Commit | Line | Data |
---|---|---|
d7e09d03 PT |
1 | /* |
2 | * GPL HEADER START | |
3 | * | |
4 | * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License version 2 only, | |
8 | * as published by the Free Software Foundation. | |
9 | * | |
10 | * This program is distributed in the hope that it will be useful, but | |
11 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
12 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
13 | * General Public License version 2 for more details (a copy is included | |
14 | * in the LICENSE file that accompanied this code). | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License | |
17 | * version 2 along with this program; If not, see | |
18 | * http://www.sun.com/software/products/lustre/docs/GPLv2.pdf | |
19 | * | |
20 | * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, | |
21 | * CA 95054 USA or visit www.sun.com if you need additional information or | |
22 | * have any questions. | |
23 | * | |
24 | * GPL HEADER END | |
25 | */ | |
26 | /* | |
27 | * Copyright (c) 2008, 2010, Oracle and/or its affiliates. All rights reserved. | |
28 | * Use is subject to license terms. | |
29 | * | |
1dc563a6 | 30 | * Copyright (c) 2011, 2015, Intel Corporation. |
d7e09d03 PT |
31 | */ |
32 | /* | |
33 | * This file is part of Lustre, http://www.lustre.org/ | |
34 | * Lustre is a trademark of Sun Microsystems, Inc. | |
35 | * | |
36 | * Implementation of cl_io for VVP layer. | |
37 | * | |
38 | * Author: Nikita Danilov <nikita.danilov@sun.com> | |
39 | * Author: Jinshan Xiong <jinshan.xiong@whamcloud.com> | |
40 | */ | |
41 | ||
42 | #define DEBUG_SUBSYSTEM S_LLITE | |
43 | ||
67a235f5 GKH |
44 | #include "../include/obd.h" |
45 | #include "../include/lustre_lite.h" | |
d7e09d03 PT |
46 | |
47 | #include "vvp_internal.h" | |
48 | ||
49 | static struct vvp_io *cl2vvp_io(const struct lu_env *env, | |
50 | const struct cl_io_slice *slice); | |
51 | ||
52 | /** | |
74c0da19 | 53 | * True, if \a io is a normal io, False for splice_{read,write} |
d7e09d03 PT |
54 | */ |
55 | int cl_is_normalio(const struct lu_env *env, const struct cl_io *io) | |
56 | { | |
57 | struct vvp_io *vio = vvp_env_io(env); | |
58 | ||
59 | LASSERT(io->ci_type == CIT_READ || io->ci_type == CIT_WRITE); | |
60 | ||
61 | return vio->cui_io_subtype == IO_NORMAL; | |
62 | } | |
63 | ||
64 | /** | |
65 | * For swapping layout. The file's layout may have changed. | |
66 | * To avoid populating pages to a wrong stripe, we have to verify the | |
67 | * correctness of layout. It works because swapping layout processes | |
68 | * have to acquire group lock. | |
69 | */ | |
70 | static bool can_populate_pages(const struct lu_env *env, struct cl_io *io, | |
e15ba45d | 71 | struct inode *inode) |
d7e09d03 PT |
72 | { |
73 | struct ll_inode_info *lli = ll_i2info(inode); | |
74 | struct ccc_io *cio = ccc_env_io(env); | |
75 | bool rc = true; | |
76 | ||
77 | switch (io->ci_type) { | |
78 | case CIT_READ: | |
79 | case CIT_WRITE: | |
80 | /* don't need lock here to check lli_layout_gen as we have held | |
c0894c6c OD |
81 | * extent lock and GROUP lock has to hold to swap layout |
82 | */ | |
09aed8a5 | 83 | if (ll_layout_version_get(lli) != cio->cui_layout_gen) { |
d7e09d03 PT |
84 | io->ci_need_restart = 1; |
85 | /* this will return application a short read/write */ | |
86 | io->ci_continue = 0; | |
87 | rc = false; | |
88 | } | |
89 | case CIT_FAULT: | |
90 | /* fault is okay because we've already had a page. */ | |
91 | default: | |
92 | break; | |
93 | } | |
94 | ||
95 | return rc; | |
96 | } | |
97 | ||
98 | /***************************************************************************** | |
99 | * | |
100 | * io operations. | |
101 | * | |
102 | */ | |
103 | ||
104 | static int vvp_io_fault_iter_init(const struct lu_env *env, | |
105 | const struct cl_io_slice *ios) | |
106 | { | |
107 | struct vvp_io *vio = cl2vvp_io(env, ios); | |
108 | struct inode *inode = ccc_object_inode(ios->cis_obj); | |
109 | ||
110 | LASSERT(inode == | |
2a8a3597 | 111 | file_inode(cl2ccc_io(env, ios)->cui_fd->fd_file)); |
46c360f9 | 112 | vio->u.fault.ft_mtime = inode->i_mtime.tv_sec; |
d7e09d03 PT |
113 | return 0; |
114 | } | |
115 | ||
116 | static void vvp_io_fini(const struct lu_env *env, const struct cl_io_slice *ios) | |
117 | { | |
118 | struct cl_io *io = ios->cis_io; | |
119 | struct cl_object *obj = io->ci_obj; | |
120 | struct ccc_io *cio = cl2ccc_io(env, ios); | |
121 | ||
122 | CLOBINVRNT(env, obj, ccc_object_invariant(obj)); | |
123 | ||
5ea17d6c JL |
124 | CDEBUG(D_VFSTRACE, DFID |
125 | " ignore/verify layout %d/%d, layout version %d restore needed %d\n", | |
126 | PFID(lu_object_fid(&obj->co_lu)), | |
127 | io->ci_ignore_layout, io->ci_verify_layout, | |
128 | cio->cui_layout_gen, io->ci_restore_needed); | |
129 | ||
130 | if (io->ci_restore_needed == 1) { | |
131 | int rc; | |
132 | ||
133 | /* file was detected release, we need to restore it | |
134 | * before finishing the io | |
135 | */ | |
136 | rc = ll_layout_restore(ccc_object_inode(obj)); | |
137 | /* if restore registration failed, no restart, | |
c0894c6c OD |
138 | * we will return -ENODATA |
139 | */ | |
5ea17d6c JL |
140 | /* The layout will change after restore, so we need to |
141 | * block on layout lock hold by the MDT | |
142 | * as MDT will not send new layout in lvb (see LU-3124) | |
143 | * we have to explicitly fetch it, all this will be done | |
144 | * by ll_layout_refresh() | |
145 | */ | |
146 | if (rc == 0) { | |
147 | io->ci_restore_needed = 0; | |
148 | io->ci_need_restart = 1; | |
149 | io->ci_verify_layout = 1; | |
150 | } else { | |
151 | io->ci_restore_needed = 1; | |
152 | io->ci_need_restart = 0; | |
153 | io->ci_verify_layout = 0; | |
154 | io->ci_result = rc; | |
155 | } | |
156 | } | |
d7e09d03 PT |
157 | |
158 | if (!io->ci_ignore_layout && io->ci_verify_layout) { | |
159 | __u32 gen = 0; | |
160 | ||
161 | /* check layout version */ | |
162 | ll_layout_refresh(ccc_object_inode(obj), &gen); | |
163 | io->ci_need_restart = cio->cui_layout_gen != gen; | |
5ea17d6c JL |
164 | if (io->ci_need_restart) { |
165 | CDEBUG(D_VFSTRACE, | |
166 | DFID" layout changed from %d to %d.\n", | |
167 | PFID(lu_object_fid(&obj->co_lu)), | |
168 | cio->cui_layout_gen, gen); | |
c0894c6c | 169 | /* today successful restore is the only possible case */ |
5ea17d6c JL |
170 | /* restore was done, clear restoring state */ |
171 | ll_i2info(ccc_object_inode(obj))->lli_flags &= | |
172 | ~LLIF_FILE_RESTORING; | |
173 | } | |
d7e09d03 PT |
174 | } |
175 | } | |
176 | ||
177 | static void vvp_io_fault_fini(const struct lu_env *env, | |
178 | const struct cl_io_slice *ios) | |
179 | { | |
180 | struct cl_io *io = ios->cis_io; | |
181 | struct cl_page *page = io->u.ci_fault.ft_page; | |
182 | ||
183 | CLOBINVRNT(env, io->ci_obj, ccc_object_invariant(io->ci_obj)); | |
184 | ||
6e16818b | 185 | if (page) { |
d7e09d03 PT |
186 | lu_ref_del(&page->cp_reference, "fault", io); |
187 | cl_page_put(env, page); | |
188 | io->u.ci_fault.ft_page = NULL; | |
189 | } | |
190 | vvp_io_fini(env, ios); | |
191 | } | |
192 | ||
2d95f10e | 193 | static enum cl_lock_mode vvp_mode_from_vma(struct vm_area_struct *vma) |
d7e09d03 PT |
194 | { |
195 | /* | |
196 | * we only want to hold PW locks if the mmap() can generate | |
197 | * writes back to the file and that only happens in shared | |
198 | * writable vmas | |
199 | */ | |
200 | if ((vma->vm_flags & VM_SHARED) && (vma->vm_flags & VM_WRITE)) | |
201 | return CLM_WRITE; | |
202 | return CLM_READ; | |
203 | } | |
204 | ||
205 | static int vvp_mmap_locks(const struct lu_env *env, | |
206 | struct ccc_io *vio, struct cl_io *io) | |
207 | { | |
208 | struct ccc_thread_info *cti = ccc_env_info(env); | |
209 | struct mm_struct *mm = current->mm; | |
210 | struct vm_area_struct *vma; | |
211 | struct cl_lock_descr *descr = &cti->cti_descr; | |
212 | ldlm_policy_data_t policy; | |
213 | unsigned long addr; | |
d7e09d03 PT |
214 | ssize_t count; |
215 | int result; | |
b42b15fd AV |
216 | struct iov_iter i; |
217 | struct iovec iov; | |
d7e09d03 PT |
218 | |
219 | LASSERT(io->ci_type == CIT_READ || io->ci_type == CIT_WRITE); | |
220 | ||
221 | if (!cl_is_normalio(env, io)) | |
0a3bdb00 | 222 | return 0; |
d7e09d03 | 223 | |
6e16818b | 224 | if (!vio->cui_iter) /* nfs or loop back device write */ |
0a3bdb00 | 225 | return 0; |
d7e09d03 PT |
226 | |
227 | /* No MM (e.g. NFS)? No vmas too. */ | |
6e16818b | 228 | if (!mm) |
0a3bdb00 | 229 | return 0; |
d7e09d03 | 230 | |
b42b15fd AV |
231 | iov_for_each(iov, i, *(vio->cui_iter)) { |
232 | addr = (unsigned long)iov.iov_base; | |
233 | count = iov.iov_len; | |
d7e09d03 PT |
234 | if (count == 0) |
235 | continue; | |
236 | ||
237 | count += addr & (~CFS_PAGE_MASK); | |
238 | addr &= CFS_PAGE_MASK; | |
239 | ||
240 | down_read(&mm->mmap_sem); | |
a58a38ac | 241 | while ((vma = our_vma(mm, addr, count)) != NULL) { |
2a8a3597 | 242 | struct inode *inode = file_inode(vma->vm_file); |
d7e09d03 PT |
243 | int flags = CEF_MUST; |
244 | ||
245 | if (ll_file_nolock(vma->vm_file)) { | |
246 | /* | |
247 | * For no lock case, a lockless lock will be | |
248 | * generated. | |
249 | */ | |
250 | flags = CEF_NEVER; | |
251 | } | |
252 | ||
253 | /* | |
254 | * XXX: Required lock mode can be weakened: CIT_WRITE | |
255 | * io only ever reads user level buffer, and CIT_READ | |
256 | * only writes on it. | |
257 | */ | |
258 | policy_from_vma(&policy, vma, addr, count); | |
259 | descr->cld_mode = vvp_mode_from_vma(vma); | |
260 | descr->cld_obj = ll_i2info(inode)->lli_clob; | |
261 | descr->cld_start = cl_index(descr->cld_obj, | |
262 | policy.l_extent.start); | |
263 | descr->cld_end = cl_index(descr->cld_obj, | |
264 | policy.l_extent.end); | |
265 | descr->cld_enq_flags = flags; | |
266 | result = cl_io_lock_alloc_add(env, io, descr); | |
267 | ||
268 | CDEBUG(D_VFSTRACE, "lock: %d: [%lu, %lu]\n", | |
269 | descr->cld_mode, descr->cld_start, | |
270 | descr->cld_end); | |
271 | ||
09516500 PF |
272 | if (result < 0) { |
273 | up_read(&mm->mmap_sem); | |
0a3bdb00 | 274 | return result; |
09516500 | 275 | } |
d7e09d03 PT |
276 | |
277 | if (vma->vm_end - addr >= count) | |
278 | break; | |
279 | ||
280 | count -= vma->vm_end - addr; | |
281 | addr = vma->vm_end; | |
282 | } | |
283 | up_read(&mm->mmap_sem); | |
284 | } | |
0a3bdb00 | 285 | return 0; |
d7e09d03 PT |
286 | } |
287 | ||
288 | static int vvp_io_rw_lock(const struct lu_env *env, struct cl_io *io, | |
289 | enum cl_lock_mode mode, loff_t start, loff_t end) | |
290 | { | |
291 | struct ccc_io *cio = ccc_env_io(env); | |
292 | int result; | |
293 | int ast_flags = 0; | |
294 | ||
295 | LASSERT(io->ci_type == CIT_READ || io->ci_type == CIT_WRITE); | |
d7e09d03 PT |
296 | |
297 | ccc_io_update_iov(env, cio, io); | |
298 | ||
299 | if (io->u.ci_rw.crw_nonblock) | |
300 | ast_flags |= CEF_NONBLOCK; | |
301 | result = vvp_mmap_locks(env, cio, io); | |
302 | if (result == 0) | |
303 | result = ccc_io_one_lock(env, io, ast_flags, mode, start, end); | |
0a3bdb00 | 304 | return result; |
d7e09d03 PT |
305 | } |
306 | ||
307 | static int vvp_io_read_lock(const struct lu_env *env, | |
308 | const struct cl_io_slice *ios) | |
309 | { | |
4c309612 JX |
310 | struct cl_io *io = ios->cis_io; |
311 | struct cl_io_rw_common *rd = &io->u.ci_rd.rd; | |
d7e09d03 PT |
312 | int result; |
313 | ||
4c309612 JX |
314 | result = vvp_io_rw_lock(env, io, CLM_READ, rd->crw_pos, |
315 | rd->crw_pos + rd->crw_count - 1); | |
316 | ||
0a3bdb00 | 317 | return result; |
d7e09d03 PT |
318 | } |
319 | ||
320 | static int vvp_io_fault_lock(const struct lu_env *env, | |
321 | const struct cl_io_slice *ios) | |
322 | { | |
323 | struct cl_io *io = ios->cis_io; | |
324 | struct vvp_io *vio = cl2vvp_io(env, ios); | |
325 | /* | |
326 | * XXX LDLM_FL_CBPENDING | |
327 | */ | |
328 | return ccc_io_one_lock_index | |
329 | (env, io, 0, vvp_mode_from_vma(vio->u.fault.ft_vma), | |
330 | io->u.ci_fault.ft_index, io->u.ci_fault.ft_index); | |
331 | } | |
332 | ||
333 | static int vvp_io_write_lock(const struct lu_env *env, | |
334 | const struct cl_io_slice *ios) | |
335 | { | |
336 | struct cl_io *io = ios->cis_io; | |
337 | loff_t start; | |
338 | loff_t end; | |
339 | ||
340 | if (io->u.ci_wr.wr_append) { | |
341 | start = 0; | |
342 | end = OBD_OBJECT_EOF; | |
343 | } else { | |
344 | start = io->u.ci_wr.wr.crw_pos; | |
345 | end = start + io->u.ci_wr.wr.crw_count - 1; | |
346 | } | |
347 | return vvp_io_rw_lock(env, io, CLM_WRITE, start, end); | |
348 | } | |
349 | ||
350 | static int vvp_io_setattr_iter_init(const struct lu_env *env, | |
351 | const struct cl_io_slice *ios) | |
352 | { | |
353 | return 0; | |
354 | } | |
355 | ||
356 | /** | |
357 | * Implementation of cl_io_operations::cio_lock() method for CIT_SETATTR io. | |
358 | * | |
359 | * Handles "lockless io" mode when extent locking is done by server. | |
360 | */ | |
361 | static int vvp_io_setattr_lock(const struct lu_env *env, | |
362 | const struct cl_io_slice *ios) | |
363 | { | |
364 | struct ccc_io *cio = ccc_env_io(env); | |
365 | struct cl_io *io = ios->cis_io; | |
366 | __u64 new_size; | |
367 | __u32 enqflags = 0; | |
368 | ||
369 | if (cl_io_is_trunc(io)) { | |
370 | new_size = io->u.ci_setattr.sa_attr.lvb_size; | |
371 | if (new_size == 0) | |
372 | enqflags = CEF_DISCARD_DATA; | |
373 | } else { | |
374 | if ((io->u.ci_setattr.sa_attr.lvb_mtime >= | |
375 | io->u.ci_setattr.sa_attr.lvb_ctime) || | |
376 | (io->u.ci_setattr.sa_attr.lvb_atime >= | |
377 | io->u.ci_setattr.sa_attr.lvb_ctime)) | |
378 | return 0; | |
379 | new_size = 0; | |
380 | } | |
381 | cio->u.setattr.cui_local_lock = SETATTR_EXTENT_LOCK; | |
382 | return ccc_io_one_lock(env, io, enqflags, CLM_WRITE, | |
383 | new_size, OBD_OBJECT_EOF); | |
384 | } | |
385 | ||
386 | static int vvp_do_vmtruncate(struct inode *inode, size_t size) | |
387 | { | |
388 | int result; | |
389 | /* | |
390 | * Only ll_inode_size_lock is taken at this level. | |
391 | */ | |
392 | ll_inode_size_lock(inode); | |
393 | result = inode_newsize_ok(inode, size); | |
394 | if (result < 0) { | |
395 | ll_inode_size_unlock(inode); | |
396 | return result; | |
397 | } | |
398 | truncate_setsize(inode, size); | |
399 | ll_inode_size_unlock(inode); | |
400 | return result; | |
401 | } | |
402 | ||
403 | static int vvp_io_setattr_trunc(const struct lu_env *env, | |
404 | const struct cl_io_slice *ios, | |
405 | struct inode *inode, loff_t size) | |
406 | { | |
407 | inode_dio_wait(inode); | |
408 | return 0; | |
409 | } | |
410 | ||
411 | static int vvp_io_setattr_time(const struct lu_env *env, | |
412 | const struct cl_io_slice *ios) | |
413 | { | |
414 | struct cl_io *io = ios->cis_io; | |
415 | struct cl_object *obj = io->ci_obj; | |
416 | struct cl_attr *attr = ccc_env_thread_attr(env); | |
417 | int result; | |
418 | unsigned valid = CAT_CTIME; | |
419 | ||
420 | cl_object_attr_lock(obj); | |
421 | attr->cat_ctime = io->u.ci_setattr.sa_attr.lvb_ctime; | |
422 | if (io->u.ci_setattr.sa_valid & ATTR_ATIME_SET) { | |
423 | attr->cat_atime = io->u.ci_setattr.sa_attr.lvb_atime; | |
424 | valid |= CAT_ATIME; | |
425 | } | |
426 | if (io->u.ci_setattr.sa_valid & ATTR_MTIME_SET) { | |
427 | attr->cat_mtime = io->u.ci_setattr.sa_attr.lvb_mtime; | |
428 | valid |= CAT_MTIME; | |
429 | } | |
430 | result = cl_object_attr_set(env, obj, attr, valid); | |
431 | cl_object_attr_unlock(obj); | |
432 | ||
433 | return result; | |
434 | } | |
435 | ||
436 | static int vvp_io_setattr_start(const struct lu_env *env, | |
437 | const struct cl_io_slice *ios) | |
438 | { | |
439 | struct cl_io *io = ios->cis_io; | |
440 | struct inode *inode = ccc_object_inode(io->ci_obj); | |
5dd16419 | 441 | int result = 0; |
d7e09d03 | 442 | |
5955102c | 443 | inode_lock(inode); |
d7e09d03 | 444 | if (cl_io_is_trunc(io)) |
5dd16419 JX |
445 | result = vvp_io_setattr_trunc(env, ios, inode, |
446 | io->u.ci_setattr.sa_attr.lvb_size); | |
447 | if (result == 0) | |
448 | result = vvp_io_setattr_time(env, ios); | |
449 | return result; | |
d7e09d03 PT |
450 | } |
451 | ||
452 | static void vvp_io_setattr_end(const struct lu_env *env, | |
453 | const struct cl_io_slice *ios) | |
454 | { | |
455 | struct cl_io *io = ios->cis_io; | |
456 | struct inode *inode = ccc_object_inode(io->ci_obj); | |
457 | ||
81e053c7 | 458 | if (cl_io_is_trunc(io)) |
d7e09d03 | 459 | /* Truncate in memory pages - they must be clean pages |
c0894c6c OD |
460 | * because osc has already notified to destroy osc_extents. |
461 | */ | |
d7e09d03 | 462 | vvp_do_vmtruncate(inode, io->u.ci_setattr.sa_attr.lvb_size); |
81e053c7 | 463 | |
5955102c | 464 | inode_unlock(inode); |
d7e09d03 PT |
465 | } |
466 | ||
467 | static void vvp_io_setattr_fini(const struct lu_env *env, | |
468 | const struct cl_io_slice *ios) | |
469 | { | |
470 | vvp_io_fini(env, ios); | |
471 | } | |
472 | ||
d7e09d03 PT |
473 | static int vvp_io_read_start(const struct lu_env *env, |
474 | const struct cl_io_slice *ios) | |
475 | { | |
476 | struct vvp_io *vio = cl2vvp_io(env, ios); | |
477 | struct ccc_io *cio = cl2ccc_io(env, ios); | |
478 | struct cl_io *io = ios->cis_io; | |
479 | struct cl_object *obj = io->ci_obj; | |
480 | struct inode *inode = ccc_object_inode(obj); | |
481 | struct ll_ra_read *bead = &vio->cui_bead; | |
482 | struct file *file = cio->cui_fd->fd_file; | |
483 | ||
484 | int result; | |
485 | loff_t pos = io->u.ci_rd.rd.crw_pos; | |
486 | long cnt = io->u.ci_rd.rd.crw_count; | |
487 | long tot = cio->cui_tot_count; | |
488 | int exceed = 0; | |
489 | ||
490 | CLOBINVRNT(env, obj, ccc_object_invariant(obj)); | |
491 | ||
492 | CDEBUG(D_VFSTRACE, "read: -> [%lli, %lli)\n", pos, pos + cnt); | |
493 | ||
494 | if (!can_populate_pages(env, io, inode)) | |
495 | return 0; | |
496 | ||
497 | result = ccc_prep_size(env, obj, io, pos, tot, &exceed); | |
498 | if (result != 0) | |
499 | return result; | |
500 | else if (exceed != 0) | |
501 | goto out; | |
502 | ||
503 | LU_OBJECT_HEADER(D_INODE, env, &obj->co_lu, | |
e15ba45d OD |
504 | "Read ino %lu, %lu bytes, offset %lld, size %llu\n", |
505 | inode->i_ino, cnt, pos, i_size_read(inode)); | |
d7e09d03 PT |
506 | |
507 | /* turn off the kernel's read-ahead */ | |
508 | cio->cui_fd->fd_file->f_ra.ra_pages = 0; | |
509 | ||
510 | /* initialize read-ahead window once per syscall */ | |
511 | if (!vio->cui_ra_window_set) { | |
512 | vio->cui_ra_window_set = 1; | |
513 | bead->lrr_start = cl_index(obj, pos); | |
514 | /* | |
515 | * XXX: explicit PAGE_CACHE_SIZE | |
516 | */ | |
09cbfeaf | 517 | bead->lrr_count = cl_index(obj, tot + PAGE_SIZE - 1); |
d7e09d03 PT |
518 | ll_ra_read_in(file, bead); |
519 | } | |
520 | ||
521 | /* BUG: 5972 */ | |
522 | file_accessed(file); | |
523 | switch (vio->cui_io_subtype) { | |
524 | case IO_NORMAL: | |
74c0da19 | 525 | LASSERT(cio->cui_iocb->ki_pos == pos); |
b42b15fd | 526 | result = generic_file_read_iter(cio->cui_iocb, cio->cui_iter); |
74c0da19 | 527 | break; |
d7e09d03 PT |
528 | case IO_SPLICE: |
529 | result = generic_file_splice_read(file, &pos, | |
e15ba45d OD |
530 | vio->u.splice.cui_pipe, cnt, |
531 | vio->u.splice.cui_flags); | |
d7e09d03 PT |
532 | /* LU-1109: do splice read stripe by stripe otherwise if it |
533 | * may make nfsd stuck if this read occupied all internal pipe | |
c0894c6c OD |
534 | * buffers. |
535 | */ | |
d7e09d03 PT |
536 | io->ci_continue = 0; |
537 | break; | |
538 | default: | |
539 | CERROR("Wrong IO type %u\n", vio->cui_io_subtype); | |
540 | LBUG(); | |
541 | } | |
542 | ||
543 | out: | |
544 | if (result >= 0) { | |
545 | if (result < cnt) | |
546 | io->ci_continue = 0; | |
547 | io->ci_nob += result; | |
548 | ll_rw_stats_tally(ll_i2sbi(inode), current->pid, | |
4f37bc04 | 549 | cio->cui_fd, pos, result, READ); |
d7e09d03 PT |
550 | result = 0; |
551 | } | |
552 | return result; | |
553 | } | |
554 | ||
555 | static void vvp_io_read_fini(const struct lu_env *env, const struct cl_io_slice *ios) | |
556 | { | |
557 | struct vvp_io *vio = cl2vvp_io(env, ios); | |
558 | struct ccc_io *cio = cl2ccc_io(env, ios); | |
559 | ||
560 | if (vio->cui_ra_window_set) | |
561 | ll_ra_read_ex(cio->cui_fd->fd_file, &vio->cui_bead); | |
562 | ||
563 | vvp_io_fini(env, ios); | |
564 | } | |
565 | ||
566 | static int vvp_io_write_start(const struct lu_env *env, | |
567 | const struct cl_io_slice *ios) | |
568 | { | |
569 | struct ccc_io *cio = cl2ccc_io(env, ios); | |
570 | struct cl_io *io = ios->cis_io; | |
571 | struct cl_object *obj = io->ci_obj; | |
572 | struct inode *inode = ccc_object_inode(obj); | |
d7e09d03 PT |
573 | ssize_t result = 0; |
574 | loff_t pos = io->u.ci_wr.wr.crw_pos; | |
575 | size_t cnt = io->u.ci_wr.wr.crw_count; | |
576 | ||
d7e09d03 PT |
577 | if (!can_populate_pages(env, io, inode)) |
578 | return 0; | |
579 | ||
580 | if (cl_io_is_append(io)) { | |
581 | /* | |
582 | * PARALLEL IO This has to be changed for parallel IO doing | |
583 | * out-of-order writes. | |
584 | */ | |
585 | pos = io->u.ci_wr.wr.crw_pos = i_size_read(inode); | |
586 | cio->cui_iocb->ki_pos = pos; | |
74c0da19 JX |
587 | } else { |
588 | LASSERT(cio->cui_iocb->ki_pos == pos); | |
d7e09d03 PT |
589 | } |
590 | ||
591 | CDEBUG(D_VFSTRACE, "write: [%lli, %lli)\n", pos, pos + (long long)cnt); | |
592 | ||
6e16818b | 593 | if (!cio->cui_iter) /* from a temp io in ll_cl_init(). */ |
d7e09d03 PT |
594 | result = 0; |
595 | else | |
b42b15fd AV |
596 | result = generic_file_write_iter(cio->cui_iocb, cio->cui_iter); |
597 | ||
d7e09d03 PT |
598 | if (result > 0) { |
599 | if (result < cnt) | |
600 | io->ci_continue = 0; | |
601 | io->ci_nob += result; | |
602 | ll_rw_stats_tally(ll_i2sbi(inode), current->pid, | |
4f37bc04 | 603 | cio->cui_fd, pos, result, WRITE); |
d7e09d03 PT |
604 | result = 0; |
605 | } | |
0a3bdb00 | 606 | return result; |
d7e09d03 PT |
607 | } |
608 | ||
609 | static int vvp_io_kernel_fault(struct vvp_fault_io *cfio) | |
610 | { | |
611 | struct vm_fault *vmf = cfio->fault.ft_vmf; | |
612 | ||
613 | cfio->fault.ft_flags = filemap_fault(cfio->ft_vma, vmf); | |
6aa51072 | 614 | cfio->fault.ft_flags_valid = 1; |
d7e09d03 PT |
615 | |
616 | if (vmf->page) { | |
aa3bee0d GKH |
617 | CDEBUG(D_PAGE, |
618 | "page %p map %p index %lu flags %lx count %u priv %0lx: got addr %p type NOPAGE\n", | |
619 | vmf->page, vmf->page->mapping, vmf->page->index, | |
620 | (long)vmf->page->flags, page_count(vmf->page), | |
621 | page_private(vmf->page), vmf->virtual_address); | |
d7e09d03 PT |
622 | if (unlikely(!(cfio->fault.ft_flags & VM_FAULT_LOCKED))) { |
623 | lock_page(vmf->page); | |
733bd244 | 624 | cfio->fault.ft_flags |= VM_FAULT_LOCKED; |
d7e09d03 PT |
625 | } |
626 | ||
627 | cfio->ft_vmpage = vmf->page; | |
628 | return 0; | |
629 | } | |
630 | ||
33692f27 | 631 | if (cfio->fault.ft_flags & (VM_FAULT_SIGBUS | VM_FAULT_SIGSEGV)) { |
d7e09d03 PT |
632 | CDEBUG(D_PAGE, "got addr %p - SIGBUS\n", vmf->virtual_address); |
633 | return -EFAULT; | |
634 | } | |
635 | ||
636 | if (cfio->fault.ft_flags & VM_FAULT_OOM) { | |
637 | CDEBUG(D_PAGE, "got addr %p - OOM\n", vmf->virtual_address); | |
638 | return -ENOMEM; | |
639 | } | |
640 | ||
641 | if (cfio->fault.ft_flags & VM_FAULT_RETRY) | |
642 | return -EAGAIN; | |
643 | ||
d0a0acc3 | 644 | CERROR("Unknown error in page fault %d!\n", cfio->fault.ft_flags); |
d7e09d03 PT |
645 | return -EINVAL; |
646 | } | |
647 | ||
d7e09d03 PT |
648 | static int vvp_io_fault_start(const struct lu_env *env, |
649 | const struct cl_io_slice *ios) | |
650 | { | |
651 | struct vvp_io *vio = cl2vvp_io(env, ios); | |
652 | struct cl_io *io = ios->cis_io; | |
653 | struct cl_object *obj = io->ci_obj; | |
654 | struct inode *inode = ccc_object_inode(obj); | |
655 | struct cl_fault_io *fio = &io->u.ci_fault; | |
656 | struct vvp_fault_io *cfio = &vio->u.fault; | |
657 | loff_t offset; | |
658 | int result = 0; | |
659 | struct page *vmpage = NULL; | |
660 | struct cl_page *page; | |
661 | loff_t size; | |
662 | pgoff_t last; /* last page in a file data region */ | |
663 | ||
664 | if (fio->ft_executable && | |
46c360f9 | 665 | inode->i_mtime.tv_sec != vio->u.fault.ft_mtime) |
d7e09d03 PT |
666 | CWARN("binary "DFID |
667 | " changed while waiting for the page fault lock\n", | |
668 | PFID(lu_object_fid(&obj->co_lu))); | |
669 | ||
670 | /* offset of the last byte on the page */ | |
671 | offset = cl_offset(obj, fio->ft_index + 1) - 1; | |
672 | LASSERT(cl_index(obj, offset) == fio->ft_index); | |
673 | result = ccc_prep_size(env, obj, io, 0, offset + 1, NULL); | |
674 | if (result != 0) | |
675 | return result; | |
676 | ||
677 | /* must return locked page */ | |
678 | if (fio->ft_mkwrite) { | |
6e16818b | 679 | LASSERT(cfio->ft_vmpage); |
d7e09d03 PT |
680 | lock_page(cfio->ft_vmpage); |
681 | } else { | |
682 | result = vvp_io_kernel_fault(cfio); | |
683 | if (result != 0) | |
684 | return result; | |
685 | } | |
686 | ||
687 | vmpage = cfio->ft_vmpage; | |
688 | LASSERT(PageLocked(vmpage)); | |
689 | ||
690 | if (OBD_FAIL_CHECK(OBD_FAIL_LLITE_FAULT_TRUNC_RACE)) | |
691 | ll_invalidate_page(vmpage); | |
692 | ||
693 | size = i_size_read(inode); | |
694 | /* Though we have already held a cl_lock upon this page, but | |
c0894c6c OD |
695 | * it still can be truncated locally. |
696 | */ | |
d7e09d03 PT |
697 | if (unlikely((vmpage->mapping != inode->i_mapping) || |
698 | (page_offset(vmpage) > size))) { | |
699 | CDEBUG(D_PAGE, "llite: fault and truncate race happened!\n"); | |
700 | ||
701 | /* return +1 to stop cl_io_loop() and ll_fault() will catch | |
c0894c6c OD |
702 | * and retry. |
703 | */ | |
b2952d62 | 704 | result = 1; |
34e1f2bb | 705 | goto out; |
d7e09d03 PT |
706 | } |
707 | ||
557732ad | 708 | if (fio->ft_mkwrite) { |
d7e09d03 PT |
709 | pgoff_t last_index; |
710 | /* | |
711 | * Capture the size while holding the lli_trunc_sem from above | |
712 | * we want to make sure that we complete the mkwrite action | |
713 | * while holding this lock. We need to make sure that we are | |
714 | * not past the end of the file. | |
715 | */ | |
716 | last_index = cl_index(obj, size - 1); | |
717 | if (last_index < fio->ft_index) { | |
718 | CDEBUG(D_PAGE, | |
2d00bd17 JP |
719 | "llite: mkwrite and truncate race happened: %p: 0x%lx 0x%lx\n", |
720 | vmpage->mapping, fio->ft_index, last_index); | |
d7e09d03 PT |
721 | /* |
722 | * We need to return if we are | |
723 | * passed the end of the file. This will propagate | |
724 | * up the call stack to ll_page_mkwrite where | |
725 | * we will return VM_FAULT_NOPAGE. Any non-negative | |
726 | * value returned here will be silently | |
727 | * converted to 0. If the vmpage->mapping is null | |
728 | * the error code would be converted back to ENODATA | |
729 | * in ll_page_mkwrite0. Thus we return -ENODATA | |
730 | * to handle both cases | |
731 | */ | |
34e1f2bb JL |
732 | result = -ENODATA; |
733 | goto out; | |
d7e09d03 PT |
734 | } |
735 | } | |
736 | ||
737 | page = cl_page_find(env, obj, fio->ft_index, vmpage, CPT_CACHEABLE); | |
34e1f2bb JL |
738 | if (IS_ERR(page)) { |
739 | result = PTR_ERR(page); | |
740 | goto out; | |
741 | } | |
d7e09d03 PT |
742 | |
743 | /* if page is going to be written, we should add this page into cache | |
c0894c6c OD |
744 | * earlier. |
745 | */ | |
d7e09d03 PT |
746 | if (fio->ft_mkwrite) { |
747 | wait_on_page_writeback(vmpage); | |
748 | if (set_page_dirty(vmpage)) { | |
749 | struct ccc_page *cp; | |
750 | ||
751 | /* vvp_page_assume() calls wait_on_page_writeback(). */ | |
752 | cl_page_assume(env, io, page); | |
753 | ||
754 | cp = cl2ccc_page(cl_page_at(page, &vvp_device_type)); | |
755 | vvp_write_pending(cl2ccc(obj), cp); | |
756 | ||
757 | /* Do not set Dirty bit here so that in case IO is | |
758 | * started before the page is really made dirty, we | |
c0894c6c OD |
759 | * still have chance to detect it. |
760 | */ | |
d7e09d03 PT |
761 | result = cl_page_cache_add(env, io, page, CRT_WRITE); |
762 | LASSERT(cl_page_is_owned(page, io)); | |
763 | ||
764 | vmpage = NULL; | |
765 | if (result < 0) { | |
766 | cl_page_unmap(env, io, page); | |
767 | cl_page_discard(env, io, page); | |
768 | cl_page_disown(env, io, page); | |
769 | ||
770 | cl_page_put(env, page); | |
771 | ||
772 | /* we're in big trouble, what can we do now? */ | |
773 | if (result == -EDQUOT) | |
774 | result = -ENOSPC; | |
34e1f2bb | 775 | goto out; |
d7e09d03 PT |
776 | } else |
777 | cl_page_disown(env, io, page); | |
778 | } | |
779 | } | |
780 | ||
781 | last = cl_index(obj, size - 1); | |
782 | /* | |
783 | * The ft_index is only used in the case of | |
784 | * a mkwrite action. We need to check | |
785 | * our assertions are correct, since | |
786 | * we should have caught this above | |
787 | */ | |
788 | LASSERT(!fio->ft_mkwrite || fio->ft_index <= last); | |
789 | if (fio->ft_index == last) | |
790 | /* | |
791 | * Last page is mapped partially. | |
792 | */ | |
793 | fio->ft_nob = size - cl_offset(obj, fio->ft_index); | |
794 | else | |
795 | fio->ft_nob = cl_page_size(obj); | |
796 | ||
797 | lu_ref_add(&page->cp_reference, "fault", io); | |
798 | fio->ft_page = page; | |
d7e09d03 PT |
799 | |
800 | out: | |
801 | /* return unlocked vmpage to avoid deadlocking */ | |
6e16818b | 802 | if (vmpage) |
d7e09d03 PT |
803 | unlock_page(vmpage); |
804 | cfio->fault.ft_flags &= ~VM_FAULT_LOCKED; | |
805 | return result; | |
806 | } | |
807 | ||
808 | static int vvp_io_fsync_start(const struct lu_env *env, | |
809 | const struct cl_io_slice *ios) | |
810 | { | |
811 | /* we should mark TOWRITE bit to each dirty page in radix tree to | |
812 | * verify pages have been written, but this is difficult because of | |
c0894c6c OD |
813 | * race. |
814 | */ | |
d7e09d03 PT |
815 | return 0; |
816 | } | |
817 | ||
818 | static int vvp_io_read_page(const struct lu_env *env, | |
819 | const struct cl_io_slice *ios, | |
820 | const struct cl_page_slice *slice) | |
821 | { | |
822 | struct cl_io *io = ios->cis_io; | |
823 | struct cl_object *obj = slice->cpl_obj; | |
824 | struct ccc_page *cp = cl2ccc_page(slice); | |
825 | struct cl_page *page = slice->cpl_page; | |
826 | struct inode *inode = ccc_object_inode(obj); | |
827 | struct ll_sb_info *sbi = ll_i2sbi(inode); | |
828 | struct ll_file_data *fd = cl2ccc_io(env, ios)->cui_fd; | |
829 | struct ll_readahead_state *ras = &fd->fd_ras; | |
830 | struct page *vmpage = cp->cpg_page; | |
831 | struct cl_2queue *queue = &io->ci_queue; | |
832 | int rc; | |
833 | ||
834 | CLOBINVRNT(env, obj, ccc_object_invariant(obj)); | |
835 | LASSERT(slice->cpl_obj == obj); | |
836 | ||
d7e09d03 PT |
837 | if (sbi->ll_ra_info.ra_max_pages_per_file && |
838 | sbi->ll_ra_info.ra_max_pages) | |
839 | ras_update(sbi, inode, ras, page->cp_index, | |
840 | cp->cpg_defer_uptodate); | |
841 | ||
842 | /* Sanity check whether the page is protected by a lock. */ | |
843 | rc = cl_page_is_under_lock(env, io, page); | |
844 | if (rc != -EBUSY) { | |
845 | CL_PAGE_HEADER(D_WARNING, env, page, "%s: %d\n", | |
846 | rc == -ENODATA ? "without a lock" : | |
847 | "match failed", rc); | |
848 | if (rc != -ENODATA) | |
0a3bdb00 | 849 | return rc; |
d7e09d03 PT |
850 | } |
851 | ||
852 | if (cp->cpg_defer_uptodate) { | |
853 | cp->cpg_ra_used = 1; | |
854 | cl_page_export(env, page, 1); | |
855 | } | |
856 | /* | |
857 | * Add page into the queue even when it is marked uptodate above. | |
858 | * this will unlock it automatically as part of cl_page_list_disown(). | |
859 | */ | |
53f1a127 | 860 | cl_page_list_add(&queue->c2_qin, page); |
d7e09d03 PT |
861 | if (sbi->ll_ra_info.ra_max_pages_per_file && |
862 | sbi->ll_ra_info.ra_max_pages) | |
863 | ll_readahead(env, io, ras, | |
864 | vmpage->mapping, &queue->c2_qin, fd->fd_flags); | |
865 | ||
0a3bdb00 | 866 | return 0; |
d7e09d03 PT |
867 | } |
868 | ||
869 | static int vvp_page_sync_io(const struct lu_env *env, struct cl_io *io, | |
870 | struct cl_page *page, struct ccc_page *cp, | |
871 | enum cl_req_type crt) | |
872 | { | |
873 | struct cl_2queue *queue; | |
874 | int result; | |
875 | ||
876 | LASSERT(io->ci_type == CIT_READ || io->ci_type == CIT_WRITE); | |
877 | ||
878 | queue = &io->ci_queue; | |
879 | cl_2queue_init_page(queue, page); | |
880 | ||
881 | result = cl_io_submit_sync(env, io, crt, queue, 0); | |
882 | LASSERT(cl_page_is_owned(page, io)); | |
883 | ||
884 | if (crt == CRT_READ) | |
885 | /* | |
886 | * in CRT_WRITE case page is left locked even in case of | |
887 | * error. | |
888 | */ | |
889 | cl_page_list_disown(env, io, &queue->c2_qin); | |
890 | cl_2queue_fini(env, queue); | |
891 | ||
892 | return result; | |
893 | } | |
894 | ||
895 | /** | |
896 | * Prepare partially written-to page for a write. | |
897 | */ | |
898 | static int vvp_io_prepare_partial(const struct lu_env *env, struct cl_io *io, | |
899 | struct cl_object *obj, struct cl_page *pg, | |
900 | struct ccc_page *cp, | |
901 | unsigned from, unsigned to) | |
902 | { | |
903 | struct cl_attr *attr = ccc_env_thread_attr(env); | |
904 | loff_t offset = cl_offset(obj, pg->cp_index); | |
905 | int result; | |
906 | ||
907 | cl_object_attr_lock(obj); | |
908 | result = cl_object_attr_get(env, obj, attr); | |
909 | cl_object_attr_unlock(obj); | |
910 | if (result == 0) { | |
911 | /* | |
912 | * If are writing to a new page, no need to read old data. | |
913 | * The extent locking will have updated the KMS, and for our | |
914 | * purposes here we can treat it like i_size. | |
915 | */ | |
916 | if (attr->cat_kms <= offset) { | |
5e8ebf13 | 917 | char *kaddr = kmap_atomic(cp->cpg_page); |
d7e09d03 PT |
918 | |
919 | memset(kaddr, 0, cl_page_size(obj)); | |
5e8ebf13 | 920 | kunmap_atomic(kaddr); |
d7e09d03 PT |
921 | } else if (cp->cpg_defer_uptodate) |
922 | cp->cpg_ra_used = 1; | |
923 | else | |
924 | result = vvp_page_sync_io(env, io, pg, cp, CRT_READ); | |
925 | /* | |
926 | * In older implementations, obdo_refresh_inode is called here | |
927 | * to update the inode because the write might modify the | |
928 | * object info at OST. However, this has been proven useless, | |
929 | * since LVB functions will be called when user space program | |
930 | * tries to retrieve inode attribute. Also, see bug 15909 for | |
931 | * details. -jay | |
932 | */ | |
933 | if (result == 0) | |
934 | cl_page_export(env, pg, 1); | |
935 | } | |
936 | return result; | |
937 | } | |
938 | ||
939 | static int vvp_io_prepare_write(const struct lu_env *env, | |
940 | const struct cl_io_slice *ios, | |
941 | const struct cl_page_slice *slice, | |
942 | unsigned from, unsigned to) | |
943 | { | |
944 | struct cl_object *obj = slice->cpl_obj; | |
945 | struct ccc_page *cp = cl2ccc_page(slice); | |
946 | struct cl_page *pg = slice->cpl_page; | |
947 | struct page *vmpage = cp->cpg_page; | |
948 | ||
949 | int result; | |
950 | ||
d7e09d03 PT |
951 | LINVRNT(cl_page_is_vmlocked(env, pg)); |
952 | LASSERT(vmpage->mapping->host == ccc_object_inode(obj)); | |
953 | ||
954 | result = 0; | |
955 | ||
956 | CL_PAGE_HEADER(D_PAGE, env, pg, "preparing: [%d, %d]\n", from, to); | |
957 | if (!PageUptodate(vmpage)) { | |
958 | /* | |
959 | * We're completely overwriting an existing page, so _don't_ | |
960 | * set it up to date until commit_write | |
961 | */ | |
09cbfeaf | 962 | if (from == 0 && to == PAGE_SIZE) { |
d7e09d03 PT |
963 | CL_PAGE_HEADER(D_PAGE, env, pg, "full page write\n"); |
964 | POISON_PAGE(page, 0x11); | |
965 | } else | |
966 | result = vvp_io_prepare_partial(env, ios->cis_io, obj, | |
967 | pg, cp, from, to); | |
968 | } else | |
969 | CL_PAGE_HEADER(D_PAGE, env, pg, "uptodate\n"); | |
0a3bdb00 | 970 | return result; |
d7e09d03 PT |
971 | } |
972 | ||
973 | static int vvp_io_commit_write(const struct lu_env *env, | |
974 | const struct cl_io_slice *ios, | |
975 | const struct cl_page_slice *slice, | |
976 | unsigned from, unsigned to) | |
977 | { | |
978 | struct cl_object *obj = slice->cpl_obj; | |
979 | struct cl_io *io = ios->cis_io; | |
980 | struct ccc_page *cp = cl2ccc_page(slice); | |
981 | struct cl_page *pg = slice->cpl_page; | |
982 | struct inode *inode = ccc_object_inode(obj); | |
983 | struct ll_sb_info *sbi = ll_i2sbi(inode); | |
984 | struct ll_inode_info *lli = ll_i2info(inode); | |
985 | struct page *vmpage = cp->cpg_page; | |
986 | ||
987 | int result; | |
988 | int tallyop; | |
989 | loff_t size; | |
990 | ||
d7e09d03 PT |
991 | LINVRNT(cl_page_is_vmlocked(env, pg)); |
992 | LASSERT(vmpage->mapping->host == inode); | |
993 | ||
c4f39553 | 994 | LU_OBJECT_HEADER(D_INODE, env, &obj->co_lu, "committing page write\n"); |
d7e09d03 PT |
995 | CL_PAGE_HEADER(D_PAGE, env, pg, "committing: [%d, %d]\n", from, to); |
996 | ||
997 | /* | |
998 | * queue a write for some time in the future the first time we | |
999 | * dirty the page. | |
1000 | * | |
1001 | * This is different from what other file systems do: they usually | |
1002 | * just mark page (and some of its buffers) dirty and rely on | |
1003 | * balance_dirty_pages() to start a write-back. Lustre wants write-back | |
1004 | * to be started earlier for the following reasons: | |
1005 | * | |
1006 | * (1) with a large number of clients we need to limit the amount | |
1007 | * of cached data on the clients a lot; | |
1008 | * | |
1009 | * (2) large compute jobs generally want compute-only then io-only | |
1010 | * and the IO should complete as quickly as possible; | |
1011 | * | |
1012 | * (3) IO is batched up to the RPC size and is async until the | |
1013 | * client max cache is hit | |
42608246 | 1014 | * (/sys/fs/lustre/osc/OSC.../max_dirty_mb) |
d7e09d03 PT |
1015 | * |
1016 | */ | |
1017 | if (!PageDirty(vmpage)) { | |
1018 | tallyop = LPROC_LL_DIRTY_MISSES; | |
1019 | result = cl_page_cache_add(env, io, pg, CRT_WRITE); | |
1020 | if (result == 0) { | |
1021 | /* page was added into cache successfully. */ | |
1022 | set_page_dirty(vmpage); | |
1023 | vvp_write_pending(cl2ccc(obj), cp); | |
1024 | } else if (result == -EDQUOT) { | |
09cbfeaf | 1025 | pgoff_t last_index = i_size_read(inode) >> PAGE_SHIFT; |
d7e09d03 PT |
1026 | bool need_clip = true; |
1027 | ||
1028 | /* | |
1029 | * Client ran out of disk space grant. Possible | |
1030 | * strategies are: | |
1031 | * | |
1032 | * (a) do a sync write, renewing grant; | |
1033 | * | |
1034 | * (b) stop writing on this stripe, switch to the | |
1035 | * next one. | |
1036 | * | |
1037 | * (b) is a part of "parallel io" design that is the | |
1038 | * ultimate goal. (a) is what "old" client did, and | |
1039 | * what the new code continues to do for the time | |
1040 | * being. | |
1041 | */ | |
1042 | if (last_index > pg->cp_index) { | |
09cbfeaf | 1043 | to = PAGE_SIZE; |
d7e09d03 PT |
1044 | need_clip = false; |
1045 | } else if (last_index == pg->cp_index) { | |
1046 | int size_to = i_size_read(inode) & ~CFS_PAGE_MASK; | |
50ffcb7e | 1047 | |
d7e09d03 PT |
1048 | if (to < size_to) |
1049 | to = size_to; | |
1050 | } | |
1051 | if (need_clip) | |
1052 | cl_page_clip(env, pg, 0, to); | |
1053 | result = vvp_page_sync_io(env, io, pg, cp, CRT_WRITE); | |
1054 | if (result) | |
1055 | CERROR("Write page %lu of inode %p failed %d\n", | |
1056 | pg->cp_index, inode, result); | |
1057 | } | |
1058 | } else { | |
1059 | tallyop = LPROC_LL_DIRTY_HITS; | |
1060 | result = 0; | |
1061 | } | |
1062 | ll_stats_ops_tally(sbi, tallyop, 1); | |
1063 | ||
1064 | /* Inode should be marked DIRTY even if no new page was marked DIRTY | |
1065 | * because page could have been not flushed between 2 modifications. | |
1066 | * It is important the file is marked DIRTY as soon as the I/O is done | |
1067 | * Indeed, when cache is flushed, file could be already closed and it | |
1068 | * is too late to warn the MDT. | |
1069 | * It is acceptable that file is marked DIRTY even if I/O is dropped | |
1070 | * for some reasons before being flushed to OST. | |
1071 | */ | |
1072 | if (result == 0) { | |
1073 | spin_lock(&lli->lli_lock); | |
1074 | lli->lli_flags |= LLIF_DATA_MODIFIED; | |
1075 | spin_unlock(&lli->lli_lock); | |
1076 | } | |
1077 | ||
1078 | size = cl_offset(obj, pg->cp_index) + to; | |
1079 | ||
1080 | ll_inode_size_lock(inode); | |
1081 | if (result == 0) { | |
1082 | if (size > i_size_read(inode)) { | |
1083 | cl_isize_write_nolock(inode, size); | |
1084 | CDEBUG(D_VFSTRACE, DFID" updating i_size %lu\n", | |
1085 | PFID(lu_object_fid(&obj->co_lu)), | |
1086 | (unsigned long)size); | |
1087 | } | |
1088 | cl_page_export(env, pg, 1); | |
1089 | } else { | |
1090 | if (size > i_size_read(inode)) | |
1091 | cl_page_discard(env, io, pg); | |
1092 | } | |
1093 | ll_inode_size_unlock(inode); | |
0a3bdb00 | 1094 | return result; |
d7e09d03 PT |
1095 | } |
1096 | ||
1097 | static const struct cl_io_operations vvp_io_ops = { | |
1098 | .op = { | |
1099 | [CIT_READ] = { | |
1100 | .cio_fini = vvp_io_read_fini, | |
1101 | .cio_lock = vvp_io_read_lock, | |
1102 | .cio_start = vvp_io_read_start, | |
1103 | .cio_advance = ccc_io_advance | |
1104 | }, | |
1105 | [CIT_WRITE] = { | |
1106 | .cio_fini = vvp_io_fini, | |
1107 | .cio_lock = vvp_io_write_lock, | |
1108 | .cio_start = vvp_io_write_start, | |
1109 | .cio_advance = ccc_io_advance | |
1110 | }, | |
1111 | [CIT_SETATTR] = { | |
1112 | .cio_fini = vvp_io_setattr_fini, | |
1113 | .cio_iter_init = vvp_io_setattr_iter_init, | |
1114 | .cio_lock = vvp_io_setattr_lock, | |
1115 | .cio_start = vvp_io_setattr_start, | |
1116 | .cio_end = vvp_io_setattr_end | |
1117 | }, | |
1118 | [CIT_FAULT] = { | |
1119 | .cio_fini = vvp_io_fault_fini, | |
1120 | .cio_iter_init = vvp_io_fault_iter_init, | |
1121 | .cio_lock = vvp_io_fault_lock, | |
1122 | .cio_start = vvp_io_fault_start, | |
1123 | .cio_end = ccc_io_end | |
1124 | }, | |
1125 | [CIT_FSYNC] = { | |
1126 | .cio_start = vvp_io_fsync_start, | |
1127 | .cio_fini = vvp_io_fini | |
1128 | }, | |
1129 | [CIT_MISC] = { | |
1130 | .cio_fini = vvp_io_fini | |
1131 | } | |
1132 | }, | |
1133 | .cio_read_page = vvp_io_read_page, | |
1134 | .cio_prepare_write = vvp_io_prepare_write, | |
1135 | .cio_commit_write = vvp_io_commit_write | |
1136 | }; | |
1137 | ||
1138 | int vvp_io_init(const struct lu_env *env, struct cl_object *obj, | |
1139 | struct cl_io *io) | |
1140 | { | |
1141 | struct vvp_io *vio = vvp_env_io(env); | |
1142 | struct ccc_io *cio = ccc_env_io(env); | |
1143 | struct inode *inode = ccc_object_inode(obj); | |
1144 | int result; | |
1145 | ||
1146 | CLOBINVRNT(env, obj, ccc_object_invariant(obj)); | |
d7e09d03 | 1147 | |
5ea17d6c JL |
1148 | CDEBUG(D_VFSTRACE, DFID |
1149 | " ignore/verify layout %d/%d, layout version %d restore needed %d\n", | |
1150 | PFID(lu_object_fid(&obj->co_lu)), | |
1151 | io->ci_ignore_layout, io->ci_verify_layout, | |
1152 | cio->cui_layout_gen, io->ci_restore_needed); | |
1153 | ||
d7e09d03 PT |
1154 | CL_IO_SLICE_CLEAN(cio, cui_cl); |
1155 | cl_io_slice_add(io, &cio->cui_cl, obj, &vvp_io_ops); | |
1156 | vio->cui_ra_window_set = 0; | |
1157 | result = 0; | |
1158 | if (io->ci_type == CIT_READ || io->ci_type == CIT_WRITE) { | |
1159 | size_t count; | |
1160 | struct ll_inode_info *lli = ll_i2info(inode); | |
1161 | ||
1162 | count = io->u.ci_rw.crw_count; | |
1163 | /* "If nbyte is 0, read() will return 0 and have no other | |
c0894c6c OD |
1164 | * results." -- Single Unix Spec |
1165 | */ | |
d7e09d03 PT |
1166 | if (count == 0) |
1167 | result = 1; | |
b42b15fd | 1168 | else |
d7e09d03 | 1169 | cio->cui_tot_count = count; |
b42b15fd | 1170 | |
d7e09d03 PT |
1171 | /* for read/write, we store the jobid in the inode, and |
1172 | * it'll be fetched by osc when building RPC. | |
1173 | * | |
1174 | * it's not accurate if the file is shared by different | |
1175 | * jobs. | |
1176 | */ | |
1177 | lustre_get_jobid(lli->lli_jobid); | |
1178 | } else if (io->ci_type == CIT_SETATTR) { | |
1179 | if (!cl_io_is_trunc(io)) | |
1180 | io->ci_lockreq = CILR_MANDATORY; | |
1181 | } | |
1182 | ||
1183 | /* ignore layout change for generic CIT_MISC but not for glimpse. | |
1184 | * io context for glimpse must set ci_verify_layout to true, | |
c0894c6c OD |
1185 | * see cl_glimpse_size0() for details. |
1186 | */ | |
d7e09d03 PT |
1187 | if (io->ci_type == CIT_MISC && !io->ci_verify_layout) |
1188 | io->ci_ignore_layout = 1; | |
1189 | ||
1190 | /* Enqueue layout lock and get layout version. We need to do this | |
1191 | * even for operations requiring to open file, such as read and write, | |
c0894c6c OD |
1192 | * because it might not grant layout lock in IT_OPEN. |
1193 | */ | |
65fb55d1 | 1194 | if (result == 0 && !io->ci_ignore_layout) { |
d7e09d03 | 1195 | result = ll_layout_refresh(inode, &cio->cui_layout_gen); |
65fb55d1 NY |
1196 | if (result == -ENOENT) |
1197 | /* If the inode on MDS has been removed, but the objects | |
1198 | * on OSTs haven't been destroyed (async unlink), layout | |
d0a0acc3 | 1199 | * fetch will return -ENOENT, we'd ignore this error |
c0894c6c OD |
1200 | * and continue with dirty flush. LU-3230. |
1201 | */ | |
65fb55d1 NY |
1202 | result = 0; |
1203 | if (result < 0) | |
1204 | CERROR("%s: refresh file layout " DFID " error %d.\n", | |
e15ba45d OD |
1205 | ll_get_fsname(inode->i_sb, NULL, 0), |
1206 | PFID(lu_object_fid(&obj->co_lu)), result); | |
65fb55d1 | 1207 | } |
d7e09d03 | 1208 | |
0a3bdb00 | 1209 | return result; |
d7e09d03 PT |
1210 | } |
1211 | ||
1212 | static struct vvp_io *cl2vvp_io(const struct lu_env *env, | |
1213 | const struct cl_io_slice *slice) | |
1214 | { | |
d0a0acc3 | 1215 | /* Calling just for assertion */ |
d7e09d03 PT |
1216 | cl2ccc_io(env, slice); |
1217 | return vvp_env_io(env); | |
1218 | } |