(dentry);
|
|
|
|
struct inode *tinode = req->r_target_inode;
|
2019-11-27 17:06:14 +00:00
|
|
|
int result = req->r_err ? req->r_err :
|
|
|
|
le32_to_cpu(req->r_reply_info.head->result);
|
|
|
|
|
2022-02-08 15:27:50 +00:00
|
|
|
WARN_ON_ONCE(dinode && tinode && dinode != tinode);
|
|
|
|
|
|
|
|
/* MDS changed -- caller must resubmit */
|
2019-11-27 17:06:14 +00:00
|
|
|
if (result == -EJUKEBOX)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
mapping_set_error(req->r_parent->i_mapping, result);
|
|
|
|
|
|
|
|
if (result) {
|
2020-04-08 12:41:38 +00:00
|
|
|
int pathlen = 0;
|
|
|
|
u64 base = 0;
|
2023-06-09 07:15:47 +00:00
|
|
|
char *path = ceph_mdsc_build_path(mdsc, req->r_dentry, &pathlen,
|
2019-11-27 17:06:14 +00:00
|
|
|
&base, 0);
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
pr_warn_client(cl,
|
|
|
|
"async create failure path=(%llx)%s result=%d!\n",
|
2022-02-08 15:27:50 +00:00
|
|
|
base, IS_ERR(path) ? "<<bad>>" : path, result);
|
|
|
|
ceph_mdsc_free_path(path, pathlen);
|
|
|
|
|
2019-11-27 17:06:14 +00:00
|
|
|
ceph_dir_clear_complete(req->r_parent);
|
|
|
|
if (!d_unhashed(dentry))
|
|
|
|
d_drop(dentry);
|
|
|
|
|
2022-02-08 15:27:50 +00:00
|
|
|
if (dinode) {
|
|
|
|
mapping_set_error(dinode->i_mapping, result);
|
|
|
|
ceph_inode_shutdown(dinode);
|
|
|
|
wake_async_create_waiters(dinode, req->r_session);
|
|
|
|
}
|
2019-11-27 17:06:14 +00:00
|
|
|
}
|
|
|
|
|
2022-02-08 15:27:50 +00:00
|
|
|
if (tinode) {
|
|
|
|
u64 ino = ceph_vino(tinode).ino;
|
2019-11-27 17:06:14 +00:00
|
|
|
|
|
|
|
if (req->r_deleg_ino != ino)
|
2023-06-12 01:04:07 +00:00
|
|
|
pr_warn_client(cl,
|
|
|
|
"inode number mismatch! err=%d deleg_ino=0x%llx target=0x%llx\n",
|
|
|
|
req->r_err, req->r_deleg_ino, ino);
|
2019-11-27 17:06:14 +00:00
|
|
|
|
2022-02-08 15:27:50 +00:00
|
|
|
mapping_set_error(tinode->i_mapping, result);
|
|
|
|
wake_async_create_waiters(tinode, req->r_session);
|
2021-09-02 13:12:35 +00:00
|
|
|
} else if (!result) {
|
2023-06-12 01:04:07 +00:00
|
|
|
pr_warn_client(cl, "no req->r_target_inode for 0x%llx\n",
|
|
|
|
req->r_deleg_ino);
|
2019-11-27 17:06:14 +00:00
|
|
|
}
|
|
|
|
out:
|
|
|
|
ceph_mdsc_release_dir_caps(req);
|
|
|
|
}
|
|
|
|
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
static int ceph_finish_async_create(struct inode *dir, struct inode *inode,
|
|
|
|
struct dentry *dentry,
|
2019-11-27 17:06:14 +00:00
|
|
|
struct file *file, umode_t mode,
|
|
|
|
struct ceph_mds_request *req,
|
|
|
|
struct ceph_acl_sec_ctx *as_ctx,
|
|
|
|
struct ceph_file_layout *lo)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
char xattr_buf[4];
|
|
|
|
struct ceph_mds_reply_inode in = { };
|
|
|
|
struct ceph_mds_reply_info_in iinfo = { .in = &in };
|
|
|
|
struct ceph_inode_info *ci = ceph_inode(dir);
|
2022-06-10 01:53:21 +00:00
|
|
|
struct ceph_dentry_info *di = ceph_dentry(dentry);
|
2019-11-27 17:06:14 +00:00
|
|
|
struct timespec64 now;
|
2022-01-26 17:36:49 +00:00
|
|
|
struct ceph_string *pool_ns;
|
2021-06-01 13:40:25 +00:00
|
|
|
struct ceph_mds_client *mdsc = ceph_sb_to_mdsc(dir->i_sb);
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = mdsc->fsc->client;
|
2019-11-27 17:06:14 +00:00
|
|
|
struct ceph_vino vino = { .ino = req->r_deleg_ino,
|
|
|
|
.snap = CEPH_NOSNAP };
|
|
|
|
|
|
|
|
ktime_get_real_ts64(&now);
|
|
|
|
|
|
|
|
iinfo.inline_version = CEPH_INLINE_NONE;
|
|
|
|
iinfo.change_attr = 1;
|
|
|
|
ceph_encode_timespec64(&iinfo.btime, &now);
|
|
|
|
|
2022-04-25 19:54:27 +00:00
|
|
|
if (req->r_pagelist) {
|
|
|
|
iinfo.xattr_len = req->r_pagelist->length;
|
|
|
|
iinfo.xattr_data = req->r_pagelist->mapped_tail;
|
|
|
|
} else {
|
|
|
|
/* fake it */
|
|
|
|
iinfo.xattr_len = ARRAY_SIZE(xattr_buf);
|
|
|
|
iinfo.xattr_data = xattr_buf;
|
|
|
|
memset(iinfo.xattr_data, 0, iinfo.xattr_len);
|
|
|
|
}
|
2019-11-27 17:06:14 +00:00
|
|
|
|
|
|
|
in.ino = cpu_to_le64(vino.ino);
|
|
|
|
in.snapid = cpu_to_le64(CEPH_NOSNAP);
|
|
|
|
in.version = cpu_to_le64(1); // ???
|
|
|
|
in.cap.caps = in.cap.wanted = cpu_to_le32(CEPH_CAP_ALL_FILE);
|
|
|
|
in.cap.cap_id = cpu_to_le64(1);
|
|
|
|
in.cap.realm = cpu_to_le64(ci->i_snap_realm->ino);
|
|
|
|
in.cap.flags = CEPH_CAP_FLAG_AUTH;
|
|
|
|
in.ctime = in.mtime = in.atime = iinfo.btime;
|
|
|
|
in.truncate_seq = cpu_to_le32(1);
|
|
|
|
in.truncate_size = cpu_to_le64(-1ULL);
|
|
|
|
in.xattr_version = cpu_to_le64(1);
|
2023-08-07 13:26:25 +00:00
|
|
|
in.uid = cpu_to_le32(from_kuid(&init_user_ns,
|
|
|
|
mapped_fsuid(req->r_mnt_idmap,
|
|
|
|
&init_user_ns)));
|
2021-11-29 11:16:39 +00:00
|
|
|
if (dir->i_mode & S_ISGID) {
|
|
|
|
in.gid = cpu_to_le32(from_kgid(&init_user_ns, dir->i_gid));
|
|
|
|
|
|
|
|
/* Directories always inherit the setgid bit. */
|
|
|
|
if (S_ISDIR(mode))
|
|
|
|
mode |= S_ISGID;
|
|
|
|
} else {
|
2023-08-07 13:26:25 +00:00
|
|
|
in.gid = cpu_to_le32(from_kgid(&init_user_ns,
|
|
|
|
mapped_fsgid(req->r_mnt_idmap,
|
|
|
|
&init_user_ns)));
|
2021-11-29 11:16:39 +00:00
|
|
|
}
|
|
|
|
in.mode = cpu_to_le32((u32)mode);
|
|
|
|
|
2019-11-27 17:06:14 +00:00
|
|
|
in.nlink = cpu_to_le32(1);
|
|
|
|
in.max_size = cpu_to_le64(lo->stripe_unit);
|
|
|
|
|
|
|
|
ceph_file_layout_to_legacy(lo, &in.layout);
|
2022-01-26 17:36:49 +00:00
|
|
|
/* lo is private, so pool_ns can't change */
|
|
|
|
pool_ns = rcu_dereference_raw(lo->pool_ns);
|
|
|
|
if (pool_ns) {
|
|
|
|
iinfo.pool_ns_len = pool_ns->len;
|
|
|
|
iinfo.pool_ns_data = pool_ns->str;
|
|
|
|
}
|
2019-11-27 17:06:14 +00:00
|
|
|
|
2021-06-01 13:40:25 +00:00
|
|
|
down_read(&mdsc->snap_rwsem);
|
2019-11-27 17:06:14 +00:00
|
|
|
ret = ceph_fill_inode(inode, NULL, &iinfo, NULL, req->r_session,
|
|
|
|
req->r_fmode, NULL);
|
2021-06-01 13:40:25 +00:00
|
|
|
up_read(&mdsc->snap_rwsem);
|
2019-11-27 17:06:14 +00:00
|
|
|
if (ret) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "failed to fill inode: %d\n", ret);
|
2019-11-27 17:06:14 +00:00
|
|
|
ceph_dir_clear_complete(dir);
|
|
|
|
if (!d_unhashed(dentry))
|
|
|
|
d_drop(dentry);
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
discard_new_inode(inode);
|
2019-11-27 17:06:14 +00:00
|
|
|
} else {
|
|
|
|
struct dentry *dn;
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "d_adding new inode 0x%llx to 0x%llx/%s\n",
|
|
|
|
vino.ino, ceph_ino(dir), dentry->d_name.name);
|
2019-11-27 17:06:14 +00:00
|
|
|
ceph_dir_clear_ordered(dir);
|
|
|
|
ceph_init_inode_acls(inode, as_ctx);
|
|
|
|
if (inode->i_state & I_NEW) {
|
|
|
|
/*
|
|
|
|
* If it's not I_NEW, then someone created this before
|
|
|
|
* we got here. Assume the server is aware of it at
|
|
|
|
* that point and don't worry about setting
|
|
|
|
* CEPH_I_ASYNC_CREATE.
|
|
|
|
*/
|
|
|
|
ceph_inode(inode)->i_ceph_flags = CEPH_I_ASYNC_CREATE;
|
|
|
|
unlock_new_inode(inode);
|
|
|
|
}
|
|
|
|
if (d_in_lookup(dentry) || d_really_is_negative(dentry)) {
|
|
|
|
if (!d_unhashed(dentry))
|
|
|
|
d_drop(dentry);
|
|
|
|
dn = d_splice_alias(inode, dentry);
|
|
|
|
WARN_ON_ONCE(dn && dn != dentry);
|
|
|
|
}
|
|
|
|
file->f_mode |= FMODE_CREATED;
|
|
|
|
ret = finish_open(file, dentry, ceph_open);
|
|
|
|
}
|
2022-06-10 01:53:21 +00:00
|
|
|
|
|
|
|
spin_lock(&dentry->d_lock);
|
|
|
|
di->flags &= ~CEPH_DENTRY_ASYNC_CREATE;
|
|
|
|
wake_up_bit(&di->flags, CEPH_DENTRY_ASYNC_CREATE_BIT);
|
|
|
|
spin_unlock(&dentry->d_lock);
|
|
|
|
|
2019-11-27 17:06:14 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
/*
|
2012-07-31 18:27:36 +00:00
|
|
|
* Do a lookup + open with a single request. If we get a non-existent
|
|
|
|
* file or symlink, return 1 so the VFS can retry.
|
2009-10-06 18:31:08 +00:00
|
|
|
*/
|
2012-07-31 18:27:36 +00:00
|
|
|
int ceph_atomic_open(struct inode *dir, struct dentry *dentry,
|
2018-06-08 17:32:02 +00:00
|
|
|
struct file *file, unsigned flags, umode_t mode)
|
2009-10-06 18:31:08 +00:00
|
|
|
{
|
2023-08-07 13:26:25 +00:00
|
|
|
struct mnt_idmap *idmap = file_mnt_idmap(file);
|
2023-06-12 02:50:38 +00:00
|
|
|
struct ceph_fs_client *fsc = ceph_sb_to_fs_client(dir->i_sb);
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = fsc->client;
|
2010-04-06 22:14:15 +00:00
|
|
|
struct ceph_mds_client *mdsc = fsc->mdsc;
|
2009-10-06 18:31:08 +00:00
|
|
|
struct ceph_mds_request *req;
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
struct inode *new_inode = NULL;
|
2012-07-31 18:27:36 +00:00
|
|
|
struct dentry *dn;
|
2019-05-26 07:35:39 +00:00
|
|
|
struct ceph_acl_sec_ctx as_ctx = {};
|
2019-11-27 17:06:14 +00:00
|
|
|
bool try_async = ceph_test_mount_opt(fsc, ASYNC_DIROPS);
|
2018-01-05 10:47:19 +00:00
|
|
|
int mask;
|
2009-10-06 18:31:08 +00:00
|
|
|
int err;
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx dentry %p '%pd' %s flags %d mode 0%o\n",
|
|
|
|
dir, ceph_vinop(dir), dentry, dentry,
|
|
|
|
d_unhashed(dentry) ? "unhashed" : "hashed", flags, mode);
|
2012-07-31 18:27:36 +00:00
|
|
|
|
|
|
|
if (dentry->d_name.len > NAME_MAX)
|
|
|
|
return -ENAMETOOLONG;
|
|
|
|
|
2022-05-10 01:47:01 +00:00
|
|
|
err = ceph_wait_on_conflict_unlink(dentry);
|
|
|
|
if (err)
|
|
|
|
return err;
|
2022-07-01 02:52:27 +00:00
|
|
|
/*
|
|
|
|
* Do not truncate the file, since atomic_open is called before the
|
|
|
|
* permission check. The caller will do the truncation afterward.
|
|
|
|
*/
|
|
|
|
flags &= ~O_TRUNC;
|
2022-05-10 01:47:01 +00:00
|
|
|
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
retry:
|
2014-09-16 12:35:17 +00:00
|
|
|
if (flags & O_CREAT) {
|
2018-01-05 10:47:19 +00:00
|
|
|
if (ceph_quota_is_max_files_exceeded(dir))
|
|
|
|
return -EDQUOT;
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
|
|
|
|
new_inode = ceph_new_inode(dir, dentry, &mode, &as_ctx);
|
|
|
|
if (IS_ERR(new_inode)) {
|
|
|
|
err = PTR_ERR(new_inode);
|
2019-05-26 08:27:56 +00:00
|
|
|
goto out_ctx;
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
}
|
2022-04-25 19:54:27 +00:00
|
|
|
/* Async create can't handle more than a page of xattrs */
|
|
|
|
if (as_ctx.pagelist &&
|
|
|
|
!list_is_singular(&as_ctx.pagelist->head))
|
|
|
|
try_async = false;
|
2019-10-30 16:15:10 +00:00
|
|
|
} else if (!d_in_lookup(dentry)) {
|
|
|
|
/* If it's not being looked up, it's negative */
|
|
|
|
return -ENOENT;
|
2014-09-16 12:35:17 +00:00
|
|
|
}
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
/* do the open */
|
|
|
|
req = prepare_open_request(dir->i_sb, flags, mode);
|
2014-09-16 12:35:17 +00:00
|
|
|
if (IS_ERR(req)) {
|
|
|
|
err = PTR_ERR(req);
|
2019-05-26 07:35:39 +00:00
|
|
|
goto out_ctx;
|
2014-09-16 12:35:17 +00:00
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
req->r_dentry = dget(dentry);
|
|
|
|
req->r_num_caps = 2;
|
2019-11-27 17:06:14 +00:00
|
|
|
mask = CEPH_STAT_CAP_INODE | CEPH_CAP_AUTH_SHARED;
|
|
|
|
if (ceph_security_xattr_wanted(dir))
|
|
|
|
mask |= CEPH_CAP_XATTR_SHARED;
|
|
|
|
req->r_args.open.mask = cpu_to_le32(mask);
|
|
|
|
req->r_parent = dir;
|
2023-08-07 13:26:25 +00:00
|
|
|
if (req->r_op == CEPH_MDS_OP_CREATE)
|
|
|
|
req->r_mnt_idmap = mnt_idmap_get(idmap);
|
2021-06-18 17:05:06 +00:00
|
|
|
ihold(dir);
|
2021-01-26 19:12:24 +00:00
|
|
|
if (IS_ENCRYPTED(dir)) {
|
2022-08-25 13:31:06 +00:00
|
|
|
set_bit(CEPH_MDS_R_FSCRYPT_FILE, &req->r_req_flags);
|
2023-03-16 18:14:12 +00:00
|
|
|
err = fscrypt_prepare_lookup_partial(dir, dentry);
|
|
|
|
if (err < 0)
|
|
|
|
goto out_req;
|
2021-01-26 19:12:24 +00:00
|
|
|
}
|
2019-11-27 17:06:14 +00:00
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
if (flags & O_CREAT) {
|
2019-11-27 17:06:14 +00:00
|
|
|
struct ceph_file_layout lo;
|
|
|
|
|
2023-06-05 06:58:18 +00:00
|
|
|
req->r_dentry_drop = CEPH_CAP_FILE_SHARED | CEPH_CAP_AUTH_EXCL |
|
|
|
|
CEPH_CAP_XATTR_EXCL;
|
2009-10-06 18:31:08 +00:00
|
|
|
req->r_dentry_unless = CEPH_CAP_FILE_EXCL;
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
|
|
|
|
ceph_as_ctx_to_req(req, &as_ctx);
|
|
|
|
|
|
|
|
if (try_async && (req->r_dir_caps =
|
|
|
|
try_prep_async_create(dir, dentry, &lo,
|
|
|
|
&req->r_deleg_ino))) {
|
|
|
|
struct ceph_vino vino = { .ino = req->r_deleg_ino,
|
|
|
|
.snap = CEPH_NOSNAP };
|
2022-06-10 01:53:21 +00:00
|
|
|
struct ceph_dentry_info *di = ceph_dentry(dentry);
|
|
|
|
|
2019-11-27 17:06:14 +00:00
|
|
|
set_bit(CEPH_MDS_R_ASYNC, &req->r_req_flags);
|
|
|
|
req->r_args.open.flags |= cpu_to_le32(CEPH_O_EXCL);
|
|
|
|
req->r_callback = ceph_async_create_cb;
|
2022-06-10 01:53:21 +00:00
|
|
|
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
/* Hash inode before RPC */
|
|
|
|
new_inode = ceph_get_inode(dir->i_sb, vino, new_inode);
|
|
|
|
if (IS_ERR(new_inode)) {
|
|
|
|
err = PTR_ERR(new_inode);
|
|
|
|
new_inode = NULL;
|
|
|
|
goto out_req;
|
|
|
|
}
|
|
|
|
WARN_ON_ONCE(!(new_inode->i_state & I_NEW));
|
|
|
|
|
2022-06-10 01:53:21 +00:00
|
|
|
spin_lock(&dentry->d_lock);
|
|
|
|
di->flags |= CEPH_DENTRY_ASYNC_CREATE;
|
|
|
|
spin_unlock(&dentry->d_lock);
|
|
|
|
|
2019-11-27 17:06:14 +00:00
|
|
|
err = ceph_mdsc_submit_request(mdsc, dir, req);
|
|
|
|
if (!err) {
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
err = ceph_finish_async_create(dir, new_inode,
|
|
|
|
dentry, file,
|
|
|
|
mode, req,
|
|
|
|
&as_ctx, &lo);
|
|
|
|
new_inode = NULL;
|
2019-11-27 17:06:14 +00:00
|
|
|
} else if (err == -EJUKEBOX) {
|
|
|
|
restore_deleg_ino(dir, req->r_deleg_ino);
|
|
|
|
ceph_mdsc_put_request(req);
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
discard_new_inode(new_inode);
|
|
|
|
ceph_release_acl_sec_ctx(&as_ctx);
|
|
|
|
memset(&as_ctx, 0, sizeof(as_ctx));
|
|
|
|
new_inode = NULL;
|
2019-11-27 17:06:14 +00:00
|
|
|
try_async = false;
|
2022-01-25 20:39:16 +00:00
|
|
|
ceph_put_string(rcu_dereference_raw(lo.pool_ns));
|
2019-11-27 17:06:14 +00:00
|
|
|
goto retry;
|
|
|
|
}
|
2022-01-25 20:39:16 +00:00
|
|
|
ceph_put_string(rcu_dereference_raw(lo.pool_ns));
|
2019-11-27 17:06:14 +00:00
|
|
|
goto out_req;
|
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
}
|
2016-03-07 02:34:50 +00:00
|
|
|
|
2017-01-31 15:28:26 +00:00
|
|
|
set_bit(CEPH_MDS_R_PARENT_LOCKED, &req->r_req_flags);
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
req->r_new_inode = new_inode;
|
|
|
|
new_inode = NULL;
|
2022-07-01 02:52:27 +00:00
|
|
|
err = ceph_mdsc_do_request(mdsc, (flags & O_CREAT) ? dir : NULL, req);
|
2021-06-02 16:46:07 +00:00
|
|
|
if (err == -ENOENT) {
|
|
|
|
dentry = ceph_handle_snapdir(req, dentry);
|
|
|
|
if (IS_ERR(dentry)) {
|
|
|
|
err = PTR_ERR(dentry);
|
|
|
|
goto out_req;
|
|
|
|
}
|
|
|
|
err = 0;
|
2021-03-01 13:01:54 +00:00
|
|
|
}
|
2012-12-19 19:44:23 +00:00
|
|
|
|
2021-06-02 16:46:07 +00:00
|
|
|
if (!err && (flags & O_CREAT) && !req->r_reply_info.head->is_dentry)
|
2009-10-06 18:31:08 +00:00
|
|
|
err = ceph_handle_notrace_create(dir, dentry);
|
2012-06-05 13:10:25 +00:00
|
|
|
|
2016-07-05 13:44:53 +00:00
|
|
|
if (d_in_lookup(dentry)) {
|
2012-07-31 18:27:36 +00:00
|
|
|
dn = ceph_finish_lookup(req, dentry, err);
|
|
|
|
if (IS_ERR(dn))
|
|
|
|
err = PTR_ERR(dn);
|
|
|
|
} else {
|
|
|
|
/* we were given a hashed negative dentry */
|
|
|
|
dn = NULL;
|
|
|
|
}
|
|
|
|
if (err)
|
2014-09-16 12:35:17 +00:00
|
|
|
goto out_req;
|
2015-03-17 22:25:59 +00:00
|
|
|
if (dn || d_really_is_negative(dentry) || d_is_symlink(dentry)) {
|
2012-07-31 18:27:36 +00:00
|
|
|
/* make vfs retry on splice, ENOENT, or symlink */
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "finish_no_open on dn %p\n", dn);
|
2012-07-31 18:27:36 +00:00
|
|
|
err = finish_no_open(file, dn);
|
|
|
|
} else {
|
2021-07-01 18:40:51 +00:00
|
|
|
if (IS_ENCRYPTED(dir) &&
|
|
|
|
!fscrypt_has_permitted_context(dir, d_inode(dentry))) {
|
2023-06-12 01:04:07 +00:00
|
|
|
pr_warn_client(cl,
|
|
|
|
"Inconsistent encryption context (parent %llx:%llx child %llx:%llx)\n",
|
2021-07-01 18:40:51 +00:00
|
|
|
ceph_vinop(dir), ceph_vinop(d_inode(dentry)));
|
|
|
|
goto out_req;
|
|
|
|
}
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "finish_open on dn %p\n", dn);
|
2012-12-28 17:56:46 +00:00
|
|
|
if (req->r_op == CEPH_MDS_OP_CREATE && req->r_reply_info.has_create_ino) {
|
2020-01-02 12:11:38 +00:00
|
|
|
struct inode *newino = d_inode(dentry);
|
|
|
|
|
|
|
|
cache_file_layout(dir, newino);
|
|
|
|
ceph_init_inode_acls(newino, &as_ctx);
|
2018-06-08 17:22:02 +00:00
|
|
|
file->f_mode |= FMODE_CREATED;
|
2012-12-28 17:56:46 +00:00
|
|
|
}
|
2018-06-08 15:44:56 +00:00
|
|
|
err = finish_open(file, dentry, ceph_open);
|
2012-07-31 18:27:36 +00:00
|
|
|
}
|
2014-09-16 12:35:17 +00:00
|
|
|
out_req:
|
2012-07-31 18:27:36 +00:00
|
|
|
ceph_mdsc_put_request(req);
|
ceph: preallocate inode for ops that may create one
When creating a new inode, we need to determine the crypto context
before we can transmit the RPC. The fscrypt API has a routine for getting
a crypto context before a create occurs, but it requires an inode.
Change the ceph code to preallocate an inode in advance of a create of
any sort (open(), mknod(), symlink(), etc). Move the existing code that
generates the ACL and SELinux blobs into this routine since that's
mostly common across all the different codepaths.
In most cases, we just want to allow ceph_fill_trace to use that inode
after the reply comes in, so add a new field to the MDS request for it
(r_new_inode).
The async create codepath is a bit different though. In that case, we
want to hash the inode in advance of the RPC so that it can be used
before the reply comes in. If the call subsequently fails with
-EJUKEBOX, then just put the references and clean up the as_ctx. Note
that with this change, we now need to regenerate the as_ctx when this
occurs, but it's quite rare for it to happen.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2020-08-26 17:11:00 +00:00
|
|
|
iput(new_inode);
|
2019-05-26 07:35:39 +00:00
|
|
|
out_ctx:
|
|
|
|
ceph_release_acl_sec_ctx(&as_ctx);
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "result=%d\n", err);
|
2012-06-22 08:39:14 +00:00
|
|
|
return err;
|
2009-10-06 18:31:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int ceph_release(struct inode *inode, struct file *file)
|
|
|
|
{
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = ceph_inode_to_client(inode);
|
2009-10-06 18:31:08 +00:00
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
|
|
|
|
2018-03-13 02:42:44 +00:00
|
|
|
if (S_ISDIR(inode->i_mode)) {
|
|
|
|
struct ceph_dir_file_info *dfi = file->private_data;
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx dir file %p\n", inode,
|
|
|
|
ceph_vinop(inode), file);
|
2018-03-13 02:42:44 +00:00
|
|
|
WARN_ON(!list_empty(&dfi->file_info.rw_contexts));
|
|
|
|
|
2020-03-05 12:21:00 +00:00
|
|
|
ceph_put_fmode(ci, dfi->file_info.fmode, 1);
|
2018-03-13 02:42:44 +00:00
|
|
|
|
|
|
|
if (dfi->last_readdir)
|
|
|
|
ceph_mdsc_put_request(dfi->last_readdir);
|
|
|
|
kfree(dfi->last_name);
|
|
|
|
kfree(dfi->dir_info);
|
|
|
|
kmem_cache_free(ceph_dir_file_cachep, dfi);
|
|
|
|
} else {
|
|
|
|
struct ceph_file_info *fi = file->private_data;
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx regular file %p\n", inode,
|
|
|
|
ceph_vinop(inode), file);
|
2018-03-13 02:42:44 +00:00
|
|
|
WARN_ON(!list_empty(&fi->rw_contexts));
|
|
|
|
|
2021-12-07 13:44:50 +00:00
|
|
|
ceph_fscache_unuse_cookie(inode, file->f_mode & FMODE_WRITE);
|
2020-03-05 12:21:00 +00:00
|
|
|
ceph_put_fmode(ci, fi->fmode, 1);
|
|
|
|
|
2018-03-13 02:42:44 +00:00
|
|
|
kmem_cache_free(ceph_file_cachep, fi);
|
|
|
|
}
|
2010-03-01 17:57:54 +00:00
|
|
|
|
|
|
|
/* wake up anyone waiting for caps on this inode */
|
2010-07-27 20:11:08 +00:00
|
|
|
wake_up_all(&ci->i_cap_wq);
|
2009-10-06 18:31:08 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-11-14 14:36:18 +00:00
|
|
|
enum {
|
2015-12-23 13:23:38 +00:00
|
|
|
HAVE_RETRIED = 1,
|
|
|
|
CHECK_EOF = 2,
|
|
|
|
READ_INLINE = 3,
|
2014-11-14 14:36:18 +00:00
|
|
|
};
|
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
/*
|
|
|
|
* Completely synchronous read and write methods. Direct from __user
|
|
|
|
* buffer to osd, or directly to user pages (if O_DIRECT).
|
|
|
|
*
|
2018-09-29 08:02:19 +00:00
|
|
|
* If the read spans object boundary, just do multiple reads. (That's not
|
|
|
|
* atomic, but good enough for now.)
|
|
|
|
*
|
|
|
|
* If we get a short result from the OSD, check against i_size; we need to
|
|
|
|
* only return a short read to the caller if we hit EOF.
|
2009-10-06 18:31:08 +00:00
|
|
|
*/
|
2022-08-25 13:31:12 +00:00
|
|
|
ssize_t __ceph_sync_read(struct inode *inode, loff_t *ki_pos,
|
|
|
|
struct iov_iter *to, int *retry_op,
|
|
|
|
u64 *last_objver)
|
2009-10-06 18:31:08 +00:00
|
|
|
{
|
2018-09-29 08:02:19 +00:00
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
2023-06-12 02:50:38 +00:00
|
|
|
struct ceph_fs_client *fsc = ceph_inode_to_fs_client(inode);
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = fsc->client;
|
2018-09-29 08:02:19 +00:00
|
|
|
struct ceph_osd_client *osdc = &fsc->client->osdc;
|
2016-11-08 13:54:34 +00:00
|
|
|
ssize_t ret;
|
2022-08-25 13:31:12 +00:00
|
|
|
u64 off = *ki_pos;
|
2018-09-29 08:02:19 +00:00
|
|
|
u64 len = iov_iter_count(to);
|
2021-11-23 12:30:38 +00:00
|
|
|
u64 i_size = i_size_read(inode);
|
2022-08-25 13:31:22 +00:00
|
|
|
bool sparse = IS_ENCRYPTED(inode) || ceph_test_mount_opt(fsc, SPARSEREAD);
|
2022-08-25 13:31:12 +00:00
|
|
|
u64 objver = 0;
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "on inode %p %llx.%llx %llx~%llx\n", inode,
|
|
|
|
ceph_vinop(inode), *ki_pos, len);
|
2022-08-25 13:31:12 +00:00
|
|
|
|
|
|
|
if (ceph_inode_is_shutdown(inode))
|
|
|
|
return -EIO;
|
2014-07-21 02:15:48 +00:00
|
|
|
|
|
|
|
if (!len)
|
|
|
|
return 0;
|
2010-11-09 20:24:53 +00:00
|
|
|
/*
|
|
|
|
* flush any page cache pages in this range. this
|
|
|
|
* will make concurrent normal and sync io slow,
|
|
|
|
* but it will at least behave sensibly when they are
|
|
|
|
* in sequence.
|
|
|
|
*/
|
2019-02-01 11:19:15 +00:00
|
|
|
ret = filemap_write_and_wait_range(inode->i_mapping,
|
|
|
|
off, off + len - 1);
|
2010-02-09 19:14:41 +00:00
|
|
|
if (ret < 0)
|
2013-09-26 06:42:17 +00:00
|
|
|
return ret;
|
2010-02-09 19:14:41 +00:00
|
|
|
|
2018-09-29 08:02:19 +00:00
|
|
|
ret = 0;
|
|
|
|
while ((len = iov_iter_count(to)) > 0) {
|
|
|
|
struct ceph_osd_request *req;
|
|
|
|
struct page **pages;
|
|
|
|
int num_pages;
|
2016-11-08 13:54:34 +00:00
|
|
|
size_t page_off;
|
2018-09-29 08:02:19 +00:00
|
|
|
bool more;
|
2020-08-22 04:20:59 +00:00
|
|
|
int idx;
|
|
|
|
size_t left;
|
2022-02-26 11:33:03 +00:00
|
|
|
struct ceph_osd_req_op *op;
|
2022-08-25 13:31:22 +00:00
|
|
|
u64 read_off = off;
|
|
|
|
u64 read_len = len;
|
2023-11-07 02:44:41 +00:00
|
|
|
int extent_cnt;
|
2022-08-25 13:31:22 +00:00
|
|
|
|
|
|
|
/* determine new offset/length if encrypted */
|
|
|
|
ceph_fscrypt_adjust_off_and_len(inode, &read_off, &read_len);
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "orig %llu~%llu reading %llu~%llu", off, len,
|
|
|
|
read_off, read_len);
|
2018-09-29 08:02:19 +00:00
|
|
|
|
|
|
|
req = ceph_osdc_new_request(osdc, &ci->i_layout,
|
2022-08-25 13:31:22 +00:00
|
|
|
ci->i_vino, read_off, &read_len, 0, 1,
|
|
|
|
sparse ? CEPH_OSD_OP_SPARSE_READ :
|
|
|
|
CEPH_OSD_OP_READ,
|
2022-02-26 11:33:03 +00:00
|
|
|
CEPH_OSD_FLAG_READ,
|
2018-09-29 08:02:19 +00:00
|
|
|
NULL, ci->i_truncate_seq,
|
|
|
|
ci->i_truncate_size, false);
|
|
|
|
if (IS_ERR(req)) {
|
|
|
|
ret = PTR_ERR(req);
|
|
|
|
break;
|
|
|
|
}
|
2016-11-08 13:54:34 +00:00
|
|
|
|
2022-08-25 13:31:22 +00:00
|
|
|
/* adjust len downward if the request truncated the len */
|
|
|
|
if (off + len > read_off + read_len)
|
|
|
|
len = read_off + read_len - off;
|
2018-09-29 08:02:19 +00:00
|
|
|
more = len < iov_iter_count(to);
|
|
|
|
|
2022-08-25 13:31:22 +00:00
|
|
|
num_pages = calc_pages_for(read_off, read_len);
|
|
|
|
page_off = offset_in_page(off);
|
2020-08-22 04:20:59 +00:00
|
|
|
pages = ceph_alloc_page_vector(num_pages, GFP_KERNEL);
|
|
|
|
if (IS_ERR(pages)) {
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
ret = PTR_ERR(pages);
|
|
|
|
break;
|
2016-11-08 13:54:34 +00:00
|
|
|
}
|
2018-09-29 08:02:19 +00:00
|
|
|
|
2022-08-25 13:31:22 +00:00
|
|
|
osd_req_op_extent_osd_data_pages(req, 0, pages, read_len,
|
|
|
|
offset_in_page(read_off),
|
2018-09-29 08:02:19 +00:00
|
|
|
false, false);
|
2022-02-26 11:33:03 +00:00
|
|
|
|
|
|
|
op = &req->r_ops[0];
|
|
|
|
if (sparse) {
|
2023-11-07 02:44:41 +00:00
|
|
|
extent_cnt = __ceph_sparse_read_ext_count(inode, read_len);
|
|
|
|
ret = ceph_alloc_sparse_ext_map(op, extent_cnt);
|
2022-02-26 11:33:03 +00:00
|
|
|
if (ret) {
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-30 20:21:50 +00:00
|
|
|
ceph_osdc_start_request(osdc, req);
|
|
|
|
ret = ceph_osdc_wait_request(osdc, req);
|
2020-03-20 03:45:01 +00:00
|
|
|
|
2021-03-22 12:28:49 +00:00
|
|
|
ceph_update_read_metrics(&fsc->mdsc->metric,
|
2020-03-20 03:45:01 +00:00
|
|
|
req->r_start_latency,
|
|
|
|
req->r_end_latency,
|
2022-08-25 13:31:22 +00:00
|
|
|
read_len, ret);
|
2020-03-20 03:45:01 +00:00
|
|
|
|
2022-08-25 13:31:12 +00:00
|
|
|
if (ret > 0)
|
|
|
|
objver = req->r_version;
|
|
|
|
|
2018-09-29 08:02:19 +00:00
|
|
|
i_size = i_size_read(inode);
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%llu~%llu got %zd i_size %llu%s\n", off, len,
|
|
|
|
ret, i_size, (more ? " MORE" : ""));
|
2018-09-29 08:02:19 +00:00
|
|
|
|
2022-02-26 11:33:03 +00:00
|
|
|
/* Fix it to go to end of extent map */
|
|
|
|
if (sparse && ret >= 0)
|
|
|
|
ret = ceph_sparse_ext_map_end(op);
|
|
|
|
else if (ret == -ENOENT)
|
2018-09-29 08:02:19 +00:00
|
|
|
ret = 0;
|
2022-02-26 11:33:03 +00:00
|
|
|
|
2022-08-25 13:31:22 +00:00
|
|
|
if (ret > 0 && IS_ENCRYPTED(inode)) {
|
|
|
|
int fret;
|
|
|
|
|
|
|
|
fret = ceph_fscrypt_decrypt_extents(inode, pages,
|
|
|
|
read_off, op->extent.sparse_ext,
|
|
|
|
op->extent.sparse_ext_cnt);
|
|
|
|
if (fret < 0) {
|
|
|
|
ret = fret;
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* account for any partial block at the beginning */
|
|
|
|
fret -= (off - read_off);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Short read after big offset adjustment?
|
|
|
|
* Nothing is usable, just call it a zero
|
|
|
|
* len read.
|
|
|
|
*/
|
|
|
|
fret = max(fret, 0);
|
|
|
|
|
|
|
|
/* account for partial block at the end */
|
|
|
|
ret = min_t(ssize_t, fret, len);
|
|
|
|
}
|
|
|
|
|
2022-02-26 11:33:03 +00:00
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
|
2022-08-25 13:31:22 +00:00
|
|
|
/* Short read but not EOF? Zero out the remainder. */
|
2018-09-29 08:02:19 +00:00
|
|
|
if (ret >= 0 && ret < len && (off + ret < i_size)) {
|
|
|
|
int zlen = min(len - ret, i_size - off - ret);
|
|
|
|
int zoff = page_off + ret;
|
2022-02-26 11:33:03 +00:00
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "zero gap %llu~%llu\n", off + ret,
|
|
|
|
off + ret + zlen);
|
2018-09-29 08:02:19 +00:00
|
|
|
ceph_zero_page_vector_range(zoff, zlen, pages);
|
|
|
|
ret += zlen;
|
|
|
|
}
|
|
|
|
|
2020-08-22 04:20:59 +00:00
|
|
|
idx = 0;
|
2024-02-21 01:16:12 +00:00
|
|
|
if (ret <= 0)
|
|
|
|
left = 0;
|
|
|
|
else if (off + ret > i_size)
|
|
|
|
left = i_size - off;
|
|
|
|
else
|
|
|
|
left = ret;
|
2020-08-22 04:20:59 +00:00
|
|
|
while (left > 0) {
|
2022-08-25 13:31:22 +00:00
|
|
|
size_t plen, copied;
|
|
|
|
|
|
|
|
plen = min_t(size_t, left, PAGE_SIZE - page_off);
|
2020-08-22 04:20:59 +00:00
|
|
|
SetPageUptodate(pages[idx]);
|
|
|
|
copied = copy_page_to_iter(pages[idx++],
|
2022-08-25 13:31:22 +00:00
|
|
|
page_off, plen, to);
|
2020-08-22 04:20:59 +00:00
|
|
|
off += copied;
|
|
|
|
left -= copied;
|
2022-08-25 13:31:22 +00:00
|
|
|
page_off = 0;
|
|
|
|
if (copied < plen) {
|
2020-08-22 04:20:59 +00:00
|
|
|
ret = -EFAULT;
|
|
|
|
break;
|
2016-11-08 13:54:34 +00:00
|
|
|
}
|
2013-09-26 06:42:17 +00:00
|
|
|
}
|
2020-08-22 04:20:59 +00:00
|
|
|
ceph_release_page_vector(pages, num_pages);
|
2018-09-29 08:02:19 +00:00
|
|
|
|
2019-07-25 12:16:47 +00:00
|
|
|
if (ret < 0) {
|
2020-09-14 11:39:19 +00:00
|
|
|
if (ret == -EBLOCKLISTED)
|
|
|
|
fsc->blocklisted = true;
|
2019-07-25 12:16:47 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (off >= i_size || !more)
|
2018-09-29 08:02:19 +00:00
|
|
|
break;
|
2013-09-26 06:42:17 +00:00
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2022-08-25 13:31:22 +00:00
|
|
|
if (ret > 0) {
|
2024-02-21 01:16:12 +00:00
|
|
|
if (off >= i_size) {
|
|
|
|
*retry_op = CHECK_EOF;
|
|
|
|
ret = i_size - *ki_pos;
|
|
|
|
*ki_pos = i_size;
|
|
|
|
} else {
|
|
|
|
ret = off - *ki_pos;
|
|
|
|
*ki_pos = off;
|
2021-10-30 05:16:40 +00:00
|
|
|
}
|
2022-08-25 13:31:12 +00:00
|
|
|
|
2022-08-25 13:31:22 +00:00
|
|
|
if (last_objver)
|
|
|
|
*last_objver = objver;
|
|
|
|
}
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "result %zd retry_op %d\n", ret, *retry_op);
|
2009-10-06 18:31:08 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2022-08-25 13:31:12 +00:00
|
|
|
static ssize_t ceph_sync_read(struct kiocb *iocb, struct iov_iter *to,
|
|
|
|
int *retry_op)
|
|
|
|
{
|
|
|
|
struct file *file = iocb->ki_filp;
|
|
|
|
struct inode *inode = file_inode(file);
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = ceph_inode_to_client(inode);
|
2022-08-25 13:31:12 +00:00
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "on file %p %llx~%zx %s\n", file, iocb->ki_pos,
|
|
|
|
iov_iter_count(to),
|
|
|
|
(file->f_flags & O_DIRECT) ? "O_DIRECT" : "");
|
2022-08-25 13:31:12 +00:00
|
|
|
|
|
|
|
return __ceph_sync_read(inode, &iocb->ki_pos, to, retry_op, NULL);
|
|
|
|
}
|
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
struct ceph_aio_request {
|
|
|
|
struct kiocb *iocb;
|
|
|
|
size_t total_len;
|
2018-03-16 03:22:29 +00:00
|
|
|
bool write;
|
|
|
|
bool should_dirty;
|
2015-12-23 13:23:38 +00:00
|
|
|
int error;
|
|
|
|
struct list_head osd_reqs;
|
|
|
|
unsigned num_reqs;
|
|
|
|
atomic_t pending_reqs;
|
2018-07-13 20:18:37 +00:00
|
|
|
struct timespec64 mtime;
|
2015-12-23 13:23:38 +00:00
|
|
|
struct ceph_cap_flush *prealloc_cf;
|
|
|
|
};
|
|
|
|
|
2015-12-24 00:44:20 +00:00
|
|
|
struct ceph_aio_work {
|
|
|
|
struct work_struct work;
|
|
|
|
struct ceph_osd_request *req;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void ceph_aio_retry_work(struct work_struct *work);
|
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
static void ceph_aio_complete(struct inode *inode,
|
|
|
|
struct ceph_aio_request *aio_req)
|
|
|
|
{
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = ceph_inode_to_client(inode);
|
2015-12-23 13:23:38 +00:00
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!atomic_dec_and_test(&aio_req->pending_reqs))
|
|
|
|
return;
|
|
|
|
|
2019-11-13 14:56:06 +00:00
|
|
|
if (aio_req->iocb->ki_flags & IOCB_DIRECT)
|
|
|
|
inode_dio_end(inode);
|
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
ret = aio_req->error;
|
|
|
|
if (!ret)
|
|
|
|
ret = aio_req->total_len;
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx rc %d\n", inode, ceph_vinop(inode), ret);
|
2015-12-23 13:23:38 +00:00
|
|
|
|
|
|
|
if (ret >= 0 && aio_req->write) {
|
|
|
|
int dirty;
|
|
|
|
|
|
|
|
loff_t endoff = aio_req->iocb->ki_pos + aio_req->total_len;
|
|
|
|
if (endoff > i_size_read(inode)) {
|
|
|
|
if (ceph_inode_set_size(inode, endoff))
|
2022-10-18 01:03:29 +00:00
|
|
|
ceph_check_caps(ci, CHECK_CAPS_AUTHONLY);
|
2015-12-23 13:23:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
spin_lock(&ci->i_ceph_lock);
|
|
|
|
dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_FILE_WR,
|
|
|
|
&aio_req->prealloc_cf);
|
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
|
|
|
if (dirty)
|
|
|
|
__mark_inode_dirty(inode, dirty);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
ceph_put_cap_refs(ci, (aio_req->write ? CEPH_CAP_FILE_WR :
|
|
|
|
CEPH_CAP_FILE_RD));
|
|
|
|
|
2021-10-21 15:22:35 +00:00
|
|
|
aio_req->iocb->ki_complete(aio_req->iocb, ret);
|
2015-12-23 13:23:38 +00:00
|
|
|
|
|
|
|
ceph_free_cap_flush(aio_req->prealloc_cf);
|
|
|
|
kfree(aio_req);
|
|
|
|
}
|
|
|
|
|
2016-04-28 14:07:24 +00:00
|
|
|
static void ceph_aio_complete_req(struct ceph_osd_request *req)
|
2015-12-23 13:23:38 +00:00
|
|
|
{
|
|
|
|
int rc = req->r_result;
|
|
|
|
struct inode *inode = req->r_inode;
|
|
|
|
struct ceph_aio_request *aio_req = req->r_priv;
|
|
|
|
struct ceph_osd_data *osd_data = osd_req_op_extent_osd_data(req, 0);
|
2022-02-26 11:33:03 +00:00
|
|
|
struct ceph_osd_req_op *op = &req->r_ops[0];
|
2020-09-03 13:01:39 +00:00
|
|
|
struct ceph_client_metric *metric = &ceph_sb_to_mdsc(inode->i_sb)->metric;
|
2021-05-13 01:40:53 +00:00
|
|
|
unsigned int len = osd_data->bvec_pos.iter.bi_size;
|
2022-02-26 11:33:03 +00:00
|
|
|
bool sparse = (op->op == CEPH_OSD_OP_SPARSE_READ);
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = ceph_inode_to_client(inode);
|
2015-12-23 13:23:38 +00:00
|
|
|
|
2018-05-04 14:57:31 +00:00
|
|
|
BUG_ON(osd_data->type != CEPH_OSD_DATA_TYPE_BVECS);
|
|
|
|
BUG_ON(!osd_data->num_bvecs);
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "req %p inode %p %llx.%llx, rc %d bytes %u\n", req,
|
|
|
|
inode, ceph_vinop(inode), rc, len);
|
2015-12-23 13:23:38 +00:00
|
|
|
|
|
|
|
if (rc == -EOLDSNAPC) {
|
2015-12-24 00:44:20 +00:00
|
|
|
struct ceph_aio_work *aio_work;
|
|
|
|
BUG_ON(!aio_req->write);
|
|
|
|
|
|
|
|
aio_work = kmalloc(sizeof(*aio_work), GFP_NOFS);
|
|
|
|
if (aio_work) {
|
|
|
|
INIT_WORK(&aio_work->work, ceph_aio_retry_work);
|
|
|
|
aio_work->req = req;
|
2023-06-12 02:50:38 +00:00
|
|
|
queue_work(ceph_inode_to_fs_client(inode)->inode_wq,
|
2015-12-24 00:44:20 +00:00
|
|
|
&aio_work->work);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
rc = -ENOMEM;
|
|
|
|
} else if (!aio_req->write) {
|
2022-02-26 11:33:03 +00:00
|
|
|
if (sparse && rc >= 0)
|
|
|
|
rc = ceph_sparse_ext_map_end(op);
|
2015-12-23 13:23:38 +00:00
|
|
|
if (rc == -ENOENT)
|
|
|
|
rc = 0;
|
2021-05-13 01:40:53 +00:00
|
|
|
if (rc >= 0 && len > rc) {
|
2018-05-04 14:57:31 +00:00
|
|
|
struct iov_iter i;
|
2021-05-13 01:40:53 +00:00
|
|
|
int zlen = len - rc;
|
2018-05-04 14:57:31 +00:00
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
/*
|
|
|
|
* If read is satisfied by single OSD request,
|
|
|
|
* it can pass EOF. Otherwise read is within
|
|
|
|
* i_size.
|
|
|
|
*/
|
|
|
|
if (aio_req->num_reqs == 1) {
|
|
|
|
loff_t i_size = i_size_read(inode);
|
|
|
|
loff_t endoff = aio_req->iocb->ki_pos + rc;
|
|
|
|
if (endoff < i_size)
|
|
|
|
zlen = min_t(size_t, zlen,
|
|
|
|
i_size - endoff);
|
|
|
|
aio_req->total_len = rc + zlen;
|
|
|
|
}
|
|
|
|
|
2022-09-16 00:25:47 +00:00
|
|
|
iov_iter_bvec(&i, ITER_DEST, osd_data->bvec_pos.bvecs,
|
2021-05-13 01:40:53 +00:00
|
|
|
osd_data->num_bvecs, len);
|
2018-05-04 14:57:31 +00:00
|
|
|
iov_iter_advance(&i, rc);
|
|
|
|
iov_iter_zero(zlen, &i);
|
2015-12-23 13:23:38 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-22 12:28:51 +00:00
|
|
|
/* r_start_latency == 0 means the request was not submitted */
|
|
|
|
if (req->r_start_latency) {
|
|
|
|
if (aio_req->write)
|
|
|
|
ceph_update_write_metrics(metric, req->r_start_latency,
|
2021-05-13 01:40:53 +00:00
|
|
|
req->r_end_latency, len, rc);
|
2021-03-22 12:28:51 +00:00
|
|
|
else
|
|
|
|
ceph_update_read_metrics(metric, req->r_start_latency,
|
2021-05-13 01:40:53 +00:00
|
|
|
req->r_end_latency, len, rc);
|
2021-03-22 12:28:51 +00:00
|
|
|
}
|
|
|
|
|
2018-05-04 14:57:31 +00:00
|
|
|
put_bvecs(osd_data->bvec_pos.bvecs, osd_data->num_bvecs,
|
|
|
|
aio_req->should_dirty);
|
2015-12-23 13:23:38 +00:00
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
|
|
|
|
if (rc < 0)
|
|
|
|
cmpxchg(&aio_req->error, 0, rc);
|
|
|
|
|
|
|
|
ceph_aio_complete(inode, aio_req);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-12-24 00:44:20 +00:00
|
|
|
static void ceph_aio_retry_work(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct ceph_aio_work *aio_work =
|
|
|
|
container_of(work, struct ceph_aio_work, work);
|
|
|
|
struct ceph_osd_request *orig_req = aio_work->req;
|
|
|
|
struct ceph_aio_request *aio_req = orig_req->r_priv;
|
|
|
|
struct inode *inode = orig_req->r_inode;
|
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
|
|
|
struct ceph_snap_context *snapc;
|
|
|
|
struct ceph_osd_request *req;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
spin_lock(&ci->i_ceph_lock);
|
|
|
|
if (__ceph_have_pending_cap_snap(ci)) {
|
|
|
|
struct ceph_cap_snap *capsnap =
|
|
|
|
list_last_entry(&ci->i_cap_snaps,
|
|
|
|
struct ceph_cap_snap,
|
|
|
|
ci_item);
|
|
|
|
snapc = ceph_get_snap_context(capsnap->context);
|
|
|
|
} else {
|
|
|
|
BUG_ON(!ci->i_head_snapc);
|
|
|
|
snapc = ceph_get_snap_context(ci->i_head_snapc);
|
|
|
|
}
|
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
|
|
|
|
2018-10-11 14:15:38 +00:00
|
|
|
req = ceph_osdc_alloc_request(orig_req->r_osdc, snapc, 1,
|
2015-12-24 00:44:20 +00:00
|
|
|
false, GFP_NOFS);
|
2016-01-26 09:24:44 +00:00
|
|
|
if (!req) {
|
|
|
|
ret = -ENOMEM;
|
2015-12-24 00:44:20 +00:00
|
|
|
req = orig_req;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2017-08-16 09:27:05 +00:00
|
|
|
req->r_flags = /* CEPH_OSD_FLAG_ORDERSNAP | */ CEPH_OSD_FLAG_WRITE;
|
2016-04-28 14:07:23 +00:00
|
|
|
ceph_oloc_copy(&req->r_base_oloc, &orig_req->r_base_oloc);
|
2016-04-29 17:54:20 +00:00
|
|
|
ceph_oid_copy(&req->r_base_oid, &orig_req->r_base_oid);
|
2015-12-24 00:44:20 +00:00
|
|
|
|
2018-10-15 14:11:37 +00:00
|
|
|
req->r_ops[0] = orig_req->r_ops[0];
|
|
|
|
|
|
|
|
req->r_mtime = aio_req->mtime;
|
|
|
|
req->r_data_offset = req->r_ops[0].extent.offset;
|
|
|
|
|
2016-04-27 12:15:51 +00:00
|
|
|
ret = ceph_osdc_alloc_messages(req, GFP_NOFS);
|
|
|
|
if (ret) {
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
req = orig_req;
|
|
|
|
goto out;
|
|
|
|
}
|
2015-12-24 00:44:20 +00:00
|
|
|
|
|
|
|
ceph_osdc_put_request(orig_req);
|
|
|
|
|
|
|
|
req->r_callback = ceph_aio_complete_req;
|
|
|
|
req->r_inode = inode;
|
|
|
|
req->r_priv = aio_req;
|
|
|
|
|
2022-06-30 20:21:50 +00:00
|
|
|
ceph_osdc_start_request(req->r_osdc, req);
|
2015-12-24 00:44:20 +00:00
|
|
|
out:
|
|
|
|
if (ret < 0) {
|
|
|
|
req->r_result = ret;
|
2016-04-28 14:07:24 +00:00
|
|
|
ceph_aio_complete_req(req);
|
2015-12-24 00:44:20 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 15:05:37 +00:00
|
|
|
ceph_put_snap_context(snapc);
|
2015-12-24 00:44:20 +00:00
|
|
|
kfree(aio_work);
|
|
|
|
}
|
|
|
|
|
2013-09-12 05:54:26 +00:00
|
|
|
static ssize_t
|
2015-12-23 13:23:38 +00:00
|
|
|
ceph_direct_read_write(struct kiocb *iocb, struct iov_iter *iter,
|
|
|
|
struct ceph_snap_context *snapc,
|
|
|
|
struct ceph_cap_flush **pcf)
|
2009-10-06 18:31:08 +00:00
|
|
|
{
|
2013-09-12 05:54:26 +00:00
|
|
|
struct file *file = iocb->ki_filp;
|
2013-01-23 22:07:38 +00:00
|
|
|
struct inode *inode = file_inode(file);
|
2009-10-06 18:31:08 +00:00
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
2023-06-12 02:50:38 +00:00
|
|
|
struct ceph_fs_client *fsc = ceph_inode_to_fs_client(inode);
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = fsc->client;
|
2020-03-20 03:45:01 +00:00
|
|
|
struct ceph_client_metric *metric = &fsc->mdsc->metric;
|
2013-03-14 19:09:05 +00:00
|
|
|
struct ceph_vino vino;
|
2009-10-06 18:31:08 +00:00
|
|
|
struct ceph_osd_request *req;
|
2018-05-04 14:57:31 +00:00
|
|
|
struct bio_vec *bvecs;
|
2015-12-23 13:23:38 +00:00
|
|
|
struct ceph_aio_request *aio_req = NULL;
|
|
|
|
int num_pages = 0;
|
2009-10-06 18:31:08 +00:00
|
|
|
int flags;
|
ceph: add buffered/direct exclusionary locking for reads and writes
xfstest generic/451 intermittently fails. The test does O_DIRECT writes
to a file, and then reads back the result using buffered I/O, while
running a separate set of tasks that are also doing buffered reads.
The client will invalidate the cache prior to a direct write, but it's
easy for one of the other readers' replies to race in and reinstantiate
the invalidated range with stale data.
To fix this, we must to serialize direct I/O writes and buffered reads.
We could just sprinkle in some shared locks on the i_rwsem for reads,
and increase the exclusive footprint on the write side, but that would
cause O_DIRECT writes to end up serialized vs. other direct requests.
Instead, borrow the scheme used by nfs.ko. Buffered writes take the
i_rwsem exclusively, but buffered reads take a shared lock, allowing
them to run in parallel.
O_DIRECT requests also take a shared lock, but we need for them to not
run in parallel with buffered reads. A flag on the ceph_inode_info is
used to indicate whether it's in direct or buffered I/O mode. When a
conflicting request is submitted, it will block until the inode can be
flipped to the necessary mode.
Link: https://tracker.ceph.com/issues/40985
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: "Yan, Zheng" <zyan@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2019-08-02 17:15:39 +00:00
|
|
|
int ret = 0;
|
2018-07-13 20:18:37 +00:00
|
|
|
struct timespec64 mtime = current_time(inode);
|
2015-12-23 13:23:38 +00:00
|
|
|
size_t count = iov_iter_count(iter);
|
|
|
|
loff_t pos = iocb->ki_pos;
|
|
|
|
bool write = iov_iter_rw(iter) == WRITE;
|
2022-05-22 18:59:25 +00:00
|
|
|
bool should_dirty = !write && user_backed_iter(iter);
|
2022-02-26 11:33:03 +00:00
|
|
|
bool sparse = ceph_test_mount_opt(fsc, SPARSEREAD);
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
if (write && ceph_snap(file_inode(file)) != CEPH_NOSNAP)
|
2009-10-06 18:31:08 +00:00
|
|
|
return -EROFS;
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "sync_direct_%s on file %p %lld~%u snapc %p seq %lld\n",
|
|
|
|
(write ? "write" : "read"), file, pos, (unsigned)count,
|
|
|
|
snapc, snapc ? snapc->seq : 0);
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
if (write) {
|
2021-12-07 13:44:50 +00:00
|
|
|
int ret2;
|
|
|
|
|
|
|
|
ceph_fscache_invalidate(inode, true);
|
|
|
|
|
|
|
|
ret2 = invalidate_inode_pages2_range(inode->i_mapping,
|
mm, fs: get rid of PAGE_CACHE_* and page_cache_{get,release} macros
PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} macros were introduced *long* time
ago with promise that one day it will be possible to implement page
cache with bigger chunks than PAGE_SIZE.
This promise never materialized. And unlikely will.
We have many places where PAGE_CACHE_SIZE assumed to be equal to
PAGE_SIZE. And it's constant source of confusion on whether
PAGE_CACHE_* or PAGE_* constant should be used in a particular case,
especially on the border between fs and mm.
Global switching to PAGE_CACHE_SIZE != PAGE_SIZE would cause to much
breakage to be doable.
Let's stop pretending that pages in page cache are special. They are
not.
The changes are pretty straight-forward:
- <foo> << (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- <foo> >> (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} -> PAGE_{SIZE,SHIFT,MASK,ALIGN};
- page_cache_get() -> get_page();
- page_cache_release() -> put_page();
This patch contains automated changes generated with coccinelle using
script below. For some reason, coccinelle doesn't patch header files.
I've called spatch for them manually.
The only adjustment after coccinelle is revert of changes to
PAGE_CAHCE_ALIGN definition: we are going to drop it later.
There are few places in the code where coccinelle didn't reach. I'll
fix them manually in a separate patch. Comments and documentation also
will be addressed with the separate patch.
virtual patch
@@
expression E;
@@
- E << (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
expression E;
@@
- E >> (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
@@
- PAGE_CACHE_SHIFT
+ PAGE_SHIFT
@@
@@
- PAGE_CACHE_SIZE
+ PAGE_SIZE
@@
@@
- PAGE_CACHE_MASK
+ PAGE_MASK
@@
expression E;
@@
- PAGE_CACHE_ALIGN(E)
+ PAGE_ALIGN(E)
@@
expression E;
@@
- page_cache_get(E)
+ get_page(E)
@@
expression E;
@@
- page_cache_release(E)
+ put_page(E)
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-04-01 12:29:47 +00:00
|
|
|
pos >> PAGE_SHIFT,
|
2019-02-01 11:19:15 +00:00
|
|
|
(pos + count - 1) >> PAGE_SHIFT);
|
2016-09-01 14:26:23 +00:00
|
|
|
if (ret2 < 0)
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "invalidate_inode_pages2_range returned %d\n",
|
|
|
|
ret2);
|
2010-02-09 19:14:41 +00:00
|
|
|
|
2017-08-16 09:27:05 +00:00
|
|
|
flags = /* CEPH_OSD_FLAG_ORDERSNAP | */ CEPH_OSD_FLAG_WRITE;
|
2015-12-23 13:23:38 +00:00
|
|
|
} else {
|
|
|
|
flags = CEPH_OSD_FLAG_READ;
|
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
while (iov_iter_count(iter) > 0) {
|
2018-05-04 14:57:31 +00:00
|
|
|
u64 size = iov_iter_count(iter);
|
2015-12-23 13:23:38 +00:00
|
|
|
ssize_t len;
|
2022-02-26 11:33:03 +00:00
|
|
|
struct ceph_osd_req_op *op;
|
|
|
|
int readop = sparse ? CEPH_OSD_OP_SPARSE_READ : CEPH_OSD_OP_READ;
|
2023-11-07 02:44:41 +00:00
|
|
|
int extent_cnt;
|
2013-09-12 05:54:26 +00:00
|
|
|
|
2018-05-03 14:10:09 +00:00
|
|
|
if (write)
|
|
|
|
size = min_t(u64, size, fsc->mount_options->wsize);
|
|
|
|
else
|
|
|
|
size = min_t(u64, size, fsc->mount_options->rsize);
|
|
|
|
|
2013-09-12 05:54:26 +00:00
|
|
|
vino = ceph_vino(inode);
|
|
|
|
req = ceph_osdc_new_request(&fsc->client->osdc, &ci->i_layout,
|
2015-12-23 13:23:38 +00:00
|
|
|
vino, pos, &size, 0,
|
2017-07-21 09:20:10 +00:00
|
|
|
1,
|
2022-02-26 11:33:03 +00:00
|
|
|
write ? CEPH_OSD_OP_WRITE : readop,
|
2015-12-23 13:23:38 +00:00
|
|
|
flags, snapc,
|
2013-09-12 05:54:26 +00:00
|
|
|
ci->i_truncate_seq,
|
|
|
|
ci->i_truncate_size,
|
|
|
|
false);
|
|
|
|
if (IS_ERR(req)) {
|
|
|
|
ret = PTR_ERR(req);
|
2014-04-04 02:44:19 +00:00
|
|
|
break;
|
2013-09-12 05:54:26 +00:00
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2018-05-04 14:57:31 +00:00
|
|
|
len = iter_get_bvecs_alloc(iter, size, &bvecs, &num_pages);
|
|
|
|
if (len < 0) {
|
2014-04-04 02:58:25 +00:00
|
|
|
ceph_osdc_put_request(req);
|
2018-05-04 14:57:31 +00:00
|
|
|
ret = len;
|
2014-04-04 02:58:25 +00:00
|
|
|
break;
|
2009-10-06 18:31:08 +00:00
|
|
|
}
|
2018-05-04 14:57:31 +00:00
|
|
|
if (len != size)
|
|
|
|
osd_req_op_extent_update(req, 0, len);
|
2009-10-06 18:31:08 +00:00
|
|
|
|
|
|
|
/*
|
2015-12-23 13:23:38 +00:00
|
|
|
* To simplify error handling, allow AIO when IO within i_size
|
|
|
|
* or IO can be satisfied by single OSD request.
|
2009-10-06 18:31:08 +00:00
|
|
|
*/
|
2015-12-23 13:23:38 +00:00
|
|
|
if (pos == iocb->ki_pos && !is_sync_kiocb(iocb) &&
|
|
|
|
(len == count || pos + count <= i_size_read(inode))) {
|
|
|
|
aio_req = kzalloc(sizeof(*aio_req), GFP_KERNEL);
|
|
|
|
if (aio_req) {
|
|
|
|
aio_req->iocb = iocb;
|
|
|
|
aio_req->write = write;
|
2018-03-16 03:22:29 +00:00
|
|
|
aio_req->should_dirty = should_dirty;
|
2015-12-23 13:23:38 +00:00
|
|
|
INIT_LIST_HEAD(&aio_req->osd_reqs);
|
|
|
|
if (write) {
|
2015-12-24 00:44:20 +00:00
|
|
|
aio_req->mtime = mtime;
|
2015-12-23 13:23:38 +00:00
|
|
|
swap(aio_req->prealloc_cf, *pcf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* ignore error */
|
|
|
|
}
|
|
|
|
|
|
|
|
if (write) {
|
|
|
|
/*
|
|
|
|
* throw out any page cache pages in this range. this
|
|
|
|
* may block.
|
|
|
|
*/
|
|
|
|
truncate_inode_pages_range(inode->i_mapping, pos,
|
2019-07-01 17:16:34 +00:00
|
|
|
PAGE_ALIGN(pos + len) - 1);
|
2015-12-23 13:23:38 +00:00
|
|
|
|
2016-05-25 22:29:52 +00:00
|
|
|
req->r_mtime = mtime;
|
2015-12-23 13:23:38 +00:00
|
|
|
}
|
|
|
|
|
2018-05-04 14:57:31 +00:00
|
|
|
osd_req_op_extent_osd_data_bvecs(req, 0, bvecs, num_pages, len);
|
2022-02-26 11:33:03 +00:00
|
|
|
op = &req->r_ops[0];
|
|
|
|
if (sparse) {
|
2023-11-07 02:44:41 +00:00
|
|
|
extent_cnt = __ceph_sparse_read_ext_count(inode, size);
|
|
|
|
ret = ceph_alloc_sparse_ext_map(op, extent_cnt);
|
2022-02-26 11:33:03 +00:00
|
|
|
if (ret) {
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2013-09-12 05:54:26 +00:00
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
if (aio_req) {
|
|
|
|
aio_req->total_len += len;
|
|
|
|
aio_req->num_reqs++;
|
|
|
|
atomic_inc(&aio_req->pending_reqs);
|
|
|
|
|
|
|
|
req->r_callback = ceph_aio_complete_req;
|
|
|
|
req->r_inode = inode;
|
|
|
|
req->r_priv = aio_req;
|
2019-07-08 10:50:09 +00:00
|
|
|
list_add_tail(&req->r_private_item, &aio_req->osd_reqs);
|
2015-12-23 13:23:38 +00:00
|
|
|
|
|
|
|
pos += len;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2022-06-30 20:21:50 +00:00
|
|
|
ceph_osdc_start_request(req->r_osdc, req);
|
|
|
|
ret = ceph_osdc_wait_request(&fsc->client->osdc, req);
|
2013-09-12 05:54:26 +00:00
|
|
|
|
2020-03-20 03:45:01 +00:00
|
|
|
if (write)
|
2021-03-22 12:28:49 +00:00
|
|
|
ceph_update_write_metrics(metric, req->r_start_latency,
|
2021-05-13 01:40:53 +00:00
|
|
|
req->r_end_latency, len, ret);
|
2020-03-20 03:45:01 +00:00
|
|
|
else
|
2021-03-22 12:28:49 +00:00
|
|
|
ceph_update_read_metrics(metric, req->r_start_latency,
|
2021-05-13 01:40:53 +00:00
|
|
|
req->r_end_latency, len, ret);
|
2020-03-20 03:45:01 +00:00
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
size = i_size_read(inode);
|
|
|
|
if (!write) {
|
2022-02-26 11:33:03 +00:00
|
|
|
if (sparse && ret >= 0)
|
|
|
|
ret = ceph_sparse_ext_map_end(op);
|
|
|
|
else if (ret == -ENOENT)
|
2015-12-23 13:23:38 +00:00
|
|
|
ret = 0;
|
2022-02-26 11:33:03 +00:00
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
if (ret >= 0 && ret < len && pos + ret < size) {
|
2018-05-04 14:57:31 +00:00
|
|
|
struct iov_iter i;
|
2015-12-23 13:23:38 +00:00
|
|
|
int zlen = min_t(size_t, len - ret,
|
|
|
|
size - pos - ret);
|
2018-05-04 14:57:31 +00:00
|
|
|
|
2022-09-16 00:25:47 +00:00
|
|
|
iov_iter_bvec(&i, ITER_DEST, bvecs, num_pages, len);
|
2018-05-04 14:57:31 +00:00
|
|
|
iov_iter_advance(&i, ret);
|
|
|
|
iov_iter_zero(zlen, &i);
|
2015-12-23 13:23:38 +00:00
|
|
|
ret += zlen;
|
|
|
|
}
|
|
|
|
if (ret >= 0)
|
|
|
|
len = ret;
|
|
|
|
}
|
|
|
|
|
2018-05-04 14:57:31 +00:00
|
|
|
put_bvecs(bvecs, num_pages, should_dirty);
|
2013-09-12 05:54:26 +00:00
|
|
|
ceph_osdc_put_request(req);
|
2015-12-23 13:23:38 +00:00
|
|
|
if (ret < 0)
|
2013-09-12 05:54:26 +00:00
|
|
|
break;
|
2014-04-04 02:58:25 +00:00
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
pos += len;
|
|
|
|
if (!write && pos >= size)
|
2013-09-12 05:54:26 +00:00
|
|
|
break;
|
2014-04-04 02:58:25 +00:00
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
if (write && pos > size) {
|
|
|
|
if (ceph_inode_set_size(inode, pos))
|
2014-04-04 02:58:25 +00:00
|
|
|
ceph_check_caps(ceph_inode(inode),
|
2022-10-18 01:03:29 +00:00
|
|
|
CHECK_CAPS_AUTHONLY);
|
2014-04-04 02:58:25 +00:00
|
|
|
}
|
2013-09-12 05:54:26 +00:00
|
|
|
}
|
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
if (aio_req) {
|
2016-06-14 03:13:59 +00:00
|
|
|
LIST_HEAD(osd_reqs);
|
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
if (aio_req->num_reqs == 0) {
|
|
|
|
kfree(aio_req);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ceph_get_cap_refs(ci, write ? CEPH_CAP_FILE_WR :
|
|
|
|
CEPH_CAP_FILE_RD);
|
|
|
|
|
2016-06-14 03:13:59 +00:00
|
|
|
list_splice(&aio_req->osd_reqs, &osd_reqs);
|
2019-11-13 14:56:06 +00:00
|
|
|
inode_dio_begin(inode);
|
2016-06-14 03:13:59 +00:00
|
|
|
while (!list_empty(&osd_reqs)) {
|
|
|
|
req = list_first_entry(&osd_reqs,
|
2015-12-23 13:23:38 +00:00
|
|
|
struct ceph_osd_request,
|
2019-07-08 10:50:09 +00:00
|
|
|
r_private_item);
|
|
|
|
list_del_init(&req->r_private_item);
|
2015-12-23 13:23:38 +00:00
|
|
|
if (ret >= 0)
|
2022-06-30 20:21:50 +00:00
|
|
|
ceph_osdc_start_request(req->r_osdc, req);
|
2015-12-23 13:23:38 +00:00
|
|
|
if (ret < 0) {
|
|
|
|
req->r_result = ret;
|
2016-04-28 14:07:24 +00:00
|
|
|
ceph_aio_complete_req(req);
|
2015-12-23 13:23:38 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return -EIOCBQUEUED;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret != -EOLDSNAPC && pos > iocb->ki_pos) {
|
|
|
|
ret = pos - iocb->ki_pos;
|
2013-09-12 05:54:26 +00:00
|
|
|
iocb->ki_pos = pos;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Synchronous write, straight from __user pointer or user pages.
|
|
|
|
*
|
|
|
|
* If write spans object boundary, just do multiple writes. (For a
|
|
|
|
* correct atomic write, we should e.g. take write locks on all
|
|
|
|
* objects, rollback on failure, etc.)
|
|
|
|
*/
|
2014-07-28 06:33:46 +00:00
|
|
|
static ssize_t
|
2015-04-30 06:40:54 +00:00
|
|
|
ceph_sync_write(struct kiocb *iocb, struct iov_iter *from, loff_t pos,
|
|
|
|
struct ceph_snap_context *snapc)
|
2013-09-12 05:54:26 +00:00
|
|
|
{
|
|
|
|
struct file *file = iocb->ki_filp;
|
|
|
|
struct inode *inode = file_inode(file);
|
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
2023-06-12 02:50:38 +00:00
|
|
|
struct ceph_fs_client *fsc = ceph_inode_to_fs_client(inode);
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = fsc->client;
|
2022-08-25 13:31:21 +00:00
|
|
|
struct ceph_osd_client *osdc = &fsc->client->osdc;
|
2013-09-12 05:54:26 +00:00
|
|
|
struct ceph_osd_request *req;
|
|
|
|
struct page **pages;
|
|
|
|
u64 len;
|
|
|
|
int num_pages;
|
|
|
|
int written = 0;
|
|
|
|
int ret;
|
2017-05-22 04:03:32 +00:00
|
|
|
bool check_caps = false;
|
2018-07-13 20:18:37 +00:00
|
|
|
struct timespec64 mtime = current_time(inode);
|
2014-04-04 03:09:01 +00:00
|
|
|
size_t count = iov_iter_count(from);
|
2013-09-12 05:54:26 +00:00
|
|
|
|
|
|
|
if (ceph_snap(file_inode(file)) != CEPH_NOSNAP)
|
|
|
|
return -EROFS;
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "on file %p %lld~%u snapc %p seq %lld\n", file, pos,
|
|
|
|
(unsigned)count, snapc, snapc->seq);
|
2013-09-12 05:54:26 +00:00
|
|
|
|
2019-02-01 11:19:15 +00:00
|
|
|
ret = filemap_write_and_wait_range(inode->i_mapping,
|
|
|
|
pos, pos + count - 1);
|
2013-09-12 05:54:26 +00:00
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
2021-12-07 13:44:50 +00:00
|
|
|
ceph_fscache_invalidate(inode, false);
|
2013-09-12 05:54:26 +00:00
|
|
|
|
2014-04-04 03:09:01 +00:00
|
|
|
while ((len = iov_iter_count(from)) > 0) {
|
2013-09-12 05:54:26 +00:00
|
|
|
size_t left;
|
|
|
|
int n;
|
2022-08-25 13:31:21 +00:00
|
|
|
u64 write_pos = pos;
|
|
|
|
u64 write_len = len;
|
|
|
|
u64 objnum, objoff;
|
|
|
|
u32 xlen;
|
|
|
|
u64 assert_ver = 0;
|
|
|
|
bool rmw;
|
|
|
|
bool first, last;
|
|
|
|
struct iov_iter saved_iter = *from;
|
|
|
|
size_t off;
|
|
|
|
|
|
|
|
ceph_fscrypt_adjust_off_and_len(inode, &write_pos, &write_len);
|
|
|
|
|
|
|
|
/* clamp the length to the end of first object */
|
|
|
|
ceph_calc_file_object_mapping(&ci->i_layout, write_pos,
|
|
|
|
write_len, &objnum, &objoff,
|
|
|
|
&xlen);
|
|
|
|
write_len = xlen;
|
|
|
|
|
|
|
|
/* adjust len downward if it goes beyond current object */
|
|
|
|
if (pos + len > write_pos + write_len)
|
|
|
|
len = write_pos + write_len - pos;
|
2013-09-12 05:54:26 +00:00
|
|
|
|
2022-08-25 13:31:21 +00:00
|
|
|
/*
|
|
|
|
* If we had to adjust the length or position to align with a
|
|
|
|
* crypto block, then we must do a read/modify/write cycle. We
|
|
|
|
* use a version assertion to redrive the thing if something
|
|
|
|
* changes in between.
|
|
|
|
*/
|
|
|
|
first = pos != write_pos;
|
|
|
|
last = (pos + len) != (write_pos + write_len);
|
|
|
|
rmw = first || last;
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "ino %llx %lld~%llu adjusted %lld~%llu -- %srmw\n",
|
|
|
|
ci->i_vino.ino, pos, len, write_pos, write_len,
|
|
|
|
rmw ? "" : "no ");
|
2013-09-12 05:54:26 +00:00
|
|
|
|
2022-08-25 13:31:21 +00:00
|
|
|
/*
|
|
|
|
* The data is emplaced into the page as it would be if it were
|
|
|
|
* in an array of pagecache pages.
|
|
|
|
*/
|
|
|
|
num_pages = calc_pages_for(write_pos, write_len);
|
2015-06-13 09:27:05 +00:00
|
|
|
pages = ceph_alloc_page_vector(num_pages, GFP_KERNEL);
|
2009-10-06 18:31:08 +00:00
|
|
|
if (IS_ERR(pages)) {
|
|
|
|
ret = PTR_ERR(pages);
|
2022-08-25 13:31:21 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Do we need to preload the pages? */
|
|
|
|
if (rmw) {
|
|
|
|
u64 first_pos = write_pos;
|
|
|
|
u64 last_pos = (write_pos + write_len) - CEPH_FSCRYPT_BLOCK_SIZE;
|
|
|
|
u64 read_len = CEPH_FSCRYPT_BLOCK_SIZE;
|
|
|
|
struct ceph_osd_req_op *op;
|
|
|
|
|
|
|
|
/* We should only need to do this for encrypted inodes */
|
|
|
|
WARN_ON_ONCE(!IS_ENCRYPTED(inode));
|
|
|
|
|
|
|
|
/* No need to do two reads if first and last blocks are same */
|
|
|
|
if (first && last_pos == first_pos)
|
|
|
|
last = false;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Allocate a read request for one or two extents,
|
|
|
|
* depending on how the request was aligned.
|
|
|
|
*/
|
|
|
|
req = ceph_osdc_new_request(osdc, &ci->i_layout,
|
|
|
|
ci->i_vino, first ? first_pos : last_pos,
|
|
|
|
&read_len, 0, (first && last) ? 2 : 1,
|
|
|
|
CEPH_OSD_OP_SPARSE_READ, CEPH_OSD_FLAG_READ,
|
|
|
|
NULL, ci->i_truncate_seq,
|
|
|
|
ci->i_truncate_size, false);
|
|
|
|
if (IS_ERR(req)) {
|
|
|
|
ceph_release_page_vector(pages, num_pages);
|
|
|
|
ret = PTR_ERR(req);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Something is misaligned! */
|
|
|
|
if (read_len != CEPH_FSCRYPT_BLOCK_SIZE) {
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
ceph_release_page_vector(pages, num_pages);
|
|
|
|
ret = -EIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Add extent for first block? */
|
|
|
|
op = &req->r_ops[0];
|
|
|
|
|
|
|
|
if (first) {
|
|
|
|
osd_req_op_extent_osd_data_pages(req, 0, pages,
|
|
|
|
CEPH_FSCRYPT_BLOCK_SIZE,
|
|
|
|
offset_in_page(first_pos),
|
|
|
|
false, false);
|
|
|
|
/* We only expect a single extent here */
|
|
|
|
ret = __ceph_alloc_sparse_ext_map(op, 1);
|
|
|
|
if (ret) {
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
ceph_release_page_vector(pages, num_pages);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Add extent for last block */
|
|
|
|
if (last) {
|
|
|
|
/* Init the other extent if first extent has been used */
|
|
|
|
if (first) {
|
|
|
|
op = &req->r_ops[1];
|
|
|
|
osd_req_op_extent_init(req, 1,
|
|
|
|
CEPH_OSD_OP_SPARSE_READ,
|
|
|
|
last_pos, CEPH_FSCRYPT_BLOCK_SIZE,
|
|
|
|
ci->i_truncate_size,
|
|
|
|
ci->i_truncate_seq);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = __ceph_alloc_sparse_ext_map(op, 1);
|
|
|
|
if (ret) {
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
ceph_release_page_vector(pages, num_pages);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
osd_req_op_extent_osd_data_pages(req, first ? 1 : 0,
|
|
|
|
&pages[num_pages - 1],
|
|
|
|
CEPH_FSCRYPT_BLOCK_SIZE,
|
|
|
|
offset_in_page(last_pos),
|
|
|
|
false, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
ceph_osdc_start_request(osdc, req);
|
|
|
|
ret = ceph_osdc_wait_request(osdc, req);
|
|
|
|
|
|
|
|
/* FIXME: length field is wrong if there are 2 extents */
|
|
|
|
ceph_update_read_metrics(&fsc->mdsc->metric,
|
|
|
|
req->r_start_latency,
|
|
|
|
req->r_end_latency,
|
|
|
|
read_len, ret);
|
|
|
|
|
|
|
|
/* Ok if object is not already present */
|
|
|
|
if (ret == -ENOENT) {
|
|
|
|
/*
|
|
|
|
* If there is no object, then we can't assert
|
|
|
|
* on its version. Set it to 0, and we'll use an
|
|
|
|
* exclusive create instead.
|
|
|
|
*/
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* zero out the soon-to-be uncopied parts of the
|
|
|
|
* first and last pages.
|
|
|
|
*/
|
|
|
|
if (first)
|
|
|
|
zero_user_segment(pages[0], 0,
|
|
|
|
offset_in_page(first_pos));
|
|
|
|
if (last)
|
|
|
|
zero_user_segment(pages[num_pages - 1],
|
|
|
|
offset_in_page(last_pos),
|
|
|
|
PAGE_SIZE);
|
|
|
|
} else {
|
|
|
|
if (ret < 0) {
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
ceph_release_page_vector(pages, num_pages);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
op = &req->r_ops[0];
|
|
|
|
if (op->extent.sparse_ext_cnt == 0) {
|
|
|
|
if (first)
|
|
|
|
zero_user_segment(pages[0], 0,
|
|
|
|
offset_in_page(first_pos));
|
|
|
|
else
|
|
|
|
zero_user_segment(pages[num_pages - 1],
|
|
|
|
offset_in_page(last_pos),
|
|
|
|
PAGE_SIZE);
|
|
|
|
} else if (op->extent.sparse_ext_cnt != 1 ||
|
|
|
|
ceph_sparse_ext_map_end(op) !=
|
|
|
|
CEPH_FSCRYPT_BLOCK_SIZE) {
|
|
|
|
ret = -EIO;
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
ceph_release_page_vector(pages, num_pages);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (first && last) {
|
|
|
|
op = &req->r_ops[1];
|
|
|
|
if (op->extent.sparse_ext_cnt == 0) {
|
|
|
|
zero_user_segment(pages[num_pages - 1],
|
|
|
|
offset_in_page(last_pos),
|
|
|
|
PAGE_SIZE);
|
|
|
|
} else if (op->extent.sparse_ext_cnt != 1 ||
|
|
|
|
ceph_sparse_ext_map_end(op) !=
|
|
|
|
CEPH_FSCRYPT_BLOCK_SIZE) {
|
|
|
|
ret = -EIO;
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
ceph_release_page_vector(pages, num_pages);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Grab assert version. It must be non-zero. */
|
|
|
|
assert_ver = req->r_version;
|
|
|
|
WARN_ON_ONCE(ret > 0 && assert_ver == 0);
|
|
|
|
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
if (first) {
|
|
|
|
ret = ceph_fscrypt_decrypt_block_inplace(inode,
|
|
|
|
pages[0], CEPH_FSCRYPT_BLOCK_SIZE,
|
|
|
|
offset_in_page(first_pos),
|
|
|
|
first_pos >> CEPH_FSCRYPT_BLOCK_SHIFT);
|
|
|
|
if (ret < 0) {
|
|
|
|
ceph_release_page_vector(pages, num_pages);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (last) {
|
|
|
|
ret = ceph_fscrypt_decrypt_block_inplace(inode,
|
|
|
|
pages[num_pages - 1],
|
|
|
|
CEPH_FSCRYPT_BLOCK_SIZE,
|
|
|
|
offset_in_page(last_pos),
|
|
|
|
last_pos >> CEPH_FSCRYPT_BLOCK_SHIFT);
|
|
|
|
if (ret < 0) {
|
|
|
|
ceph_release_page_vector(pages, num_pages);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
}
|
2013-09-12 05:54:26 +00:00
|
|
|
|
|
|
|
left = len;
|
2022-08-25 13:31:20 +00:00
|
|
|
off = offset_in_page(pos);
|
2013-09-12 05:54:26 +00:00
|
|
|
for (n = 0; n < num_pages; n++) {
|
2022-08-25 13:31:20 +00:00
|
|
|
size_t plen = min_t(size_t, left, PAGE_SIZE - off);
|
|
|
|
|
2022-08-25 13:31:21 +00:00
|
|
|
/* copy the data */
|
2022-08-25 13:31:20 +00:00
|
|
|
ret = copy_page_from_iter(pages[n], off, plen, from);
|
2013-09-12 05:54:26 +00:00
|
|
|
if (ret != plen) {
|
|
|
|
ret = -EFAULT;
|
|
|
|
break;
|
|
|
|
}
|
2022-08-25 13:31:21 +00:00
|
|
|
off = 0;
|
2013-09-12 05:54:26 +00:00
|
|
|
left -= ret;
|
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
if (ret < 0) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "write failed with %d\n", ret);
|
2009-10-06 18:31:08 +00:00
|
|
|
ceph_release_page_vector(pages, num_pages);
|
2022-08-25 13:31:21 +00:00
|
|
|
break;
|
2009-10-06 18:31:08 +00:00
|
|
|
}
|
|
|
|
|
2022-08-25 13:31:21 +00:00
|
|
|
if (IS_ENCRYPTED(inode)) {
|
|
|
|
ret = ceph_fscrypt_encrypt_pages(inode, pages,
|
|
|
|
write_pos, write_len,
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (ret < 0) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "encryption failed with %d\n", ret);
|
2022-08-25 13:31:21 +00:00
|
|
|
ceph_release_page_vector(pages, num_pages);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2022-08-25 13:31:21 +00:00
|
|
|
req = ceph_osdc_new_request(osdc, &ci->i_layout,
|
|
|
|
ci->i_vino, write_pos, &write_len,
|
|
|
|
rmw ? 1 : 0, rmw ? 2 : 1,
|
|
|
|
CEPH_OSD_OP_WRITE,
|
|
|
|
CEPH_OSD_FLAG_WRITE,
|
|
|
|
snapc, ci->i_truncate_seq,
|
|
|
|
ci->i_truncate_size, false);
|
|
|
|
if (IS_ERR(req)) {
|
|
|
|
ret = PTR_ERR(req);
|
|
|
|
ceph_release_page_vector(pages, num_pages);
|
|
|
|
break;
|
|
|
|
}
|
2013-03-14 19:09:06 +00:00
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "write op %lld~%llu\n", write_pos, write_len);
|
2022-08-25 13:31:21 +00:00
|
|
|
osd_req_op_extent_osd_data_pages(req, rmw ? 1 : 0, pages, write_len,
|
|
|
|
offset_in_page(write_pos), false,
|
|
|
|
true);
|
|
|
|
req->r_inode = inode;
|
2016-05-25 22:29:52 +00:00
|
|
|
req->r_mtime = mtime;
|
2022-08-25 13:31:21 +00:00
|
|
|
|
|
|
|
/* Set up the assertion */
|
|
|
|
if (rmw) {
|
|
|
|
/*
|
|
|
|
* Set up the assertion. If we don't have a version
|
|
|
|
* number, then the object doesn't exist yet. Use an
|
|
|
|
* exclusive create instead of a version assertion in
|
|
|
|
* that case.
|
|
|
|
*/
|
|
|
|
if (assert_ver) {
|
|
|
|
osd_req_op_init(req, 0, CEPH_OSD_OP_ASSERT_VER, 0);
|
|
|
|
req->r_ops[0].assert_ver.ver = assert_ver;
|
|
|
|
} else {
|
|
|
|
osd_req_op_init(req, 0, CEPH_OSD_OP_CREATE,
|
|
|
|
CEPH_OSD_OP_FLAG_EXCL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ceph_osdc_start_request(osdc, req);
|
|
|
|
ret = ceph_osdc_wait_request(osdc, req);
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2021-03-22 12:28:49 +00:00
|
|
|
ceph_update_write_metrics(&fsc->mdsc->metric, req->r_start_latency,
|
2021-05-13 01:40:53 +00:00
|
|
|
req->r_end_latency, len, ret);
|
2013-09-12 05:54:26 +00:00
|
|
|
ceph_osdc_put_request(req);
|
2017-04-04 12:39:46 +00:00
|
|
|
if (ret != 0) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "osd write returned %d\n", ret);
|
2022-08-25 13:31:21 +00:00
|
|
|
/* Version changed! Must re-do the rmw cycle */
|
|
|
|
if ((assert_ver && (ret == -ERANGE || ret == -EOVERFLOW)) ||
|
|
|
|
(!assert_ver && ret == -EEXIST)) {
|
|
|
|
/* We should only ever see this on a rmw */
|
|
|
|
WARN_ON_ONCE(!rmw);
|
|
|
|
|
|
|
|
/* The version should never go backward */
|
|
|
|
WARN_ON_ONCE(ret == -EOVERFLOW);
|
|
|
|
|
|
|
|
*from = saved_iter;
|
|
|
|
|
|
|
|
/* FIXME: limit number of times we loop? */
|
|
|
|
continue;
|
|
|
|
}
|
2017-04-04 12:39:46 +00:00
|
|
|
ceph_set_error_write(ci);
|
2013-09-12 05:54:26 +00:00
|
|
|
break;
|
2017-04-04 12:39:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ceph_clear_error_write(ci);
|
2022-08-25 13:31:27 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We successfully wrote to a range of the file. Declare
|
|
|
|
* that region of the pagecache invalid.
|
|
|
|
*/
|
|
|
|
ret = invalidate_inode_pages2_range(
|
|
|
|
inode->i_mapping,
|
|
|
|
pos >> PAGE_SHIFT,
|
|
|
|
(pos + len - 1) >> PAGE_SHIFT);
|
|
|
|
if (ret < 0) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "invalidate_inode_pages2_range returned %d\n",
|
|
|
|
ret);
|
2022-08-25 13:31:27 +00:00
|
|
|
ret = 0;
|
|
|
|
}
|
2017-04-04 12:39:46 +00:00
|
|
|
pos += len;
|
|
|
|
written += len;
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "written %d\n", written);
|
2017-04-04 12:39:46 +00:00
|
|
|
if (pos > i_size_read(inode)) {
|
|
|
|
check_caps = ceph_inode_set_size(inode, pos);
|
|
|
|
if (check_caps)
|
|
|
|
ceph_check_caps(ceph_inode(inode),
|
2022-10-18 01:03:29 +00:00
|
|
|
CHECK_CAPS_AUTHONLY);
|
2017-04-04 12:39:46 +00:00
|
|
|
}
|
|
|
|
|
2013-09-12 05:54:26 +00:00
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2013-09-12 05:54:26 +00:00
|
|
|
if (ret != -EOLDSNAPC && written > 0) {
|
2009-10-06 18:31:08 +00:00
|
|
|
ret = written;
|
2013-09-12 05:54:26 +00:00
|
|
|
iocb->ki_pos = pos;
|
2009-10-06 18:31:08 +00:00
|
|
|
}
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "returning %d\n", ret);
|
2009-10-06 18:31:08 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Wrap generic_file_aio_read with checks for cap bits on the inode.
|
|
|
|
* Atomically grab references, so that those bits are not released
|
|
|
|
* back to the MDS mid-read.
|
|
|
|
*
|
|
|
|
* Hmm, the sync read case isn't actually async... should it be?
|
|
|
|
*/
|
2014-04-03 00:28:01 +00:00
|
|
|
static ssize_t ceph_read_iter(struct kiocb *iocb, struct iov_iter *to)
|
2009-10-06 18:31:08 +00:00
|
|
|
{
|
|
|
|
struct file *filp = iocb->ki_filp;
|
2010-05-27 17:40:43 +00:00
|
|
|
struct ceph_file_info *fi = filp->private_data;
|
2015-02-11 18:56:46 +00:00
|
|
|
size_t len = iov_iter_count(to);
|
2013-01-23 22:07:38 +00:00
|
|
|
struct inode *inode = file_inode(filp);
|
2009-10-06 18:31:08 +00:00
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
2020-07-06 12:51:35 +00:00
|
|
|
bool direct_lock = iocb->ki_flags & IOCB_DIRECT;
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = ceph_inode_to_client(inode);
|
2009-10-06 18:31:08 +00:00
|
|
|
ssize_t ret;
|
2021-11-30 19:12:13 +00:00
|
|
|
int want = 0, got = 0;
|
2014-11-14 14:36:18 +00:00
|
|
|
int retry_op = 0, read = 0;
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2010-02-09 22:04:02 +00:00
|
|
|
again:
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%llu~%u trying to get caps on %p %llx.%llx\n",
|
|
|
|
iocb->ki_pos, (unsigned)len, inode, ceph_vinop(inode));
|
2013-09-26 06:42:17 +00:00
|
|
|
|
2021-08-31 17:39:13 +00:00
|
|
|
if (ceph_inode_is_shutdown(inode))
|
|
|
|
return -ESTALE;
|
|
|
|
|
2020-07-06 12:51:35 +00:00
|
|
|
if (direct_lock)
|
2019-11-13 14:10:27 +00:00
|
|
|
ceph_start_io_direct(inode);
|
|
|
|
else
|
|
|
|
ceph_start_io_read(inode);
|
|
|
|
|
2021-11-30 19:12:13 +00:00
|
|
|
if (!(fi->flags & CEPH_F_SYNC) && !direct_lock)
|
|
|
|
want |= CEPH_CAP_FILE_CACHE;
|
2010-05-27 17:40:43 +00:00
|
|
|
if (fi->fmode & CEPH_FILE_MODE_LAZY)
|
2021-11-30 19:12:13 +00:00
|
|
|
want |= CEPH_CAP_FILE_LAZYIO;
|
|
|
|
|
2021-04-05 16:19:35 +00:00
|
|
|
ret = ceph_get_caps(filp, CEPH_CAP_FILE_RD, want, -1, &got);
|
2019-11-13 14:10:27 +00:00
|
|
|
if (ret < 0) {
|
2021-11-30 19:12:13 +00:00
|
|
|
if (direct_lock)
|
2019-11-13 14:10:27 +00:00
|
|
|
ceph_end_io_direct(inode);
|
|
|
|
else
|
|
|
|
ceph_end_io_read(inode);
|
2013-09-26 06:42:17 +00:00
|
|
|
return ret;
|
2019-11-13 14:10:27 +00:00
|
|
|
}
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2010-05-27 17:40:43 +00:00
|
|
|
if ((got & (CEPH_CAP_FILE_CACHE|CEPH_CAP_FILE_LAZYIO)) == 0 ||
|
2015-04-09 17:52:01 +00:00
|
|
|
(iocb->ki_flags & IOCB_DIRECT) ||
|
2013-09-26 06:42:17 +00:00
|
|
|
(fi->flags & CEPH_F_SYNC)) {
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "sync %p %llx.%llx %llu~%u got cap refs on %s\n",
|
|
|
|
inode, ceph_vinop(inode), iocb->ki_pos, (unsigned)len,
|
|
|
|
ceph_cap_string(got));
|
2013-09-26 06:42:17 +00:00
|
|
|
|
2022-06-07 02:13:53 +00:00
|
|
|
if (!ceph_has_inline_data(ci)) {
|
2022-08-25 13:31:19 +00:00
|
|
|
if (!retry_op &&
|
|
|
|
(iocb->ki_flags & IOCB_DIRECT) &&
|
|
|
|
!IS_ENCRYPTED(inode)) {
|
2015-12-23 13:23:38 +00:00
|
|
|
ret = ceph_direct_read_write(iocb, to,
|
|
|
|
NULL, NULL);
|
|
|
|
if (ret >= 0 && ret < len)
|
|
|
|
retry_op = CHECK_EOF;
|
|
|
|
} else {
|
|
|
|
ret = ceph_sync_read(iocb, to, &retry_op);
|
|
|
|
}
|
2014-11-14 14:36:18 +00:00
|
|
|
} else {
|
|
|
|
retry_op = READ_INLINE;
|
|
|
|
}
|
2013-09-26 06:42:17 +00:00
|
|
|
} else {
|
2017-12-15 03:15:36 +00:00
|
|
|
CEPH_DEFINE_RW_CONTEXT(rw_ctx, got);
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "async %p %llx.%llx %llu~%u got cap refs on %s\n",
|
|
|
|
inode, ceph_vinop(inode), iocb->ki_pos, (unsigned)len,
|
|
|
|
ceph_cap_string(got));
|
2017-12-15 03:15:36 +00:00
|
|
|
ceph_add_rw_context(fi, &rw_ctx);
|
2014-04-03 00:28:01 +00:00
|
|
|
ret = generic_file_read_iter(iocb, to);
|
2017-12-15 03:15:36 +00:00
|
|
|
ceph_del_rw_context(fi, &rw_ctx);
|
2013-09-26 06:42:17 +00:00
|
|
|
}
|
2019-11-13 14:10:27 +00:00
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx dropping cap refs on %s = %d\n",
|
|
|
|
inode, ceph_vinop(inode), ceph_cap_string(got), (int)ret);
|
2009-10-06 18:31:08 +00:00
|
|
|
ceph_put_cap_refs(ci, got);
|
2019-11-13 14:10:27 +00:00
|
|
|
|
2020-07-06 12:51:35 +00:00
|
|
|
if (direct_lock)
|
2019-11-13 14:10:27 +00:00
|
|
|
ceph_end_io_direct(inode);
|
|
|
|
else
|
|
|
|
ceph_end_io_read(inode);
|
|
|
|
|
2015-12-23 13:23:38 +00:00
|
|
|
if (retry_op > HAVE_RETRIED && ret >= 0) {
|
2014-11-14 14:36:18 +00:00
|
|
|
int statret;
|
|
|
|
struct page *page = NULL;
|
|
|
|
loff_t i_size;
|
2024-02-22 01:22:43 +00:00
|
|
|
int mask = CEPH_STAT_CAP_SIZE;
|
2014-11-14 14:36:18 +00:00
|
|
|
if (retry_op == READ_INLINE) {
|
2015-06-13 09:27:05 +00:00
|
|
|
page = __page_cache_alloc(GFP_KERNEL);
|
2014-11-14 14:36:18 +00:00
|
|
|
if (!page)
|
|
|
|
return -ENOMEM;
|
2024-02-22 01:22:43 +00:00
|
|
|
|
|
|
|
mask = CEPH_STAT_CAP_INLINE_DATA;
|
2014-11-14 14:36:18 +00:00
|
|
|
}
|
2010-02-09 22:04:02 +00:00
|
|
|
|
2024-02-22 01:22:43 +00:00
|
|
|
statret = __ceph_do_getattr(inode, page, mask, !!page);
|
2014-11-14 14:36:18 +00:00
|
|
|
if (statret < 0) {
|
2016-10-10 12:38:18 +00:00
|
|
|
if (page)
|
|
|
|
__free_page(page);
|
2014-11-14 14:36:18 +00:00
|
|
|
if (statret == -ENODATA) {
|
|
|
|
BUG_ON(retry_op != READ_INLINE);
|
|
|
|
goto again;
|
|
|
|
}
|
|
|
|
return statret;
|
|
|
|
}
|
2010-02-09 22:04:02 +00:00
|
|
|
|
2014-11-14 14:36:18 +00:00
|
|
|
i_size = i_size_read(inode);
|
|
|
|
if (retry_op == READ_INLINE) {
|
2015-01-10 03:43:12 +00:00
|
|
|
BUG_ON(ret > 0 || read > 0);
|
|
|
|
if (iocb->ki_pos < i_size &&
|
mm, fs: get rid of PAGE_CACHE_* and page_cache_{get,release} macros
PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} macros were introduced *long* time
ago with promise that one day it will be possible to implement page
cache with bigger chunks than PAGE_SIZE.
This promise never materialized. And unlikely will.
We have many places where PAGE_CACHE_SIZE assumed to be equal to
PAGE_SIZE. And it's constant source of confusion on whether
PAGE_CACHE_* or PAGE_* constant should be used in a particular case,
especially on the border between fs and mm.
Global switching to PAGE_CACHE_SIZE != PAGE_SIZE would cause to much
breakage to be doable.
Let's stop pretending that pages in page cache are special. They are
not.
The changes are pretty straight-forward:
- <foo> << (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- <foo> >> (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} -> PAGE_{SIZE,SHIFT,MASK,ALIGN};
- page_cache_get() -> get_page();
- page_cache_release() -> put_page();
This patch contains automated changes generated with coccinelle using
script below. For some reason, coccinelle doesn't patch header files.
I've called spatch for them manually.
The only adjustment after coccinelle is revert of changes to
PAGE_CAHCE_ALIGN definition: we are going to drop it later.
There are few places in the code where coccinelle didn't reach. I'll
fix them manually in a separate patch. Comments and documentation also
will be addressed with the separate patch.
virtual patch
@@
expression E;
@@
- E << (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
expression E;
@@
- E >> (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
@@
- PAGE_CACHE_SHIFT
+ PAGE_SHIFT
@@
@@
- PAGE_CACHE_SIZE
+ PAGE_SIZE
@@
@@
- PAGE_CACHE_MASK
+ PAGE_MASK
@@
expression E;
@@
- PAGE_CACHE_ALIGN(E)
+ PAGE_ALIGN(E)
@@
expression E;
@@
- page_cache_get(E)
+ get_page(E)
@@
expression E;
@@
- page_cache_release(E)
+ put_page(E)
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-04-01 12:29:47 +00:00
|
|
|
iocb->ki_pos < PAGE_SIZE) {
|
2014-11-14 14:36:18 +00:00
|
|
|
loff_t end = min_t(loff_t, i_size,
|
|
|
|
iocb->ki_pos + len);
|
mm, fs: get rid of PAGE_CACHE_* and page_cache_{get,release} macros
PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} macros were introduced *long* time
ago with promise that one day it will be possible to implement page
cache with bigger chunks than PAGE_SIZE.
This promise never materialized. And unlikely will.
We have many places where PAGE_CACHE_SIZE assumed to be equal to
PAGE_SIZE. And it's constant source of confusion on whether
PAGE_CACHE_* or PAGE_* constant should be used in a particular case,
especially on the border between fs and mm.
Global switching to PAGE_CACHE_SIZE != PAGE_SIZE would cause to much
breakage to be doable.
Let's stop pretending that pages in page cache are special. They are
not.
The changes are pretty straight-forward:
- <foo> << (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- <foo> >> (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} -> PAGE_{SIZE,SHIFT,MASK,ALIGN};
- page_cache_get() -> get_page();
- page_cache_release() -> put_page();
This patch contains automated changes generated with coccinelle using
script below. For some reason, coccinelle doesn't patch header files.
I've called spatch for them manually.
The only adjustment after coccinelle is revert of changes to
PAGE_CAHCE_ALIGN definition: we are going to drop it later.
There are few places in the code where coccinelle didn't reach. I'll
fix them manually in a separate patch. Comments and documentation also
will be addressed with the separate patch.
virtual patch
@@
expression E;
@@
- E << (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
expression E;
@@
- E >> (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
@@
- PAGE_CACHE_SHIFT
+ PAGE_SHIFT
@@
@@
- PAGE_CACHE_SIZE
+ PAGE_SIZE
@@
@@
- PAGE_CACHE_MASK
+ PAGE_MASK
@@
expression E;
@@
- PAGE_CACHE_ALIGN(E)
+ PAGE_ALIGN(E)
@@
expression E;
@@
- page_cache_get(E)
+ get_page(E)
@@
expression E;
@@
- page_cache_release(E)
+ put_page(E)
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-04-01 12:29:47 +00:00
|
|
|
end = min_t(loff_t, end, PAGE_SIZE);
|
2014-11-14 14:36:18 +00:00
|
|
|
if (statret < end)
|
|
|
|
zero_user_segment(page, statret, end);
|
|
|
|
ret = copy_page_to_iter(page,
|
|
|
|
iocb->ki_pos & ~PAGE_MASK,
|
|
|
|
end - iocb->ki_pos, to);
|
|
|
|
iocb->ki_pos += ret;
|
2015-01-10 03:43:12 +00:00
|
|
|
read += ret;
|
|
|
|
}
|
|
|
|
if (iocb->ki_pos < i_size && read < len) {
|
|
|
|
size_t zlen = min_t(size_t, len - read,
|
|
|
|
i_size - iocb->ki_pos);
|
|
|
|
ret = iov_iter_zero(zlen, to);
|
|
|
|
iocb->ki_pos += ret;
|
|
|
|
read += ret;
|
2014-11-14 14:36:18 +00:00
|
|
|
}
|
|
|
|
__free_pages(page, 0);
|
2015-01-10 03:43:12 +00:00
|
|
|
return read;
|
2014-11-14 14:36:18 +00:00
|
|
|
}
|
2010-02-09 22:04:02 +00:00
|
|
|
|
|
|
|
/* hit EOF or hole? */
|
2014-11-14 14:36:18 +00:00
|
|
|
if (retry_op == CHECK_EOF && iocb->ki_pos < i_size &&
|
2015-01-10 03:43:12 +00:00
|
|
|
ret < len) {
|
2024-02-22 01:22:43 +00:00
|
|
|
doutc(cl, "may hit hole, ppos %lld < size %lld, reading more\n",
|
2023-06-12 01:04:07 +00:00
|
|
|
iocb->ki_pos, i_size);
|
2013-09-26 06:42:17 +00:00
|
|
|
|
2010-02-09 22:04:02 +00:00
|
|
|
read += ret;
|
|
|
|
len -= ret;
|
2015-12-23 13:23:38 +00:00
|
|
|
retry_op = HAVE_RETRIED;
|
2010-02-09 22:04:02 +00:00
|
|
|
goto again;
|
|
|
|
}
|
|
|
|
}
|
2013-09-26 06:42:17 +00:00
|
|
|
|
2010-02-09 22:04:02 +00:00
|
|
|
if (ret >= 0)
|
|
|
|
ret += read;
|
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-05-22 13:50:03 +00:00
|
|
|
/*
|
|
|
|
* Wrap filemap_splice_read with checks for cap bits on the inode.
|
|
|
|
* Atomically grab references, so that those bits are not released
|
|
|
|
* back to the MDS mid-read.
|
|
|
|
*/
|
|
|
|
static ssize_t ceph_splice_read(struct file *in, loff_t *ppos,
|
|
|
|
struct pipe_inode_info *pipe,
|
|
|
|
size_t len, unsigned int flags)
|
|
|
|
{
|
|
|
|
struct ceph_file_info *fi = in->private_data;
|
|
|
|
struct inode *inode = file_inode(in);
|
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
|
|
|
ssize_t ret;
|
|
|
|
int want = 0, got = 0;
|
|
|
|
CEPH_DEFINE_RW_CONTEXT(rw_ctx, 0);
|
|
|
|
|
|
|
|
dout("splice_read %p %llx.%llx %llu~%zu trying to get caps on %p\n",
|
|
|
|
inode, ceph_vinop(inode), *ppos, len, inode);
|
|
|
|
|
|
|
|
if (ceph_inode_is_shutdown(inode))
|
|
|
|
return -ESTALE;
|
|
|
|
|
|
|
|
if (ceph_has_inline_data(ci) ||
|
|
|
|
(fi->flags & CEPH_F_SYNC))
|
|
|
|
return copy_splice_read(in, ppos, pipe, len, flags);
|
|
|
|
|
|
|
|
ceph_start_io_read(inode);
|
|
|
|
|
|
|
|
want = CEPH_CAP_FILE_CACHE;
|
|
|
|
if (fi->fmode & CEPH_FILE_MODE_LAZY)
|
|
|
|
want |= CEPH_CAP_FILE_LAZYIO;
|
|
|
|
|
|
|
|
ret = ceph_get_caps(in, CEPH_CAP_FILE_RD, want, -1, &got);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out_end;
|
|
|
|
|
|
|
|
if ((got & (CEPH_CAP_FILE_CACHE | CEPH_CAP_FILE_LAZYIO)) == 0) {
|
|
|
|
dout("splice_read/sync %p %llx.%llx %llu~%zu got cap refs on %s\n",
|
|
|
|
inode, ceph_vinop(inode), *ppos, len,
|
|
|
|
ceph_cap_string(got));
|
|
|
|
|
|
|
|
ceph_put_cap_refs(ci, got);
|
|
|
|
ceph_end_io_read(inode);
|
|
|
|
return copy_splice_read(in, ppos, pipe, len, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
dout("splice_read %p %llx.%llx %llu~%zu got cap refs on %s\n",
|
|
|
|
inode, ceph_vinop(inode), *ppos, len, ceph_cap_string(got));
|
|
|
|
|
|
|
|
rw_ctx.caps = got;
|
|
|
|
ceph_add_rw_context(fi, &rw_ctx);
|
|
|
|
ret = filemap_splice_read(in, ppos, pipe, len, flags);
|
|
|
|
ceph_del_rw_context(fi, &rw_ctx);
|
|
|
|
|
|
|
|
dout("splice_read %p %llx.%llx dropping cap refs on %s = %zd\n",
|
|
|
|
inode, ceph_vinop(inode), ceph_cap_string(got), ret);
|
|
|
|
|
|
|
|
ceph_put_cap_refs(ci, got);
|
|
|
|
out_end:
|
|
|
|
ceph_end_io_read(inode);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
/*
|
|
|
|
* Take cap references to avoid releasing caps to MDS mid-write.
|
|
|
|
*
|
|
|
|
* If we are synchronous, and write with an old snap context, the OSD
|
|
|
|
* may return EOLDSNAPC. In that case, retry the write.. _after_
|
|
|
|
* dropping our cap refs and allowing the pending snap to logically
|
|
|
|
* complete _before_ this write occurs.
|
|
|
|
*
|
|
|
|
* If we are near ENOSPC, write synchronously.
|
|
|
|
*/
|
2014-04-04 03:09:01 +00:00
|
|
|
static ssize_t ceph_write_iter(struct kiocb *iocb, struct iov_iter *from)
|
2009-10-06 18:31:08 +00:00
|
|
|
{
|
|
|
|
struct file *file = iocb->ki_filp;
|
2010-05-26 21:31:27 +00:00
|
|
|
struct ceph_file_info *fi = file->private_data;
|
2013-01-23 22:07:38 +00:00
|
|
|
struct inode *inode = file_inode(file);
|
2009-10-06 18:31:08 +00:00
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
2023-06-12 02:50:38 +00:00
|
|
|
struct ceph_fs_client *fsc = ceph_inode_to_fs_client(inode);
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = fsc->client;
|
2020-03-09 11:03:14 +00:00
|
|
|
struct ceph_osd_client *osdc = &fsc->client->osdc;
|
2015-06-10 09:26:13 +00:00
|
|
|
struct ceph_cap_flush *prealloc_cf;
|
2015-04-09 16:55:47 +00:00
|
|
|
ssize_t count, written = 0;
|
2021-11-30 19:12:13 +00:00
|
|
|
int err, want = 0, got;
|
2020-02-04 02:28:25 +00:00
|
|
|
bool direct_lock = false;
|
2020-03-09 11:03:14 +00:00
|
|
|
u32 map_flags;
|
|
|
|
u64 pool_flags;
|
2015-04-09 16:55:47 +00:00
|
|
|
loff_t pos;
|
2018-07-19 14:15:26 +00:00
|
|
|
loff_t limit = max(i_size_read(inode), fsc->max_file_size);
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2021-08-31 17:39:13 +00:00
|
|
|
if (ceph_inode_is_shutdown(inode))
|
|
|
|
return -ESTALE;
|
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
if (ceph_snap(inode) != CEPH_NOSNAP)
|
|
|
|
return -EROFS;
|
|
|
|
|
2015-06-10 09:26:13 +00:00
|
|
|
prealloc_cf = ceph_alloc_cap_flush();
|
|
|
|
if (!prealloc_cf)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2020-02-04 02:28:25 +00:00
|
|
|
if ((iocb->ki_flags & (IOCB_DIRECT | IOCB_APPEND)) == IOCB_DIRECT)
|
|
|
|
direct_lock = true;
|
|
|
|
|
2017-08-14 02:50:50 +00:00
|
|
|
retry_snap:
|
2020-02-04 02:28:25 +00:00
|
|
|
if (direct_lock)
|
ceph: add buffered/direct exclusionary locking for reads and writes
xfstest generic/451 intermittently fails. The test does O_DIRECT writes
to a file, and then reads back the result using buffered I/O, while
running a separate set of tasks that are also doing buffered reads.
The client will invalidate the cache prior to a direct write, but it's
easy for one of the other readers' replies to race in and reinstantiate
the invalidated range with stale data.
To fix this, we must to serialize direct I/O writes and buffered reads.
We could just sprinkle in some shared locks on the i_rwsem for reads,
and increase the exclusive footprint on the write side, but that would
cause O_DIRECT writes to end up serialized vs. other direct requests.
Instead, borrow the scheme used by nfs.ko. Buffered writes take the
i_rwsem exclusively, but buffered reads take a shared lock, allowing
them to run in parallel.
O_DIRECT requests also take a shared lock, but we need for them to not
run in parallel with buffered reads. A flag on the ceph_inode_info is
used to indicate whether it's in direct or buffered I/O mode. When a
conflicting request is submitted, it will block until the inode can be
flipped to the necessary mode.
Link: https://tracker.ceph.com/issues/40985
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: "Yan, Zheng" <zyan@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2019-08-02 17:15:39 +00:00
|
|
|
ceph_start_io_direct(inode);
|
|
|
|
else
|
|
|
|
ceph_start_io_write(inode);
|
2013-04-12 08:11:13 +00:00
|
|
|
|
2015-09-07 03:35:01 +00:00
|
|
|
if (iocb->ki_flags & IOCB_APPEND) {
|
|
|
|
err = ceph_do_getattr(inode, CEPH_STAT_CAP_SIZE, false);
|
|
|
|
if (err < 0)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-04-09 16:55:47 +00:00
|
|
|
err = generic_write_checks(iocb, from);
|
|
|
|
if (err <= 0)
|
2013-04-12 08:11:13 +00:00
|
|
|
goto out;
|
|
|
|
|
2015-04-09 16:55:47 +00:00
|
|
|
pos = iocb->ki_pos;
|
2018-07-19 14:15:26 +00:00
|
|
|
if (unlikely(pos >= limit)) {
|
|
|
|
err = -EFBIG;
|
|
|
|
goto out;
|
|
|
|
} else {
|
|
|
|
iov_iter_truncate(from, limit - pos);
|
|
|
|
}
|
|
|
|
|
2015-04-09 16:55:47 +00:00
|
|
|
count = iov_iter_count(from);
|
2018-01-05 10:47:21 +00:00
|
|
|
if (ceph_quota_is_max_bytes_exceeded(inode, pos + count)) {
|
|
|
|
err = -EDQUOT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2021-08-11 10:40:42 +00:00
|
|
|
down_read(&osdc->lock);
|
|
|
|
map_flags = osdc->osdmap->flags;
|
|
|
|
pool_flags = ceph_pg_pool_flags(osdc->osdmap, ci->i_layout.pool_id);
|
|
|
|
up_read(&osdc->lock);
|
|
|
|
if ((map_flags & CEPH_OSDMAP_FULL) ||
|
|
|
|
(pool_flags & CEPH_POOL_FLAG_FULL)) {
|
|
|
|
err = -ENOSPC;
|
2013-04-12 08:11:13 +00:00
|
|
|
goto out;
|
2021-08-11 10:40:42 +00:00
|
|
|
}
|
2013-04-12 08:11:13 +00:00
|
|
|
|
2021-08-11 10:40:42 +00:00
|
|
|
err = file_remove_privs(file);
|
2013-04-12 08:11:13 +00:00
|
|
|
if (err)
|
|
|
|
goto out;
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx %llu~%zd getting caps. i_size %llu\n",
|
|
|
|
inode, ceph_vinop(inode), pos, count,
|
|
|
|
i_size_read(inode));
|
2021-11-30 19:12:13 +00:00
|
|
|
if (!(fi->flags & CEPH_F_SYNC) && !direct_lock)
|
|
|
|
want |= CEPH_CAP_FILE_BUFFER;
|
2013-05-02 04:15:58 +00:00
|
|
|
if (fi->fmode & CEPH_FILE_MODE_LAZY)
|
2021-11-30 19:12:13 +00:00
|
|
|
want |= CEPH_CAP_FILE_LAZYIO;
|
2013-04-12 08:11:13 +00:00
|
|
|
got = 0;
|
2021-04-05 16:19:35 +00:00
|
|
|
err = ceph_get_caps(file, CEPH_CAP_FILE_WR, want, pos + count, &got);
|
2013-04-12 08:11:13 +00:00
|
|
|
if (err < 0)
|
2013-04-12 08:11:10 +00:00
|
|
|
goto out;
|
2009-10-06 18:31:08 +00:00
|
|
|
|
2021-08-11 10:40:42 +00:00
|
|
|
err = file_update_time(file);
|
|
|
|
if (err)
|
|
|
|
goto out_caps;
|
|
|
|
|
|
|
|
inode_inc_iversion_raw(inode);
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx %llu~%zd got cap refs on %s\n",
|
|
|
|
inode, ceph_vinop(inode), pos, count, ceph_cap_string(got));
|
2013-05-02 04:15:58 +00:00
|
|
|
|
|
|
|
if ((got & (CEPH_CAP_FILE_BUFFER|CEPH_CAP_FILE_LAZYIO)) == 0 ||
|
2017-04-04 12:39:46 +00:00
|
|
|
(iocb->ki_flags & IOCB_DIRECT) || (fi->flags & CEPH_F_SYNC) ||
|
|
|
|
(ci->i_ceph_flags & CEPH_I_ERROR_WRITE)) {
|
2015-04-30 06:40:54 +00:00
|
|
|
struct ceph_snap_context *snapc;
|
2014-04-04 03:09:01 +00:00
|
|
|
struct iov_iter data;
|
2015-04-30 06:40:54 +00:00
|
|
|
|
|
|
|
spin_lock(&ci->i_ceph_lock);
|
|
|
|
if (__ceph_have_pending_cap_snap(ci)) {
|
|
|
|
struct ceph_cap_snap *capsnap =
|
|
|
|
list_last_entry(&ci->i_cap_snaps,
|
|
|
|
struct ceph_cap_snap,
|
|
|
|
ci_item);
|
|
|
|
snapc = ceph_get_snap_context(capsnap->context);
|
|
|
|
} else {
|
|
|
|
BUG_ON(!ci->i_head_snapc);
|
|
|
|
snapc = ceph_get_snap_context(ci->i_head_snapc);
|
|
|
|
}
|
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
|
|
|
|
2014-04-04 03:09:01 +00:00
|
|
|
/* we might need to revert back to that point */
|
|
|
|
data = *from;
|
2022-08-25 13:31:19 +00:00
|
|
|
if ((iocb->ki_flags & IOCB_DIRECT) && !IS_ENCRYPTED(inode))
|
2015-12-23 13:23:38 +00:00
|
|
|
written = ceph_direct_read_write(iocb, &data, snapc,
|
|
|
|
&prealloc_cf);
|
2020-02-04 02:28:25 +00:00
|
|
|
else
|
2015-04-30 06:40:54 +00:00
|
|
|
written = ceph_sync_write(iocb, &data, pos, snapc);
|
2020-02-04 02:28:25 +00:00
|
|
|
if (direct_lock)
|
|
|
|
ceph_end_io_direct(inode);
|
|
|
|
else
|
ceph: add buffered/direct exclusionary locking for reads and writes
xfstest generic/451 intermittently fails. The test does O_DIRECT writes
to a file, and then reads back the result using buffered I/O, while
running a separate set of tasks that are also doing buffered reads.
The client will invalidate the cache prior to a direct write, but it's
easy for one of the other readers' replies to race in and reinstantiate
the invalidated range with stale data.
To fix this, we must to serialize direct I/O writes and buffered reads.
We could just sprinkle in some shared locks on the i_rwsem for reads,
and increase the exclusive footprint on the write side, but that would
cause O_DIRECT writes to end up serialized vs. other direct requests.
Instead, borrow the scheme used by nfs.ko. Buffered writes take the
i_rwsem exclusively, but buffered reads take a shared lock, allowing
them to run in parallel.
O_DIRECT requests also take a shared lock, but we need for them to not
run in parallel with buffered reads. A flag on the ceph_inode_info is
used to indicate whether it's in direct or buffered I/O mode. When a
conflicting request is submitted, it will block until the inode can be
flipped to the necessary mode.
Link: https://tracker.ceph.com/issues/40985
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: "Yan, Zheng" <zyan@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2019-08-02 17:15:39 +00:00
|
|
|
ceph_end_io_write(inode);
|
2014-04-04 03:09:01 +00:00
|
|
|
if (written > 0)
|
|
|
|
iov_iter_advance(from, written);
|
2015-04-30 06:40:54 +00:00
|
|
|
ceph_put_snap_context(snapc);
|
2013-05-02 04:15:58 +00:00
|
|
|
} else {
|
2013-08-13 04:42:15 +00:00
|
|
|
/*
|
|
|
|
* No need to acquire the i_truncate_mutex. Because
|
|
|
|
* the MDS revokes Fwb caps before sending truncate
|
|
|
|
* message to us. We can't get Fwb cap while there
|
|
|
|
* are pending vmtruncate. So write and vmtruncate
|
|
|
|
* can not run at the same time
|
|
|
|
*/
|
2022-02-20 04:19:49 +00:00
|
|
|
written = generic_perform_write(iocb, from);
|
ceph: add buffered/direct exclusionary locking for reads and writes
xfstest generic/451 intermittently fails. The test does O_DIRECT writes
to a file, and then reads back the result using buffered I/O, while
running a separate set of tasks that are also doing buffered reads.
The client will invalidate the cache prior to a direct write, but it's
easy for one of the other readers' replies to race in and reinstantiate
the invalidated range with stale data.
To fix this, we must to serialize direct I/O writes and buffered reads.
We could just sprinkle in some shared locks on the i_rwsem for reads,
and increase the exclusive footprint on the write side, but that would
cause O_DIRECT writes to end up serialized vs. other direct requests.
Instead, borrow the scheme used by nfs.ko. Buffered writes take the
i_rwsem exclusively, but buffered reads take a shared lock, allowing
them to run in parallel.
O_DIRECT requests also take a shared lock, but we need for them to not
run in parallel with buffered reads. A flag on the ceph_inode_info is
used to indicate whether it's in direct or buffered I/O mode. When a
conflicting request is submitted, it will block until the inode can be
flipped to the necessary mode.
Link: https://tracker.ceph.com/issues/40985
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: "Yan, Zheng" <zyan@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2019-08-02 17:15:39 +00:00
|
|
|
ceph_end_io_write(inode);
|
2013-05-02 04:15:58 +00:00
|
|
|
}
|
2011-07-26 18:27:34 +00:00
|
|
|
|
2013-04-12 08:11:13 +00:00
|
|
|
if (written >= 0) {
|
2011-05-04 18:33:47 +00:00
|
|
|
int dirty;
|
2018-01-05 10:47:22 +00:00
|
|
|
|
2011-11-30 17:47:09 +00:00
|
|
|
spin_lock(&ci->i_ceph_lock);
|
2015-06-10 09:26:13 +00:00
|
|
|
dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_FILE_WR,
|
|
|
|
&prealloc_cf);
|
2011-11-30 17:47:09 +00:00
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
2011-05-04 18:33:47 +00:00
|
|
|
if (dirty)
|
|
|
|
__mark_inode_dirty(inode, dirty);
|
2018-01-05 10:47:22 +00:00
|
|
|
if (ceph_quota_is_max_bytes_approaching(inode, iocb->ki_pos))
|
2022-10-18 01:03:29 +00:00
|
|
|
ceph_check_caps(ci, CHECK_CAPS_FLUSH);
|
2009-10-06 18:31:08 +00:00
|
|
|
}
|
2013-05-02 04:15:58 +00:00
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx %llu~%u dropping cap refs on %s\n",
|
|
|
|
inode, ceph_vinop(inode), pos, (unsigned)count,
|
|
|
|
ceph_cap_string(got));
|
2009-10-06 18:31:08 +00:00
|
|
|
ceph_put_cap_refs(ci, got);
|
2013-05-02 04:15:58 +00:00
|
|
|
|
2017-08-14 02:50:50 +00:00
|
|
|
if (written == -EOLDSNAPC) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx %llu~%u" "got EOLDSNAPC, retrying\n",
|
|
|
|
inode, ceph_vinop(inode), pos, (unsigned)count);
|
2017-08-14 02:50:50 +00:00
|
|
|
goto retry_snap;
|
|
|
|
}
|
|
|
|
|
2016-04-07 15:52:02 +00:00
|
|
|
if (written >= 0) {
|
2020-03-09 11:03:14 +00:00
|
|
|
if ((map_flags & CEPH_OSDMAP_NEARFULL) ||
|
|
|
|
(pool_flags & CEPH_POOL_FLAG_NEARFULL))
|
2016-04-07 15:52:02 +00:00
|
|
|
iocb->ki_flags |= IOCB_DSYNC;
|
|
|
|
written = generic_write_sync(iocb, written);
|
2013-03-01 02:55:39 +00:00
|
|
|
}
|
2013-04-12 08:11:13 +00:00
|
|
|
|
2013-08-09 16:57:58 +00:00
|
|
|
goto out_unlocked;
|
2021-08-11 10:40:42 +00:00
|
|
|
out_caps:
|
|
|
|
ceph_put_cap_refs(ci, got);
|
2013-04-12 08:11:13 +00:00
|
|
|
out:
|
2020-02-04 02:28:25 +00:00
|
|
|
if (direct_lock)
|
ceph: add buffered/direct exclusionary locking for reads and writes
xfstest generic/451 intermittently fails. The test does O_DIRECT writes
to a file, and then reads back the result using buffered I/O, while
running a separate set of tasks that are also doing buffered reads.
The client will invalidate the cache prior to a direct write, but it's
easy for one of the other readers' replies to race in and reinstantiate
the invalidated range with stale data.
To fix this, we must to serialize direct I/O writes and buffered reads.
We could just sprinkle in some shared locks on the i_rwsem for reads,
and increase the exclusive footprint on the write side, but that would
cause O_DIRECT writes to end up serialized vs. other direct requests.
Instead, borrow the scheme used by nfs.ko. Buffered writes take the
i_rwsem exclusively, but buffered reads take a shared lock, allowing
them to run in parallel.
O_DIRECT requests also take a shared lock, but we need for them to not
run in parallel with buffered reads. A flag on the ceph_inode_info is
used to indicate whether it's in direct or buffered I/O mode. When a
conflicting request is submitted, it will block until the inode can be
flipped to the necessary mode.
Link: https://tracker.ceph.com/issues/40985
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: "Yan, Zheng" <zyan@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2019-08-02 17:15:39 +00:00
|
|
|
ceph_end_io_direct(inode);
|
|
|
|
else
|
|
|
|
ceph_end_io_write(inode);
|
2013-08-09 16:57:58 +00:00
|
|
|
out_unlocked:
|
2015-06-10 09:26:13 +00:00
|
|
|
ceph_free_cap_flush(prealloc_cf);
|
2013-04-12 08:11:13 +00:00
|
|
|
return written ? written : err;
|
2009-10-06 18:31:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* llseek. be sure to verify file size on SEEK_END.
|
|
|
|
*/
|
2012-12-17 23:59:39 +00:00
|
|
|
static loff_t ceph_llseek(struct file *file, loff_t offset, int whence)
|
2009-10-06 18:31:08 +00:00
|
|
|
{
|
2012-12-17 23:59:39 +00:00
|
|
|
if (whence == SEEK_END || whence == SEEK_DATA || whence == SEEK_HOLE) {
|
2022-06-07 15:05:49 +00:00
|
|
|
struct inode *inode = file_inode(file);
|
|
|
|
int ret;
|
|
|
|
|
2014-09-16 13:46:17 +00:00
|
|
|
ret = ceph_do_getattr(inode, CEPH_STAT_CAP_SIZE, false);
|
2016-07-21 17:43:09 +00:00
|
|
|
if (ret < 0)
|
2022-06-07 15:05:49 +00:00
|
|
|
return ret;
|
2009-10-06 18:31:08 +00:00
|
|
|
}
|
2022-06-07 15:05:49 +00:00
|
|
|
return generic_file_llseek(file, offset, whence);
|
2009-10-06 18:31:08 +00:00
|
|
|
}
|
|
|
|
|
2013-08-15 03:51:44 +00:00
|
|
|
static inline void ceph_zero_partial_page(
|
|
|
|
struct inode *inode, loff_t offset, unsigned size)
|
|
|
|
{
|
|
|
|
struct page *page;
|
mm, fs: get rid of PAGE_CACHE_* and page_cache_{get,release} macros
PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} macros were introduced *long* time
ago with promise that one day it will be possible to implement page
cache with bigger chunks than PAGE_SIZE.
This promise never materialized. And unlikely will.
We have many places where PAGE_CACHE_SIZE assumed to be equal to
PAGE_SIZE. And it's constant source of confusion on whether
PAGE_CACHE_* or PAGE_* constant should be used in a particular case,
especially on the border between fs and mm.
Global switching to PAGE_CACHE_SIZE != PAGE_SIZE would cause to much
breakage to be doable.
Let's stop pretending that pages in page cache are special. They are
not.
The changes are pretty straight-forward:
- <foo> << (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- <foo> >> (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} -> PAGE_{SIZE,SHIFT,MASK,ALIGN};
- page_cache_get() -> get_page();
- page_cache_release() -> put_page();
This patch contains automated changes generated with coccinelle using
script below. For some reason, coccinelle doesn't patch header files.
I've called spatch for them manually.
The only adjustment after coccinelle is revert of changes to
PAGE_CAHCE_ALIGN definition: we are going to drop it later.
There are few places in the code where coccinelle didn't reach. I'll
fix them manually in a separate patch. Comments and documentation also
will be addressed with the separate patch.
virtual patch
@@
expression E;
@@
- E << (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
expression E;
@@
- E >> (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
@@
- PAGE_CACHE_SHIFT
+ PAGE_SHIFT
@@
@@
- PAGE_CACHE_SIZE
+ PAGE_SIZE
@@
@@
- PAGE_CACHE_MASK
+ PAGE_MASK
@@
expression E;
@@
- PAGE_CACHE_ALIGN(E)
+ PAGE_ALIGN(E)
@@
expression E;
@@
- page_cache_get(E)
+ get_page(E)
@@
expression E;
@@
- page_cache_release(E)
+ put_page(E)
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-04-01 12:29:47 +00:00
|
|
|
pgoff_t index = offset >> PAGE_SHIFT;
|
2013-08-15 03:51:44 +00:00
|
|
|
|
|
|
|
page = find_lock_page(inode->i_mapping, index);
|
|
|
|
if (page) {
|
|
|
|
wait_on_page_writeback(page);
|
mm, fs: get rid of PAGE_CACHE_* and page_cache_{get,release} macros
PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} macros were introduced *long* time
ago with promise that one day it will be possible to implement page
cache with bigger chunks than PAGE_SIZE.
This promise never materialized. And unlikely will.
We have many places where PAGE_CACHE_SIZE assumed to be equal to
PAGE_SIZE. And it's constant source of confusion on whether
PAGE_CACHE_* or PAGE_* constant should be used in a particular case,
especially on the border between fs and mm.
Global switching to PAGE_CACHE_SIZE != PAGE_SIZE would cause to much
breakage to be doable.
Let's stop pretending that pages in page cache are special. They are
not.
The changes are pretty straight-forward:
- <foo> << (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- <foo> >> (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} -> PAGE_{SIZE,SHIFT,MASK,ALIGN};
- page_cache_get() -> get_page();
- page_cache_release() -> put_page();
This patch contains automated changes generated with coccinelle using
script below. For some reason, coccinelle doesn't patch header files.
I've called spatch for them manually.
The only adjustment after coccinelle is revert of changes to
PAGE_CAHCE_ALIGN definition: we are going to drop it later.
There are few places in the code where coccinelle didn't reach. I'll
fix them manually in a separate patch. Comments and documentation also
will be addressed with the separate patch.
virtual patch
@@
expression E;
@@
- E << (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
expression E;
@@
- E >> (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
@@
- PAGE_CACHE_SHIFT
+ PAGE_SHIFT
@@
@@
- PAGE_CACHE_SIZE
+ PAGE_SIZE
@@
@@
- PAGE_CACHE_MASK
+ PAGE_MASK
@@
expression E;
@@
- PAGE_CACHE_ALIGN(E)
+ PAGE_ALIGN(E)
@@
expression E;
@@
- page_cache_get(E)
+ get_page(E)
@@
expression E;
@@
- page_cache_release(E)
+ put_page(E)
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-04-01 12:29:47 +00:00
|
|
|
zero_user(page, offset & (PAGE_SIZE - 1), size);
|
2013-08-15 03:51:44 +00:00
|
|
|
unlock_page(page);
|
mm, fs: get rid of PAGE_CACHE_* and page_cache_{get,release} macros
PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} macros were introduced *long* time
ago with promise that one day it will be possible to implement page
cache with bigger chunks than PAGE_SIZE.
This promise never materialized. And unlikely will.
We have many places where PAGE_CACHE_SIZE assumed to be equal to
PAGE_SIZE. And it's constant source of confusion on whether
PAGE_CACHE_* or PAGE_* constant should be used in a particular case,
especially on the border between fs and mm.
Global switching to PAGE_CACHE_SIZE != PAGE_SIZE would cause to much
breakage to be doable.
Let's stop pretending that pages in page cache are special. They are
not.
The changes are pretty straight-forward:
- <foo> << (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- <foo> >> (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} -> PAGE_{SIZE,SHIFT,MASK,ALIGN};
- page_cache_get() -> get_page();
- page_cache_release() -> put_page();
This patch contains automated changes generated with coccinelle using
script below. For some reason, coccinelle doesn't patch header files.
I've called spatch for them manually.
The only adjustment after coccinelle is revert of changes to
PAGE_CAHCE_ALIGN definition: we are going to drop it later.
There are few places in the code where coccinelle didn't reach. I'll
fix them manually in a separate patch. Comments and documentation also
will be addressed with the separate patch.
virtual patch
@@
expression E;
@@
- E << (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
expression E;
@@
- E >> (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
@@
- PAGE_CACHE_SHIFT
+ PAGE_SHIFT
@@
@@
- PAGE_CACHE_SIZE
+ PAGE_SIZE
@@
@@
- PAGE_CACHE_MASK
+ PAGE_MASK
@@
expression E;
@@
- PAGE_CACHE_ALIGN(E)
+ PAGE_ALIGN(E)
@@
expression E;
@@
- page_cache_get(E)
+ get_page(E)
@@
expression E;
@@
- page_cache_release(E)
+ put_page(E)
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-04-01 12:29:47 +00:00
|
|
|
put_page(page);
|
2013-08-15 03:51:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ceph_zero_pagecache_range(struct inode *inode, loff_t offset,
|
|
|
|
loff_t length)
|
|
|
|
{
|
mm, fs: get rid of PAGE_CACHE_* and page_cache_{get,release} macros
PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} macros were introduced *long* time
ago with promise that one day it will be possible to implement page
cache with bigger chunks than PAGE_SIZE.
This promise never materialized. And unlikely will.
We have many places where PAGE_CACHE_SIZE assumed to be equal to
PAGE_SIZE. And it's constant source of confusion on whether
PAGE_CACHE_* or PAGE_* constant should be used in a particular case,
especially on the border between fs and mm.
Global switching to PAGE_CACHE_SIZE != PAGE_SIZE would cause to much
breakage to be doable.
Let's stop pretending that pages in page cache are special. They are
not.
The changes are pretty straight-forward:
- <foo> << (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- <foo> >> (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} -> PAGE_{SIZE,SHIFT,MASK,ALIGN};
- page_cache_get() -> get_page();
- page_cache_release() -> put_page();
This patch contains automated changes generated with coccinelle using
script below. For some reason, coccinelle doesn't patch header files.
I've called spatch for them manually.
The only adjustment after coccinelle is revert of changes to
PAGE_CAHCE_ALIGN definition: we are going to drop it later.
There are few places in the code where coccinelle didn't reach. I'll
fix them manually in a separate patch. Comments and documentation also
will be addressed with the separate patch.
virtual patch
@@
expression E;
@@
- E << (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
expression E;
@@
- E >> (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
@@
- PAGE_CACHE_SHIFT
+ PAGE_SHIFT
@@
@@
- PAGE_CACHE_SIZE
+ PAGE_SIZE
@@
@@
- PAGE_CACHE_MASK
+ PAGE_MASK
@@
expression E;
@@
- PAGE_CACHE_ALIGN(E)
+ PAGE_ALIGN(E)
@@
expression E;
@@
- page_cache_get(E)
+ get_page(E)
@@
expression E;
@@
- page_cache_release(E)
+ put_page(E)
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-04-01 12:29:47 +00:00
|
|
|
loff_t nearly = round_up(offset, PAGE_SIZE);
|
2013-08-15 03:51:44 +00:00
|
|
|
if (offset < nearly) {
|
|
|
|
loff_t size = nearly - offset;
|
|
|
|
if (length < size)
|
|
|
|
size = length;
|
|
|
|
ceph_zero_partial_page(inode, offset, size);
|
|
|
|
offset += size;
|
|
|
|
length -= size;
|
|
|
|
}
|
mm, fs: get rid of PAGE_CACHE_* and page_cache_{get,release} macros
PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} macros were introduced *long* time
ago with promise that one day it will be possible to implement page
cache with bigger chunks than PAGE_SIZE.
This promise never materialized. And unlikely will.
We have many places where PAGE_CACHE_SIZE assumed to be equal to
PAGE_SIZE. And it's constant source of confusion on whether
PAGE_CACHE_* or PAGE_* constant should be used in a particular case,
especially on the border between fs and mm.
Global switching to PAGE_CACHE_SIZE != PAGE_SIZE would cause to much
breakage to be doable.
Let's stop pretending that pages in page cache are special. They are
not.
The changes are pretty straight-forward:
- <foo> << (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- <foo> >> (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} -> PAGE_{SIZE,SHIFT,MASK,ALIGN};
- page_cache_get() -> get_page();
- page_cache_release() -> put_page();
This patch contains automated changes generated with coccinelle using
script below. For some reason, coccinelle doesn't patch header files.
I've called spatch for them manually.
The only adjustment after coccinelle is revert of changes to
PAGE_CAHCE_ALIGN definition: we are going to drop it later.
There are few places in the code where coccinelle didn't reach. I'll
fix them manually in a separate patch. Comments and documentation also
will be addressed with the separate patch.
virtual patch
@@
expression E;
@@
- E << (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
expression E;
@@
- E >> (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
@@
- PAGE_CACHE_SHIFT
+ PAGE_SHIFT
@@
@@
- PAGE_CACHE_SIZE
+ PAGE_SIZE
@@
@@
- PAGE_CACHE_MASK
+ PAGE_MASK
@@
expression E;
@@
- PAGE_CACHE_ALIGN(E)
+ PAGE_ALIGN(E)
@@
expression E;
@@
- page_cache_get(E)
+ get_page(E)
@@
expression E;
@@
- page_cache_release(E)
+ put_page(E)
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-04-01 12:29:47 +00:00
|
|
|
if (length >= PAGE_SIZE) {
|
|
|
|
loff_t size = round_down(length, PAGE_SIZE);
|
2013-08-15 03:51:44 +00:00
|
|
|
truncate_pagecache_range(inode, offset, offset + size - 1);
|
|
|
|
offset += size;
|
|
|
|
length -= size;
|
|
|
|
}
|
|
|
|
if (length)
|
|
|
|
ceph_zero_partial_page(inode, offset, length);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ceph_zero_partial_object(struct inode *inode,
|
|
|
|
loff_t offset, loff_t *length)
|
|
|
|
{
|
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
2023-06-12 02:50:38 +00:00
|
|
|
struct ceph_fs_client *fsc = ceph_inode_to_fs_client(inode);
|
2013-08-15 03:51:44 +00:00
|
|
|
struct ceph_osd_request *req;
|
|
|
|
int ret = 0;
|
|
|
|
loff_t zero = 0;
|
|
|
|
int op;
|
|
|
|
|
2023-02-01 01:36:45 +00:00
|
|
|
if (ceph_inode_is_shutdown(inode))
|
|
|
|
return -EIO;
|
|
|
|
|
2013-08-15 03:51:44 +00:00
|
|
|
if (!length) {
|
|
|
|
op = offset ? CEPH_OSD_OP_DELETE : CEPH_OSD_OP_TRUNCATE;
|
|
|
|
length = &zero;
|
|
|
|
} else {
|
|
|
|
op = CEPH_OSD_OP_ZERO;
|
|
|
|
}
|
|
|
|
|
|
|
|
req = ceph_osdc_new_request(&fsc->client->osdc, &ci->i_layout,
|
|
|
|
ceph_vino(inode),
|
|
|
|
offset, length,
|
2014-11-13 06:40:37 +00:00
|
|
|
0, 1, op,
|
2017-02-11 17:48:41 +00:00
|
|
|
CEPH_OSD_FLAG_WRITE,
|
2013-08-15 03:51:44 +00:00
|
|
|
NULL, 0, 0, false);
|
|
|
|
if (IS_ERR(req)) {
|
|
|
|
ret = PTR_ERR(req);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2023-10-04 18:52:09 +00:00
|
|
|
req->r_mtime = inode_get_mtime(inode);
|
2022-06-30 20:21:50 +00:00
|
|
|
ceph_osdc_start_request(&fsc->client->osdc, req);
|
|
|
|
ret = ceph_osdc_wait_request(&fsc->client->osdc, req);
|
|
|
|
if (ret == -ENOENT)
|
|
|
|
ret = 0;
|
2013-08-15 03:51:44 +00:00
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ceph_zero_objects(struct inode *inode, loff_t offset, loff_t length)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
2016-02-03 13:24:49 +00:00
|
|
|
s32 stripe_unit = ci->i_layout.stripe_unit;
|
|
|
|
s32 stripe_count = ci->i_layout.stripe_count;
|
|
|
|
s32 object_size = ci->i_layout.object_size;
|
2013-08-27 19:15:16 +00:00
|
|
|
u64 object_set_size = object_size * stripe_count;
|
|
|
|
u64 nearly, t;
|
|
|
|
|
|
|
|
/* round offset up to next period boundary */
|
|
|
|
nearly = offset + object_set_size - 1;
|
|
|
|
t = nearly;
|
|
|
|
nearly -= do_div(t, object_set_size);
|
2013-08-15 03:51:44 +00:00
|
|
|
|
|
|
|
while (length && offset < nearly) {
|
|
|
|
loff_t size = length;
|
|
|
|
ret = ceph_zero_partial_object(inode, offset, &size);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
offset += size;
|
|
|
|
length -= size;
|
|
|
|
}
|
|
|
|
while (length >= object_set_size) {
|
|
|
|
int i;
|
|
|
|
loff_t pos = offset;
|
|
|
|
for (i = 0; i < stripe_count; ++i) {
|
|
|
|
ret = ceph_zero_partial_object(inode, pos, NULL);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
pos += stripe_unit;
|
|
|
|
}
|
|
|
|
offset += object_set_size;
|
|
|
|
length -= object_set_size;
|
|
|
|
}
|
|
|
|
while (length) {
|
|
|
|
loff_t size = length;
|
|
|
|
ret = ceph_zero_partial_object(inode, offset, &size);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
offset += size;
|
|
|
|
length -= size;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static long ceph_fallocate(struct file *file, int mode,
|
|
|
|
loff_t offset, loff_t length)
|
|
|
|
{
|
|
|
|
struct ceph_file_info *fi = file->private_data;
|
2013-12-11 05:49:11 +00:00
|
|
|
struct inode *inode = file_inode(file);
|
2013-08-15 03:51:44 +00:00
|
|
|
struct ceph_inode_info *ci = ceph_inode(inode);
|
2015-06-10 09:26:13 +00:00
|
|
|
struct ceph_cap_flush *prealloc_cf;
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = ceph_inode_to_client(inode);
|
2013-08-15 03:51:44 +00:00
|
|
|
int want, got = 0;
|
|
|
|
int dirty;
|
|
|
|
int ret = 0;
|
|
|
|
loff_t endoff = 0;
|
|
|
|
loff_t size;
|
|
|
|
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "%p %llx.%llx mode %x, offset %llu length %llu\n",
|
|
|
|
inode, ceph_vinop(inode), mode, offset, length);
|
2023-02-13 05:56:20 +00:00
|
|
|
|
2018-10-09 17:54:28 +00:00
|
|
|
if (mode != (FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE))
|
2014-06-26 07:25:17 +00:00
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2013-08-15 03:51:44 +00:00
|
|
|
if (!S_ISREG(inode->i_mode))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2021-07-01 18:40:51 +00:00
|
|
|
if (IS_ENCRYPTED(inode))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2015-06-10 09:26:13 +00:00
|
|
|
prealloc_cf = ceph_alloc_cap_flush();
|
|
|
|
if (!prealloc_cf)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2016-01-22 20:40:57 +00:00
|
|
|
inode_lock(inode);
|
2013-08-15 03:51:44 +00:00
|
|
|
|
|
|
|
if (ceph_snap(inode) != CEPH_NOSNAP) {
|
|
|
|
ret = -EROFS;
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
size = i_size_read(inode);
|
2018-10-09 17:54:28 +00:00
|
|
|
|
|
|
|
/* Are we punching a hole beyond EOF? */
|
|
|
|
if (offset >= size)
|
|
|
|
goto unlock;
|
|
|
|
if ((offset + length) > size)
|
|
|
|
length = size - offset;
|
2013-08-15 03:51:44 +00:00
|
|
|
|
|
|
|
if (fi->fmode & CEPH_FILE_MODE_LAZY)
|
|
|
|
want = CEPH_CAP_FILE_BUFFER | CEPH_CAP_FILE_LAZYIO;
|
|
|
|
else
|
|
|
|
want = CEPH_CAP_FILE_BUFFER;
|
|
|
|
|
2021-04-05 16:19:35 +00:00
|
|
|
ret = ceph_get_caps(file, CEPH_CAP_FILE_WR, want, endoff, &got);
|
2013-08-15 03:51:44 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto unlock;
|
|
|
|
|
2023-02-13 05:56:20 +00:00
|
|
|
ret = file_modified(file);
|
|
|
|
if (ret)
|
|
|
|
goto put_caps;
|
|
|
|
|
2021-04-22 14:38:26 +00:00
|
|
|
filemap_invalidate_lock(inode->i_mapping);
|
2021-12-07 13:44:50 +00:00
|
|
|
ceph_fscache_invalidate(inode, false);
|
2018-10-09 17:54:28 +00:00
|
|
|
ceph_zero_pagecache_range(inode, offset, length);
|
|
|
|
ret = ceph_zero_objects(inode, offset, length);
|
2013-08-15 03:51:44 +00:00
|
|
|
|
|
|
|
if (!ret) {
|
|
|
|
spin_lock(&ci->i_ceph_lock);
|
2015-06-10 09:26:13 +00:00
|
|
|
dirty = __ceph_mark_dirty_caps(ci, CEPH_CAP_FILE_WR,
|
|
|
|
&prealloc_cf);
|
2013-08-15 03:51:44 +00:00
|
|
|
spin_unlock(&ci->i_ceph_lock);
|
|
|
|
if (dirty)
|
|
|
|
__mark_inode_dirty(inode, dirty);
|
|
|
|
}
|
2021-04-22 14:38:26 +00:00
|
|
|
filemap_invalidate_unlock(inode->i_mapping);
|
2013-08-15 03:51:44 +00:00
|
|
|
|
2023-02-13 05:56:20 +00:00
|
|
|
put_caps:
|
2013-08-15 03:51:44 +00:00
|
|
|
ceph_put_cap_refs(ci, got);
|
|
|
|
unlock:
|
2016-01-22 20:40:57 +00:00
|
|
|
inode_unlock(inode);
|
2015-06-10 09:26:13 +00:00
|
|
|
ceph_free_cap_flush(prealloc_cf);
|
2013-08-15 03:51:44 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-10-15 15:45:59 +00:00
|
|
|
/*
|
|
|
|
* This function tries to get FILE_WR capabilities for dst_ci and FILE_RD for
|
|
|
|
* src_ci. Two attempts are made to obtain both caps, and an error is return if
|
|
|
|
* this fails; zero is returned on success.
|
|
|
|
*/
|
2019-07-25 12:16:43 +00:00
|
|
|
static int get_rd_wr_caps(struct file *src_filp, int *src_got,
|
|
|
|
struct file *dst_filp,
|
2018-10-15 15:45:59 +00:00
|
|
|
loff_t dst_endoff, int *dst_got)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
bool retrying = false;
|
|
|
|
|
|
|
|
retry_caps:
|
2019-07-25 12:16:43 +00:00
|
|
|
ret = ceph_get_caps(dst_filp, CEPH_CAP_FILE_WR, CEPH_CAP_FILE_BUFFER,
|
2021-04-05 16:19:35 +00:00
|
|
|
dst_endoff, dst_got);
|
2018-10-15 15:45:59 +00:00
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Since we're already holding the FILE_WR capability for the dst file,
|
|
|
|
* we would risk a deadlock by using ceph_get_caps. Thus, we'll do some
|
|
|
|
* retry dance instead to try to get both capabilities.
|
|
|
|
*/
|
2019-07-25 12:16:43 +00:00
|
|
|
ret = ceph_try_get_caps(file_inode(src_filp),
|
|
|
|
CEPH_CAP_FILE_RD, CEPH_CAP_FILE_SHARED,
|
2018-10-15 15:45:59 +00:00
|
|
|
false, src_got);
|
|
|
|
if (ret <= 0) {
|
|
|
|
/* Start by dropping dst_ci caps and getting src_ci caps */
|
2019-07-25 12:16:43 +00:00
|
|
|
ceph_put_cap_refs(ceph_inode(file_inode(dst_filp)), *dst_got);
|
2018-10-15 15:45:59 +00:00
|
|
|
if (retrying) {
|
|
|
|
if (!ret)
|
|
|
|
/* ceph_try_get_caps masks EAGAIN */
|
|
|
|
ret = -EAGAIN;
|
|
|
|
return ret;
|
|
|
|
}
|
2019-07-25 12:16:43 +00:00
|
|
|
ret = ceph_get_caps(src_filp, CEPH_CAP_FILE_RD,
|
2021-04-05 16:19:35 +00:00
|
|
|
CEPH_CAP_FILE_SHARED, -1, src_got);
|
2018-10-15 15:45:59 +00:00
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
/*... drop src_ci caps too, and retry */
|
2019-07-25 12:16:43 +00:00
|
|
|
ceph_put_cap_refs(ceph_inode(file_inode(src_filp)), *src_got);
|
2018-10-15 15:45:59 +00:00
|
|
|
retrying = true;
|
|
|
|
goto retry_caps;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void put_rd_wr_caps(struct ceph_inode_info *src_ci, int src_got,
|
|
|
|
struct ceph_inode_info *dst_ci, int dst_got)
|
|
|
|
{
|
|
|
|
ceph_put_cap_refs(src_ci, src_got);
|
|
|
|
ceph_put_cap_refs(dst_ci, dst_got);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This function does several size-related checks, returning an error if:
|
|
|
|
* - source file is smaller than off+len
|
|
|
|
* - destination file size is not OK (inode_newsize_ok())
|
|
|
|
* - max bytes quotas is exceeded
|
|
|
|
*/
|
|
|
|
static int is_file_size_ok(struct inode *src_inode, struct inode *dst_inode,
|
|
|
|
loff_t src_off, loff_t dst_off, size_t len)
|
|
|
|
{
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = ceph_inode_to_client(src_inode);
|
2018-10-15 15:45:59 +00:00
|
|
|
loff_t size, endoff;
|
|
|
|
|
|
|
|
size = i_size_read(src_inode);
|
|
|
|
/*
|
|
|
|
* Don't copy beyond source file EOF. Instead of simply setting length
|
|
|
|
* to (size - src_off), just drop to VFS default implementation, as the
|
|
|
|
* local i_size may be stale due to other clients writing to the source
|
|
|
|
* inode.
|
|
|
|
*/
|
|
|
|
if (src_off + len > size) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "Copy beyond EOF (%llu + %zu > %llu)\n", src_off,
|
|
|
|
len, size);
|
2018-10-15 15:45:59 +00:00
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
size = i_size_read(dst_inode);
|
|
|
|
|
|
|
|
endoff = dst_off + len;
|
|
|
|
if (inode_newsize_ok(dst_inode, endoff))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
if (ceph_quota_is_max_bytes_exceeded(dst_inode, endoff))
|
|
|
|
return -EDQUOT;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-11-04 12:31:46 +00:00
|
|
|
static struct ceph_osd_request *
|
|
|
|
ceph_alloc_copyfrom_request(struct ceph_osd_client *osdc,
|
|
|
|
u64 src_snapid,
|
|
|
|
struct ceph_object_id *src_oid,
|
|
|
|
struct ceph_object_locator *src_oloc,
|
|
|
|
struct ceph_object_id *dst_oid,
|
|
|
|
struct ceph_object_locator *dst_oloc,
|
|
|
|
u32 truncate_seq, u64 truncate_size)
|
|
|
|
{
|
|
|
|
struct ceph_osd_request *req;
|
|
|
|
int ret;
|
|
|
|
u32 src_fadvise_flags =
|
|
|
|
CEPH_OSD_OP_FLAG_FADVISE_SEQUENTIAL |
|
|
|
|
CEPH_OSD_OP_FLAG_FADVISE_NOCACHE;
|
|
|
|
u32 dst_fadvise_flags =
|
|
|
|
CEPH_OSD_OP_FLAG_FADVISE_SEQUENTIAL |
|
|
|
|
CEPH_OSD_OP_FLAG_FADVISE_DONTNEED;
|
|
|
|
|
|
|
|
req = ceph_osdc_alloc_request(osdc, NULL, 1, false, GFP_KERNEL);
|
|
|
|
if (!req)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
|
|
|
req->r_flags = CEPH_OSD_FLAG_WRITE;
|
|
|
|
|
|
|
|
ceph_oloc_copy(&req->r_t.base_oloc, dst_oloc);
|
|
|
|
ceph_oid_copy(&req->r_t.base_oid, dst_oid);
|
|
|
|
|
|
|
|
ret = osd_req_op_copy_from_init(req, src_snapid, 0,
|
|
|
|
src_oid, src_oloc,
|
|
|
|
src_fadvise_flags,
|
|
|
|
dst_fadvise_flags,
|
|
|
|
truncate_seq,
|
|
|
|
truncate_size,
|
|
|
|
CEPH_OSD_COPY_FROM_FLAG_TRUNCATE_SEQ);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
ret = ceph_osdc_alloc_messages(req, GFP_KERNEL);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
return req;
|
|
|
|
|
|
|
|
out:
|
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
|
|
|
|
2020-02-24 13:44:32 +00:00
|
|
|
static ssize_t ceph_do_objects_copy(struct ceph_inode_info *src_ci, u64 *src_off,
|
|
|
|
struct ceph_inode_info *dst_ci, u64 *dst_off,
|
|
|
|
struct ceph_fs_client *fsc,
|
|
|
|
size_t len, unsigned int flags)
|
|
|
|
{
|
|
|
|
struct ceph_object_locator src_oloc, dst_oloc;
|
|
|
|
struct ceph_object_id src_oid, dst_oid;
|
2021-11-04 12:31:46 +00:00
|
|
|
struct ceph_osd_client *osdc;
|
|
|
|
struct ceph_osd_request *req;
|
2020-02-24 13:44:32 +00:00
|
|
|
size_t bytes = 0;
|
|
|
|
u64 src_objnum, src_objoff, dst_objnum, dst_objoff;
|
|
|
|
u32 src_objlen, dst_objlen;
|
|
|
|
u32 object_size = src_ci->i_layout.object_size;
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = fsc->client;
|
2020-02-24 13:44:32 +00:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
src_oloc.pool = src_ci->i_layout.pool_id;
|
|
|
|
src_oloc.pool_ns = ceph_try_get_string(src_ci->i_layout.pool_ns);
|
|
|
|
dst_oloc.pool = dst_ci->i_layout.pool_id;
|
|
|
|
dst_oloc.pool_ns = ceph_try_get_string(dst_ci->i_layout.pool_ns);
|
2021-11-04 12:31:46 +00:00
|
|
|
osdc = &fsc->client->osdc;
|
2020-02-24 13:44:32 +00:00
|
|
|
|
|
|
|
while (len >= object_size) {
|
|
|
|
ceph_calc_file_object_mapping(&src_ci->i_layout, *src_off,
|
|
|
|
object_size, &src_objnum,
|
|
|
|
&src_objoff, &src_objlen);
|
|
|
|
ceph_calc_file_object_mapping(&dst_ci->i_layout, *dst_off,
|
|
|
|
object_size, &dst_objnum,
|
|
|
|
&dst_objoff, &dst_objlen);
|
|
|
|
ceph_oid_init(&src_oid);
|
|
|
|
ceph_oid_printf(&src_oid, "%llx.%08llx",
|
|
|
|
src_ci->i_vino.ino, src_objnum);
|
|
|
|
ceph_oid_init(&dst_oid);
|
|
|
|
ceph_oid_printf(&dst_oid, "%llx.%08llx",
|
|
|
|
dst_ci->i_vino.ino, dst_objnum);
|
|
|
|
/* Do an object remote copy */
|
2021-11-04 12:31:46 +00:00
|
|
|
req = ceph_alloc_copyfrom_request(osdc, src_ci->i_vino.snap,
|
|
|
|
&src_oid, &src_oloc,
|
|
|
|
&dst_oid, &dst_oloc,
|
|
|
|
dst_ci->i_truncate_seq,
|
|
|
|
dst_ci->i_truncate_size);
|
|
|
|
if (IS_ERR(req))
|
|
|
|
ret = PTR_ERR(req);
|
|
|
|
else {
|
2022-06-30 20:21:50 +00:00
|
|
|
ceph_osdc_start_request(osdc, req);
|
2021-11-04 12:31:46 +00:00
|
|
|
ret = ceph_osdc_wait_request(osdc, req);
|
2021-11-04 12:31:47 +00:00
|
|
|
ceph_update_copyfrom_metrics(&fsc->mdsc->metric,
|
|
|
|
req->r_start_latency,
|
|
|
|
req->r_end_latency,
|
|
|
|
object_size, ret);
|
2021-11-04 12:31:46 +00:00
|
|
|
ceph_osdc_put_request(req);
|
|
|
|
}
|
2020-02-24 13:44:32 +00:00
|
|
|
if (ret) {
|
|
|
|
if (ret == -EOPNOTSUPP) {
|
|
|
|
fsc->have_copy_from2 = false;
|
2023-06-12 01:04:07 +00:00
|
|
|
pr_notice_client(cl,
|
|
|
|
"OSDs don't support copy-from2; disabling copy offload\n");
|
2020-02-24 13:44:32 +00:00
|
|
|
}
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "returned %d\n", ret);
|
2020-02-24 13:44:32 +00:00
|
|
|
if (!bytes)
|
|
|
|
bytes = ret;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
len -= object_size;
|
|
|
|
bytes += object_size;
|
|
|
|
*src_off += object_size;
|
|
|
|
*dst_off += object_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
ceph_oloc_destroy(&src_oloc);
|
|
|
|
ceph_oloc_destroy(&dst_oloc);
|
|
|
|
return bytes;
|
|
|
|
}
|
|
|
|
|
2019-06-05 15:04:47 +00:00
|
|
|
static ssize_t __ceph_copy_file_range(struct file *src_file, loff_t src_off,
|
|
|
|
struct file *dst_file, loff_t dst_off,
|
|
|
|
size_t len, unsigned int flags)
|
2018-10-15 15:45:59 +00:00
|
|
|
{
|
|
|
|
struct inode *src_inode = file_inode(src_file);
|
|
|
|
struct inode *dst_inode = file_inode(dst_file);
|
|
|
|
struct ceph_inode_info *src_ci = ceph_inode(src_inode);
|
|
|
|
struct ceph_inode_info *dst_ci = ceph_inode(dst_inode);
|
|
|
|
struct ceph_cap_flush *prealloc_cf;
|
2023-06-12 02:50:38 +00:00
|
|
|
struct ceph_fs_client *src_fsc = ceph_inode_to_fs_client(src_inode);
|
2023-06-12 01:04:07 +00:00
|
|
|
struct ceph_client *cl = src_fsc->client;
|
2020-02-24 13:44:32 +00:00
|
|
|
loff_t size;
|
|
|
|
ssize_t ret = -EIO, bytes;
|
2018-10-15 15:45:59 +00:00
|
|
|
u64 src_objnum, dst_objnum, src_objoff, dst_objoff;
|
2020-02-24 13:44:32 +00:00
|
|
|
u32 src_objlen, dst_objlen;
|
2018-10-15 15:45:59 +00:00
|
|
|
int src_got = 0, dst_got = 0, err, dirty;
|
|
|
|
|
2019-09-09 15:48:54 +00:00
|
|
|
if (src_inode->i_sb != dst_inode->i_sb) {
|
2023-06-12 02:50:38 +00:00
|
|
|
struct ceph_fs_client *dst_fsc = ceph_inode_to_fs_client(dst_inode);
|
2019-09-09 15:48:54 +00:00
|
|
|
|
|
|
|
if (ceph_fsid_compare(&src_fsc->client->fsid,
|
|
|
|
&dst_fsc->client->fsid)) {
|
|
|
|
dout("Copying files across clusters: src: %pU dst: %pU\n",
|
|
|
|
&src_fsc->client->fsid, &dst_fsc->client->fsid);
|
|
|
|
return -EXDEV;
|
|
|
|
}
|
|
|
|
}
|
2018-10-15 15:45:59 +00:00
|
|
|
if (ceph_snap(dst_inode) != CEPH_NOSNAP)
|
|
|
|
return -EROFS;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Some of the checks below will return -EOPNOTSUPP, which will force a
|
|
|
|
* fallback to the default VFS copy_file_range implementation. This is
|
|
|
|
* desirable in several cases (for ex, the 'len' is smaller than the
|
|
|
|
* size of the objects, or in cases where that would be more
|
|
|
|
* efficient).
|
|
|
|
*/
|
|
|
|
|
2019-09-09 15:48:54 +00:00
|
|
|
if (ceph_test_mount_opt(src_fsc, NOCOPYFROM))
|
2018-10-15 15:46:00 +00:00
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2020-01-08 10:03:53 +00:00
|
|
|
if (!src_fsc->have_copy_from2)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2019-10-31 11:49:39 +00:00
|
|
|
/*
|
|
|
|
* Striped file layouts require that we copy partial objects, but the
|
|
|
|
* OSD copy-from operation only supports full-object copies. Limit
|
|
|
|
* this to non-striped file layouts for now.
|
|
|
|
*/
|
2018-10-15 15:45:59 +00:00
|
|
|
if ((src_ci->i_layout.stripe_unit != dst_ci->i_layout.stripe_unit) ||
|
2019-10-31 11:49:39 +00:00
|
|
|
(src_ci->i_layout.stripe_count != 1) ||
|
|
|
|
(dst_ci->i_layout.stripe_count != 1) ||
|
|
|
|
(src_ci->i_layout.object_size != dst_ci->i_layout.object_size)) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "Invalid src/dst files layout\n");
|
2018-10-15 15:45:59 +00:00
|
|
|
return -EOPNOTSUPP;
|
2019-10-31 11:49:39 +00:00
|
|
|
}
|
2018-10-15 15:45:59 +00:00
|
|
|
|
2021-07-01 18:40:51 +00:00
|
|
|
/* Every encrypted inode gets its own key, so we can't offload them */
|
|
|
|
if (IS_ENCRYPTED(src_inode) || IS_ENCRYPTED(dst_inode))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2018-10-15 15:45:59 +00:00
|
|
|
if (len < src_ci->i_layout.object_size)
|
|
|
|
return -EOPNOTSUPP; /* no remote copy will be done */
|
|
|
|
|
|
|
|
prealloc_cf = ceph_alloc_cap_flush();
|
|
|
|
if (!prealloc_cf)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2018-10-23 16:53:14 +00:00
|
|
|
/* Start by sync'ing the source and destination files */
|
2018-10-15 15:45:59 +00:00
|
|
|
ret = file_write_and_wait_range(src_file, src_off, (src_off + len));
|
2018-10-23 16:53:14 +00:00
|
|
|
if (ret < 0) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "failed to write src file (%zd)\n", ret);
|
2018-10-23 16:53:14 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
ret = file_write_and_wait_range(dst_file, dst_off, (dst_off + len));
|
|
|
|
if (ret < 0) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "failed to write dst file (%zd)\n", ret);
|
2018-10-15 15:45:59 +00:00
|
|
|
goto out;
|
2018-10-23 16:53:14 +00:00
|
|
|
}
|
2018-10-15 15:45:59 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We need FILE_WR caps for dst_ci and FILE_RD for src_ci as other
|
|
|
|
* clients may have dirty data in their caches. And OSDs know nothing
|
|
|
|
* about caps, so they can't safely do the remote object copies.
|
|
|
|
*/
|
2019-07-25 12:16:43 +00:00
|
|
|
err = get_rd_wr_caps(src_file, &src_got,
|
|
|
|
dst_file, (dst_off + len), &dst_got);
|
2018-10-15 15:45:59 +00:00
|
|
|
if (err < 0) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "get_rd_wr_caps returned %d\n", err);
|
2018-10-15 15:45:59 +00:00
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = is_file_size_ok(src_inode, dst_inode, src_off, dst_off, len);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out_caps;
|
|
|
|
|
|
|
|
/* Drop dst file cached pages */
|
2021-12-07 13:44:50 +00:00
|
|
|
ceph_fscache_invalidate(dst_inode, false);
|
2018-10-15 15:45:59 +00:00
|
|
|
ret = invalidate_inode_pages2_range(dst_inode->i_mapping,
|
|
|
|
dst_off >> PAGE_SHIFT,
|
2020-02-24 13:44:32 +00:00
|
|
|
(dst_off + len) >> PAGE_SHIFT);
|
2018-10-15 15:45:59 +00:00
|
|
|
if (ret < 0) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "Failed to invalidate inode pages (%zd)\n",
|
|
|
|
ret);
|
2018-10-15 15:45:59 +00:00
|
|
|
ret = 0; /* XXX */
|
|
|
|
}
|
|
|
|
ceph_calc_file_object_mapping(&src_ci->i_layout, src_off,
|
|
|
|
src_ci->i_layout.object_size,
|
|
|
|
&src_objnum, &src_objoff, &src_objlen);
|
|
|
|
ceph_calc_file_object_mapping(&dst_ci->i_layout, dst_off,
|
|
|
|
dst_ci->i_layout.object_size,
|
|
|
|
&dst_objnum, &dst_objoff, &dst_objlen);
|
|
|
|
/* object-level offsets need to the same */
|
|
|
|
if (src_objoff != dst_objoff) {
|
|
|
|
ret = -EOPNOTSUPP;
|
|
|
|
goto out_caps;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Do a manual copy if the object offset isn't object aligned.
|
|
|
|
* 'src_objlen' contains the bytes left until the end of the object,
|
|
|
|
* starting at the src_off
|
|
|
|
*/
|
|
|
|
if (src_objoff) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "Initial partial copy of %u bytes\n", src_objlen);
|
2020-02-24 13:44:32 +00:00
|
|
|
|
2018-10-15 15:45:59 +00:00
|
|
|
/*
|
|
|
|
* we need to temporarily drop all caps as we'll be calling
|
|
|
|
* {read,write}_iter, which will get caps again.
|
|
|
|
*/
|
|
|
|
put_rd_wr_caps(src_ci, src_got, dst_ci, dst_got);
|
2023-11-30 14:16:22 +00:00
|
|
|
ret = splice_file_range(src_file, &src_off, dst_file, &dst_off,
|
|
|
|
src_objlen);
|
2020-02-24 13:44:32 +00:00
|
|
|
/* Abort on short copies or on error */
|
2023-10-07 08:52:39 +00:00
|
|
|
if (ret < (long)src_objlen) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "Failed partial copy (%zd)\n", ret);
|
2018-10-15 15:45:59 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
len -= ret;
|
2019-07-25 12:16:43 +00:00
|
|
|
err = get_rd_wr_caps(src_file, &src_got,
|
|
|
|
dst_file, (dst_off + len), &dst_got);
|
2018-10-15 15:45:59 +00:00
|
|
|
if (err < 0)
|
|
|
|
goto out;
|
|
|
|
err = is_file_size_ok(src_inode, dst_inode,
|
|
|
|
src_off, dst_off, len);
|
|
|
|
if (err < 0)
|
|
|
|
goto out_caps;
|
|
|
|
}
|
|
|
|
|
2020-02-24 13:44:32 +00:00
|
|
|
size = i_size_read(dst_inode);
|
|
|
|
bytes = ceph_do_objects_copy(src_ci, &src_off, dst_ci, &dst_off,
|
|
|
|
src_fsc, len, flags);
|
|
|
|
if (bytes <= 0) {
|
|
|
|
if (!ret)
|
|
|
|
ret = bytes;
|
|
|
|
goto out_caps;
|
|
|
|
}
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "Copied %zu bytes out of %zu\n", bytes, len);
|
2020-02-24 13:44:32 +00:00
|
|
|
len -= bytes;
|
|
|
|
ret += bytes;
|
2018-10-15 15:45:59 +00:00
|
|
|
|
|
|
|
file_update_time(dst_file);
|
2019-06-06 12:57:27 +00:00
|
|
|
inode_inc_iversion_raw(dst_inode);
|
|
|
|
|
2020-02-24 13:44:32 +00:00
|
|
|
if (dst_off > size) {
|
2018-10-15 15:45:59 +00:00
|
|
|
/* Let the MDS know about dst file size change */
|
2020-03-05 12:21:01 +00:00
|
|
|
if (ceph_inode_set_size(dst_inode, dst_off) ||
|
|
|
|
ceph_quota_is_max_bytes_approaching(dst_inode, dst_off))
|
2022-10-18 01:03:29 +00:00
|
|
|
ceph_check_caps(dst_ci, CHECK_CAPS_AUTHONLY | CHECK_CAPS_FLUSH);
|
2018-10-15 15:45:59 +00:00
|
|
|
}
|
|
|
|
/* Mark Fw dirty */
|
|
|
|
spin_lock(&dst_ci->i_ceph_lock);
|
|
|
|
dirty = __ceph_mark_dirty_caps(dst_ci, CEPH_CAP_FILE_WR, &prealloc_cf);
|
|
|
|
spin_unlock(&dst_ci->i_ceph_lock);
|
|
|
|
if (dirty)
|
|
|
|
__mark_inode_dirty(dst_inode, dirty);
|
|
|
|
|
|
|
|
out_caps:
|
|
|
|
put_rd_wr_caps(src_ci, src_got, dst_ci, dst_got);
|
|
|
|
|
2020-02-24 13:44:32 +00:00
|
|
|
/*
|
|
|
|
* Do the final manual copy if we still have some bytes left, unless
|
|
|
|
* there were errors in remote object copies (len >= object_size).
|
|
|
|
*/
|
|
|
|
if (len && (len < src_ci->i_layout.object_size)) {
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "Final partial copy of %zu bytes\n", len);
|
2023-11-30 14:16:22 +00:00
|
|
|
bytes = splice_file_range(src_file, &src_off, dst_file,
|
|
|
|
&dst_off, len);
|
2020-02-24 13:44:32 +00:00
|
|
|
if (bytes > 0)
|
|
|
|
ret += bytes;
|
|
|
|
else
|
2023-06-12 01:04:07 +00:00
|
|
|
doutc(cl, "Failed partial copy (%zd)\n", bytes);
|
2018-10-15 15:45:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
ceph_free_cap_flush(prealloc_cf);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-06-05 15:04:47 +00:00
|
|
|
static ssize_t ceph_copy_file_range(struct file *src_file, loff_t src_off,
|
|
|
|
struct file *dst_file, loff_t dst_off,
|
|
|
|
size_t len, unsigned int flags)
|
|
|
|
{
|
|
|
|
ssize_t ret;
|
|
|
|
|
|
|
|
ret = __ceph_copy_file_range(src_file, src_off, dst_file, dst_off,
|
|
|
|
len, flags);
|
|
|
|
|
2019-06-05 15:04:50 +00:00
|
|
|
if (ret == -EOPNOTSUPP || ret == -EXDEV)
|
2023-12-12 09:44:37 +00:00
|
|
|
ret = splice_copy_file_range(src_file, src_off, dst_file,
|
|
|
|
dst_off, len);
|
2019-06-05 15:04:47 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-10-06 18:31:08 +00:00
|
|
|
const struct file_operations ceph_file_fops = {
|
|
|
|
.open = ceph_open,
|
|
|
|
.release = ceph_release,
|
|
|
|
.llseek = ceph_llseek,
|
2014-04-03 00:28:01 +00:00
|
|
|
.read_iter = ceph_read_iter,
|
2014-04-04 03:09:01 +00:00
|
|
|
.write_iter = ceph_write_iter,
|
2009-10-06 18:31:08 +00:00
|
|
|
.mmap = ceph_mmap,
|
|
|
|
.fsync = ceph_fsync,
|
2010-08-02 22:34:23 +00:00
|
|
|
.lock = ceph_lock,
|
2020-08-20 15:00:26 +00:00
|
|
|
.setlease = simple_nosetlease,
|
2010-08-02 22:34:23 +00:00
|
|
|
.flock = ceph_flock,
|
2023-05-22 13:50:03 +00:00
|
|
|
.splice_read = ceph_splice_read,
|
2014-04-05 08:40:12 +00:00
|
|
|
.splice_write = iter_file_splice_write,
|
2009-10-06 18:31:08 +00:00
|
|
|
.unlocked_ioctl = ceph_ioctl,
|
2018-09-11 18:47:23 +00:00
|
|
|
.compat_ioctl = compat_ptr_ioctl,
|
2013-08-15 03:51:44 +00:00
|
|
|
.fallocate = ceph_fallocate,
|
2018-10-15 15:45:59 +00:00
|
|
|
.copy_file_range = ceph_copy_file_range,
|
2009-10-06 18:31:08 +00:00
|
|
|
};
|